text
stringlengths
0
643k
meta
stringlengths
137
151
# Introduction In future motorways, the development of vehicular ad hoc networks (VANETs) which deliver exceptional road safety and driving efficiency has sparked interdisciplinary research in both computer vision and wireless communications. In the near future, vehicles will be equipped with a variety of sensing technologies, including radars, \(360^\circ\) cameras, ultrasonic sensors, and lidars. Computer vision algorithms will then fuse this information to classify road users (cars, cyclists, pedestrians, etc.), predict their behaviour, adjust the speed of the car, and improve the response of vehicles to critical events i.e. automatic braking, adjusting road position, etc. Information exchange among vehicles therefore becomes indispensable. Local perception, for example, can be limited under certain conditions. Consider also blind spots appearing in the presence of dense traffic, shadowing due to buildings and vegetation, sensor impairments, weather conditions, and/or the road layout, all limiting the success of the on-board sensors. There are therefore ongoing standardization activities for collective perception (or cooperative sensing) mechanisms, where the vehicles exchange not only their state (position, speed, acceleration) , but also their perception of the environment . As a result, the requirement for wireless communication technologies to sustain reliable connectivity between the vehicles becomes essential. A key element of the road infrastructure will be the Road Side Unit (RSU) with mounted stationary sensors and wireless connectivity. It is expected that the roadside unit will receive a variety of messages from multiple vehicles not necessarily connected to each other, obtain object information from its own sensors, fuse the combined information and finally broadcast it to the vehicles . In this scenario, it is important that the broadcast reaches as many vehicles as possible, especially in case of emergency. A practical solution to achieve this objective is to combine both Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications, establishing connections between the vehicles and the roadside unit in a multihop fashion, seen ubiquitously in ad hoc networks. Motivated by this emerging scenario, the objective of this article is to develop our understanding of the roadside unit's multi-hop communication range i.e. who is within \(k\)-hops of the roadside unit, in V2V and V2I communication, as a function of the traffic density \(\rho\) cars per unit length of road. In this case, we adopt a *protocol-and-interference-free* approach, where the vehicles are modeled as the vertices of a one-dimensional (1D) soft random geometric graph. The reason is that we aim to identify the fundamental limits of multi-hop communication in VANETs, in particular, the simplest case, two-hop connectivity, between the vehicles and the roadside unit. Incorporating the impact of interference and multiple access into multihop connectivity will only degrade the performance, and hence, our results can be regarded as an upper performance bound. Multihop connectivity occurs when the network's diameter is bounded, i.e the longest shortest path in the network is below a certain threshold. We instead study the number of cars in a random geometric vehicular network built on a quasi-1D line (i.e. a single lane highway) within \(k\) hops to a single, fixed roadside unit, for \(k=2\), denoted as \(N_2\). The main technical contributions of our work are summarized as follows. - We derive the following infinite series expression for \(N_2\) in terms of \(\rho\) for \(\mathbb{E} [N_2]\), i.e. \[\mathbb{E} [N_2] = \sqrt{2 \pi}\rho\sum_{k=1}^\infty (-1)^{k-1}\frac{\big(\rho \sqrt{\pi/2} \big)^k}{k!\sqrt{k}}.\] - We study the asymptotics of the \(\mathbb{E} [N_{2}]\) as the car density approaches infinity and zero. Namely, in Theorem [\[t:expectation\]](#t:expectation){reference-type="ref" reference="t:expectation"}, we show that the expected number of cars within two hops to a single, fixed roadside unit asymptotically grows as \[\mathbb{E} [N_2] \simeq 2 \rho \sqrt{\log \big(\rho \sqrt{\pi/2} \big)} \nonumber\] as \(\rho \to \infty\). - We compare these analytic predictions to snapshots of real traffic, showing how variation in the underlying stationary Poisson Point Process (PPP) model of the cars does not affect the results, and observe a normal approximation property for \(N_2\). This paper is structured as follows. In Section [2](#sec:review){reference-type="ref" reference="sec:review"}, we present a literature review of the related works. In Section [3](#sec:model){reference-type="ref" reference="sec:model"}, we set up and discuss our VANET system model using the random connection model. In Section [4](#sec:analysis){reference-type="ref" reference="sec:analysis"}, we state Theorem [\[t:expectation\]](#t:expectation){reference-type="ref" reference="t:expectation"}, and provide its proof. In Section [5](#sec:traces){reference-type="ref" reference="sec:traces"}, we corroborate our scaling laws with experimental evidence provided from actual traffic data, in relation with normal approximation. Finally, we conclude our work in Section [6](#sec:conclusion){reference-type="ref" reference="sec:conclusion"}. # Related Work {#sec:review} The performance evaluation of VANETs using point processes, line processes and stochastic geometry has gained increasing attention in the literature. These tools offer a framework for studying the impact of various parameters onto the network performance, with relatively low computational complexity. For example, the study in  models the locations of vehicles by a Cox point process, and highlights the conflicting impact of the intensities of streets and vehicles on the probability of outage at the typical receiver. In urban settings, the Manhattan Poisson line process has been used to model grid-like road networks , while the Poisson line process is pertinent to streets with random orientations . In most studies, the distribution of vehicles along each street is assumed to follow a 1D PPP (Poisson point process), giving rise to the Cox point process for the distribution of vehicles in the plane . The above studies have highlighted that near road intersections, the receiver performance degrades, because over there, there is dominant interference from multiple streets. The performance evaluation studies of motorway VANETs have utilized much simpler spatial models than the Cox process, mainly due to tractability. Super-imposing straight lines, parallel to each other, is sufficient to model multi-lane motorways with unidirectional traffic flows. This simplification has allowed researchers to incorporate the effect of IEEE 802.11p instead of ALOHA into the performance assessment of VANETs . Furthermore, realistic point processes which introduce correlations in the locations of vehicles along a lane not captured by the PPP, but present in realistic road traffic, have been investigated . The studies in  have suggested the use of modified Matérn processes to model the impact of IEEE 802.11p on the locations of concurrent interferers. The study in  has also compared a variety of packet forwarding schemes in the performance evaluation of multi-hop VANETs. The study in  has incorporated queueing theory into the spatial model in an attempt to understand the impact of non-saturated data traffic on the outage probability. Finally, the studies in , have suggested a hardcore distance amendment to the PPP, for the distribution of vehicles along a lane. It is shown, that the hardcore distance can significantly improve the predictions for the distribution of outage probability along the motorway (meta-distribution of the signal-to-interference ratio), and this remark has also been justified using real-world vehicular traces from . All the studies discussed above have considered the effect of both interference and fading on the performance assessment. In this paper, we focus on a topic in communication theory known as the *random connection model*. This incorporates any point process, modeling the positions of cars, moving or otherwise, as well as any probabilistic law which governs the connectivity. In spatial networks, there is a current theme of studying the relation between graph distance (hop distance), and Euclidean distance  i.e. how the geometric embedding of the nodes relates to the hop-statistics between the cars. This is particularly important in the mobile ad hoc network (MANET) and VANET settings. For a comprehensive review of all work in this area, see Mao's recent monograph , as well as the early work of Chandler et al. , and later Ta et al. , and Mao et al. . Two recent major works deal with the random connection model in the V2V and V2I setting . Ng et al. in  present analysis and analytic formulas for the two-hop connectivity probability, which gives the probability that all vehicles in a VANET are within two hops, given vehicles connect pairwise with probability \(p\). This is developed to the general case of an arbitrary number of hops of the roadside by Zhang et al. . The study in calculates the probability that a node in a 1D PPP has a two-hop path to the origin. However, the distribution of the number of nodes with a two-hop path is not treated therein, neither asymptotic equivalents for ultra-dense and sparse networks are derived, as we will do in this paper. Finally, in the moments of the number of \(k\)-hop paths to the origin in a 2D random connection model are computed, which is a different metric as compared to that studied in the present paper, where the moments of the number of nodes in the graph with a \(k\)-hop path to the origin are calculated. Note that a node may have more than one \(k\)-hop path, e.g., more than one relay node to the origin in the case of two-hop paths. # System Model {#sec:model} In summary, we consider - A connection function \(H( x-y) = \mathbb{P} ( x \leftrightarrow y ) \in [0,1]\) which gives the probability that two nodes \(x,y\in \mathbb{R}\) at distance \(r=|x-y|\) in the graph have a link, resembling the long-term proportion of the time that a Rayleigh fading channel is in coverage . - A *random connection model*, which is a random geometric graph \(G_H (\mathcal{X})\) built on a stationary, homogeneous PPP \(\mathcal{X}\) with flat intensity \(\rho>0\) on an interval \(V \subset \mathbb{R}\) centered at the origin. The graph \(G_H (\mathcal{X})\) is built on long-range links (known in physics as *soft connectivity* ) with a "Rayleigh fading" connection function \(H(r)=\exp(-r^2)\), and contains a point added at the location \(u\in \mathbb{R}\), representing the roadside unit. This resembles 1D *continuum percolation*, or a fluid of particles in the so-called "Potts fluid" , but with soft inter-particle potential, see Fig. [\[fig:system\]](#fig:system){reference-type="ref" reference="fig:system"}. Let \(P\) denote the transmit power level, common for all vehicles. Given a link formed over a distance \(r\) and letting \(h\) denote the amplitude of the Rayleigh fading channel, \(g\!\left(r\right)\) the distance-based path loss, \(\Upsilon\) the threshold information-theoretic decoding rate at the receiver, and \(N_0\) the noise power level, the connection probability \(P_c\) of the link can be expressed as the following probability \[\label{e:coverage} P_c = \mathbb{P} \left[\log_{2}\left(1+\frac{P\, g\left(r\right)}{N_{0}}\hspace{0.5mm}|h|^2\right) > \Upsilon\right].\] The distance-based path-loss function \(g\left(r\right) = C r^{-\eta}\) depends on some positive path loss attenuation constant \(C\!<\!1\) and the path loss exponent \(\eta\!>\! 0\). Rearranging Eq. [\[e:coverage\]](#e:coverage){reference-type="eqref" reference="e:coverage"}, we have, with the following constant \(\beta := N_{0} \left(2^{\Upsilon}-1\right)/\left(P\, C\right)\), a function of the rate \(\Upsilon\) which when increased will decrease the typical length of links, that \(\mathbb{P} ( |h|^2 > \beta r^\eta )\), and since \(|h|^2\) is exponentially distributed with a unit mean, we have \[\nonumber P_c=\exp(-\beta r^\eta ).\] Therefore, the success probability of any V2V or V2I communication link can be modelled by a stretched exponential function of the link distance \(r\), \[\begin{aligned} \nonumber H(r) = \exp(-\beta r^\eta ) \end{aligned}\] for some \(\beta\!>\!0\). In the next section, we take \(\beta = 1\) and focus on the case with \(\eta\!=\!2\) which captures free space path loss. Additionally, the main notations used in the paper are listed in Table [1](#Tab:Notations){reference-type="ref" reference="Tab:Notations"}. Finally, it is noted that to have a two-hop path, the signal-to-noise ratio (SNR) for both hops must be higher than or equal to the threshold \(\Upsilon\). From this perspective, a *decode-and-forward* relay is essentially assumed here. ### Slivnyak-Mecke formula {#slivnyak-mecke-formula .unnumbered} We close this section with the statement of the Slivnyak-Mecke formula, which will be used throughout the paper. It is an extension of Campbell's formula to sum over tuples of a point process. Often, and throughout this paper, we sum indicator functions over tuples of nodes of a point process, and evaluate the typical value of the sum over all graphs. We might, for example, sum an indicator function over singletons (i.e. \(1\)-tuples of nodes) of the point process, which gives isolation. Then, this sum would give the number of isolated nodes, and the expected value of the sum the expected number of isolated nodes. We refer the reader to e.g. for the following lemma. # Results {#sec:analysis} This section presents the main technical results of our work. We start by introducing the preliminaries and then address the problem of determining the statistics of the number of vehicles on the road within two-hop range of a roadside unit in the system described in Section [3](#sec:model){reference-type="ref" reference="sec:model"}. ## Two-hop connectivity In the sequel, we let \[\nonumber N_1(x,u): = \sum_{z \in \mathcal{X}}\mathbf{1}\left(x \leftrightarrow z \leftrightarrow u\right)\] denote the number of distinct two-hop paths between vertices at \(x\) and \(u\) in \(V\). The following lemma will be used throughout the remainder of the article. Next, we compute the mean number of two hop paths which join two vertices of the graph, starting with the case of a finite interval of width \(|V|<\infty\), which will later become the real line \(\mathbb{R}\). Corollary [\[c1\]](#c1){reference-type="ref" reference="c1"} below, which treats the infinite length case \(V = \mathbb{R}\), can be obtained from Proposition [\[p1\]](#p1){reference-type="ref" reference="p1"} by letting \(|V|\) tend to infinity in [\[e:ccl\]](#e:ccl){reference-type="eqref" reference="e:ccl"}, or from Lemma [\[l1\]](#l1){reference-type="ref" reference="l1"}. ## Main result In this section, we apply Corollary [\[c1\]](#c1){reference-type="ref" reference="c1"} to analyze the mean number of vertices with two-hop connectivity to the roadside unit. Theorem 1 is validated against simulations in Fig. [\[fig:realization2\]](#fig:realization2){reference-type="ref" reference="fig:realization2"} with \(10\,000\) independent graph realizations of the 1D random connection model, where the mean degree \(\mu_d\) of \(G_H (\mathcal{X})\), given by \[\label{e:p0} \begin{array}{ccl} \mu_d &=& \displaystyle \rho\int_{-\infty}^\infty \mathbb{P} ( x \leftrightarrow 0 ) \mathrm{d}x \\ &=& \displaystyle \rho\int_{-\infty}^\infty H(r){\rm d}r \\ &=& \displaystyle \rho\int_{-\infty}^\infty e^{-r^2}{\rm d}r \\ &=& \displaystyle \rho \sqrt{\pi}, \end{array}\] goes to infinity as \(\rho \to \infty\). In addition, we see in Fig. [\[fig:realization2\]](#fig:realization2){reference-type="ref" reference="fig:realization2"} that the asymptotic expression in Eq. [\[e:a1\]](#e:a1){reference-type="eqref" reference="e:a1"} remains very accurate also for realistic values of \(\rho\). In Fig. [\[fig:realization\]](#fig:realization){reference-type="ref" reference="fig:realization"} (right subfigure), we illustrate that the probability of a two-hop path, see Eq. [\[e:indicator2\]](#e:indicator2){reference-type="eqref" reference="e:indicator2"}, for \(\rho\to\infty\) will remain close to unity for small distances \(x\) from the roadside unit, and it will sharply jump from unity to zero. In Fig. [\[fig:grid0\]](#fig:grid0){reference-type="ref" reference="fig:grid0"} we observe that as the expected vertex degree \(\mu_d\) in Eq. [\[e:p0\]](#e:p0){reference-type="eqref" reference="e:p0"} tends to infinity, the Cumulative Distribution Function (CDF) of \(N_2\) converges to that of the normal distribution, after rescaling, i.e. \[\label{e:p} \mathbb{P} \left(\frac{N_2-\mathbb{E} [N_2]}{\sqrt{\mathrm{Var}[N_2]}} \leq x \right) \simeq \Phi(x), \qquad x\in \mathbb{R},\] as \(\rho\) tends to infinity, with \(\Phi\) the CDF of the standard normal distribution. Observing normal approximation is common in the case of independent trials. Here, the events "a node \(v\) has a two-hop path to the roadside unit", for each \(v \in \mathcal{X}\), are dependent, nevertheless, the dependency is sufficiently short range to lead to a Gaussian distribution in the dense limit of Eq. [\[e:p0\]](#e:p0){reference-type="eqref" reference="e:p0"}. # Validation with synthetic traces {#sec:traces} Next, we assess the validity of the Poissonian assumption for the distribution of vehicles along a motorway. Using synthetic traces generated based on traffic data collected on the motorway M40 outside Madrid, Spain , we simulate the distribution, \(f_{\hat{N_2}}\), of the number of vehicles with at least one two-hop link to the origin, and compare this distribution (also referred to as the empirical distribution) to a Gaussian with mean equal to the parameter calculated in Eq. [\[e:a0\]](#e:a0){reference-type="eqref" reference="e:a0"}. Overall, the spatial distribution of vehicles, at a snapshot of time, along a motorway, is not exactly Poisson. Therefore we quantify the sensitivity of the mean \(\mathbb{E} [N_2]\), in Eq. [\[e:a0\]](#e:a0){reference-type="eqref" reference="e:a0"}, to small perturbations to the deployment model. According to , magnetic induction loops under the concrete layer of the motorway are used to measure the average intensity and speed of vehicles separately, for each of the three lanes (uni-directional traffic flow). The measurements took place on different days and times in May 2010, covering heterogeneous traffic conditions during weekdays, weekends, the busy hour, and off-peak. The collected parameters are used to calibrate a micro-mobility simulator, whose output is \(1800\) consecutive snapshots of a \(10\)-km segment on a three-lane motorway. Thanks to , these snapshots are publicly available. The associated data files contain the horizontal location and occupied lane for all the vehicles over the \(1800\) snapshots. The time granularity is set to one second, so the total simulation time was half an hour, i.e., 8:30 a.m.-9:00 a.m. for the busy hour, see . We first generate the empirical distribution, \(f_{\hat{N_2}}\), for a snapshot of vehicles taken during the busy hour. Firstly, we project all vehicles in the snapshot onto a single line. It is noted that this, apparently, does not introduce any error, perhaps because the communication range is expected to be much larger than the inter-lane distance separation, which has been taken as equal to \(3\)m in . We then construct the empirical CDF of headway distances using linear interpolation between the points of the CDF. In each simulation run, we generate uniform random numbers in the interval \(\left[0,1\right]\), and we map them to the numerically inverted CDF. This is known as inversion sampling. We do so until we cover a line segment of \(10\) km with vehicles. The set of vehicles is denoted by \(\mathcal{X}\), and the origin is located in the middle of the segment at \(5\) km. Next, for each vehicle \(x\!\in\!\mathcal{X}\), we generate a random number uniformly in \(\left[0,1\right]\). After comparing it with the value of the connection function \(e^{-\beta r^2}\), where \(r\) is the distance between the vehicle and the origin, we can identify the set of vehicles \(\mathcal{X}_1\), which have a single-hop link to the origin. Then, we search over the vehicles \(x\!\in\!\mathcal{X}\backslash \mathcal{X}_1\) and separate those with a single-hop link to, at least, one of the vehicles in \(\mathcal{X}_1\). They become the elements of the set \(\mathcal{X}_2\), which consists of the vehicles with a two-hop path to the origin. To complete the set \(\mathcal{X}_2\) we need to add to it the elements of the set \(\mathcal{X}_1\) which also have a two-hop connection to the roadside unit. Finally, the cardinality of the set \(\mathcal{X}_2\) is computed and stored for each simulation run. The simulated probability mass function (PMF), \(f_{\hat{N_2}}\), along with the Gaussian approximation are depicted in Fig. [\[fig:N2Busy\]](#fig:N2Busy){reference-type="ref" reference="fig:N2Busy"}. Although the empirical CDF of inter-vehicle distances is not exactly exponential, see the inset in Fig. [\[fig:N2Busy\]](#fig:N2Busy){reference-type="ref" reference="fig:N2Busy"}, Eq. [\[e:a0\]](#e:a0){reference-type="eqref" reference="e:a0"} can approximate very well the mean number of vehicles with a two-hop link to the origin. In addition, the Gaussian approximation appears to fit very well the PMFs, validating Eq. [\[e:p\]](#e:p){reference-type="eqref" reference="e:p"}. Thus far, we have utilized just a single snapshot of vehicles in simulating the statistics of the number of two-hop paths to the origin. This may not be representative of the traffic conditions during the busy hour. Therefore, we also simulate the distribution \(f_{\hat{N}_2}\) over multiple snapshots. During network planning, it is expected that we monitor the motorway traffic for some time while estimating the average intensity of vehicles, and we finally apply Eq. [\[e:a0\]](#e:a0){reference-type="eqref" reference="e:a0"} to predict the mean number of vehicles with a two-hop connection to the roadside unit. In our simulations, we will actually use the last \(1200\) out of the total \(1800\) snapshots, in order to allow the first vehicles entering the roadway to reach the exit. This is to ensure that for all considered snapshots there are enough vehicles along the highway, hence, we can accurately simulate the statistics of connectivity. Since the considered snapshots cover a time interval of \(20\) mins, there are slight variations in the intensity of vehicles during this time, see the solid line in the inset of Fig. [\[fig:N2BusyAllsnap\]](#fig:N2BusyAllsnap){reference-type="ref" reference="fig:N2BusyAllsnap"}. On the other hand, the model in Eq. [\[e:a0\]](#e:a0){reference-type="eqref" reference="e:a0"} requires a single value for the intensity \(\rho\). We will utilize the average estimated intensity over all considered snapshots, see the dashed line in the inset. The results are depicted in Fig. [\[fig:N2BusyAllsnap\]](#fig:N2BusyAllsnap){reference-type="ref" reference="fig:N2BusyAllsnap"}. Eq. [\[e:a0\]](#e:a0){reference-type="eqref" reference="e:a0"} is still a very good estimate of the simulated mean number of vehicles with a two-hop path to the origin. Also, the quality of the Gaussian fit remains good, even though the actual deployment of vehicles does not follow a PPP, and in addition to that, the intensity of vehicles varies with respect to time. In Fig. [\[fig:N2OffpeakAllsnap\]](#fig:N2OffpeakAllsnap){reference-type="ref" reference="fig:N2OffpeakAllsnap"}, the same study is repeated during off-peak, i.e., 11:40 a.m.-12:00 p.m., see . The average intensity of vehicles becomes lower than that during the busy hour, but the approximation accuracy of our model is still very satisfactory. # Conclusion {#sec:conclusion} Motivated by V2I communications in a VANET topology, we investigate the notion of \(k\)-hop connectivity to a fixed roadside unit, specifically, in the random connection model on a 1D PPP with connection function \(H(r) = \exp(-r^2)\), and with \(k=2\). We know the paths are Poisson in number between a car and the roadside, so using the void probability, calculate the existence probability, which is integrated over the road domain to give the typical number of cars \(N_2\) with at least one two-hop path to the origin. This is then expanded in a power series to provide an infinite oscillating series expression for \(N_2\), which, truncated to the first term, shows that the two hop connectivity grows quadratically with traffic density, when the traffic is low. We then perform integral asymptotics to derive that \(N_2\) is asymptotically equivalent to \[N_2 \simeq \sqrt{2}\rho \sqrt{ \ln\rho + \ln\sqrt{\pi / 2} }.\] Finally, we present comparison with both Monte Carlo simulations, corroborating these formulas, and with a random model based on traffic data in Madrid. The Madrid data confirms that the typical number of vehicles in two-hop range of a roadside unit is an accurate representation of an interference-free network of moving cars, at a random instance of time, and further, that a Gaussian central limit theorem is also present.
{'timestamp': '2020-06-01T02:07:20', 'yymm': '2005', 'arxiv_id': '2005.14407', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14407'}
null
null
null
null
# Introduction {#sec:introduction} The Large Hadron Collider (LHC) continues to measure the properties of the discovered Higgs boson  at \(125\,{\rm GeV}\) with increasing precision. So far, given the current experimental and theoretical uncertainties, the measurements are in good agreement with the SM predictions . Nevertheless, in certain parameter regions, models with extended Higgs sectors often feature a SM-like Higgs boson that is compatible with the experimental data. Such models, often motivated by theoretical arguments or observational puzzles (such as dark matter), are therefore equally viable in the light of the Higgs observation. The MSSM  is one of the best studied models with an extended Higgs sector. In contrast to the case of the SM, the MSSM contains two Higgs doublet fields. This results in five physical Higgs bosons instead of the single Higgs boson in the SM. These are (in the \(\mathcal{CP}\)-conserving case, which is assumed throughout this paper) the light and heavy \(\mathcal{CP}\)-even Higgs bosons, \(h\) and \(H\), the \(\mathcal{CP}\)-odd Higgs boson, \(A\), and the charged Higgs bosons, \(H^\pm\). At tree-level the Higgs sector is determined by the ratio of the two vacuum expectation values, \(\tan\beta\), and the mass of the \(\mathcal{CP}\)-odd Higgs boson, \(M_A\). In addition, the MSSM predicts two scalar partners for all fermions as well as fermionic partners for all bosons, which for the electroweak gauge bosons and Higgs bosons are the so-called neutralinos and charginos, or electroweakinos. In order to facilitate collider searches for the additional MSSM Higgs bosons a set of new benchmark scenarios for MSSM Higgs boson searches at the LHC has been proposed recently . The scenarios are compatible---at least over wide portions of their parameter space---with the most recent LHC results for the properties of the Higgs boson at \(125\,{\rm GeV}\)  and the bounds on masses and cross sections of new SUSY particles, as well as with global fits of the phenomenological MSSM, see e.g. . Each scenario contains one \(\mathcal{CP}\)-even scalar with a mass around \(125\,{\rm GeV}\) which is identified with the observed Higgs boson. Nevertheless, the scenarios differ significantly in their predictions for the light Higgs-boson phenomenology (within the allowed uncertainties), in particular in the non-decoupling regime, as well as in the phenomenology of the additional, so far undetected Higgs bosons. In many cases, such differences occur due to the presence of additional light particles like, for example, the above-mentioned electroweakinos. The search for the additional Higgs bosons will continue during LHC Run 3 and subsequently at the high luminosity (HL)-LHC . At possible future \(e^+e^-\) colliders, such as the International Linear Collider (ILC), the Compact Linear Collider (CLIC), the Future Circular Collider (FCC)-ee or the Circular Electron Positron Collider (CEPC), the search for extended Higgs sectors can be performed either directly, via the search for new Higgs bosons, or indirectly, via the precise measurements of the properties of the Higgs boson at \(125 \,{\rm GeV}\). The new benchmark scenarios, due to their distinct phenomenology of the MSSM Higgs sector, can be employed to assess the reach of current and future colliders. In this paper we present the HL-LHC and ILC
{'timestamp': '2020-09-18T02:15:44', 'yymm': '2005', 'arxiv_id': '2005.14536', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14536'}
null
null
null
null
# Introduction Bayesian uncertainty quantification is useful for calibrating physical models to observed data. As well as inferring the parameters that produce the best fit between a model and observed data, Bayesian methods can also identify the range of parameters that are consistent with observations and allow for prior beliefs to be incorporated into inferences. This means that not only can predictions be made but also their uncertainty can be quantified. In demography, Bayesian analysis is used to forecast the global population. In defence systems, Bayesian analysis is used to track objects from radar signals. And in computational neuroscience Bayesian analysis is used to compare different models of brain connectivity and to estimate physiological parameters in mechanistic models. Many more examples can be found in the references of. We focus here on problems which require the use of Markov Chain Monte Carlo (MCMC), a widely applicable methodology for generating samples approximately drawn from the posterior distribution of model parameters given observed data. MCMC is useful for problems where a parametric closed form solution for the posterior distribution cannot be found. MCMC became popular in the statistical community with the re-discovery of Gibbs sampling, and the development of the BUGS software. More recently it has been found that methods which use derivatives of the posterior distribution with respect to model parameters, such as the Metropolis Adjusted Langevin Algorithm (MALA) and Hamiltonian Monte Carlo (HMC) tend to generate samples more efficiently than methods which do not require derivatives. HMC is used in the popular Stan software. From the perspective of a C++ programmer, the limitations of Stan are as follows: it may take a significant investment of effort to get started. Either the C++ code has to be translated into the Stan modelling language. Or, alternatively, C++ code can be called from Stan, but it may be challenging to (efficiently) obtain the derivatives that Stan needs in order to sample efficiently. The software that we present includes (i) our own implementation of a derivative-based MCMC sampler called simplified manifold MALA (smMALA). This sampler can be easily be used in conjunction with C++ codes for Bayesian data analysis, (ii) Stan's MCMC sampler with derivatives computed using , an industrial standard tool for efficient derivative computation. An alternative approach to the one presented in this paper would be simply to use Stan as a stand-alone tool without the smMALA sampler and without . Determining the most efficient MCMC sampler for a given problem is still an active area of research, but at least within computational neuroscience, it has been found the smMALA performs better than HMC methods on certain problems. Determining the most appropriate method for computing derivatives will depend on both the user and the problem at hand. In many applications Algorithmic Differentiation (AD) is needed for the reasons given in Section [2.3](#sec:deriv){reference-type="ref" reference="sec:deriv"}. The Stan Math Library includes an open-source AD tool. Commercial AD tools such as offer a richer set of features than open-source tools, and these features may be needed in order to optimize derivative computations. For example, the computations done using the Eigen linear algebra library can be differentiated either using the Stan Math Library or using but there are cases where computes derivatives more efficiently than the Stan Math Library. The aim of the software we present is to offer a range of options that both make it easy to get started and to tune performance. # Methods for spectral time-series analysis ## Whittle likelihood The software presented in this paper is targeted at differential equation models with a stable equilibrium point and stochastic input. We refer to such models as stable SDEs. The methods that are implemented assume that the system is operating in a regime where we can approximate the dynamics through linearization around the stable fixed point. If the time-series data is stationary this is a reasonable assumption. Note that the underlying model may be capable of operating in nonlinear regimes such as limit cycles or chaos in addition to approximately linear dynamics. However, parameter estimation using data in nonlinear regimes quickly becomes intractable-see Chapter 2 of. The stability and linearity assumptions are commonly made in the computational neuroscience literature, see for example. In order to simplify the presentation we illustrate the software using a linear state-space model, which is of the form, \[\label{eq:de} d\mathbf{X}(t) = A\, \mathbf{X}(t)dt + \mathbf{P}(t),\] where the term \(A\, \mathbf{X}(t)\) represents the deterministic evolution of the system and \(\mathbf{P}(t)\) represents the noisy input. The example we analyze in this paper is the noise-driven harmonic oscillator, which is a linear state-space model with \[A = \begin{pmatrix} 0 & 1 \\-\omega_0^2 &-2 \zeta \omega_0 \end{pmatrix}, \quad \mathbf{P}(t) = \begin{pmatrix} 0 \\ dW(t) \end{pmatrix},\] and where \(dW(t)\) represents a white noise process with variance \(\sigma_{in}^2\). The observations are modelled as \(Y_k = X_0(k\cdot \Delta t) + \epsilon_k\) with \(\epsilon_k \sim N(0, \sigma_{obs}^2)\). Our aim is to infer model parameters (\(\omega_0, \zeta, \sigma_{in}\)) from time-series data. This could be done in the time-domain using a Kalman filter, but it is often more computationally efficient to do inference in the frequency domain. In the case where we only have a single output (indexed by \(i\)) and a single input (indexed by \(j\)), we can compute a likelihood of the parameters \(\theta\) in the frequency domain through the following steps. 1. Compute the (left and right) eigendecomposition of \(A\), such that, \[A \mathcal{R} = \Lambda \mathcal{R}, \quad \mathcal{L} A = \mathcal{L} \Lambda, \quad \mathcal{L} \mathcal{R} = \mathrm{diag}(c) \\ \] where \(\mathrm{diag}(c)\) is a diagonal matrix, such that \(c_i\) is the dot product of the \(i\)th left eigenvector with the \(i\)th right eigenvector. 2. Compute \(ij\)th element of the transfer matrix for frequencies \(\omega_1,\ldots,\omega_K\), \[\label{eq:transfer} \mathcal{T}(\omega) = \mathcal{R}\ \mathrm{diag}\bigg[ \frac{1}{c_k (i\omega-\lambda_k)} \bigg]\ \mathcal{L}.\] 3. Evaluate the spectral density for component \(i\) of \(\mathbf{X}(t)\), \(f_{X_i}(\omega)\), and the spectral density for the observed time-series, \(f_{Y}(\omega)\), \[\begin{aligned} \label{eq:spec_eq} f_{X_i}(\omega) &= |\mathcal{T}_{ij}(\omega)|^2\ f_{P_j}(\omega), \\ f_{Y}(\omega) &= f_{X_i}(\omega) + \sigma_{obs}^2 \Delta t, \end{aligned}\] where \(f_{P_j}(\omega)\) is the spectral density for component \(j\) of \(\mathbf{P}(t)\). 4. Evaluate the Whittle likelihood, \[\label{eq:whittle} p(y_0,\ldots,y_{n-1}|\theta) = p(S_0,\ldots,S_{n-1}|\theta) \approx \prod_{k=1}^{n/2-1} \frac{1}{f_Y(\omega_k)} \exp\left[-\frac{S_k}{f_Y(\omega_k)}\right],\] where \(\{S_k\}\) is the Discrete Fourier Transform of \(\{y_k\}\). Note that \(\theta\) represents a parameter set (e.g. specific values of \(\omega_0, \zeta, \sigma_{in}\)) that determines the spectral density. The matrix \(A\) that parameterizes a linear state-space model is typically non-symmetric, which means that eigenvectors and eigenvalues will be complex-valued. We use Eigen-AD, a fork of the linear algebra library Eigen. Eigen is templated which facilitates the application of AD by overloading tools and Eigen-AD provides further optimizations for such tools. The operations above require an AD tool that supports differentiation of complex variables. AD of complex variables is considered in. It is available from release 3.2.0 of the Stan Math Library and in from release 3.4.3. ## Markov Chain Monte Carlo {#sec:mcmc} In the context of Bayesian uncertainty quantification, we are interested in generating samples from the following probability distribution, \[\label{eq:bayes} p(\theta|y) \propto p(y|\theta) p(\theta),\] where \(p(y|\theta)\) is the likelihood of the parameter set \(\theta\) given observed data \(y_0,\ldots,\allowbreak y_{n-1}\), and \(p(\theta)\) is the prior distribution of the parameters. In many applications the likelihood \(p(y|\theta)\) is based on some physical model where we cannot derive a closed form expression for the posterior density \(p(\theta|y)\). Markov Chain Monte Carlo (MCMC) has emerged over the last 30 years as one of the most generally applicable and widely used framework for generating samples from the posterior distribution. The software used in this paper makes use of two MCMC algorithms: the No U-Turn Sampler (NUTS) and the simplified manifold Metropolis Adjusted Langevin Algorithm (smMALA). NUTS is called via the Stan environment. It is a variant of Hamiltonian Monte Carlo (HMC), which uses the gradient (first derivative) of the posterior density, whereas smMALA uses the gradient and Hessian (first and second derivatives) of the posterior density, smMALA is described in Algorithm [\[alg:smmala\]](#alg:smmala){reference-type="ref" reference="alg:smmala"}. The error in estimates obtained from MCMC is approximately \(C / \sqrt{N}\), where \(N\) is the number of MCMC iterations and \(C\) is some problem-dependent constant. In general it is not possible to demonstrate that MCMC has converged, but there are several diagnostics that can indicate non-convergence, see Section 11.4 of for more detail. Briefly, there are two phases of MCMC sampling: burn-in and the stationary phase. Burn-in is finished when we are in the region of the parameter space containing the true parameters. In this paper we restrict ourselves to synthetic data examples. In this case it is straight-forward to assess whether the sampler is burnt in by checking whether the true parameters used to simulate the data are contained in the credible intervals obtained from the generated samples. In real data applications, it is good practice to test MCMC sampling on a synthetic data problem that is analogous to the real data problem. During the stationary phase we assess convergence rate using the effective sample size, *N Eff*. If we were able to generate independent samples from the posterior then the constant \(C\) is \(\mathcal{O}(1)\). MCMC methods generate correlated samples, in which case \(C\) may be \(\gg 1\). A small *N Eff* (relative to \(N\)) is an indicator of slow convergence. If we are sampling from a multivariate target distribution, *N Eff* for the \(i\)th component is equal to, \[\frac{S}{1 + 2 \sum_k \hat{\rho}_i(k)},\] where \(S\) is the number of samples obtained during the stationary period, and \(\hat{\rho}_i(k)\), is an estimate of the autocorrelation at lag \(k\) for the \(i\)th component of the samples. This expression can be derived from writing down the variance of the average of a correlated sequence (Chapter 11 of ). The key point to note is that if the autocorrelation decays slowly *N Eff* will be relatively small. ## Derivative computation {#sec:deriv} A central finite difference approximation to the first and second derivatives of the function \(F(\theta): \mathbb{R}^N \rightarrow \mathbb{R}^M\) can be computed as, \[\label{eq:d1} \frac{\partial F}{\partial \theta_i} \approx \frac{F(\theta+h e_i)-F(\theta-h e_i)}{2 h}, \qquad \frac{\partial^2 F}{\partial \theta_i \partial \theta_j} \approx \frac{\dfrac{\partial F}{\partial \theta_i}\big(\theta + h e_j\big)- \dfrac{\partial F}{\partial \theta_i}\big(\theta-h e_i\big)}{2 h}, \nonumber\] where \(e_i\) is the \(i\)th Cartesian basis vector, and \(h\) is a user-defined step-size. For first-order derivatives the default value we use is \(\sqrt{\epsilon}|\theta_i|\), where \(\epsilon\) is machine epsilon for double types, i.e., if \(\theta_i\)is \(\mathcal{O}(1)\), \(h\approx10^{-8}\). For second derivatives the default value is \(\epsilon^{1/3}|\theta_i|\), so that \(h\approx 5\cdot 10^{-6}\). More details on the optimal step size in finite difference approximations can be found in. First derivatives computed using finite differences require \(\mathcal{O}(N)\) function evaluations, where \(N\) is the number of input variables, and the optimal relative accuracy is around \(10^{-6}-10^{-8}\) for double precision variables. Second derivatives require \(\mathcal{O}(N^2)\) function evaluations, and the optimal accuracy is around \(10^{-2}-10^{-4}\). Derivatives that are accurate to machine precision (\(10^{-14}-10^{-16}\) for double precision variables) can be computed using AD tools. AD tools generally use one of two modes: tangent (forward) or adjoint (reverse). For a function with \(N\) inputs and \(M\) outputs, tangent mode requires \(\mathcal{O}(N)\) function evaluations and adjoint mode requires \(\mathcal{O}(M)\) function evaluations. In statistical applications our output is often a scalar probability density, so adjoint AD will scale better with \(N\) than either tangent mode or finite differences in terms of total computation time. Adjoint AD is implemented as follows using the Stan Math Library,. // Define and init matrix with Stan's adjoint type Matrix<stan::math::var,Dynamic,1> theta = input_values; // Compute primal and gradient stan::math::var lp = computation(theta); lp.grad(); // Extract gradient Matrix<double,Dynamic,1> grad_vec(theta.size()); for(int j=0; j<theta.size(); j++) grad_vec(j) = theta(j).adj(); In the code above the function is evaluated using the `stan::math:var` scalar type rather than `double`. During function evaluation, derivative information is recorded. When the `grad()` function is called this derivative information is interpreted and derivative information is then accessed by calling `adj()` on the input variables. Similarly to the Stan Math Library, derivatives with machine-precision accuracy can be computed using the NAG tool developed in collaborations with RWTH Aachen University's STCE group,. // Define and init matrix with dco's adjoint type typedef dco::ga1s<double> DCO_MODE; typedef DCO_MODE::type Scalar; Matrix<Scalar,Dynamic,1> theta = input_values; // Enable dynamic activity analysis for(int j=0; j<theta.size(); j++) DCO_MODE::global_tape->register_variable(theta(j)); // Compute primal and gradient Scalar lp = computation(theta); dco::derivative(lp) = 1.0; DCO_MODE::global_tape->interpret_adjoint(); // Extract gradient Matrix<double,Dynamic,1> grad_vec(theta.size()); for(int j=0; j<theta.size(); j++) grad_vec(j) = dco::derivative(theta(j)); provides its adjoint type using the `dco::ga1s<T>::type` typedef, where `T` is the corresponding primal type (e.g. `double`). Higher order adjoints can be achieved by recursively nesting the adjoint type. Using this type, the program is first executed in the augmented forward run, where derivative information is stored in the `global_tape` data structure. The `register_variable` function initialises recording of the tape and facilitates dynamic varied analysis . Derivative information recorded during the augmented primal run is then interpreted using the `interpret_adjoint()` function and `dco::derivative` is used to access the propagated adjoints. # Results for noise driven harmonic oscillator We now present the results of MCMC sampling using smMALA to estimate parameters of the noise driven harmonic oscillator. Then we demonstrate that, for this particular model, MCMC sampling can be accelerated by using NUTS. We also compare run times and sampling efficiency when AD is used to evaluate derivatives. Here we estimate parameters using synthetic data (i.e. data generated from the model). This is a useful check that the MCMC sampler is working correctly: we should be able to recover the parameters that were used to simulate the data. We generate a pair of datasets representing different conditions (which we label \(c_1\) and \(c_2\)). We assume that the \(\omega_0\) and \(\sigma_{in}\) parameters vary across conditions, but that \(\zeta\) is fixed across conditions, and that \(\sigma_{obs}=0.05\) (i.e. it is known and does not need to be sampled). In Table [\[fig:ho_mcmc_spec\]](#fig:ho_mcmc_spec){reference-type="ref" reference="fig:ho_mcmc_spec"} we show that the \(95\%\) credible intervals for each parameter include the actual parameter values for all 5 parameters. These results came from one MCMC run of \(10,000\) iterations using the Whittle likelihood and a uniform prior. The step size parameter, \(h\), was set to \(1.0\). There were no burn-in iterations as the sampler was initialized at the true parameter values. Figure [\[fig:ho_mcmc_spec\]](#fig:ho_mcmc_spec){reference-type="ref" reference="fig:ho_mcmc_spec"} shows \(95\%\) confidence intervals for the spectral density obtained using the Welch method alongside \(95\%\) credible intervals for the spectral density estimated from \(10,000\) MCMC iterations. This is another useful check: the spectral density predictions generated by sampled parameter sets are consistent with non-parametric estimates of the spectral density. Table [1](#tab:bench){reference-type="ref" reference="tab:bench"} uses the same model and the same datasets as above to compare smMALA with NUTS, and finite differences with AD. The AD implementation used in smMALA was dco's tangent over adjoint mode (i.e. `dco::gt1s` combined with `dco::ga1s`). In NUTS we used the dco's tangent mode for computing the derivatives of the spectral density and Stan's adjoint mode (`stan::math::var`) for the rest of the computation. Given the most recent developments in the Stan Math Library (see release notes for v3.2.0) it would likely be possible to use Stan's adjoint mode for the whole computation. However this was not the case when we started writing the code. In general users may find that they need the more advanced functionality of for part of their computation in order to obtain good performance. The MCMC samplers were each run for 1,000 iterations. The results were analyzed using Stan's `stansummary` command-line tool. To account for correlation between MCMC samples we use the *N Eff* diagnostic defined in Section [2.2](#sec:mcmc){reference-type="ref" reference="sec:mcmc"} to measure sampling efficiency, min *N Eff* is the minimum over the 5 model parameters. Table [1](#tab:bench){reference-type="ref" reference="tab:bench"} shows that, for the noise driven harmonic oscillator, we can accelerate MCMC sampling by a factor of around 3-4 through the combined effect of more efficient MCMC sampling (NUTS rather than smMALA) and more accurate derivative evaluations (AD rather than finite differences). In some cases the *N Eff / s* is higher for finite differences than for AD, because of the small number of input variables. However, even for this simple model the NUTS min *N Eff* is higher with AD than with central finite differences suggesting that the extra accuracy in the derivatives results in more efficient sampling per MCMC iteration. In the context of Bayesian uncertainty quantification what we are interested in is whether the MCMC samples are an accurate representation of the true posterior distribution. A necessary condition for posterior accuracy is that the true parameters are (on average) contained in the credible intervals derived from the MCMC samples. This is the case for all the different variants of MCMC that we tested. The main differences we found between the different variants was the sampling efficiency. As discussed in Section [2.2](#sec:mcmc){reference-type="ref" reference="sec:mcmc"}, a sampling efficiency that is \(3-4\) time greater means a reduction in the value of \(C\) in the Monte Carlo error (\(C / \sqrt{N}\)) by that factor. Another way of interpreting this is that we could reduce the number of MCMC iterations by a factor of \(3-4\) and expect to obtain the same level of accuracy in the estimated posterior distribution. [\[tab:bench\]]{#tab:bench label="tab:bench"} # Discussion The Whittle likelihood function is written to be polymorphic over classes derived from the a base class called `Stable_sde`. The function signature includes a reference to the base class. template<typename SCALAR_T> SCALAR_T log_whittle_like(Stable_sde<SCALAR_T> & m,...); Classes that are derived from the `Stable_sde` base class must define the following pure virtual function. virtual Matrix<SCALAR_T, Dynamic, Dynamic> sde_jacobian(...) = 0; The spectral density evaluation (Equation [\[eq:spec_eq\]](#eq:spec_eq){reference-type="eqref" reference="eq:spec_eq"}) is implemented in the base class, reducing the effort required to do spectral data analysis for other stable SDEs. The smMALA sampler is written to be polymorphic over classes derived from a base class called `Computation`. Classes that are derived from the `Computation` base class must define the following pure virtual function. virtual SCALAR_T eval(Matrix<SCALAR_T,Dynamic,1>& theta...) = 0; This function should evaluate the posterior density in the user's model. The gradient and Hessian of the posterior density are implemented in the `Computation` class. This reduces the effort required to use NUTS or smMALA for other computational models. Classes derived from `Stable_sde` or from `Computation` can be instantiated with several different scalar types including `double`, `stan::math::var`, and a number of types. This enables automatic evaluation of first and second derivatives. The gradient and Hessian functions need a template specialization to be defined in the base class for each different scalar type that is instantiated. We conclude with some comments regarding the choice of MCMC sampler and the method for evaluating derivatives. Our software only implements derivative-based MCMC as this tends to be more computationally efficient than other MCMC methods. Derivative-based MCMC samplers can be further subdivided into methods that use higher-order derivatives, such as smMALA (sometimes referred to as Riemannian) and methods that only require first-order derivatives (such as NUTS). Riemannian methods tend to be more robust to complexity in the posterior distribution, but first-order methods tend to be more computationally efficient for problems where the posterior geometry is relatively simple. We recommend using smMALA in the first instance, then NUTS as a method that may provide acceleration in MCMC sampling, in terms of effective samples per second, *N Eff /s*. Regarding the derivative method, finite difference methods often result in adequate performance for problems with moderate input dimension (e.g. 10-20), at least with smMALA. But for higher-dimensional problems (e.g. Partial Differential Equations or Monte Carlo simulation) we recommend accelerating derivative computation using adjoint AD. The software presented enables users to implement and benchmark all these alternatives so that the most appropriate methods for a given problem can be chosen.
{'timestamp': '2020-08-04T02:33:06', 'yymm': '2005', 'arxiv_id': '2005.14281', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14281'}
null
null
# Introduction In 1997, Van Hamme observed that \(13\) supercongruences on truncated forms of Ramanujan's and Ramanujan-like formulas for \(1/\pi\). In particular, the following supercongruence of Van Hamme , \[\sum_{k=0}^{(p-1)/2}\frac{4k+1}{(-64)^k}{2k\choose k}^3\equiv p(-1)^{\frac{p-1}{2}}\pmod {p^3}\] was first proved by Mortenson using a \(_6F_5\) transformation and a technical evaluation of a quotient of Gamma functions, where \(p\) is an odd prime. Recently, \(q\)-analogues of congruences and supercongruences have caught the interests of many authors (see, for example, [@Guillera; @Guo-m3; @Guo-a2; @Guo-jmaa; @Guo-Zudlin; @Guo-result; @GS3; @GW; @Liu-Petrov; @Liu-Huang; @NP; @Tauraso; @WY; @Zudilin]). In, Guo conjectured: for any prime \(p>3\) and positive integer \(r\), \[\begin{aligned} \sum_{k=0}^{(p^r-1)/2}\frac{(4k+1)^3}{256^k}{2k\choose k}^4 &\equiv-p^r \pmod {p^{r+3}}, \label{eq1.11}\\ \sum_{k=0}^{p^r-1}\frac{(4k+1)^3}{256^k}{2k\choose k}^4 &\equiv-p^r \pmod {p^{r+3}}. \label{eq1.12} \end{aligned}\] Later, Guo proved [\[eq1.11\]](#eq1.11){reference-type="eqref" reference="eq1.11"} and [\[eq1.12\]](#eq1.12){reference-type="eqref" reference="eq1.12"} by establishing the following complete \(q\)-analogues of them: for odd integer \(n>1\), modulo \([n]_{q^2}\Phi_n(q^2)^3\), \[\begin{aligned} \sum_{k=0}^{(n-1)/2}[4k+1]_{q^2}[4k+1]^2\frac{(q^2;q^4)_k^4}{(q^4;q^4)_k^4}q^{-4k} &\equiv-[n]_{q^2}\frac{2q^{2-n}}{1+q^2}-[n]_{q^2}^3\frac{(n^2-1)(1-q^2)^2q^{2-n}}{12(1+q^2)}, \\ \sum_{k=0}^{n-1}[4k+1]_{q^2}[4k+1]^2\frac{(q^2;q^4)_k^4}{(q^4;q^4)_k^4}q^{-4k} &\equiv-[n]_{q^2}\frac{2q^{2-n}}{1+q^2}-[n]_{q^2}^3\frac{(n^2-1)(1-q^2)^2q^{2-n}}{12(1+q^2)}. \end{aligned}\] Here and throughout the paper, \((a;q)=(1-a)(1-aq)\cdots(1-aq^{n-1})\) denotes the \(q\)-*shifted factorial*, \([n]=[n]_q=1+q+\cdots+q^{n-1}\) stands for the *\(q\)-integer*, and \(\Phi_n(q)\) is the \(n\)-th *cyclotomic polynomial* in \(q\), i.e., \[\Phi_n(q)=\prod_{\substack{1\leq k\leq n\\\gcd(n,k)=1}}^n(q-\zeta^k)\] with \(\zeta\) being an \(n\)-th primitive root of unity. Guo also proved that, for any odd integer \(n>1\), \[\begin{aligned} \sum_{k=0}^{(n+1)/2}[4k-1]_{q^2}[4k-1]^2\frac{(q^{-2};q^4)_k^4}{(q^4;q^4)_k^4}q^{4k} &\equiv 0\pmod{[n]_{q^2}\Phi_n(q^2)^3}, \label{eq1.17} \\ \sum_{k=0}^{n-1}[4k-1]_{q^2}[4k-1]^2\frac{(q^{-2};q^4)_k^4}{(q^4;q^4)_k^4}q^{4k} &\equiv 0\pmod{[n]_{q^2}\Phi_n(q^2)^3}, \label{eq1.18} \end{aligned}\] thus confirming the \(m=3\) case. The aim of this paper is to prove the following refinements of [\[eq1.17\]](#eq1.17){reference-type="eqref" reference="eq1.17"} and [\[eq1.18\]](#eq1.18){reference-type="eqref" reference="eq1.18"}, which were originally conjectured by Guo and Schlosser (The modulus \([n]_{q^2}^4\) case was first formulated by Guo ). Let \(n=p^r\) be an odd prime power, and take \(q\to 1\) in [\[eq1.3\]](#eq1.3){reference-type="eqref" reference="eq1.3"} and [\[eq1.4\]](#eq1.4){reference-type="eqref" reference="eq1.4"}. Noticing that \[\lim_{q\to 1}\frac{(q^{-2},q^4)_k}{(q^4;q^4)_k}=\frac{-1}{4^k(2k-1)}{2k\choose k},\] we immediately obtain the following conclusion, which was observed by Guo. The remainder of this paper is organized as follows. In the next section, we show the proof of Theorem [\[thm3\]](#thm3){reference-type="ref" reference="thm3"}. Section 3 contains a parameter-generalization of Theorem [\[thm2\]](#thm2){reference-type="ref" reference="thm2"} and a proof of modulo \([n]_{q^2}^2(1-aq^{2n})(a-q^{2n})\). # Proof of Theorem [\[thm3\]](#thm3){reference-type="ref" reference="thm3"} We first prove the following identity, which plays an important role in our proof of Theorem [\[thm3\]](#thm3){reference-type="ref" reference="thm3"}. Note that [\[eq:thm2.1\]](#eq:thm2.1){reference-type="eqref" reference="eq:thm2.1"} could be regarded as a \(q\)-analogue of the following identity: \[\sum_{k=0}^{n-1}\frac{(4k-1)^3}{256^k(2k-1)^4}{2k\choose k}^4=\frac{16n^4(8n^2-12n+3){2n\choose n}^4}{256^n(2n-1)^4}.\] We are now able to prove Theorem [\[thm3\]](#thm3){reference-type="ref" reference="thm3"}. # A further generalization of Theorem [\[thm2\]](#thm2){reference-type="ref" reference="thm2"} By induction on \(n\), we can also prove the following parameter generalization of [\[eq:thm2.1\]](#eq:thm2.1){reference-type="eqref" reference="eq:thm2.1"}. We end this paper with the following generalization of.
{'timestamp': '2020-06-01T02:09:19', 'yymm': '2005', 'arxiv_id': '2005.14466', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14466'}
null
null
null
null
# Introduction A \(^3\)He spin filter is a neutron polarization device in which polarized \(^3\)He gas is enclosed in a special glass cell that does not contain boron. \(^3\)He spin filters are widely used to polarize neutrons and analyze neutron spins in neutron scattering experiments because of its capabilities to polarize neutrons in broad energy range and cover wide solid angle . Since \(^3\)He nuclei have a strongly spin-dependent neutron absorption cross section, neutrons passing through polarized \(^3\)He gas are polarized. \(^3\)He nuclei are polarized using laser techniques known as Spin Exchange Optical Pumping (SEOP)  or Metastability Optical Pumping (MEOP) . In SEOP, \(^3\)He gas, N\(_2\) gas, and pure rubidium or rubidium and potassium are encapsulated within a glass cell. The Rb or Rb-K cells are heated to around 170\(^\circ\)C or 220\(^\circ\)C, respectively, to evaporate the alkali metals, and circularly polarized laser light irradiates the cell. Unpaired electrons of alkali atoms are polarized by optical pumping, and the spins of the electrons are exchanged with those of \(^3\)He nuclei by hyperfine interaction. A diode laser array with output power on the order of 100 W and a wavelength of 794.7 nm, which corresponds to the D\(_1\) absorption line of Rb, is typically employed. The \(^3\)He polarization can be improved by using Rb-K compared to the pure Rb case because of the high optical pumping efficiency of Rb-K . When the laser irradiation is stopped, the \(^3\)He polarization exponentially decays due to non-uniformity of the surrounding magnetic field, collisions of \(^3\)He atom with each other, and collisions of \(^3\)He atoms with impurities in the glass cell and a glass wall. *Ex-situ* and **in-situ** methods are used for \(^3\)He spin filters with SEOP. In the *ex-situ* method, a \(^3\)He cell is polarized in a pumping station away from a neutron beamline, transferred in a magnetic cavity to keep the \(^3\)He polarization, and installed to a neutron beamline. Since the \(^3\)He polarization decays during a neutron experiment, the \(^3\)He cell needs to be periodically re-polarized and re-installed for long-running experiments. However, the advantage of using *ex-situ* method is that it can be used for a neutron beamline with limited space, and the installation of the instrument is straightforward. This is beneficial at spallation neutron sources, which generally have small experimental spaces. As there are many experiments with short measuring time at intense neutron beam facilities, those may be done without re-polarizing the \(^3\)He cell. In order to keep high \(^3\)He polarization during the experiment, a long relaxation time of \(^3\)He polarization is required, which makes details of the fabrication process of the \(^3\)He cells important. On the other hand, in the *in-situ* method, the \(^3\)He cell is installed along with a laser system onto a neutron beamline. This method is suitable for longer experiments because a stable \(^3\)He polarization can be maintained for weeks. However, a larger space compared to the space required for the *ex-situ* method is needed, and the safety regulations involving the use of high powered lasers on a neutron beamline must be considered. For details of the technique for optically polarized \(^3\)He and its application, please see a reviewed paper Ref .\ At MLF of J-PARC, world class intense pulsed neutron beams are provided to 23 neutron beamlines, and many neutron scattering experiments are conducted . In Japan, the fundamental development of \(^3\)He polarization technique based on SEOP began in the 1990s , and further development is still ongoing by Ino et al. at High Energy Accelerator Research Organization . An *in-situ* SEOP system dedicated for a polarized neutron spectrometer POLANO  at beamline No. 23 has been developed, and now under commissioning . In order to promote user experiments using \(^3\)He spin filters on the other beamlines at MLF, we are carrying out the development of a \(^3\)He spin filters with both *in-situ* and *ex-situ* methods for their versatile uses on site at J-PARC. Experiments demonstrating their use have been performed on several beamlines. User experiments and fabrication of \(^3\)He cells have recently begun. In this paper, we report development and utilization of \(^3\)He spin filters at MLF of J-PARC. # gas-filling station As mentioned in the previous section, a clean gas-filling station and fabrication process without impurities are important for a \(^3\)He cell with long relaxation time. The first gas-filling station was constructed in 2018 at J-PARC. The schematic diagram of the gas-filling station is shown in Fig. [\[fig:gasstation\]](#fig:gasstation){reference-type="ref" reference="fig:gasstation"}. All the gas lines are wrapped with heaters for vacuum bake-out. An ultimate pressure of the gas-filling station was \(5 \times 10^{-8}\) Pa after baking at 150\(^\circ\)C for a few days.\ Boron-free aluminosilicate GE180 glass is widely used for the glass cell of a \(^3\)He spin filter due to a small wall relaxation effect and low permeability of \(^3\)He . Our fabrication process of \(^3\)He cells is similar to those of NIST, JCNS, and ORNL . A cylindrical-shaped glass cell made of GE180 is attached to a glassware made of Pyrex glass, which is referred to as \"string\", (Fig. [\[fig:string\]](#fig:string){reference-type="ref" reference="fig:string"}). The glass cell and the string are rinsed with neutral detergent, pure water, acetone, and alcohol before connecting to the gas-filling station. Rubidium and potassium ampoules are also rinsed with acetone and alcohol. After connecting the string to the gas-filling station, the ampoules are put in the string without breaking the ampoules, and the string is sealed off with a gas torch. The ampoules are broken in a nitrogen atmosphere by dropping hammers made of an iron rod covered with glass. The string and the glass cell are baked out for a week at 200\(^\circ\)C and 400\(^\circ\)C, respectively. In the next step, rubidium and potassium are distilled to retorts at 200\(^\circ\)C and 220\(^\circ\)C, respectively, by using the heaters. After that, the glass tube parts containing ampoules and hammers are pulled off with a gas torch. The glass cell and the string are baked out again for one week, and then the alkali metals in the retorts are distilled to the glass cell. Finally, \(^3\)He and N\(_2\) gases purified using GC50 getters (SAES Getters) are filled to the glass cell, and the glass cell is sealed off by placing a gas torch at the Pyrex part. When encapsulating the gases above 1 atm, the glass cell is submerged in liquid nitrogen to keep the pressure inside the glass cell below 1 atm while sealing. So far, nine \(^3\)He cells have been fabricated with \(^3\)He pressures of 3.1 atm using the gas-filling station at J-PARC, and four of them have found to have spin relaxation times over 150 hours. A list of these \(^3\)He cells and a photograph of Sekichiku cell are presented in Table [1](#celllist){reference-type="ref" reference="celllist"} and Fig. [\[fig:cell\]](#fig:cell){reference-type="ref" reference="fig:cell"}, respectively. ::: [\[beamlinelist\]]{#beamlinelist label="beamlinelist"} ## BL10 NOBORU A trial experiment for magnetic imaging was carried out  with *in-situ* and *ex-situ* systems using \(^3\)He cell with pure Rb and the 30 W laser as shown in Fig. [\[fig:laser\]](#fig:laser){reference-type="ref" reference="fig:laser"}. The *in-situ* system with a \(^3\)He cell of 17 atm\(\cdot\)cm and the *ex-situ* system with \(^3\)He cell of 11 atm\(\cdot\)cm were used as a neutron spin polarizer and analyzer, respectively. The dimensions of the \(^3\)He cells were 35 mm in diameter and 55 mm in length for both. A coil with a 0.35 mm-thick ring-shaped magnetic steel core was placed between the polarizer and the analyzer as a sample. A two-dimensional RPMT neutron detector  was set after the analyzer. The magnetic field applied to the sample was controlled with the current sent to the coil. Two-dimensional images of the neutron polarization were obtained, and obvious differences in the spin rotations of neutrons were observed as the wavelength dependence of the neutron polarization in two current conditions, \(I\) = 1.42 A and \(I\) = 0 A. Our result concluded that the magnetization patterns in these two conditions are different.\ \ Furthermore, a study for magnetic atomic resolution holography with polarized neutrons using a \(^3\)He spin filter is currently underway. Two user experiments for this study were conducted at NOBORU in 2019--2020. ## BL04 ANNRI BL04 ANNRI  is a neutron beamline used for studies of nuclear science such as nuclear data for nuclear technology, astrophysics, and quantitative analyses. A germanium detector assembly using 22 high-quality germanium crystals is installed on this beamline to measure the (\(n\),\(\gamma\)) reaction. Measurements of the (\(n\),\(\gamma\)) reaction for the study of fundamental symmetry violation in nuclei have been conducted as a user experiment using a \(^3\)He spin filter . A \(^3\)He spin filter with the *ex-situ* system was used to polarize epithermal neutrons to measure the (\(n\),\(\gamma\)) reaction with polarized neutrons at the 0.74 eV neutron resonance of \(^{139}\)La. A lanthanum sample was placed at the center of the germanium detector assembly, and the emitted \(\gamma\)-rays from the sample were detected by the germanium detectors. The \(^3\)He cell, solenoid, and compensation coils with a magnetic shield made of permalloy were installed between the detector and a neutron collimator (Fig. [\[fig:BL04\]](#fig:BL04){reference-type="ref" reference="fig:BL04"}). The magnetic field used to keep the \(^3\)He polarization was perpendicular to the neutron beam in order to obtain a vertically polarized neutron beam. The magnetic shield had two openings in the path of the neutron beam to avoid a decay of the neutron polarization. Neutron polarization was held by the magnetic filed produced with the guide magnets to a lanthanum target. A \(^3\)He cell using pure Rb with a pressure thickness of 19.3 atm\(\cdot\)cm and dimensions of 50 mm diameter and 70 mm length was used. The \(^3\)He cell was polarized with the 30 W laser system at MLF, and the \(^3\)He polarization at the start of the measurement was typically 60%. The relaxation time of the \(^3\)He polarization was 130 h. In 2019, as a result of three separate measurements using the \(^3\)He spin filter, a significant spin-dependent angular distribution of \(\gamma\)-rays from the 0.74 eV neutron resonance of \(^{139}\)La was observed .\ Furthermore, a (\(n\),\(\gamma\)) reaction measurement using polarized epithermal neutrons to obtain nuclear data for reactor science is being planned, and the development of a \(^3\)He cell for epithermal neutrons is an ongoing process. ## BL17 SHARAKU A trial experiment using the *in-situ* system on a beamline for neutron reflectometry: BL17 SHARAKU  was performed . The SHARAKU beamline has a neutron polarizer and an analyzer consisting of supermirrors. Some of the supermirrors are stacked vertically in order to cover a wide area, which analyze the scattered neutron spins with wavelengths longer than 0.2 nm. However, some neutrons, which transmitted through the supermirrors are scattered by the supermirrors, and spacial distribution of neutrons reflected from a sample is disturbed. A \(^3\)He spin filter was used as the analyzer instead of the supermirrors to reduce uncertainty produced with the supermirrors (Fig. [\[fig:BL17\]](#fig:BL17){reference-type="ref" reference="fig:BL17"}). The \(^3\)He cell using pure Rb with a pressure thickness of 11.1 atm\(\cdot\)cm, diameter of 35 mm, and length of 55 mm was used. A Fe-Cr multi-layered thin film was used as a sample, and off-specular measurements were performed using the *in-situ* system. The \(^3\)He polarization was 60% during the experiment. The *in-situ* system successfully demonstrated and worked stably over 4 days of the experimental time. The sample had been measured previously at ISIS, and we obtained the identical results on SHARAKU. This satisfactory implies that our *in-situ* system worked as designed. ## BL06 VIN ROSE BL06 VIN ROSE  is equipped with a modulated intensity by zero effort (MIEZE) spectrometer to analyze the slow dynamics of condensed matter by measuring the intermediate scattering function. Experiments using a combination of a MIEZE spectrometer and the time of flight (TOF-MIEZE ) method have been carried out, and additionally, polarization analysis of scattered neutrons by a sample is planned in order to study spin dynamics by installing a spin analyzer. We installed a \(^3\)He cell after the sample position as an analyzer to confirm that the \(^3\)He spin filter can be used for the MIEZE spectrometer . The MIEZE signal was measured with and without the \(^3\)He cell, and no difference was observed in the signal contrast. This result implies that diffusion of \(^3\)He gas does not affect the MIEZE signal and a \(^3\)He spin filter can be used as a second analyzer in the MIEZE spectrometer. Furthermore, in 2020, an experiment to measure the spin dynamics of ferrofluid was conducted by using a \(^3\)He spin filter as shown in Fig. [\[fig:BL06\]](#fig:BL06){reference-type="ref" reference="fig:BL06"}. The \(^3\)He polarization of 72% and relaxation time of 120 h was achieved on this beamline in the experiment, and the analysis is currently underway. ## BL15 TAIKAN BL15 TAIKAN  is a small and wide angle neutron scattering instrument. We conducted a trial experiment to measure coherent and incoherent scattering cross sections from hydrogen contained material by analyzing scattered neutrons using the *in-situ* system . Supermirrors were installed upstream of the beamline as a neutron polarizer, and the \(^3\)He spin filter was used as a spin analyzer. Silver behenate was used as the sample, and the \(^3\)He cell with pure Rb was placed 120 mm downstream of the sample. The diameter of \(^3\)He cell was 35 mm, the length was 55 mm, and the gas pressure was 3 atm. A stable \(^3\)He polarization of 68% was kept during the experiment. Scattered neutrons reaching a part of the small-angle detector bank were spin analyzed. The coherent and incoherent scattering components were successfully separated by analyzing the scattered neutrons. Although the trial experiment was successful, the solid angle of the \(^3\)He cell was inadequate and the pressure-thickness was not suitable for the neutron wavelength used in TAIKAN. In order to cover a larger solid angle, an *ex-situ* SEOP system using a larger \(^3\)He cell, which is to be placed 10 mm downstream of the sample, is being prepared (Fig. [\[fig:BL15\]](#fig:BL15){reference-type="ref" reference="fig:BL15"}). A new \(^3\)He cell with rubidium and potassium has been fabricated with a diameter of 60 mm, a thickness of 40 mm, and a gas pressure of 1.5 atm for cold neutrons. More trial and user experiments will be carried out in 2020. ## BL21 NOVA Experiments using \(^3\)He spin filters at BL21 NOVA , which is a total diffractometer, are also planned. NOVA is equipped with large solid angle neutron detectors. The detectors and a sample are installed in a large vacuum chamber. We are planning to install two *ex-situ* systems upstream of the beamline and around the sample to perform polarized neutron scattering experiments. The schematic view of the *ex-situ* systems at NOVA is shown in Fig. [\[fig:BL21Config\]](#fig:BL21Config){reference-type="ref" reference="fig:BL21Config"}. The *ex-situ* system for the polarizer is installed at the upstream of the beamline, and the neutron polarization is held by the magnetic field produced with a guide coil to the sample. The scattered neutrons by the sample are analyzed with two \(^3\)He cells. This *ex-situ* system for the analyzer which can be installed to the vacuum chamber is developed as shown in Fig. [\[fig:BL21\]](#fig:BL21){reference-type="ref" reference="fig:BL21"}. A sample is suspended from the top of the vacuum flange. The neutrons scattered by the sample are analyzed with two \(^3\)He cells placed at a distance of 20 mm from the sample. The stage for the \(^3\)He cells can be rotated so that the scattered neutrons of any angle can be analyzed. The \(^3\)He polarization is kept using the Helmholtz coil that produces 40 W of heat. The heat from the coil flows to the flange through the 30 mm thick aluminum plates connected to the coil, and the flange is air-cooled. A thermal simulation of the *ex-situ* system in a vacuum was performed. As a result of the simulation, the maximum temperature was determined to be 76\(^\circ\)C at the bottom of the coil, which does not cause a problem. A test experiment using the *ex-situ* system will be carried out in 2020. # Conclusion Development of \(^3\)He spin filters for user experiments are being carried out at MLF at J-PARC. The *in-situ* system using a 30 W laser has been developed, and several trial experiments using \(^3\)He cells with pure Rb have been conducted. Recently, a gas-filling station has been constructed at J-PARC and several high quality \(^3\)He cells using rubidium and potassium were fabricated. Additionally, the pumping system using a 110 W fiber laser was developed. High \(^3\)He polarization of 85% was achieved on a neutron beamline using the \(^3\)He cell with rubidium and potassium and the pumping system using the fiber laser. The first user experiment utilizing a \(^3\)He spin filter took place in 2017, and five user experiments were conducted in 2019--2020. These experiments are beginning to yield scientific results. Preparations are underway for further user experiments using \(^3\)He spin filters.
{'timestamp': '2020-06-01T02:07:03', 'yymm': '2005', 'arxiv_id': '2005.14399', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14399'}
null
null
null
null
null
null
# Introduction Simultaneous machine translation is the task of generating partial translations before observing the entire source sentence. The task fits scenarios such as live captioning and speech-to-speech translation, where the user expects a translation before the speaker finishes the sentence. Simultaneous MT has to balance between latency and translation quality. If more input is consumed before translation, quality is likely to improve due to increased context, but latency also increases. On the other hand, consuming limited input decreases latency, but degrades quality. There have been several approaches to solve simultaneous machine translation. In, a fixed policy is introduced to delay translation by a fixed number of words. Alternatively, use reinforcement learning to learn a dynamic policy to determine whether to read or output words. adapt the decoding algorithm without relying on additional components. However, these methods do not modify the training of the underlying NMT model. Instead, it is trained on full sentences. introduce a holistic framework that relaxes the hard notion of read/write decisions at training time, allowing it to be trained jointly with the rest of the NMT model. In this paper, we integrate a source chunk boundary detection component into a bidirectional recurrent NMT model. This component corresponds to segmentation or read/write decisions in the literature. It is however trained jointly with the rest of the NMT model. We propose an algorithm to chunk the training data based on automatically learned word alignment. The chunk boundaries are used as a training signal along with the parallel corpus. The main contributions of this work are as follows: - We introduce a source chunk boundary detection component and train it jointly with the NMT model. Unlike in, our component is trained using hard decisions, which is consistent with inference. - We propose a method based on word alignment to generate the source and target chunk boundaries, which are needed for training. - We study the use of bidirectional vs unidirectional encoder layers for simultaneous machine translation. Previous work focuses mostly on the use of unidirectional encoders. - We provide results using text and speech input. This is in contrast to previous work that only simulates simultaneous NMT on text input. # Related Work formulate segmentation as an optimization problem solved using dynamic programming to optimize translation quality. The approach is applied to phrase-based machine translation. Our chunking approach is conceptually simpler, and we explore its use with neural machine translation. devise a greedy decoding algorithm for simultaneous neural machine translation. They use a model that is trained on full sentences. In contrast, we train our models on chunked sentences to be consistent with the decoding condition. , , and follow a reinforcement learning approach to make decisions as to when to read source words or to write target words. propose the simpler approach to use the position of the reference target word in the beam of an existing MT system to generate training examples of read/write decisions. We extract such decisions from statistical word alignment instead. In, a wait-\(k\) policy is proposed to delay the first target word until \(k\) source words are read. The model alternates between generating \(s\) target words and reading \(s\) source words, until the source words are exhausted. Afterwards, the rest of the target words are generated. In addition, convert the training data into chunks of predetermined fixed size. In contrast, we train models that learn to produce dynamic context-dependent chunk lengths. The idea of exploiting word alignments to decide for necessary translation context can be found in several recent papers. train an agent to imitate read/write decisions derived from word alignments. In our architecture such a separate agent model is replaced by a simple additional output of the encoder. use word alignments to tune a pretrained language representation model to perform word sequence chunking. In contrast, our approach integrates alignment-based chunking into the translation model itself, avoiding the overhead of having a separate component and the need for a pretrained model. Moreover, in this work we improve on pure alignment-based chunks using language models (Section [6.3](#subsec:improved_chunking){reference-type="ref" reference="subsec:improved_chunking"}) to avoid leaving relevant future source words out of the chunk. insert \(\epsilon\)-tokens into the target using word alignments to develop an NMT model without an attention mechanism. Those tokens fulfill a similar purpose to *wait* decisions in simultaneous MT policies. propose an attention-based model that integrates an additional monotonic attention component. While the motivation is to use hard attention to select the encoder state at the end of the source chunk, they avoid using discrete attention to keep the model differentiable, and use soft probabilities instead. The hard mode is only used during decoding. We do not have to work around discrete decisions in this work, since the chunk boundaries are computed offline before training, resulting in a simpler model architecture. # Simultaneous Machine Translation The problem of offline machine translation is focused on finding the target sequence \(e_1^I=e_1...e_I\) of length \(I\) given the source sequence \(f_1^J\) of length \(J\). In contrast, simultaneous MT does not necessarily require the full source input to generate the target output. In this work, we formulate the problem by assuming latent monotonic chunking underlying the source and target sequences. Formally, let \(s_1^K=s_1...s_k...s_K\) denote the chunking sequence of \(K\) chunks, such that \(s_k=(i_k,j_k)\), where \(i_k\) denotes the target position of last target word in the \(k\)-th chunk, and \(j_k\) denotes the source position of the last source word in the chunk. Since the source and target chunks are monotonic, the beginnings of the source and target chunks do not have to be defined explicitly. The chunk positions are subject to the following constraints: \[\begin{aligned} i_0 = j_0 = 0, & \ \ \ i_K = I, \ \ \ j_K = J, \nonumber \\ i_{k-1} < i_{k}, & \ \ \ j_{k-1} < j_{k}. \label{eq:constraints} \end{aligned}\] We use \(\tilde{e}_k=e_{i_{k-1}+1}...e_{i_k}\) to denote the \(k\)-th target chunk, and \(\tilde{f}_k=f_{j_{k-1}+1}...f_{j_k}\) to denote its corresponding source chunk. The target sequence \(e_1^I\) can be rewritten as \(\tilde{e}_1^K\), similarly, the source sequence can be rewritten as \(f_1^J=\tilde{f}_1^K\). We introduce the chunk sequence \(s_1^K\) as a latent variable as follows: \[\begin{aligned} &\;p(e_1^I|f_1^J) = \sum_{K,s_1^K} p(e_1^I,s_1^K|f_1^J) \label{eq:latent}\\ &= \sum_{K,s_1^K} p(\tilde{e}_1^K,s_1^K|\tilde{f}_1^K) \label{eq:rewrite}\\ &= \sum_{K,s_1^K} \prod_{k=1}^K p(\tilde{e}_k,s_k|\tilde{e}_1^{k-1}, s_1^{k-1}, \tilde{f}_1^K) \label{eq:chain} \\ &= \sum_{K,s_1^K} \prod_{k=1}^K p(i_k|\tilde{e}_1^{k}, s_1^{k-1}, j_k, \tilde{f}_1^K) \nonumber \\ & \hspace{16.5mm}\cdot p(\tilde{e}_k|\tilde{e}_1^{k-1}, s_1^{k-1}, j_k, \tilde{f}_1^K) \nonumber \\ & \hspace{16.5mm}\cdot p(j_k|\tilde{e}_1^{k-1}, s_1^{k-1}, \tilde{f}_1^K), \label{eq:word_chunk_decomp} \end{aligned}\] where Equation [\[eq:latent\]](#eq:latent){reference-type="ref" reference="eq:latent"} introduces the latent sequence \(s_1^K\) with a marginalization sum over all possible chunk sequences and all possible number of chunks \(K\). In Equation [\[eq:rewrite\]](#eq:rewrite){reference-type="ref" reference="eq:rewrite"} we rewrite the source and target sequences using the chunk notation, and we apply the chain rule of probability in Equation [\[eq:chain\]](#eq:chain){reference-type="ref" reference="eq:chain"}. We use the chain rule again in Equation [\[eq:word_chunk_decomp\]](#eq:word_chunk_decomp){reference-type="ref" reference="eq:word_chunk_decomp"} to decompose the probability further into a *target chunk boundary probability* \(p(i_k|\tilde{e}_1^{k}, s_1^{k-1}, j_k, \tilde{f}_1^K)\), a *target chunk translation probability* \(p(\tilde{e}_k|\tilde{e}_1^{k-1}, s_1^{k-1}, j_k, \tilde{f}_1^K)\), and a *source chunk boundary probability* \(p(j_k|\tilde{e}_1^{k-1}, s_1^{k-1}, \tilde{f}_1^K)\). This creates a generative story, where the source chunk boundary is determined first, followed by the translation of the chunk, and finally by the target chunk boundary. The translation probability can be further decomposed to reach the word level: \[\begin{aligned} &p(\tilde{e}_k,|\tilde{e}_1^{k-1}, s_1^{k-1}, j_k, \tilde{f}_1^K) \nonumber \\ &= \prod_{i=i_{k-1}+1}^{i_k} p(e_i|\underbrace{e_{i_{k-1}+1}^{i-1}, \tilde{e}_1^{k-1}}_{=e_1^{i-1}}, s_1^{k-1}, j_k, \tilde{f}_1^K) \nonumber \\ &\approx \prod_{i=i_{k-1}+1}^{i_k} p(e_i|e_1^{i-1}, f_1^{j_k}, k). \end{aligned}\] In this work, we drop the marginalization sum over chunk sequences and use fixed chunks during training. The chunk sequences are generated as described in Section [6](#sec:chunking){reference-type="ref" reference="sec:chunking"}. # Model ## Source Chunk Boundary Detection {#sec:boundary_detection} We simplify the chunk boundary probability, dropping the dependence on the target sequence and previous target boundary decisions \[\begin{aligned} p(j_k|\tilde{e}_1^{k-1}, s_1^{k-1}, \tilde{f}_1^K) \approx p(j_k|f_1^{j_k}, j_1^{k-1}), \end{aligned}\] where the distribution is conditioned on the source sequence up to the last word of the \(k\)-th chunk. It is also conditioned on the previous source boundary decisions \(j_1...j_{k-1}\). Instead of computing a distribution over the source positions, we introduce a binary random variable \(b_j\) such that for each source position we estimate the probability of a chunk boundary: \[b_{j,k} = \begin{cases} 1 & \text{if\,} j \in \lbrace j_1, j_2... j_k \rbrace \\ 0 & \mathrm{otherwise.} \end{cases}\] For this, we use a forward stacked RNN encoder. The \(l\)-th forward encoder layer is given by \[\hspace{-0.05cm} \label{eq:forward} \overrightarrow{h}_{j,k}^{(l)} = \begin{cases} \scalebox{.8}[1.0]{\(LSTM\)}\big( [\hat{f}_j; \hat{b}_{{j-1},k}], \overrightarrow{h}_{j-1,k}^{(l)}\big) & \hspace*{4mm} l = 1 \vspace{2mm} \\ \scalebox{.8}[1.0]{\(LSTM\)}\big( \overrightarrow{h}_{j,k}^{(l-1)}, \overrightarrow{h}_{j-1,k}^{(l)}\big) & \hspace*{-7mm} 1 < l < L_{enc}, \end{cases}\] where \(\hat{f}_j\) is the word embedding of the word \(f_j\), which is concatenated to the embedding of the boundary decision at the previous source position \(\hat{b}_{j-1,k}\). \(L_{enc}\) is the number of encoder layers. On top of the last layer a softmax estimates \(p(b_{j,k})\): \[\label{eq:source_chunk_detection} \hspace{-0cm}p(b_{j,k}) = \text{softmax}\big(g([\overrightarrow{h}_{j,k}^{(L_{enc})}; \hat{f}_j; \hat{b}_{j-1,k}]) \big),\hspace{-0.2cm}\] where \(g(\cdot)\) denotes a non-linear function. ## Translation Model We use an RNN attention model based on  for \(p(e_i|e_1^{i-1}, f_1^{j_k})\). The model shares the forward encoder with the chunk boundary detection model. In addition, we extend the encoder with a stacked backward RNN encoder. The \(l\)-th backward layer is given by \[\hspace{-0.07cm} \label{eq:backward} \overleftarrow{h}_{j,k}^{(l)} = \begin{cases} \textbf{0} & j>j_k, \forall l \vspace{1.5mm} \\ \scalebox{.8}[1.0]{\(LSTM\)}\big( [\hat{f}_j; b_{j,k}], \overleftarrow{h}_{j+1,k}^{(l)}\big) & l = 1 \vspace{2mm} \\ \scalebox{.8}[1.0]{\(LSTM\)}\big( \overleftarrow{h}_{j,k}^{(l-1)}, \overleftarrow{h}_{j+1,k}^{(l)}\big) & \hspace*{-3mm} 1 < l < L_{enc}, \end{cases}\] where the backward layer is computed within a chunk starting at the last position of the chunk \(j=j_k\). \(\textbf{0}\) indicates a vector of zeros for positions beyond the current chunk. The source representation is given by the concatenation of the last forward and backward layer \[\label{eq:concat} h_{j,k} = [\overrightarrow{h}_{j,k}^{(L_{enc})}; \overleftarrow{h}_{j,k}^{(L_{enc})}].\] We also stack \(L_{dec}\) LSTM layers in the decoder \[u_{i,k}^{(l)} = \begin{cases} \scalebox{.8}[1.0]{\(LSTM\)}\big( u_{i,k}^{(l-1)}, u_{i-1,\hat{k}}^{(l)}\big) & \hspace*{-2mm} 1 < l < L_{dec} \\ \scalebox{.8}[1.0]{\(LSTM\)}\big( [\hat{e}_{i}; d_{i,k}], u_{i-1,\hat{k}}^{(l)}\big) & \hspace*{5mm} l = 1, \end{cases}\] where \(\hat{e}_{i}\) is the target word embedding of the word \(e_{i}\), \(\hat{k}=k\) unless the previous decoder state belongs to the previous chunk, then \(\hat{k}=k-1\). The vector \(d_{i,k}\) is the context vector computed over source positions up to the last source position \(j_k\) in the \(k\)-th chunk \[\begin{aligned} d_{i,k} =& \sum_{j=1}^{j_k} \alpha_{i,j,k} h_{j,k} \\ \alpha_{i,j,k} =& \text{softmax}(r_{i,1,k}...r_{i,j_k ,k})|_j \\ r_{i,j,k} =& f(h_{j,k}, u_{i-1,\hat{k}}^{(L_{dec})}), \end{aligned}\] where \(\alpha_{i,j,k}\) is the attention weight normalized over the source positions \(1\leq j \leq j_k\), and \(r_{i,j,k}\) is the energy computed via the function \(f\) which uses \(\tanh\) of the previous top-most decoder layer and the source representation at position \(j\). Note the difference to the attention component used in offline MT, where the attention weights are computed considering the complete source sentence \(f_1^J\). The output distribution is computed using a softmax function of energies from the top-most decoder layer \(u_{i-1,k}^{(L_{dec})}\), the target embedding of the previous word \(\hat{e}_{i-1}\), and the context vector \(d_{i-1,k}\) \[\begin{aligned} p(e_i |& e_1^{i-1}, f_1^{j_k},k) = \nonumber \\ &\text{softmax}\big(g([u_{i-1,k}^{(L_{dec})}; \hat{e}_{i-1}; d_{i-1,k}])\big). \end{aligned}\] ## Target Chunk Boundary Factor Traditionally, the translation model is trained to produce a sentence end token to know when to stop the decoding process. In our approach, this decision has to be made for each chunk (see next section). Hence, we have to train the model to predict the end positions of the chunks on the target side. For this, we use a target factor, i.e. a second output of the decoder in each step: \[\begin{aligned} \label{eq:target_chunk_detection} p(b_i |& e_1^{i}, f_1^{j_k},k) = \nonumber \\ &\text{softmax}(g( u_{i-1,k}^{(L_{dec})}, \hat{e}_{i}, \hat{e}_{i-1}, d_{i-1,k})) \end{aligned}\] where \(b_i\) is a binary random variable representing target chunk boundaries analogous to \(b_j\) on the source side. This probability corresponds to the first term in Equation [\[eq:word_chunk_decomp\]](#eq:word_chunk_decomp){reference-type="ref" reference="eq:word_chunk_decomp"}, making the same model assumptions as for the translation probability. Note however, that we make the boundary decision dependent on the embedding \(\hat{e}_{i}\) of the target word produced in the current decoding step. # Search Decoding in simultaneous MT can be seen as an asynchronous process that takes a stream of source words as input and produces a stream of target words as output. In our approach, we segment the incoming source stream into chunks and output a translation for each chunk individually, however always keeping the full source and target context. Algorithm [\[algo:decoding\]](#algo:decoding){reference-type="ref" reference="algo:decoding"} explains the simultaneous decoding process. One source word \(f_j\) (i.e. its embedding \(\hat{f}_j\)) is read at a time. We calculate the next step of the shared forward encoder (Equation [\[eq:forward\]](#eq:forward){reference-type="ref" reference="eq:forward"}), including source boundary detection (Equation [\[eq:source_chunk_detection\]](#eq:source_chunk_detection){reference-type="ref" reference="eq:source_chunk_detection"}). If the boundary probability \(p(b_j)\) is below a certain threshold \(t_b\), we continue reading the next source word \(f_{j+1}\). If, however, a chunk boundary is detected, we first feed all word embeddings \(\hat{\bm{f}}_k\) of the current chunk into the backward encoder (Equation [\[eq:backward\]](#eq:backward){reference-type="ref" reference="eq:backward"}), resulting in representations \(\overleftarrow{\bm{h}}_k\) for each of the words in the current chunk. After that, the decoder is run according to Equations [\[eq:concat\]](#eq:concat){reference-type="ref" reference="eq:concat"}--[\[eq:target_chunk_detection\]](#eq:target_chunk_detection){reference-type="ref" reference="eq:target_chunk_detection"}. Note, that it attends to representations \(\overrightarrow{\bm{h}}\) and \(\overleftarrow{\bm{h}}\) of all source words read so far, not only the current chunk. Here, we perform beam search such that in each decoding step those combinations of target words and target chunk boundary decisions are kept that have the highest joint probability. A hypothesis is considered final as soon as it reaches a position \(i\) where a chunk boundary \(b_i = 1\) is predicted. Note that the length of a chunk translation is not restricted and hypotheses of different lengths compete. When all hypotheses in the beam are final, the first-best hypothesis is declared as the translation \(\tilde{e}_k\) of the current chunk and all its words are flushed into the output stream at once. During search, the internal states of the forward encoder and the decoder are saved between consecutive different calls while the backward decoder is initialized with a zero state for each chunk. # Alignment-Based Chunking {#sec:chunking} ## Baseline Approach {#subsec:baseline_chunking} We aimed at a meaningful segmentation of sentence pairs into bilingual chunks which could then be translated in monotonic sequence and each chunk is--in terms of aligned words--translatable without consuming source words from succeeding chunks. We extract such a segmentation from unsupervised word alignments in source-to-target and target-to-source directions that we trained using the Eflomal toolkit  and combined using the *grow-diag-final-and* heuristic . Then, for each training sentence pair, we extract a sequence of "minimal-length" monotonic phrase pairs, i.e. a sequence of the smallest possible bilingual chunks which do not violate the alignment constraints[^1] and at the same time are conform with the segmentation constraints in Equation [\[eq:constraints\]](#eq:constraints){reference-type="ref" reference="eq:constraints"}. By this we allow word reordering between the two languages to happen only within the chunk boundaries. The method roughly follows the approach of , who extracted similar chunks as units for n-gram based statistical MT. For fully monotonic word alignments, only chunks of length 1 either on the source or the target side are extracted (corresponding to 1-to-1, 1-to-M, M-to-1 alignments). For non-monotonic alignments larger chunks are obtained, in the extreme case the whole sentence pair is one chunk. Any unaligned source or target words are attached to the chunk directly preceding them, also any non-aligned words that may start the source/target sentence are attached to the first chunk. We perform the word alignment and chunk boundary extraction on the word level, and then convert words to subword units for the subsequent use in NMT. ## Delayed Source Chunk Boundaries {#subsec:delay} We observed that the accuracy of source boundary detection can be improved significantly by including the words immediately following the source chunk boundary into the context. Take e. g. the source word sequence `I have seen it`. It can be translated into German as soon as the word `it` was read: `Ich habe es gesehen`. Therefore the model is likely to predict a chunk boundary after `it`. However, if the next read source word is [`coming`]{style="color: red"}, it becomes clear that we should have waited because the correct German translation is now `Ich habe es kommen gesehen`. There is a reordering which invalidates the previous partial translation. To be able to resolve such cases, we shift the source chunks by a constant delay \(D\) such that \(j_1,..., j_k,..., j_K\) becomes \(j_1 + D,..., j_k + D,..., j_K + D\).[^2] Note that the target chunks remain unchanged, thus the extra source words also provide an expanded context for translation. In preliminary experiments we saw large improvements in translation quality when using a delay of 2 or more words, therefore we use it in all further experiments. ## Improved Chunks for More Context {#subsec:improved_chunking} The baseline chunking method (Section [6.1](#subsec:baseline_chunking){reference-type="ref" reference="subsec:baseline_chunking"}) considers word reordering to determine necessary context for translation. However, future context is often necessary for correct translation. Consider the translation `The beautiful woman` \(\rightarrow\) `Die schöne Frau`. Here, despite of the monotonic alignment, we need the context of the third English word `woman` to translate the first two words as we have to decide on the gender and number of the German article `Die` and adjective `schöne`. In part, this problem is already addressed by adding future source words into the context as described in Section [6.2](#subsec:delay){reference-type="ref" reference="subsec:delay"}. However, this method causes a general increase in latency by \(D\) source positions and yet covers only short-range dependencies. A better approach is to remove any chunk boundary for which the words following it are important for a correct translation of the words preceding it. To this end, we introduce a heuristic that uses two bigram target language models (LMs). The first language model yields the probability \(p(e_{i_k} | e_{i_k-1})\) for the last word \(e_{i_k}\) of chunk \(s_k\), whereas the second one computes the probability \(p(e_{i_k}|e_{i_k+1})\) for the last word in the chunk given the first word \(e_{i_k+1}\) of the next chunk \(s_{k+1}\) that follows the word \(e_{i_k}\). The chunk boundary after \(e_{i_k}\) is removed if the probability of the latter reverse bigram LM is higher than the probability of the first one by a factor \(l = \sqrt{i_k-i_{k-1}}\), i.e. dependent on the length of the current chunk. The motivation for this factor is that shorter chunks should be merged with the context to the right more often than chunks which are already long, provided that the right context word has been frequently observed in training to follow the last word of such a chunk candidate. The two bigram LMs are estimated on the target side of the bilingual data, with the second one trained on sentences printed in reverse order. Examples of the chunks extracted with the baseline and the improved approach for a given training sentence pair are shown in Figure [\[fig:chunk-example\]](#fig:chunk-example){reference-type="ref" reference="fig:chunk-example"}. # Streaming Speech Recognition {#sec:asr} To translate directly from speech signal, we use a cascaded approach. The proposed simultaneous NMT system consumes words from a streaming automatic speech recognition (ASR) system. This system is based on a hybrid LSTM/HMM acoustic model , trained on a total of approx. 2300 hours of transcribed English speech from the corpora allowed by IWSLT 2020 evaluation, including MUST-C, TED-LIUM, and LibriSpeech. The acoustic model takes 80-dim. MFCC features as input and estimates state posterior probabilities for 5000 tied triphone states. It consists of 4 bidirectional layers with 512 LSTM units for each direction. Frame-level alignment and state tying were bootstrapped with a Gaussian mixtures acoustic model. The LM of the streaming recognizer is a 4-gram count model trained with Kneser-Ney smoothing on English text data (approx. 2.8B running words) allowed by the IWSLT 2020 evaluation. The vocabulary consists of 152K words and the out-of-vocabulary rate is below 1%. Acoustic training and the HMM decoding were performed with the RWTH ASR toolkit . The streaming recognizer implements a version of chunked processing  which allows for the same BLSTM-based acoustic model to be used in both offline and online applications. By default, the recognizer updates the current first-best hypothesis by Viterbi decoding starting from the most recent frame and returns the resulting word sequence to the client. This makes the first-best hypothesis "unstable", i.e. past words can change depending on the newly received evidence due to the global optimization of the Viterbi decoding. To make the output more stable, we made the decoder delay the recognition results until all active word sequences share a common prefix. This prefix is then guaranteed to remain unchanged independent of the rest of the utterance and thus can be sent out to the MT model. # Experiments We conduct experiments on the IWSLT simultaneous translation task for speech translation of TED talks from English to German. ## Setup For training the baseline NMT system, we utilize the parallel data allowed for the IWSLT 2020 evaluation. We divide it into 3 parts: in-domain, clean, and out-of-domain. We consider data from the TED and MUST-C corpora  as in-domain and use it for subsequent fine-tuning experiments, as well as the "ground truth" for filtering the out-of-domain data based on sentence embedding similarity with the in-domain data; details are given in. As "clean" we consider the News-Commentary, Europarl, and WikiTitles corpora and use their full versions in training. As out-of-domain data, we consider OpenSubtitles, ParaCrawl, CommonCrawl, and *rapid* corpora, which we reduce to 40% of their total size, or to 23.2M parallel lines, with similarity-based filtering. Thus, in total, we use almost 26M lines of parallel data to train our systems, which amounts to ca. 327M running words on the English side. Furthermore, we added 7.9M sentence pairs or ca. 145M running words of similarity-filtered back-translated[^3] German monolingual data allowed by the IWSLT 2020 evaluation. In training, the in-domain and clean parallel data had a weight of 5. All models were implemented and trained with the RETURNN toolkit. We used an embedding size of 620 and LSTM state sizes of 1000. As heldout tuning set, we use a combination of IWSLT dev2010, tst2014, and MUST-C-dev corpora. To obtain bilingual chunks as described in Section [6](#sec:chunking){reference-type="ref" reference="sec:chunking"}, we word-align all of the filtered parallel/back-translated and tuning data in portions of up to 1M sentence pairs, each of them combined with all of the in-domain and clean parallel data. As heldout evaluation sets, we use IWSLT tst2015, as well as MUST-C HE and COMMON test data. For the text input condition, we applied almost no preprocessing, tokenization was handled as part of the subword segmentation with the sentencepiece toolkit . The vocabularies for both the source and the target subword models had a size of 30K. For the speech input condition, the additional preprocessing applied to the English side of the parallel data had the goal to make it look like speech transcripts. We lowercased the text, removed all punctuation marks, expanded common abbreviations, especially for measurement units, and converted numbers, dates, and other entities expressed with digits into their spoken form. For the cases of multiple readings of a given number (e.g. `one oh one`, `one hundred and one`), we selected one randomly, so that the system could learn to convert alternative readings in English to the same number expressed with digits in German. Because of this preprocessing, our system for the speech condition learned to insert punctuation marks, restore word case, and convert spoken number and entity forms to digits as part of the translation process. The proposed chunking method (Section [6](#sec:chunking){reference-type="ref" reference="sec:chunking"}) is applied to the training corpus as a data preparation step. We measured average chunk lengths of 2.9 source words and 2.7 target words. 40% of both the source and target chunks consist of a single word, about 20% are longer than 3 words. We compute case-sensitive BLEU  and TER  scores as well as the average lagging (AL) metric. ## Results Table [\[tbl:speech_mt\]](#tbl:speech_mt){reference-type="ref" reference="tbl:speech_mt"} shows results for the proposed simultaneous MT system. For reference, we first provide the translation quality of an offline system that is trained on full sentences. It is a transformer "base" model that we trained on the same data as the online systems. Row 1 shows BLEU and TER scores for translation of the human reference transcription of the speech input (converted to lower-case, punctuation removed), whereas row 2 uses the automatic transcription generated by our streaming ASR system (Section [7](#sec:asr){reference-type="ref" reference="sec:asr"}). The ASR system has a word error rate (WER) of 8.7 to 11.2% on the three test sets, causing a drop of 4-6% BLEU absolute. All following systems are cascaded streaming ASR + MT online systems that produce translations from audio input in real-time. Those systems have an overall AL of 4.1 to 4.5 seconds, depending on \(D\). We compare between two categories of models: unidirectional and bidirectional. For the unidirectional models the backwards decoder (Equation [\[eq:backward\]](#eq:backward){reference-type="ref" reference="eq:backward"}) was removed from the architecture. We show results for different values of source boundary delay \(D\) (see Section [6.2](#subsec:delay){reference-type="ref" reference="subsec:delay"}). For the number of layers we choose \(L_\text{enc}=6\) and \(L_{\text{dec}}=2\) for the unidirectional models, and \(L_{\text{enc}}=4\) (both directions) and \(L_\text{dec}=1\) for the bidirectional models, such that the number of parameters is comparable. Contradicting our initial assumption, bidirectional models do not outperform unidirectional models. This might indicate be due to the fact that the majority of chunks are too short to benefit from a backwards encoding. Also, the model is not sensitive to the delay \(D\). This *confirms* our assumption that the additional context of future source words is primarily useful for making the source boundary decision, and for this a context of 2 following (sub-)words is sufficient. For translation, the model does not depend on this "extra" context but instead is able to make sufficiently good chunking decisions. Table [\[tbl:text_mt\]](#tbl:text_mt){reference-type="ref" reference="tbl:text_mt"} shows results for the case of streamed text input (cased and with punctuation marks). We compare our results to a 4-layer unidirectional system that was trained using the wait-\(k\) policy. For this, we chunk the training data into single words, except for a first chunk of size \(k=9\) on the source side, and set the delay to \(D=0\). All of our systems outperform this wait-\(k\) system by large margins. We conclude that the alignment-based chunking proposed in Section [6](#sec:chunking){reference-type="ref" reference="sec:chunking"} is able to provide better source context than a fixed policy and that the source boundary detection component described in Section [4.1](#sec:boundary_detection){reference-type="ref" reference="sec:boundary_detection"} successfully learns to reproduce this chunking at inference time. Also for the text condition, we do not observe large differences between uni-and bidirectional models and between different delays. For all systems, we report AL scores averaged over all test sets. Figure [\[fig:bleu_al\]](#fig:bleu_al){reference-type="ref" reference="fig:bleu_al"} breaks down the scores to the individual test sets for the bidirectional models. For a source boundary delay \(D=2\) we observe an AL of \(4.6\) to \(4.7\) words. When increasing \(D\), we increase the average lagging score by roughly the same amount, which is expected, since the additional source context for the boundary decision is not translated in the same step where it is added. As discussed before, translation quality does not consistently improve from increasing \(D\). We found tuning of length normalization to be important, as the average decoding length for chunks is much shorter than in offline translation. For optimal results, we divided the model scores by \(I^\alpha\), \(I\) being the target length, and tuned the parameter \(\alpha\). Figure [\[fig:len_norm_tuning\]](#fig:len_norm_tuning){reference-type="ref" reference="fig:len_norm_tuning"} shows that \(\alpha=0.9\) works best in our experiments, independent of the source boundary delay \(D\). This value is used in all experiments. Furthermore, we found the model to be very sensitive to a source boundary probability threshold \(t_b\) different than \(0.5\) regarding translation quality. This means the "translating" part of the network strongly adapts to the chunking component. # Conclusion We proposed a novel neural model architecture for simultaneous MT that incorporates a component for splitting the incoming source stream into translatable chunks. We presented how we generate training examples for such chunks from statistical word alignment and how those can be improved via language models. Experiments on the IWSLT 2020 English-to-German task proved that the proposed learned source chunking outperforms a fixed wait-\(k\) strategy by a large margin. We also investigated the value of backwards source encoding in the context of simultaneous MT by comparing uni-and bidirectional versions of our architecture.
{'timestamp': '2020-06-01T02:09:57', 'yymm': '2005', 'arxiv_id': '2005.14489', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14489'}
null
null
null
null
# Introduction Let \(G\) be a finite group and \(S\subseteq G\). The *Cayley digraph* \(\cay(G,S)\) over \(G\) with the connection set \(S\) is defined to be the digraph with the vertex set \(G\) and the arc set \(\{(g,sg): g\in G, s\in S\}\). Two Cayley digraphs over \(G\) are called *Cayley isomorphic* if there exists an isomorphism between them which is also an automorphism of \(G\). Clearly, two Cayley isomorphic Cayley digraphs are isomorphic. The converse statement is not true in general (see ). A subset \(S\subseteq G\) is called a *\(\CI\)-subset* if for each \(T\subseteq G\) the Cayley digraphs \(\cay(G,S)\) and \(\cay(G,T)\) are isomorphic if and only if they are Cayley isomorphic. A finite group \(G\) is called a *\(\DCI\)-group* (*\(\CI\)-group*, respectively) if each subset of \(G\) (each inverse-closed subset of \(G\), respectively) is a \(\CI\)-subset. The investigation of \(\DCI\)-groups was initiated by Ádám  who conjectured, in our terms, that every cyclic group is a \(\DCI\)-group. This conjecture was disproved by Elspas and Turner in . The problem of determining of all finite \(\DCI\)-and \(\CI\)-groups was suggested by Babai and Frankl in . For more information on \(\DCI\)-and \(\CI\)-groups we refer the readers to the survey paper . In this paper we are interested in abelian \(\DCI\)-groups. The cyclic group of order \(n\) is denoted by \(C_n\). Elspas and Turner  and independently Djoković  proved that every cyclic group of prime order is a \(\DCI\)-group. The fact that \(C_{pq}\) is a \(\DCI\)-group for distinct primes \(p\) and \(q\) was proved by Alspach and Parsons in  and independently by Klin and Pöschel in . The complete classification of all cyclic \(\DCI\)-groups was obtained by Muzychuk in . He proved that a cyclic group of order \(n\) is a \(\DCI\)-group if and only if \(n=k\) or \(n=2k\), where \(k\) is square-free. Denote the class of all finite abelian groups whose all Sylow subgroups are elementary abelian by \(\mathcal{E}\). From  it follows that every \(\DCI\)-group is the coprime product (i.e., the direct product of groups of coprime orders) of groups from the following list: \[C_{p}^k,~C_4,~Q_8,~A_4,~H\rtimes \langle z \rangle,\] where \(p\) is a prime, \(H\) is a group of odd order from \(\mathcal{E}\), \(|z|\in \{2,4\}\), and \(h^z=h^{-1}\) for every \(h\in H\). One can check that the class of \(\DCI\)-groups is closed under taking subgroups. So one of the crucial steps towards the classification of all \(\DCI\)-groups is to determine which groups from \(\mathcal{E}\) are \(\DCI\). The following non-cyclic groups from \(\mathcal{E}\) are \(\DCI\)-groups (\(p\) and \(q\) are assumed to be distinct primes): \(C_p^2\) ; \(C_p^3\) ; \(C_2^4\), \(C_2^5\) ; \(C_p^4\), where \(p\) is odd  (a proof for \(C_p^4\) with no condition on \(p\) was given in ); \(C_p^5\), where \(p\) is odd ; \(C_p^2\times C_q\) ; \(C_p^3\times C_q\) ; \(C_p^4\times C_q\) . The smallest example of a non-\(\DCI\)-group from \(\mathcal{E}\) was found by Nowitz . He proved that \(C_2^6\) is non-\(\DCI\). This implies that \(C_2^n\) is non-\(\DCI\) for every \(n\geq 6\). Also \(C_3^n\) is non-\(\DCI\) for every \(n\geq 8\)  and \(C_p^n\) is non-\(\DCI\) for every prime \(p\) and \(n\geq 2p+3\) . In this paper we find a new infinite family of \(\DCI\)-groups from \(\mathcal{E}\) which are close to the smallest non-\(\DCI\)-group from \(\mathcal{E}\). The main result of the paper can be formulated as follows. Theorem [\[main\]](#main){reference-type="ref" reference="main"} extends the results obtained in  which imply that the group \(C_p^k\times C_q\) is a \(\DCI\)-group whenever \(p\) and \(q\) are distinct primes and \(k\leq 4\). Note that the "only if" part of Theorem [\[main\]](#main){reference-type="ref" reference="main"}, in fact, was proved by Nowitz in . The next corollary immediately follows from  and Theorem [\[main\]](#main){reference-type="ref" reference="main"}. To prove Theorem [\[main\]](#main){reference-type="ref" reference="main"}, we use the \(S\)-ring approach. An *\(S\)-ring* over a group \(G\) is a subring of the group ring \(\mathbb{Z}G\) which is a free \(\mathbb{Z}\)-module spanned by a special partition of \(G\). If every \(S\)-ring from a certain family of \(S\)-rings over \(G\) is a \(\CI\)-\(S\)-ring then \(G\) is a \(\DCI\)-group (see Section 4). The definition of an \(S\)-ring goes back to Schur  and Wielandt . The usage of \(S\)-rings in the investigation of \(\DCI\)-groups was proposed by Klin and Pöschel . Many of recent results on \(\DCI\)-groups were obtained with using \(S\)-rings (see ). The text of the paper is organized in the following way. In Section 2 we provide definitions and basic facts concerned with \(S\)-rings. Section 3 contains a necessary information on isomorphisms of \(S\)-rings. In Section 4 we discuss \(\CI\)-\(S\)-rings and their relation with \(\DCI\)-groups. Also in this section we prove a sufficient condition of \(\CI\)-property for \(S\)-rings (Lemma [\[minnorm\]](#minnorm){reference-type="ref" reference="minnorm"}). Section 5 is devoted to the generalized wreath and star products of \(S\)-rings. Here we deduce from previously obtained results two sufficient conditions for the generalized wreath product of \(S\)-rings to be a \(\CI\)-\(S\)-ring (Lemma [\[kerci\]](#kerci){reference-type="ref" reference="kerci"} and Lemma [\[citens\]](#citens){reference-type="ref" reference="citens"}). Section 6 and 7 are concerned with \(p\)-\(S\)-rings and \(S\)-rings over groups of non-powerful order respectively. In Section 8 we provide properties of \(S\)-rings over the groups \(C_2^n\), \(n\leq 5\), and prove that all \(S\)-rings over these groups are \(\CI\). The material of this section is based on computational results obtained with the help of the GAP package COCO2P . Finally, in Section 9 we prove Theorem [\[main\]](#main){reference-type="ref" reference="main"}.\ \ \ **Notation.** Let \(G\) be a finite group and \(X\subseteq G\). The element \(\sum \limits_{x\in X} {x}\) of the group ring \(\mathbb{Z}G\) is denoted by \(\underline{X}\). The set \(\{x^{-1}:x\in X\}\) is denoted by \(X^{-1}\). The subgroup of \(G\) generated by \(X\) is denoted by \(\langle X\rangle\); we also set \(\rad(X)=\{g\in G:\ gX=Xg=X\}\). Given a set \(X\subseteq G\) the set \(\{(g,xg): x\in X, g\in G\}\) of arcs of the Cayley digraph \(\cay(G,X)\) is denoted by \(R(X)\). The group of all permutations of \(G\) is denoted by \(\sym(G)\). The subgroup of \(\sym(G)\) consisting of all right translations of \(G\) is denoted by \(G_{\r}\). The set \(\{K \leq \sym(G):~ K \geq G_{\r}\}\) is denoted by \(\Sup(G_{\r})\). For a set \(\Delta\subseteq \sym(G)\) and a section \(S=U/L\) of \(G\) we set \(\Delta^S=\{f^S:~f\in \Delta,~S^f=S\}\), where \(S^f=S\) means that \(f\) permutes the \(L\)-cosets in \(U\) and \(f^S\) denotes the bijection of \(S\) induced by \(f\). If \(K\leq \sym(\Omega)\) and \(\alpha\in \Omega\) then the stabilizer of \(\alpha\) in \(K\) and the set of all orbits of \(K\) on \(\Omega\) are denoted by \(K_{\alpha}\) and \(\orb(K,\Omega)\) respectively. If \(H\leq G\) then the normalizer of \(H\) in \(G\) is denoted by \(N_G(H)\). The cyclic group of order \(n\) is denoted by \(C_n\). The class of all finite abelian groups whose every Sylow subgroup is elementary abelian is denoted by \(\mathcal{E}\). # \(S\)-rings In this section we give a background of \(S\)-rings. In general, we follow , where the most part of the material is contained. For more information on \(S\)-rings we refer the readers to . Let \(G\) be a finite group and \(\mathbb{Z}G\) the integer group ring. Denote the identity element of \(G\) by \(e\). A subring \(\mathcal{A}\subseteq \mathbb{Z} G\) is called an *\(S\)-ring (a Schur ring)* over \(G\) if there exists a partition \(\mathcal{S}(\mathcal{A})\) of \(G\) such that: \((1)\) \(\{e\}\in\mathcal{S}(\mathcal{A})\), \((2)\) if \(X\in\mathcal{S}(\mathcal{A})\) then \(X^{-1}\in\mathcal{S}(\mathcal{A})\), \((3)\) \(\mathcal{A}=\Span_{\mathbb{Z}}\{\underline{X}:\ X\in\mathcal{S}(\mathcal{A})\}\). The elements of \(\mathcal{S}(\mathcal{A})\) are called the *basic sets* of \(\mathcal{A}\) and the number \(\rk(\mathcal{A})=|\mathcal{S}(\mathcal{A})|\) is called the *rank* of \(\mathcal{A}\). If \(X,Y \in \mathcal{S}(\mathcal{A})\) then \(XY \in \mathcal{S}(\mathcal{A})\) whenever \(|X|=1\) or \(|Y|=1\). Let \(\mathcal{A}\) be an \(S\)-ring over a group \(G\). A set \(X \subseteq G\) is called an *\(\mathcal{A}\)-set* if \(\underline{X}\in \mathcal{A}\). A subgroup \(H \leq G\) is called an *\(\mathcal{A}\)-subgroup* if \(H\) is an \(\mathcal{A}\)-set. From the definition it follows that the intersection of \(\mathcal{A}\)-subgroups is also an \(\mathcal{A}\)-subgroup. One can check that for each \(\mathcal{A}\)-set \(X\) the groups \(\langle X \rangle\) and \(\rad(X)\) are \(\mathcal{A}\)-subgroups. By the *thin radical* of \(\mathcal{A}\) we mean the set defined as \[\O_\theta(\mathcal{A})=\{ x \in G:~\{x\} \in \mathcal{S}(\mathcal{A}) \}.\] It is easy to see that \(\O_\theta(\mathcal{A})\) is an \(\mathcal{A}\)-subgroup. Let \(L \unlhd U\leq G\). A section \(U/L\) is called an *\(\mathcal{A}\)-section* if \(U\) and \(L\) are \(\mathcal{A}\)-subgroups. If \(S=U/L\) is an \(\mathcal{A}\)-section then the module \[\mathcal{A}_S=Span_{\mathbb{Z}}\left\{\underline{X}^{\pi}:~X\in\mathcal{S}(\mathcal{A}),~X\subseteq U\right\},\] where \(\pi:U\rightarrow U/L\) is the canonical epimorphism, is an \(S\)-ring over \(S\). # Isomorphisms and schurity Let \(\mathcal{A}\) and \(\mathcal{A}^{\prime}\) be \(S\)-rings over groups \(G\) and \(G^{\prime}\) respectively. A bijection \(f:G\rightarrow G^{\prime}\) is called an *isomorphism* from \(\mathcal{A}\) to \(\mathcal{A}^{\prime}\) if \[\{R(X)^f: X\in \mathcal{S}(\mathcal{A})\}=\{R(X^{\prime}): X^{\prime}\in \mathcal{S}(\mathcal{A}^{\prime})\},\] where \(R(X)^f=\{(g^f,~h^f):~(g,~h)\in R(X)\}\). If there exists an isomorphism from \(\mathcal{A}\) to \(\mathcal{A}^{\prime}\) then we say that \(\mathcal{A}\) and \(\mathcal{A}^{\prime}\) are *isomorphic* and write \(\mathcal{A}\cong \mathcal{A}^{\prime}\). The group of all isomorphisms from \(\mathcal{A}\) onto itself contains a normal subgroup \[\{f\in \sym(G): R(X)^f=R(X)~\text{for every}~X\in \mathcal{S}(\mathcal{A})\}\] called the *automorphism group* of \(\mathcal{A}\) and denoted by \(\aut(\mathcal{A})\). The definition implies that \(G_{\r}\leq \aut(\mathcal{A})\). The \(S\)-ring \(\mathcal{A}\) is called *normal* if \(G_{\r}\) is normal in \(\aut(\mathcal{A})\). One can verify that if \(S\) is an \(\mathcal{A}\)-section then \(\aut(\mathcal{A})^S\leq \aut(\mathcal{A}_S)\). Denote the group \(\aut(\mathcal{A})\cap \aut(G)\) by \(\aut_G(\mathcal{A})\). It easy to check that if \(S\) is an \(\mathcal{A}\)-section then \(\aut_G(\mathcal{A})^S\leq \aut_S(\mathcal{A}_S)\). One can verify that \[\aut_G(\mathcal{A})=N_{\aut(\mathcal{A})}(G_{\r})_e.\] Let \(K\in \Sup(G_{\r})\). Schur proved in  that the \(\mathbb{Z}\)-submodule \[V(K,G)=\Span_{\mathbb{Z}}\{\underline{X}:~X\in \orb(K_e,~G)\},\] is an \(S\)-ring over \(G\). An \(S\)-ring \(\mathcal{A}\) over \(G\) is called *schurian* if \(\mathcal{A}=V(K,G)\) for some \(K\in \Sup(G_{\r})\). One can verify that given \(K_1,K_2\in \Sup(G_{\r})\), \[\text{if}~K_1\leq K_2~\text{then}~V(K_1,G)\geq V(K_2,G).~\eqno(1)\] If \(\mathcal{A}=V(K,G)\) for some \(K\in \Sup(G_{\r})\) and \(S\) is an \(\mathcal{A}\)-section then \(\mathcal{A}_S=V(K^S,G)\). So if \(\mathcal{A}\) is schurian then \(\mathcal{A}_S\) is also schurian for every \(\mathcal{A}\)-section \(S\). It can be checked that \[V(\aut(\mathcal{A}),G)\geq \mathcal{A}~\eqno(2)\] and the equality is attained if and only if \(\mathcal{A}\) is schurian. An \(S\)-ring \(\mathcal{A}\) over a group \(G\) is defined to be *cyclotomic* if there exists \(K\leq\aut(G)\) such that \(\mathcal{S}(\mathcal{A})=\orb(K,G)\). In this case we write \(\mathcal{A}=\cyc(K,G)\). Obviously, \(\mathcal{A}=V(G_{\r}K,G)\). So every cyclotomic \(S\)-ring is schurian. If \(\mathcal{A}=\cyc(K,G)\) for some \(K\leq \aut(G)\) and \(S\) is an \(\mathcal{A}\)-section then \(\mathcal{A}_S=\cyc(K^S,G)\). Therefore if \(\mathcal{A}\) is cyclotomic then \(\mathcal{A}_S\) is also cyclotomic for every \(\mathcal{A}\)-section \(S\). Two permutation groups \(K_1\) and \(K_2\) on a set \(\Omega\) are called *\(2\)-equivalent* if \(\orb(K_1,\Omega^2)=\orb(K_2,\Omega^2)\) (here we assume that \(K_1\) and \(K_2\) act on \(\Omega^2\) componentwise). In this case we write \(K_1\approx_2 K_2\). The relation \(\approx_2\) is an equivalence relation on the set of all subgroups of \(\sym(\Omega)\). Every equivalence class has a unique maximal element. Given \(K\leq \sym(\Omega)\), this element is called the *\(2\)-closure* of \(K\) and denoted by \(K^{(2)}\). If \(\mathcal{A}=V(K,G)\) for some \(K\in \Sup(G_{\r})\) then \(K^{(2)}=\aut(\mathcal{A})\). An \(S\)-ring \(\mathcal{A}\) over \(G\) is called *\(2\)-minimal* if \[\{K\in \Sup(G_{\r}):~K\approx_2 \aut(\mathcal{A})\}=\{\aut(\mathcal{A})\}.\] Two groups \(K_1,K_2\leq \aut(G)\) are said to be *Cayley equivalent* if \(\orb(K_1,G)=\orb(K_2,G)\). In this case we write \(K_1\approx_{\cay} K_2\). If \(\mathcal{A}=\cyc(K,G)\) for some \(K\leq \aut(G)\) then \(\aut_G(\mathcal{A})\) is the largest group which is Cayley equivalent to \(K\). A cyclotomic \(S\)-ring \(\mathcal{A}\) over \(G\) is called *Cayley minimal* if \[\{K\leq \aut(G):~K\approx_{\cay} \aut_G(\mathcal{A})\}=\{\aut_G(\mathcal{A})\}.\] It is easy to see that \(\mathbb{Z}G\) is Cayley minimal. # \(\CI\)-\(S\)-rings Let \(\mathcal{A}\) be an \(S\)-ring over a group \(G\). Put \[\iso(\mathcal{A})=\{f\in \sym(G):~\text{f is an isomorphism from}~\mathcal{A}~\text{onto}~\text{\(S\)-ring over}~G\}.\] One can see that \(\aut(\mathcal{A})\aut(G)\subseteq \iso(\mathcal{A})\). However, the converse inclusion does not hold in general. The \(S\)-ring \(\mathcal{A}\) is defined to be a *\(\CI\)-\(S\)-ring* if \(\aut(\mathcal{A})\aut(G)=\iso(\mathcal{A})\). It is easy to check that \(\mathbb{Z}G\) and the \(S\)-ring of rank \(2\) over \(G\) are \(\CI\)-\(S\)-rings. Put \[\Sup_2(G_\r)=\{K \in \Sup(G_\r):~ K^{(2)}=K\}.\] The group \(M\leq \sym(G)\) is said to be *\(G\)-regular* if \(M\) is regular and isomorphic to \(G\). Following , we say that a group \(K \in \Sup(G_\r)\) is *\(G\)-transjugate* if every \(G\)-regular subgroup of \(K\) is \(K\)-conjugate to \(G_{\r}\). Babai proved in  the statement which can be formulated in our terms as follows: a set \(S\subseteq G\) is a \(\CI\)-subset if and only if the group \(\aut(\cay(G,S))\) is \(G\)-transjugate. The next lemma provides a similar criterion for a schurian \(S\)-ring to be \(\CI\). Let \(K_1, K_2\in \Sup(G_\r)\) such that \(K_1 \le K_2\). Then \(K_1\) is called a *\(G\)-complete subgroup* of \(K_2\) if every \(G\)-regular subgroup of \(K_2\) is \(K_2\)-conjugate to some \(G\)-regular subgroup of \(K_1\) (see ). In this case we write \(K_1 \preceq_G K_2\). The relation \(\preceq_G\) is a partial order on \(\Sup(G_\r)\). The set of the minimal elements of \(\Sup_2(G_\r)\) with respect to \(\preceq_G\) is denoted by \(\Sup_2^{\min}(G_\r)\). We finish the subsection with the lemma that gives a sufficient condition for an \(S\)-ring to be a \(\CI\)-\(S\)-ring. In order to formulate this condition, we need to introduce some further notations. Let \(\mathcal{A}\) be a schurian \(S\)-ring over an abelian group \(G\) and \(L\) a normal \(\mathcal{A}\)-subgroup of \(G\). Then the partition of \(G\) into the \(L\)-cosets is \(\aut(\mathcal{A})\)-invariant. The kernel of the action of \(\aut(\mathcal{A})\) on the latter cosets is denoted by \(\aut(\mathcal{A})_{G/L}\). Since \(\aut(\mathcal{A})_{G/L}\) is a normal subgroup of \(\aut(\mathcal{A})\), we can form the group \(K=\aut(\mathcal{A})_{G/L}G_{\r}\). Clearly, \(K\leq\aut(\mathcal{A})\). From  it follows that \(K=K^{(2)}\). It should be mentioned that the proof of Lemma [\[minnorm\]](#minnorm){reference-type="ref" reference="minnorm"} is quite similar to the proof of . # Generalized wreath and star products Let \(\mathcal{A}\) be an \(S\)-ring over a group \(G\) and \(S=U/L\) an \(\mathcal{A}\)-section of \(G\). An \(S\)-ring \(\mathcal{A}\) is called the *\(S\)-wreath product* or the *generalized wreath product* of \(\mathcal{A}_U\) and \(\mathcal{A}_{G/L}\) if \(L\trianglelefteq G\) and \(L\leq\rad(X)\) for each basic set \(X\) outside \(U\). In this case we write \(\mathcal{A}=\mathcal{A}_U\wr_{S}\mathcal{A}_{G/L}\) and omit \(S\) when \(U=L\). The construction of the generalized wreath product of \(S\)-rings was introduced in . The \(S\)-wreath product is called *nontrivial* or *proper* if \(L\neq \{e\}\) and \(U\neq G\). An \(S\)-ring \(\mathcal{A}\) is said to be *decomposable* if \(\mathcal{A}\) is the nontrivial \(S\)-wreath product for some \(\mathcal{A}\)-section \(S\) of \(G\); otherwise \(\mathcal{A}\) is said to be indecomposable. We say that an \(\mathcal{A}\)-subgroup \(U<G\) has a *gwr-complement* with respect to \(\mathcal{A}\) if there exists a nontrivial normal \(\mathcal{A}\)-subgroup \(L\) of \(G\) such that \(L\leq U\) and \(\mathcal{A}\) is the \(S\)-wreath product, where \(S=U/L\). Let \(V\) and \(W\) be \(\mathcal{A}\)-subgroups. The \(S\)-ring \(\mathcal{A}\) is called the *star product* of \(\mathcal{A}_V\) and \(\mathcal{A}_W\) if the following conditions hold: \((1)\) \(V\cap W\trianglelefteq W\); \((2)\) each \(T\in \mathcal{S}(\mathcal{A})\) with \(T\subseteq (W\setminus V)\) is a union of some \(V\cap W\)-cosets; \((3)\) for each \(T\in \mathcal{S}(\mathcal{A})\) with \(T\subseteq G\setminus (V\cup W)\) there exist \(R\in \mathcal{S}(\mathcal{A}_V)\) and \(S\in \mathcal{S}(\mathcal{A}_W)\) such that \(T=RS\). In this case we write \(\mathcal{A}=\mathcal{A}_V \star \mathcal{A}_W\). The construction of the star product of \(S\)-rings was introduced in . The star product is called *nontrivial* if \(V\neq \{e\}\) and \(V\neq G\). If \(V\cap W=\{e\}\) then the star product is the usual *tensor product* of \(\mathcal{A}_V\) and \(\mathcal{A}_W\) (see ). In this case we write \(\mathcal{A}=\mathcal{A}_V\otimes \mathcal{A}_W\). One can check that if \(\mathcal{A}=\mathcal{A}_V\otimes \mathcal{A}_W\) then \(\aut(\mathcal{A})=\aut(\mathcal{A}_V)\times \aut(\mathcal{A}_W)\). If \(V\cap W\neq \{e\}\) then \(\mathcal{A}\) is the nontrivial \(V/(V\cap W)\)-wreath product. # \(p\)-\(S\)-rings Let \(p\) be a prime. An \(S\)-ring \(\mathcal{A}\) over a \(p\)-group \(G\) is called a *\(p\)-\(S\)-ring* if every basic set of \(\mathcal{A}\) has a \(p\)-power size. Clearly, if \(|G|=p\) then \(\mathcal{A}=\mathbb{Z}G\). In the next three lemmas \(G\) is a \(p\)-group and \(\mathcal{A}\) is a \(p\)-\(S\)-ring over \(G\). # \(S\)-rings over over an abelian group of non-powerful order A number \(n\) is called *powerful* if \(p^2\) divides \(n\) for every prime divisor \(p\) of \(n\). From now throughout this subsection \(G=H\times P\), where \(H\) is an abelian group and \(P\cong C_p\), where \(p\) is a prime coprime to \(|H|\). Clearly, \(|G|\) is non-powerful. Let \(\mathcal{A}\) be an \(S\)-ring over \(G\), \(H_1\) a maximal \(\mathcal{A}\)-subgroup contained in \(H\), and \(P_1\) the least \(\mathcal{A}\)-subgroup containing \(P\). Note that \(H_1P_1\) is an \(\mathcal{A}\)-subgroup. # \(S\)-rings over \(C_2^n\), \(n\leq 5\) All \(S\)-rings over the groups \(C_2^n\), where \(n\leq 5\), were enumerated with the help of the GAP package COCO2P . The lists of all \(S\)-rings over these groups are available on the web-page  (see also ). The next lemma is an immediate consequence of the above computational results (see also ). The main goal of this section is to describe \(2\)-\(S\)-rings over \(C_2^n\), where \(n\leq 5\), using computational results and to check that all \(S\)-rings over the above groups are \(\CI\)-\(S\)-rings. From now until the end of the section \(G\) is an elementary abelian \(2\)-group of rank \(n\) and \(\mathcal{A}\) is a \(2\)-\(S\)-ring over \(G\). Analyzing the lists of all \(S\)-rings over \(C_2^4\) and \(C_2^5\) available on the web-page , we conclude that up to isomorphism there are exactly nineteen \(2\)-\(S\)-rings over \(G\) if \(n=4\) and there are exactly one hundred \(2\)-\(S\)-rings over \(G\) if \(n=5\). It can can be established by inspecting the above \(2\)-\(S\)-rings one after the other that there are exactly fifteen decomposable and four indecomposable \(2\)-\(S\)-rings over \(G\) if \(n=4\) and there are exactly ninety six decomposable and four indecomposable \(2\)-\(S\)-rings over \(G\) if \(n=5\). Note that if \(p>2\) then Lemma [\[p45\]](#p45){reference-type="ref" reference="p45"} does not hold. In fact, if \(p>2\) then there exists an indecomposable \(p\)-\(S\)-ring over \(C_p^5\) which is not normal (see ). From the results obtained in  it follows that the group \(C_2^n\) is a \(\DCI\)-group for \(n\leq 5\). However, this does not imply that every \(S\)-ring over \(C_2^n\), where \(n\leq 5\), is a \(\CI\)-\(S\)-ring (see Remark 1). Below we check that all \(S\)-rings over the above groups are \(\CI\)-\(S\)-rings. # Proof of Theorem [\[main\]](#main){reference-type="ref" reference="main"} Let \(G=H \times P\), where \(H \cong C_2^5\) and \(P \cong C_p\), where \(p\) is a prime. These notations are valid until the end of the paper. If \(p=2\) then \(G\) is not a \(\DCI\)-group by . So in view of Lemma [\[cimin\]](#cimin){reference-type="ref" reference="cimin"}, to prove Theorem [\[main\]](#main){reference-type="ref" reference="main"}, it is sufficient to prove the following theorem. The proof of Proposition [\[main2\]](#main2){reference-type="ref" reference="main2"} will be given in the end of the section. We start with the next lemma concerned with proper sections of \(G\). A key step towards the proof of Theorem [\[main2\]](#main2){reference-type="ref" reference="main2"} is the following lemma. In view of Lemma [\[proof3\]](#proof3){reference-type="ref" reference="proof3"}, we may assume that \(H_1<H\). Then one of the statements of Lemma [\[nonpower4\]](#nonpower4){reference-type="ref" reference="nonpower4"} holds for \(\mathcal{A}\). If Statement 1 of Lemma [\[nonpower4\]](#nonpower4){reference-type="ref" reference="nonpower4"} holds for \(\mathcal{A}\) then \[\mathcal{A}=\mathcal{A}_{H_1}\wr \mathcal{A}_{G/H_1},\] where \(\rk(\mathcal{A}_{G/H_1})=2\). If \(H_1\) is trivial then \(\rk(\mathcal{A})=2\) and obviously \(\mathcal{A}\) is a \(\CI\)-\(S\)-ring. If \(H_1\) is nontrivial then \(\mathcal{A}\) is a \(\CI\)-\(S\)-ring by Lemma [\[subgroup\]](#subgroup){reference-type="ref" reference="subgroup"} and Lemma [\[trivial\]](#trivial){reference-type="ref" reference="trivial"}. Assume that Statement 2 of Lemma [\[nonpower4\]](#nonpower4){reference-type="ref" reference="nonpower4"} holds for \(\mathcal{A}\), i.e. \[\mathcal{A}=\mathcal{A}_U\wr_S \mathcal{A}_{G/P_1},\] where \(U=H_1P_1\), \(S=U/P_1\), and \(P_1<G\). In view of Lemma [\[proof4\]](#proof4){reference-type="ref" reference="proof4"}, we may assume that \(H_1P_1<G\), i.e. \(\mathcal{A}\) is the nontrivial \(S\)-wreath product. The group \(G/P_1\) is a \(2\)-group of order at most \(32\) because \(P_1\geq P\). So Lemma [\[minpring\]](#minpring){reference-type="ref" reference="minpring"} implies that \(\mathcal{A}_{G/P_1}\) is a \(2\)-\(S\)-ring. If \(|G/P_1|\leq 16\) then \(\mathcal{A}\) is a \(\CI\)-\(S\)-ring by Lemma [\[subgroup\]](#subgroup){reference-type="ref" reference="subgroup"} and Lemma [\[2cigwr\]](#2cigwr){reference-type="ref" reference="2cigwr"}. So we may assume that \(|G/P_1|=32\). Clearly, in this case \[P_1=P.\] In view of Statement 2 of Lemma [\[psring\]](#psring){reference-type="ref" reference="psring"}, we may assume also that \[|S|=16.\] Indeed, if \(|S|<16\) then \(S\) is contained in an \(\mathcal{A}_{G/P}\)-subgroup \(S^{\prime}\) of order \(16\) by Statement 2 of Lemma [\[psring\]](#psring){reference-type="ref" reference="psring"}. Clearly, \(\mathcal{A}=\mathcal{A}_{U^{\prime}}\wr_{S^{\prime}}\mathcal{A}_{G/P}\), where \(U^{\prime}=\pi^{-1}(S^{\prime})\) and \(\pi:G\rightarrow G/P\) is the canonical epimorphism. Replacing \(S\) by \(S^{\prime}\), we obtain the required. Now all conditions of Lemma [\[main3\]](#main3){reference-type="ref" reference="main3"} hold for \(\mathcal{A}\) and \(U\). Thus, \(\mathcal{A}\) is a \(\CI\)-\(S\)-ring by Lemma [\[main3\]](#main3){reference-type="ref" reference="main3"}. The theorem is proved. ◻ :::
{'timestamp': '2020-06-01T02:11:23', 'yymm': '2005', 'arxiv_id': '2005.14539', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14539'}
# Introduction We shall study the sets whose intrinsic density is in the open unit interval. By a result of Astor, intrinsic density \(r\) is equivalent to injection stochasticity \(r\), which is the uniform variant of Kolmogorov-Loveland stochasticity. Our goal is to separate intrinsic density from randomness: for almost all \(r\) in the open unit interval, we shall construct sets which have intrinsic density \(r\), or injection stochasticity \(r\), which cannot compute any set random with respect to the \(r\)-Bernoulli measure.\ \ We briefly recall the notion of (asymptotic) density in the natural numbers: Astor introduced intrinsic density, which requires that the asymptotic density remain fixed under any computable permutation. A natural question to ask is what reals in the unit interval can be achieved as the intrinsic density of some set. Sets of intrinsic density \(0\) and \(1\) are well-known. In the open unit interval, Bienvenu (personal communication) gave a straightforward probabilistic argument that shows the sets of intrinsic density \(r\) have measure \(1\) under the \(r\)-Bernoulli measure. In fact, something stronger is true. If we say 1-random, we are specifically referring to \(\frac{1}{2}\)-ML-randomness. For a review of randomness with respect to noncomputable measures, see Reimann and Slaman. Standard arguments for \(\frac{1}{2}\) can be generalized to \(r\) to prove this. It is true for \(r\)-Schnorr randomness. See, for example, Nies for the proof in the case \(r=\frac{1}{2}\).\ \ Thus every real in the unit interval is achieved as the intrinsic density of some set. Furthermore, we will not be able to find an ML-random set which does not have intrinsic density as was done for computable randomness and MWC stochasticity by Ambos-Spies and was done for Schnorr randomness and Church stochasticity by Wang. However, it is still possible to find sets which have intrinsic density \(r\) but are not \(r\)-random. We shall not only do this, but in fact provide examples which cannot even compute an \(r\)-random set. To achieve this, we shall next develop some tools which work well with both asymptotic and intrinsic density and allow us to change densities. Computable operations like the join can only preserve intrinsic density, and set operations such as the intersection and union behave unpredictably with respect to asymptotic density.\ \ We shall follow the convention, unless otherwise stated, that capital English letters represent sets of natural numbers and the lowercase variant, indexed by a subscript of natural numbers, represents the elements of the set. As an example, if \(E\) is the set of even numbers, then \(e_n=2n\). Recall that the principal function for a set \(A\), \(p_A\), is defined via \(p_A(n)=a_n\).\ \ Using this representation, it is not hard to see the following characterization of upper and lower density: A critical proof technique will involve proving that two sets \(A\) and \(B\) cannot have different intrinsic densities by creating a computable permutation which sends \(A\) to \(B\) modulo a set of density zero. The following lemma shows that if we can do this, then the density of the image of \(A\) is the same as the density of \(B\), and therefore that they cannot have different intrinsic densities. Our strategy is to find some process which takes a set \(A\) of intrinsic density \(\alpha\) and a set \(B\) of intrinsic density \(\beta\) and codes \(B\) and \(A\) in such a way that we are left with a set which has new intrinsic density obtained as some function of \(\alpha\) and \(\beta\). The following lemma will be useful for computing intrinsic densities. We shall see in Section 2 that we cannot hope for such a process to be computable in a way that allows us to recover the original sets. Instead we shall use the following noncomputable coding methods. They are natural and have been used informally by others such as Jockusch and Astor. With \(B\triangleright A\), we are thinking of \(A\) as a copy of \(\omega\) as a well-order and \(B\triangleright A\) is the subset corresponding to \(B\) under the order preserving isomorphism between \(A\) and \(\omega\). We make a few elementary observations to illustrate how these operations behave: - For all \(A\), \(A=A\triangleright \omega=\omega\triangleright A=A\triangleleft\omega\). - For all \(A\) and \(B\) and any \(i\), \(a_i\) is either in \(B\) or \(\overline{B}\). Therefore \(i\) is either in \(B\triangleleft A\) or \(\overline{B}\triangleleft A\) respectively, so \((B\triangleleft A)\sqcup(\overline{B}\triangleleft A)=\omega\). - If \(B\cap C=\emptyset\), then \((B\triangleright A)\cap(C\triangleright A)=\emptyset\). Furthermore, \(A=(X\triangleright A)\sqcup(\overline{X}\triangleright A)\). - \(\triangleright\) is associative, i.e. \(B\triangleright(A\triangleright C)=(B\triangleright A)\triangleright C\): By definition, \((A\triangleright C)=\{c_{a_0}<c_{a_1}<c_{a_2}<\dots\}\) and thus \[B\triangleright (A\triangleright C)=\{c_{a_{b_0}}<c_{a_{b_1}}<c_{a_{b_2}}<\dots\}\] Similarly, \((B\triangleright A)=\{a_{b_0}<a_{b_1}<a_{b_2}<\dots\}\), and therefore by definition \[(B\triangleright A)\triangleright C=\{c_{a_{b_0}}<c_{a_{b_1}}<c_{a_{b_2}}<\dots\}\] - \(\triangleleft\) is not associative: Consider the set of evens \(E\), the set of odds \(O\), and the set \(N\) of evens which are not multiples of \(4\). Then \[(O\triangleleft N)\triangleleft E=\emptyset\triangleleft N=\emptyset\] However, \[O\triangleleft(N\triangleleft E)=O\triangleleft O=\omega\] - \(\triangleright\) and \(\triangleleft\) do not associate with each other in general: \[B\triangleright(A\triangleleft(B\triangleright A))=B\triangleright\omega=B\] but \[(B\triangleright A)\triangleleft(B\triangleright A)=\omega\] Similarly, \(B\triangleleft(A\triangleright B)=\omega\), but \((B\triangleleft A)\triangleright B\) is a subset of \(B\). In Section 2, we shall construct examples of sets which have intrinsic density \(r\) but are not \(r\)-random. However, all of these examples will trivially compute \(r\)-random sets, so we shall then turn our attention to constructing examples which cannot. In Section 3 we shall prove our main technical theorems which allow us to complete the construction in Section 4. # Nonrandom sets of intrinsic density \(r\) The following theorem allows us to easily generate sets of intrinsic density \(r\) which are not \(r\)-random from Proposition [\[randomdensity\]](#randomdensity){reference-type="ref" reference="randomdensity"}. We shall now show that this implies that \(\rho(\pi(A\oplus B))=r\). Consider \(\rho_n(\pi(A\oplus B))\). By definition, \[\rho_n(\pi(A\oplus B))=\frac{|\pi(A\oplus B)\upharpoonright n|}{n}\] As \(\omega=\pi(E)\sqcup\pi(O)\), \[\frac{|\pi(A\oplus B)\upharpoonright n|}{n}=\frac{|\pi(A\oplus B)\cap\pi(E)\upharpoonright n|+|\pi(A\oplus B)\cap\pi(O)\upharpoonright n|}{n}\] The latter expression can be rewritten as \[\frac{|\pi(E)\upharpoonright n|}{|\pi(E)\upharpoonright n|}\cdot\frac{|\pi(A\oplus B)\cap\pi(E)\upharpoonright n|}{n}+\frac{|\pi(O)\upharpoonright n|}{|\pi(O)\upharpoonright n|}\cdot\frac{|\pi(A\oplus B)\cap\pi(O)\upharpoonright n|}{n}\] Let \(m\) be the largest number such that the \(m\)-th element of \(\pi(E)\) is less than \(n\), and let \(k\) be the analogous number for \(\pi(O)\). Now notice that \[\frac{|\pi(A\oplus B)\cap\pi(E)\upharpoonright n|}{|\pi(E)\upharpoonright n|}=\rho_m(\pi(A\oplus B)\triangleleft\pi(E))\] and \[\frac{|\pi(A\oplus B)\cap\pi(O)\upharpoonright n|}{|\pi(O)\upharpoonright n|}=\rho_k(\pi(A\oplus B)\triangleleft\pi(O))\] by the definition of the `within` operation. Therefore, we can rewrite \(\rho_n(\pi(A\oplus B))\) as \[\rho_m(\pi(A\oplus B)\triangleleft\pi(E))\cdot\rho_n(\pi(E))+\rho_k(\pi(A\oplus B)\triangleleft\pi(O))\cdot\rho_n(\pi(O))\] Using the fact that \(\rho_n(\pi(E))+\rho_n(\pi(O))=1\), \[\rho_n(\pi(A\oplus B))=\rho_m(\pi(A\oplus B)\triangleleft\pi(E))\cdot\rho_n(\pi(E))+\rho_k(\pi(A\oplus B)\triangleleft\pi(O))\cdot(1-\rho_n(\pi(E)))\] Rearranging, this is equal to \[\rho_k(\pi(A\oplus B)\triangleleft\pi(O))+\rho_n(\pi(E))\cdot(\rho_m(\pi(A\oplus B)\triangleleft\pi(E))-\rho_k(\pi(A\oplus B)\triangleleft\pi(O)))\] Taking the limit as \(n\) goes to infinity, \(m\) and \(k\) both go to infinity. Thus \[\rho_m(\pi(A\oplus B)\triangleleft\pi(E))-\rho_k(\pi(A\oplus B)\triangleleft\pi(O))\] goes to \(0\) by Lemma [\[joinlemma\]](#joinlemma){reference-type="ref" reference="joinlemma"}. As \(\rho_n(\pi(E))\) is bounded between \(0\) and \(1\) by definition, the second term vanishes. Therefore \[\lim_{n\to\infty}\rho_n(\pi(A\oplus B))=\lim_{n\to\infty} \rho_k(\pi(A\oplus B)\triangleleft\pi(O))=\rho(\pi(A\oplus B)\triangleleft\pi(O))=r\] as desired. ◻ By Lemma [\[permutationlemma\]](#permutationlemma){reference-type="ref" reference="permutationlemma"}, there is \(H\subseteq C\) computable with \(\overline{\rho}(\pi(f(H)))=0\). Define \(\pi_f:\omega\to\omega\) via \(\pi_f(n)=f(n)\) for \(n\in C\setminus H\), and for \(n\in \overline{C}\sqcup H\) define \(\pi_f(n)\) to be the least element of \(f(H)\) not equal to \(\pi_f(j)\) for some \(j<n\). As \(f\) agrees with \(\pi_f\) on \(C\setminus H\), \[\pi_f((A\cap C)\setminus H)=f(A\cap C)\setminus f(H)=(A\triangleleft C)\setminus f(H)\] Therefore by applying \(\pi\), \[\pi(\pi_f((A\cap C)\setminus H))=\pi((A\triangleleft C)\setminus f(H))=\pi(A\triangleleft C)\setminus \pi(f(H))\] Using the above equality, \[\overline{\rho}(\pi(\pi_f((A\cap C)\setminus H)))=\overline{\rho}(\pi(A\triangleleft C)\setminus\pi(f(H)))\] As \(\overline{\rho}(\pi(f(H)))=0\), we can apply Lemma [\[densityzero\]](#densityzero){reference-type="ref" reference="densityzero"} and see \[\overline{\rho}(\pi(A\triangleleft C)\setminus\pi(f(H)))=\overline{\rho}(\pi(A\triangleleft C))\] As \((A\cap C)\setminus H\subseteq A\), \[\overline{\rho}(\pi(\pi_f(A)))\geq\overline{\rho}(\pi(\pi_f((A\cap C)\setminus H)))=\overline{\rho}(\pi(A\triangleleft C))\] However, we assumed that \(\overline{\rho}(\pi(A\triangleleft C))>r\), so \(\overline{\rho}(\pi(\pi_f(A)))>r\). As \(\pi\circ\pi_f\) is a computable permutation, this implies \(P(A)\neq r\).\ \ This proves that if \(\pi\) is a computable permutation with \(\overline{\rho}(\pi(A\triangleleft C))>r\), then \(P(A)\neq r\). If there is no such permutation, there must be a computable permutation \(\pi\) with \(\underline{\rho}(\pi(A\triangleleft C))<r\) because we assumed that \(P(A\triangleleft C)\neq r\). Then because \[(\pi(A\triangleleft C))\sqcup(\pi(\overline{A}\triangleleft C))=\pi((A\triangleleft C)\sqcup(\overline{A}\triangleleft C))=\pi(\omega)=\omega\] we have \(\rho_n(\pi(\overline{A}\triangleleft C))=1-\rho_n(\pi(A\triangleleft C))\) for all \(n\). Therefore by the subtraction properties of the limit superior, \[\overline{\rho}(\pi(\overline{A}\triangleleft C))\geq1-\underline{\rho}(\pi(A\triangleleft C))\] As we assumed \(\underline{\rho}(\pi(A\triangleleft C))<r\), \[1-\underline{\rho}(\pi(A\triangleleft C))>1-r\] Thus \(\overline{\rho}(\pi(\overline{A}\triangleleft C))>1-r\). We now apply the previous case to get that \(P(\overline{A})\neq1-r\), which automatically implies \(P(A)\neq r\). ◻ Therefore, if \(B\triangleright A\) has intrinsic density, its intrinsic density must be the product of the densities of \(A\) and \(B\). This will occur in certain instances, which is our second main theorem. Recall that a set \(X\) has \(Y\)-intrinsic density, or intrinsic density relative to \(Y\), if its density is invariant under all \(Y\)-computable permutations as opposed to just the computable ones. We use \(P_Y(X)\) to denote the \(Y\)-intrinsic density of \(X\) if it exists. Note by Lemma [\[densitylimit\]](#densitylimit){reference-type="ref" reference="densitylimit"} that \(\overline{\rho}(\pi(B\triangleright A)\triangleleft\pi(A))>\beta\): From the definition, \[(\pi(B\triangleright A)\triangleleft\pi(A))\triangleright \pi(A))=\pi(B\triangleright A)\] and \(\overline{\rho}(B\triangleright A)>\alpha\beta\) by assumption. \(\overline{\rho}(\pi(A))=\alpha\) because \(P(A)=\alpha\), so \(\overline{\rho}(\pi(B\triangleright A)\triangleleft\pi(A))\leq\beta\) would contradict Lemma [\[densitylimit\]](#densitylimit){reference-type="ref" reference="densitylimit"}.\ \ From this point forward we shall let \[X=\pi(B\triangleright A)\triangleleft\pi(A)\] for the sake of readability.\ \ By Lemma [\[permutationlemma\]](#permutationlemma){reference-type="ref" reference="permutationlemma"} relativized to \(A\) and applied to \(g\circ\pi\), there is an \(A\)-computable set \(H\subseteq A\) such that: \[\overline{\rho}(g(\pi(H)))=0\] We shall now define permutations which preserve the properties of \(f\) and \(g\) outside of \(H\). Define \(\pi_f:\omega\to\omega\) via \(\pi_f(k)=f(k)\) for \(k\in A\setminus H\), and for \(k\in \overline{A}\sqcup H\), let \(\pi_f(k)\) be the least element of \(f(H)\) not equal to \(\pi_f(m)\) for some \(m<k\). Define \(\pi_g:\omega\to\omega\) similarly using \(\pi(A)\), \(\pi(H)\), and \(g(\pi(H))\) in place of \(A\), \(H\), and \(f(H)\) respectively. Then \(\pi_f\) and \(\pi_g\) are \(A\)-computable because \(H\), \(f\), and \(g\) are, and it is a permutation because \(f\) and \(g\) are bijections (from \(A\) and \(\pi(A)\) to \(\omega\) respectively) which have been modified to be total without violating injectivity or surjectivity.\ \ Now we shall compute \(\pi_g(\pi(\pi_f^{-1}(B\setminus f(H))))\). As \(f(B\triangleright A)=B\) and \(f\) agrees with \(\pi_f\) on \(\overline{H}\), \[\pi_f^{-1}(B\setminus f(H))=(B\triangleright A)\setminus H\] Furthermore \[\pi((B\triangleright A)\setminus H)=\pi(B\triangleright A)\setminus\pi(H)\] As \(g(\pi(B\triangleright A))=X\) and \(\pi_g\) agrees with \(g\) on \(\overline{\pi(H)}\), \[\pi_g(\pi(B\triangleright A)\setminus\pi(H))=g(\pi(B\triangleright A))\setminus g(\pi(H))=X\setminus g(\pi(H))\] Thus \(\pi_g(\pi(\pi_f^{-1}(B\setminus f(H))))=X\setminus g(\pi(H))\). As \(\overline{\rho}(g(\pi(H))=0\), Lemma [\[densityzero\]](#densityzero){reference-type="ref" reference="densityzero"} shows \[\overline{\rho}(X\setminus g(\pi(H)))=\overline{\rho}(X)\] By the definition of \(X\), \[\overline{\rho}(X)=\overline{\rho}(\pi(B\triangleright A)\triangleleft\pi(A))\] which is greater than \(\beta\) by the above. As \(B\setminus f(H)\subseteq B\), \[\pi_g(\pi(\pi_f^{-1}(B\setminus f(H))))\subseteq\pi_g(\pi(\pi_f^{-1}(B)))\] and thus \[\overline{\rho}(\pi_g(\pi(\pi_f^{-1}(B))))\geq \overline{\rho}(\pi_g(\pi(\pi_f^{-1}(B\setminus f(H)))))\] Therefore \[\overline{\rho}(\pi_g(\pi(\pi_f^{-1}(B))))\geq \overline{\rho}(\pi(B\triangleright A)\triangleleft\pi(A))>\beta\] As \(\pi_g\circ\pi\circ\pi_f^{-1}\) is an \(A\)-computable permutation, \(P_A(B)\neq\beta\).\ \ Therefore we have proved that if there is some computable permutation \(\pi\) such that \(\overline{\rho}(\pi(B\triangleright A))>\alpha\beta\), then \(P_A(B)\neq \beta\). If there is no such permutation, then there must be a computable permutation \(\pi\) such that \(\underline{\rho}(\pi(B\triangleright A))<\alpha\beta\) because we assumed \(P(B\triangleright A)\neq\alpha\beta\). As \(A=(B\triangleright A)\sqcup(\overline{B}\triangleright A)\), \(\pi(A)=\pi(B\triangleright A)\sqcup\pi(\overline{B}\triangleright A)\). Therefore \[\overline{\rho}(\pi(\overline{B}\triangleright A))=\overline{\rho}(\pi(A)\setminus\pi(B\triangleright A))\] The fact that \(\rho_n(\pi(A))=\rho_n(\pi(B\triangleright A))+\rho_n(\pi(A)\setminus\pi(B\triangleright A))\) combined with the properties of the limit superior with regards to subtraction implies \[\overline{\rho}(\pi(A)\setminus\pi(B\triangleright A))\geq\overline{\rho}(\pi(A))-\underline{\rho}(\pi(B\triangleright A))\] We know that \(\overline{\rho}(\pi(A))=\alpha\) because \(P(A)=\alpha\). As we assumed that \(\underline{\rho}(\pi(B\triangleright A))<\alpha\beta\), \[\overline{\rho}(\pi(\alpha))-\underline{\rho}(\pi(B\triangleright A))>\alpha-\alpha\beta=\alpha(1-\beta)\] Bringing this together, \[\overline{\rho}(\pi(\overline{B}\triangleright A))>\alpha(1-\beta)\] Thus we can apply the first case of the proof to show that \(P_A(\overline{B})\neq 1-\beta\), which automatically implies \(P_A(B)\neq\beta\), so we are done. ◻ It is natural to ask if any of the intrinsic density requirements in Theorem [\[core\]](#core){reference-type="ref" reference="core"} can be dropped. It is immediate that we cannot drop the requirement that \(A\) has intrinsic density: \(P_A(\omega)=1\) for any \(A\), so \(\omega\) always satisfies the requirements on \(B\), but \(\omega\triangleright A=A\), so \(A\) must have intrinsic density. Similarly, \(B\triangleright\omega=B\) for any \(B\), so \(B\) must have intrinsic density. Therefore the only possible weakening of Theorem [\[core\]](#core){reference-type="ref" reference="core"} would be to require \(P(B)=\beta\) as opposed to \(P_A(B)=\beta\). However, this fails. # Intrinsic Density \(r\) sets which cannot compute an \(r\)-random We are now ready to construct sets of intrinsic density \(r\) which cannot compute an \(r\)-random set. To do this, we would like to have a countable collection of sets which all have intrinsic density relative to each other so that we may apply Theorem [\[core\]](#core){reference-type="ref" reference="core"} repeatedly. Jockusch and Schupp proved that asymptotic density enjoys a restricted form of countable additivity: if there is a countable sequence \(\{S_i\}_{i\in\omega}\) of disjoint sets such that \(\rho(S_i)\) exists for all \(i\) and \[\lim_{n\to\infty} \overline{\rho}(\bigsqcup_{i>n} S_i)=0\] then \[\rho(\bigsqcup_{i\in\omega}S_i)=\mathop{\Sigma}_{i=0}^\infty \rho(S_i)\] The intrinsic density analog of this results follows immediately from the fact that permutations preserve disjoint unions. That is, if there is a countable sequence \(\{S_i\}_{i\in\omega}\) of disjoint sets such that \(P(S_i)\) exists for all \(i\) and \[\lim_{n\to\infty} \overline{P}(\bigsqcup_{i>n} S_i)=0\] then \[P(\bigsqcup_{i\in\omega}S_i)=\mathop{\Sigma}_{i=0}^\infty P(S_i)\] Note that \(\lim_{n\to\infty}\overline{P}(\bigsqcup_{i>n} A_i)=0\) must be true for any sequence satisfying Lemma [\[randomsequence\]](#randomsequence){reference-type="ref" reference="randomsequence"}, as \(\lim_{n\to\infty} P(\bigsqcup_{i\leq n} A_i)=1\). This together with the previous lemma allows us to construct our desired set. From each such set, we may use Theorem [\[theoremwithin\]](#theoremwithin){reference-type="ref" reference="theoremwithin"} to generate more examples. # Closing Remarks and Future Work We showed a computational separation between the notions of intrinsic density and randomness by constructing examples of sets with intrinsic density \(r\) which cannot compute \(r\)-random sets. There is room for future work in investigating whether this can be done for all \(r\), or at least for all noncomputable \(r\).\ \ Additionally, there is room for applying these techniques to compare other notions of stochasticity with randomness. Many of the results proved for intrinsic density have analogs for MWC stochasticity, however it is currently open whether infinite unions work in that setting as they do for intrinsic density. Thus the analog of Theorem [\[every\]](#every){reference-type="ref" reference="every"} for MWC stochasticity remains open. [^1]: Astor proved this for the special case when \(A\) has intrinsic density \(\alpha\) and \(B\) is 1-random relative to \(A\).
{'timestamp': '2021-05-13T02:01:20', 'yymm': '2005', 'arxiv_id': '2005.14307', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14307'}
# Introduction The field of network medicine has gained tremendous traction in recent years. With the growth of public disease datasets and development in computational methods, several recent works have attempted to use data-driven methods to study disease progression. Network medicine offers innovative data-driven solutions to disease modeling through analyzing complex interactions within data. For instance, identifies disease-related genetic variants through network-based studies of the human disease network (i.e. the 'diseaseome'), in which diseases are linked if they share one or more associated genes. Functional brain networks for neurobiologically relevant graphical properties of Alzheimers disease are analyzed in. However, network-based patient subtyping based not only on disease variable values but also on their trajectories, i.e., evolution of variable patterns, is relatively unexplored. Parkinson's Disease, a degenerative neurological disorder, is the second most common neurodegenerative disorder following Alzheimer's disease, affecting an estimated 7-10 million people worldwide. It is both chronic, meaning it persists over a long duration, and progressive, meaning symptoms, such as tremor, loss of memory, impaired balance etc. worsen with time. In addition, it is a highly variable disease, with rate and type of progression differing significantly across the population. It is increasingly evident that Parkinson's disease is not a single entity but rather a heterogeneous disorder with multiple subtypes. Several studies have attempted to classify patients into subtypes.Two recent studies have developed models of PD progression based on clinical, demographic and genetic data at baseline, using hierarchical cluster analysis and a Bayesian multivariate predictive inference platform, to identify PD subtypes. However, there is no overall consensus on Parkinson's subtypes, and little is known about the effect of the interplay between different types of variables on Parkinson's progression. Early recognition of patient subtype allows medical workers to employ subtype-specific treatment, potentially improving and prolonging life. However, current approaches in Parkinson's subtyping have largely not explored data-driven analyses to unravel multiple complex influences of a large number of longitudinal variables on disease progression. Sophisticated data-driven methods are required to extract meaningful information effectively from medical datasets. In recent years, several deep learning approaches to disease-subtyping have emerged. However, such approaches are limited in extracting interpretable information about the micro-structure of the subtypes, i.e., the variable relationships that underlie the subtype. In contrast, network science approaches offer an intuitive visualization for modeling relationships between different types of variables. Additionally, evolving interactions between variables are easily represented through a multi-layer structure. Significant research has been done in clustering in a multi-layer network. However, subtyping through trajectory clustering is relatively unexplored in network medicine. This work presents a novel multi-layer-network-based Trajectory Clustering (TC) algorithm to identify disease subtypes based on similarities in trajectories through variable clusters. First, it identifies variable-communities (clusters of variables that co-express) through modeling patient-variable interactions as a bipartite network. It then tracks patient-memberships through multiple layers of variable-communities to define their trajectories. Lastly, disease subtypes are identified by clustering similar trajectories. To the best of the author's knowledge, the only other work with a trajectory-based approach to Parkinson's subtyping is the author's previous work. While their research questions and data are the same as those in this paper, defines trajectories as matrices (and implements a trajectory *profile* clustering) which is fundamentally different than the method proposed in this paper, and yields different, although complementary, results. Additionally, it is a first-order method. In contrast, this paper defines trajectories through a multi-layer network and identifies subtypes using a graph-based second-order trajectory clustering. The novel contributions of this approach are multifold: (1) a unique subtyping approach on graphs with intuitive visualization of trajectories, (2) identification of co-expressing variable clusters in the stacked-multi-layer network offering a variable-centric perspective to disease progression (3) studying disease progression as a function of *any* outcome variable (with results presented for outcome variable MDS-UPDRS3). The contributions of this work are distinct from and complementary to those in. The contributions of this work are (a) extracting clusters of co-expressing variables at different stages of disease, and (b) identifying subtypes based on similarities in disease trajectories. The set of variable clusters identified by our network are in agreement with Parkinson's disease domains recognized in medical literature. Disease subtypes identified are shown to be statistically distinct and are supported by the results in. This easily generalizable approach for multi-layer trajectory clustering presents a unique way for extracting patterns of disease progression in complex longitudinal medical data, and helps bridge the gap between data-based computational approaches and applied medicine. # Data Data used in the preparation of this article was obtained from the Parkinson's Progression Markers Initiative (PPMI) database (www.ppmi-info.org/data). It consists of patient variable values across 5 timepoints: baseline year (denoted as year0) and years-1,2,3, and 4. Upon excluding patients with incomplete data, 194 patients remained in the analysis.The dataset categorizes the clinical variables into domains (Cognitive, Behavioral, Sleep, PD Severity, Autonomic, Disability) based upon functionality as shown in [\[data\]](#data){reference-type="ref" reference="data"}. Variable data is obtained from commonly used standard medical tests, a few of which are outlined below. JOLO is a standardized test of visuospatial skills. SDM is a test measuring neurological information processing speed and efficiency using a symbol/digit substitution tasks. HVLT is a word-learning test that measures episodic verbal memory and recall ability. SEADL assesses the difficulties patients have completing daily activities or chores. EPS test scores give a subjective measure of a patient's daytime sleepiness. STAI is used in clinical settings to diagnose anxiety and to distinguish it from depressive syndromes. The MDS-UPDRS scale includes series of ratings for typical Parkinson's symptoms that cover all of the movement hindrances of Parkinson's disease and consist of Mentation, Behavior and Mood, Activities of Daily Living, Motor sections etc. According to PPMI, motor assessment for variables in this dataset was performed in a 'practically defined off' state, i.e., subjects are asked to withhold medication prior to the assessment for 12 hours, practically eliminating medication effects on motor symptoms. # Network Architecture: Stacked Multi-layer Network {#bip} Variable-communities within each layer are identified and stacked to create a multi-layer framework across which patient trajectories are defined. This proceeds as follows: 1. Within each layer, individual-variable relationships for \(I\) patients and \(V\) relationships, are modeled as a bipartite network. Bipartite networks are graphs consisting of two sets of disjoint and independent nodes, such that there exist no edges between nodes belonging to the same set. They are a natural choice for modeling relationships between two different classes (in this case patients variables). The adjacency matrix \(Z\) of the bipartite network is created as follows: - The 'direction' of each variable is determined. If disease progression (how severely a patient is affected) is positively correlated with values of the disease variable \(v\)) then the direction of the variable \(d_v\) is set as +1, and if disease-affection is negatively correlated with disease variable values, then \(d_v =-1\). These directions are standard and well known for variables in the PPMI clinical data. Variables ESS, RBDQ, GDS, STAI, MDS-UPDRS-1,2,3,T and Age have \(d_v =1\) and HVLT, JOLO, SFT, LNS, SDM, MoCA, SEADL have \(d_v =-1\). - The value (\(F_{iv}\)) of variable \(v\) in individual \(i\) is then converted to a z value, \(z_{iv}\) that normalizes it between \(0\) and \(1\), \[z_{iv} =\frac{F_{iv}-\min_{j \in I}F_{jv}}{\max_{j \in I}F_{jv}-\min_{j \in I}F_{jv}}.\] These z values are continuous and non-thresholded. - The adjacency matrix \(Z\) of size \(I \times V\) for the patient-variable bipartite network is populated as \[Z_{ij} = \cases{ z_{iv} \quad &if \(d_v=1\) \\ 1-z_{iv} \quad &if \(d_v=-1\).}\] 2. An independent patient-variable bipartite network is generated for each layer (an illustrative bipartite network is shown in figure [\[mult_bip\]](#mult_bip){reference-type="ref" reference="mult_bip"} (left)), where a layer could represent a time-point or a range of outcome variable values. An outcome variable is simply any variable as a function of which one may desire to measure disease progression as indicated by non-outcome variables. This paper presents results for outcome variable chosen to be MDS-UPDR3. Then Louvain community detection is implemented on the bipartite network for each layer \(l\). Louvain community detection yields the number of communities through optimization of the Newman-Girvan modularity function and has no hyperparameters. It identifies variable-communities \(C_k^l\), where \(k \in [0, \ldots, K_l-1]\), comprising of patients and variables (shown through shaded ovals in figure [\[mult_bip\]](#mult_bip){reference-type="ref" reference="mult_bip"} (left)), and \(K_l\) is the total number of variable-communities in layer \(l\). The TC algorithm to cluster patient trajectories (and hence patients) is presented in sec. [4](#tc_bip){reference-type="ref" reference="tc_bip"}. 3. These variable-communities in each layer, variable-community represented as a node, are stacked across all layers as shown in figure [\[mult_bip\]](#mult_bip){reference-type="ref" reference="mult_bip"}(right). This is the stacked multi-layer graph (\(G\)). Each individual belongs to a variable-community \(C_k^l\) at each time-point. One can then track individual \(i\) membership over time to define a patient trajectory \(T_i\). # Trajectory Clustering Algorithm {#tc_bip} Each node in \(G\) is a variable-community. Trajectory Clustering (TC) is a second-order algorithm identifies patient subtypes based by clustering patients with similar trajectories of disease progression on the stacked multi-layer network \(G\) as follows: 1. 'Node closeness' \(cl(X,Y)\) between two nodes \(X\) and \(Y\) in graph \(G\) is defined as the fraction of whole or partial trajectories passing through \(X\) and \(Y\) that overlap. Suppose \(A\) and \(B\) are sets of all edges (both inter-layer and intra-layer), with repetition, that belong to trajectories passing through node \(X\) and node \(Y\) respectively, then node closeness between is defined as \[cl(X,Y)=\frac{\#(A \cap B )}{\#( A \cup B)}.\] where \(\#\) denotes the size of a set. Note that \(cl(X,X)=1.\) Figure [\[mult_bip\]](#mult_bip){reference-type="ref" reference="mult_bip"} (b) presents a simple example of node closeness calculated between nodes \(X\) and \(Y\). There is one overlapping edge-pair \(A_2, B_2\) on trajectories passing through nodes \(X,Y\), and the total size of the set of edges on these trajectories is \(3\). Hence, \(cl(X,Y)=1/3\). 2. Trajectory Similarity (\(\eta(T_i,T_j)\)) between two individual (patient) trajectories \(T_i\) and \(T_j\) is then given by \(\Sigma_{t}cl(X(t)_{T_i},Y(t)_{T_j})\), where \(X(t)_{T_i}\) is the node \(X(t)\) that trajectory \(T_i\) passes through at timepoint \(t\). \(\eta(T_i,T_j)\) measures not just first-order similarities between two trajectories, but also second-order similarities i.e., interactions between two non-overlapping trajectories that result from their mutual overlap with a third set of trajectories. Important properties of the second-order TC algorithm are outlined in [\[timex\]](#timex){reference-type="ref" reference="timex"}. 3. A patient-patient network \(P\) is created whose adjacency matrix is given by \[P_{i,j}= \eta(T_i,T_j).\]. The network P contains information of how similar patients are in terms of their disease trajectories. \(P_{i,j}\) gives the trajectory similarity \(\eta(T_i,T_j)\) between patients \(i\) and \(j\). Thus a higher value of \(P_{i,j}\) indicates that patients \(i\) and \(j\) are connected with a higher weight in the network \(P\) and are correspondingly more likely to have similar disease progression patterns. \(P\) is a symmetric matrix with \(P_{i,i}=1\). 4. Louvain community detection is implemented on the network P (for 100 runs), and the maximally occuring communtiy configuration over all runs was chosen to obtain \(M\) trajectory-communities \(S_k\) (where \(k \in [0, \ldots M-1]\)) with similar disease progression trajectories. In a modularity maximizing algorithm such as Louvain, the optimal number of trajectory-communities are unconstrained and automatically identified to correspond to the configuration with maximal modularity (a commonly used metric for community detection in networks). # Results ## Bipartite variable-communities Upon creating an individual-variable network for each layer (where each layer is a timepoint) as in figure [3](#bip){reference-type="ref" reference="bip"} (left), Louvain community detection is performed on each layer. Figure  [\[multi\]](#multi){reference-type="ref" reference="multi"} shows the communities \(C_l\) identified in each layer \(l\) comprising of individuals as well as dominant variable. These variable-communities are characterized by the dominant disease variables that belong to them (listed above each variable-community in figure [\[multi\]](#multi){reference-type="ref" reference="multi"}). The variable-communities are indicative of sets of variables that patients co-express with high severity in different stages of the disease. For instance, the last panel (bottom row) in the baseline year indicates that in early stages of disease, patients displaying severity in variable GDS for instance, are also likely to display severity in STAI. While variables are treated independently in this analysis, the emergent variable-community structure is largely consistent with domain structure in medical literature. The composition of variable-communities remains similar across the layers. Age and JOLO (a cognitive variable) cluster together in all layers. Another variable-community comprises of all the other cognitive variables. Disability (SEADL) and General PD Severity Variables (PD-1,2,3,T) commonly co-express with high severity together in all layers except in the baseline year where PD-1 is found to co-express with Autonomic (SCOPA-AUT) and Sleep (RBDQ) variables. As General PD Severity variables represent motor functioning, their co-occurence with disability is expected. Sleep and Autonomic variables often clustered together in several layers. Mental Health variables (GDS, STAI) initially form an independent variable-community, however, as time progresses, they co-express with high severity with PD Severity and Disability domains. Deterioration of mental health is expected with worsening motor skills and increased disability, particularly in later stages of disease progression. The clustering of variables in the same domain is further validation of our method yielding medically relevant results. The individuals within each variable-community have relatively high average severity of corresponding variables that characterize the community. ### Statistical analysis The Kruskal-Wallis statistical test is an estimate of whether two variables are sampled from the same distribution. Kruskal-Wallis test for multiple groups was conducted to validate this approach and demonstrate some of the differences between variable-communities. This test is chosen because it is applicable in cases such as this where values for several of the variables violate the normality assumption. ::: Table [1](#stat2){reference-type="ref" reference="stat2"} tabulates the medians and the p-values of the Kruskall-Wallis statistical test to study statistical differences in the growth of variables across layers between individuals belonging to the different variable-communities. Variables with negative directions are denoted by an asterisk (\*). To account for Type I errors due to multiple comparisons the Benjamini-Hochberg False Discovery Rate method is used. This gives us an adjusted significance level for each of the p-values \(\alpha_{adjusted} = \frac{\alpha \times i}{n_c}\), where \(n_c\) is the total number of comparisons, and \(i\) is the rank of the p-value. Significance value \(\alpha\) is chosen to be \(0.05\). Total number of comparisons \(n_c = N_t \times N_v = 3 \times 16 = 46\), where \(N_t\) is the number of year-differences, and \(N_v\) is the number of variables. Comparisons that do not meet the significance criteria are highlighted in bold in the table. A majority of the values are below their adjusted significance level, suggesting that there exist significant differences in variable progression of the different trajectory-communities. ## Trajectory Clustering Across an Independent Outcome Variable {#pdx} Often, medical practitioners may be interested in studying the evolution of disease variables as a function of an outcome variable (a clinical test or variable known to be indicative of specific aspects of disease progression that are of interest). This may, in particular, be useful when complete temporal data about a patient is unavailable, however comprehensive data of evolution of a specific variable is available instead. Defining layers through values of an outcome variable, allows us to identify subtypes based on trajectories through progression of an outcome variable. MDS-UPDRS-3 (divided into quartiles on the x axis) is known to be indicative of PD progression and was chosen as the outcome variable. In figure [\[PD_1\]](#PD_1){reference-type="ref" reference="PD_1"}, four disease progression trajectory-subtypes across outcome variable layers are identified. The layers are defined by raw baseline MDS-UPDRS-3 values as follows: layer low contains values below \(22.0\), layer low-mid contains values between \(22.0\) and \(31.0\), layer mid-high contains values between \(31.0\) and \(38.0\), and layer high contains values above \(38.0\). Dependent variables are chosen to be the same as in section [\[timex\]](#timex){reference-type="ref" reference="timex"}, with the exception of General PD severity variables. This method is generalizable to selection of any outcome variable. Figure [\[PD_1\]](#PD_1){reference-type="ref" reference="PD_1"} shows the subtypes identified by the trajectory clustering algorithm. The run time of the TC algorithm on the multi-layer network stacked across outcome variables is \(1.7213s\). The size of the nodes in figure [\[PD_1\]](#PD_1){reference-type="ref" reference="PD_1"} indicate the number of patient-years in that variable-community, i.e., one patient may contribute up to \(5\) times to a certain community, one for each timepoint. This implies that a patient may, in consecutive years, remain in the same variable-community, or transition to a different variable-community in the same layer, or transition to a different variable-community in a different layer. Figure [\[PD_2\]](#PD_2){reference-type="ref" reference="PD_2"}(a) shows the variable-community profile, i.e., average \(z\) values of all the patients in each community in each layer with errors given by their standard deviation. The position of variable-community profiles corresponds to the node in figure [\[PD_1\]](#PD_1){reference-type="ref" reference="PD_1"}. In figure [\[PD_2\]](#PD_2){reference-type="ref" reference="PD_2"}(a), one can see that the variables denoting a variable-community have a correspondingly higher relative \(z\) value. In figure [\[PD_2\]](#PD_2){reference-type="ref" reference="PD_2"}(b) shows the average trajectory profile as calculated in [\[tc_pr\]](#tc_pr){reference-type="ref" reference="tc_pr"} amongst for each trajectory-community across each layer. As seen in figure [\[PD_1\]](#PD_1){reference-type="ref" reference="PD_1"} and figure [\[PD_2\]](#PD_2){reference-type="ref" reference="PD_2"}(b),The green trajectory-community \(S_0\) with \(47\) patients largely remains in low to low-medium PD-3 layers, with \(101\) patient-years in layer low, and \(72\) patient-years in layer low-medium. Individuals in this trajectory-community start with low disease state (as measured by PD-3), and show slow disease progression over the years, staying in the low-medium range of disease progression. The orange trajectory-community \(S_1\) with \(44\) patient-years is the least affected. Patients are most severely affected in the Cognitive domain, however they remain largely in the low disease layer. The red trajectory-community \(S_2\) with \(58\) starts in a relatively high disease state, and consistently gets worse, whereas the blue trajectory-community \(S_3\) with \(48\) starts relatively healthy but with severe disease progression into mid-high and high layers of disease severity measured through PD-3. # Conclusion This work introduces a novel algorithm for the identification of subtypes based on relationships between trajectories through a multi-layer network. Multidimensional clinical datasets are often not used to their full potential due to the complexities of a cohesive analysis. This work extracts disease variables that co-express with high severity at different stages of disease progression. Then it extracts trajectories of progression through these variable-communities, i.e., through sets of high severity variables. Lastly, it identifies disease subtypes through clustering patient trajectories. Additionally, it promotes second-order comparisons in the calculation of \(\eta\) i.e., correlations across time between two trajectories that do not have overlapping edges but interact with common neighboring trajectories. The agreement of variable-clusters with the domain-structure e.g. Cognitive, Autonomic etc., as well as the statistical analysis, both validate the success of this approach. Parkinson's Disease has a multitude of clinical variables that interact in complex manners that vary through stages of the disease. A number of studies have identified Parkinson's subtypes based on baseline characteristics. In contrast, our novel algorithm uses longitudinal data (or patient trajectory over time) to identify disease subtypes through TC. In other words, our method accounts for both disease variable values as well as their progression patterns as a patient progresses through the different layers of the multi-layer stacked-bipartite network. While Parkinson's Disease, being both multivariate and progressive, served to demonstrate the effectiveness of the TC algorithm, the algorithm can, in principle, be easily extended to include non-clinical features, such as genetic or fluid biomarkers, as well as to other datasets. The TC algorithm identifies subtypes through clustering patient trajectories across layers. This work presents two methods of analysis and visualization of disease progression: Parkinson's disease trajectory through time, and Parkinson's disease trajectory through an outcome variable (representative of disease progression). Our second-order TC algorithm emphasizes the dynamical aspect of disease progression in addition to the static properties of the associated variables at every stage, contrary to several earlier data-driven methods in medicine that emphasize one or the other. Results are presented in an interpretable visualization that is easily accessible to and comprehensible by medical practitioners in contrast with black box methods in machine learning. The TC algorithm is a data-driven network-based method for detection of patient subtype. Like other data-driven methods, this analysis is limited by the availability and quality of the database. The number of variables provided in the database is not exhaustive in the context of Parkinson's disease. As larger datasets are made available, such results are likely to be more informative and robust. Additionally, in applying a data-driven approach to medical data, important medical decisions must always be made in conjunction with medical expertise. An advantage as well as caveat of this approach is that trajectories are tracked through variable sets, and not through individual variables. Future directions of such work would naturally include extension to other types of medical data (genetic, biomarker etc.), as well as extension to other types of time-evolving and heterogenous datasets. Additional directions of potential interest include studying disease evolution through other outcome variables, as well as treatment-based modifications to the algorithm where effects of treatment are expected during gathering of data. By the nature of such a data-driven method, this approach may not be appropriate for datasets with high variability, low quantity, or data with inconsistent temporal sampling. Parkinson's disease is a highly variable disease with a long onset time. Knowledge of which cluster a new patient belongs to in the baseline year, would allow medical practitioners to predict their subtype and corresponding trajectory, including the type and rate of disease progression. This could open up new and exciting avenues in the field of personalized medicine. Moreover, prediction of disease progression will improve prognostic counseling, a problem commonly encountered by clinicians, by highlighting predicted disease features. It will also support them in seeking more aggressive treatment for patients predicted to display rapid disease progression. Thus, this multi-layer network-based TC approach harnesses data to provide interpretable solutions in the field of early, predictive medicine. # Data and Code Availability {#data-and-code-availability .unnumbered} Data was obtained from PPMI, a public-private partnership funded by the Michael J. Fox Foundation for Parkinson's Research and funding partners, including abbvie, Allergan, Avid Radiopharmaceuticals, Biogen, Biolegend, Bristol-Myers Squibb, Celgene, Denali, GE Healthcare, Genentech, gsk, Lilly, Pfizer, Merck, MSD, Lundbeck, Piramal, Prevail Therapeutics, Roche, Sanofi Genzyme, Servier, Takeda, Teva, Ucb, Verily, Voyager Therapeutics and Golub Capital. There are no patents, products in development or marketed products to declare. Python code is available at *www.github.com/chimeraki/Multilayer-Trajectory-Clustering*
{'timestamp': '2020-08-04T02:38:04', 'yymm': '2005', 'arxiv_id': '2005.14472', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14472'}
# Introduction[\[sec:intro\]]{#sec:intro label="sec:intro"} The Drell-Yan (DY) process with pions and nucleons provides important information on the structure of pion and nucleon. The DY differential cross section in the region of low transverse momentum, \(q_T\), of the produced lepton anti-lepton pair is subject to the transverse momentum dependent factorization. The corresponding transverse momentum dependent parton distribution functions (TMDs) in the description of DY at low \(q_T\) provide essential information on correlations between transverse parton momenta and parton or nucleon spin, and describe the three-dimensional structure of hadrons. Early theoretical studies of TMDs in hadron production in proton-proton processes were followed by systematic investigations in semi-inclusive deep-inelastic scattering (SIDIS) [@Cahn:1978se; @Kotzinian:1994dv; @Kotzinian:1995cz; @Bacchetta:2006tn] and DY (also fragmentation functions enter the description of SIDIS). The basis for these descriptions are QCD factorization theorems [@Collins:1981uk; @Collins:1984kg; @Qiu:1991pp; @Ji:2004wu; @Ji:2006br; @Ji:2006vf; @Collins:2011zzd; @Aybat:2011zv; @Ma:2013aca; @Collins:2014jpa; @Collins:2016hqq]. One of the challenges when interpreting pion-induced DY data is the limited knowledge of the pion structure. At twist-2 the process is described by the proton TMDs: unpolarized distribution \(f_{1,p}^a\), transversity distribution \(h_{1,p}^a\), Sivers distribution function \(f_{1T,p}^{\perp a}\), Boer-Mulders distribution \(h_{1,p}^{\perp a}\), Kotzinian-Mulders distribution \(h_{1L,p}^{\perp a}\), and "pretzelosity" distribution \(h_{1T,p}^{\perp a}\), and pion TMDs: unpolarized distribution \(f_{1,\pi}^a\), Boer-Mulders distribution \(h_{1,\pi}^{\perp a}\). On the proton side, for \(f^a_{1,p}\) both collinear and TMD distributions are well-known [@Gluck:1991ng; @Gluck:1994uf; @Gluck:1998xa; @Martin:2009iq; @Harland-Lang:2014zoa; @Dulat:2015mca; @Landry:2002ix; @Anselmino:2013lza; @Signori:2013mda; @Bacchetta:2019sam; @Scimemi:2019cmh]. Based on global QCD analyses of data, parametrizations are available also for \(f_{1T,p}^{\perp a}\), \(h_{1,p}^a\), \(h_{1,p}^{\perp a}\), \(h_{1T,p}^{\perp a}\). Only \(h_{1L,p}^{\perp a}\) has not yet been extracted, though it can be described based on \(h_{1,p}^a\) in the so-called Wandzura-Wilczek-(WW-)type approximation which is compatible with available data . On the pion side the situation is different. While extractions of \(f_{1,\pi}^a\) exist, no results on \(h_{1,\pi}^{\perp a}\) are available. This constitutes a "bottleneck" if one would like to describe the pion-induced DY data, e.g. COMPASS results, based solely on phenomenological extractions since \(h_{1,\pi}^{\perp a}\) is relevant for the majority of observables in the pion-induced polarized DY process at leading twist. In this situation we will resort to model studies of the pion Boer-Mulders function \(h_{1,\pi}^{\perp a}\). An important goal of theoretical studies in models is to describe hadron structure at a low initial scale \(\mu_0< 1\,{\rm GeV}\) in terms of effective constituent quark degrees of freedom. This approach has been successful in describing various hadronic properties in terms of "valence-quark degrees of freedom." The underlying idea is that at a low hadronic scale \(\mu_0\), for example the properties of the nucleon can be modelled in terms of wave functions of valence \(u\) and \(d\) quarks, and similarly the properties of the \(\pi^-\) in terms of the wave functions of valence \(\bar u\) and \(d\) quarks. It is an interesting task in itself to apply such a framework to the description of hadronic properties like TMDs. This has been done in a variety of complementary approaches including chiral quark models  and generalizations , spectator models (SPMs) [@Jakob:1997wg; @Gamberg:2007wm; @Gamberg:2009uk; @Bacchetta:2008af; @Lu:2004hu], light-front constituent quark model (LFCQM) [@Pasquini:2008ax; @Pasquini:2010af; @Lorce:2011dv; @Boffi:2009sh; @Pasquini:2011tk; @Pasquini:2014ppa; @Lorce:2014hxa; @Lorce:2016ugb] or bag models [@Yuan:2003wk; @Avakian:2008dz; @Courtoy:2008vi; @Courtoy:2008dn; @Avakian:2010br]. Phenomenological studies in the LFCQM showed that within a model accuracy of 20-30\(\%\) a good description of SIDIS and unpolarized DY data can be obtained. The goal of the present work is to study the spin and azimuthal asymmetries in the DY process with pions and polarized nucleons, and to present calculations for all twist-2 asymmetries. We use available phenomenological extractions of TMDs and calculations from two well-established constituent-quark-models (CQM), the LFCQM and the SPM. Other studies in models, perturbative QCD and lattice QCD of the pion-induced DY or relevant TMDs have been reported [@Noguera:2015iia; @Engelhardt:2015xja; @Lambertsen:2016wgj; @Chang:2018pvk; @Bacchetta:2017vzh; @Broniowski:2017gfp; @Ceccopieri:2018nop]. Several features distinguish our work from other studies. First, we use two CQM frameworks with diverse descriptions of the pion and nucleon structure. Second, we describe all leading-twist observables in pion-induced polarized DY entirely in the models. Third, we supplement our studies with "hybrid calculations", where we use as much as possible information from phenomenological analyses, and only the Boer-Mulders function \(h_{1,\pi}^{\perp a}\) is taken from models. Overall, we present up to four different calculations for each observable. This allows us to critically assess model dependence, and uncertainties in our approach. Where available the results are compared to the COMPASS DY data. One key aspect in our study is the evolution of model results from the low hadronic scales to experimentally relevant scales. For that (i) knowledge of the low initial scale, and (ii) applicability of evolution equations at low scales are crucial. Both requirements are fulfilled in the case of parton distribution functions which depend on one scale only, the renormalization scale \(\mu\). First, the value of the initial quark model scale \(\mu_0\) can be consistently determined by evolving the fraction of nucleon momentum carried by valence quarks, \(M_2^{\rm val}(\mu) = \sum_a \int dx\,x(f_1^q-f_1^{\bar q})(x,\mu)\), known from parametrizations, using DGLAP evolution down to that scale \(\mu_0\) at which valence quarks carry the entire nucleon momentum, i.e. \(M_2^{\rm val}(\mu_0) = 1\). Numerically it is \(\mu_0\sim 0.5\,{\rm GeV}\). Second, works by the GRV and GRS groups on parametrizations of nucleon and pion unpolarized parton distribution functions show remarkable perturbative stability between LO and NLO fits indicating applicability of DGLAP evolution down to initial scales as low as \(\mu_0^2 = 0.26\,{\rm GeV}^2\). TMDs depend not only on the renormalization scale \(\mu\) but also on the rapidity scale \(\zeta\). The theoretical and phenomenological understanding of TMDs witnessed an incredible rate of developments in the recent years including NNLO and NNNLO calculations of the evolution kernel of unpolarized TMDs, NLO calculations for the quark helicity distribution , NLO and NNLO calculations for transversity and pretzelosity, and NLO calculations for the Sivers function . Recently also the first non-trivial expression for the small-\(b\) expansion of the pretzelosity distribution was derived. However, in the context of quark model applications we face two challenges. First, no rigorous (analog to the \(\mu_0\)-determination) criterion exists to fix the value of the initial rapidity scale \(\zeta_0\) of quark models, though an educated guess may be \(\zeta_0\sim\mu_0^2\). Secondly, in the case of Collins-Soper-Sterman (CSS) or TMD evolution , no expertise is available analogous to the GRV/GRS applications of DGLAP evolution starting from low hadronic scales. In this situation in previous quark model studies, TMD evolution effects were often estimated approximately based on an heuristic Gaussian Ansatz for transverse parton momenta with energy dependent Gaussian widths. While providing a useful description of data on many processes including pion-induced Drell-Yan, it is important to improve the simple Gaussian treatment in view of the recent progress in the TMD theory . We will therefore use TMD evolution  at Next-to-Leading Logarithmic (NLL) precision to describe the transverse momentum dependence of the Drell-Yan process. At present, application of TMD evolution at the low quark model scales below 1 GeV is not known. Therefore, we shall proceed in two steps. We will evolve weighted transverse moments of TMDs from the low initial scale \(\mu_{0}^{2}\) to a scale of \(Q_0^2=2.4\,{\rm GeV}^2\) where phenomenological information on transverse momentum dependence is available from TMD fits  of polarized and unpolarized SIDIS, DY and weak boson productions data. Then we use NLL TMD evolution to evolve to the scales relevant in the COMPASS Drell-Yan measurements, i.e., \(\langle Q^2\rangle=28\,{\rm GeV}^2\). In this way we will be able to test the \(x\)-dependencies of the model TMDs while the \(q_T\)-dependencies of the DY observables are described on the basis of TMD fits. For completeness we remark that the importance of TMD evolution for the description of pion-induced DY and the recent COMPASS data was also studied in Refs. [@Wang:2017zym; @Vladimirov:2019bfa; @Li:2019uhj; @Ceccopieri:2018nop; @Wang:2018naw; @Wang:2018pmx]. Our results serve several purposes. They help to interpret in their full complexity the first COMPASS data on the pion-induced polarized DY process, and in this way deepen the understanding of the QCD description of deep-inelastic processes in terms of TMDs. They also provide quantitative tests of the application of CQMs to the description of pion and nucleon structure. # Drell-Yan process with pions and polarized protons {#sec-2} In this section we briefly review the DY formalism, and provide the description of the DY structure functions in our approach. ## Structure functions {#sec-2.1} In the tree-level description a dilepton \(l,\,l^\prime\) is produced from the annihilation of a quark and antiquark carrying the fractions \(x_\pi\), \(x_p\) of the longitudinal momenta of respectively the pion and the proton. The process is shown in the Collins-Soper frame in Fig. [\[Fig-01:kinematics\]](#Fig-01:kinematics){reference-type="ref" reference="Fig-01:kinematics"}. In the case of pions colliding with polarized protons the DY cross section is described in terms of six structure functions, \[\begin{aligned} F_{UU}^1 &=& \phantom{-} {\cal C} \bigg[f_{1,\pi}^{\bar a} \; f_{1,p}^{a}\;\bigg], \nonumber \\ F_{UU}^{\cos 2\phi} &=& \phantom{-} {\cal C} \bigg[ \frac{2(\hhat \cdot \vkTpi)(\hhat \cdot \vkTN) -\vkTpi \cdot \vkTN}{M_\pi \; M_p} \; h_{1,\pi}^{\perp \bar a} \; h_{1,p}^{\perp a} \; \bigg], \nonumber \\ F_{UL}^{\sin 2\phi} &=& -{\cal C} \bigg[ \frac{2(\hhat \cdot \vkTpi)(\hhat \cdot \vkTN) -\vkTpi \cdot \vkTN}{M_\pi \; M_p} \; h_{1,\pi}^{\perp\bar a}\; h_{1L, p}^{\perp a} \; \bigg], \nonumber \\ F_{UT}^{\sin \phi_S} &=& \phantom{-} {\cal C} \bigg[ \frac{\hhat \cdot \vkTN}{M_p} \; f_{1,\pi}^{\bar a} \; f_{1T, p}^{\perp a} \; \bigg], \nonumber \\ F_{UT}^{\sin (2\phi-\phi_S)} &=& -{\cal C} \bigg[ \frac{\hhat \cdot \vkTpi}{M_\pi} \; h_{1,\pi}^{\perp\bar a} \;h_{1, p}^{a} \; \bigg], \nonumber\\ F_{UT}^{\sin (2\phi + \phi_S)} &=& -{\cal C} \bigg[ \frac{2(\hhat \cdot \vkTN) \big[2(\hhat \cdot \vkTpi)(\hhat \cdot \vkTN) -\vkTpi \cdot \vkTN \big] -\vkTN^2(\hhat \cdot \vkTpi)}{2 \; M_\pi \; M_p^2} \, h_{1, \pi}^{\perp\bar a}\, h_{1T, p}^{\perp a} \; \bigg]. \quad \quad \label{Eq:SFs} \end{aligned}\] The subscripts indicate the hadron polarization which can be unpolarized \(U\) (pions, protons), longitudinally \(L\), or transversely \(T\) polarized (protons). The azimuthal angles \(\phi\), \(\phi_S\) are defined in Fig. [\[Fig-01:kinematics\]](#Fig-01:kinematics){reference-type="ref" reference="Fig-01:kinematics"}, where the unit vector \(\hhat=\qT/q_T\) points along the \(x\)-axis. Notice that in the Collins-Soper frame the dilepton is at rest, and each incoming hadron carries the transverse momentum \(\qT/2\), see Fig. [\[Fig-01:kinematics\]](#Fig-01:kinematics){reference-type="ref" reference="Fig-01:kinematics"}. The convolution integrals in Eq. [\[Eq:SFs\]](#Eq:SFs){reference-type="eqref" reference="Eq:SFs"} are defined as  \[\label{Eq:convolution-integral} {\cal C}\bigl[\omega \, f_{\pi}^{\bar a} \, f_p^{a}\bigr] = \frac{1}{N_c} \; \sum_a e_a^2\int d^2\kTpi \, d^2\kTN \, \delta^{(2)}(\qT-\kTpi-\kTN) \, \omega \, f_{\pi}^{\bar a}(x_\pi,\kTpi^2)f_p^{a}(x_p,\kTN^2)\,,\] where \(\omega\), which is a function of the transverse momenta \(\kTpi\), \(\kTN\) and \(\qT\), projects out the corresponding azimuthal angular dependence. The sum over \(a=u,\,\bar{u},\,d,\,\bar{d},\,\dots\) includes the active flavors. This partonic interpretation of DY is based on a TMD factorization  and applies to the region \(q_T\ll Q\). The TMDs depend on renormalization and rapidity scales which are not indicated for brevity in ([\[Eq:SFs\]](#Eq:SFs){reference-type="ref" reference="Eq:SFs"}) and ([\[Eq:convolution-integral\]](#Eq:convolution-integral){reference-type="ref" reference="Eq:convolution-integral"}), and will be discussed in section [2.2](#sec-2.2){reference-type="ref" reference="sec-2.2"}. The focus of our work is on asymmetries of the kind \[\label{Eq:Asym.def} A_{XY}^{\rm weight}(x_\pi, x_p, q_T, Q^2)= \frac{F_{XY}^{\rm weight}(x_\pi, x_p, q_T, Q^2)}{F_{UU}^1(x_\pi, x_p, q_T, Q^2)},\] where various types of higher order corrections tend to largely cancel out [@Ratcliffe:1982yj; @Weber:1991wd; @Vogelsang:1992jn; @Contogouris:1994ws; @Gehrmann:1997pi; @Bunce:2000uv; @Shimizu:2005fp]. The \(Q^2\) dependence of the structure functions and asymmetries will often not be explicitly indicated for brevity. In the following we will display results for the asymmetries as functions of one of the variables \(x_\pi\), \(x_p\), \(q_T\). It is then understood that the structure functions are integrated over the other variables within the acceptance of the experiment, keeping in mind that \(x_\pi, \, x_p\) are connected to each other by \(x_\pi \, x_p = Q^2/s\), where \(s\) is the center of mass energy squared. ## QCD evolution of Drell-Yan structure functions {#sec-2.2} The basis for the evolution are TMD factorization theorems  which constrain the operator definition and define the QCD evolution of TMDs. Here we will adopt the CSS framework and use the TMD evolution formalism starting from a fixed scale \(Q_0\) in the structure functions from Eqs. [\[Eq:SFs\]](#Eq:SFs){reference-type="eqref" reference="Eq:SFs"}. The evolution of TMDs is a double-scale problem, and can be implemented in momentum space or impact-parameter space with examples for both approaches in the literature . In our work we choose to implement the TMD evolution in the impact-parameter space with \({\boldmath b_{T}}\) the Fourier-conjugate variable to \(\kTh\) where index \(h = \pi\) or \(p\) refers to pion or nucleon. The TMDs in the impact-parameter space are generically given by \(\tilde f(x_h,{ b_{T}},\mu,\zeta)\) where \(\mu\sim Q\) is the "standard" renormalization scale for ultraviolet logarithms, and \(\zeta\sim Q^2\) is the rapidity renormalization scale. In principle one can solve TMD evolution equations starting from some initial scale \(Q_0\) without employing operator product expansion at low \({\boldmath b_{T}}\), Ref. . The TMD at this initial scale is then \(f(x_h,{b_{T}},Q_0,Q_0^2)\). In this formulation the unpolarized structure function is similar to parton model result and is expressed as  \[\begin{aligned} \label{FUUbspace} F_{UU}^1(x_\pi,x_p,q_T,Q^2) &= \frac{1}{N_c} \sum_a e_a^2 {\cal H}^{(DY)}(Q,\mu_Q)\int \frac{b_{T} d b_{T}}{2\pi} J_0 (q_T b_{T}) \nonumber \\ & \times f_{1,\pi}^{\bar a}(x_\pi,{b_{T}},Q_0,Q_0^2) \tilde f_{1,p}^a(x_p,{b_{T}},Q_0,Q_0^2)\, e^{-S(b_{T},Q_0,Q,\mu_Q)}\;, \end{aligned}\] where the factor \(S(b_T,Q_0,\mu_Q)\) contains important effects of gluon radiation with \(S(b_T,Q_0,Q_0) = 0\) by construction . The hard factor \({\cal H}(Q,\mu_Q)\) is  \[\begin{aligned} {\cal H}^{(DY)}(Q,\mu_Q) = 1 + \frac{\alpha_s(\mu_Q)}{2 \pi} C_F \left( 3 \ln \left( \frac{Q^2}{\mu_Q^2}\right)-\ln^2 \left( \frac{Q^2}{\mu_Q^2}\right) +\frac{7\pi^2}{6}-8\right)\; + {\cal O} (\alpha_s^2), \label{eq:hard} \end{aligned}\] where \(C_F=4/3\) and \(\alpha_s\) is the strong coupling constant. One can parametrize TMDs at initial scale \(Q_0\) as \[\label{Ansatzbspace} \tilde f_{1,p}^{a}( x_p,{ b_{T}},Q_0,Q_0^2) = f_{1,p}^{a} ( x_p,Q_0) \; e^{-\frac14 b_{T}^2 \la k_{Tp}^2 \ra_{f_{1,p}}} \,,\] \[\label{Ansatzbspace1} \tilde f_{1,\pi}^{a}(x_\pi,{ b_{T}},Q_0,Q_0^2) = f_{1,\pi}^{a} (x_\pi,Q_0) \; e^{-\frac14 b_{T}^2\la k_{T \pi}^2 \ra_{f_{1,\pi}}} \,,\] where \(x\)-dependent functions correspond to collinear distributions and the exponential factors are "primordial shapes" of TMDs at the initial scale. This particular dependence is often used in phenomenology, corresponds to the Gaussian Ansatz and is supported in models. The average widths of TMDs may be flavor-and \(x\)-dependent and will be taken from phenomenological parametrizations at \(Q_0^2\). Based on the \(b_T\) space formalism given in Ref.  we write down the rest of the twist-2 structure functions. We use the convenient notation from Ref. , \[\begin{aligned} {\cal B}_n[\tilde f_{\pi}\; \tilde f_{p}] & \equiv \frac{1}{N_c} \sum_a e_a^2 {\cal H}^{(DY)}(Q,\mu_Q) \int_0^\infty \frac{d b_T\, b_T}{2\pi}\; b_T^n \, J_n(q_T b_T) \nonumber\\ &\hskip-1cm \times \tilde f_{\pi}^{\bar a}(x_\pi,{b_{T}},Q_0,Q_0^2) \; \tilde f_{p}^{ a}(x_p,{b_{T}},Q_0,Q_0^2) \; e^{-S(b_{T},Q_0,Q,\mu_Q)}\,, \label{Eq:convBess} \end{aligned}\] which leads to the following expressions for the twist-2 structure functions, \[\begin{aligned} {F}_{UU}^1(x_\pi,x_p,q_T,Q^2) &= \phantom{-} {\cal B}_0[\tilde f_{1, \pi}\; \tilde f_{1,p}] \;, \label{e:upb} \\ {F}_{UU}^{\cos 2\phi}(x_\pi,x_p,q_T,Q^2) &= \phantom{-} M_\pi M_p \; {\cal B}_2[\tilde h_{1,\pi}^{\perp(1)}\; \tilde h_{1,p}^{\perp(1)}]\;, \label{e:bmb} \\ {F}_{UL}^{\sin 2\phi}(x_\pi,x_p,q_T,Q^2)&= -M_\pi M_p \; {\cal B}_2[\tilde h_{1,\pi}^{\perp(1)}\; \tilde h_{1L,p}^{\perp(1)}]\;, \label{e:kotzb} \\ {F}_{UT}^{\sin \phi_S}(x_\pi,x_p,q_T,Q^2) &= \phantom{-} M_p \;{\cal B}_1[\tilde f_{1,\pi}\; \tilde f_{1T,p}^{\perp(1)}]\;, \label{e:Sivb}\\ {F}_{UT}^{\sin (2\phi-\phi_S)}(x_\pi,x_p,q_T,Q^2) &= -M_\pi \;{\cal B}_1[\tilde h_{1,\pi}^{\perp(1)}\; \tilde h_{1,p}] \label{e:bmtb}\; ,\\ {F}_{UT}^{\sin (2\phi + \phi_S)}(x_\pi,x_p,q_T,Q^2) &= -\frac{M_\pi M_p^2}{4} \; {\cal B}_3[\tilde h_{1,\pi}^{\perp(1)}\; \tilde h_{1T,p}^{\perp(2)}] \; ,\label{Eq:sfsb} \end{aligned}\] where the \(b_T\) space TMD moments  are \[\begin{aligned} \tilde f^{(n)}(x_h,b_T,Q,Q^2) &=(-1)^n n! \left(\frac{2}{M_h^2}\frac{\partial}{\partial b_T^2}\right)^n \tilde f(x_h,b_T,Q,Q^2) \;. \end{aligned}\] These moments have the important feature, \[\begin{aligned} \lim_{b_T \to 0} \tilde f^{(n)}(x_h,b_T,Q,Q^2) = f^{(n)}(x_h,Q)\;, \end{aligned}\] where \(f^{(n)}\) are conventional transverse moments of TMDs  defined as \[f^{(n)}(x_h,Q)=\int {\rm d} ^2\kTh\,\left(\frac{\kTh^2}{2M_h^2}\right)^n\,f(x_h,\kTh^2,Q,Q^2)\,, \label{e:TMDmoment}\] and \(h=\pi, p\) corresponds to pion and proton TMDs, respectively. The evolution factor \(S(b_T, Q_0, \mu_Q)\) in Eq. [\[Eq:convBess\]](#Eq:convBess){reference-type="eqref" reference="Eq:convBess"}, which results from solving the CSS evolution equation and the renormalization group equations for the rapidity dependence of the TMDs and for the soft factor , is given by \[\begin{aligned} S(b_T, Q_0, Q, \mu_Q) = -\tilde K(b_T,Q_0) \ln\frac{Q^2}{Q_0^2} + \int_{Q_0}^{\mu_Q}\frac{d\bar\mu}{\bar\mu}\left[\gamma_K(\alpha_s(\bar\mu))\ln\frac{Q^2}{\bar\mu^2}-2 \gamma_i(\alpha_s(\bar\mu);1)\right]\,, \label{e:FF_ansatz} \end{aligned}\] where \(\tilde K\) is the Collins-Soper evolution kernel, and the anomalous dimensions are \(\gamma_i(\alpha_s(\bar\mu);1)\) and \(\gamma_K(\alpha_s(\bar\mu))\) . Since the integral in Eq. [\[Eq:convBess\]](#Eq:convBess){reference-type="eqref" reference="Eq:convBess"} extends over all \(b_T\), one cannot avoid using \(\tilde K\) in the CSS evolution factor [\[e:FF_ansatz\]](#e:FF_ansatz){reference-type="eqref" reference="e:FF_ansatz"} in the non-perturbative large \(b_T\) region. In order to combine the perturbative and non-perturbative regions, we use the \(\bstarsc\) prescription , namely, \[\begin{aligned} \label{eq:bstar} \bstarsc = \frac{b_T }{\sqrt{ 1 + b_T^2/b_{\rm max}^2}}, \end{aligned}\] which introduces a smooth upper cutoff \(b_{\rm max}\) in the transverse distance. Then, the perturbative part of \(\tilde{K}\) is defined by replacing \(b_T\) by \(\bstarsc\) and the non-perturbative part is defined by the difference \(\tilde{K}(\bstarsc,\mu)-\tilde{K}(b_T,\mu)=g_K(b_T;b_{\rm max})~\). Furthermore to combine the perturbative and non-perturbative regions using the fixed scale evolution, it is optimal to use the renormalization group running scheme for \(\tilde K\) in Eq. [\[e:FF_ansatz\]](#e:FF_ansatz){reference-type="eqref" reference="e:FF_ansatz"}, evolved from the fixed scale \(Q_0\), i.e. \[\begin{aligned} \tilde K(b_T,Q_0)=\tilde K(\bstarsc,\mubstar)-\int_{\mubstar}^{Q_0}\frac{d\bar\mu}{\bar\mu}\gamma_K(\alpha_s(\bar\mu))-g_K(b_T;b_{\rm max}) \,, \end{aligned}\] where \(\mubstar\) is now chosen to become a hard scale, \[\begin{aligned} \mubstar \equiv \frac{C_1}{b_*}\,. \end{aligned}\] Now Eq. [\[e:FF_ansatz\]](#e:FF_ansatz){reference-type="eqref" reference="e:FF_ansatz"} reads  \[\begin{aligned} S(b_T,\bstarsc, Q_0, Q, \mu_Q) &= \left( g_K(b_T;b_{\rm max})-\tilde K(\bstarsc;\mubstar)+ \int_{\mubstar}^{Q_0}\frac{d\bar\mu}{\bar\mu}\gamma_K(\alpha_s(\bar\mu)) \right)\ln\frac{Q^2}{Q_0^2} \nonumber \\ + & \int_{Q_0}^{\mu_Q}\frac{d\bar\mu}{\bar\mu}\left[\gamma_K(\alpha_s(\bar\mu))\ln\frac{\mu_Q^2}{\bar\mu^2}-2 \gamma_i(\alpha_s(\bar\mu);1)\right]\,. \label{e:final} \end{aligned}\] The anomalous dimensions can be expanded as perturbative series, \(\gamma_i =\sum_{n=1}^\infty \gamma_i^{(n)} \left(\alpha_s/\pi\right)^n\), and \(\gamma_K =\sum_{n=1}^\infty \gamma_K^{(n)} \left(\alpha_s/\pi\right)^n\). In our calculations we employ them to NLL accuracy: \(\gamma_K^{(1)}\), \(\gamma_K^{(2)}\) and \(\gamma_i^{(1)}\). They are spin-independent , and given by \[\begin{aligned} \gamma_K^{(1)} =2 C_F, \quad \gamma_K^{(2)} ={C_F}\left[C_A\left(\frac{67}{18}-\frac{\pi^2}{6}\right)-\frac{10}{9}T_F \, n_f\right], \quad \gamma_i^{(1)} = \frac{3}{2} C_F \,, \end{aligned}\] where \(C_F=4/3\), \(C_A=3\), \(T_F=1/2\) and \(n_f\) is the number of active flavors. The NLL two-loop contribution for \(\tilde K\) , valid at small values of \(b_T\), is \[\begin{aligned} \tilde K (b_*;\mubstar) &=-2 C_F \frac{\alpha_s(\mubstar)}{\pi} \ln \left(\frac{b_* \mu_{b_*}}{2 e^{-\gamma_E}}\right) + \frac{C_F}{2}\left(\frac{\alpha_s(\mubstar)}{\pi}\right)^2\Bigg[ \left( \frac{2}{3} n_f-\frac{11}{3}C_A\right) \ln^2 \left(\frac{b_* \mu_{b_*}}{2 e^{-\gamma_E}}\right) \nonumber \\ &+ \left(-\frac{67}{9} C_A + \frac{\pi^2}{3}C_A + \frac{10}{9} n_f\right) \ln \left(\frac{b_* \mu_{b_*}}{2 e^{-\gamma_E}}\right) + \left(\frac{7}{2}\zeta_3-\frac{101}{27}\right) C_A + \frac{28}{27} T_F n_f \Bigg] \,, \label{e:CS_kernel0} \end{aligned}\] so that for \(C_1 =2 e^{-\gamma_E}\), one finds \[\begin{aligned} \tilde K (b_*;\mubstar) &=& \frac{C_F}{2} \left(\frac{\alpha_s(\mubstar)}{\pi}\right)^2 \left[\left(\frac{7}{2}\zeta_3-\frac{101}{27}\right) C_A + \frac{28}{27} T_F n_f \right] \,. \label{e:CS_kernel} \end{aligned}\] We will numerically calculate the integral in Eq. [\[e:FF_ansatz\]](#e:FF_ansatz){reference-type="eqref" reference="e:FF_ansatz"} using the two-loop result for the strong coupling constant, tuned to the world average  \(\alpha_s(M_Z)= 0.118\) as in the CTEQ analysis . Furthermore, we adopt the functional form of \(g_K(b_T;b_{\rm max})\) given by Collins and Rogers , \[\begin{aligned} g_K(b_T,b_{\rm max})&=&g_0(b_{\rm max})\left(1-\exp\left[-\frac{C_F\alpha_s(\mubstar)b_T^2}{\pi g_0(b_{\rm max})b_{\rm max}^2}\right]\right), \end{aligned}\] which interpolates smoothly between the small and large-\(b_T\) regions, where at small \(b_T\) it approximates a power series in \(b_T^2\), while at large \(b_T\) the resulting value of \(\tilde K\) goes to a constant . We choose \(g_0(b_{\rm max})=0.84\) and \(b_{max} = 1\,{\rm GeV}^{-1}\) to match the non-perturbative behavior of \(g_K\) used in Refs.  to describe the polarized SIDIS data and in Ref.  to describe unpolarized SIDIS, DY and weak boson production data. The scale \(\mu_Q\) is usually chosen such that \(\mu_Q= C_2 Q\). In the following we will use \(C_2 = 1\) and \(C_1 = 2 e^{-\gamma_E}\). These choices allow one to optimize the accuracy of the perturbative expansion calculations in Eqs. ([\[eq:hard\]](#eq:hard){reference-type="ref" reference="eq:hard"}) and ([\[e:CS_kernel0\]](#e:CS_kernel0){reference-type="ref" reference="e:CS_kernel0"}) . ## Input for TMDs and choice of the initial scale {#sec-2.3} We will utilize the following parametrizations  for TMDs at the initial scale \(Q_0\): \[\begin{aligned} f_{h}^a(x_h,\kTh,Q_0,Q_0^2) &=& f_{h}^a(x_h,Q_0) \; \frac{e^{-\kTh^2 / \la k_{Th}^2 \ra_{f_{h}} }}{\pi \; \la k_{Th}^2 \ra_{f_{h}} }\;, \quad \hspace{16mm} f_{h}^a = f_{1, p}^a, \; f_{1, \pi}^a,\; h_{1, p}^a, \nonumber\\ f_{h}^{a}(x_h,\kTh,Q_0,Q_0^2) &=& f_{h}^{(1) a}(x_h,Q_0) \, \frac{2 M_h^2}{\pi \la k_{Th}^2 \ra_{f_{h}}^2} e^{-\kTh^2/{\la k_{Th}^2 \ra_{f_{h}}}}, \quad f_h^a = f_{1T, p}^{\perp a},\;h_{1, p}^{\perp a},\;h_{1, \pi}^{\perp a},\;h_{1L, p}^{\perp a},\nonumber\\ f_{h}^{a}(x_h,\kTh,Q_0,Q_0^2) &=& f_{h}^{(2) a}(x_h,Q_0) \, \frac{2 M_h^4}{\pi \la k_{Th}^2 \ra_{f_{h}}^3} e^{-\kTh^2/{\la k_{Th}^2 \ra_{f_{h}}}}, \quad f_h^a = h_{1T, p}^{\perp a}, \label{Eq:Gauss} \end{aligned}\] where transverse moments of TMDs are defined in Eq. [\[e:TMDmoment\]](#e:TMDmoment){reference-type="eqref" reference="e:TMDmoment"}. Parametrizations from Eqs. [\[Eq:Gauss\]](#Eq:Gauss){reference-type="eqref" reference="Eq:Gauss"} are often used in phenomenology to describe polarized SIDIS and DY data. These parametrizations correspond to the following \(b_T\)-space expressions \[\begin{aligned} \tilde f_{h}^a(x_h,b_T,Q_0,Q_0^2) &=& f_{h}^a(x_h,Q_0) \; e^{-\frac{1}{4} \, b_T^2 \la k_{Th}^2 \ra_{f_{h}}} \;, \quad \hspace{2mm} \tilde f_{h}^{a} = \tilde f_{1, p}^a, \; \tilde f_{1, \pi}^a,\; \tilde h_{1, p}^a, \nonumber\\ \tilde f_{h}^{(1) a}(x_h,b_T,Q_0,Q_0^2) &=& f_{h}^{(1) a}(x_h,Q_0) \, e^{-\frac{1}{4} \, b_T^2 {\la k_{Th}^2 \ra_{f_{h}}}}, \quad \tilde f_h^{(1)a} = \tilde f_{1T, p}^{\perp (1) a},\;\tilde h_{1, p}^{\perp (1) a},\;\tilde h_{1, \pi}^{\perp (1) a},\;\tilde h_{1L, p}^{\perp (1) a},\nonumber\\ \tilde f_{h}^{(2) a}(x_h,b_T,Q_0,Q_0^2) &=& f_{h}^{(2) a}(x_h,Q_0) \, e^{-\frac{1}{4} \, b_T^2{\la k_{Th}^2 \ra_{f_{h}}}}, \quad \tilde f_h^{(2)a} = \tilde h_{1T, p}^{\perp (2) a}, \label{Eq:Gaussb} \end{aligned}\] where the collinear functions are the same as in Eqs. [\[Eq:Gauss\]](#Eq:Gauss){reference-type="eqref" reference="Eq:Gauss"}. Using Eqs. [\[Eq:Gauss\]](#Eq:Gauss){reference-type="eqref" reference="Eq:Gauss"} or Eqs. [\[Eq:Gaussb\]](#Eq:Gaussb){reference-type="eqref" reference="Eq:Gaussb"} one obtains for the convolution integrals in Eqs. ([\[Eq:SFs\]](#Eq:SFs){reference-type="ref" reference="Eq:SFs"}) or Eqs. [\[e:upb\]](#e:upb){reference-type="eqref" reference="e:upb"}--[\[Eq:sfsb\]](#Eq:sfsb){reference-type="eqref" reference="Eq:sfsb"} the following results at the initial scale \(Q_0\), \[\begin{aligned} F_{UU}^1(x_{\pi},x_p,q_T,Q_0^2) &=& \phantom{-} \frac{1}{N_c} \sum_a e_a^2 \; \;f_{1,\pi}^{\bar{a}} (x_{\pi},Q_0)\;f_{1,p}^a(x_p,Q_0) \;\frac{e^{-q_T^2/\la q_T^2 \ra}}{\pi \; \la q_T^2 \ra}, \nonumber\\ F_{UT}^{\sin\phi_S}(x_{\pi},x_p,q_T,Q_0^2) &=& \phantom{-} \frac{1}{N_c} \sum_a e_a^2 \; f_{1,\pi}^{\bar{a}} (x_{\pi},Q_0) \; f_{1T,p}^{\perp (1)a}(x_p,Q_0) \; 2 M_p \; \frac{q_T }{\la q_T^2 \ra} \; \frac{e^{-q_T^2/\la q_T^2 \ra}}{\pi \; \la q_T^2 \ra}, \nonumber\\ F_{UT}^{\sin(2\phi-\phi_S)}(x_{\pi},x_p,q_T,Q_0^2) &=&-\frac{1}{N_c} \sum_a e_a^2 \; h_{1,\pi}^{\perp (1) {\bar{a}}} (x_{\pi},Q_0) \; h_{1,p}^a(x_p,Q_0) \; 2 M_{\pi} \; \frac{q_T }{\la q_T^2 \ra} \; \frac{e^{-q_T^2/\la q_T^2 \ra}}{\pi \; \la q_T^2 \ra}, \nonumber\\ F_{UU}^{\cos 2\phi}(x_{\pi},x_p,q_T,Q_0^2) &=& \phantom{-} \frac{1}{N_c} \sum_a e_a^2 \; h_{1,\pi}^{\perp (1) {\bar{a}}} (x_{\pi},Q_0) \; h_{1,p}^{\perp (1) a}(x_p,Q_0)\; 4 M_{\pi}M_p \; \frac{q_T^2 }{\la q_T^2 \ra^2} \; \frac{e^{-q_T^2/\la q_T^2 \ra}}{\pi \; \la q_T^2 \ra},\nonumber\\ F_{UL}^{\sin 2\phi}(x_{\pi},x_p,q_T,Q_0^2) &=&-\frac{1}{N_c} \sum_a e_a^2 \; h_{1,\pi}^{\perp (1){\bar{a}}} (x_{\pi},Q_0) \; h_{1L,p}^{\perp (1)a}(x_p,Q_0) \; 4 M_{\pi}M_p\; \frac{q_T^2 }{\la q_T^2 \ra^2} \; \frac{e^{-q_T^2/\la q_T^2 \ra}}{\pi \; \la q_T^2 \ra}, \nonumber\\ F_{UT}^{\sin(2\phi+\phi_S)}(x_{\pi},x_p,q_T,Q_0^2) &=&-\frac{1}{N_c} \sum_a e_a^2 \; h_{1,\pi}^{\perp (1){\bar{a}}} (x_{\pi},Q_0) \; h_{1T,p}^{\perp (2) a}(x_p,Q_0) \; 2 M_{\pi}M_p^2\; \frac{q_T^3 }{\la q_T^2 \ra^3} \; \frac{e^{-q_T^2/\la q_T^2 \ra}}{\pi \; \la q_T^2 \ra}, \nonumber\\ \label{Eq:all-Gauss} \end{aligned}\] where the index \(a=u,\,\bar{u},\,d,\,\bar{d},\,\dots\) and the mean square transverse momenta \(\la q_T^2 \ra\) are defined in each case as the sum of the mean square transverse momenta of the corresponding TMDs; that is in ([\[Eq:all-Gauss\]](#Eq:all-Gauss){reference-type="ref" reference="Eq:all-Gauss"}) in the first equation \(\la q_T^2 \ra = \la k_{T \pi}^2 \ra_{f_{1,\pi}}+\la k_{Tp}^2 \ra_{f_{1,p}}\), in the second equation \(\la q_T^2 \ra = \la k_{T \pi}^2 \ra_{f_{1,\pi}}+\la k_{Tp}^2 \ra_{f^\perp_{1T,p}}\), etc. In our study we will use the corresponding transverse moments and Gaussian widths from TMD extractions that we will take at the initial scale which corresponds to the \(\langle Q^2\rangle\) in the HERMES experiment. We will therefore use \(Q_0^2 = 2.4\) GeV\(^2\) as our initial scale of TMD evolution in Eqs. [\[Eq:Gaussb\]](#Eq:Gaussb){reference-type="eqref" reference="Eq:Gaussb"} for parametrization of TMDs and in Eqs. [\[e:upb\]](#e:upb){reference-type="eqref" reference="e:upb"}- [\[Eq:sfsb\]](#Eq:sfsb){reference-type="eqref" reference="Eq:sfsb"} for structure functions that we will evolve to the scale of the COMPASS Drell-Yan measurement. The scale \(Q_0^2=2.4\,{\rm GeV}^2\) is convenient because parametrizations of many TMDs are available at this scale, and there is a great deal of expertise how to implement CSS evolution starting from \(Q_0\). However, results from quark models refer to a lower hadronic scale \(\mu_0 \sim 0.5\,{\rm GeV} < Q_0\). Presently it is not known how to implement CSS evolution at such low scales (see section [\[sec:intro\]](#sec:intro){reference-type="ref" reference="sec:intro"}). Thus, the evolution of model results from \(\mu_0\) to the initial CSS scale \(Q_0\) chosen in this work, is regarded as a part of the modelling. It will be described in detail in section [2.5](#sec-2.5){reference-type="ref" reference="sec-2.5"}. ## TMDs extracted from experimental data {#sec-2.4} In order to compute leading-twist structure functions in pion-induced DY the knowledge of the proton and pion TMDs \(f_{1,p}^a\), \(f_{1,\pi}^a\), \(f_{1T,p}^{\perp a}\), \(h_{1,p}^a\), \(h_{1,p}^{\perp a}\), \(h_{1T,p}^{\perp a}\), \(h_{1L,p}^{\perp a}\), \(h_{1,\pi}^{\perp a}\) is required, which we list here in the order from the best to the least known TMD, see Fig. [\[Fig-02:knowledge-TMDs\]](#Fig-02:knowledge-TMDs){reference-type="ref" reference="Fig-02:knowledge-TMDs"} for an overview. While such a classification is to some extent subjective, it is evident that the collinear proton distributions \(f_{1,p}^a(x_p)\) are the best known thanks to DIS, DY and other data. We will utilize the MSTW extraction of \(f_{1,p}^a(x_p)\) for comparison with models and our calculations. The unpolarized TMDs \(f_{1,p}^a(x_p,\kTN)\) have been studied and much progress was achieved in incorporating effects of QCD evolution which are taken into consideration approximately in our approach as described in section [2.2](#sec-2.2){reference-type="ref" reference="sec-2.2"}. For the collinear pion distribution \(f_{1,\pi}^a\), listed next in Fig. [\[Fig-02:knowledge-TMDs\]](#Fig-02:knowledge-TMDs){reference-type="ref" reference="Fig-02:knowledge-TMDs"}, many extractions are available. We will use the MRSS fits. One of the most prominent TMDs, the Sivers distribution \(f_{1T,p}^{\perp a}\) was extracted from HERMES, COMPASS, and JLab SIDIS data by several groups with consistent results. We will use the extractions of Ref.  labelled as "Torino" and Ref.  labelled as "JAM20". The transversity distribution, \(h_{1,p}^a\), plays a crucial role in understanding the nucleon spin structure. It is predicted to generate a transverse single spin asymmetry in SIDIS coupling to the Collins fragmentation function, which is also responsible for an azimuthal asymmetry in \(e^+e^-\) annihilation into hadron pairs. We will use the "Torino" parametrizations of \(h_{1,p}^a\) from a global QCD analysis of SIDIS and \(e^+e^-\) data to be compared with model predictions, and the "JAM20" fit from a global QCD analysis of SIDIS, DY, \(e^+e^-\), and proton-proton data for comparisons and calculations. The proton Boer-Mulders function \(h_{1,p}^{\perp a}\) extracted from HERMES, COMPASS and DY data in Ref.  will be used with the label "BMP10." The extraction of \(h_{1,p}^{\perp a}\) is less certain, because in SIDIS it requires model-dependent corrections for sizable twist-4 contamination (Cahn effect). The so-called pretzelosity function \(h_{1T,p}^{\perp a}\) was extracted in Ref. . We will label \(h_{1T,p}^{\perp a}\) from Ref.  as "LP15". Notice that large errors on extracted \(h_{1T,p}^{\perp a}\) were reported in Ref. . This is the least known proton TMD for which an extraction has been attempted. Only the Kotzinian-Mulders distribution \(h_{1L,p}^{\perp a}\) has not yet been extracted. It was found that the data related to this TMD are compatible with the WW-type approximation which we will use to approximate \(h_{1L,p}^{\perp a}\) based on \(h_{1,p}^a\) from "Torino" and "JAM20" fits. Finally, the pion Boer-Mulders function \(h_{1,\pi}^{\perp a}\) is the least known of the TMDs needed to describe the pion-proton DY process at leading twist. No extractions are currently available for this TMD. ## TMDs from models {#sec-2.5} In this section we briefly review the two CQM frameworks, the LFCQM and the SPM, and compare them in Figs. [\[Fig:pion-models\]](#Fig:pion-models){reference-type="ref" reference="Fig:pion-models"} and [\[protonbasis-u+d\]](#protonbasis-u+d){reference-type="ref" reference="protonbasis-u+d"} to the available phenomenological extractions used in this work. Light-front models are based on the decomposition of the hadron states in the Fock space constructed in the framework of light-front quantization. The hadron states are then obtained as a superposition of partonic quantum states, each one multiplied by an \(N\)-parton light-front wave function which gives the probability amplitude to find the corresponding \(N\)-parton state in the hadron. In the LFCQM the light-front Fock expansion is truncated to the leading component given by the valence \(3q\) and \(q\bar q\) contribution in the proton and pion, respectively. The light-front wave functions can be further decomposed in terms of light-front wave amplitudes that are eigenstates of the total parton orbital angular momentum. The TMDs can then be expressed as overlap of light-front wave amplitudes with different orbital angular momentum  which makes very transparent the spin-orbit correlations encoded in the different TMDs . To model the \(3q\) light-front wave function of the proton, the phenomenological Ansatz of Ref.  was used, describing the quark-momentum dependence through a rational analytical expression with parameters fitted to the anomalous magnetic moment of the proton and neutron . For the pion, the \(q\bar q\) light-front wave function of Ref.  was used, with the quark-momentum dependent part given by a Gaussian function with parameters fitted to the pion charge radius and decay constant. Spectator models are based on a field theoretical description of deep inelastic scattering in a relativistic impulse approximation. In this parton model-like factorization, the cross section for deep inelastic scattering processes can be expressed in terms of a Born cross section and quark correlation functions . In this framework, the quark correlation functions are hadronic matrix elements expanded in Dirac and flavor structure multiplying form factors. The essence of the SPMs is to calculate the matrix elements of the quark correlation function by the introduction of effective hadron-spectator-quark (e.g. nucleon-diquark-quark) vertices  which in turn enable one to model essential non-perturbative flavor and spin structure of hadrons. The SPMs allow one to model the dynamics of universality and process dependence through studying the gauge-link, and phase content of TMDs . In turn systematic phenomenological estimates for parton distributions and fragmentation functions for both "T-even" and "T-odd" TMDs have been carried out . In regard to the latter, it is in this framework that the first calculations of the Sivers and Boer-Mulders functions of the nucleon were carried out  and shown on general grounds to contribute to semi-inclusive processes at leading power in the hard scale. Later the Boer-Mulders function of the pion was calculated in Ref. . The model parameters are determined by comparing the SPM results for \(f_{1,p}^u(x)\) and \(f_{1,p}^d(x)\) to the LO low-scale (\(\mu^{2}_0=0.26\) GeV\(^2\)) GRV98 parametrization . The proton TMDs for \(u\)-and \(d\)-quarks are given by linear combinations of contributions from axial-vector and scalar diquarks assuming \(\rm SU(2)\) flavor symmetry. We choose the scale \(Q_0^2 = 2.4\,{\rm GeV}^2\) as the initial scale for the CSS evolution. The evolution effects between the initial model scale \(\mu_0\sim 0.5\,{\rm GeV}\) and \(Q_0\) cannot be determined exactly in the CSS formalism, see section [2.3](#sec-2.3){reference-type="ref" reference="sec-2.3"}, and they also cannot be neglected. We therefore estimate them as follows. We start with the model predictions for the parton distributions or transverse moments of TMDs as they appear in Eq. ([\[Eq:Gauss\]](#Eq:Gauss){reference-type="ref" reference="Eq:Gauss"}) at the initial quark model scale \(\mu_0\). We evolve them using LO DGLAP evolution to the scale \(Q_0\). In contrast to CSS, experience with implementing DGLAP evolution at low scales is available. Hereby we use exact DGLAP evolution for \(f_{1,h}^a(x)\) and \(h_{1,p}^a(x)\). In all other cases we use approximate DGLAP evolution: for the transverse momenta of the proton Sivers function we use the \(f_{1,h}^a(x)\)-nonsinglet evolution shown to lead good results in the LFCQM model study of SIDIS asymmetries, while for all the chiral-odd TMDs we assume the DGLAP evolution of transversity. For the \(k_T\)-dependencies of the TMDs we use the same input from TMD parametrizations as described in Eq. ([\[Eq:Gauss\]](#Eq:Gauss){reference-type="ref" reference="Eq:Gauss"}). The predictions from both models evolved in this way are shown along with the available parametrizations in Figs. [\[Fig:pion-models\]](#Fig:pion-models){reference-type="ref" reference="Fig:pion-models"}-[\[protonbasis-u+d\]](#protonbasis-u+d){reference-type="ref" reference="protonbasis-u+d"} at the scale \(Q_0\). It is important to stress that in this way we are able to test the \(x\)-dependencies of the model predictions against the COMPASS data. The ultimate goal would be to test similarly also the quark model predictions for \(k_T\)-dependencies. This requires an implementation of the CSS evolution starting from low initial scales \(\mu_0< 1\,{\rm GeV}\) which is beyond the scope of this work, and will be addressed in future studies. The result from the LFCQM  and the SPM  for \(f_{1,\pi^-}^{\bar u}(x)\) (which coincides with \(f_{1,\pi^-}^{d}(x)\) due to isospin symmetry) compare well to the MRSS parametrization, see Fig. [\[Fig:pion-models\]](#Fig:pion-models){reference-type="ref" reference="Fig:pion-models"}. In the region \(0.2\lesssim x_\pi \lesssim 0.6\), in which the COMPASS Drell-Yan data points lie, the SPM result agrees within 20-40\(\,\%\) with MRSS. The two models agree well with each other in the case of the pion Boer-Mulders TMD \(h_{1,\pi^-}^{\perp(1) \bar u}(x)=h_{1,\pi^-}^{\perp(1) d}(x)\) for which no extraction is available (so far). This robustness of the model predictions is important: the pion Boer-Mulders function enters 4 (out of 6) twist-2 pion-nucleon DY structure functions. The results from the LFCQM  and the SPM  for the proton quark distributions are shown in Fig. [\[protonbasis-u+d\]](#protonbasis-u+d){reference-type="ref" reference="protonbasis-u+d"}. The region \(0.05\lesssim x_p\lesssim0.4\) is probed in the COMPASS DY measurements , see section [3.1](#section:kinematics){reference-type="ref" reference="section:kinematics"}. The model results for the functions \(f_{1,p}^u(x)\), \(f_{1,p}^d(x)\), \(f_{1T,p}^{(1)u}(x)\), \(f_{1T,p}^{(1)d}(x)\), \(h_{1,p}^d(x)\), \(h_{1,p}^{\perp(1)d}(x)\), \(h_{1L,p}^{(1)u}(x)\), \(h_{1T,p}^{(2)u}(x)\) agree within 20-40\(\,\%\), and for \(h_{1,p}^u(x)\), \(h_{1,p}^{\perp(1)u}(x)\), \(h_{1L,p}^{(1)d}(x)\) within 40-60\(\,\%\). Merely for \(h_{1T,p}^{(2)d}(x)\) we observe a more sizable spread of model predictions. In all cases the models agree on the signs of the TMDs. The model results for the unpolarized distributions agree reasonably well with MSTW. The model predictions for transversity and Sivers function are compatible with the corresponding Torino and JAM20 fits. The 1-\(\sigma\) uncertainty bands are shown for JAM20. The corresponding uncertainty bands of the Torino parametrizations are somewhat larger (as more data were used in the JAM20 analysis, cf. section [2.3](#sec-2.3){reference-type="ref" reference="sec-2.3"}) and not displayed for better visibility. The proton Boer-Mulders function from models is in good agreement with the BMP10 extraction  which has significant statistical and systematic uncertainties, as discussed in section [2.3](#sec-2.3){reference-type="ref" reference="sec-2.3"}, and are not shown in Fig. [\[protonbasis-u+d\]](#protonbasis-u+d){reference-type="ref" reference="protonbasis-u+d"}. The model predictions for pretzelosity show little agreement with the best fit result from LP15, but are within its 1-\(\sigma\) region which is not shown in the plot. The comparison in Fig. [\[protonbasis-u+d\]](#protonbasis-u+d){reference-type="ref" reference="protonbasis-u+d"} indicates an accuracy of the CQMs which is in many cases of the order of 20--40\(\,\%\). Considering the much different physical foundations of the two models, one may speak about an overall robust CQM picture for the TMDs needed in our work. # Results and observations {#sec-3} In this section we briefly describe the COMPASS experiment, outline how we explore the model predictions and phenomenological TMD fits, present our results, and compare them to the data. ## The COMPASS Drell-Yan experiment {#section:kinematics} The COMPASS 2015 data were taken with a pion beam of \(190 \; {\rm GeV}\) impinging on a transversely polarized NH\(_3\) target with a polarization of \(\langle S_T\rangle \approx 73\,\%\) and a dilution factor \(\langle f\rangle \approx 0.18\). The dimuon mass range \(4.3 \; {\rm GeV}< Q <8.5 \; {\rm GeV}\) above charmonium resonance region but below \(\Upsilon\) threshold was covered with the mean value \(\langle Q\rangle=5.3\,{\rm GeV}\). Due to the fixed target kinematics the pion structure was probed at higher \(\langle x_\pi\rangle =0.50\) compared to the proton \(\langle x_p\rangle = 0.17\). The cut \(q_T>0.4\,{\rm GeV}\) was imposed and \(\langle q_T\rangle = 1.2\,{\rm GeV}\). The analysis of the data collected by the experiment in 2018 in similar conditions is currently under way . ## The approaches for numerical estimates {#Sec3.2-approaches} The Sivers asymmetry \(A_{UT}^{\sin\phi}\) can be described completely in terms of both, model predictions and available parametrizations, and is the only asymmetry where the latter is possible. For the phenomenological calculation we will use the Torino and JAM20 analysis results for \(f_{1T.p}^{\perp(1)a}(x)\), and MSTW and MRSS parametrizations for proton and pion collinear unpolarized distributions. The other asymmetries require the knowledge of the pion Boer-Mulders function for which no parametrization is available. In these cases we shall adopt two different main approaches, pure and hybrid, see Fig. [\[Fig-02:knowledge-TMDs\]](#Fig-02:knowledge-TMDs){reference-type="ref" reference="Fig-02:knowledge-TMDs"} for an overview. We will present therefore up to four different calculations for each observable by exploring the model results and available parametrizations discussed in sections [2.2](#sec-2.2){reference-type="ref" reference="sec-2.2"}, [2.3](#sec-2.3){reference-type="ref" reference="sec-2.3"}, [2.4](#sec-2.4){reference-type="ref" reference="sec-2.4"} and displayed in Figs. [\[Fig:pion-models\]](#Fig:pion-models){reference-type="ref" reference="Fig:pion-models"}-[\[protonbasis-u+d\]](#protonbasis-u+d){reference-type="ref" reference="protonbasis-u+d"}. The first approach makes a pure use of model predictions for all pion and proton TMDs which will be labelled in the plots by the acronyms LFCQM or SPM. In the hybrid-approaches we will use the minimal model input, the predictions from the LFCQM  and SPM  for the pion Boer-Mulders function, and the maximal input from parametrizations: JAM20 for \(f_{1T,p}^{\perp a}\) and \(h_{1,p}^a\), BMP10 for \(h_{1,p}^{\perp a}\), and LP15 for \(h_{1T,p}^{\perp a}\). The results will be labelled respectively as "LFC-JAM20", "LFC-LP15", "LFC-BMP10" or "SPM-JAM20," "SPM-LP15," "SPM-BMP10." For \(h_{1L,p}^{\perp a}\) we make use of WW-type approximation which allows one to approximate this TMD in terms of \(h_{1,p}^a\) for which we will use JAM20. WW-type approximations were explored in Ref.  and shown to work well with the available data. We will add "WW" in the label of calculation when WW approximation is used. For all hybrid calculations we will use the parametrizations for \(f_{1,p}^a\) and \(f_{1,\pi}^a\). ## Discussion of the results and comparison to available data {#sec-3.2} Numerical results for the leading-twist pion-nucleon DY asymmetries are shown in Figs. [\[aut1x-COM\]](#aut1x-COM){reference-type="ref" reference="aut1x-COM"}--[\[aulsin2px-COM\]](#aulsin2px-COM){reference-type="ref" reference="aulsin2px-COM"} in comparison to available COMPASS data. Table [1](#table-overview){reference-type="ref" reference="table-overview"} gives a detailed overview on the model results and phenomenological information. Let us start the discussion with the Sivers asymmetry. One of the most striking features of "naively" T-odd (Sivers, Boer-Mulders) TMDs is the expected sign change  from SIDIS to DY due to the difference of initial (DY) versus final (SIDIS) state interactions. Verification of the sign change of the Sivers function is one of the milestones of DY programs of COMPASS and RHIC . In SIDIS the proton \(u\)-quark Sivers function is negative, while STAR RHIC \(W^\pm/Z\) asymmetry data favor a positive sign  hinting on the predicted process dependence of T-odd TMDs. The predictions for the \(A_{UT}^{\sin\phi_S}\) asymmetry at COMPASS are positive, see for instance Refs. . Our calculations confirm this expectation, see Fig. [\[aut1x-COM\]](#aut1x-COM){reference-type="ref" reference="aut1x-COM"} where we compare our results to COMPASS data . The \(u\)-quark Sivers function in DY is expected to be positive, see Fig. [\[protonbasis-u+d\]](#protonbasis-u+d){reference-type="ref" reference="protonbasis-u+d"}. If we disregard sea quark effects, which were shown to play a negligible role in \(\pi^-\)-proton DY in the COMPASS kinematics, then \(A_{UT}^{\sin\phi_S} \propto f_{1T,p}^{\perp u} (x_p) > 0\). The experimental error bars are currently sizeable, but the data show a tendency to positive asymmetry, see Fig. [\[aut1x-COM\]](#aut1x-COM){reference-type="ref" reference="aut1x-COM"}, in agreement with the expected sign change of the Sivers function. Clearly, more experimental evidence is needed to corroborate this finding. In the global QCD analysis of single-spin asymmetries the COMPASS data  were used, such that the JAM20 result in Fig. [\[aut1x-COM\]](#aut1x-COM){reference-type="ref" reference="aut1x-COM"} is consistent with *all* present-day data on observables related to Sivers functions. It is worth remarking that predictions based on the earlier Torino extraction (which used SIDIS data only) yield a somewhat larger asymmetry than JAM20 and are closer to the LFCQM and SPM results in Fig. [\[aut1x-COM\]](#aut1x-COM){reference-type="ref" reference="aut1x-COM"}. This result is consistent with the different size of Sivers functions found in Ref.  and Ref. , see Fig. [\[protonbasis-u+d\]](#protonbasis-u+d){reference-type="ref" reference="protonbasis-u+d"}. Fig. [\[autsin2pmpx-COM\]](#autsin2pmpx-COM){reference-type="ref" reference="autsin2pmpx-COM"} shows the asymmetry \(A_{UT}^{\sin(2\phi-\phi_S)}\) which arises from a convolution of transversity and pion Boer-Mulders function in comparison to COMPASS data. In the case of this asymmetry the pure model and hybrid calculations yield results in good mutual agreement. Neglecting sea quarks, it is \(A_{UT}^{\sin(2\phi-\phi_S)}\propto-h_{1, \pi^-}^{\perp (1)\bar u }(x_\pi) h_{1,p}^u (x_p)<0\). Both, \(h_{1, \pi^-}^{\perp (1)\bar u }\) and \(h_{1,p}^u\) are positive, see Fig [\[protonbasis-u+d\]](#protonbasis-u+d){reference-type="ref" reference="protonbasis-u+d"}, and we predict a negative asymmetry. This is consistent with the trend of the data. We therefore conclude that the COMPASS data  indicate a positive sign for the pion Boer-Mulders TMD \(h_{1, \pi^-}^{\perp (1)\bar u }\). (It is important to recall that absolute signs in extractions of chiral-odd TMDs and fragmentation functions are convention-dependent because chiral-odd functions contribute to observables always in connection with other chiral-odd functions. The convention used for TMD extractions is \(h_{1,p}^u(x)>0\). This sign is a choice which is well-informed by model and lattice QCD calculations but not an experimental observation.) The indication that \(h_{1, \pi^-}^{\perp (1)\bar u }>0\) is an important result which can be used to test the process dependence of the proton Boer-Mulders function, see below. Fig. [\[autsin2pppx-COM\]](#autsin2pppx-COM){reference-type="ref" reference="autsin2pppx-COM"} shows \(A_{UT}^{\sin(2\phi+\phi_S)}\) which is due to the convolution of pretzelosity and pion Boer-Mulders function compared to COMPASS data. This asymmetry is proportional to \(q_T^3\) for \(q_T\ll \,{1\,\rm GeV}\). This leads to a kinematic suppression of this asymmetry as compared to the two previous asymmetries (both proportional to \(q_T\) at small transverse momenta). As a consequence \(A_{UT}^{\sin(2\phi+\phi_S)}\) is by far the smallest of the leading-twist asymmetries in pion-nucleon DY. Numerically it is \(1\,\%\) or smaller, such that we had to include the insets in Fig. [\[autsin2pppx-COM\]](#autsin2pppx-COM){reference-type="ref" reference="autsin2pppx-COM"} to display the theoretical curves. The LFCQM and the SPM are in good agreement with each other, but not with the LP15 fit of pretzelosity which suggests an opposite sign for the asymmetry. At this point one has to stress that the LP15 fit of has a large statistical uncertainty (not displayed in Figs. [\[protonbasis-u+d\]](#protonbasis-u+d){reference-type="ref" reference="protonbasis-u+d"} and [\[autsin2pppx-COM\]](#autsin2pppx-COM){reference-type="ref" reference="autsin2pppx-COM"}) and is compatible with zero or opposite sign within 1-\(\sigma\). This TMD is difficult to measure in DY and SIDIS. In the high luminosity SIDIS experiments at JLab 12 GeV and the future Electron Ion Collider it may be feasible to measure pretzelosity. The \(A_{UU}^{\cos 2\phi}\) asymmetry in unpolarized DY originates from a convolution of the Boer-Mulders functions in nucleon and pion. Historically it was connected to the "violation" of the Lam-Tung relation, see and references therein. A simultaneous measurement of \(A_{UU}^{\cos 2\phi}\) and \(A_{UT}^{\sin(2\phi-\phi_S)}\) which we have discussed above allows one to test the sign change of the proton Boer-Mulders function in DY. \(A_{UU}^{\cos 2\phi}\) was measured and found positive in earlier CERN and Fermilab measurements. Neglecting sea quark effects, the asymmetry is dominated by \(A_{UU}^{\cos 2\phi}\propto h_{1, \pi^-}^{\perp (1)\bar u }(x_\pi) h_{1,p}^{\perp (1) u} (x_p)\). With the indication of the positive sign for the pion Boer-Mulders function from the COMPASS data on \(A_{UT}^{\sin(2\phi-\phi_S)}\), we conclude a positive sign also for the proton \(u\)-quark Boer-Mulders function in DY, which is opposite to the sign seen in SIDIS analyses and hence in agreement with the prediction for the process dependence property of T-odd TMDs. Fig. [\[auucos2px-COM\]](#auucos2px-COM){reference-type="ref" reference="auucos2px-COM"} shows our predictions for \(A_{UU}^{\cos 2\phi}\) for COMPASS kinematics. At this point no data are available from COMPASS, but an analysis is planned  and our predictions in Fig. [\[auucos2px-COM\]](#auucos2px-COM){reference-type="ref" reference="auucos2px-COM"} may be tested in near future. It is worth recalling that our approach provides a good description of the NA10 CERN and E615 Fermilab data. The test of our predictions in Fig. [\[auucos2px-COM\]](#auucos2px-COM){reference-type="ref" reference="auucos2px-COM"} will help to investigate the compatibility of the NA10, E615 and COMPASS experiments. Interestingly, fixed-order collinear factorized perturbative QCD calculations, which strictly speaking require \(q_T\) to be the hard scale, can also qualitatively describe the NA10 and E615 data. It will be interesting to confront those calculations with future COMPASS data and TMD studies. Notice that in the analysis of the proton-proton and proton-deuteron data from the FNAL E866/NuSea experiment indications were obtained that the proton quark and antiquark Boer-Mulders functions (in DY) have the same signs. With our observations based on COMPASS data we therefore infer a first hint that also the Boer-Mulders functions of \(\bar{u}\) and \(\bar{d}\) are positive in DY. Interestingly, not only valence Boer-Mulders distributions in nucleon and pion seem "alike", but also the nucleon sea quark distributions seem to have all the same sign. This confirms an early estimate on the sign of the anti-quark Boer Mulders function carried in the SPM in Ref. . This is in line with predictions from the limit of a large number of colors \(N_c\) in QCD that \(h_{1,p}^{\perp u} (x_p,\kTN) = h_{1,p}^{\perp d} (x_p,\kTN)\) and \(h_{1,p}^{\perp\bar u} (x_p,\kTN) = h_{1,p}^{\perp\bar d} (x_p,\kTN)\) modulo \(1/N_c\) corrections. Future data will provide more stringent tests of these predictions. Finally, it is worth pointing out that in principle one can extract the \(u\)-quark transversity distribution entirely from the measurements of \(A_{UU}^{\cos 2\phi}\) and \(A_{UT}^{\sin(2\phi-\phi_S)}\) in \(\pi^-\)-proton DY at COMPASS. While typically data available from different processes are processed in "global analyses," whenever possible it is also valuable to extract a function from one process alone. This would for instance allow one to test the universality (same sign and \(x\)-shape in SIDIS and DY) of the \(u\)-quark transversity distribution which is otherwise taken for granted. Fig. [\[aulsin2px-COM\]](#aulsin2px-COM){reference-type="ref" reference="aulsin2px-COM"} displays our predictions for the longitudinal single-spin asymmetry \(A_{UL}^{\sin 2\phi}\) in the COMPASS kinematics which is due to the Kotzinian-Mulders TMD \(h_{1L}^{\perp a}\) and the pion Boer-Mulders function. If we disregard sea quark effects, then \(A_{UL}^{\sin 2\phi}\propto -h_{1, \pi^-}^{\perp (1)\bar u }(x_\pi) h_{1L,p}^{\perp (1) u} (x_p) > 0\). Especially the SPM predicts a sizable and positive asymmetry. Since no parametrization on \(h_{1L}^{\perp a}\) is currently available, the hybrid calculations make use of the WW-type approximation which is compatible with SIDIS data. This is the only leading-twist pion-proton asymmetry in DY which requires a longitudinal proton polarization. We are not aware of plans to run DY experiments with longitudinal proton polarization in the near future. Potentially \(A_{UL}^{\sin2\phi}\) could be studied in DY with doubly polarized protons or deuterons in a future NICA experiment. We also study the theoretical uncertainty due to the variation of \(C_1\) and \(C_2\) in Eqs. ([\[eq:hard\]](#eq:hard){reference-type="ref" reference="eq:hard"}), ([\[e:FF_ansatz\]](#e:FF_ansatz){reference-type="ref" reference="e:FF_ansatz"}), and ([\[e:CS_kernel0\]](#e:CS_kernel0){reference-type="ref" reference="e:CS_kernel0"}) at NLL accuracy. Such studies are of importance in order to establish the control over the perturbative expansion, see e.g.. We will use \(A_{UU}^{\cos 2\phi}\) asymmetry as an example. Scale dependence on \(C_2\) cancels exactly at this order between the numerator and the denominator of the asymmetry. In Fig. [\[auucos2px-COM-study\]](#auucos2px-COM-study){reference-type="ref" reference="auucos2px-COM-study"} we show the corresponding theoretical uncertainty due to variation of \(C_1\in [e^{-\gamma_E}, 4\,e^{-\gamma_E}]\) for the LFCQM, notice that for \(C_1= e^{-\gamma_E}\) the asymmetry becomes larger than the red curve calculated with \(C_1= 2 e^{-\gamma_E}\), while for \(C_1= 4 e^{-\gamma_E}\) the value of asymmetry decreases very slightly. One can see that the theoretical uncertainty due to the scale choice of \(C_1\) is not negligible and warrants the inclusion of higher order corrections in the calculations. This uncertainty is smaller than the spread of the model predictions shown in Fig. [\[auucos2px-COM\]](#auucos2px-COM){reference-type="ref" reference="auucos2px-COM"} and therefore we expect that the future data will be able to distinguish among various models. Before ending this section it is important to remark that the COMPASS experiment has covered the range \(0.4\,{\rm GeV} < q_T < 5\,{\rm GeV}\). At the upper limit the condition \(q_T \ll Q\) for the applicability of the TMD factorization is not satisfied which constitutes an uncertainty in our calculations. However, in the experiment (and in our calculations) it is \(\langle q_T\rangle = 1.2 \,{\rm GeV}\) which is much smaller than \(\langle Q \rangle = 5.3\,{\rm GeV}\) and we verified that the region of large \(q_T\) (namely, \(3\,{\rm GeV} < q_T < 5\,{\rm GeV}\)) in our calculations has a negligible impact on the \(q_T\)-averaged (integrated) asymmetries in the experiment. # Conclusions {#sec-4} In this work we studied the DY process with negative pions and polarized protons with focus on the kinematics of the COMPASS experiment. As no phenomenological extractions are available for the Boer-Mulders TMD function of the pion, we explored two popular and widely used hadronic models, the LFCQM and the SPM, together with available phenomenological information on the other TMDs. For the LFCQM and SPM the we implement TMD evolution at NLL accuracy from fixed scale according to the solution to the CSS equations in Ref.  and outlined in section [2.2](#sec-2.2){reference-type="ref" reference="sec-2.2"}. This approach moves beyond the approximate TMD evolution based on the Gaussian Ansatz for transverse parton momenta with energy dependent Gaussian widths. We presented a complete description of polarized DY at leading twist using TMD evolution at NLL accuracy. The required TMDs include on the nucleon side \(f_{1,p}^{a}\), \(f_{1T,p}^{\perp a}\), \(h_{1,p}^{a}\), \(h_{1,p}^{\perp a}\), \(h_{1T,p}^{\perp a}\), \(h_{1L,p}^{\perp a}\); and on the pion side \(f_{1,\pi}^a\), \(h_{1,\pi}^{\perp a}\). For that we compiled results from several prior LFCQM and SPM calculations, which to the best of our knowledge have not been presented in this completeness before. Based on concise comparisons of model results with available phenomenological information , we estimate an accuracy of the model results of 20-40\(\,\%\) for the majority of (though not all) TMDs. Similar "model accuracies" were found in prior phenomenological applications of CQMs. Driven by the motivation to make maximal use of currently available phenomenological information, we also carried out "hybrid" calculations with a minimal model dependence---namely only due to the pion Boer-Mulders function for which no extraction is currently available. In this way we provided up to four predictions for each DY observable, with different levels of model dependence. The critical comparison of the various results (pure-model and hybrid calculations in respectively LFCQM and SPM) allows us to differentiate robust predictions from more strongly model-dependent results. Our study had two main goals, namely to present theoretical calculations which help to interpret the first data from the pion-induced DY with polarized protons measured by COMPASS, as well as to provide quantitative tests of the application of CQMs to the description of pion and nucleon structure. In regard to the interpretation of the first data from the pion-induced DY with polarized protons, we observe a robust picture. The pure-model and hybrid calculations from the LFCQM and SPM are in remarkable agreement with each other at the present stage. The theoretical spread of our results is smaller than the present uncertainties of the available data. Among the most interesting observations are the encouraging indications for the change of sign of the T-odd TMDs in DY vs SIDIS, both in the case of the proton Sivers and proton Boer-Mulders function. These are model independent results. Another model-independent result is the observation that the data favor a positive (in DY) Boer-Mulders \(\bar u\)-distribution in \(\pi^-\). We also report the first indication that all proton Boer-Mulders functions for \(u\), \(d\), \(\bar u\), \(\bar d\) flavors are positive (in DY). At the present, these observations are admittedly vague due to the low precision of the current data. More precise future data from COMPASS and other facilities will allow us to solidify the picture. In regard to the quantitative tests of the application of CQMs, it is important to stress that the DY process with \(\pi^-\) and proton in the COMPASS kinematics is an ideal process for these purposes. In the COMPASS kinematics sea quarks do not play an important role. Due to the \(u\)-quark dominance in the proton the process is strongly dominated by annihilations of \(\bar u\) from \(\pi^-\) and \(u\) from proton in the valence \(x\)-region where CQMs can be expected to catch the main features in the hadronic structure of the pion and nucleon. CQMs are important qualitative tools for QCD calculations. Within their model accuracy and within their range of applicability in the valence \(x\)-region, we observe that CQMs yield useful results and provide helpful guidelines for the interpretation of data. Future data will provide more stringent tests of the CQMs, and allow for extraction of hadron structure by global QCD analyses. We also provided several predictions that await experimental confirmation.
{'timestamp': '2021-02-24T02:01:54', 'yymm': '2005', 'arxiv_id': '2005.14322', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14322'}
# {#section .unnumbered} # Introduction The diffusion-driven dynamics of a dense cloud of bubbles (or drops) have received lately a renewed attention due to their applications in modern chemical processes such as solvent extraction and in nanoscience. Besides these immediate applications, understanding these diffusive dynamics also sheds light on certain processes taking place in foams, such as coarsening or coalescence. Indeed, although many other physical effects are involved in the evolution of a wet foam, still diffusion-related phenomena play a central role. However, despite the diffusive interaction between nearby bubbles in bubbly liquids or foams having been studied for a long time, still there is a need for quantitative predictive models. In part, this is a consequence of the difficulties that arise in isolating purely diffusive effects in experiments. In fact, the large difference in density between the bubbles and the liquid makes gravity effects manifest rather early in the evolution of foams or bubble clouds. In foams it is hard to disentangle the role of liquid drainage (a gravity-related effect) from other effects associated to the transport of gas or anti-foaming agents in the rate of bubble coalescence. Moreover, drainage turns wet foams into dry ones very fast, so the former are hard to characterize experimentally. Even in a situation where diffusion is the leading effect, such as the growth of a bubble cloud in a gas-supersaturated liquid, gravity effects become of comparable importance very quickly. For example, a free cloud of sub-millimetric bubbles exhibits a purely diffusion-driven growth only for a very limited time (hundreds of miliseconds), even for high gas concentrations such as those found for instance in beer or champagne, as shown by. In this study, a dense bubble cloud was produced in the bulk of a CO\(_2\)-saturated liquid (beer) and its evolution studied using high-speed imaging. This evolution could be divided into three stages: in a first one, which lasts only about 10 ms, the size of the bubbles increases with the square root of time, as predicted by the Epstein-Plesset equation for the case of a single isolated bubble. Thus, it is reasonable to assume that in this stage bubbles grow without interacting much with each other. Then, another stage follows where bubbles moderate their growth, due to the depletion of the dissolved gas in the space between bubbles. These two stages, where the dynamics are driven by diffusive bubble growth, come to an end when gravity effects become important and make the bubble cloud rise, which occurs as early as about 100 ms even for a bubble cloud as small as about 1 mm in diameter. Of course, bubbles could be prevented from rising by keeping them pinned to a substrate. However, the pinning introduces additional complexities that obscure, to some extent, diffusive effects. Moreover, in some situations, gravity plays a role even if the bubbles remain pinned to a substrate. In the case of sessile bubbles in CO\(_2\)-supersaturated water, and have shown that, although bubbles are not allowed to move, the depletion of CO\(_2\) that takes place around them induces density gradients in the liquid that ultimately trigger a convection plume, which in turn dominates the flow and overcomes the effect of diffusion. Therefore, avoiding or minimizing gravity effects is essential to study the purely diffusion-driven dynamics of wet foams or bubble clouds. Moreover, besides this purely fundamental interest, there are situations in which bubble clouds or wet foams evolve in microgravity or, at least, in reduced gravity conditions. For example, in the field of planetary physics, the diffusive growth of bubbles is responsible for the loss of Helium in meteorites . Thus, modeling the evolution of Helium content in these objects is important to understand the history of the formation of our solar system. In the Moon, rocks with a highly vesicular structure, such as the \"Seatbelt Rock\", have been found (see figure 4 in ). This structure suggests that the rock has formed by solidification of a dense cloud of bubbles containing volatile gases, as a result of ancient volcanism. From a more technological point of view, the behavior of foams in reduced gravity conditions is of interest for the development of advanced manufacturing processes in space, as pointed out by. These authors study experimentally the drying of a wet foam in the absence of gravity. Since on Earth gravity is essential to drain out the water filling the interstices between bubbles, in space they use a porous medium to soak up the liquid. Note that, if bubbles were allowed to grow by supersaturating the liquid with a gas, their growth could push out the interstitial water without the need of an external absorbing body. In summary, studying experimentally the diffusive interaction of free growing bubbles in dense bubble clouds or in wet foams at long times requires avoiding the effect of gravity. This has been done in several studies in the case of foams but, to the best of our knowledge, there are no studies focusing on dense bubble clouds growing diffusively in gas-supersaturated liquids in microgravity. With this motivation in mind, we have carried out experiments in which dense bubble clouds grow in CO\(_2\)-supersaturated water in microgravity conditions. These experiments were performed in the drop tower of the German Center of Applied Space Technology and Microgravity (ZARM) using an improved version of the facility described by. Besides, inspired by these experiments, we have put together a mathematical model of the growth of a bubble cloud in a supersaturated liquid that is able to explain, albeit in a qualitative fashion, the features of the time evolution of bubble clouds observed in the experiments. # [\[sec:experiments\]]{#sec:experiments label="sec:experiments"}Experimental setup and procedure The experiment aims at generating a dense bubble cloud in a supersaturated liquid, in our case CO\(_2\)-saturated water, and then observe its evolution using high-speed imaging in microgravity conditions. Figure [\[fig:setup\]](#fig:setup){reference-type="ref" reference="fig:setup"} shows the sketch of the experimental setup, which is based on that described in. This experiment is fitted into a capsule that is then dropped inside the drop tower of the German Center of Applied Space Technology and Microgravity (ZARM). This tower has total height of 146 meters and contains in its interior a 120-m-tube where the capsule falls in near vacuum for about 4 s. This generates a microgravity environment for the duration of the drop. Then the capsule decelerates and comes to a stop in a pool filled with polystyrene pellets. The measurement chamber, where the bubble cloud will form and grow, is filled with carbonated water. This chamber is immersed in a rectangular tank filled with degassed water to minimize optical distortion. The top wall of the chamber is connected to a pressurization and depressurization system. At the bottom of the measurement chamber there are two electrodes connected to the spark generator. The electrodes are two thin (100 \(\mu\)m) copper wires that touch each other near their tips. The spark generator is a discharge circuit similar to that described in but replacing the LEDs by the electrodes, as suggested by. In our experiments, the discharge has a peak between 50-100 A and lasts for about 10 \(\mu\)s. The discharge induces cavitation, and the collapse of the imploding cavitation bubble generates the bubble cloud, the growth of which is the target of the experiment. To measure the time evolution of the shape and size of the cloud, two high-speed cameras, suitable for use in the drop tower's capsule, image the bubble cloud from two perpendicular directions at 2000 fps. They produce images of 512\(\times\)`<!-- -->`{=html}512 pixels and a spatial resolution of 25 \(\mu\)m/pixel. As can be seen in the appendix, the information provided by the two cameras is qualitatively similar for all drops. For that reason, in the discussion of the experimental results we will only use images taken from camera 1. The supersaturated water is prepared in a pressurized facility built to make carbonated water on-the-site which is subsequently transferred to the measurement chamber at a pressure higher than the saturation one, such as no gas is lost during the process. This procedure is similar to that followed by. Figure [\[fig:panel\]](#fig:panel){reference-type="ref" reference="fig:panel"} compares the evolution of a bubble cloud in microgravity (\(10^{-6}\) \(g\)) and 1 \(g\) conditions from its generation (the spark) to the end of the experiment, approximately 3.4 seconds later. During the first 100 ms, both tests show a similar diffusion-driven growth. Subsequently, in the 1 \(g\) test, the effects of the gravity become abundantly clear: the cloud starts a buoyancy-induced rising motion as can be seen in the first row of the figure. In the microgravity test, however the bubble cloud continues growing by diffusion and no net motion is observed. For the model developed in the next section it is important to point out that, despite the high bubble density of the cloud, we observe that very few bubbles coalesce during the experiments. Thus, in a first approximation the number of bubbles may be regarded as constant. # Mathematical model of transient mass transfer in a bubble cloud Let us consider a spherical bubble of radius \(R_i\) surrounded by a cloud of other bubbles of radii \(R_j\), with \(j = 1..N\) and \(j \ne i\). We introduce here three hypotheses. First, from the point of view of mass transfer, one bubble sees the others in the cloud as mass sinks of intensity \(\dot{m}_j\). Second, we do not consider surface tension effects. Third, advective effects caused by bubble growth are neglected in the gas transport equation. This means that the concentration of dissolved gas obeys the non-convective heat equation. Due to the linear nature of this equation, the interaction of the \(i\)-th bubble with the surrounding ones can be treated by superposition. For this reason, we consider the growth of a bubble, labelled \(i\), in presence of a point mass sink of intensity \(\dot{m}_j\) a distance \(d_{ij}\) apart from its center (see figure [\[fig:bubble_and_sink\]](#fig:bubble_and_sink){reference-type="ref" reference="fig:bubble_and_sink"}). The problem we will solve now is to determine the gas mass flux entering bubble \(i\) in these conditions. This problem exhibits cylindrical symmetry around the line connecting the centers of both bubbles, so the concentration field obeys \[\partial_t C-D\left[\frac{1}{r^2}\partial^2_{rr}\left(r^2 \, C\right) + \frac{1}{r^2\sin\theta}\partial_\theta\left(\sin\theta\partial_\theta C\right)\right] =-\dot{m}_j\delta\left[\vec{x}-d_{ij}\vec{e}_x\right]. \label{eq:time_eqnC}\] This equation must be subject to the boundary conditions at the bubble surface, \(r=R_i\), and in the far field \(r \rightarrow \infty\). At the bubble surface the concentration is given by Henry's law, in other words \(C(R, t) = C_s = k_H P_s\), where \(k_H\) is Henry's constant and \(P_s\) the ambient pressure, whereas in the far field \(C(\vec{x}, t) = C_\infty\). Note that, although equation ([\[eq:time_eqnC\]](#eq:time_eqnC){reference-type="ref" reference="eq:time_eqnC"}) is linear, the fact that the radius of the \(i\)-th bubble, \(R_i\), depends on time effectively couples the computation of the mass fluxes of the different bubbles, as every bubble \(j\) affects the concentration field induced by the others through the boundary condition at \(r = R_i\). Nonetheless, as will be explained below, this effect can be neglected with the assumptions adopted here. The solution of the problem will be sought by exploiting its linear nature to decompose it into a spherically-symmetric one that satisfies these boundary conditions plus another one that accounts for the effect of the point sink but that has homogeneous boundary conditions. The former solution recovers the mass flux given by the Epstein--Plesset equation, \(\dot{m}_{i0}\). To calculate the latter, denoted by \(\dot{m}_{ij}\), we transform equation ([\[eq:time_eqnC\]](#eq:time_eqnC){reference-type="ref" reference="eq:time_eqnC"}) into the Laplace plane. In what folows, \(\hat{C}(r, s)\) and \(\hat{m}_{j}(s)\) are the Laplace transforms of \(C(r, t)\) and \(\dot{m}_{j}(t)\), respectively. With this notation, equation ([\[eq:time_eqnC\]](#eq:time_eqnC){reference-type="ref" reference="eq:time_eqnC"}) turns into \[s\,\hat{C}-D\left[\frac{1}{r^2}\partial^2_{rr}\left(r^2 \, \hat{C}\right) + \frac{1}{r^2\sin\theta}\partial_\theta\left(\sin\theta\partial_\theta \hat{C}\right)\right] =-\hat{m}_{j}\delta\left[\vec{x}-d_{ij}\vec{e}_x\right]. \label{eq:laplace_eqnC}\] To transform the time derivative of the concentration field we take into account that, with the decomposition explained above, the concentration field induced by an individual mass point sink has homogeneous initial conditions, thus \(\partial C/\partial t\) transforms to \(s\,\hat{C}\). The general solution to this equation is: \[\begin{split} \hat{C} & =-\frac{\hat{m}_{j}}{4\pi D}\frac{\exp\left(-\sqrt{s/D}\sqrt{d_{ij}^2 + r^2-2d_{ij}r\cos\theta}\right)}{\sqrt{d_{ij}^2 + r^2-2d_{ij}r\cos\theta}} +\\ & + \sum_{l=0}^\infty\left[a_l\,h_l^{(1)}(\sqrt{-s/D}\,r) + b_l\,h_l^{(2)}(\sqrt{-s/D}\,r)\right]\,P_l(\cos\theta), \end{split} \label{eq:hC_general_solution}\] where \(h_l^{(1)}\) and \(h_l^{(2)}\) are Hankel's functions of first and second kind, respectively. Note that, since they contain exponential functions of imaginary exponent, the minus sign inside the square root of their arguments guarantees that they take real values. Although to compute the concentration field it is necessary to determine the full set of coefficients \((a_l, b_l)\), the calculation of the mass flux \(\hat{m}_{ij}\) that sink \(j\) induces on the bubble only requires knowledge of the coefficients \(a_0\) and \(b_0\). Indeed, the mass transfer due to higher-order harmonics is zero, as \[\dot{m}_{ij} =-2\pi R_i^2 D \, \int_0^\pi \left.\frac{\partial C}{\partial r}\right|_{r=R}\,\sin\theta\,\mathrm{d}\theta \sim \int_0^\pi P_l(\cos\theta)\,\sin\theta\,\mathrm{d}\theta, \label{eq:mass_flux}\] with the last expression being zero for \(l \ge 1\). Moreover, the coefficient \(b_0\) must vanish, as the function \(h_0^{(2)}\left(\sqrt{-s/D}r\right)\) is unbounded as \(r \rightarrow \infty\). To obtain \(a_0\) we introduce ([\[eq:hC_general_solution\]](#eq:hC_general_solution){reference-type="ref" reference="eq:hC_general_solution"}) into ([\[eq:laplace_eqnC\]](#eq:laplace_eqnC){reference-type="ref" reference="eq:laplace_eqnC"}) and project onto \(P_0(\cos\theta)\) to find \[\begin{split} 0 = &-\frac{\hat{m}_j}{4\pi D}\,\int_{-1}^1{ \frac{\exp\left(-\sqrt{\displaystyle \frac{s}{D}}\sqrt{d_{ij}^2 + R_i^2-2d_{ij}R_i x}\right)}{\sqrt{d_{ij}^2 + R_i^2-2d_{ij}R_i x}}\,\mathrm{d}x} + \\ & + 2 a_0 h_0^{(1)}\left(\sqrt{-s/D}\,R_i\right), \end{split}\] where the variable change \(x = \cos\theta\) has been introduced. Here it is good to note that the expression of Eq. (5) is hybrid, as it mixes expressions in Laplace space with the radius of bubble \(i\), which generally is a function of time, \(R_i(t)\). We will however ignore this fact and treat \(R_i\) as a constant in Laplace space to make analytical progress. Physically, this amounts to saying that we assume that the time scale with which the concentration field responds to changes in the configuration is much smaller than that at which the bubble grows. This is an assumption that is quite similar to the "frozen bubble" assumption that was employed in solving the single bubble problem in the original paper by Epstein & Plesset. Evaluating the integrals, and taking into account \(h_0^{(1)}(\sqrt{-s/D}\,R_i) =-e^{-\sqrt{s/D}\,R_i}/\sqrt{s/D}\,R_i\), \[0 = \frac{\hat{m}_j}{4\pi D}\frac{2e^{-\sqrt{s/D}\,d}}{R_i d_{ij}\sqrt{s/D}}\,\sinh\left(\sqrt{s/D}\,R_i\right) + 2 a_0 \frac{e^{-\sqrt{s/D}\,R_i}}{\sqrt{s/D}\,R_i},\] thus \[a_0 =-\frac{\hat{m}_j}{4\pi D d_{ij}}\,e^{-\sqrt{s/D}\left(d_{ij}-R_i\right)}\,\sinh\left(\sqrt{s/D}\,R_i\right).\] Introducing this value of \(a_0\) together with \(b_0 = 0\) into ([\[eq:hC_general_solution\]](#eq:hC_general_solution){reference-type="ref" reference="eq:hC_general_solution"}) and differentiating we get \[\int_0^\pi \left.\frac{\partial \hat{C}}{\partial r}\right|_{r=R_i}\,\sin\theta\,\mathrm{d}\theta =-\frac{\hat{m}_j}{2\pi D d_{ij} R_i} \exp\left(-\sqrt{\frac{s}{D}}\left(d_{ij}-R_i\right)\right).\] Transforming this expression back into the time domain and introducing it in the definition of the mass flux ([\[eq:mass_flux\]](#eq:mass_flux){reference-type="ref" reference="eq:mass_flux"}), \[\dot{m}_{ij} =-\frac{R_i^2 D}{2\sqrt{\pi}}\int_0^t \frac{1}{R_i}\left(1-\frac{R_i}{d_{ij}}\right)\frac{\dot{m}_j(t')}{\left[D(t-t')\right]^{3/2}}\,\exp\left(-\frac{(d_{ij}-R_i)^2}{4D(t-t')}\right)\,\mathrm{d}t'. \label{eq:mass_flux_time}\] To obtain the total mass flux into bubble \(i\), this expression must be summed over all bubbles in the cloud (with the exception of \(i\) itself) and then added to the mass flux provided by the Epstein--Plesset equation, \(\dot{m}_{i0}\), to yield \[\begin{split} \dot{m}_i & = 4\pi R_i^2 D \left(C_\infty-C_s\right)\left(\frac{1}{R_i} + \frac{1}{\sqrt{\pi D t}}\right)-\\ &\frac{R_i^2 D}{2\sqrt{\pi}}\sum_{\substack{j=1 \\ j\neq i}}^N\int_0^t\frac{1}{R_i}\left(1-\frac{R_i}{d_{ij}}\right)\frac{\dot{m}_j(t')}{\left[D(t-t')\right]^{3/2}}\,\exp\left(-\frac{(d_{ij}-R_i)^2}{4D(t-t')}\right)\,\mathrm{d}t'. \end{split} \label{eq:eqn_mdot_dim}\] To make the above expressions dimensionless we introduce the following variables (suppressing indices), \(a = R/R_c\), \(\Delta = d/R_c\), \(\tau = D t/ R_c^2\) and \(\dot{M} = \mathrm{d}M/\mathrm{d}\tau = \dot{m}/(\rho_g D R_c)\), where \(R_c\) is a fixed characteristic bubble diameter, and \(\rho_g\) is the gas density at the ambient pressure \(P_s\). Besides, the saturation level, which indicates the amount of CO\(_2\) dissolved in the liquid, is defined by \(\zeta = C_\infty / C_s\). Let us define also the Ostwald coefficient as \(\Lambda = C_s/\rho_g\). With these definitions, equation ([\[eq:eqn_mdot_dim\]](#eq:eqn_mdot_dim){reference-type="ref" reference="eq:eqn_mdot_dim"}) results in \[\begin{split} \dot{M}_i & = 4\pi a_i^2 \Lambda\left(\zeta-1\right)\left(\frac{1}{a_i} + \frac{1}{\sqrt{\pi\tau}}\right)-\\ &\frac{a_i^2}{2\sqrt{\pi}}\sum_{\substack{j=1 \\ j\neq i}}^N\int_0^\tau \frac{1}{a_i}\left(1-\frac{a_i}{\Delta_{ij}}\right) \frac{\dot{M}_j(\tau')}{\left[\tau-\tau'\right]^{3/2}}\,\exp\left(-\frac{(\Delta_{ij}-a_i)^2}{4(\tau-\tau')}\right)\,\mathrm{d}\tau'. \end{split} \label{eq:eqn_mdot}\] This mass flux must be completed with the mass conservation equation for the \(i-\)th bubble, namely \[\dot{M}_i = 4\pi a_i^2 \frac{\mathrm{d}a_i}{\mathrm{d}\tau}. \label{eq:eqn_massconservation}\] The changes in the volume of the bubble induce a velocity field which, sufficiently far away from its center, can be modelled as that of a volume point source. Thus, considering the whole cloud, each individual bubble moves as a result of the superposition of these flows. In the Stokes limit, the resulting bubble velocity can be computed using the solution provided by \[{\bar{U}_i} = \frac{1}{4\pi} \sum_{\substack{j\neq i}}^N \frac{\mathrm{\bar{e}_{ij}}}{\Delta_{ij}^2} \left( \dot{M}_j-\sum_{\substack{j\neq l}}^N \frac{a_j^3 \dot{M}_l}{\Delta_{jl}^3}\left(1-3(\mathrm{\bar{e}_{ji}} \cdot \mathrm{\bar{e}_{jl}})^2\right) \right). \label{eq:velocities}\] In this equation, \(\bar{e}_{ij}\) is the unit vector pointing from the center of the \(i\)-th to that of the \(j\)-th bubble. In this work, we are going to let bubbles translate with only the first term of this expression since we expect \(\left(a_{j}/\Delta_{jl}\right)^3 \ll 1\). ## Numerical method The computation of the time evolution of the bubble cloud is divided into two stages. First, we integrate equations ([\[eq:eqn_mdot\]](#eq:eqn_mdot){reference-type="ref" reference="eq:eqn_mdot"}) and ([\[eq:eqn_massconservation\]](#eq:eqn_massconservation){reference-type="ref" reference="eq:eqn_massconservation"}) together assuming that the bubbles do not displace and then, in a second stage, we compute the motion of the bubbles using the velocity field given by ([\[eq:velocities\]](#eq:velocities){reference-type="ref" reference="eq:velocities"}). The system of integro-differential equations ([\[eq:eqn_mdot\]](#eq:eqn_mdot){reference-type="ref" reference="eq:eqn_mdot"}-[\[eq:eqn_massconservation\]](#eq:eqn_massconservation){reference-type="ref" reference="eq:eqn_massconservation"}) is solved using an explicit Euler method for the temporal derivatives and a trapezoid method for the integral. Note that the kernel of the integral equation tends smoothly to zero at the integration limit \(\tau' = \tau\), which makes the usage of more sophisticated integration methods unnecessary. We can distinguish two terms in equation ([\[eq:eqn_mdot\]](#eq:eqn_mdot){reference-type="ref" reference="eq:eqn_mdot"}): the first one is the mass flux provided by the Epstein-Plesset equation, which corresponds to the evolution of an isolated bubble. The second term, the integral, models the interaction between each individual bubble and the rest of the cloud. For the calculation of this second term we will adopt the simplifying assumption that the radius of the bubble corresponds to the initial one (frozen bubble). Note that this hypothesis is also adopted in the derivation of the Epstein--Plesset equation. The time step chosen for the simulations presented in this paper is \(\Delta\tau = 10^{-3}\), which has been selected after verifying that taking a smaller time step does not affect the results. Once the time evolution of the bubble radii is computed, the bubbles are displaced using the velocity field given by ([\[eq:velocities\]](#eq:velocities){reference-type="ref" reference="eq:velocities"}) using also, for consistency with the previous stage, an Euler method with the same time step. The start-up of the numerical computation is done by integrating solely the Epstein--Plesset equation up to the time step used for the rest of the calculation, \(\Delta\tau\). Note that this is possible, since at very short times the concentration boundary layer is confined to a thin shell around the bubble of thickness \(\sim \sqrt{\tau}\), which is much smaller than the typical bubble-bubble distance. This makes it possible to neglect the integral term in this first step. This strategy is also used in the computation of the bubble velocities. # Results and discussion {#sec:results_discussion} We split this section into two parts. First, we explore the predictions of the theoretical model just described for conditions representative of our experiments. Then, we compare these predictions, in a qualitative way, with those features of the evolution of the bubble clouds that could be determined from the experiments. ## Results of the model In this section we show the predictions of the model for bubble clouds representative of those observed in the experiments. Since the number of dimensionless parameters of the problem is large, we restrict our results to initially spherical bubble clouds with a number of bubbles large enough to exhibit collective effects, namely \(N=100\), and evolving in liquids with different saturation levels, \(\zeta\). Furthermore, all the bubbles have the same initial size, \(R_0 = 30\) \({\mu}\)m. This radius is consistent with the estimated size of the bubble fragments that result in a similar cavitation experiment. Note that for bubbles of this size it is reasonable to neglect the effect of surface tension in their dynamics, as the Laplace pressure, \(2\sigma/R_0\), with \(\sigma \approx 0.7\) N/m the surface tension coefficient, only becomes of the order of the ambient pressure for bubbles of size \(2\sigma/P_s \approx 1.4\) \(\mu\)m. In all the calculations we have adopted \(\Lambda = 0.842\) and \(D = 1.92\times 10^{-5}\) m\(^2\)/s, corresponding to the values of the system CO\(_2\)-water at 25\(^\mathrm{o}\)C. The initial positions of the bubbles are chosen randomly within a sphere, the cloud, of radius \(R_{bc}\) such that the average bubble density is approximately uniform. To clearly identify the moment when bubbles start to interact with each other, it is convenient to seed the bubbles in the cloud with an average inter-bubble nearest neighbor distance, \(d\), larger than, but still of the order of, one bubble diameter. Assuming that the volume of cloud available per bubble is \(V_{\rm b} \sim \pi d^3 / 6\), setting \(R_{bc} \approx 10 R_0\) yields \(d \approx 4.3 R_0\), which fulfills the above criterion. In what follows, all length scales are made dimensionless with \(R_0\) and time scales with \(R_0^2/D\), using the same notation as in the previous section. Figure [\[fig:Initial_final_cloud\]](#fig:Initial_final_cloud){reference-type="ref" reference="fig:Initial_final_cloud"} shows qualitatively the evolution of a modeled bubble cloud with a saturation \(\zeta = 2\). The top left side is the initial state, \(\tau=0\), whereas the top right one corresponds to the cloud at a later time \(\tau = 3.2\). The color indicates the initial distance from the bubble to the center of the cloud, growing from light to dark hue. To illustrate this color coding, the bottom image represents a cut of the cloud at \(\tau = 3.2\). To average results for bubbles located at a given initial distance from the center, the cloud radius in the initial state has been divided into \(B=10\) layers equally spaced along the radius \(R_{bc}\), with the color indicating the layer number. Using this averaging strategy we can show how bubbles grow at different depths inside the cloud. Panels (\(a\), \(c\), \(e\)) of figure [\[fig:radii_table\]](#fig:radii_table){reference-type="ref" reference="fig:radii_table"} show the time evolution of the radii of the bubbles in three clouds with saturation levels \(\zeta = 1.1, 2\) and 4, averaged over each radial layer. Correspondingly, panels (\(b\), \(d\), \(f\)) show the average bubble radius of each layer at the end of the simulation (\(\tau \approx 6.5\)). The duration of the simulation has been chosen to allow for the observation of the different growth regimes. At early stages all the bubbles grow freely, that is, as isolated bubbles. In this situation, their growth is well described by the Epstein--Plesset equation, corresponding to the red dashed line in the figure. Using our notation, this equation reads \[\frac{\mathrm{d}a}{\mathrm{d}\tau} = \Lambda\left(\zeta-1\right)\left(\frac{1}{a} + \frac{1}{\sqrt{\pi\tau}}\right). \label{eq:epstein_plesset_dimensionless}\] The departure from the growth predicted by this equation is a consequence of the fact that the thickness of the diffusive boundary layer around the bubble grows as \(\delta \sim \sqrt{\tau}\). Therefore, until times of order \(\tau \sim \left(\Delta/2-1\right)^2\) the boundary layers of the different bubbles do not interact and bubbles do not feel each other. However, from that time onwards, the diffusive boundary layers overlap and bubbles compete for the available CO\(_2\). As a consequence, their growth rates diminish quickly, even becoming zero or slightly negative for bubbles in the innermost layers, where the access to the CO\(_2\) present in the bulk outside the cloud is limited. Contrarily, the growth of the bubbles in the husk of the cloud continues, albeit at a much smaller pace. Note that the freezing of the growth of the innermost bubbles, which is also clearly visible in figure [\[fig:Initial_final_cloud\]](#fig:Initial_final_cloud){reference-type="ref" reference="fig:Initial_final_cloud"}c, is consistent with the experimental observations (see figure [\[fig:minibubbles_exp\]](#fig:minibubbles_exp){reference-type="ref" reference="fig:minibubbles_exp"} and the associated discussion). Regarding the slight reduction of the bubble sizes for bubbles deep inside the cloud for \(\tau \gtrsim 2\), observed in figure [\[fig:radii_table\]](#fig:radii_table){reference-type="ref" reference="fig:radii_table"}, although it seems reminiscent of Ostwald-rippening, where surface tension causes large bubbles to grow at the expense of small ones, surface tension is not considered here. Consequently, this bubble size reduction cannot be attributed to this effect. In fact, in the absence of surface tension, the gas concentration at the bubble surface could never be smaller than the saturation one, \(C_s\), which means that bubbles should never shrink. The cause of this anomalous effect is the fact that we model nearby bubbles as point sinks. For a point sink, imposing a given mass flux means that the concentration is minus infinity at the sink. So, if the sink is very close to the bubble, it may occur that locally the concentration becomes smaller than the saturation one, which is a non-physical effect. Naturally, this would not occur were the sink replaced by a physical bubble, as in its surroundings the concentration verifies \(C \ge C_s\) at all times. Nonetheless, the bubble size reduction created by this simplification is at most about 15% in the case \(\zeta = 4\) and smaller in the others. The final radius of bubbles belonging to the innermost layers can be estimated using simple mass conservation arguments. Since these bubbles lose access to the CO\(_2\) from the bulk liquid, they almost stop growing when they have absorbed all the excess CO\(_2\) dissolved in the liquid volume of cloud available per bubble, which we can regard as that of a sphere of diameter \(d\). Thus, the final dimensional mass, \(4\pi/3 \, R_f^3 \rho_g\), must the the sum of the initial one, \(4\pi/3 \, R_0^3 \rho_g\), plus the excess mass of CO\(_2\) dissolved in the liquid volume with respect to the saturation one, namely \((C_\infty-C_s)\pi/6 \, d^3\). In dimensionless terms this yields for the final radius \[a_f = \left(1 + \Lambda\left(\zeta-1\right)\Delta^3/8\right)^{1/3}. \label{eq:af_estimation}\] For the saturation levels corresponding to the simulations in figure [\[fig:radii_table\]](#fig:radii_table){reference-type="ref" reference="fig:radii_table"}, namely \(\zeta = 1.1, 2\) and 4, the values of \(a_f = 1.21, 2.22\) and 3.14 respectively. We must point out here that when we refer to final radius or bubble sizes, we mean at the end of the simulation. Note that, even at the center of the bubble cloud, still bubble radii keep changing with time at long times. However, they do so at a much smaller pace than that predicted by the Epstein--Plesset equation, thus we find it reasonable to regard it as quasi-frozen. As can be observed in figures [\[fig:radii_table\]](#fig:radii_table){reference-type="ref" reference="fig:radii_table"}\(b\), \(d\) and \(f\), the agreement with the numerical results is fairly reasonable, given the assumptions adopted in this estimation. In this figure, markers denote the layer-averaged final radius, with the vertical error bars indicating the minimum and maximum bubble size for each layer. In an analogous way, the horizontal position of each marker represent the mean radial position of the bubbles in the layer at the end of the simulation, which are all contained in the segment marked by the horizontal error bars. Once bubbles deep into the cloud reach this maximum size, it seems reasonable to assume that only those in the outer shell continue growing. Because there is almost no CO\(_2\) inside the cloud, all the mass flux comes across the outer boundary of the cloud. Moreover, this mass flux must be shared between all the bubbles in the outer shell. In a first approximation, we can model this effect by assuming that each bubble does no longer intake gas from a solid angle \(4\pi\) (that is, from all directions) but from a solid angle \(4\pi / N_{os}\), where \(N_{os}\) is the number of bubbles in the outer shell. This means that the Epstein--Plesset equation can still be used to model bubble growth in the husk, but dividing its right hand side by the number of bubbles in the outer shell. To check this hypothesis, we plot in figure [\[fig:Nos_Rep\]](#fig:Nos_Rep){reference-type="ref" reference="fig:Nos_Rep"} the time derivative of the radius of the bubbles in the outermost layer at the end of the simulation divided by the one predicted by the Epstein--Plesset equation as a function of the inverse of the number of bubbles in this layer. These results correspond to the same saturation level, \(\zeta = 2\), but to four different realizations. Because in each realization the bubbles are distributed randomly, the number of them in the outermost layer varies. The average value of this number can be estimated by assuming that the bubble density in the cloud is constant and that the outermost layer has a thickness of about \(d/2\). Using simple geometrical analysis this yields \(N_{os} \approx 3Nd/2R_{bc}\). We conclude this section with a comment about the effect of the saturation level on the growth rate of the cloud. Although in the experiments the radius of the individual bubbles cannot be determined experimentally, it is possible to measure the time evolution of the projected area of the whole cloud by applying image processing to each frame of the high-speed movies. To compare these results against the simulations, we need to compute the time evolution of the projected area of the simulated cloud. To that end, we create synthetic images projecting the three-dimensional bubble cloud onto a plane, as sketched in figure [\[fig:sketch_projected_area\]](#fig:sketch_projected_area){reference-type="ref" reference="fig:sketch_projected_area"} and done in figure [\[fig:Initial_final_cloud\]](#fig:Initial_final_cloud){reference-type="ref" reference="fig:Initial_final_cloud"}. Using this technique, we are able to take into account the effect of bubbles overlapping on the projected cloud area. Note that, since the cloud is spherical and the bubbles are distributed randomly, the choice of the projection plane does not have an effect on the results. The physics behind the growth of the bubble cloud becomes more clear if we focus on the time derivative of the projected area rather than on the area itself, as we explain in the next subsection. Figure [\[fig:dAdt_sim_different_zetas\]](#fig:dAdt_sim_different_zetas){reference-type="ref" reference="fig:dAdt_sim_different_zetas"}\(a\) shows how, for \(\zeta \ge 2\), the evolution of both the projected area and the total gas volume is qualitatively independent of this value, just affecting the absolute value of the growth rates. Indeed, examination of the Epstein--Plesset equation ([\[eq:epstein_plesset_dimensionless\]](#eq:epstein_plesset_dimensionless){reference-type="ref" reference="eq:epstein_plesset_dimensionless"}) suggests that, provided the radius of the bubble is sufficiently larger than the initial one, we can assume \(a \sim \sqrt{\tau}\). In this case, the growth rate of \(a^2\), which is roughly proportional to the projected area, scales with \(\left(\zeta-1\right)\). To check this scaling, we plot in Figure [\[fig:dAdt_sim_different_zetas\]](#fig:dAdt_sim_different_zetas){reference-type="ref" reference="fig:dAdt_sim_different_zetas"}\(b\) the time derivative of the dimensional projected area divided by the saturation level, \(\zeta-1\). As predicted, the curves collapse fairly well at intermediate and long times. At short times, because the bubble radii are still close to the initial ones, the collapse is not so good. Furthermore, the curve corresponding to the smallest saturation level, \(\zeta = 1.1\), does not exhibit such a good collapse at any time. This is due to the influence of the initial bubble radius, which lasts longer due to the smaller growth rate. The model predicts the existence of three different stages in the evolution of the cloud which, despite their noise and variability, are also observed in the experiments. At short times, the area grows relatively fast, at a nearly constant rate. Later on, the rate of change of the area decays slightly faster than the square root of the time. Finally, at long times, the area grows again at a constant rate, albeit at a much slower pace. The last two regimes can be easily explained with a simple heuristic model. Let us assume that the volume of the cloud is the sum of that of the \(N\) bubbles plus their associated water volume (a sphere of radius \(d/2\) for each bubble). Since the water volume in the cloud does not change, the radius of such a cloud would then be \[a_{bc} = \left(N\left(\frac{d}{2}\right)^3 + \sum_i a_i^3\right)^{1/3} = N^{1/3}\left(\left(d/2\right)^3 + a^3\right)^{1/3}.\] where, for simplicity, we take all bubbles to have the same size. The projected area, \(A_{bc} = \pi a_{bc}^2\), has a rate of change \[\frac{\mathrm{d}A_{bc}}{\mathrm{d}\tau} = 2\pi N^{2/3} \frac{a^2 \dot{a}}{\left(\left(d/2\right)^3 + a^3\right)^{1/3}}. \label{eq:theoretical_rate_change_A}\] At short times, the radius of the bubble does not differ much from its initial one, \(a \approx 1\), whereas its time derivative goes as \(\dot{a} \sim \tau^{-1/2}\), as predicted by the Epstein--Plesset equation. Introducing this into Equation ([\[eq:theoretical_rate_change_A\]](#eq:theoretical_rate_change_A){reference-type="ref" reference="eq:theoretical_rate_change_A"}), we get \(\mathrm{d}A_{bc}/\mathrm{d}\tau \sim \tau^{-1/2}\). This is in fairly good agreement with the behavior observed at intermediate times in both experiments and theory. Actually, the rate of change of the area seems to decay slightly faster than this prediction, which is consistent with the fact that bubbles deep inside the cloud stop growing once they deplete their surroundings from CO\(_2\). In other words, the effective value of \(N\) in Equation ([\[eq:theoretical_rate_change_A\]](#eq:theoretical_rate_change_A){reference-type="ref" reference="eq:theoretical_rate_change_A"}) also decays with time, until it only refers to those bubbles located in an outer shell of thickness of order \(\Delta\). At long times, the radius of the bubbles in the outer shell still grows as \(a \sim \tau^{1/2}\), albeit with a prefactor smaller than that predicted by Epstein--Plesset, as discussed above. Moreover, \(a \gg d/2\). In this limit, Equation ([\[eq:theoretical_rate_change_A\]](#eq:theoretical_rate_change_A){reference-type="ref" reference="eq:theoretical_rate_change_A"}) yields \(\mathrm{d}A_{bc}/\mathrm{d}\tau \sim a \dot{a}\), which is constant. As we will see in the next subsection, this is indeed what is observed to occur in the simulations and is qualitatively consistent with the experiments as well, despite the noise. At short times, the model predicts a fast growth rate, not only in absolute value, which is to be expected as a consequence of bubbles growing without competing between them, but also in terms of how slowly it decays. Indeed, although Equation ([\[eq:theoretical_rate_change_A\]](#eq:theoretical_rate_change_A){reference-type="ref" reference="eq:theoretical_rate_change_A"}) suggests that \(\mathrm{d}A_{bc}/\mathrm{d}\tau \sim \tau^{-1/2}\) at short times as well, we observe that \(\mathrm{d}A_{bc}/\mathrm{d}\tau\) is rather constant instead. This is a consequence of the fact that the void fraction inside the cloud grows fast at short times. Thus, the growth of the projected area is the addition of two effects: its boundaries grow, as predicted by Equation ([\[eq:theoretical_rate_change_A\]](#eq:theoretical_rate_change_A){reference-type="ref" reference="eq:theoretical_rate_change_A"}), and the interior of the projected cloud image becomes more opaque as more bubbles overlap on the projection. Naturally, if we compute the total gas volume inside the cloud, \(V\), we observe a much closer agreement with \(\mathrm{d}V^{2/3}/\mathrm{d}t \sim \tau^{-1/2}\), since the fact that bubbles overlap in the image does not affect the evolution of the volume. This can be observed in figure [\[fig:dAdt_sim_different_zetas\]](#fig:dAdt_sim_different_zetas){reference-type="ref" reference="fig:dAdt_sim_different_zetas"}, where the evolution of the time derivative of \(V^{2/3}\) is compared with that of the projected area of the cloud \(A\) for simulations with identical initial bubble distributions but different saturation levels. ## Comparison with experiments In this section we analyze the evolution of the size of the bubble clouds observed in our microgravity experiments, comparing it with that predicted by the model. Several key features of the bubble cloud, such as the number of bubbles or their initial size and spatial distributions cannot be determined experimentally. For this reason, the comparison will be predominantly of qualitative nature and restricted to the area of the bubble cloud projected on an image, which is the magnitude that can be measured experimentally. Nonetheless, despite this limitation, we will show that the different regimes and growth rate behaviors predicted by the model are consistent with those observed experimentally. An important aspect is to determine the saturation level of CO\(_2\) of the water in the experiments. Some isolated bubbles appear in almost all the experiments, and we use them to determine the saturation level, \(\zeta\), as done in. To this end, we track the evolution of their radii by imaging processing. Then, we estimate \(\zeta\) by fitting that evolution to that predicted by the Epstein--Plesset equation, obtaining values between 3.5 and 4.3, depending on the experiment. As stated above, the high bubble density of the cloud precludes the observation of its interior. Consequently, it is not possible to determine experimentally the number of bubbles nor their size distribution, at least not accurately. However, as soon as the capsule brakes upon reaching the bottom of the tower, the sudden appearance of a large apparent gravity allows us to instantly observe those bubbles that were at the center of the cloud (figure [\[fig:minibubbles_exp\]](#fig:minibubbles_exp){reference-type="ref" reference="fig:minibubbles_exp"}). This observation reveals that bubbles deep inside the cloud are much smaller than those near the outer edge, as predicted by the model (figure [\[fig:radii_table\]](#fig:radii_table){reference-type="ref" reference="fig:radii_table"}). Figure [\[fig:Areas_drops\]](#fig:Areas_drops){reference-type="ref" reference="fig:Areas_drops"} shows the time evolution of the projected area for the six drops. In this and the following plot, all the magnitudes are plot with dimensions, to give an idea of the orders of magnitude of the spatial and temporal scales. The jumps observed in some of the curves are due to the merging or separation of individual bubbles from the main cloud. Besides the fact that all the curves grow monotonically, it is not obvious to extract any trend, specially not the existence of different regimes. In part, this is a consequence of the large dispersion in the growth rates of the projected area, which arises from the variability in the initial conditions of the bubble cloud caused by the collapse of the spark-induced cavitation bubble. But also, even if all the clouds were generated identical, the projected area at a given instant is an integral of all the previous growth rates. Thus, this magnitude is not suitable to identify different stages in the cloud growth rate. For this reason, we focus our analysis on the time derivative of the projected area, which is an instantaneous magnitude, i.e. not depending on the bubble cloud history or initial conditions. Figure [\[fig:dAdt\]](#fig:dAdt){reference-type="ref" reference="fig:dAdt"} shows in logarithmic scale the rate of change of the area of the cloud for the six drops carried out in the campaign (see appendix for details on how the time derivative of the area is calculated). The curves in the figure have been scaled with their value at the center of the time range where they follow the law \(\mathrm{d}A/\mathrm{d}t \sim t^{-1/2}\) to be able to compare the evolution of clouds with very different initial sizes and thus growth rates. We plot also the rate of change of the area computed from a numerical simulation with \(\zeta = 4\). In the experiments, the behavior at short times exhibits a larger variability than that predicted by the model. In some experiments we observe the trend \(\mathrm{d}A/\mathrm{d}t \sim t^{-1/2}\) from the first instants, whereas in others the projected area shows an initially constant growth rate. We attribute this anomalous behavior to the fact that, at such short times, some of the clouds still keep some residual velocity as a result of the implosion of the cavitation bubble which gave them birth. As this initial velocity dissipates, the projected area transitions to the regime where it decays as the inverse of the square root of the time. This residual velocity can be observed in the high-speed movies (See movies in the supplemental material). Finally, despite the experimental noise, it is possible to infer that the growth rates stabilizes and decays slower than \(t^{-1/2}\), consistently with the model predictions. # Conclusions We report here experiments where dense bubble clouds grow by diffusion in a supersaturated liquid under microgravity conditions. The bubble clouds are created upon the implosion of a cavitation bubble generated by a spark. Although this way of producing the clouds introduces some variability in the experiments, the evolution of the six bubble clouds studied is qualitatively identical, which suggests that the diffusive growth mechanism that we study is fairly independent of the particular size or shape of the cloud. To achieve microgravity conditions, the experiments have been carried out in the drop tower facility of the German Center of Applied Space Technology and Microgravity (ZARM). The absence of gravity allows us to observe the purely diffusive growth dynamics of the bubble for several seconds, more than an order of magnitude longer than what could be observed under normal gravity, where bubble buoyancy would quickly become dominant. Moreover, we avoid other effects such as natural convection inside the liquid phase. Inspired by the experimental observations, we have developed a mathematical model where each bubble grows competing for the available CO\(_2\) with the others in the cloud, which are treated as point mass sinks. Although, strictly speaking, the model is only valid in the limit of a dilute bubble cloud, it predicts reasonably well the qualitative evolution observed in experiments. The reasonably good agreement of the model with the observations has allowed us to explain, using simple heuristic arguments, the experimental observations. Moreover, this model has been used to investigate aspects that could not be determined experimentally, namely the final distribution of bubble sizes inside the cloud and the effect of the saturation level. # Acknowlegdements {#acknowlegdements .unnumbered} *This work was supported by the Netherlands Center for Multiscale Catalytic Energy Conversion (MCEC), an NWO Gravitation programme funded by the Ministtry of Education, Culture and Science of the government of the Netherlands and the Spanish FEDER/Ministry of Science, Innovation and Universities--Agencia Estatal de Investigación though grants DPI2017-88201-C3-3-R and DPI2018-102829-REDT, partly funded through European Funds. We also acknowledge the support of the European Space Agency (ESA) for providing access to the drop tower through grants HSO/US/2015-29/AO and HRE/RS-PS/2018-7/AO. We thank the team from the ZARM Drop Tower Operation and Service Company (ZarM FAB mbH) for their valuable technical support during the experimental campaigns, and the technical staff of the Dept. of Thermal and Fluids Engineering of Universidad Carlos III de Madrid for their assistance in developing the experimental set up. We are indebted to Dr. L. Champougny for her valuable comments about the manuscript.*
{'timestamp': '2020-06-01T02:11:17', 'yymm': '2005', 'arxiv_id': '2005.14530', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14530'}
# Introduction position sensing is a highly-sought ability for countless context-aware devices in our modern life, including wireless communication with new-generation protocols relying on beam-forming, high-value asset tracking and customer analytics in retail, ambient-assisted living solutions for remote health care, intruder localization in classified facilities, and victim-detection technologies for first responders. Microwave-based sensing solutions are appealing due to their ability to operate through optically opaque materials or fog, their independence of external illumination and target color, limited potential privacy infringements and the non-ionizing nature of microwaves. Moreover, existing wireless infrastructure can often be leveraged, endowing it with a dual communication and sensing functionality. Traditional microwave position sensing relies on ballistic wave propagation and leverages ray tracing approaches, the simplest example being triangulation. Unfortunately, the above-listed applications involve irregular propagation environments which give rise to significant multi-path effects. In some cases, the position to be identified may not even be within the sensor's line of sight but hidden around a corner. In such complex environments, a propagating wave front can get completely scrambled such that its angle or time of arrival cannot be used for position sensing with conventional ray-tracing analysis. Considerable research effort thus goes into overcoming the issues posed by multi-path effects, for instance, using distributed sensor networks encircling the region of interest in combination with a statistical analysis of shadowing effects and/or geometry-based environment models to account for reflections as virtual anchors . A completely different approach consists in embracing the complexity of the propagation medium as virtue rather than obstacle. An indoor environment is electrically large compared to the wavelength and can be characterized as ray-chaotic: the separation of two rays launched from the same location in slightly different directions will increase exponentially in time. A wave-chaotic field is extremely sensitive to both source location and the enclosure's geometry. Inspired by the quantum-mechanical concept of fidelity loss , this sensitivity has been leveraged to distinguish nominally identical enclosures , to detect the presence or motion of small changes in the enclosure's geometry (without localizing them)  as well as to quantify volume changing perturbations . For the problem of position sensing, the wave-chaotic field's sensitivity implies that different positions are associated with distinguishable wave fields that can act like wave fingerprints (WFPs) for the positions. WFPing can be be applied to the localization of cooperative objects (emitting a beacon signal or equipped with a tag)  as well as to non-cooperative objects (no compliance with localization task) . While the former leverages the sensitivity of ray chaos to the source location, the latter leverages its sensitivity to geometrical perturbations. From the wave's point of view, different object positions inevitably correspond to different geometries of the propagation environment. To ensure the distinguishability of WFPs, the chaotic wave field must be probed in a number of \"independent\" ways. Traditionally, this is achieved using spatial or spectral diversity with a network of sensors or broadband measurements. A more recent alternative is to use configurational diversity by reprogramming the propagation environment with a \"reconfigurable intelligent surface\" (RIS). Using a programmable metasurface as RIS, Ref.  leveraged configurational diversity to localize multiple non-cooperative objects outside the line-of-sight with single-port single-frequency measurements. With real-life applications in mind, a fundamental challenge for indoor localization with WFPs arises: how does one handle a dynamic evolution of the propagation environment independent of the objects of concern? Indeed, given the extreme sensitivity of the chaotic wave field to geometrical details, one could expect that a perturbation not related to the object to be localized alters the wave field to an extent that makes it irrecognizable in light of a previously established WFP dictionary. Here, we systematically study the impact of perturbations of the propagation environment on the localization accuracy, considering a frequency-diverse model system both in simulation and experiment. We investigate an interpretation of the perturber as effective source of noise and the extent to which the perturber affects the diversity of the WFP dictionary. We demonstrate that the reduction of the amount of information that can be obtained per measurement as the perturber size is increased can be compensated by taking more measurements, even in the regime where the perturber's scattering strength exceeds that of the object to be localized. Our results stress the importance of appreciating the information-theoretic encoding/decoding cycle of the sensing process in its entirety and reveal that machine-learning decoders outperform traditional decoding techniques especially in the low-SNR regime. # Experimental Setup and WFP Formalism Our experimental setup is shown in Fig. 1: an object is located on one of \(P=5\) possible predefined positions in an irregular metallic enclosure. \(N=51\) complex-valued transmission measurements between two simple monopole antennas are taken in the interval \(1\ \mathrm{GHz} < f < 2.58\ \mathrm{GHz}\) with a software-defined radio (SDR, LimeSDR Mini). Note that the predefined object positions are clearly outside the line-of-sight of the antenna pair. Dynamic perturbations of the propagation environment are introduced in our experiment with a metallic object of variable size mounted on a stepper motor which can place the object in an arbitrary angular orientation. A measured transmission spectrum \(S(f)\) can be decomposed into four contributions: \[S(f) = S_{cav}(f) + S_{obj}(f) + S_{pert}(f) + \mathcal{N}(f).\][\[Sdecomp\]]{#Sdecomp label="Sdecomp"} \(S_{pert}(f)\) accounts for rays that encountered the perturber, \(S_{obj}(f)\) accounts for rays that encountered the object but not the perturber, \(S_{cav}(f)\) accounts for rays that bounced around in the cavity without encountering object or perturber, and \(\mathcal{N}(f)\) denotes the measurement noise. Given the chaotic nature of the complex scattering enclosure, it is customary to assume that real and imaginary components of the entries of the first three terms are drawn from zero-mean Gaussian distributions. The measurement noise is typically also zero-mean Gaussian. The decomposition in Eq. 1 has several subtleties. First, we note that if the perturber size is increased, more rays will encounter the perturber such that not only will the elements of \(S_{pert}(f)\) be drawn from a distribution with larger standard deviation, but at the same time the standard deviation of the distributions of \(S_{cav}(f)\) and \(S_{obj}(f)\) will decrease. In other words, \(S_{cav}(f)\) and \(S_{obj}(f)\) are not independent of the perturbing object. Second, since all the terms are assumed to be drawn from zero-mean distributions, in principle one would expect that by averaging over an ensemble of realizations of the perturber one can estimate \(S_{cav}(f) + S_{obj}(f)\) and by additionally averaging over an ensemble of object positions one can identify \(S_{cav}(f)\). In practice, proper averaging requires a sufficient number of realizations and \(P=5\) may be insufficient for averaging over an ensemble of object positions. In Eq. 1, only the term \(S_{obj}(f)\) encodes information about the object position. To determine a WFP in the presence of a perturber, we therefore average \(S(f)\) over an ensemble of representative perturber realizations. Here, it is relatively easy to ensure that the ensemble is sufficiently large to estimate \(S_{cav}(f) + S_{obj}(f)\) properly. We can then either define the WFP as being \(S_{cav}(f) + S_{obj}(f)\) or we can intend to approximate \(S_{obj}(f)\) with \[S^{(2)}_{obj}(f)=S_{cav}(f) + S_{obj}(f)-\langle S_{cav}(f) + S_{obj}(f)\rangle_{obj}.\][\[Sdecomp\]]{#Sdecomp label="Sdecomp"} We will consider both options below and see that, counter-intuitively, the former one can be advantageous in certain cases. Moreover, Eq. 1 naturally suggests to interpret the perturber as an effective source of noise. We can quantify the scattering strength of the perturber relative to that of the object via an effective perturber-induced SNR \(\rho_p\). Ideally, to that end, we would define \(\sigma_{s}\) and \(\sigma_{n}\) to be the standard deviation of the distributions from which the entries of \(S_{obj}(f)\) and \(S_{pert}(f)\), respectively, are drawn, to define \(\rho_p = \sigma_{s}^2/\sigma_{n}^2\). In practice, we do not know \(S_{obj}(f)\). Depending on whether we choose to use \(S_{cav}(f) + S_{obj}(f)\) or \(S^{(2)}_{obj}(f)\) as WFP, we can define \(\sigma^{(1)}_{s}\) and \(\sigma^{(2)}_{s}\) to be the respective standard deviation, yielding \(\rho^{(1)}_p\) and \(\rho^{(2)}_p\). These effective SNRs quantify to what extent the perturber acts as noise on our chosen WFP, but do not directly reflect the ratio of scattering strengths of object and perturber. The \(P \times N\) WFP dictionary \(\mathbf{H}\) merges the \(P\) WFPs (each WFP is an \(N\)-element vector) into a single matrix. The WFP approach can then also be framed as a multiplexing problem \(Y=\mathbf{H}X+\mathcal{N}\), where \(X\) is a \(1\times P\) vector identifying the object position, \(Y\) is the complex-valued \(1\times N\) measurement vector and \(\mathcal{N}\) is a \(1\times N\) noise vector. # Information-Theoretic Perspective One prerequisite for successful WFPing is the diversity of \(\mathbf{H}\). In our case, the complexity of the propagation environment naturally provides this diversity. The lower the correlations between different WFPs are, the better they can be distinguished. To get a quantitative grasp of the diversity of \(\mathbf{H}\), it is instructive to consider its singular value (SV) decomposition: \(\mathbf{H} = \mathbf{U} \mathbf{\Sigma} \mathbf{V}^T\), where \(\mathbf{\Sigma}\) is a diagonal matrix whose \(i\)th entry is the \(i\)th SV \(\sigma_i\) of \(\mathbf{H}\). The flatter the SV spectrum is, the more diverse is \(\mathbf{H}\). A convenient metric of diversity is the effective rank of \(\mathbf{H}\) which is defined as \(R_{\mathrm{eff}} = \mathrm{exp}\left(-\sum_{i=1}^n \tilde{\sigma}_i \mathrm{ln}(\tilde{\sigma}_i) \right)\), where \(\tilde{\sigma}_i = \sigma_i / \sum_{i=1}^n \sigma_i\) and \(n=\mathrm{min}(N,P)\) . Note that only perfectly orthogonal channels with zero correlation yield \(R_{\mathrm{eff}} = n\). Unfortunately, much of the compressed sensing literature is exclusively focused on the diversity of \(\mathbf{H}\) to understand the achievable performance. For instance, compression ratios are often provided without even indicating at what SNR they are valid. In principle, in the absence of any noise, the tiniest amount of diversity could be sufficient to ensure complete distinguishability even with \(N=1\). Here, we argue that the achievable performance depends on the amount of (useful) information that can be extracted per measurement. In the physical layer, besides diversity the SNR is a second crucial ingredient. Moreover, high diversity and low SNR only ensure good performance if the deployed decoding method in the digital layer is capable of extracting much of the relevant encoded information from the measurement. [\[figIT\]]{#figIT label="figIT"} WFP-based sensing in its entirety as schematically summarized in Fig. 2 can be interpreted as a process consisting of physical encoding and digital decoding of information. Wave propagation through the complex scattering environment naturally (and inevitably) encodes information about the object position in measurements of the wave field. Data processing seeks to retrieve this information. Various decoding methods exist that we will compare later on: (i) *Correlation.* Identify which row of \(\mathbf{H}\) has the highest correlations with \(Y\). This procedure can be interpreted as \"virtual time reversal\" . (ii) *Inversion.* Compute an inverse of \(\mathbf{H}\), for instance, via Tikhonov regularization, and identify the entry of \(\mathbf{H}^{-1}Y\) with the largest magnitude. (iii) *Optimized Inversion.* Use the result from (ii) as initial guess in a non-linear minimization of \(|| Y-\mathbf{H}X ||\) . (iv) *Learning.* Train an artificial neural network (ANN) to map \(Y\) to the corresponding object position. ANN-based approaches have not been studied in the multiplexing literature to date. Besides their potential for superior decoding performance, inference is extremely fast. One forward pass through an ANN only requires a few matrix multiplications but no correlations, matrix inversions or nonlinear optimization routines. From an information-theoretic perspective, it is important to understand fundamental bounds on the sensing performance. A simple bound to compute is the generalized Shannon capacity \[C = \sum_i \mathrm{log}_2 \left( 1+\frac{\rho}{P}\sigma_i \right)\][\[Sdecomp\]]{#Sdecomp label="Sdecomp"} which has been mentioned on a few occasions in a sensing context . Nonetheless, the meaningfulness of \(C\) for a specific sensing scheme is limited for two reasons. First, an ideal input distribution is assumed for \(X\) but in reality all entries of \(X\) are zero except for one which is unity. Second, an ideal decoding method is assumed. Below we will see examples where a system with nominally lower \(C\) nonetheless yields a higher sensing accuracy for certain decoding methods. It is thus essential to appreciate the sensing process in its entirety, including both encoding and decoding as illustrated in Fig. 2. Having introduced the notion of diversity and SNR, we can now briefly comment on how faithfully the metallic enclosure in our experiment represents real-life scenarios. Without a doubt, certain cases like the inside of a vessel or a bank vault are very well represented. Other environments like the inside of a building are less reverberant than a metallic enclosure. Essentially, the quality factor of these \"cavities\" is lower. This implies more correlations within a fixed frequency interval of the transmission spectrum, as well as a lower SNR due to more attenuation. Both result in a decrease of the information that can be extracted per measurement; this effect can be compensated by taking more measurements, for instance, with a wider bandwidth. Nonetheless, from a fundamental perspective, the physics of an indoor system is entirely captured by our metallic enclosure. In scenarios with already existing wireless communication infrastructure, the beacon signals thereof could be used to implement position sensing with WFPs, saving energy and reducing the amount of electromagnetic radiation. # Semi-Analytical Simulations To begin with, we consider a 2D version of our experiment simulated as a 2D system of coupled dipoles  which contains all the essential physical ingredients to simulate wave propagation, reverberation and scattering in our experiment. These simulations offer an ideal platform to identify the effect of dynamic perturbations of the propagation environment on the sensing accuracy without any measurement noise or errors due to imperfect object positioning on the predefined positions, i.e. \(\mathcal{N}(f)=0\). As shown in Fig. 3(a), a perturber of variable size with arbitrary orientation and location (within a specified area) simulates dynamic changes of the environment. Our simulation setup evaluates the transmission between an antenna pair at \(25\) distinct frequencies. We use an ensemble of \(150\) random perturber realizations (random orientation and random location of its center within the allowed area) to estimate \(\mathbf{H}\), \(R_{\mathrm{eff}}\) and \(\rho_p\). The probability density function (PDF) of real and imaginary part of \(S_{pert}\) is seen in Fig. 3(b-e) to be zero-mean single-peaked and tends towards a Gaussian distribution for larger perturbers. [\[figCDCsetupX\]]{#figCDCsetupX label="figCDCsetupX"} ## Impact of Perturbation on Diversity and Effective SNR In Fig. 4 we contrast the use of \(S_{cav}(f) + S_{obj}(f)\) or \(S^{(2)}_{obj}(f)\) as WFP in terms of the resulting diversity (\(R_{\mathrm{eff}}\)), effective SNR (\(\rho_p\)) and sensing capacity (\(C\)). As we will see below, neither of these quantities is a reliable predictor of the sensing accuracy, since they do not take the decoding method into account. For the case of using \(S_{cav}(f) + S_{obj}(f)\) as WFP, the observed trend is clear: as the perturber size increases, both \(R_{\mathrm{eff}}\) and \(\rho_p\) as well as \(C\) decrease. While the impact on \(\rho_p\) was clearly expected, the reduction of diversity is more subtle. It becomes intuitive by considering the extreme case in which the perturbation alters the entire enclosure. Then, averaging over realizations yields the result that would have been obtained in an anechoic environment such that no diversity thanks to wave chaos is left. [\[ReffrhoCDC\]]{#ReffrhoCDC label="ReffrhoCDC"} Using \(S_{obj}(f)\) as opposed to \(S_{cav}(f) + S_{obj}(f)\) would certainly improve the diversity by removing unnecessary correlations (possibly at the expense of a better SNR such that the overall effect on capacity is unclear), but this is not possible in practice. Our closest option to that effect is to use \(S^{(2)}_{obj}(f)\). Straight-forward simulations with random Gaussian matrices show that the effective rank of \(S_{cav}(f) + S_{obj}(f)\) may exceed that of \(S^{(2)}_{obj}(f)\) in cases where \(P\) is small (preventing proper averaging over realizations of the object position) and where the ratio of the standard deviations of the distributions of \(S_{obj}\) and \(S_{cav}\) is large. Nonetheless, in our semi-analytical simulations, we observe in Fig. 4(a) a higher effective rank for \(S^{(2)}_{obj}(f)\) than for \(S_{cav}(f) + S_{obj}(f)\). Yet, since \(\rho^{(2)}_p\) is substantially lower than \(\rho^{(1)}_p\), the effect of using \(S^{(2)}_{obj}(f)\) on the capacity is unfavorable. Complex scattering enclosures are often seen as random field generators . \(R_{\mathrm{eff}}\) is a measure of the number of independent samples and for \(N\gg P\) one expects \(R_{\mathrm{eff}} \rightarrow P\). Yet, in our simulations, \(R_{\mathrm{eff}}\) saturates below \(4\). This observation can be attributed to field correlations, here in the frequency domain, that prevent the field observables from being purely random variables . ## Dependence of Sensing Accuracy on Perturber Size, Number of Measurements and Decoding Method The general trend is clear: the larger the perturbation, the less information can be extracted per measurement, as reflected by the sensing capacitance values plotted in Fig. 4(b). However, this decrease in information per measurement can be compensated with more measurements. At first sight, one may expect that such a compensation is only feasible as long as the object's scattering signature is stronger than the perturber's effect, i.e. for \(\rho_p > 0\ \mathrm{dB}\). Our findings in Fig. 5, however, reveal that there is no abrupt phase change in the relation between achievable accuracy versus perturber size. Instead, using more measurements, successful position sensing is feasible at effective SNRs well below \(0\ \mathrm{dB}\). [\[AccCDC\]]{#AccCDC label="AccCDC"} We systematically compare the previously outlined decoding methods for both choices of WFP. For the learning-based approach, we train an artificial neural network (ANN) consisting of two fully connected layers; the first layer consists of 256 neurons and is followed by a ReLu activation, the second layer consists of \(P=5\) neurons and is followed by a SoftMax activation. Using more neurons or an additional layer does not appear to notably impact the results. We consider two possibilities to provide training data from which the ANN can learn to decode the measurements. The first option is to simply use the raw data from all the perturber realizations that we generated without a need for extracting \(\mathbf{H}\) or other quantities. This brute force method may prove particularly useful in cases where measurements are restricted to intensity-only information which prevents averaging as simple means to extract \(\mathbf{H}\), but this scenario is outside the scope of the present paper. Note that with this approach the WFPs are never explicitly evaluated, but only implicitly contained in the ANN weights. The second option is to synthesize training data with \(Y=\mathbf{H}X+\mathcal{N}\) using the estimated \(\mathbf{H}\) and generating \(\mathcal{N}\) with entries drawn from a Gaussian distribution whose standard deviations match those of the distribution of \(S_{pert}\) extracted from the data. This second method relies on our hypothesis that \(S_{pert}\) is normally distributed and offers the possibility of generating a training dataset of unlimited size. In both cases we normalize the data (zero mean, unit variance) and use the Adam method for stochastic optimization (step size \(10^{-3}\)) to train the ANN weights. In Fig. 5, we show how the achieved sensing accuracy depends on the perturber size and the number of measurements. We ensure that the spacing of the utilized frequency points is always the same and that they are always centered on the same frequency. For instance, for \(N=7\) measurements we pick the central frequency point out of the 25 available ones as well as its three closest neighbours to the left and right. Our results are thus for one specific system realization which explains why the contours in Fig. 5 are not perfectly smooth. Several important observations and conclusions follow from Fig. 5: (i) WFP dictionaries with very different nominal sensing capacities can yield the same accuracy. This is the case for both ANN-based methods in which the accuracy is (almost) identical for \(WFP^{(1)}\) and \(WFP^{(2)}\). (ii) The same WFP dictionary can yield very different accuracies depending on the decoding method. ANN-based decoders are seen to outperform correlation and inversion-based decoders. (iii) The choice of WFP definition is irrelevant for the optimized inversion decoder as well as the ANN-based decoders. For correlation and inversion based decoders, however, using \(WFP^{(1)}\) yields significantly better results. (iv) Irrespective of the perturber size, we achieve an acceptable minimum accuracy (e.g. 95 %). For larger perturbers, we need more measurements to compensate the reduction in the amount of information that can be extracted per measurement. Future information-theoretic work should seek to model the contour for a given accuracy in order to understand how the need for additional measurements scales with \(\rho_p\). (v) At low effective noise levels, some decoders achieve compression ratios above unity, that is they achieve accuracies \(\geq 95\ \%\) to localize \(P=5\) objects with \(N<P\) measurements. For instance, the ANN (raw data) decoder with \(WFP^{(2)}\) achieves 96 % with \(N=3\) at the lowest considered perturber size. However, as in any compressed sensing scenario, it is obvious that the compression ratio is heavily dependent on the noise level (here, the effective noise level due to the perturber size), the independence of different measurements (here, determined to a large extent by the interval between frequency points) and the decoding method (here, an ANN trained with raw data). Thus, a general claim of achieving a compression ratio above unity is not presented as key result of this work. Overall, these results clearly demonstrate that it is fallacious to assume that the diversity or sensing capacity of \(\mathbf{H}\) could be a reliable indicator of the sensing accuracy, hence the importance of considering the sensing process in its information-theoretic entirety as in Fig. 2. # Experimental Results Having established an understanding of the perturber's effect under idealistic conditions in simulation, we now analyze the experimental data. Measurements with our SDR entail a few practical issues. First, there is a \(\pm\pi\) uncertainty in measured phase values, originating from random phase jumps every time the Phase Locked Loop (PLL) is locked (e.g. to change the frequency). To obtain reliable data, we transform each measured complex value \(z\) to \(|z|\ \mathrm{exp}(2i\ \mathrm{mod}(\mathrm{arg}(z),\pi))\); the factor \(2\) in the exponent ensures that the transformed variable's phase explores the entire \(2\pi\) range. Second, the transmitted energy is clearly frequency-dependent, which can be caused by the frequency-dependent coupling of the monopole antennas to the cavity and/or frequency-dependent SDR components. The strong frequency-dependence means that we cannot simply model our variables as being drawn from a unique distribution, instead the distribution's standard deviation becomes frequency-dependent. To maintain the SDR's temperature constant throughout the experiment, we installed a simple CPU fan. We do not observe any significant amplitude or phase drifts over the course of the experiment. We begin by quantifying two contributions to the \(\mathcal{N}\) term in Eq. 1 that were not present in the simulations. First, we estimate the SNR due to measurement noise (by repeating the same measurement multiple times) as \(\rho_1 = 25.5\ \mathrm{dB}\). Second, we estimate the SNR due to both measurement noise and imperfect positioning of the objects on the predefined locations (by repeating the same measurement multiple times after placing the object again on the same position) as \(\rho_2 = 15.8\ \mathrm{dB}\). ## Impact of Perturbation on Diversity and Effective SNR {#figGNU_H_Analysis} Based on 150 perturber realizations (random orientations) for each perturber size, in Fig. 6(a-d) we plot the PDFs of real and imaginary part of \(S_{pert}\) for the smallest and largest perturber considered in our experiment. The zero-mean single-peaked distributions are identical for real and imaginary component but thinner than a Gaussian distribution. In Fig. 6(e) we plot \(R_{\mathrm{eff}}(\mathbf{H})\) vs the effective SNR. Since \(\mathcal{N}(f) \neq 0\) in the experiment, we plot two curves: the blue one only accounts for perturber-induced effective noise, the red one additionally accounts for measurement and positioning noise. The difference between these two curves is appreciable only for small perturber sizes since for larger perturbers \(S_{pert}\) dominates over \(\mathcal{N}\). Unlike in Fig. 4(a), using \(S_{obj}^{(2)}\) lowers not only the effective SNR but also the effective rank. As in Fig. 4(b), we see in Fig. 6(f) that using \(S_{obj}^{(2)}\) is unfavorable in terms of the (normalized) sensing capacity. The impact of \(\mathcal{N}\) on \(C\) is only noticeable for small perturbers. ## Dependence of Sensing Accuracy on Perturber Size, Number of Measurements and Decoding Method {#AccGNU} In Fig. 7 we compare the achievable sensing accuracy in our experiment with the two considered definitions of the WFP and different decoding methods as a function of the perturber size and number of measured frequency points. The observations already made for the corresponding simulation results in Fig. 5 about the unsuitability of \(R_{\mathrm{eff}}\) or \(C\) to predict the sensing accuracy are confirmed once again by Fig. 7. The most notable difference to Fig. 5 is that except for the ANN trained with raw data all decoding methods fail to achieve at least 95 % accuracy once the perturber's surface is larger than 200 \(\mathrm{cm^2}\). We attribute this to the \(\pm\pi\) phase uncertainty of our SDR which introduces errors in the estimation of \(\mathbf{H}\). Since the ANN trained with raw data does not rely on calculating \(\mathbf{H}\), it is not affected. Interestingly, we have thus a case in which it is better to feed the ANN raw data rather than to use physical insight to pre-process the ANN's training data. The ANN decoder trained with raw data is capable of achieving high sensing accuracies despite significant amounts of noise (the effective SNR is as low as-15 dB for the largest perturber, see Fig. 6(e)) and distorted data. Using the ANN decoder trained with raw data, we achieve 100 % sensing accuracy with \(N=3\), i.e. a compression ratio of \(P/N=5/3>1\), for perturbers with a surface as large as \(74\ \mathrm{cm}^2\). Again, we stress that the compression ratio depends on effective SNR, measurement independence and decoding method. # Conclusion and Outlook From a practical point of view, our experiments, in combination with an ANN-based decoder, demonstrated the feasibility of precise position sensing with WFPs in dynamically evolving scattering enclosures using a low-cost and light-weight SDR. This capability is crucial to enable situational awareness in a plethora of emerging applications. Our technique does not rely on detailed knowledge about the environment's geometry and only requires a one-off calibration phase with multiple representative realizations of the dynamic perturbations that are expected during operation. From a conceptual point of view, our work paves the way for a thorough information-theoretic analysis of sensing with WFPs. The dynamic perturber's unfavorable effect on diversity and effective SNR of the WFP dictionary, resulting in the acquisition of less useful information per measurement, can be fully compensated by taking more measurements--even in the regime in which the perturber's scattering strength clearly exceeds that of the object to be localized. We saw that the common practice in compressed sensing to only consider the diversity or capacity of \(\mathbf{H}\) is insufficient to anticipate the achievable sensing accuracy. Our results are of very general nature: they can be applied to other types of wave phenomena (sound, light,\...) and are equally valid for WFPs established with other means such as using spatial or configurational degrees of freedom by employing a sensor network or a RIS . The importance of seeing the entirety of the information-theoretic cycle points towards jointly optimizing encoding in a programmable propagation environment and ML-based decoding, as in the recently proposed \"learned sensing\" paradigm . In contrast to compressed sensing which indiscriminately encodes all information, learned sensing seeks to encode only task-relevant information in the measurements. For position sensing, one could carefully select the frequencies at which measurements are taken (as opposed to linear spacing) and/or engineer the propagation environment with a RIS . Looking ahead, it appears interesting to extend the present work (i) to scenarios with multiple objects to be localized, where neglected inter-object scattering is an additional effective source of noise , (ii) to deeply sub-wavelength position sensing , and (iii) to more complex tasks like image transmission . In this work, the perturber was seen as an obstacle for our task to localize an object. In other contexts, the objective may be to characterize size and motion of a perturber. Diffuse wave spectroscopy  analyzes changes of the broadband impulse response over time to estimate the number or scattering cross section of objects moving through a complex medium. Our work has evidenced that the perturber's scattering strength can also be clearly related to the capacity of a multiplexing channel matrix averaged over different realizations of the perturber's position. Considering configuration-to-configuration multiplexing with two dynamic metasurface transceivers  may thus enable similar characterizations of a moving perturber with single-port single-frequency measurements . # Introduction position sensing is a highly-sought ability for countless context-aware devices in our modern life, including wireless communication with new-generation protocols relying on beam-forming, high-value asset tracking and customer analytics in retail, ambient-assisted living solutions for remote health care, intruder localization in classified facilities, and victim-detection technologies for first responders. Microwave-based sensing solutions are appealing due to their ability to operate through optically opaque materials or fog, their independence of external illumination and target color, limited potential privacy infringements and the non-ionizing nature of microwaves. Moreover, existing wireless infrastructure can often be leveraged, endowing it with a dual communication and sensing functionality. Traditional microwave position sensing relies on ballistic wave propagation and leverages ray tracing approaches, the simplest example being triangulation. Unfortunately, the above-listed applications involve irregular propagation environments which give rise to significant multi-path effects. In some cases, the position to be identified may not even be within the sensor's line of sight but hidden around a corner. In such complex environments, a propagating wave front can get completely scrambled such that its angle or time of arrival cannot be used for position sensing with conventional ray-tracing analysis. Considerable research effort thus goes into overcoming the issues posed by multi-path effects, for instance, using distributed sensor networks encircling the region of interest in combination with a statistical analysis of shadowing effects and/or geometry-based environment models to account for reflections as virtual anchors . A completely different approach consists in embracing the complexity of the propagation medium as virtue rather than obstacle. An indoor environment is electrically large compared to the wavelength and can be characterized as ray-chaotic: the separation of two rays launched from the same location in slightly different directions will increase exponentially in time. A wave-chaotic field is extremely sensitive to both source location and the enclosure's geometry. Inspired by the quantum-mechanical concept of fidelity loss , this sensitivity has been leveraged to distinguish nominally identical enclosures , to detect the presence or motion of small changes in the enclosure's geometry (without localizing them)  as well as to quantify volume changing perturbations . For the problem of position sensing, the wave-chaotic field's sensitivity implies that different positions are associated with distinguishable wave fields that can act like wave fingerprints (WFPs) for the positions. WFPing can be be applied to the localization of cooperative objects (emitting a beacon signal or equipped with a tag)  as well as to non-cooperative objects (no compliance with localization task) . While the former leverages the sensitivity of ray chaos to the source location, the latter leverages its sensitivity to geometrical perturbations. From the wave's point of view, different object positions inevitably correspond to different geometries of the propagation environment. To ensure the distinguishability of WFPs, the chaotic wave field must be probed in a number of \"independent\" ways. Traditionally, this is achieved using spatial or spectral diversity with a network of sensors or broadband measurements. A more recent alternative is to use configurational diversity by reprogramming the propagation environment with a \"reconfigurable intelligent surface\" (RIS). Using a programmable metasurface as RIS, Ref.  leveraged configurational diversity to localize multiple non-cooperative objects outside the line-of-sight with single-port single-frequency measurements. With real-life applications in mind, a fundamental challenge for indoor localization with WFPs arises: how does one handle a dynamic evolution of the propagation environment independent of the objects of concern? Indeed, given the extreme sensitivity of the chaotic wave field to geometrical details, one could expect that a perturbation not related to the object to be localized alters the wave field to an extent that makes it irrecognizable in light of a previously established WFP dictionary. Here, we systematically study the impact of perturbations of the propagation environment on the localization accuracy, considering a frequency-diverse model system both in simulation and experiment. We investigate an interpretation of the perturber as effective source of noise and the extent to which the perturber affects the diversity of the WFP dictionary. We demonstrate that the reduction of the amount of information that can be obtained per measurement as the perturber size is increased can be compensated by taking more measurements, even in the regime where the perturber's scattering strength exceeds that of the object to be localized. Our results stress the importance of appreciating the information-theoretic encoding/decoding cycle of the sensing process in its entirety and reveal that machine-learning decoders outperform traditional decoding techniques especially in the low-SNR regime. # Experimental Setup and WFP Formalism Our experimental setup is shown in Fig. 1: an object is located on one of \(P=5\) possible predefined positions in an irregular metallic enclosure. \(N=51\) complex-valued transmission measurements between two simple monopole antennas are taken in the interval \(1\ \mathrm{GHz} < f < 2.58\ \mathrm{GHz}\) with a software-defined radio (SDR, LimeSDR Mini). Note that the predefined object positions are clearly outside the line-of-sight of the antenna pair. Dynamic perturbations of the propagation environment are introduced in our experiment with a metallic object of variable size mounted on a stepper motor which can place the object in an arbitrary angular orientation. A measured transmission spectrum \(S(f)\) can be decomposed into four contributions: \[S(f) = S_{cav}(f) + S_{obj}(f) + S_{pert}(f) + \mathcal{N}(f).\][\[Sdecomp\]]{#Sdecomp label="Sdecomp"} \(S_{pert}(f)\) accounts for rays that encountered the perturber, \(S_{obj}(f)\) accounts for rays that encountered the object but not the perturber, \(S_{cav}(f)\) accounts for rays that bounced around in the cavity without encountering object or perturber, and \(\mathcal{N}(f)\) denotes the measurement noise. Given the chaotic nature of the complex scattering enclosure, it is customary to assume that real and imaginary components of the entries of the first three terms are drawn from zero-mean Gaussian distributions. The measurement noise is typically also zero-mean Gaussian. The decomposition in Eq. 1 has several subtleties. First, we note that if the perturber size is increased, more rays will encounter the perturber such that not only will the elements of \(S_{pert}(f)\) be drawn from a distribution with larger standard deviation, but at the same time the standard deviation of the distributions of \(S_{cav}(f)\) and \(S_{obj}(f)\) will decrease. In other words, \(S_{cav}(f)\) and \(S_{obj}(f)\) are not independent of the perturbing object. Second, since all the terms are assumed to be drawn from zero-mean distributions, in principle one would expect that by averaging over an ensemble of realizations of the perturber one can estimate \(S_{cav}(f) + S_{obj}(f)\) and by additionally averaging over an ensemble of object positions one can identify \(S_{cav}(f)\). In practice, proper averaging requires a sufficient number of realizations and \(P=5\) may be insufficient for averaging over an ensemble of object positions. In Eq. 1, only the term \(S_{obj}(f)\) encodes information about the object position. To determine a WFP in the presence of a perturber, we therefore average \(S(f)\) over an ensemble of representative perturber realizations. Here, it is relatively easy to ensure that the ensemble is sufficiently large to estimate \(S_{cav}(f) + S_{obj}(f)\) properly. We can then either define the WFP as being \(S_{cav}(f) + S_{obj}(f)\) or we can intend to approximate \(S_{obj}(f)\) with \[S^{(2)}_{obj}(f)=S_{cav}(f) + S_{obj}(f)-\langle S_{cav}(f) + S_{obj}(f)\rangle_{obj}.\][\[Sdecomp\]]{#Sdecomp label="Sdecomp"} We will consider both options below and see that, counter-intuitively, the former one can be advantageous in certain cases. Moreover, Eq. 1 naturally suggests to interpret the perturber as an effective source of noise. We can quantify the scattering strength of the perturber relative to that of the object via an effective perturber-induced SNR \(\rho_p\). Ideally, to that end, we would define \(\sigma_{s}\) and \(\sigma_{n}\) to be the standard deviation of the distributions from which the entries of \(S_{obj}(f)\) and \(S_{pert}(f)\), respectively, are drawn, to define \(\rho_p = \sigma_{s}^2/\sigma_{n}^2\). In practice, we do not know \(S_{obj}(f)\). Depending on whether we choose to use \(S_{cav}(f) + S_{obj}(f)\) or \(S^{(2)}_{obj}(f)\) as WFP, we can define \(\sigma^{(1)}_{s}\) and \(\sigma^{(2)}_{s}\) to be the respective standard deviation, yielding \(\rho^{(1)}_p\) and \(\rho^{(2)}_p\). These effective SNRs quantify to what extent the perturber acts as noise on our chosen WFP, but do not directly reflect the ratio of scattering strengths of object and perturber. The \(P \times N\) WFP dictionary \(\mathbf{H}\) merges the \(P\) WFPs (each WFP is an \(N\)-element vector) into a single matrix. The WFP approach can then also be framed as a multiplexing problem \(Y=\mathbf{H}X+\mathcal{N}\), where \(X\) is a \(1\times P\) vector identifying the object position, \(Y\) is the complex-valued \(1\times N\) measurement vector and \(\mathcal{N}\) is a \(1\times N\) noise vector. # Information-Theoretic Perspective One prerequisite for successful WFPing is the diversity of \(\mathbf{H}\). In our case, the complexity of the propagation environment naturally provides this diversity. The lower the correlations between different WFPs are, the better they can be distinguished. To get a quantitative grasp of the diversity of \(\mathbf{H}\), it is instructive to consider its singular value (SV) decomposition: \(\mathbf{H} = \mathbf{U} \mathbf{\Sigma} \mathbf{V}^T\), where \(\mathbf{\Sigma}\) is a diagonal matrix whose \(i\)th entry is the \(i\)th SV \(\sigma_i\) of \(\mathbf{H}\). The flatter the SV spectrum is, the more diverse is \(\mathbf{H}\). A convenient metric of diversity is the effective rank of \(\mathbf{H}\) which is defined as \(R_{\mathrm{eff}} = \mathrm{exp}\left(-\sum_{i=1}^n \tilde{\sigma}_i \mathrm{ln}(\tilde{\sigma}_i) \right)\), where \(\tilde{\sigma}_i = \sigma_i / \sum_{i=1}^n \sigma_i\) and \(n=\mathrm{min}(N,P)\) . Note that only perfectly orthogonal channels with zero correlation yield \(R_{\mathrm{eff}} = n\). Unfortunately, much of the compressed sensing literature is exclusively focused on the diversity of \(\mathbf{H}\) to understand the achievable performance. For instance, compression ratios are often provided without even indicating at what SNR they are valid. In principle, in the absence of any noise, the tiniest amount of diversity could be sufficient to ensure complete distinguishability even with \(N=1\). Here, we argue that the achievable performance depends on the amount of (useful) information that can be extracted per measurement. In the physical layer, besides diversity the SNR is a second crucial ingredient. Moreover, high diversity and low SNR only ensure good performance if the deployed decoding method in the digital layer is capable of extracting much of the relevant encoded information from the measurement. [\[figIT\]]{#figIT label="figIT"} WFP-based sensing in its entirety as schematically summarized in Fig. 2 can be interpreted as a process consisting of physical encoding and digital decoding of information. Wave propagation through the complex scattering environment naturally (and inevitably) encodes information about the object position in measurements of the wave field. Data processing seeks to retrieve this information. Various decoding methods exist that we will compare later on: (i) *Correlation.* Identify which row of \(\mathbf{H}\) has the highest correlations with \(Y\). This procedure can be interpreted as \"virtual time reversal\" . (ii) *Inversion.* Compute an inverse of \(\mathbf{H}\), for instance, via Tikhonov regularization, and identify the entry of \(\mathbf{H}^{-1}Y\) with the largest magnitude. (iii) *Optimized Inversion.* Use the result from (ii) as initial guess in a non-linear minimization of \(|| Y-\mathbf{H}X ||\) . (iv) *Learning.* Train an artificial neural network (ANN) to map \(Y\) to the corresponding object position. ANN-based approaches have not been studied in the multiplexing literature to date. Besides their potential for superior decoding performance, inference is extremely fast. One forward pass through an ANN only requires a few matrix multiplications but no correlations, matrix inversions or nonlinear optimization routines. From an information-theoretic perspective, it is important to understand fundamental bounds on the sensing performance. A simple bound to compute is the generalized Shannon capacity \[C = \sum_i \mathrm{log}_2 \left( 1+\frac{\rho}{P}\sigma_i \right)\][\[Sdecomp\]]{#Sdecomp label="Sdecomp"} which has been mentioned on a few occasions in a sensing context . Nonetheless, the meaningfulness of \(C\) for a specific sensing scheme is limited for two reasons. First, an ideal input distribution is assumed for \(X\) but in reality all entries of \(X\) are zero except for one which is unity. Second, an ideal decoding method is assumed. Below we will see examples where a system with nominally lower \(C\) nonetheless yields a higher sensing accuracy for certain decoding methods. It is thus essential to appreciate the sensing process in its entirety, including both encoding and decoding as illustrated in Fig. 2. Having introduced the notion of diversity and SNR, we can now briefly comment on how faithfully the metallic enclosure in our experiment represents real-life scenarios. Without a doubt, certain cases like the inside of a vessel or a bank vault are very well represented. Other environments like the inside of a building are less reverberant than a metallic enclosure. Essentially, the quality factor of these \"cavities\" is lower. This implies more correlations within a fixed frequency interval of the transmission spectrum, as well as a lower SNR due to more attenuation. Both result in a decrease of the information that can be extracted per measurement; this effect can be compensated by taking more measurements, for instance, with a wider bandwidth. Nonetheless, from a fundamental perspective, the physics of an indoor system is entirely captured by our metallic enclosure. In scenarios with already existing wireless communication infrastructure, the beacon signals thereof could be used to implement position sensing with WFPs, saving energy and reducing the amount of electromagnetic radiation. # Semi-Analytical Simulations To begin with, we consider a 2D version of our experiment simulated as a 2D system of coupled dipoles  which contains all the essential physical ingredients to simulate wave propagation, reverberation and scattering in our experiment. These simulations offer an ideal platform to identify the effect of dynamic perturbations of the propagation environment on the sensing accuracy without any measurement noise or errors due to imperfect object positioning on the predefined positions, i.e. \(\mathcal{N}(f)=0\). As shown in Fig. 3(a), a perturber of variable size with arbitrary orientation and location (within a specified area) simulates dynamic changes of the environment. Our simulation setup evaluates the transmission between an antenna pair at \(25\) distinct frequencies. We use an ensemble of \(150\) random perturber realizations (random orientation and random location of its center within the allowed area) to estimate \(\mathbf{H}\), \(R_{\mathrm{eff}}\) and \(\rho_p\). The probability density function (PDF) of real and imaginary part of \(S_{pert}\) is seen in Fig. 3(b-e) to be zero-mean single-peaked and tends towards a Gaussian distribution for larger perturbers. [\[figCDCsetupX\]]{#figCDCsetupX label="figCDCsetupX"} ## Impact of Perturbation on Diversity and Effective SNR {#impact-of-perturbation-on-diversity-and-effective-snr-1} In Fig. 4 we contrast the use of \(S_{cav}(f) + S_{obj}(f)\) or \(S^{(2)}_{obj}(f)\) as WFP in terms of the resulting diversity (\(R_{\mathrm{eff}}\)), effective SNR (\(\rho_p\)) and sensing capacity (\(C\)). As we will see below, neither of these quantities is a reliable predictor of the sensing accuracy, since they do not take the decoding method into account. For the case of using \(S_{cav}(f) + S_{obj}(f)\) as WFP, the observed trend is clear: as the perturber size increases, both \(R_{\mathrm{eff}}\) and \(\rho_p\) as well as \(C\) decrease. While the impact on \(\rho_p\) was clearly expected, the reduction of diversity is more subtle. It becomes intuitive by considering the extreme case in which the perturbation alters the entire enclosure. Then, averaging over realizations yields the result that would have been obtained in an anechoic environment such that no diversity thanks to wave chaos is left. [\[ReffrhoCDC\]]{#ReffrhoCDC label="ReffrhoCDC"} Using \(S_{obj}(f)\) as opposed to \(S_{cav}(f) + S_{obj}(f)\) would certainly improve the diversity by removing unnecessary correlations (possibly at the expense of a better SNR such that the overall effect on capacity is unclear), but this is not possible in practice. Our closest option to that effect is to use \(S^{(2)}_{obj}(f)\). Straight-forward simulations with random Gaussian matrices show that the effective rank of \(S_{cav}(f) + S_{obj}(f)\) may exceed that of \(S^{(2)}_{obj}(f)\) in cases where \(P\) is small (preventing proper averaging over realizations of the object position) and where the ratio of the standard deviations of the distributions of \(S_{obj}\) and \(S_{cav}\) is large. Nonetheless, in our semi-analytical simulations, we observe in Fig. 4(a) a higher effective rank for \(S^{(2)}_{obj}(f)\) than for \(S_{cav}(f) + S_{obj}(f)\). Yet, since \(\rho^{(2)}_p\) is substantially lower than \(\rho^{(1)}_p\), the effect of using \(S^{(2)}_{obj}(f)\) on the capacity is unfavorable. Complex scattering enclosures are often seen as random field generators . \(R_{\mathrm{eff}}\) is a measure of the number of independent samples and for \(N\gg P\) one expects \(R_{\mathrm{eff}} \rightarrow P\). Yet, in our simulations, \(R_{\mathrm{eff}}\) saturates below \(4\). This observation can be attributed to field correlations, here in the frequency domain, that prevent the field observables from being purely random variables . ## Dependence of Sensing Accuracy on Perturber Size, Number of Measurements and Decoding Method {#dependence-of-sensing-accuracy-on-perturber-size-number-of-measurements-and-decoding-method-1} The general trend is clear: the larger the perturbation, the less information can be extracted per measurement, as reflected by the sensing capacitance values plotted in Fig. 4(b). However, this decrease in information per measurement can be compensated with more measurements. At first sight, one may expect that such a compensation is only feasible as long as the object's scattering signature is stronger than the perturber's effect, i.e. for \(\rho_p > 0\ \mathrm{dB}\). Our findings in Fig. 5, however, reveal that there is no abrupt phase change in the relation between achievable accuracy versus perturber size. Instead, using more measurements, successful position sensing is feasible at effective SNRs well below \(0\ \mathrm{dB}\). [\[AccCDC\]]{#AccCDC label="AccCDC"} We systematically compare the previously outlined decoding methods for both choices of WFP. For the learning-based approach, we train an artificial neural network (ANN) consisting of two fully connected layers; the first layer consists of 256 neurons and is followed by a ReLu activation, the second layer consists of \(P=5\) neurons and is followed by a SoftMax activation. Using more neurons or an additional layer does not appear to notably impact the results. We consider two possibilities to provide training data from which the ANN can learn to decode the measurements. The first option is to simply use the raw data from all the perturber realizations that we generated without a need for extracting \(\mathbf{H}\) or other quantities. This brute force method may prove particularly useful in cases where measurements are restricted to intensity-only information which prevents averaging as simple means to extract \(\mathbf{H}\), but this scenario is outside the scope of the present paper. Note that with this approach the WFPs are never explicitly evaluated, but only implicitly contained in the ANN weights. The second option is to synthesize training data with \(Y=\mathbf{H}X+\mathcal{N}\) using the estimated \(\mathbf{H}\) and generating \(\mathcal{N}\) with entries drawn from a Gaussian distribution whose standard deviations match those of the distribution of \(S_{pert}\) extracted from the data. This second method relies on our hypothesis that \(S_{pert}\) is normally distributed and offers the possibility of generating a training dataset of unlimited size. In both cases we normalize the data (zero mean, unit variance) and use the Adam method for stochastic optimization (step size \(10^{-3}\)) to train the ANN weights. In Fig. 5, we show how the achieved sensing accuracy depends on the perturber size and the number of measurements. We ensure that the spacing of the utilized frequency points is always the same and that they are always centered on the same frequency. For instance, for \(N=7\) measurements we pick the central frequency point out of the 25 available ones as well as its three closest neighbours to the left and right. Our results are thus for one specific system realization which explains why the contours in Fig. 5 are not perfectly smooth. Several important observations and conclusions follow from Fig. 5: (i) WFP dictionaries with very different nominal sensing capacities can yield the same accuracy. This is the case for both ANN-based methods in which the accuracy is (almost) identical for \(WFP^{(1)}\) and \(WFP^{(2)}\). (ii) The same WFP dictionary can yield very different accuracies depending on the decoding method. ANN-based decoders are seen to outperform correlation and inversion-based decoders. (iii) The choice of WFP definition is irrelevant for the optimized inversion decoder as well as the ANN-based decoders. For correlation and inversion based decoders, however, using \(WFP^{(1)}\) yields significantly better results. (iv) Irrespective of the perturber size, we achieve an acceptable minimum accuracy (e.g. 95 %). For larger perturbers, we need more measurements to compensate the reduction in the amount of information that can be extracted per measurement. Future information-theoretic work should seek to model the contour for a given accuracy in order to understand how the need for additional measurements scales with \(\rho_p\). (v) At low effective noise levels, some decoders achieve compression ratios above unity, that is they achieve accuracies \(\geq 95\ \%\) to localize \(P=5\) objects with \(N<P\) measurements. For instance, the ANN (raw data) decoder with \(WFP^{(2)}\) achieves 96 % with \(N=3\) at the lowest considered perturber size. However, as in any compressed sensing scenario, it is obvious that the compression ratio is heavily dependent on the noise level (here, the effective noise level due to the perturber size), the independence of different measurements (here, determined to a large extent by the interval between frequency points) and the decoding method (here, an ANN trained with raw data). Thus, a general claim of achieving a compression ratio above unity is not presented as key result of this work. Overall, these results clearly demonstrate that it is fallacious to assume that the diversity or sensing capacity of \(\mathbf{H}\) could be a reliable indicator of the sensing accuracy, hence the importance of considering the sensing process in its information-theoretic entirety as in Fig. 2. # Experimental Results Having established an understanding of the perturber's effect under idealistic conditions in simulation, we now analyze the experimental data. Measurements with our SDR entail a few practical issues. First, there is a \(\pm\pi\) uncertainty in measured phase values, originating from random phase jumps every time the Phase Locked Loop (PLL) is locked (e.g. to change the frequency). To obtain reliable data, we transform each measured complex value \(z\) to \(|z|\ \mathrm{exp}(2i\ \mathrm{mod}(\mathrm{arg}(z),\pi))\); the factor \(2\) in the exponent ensures that the transformed variable's phase explores the entire \(2\pi\) range. Second, the transmitted energy is clearly frequency-dependent, which can be caused by the frequency-dependent coupling of the monopole antennas to the cavity and/or frequency-dependent SDR components. The strong frequency-dependence means that we cannot simply model our variables as being drawn from a unique distribution, instead the distribution's standard deviation becomes frequency-dependent. To maintain the SDR's temperature constant throughout the experiment, we installed a simple CPU fan. We do not observe any significant amplitude or phase drifts over the course of the experiment. We begin by quantifying two contributions to the \(\mathcal{N}\) term in Eq. 1 that were not present in the simulations. First, we estimate the SNR due to measurement noise (by repeating the same measurement multiple times) as \(\rho_1 = 25.5\ \mathrm{dB}\). Second, we estimate the SNR due to both measurement noise and imperfect positioning of the objects on the predefined locations (by repeating the same measurement multiple times after placing the object again on the same position) as \(\rho_2 = 15.8\ \mathrm{dB}\). ## Impact of Perturbation on Diversity and Effective SNR {#figGNU_H_Analysis} Based on 150 perturber realizations (random orientations) for each perturber size, in Fig. 6(a-d) we plot the PDFs of real and imaginary part of \(S_{pert}\) for the smallest and largest perturber considered in our experiment. The zero-mean single-peaked distributions are identical for real and imaginary component but thinner than a Gaussian distribution. In Fig. 6(e) we plot \(R_{\mathrm{eff}}(\mathbf{H})\) vs the effective SNR. Since \(\mathcal{N}(f) \neq 0\) in the experiment, we plot two curves: the blue one only accounts for perturber-induced effective noise, the red one additionally accounts for measurement and positioning noise. The difference between these two curves is appreciable only for small perturber sizes since for larger perturbers \(S_{pert}\) dominates over \(\mathcal{N}\). Unlike in Fig. 4(a), using \(S_{obj}^{(2)}\) lowers not only the effective SNR but also the effective rank. As in Fig. 4(b), we see in Fig. 6(f) that using \(S_{obj}^{(2)}\) is unfavorable in terms of the (normalized) sensing capacity. The impact of \(\mathcal{N}\) on \(C\) is only noticeable for small perturbers. ## Dependence of Sensing Accuracy on Perturber Size, Number of Measurements and Decoding Method {#AccGNU} In Fig. 7 we compare the achievable sensing accuracy in our experiment with the two considered definitions of the WFP and different decoding methods as a function of the perturber size and number of measured frequency points. The observations already made for the corresponding simulation results in Fig. 5 about the unsuitability of \(R_{\mathrm{eff}}\) or \(C\) to predict the sensing accuracy are confirmed once again by Fig. 7. The most notable difference to Fig. 5 is that except for the ANN trained with raw data all decoding methods fail to achieve at least 95 % accuracy once the perturber's surface is larger than 200 \(\mathrm{cm^2}\). We attribute this to the \(\pm\pi\) phase uncertainty of our SDR which introduces errors in the estimation of \(\mathbf{H}\). Since the ANN trained with raw data does not rely on calculating \(\mathbf{H}\), it is not affected. Interestingly, we have thus a case in which it is better to feed the ANN raw data rather than to use physical insight to pre-process the ANN's training data. The ANN decoder trained with raw data is capable of achieving high sensing accuracies despite significant amounts of noise (the effective SNR is as low as-15 dB for the largest perturber, see Fig. 6(e)) and distorted data. Using the ANN decoder trained with raw data, we achieve 100 % sensing accuracy with \(N=3\), i.e. a compression ratio of \(P/N=5/3>1\), for perturbers with a surface as large as \(74\ \mathrm{cm}^2\). Again, we stress that the compression ratio depends on effective SNR, measurement independence and decoding method. # Conclusion and Outlook From a practical point of view, our experiments, in combination with an ANN-based decoder, demonstrated the feasibility of precise position sensing with WFPs in dynamically evolving scattering enclosures using a low-cost and light-weight SDR. This capability is crucial to enable situational awareness in a plethora of emerging applications. Our technique does not rely on detailed knowledge about the environment's geometry and only requires a one-off calibration phase with multiple representative realizations of the dynamic perturbations that are expected during operation. From a conceptual point of view, our work paves the way for a thorough information-theoretic analysis of sensing with WFPs. The dynamic perturber's unfavorable effect on diversity and effective SNR of the WFP dictionary, resulting in the acquisition of less useful information per measurement, can be fully compensated by taking more measurements--even in the regime in which the perturber's scattering strength clearly exceeds that of the object to be localized. We saw that the common practice in compressed sensing to only consider the diversity or capacity of \(\mathbf{H}\) is insufficient to anticipate the achievable sensing accuracy. Our results are of very general nature: they can be applied to other types of wave phenomena (sound, light,\...) and are equally valid for WFPs established with other means such as using spatial or configurational degrees of freedom by employing a sensor network or a RIS . The importance of seeing the entirety of the information-theoretic cycle points towards jointly optimizing encoding in a programmable propagation environment and ML-based decoding, as in the recently proposed \"learned sensing\" paradigm . In contrast to compressed sensing which indiscriminately encodes all information, learned sensing seeks to encode only task-relevant information in the measurements. For position sensing, one could carefully select the frequencies at which measurements are taken (as opposed to linear spacing) and/or engineer the propagation environment with a RIS . Looking ahead, it appears interesting to extend the present work (i) to scenarios with multiple objects to be localized, where neglected inter-object scattering is an additional effective source of noise , (ii) to deeply sub-wavelength position sensing , and (iii) to more complex tasks like image transmission . In this work, the perturber was seen as an obstacle for our task to localize an object. In other contexts, the objective may be to characterize size and motion of a perturber. Diffuse wave spectroscopy  analyzes changes of the broadband impulse response over time to estimate the number or scattering cross section of objects moving through a complex medium. Our work has evidenced that the perturber's scattering strength can also be clearly related to the capacity of a multiplexing channel matrix averaged over different realizations of the perturber's position. Considering configuration-to-configuration multiplexing with two dynamic metasurface transceivers  may thus enable similar characterizations of a moving perturber with single-port single-frequency measurements .
{'timestamp': '2020-06-11T02:25:40', 'yymm': '2005', 'arxiv_id': '2005.14513', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14513'}
{'timestamp': '2020-06-01T02:03:27', 'yymm': '2005', 'arxiv_id': '2005.14297', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14297'}
null
null
null
null
# Introduction {#SecIntro} It is a well-known fact that the Earth's environment---its lithosphere, hydrosphere, atmosphere, and biosphere---has transformed greatly over time, and the same also applies to other terrestrial planets in our Solar system. In tandem, there is growing awareness and acceptance of the fact that habitability is a multi-faceted and dynamic concept that depends on a number of variables aside from the existence of liquid water; the latter criterion has been widely employed to demarcate the limits of the so-called habitable zone and its manifold extensions. One of the most crucial environmental parameters that regulates myriad biological processes, and thus the propensity for planetary habitability, is the ambient temperature. It is not surprising, therefore, that there exists a large corpus of work on the thermal limits of life based on comprehensive experiments on thermophiles. In recent times, numerical models have employed the thermal limits for Earth-like complex life to assess the habitability of exoplanets for such organisms, and similar analyses have been undertaken for generic subsurface biospheres as well. Motivated by these facts, we will study how temperature impacts the prospects for aquatic photosynthesis on Earth-analogs around stars of two noteworthy spectral types. By Earth-analogs, we refer hereafter to rocky planets that are sufficiently similar to Earth insofar as *all* their geological, physical, and chemical properties are concerned. Our reasons for choosing to investigate aquatic photosynthesis are twofold. First, the importance of photosynthesis is well-established from the standpoint of physics and biochemistry as stellar radiation is the most plentiful source of thermodynamic disequilibrium, and photosynthesis represents the dominant avenue for the biosynthesis on organic compounds on Earth. In particular, we will focus on oxygenic photosynthesis because its electron donor (water) is available in plentiful supply, consequently ensuring that this mechanism is not stymied by the access to electron donors. Moreover, the advent of oxygenic photosynthesis is known to have profoundly altered Earth's geochemistry and biology. We will adopt the conventional range of \(\lambda_\mathrm{min} = 400\) nm and \(\lambda_\mathrm{max} = 700\) nm for oxygenic photosynthesis, known as photosynthetically active radiation (PAR). To be precise, oxygenic photosynthesis can operate at wavelengths of \(350\)-\(750\) nm, but the canonical choice of the PAR range delineated above does not alter our subsequent results significantly. We will not delve into the feasibility of multi-photon schemes that might elevate \(\lambda_\mathrm{max}\) to longer wavelengths, because their efficacy has not been adequately established. On the one hand, it is plausible that the upper bound (namely \(\lambda_\mathrm{max}\)) for PAR could be boosted to wavelengths of \(\gtrsim 1000\) nm. However, on the other hand, these multi-photon schemes may be more fragile and susceptible to low efficiencies due to side reactions. Moreover, recent numerical modeling based on empirical data indicates that, while photosynthesis in the near-infrared is feasible, oxygenic photosynthesis on M-dwarfs may eventually revert to the conventional PAR range described in the preceding paragraph. The second reason why we opt to investigate the prospects for aquatic photosynthesis stems from the basic datum that the oceans contribute nearly half to the overall NPP of modern Earth. In fact, Earth was almost exclusively composed of oceans (i.e., virtually devoid of large landmasses) for a certain fraction of its history, implying that aquatic photosynthesis may have played an even more significant role in those periods. A few theoretical models have even proposed that continents only emerged in late-Archean era in the neighborhood of \(2.5\) Gya; this conjecture seems to be compatible with the recent analysis of oxygen-18 isotope data from the Pilbara Craton of Western Australia. Looking beyond Earth, statistical analyses of exoplanets indicate that a substantial fraction of super-Earths are rich in volatiles. In particular, some of the Earth-sized planets in the famous TRAPPIST-1 system may fall under this category, with the water fraction potentially reaching values as high as \(\sim 10\%\) by mass. The habitability of ocean planets (also called water worlds), which are wholly devoid of continents, has been analyzed from multiple standpoints. In recent times, increasing attention is being directed toward oceanographic phenomena such as salinity, circulation patterns and nutrient upwelling on such worlds. However, a detailed treatment of the salient characteristics of aquatic photosynthesis remains missing for the most part. It is important to recognize that we will deal with aquatic environments, but this does not necessarily imply that all worlds under consideration must be solely composed of oceans. The outline of the paper is as follows. We commence with a description of some of the basic tools needed to facilitate our analysis in Sec. [2](#SSecPrelim){reference-type="ref" reference="SSecPrelim"}. We proceed thereafter by calculating how the properties of aquatic photosynthesis such as the compensation depth and the net primary productivity (NPP) vary with the PAR flux and ocean temperature in Sec. [3](#SecChar){reference-type="ref" reference="SecChar"}. Next, we explain the salient model limitations in Sec. [4](#SecModLim){reference-type="ref" reference="SecModLim"}. Subsequently, we delineate the ramifications arising from our modeling for Earth-like exoplanets in Sec. [5](#SecDisc){reference-type="ref" reference="SecDisc"}, and we conclude with a synopsis of our central findings in Sec. [6](#SecConc){reference-type="ref" reference="SecConc"}. # Mathematical preliminaries {#SSecPrelim} In order to study the basic characteristics of aquatic photosynthesis and their dependence on the average ocean temperature (\(T_W\)), we hold all parameters (biological, geological and astrophysical) identical to that of Earth. We consider two different Earth-analogs hereafter: one around a solar twin (Planet G) and the other around a late-type M-dwarf (Planet M) with effective temperatures of \(T_\odot = 5780\) K and \(T = 2500\) K, respectively. Planet M is taken to be *tidally locked*, and the star that it orbits has a temperature closely resembling that of TRAPPIST-1. The reason for doing so is that Sun-like stars are considered "safe" targets for biosignature searches, whereas the habitability of M-dwarf exoplanets, especially those orbiting active stars, remains subject to many ambiguities. In what follows, we draw upon two major simplifying assumptions. First, we model the star as an idealized black body with an effective temperature of \(T\). Second, we account for the attenuation of PAR after the passage through the atmosphere by introducing a fudge factor. While neither of these simplifications are entirely realistic, the global results are known to deviate from more realistic models and data by a factor of only \(< 1.5\) for the most part.[^1] The reason for this reasonable degree of accuracy stems from the fact that most of the basic quantities we compute hereafter exhibit a weak (i.e., semi-logarithmic) dependence on the two assumptions outlined above. As we are dealing with Earth-analogs, the stellar flux at the planet's location is taken to be \(S_\oplus \approx 1360\) W/m\(^2\). At the substellar point on the planet, the photon flux density (\(\mathcal{N}_\mathrm{max}\)) at the top of the atmosphere is given by \[\label{SpecRadDef} \mathcal{N}_\mathrm{max}(\lambda) \approx n_\lambda \left(\frac{R_\star}{d_\star}\right)^2,\] with \(R_\star\) and \(d_\star\) constituting the stellar and orbital radius, respectively, whereas \(n_\lambda\) is the photon flux density of the star at its surface. The black body brightness \(B_\lambda\) is invoked to yield \[n_\lambda = \frac{B_\lambda}{(hc/\lambda)} = \frac{2c}{\lambda^4}\left[\exp\left(\frac{h c}{\lambda k_B T}\right)-1\right]^{-1},\] where \(\lambda\) is the photon wavelength. As we have assumed the stellar flux is equal to \(S_\oplus\) for the Earth-analogs, we can express \(d_\star\) as follows: \[d_\star = \sqrt{\frac{L_\star}{4\pi S_\oplus}}\] where the stellar luminosity (\(L_\star\)) is given by \(L_\star = 4\pi \sigma R_\star^2 T^4\). After employing this relation in ([\[SpecRadDef\]](#SpecRadDef){reference-type="ref" reference="SpecRadDef"}), we find that \(\mathcal{N}_\mathrm{max}\) transforms into \[\label{SpecRadMax} \mathcal{N}_\mathrm{max}(\lambda) \approx \frac{n_\lambda S_\oplus}{\sigma T^4}.\] It is, however, necessary to recognize that \(\mathcal{N}_\mathrm{max}\) constitutes an upper bound for the photon flux density at the surface for two reasons. First, this photon flux density is calculated at the zenith, and therefore ignores the fact that a given location will not always correspond to the substellar point. Second, the effects of clouds and atmospheric attenuation are neglected. Hence, a more viable expression for the photon flux density at the planet's surface (\(\mathcal{N}_\mathrm{avg}\)) is given by \[\label{SpecRadavg} \mathcal{N}_\mathrm{avg}(\lambda) \approx \mathcal{N}_\mathrm{max}(\lambda) \cdot f_\mathrm{I} \cdot f_\mathrm{CL},\] with \(f_\mathrm{CL}\) embodying the total atmospheric attenuation, and \(f_\mathrm{I}\) quantifying the average intensity of light at a given location as a fraction of the intensity at the substellar point. Henceforth, we adopt \(f_A \equiv f_\mathrm{I} \cdot f_\mathrm{CL} \approx 0.2\) for reasons elucidated further in and to maintain compatibility with Earth's global parameters; altering this fraction by a factor of order unity does not change our results significantly due to the logarithmic dependence alluded to earlier in this section. With this choice of \(f_A\), it should be noted that \(\mathcal{N}_\mathrm{avg}(\lambda) \approx 0.2 \mathcal{N}_\mathrm{max}(\lambda)\). Although the above choice has been motivated in, a recapitulation is warranted at this stage. On the one hand, \(f_\mathrm{I}\) is higher for M-dwarf exoplanets due to the fact that the tidally locked dayside does not experience nights and is bathed in continual illumination. On the other hand, \(f_\mathrm{CL}\) is reduced as a consequence of the potentially higher atmospheric absorptivity and increased cloud clover, among other factors. Therefore, by specifying \(f_A\) to be constant (as we did in the previous paragraph), we are effectively already ensuring that the atmospheric attenuation experienced by M-dwarf Earth-analogs is a few times higher than their counterparts around Sun-like stars, in line with prior theoretical predictions. We have verified that quantities such as the compensation depth, the critical depth, and the net primary productivity (all of which are defined later) decrease by a factor of \(\lesssim 2\), *ceteris paribus*, even up to nearly an order of magnitude increase in the degree of atmospheric attenuation. Lastly, we remark that the interplay of all the aforementioned variables is further complicated by the presence of climate feedback mechanisms as well as the atmospheric and surface compositions that may collectively yield different values from one climate model to another, even for the same setup, which makes estimating them challenging. Assessing the properties of aquatic photosynthesis is a complicated task, as elucidated in Sec. [4](#SecModLim){reference-type="ref" reference="SecModLim"}, owing to which our goal herein is to primarily focus on understanding how the salient characteristics vary as a function of key *physical* parameters that can be constrained by present-day or forthcoming observations. Given the photon flux density, denoted by \(\mathcal{N}_0(\lambda)\), at the surface, we are in a position to calculate the photon flux \(\mathcal{F}\) at a depth \(z\) below the surface of the ocean. This quantity is found by convolving \(\mathcal{N}_0(\lambda)\) and the vertical attenuation coefficient \(K\) in the oceans, thus yielding \[\label{IntRel} \mathcal{F}(z) \approx \int_{\lambda_\mathrm{min}}^{\lambda_\mathrm{max}} \mathcal{N}_0(\lambda) \exp\left(-K z\right)\,d\lambda.\] It should be noted that \(\mathcal{N}_0(\lambda)\) is equal to \(\mathcal{N}_\mathrm{max}\) or \(\mathcal{N}_\mathrm{avg}\), depending on what scenario we wish to analyze. Now, let us turn our attention to \(K\), which we shall rewrite as \(K = K_W + K_I\). The first term (\(K_W\)) is the attenuation coefficient associated with water whereas \(K_I\) accounts for the attenuation stemming from impurities as well as biota. In order to tackle \(K_W\), we begin by noting that it has been tabulated as a function of \(\lambda\) in many sources. Based on the data taken from, which is consistent with later studies over the PAR range, the following simple exponential fit was employed by across the PAR range: \[K_{W,22} \approx 1.4 \times 10^{-5}\,\mathrm{m}^{-1}\,\exp\left(\lambda \cdot 1.54 \times 10^7\,\mathrm{m}^{-1}\right),\] although it is essential to recognize that the data had been collected at \(22\) \(^\circ\)C. In general, \(K_W\) is not only dependent on \(\lambda\) but also on \(T_W\). The ocean temperature in turn varies with depth, but it only changes by a few K in the zone where the bulk of photosynthesis occurs. Hence, we shall treat \(T_W\) as being roughly constant, thereby enabling us to model it as a free parameter in the model. In order to account for the dependence on \(T_W\), we employ the linear temperature scaling that has been confirmed by a number of empirical studies, thereupon enabling us to write \[K_W(T_W,\lambda) = K_{W,22} + \alpha(\lambda) \Delta T_{22},\] where \(\alpha(\lambda)\) represents the wavelength-dependent temperature coefficient (units of m\(^{-1}\) K\(^{-1}\)), and \(\Delta T_{22} = T_W-295\) is a measure of the deviation from the standard water temperature of \(22\) \(^\circ\)C employed in calculating \(K_{W,22}\). For the PAR range considered herein, the second term on the right-hand-side of the above expression is always much smaller than the first term provided that \(\Delta T_{22}\) is \(\mathcal{O}(10)\) K. This condition arises because \(\alpha\) is nearly zero across the PAR range (\(\lesssim 10^{-3}\) m\(^{-1}\) K\(^{-1}\)), as can be verified by comparing and with. Apart from the temperature dependence, we remark that \(K_W\) also exhibits a dependence on the salinity, which is naturally expected to vary from one ocean to another. However, we have implicitly held the salinity fixed to that of the global value of Earth's oceans. More importantly, the salinity dependence is weak across the PAR range, as shown by experimental studies. Next, we turn our attention to the other attenuation coefficient \(K_I\). If one considers the case with pure water, i.e., amounting to \(K_I \rightarrow 0\), it follows that \(\mathcal{F}\) is maximized for a given depth *ceteris paribus*. In a more realistic setting, however, we shall adopt \(K_I \approx 0.08\) m\(^{-1}\) to maintain consistency with the typical diffuse attenuation coefficient in the PAR range for Earth's oceans; this choice is also compatible with the coefficients deduced from measurements of clear ocean waters. In actuality, \(K_I\) will also be a function of wavelength and temperature, but the exact dependence is dictated by several complex oceanographic and biological (e.g., density of photoautotrophs) factors, owing to which we have opted to work with a constant value. The wavelength variation, in particular, is rather weak because \(K_I\) changes by only a factor of \(\sim 2\) across the PAR range. At this stage, it is worth recapitulating the two broad scenarios we shall be considering. The first corresponds to the so-called idealized case where the star is located at the substellar point, and there is no attenuation because of the atmosphere and oceanic impurities. In other words, we employ \(\mathcal{N}_0(\lambda) = \mathcal{N}_\mathrm{max}\) and \(K = K_W\), and introduce the superscript "I" (for idealized). This outcome was studied extensively by, albeit with an exclusive focus on Earth and Proxima b. The second case accounts for time-averaged stellar flux and the existence of biological attenuation. Here, we select \(\mathcal{N}_0(\lambda) = \mathcal{N}_\mathrm{avg}\), \(K = K_W + K_I\) and the non-zero value of \(K_I\) defined in the prior paragraph, and label it using the superscript "A", to wit, the "global average" case. For each of these two scenarios, we consider two different Earth-analogs (Planets G & M) delineated at the beginning of this section. For Planet M, however, the "global average" refers to the *dayside* parameters, e.g., the variable \(T_W\) represents the average temperature on the dayside of the tidally locked M-dwarf exoplanet. # Characteristics of aquatic biospheres {#SecChar} In this section, we examine how certain the salient properties of aquatic biospheres depend on the ocean temperature; in some cases, we investigate the joint dependence on stellar and ocean temperatures. Before embarking on the discussion, we will define the quantities of interest that appear herein; for a historical treatment, we defer to. The first concept that we introduce from biological oceanography is the euphotic zone depth: the location where the photon flux becomes \(1\%\) of its surface value. As one can see from the definition, it is divorced from biological properties for the most part. The euphotic zone depth is commonly interpreted as a measure of the photosynthesis zone on Earth, but it does not constitute a reliable metric in actuality. Before proceeding ahead, we note that the depth of the euphotic zone decreases from \(\sim 10\)-\(100\) m for Earth-analogs orbiting Sun-like stars to \(\mathcal{O}(1)\) m for tidally locked late-type M-dwarf exoplanets. Next, we consider the compensation depth (\(\mathcal{Z}_\mathrm{CO}\)), which is determined by calculating the location at which \(\mathcal{F}(z)\) is equal to the compensation flux (\(\mathcal{F}_C\)). The latter is roughly defined as the flux at which the rate of growth via photosynthesis becomes equal to the rate of respiration; in other words, at this depth, the net growth rate of the photoautotroph under consideration is equal to zero at \(\mathcal{Z}_\mathrm{CO}\). As per the definition, the compensation depth is regulated by \(\mathcal{F}(z)\), which in turn, *inter alia*, depends on the parameter \(f_\mathrm{I}\) introduced in Sec. [2](#SSecPrelim){reference-type="ref" reference="SSecPrelim"}. Here, it is important to appreciate that \(f_\mathrm{I}\) is *different* for M-and G-type exoplanets, due to the fact the dayside of the former receives permanent illumination when tidally locked (amounting to higher \(f_\mathrm{I}\) broadly speaking). Although \(f_\mathrm{I}\) functions as a fudge factor to an extent, we acknowledge that it does not fully capture the distinct spatiotemporal differences in light distribution, or oceanic properties like nutrient upwelling, associated with tidally locked M-dwarf exoplanets. The other quantity of interest is the critical depth (\(\mathcal{Z}_\mathrm{CR}\)), which was elucidated by and placed on a quantitative footing by and. It can be envisioned as the integrated (i.e., global) version of the compensation depth. The critical depth is the location where the *vertically integrated* net growth rate becomes zero, i.e., the integrated photosynthetic growth rate is equal to the integrated depletion rate arising from respiration and other factors. The critical depth is relevant from an observational standpoint because it may regulate the feasibility of phytoplankton blooms, which have been posited as an example of temporal biosignatures. If the ocean mixed layer depth is greater than the critical layer depth,[^2] the initiation of phytoplankton blooms is rendered unlikely, and vice-versa. Although the critical depth concept remains influential and useful to this day, it has been subjected to some criticism. Thus, broadly speaking, the compensation depth and the critical depth represent important concepts inasmuch as exo-oceanography is concerned because they enable us to gauge the depths at which photosynthetic organisms can exist and/or give rise to tangible biosignatures. We refer to for a schematic overview of these two quantities along with the euphotic zone depth. ## Compensation depth {#SSecCoD} The key point worth appreciating when it comes to the compensation depth is that the compensation flux (\(\mathcal{F}_C\)) is *not* constant even for a given organism because it is intrinsically temperature-dependent. Thus, our chief objective is to find a suitable function that will adequately describe the behavior of \(\mathcal{F}_C\) with respect to \(T_W\). In the classical model for the compensation flux, it is proportional to \(\Gamma_R/\Gamma_P\)---see, , and---where \(\Gamma_R\) and \(\Gamma_P\) signify the rates of respiration and photosynthesis, respectively. Thus, if we know how these rates vary with temperature, one can duly formulate the expression for \(\mathcal{F}_C\). The temperature dependence of these rates is subject to uncertainty and many different fitting functions have been considered. However, both the well-known metabolic theory of ecology and recent analyses of empirical data from Earth's oceans predict that these rates are fairly well described by the classic Arrhenius equation. Hence, by utilizing the respective activation energies for these two processes, we end up with \[\label{GamRat} \frac{\Gamma_R}{\Gamma_P} \propto \exp\left(-\frac{\Delta E}{k_B T_W}\right),\] where \(\Delta E \approx 0.34\) eV constitutes the "net" activation energy, i.e., the difference between the corresponding activation energies. An important point worth noting is that the above ansatz for \(\Gamma_R/\Gamma_P\) is monotonically increasing with temperature. It is very unlikely that this behavior would be obeyed *ad infinitum* because the Arrhenius equation breaks down beyond a certain temperature. The issue, however, is that the optimum temperature, after which the trend reverses, is species-dependent, and is modulated to a substantial degree by the environment(s) of the putative organisms. We will restrict ourselves to \(273 < T_W < 323\) K, as this interval roughly overlaps with the temperature range of \(280 < T_W < 322\) K studied in. In that study, diverse marine phytoplankton were shown to obey ([\[GamRat\]](#GamRat){reference-type="ref" reference="GamRat"}) for a broad thermal range. By utilizing the above relationships, the temperature dependence of \(\mathcal{F}_C\) is modeled as \[\label{Fcomp} \mathcal{F}_C \approx 10\,\mathrm{\mu mol\,m^{-2}\,s^{-1}}\, \mathcal{G}(T_W),\] where we have introduced the auxiliary function \[\label{AuxF} \mathcal{G}(T_W) \equiv \exp\left[13.6\left(1-\frac{T_0}{T_W}\right)\right],\] with \(T_0 \approx 289\) K representing the global surface temperature of Earth's oceans.[^3] The constant of proportionality in ([\[Fcomp\]](#Fcomp){reference-type="ref" reference="Fcomp"}) has been chosen as it represents the compensation flux for phytoplankton in Earth's oceans within a factor of \(\sim 2\). By solving for \(\mathcal{F}(z) = \mathcal{F}_C\), we are now equipped to calculate the compensation depth \(\mathcal{Z}_\mathrm{CO}\) as a function of both the stellar temperature and ocean temperature. In Fig. [\[FigCDepG\]](#FigCDepG){reference-type="ref" reference="FigCDepG"}, the photon flux normalized by the compensation flux is plotted as a function of the depth \(z\) for the idealized case delineated in Sec. [2](#SSecPrelim){reference-type="ref" reference="SSecPrelim"}, where the star is at the substellar point and the attenuation in water is assumed to be minimal. The left panel corresponds to Planet G, while the right panel depicts the results for Planet M. By inspecting both panels, we find that \(\mathcal{Z}_\mathrm{CO}\) decreases with the temperature along expected lines. The physical reason for this trend is that the increase in the rate of respiration outpaces that of photosynthesis when the temperature is elevated, thereby ensuring that the location at which the two processes balance each other is shifted closer to the surface of the ocean, i.e., leading to a reduction in \(\mathcal{Z}_\mathrm{CO}\). We observe that the ocean temperature exerts a fairly significant effect on the magnitude of \(\mathcal{Z}_\mathrm{CO}\) for both worlds. As far as Planet G (orbiting a solar twin) is concerned, the compensation depth changes from \(\mathcal{Z}_\mathrm{CO}^{(I)} \approx 300\) m at \(T_W = 5\) \(^\circ\)C to \(\mathcal{Z}_\mathrm{CO}^{(I)} \approx 130\) m at \(T_W = 45\) \(^\circ\)C. On the other hand, when we consider Planet M, situated around a late-type M-dwarf closely resembling TRAPPIST-1, the compensation depth morphs from \(\mathcal{Z}_\mathrm{CO}^{(I)} \approx 26.5\) m at \(T_W = 5\) \(^\circ\)C to \(\mathcal{Z}_\mathrm{CO}^{(I)} \approx 3.5\) m at \(T_W = 45\) \(^\circ\)C. Hence, for the idealized case studied in this figure, we predict that the ocean temperature might cause \(\mathcal{Z}_\mathrm{CO}\) to change by nearly an order of magnitude for Planet M; the variation associated with Planet G is smaller, but still non-negligible. Fig. [\[FigCDepM\]](#FigCDepM){reference-type="ref" reference="FigCDepM"} is analogous to that of Fig. [\[FigCDepG\]](#FigCDepG){reference-type="ref" reference="FigCDepG"}, except that we consider the so-called global average case described at the end of Sec. [2](#SSecPrelim){reference-type="ref" reference="SSecPrelim"} in lieu of the idealized scenario. When it comes to Planet G (left panel), the compensation depth evolves from \(\mathcal{Z}_\mathrm{CO}^{(A)} \approx 24\) m at \(T_W = 5\) \(^\circ\)C to \(\mathcal{Z}_\mathrm{CO}^{(A)} \approx 8.5\) m at \(T_W = 45\) \(^\circ\)C. However, a striking result is manifested vis-à-vis Planet M (right panel). At \(T_W = 5\) \(^\circ\)C, we obtain \(\mathcal{Z}_\mathrm{CO}^{(A)} \approx 3\) m, but we end up with \(\mathcal{Z}_\mathrm{CO}^{(A)} = 0\) at \(T_W = 45\) \(^\circ\)C. The null value arises because the temperature elevates the compensation point to such an extent that it overshoots the incident photon flux at the ocean's surface.[^4] In fact, we determine that \(\mathcal{F}_0 \equiv \mathcal{F}^{(A)}(z=0) < \mathcal{F}_C\) is fulfilled when \(T_W > 24\) \(^\circ\)C, implying that ocean temperatures above this value appear to be relatively unsuitable for supporting phytoplankton-like biota on tidally locked Earth-analogs orbiting stars akin to TRAPPIST-1. Motivated by the above finding, we define \(\zeta \equiv \mathcal{F}_0/\mathcal{F}_C\) and study the regimes in which \(\zeta < 1\) is valid. This criterion enables us to gauge the conditions under which Earth-like oxygenic photoautotrophs may have a low likelihood of existing. We only tackle the global average case herein, as it permits \(\zeta < 1\) to occur in the parameter space. From examining Fig. [\[FigSurf\]](#FigSurf){reference-type="ref" reference="FigSurf"}, where the results are depicted, it is apparent that some tidally locked late-type M-dwarf exoplanets might be incapable of hosting phytoplankton-like biota. In particular, for the upper bound of \(T_W = 50\) \(^\circ\)C, we surmise that stars with \(T < 3150\) K can be ruled out in this category. Thus, if the oceans are sufficiently warm, tidally locked Earth-analogs around late-type M-dwarfs could encounter difficulties in sustaining marine photosynthetic organisms analogous to modern Earth. Lastly, before proceeding further, there is one other point worth mentioning. As the depth of the photosynthesis zone grows more shallower, whether it be due to oceanic temperature or stellar spectral type, the photoautotrophs are expected to live closer to the surface. In doing so, they incur a greater risk of damage by ultraviolet radiation and energetic particles from flares and superflares, the latter of which could deposit high doses. However, experiments and numerical models suggest that hazes (in)organic films, along with biogenic ultraviolet screening compounds and evolutionary adaptations, may suffice to protect them. ## Critical depth In order to calculate the critical depth (\(\mathcal{Z}_\mathrm{CR}\)), a number of different formulae have been delineated in the literature. Most of the simpler models reduce to: \[K \mathcal{Z}_\mathrm{CR} \approx \frac{\Gamma_P}{\Gamma_R},\] but they are correct only in the limiting case of \(K = \mathrm{const}\), which is manifestly invalid. The generalization of the above equation was adumbrated in, who eventually obtained \[\label{CritD} \mathcal{Z}_\mathrm{CR} \approx \left(\frac{\Gamma_R}{\Gamma_P}\right)^{-1} \frac{\int_{\lambda_\mathrm{min}}^{\lambda_\mathrm{max}} \left[\mathcal{N}_0(\lambda)/K(\lambda)\right]\,d\lambda}{\int_{\lambda_\mathrm{min}}^{\lambda_\mathrm{max}} \mathcal{N}_0(\lambda)\,d\lambda}.\] It is, however, necessary to recognize that \(\Gamma_R/\Gamma_P\) has an intrinsic temperature dependence, as seen from ([\[GamRat\]](#GamRat){reference-type="ref" reference="GamRat"}). Hence, we combine ([\[CritD\]](#CritD){reference-type="ref" reference="CritD"}) with ([\[GamRat\]](#GamRat){reference-type="ref" reference="GamRat"}), thereby yielding \[\label{CritF} \mathcal{Z}_\mathrm{CR} \approx \frac{3.36 \times 10^{-2}}{\mathcal{G}(T_W)} \frac{\int_{\lambda_\mathrm{min}}^{\lambda_\mathrm{max}} \left[\mathcal{N}_0(\lambda)/K(\lambda)\right]\,d\lambda}{\int_{\lambda_\mathrm{min}}^{\lambda_\mathrm{max}} \mathcal{N}_0(\lambda)\,d\lambda},\] where the normalization has been adopted based on the global value for phytoplankton in Earth's oceans. The parameters pertaining to the "A" scenario are adopted for the sake of comparison with prior empirical studies. The temperature dependence of the critical depth is illustrated in Fig. [\[FigCritD\]](#FigCritD){reference-type="ref" reference="FigCritD"}. Two points that emerge from scrutinizing this figure. From the left panel, we notice that the dependence on the stellar temperature is weak at any given ocean temperature. This result is consistent with, and is mostly attributable to the fact that net growth primarily occurs in the upper layers and thus compensates for the regions with \(z > \mathcal{Z}_\mathrm{CO}\). However, when it comes to the ocean temperature, a much stronger variation of \(\mathcal{Z}_\mathrm{CR}\) is discerned. As we cover the entire ocean temperature range considered herein, we find that \(\mathcal{Z}_\mathrm{CR}\) changes by nearly an order of magnitude for any given stellar temperature (right panel). For instance, after we specify \(T = T_\odot\), the critical depth evolves from \(\mathcal{Z}_\mathrm{CR}^{(A)} \approx 416\) m at \(T_W \approx 0\) \(^\circ\)C to \(\mathcal{Z}_\mathrm{CR}^{(A)} \approx 45\) m at \(T_W \approx 50\) \(^\circ\)C. Therefore, it is conceivable that the ocean temperature plays a major role in regulating the critical depth on other worlds. In turn, this development suggests that \(T_W\) also acts as a key determinant of phenomena analogous to phytoplankton blooms, which may constitute viable temporal biosignatures as noted earlier. ## Net primary productivity {#SSecNPP} The NPP is arguably one of the most crucial and informative property of a biosphere as it quantifies the net amount of organic carbon synthesized via biological pathways after accounting for losses dues to respiration and other factors; we will express our results in units of g C m\(^{-2}\) h\(^{-1}\) for the NPP. The NPP is a reliable measure of the amount of organic C generated via photosynthesis, as the latter constitutes the dominant carbon fixation pathway. A wide spectrum of models have been developed to model NPP, and comprehensive reviews can be found in and. We make use of to calculate the NPP, because this outwardly simple expression accounts for a number of environmental factors: \[\label{NPPDef} \mathrm{NPP} = C_\mathrm{sur} \cdot \mathcal{Z}_\mathrm{CO}^{(A)} \cdot f(\mathrm{PAR}) \cdot P_\mathrm{opt}(T_W),\] where \(C_\mathrm{sur}\) is the chlorophyll concentration at the surface, \(f(\mathrm{PAR})\) embodies the fraction of the water column up to \(\mathcal{Z}_\mathrm{CO}^{(A)}\) where photosynthesis is light saturated, and \(P_\mathrm{opt}(T_W)\) is the optimal carbon fixation rate. There exists, however, an inherent crucial subtlety that needs to be spelt out here. In canonical versions of the above formula, \(\mathcal{Z}_\mathrm{CO}^{(A)}\) is replaced by the euphotic zone depth. However, as noted in, the proper variable that ought to be deployed is the depth of the zone where positive NPP is feasible, which is congruent with the definition of the compensation depth. On Earth, the euphotic zone depth and the compensation depth are roughly equal to one another, but the same relationship is not necessarily valid *a priori* for other worlds; even on Earth, the reliability of the euphotic zone as a measure of the photosynthesis zone has been called into question. The NPP will depend not only on the stellar and ocean temperatures but also on inherent biological factors such as \(C_\mathrm{sur}\) that are spatially and temporally very heterogeneous. As the goal of the paper is to construct heuristic global estimates, we rewrite ([\[NPPDef\]](#NPPDef){reference-type="ref" reference="NPPDef"}) so that it yields the average global value for the Earth at \(T = T_\odot\) and \(T_W = T_0\) (i.e., the parameters for Earth). By adopting the normalization from ,[^5] we obtain \[\begin{aligned} \label{NPPRes} && \mathrm{NPP} \approx 1.5 \times 10^{-2}\,\mathrm{g\, C\, m^{-2}\, h^{-1}} \left(\frac{\mathcal{Z}_\mathrm{CO}^{(A)}}{\mathcal{Z}_0}\right) \nonumber \\ && \hspace{0.5in} \times \,\mathcal{P}(T_W) \left(\frac{\mathcal{D}}{0.5}\right) \left(\frac{G(T)}{G(T_\odot)}\right), \end{aligned}\] where \(\mathcal{Z}_0 \approx 19\) m represents the compensation depth calculated at the fiducial ocean temperature of \(T_0\) using the methodology in Sec. [3.1](#SSecCoD){reference-type="ref" reference="SSecCoD"}, while \(\mathcal{D}\) denotes the fraction of time that a given location receives stellar illumination. For planets like Earth, we expect \(\mathcal{D} \approx 0.5\) (i.e., equipartition of day and night) whereas tidally locked planets ought to have \(\mathcal{D} \approx 1\) on the day side because they receive stellar radiation *in perpetuo*. The auxiliary functions \(G(T)\) and \(\mathcal{P}(T_W)\) are defined as follows: \[\label{Gdef} G(T) = \frac{\mathcal{F}_0}{\mathcal{F}_0 + \mathcal{F}_S},\] where \(\mathcal{F}_S \approx 1.1 \times 10^3\) \(\mu\)mol m\(^{-2}\) s\(^{-1}\), and the stellar temperature is implicitly present via \(\mathcal{F}_0\). \[\begin{aligned} && \mathcal{P}(T_W) = \left[ \frac{1 + \exp\left[\frac{E_h}{k_B}\left(\frac{1}{T_h}-\frac{1}{T_0}\right)\right]}{1 + \exp\left[\frac{E_h}{k_B}\left(\frac{1}{T_h}-\frac{1}{T_W}\right)\right]}\right] \nonumber \\ && \hspace{0.6in} \times \exp\left[\frac{E_a}{k_B}\left(\frac{1}{T_0}-\frac{1}{T_W}\right)\right], \end{aligned}\] where \(E_a \approx 0.74\) eV, \(E_h \approx 6.10\) eV and \(T_h \approx 34\) \(^\circ\)C are adopted for our putative biota from.[^6] Here, we have constructed ([\[NPPRes\]](#NPPRes){reference-type="ref" reference="NPPRes"}) and ([\[Gdef\]](#Gdef){reference-type="ref" reference="Gdef"}) based on and, but one point of divergence is that a modified Sharpe--Schoolfield equation was utilized as a proxy for \(P_\mathrm{opt}(T_W)\), following in lieu of, as the latter becomes invalid for \(T_W > 30\) \(^\circ\)C. The precise expression for \(P_\mathrm{opt}(T_W)\) for phytoplankton is challenging to accurately pin down, owing to the panoply of expressions used to model phytoplankton growth. In consequence, a diverse array of functions, some exhibiting exactly opposite trends with temperature, have been employed for this purpose; see also. Hence, the ensuing results should be interpreted with due caution. We have presented the NPP for the two Earth-analogs (Planet G and Planet M) in Table [\[TabNPP\]](#TabNPP){reference-type="ref" reference="TabNPP"} and Figure [\[FigNPP\]](#FigNPP){reference-type="ref" reference="FigNPP"}, which were calculated by using the global average case as seen from ([\[NPPDef\]](#NPPDef){reference-type="ref" reference="NPPDef"}). There are several interesting results that emerge from inspecting these two items. We begin by considering Planet G (orbiting a solar twin) to gauge the role of \(T_W\). We notice that the NPP increases with ocean temperature until \(\sim 30\) \(^\circ\)C, but the growth is relatively modest. It is primarily driven by the rise in the rate of carbon fixation, as encapsulated by \(\mathcal{P}(T_W)\), with temperature in this regime. In some controlled experiments and modeling where the temperature was steadily elevated, the photosynthetic capacity has been found to increase up to a point.[^7] As per our simple model, once the peak temperature of the thermal performance curve is exceeded (\(T_\mathrm{pk}\)), the rate of carbon fixation falls sharply thereafter, and consequently drives the steep decline in NPP when \(T_W > 35\) \(^\circ\)C. Now, we turn our attention to Planet M around a late-type M-dwarf similar to TRAPPIST-1. For any fixed temperature, say \(T_W = 5\) \(^\circ\)C, we notice that the NPP is lower than Planet G by roughly two orders of magnitude. The reasons for the diminished NPP are twofold: (i) the compensation depth is greatly reduced as pointed out in Sec. [3.1](#SSecCoD){reference-type="ref" reference="SSecCoD"}, and (ii) the flux of PAR is corresponding lower at the surface, thereby making the last term on the right-hand-side of ([\[NPPRes\]](#NPPRes){reference-type="ref" reference="NPPRes"}) smaller than unity. The next major feature we notice is that the NPP vanishes at \(T_W \sim 24\) \(^\circ\)C. This result is a direct consequence of the fact that the compensation depth becomes zero above a threshold temperature for reasons explained in Sec. [3.1](#SSecCoD){reference-type="ref" reference="SSecCoD"}. Hence, tidally locked exoplanets around late-type M-dwarfs may evince a low likelihood of large-scale carbon fixation by phytoplankton-like biota. Needless to say, the NPP is not anticipated to be zero *sensu stricto*, because anoxygenic photoautotrophs are capable of carbon fixation by definition, and so are many microbial taxa in the deep biosphere. # Limitations of the model {#SecModLim} It is worth emphasizing at the outset that the productivity of biospheres is constrained by a number of factors including water, electron donors, temperature, PAR flux and nutrients. Our analysis tackles the modulation of the productivity of biospheres by PAR and ambient ocean temperature *ceteris paribus*. In doing so, we follow the likes of in setting aside the constraints imposed by the access to nutrients and some of the other variables. In the case of Earth's terrestrial (land-based) NPP, the NPP for \(> 80\%\) of the area is limited by water and temperature. In contrast, Earth's oceanic NPP---both the globally averaged value and the spatiotemporal variations---is governed by the prevalence of nutrients, especially the ultimate limiting nutrient phosphate. Ocean planets, in particular, may be impacted due to their potentially lower rates of weathering and delivery of nutrients to the oceans. The key caveat in this paper, therefore, is that the oceanic NPP is not constrained by nutrients, but is instead regulated the two factors adumbrated in the preceding paragraph. The ensuing results might comprise upper bounds for the NPP because the abundance and distribution of nutrients could introduce additional limits. As we shall demonstrate in Sec. [3.3](#SSecNPP){reference-type="ref" reference="SSecNPP"}, the oceanic NPP for tidally locked Earth-like exoplanets around late-type M-dwarfs is severely constrained by the paucity of PAR photons, and is orders of magnitude smaller than Earth's oceanic NPP. Hence, the prior assumption might not pose a major problem for these worlds because the most dominant bottleneck on the oceanic NPP may prove to be the PAR flux. However, when it comes to Earth-analogs around Sun-like stars, PAR flux is not a major limiting factor and the thermal effects on NPP might become prominent only at high temperatures. Thus, a brief discussion of nutrient limitation and how it could impact the oceanic NPP of other worlds is apropos. The first and foremost point that needs to be appreciated is that modeling nutrient limitation even on Earth is a complicated endeavor. The reason is that the nutrient concentration in the ocean depends on a variety of factors such as the remineralization efficiency, hydrothermal activity, submarine weathering, and mineral solubility in seawater, to name just a few. Moreover, each of these quantities has fluctuated over time and witnessed shifts in magnitude, sometimes up to a factor of \(\sim 10\) as may have occurred vis-à-vis the remineralization efficiency during the Ediacaran period. For these reasons, theoretical models for the biogeochemical cycles of the bioessential elements have yielded very different results; see also for an exposition of this issue. As the prior discussion suggests, there are numerous mechanisms that control the nutrient concentration in oceans. In consequence, it is not inconceivable that some Earth-like planets could bypass or mitigate the issue of nutrient limitation. Geological processes that have been proposed hitherto for counteracting the nutrient deficiency to varying degrees include elevated nutrient upwelling, submarine basalt weathering and serpentinization. As noted earlier, we will presume hereafter that nutrient abundance is not the chief limitation, perhaps via some of the above channels coming into play. To reiterate, we suppose that either photon flux and/or temperature act to throttle the productivity. We will demonstrate hereafter that these factors become exceedingly important for planets around late-type M-dwarfs and/or with high ambient ocean temperatures; in particular, the NPP might become orders of magnitude smaller relative to Earth. In relation to the preceding points, we note that the constraints imposed by the ambient photon flux, temperature and nutrients do not act independently of one another. In fact, a multitude of experiments and field studies have established that these environmental parameters are non-linearly coupled to one another. For instance, the value of \(E_a\) introduced previously may vary significantly in some species depending on the availability of nitrogen and the ocean temperature. While such effects are indubitably important, they are not well understood even on Earth and exhibit considerable intra-and inter-species variability. Hence, given that the implicit goal of this paper was to construct heuristic models that provide rough estimates for future observations and modeling, we have not taken these subtle processes into account. Lastly, in our subsequent analysis, we will draw upon the basic physiological properties of the dominant phytoplankton species on Earth. While this line of reasoning is undoubtedly parochial, we note that Earth-based organisms are commonly used as proxies in numerous astrobiological contexts, ranging from extremophiles and microbial ecosystems in the oceans of icy moons to the limits of complex multicellular life on exoplanets. Furthermore, the choice of phytoplankton as putative biota is motivated by the fact that they are the major source of carbon fixation in the oceans of modern Earth. Hence, by utilizing the prior framework, we are now equipped to analyze the prospects for Earth-like aquatic photosynthesis on other worlds characterized by different ocean temperatures. # Discussion {#SecDisc} We will discuss some of the implications of our work in connection with mapping the trajectories of the Earth as well as tidally locked M-dwarf exoplanets. ## Potential future evolution of Earth We begin by tackling the ramifications of the preceding analysis for the Earth's aquatic biosphere, with respect to its potential future. Before doing so, it is worth briefly highlighting the inherent spatiotemporal variability of Earth's oceanic NPP. To begin with, let us recall that a global sea surface temperature (SST) of \(T_0 \approx 16\) \(^\circ\)C was chosen herein based on satellite data. However, in reality, the SST of Earth is characterized by distinct heterogeneity, ranging from \(35\) \(^\circ\)C to below-freezing temperatures.[^8] Moreover, the Earth's NPP is modulated by the access to not only light and temperature (both of which are present in our model) but also nutrients; the latter may play a crucial role as noted in Sec. [4](#SecModLim){reference-type="ref" reference="SecModLim"}. Collectively, these factors engender variations in the oceanic NPP across both the spatial and temporal domains, sometimes by roughly an order of magnitude. Thus, we reiterate that our model only seeks to extract globally averaged values for the relevant variables from a heuristic standpoint. There is a sharp downswing in NPP shortly after the peak temperature \(T_\mathrm{pk}\) is attained, which becomes evident upon inspecting Fig. [\[FigNPP\]](#FigNPP){reference-type="ref" reference="FigNPP"}. While there are grounds for contending that \(T_\mathrm{pk} \sim 30\) \(^\circ\)C, this matter is admittedly not conclusively settled. Now, let us suppose that the Earth's temperature was raised by \(\sim 10\) \(^\circ\)C abruptly. In large swathes of the ocean, it is conceivable that \(T_W > T_\mathrm{pk}\), thereby triggering a sharp downswing in the NPP in these regions. In turn, given that phytoplankton are the foundation of oceanic food webs and trophic interactions, this rapid decline in NPP ought to have adverse consequences for marine ecosystems and could thus potentially drive large-scale extinctions of marine biota. As the Sun continues to grow brighter, the surface temperature will also increase commensurately because of the greenhouse effect until the Earth is eventually rendered uninhabitable. Based on, we note that a global temperature of \(312\) K is predicted when the solar luminosity is \(1.1\) times the present-day value. By utilizing, the stellar luminosity associated with this temperature is expected to occur \(\sim 1.2\) Gyr in the future. It is important to note, however, that climate models do not fully agree on the critical flux at which the greenhouse state is likely to be activated, implying that a timescale of \(< 1\) Gyr ought not be ruled out. If we suppose that the global ocean temperature tracks the average surface temperature, the above analysis suggests that \(T_W \sim 39\) \(^\circ\)C would occur \(\sim 1.2\) Gyr hereafter. After examining Fig. [\[FigNPP\]](#FigNPP){reference-type="ref" reference="FigNPP"}, we find that the oceanic NPP at this \(T_W\) might be \(< 10\%\) of modern Earth. Due to the diminished NPP, eventual depletion of atmospheric O\(_2\) is plausible for reasons adumbrated in Sec. [5.2](#SSecMDExo){reference-type="ref" reference="SSecMDExo"}, namely, when the sinks for oxygen outpace the sources. A decline in atmospheric O\(_2\) could, in turn, drive the extinction of motile macroscopic organisms, as their long-term survival customarily necessitates oxygen levels \(\sim 10\%\) of their present value.[^9] Thus, *in toto*, the biosphere is unlikely to exhibit the same complexity as that of present-day Earth: this qualitative result is broadly consistent with earlier predictions by. ## Tidally locked M-dwarf exoplanets {#SSecMDExo} We turn our attention to Planet M, i.e., the putative tidally locked exoplanet around a late-type M-dwarf similar to TRAPPIST-1. It is instructive to compare our results against prior analyses of related topics. calculated the oceanic NPP, albeit at a fixed depth of \(10\) m using a simple model based on the photon flux, and estimated that it was \(\sim 5\) times lower for an Earth-analog around an M0 star. In a similar vein, and employed simple models for the NPP that were linearly proportional to the incident photon flux and determined that planets orbiting late-type M-dwarfs are unlikely to host biospheres with the same NPP as modern Earth and build up atmospheric O\(_2\) to detectable levels. Thus, by and large, our work maintains consistency with earlier studies, but it has taken several other environmental and physiological variables into account that were missing in previous analyses. We have previously calculated that the NPP for Planet M is, at most, only a few percent of the Earth's current oceanic NPP. Hence, because of the low NPP, unless the burial efficiency of organic carbon is unusually high, it seems likely that the flux of O\(_2\) contributed by oxygenic photosynthesis will be correspondingly small. Hence, it ought to become more feasible for the sinks of atmospheric O\(_2\) (e.g., continental weathering and volcanic outgassing) to dominate this source (which is a major player on Earth). The end result is that O\(_2\) has a low likelihood of accumulating to detectable levels in the atmosphere. This potential effect has two consequences in turn. First, O\(_2\) has been conjectured to be an essential prerequisite for complex life insofar as metabolism is concerned, at least up to a certain threshold after which oxygen toxicity may set in. Hence, the evolution of complex life, and potentially technological intelligence, might be suppressed on this category of worlds. Second, and more importantly, the absence of detectable atmospheric O\(_2\) or O\(_3\) for the aforementioned reasons despite the existence of a biosphere is an archetypal example of a "false negative" that can hinder or complicate the search for extraterrestrial life. ## Build-up of atmospheric oxygen on ocean worlds It is worth quantifying the above qualitative treatment to gain further insights for ocean planets that are otherwise akin to present-day Earth. We will adopt the prescription laid out in. We begin the analysis by noting that Earth's current oceanic NPP translates to an O\(_2\) production flux of \(5 \times 10^{-4}\) mol m\(^{-2}\) h\(^{-1}\), because the simplified reaction scheme for oxygenic photosynthesis takes the form \[\label{PhotOx} \mathrm{CO_2} + 2 \mathrm{H_2O} \,\] where CH\(_2\)O embodies the synthesis of organic compounds, and H\(_2\)O appears in both sides of the equation as reactant and product, respectively. However, only a minuscule fraction of this O\(_2\) is deposited in the atmosphere, since the vast majority is consumed by respiration and oxidative decay. If we denote the burial fraction by \(\phi\), the flux of O\(_2\) produced is then given by \[\dot{S} \sim 1.5 \times 10^{-6}\,\mathrm{mol\,m^{-2}\,h^{-1}}\,\left(\frac{\mathrm{NPP}}{\mathrm{NPP}_\oplus}\right)\left(\frac{\phi}{\phi_\oplus}\right),\] where \(\dot{S}\) is the O\(_2\) flux generated from organic carbon burial, \(\mathrm{NPP}_\oplus\) is the globally averaged oceanic NPP of the Earth, and \(\phi_\oplus \approx 3 \times 10^{-3}\) is the fraction of organic carbon (fixed by photosynthesis) subjected to burial on present-day Earth. In order for O\(_2\) to build up on anoxic worlds, the above source must exceed the primary sink, namely, reducing gases arising from a mixture of surface and submarine volcanism, metamorphism and serpentinization to name a few. We introduced \(\dot{D}\), the depletion flux of O\(_2\) associated with reducing gases, and specify a fiducial value of \(\dot{D}_\oplus \sim 1.3 \times 10^{-6}\,\mathrm{mol\,m^{-2}\,h^{-1}}\) for modern Earth. The criterion for O\(_2\) accumulation in the atmosphere is thus expressible as \(\dot{S} > \dot{D}\), which simplifies to \[\label{NPPcond} \mathrm{NPP} > 0.9 \mathrm{NPP}_\oplus \left(\frac{\phi}{\phi_\oplus}\right)^{-1} \left(\frac{\dot{D}}{\dot{D}_\oplus}\right).\] Hence, the above relation suggests that the oceanic NPP must be close to its present-day value in order for the build up of atmospheric O\(_2\) to potentially take place, if all other parameters are held fixed. In contrast, if the burial of carbon is very efficient or the flux of reducing gases is extremely low, even a NPP that is much smaller than that of modern Earth may support the accumulation of atmospheric O\(_2\). We run into an immediate difficulty here since both \(\phi\) and \(\dot{D}\) are not tightly constrained for Earth-like worlds in general. However, if we interpret Earth-analogs to include only those worlds with all geochemical parameters similar to Earth, we can make headway. In such cases, ([\[NPPcond\]](#NPPcond){reference-type="ref" reference="NPPcond"}) reduces to the simpler \(\mathrm{NPP} > 0.9 \mathrm{NPP}_\oplus\). By comparing this criterion with Fig. [\[FigNPP\]](#FigNPP){reference-type="ref" reference="FigNPP"}, it is possible to deduce the conditions that permit the build up of atmospheric O\(_2\) if only light and temperature constitute the sole limiting factors (cf. the next paragraph). For Earth-analogs around solar twins, we find that a temperature range of \(\sim 15\)-\(35\) \(^\circ\)C might permit the build up of atmospheric O\(_2\). At much higher and lower temperatures, the NPP is accordingly diminished, owing to which the reducing gases could overwhelm the O\(_2\) generated from carbon burial. When we consider tidally locked Earth-analogs around late-type M-dwarfs, Fig. [\[FigNPP\]](#FigNPP){reference-type="ref" reference="FigNPP"} and Table [\[TabNPP\]](#TabNPP){reference-type="ref" reference="TabNPP"} suggest that the NPP would be only a few percent of Earth's current oceanic NPP. In that event, it might not be feasible for the accumulation of atmospheric O\(_2\) to occur, as per the simplified formalism we have adopted. ## Observational tests for the future It is helpful to examine the prospects for testing our results by means of future observations at this juncture. A number of publications mentioned at the beginning of Sec. [5.2](#SSecMDExo){reference-type="ref" reference="SSecMDExo"} have already propounded strategies to gauge whether the stellar spectral type affects the NPP and the accompanying rise in atmospheric O\(_2\) levels. The basic idea is to search for correlations between the spectral type of the host star on the one hand and the presence/absence of O\(_2\) on the other. However, these putative correlations need to be weighed carefully because of the presence of major sources and sinks of O\(_2\) not prevalent on Earth; for instance, the abiotic build-up of O\(_2\) may be driven by electromagnetic radiation or its depletion may be effectuated by intense stellar winds and space weather events. Therefore, we will restrict ourselves to assessing the observational implications insofar as worlds with varying ocean temperature are concerned. A scrutiny of Fig. [\[FigNPP\]](#FigNPP){reference-type="ref" reference="FigNPP"} reveals that a fairly steep decline in the NPP is potentially anticipated above a certain cutoff temperature. On the other hand, the surface density of chlorophyll (\(C_\mathrm{sur}\)) appearing in ([\[NPPDef\]](#NPPDef){reference-type="ref" reference="NPPDef"}) might not be affected to the same degree; in fact, we have held it fixed for the sake of simplicity. Hence, at least in principle, the detection of photoautotrophs ought to be feasible via the photosynthetic red edge, especially in the event that the organisms cover a large fraction of the surface. If we can therefore sample enough planets and discern a critical mean ocean temperature (the surface temperature might comprise a rough proxy for \(T_W\)) for a particular spectral type above which no biogenic O\(_2\) and O\(_3\) are detected but a tangible photosynthetic red edge is identified, such a distinct correlation could provide an avenue for falsifying our hypothesis. However, we caution that this strategy is not easily implementable in the near-future because it necessitates access to a sufficiently large sample of worlds with confirmed reliable biosignatures, oceans, and surface temperature measurements. # Conclusions {#SecConc} In this paper, we investigated how the ambient ocean temperature \(T_W\) and the spectral type of the host star may influence the characteristics of aquatic biospheres on Earth-like worlds, albeit under a set of key assumptions that were expounded in Sec. [4](#SecModLim){reference-type="ref" reference="SecModLim"}. In spite of the underlying simplifications and the ensuing limitations, there are several new results that were presented in this work, of which some of the major ones are outlined below and described in more detail later. - The compensation depth and critical depth is calculated as a function of the mean ocean temperature for Earth-analogs around a late-type M-dwarf (Planet M) and a Sun-like star (Planet G); it should be noted that Planet M is modeled as being tidally locked. - The *vertically integrated* average oceanic NPP is estimated for Planet G and Planet M. In other words, the procedure for determining the oceanic NPP as a function of the spectral type and the ocean temperature was explicated. - The criterion for the accumulation of oxygen (O\(_2\)) in the atmospheres of Planets G and M is derived; this criterion is dependent not only on the spectral type but also on the ocean temperature. We began by estimating the compensation depth and critical depth, as they serve to quantify the depths at which the net growth rate and vertically integrated net growth rate become zero, respectively. We showed that the ocean temperature has a relatively moderate influence on the compensation depth for an Earth-analog around a solar twin, as \(\mathcal{Z}_\mathrm{CO}\) varies only by a factor of \(< 3\). In contrast, when it comes to an Earth-like tidally locked world orbiting a late-type M-dwarf akin to TRAPPIST-1, we found that \(T_W\) causes \(\mathcal{Z}_\mathrm{CO}\) to vary by at least an order of magnitude. Furthermore, sufficiently warm oceans may preclude phytoplankton-like biota from existing on these worlds altogether. We calculated the critical depth and showed that it is sensitive to \(T_W\), and varies by nearly an order of magnitude for the temperature range considered herein. Next, we examined the oceanic NPP of Planet G and Planet M as a function of the ocean temperature. The NPP constitutes one of the most vital metrics for a biosphere, and it has practical consequences that are delineated in the next paragraph. This calculation entailed the estimation of several variables, of which a few have not been robustly determined as empirical functions of \(T_W\). Bearing this caveat in mind, we found that the NPP on Planet G was not very sensitive to \(T_W\) until it exceeded a certain threshold after which the rate of carbon fixation dropped precipitously and drove a corresponding decline in the NPP. For the case of Planet M, the NPP was determined to be \(\lesssim 1\%\) that of modern Earth, primarily on account of the shallowness of the photosynthesis zone in tandem with the lower PAR fluxes. When the ocean temperatures were raised sufficiently, the conditions for phytoplankton-like biota became untenable as noted in the earlier paragraph, and consequently resulted in the NPP approaching zero. Lastly, we analyzed the ramifications of our work in the context of our planet as well as tidally locked Earth-like exoplanets orbiting late-type M-dwarfs. We discussed how an increase of \(\sim 10\) \(^\circ\)C in the ocean temperature, such as what is expected to happen \(\lesssim 1\) Gyr in Earth's future due to the growing solar luminosity, could radically transform the aquatic biosphere of Earth-analogs around G-type stars and diminish the NPP to \(< 10\%\) of the Earth's current oceanic NPP in large swathes of the oceans. In a similar vein, we surmised that the aquatic biospheres of tidally locked Earth-like worlds around late-type M-dwarfs may evince NPPs that are \(\lesssim 1\%\) of our planet's oceanic NPP today. If this prediction is correct, these worlds would be unlikely to accumulate atmospheric O\(_2\)---except in circumstances where they have much higher carbon burial and lower outgassing of reducing gases---but signatures of life are nonetheless potentially detectable through the photosynthetic red edge if the coverage and density of photoautotrophs is high enough. We concluded our discussion by sketching rubrics which might enable the behavior of NPP with spectral type and temperature to be gauged by future observations.
{'timestamp': '2021-03-01T02:20:05', 'yymm': '2005', 'arxiv_id': '2005.14387', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14387'}
null
null
null
null
# Introduction Success of a secure quantum network depends on quantum correlations distributed and shared among different parties over many sites. Different kind of quantum correlations, for instance, multipartite entanglement and multipartite nonlocality have been extensively used as a resource to perform many task in such networks. A key property of these quantum correlations used to secure those quantum networks is that they have limited shareability properties and sometimes can even be monogamous. For example, when a quantum system \(A\) is entangled with another system \(B\) then this entanglement puts a constraint on the amount of entanglement that can exist between one of those parties (\(B\), say) and a third party, \(C\). This limited shareability phenomenon is termed as monogamy. This is one of the fundamental differences between quantum entanglement and classical correlations, where all classical probability distributions can be shared. Monogamy of entanglement was first quantified by Coffman, Kundu, and Wootters (CKW) in, where it was shown that the sum of the individual pairwise entanglement between A and B and C cannot exceed the entanglement between A and the remaining parties together. Since then many research work have been done on such monogamy relations of quantum entanglement. This characteristic of quantum entanglement has found potential applications in various quantum information processing tasks such as quantum key distribution, classification of quantum states, study of black-hole physics, and frustrated spin systems, etc. Similar to monogamy of entanglement, if any two quantum systems \(A\) and \(B\) are correlated in such a way that they violate Bell-CHSH inequality then neither of \(A\) nor \(B\) can be Bell-CHSH nonlocal with the other system \(C\). In the last few years, several fundamental results on shareability of nonolocal correlations have been proven that constrain the distribution of nonlocal correlations in terms of violation of some Bell-type inequalities among the subsystems of a multipartite system and they play a key role in the applications of quantum nonlocal correlations to cryptography. Monogamy relations have also been studied for quantum discord, indistinguishability, coherence , measurement induced nonlocality and other nonclassical correlations.\ Despite the importance of shareability in quantum information, the knowledge of shareability for quantum steering is so far rather limited. The objective of this paper is to understand more about the shareability associated with the quantum steering. The notion of steering was introduced by Schr\(\mathrm{o}\)dinger in 1935 [@Sch] and the effect was recently formalised from foundational as well as quantum information perspective. Considering two distant observers Alice and Bob sharing an entangled state, steering captures the fact that Alice, by performing a local measurement on her subsystem, can remotely steer Bob's state. This is not possible if the shared state is only classically correlated. This kind of quantum correlation is known as steering. It can be understood as a form of quantum nonlocality intermediate between entanglement and Bell nonlocality. Quantum steering is certified by the violation of steering inequalities. A number of steering inequalities have been designed to observe steering. Violation of such steering inequalities certify the presence of entanglement in one-sided device-independent way. Steerable states were shown to be beneficial for tasks involving randomness generation, subchannel discrimination, quantum information processing, and one-sided device-independent processing in quantum key distribution. However, comparatively little is known about the shareability of this type of nonlocality. By deriving shareability relations, one can understand how this special type of nonlocal correlation (steering) can be distributed over different subsystems. In this paper, by using the three settings CJWR linear steering inequality, we will derive different kind of trade-off relations that quantify the amount of bipartite steering that can be shared among the three qubit systems. In turn, these trade-off relations help us to prove that at most two of three reduced states of an arbitrary three qubit state can violate the three settings CJWR linear steering inequality contrary to two settings CJWR linear steering inequality or Bell-CHSH inequality, where at most one of the reduced states can violate those inequalities. Consequently, in general, steering correlations turn out to be non-monogamous.\ Over the past few years it has become clear that correlation statistics of two-body subsystems can be very fruitful in inferring the multipartite properties of a composite quantum system. In this context, we have also studied how the reduced bipartite steering of a three qubit state depends on the bipartite and genuine tripartite entanglement of the three-qubit states. Interestingly, criteria for detecting different kind of entanglement of pure three qubit state are obtained based on these shareability relations. We illustrate the relevance of our results with different examples. # PRELIMINARIES {#sec2} In this section, we briefly discuss the concept of steering and the three settings CJWR linear steering inequality that we use in this work. ## Steering Steering is usually formulated by considering a quantum information task. Suppose two spatially separated observers, say Alice and Bob share a bipartite state \(\rho_{AB}\) and they can perform measurements in the sets \(M_{A}\) and \(M_{B}\), respectively. In a steering test, Bob, who does trust his own but not Alice's apparatus, wants to verify whether the shared state between them is entangled. He will be convinced that the shared state \(\rho_{AB}\) is entangled only if his system is genuinely influenced by Alice's measurement, instead of some preexisting local hidden states (LHS) which Alice may have access to. To make sure that Bob must exclude the LHS model \[\label{mon1} P(a,b | A, B, \rho_{AB})=\sum_\lambda p_\lambda P(a|A, \lambda)P_{Q}(b|B, \rho_{\lambda}),\] in which \(P(a,b|A,B, \rho_{AB}) = Tr(A_{a} \otimes B_{b}\, \rho_{AB})\) is the probability of getting outcomes \(a\) and \(b\) when measurements \(A\) and \(B\) are performed on \(\rho_{AB}\) by Alice and Bob respectively, \(A_{a}\) and \(B_{b}\) are their corresponding measurement operators; \(\lambda\) is the hidden variable, \(\rho_{\lambda}\) is the state that Alice sends with probability \(p_{\lambda}\)(\(\sum_{\lambda}p_{\lambda} =1\)); \(P(a|A, \lambda)\) is the conditioned probability of Alice obtaining outcome \(a\) under \(\lambda\), \(P_{Q}(b|B, \rho_{\lambda})\) denotes the quantum probability of outcome \(b\) given by measuring \(B\) on the local hidden state \(\rho_{\lambda}\). Now, if Bob determines that such correlation \(P(a,b | A, B, \rho_{AB})\) cannot be explained by any LHS models, then he will be convinced that Alice can steer his state, and thus the corresponding bipartite state is entangled. In short, the bipartite state \(\rho_{AB}\) is unsteerable by Alice to Bob if and only if the joint probability distributions satisfy the Eq.([\[mon1\]](#mon1){reference-type="ref" reference="mon1"}) for all measurements \(A\) and \(B\). The assumption of such LHS model leads to certain steering inequalities, violation of which indicates the occurrence of steering.\ The simplest way of constructing steering inequality is to find constraint for the correlations between Alice's and Bob's measurement statistics. In this work, we are interested in using such type of linear steering inequality formulated by Cavalcanti, Jones, Wiseman, and Reid(CJWR). They proposed the following series of steering inequalities to check whether a bipartite state is steerable from Alice to Bob when both the parties are allowed to perform \(n\) dichotomic measurements on their respective subsystems: \[\label{mon2} F_{n}(\rho_{AB},\mu) = \frac{1}{\sqrt{n}}|\sum_{k=1}^{n} \langle A_{k} \otimes B_{k} \rangle | \leq 1\] where \(A_{k} = \hat{a}_{k}\cdot \overrightarrow{\sigma}\), \(B_{k} = \hat{b}_{k} \cdot \overrightarrow{\sigma}\), \(\overrightarrow{\sigma} = (\sigma_{1},\sigma_{2},\sigma_{3})\) is a vector composed of the Pauli matrices, \(\hat{a}_{k} \in \mathbb{R}^{3}\) are unit vectors, \(\hat{b}_{k} \in \mathbb{R}^{3}\) are orthonormal vectors, \(\mu =\{\hat{a}_{1},\hat{a}_{2}....\hat{a}_{n}, \hat{b}_{1},\hat{b}_{2}...,\hat{b}_{n} \}\) is the set of measurement directions, \(\langle A_{k} \otimes B_{k} \rangle = Tr(\rho_{AB} (A_{k} \otimes B_{k}))\) and \(\rho_{AB} \in \mathbb{H_{A}} \otimes \mathbb{H_{B}}\) is any bipartite quantum state.\ Here our attention is confined to the qubit case. In Hilbert-Schmidt representation any two qubit state can be expressed as, \[\label{mon3} \rho_{AB} = \frac{1}{4}[\mathbf{ I} \otimes \mathbf{ I} + \vec{a } \cdot \vec{\sigma} \otimes \mathbf{ I} + \mathbb{I} \otimes \vec{b} \cdot \vec{\sigma} + \sum_{i,j} t^{AB}_{ij} \sigma_{i} \otimes \sigma_{j}]\] \(\vec{a}\), \(\vec{b}\) being the local bloch vectors and \(T_{AB} = [t^{AB}_{ij}]\) is the correlation matrix. The components \(t^{AB}_{ij}\) are given by \(t^{AB}_{ij} = Tr[\rho_{AB} {\sigma}_{i} \otimes {\sigma}_{j}]\) and \(\vec{a } ^{2}+ \vec{b }^{2} + \sum_{i,j} {(t^{AB}_{ij})} ^{2}\leq 3\). In, Luo showed that any two-qubit state can be reduced, by local unitary equivalence, to \[\label{mon4} \rho'_{AB} = \frac{1}{4}[\mathbf{ I} \otimes \mathbf{ I} + \vec{a' } \cdot \vec{\sigma} \otimes \mathbf{ I} + \mathbb{I} \otimes \vec{b'} \cdot \vec{\sigma} + \sum_{i} u'_{i} \, {\sigma}_{i} \otimes {\sigma}_{i}]\] where the correlation matrix of \(\rho'_{AB}\) is \(T'_{AB} = diag(u'_{1},u'_{2},u'_{3})\). In, for any two qubit state \(\rho'_{AB}\), the authors derived an analytical expression for the maximum value of the two settings and three settings CJWR linear steering inequality in terms of diagonal elements of the correlation matrix \(T'_{AB} = diag(u'_{1},u'_{2},u'_{3})\).\ Specifically, \(\max_{\mu} F_{2}(\rho'_{AB},\mu)\) and \(\max_{\mu} F_{3}(\rho'_{AB},\mu)\) have been evaluated to be the following: \[\label{mon5} \max_{\mu} F_{2}(\rho'_{AB},\mu) = \sqrt{u'^{2}_{1} + u'^{2}_{2} },\] and \[\label{mon6} \max_{\mu} F_{3}(\rho'_{AB},\mu) = \sqrt{Tr[T'^{T}_{AB} T'_{AB}] },\] where \({u'}_{1}^{2}\) and \({u'}_{2}^{2}\) are two largest diagonal elements of \(T'^{2}_{AB}\). Here we do consider only the three settings linear steering inequality as under two measurement settings the notion of steering and Bell-CHSH nonlocality are indistinguishable. Since the states given in Eq.([\[mon3\]](#mon3){reference-type="ref" reference="mon3"}) and Eq.([\[mon4\]](#mon4){reference-type="ref" reference="mon4"}) are local unitary equivalent, we must have, \[\begin{aligned} \max_{\mu} F_{3}(\rho'_{AB},\mu) = \sqrt{Tr[T'^{T}_{AB} T'_{AB}] } &&=\sqrt{Tr[T^{T}_{AB} T_{AB}] } \\ &&=\max_{\mu} F_{3}(\rho_{AB},\mu). \end{aligned}\] Consequently, the linear inequality([\[mon2\]](#mon2){reference-type="ref" reference="mon2"}) (for three measurement settings) implies that any state \(\rho_{AB}\) is \(F_{3}\) steerable if and only if \[\label{mon8} S_{AB} = Tr[T^{T}_{AB} T_{AB}] >1.\] Note that this condition is just a sufficient criterion to check steerability. There exist steerable states which satisfy \(S_{AB} \leq 1\). # Shareability and monogamy of Steering Correlations {#monsec1} Consider a scenario in which Alice, Bob, and Charlie share a three qubit state \(\rho_{ABC}.\) Let \(\rho_{AB}\), \(\rho_{AC}\), \(\rho_{BC}\) denote the three bipartite reduced states of \(\rho_{ABC}\). In general, for tripartite states, monogamy relations have the following form: \[\label{mon9} Q(\rho_{AB}) + Q(\rho_{AC}) \leq Q(\rho_{A|BC})\] or \[\label{mon10} Q(\rho_{AB}) + Q(\rho_{AC}) \leq K\] for some bipartite quantum measure \(Q\) and positive real number \(K\). Here \(Q(\rho_{A|BC})\) represents the correlation between subsystems \(A\) and \(BC\). Entanglement, Bell-CHSH nonlocality, and steering (via two settings linear steering inequality) are examples of such correlation measures satisfying this monogamy relation(Eq.([\[mon10\]](#mon10){reference-type="ref" reference="mon10"})). Particularly, for Bell-CHSH inequality and \(F_{2}\) inequality, monogamy relation([\[mon10\]](#mon10){reference-type="ref" reference="mon10"}) takes the form \[\label{mon11} Q(\rho_{AB}) + Q(\rho_{AC}) \leq 2.\] Thus, at most one bipartite reduced state with respect to a certain observer (say, \(A\)) can violate the linear steering \(F_{2}\) inequality. This feature is known as "*monogamy of steering correlations*".\ It is a known fact that entanglement is a property of a quantum state, now correlations generated due to measurements performed on any entangled quantum state are not solely determined by the state of the system under consideration. It is also dependent on the specific setup used to determine the correlations. Consequently, in general, steerability of a quantum state varies from one measurement scenario to another. In this context, an obvious question arises: *can addition of one more observable per party change the monogamous nature of steering?* Affirmative answer of this query is given by the following theorem. The above result on symmetric states leads to the following corollary. Theorem[\[mont1\]](#mont1){reference-type="ref" reference="mont1"} guarantees existence of three qubit states for which all two-party reduced states with respect to a certain observer violate the \(F_{3}\) inequality(Fig.[\[monp\]](#monp){reference-type="ref" reference="monp"}). This non-monogamous nature of steering allows one to reveal shareability(non-monogamous nature) of the entanglement of bipartite mixed states. As far as the shareability of quantum correlations is concerned, quantum entanglement is strictly speaking only monogamous in the case of pure entangled states. If the state of two systems, say \(\rho_{AB}\) is a mixed entangled state, then it is possible that both of the two systems \(A\) and \(B\) are entangled to a third system, say \(C\). For example, the so-called \(W\) state \(|W\rangle = \frac{(|001\rangle + |010\rangle + |100\rangle)}{\sqrt{3}}\) has bipartite reduced states that are all identical and entangled. Thus, entanglement of these reduced bipartite mixed states is sharable (non-monogamous), however, the steering correlations obtainable from these states follow the monogamy inequality Eq.([\[mon11\]](#mon11){reference-type="ref" reference="mon11"}). So, by considering \(F_{2}\) inequality, one cannot reveal shareability of entanglement of bipartite mixed states. To reveal this, steering correlations obtainable from these states must be non-monogamous. As shown above in Theorem[\[mont1\]](#mont1){reference-type="ref" reference="mont1"}, the state \(|\psi_{ABC}\rangle\) (Eq.([\[mon21\]](#mon21){reference-type="ref" reference="mon21"})) provides steerable bipartite reduced states between subsystems \(AC\) and \(BC\). Therefore the corresponding reduced mixed states \(\rho_{AC}\) and \(\rho_{BC}\) are also entangled and the two qubit mixed entangled state \(\rho_{AC}\) is shareable to at least one other qubit. This in turn indicates that \(F_{3}\) inequality is an appropriate ingredient to reveal shareability of entanglement of mixed states.\ Unlike the standard \(|W\rangle\) state, the state \(|\psi_{ABC}\rangle\) can be used as a resource for deterministic teleportation and dense coding. As another application of the non-monogamous nature of steering correlations, consider that a pure three qubit state is provided to experimentalists which they have to use as a resource in deterministic teleportation or dense coding. They are also provided with the information that the state is either \(|\psi_{ABC}\rangle\) or \(|W\rangle.\) We show that the non-monogamy phenomenon as described in theorem[\[mont1\]](#mont1){reference-type="ref" reference="mont1"} can be used to determine the desired state. For \(|W\rangle\) state, \(S_{ij} = 1\) for all reduced states, so monogamy is preserved. On the other hand, the state \(|\psi_{ABC}\rangle\) does not follow the monogamy as shown in theorem [\[mont1\]](#mont1){reference-type="ref" reference="mont1"}. Thus, the above result distinguishes the two types of states though they belong to the same class (\(W\)-like states ).\ Keeping in mind the usefulness of shareability relations, one naturally would be interested to know which of the three qubit states obey monogamy(or non-monogamy) of steering. The explicit evaluation of the number of reduced steerable states along with monogamy(or non-monogamy) in each class of three qubit pure states as classified by Sabín and García-Alcaine is reported in Appendix [\[Classi\]](#Classi){reference-type="ref" reference="Classi"}, where we see that only star shaped states and \(W\)-like states can be non-monogamous. Next we ask whether non-monogamous behavior of those two classes of pure states is robust against white noise admixture. The results are presented in Appendix [\[Classi\]](#Classi){reference-type="ref" reference="Classi"}, where it is shown that less entangled states can be more robust against white noise admixture in comparison to higher entangled states.\ Other than constraint given by Eq. ([\[mon20\]](#mon20){reference-type="ref" reference="mon20"}) and its permutations, few other conditions are also derived in the following sections under which \(F_{3}\) steering is non-monogamous. # Reduced Steering Versus Entanglement {#monsec3} In two qubit systems, the more entangled a pure state is, the more it can violate the Bell-CHSH inequality. In this context, a relevant study is to find the relation between violation of \(F_{3}\) inequality by the reduced bipartite states of a pure state and their corresponding entanglement(with respect to some measure). The relation between \(S_{AB}\) and concurrence \(\mathcal{C}_{AB}\)(a measure of entanglement) can be derived with similar methods used in. For pure bipartite states the relation is \(S_{AB} = 1+2 \, \mathcal{C}_{AB}^{2}\). Hence, for pure states, more entanglement generates larger violation of \(F_{3}\) inequality. However from this relation we cannot infer anything about mixed bipartite reduced states of a three qubit pure state. In the theorem below we derive a relation justifying our claim. It is interesting to note that \((S_{AB},S_{AC},S_{BC})\) and \((\vec{c}^{2}, \vec{b}^{2}, \vec{a}^{2} )\) follow the same ordering for all pure three qubit state.\ Distribution of bipartite quantum entanglement (i.e., entanglement of reduced bipartite states) of any pure three qubit state is subjected to certain shareability laws. In particular, addition of squared concurrence of all bipartite reduced states cannot be greater than \(\frac{4}{3}\), \[\label{mon100} \mathcal{C}_{AB}^{2} + \mathcal{C}_{AC}^{2} + \mathcal{C}_{BC}^{2} \leq \frac{4}{3}.\] This shareability constraint indicates that shareability of reduced bipartite steerability as well as individual bipartite steerability of any pure three qubit state might depend on concurrence of reduced bipartite states. This is in fact the case. We next discuss few results in this direction. This result holds for all three qubit pure states. As an example, consider the pure state \(|\psi_{ABC}\rangle\) which has two \(F_{3}\) steerable reduced states \(\rho_{AC}\) and \(\rho_{BC}\) with \(\mathcal{C}_{AC}^{2} = \mathcal{C}_{BC}^{2} = \frac{1}{2} > \frac{4}{9}\). However, one should note that the above inequality \(\mathcal{C}_{ij}^{2} > \frac{4}{9}\) is only a sufficient condition for \(F_{3}\) steerability of reduced bipartite state \(\rho_{ij}\), because there are reduced states which violate the inequality \(\mathcal{C}_{ij}^{2} > \frac{4}{9}\), but still give rise to \(F_{3}\) steerability. One such example is \(|\phi_{con}\rangle = \frac{\sqrt{3}}{2} |000\rangle + \frac{1}{2\sqrt{2}} |101\rangle + \frac{1}{2\sqrt{2}} |110\rangle\). For this state, from the above formulae one can obtain \(\mathcal{C}_{AB}^{2} = \frac{3}{8} < \frac{4}{9}\) and \(S_{AB} = 1 + \frac{5}{16}\). Clearly, the reduced state \(\rho_{AB}\) violates \(F_{3}\) inequality, while it violates the inequality \(\mathcal{C}_{AB}^{2} > \frac{4}{9}\). Although, an obvious necessary and sufficient condition can be derived from Eq.([\[mon99\]](#mon99){reference-type="ref" reference="mon99"}) and its permutations. Due to the shareability constraint Eq.([\[mon100\]](#mon100){reference-type="ref" reference="mon100"}), violation of one of the reduced states (say, \(\rho_{AB}\)) puts strong restriction on the average of squared concurrences of the remaining reduced states. As shown in, sum of squared concurrence between \(i\) and \(k\), and the squared concurrence between \(j\) and \(k\), cannot be greater than \(1\), i.e., \(\mathcal{C}_{ik}^{2} + \mathcal{C}_{jk}^{2} \leq 1\). Hence, from the above corollary it is observed that this restriction is further strengthened if one consider \(F_{3}\) steerability of \(\rho_{ij}\).\ Since the last corollary ([\[monc3\]](#monc3){reference-type="ref" reference="monc3"}) puts more stringent restriction, using it we get the following sufficient condition for monogamy of \(F_{3}\) steering: It may be noted that theorem [\[mont4\]](#mont4){reference-type="ref" reference="mont4"}, gives rise to a sufficient condition for non-monogamy of \(F_{3}\) steerability. Now, we discuss how the \(F_{3}\) inequality violation by the reduced bipartite states depends on the genuine entanglement of the three qubit state. As shown in Sec.([3](#monsec1){reference-type="ref" reference="monsec1"}), maximum two bipartite reduced states of \(\rho_{ABC}\) can violate the \(F_{3}\) inequality, so the bipartite steering of \(\rho_{ABC}\) implies that it comes from one component of either this triple \((S_{AB}, S_{AC}, S_{BC})\) or \(((S_{AB}, S_{AC}),(S_{AB}, S_{BC}),(S_{AC},S_{BC}))\). Considering both the possibilities, we adopt two different measures: \(S^{\max}(\rho_{ABC})\) and \(S_{total}^{max}(\rho_{ABC})\), where \(S^{\max}(\rho_{ABC}) = \max{\{S_{AB},S_{AC},S_{BC}\}}\) and \(S_{total}^{\max}(\rho_{ABC}) = \max{\{S_{AB}+ S_{AC}, S_{AB} + S_{BC}, S_{AC}+ S_{BC}\}}\).\ In each case, we will now derive a relation with tripartite entanglement of \(\rho_{ABC}\). This complementary relation suggests that \(F_{3}\) inequality violation by the reduced bipartite states depends on the tripartite entanglement present in the tripartite system. We determine a class of three qubit genuinely entangled states which saturates the above-mentioned relation. This single parameter class of states is given by \(|\phi_{m}\rangle = \frac{|000\rangle +m(|101\rangle + |010\rangle) + |111\rangle}{\sqrt{2 + 2m^{2}}}\), where \(m \in [0,1]\). The above class of states has been identified in as the maximum dense-coding capable class of states. For this class of states, \(S^{max}(|\phi_{m}\rangle)= 1 + \frac{8 m^{2}}{(1+m^{2})^{2}}\) and \(\tau(|\phi_{m}\rangle) = 1-\frac{4 m^{2}}{(1+m^{2})^{2}}\). Hence, for this class of states, one can show the follwing relation: \(S^{max}(|\phi_{m}\rangle) + 2 \tau(|\phi_{m}\rangle) = 3\). We have identified a class of genuinely entangled states which saturates the afore-mentioned relation. This class of states is given by \(|\phi_{q}\rangle = \frac{1}{\sqrt{2}}|000\rangle + \sqrt{\frac{1}{2}-q^{2}} |101\rangle + q |111\rangle\) where \(q \in (0, \frac{1}{\sqrt{2}})\). For \(|\phi_{q}\rangle\), \(S_{total}^{max} = 3-2q^{2}\) and \(\tau = 2 q^{2}\). Hence, \(S^{max}_{total}(\rho_{ABC}) + \tau(\rho_{ABC})= 3\). However, \(|\phi_{q}\rangle\) has only one reduced state which violate \(F_{3}\) inequality. Since, among all pure three qubit GHZ class of states only star shaped states can have two reduced steerable states (see Appendix [\[Classi\]](#Classi){reference-type="ref" reference="Classi"}) and for this class of states, \(S^{max}_{total}(\rho_{ABC}) + \tau(\rho_{ABC}) < 3\), so there is no three qubit pure state with \(\tau \neq 0\) having two reduced bipartite steerable states which saturates the above inequality.\ All the above-mentioned relations are obtained with respect to three tangle. However, three tangle is not a good measure of genuine tripartite entanglement even for pure states as there exists a large number of pure states (\(W\)-like states) for which it becomes zero. Hence, none of the relations are meaningful for those \(W\)-like states.\ To obtain such relations for \(W\)-like states, we consider the measure for \(W\) entanglement introduced by Dur et. al. , defined as \(E_{W} = \min\{\mathcal{C}_{AB}^{2},\mathcal{C}_{AC}^{2},\mathcal{C}_{BC}^{2}\}\). Any pure state \(\rho_{ABC}\) contains \(W\) entanglement if \(E_{W} > 0\). The \(W\) entanglement \(E_{W}\) achieves its maximum value \(\frac{4}{9}\) in the \(|W\rangle\) state. This relation imposes a restriction on the bipartite steering for a given amount of \(W\) entanglement and it is saturated by \(|W\rangle\) state.\ We have also investigated such complementary relations for bipartite nonlocality(with respect to Bell-CHSH violation), bipartite steering and three tangle. Following the same procedure as before, a similar trade-off relation can be obtained for them: \[\label{mon34} S^{\max}(\rho_{ABC}) + \mathcal{M}^{\max}(\rho_{ABC}) + 3 \,\tau(\rho_{ABC}) \leq 5\] where \(\mathcal{M}^{\max}(\rho_{ABC}) = \max \{\mathcal{M}_{AB}, \mathcal{M}_{AC}, \mathcal{M}_{BC}\}\) and \(\mathcal{M} = u_{1}^{2} + u_{2}^{2}\) is the Horodecki parameter used for measuring the degree of Bell-CHSH violation. \(u_{1}^{2}, u_{2}^{2}\) are being the largest two eigen values of \(T^{T}_{AB} T_{AB}\). # Complementary relations for local and nonlocal information contents Total information content of a three qubit state can be divided into two forms: local and nonlocal information contents. Local information can be defined as : \[\label{mon35} I_{local} = \vec{a}^{2} + \vec{b}^{2} + \vec{c}^{2}.\] To derive the complementary relation between local and nonlocal information contents, we consider only bipartite nonlocal information present in the three qubit state. Bipartite nonlocal information content can be defined as, \[\label{mon36} I_{nonlocal} = \max\{N_{AB} + N_{AC}, N_{AB} + N_{BC}, N_{AC} + N_{BC}\}\] where \(N_{ij} = \max\{0, S_{ij}-1\}\), \(i \neq j\) and \(i, j = A, B, C\), quantifies the amount of \(F_{3}\) inequality violation and hence the steering nonlocal correlations of the two qubit state \(\rho_{ij}\). The above trade-off relation links between local information and bipartite steering. One can easily show that \(I_{local} = 3\), and \(I_{nonlocal} = 0\) for the product state. On the other hand, in order to exist bipartite steering, \(I_{local}\) must be less than \(3\). For \(|\psi_{ABC}\rangle\)(Eq.([\[mon21\]](#mon21){reference-type="ref" reference="mon21"})), \(I_{local} = \frac{1}{2}\), \(I_{nonlocal} = 2 + \frac{1}{2}\) and it is the state which saturates this trade-off. In this context, it may be noted that to get larger violation of \(F_{3}\) inequality(characterizing larger amount of steering), the amount of local information content must be reduced. This fact will be confirmed in the next section, where we will show that amount of local information content must be less than one for any three qubit pure state to have two \(F_{3}\) steerable bipartite reduced states. # Entanglement detection {#monsec2} We now illustrate the relevance of the above results with some applications. By using the shareability relations, we will derive criteria of detecting different types of tripartite entanglement. Now one may enquire whether condition ([\[mon22\]](#mon22){reference-type="ref" reference="mon22"}) is also necessary for entanglement. Unfortunately, this is not the case. For example, consider the \(|W\rangle\) state, which does not satisfy ([\[mon22\]](#mon22){reference-type="ref" reference="mon22"}), but is entangled. It is important to note that for a pure biseparable state \(\vec{a}^{2} + \vec{b}^{2} + \vec{c}^{2} \geq 1\) and exactly one of the reduced bipartite states is \(F_{3}\) steerable. Therefore, for the existence of two \(F_{3}\) steerable bipartite reduced states of a three qubit pure state, \(\vec{a}^{2} + \vec{b}^{2} + \vec{c}^{2} < 1\) must hold. This condition can be treated as a necessary condition for a three qubit pure state to have two \(F_{3}\) steerable bipartite reduced states. However, this is not sufficient, for example, \(\vec{a}^{2} + \vec{b}^{2} + \vec{c}^{2} = \frac{1}{3} < 1\) for \(|W\rangle\) state, but no reduced bipartite state of this state is \(F_{3}\) steerable.\ At this stage a pertinent question would be whether there exists any biseparable mixed state which has more than one reduced steerable states. Let us consider the following example: \[\begin{aligned} \label{mon90} &|\phi_{b}\rangle = \frac{4}{9}(1 + \epsilon) {|\phi^{+}\rangle \langle \phi^{+}|}_{AB} \otimes |0\rangle \langle 0|_{C} +\frac{4}{9}(1 + \epsilon) \times \nonumber \\ & {|\phi^{+}\rangle \langle \phi^{+}|}_{AC} \otimes |0\rangle \langle 0|_{B} + \frac{1}{9}(1-8\epsilon) {|\phi^{+}\rangle \langle \phi^{+}|}_{BC} \otimes |0\rangle \langle 0|_{A} \nonumber\\ \end{aligned}\] where \(0 \leq \epsilon \leq 1\) and \(|\phi^{+}\rangle = \frac{|00\rangle + |11\rangle}{\sqrt{2}}.\) For this biseparable mixed state, the bipartite reduced states \(\rho_{AB}\) and \(\rho_{AC}\) are \(F_{3}\) steerable if \(\epsilon > \frac{9}{4\sqrt{3}}-1\). Thus, genuine entanglement is not necessary to reveal non-monogamous nature of steering correlations. # Discussions {#sec4} Analysis of shareability of correlations between parties sharing a quantum system is an effective way of interpreting quantum theory. In this paper, we have investigated the shareability properties of quantum steering correlations. For our purpose, we have considered the three settings linear steering (\(F_{3}\)) inequality. Interestingly it is observed that at most two reduced states of any arbitrary three qubit state can violate the \(F_{3}\) inequality. This in turn reveal non monogamous nature of steering correlations. Such an observation is however in contrary to the monogamous nature of steering obtained while using two setting linear steering inequality or Bell-CHSH inequality. This indicates that steering correlations can be non-monogamous depending on the measurement scenario. Now steering correlations in a setup with two settings per party cannot be shared, whereas the same is possible when a setup with three settings per party is considered. So it might be tempting to think that increase of more settings per party could provide more steerable reduced states. Consequently, it will be interesting if one investigate this shareability phenomenon for more than three settings scenario.\ We have also addressed the question how different measures of genuine entanglement and also entanglement of reduced states relate with reduced bipartite steering of three qubit states. We have established several relations between reduced bipartite steering and different measures of entanglement. Relation existing between bipartite steering, Bell-CHSH nonlocality, and genuine entanglement for three qubit states has also been analyzed.\ Then, we have determined the complementarity relation between the local information content and bipartite steering. We believe that this will be helpful in designing some appropriate information-theoretic measures of steering. Moreover, we have shown that the shareability constraints allow us to detect different types of tripartite entanglement. Now, monogamy is the essential part in ensuring the security of quantum cryptographic protocols. For this reason, it is beneficial to capture precisely under what condition steering correlations is monogamous. So, our observations may be used in framing some more secured quantum cryptographic protocols.\ We hope that our results will be useful for further understanding of formalism underlying steering correlations and their distribution in multipartite states. Apart from investigating our work for more than three setting scenario, it will be interesting to generalize the shareability concept of steering correlations and relations between different quantum correlations for more than two party reduced states. Also, investigation of the same beyond qubit systems is a source of potential future research.
{'timestamp': '2020-06-01T02:06:15', 'yymm': '2005', 'arxiv_id': '2005.14375', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14375'}
null
null
# Introduction A *signed graph* is a graph in which every edge has an associated sign. We write a signed graph \(\Sigma\) as the triple \((V, E, \sigma)\) where \(V\) is the vertex set, \(E\) is the edge set, and \(\sigma: E \to \{+,-\}\) is the *signature*. Our graphs are *signed simple graphs*: with no loops and no multiple edges. We define signed-graph coloring as in, and chromatic number as in. A *proper coloration* of a signed graph \(\Sigma\) is a function, \(\kappa: V \to \{\pm1, \pm 2, \ldots, \allowbreak \pm k, 0\},\) such that for any edge \(e_{ab} \in E\), \(\kappa(a) \neq \sigma(e) \kappa(b).\) The *chromatic number* of \(\Sigma\), written \(\chi(\Sigma)\), is the size of the smallest set of colors which can be used to properly color \(\Sigma.\) A graph with chromatic number \(k\) is called *k-chromatic*. A coloration is *minimal* if it is proper and uses a set of colors of size \(\chi(\Sigma).\) If \(\chi = 2k\) then a minimal *color set* is \(\{\pm1, \pm2, \ldots, \pm k\},\) and if \(\chi = 2k+1\) then a minimal color set is \(\{\pm1, \pm2, \ldots, \pm k, 0\}.\) If \(\chi = 2k+1\), there must be at least one vertex colored 0 in every minimal coloration. The *deficiency* of a coloration, \(\operatorname{def}(\kappa)\), is the number of unused colors from the color set of \(\kappa.\) The *deficiency set*, \(\operatorname{D}(\kappa)\), is the set of unused colors. The *maximum deficiency* of a graph, \(\operatorname{M}(\Sigma)\), is \(\max\{\operatorname{def}(\kappa) \mid \kappa\) is a minimal proper coloration of \(\Sigma \}.\) For more about deficiency, see. Let \(\Sigma_1\) and \(\Sigma_2\) be signed graphs. The *\(\sigma^*\)-join* of \(\Sigma_1\) and \(\Sigma_2\), written \(\Sigma_1 \vee_{\sigma^*} \Sigma_2\), is the signed graph with \[\begin{aligned} V &= V(\Sigma_1) \cup V(\Sigma_2), \\ E &= E(\Sigma_1) \cup E(\Sigma_2) \cup \{e_{vw} \mid v \in V(\Sigma_1), w \in V(\Sigma_2)\}, \\ \text{and } \sigma(e) &= \begin{cases} \sigma_1(e) &\text{ if } e \in E(\Sigma_1), \\ \sigma_2(e) &\text{ if } e \in E(\Sigma_2), \\ \sigma^*(e) &\text{ otherwise,} \end{cases} \end{aligned}\] where \(\sigma^*\) is a function from the new join edges to the set \(\{+,-\}.\) We explore joins of signed graphs and prove an analogue to the theorem that the chromatic number of the join of two graphs equals the sum of their chromatic numbers. In this case, the chromatic number of the join of two signed graphs depends on both the chromatic numbers and the maximum deficiencies of the two graphs. # Joins of Signed Graphs {#joins of signed graphs} Unlike in ordinary graph theory, there are many ways to join two signed graphs. The result of joining two signed graphs depends on the signs of the new edges. In this paper we focus on the *all-positive join* of two signed graphs, where each new join edge has positive sign. We write the all-positive join of \(\Sigma_1\) and \(\Sigma_2\) as \(\Sigma_1 \vee_+ \Sigma_2.\) Let \(\Sigma\) be a signed graph with even chromatic number and maximum deficiency \(M\). Then \(\Sigma\) is an *exceptional graph* if in every proper coloration using \(\chi(\Sigma)-M\) colors, every color that is used appears at both ends of some negative edge. Figure 1 shows two examples of exceptional graphs. Graph A is a 6-chromatic graph with maximum deficiency 3. Graph B is a 4-chromatic graph with maximum deficiency 2. In both colorations, every color used appears on both endpoints of some edge. In depictions we use solid lines for positive edges and dashed lines for negative edges. There exist infinitely many exceptional graphs. For example, for non-negative \(k,\) if \(\chi = 2k,\) the complete graph on \(4k\) vertices with a negative perfect matching and all other edges positive is an exceptional graph with maximum deficiency 0. It remains an open problem to characterize exceptional graphs in terms of their structure. Note that in Theorem [\[main thm\]](#main thm){reference-type="ref" reference="main thm"}, \(\chi_2\) can never be larger than \(\chi_1 + \chi_2-M_1-M_2.\) If \(\chi_2 > \chi_1 + \chi_2-M_1-M_2,\) this would imply that \(M_2 > \chi_1-M_1.\) Since \(M_1 \leq \frac{1}{2}\chi_1,\) we then would have \(M_2 > \frac{1}{2} \chi_1 \geq M_1\). This contradicts our assumption that \(M_1 \geq M_2.\) Let \(A\) be a set of vertices of a signed graph \(\Sigma.\) *Switching* \(A\) is negating the signs of the edges with exactly one endpoint in \(A\). Two signed graphs are *switching equivalent* if they are related by switching. The chromatic number of a signed graph is the same as the chromatic number of the switched graph. A minimal coloration of the switched graph is simply a byproduct of switching the graph; given a minimal coloration of \(\Sigma\), the signs of the colors on \(A\) are negated during the switching process. Two colorations of \(\Sigma, \kappa\) and \(\kappa^*,\) are *switching equivalent* if they are related by switching. # Preliminaries When coloring the graph \(\Sigma_1 \vee_+ \Sigma_2,\) one cannot use the same color on both the vertices of \(\Sigma_1\) and \(\Sigma_2\). This gives a straightforward lower bound for the chromatic number of the all-positive join. Throughout the proofs of Theorem [\[main thm\]](#main thm){reference-type="ref" reference="main thm"}, we use several recoloration tools in order to give a proper coloration of the correct size. Define the following replacement types: **Type 1:** Let \(r \in \mathbb Z \setminus \{0\}.\) For \(i\) in the color set of \(\kappa,\) recolor the \(i\)-color set with the color \(r.\) **Type 2:** For \(i \neq 0\) in the color set of \(\kappa,\) such that \(i\) does not appear on both endpoints of an edge, recolor the \(i\)-color set with the color 0. **Type 3:** Let \(r \in \mathbb Z \setminus \{0\}.\) For \(i\) and \(-i\) in the color set of \(\kappa,\) such that \(i \neq 0\), recolor the \(i\)-color set with the color \(r\) and the \((-i)\)-color set with the color \(-r\). **Type 4:** Let \(r_1, r_2 \in \mathbb Z \setminus \{0\}\) such that \(r_1 \neq-r_2.\) For \(i\) and \(-i\) in the color set of \(\kappa,\) such that \(i \neq 0\), recolor the \(i\)-color set with the color \(r_1\) and the \((-i)\)-color set with the color \(r_2\). # Chromatic Number \(\chi_1\) and the Exceptional Case {#chi_1 and exception} 4. Using Type 4 replacements, recolor \(\frac{M_1-M_2-1}{2}\) more pairs of color in \(\Sigma_2\) using colors \(x_{M_2 + 1}, \ldots, x_{M_1-1}.\) Note that we only go up to \(x_{M_1-1}\) since we need an even number of colors for this step. 5. Replace the remaining pairs of colors in \(\Sigma_2\) using Type 3 replacements and colors \(\pm(k_1 + 1), \ldots, \pm (k_1 + k_2-\frac{M_1-M_2-1}{2}).\) Call the new coloration \(\kappa.\) Since no colors were changed in \(\Sigma_1\), \(\kappa\) is proper on \(\Sigma_1.\) In \(\Sigma_2\) all of the color sets were recolored using Type 1, Type 3, and Type 4 replacements, and the original partition of \(V(\Sigma_2)\) into color sets was maintained. Thus, the subgraph induced by every color set of \(\kappa\) on \(\Sigma_2\) is all-negative. Furthermore, if \(r\) is a color of \(\kappa\) resulting from a Type 1 or Type 4 replacement, then there are no vertices colored \(-r\) in \(\Sigma_2.\) If \(r\) and \(-r\) are colors resulting from a Type 3 replacement, then there are no negative edges between the two color sets. Therefore, \(\kappa\) is proper on \(\Sigma_2.\) Finally, no color is used on the vertices of both \(\Sigma_1\) and \(\Sigma_2\). Thus, \(\kappa\) is proper on \(\Sigma_1 \vee_+ \Sigma_2.\) Furthermore, the color set is \(\{\pm1, \ldots, \pm (k_1 + k_2-\frac{M_1-M_2-1}{2})\}.\) Therefore, \[\chi(\Sigma_1 \vee_+ \Sigma_2) = 2\left(k_1 + k_2-\frac{M_1-M_2-1}{2}\right) = \chi_1 + \chi_2-M_1-M_2 + 1. \qedhere\] ◻ Because it is similar to the proof in the exceptional case, for the remaining cases we leave the proof that the new coloration is both proper and of correct size as an exercise for the reader. # Non-Exceptional Cases {#Non-exceptions} [\[main lemma 0\]]{#main lemma 0 label="main lemma 0"} **Case 1.2:** Suppose both \(\chi_1\) and \(\chi_2\) are odd. That is, \(\chi_1 = 2k_1 + 1\) and \(\chi_2 = 2k_2 + 1\) for some positive integers \(k_1\) and \(k_2.\) Then create the coloration \(\kappa\) in the following way: 1. Properly color \(\Sigma_1\) with \(\pm1, \ldots, \pm k_1, 0\) using \(\chi_1-M_1\) colors. Let the \(M_1\) unused colors be \(x_1, \ldots, x_{M_1}.\) Note that 0 must be used. 2. Properly color \(\Sigma_2\) with \(\pm 1, \ldots, \pm k_2, 0\) using \(\chi_2\) colors. 3. Make the following Type 1 and Type 3 replacements on \(\Sigma_2.\) ::: {.center} Old Color New Color Old Color New Color ------------------ ------------- ------------------------ ------------------------------ 1 \(x_1\) \(\frac{M_1}{2} + 1\) \(k_1 + 1\) -1 \(x_2\) \(-(\frac{M_1}{2} + 1)\) \(-(k_1 + 1)\) \(\vdots\) \(\vdots\) \(\vdots\) \(\vdots\) \(\frac{M_1}{2}\) \(x_{M_1-1}\) \(k_2\) \(k_1 + k_2-\frac{M_1}{2}\) \(-\frac{M_1}{2}\) \(x_{M_1}\) \(-k_2\) \(-(k_1 + k_2-\frac{M_1}{2})\) ::: 4. Use Type 1 replacements to recolor the 0-color set in \(\Sigma_1\) with \(k_1 + k_2-\frac{M_1}{2} + 1\) and to recolor the 0-color set in \(\Sigma_2\) with \(-(k_1 + k_2-\frac{M_1}{2} + 1).\) **Case 2:** Suppose \(M_1\) is odd. We have several cases. **Case 2.1:** Suppose both \(\chi_1\) and \(\chi_2\) are even. Let \(\chi_1 = 2k_1\) and \(\chi_2 = 2k_2\) for some positive integers \(k_1\) and \(k_2\). Then either \(\Sigma_1\) or \(\Sigma_2\) is not exceptional. **Case: 2.1a:** Suppose \(\Sigma_1\) is not exceptional. Then there exists a coloration using \(\chi_1-M_1\) colors such that there is no edge with both endpoints colored \(a,\) for some \(a\) in the set of colors used. Call this coloration \(\kappa_1.\) Then color \(\Sigma_1 \vee_+ \Sigma_2\) in the following way: 1. Color \(\Sigma_1\) with \(\kappa_1\). Let the \(M_1\) unused colors be \(x_1, \ldots, x_{M_1}\). By choice of notation, let \(a = 1.\) 2. Properly color \(\Sigma_2\) with \(\pm 1, \ldots, \pm k_2\) using \(\chi_2\) colors. 3. Use a Type 2 replacement to replace \(a\) with 0 in \(\Sigma_1.\) 4. Make the following Type 1 replacements on \(\Sigma_2.\) ::: {.center} Old Color New Color -------------------- ------------- \(-1\) \(x_1\) \(2\) \(x_2\) \(\vdots\) \(\vdots\) \(\frac {M_1+1}{2}\) \(x_{M_1-1}\) \(-\frac{M_1+1}{2}\) \(x_{M_1}\) ::: 5. Use Type 3 replacements to recolor the remaining \(k_2-\frac{M_1 + 1}{2}\) pairs of colors in \(\Sigma_2\) with colors \(\pm (k_1+1), \ldots, \pm (k_1 + k_2-\frac{M_1 + 1}{2}).\) **Case 2.1b:** Suppose \(\Sigma_2\) is not exceptional. Then there exists a proper coloration such that no edge has both endpoints colored \(a\) for some \(a\) in the color set. Call this coloration \(\kappa_2.\) Then color \(\Sigma_1 \vee_+ \Sigma_2\) in the following way: 1. Properly color \(\Sigma_1\) with \(\pm1, \ldots, \pm k_1\) and using \(\chi_1-M_1\) colors. Let the \(M_1\) unused colors be \(x_1, \ldots, x_{M_1}.\) 2. Color \(\Sigma_2\) with \(\kappa_2\) using colors \(\pm 1, \ldots, \pm k_2\) using \(\chi_2\) colors. By choice of notation, let \(a = 1.\) 3. Make the following Type 1, Type 2, and Type 3 replacements on \(\Sigma_2.\) ::: {.center} Old Color New Color Old Color New Color --------------------------------- ------------- -------------------- -------------------------------- 1 0 \(\frac{M_1+1}{2}\) \(k_1 + 1\) -1 \(x_{M_1}\) \(-\frac{M_1+1}{2}\) \(-(k_1 + 1)\) 2 \(x_1\) \(\vdots\) \(\vdots\) -2 \(x_2\) \(-k_2\) \(-(k_1 + k_2-\frac{M_1+1}{2})\) \(\vdots\) \(\vdots\) \(-\left(\frac{M_1-1}{2}\right)\) \(x_{M_1-1}\) ::: **Case 2.2:** Suppose \(\chi_1 = 2k_1 + 1\) and \(\chi_2 = 2k_2\) for some positive integers \(k_1\) and \(k_2\). Then color \(\Sigma_1 \vee_+ \Sigma_2\) in the following way: 1. Properly color \(\Sigma_1\) with \(\pm1, \ldots, \pm k_1, 0\) using \(\chi_1-M_1\) colors. Let the \(M_1\) unused colors be \(x_1, \ldots, x_{M_1}.\) Note that \(0\) must be used. 2. Properly color \(\Sigma_2\) with \(\pm 1, \ldots, \pm k_2\) using \(\chi_2\) colors. 3. In \(\Sigma_1\) use a Type 1 replacement to replace 0 with \(-(k_1+1).\) 4. Make the following Type 1 and Type 3 replacements on \(\Sigma_2.\) ::: {.center} Old Color New Color Old Color New Color --------------------------------- ------------- ---------------------- -------------------------------- 1 \(x_1\) \(-\frac{M_1+1}{2}\) \(k_1 + 1\) -1 \(x_2\) \(\frac{M_1 + 2}{2}\) \(k_1 + 2\) \(\vdots\) \(\vdots\) \(-\frac{M_1 + 2}{2}\) \(-(k_1 + 2)\) \(-\left(\frac{M_1-1}{2}\right)\) \(x_{M_1-1}\) \(\vdots\) \(\vdots\) \(\frac{M_1+1}{2}\) \(x_{M_1}\) \(-k_2\) \(-(k_1 + k_2-\frac{M_1-1}{2})\) ::: **Case 2.3:** Suppose \(\chi_2 = 2k_2 + 1\) for some positive integer \(k_2\). Then color \(\Sigma_1 \vee_+ \Sigma_2\) in the following way: 1. Properly color \(\Sigma_1\) with \(\pm1, \ldots, \pm k_1,\) and 0 if \(\chi_1\) is also odd, using \(\chi_1-M_1\) colors. Let the \(M_1\) unused colors be \(x_1, \ldots, x_{M_1}.\) If \(\chi_1\) is odd, 0 must be used. 2. Properly color \(\Sigma_2\) with \(\pm 1, \ldots, \pm k_2, 0\) using \(\chi_2\) colors. 3. Make the following Type 1 and Type 3 replacements on \(\Sigma_2.\) ::: {.center} Old Color New Color Old Color New Color --------------------------------- ------------- -------------------- -------------------------------- 1 \(x_1\) \(\frac{M_1+1}{2}\) \(k_1 + 1\) -1 \(x_2\) \(-\frac{M_1+1}{2}\) \(-(k_1 + 1)\) \(\vdots\) \(\vdots\) \(\vdots\) \(\vdots\) \(-\left(\frac{M_1-1}{2}\right)\) \(x_{M_1-1}\) \(-k_2\) \(-(k_1 + k_2-\frac{M_1-1}{2})\) \(0\) \(x_{M_1}\) ::: This concludes the non-exceptional cases where \(M_2 = 0.\). ◻ [\[main lemma non-0\]]{#main lemma non-0 label="main lemma non-0"} 5. Replace \(\frac{M_1-M_2}{2}\) more pairs of colors in \(\Sigma_2\) using Type 4 replacements and colors \(x_{M_2 + 1}, \ldots, x_{M_1}\). 6. Use Type 3 replacements to recolor the remaining pairs of colors in \(\Sigma_2\) using \(\pm (k_1 + 2), \ldots, \pm(k_1 + k_2-M_2-\frac{M_1-M_2}{2} + 1).\) **Case 1.2:** Suppose at least one of \(\chi_1\) and \(\chi_2\) is even. Then color \(\Sigma_1 \vee_+ \Sigma_2\) in the following way: 1. Properly color \(\Sigma_1\) with \(\pm1, \ldots, \pm k_1,\) and possibly 0 using \(\chi_1-M_1\) colors. Let the \(M_1\) unused colors be \(x_1, \ldots, x_{M_1}.\) If \(\chi_1\) is odd, 0 must be used. 2. Properly color \(\Sigma_2\) with \(\pm 1, \ldots, \pm k_2,\) and possibly 0 using \(\chi_2-M_2\) colors. Let the \(M_2\) unused colors be \(y_1, \ldots, y_{M_2}.\) If \(\chi_2\) is odd, \(0\) must be used. 3. Make the following Type 1 replacements on \(\Sigma_2.\) ::: {.center} Old Color New Color ------------ ----------- \(-y_1\) \(x_1\) \(-y_2\) \(x_2\) \(\vdots\) \(\vdots\) \(-y_{M_2}\) \(x_{M_2}\) ::: 4. Use Type 4 replacements to recolor \(\frac{M_1-M_2}{2}\) more pairs of colors in \(\Sigma_2\) using \(x_{M_2 + 1}, \ldots, x_{M_1}\). 5. Replace the remaining pairs of colors in \(\Sigma_2\) using Type 3 replacements and colors \(\pm (k_1 + 1), \ldots, \pm(k_1 + k_2-M_2-\frac{M_1-M_2}{2}).\) **Case 2:** Now suppose exactly one of \(M_1\) and \(M_2\) is odd. This implies that \(M_1-M_2\) is odd. **Case 2.1:** Suppose \(\chi_1 = 2k_1\) and \(\chi_2 = 2k_2\) for some positive integers \(k_1\) and \(k_2.\) Then either \(\Sigma_1\) or \(\Sigma_2\) is not exceptional. **Case 2.1a:** Suppose \(\Sigma_1\) is not exceptional. Then there exists a coloration using \(\chi_1-M_1\) colors such that there is no edge with both endpoints colored \(a,\) for some \(a\) in the set of colors used. Call this coloration \(\kappa_1.\) Then color \(\Sigma_1 \vee_+ \Sigma_2\) in the following way: 1. Color \(\Sigma_1\) using \(\kappa_1.\) Let the \(M_1\) unused colors be \(x_1, \ldots, x_{M_1}.\) By choice of notation, let \(a = 1.\) 2. Properly color \(\Sigma_2\) with \(\pm 1, \ldots, \pm k_2\) using \(\chi_2-M_2\) colors. Let the \(M_2\) unused colors be \(y_1, \ldots, y_{M_2}.\) 3. In \(\Sigma_1\) perform a Type 2 replacement to replace \(a\) with 0. 4. Make the following Type 1 replacements on \(\Sigma_2.\) ::: {.center} Old Color New Color -------------- ------------- \(-y_1\) \(x_1\) \(-y_2\) \(x_2\) \(\vdots\) \(\vdots\) \(-y_{M_2-1}\) \(x_{M_2-1}\) \(-y_{M_2}\) \(x_{M_2}\) ::: 5. Use Type 4 replacements to recolor \(\frac{M_1-M_2 + 1}{2}\) more pairs of colors in \(\Sigma_2\) using \(x_{M_2+1}, \ldots, x_{M_1}\) and \(a.\) 6. Replace the remaining pairs of colors in \(\Sigma_2\) using Type 3 replacements and colors \(\pm (k_1 +1), \ldots, \pm(k_1 + k_2-M_2-\frac{M_1-M_2 +1}{2}).\) **Case 2.1b:** Suppose \(\Sigma_2\) is not exceptional. Then there exists a coloration using \(\chi_2-M_2\) colors and such that no edge has both endpoints colored \(a,\) for some \(a\) in the set of used colors. Call this coloration \(\kappa_2.\) By Lemma [\[even chromatic\]](#even chromatic){reference-type="ref" reference="even chromatic"} we know that \(-a\) cannot be in the deficiency set of \(\kappa.\) Then color \(\Sigma_1 \vee_+ \Sigma_2\) in the following way: 1. Properly color \(\Sigma_1\) with \(\pm 1, \ldots, \pm k_1\) using \(\chi_1-M_1\) colors. Let the \(M_1\) unused colors be \(x_1, \ldots, x_{M_1}.\) 2. Color \(\Sigma_2\) with \(\kappa_2\) and colors \(\pm 1, \ldots, \pm k_2\) Let the \(M_2\) unused colors be \(y_1, \ldots, y_{M_2}.\) 3. In \(\Sigma_2\) perform a Type 2 replacement to replace \(a\) with 0. 4. Make the following Type 1 replacements on \(\Sigma_2.\) ::: {.center} Old Color New Color -------------- ------------- \(-y_1\) \(x_1\) \(-y_2\) \(x_2\) \(\vdots\) \(\vdots\) \(-y_{M_2-1}\) \(x_{M_2-1}\) \(-y_{M_2}\) \(x_{M_2}\) \(-a\) \(x_{M_1}\) ::: 5. Replace \(\frac{M_1-M_2-1}{2}\) more pairs of colors in \(\Sigma_2\) using Type 4 replacements and colors \(x_{M_2+1}, \ldots, x_{M_1-1}.\) 6. Use Type 3 replacements to replace the remaining pairs of colors in \(\Sigma_2\) using \(\pm (k_1 +1), \ldots, \pm(k_1 + k_2-M_2-\frac{M_1-M_2-1}{2}-1).\) **Case 2.2:** Suppose \(\chi_1 = 2k_1 + 1\) and \(\chi_2 = 2k_2\) for some positive integers \(k_1\) and \(k_2\). Then color \(\Sigma_1 \vee_+ \Sigma_2\) in the following way: 1. Properly color \(\Sigma_1\) with \(\pm1, \ldots, \pm k_1,\) and 0 using \(\chi_1-M_1\) colors. Let the \(M_1\) unused colors be \(x_1, \ldots, x_{M_1}.\) Note that 0 must be used. 2. Properly color \(\Sigma_2\) with \(\pm 1, \ldots, \pm k_2\) using \(\chi_2-M_2\) colors. Let the \(M_2\) unused colors be \(y_1, \ldots, y_{M_2}.\) 3. Make the following Type 1 replacements on \(\Sigma_2.\) ::: {.center} Old Color New Color ------------ ----------- \(-y_1\) \(x_1\) \(-y_2\) \(x_2\) \(\vdots\) \(\vdots\) \(-y_{M_2}\) \(x_{M_2}\) ::: 4. Use Type 4 replacements to recolor \(\frac{M_1-M_2-1}{2}\) more pairs of colors in \(\Sigma_2\) using \(x_{M_2 + 1}, \ldots, x_{M_1-1}\). 5. Of the remaining pairs of colors in \(\Sigma_2\), let \(c,-c\) be one. Use a Type 4 replacement to replace \(c\) with \(x_{M_1}\) and \(-c\) with \(k_1 + 1.\) 6. In \(\Sigma_1\) use a Type 1 replacement to replace 0 with \(-(k_1 +1).\) 7. Replace the remaining pairs of colors in \(\Sigma_2\) using Type 3 replacements and colors \(\pm (k_1 + 2), \ldots, \pm(k_1 + k_2-M_2-\frac{M_1-M_2-1}{2}).\) **Case 2.3:** Suppose \(\chi_2 = 2k_2 + 1\) for some positive integer \(k_2.\) Then color \(\Sigma_1 \vee_+ \Sigma_2\) in the following way: 1. Properly color \(\Sigma_1\) with \(\pm1, \ldots, \pm k_1,\) and possibly 0 using \(\chi_1-M_1\) colors. Let the \(M_1\) unused colors be \(x_1, \ldots, x_{M_1}.\) If \(\chi_1\) is odd, 0 must be used. 2. Properly color \(\Sigma_2\) with \(\pm 1, \ldots, \pm k_2,\) and 0 using \(\chi_2-M_2\) colors. Let the \(M_2\) unused colors be \(y_1, \ldots, y_{M_2}.\) Note that \(0\) must be used. 3. Make the following Type 1 replacements on \(\Sigma_2.\) ::: {.center} Old Color New Color ------------ ----------- \(0\) \(x_{M_1}\) \(-y_1\) \(x_1\) \(-y_2\) \(x_2\) \(\vdots\) \(\vdots\) \(-y_{M_2}\) \(x_{M_2}\) ::: 4. Replace \(\frac{M_1-M_2-1}{2}\) more pairs of colors in \(\Sigma_2\) using Type 4 replacements and colors \(x_{M_2 + 1}, \ldots, x_{M_1-1}\). 5. Use Type 3 replacements to recolor the remaining pairs of colors in \(\Sigma_2\) using \(\pm (k_1 + 1), \ldots, \pm(k_1 + k_2-M_2-\frac{M_1-M_2-1}{2}).\) This concludes the non-exceptional cases where \(M_2 > 0\). ◻ ::: Lemmas [\[exception 1\]](#exception 1){reference-type="ref" reference="exception 1"}, [\[exception 2\]](#exception 2){reference-type="ref" reference="exception 2"}, [\[main lemma 0\]](#main lemma 0){reference-type="ref" reference="main lemma 0"}, and [\[main lemma non-0\]](#main lemma non-0){reference-type="ref" reference="main lemma non-0"} together prove Theorem [\[main thm\]](#main thm){reference-type="ref" reference="main thm"}.
{'timestamp': '2020-06-01T02:04:24', 'yymm': '2005', 'arxiv_id': '2005.14337', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14337'}
# Introduction
{'timestamp': '2020-06-01T02:10:32', 'yymm': '2005', 'arxiv_id': '2005.14504', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14504'}
# Introduction In the companion letter, the problem of the definition of a covariant bracket on the space of functions on the solutions of a suitable variational principle has been addressed from the point of view of the geometry of contact manifolds. Specifically, in the case of non-relativistic Hamiltonian mechanics, and of the relativistic particle, it was proved how the covariant bracket may be read in terms of a Poisson subalgebra of the algebra of smooth functions on a contact manifold endowed with its natural Jacobi bracket. In this letter, we push further this analysis by considering the case of Klein-Gordon theory, and the case of the multisymplectic formulation of Schrödinger equation. The main difference with the cases considered in the companion letter is given by the fact that these systems describe partial differential equations. Consequently, we will see that it is possible to describe them in terms of two different but equivalent action principles taking place on two different spaces of sections. On the one hand, it is possible to formulate an action principle for sections of a suitable finite-dimensional fiber bundle on the spacetime manifold in the spirit of the multisymplectic formalism. In this case, it is not possible to express the covariant bracket in terms of a Poisson subalgebra of a suitable contact manifold (see, for instance, for historical attempts in writing a covariant bracket for Field Theory within the canonical formalism and, and references therein, for a more modern geometric approach). However, this point of view may be considered as the starting point for the generalization of the notion of contact manifold and contact structure to framework which is more suitable for field theories along the lines presented in. In this sense, we expect that an approach in terms of multicontact geometry could help for a better understanding of the covariant formalism, in the same way as multisymplectic formalism has generalized symplectic geometry, and leave the discussion of these aspects to a future work. On the other hand, it is possible to formulate an action principle for sections of a suitable fiber bundle over the time manifold \(\mathbb{R}\), in analogy with the particle case. In this context, the infinite-dimensional nature of the fiber bundle will make possible to read the Poisson bracket on the space of functionals on the solutions of the action principle in terms of a Poisson subalgebra of the algebra of smooth functions endowed with a Jacobi bracket. # Multisymplectic formulation of free Klein-Gordon theory {#sec: KG} We consider the covariant Hamiltonian description of Klein-Gordon theory on the Minkowski spacetime \(\mathcal{M} = (\mathbb{R}^4,\eta)\), where \(\eta\) is the metric tensor \[\eta = \eta_{\mu \nu} {\rm d} x^{\mu} \otimes {\rm d} x^{\nu} =-{\rm d} x^0 \otimes {\rm d} x^0 + \delta_{jk}{\rm d} x^j \otimes {\rm d} x^k,\] and \((x^{\mu})\) is a global set of Cartesian coordinates. Let \(\pi_0\colon E=\mathbb{R}\times\mathcal{M}\,\rightarrow \,\mathcal{M}\) be a bundle with \(\pi_{0}\) the standard projection on the second factor. This bundle represents the analogue of the extended configuration space \(\mathcal{Q}\times \mathbb{R}\) of non-relativistic Hamiltonian mechanics considered in the companion letter. Klein-Gordon fields are sections \(\phi\) of the bundle \(\pi_0\colon E=\mathbb{R}\times\mathcal{M}\,\rightarrow \,\mathcal{M}\). The extended phase space \(\mathbf{T}^{*}\mathcal{Q}\times \mathbb{R}\) of non-relativistic particle mechanics is here replaced by the so called covariant phase space \(\mathcal{P}\) which is a fibre bundle over both \(E\) and the spacetime \(\mathcal{M}\). Technically speaking, \(\mathcal{P}\) is the (affine) dual bundle of the first jet bundle \(J^1(E)\) that can be identified with the space of 1-semibasic \(4\)-forms on \(E\). In the Klein-Gordon case on Minkowski spacetime we are considering, \(\mathcal{P}\) is diffeomorphic to \(E\times\mathbb{R}^{4}\). If \((x^{\mu})\), \((u,x^{\mu})\), and \(\left( \rho^{\mu},u,x^{\mu} \right)\) are, respectively, Cartesian coordinates on \(\mathcal{M}\), bundle coordinates on \(E\), and bundle coordinates on \(\mathcal{P}\), the projection \(\pi_{E}\colon \mathcal{P}\,\rightarrow \, E\) is locally given by \[\pi_{E}(\rho^{\mu},u,x^{\mu}) = (u,x^{\mu}) \,,\] while the projection \(\pi\colon \mathcal{P}\,\rightarrow \, \mathcal{M}\) is given by \[\pi(\rho^{\mu},u,x^{\mu}) = (x^{\mu})\.\] Let \(\mathscr{F}_{\mathcal{P}}\) denote the space of sections \(\chi\colon \mathcal{M}\,\rightarrow\,\mathcal{P}\) of the form: \[\chi(x^{\mu}) = (x^{\mu}, \phi(x^{\mu}), P^{\nu}(x^{\mu}))\,, \quad \mu,\nu = 0,1,2,3\.\] Elements in \(\mathscr{F}_{\mathcal{P}}\) will be the fields of the Hamiltonian theory where \(P^\nu\) are identified with the momenta fields of the theory. A rigorous analytical framework can be provided by introducing some regularity conditions on the various spaces of fields, for instance, we may consider the fields \(\phi\) in the Sobolev space \(\mathcal{V}= \mathcal{H}^1(\mathcal{M},\mathrm{vol}_{\mathcal{M}})\) of square integrable functions on \(\mathcal{M}\) with respect to the Lebesgue measure on \(\mathcal{M}\), and the momenta fields \(P = (P^{\mu})\) in the Hilbert space \(\mathcal{W} = L^2(\phi^*\mathcal{P})\) of square integrable sections of the pullback of the bundle \(\mathcal{P} \to E\) along \(\phi\). With these choices, the space \(\mathscr{F}_{\mathcal{P}}\) becomes the Hilbert space \(\mathscr{F}_{\mathcal{P}}\,=\,\mathcal{V}\,\oplus\,\mathcal{W}\). A variation for \(\chi\in\mathscr{F}_{\mathcal{P}}\), commonly denoted as \(\delta \chi\), is a tangent vector at \(\chi\), which may be identified with a vector field \(U_{\chi}\) along \(\chi\) on \(\mathcal{P}\), which is vertical with respect to the fibration \(\pi\colon\mathcal{P}\rightarrow\mathcal{M}\). The tangent space \(\mathbf{T}_{\chi}\mathscr{F}_{\mathcal{P}}\) is given by all variations \(\delta\chi_U = U_{\chi}\). In the following, it will be useful to extend \(U_{\chi}\) to a vertical vector field \(\widetilde{U}\) on a neighbourhood of the image of \(\chi\) within \(\mathcal{P}\), as: \[\tilde{U} = U_{\phi} \frac{\partial }{\partial u} + U_{P}^{\mu}\frac{\partial }{\partial \rho^{\mu}}\.\] Now, we pass to describe the dynamics in terms of the (Schwinger-Weiss) action principle. Given a Hamiltonian function \(H\colon \mathcal{P}\,\rightarrow\,\mathbb{R}\) and volume form \(\mathrm{vol}_\mathcal{M} = {\rm d} x^0\wedge {\rm d} x^1 \wedge {\rm d} x^2 \wedge {\rm d} x^3\) on the base manifold \(\mathcal{M}\), we consider the 4-form[^1] \(\theta_H\) on \(\mathcal{P}\) given by \[\theta_H = \rho^{\mu}{\rm d} u \wedge i_{\frac{\partial}{\partial x^{\mu}}}\mathrm{vol}_\mathcal{M}-H \mathrm{vol}_\mathcal{M}\.\] In the particular instance of free dynamics, the Hamiltonian function is \[\label{eqn: relativistic Hamiltonian} H = \frac{1}{2} \left( \eta_{\mu \nu} \rho^{\mu}\rho^{\nu}-\mathfrak{m}^2 u^2 \right)\.\] The action functional \(S\colon\mathscr{F}_{\mathcal{P}}\, \rightarrow\, \mathbb{R}\), of the theory can be written as: \[S[\chi] = \int_{\mathcal{M}}\chi^*\left( \theta_H \right) = \int_{\mathcal{M}}\left( P^{\mu}\partial_\mu \phi-H \right) \mathrm{vol}_\mathcal{M}\. \label{action_klein-gordon}\] Given \(U_{\chi}\in\mathbf{T}_{\chi}\mathscr{F}_{\mathcal{P}}\), the variation \(\mathrm{d}S[\chi](U_{\chi})\) of \(S\) is \[\begin{split} \mathrm{d}S[\chi](U_{\chi})&= \int_{\mathcal{M} }\chi^*\left( \mathrm{L}_{\tilde{U}}\theta_H \right) = \int_{\mathcal{M} }\chi^*\left( i_{\tilde{U}}{\rm d} \theta_H \right) + \int_{\partial \mathcal{M} } \chi_{\partial\mathcal{M}}^*\left( i_{\tilde{U}}\theta_H \right), \end{split}\] where \(\tilde{U}\) is any extension of \(U_{\chi}\), and, if \(\partial\mathcal{M}=\emptyset\), we get: \[\mathrm{d}S[\chi](U_{\chi}) = \,\int_{\mathcal{M} }\chi^*\left( i_{\tilde{U}}{\rm d} \theta_H \right) = \int_{\mathcal{M} } \left(\frac{\partial \phi}{\partial x^\mu}-\frac{\partial H}{\partial P^\mu} \right) U_P^\mu + \left(\frac{\partial P^\mu}{\partial x^\mu} + \frac{\partial H}{\partial \phi} \right) U_\phi^\mu \, \mathrm{vol}_\mathcal{M}\,.\] The Schwinger-Weiss action principle states that the variations of the action depend solely on the variations of the fields at the boundary, hence the actual dynamical configurations of the fields of the theory must satisfy the Euler-Lagrange equations: \[\frac{\partial \phi}{\partial x^\mu} = \frac{\partial H}{\partial P^\mu} \,, \qquad \frac{\partial P^\mu}{\partial x^\mu} =-\frac{\partial H}{\partial \phi} \,,\] which can be geometrically interpreted as the zeroes of a 1-form \(\mathbb{EL}\) on the space of fields \(\mathscr{F}_{\mathcal{P}}\) given by: \[\label{eqn: Schwinger-Weiss action principle 1} \mathbb{EL}_{\chi}(U_{\chi}) := \int_{\mathcal{M} }\chi^*\left( i_{\tilde{U}}{\rm d} \theta_H \right) = 0 \,,\quad \forall U_{\chi}\in\mathbf{T}_{\chi}\mathscr{F}_{\mathcal{P}}\,.\] We note that such a geometrical reformulation of the Schwinger-Weiss variational principle should be used to introduce a Quantum Action Principle in the groupoid reformulation of Schwinger's algebra of selective measurements which has been recently proposed by some of the authors (see for more details). We will denote by \(\mathcal{EL}_{\mathcal{M}}\subset \mathscr{F}_{\mathcal{P}}\) the space of solutions of Euler-Lagrange equations, that is: \[\mathcal{EL}_{\mathcal{M}}\,:=\,\left\{\chi\in \mathscr{F}_{\mathcal{P}}\,\colon\,\mathbb{EL}_{\chi}(U_\chi) = 0\,,\quad \forall U_{\chi} \in \mathbf{T}_{\chi}\mathscr{F}_{\mathcal{P}}\right\}.\] Hence, we obtain the Euler-Lagrange equations (also known as the de Donder-Weyl equations) for the Klein-Gordon theory: \[\frac{\partial \phi}{\partial x^{\mu}} = \eta_{\mu \nu} P^{\nu}\,,\qquad\, \frac{\partial P^{\mu}}{\partial x^{\mu}} = \mathfrak{m}^2 \phi\.\] Analogously to what happens in non-relativistic Hamiltonian mechanics , if we select a codimension-one, spacelike submanifold \(\Sigma \subset \mathcal{M}\), for instance \[\Sigma=\{m\in\mathcal{M}\,|\,x^{0}(m)= \tau^0 \},\] and denote by \(i_{\Sigma}:\Sigma\rightarrow\mathcal{M}\) the canonical immersion of \(\Sigma\) in \(\mathcal{M}\), the space \(\mathcal{EL}_{\mathcal{M}}\) is equipped with a 2-form \(\Omega_{\chi}\) given by: \[\label{eqn: omega on solutions of de Donder Weyl for KG} \Omega_{\chi} (U_{\chi},V_{\chi}) = \int_{\Sigma}i_{\Sigma}^*\left( \chi^*\left( i_{\tilde{V}}i_{\tilde{U}} {\rm d} \theta_H \right) \right) = \int_{\Sigma} i_{\Sigma}^*\left( \delta P^{0}_U\, \delta\phi_V-\delta\phi_U \, \delta P^{0}_V \right) \mathrm{vol}_\Sigma \, \nonumber\] with \(U_\chi = \delta \phi_U \partial /\partial u + \delta P^\mu_U \partial /\partial \rho^\mu\) and \(V_\chi\) similarly. Following the procedure outlined in, provided that \(\chi \in \mathcal{EL}_{\mathcal{M}}\), it is possible to prove that \(\Omega_{\chi}\) is independent of the choice of \(\Sigma\), and it defines a canonical symplectic structure on the space of solutions of Klein-Gordon equation. Now, we will provide an evolution description of Klein-Gordon theory in terms of a vector field on an infinite-dimensional manifold. The main idea is to provide a framework in which the role of a contact structure is manifestly evident, and which allows us to write the Poisson bracket associated with \(\Omega\) in terms of the Jacobi bracket defined by such structure as done in the companion letter for the case of non-relativistic Hamiltonian mechanics and the relativistic particle. To define the infinite-dimensional manifold which will be the carrier space of the dynamics, we fix a space-like, codimension-one submanifold \(\Sigma\subset\mathcal{M}\) as before. Then, we consider the pullback bundle \(i_{\Sigma}^{*}\mathcal{P}\) whose sections \(\sigma\) are just compositions of sections \(\chi\) of \(\mathcal{P}\) with \(i_{\Sigma}\), \(\sigma = \chi \circ i_\Sigma\) and, in local coordinates, we have: \[\sigma(x^{j})=\left(x^{j},\tau^0, \varphi(x^{j}), \, p(x^{j}) ,\, \beta^k(x^{j}) \, \right),\] where \[\varphi(x^{j}) =(\phi(x^{j},\tau^{0})) |_{\Sigma}\,, \quad p(x^{j}) =(P^{0}(x^{j},\tau^{0})) |_{\Sigma} \,, \quad \beta^k(x^{j}) =(P^k(x^{j},\tau^{0})) |_{\Sigma}\.\] As before, we will focus on those sections of \(i_{\Sigma}^{*}\mathcal{P}\) satisfying some additional regularity conditions. Specifically, we will consider \(\varphi\in\mathscr{V}_\Sigma\), the space of sections of Sobolev class 1 of the bundle \(i_\Sigma^*E\), \(p\in\mathscr{W}_\Sigma =\mathcal{L}^2(\Sigma, \mathrm{vol}_{\Sigma})\), and \(\beta = (\beta^{j}) \in\mathscr{B}_\Sigma\), the space of square integrable sections of the tangent bundle \(\mathbf{T}\Sigma\), so that we have the Hilbert space \(\mathcal{F}_{\Sigma}\) of fields at \(\Sigma\) given by \(\mathcal{F}_{\Sigma}\,:=\,\mathscr{V}_\Sigma \,\oplus\,\mathscr{W}_\Sigma\,\oplus\,\mathscr{B}_\Sigma\). Then, we consider the Hilbert bundle \(\tau\colon\mathcal{F}_{\Sigma}\times\mathbb{R}\rightarrow\mathbb{R}\), where \(\tau\) is the projection on the second factor, which plays the role of the extended phase space in, and we denote by \(\Gamma(\mathcal{F}_\Sigma)\) the space of sections of this bundle. The key observation is that, under suitable regularity conditions, the sections in \(\Gamma(\mathcal{F}_\Sigma)\), i.e., curves \(\sigma \colon \mathbb{R} \to \mathcal{F}_{\Sigma}\), are in one-to-one correspondence with fields in \(\mathscr{F}_{\mathcal{P}}\). Indeed, given \(\chi\in\mathscr{F}_{\mathcal{P}}\), we can define the section \(\sigma_{\chi}\in\Gamma\) setting \[\sigma_{\chi}(s)\,:=\,\left(s,x^{j}, \tau^{0},\varphi_{s}(x^{j}),p_{s}(x^{j}),\beta^{k}_{s}(x^{j})\right),\] where \(s=x^{0}\), and \[\varphi_{s}(x^{j}) =\phi(x^{j},s) \,, \qquad p_{s}(x^{j}) =P^{0}(x^{j},s) \,, \qquad \beta^{k}_{s}(x^{j}) = P^k(x^{j},s) \.\] On the other hand, given \(\sigma \in\Gamma(\mathcal{F}_\Sigma)\), we can define \(\chi_{\sigma}\in\mathscr{F}_{\mathcal{P}}\) by reading the previous equations in the other direction. The regularity conditions for \(\sigma\in\Gamma(\mathcal{F}_\Sigma)\) alluded to above are precisely those assuring that \(\phi(x^{j},s):=\varphi_{s}(x^{j})\) is in \(\mathcal{V}\), and that \((P^{0}(x^{j},s):=p_{s}(x^{j}),P^k(x^{j},s):=\beta^{k}_{s}(x^{j}))\) are in \(\mathcal{W}\). A variation \(U_{\gamma}\) at \(\gamma\in \Gamma (\mathcal{F}_\Sigma)\) is then a vector field along \(\gamma\) which is vertical with respect to the fibration \(\tau\colon\mathcal{F}_{\Sigma}\times\mathbb{R}\rightarrow\mathbb{R}\). The space of all \(U_{\gamma}\) is denoted by \(\mathbf{T}_{\gamma}\Gamma_{\gamma}\). If necessary, \(U_{\gamma}\) can be extended to a vertical vector field \(\tilde{U}\) in an open neighbourhood of the image of \(\gamma\) written as \[\tilde{U}\,=\,U_{\varphi}\frac{\delta}{\delta \varphi} + U_{p}\frac{\delta}{\delta p} + U_{\beta }^{j} \frac{\delta}{\delta \beta^{j}},\] where \(U_{\varphi}\in\mathscr{V}_\Sigma\), \(U_{p}\in\mathscr{W}_\Sigma\), \(U_{\beta}^{j}\in\mathscr{B}_\Sigma\). The symbols \(\frac{\delta}{\delta \varphi}\) have a double interpretation. On one side, they represent the canonical basis of tangent vectors on a linear space associated to the natural chart provided by the linear space itself. On the other, they represent the standard functional derivatives, i.e., they act on a function \(F\) as the functional derivative \(\frac{\delta F}{\delta \varphi (x)}\), and similarly for \(\frac{\delta}{\delta p (x)}\) and \(\frac{\delta}{\delta \beta^{j}(x)}\). In a similar way, the symbols \(\delta \varphi\) and \(\delta p\) can be understood as a basis of covectors on the manifold \(\mathcal{F}_\Sigma\), and \(\delta F = \frac{\delta F}{\delta \sigma} \delta \sigma\) is understood as the differential of the function \(F\) given by \[\langle \delta F, U_\sigma \rangle = \int_\Sigma \frac{\delta F}{\delta \sigma (x)} \, U_\sigma (x) \, \mathrm{vol}_\Sigma (x) \,,\] Now, we define the Hamiltonian function \[\mathcal{H}(\varphi,p,\beta;s) = \int_{\Sigma} \dfrac{1}{2}\left( p^2 + \delta^{jk} \frac{\partial \varphi}{\partial x^{j}}\frac{\partial \varphi}{\partial x^k}-\mathfrak{m}^2 \varphi^2 \right)\mathrm{vol}_{\Sigma}\,=:\,\int_{\Sigma}\,H\,\mathrm{vol}_{\Sigma}\,,\] and we consider the one-form \(\mathcal{F}_{\Sigma}\times\mathbb{R}\) given by \[\label{eqn: infinite theta} \Theta_{\mathcal{H}}\,=\,\int_{\Sigma}\,\left(p\,\delta\varphi\right)\,\mathrm{vol}_{\Sigma}-\mathcal{H}{\rm d} t\.\] This form plays a role analogous to that of the contact one-form on the extended phase space \(\mathbf{T}^{*}\mathcal{Q}\times\mathbb{R}\) in the case of non-relativistic Hamiltonian dynamics, and to that of the contact one-form on the mass-shell for the relativistic particle considered in the companion letter. Then, we write the action functional \(S\) on \(\Gamma(\mathcal{F}_{\Sigma})\) given by \[S[\gamma]\,=\,\int_{\mathbb{R}}\,\gamma^{*}\Theta_{\mathcal{H}},\] and we compute its variation along \(U_{\gamma}\) as \[\mathrm{d}S_{\gamma}(U_{\gamma})\,=\,\int_{\mathbb{R}}\,\gamma^{*}\left(i_{\tilde{U}}{\rm d}\Theta_{\mathcal{H}} + {\rm d}(i_{\tilde{U}}\Theta_{\mathcal{H}})\right)\.\] Exploiting Stokes' theorem and the fact that \(\partial\mathbb{R}=\emptyset\), we obtain \[\mathrm{d}S_{\gamma}(U_{\gamma})\,=\,\int_{\mathbb{R}}\,\gamma^{*}\left(i_{\tilde{U}}{\rm d}\Theta_{\mathcal{H}} \right).\] Following the Schwinger-Weiss action principle, the dynamical trajectories are given by all those \(\gamma\) such that \[\mathbb{EL}_{\gamma}(U_{\gamma})\,:=\,\int_{\mathbb{R}}\,\gamma^{*}\left(i_{\tilde{U}}{\rm d}\Theta_{\mathcal{H}} \right)\,=\,0 \quad\forall\,U_{\gamma}\,\,\mathbf{T}_{\gamma}\Gamma_{\gamma}\.\] A direct computation shows that all such \(\gamma\) must satisfy the constraint relations \[\delta_{jk}\beta^k = \frac{\partial \varphi}{\partial x^j}, \label{constraints klein-gordon}\] and the "evolution equations" \[\frac{{\rm d} \varphi}{{\rm d} s} \,= p\, ,\quad\,\frac{{\rm d} p}{{\rm d} s} =-\Delta_{\Sigma} \varphi-\mathfrak{m}^2 \varphi. \label{Cauchy-form klein gordon equation}\] The constraint conditions in Eq. [\[constraints klein-gordon\]](#constraints klein-gordon){reference-type="eqref" reference="constraints klein-gordon"} being linear determine a submanifold \(\mathcal{C}\subset \mathcal{F}_{\Sigma}\) which is a linear subspace. We define the trivial bundle \(\tau_{\mathcal{C}}\colon\mathcal{C}\times\mathbb{R}\rightarrow\mathbb{R}\), where \(\tau_{\mathcal{C}}\) is the projection on the second factor, and we denote by \(\Gamma_{\mathcal{C}}\) the space of sections of this bundle. Moreover, we write, with an evident abuse of notation, \(\Theta_{\mathcal{H}}\) for the pullback to \(\mathcal{C}\times\mathbb{R}\) of the one-form in equation [\[eqn: infinite theta\]](#eqn: infinite theta){reference-type="eqref" reference="eqn: infinite theta"}. Then, it is clear that Eq.[\[Cauchy-form klein gordon equation\]](#Cauchy-form klein gordon equation){reference-type="eqref" reference="Cauchy-form klein gordon equation"} may be read as defining the integral curves of the (densely defined) vector field \[X_{H} = \frac{\partial}{\partial t} + \frac{\delta H}{\delta p}\,\frac{\delta}{\delta \varphi}-\frac{\delta H}{\delta \varphi}\,\frac{\delta}{\delta p}\,\] which is in the kernel of the two-form \[{\rm d} \Theta_{\mathcal{H}}\, =\, \int_{\Sigma}\left( \delta p \wedge \delta\varphi\right)\mathrm{vol}_{\Sigma}-{\rm d}\mathcal{H} \wedge {\rm d} t \.\] This two-form plays the role of the contact two-form on \(\mathbf{T}^{*}\mathcal{Q}\times\mathbb{R}\) in the case of non-relativistic Hamiltonian mechanics, and of the contact two-form on the mass-shell in the case of the relativistic particle considered in. Eventually, we obtained the de Donder-Weyl equations of the free Klein-Gordon theory as a Hamiltonian system on an infinite-dimensional manifold, in such a way that a section \(\gamma\) satisfying Eq.[\[Cauchy-form klein gordon equation\]](#Cauchy-form klein gordon equation){reference-type="eqref" reference="Cauchy-form klein gordon equation"} provides a representation in terms of Cauchy data on \(\Sigma\) of the points in \(\mathcal{EL}_{\mathcal{M}}\). We denote by \(\mathcal{EL}_{\mathcal{C}}\) the space of all \(\gamma\in\Gamma_{\mathcal{C}}\) satisfying Eq.[\[Cauchy-form klein gordon equation\]](#Cauchy-form klein gordon equation){reference-type="eqref" reference="Cauchy-form klein gordon equation"}. Just as it happens for non-relativistic Hamiltonian mechanics and for the relativistic particle, any vector field of the form \(f\,X_{H}\), with \(f\) a smooth, non-vanishing function on \(\mathcal{C}\times\mathbb{R}\) is again in the kernel of \({\rm d} \theta_{\mathcal{H}}\), and the support of its integral curves coincide with the support of the integral curves of \(X_{H}\). Accordingly, we may interpret the integral curves of \(f\,X_{H}\) as reparametrizations of the dynamical trajectories. In particular, the vector field \(\Gamma_H\) satisfying \(i_{\Gamma_H}\theta_\mathcal{H} = 1\) is called Reeb vector field. Under suitable regularity properties for \(X_H\), the family of its integral curves defines a regular foliation of the manifold \(\mathcal{C}\times \mathbb{R}\), and every point in the quotient manifold, say \(\mathrm{Q}\), associated with the foliation can be identified with one and only one element in \(\mathcal{EL}_{\mathcal{C}}\). Accordingly, we may look at the space of smooth functions on \(\mathrm{Q}\) as the subalgebra \(C^{\infty}_H(\mathcal{C}\times \mathbb{R})\subset C^{\infty} (\mathcal{C}\times \mathbb{R})\) of smooth functions such that \(\mathrm{L}_{X_H}f=0\). Then, we may look for a bivector \(\Lambda\) on \(\mathcal{C}\times \mathbb{R}\) satisfying the relations \[\left[\Lambda,\Lambda\right]_{S}\,=\,2\,\Gamma_H\,\wedge\,\Lambda\,,\quad\,\mathrm{L}_{\Gamma_H}\Lambda\,=\,0,\] where \([,]_{S}\) denotes the Schouten-Nijenhuis bracket, in order to define a Jacobi bracket \([,]_{J}\) on \(C^{\infty} (\mathcal{C}\times \mathbb{R})\) by means of \[_{J}\,:=\,\Lambda(\mathrm{d}f,\mathrm{d}g) + f\,\mathrm{L}_{\Gamma_H}g-g\,\mathrm{L}_{\Gamma_H}f\.\] Recalling that \(\Gamma_{H}\) annihilates the elements in \(C^{\infty}_H(\mathcal{C}\times \mathbb{R})\), it is immediate to check that \(C^{\infty}_H(\mathcal{C}\times \mathbb{R})\) becomes a Poisson subalgebra of \(C^{\infty}(\mathcal{C}\times \mathbb{R})\) with respect to the Jacobi bracket defined above. Upon identifying \(\mathcal{EL}_{\mathcal{M}}\) with \(\mathcal{EL}_{\mathcal{C}}\), and then \(\mathcal{EL}_{\mathcal{C}}\) with \(\mathrm{Q}\), the Poisson bracket on \(C^{\infty}_H(\mathcal{C}\times \mathbb{R})\) is precisely the Poisson bracket associated with the two-form \(\Omega\) in Eq.[\[eqn: omega on solutions of de Donder Weyl for KG\]](#eqn: omega on solutions of de Donder Weyl for KG){reference-type="eqref" reference="eqn: omega on solutions of de Donder Weyl for KG"}. To explicitely write the Jacobi and Poisson bracket, we must be able to find an analogue of the generalized Darboux coordinates used in the particle case in the companion letter. At this purpose, we first move from \(\mathcal{C}\) to \(\mathcal{C}'\) introducing the Fourier transforms \[\varphi(x)\,=\,\int_{\overline{\Sigma}}\,\hat{\varphi}(k)\,\mathrm{e}^{i k\cdot x}\,\,\mathrm{vol}_{\overline{\Sigma}},\quad\,p(x)\,=\,\int\,\hat{p}(k)\,\mathrm{e}^{i k\cdot x}\,\mathrm{vol}_{\overline{\Sigma}}.\] Note that the fact that \(\varphi\) and \(p\) are real-valued imposes the constraints \(\overline{\hat{\varphi}}(k)=\hat{\varphi}(-k)\) and \(\overline{\hat{p}}(k)=\hat{p}(-k)\). The equations of motion become \[\frac{{\rm d} \hat{\varphi}}{{\rm d} s}\,=\,-\hat{p},\quad\,\frac{{\rm d}\hat{p}}{{\rm d} s}\,=\, \omega_{k}\,\hat{\varphi}\,,\] with \(\omega_{k}=(k^{2}+\mathfrak{m}^{2})\), and we may read them as a superposition in \(k\) of harmonic oscillators. Now, we consider the "change of coordinates" in \(\mathcal{C}'\times\mathbb{R}\) given by \[\begin{split} W\,=\,\frac{1}{2}\int_{\overline{\Sigma}}\,\biggl( \left(\hat{p}\,\overline{\hat{p}}-\omega_{k}^{2}\,\hat{\varphi}\,\overline{\hat{\varphi}}\right) & \frac{\cos(\omega_{k}s)\,\sin(\omega_{k}s)}{\omega_{k}} + 2\left(\hat{p}\overline{\hat{\varphi}} + \overline{\hat{p}}\,\hat{\varphi}\right)\sin^{2}(\omega_{k}s) \biggr) \,\mathrm{vol}_{\overline{\Sigma}} \\ \hat{\Phi}&\,=\,\hat{\varphi}\,\cos(\omega_{k}s)-\frac{\hat{p}}{\omega_{k}}\,\sin(\omega_{k}s) \\ \hat{P}&\,=\,\hat{p}\cos(\omega_{k}s) + \omega_{k}\hat{\varphi}\,\sin(\omega_{k}s)\,, \end{split}\] where, again, it is \(\overline{\hat{\Phi}}(k)=\hat{\Phi}(-k)\) and \(\overline{\hat{P}}(k)=\hat{P}(-k)\). In this coordinate system, it is possible to see that the one-form \(\Theta_{\mathcal{H}}\) in equation [\[eqn: infinite theta\]](#eqn: infinite theta){reference-type="eqref" reference="eqn: infinite theta"} becomes \[\Theta_{\mathcal{H}}\,=\,\int_{\overline{\Sigma}} \,\frac{1}{2}\,\left(\overline{\hat{P}}\,\delta\hat{\Phi} + \hat{P}\,\delta\overline{\hat{\Phi}}\right) \,\mathrm{vol}_{\overline{\Sigma}} + {\rm d} W\.\] The vector field \(\Gamma_{H}\) becomes \(\Gamma_{H}\,=\,\frac{\partial}{\partial W}\), and, in analogy with what we did in the particle case in the companion letter, the bivector field \(\Lambda\) in the definition of the Jacobi bracket reads \[\Lambda\,=\,\int_{\overline{\Sigma}}\,\left(\frac{\delta}{\delta \hat{\Phi} }-\hat{P} \,\frac{\partial}{\partial W}\right)\,\wedge\,\frac{\delta}{\delta \overline{\hat{P}} }\,\mathrm{vol}_{\overline{\Sigma}} \.\] Clearly, elements in \(C^{\infty}_H(\mathcal{C}'\times \mathbb{R})\) are just those functionals which do not depend on \(W\), and thus the Jacobi bracket among them becomes the Poisson bracket given by \[\Lambda({\rm d} F,{\rm d} G)\,=\,\int_{\overline{\Sigma}}\, \frac{\delta F}{\delta \hat{\Phi} } \,\wedge\,\frac{\delta G}{\delta \overline{\hat{P}} }\,\mathrm{vol}_{\overline{\Sigma}} \.\] # Multisymplectic formulation of free Schrödinger equation In this section, we will consider the Schrödinger equation for a free particle[^2] in \(\mathbb{R}^{3}\). The analysis of the Schrödinger equation with a potential may be given following the lines presented here, bearing in mind, however, that the presence of the potential may affect the choice of the appropriate Sobolev and Hilbert spaces for the fields considered. For the Schrödinger equation, our spacetime manifold will be \(\mathcal{M}\cong\mathbb{R}^{4}\). In this case, we are in a non-relativistic context, where the notion of *absolute simultaneity* is available, and thus the spacetime may be splitted in the product of space and time. The notion of absolute simultaneity is encoded in the existence of an exact one-form \(\vartheta\) on \(\mathcal{M}\) the kernel of which determines an integrable foliation whose leaves are diffeomorphic with \(\mathbb{R}^{3}\). The foliation associated with \(\vartheta\) defines absolute simultaneity, and the leaves define the simultaneity surfaces. Since \(\vartheta\) is exact, there will be a global time function \(t\colon\mathcal{M}\rightarrow\mathbb{R}\) such that \(\vartheta\,=\,{\rm d} t\), and the simultaneity surfaces are identified with the level sets of the time function. In the following, we will always choose Cartesian coordinates \((x^{1},x^{2},x^{3},t)\) reflecting the fact that the \(t\)-coordinate has a clear and definite physical interpretation being the global time function defining absolute simultaneity. A simultaneity surface will be denoted by \(\Sigma_{\bar{t}}\), where \(\bar{t}\) is the value of the time function characterizing the simultaneity surface. Differently from Klein-Gordon theory, the wave function \(\psi\) of Schrödinger equation is a complex-valued function on \(\mathcal{M}\), which in addition does not transform as a function but as a section of a \(U(1)\)-bundle. However, we will describe \(\psi\) in a real-valued context by considering a pair of fields \((\phi^R, \phi^I)\) associated with any wave function, where \(\phi^{R}\) denote the real part of the wave function, and \(\phi^{I}\) the imaginary part. Any field will have its own momenta, say \((P^{0}_R, P^{j}_R)\) and \((P^{0}_I, P^{j}_I)\), and the covariant phase space is \(\pi\colon\mathcal{P}=\mathbb{R}^{10}\times \mathcal{M}\rightarrow \mathcal{M}\), where \(\pi\) is the projection on the second factor, which is a vector bundle over \(\mathcal{M}\) as in the case of Klein-Gordon theory. Coordinate functions on \(\mathcal{P}\) are \((u^a,\rho^{j}_a;\rho^{0}_{a}, x^{j},t)\), with \(a=R,I\) and \(j= 1,2,3\). A reference frame on \(\mathcal{M}\) is defined by the choice of a nowhere-vanishing vector field \(\Gamma\) on \(\mathcal{M}\) such tha \(\vartheta(\Gamma)=1\). As we are dealing with Schrödinger equation, it seems natural to limit ourselves to inertial Galilean frames. These are those reference frames characterized by \(\Gamma=\frac{\partial}{\partial t} + v^{j}\frac{\partial}{\partial x^{j}}\). Given \(\Gamma\), we can complete it to a frame of vector fields on \(\mathcal{M}\) by introducing the vector fields \(\frac{\partial}{\partial x^{j}}\) with \(j=1,2,3\). These "auxiliary" vector fields are taken to be in the kernel of \(\vartheta={\rm d} t\) so that they are tangent to the simultaneity surfaces determined by \(\vartheta={\rm d} t\). Then, we determine the associated dual frame given by \(\{\vartheta={\rm d} t,\,{\rm d} x^{j}-v^{j}{\rm d} t\}\) with \(j=1,2,3\) and we build the frame-dependent covariant tensor \(G_{\Gamma}\) given by \[G_{\Gamma}\,=\,\delta_{jk}\,\left({\rm d} x^{j}-v^{j}{\rm d} t\right)\otimes \left({\rm d} x^{k}-v^{k}{\rm d} t \right).\] It is straightforward to notice that it determines an Euclidean metric tensor on every simultaneity leaf associated with \(\vartheta={\rm d} t\). Now, by means of \(G_{\Gamma}\) we can define the frame-dependent Hamiltonian function given by \[H_{\Gamma}\,=\,-\frac{\delta_{ab}}{2}\left(\delta_{jk}v^{j}v^{k}\rho^{0}_{a}\rho^{0}_{b}-\delta_{jk}v^{k}(\rho^{j}_{a}\rho^{0}_{b} + \rho^{j}_{b}\rho^{0}_{a}) + \delta_{jk}\rho^{j}_{a}\rho^{k}_{b}\right).\] We stress that, in the non-relativistic case, the Hamiltonian function used for the description of a free quantum particle depends on the choice of a reference frame on \(\mathcal{M}\). This is due to the fact that the covariant tensor \(G_{\Gamma}\) is only defined once we determine the frame of vector fields \(\{\Gamma,\frac{\partial}{\partial x^{j}}\}\), with \(j=1,2,3\), and its dual frame \(\{\vartheta, \,{\rm d} x^{j}-v^{j}{\rm d} t\}\) with \(j=1,2,3\). On the other hand, in the relativistic case, we already have the spacetime Lorentzian metric \(\eta\) and we do not need the choice of a reference frame to define the Hamiltonian function (see equation [\[eqn: relativistic Hamiltonian\]](#eqn: relativistic Hamiltonian){reference-type="eqref" reference="eqn: relativistic Hamiltonian"}). In the following, we are going to perform our analysis in the inertial reference frame identified by \(\vartheta={\rm d} t\) and \(\Gamma=\frac{\partial}{\partial t}\), so that \(G_{\Gamma}\,=\,\delta_{jk}{\rm d} x^{j}\otimes{\rm d} x^{k}\), and the Hamiltonian function reads \[H =-\delta_{ab}\delta_{jk} \frac{\rho^{j}_{a}\rho^{k}_{b} }{2},\] where we have set \(H_{\Gamma}\equiv H\). However, everything that will be said below could be adapted to a different choice for \(\Gamma\) thus obtaining a description in a different inertial Galilean reference frame. Now, we can define the 4-form \(\tilde{\theta}_H\) on \(\mathcal{P}\) given by \[\tilde{\theta}_H = \rho^{0}_a {\rm d} u^a\wedge i_{\Gamma}\mathrm{vol}_\mathcal{M} + \rho^{j}_a {\rm d} u^a\wedge i_{\frac{\partial}{\partial x^{j}}}\mathrm{vol}_\mathcal{M} -H\mathrm{vol}_\mathcal{M} \,. \label{4-form schrodinger}\] Note that the vector field \(\Gamma\) defines the Galielan reference frame, while the vector fields \(\frac{\partial}{\partial x^{j}}\) transform as the component of a vector with respect to the action of the Galilei group. Unlike the relativistic case dealt with in section [2](#sec: KG){reference-type="ref" reference="sec: KG"}, the 4-form \(\tilde{\theta}_H\) on \(\mathcal{P}\) depends on the choice of a reference frame on \(\mathcal{M}\) because the Hamiltonian function does so. To be able to recover Schrödinger equation, we must impose two constraints and select a sub-bundle of \(\mathcal{P}\). Specifically, we consider the vector sub-bundle \(\pi\colon\mathcal{Q}\rightarrow\mathcal{M}\) singled out by the constraints \[\rho^0_R-u^I = 0 ,\quad \rho^0_I + u^R = 0\.\] The origin of these constraints is related to the circumstance that wave-functions under Galilei transformations behave like sections of a \(U(1)\) bundle . Moreover, they appear naturally when the Schrödinger equation is written by means of a suitable reduction procedure of a 5-dimensional equation. This aspect will be considered elsewhere. Let \(\chi\) be a section of \(\pi\colon\mathcal{Q}\rightarrow\mathcal{M}\) given by \[\chi(x^{\mu}) = (x^{j},t, \phi^{R}(x^{j},t), P^{k}_{R}(x^{j},t),\phi^{I}(x^{j},t), P^{k}_{I}(x^{j},t))\.\] As before, we assume some regolarity conditions on the sections we actually consider. Specifically, we take \(\left( \phi^a \right) \in \mathcal{V}=\mathcal{H}^1(\mathcal{M}, \mathrm{vol}_M)\) and \(\left( P^{j}_a \right) \in \mathcal{W}= \mathcal{L}^2(\mathcal{M}, \mathrm{vol}_M)\). In this way, the space of fields of the theory is the Hilbert space \(\mathscr{F}_{\mathcal{Q}}\,=\,\mathcal{V}\oplus\mathcal{W}\). A variation for \(\chi\in\mathscr{F}_{\mathcal{Q}}\) is a tangent vector at \(\chi\), which may be identified witha vector field \(U_{\chi}\) along along \(\chi\) on \(\mathcal{Q}\), which is vertical with respect to the fibration \(\pi\colon\mathcal{Q}\rightarrow\mathcal{M}\). The tangent space \(\mathbf{T}_{\chi}\mathscr{F}_{\mathcal{Q}}\) is given by all the \(U_{\chi}\). In the following, it will be useful to extend \(U {\chi}\) to a vertical vector field \(\widetilde{U}\) in a neighbourhood of the image of \(\chi\) inside \(\mathcal{P}\) given by \[\tilde{U} = U^{\phi}_{R} \frac{\partial }{\partial u^{R}} + U_{R}^{j}\frac{\partial }{\partial \rho^{j}_{R}} + U^{\phi}_{I} \frac{\partial }{\partial u^{I}} + U_{I}^{j}\frac{\partial }{\partial \rho^{j}_{I}}\.\] As before, the dynamics may be described in terms of the Schwinger-Weiss action principle for sections \(\chi\in\mathscr{F}_{\mathcal{Q}}\). First of all, we consider the pullback \(\theta_H\) to \(\mathcal{Q}\) of the form \(\tilde{\theta}_H\) in Eq.[\[4-form schrodinger\]](#4-form schrodinger){reference-type="eqref" reference="4-form schrodinger"} given by \[\theta_H = \left( u^I{\rm d} u^R-u^R{\rm d} u^I \right)\wedge i_{\Gamma}\mathrm{vol}_{\mathcal{M}} + \rho^j_a {\rm d} u^a \wedge i_{\frac{\partial}{\partial x^{j}}}\mathrm{vol}_\mathcal{M}-H\mathrm{vol}_\mathcal{M} \,.\] Then, we define the action functional \(S\) on \(\mathscr{F}_{\mathcal{Q}}\) as \[S[\chi]= \int_{\mathcal{M}}\chi^*\left( \theta_H \right)\,,\] with \(\chi\in\mathscr{F}_{\mathcal{Q}}\). At this point, we may proceed as in the previous section and compute the variation \(\mathrm{d}S[\chi](U_{\chi})\) of \(S\) to be \[\begin{split} \mathrm{d}S[\chi](U_{\chi})&= \int_{\mathcal{M} }\chi^*\left( \mathrm{L}_{\tilde{U}}\theta_H \right) = \int_{\mathcal{M} }\chi^*\left( i_{\tilde{U}}{\rm d} \theta_H \right) + \int_{\mathcal{M} } {\rm d} \chi^*\left( i_{\tilde{U}}\theta_H \right), \end{split}\] where \(\tilde{U}\) is any extension of \(U_{\chi}\). Again, we use Stokes' theorem and see that the boundary term vanishes because \(\partial\mathcal{M}=\emptyset\). The action principle states that the dynamical trajectories satisfy the Euler-Lagrange equations for the action functional \[\label{eqn: Schwinger-Weiss action principle 2} \mathbb{EL}_{\chi}(U_{\chi}) := \int_{\mathcal{M} }\chi^*\left( i_{\tilde{U}}{\rm d} \theta_H \right) = 0 \,,\quad \forall U_{\chi}\in\mathbf{T}_{\chi}\mathscr{F}_{\mathcal{P}}\,,\] which are nothing but the de Donder-Weyl equations \[\begin{split} \frac{\partial \phi^I}{\partial t} =-\frac{1}{2}\frac{\partial P^j_R}{\partial x^j} \,, \qquad \frac{\partial \phi^I}{\partial x^j} =-\delta_{jk}P^k_I \\ \frac{\partial \phi^R}{\partial t} = \frac{1}{2}\frac{\partial P^j_R}{\partial x^j} \,, \qquad \frac{\partial \phi^R}{\partial x^j} =-\delta_{jk}P^k_R\. \end{split} \label{deDonder-Weyl-equations Schrodinger}\] It is a matter of straightforward computation to see that the free Schrödinger equation for \(\psi\) follows from equation [\[deDonder-Weyl-equations Schrodinger\]](#deDonder-Weyl-equations Schrodinger){reference-type="eqref" reference="deDonder-Weyl-equations Schrodinger"} upon writing \(\psi= \phi^R + i\phi^I\). The space of solutions is denoted by \(\mathcal{EL}_{\mathcal{M}}\), and it is equipped with the two-form \[\label{eqn: omega on solutions of de Donder Weyl for Schroedinger} \Omega^{\Sigma}_{\chi}(U_{\chi},V_{\chi}) = \int_{\Sigma}i_{\Sigma}^*\chi^*(i_{\tilde{V}}i_{\tilde{U}}{\rm d} \theta_H)\.\] Once again, following the steps outlined in the companion letter, it is possible to show that \(\Omega^{\Sigma}\) is actually independent of the simultaneity surface and frame of reference, and we can simply write \(\Omega\). In the remainder of the section, we want to formulate the dynamics in terms of an action principle for sections of an infinite-dimensional bundle which replaces \(\mathcal{Q}\). In this way, we will be able to read the bracket associated with \(\Omega\) in terms of a Poisson subalgebra of the algebra of smooth functions on a suitable manifold endowed with a Jacobi bracket. We proceed in analogy with what is done in the previous section. Therefore, we fix a time-slice \(\Sigma\) and we consider the pullback bundle \(i_{\Sigma}^{*}\mathcal{Q}\), where \(i_{\Sigma}\) is the immersion map of \(\Sigma\) inside \(\mathcal{M}\). A section \(\sigma\) of this bundle is given by \[\sigma(x^{j})=\left(x^{j},t^{0}, \varphi(x^{j})^{a},\, \beta^k_{a}(x^{j}) \right),\] where \(j=1,2,3\) and \(a=R,I\), and where \[\varphi^{a}(x^{j})=(\phi^{a}(x^{j},t^{0})) |_{\Sigma},\quad \beta^k_{a}(x^{j})=(P^{k}_{a}(x^{j},t^{0})) |_{\Sigma} \,,\] for some section \(\chi(x^{j},t)\,=(x^{j},t,\phi^{a}(x^{j},t), P^{k}(x^{j},t)\) in \(\mathscr{F}_{\mathcal{Q}}\). As before, we impose some regularity conditions on the admissible sections \(\chi\). Specifically, we will consider \((\varphi^{a}) \in\mathscr{V}=\mathcal{H}^1(\Sigma, \mathrm{vol}_{\Sigma})\), and \((\beta^{j}_{a}) \in\mathscr{B}=\mathcal{L}^2(\Sigma, \mathrm{vol}_{\Sigma})\), so that we have the Hilbert space of fields given by \(\mathcal{F}_{\Sigma}\,:=\,\mathscr{V}\oplus \mathscr{B}\). Then, we consider the Hilbert bundle \(\tau\colon\mathcal{F}_{\Sigma}\times\mathbb{R}\rightarrow\mathbb{R}\), where \(\tau\) is the projection on the second factor, which plays the role of the extended phase space in, and we denote by \(\Gamma\) the space of sections of this bundle. Following what is done in the previous section, we can find a one-to-one correspondence between \(\Gamma\) and \(\mathscr{F}_{\mathcal{Q}}\). Now, we define the Hamiltonian function \[\mathcal{H}(\varphi^{a},\beta^{j}_{a};s) = \int_{\Sigma}-\frac{1}{2}\delta^{jk}\left( \frac{\partial \varphi^R}{\partial x^j}\frac{\partial \varphi^R}{\partial x^k} + \frac{\partial \varphi^I}{\partial x^j}\frac{\partial \varphi^I}{\partial x^k} \right) \mathrm{vol}_{\Sigma}=:\int_{\Sigma}\,H\,\mathrm{vol}_{\Sigma}\,,\] the one-form \[\label{eqn: infinite theta2} \Theta_{\mathcal{H}}=2\int_{\Sigma} \varphi^I \delta\varphi^R \mathrm{vol}_{\Sigma}- \mathcal{H}\wedge {\rm d} t\,,\] and the action functional \[S[\gamma]=\int_{\mathbb{R}}\,\gamma^{*}\Theta_{\mathcal{H}}.\] Developing the variation of \(S\) as done for the Klein-Gordon case, we obtain the constraints \[\label{constraints schroedinger} \frac{\partial \varphi^R }{\partial x^j} =-\delta_{jk}\beta^k_R\,, \quad \frac{\partial \varphi^I }{\partial x^j} =-\delta_{jk}\beta^k_I\] and the "evolution equations" \[\label{Cauchy-form schroedinger equation} \frac{{\rm d} \varphi^R}{{\rm d} s} =-\frac{1}{2} \Delta_{\Sigma}\varphi^I, \quad \frac{{\rm d} \varphi^I}{{\rm d} s} = \frac{1}{2} \Delta_{\Sigma}\varphi^R \.\] The constraint conditions in Eq.[\[constraints schroedinger\]](#constraints schroedinger){reference-type="eqref" reference="constraints schroedinger"} determine a submanifold \(\mathcal{C}\subset \mathcal{F}_{\Sigma}\) which is a linear subspace. We define the trivial bundle \(\tau_{\mathcal{C}}\colon\mathcal{C}\times\mathbb{R}\rightarrow\mathbb{R}\), where \(\tau_{\mathcal{C}}\) is the projection on the second factor, and we denote by \(\Gamma_{\mathcal{C}}\) the space of sections of this bundle. Moreover, we write, with an evident abuse of notation, \(\Theta_{\mathcal{H}}\) for the pullback to \(\mathcal{C}\times\mathbb{R}\) of the one-form in equation [\[eqn: infinite theta2\]](#eqn: infinite theta2){reference-type="eqref" reference="eqn: infinite theta2"}. Then, on \(\mathcal{C}\times\mathbb{R}\), it is clear that Eq.[\[Cauchy-form schroedinger equation\]](#Cauchy-form schroedinger equation){reference-type="eqref" reference="Cauchy-form schroedinger equation"} may be read as defining the integral curves of the (densely defined) vector field \[X_{H} = \frac{\partial}{\partial t} + \frac{\delta H}{\delta \varphi^{I}}\,\frac{\delta}{\delta \varphi^{R}}-\frac{\delta H}{\delta \varphi^{R}}\,\frac{\delta}{\delta \varphi^{I}}\,\] which is in the kernel of the two-form \[{\rm d} \Theta_{\mathcal{H}}\, =\, 2\int_{\Sigma}\left( \delta \varphi^{I} \wedge \delta\varphi^{R}\right)\mathrm{vol}_{\Sigma}-{\rm d}\mathcal{H} \wedge {\rm d} t \.\] This two-form plays the role of the contact two-form on \(\mathbf{T}^{*}\mathcal{Q}\times\mathbb{R}\) in the case of non-realtivistic Hamiltonian mechanics, and of the contact two-form on the mass-shell in the case of the relativistic particle considered in. Eventually, we obtained the de Donder-Weyl equations for the free quantum particle in \(\mathbb{R}^{3}\) as a Hamiltonian system on an infinite-dimensional manifold, in such a way that a section \(\gamma\) satisfying Eq.[\[Cauchy-form schroedinger equation\]](#Cauchy-form schroedinger equation){reference-type="eqref" reference="Cauchy-form schroedinger equation"} provides a representation in terms of Cauchy data on \(\Sigma\) of the points in \(\mathcal{EL}_{\mathcal{M}}\). We denote by \(\mathcal{EL}_{\mathcal{C}}\) the space of all \(\gamma\in\Gamma_{\mathcal{C}}\) satisfying Eq.[\[Cauchy-form schroedinger equation\]](#Cauchy-form schroedinger equation){reference-type="eqref" reference="Cauchy-form schroedinger equation"}. Again, all vector fields \(fX_{H}\) with \(f\) a non-vanishing function are in the kernel of \({\rm d}\Theta_{\mathcal{H}}\), and the integral curves of \(f\,X_{H}\) can be interpreted as reparametrizations of the dynamical trajectories. Moreover, just as we said for the free Klein-Gordon theory, under suitable regularity properties for \(X_H\), the family of its integral curves defines a regular foliation of the manifold \(\mathcal{C}\times \mathbb{R}\), and every point in the quotient manifold, say \(\mathrm{Q}\), associated with the foliation can be identified with one and only one element in \(\mathcal{EL}_{\mathcal{C}}\). This allows us to look at the space of smooth functions on \(\mathrm{Q}\cong\mathcal{EL}_{\mathcal{C}}\cong\mathcal{EL}_{\mathcal{M}}\) as the subalgebra \(C^{\infty}_H(\mathcal{C}\times \mathbb{R})\subset C^{\infty} (\mathcal{C}\times \mathbb{R})\) of smooth functions such that \(\mathrm{L}_{X_H}f=0\). Then, as we did for the Klein-Gordon equation, we may look for a bivector \(\Lambda\) on \(\mathcal{C}\times \mathbb{R}\) satisfying the relations \[\left[\Lambda,\Lambda\right]_{S}\,=\,2\,\Gamma_{H}\,\wedge\,\Lambda\,,\quad\,\mathrm{L}_{\Gamma_{H}}\Lambda\,=\,0,\] where \([\cdot, \cdot ]_{S}\) denotes the Schouten-Nijenhuis bracket and \(\Gamma_H\) is the Reeb vector field satisfying \(i_{\Gamma_H}\Theta_{\mathcal{H}}=1\). The associated Jacobi bracket \([\cdot, \cdot ]_{J}\) on \(C^{\infty} (\mathcal{C}\times \mathbb{R})\) is then defined as follows \[_{J}\,:=\,\Lambda(\mathrm{d}f,\mathrm{d}g) + f\,\mathrm{L}_{\Gamma_{H}}g-g\,\mathrm{L}_{\Gamma_{H}}f\.\] Recalling that \(\Gamma_{H}\) annihilates the elements in \(C^{\infty}_H(\mathcal{C}\times \mathbb{R})\), it is immediate to check that \(C^{\infty}_H(\mathcal{C}\times \mathbb{R})\) becomes a Poisson subalgebra of \(C^{\infty}(\mathcal{C}\times \mathbb{R})\) with respect to the Jacobi bracket defined above. Upon identifying \(\mathcal{EL}_{\mathcal{M}}\) with \(\mathcal{EL}_{\mathcal{C}}\), and then \(\mathcal{EL}_{\mathcal{C}}\) with \(\mathrm{Q}\), the Poisson bracket on \(C^{\infty}_H(\mathcal{C}\times \mathbb{R})\) is precisely the Poisson bracket associated with the two-form \(\Omega\) in Eq. [\[eqn: omega on solutions of de Donder Weyl for Schroedinger\]](#eqn: omega on solutions of de Donder Weyl for Schroedinger){reference-type="eqref" reference="eqn: omega on solutions of de Donder Weyl for Schroedinger"}. To explicitely write the Jacobi and Poisson bracket, we can look for an analogue of the generalized Darboux coordinates used in the particle case in the companion letter. At this purpose, we first move from \(\mathcal{C}\) to \(\mathcal{C}'\) introducing the Fourier transforms \[\varphi_{R}(x)\,=\,\int_{\overline{\Sigma}}\,\hat{\varphi}_{R}(k)\,\mathrm{e}^{i k\cdot x}\,\,\mathrm{vol}_{\overline{\Sigma}}, \quad \varphi_{I}(x)\,=\,\int_{\overline{\Sigma}}\,\hat{\varphi}_{I}(k)\,\mathrm{e}^{i k\cdot x}\,\,\mathrm{vol}_{\overline{\Sigma}}.\] Note that the fact that \(\varphi_{R}\) and \(\varphi_{I}\) are real-valued imposes the constraints \(\overline{\hat{\varphi}}_{R}(k)=\hat{\varphi}_{R}(-k)\) and \(\overline{\hat{\varphi}}_{I}(k)=\hat{\varphi}_{I}(-k)\). Now, we consider the "change of coordinates" in \(\mathcal{C}'\times\mathbb{R}\) given by \[\begin{split} W\,=\, \frac{1}{2}\,\int_{\overline{\Sigma}}\ \left( |\hat{\Phi}_{R}|^{2}-|\hat{\Phi}_{I}|^{2}\right) &\sin(k^{2}s) + 2 (\hat{\Phi}_{R}\overline{\hat{\Phi}}_{I} + \overline{\hat{\Phi}}_{R}\hat{\Phi}_{I})\sin\left(\frac{ k^{2}}{2} s\right) \,\mathrm{vol}_{\overline{\Sigma}} \\ \hat{\Phi}_{R} &\,=\, \hat{\varphi_{R}}\,\cos\left(\frac{k^{2}}{2}s\right)- \hat{\varphi_{I}}\,\sin\left(\frac{k^{2}}{2}s\right)\\ \hat{\Phi}_{I} &\,=\, \hat{\varphi_{I}}\,\cos\left(\frac{k^{2}}{2}s\right) + \hat{\varphi_{R}}\,\sin\left(\frac{k^{2}}{2}s\right) . \end{split}\] where, again, it is \(\overline{\hat{\Phi}}_{R}(k)=\hat{\Phi}_{R}(-k)\) and \(\overline{\hat{\Phi}}_{I}(k)=\hat{\Phi}_{I}(-k)\). In this coordinate system, it is possible to see that the one-form \(\Theta_{\mathcal{H}}\) in equation [\[eqn: infinite theta2\]](#eqn: infinite theta2){reference-type="eqref" reference="eqn: infinite theta2"} becomes \[\Theta_{\mathcal{H}}\,=\,2\int_{\overline{\Sigma}} \,\overline{\hat{\Phi}}_{I} \,\delta\hat{\Phi}_{R} \,\mathrm{vol}_{\overline{\Sigma}} + {\rm d} W\.\] The Reeb vector field \(\Gamma_{H}\) becomes \(\Gamma_{H}\,=\,\frac{\partial}{\partial W}\), and, in analogy with what we did in the particle case in the companion letter, the bivector field \(\Lambda\) in the definition of the Jacobi bracket reads \[\Lambda\,=\,\frac{1}{2}\int_{\overline{\Sigma}}\,\left(\frac{\delta}{\delta \hat{\Phi}_{R} }-\hat{\Phi}_{I} \,\frac{\partial}{\partial W}\right)\,\wedge\,\frac{\delta}{\delta \overline{\hat{\Phi}}_{I} }\,\mathrm{vol}_{\overline{\Sigma}} \.\] Clearly, elements in \(C^{\infty}_H(\mathcal{C}'\times \mathbb{R})\) are just those functions which do not depend on \(W\), and thus the Jacobi bracket among them becomes the Poisson bracket given by \[\Lambda({\rm d} F,{\rm d} G)\,=\,\frac{1}{2}\int_{\overline{\Sigma}}\, \frac{\delta F}{\delta \hat{\Phi}_{R} } \,\wedge\,\frac{\delta G}{\delta \overline{\hat{\Phi}}_I }\,\mathrm{vol}_{\overline{\Sigma}} \.\] # Conclusions In this letter, we continued the analysis of the description of the covariant bracket on the space of functionals on solutions to variational problems in the framework of contact geometry initiated in the companion letter. We analysed in detail the case of free Klein-Gordon theory on Minkowski spacetime, and of the free Schrödinger equation for a particle in \(\mathbb{R}^{3}\). Both systems were described by means of two different but equivalent formulations. On the one hand, we exploited the multisymlectic formalism to give a description in which the fields of the theory are sections of a suitable bundle over the spacetime manifold, but for which it is not possible to appreciate the role of contact geometry. Indeed, this formulation seems to point at the need to develop a generalization of contact geometry which is analogue to the multisymplectic generalization of symplectic geometry, and that will be pursued in a future work. On the other hand, we presented a description in terms of a vector field on a suitable infinite-dimensional manifold that leads to the identification of the covariant bracket in terms of a Poisson subalgebra of the algebra of smooth functions on the infinite-dimensional manifold endowed with the Jacobi bracket.
{'timestamp': '2020-06-01T02:07:52', 'yymm': '2005', 'arxiv_id': '2005.14429', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14429'}
# Introduction Modern time series analysis has been transformed by emerging and innovative mathematical methods from machine learning and data science. The ubiquitous availability of measurement data across the sciences, coupled with advances in storage and processing power, has led to a resurgence of interest in the question of how diagnostic and predictive models can be discovered directly from time series data. Using a dynamical systems perspective allows one to take advantage of a broad variety of existing systems analysis methods with applications to forecasting and control. Of particular interest are techniques which are able to map an observed measurement series into a space where it can be accurately reproduced by a set of linear governing equations. This is the central tenet of Koopman theory, first introduced in 1931, which states that nonlinear dynamical systems can be reproduced by linear evolution in a space of observables on the state variables . However, this linear representation typically comes at the price of dimensionality: finite-dimensional nonlinear evolution generically requires an infinite-dimensional lifting to be accurately recreated by a linear operator. Linear models are desirable because they allow for the use of many powerful linear algebraic methods for estimation, prediction, and control, all of which can be extended to nonlinear systems if one is able to construct an accurate finite-dimensional coordinate system for the Koopman operator . As we show, time-delay embeddings provide such a coordinate system, providing a mathematical framework for the extraction of *principal component trajectories* (PCT) which allows for the construction of dynamics, actuated or not, via superposition. Dynamic Mode Decomposition (DMD) is the leading approach to approximating Koopman operators through regression . Specifically, it offers a means of efficiently discovering a finite-rank linear approximator to nonlinear dynamics directly from observation data, even in very high dimensions. The simplest implementation of the algorithm regresses an operator which acts directly on the measured state variables, but there is no reason, *a priori*, to expect this space to admit a faithful linear representation. Central to the successful implementation of DMD is the problem of identifying a space of Koopman observables into which the dynamics can be lifted to better suit the assumption of linearity. A variety of approaches have been taken, including constructing libraries of simple monomial functions evaluated on the data and regressed densely or sparsely, kernel methods such as diffusion mapping, and deep learning of coordinate transformations. The method of interest in this work is the use of time-delay embedding of measurement data, which has been used to great effect in the HAVOK  and the subsequent Hankel DMD  algorithms. DMD on time-delay coordinates offers advantageous properties with respect to Koopman approximation which are universal to any input data. Time-delay embedding refers to a coordinate transformation in which a time-localized measurement \(x(t)\) is augmented by time-shifted copies of itself \(x(t-\tau)\). The use of this technique for data-driven modeling dates back to the seminal Takens embedding theorem, which showed that a chaotic attractor can be reconstructed, up to a diffeomorphism, from the time series of a single measured variable. The method has since found purchase in a number of widely-used algorithms, including *singular spectrum analysis* (SSA), *nonlinear Laplacian spectral analysis* (NLSA), and the *eigensystem realization algorithm* (ERA). Particular attention has been devoted to the use of techniques such as singular value decomposition (SVD) to identify dominant modal content of data represented in delay coordinates. For a time-delayed scalar measurement series, the principal components obtained by SVD form a temporal basis, with functions similar to those in a Fourier or wavelet basis. Indeed, it has been demonstrated that for sufficiently long embedding windows the delay coordinate SVD converges to an estimate of the discrete Fourier decomposition. This property suggests a strong compatibility with the Koopman operator-theoretic approach to systems modeling, in which the eigenvalue spectrum of the desired operator has been shown to relate to the same harmonic averages used to compute the Fourier transform. This connection has been borne out by recent work on time-delay DMD , variations on which form analogous models on their SVD projections or on exact Fourier basis projections. The fidelity of a DMD model depends heavily on the Fourier spectral properties of the true dynamics. A finite-dimensional linear operator generates dynamics on a discrete set of frequencies determined by its eigenvalues; if the input data has a continuous spectrum it cannot be fully reproduced by DMD (time-delayed or otherwise). Moreover, the number of discrete spectral peaks that can be captured by a linear model depends on its dimension. DMD represents oscillatory modes by complex conjugate eigenvalue pairs, so a rank-\(r\) model will admit at most \(r/2\) distinct frequency components. This offers one perspective on the motivation for building models in delay coordinates: a discrete eigenvalue spectrum of arbitrary finite length can be obtained simply by embedding additional shifted copies of the data to increase the dimension of the augmented space. It can be shown that for scalar time series, the minimum number of such embeddings is determined fully by the sparsity of the Fourier spectrum. The continuous spectrum case, however, presents a much greater challenge for Koopman modeling. While a sufficiently dense point spectrum can approximate a continuous one in the high-dimensional embedding limit, the practical utility of this for numerical methods is limited. It has long been suggested that a Koopman approach might be taken for the "almost periodic" (i.e. spectrally discrete) portion of dynamics and augmented somehow to account for the continuous remainder. Previous attempts at this have used intermittent parametric forcing derived from rank-reduced SVD time series or direct translational manipulation of eigenvalues to fill out the spectrum. Building on the approach of, this paper makes two principal methodological contributions to the problem of modified Koopman representations for such systems. First, we introduce a means of deriving a novel projectional basis for dynamics using time delay methods inspired by SSA. This \"PCT\" representation offers properties generically favorable to approximation of the Koopman operator *and* a basis which naturally decomposes a signal into its continuous and discrete spectral components. Second, we propose a technique for Koopman modeling of such mixed-spectrum systems using the DMD with Control (DMDc) algorithm , which fits measurement data to a linear control model using a known control signal. We present a fully unsupervised method to learn a control model and a concomitant forcing signal which together fully reproduce the observed dynamics, with discrete-spectrum behavior modeled by endogenous linear evolution and the continuous-spectrum remainder isolated in the exogenous control. This approach is made possible by the projection of dynamics onto the PCT basis, in which components of the dynamics which are not amenable to low-rank Koopman representation are by default relegated to the projectional residual. The remainder of this paper is structured as follows: Sec. [2](#sec:delay_embedding){reference-type="ref" reference="sec:delay_embedding"} summarizes the process by which delay coordinate representations are obtained from data. The approach is modeled on that of SSA, but focuses on the less common case of spatiotemporal state delay embedding. We present a novel interpretation for the coordinate bases that this generates and illustrate the information-richness of the resultant modes relative to the highly generic output of the same approach on scalar data. Sec. [3](#sec:dmd){reference-type="ref" reference="sec:dmd"} discusses the regression of linear DMD models in the learned delay-coordinate space, using data with discrete and mixed spectra. A procedure is introduced for the extraction of an external forcing signal to account for observed nonperiodic dynamics, with results validating its success on systems with known exogenous forcing. Sec. [5](#sec:dmdc){reference-type="ref" reference="sec:dmdc"} joins this method with the existing DMDc algorithm, allowing these results to be integrated into a single unified linear control model. Finally, Sec. [6](#sec:power_grid){reference-type="ref" reference="sec:power_grid"} offers an example of how this technique might be applied to a real-world data set as an informative diagnostic tool. # Full-State Embedding: Methods and Interpretations {#sec:delay_embedding} In this section we outline a procedure for time-delay analysis of a measurement time series. The steps taken are similar to those of SSA. But where SSA typically entails delay embedding on a scalar signal, we extend this approach to the case of a multivariate vector signal and briefly discuss the interpretation of the principal components that this produces. ## Time Delay Embedding Delay embedding is the process of lifting a time series signal into a higher dimensional space by stacking it with time-shifted copies of itself. For a scalar \(y(t)\in\mathbb{R}\), the lifted Hankel matrix \(\mathbf{H}\) is obtained as follows: \[\begin{split} \mathbf{Y} &= \left[\begin{matrix} y(t_0) & y(t_1) & \cdots & y(t_m)\end{matrix}\right] \end{split}\] becomes \[\begin{split} \mathbf{H} &= \left[\begin{matrix} y(t_0) & y(t_1) & \cdots & y(t_{m-d}) \\ y(t_1) & y(t_2) & \cdots &y(t_{m-d+1})\\ \vdots & \vdots & \ddots & \vdots\\ y(t_d) & y(t_{d+1}) & \cdots &y(t_m)\end{matrix}\right] \end{split}. \label{eq:scalar_delay}\] The matrix \({\bf H}\) contains \(d\) shifted copies of the original signal \({\bf Y}\), each offset from the last by one time step. If \({\bf Y}\) had dimension \(1\times m\), \({\bf H}\) has dimension \(d \times (m-d+1)\). Note that there is considerable redundancy in the elements of \({\bf H}\): all elements belonging to diagonal sets \(\{H_{ij}\}\) such that \(i+j = \rm(const)\) are equal. The extension of this procedure to a vector signal \(\mathbf{y} \in \mathbb{R}^n\) is straightforward. Each column of \({\bf H}\) now consists of \(d\) vectors in \(\mathbb{R}^n\) stacked on top of each other with the same time shifting scheme as before: \[\begin{split} \mathbf{Y} &= \left[\begin{matrix} | & | & & | \\ \mathbf{y}(t_0) & \mathbf{y}(t_1) & \cdots & \mathbf{y}(t_m) \\ | & | & & | \end{matrix}\right] \end{split}\] becomes \[\begin{split} \mathbf{H} &= \left[\begin{matrix} | & | & & | \\ \mathbf{y}(t_0) & \mathbf{y}(t_1) & \cdots & \mathbf{y}(t_{m-d}) \\ | & | & & |\\ | & | & & | \\ \mathbf{y}(t_1) & \mathbf{y}(t_2) & \cdots & \mathbf{y}(t_{m-d+1}) \\ | & | & & |\\ \vdots & \vdots & \ddots & \vdots \\ | & | & & | \\ \mathbf{y}(t_d) & \mathbf{y}(t_{d+1}) & \cdots & \mathbf{y}(t_m) \\ | & | & & |\end{matrix}\right] \end{split}. \label{eq:delay_embed}\] The vectorized Hankel matrix is often used for linear system identification in control applications via ERA . This procedure offers two tunable parameters to be independently chosen. Firstly, the number of delay embeddings \(d\) performed on the input signal. This determines the dimension of the delay coordinate space into which the columns of \({\bf y}\) are lifted. Previous work on this topic has sought to quantify the lowest value \(d\) can take while still admitting a linear dynamical model which faithfully reproduces observed dynamics. For the purposes of this analysis, however, we assume the availability of input data of arbitrary duration, so there is no need for parsimony in the selection of \(d\). While a high value of \(d\) does lead to a high-dimensional embedding space, our subsequent model-building efforts will be carried out in a rank-reduced basis spanned by \(r\) principal component vectors, or the *principal componant trajectories* (PCT) of the time-series. Thus a large number of embeddings \(d\) does not carry with it any risk of causing the model regression to be underdetermined. The second parameter to be selected is the embedding period \(T^d\). In Eq. ([\[eq:delay_embed\]](#eq:delay_embed){reference-type="ref" reference="eq:delay_embed"}) the time lag introduced in each successive embedding is equal to the sampling resolution of \({\bf y}(t)\), so \(T^d = t_d-t_0 = d\Delta t\), assuming the columns of \({\bf Y}\) are sampled at evenly spaced intervals of \(\Delta t\). However, the time shift per embedding could just as easily be set to any integer multiple of \(\Delta t\), leading to a modified embedding period \(T^d = qd\Delta t\), where \(q\in \mathbb{Z}^+\). The governing principle for making this choice should be to match the time scale of the dynamics of interest: in the low-\(T^d\) limit the stacked state vectors which comprise the columns of \({\bf H}\) will be highly redundant, encoding the passage of a time interval too short for any meaningful dynamical evolution of the system. In the high-\(T^d\) limit, the delay coordinate sampling resolution is too coarse to resolve the dynamics; unless \({\bf y}(t)\) is perfectly periodic the delay registers of \({\bf H}\) will become completely uncorrelated. If the system in question contains multiscale dynamics with periods separated by orders of magnitude, multiple sets of embedding parameters may be required. A more extensive discussion of this case with respect to the application of dynamic mode decomposition can be found in. For the purposes of this paper, we restrict our analysis to monoscale dynamics and choose \(T^d\) such that it spans a few periods of the lowest-frequency peak of the Fourier spectrum of \({\bf y}(t)\). A more detailed discussion of this parameter selection is available in. ## SVD and Full-State Embedding Of central importance to the signal processing technique of SSA, and to more recent dynamical systems work with time delay coordinates, is the application of singular value decomposition (SVD) to the delay-embedded Hankel matrix \({\bf H}\) (as defined in Eq. ([\[eq:delay_embed\]](#eq:delay_embed){reference-type="ref" reference="eq:delay_embed"})). In this section we present a brief discussion of the motivation for this step, convergence properties of the results, and interpretations of the modes in delay space specifically for the case of full-state vector embedding. The SVD of a matrix \(\mathbf{Y}\) yields \(\mathbf{Y} = \mathbf{U} \mathbf{S} \mathbf{V}^T\). If \(\mathbf{Y}^{n\times m}\) is a time series with state dimension \(n\) and time dimension \(m\), then the columns (or *modes*) of \(\mathbf{U}\) form an orthonormal basis for the state space, the columns of \(\mathbf{V}\) are time series representing normalized projections of the state onto the \(\mathbf{U}\) modes, and the elements of the diagonal matrix \(\mathbf{S}\) carry the energetic (correlation) weight of each mode's contribution to the full signal \(\mathbf{Y}\). Because modal amplitudes are encoded entirely by \(\mathbf{S}\), modes can be hierarchically ranked by relative magnitude. In the examples presented in this paper we assume each coordinate of the input data has mean 0, which can be accomplished for arbitrary \(\mathbf{Y}\) by applying the transformation \(\mathbf{Y}\to\mathbf{Y}-\bar{\mathbf{Y}}\). Under this condition the SVD is equivalent to Principal Component Analysis (PCA), and the singular values can be interpreted as the variance of the data along the axes of the left singular vectors (the columns of \(\mathbf{U}\)). Truncating the decomposition to contain only the top \(r\) modes yields a rank-reduced representation which produces a least-squares optimal reconstruction of \(\mathbf{Y}\). \[Note that strictly speaking, centering \(\mathbf{Y}\) on the origin does not precisely center \(\mathbf{H}\); each row of \(\mathbf{H}\) contains a truncated subset of the corresponding row in \(\mathbf{Y}\). However, we are concerned with the limit of \(m>>d\) in which this discrepancy is negligible, so mean subtraction of either matrix yields results which are equivalent in a practical sense.\] The SVD can be applied to a time series lifted into delay coordinates, as in Eq. [\[eq:delay_embed\]](#eq:delay_embed){reference-type="ref" reference="eq:delay_embed"}, to obtain a decomposition of the same form: \[\label{HankelSVD} \begin{split} \mathbf{H} = \mathbf{U} \mathbf{S} \mathbf{V}^T \end{split}\] Resultant modes have additional degree of interpretability owing to the temporal structure embedded in \(\mathbf{H}\). Columns of \(\mathbf{U}\) are vectors in the input state space, which in this case is the high-dimensional delay space. If \(\mathbf{H}\) was constructed from a scalar time series \(y(t)\), the SVD modes can be treated as \(d\)-element time series spanning a duration of \(T^d\). If \(\mathbf{H}\) were instead the full-state embedding of a vector times series \(\mathbf{y}(t) \in \mathbb{R}^n\), its modes can be interpreted as trajectories in \(\mathbb{R}^n\), also of duration \(T^d\). An intuitive parallel for these decompositions can be found in time-frequency analysis methods such as windowed Fourier and wavelet transforms, both of which have been applied to the DMD method . Thus a vector projection of \({\bf H}\) onto the columns of \(\mathbf{U}\) in delay coordinates is analogous to a time-localized projection onto some template function, e.g. a wavelet confined to a length of \(T^d\). This procedure is shown in Fig. [\[fig:mode_trajectory_protocol\]](#fig:mode_trajectory_protocol){reference-type="ref" reference="fig:mode_trajectory_protocol"}. Note that when the input signal is multivariate, vectors in the delay embedding space have elements spanning both spatial coordinates \(x,y,z\) and measurement times \(t_j, t_{j+1}...,t_{j+d}\). To treat this as a normed vector space (as SVD does) is to make an implicit assumption about the relative weighting of spatial versus temporal coordinate separations. This assumption is carried in the choice of time spacing between delay embeddings, or equivalently in the choice of embedding period \(T^d\). A more concrete resolution could be obtained by explicitly defining a space-time inner product in the Hankel vector space as described in, which would also offer a more rigorous basis for interpreting singular value weightings as mode energies of the PCTs. ## Interpreting SVD Modes in Delay Coordinates The result of the decomposition process outlined in Fig. [\[fig:mode_trajectory_protocol\]](#fig:mode_trajectory_protocol){reference-type="ref" reference="fig:mode_trajectory_protocol"} depends heavily on the structure of \({\bf H}\). By construction, elements of \({\bf H}\) are represented redundantly up to \(d\) times (specifically, all \(H_{ij}\) where \(i+n\times j=(\rm{const})\) are equal). This property holds almost regardless of the dynamical content of the signal in question, and leads to certain guarantees on the SVD modes of \({\bf H}\). In particular, it can be shown that for embeddings of a scalar time series (\(n=1\)), modes converge to simple functions in the limiting cases of \(T^d\). For small \(T^d\), the columns of \({\bf U}\) resemble Legendre polynomials, while for large \(T^d\) they become sinusoidal. (An exception to this convergence property would occur in a purely mixing system with continuous spectrum measured with perfect precision; here all but one singular value would approach 0 in the \(d\to\infty\) limit. But in the practical case of large-but-finite \(d\) this does not pose any problem.) Indeed, in some circumstances exact instantiations of these functions have been used instead of the data-driven approximations obtained with the SVD. In this paper we focus on the large-\(T^d\) limit, in which delay-coordinate SVD can be thought of as reproducing the discrete Fourier transform on a sparsified frequency basis: the near-sinusoidal \({\bf U}\) modes resemble the projection basis used in the DFT, but instead of a large number of basis functions densely populating frequency space, only the (SVD rank) \(r\) most prominently represented frequencies are retained. Shifting attention to the case of multivariate vector embeddings, we observe similar behavior in the long embedding time limit. Some sample modes obtained for the chaotic Lorenz system are plotted in Fig. [\[fig:mode_trajectory_breakdown\]](#fig:mode_trajectory_breakdown){reference-type="ref" reference="fig:mode_trajectory_breakdown"}. The trajectories in \(\mathbb{R}^3\) traced out by the modes result from sinusoidal oscillation in \(x\), \(y\), and \(z\). The frequencies of oscillation for different state variables within the same mode are typically equal or related by an integer ratio, but the relative phases and amplitudes are free to vary. Consequently, modes which in the scalar high-\(T^d\) case could be completely defined by a single frequency value take on much richer geometric structure in the vector high-\(T^d\) case. The figures which can be thus formed by parametric sinusoids belong to the class of generalized \(N\)-dimensional Lissajous figures, in the special case where frequencies differ by integer ratios. Note that the periods of oscillation are independent of the embedding period \(T^d\), so these curves do not in general form closed orbits. The SVD reconstruction [\[HankelSVD\]](#HankelSVD){reference-type="eqref" reference="HankelSVD"} can be equivalently written as a sum over individual modes: \[\begin{split} {\bf H} &= \sum_j {\bf u}_j s_j {\bf v}_j^* \end{split}\] Each column of \({\bf H}\), which represents a windowed snapshot of the dynamics over a period of \(T^d\), is reproduced by a linear combination of the orbits \(\{{\bf u}_j\}\) weighted by the singular values \(\{s_j\}\) and the time series projections \(\{{\bf v}_j(t)\}\). The delay-coordinate SVD therefore functions as an automated means of decomposing a complex trajectory into simple orbital components (Fig. [\[fig:spirograph3D\]](#fig:spirograph3D){reference-type="ref" reference="fig:spirograph3D"}), or the PCT coordinates of interest. The result is reminiscent of the Ptolemaic model of the solar system, in which the apparent retrograde motion of planets in the sky is explained using a hierarchy of superimposed epicycles in geocentric coordinates. It should be noted that although PCTs often look periodic as a result of the Fourier converge property discussed above, they do not correspond to true closed orbits on the original attractor. They should be interpreted as an optimal basis for low-rank projection in the spirit of Principal Component Analysis; the dynamics of the system are unlikely to resemble any given one of the PCTs, but should be reproducible by their linear superposition. The novelty of PCTs relative to traditional PCA and SSA lies in the dynamical richness of the modes. Multivariate time delay embedding lifts data into a high dimensional, hybrid spatial-temporal representation which admits a modal decomposition which offers a much more compact, low-rank representation for a large class of dynamics than other principal component or Fourier projection methods. ## PCT of a Nonlinear Oscillator with Discrete Fourier Spectrum A more concrete illustration of the analogy to multivariate Fourier decomposition can be found in the example of the Van der Pol system. This canonical nonlinear oscillator is defined by the coupled first-order equations: \[\begin{split} \dot{y}_1 &= y_2\\ \dot{y}_2 &= \mu\left(1-y_1^2\right)y_2-y_1 \end{split} \label{eq:vdp_def}\] with \(\mu\), which controls the strength of the nonlinearity, taken to be \(1\) from here on. This system admits solutions which form a closed periodic orbit, so the Fourier spectrum of the trajectory it generates is discrete (only integer harmonics of the base periodic frequency are present). Applying the procedure from Fig. [\[fig:mode_trajectory_protocol\]](#fig:mode_trajectory_protocol){reference-type="ref" reference="fig:mode_trajectory_protocol"} with \(T^d = 20\) produces the delay-coordinate modes plotted in Fig. [\[fig:vdp_svd_modes\]](#fig:vdp_svd_modes){reference-type="ref" reference="fig:vdp_svd_modes"}. The state space of Eq. [\[eq:vdp_def\]](#eq:vdp_def){reference-type="ref" reference="eq:vdp_def"} is represented by the \(x-y\) plane, and the time coordinate on the interval \([0, T^d]\) is extended up the \(z\) axis to better illustrate frequency distinctions. In the rightmost column, Fourier spectral content of each (combined) mode pair is overlaid on the spectrum of the full Van der Pol trajectory. The results for this simple example are illustrative of three key features of vector-embedded PCT. First, the modes naturally adhere to the frequencies present in the power spectrum of the input signal. In other words, the PCT not only converge to a sinusoidal basis, but it discovers a sparse Fourier basis made up of those sinusoids most strongly represented in the data. Second, the ordering of the modes corresponds to the heights of their corresponding spectral peaks. This follows from the fact that in the limit as the columns of \({\bf U}\) converge to sinusoids, the singular values associated with them become directly analogous to Fourier power measurements in that both represent a magnitude of the energetic content of the full dynamics contained in a projection onto a given oscillatory mode. Third, the PCT modes naturally self-organize into pairs which share a common frequency and singular value, which is often observed in the fluid flow past bluff bodies . In each row in Fig. [\[fig:vdp_svd_modes\]](#fig:vdp_svd_modes){reference-type="ref" reference="fig:vdp_svd_modes"}, the modes are identical up to a \(90^\circ\) rotation. This again suggests a parallel to Fourier analysis: a pair of out-of-phase sinusoids of equal frequency (e.g. \(\sin(\omega t)\) and \(\cos(\omega t)\)) form a complete basis for dynamics of arbitrary phase at that frequency. ## PCT and Continuous-Spectrum Dynamics As the spectral plots in Fig. [\[fig:vdp_svd_modes\]](#fig:vdp_svd_modes){reference-type="ref" reference="fig:vdp_svd_modes"} suggest, PCT is a method suited to systems whose dynamics admit a discrete Fourier representation. In the long-embedding limit in which PCT modes converge to sinusoids, a decomposition of finite rank \(r\) can at most reproduce \(r/2\) spectral peaks in its reconstruction. For a system with a continuous spectrum, this is clearly insufficient: no finite number of discrete frequencies can densely cover a continuous interval on the frequency space. Thus, while the delay method of Fig. [\[fig:mode_trajectory_protocol\]](#fig:mode_trajectory_protocol){reference-type="ref" reference="fig:mode_trajectory_protocol"} can be applied to any uniformly-sampled time series data in \(n\) dimensions, its utility as a means of sparsely representing the dynamical content of the given signal is limited to the discrete-spectrum case. This is a highly restrictive condition, given that many systems of mathematical interest and almost all real-world systems do not exhibit fully discrete Fourier spectra. Even when dynamics are very nearly periodic, the introduction of any measurement noise or stochastic/chaotic forcing will populate the gaps in the spectrum and undermine any attempt to build a linear model for the system in delay coordinates. This is illustrated in Fig. [\[fig:power_spectrum_comparison\]](#fig:power_spectrum_comparison){reference-type="ref" reference="fig:power_spectrum_comparison"}, in which the Van der Pol oscillator from Eq. [\[eq:vdp_def\]](#eq:vdp_def){reference-type="ref" reference="eq:vdp_def"} is subjected to different types of weak parametric forcing on the \(y_2\) variable. Though the magnitude of forcing is sufficiently small that the state-space trajectories (top) look nearly identical, the differences in the power spectra (bottom) are quite obvious. The consequences of this spectral contamination are evident when the plotted time series are subjected to linear model discovery using DMD, which is discussed in the next section. Even when the exogenous forcing is an order of magnitude weaker than the intrinsic dynamics, it yields a model whose reconstruction error is many times greater than that of the unforced system. Because the base periodic oscillation still dominates the observed dynamics, a linear delay-coordinate model should offer a useful approximation to the true behavior. The remainder of this paper is devoted to understanding how such a model can be obtained by isolating the continuous-spectrum forcing from the underlying periodic motion and combining them in the framework of linear control. # Dynamic Mode Decomposition and Time-Delay Embedding {#sec:dmd} ## Dynamic Mode Decomposition {#sec:dmd_background} Dynamic Mode Decomposition (DMD) is a model regression algorithm which produces a best-fit linear operator to reproduce the dynamics observed in some time series data set. The resulting model offers the benefits of interpretability (via its eigenvalue spectrum and spatial eigenvectors) and future-state forecasting to arbitrary time. Given a set of sequential measurements \(\mathbf{X} = \left[\mathbf{x}_1, \mathbf{x}_2,... \mathbf{x}_m\right] \in \mathbb{R}^{n\times m}\), DMD seeks to solve \[\begin{split} \dot{\mathbf{X}}= \mathbf{A}\mathbf{X} \end{split}\] The simplest implementation of the algorithm, known as *exact DMD*, simply seeks a least-squares best fit which minimizes \(\|\dot{\mathbf{X}}-\mathbf{A}\mathbf{X}\|_F\), solved by \(\mathbf{A} = \dot{\mathbf{X}}\mathbf{X}^\dagger\) (\(\dagger\) denotes the Moore-Penrose pseudo-inverse). This is sometimes formulated in discrete time, where one seeks an operator which maps the state one time step into the future. The resultant \(\mathbf{A}\) defines a first-order linear differential equation in the state space \(\mathbb{R}^n\), the closed-form solution to which can be written using the operator's eigendecomposition: \[\begin{split} \label{eq:dmd_sol} \tilde{\mathbf{x}}(t) &= \sum_j b_j\mathbf{w}_j e^{\omega_j t} \end{split}\] where \(\mathbf{w}_j\) and \(\omega_j\) are eigenvectors and eigenvalues of the DMD operator and \(b_j\) are scalar weighting coefficients. This illustrates the power of linear model regression: the obtained DMD model admits a closed-form analytic solution which can easily be broken down into simple exponential modes and can be evaluated over any time domain. DMD has become a heavily used algorithm in the analysis of spatio-temporal data analysis, with many recent innovations including a sparsity promoting variant , an optimized framework , extensions to control , a Bayesian formulation , a variational formulation , a higher-order formulation (HO-DMD) , a stochastic formulation  and a multi-resolution analysis . ## Time-Delay DMD A resurgence of interest in Koopman theory and consequently in DMD in recent years has led to a variety of extensions of the algorithm focusing on two principal tasks: modifying the optimization objective function to redefine what constitutes a "best fit" for \({\bf A}\) and identifying lifting transformations which render the data more amenable to linear representation. The results presented in this work remain agnostic on the former issue and focus on a particular solution to the latter: namely, the use of delay-embedding coordinates, or PCT. The lifting procedure described in Eq. ([\[eq:scalar_delay\]](#eq:scalar_delay){reference-type="ref" reference="eq:scalar_delay"}) has been shown to quite generically improve DMD representations for continuous time-series data. Of particular note is the original Hankel alternative view of Koopman (HAVOK) formulation , and the subsequent and closely related Hankel DMD . The procedure for constructing a delay-coordinate linear model is diagrammed in the first two rows of Fig. [\[fig:dmd_schematic\]](#fig:dmd_schematic){reference-type="ref" reference="fig:dmd_schematic"}. Starting from the SVD approach illustrated in Fig. [\[fig:mode_trajectory_protocol\]](#fig:mode_trajectory_protocol){reference-type="ref" reference="fig:mode_trajectory_protocol"}, a linear DMD operator \(\mathbf{A}\) is regressed using data from the first \(r\) rows of the time-series projection matrix \(\mathbf{V}\): \[\begin{split} \dot{\mathbf{V}} = \mathbf{A}\mathbf{V} \end{split}\] The resultant model can reproduce the dynamics in the space of the SVD modes by integrating this differential equation (or using the analytic solution from Eq. [\[eq:dmd_sol\]](#eq:dmd_sol){reference-type="ref" reference="eq:dmd_sol"}). It also enables state forecasting simply by integrating further out to some future time. Results can be transformed back into the original delay-coordinate space via matrix multiplication: \(\hat{\mathbf{H}} = \mathbf{U}\mathbf{S}\hat{\mathbf{V}}^T\), where \(\hat{\mathbf{V}}\) is the DMD reconstruction of the data matrix \(\mathbf{V}\). The Hankel matrix formed by the embedding procedure of Eq. ([\[eq:delay_embed\]](#eq:delay_embed){reference-type="ref" reference="eq:delay_embed"}) is guaranteed by construction to have redundant values along matrix diagonals \(\{H_{ij}\) where \(i+j = \rm(const)\}\). No such property is assured for the DMD reconstruction \(\hat{\mathbf{H}}\), so the task of collapsing the resultant signal back down into the original state space is nontrivial. There is an approach used in SSA known as Hankelization, or diagonal averaging, in which a state-space reconstruction \(\hat{\mathbf{x}}\) is obtained from \(\hat{\mathbf{H}}\) by averaging over the elements which would in a true Hankel matrix be redundant. However, in the case of model forecast residuals discussed in the following section, we find there is often coherent oscillatory behavior along these diagonals which can be obfuscated by averaging. In these cases we therefore simply sample the first \(n\) rows of \(\hat{\mathbf{H}}\) to compress results back into the state space. We find that the delay registers largely differ from one another only by a global phase factor, so the choice to use the first register is not particularly consequential. # Data-Driven Decomposition of Nonlinear Systems into Forced Linear Models DMD generates models with complex eigenvalues, but for real and stationary input data its modes converge to pure-imaginary conjugate pairs. In this case, a rank-\(r\) DMD model yields dynamics at at most \(r/2\) distinct frequencies. Thus, while Hankel DMD can produce a linear model which reproduces a discrete-spectrum nonlinear oscillator to arbitrary precision, it will unavoidably fall short when it comes to systems with continuous spectra. In this section, we present an extension of Hankel DMD to model nonlinear dynamics as a forced linear system, for which the model and the forcing signal are learned simultaneously. This approach retains the benefits of linearity for the portion of the model which captures the dominant, (quasi-)periodic dynamics, while adding the versatility to simulate a much broader class of nonlinear systems. A standard delay-coordinate DMD model is first generated as explained in the previous section. Working in the space of PCT modes, this means learning the linear operator \({\bf A}\) which offers a best-fit solution to \(\dot{\mathbf{v}}(t) = \mathbf{A}\mathbf{v}(t)\) over the full duration of available data. The resulting model is then used for stepwise forecasting: given some \(\mathbf{v}(t_j)\), the succeeding observation \(\mathbf{v}(t_{j+1})\) can be approximated as follows: \[\begin{split} \hat{\mathbf{v}}(t_{j+1}) &= \mathbf{v}(t_j) + \Delta t \mathbf{A}\mathbf{v}(t_j) \label{eq:stepwise_forecast} \end{split}\] (This simple Euler time step could be replaced by any forward numerical integration method). Iterating over the first \((m-1)\) columns of \(\mathbf{V}\), this approach can be used to construct a full single-step prediction matrix \(\hat{\mathbf{V}}\): \[\begin{split} \hat{\mathbf{V}} &= \left[ \begin{matrix} | & | & | & \\ \hat{\mathbf{v}}(t_1) & \hat{\mathbf{v}}(t_2) & \hat{\mathbf{v}}(t_3) & \cdots\\ | & | & | & \end{matrix}\right] \end{split}\] The discrepancy between \(\mathbf{V}\) and \(\hat{\mathbf{V}}\) can be thought of as a quantitative account of the shortcoming of the DMD representation. We assert that the true dynamics can be written in the form \[\begin{split} \dot{\mathbf{v}} &= \mathbf{A}\mathbf{v} + \mathbf{u}(t) \label{eq:control_model} \end{split}\] for some parametric exogenous forcing \(\mathbf{u}(t)\). In this case a forward Euler step would yield \[\begin{split} \mathbf{v}(t_{j+1}) &= \mathbf{v}(t_j) + \Delta t \mathbf{A}\mathbf{v}(t_j) +\Delta t \mathbf{u}(t_j) \end{split}\] and so \[\begin{split} \mathbf{v}(t_{j+1})-\hat{\mathbf{v}}(t_{j+1}) = \Delta t \mathbf{u}(t_j) \end{split}\] leading to \[\begin{split} \mathbf{u}(t) &= \frac{\mathbf{v}(t+\Delta t)-\hat{\mathbf{v}}(t+\Delta t)}{\Delta t}. \end{split}\] An inferred forcing signal can thus be extracted simply by computing the stepwise forecast \(\hat{\mathbf{V}}\) using Eq. ([\[eq:stepwise_forecast\]](#eq:stepwise_forecast){reference-type="ref" reference="eq:stepwise_forecast"}). This process is illustrated schematically in Fig. [\[fig:control_signal_protocol\]](#fig:control_signal_protocol){reference-type="ref" reference="fig:control_signal_protocol"}. In one sense this process is tautological: the learned \(\mathbf{u}(t)\) takes on whatever value is required to match prediction to reality at a given time. The control model posited in Eq. ([\[eq:control_model\]](#eq:control_model){reference-type="ref" reference="eq:control_model"}) is fully accurate by construction. However, the decomposition it achieves is nontrivial. For any system whose dynamics are dominated by near-periodic evolution (or linear combinations thereof), Hankel DMD can generate a model which captures a large fraction of observed behavior. Under these circumstances, and assuming the rank of \({\bf A}\) is sufficient to account for all prominent spectral peaks, the discovered forcing consists solely of the continuous-spectrum mixing dynamics which lie beyond the reach of DMD. In other words, to the extent that Hankel DMD can be considered an optimal means of discovering a set of \(r\) observables in whose space dynamics are most nearly linear (known as a Koopman invariant subspace), \({\bf u}(t)\) offers a window into the residual dynamics which unfold in the orthogonal complement to this subspace. As an example, we consider the forced Van der Pol system defined by: \[\begin{split} \dot{y}_1 &= y_2\\ \dot{y}_2 &= \left(1-y_1^2\right)y_2-y_1 + u(t) \end{split} \label{eq:forced_vdp}\] As plotted in Fig. [\[fig:power_spectrum_comparison\]](#fig:power_spectrum_comparison){reference-type="ref" reference="fig:power_spectrum_comparison"}, we consider cases where the forcing \(u(t)\) is zero (unforced), where it is sinusoidal, and where it is a chaotic oscillatory signal derived from the \(z\) coordinate of a trajectory on the canonical Lorenz attractor. In each case, a Hankel DMD model is generated from data generated over an interval of \(1000\) time units sampled at a resolution of \(0.01\) time units. The Hankel matrix is constructed using \(d = 256\) delay embeddings spaced \(q = 4\) time steps apart, for an embedding period of \(T^d = qd\Delta t = 10.24\) (which is on the same order as the Van der Pol oscillatory period). The results of the forcing discovery procedure are plotted side by side with the true forcings used to simulate the data in Fig. [\[fig:discovered_forcings\]](#fig:discovered_forcings){reference-type="ref" reference="fig:discovered_forcings"}. While the phases of the corresponding signals clearly do not match, their structures are quite similar and their autocorrelations plotted on the right match very closely. The DMD models used to generate Fig. [\[fig:discovered_forcings\]](#fig:discovered_forcings){reference-type="ref" reference="fig:discovered_forcings"} were selected from models with ranks varying from \(2\) to \(48\). The results plotted (models of \(r=12\) and \(r=6\), respectively) were chosen as particularly clean representations of the desired results. Some of the models of other ranks produced forcing signals which were somewhat obfuscated by additional high-frequency oscillation. This is because the ability of this method to separate periodic and aperiodic contributions to observed dynamics is limited by the capacity of DMD to fully capture the periodic behavior without any additional, spurious oscillatory modes. The strength of a DMD model in this regard can be evaluated by comparison between its eigenvalue spectrum and the Fourier spectrum of the input data: there should be eigenfrequencies corresponding to all prominent Fourier peaks no more than that. In Fig. [\[fig:power_spectrum_comparison\]](#fig:power_spectrum_comparison){reference-type="ref" reference="fig:power_spectrum_comparison"} it is apparent that the sinusoidal forcing introduced additional peaks at half-integer harmonics of the base frequency, so it is not surprising that a higher-rank DMD model was required to isolate a clean forcing signal relative to the chaotically forced system. It should be noted that in the case of sinusoidal forcing, the separation that has occurred is not between periodic and aperiodic dynamics: the forcing signal itself is, of course, periodic. But \({\bf u}(t)\) oscillates at a frequency orders of magnitude lower than those which dominate the Fourier power spectrum, and DMD is well known to be ill-equipped to capture dynamics at such disparate time scales. The obtained linear model therefore ignores that slow oscillatory behavior and fully relegates it to the exogenous forcing. # Integration with DMDc: Discovering Linear Control Systems Without Prior Knowledge of the Forcing Signal {#sec:dmdc} DMD with control (DMDc) extends traditional DMD to fit a model of the form : \[\begin{split} \dot{\mathbf{x}} &= \mathbf{A}\mathbf{x} + \mathbf{B}\mathbf{u}(t). \end{split}\] The algorithm offers a means of simultaneous regression of the intrinsic linear dynamics \(\mathbf{A}\) and the control mapping \(\mathbf{B}\), but requires a known control signal \(\mathbf{u}(t)\) in addition to the state data \(\mathbf{x}(t)\). In many circumstances this information is not available, either because a known forcing variable cannot be measured or because the exogenous influence on the system is carried by many environmental variables which cannot even be enumerated, much less measured. The control architecture can be extended to a Koopman theoretic framework as well . Incorporating our method for unsupervised forcing discovery into the DMDc approach allows for the construction of linear control models from time series measurements of the state alone. This is accomplished by first running the standard DMD algorithm and collecting the stepwise forecast errors as explained in the previous section, and then performing a second decomposition this time using the DMDc formalism to obtain a modified \(\mathbf{A}\) approximating the intrinsic linear dynamics and a control mapping \(\mathbf{B}\). The latter is not strictly necessary; the method by which the control signal is generated implicitly assumes equally-weighted forcing on all state variables, so working in the space of the truncated SVD on delay coordinates it can be assumed that \(\mathbf{B}\) is the identity \({\bf I}_r\). There exists a variation on DMDc which assumes \(\mathbf{B}\) is known, but even the general algorithm reliably discovers this to a good approximation, so there is little practical difference. Figure [\[fig:DMDc_comparison\]](#fig:DMDc_comparison){reference-type="ref" reference="fig:DMDc_comparison"} shows results from the application of this method to the chaotically forced Van der Pol system used in the previous section. Two DMDc models are trained: one using the ground truth forcing used in the initial simulation, and one using the discovered forcing obtained from the delay DMD method. In order to apply the original forcing to the model in rank-reduced SVD delay coordinates, it is transformed \(\mathbf{u}(t) \in \mathbb{R}^2 \rightarrow \tilde{\mathbf{u}}(t) \in \mathbb{R}^r\) by time-delay embedding and projecting the result onto the top \(r\) PCT modes. Note that while the DMDc models are trained on the first half of the plotted time series and tested on the remainder, these results should not be interpreted as true forecasts. The models are supplied with forcing data for the full duration, derived either from the original simulation (true forcing) or from the first pass of DMD without control (discovered forcing). This effectively grants the models some foreknowledge of impending dynamics which would not be available for future-state prediction tasks. Rather, the plots of Fig. [\[fig:DMDc_comparison\]](#fig:DMDc_comparison){reference-type="ref" reference="fig:DMDc_comparison"} are intended to exhibit the results of the DMDc method applied to a system for which the dominant contribution to the stepwise forecast residual is a known external actuation. The plots illustrate the method's ability to reconstruct observed dynamics equally well with or without ground truth knowledge of the underlying actuation. # Application: Discovering forcing on real-world data with inherent periodicity {#sec:power_grid} As an example of the practical diagnostic utility of this method, we apply it to power grid demand data published as part of the RE-Europe data set. Electrical load is sampled hourly over a period from 2012 through 2014. Data is presented for many geolocated nodes of a reduced network representation of the European grid, which we average over to obtain a single time series for each country surveyed. This subject was chosen as an example of a real-world data series which contains strong periodic signatures: daily, weekly, and yearly cycles are all quite obviously present, and indeed dominate much of the observed behavior. But the dynamics are of course not entirely periodic; electricity demand is mediated by collective human behaviors, which are in turn influenced by weather patterns, economic trends, and uncountably many other variables. Casting these dynamics as a linear control system in time-delay coordinates effectively separates these factors, with predictable periodicities represented in eigenvalues of the DMD \(\mathbf{A}\) matrix and everything else contained in the discovered control signal \(\tilde{\mathbf{u}}(t)\). There is no ground truth against which to validate results, as the "true" forcing is not a measurable quantity, but we can offer some qualitative observations which corroborate the idea that \(\tilde{\mathbf{u}}(t)\) should encode anomalies in human behaviors as they pertain to electricity consumption. Results are plotted in Fig. [\[fig:power_grid_plot\]](#fig:power_grid_plot){reference-type="ref" reference="fig:power_grid_plot"} for the load data from Germany and Italy. As discussed previously, DMD (like most numerical methods) cannot easily accommodate models with dynamics on highly disparate timescales, such as daily and yearly oscillations. To circumvent this issue we run decompositions on a sliding window of approximately 2 weeks over the full sampling period. This is a sufficiently narrow domain to render seasonal variations negligible over the course of any given sub-series. Forcing signals are then inferred individually for each windowed iteration and then averaged to form a global \(\tilde{\mathbf{u}}(t)\) for the full two-year span. The most salient features in the results are large annual spikes in which forcing takes on an anomalously high value followed immediately by an anomalous low. Both nations exhibit this pattern once per year in December, and Italy additionally evinces a similar phenomenon (albeit slightly horizontally stretched) in the late summer of every year. This is highly consistent with known behavioral signatures in these countries: both celebrate Christmas with school holidays, business closures, etc., and August is widely observed as a national vacation month in Italy. That these breaks in human routine lead to by far the most prominent spikes in the learned forcing signals (while their influence is overshadowed by standard daily oscillations in the original data) suggests even in the absence of ground truth that this method has to some nontrivial extent successfully disambiguated the quasilinear oscillations which dominate the load data from anomalous activity resulting from more complex environmental variables. This could have far-reaching implications for forecasting of time series such as these, in that it separates the more easily predicted, relatively deterministic dynamics from aperiodic factors which may be better modeled stochastically. The success of this method in recovering the \(u(t)\) signal of the Van der Pol system in Eq. [\[eq:forced_vdp\]](#eq:forced_vdp){reference-type="ref" reference="eq:forced_vdp"} was owed in part to the contrived simplicity of this example. For more generic input data, the discovered forcing is not solely determined by true exogeneous actuation of the underlying system. The learned signal also incorporates contributions from any endogenous chaotic (continuous-spectrum) dynamics which cannot be reproduced by the linear Koopman model, as well as any sampling errors that might originate from an imperfect DMD model regression or measurement noise. The Van der Pol example from Fig. [\[fig:discovered_forcings\]](#fig:discovered_forcings){reference-type="ref" reference="fig:discovered_forcings"} minimized these confounding effects because it had a discrete spectrum and the DMD model was regressed on ample, noise-free data. Applying the same procedure to the more complex grid load data demands a slightly more careful interpretation of the results. In a case like this, the difference between external forcing and internal chaotic nonlinearity is not particularly clear. The underlying dynamics governing demand for electricity are complex to the point that there is no obvious distinction between what would qualify as an internal state variable versus an external environmental variable. As a result, it is in many cases philosophically appropriate that the method proposed in this paper makes no attempt to disambiguate between the two. The additional contributions of sampling error and measurement noise also bear acknowledgment, but with enough data to capture all major periodicities of the data the former is likely to be negligible, and the latter would simply pass through and produce a noise floor in the learned forcing (provided that measurement errors are uncorrelated). The spikes in the discovered forcing in the electrical grid load data should therefore be interpreted as affirmative indications of strong disturbances to otherwise nearly-linear dynamics, with the caveat that these disturbances may be endogeneous or exogeneous in origin. It is possible that some further distinction could be made using statistical methods designed to chaotic dynamics from stochastic processes, as in   or  , but that is beyond the scope of this paper. # Conclusions Since the seminal contributions of Takens, time-delay embeddings of dynamical systems have long been known to contain critical and representative information about the underlying dynamical system measured. In recent years, the advent of high-quality time-series measurements from spatio-temporal systems have afforded the community unprecedented opportunities for constructing data-driven models from such measurement data alone. Not only can time-delay embeddings extract meaningful information from unmeasured latent variables, but such embeddings can be used as a data-driven coordinate system approximating the Koopman operator. The work here advocates the use of these time-delay embeddings for constructing *principal component trajectories* (PCT) which provide a time-delay coordinate system which can be used to reconstruct dynamical trajectories via superposition. Indeed, the PCT provide an ideal representation of many dynamical systems and their time-series, especially in systems where an unmeasured latent space is critical to the dynamics. The method is shown to be intimately connected to SSA where various theoretical guarantees are available for infinite time-delay embeddings. PCT also provide a coordinate system that can be used in conjunction with the DMD algorithm for producing good Koopman operator approximations. It can even be augmented to include external forcing terms in order to model the effects of a continuous spectrum. Such forcing terms are determined and constructed in a completely unsupervised fashion, allowing for a data-driven discovery process that can produce Koopman models which approximate both discrete and continuous spectral dynamics. We offer a demonstration of this method applied to real-world power grid load data to show its utility for diagnostics and interpretation on systems in which somewhat periodic behavior is strongly actuated by unknown and unmeasurable environmental variables. This example illustrates how a completely data-driven method and PCT coordinates can be used in practice. It will be interesting to apply this approach to analyze other complex systems, such as for fluid flow control , which would benefit from the disambiguation of the linear dynamics and external forcing. Extending these approaches to more complex systems is an area of future research.
{'timestamp': '2022-01-14T02:00:54', 'yymm': '2005', 'arxiv_id': '2005.14321', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14321'}
null
null
null
null
# Introduction The Heisenberg uncertainty relation is perhaps best known in the form \[\label{QP} \sigma_{Q,\psi}\, \sigma_{P,\psi} \geq \frac{\hbar}{2}\] due to Kennard, where \(\sigma_{Q,\psi}\) and \(\sigma_{P,\psi}\) are the standard deviations of the probability distributions of position and momentum associated with a given wave function \(\psi\) of norm 1. A well-known generalization to arbitrary self-adjoint operators \(A,B\) in the place of \(Q,P\), established by Robertson and Schrödinger, asserts that \[\label{AB} \sigma_{A,\psi} \,\sigma_{B,\psi} \geq \tfrac{1}{2} \Bigl| \scp{\psi}{[A,B]|\psi} \Bigr|\.\] It was expected already in the early days of quantum mechanics that a relation of the form \[\label{TE} \sigma_{T,\psi}\, \sigma_{E,\psi}\geq \frac{\hbar}{2}\] should hold between time \(T\) and energy \(E\); however, it is far from obvious which "time observable" should be meant here, and various possibilities have been discussed in the literature, see, e.g., and the references therein. In Section [3](#sec:pfTE){reference-type="ref" reference="sec:pfTE"}, we prove [\[TE\]](#TE){reference-type="eqref" reference="TE"} for a particular time observable, the time at which a non-relativistic quantum particle, whose initial wave function \(\psi_0\) is concentrated in some region \(\Omega\subset \mathbb{R}^3\) of physical space, gets registered by ideal detectors placed along the surface \(\partial \R\) of \(\Omega\). Mathematically, we take this observable to be defined by the *absorbing boundary rule*, which asserts that, in the presence of such detectors, \(\psi\) evolves for \(t\geq 0\) according to the Schrödinger equation \[\label{Schr} i\hbar\frac{\partial \psi}{\partial t} =-\frac{\hbar^2}{2m} \nabla^2 \psi\] with the absorbing boundary condition \[\label{abc} \boldsymbol{n}(\boldsymbol{x}) \cdot \nabla \psi(\boldsymbol{x}) = i\kappa\psi(\boldsymbol{x})\] for every \(\boldsymbol{x}\in\partial \R\), where \(\boldsymbol{n}(\boldsymbol{x})\) is the outward unit normal vector to \(\partial \R\) at \(\boldsymbol{x}\) and \(\kappa>0\) is a constant (the wave number of sensitivity of the detectors). The rule asserts further that the probability that the time \(T\) and location \({\boldsymbol{X}}\) of detection lie in the interval \([t,t+dt]\) and the surface element \(d^2\boldsymbol{x}\) in \(\partial \R\) around \(\boldsymbol{x}\), respectively, is given by \[\begin{aligned} \mathrm{Prob}_{\psi_0}\bigl(T\in dt, {\boldsymbol{X}}\in d^2\boldsymbol{x}\bigr) &= \boldsymbol{n}(\boldsymbol{x}) \cdot {\boldsymbol{j}}^{\psi_t}(\boldsymbol{x}) \,dt\, d^2\boldsymbol{x} \label{prob1}\\ &= \tfrac{\hbar\kappa}{m} |\psi_t(\boldsymbol{x})|^2 \, dt\,d^2\boldsymbol{x}\,,\label{prob2} \end{aligned}\] where it is assumed that \(\|\psi_0\|=1\), \({\boldsymbol{j}}^{\psi}\) is the usual probability current associated with \(\psi\), \[\label{jdef} {\boldsymbol{j}}^{\psi} = \tfrac{\hbar}{m} \, \Im[\psi^* \nabla \psi]\,,\] and [\[prob1\]](#prob1){reference-type="eqref" reference="prob1"} and [\[prob2\]](#prob2){reference-type="eqref" reference="prob2"} are equivalent by virtue of the boundary condition [\[abc\]](#abc){reference-type="eqref" reference="abc"}. The absorbing boundary rule represents an ideal "hard" detector, i.e., one that detects the particle as soon as it reaches \(\partial \R\), as opposed to a "soft" detector that may take a while to notice a particle moving through the detector volume. Soft detectors can be conveniently modeled through imaginary potentials; an energy--time uncertainty relation concerning the time at which a soft detector clicks was established by Kiukas et al. . That result, together with the facts that the relation does not depend on the parameters of the soft detector and that the absorbing boundary rule can be obtained as a limit of soft detectors, could also provide a strategy for proving [\[TE\]](#TE){reference-type="eqref" reference="TE"} for hard detectors; however, this strategy is not straightforward because the relevant limit involves changing the detector volume and thus the Hilbert space. Be that as it may, we will give a different, direct proof of [\[TE\]](#TE){reference-type="eqref" reference="TE"} for the absorbing boundary rule. In the event that the particle is never detected, we write \(T=\infty\). The probability \[p:= \mathrm{Prob}_{\psi_0}(T<\infty)\] is 1 if \(\Omega\) is a bounded set, but may otherwise be less than 1, for example when \(\Omega\) is a half space. If \(0<p<1\) then \(T\) necessarily has infinite mean and variance, so [\[TE\]](#TE){reference-type="eqref" reference="TE"} is trivially true because \(\sigma_{T,\psi}=\infty\). In such a scenario it may be of interest (as suggested in ) to consider the conditional distribution of \(T\), given that \(T<\infty\), and define \(\sigma_{T,\psi}\) as the standard deviation of *that* distribution; for this case we will show in Section [4](#sec:pfTEp){reference-type="ref" reference="sec:pfTEp"} that \[\label{TEp} \sigma_{T,\psi} \, \sigma_{E,\psi} \geq \sqrt{p}\frac{\hbar}{2}\] instead of [\[TE\]](#TE){reference-type="eqref" reference="TE"}. It is noteworthy that the constant in [\[TE\]](#TE){reference-type="eqref" reference="TE"} does not depend on the detector parameter \(\kappa\), and that the constant in [\[TEp\]](#TEp){reference-type="eqref" reference="TEp"} depends on it only through \(p\). The question thus arises whether the constants in [\[TE\]](#TE){reference-type="eqref" reference="TE"} and [\[TEp\]](#TEp){reference-type="eqref" reference="TEp"} are sharp; at present, I cannot answer this question. (I give some discussion at the end of Section [3](#sec:pfTE){reference-type="ref" reference="sec:pfTE"}.) It would also be of interest to study whether the relation \[\mathbb{E}_\psi\bigl[ T |T<\infty\bigr] \: \sigma_{E,\psi} \geq C \, \sqrt{p} \, \hbar\] with \(\mathbb{E}_\psi[ T |T<\infty]\) the expectation of \(T\) conditional on \(T<\infty\), proved in for soft detectors, is also true for the absorbing boundary rule, and if so, what the optimal value of the numerical constant \(C\) is. Likewise, relations between the means of \(T\) and \(E\), i.e., \(\mathbb{E}_\psi[ T |T<\infty]\) and \(\mathbb{E}_\psi E\), would be of interest. These questions will not be addressed here. # Definition of Energy We need to say more about the exact statement involving [\[TE\]](#TE){reference-type="eqref" reference="TE"}, in particular what exactly the quantities in [\[TE\]](#TE){reference-type="eqref" reference="TE"} mean for us. As mentioned, the quantity \(\sigma_{T,\psi}\) in [\[TE\]](#TE){reference-type="eqref" reference="TE"} is the standard deviation of the probability distribution of \(T\), \[\label{sigmaT} \sigma_{T,\psi}^2 = \mathrm{Var}(T)=\mathbb{E}_\psi \bigl[ (T-\mathbb{E}_\psi T)^2 \bigr]\.\] We assume that \(\psi=\psi_0\) is smooth with compact support that does not touch \(\partial \R\); for such \(\psi\) we write \(\psi\in C_0^\infty(\Omega\setminus\partial \R)\). For the proof to go through, however, it suffices to make the weaker assumption that \(\psi\) lies in the domain \(D(H^2)\) of \(H^2\) and is such that both \(\psi\) and \(H\psi\) vanish on the boundary. It follows from [\[prob2\]](#prob2){reference-type="eqref" reference="prob2"} that the probability distribution of \(T\) is given by a POVM (positive-operator-valued measure ) \(F(\cdot)\) in the sense that \[\mathrm{Prob}_{\psi_0}(T\in\Delta) = \scp{\psi_0}{F(\Delta)|\psi_0}\] for every (measurable) set \(\Delta \subseteq [0,\infty]\). Since the distribution of \(T\) is given by a POVM, not a self-adjoint operator, the Robertson--Schrödinger inequality [\[AB\]](#AB){reference-type="eqref" reference="AB"} does not directly apply to yield the desired relation [\[TE\]](#TE){reference-type="eqref" reference="TE"}. The POVM can be expressed as \[\begin{aligned} F \bigl( dt \bigr) &= \tfrac{\hbar\kappa}{m} \, W_t^* \biggl(\int_{\partial \R} d^2\boldsymbol{x} \, |\boldsymbol{x}\rangle\langle\boldsymbol{x}| \biggr) W_t\, dt \\ &=-\tfrac{i}{\hbar} W_t^*(H^*-H)W_t \, dt\\[2mm] F (\{\infty\}) &=\lim_{t\to\infty} W_t^* W_t \end{aligned}\] with \({}^*\) denoting the adjoint operator and \(W_t\) the (non-unitary) linear operator that maps \(\psi_0\) to \(\psi_t\) solving [\[Schr\]](#Schr){reference-type="eqref" reference="Schr"} and [\[abc\]](#abc){reference-type="eqref" reference="abc"}. The operators \(W_t\) are of the form \(W_t=e^{-iHt/\hbar}\) for \(t\geq 0\) but the Hamiltonian \(H\) is *not* self-adjoint. The \(W_t\) have the properties \(W_0=I\), \(W_t W_s=W_{t+s}\), and \(\|W_t\psi\|\leq \|\psi\|\); that is, they form a *contraction semigroup*. This brings us to the question of what exactly is meant by \(\sigma_{E,\psi}\). The question arises because the Hamiltonian \(H\) is not self-adjoint and, in fact, not unitarily diagonalizable (it is not a "normal" operator, its self-adjoint and its skew-adjoint part do not commute and therefore cannot be simultaneously diagonalized ). As a consequence, there is no PVM (projection-valued measure) or POVM associated with \(H\), so it is far from clear whether and how a probability distribution (over real or complex "energies") can be associated with \(H\) and \(\psi=\psi_0\). We will use instead the free Hamiltonian \[H_{\mathrm{free}}=-\frac{\hbar^2}{2m}\nabla^2\] on (the appropriate domain in) \(L^2(\mathbb{R}^3)\) (i.e., the second Sobolev space). This is anyhow what one would naturally regard as the "energy distribution" of \(\psi\in C_0^\infty(\Omega\setminus\partial \R)\). The free Hamiltonian is self-adjoint and thus associated with a PVM that defines, for every \(\psi\in L^2(\mathbb{R}^3)\), a probability distribution on the energy axis. In fact, this distribution is concentrated on the positive half axis and there has density \[\rho(E)= \frac{\sqrt{2m^3E}}{\hbar^3}\int_{\mathbb{S}^2}d^2{\boldsymbol{\omega}} \,\biggl|\widehat{\psi}\biggl(\frac{\sqrt{2mE}}{\hbar}{\boldsymbol{\omega}}\biggr)\biggr|^2 \,,\] where \(\mathbb{S}^2=\{{\boldsymbol{\omega}}\in\mathbb{R}^3:|{\boldsymbol{\omega}}|=1\}\) is the unit sphere, \(d^2{\boldsymbol{\omega}}\) the surface element (\(\sin \theta \, d\theta \, d\varphi\) in spherical coordinates), and \(\widehat{\psi}\) the Fourier transform of \(\psi\). The standard deviation of this distribution is \(\sigma_{E,\psi}\). Equivalently, \[\label{sigmaEHfree} \sigma_{E,\psi}^2 = \scp{\psi}{H_{\mathrm{free}}^2|\psi}-\scp{\psi}{H_{\mathrm{free}}|\psi}^2\.\] The following observation about \(\psi\in C_0^\infty(\Omega\setminus\partial \R)\) is relevant here: Consider the three different viewpoints of taking the Hamiltonian to be \(H\) (and regarding \(\psi\) as an element of \(L^2(\Omega)\)), or of taking the Hamiltonian to be \(H_{\mathrm{free}}\) (and regarding \(\psi\) as an element of \(L^2(\mathbb{R}^3)\)), or of taking the Hamiltonian to be \(H_{\mathrm{Dir}}=-(\hbar^2/2m)\nabla^2\) with Dirichlet boundary conditions on \(\partial \R\) (and regarding \(\psi\) as an element of \(L^2(\Omega)\) again). The latter two viewpoints lead to completely different probability distributions over the energy axis (one is continuous, the other discrete for bounded \(\Omega\)), but both have the same mean and variance, as the mean is given by \[\scp{\psi}{H_{\mathrm{free}}|\psi}=\scp{\psi}{H_{\mathrm{Dir}}|\psi}\] (because for a function not touching the boundary, both \(H_{\mathrm{free}}\) and \(H_{\mathrm{Dir}}\) are given by \(-(\hbar^2/2m)\nabla^2\)), and the variance by \[\scp{\psi}{H_{\mathrm{free}}^2|\psi}-\scp{\psi}{H_{\mathrm{free}}|\psi}^2=\scp{\psi}{H_{\mathrm{Dir}}^2|\psi}-\scp{\psi}{H_{\mathrm{Dir}}|\psi}^2\] (because both \(H_{\mathrm{free}}^2\) and \(H_{\mathrm{Dir}}^2\) are \((\hbar^4/4m^2)\nabla^4\)). Furthermore, the standard formulas for the mean and variance, \(\scp{\psi}{H|\psi}\) and \(\scp{\psi}{H^2|\psi}-\scp{\psi}{H|\psi}^2\), applied to the non-self-adjoint \(H\), still yield the same values, for \(\psi\in C_0^\infty (\Omega\setminus\partial \R)\), as \(H_{\mathrm{free}}\) and \(H_{\mathrm{Dir}}\). That is why \(\sigma_{E,\psi}\) can still be expressed in terms of \(H\) as \[\label{sigmaH} \sigma_{E,\psi}^2 = \scp{\psi}{H^2|\psi}-\scp{\psi}{H|\psi}^2\.\] As another remark, I mention that our proofs of [\[TE\]](#TE){reference-type="eqref" reference="TE"} and [\[TEp\]](#TEp){reference-type="eqref" reference="TEp"} remain valid if a bounded, smooth potential \(V:\mathbb{R}^3\to\mathbb{R}\) with bounded derivatives is added to the Schrödinger equation [\[Schr\]](#Schr){reference-type="eqref" reference="Schr"}, and \(\sigma_{E,\psi}\) is understood as the standard deviation for \(-(\hbar^2/2m)\nabla^2+V\), in agreement with [\[sigmaH\]](#sigmaH){reference-type="eqref" reference="sigmaH"}. While for the uncertainty relation [\[QP\]](#QP){reference-type="eqref" reference="QP"} between position and momentum, the choice of potential is irrelevant, the relation [\[TE\]](#TE){reference-type="eqref" reference="TE"} between time and energy is affected by the choice of \(V\) in two ways: first, because \(V\) is part of the meaning of the energy \(E\), and second, because the choice of \(V\) affects the time evolution and thus the probability distribution of \(T\). # Proof of [\[TE\]](#TE){reference-type="eqref" reference="TE"} {#sec:pfTE} We first focus on the case that \(p=\mathrm{Prob}(T<\infty)=1\) for all \(\psi\). We formulate our result for \(V=0\). For definiteness, we take \(\Omega\) to be open, \(\Omega=\Omega\setminus \partial \R\). on \(\psi\) from the domain of \(H\) and by continuation on other \(\psi\)s from \(L^2(\Omega)\), is a unitary isomorphism between \(\mathscr{H}=L^2(\Omega)\) and a subspace of \(\mathscr{H}_{>}=L^2([0,\infty)\times\partial \R)\); the natural PVM on \(\mathscr{H}_{>}\) is the Naimark dilation of the joint POVM for detection time \(T\) and detection location \({\boldsymbol{X}}\); \(T\) corresponds to a self-adjoint operator \(\hat T = t\) on \(\mathscr{H}_{>}\), where \(t\) means multiplication by the variable \(t\), and the probability distribution of \(T\) for \(\psi\in\mathscr{H}\) with \(\|\psi\|=1\) is exactly the distribution associated with \(\hat T\) and \(J\psi\). The time evolution \(W_t\) gets mapped by \(J\) to the shift \(S_t\) on \(\mathscr{H}_{>}\), \(S_t \phi(s,\boldsymbol{x})=\phi(s+t,\boldsymbol{x})\) (by virtue of the semigroup property): \[\label{JW} JW_t=S_tJ\.\] Correspondingly, \(H\) gets mapped by \(J\) to the generator \(H_{>}\) of the semigroup \((S_t)_{t\geq 0}\), i.e., \(H_{>}= i\hbar\partial/\partial t\), which is no longer self-adjoint because of the boundary at \(t=0\). We will also regard \(\mathscr{H}_{>}\) as a subspace of \(\widetilde\mathscr{H}= L^2(\mathbb{R}\times \partial \R)\) (by setting \(\phi(t,\boldsymbol{x})=0\) for \(t<0\)) with \(\widetilde S_t\) the shift defined for positive or negative \(t\). Note that \(\widetilde S_t\) does not agree with \(S_t\) even for positive \(t\); \(\mathscr{H}_{>}\) is not invariant under \(\widetilde S_t\) for \(t>0\), and \(S_t f \neq \widetilde S_t f\) for \(f\in\mathscr{H}_{>}\subset \widetilde \mathscr{H}\). Rather, for such \(f\), \(S_t f=P_{>}\widetilde{S}_t f\) with \(P_{>}\) the projection \(\widetilde{\mathscr{H}}\to \mathscr{H}_{>}\). The group \(S_t\) is generated by the operator \(\widetilde H = i\hbar\partial/\partial t\), whose formula looks the same as that of \(H_{>}\), but the domain of \(\widetilde H\) is different from that of \(H_{>}\), and \(\widetilde H\) is self-adjoint whereas \(H_{>}\) is not. The domain of \(\widetilde H\) is \(H^1(\mathbb{R},L^2(\partial \R))\), that of \(H_{>}\) is \(P_{>}H^1(\mathbb{R},L^2(\partial \R))\). The multiplication by \(t\) also defines a self-adjoint operator \(\widetilde T\) on \(\widetilde\mathscr{H}\), and for \(f\in \mathscr{H}_{>}\subset \widetilde\mathscr{H}\), \(\hat T f = \widetilde T f\). Now on \(\widetilde\mathscr{H}\), there is an uncertainty relation between \(\widetilde T\) and \(\widetilde H\): For any \(\phi\in\widetilde \mathscr{H}\) with \(\|\phi\|=1\), \[\label{uncertaintywidetilde} \sigma_{\widetilde T,\phi} \, \sigma_{\widetilde H,\phi} \geq \frac{\hbar}{2}\.\] This is simply the uncertainty relation [\[QP\]](#QP){reference-type="eqref" reference="QP"} for position and momentum because \(t\) is now one of the variables in \(\psi\), analogous to position, and \(\widetilde H\) is the derivative relative to \(t\), analogous to momentum. Here, we need to comment on the mathematical conditions of the validity of [\[QP\]](#QP){reference-type="eqref" reference="QP"}. The question is whether, for [\[QP\]](#QP){reference-type="eqref" reference="QP"} to be valid, \(\psi\) needs to lie in the domain of \(Q\) and that of \(P\), or perhaps even in the domain of \(QP\) and that of \(PQ\). The answer is that [\[QP\]](#QP){reference-type="eqref" reference="QP"}, when understood appropriately, is valid for every \(\psi\in L^2(\mathbb{R})\) with \(\|\psi\|=1\) (whereas this is not true in general for [\[AB\]](#AB){reference-type="eqref" reference="AB"} ). Let us explain. Let \(A\) be a self-adjoint operator in the Hilbert space \(\mathscr{H}\) and \(\psi\in\mathscr{H}\) with \(\|\psi\|=1\). Then \(\psi\) defines a probability distribution on the spectrum of \(A\), the Born distribution \(\scp{\psi}{P(\cdot)|\psi}\) with \(P\) the spectral PVM of \(A\), \(A=\int_{\mathbb{R}}P(d\alpha) \, \alpha\). The Born distribution has finite expectation and variance if and only if \(\psi\) lies in the domain of \(A\). In that case, the variance is given by \[\label{sigmaA} \sigma_{A,\psi}^2=\|A\psi\|^2-\scp{\psi}{A\psi}^2\.\] Thus, for every \(\psi\in L^2(\mathbb{R})\) with \(\|\psi\|=1\) that lies in both the domain of \(Q\) and that of \(P\), \(\sigma_{Q,\psi}\) and \(\sigma_{P,\psi}\) are well defined and finite. For those \(\psi\), [\[QP\]](#QP){reference-type="eqref" reference="QP"} can be proved. However, since for \(\psi\) not in the domain of \(Q\), \(\sigma_{Q,\psi}=\infty\), and since there is no unit vector in \(L^2(\mathbb{R})\) for which either \(\sigma_Q\) or \(\sigma_P\) vanishes, the left-hand side of [\[QP\]](#QP){reference-type="eqref" reference="QP"} is infinite (and the relation trivially true) for every \(\psi\) not in both the domain of \(Q\) and that of \(P\). Thus, [\[QP\]](#QP){reference-type="eqref" reference="QP"} is plainly and cleanly valid for all wave functions. The remainder of the reasoning is about the implications of the relation [\[uncertaintywidetilde\]](#uncertaintywidetilde){reference-type="eqref" reference="uncertaintywidetilde"} in \(\widetilde\mathscr{H}\) for \(\psi\) that vanishes along with \(H\psi\) on \(\partial \R\), such as \(\psi\in C_0^\infty(\Omega)\). Since \(\psi\) lies in the domain of \(H\), \(J\psi\) lies in the domain of \(H_{>}\), and \(H_{>}J\psi=JH\psi\). Moreover, \(J\psi(t=0,\boldsymbol{x})=0\) (because \(\psi\) vanishes on \(\partial \R\)), and \((\partial/\partial t)J\psi(t=0,\boldsymbol{x})=0\) in \(L^2(\partial \R)\) (because \(H\psi\) still lies in the domain of \(H\) and thus has a trace on \(\partial \R\), which in fact is zero). Therefore, \(J\psi\) also lies in the domain of \(\widetilde{H}\), and \[\widetilde{H}J\psi = H_{>}J\psi = JH\psi\.\] Thus, by [\[sigmaA\]](#sigmaA){reference-type="eqref" reference="sigmaA"}, using that \(J\) is a unitary isomorphism and [\[sigmaH\]](#sigmaH){reference-type="eqref" reference="sigmaH"}. On the other hand, \[\begin{aligned} \sigma_{\widetilde{T},J\psi}^2 &=\scp{J\psi}{\widetilde{T}^2|J\psi}-\scp{J\psi}{\widetilde{T}|J\psi}^2\\ &=\scp{J\psi}{\hat{T}^2|J\psi}-\scp{J\psi}{\hat{T}|J\psi}^2\\[2mm] &=\sigma_{T,\psi}^2\,, \end{aligned}\] which completes the proof of [\[TE\]](#TE){reference-type="eqref" reference="TE"}. ◻ Since for any self-adjoint operator \(A\), the variance \(\sigma^2_A\) does not change when adding a constant \(c\in\mathbb{R}\) to \(A\), \(\sigma^2_{A+cI}=\sigma^2_A\), we can replace \(\widetilde{H}\) in [\[Hp\]](#Hp){reference-type="eqref" reference="Hp"} by \(\widetilde{H}+E_0I\); thus, for any \(E_0\in \mathbb{R}\), \[\label{Hfreep} \frac{\hbar^2}{4\sigma^2_{T,J\psi/\sqrt{p}}} \leq \frac{1}{p} \bigl\| (H_\mathrm{free}+E_0I) \psi\bigr\|^2\.\] Since for any real random variable \(X\), its variance can be characterized as \[\text{Var} \, X = \inf_{c\in\mathbb{R}} \mathbb{E}\bigl[ (X-c)^2 \bigr]\,,\] we have that for any observable \(A\), \[\sigma_{A,\psi}^2 = \inf_{c\in\mathbb{R}} \scp{\psi}{(A-cI)^2|\psi}\,,\] in particular \[\sigma_{H_\mathrm{free},\psi}^2= \inf_{E_0\in\mathbb{R}} \bigl\| (H_\mathrm{free}+E_0I) \psi\bigr\|^2\.\] Thus, with [\[Hfreep\]](#Hfreep){reference-type="eqref" reference="Hfreep"}, \[\frac{\hbar^2}{4\sigma^2_{T,J\psi/\sqrt{p}}} \leq \frac{1}{p} \sigma_{H_\mathrm{free},\psi}^2\,,\] which is just a different notation for the desired relation [\[TEp\]](#TEp){reference-type="eqref" reference="TEp"}, so the proof is complete. ◻ ::: I thank Stefan Teufel for helpful discussion.
{'timestamp': '2020-06-01T02:11:00', 'yymm': '2005', 'arxiv_id': '2005.14514', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14514'}
# Introduction {#sec:introduction} The combination of ubiquitous multimedia and high performance computing resources has inspired numerous efforts to *manipulate* audio-visual content for both benign and sinister purposes. Recently, there has been a lot of interest in the creation and detection of high-quality videos containing facial and auditory manipulations, popularly known as *deepfakes* . Since fake videos are often indistinguishable from genuine counterparts, detection of deepfakes is challenging but topical given their potential for denigration and defamation, especially against women and in propagating misinformation . Part of the challenge in detecting deepfakes via artifical intelligence (AI) approaches is that deepfakes are themselves created via AI techniques. Neural network-based architectures like Generative Adversarial Networks (GANs)  and Autoencoders  are used for generating fake media content, and due to their 'learnable' nature, output deepfakes become more naturalistic and adept at cheating fake detection methods over time. Improved deepfakes necessitate novel fake detection (FD) solutions; FD methods have primarily looked at frame-level visual features  for statistical inconsistencies, but temporal characteristics  have also been examined of late. Recently, researchers have induced audio-based manipulations to generate fake content, and therefore, corruptions can occur in both the visual and audio channels. Deepfakes tend to be characterized by visual inconsistencies such as a lack of lip-sync, unnatural facial and lip appearance/movements or assymmetry between facial regions such as the left and right eyes (see Fig. [\[fig:localisation\]](#fig:localisation){reference-type="ref" reference="fig:localisation"} for an example). Such artifacts tend to capture user attention. Authors of  performed a psycho-physical experiment to study the effect of *dissonance*, *i.e.*, lack of sync between the audio and visual channels on user attention and memory. Three different versions of four TV news stories were shown to users, one having perfect audio-visual sync, a second with some asynchrony, and a third with no sync. The study concluded that out-of-sync or *dissonant* audio-visual channels induced a high user cognitive load, while in-sync audio and video (no dissonance condition) were perceived as a *single stimulus* as they 'belonged together'. We adopt the *dissonance* rationale for deepfake detection, and since a fake video would contain either an altered audio or visual channel, one can expect higher audio-visual dissonance for fake videos than for real ones. We measure the audio-visual dissonance in a video via the ***Modality Dissonance Score*** (MDS), and use this metric to label it as *real*/*fake*. Specifically, audio-visual dissimilarity is computed over 1-second video chunks to perform a fine-grained analysis, and then aggregated over all chunks for deriving MDS, employed as figure-of-merit for video labeling. MDS is modeled based on the *contrastive* loss, which has traditionally been employed for discovering lip-sync issues in video . Contrastive loss enforces the video and audio features to be *closer* for real videos, and *farther* for fake ones. Our method also works with videos involving only the audio/visual channel as our neural network architecture includes the video and audio-specific sub-networks, which seek to independently learn discriminative real/fake features via the imposition of a *cross-entropy* loss. Experimental results confirm that these unimodal loss functions facilitate better real-fake discriminability over modeling only the contrastive loss. Experiments on the DFDC  and DF-TIMIT  datasets show that our technique outperforms the state-of-the-art by upto 7%, which we attribute to the following factors: (1) Modeling unimodal losses in addition to the contrastive loss which measures modality dissonance, and (2) Learning discriminative features by comparing 1-second audio-visual *chunks* to compute MDS, as against directly learning video-level features. Chunk-wise learning also enables *localization* of transient video forgeries (*i.e.*, where only some frames in a sequence are corrupted), while past works have only focused on the *real*-*fake* labeling problem. The key contributions of our work are: (a) We propose a novel multimodal framework for deepfake video detection based on modality dissonance computed over small temporal segments; (b) To our knowledge, our method is the first to achieve temporal forgery localization, and (c) Our method achieves state-of-art results on the DFDC dataset, improving AUC score by up to 7%. # Literature Review Recently, considerable research efforts have been devoted to detecting fake multimedia content automatically and efficiently. Most video faking methods focus on manipulating the video modality; audio-based manipulation is relatively rare. Techniques typically employed for generating fake visual content include 3D face modeling, computer graphics-based image rendering, GAN-based face image synthesis, image warping, *etc*. Artifacts are synthesized either via face swapping while keeping the expressions intact (*e.g.*, DeepFakes[^1], FaceSwap[^2]) or via facial expression transfer, *i.e.*, facial reenactment (*e.g.*, Face2Face ). Approaches for fake video detection can be broadly divided into three categories as follows: ## Image-based These methods employ image/frame-based statistical inconsistencies for *real*/*fake* classification. For example,  uses visual artifacts such as missing reflections and incomplete details in the eye and teeth regions, inconsistent illumination and heterogeneous eye colours as cues for fake detection. Similarly,  relies on the hypothesis that the 3-D head pose generated using the entire face's landmark points will be very different from the one computed using only the central facial landmarks, in case the face is synthetically generated. Authors of  hypothesize that fake videos contain artifacts due to resolution inconsistency between the warped face region (which is usually blurred) and surrounding context, and models the same via the VGG and ResNet deep network architectures. A capsule network architecture is proposed in  for detecting various kinds of spoofs, such as video replays with embedded images and computer-generated videos. A multi-task learning framework for fake detection-cum-segmentation of manipulated image (or video frame) regions is presented in . It is based on a convolutional neural network, comprising an encoder and a Y-shaped decoder, where information gained by one of the detection/segmentation tasks is shared with the other so as to benefit both tasks. A two-stream network is proposed in , which leverages information from local noise residuals and camera characteristics. It employs a GoogLeNet-based architecture for one stream, and a patch based triplet network as second stream. Authors of  train a CNN, named MesoNet, to classify real and fake faces generated by the DeepFake and Face2face techniques. Given the similar nature of falsifications achieved by these methods, identical network structures are trained for both problems by focusing on mesoscopic properties (intermediate-level analysis) of images. ## Video-based Video-based fake detection methods also use temporal features for classification, since many a time, deepfake videos contain realistic frames but the warping used for manipulation is temporally inconsistent. For instance, variations in eye-blinking patterns are utilized in  to determine real and fake videos. Correlations between different pairs of facial action units across frames are employed for forgery detection in . Authors of  extract frame-level CNN features, and use them to train a recurrent neural network for manipulation detection. ## Audio-visual features based Aforementioned approaches exploit only the visual modality for identifying deepfake videos. However, examining other modalities such as audio signal in addition to the video can also be helpful. As an example, authors of  propose a Siamese network-based approach, which compares the multimedia as well as emotion-based differences in facial movements and speech patterns to learn differences between real and fake videos. Lip-sync detection in unconstrained settings is achieved by learning the *closeness* between the audio and visual channels for in-sync vs out-of-sync videos via contrastive loss modeling in . While this technique is not meant to address deep-fake detection *per se*, lip-sync issues can also be noted from a careful examination of deepfake videos, and the contrastive loss is useful for *tying up* genuine audio-visual pairs. ## Bimodal Approaches While it may be natural to see audio and video as the two main information modes that indicate the genuineness/fakeness of a video, one can also employ multiple cues from the visual modality for identifying fake videos. Multimodal cues are especially useful while tackling sophisticated visual manipulations. In , both intra-frame and inter-frame visual consistencies are modeled by feeding in frame-level CNN features to train a recurrent neural network. Statistical differences between the warped face area and the surrounding regions are learned via the VGG and ResNet architectures in . Hierarchical relations in image (video frame) content are learned via a Capsule Network architecture in . ## Analysis of Related Work Upon examining related literature, we make the following remarks to situate our work with respect to existing works. - While frame-based methods that learn spatial inconsistencies have been proposed to detect deepfakes, temporal-based approaches are conceivably more powerful to this end, as even if the manipulation looks natural in a static image, achieving temporally consistent warping even over a few seconds of video is difficult. Our approach models temporal characteristics, as we consider 1-second long audio-visual segments to distinguish between real and fake videos. Learning over tiny video chunks allows for a fine-grained examination of temporal differences, and also enables our method to temporally *localize* manipulation in cases where the forgery targets only a small portion of the video. To our knowledge, prior works have only focused on assigning a *real*/*fake* video label. - Very few approaches have addressed deepfake detection where the audio/video stream may be corrupted. In this regard, two works very related to ours are  and . In , the contrastive loss function is utilized to enforce a smaller distance between lip-synced audio-visual counterparts; our work represents a novel application of the contrastive loss, employed for lip-sync detection in , to deepfake detection. Additionally, we show that learning audio-visual dissonance over small chunks and aggregating these measures over the video duration is more beneficial than directly learning video-level features. - Both multimedia and emotional audio-visual features are learned for FD in . We differ from  in three respects: (a) While we do not explicitly learn emotional audio-visual coherence, forged videos need not be emotional in nature; audio-visual consistency is enforced via the contrastive loss in our approach. (b) The training framework in  requires a *real*--*fake* video pair. Our approach does not constrain the training process to involve video-pairs, and adopts the traditional training protocol. (c) Whilst  perform a video-level comparison of audio-visual features to model dissonance, we compare smaller chunks and aggregate chunk-wise measures to obtain the MDS. This enables our approach to localize transient forgeries. - Given that existing datasets primarily involve visual manipulations (number of datasets do not have an audio component), our architecture also includes audio and visual sub-networks which are designed to learn discriminative unimodal features via the cross-entropy loss. Our experiments show that additionally including the cross-entropy loss is more beneficial than employing only the contrastive loss. Enforcing the two losses in conjunction enables our approach to achieve state-of-the-art performance on the DFDC dataset. # MDS-based fake video detection As discussed in Section [1](#sec:introduction){reference-type="ref" reference="sec:introduction"}, our FD technique is based on the hypothesis that deepfake videos have *higher dissonance* between the audio and visual streams as compared to real videos. The dissimilarity between the audio and visual channels for a *real*/*fake* video is obtained via the Modality Dissonance Score (MDS), which is obtained as the aggregate dissimilarity computed over 1-second visual-audio chunks. In addition, our network enforces learning of discriminative visual and auditory features even if the contrastive loss is not part of the learning objective; this enables FD even if the input video is missing the audio/visual modality, in which case the contrastive loss is not computable. A description of our network architecture for MDS-based deepfake detection follows. ## Overview Given an input video, our aim is to classify it as *real* or *fake*. We begin with a training dataset \(D = \{(v^1,y^1), (v^2,y^2),..., (v^N,y^N)\}\) consisting of \(N\) videos. Here, \(v^i\) denotes the input video and the label \(y^i \ \epsilon \ \{0,1\}\) indicates whether the video is *real* (\(y^i=0\)) or *fake* (\(y^i=1\)). The training procedure is depicted in Fig. [\[fig:pipeline\]](#fig:pipeline){reference-type="ref" reference="fig:pipeline"}. We extract the audio signal from input video \(v^i\) using the *ffmpeg* library, and split it into \(D\)-second segments. Likewise for the visual modality, we divide the input video into \(D\)-second long segments, and perform face tracking on these video segments using the S3FD face detector  to extract the face crops. This pre-processing gives us segments of visual frames \(\{s^i_1, s^i_2,..., s^i_n\}\) along with corresponding audio segments \(\{a^i_1, a^i_2,..., a^i_n\}\), where \(n\) denotes segment count for an input video \(v^i\). We employ a bi-stream network, comprising the audio and video streams, for deepfake detection. Each video segment \(s^i_t, t= 1 \ldots n\) is passed through a visual stream \(S_v\), and the corresponding audio segment \(a^i_t\) is passed through the audio stream \(S_a\). These streams are described in Sections [3.2](#sec:visual){reference-type="ref" reference="sec:visual"} and [3.3](#sec:audio){reference-type="ref" reference="sec:audio"}. The network is trained using a combination of the *contrastive loss* and the *cross-entropy loss*. The contrastive loss is meant to *tie up* the audio and visual streams; it ensures that the video and audio streams are *closer* for real videos, and *farther* for fake videos. Consequently, one can expect a low MDS for real, and high MDS for fake videos. If either the audio or visual stream is missing in the input video, in which case the contrastive loss is not computable, the video and audio streams will still learn discriminative features as constrained by the unimodal cross-entropy losses. These loss functions are described in Sec. [3.4](#sec:loss){reference-type="ref" reference="sec:loss"}. ## Visual Stream {#sec:visual} The input to the visual stream is \(s^i_t\), a video sequence of size (\(3 \times h \times w \times D*f\)), where 3 refers to the RGB color channels of each frame, \(h, w\) are the frame height and width, \(D\) is the segment length in seconds, and \(f\) is the video frame rate. Table [\[tab:stream_arch\]](#tab:stream_arch){reference-type="ref" reference="tab:stream_arch"} depicts the architecture of the video and audio sub-networks. The visual stream (\(S_v\)) architecture is inspired by the 3D-ResNet similar to. 3D-CNNs have been widely used for action recognition in videos, and ResNet is one of the most popular architectures for image classification. The feature representation learnt by the visual stream, in particular the fc8 output, denoted by \(f_v\) is used to compute the contrastive loss. We also add a 2-neuron classification layer at the end of this stream, which outputs the visual-based prediction label. So the output of this stream, labeled as \(\hat{y}_v^i\), constitutes the unimodal cross-entropy loss. ## Audio Stream {#sec:audio} Mel-frequency cepstral coefficients (MFCC) features are input to the audio stream. MFCC features  are widely used for speaker and speech recognition, and have been the state-of-the-art for over three decades. For each audio segment of \(D\) second duration \(a^i_t\), MFCC values are computed and passed through the audio stream \(S_a\). 13 mel frequency bands are used at each time step. Overall, audio is encoded as a heat-map image representing MFCC values for each time step and each mel frequency band. We base the audio stream architecture on convolutional neural networks designed for image recognition. Contrastive loss \(L_1\) uses the output of fc8, denoted by \(f_a\). Similar to the visual stream, we add a classification layer at the end of the audio stream, and the output \(\hat{y}_a^i\) is incorporated in the cross-entropy loss for the audio modality. ## Loss functions {#sec:loss} Inspired by , we use *contrastive loss* as the key component of the objective function. Contrastive loss enables maximization of the dissimilarity score for manipulated video sequences, while minimizing the MDS for real videos. This consequently ensures separability of the real and fake videos based on MDS (see Fig. [\[fig:Graphs\]](#fig:Graphs){reference-type="ref" reference="fig:Graphs"}). The loss function is represented by Equation [\[eq:1\]](#eq:1){reference-type="ref" reference="eq:1"}. Here, \(y^i\) is the label for video \(v^i\) and *margin* is a hyper-parameter. Dissimilarity score \(d_t^i\), is the Euclidean distance between the (segment-based) feature representations \(f_v\) and \(f_a\) of the visual and audio streams respectively. In addition, we employ the cross-entropy loss for the visual and audio streams to learn feature representations in a robust manner. These loss functions are defined in Equations [\[eq:3\]](#eq:3){reference-type="ref" reference="eq:3"} (visual) and [\[eq:4\]](#eq:4){reference-type="ref" reference="eq:4"} (audio). The overall loss \(L\) is a weighted sum of these three losses, \(L_1, L_2\) and \(L_3\) as in Eq. [\[eq:9\]](#eq:9){reference-type="ref" reference="eq:9"}. \[L_1 = \frac{1}{N} \sum_{i=1}^{N} (y^i) \ (d_t^i)^2 + (1-y^i) \ max(margin-d_t^i,0)^2 \label{eq:1} \\ \] \[d_t^i = \|f_v-f_a\|_2 \label{eq:2}\] \[L_2 =-\ \frac{1}{N} \sum_{i=1}^{N} y^i \ \log{\hat{y}_v^i} \ + (1-y^i) \ \log{(1-\hat{y}_v^i)} \label{eq:3} \\ \] \[L_3 =-\ \frac{1}{N} \sum_{i=1}^{N} y^i \ \log{\hat{y}_a^i} \ + (1-y^i) \ \log{(1-\hat{y}_a^i)} \label{eq:4}\] \[\begin{aligned} L = \ \lambda_1L_1 + \lambda_2L_2 + \lambda_3L_3 \label{eq:9} \end{aligned}\] where \(\lambda_1,\lambda_2, \lambda_3 =1\) in our design. ## Test Inference {#sec:test} During test inference, the visual segments \(\{s^i_1, s^i_2,..., s^i_n\}\) and corresponding audio segments \(\{a^i_1, a^i_2,..., a^i_n\}\) of a video are passed through \(S_v\) and \(S_a\), respectively. For each such segment, dissimilarity score \(d_t^i\) (Equation [\[eq:2\]](#eq:2){reference-type="ref" reference="eq:2"}) is accumulated to compute the MDS as below: \[MDS_i = \frac{1}{n} \sum_{t=1}^{n} d^i_t \label{eq:5}\] To label the test video, we compare \(MDS_i\) with a threshold \(\tau\) using \(1\{MDS_i < \tau\}\) where \(1\{.\}\) denotes the logical indicator function. \(\tau\) is determined on the training set. We compute MDS for both real and fake videos of the train set, and the midpoint between the average values for the real and fake videos is used as a representative value for \(\tau\). # Experiments ## Dataset Description As our method is multimodal, we use two public audio-visual deepfake datasets in our experiments. Their description is as follows:\ \ **Deepfake-TIMIT :** This dataset contains videos of 16 similar looking pairs of people, which are manually selected from the publicly available VIDTIMIT database and manipulated using an open-source GAN-based[^3] approach. There are two different models for generating fake videos, one Low Quality (LQ), with \(64\times64\) input/output size, and the other High Quality (HQ), with \(128\times128\) input/output size. Each of the 32 subjects has 10 videos, resulting in a total of 640 face swapped videos in the dataset; each video is of \(512\times384\) resolution with 25 fps frame rate, and of \(\approx 4s\) duration. However, the audio channel is not manipulated in any of the videos.\ **DFDC dataset :** The preview dataset, comprising of 5214 videos was released in Oct 2019 and the complete one with 119,146 videos in Dec 2019. Details of the manipulations have not been disclosed, in order to represent the real adversarial space of facial manipulation. The manipulations can be present in either audio or visual or both of the channels. In order to bring out a fair comparison, we used 18,000 videos[^4] in our experiments. The videos are of \(\approx10s\) duration each with an fps of 30, so there are \(\approx300\) frames per video. ## Training Parameters For both the datasets, we used \(D=1\) second segment duration and the margin hyper-parameter described in Equation [\[eq:1\]](#eq:1){reference-type="ref" reference="eq:1"} was set to 0.99. This resulted in (3 x 30 x 224 x 224) dimensional input for the visual stream in case of DFDC dataset and for the other dataset, Deepfake-TIMIT, the input dimension to the visual stream was (3 x 25 x 224 x 224). On DFDC we trained our model for 100 epochs with a batch size of 8 whereas for Deepfake-TIMIT the model only required 50 epochs with 16 batch size for convergence as the dataset size was small. We used Adam optimizer with a learning rate of 0.001 and all the results were generated on Nvidia Titan RTX GPU with 32 GB system RAM. For the evaluation, we use video-wise Area Under the Curve (AUC) metric. ## Ablation Studies {#sec:AblationStudies} To decide the structure of the network and effect of different components, we chose 5800 videos (4000 real and 1800 fake) from the DFDC dataset, divided them into an 85:15 train-test split, following video-wise AUC and conducted the following experiments:\ **Effect of Loss Functions:** We evaluated the contribution of the audio and visual streams based cross-entropy loss functions (\(L_2\) and \(L_3\), respectively). The hypothesis behind adding these two loss functions to the network is that the feature representations learnt across the audio and visual streams, respectively will be more discriminative towards the task of deep fake detection. This should further assist in the task of computing a segment dissimilarity score \(d_t^i\), which disambiguates between fake and real videos. This hypothesis was tested by training the network on the DFDC dataset in two different settings. The first setting is based on training the MDS network with contrastive loss only. The second setting is combination of the three loss functions for training of the MDS network. Figure [\[fig:Graphs\]](#fig:Graphs){reference-type="ref" reference="fig:Graphs"} shows two graphs generated using the MDS scores as predicted by the networks from the two settings above. It is observed that the distributions of real and fake videos have lesser intersection in the case of the network trained with all three losses. Overall, combined loss function and contrastive loss only based networks achieved 92.7% and 86.1% AUC scores. The difference attributes to the observation that the gap between average MDS for real and fake videos widens when cross-entropy loss functions are also used. Hence, there is more clear distinction between the dissonance scores for real and fake. **Audio and Visual Stream Performance:** We analysed the individual discriminative ability to identify fake and real videos for the audio and the visual streams. In this case the cross-entropy loss alone was used for training of the streams. It was observed that the audio stream only and visual stream only based deepfake classifiers achieved 50.0 and 89.7%, respectively. Note that audio stream achieves less performance as in the DFDC dataset, minimal manipulation is performed on the audio signal of the videos. In Equation [\[eq:5\]](#eq:5){reference-type="ref" reference="eq:5"}, for the four configurations: audio stream only, contrastive loss only, visual stream only and combined loss, we set the parameters as follows: (\(\lambda_1=0,\lambda_2=0,\lambda_3=1\)), (\(\lambda_1=1,\lambda_2=0,\lambda_3=0\)), (\(\lambda_1=0,\lambda_2=1,\lambda_3=0\)) and (\(\lambda_1=1,\lambda_2=1,\lambda_3=1\)). In the case of audio stream and visual stream based classification, the cross-entropy generated real and fake probabilities are generated segment-wise. We compute a maximum over the probabilities to compute the final fake and real for these two streams, individually. For further assessing the audio and visual stream's individual performances, we generated the plots shown in Figure [\[fig:vid_aud_plot\]](#fig:vid_aud_plot){reference-type="ref" reference="fig:vid_aud_plot"}. The process is as follows: a fake video segment and corresponding real video segment is passed through the streams and L2 distance is computed between the output of fc8 layer of the visual/audio sub-network. Then the average of these L2 distances for a video pair is plotted. It is observed in the audio stream plot, that most of the videos are centered close to 0 inter-pair L2 distance. This is due to the fact that audio has been modified in few cases in DFDC dataset. On the contrary, in the plot for the visual stream, we observed that the inter-pair L2 scores is spread across the dataset. This supports the argument that the visual stream is more discrimiantive due to the added cross entropy loss. In Table [\[tab:lambdas\]](#tab:lambdas){reference-type="ref" reference="tab:lambdas"}, we show the AUC of the four configurations mentioned above. Note that these numbers are on a smaller set of DFDC, which is used for ablation studies only. The contrastive loss only based configuration, which uses both the streams, achieves 86.1%. The fusion of the cross-entropy loss into the final MDS network (\(\lambda_1=1,\lambda_2=1,\lambda_3=1\) for Equation [\[eq:5\]](#eq:5){reference-type="ref" reference="eq:5"}), achieves 92.7%. This backs up the argument that comparing (using contrastive loss) features learned through supervised channels enhances the performance of the MDS network. **Segment Duration:** For deciding the optimal length of the temporal segment \(D\), we conducted empirical analysis with temporal sizes of \(D = [1,2,4]\) seconds. From the evaluation on the DFDC dataset, we observed that the temporal duration \(D=1\) second is most optimum. This can attributed to the larger number of segments representing each video, thereby allowing fine-grained comparison of the audio and the visual data of a video. ## Evaluation on DFDC Dataset We compare the performance of our method on the DFDC dataset with other state-of-the-art works. A total of 18,000 videos are used in this experiment[^5]. In Table [\[tab:scores\]](#tab:scores){reference-type="ref" reference="tab:scores"}, it is observed that the MDS network approach outperforms the other visual-only and audio-visual based approaches by achieving 91.54%. The performance is \~8% more relatively than the other audio-visual based approach. Please note that the result 91.54% is achieved with the test set containing 3281 videos out of which 281 videos have two subjects each. We chose the larger face and passed it through the visual stream. The performance of the network without these multiple subject videos is 93.50%. We also report the frame-wise AUC (91.60%) as mentioned in brackets in Table [\[tab:scores\]](#tab:scores){reference-type="ref" reference="tab:scores"}. This is computed by assigning each frame of a video the same label as predicted for the video by our method. We argue that the gain in performance here is due to: (a) The temporal segmentation of the video into segment helps in fine-grained audio-visual feature comparison; (b) We extract task-tuned features from the audio and visual segments. Here task-tuned means that the features are learnt to discriminate between real and fake with the \(L_2\) and \(L_3\) loss functions, and (c) The visual stream's input is the face and an extra margin (see Figure [\[fig:pipeline\]](#fig:pipeline){reference-type="ref" reference="fig:pipeline"}) around it, which accounts for some rigid (head) movement along with the non-rigid (facial) movements. We visualise the important regions using the Gradient-weighted Class Activation Mapping (Grad-CAM) method. Figure [\[fig:GRADCAM\]](#fig:GRADCAM){reference-type="ref" reference="fig:GRADCAM"} shows the important regions localised by Grad-CAM on few frames of a video. Note that the region around the face is highlighted in the middle frame. Also, the forehead and the neck regions are highlighted in the first and third frames, respectively. This supports our argument that the disharmony between the non-rigid and rigid movement is also discriminative for the visual stream to classify between real and fake videos. ## Evaluation on DFTIMIT Dataset The DeepFake-TIMIT (DFTIMIT) dataset is smaller as compared to the DFDC dataset. We trained the MDS network in two resolution settings: LQ and HQ. Table [\[tab:scores\]](#tab:scores){reference-type="ref" reference="tab:scores"} shows the comparison of our method with the other state-of-the-art methods. It is observed that our method achieves comparable results (LQ: 97.92% and HQ: 96.87%) with the top achieving method. In the DFTIMIT test set there are 96 videos in total. This applies that the penalty for mis-classification towards the overall AUC is high in DFTIMIT's case. It is interesting to note that our method mis-classified just 3 video samples in the HQ experiments and 2 videos in the LQ experiments. achieve state-of-the-art results (LQ: 99.9% and HQ: 99.7%) on DFTIMIT, however, achieve relatively lower AUC results (72.7%) on the larger dataset DFDC. In comparison our method achieved 18% more than on DFDC dataset. This could also mean that the DFTIMIT dataset is now saturated due to smaller size similar to the popular ImageNet dataset. We also report the frame-wise AUC (LQ: 98.3% and HQ: 94.7%) for DFTIMIT as mentioned in brackets in Table [\[tab:scores\]](#tab:scores){reference-type="ref" reference="tab:scores"}. ## Temporal Forgery Localization {#sec:localisation} With the advent of sophisticated forgery techniques, it is possible that an entire video or smaller portions of the video are manipulated to deceive the audience. If in case parts of the original video are corrupted, it would be useful from the FD perspective to be able to locate the timestamps corresponding to the corrupted segments. In an interesting work, Wu *et al.*  proposed a CNN which detects forgery along with the forged locations in images. However, their method is only applicable to copy-paste image forgery. As we process the vidseo by dividing it into temporal segments, a fine-grained analysis of the input video is possible, thereby enabling *forgery localization*. In contrast to the MDS network, earlier techniques computed features over the entire video. We argue that if a forgery has been performed on a small segment of a video, the forgery signatures in that segment may get diluted due to pooling across the whole video. A similar phenomenon is also observed in prior work relating to pain detection and localization. As the pain event could be short and its location is not labeled, the authors divide the video into temporal segments for better pain detection. Most of the datasets, including the ones used in this paper have data manipulation performed on practically the entire video. To demonstrate the effectiveness of our method for forgery localization in fake videos, we joined segments from real and corresponding fake videos of the same subject at random locations. In Figure [\[fig:localisation\]](#fig:localisation){reference-type="ref" reference="fig:localisation"}, we show the outputs on two videos created by mixing video segments of the same subject from the DFDC dataset. Here, the segment-wise score is shown on the \(y\)-axis. The segments for which the score is above a threshold are assigned as being fake (red on the curve) and below the threshold (blue color on the curve) are assigned are real. In addition to Figs. [\[fig:GRADCAM\]](#fig:GRADCAM){reference-type="ref" reference="fig:GRADCAM"} and [\[fig:Graphs\]](#fig:Graphs){reference-type="ref" reference="fig:Graphs"}, forgery localization makes the working of the MDS-based fake detection framework more *explainable* and *interpretable*. # Conclusion and Future Work We propose a novel bimodal deepfake detection approach based on the modality dissonance score (MDS), which captures the similarity between audio and visual streams for real and fake videos thereby facilitating separability. The MDS is modeled via the contrastive loss computed over segment-level audiovisual features, which constrains genuine audio-visual streams to be *closer* than fake counterparts. Furthermore, cross-entropy loss is enforced on the unimodal streams to ensure that they independently learn discriminative features. Experiments show that (a) the MDS-based FD framework can achieve state-of-the-art performance on the DFDC dataset, and (b) the unimodal cross-entropy losses provide extra benefit on top of the contrastive loss to enhance FD performance. Explainability and interpretability of the proposed approach are demonstrated via audio-visual distance distributions obtained for *real* and *fake* videos, Grad-CAM outputs denoting attention regions of the MDS network, and forgery localization results. Future work would focus on (a) incorporating human assessments (acquired via EEG and eye-gaze sensing) in addition to content analysis adopted in this work; (b) exploring algorithms such as multiple instance learning for transient forgery detection, and (c) achieving real-time forgery detection (accomplished by online intrusions) given the promise of processing audio-visual information over 1-second segments.
{'timestamp': '2021-03-23T01:11:59', 'yymm': '2005', 'arxiv_id': '2005.14405', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14405'}
null
null
null
null
# Introduction Machine learning (ML) refers to a broad field of study, with multifaceted applications of cross-disciplinary breadth. ML is a subset of Artificial Intelligence (AI) which ultimately aims at developing computer algorithms that improve automatically through experience. The core idea is that systems can learn from data, so as to identify distinctive patterns and make consequently decisions, with minimal human intervention. The range of applications of ML methodologies is extremely vast, and still growing at a steady pace due to the pressing need to cope with the efficiently handling of big data. Biomimetic approaches to sub-symbolic AI inspired the design of powerful algorithms. These latter sought to reproduce the unconscious process underlying fast perception, the neurological paths for rapid decision making, as e.g. employed for faces or spoken words recognition. An early example of a sub-symbolic brain inspired AI was the perceptron, the influential ancestor of deep neural networks (NN). The perceptron is indeed an algorithm for supervised learning of binary classifiers. It is a linear classifier, meaning that its forecasts are based on a linear prediction function which combines a set of weights with the feature vector. Analogous to neurons, the perceptron adds up its input: if the resulting sum is above a given threshold the perceptron fires (returns the output the value 1) otherwise it does not (and the output equals zero). Modern multilayer perceptrons, account for multiple hidden layers with non-linear activation functions. The learning is achieved via minimizing the classification error. Single or multilayered perceptrons should be trained by examples. Supervised learning requires indeed a large set of positive and negative examples, the training set, labelled with their reference category. The perceptrons' acquired ability to perform classification is eventually stored in a finite collection of numbers, the weights and thresholds that were learned during the successive epochs of the supervised training. To date, it is not clear how such a huge collection of numbers (hundred-millions of weights in state of the art ML applications) are synergistically interlaced for the deep networks to execute the assigned tasks, with an exceptional degree of robustness and accuracy. Starting from these premises, the aims of this paper are multifold. On the one side, we will develop a novel learning scheme which is anchored on reciprocal space. Instead of iteratively adjusting the weights of the edges that define the connection among nodes, we will modify the spectra of a collection of suitably engineered matrices that bridge adjacent layers. To eventually recover a multilayered feedforward architecture in direct space, we postulate a nested indentation of the associated eigenvectors. These latter act as the effective gears of a processing device operated in reciprocal space. The directed indentation between stacks of adjacent eigenvectors yield a compression of the activation pattern, which is eventually delivered to the detection nodes. As a starting point, assume eigenvectors are frozen to a reference setting which fulfills the prescribed conditions. The learning is hence solely restricted to the eigenvalues, a choice which amounts to performing a *global* training, targeted to identifying key collective modes, the selected eigen-directions, for carrying out the assigned classification task. The idea of conducting a global training on a subset of parameters has been also proposed in other works. This is at odd with the usual approach to machine learning where *local* adjustments of pairwise weights are implemented in direct space. As we shall prove, by tuning the eigenvalues, while freezing the eigenvectors, yields performances superior to those reached with usual (local) techniques bound to operate with an identical number of free parameters, within an equivalent network architecture. Eigenvalues are therefore identified as key target of the learning process, proving more fundamental than any other set of identical cardinality, allocated in direct space. Remarkably, the distribution of weights obtained when applying the spectral learning technique restricted to the eigenvalues is close to that recovered when training the neural network in direct space, with no restrictions on the parameters to be adjusted. In this respect, spectral learning bound to the eigenvalues could provide a viable strategy for pre-training of deep neural networks. Further, the set of trainable eigenvalues can be expanded at will by inserting linear processing units between the adjacent layers of a non-linear multilayered perceptron. Added linear layers act as veritable booms of a *telescopic neural network*, which can be extracted during the learning phase and retracted in operational mode, yielding compact networks with improved classification skills. The effect of the linear expansion is instead negligible, if applied to neural learning of standard conception. The entries of the indented eigenvectors can be also trained resulting in enhanced performance, as compared to the setting where eigenvalues are exclusively modulated by the learning algorithm. To demonstrate the principles which underly spectral training, we employ the MNIST database, a collection of handwritten digits to be classified. The examined problem is relatively simple: a modest number of tunable parameters is indeed necessary for achieving remarkable success rates. When allowing for the simultaneous training of the eigenvalues and (a limited fraction of ) eigenvectors, the neural networks quickly saturates to accuracy scores which are indistinguishable from those obtained via conventional approaches to supervised learning. More challenging tasks should be probably faced to fully appreciate the role played by a progressive optimization of the eigenmodes, the collective directions in reciprocal space where information flows. As remarked above, the eigenvectors have been here constructed so as to yield a feedforward multi-layered architecture in direct space. By relaxing this assumption, comes to altering the network topology and thus exporting the spectral learning strategy to other frameworks, as e.g. reservoir computing. In general terms, working in the spectral domain corresponds to optimizing a set of *non orthogonal* directions (in the high dimensional space of the nodes) and associated weights (the eigenvalues), a global outlook which could contribute to shed novel light on the theoretical foundations of supervised learning. # Linear and non-linear spectral learning To introduce and test the proposed method we will consider a special task, i.e. recognition of handwritten digits. To this end, we will make use of the MNIST database which has a training set of 60,000 examples, and a test set of 10,000 examples. Each image is made of \(N_1=28 \times 28\) pixels and each pixel bears an 8-bit numerical intensity value, see Fig. [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}. A deep neural network can be trained using standard backpropagation algorithms to assign the weights that link the nodes (or perceptrons) belonging to consecutive layers. The first layer has \(N_1\) nodes and the input is set to the corresponding pixel's intensity. The highest error rate reported on the original website of the database is 12 %, which is achieved using a simple linear classifier, with no preprocessing. In early 2020, researchers announced 0.16 % error with a deep neural network made of branching and merging convolutional networks. Our goal here is to contribute to the analysis with a radically different approach to the learning, rather than joining the efforts to break current limit in terms of performance and classification accuracy. More specifically, and referring to the MNIST database as a benchmark application, we will assemble a network made of \(N\) nodes, organized in successive \(\ell\) layers, tying the training to reciprocal space. Directed connections between nodes belonging to consecutive layers are encoded in a set of \(\ell-1\), \(N \times N\) adjacency matrices. The eigenvectors of these latter matrices are engineered so as to favour the information transfer from the reading frame to the output layer, upon proper encoding. The associated eigenvalues represent the primary target of the novel learning scheme. In the following we will set up the method, both with reference to its linear and non-linear versions. Tests performed on the MNIST database are discussed in the next Section. ## Linear spectral learning: Single-layer perceptron trained in reciprocal space Assume \(N_i\) to label the nodes assigned to layer \(i\), and define \(N=\sum_{i=1}^{\ell} N_i\). For the specific case here inspected the output layer is composed by ten nodes (\(N_{\ell}=10\)), where recognition takes eventually place. Select one image from the training set and be \(n_1\) \((=0,1,2..,9)\) the generic number therein displayed. We then construct a column vector \(\vec{n}_1\), of size \(N\), whose first \(N_1\) entries are the intensities displayed on the pixels of the selected image (from the top-left to the bottom-right, moving horizontally), as illustrated in Fig. [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}. All other entries are initially set to zero. As we shall explain in the following, our goal is to transform the input \(\vec{n}_1\) into an output vector with same dimensions. The last \(N_{\ell}\) elements of this latter vector represent the output nodes where reading is eventually performed. To set the stage, we begin by reporting on a simplified scenario that, as we shall prove in the following, yields a single layer perceptron. The extension to multi-layered architectures will be discussed right after. Consider the entry layer made of \(N_1\) nodes and the outer one composed of \(N_2\) elements. In this case \(N=N_1+N_2\). The input vector \(\vec{n}_1\) undergoes a linear transformation to yield \(\vec{n}_2=\mathbf{A}_1 \vec{n}_1\) where \(\mathbf{A}_1\) is a \(N\times N\) matrix that we shall characterize in the following. Introduce matrix \(\Phi_1\): this is the identity matrix \(\mathbb{1}_{N \times N}\) modified by the inclusion of a sub-diagonal block \(N_{2} \times N_{1}\), e.g. filled with uniformly distributed random numbers, defined in a bounded interval, see Fig. [\[fig2\]](#fig2){reference-type="ref" reference="fig2"}. The columns of \(\Phi_1\), hereafter \(\left(\vec{\phi}_1\right)_k\) with \(k=1...,N\), define a basis of the \(N\) dimensional space to which \(\vec{n}_1\) and \(\vec{n}_2\) belong. Then, we introduce the diagonal matrix \(\Lambda_1\). The entries of \(\Lambda_1\) are set to random (uniform) numbers spanning a suitable interval. A straightforward calculation returns \(\left(\Phi_1\right)^{-1}=2 \mathbb{1}_{N \times N}-\Phi_1\). We hence define \(\mathbf{A}_1= \Phi_1 \Lambda_1 \left(2 \mathbb{1}_{N \times N}-\Phi_1\right)\) as the matrix that transforms \(\vec{n}_1\) into \(\vec{n}_2\). Because of the specific structure of the input vector, and owing the nature of \(\mathbf{A}_1\), the information stored in the first \(N_1\) elements of \(\vec{n}_1\) is passed to the \(N_2\) successive entries of \(\vec{n}_2\), in a compactified form which reflects both the imposed eigenvectors' indentation and the chosen non trivial eigenvalues. To see this more clearly, expand the \(N\)-dimensional input vector \(\vec{n}_1\) on the basis made of \(\left( \vec{\phi}_1 \right)_k\) to yield \(\vec{n}_1=\sum_{k=1}^N c_k \left( \vec{\phi}_1 \right)_k\) where \(c_k\) stands for the coefficients of the expansion. The first \(N_1\) vectors are necessarily engaged to explain the non zero content of \(\vec{n}_1\) and, because of the imposed indentation, rebound on the successive \(N_2\) elements of the basis. These latter need to adjust their associated weights \(c_k\) to compensate for the echoed perturbation. The action of matrix \(\mathbf{A}_1\) on the input vector \(\vec{n}_1\) can be exemplified as follows: \[\vec{n}_2 = \mathbf{A}_1 \vec{n}_1 = \mathbf{A}_1 \sum_{k=1}^N c_k \left( \vec{\phi}_1 \right)_k = \sum_{k=1}^{N_1+N_2} c_k \left( \Lambda_1 \right)_k \left( \vec{\phi}_1 \right)_k\] where \(\left( \Lambda_1 \right)_k\) are the element of matrix \(\Lambda_1\). In short, the entries of \(\vec{n}_2\) from position \(N_1+1\) to position \(N_1+N_2\) represent a compressed (if \(N_2<N_1\)) rendering of the supplied input signal, the key to decipher the folding of the message being stored in the \(N_{2} \times N_{1}\) sub-diagonal block of \(\Phi_1\), (i.e. the eigenvector indentation) and in the first set of \(N=N_1+N_2\) eigenvalues \(\left( \Lambda_1 \right)_k\). The key idea is to propagate this message passing scheme, from the input to the output in a multi-layer setting, and adjust (a subset of) the spectral parameters involved so as to optimize the encoding of the information. To this end, we introduce the \(N \times N\) matrix operator \(\Phi_k\), for \(k=2...,\ell-1\). In analogy with the above, \(\Phi_k\) is the identity matrix \(\mathbb{1}_{N \times N}\) modified with a sub-diagonal block \(N_{k+1} \times N_{k}\), which extends from rows \(N_k\) to \(N_k+N_{k+1}\), and touches tangentially the diagonal, as schematically illustrated in Fig. [\[fig2\]](#fig2){reference-type="ref" reference="fig2"} (a). Similarly, we introduce \(\Lambda_k\), for \(k=2...,\ell-1\), which is obtained from the identity matrix \(\mathbb{1}_{N \times N}\) upon mutating to uniformly distributed random entries the diagonal elements that range from \(\sum_{i=1}^k N_i\) (not included) to \(\sum_{i=1}^{k+1} N_i\) (included). Finally, we define \(\mathbf{A}_k= \Phi_k \Lambda_k \left(2 \mathbb{1}_{N \times N}-\Phi_k\right)\), as the matrix that transforms \(\vec{n}_k\) into \(\vec{n}_{k+1}\), with \(k=2...,\ell-1\). In principle, both non trivial eigenvalues' and eigenvectors' input can be self-consistently adjusted by the envisaged learning strategy. The input signal \(\vec{n}_1\) is hence transformed into an output vector \(\vec{n}_{\ell}\) following a cascade of linear transformations implemented via matrices \(\mathbf{A}_k\). In formulae: \[\vec{n}_{\ell} = \mathbf{A}_{\ell-1}...\mathbf{A}_{1} \vec{n}_1 = \left( \Pi_{k=1}^{\ell-1} \Phi_k \Lambda_k \left(2 \mathbb{1}_{N \times N}-\Phi_k\right)\right) \vec{n}_1\] where in the last step we made use of the representation of \(\mathbf{A}_k\) in dual space. The generic vector \(\vec{n}_{k+1}\), for \(k=1..., \ell-1\) is obtained by applying matrix \(\mathbf{A}_k\) to \(\vec{n}_k\). The first \(N_1+N_2+...+N_k\) components of \(\vec{n}_{k+1}\) coincide with the corresponding entries of \(\vec{n}_k\), namely \(\left[ \vec{n}_{k+1} \right]_m \equiv \left[ \vec{n}_{k} \right]_m\) for \(m<N_1+N_2+...+N_k\). Here, \(\left[ \left(\vec{\cdot}\right) \right]_m\) identifies the \(m\)-th component of the vector \(\left(\vec{\cdot}\right)\). Recall that, by construction, \(\left[ \vec{n}_{k} \right]_m=0\) for \(m> N_1+N_2+...+N_k\). On the contrary, the components \(\left[ \vec{n}_{k+1} \right]_m\) with \(N_1+N_2+...+N_k+1<m<N_1+N_2+...+N_k+N_{k+1}\) are populated by non trivial values which reflect the eigenvectors indentation, as well as the associated eigenvalues. This observation can be mathematically proven as follows. Write \(\vec{n}_k\) on the basis formed by the eigenvectors \(\left( \vec{\phi}_k \right)_l\) to eventually get: \[\vec{n}_k = \sum_{l=1}^{N_1+N_2+...+N_{k+1}} c_l \left( \vec{\phi}_k \right)_l \equiv \sum_{l=1}^{N_1+N_2+...+N_k} c_l \vec{e}_l\] where \(\left(\vec{e}_1, \vec{e}_2...\right)\) stand for the canonical basis and the last inequality follows the specific structure of the eigenvectors (remark that the leftmost sum in the above equation includes \(N_{k+1}\) more elements than the second). By definition: \[\vec{n}_{k+1} = \mathbf{A}_k \vec{n}_k = \sum_{l=1}^{N_1+N_2..+N_{k+1}} c_l \left( \Lambda_k \right)_l \left( \vec{\phi}_k \right)_l\] From the above relation, one gets for \(m \le N_1+N_2+...+N_k\) \[\left[ \vec{n}_{k+1} \right]_m = \sum_{l=1}^{N_1+N_2..+N_{k}} c_l \left[ \vec{e}_l \right]_m \equiv \left[ \vec{n}_{k} \right]_m\] where the first equality sign follows from the observation that \(\left( \vec{\phi}_k \right)_l\) coincides with \(\vec{e}_l\) and \(\left( \Lambda_k \right)_l=1\), over the explored range of \(m\). For \(N_1+N_2+...+N_k+1 \le m \le N_1+N_2+...+N_k+N_{k+1}\), we obtain instead: \[\left[\vec{n}_{k+1}\right]_m = \sum_{l=N_1+N_2..+N_{k-1}}^{N_1+N_2..+N_{k+1}} c_l \left( \Lambda_k \right)_l \left[ \left( \vec{\phi}_k \right)_l \right]_m\] Finally, it is immediate to show that \(\left[\vec{n}_{k+1}\right]_m=0\) for \(m> N_1+N_2+...+N_k+N_{k+1}\), because of the specific form of the employed eigenvectors. In short, the information contained in the last non trivial \(N_k\) entries of \(\vec{n}_k\) rebound on the successive \(N_{k+1}\) elements of \(\vec{n}_{k+1}\), funnelling the information downstream from the input to the output. The successive information processing relies on the indented (non orthogonal) eigenvectors and the associated eigenvalues, which hence define the target of the training in reciprocal space. To carry out the learning procedure one needs to introduce a loss function \(L(\vec{n}_1)\). For illustrative purposes this latter can be written as: \[\label{LF} L(\vec{n}_1) = \left\lVert l(\vec{n}_1)-\sigma\left[ \left( \Pi_{k=1}^{\ell} \Phi_k \Lambda_k \left(2 \mathbb{1}_{N \times N}-\Phi_k\right) \right) \vec{n} _1\right ] \right\lVert^2\] where \(\sigma(\cdot)\) is the softmax operation applied to the last entries of the \(\ell\)-th image of the input vector \(\vec{n}_1\). In the above expression, \(l(\vec{n}_1)\) stands for the label attached to \(\vec{n}_1\) depending on its category. More into details, the \(k\)-th entry of \(l(\vec{n}_1)\) is equal unit (and the rest identically equal to zero) if the number supplied as an input is identical to \(k\), with \(k=0,1...,9\). The loss function can be minimized by acting on the free parameters of the learning scheme. Specifically, the learning can be restricted to the set of \(N\) non trivial eigenvalues, split in \(\ell\) distinct groups, each referred to one of the \(\mathbf{A}_{k}\) matrices (i.e. \(N_1+N_2\) eigenvalues of \(\mathbf{A}_{1}\), \(N_3\) eigenvalues of \(\mathbf{A}_{2}\)\...., \(N_{\ell}\) eigenvalues of \(\mathbf{A}_{\ell-1}\)). In addition, the sub-diagonal block entries of \(\Phi_k\), the elements of the basis which dictate the successive indentation between adjacent layers, can be adjusted as follows the training scheme. In the following section we will report about the performance of the method, implemented in its different modalities, against those obtained with a classical approach to the learning anchored in direct space. In the actual implementation we have chosen to deal with a categorical cross-entropy loss function. Before ending this section a few remarks are mandatory. Introduce \(\mathcal{A} = \Pi_{k=1}^{\ell} \mathbf{A}_{k}\). The linear transformation that links the input vector \(\vec{n}_1\) to the generated output \(\vec{n}_{\ell}\), can be compactly expressed as \(\vec{n}_{\ell} = \mathcal{A} \vec{n}_1\). Then, recall that the classification relies on examining the last \(N_\ell\) entries of \(\vec{n}_{\ell}\). Hence, for the specific setting here examined, where the mapping is obtained as a cascade of linear transformations, one can imagine to recast the whole procedure in a space of reduced dimensionality. Be \(\vec{z}\) a column vector made of \(N_1 + N_\ell\) elements. The first \(N_1\) entries of \(\vec{z}\) are the intensities on the pixels of the selected image, as for the homologous \(\vec{{n}}_1\) quantity. The other elements are set to zero. Then, consider the \((N_1 + N_\ell) \times (N_1 + N_\ell)\) matrix \(\mathcal{A}_c\) (the label \(c\) stands for *compact*), constructed from \(\mathcal{A}\) by trimming out all the information that pertain to the intermediate layers, as introduced in the reciprocal space (see Fig. [\[fig2\]](#fig2){reference-type="ref" reference="fig2"}(b)). Stated differently, matrix \(\mathcal{A}_c\) provides the weighted links that feed from the input to the output layer in direct space, via the linear transformation \(\mathcal{A}_c \vec{z}\): this is a single layer perceptron, shown in Fig. [\[fig2\]](#fig2){reference-type="ref" reference="fig2"}(b), which was trained by endowing reciprocal space with an arbitrary number of additional dimensions, the intermediate stacks responsible for the sequential embedding of the information. Intermediate layers can be literally extracted, during the training phase, and subsequently retracted in operational mode. The importance to allowing for additional layers, and so provide the neural network of a telescopic attribute, will be assessed in the forthcoming sections. From the algorithmic point of view the process outlined above can be rephrased in simpler, although equivalent terms. For all practical purposes, one could take the (column) input vector \(\vec{{n}}_1\) to have \(N_1+N_2\) elements. Following the scheme depicted above, the first \(N_1\) entries are the intensities on the pixels of the selected image, while the remaining \(N_2\) elements are set to zero. We now introduce a \((N_1+N_2) \times (N_1+N_2)\) matrix \(\mathbf{A}_{1}\). This is the identity matrix \(\mathbb{1}_{(N_1+N_2) \times (N_1+N_2)}\) with the inclusion of a sub-diagonal block \(N_{2} \times N_{1}\), which handles the information processing that will populate the second \(N_2\) elements of the output vector \(\vec{{n}}_2= \mathbf{A}_{1} \vec{{n}_1}\). Then, we formally replace the \((N_1+N_2)\) column vector \(\vec{{n}}_2\) with a column vector made of \((N_2+N_3)\) elements, termed \(\vec{{n}}_{2t}\), whose first \(N_2\) elements are the final entries of \(\vec{{n}}_2\). The remaining \(N_3\) elements of \(\vec{{n}}_{2t}\) are set to zero. Now, rename \(\vec{{n}}_{2t}\) as \(\vec{{n}}_2\) and presents it as the input of a \((N_2+N_3) \times (N_2+N_3)\) matrix \(\mathbf{A}_{2}\), with a non trivial sub-diagonal \(N_{3} \times N_{2}\) block. This latter maps the first \(N_2\) elements of the input vector, into the successive \(N_3\) of the output one, by completing the second step of an algorithmic scheme which can be iteratively repeated. In analogy with the above, each \((N_k+N_{k+1}) \times (N_k+N_{k+1})\) matrix \(\mathbf{A}_{k}\) can be written as \(\mathbf{A}_k= \Phi_k \Lambda_k \left(2 \mathbb{1}_{(N_k+N_{k+1}) \times (N_k+N_{k+1})}-\Phi_k\right)\), where now the column vectors of \(\Phi_k\) are the eigevenctors of \(\mathbf{A}_k\) and form a non-orthogonal basis of the \((N_k+N_{k+1})\) space where input and output vectors belong. \(\Lambda_k\) is a diagonal matrix of the eigenvalues: the first \(N_k\) are set to one, while the other \(N_{k+1}\) are non trivial entries to be adjusted self-consistently via the learning scheme. Framing the process in the augmented space of \(N\) dimensions, as done earlier, allows us to avoid adapting the dimensions of the involved vectors at each iteration. On the contrary, this is a convenient procedure to be followed when aiming at a numerical implementation of the envisaged scheme. Notice that to discuss the algorithmic variant of the method, we made use of the same symbols employed earlier. The notation clash is however solely confined to this paragraph. In the following, we will discuss how these ideas extend to the more general setting of non-linear multi-layered neural networks. ## Training non-linear multi-layered neural networks in the spectral domain In analogy with the above, the image to be processes is again organized in a \(N\times1\) column vector \(\vec{n}_1\). This latter is transformed into \(\vec{n}_2=\mathbf{A}_1 \vec{n}_1\), where matrix \({N \times N}\) matrix \(\mathbf{A}_1\) is recovered from its spectral properties, respectively encoded in \(\Phi_1\) and \(\Lambda_1\). The output vector \(\vec{n}_2\) is now filtered via a suitable *non-linear* function \(f(\cdot)\). This step marks a distinction between, respectively, the linear and non-linear versions of the learning schemes. For the applications here reported we have chosen to work with a rectified linear unit (ReLU) \(f(\cdot)= max(0, \cdot)\). Another possibility is to set \(f(\cdot, \beta_1)=\tanh[\beta_1(\cdot)]\), where \(\beta_1\) is a control parameter which could be in principle self-consistently adjusted all along the learning procedure. We are now in a position to iterate the same reasoning carried out in the preceding section, adapted to the case at hand. More specifically, we introduce the generic \(N\times N\) matrix \(\mathbf{A}_k= \Phi_k \Lambda_k \left(2 \mathbb{1}_{N \times N}-\Phi_k\right)\) which transforms \(\vec{n}_k\) into \(\vec{n}_{k+1}\), with \(k=2...,\ell-1\). The outcome of this linear transformation goes through the non-linear filter. The loss function \(L(\vec{n})\) generalizes to: \[\label{LF} L(\vec{n}) = \left\lVert l(\vec{n}_1)-\sigma\left( f\left(\mathbf{A}_{\ell-1}.... f\left (\mathbf{A}_2 f \left (\mathbf{A}_1 \vec{n_1},\beta_1 \right), \beta_2 \right),\beta_{\ell-1} \right) \right) \right\rVert^2\] with an obvious meaning of the involved symbols. In the set of experiments reported below we assume, in analogy with the above, a categorical cross-entropy loss function. The loss function is minimized upon adjusting the free parameters of the learning scheme: the \(\ell-1\) blocks of tunable eigenvalues, the elements that define the successive indentation of the nested basis which commands the transfer of the information (and e.g. the quantities \(\beta_k\), if the sigmoidal hyperbolic function is chosen as a non-linear filter). This eventually yields a fully trained network, in direct space, which can be unfolded into a layered architecture to perform pattern recognition (see Fig. [\[fig3\]](#fig3){reference-type="ref" reference="fig3"}). Remarkably, self-loop links are also present. The limit of a linear single layer perceptron is recovered when silencing the non-linearities: a \((N_1 + N_\ell) \times (N_1 + N_\ell)\) matrix \(\mathcal{A}_c\) can be generated from the \(N \times N\) matrices \(\mathbf{A}_{k}\), following the same strategy outlined above. A sequence of linear layers can be also interposed between two consecutive non-linear stacks. The interposed layers allow to enlarge the space of parameters employed in the learning scheme, and can be retracted when operating the deep neural network after completion of the learning stage. Their role is *de facto* encapsulated in the entries of the linear operator that bridges the gap between the adjacent non-linear stacks, as explained above when referring to the telescopic operational modality. # Results To build and train the aforementioned models we used TensorFlow and created a custom spectral layer matrix that could be integrated in virtually every TensorFlow or Keras model. That allowed us to leverage on the automatic differentiation capabilities and the built-in optimizers of TensorFlow. Recall that we aim at training just a a portion of the diagonal of \(\Lambda_k\) and a block of \(\Phi_k\). To reach this goal we generated two fully trainable matrices, for each layer in the spectral domain, and applied a suitably designed mask to filter out the sub-parts of the matrices to be excluded from the training. This is easy to implement and, although improvable from the point of view of computational efficiency, it works perfectly, given the size of the problem to be handled. We then trained all our models with the AdaMax optimizer by using a learning rate of \(0.03\) for the linear case and \(0.01\) for the non-linear one. The training proceeded for about \(20\) epochs and during each epoch the network was fed with batches of images of different size, ranging from \(300\) to \(800\).. These hyperparameters have been chosen so as to improve on GPU efficiency, accuracy and stability. However, we did not perform a systematic study to look for the optimal setting. All our models have been trained on a virtual machine hosted by Google Colaboratory. Standard neural networks have been trained on the same machine using identical software and hyperparameters, for a fair comparison. Further details about the implementation, as well as a notebook to reproduce our results, can be found in the public repository of this project. We shall start by reporting on the performance of the linear scheme. The simplest setting is that of a perceptron made of two layers: the input layer with \(N_1=28 \times 28 = 784\) nodes and the output one made of \(N_2=10\) elements. The perceptron can be trained in the spectral domain by e.g. tuning the \(N=N_1+N_2=794\) eigenvalues of \(\mathbf{A}_{1}\), the matrix that links the input (\(\vec{n}_1\)) and output (\(\vec{n}_2\)) vectors. The learning restricted to the eigenvalues returns a perceptron which performs the sought classification task with an accuracy (the fraction of correctly recognized images in the test-set) of \((82 \pm 2) \%\) (averaging over \(5\) independent runs). This figure is to be confronted with the accuracy of a perceptron trained with standard techniques in direct space. For a fair comparison, the number of adjustable weights should be limited to \(N\). To this aim, we randomly select a subset of weights to be trained and carry out the optimization on these latter. The process is repeated a few (\(5\) in this case) times and, for each realization, the associated accuracy computed. Combining the results yields an average performance of \((79 \pm 3) \%\), i.e. a slightly smaller score (although compatible within error precision) than that achieved when the learning takes place in the spectral domain. When the training extends to all the \(N_1 \times N_2\) weights (plus \(N_1+N_2\) bias), conventional learning yields a final accuracy of \((92.7 \pm 0.1) \%\). This is practically identical to the score obtained in the spectral domain, specifically \((92.5 \pm 0.2) \%\), when the sub-diagonal entries of the eigenvectors matrix are also optimized (for a total of \(N_1+N_2+N_1 \times N_2\) free parameters). The remarkable observation is however that the distribution of the weights as obtained when the learning is restricted on the eigenvalues (i.e using about the 10 % of the parameters employed for a full training in direct space) matches quite closely that retrieved by means of conventional learning schemes, see Fig. [\[fig4\]](#fig4){reference-type="ref" reference="fig4"}. This is not the case when the learning in direct space acts on a subset of \(N\), randomly selected, weights (data not shown). Based on the above, it can be therefore surmised that optimizing the eigenvalues constitutes a rather effective pre-training strategy, which engages a modest computational load. To further elaborate on the potentiality of the proposed technique, we modify the simple two-layers perceptron, with the inclusion of supplementary computing layers. As explained above the newly added layers plays an active role during the learning stage, but can be retracted in operating mode so as to return a two-layers perceptron. The weights of this latter bear however an imprint of the training carried out for the linear network in the expanded configuration. Two alternative strategies will be in particular contemplated. On the one side, we will consider a sole additional layer, endowed with \(N_2\) nodes, interposed between the input and output layers made of, respectively, \(N_1=784\) and \(N_{\ell} \equiv N_3=10\) nodes. We will refer to this as to the *wide linear* configuration. The performance of the method can be tested by letting \(N_2\) to progressively grow. On the other side, the *deep linear* configuration is obtained when interposing a sequence of successive (linear) stacks between the input (\(N_1=784\)) and the output (\(N_{\ell} =10\)) layers. In Fig. [\[fig5\]](#fig5){reference-type="ref" reference="fig5"}, we report on the performance of the wide learning scheme as a function of \(N_2+N_3\). As we shall clarify, this latter stands for the number of trained parameters for (i) the spectral learning acted on a subset of the tunable eigenvalues and for (ii) the conventional learning in direct space restricted to operate on a limited portion of the weights. The red line in the main panel of Fig. [\[fig5\]](#fig5){reference-type="ref" reference="fig5"} refers to the simplified scheme where a subset of the eigenvalues are solely tuned (while leaving the eigenvectors fixed at the random realization set by the initial condition). We have in particular chosen to train the second bunch of \(N_2\) eigenvalues of the transfer matrix \(\mathbf{A}_{1}\) and the \(N_3=10\) non trivial eigenvalues of matrix \(\mathbf{A}_{2}\), in line with the prescriptions reported in the preceding Section. The blue line reports on the accuracy of the neural network trained in direct space: the target of the optimization is a subset of cardinality \(N_2+N_3\) of the \(N_1 N_2+N_2 N_3\) weights which could be in principle adjusted in the space of the nodes. The performance of the spectral method proves clearly superior, as it can be readily appreciated by visual inspection of Fig. [\[fig5\]](#fig5){reference-type="ref" reference="fig5"}. The black line displays the accuracy of the linear neural network when the optimization acts on the full set of \(N_1 N_2+N_2 N_3\) trainable parameters. No improvement is detectable when increasing the size of the intermediate layer: the displayed accuracy is substantially identical to that obtained for the basic perceptron trained with \(N_1 N_2=7840\) parameters. The spectral learning allows to reach comparable performance already at \(N_2=1000\) (\(13 \%\) of the parameters used for the standard two layers perceptron with \(N_1 \times N_2\) parameters, as discussed above). In the inset of Fig. [\[fig5\]](#fig5){reference-type="ref" reference="fig5"}, the distribution of the entries of matrix \(\mathcal{A}_c\), the equivalent perceptron, is depicted in red for the setting highlighted in the zoom. The black line refers to the two-layers equivalent of the neural network trained in direct space, employing the full set of trainable parameters (black dot enclosed in the top-left dashed rectangle drawn in the main panel of Fig. [\[fig5\]](#fig5){reference-type="ref" reference="fig5"}). The two distributions look remarkably close, despite the considerable reduction in terms of training parameters, as implemented in the spectral domain (for the case highlighted, \(0.13 \%\) of the parameters employed under the standard training). Similarly to the above, the distribution obtained when forcing the training in direct space to act on a subset of \(N_1+N_2\) weights are just a modest modulation of the initially assigned profile, owing to the *local* nature of the learning in the space of the nodes. In Fig. [\[fig6\]](#fig6){reference-type="ref" reference="fig6"}, we report the results of the tests performed when operating under the deep linear configuration. Symbols are analogous to those employed in Fig. [\[fig5\]](#fig5){reference-type="ref" reference="fig5"}. In all inspected cases, the entry layer is made of \(N_1=784\) elements and the output one has \(N_{\ell}=10\) nodes. The first five points, from left to right, refer to a three layers (linear) neural network. Hence, \(\ell=3\) and the size of the intermediate layer is progressively increased, \(N_2=20,80,100,500,800\). The total number of trained eigenvalues is \(N_2+N_3\), and gets therefore larger as the size of the intermediate layer grows. The successive four points of the collections are obtained by setting \(\ell=4\). Here, \(N_2=800\) while \(N_3\) is varied (\(=100,200,400,600\)). The training impacts on \(N_2+N_3+N_4\) parameters. Finally the last point in each displayed curve is obtained by working with a five layers deep neural network, \(\ell=5\). In particular \(N_2=800\), \(N_3=600\) and \(N_4=500\), for a total of \(N_2+N_3+N_4+N_5\) tunable parameters. Also in this case, the spectral algorithm performs better than conventional learning schemes constrained to operate with an identical number of free parameters. Similarly, the distribution of the weights of an equivalent perceptron trained in reciprocal space matches that obtained when operating in the space of the nodes and resting on a considerably larger number of training parameters. To sum up, eigenvalues are parameters of key importance for neural networks training, way more strategic than any other set of equivalent cardinality in the space of the nodes. As such, they allow for a global approach to the learning, with significant reflexes of fundamental and applied interest. In all cases here considered, the learning can extend to the eigenvectors: an optimized indentation of the eigen-directions contribute to enhance the overall performance of the trained device. We now turn to considering a non-linear architecture. More specifically, we will assume a four layers network with, respectively, \(N_1=784, N_2,N_3=120, N_4=10\). The non-linear ReLU filter acts on the third layer of the collection, while the second is a linear processing unit. As in the spirit of the wide network configuration evoked above, we set at testing the performance of the neural network for increasing \(N_2\). For every choice of \(N_2\), the linear layer can be retracted yielding a three-layered effective non-linear configurations. We recall however that training the network in the enlarged space where the linear unit is present leaves a non trivial imprint in the weights that set the strength of the links in direct space. In Fig [\[fig7\]](#fig7){reference-type="ref" reference="fig7"}, we plot the computed accuracy as a function of \(N_2\), the size of the linear layer. In analogy with the above analysis, the red curve refers to the training restricted to \(N_2+N_3+N_4\) eigenvalues; the blue profile is obtained when the deep neural network is trained in direct space by adjusting an identical number of inter-nodes weights. As for the case of a fully linear architecture, by adjusting the eigenvalues yields better classification performances. The black line shows the accuracy of the neural network when the full set of \(N_1 N_2+N_2 N_3+N_3 N_4\) is optimized in direct space. The green line refer instead to the spectral learning when the eigenvalues and eigenvectors are trained simultaneously. The accuracies estimated for these two latter settings agree within statistical error, even if the spectral scheme seems more robust to overfitting (the black circles declines slightly when increasing \(N_2\), while the collection of green points appears rather stable). # Conclusions Summing up, we have here proposed a novel approach to the training of deep neural networks which is bound to the spectral, hence reciprocal, domain. The eigenvalues and eigenvectors of the adjacency matrices that connects consecutive layers via directed feed-forward links are trained, instead of adjusting the weights that bridge each pair of nodes of the collection, as it is customarily done in the framework of conventional ML approaches. The first conclusion of our analysis is that optimizing the eigenvalues, when freezing the eigenvectors, yields performances which are superior to those attained with conventional methods *restricted* to a operate with an identical number of free parameters. It is therefore surmised that eigenvalues are key target parameters for neural networks training, in that they allow for a *global* handling of the learning. This is at variance with conventional approaches which seek at modulating the weights of the links among mutually connected nodes. Secondly, the spectral learning restricted to the eigenvalues yields a distribution of the weights which resembles quite closely that obtained with conventional algorithms bound to operate in direct space. For this reason, the proposed method could be used in combination with existing ML algorithms for an effective (and computationally advantageous) pre-training of deep neural networks. We have also shown that linear processing units inserted in between consecutive, non-linearly activated layers produce an enlargement of the learning parameters space, with beneficial effects in terms of performance of the trained device. Extending the learning so as to optimize the eigenvectors enhances the ability of the network to operate the sought classification. In the proposed implementation, and to recover a feed-forward architecture in direct space, we have assumed a nested indentation of the eigenvectors. Entangling the eigenvectors referred to successive stacks is the key for a recursive processing of the data, from the input to the output layer. Employing other non-orthogonal basis could eventually allow to challenge different topologies in direct space and shed novel light on the surprising ability of deep networks to cope with the assigned tasks. In future perspective, it would interesting to characterize the solutions attained with the spectral method, following the strategy outlined in. Further, it could be interesting to combine the spectral approach to other existing schemes which have been devised to improve the computational performance of deep neural networks, without significant loss in final recognition accuracy.
{'timestamp': '2020-10-23T02:26:55', 'yymm': '2005', 'arxiv_id': '2005.14436', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14436'}
# Introduction dominates the Internet. In North America, Netflix and YouTube alone account for more than fifty percent of downstream traffic, and there are many other significant video service providers. Improving the efficiency of video encoding, storage, and streaming over communication networks is a principle goal of video sharing and streaming platforms. One relevant and essential research direction is the perceptual optimization of rate-distortion tradeoffs in video encoding and streaming, where distortion (or quality) is usually modeled using video quality assessment (VQA) algorithms that can predict human judgements of video quality. This has motivated years of research on the topics of perceptual video and image quality assessment (VQA/IQA). VQA research can be divided into two closely related categories: subjective video quality studies and objective video quality modeling. Subjective video quality research usually requires substantial resources devoted to time-and labor-consuming human studies to obtain valuable and reliable subjective data. The datasets obtained from subjective studies are invaluable for the development, calibration, and benchmarking of objective video quality models that are consistent with subjective mean opinion scores (MOS). Hence, researchers have devoted considerable efforts on the development of high-quality VQA datasets that benefit the video quality community. Table [\[table:db_comp\]](#table:db_comp){reference-type="ref" reference="table:db_comp"} summarizes the ten-year evolution of popular public VQA databases. The first successful VQA database was the LIVE Video Quality Database, which was first made publicly available in 2008. It contains \(10\) pristine high-quality videos subjected to compression and transmission distortions. Other similar databases targeting simulated compression and transmission distortions have been released subsequently, including EPFL-PoliMI, VQEG-HDTV, IVP, TUM 1080p50, CSIQ, MCL-V, and MCL-JCV. All of the above mentioned datasets are based on a small set of high-quality videos, dubbed "pristine" or "reference," then synthetically distorting them in a controlled manner. We will refer to these kinds of synthetically-distorted video sets as *legacy* VQA databases. Legacy databases are generally characterized by only a small number of unique contents, each simultaneously degraded by only one or at most two synthetic distortions. For most practical scenarios, these are too simple to represent the great variety of real-world videos, and hence, VQA models derived on these databases may be insufficiently generalizable to large-scale realistic commercial VQA applications. Recently, there has been tremendous growth in social media, where huge volumes of user-generated content (UGC) is shared over the media platforms such as YouTube, Facebook, and TikTok. Advances in powerful and affordable mobile devices and cloud computing techniques, combined with significant advances in video streaming have made it easy for most consumers to create, share, and view UGC pictures/videos instantaneously across the globe. Indeed, the prevalence of UGC has started to shift the focus of video quality research from *legacy* synthetically-distorted databases to newer, larger-scale authentic UGC datasets, which are being used to create solutions to what we call the **[UGC-VQA problem]{.sans-serif}**. UGC-VQA studies typically follow a new design paradigm whereby: 1) All the source content is consumer-generated instead of professional-grade, thus suffers from unknown and highly diverse impairments; 2) they are only suitable for testing and comparing no-reference models, since reference videos are unavailable; 3) the types of distortions are authentic and commonly intermixed, and include but are not limited to capture impairments, editing and processing artifacts, compression, transcoding, and transmission distortions. Moreover, compression artifacts are not necessarily the dominant factors affecting video quality, unlike legacy VQA datasets and algorithms. These unpredictable perceptual degradations make perceptual quality prediction of UGC consumer videos very challenging. Here we seek to address and gain insights into this new challenge (UGC-VQA) by first, conducting a comprehensive benchmarking study of leading video quality models on several recently released large-scale UGC-VQA databases. We also propose a new fusion-based blind VQA (BVQA) algorithm, which we call the VIDeo quality EVALuator (VIDEVAL), which is created by the processes of feature selection from existing top-performing VQA models. The empirical results show that a simple aggregation of these known models can achieve state-of-the-art (SOTA) performance. We believe that our expansive study will inspire and drive future research on BVQA modeling for the challenging UGC-VQA problem, and also pave the way towards deep learning-based solutions. The outline of this paper is as follows: Section [2](#sec:ugc_db){reference-type="ref" reference="sec:ugc_db"} reviews and analyzes the three most recent large-scale UGC-VQA databases, while Section [3](#sec:nr_vqa){reference-type="ref" reference="sec:nr_vqa"} briefly surveys the development of BVQA models. We introduce the proposed VIDEVAL model in Section [4](#sec:fs){reference-type="ref" reference="sec:fs"}, and provide experimental results in Section [5](#sec:exp){reference-type="ref" reference="sec:exp"}. Finally, concluding remarks are given in Section [6](#sec:conclud){reference-type="ref" reference="sec:conclud"}. # UGC-VQA Databases {#sec:ugc_db} The first UGC-relevant VQA dataset containing authentic distortions was introduced as the Camera Video Database (CVD2014), which consists of videos with in-the-wild distortions from 78 different video capture devices, followed by the similar LIVE-Qualcomm Mobile In-Capture Database. These two databases, however, only modeled (camera) capture distortions on small numbers of not very diverse unique contents. Inspired by the first successful massive online crowdsourcing study of UGC picture quality, the authors of created the KoNViD-1k video quality database, the first such resource for UGC videos. It consists of 1,200 public-domain videos sampled from the YFCC100M dataset, and was annotated by 642 crowd-workers. LIVE-VQC was another large-scale UGC-VQA database with 585 videos, crowdsourced on Amazon Mechanical Turk to collect human opinions from 4,776 unique participants. The most recently published UGC-VQA database is the YouTube-UGC Dataset comprising 1,380 20-second video clips sampled from millions of YouTube videos, which were rated by more than 8,000 human subjects. Table [\[table:ugc_db_comp\]](#table:ugc_db_comp){reference-type="ref" reference="table:ugc_db_comp"} summarizes the main characteristics of the three large-scale UGC-VQA datasets studied, while Figure [\[fig:snapshot\]](#fig:snapshot){reference-type="ref" reference="fig:snapshot"} shows some representative snapshots of the source sequences for each database, respectively. ## Content Diversity and MOS Distribution As a way of characterizing the content diversity of the videos in each database, Winkler suggested three quantitative attributes related to spatial activity, temporal activity, and colorfulness. Here we expand the set of attributes to include six low-level features including brightness, contrast, colorfulness, sharpness, spatial information (SI), and temporal information (TI), thereby providing a larger visual space in which to plot and analyze content diversities of the three UGC-VQA databases. To reasonably limit the computational cost, each of these features was calculated on every 10th frame, then was averaged over frames to obtain an overall feature representation of each content. For simplicity, we denote the features as \(\{\mathrm{C}_i\},i=1,2...,6\). Figure [\[fig:ind_feat_dis\]](#fig:ind_feat_dis){reference-type="ref" reference="fig:ind_feat_dis"} shows the fitted kernel distribution of each selected feature. We also plotted the convex hulls of paired features, to show the feature coverage of each database, in Figure [\[fig:feat_cvx_hull\]](#fig:feat_cvx_hull){reference-type="ref" reference="fig:feat_cvx_hull"}. To quantify the coverage and uniformity of these databases over each defined feature space, we computed the relative range and uniformity of coverage, where the relative range is given by: \[\label{eq:relative_range} \mathrm{R}_i^k=\frac{\max(\mathrm{C}_i^k)-\min(\mathrm{C}_i^k)}{\max_{k} (\mathrm{C}_i^k)},\] where \(\mathrm{C}_i^k\) denotes the feature distribution of database \(k\) for a given feature dimension \(i\), and \(\max_{k}(\mathrm{C}_i^k)\) specifies the maximum value for that given dimension across all databases. Uniformity of coverage measures how uniformly distributed the videos are in each feature dimension. We computed this as the entropy of the \(\mathrm{B}\)-bin histogram of \(\mathrm{C}_i^k\) over all sources for each database indexed \(k\): \[\label{eq:uniformity} \mathrm{U}^k_i=-\sum_{b=1}^\mathrm{B} p_b \log_\mathrm{B} p_b,\] where \(p_b\) is the normalized number of sources in bin \(b\) at feature \(i\) for database \(k\). The higher the uniformity the more uniform the database is. Relative range and uniformity of coverage are plotted in Figure [\[fig:relative_range\]](#fig:relative_range){reference-type="ref" reference="fig:relative_range"} and Figure [\[fig:uniformity\]](#fig:uniformity){reference-type="ref" reference="fig:uniformity"}, respectively, quantifying the intra-and inter-database differences in source content characteristics. We also extracted 4,096-dimensional VGG-19 deep features and embedded these features into 2D subspace using t-SNE to further compare content diversity, as shown in Figure [\[fig:tsne\]](#fig:tsne){reference-type="ref" reference="fig:tsne"}. Apart from content diversity expressed in terms of visual features, the statistics of the subjective ratings are another important attribute of each video quality database. The main aspect considered in the analysis here is the distributions of mean opinion scores (MOS), as these are indicative of the quality range of the subjective judgements. The analysis of standard deviation of MOS is not presented here since it is not provided in LIVE-VQC. Figure [\[fig:mos_dist\]](#fig:mos_dist){reference-type="ref" reference="fig:mos_dist"} displays the histogram of MOS distributions for the three UGC-VQA databases. ## Observations {#ssec:observation} We make some observations from the above plots. As may be seen in Figures [\[fig:ind_feat_disa\]](#fig:ind_feat_disa){reference-type="ref" reference="fig:ind_feat_disa"} and [\[fig:ind_feat_disb\]](#fig:ind_feat_disb){reference-type="ref" reference="fig:ind_feat_disb"}, and the corresponding convex hulls in Figure [\[fig:feat_cvx_hull\]](#fig:feat_cvx_hull){reference-type="ref" reference="fig:feat_cvx_hull"}, KoNViD-1k and YouTube-UGC exhibit similar coverage in terms of brightness and contrast, while LIVE-VQC adheres closer to middle values. Regarding colorfulness, KoNViD-1k shows a skew towards higher scores than the other two datasets, which is consistent with the observations that Flickr users self-characterize as either professional video/photographers or as dedicated amateurs. On the sharpness and SI histograms, YouTube-UGC is spread most widely, while KoNViD-1k is concentrated on lower values. Another interesting finding from the TI statistics: LIVE-VQC is distributed more towards higher values than YouTube-UGC and KoNViD-1k, consistent with our observation that videos in LIVE-VQC were captured in the presence of larger and more frequent camera motions. We will revisit this interesting aspect of TI when evaluating the BVQA models in Section [5](#sec:exp){reference-type="ref" reference="sec:exp"}. The visual comparison in Figure [\[fig:tsne\]](#fig:tsne){reference-type="ref" reference="fig:tsne"} shows that YouTube-UGC and KoNViD-1k span a wider range of VGG-19 feature space than does LIVE-VQC, indicating significant content diversity differences. Figure [\[fig:mos_dist\]](#fig:mos_dist){reference-type="ref" reference="fig:mos_dist"} shows the MOS distributions: all three databases have right-skewed MOS distributions, with KoNViD-1k less so, and LIVE-VQC and YouTube-UGC more so. The overall ranges and uniformity comparisons in Figures [\[fig:relative_range\]](#fig:relative_range){reference-type="ref" reference="fig:relative_range"}, [\[fig:uniformity\]](#fig:uniformity){reference-type="ref" reference="fig:uniformity"}, and [\[fig:tsne\]](#fig:tsne){reference-type="ref" reference="fig:tsne"} suggest that constructing a database by crawling and sampling from a large content repository is likely to yield a more content-diverse, uniformly-distributed dataset than one created from pictures or videos captured directly from a set of user cameras. Both cases may be argued to be realistic in some scenario. # UGC-VQA Models {#sec:nr_vqa} The goal of subjective video quality studies is to motivate the development of automatic objective video quality models. Conventionally, objective video quality assessment can be classified into three main categories: full-reference (FR), reduced-reference (RR), and no-reference (NR) models. FR-VQA models require the availability of an entire pristine source video to measure visual differences between a target signal and a corresponding reference, while RR-VQA models only make use of a limited amount of reference information. Some popular FR-VQA models, including PSNR, SSIM, and VMAF have already been successfully and massively deployed to optimize streaming and shared/uploaded video encoding protocols by leading video service providers. NR-VQA or BVQA models, however, rely solely on analyzing the test stimuli without the benefit of any corresponding "ground truth" pristine signal. It is obvious that only BVQA models are appropriate for the UGC-VQA problem. Here we briefly review the evolution of BVQA models, from conventional handcrafted feature-based approaches, on to convolutional neural network-based models. ## Conventional Feature-Based BVQA Models Almost all of the earliest BVQA models have been 'distortion specific,' meaning they were designed to quantify a specific type of distortion such as blockiness, blur, ringing, banding, or noise in distorted videos, or to assess multiple specific coincident distortion types caused by compression or transmission impairments. More recent top-performing BVQA models are almost exclusively learning-based, leveraging a set of generic quality-aware features, combined to conduct quality prediction by machine learning regression. Learning-based BVQA models are more versatile and generalizable than 'distortion specific' models, in that the selected features are broadly perceptually relevant, while powerful regression models can adaptively map the features onto quality scores learned from the data in the context of a specific application. The most popular BVQA algorithms deploy perceptually relevant, low-level features based on simple, yet highly regular parametric bandpass models of good-quality scene statistics. These natural scene statistics (NSS) models predictably deviate in the presence of distortions, thereby characterizing perceived quality degradations. Successful blind picture quality assessment (BIQA) models of this type have been developed in the wavelet (BIQI, DIIVINE, C-DIIVINE ), discrete cosine transform (BLIINDS, BLIINDS-II ), curvelet, and spatial intensity domains (NIQE, BRISQUE ), and have further been extended to video signals using natural bandpass space-time video statistics models, among which the most well-known model is the Video-BLIINDS. Other extensions to empirical NSS include the joint statistics of the gradient magnitude and Laplacian of Gaussian responses in the spatial domain (GM-LOG ), in log-derivative and log-Gabor spaces (DESIQUE ), as well as in the gradient domain of LAB color transforms (HIGRADE ). The FRIQUEE model has been observed to achieve SOTA performance both on UGC/consumer video/picture databases like LIVE-Challenge, CVD2014, and KoNViD-1k by leveraging a bag of NSS features drawn from diverse color spaces and perceptually motivated transform domains. Instead of using NSS-inspired feature descriptors, methods like CORNIA employ unsupervised learning techniques to learn a dictionary (or codebook) of distortions from raw image patches, and was further extended to Video CORNIA by applying an additional temporal hysteresis pooling of learned frame-level quality scores. Similar to CORNIA, the authors of proposed another codebook-based general-purpose BVQA method based on High Order Statistics Aggregation (HOSA), requiring only a small codebook, yet yielding promising performance. A very recent handcrafted feature-based BVQA model is the "two level" video quality model (TLVQM), wherein a two-level feature extraction mechanism is adopted to achieve efficient computation of a set of carefully-defined impairment/distortion-relevant features. Unlike NSS features, TLVQM selects a comprehensive feature set comprising of empirical motion statistics, specific artifacts, and aesthetics. TLVQM does require that a large set of parameters (around 30) be specified, which may affect performance on datasets or application scenarios it has not been exposed to. The model currently achieves SOTA performance on three UGC video quality databases, CVD2014, KoNViD-1k, and LIVE-Qualcomm, at a reasonably low complexity, as reported by the authors. ## Deep Convolutional Neural Network-Based BVQA Models Deep convolutional neural networks (CNNs or ConvNets) have been shown to deliver standout performance on a wide variety of low-level computer vision applications. Recently, the release of several "large-scale" (in the context of IQA/VQA research) subjective quality databases have sped the application of deep CNNs to perceptual quality modeling. For example, several deep learning picture-quality prediction methods were proposed in. To conquer the limits of data scale, they either propose to conduct patch-wise training using global scores, or by pretraining deep nets on ImageNet, then fine tuning. Several authors report SOTA performance on legacy synthetic distortion databases or on naturally distorted databases. Among the applications of deep CNNs to blind video quality prediction, Kim proposed a deep video quality assessor (DeepVQA) to learn the spatio-temporal visual sensitivity maps via a deep ConvNet and a convolutional aggregation network. The V-MEON model used a multi-task CNN framework which jointly optimizes a 3D-CNN for feature extraction and a codec classifier using fully-connected layers to predict video quality. Zhang leveraged transfer learning to develop a general-purpose BVQA framework based on weakly supervised learning and a resampling strategy. In the VSFA model, the authors applied a pre-trained image classification CNN as a deep feature extractor and integrated the frame-wise deep features using a gated recurrent unit and a subjectively-inspired temporal pooling layer, and reported leading performance on several natural video databases. These SOTA deep CNN-based BVQA models produce accurate quality predictions on legacy (single synthetic distortion) video datasets, but struggle on recent in-the-wild UGC databases. FRIQUEE and VIDEVAL were evaluated on a subset of 1,323 color videos in YouTube-UGC, denoted YouTube-UGC~c~, since it yields numerical errors when calculating on the remaining \(57\) grayscale videos. For the other BVQA models evaluated, no significant difference was observed when evaluated on YouTube-UGC~c~ versus YouTube-UGC, and hence we still report the results on YouTube-UGC.\ For a fair comparison, we only combined and calibrated (via INLSA ) all the color videos from these three databases to obtain the combined dataset, i.e., All-Combined~c~ (3,108) \(=\) KoNViD-1k (1,200) \(+\) LIVE-VQC (585) \(+\) YouTube-UGC~c~ (1,323). It is also worth mentioning that the deep CNN baseline methods (VGG-19 and ResNet-50), despite being trained as picture-only models, performed quite well on KoNViD-1k and All-Combined~c~. This suggests that transfer learning is a promising technique for the blind UGC-VQA problem, consistent with conclusions drawn for picture-quality prediction. Deep models will perform even better, no doubt, if trained on temporal content and distortions. The two most recent deep learning picture quality models, PaQ-2-PiQ, and KonCept512, however, did not perform very well on the three evaluated video datasets. The most probable reason would be that these models were trained on picture quality datasets, which contain different types of (strictly spatial) distortions than UGC-VQA databases. Models trained on picture quality sets do not necessarily transfer very well to UGC video quality problems. In other words, whatever model should be either trained or fine-tuned on UGC-VQA datasets in order to obtain reasonable performance. Indeed, if temporal distortions (like judder) are present, they may severely underperform if the frame quality is high. ## Performance Evaluation on Categorical Subsets We propose three new categorical evaluation methodologies-resolution, quality, and content-based category breakdown. These will allow us to study the compared BVQA models from additional and practical aspects in the context of real-world UGC scenarios, which have not been, nor can it be accounted in previous legacy VQA databases or studies. For resolution-dependent evaluation, we divided the All-Combined~c~ set into three subsets, based on video resolution: (1) 427 1080p-videos (110 from LIVE-VQC, 317 from YouTube-UGC), (2) 566 720p-videos (316 from LIVE-VQC, 250 from YouTube-UGC), and (3) 448 videos with resolution \(\le\)`<!-- -->`{=html}480p (29 from LIVE-VQC, 419 from YouTube-UGC), since we are also interested in performance on videos of different resolutions. We did not include 540p-videos, since those videos are almost exclusively from KoNViD-1k. Table [3](#table:resolution_breakdown){reference-type="ref" reference="table:resolution_breakdown"} shows the resolution-breakdown evaluation results. Generally speaking, learned features (CORNIA, HOSA, VGG-19, KonCept512, and ResNet-50) outperformed hand-designed features, among which ResNet-50 ranked first. Here we make two arguments to try to explain the observations above: (1) video quality is intrinsically correlated with resolution; (2) NSS features are implicitly *resolution-aware*, while CNN features are not. The first point is almost self-explanatory, no matter to what degree one agrees. To further justify this, we trained an SVR only using resolution (height, width) as features to predict MOS on YouTube-UGC, which contains balanced samples across five different resolutions. This yielded surprisingly high values \(0.576 / 0.571\) for SRCC\(/\)PLCC, indicating the inherent correlation between video quality and resolution. Secondly, we selected one 2160p video from YouTube-UGC, namely 'Vlog2160P-408f.mkv,' and plotted, in Figure [\[fig:nss\]](#fig:nss){reference-type="ref" reference="fig:nss"}, the mean-subtracted contrast-normalized (MSCN) distributions of its downscaled versions: 2160p, 1440p, 1080p, 720p, 480p, and 360p. It may be observed that resolution can be well separated by MSCN statistics, based on which most feature-based methods are built. We may infer, from these two standpoints, that including various resolutions of videos is favorable to the training of NSS-based models, since NSS features are resolution-aware, and resolution is further well correlated with quality. In other words, the resolution-breakdown evaluation shown in Table [3](#table:resolution_breakdown){reference-type="ref" reference="table:resolution_breakdown"}, which removes this important implicit feature (resolution), would possibly reduce the performance of NSS-based models, such as FRIQUEE and VIDEVAL. We also divided the All-Combined~c~ into subsets based on content category: Screen Content (163), Animation (81), Gaming (209), and Natural (2,667) videos. We only reported the evaluation results on the first three subsets in Table [4](#table:content_breakdown){reference-type="ref" reference="table:content_breakdown"}, since we observed similar results on the Natural subset with the entire combined set. The proposed VIDEVAL model outperformed over all categories, followed by ResNet-50 and FRIQUEE, suggesting that VIDEVAL features are robust quality indicatives across different content categories. The third categorical division is based on quality scores: we partitioned the combined set into Low Quality (1,558) and High Quality (1,550) halves, using the median quality value 3.5536 as the threshold, to see the model performance only on high/low quality videos. Performance results are shown in Table [5](#table:quality_breakdown){reference-type="ref" reference="table:quality_breakdown"}, wherein VIDEVAL still outperformed the other BVQA models on both low and high quality partitions. ## Cross Dataset Generalizability We also performed a cross dataset evaluation to verify the generalizability of BVQA models, wherein LIVE-VQC, KoNViD-1k, and YouTube-UGC~c~ were included. That is, we trained the regression model on one full database and report the performance on another. To retain label consistency, we linearly scaled the MOS values in LIVE-VQC from raw \([0,100]\) to \([1,5]\), which is the scale for the other two datasets. We used SVR for regression and adopted \(k\)-fold cross validation using the same grid-search as in Section [5.1](#ssec:eval_proto){reference-type="ref" reference="ssec:eval_proto"} for hyperparameter selection. The selected parameter pair were then applied to re-train the SVR model on the full training set, and the performance results on the test set were recorded. Table [6](#table:cross_dataset_srcc){reference-type="ref" reference="table:cross_dataset_srcc"} and [7](#table:cross_dataset_plcc){reference-type="ref" reference="table:cross_dataset_plcc"} show the best performing methods with cross domain performances in terms of SRCC and PLCC, respectively. We may see that the cross domain BVQA algorithm generalization between LIVE-VQC and KoNViD-1k was surprisingly good, and was well characterized by pre-trained ResNet-50 features. We also observed better algorithm generalization between KoNViD-1k and YouTube-UGC than LIVE-VQC, as indicated by the performances of the best model, VIDEVAL. This might be expected, since as Figure [\[fig:tsne\]](#fig:tsne){reference-type="ref" reference="fig:tsne"} shows, YouTube-UGC and KoNViD-1k share overlapped coverage of content space, much larger than that of LIVE-VQC. Therefore, we may conclude that VIDEVAL and ResNet-50 were the most robust BVQA models among those compared in terms of cross domain generalization capacities. ## Effects of Temporal Pooling Temporal pooling is one of the most important, unresolved problems for video quality prediction. In our previous work, we have studied the efficacy of various pooling methods using scores predicted by BIQA models. Here we extend this to evaluate on SOTA BVQA models. For practical considerations, the high-performing TLVQM and VIDEVAL were selected as exemplar models. Since these two models independently extract features on each one-second block, we applied temporal pooling of chunk-wise quality predictions. A total of eleven pooling methods were tested: three Pythagorean means (arithmetic, geometric, and harmonic mean), median, Minkowski (\(p=2\)) mean, percentile pooling (\(20\%\)), VQPooling, primacy and recency pooling, hysteresis pooling, and our previously proposed ensemble method, EPooling, which aggregates multiply pooled scores by training a second regressor on top of mean, Minkowski, percentile, VQPooling, variation, and hysteresis pooling. We refer the reader to for detailed algorithmic formulations and parameter settings thereof. It is worth noting that the results in Table [\[table:pooling\]](#table:pooling){reference-type="ref" reference="table:pooling"} are only *self-consistent*, meaning that they are not comparable to any prior experiments-since we employed chunk-wise instead of previously adopted video-wise quality prediction to be able to apply temporal quality pooling, which may affect the base performance. Here we observed yet slightly different results using BVQA testbeds as compared to what we observed on BIQA. Generally, we found the mean families and ensemble pooling to be the most reliable pooling methods. Traditional sample mean prediction may be adequate in many cases, due to its simplicity. Pooling strategies that more heavily weight low-quality parts, however, were not observed to perform very well on the tested BVQA, which might be attributed to the fact that not enough samples (\(8\sim 20\)) can be extracted from each video to attain statistically meaningful results. ## Complexity Analysis and Runtime Comparison The efficiency of a video quality model is of vital importance in practical commercial deployments. Therefore, we also tabulated the computational complexity and runtime cost of the compared BVQA models, as shown in Tables [\[table:complexity\]](#table:complexity){reference-type="ref" reference="table:complexity"}, [8](#table:time_dl){reference-type="ref" reference="table:time_dl"}. The experiments were performed in MATLAB R2018b and Python 3.6.7 under Ubuntu 18.04.3 LTS system on a Dell OptiPlex 7080 Desktop with Intel Core i7-8700 CPU\@3.2GHz, 32G RAM, and GeForce GTX 1050 Graphics Cards. The average feature computation time of MATLAB-implemented BVQA models on 1080p videos are reported in Table [\[table:complexity\]](#table:complexity){reference-type="ref" reference="table:complexity"}. The proposed VIDEVAL method achieves a reasonable complexity among the top-performing algorithms, TLVQM, and FRIQUEE. We also present theoretical time complexity in Table [\[table:complexity\]](#table:complexity){reference-type="ref" reference="table:complexity"} for potential analytical purposes. We also provide in Table [8](#table:time_dl){reference-type="ref" reference="table:time_dl"} an additional runtime comparison between MATLAB models on CPU and deep learning models on CPU and GPU, respectively. It may be observed that top-performing BVQA models such as TLVQM and VIDEVAL are essentially slower than deep CNN models, but we expect orders-of-magnitude speedup if re-implemented in pure \(\text{C}/\text{C}\texttt{++}\). Simpler NSS-based models such as BRISQUE and HIGRADE (which only involve several convolution operations) still show competitive efficiency relative to CNN models even when implemented in MATLAB. We have also seen a \(5\sim 10\) times speedup switching from CPU to GPU for the CNN models, among which KonCept512 with PyTorch-GPU was the fastest since it requires just a single pass to the CNN backbone, while the other three entail multiple passes for each input frame. Note that the training/test time of the machine learning regressor is approximately proportional to the number of features. Thus, it is not negligible compared to feature computation given a large number of features, regardless of the regression model employed. The feature dimension of each model is listed in Table [\[table:complexity\]](#table:complexity){reference-type="ref" reference="table:complexity"}. As may be seen, codebook-based algorithms (CORNIA (10\(k\)) and HOSA (14.7\(k\))) require significantly larger numbers of features than other hand-crafted feature based models. Deep ConvNet features ranked second in dimension (VGG-19 (4,080) and ResNet-50 (2,048)). Our proposed VIDEVAL only uses 60 features, which is fairly compact, as compared to other top-performing BVQA models like FRIQUEE (560) and TLVQM (75). ## Ensembling VIDEVAL with Deep Features {#ssec:ensemble} We also attempted a more sophisticated ensemble fusion of VIDEVAL and deep learning features to determine whether this could further boost its performance, which could give insights on the future direction of this field. Since PaQ-2-PiQ aimed for local quality prediction, we included the predicted \(3\times 5\) local quality scores as well as a single global score, as additional features. For KonCept512, the feature vector (256-dim) immediately before the last linear layer in the fully-connected head was appended. Our own baseline CNN models, VGG-19 and ResNet-50, were also considered, because these are commonly used standards for downstream vision tasks. The overall results are summarized in Table [9](#table:fusion){reference-type="ref" reference="table:fusion"}. We may observe that ensembling VIDEVAL with certain deep learning models improved the performance by up to \(\sim 4\%\) compared to the vanilla VIDEVAL, which is very promising. Fusion with either ResNet-50 or KonCept512 yielded top performance. It should be noted that the number of fused features is also an essential aspect. For example, blending VIDEVAL (60-dim) with VGG-19 (4,096-dim) may not be recommended, since the enormous number of VGG-19 features could possibly dominate the VIDEVAL features, as suggested by some performance drops in Table [9](#table:fusion){reference-type="ref" reference="table:fusion"}. ## Summarization and Takeaways Finally, we briefly summarize the experimental results and make additional observations: 1. Generally, spatial distortions dominated quality prediction on Internet UGC videos like those from YouTube and Flickr, as revealed by the remarkable performances of picture-only models (e.g., HIGRADE, FRIQUEE, HOSA, ResNet-50) on them. Some motion-related features (as in TLVQM) may not apply as well in this scenario. 2. On videos captured with mobile devices (e.g., those in LIVE-VQC), which often present larger and more frequent camera motions, including temporal-or motion-related features can be advantageous (e.g., V-BLIINDS, TLVQM, VIDEVAL). 3. Deep CNN feature descriptors (VGG-19, ResNet-50, etc.) pre-trained for other classical vision tasks (e.g. image classification) are transferable to UGC video quality predictions, achieving very good performance, suggesting that using transfer learning to address the general UGC-VQA problem is very promising. 4. It is still a very hard problem to predict UGC video quality on non-natural or computer-generated video contents: screen contents, animations, gaming, etc. Moreover, there are no sufficiently large UGC-VQA datasets designed for those kinds of contents. 5. A simple feature engineering and selection implementation built on top of current effective feature-based BVQA models is able to obtain excellent performance, as exemplified by the compact new model (VIDEVAL). 6. Simple temporal mean pooling of chunk-wise quality predictions by BVQA models yields decent and robust results. Furthermore, an ensemble pooling approach can noticeably improve the quality prediction performance, albeit with higher complexity. 7. Ensembling scene statistics-based BVQA models with additional deep learning features (e.g., VIDEVAL plus KonCept512) could further raise the performance upper bound, which may be a promising way of developing future BVQA models. # Conclusion {#sec:conclud} We have presented a comprehensive analysis and empirical study of blind video quality assessment for user-generated content (the **[UGC-VQA problem]{.sans-serif}**). We also proposed a new fusion-based BVQA model, called the VIDeo quality EVALuator (VIDEVAL), which uses a feature ensemble and selection procedure on top of existing efficient BVQA models. A systematic evaluation of prior leading video quality models was conducted within a unified and reproducible evaluation framework and accordingly, we concluded that a selected fusion of simple distortion-aware statistical video features, along with well-defined visual impairment features, is able to deliver state-of-the-art, robust performance at a very reasonable computational cost. The promising performances of baseline CNN models suggest the great potential of leveraging transfer learning techniques for the UGC-VQA problem. We believe that this benchmarking study will help facilitate UGC-VQA research by clarifying the current status of BVQA research and the relative efficacies of modern BVQA models. To promote reproducible research and public usage, an implementation of VIDEVAL has been made available online: **<https://github.com/vztu/VIDEVAL>**. In addition to the software, we are also maintaining an ongoing performance leaderboard on Github: **<https://github.com/vztu/BVQA_Benchmark>**. [^1]: <https://github.com/ZhengyuZhao/koniq-PyTorch> [^2]: <https://github.com/baidut/paq2piq>
{'timestamp': '2021-04-20T02:07:39', 'yymm': '2005', 'arxiv_id': '2005.14354', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14354'}
# Introduction Let \(\mathcal{A}=\{H_1,\ldots,H_s\}\) be a central hyperplane arrangement in \(V=\mathbb{K}^n,\) where \(\mathbb{K}\) is a field of characteristic zero. If \(x_1,\ldots,x_n\) is a basis for \(V^*\), then \(H_i=V(l_i)\), \(i=1,\ldots,s,\) for some linear forms \(l_i\) in \(S:=\mathrm{Sym}(V^*)=\mathbb{K}[x_1,\ldots,x_n].\) The module of the derivations of \(S\) has the structure \(\mathrm{Der}(S)=\oplus_{i=1}^{n}S\frac{\partial}{\partial{x_i}}\), that is, it is free of rank \(n\). A *logarithmic derivation* of \(\mathcal{A}\) is an element \(\theta \in \mathrm{Der}(S)\), such that \(\theta(l_i) \in \langle l_i \rangle\), for all \(i= 1,\ldots, s.\) The set of the logarithmic derivations forms an \(S\)-module, usually detonated by \(\mathrm{Derlog}(\mathcal{A})\); the standard grading of \(S\) induces a graded module structure on this \(S\)-module. Therefore, by the structure of the module of the derivations we can write \(\theta = \sum_{i=1}^{n}P_i\frac{\partial}{\partial{x_i}}\) with \(P_i\) homogeneous polynomials of the same degree, so we can define \(\mathrm{deg}(\theta)=\mathrm{deg}(P_i)\). Consider \(F:=\Pi_{i=1}^{s}l_i\) the defining polynomial of \(\mathcal{A}\). Since \(F\) is a homogeneous polynomial the structure of module of the logarithmic derivations is well known, \[\mathrm{Derlog}(\mathcal{A})= \mathrm{Syz}(J_F)\oplus S\theta_E,\] where \(\mathrm{Syz}(J_F)\) is the first module of the syzygies on the Jacobian ideal of \(F\), that is, the ideal of \(S\) generated by the partial derivatives of the \(F\) and \(\theta_E=\sum_{i=1}^{n}x_i\frac{\partial}{\partial{x_i}}\) is the Euler derivation. In general, when \(\mathrm{Syz}(J_F)\) is free, \(V(F)\) is called a *free divisor* (and therefore the hyperplane arrangement \(\mathcal A\) is called *free*). Maybe one of the most important conjecture in the field of hyperplane arrangement is Terao's Conjecture which states that if two hyperplane arrangements have isomorphic intersection lattices, then if one is free, then so is the other. So a deeper understanding of the generators of \(\mathrm{Syz}(J_F)\) is of utmost importance to tackle this conjecture: one would like to describe these generators, or their degrees, only from the combinatorics of \(\mathcal A\), if possible. In the past 5-6 years, there has been a lot of work on the *minimal degree of a Jacobian relation*, which is the minimal degree of a syzygy of \(J_F\) (and here \(V(F)\) can be any divisor, not necessarily a hyperplane arrangement): \[r(\mathcal A)=mdr(\mathcal A):= \min_{r\in\mathbb Z}\{r|(\mathrm{Syz}(J_F))_r\neq 0\}.\] Finding degrees of syzygies (and more generally, the shapes of the graded minimal free resolutions) has been one of the most fundamental topics in commutative/homological algebra; and the literature about this is extensive, being impossible to list it all here without leaving out some of it. Same is true also if one is interested in syzygies of Jacobian ideals of divisors (and therefore analyzing their singular locus), with a particular focus on plane projective divisors. Specifically to line arrangements in \(\mathbb P^2\) (i.e., central rank 3 hyperplane arrangements in \(\mathbb K^3\)), we must mention the work of Dimca, Dimca-Sticlaru, and their coauthors: most of the time starting from results in where the invariant *mdr* seems to show up for the first time in the context of our project, they find connections between this invariant and the Tjurina number of a projective plane divisor (i.e., the degree of the Jacobian ideal), which in turn give restrictions on constructing line arrangements with prescribed combinatorics:, and the citations therein. Our goal is the following: in the spirit of, we will classify all line arrangements in \(\mathbb P^2\) with \(r(\mathcal A)=3\), also analyzing the shape of the corresponding cubic logarithmic derivation towards finding some structures in this shape. For the theoretical results we found essential the addition-deletion results for the minimal degree of logarithmic derivations of arrangements in. At the time of our work, this article was in "preprint" stage, yet the results that we are citing are correct: they are a structured and clear presentation of the underlying aspects of the results in that concern the minimal degree of a Jacobian relation. As an appendix, at the end we briefly look at this invariant for graphic arrangements. Below we summarize the results in; for more definitions and notations clarifications, we refer the reader to. Let \(\mathcal A\) be a finite collection of (linear) hyperplanes in \(\mathbb K^{\ell}\) with \(\cap_{H\in\mathcal A}H=\{0\}\) (i.e., we say that \(\mathcal A\) is central essential hyperplane arrangement of rank \(\ell\)). For \(H\in\mathcal A\), let \[\mathcal A''=\mathcal A^{H}:=\{H\cap L|L\in\mathcal A\setminus\{H\}\}\] be the *restriction*, and let \[\mathcal A':=\mathcal A\setminus\{H\}\] be the *deletion*. Also, denote \[r:=r(\mathcal A),\, r':=r(\mathcal A'), \, r'':=r(\mathcal A'').\] Observe that the statement (3) is the counterpositive of (2), combined with (1a), so basically they are the same. But the flavors are different: (2) is the "addition-deletion" part, meaning that if we have information about \(r'\) and \(r''\), then we will obtain some information about \(r\); whereas (3) is the "restriction" part, meaning that if we have information about \(r\) and \(r'\), then we will obtain information about \(r''\). # Line arrangements with cubic minimal log derivations Let us put the general concepts in our perspective. Let \(\mathcal{A}=\{V(l_1),\ldots,V(l_s)\}\subset \mathbb{P}^2\) be a line arrangement of rank 3. So \(V=\mathbb K^3\), and if \(x,y,z\) is a basis for \(V^*\), \(l_1,\ldots,l_s\) are linear forms in \(S:={\rm Sym}(V^*)=\mathbb K[x,y,z]\), with three of them being linearly independent. Also let \(F=l_1\cdots l_s\) be the defining polynomial of \(\mathcal A\). *The singular locus* of \(\mathcal A\), denoted \(Sing(\mathcal A)\), is the set of the intersection points of lines of \(\mathcal A\). For \(P\in Sing(\mathcal A)\), *the multiplicity* of \(P\), denoted \(m_P\), is the number of lines of \(\mathcal A\) intersecting at \(P\). Combinatorially, \(Sing(\mathcal A)\) is the set of rank 2 flats in the intersection lattice of \(\mathcal A\), and \(m_P=\nu(P)=\mu(P)+1\), where \(\mu(P)\) is the value of the Möbius function at \(P\). Also, denote \[m=m(\mathcal A):=\max\{m_P|P\in Sing(\mathcal A)\}.\] There are two very important formulas (with immediate inductive proofs on \(s\geq 2\)): \[(\star) \hspace{2cm} \mbox{If } H\in \mathcal A,\mbox{ then }\sum_{P\in Sing(\mathcal A)\cap H}(m_P-1)=s-1,\] and \[(\star\star) \hspace{2.5cm}\sum_{P\in Sing(\mathcal A)}{{m_P}\choose{2}}={{s}\choose{2}}.\hspace{2.7cm}\] For \(H\in\mathcal A\), we will denote \[|H|:=|\mathcal A''|=|Sing(\mathcal A)\cap H|,\] the number of singularities of \(\mathcal A\) lying on the line \(H\). With this in mind we have the following crucial result: The above theorem is a corollary to Theorem [\[additiondeletion\]](#additiondeletion){reference-type="ref" reference="additiondeletion"}: its proof uses the fact that \(r''=|H|-1\). Based on the same fact we have From this corollary we can conclude that \[\min\{|H|\, |\, H\in\mathcal A\}-1\leq r\leq s-m.\] In the perspective of Remark [\[lowerbound\]](#lowerbound){reference-type="ref" reference="lowerbound"}, we ask what is the relation between \(\alpha_0(\mathcal A)\) and \(\min\{|H|\,|\, H\in\mathcal A\}\), for an arbitrary line arrangement \(\mathcal A\subset \mathbb{P}^2\) of rank 3. Case (b) imposes some restrictions on the possible types of line arrangements. Let \(P\in Sing(\mathcal A)\), with \(m_P=m=m(\mathcal A)\). Since the rank of \(\mathcal A\) is 3, there must exist a line \(H\in\mathcal A\) that doesn't pass through \(P\). So \[m\leq |H|\leq d+1,\] and this is true for any line that doesn't pass through \(P\). If furthermore, \(m=d+1\), then \(\mathcal A\) is a supersolvable arrangement with modular point \(P\). Hence it is free with exponents \({\rm exp}(\mathcal A)=(1,d, s-(d+1))\), where \(|\mathcal A|=s\). ## The case of \(r=2\). Remark [\[recursion_remark\]](#recursion_remark){reference-type="ref" reference="recursion_remark"} can shortcut quite a bit the calculations done in in order to obtain the classification of rank 3 line arrangements with a quadratic minimal logarithmic derivation. In the above discussion, \(d=2\). For case (a), either by using, or, the line arrangement \(\mathcal B\) with \(r(\mathcal B)=d-1=1\) is a pencil of \(\geq d+1=3\) lines, and an extra line not part of the pencil; or a triangle of 3 lines. There are only two different ways one can add another line to \(\mathcal B\) to obtain \(\mathcal A\), with at least 3 points on it, and these give. For case (b), \(m\) can be only 2, or 3. If \(m=2\), then \(\mathcal A\) is the generic line arrangement of \(s\) lines, and since in this case \(Sing(\mathcal A)\) is a star configuration, its defining ideal is generated in degree \(s-1\) (see ). From Remark [\[lowerbound\]](#lowerbound){reference-type="ref" reference="lowerbound"} we require \(s-1\leq d+1=3\), then \(s\leq 4\), leading to \(s=4\) which is a special case of. If \(m=3\), then \(\mathcal A\) is a supersolvable line arrangement with exponents \((1,2,s-3)\). At the same time, by, we have \(2\geq (s-2)/2\), leading to \(s\leq 6\). Therefore \(\mathcal A\) is the supersolvable arrangement with exponents \((1,2,3)\) which is exactly, or \((1,2,2)\) which is a special case of. In summary this is the main result of; parts (1), (2), (3), correspond to (I), (II), and respectively, (III). ## The case of \(r=3\). As in the previous situation we apply Remark [\[recursion_remark\]](#recursion_remark){reference-type="ref" reference="recursion_remark"}, but when \(d=3\). Then the classification is the following: # Computational approach Let \(\mathcal A=\{V(l_1),\ldots,V(l_s)\}\subset \mathbb P^2\) be a rank 3 line arrangement. Suppose we fix the equations of the defining linear forms: \(l_i=a_ix+b_iy+c_iz\in S:=\mathbb K[x,y,z]\) for each \(i\in \{1,\ldots,s\}\). Let \(\theta=P\frac{\partial}{\partial x}+Q\frac{\partial}{\partial y}+R\frac{\partial}{\partial z}\) be a degree \(d\) logarithmic derivation of \(\mathcal{A}\), that is, \(P,Q,R \in S_d.\) For practical purpose we can suppose \(l_1=x,~l_2=y,~l_3=z\), then we can rewrite \[\theta=P'x\frac{\partial}{\partial x}+Q'y\frac{\partial}{\partial y}+R'z\frac{\partial}{\partial z}~ \mathrm{with}~ P',Q',R' \in S_{d-1}.\] Using the Euler derivation, we can write \(\theta=P'\theta_E+(Q'-P')y\frac{\partial}{\partial y}+(R'-P')z\frac{\partial}{\partial z}.\) Therefore, we can suppose \(P'=0\), and in the following sections we will work with a logarithmic derivation with the form \[\theta=Q'y\frac{\partial}{\partial y}+R'z\frac{\partial}{\partial z}~ \mathrm{with}~ Q',R' \in S_{d-1}.\] The main goal is to analyze the shape of such a logarithmic derivation, towards obtaining conditions for a line arrangement to possess a minimal logarithmic derivation to degrees 2 and 3 through a matrix argument. ## Degree 2 logarithmic derivations First we review the beginning of while having a more organized approach. Let \(\theta=Q'y\frac{\partial}{\partial y}+R'z\frac{\partial}{\partial z},~ \mathrm{with}~ Q',R' \in S_1,\) be a degree 2 logarithmic derivation of \(\mathcal{A}\). For each \(i\in \{1,\ldots,s\}\) we have \(\theta(l_i)=l_iT_i\) for some \(T_i\in S_1\). Let \(Q'=q_1x+q_2y+q_3z,~R'=r_1x+r_2y+r_3z,~T_i=t^i_1x+t^i_2y+t^i_3z\in S_1.\) Therefore, \[b_iyQ'+c_izR'=(a_ix+b_iy+c_iz)T_i.\] Comparing coefficients, the following six relations are obtained \[\begin{aligned} \label{EQdegree2} \displaystyle \Big\{\begin{array}{ccc} 0=a_it^i_1\hspace{1.5cm} & \hspace{0.5cm}b_iq_2=b_it^i_2\hspace{1.2cm} &\hspace{0.5cm} c_ir_3=c_it^i_3\hspace{2.1cm}\\ b_iq_1=a_it^i_2+b_it^i_1& \hspace{0.5cm}c_ir_1=a_it^i_3+c_it^i_1&\hspace{0.5cm} b_iq_3+c_ir_2=b_it^i_3+c_it^i_2 \end{array} \end{aligned}\] Applying Remark [\[divisonlines\]](#divisonlines){reference-type="ref" reference="divisonlines"} to ([\[EQdegree2\]](#EQdegree2){reference-type="ref" reference="EQdegree2"}) and eliminating the parameters \(t_1^i,t_2^i,t_3^i\), we have the following equations for \(q_1,q_2,q_3,r_1,r_2,r_3\) and their associated matrices \(\mathcal{N}_{\mathrm{i}},\mathcal{N}_{\mathrm{ii}},\mathcal{N}_{\mathrm{iii}},\mathcal{N}_{\mathrm{iv}}\) respectively. \(\bullet\) [Situation i)]{.ul}: for \(4\leq j \leq \mathfrak{j}\) we have \(q_3=0\) and \(q_1-a_jq_2=0\) with matrix \[\mathcal{N}_{\mathrm{i}}=\left[\begin{array}{cccccc} 0&0&1&0&0&0\\ 1&-a_4&0&0&0&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 1&-a_j&0&0&0&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 1&-a_{\mathfrak{j}}&0&0&0&0\\ \end{array}\right].\] \(\bullet\) [Situation ii)]{.ul}: for \(\mathfrak{j}+1\leq l \leq \mathfrak{l}\) we have \(r_2=0\) and \(r_1-a_lr_3=0\) with matrix \[\mathcal{N}_{\mathrm{ii}}=\left[\begin{array}{cccccc} 0&0&0&0&1&0\\ 0&0&0&1&0&-a_{\mathfrak{j}+1}\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&0&0&1&0&-a_l\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&0&0&1&0&-a_{\mathfrak{l}}\\ \end{array}\right].\] \(\bullet\) [Situation iii)]{.ul}: for \(\mathfrak{l}+1\leq n \leq \mathfrak{n}\) we have \(q_1-r_1=0\) and \((q_2-r_2)-b_n(q_3-r_3)=0\) with matrix \[\mathcal{N}_{\mathrm{iii}}=\left[\begin{array}{cccccc} 1&0&0&-1&0&0\\ 0&1&-b_{\mathfrak{l}+1}&0&-1&b_{\mathfrak{l}+1}\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&1&-b_n&0&-1&b_n\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&1&-b_{\mathfrak{n}}&0&-1&b_{\mathfrak{n}}\\ \end{array}\right].\] \(\bullet\) [Situation iv)]{.ul}: for \(\mathfrak{n}+1\leq i \leq s\) we have \(b_iq_1-a_iq_2=0\), \(r_1-a_ir_3=0\), and \((q_2-r_2)-b_i(q_3-r_3)=0\) with matrix \(\mathcal{N}_{\mathrm{iv}}\) obtained by concatenating the following matrices: We can represent all the equations above by using the following null product of representative matrix: \[\mathcal{M}_{(3s-2\mathfrak{n})\times 6}\cdot \left[\begin{array}{cccccc} q_1&q_2&q_3&r_1&r_2&r_3 \end{array}\right]_{6\times 1}^{t}=0,\] where the matrix \(\mathcal{M}:=\mathcal{M}_{(3s-2\mathfrak{n})\times 6}\) is the concatenation of the matrices \(\mathcal{N}_{\mathrm{i}},\mathcal{N}_{\mathrm{ii}},\mathcal{N}_{\mathrm{iii}},\mathcal{N}_{\mathrm{iv}}\). This linear system has non trivial solution if and only if \(\mathrm{rank}(\mathcal{M})<\min\{3s-2\mathfrak{n},6\}.\) Using the classification of all line arrangements in \(\mathbb{P}^2\) with \(r(\mathcal{A})=2\) by ([\[classification\]](#classification){reference-type="ref" reference="classification"}) we can determine the shape of each degree 2 logarithmic derivation associated to each the defining polynomial. ## Degree 3 logarithmic derivations In this section we reproduce the same argument as in the previous section, but for degree 3 logarithmic derivations. Let \(\theta=Q'y\frac{\partial}{\partial y}+R'z\frac{\partial}{\partial z}~ \mathrm{with}~ Q',R' \in S_2\) be a degree 3 logarithmic derivation of \(\mathcal{A}\). For each \(i\in \{1,\ldots,s\}\) we have \(\theta(l_i)=l_iT_i\) for some \(T_i\in S_2\). Let \(Q'=q_1x^2+q_2y^2+q_3z^2+q_4xy+q_5xz+q_6yz,R'=r_1x^2+r_2y^2+r_3z^2+r_4xy+r_5xz+r_6yz,~T_i=t^i_1x^2+t^i_2y^2+t^i_3z^2+t^i_4xy+t^i_5xz+t^i_6yz \in k[x,y,z]_2.\) Therefore, \[b_iyQ'+c_izR'=(a_ix+b_iy+c_iz)T_i.\] Comparing coefficients, the following ten relations are obtained \[\begin{aligned} \label{EQdegree3} \displaystyle \Biggl\{\begin{array}{ccc} &&\\ 0=a_it^i_1 & \hspace{1.1cm}b_iq_4=a_it^i_2+b_it^i_4 & b_iq_3+c_ir_6=b_it^i_3+c_it^i_6 \\ b_iq_2=b_it^i_2& \hspace{1.1cm}c_ir_5=a_it^i_3+c_it^i_5 & b_iq_6+c_ir_2=b_it^i_6+c_it^i_2 \\ c_ir_3=c_it^i_3& \hspace{1.1cm}b_iq_1=a_it^i_4+b_it^i_1 & \hspace{1.1cm}b_iq_5+c_ir_4=a_it^i_6+b_it^i_5+c_it^i_4 \\ & \hspace{1.1cm}c_ir_1=a_it^i_5+c_it^i_1 & \end{array} \end{aligned}\] If we projectively eliminate \(t_1^i,t_2^i,t_3^i\) in ([\[EQdegree3\]](#EQdegree3){reference-type="ref" reference="EQdegree3"}), we obtain the following result which is similar to Remark [\[comput-quadratic\]](#comput-quadratic){reference-type="ref" reference="comput-quadratic"}. Applying Remark [\[divisonlines\]](#divisonlines){reference-type="ref" reference="divisonlines"} to ([\[EQdegree3\]](#EQdegree3){reference-type="ref" reference="EQdegree3"}) and eliminating the parameters \(t_1^i,t_2^i,t_3^i\), we have the following equations for \(q_1,\ldots,q_6,r_1,\ldots,r_6\) and their associated matrices \(\mathcal{N}_{\mathrm{i}},\mathcal{N}_{\mathrm{ii}},\mathcal{N}_{\mathrm{iii}},\mathcal{N}_{\mathrm{iv}}\) respectively. \(\bullet\) [Situation i)]{.ul}: for \(4\leq j \leq \mathfrak{j}\) we have \(q_3=0,~q_1+a_j^2q_2-a_jq_4=0\) and \(q_5-a_jq_6=0\) with matrix \[\mathcal{N}_{\mathrm{i}}=\left[\begin{array}{cccccccccccc} 0&0&1&0&0&0&0&0&0&0&0&0\\ 1&a_4^2&0&-a_4&0&0&0&0&0&0&0&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 1&a_j^2&0&-a_j&0&0&0&0&0&0&0&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 1&a_{\mathfrak{j}}^2&0&-a_{\mathfrak{j}}&0&0&0&0&0&0&0&0\\ 0&0&0&0&1&-a_4&0&0&0&0&0&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&0&0&0&1&-a_j&0&0&0&0&0&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&0&0&0&1&-a_{\mathfrak{j}}&0&0&0&0&0&0 \end{array}\right].\] \(\bullet\) [Situation ii)]{.ul}: for \(\mathfrak{j}+1\leq l \leq \mathfrak{l}\) we have \(r_2=0,~r_1+a_l^2r_3-a_lr_5=0\) and \(r_4-a_lr_6=0\) with matrix \[\mathcal{N}_{\mathrm{ii}}=\left[\begin{array}{cccccccccccc} 0&0&0&0&0& 0&0&1&0&0&0&0\\ 0&0&0&0&0&0&1& 0&a_{\mathfrak{j}+1}^2&0&-a_{\mathfrak{j}+1}&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&0&0&0&0&0&1&0&a_l^2&0&-a_l&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&0&0&0&0&0&1&0&a_{\mathfrak{l}}^2&0&-a_{\mathfrak{l}}&0\\ 0&0&0&0&0&0&0&0&0&1&0&-a_{\mathfrak{j}+1}\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&0&0&0&0&0&0&0&0&1&0&-a_l\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&0&0&0&0&0&0&0&0&1&0&-a_{\mathfrak{l}}\\ \end{array}\right].\] \(\bullet\) [Situation iii)]{.ul}: for \(\mathfrak{l}+1\leq n \leq \mathfrak{n}\) we have \(q_1-r_1=0,~q_2-r_2+b_n^2(q_3-r_3)-b_n(q_6-r_6)=0\) and \((q_4-r_4)-b_n(q_5-r_5)=0\) and with matrix \[\mathcal{N}_{\mathrm{iii}}=\left[\begin{array}{cccccccccccc} 1&0&0&0&0&0&-1&0&0& 0&0&0\\ 0&1&b_{\mathfrak{l}+1}^2&0&0&-b_{\mathfrak{l}+1}&0&-1&-b_{\mathfrak{l}+1}^2& 0&0&b_{\mathfrak{l}+1}\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&1&b_{n}^2&0&0&-b_{n}&0&-1&-b_{n}^2& 0&0&b_{n}\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&1&b_{\mathfrak{n}}^2&0&0&-b_{\mathfrak{n}}&0&-1&-b_{\mathfrak{n}}^2& 0&0&b_{\mathfrak{n}}\\ 0&0&0&1&-b_{\mathfrak{l}+1}&0&0&0&0&-1&b_{\mathfrak{l}+1}&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&0&0&1&-b_n&0&0&0&0&-1&b_n&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&0&0&1&-b_{\mathfrak{n}}&0&0&0&0&-1&b_{\mathfrak{n}}&0 \end{array}\right].\] \(\bullet\) [Situation iv)]{.ul}: for \(\mathfrak{n}+1\leq i \leq s\) we have \(b_i^2q_1+a_i^2q_2-a_ib_iq_4=0,~r_1+a_i^2r_3-a_ir_5=0,~q_2-b_i^2r_3-b_i(q_6-r_6)=0\) and \(-a_iq_2-2a_ib_i^2r_3+a_ib_ir_6+b_i(q_4-r_4)-b_i^2(q_5-r_5)=0\) with matrix \(\mathcal{N}_{\mathrm{iv}}\) obtained by concatenating the following matrices: \[\mathcal{T}=\left[\begin{array}{cccccccccccc} b_{\mathfrak{n}+1}^2&a_{\mathfrak{n}+1}^2&0&-a_{\mathfrak{n}+1}b_{\mathfrak{n}+1}&0&\cdots&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&&\vdots\\ b_i^2&a_i^2&0&-a_ib_i&0&\cdots&0\\ \vdots&\vdots&\vdots&\vdots&\vdots&&\vdots\\ b_{s}^2&a_{s}^2&0&-a_{s}b_{s}&0&\cdots&0\\ \end{array}\right],~\mathcal{U}=\left[\begin{array}{cccccccccccc} 0&\cdots&0&1& 0&a_{\mathfrak{n}+1}^2&0&-a_{\mathfrak{n}+1}&0\\ \vdots&&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&\cdots&0&1&0&a_i^2&0&-a_i&0\\ \vdots&&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&\cdots&0&1&0&a_{s}^2&0&-a_{s}&0\\ \end{array}\right],\] \[\mathcal{V}=\left[\begin{array}{cccccccccccc} 0&1&0&0&0&-b_{\mathfrak{n}+1}&0&0&-b_{\mathfrak{n}+1}^2& 0&0&b_{\mathfrak{n}+1}\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&1&0&0&0&-b_{i}&0&0&-b_{i}^2& 0&0&b_{i}\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&1&0&0&0&-b_{s}&0&0&-b_{s}^2& 0&0&b_{s}\\ \end{array}\right],\] \[\mathcal{W}= \left[\begin{array}{cccccccccccc} 0&-a_{\mathfrak{n}+1}&0&b_{\mathfrak{n}+1}&-b_{\mathfrak{n}+1}^2&0&0&0&-2a_{\mathfrak{n}+1}b_{\mathfrak{n}+1}^2&-b_{\mathfrak{n}+1}&b_{\mathfrak{n}+1}^2&a_{\mathfrak{n}+1}b_{\mathfrak{n}+1}\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&-a_i&0&b_i&-b_i^2&0&0&0&-2a_ib_i^2&-b_i&b_i^2&a_ib_i\\ \vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots&\vdots\\ 0&-a_s&0&b_s&-b_s^2&0&0&0&-2a_sb_s^2&-b_s&b_s^2&a_sb_s\\ \end{array}\right].\] We can represent all the equations above by using the following null product of representative matrix: \[\mathcal{M}_{(3(s-1)-\mathfrak{n})\times 12}\cdot \left[\begin{array}{llllllllllll} q_1&q_2&q_3&q_4&q_5&q_6&r_1&r_2&r_3&r_4&r_5&r_6 \end{array}\right]_{12\times 1}^{t}=0,\] where the matrix \(\mathcal{M}:=\mathcal{M}_{(3(s-1)-\mathfrak{n})\times 12}\) is the concatenation of the matrices \(\mathcal{N}_{\mathrm{i}},\mathcal{N}_{\mathrm{ii}},\mathcal{N}_{\mathrm{iii}},\mathcal{N}_{\mathrm{iv}}\). This linear system has non trivial solution if and only if \(\mathrm{rank}(\mathcal{M})<\min\{3(s-1)-\mathfrak{n},12\}.\) Using the classification of all line arrangements in \(\mathbb{P}^2\) with \(r(\mathcal{A})=3\) by ([\[cubic\]](#cubic){reference-type="ref" reference="cubic"}) we can determine the shape of each degree 3 logarithmic derivation associated to each the defining polynomial. This comes handy especially when dealing with cases (IIIa)-(Vb), because \(s\) has specific values. For example, the associated matrix \(\mathcal{M}_{\mathrm{Vb}}\) to the type (Vb) \(F=xyz(x+y)(x+z)(-x+z)(y+z)(-y+z)\) (here we changed \(x\mapsto-x\)) is \[\left[\begin{array}{cccccccccccc} 0&0&1&0&0&0&0&0&0&0&0&0\\ 1&1&0&-1&0&0&0&0&0&0&0&0\\ 0&0&0&0&1&-1&0&0&0&0&0&0\\ 0&0&0&0&0& 0&0&1&0&0&0&0\\ 0&0&0&0&0&0&1& 0&1&0&-1&0\\ 0&0&0&0&0&0&1&0&1&0&1&0\\ 0&0&0&0&0&0&0&0&0&1&0&-1\\ 0&0&0&0&0&0&0&0&0&1&0&1\\ 1&0&0&0&0&0&-1&0&0& 0&0&0\\ 0&1&1&0&0&-1&0&-1&-1& 0&0&1\\ 0&1&1&0&0&1&0&-1&-1& 0&0&-1\\ 0&0&0&1&1&0&0&0&0&1&-1&0\\ 0&0&0&1&-1&0&0&0&0&1&1&0\\ \end{array}\right]\Longleftrightarrow\left[\begin{array}{cccccccccccc} 0&0&1&0&0&0&0&0&0&0&0&0\\ 1&1&0&0&0&0&0&0&0&0&0&0\\ 0&0&0&1&0&0&0&0&0&0&0&0\\ 0&0&0&0&1&0&0&0&0&0&0&0\\ 0&0&0&0&0&1&0&0&0&0&0&0\\ 1&0&0&0&0&0&-1&0&0&0&0&0\\ 0&0&0&0&0&0&0&1&0&0&0&0\\ 0&0&0&0&0&0&1&0&1&0&0&0\\ 0&1&0&0&0&0&0&0&-1&0&0&0\\ 0&0&0&0&0&0&0&0&0&1&0&0\\ 0&0&0&0&0&0&0&0&0&0&1&0\\ 0&0&0&0&0&0&0&0&0&0&0&1\\ 0&0&0&0&0&0&0&0&0&0&0&0\\ \end{array}\right].\] Therefore, the shape of the logarithmic derivation of this type of arrangement is \[\theta=(-x^2+y^2)y\frac{\partial}{\partial y} + (-x^2+z^2)z\frac{\partial}{\partial z}.\] ### Non recursive cubic logarithmic derivations. For types (Ia)-(IIIc), the corresponding line arrangements \(\mathcal A\) are obtained by adding an extra line \(H=V(l)\) to line arrangements \(\mathcal B\) with minimal quadratic logarithmic derivation. The minimal cubic logarithmic derivations will be obtained by simply multiplying by \(l\) the logarithmic derivations obtained in Corollary [\[quadratic-log\]](#quadratic-log){reference-type="ref" reference="quadratic-log"}, except when \(\mathcal B\) has also a minimal cubic logarithmic derivation. We are interested in this exceptional case. So it may happen that \[\theta = l'\rho_2+\rho_3,\] where \(l'\in S_1\) and \(\rho_2\) is a minimal quadratic logarithmic derivation, and \(\rho_3\) is a minimal cubic logarithmic derivation, both of \(\mathcal B\). Also, since \(r(\mathcal A)=3\), then \(\rho_2(l)\notin \langle l\rangle\). From Corollary [\[quadratic-log\]](#quadratic-log){reference-type="ref" reference="quadratic-log"}, we know the shape of \(\rho_2\). So we are left to finding how \(\rho_3\) looks like. Now we can use the shape of the defining polynomials of \(\mathcal B\) as expressed in Theorem [\[classification\]](#classification){reference-type="ref" reference="classification"}, together with the matrix approach we have been discussing in this section. \(\bullet\) If \(\mathcal B\) is of type (I), then it is supersolvable, and we want it to have exponents \((1,2,3)\). Then its defining polynomial is \(xyz(x+y)(t_4y+z)(t_5y+z)\). After some change of variables, we can assume this polynomial is \(xyz(x+y)(y+z)(ty+z)\), where \(t\neq 0,1\). Modulo linear multiples of \(\rho_2\), we have \(\displaystyle\rho_3=(ty+z)(y+z)z\frac{\partial}{\partial_z}\). After a change of coordinates, we can assume that the defining polynomial of \(\mathcal A\) in Theorem [\[cubic\]](#cubic){reference-type="ref" reference="cubic"} is \(F=xyz(x+y)(y+z)(ty+z)l\), where \(l=bx+y\) for (Ia), \(l=bx+z\) for (Ib) and (Ic), \(l=ax+by+z\) for (Id). The question is if we can find \(l'=\alpha x+\beta y +\gamma z\) such that \(l'\rho_2(l)+\rho_3(l)\in\langle l\rangle\). - If \(l=bx+y\), then we can take \(l'=l\). - If \(l=bx+z\), \(b\neq-1,\) then, in order to have such \(\theta\), \(b=-t\). But with this, we get the picture of (Ic), since we have three triple points, instead of just two: \(\{x,y,x+y\},\{x,z,-tx+z\},\{x+y,-tx+z,ty+z\}\). - If \(l=-x+z\), then we can take \(l'=x-ty-2z\). - If \(l=ax+by+z\), then \(b=t\) or \(b=1\). But in this case we get two triple points instead of just one: \(\{x,y,x+y\},\{x,ax+by+z,by+z\}\), so not a type (Id) arrangement. \(\bullet\) If \(\mathcal B\) is of type (II), then, after some simple calculation with Macaulay 2 (), its defining polynomial is \(xyz(x+y+z)(ty+z), t\neq 0,1\). In this case \(\mathcal B\) has two minimal cubic logarithmic derivations: \[\rho_3=(ty+z)(x+y+z)(\alpha y\frac{\partial}{\partial y}+\beta z\frac{\partial}{\partial z}).\] We also know that \(\rho_2=(x+y+z)(y\frac{\partial}{\partial y}+z\frac{\partial}{\partial z})\). If \(l=ax+by+cz\), then we need to have \[l'(x+y+z)(by+cz)+(ty+z)(x+y+z)(\alpha by+\beta cz)=(ax+by+cz)Q, Q\in S_2.\] Since \(\gcd(l,x+y+z)=1\), then \(Q=(x+y+z)P\), where \(P\in S_1\). - If \(c=0\) and \(b=1\), then we have \[l'y+(ty+z)\alpha y=(ax+y)P,\] leading to \(P=\delta y\). Then \(\alpha=0\) and \(l'=\delta(ax+y)\). - If \(c=1\), and \(a\) and \(b\) are general enough (\(a,b\neq 0\), \(b\neq t\)), we have \[l'(by+z)+(ty+z)(\alpha by+\beta z)=(ax+by+cz)P.\] After some calculations, \(\beta=\alpha\), and we can choose \(l'=ax+(b-\alpha t)y+(1-\alpha)z\) (in this instance \(P=by+z\)). \(\bullet\) If \(\mathcal B\) is of type (III), as we mention before we can obtain all the minimal cubic logarithmic derivations by matrix computations. # Appendix: graphic arrangements Let \(G=(V,E)\) be a simple (no loops, no multiple edges) undirected graph with \(V=\{1,\ldots,n\}\), \(n\geq 2\). The *graphic arrangement corresponding to \(G\)* is \(\mathcal A(G):=\{V(x_i-x_j)|(i,j)\in E\}\). The rank of \(\mathcal A(G)\) equals \(n\) minus the number of connected components of \(G\). Consider the derivation \[\theta=x_1^2\frac{\partial}{\partial x_1}+\cdots+x_n^2\frac{\partial}{\partial x_n}.\] Obviously, \(\theta(x_i-x_j)=x_i^2-x_j^2=(x_i-x_j)(x_i+x_j)\), so \(\theta\) is a logarithmic derivation of \(\mathcal A(G)\), not a multiple of the Euler derivation. So \[r(G):=r(\mathcal A(G))\leq 2.\] We are interested when \(r(G)=1\). Below, \(\delta(G)\) denotes the minimum degree of a vertex of \(G\). Suppose \(G\) is connected. \(S\subset V\) is called *vertex-cut set*, if \(G-S\) is disconnected. The smallest cardinality of a vertex-cut set is called *vertex-connectivity* of \(G\), and it is denoted \(k(G)\). By convention, \(k(K_n)=n-1\). The converse is the following. But first, we summarize: Let \(e\) be an edge of \(G\), and let \(G':=G-e\) (the deletion of the edge \(e\)), and let \(G'':= G/e\) (the contraction w.r.t. the edge \(e\)). If \(H\in \mathcal A:=\mathcal A(G)\) is the hyperplane corresponding to \(e\), then \[\mathcal A':=\mathcal A\setminus\{H\} = \mathcal A(G') \mbox{ and }\mathcal A'':=\mathcal A^H=\mathcal A(G'').\] We end by mentioning that since \(r(G)\leq 2\) for any graphic arrangement, it becomes more appealing to analyze "the maximal degree of a Jacobian relation" (so a maximal degree of a generating syzygy of the Jacobian ideal), and finds an interesting lower bound of this invariant, in terms of the maximum number of new triangles that can be formed by adding an edge to \(G\). Ricardo Burity is grateful to CAPES for funding his one year stay at University of Idaho. [^1]: The conjecture is shown for \(s\leq 12\) in, and to our overwhelming excitement, the conjecture has been proven in general by Takuro Abe in. [^2]: They are examples denoted there with \(\mathcal A_2\), and \(\mathcal A_6\); in the later we performed a change of variables \(x+y+z\leftrightarrow x, y\leftrightarrow y, z\leftrightarrow z\), so it will fit into the statement of Lemma [\[dual-points\]](#dual-points){reference-type="ref" reference="dual-points"}.
{'timestamp': '2020-06-11T02:22:19', 'yymm': '2005', 'arxiv_id': '2005.14367', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14367'}
null
null
# INTRODUCTION {#sec:intro} Planetary nebulae (PNe) represent a short-lived configuration of the circumstellar medium of evolved low-and intermediate-mass stars (1 M\(_{\odot} \lesssim M_\mathrm{i} \lesssim\)`<!-- -->`{=html}8 M\(_{\odot}\)). The interacting stellar winds model of formation predicts that low-and intermediate-mass stars evolve through the asymptotic giant branch (AGB) phase producing a dense and slow wind, which eventually will be swept and compressed by the future fast stellar wind of the post-AGB star and subsequently ionised by the newly developed UV flux. The wide variety of PN morphologies has led to the suggestion that several agents might contribute to the PN shaping, including binarity, jets and magnetic fields. Central stars of PNe (CSPNe) commonly show the presence of hydrogen in their surfaces. However, about 10% of CSPNe do not exhibit hydrogen features, i.e., they are hydrogen-deficient, rather displaying emission features in their spectra similar to those of the massive Wolf-Rayet (WR) stars of the carbon sequence. Accordingly, they are classified in the same way as WR stars, just using square brackets to denote that they are CSPNe instead. It is interesting to note that only a few PNe have been reported to harbor hydrogen-poor \[WR\] CSPN of the nitrogen sequence: the transitional \[WN/WC\]-type PB 8 and the \[WN\]-type CSPNe of Abell 48 and IC 4663. In general, abundance determination of PNe with \[WR\]-type CSPNe do not present major differences compared to those classical PNe with hydrogen-rich CSPNe. Hydrogen-deficient material ejected inside the old, hydrogen-rich PN has been identified only around a few \[WR\]-type CSPN. These are known as *born-again* PNe and it is accepted that the CSPN experienced a very late thermal pulse (VLTP) ejecting hydrogen-depleted and carbon-rich processed material. Although this evolutionary path has been suggested to explain the formation of hydrogen-poor \[WR\] stars, it might not apply to all PNe harboring \[WR\] stars. Statistical studies of PNe around \[WR\] CSPNe have shed light into the relation between the nebular properties and the evolutionary sequence of the progenitor stars. For example, the decrease in electron density (\(n_\mathrm{e}\)) with decreasing spectral subtype has been suggested to be a signature of an evolutionary sequence from the late to early \[WC\]-type. Furthermore, the N/O abundance ratio vs. \[WC\] class presented by confirmed the claim that stars with different masses evolve through the same \[WC\] state . Comparisons between PNe harboring non-emission line CSPNe with those hosting \[WR\] CSPNe have unveiled subtle differences. PNe with \[WR\] CSPNe are generally more centrally condensed, expand faster, and exhibit a higher degree of turbulence than PNe with non-emission line CSPNe . They also seem to have higher N and C abundances, implying that they have evolved from stars with initial masses \(\sim\)`<!-- -->`{=html}4 M\(_{\odot}\). This is consistent with their preferential location at low latitudes in the Galactic disk. Finally, it has been noted recently that PNe with \[WC\] CSPNe have a higher occurrence of fast collimated outflows than PNe with weak emission line CSPNe or non-emission line CSPNe. These statistical studies rely on averaged values of the nebular physical properties (electron density and temperature), abundances, and velocity fields that might hide important clues on the evolution of PNe with \[WR\]-type CSPNe. For example, dedicated studies of compact \[WR\] PNe have unveiled the effects of fast collimated outflows in their early shaping. Detailed studies of individual PNe with \[WR\] CSPNe are clearly needed to understand this unique evolutionary path of low-and intermediate-mass stars. We have therefore started a series of detailed studies of PNe harboring \[WR\] CSPNe. In this first paper we present a study of NGC 2371 , which harbors the \[WR\] CSPN WD 0722\(+\)`<!-- -->`{=html}295. NGC 2371 has been classified as a barrel-like PNe of Peimbert type II. Morphological studies performed with the *Hubble Space Telescope* (*HST*), *Spitzer* and ground-based telescopes have unveiled a variety of morphological features: two-bipolar lobes extending \(\gtrsim\)`<!-- -->`{=html}1 arcmin from the CSPN towards the NW and SE directions with position angle PA\(\approx-60^{\circ}\), a main central cavity with an ellipsoidal shape with an extension of 28\(^{\prime\prime}\times\)`<!-- -->`{=html}38\(^{\prime\prime}\) that exhibits a couple of blowout features aligned with the outer lobes, and a collection of dense knots mainly detected in \[N ii\] and \[S ii\] narrow-band filter images (see next section). The two brightest knots are aligned in the NE to SW direction with a PA\(\approx60^{\circ}\), but the line that connects them is not perfectly aligned with the CSPN. presented a detailed discussion on the properties of the dense NE and SW knots. Their *HST* images show that these are actually conglomerates of clumps (see also Fig. 1). A secondary pair of smaller size clumps is observed at a PA=5\(^\circ\). It is worth noting that the low-ionisation clumps do not have a uniform distribution around the CSPN nor are they aligned with the bipolar lobes. Optical and *International Ultraviolet Explorer* (*IUE*) UV observations of NGC 2371 have been used to estimate an averaged electron temperatures (\(T_\mathrm{e}\)) in the range 9,000--23,000 K, depending on the line ratio used or the adopted electron density (\(n_\mathrm{e}\)), which is found to be 800--2,500 cm\(^{-3}\). presented the analysis of the optical spectrum in the blue region (\(\sim\)`<!-- -->`{=html}3700--5000 Å) and showed it to be dominated by the O vi \(\lambda\lambda\)`<!-- -->`{=html}3811,3834 doublet with contributions from the He ii \(\lambda\)`<!-- -->`{=html}4686, C iii \(\lambda\)`<!-- -->`{=html}4650 and C iv \(\lambda\)`<!-- -->`{=html}4658. These authors estimated an effective temperature (\(T_\mathrm{eff}\)) for WD 0722\(+\)`<!-- -->`{=html}295 of about \(T_\mathrm{eff}\)=\[1--1.2\]\(\times\)`<!-- -->`{=html}10\(^{5}\) K, consistent with the analysis of *IUE* observations. Since its early classification as a \[WR\] star of the oxygen sequence, its spectral type has swung from early \[WC3\] to \[WO1\]. In this work, we intend to unveil the physical structure of the different components of NGC 2371 and to produce an accurate model of its central star. We have obtained Isaac Newton Telescope (INT) spectroscopic observations to study the physical properties (density and temperature) and abundances to describe the ionisation structure of the different morphological components of NGC 2371. In conjunction with archival *IUE* observations, the INT spectra are also used to perform a detailed characterisation of its CSPN. The paper is organized as follows. In Section 2 we describe the observations used in the present work. Section 3 presents the analysis and atmospheric model of WD 0722\(+\)`<!-- -->`{=html}295. In Section 4 we present our spectral analysis of NGC 2371 as well as the estimates of the physical structure. In Section 5 we discuss our results and, finally, a summary is presented in Section 6. # Observations {#sec:obs} Narrow-band images of NGC 2371 were downloaded from the archives of the Canada-France-Hawaii Telescope (CFHT)[^1] and *HST* Legacy Archive[^2]. The CFHT images were acquired with the multi-object spectrograph (MOS) camera. These images were obtained through the H\(\alpha\), \[O iii\] and \[N ii\] filters with total exposure times of 1200 s on each filter on December 18, 2002 (Prop. ID.: 02BC17; PI: S. Kwok). The *HST* images were obtained through the F502N, F656N, and F658N filters (hereafter \[O iii\], H\(\alpha\) and \[N ii\]) on 2007 November 15 with exposure times on each filter of 1600 s (Prop.ID. 11093, PI: K. Noll). A colour-composite image obtained by combining all these optical images is shown in Figure 1. Long-slit spectroscopic observations were obtained at the INT of the Observatorio de El Roque de los Muchachos (La Palma, Spain) using the Intermediate Dispersion Spectrograph (IDS) in low-and high-dispersion spectral modes (PI: M. A. Guerrero). The high-resolution spectra were obtained on 2018 October 24 using the EEV10 CCD camera with the R1200U grating. This configuration has a dispersion of 0.48 Å pixel\(^{-1}\) over the 3200--4500 Å wavelength range and a plate scale of 0 pixel\(^{-1}\). The low-resolution spectra were acquired on 2018 November 15 using the RED\(+\)`<!-- -->`{=html}2 CCD camera with the R400V grating. This configuration has a dispersion of 1.55 Å pixel\(^{-1}\) over the 3500--8000 Å wavelength range and a similar plate scale of 0 pixel\(^{-1}\). The slit width was set at 1 in both observing runs. Two slits at PA=65\(^\circ\) (Slit A) and PA=128\(^\circ\) (Slit B) were used with both spectral configurations. Slit B is centered on WD 0722\(+\)`<!-- -->`{=html}295, whereas Slit A probes the low-ionisation knots and therefore it does not goes exactly across the CSPN. The positions of these slits are overlaid on the colour-composite image of NGC 2371 in Figure 2. The total integration time on each position and spectral configuration was 900 s. All spectra were analysed following iraf standard routines. The wavelength calibration was performed using CuAr+CuNe lamps. In order to study the ionisation structure of NGC 2371, we have extracted spectra from different regions defined on each slit using the iraf task *apall*. Those extracted from Slit A were used to study the central main cavity of NGC 2371 and the dense knots located \(\gtrsim\)`<!-- -->`{=html}16\(^{\prime\prime}\) from the CSPN, and those from Slit B to study the outermost lobes and different regions of the central cavity along the NW-SE direction. All regions, labeled from A1--A9 and B0--B9, are shown in Figure 2 and their sizes are indicated in Tables 3 and 4, respectively. We first extracted the 1-D spectrum of the CSPN (regions A4 and B5) tracing the stellar continuum along the 2-D spectrum. This information was then used as a reference to trace the nebular spectra (regions A1--A3, A5--A9, B0--B4, and B6--B9) along the 2-D spectra, as these regions does not show continuum emission. Since Slit A misses some stellar flux, the spectrum extracted for region A4 has not been used for stellar modelling. Finally, we note that all extracted spectra were corrected for extinction by using the \(c\)(H\(\beta\)) value estimated from the Balmer decrement method. We assume intrinsic Balmer decrement ratio corresponding to a case B photoionised nebula of \(T_{\rm e}\) = 10,000 K and \(n_{\rm e}\) = 100 cm\(^{-3}\) and the reddening curve of. # WD 0722\(+\)`<!-- -->`{=html}295-the CSPN of NGC 2371 The optical spectrum of WD 0722\(+\)`<!-- -->`{=html}295 obtained from our INT IDS observations is presented in Figure 3. The stellar spectrum exhibits the classic WR blue and red bumps (BB and RB) at \(\sim\)`<!-- -->`{=html}4686 Å and \(\sim\)`<!-- -->`{=html}5806 Å, respectively, as well as a broad O vi feature at \(\sim\)`<!-- -->`{=html}3820 ÅȮther emission lines related to WR features such as those reported in --namely, O vi 5290 Å, C iv 5470  Å and 7060 Å, and He ii 5412 Å-are also present in the optical spectrum. Furthermore, we also detect the O vi 6200 Å  as a broad emission line. All identified WR features as well as some contributing nebular lines are marked in Figure 3. We note the presence of narrow emission lines at \(\approx\)`<!-- -->`{=html}5665 Å and \(\approx\)`<!-- -->`{=html}6066 Å marked with an asterisk in Figure 3 and Figure 4. There has been controversy in the identification of these lines, which can be assigned either to the O vii \(\lambda\)`<!-- -->`{=html}5666 and O viii \(\lambda\)`<!-- -->`{=html}6068 lines or to the Ne vii \(\lambda\)`<!-- -->`{=html}5666 and Ne viii \(\lambda\)`<!-- -->`{=html}6068 lines. This is discussed in Section 5. To provide an appropriate description of the spectrum and spectral classification of WD 0722\(+\)`<!-- -->`{=html}295, the contribution from nebular lines blended with the broad WR features needs to be accounted for. This was done by applying the analysis described by. This method consists on fitting the broad WR features with multi-Gaussian components using a tailor-made code that uses the idl routine lmfit[^3]. As a result, fluxes, central wavelength, FWHM and equivalent widths (EW) from the WR spectral features as well as contributing nebular lines have been estimated. All these parameters are listed in Table 1. We note that those lines listed as WR features have FWHM larger than those of the nebular narrow lines, that is, FWHM\(>4.5\) Å. \ (1) Identification number of the Gaussian components in the WR features; (2) Nature of the contributing emission line: WR (broad) or nebular (narrow); (3) Ion responsible for the line; (4) Rest wavelength in Å; (5) Flux in units of \(10^{-14}\) erg cm\(^{-2}\) s\(^{-1}\); (6) Full Width at Half Maximum (FWHM) \[Å\]; (7) Equivalent Width (EW) \[Å\]; (8) Observed center of the line; (8) Line fluxes normalised to the RB. The ratio has been computed adopting a \(F\)(RB)=100. \(^\dagger\)This identification is discussed in Section 5. The parameters of our best-fit model are listed in Table 2. We note that the stellar mass was adopted to be \(M_{\star}=0.6\) M\(_{\odot}\), a typical value for CSPNe. The resultant temperature, defined at \(\tau_\text{Ross}=20\), which is constrained by the relative strength of the emission lines, is \(T_\mathrm{eff}\)=130 kK. A luminosity of \(L_{\star}=2820\) L\(_{\odot}\) is estimated by using a distance \(d=1.75\) kpc and the resultant mass-loss rate is \(\dot{M}=1.78\times10^{-8}\) M\(_{\odot}\) yr\(^{-1}\). We note that the estimated value for the mass-loss rate is somewhat smaller than those listed for other \[WR\] stars in, who used a canonical luminosity of \(L=5000\,L_\odot\) to calculate the mass-loss rates from the \(R_\text{t}\) values obtained from the analysis. Taking the lower luminosity of NGC 2371 into account, our value of \(\dot{M}\) is comparable with the one derived for Hen 2-55. Furthermore, our \(R_\text{t}=20\,R_\odot\) is fully compatible with the value of \(R_\text{t}=15^{+10}_{-5}\,R_\odot\) by. They used the same luminosity as in our analysis (based on the distance of \(d=1.5\,\)kpc), but assumed a smooth wind with \(D=1\), where we adopted a density contrast of \(D=10\) for a clumped wind. Therefore, their mass-loss rate is about a factor \(\sqrt{10}\) larger than ours. Our best-fit model to the P Cygni profiles in the UV spectra resulted in a stellar wind velocity \(v_{\infty}=3700\) km s\(^{-1}\) with a micro-turbulence of less than 3%. The micro-clumping parameter \(D\), which is defined as the density contrast between a smooth wind and a clumpy wind, is estimated to be 10. Figure 5 shows a comparison between the PoWR model of WD 0722\(+\)`<!-- -->`{=html}295 and the optical and UV spectra, and Figure 6 presents the synthetic spectral energy distribution (SED) from the far-UV to the IR in comparison with UV and optical spectra and IR photometry obtained from public archives. The abundances for WD 0722\(+\)`<!-- -->`{=html}295 derived from our best-fit model are also listed in Table 2. Whereas the stellar parameters agree with those reported by, our abundance determinations are at variance, with our He abundance 30% larger and our N/O ratio half their value. The differences can be attributed to the use of different stellar atmosphere codes, as use a relatively old version of the CMFGEN code, but we note that our abundance determination is improved by the simultaneous modelling of high-quality optical spectra and UV data. # Physical conditions, excitation and chemical abundances of NGC 2371 Examples of INT IDS spectra extracted from Slits A and B are shown in Figure 7. The complete list of lines detected in the different extraction regions and their dereddened intensities relative to an arbitrary value 100 for H\(\beta\) are presented in Tables 3 and 4. The spectra extracted from Slit B, particularly those from regions B2, B3, B7, and B8, show fewer emission lines than those extracted from Slit A, in agreement with the lower surface brightness of the major axis probed by Slit B (see Fig. 1). Intensity uncertainties at 1-\(\sigma\) are provided in these tables, together with the values derived for \(c\)(H\(\beta\)) and the corresponding fluxes of the H\(\beta\) line for each extraction region. Different line intensity ratios have been used to determine the physical conditions of the different regions in NGC 2371 using the iraf task *temden*. \(T_\mathrm{e}\) was estimated using the \[O iii\] emission lines for most regions and the \[N ii\] emission lines whenever possible, i.e., in regions A2, A7, and A8. \(n_\mathrm{e}\) was derived using the \[S ii\] \(\lambda\lambda\)`<!-- -->`{=html}6717,6731, \[Cl iii\] \(\lambda\lambda\)`<!-- -->`{=html}5517,5537, and \[Ar iv\] \(\lambda\lambda\)`<!-- -->`{=html}4711,4740 doublets whenever available. The values of \(T_\mathrm{e}\) and \(n_\mathrm{e}\), together with their 1-\(\sigma\) uncertainties are listed in the bottom rows of Tables 3 and 4. The values of \(T_\mathrm{e}\)(\[O iii\]) listed in Tables 3 and 4 reveal notable temperature gradients in the central cavity of NGC 2371. The innermost regions A2, A3, A5, A5, B4, and B6 immediately around the CSPN show consistently high values of \(T_\mathrm{e}\)(\[O iii\]) in the range 18,000--19,000 K, that decrease to \(\approx\)`<!-- -->`{=html}15,000--16,000 K in the outermost regions A1 and A8, and have the notably lowest value of \(\approx\)`<!-- -->`{=html}13,800 K in the region A7, which probes the SW knot. Such high values of \(T_\mathrm{e}\) in the close vicinity of the CSPN of NGC 2371 arise from its 130 kK high \(T_\mathrm{eff}\) (see Section 3.1). Interestingly, \(T_\mathrm{e}\)(\[N ii\]) is only computed on regions that probe the NE and SW knots. The much lower values of \(T_\mathrm{e}\)(\[N ii\]) in these regions with respect to those of \(T_\mathrm{e}\)(\[O iii\]) indicate that these apertures probe a mix of low-and high-excitation material. As for \(n_\mathrm{e}\)(\[S ii\]), it varies in Tables 3 and 4 from 100 cm\(^{-3}\) to 1640 cm\(^{-3}\), with the densest region corresponding to the core of the SW knot A7, whose head A6 and tail A8 have intermediate density values 600--700 cm\(^{-3}\). The NE knot seems to have lower density estimates than the SW know, but we note that Slit A does not goes exactly across the NE knot. Furthermore, the NE knot is smaller and appears more fragmented than the SW knot (see Fig. 1 right panels). These facts will have consequences for the abundance determination too (see below). Whereas the regions A3, A5, B4 and B6 immediately around the CSPN share similar values of \(T_{\rm e}\), the densities \(n_{\rm e}\)(\[S ii\]) are larger for regions B4 and B6 (\(n_\mathrm{e}\)= 810--1100 cm\(^{-3}\)) than for regions A3 and A5 (100--280 cm\(^{-3}\)). The latter seem to probe a hollow region around the CSPN. Regions B1 and B9 extracted from the outer edges of the major axis of NGC 2371 have the lowest temperature values (\(T_\mathrm{e}\)(\[O iii\])\(\simeq\)`<!-- -->`{=html}11,800--13,100 K), but they have higher densities (\(n_\mathrm{e}\)(\[S ii\])\(\approx400\) cm\(^{-3}\)) than regions within the inner main cavity. In order to unveil differences in excitation from different morphological features in NGC 2371, we plot in Figure 8 line ratios of key emission lines derived from the INT IDS spectroscopy, including \[N ii\] 6583/H\(\alpha\) vs. \[O iii\] 5007/H\(\alpha\) (top panel) and \[S ii\] (6717\(+\)`<!-- -->`{=html}6731)/H\(\alpha\) vs. \[O iii\] 5007/H\(\alpha\) (bottom panel). Differences in excitation are clear: regions close to the star (inner regions--A3, A5, B4, B5, B6) show the lowest \[O iii\]/H\(\alpha\) and \[N ii\]/H\(\alpha\) line ratios, whereas other regions, particularly the outermost regions B1 and B9, and the regions A7 and A8 of the SW knot show the highest \[O iii\]/H\(\alpha\) and \[N ii\]/H\(\alpha\). In Figure 8 bottom panel we show the theoretical limit between photoionised and shocked material \(\log\)(\[O iii\]/H\(\alpha\)) = 1.89 \(\log\)(\[S ii\]/H\(\alpha\)) + 2.46, as estimated by based on the models presented by. Line ratios below this limit show gas excited by ionisation, while regions above present shocked excited gas. Most morphological features in NGC 2371 are located below this theoretical limit, i.e., they are excited by photoionisation. On the other hand, the outermost B1 and B9 regions are located above the dashed line, suggesting that they are excited by shocks as could be expected if these structures were expanding at high speed into the interstellar medium. The spectra of regions A7 and A8 extracted from the head of the SW dense knot also present line intensity ratios typical of shock-excitation. The *HST* WFC3 images of NGC 2371 have also been used to provide a complementary view of its ionisation structure. Ratio maps were obtained by dividing the \[O iii\], \[N ii\] and \[S ii\] calibrated images by the H\(\alpha\) image (see Fig. 9). We note that the *HST* \[S ii\] image does not have adequate signal-to-noise ratio in the NW and SE lobes of NGC 2371. Thus, the line ratio calculations were only performed for the innermost regions of NGC 2371. We defined four different rectangular regions (see Fig. 9 left panel) to study the dominant excitation mechanisms: a large region that includes most of the main inner cavity of NGC 2371, two regions covering the SW and NE dense knots, and a region that includes only gas around the central star. We computed the pixel-by-pixel line ratios and these are plotted in Figure 8 as colour-coded regions alongside the results found for regions extracted from Slit A and B. The results are consistent with those obtained from the spectroscopic observations. Finally, the abundances were computed using the extensively tested code PyNEB developed by. PyNEB computes the physical conditions (\(T_\mathrm{e}\) and \(n_\mathrm{e}\)) and ionic and total abundances. Ionic abundances were calculated with their corresponding temperature and averaged density based on the ionization potential (IP) of the ion. We note that the \(T_\mathrm{e}\) and \(n_\mathrm{e}\) values obtained from PyNEB (not presented here) are consistent within \(<\)`<!-- -->`{=html}2% with those listed in Tables 3 and 4 obtained in iraf. For the calculation of ionic abundances, we only considered emission lines with uncertainties smaller than 50%, resulting in abundances with typical uncertainties of a few percent. The total abundances of He, O, N, Ne, Ar, S and Cl, listed in Table 5 for apertures A1--A3 and A5--A8, were computed adopting the ionization correction factors (ICFs) provided by. The error budget of the abundances of heavy elements in Table 5 is mostly dominated by uncertainties in the computation of those ICFs, which are notably large for high excitation nebulae. # Discussion NGC 2371 has a multi-component morphology with (1) a pair of outer lobes aligned along PA\(=128^{\circ}\), (2) a high-excitation main shell with apparent elliptical morphology aligned along the same direction with two lower excitation caps at its tips, and (3) two ensembles of dense low-ionisation knots in the equatorial region of the main shell, although misaligned with the previous structures. We provide next a description of the overall physical structure of NGC 2371 using kinematical information to help us interpret its different components. ## On the kinematic structure of NGC 2371 By Gaussian fitting of bright emission lines, their centroid can be routinely determined with an accuracy \(\sim\)`<!-- -->`{=html}10 times better than the spectral resolution, which is \(\sim\)`<!-- -->`{=html}200 km s\(^{-1}\) for our observations with the R400V grating and \(\sim\)`<!-- -->`{=html}70 km s\(^{-1}\) for those with the R1200U grating. Thus, our low resolution spectra allow us to investigate the kinematics of structures that have velocities \(\geq\)`<!-- -->`{=html}20 km s\(^{-1}\). This is illustrated in Figure 10, which presents three sections of the R400V 2D-spectrum obtained with the Slit B along the major nebular axis. These spectral sections include the H\(\alpha+\)\[N ii\], \[O ii\] and \[O iii\] emission lines. Velocity gradients are clearly seen in these (as well as other) spectral lines as an S-shaped pattern in the position-velocity (PV) map along the nebular axis, but tilted along the opposite direction for the main cavity. These PV maps have been used to estimate the systemic radial velocities of the different morphological features in NGC 2371 (i.e., the difference of the radial velocities of a feature with respect to the average radial velocity of the nebula) labeled in Figure 2 next to their corresponding extraction regions. The outermost structures B1 and B9 have systemic radial velocities of \(\pm\)`<!-- -->`{=html}30 km s\(^{-1}\), but the tips of the inner cavity B3 and B7 have larger systemic radial velocities of \(\pm\)`<!-- -->`{=html}70 km s\(^{-1}\). Meanwhile, regions B4 and B6 inside the main nebular shell have systemic radial velocities of \(\pm\)`<!-- -->`{=html}40 km s\(^{-1}\) with opposite sign than those of the adjacent tips B3 and B7. The fast expansion of the bipolar lobes in NGC 2371 is consistent with the faster expansion of PNe with \[WR\]-type CSPNe compared to other PNe . The overall expansion patterns described above are consistent with those reported by using longslit high-dispersion echelle data. With that information at hand, we can envisage the simple model of the physical structure along the main nebular axis of NGC 2371 sketched in Figure 11. The physical structure of NGC 2371 shares many similarities with that of NGC 650-1, with two pairs of bipolar lobes tilted with the line of sight along different inclination angles, and a toroidal or barrel-like central cavity. In this geometrical model, the reversal of systemic radial velocities between the toroidal structure and the tips of the innermost bipolar lobes B3 and B7 can be explained if the toroidal structure is orthogonal to the bipolar lobes. The present data allow a basic description of NGC 2371, but we note that the NW and SE lobes have a rich morphology that suggests a more complex structure than that proposed in Figure 11. A complete analysis of the physical structure of NGC 2371 using information obtained along different slit positions using the Manchester Echelle Spectrograph (MES) at the 2.1m telescope of the Observatorio Astronómico Nacional de San Pedro Mártir (SPM-OAN) in conjunction with a morpho-kinematic model is underway (Vázquez et al., in preparation) and will certainly produce a detailed view of the physical structure of this PN to peer further into its formation history. Yet, the available data still have an interesting piece of information. The NE and SW low-ionisation knots move at systemic radial velocities \(\pm7\) km s\(^{-1}\) considerably smaller than that of the toroidal structure of the main nebula where they seem to be embedded. These velocities, which are consistent with those reported by, imply that the knots are being overtaken by the nebular material as suggested by. Furthermore, the arc-like features observed around these structures (see Fig. 1 right panels) seems to suggest that they are interacting with the current fast wind from the CSPN, similarly to what is observed in *HST* images of Orion proplyds. ## A comprehensive view of NGC 2371 The spatio-kinematic model of NGC 2371 described above can be compared to its excitation structure and spatially varying chemical abundances. Despite its complex morphology, NGC 2371 is quite symmetric, with an ellipsoidal main nebular shell with polar blowouts and a pair of bipolar lobes whose symmetry axis is aligned along a slightly tilted direction. The tips of the bipolar lobes show clear evidence of shock-excitation, which can arise as the nebular material expands at relatively high speed and interacts with the ISM. On the other hand, the main nebular shell and very notably the regions close to the CSPN exhibit very high excitation, with the lowest \[N ii\]/H\(\alpha\) and highest He ii/H\(\beta\) line ratios. Indeed, excitation in these innermost regions is so high that the \[O iii\]/H\(\alpha\) line ratio is damped as O\(^{++}\) is photo-ionised to higher ionisation levels. Furthermore, several He ii emission lines can be seen in the optical spectrum shown in Figure 5. Along with C iv and \[Ne iv\], it has also been reported to be present in the *IUE* UV nebular spectrum of NGC 2371. Since the He ii \(\lambda\)`<!-- -->`{=html}1640 Å is the dominant line in the wavelength range between 1400 Å and 1800 Å, the *GALEX* far-UV image in Figure 12 (left panel) can be used to probe the spatial location of high-excitation material in NGC 2371. The emission in this image traces the main morphological features of NGC 2371, including the main cavity, the dense knots, and the outer edges of the NW and SE lobes. In addition, there is a diffuse halo that extends to distances of \(\sim70\) arcsec from the CSPN, which is not detected in the near-UV *GALEX* image (see Fig. 12 right panel). When comparing with mid-IR *Spitzer* presented in and optical CFHT \[O iii\] images, there is notable emission in the *Spitzer* images close to the CSPN, most likely associated with high-excitation \[O iv\] emission lines. The high excitation of the inner regions of NGC 2371 results from the strong UV flux of WD 0722\(+\)`<!-- -->`{=html}295, whereas the high-excitation of the outer halo might result from the \"hardening\" of the stellar radiation, as high energy photons leak from the main nebular shell of NGC 2371. The low-ionisation dense SW and NE knots are aligned along a direction different from the main nebular axis and they do not share the expansion velocity of the main nebula, with lower expansion velocities (\(\pm\)`<!-- -->`{=html}7 km s\(^{-1}\)). Their morphology, with bow-shocks pointing towards the ionisation source, also precludes a jet interpretation for these features, but they are more consistent with clumps surrounded by photo-evaporated material. Thus, whereas the main nebula of NGC 2371 has very high-excitation, it seems that the face of these knots pointing towards the CSPN shields their cometary tails from the UV stellar flux, producing emission from low ionisation species at their tails. Indeed, the spectra extracted from these structures present emission from \[O i\] and \[N i\] (see A2, A7 and A8 in Tab. 2) suggesting them to be low-ionisation structures (LIS). The analysis of LIS in PNe presented by suggests \(T_\mathrm{e}\)=10,000--14,700 K, consistent with our estimates for the SW and NE knots, but lower electron densities than the surrounding ionised gas, contrary to the SW and NE knots of NGC 2371, which are much denser than the nebular material where they are embedded (see Tab. 2). In this sense, the SW and NE knots of NGC 2371 are not typical LIS. The chemical abundances of different apertures along the minor axis of NGC 2371 are listed in Table 5. The mean value of the He abundances is 0.113\(\pm\)`<!-- -->`{=html}0.012 , with most individual values within 1-\(\sigma\) uncertainty. This might also be the case for the O abundances, with a mean value of (4.1\(\pm\)`<!-- -->`{=html}2.3)\(\times\)`<!-- -->`{=html}10\(^{-4}\), which is mostly consistent within 1-\(\sigma\) uncertainty with that of individual apertures. This mean value suggests slightly subsolar O abundances, (O/H)\(\simeq\)`<!-- -->`{=html}0.75 (O/H)\(_\odot\). On the contrary, the N abundances are clearly larger than solar, with a mean N/O ratio of 0.38\(\pm\)`<!-- -->`{=html}0.11, i.e., (N/O)\(\approx\)`<!-- -->`{=html}3 (N/O)\(_\odot\). The chemical abundances (He/H, O/H, N/O) of NGC 2371 are basically consistent with those reported for comprehensive samples of PNe with \[WC\] central stars. The other chemical abundances in Table 5 have larger uncertainties, particularly the Ar abundances, for which no error bar is provided. The values of the chemical abundances of Ne, Ar, S, and Cl are also consistent with those of PNe with \[WC\] central stars. The chemical abundances found in different regions are in general consistent among them, within 2\(\sigma\) up most from their mean values, but we note that the abundances of the main elements He, N, and O show some differences from one region to another. It might be argued that the O abundances from apertures probing the dense low-ionisation structures are higher than those of the main cavity enclosing them, whereas the N/O ratios are lower. We believe this is not the case, because a close inspection reveals that the O abundances are mostly anti-correlated with \(T_\mathrm{e}\), underlying the difficulties to determine the chemical abundances in highly excited nebulae and from regions where low-and high-excitation material coexists. Finally, we would like to remark that suggested WD 0722\(+\)`<!-- -->`{=html}295 to be in the same evolutionary stage as the CSPN of the born-again PN A 78, a \[WR\]-PG 1159 star. Although their analysis of the stellar atmospheres of those two CSPNe with their version of the CMFGEN code resulted in similar atmospheres, our best-fit models of WD 0722\(+\)`<!-- -->`{=html}295 and our recent analysis of the CSPN of A 78 show these two stars to be different. Moreover, the presence of hydrogen-deficient material inside A 78 suggests a different evolutionary path compared to the CSPN of NGC 2371. The spectral analysis of WD 0722\(+\)`<!-- -->`{=html}295 presented here represents an improvement over other similar studies due to the high-quality of the optical spectrum and the combination with available UV data used for the fit. The PoWR model presented here is not able to reproduce the lines identified in Section 3 at \(\approx\)`<!-- -->`{=html}5665 Å and \(\approx\)`<!-- -->`{=html}6066 Å as O vii \(\lambda\)`<!-- -->`{=html}5666 and O viii \(\lambda\)`<!-- -->`{=html}6068, because the ionisation potentials of these species, 739.3 eV and 871.4 eV, respectively, are too high to be produced by the stellar atmosphere. Although it can be argued that such high-temperature gas can be produced by the X-ray emission of WD 0722\(+\)`<!-- -->`{=html}296 detected by *Chandra*, it has been long discussed whether these emission lines are due to oxygen, but to neon. presented stellar atmosphere models of pre-WD stars and demonstrated that most of the emission lines from the O vii and O viii high-ionisation states of oxygen might be misidentified with those of Ne vii and Ne viii, whose ionisation potentials, 207.3 eV and 239.1 eV, respectively, are considerably lower. This does not affect the spectral classification of WD 0722\(+\)`<!-- -->`{=html}296 as part of the \[WO\] sequence, because the O vi \(\lambda\)`<!-- -->`{=html}3820, O vi \(\lambda\)`<!-- -->`{=html}5290, and O vi \(\lambda\)`<!-- -->`{=html}6200 lines are still present in its spectrum (see Table 1). Indeed, the Ne vii and Ne viii lines require a high temperature for the central star. # Summary We presented spatially-resolved longslit INT IDS spectroscopic observations of NGC 2371, a PN with a \[WR\]-type CSPN with an apparent complex morphology. Our spectral observations, in conjunction with *HST*, *GALEX* and CFHT images, have allowed us to characterise the central star of NGC 2371 as well as to unveil its high-ionisation structure. Our findings can be summarised as follows: - We studied the spectral properties of the CSPN of NGC 2371, WD 0722\(+\)`<!-- -->`{=html}295, by analysing the IDS observations. A Gaussian-fitting procedure was performed to measure the true contribution of the WR spectral lines and to assess the spectral sub-type of the CSPN. Line ratios of WR features with that of the RB suggest a \[WO1\]. In combination with the UV data we used the stellar atmosphere code PoWR to estimate the stellar parameters. Although we found very similar results as those obtained in previous works, the differences are due to the assumed clumping factor and a more accurate *Gaia* distance. - We studied the physical properties of different regions of NGC 2371. In accordance with previous works on NGC 2371 the electron density ranges between 100 cm\(^{-3}\) and 1,640 cm\(^{-4}\). The densest regions are the SW and NE low-ionisation knots. The electron temperatures vary from \(T_\mathrm{e}\sim\)`<!-- -->`{=html}12,000 K at the outer edges to \(T_\mathrm{e}\approx18,000\) K for regions close to the star. The outer bipolar (NW and SE) lobes have electron densities \(n_\mathrm{e}\approx400\) cm\(^{-3}\) and \(T_\mathrm{e}\approx12,000-13,000\) K. - The analysis of emission line ratios from the IDS spectra as well as those extracted from the *HST* calibrated images demonstrate the powerful effect of the UV flux from the CSPN of NGC 2371. Most emission from this PNe is dominated by ionisation, but the low-ionisation SW and NE knots and the outer regions B1 and B9, where shock-excitation is important. We suggest that B1 and B9 are shock-excited because they trace the shock due to the expansion of NGC 2371. - Inspection of *GALEX* images unveiled the presence of a halo extended to 70 arcsec from WD 0722\(+\)`<!-- -->`{=html}295. The halo is detected in the far-UV channel and is mainly dominated by He ii emission. We suggest that this halo has formed due to high-energy photon leakage. - We found that the bow shock-like structure around the CSPN-facing head of the low-ionisation dense knots correspond to photoevaporation flows. The head of the knots shield their tails producing emission from low-ionisation species such as \[O i\] and \[N i\]. This reinforces the idea proposed by and that molecular material might be present in the vicinity of the CSPN of NGC 2371, probably in these structures similar to LIS in other PNe. However, we note that these clumps do not share the same physical properties as classic LIS described in the literature. - We estimated the chemical abundances for different regions of NGC 2371. The abundances are typical of PNe with \[WC\] central stars. Although some variations may exist among different regions, the abundances of the dense knots lay within those of adjacent regions, suggesting that they were not ejected as the result of a VLTP. Instead, their kinematics and detailed morphology suggest they were ejected before the formation of the main nebular shell. - The relatively high-resolution of the optical longslit spectra presented here allowed us to suggest a possible kinematic structure of NGC 2371. The outer lobes have the typical expansion velocity of evolved PNe (\(\sim\)`<!-- -->`{=html}30 km s\(^{-1}\)) whilst the inner shell has an expansion velocity of \(\sim\)`<!-- -->`{=html}70 km s\(^{-1}\) in accordance with previous analysis of high-resolution echelle observations. On the other hand, the dense knots have a slow radial velocity. We suggest that NGC 2371 has a bipolar shape with each lobe presenting a double-structure protruding from a barrel-like central region. We propose that the densest material around WD 0722\(+\)`<!-- -->`{=html}295 might be the relic of an early ejection of material along a ring-like structure. The ejection of the main nebula is more recent and can be directly related to the current fast stellar wind of the progenitor star of NGC 2371. It seems to have expanded towards the low-density region, the polar zone of the barrel-like structure. We emphasise that the analysis of high-resolution echelle observations such as those obtained with the San Pedro Mártir MES are most needed in order to construct a detailed view of the morpho-kinematic structure of NGC 2371.
{'timestamp': '2020-06-01T02:03:24', 'yymm': '2005', 'arxiv_id': '2005.14294', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14294'}
null
null
# Introduction applications use information that is encoded as vectors of integers, either directly or indirectly. Furthermore, these vectors are affected by noise that may increase or decrease entries of the vectors by a limited amount. We mention a few of these examples: In high-density magnetic recording channels, information is stored in the lengths of runs of \(0\)'s. Various phenomena may cause the reading process to shift the positions of \(1\)'s (peak-shift error), thereby changing the length of adjacent runs of \(0\)'s by a limited amount (e.g., see ). In flash memories, information is stored in the charge levels of cells in an array. However, retention (slow charge leakage), and inter-cell interference, may cause charge levels to move, usually, by a limited amount (e.g., see ). More recently, in some DNA-storage applications, information is stored in the lengths of homopolymer runs. These however, may end up shorter or longer than planned, usually by a limited amount, due to variability in the molecule-synthesis process (see ). In all of the applications mentioned above, an integer vector \(\mathbf{v}\in\mathbb{Z}^n\) encodes information. If at most \(t\) of its entries suffer an increase by as much as \(k_+\), or a decrease by as much as \(k_-\), we can write the corrupted vector as \(\mathbf{v}+\mathbf{e}\), where \(\mathbf{e}\) resides within a shape we call the *\((n,t,k_+,k_-)\)-error-ball*, and is defined as \[\label{eq:ball} {\mathcal B}(n,t,\kp,\km)\triangleq \set*{\mathbf{x}=(x_1,x_2,\ldots,x_n)\in \mathbb{Z}^n;-k_-\leq x_i \leq k_+ \text{ and } \wt(\mathbf{x}) \leq t },\] where \(\wt(\mathbf{x})\) denotes the Hamming weight of \(\mathbf{x}\). It now follows that an error-correcting code in this setting is equivalent to a packing of \(\mathbb{Z}^n\) by \({\mathcal B}(n,t,\kp,\km)\), a covering code is equivalent to a covering of \(\mathbb{Z}^n\) by \({\mathcal B}(n,t,\kp,\km)\), and a perfect code is equivalent to a tiling of \(\mathbb{Z}^n\) by \({\mathcal B}(n,t,\kp,\km)\). An example of \(\mathcal{B}(3,2,2,1)\) is shown in Fig. [\[fig:qc\]](#fig:qc){reference-type="ref" reference="fig:qc"}. A significant amount of works has been devoted to tiling/packing/covering of \(\mathbb{Z}^n\) by these shapes, albeit, almost exclusively for the case of \(t=1\). When packing and tiling are concerned, the *cross*, \(\mathcal{B}(n,1,k,k)\), and semi-cross, \(\mathcal{B}(n,1,k,0)\) have been extensively researched, e.g., see and the many references therein. This was extended to *quasi-crosses*, \(\mathcal{B}(n,1,k_+,k_-)\), in, creating a flurry of activity on the subject. To the best of our knowledge, are the only works to consider \(t\geq 2\). considered tiling a notched cube (or a "chair"), which for certain parameters becomes \(\mathcal{B}(n,n-1,k,0)\), while considered packing the same ball \(\mathcal{B}(n,n-1,k,0)\). Among others, recently studied the tiling problem in the most general case, i.e., tiling \({\mathcal B}(n,t,\kp,\km)\) for \(t \geq 2\). Covering problems have also been studied, though only when \(t=1\), . The main goal of this paper is to study packing and covering of \(\mathbb{Z}^n\) by \({\mathcal B}(n,t,\kp,\km)\) when \(t\geq 2\). We provide explicit constructions for both packings and coverings, as well some non-constructive existence results. In particular, we demonstrate the existence of packings with asymptotic packing density \(\Omega(1)\) (as \(n\) tends to infinity) for some sets of \((t,k_+,k_-)\), and the existence of coverings with density \(O(1)\) for any given \((t,k_+,k_-)\). Additionally, we generalize the concept of packing to \(\lambda\)-packing, which works in conjunction with the list-decoding framework and list size \(\lambda\). We show the existence of \(\lambda\)-packings with density \(O(n^{-\epsilon})\) for any \((t,k_+,k_-)\) and arbitrarily small \(\epsilon>0\), while maintaining a list size \(\lambda=O(\epsilon^{-t})\), which does not depend on \(n\). Our results are summarized at the end of this paper, in Table [\[tab:summary\]](#tab:summary){reference-type="ref" reference="tab:summary"}. The paper is organized as follows. We begin, in Section [2](#sec:prelim){reference-type="ref" reference="sec:prelim"}, by providing notation and basic known results used throughout the paper. Section [3](#sec:packing){reference-type="ref" reference="sec:packing"} is devoted to the study of packings. This is generalized in Section [4](#sec:genpack){reference-type="ref" reference="sec:genpack"} to \(\lambda\)-packings. In Section [5](#sec:covering){reference-type="ref" reference="sec:covering"} we construct coverings. Finally, we conclude in Section [6](#sec:conclusion){reference-type="ref" reference="sec:conclusion"} by giving a summary of the results as well as some open problems. # Preliminaries {#sec:prelim} For integers \(a\leq b\) we define \([a,b]\triangleq\set*{a,a+1,\dots,b}\) and \([a,b]^*\triangleq [a,b]\setminus\set*{0}\). We use \(\mathbb{Z}_m\) to denote the cyclic group of integers with addition modulo \(m\), and \(\mathbb{F}_q\) to denote the finite field of size \(q\). A *lattice* \(\Lambda\subseteq\mathbb{Z}^n\) is an additive subgroup of \(\mathbb{Z}^n\) (sometimes called an *integer lattice*). A lattice \(\Lambda\) may be represented by a matrix \(\mathcal{G}(\Lambda)\in\mathbb{Z}^{n\times n}\), the span of whose rows (with integer coefficients) is \(\Lambda\). From a geometric point of view, when viewing \(\Lambda\) inside \(\mathbb{R}^n\), a *fundamental region* of \(\Lambda\) is defined as \[\Pi(\Lambda)\triangleq \set*{ \sum_{i=1}^n c_i\mathbf{v}_i; c_i\in\mathbb{R}, 0\leq c_i < 1 },\] where \(\mathbf{v}_i\) is the \(i\)-th row of \(\mathcal{G}(\Lambda)\). It is well known that the volume of \(\Pi(\Lambda)\) is \(\abs{\det(\mathcal{G}(\Lambda))}\), and is independent of the choice of \(\mathcal{G}(\Lambda)\). We therefore denote \[\vol(\Lambda)\triangleq \vol(\Pi(\Lambda)) = \abs*{\det(\mathcal{G}(\Lambda))}.\] In addition, if \(\vol(\Lambda)\neq 0\) then \[\vol(\Lambda)=\abs*{\mathbb{Z}^n / \Lambda}.\] We say \(\mathcal{B}\subseteq\mathbb{Z}^n\) *packs* \(\mathbb{Z}^n\) by \(T\subseteq\mathbb{Z}^n\), if the translates of \(\mathcal{B}\) by elements from \(T\) do not intersect, namely, for all \(\mathbf{v},\mathbf{v}'\in T\), \(\mathbf{v}\neq\mathbf{v}'\), \[(\mathbf{v}+\mathcal{B})\cap(\mathbf{v}'+\mathcal{B})=\varnothing.\] We say \(\mathcal{B}\) *covers* \(\mathbb{Z}^n\) by \(T\) if \[\bigcup_{\mathbf{v}\in T} (\mathbf{v}+\mathcal{B}) = \mathbb{Z}^n.\] If \(\mathcal{B}\) both packs and covers \(\mathbb{Z}^n\) by \(T\), then we say \(\mathcal{B}\) *tiles* \(\mathbb{Z}^n\) by \(T\). The *packing density* (or *covering density*, respectively) of \(\mathcal{B}\) by \(T\) is defined as \[\delta\triangleq \lim_{\ell\to\infty} \frac{\abs*{[-\ell,\ell]^n\cap T}\cdot\abs{\mathcal{B}}}{\abs*{[-\ell,\ell]^n}}.\] When \(T=\Lambda\) is some lattice, we call these lattice packings and lattice coverings, respectively. The density then takes on a simpler form \[\delta = \frac{\abs{\mathcal{B}} }{\vol(\Lambda)}.\] Throughout the paper, the object we pack and cover \(\mathbb{Z}^n\) with, is the error ball, \({\mathcal B}(n,t,\kp,\km)\), defined in [\[eq:ball\]](#eq:ball){reference-type="eqref" reference="eq:ball"}. We conveniently observe that for all integers \(n\geq 1\), \(0\leq t\leq n\), \(0\leq k_-\leq k_+\), we have \[\abs*{{\mathcal B}(n,t,\kp,\km)}=\sum_{i=0}^t \binom{n}{i}(k_++k_-)^i.\] ## Lattice Packing/Covering/Tiling and Group Splitting Lattice packing, covering, and tiling of \(\mathbb{Z}^n\) with \(\mathcal{B}(n,t,k_+,k_-)\), in connection with group splitting, has a long history when \(t=1\) (e.g., see ), called lattice tiling by crosses if \(k_+=k_-\) (e.g., ), semi-crosses when \(k_-=0\) (e.g., ), and quasi-crosses when \(k_+\geqk_-\geq 0\) (e.g., ). For an excellent treatment and history, the reader is referred to  and the many references therein. Other variations, keeping \(t=1\) include . More recent results may be found in  and the references therein. For \(t\geq 2\), an extended definition of group splitting in connection with lattice tiling is provided in. In the following, we modify this definition to distinguish between lattice packings, coverings, and tilings. In our context, since we are interested in packing and covering with \({\mathcal B}(n,t,\kp,\km)\), then in the previous definition, we need to take \(M\triangleq [-k_-,k_+]^*\). Thus, the following two theorems show the equivalence of partial \(t\)-splittings with \(M\) and lattice packings of \({\mathcal B}(n,t,\kp,\km)\), summarizing Lemma 3 and Lemma 4 in, and similarly for complete \(t\)-splittings and lattice coverings. In the theorem above, for \(G \geq M\diamond_t S\), since the quotient group \(\mathbb{Z}^n / \Lambda\) is isomorphic to the image of \(\phi\), which is a subgroup of \(G\), we have \(\vol(\Lambda)\leq \abs{G}\). Then the packing density of \(\Lambda\) is \[\delta = \frac{\abs{{\mathcal B}(n,t,\kp,\km)} }{\vol(\Lambda)}\geq\frac{\abs{{\mathcal B}(n,t,\kp,\km)} }{\abs{G}}.\] For \(G \leq M\diamond_t S\), \(\vol(\Lambda)= \abs{G}\), and the covering density of \(\Lambda\) is \[\delta = \frac{\abs{{\mathcal B}(n,t,\kp,\km)} }{\vol(\Lambda)}=\frac{\abs{{\mathcal B}(n,t,\kp,\km)} }{\abs{G}}.\] It is known that a lattice packing implies a partial splitting. While not of immediate use to us in this paper, we do mention that an analogous claim is also true for lattice coverings, as the following theorem shows. Finally, a connection between perfect codes in the Hamming metric, and lattice tilings with \({\mathcal B}(n,t,\kp,\km)\) was observed in . We repeat a theorem we shall later generalize. # Constructions of Lattice Packings {#sec:packing} In this section we describe several constructions for packings of \({\mathcal B}(n,t,\kp,\km)\). We begin by showing how to translate codes in the Hamming metric into lattices that pack \({\mathcal B}(n,t,\kp,\km)\). Apart from a single case, these have vanishing density. The motivation for showing these "off-the-shelf" constructions is to create a baseline against which we measure our tailor-made constructions that appear later. These use \(B_t[N;1]\) sequences, or take inspiration from constructions of sets with no arithmetic progression, to construct codes that improve upon the baseline. ## Constructions Based on Error-Correcting Codes Theorem [\[th:perfectcode\]](#th:perfectcode){reference-type="ref" reference="th:perfectcode"} can be easily modified to yield the following construction, the proof of which is the same as that of and we omit here to avoid unnecessary repetition. Since \(\mathcal{B}(n,t,k_+,k_-)\) packs \(\mathbb{Z}^n\) by \(\Lambda\), the lattice \(\Lambda\) is an error-correcting code over \(\mathbb{Z}\) for asymmetric limited-magnitude errors. We note that a similar construction of error-correcting codes over a finite alphabet for asymmetric limited-magnitude errors was presented in and the decoding scheme therein can be adapted here as follows. Let \(\mathbf{x}\in\Lambda\) be a codeword, and \(\mathbf{y} \in\mathbf{x}+{\mathcal B}(n,t,\kp,\km)\) be the channel output. Denote \(\boldsymbol{\psi}= \mathbf{y} \pmod{p}\). Run the decoding algorithm of the linear \([n,k,2t+1]\) code on \(\boldsymbol{\psi}\) and denote the output as \(\boldsymbol{\phi}\). Then \(\boldsymbol{\phi}\) is a codeword of the linear code over \(\mathbb{F}_p\) and it is easy to see that \(\boldsymbol{\phi}=\mathbf{x} \pmod{p}\). Thus \(\mathbf{y}-\mathbf{x}\equiv\boldsymbol{\psi}-\boldsymbol{\phi} \pmod{p}\). Denote \(\boldsymbol{\epsilon}=\boldsymbol{\psi}-\boldsymbol{\phi} \pmod{p}\) and let \(\mathbf{e}=(e_1,e_2,\ldots,e_n)\) where \[e_i \triangleq \begin{cases} \epsilon_i, \textup{\ \ if \(0\leq \epsilon_i \leq k_+\);} \\ \epsilon_i-p, \textup{\ \ otherwise.}\\ \end{cases}\] Then \(\mathbf{x}\) can be decoded as \(\mathbf{x}=\mathbf{y}-\mathbf{e}\). Now let us look at the packing density. When \(t\) is small, we may use BCH codes as the input to construct the lattice packing. Note that if \(k_+=1\) and \(k_-=0\), then the packing density in Corollary [\[cor:lc\]](#cor:lc){reference-type="ref" reference="cor:lc"} is \(\delta=\frac{\sum_{i=0}^t \binom{n}{i}}{(n+1)^{t}}=\frac{1}{t!}+o(1)\) (when \(t\) is fixed and \(n\) tends to infinity). However, for all the other values of \(k_+\) and \(k_-\), namely \(p\geq 3\), the density always vanishes when \(n\) tends to infinity, i.e., \(\delta=\Theta(n^{t-\ceil{2t(1-{1}/p)}})\). In the remainder of this section, we will present some constructions to provide lattice packings of higher density. Perfect codes were used in obtain lattice tilings, i.e., lattice packings with density \(1\). Similarly, it is possible to use quasi-perfect linear codes to obtain lattice packings with high densities. We note that presented some binary quasi-perfect linear codes with minimum distance \(5\), which can give rise to packings of \(\mathcal{B}(n,2,1,0)\). It has been checked out that the corresponding densities are asymptotically the same as that in Corollary [\[cor:lc\]](#cor:lc){reference-type="ref" reference="cor:lc"}, i.e., \(\frac{1}{2}+o(1)\). also studied \(p\)-ary quasi-perfect linear codes with \(p\geq 3\). However, the minimum distances of those codes are no more that \(4\). So they cannot be used to obtain packings of \({\mathcal B}(n,t,\kp,\km)\) with \(t \geq 2\). The following theorem uses non-linear codes to construct non-lattice packing, the proof of which is the same as that of [@CasSchBohBru10 Theorem 5] and we omit here to avoid unnecessary repetition. ## Construction Based on \(B_t[N;1]\) Sets for \((k_+,k_-)=(1,0)\) or \((1,1)\) A subset \(A\subseteq\mathbb{Z}\) is called a *\(B_t[g]\) set* if every integer can be written in at most \(g\) different ways as a sum of \(t\) (not necessary distinct) elements of \(A\) (e.g., see and the many references therein). In this section, however, we require \(B_t[1]\) sets with a somewhat stronger property. Specifically, a subset \(A\) of \(\mathbb{Z}_N\) is called a *\(B_t[N;1]\) set* if the sums of any \(t\) (not necessary distinct) elements of \(A\) are all different modulo \(N\). Bose and Chowla presented two classes of \(B_t[N;1]\) sets. The following result slightly improves upon the density obtained in Corollary [\[cor:lc\]](#cor:lc){reference-type="ref" reference="cor:lc"} for lattice packings of \(\mathcal{B}(n,t,1,0)\). In general, we do not have an efficient decoding scheme for the lattice code obtained from Theorem [\[thm:con-Btset-1\]](#thm:con-Btset-1){reference-type="ref" reference="thm:con-Btset-1"}. However, for the lattice code \(\Lambda_{S_2\setminus\set{0}}\) obtained from the \(B_t[(q^{t+1}-1)/(q-1);1]\) set \(S_2\) in Theorem [\[thm:Btset\]](#thm:Btset){reference-type="ref" reference="thm:Btset"}, we have the following decoding algorithm (summarized in Algorithm [\[alg:decoding\]](#alg:decoding){reference-type="ref" reference="alg:decoding"}). Let \(n=q\) and let \(S_2\setminus\set{0}=\set{s_0,\dots,s_{n-1}}\) be defined as in Theorem [\[thm:Btset\]](#thm:Btset){reference-type="ref" reference="thm:Btset"}. Let \(\mathbf{x}\in\Lambda_{S_2\setminus\set{0}}\) be a codeword and \(\mathbf{y} \in \mathbf{x}+\mathcal{B}(n,t,1,0)\) be the channel output. Then \(\mathbf{x}\cdot (s_0,s_1,\ldots,s_{n-1})=0\), and \(\mathbf{y}-\mathbf{x}\) is a binary vector over \(\set{0,1}\) of weight at most \(t\). Let \(i_1,i_2,\ldots,i_r\) be the indices of the nonzero bits of \(\mathbf{y}-\mathbf{x}\), and denote \(s=\mathbf{y}\cdot (s_0,s_1,\ldots,s_{n-1})\). We aim to recover \(i_1,i_2,\ldots,i_r\) from \(s\). Since \[\begin{aligned} s&=\mathbf{y}\cdot (s_0,s_1,\ldots,s_{n-1}) = \mathbf{y}\cdot (s_0,s_1,\ldots,s_{n-1})-0 =\mathbf{y}\cdot (s_0,s_1,\ldots,s_{n-1})-\mathbf{x}\cdot (s_0,s_1,\ldots,s_{n-1}) \\ &= (\mathbf{y}-\mathbf{x})\cdot (s_0,s_1,\ldots,s_{n-1}) =\sum_{\ell=1}^r s_{i_\ell}, \end{aligned}\] we have that \[\label{eq:decode} \parenv*{\prod_{\ell=1}^r \beta_{i_\ell}} \eta^s= \prod_{\ell=1}^r\parenv*{\beta_{i_\ell} \eta^{s_{i_\ell}}} =\prod_{\ell=1}^r(\eta+\alpha_{i_\ell}).\] Let \(p(x)\) be the primitive polynomial of \(\eta\) and \(r(x) = x^s \bmod p(x)\). Then \(r(\eta)=\eta^s\), and we substitute this in [\[eq:decode\]](#eq:decode){reference-type="eqref" reference="eq:decode"} to obtain \[\parenv*{\prod_{\ell=1}^r \beta_\ell} r(\eta)=\prod_{\ell=1}^r(\eta+\alpha_{i_\ell}).\] Since both the polynomials \((\prod_{\ell=1}^r \beta_{i_\ell}) r(x)\) and \(\prod_{\ell=1}^r(x+\alpha_{i_\ell})\) are over \(\mathbb{F}_q\) and have degrees at most \(t\), they should be the same; otherwise, \(\eta\) is a root of a nonzero polynomial of degree at most \(t\), which contradicts the fact that \(\eta\) is a primitive element of \(\mathbb{F}_{q^{t+1}}\). Thus, we may solve \((\prod_{\ell=1}^r \beta_\ell) r(x)\) to find out \(\alpha_{i_1}, \alpha_{i_1},\ldots, \alpha_{i_r}\). Finally, we can subtract \(\sum_{\ell=1}^r \mathbf{e}_{i_\ell}\) from \(\mathbf{y}\) to obtain \(\mathbf{x}\). Combining Theorem [\[thm:Btset\]](#thm:Btset){reference-type="ref" reference="thm:Btset"} and Theorem [\[thm:con-Btset-pm1\]](#thm:con-Btset-pm1){reference-type="ref" reference="thm:con-Btset-pm1"}, together with Theorem [\[th:lattotile\]](#th:lattotile){reference-type="ref" reference="th:lattotile"}, we have the following result. ## Constructions for \(t=2\) Whereas in the previous section we considered unconstrained \(t\) but only small values of \(k_+,k_-\), in this section we focus on the case of \(t=2\) but unconstrained \(k_+,k_-\). We first present a construction based on \(k\)-fold Sidon sets. Such sets were first defined in  as a generalization of Sidon sets. We repeat the definition here. Let \(k\) be a positive integer and let \(N\) be relatively prime to all elements of \([1,k]\), i.e., \(\gcd(N,k!)=1\). Fix integers \(c_1,c_2,c_3,c_4\in [-k,k]\) such that \(c_1+c_2+c_3+c_4=0\), and let \(\mathcal{S}\) be the collection of sets \(S \subseteq \set{1,2,3,4}\) such that \(\sum_{i \in S} c_i=0\) and \(c_i\neq 0\) for \(i \in S\). We note that \(\mathcal{S}\) always contains the empty set. Consider the following equation over \(x_1,x_2,x_3,x_4\in \mathbb{Z}_N\): \[\label{eq:kfoldSidonset} c_1x_1+c_2x_2+c_3x_3+c_4x_4\equiv 0 \pmod{N}.\] A solution of [\[eq:kfoldSidonset\]](#eq:kfoldSidonset){reference-type="eqref" reference="eq:kfoldSidonset"} is *trivial* if there exists a partition of the set \(\set{i; c_i\neq 0}\) into sets \(S,T\in \mathcal{S}\) such that \(x_i=x_j\) for all \(i,j\in S\) and all \(i,j\in T\). We now define a *\(k\)-fold Sidon set* to be a set \(A\subseteq\mathbb{Z}_N\) such that for any \(c_1,c_2,c_3,c_4\in [-k,k]\) with \(c_1+c_2+c_3+c_4=0\), equation [\[eq:kfoldSidonset\]](#eq:kfoldSidonset){reference-type="eqref" reference="eq:kfoldSidonset"} has only trivial solutions in \(A\). In the special case of \(k=1\), a \(1\)-fold Sidon set coincides with the usual definition of a *Sidon set*, which is also a \(B_2[N;1]\) set. When \(k=2\), a family of \(2\)-fold Sidon sets is constructed in by removing some elements from Singer difference sets with multiplier \(2\). We immediately get the following corollary. Now, we present a construction for \(t=2\) and \(0\leq k_-\leq k_+\leq 3\), which combines Behrend's method and Ruzsa's method to forbid some specified linear equations. # Generalized Packings {#sec:genpack} It is a common practice in coding theory to also consider list decoding instead of unique decoding. In such scenarios, the channel output is decoded to produce a list of up to \(\lambda\) possible distinct codewords, where the channel output is within the error balls centered at each of these codewords. In this section, we therefore generalize the concept of packing to work in conjunction with list decoding. The trade-off we present here is that at the price of a constant-sized list, \(\lambda\), we can find lattice packings of \({\mathcal B}(n,t,\kp,\km)\) with density almost constant, \(\Omega(n^{-\epsilon})\), for any \(\epsilon>0\). The proof method, however, is non-constructive, and relies on the probabilistic method. Given a shape \(\mathcal{B} \subseteq \mathbb{Z}^n\) and a lattice \(\Lambda \subseteq \mathbb{Z}^n\), we say \(\mathcal{B}\) *\(\lambda\)-packs \(\mathbb{Z}^n\) by \(\Lambda\)* if for every element \(\mathbf{z}\in\mathbb{Z}^n\), there are at most \(\lambda\) distinct elements \(\mathbf{v}_i\in\Lambda\) such that \(\mathbf{z}\in\mathbf{v}_i+\mathcal{B}\). Obviously, if \(\lambda=1\), this definition coincides with the packing defined in Section [2](#sec:prelim){reference-type="ref" reference="sec:prelim"}. Let \(G\) be a finite Abelian group, \(M\triangleq [-k_-,k_+]^*\), and \(S\subseteq G\). If each element of \(G\) can be written in at most \(\lambda\) ways as a linear combination of \(t\) elements of \(S\) with coefficients from \(M \cup \set{0}\), then we say \(G \overset{\lambda}{\geq} M \diamond_t S\). The following result is an analogue of Theorem [\[th:lattotile\]](#th:lattotile){reference-type="ref" reference="th:lattotile"}, which relates lattice packings to Abelian groups. The proof is exactly analogous, and we omit it. We use the probabilistic approach detailed in , and follow some of the notation there. Let \(x_1,x_2,\ldots, x_N\) be independent \(\set{0,1}\) random variables. Let \(Y=Y(x_1,x_2,\ldots,x_N)\) be a polynomial of \(x_1,x_2,\ldots, x_N\). \(Y\) is *normal* if its coefficients are between \(0\) and \(1\). A polynomial \(Y\) is *simplified* if every monomial is a product of different variables. Since we are dealing with \(\set{0,1}\) random variables, every \(Y\) has a unique simplification. Given a set \(A\), let \(\partial_A(Y)\) denote the partial derivative of \(Y\) with respect to \(A\), and let \(\partial_A^*\) be the polynomial obtained from the partial derivative \(\partial_A (Y)\) by subtracting its constant coefficient. Define \(\mathbb{E}_j^*(Y)\triangleq \max_{\abs{A}\geq j} \mathbb{E}(\partial_A^* Y)\). We now use Theorem [\[thm:vucon\]](#thm:vucon){reference-type="ref" reference="thm:vucon"} to show the existence of generalized lattice packings with the desired parameters. As a final comment on the matter, we observe that a tedious calculation shows that in the above corollary \(\lambda=O(\epsilon^{-t})\)--a calculation which we omit. # Constructions of Lattice Coverings {#sec:covering} We switch gears in this section, and focus on covering instead of packing. We first argue that using known techniques from the theory of covering codes in the Hamming metric, we can show the existence of non-lattice coverings of \(\mathbb{Z}^n\) by \({\mathcal B}(n,t,\kp,\km)\). However, these have a high density of \(\Omega(n)\). We then provide a product construction to obtain a lattice covering by \({\mathcal B}(n,t,\kp,\km)\) with density \(O(1)\). Fixing an integer \(\ell\in\mathbb{N}\), we use the same argument as the one given in to construct a covering code \(C\subseteq\mathbb{Z}_\ell^n\), of size \[\abs*{C}=\ceil*{\frac{n\ell^n \ln \ell}{\abs*{{\mathcal B}(n,t,\kp,\km)}}}.\] We can then translate this covering of \(\mathbb{Z}_\ell^n\) by \({\mathcal B}(n,t,\kp,\km)\) to a covering of \(\mathbb{Z}^n\) by using the same idea as Theorem [\[th:linearcode\]](#th:linearcode){reference-type="ref" reference="th:linearcode"}, and defining \(C'\triangleq\set*{ \mathbf{x}\in\mathbb{Z}^n; (\mathbf{x}\bmod \ell)\in C}\). However, the density of the resulting covering is \[\delta= \frac{\abs*{C}\cdot\abs*{{\mathcal B}(n,t,\kp,\km)}}{\ell^n} = \Omega(n).\] We therefore proceed to consider more efficient coverings using the product construction whose details follow. We can now construct a lattice covering, using the previous theorem. # Conclusion {#sec:conclusion} Motivated by coding for integer vectors with limited-magnitude errors, we provided several constructions of packings of \(\mathbb{Z}^n\) by \({\mathcal B}(n,t,\kp,\km)\) for various parameters. These are summarized in Table [\[tab:summary\]](#tab:summary){reference-type="ref" reference="tab:summary"}. While the parameter ranges of the constructions sometimes overlap, and perhaps result in equal or inferior asymptotic density, having more constructions allows for more choices for fixed values of the parameters. One main goal was to construct lattice packings, analogous to linear codes, as these are generally easier to analyze, encode, and decode. Thus, except for one case, all constructions we provide lattices. The main tool in constructing these is the connection between lattice packings of \({\mathcal B}(n,t,\kp,\km)\) and \(t\)-splittings of Abelian groups. The other important goal was to have asymptotic packing density that is non-vanishing. This is achieved in many of the cases. We also discussed \(\lambda\)-packing, which allows for a small overlap between the translates of \({\mathcal B}(n,t,\kp,\km)\) centered at the lattice points. This is useful for list-decoding setting with a list size of \(\lambda\). The result we obtain is non-constructive, and it provides a trade-off between the list size and the packing density. Finally, we also addressed the problem of lattice-covering of \(\mathbb{Z}^n\) by \({\mathcal B}(n,t,\kp,\km)\), showing using the product construction, that there exist such coverings with asymptotic constant density. The results still leave numerous open questions, of which we mention but a few: 1. Constructions for packings of \({\mathcal B}(n,t,\kp,\km)\) with \(t\geq 3\), \(k_+\geq 2\), and non-vanishing asymptotic density are still unknown. 2. Whether asymptotic density of \(1\) is attainable for all parameters is still an open questions. Such lattice packings would be analogous to asymptotically perfect codes. 3. In the asymptotic regime of \(t=\Theta(n)\), all of the constructions in this paper produce packings with vanishing asymptotic rates. Such families of packings are analogous to good codes in the Hamming metric, and their existence and constructions would be most welcome. 4. Efficient decoding algorithms are missing for most of the cases. In the asymptotic regime of constant \(t\), \(\abs{{\mathcal B}(n,t,\kp,\km)}=\Theta(n^t)\). Thus, we are looking for non-trivial decoding algorithms, whose run-time is \(o(n^t)\). 5. We would also like to find constructive versions of the non-constructive proofs for \(\lambda\)-packings, and covering lattices. [^1]: It is known that \(\psi(x)\leq x+x^{21/40}\), and conjectured that \(\psi(x)=x+O(\log x)\).
{'timestamp': '2020-06-01T02:11:08', 'yymm': '2005', 'arxiv_id': '2005.14519', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14519'}
# Introduction Access to freshwater is of pivotal importance to humanities. Fast population growth and climate change demand increasing supply of freshwater. Water scarcity has become a threat to the sustainable development of human society. This motivates the development of utilizing saline waters from the oceans and other brackish water sources and the processes that convert saltwater into freshwater. Solar energy is now emerging as one of the most promising sustainable energy sources, as it is clean and can be supplied without any environmental pollution compared with other forms of energy . And the abundant solar energy makes the solar-driven evaporation one of the promising approaches for water desalination and purification. In a conventional solar-driven evaporation system, bulk water is heated to a high temperature to generate water vapor, resulting in a slow response to sunlight and heat loss to the bulk water or the external environment. In 2011, Wang *et al.,* were among the first to demonstrate the floating interfacial solar-driven evaporation structure into desalination area, which does not require significant capital investment in high-cost permanent construction and/or land use. Compared with bulk water-heating method which heats the entire body of water, the interfacial solar-driven evaporation approach mainly localizes the heat generation at the water-air interface. This method avoids heating a large volume of water, *e.g.,* the ocean, which serves as a low-temperature sink. The interfacial evaporation has an ultra-fast response to sunlight and is endowed with a much higher systematic thermal efficiency. Furthermore, the technique can be easily applied by floating an absorber sheet on the water surface without complex pressure control or other bulky infrastructure. Owing to all these advantages, scientists have made great efforts to develop the interfacial solar-driven evaporation. To yield a remarkable photothermal performance, the development of interfacial evaporation structure should center around the following four key factors. (1) The ideal solar absorber should possess outstanding absorptance in the range of visible and near-infrared regions to convert the solar radiation into heat to be used for water vapor generation; (2) It is crucial for the interfacial evaporation to feature a low thermal conductivity, thereby reducing the heat loss from the absorber to the bulk water and localizing the heat at the air/water evaporative interface; (3) High hydrophilicity and porous framework are necessary for sufficient water transport from the bulk water to the heated area; and (4) Self-floating ability is required to avoid land use and/or permanent infrastructure construction. Even with intensive efforts so far, it remains as a huge challenge to develop an approach that can satisfy these four criteria simultaneously. To obtain a high efficiency, a multilayered structure is proposed to take into account these pivotal factors and it provides us with more options to choose alternative appropriate materials. Ghasemi *et al.,* first demonstrated the double-layered structure consisting of a carbon foam layer supporting an exfoliated graphite layer. The bottom layer serves as a heat barrier to minimize the heat loss to the bulk water, and its porous structure is used to transport water to the heated area, and meanwhile it supports the top layer to make it possible for self-floating. The top porous layer serves as the absorber for the vapor transport. Recently, many similar double-layered evaporation structures have been widely adopted. In most cases, such as air-laid paper, polystyrene foam, woodblock, polyurethane sponge, macroporous silica substrate, and bacterial nanocellulose aerogel, the bottom layer serves both as a heat barrier and a water transport medium. Under a steady working condition, when water is transported to the top photothermal area through the bottom layer, almost all of the macropores inside the heat barrier are filled with water which typically is more thermally conductive than the heat barrier. This process renders the heat barrier less effective. To avoid heat loss, a new multilayer consisting of photothermal material, closed-pore thermal insulator, and external hydrophilic materials has generated much interest. The closed-pore thermal insulator serves as a real heat barrier layer and the air inside the insulator reduces heat conduction. For example, polystyrene foam is a good and inexpensive thermal insulator with low thermal conductivity. External hydrophilic materials, wrapping or passing through the insulator foam, act as a capillary-driven pump with a one-/two-dimensional water path. By and large, this modified multilayered evaporation structure has become a favorable way to further minimize heat conduction losses and improve energy conversion efficiency. An efficient solar steam generation depends highly on the photothermal conversion materials with broadband absorptance and high photothermal properties. On the basis of a multilayered structure, the diverse photothermal materials with wide light absorbance have been extensively studied including carbon-based materials, metals, and metal oxides. Carbon-based absorbers, such as carbon black, graphene, graphene oxide and carbon nanotube, offer great advantages of high solar absorbance and thermal stability. They have become the largely approving choices, however, the utilization of elaborate technologies and the high-associated cost limit their field applications to large-scale desalination. Although the metal-based (*e.g.,* gold nanoparticles) materials have attracted tremendous attention due to their unique optical and photothermal properties, their industrial applications are limited because of their inferior chemical and thermal stabilities, exorbitant cost, and complex fabrication processes. With the aim to further explore novel techniques and materials in improving evaporation efficiency and reducing cost for desalination, we have applied the blackest paint, called Black 3.0 Paint, to the floating interfacial solar-driven evaporation device serving as the photothermal conversion material combined with a sheet of melamine foam (MF). Herein, a sheet of hot-pressed MF plays an ideal elastic skeleton material sprayed with Black 3.0 paint, serving on top as a perfect solar absorber to efficiently absorb and convert the solar radiation into heat. To achieve a perfect evaporation performance and high solar-thermal energy conversion efficiency, we demonstrate a self-floating three-layer evaporation structure with a two-dimensional water path to localize solar-thermal heat generation to the air/water interface. This entire device is made from the commercially available and low-cost materials: solar absorber uses a sheet of hot-pressed MF combined with Black 3.0 paint; two-dimensional water path is provided by the highly absorbent Webril all-cotton wipes, and thermal barrier uses the Polyvinyl chloride (PVC) foam. Under 1 sun illumination without solar concentration, this evaporation device yields an excellent evaporation rate of freshwater as high as 2.48 kg m\(^{-2}\) h\(^{-1}\) and a highlighted evaporation efficiency of 172.5%. Based on this multilayered evaporation structure, the novel Black 3.0 paint demonstrates a superb performance with cost-effectiveness, operability, and durability, which can be regarded as one of the indispensable choices of the solar-absorbing materials in the future development of the solar-driven evaporation process. # Results and Discussions The schematic of the synthesis process of the absorber layer is shown in Fig. [\[fig:absorber\]](#fig:absorber){reference-type="ref" reference="fig:absorber"}a. The fabrication process is simple and scalable, which is summarized as three steps: hot-pressing, spraying, and drying. In this study, the MF with the dimension of 10 cm \(\times\) 6 cm \(\times\) 2 cm is selected as an elastic skeleton for immobilization of the Black 3.0 paint spray. MF is a commercially available low-cost polymer material, and its high porosity, low density, excellent hydrophilicity, and elasticity render it highly applicable for the solar steam generation devices. Hot-pressing treatment of the MF with a compression ratio of 4 has been experimentally confirmed to be advantageous to increase its elasticity and fatigue resistance. More importantly, the compressed three-dimensional network of the foam can dramatically increase its density to effectively increase the ability of water absorption. In laboratory experiments, the pressed MF is cut into a 1 mm-thick circle with a diameter of 47 mm, fitting the size of a 100 ml beaker. The inexpensive Black 3.0 paint has gained great attention in creative art and as an superb solar photothermal material. As the blackest and most matte acrylic paint, Black 3.0 paint exhibits nearly perfect solar absorption at up to 99% of visible light. The paint can be easily applied via brushing or spraying onto most surfaces, such as wood, paper, canvas, and plastic. Last but not the least, the paint is light in density and very suitable to the desalination process. Figure S2 shows the transmittance spectrum of the Black 3.0 paint hydraulic pressed with KBr powder showing corresponding wavenumber of functional groups. Then the diluted paint is sprayed on the pressed MF sheet using a spray gun. The distance between the spray head and the MF sheet is about 25 cm. Considering the porous surface of the pressed MF sheet surface, it turns out that a couple of thin coating layers are better than one the thick layer. Between each coating process, drying it thoroughly with hot air is necessary at 190\(^\circ\)C for 5 minutes. After thoroughly drying, the Black 3.0 paint-coated MF sheet is rinsed in deionized (DI) water for several times to remove the residual impurities. Hereafter, keep this sheet in the oven at 60\(^\circ\)C for drying and then use it as the solar absorber layer in the evaporation device. The absorber layer can be easily prepared requiring no complex process or expensive equipment, and therefore, most suitable for volume production. As shown in Fig. [\[fig:absorber\]](#fig:absorber){reference-type="ref" reference="fig:absorber"}b, the absorber sheet exhibits a superb absorption ranging from 95% to 99% at the wavelength from 0.2 \(\mu\)m to 2.5 \(\mu\)m, indicating that it acts as an efficient broadband solar radiation absorber, whereas the pure pressed MF shows poor absorptivity. Besides, this absorber also exhibits an angular-independent hemispherical absorptivity (Fig. S1). Figure [\[fig:absorber\]](#fig:absorber){reference-type="ref" reference="fig:absorber"}c shows the surface temperature of the absorber sheet in the air under 1 sun for an hour. The time-dependent temperature changes and images are captured by an infrared camera at room temperature, displaying the maximum temperature of the sheet over time. In taking the temperature measurement, the tested absorber sample is placed on a PVC foam plate to minimize the heat exchange with the base below. Upon light illumination, the surface temperature of the absorber sheet rises sharply to an equilibrium temperature around 100\(^\circ\)C within the initial 2.5 minutes and then floats slightly around this temperature afterward, indicating an excellent photothermal performance of the absorber sheet. The inset of Fig. [\[fig:absorber\]](#fig:absorber){reference-type="ref" reference="fig:absorber"}c demonstrates the change in surface temperature more clearly in the initial 4 minutes. Figures [\[fig:test_absorber\]](#fig:test_absorber){reference-type="ref" reference="fig:test_absorber"}a-[\[fig:test_absorber\]](#fig:test_absorber){reference-type="ref" reference="fig:test_absorber"}d show the microscopic structures of the absorber. The pristine MF has polygon networks with a size of about 200 \(\mu\)m and the diameter of the fibers is around 7 \(\mu\)m (Fig. [\[fig:test_absorber\]](#fig:test_absorber){reference-type="ref" reference="fig:test_absorber"}a). While the geometric shape of the networks collapses with the reduced network size (Fig. [\[fig:test_absorber\]](#fig:test_absorber){reference-type="ref" reference="fig:test_absorber"}b), it retains its porous structure, enabling the transportation of water. One-layer Black 3.0 paint coating forms the beads along the fibers (Fig. [\[fig:test_absorber\]](#fig:test_absorber){reference-type="ref" reference="fig:test_absorber"}c), and the three-layer coating causes an increase in the fiber diameter from 7 \(\mu\)m to 50 \(\mu\)m (Fig. [\[fig:test_absorber\]](#fig:test_absorber){reference-type="ref" reference="fig:test_absorber"}d) and fully-covered Black 3.0 paint coated MF presents nearly unity absorptivity in solar irradiance region. The fully covered MF still keeps a highly-porous structure facilitating the water transport and vapor release, which results in the high water evaporation rate. To evaluate the stability of the absorber sheet, the absorber layers undergo severe tests, kept in the boiling water (around 90\(^\circ\)C) for 1 hours and immersed in the alkaline solution (pH \~14) and acidic solution (pH \~1) for 24 hours in the closed bottles. After this harsh thermal and chemical stability test, no obvious changes in the appearance are observed and their absorption spectra are basically consistent with the original one (Fig. [\[fig:test_absorber\]](#fig:test_absorber){reference-type="ref" reference="fig:test_absorber"}e). Localizing the heat converted from solar energy to the air/water interface is the critical step to achieve high evaporation performance. Figure [\[fig:device_wet_salt\]](#fig:device_wet_salt){reference-type="ref" reference="fig:device_wet_salt"}a demonstrates a self-floating evaporation device structure which is composed of three layers. The top layer is a solar absorber layer made of the MF sheet combined with Black 3.0 paint and it plays an essential role in an efficient absorption of the solar radiation. Beneath the absorber layer is a two-dimensional water path enabled by a cotton wipe that is cut into the shape of a circle with 4 extended strips. The round area of the cotton wipe is kept the same as the absorber area, and the bottom edges of 4 strips are in direct contact with the bulk water, which decreased the contact area between the evaporation surface and the bulk water. The cotton wipe is used to transport water due to its strong capillary force and to reduce the direct contact between the bulk water and the absorber layer. Simultaneously ensuring the efficient water supply to the solar heating area and minimizing the heat dissipation to the bulk water is crucial to achieve the high-efficiency interfacial evaporation. The interlocked fibers of cotton wipe do not come apart when soaked in water for a long time, that contributes to the durability and stability of the device. In the working process, the cotton wipe pumps the bulk water towards the heating surface through the 4 strips around the floating foam relying on its strong capillary wicking effect. The bottom layer is the thermal insulation wrapped with the cotton water path. The thermal insulation is made from PVC foam with only closed pores which are impermeable to water, and its low thermal conductivity (\~0.03 W m\(^{-1}\) K\(^{-1}\)) almost reduces the downward thermal dissipation from the evaporation surface. Thanks to the low density of the thermal insulation and the simple structure of the whole device, the evaporation device can be placed on the water and move together with the waving water surface achieving self-floating for continuous operation. The surface wettability of the evaporation device also plays an important role in the steam generation process. As shown in Fig. [\[fig:device_wet_salt\]](#fig:device_wet_salt){reference-type="ref" reference="fig:device_wet_salt"}b, the evaporation device is placed in a beaker filled with DI water at the initial temperature of 21\(^\circ\)C, and its wetting process is recorded from the top view. It is obvious that the water immediately reaches the surface of the absorber layer from the regional edge (the enclosed areas in the blue dashed), and then the wet area quickly expands to the central area until it covers the entire evaporation surface. The surface wettability owes much to forceful hydrophilicity of the two-dimensional water path of the cotton and the porous structure of the absorber layer, which assures ample water supply to the evaporation surface. Avoiding salt accumulating in the evaporation device remains a significant character for a self-floating solar evaporation structure utilizing heat localization. Figure [\[fig:device_wet_salt\]](#fig:device_wet_salt){reference-type="ref" reference="fig:device_wet_salt"}c shows the progression of salt dissolution which demonstrates the salt rejection ability of the three-layer device. In this experiment, a three-layer structure with a diameter of 47 mm floated in a 100 ml beaker of 132g 3.5 wt% NaCl solution with 21\(^\circ\)C initial temperature, and 1.7g of additional solid NaCl is placed directly on the top of the absorber surface. Upon contact with water, the solid NaCl on top starts to dissolve due to the movement and exchange of solution inside the absorber layer and two-dimensional water path between the device surface and the bulk water below the insulation. After approximately 65 minutes, the three-layer device fully rejects the salt, that indicates its good salt rejection ability. The steam generation ability of the evaporation device at a laboratory scale is tested combining an irradiation system to simulate the solar radiation, a weighing system monitoring the mass change of water in a beaker during a certain period of irradiation, and an infrared camera monitoring the real-time temperature. Both 3.5 wt% NaCl solution and DI water are prepared to keep the initial temperature at 21\(^\circ\)C in the 100 ml beakers. The evaporation device floated on water in the beaker filled with 127g of water, beneath the beaker is an electronic balance connected to the computer, and the simulated solar radiation was provided by a solar simulator. When the illumination began, the solar steam generation is determined by the balance, and the real-time temperature of the absorber sheet and water surface are monitored by an infrared camera. The laboratory temperature and humidity are kept at about 22\(^\circ\)C and 21%, respectively. Figure [\[fig:lab_experiment\]](#fig:lab_experiment){reference-type="ref" reference="fig:lab_experiment"} compares the surface temperatures of pure water and 3.5 wt% NaCl solution with and without the evaporation device under 1 sun illumination. The temperature data and images are captured by an infrared camera. Figure [\[fig:lab_experiment\]](#fig:lab_experiment){reference-type="ref" reference="fig:lab_experiment"}a shows the surface temperature distribution of the beaker filled with water without the evaporation device over the irradiation time. The surface temperature rises slowly under irradiation owing to the poor light harvesting efficiency and its maximum temperature profile shown in Fig. [\[fig:lab_experiment\]](#fig:lab_experiment){reference-type="ref" reference="fig:lab_experiment"}d slopes gently from the initial temperature of 21\(^\circ\)C to 32\(^\circ\)C for an hour. In contrast, upon light illumination, the temperature of the absorber layer rises sharply to an equilibrium temperature around 50\(^\circ\)C, indicating good photothermal performance. As shown in Fig. [\[fig:lab_experiment\]](#fig:lab_experiment){reference-type="ref" reference="fig:lab_experiment"}c, for the water only experiment, the steam generation rate is measured to be 0.41 kg m\(^{-2}\) h\(^{-1}\) under 1 sun irradiation (1 kW m\(^{-2}\)). In contrast, the steam generation rate of evaporation device in DI water reaches up to 2.48 kg m\(^{-2}\) h\(^{-1}\) under the same experimental conditions, 6.04 times higher than that of pure water. Most significantly, when the evaporation device floats on 3.5 wt% NaCl solution, it sports a comparable steam generation rate of 2.32 kg m\(^{-2}\) h\(^{-1}\), 5.65 times higher than that of pure water. Evaporation efficiency, \(\eta_{evap}\) = \(\Dot{m}h_{fg}\)/\(Q_{s}\), is an important parameter to evaluate the steam generation performance, where \(\Dot{m}\) is the water evaporation rate (kg m\(^{-2}\) h\(^{-1}\)), \(Q_{s}\) is the power density of irradiation (kW m\(^{-2}\)), and \(h_{fg}\) is the total enthalpy of vaporization of water (kJ kg\(^{-1}\)). In particular, \(h_{fg}\) is regarded as the sum of the sensible heat (121.26 kJ kg\(^{-1}\)) and the temperature-dependent enthalpy of vaporization (2382.7 kJ kg\(^{-1}\)) in this text. Thus, we obtain \(\eta_{evap}\) = 172.5% under 1 sun illumination. More detailed calculation of the evaporation efficiency and the photothermal efficiency are provided in the supplementary materials. # Field Test We have performed field test of this evaporation device to demonstrate the feasibility of scalable production of freshwater. We constructed a prototype of the evaporation system with a condensation chamber and an evaporation device of a large area of the absorber (24 cm \(\times\) 24 cm ) inside, as shown in Figs. [\[fig:outdoor_1\]](#fig:outdoor_1){reference-type="ref" reference="fig:outdoor_1"}a and S3. The condensation chamber made of Polymethyl methacrylate (PMMA) board surrounds the entire evaporation device to capture condensate of the evaporated steam. According to the transmission spectrum of the PMMA board, shown in Fig. S4, the condensation structure is well transparent in the solar spectrum to allow the solar irradiance to reach the evaporation device, while it is opaque in the mid-infrared region to confine the infrared emission of the evaporation device inside the chamber to contribute to maintaining a relatively higher evaporation temperature. As shown in Fig. [\[fig:outdoor_1\]](#fig:outdoor_1){reference-type="ref" reference="fig:outdoor_1"}b, the tilted angle of the condensation cover in the dimension of 30 cm \(\times\) 30 cm is fixed to be 32\(^\circ\) considering the latitude of Boston city, allowing the solar flux to reach the evaporator without refraction. The photograph of Fig. [\[fig:outdoor_1\]](#fig:outdoor_1){reference-type="ref" reference="fig:outdoor_1"}c shows the prototype is placed on the polystyrene foam with a low thermal conductivity to reduce the thermal flux between the bottom of the prototype and the utility cart, and the condensed water is observed on the condensation cover (Fig. S5). The condensed water droplets fall to the collection tank and eventually flow to a chemical storage bottle. It has been confirmed that the sodium concentration of the desalinated water is 5 mg l\(^{-1}\), that is much lower than the standard of the drinkable water specified by the World Health Organization (WHO). The validated prototype is tested on the roof of Snell Engineering Center at Northeastern University, Boston, MA, USA, and water collections are measured over 5 days in January 2020. The specific experiment dates, instantaneous incident sunlight, ambient temperature, wind speed, and humidity are recorded and provided in the supplementary materials. The 3.5 wt% NaCl solution, which simulates the average salinity of seawater all over the world, is used during the field test and the seawater holder is filled up through the water injection tube after the daily use. The average evaporation rate of drinkable freshwater, shown in Fig. [\[fig:outdoor_1\]](#fig:outdoor_1){reference-type="ref" reference="fig:outdoor_1"}e, varies from 0.32 kg m\(^{-2}\) h\(^{-1}\) to 0.47 kg m\(^{-2}\) h\(^{-1}\) under various solar intensity and ambient temperature. The experiment data and detailed weather condition data are provided in Figs. S6 and S7. To demonstrate the promising solar steam generation ability of this evaporation system, the prototype, and the control group, the same condensation chamber without a three-layer evaporation device inside is conducted for a contrast experiment on day 5 (Fig. [\[fig:outdoor_1\]](#fig:outdoor_1){reference-type="ref" reference="fig:outdoor_1"}d). At the end of the experiment, 164g of water is collected from the prototype, while the control group collects nearly zero water in the same-day operation. In the rooftop experiments, it is well noted that the weight of collected freshwater refers to the weight of water in the chemical storage bottle, not exactly the weight of condensed water produced. The inset of Fig. [\[fig:outdoor_1\]](#fig:outdoor_1){reference-type="ref" reference="fig:outdoor_1"}d shows the end state of the contrast experiment. Obviously in the control group, dense condensed water droplets can be observed on the cover without forming the water dripping flow (Fig. S8). In day 4, the daily condensate rate (2.83 kg m\(^{-2}\) d\(^{-1}\)) in winter produced from the evaporation device of the area of 0.0576 m\(^{-2}\) is comparable to a previous work (2.81 kg m\(^{-2}\) d\(^{-1}\)) in the summer, which proves a reliable and scalable production of freshwater using our design in four seasons. # Conclusions We have demonstrated a high-performance, low cost, and simple interfacial three-layer steam generation device based on the novel commercial Black 3.0 paint, which is first applied to the solar steam generation as a promising candidate for the photothermal materials. Black 3.0 paint sprayed on a sheet of MF serves as the top solar absorber layer that can widely absorb the solar radiation and efficiently convert it into heat. The absorber layer which is placed on a PVC foam plane under 1 sun irradiation shows a significant temperature gradient and reaches up to 100\(^\circ\)C of equilibrium temperature. The absorber is shown to sport strong thermal and chemical stabilities under harsh environment, and it exhibits a remarkable salt rejection ability. All these performance contribute to the long-term durable steam generation process. In the laboratory experiments, enabled by the assistance of the low thermal conductivity PVC foam to reduce the heat loss and the cotton wipe to provide sufficient water through two-dimensional water path to the heating region, the evaporation device has reached a striking steam generation rate of 2.48 kg m\(^{-2}\) h\(^{-1}\), 6 times higher than the natural evaporation, and a highlighted evaporation efficiency of 172.5% under 1 sun irradiation at the room temperature, surpassing most of the reported works. Even in the rooftop experiments during a cloudy winter day in Boston, MA with the maximum environment temperature of 4\(^\circ\)C, 2.83 kg m\(^{-2}\) d\(^{-1}\) of water can be collected. This simple, low cost, and easy to manufacture evaporation device is highly beneficial to large scale water desalination and purification applications. # Experimental section ## Materials The commercial MF is purchased from South Street Designs company (UPC: 089902974060) with the dimension of 10 cm \(\times\) 6 cm \(\times\) 2 cm (\\(0.3/piece). Black 3.0 paint is purchased on the Culture Hustle (\\)0.146/ml). Webril pure cotton wipe is in the size of 0.2 m \(\times\) 0.2 m (\\(2.99/m\)^{2}\(). The PVC foam insulator sheet is purchased from the McMaster-Carr with the dimension of 813 mm \)\times\( 1219 mm \)\times\( 13 mm (\\)58.7/m\(^{2}\)). ## Sample preparation Solar absorber layer is fabricated as follows: pristine MF is thoroughly washed several times with ethanol and deionized (DI) water and then put in an oven kept at 60\(^\circ\)C in preparation for the hot-pressing treatment. After it is totally dried, the MF is pressed at 200\(^\circ\)C for 6 minutes with a compression ratio of 4, which is the height ratio of pristine MF to hot-pressed one. Serving as the skeleton of the absorber, hot-pressed MF is cut into the desired shape with a thickness of about 1 mm. Black 3.0 paint is thinned with DI water under vigorous stirring for 5 minutes with a paintbrush, which helps to get a homogeneous mixture. The mass ratio of DI water to Black 3.0 paint is kept in the range of 0.35 \(\sim\) 0.4 in the dilution process. Subsequently, the diluted Black 3.0 paint is sprayed onto the MF sheet by a touch-up spray gun (Paasche Airbrush, USA) with a 0.8 mm spray head at the pressure of 70 psi. The distance between the spray head and the MF sheet is about 25 cm. The golden rule is that 3 or 4 thin layers is much better than a single thick layer. And then dry it between each spraying with the hot air blower (Yihua Electronic Equipment Co., Ltd, Guangzhou, China) at a temperature of 190\(^\circ\)C for 5 minutes. It's worth noting that this drying time is suitable for the specific dimension of the sample in this work. A piece of PVC foam (47 mm in diameter and 13 mm in thickness) is utilized as the thermal insulator. Webril pure cotton wipe is cut into a 47 mm circle with four extended strips of 30 mm in width and 20 mm in length. The hydrophilic cotton wipe wrapped around the PVC foam with the four strips tip soaking in the bulk water ensures that the water reaches the upper circular area due to capillary force. Then, the MF sheet is placed over the circular area of the cotton wipe. ## Solar steam generation experiments The steam generation experiments in the lab are carried out under a solar simulator (Newport, 94081A, class ABB) which supplies solar flux of 1 kW m\(^{-2}\) with an optical filter for the standard AM 1.5 G spectrum. 127g of DI water and seawater (3.5 wt% NaCl) are prepared at the same initial temperature of 21\(^\circ\)C and placed in the 100 ml beakers with a mouth diameter of 50 mm. The steam generation device is floated on the solution surface and the mass of water is accurately monitored by an electric balance (RADWAG, PS 1000.X2.NTEP) connected to a computer for recording the real-time mass change. The real-time temperature is monitored by an infrared radiation camera (FLIR, A655sc). ## Materials characterizations The microscope images are obtained by using Metallurgical Microscope (AmScope, ME520TC-18M3) in the darkfield mode. The reflectivity spectra (UV-Visible-Near-infrared range: 200 nm \(\sim\) 2500 nm) are measured by the Jasco V770 spectrophotometer at an incident angle of 6\(^\circ\) with the ISN-923 60 mm BaSO\(_4\) based integrating sphere equipped with PMT and PbS detectors. The reflectivity spectra are normalized by a PTFE based reflectance standard. The transmittance spectra (Mid-infrared region: 2.5 \(\mu\)m \(\sim\) 20 \(\mu\)m) are measured by the Jasco FTIR 6600 spectrometer at a normal incident angle with reference to the background spectrum of a hydraulic pressed KBr film (20 psi). The Extech EC400 ExStik salinity meter is utilized to characterized the water quality of the collected water samples.
{'timestamp': '2020-06-30T02:34:00', 'yymm': '2005', 'arxiv_id': '2005.14280', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14280'}
null
null
# Introduction In this paper we explore the novel concept of deficiency. Deficiency is a characteristic unique to signed graphs from which arises a multitude of interesting questions, many of which are yet unanswered. A *signed graph* is a graph in which every edge has an associated sign. We write a signed graph \(\Sigma\) as the triple \((V, E, \sigma)\) where \(V\) is the vertex set, \(E\) is the edge set, and \(\sigma: E \to \{+,-\}\) is the *signature*. Our graphs are *signed simple graphs*: no loops and no multiple edges. We define signed-graph coloring as in, and chromatic number as in. A *proper coloration* of a signed graph \(\Sigma\) is a function, \(\kappa: V \to \{\pm1, \pm 2, \ldots, \allowbreak \pm k, 0\},\) such that for any edge \(e_{ab} \in E\), \(\kappa(a) \neq \sigma(e) \kappa(b).\) The *chromatic number* of \(\Sigma\), written \(\chi(\Sigma)\), is the size of the smallest set of colors which can be used to properly color \(\Sigma.\) A graph with chromatic number \(k\) is called *k-chromatic*. A coloration is *minimal* if it is proper and uses a set of colors of size \(\chi(\Sigma).\) If \(\chi = 2k,\) then a minimal *color set* is \(\{\pm1, \pm2, \ldots, \pm k\},\) and if \(\chi = 2k+1,\) then a minimal color set is \(\{\pm1, \pm2, \ldots, \pm k, 0\}.\) If \(\chi = 2k+1\), there must be at least one vertex colored 0 in every minimal coloration. The *deficiency* of a coloration, \(\operatorname{def}(\kappa)\), is the number of unused colors from the color set of \(\kappa.\) The *deficiency set*, \(\operatorname{D}(\kappa)\), is the set of unused colors. In depictions of signed graphs we use solid lines for positive edges and dashed lines for negative edges. In Figure [\[deficiency example\]](#deficiency example){reference-type="ref" reference="deficiency example"} the coloration on the left has deficiency 0 while the coloration on the right has deficiency 1. The deficiency set of the coloration on the right is \(\{-1\}.\) The *maximum deficiency* of a graph, \(\operatorname{M}(\Sigma)\), is \(\max\{\operatorname{def}(\kappa) \mid \kappa\) is a minimal proper coloration of \(\Sigma \}.\) The *minimum deficiency*, \(\operatorname{m}(\Sigma)\), is \(\min\{\operatorname{def}(\kappa) \mid \kappa\) is a minimal proper coloration of \(\Sigma\}.\) The *deficiency range* of a graph, \(\mathcal{L}(\Sigma)\), is \(\{\operatorname{def}(\kappa) \mid \kappa\) s a minimal proper coloration of \(\Sigma\}.\) The concept of deficiency arose when considering the chromatic number of joins of signed graphs. When considering the broad question of possible deficiencies of a signed graph, it makes sense to first focus on the maximum and minimum deficiencies. The simplest difficult case is that of 3-chromatic signed graphs. There are four decision problems about the maximum and minimum deficiencies of a 3-chromatic signed graph, where deficiency can only be 0 or 1. 1. Is the minimum deficiency 0? 2. Is the maximum deficiency 1? 3. Is the minimum deficiency 1? 4. Is the maximum deficiency 0? Questions 1 and 2 are clearly in class NP. Questions 3 and 4, on the other hand, are neither obviously in nor not in class NP. Furthermore, if the answer to either question 3 or 4 is \"yes,\" then questions 1 and 2 are also solved. The main result of this paper is to show that questions 2 and 4 are both in class P by providing a polynomial-time algorithm for deciding the maximum deficiency of a 3-chromatic graph. # Introductory Results We leave the proof of Theorem [\[2-chromatic\]](#2-chromatic){reference-type="ref" reference="2-chromatic"} to the reader. A subset of the vertices, \(A \subseteq V\), is *stable* if the subgraph induced by \(A\) contains no edges. # Maximum Deficiency Algorithm {#s4.1} A *directed graph* is a pair \(G = (V,A)\) where \(V\) is the vertex set and \(A\) is the multi-set of *directed edges* consisting of ordered pairs of vertices. A *cycle* is a directed path that starts and ends at the same vertex. The *outdegree* of a vertex, the *indegree* of a vertex, the minimum and maximum outdegree, and the minimum and maximum indegree are written \(\delta^+(v),\) \(\delta^-(v),\) \(\delta^+(G),\) \(\Delta^+(G)\), \(\delta^-(G)\) and \(\Delta^-(G)\), respectively. Before presenting the maximum deficiency algorithm, we rephrase Proposition [\[bipartite and stable\]](#bipartite and stable){reference-type="ref" reference="bipartite and stable"} to give an alternate way to think about maximum deficiency of a 3-chromatic signed graph. A *vertex cover* of \(F\) is a set of vertices of \(\Sigma\) such that every edge in \(F\) is incident with at least one vertex in the set. For \(\alpha \in \{+,-\}\) we use the following two notations to represent specific subsets of the edge and vertex sets: \(E^\alpha = \{e \in E \mid \sigma(e) = \alpha\}\) and \(V^\alpha = \{v \in V \mid \text{there exists an edge of sign \)\alpha\( incident with } v\}.\) ## MaxDef Given a 3-chromatic, not necessarily simple, signed graph, \(\Sigma,\) we provide an algorithm that decides whether the maximum deficiency of \(\Sigma\) is 1 or 0. We call the algorithm MaxDef. We provide a worked example of MaxDef in section [3.2](#ss4.2.3){reference-type="ref" reference="ss4.2.3"}. The input for MaxDef is a 3-chromatic signed graph. We assume the graph is input as a pair of adjacency lists; one array of lists contains a list of the positive adjacencies for each vertex, and the other array of lists does the same for the negative adjacencies. Note that there must be at least one positive edge because the graph is 3-chromatic. The output of MaxDef is the maximum deficiency of the graph, either a 0 or a 1, along with a stable vertex cover of \(E^+\) if the maximum deficiency is 1. We build a partial stable cover throughout this process and end either in the creation of a stable cover of \(E^+\) or in the non-existence of such a cover. In order to produce a stable cover, if one exists, we store recovery information about the identification of vertices. We use the symbol \(\rightarrow\) to indicate replacement. For example, \(A \cup B \rightarrow A\) means replace object \(A\) with object \(A \cup B.\) We use \(N_-(v)\) to indicate the set of vertices of \(\Sigma\) that are negatively adjacent to \(v.\) Let \(S\) be the partial stable cover, starting with \(S = \emptyset.\) Let \(B\) be a list of vertices that are forbidden from being in \(S,\) starting with \(B = \emptyset.\) **Step 1:** Delete all vertices of \(\Sigma\) not in \(V^+.\) Every vertex incident to only negative edges does not affect the existence of a stable cover of \(E^+\), and therefore, by Lemma [\[vertex cover\]](#vertex cover){reference-type="ref" reference="vertex cover"}, the existence of a deficiency-1 coloration. Call this set of vertices \(A.\) Then let \(\Sigma_{01} = \Sigma \setminus A.\) **Step 2:** Let \(H_1, H_2, \ldots, H_r\) be the connected components of \(\Sigma^+_{01}\). For each connected component of \(\Sigma^+_{01},\) check to see if it is bipartite. If \(H_i\) is not bipartite, then \(\operatorname{M}(\Sigma_{01}) = 0\) and thus, \(\operatorname{M}(\Sigma) = 0\) and the algorithm ends here. If \(H_i\) is bipartite, let its unique vertex bipartition have parts \(A_i\) and \(B_i\). Start to create a new graph from \(\Sigma_{01}\) by collapsing \(A_i\) to a vertex \(a_i\) and each \(B_i\) to a vertex \(b_i\) and eliminating multiple edges of the same sign. This makes \(H_i\) into a positive edge with endpoints \(a_i\) and \(b_i.\) If there exists a negative edge \(a_ib_i\), delete it. If all \(H_i\) are bipartite, then at the end of Step 2 we have a flattened graph, call it \(\Sigma_{02}\), composed of a positive perfect matching with all other edges negative. For a matched pair \((a_i, b_i)\) we use \(x_i\) to represent one vertex of the pair and \(\bar x_i\) to represent the other. Steps 1 and 2 are executed only once during the algorithm. The remainder of the steps are part of a recursive process and may be executed multiple times. Let \(\Sigma_1 = \Sigma_{02}.\) **Step 3:** Look for an \(i\) such that \(x_i\) and \(\bar{x}_i\) are both in \(B.\) If such an \(i\) exists, then \(\operatorname{M}(\Sigma) = 0.\) If no such \(i\) exists, then continue to Step 4. **Step 4:** Look for an \(i\) such that \(x_i\) is in \(B.\) If such an \(i\) exists, then \(S \cup \{\bar x_i\} \rightarrow S,\) \((B \cup N_-(\bar x_i)) \setminus \{x_i\} \rightarrow B,\) and \(\Sigma_1 \setminus \{x_i, \bar x_i\} \rightarrow \Sigma_1.\) Return to Step 3. If no such \(i\) exists, then continue to Step 5. **Step 5:** Look for an \(i\) such that \(x_i\) and \(\bar x_i\) both have loops. If such an \(i\) exists, then \(\operatorname{M}(\Sigma) = 0.\) If no such \(i\) exists, continue to Step 6. **Step 6:** Look for an \(i\) such that \(x_i\) has a loop. If such an \(i\) exists, then \(S \cup \{\bar x_i \} \rightarrow S,\) \(B \cup N_-(\bar x_i) \rightarrow B\), and \(\Sigma_1 \setminus \{x_i, \bar x_i\} \rightarrow \Sigma_1.\) Return to Step 3. If no such \(i\) exists, continue to Step 7. **Step 7:** Look for an \(i\) such that \(x_i\) is adjacent to both \(x_j\) and \(\bar x_j\). If such an \(i\) exists, then \(S \cup \{\bar x_i\} \rightarrow S,\) \(B \cup N_-(\bar x_i) \rightarrow B,\) and \(\Sigma_1 \setminus \{x_i, \bar x_i\} \rightarrow \Sigma_1.\) Return to Step 3. If no such \(i\) exists, then continue to Step 8. **Step 8:** Look for an \(i\) and \(j,\) \(i \neq j,\) such that \(x_i\) is adjacent to \(x_j\) and \(\bar x_i\) is adjacent to \(\bar x_j\). If such an \(i\) and \(j\) exist, then identify vertex \(x_i\) to \(\bar x_j\), and vertex \(\bar x_i\) to \(x_j.\) We are identifying vertices that must always be in a stable cover together. So \(\Sigma_1\) (with the above stated identifications) \(\rightarrow \Sigma_1.\) Delete negative edge \(x_i \bar x_i\), and return to Step 3. If no such \(i\) and \(j\) exist, then continue to Step 9. **Step 9:** Look for a vertex of degree one. If there exists such a vertex, call it \(x_i,\) then \(S \cup \{x_i\} \rightarrow S,\) \(B \cup N_-(x_i) \rightarrow B,\) and \(\Sigma_1 \setminus \{x_i, \bar x_i\} \rightarrow \Sigma_1.\) If both \(x_i\) and \(\bar x_i\) are vertices of degree 1, then we only place one into \(S\); it doesn't matter which one. Return to Step 3. If no such vertex exists, then continue to Step 10. Step 9 is the only step where the vertex we add to \(S\) is not a forced addition. We show that we can add it to \(S\) without affecting the 0/1 outcome of MaxDef. **Step 10:** If \(\Sigma_1\) is the empty graph, then \(\operatorname{M}(\Sigma) = 1.\) Use the recovery information to produce a stable cover of \(E^+\). If \(\Sigma_1\) is not the empty graph, then continue to Step 11. Upon reaching Step 11, \(\Sigma_1\) is simple, is composed of a positive perfect matching with all other edges negative, contains no loops and no vertices of degree 1, and has at most one edge between every two matched pairs \((a_i, b_i)\) and \((a_j, b_j).\) **Step 11:** Create the *forcing graph* of \(\Sigma_1\), called \(F(\Sigma_1)\). We define \(F(\Sigma_1)\) as a directed graph with \(V = V_1\) and \(E = \{x_ix_j \mid x_i\bar x_j \in E_1^-\}.\) Every edge in \(F(\Sigma_1)\) represents a forced decision about which vertices of \(\Sigma_1\) must appear together in every stable cover of \(E^+_1.\) For example, if \(x_ix_j \in E\), then \(x_i\bar x_j \in E_1^-\). This means that if \(x_i\) is in a stable cover of \(E^+_1\), then \(\bar x_j\) cannot be, and so \(x_j\) must also be in the stable cover. Observe that \(x_ix_j \in E\) if and only if \(\bar x_j\bar x_i \in E.\) Also, \(\delta_+(F(\Sigma_1)) \geq 1,\) because there are no vertices of degree one in \(\Sigma_1.\) Thus, there must exist a cycle in \(F(\Sigma_1).\) By our first observation, there must in fact be two cycles, possibly not disjoint; if one cycle uses vertices \(x_1, \ldots, x_r,\) then the other must use vertices \(\bar x_1, \ldots, \bar x_r.\) Choosing a single vertex for the stable cover from a cycle forces the rest of the vertices in the cycle to also be chosen. **Step 12:** If the cycles found in Step 11 are not disjoint, then \(\operatorname{M}(\Sigma) = 0.\) If they are, identify the vertices of \(\Sigma_1\) that belong to each of the cycles from the pair found in Step 11. Eliminate multiple edges of the same sign and delete any negative \(x_i \bar x_i\) edge. Then \(\Sigma_1\) (with the above identifications) \(\rightarrow \Sigma_1\) and return to Step 3. This ends the MaxDef algorithm. ## Example of MaxDef {#ss4.2.3} Let the following graph be our original \(\Sigma.\) We start with \(S = \emptyset,\) \(B = \emptyset,\) and a recovery array \(R = \emptyset.\) Because \(\Sigma\) is composed of a positive perfect matching with all other edges negative we skip Steps 1 and 2. At this point \(\Sigma_1 = \Sigma\), \(S = \emptyset, B = \emptyset,\) and \(R\) has an empty list for each vertex. **Step 8:** Using Step 8 we can identify vertices \(b_6\) and \(b_{7}\), calling this vertex \(b_6\) and vertices \(a_6\) and \(a_{7},\) calling this vertex \(a_6.\) We update \(R\) to get the table below. \(a_1\) \(b_1\) \(a_2\) \(b_2\) \(a_3\) \(b_3\) \(a_4\) \(b_4\) \(a_5\) \(b_5\) \(a_6\) \(b_6\) -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- ----------- ----------- -- -- \(\{\}\) \(\{\}\) \(\{\}\) \(\{\}\) \(\{\}\) \(\{\}\) \(\{\}\) \(\{\}\) \(\{\}\) \(\{\}\) \(\{a_7\}\) \(\{b_7\}\) **Step 9:** Vertex \(a_6\) has degree one, so we update \(S\) to be \(S = \{a_6\}.\) **Step 11:** Consider the forcing graph of \(\Sigma_1.\) **Step 12:** Identify the vertices, \(a_1, b_2, a_3,\) and \(b_4,\) and call this vertex \(a_1.\) Identify the vertices, \(a_4, b_3, a_2,\) and \(b_1,\) and call this vertex \(b_1.\) Our recovery array is updated to be the following: \(a_1\) \(b_1\) \(a_5\) \(b_5\) \(a_6\) \(b_6\) ------------------- ------------------- -------- -------- ----------- ----------- \(\{b_2,a_3,b_4\}\) \(\{a_2,b_3,a_4\}\) \(\{\}\) \(\{\}\) \(\{a_7\}\) \(\{b_7\}\) **Step 6:** Vertex \(b_1\) must be in every stable cover since its matched partner has a loop. Now \(S = \{a_6, b_1\}\) and \(B = \{b_5\}.\) **Step 4:** Vertex \(b_5\) is in \(B\). Thus, by Step 4, vertex \(a_5\) must be in \(S.\) So \(S = \{a_6, b_1, a_5\}\) and \(B = \emptyset.\) **Step 10:** Our graph has no more vertices. Thus, \(\operatorname{M}(\Sigma) = 1\). If we use \(R\) to expand the vertices of \(S\) into their original pre-identified vertices we get \(S = \{a_6, b_1, a_5\} = \{a_6, a_7, a_4, b_3, a_2, b_1, a_5\}.\) Figure [\[stable cover\]](#stable cover){reference-type="ref" reference="stable cover"} shows the resulting stable cover of \(E^+\). # Complexity ## Data Format Our algorithm requires five different objects to be stored. First, we store the signed graph using adjacency lists. The adjacency lists will be two arrays of lists, one for positive edges and one for negative edges. Since each edge of \(\Sigma\) appears twice in these arrays, the size of these adjacency lists is at its largest \(2E.\) After Step 2, we no longer need the positive adjacency lists and stop updating them. Second, we need to store the current forcing graph adjacency lists. Every negative edge in our signed graph gives rise to two directed edges. Therefore the size of these adjacency lists is at its largest \(2E^-.\) Third, we need to store the partial stable set \(S\). This is stored simply as a list of size at most \(\frac{1}{2}V.\) Fourth, we need a list of vertices forbidden from the partial stable set \(S.\) This is stored simply as a list of size at most \(V-1\). Finally, we store recovery information in order to produce a stable cover of the original graph if the maximum deficiency is 1. The recovery information is stored as an array of lists, one list for each group of identified vertices, and has size at most \(V\). ## Time Complexity ### Updating Lists Suppose vertex \(x_i\) is added to the partial stable set. Then the sets \(S\) and \(B\) and the adjacency lists of our current version of \(\Sigma\) need to be updated. This happens in several steps of the algorithm, so we calculate the time complexity of updating these three objects separately. In order to update \(S,\) we simply append element \(x_i\) to \(S.\) This takes constant time. We update the adjacency lists and \(B\) together. We look through the negative adjacency lists for both \(x_i\) and \(\bar x_i.\) Looking through the lists takes time \(\mathcal O(E^-).\) We delete every occurrence of \(\bar x_i.\) We need to delete vertex \(\bar x_i\) at most \(V-1\) times so deleting \(\bar x_i\) from the adjacency lists takes time \(\mathcal O(V).\) We delete every occurrence of \(x_i\) and add the vertices in whose lists \(x_i\) appeared to \(B\). Since we need to delete \(x_i\) at most \(V-1\) times, the time complexity of deleting and updating \(B\) is \(\mathcal O(V).\) Finally, we need to possibly delete vertex \(\bar x_i\) from \(B.\) This requires looking through \(B\), which takes time \(\mathcal O(V),\) and then removing \(\bar x_i\) if it appears, which takes constant time. Therefore, the total time complexity for updating all three objects is \(\mathcal O(V + E^-).\) ### Steps 1 Through 12 **Step 1:** We find vertices that are not in \(V^+\) by looking for empty lists in the positive edge adjacency lists. Finding these vertices takes time \(\mathcal O(V).\) In order to delete vertices from \(\Sigma,\) we first remove the lists associated with those vertices. Deleting a list takes constant time and we delete at most \(V-2\) lists; thus, deleting the full lists takes time \(\mathcal O(V).\) We then delete any appearance of the vertices themselves in an adjacency list. Since the vertices being deleted only have negative edges, and there are at worst \(V-2\) vertices being deleted, the time complexity is \(\mathcal O(VE^-).\) Therefore the total time complexity for Step 1 is \(\mathcal O(VE^-).\) **Step 2:** In order to decide whether a given \(H_i\) is bipartite, we can employ a depth-first search (DFS) algorithm. The DFS algorithm assigns a color to a vertex that is different than the color of its parent in the depth-first search tree. For an \(H_i\) with \(s\) vertices and \(t\) edges, this algorithm takes time \(\mathcal O(s + t),\). Therefore, checking all of the \(H_i\) gives us a total time complexity of \(\mathcal O(V + E^+).\) To collapse an \(H_i\), we use the bipartition \(A_i,\) \(B_i\) from the DFS algorithm. Suppose \(A_i\) is composed of vertices \(v_1, \ldots, v_r\) and \(B_i\) is composed of vertices \(v_{r+1}, \ldots, v_{r+s}.\) Then we create a list for \(a_i\) and a list for \(b_i\) by moving every element in the negative adjacency lists of vertices \(v_1, \ldots, v_r\) to the negative adjacency list for \(a_i\) and every element in the negative adjacency lists of vertices \(v_{r+1}, \ldots, v_{r+s}\) to the negative adjacency list for \(b_i.\) Moving an element takes constant time, and we do it at most \(2E^-\) times. We delete the negative edge \(a_ib_i,\) if it exists, and remove duplicate elements from the \(a_i\) and \(b_i\) lists. This requires looking though the lists at most \(2E^-\) times, once for each element of the lists, for a total time complexity of \(\mathcal O((E^-)^2).\) Finally, we initialize the recovery array with enough positions for each \(a_i\) and \(b_i\), then add the lists for two new elements, one for vertex \(a_i\) and one for vertex \(b_i.\) Because each \(H_i\) results in two lists for the recovery array, we put the list of vertices from \(A_i\) in position \(2i-1\) and the list of vertices from \(B_i\) in position \(2i.\) This takes constant time. Thus, collapsing one \(H_i\) takes time \(\mathcal O((E^-)^2).\) We must do this process at most \(V/2\) times, as each \(H_i\) has at least 2 vertices. Thus, the entire collapsing process takes time \(\mathcal O(V(E^-)^2).\) Therefore, the total time complexity of Step 2 is \(\mathcal O(V(E^-)^2 + V + E^+).\) **Step 3:** We look through \(B\) once for each element of \(B\). Thus, Step 3 takes time \(\mathcal O(V^2).\) **Step 4:** We check to see if \(B\) is empty; this takes constant time. If \(B\) is not empty, we add a new vertex to \(S\) and update the various lists. As shown above, updating the lists is of time complexity \(\mathcal O(V + E^-).\) Therefore, Step 4 takes time \(\mathcal O(V + E^-).\) **Step 5:** We look through the negative adjacency lists to find a matched pair of lists that both contain their own vertex. This takes time \(\mathcal O(E^-).\) **Step 6:** We look through the negative adjacency lists to find a list that contains its own vertex. This has time complexity \(\mathcal O(E^-).\) If we find such a vertex, we must update the lists; this takes time \(\mathcal O(V + E^-).\) Therefore, the total time complexity of Step 6 is \(\mathcal O(V + E^-).\) **Step 7:** We look through each negative adjacency list to see if it contains an \(x_i, \bar x_i\) pair. This takes time \(\mathcal O(V^2)\). Since we must do this for each vertex, the total time complexity for checking the lists is \(\mathcal O(V^3).\) Then we must update the various lists, taking time \(\mathcal(V + E^-).\) Therefore, the total time complexity of Step 7 is \(\mathcal O(V^3 + E^-).\) **Step 8:** We look through the negative adjacency lists once for each element of the negative adjacency lists. Thus, the time complexity of finding such vertices is \(\mathcal O((E^-)^2).\) If we find such vertices, we must identify them. Suppose we are identifying vertices \(x_i\) and \(\bar x_j\) and vertices \(\bar x_i\) and \(x_j.\) We describe the process for identifying \(x_i\) and \(\bar x_j.\) Without loss of generality, assume \(i < j.\) First, we combine the negative adjacency lists for \(x_i\) and \(\bar x_j.\) Concatenating the two lists takes time at most \(\mathcal O(V)\). We then need to delete edge \(x_i \bar x_i\) and remove duplicate elements from the newly combined lists, which as shown in Step 2 of this proof takes time \(\mathcal O((E^-)^2).\) Second, we change every occurrence of \(\bar x_j\) in an adjacency list to \(x_i.\) Changing the element takes constant time, and looking through the adjacency lists has time complexity \(\mathcal O(E^-).\) Finally, we update the recovery information. This requires concatenating the \(\bar x_j\) list to the \(x_i\) list, and removing the \(\bar x_j\) list. Concatenating takes time at most \(\mathcal O(V)\), and deleting the \(\bar x_i\) list takes constant time. Therefore, identifying vertex \(x_i\) to vertex \(\bar x_j\) has total time complexity \(\mathcal O((V + E^-)^2).\) We must do this process twice, once for each identification. Therefore, Step 8 has total time complexity of \(\mathcal O(V + (E^-)^2).\) **Step 9:** This step again requires looking through the negative adjacency lists and then updating. Therefore, the time complexity of Step 9 is \(\mathcal O(V + E^-).\) **Step 10:** This step requires looking through the negative adjacency lists, so takes time \(\mathcal O(E^-).\) If the current version of \(\Sigma\) is empty, we use the recovery information to produce a stable cover of the original graph. This requires looking through \(S,\) and then for each element of \(S\), looking through the recovery array. Since \(S\) is size at most \(\frac{1}{2}V\) and the recovery array is size at most \(V,\) producing a stable cover takes time \(\mathcal O(V^2).\) Therefore, Step 10 takes time \(\mathcal O(V^2 + E^-).\) **Step 11:** To create the forcing graph, we must look through the negative adjacency lists and create a new set of adjacency lists. For every endpoint \(x_i\) in the adjacency list of vertex \(v_1\) we add the vertex \(\bar x_i\) to the adjacency list of \(v_1\) in the forcing graph. The addition of a new element to the forcing graph adjacency lists takes constant time, and there are \(2E^-\) elements of the original adjacency lists. Therefore, Step 11 takes time \(\mathcal O(E^-).\) **Step 12:** For this step, we first find a cycle---recall the cycles come in pairs, so we need only look for one cycle. This can be done with a DFS algorithm, so takes time \(\mathcal O(V + E^-)\). Let the cycles found be \(C_1\) and \(C_2.\) We then check to see whether \(C_1\) and \(C_2\) are disjoint. This requires reading through the list of vertices in \(C_2\), once for each vertex in \(C_1.\) This takes time \(\mathcal O(V^2).\) If the cycles are disjoint, we identify the vertices of each cycle. Let one cycle be made up of vertices \(x_1, x_2, \ldots, x_r.\) We first take all the elements of the negative adjacency lists of vertices \(x_2, \ldots, x_r\) and add them to the negative adjacency list for vertex \(x_1.\) Each addition takes constant time, and there are at most \(E^--2\) additions. Next, we delete the empty lists for vertices \(x_2, \ldots, x_r.\) Each deletion again takes constant time, and there are at most \(V-2\) deletions. We then look through all the negative adjacency lists to change every appearance of \(x_2, \ldots, x_r\) to \(x_1.\) Each change takes constant time, and we must look through \(2E^-\) elements. Next we look through the adjacency lists and delete every repeated element in a list to get rid of multiple edges. We also delete the negative edge \(x_1 \bar x_1\) if it exists. The deletions take constant time, and we must look through \(2E^-\) elements. Finally, we concatenate the lists for \(x_2, \ldots, x_r\) to the recovery list for \(x_1.\) Each addition takes constant time and there are at most \(V-1\) lists to append. Therefore, identifying the vertices of one cycle takes time \(\mathcal O(V + E^-).\) We do the identification process twice, after completing the depth first search; thus, the time complexity of Step 12 is \(\mathcal O(V^2 + E^-).\) ### Proof of Theorem [\[time complexity\]](#time complexity){reference-type="ref" reference="time complexity"} # Switching Deficiency Let \(A\) be a set of vertices of \(\Sigma.\) *Switching* \(A\) is negating the signs of the edges with exactly one endpoint in \(A\). Two signed graphs are *switching equivalent* if they are related by switching. The chromatic number of a signed graph is the same as the chromatic number of the switched graph. A minimal coloration of the switched graph is simply a byproduct of switching the graph; given a minimal coloration of \(\Sigma\), the signs of the colors on \(A\) are negated during the switching process. Two colorations, \(\kappa\) and \(\kappa^*,\) are *switching equivalent* if they are related by switching. If \(\kappa^*\) is switching equivalent to \(\kappa\), then \(\kappa^*\) colors \(\Sigma^*.\) In general, allowing switching makes the questions surrounding deficiency straightforward to solve. The *switching deficiency range of \(\kappa\)*, \(\mathcal{L}^*(\kappa)\), is \(\{\operatorname{def}(\kappa^*) \mid \kappa^*\) is switching equivalent to \(\kappa \}.\) The *switching deficiency range of \(\Sigma\)*, \(\mathcal{L}^*(\Sigma)\), is \(\{\operatorname{def}(\kappa^*) \mid \kappa^*\) is a minimal coloration of a graph that is switching equivalent to \(\Sigma.\}.\)
{'timestamp': '2020-06-01T02:04:24', 'yymm': '2005', 'arxiv_id': '2005.14336', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14336'}
null
null
null
null
# Introduction {#sec:introduction} Let \(\Omega\) be a bounded domain in \(\mathbb{R}^{n}\) and let \(1 < p < \infty\). We consider the existence of positive solutions to quasilinear elliptic equations of the type \[\label{eqn:p-laplace} \begin{cases} \displaystyle-\Delta_{p, w} u = \sigma u^{q} & \text{in \(\Omega\)}, \\ u = 0 & \text{on \(\partial \Omega\),} \end{cases}\] in the sub-natural growth case \(0 < q < p-1\), where \(\Delta_{p, w}\) is a weighted \((p, w)\)-Laplacian, \(w\) is a \(p\)-admissible weight on \(\mathbb{R}^{n}\) (see Section [2](#sec:preliminaries){reference-type="ref" reference="sec:preliminaries"} below) and \(\sigma\) is a nonnegative (locally finite) Radon measure on \(\Omega\). For the standard theory of sublinear equations, we refer to and the references therein. In the classical existence results of weak solutions, the boundedness of coefficients was assumed. Boccardo and Orsina removed this assumption and pointed out that if the integrability of the coefficients is low, the solutions do not necessarily belong to the class of weak solutions. Therefore, we interpret this equation in the sense of \(p\)-superharmonic functions, or locally renormalized solutions. For details on such generalized solutions, especially on the relation between the two concepts, see and references therein. Hereafter, we use the framework for \(p\)-superharmonic functions. The measure-valued coefficient equation [\[eqn:p-laplace\]](#eqn:p-laplace){reference-type="eqref" reference="eqn:p-laplace"} is relevant to the following \(L^{p}\)-\(L^{1 + q}\) trace inequality: \[\label{eqn:trace_ineq} \| f \|_{L^{1 + q}(\Omega; \sigma)} \le C_{T} \| \nabla f \|_{L^{p}(\Omega; w)}, \quad \forall f \in C_{c}^{\infty}(\Omega).\] Maz'ya and Netrusov gave a capacitary condition that characterizes [\[eqn:trace_ineq\]](#eqn:trace_ineq){reference-type="eqref" reference="eqn:trace_ineq"}. Cascante, Ortega and Verbitsky studied non-capacitary characterizations for inequalities of the type [\[eqn:trace_ineq\]](#eqn:trace_ineq){reference-type="eqref" reference="eqn:trace_ineq"}. For example, if \(\Omega = \mathbb{R}^{n}\) and \(w = 1\), then the best constant \(C_{T}\) in [\[eqn:trace_ineq\]](#eqn:trace_ineq){reference-type="eqref" reference="eqn:trace_ineq"} satisfies \[\frac{1}{c} \, C_{T}^{ \frac{(1 + q)p}{p-1-q} } \le \int_{\mathbb{R}^{n}} \left( {\bf{W}}_{1, p} \sigma \right)^{\frac{(1 + q)(p-1)}{p-1-q}} \, d \sigma \le c \, C_{T}^{ \frac{(1 + q)p}{p-1-q} },\] where \(c = c(n, p, q)\) and \({\bf{W}}_{1, p} \sigma\) is the *Wolff potential* of \(\sigma\) (see ). Recently, Verbitsky and his colleagues studied the problem of existence of solutions to elliptic equations related to [\[eqn:p-laplace\]](#eqn:p-laplace){reference-type="eqref" reference="eqn:p-laplace"} and presented some criteria (see ). In their study, they treated the cases of \(\Omega = \mathbb{R}^{n}\), or \(p = 2\). For \(\Omega = \mathbb{R}^{n}\), Wolff potentials are suitable potentials for the problem. Every \(p\)-superharmonic function known to be locally estimated by Wolff potentials (see ), and these estimates are some of the key pieces of proof. In contrast, we can directly use Green potentials for \(p = 2\) or, more generally, for linear equations. However, Wolff potentials are not sufficient for estimating the boundary behavior of solutions. Furthermore, Radon measures satisfying [\[eqn:trace_ineq\]](#eqn:trace_ineq){reference-type="eqref" reference="eqn:trace_ineq"} may not have compact support in \(\Omega\) and are not even finite in general (see Section [7](#sec:example2){reference-type="ref" reference="sec:example2"}). Consequently, the complete criteria for the existence of solutions to quasilinear equations in bounded domains have not yet been obtained. The purpose of this paper is to extend Verbitsky's theory to (weighted) quasilinear equations in bounded domains. Our basic idea is to replace Wolff or Green potentials with the minimal positive \(p\)-superharmonic solution \(u\) to \(-\Delta_{p, w} u = \sigma\) (see Definition [\[def:potential\]](#def:potential){reference-type="ref" reference="def:potential"} for the precise meaning). The function \(\mathcal{W}_{p, w} \sigma = u\) has no explicit integral representation; however, some required estimates can be obtained by directly using the properties of weak solutions. To realize this approach, we investigate various properties of \(p\)-superharmonic functions, especially the solvability of Dirichlet problems in the case of infinite measure data. Note that this existence problem has been stated as an open problem in. Let \(\mathcal{M}^{+}_{0}(\Omega)\) be the set of all nonnegative Radon measures on \(\Omega\) that are absolutely continuous with respect to the \((p, w)\)-capacity. Note that \(\sigma\) must belong to \(\mathcal{M}^{+}_{0}(\Omega)\) if [\[eqn:trace_ineq\]](#eqn:trace_ineq){reference-type="eqref" reference="eqn:trace_ineq"} holds. Our main result is as follows. The boundary behavior of \(u\) is not discussed in Theorem [\[thm:main_theorem\]](#thm:main_theorem){reference-type="ref" reference="thm:main_theorem"}; however, under appropriate assumptions on \(\sigma\), we can prove that \(u\) vanishes on \(\partial \Omega\) (see Proposition [\[prop:energy_class\]](#prop:energy_class){reference-type="ref" reference="prop:energy_class"} and Corollary [\[cor:energy_esti\]](#cor:energy_esti){reference-type="ref" reference="cor:energy_esti"}). One such condition is as follows. We also give the Cascante-Ortega-Verbitsky type of theorem below. In particular, if [\[eqn:trace_ineq\]](#eqn:trace_ineq){reference-type="eqref" reference="eqn:trace_ineq"} holds with \(q > 0\), then there exists a unique positive weak solution \(u\) to [\[eqn:p-laplace\]](#eqn:p-laplace){reference-type="eqref" reference="eqn:p-laplace"} such that \[\frac{1}{c(p, q)} C_{T}^{ \frac{1 + q}{p-1-q} } \le\| \nabla u \|_{L^{p}(w)} \le c(p, q) C_{T}^{ \frac{1 + q}{p-1-q} }.\] Examples of concrete sufficient conditions for [\[eqn:energy_cond\]](#eqn:energy_cond){reference-type="eqref" reference="eqn:energy_cond"} will be discussed at the end of the paper. One is a Lorentz scale refinement of, and the other is quasilinear ordinary differential equations with nonintegrable Hardy-type coefficients. ## Organization of the paper {#organization-of-the-paper .unnumbered} Section [2](#sec:preliminaries){reference-type="ref" reference="sec:preliminaries"} presents various facts in nonlinear potential theory and introduces classes of smooth measures. Section [3](#sec:potentials){reference-type="ref" reference="sec:potentials"} discusses minimal \(p\)-superharmonic solutions to Dirichlet problems. Section [4](#sec:generalized_energy){reference-type="ref" reference="sec:generalized_energy"} defines the generalized energy of \(p\)-superharmonic functions and investigates its properties including Theorem [\[thm:embedding\]](#thm:embedding){reference-type="ref" reference="thm:embedding"}. Section [5](#sec:proof_of_main_theorem){reference-type="ref" reference="sec:proof_of_main_theorem"} provides the proof of Theorem [\[thm:main_theorem\]](#thm:main_theorem){reference-type="ref" reference="thm:main_theorem"} by using results in Sections [3](#sec:potentials){reference-type="ref" reference="sec:potentials"} and [4](#sec:generalized_energy){reference-type="ref" reference="sec:generalized_energy"}. Sections [6](#sec:example1){reference-type="ref" reference="sec:example1"} and [7](#sec:example2){reference-type="ref" reference="sec:example2"} discuss two applications of Theorems [\[thm:main_theorem\]](#thm:main_theorem){reference-type="ref" reference="thm:main_theorem"}-[\[thm:embedding\]](#thm:embedding){reference-type="ref" reference="thm:embedding"}. ## Notation {#notation .unnumbered} We use the following notation. Let \(\Omega\) be a domain (connected open subset) in \(\mathbb{R}^{n}\). - \(\mathbf{1}_{E}(x) :=\) the indicator function of a set \(E\). - \(C_{c}^{\infty}(\Omega) :=\) the set of all infinitely differentiable functions with compact support in \(\Omega\). - \(\mathcal{M}^{+}(\Omega) :=\) the set of all nonnegative Radon measures on \(\Omega\). - \(L^{p}(\mu) :=\) the \(L^{p}\) space with respect to \(\mu \in \mathcal{M}^{+}(\Omega)\). For a ball \(B = B(x, R)\) and \(\lambda > 0\), \(\lambda B := B(x, \lambda R)\). For measures \(\mu\) and \(\nu\), we denote \(\nu \le \mu\) if \(\mu-\nu\) is a nonnegative measure. For a sequence of extended real valued functions \(\{ f_{j} \}_{j = 1}^{\infty}\), we denote \(f_{j} \uparrow f\) if \(f_{j + 1} \ge f_{j}\) for all \(j \ge 1\) and \(\lim_{j \to \infty} f_{j} = f\). Moreover, \(c\) and \(C\) denote various constants with and without indices. # Preliminaries {#sec:preliminaries} We first recall the basic properties of \(p\)-admissible weights from, and references therein. Throughout the paper, \(1 < p < \infty\) is a fixed constant. A Lebesgue measurable function \(w\) on \(\mathbb{R}^{n}\) to be said as *weight* on \(\mathbb{R}^{n}\) if \(w \in L^{1}_{\mathrm{loc}}(\mathbb{R}^{n}; dx)\) and \(w(x) > 0\) \(dx\)-a.e. We write \(w(E) = \int_{E} w \, dx\) for a Lebesgue measurable set \(E \subset \mathbb{R}^{n}\). We always assume that \(w\) is *\(p\)-admissible*, that is, positive constants \(C_{D}\), \(C_{P}\) and \(\lambda \ge 1\) exist, such that \[w(2B) \le C_{D} w(B)\] and \[\fint_{B} |f-f_{B}| \, dw \le C_{P} \, \mathrm{diam}(B) \left( \fint_{\lambda B} |\nabla f|^{p} \, dw \right)^{\frac{1}{p}}, \quad \forall f \in C_{c}^{\infty}(\mathbb{R}^{n}),\] where \(B\) is an arbitrary ball in \(\mathbb{R}^{n}\), \(\fint_{B} = w(B)^{-1} \int_{B}\) and \(f_{B} = \fint_{B} f \, dw\). One of the important properties of \(p\)-admissible weights is the Sobolev inequality (). In particular, the following form of the Poincaré inequality holds: \[\label{eqn:poincare} \int_{B} |f|^{p} \, dw \le C \, \mathrm{diam}(B)^{p} \int_{B} |\nabla f|^{p} \, dw, \quad \forall f \in C_{c}^{\infty}(B),\] where \(C\) is a constant depending only on \(p\), \(C_{D}\), \(C_{P}\) and \(\lambda\). Next, we recall basics of nonlinear potential theory from. Let \(\Omega\) be a bounded domain in \(\mathbb{R}^{n}\). The weighted Sobolev space \(H^{1, p}(\Omega; w)\) is the closure of \(C^{\infty}(\Omega)\) with respect to the norm \[\| u \|_{H^{1, p}(\Omega; w)} := \left( \int_{\Omega} |u|^{p} + |\nabla u|^{p} \, d w \right)^{\frac{1}{p}},\] where \(\nabla u\) is the gradient of \(u\). The corresponding local space \(H^{1, p}_{\mathrm{loc}}(\Omega; w)\) is defined in the usual manner. We denote the closure of \(C_{c}^{\infty}(\Omega)\) in \(H^{1, p}(\Omega; w)\) by \(H_{0}^{1, p}(\Omega; w)\). Since \(\Omega\) is bounded, we can take \(\| \nabla \cdot \|_{L^{p}(\Omega; w)}\) as the norm of \(H_{0}^{1, p}(\Omega; w)\) by the Poincaré inequality. For \(u \in H^{1, p}_{\mathrm{loc}}(\Omega; w)\), we define the weighted \(p\)-Laplace operator \(\Delta_{p, w}\) by \[\langle-\Delta_{p, w} u, \varphi \rangle = \int_{\Omega} |\nabla u|^{p-2} \nabla u \cdot \nabla \varphi \, dw, \quad \forall \varphi \in C_{c}^{\infty}(\Omega).\] A function \(u \in H^{1, p}_{\mathrm{loc}}(\Omega; w)\) is called a *supersolution* to \[\label{eqn:p-harmonic}-\Delta_{p, w} u = 0 \quad \text{in} \ \Omega\] if \(\langle-\Delta_{p, w} u, \varphi \rangle \geq 0\) for all nonnegative \(\varphi \in C_{c}^{\infty}(\Omega)\). If \(\mu\) is an element of the dual of \(H_{0}^{1, p}(\Omega; w)\), then the Dirichlet problem \[\label{eqn:variational_problem} \begin{cases} \langle-\Delta_{p, w} u, \varphi \rangle = \langle \mu, \varphi \rangle \quad \forall \varphi \in H_{0}^{1, p}(\Omega; w) \\ u \in H_{0}^{1, p}(\Omega; w) \end{cases}\] has a unique weak solution \(u\). Let \(\Omega \subset \mathbb{R}^{n}\) be open, and let \(K \subset \Omega\) be compact. The *variational \((p, w)\)-capacity* \(\mathrm{cap}_{p, w}(K, \Omega)\) of the condenser \((K, \Omega)\) is defined by \[\mathrm{cap}_{p, w}(K, \Omega) := \inf \left\{ \| \nabla u \|_{L^{p}(\Omega; w)}^{p} \colon u \geq 1 \ \text{on} \ K, \ u \in C_{c}^{\infty}(\Omega) \right\}.\] Moreover, for \(E \subset \Omega\), we define \[\mathrm{cap}_{p, w}(E, \Omega) := \inf_{\substack{ E \subset U \subset \Omega \\ U \colon \text{open} }} \sup_{K \subset U \colon \text{compact}} \mathrm{cap}_{p, w}(K, \Omega).\] Since \(\Omega \subset \mathbb{R}^{n}\) is bounded, \(\mathrm{cap}_{p, w}(E, \Omega) = 0\) if and only if \(C_{p, w}(E) = 0\), where \(C_{p, w}(\cdot)\) is the *(Sobolev) capacity* of \(E\). We say that a property holds *quasieverywhere* (q.e.) if it holds except on a set of \((p, w)\)-capacity zero. An extended real valued function \(u\) on \(\Omega\) is called as *quasicontinuous* if for every \(\epsilon > 0\) there exists an open set \(G\) such that \(C_{p, w}(G) < \epsilon\) and \(u|_{\Omega \setminus G}\) is continuous. Every \(u \in H^{1, p}_{\mathrm{loc}}(\Omega; w)\) has a quasicontinuous representative \(\tilde{u}\) such that \(u = \tilde{u}\) a.e. A function \(u \colon \Omega \to (-\infty, \infty]\) is called *\((p, w)\)-superharmonic* if \(u\) is lower semicontinuous in \(\Omega\), is not identically infinite, and satisfies the comparison principle on each subdomain \(D \Subset \Omega\); if \(h \in C(\overline{D})\) is a continuous weak solution to \(-\Delta_{p, w} u = 0\) in \(D\), and if \(u \geq h\) on \(\partial D\), then \(u \geq h\) in \(D\). If \(u\) is a bounded \((p, w)\)-superharmonic function, then \(u\) belongs to \(H^{1, p}_{\mathrm{loc}}(\Omega; w)\) and is a supersolution to [\[eqn:p-harmonic\]](#eqn:p-harmonic){reference-type="eqref" reference="eqn:p-harmonic"}. Conversely, if \(u\) is a supersolution to [\[eqn:p-harmonic\]](#eqn:p-harmonic){reference-type="eqref" reference="eqn:p-harmonic"}, then its *lsc-regularization* \[u^{*}(x) = \lim_{r \to 0} \essinf_{B(x, r)} u\] is \((p, w)\)-superharmonic in \(\Omega\). If \(u\) and \(v\) are \((p, w)\)-superharmonic in \(\Omega\) and \(u(x) \leq v(x)\) for a.e. \(x \in \Omega\), then \(u(x) \leq v(x)\) for all \(x \in \Omega\). Every \((p, w)\)-superharmonic function is known to be quasicontinuous. In particular, the set \(\{ u = \infty \}\) has zero \((p, w)\)-capacity whenever \(u\) is \((p, w)\)-superharmonic. Assume that \(u\) is a \((p, w)\)-superharmonic function in \(\Omega\). Its truncation \(u_{k} = \min\{ u, k \}\) will then become a supersolution to [\[eqn:p-harmonic\]](#eqn:p-harmonic){reference-type="eqref" reference="eqn:p-harmonic"} for all \(k > 0\). Moreover, there exists a Radon measure \(\mu[u]\) such that \[\lim_{k \to \infty} \int_{\Omega} |\nabla u_{k}|^{p-2} \nabla u_{k} \cdot \nabla \varphi \, dw = \int_{\Omega} \varphi \, d \mu[u], \quad \forall \varphi \in C_{c}^{\infty}(\Omega).\] The measure \(\mu[u]\) is called the *Riesz measure* of \(u\). By definition, if \(u \in H^{1, p}_{\mathrm{loc}}(\Omega; w)\), then \(\mu[u] =-\Delta_{p, w} u\) in the sense of distribution. As in Section [1](#sec:introduction){reference-type="ref" reference="sec:introduction"}, we denote by \(\mathcal{M}^{+}_{0}(\Omega)\) the set of all Radon measures \(\mu\) that are absolutely continuous with respect to the \((p, w)\)-capacity, i.e., \(\mu(E) = 0\) whenever \(E\) has zero \((p, w)\)-capacity. If \(u \in H^{1, p}_{\mathrm{loc}}(\Omega; w)\) is \((p, w)\)-superharmonic in \(\Omega\), then the Riesz measure of \(u\) belongs to \(\mathcal{M}^{+}_{0}(\Omega)\). It is known that if \(\mu \in \mathcal{M}^{+}_{0}(\Omega)\) is finite, then the integral \(\int_{\Omega} f \, d \mu\) is well-defined for any quasicontinuous function \(f\) on \(\Omega\). If \(u \in H^{1, p}(\Omega; w)\) is a supersolution to [\[eqn:p-harmonic\]](#eqn:p-harmonic){reference-type="eqref" reference="eqn:p-harmonic"}, then the Riesz measure of \(u^{*}\) satisfies \[\label{eqn:finite_energy} \int_{\Omega} \varphi \, d \mu \le C \| \varphi \|_{H^{1, p}(\Omega; w)}, \quad \forall \varphi \in C_{c}^{\infty}(\Omega), \ \varphi \ge 0.\] If \(\mu\) is also finite, then we can replace \(C_{c}^{\infty}(\Omega)\) with \(H_{0}^{1, p}(\Omega; w)\) up to taking a quasicontinuous representative, i.e., the dual action of \(\mu\) has the integral representative. Conversely, if a finite measure \(\mu\) satisfies [\[eqn:finite_energy\]](#eqn:finite_energy){reference-type="eqref" reference="eqn:finite_energy"}, then there exists a unique weak solution \(u \in H_{0}^{1, p}(\Omega; w)\) to \[\int_{\Omega} |\nabla u|^{p-2} \nabla u \cdot \nabla \varphi \, dw = \int_{\Omega} \tilde{ \varphi } \, d \mu \quad \forall \varphi \in H_{0}^{1, p}(\Omega; w).\] The following weak continuity result was given by Trudinger and Wang. The following Harnack-type convergence theorem follows from combining Theorem [\[thm:TW\]](#thm:TW){reference-type="ref" reference="thm:TW"} and: If \(\{ u_{k} \}_{k = 1}^{\infty}\) is a nondecreasing sequence of \((p, w)\)-superharmonic functions in \(\Omega\) and if \(u := \lim_{k \to \infty} u_{k} \not \equiv \infty\), then \(u\) is \((p, w)\)-superharmonic in \(\Omega\) and \(\mu[u_{k}]\) converges to \(\mu[u]\) weakly. The following form of Wolff potential estimate was first established by Kilpeläinen and Malý. The extension to weighted equations is due to Mikkonenn. See also for other proofs. # Minimal \(p\)-superharmonic solutions {#sec:potentials} The following comparison principle improves. We do not assume the finiteness of the Riesz measures here. Following, we introduce classes of smooth measures. The following characterization for \(\mathcal{M}^{+}_{0}(\Omega)\) is the nonlinear counterpart of (see also ). For related characterizations for \(\mathcal{M}_{0}^{+}(\Omega)\), see also and. Let us now consider the following Dirichlet problem: \[\label{eqn:poisson} \begin{cases}-\Delta_{p, w} u = \mu & \text{in \(\Omega\)}, \\ u = 0 & \text{on \(\partial \Omega\).} \end{cases}\] We say that a function \(u\) is a *\((p, w)\)-superharmonic solution (supersolution)* to \(-\Delta_{p, w} u = \mu\) in \(\Omega\), if \(u\) is a \((p, w)\)-superharmonic function in \(\Omega\) and \(\mu[u] = \mu\) (\(\mu[u] \ge \mu\)), where \(\mu[u]\) is the Riesz measure of \(u\). We say that a nontrivial nonnegative solution \(u\) is *minimal* if \(v \geq u\) in \(\Omega\) whenever \(v\) is a nontrivial nonnegative supersolution to the same equation. # Generalized energy {#sec:generalized_energy} Let us define generalized \(p\)-energy by using minimal \(p\)-superharmonic solutions. For \(p = 2\) or \(\Omega = \mathbb{R}^{n}\), we refer to. By definition, if \(\mu \in {S}^{\gamma}\), then the Dirichlet problem [\[eqn:poisson\]](#eqn:poisson){reference-type="eqref" reference="eqn:poisson"} has a minimal nonnegative \((p, w)\)-superharmonic solution \(u = \mathcal{W}_{p, w} \mu\). We can verify \({S}^{1} = {S}_{0}\) by modifying the proof of Theorem [\[thm:embedding\]](#thm:embedding){reference-type="ref" reference="thm:embedding"} below. For any \(0 \le \gamma \le \infty\), \[{S}_{00} = {S}^{0} \cap {S}^{\infty} \subset {S}^{\gamma} \subset \mathcal{M}^{+}_{0}(\Omega).\] Assume that \(0 < \gamma < \infty\) and \(\mu \in {S}_{00}\). Let \(u = \mathcal{W}_{p, w}^{0} \mu\) and let \(v = u^{\frac{p-1 + \gamma}{p}}\). Then, for any \(\epsilon > 0\), \[\int_{\Omega} (u^{\gamma}-\epsilon)_{+} \, d \mu = \gamma \int_{ \{ u^{\gamma} > \epsilon \} } |\nabla u|^{p} u^{\gamma-1} \, dw = \frac{1}{c_{E}} \int_{ \Omega } |\nabla v_{\epsilon}|^{p} \, dw,\] where \(v_{\epsilon} = (v-\epsilon^{ \frac{p-1 + \gamma}{\gamma p} })_{+}\) and \(c_{E}\) is the constant in [\[eqn:opt-const\]](#eqn:opt-const){reference-type="eqref" reference="eqn:opt-const"}. Thus, by the monotone convergence theorem, \[\label{eqn:integrating_by_parts} \int_{\Omega} (\mathcal{W}_{p, w}^{0} \mu)^{\gamma} \, d \mu = \gamma \int_{\Omega} |\nabla u|^{p} u^{\gamma-1} \, dw = \frac{1}{c_{E}} \int_{ \Omega } |\nabla v|^{p} \, dw.\] Moreover, since \(\{ v_{\epsilon} \}\) is a bounded sequence in \(H_{0}^{1, p}(\Omega; w)\), \(v \in H_{0}^{1, p}(\Omega; w)\). As in the proof of, the Picone-type inequality in yields the following estimate. We also obtain the following estimate using a similar approximation argument. Finally, we prove weighted norm inequalities. # Properties of solutions to [\[eqn:p-laplace\]](#eqn:p-laplace){reference-type="eqref" reference="eqn:p-laplace"} {#sec:proof_of_main_theorem} First, we give the counterpart of or. Next, we give the counterpart of or. Finally, we prove Theorem [\[thm:main_theorem\]](#thm:main_theorem){reference-type="ref" reference="thm:main_theorem"} and its variants. # Quasilinear PDE with \(L^{s, t}\) coefficients {#sec:example1} Let us assume that \(\mu \in \mathcal{M}^{+}_{0}(\Omega)\) is finite. Then as in, \[\label{eqn:wolff_UB} \mathcal{W}_{p, w} \mu(x) \le C {\bf{W}}_{1, p, w}^{ 2 \mathrm{diam}(\Omega) } \mu(x), \quad \forall x \in \Omega.\] Using this, we can estimate the generalized \(p\)-energy of \(\mu\). We now consider unweighted equations. As the usual notation, we write \(H_{0}^{1, p}(\Omega; 1)\) as \(W_{0}^{1, p}(\Omega)\). For a Lebesgue measurable function \(f\) on \(\Omega\), we define \[\| f \|_{L^{r, \rho}(\Omega)} = \begin{cases} \displaystyle \left( \int_{0}^{\infty} \left( t^{\frac{1}{r}} f^{*}(t) \right)^{\rho} \frac{dt}{t} \right)^{\frac{1}{\rho}} & \text{if} \ \rho < \infty, \\ \displaystyle \sup_{t > 0} t^{\frac{1}{r}} f^{*}(t) & \text{if} \ \rho = \infty, \end{cases}\] where \(0 < r, \rho \leq \infty\) and \(f^{*}(t) = \inf \{ \alpha > 0 \colon | \{ x \in \Omega \colon |f(x)| > \alpha \} | \leq t \}\). The space of all \(f\) with \(\| f \|_{L^{r, \rho}(\Omega)} < \infty\) is called the *Lorentz space*. For the basics of Lorentz spaces, we refer to. # Quasilinear ODE with Hardy-type coefficients {#sec:example2} Let us now consider the model ordinary differential equation \[\label{eqn:p-laplace_bdr} \begin{cases}-(w |u'|^{p-2} u')' = \theta u^{q} \quad \text{in \((-1, 1)\),} \\ u(-1) = u(1) = 0, \end{cases}\] where \[\begin{aligned} w(x) & = (1-|x|)^{\beta}, \quad \beta \in (-1, p-1), \\ \theta(x) & = (1-|x|)^{-\alpha}, \quad \alpha \in \mathbb{R}, \end{aligned}\] and \(' = \frac{d}{dx}\). The function \(w\) can be regarded as a Muckenhoupt \(A_{p}\)-weight in \(\mathbb{R}\). Therefore it is also \(p\)-admissible (see ). Note that \(\theta\) is not integrable on \((-1, 1)\) if \(\alpha \ge 1\).
{'timestamp': '2020-12-07T02:09:57', 'yymm': '2005', 'arxiv_id': '2005.14377', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14377'}
null
null
null
null
null
null
# Introduction {#sec:intro} Constructing a latent space for human motion is an important problem as it has a wide range of applications such as motion recognition, prediction, interpolation, and synthesis. Ideal motion spaces should be compact in the sense that random sampling in the space leads to plausible motions and comprehensive so as to generate a wide range of human motions. In addition, locally linear arrangement of the semantically related hidden vectors would benefit motion synthesis, e.g., by simple algebraic operations. However, constructing a compact and versatile motion space and extracting valid motions from it remains a challenging problem because the body parts of human body are highly correlated in general actions and the joints are constrained to satisfy the bone lengths and the range of movement. The high dimensionality of the joint space adds additional difficulty to this problem. In this paper, we present a novel framework to construct a latent motion manifold and to produce various human motions from the motion manifold. In order to embrace the temporal characteristic of human motion, our model is based on the sequence-to-sequence model. The unsupervised sequence-to-sequence models have been shown to be effective by previous studies on motion prediction.
{'timestamp': '2020-06-01T02:05:49', 'yymm': '2005', 'arxiv_id': '2005.14370', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14370'}
# # Introduction The quantum internet will provide a facility for communicating qubits between quantum information processing devices. It will enable us to implement interesting applications such as quantum key distribution, clock synchronisation, secure multi-party computation, and others. To enable a full quantum internet the network needs to be able to produce entanglement between any two end nodes connected to the network. In this paper, we consider the problem of optimising the achievable rates for distributing EPR-pairs among multiple source-destination pairs in a network of quantum repeaters while keeping a lower bound on the end-to-end fidelity as a requirement. We propose a polynomial time algorithm for solving this problem and we show that, for a particular entanglement distribution protocol, our solution is tight and achieves the optimal rate. Our algorithm is inspired by *multi-commodity flow* optimisation which is a very well-studied subject and has been used in many optimisation problems, including classical internet routing. In the context of a classical internet, a *flow* is the total number of data packets, transmitted between a source and a destination per unit time (*rate*). In this context, a *commodity* is a *demand*, which consists of a source, destination and potentially other requirements like the desired end-to-end packet transmission rate, quality of service, etc. In a classical network, a source and a destination can be connected via multiple communication channels as well as a sequence of repeaters and each of the communication channels has a certain *capacity* which upper bounds the amount of flow it can transmit. In this context, a flow must satisfy another restriction, called *flow conservation*, which says that the amount of flow entering a node (*inflow*), except the source and destination node, equals the amount of flow leaving the node [^1] (*outflow*). With these constraints, one of the goals of a multi-commodity flow optimisation problem is to maximise the total amount of flows (end-to-end packet transmission rates) in a network given a set of commodities (demands). There exist *linear programming* formulations for solving this problem and if we allow the flows to be a fraction then this *linear programming* (LP) can be solved in polynomial time (in the number of nodes). In a quantum internet, we abstract the entire network as a graph \(G= (V,E, C)\), where \(V\) represents the set of repeaters as well as the set of end nodes, and the set of edges, \(E\), abstracts the physical communication links. Corresponding to each edge we define edge capacities \(C: E\rightarrow \mathbb{R}^+\), which denotes the maximum elementary EPR-pair generation rate. We assume that the fidelity of all the EPR-pairs, generated between any two nodes \(u,v \in V\) such that \((u,v) \in E\), is the same (say \(F\)). We refer to such EPR-pair as an *elementary pair* and the physical communication link via which we create such an elementary pair is called an *elementary link*. Flow in such a network is the EPR-pair generation rate between a source-destination pair. Depending on the applications, the end nodes may need to generate EPR-pairs with a certain fidelity. Keeping the analogy with the classical internet, here we refer to such requirement as a demand (commodity) and it consists of four items, a source \(s \in V\), a destination \(e \in V\), end-to-end desired entanglement distribution rate \(r\) and an end-to-end fidelity requirement \(F_{\text{end}}\). We denote the set of all such demands (commodities) as \(D\). In this paper, we are interested in computing the maximum entanglement distribution rate (flow). Given a quantum network \(G\) and a set of demands \(D\), we investigate how to produce a set of paths \(\mathcal{P}_i\) and an end-to-end entanglement generation rate \(r_i\) (flow), corresponding to each demand \((s_i,e_i,F_i)\), such that the total entanglement generation rate \(\sum_{i=1}^{|D|} r_i\) is maximised. In the rest of this paper, we refer to this maximisation problem as *rate maximisation problem*. What is more, here we also investigate what type of practical entanglement distribution protocol achieves such rate. In the case of the quantum internet, we can use an LP for maximising the total flow \(\sum_{i=1}^{|D|} r_i\). However, the working principle of quantum repeaters is different, unlike classical networks, the repeaters extend the length of the shared EPR-pairs by performing *entanglement swapping* operations [^2] . However, entanglement swapping operations might be probabilistic depending on the repeater technology used in the quantum internet. This implies that the usual flow-conservation property which we use in classical networks does not hold in the quantum networks, i.e., the sum of the inflow is not always equal to the sum of the outflow. Hence, the standard multi-commodity flow-based approach cannot be applied directly. For example, if the repeaters are built using *atomic ensemble* and *linear optics* then they use a probabilistic Bell-state measurement (BSM) for the entanglement swap operation. Due to the probabilistic nature of the BSM, the entanglement generation rate decays exponentially with the number of swap operations. Another difficulty for using the standard multi-commodity flow-based approach for solving our problem occurs due to the end-to-end fidelity requirement in the demand. In a quantum network, the fidelity of an EPR-pair drops with each entanglement swap operation. This implies that a longer path-length results in a lower end-to-end fidelity. One can enhance the end-to-end fidelity using *entanglement distillation*. However, some repeater technologies are unable to perform such quantum operations (for instance, the atomic ensemble-based quantum repeaters). Hence, for such cases, one can achieve the end-to-end fidelity requirement only by increasing the fidelity \(F\) of the elementary pairs and reducing the length of the discovered path. The first of these two options, the elementary pair fidelity, depends on the hardware parameters at fabrication. The second option is related to the path-length and it is under the control of the routing algorithm that determines the path from the source to the destination. For the routing algorithms, one possible way to guarantee the end-to-end fidelity is to put an upper bound on the discovered path-lengths. The standard multi-commodity flow-based LP-formulations does not take into account this path-length constraint. However, there exists one class of multi-commodity flow-based LP-formulation, called *length-constrained multi-commodity flow*, which takes into account such constraints. In this paper, our proposed LP-formulation is inspired from the length-constrained multi-commodity flow problem and it takes into account the path-length constraint. Given these differences, one might use the LP-formulation corresponding to the standard multi-commodity flow-based approach which we described before, but this would lead to a very loose upper bound on the achievable entanglement generation rate in this setting. In our setting, it is not clear whether one can still have an efficient LP-formulation for the flow maximisation problem in a quantum internet. In fact, recently in the authors mention that multi-commodity flow optimisation-based routing in a quantum internet may, in general, be an NP-hard problem. In this paper, we show that for some classes of practical entanglement generation protocols, one can still have efficient LP-formulation which maximises the total flow for all the commodities in polynomial time (in the number of nodes). The organisation of our paper is as follows: section [3.1](#sum_contr){reference-type="ref" reference="sum_contr"} provides a summary of our results. In section [3.3](#lp_form){reference-type="ref" reference="lp_form"}, we give the exact LP-formulation for solving rate maximisation problem. In section [4](#meth){reference-type="ref" reference="meth"} we prove that our LP formulation solve the desired rate maximisation problem. Later, in the same section we show how one can achieve the entanglement generation rates proposed by the LP-formulation using an entanglement distribution protocol. We also analyse the complexity of our proposed algorithms in section [4](#meth){reference-type="ref" reference="meth"}. We conclude our paper in section [5](#concl){reference-type="ref" reference="concl"}. # Results {#contr} ## Our contributions in a nutshell {#sum_contr} In this paper, all of our results are directed towards solving the rate maximisation problem in a quantum internet, where given a quantum network and a set of demands, the goal is to produce a set of paths such that the total end-to-end entanglement generation rate is maximised and in addition for each of the demands the end-to-end fidelity of the EPR-pairs satisfy a minimal requirement. In this section, we summarise our contributions. - In order to solve the maximisation problem, we propose an LP-formulation called *edge-based formulation* where both the number of variables and the number of constraints as well as the algorithm for solving such LPs scale polynomially with the number of nodes in the graph. However, it is non-trivial to see whether this formulation provides a valid solution to the problem or not. In this paper, by showing the equivalence between the edge-based formulation and another intuitive LP-formulation, called *path-based formulation*, we show that the edge-based formulation provides a valid solution. - A disadvantage of the solution of the edge-based formulation is that it only gives the total achievable rate, not the set of paths which the underlying entanglement distribution protocol would use to distribute the EPR-pairs to achieve such rate. In this paper, we provide an algorithm, called the *path extraction algorithm*, which takes the solutions of the edge-based formulation and for each of the commodities it extracts the set of paths to be used and the corresponding entanglement distribution rate along that path. The worst case time complexity of this algorithm is \(O(|V|^4|E||D|)\), where \(|V|, |E|\) denote the total number of nodes and edges in the network graph \(G\) and \(|D|\) denotes the total number of demands. What is more, we point out that there exists a practical entanglement distribution protocol along a path, called the *prepare and swap protocol*, which achieves the rates (asymptotically) proposed by path extraction algorithm. ## From the fidelity constraint to the path-length constraint {#fid_to_len} In a quantum network, the fidelity of the EPR-pairs drops with each entanglement swap operation. The fidelity of the output state after a successful swap operation depends on the fidelity of the two input states. If a mixed state \(\rho\) has fidelity \(F\), corresponding to an EPR-pair (say \(|\Psi^+\rangle = \frac{1}{\sqrt{2}}(|00\rangle + |11\rangle)\)) then the corresponding Werner state with parameter \(W\) can be written as follows, \[\begin{aligned} &\rho = W|\Psi^+\rangle \langle ^+\Psi| + \frac{1-W}{4}~\mathbb{I}_4, \end{aligned}\] where \(\mathbb{I}_4\) is the identity matrix of dimension \(4\). The fidelity of this state is \(\frac{1+3W}{4}\). In this paper we assume that all the mixed entangled states in the network are Werner states. The main reason is that Werner states can be written as mixing with isotropic noise and hence form the worst case assumption. For the Werner states, if a node performs a noise-free entanglement swap operation between two EPR-pairs with fidelities \(F\), then the fidelity of the resulting state is \(\frac{1+3W^2}{4}\) which is equal to \(1+ \frac{3}{4}\left(\frac{4F-1}{3}\right)^2\). Here, each demand \((s_i,e_i,F_i)\) (where \(1\leq i\leq |D|=k\)) has \(F_i\) as the end-to-end fidelity requirement. We assume that the fidelity of each of the elementary pairs is lower bounded by a constant \(F\). Note that, in our model, we do not consider entanglement distillation, so in order to have a feasible solution, here we always assume that the fidelity requirement of the \(i\)-th demand, \(F_i\) is at most the fidelity of the elementary pair \(F > 0.5\). Corresponding to a demand \((s_i,e_i,F_i)\), if we start generating the EPR-pairs along a path \(p = ((s_i,u_1), (u_1,u_2), \ldots, (u_{|p|-1},e_i))\), then the total number of required entanglement swap operations is \(|p|-1\), where the path-length is \(|p|\). As with each swap operation the fidelity drops exponentially, this implies the end-to-end fidelity will be \(\frac{1+3W^{|p|}}{4} = 1+ \frac{3}{4}\left(\frac{4F-1}{3}\right)^{|p|}\). In order to satisfy the demand, \(1+ \frac{3}{4}\left(\frac{4F-1}{3}\right)^{|p|}\) should be greater than \(F_i\), i.e., \(1+ \frac{3}{4}\left(\frac{4F-1}{3}\right)^{|p|} \geq F_i\). From this relation, we get the following constraint on the length of the path. \[\label{path_length} |p| \leq \left\lfloor\frac{\log \left(\frac{4F_i-1}{3}\right)}{\log \left(\frac{4F-1}{3}\right)}\right\rfloor.\] This implies, for the \(i\)-th demand all the paths should have length at most \(\left\lfloor\frac{\log \left(\frac{4F_i-1}{3}\right)}{\log \left(\frac{4F-1}{3}\right)}\right\rfloor\). In the rest of the paper, for the \(i\)-th demand we assume, \[\label{len_const} l_i := \left\lfloor\frac{\log \left(\frac{4F_i-1}{3}\right)}{\log \left(\frac{4F-1}{3}\right)}\right\rfloor.\] Using this constraint on the number of intermediate repeaters, we can rewrite the demand set \(D\) in following way, \[\label{eq:dem_len} D = \{(s_1,e_1,l_1), \ldots, (s_k,e_k,l_k)\}.\] ## LP-formulation {#lp_form} In this section, we construct the LP-formulation for computing the maximum flow in a quantum network. For the simplicity, we consider the network \(G=(V,E,C)\) as a directed graph and construct all the LP-formulations accordingly. Note that, one can easily extend our result to an undirected graph, just by converting each of the edges which connects two nodes \(u,v\) in the undirected graph into two directed edges \((u,v)\) and \((v,u)\). For the entanglement distribution rate, here we let the achievable rate between two end nodes \(s_i,e_i \in V\) along a repeater chain (or a path) \(p = ((s_i,u_1), (u_1,u_2), \ldots, (u_{|p|-1},e_i))\) be \(r_p\) such that, \[\label{eq:rate} r_p \leq (q)^{|p|-1}\text{Min}\{C(s_i,u_1), \ldots ,C(u_{|p|-1},e_i)\},\] where \(C(u,v)\) denotes the capacity of the edge \((u,v)\in E\) and \(|p|\) is the length of the path and \(q\) is the success probability of the BSM. Later, in section [4](#meth){reference-type="ref" reference="meth"} we show that there exists a practical protocol called prepare and swap which achieves this rate requirement along a path. For an idea of such protocol we refer to the example of figure [\[exam0\]](#exam0){reference-type="ref" reference="exam0"}. In the next section, we give the LP-construction of the edge-based formulation. ### Edge-based formulation {#lbf_net} In this section, we give the edge-based formulation for solving the rate maximisation problem. In this formulation, we assign one variable to each of the edges of the network. As the total number of edges, \(|E|\), in a graph of \(|V|\) nodes scales quadratically with the number of nodes in the graph, the total number of variables is polynomial in \(|V|\). This makes the edge-based formulation efficient. However, it is challenging to formulate the path-length constraint in this formulation. The main reason is that, an edge can be shared by multiple paths of different lengths and the variables of the edge-based formulation corresponding to that edge do not give any information about the length of the paths. In this paper, we borrow ideas from the length-constrained multi-commodity flow to handle this problem. In order to implement the length constraint we need to modify the network graph \(G\) as well as the demand set \(D\). In the next section, we show how to modify the network graph and the demand set. **Network modification.** To implement the length constraint in the edge-based formulation, we define an expanded graph \(G' = (V',E', C')\) from \(G = (V,E,C)\) such that it contains \(l_{\mathrm{max}} +1\) copies of each of the nodes, where \(l_{\mathrm{max}} = \max\{l_1, \ldots, l_k\}\) and for all \(1\leq i \leq k\), \(l_i\) denotes the length constraint of the \(i\)-th demand \((s_i,e_i,l_i)\). For a node \(u \in V\), we denote the copies of \(u\) as \(u^0,u^1, \ldots, u^{l_{\mathrm{max}}}\). We denote \(V^j\) as the collection of the \(j\)-th copy of all the nodes. This implies, \(V' = \bigcup_{j=0}^{l_{\mathrm{max}}}V^j\). For each edge \((u,v) \in E\) and for each \(0\leq j < l_{\mathrm{max}}\), we connect \(u^j \in V'\) and \(v^{j+1} \in V'\) with an edge, i.e., \((u^j, v^{j+1}) \in E'\). For each edge \((u^j,v^{j+1}) \in E'\) we define \(C'(u^j,v^{j+1}) := C(u,v)\). In figure [\[exam3\]](#exam3){reference-type="ref" reference="exam3"} we give an example of this extension procedure corresponding to a network graph of figure [\[exam_glob\]](#exam_glob){reference-type="ref" reference="exam_glob"}. According to this construction, the length of all the paths in \(G'\) from \(s^0_i\) to \(e^j_i\) is exactly \(j\) and all the paths from \(s^0_i\) to \(e^1_i, \ldots, e^{l_i}_i\) have a path-length at most \(l_i\). This implies, for the edge formulation, the \(i\)-th demand \((s_i,e_i,l_i)\) can be decomposed into \(l_i\) demands \(\{(s^0_i,e^1_i), \ldots, (s^0_i,e^{l_i}_i)\}\). This implies the total modified demand set would become, \[\label{mod_dem} D_{\mathrm{mod}} := \{D_1, \ldots, D_{k}\},\] where for each \(1 \leq i \leq k\), \(D_i = \{(s^0_i,e^1_i), \ldots, (s^0_i,e^{l_i}_i)\}\). Note that, the new demand set \(D_{\mathrm{mod}}\) doesn't have any length or fidelity constraint. **Edge-based formulation.** Here, we give the exact LP-construction of the edge-based formulation. Note that, one can use a standard LP-solver (in this paper we use Python 3.7 pulp class ) to solve this LP (see figure [\[graph_exam_surf\]](#graph_exam_surf){reference-type="ref" reference="graph_exam_surf"} for an example). In this LP-construction, for the \(i,j\)-th demand \((s^0_i,e^j_i) \in D_i\) (where \(D_i \in D_{\mathrm{mod}}\)), we define one function \(g_{ij}: E' \rightarrow \mathbb{R}^+\). The value of this function \(g_{ij}(u,v)\), corresponding to an edge \((u,v) \in E'\) denotes the flow across that edge for the \(i,j\)-th demand. We give the edge-based formulation in table [\[EBF\]](#EBF){reference-type="ref" reference="EBF"}. In the objective function equation [\[edge_form_plen3\]](#edge_form_plen3){reference-type="ref" reference="edge_form_plen3"} of the edge-based formulation, the sum \(\sum_{\substack{v^1:(s^0_i,v^1) \in E'}}g_{ij}(s^0_i,v^1)\) denotes the entanglement distribution rate between \(s^0_i,e^j_i\), for a fixed \(i,j\), when \((q) = 1\). Note that, according to the construction of the graph \(G'\), all the paths between \(s^0_i,e^j_i\) have path-length exactly \(j\). This implies that \((q)^{j-1}\sum_{\substack{v^1:(s^0_i,v^1) \in E'}}g_{ij}(s^0_i,v^1)\) denotes the entanglement distribution rate between \(s^0_i,e^j_i\) and \(\sum_{i=1}^k\sum_{j=1}^{l_i} (q)^{j-1}\sum_{\substack{v^1:(s^0_i,v^1) \in E'}} g_{ij}(s^0_i,v^1)\) denotes the total entanglement distribution rate for all the demands. The condition in equation [\[const_edge32\]](#const_edge32){reference-type="ref" reference="const_edge32"} represents the capacity constraint and condition equation [\[const_edge33\]](#const_edge33){reference-type="ref" reference="const_edge33"} denotes the flow conservation property. Although this construction is efficient, it does not give any intuition whether it will solve the rate maximisation problem. In section [4](#meth){reference-type="ref" reference="meth"} we give another intuitive LP-formulation, called *path-based formulation* and we explain the equivalence between the path-based and the edge-based formulation. This proof guarantees that the solution of the edge-based formulation gives a solution for the rate maximisation problem. ### Path-extraction algorithm {#sec:path_extrac} The edge-based formulation, proposed in the last section is a compact LP construction and it can be solved in polynomial time. However, this solution only gives the total achievable rates for all the commodities, it does not give us any information about the set of paths corresponding to each commodity along which one should distribute the EPR-pairs to maximise the entanglement distribution rate. In this section, we give an efficient method for doing so in algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"}, which takes the solution of the edge-based formulation and produces a set of paths as well as the achievable rates across each path for each of the demands. Later, in section [4](#meth){reference-type="ref" reference="meth"} we show that the set of extracted paths satisfies the path-length constraint for each of the demands and if one uses the prepare and swap method for distributing entanglement across each of the paths then one can achieve the entanglement distribution rate suggested from this algorithm. ### Example In this section, we give an example of our algorithms on a real world network topology \(G = (V,E,C)\). In order to do so, we choose a SURFnet topology from the *internet topology zoo*. This is a publicly available example of a dutch classical telecommunication network, with \(50\) nodes (see figure [\[exam_surf\]](#exam_surf){reference-type="ref" reference="exam_surf"}). In this network, we assume that each of the nodes in the network is an atomic ensemble and linear optics-based quantum repeater. These types of repeaters can generate elementary pairs almost deterministically, due to their multiplexing abilities. Here we assume that the elementary pair generation is a deterministic process. The elementary pair generation rate depends only on the entanglement source and its efficiency. Here, we choose the elementary pair generation rate uniformly randomly from \(1\) to \(400\) EPR-pairs per second. The success probability for the BSM, \(q\) is considered to be \(0.5\) for all the nodes. We also assume that the memory efficiency is one and all the memories are on-demand memories, i.e., they can retrieve the stored EPR-pairs whenever required. We additionally assume that the minimum storage time of all the memories is the maximum round trip communication time between any two nodes in the network that are directly connected by an optical fiber. In the SURFnet network, the maximum length of the optical fiber connecting any two nodes is \(50\) km. Hence, the minimum storage time is \(\frac{2\times 50000}{c} = 500 \mu s\), where \(c\) is the speed of light in a telecommunication fiber, which is approximately \(c \approx 2\times 10^8\) meters per second. In this example, we consider the fidelity of all elementary pairs to be \(F = 0.9925\). We generate the demands uniformly at random, i.e., we choose the sources and the destinations uniformly at random between \(1\) and \(50\). We also choose the end-to-end fidelity randomly from \(0.93\) to \(0.99\) for each of the demands. Substituting these fidelity constraints in equation [\[len_const\]](#len_const){reference-type="ref" reference="len_const"}, we obtain a maximum path-length \(l_{\text{max}} = 8\). Here, we have generated only four demands and we assume that all the entanglement distribution tasks are performed in parallel. We optimise the total achievable rate using the LP solver available in the Python \(3.7\) pulp class. The rates and the paths corresponding to the four demands are shown in figure [\[graph_exam_surf\]](#graph_exam_surf){reference-type="ref" reference="graph_exam_surf"}. An overview of the entire procedure is given in algorithm [\[qpce\]](#qpce){reference-type="ref" reference="qpce"} and the code of this implementation is publicly available in and the data set can be found in. # Methods {#meth} In this section, we provide more details of the results, presented in the last section. First we propose an intuitive LP-construction, called path-based formulation for solving the rate maximisation problem. Later, we give an idea about how to prove the equivalence between both of the proposed LP-constructions. Next, we explain the prepare and swap protocol in detail and show that using this protocol one can achieve the optimised entanglement generation rates along the paths from algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"}. We finish this section with the complexity analysis of the edge-based formulation and algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"}. ## Path-based formulation {#p_form_prep_swap} In this formulation, for each path \(p\) corresponding to each source-destination pair \(s_i,e_i\), we define one variable \(r_p\). This \(r_p\) denotes the achievable rate between \(s_i,e_i\) along the path \(p\). From equation [\[eq:rate\]](#eq:rate){reference-type="ref" reference="eq:rate"}, we have, for all \((u,v) \in p\), \[r_p \leq (q)^{|p|-1}C(u,v)\] Note that, for the \(i\)-th demand the total rate \(r_i\) can be achieved via multiple paths. Let \(\mathcal{P}_i\) be the set of all possible paths which connect \(s_i\) and \(e_i\), hence, \[r_i =\sum_{p \in \mathcal{P}_{i}} r_p.\] From equation [\[eq:dem_len\]](#eq:dem_len){reference-type="ref" reference="eq:dem_len"}, we have that for all the paths \(p \in \mathcal{P}_i\), \(|p|\leq l_i\). We give the exact LP-formulation which takes into account all these constraints in table [\[path_form_normal\]](#path_form_normal){reference-type="ref" reference="path_form_normal"}. Note that, in this LP-formulation, as we introduce one variable corresponding to each path so the total number of variables is of the order \(O(|V|!)\). This scaling stops us from using the path-based formulation for solving the maximum flow problem. However, this formulation helps us to prove that the edge-based formulation gives a solution to the rate maximisation problem. In the next section, we give an idea of the proof. The full details of the proof are given in the supplementary material. ## Equivalence between the two formulations {#ref:equiv} The idea of the proof of equivalence is that, first we try to construct a solution of the edge-based formulation from the solution of the path-based formulation and then we try to construct a solution of the path-based formulation from the edge-based formulation. If both of the constructions are successful then we can conclude that both of the formulations are equivalent. In table [\[path_form_normal\]](#path_form_normal){reference-type="ref" reference="path_form_normal"} we provide the path-based formulation on the basis of the network graph \(G = (V,E,C)\) and the demand set \(D\), whereas in table [\[EBF\]](#EBF){reference-type="ref" reference="EBF"} we propose the edge-based formulation using the network graph \(G' = (V',E',C')\) and the demand set \(D_{\mathrm{mod}}\). In order to show the equivalence between both of the formulations, we first need to rewrite the path-based formulation using the network graph \(G' = (V',E',C')\) and the demand set \(D_{\mathrm{mod}}\). The next section focuses on this. After that, we focus on proving the equivalence. ### Path-based formulation on the modified network {#p_form_prep_swap} In this section, we construct the path-based formulation on the basis of the new demand set \(D_{\mathrm{mod}}\), defined in equation [\[mod_dem\]](#mod_dem){reference-type="ref" reference="mod_dem"} and the modified network \(G' = (V',E',C')\). In this demand set, we use the term \(i,j\)-th demand to denote the \(j\)-th source destination pair \((s^0_i,e^j_i)\) of the \(i\)-th demand \((s_i,e_i) \in D\). We denote the set of all possible paths for the \(i,j\)-th demand as \(\mathcal{P}_{i,j}\) and we assign a variable \(r_p\), corresponding to each path \(p \in \mathcal{P}_{i,j}\). From equation [\[eq:rate\]](#eq:rate){reference-type="ref" reference="eq:rate"} we have, for all the edges \((u',v') \in E'\) in a path \(p\), \[r_p \leq (q)^{|p|-1}C'(u',v').\] Note that, from the construction of \(G'\) and the new demand set \(D_{\mathrm{mod}}\), the length of all the paths in \(\mathcal{P}_{i,j}\) is \(j\). This implies, if \(\mathcal{P}_i\) denotes the set of all possible paths for the \(i\)-th demand \((s_i,e_i,l_i)\in D\), then \(\mathcal{P}_i = \bigcup_{j=1}^{l_i} \mathcal{P}_{i,j}\). For a fixed source-destination pair \((s_i,e_i)\), if along a path \(p\), the achievable rate is \(r_p\) then, \[r_i = \sum_{j=1}^{l_i} \sum_{p \in \mathcal{P}_{i,j}} r_p.\] We give the exact formulation in table [\[path_form\]](#path_form){reference-type="ref" reference="path_form"}. ### Path-based formulation to edge-based formulation {#pe_prep_swap} In this section we construct a solution of the edge-based formulation from the solution of the path-based formulation. In the edge-based formulation, we construct a new demand set \(D_{\mathrm{mod}}\), where the \(i\)-th demand \((s_i,e_i,l_i)\) in the original demand set \(D\) is decomposed into \(l_i\)-demands \((s^0_i,e^1_i), \ldots, (s^0_i,e^{l_i}_i)\). Recall that, the quantity \(l_i\) denotes the upper bound on the discovered path-length which reflects the lower bound on the required end-to-end fidelity of the EPR-pairs generated between \(s_i\) and \(e_i\) (See section [3.2](#fid_to_len){reference-type="ref" reference="fid_to_len"} for the details). Here, each of the \((s^0_i,e^j_i)\) are the nodes in the modified graph \(G'\). From the construction of \(G'\), it is clear that all the paths from \(s^0_i\) to \(e^j_i\) have length \(j\). If we have the solutions of the path formulation, proposed in table [\[path_form\]](#path_form){reference-type="ref" reference="path_form"}, then from there, for each edge \((u',v') \in E'\) and for the \(i,j\)-th demand \((s^0_i,e^j_i)\) we define the value of \(\tilde{g}_{ij}(u,v)\) as, \[\label{eq_gij_prep_swap} \tilde{g}_{ij}(u',v') := \sum_{\substack{p \in P_{i,j}, \\ (u',v') \in p}} \frac{r_p}{(q)^{j-1}}.\] One can easily check that the definition of \(\tilde{g}_{ij}\), defined in equation [\[eq_gij_prep_swap\]](#eq_gij_prep_swap){reference-type="ref" reference="eq_gij_prep_swap"} satisfies all the constraints of the edge-based formulation, proposed in the equations [\[const_edge31\]](#const_edge31){reference-type="ref" reference="const_edge31"}, [\[const_edge32\]](#const_edge32){reference-type="ref" reference="const_edge32"}, [\[const_edge33\]](#const_edge33){reference-type="ref" reference="const_edge33"}. Moreover, with this definition of the \(\tilde{g}_{ij}\), the objective function (equation [\[edge_form_plen3\]](#edge_form_plen3){reference-type="ref" reference="edge_form_plen3"}) of the edge-based formulation becomes same as the objective function of the path-based formulation. This shows that, the optimal value of the edge-based formulation is at least as good as the solution of the path-based formulation. ### Edge-based formulation to path-based formulation {#etp_prep_swap} Here, we construct a solution of the path-based formulation from the solution of the edge-based formulation. We use the algorithm, proposed in algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"} for extracting the paths and corresponding rate along that path. In the algorithm we compute the rate \(\tilde{r}_{p_{j,m}}\) corresponding to a path \(p_{j,m}\) for a demand \((s^0_i,e^j_i) \in D_{\mathrm{mod}}\) as follows, \[\label{prep_swap_rate} \tilde{r}_{p_{j,m}} := (q)^{j-1}\text{Min}_{(u',v')\in p_{j,m}}\{F_{i,j,m}(u',v')\},\] where the function \(F_{i,j,m}(u',v')\) is related to \(g_{i,j}(u',v')\) and \(\tilde{r}_{p_{j,m}}\). Here, \(F_{i,j,0} = g_{i,j}\) and for all \(m \geq 0\) we compute \(F_{i,j,m+1}\) as follows, \[\label{prep_swap_update} \forall (u,v) \in p_{j,m}~~F_{i,j,m+1}(u',v')= F_{i,j,m} (u',v')-\frac{\tilde{r}_{p_{j,m}}}{(q)^{j-1}}.\] We give a detailed proof of the fact that the paths as well as the allocated rate corresponding to each path, extracted from algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"} corresponds to the feasible solution of the path-based formulation in the appendix [\[app_etp_prep_swap\]](#app_etp_prep_swap){reference-type="ref" reference="app_etp_prep_swap"}. Moreover, if we consider the equation [\[prep_swap_rate\]](#prep_swap_rate){reference-type="ref" reference="prep_swap_rate"} as the definition \(\tilde{r}_{p_{j,m}}\) then the objective function of the edge-based formulation is same as the objective function of the edge-based formulation. This shows that this is a valid solution of the path-based formulation. In the last section we showed that the solution of the path-based formulation is at least as good as the solution of the edge-based formulation. Hence, the solutions of both of the formulations are equivalent. ## Prepare and swap protocol and the LP-formulations In this section, we explain the prepare and swap protocol and show that with this protocol one can achieve the entanglement distribution rate along a path, proposed by algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"}. In the next section we explain the protocol for a repeater chain with a single demand. After that we extend the protocol for the case for multiple demands. ### Prepare and swap protocol for a repeater chain Suppose in a repeater chain \(u_0=s, u_1, \ldots, u_n, u_{n+1} = e\), where for all \(0 \leq i \leq n\), the nodes \(u_{i},u_{i+1}\) are neighbours of each other and \(s\) would like to share EPR-pairs with \(e\). In this protocol, first, all the repeaters generate entanglement with its neighbours/neighbour in parallel and store the entangled links in the memory. Here we assume that entanglement generation across an elementary link is a deterministic event, i.e., the entanglement generation probability per each attempt is one. An intermediate node \(u_i\) which resides between \(u_{i-1}\) and \(u_i\), performs the swap operation when both of the EPR-pairs between \(u_{i-1},u_i\) and \(u_i, u_{i+1}\) are ready. As we assume that each of the swap operations is probabilistic, so the entanglement generation rate with this protocol is lower. However, due to the independent swap operations, the protocol doesn't need a long storage time. This makes the protocol more practical. We give an example of such an entanglement generation protocol on a repeater chain with three intermediate nodes and one source-destination pair in figure [\[exam0\]](#exam0){reference-type="ref" reference="exam0"}. In the next lemma, we derive an analytical expression of the end-to-end entanglement generation rate in a repeater chain network for the prepare and swap protocol. Note that, a variant of the proof of lemma [\[egr_prep_swap\]](#egr_prep_swap){reference-type="ref" reference="egr_prep_swap"} can be found in the literature. For completeness, in the supplementary material we include the proof of this lemma. Notice that the EPR-pair generation rate for this protocol is exactly same as the EPR-pair generation rate, proposed in equation [\[eq:rate\]](#eq:rate){reference-type="ref" reference="eq:rate"}, which we use for the path-based formulation. In the previous sections we show that both of the path-based and the edge-based formulations are equivalent. This implies, the rates extracted from algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"} can be achieved with this prepare and swap protocol. ### Prepare and swap protocol for an arbitrary network In a quantum network if there are multiple demands then one link might be shared between multiple paths. From algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"} we get the set of paths and the desired EPR-pair generation rate \(r_p\), across each of the paths \(p\), passing through an edge \((u,v)\). In this scenario we use the prepare and swap protocol for each of the paths in a sequential manner or round-robin manner[^3]. From lemma [\[egr_prep_swap\]](#egr_prep_swap){reference-type="ref" reference="egr_prep_swap"} we get that, to achieve the rate \(r_p\), we need to generate on average \(\frac{r_p}{(q)^{|p|-1}}\) elementary EPR-pairs per second across each of the elementary links \((u,v)\) along the path \(p\). Here we also assume that the elementary link generation is a deterministic event, i.e., the two nodes \(u\) and \(v\) connecting the elementary link \((u,v)\) can generate exactly \(C(u,v)\) EPR-pairs per second. Hence, each of the paths uses the elementary link \((u,v)\) for \(\frac{r_p}{(q)^{|p|-1}C(u,v)}\) seconds (on average) for generating the required elementary EPR-pairs[^4]. For generating \(r_p\) EPR-pairs per second, all the nodes along the path \(p\) need to use the elementary links for at most \(\max_{(u,v)\in p}\left\{\frac{r_p}{(q)^{|p|-1}C(u,v)}\right\}\) seconds, which is equal to \(\frac{r_p}{(q)^{|p|-1}}\frac{1}{\text{Min}_{(u,v)\in p}\{C(u,v)\}}\) seconds. This gives an upper bound on the average storage time of the quantum memory for generating the EPR-pairs along the path \(p\). In figure [\[exam1\]](#exam1){reference-type="ref" reference="exam1"} we give an example of allocating EPR-pair generation resources for multiple demands. ## Complexity analysis {#complex_seq_swap_wo_fid} In this section, we analyse the complexity of the LP formulations as well as the path-extraction and rate allocation algorithm (algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"}). The edge-based LP-formulation, proposed in this paper is based on the modified network graph \(G'\) and modified demand set \(D_{\mathrm{mod}}\) and the running time of the edge-based LP-formulation solver depends on the size of this network and modified demand set. In the next lemma we give an upper bound on the size of \(G'\) and \(D_{\mathrm{mod}}\). The previous lemma implies that the total number of variables and constraints in the LP-formulation corresponding to the maximum flow problem scales polynomially with the number of nodes in the network graph \(G\). This implies, the time complexity of the LP solvers for this problem also scales polynomially with the number of nodes in the network graph \(G = (V,E,C)\). Hence, one can compute the maximum achievable rate for the quantum internet in polynomial time. Now we focus on the complexity of algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"}. The algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"} uses the solution of the edge-based formulation for extracting the set of paths for each of the demands. In the next proposition, we show that the size of the set of extracted paths corresponding to each demand is upper bounded by \(|V||E|\). Then we use this result for computing the running time of algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"}. In the next theorem we show that, running time of algorithm [\[flow_dec3\]](#flow_dec3){reference-type="ref" reference="flow_dec3"} is \(O(|D||V|^4|E|)\). # Conclusion {#concl} In this paper, we use techniques from the length constrained multi-commodity flow theory for developing a polynomial-time algorithm for maximising achievable expected entanglement generation rate between multiple source-destination pairs in a quantum internet. Here, we have maximised the end-to-end entanglement distribution rate, satisfying a constraint on the end-to-end fidelity for each of the demand. We have shown that our LP-formulation provides a maximal solution if it exists. Our path extraction algorithm produces a set of paths and the achievable rates along each of the paths. The path-extraction algorithm has high running time as a function of the path-length. Here we consider the worst case scenarios, where we assume that the length of the discovered path scales with \(|V|\). In practical scenarios, without distillation, the end-to-end fidelity of the distributed EPR-pairs would drop drastically with the path-length. Hence, it is fair to consider that the length of the allowed path increases slowly with the size of the network node set. This would make the path-extraction algorithm faster. One can use any entanglement generation protocol for distributing EPR-pairs across the paths that are discovered by the path-extraction algorithm. However, our LP-formulation is inspired from the atomic ensemble and linear optics based quantum repeaters, where the storage time is very short and the entanglement swap operation is probabilistic in nature. Here, we have also pointed out that, there exists a practical protocol, called prepare and swap protocol, which can be implemented using atomic ensemble based repeaters and if one uses this protocol for distributing entanglement across each of the paths, then one can generate EPR-pairs with the rate proposed by our path-extraction algorithm. In this paper, we focus on maximising the end-to-end entanglement generation rate. However, one can easily extend our results for other objective functions, like minimising the weighted sum of congestion at edges. In future work, it would be interesting to include the more realistic parameters like the bounded storage capacity, time to perform the swap operation, etc., in our model and modify our current formulations to come up with more sophisticated routing algorithms. The proposed LP-formulations give an optimal achievable EPR-pairs distribution rate with respect to prepare and swap protocol. This protocol is practical and require very less amount of quantum storage time. However, there exist more sophisticated protocol which can achieve higher EPR-pairs distribution rate but require higher quantum storage time. Another interesting future research direction would be to find out a protocol for distributing EPR-pairs along a chain which achieves the optimal EPR-pair generation rate and find an LP-formulation for such protocol. [^1]: Assuming that the intermediary repeater nodes do not lose packets while processing them. [^2]: Entanglement swapping is an important tool for establishing entanglement over long-distances. If two quantum repeaters, \(A\) and \(B\) are both connected to an intermediary quantum repeater \(r\), but not directly connected themselves by a physical quantum communication channel such as fiber, then \(A\) and \(B\) can nevertheless create entanglement between themselves with the help of \(r\). First, \(A\) and \(B\) each individually create entanglement with \(r\). This requires one qubit of quantum storage at \(A\) and \(B\) to hold their end of the entanglement, and two qubits of quantum storage at \(r\). Repeater \(r\) then performs an entanglement swap, destroying its own entanglement with \(A\) and \(B\), but instead creating entanglement between \(A\) and \(B\). This process can be understood as repeater \(r\) teleporting its qubit entangled with \(A\) onto repeater \(B\) using the entanglement that it shares with \(B\). [^3]: One can use a more sophisticated scheduling algorithm for allocating the EPR-pair generation resources across an elementary link. The details of this scheduling algorithm are beyond the scope of this paper. [^4]: Note that, if \(\frac{r_p}{(q)^{|p|-1}}\) is a rational number then one can always achieve this average rate. For an irrational value of \(\frac{r_p}{(q)^{|p|-1}}\) we need to approximate it to a rational number.
{'timestamp': '2020-06-01T02:03:42', 'yymm': '2005', 'arxiv_id': '2005.14304', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14304'}
# Introduction   Clifford analysis is introduced as a generalization of complex function theory to the higher dimensional cases. Many researchers have successfully generalized the theory of one dimensional complex analysis to the higher dimension cases via Clifford analysis. For instance, the function theory of quaternion analysis is applied to study some boundary value problems in three or four dimensional spaces in. Many important properties and problems, such as integral formulas, series expansion, integral transforms and boundary value problems, have been generalized to higher dimensions as well in. The higher spin theory in Clifford analysis is the theory on functions taking values in irreducible representations of the spin group. These representation spaces are usually realized as spaces of homogeneous harmonic or monogenic (null solutions of the Dirac operator) polynomials. The study on this topic can be traced back to the work of Stein and Weiss given in. Stein and Weiss introduced a technique to construct first order conformally invariant differential operators, named as Stein-Weiss gradients, with a certain type of projections. Bureš et. al. investigated a class of generalized Rarita-Schwinger operators acting on functions taking values in irreducible representations of the spin group with weight \(k+1/2\) via Clifford analysis in 2002. These Rarita-Schwinger type operators were also studied by Dunkl et. al. with an analytic approach. In these two papers, one can notice that Rarita-Schwinger operators and the Dirac operator have very similar properties, such as Cauchy's Theorem, Cauchy's integral formula, Stokes' Theorem, etc. Therefore, Rarita-Schwinger operators are also considered as generalizations of the Dirac operator in the higher spin theory. In 2016, Eelbode et. al. and De Bie et. al. introduced generalizations of the Laplace operator with respect to the conformal invariance property in the higher spin theory. These differential operators are named as bosonic Laplacians ( the higher spin Laplace operators) or the generalized Maxwell operators, which are special cases of bosonic Laplacians. It is reasonable to expect bosonic Laplacians also have similar properties as the Laplace operator has. In, the authors discovered intertwining operators, a Borel-Pompeiu formula and a Green type integral formula for bosonic Laplacians. Recently, the authors also studied Dirichlet problems for bosonic Laplacians in the upper-half space and the unit ball. Further, many important properties, such as the mean-value property, Cauchy's estimates and Liouville's Theorem, for null solutions to bosonic Laplacians have been found in. Here, we continue our investigation on properties of bosonic Laplacians in Euclidean space. **Main results:** In this paper, we firstly look into the generalized Maxwell operators by generalizing classical Maxwell equations to the higher spin spaces in Section \(2\). This provides us the motivation for studying the generalized Maxwell operators and bosonic Laplacians. Some preliminaries of Clifford analysis setting, Rarita-Schwinger operators and bosonic Laplacians will also be introduced here as well. In Section \(3\), we use some properties of Rarita-Schwinger operators and their connections to bosonic Laplacians to solve Poisson's equation in the higher spin spaces. Section \(4\) will be devoted to introducing Green's formulas in the higher spin spaces, which reveal that bosonic Laplacians are self-adjoint with respect to a given \(L^2\) inner product. As in the harmonic anlysis, these formulas can possibly be applied in our future work on constructing Green's functions for solving certain boundary value problems. # Preliminaries ## Notations Suppose that \(\{e_1,\cdots,e_m\}\) is a standard orthonormal basis for the \(m\)-dimensional Euclidean space \(\mathbb{R}^m\). The (real) Clifford algebra \(\mathcal{C}l_m\) is generated by \(\mathbb{R}^m\) with the relationship \(e_ie_j+e_je_i=-2\delta_{i,j},\ 1\leq i,j\leq m.\) This implies that an element of the basis of the Clifford algebra can be written as \(e_A=e_{j_1}\cdots e_{j_r},\) where \(A=\{j_1, \cdots, j_r\}\subset \{1, 2, \cdots, m\}\) and \(1\leq j_1< j_2 < \cdots < j_r \leq m.\) Hence any element \(a\in \mathcal{C}l_m\) can be represented by \(a=\sum_Aa_Ae_A\), where \(a_A\in \mathbb{R}\). In particular, \(\boldsymbol{e}_{\emptyset}=1\) and we call \(a_{\emptyset}=Scr(a)\) the scalar part of \(a\). The \(m\)-dimensional Euclidean space \(\mathbb{R}^m\) is embedded into \(\mathcal{C}l_m\) as follows. \[\begin{aligned} \mathbb{R}^m&&\longrightarrow\quad \mathcal{C}l_m,\\ (x_1,\cdots,x_m)&&\ \mapsto\quad \sum_{j=1}^mx_je_j. \end{aligned}\] Hence, for \(\boldsymbol{x}\in\mathbb{R}^m\), one can easily see that \(\|\boldsymbol{x}\|^2=\sum_{j=1}^mx_j^2=-\boldsymbol{x}^2\). For \(a=\sum_Aa_Ae_A\in\mathcal{C}l_m\), we define the reversion of \(a\) as \[\begin{aligned} \widetilde{a}=\sum_{A}(-1)^{|A|(|A|-1)/2}a_Ae_A, \end{aligned}\] where \(|A|\) is the cardinality of \(A\). In particular, \(\widetilde{e_{j_1}\cdots e_{j_r}}=e_{j_r}\cdots e_{j_1}\). Also \(\widetilde{ab}=\widetilde{b}\widetilde{a}\) for \(a, b\in\mathcal{C}l_m\). Now suppose \(\boldsymbol{a}\in \mathbb{S}^{m-1}\subseteq \mathbb{R}^m\) and \(\boldsymbol{x}\in\mathbb{R}^m\). If we consider \(\boldsymbol{a}\boldsymbol{x}\boldsymbol{a}\), we may decompose \[\boldsymbol{x}=\boldsymbol{x}_{\boldsymbol{a}\parallel}+\boldsymbol{x}_{\boldsymbol{a}\perp},\] where \(\boldsymbol{x}_{\boldsymbol{a}\parallel}\) is the projection of \(\boldsymbol{x}\) onto \(\boldsymbol{a}\) and \(\boldsymbol{x}_{\boldsymbol{a}\perp}\) is the remainder part of \(\boldsymbol{x}\) perpendicular to \(\boldsymbol{a}\). Hence \(\boldsymbol{x}_{\boldsymbol{a}\parallel}\) is a scalar multiple of \(a\) and we have \[\boldsymbol{a}\boldsymbol{x}\boldsymbol{a}=\boldsymbol{a}\boldsymbol{x}_{\boldsymbol{a}\parallel}\boldsymbol{a}+\boldsymbol{a}\boldsymbol{x}_{\boldsymbol{a}\perp}\boldsymbol{a}=-\boldsymbol{x}_{\boldsymbol{a}\parallel}+\boldsymbol{x}_{\boldsymbol{a}\perp}.\] So the action \(\boldsymbol{a}\boldsymbol{x}\boldsymbol{a}\) describes a reflection of \(x\) in the direction of \(\boldsymbol{a}\). More details can be found in, for instance,. The classical Dirac operator is defined as \(D_{\boldsymbol{x}}=\sum_{j=1}^m\partial_{x_j}e_j\), which factorizes the Laplace operator \(\Delta_{\boldsymbol{x}}=-D_{\boldsymbol{x}}^2\). A \(\mathcal{C}l_m\)-valued function \(f(\boldsymbol{x})\) defined on a domain \(\Omega\) in \(\mathbb{R}^m\) is called *left monogenic* if it satisfies \(D_{\boldsymbol{x}}f(\boldsymbol{x})=0\) in \(\Omega\). Since multiplication of Clifford numbers is not commutative in general, there is a similar definition for right monogenic functions. ## Rarita-Schwinger type operators Let \(\mathcal{H}_k(\mathcal{C}l_m)\ (\mathcal{M}_k(\mathcal{C}l_m))\) stand for the space of Clifford-valued harmonic (monogenic) polynomials homogeneous of degree \(k\). Notice that if \(h_k(\boldsymbol{u})\in\mathcal{H}_k(\mathcal{C}l_m)\), then \(D_{\boldsymbol{u}}h_k(\boldsymbol{u})\in\mathcal{M}_{k-1}(\mathcal{C}l_m)\), but \(D_{\boldsymbol{u}}\boldsymbol{u} p_{k-1}(\boldsymbol{u})=(-m-2k+2)p_{k-1}(\boldsymbol{u}),\) where \(p_{k-1}(\boldsymbol{u})\in \mathcal{M}_{k-1}(\mathcal{C}l_m)\). Hence, we have \[\begin{aligned} \label{Almansi} \mathcal{H}_k(\mathcal{C}l_m)=\mathcal{M}_k(\mathcal{C}l_m)\oplus \boldsymbol{u}\mathcal{M}_{k-1}(\mathcal{C}l_m),\ h_k=p_k+\boldsymbol{u} p_{k-1}. \end{aligned}\] This is called an *Almansi-Fischer decomposition* of \(\mathcal{H}_k(\mathcal{C}l_m)\). In this decomposition, we have \(P_k^+\) and \(P_k^-\) as the projection maps \[\begin{aligned} &&P_k^+=1+\frac{\boldsymbol{u} D_{\boldsymbol{u}}}{m+2k-2}:\ \mathcal{H}_k(\mathcal{C}l_m)\longrightarrow \mathcal{M}_k(\mathcal{C}l_m), \label{Pk+}\\ &&P_k^-=I-P_k^+=\frac{-\boldsymbol{u} D_{\boldsymbol{u}}}{m+2k-2}:\ \mathcal{H}_k(\mathcal{C}l_m)\longrightarrow \boldsymbol{u}\mathcal{M}_{k-1}(\mathcal{C}l_m) \label{Pk-}. \end{aligned}\] Suppose \(\Omega\) is a domain in \(\mathbb{R}^m\). Consider a differentiable function \(f: \Omega\times \mathbb{R}^m\longrightarrow \mathcal{C}l_m\) such that, for each \(\boldsymbol{x}\in \Omega\), \(f(\boldsymbol{x},\boldsymbol{u})\) is a left monogenic polynomial homogeneous of degree \(k\) in \(\boldsymbol{u}\). Then **the Rarita-Schwinger operator** is defined by \[R_k=P_k^+D_{\boldsymbol{x}}:\ C^{\infty}(\mathbb{R}^m,\mathcal{M}_k(\mathcal{C}l_m))\longrightarrow C^{\infty}(\mathbb{R}^m,\mathcal{M}_k(\mathcal{C}l_m)).\] We also need the following three Rarita-Schwinger type operators. \[\begin{aligned} &&\text{\textbf{The twistor operator:}}\\ && T_k=P_k^+D_{\boldsymbol{x}}:\ C^{\infty}(\mathbb{R}^m,\boldsymbol{u}\mathcal{M}_{k-1}(\mathcal{C}l_m))\longrightarrow C^{\infty}(\mathbb{R}^m,\mathcal{M}_k(\mathcal{C}l_m)),\\ &&\text{\textbf{The dual twistor operator:}}\\ &&T_k^*=P_k^-D_{\boldsymbol{x}}:\ C^{\infty}(\mathbb{R}^m,\mathcal{M}_k(\mathcal{C}l_m))\longrightarrow C^{\infty}(\mathbb{R}^m,\boldsymbol{u}\mathcal{M}_{k-1}(\mathcal{C}l_m)),\\ &&\text{\textbf{The remaining operator:}}\\ && Q_k=P_k^-D_{\boldsymbol{x}}:\ C^{\infty}(\mathbb{R}^m,\boldsymbol{u}\mathcal{M}_{k-1}(\mathcal{C}l_m))\longrightarrow C^{\infty}(\mathbb{R}^m,\boldsymbol{u}\mathcal{M}_{k-1}(\mathcal{C}l_m)). \end{aligned}\] More details can be found in. ## The generalized Maxwell operators In, the authors constructed the generalized Maxwell operators as a type of second order conformally invariant differential operators on particular function spaces. It was also pointed out that these differential operators reduced to the classical source-free Maxwell equations in the Minkowski space. Here, we will show the details that how to obtain the generalized Maxwell operators from the classical source-free Maxwell equations. This gives us the motivation to study these particular type of second order differential operators. Recall that the classical source-free coupled Maxwell equations are given by \[\begin{aligned} &&\nabla\cdot\boldsymbol{E}=0,\ \nabla\times\boldsymbol{E}=-\frac{\partial{\boldsymbol{B}}}{\partial t},\\ && \nabla\cdot\boldsymbol{B}=0,\ \nabla\times\boldsymbol{B}=\mu_0\epsilon_0\frac{\partial\boldsymbol{E}}{\partial t}, \end{aligned}\] Where \(\boldsymbol{E}\) stands for the electric field, \(\boldsymbol{B}\) stands for the magnetic field, \(\boldsymbol{B}\) and \(\boldsymbol{E}\) are both vector fields in \(\mathbb{R}^3\). \(\mu_0\) is the permeability of free space and \(\epsilon_0\) is the permittivity of free space. Since \(\nabla\cdot\boldsymbol{B}=0\), we can define \(\boldsymbol{B}\) in terms of a vector potential \(\boldsymbol{C}\) as \(\boldsymbol{B}=\nabla\times\boldsymbol{C}\). From Maxwell Faraday's equation, one obtains that \(\nabla\times(\boldsymbol{E}+\frac{\partial\boldsymbol{C}}{\partial t})=0\). This means that \(\boldsymbol{E}+\frac{\partial\boldsymbol{C}}{\partial t}\) can be written as the gradient of some scalar function, namely, a scalar potential \(\Phi\). Hence, one has \[\begin{aligned} \label{Electric} \boldsymbol{E}=-\nabla\Phi-\frac{\partial\boldsymbol{C}}{\partial t} \end{aligned}\] with a scalar potential \(\Phi\). Plugging \(\boldsymbol{B}=\nabla\times\boldsymbol{C}\) and \(\boldsymbol{E}=-\nabla\Phi-\frac{\partial\boldsymbol{C}}{\partial t}\) into \(\nabla\cdot\boldsymbol{E}=0,\ \nabla\times\boldsymbol{B}=\mu_0\epsilon_0\frac{\partial\boldsymbol{E}}{\partial t}\), one has \[\begin{aligned} \label{newmax} &&\nabla^2\Phi+\frac{\partial}{\partial t}(\nabla\cdot\boldsymbol{C})=0,\nonumber\\ &&\nabla^2\boldsymbol{C}-\mu_0\epsilon_0\frac{\partial^2\boldsymbol{C}}{\partial^2 t}-\nabla(\nabla\cdot\boldsymbol{C}+\mu_0\epsilon_0\frac{\partial\Phi}{\partial t})=0. \end{aligned}\] Next, we choose a set of potentials \((\boldsymbol{C},\Phi)\) to satisfy the Lorenz condition \(\nabla\cdot \boldsymbol{C}+\mu_0\epsilon_0\frac{\partial\Phi}{\partial t}=0\), which uncouples the pair of equations given in ([\[newmax\]](#newmax){reference-type="ref" reference="newmax"}). Now one has \[\begin{aligned} \nabla^2\Phi-\mu_0\epsilon_0\frac{\partial^2\Phi}{\partial t^2}=0,\ \nabla^2\boldsymbol{C}-\mu_0\epsilon_0\frac{\partial^2\boldsymbol{C}}{\partial t^2}=0. \end{aligned}\] The potentials \(\boldsymbol{C}\) and \(\Phi\) form a 4-vector potential \(\boldsymbol{C}^{\alpha}=(\Phi,\boldsymbol{C})\). Then the two equations above and the Lorenz condition becomes \[\begin{aligned} \square C^{\alpha}=0,\ \partial_{\alpha}A^{\alpha}=0, \end{aligned}\] where \(\square=\nabla^2-\mu_0\epsilon_0\frac{\partial^2}{\partial t^2}\) is the d'Alembert operator. For \(\boldsymbol{E}=-\nabla\Phi-\frac{\partial\boldsymbol{C}}{\partial t}\) and \(\boldsymbol{B}=\nabla\times\boldsymbol{C}\), if the space coordinate is given by \((x,y,z)\), the \(x\) components of \(\boldsymbol{E}\) and \(\boldsymbol{B}\) can be written explicitly as \[\begin{aligned} &&E_x=-\mu_o\epsilon_0\frac{\partial C_x}{\partial t}-\frac{\partial \Phi}{\partial x}=-(\partial^0C^1-\partial^1C^0),\\ &&B_x=\frac{\partial C_z}{\partial y}-\frac{\partial C_y}{\partial z}=-(\partial^2C^3-\partial^3C^2), \end{aligned}\] where \(\partial^{\alpha}=(\frac{\partial}{\partial t},-\nabla)\). These equations imply that the electric and magnetic fields are the elements of a second rank, antisymmetric field-strength tensor \(F^{\alpha\beta}=\partial^{\alpha}C^{\beta}-\partial^{\beta}C^{\alpha}\). This leads to a different formulation of Maxwell equations in terms of a differential 2-form \(F^{\alpha\beta}\), known as the Maxwell-Faraday tensor, \(\partial_{\alpha}F^{\alpha\beta}=0\), which can also be rewritten as \[\begin{aligned} \square C^{\beta}-\partial^{\beta}\partial_{\alpha}C^{\alpha}=0, \end{aligned}\] where \(C^{\alpha}=(\Phi,\boldsymbol{C})\), \(\partial^{\alpha}=(\partial_t,-\nabla)\) and \(\partial_{\alpha}=(\partial_t,\nabla)\) and \[F^{\alpha\beta} = \begin{pmatrix} 0 & E_x & E_y & E_z \\ -E_x & 0 &-B_z & B_y \\ -E_y & B_z & 0 &-B_x \\ -E_z &-B_y & B_x & 0 \end{pmatrix}.\] The equation \(\square C^{\beta}-\partial_{\beta}\partial^{\alpha}C^{\alpha}=0\) in the Minkowski space has a generalization to the \(m\)-dimensional Euclidean space given below. \[\begin{aligned} \Delta_{\boldsymbol{x}}\boldsymbol{f_s}(\boldsymbol{x})-\frac{4}{m}\sum_{j=1}^{m}\partial_{x_s}\partial_{x_j}\boldsymbol{f_j}(\boldsymbol{x})=0,\ 1\leq s\leq m. \end{aligned}\] where \(f_s(\boldsymbol{x})\) is a vector valued function, with \(\boldsymbol{x}\in\mathbb{R}^m\). The constant \(4/m\) allows the generalized operator above to preserve the conformal invariance property of the Maxwell equations. Notice that the space of real-valued homogeneous of harmonic polynomials with degree-\(1\) with respect to a variable \(\boldsymbol{u}\in\mathbb{R}^m\), denoted by \(\mathcal{H}_1\), is spanned by \(\{u_1,\cdots,u_m\}\). The \(m\) equations above can be replaced by one equation \[\begin{aligned} \sum_{s=1}^{m}u_s\bigg(\Delta_{\boldsymbol{x}}\boldsymbol{f_s}(\boldsymbol{x})-\frac{4}{m}\sum_{j=1}^{m}\partial_{x_s}\partial_{x_j}\boldsymbol{f_j}(\boldsymbol{x})\bigg)=0. \end{aligned}\] This equation can also be rewritten as \[\begin{aligned} 0&=&\sum_{s=1}^m\Delta_{\boldsymbol{x}}u_sf_s(\boldsymbol{x})-\frac{4}{m}\sum_{j,s=1}^mu_s\partial_{x_s}\partial_{x_j}f_j(\boldsymbol{x})\\ &=&\sum_{s=1}^m\Delta_{\boldsymbol{x}}u_sf_s(\boldsymbol{x})-\frac{4}{m}\sum_{j,s,k=1}^mu_s\partial_{x_s}\partial_{x_j}\partial_{u_j}u_kf_k(\boldsymbol{x}). \end{aligned}\] Now, we consider \(f(\boldsymbol{x},\boldsymbol{u}):=\sum_{s=1}^mu_sf_s(\boldsymbol{x})\) as a \(\mathcal{H}_1(\mathbb{R})\)-valued function on \(\mathbb{R}^m\). With the help of the Dirac operator \(\boldsymbol{D}_{\boldsymbol{x}}=\sum_{s=1}^m\boldsymbol{e}_s\partial_{x_s}\) in the \(m\)-dimensional Euclidean space. This equation can be written in a compact form \[\begin{aligned} \left(\Delta_{\boldsymbol{x}}-\frac{4}{m}\langle \boldsymbol{u},\boldsymbol{D}_{\boldsymbol{x}}\rangle\langle \boldsymbol{D}_{\boldsymbol{u}},\boldsymbol{D}_{\boldsymbol{x}}\rangle\right)\boldsymbol{f}(\boldsymbol{x},\boldsymbol{u})=0, \end{aligned}\] where \(\langle\ ,\ \rangle\) is the standard inner product in Euclidean space. The operator \(\Delta_{\boldsymbol{x}}-\frac{4}{m}\langle \boldsymbol{u},\boldsymbol{D}_{\boldsymbol{x}}\rangle\langle \boldsymbol{D}_{\boldsymbol{u}},\boldsymbol{D}_{\boldsymbol{x}}\rangle\), denoted by \(\mathcal{D}_1\) is called the generalized Maxwell operator, which is a second order conformally invariant differential operator in the higher spin spaces in Clifford analysis. It was firstly constructed by Eelbode et. al. in. More generally, if we consider a function \(f(\boldsymbol{x},\boldsymbol{u})\in C^{\infty}(\mathbb{R}^m,\mathcal{H}_k(\mathbb{R}))\), i.e., for a fixed \(\boldsymbol{x}\in\mathbb{R}^m\), \(f(\boldsymbol{x},\boldsymbol{u})\in\mathcal{H}_k(\mathbb{R})\) with respect to \(\boldsymbol{u}\). The second order conformally invariant differential operators, named as bosonic Laplacians (also known as the higher spin Laplace operators ), are defined as \[\begin{aligned} \label{Dtwo} &&\mathcal{D}_k:\ C^{\infty}(\mathbb{R}^m,\mathcal{H}_k(\mathbb{R}))\longrightarrow C^{\infty}(\mathbb{R}^m,\mathcal{H}_k(\mathbb{R})),\nonumber\\ &&\mathcal{D}_k=\Delta_{\boldsymbol{x}}-\frac{4\langle \boldsymbol{u},D_{\boldsymbol{x}}\rangle\langle D_{\boldsymbol{u}},D_{\boldsymbol{x}}\rangle}{m+2k-2}+\frac{4|u|^2\langle D_{\boldsymbol{u}},D_{\boldsymbol{x}}\rangle^2}{(m+2k-2)(m+2k-4)}, \end{aligned}\] where \(\langle\ ,\ \rangle\) is the standard inner product in \(\mathbb{R}^m\). One can easily see that \(\mathcal{D}_k\) reduces to the generalized Maxwell operator when \(k=1\). # Poisson's equation and representation formula In this section, we will review some properties of the Rarita-Schwinger type operators and bosonic Laplacians from, which will be needed for solving a Poisson's equation in the higher spin spaces. Let \(Z_k^1(\boldsymbol{u},\boldsymbol{v})\) be the reproducing kernel for \(\mathcal{M}_k(\mathcal{C}l_m)\), which satisfies \[\begin{aligned} f(\boldsymbol{v})=\int\displaylimits_{\mathbb{S}^{m-1}}Z_k^1(\boldsymbol{u},\boldsymbol{v})f(\boldsymbol{u})dS(\boldsymbol{u}),\ for\ all\ f(\boldsymbol{v})\in\mathcal{M}_k(\mathcal{C}l_m). \end{aligned}\] Then the fundamental solution for \(R_k\) (Section \(5.1\), ) is \[\begin{aligned} E_k(\boldsymbol{x},\boldsymbol{y},\boldsymbol{u},\boldsymbol{v})=\displaystyle\frac{m+2k-2}{(m-2)\omega_{m}}\frac{\boldsymbol{y}-\boldsymbol{x}}{|\boldsymbol{y}-\boldsymbol{x}|^m}Z_k^1\bigg(\frac{(\boldsymbol{y}-\boldsymbol{x})\boldsymbol{u}(\boldsymbol{y}-\boldsymbol{x})}{|\boldsymbol{y}-\boldsymbol{x}|^2},\boldsymbol{v}\bigg). \end{aligned}\] Similarly, we have the fundamental solution for \(Q_k\) (Section \(3\), ) as follows. \[\begin{aligned} F_k(\boldsymbol{x},\boldsymbol{y},\boldsymbol{u},\boldsymbol{v})=\displaystyle\frac{m+2k-2}{(2-m)\omega_{m}}\boldsymbol{u}\frac{\boldsymbol{y}-\boldsymbol{x}}{|\boldsymbol{y}-\boldsymbol{x}|^m}Z_{k-1}^1\bigg(\frac{(\boldsymbol{y}-\boldsymbol{x})\boldsymbol{u}(\boldsymbol{y}-\boldsymbol{x})}{|\boldsymbol{y}-\boldsymbol{x}|^2},\boldsymbol{v}\bigg)\boldsymbol{v}. \end{aligned}\] We also have that and Recall that (Proposition 1, ) the connection between bosonic Laplacians and the Rarita-Schwinger type operators is given by \[\begin{aligned} &\mathcal{D}_k =-R_k^2P_k^++\frac{2R_kT_kP_k^-}{m+2k-4}-\frac{2Q_kT_k^*P_k^+}{m+2k-4}-\frac{(m+2k)Q_k^2P_k^-}{m+2k-4},\\ =&R_k\bigg[-R_kP_k^++\frac{2T_kP_k^-}{m+2k-4}\bigg]+Q_k\bigg[-\frac{2T_k^*P_k^+}{m+2k-4}-\frac{(m+2k)Q_kP_k^-}{m+2k-4}\bigg]. \end{aligned}\] We let \(A_k=-R_kP_k^++\displaystyle\frac{2T_kP_k^-}{m+2k-4}\) and \(B_k=-\displaystyle\frac{2T_k^*P_k^+}{m+2k-4}-\displaystyle\frac{(m+2k)Q_kP_k^-}{m+2k-4}\) for convenience, then we have \[\begin{aligned} \label{connection} \mathcal{D}_k=R_kA_k+Q_kB_k. \end{aligned}\] Now, we can solve a Poisson's equation for bosonic Laplacian \(\mathcal{D}_k\) as follows. With Theorem [\[PoissonEqn\]](#PoissonEqn){reference-type="ref" reference="PoissonEqn"} and the Liouville-type theorem given in, one can immediately have a representation formula as follows. In particular, if we let \(g(\boldsymbol{x},\boldsymbol{u})\) above be the fundamental solution of \(\mathcal{D}_k\) given by (Theorem \(5.2\), ) \[\begin{aligned} H_k(\boldsymbol{x},\boldsymbol{y},\boldsymbol{u},\boldsymbol{v})=c_{m,k}|\boldsymbol{y}-\boldsymbol{x}|^{2-m}Z_k\bigg(\displaystyle\frac{(\boldsymbol{y}-\boldsymbol{x})\boldsymbol{u}(\boldsymbol{y}-\boldsymbol{x})}{|\boldsymbol{y}-\boldsymbol{x}|^2},v\bigg), \end{aligned}\] and discuss the only singular point \(\boldsymbol{y}\) with the technique applied in, we can obtain a Green's integral formula as follows. # Green's formulas in the higher spin spaces It is well-known that Green's formulas are very important in many applications, especially in the study of boundary value problems. In this section, we provide Green's formulas for bosonic Laplacians acting on scalar-valued functions and Clifford-valued functions, respectively. ## Green's formula: scalar-valued version {#greens-formula-scalar-valued-version .unnumbered} \ Let \(\Omega\subset\mathbb{R}^m\) be an open domain, we consider scalar-valued function spaces \(C^2(\Omega\times\mathbb{B}^{m},\mathcal{H}_k(\mathbb{R}))\) and define the following inner product \[\begin{aligned} \label{innerproduct} \langle f\ |\ g\rangle=\int\displaylimits_{\Omega}\int\displaylimits_{\mathbb{S}^{m-1}}f(\boldsymbol{x},\boldsymbol{u})g(\boldsymbol{x},\boldsymbol{u})dS(\boldsymbol{u})d\boldsymbol{x},\quad f,g\in C^2(\Omega\times\mathbb{B}^{m},\mathcal{H}_k(\mathbb{R})). \end{aligned}\] ## Green's formula: Clifford-valued version {#greens-formula-clifford-valued-version .unnumbered} \ The difficulty in the Clifford-valued case is caused by the fact that multiplication of Clifford numbers is not commutative in general. In our case, we need to use the connection between Rarita-Schwinger type operators and bosonic Laplacians given in [\[connection\]](#connection){reference-type="eqref" reference="connection"} and Stokes' Theorems for Rairta-Schwinger type operators given in.
{'timestamp': '2020-06-30T02:28:57', 'yymm': '2005', 'arxiv_id': '2005.14529', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14529'}
null
null
# Introduction One of the most interesting predictions of general relativity is the existence of null circular orbits outside compact astrophysical objects, such as black holes and horizonless ultra-compact stars. These null circular geodesics provide the way that massless particles (photons, gravitons) can orbit a central compact objects, which gives important information about the highly curved spacetime. At present, the null circular orbits have been widely studied-. Recently, it was proved that the null circular orbit can be used to describe the distribution of exterior matter fields outside black holes. In spherically symmetric hairy black hole spacetimes, it was found that the effective radius of hairs must extend beyond the null circular orbit. The authors in have proposed a nice heuristic physical picture that the null circular orbit divides matter fields into two parts (fields below the orbit tending to be swallowed by black holes and fields above the orbit tending to be radiated away to infinity) and the self-interaction between these two parts bind together fields in different regions leading to the existence of black hole hairs. And it was further conjectured that the region above the null circular orbit contains at least half of the total hair mass. The main goal of this paper is to study properties of horizonless ultra-compact spherical stars with null circular orbits. We shall analytically prove a no short hair theorem that the effective radius of matter fields must extend beyond the null circular orbit. # Investigations on effective radius of matter fields We consider static horizonless stars with null circular orbits. In Schwarzschild coordinates, these ultra-compact spherically symmetric objects take the following form \[\begin{aligned} \label{AdSBH} ds^{2}&=&-g(r)e^{-2\chi(r)}dt^{2}+\frac{dr^{2}}{g(r)}+r^{2}(d\theta^2+sin^{2}\theta d\phi^{2}). \end{aligned}\] The metric functions \(\chi(r)\) and \(g(r)\) only depend on the Schwarzschild radial coordinate r. Asymptotical flatness of the spacetime at the infinity requires that \(g(r\rightarrow \infty)=1\) and \(\chi(r\rightarrow \infty)=0\). Near the origin, regularity conditions of the gravity are \[\begin{aligned} \label{AdSBH} g(r\rightarrow 0)=1+O(r^2)~~~~~~and~~~~~~\chi(0)<\infty. \end{aligned}\] We take \(\rho=-T^{t}_{t}\), \(p=T^{r}_{r}\) and \(p_{T}=T^{\theta}_{\theta}=T^{\phi}_{\phi}\), where \(\rho\), \(p\) and \(p_{T}\) are interpreted as the energy density, the radial pressure and the tangential pressure respectively. Einstein differential equations \(G^{\mu}_{\nu}=8\pi T^{\mu}_{\nu}\) yield the metric equations \[\begin{aligned} \label{BHg} g'=-8\pi r \rho+\frac{1-g}{r}, \end{aligned}\] \[\begin{aligned} \label{BHg} \chi'=\frac{-4\pi r (\rho+p)}{g}. \end{aligned}\] We label \(m(r)\) as the gravitational mass contained within a sphere of radial radius r. It can be expressed by the integral relation \[\begin{aligned} \label{AdSBH} m(r)=\int_{0}^{r}4\pi r'^{2}\rho(r')dr'. \end{aligned}\] Considering relations (3) and (5), one can express the metric function \(g(r)\) in the form \[\begin{aligned} \label{BHg} g=1-\frac{2m(r)}{r}. \end{aligned}\] Following approaches in, we obtain equations of null circular orbits. As the metric (1) is independent of the time \(t\) and angular coordinates \(\phi\), the geodesic trajectories are characterized by conserved energy E and conserved angular momentum L. And the null circular orbits are determined by an effective potential \[\begin{aligned} \label{BHg} V_{r}=(1-e^{2\chi})E^{2}+g\frac{L^2}{r^2} \end{aligned}\] with the characteristic relations \[\begin{aligned} \label{BHg} V_{r}=E^{2}~~~~~~and~~~~~~V_{r}'=0. \end{aligned}\] Substituting Einstein equations (3) and (4) into (7) and (8), we deduce the null circular orbit equation \[\begin{aligned} \label{BHg} N(r_{\gamma})=3g(r_{\gamma})-1-8\pi (r_{\gamma})^2p(r_{\gamma})=0, \end{aligned}\] where we have introduced a new function \(N(r)=3g(r)-1-8\pi (r)^2p(r)\). The discrete roots of (9) correspond to the radii of the null circular orbit. With the relation (2) and the regular condition \(p(0)<\infty\), one obtains \[\begin{aligned} \label{BHg} N(0)=2. \end{aligned}\] We label \(r_{\gamma}^{in}\) as the radius of the innermost null circular orbit. That is to say \(r_{\gamma}^{in}\) is the smallest positive root of \(N(r)=0\). Also considering relation (10), one deduces that \[\begin{aligned} \label{BHg} N(r)\geqslant0~~~~for~~~~r\in [0,r_{\gamma}^{in}]. \end{aligned}\] The conservation equation \(T^{\mu}_{\nu;\mu}=0\) has only one nontrivial component \[\begin{aligned} \label{BHg} T^{\mu}_{r;\mu}=0. \end{aligned}\] Substituting equations (3) and (4) into (12), one gets equation of the pressure \[\begin{aligned} \label{BHg} p'(r)=\frac{1}{2rg}[(3g-1-8\pi r^2p)(\rho+p)+2gT-8gp] \end{aligned}\] with \(T=-\rho+p+2p_{T}\) standing for the trace of the energy momentum tensor. With a new pressure function \(P(r)=r^4p\), the equation (13) can be expressed as \[\begin{aligned} \label{BHg} P'(r)=\frac{r}{2g}[N(\rho+p)+2gT], \end{aligned}\] where \(N=3g-1-8\pi r^2p\). The energy condition usually plays a central role in determining the spacetime geometry. We assume the dominant energy condition \[\begin{aligned} \label{BHg} \rho\geqslant |p|,~|p_{T}|\geqslant 0, \end{aligned}\] which means that the energy density \(\rho\) is non-negative and bounds the pressures. We also assume the non-negative trace of the energy momentum tensor expressed as \[\begin{aligned} \label{BHg} T=-\rho+p+2p_{\tau}\geqslant 0. \end{aligned}\] In this work, we take the non-negative trace conditions. A well known example for such horizonless configurations is the gravitating Einstein-Yang-Mills solitons, which are characterized by the identity \(T=0\). In contrast, the usual non-positive trace condition was imposed in the black hole spacetime. From (11) and (14-16), one deduces that \[\begin{aligned} \label{BHg} P'(r)\geqslant 0~~~~for~~~~r\in [0,r_{\gamma}^{in}]. \end{aligned}\] We impose the condition that \(\rho\) goes to zero faster than \(r^{-4}\). Also considering (15) and \(P(r)=r^4p(r)\), there is the asymptotical behavior \[\begin{aligned} \label{BHg} P(r\rightarrow \infty)=0. \end{aligned}\] Near the origin, the pressure function \(P(r)\) has the asymptotical behavior \[\begin{aligned} \label{BHg} P(r\rightarrow 0)=0. \end{aligned}\] Relations (18) and (19) imply that \(|P(r)|\) must have a local maximum value at some extremum point \(r_{0}\). We can define \(r_{m}=r_{0}\) as the effective radii of matter fields. According to (17), \(P(r)\) is an increasing function of r before it reaches the innermost null circular orbit. So the effective radii have a lower bound \[\begin{aligned} \label{BHg} r_{m}\geqslant r_{\gamma}^{in}, \end{aligned}\] which is the same as the no short hair theorem of black holes. # Conclusions We investigated distributions of matter fields in the background of horizonless ultra-compact spherically symmetric stars. We assumed the dominant energy condition and the non-negative trace condition. We defined an effective matter field radius at an extremum point where the pressure function \(|P(r)|\) possesses a local maximum value. Using analytical methods, we obtained a lower bound on the effective matter field radius expressed as \(r_{m}\geqslant r_{\gamma}^{in}\) with \(r_{m}\) as the effective matter field radius and \(r_{\gamma}^{in}\) corresponding to the innermost null circular orbit radius. So we found a no short hair behavior that the effective matter field radius must extend beyond the innermost null circular orbit.
{'timestamp': '2020-06-01T02:10:52', 'yymm': '2005', 'arxiv_id': '2005.14512', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14512'}
null
null
# Introduction and results {#intro} Hankel operators on Bergman spaces on bounded pseudoconvex domains with symbols that are continuous on the closure of the domain are compact when the \(\overline{\partial}\)--Neumann operator on the domain is compact (). It is natural to ask what happens when the \(\overline{\partial}\)--Neumann operator is not compact. Must there necessarily be noncompact Hankel operators (with, say, symbol continuous on the closure of the domain)? The answer is known only in cases where compactness (or lack thereof) of the \(\overline{\partial}\)--Neumann operator is understood: when the domain is convex, bounded, in \(\mathbb{C}^{n}\) (, Remark 2), or when it is a smooth bounded pseudoconvex Hartogs domain in \(\mathbb{C}^{2}\) (). In these cases, compactness of all Hankel operators with symbols that are smooth on the closure implies compactness of the \(\overline{\partial}\)--Neumann operator. In general, the question is open[^1]; having an answer would be very interesting. Alternatively, one can consider a particular situation where the \(\overline{\partial}\)--Neumann operator is not compact and ask for necessary and/or sufficient conditions on a symbol that will imply compactness of the associated Hankel operator. Given that two symbols whose difference extends continuously to the boundary as zero yield Hankel operators that agree modulo a compact operator, one would in particular like to understand how the interaction of the symbol with the boundary affects compactness of the associated Hankel operator. It is this question that we are interested in in the current paper. Such a study was initiated in. For symbols smooth on the closure of a smooth bounded pseudoconvex domain in \(\mathbb{C}^{n}\), the authors show, under the condition that the rank of the Levi form is at least \((n-2)\), that compactness of the Hankel operator requires that the symbol is holomorphic along analytic discs in the boundary. When the domain is also convex, they can dispense with the condition on the Levi form.[^2] Moreover, for (smooth) convex domains in \(\mathbb{C}^{2}\), holomorphy of the symbol along analytic discs in the boundary is also sufficient for compactness of the Hankel operator. Further contributions are in ; we refer the reader to the introduction in for a summary. The latter authors significantly reduce the regularity requirements on both the domain (Lipschitz in \(\mathbb{C}^{2}\) or convex in \(\mathbb{C}^{n}\)) and the symbol (in \(C(\overline{\Omega})\)) that is required to infer holomorphicity of the symbol along analytic discs in the boundary from compactness of the Hankel operator. Because compactness of a Hankel operator localizes (; see also ), the latter result carries over to locally convexifiable domains. In, the authors, among other things, extend the result from on convex domains in \(\C^n\) to Hankel operators on (\(\overline{\partial}\)--closed) \((0,q)\)--forms with \(0\leq q\leq (n-1)\), but with symbol assumed in \(C^{1}\) of the closure. When the (convex) domain is smooth and satisfies so called maximal estimates[^3], holomorphicity of the symbol along \((n-1)\)--dimensional analytic (equivalently: affine) polydiscs in the boundary suffices for compactness of the associated Hankel operator.[^4] Finally we mention the recent, where the authors consider Hankel operators with form symbols (replacing multiplication with the wedge product) and prove many of the results discussed above for this situation. Our first result (Theorem [\[ThmNonCompact\]](#ThmNonCompact){reference-type="ref" reference="ThmNonCompact"}) reduces the regularity of the symbol in Theorem 1 in to \(C(\overline{\Omega})\). It also corrects a geometric issue in the proof of Theorem 2 in (where the result is given for \(q=1\) only). Since necessary and sufficient conditions for compactness of the \(\overline{\partial}\)--Neumann operator are understood on convex domains (), it is reasonable to expect that when the domain is convex, one should likewise obtain simple necessary and sufficient conditions on the symbol that will guarantee compactness of the Hankel operator. That is, one expects the converse of Theorem [\[ThmNonCompact\]](#ThmNonCompact){reference-type="ref" reference="ThmNonCompact"} to hold: when the symbol is holomorphic along \(q\)--dimensional varieties in the boundary, \(H^{q-1}_{\phi}\) should be compact. As mentioned above, this implication is known for \(C^{1}\) convex domains in \(\mathbb{C}^{2}\) and symbol in \(C^{1}(\overline{\Omega})\) (, , as well as for some classes of Reinhardt domains in \(\mathbb{C}^{2}\), with symbol only assumed in \(C(\overline{\Omega})\) (, ). Theorem [\[converse\]](#converse){reference-type="ref" reference="converse"} says that the implication is true for convex domains in higher dimensions as well, when there are only 'finitely many' varieties in the boundary. We expect this additional assumption to be an artifact of our current proof. On the other hand, our result appears to be the first instance of a converse to Theorem [\[ThmNonCompact\]](#ThmNonCompact){reference-type="ref" reference="ThmNonCompact"} in dimension greater than two. Before stating our results precisely, we recall the notation form (which is fairly standard). For a bounded domain \(\Omega\subset\mathbb{C}^{n}\), denote by \(K^{2}_{(0,q)}(\Omega)\) the space of square integrable \(\overline{\partial}\)--closed \((0,q)\)--forms, and by \(A^{2}_{(0,q)}(\Omega)\) the subspace of forms with holomorphic coefficients. \(P_{q}: L^{2}_{(0,q)}(\Omega)\rightarrow K^{2}_{(0,q)}(\Omega)\) is the orthogonal projection, the Bergman projection on \((0,q)\)--forms. For a symbol \(\phi\in L^{\infty}(\Omega)\), the associated Hankel operator is \(H^{q}_{\phi}:K^{2}_{(0,q)}(\Omega)\rightarrow L^{2}_{(0,q)}(\Omega)\), \[\begin{aligned} H^{q}_{\phi}f = \phi f-P_{q}(\phi f), \end{aligned}\] with \(\|H^{q}_{\phi}\|\leq \|\phi\|_{L^{\infty}(\Omega)}\). \(H^{q}_{\phi}\) equals the commutator \([\phi,P_{q}]\) (since \(P_{q}f = f\)), so that statements about (compactness of) Hankel operators may also be viewed as statements about commutators between the Bergman projection and multiplication operators. When the symbol \(\phi\) is in \(C^{1}(\overline{\Omega})\), Kohn's formula, \(P_{q} = \overline{\partial}^{*}N_{q+1}\overline{\partial}\), implies \[\begin{aligned} \label{Kohn} H^{q}_{\phi}f = \overline{\partial}^{*}N_{q+1}(\overline{\partial}\phi\wedge f); \end{aligned}\] here, \(N_{q+1}\) is the \(\overline{\partial}\)--Neumann operator on \((0,q+1)\)--forms. We can now state our first result. Before stating Theorem [\[converse\]](#converse){reference-type="ref" reference="converse"}, we first recall the basic facts about analytic varieties in the boundaries of convex domains from and . Suppose \(\psi:\mathbb{D}^{q}\rightarrow b\Omega\) is a holomorphic embedding, where \(\Omega\subset\mathbb{C}^{n}\) is convex. Then the convex hull of the image \(\psi(\mathbb{D}^{q})\) is contained in the intersection of a complex hyperplane \(H\) through \(P\in \psi(\mathbb{D}^{q})\) with \(\overline{\Omega}\) (). So it suffices to consider affine varieties in the boundary of this kind. Among these varieties through a boundary point \(P\), there is a unique one, denoted by \(V_{P}\), that has \(P\) as a relative interior point and whose dimension \(m\) is maximal. Then \(0\leq m\leq (n-1)\), and the relative closure \(\overline{V_{P}}\) is the intersection of an \(m\)--dimensional affine subspace through \(P\) (contained in \(H\)) with \(\overline{\Omega}\). Our second result is as follows. Note that the condition on holomorphicity of \(\phi\circ\psi\) just says that \(\phi|_{V_{P_{K}}}\) is holomorphic on all \(V_{P_{k}}\) of dimension \(q\) or higher. We also point out that this assumption on \(\phi\) does not imply that the tangential component of \(\overline{\partial}\phi\) (say when \(\Omega\) is smooth) vanishes on the \(V_{P_{k}}\) of dimension \(q\) or higher; the components transverse to the varieties need not be zero. If \(\Omega\) is assumed \(C^{1}\), the relative closures of distinct varieties are automatically disjoint: if \(Q\in \overline{V_{P_{k_{1}}}}\cap\overline{V_{P_{k_{2}}}}\), then both \(V_{P{k_{1}}}\) and \(V_{P{k_{2}}}\) have to be contained in the complex tangent space to \(b\Omega\) at \(Q\), and considering the convex hull as above produces a variety which contains them both. However, without a regularity assumption on \(b\Omega\), the supporting complex hyperplane is not unique, and two distinct varieties may share a boundary point (as on the boundary of \(\mathbb{D}\times\mathbb{D}\)). When \(q=n\), there are no \(q\)--dimensional varieties in the boundary, and the theorem says that \(H^{n-1}_{\phi}\) is always (when \(\phi\in C(\overline{\Omega})\)) compact. But this is clear from [\[Kohn\]](#Kohn){reference-type="eqref" reference="Kohn"}, at least when \(\phi\in C^{1}(\overline{\Omega})\), because \(N_{n}\), and hence \(\overline{\partial}^{*}N_{n}\), is compact (). When \(\phi\) is merely in \(C(\overline{\Omega})\), it can be approximated uniformly on \(\overline{\Omega}\) by smooth functions; the corresponding (compact) Hankel operators converge in norm to \(H_{\phi}^{n-1}\). As pointed out in, Theorem [\[converse\]](#converse){reference-type="ref" reference="converse"} fails on general domains, that is, without the assumption of convexity or a related condition. This failure is related to the subtleties surrounding compactness in the \(\overline{\partial}\)--Neumann problem on general domains (but absent in the case of convex domains). Namely, there are smooth bounded pseudoconvex complete Hartogs domains in \(\mathbb{C}^{2}\) without discs in the boundary and noncompact Hankel operators on them whose symbols are smooth on the closure. These symbols trivially satisfy the assumption on holomorphicity along analytic discs. The domains were originally constructed in as examples of smooth bounded pseudoconvex complete Hartogs domains without discs in the boundary whose \(\overline{\partial}\)--Neumann operator \(N_{1}\) is nevertheless not compact (see also, ). But on these domains, noncompactness of \(N_{1}\) implies that there are symbols smooth on the closure so that the associated Hankel operator is not compact (). # Proofs The following simple lemma formulates the lack of holomorphicity of a function without relying on differentiability, in contrast to; this ultimately allows the regularity of the symbol to be lowered from \(C^{1}(\overline{\Omega})\) to \(C(\overline{\Omega})\) in Theorem [\[ThmNonCompact\]](#ThmNonCompact){reference-type="ref" reference="ThmNonCompact"}. The above proof of Theorem [\[ThmNonCompact\]](#ThmNonCompact){reference-type="ref" reference="ThmNonCompact"} uses ideas from [@FuStraube98; @CuckovicSahutoglu09; @ClosCelikSahutoglu18; @CelikSahutogluStraube20]; in turn, these ideas can be traced back at least to. In the proof of Theorem [\[converse\]](#converse){reference-type="ref" reference="converse"}, we will repeatedly use the following sufficient condition for compactness of an operator \(T:X\rightarrow Y\), where \(X\) and \(Y\) are Hilbert spaces (see e.g. ): for all \(\varepsilon>0\) there are a Hilbert space \(Z_{\varepsilon}\), a linear compact operator \(S_{\varepsilon}:X\rightarrow Z_{\varepsilon}\), and a constant \(C_{\varepsilon}\) such that \[\begin{aligned} \label{compcond} \|Tx\|_{Y} \leq \varepsilon\|x\|_{X} + C_{\varepsilon}\|S_{\varepsilon}x\|_{Z_{\varepsilon}}. \end{aligned}\] In addition, we need the following sufficient conditions for compactness of a Hankel operator on \(\Omega\) (notation as in the theorem). Note that the condition in \((i)\) is stronger than saying that \(\phi\) is holomorphic along the \(V_{P_{j}}\): \(\overline{\partial}\phi = 0\) also in the directions transverse to \(V_{P_{j}}\). We are now ready to prove Theorem [\[converse\]](#converse){reference-type="ref" reference="converse"}. [^1]: For the case \(q=0\) and \(N_{1}\). The answer is known to be affirmative for Hankel operators on \((0,q)\)--forms with \(1\leq q\leq (n-1)\) (); the relevant \(\overline{\partial}\)--Neumann operator is then \(N_{q+1}\). Here, pseudoconvexity is important; see . [^2]: In both these cases, compactness of the \(\overline{\partial}\)--Neumann operator was known to fail when there are discs in the boundary;, . [^3]: This condition is equivalent to a comparable eigenvalues condition for the Levi form of the boundary, see the discussion in and their references. [^4]: As noted in, these two results combined imply that a convex domain that satisfies maximal estimates for \((0,q)\)--forms does not have any analytic varieties of dimension \(\geq q\) in its boundary except ones in top dimension \((n-1)\) (and their subvarieties). It would be desirable to have a direct proof for this fact. [^5]: Alternatively, \(\overline{\partial}\phi=0\) implies \(\Delta\phi = 0\), so by Weyl's Lemma, \(\phi\) is a \(C^{\infty}\) function (and therefore holomorphic). [^6]: Alternatively, one can modify the argument below slightly and use the construction in . [^7]: When \(\Omega\) is smooth, \((i)\) is a special case of Theorem 1.3 in. [^8]: Because \(\|H^{q-1}_{\phi}- H^{q-1}_{\phi_{j}}\| = \|H^{q-1}_{\phi-\phi_{j}}\| \leq \|\phi- \phi_{j}\|_{L^{\infty}(\Omega)}\). [^9]: By, \(\phi\) is a compactness multiplier for \((0,q)\)--forms. When \(\Omega\) is smooth (and \(q=1\)), one can use: symbols which are compactness multipliers on a bounded smooth pseudoconvex domain produce compact Hankel operators.
{'timestamp': '2020-08-18T02:05:41', 'yymm': '2005', 'arxiv_id': '2005.14323', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14323'}
null
null
# Introduction In practice, one often encounters heterogeneous data, whose distribution is not constant, but depends on certain covariates. For example, data can be collected from several different sources, its distribution might differ across certain subpopulations or it could even change with time, etc. Inferring valid conclusions about a certain target of interest from such data can be very challenging as many different aspects of the distribution could potentially change. As an example, in medical studies, the effectiveness of a certain treatment might not be constant throughout the population but depend on certain patient characteristics such as age, race, gender, or medical history. Another issue could be that different patient groups were not equally likely to receive the same treatment in the observed data. Obviously, pooling all available data together can result in invalid conclusions. On the other hand, if for a given test point of interest one only considers similar training data points, i.e. a small homogeneous subpopulation, one may end up with too few samples for accurate statistical estimation. In this paper, we propose a method based on the Random Forest algorithm which in a data-adaptive way determines for any given test point which training data points are relevant for it. This in turn can be used for drawing valid conclusions or for accurately estimating any quantity of interest. Let \(\bold{Y}=(Y_1, Y_2, \ldots, Y_d) \in \mathbb{R}^{d}\) be a multivariate random variable representing the data of interest, but whose joint distribution is heterogeneous and depends on some subset of a potentially large number of covariates \(\bold{X}=(X_1, X_2, \ldots, X_p) \in \mathbb{R}^{p}\). Throughout the paper, vector quantities are denoted in bold. We aim to estimate a certain target object \(\tau(\bold{x})\) that depends on the conditional distribution \(\P(\bold{Y} \mid \bold{X} \myeq \bold{x}) = \P(\bold{Y} \mid X_1 \myeq x_1, \ldots, X_p \myeq x_p)\), where \(\bold{x} = (x_1, \ldots, x_p)\) is an arbitrary point in \(\mathbb{R}^{p}\). The estimation target \(\tau(\bold{x})\) can range from simple quantities, such as the conditional expectations \(\E[f(\bold{Y}) \mid \bold{X}]\) or quantiles \(Q_\alpha[f(\bold{Y}) \mid \bold{X}]\) for some function \(f:\R^d \to \R\), to some more complicated aspects of the conditional distribution \(\P(\bold{Y} \mid \bold{X} \myeq \bold{x})\), such as conditional copulas or conditional independence measures. Given the observed data \(\{(\bold{x}_i,\bold{y}_i)\}_{i=1}^n\), the most straightforward way of estimating \(\tau(\bold{x})\) nonparametrically would be to consider only the data points in some neighborhood \(\mathcal{N}_{\bold{x}}\) around \(\bold{x}\), e.g. by considering the \(k\) nearest neighbors according to some metric. However, such methods typically suffer from the curse of dimensionality even when \(p\) is only moderately large: for a reasonably small neighborhood, such that the distribution \(\P(\bold{Y}\mid\bold{X}\in \mathcal{N}_\bold{x})\) is close to the distribution \(\P(\bold{Y}\mid\bold{X}\myeq\bold{x})\), the number of training data points contained in \(\mathcal{N}_{\bold{x}}\) will be very small, thus making the accurate estimation of the target \(\tau(\bold{x})\) difficult. The same phenomenon occurs with other methods which locally weight the training observations such as kernel methods, local MLE or weighted regression even for the relatively simple problem of estimating the conditional mean \(\E[\bold{Y}\mid\bold{X}\myeq\bold{x}]\) for fairly small \(p\). For that reason, more importance should be given to the training data points \((\bold{x}_i, \bold{y}_i)\) for which the response distribution \(\P(\bold{Y}\mid\bold{X}\myeq\bold{x}_i)\) at point \(\bold{x}_i\) is similar to the target distribution \(\P(\bold{Y}\mid\bold{X}\myeq\bold{x})\), even if \(\bold{x}_i\) is not necessarily close to \(\bold{x}\) in every component. In this paper, we propose the Distributional Random Forest (DRF) algorithm which estimates the multivariate conditional distribution \(\P(\bold{Y}\mid\bold{X}\myeq\bold{x})\) in a locally adaptive fashion. This is done by repeatedly dividing the data points in the spirit of the Random Forest algorithm: at each step, we split the data points into two groups based on some feature \(X_j\) in such a way that the distribution of \(\bold{Y}\) for which \(X_j \leq l\), for some level \(l\), differs the most compared to the distribution of \(\bold{Y}\) when \(X_j > l\), according to some distributional metric. One can use any multivariate two-sample test statistic, provided it can detect a wide variety of distributional changes. As the default choice, we propose a criterion based on the Maximal Mean Discrepancy (MMD) statistic with many interesting properties. This splitting procedure partitions the data such that the distribution of the multivariate response \(\bold{Y}\) in the resulting leaf nodes is as homogeneous as possible, thus defining neighborhoods of relevant training data points for every \(\bold{x}\). Repeating this many times with randomization induces a weighting function \(w_{\bold{x}}(\bold{x}_i)\) as in, described in detail in Section [2](#method_description){reference-type="ref" reference="method_description"}, which quantifies the relevance of each training data point \(\bold{x}_i\) for a given test point \(\bold{x}\). The conditional distribution is then estimated by an empirical distribution determined by these weights. This construction is data-adaptive as it assigns more weight to the training points \(\bold{x}_i\) that are closer to the test point \(\bold{x}\) in the components which are more relevant for the distribution of \(\bold{Y}\). Our forest construction does not depend on the estimation target \(\tau(\bold{x})\), but it rather estimates the conditional distribution \(\P(\bold{Y} \mid \bold{\mathbf{X}=\mathbf{x}})\) directly and the induced forest weights can be used to estimate \(\tau(\bold{x})\) in a second step. This approach has several advantages. First, only one DRF fit is required to obtain estimates of many different targets, which has a big computational advantage. Furthermore, since those estimates are obtained from the same forest fit, they are mutually compatible. For example, if the conditional correlation matrix \(\{\Cor(Y_i,\, Y_j \mid \bold{X}\myeq\bold{x})\}_{i,j=1}^d\) were estimated componentwise, the resulting matrix might not be positive semidefinite, and as another example, the CDF estimates \(\hat{\P}(\bold{Y} \leq \bold{y} \mid \bold{X}\myeq\bold{x})\) might not be monotone in \(\bold{y}\), see Figure [\[comparison\]](#comparison){reference-type="ref" reference="comparison"}. Finally, it can be extremely difficult to tailor forest construction to more complex targets \(\tau(\bold{x})\). The induced weighting function can thus be used not only for obtaining simple distributional aspects such as, for example, the conditional quantiles, conditional correlations, or joint conditional probability statements, but also to obtain more complex objectives, such as conditional independence tests, heterogeneous regression (see also Section [4.4](#sec: causality){reference-type="ref" reference="sec: causality"} for more details) or semiparametric estimation by fitting a parametric model for \(\bold{Y}\), having nonparametrically adjusted for \(\bold{X}\). Representation of the conditional distribution via the weighting function has a great potential for applications in causality such as causal effect estimation or as a way of implementing do-calculus for finite samples, as we discuss in Section [4.4](#sec: causality){reference-type="ref" reference="sec: causality"}. Therefore, DRF is used in two steps: in the first step, we obtain the weighting function \(w_\bold{x}(\cdot)\) describing the conditional distribution \(\P(\bold{Y}\mid\bold{X}\myeq\bold{x})\) in a target-and model-free way, which is then used as an input for the second step. Even if the method used in the second step does not directly support weighting of the training data points, one can easily resample the data set with sampling probabilities equal to \(\{w_\bold{x}(\bold{x}_i)\}_{i=1}^n\). The two-step approach is visualized in the following diagram: ## Related work and our contribution Several adaptations of the Random Forest algorithm have been proposed for targets beyond the original one of the univariate conditional mean \(\E[Y \mid \bold{\mathbf{X}\myeq\mathbf{x}}]\): for survival analysis, conditional quantiles, density estimation, CDF estimation or heterogeneous treatment effects. Almost all such methods use the weights induced by the forest, as described in Section [2](#method_description){reference-type="ref" reference="method_description"}, rather than averaging the estimates obtained per tree. This view of Random Forests as a powerful adaptive nearest neighbor method is well known and dates back to. It was first used for targets beyond the conditional mean in, where the original forest construction with univariate \(Y\) was used. However, the univariate response setting considered there severely restricts the number of interesting targets \(\tau(\bold{x})\) and our DRF can thus be viewed as an important generalization of this approach to the multivariate setting. In order to be able to perform certain tasks or to achieve a better accuracy, many forest-based methods adapt the forest construction by using a custom splitting criterion tailored to their specific target, instead of relying on the standard CART criterion. In and, a parametric model for the response \(\bold{Y} \mid \bold{\mathbf{X}\myeq\mathbf{x}} \sim f(\theta(\bold{x}), \cdot)\) is assumed and recursive splitting is performed based on a permutation test which uses the user-provided score functions. Similarly, estimate certain univariate targets for which there exist corresponding score functions defining the local estimating equations. The data is split so that the estimates of the target in resulting child nodes differ the most. This is different, though, to the target-free splitting criterion of DRF, which splits so that the distribution of \(\bold{Y}\) in child nodes is as different as possible. Since the splitting step is extensively used in the algorithm, its complexity is crucial for the overall computational efficiency of the method, and one often needs to resort to approximating the splitting criterion to obtain good computational run time. We propose a splitting criterion based on a fast random approximation of the MMD statistic, which is commonly used in practice for two-sample testing as it is able to detect any change in the multivariate distribution of \(\bold{Y}\) with good power. DRF with the MMD splitting criterion also has interesting theoretical properties as shown in Section [3](#sec: theory){reference-type="ref" reference="sec: theory"} below. The multivariate response case has not received much attention in the Random Forest literature. Most of the existing forest-based methods focus on either a univariate response \(Y\) or on a certain univariate target \(\tau(\bold{x})\). One interesting line of work considers density estimation and uses aggregation of the CART criteria for different response transformations. Another approach is based on aggregating standard univariate CART splitting criteria for \(Y_1, \ldots, Y_d\) and targets only the conditional mean of the responses, a task which could also be solved by separate regression fits for each \(Y_i\). In order to capture any change in the distribution of the multivariate response \(\bold{Y}\), one needs to not only consider the marginal distributions for each component \(Y_i\), but also to determine whether their dependence structure changes, see e.g. Figure [\[fig: conditional-independence\]](#fig: conditional-independence){reference-type="ref" reference="fig: conditional-independence"}. There are not many methods that nonparametrically estimate the joint multivariate conditional distribution \(\P(\bold{Y} \mid \bold{X}\myeq\bold{x})\) in the statistics or machine learning literature. Other than a few simple classical methods such as \(k\)-nearest neighbors and kernel regression, there are methods based on normalizing flows such as Inverse Autoregressive Flow or Masked Autoregressive Flow and also conditional variants of several popular generative models such as Conditional Generative Adversarial Networks or Conditional Variational Autoencoder. The focus of these methods is more on the settings with large \(d\) and small \(p\), such as image or text generation. The comparison of DRF with the competing methods for distributional estimation can be found in Section [4.1](#sec: benchmarks){reference-type="ref" reference="sec: benchmarks"}. Our contribution, resulting in the proposal of the Distributional Random Forest (DRF), can be summarized as follows: First, we introduce the idea of forest construction based on sequential multivariate two-sample test statistics. It does not depend on a particular estimation target and is completely nonparametric, which makes its implementation and usage very simple and universal. Not only does it not require additional user input such as the log-likelihoods or score functions, but it can be used even for complicated targets for which there is no obvious forest construction. Furthermore, it has a computational advantage as only a single forest fit is needed for producing estimates of many different targets that are additionally compatible with each other. Second, we propose an MMD-based splitting criterion with good statistical and computational properties, for which we also derive interesting theoretical results in Section [3](#sec: theory){reference-type="ref" reference="sec: theory"}. It underpins our implementation, which we provide as `R` and `Python` packages `drf`. Finally, we show on a broad range of examples in Section [4](#sec: applications){reference-type="ref" reference="sec: applications"} how many different statistical estimation problems, some of which not being easily tractable by existing forest-based methods, can be cast to our framework, thus illustrating the usefulness and versatility of DRF. # Method {#method_description} In this section we describe the details of the Distributional Random Forest (DRF) algorithm. We closely follow the implementations of the `grf` and `ranger` `R`-packages. A detailed description of the method and its implementation and the corresponding pseudocode can be found in the Appendix [\[appendix: impdetails\]](#appendix: impdetails){reference-type="ref" reference="appendix: impdetails"}. ## Forest Building The trees are grown recursively in a model-free and target-free way as follows: For every parent node \(P\), we determine how to best split it into two child nodes of the form \(C_L = \{X_j \leq l\}\) and \(C_R = \{X_j > l\}\), where the variable \(X_j\) is one of the randomly chosen splitting candidates and \(l\) denotes its level based on which we perform the splitting. The split is chosen such that we maximize a certain (multivariate) two-sample test statistic \[\label{eq: splitcrit} \mathcal{D}\left(\{\bold{y}_i\mid \bold{x}_i \in C_L\} \,,\, \{\bold{y}_i \mid \bold{x}_i \in C_R\}\right),\] which measures the difference of the empirical distributions of the data \(\bold{Y}\) in the two resulting child nodes \(C_L\) and \(C_R\). Therefore, in each step we select the candidate predictor \(X_j\) which seems to affect the distribution of \(\bold{Y}\) the most, as measured by the metric \(\mathcal{D}(\cdot,\cdot)\). Intuitively, in this way we ensure that the distribution of the data points in every leaf of the resulting tree is as homogeneous as possible, which helps mitigate the bias caused by pooling the heterogeneous data together. A related idea can be found in GRF, where one attempts to split the data so that the resulting estimates \(\hat{\tau}_L\) and \(\hat{\tau}_R\), obtained respectively from data points in \(C_L\) and \(C_R\), differ the most: \[\label{eq: GRF split} \frac{n_Ln_R}{n_P^2} \left(\hat{\tau}_L-\hat{\tau}_R\right)^2,\] where we write \(n_P = |\{i \mid \bold{x}_i \in P\}|\) and \(n_L, n_R\) are defined analogously. One could construct the forest using any metric \(\mathcal{D}(\cdot,\cdot)\) for empirical distributions. However, in order to have a good accuracy of the overall method, the corresponding two-sample test using \(\mathcal{D}(\cdot,\cdot)\) needs to have a good power for detecting any kind of change in distribution, which is a difficult task in general, especially for multivariate data. Another very important aspect of the choice of distributional metric \(\mathcal{D}(\cdot, \cdot)\) is the computational efficiency; one needs to be able to sequentially compute the values of \(\mathcal{D}\left(\{\bold{y}_i\mid \bold{x}_i \in C_L\} \,,\, \{\bold{y}_i \mid \bold{x}_i \in C_R\}\right)\) for every possible split very fast for the overall algorithm to be computationally feasible, even for moderately large datasets. Below, we propose a splitting criterion based on the MMD two-sample test statistic which has both good statistical and computational properties. In contrast to other forest-based methods, we do not use any information about our estimation target \(\tau\) in order to find the best split of the data, which comes with a certain trade-off. On one hand, it is sensible that tailoring the splitting criterion to the target should improve the estimation accuracy; for example, some predictors might affect the conditional distribution of \(\bold{Y}\), but not necessarily the estimation target \(\tau\) and splitting on such predictors unnecessarily reduces the number of training points used for estimating \(\tau\). On the other hand, our approach has multiple benefits: it is easier to use as it does not require any user input such as the likelihood or score functions and it can also be used for very complicated targets for which one could not easily adapt the splitting criterion. Furthermore, only one DRF fit is necessary for producing estimates of many different targets, which has both computational advantage and the practical advantage that the resulting estimates are mutually compatible (see e.g. Figure [\[fig: functionals\]](#fig: functionals){reference-type="ref" reference="fig: functionals"}). Interestingly, sometimes it could even be beneficial to split based on a predictor which does not affect the target of estimation, but which affects the conditional distribution. This is illustrated by the following toy example. Suppose that for a bivariate response \((Y_1, Y_2)\) we are interested in estimating the slope of the linear regression of \(Y_2\) on \(Y_1\) conditionally on \(p=30\) predictors \(\bold{X}\), i.e. our target is \(\tau(\bold{x}) = \Cov(Y_1, Y_2 \mid \bold{X}\myeq\bold{x})/\Var(Y_1 \mid \bold{X}\myeq\bold{x})\). This is one of the main use cases for GRF and its variant which estimates this target is called Causal Forest. Let us assume that the data has the following distribution: \[\label{eq: toy_example} \P\left(\begin{bmatrix}Y_1 \\ Y_2\end{bmatrix} \,\,\middle|\,\, \bold{X}\myeq\bold{x}\right) \sim N\left(\begin{bmatrix} x_1 \\ x_1 \end{bmatrix}, \begin{bmatrix}\sigma^2 &0\\ 0 &\sigma^2\end{bmatrix}\right) \qquad \bold{X} \sim N(\bold{0}, I_p),\] i.e. \(X_1\) affects only the mean of the responses, while the other \(p-1\) predictors have no effect. In Figure [\[fig: toy_example\]](#fig: toy_example){reference-type="ref" reference="fig: toy_example"} we illustrate the distribution of the data when \(n=300, p=30, \sigma=0.2\), together with the DRF and GRF splitting criteria. The true value of the target is \(\tau(\bold{x})=0\), but when \(\sigma\) is not too big, the slope estimates \(\hat{\tau}\) on pooled data will be closer to \(1\). Therefore, the difference of \(\hat{\tau}_L\) and \(\hat{\tau}_R\) between the induced slope estimates for a candidate split, which is used for splitting criterion [\[eq: GRF split\]](#eq: GRF split){reference-type="eqref" reference="eq: GRF split"} of GRF, might not be large enough for us to decide to split on \(X_1\), or the resulting split might be too unbalanced. This results in worse forest estimates for this toy example, see Figure [\[fig: toy_example\]](#fig: toy_example){reference-type="ref" reference="fig: toy_example"}. ## Weighting Function {#sec: weighting function} Having constructed our forest, just as the standard Random Forest can be viewed as the weighted nearest neighbor method, we can use the induced weighting function to estimate the conditional distribution at any given test point \(\bold{x}\) and thus any other quantity of interest \(\tau(\bold{x})\). This approach is commonly used in various forest-based methods for obtaining predictions. Suppose that we have built \(N\) trees \(\mathcal{T}_1, \ldots, \mathcal{T}_N\). Let \(\mathcal{L}_k(\bold{x})\) be the set of the training data points which end up in the same leaf as \(\bold{x}\) in the tree \(\mathcal{T}_k\). The weighting function \(w_{\bold{x}}(\bold{x}_i)\) is defined as the average of the corresponding weighting functions per tree: \[\label{eq: weighting function} w_{\bold{x}}(\bold{x}_i) = \frac{1}{N} \sum_{k=1}^N \frac{\1\left(\bold{x}_i \in \mathcal{L}_k(\bold{x})\right)}{|\mathcal{L}_k(\bold{x})|}.\] The weights are positive add up to \(1\): \(\sum_{i=1}^n w_{\bold{x}}(\bold{x}_i) = 1\). In the case of equally sized leaf nodes, the assigned weight to a training point \(\bold{x}_i\) is proportional to the number of trees where the test point \(\bold{x}\) and \(\bold{x}_i\) end up in the same leaf node. This shows that forest-based methods can in general be viewed as adaptive nearest neighbor methods. The sets \(\mathcal{L}_k(\bold{x})\) of DRF will contain data points \((\bold{x}_i, \bold{y}_i)\) such that \(\P(\bold{Y}\mid \bold{X}=\bold{x}_i)\) is close to \(\P(\bold{Y}\mid \bold{\mathbf{X}=\mathbf{x}})\), thus removing bias due to heterogeneity of \(\bold{Y}\) caused by \(\bold{X}\). On the other hand, since the trees are constructed randomly and are thus fairly independent, the leaf sets \(\mathcal{L}_k(\bold{x})\) will be different enough so that the induced weights \(w_{\bold{x}}(\bold{x}_i)\) are not concentrated on a small set of data points, which would lead to high estimation variance. Such good bias-variance tradeoff properties of forest-based methods are also implied by their asymptotic properties, even though this is a still active area of research and not much can be shown rigorously. One can estimate the conditional distribution \(\P(\bold{Y}\mid\bold{X}=\bold{x})\) from the weighting function by using the corresponding empirical distribution: \[\label{eq: distributional estimate} \hat{\P}(\bold{Y} \mid \bold{X}=\bold{x}) = \sum_{i=1}^n w_{\bold{x}}(\bold{x}_i)\cdot\delta_{\bold{y}_i},\] where \(\delta_{\bold{y}_i}\) is the point mass at \(\bold{y}_i\). The weighting function \(w_{\bold{x}}(\bold{x}_i)\) can directly be used for any target \(\tau(\bold{x})\) in a second step and not just for estimating the conditional distribution. For example, the estimated conditional joint CDF is given by \[\label{eq: CDF estimate} \hat{F}_{\bold{Y}\mid\bold{X}\myeq\bold{x}}(\bold{t}) = \hat{\P}(Y_1 \leq t_1, \ldots, Y_d \leq t_d \mid \bold{X}\myeq\bold{x}) = \sum_{i=1}^n w_\bold{x}(\bold{x}_i) \1(\cap_{j=1}^d \{(\bold{y}_i)_j \leq t_j\}).\] It is important to point out that using the induced weighting function for locally weighted estimation is different than the approach of averaging the noisy estimates obtained per tree, originally used in standard Random Forests. Even though the two approaches are equivalent for conditional mean estimation, the former approach is often much more efficient for more complex targets, since the number of data points in a single leaf is very small, leading to large variance of the estimates. For the univariate response, the idea of using the induced weights for estimating targets different than the original target of conditional mean considered in dates back to Quantile Regression Forests (QRF), where a lot of emphasis is put on the quantile estimation, as the number of interesting targets is quite limited in the univariate setting. In the multivariate case, on the other hand, many interesting quantities such as, for example, conditional quantiles, conditional correlations or various conditional probability statements can easily be directly estimated from the weights. By using the weights as an input for some other method, we can accomplish some more complicated objectives, such as conditional independence testing, causal effect estimation, semiparametric learning, time series prediction or tail-index estimation in extreme value analysis. As an example, suppose that our data \(\bold{Y}\) come from a certain parametric model, where the parameter \(\theta\) is not constant, but depends on \(\bold{X}\) instead, i.e. \(\bold{Y}\mid\bold{\mathbf{X}=\mathbf{x}} \sim f(\theta(\bold{x}), \cdot)\), see also. One can then estimate the parameter \(\theta(\bold{x})\) by using weighted maximum likelihood estimation: \[\hat{\theta}(\bold{x}) = \argmax_{\theta \in \Theta} \sum_{i=1}^n w_\bold{x}(\bold{x}_i) \log f(\theta, \bold{y}_i).\] Another example is heterogeneous regression, where we are interested in the regression fit of an outcome \(Y \in \R\) on certain predicting variables \(\bold{W}\in \R^s\) conditionally on some event \(\{\bold{X} = \bold{x}\}\). This can be achieved by weighted regression of \(Y\) on \(\bold{W}\), where the weight \(w_\bold{x}(\bold{x}_i)\) assigned to each data point \((\bold{w}_i, y_i)\) is obtained from DRF with the multivariate response \((Y, \bold{W}) \in \R^{s+1}\) and predictors \(\bold{X} \in \R^p\), for an illustration see Section [4.4](#sec: causality){reference-type="ref" reference="sec: causality"}. The weighting function of DRF is illustrated on the air quality data in Figure [\[air_data\]](#air_data){reference-type="ref" reference="air_data"}. Five years (\(2015-2019\)) of air pollution measurements were obtained from the US Environmental Protection Agency (EPA) website. Six main air pollutants (nitrogen dioxide (NO\(_2\)), carbon monoxide (CO), sulphur dioxide (SO\(_2\)), ozone (O\(_3\)) and coarse and fine particulate matter (PM\(10\) and PM\(2.5\))) that form the air quality index (AQI) were measured at many different measuring sites in the US for which we know the longitude, latitude, elevation, location setting (rural, urban, suburban) and how the land is used within a \(1/4\) mile radius. Suppose we would want to know the distribution of the pollutant measurements at some new, unobserved, measurement site. The top row illustrates for a given test site, whose characteristics are indicated in the plot title, how much weight in total is assigned to the measurements from a specific training site. We see that the important sites share many characteristics with the test site and that DRF determines the relevance of each characteristic in a data-adaptive way. The bottom row shows the corresponding estimates of the joint conditional distribution of the pollutants (we choose \(2\) of them for visualization purposes) and one can clearly see how the estimated pollution levels are larger for the suburban site than for the rural site. The induced weights can be used, for example, for estimating the joint density (whose contours can be seen in the plot) or for estimating the probability that the AQI is below a certain value by summing the weights in the corresponding region of space. ## Distributional Metric In order to determine the best split of a parent node \(P\), i.e. such that the distributions of the responses \(\bold{Y}\) in the resulting child nodes \(C_L\) and \(C_R\) differ the most, one needs a good distributional metric \(\mathcal{D}(\cdot,\cdot)\) (see Equation [\[eq: splitcrit\]](#eq: splitcrit){reference-type="eqref" reference="eq: splitcrit"}) which can detect change in distribution of the response \(\bold{Y}\) when additionally conditioning on an event \(\{X_j > l\}\). Testing equality of distributions from the corresponding samples is an old problem in statistics, called two-sample testing problem. For univariate data, many good tests exist such as Wilcoxon rank test, Welch's t-test, Wasserstein two-sample testing, Kolmogorov-Smirnov test and many others, but obtaining an efficient test for multivariate distributions has proven to be quite challenging due to the curse of dimensionality. Additional requirement for the choice of distributional metric \(\mathcal{D}(\cdot,\cdot)\) used for data splitting is that it needs to be computationally very efficient as splitting is used extensively in the algorithm. If we construct \(N\) trees from \(n\) data points and in each node we consider \(\text{mtry}\) candidate variables for splitting, the complexity of the standard Random Forest algorithm in the univariate case is \(\O(N \times \text{mtry} \times n \log n)\) provided our splits are balanced. It uses the CART splitting criterion, given by: \[\label{eq: CART} \frac{1}{n_P}\left(\sum_{\bold{x}_i \in C_L} (y_i-\overline{y}_L)^2 + \sum_{\bold{x}_i \in C_R} (y_i-\overline{y}_R)^2 \right),\] where \(\overline{y}_L = \tfrac{1}{n_L}\sum_{\bold{x}_i \in C_L} y_i\) and \(\overline{y}_R\) is defined analogously. This criterion has an advantage that not only it can be computed in \(\O(n_P)\) complexity, but this can be done for all possible splits \(\{X_j \leq l\}\) as cutoff level \(l\) varies, since updating the splitting criterion when moving a single training data point from one child node to the other requires only \(\O(1)\) computational steps (most easily seen by rewriting the CART criterion as in [\[eq: CART equivalent\]](#eq: CART equivalent){reference-type="eqref" reference="eq: CART equivalent"}). If the time complexity of evaluating the DRF splitting criterion [\[eq: splitcrit\]](#eq: splitcrit){reference-type="eqref" reference="eq: splitcrit"} for a single splitting candidate \(X_j\) and all cutoffs \(l\) of interest (usually taken to range over all possible values) is at least \(n^c\) for some \(c>1\), say \(\O(f(n_P))\) for some function \(f:\R \to \R\), then by solving the recursive relation we obtain that the overall complexity of the method is given by \(\O(N \times \text{mtry} \times f(n))\), which can be unfeasible even for moderately large \(n\) if \(f\) grows too fast. The problem of sequential two-sample testing is also central to the field of change-point detection, with the slight difference that in the change-point problems the distribution is assumed to change abruptly at certain points in time, whereas for our forest construction we only are interested in finding the best split of the form \(\{X_j \leq l\}\) and the conditional distribution \(\P(\bold{Y}\mid \{\bold{X}\in P\} \cap\{X_j \leq l\})\) usually changes gradually with \(l\). The testing power and the computational feasibility of the method play a big role in change-point detection as well. However, the state-of-the-art change-point detection algorithms are often too slow for our purpose as sequential testing is done \(\O(N \times \text{mtry} \times n)\) times for forest construction, much more frequently than in change-point problems. ### MMD splitting criterion {#sec: MMD splitcrit} Even though DRF could in theory be constructed with any distributional metric \(\mathcal{D}(\cdot, \cdot)\), as a default choice we propose splitting criterion based on the Maximum Mean Discrepancy (MMD) statistic. Let \((\mathcal{H}, \langle\cdot,\cdot\rangle_\mathcal{H})\) be the RKHS of real-valued functions on \(\R^d\) induced by some positive-definite kernel \(k\), and let \(\varphi:\R^d \to \mathcal{H}\) be the corresponding feature map satisfying that \(k(\bold{u}, \bold{v}) = \langle\varphi(\bold{u}), \varphi(\bold{v})\rangle_\mathcal{H}\). The MMD statistic \(\mathcal{D}_{\text{MMD}(k)}\left(U, V\right)\) for kernel \(k\) and two samples \(U = \{\bold{u}_1, \ldots, \bold{u}_{|U|}\}\) and \(V = \{\bold{v}_1, \ldots, \bold{v}_{|V|}\}\) is given by: \[\label{eq: MMD} \mathcal{D}_{\text{MMD}(k)}\left(U, V\right) = \frac{1}{|U|^2}\sum_{i,j=1}^{|U|} k(\bold{u}_i, \bold{u}_j) + \frac{1}{|V|^2}\sum_{i,j=1}^{|V|} k(\bold{v}_i, \bold{v}_j)-\frac{2}{|U||V|}\sum_{i=1}^{|U|}\sum_{j=1}^{|V|} k(\bold{u}_i, \bold{v}_j).\] MMD compares the similarities, described by the kernel \(k\), within each sample with the similarities across samples and is commonly used in practice for two-sample testing. It is based on the idea that one can assign to each distribution \(\mathcal{P}\) its embedding \(\mu(\mathcal{P})\) into the RKHS \(\mathcal{H}\), which is the unique element of \(\mathcal{H}\) given by \[\label{eq: RKHS embedding} \mu(\mathcal{P}) = \E_{\bold{Y} \sim \mathcal{P}}[\varphi(\bold{Y})].\] The MMD two-sample statistic [\[eq: MMD\]](#eq: MMD){reference-type="eqref" reference="eq: MMD"} can then can then equivalently be written as the squared distance between the embeddings of the empirical distributions with respect to the RKHS norm \(\norm{\cdot}_\mathcal{H}\): \[\label{eq: MMD embedding} \mathcal{D}_{\text{MMD}(k)}\left(U, V\right) = \norm*{\mu\left(\frac{1}{|U|}\sum_{i=1}^{|U|} \delta_{\bold{u}_i}\right)-\mu\left(\frac{1}{|V|}\sum_{i=1}^{|V|} \delta_{\bold{v}_i}\right)}_\mathcal{H}^2,\] recalling that \(\delta_{\bold{y}}\) is the point mass at \(\bold{y}\). As the sample sizes \(|U|\) and \(|V|\) grow, the MMD statistic [\[eq: MMD embedding\]](#eq: MMD embedding){reference-type="eqref" reference="eq: MMD embedding"} converges to its population version, which is the squared RKHS distance between the corresponding embeddings of the data-generating distributions of \(U\) and \(V\). Since the embedding map \(\mu\) is injective for characteristic kernel \(k\), we see that MMD is able to detect any difference in the distribution. Even though the power of the MMD two sample test also deteriorates as the data dimensionality grows, since the testing problem becomes intrinsically harder, it still has good empirical power compared to other multivariate two-sample tests for a wide range of \(k\). However, the \(\O((|U|+|V|)^2)\) complexity for computing \(\mathcal{D}_{\text{MMD}(k)}(U, V)\) from [\[eq: MMD\]](#eq: MMD){reference-type="eqref" reference="eq: MMD"} is too large for many applications. For that reason, several fast approximations of MMD have been suggested in the literature. As already mentioned, the complexity of the distributional metric \(\mathcal{D}(\cdot,\cdot)\) used for DRF is crucial for the overall method to be computationally efficient, since the splitting step is used extensively in the forest construction. We therefore propose splitting based on an MMD statistic computed with an approximate kernel \(\tilde{k}\), which is also a fast random approximation of the original MMD. Bochner's theorem (see e.g. ) gives us that any bounded shift-invariant kernel can be written as \[\label{eq: bochner} k(\bold{u}, \bold{v}) = \int_{\R^d} e^{i\boldsymbol{\omega}^T(\bold{u}-\bold{v})}d\nu(\boldsymbol{\omega}),\] i.e. as a Fourier transform of some measure \(\nu\). Therefore, by randomly sampling the frequency vectors \(\boldsymbol{\omega}_1, \ldots, \boldsymbol{\omega}_B\) from normalized \(\nu\), we can approximate our kernel \(k\) by another kernel \(\tilde{k}\) (up to a scaling factor) as follows: \[k(\bold{u}, \bold{v}) = \int_{\R^d} e^{i\boldsymbol{\omega}^T(\bold{u}-\bold{v})}d\nu(\boldsymbol{\omega}) \approx \frac{1}{B} \sum_{b=1}^B e^{i\boldsymbol{\omega}_b^T(\bold{u}-\bold{v})} = \tilde{k}(\bold{u}, \bold{v}),\] where we define \(\tilde{k}(\bold{u}, \bold{v}) = \langle \bold{\widetilde{\varphi}}(\bold{u}), \bold{\widetilde{\varphi}}(\bold{v})\rangle_{\mathbb{C}^B}\) as the kernel function with the feature map given by \[\bold{\widetilde{\varphi}}(\bold{u}) = \frac{1}{\sqrt{B}}\left(\tilde{\varphi}_{\boldsymbol{\omega}_1}(\bold{u}), \ldots, \tilde{\varphi}_{\boldsymbol{\omega}_B}(\bold{u})\right)^T = \frac{1}{\sqrt{B}}\left(e^{i\boldsymbol{\omega}_1^T\bold{u}}, \ldots, e^{i\boldsymbol{\omega}_B^T\bold{u}}\right)^T,\] which is a random vector consisting of the Fourier features \(\widetilde{\varphi}_{\boldsymbol{\omega}}(\bold{u}) = e^{i\boldsymbol{\omega}^T\bold{u}} \in \mathbb{C}\). Such kernel approximations are frequently used in practice for computational efficiency. As a default choice of \(k\) we take the Gaussian kernel with bandwidth \(\sigma\), since in this case we have a convenient expression for the measure \(\nu\) and we sample \(\boldsymbol{\omega}_1, \ldots, \boldsymbol{\omega}_B \sim N_{d}(\bold{0}, \sigma^{-2}I_{d})\). The bandwidth \(\sigma\) is chosen as the median pairwise distance between all training responses \(\{\bold{y}_i\}_{i=1}^n\), commonly referred to as the 'median heuristic'. From the representation of MMD via the distribution embeddings [\[eq: MMD embedding\]](#eq: MMD embedding){reference-type="eqref" reference="eq: MMD embedding"} we can obtain that MMD two-sample test statistic \(\mathcal{D}_{\text{MMD}(\tilde{k})}\) using the approximate kernel \(\tilde{k}\) is given by \[\mathcal{D}_{\text{MMD}(\tilde{k})}\left(\{\bold{u}_i\}_{i=1}^{|U|}, \{\bold{v}_i\}_{i=1}^{|V|}\right) = \frac{1}{B}\sum_{b=1}^B\left\lvert \frac{1}{|U|}\sum_{i=1}^{|U|} \tilde{\varphi}_{\boldsymbol{\omega}_b}(\bold{u}_i)-\frac{1}{|V|}\sum_{i=1}^{|V|} \tilde{\varphi}_{\boldsymbol{\omega}_b}(\bold{v}_i) \right\rvert^2.\] Interestingly, \(\mathcal{D}_{\text{MMD}(\tilde{k})}\) is not only an MMD statistic on its own, but can also be viewed as a random approximation of the original MMD statistic \(\mathcal{D}_{\text{MMD}(k)}\) [\[eq: MMD\]](#eq: MMD){reference-type="eqref" reference="eq: MMD"} using kernel \(k\); by using the kernel representation [\[eq: bochner\]](#eq: bochner){reference-type="eqref" reference="eq: bochner"}, it can be written (the derivation can be found in the Appendix [\[appendix: proofs\]](#appendix: proofs){reference-type="ref" reference="appendix: proofs"}) as \[\mathcal{D}_{\text{MMD}(k)}\left(\{\bold{u}_i\}_{i=1}^{|U|}, \{\bold{v}_i\}_{i=1}^{|V|}\right) = \int_{\R^d}\left\lvert \frac{1}{|U|}\sum_{i=1}^{|U|} \tilde{\varphi}_{\boldsymbol{\omega}}(\bold{u}_i)-\frac{1}{|V|}\sum_{i=1}^{|V|} \tilde{\varphi}_{\boldsymbol{\omega}}(\bold{v}_i) \right\rvert^2 d\nu(\boldsymbol{\omega}).\] Finally, our DRF splitting criterion \(\mathcal{D}(\cdot, \cdot)\) [\[eq: splitcrit\]](#eq: splitcrit){reference-type="eqref" reference="eq: splitcrit"} is then taken to be the (scaled) MMD statistic \(\tfrac{n_Ln_R}{n_P^2}\mathcal{D}_{\text{MMD}(\tilde{k})}\left(\{\bold{y}_i\mid \bold{x}_i \in C_L\} \,,\, \{\bold{y}_i \mid \bold{x}_i \in C_R\}\right)\) with the approximate random kernel \(\tilde{k}\) used instead of \(k\), which can thus be conveniently written as: \[\begin{aligned} \label{eq: MMD splitcrit} \frac{1}{B}\sum_{b=1}^B \frac{n_Ln_R}{n_P^2} \left\lvert \frac{1}{n_L}\sum_{\bold{x}_i \in C_L} \tilde{\varphi}_{\boldsymbol{\omega}_b}(\bold{y}_i)-\frac{1}{n_R}\sum_{\bold{x}_i \in C_R} \tilde{\varphi}_{\boldsymbol{\omega}_b}(\bold{y}_i) \right\rvert^2, \end{aligned}\] where we recall that \(n_P = |\{i \mid \bold{x}_i \in P\}|\) and \(n_L, n_R\) are defined analogously. The additional scaling factor \(\tfrac{n_Ln_R}{n_P^2}\) in [\[eq: MMD splitcrit\]](#eq: MMD splitcrit){reference-type="eqref" reference="eq: MMD splitcrit"} occurs naturally and compensates the increased variance of the test statistic for unbalanced splits; it also appears in the GRF [\[eq: GRF split\]](#eq: GRF split){reference-type="eqref" reference="eq: GRF split"} and CART (see representation [\[eq: CART equivalent\]](#eq: CART equivalent){reference-type="eqref" reference="eq: CART equivalent"}) splitting criteria. The main advantage of the splitting criterion based on \(\mathcal{D}_{\text{MMD}(\tilde{k})}\) is that by using the representation [\[eq: splitcrit\]](#eq: splitcrit){reference-type="eqref" reference="eq: splitcrit"} it can be easily computed for every possible splitting level \(l\) in \(\O(Bn_P)\) complexity, whereas the MMD statistic \(\mathcal{D}_{\text{MMD}(k)}\) using kernel \(k\) would require \(\O(n_P^2)\) computational steps, which makes the overall complexity of the algorithm \(\O\left(B \times N \times \text{mtry} \times n \log n\right)\) instead of much slower \(\O\left(N \times \text{mtry} \times n^2\right)\). We do not use the same approximate random kernel \(\tilde{k}\) for different splits; for every parent node \(P\) we resample the frequency vectors \(\{\omega_b\}_{b=1}^B\) defining the corresponding feature map \(\tilde{\varphi}\). Using different \(\tilde{k}\) at each node might help to better detect different distributional changes. Furthermore, having different random kernels for each node agrees well with the randomness of the Random Forests and helps making the trees more independent. Since the MMD statistic \(\mathcal{D}_{\text{MMD}(\tilde{k})}\) used for our splitting criterion is not only an approximation of \(\mathcal{D}_{\text{MMD}(k)}\), but is itself an MMD statistic, it inherits good power for detecting any difference in distribution of \(\bold{Y}\) in the child nodes for moderately large data dimensionality \(d\), even when \(B\) is reasonably small. One could even consider changing the number of random Fourier features \(B\) at different levels of the tree, as \(n_P\) varies, but for simplicity we take it to be fixed. There is some similarity of our MMD-based splitting criterion [\[eq: MMD splitcrit\]](#eq: MMD splitcrit){reference-type="eqref" reference="eq: MMD splitcrit"} with the standard variance reduction CART splitting criterion [\[eq: CART\]](#eq: CART){reference-type="eqref" reference="eq: CART"} when \(d=1\), which can be rewritten as: \[\label{eq: CART equivalent} \frac{n_Ln_R}{n_P^2}\left(\frac{1}{n_L}\sum_{\bold{x}_i \in C_L} y_i-\frac{1}{n_R}\sum_{\bold{x}_i \in C_R} y_i \right)^2.\] The derivation can be found in Appendix [\[appendix: proofs\]](#appendix: proofs){reference-type="ref" reference="appendix: proofs"}. From this representation, we see that the CART splitting criterion [\[eq: CART\]](#eq: CART){reference-type="eqref" reference="eq: CART"} is also equivalent to the GRF splitting criterion [\[eq: GRF split\]](#eq: GRF split){reference-type="eqref" reference="eq: GRF split"} when our target is the univariate conditional mean \(\tau(\bold{x}) = \E[Y \mid \bold{X}\myeq\bold{x}]\) which is estimated for \(C_L\) and \(C_R\) by the sample means \(\hat{\tau}_L = \overline{y}_L\) and \(\hat{\tau}_R = \overline{y}_R\). Therefore, as it compares the means of the univariate response \(Y\) in the child nodes, the CART criterion can only detect changes in the response mean well, which is sufficient for prediction of \(Y\) from \(\bold{X}\), but might not be suitable for more complex targets. Similarly, for multivariate applications, aggregating the marginal CART criteria across different components \(Y_i\) of the response can only detect changes in the means of their marginal distributions. However, it is possible in the multivariate case that the pairwise correlations or the variances of the responses change, while the marginal means stay (almost) constant. For an illustration on simulated data, see Figure [\[fig: gaussian_copula\]](#fig: gaussian_copula){reference-type="ref" reference="fig: gaussian_copula"}. Additionally, aggregating the splitting criteria over \(d\) components of the response \(\bold{Y}\) can reduce the signal size if only the distribution of a few components change. Our MMD-based splitting criterion [\[eq: MMD splitcrit\]](#eq: MMD splitcrit){reference-type="eqref" reference="eq: MMD splitcrit"} is able to avoid such difficulties as it implicitly inspects all aspects of the multivariate response distribution. If we take a trivial kernel \(k_{\text{id}}(y_i, y_j) = y_i y_j\) with the identity feature map \(\varphi_{\text{id}}(y) = y\), the corresponding distributional embedding [\[eq: RKHS embedding\]](#eq: RKHS embedding){reference-type="eqref" reference="eq: RKHS embedding"} is given by \(\mu(\mathcal{P}) = \E_{Y\sim\mathcal{P}} Y\) and thus the corresponding splitting criterion based on \(\mathcal{D}_{\text{MMD}(k_{\text{id}})}\) [\[eq: MMD embedding\]](#eq: MMD embedding){reference-type="eqref" reference="eq: MMD embedding"} corresponds exactly to the CART splitting criterion [\[eq: CART\]](#eq: CART){reference-type="eqref" reference="eq: CART"}, which can be seen from its equivalent representation [\[eq: CART equivalent\]](#eq: CART equivalent){reference-type="eqref" reference="eq: CART equivalent"}. Interestingly, Theorem [\[thm: MMD_CART_equivalence\]](#thm: MMD_CART_equivalence){reference-type="ref" reference="thm: MMD_CART_equivalence"} in Section [3](#sec: theory){reference-type="ref" reference="sec: theory"} below shows that the MMD splitting criterion with kernel \(k\) can also be viewed as the abstract CART criterion in the RKHS \(\mathcal{H}\) corresponding to \(k\). Moreover, it is also shown that DRF with the MMD splitting criterion can thus be viewed asymptotically as a greedy minimization of the squared RKHS distance between the corresponding embeddings of our estimate \(\hat{\P}(\bold{Y}\mid\bold{X}\myeq\bold{x})\) and the truth \(\P(\bold{Y}\mid\bold{X}\myeq\bold{x})\) averaged over \(\bold{x}\), thus justifying the proposed method. In Section [3](#sec: theory){reference-type="ref" reference="sec: theory"}, we exploit this relationship to derive interesting theoretical properties of DRF with the MMD splitting criterion. # Theoretical Results {#sec: theory} In this section we exploit the properties of kernel mean embedding in order to relate DRF with the MMD splitting criterion to an abstract version of the standard Random Forest with the CART splitting criterion when the response is taking values in the corresponding RKHS. We further exploit this relationship to adapt the existing theoretical results from the Random Forest literature to show that our estimate [\[eq: distributional estimate\]](#eq: distributional estimate){reference-type="eqref" reference="eq: distributional estimate"} of the conditional distribution of the response is consistent with respect to the MMD metric for probability measures and with a good rate. Finally, we show that this implies consistency of the induced DRF estimates for a range interesting targets \(\tau(\bold{x})\), such as conditional CDFs or quantiles. The proofs of all results can be found in the Appendix [\[appendix: proofs\]](#appendix: proofs){reference-type="ref" reference="appendix: proofs"}. Recalling the notation from above, let \(\left(\mathcal{H}, \langle\cdot,\cdot\rangle_{\mathcal{H}}\right)\) be the Reproducing kernel Hilbert space induced by the positive definite kernel \(k:\R^d\times\R^d \to \R\) and let \(\varphi:\R^d \to \mathcal{H}\) be its corresponding feature map. The kernel embedding function \(\mu:\mathcal{M}_{b}(\R^d) \to \mathcal{H}\) maps any bounded signed Borel measure \(\mathcal{P}\) on \(\R^d\) to an element \(\mu(\mathcal{P}) \in \mathcal{H}\) defined by \[\mu(\mathcal{P}) = \int_{\R^d}\varphi(\bold{y})d\mathcal{P}(\bold{y}),\] see [\[eq: RKHS embedding\]](#eq: RKHS embedding){reference-type="eqref" reference="eq: RKHS embedding"}. Boundedness of \(k\) ensures that \(\mu\) is indeed defined on all of \(\mathcal{M}_{b}(\R^d)\), while continuity of \(k\) ensures that \(\mathcal{H}\) is separable. By considering the kernel embedding \(\mu(\cdot)\) and using its linearity, we can write the embedding of the distributional estimate \(\mu(\hat{\P}(\bold{Y}\mid\bold{X}\myeq\bold{x}))\) of DRF [\[eq: distributional estimate\]](#eq: distributional estimate){reference-type="eqref" reference="eq: distributional estimate"} as the average of the embeddings of the empirical distributions of \(\bold{Y}\) in the leaves containing \(\bold{x}\) over all trees: \[\label{eq: embedding estimate} \mu(\hat{\P}(\bold{Y}\mid\bold{X}\myeq\bold{x})) = \frac{1}{N}\sum_{k=1}^N \mu\left( \frac{1}{|\mathcal{L}_k(\bold{x})|}\sum_{\bold{x}_i \in \mathcal{L}_k(\bold{x})} \delta_{\bold{y}_i}\right) = \frac{1}{N}\sum_{k=1}^N \frac{1}{|\mathcal{L}_k(\bold{x})|}\sum_{\bold{x}_i \in \mathcal{L}_k(\bold{x})} \mu(\delta_{\bold{y}_i}).\] This is analogous to the prediction of the response for the standard Random Forest, but where we average the embeddings \(\mu(\delta_{\bold{y}_i}) = \varphi(\bold{y}_i)\) instead of the response values themselves. Therefore, by using the kernel embedding, we can shift the perspective to the RKHS \(\mathcal{H}\) and view DRF as the analogue of the original Random Forest for estimation of \(\mu(\P(\bold{Y}\mid\bold{X}=\bold{x})) = \E[\varphi(\bold{Y})\mid\bold{X}\myeq\bold{x}]\) in some abstract Hilbert space. With this viewpoint, we can relate the MMD splitting criterion to the original CART criterion [\[eq: CART\]](#eq: CART){reference-type="eqref" reference="eq: CART"}, which measures the mean squared prediction error for splitting a certain parent node \(P\) into children \(C_L\) and \(C_R\). On one hand, from Equation [\[eq: CART equivalent\]](#eq: CART equivalent){reference-type="eqref" reference="eq: CART equivalent"} we see that the CART criterion measures the squared distance between the response averages \(\tfrac{1}{n_L}\sum_{\bold{x}_i \in C_L} y_i\) and \(\tfrac{1}{n_R}\sum_{\bold{x}_i \in C_R} y_i\) in the child nodes, but on the other hand, Equation [\[eq: MMD embedding\]](#eq: MMD embedding){reference-type="eqref" reference="eq: MMD embedding"} shows that the MMD splitting criterion measures the RKHS distance between the embeddings of the empirical response distributions in \(C_L\) and \(C_R\). This is summarized in the following theorem, which not only shows that the MMD splitting criterion can be viewed as the abstract CART criterion in the RKHS \(\mathcal{H}\), but also that DRF with the MMD splitting criterion can be viewed as greedy minimization of the average squared distance between the estimated and true conditional distributions, as measured by the RKHS norm between the corresponding embeddings to \(\mathcal{H}\): In conclusion, DRF with the MMD splitting criterion can be viewed as the standard Random Forest with the CART splitting criterion, but with the response \(\mu(\delta_{\bold{Y}})\) taking values in an abstract RKHS \(\mathcal{H}\) instead of \(\R\). Therefore, one could in principle derive properties of DRF by adapting any theoretical result for standard Random Forests from the literature. However, a lot of care is needed for making the results rigorous in this abstract setup, as many useful properties of \(\R\) need not hold for infinite-dimensional \(\mathcal{H}\). The remaining part of this section is inspired by the results from. We suppose that the forest construction satisfies the following properties, which significantly facilitate the theoretical considerations of the method and ensure that our forest estimator is well behaved, as stated in: - (*Data sampling*) The bootstrap sampling with replacement, usually used in forest-based methods, is replaced by a subsampling step, where for each tree we choose a random subset of size \(s_n\) out of \(n\) training data points. We consider \(s_n\) going to infinity with \(n\), with the rate specified below. - (*Honesty*) The data used for constructing each tree is split into two parts; the first is used for determining the splits and the second for populating the leaves and thus for estimating the response. - (*\(\alpha\)-regularity*) Each split leaves at least a fraction \(\alpha \leq 0.2\) of the available training sample on each side. Moreover, the trees are grown until every leaf contains between \(\kappa\) and \(2\kappa-1\) observations, for some fixed tuning parameter \(\kappa \in \N\). - (*Symmetry*) The (randomized) output of a tree does not depend on the ordering of the training samples. - (*Random-split*) At every split point, the probability that the split occurs along the feature \(X_j\) is bounded below by \(\pi/p\), for some \(\pi > 0\) and for all \(j=1,\ldots,p\). The validity of the above properties are easily ensured by the forest construction. For more details, see Appendix [\[appendix: impdetails\]](#appendix: impdetails){reference-type="ref" reference="appendix: impdetails"}. From Equation [\[eq: embedding estimate\]](#eq: embedding estimate){reference-type="eqref" reference="eq: embedding estimate"}, the prediction of DRF for a given test point \(\mathbf{x}\) can be viewed as an element of \(\mathcal{H}\). If we denote the \(i\)-th training observation by \(\mathbf{Z}_i=(\mathbf{x}_i, \mu(\delta_{\mathbf{y}_i})) \in \R^p \times \mathcal{H}\), then by [\[eq: embedding estimate\]](#eq: embedding estimate){reference-type="eqref" reference="eq: embedding estimate"} we estimate the embedding of the true conditional distribution \(\mu(\P(\bold{Y}\mid\bold{X}\myeq\bold{x}))\) by the average of the corresponding estimates per tree: \[\label{rewriting} \mu(\hat{\P}(\mathbf{Y} \mid \mathbf{X} \myeq \mathbf{x})) = \frac{1}{N} \sum_{j=1}^N T(\bold{x}; \varepsilon_j, \mathcal{Z}_j),\] where \(\mathcal{Z}_k\) is a random subset of \(\{\mathbf{Z}_i\}_{i=1}^n\) of size \(s_n\) chosen for constructing the \(j\)-th tree \(\mathcal{T}_j\) and \(\varepsilon_j\) is a random variable capturing all randomness in growing \(\mathcal{T}_j\), such as the choice of the splitting candidates. \(T(\bold{x}; \varepsilon, \mathcal{Z})\) denotes the output of a single tree: i.e. the average of the terms \(\mu(\delta_{\bold{Y}_i})\) over all data points \(\bold{Z}_i\) contained in the leaf \(\mathcal{L}(\bold{x})\) of the tree constructed from \(\varepsilon\) and \(\mathcal{Z}\). Since one can take the number of trees \(N\) to be arbitrarily large, we consider an "idealized" version of our estimator, as done in, which we denote as \(\hat{\mu}_n(\mathbf{x})\): \[\label{finalestimator} \hat{\mu}_n(\mathbf{x}) = \binom{n}{s_n}^{-1} \sum_{i_1 < i_2 < \ldots < i_{s_n}} \E_{\varepsilon} \,\,T(\mathbf{x}; \varepsilon; \{\bold{Z}_{i_1}, \ldots, \bold{Z}_{i_{s_n}}\}),\] where the sum is taken over all \(\binom{n}{s_n}\) possible subsets of \(\{\mathbf{Z}_{i}\}_{i=1}^n\). We have that \(\mu(\hat{\P}(\bold{Y}\mid\bold{X}\myeq\bold{x})) \to \hat{\mu}_n(\mathbf{x})\) as \(N\to \infty\), while keeping the other variables constant, and thus we assume for simplicity that those two quantities are the same. Our main result shows that, under similar assumptions as in, the embedding of our conditional distribution estimator \(\mu_n(\bold{x}) = \mu(\hat{\P}(\mathbf{Y} \mid \mathbf{X} \myeq \mathbf{x}))\) consistently estimates \(\mu(\bold{x}) \coloneqq \mu(\P(\mathbf{Y} \mid \mathbf{X} \myeq \mathbf{x}))\) with respect to the RKHS norm with a certain rate: The above result shows that DRF estimate \(\hat{\P}(\bold{Y}\mid\bold{X}\myeq\bold{x})\) converges fast to the truth \(\P(\bold{Y}\mid\bold{X}\myeq\bold{x})\) in the MMD distance, i.e. the RKHS distance between the corresponding embeddings. Even though this is interesting on its own, ultimately we want to relate this result to estimation of certain distributional targets \(\tau(\bold{x}) = \tau(\P(\bold{Y}\mid\bold{X}\myeq\bold{x})).\) For any \(f \in \mathcal{H}\), we have that the DRF estimate of the target \(\tau(\bold{x}) = \E[f(\bold{Y})\mid\bold{X}\myeq\bold{x}]\) equals the dot product \(\langle f, \hat{\mu}_n(\mathbf{x}) \rangle_\mathcal{H}\) in the RKHS: \[\langle f, \hat{\mu}_n(\mathbf{x}) \rangle_\mathcal{H} = \left\langle f,\, \int_{\R^d} \varphi(\mathbf{y}) d \hat{\P}(\mathbf{y} \mid \mathbf{X} \myeq \mathbf{x})\right\rangle_\mathcal{H} = \int_{\R^d} f(\mathbf{y}) \, d\hat{\P}(\mathbf{y} \mid \mathbf{X} \myeq \mathbf{x}) = \sum_{i=1}^n w_{\mathbf{x}}(\mathbf{x}_i) f(\mathbf{y}_i),\] where we recall the weighting function \(w_{\mathbf{x}}(\cdot)\) induced by the forest [\[eq: weighting function\]](#eq: weighting function){reference-type="eqref" reference="eq: weighting function"}. Therefore, the consistency result [\[eq: rate\]](#eq: rate){reference-type="eqref" reference="eq: rate"} in Theorem [\[thm: consistency\]](#thm: consistency){reference-type="ref" reference="thm: consistency"} directly implies that \[\label{eq: target consistency} \sum_{i=1}^n w_{\mathbf{x}}(\mathbf{x}_i) f(\mathbf{y}_i) = \langle f, \hat{\mu}_n(\mathbf{x}) \rangle_\mathcal{H} \stackrel{p}{\to} \langle f, \mu(\mathbf{x}) \rangle_\mathcal{H} = \E[f(\bold{Y})\mid\bold{X}\myeq\bold{x}] \quad \text{ for any \(f \in \mathcal{H}\)},\] i.e. that the DRF consistently estimates the targets of the form \(\tau(\bold{x}) = \E[f(\bold{Y})\mid\bold{X}\myeq\bold{x}]\), for \(f \in \mathcal{H}\). From [\[eq: rate\]](#eq: rate){reference-type="eqref" reference="eq: rate"} we also obtain the rate of convergence when \(s_n \asymp n^\beta\): \[\left|\sum_{i=1}^n w_{\mathbf{x}}(\mathbf{x}_i) f(\mathbf{y}_i)-\E[f(\bold{Y})\mid\bold{X}\myeq\bold{x}]\right| = o_{p}\left( n^{-\gamma} \norm{f}_\mathcal{H}\right),\] for \(\gamma\) as in Theorem [\[thm: consistency\]](#thm: consistency){reference-type="ref" reference="thm: consistency"}. When \(k\) is continuous, it is well known that all elements of \(\mathcal{H}\) are continuous, see e.g.U̇nder certain assumptions on the kernel and its input space, holding for several popular kernels, (e.g. the Gaussian kernel), we can generalize the convergence result [\[eq: target consistency\]](#eq: target consistency){reference-type="eqref" reference="eq: target consistency"} to any bounded and continuous function \(f:\R^d \to \R\), as the convergence of measures \(\hat{\P}(\bold{Y}\mid\bold{X}\myeq\bold{x}) \to \P(\bold{Y}\mid\bold{X}\myeq\bold{x})\) in the MMD metric will also imply their weak convergence, i.e. \(k\) metrizes weak convergence: Recalling the Portmanteau Lemma on separable metric spaces, see e.g.  this has several other interesting consequences, such as the consistency of CDF and quantile estimates; Let \(F_{\mathbf{Y}\mid\bold{X}\myeq\bold{x}}(\cdot)\) be the conditional CDF of \(\mathbf{Y}\) and for any index \(1\leq i\leq d\), let \(F_{Y_i\mid\bold{X}\myeq\bold{x}}(\cdot)\) be the conditional CDF of \(Y_i\) and \(F_{Y_i\mid\bold{X}\myeq\bold{x}}^{-1}(\cdot)\) its generalized inverse, i.e. the quantile function. Let \(\hat{F}_{Y_i\mid\bold{X}\myeq\bold{x}}(\cdot)\) and \(\hat{F}_{Y_i\mid\bold{X}\myeq\bold{x}}^{-1}(\cdot)\) be the corresponding DRF estimates via weighting function [\[eq: CDF estimate\]](#eq: CDF estimate){reference-type="eqref" reference="eq: CDF estimate"}. Then we have the following result: # Applications and Numerical Experiments {#sec: applications} The goal of this section is to demonstrate the versatility and applicability of DRF for many practical problems. We show that DRF can be used not only as an estimator of the multivariate conditional distribution, but also as a two-step method to easily obtain out-of-the box estimators for various, and potentially complex, targets \(\tau(\bold{x})\). Our main focus lies on the more complicated targets which cannot be that straightforwardly approached by conventional methods. However, we also illustrate the usage of DRF for certain applications for which there already exist several well-established methods. Whenever possible in such cases, we compare the performance of DRF with the specialized, task-specific methods to show that, despite its generality, there is at most a very small loss of precision. However, we should point out that for many targets such as, that can not be written in a form of a conditional mean or a conditional quantile, for example, conditional correlation, direct comparison of the accuracy is not possible for real data, since no suitable loss function exists and the ground truth is unknown. Finally, we show that, in addition to directly estimating certain targets, DRF can also be a very useful tool for many different applications, such as causality and fairness. Detailed descriptions of all data sets and the corresponding analyses, together with additional simulations can be found in the appendix. ## Estimation of Conditional Multivariate Distributions {#sec: benchmarks} In order to provide good estimates for any target \(\tau(\bold{x}) = \tau(\P(\bold{Y}\mid\bold{X}\myeq\bold{x}))\), our method needs to estimate the conditional multivariate distribution \(\P(\bold{Y}\mid \bold{X}\myeq\bold{x})\) well. Therefore, we first investigate here the accuracy of the DRF estimate [\[eq: distributional estimate\]](#eq: distributional estimate){reference-type="eqref" reference="eq: distributional estimate"} of the full conditional distribution and compare its performance with the performance of several existing methods. There are not many algorithms in the literature that nonparametrically estimate the multivariate conditional distribution \(\P(\bold{Y}\mid \bold{\mathbf{X}=\mathbf{x}})\). In addition to a few simple methods such as the \(k\)-nearest neighbors or the kernel regression, which locally weight the training points, we also consider advanced machine learning methods such as the Conditional Generative Adversarial Network (CGAN), Conditional Variational Autoencoder (CVAE) and Masked Autoregressive Flow. It is worth mentioning that the focus in the machine learning literature has been more on applications where \(d\) is very large (e.g. pixels of an image) and \(p\) is very small (such as image labels). Even though some methods do not provide the estimated conditional distribution in a form as simple as DRF, one is still able to sample from the estimated distribution and thus perform any subsequent analysis and make fair comparisons between the methods. We first illustrate the estimated distributions of the above method on a toy example where \(n=1000, p=10, d=2\) and \[\label{eq: vignette example} Y_1 \indep Y_2\mid \bold{X}\myeq\bold{x}, \quad Y_1 \mid \bold{X}\myeq\bold{x} \sim U(x_1, x_1 + 1), \quad Y_2 \mid \bold{X}\myeq\bold{x} \sim U(0, x_2), \quad \bold{X} \sim U(0,1)^p.\] That is, in the above example \(X_1\) affects the mean of \(Y_1\), whereas \(X_2\) affects the both mean and variance of \(Y_2\), and \(X_3,\ldots, X_p\) have no impact. The results can be seen in Figure [\[fig: distribution illustration\]](#fig: distribution illustration){reference-type="ref" reference="fig: distribution illustration"} for the above methods. We see that, unlike some other methods, DRF is able to balance the importance of the predictors \(X_1\) and \(X_2\) and thus to estimate the distributions of \(Y_1\) and \(Y_2\) well. One can do a more extensive comparison on real data sets. We use the benchmark data sets from the multi-target regression literature together with some additional ones created from the real data sets described throughout this paper. The performance of DRF is compared with the performance of other existing methods for nonparametric estimation of multivariate distributions by using the Negative Log Predictive Density (NLPD) loss, which evaluates the logarithm of the induced multivariate density estimate. As the number of test points grows to infinity, NLPD loss becomes equivalent to the average KL divergence between the estimated and the true conditional distribution and is thus able to capture how well one estimates the whole distribution instead of only its mean. In addition to the methods mentioned above, we also include the methods that are intended only for mean prediction, by assuming that the distribution of the response around its mean is homogeneous, i.e. that the conditional distribution \(\P\left(\bold{Y}-\E[\bold{Y} \mid \bold{X}] \mid \bold{X}\myeq\bold{x}\right)\) does not depend on \(\bold{x}\). This is fitted by regressing each component of \(\bold{Y}\) separately on \(\bold{X}\) and using the pooled residuals. We consider the standard nonparametric regression methods such as Random Forest, XGBoost, and Deep Neural Networks. The results are shown in Table [1](#benchtable){reference-type="ref" reference="benchtable"}. We see that DRF performs well for a wide range of sample size and problem dimensionality, especially in problems where \(p\) is large and \(d\) is moderately big. It does so without the need for any tuning or involved numerical optimization. More detailed analysis and descriptions of each competing method and the loss function can be found in the Appendix [\[appendix: simulation details\]](#appendix: simulation details){reference-type="ref" reference="appendix: simulation details"}. ## Estimation of Statistical Functionals Because DRF represents the estimated conditional distribution \(\hat{\P}(\bold{Y} \mid \bold{X}=\bold{x}) = \sum_{i} w_{\bold{x}}(\bold{x}_i)\cdot \delta_{\bold{y}_i}\) in a convenient form by using weights \(w_{\bold{x}}(\bold{x}_i)\), a plug-in estimator \(\tau(\hat{\P}(\bold{Y} \mid \bold{X}=\bold{x}))\) of many common real valued statistical functionals \(\tau(\P(\bold{Y} \mid \bold{X}=\bold{x})) \in \R\) can be easily constructed from \(w_{\bold{x}}(\cdot)\). We first investigate the performance for the classical problem of univariate quantile estimation on simulated data. We consider the following three data generating mechanisms with \(p=40, n=2000\) and \(\bold{X}_i \iid U(-1,1)^p\): - Scenario 1: \(Y \sim N(0.8\cdot \1(X_1 > 0), 1)\) (mean shift based on \(X_1\)) - Scenario 2: \(Y \sim N(0, (1+\1(X_1>0))^2)\) (variance shift based on \(X_1\)) - Scenario 3: \(Y \sim \1(X_1\leq 0) \cdot N(1, 1) + \1(X_1 > 0) \cdot \text{Exp}(1)\) (distribution shift based on \(X_1\), constant mean and variance) The first two scenarios correspond exactly to the examples given in. In Figure [\[fig: univariate\]](#fig: univariate){reference-type="ref" reference="fig: univariate"} we can see the corresponding estimates of the conditional quantiles for DRF, Quantile Regression Forest (QRF), which uses the same forest construction with CART splitting criterion as the original Random Forest but estimates the quantiles from the induced weighting function, Generalized Random Forests (GRF) with a splitting criterion specifically designed for quantile estimation and Transformation Forests (TRF). We see that DRF is performing very well even compared to methods that are specifically tailored to quantile estimation. For more detailed analysis and some additional examples, such as the univariate mean regression, we refer the reader to Appendix [\[appendix: additional examples\]](#appendix: additional examples){reference-type="ref" reference="appendix: additional examples"}. The multivariate setting is however more interesting, as one can use DRF to compute much more interesting statistical functionals \(\tau(\bold{x})\). We illustrate this in Figure [\[fig: functionals\]](#fig: functionals){reference-type="ref" reference="fig: functionals"} for the the air quality data set, described in Section [2.2](#sec: weighting function){reference-type="ref" reference="sec: weighting function"}. The left plot shows one value of the estimated multivariate CDF, specifically the estimated probability of the event that the air quality index (AQI) is at most \(50\) at a given test site. This corresponds to the \"Good\" category and means that the amount of every air pollutant is below a certain threshold determined by the EPA. Such probability estimates can be easily obtained by summing the weights of the training points belonging to the event of interest. In order to investigate the accuracy of the conditional CDF obtained by DRF, we compare the estimated probabilities with estimates of the standard univariate classification forest with the response \(\1(\text{AQI} \leq 50)\). In the left plot of Figure [\[comparison\]](#comparison){reference-type="ref" reference="comparison"}, we can see that the DRF estimates of the \(\P(\text{AQI} \leq 50 \mid {\mathbf{X}=\mathbf{x}})\) (also visualized in Figure [\[fig: functionals\]](#fig: functionals){reference-type="ref" reference="fig: functionals"}) are quite similar to the estimates of the classification forest predicting the outcome \(\1(\text{AQI} \leq 50)\). Furthermore, the cross-entropy loss evaluated on the held-out measurements equals \(0.4671\) and \(0.4663\) respectively, showing almost no loss of precision. In general, estimating the simple functionals from the weights provided by DRF comes usually at a small to no loss compared to the classical methods specifically designed for this task. In addition to the classical functionals \(\tau(\bold{x})\) in the form of an expectation \(\mathbb{E}(f(\bold{Y})\mid \bold{X}=\bold{x})\) or a quantile \(Q_{\alpha}(f(\bold{Y})\mid \bold{X}=\bold{x})\) for some function \(f: \mathbb{R}^{d} \rightarrow \mathbb{R}\), which can also be computed by solving the corresponding one-dimensional problems, additional interesting statistical functionals with intrinsically multivariate nature that are not that simple to estimate directly are accessible by DRF, such as, for example, the conditional correlations \(\Cor(Y_i,\, Y_j \mid \bold{X}\myeq\bold{x})\). As an illustration, the estimated correlation of the sulfur dioxide (\(\text{SO}_2\)) and fine particulate matter (PM2.5) is shown in the right plot of Figure [\[fig: functionals\]](#fig: functionals){reference-type="ref" reference="fig: functionals"}. The plot reveals also that the local correlation in many big cities is slightly larger than in its surroundings, which can be explained by the fact that the industrial production directly affects the levels of both pollutants. A big advantage of the target-free forest construction of DRF is that all subsequent targets are computed from same the weighting function \(w_\bold{x}\) obtained from a single forest fit. First, this is computationally more efficient, since we do not need for every target of interest to fit the method specifically tailored to it. For example, estimating the CDF with classification forests requires fitting one forest for each function value. Secondly and even more importantly, since all statistical functionals are plug-in estimates computed from the same weighting function, the obtained estimates are mathematically well-behaved and mutually compatible. For example, if we estimate \(\Cor(Y_i, Y_j \mid \bold{X}\myeq\bold{x})\) by separately estimating the terms \(\Cov(Y_i, Y_j \mid \bold{X}\myeq\bold{x})\), \(\Var(Y_i \mid \bold{X}\myeq\bold{x})\), and \(\Var(Y_j \mid \bold{X}\myeq\bold{x})\), one can not in general guarantee the estimate to be in the range \([-1, 1]\), but this is possible with DRF. Alternatively, the correlation or covariance matrices that are estimated entrywise are guaranteed to be positive semi-definite if one uses DRF. As an additional illustration, Figure [\[comparison\]](#comparison){reference-type="ref" reference="comparison"} shows that the estimated (univariate) CDF using the classification forest need not be monotone due to random errors in each predicted value, which can not happen with the DRF estimates. ## Conditional Copulas and Conditional Independence Testing {#sec: copulas} One can use the weighting function not only to estimate certain functionals, but also to obtain more complex objects, such as, for example, the conditional copulas. The well-known Sklar's theorem implies that at a point \(\textbf{x} \in \mathbb{R}^{p}\), the conditional CDF \(\P(\bold{Y} \leq \bold{y} \mid \bold{X}=\bold{x}) = \P(Y_1 \leq y_1, \ldots, Y_d \leq y_d \mid \bold{X}=\bold{x})\) can be represented by a CDF \(C_{\bold{x}}\) on \([0,1]^{d}\), the conditional copula at \(\bold{x}\), and \(d\) conditional marginal CDFs \(F_{Y_i\mid\bold{X}\myeq\bold{x}}(y) = \P(Y_{i} \leq y \mid \bold{X}=\bold{x})\) for \(1 \leq i \leq d\), as follows: \[\label{eq: copula decomposition} \P(\bold{Y} \leq \bold{y}\mid \bold{X}=\bold{x}) = C_{\bold{x}}\left( F_{Y_1\mid\bold{X}\myeq\bold{x}}(y_1), \ldots, F_{Y_d\mid\bold{X}\myeq\bold{x}}(y_d) \right).\] Copulas capture the dependence of the components \(Y_i\) by the joint distribution of the corresponding quantile levels of the marginal distributions: \(F_{Y_i\mid\bold{X}\myeq\bold{x}}(Y_i) \in [0,1]\). Decomposing the full multivariate distribution to marginal distributions and the copula is a very useful technique used in many fields such as risk analysis or finance. Using DRF enables us to estimate copulas conditionally, either by fitting certain parametric model or nonparametrically, directly from the weights. To illustrate this, consider an example where the \(5\)-dimensional \(\bold{Y}\) is generated from the equicorrelated Gaussian copula \(\bold{Y}= (Y_{1},\ldots,Y_{5}) \mid \bold{X}=\bold{x} \sim C^{\text{Gauss}}_{\rho(\bold{x})}\) conditionally on the covariates \(\bold{X}\) with distribution \(\mathbf{X}_i \iid U(0,1)^{p}\), where \(p=30\) and \(n\myeq 5000\). All \(Y_i\) have a \(N(0,1)\) distribution marginally, but their conditional correlation for \(i \neq j\) is given by \(\text{Cor}(Y_i, Y_j) = \rho(\bold{x}) = x_1\). Figure [\[fig: gaussian_copula\]](#fig: gaussian_copula){reference-type="ref" reference="fig: gaussian_copula"} shows that DRF estimates the full conditional distribution at different test points \(\bold{x}\) quite accurately and thus we can obtain a good nonparametric estimate of the conditional copula as follows. First, for each component \(Y_i\), we compute the corresponding marginal CDF estimate \(\hat{F}_{Y_i\mid\bold{X}\myeq\bold{x}}(\cdot)\) from the weights. Second, we map each response \(\bold{y}_i \to \bold{u}_i \coloneqq \left(\hat{F}_{Y_1\mid\bold{X}\myeq\bold{x}}\left((\bold{y}_i)_1\right), \ldots, \hat{F}_{Y_d\mid\bold{X}\myeq\bold{x}}\left((\bold{y}_i)_d\right)\right)\). The copula estimate is finally obtained from the weighted distribution \(\sum_{i=1}^n w_{\bold{x}}(\bold{x}_i) \delta_{\bold{u}_i}\), from which we sample the points in Figure [\[fig: gaussian_copula\]](#fig: gaussian_copula){reference-type="ref" reference="fig: gaussian_copula"} in order to visualize the copula. If we want to instead estimate the copula parametrically, we need to find the choice of parameters for a given model family which best matches the estimated conditional distribution, e.g. by weighted maximum likelihood estimation (MLE). For the above example, the correlation parameter of the Gaussian copula can be estimated by computing the weighted correlation with weights \(\{w_\bold{x}(\bold{x}_i)\}_{i=1}^n\). The left plot in Figure [\[fig: conditional-independence\]](#fig: conditional-independence){reference-type="ref" reference="fig: conditional-independence"} shows the resulting estimates of the conditional correlation \(\text{Cor}\left(Y_1, Y_2 \mid \bold{X}=\bold{x}\right)\) obtained from \(\text{DRF}_{\text{MMD}}\), which uses the MMD splitting criterion [\[eq: MMD splitcrit\]](#eq: MMD splitcrit){reference-type="eqref" reference="eq: MMD splitcrit"} described in Section [2.3.1](#sec: MMD splitcrit){reference-type="ref" reference="sec: MMD splitcrit"}, and \(\text{DRF}_{\text{CART}}\), which aggregates the marginal CART criteria. We see that \(\text{DRF}_{\text{MMD}}\) is able to detect the distributional heterogeneity and provide good estimates of the conditional correlation. On the other hand, \(\text{DRF}_{\text{CART}}\) cannot detect the change in distribution of \(\bold{Y}\) caused by \(X_1\) that well. The distributional heterogeneity can not only occur in marginal distribution of the responses (a case extensively studied in the literature), but also in their interdependence structure described by the conditional copula \(C_{\bold{x}}\), as one can see from decomposition [\[eq: copula decomposition\]](#eq: copula decomposition){reference-type="eqref" reference="eq: copula decomposition"}. Since \(\text{DRF}_\text{MMD}\) relies on a distributional metric for its splitting criterion, it is capable of detecting any change in distribution, whereas aggregating marginal CART criteria for \(Y_1, \ldots, Y_d\) in \(\text{DRF}_\text{CART}\) only captures the changes in the marginal means. This is further illustrated for a related application of conditional independence testing, where we compute some dependence measure from the obtained weights. For example, we can test the independence \(Y_1 \indep Y_2\) conditionally on the event \(\bold{X}=\bold{x}\) by using the Hilbert Schmidt Independence Criterion (HSIC), which measures the difference between the joint distribution and the product of the marginal distributions. The right plot of Figure [\[fig: conditional-independence\]](#fig: conditional-independence){reference-type="ref" reference="fig: conditional-independence"} shows that the \(\text{DRF}_{\text{MMD}}\) estimates are quite close to the population value of the HSIC, unlike the ones obtained by \(\text{DRF}_\text{CART}\). ## Heterogeneous Regression and Causal Effect Estimation {#sec: causality} In this and the following section, we illustrate that, in addition to direct estimation of certain targets, DRF can also be a useful tool for complex statistical problems and applications, such as causality. Suppose we would like to investigate the relationship between some (univariate) quantity of interest \(Y\) and certain predictors \(\bold{W}\) from heterogeneous data, where the change in distribution of \((\bold{W}, Y)\) can be explained by some other covariates \(\bold{X}\). Very often in causality applications, \(\bold{W}\) is a (multivariate) treatment variable, \(Y\) is the outcome, which is commonly, but not necessarily, discrete, and \(\bold{X}\) is a set of observed confounding variables for which we need to adjust if we are interested in the causal effect of \(\bold{W}\) on \(Y\). This is illustrated by the following causal graph: The problem of nonparametric confounding adjustment is hard; not only can the marginal distributions of \(Y\) and \(\bold{W}\) be affected by \(\bold{X}\), thus inducing spurious associations due to confounding, but the way how \(\bold{W}\) affects \(Y\) can itself depend on \(\bold{X}\), i.e. the treatment effect might be heterogeneous. The total causal effect can be computed by using the adjustment formula: \[\begin{aligned} \E[Y\mid do(\bold{W}\myeq\bold{w})] &= \int \E[Y\mid do(\bold{W}\myeq\bold{w}), \bold{X}\myeq\bold{x}]\,\P(\bold{X}\myeq\bold{x}\mid do(\bold{W}\myeq\bold{w}))d\bold{x} \nonumber\\ &=\int \E[Y\mid \bold{W}\myeq\bold{w}, \bold{X}\myeq\bold{x}]\,\P(\bold{X}\myeq\bold{x})d\bold{x}. \label{eq: causal effect} \end{aligned}\] However, implementing do-calculus for finite samples and potentially non-discrete data might not be straightforward and comes with certain difficulties. The standard approach would be to estimate the conditional mean \(\E[Y\mid \bold{W}\myeq\bold{w}, \bold{X}\myeq\bold{x}]\) nonparametrically by regressing \(Y\) on \((\bold{X}, \bold{W})\) with some method of choice and to average out the estimates over different \(\bold{x}\) sampled from the observed distribution of \(\bold{X}\). Using DRF for this is not necessary, but has an advantage that one can easily estimate the full interventional distribution \(\P(Y\mid do(\bold{W}\myeq\bold{w}))\) and not only the interventional mean. Another way to compute the causal effect is explained in the following, which allows to add more structure to the problem. We use DRF to first fit the forest with the multivariate response \((\bold{W}, Y)\) and the predictors \(\bold{X}\). In this way, one can for any point of interest \(\bold{x}\) obtain the joint distribution of \((\bold{W}, Y)\) conditionally on the event \(\bold{X}\myeq\bold{x}\) and then the weights \(\{w_\bold{x}(\bold{x}_i)\}_{i=1}^n\) can be used as an input for some regression method for regressing \(Y\) on \(\bold{W}\) in the second step. This conditional regression fit might be of separate interest and it can also be used for estimating the causal effect \(\E[Y \mid do(\bold{W}\myeq\bold{w})]\) from [\[eq: causal effect\]](#eq: causal effect){reference-type="eqref" reference="eq: causal effect"}, by averaging the estimates \(\E[Y \mid \bold{W}\myeq\bold{w}, \bold{X}\myeq\bold{x}]\) over \(\bold{x}\), where \(\bold{x}\) is sampled from the empirical observation of \(\bold{X}\). In this way one can efficiently exploit and incorporate any prior knowledge of the relationship between \(\bold{W}\) and \(Y\), such as, for example, monotonicity, smoothness or that it satisfies a certain parametric regression model, without imposing any assumptions on the effect of \(\bold{X}\) on \((\bold{W}, Y)\). Furthermore, one might be able to better extrapolate to the regions of space where \(\P(\bold{W}\myeq\bold{w}, \bold{X}\myeq\bold{x})\) is small, compared to the standard approach which computes \(\E[Y \mid \bold{W}\myeq\bold{w}, \bold{X}\myeq\bold{x}]\) directly, by regressing \(Y\) on \((\bold{W}, \bold{X})\). Extrapolation is crucial for causal applications, since for computing \(\E[Y\mid do(\bold{W}\myeq\bold{w})]\) we are interested in what would happen with \(Y\) when our treatment variable \(\bold{W}\) is set to be \(\bold{w}\), regardless of the value achieved by \(\bold{X}\). However, it can easily happen that for this specific combination of \(\bold{X}\) and \(\bold{W}\) there are very few observed data points, thus making the estimation of the causal effect hard. As an illustration, we consider the following synthetic data example, with continuous outcome \(Y\), continuous univariate treatment \(W\), \(n=5000\) and \(p=20\): \[\label{eq: causal example} \bold{X} \sim U(0,5)^p,\quad W \mid \bold{X} \sim N(X_2, 1),\quad Y \mid \bold{X}, W \sim N(X_2 + X_1 \sin(W), 1).\] A visualization of the data can be seen on the left side of Figure [\[fig: causal_effect\]](#fig: causal_effect){reference-type="ref" reference="fig: causal_effect"}; treatment \(W\) affects \(Y\) non-linearly, \(X_2\) is a confounding variable that affects the marginal distributions of \(Y\) and \(W\) and \(X_1\) makes the treatment effect heterogeneous. The middle part of Figure [\[fig: causal_effect\]](#fig: causal_effect){reference-type="ref" reference="fig: causal_effect"} shows the conditional regression fits, i.e. the estimates of \(\E[Y\mid W\myeq w, \bold{X}\myeq\bold{x}]\) as \(w\) varies and \(\bold{x}\) is fixed. We see that combination of DRF with response \((Y, W)\) and predictors \(\bold{X}\) with the smoothing splines regression of \(Y\) on \(W\) (blue curve) is more accurate than the estimates obtained by standard Random Forest with response \(Y\) and predictors \((W, \bold{X})\) (red curve). Furthermore, we see that the former approach can extrapolate better to regions with small number of data points, which enables us to better estimate the causal effect \(\E[Y \mid do(W \myeq w)]\) from [\[eq: causal effect\]](#eq: causal effect){reference-type="eqref" reference="eq: causal effect"}, by averaging the corresponding estimates of \(\E[Y\mid W\myeq w, \bold{X}\myeq\bold{x}]\) over observed \(\bold{x}\), as shown in the right plot of Figure [\[fig: causal_effect\]](#fig: causal_effect){reference-type="ref" reference="fig: causal_effect"}. The conditional regression fit \(\E[Y\mid\bold{W}\myeq\bold{w}, \bold{X}\myeq\bold{x}]\) is related to the concept of the conditional average treatment effect (CATE) as it quantifies the effect of \(\bold{W}\) on \(Y\) for the subpopulation for which \(\bold{X}=\bold{x}\). There exist many successful methods in the literature for estimating the causal effects and the (conditional) average treatment effects for a wide range of settings. Due to its versatility, DRF can easily be used when the underlying assumptions of existing methods are violated, when some additional structure is given in the problem or for the general, nonparametric, settings. Appendix [\[appendix: additional examples\]](#appendix: additional examples){reference-type="ref" reference="appendix: additional examples"} contains additional comparisons with some existing methods for causal effect estimation. ### Births data We further illustrate the applicability of DRF for causality-related problems on the natality data obtained from the Centers for Disease Control and Prevention (CDC) website, where we have information about all recorded births in the USA in 2018. We investigate the relationship between the pregnancy length and the birthweight, an important indicator of baby's health. Not only is this relationship complex, but it also depends on many different factors, such as parents' race, baby's gender, birth multiplicity (single, twins, triplets\...) etc. In the left two plots of Figure [\[birthweight\]](#birthweight){reference-type="ref" reference="birthweight"} one can see the estimated joint distribution of birthweight and pregnancy length conditionally on many different covariates, as indicated in the plot. The black curves denote the subsequent regression fit, based on smoothing splines and described in detail in Appendix [\[appendix: simulation details\]](#appendix: simulation details){reference-type="ref" reference="appendix: simulation details"}. In addition to the estimate of the mean, indicated by the solid curve, we also include the estimates of the conditional \(0.1\) and \(0.9\) quantiles, indicated by dashed curves, which is very useful in practice for determining whether a baby is large or small for its gestational age. Notice how DRF assigns less importance to the mother's race when the point of interest is a twin (middle plot), as in this case more weight is given to twin births, regardless of the race of the parents. Suppose now we would like to understand how a twin birth \(T\) causally affects the birthweight \(B\), but ignoring the obvious indirect effect due to shorter pregnancy length \(L\). For example, sharing of resources between the babies might have some effect on their birthweight. We additionally need to be careful to adjust for other confounding variables \(\bold{X}\), such as, for example, the parents' race, which can affect \(B, T\) and \(L\). We assume that this is represented by the following causal graph: In order to answer the above question, we investigate the causal quantity \(\P(B \mid do(T\myeq t, L\myeq l))\). Even though one cannot make such do-intervention in practice, this quantity describes the total causal effect if the birth multiplicity and the length of the pregnancy could be manipulated and thus for a fixed pregnancy length \(l\), we can see the difference in birthweight due to \(T\). We compute this quantity as already stated above, by using DRF with subsequent regression fits (described in detail in Appendix [\[appendix: simulation details\]](#appendix: simulation details){reference-type="ref" reference="appendix: simulation details"}), which has the advantage of better extrapolating to regions with small probability, such as long twin pregnancies (see middle plot of Figure [\[birthweight\]](#birthweight){reference-type="ref" reference="birthweight"}). In the right plot of Figure [\[birthweight\]](#birthweight){reference-type="ref" reference="birthweight"} we show the mean and quantiles of the estimated interventional distribution and we see that, as one might expect, a twin birth causes smaller birthweight on average, with the difference increasing with the length of the pregnancy. ## Fairness Being able to compute different causal quantities with DRF could prove useful in a range of applications, including fairness. We investigate the data on approximately \(1\) million full-time employees from the 2018 American Community Survey by the US Census Bureau from which we have extracted the salary information and all covariates that might be relevant for salaries. In the bottom left plot of Figure [\[fig: wage\]](#fig: wage){reference-type="ref" reference="fig: wage"} one can see the distribution of hourly salary of men and women (on the logarithmic scale). The overall salary was scaled with working hours to account for working part-time and for the fact that certain jobs have different working hours. We can see that men are paid more in general, especially for the very high salaries. The difference between the median hourly salaries, a commonly used statistic in practice, amounts \(17\%\) for this data set. We would like to answer whether the observed gender pay gap in the data is indeed unfair, i.e. only due to the gender, or whether it can at least in part be explained by some other factors, such as age, job type, number of children, geography, race, attained education level and many others. Hypothetically, it could be, for example, that women have a preference for jobs that are paid less, thus causing the gender pay gap. In order to answer this question, we assume that the data is obtained from the following causal graph, where \(G\) denotes the gender, \(W\) the hourly wage and all other factors are denoted by \(\bold{X}\): i.e. \(G\) is a source node and \(W\) is a sink node in the graph. In order to determine the direct effect of the gender on wage that is not mediated by other factors, we would like to compute the distribution of the nested counterfactual \(W(\text{male},\, \bold{X}(\text{female}))\), which is interpreted in the data-generating process as the women's wage had they been treated in same way as men by their employers for determining the salary, but without changing their propensities for other characteristics, such as the choice of occupation. Therefore, it can be obtained from the observed distribution as follows: \[\begin{aligned} \P\left(W(\text{male},\, \bold{X}(\text{female}))\right) &= \int \P\left(W( G\myeq\text{male},\, \bold{X}\myeq\bold{x})\right)\P(\bold{X}\myeq\bold{x}\mid G\myeq\text{female})d\bold{x} \nonumber\\ &= \int \P\left(W\mid G\myeq\text{male},\, \bold{X}\myeq\bold{x}\right)\P(\bold{X}\myeq\bold{x}\mid G\myeq\text{female})d\bold{x}, \label{eq: nested_counterfactual} \end{aligned}\] Put in the language of the fairness literature, it quantifies the unfairness when all variables \(\bold{X}\) are assumed to be resolving, meaning that any difference in salaries directly due to factors \(\bold{X}\) is not viewed as gender discrimination. For example, one does not consider unfair if people with low education level get lower salaries, even if the gender distribution in this group is not balanced. There are several ways how one can compute the distribution of \(W(\text{male},\, \bold{X}(\text{female}))\) from [\[eq: nested_counterfactual\]](#eq: nested_counterfactual){reference-type="eqref" reference="eq: nested_counterfactual"} with DRF. The most straightforward option is to take \(W\) as the response and \((G, \bold{X})\) as predictors in order to compute the conditional distribution \(\P\left(W\mid G\myeq\text{male},\, \bold{X}\myeq\bold{x}\right)\). However, with this approach it could happen that for predicting \(\P\left(W\mid G\myeq\text{male},\, \bold{X}\myeq\bold{x}\right)\) we also assign weight to training data points for which \(G\myeq\text{female}\). This happens if in some trees we did not split on variable \(G\), which is likely, for example, if \(\P(G=\text{male} \mid \bold{X}\myeq\bold{x})\) is low. Using salaries of both genders to estimate the distribution of men's salaries might be an issue if our goal is to objectively compare how women and men are paid. Another approach is to take \((W, G)\) as a multivariate response and \(\bold{X}\) as the predictors for DRF and thus obtain joint distribution of \((W, G)\) conditionally on the event \(\bold{X}\myeq\bold{x}\). In this way we can also quantify the gender discrimination of a single individual with characteristics \(\bold{x}\) by comparing his/her salary to the corresponding quantile of the salary distribution of people of the opposite gender with the same characteristics \(\bold{x}\). This is interesting because the distribution of salaries, and thus also the gender discrimination, can be quite different depending on other factors such as the industry sector or job type, as illustrated for a few choices of \(\bold{x}\) in the top row of Figure [\[fig: wage\]](#fig: wage){reference-type="ref" reference="fig: wage"}. Finally, by averaging the DRF estimates of \(\P\left(W\mid\bold{X}\myeq\bold{x},\, G\myeq\text{male}\right)\), conveniently represented via the weights, over different \(\bold{x}\) sampled from the distribution \(\P(\bold{X}\mid G\myeq\text{female})\), we can compute the distribution of the nested counterfactual \(W(\text{male},\, \bold{X}(\text{female}))\). In the middle panel in the bottom row of Figure [\[fig: wage\]](#fig: wage){reference-type="ref" reference="fig: wage"} a noticeable difference in the means, also called natural direct effect in the causality literature, is still visible between the observed distribution of women's salaries and the hypothetical distribution of their salaries had they been treated as men, despite adjusting for indirect effects of the gender via covariates \(\bold{X}\). By further matching the quantiles of the counterfactual distribution \(\P\left(W(\text{male},\, \bold{X}(\text{female}))\right)\) with the corresponding quantiles of the observed distribution of men's salaries in the bottom right panel of Figure [\[fig: wage\]](#fig: wage){reference-type="ref" reference="fig: wage"}, we can also see that the adjusted gender pay gap even increases for larger salaries. Median hourly wage for women is still \(11\%\) lower than the median wage for the hypothetical population of men with exactly the same characteristics \(\bold{X}\) as women, indicating that only a minor proportion of the actually observed hourly wage difference of \(17\%\) can be explained by other demographic factors. # Conclusion We have shown that DRF is a flexible, general and powerful tool, which exploits the well-known properties of the Random Forest as an adaptive nearest neighbor method via the induced weighting function. Not only does it estimate multivariate conditional distributions well, but it constructs the forest in a model-and target-free way and is thus an easy to use out-of-the-box algorithm for many, potentially complex, learning problems in a wide range of applications, including also causality and fairness, with competitive performance even for problems with existing tailored methods.
{'timestamp': '2021-06-01T02:03:03', 'yymm': '2005', 'arxiv_id': '2005.14458', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14458'}
# Introduction One of the major motivations in the study of finite-temperature Quantum ChromoDynamics (QCD) is to shed light on the phase structure of the strong interaction matter. Lattice-QCD data has confirmed the chiral and deconfinement phase transition is a crossover for small baryon chemical potential . The sign problem at large baryon chemical potential  prevents lattice-QCD from giving precise predictions about the phase transition at finite density. Model calculations based on NJL model, quark meson model, and various beyond mean field frameworks have all predicted that the chiral phase transition at finite density is a first order phase transition . Thermodynamic theorem then predicts a critical end point (CEP) between the crossover and the first order phase transition, which is a second order phase transition. However, due to various approximations adopted in the model calculations, there is not an agreement on the location of the CEP on the phase diagram. The exploration of the QCD phase diagram is also one of the most important goals for relativistic heavy-ion experiments. Through a systematic measurement over a range of beam energies, the beam energy scan (BES) program makes it possible to search for the CEP in the QCD phase diagram . Besides the ongoing BES program at RHIC, several other programs at other facilities such as FAIR and NICA have also contributed to the searching of QCD critical end point. The related experiments are mainly driven by measurements of net-proton or net-charge multiplicity fluctuations  which are expected to show characteristic non-monotonic behavior near the phase transition and especially near the CEP . The fast dynamics in the fireball renders it difficult to bridge the gap between the experiment and the theories. Since from the theoretical aspect, the QCD phase structure is investigated in an equilibrium, long-lived, extremely large and homogeneous system. On the contrary, the fireball in the heavy ion collision is a highly dynamical system, characterized by very short lifetime, extremely small size and fast dynamical expansion. The finite-size effect and off-equilibrium effect prevent a divergent correlation length, and thus weaken the critical phenomenon which takes place in the equilibrium system. On one hand, the fast expansion and cooling during the evolution of the fireball tends to drive the system out of local equilibrium. On the other hand, the relaxation time diverges around the critical point , the critical slowing down renders it harder for the system to reach local equilibrium. A thorough understanding of phase transitions in the dynamical environment is thus of fundamental necessary to make profound predictions from the BES project. Various models have been applied to study the chiral phase transition and related critical phenomenon in an out-of-equilibrium system. In Ref. , the authors investigate the chiral phase transition in a free-streaming quark-antiquark system by solving the Vlasov equation through the test particle method. The chiral fields are included considering their mean field values and their equations of motion. The Vlasov equation for the quark-antiquark system is also analytically solved in Ref. , assuming constant quark mass, and a shell-like structure at late evolution times in the center-of-mass (CM) frame is discovered. In Ref.  the nonequilibrium and collision effects on the deconfinement phase transition is investigated by solving the Vlasov equation assuming Bjorken symmetry. The elastic two-body collisions for the quarks and antiquarks is included by simulating a Vlasov-type of equation with MonteCarlo test-particle approach . Among the aforementioned works, although the force term is also considered in the test particle method , its effect has not been carefully examined, which we find plays an important role in the evolution of the system around the phase transition. In order to study the chiral phase transition in the non-equilibrium state, we investigate an expanding quark-anitquark gas system by solving the coupled Vlasov equation as well as the gap equation. This paper is arranged as follows. In section III, we introduce and analyze the coupled Vlasov equation and gap equation which we are going to solve, and give the related thermal quantities that can be obtained as momentum integrals of distribution function. In section III, we consider a longitudinal boost invariant and transverse rotational symmetric system, and derive the transport equation under such condition. In section IV, we present our numerical process to solve the coupled equations and then analyze the numerical result. In section V, we summarize this work and give a brief outlook. # Vlasov equation and thermal quantities The partons in an off-equilibrium systems with background field and collisions can generally be described by the Vlasov equation \[\begin{aligned} \partial_t f^\pm \mp \boldsymbol{F} \cdot \boldsymbol{\nabla_p} f^\pm \pm \boldsymbol{v}\cdot \boldsymbol{\nabla_x} f^\pm = \mathcal{C}[f]. \end{aligned}\] The above equation is applicable when the external fields and the interactions between the (quasi-)particles are sufficiently weak, so each particle can be considered to be moving along a classical trajectory, punctuated by rare collisions. As an example of an evolving global symmetry in an expanding parton system, we here consider the chiral symmetry in an off-equilibrium quark-antiquark system. At classical level, the velocity is \(\boldsymbol{v}=\boldsymbol{p}/E_p\), the energy of the quasi-particle is \(E_p=\sqrt{p^2+m(x)^2}\), where \(m\) is the effective mass of the quark and antiquark, which is space-time dependent and is determined by the evolving chiral symmetry. The chiral mean field acts as a background field, and affects the motion of quarks through the gradient of the field energy \(F=\boldsymbol{\nabla_x} E_p\), which is a continuous force on the quarks. The mass of the quasi-particles \(m(x)\) is no longer a free parameter but is determined by the space-time dependent chiral symmetry. The constituent quark mass serves as the order parameter of chiral symmetry. Its temperature dependence in equilibrium can be found in lattice-QCD simulation  and other model calculations. We here consider the \(SU(2)\) Nambu--Jona-Lasinio Lagrangian (NJL) model , \[\mathcal{L}=\bar{\psi}(i\gamma^\mu \partial_\mu-m_0)\psi+G\Big[(\bar{\psi}\psi)^2+(\bar{\psi}i\gamma_5{\bf \tau}\psi)^2\Big],\] where \(\psi=(u,d)^T\) is the two-component quark field in the flavor space, \(m_0\) is the degenerate current mass of the quarks, \(\tau\) is the Pauli matrix in the isospin space. The transport equations can be derived from a first principle theory or an effective model in the framework of Wigner function . At the classical level, the quarks are treated as quasi-particles, and the chiral field is approximated by mean field, hence the Vlasov equation is coupled to the gap equation . The disoriented chiral condensate (DCC)  is negligible here because it appears as a quantum effect, and the \(\sigma\) condensate appears as the mean field and couples to the Vlasov equation through the inhomogeneous quark mass. In order to investigate the collisions and non-equilibrium effect, we take the relaxation time approximation for the collision terms. The distribution function of the quark/antiquark number density \(f^\pm(t,\boldsymbol{x},\boldsymbol{p})\) satisfies the coupled Vlasov equation and gap equation, \[\begin{aligned} && \partial_t f^\pm \mp \frac{\boldsymbol{\nabla_{r}}m^2}{2E_p} \cdot \boldsymbol{\nabla_p} f^\pm \pm \frac{\boldsymbol{p}}{E_p}\cdot \boldsymbol{\nabla_r} f^\pm = \mathcal{C}[f], \\ && m \Big(1 + 2G \int \frac{\mathrm{d}^3\boldsymbol{p}}{(2\pi)^3} \frac{f^+(x,\boldsymbol{p})-f^-(x,\boldsymbol{p})}{E_p} \Big) = m_0, \end{aligned}\] where the \(+\)(\(-\)) sign stands for quark (antiquark). In this work, we take the relaxation time approximation for the collision term, \(\mathcal{C}[f]=-(f^\pm-f^{\pm}_\mathrm{eq})/\tau_\theta\), with \(f^{\pm}_\mathrm{eq}\) represents the corresponding local-equilibrium distribution function, while \(\tau_\theta\) is the relaxation time. It is worth noticing that one can make the substitution \(\widetilde{f}^-(t,\boldsymbol{x},\boldsymbol{p}) \equiv 1-f^-(t,\boldsymbol{x},-\boldsymbol{p})\) which follows the same equation of motion as \(f^+\). The transport equations can be further simplified by adopting the recombination \(f = f^+ + \widetilde{f}^-\) and \(g = f^+-\widetilde{f}^-\). In such way, the evolution of \(f\) and \(g\) can be separated. Since \(\widetilde{f}^-\) and \(f^+\) satisfy the same transport equation, \(f(t,\boldsymbol{x},\boldsymbol{p})\) and \(g(t,\boldsymbol{x},\boldsymbol{p})\) also satisfy the same transport equation, while the gap equation depends only on \(f\) but not \(g\). One thus solve the coupled transport equation of distribution function \(f(t,\boldsymbol{x},\boldsymbol{p})\) and \(g(t,\boldsymbol{x},\boldsymbol{p})\) as well as the gap equation for a finite density system, and solve transport equation of distribution function \(f(t,\boldsymbol{x},\boldsymbol{p})\) together with gap equation for a system with vanish baryon density, \[\begin{aligned} && \partial_t f-\frac{\boldsymbol{\nabla_{r}}m^2}{2E_p} \cdot \boldsymbol{\nabla_p} f + \frac{\boldsymbol{p}}{E_p}\cdot \boldsymbol{\nabla_r} f =-\frac{f-f_\mathrm{eq}}{\tau_\theta}, \\ \label{transportf} && \partial_t g-\frac{\boldsymbol{\nabla_{r}}m^2}{2E_p} \cdot \boldsymbol{\nabla_p} g + \frac{\boldsymbol{p}}{E_p}\cdot \boldsymbol{\nabla_r} g =-\frac{g-g_\mathrm{eq}}{\tau_\theta}, \\ \label{gapeq} && m \Big(1 + 2G \int \frac{\mathrm{d}^3\boldsymbol{p}}{(2\pi)^3} \frac{f(x,\boldsymbol{p})}{E_p}-2G \int \frac{\mathrm{d}^3\boldsymbol{p}}{(2\pi)^3} \frac{1}{E_p} \Big) = m_0. \end{aligned}\] In the numerical procedures, we consider zero density system in this paper and solve both the transport equation of \(f(t,\boldsymbol{x},\boldsymbol{p})\) and the gap equation, and eventually get the time and space dependence of the distribution function and the quark mass. The second integral in the gap equation is the vacuum part, which has ultra-violet divergence and needs to be regularized. Here we take the hard cut-off regularization only for the vacuum part, \[\begin{aligned} \int \frac{\mathrm{d}^3\boldsymbol{p}}{(2\pi)^3} \frac{1}{E_p} &=& 2\pi \int_0^{\Lambda}\int_0^{\Lambda} \frac{p_T\mathrm{d}p_T \mathrm{d}p_z}{(2\pi)^3} \frac{1}{E_p} \\ &=& \frac{1}{4\pi^2} \bigg[\Lambda (\sqrt{m^2+2\Lambda^2}-\sqrt{m^2+\Lambda^2}) + m^2 \ln\Big(\frac{m}{\Lambda+\sqrt{m^2+\Lambda^2}}\Big) + (m^2+\Lambda^2) \ln\Big(\frac{\Lambda+\sqrt{m^2+2\Lambda^2}}{\sqrt{m^2+\Lambda^2}}\Big) \bigg].\nonumber \end{aligned}\] The same cutoff \(\Lambda=496\) MeV is adopted for the longitudinal momentum and the transverse momentum in the integral. The NJL coupling constant is set to be \(G=1.688/\Lambda^2\), so as to guarantee the quark mass \(m\sim 300\) MeV in the vacuum. The momentum integral of the finite temperature part is free from divergence, and is left unregularized. Under such choice of parameters, the temperature dependence of the quark mass in an equilibrium system can be directly calculated from the gap equation ([\[gapeq\]](#gapeq){reference-type="ref" reference="gapeq"}) by taking Fermi-Dirac distribution. The quark mass for chiral limit \(m_0=0\) and real case \(m_0=3.7\) MeV are presented in Fig. [\[phase transition\]](#phase transition){reference-type="ref" reference="phase transition"}, the critical temperature is about \(156\) MeV at vanishing baryon chemical potential. The chiral phase transition at vanishing baryon chemical potential is a crossover in the real case, and is a second order phase transition in the chiral limit. For a crossover, the phase transition can be defined at the maximum susceptibility \(\mathrm{d}m/\mathrm{d}T\); for a second order phase transition, the susceptibility diverges at critical point. In an equilibrium system, the order parameter displays critical scaling \(m\propto((T_c-T)/T_c)^\beta\) in the vicinity of a second order phase transition which can be described by critical exponent \(\beta\). The divergence of the susceptibility is expected to affect the transport phenomenon of the system through the force term \(\boldsymbol{\nabla_{r}}m^2 \cdot \boldsymbol{\nabla_p} f\), in which the force is provided by the ingredient of mass \(\boldsymbol{\nabla_{r}}m^2\). In an equilibrium system with zero baryon density, the mass is determined by temperature alone, and the force can be expressed as \(\boldsymbol{\nabla_{r}}m^2=2m(\mathrm{d}m/\mathrm{d}T)\boldsymbol{\nabla_{r}}T\). Since the susceptibility exhibits a peak around the phase transition, the temperature gradient \(\boldsymbol{\nabla_{r}}T\) in a realistic system is nonzero, the force term is expected be very large at the phase transition point in the time-space. However, when the system is close to the second order phase transition, the relaxation time may diverge , the critical slowing down takes place, makes it harder for the system to reach local equilibrium. When the system has not yet reached local equilibrium, the temperature is not well-defined, and neither for the expression \(2m(\mathrm{d}m/\mathrm{d}T)\boldsymbol{\nabla_{r}}T\) of the force term. If the phase transition takes place in an out-of equilibrium system, the aforementioned effects of the force term may have been overestimated. In the following, we study the chiral phase transition in both local equilibrium and out-of-equilibrium systems, controlled by the relaxation time. Then we analyze the influence of the phase transition and the force term on the evolution of the system. The thermodynamic quantities can be constructed from the distribution function. For single component medium, positive particle \(f^+\) for example, the current and energy-momentum stress tensor are defined by: \[\begin{aligned} J_+^\mu(t,\boldsymbol{x}) &=& \int \frac{\mathrm{d}^3\boldsymbol{p}}{(2\pi)^3E_p} p^\mu f^+(t,\boldsymbol{x},\boldsymbol{p}), \nonumber \\ T_+^{\mu\nu} (t,\boldsymbol{x})&=& \int \frac{\mathrm{d}^3\boldsymbol{p}}{(2\pi)^3E_p}p^\mu p^\nu f^+(t,\boldsymbol{x},\boldsymbol{p}), \end{aligned}\] which should satisfy that the conservation laws \(\partial_\mu J^\mu=0\) and \(\partial_\nu T^{\mu\nu}=0\). Since the total energy density and entropy is the sum of that of positive particles and negative particles, while the net-quark number density is the difference of positive particles and negative particles, the above equations can be rewritten using the redefined distribution function \(f = f^+ + \widetilde{f}^-\) and \(g = f^+-\widetilde{f}^-\), \[\begin{aligned} \begin{split} J^\mu(t,\boldsymbol{x}) =& \int \frac{\mathrm{d}^3\boldsymbol{p}}{(2\pi)^3E_p} p^\mu g(t,\boldsymbol{x},\boldsymbol{p}) , \\ T^{\mu\nu} (t,\boldsymbol{x})=& \int \frac{\mathrm{d}^3\boldsymbol{p}}{(2\pi)^3E_p}p^\mu p^\nu f(t,\boldsymbol{x},\boldsymbol{p}), \\ S^\mu(t,\boldsymbol{x})=&-\int\frac{d^3\boldsymbol{p}}{(2\pi)^3E_p}p^\mu \Big(f^+(t,\boldsymbol{x},\boldsymbol{p})\ln f^+(t,\boldsymbol{x},\boldsymbol{p})+(1-f^+(t,\boldsymbol{x},\boldsymbol{p}))\ln(1-f^+(t,\boldsymbol{x},\boldsymbol{p})) \\ &\qquad\qquad\qquad\;\;+f^-(t,\boldsymbol{x},\boldsymbol{p})\ln f^-(t,\boldsymbol{x},\boldsymbol{p})+(1-f^-(t,\boldsymbol{x},\boldsymbol{p}))\ln(1-f^-(t,\boldsymbol{x},\boldsymbol{p})) \Big). \end{split} \end{aligned}\] Using the Landau frame definition, the fluid velocity can be determined as the *time-like* eigenvector (\(u^\mu u_\mu >0\)) of the stress tensor \(T^{\mu}_{\;\;\nu} u^\nu = \epsilon\; u^\mu\), with energy density \(\epsilon\) being the corresponding eigenvalue. One could further obtain the particle number density and entropy density as \(n =u_\mu J^\mu\) and \(s=S^\mu u_\mu\). The time-space evolution of \(\epsilon(t,\textbf{x})\), \(n(t,\textbf{x})\) and \(u^z(t,\textbf{x})\) would give us quantitative idea about how the system evolves. By taking the relaxation time approximation for collision kernel, we also need the corresponding local-equilibrium distribution function for any given time and space point, \[f^\pm_\mathrm{eq}(x,\boldsymbol{p})=\frac{1}{e^{(\pm u_\mu p^\mu + \mu_\mathrm{eq})/T_\mathrm{eq}}+1}, \label{feq}\] In the above distribution, the temperature and chemical potential are determined by matching the energy and number density, i.e. \(\epsilon = \epsilon_\mathrm{eq}\) and \(n = n_\mathrm{eq}\), where \[\begin{aligned} \epsilon_\mathrm{eq} &\equiv& \int \frac{ (u \cdot p)^2\mathrm{d}^3\boldsymbol{p}}{(2\pi)^3E_p} f_\mathrm{eq}(t,\boldsymbol{x},\boldsymbol{p}) \,, \\ n_\mathrm{eq} &\equiv& \int \frac{ (u \cdot p)\mathrm{d}^3\boldsymbol{p}}{(2\pi)^3E_p} g_\mathrm{eq}(t,\boldsymbol{x},\boldsymbol{p}) \,, \end{aligned}\] with \(E_p=\sqrt{m(T_\mathrm{eq},\mu_\mathrm{eq})^2+p^2}\). Similarly, we define the equilibrium limit of the entropy density as \[s_\mathrm{eq}=-\int\frac{(u \cdot p) d^3\boldsymbol{p}}{(2\pi)^3E_p} \Big( f_\mathrm{eq}^+ \ln f_\mathrm{eq}^+ +(1-f_\mathrm{eq}^+)\ln(1-f_\mathrm{eq}^+) +f_\mathrm{eq}^-\ln f_\mathrm{eq}^-+(1-f_\mathrm{eq}^-)\ln(1-f_\mathrm{eq}^-) \Big).\] The difference between \(s_\mathrm{eq}\) and the actual entropy density \(s\) quantifies how close the system is to the equilibrium state. In a zero chemical potential limit considered in this paper, one would automatically find \(g=0\), hence \(J=0\), \(n=n_\mathrm{eq}=0\), \(\mu_\mathrm{eq}\) = 0. # Symmetry and Simplification For numerical simplicity, we will focus on the *longitudinal boost-invariant* and *transversal rotational-symmetric* systems, which is a good approximation for ultra-central relativistic heavy-ion collisions. Under such symmetries, two constraints are applied to the system, and the distribution function \(f\) five degrees of freedom. We introduce a new set of coordinates \((\tau,\eta,\rho,\phi, p_\perp, \begin{eqnarray} t &=& \tau \cosh\eta, \qquad p_t~=~\sqrt{m(\tau,\rho)^2+p_\perp^2}\cosh( z &=& \tau \sinh\eta, \qquad p_z~=~\sqrt{m(\tau,\rho)^2+p_\perp^2}\sinh( x &=& \rho \cos\phi, \qquad~ p_x~=~p_\perp\cos(\phi+\theta),\nonumber\\ y &=& \rho \sin\phi, \qquad~ p_y~=~ p_\perp \sin (\phi+\theta), \end{eqnarray} where\[, 100 points for\)p_T\(within\)p_T/T_0\(, 100 points for\) The initial state of the fireball is a highly off-equilibrium system, the evolution towards local equilibrium quark gluon plasma is also an interesting problem. However, this is not our concern in this paper, since the temperature is not well-defined in such initial stage, the discussion of phase transition is also questionable. We here discuss the evolution of the system from local equilibrium towards off-equilibrium state after the formation of quark gluon plasma. A local equilibrium initial state is adopted, and a local temperature could be assigned. The large gradient in the initial condition drives towards off-equilibrium state, while the collisions drives the system towards local equilibrium. In order to describe the hot chiral restored medium in the inner part and the cold chiral symmetry broken medium in the outer part, we choose a Gaussian temperature profile \(T(\rho)=T_0\exp\left(-\rho^2/\rho_0^2\right)\) for the initial state, with \(T_0=300\) MeV and \(\rho_0=2\) fm. For the local equilibrium initial state, the distribution function is the Fermi-Dirac distribution, \(a_0(\tau_0, \rho, p_\perp, The chiral phase transition is characterized by the chiral order parameter\], or the quark constituent mass. The constituent mass is generated by the gap equation at each space-time point, and enters the transport equation through three ways: the energy\)E_p= ## Thermodynamical quantities First, we self-consistently solve the coupled transport equation as well as the gap equation with finite current mass, and adopt different relaxation time. At each time step, the distribution function is obtained by evolving the transport equation, the energy density and entropy density are calculated by definition Eq. ([\[current\]](#current){reference-type="ref" reference="current"}) and Eq. ([\[tensor\]](#tensor){reference-type="ref" reference="tensor"}). The temperature is obtained by matching the realistic energy density to that of the equilibrium state. The energy density, entropy and temperature are presented in Fig. [\[gub_thermal\]](#gub_thermal){reference-type="ref" reference="gub_thermal"}. The left panel corresponds to the evolution with small relaxation time, and the right panel corresponds to those of large relaxation time. The lines are rainbow colored which represents different evolution time, from the red line to the purple line represent the initial distribution to the distribution at later time. The initial condition of the system is chosen to be an equilibrium distribution, with a gaussian distribution temperature profile, the inner part (small \(\rho\)) has higher temperature and the outer part (large \(\rho\)) has lower temperature. With the expansion of the system, the temperature of the core area gradually decrease, and the temperature of the outer area increases. The initial large gradient of the energy density drives the system away from the local equilibrium, while the collisions bring the system back to equilibrium. The entropy tells whether the system has reached local equilibrium, the solid line represent the realistic entropy density and the dashed lines represent the entropy of the equilibrium state. Since the equilibrium state takes the maximum entropy. When the collisions are not strong enough, the system takes longer time in the out-of-equilibrium state, where the realistic entropy is smaller than that of the equilibrium state. If the relaxation time is small, the collisions are strong enough to keep the system at local equilibrium, the entropy density of the state is the same as that of the equilibrium state. ## Constituent mass and Phase boundary In the equilibrium state, the quark constituent mass \(m_\psi\) serves as the order parameter of the chiral symmetry, which tells to what extent the chiral symmetry is broken. Here in an expanding quark-antiquark system, the space-time dependent quark mass \(m_\psi(\tau,\rho)\) signals the chiral symmetry in the space-time. In the initial state, the inner part of the system has higher temperature and is in the chiral symmetry restored phase, the constituent mass is small; the outer part of the system has lower temperature and is in the chiral symmetry broken phase with large constituent mass. By solving together the coupled transport equation and gap equation, the evolution of constituent quark mass in the time-space can be obtained self-consistently. The evolution of both the real case and chiral limit are investigated for large and small relaxation time, the results are presented in Fig. [\[gub_mass\]](#gub_mass){reference-type="ref" reference="gub_mass"}. The upper two figures present the quark mass \(m_\psi(\tau,\rho)\) and transverse velocity \(v_\rho(\tau,\rho)\equiv(u^\rho/u^\tau)\) in the real case, the lower two figures correspond to those of chiral limit. With the expansion of the system, the quark mass in the inner area grows with time, indicating the gradually restoring of chiral symmetry; the quark mass of outer area decreases, indicating the breaking of chiral symmetry. In the equilibrium chiral phase transition, the phase transition point in the chiral limit is well-defined, while that of crossover does not has a strict definition, one of the usually used definition is the maximum of susceptibility \(\mathrm{d}m_\psi/\mathrm{d}T\). In the expanding system, the phase transition point in the chiral limit can still be defined by the time-space point where that quark mass reached zero. For the real case, we here take phase boundary as the space-time point where the equilibrium temperature is around the critical temperature and \(\mathrm{d}m/\mathrm{d}x\) takes the maximum. The phase transition points are marked out by the dotted lines in the Fig. [\[gub_mass\]](#gub_mass){reference-type="ref" reference="gub_mass"}. The phase diagram of equilibrium strong interaction matter in the \(T-\mu\) plane is a map for the chiral symmetry. For non-equilibrium quark matter, the chiral symmetry breaking and restoration can be described by a phase diagram in space-time, with the phase boundary hypersurface indicates where the symmetry changes in the time-space. In the chiral limit, the phase transition hypersurface can still be defined by \(x^\mu(m_\psi=0)\) no matter whether the system is in the local equilibrium or not. Fig. [\[gub_boundary\]](#gub_boundary){reference-type="ref" reference="gub_boundary"} presents the hypersurface obtained by self-consistent solution of a chiral limit system, with different colored lines represent different relaxation time. The collisions cast the kinetic energy into internal energy, thus decelerates the expansion of the system. In the initial state \((\tau-\tau_0)/\tau_0=0\), the core area \(\rho/\rho_0<0.8\) is in the chiral symmetry restored phase. With the expansion of the system, the core area gradually cools, the area of chiral symmetry restored phase shrinks. The free streaming system expands the fastest, after \((\tau-\tau_0)/\tau_0>2.2\), the chiral restored phase disappears. While the system with small relaxation time expands slower, it takes longer time for the chiral restored phase to disappear. It appears from the evolution of mass (Fig. [\[gub_mass\]](#gub_mass){reference-type="ref" reference="gub_mass"}) and the phase boundary (Fig. [\[gub_boundary\]](#gub_boundary){reference-type="ref" reference="gub_boundary"}) that the various relaxation time does not have obvious influence on the quark mass. Since the order parameter describes the long-range correlation and the overall property of the system, while the collision is the local process in a system and is a short range correlation, the collision does not have big impact on the global symmetry of the system. ## Kink in velocity When solving together the transport equation and the gap equation, kinks in the velocity \(u_\tau\) and \(u_\rho\) are discovered. The velocity along \(\rho\)-direction \(v_\rho \equiv u_\rho/u_\tau\) for different current mass and relaxation time are also presented in Fig. [\[gub_mass\]](#gub_mass){reference-type="ref" reference="gub_mass"}. As we have mentioned above, the quark mass enters the transport equation through both the energy \(E_p\) and the force term \(\boldsymbol{\nabla} E_p\cdot\boldsymbol{\nabla_p} f\). The gradient of the field energy acts as a continuous force on the quarks, describing the interaction between the quarks and the mean fields. This interaction changes the quarks' momenta. Although this force term is also considered in the simulations such as test particle method , its influence on the phase transition and the expansion has not been carefully investigated. For a chiral phase transition at low density, it is either a crossover or a second order phase transition, in both case the order parameter changes continuously. In comparison, the gradient of order parameter diverges at a second order phase transition, hence the force could be extremely strong. We first present the velocity \(v_\rho\) in the scenario of constant mass so as to illustrate the influence of the phase transition on the evolution of the system, see Fig. [\[gub_mass_const\]](#gub_mass_const){reference-type="ref" reference="gub_mass_const"}. We take constant homogeneous mass \(m_\psi(\tau,\rho)=150\)MeV and solve only the transport equation for a free streaming system, the force term vanishes since \(\partial_\tau m=0\) and \(\partial_\rho m=0\). In this scenario, the kink does not appear, indicating the kink arises from the inhomogeneous mass distribution and thus the force term. In order to further illustrate the influence of the force term, we now concurrently solve the transport equation and the gap equation, but removes the force terms in the transport equation by fixing \(\partial_\tau m=0\) and \(\partial_\rho m=0\). The evolution of mass and thermodynamic quantities has no obvious difference compared to those of self-consistent solutions, however, the velocity \(v_\rho\) is quite different, which is presented as dashed lines in Fig. [\[gub_noforce\]](#gub_noforce){reference-type="ref" reference="gub_noforce"}, with the solid lines are the velocity of self-consistent solution. As shown in each figures Fig. [\[gub_noforce\]](#gub_noforce){reference-type="ref" reference="gub_noforce"}, when the force terms are ignored, the velocity has a bump around the phase transition. Namely if there is phase transition but no force term, the quark near the phase boundary are accelerated. In comparison, when the force term is considered, the quark near the phase boundary are slowed down. The appearance of kinks is closely related to the phase transition and the spatial distribution of the quark mass. The velocity kinks are more obvious in scenarios with small current mass or small relaxation time. This phenomenon can be understood as follows, since the force term is related to the susceptibility as well as the gradient of temperature \(\boldsymbol{\nabla} m=(\mathrm{d}m/\mathrm{d}T)\boldsymbol{\nabla} T\), the phase transition of the chiral limit has divergent susceptibility while that of real case is finite, thus the kinks in the chiral limit panels are more obvious compared with those in real case panel. The expansion starts with equilibrium distribution and gradually becomes out-of-equilibrium due to the huge pressure gradient. With large relaxation time, the system spends longer time in the out-of-equilibrium state, the critical effect is further washed out. ## Distribution function The phase transition hypersurface affects the motion of quarks around it, and has an influence on the \(p_T\) spectrum of the quarks in the system. This can be directly revealed from the distribution function. Under the given symmetry in section III, the distribution function is defined on a \(4+1\)d phase space, \((\rho,p_\perp,\theta, In Fig.~\ref{distribution1}, we present the zeroth and the first Fourier components in the scenario with weak collisions, namely with large relaxation time\)\_/T\_\(. The solid lines correspond the self-consistent distribution function, while the dashed lines are the distribution function where the force term is ignored. Coefficients\)a_0\(and\)a_1\(as a function of transverse momentum\)p_T\(at various given transverse coordinates\)/\_0\(are presented in the left panel. The right panel shows the coefficients\)a_0\(and\)a_1\(as a function of transverse coordinates\)/\_0\(at various given transverse momentum\)p_T\(. At some evolution time\)\(fm or\)(-\_0)/\_0=1\(, the phase transition takes place around the position\)/\_0\~0.7\(, which is also the location of the kink in the velocity, see Fig.~\ref{gub_mass}. From the left panel of Fig.~\ref{distribution1}, in the self-consistent solution (solid lines), the distribution function\)a_1\(is negative at low\)p_T\(for\)/\_0\(around 0.6 to 0.8, which means the particles with low momentum are bounced back by the phase transition ``wall''; while the dashed lines reveals that without force term, the particles cannot see the ``wall''. This effect is also obvious from the\)a_1\(in the right panel, for small momentums, the distribution function changes sign around\)/\_0=0.7\(; for large momentums, the distribution function stays positive but has smaller values. This indicates that the particles with small momentum are bounced back by the phase transition wall around\)/\_0=0.7\(, particles with large momentum go through the ``wall'', but have been slowed down. The integral of\)a_0(, p_T, As is presented in Fig. [\[distribution2\]](#distribution2){reference-type="ref" reference="distribution2"}, the effect of the phase transition "wall" is smoothed by the collision. Since the particles are relaxed into thermal distribution, the direction of a single particle is aligned along the collective velocity. With strong collisions, the influence of the force term on number density almost disappear, giving the same \(a_0\) whether the force term is taken into consideration. The first order components \(a_1\) is still affected by the force term. Inside the "wall" (\(\rho/\rho_0<0.7\)), the force term does not has any influence. Outside the "wall" (\(\rho/\rho_0>0.7\)), the distribution \(a_1\) is smaller when the force term is considered, which means the particles are slowed down by the force term. # Summary Quite different from the equilibrium thermodynamics, the realistic chiral phase transition in heavy ion collision takes place in a highly inhomogeneous, fast evolving dynamical system. This requires the understanding of the chiral phase transition in an expanding, out-of-equilibrium system. In this work, we investigate the evolution of an expanding quark-antiquark system with self-consistently taking into account the dynamical quark constituent mass. In order to reduce the dimension of the phase space, we consider a longitudinal boost invariant and transversal rotational symmetric system, which is a good approximation for ultra-central heavy ion collisions. In the numerical process, both Vlasov and gap equations are solved concurrently, giving a self-consistent evolution of both the quark-antiquark distribution function and the quark constituent mass. The spacetime-dependent constituent mass serves as the chiral order parameter and affects the evolution of the quark distribution function through the force term. In order to investigate the off-equilibrium effects, we introduce relaxation time approximation for the collision term, and compare the local equilibrium and out-of-equilibrium result by considering small and large relaxation time. The evolution of the quark mass illustrates the chiral phase transition, and defines the phase diagram in the space-time. A kink in the transverse velocity in observed around the phase transition boundary, which appears because the large force term around the phase transition. The kink is more obvious for smaller current mass and smaller relaxation time, which means that the crossover and non-equilibrium effect tends to smooth out the kink. The influence of the phase transition hypersurface is further investigated by directly analyzing the distribution function. It is observed that, the phase transition wall would bounce back the low momentum particles, thus gives a kink in the velocity and may enhance the low \(p_T\) part of the momentum spectrum. The kink indicates that the parton decelerates when propagating from hot to cold region because of the increase in its effective mass. This effect may have impact on the produced hadrons and other observables in experiment, such as reducing the mean \(p_T\) and the enhancement of particle production yield, which will be investigated in future work. : The work is supported by the NSFC Grant Number 11890712. ZyW is supported by the Postdoctoral Innovative Talent Support Program of China, and SS by the Natural Sciences and Engineering Research Council of Canada.
{'timestamp': '2020-06-01T02:09:19', 'yymm': '2005', 'arxiv_id': '2005.14465', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14465'}
# Introduction A successful peg-hole insertion includes a series of sub-tasks like aligning the peg w.r.t hole and inserting in the hole. The task involves concurrent understanding of vision, depth and haptic modalities. This has been shown to pose significant difficulties for the robots. claims that having a single modality, like vision, does not solve the peg-hole insertion problem accurately and precisely. This is the motivation behind our multi-modal perception system. In this work focus on using vision and optionally proprioception for robotic control, as well as trying to understand precision limits of a trainable vision-based controller. Reinforcement Learning (RL) allows learning control policies that are difficult to model explicitly. These policies can generalise with respect to the geometry of the peg and the hole, as stated in. A UR5e robot used in our work is trained in the CoppeliaSim to learn a peg-hole insertion policy. We are using different model-free RL algorithms embedded in the Catalyst framework. In our experiments TD3 converged to higher returns than DDPG or SAC as shown in Fig. [\[model_free\]](#model_free){reference-type="ref" reference="model_free"} in section [5](#experiments){reference-type="ref" reference="experiments"}. Our deterministic control policy is learned from a multi-modal representation consisting of RGB-D images and proprioception. The policy generalises to different colours, as well as the 3D position of the peg and the block. # Related Work and Background {#related_work} uses a hybrid approach of model-free deep RL and imitation learning to achieve zero-shot Sim2Real transfer on six different tasks with a single agent. The method shows that pre-training on expert demonstrations leads to faster training than learning the policy from scratch. learns to refine synthetic images (domain adaptation) to achieve good grasping success rate using less real-world data. trains a network that maps input image to the robot's motor torque. uses self-supervision to learn a compact and multimodal representation of the sensory inputs for the peg-hole insertion task. While all aforementioned works incorporate vision, none of them is using eye-in-hand approach which we consider much more suitable specifically for RL, where a policy can learn to optimize observations along the way, making the vision \"active\". # Problem Statement and Method Overview {#problem_statement} The main objective of our work is to make the robot learn a peg-hole insertion policy, which is invariant to the pose and color of the mating part or peg. This is done by training a robot in the simulation and then directly transferring the model to the real robot. For a better Sim2Real transferability, we experiment with image augmentation and include different modalities. We benchmark our approach against a proposed baseline model, introduced in section [4](#models){reference-type="ref" reference="models"}. # Baseline and RL Models {#models} ## Baseline Model Our baseline for the peg-in-hole insertion uses visual feedback together with classical computer vision tools to control the insertion of the peg. Firstly, the robot uses color information to segment out the mating part from the image. This allows to filter all the irrelevant visual noise. Secondly, the centre of the hole is being estimated. Finally, the end effector is guided to minimize the distance between the pose of the peg and the estimated pose of the hole. ## Reinforcement Learning We employ the actor-critic method, where both the actor and the critic are parameterized using neural networks. \[R_{total} = R_{distance} + R_{success} + R_{collision} + R_{time} \label{reward_design}\] The total reward stated in Eq. [\[reward_design\]](#reward_design){reference-type="ref" reference="reward_design"} for each step consists of following components. - **Distance Reward:** Based on the distance between the the peg and the target (the hole of the mating part). The smaller the distance, the higher the reward. - **Success Reward:** A sparse reward based on the distance between the peg and the desired position in the hole. The agent is being rewarded once the peg gets very close to the target (specified by a threshold). - **Collision Reward:** To discourage the robot from colliding with the block, a negative reward is obtained every time the agent collides with the mating part. - **Time Reward:** To coerce the agent to complete the task as fast as possible, it obtains a small penalty per every step. The scene in the CoppeliaSim and the real robot in starting position are shown in Fig. [\[vrep\]](#vrep){reference-type="ref" reference="vrep"}. On the real robot we use RealSense D435 RGB-D active stereo sensor. The mating part is being randomly placed on the table (always fully or partially visible for the robot in the starting position), imitating a flexible assembly process. # Experiments: Results {#experiments} First, we train the agent in the simulation. The learned policy is directly transferred to our real UR5e robot. Evaluation of the models is shown in Table [1](#tab:metrics){reference-type="ref" reference="tab:metrics"}. We did a total of \(30\) rollouts for each model, in which the mating part pose is changed for every 5 rollouts. These 6 mating poses are predefined, with a maximum distance of \(39\) cm and \(21\) cm between the poses in x-and y-axis respectively (in the plane of the table). The robot starts at a predefined home position for every rollout in both simulation and real world. The comparison of different model-free RL algorithms can be found in Fig. [\[model_free\]](#model_free){reference-type="ref" reference="model_free"}. Fig. [\[ablation\]](#ablation){reference-type="ref" reference="ablation"} shows which modalities are most important for the performance in the simulation. # Discussion and Conclusion {#conclusion} Our initial hypothesis was that image augmentation is crucial for successful transfer from simulation to the real-world. Table [1](#tab:metrics){reference-type="ref" reference="tab:metrics"} shows that augmentations improve the precision significantly. However, the RGB-D model still does not achieve steady, successful insertions. That could be because the depth image has a very specific structural noise (depth values are computed from stereo cameras) that can hardly be modelled with standard augmentation algorithms. Thus, RGB-only model shows much better performance. Additionally, the ablation study in Fig. [\[ablation\]](#ablation){reference-type="ref" reference="ablation"} shows that proprioceptive features are not critical for model performance for this task, neither in simulation, nor in real-life. Finally, we show that a purely eye-in-hand, image-based controller can be trained in simulation to perform peg-hole insertion with sub-centimetre accuracy. However, we still experience instabilities caused by changing light conditions and other environmental factors, that can be possibly improved by enhancing rendering in simulation and richer augmentation. For the future work we consider enhancing the vision-based controller with force-based one (trained end-to-end, as a single model), that can perform precise insertions with large initial uncertainty.
{'timestamp': '2020-06-01T02:07:12', 'yymm': '2005', 'arxiv_id': '2005.14401', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14401'}
# Introduction There has been an increasing trend in recent years to leverage machine learning methods to automate decision-making processes. However, for many applications, the adoption of such methods cannot rely solely on their prediction performance. For example, the European Union's General Data Protection Regulation, which became enforceable on 25 May 2018, introduces a right to explanation for all individuals so that they can obtain "meaningful explanations of the logic involved" when automated decision-making has "legal effects" on individuals or similarly "significantly affecting" them[^1]. Therefore, in addition to their prediction performance, machine learning methods have to be assessed on how they can supply their decisions with explanations. The performance of a machine learning method can be assessed by the extent to which it correctly predicts unseen instances. A metric like the accuracy score commonly measures the performance of a classification model. However, there is no standard approach to assess explainability. First, there is no mathematical definition of explainability. A definition proposed by  states that the higher the explainability of a machine learning algorithm, the easier it is for someone to comprehend why certain decisions or predictions have been made. Second, there are several methods belonging to different categories (explainability-by-design, post-hoc model-specific explainability and post-hoc model-agnostic explainability) , which provide their own form of explanations. The requirements for explainable machine learning methods are dependent upon the application and to whom the explanations are intended for . In order to match these requirements and conduct experiments to validate the usefulness of the explanations by the end-users, there is a need to have a comprehensive assessment of the explainability of the existing methods.  \[2017\] claim that creating a shared language is essential for the evaluation and comparison of machine learning methods, which is currently challenging without a set of explanation characteristics. As far as we have seen, there is no existing framework which defines a set of explanation characteristics that systematize the assessment of the explainability of existing machine learning methods. Hence, in this paper, we propose a new framework to assess and benchmark the performance-explainability characteristics of machine learning methods. The framework hypothesizes a set of explanation characteristics, and as emphasized in , focuses on what people might need to understand about machine learning methods in order to act in concert with the model outputs. The framework does not claim to be exhaustive and excludes application-specific implementation constraints like time, memory usage and privacy. It could be a basis for the development of a comprehensive assessment of the machine learning methods with regards to their performance and explainability and for the design of new machine learning methods. Due to space constraint, we limit the illustration of the use of the framework to one category of machine learning methods and we choose the Multivariate Time Series (MTS) classifiers. Multivariate data which integrates temporal evolution has received significant interests over the past decade, driven by automatic and high-resolution monitoring applications (e.g. healthcare , mobility , natural disasters ). Moreover, the available explainability solutions to support the current state-of-the-art MTS classifiers remain limited, so this category of methods appears meaningful to assess for us. The contributions of this paper are the following: - We present a new performance-explainability analytical framework to assess and benchmark machine learning methods; - We detail a set of characteristics that systematize the performance-explainability assessment of existing machine learning methods; - We illustrate the use of the framework by benchmarking the current state-of-the-art MTS classifiers. # Related Work In this section, we first position this paper in the related work and introduce the different categories of explainability methods as a background to the notions that will be discussed in the framework. Then, we present the state-of-the-art machine learning methods that will be used to illustrate the framework, i.e. MTS classifiers. ## Explainability Multiple taxonomies of explainability methods have been derived from different frameworks . However, none of them defines a set of explanation characteristics that systematize the assessment of the explainability of existing machine learning methods.   provides a classification of the main problems addressed in the literature with respect to the notion of explanation and the type of machine learning systems.   proposes a high-level taxonomy of interpretable and interactive machine learning composed of six elements (Dataset, Optimizer, Model, Predictions, Evaluator and Goodness). And,  categorizes existing explainability methods of machine learning models into either by design or post-hoc explainability. As our framework aims to cover all types of methods, we do not present the frameworks focusing on a particular type of explainability methods (e.g. ). A five-step method to understand the requirements for explainable AI systems has been published in . The five steps are: explainee role definition, explanation characteristics identification, requirements collection, existing methods assessment and requirements/existing methods mapping. Our framework can be positioned as a further development of the fourth step of the method by detailing a set of explanations characteristics that systematize the assessment of existing methods. Our framework does not include application-specific implementation constraints like time, memory usage and privacy. As a background to the notions that will be discussed in the framework, we introduce the three commonly recognized categories (explainability-by-design, post-hoc model-specific explainability and post-hoc model-agnostic explainability)  to which all of the explainability methods are belonging to. First, some machine learning models provide explainability-by-design. These self-explanatory models incorporate explainability directly to their structures. This category includes, for example, decision trees, rule-based models and linear models. Next, post-hoc model-specific explainability methods are specifically designed to extract explanations for a particular model. These methods usually derive explanations by examining internal model structures and parameters. For example, a method has been designed to measure the contribution of each feature in random forests ; and another one has been designed to identify the regions of input data that are important for predictions in convolutional neural networks using the class-specific gradient information . Finally, post-hoc model-agnostic explainability methods provide explanations from any machine learning model. These methods treat the model as a black-box and does not inspect internal model parameters. For example, the permutation feature importance method  and the methods using an explainable surrogate model  belong to this category. The explainability methods presented reflect the diversity of explanations generated to support model predictions, therefore the need for a framework in order to benchmark the machine learning methods explainability. The next section present the MTS classifiers that will be used to illustrate the framework. ## Multivariate Time Series Classifiers {#rw_MTS} The state-of-the-art MTS classifiers consist of a diverse range of methods which can be categorized into three families: similarity-based, feature-based and deep learning methods. Similarity-based methods make use of similarity measures to compare two MTS. Dynamic Time Warping (DTW) has been shown to be the best similarity measure to use along the k-Nearest Neighbors (k-NN) . There are two versions of kNN-DTW for MTS: dependent (DTW\(_{D}\)) and independent (DTW\(_{I}\)). Neither dominates over the other  from an accuracy perspective but DTW\(_{I}\) allows the analysis of distance differences at feature level. Next, feature-based methods include shapelets (gRSF , UFS ) and bag-of-words (LPS , mv-ARF , SMTS , WEASEL+MUSE ) models. WEASEL+MUSE shows better results compared to gRSF, LPS, mv-ARF, SMTS and UFS on average (20 MTS datasets). WEASEL+MUSE generates a bag-of-words representation by applying various sliding windows with different sizes on each discretized dimension (Symbolic Fourier Approximation) to capture features (unigrams, bigrams, dimension identification). Following a feature selection with chi-square test, it classifies the MTS based on a logistic regression classifier. Then, deep learning methods use Long-Short Term Memory (LSTM) and/or Convolutional Neural Networks (CNN). According to the results published, the current state-of-the-art model (MLSTM-FCN) is proposed in  and consists of a LSTM layer and a stacked CNN layer along with Squeeze-and-Excitation blocks to generate latent features. Therefore, we choose to benchmark the performance-explainability of the best-in-class for each similarity-based, feature-based and deep learning category (DTW\(_{I}\), WEASEL+MUSE and MLSTM-FCN classifiers). The next section introduces the performance-explainability framework, which is illustrated with the benchmark of the best-in-class MTS classifiers in section [4](#sec:results){reference-type="ref" reference="sec:results"}. # Performance-Explainability Framework The framework aims to respond to the different questions an end-user may ask to take an informed decision based on the predictions made by a machine learning model: *What is the level of performance of the model? Is the model comprehensible? Is it possible to get an explanation for a particular instance? Which kind of information does the explanation provide? Can we trust the explanations? What is the target user category of the explanations?* The performance-explainability framework that we propose is composed of the following components, which will also be translated into terms specific to our application (MTS classifiers) whenever relevant: #### Performance *What is the level of performance of the model?* The first component of the framework characterizes the performance of a machine learning model. Different methods (e.g. holdout, k-fold cross-validation) and metrics (e.g. accuracy, F-measure, Area Under the ROC Curve) exist to evaluate the performance of a machine learning model . However, there is no consensus on an evaluation procedure to assess the performance of a machine learning model. Recent work suggests that the definition of such an evaluation procedure necessitates the development of a measurement theory for machine learning . Many of the problems stem from a limited appreciation of the importance of the *scale* on which the evaluation measures are expressed. Then, in current practices, the choice of a metric to evaluate the performance of a machine learning model depends on the application. According to the application, a metric aligned with the goal of the experiments is selected, which prevents the performance comparison of machine learning models across applications. Therefore, the performance component in the framework is defined as a first step towards a standard procedure to assess the performance of machine learning models. It corresponds to the relative performance of a model on a particular application. More specifically, it indicates the relative performance of the models as compared to the state-of-the-art model on a particular application and an evaluation setting. This definition allows the categorization of the models' performance on an application and an evaluation setting. In the case of different applications with a similar machine learning task, the performance component can give the list of models which outperformed current state-of-the-art models on their respective application. Thus, it points to certain models that could be interesting to evaluate on a new application, without providing guarantee that these models would perform the same on this new application. We propose an assessment of the performance in three categories: 1. *Best*: best performance. It corresponds to the performance of the first ranked model on the application following an evaluation setting (models, evaluation method, datasets); 2. *Similar*: performance similar to that of the state-of-the-art models. Based on the same evaluation setting, it corresponds to all the models which do not show a statistically significant performance difference with the second ranked model. For example, the statistical comparison of multiple classifiers on multiple datasets is usually presented on a critical difference diagram ; 3. *Below*: performance below that of the state-of-the-art models. It corresponds to the performance of the remaining models with the same evaluation setting. #### Model Comprehensibility *Is the model comprehensible?* The model comprehensibility corresponds to the ability for the user to understand how the model works and produces certain predictions. Comprehensibility is tightly linked to the model complexity; yet, there is no consensus on model complexity assessment . Currently, two categories of models are commonly recognized: "white-box" models, i.e. easy-to-understand models, and "black-box" models, i.e. complicated-to-understand models . For example, many rule-based models and decision trees are regarded as "white-box" models while ensemble methods and deep learning models are "black-box" models. Not all rule-based models or decision trees are "white-box" models. Cognitive limitations of humans place restrictions on the complexity of the approximations that are understandable to humans. For example, a decision tree with a hundred levels cannot be considered as an easy-to-understand model . Nevertheless, the distinction between "white-box" models and "black-box" models is clear among the machine learning methods of this paper. The state-of-the-art MTS classifiers are all "black-box" except one which is an easy-to-understand similarity-based approach. Therefore, due to space limitation, we propose a first assessment of the comprehensibility in two categories and we plan to further elaborate this component in future work: 1. *Black-Box*: "black-box" model, i.e. complicated-to-understand models; 2. *White-Box*: "white-box" model, i.e. easy-to-understand models. #### Granularity of the Explanations *Is it possible to get an explanation for a particular instance?* The granularity indicates the level of possible explanations. Two levels are generally distinguished: global and local . Global explainability means that explanations concern the overall behavior of the model across the full dataset, while local explainability informs the user about a particular prediction. Some methods can provide either global or local-only explainability while other methods can provide both (e.g. decision trees). Therefore, we propose an assessment of the granularity in three categories: 1. *Global*: global explainability; 2. *Local*: local explainability; 3. *Global & Local*: both global and local explainability. #### Information Type *Which kind of information does the explanation provide?* The information type informs the user about the kind of information communicated. The most valuable information is close to the language of human reasoning, with causal and counterfactual rules . Causal rules can tell the user that certain observed variables are the causes of specific model predictions. However, machine learning usually leverages statistical associations in the data and do not convey information about the causal relationships among the observed variables and the unobserved confounding variables. The usual statistical associations discovered by machine learning methods highly depend on the machine learning task. Therefore, we first give a generic high-level definition of the information type and then we detail and illustrate it for the application case of this paper (MTS classification). We propose a generic assessment of the information type in 3 categories from the least to the most informative: 1. *Importance*: the explanations reveal the relative importance of each dataset variable on predictions. The importance indicates the statistical contribution of each variable to the underlying model when making decisions; 2. *Patterns*: the explanations provide the small conjunctions of symbols with a predefined semantic (patterns) associated with the predictions; 3. *Causal*: the most informative category corresponds to explanations under the form of causal rules; In this paper, the issue of Multivariate Time Series (MTS) classification is addressed. A MTS \(M=\{x_1...,x_d\} \in \mathcal{R}^{d*l}\) is an ordered sequence of \(d \in \mathcal{N}\) streams with \(x_i=(x_{i,1}...,x_{i,l})\), where \(l\) is the length of the time series and \(d\) is the number of multivariate dimensions. Thus, considering the MTS data type, the information can be structured around the features, i.e. the observed variables, and the time. We propose to decompose the 3 categories presented into 8 categories. In addition, we will illustrate each of these categories with an application in the medical field. Figure [\[fig:framework_MTS_example\]](#fig:framework_MTS_example){reference-type="ref" reference="fig:framework_MTS_example"} shows the first MTS of the UEA Atrial Fibrilation  test set that belongs to the class *Non-Terminating Atrial Fibrilation*. This MTS is composed of two dimensions (two channels ECG) with a length of 640 (5 second period with 128 samples per second). It is worth noting that the explanations provided to illustrate each category are assumptive rather than validated, they are given as illustrative in nature. 1. *Features* (*Importance*): the explanations reveal the relative importance of the features on predictions. For example, in order to support a model output from the MTS of the Figure [\[fig:framework_MTS_example\]](#fig:framework_MTS_example){reference-type="ref" reference="fig:framework_MTS_example"}, the explanations could tell the user that the channel 2 has a greater importance on the prediction than the channel 1; 2. *Features + Time* (*Importance*): the explanations provide the relative importance of the features and timestamps on predictions. For example, in order to support a model output from the MTS of the Figure [\[fig:framework_MTS_example\]](#fig:framework_MTS_example){reference-type="ref" reference="fig:framework_MTS_example"}, the explanations could tell the user that the channel 2 has a greater importance on the prediction than the channel 1 and that the timestamps are in increasing order of importance on the prediction; 3. *Features + Time + Values* (*Importance*): in addition to the relative importance of the features and timestamps on predictions, the explanations indicate the discriminative values of a feature for each class. For example in Figure [\[fig:framework_MTS_example\]](#fig:framework_MTS_example){reference-type="ref" reference="fig:framework_MTS_example"}, the explanations could give the same explanations as the previous category, plus, it could tell the user that the timestamps with the highest importance are associated with high values (values above 0.15) on the channel 2; 4. *Uni Itemsets* (*Patterns*): the explanations provide patterns under the form of groups of values, also called itemsets, which occur per feature and are associated with the prediction. For example, in order to support a model output from the MTS of the Figure [\[fig:framework_MTS_example\]](#fig:framework_MTS_example){reference-type="ref" reference="fig:framework_MTS_example"}, the explanations could tell the user that the following itemsets are associated with the prediction: {channel 1: extremely high value (above 1); channel 1: low value (below-0.05)} and {channel 2: high value (above 0.15); channel 2: extremely low value (below-0.1)}. The first itemset can be read as: the prediction is associated with the occurence on the channel 1 of an extremely high value being above 1 and a low value being below-0.05 at another moment, without information on which one appears first; 5. *Multi Itemsets* (*Patterns*): the explanations provide patterns under the form of multidimensional itemsets, i.e. groups of values composed of different features, which are associated with the prediction. For example, in order to support a model output from the MTS of the Figure [\[fig:framework_MTS_example\]](#fig:framework_MTS_example){reference-type="ref" reference="fig:framework_MTS_example"}, the explanations could tell the user that the following itemset is associated with the prediction: {channel 1: extremely high value (above 1); channel 2: high value (above 0.15)}; 6. *Uni Sequences* (*Patterns*): the explanations provide patterns under the form of ordered groups of values, also called sequences, which occur per feature and are associated with the prediction. For example, in order to support a model output from the MTS of the Figure [\[fig:framework_MTS_example\]](#fig:framework_MTS_example){reference-type="ref" reference="fig:framework_MTS_example"}, the explanations could tell the user that the following sequences are associated with the prediction: \(<\)channel 1: extremely high value (above 1); channel 1: low value (below-0.05)\(>\) and \(<\)channel 2: high values (above 0.15) with an increase during 1 second\(>\). The first sequence can be read as: the prediction is associated with the occurrence on the channel 1 of an extremely high value being above 1 followed by a low value being below-0.05; 7. *Multi Sequences* (*Patterns*): the explanations provide patterns under the form of multidimensional sequences, i.e. ordered groups of values composed of different features, which are associated with the prediction. For example, in order to support a model output from the MTS of the Figure [\[fig:framework_MTS_example\]](#fig:framework_MTS_example){reference-type="ref" reference="fig:framework_MTS_example"}, the explanations could tell the user that the following sequence is associated with the prediction: \(<\)channel 1: extremely high value (above 1); channel 2: high values (above 0.15) with an increase during 1 second\(>\); 8. *Causal*: the last category corresponds to explanations under the form of causal rules. For example, in order to support a model output from the MTS of the Figure [\[fig:framework_MTS_example\]](#fig:framework_MTS_example){reference-type="ref" reference="fig:framework_MTS_example"}, the explanations could tell the user that the following rule applies: if (channel 1: extremely high value (above 1)) & (channel 2: high values (above 0.15) with an increase during 1 second), then the MTS belongs to the class *Non-Terminating Atrial Fibrilation*. #### Faithfulness *Can we trust the explanations?* The faithfulness corresponds to the level of trust an end-user can have in the explanations of model predictions, i.e. the level of relatedness of the explanations to what the model actually computes. An explanation extracted directly from the original model is faithful by definition. Some post-hoc explanation methods propose to approximate the behavior of the original "black-box" model with an explainable surrogate model. The explanations from the surrogate models cannot be perfectly faithful with respect to the original model . The fidelity criteria is used to quantify the faithfulness by the extent to which the surrogate model imitates the prediction score of the original model . In this paper, two MTS classifiers use an explainable surrogate model among the three state-of-the-art methods presented in section [4](#sec:results){reference-type="ref" reference="sec:results"}. However, there is no need to distinguish between the degree of fidelity of the surrogate models for the purpose of the comparison in this paper. Therefore, due to space limitation, we propose a first assessment of the faithfulness in two categories and we plan to further elaborate this component in future work: 1. *Imperfect*: imperfect faithfulness (use of an explainable surrogate model); 2. *Perfect*: perfect faithfulness. #### User category *What is the target user category of the explanations?* The user category indicates the audience to whom the explanations are accessible. The user's experience will affect what kind of *cognitive chunks* they have, that is, how they organize individual elements of information into collections . Thus, it could be interesting to categorize the user types and associate with the model to whom the explanations will be accessible to. The broader the audience, the better are the explanations. Therefore, we propose an assessment in three categories: 1. *Machine Learning Expert*; 2. *Domain Expert*: domain experts (e.g. professionals, researchers); 3. *Broad Audience*: non-domain experts (e.g. policy makers). In order to compare the methods visually using the proposed framework, the different aspects can be represented on a parallel coordinates plot. A parallel coordinate plot allows a 2-dimensional visualization of a high dimensional dataset and is suited for the categorical data of this framework. The next section presents an example of parallel coordinates plots comparing the state-of-the-art MTS classifiers. # Application to Multivariate Time Series Classifiers {#sec:results} This section shows how the framework presented in the previous section can be used to assess and benchmark the state-of-the-art MTS classifiers. As introduced in section [2.2](#rw_MTS){reference-type="ref" reference="rw_MTS"}, the state-of-the-art MTS classifiers are: DTW\(_{I}\), MLSTM-FCN and WEASEL+MUSE. The results of the assessment are summarized in Table [\[tab:MTS\]](#tab:MTS){reference-type="ref" reference="tab:MTS"}, illustrated in Figure [\[fig:coordinates_example\]](#fig:coordinates_example){reference-type="ref" reference="fig:coordinates_example"} and detailed in the following paragraphs. The first MTS classifier belongs to the similarity-based category and is the one-nearest neighbor MTS classifier with DTW distance (DTW\(_{I}\)). DTW\(_{I}\) classifies MTS based on the label of the nearest sample and a similarity calculated as the cumulative distances of all dimensions independently measured under DTW. For each MTS, the explanation supporting the classification is the ranking of features and timestamps in decreasing order of their DTW distance with the nearest MTS. Based on predefined train/test splits and an arithmetic mean of the accuracies, DTW\(_{I}\) underperforms the current state-of-the-art MTS classifiers on the 35 public datasets (Performance: *Below*). The results from  shows that DTW\(_{I}\) has a statistically significant lower performance than MLSTM-FCN and WEASEL+MUSE. Furthermore, DTW\(_{I}\) supports its predictions with limited information (Information: *Features+Time*) that needs to be analyzed by a domain expert to ensure that it is relevant for the application (User: *Domain Expert*). However, DTW\(_{I}\) is an easy-to-understand model (Comprehensibility: *White-Box*) which provides faithful explanations (Faithfulness: *Perfect*) for each MTS (Granularity: *Local*). Then, we can analyze MLSTM-FCN and WEASEL+ MUSE together. First, based on predefined train/test splits and an arithmetic mean of the accuracies, MLSTM-FCN exhibits the best performance on the 35 public datasets (Performance: *Best*) , followed by WEASEL+MUSE (Performance: *Similar*). Second, both MLSTM-FCN and WEASEL+MUSE are "black-box" classifiers without being explainable-by-design or having a post-hoc model-specific explainability method. Thus, the explainability characteristics of these models depend on the choice of the post-hoc model-agnostic explainability method. We have selected SHapley Additive exPlanations (SHAP) , a state-of-the-art post-hoc model-agnostic explainability method offering explanations at all granularity levels. SHAP method measures how much each variable (Features+Time) impacts predictions and comes up with a ranking of the variables which could be exploited by domain experts. The combination of MLSTM-FCN and WEASEL+MUSE with SHAP enables them to outperform DTW\(_{I}\) while reaching explanations with a similar level of information (Information: *Features+Time*, DTW\(_{I}\): *Features+Time*), in the meantime remaining accessible to the same user category (User: *Domain Expert*, DTW\(_{I}\): *Domain Expert*). However, as opposed to DTW\(_{I}\), SHAP relies on a surrogate model which cannot provide perfectly faithful explanations (Faithfulness: *Imperfect*, DTW\(_{I}\): *Perfect*). Therefore, based on the performance-explainability framework introduced, if a "white-box" model and perfect faithfulness are not required, it would be preferable to choose MLSTM-FCN with SHAP instead of the other state-of-the-art MTS classifiers on average on the 35 public datasets. In addition to its better level of performance, MLSTM-FCN with SHAP provides the same level of information and at all granularity levels. However, the imperfect faithfulness of the explanations could prevent the use of MLSTM-FCN with a surrogate explainable model on numerous applications. In addition, the level of information provided to support the predictions remains limited (Information: *Features+Time*). Therefore, based on the assessment of the current state-of-the-art MTS classifiers with the framework proposed, it would be valuable for instance to design some new high-performing MTS classifiers which provide faithful and more informative explanations. For example, it could be interesting to work in the direction proposed in . It presents a new MTS classifier (XEM) which reconciles performance (Performance: *Best*) and faithfulness while providing the time window used to classify the whole MTS (Information: *Uni Sequences*). XEM is based on a new hybrid ensemble method that combines an explicit approach to handle the bias-variance trade-off and an implicit approach to individualize classifier errors on different parts of the training data . Nevertheless, the explanations provided by XEM are only available per MTS (Granularity: *Local*) and the level of information could be further improved. As suggested by the authors, it could be interesting to analyze the time windows identified for each class to determine if they contain some common multidimensional sequences (Information: *Multi Sequences*, Granularity: *Both Global & Local*). These patterns could also broaden the audience as they would summarize the key information in the discriminative time windows. # Conclusion We have presented a new performance-explainability analytical framework to assess and benchmark the machine learning methods. The framework details a set of characteristics that systematize the performance-explainability assessment of machine learning methods. In addition, it can be employed to identify ways to improve current machine learning methods and to design new ones. Finally, we have illustrated the use of the framework by benchmarking the current state-of-the-art MTS classifiers. With regards to future work, we plan to further elaborate the definition of the different components of the framework (especially the *Model Comprehensibility*, the *Information Type* and the *Faithfulness*) and evaluate the relevance of integrating new components. Then, we plan to apply the framework extensively to assess the different types of existing machine learning methods.
{'timestamp': '2021-11-22T02:18:19', 'yymm': '2005', 'arxiv_id': '2005.14501', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14501'}
# Introduction In the past few decades, graphene has attracted much attention due to its peculiar dispersion relation at low energies, similar to the spectrum of relativistic particles described by the Dirac theory. More precisely, the spectrum has two cones, the so-called "Dirac cones" in the vicinity of two non-equivalent points \(K_1\) and \(K_2\) in the reciprocal space. Anisotropy in graphene was another interesting aspect which was discussed long ago by Pauling, and could be induced by uniaxial stress or bending of a graphene sheet. The main motive is to tune the hopping energy between neighbouring carbon atoms with precision, which was later found to be feasible in optical lattices via controlling the lattice potential in order to have a handle on the effective mass in a honeycomb lattice. In a tight-binding model for graphene, if one of the three nearest-neighbor hopping energies is tuned, the two Dirac points with opposite chiralities approach each other and merge into one forming the so-called semi-Dirac point. The band dispersion simultaneously exhibits massless Dirac (linear) and massive fermionic (quadratic) features along two different directions, thereby producing a highly anisotropic electronic dispersion. The materials that host such anisotropic dispersion are phosphorene under pressure and doping, electric fields, TiO2/VO2 superlattices, graphene under deformation, and BEDT-TTF\(_{2}\)I\(_{3}\) salt under pressure. Experimentally, semi-Dirac dispersion has been observed in a few-layer black phosphorene by means of the in situ deposition of potassium atoms. A straightforward approach to realize semi-Dirac materials can be achieved by breaking the hexagonal symmetry of the honeycomb lattice, e.g, by strain. However, directly applying strain to realize the transition in materials, such as graphene or silicene is prohibited by the exorbitant magnitude of the strain required, which would eventually disintegrate them. Some successfully synthesized graphene-like honeycomb materials, such as silicene, germanene and stanene, are found to be easily oxidized or they chemically absorb other atoms because of their buckling geometries. It is these absorbed atoms that will modify the hopping energies in the honeycomb lattice which is essentially applying a strain that creates a differential hopping. On the other hand, behaviors of electrons in graphene, exposed to a strong perpendicular magnetic field played an important role not only for the discovery of quantum Hall effects, but also for proving the existence of massless Dirac particles. The unconventional Hall conductivity was found to be quantized as \(\sigma_{xy}=2(2n+1) e^2/h\), where both the spin and the valley degeneracies are taken into account. Experimental measurements confirm that the Landau levels of a monolayer graphene obey the relation, \(E_n=sgn(n)\sqrt{2 \hbar v_{F}e|n|B}\), where \(v_{F}\)=\(10^6\) m/s is the Fermi velocity, \(B\) is the magnetic field and \(n\) denote Landau level indices. Recently, quite a few studies on Landau levels and transport properties in presence of a magnetic field in phosphorene have been reported. More precisely, they have found that the anisotropic band structure that leads to Hall quantization in presence of a perpendicular magnetic field is similar to that of a conventional two-dimensional electron gas (2DEG). Since phosphorene may be considered as a realistic material that possesses semi-Dirac properties, it is necessary to pursue quantum Hall studies on the semi-Dirac systems. As discussed above, the energy dispersion of phosphorene is similar to that of the semi-Dirac systems, it is likely that other properties too show similar characteristics. In this work, we have explored the influence of magnetic field for a semi-Dirac system using a tight-binding Hamiltonian on a honeycomb lattice. We study the Landau level spectrum and Hofstadter butterfly using a nanoribbon in order to show that the semi-Dirac system has quite distinct properties as compared to Dirac fermions. We also calculate the density of states (DOS) via the tight-binding propagation method, which is a sophisticated numerical tool used in large-scale calculations for any realistic system. We have implemented the recently developed real-space order-\(N\) quantum transport approach to calculate the Kubo conductivities as a function of the Fermi energy for moderate as well as very high values of the magnetic field. The Hall conductivity in a semi-Dirac system shows the *standard* quantization, namely, \(\sigma_{xy}\propto 2n\) as compared to the previously observed *anomalous* quantization, that is, \(\sigma_{xy}\propto 4(n+1/2)\) for a Dirac system. The longitudinal conductivities show highly anisotropic behavior in one direction compared to the other, which is obviously absent for Dirac systems. The paper is organized as follows. The low energy tight-binding Hamiltonian is described in sec. [2](#II){reference-type="ref" reference="II"}. We have further studied the Landau level spectra and the Hofstadter butterfly for a nanoribbon in presence of a magnetic field in sec. [3](#III){reference-type="ref" reference="III"}. The transport properties are investigated by computing the Hall and the longitudinal conductivities in sec. [4](#IV){reference-type="ref" reference="IV"}. We conclude with a brief summary in sec. [5](#V){reference-type="ref" reference="V"}. # Model Hamiltonian {#II} We study the tight-binding model on the honeycomb lattice with anisotropic hopping that leads to semi-Dirac electronic spectra at low energy. More precisely, the hopping energy to one of the neighbours (\(t_2\)) is different than the other two (\(t\)) as shown in Fig. [\[fig:1\]](#fig:1){reference-type="ref" reference="fig:1"}. It is also instructive to look at the full dispersion with the following three nearest neighbor vectors in real space, \(\vec{\delta_1} = \big(0, a\big)\); \(\vec{\delta_2} = \Big(\frac{\sqrt{3}a}{2},-\frac{a}{2}\Big)\) and \(\vec{\delta_3} = \Big(-\frac{\sqrt{3}a}{2},-\frac{a}{2}\Big)\), where \(a\) is the lattice constant. The above expression in Eq. ([\[eq.3\]](#eq.3){reference-type="ref" reference="eq.3"}) is plotted in Fig. [\[fig:2a\]](#fig:2a){reference-type="ref" reference="fig:2a"}. The Brillouin zone with high-symmetry points for \(t_2=t\) is shown in Fig. [\[fig:2b\]](#fig:2b){reference-type="ref" reference="fig:2b"}. For the Dirac case (that is, \(t_2=t\)), the dispersion shows that the Dirac points touch at the \(K_1\) and \(K_2\) points at the Brillouin zone corners as shown in Fig. [\[fig:2c\]](#fig:2c){reference-type="ref" reference="fig:2c"}. With increasing the strength of the parameter \(t_{2}\), the two Dirac points originally located at \(K_1\) (\(\frac{2\pi}{3a}\),\(\frac{2\pi}{\sqrt{3}a}\)) and \(K_2\) (\(-\frac{2\pi}{3a}\),\(\frac{2\pi}{\sqrt{3}a}\)) move closer till they merge at the \(M\) point resulting in a semi-Dirac spectrum (see Fig. [\[fig:2d\]](#fig:2d){reference-type="ref" reference="fig:2d"}). As mentioned earlier, such manipulation of the Dirac points and their eventual merger have been achieved in honeycomb optical lattices. Thus by fixing \(t_{2} = 2t\) and focusing on the \(M\) point (0,\(\frac{2\pi}{\sqrt{3}a}\)), the low-energy effective Hamiltonian based on the tight-binding model for a semi-Dirac system, apart from a constant term, can be written as, \[{\it{H_0}}=\frac{p^2_x \sigma_x}{2m^*} + v_F p_y \sigma_y \label{eq.1}\] where \(p_x\) and \(p_y\) are the momenta along the \(x\) and the \(y\) directions respectively. \(\sigma_x\) and \(\sigma_y\) are the Pauli spin matrices in the pseudospin space. The velocity along the \(p_y\) direction, \(v_F\), and the effective mass, \(m^*\) corresponding to the parabolic dispersion along \(p_x\) are expressed as \(v_F= {3ta}/{\hbar}\) and \(m^*=2\hbar/3ta^2\). Henceforth we set \(a=1\). The dispersion relation corresponding to Eq. ([\[eq.1\]](#eq.1){reference-type="ref" reference="eq.1"}) ignoring a constant shift in energy can be written as, \[E=\pm \sqrt{(\hbar v_{F}k_{y})^2+\bigg(\frac{\hbar^2k_{x}^2}{2m^*}\bigg)^2} \label{eq.2}\] where '+' denotes for the conduction band and '-' stands for the valence band. Equation ([\[eq.2\]](#eq.2){reference-type="ref" reference="eq.2"}) shows that the dispersion is linear (Dirac-like) along \(y\)-direction, whereas the dispersion along the \(x\)-direction is quadratic (non-relativistic), the combination of which results in the semi-Dirac dispersion. The three-dimensional plot in Fig. [\[fig:2a\]](#fig:2a){reference-type="ref" reference="fig:2a"} indicates the anisotropic band structure in a semi-Dirac system. # The Landau Levels {#III} To include a magnetic field, we shall work with a semi-Dirac nanoribbon which is infinitely long along \(x\), but has a finite width along \(y\). We apply a uniform magnetic field, \(\mathbf{B}=B\hat{z}\) perpendicular to the plane of the ribbon. Owing to the presence of the vector potential \(\vec{A}\), each tight-binding wave-function picks up an extra phase term. We have chosen the Landau gauge as \(\vec{A} = (-By, 0, 0)\) such that the translational invariance along the \(x\)-direction remains unaltered under the choice of the gauge. Hence, the momentum along the \(x\)-direction is conserved and acts as a good quantum number. To make \(k_x\) a dimensionless quantity, we have absorbed the lattice spacing \(a\) into the definition of \(k_x\). The ribbon width is such that it has \(N\) unit cells along the \(y\)-axis (where the index \(n\) for the unit cells takes \(\in 0\)\.....\(N-1\)) as shown in Fig. [\[fig:3\]](#fig:3){reference-type="ref" reference="fig:3"}. The tight-binding Hamiltonian in the presence of magnetic field has the form, \[\begin{aligned} H=-\sum_{\langle{ij}\rangle} (t_{ij}a^{\dagger}_{i} b_{j} +h.c.) \label{ham} \end{aligned}\] where \(a^{\dagger}_{i}\) (\(b_{j}\)) creates (annihilates) an electron on sublattice \(A\) (\(B\)). \(t_{ij}\) is the hopping amplitude between nearest neighbor sites, which obtain a phase due to the magnetic field by the Peierls substitution, namely, \(t_{ij} = t \rightarrow te^{2i\pi\phi_{ij}}\) (here \(t\) denotes both \(t\) or \(t_2\)). \(\phi_{ij}\) is the magnetic flux and is given by the line integral of the vector potential from a site \(i\) to a site \(j\), namely, \(\phi_{ij}=e/h\int_{i}^{j} \vec{A}.d\vec{l}\). The flux is usually denoted in terms of the flux quantum \(\phi_0=h/e\) (\(h\) is Planck\('\)s constant and \(e\) is the magnitude of the electron charge). Thus the tight-binding Hamiltonian in presence of the perpendicular magnetic field can be written in terms of \(m\) and \(n\) (where \(m\) increases along the \(x\)-direction and \(n\) increases along the negative \(y\)-direction) (see Fig. [\[fig:3\]](#fig:3){reference-type="ref" reference="fig:3"}), \[\begin{aligned} \mathcal{H} = &-\sum\limits_{\langle{mn}\rangle} \Big[t e^{i\pi(\phi/\phi_0)n[(1+\alpha)/2]}a^{\dagger}(m,n)b(m,n) \nonumber \\ & + t e^{-i\pi(\phi/\phi_0)n} a^{\dagger}(m,n)b(m-1,n-(1-\alpha)/2)\nonumber \\ & + t_2~e^{i\pi(\phi/\phi_0)n[(\alpha-1)/2]} a^{\dagger}(m,n)b(m,n-\alpha)+h.c.\Big] \label{h1} \end{aligned}\] where the summation \(\langle{mn}\rangle\) is over the nearest neighbors. \(a^{\dagger}(m,n)\) and \(b(m,n)\) denote the creation and annihilation operators at the (\(m\),\(n\)) site, respectively. Equation ([\[h1\]](#h1){reference-type="ref" reference="h1"}) for a zigzag semi-Dirac ribbon (\(\alpha=1\)) reduces to \[\begin{aligned} \mathcal{H} = &-\sum\limits_{\langle{mn}\rangle} \Big[t e^{i\pi(\phi/\phi_0)n}a^{\dagger}(m,n) b(m,n)+ t e^{-i\pi(\phi/\phi_0)n} \nonumber \\ & a^{\dagger}(m,n)b(m-1,n) + t_2~a^{\dagger}(m,n)b(m,n-1)+h.c.\Big] \label{h2} \end{aligned}\] Using the above Hamiltonian as mentioned in Eq. ([\[h2\]](#h2){reference-type="ref" reference="h2"}) we have numerically calculated the Hofstadter butterfly as well as the Landau level spectrum for the number of unit cells \(N=100\). Figure [\[fig:4a\]](#fig:4a){reference-type="ref" reference="fig:4a"} shows fractal spectra plotted as a function of magnetic flux, \(\phi/\phi_{0}\) for a semi-Dirac nanoribbon. It can be seen clearly that there occurs opening of a central gap with a flat band at zero energy. The gap gets larger along with the two identical spectra that emerge from the conduction and the valence bands by tuning \(t_2\). For comparison, the same is plotted for the Dirac system (\(t_2=t\)) as shown in Fig. [\[fig:4b\]](#fig:4b){reference-type="ref" reference="fig:4b"}. We can see that there is no gap at zero energy with the flat band when one goes from \(t_2=2t\) to \(t_2=t\). Figure [\[fig:5\]](#fig:5){reference-type="ref" reference="fig:5"} shows the Landau level spectra for different values of the magnetic flux (such as \(\phi/\phi_{0} = 1/100, 1/200, 1/500, 1/1600\)) for the semi-Dirac and the Dirac systems. Figures [\[fig:5a\]](#fig:5a){reference-type="ref" reference="fig:5a"}-[\[fig:5d\]](#fig:5d){reference-type="ref" reference="fig:5d"} show the evolution of the energy levels in presence of the magnetic field for a semi-Dirac nanoribbon (\(t_2=2t\)). For comparison, we have also plotted the Landau level spectrum for the Dirac case (\(t_2=t\)) using the same values of the magnetic flux as shown in Fig. [\[fig:5e\]](#fig:5e){reference-type="ref" reference="fig:5e"}-[\[fig:5h\]](#fig:5h){reference-type="ref" reference="fig:5h"}. It is to be noted that in a semi-Dirac system, there is no zero energy bulk state, which implies that the zero energy state in Fig. [\[fig:5\]](#fig:5){reference-type="ref" reference="fig:5"} is an edge state. On the other hand, zero energy bulk states exist in a Dirac system. Further, for \(t_2=2t\), the Landau levels are not equidistant, since their energies vary as \((n+\frac{1}{2})^{2/3}\) (\(n\) being the Landau level index) which lies intermediate to the behavior of the Dirac system and the conventional 2DEG. As a consequence, the gap between the Landau levels shrinks as one considers larger \(n\). In the case of a Dirac system, since the energies of the Landau levels go as \(\sqrt{n}\), its non-equidistant Landau spectra can have a different quantitative behavior from a semi-Dirac system. For a large value of the flux, \(\phi\) such as \(\phi=\phi_0/100\), the flatness of the energy bands are observed for both the semi-Dirac and the Dirac systems owing to shrinking of the cyclotron radius (see Fig. [\[fig:5a\]](#fig:5a){reference-type="ref" reference="fig:5a"} and [\[fig:5e\]](#fig:5e){reference-type="ref" reference="fig:5e"}). The energy bands become parabolic for \(\phi=\phi_0/200\) as seen from Fig. [\[fig:5b\]](#fig:5b){reference-type="ref" reference="fig:5b"}. The flatness of the Landau spectrum in the bulk completely vanishes in the semi-Dirac system as compared to a Dirac one (see Fig. [\[fig:5b\]](#fig:5b){reference-type="ref" reference="fig:5b"} and [\[fig:5f\]](#fig:5f){reference-type="ref" reference="fig:5f"}). With lower values of \(\phi/\phi_0\), the Landau levels demonstrate a dispersive behavior and start getting flatter for large values of \(n\) for \(t_2=2t\) (see Fig. [\[fig:5c\]](#fig:5c){reference-type="ref" reference="fig:5c"}). In the case of a Dirac system (\(t_2=t\)), the Landau levels show quite a distinct behavior, where the flat bands become dispersive in the bulk corresponding to larger values of \(n\) and lower values of \(\phi/\phi_0\) (see Fig. [\[fig:5g\]](#fig:5g){reference-type="ref" reference="fig:5g"}). For a small value of the magnetic field, such that the flux is given by, \(\phi=\phi_0/1600\), the energy bands eventually become flat in the bulk for the semi-Dirac case as shown in Fig. [\[fig:5d\]](#fig:5d){reference-type="ref" reference="fig:5d"}. This is not the case for a Dirac system (see Fig. [\[fig:5h\]](#fig:5h){reference-type="ref" reference="fig:5h"}). For all values of \(\phi/\phi_0\), the zero-energy mode is completely separated from the bulk bands for a semi-Dirac system as compared to the Dirac case (see any of Fig. [\[fig:5\]](#fig:5){reference-type="ref" reference="fig:5"}). # Transport Properties {#IV} To study the transport properties in the presence of a perpendicular magnetic field, we consider a large sample of a lattice model of the semi-Dirac system consisting of millions of atoms. The contribution in transport comes from both the off-diagonal and the diagonal terms as appear in the Kubo formula. The former contributes to the Hall conductivity (\(\sigma_{xy}\)), whereas the latter leads to individual longitudinal conductivity in different directions (\(\sigma_{xx}\) and \(\sigma_{yy}\)). ## Methodology In this section, we shall describe the numerical approach, developed by Garcia and his co-workers [@rappoprt] which is based on a real-space implementation of the Kubo formalism, where both the diagonal and the off-diagonal conductivities are treated on the same footing. It is known that in the momentum space, the Hall conductivity can be easily obtained in terms of the Berry curvature associated with the bands. The Kubo formalism can be implemented in real space for obtaining the Hall conductivity which uses Chebyshev expansions to compute the conductivities. The components of the dc conductivity tensor (\(\omega \rightarrow 0\) limit of the ac conductivity) for the non-interacting electrons are given by the Kubo-Bastin formula which can be written as, \[\begin{aligned} \sigma_{\alpha\beta} (\mu, T) = & \frac{i e^2 \hbar}{A}\int_{-\infty}^{\infty} d\varepsilon f(\varepsilon) Tr \Big<v_{\alpha} \delta(\varepsilon-H)v_\beta \frac{dG^{+}(\varepsilon)}{d\varepsilon} \nonumber \\ &-v_{\alpha} \frac{dG^{-}(\varepsilon)}{d\varepsilon}v_\beta\delta(\varepsilon-H)\Big> \label{eq.7} \end{aligned}\] where \(T\) is the temperature, \(\mu\) is the chemical potential, \(v_\alpha\) is the \(\alpha\) component of the velocity operator, \(A\) is the area of the sample, \(f(\varepsilon)\) is the Fermi-Dirac distribution and \(G^{\pm}(\varepsilon, H)= \frac{1}{\varepsilon-H\pm i\eta}\) are the advanced (+) and retarded (-) Green's functions. Using the Kernel Polynomial Method (KPM), the rescaled delta and Green's function can be expanded in terms of the Chebyshev polynomials, whence Eq. ([\[eq.7\]](#eq.7){reference-type="ref" reference="eq.7"}) becomes, \[\sigma_{\alpha\beta} (\mu, T) = \frac{4 e^2 \hbar}{\pi A} \frac{4}{(\Delta E)^2} \int_{-1}^{1} d{\tilde{\varepsilon}} \frac{f(\tilde{\varepsilon})}{(1-{\tilde{\varepsilon}^2})^2} \sum_{m,n} \Gamma_{nm} (\tilde{\varepsilon}) \mu_{nm}^{\alpha\beta} (\tilde{H}) \label{eq.8}\] where \(\Delta E\) is the range of the energy spectrum, \(\tilde{\varepsilon}\) is the rescaled energy whose upper and lower bounds are \(+1\) and \(-1\) respectively and \(\tilde{H}\) is the rescaled Hamiltonian. \(\Gamma_{nm} (\tilde{\varepsilon})\) and \(\mu_{nm}^{\alpha\beta} (\tilde{H})\) are the functions of rescaled energy and Hamiltonian respectively. The energy dependent scalar function, \(\Gamma_{nm} (\tilde{\varepsilon})\) can be written as, \[\begin{aligned} \Gamma_{nm} (\tilde{\varepsilon})\equiv &(\tilde{\varepsilon}-in\sqrt{1-\tilde{\varepsilon}^2})e^{in~arccos(\tilde{\varepsilon})} T_m(\tilde{\varepsilon}) \nonumber \\ & + (\tilde{\varepsilon}+im\sqrt{1-\tilde{\varepsilon}^2})e^{-im~arccos(\tilde{\varepsilon})} T_n(\tilde{\varepsilon}) \end{aligned}\] and the Hamiltonian-dependent term which involves products of polynomial expansions can be written as, \[\mu_{nm}^{\alpha\beta}(\tilde{H})= \frac{g_m g_n}{(1+\delta_{n0})(1+\delta_{m0})} Tr[v_{\alpha}T_m(\tilde{H})v_{\beta}T_n(\tilde{H})]\] where the Chebyshev polynomials, \(T_m(x)\) obey the recurrence relation, \[T_m(x)= 2x T_{m-1}(x)-T_{m-2}(x)\] The Jackson kernel, \(g_m\) is used to smoothen out the Gibbs oscillations which arise due to the truncation of the expansion in Eq. ([\[eq.8\]](#eq.8){reference-type="ref" reference="eq.8"}). The density of states (DOS) can be calculated using an efficient algorithm based on the evolution of the time-dependent Schr\(\ddot{o}\)dinger equation. We use a random superposition of all basis states as an initial state \(|\phi(0)\rangle\), \[|\phi(0)\rangle=\sum_{i}a_i|i\rangle\] where \(|i\rangle\) denote the basis states and \(a_i\) are the normalized random complex numbers. Applying the Fourier transformation to the correlation function, \(\langle\phi(0)|e^{-iHt}|\phi(0)\rangle\) we get the DOS as, \[DOS=\frac{1}{2\pi}\int_{-\infty}^{\infty}e^{i\epsilon t}\langle\phi(0)|e^{-iHt}|\phi(0)\rangle dt\] where \(t\) denotes time. ## Longitudinal and Hall conductivities Using the above mentioned efficient numerical approach, we calculate the DOS in the absence and the presence of a magnetic field, the longitudinal conductivity in both \(x\) (\(\sigma_{xx}\)) and \(y\) (\(\sigma_{yy}\)) directions and the Hall conductivity (\(\sigma_{xy}\)) for the semi-Dirac system (\(t_2=2t\)). To compare between the Dirac and the semi-Dirac systems, we have also shown results for the Dirac (\(t_2=t\)) case simultaneously. In our simulation, we consider a lattice of \(5120\) unit cells in each of the \(x\) and \(y\) directions (that is, a sample size denoted by (\(L_{x},L_{y}\)) to be (\(5120, 5120\))). We apply periodic boundary conditions for all our numerical results. We set the nearest neighbor hopping parameter \(t=2.8\)eV. We adopt a large number of Chebyshev moments, \(M\), since the energy resolution of the KPM and the convergence of the peaks of \(\sigma_{xx}\) depend on \(M\). We have used \(M=6144\) here. The system size and the truncation order can be enhanced to reduce the fluctuations. We have plotted the results for the DOS in the absence of a magnetic field for semi-Dirac and Dirac systems as shown in Fig. [\[fig:6\]](#fig:6){reference-type="ref" reference="fig:6"}. In the case of semi-Dirac systems, the DOS is proportional to \(\sqrt{|E|}\) near zero energy (see Fig. [\[fig:6b\]](#fig:6b){reference-type="ref" reference="fig:6b"}), whereas for the Dirac case the DOS near the zero energy varies as \(|E|\) as shown in Fig. [\[fig:6a\]](#fig:6a){reference-type="ref" reference="fig:6a"}. The energy bounds for the semi-Dirac are \(E_{min}=-4t\) and \(E_{max}=4t\). Next, we have shown the results for Hall conductivity (\(\sigma_{xy}\)) for moderate values of the magnetic field as well as extremely high fields in Fig. [\[fig:7\]](#fig:7){reference-type="ref" reference="fig:7"}. Generally higher values of the magnetic field require smaller system size and hence the fewer number of Chebyshev moments have to be computed. This yields faster convergence of the Hall conductivity in the limit of a large magnetic field. For \(t_2=2t\) (semi-Dirac), the Hall conductivity (\(\sigma_{xy}\)) is plotted as a function of Fermi energy, \(E\) for the large value of the field \(B=400\)T (as shown in the main frame of Fig. [\[fig:7a\]](#fig:7a){reference-type="ref" reference="fig:7a"}). To relate this result to the recent experiments performed for realistic values of magnetic field on a Dirac system, we have also plotted the Hall conductivity for moderate values of the field, namely 30T (green curve) and 50T (pink curve) as shown in the inset of Fig. [\[fig:7a\]](#fig:7a){reference-type="ref" reference="fig:7a"}. The quantization of the plateaus is similar to that of a conventional 2DEG with a parabolic band dispersion in a sense that the conductance quantization happens at \(\sigma_{xy}=2ne^2/h\) where \(n\) takes integer values \(0\), \(\pm1\), \(\pm2\), \(\pm3\), \(\pm4\)\... in units of \(2e^2/h\). The plot in the inset shows that the plateau step can be obtained with good accuracy even in the case of realistic values of the magnetic field. The difference between the semi-Dirac and the Dirac cases lies in the fact that the fluctuations in the plateau step become prominent with lowering of the field, especially at higher values of the Fermi energy. Further lowering of the magnetic field will reduce the sharpness of the plateaus due to the effect of finite energy resolution and finite size of the sample. These are the artifacts of the method used here. In the Dirac system (\(t_2=t\)), the well-known Hall quantization at \(\sigma_{xy}= 2(2n+1)e^2/h\) is observed for very high magnetic field, namely \(B=400\)T as shown in the main frame of Fig. [\[fig:7b\]](#fig:7b){reference-type="ref" reference="fig:7b"}. The inset shows the same for realistic values of the magnetic field. The Hall conductivity plot ensures that there is a transition from a half-integer to an integer quantum Hall effect as we go from a Dirac to a semi-Dirac system by tuning \(t_2\) (Fig. [\[fig:7a\]](#fig:7a){reference-type="ref" reference="fig:7a"} and [\[fig:7b\]](#fig:7b){reference-type="ref" reference="fig:7b"}). The reason can be drawn from the fact that although the band dispersion in the semi-Dirac is linear in one direction, the quadratic behavior in the other direction seemingly dominates over the linear term which results in a similar characteristic of conductance quantization of a 2DEG. In Fig. [\[fig:8\]](#fig:8){reference-type="ref" reference="fig:8"}, we have shown the Hall conductivity, \(\sigma_{xy}\) and the DOS for \(B=50\)T and \(400\)T in the same frame. In the presence of the magnetic field, the DOS consists of peaks of discrete energy levels (Landau levels) as shown in Fig. [\[fig:8\]](#fig:8){reference-type="ref" reference="fig:8"}. The DOS vanishes in the plateau region and shows a sharp peak corresponding to a Landau level when the Hall conductivity goes through a transition from one plateau to another. However we get broad DOS peaks at lower values of the magnetic field (\(B = 50\)T) which is particularly visible for the semi-Dirac case owing to the small energy separation between the Landau levels (less than 3 meV). Sharper peaks will require computation of very large number of Chebyshev moments. Figure [\[fig:8a\]](#fig:8a){reference-type="ref" reference="fig:8a"} shows that there is no Landau level peak at zero energy for \(t_2=2t\) which is also characteristic of a conventional 2DEG in contrast to \(t_2=t\) case, where the zero-energy peak is well-observed (see Fig. [\[fig:8b\]](#fig:8b){reference-type="ref" reference="fig:8b"}). The presence of a zero-energy peak for the Dirac case is related to the chiral anomaly present there. Figures [\[fig:8c\]](#fig:8c){reference-type="ref" reference="fig:8c"} and [\[fig:8d\]](#fig:8d){reference-type="ref" reference="fig:8d"} show that several Landau levels can be observed with the same qualitative behavior for very high magnetic field \(B=400\)T for both the semi-Dirac and the Dirac systems. The Hall conductance is quantized due to the quantized Landau level. It is interesting to note that although the energy does not depend linearly on the Landau level index, \(n\) and magnetic field, \(B\) in the case of a semi-Dirac system, as said earlier, the quantized value of \(\sigma_{xy}\) of a semi-Dirac material is analogous to that of a 2DEG. It is once again pertinent to mention that the Landau level spectra in phosphorene in a perpendicular magnetic field depending on the index, \(n\) (an additional factor of '2' will appear for spin degeneracy) has connections with the semi-Dirac physics. To investigate the magneto-transport, we further calculate the longitudinal conductivity along the \(x\) (\(\sigma_{xx}\)) and \(y\) (\(\sigma_{yy}\)) directions. Figures [\[fig:9a\]](#fig:9a){reference-type="ref" reference="fig:9a"} and [\[fig:9b\]](#fig:9b){reference-type="ref" reference="fig:9b"} show the longitudinal conductivity, \(\sigma_{xx}\) (green curve) and \(\sigma_{yy}\) (magenta curve) as a function of the Fermi energy, \(E\) for moderate values of the \(B\) field \(B\)=50T for a semi-Dirac and a Dirac system respectively. The longitudinal conductivity reveals largely anisotropic behavior owing to the presence of anisotropy in the dispersion for \(t_2=2t\). The component of \(\sigma\) in the \(x\) (\(\sigma_{xx}\)) and \(y\) (\(\sigma_{yy}\)) directions are quantitatively different in nature. The magnitude of \(\sigma_{yy}\) is larger than that of \(\sigma_{xx}\). This is definitely a contrasting feature compared to the case of a Dirac system where the magnitudes of \(\sigma_{xx}\) and \(\sigma_{yy}\) are same as shown in Fig. [\[fig:9b\]](#fig:9b){reference-type="ref" reference="fig:9b"}. Moreover, the absence of zero-energy peak also supports our discussion on the Landau level results (see Fig. [\[fig:8c\]](#fig:8c){reference-type="ref" reference="fig:8c"}) for the semi-Dirac material. Figures [\[fig:9c\]](#fig:9c){reference-type="ref" reference="fig:9c"} and [\[fig:9d\]](#fig:9d){reference-type="ref" reference="fig:9d"} show similar results for very high values of the magnetic field, namely, \(B=400\)T with the well-observed sharp peaks at larger values of energy. The amplitudes increase at large values of the Fermi energy owing to the increase in the scattering rate of the Landau levels as one goes to higher values of \(n\) for both the semi-Dirac and the Dirac systems. Since the Landau levels are not equidistant for both of the cases, the interval between the peaks are not spaced equally. It can be seen that the longitudinal conductivity is non-vanishing only when the Fermi energy is within a Landau band where the backscattering processes are present. To compare and contrast further between the two cases, we plot the longitudinal conductivities (\(\sigma_{xx}\) and \(\sigma_{yy}\)) in the absence of any magnetic field (\(B = 0\)) in Figs. [\[fig:9e\]](#fig:9e){reference-type="ref" reference="fig:9e"} and [\[fig:9f\]](#fig:9f){reference-type="ref" reference="fig:9f"} for the semi-Dirac and the Dirac systems respectively. Apart from the suppression of the conductivities by one order of magnitude by the magnetic field, one can take a note of the linear dependence of the conductivity on the Fermi energy, \(E\) for the Dirac case, while they appear with different exponents for the semi-Dirac one. The feature is qualitatively same as that observed for \(B \neq 0\). However, the peaks in the conductance spectra vanish at \(B = 0\) owing to the absence of Landau levels. # Summary {#V} In this work, we have studied the influence of a perpendicular magnetic field with a semi-Dirac dispersion within the framework of a tight-binding model of a honeycomb lattice. In order to compare and contrast with a prototype Dirac material, such as, graphene, we have presented our results for both cases. We consider a semi-Dirac nanoribbon with a finite width and study the Hofstadter butterfly and properties of the Landau level spectra. We have observed two identical gapped spectra symmetrically placed above and a below \(E=0\) and along with a zero-energy mode in the Hofstadter butterfly spectrum in contrast to what is observed for a Dirac system. The Landau level becomes fully dispersive in the bulk for moderate values of the magnetic flux which is not true for the Dirac case. Furthermore, we explore the magneto-transport properties using the Kubo formula. We observed that the Hall conductivity shows standard quantization similar to that of a conventional semiconductor 2DEG with a parabolic band, which is highly contrasted with respect to a Dirac system. The zero Landau level peak is absent in the case of a semi-Dirac system. The longitudinal conductivities, \(\sigma_{xx}\) and \(\sigma_{yy}\) show anisotropic behaviour due to the distinct dispersion in two longitudinal directions.
{'timestamp': '2020-06-01T02:06:45', 'yymm': '2005', 'arxiv_id': '2005.14394', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14394'}
# Introduction Deep neural networks are now central to many real-world applications including image classification , object detection , low-level vision , and natural language processing (NLP) . Their performance usually depends on the availability of large amounts of finely labeled training data. For example, the ImageNet dataset , which is used for image classification, includes over 1.2M images in 1000 different categories; the MegaFace face recognition dataset  has over 1M photos from 690k unique users; and the CoQA dataset  used for NLP contains over 127k questions with answers collected from over 8k conversations. In addition to large amount of data, well-designed architectures are critical for effective deep neural networks, especially convolutional neural networks (CNNs) for computer vision tasks. There are many network architectures. Simonyan and Zisserman presented VGGNet , which contains over \(10^9\) learnable parameters. He *et.al.*  presented a shortcut operation for training deep neural networks with over \(50\) layers. ResNeXt  combines the shortcut operation with the 'split-transform-merge' operation by first splitting the channel of each layer, then applying transformation separately, before finally merging the outputs with an addition operation. Huang *et.al.* presented DenseNet , which strengths information flow by adding a shortcut to each pair of blocks. In addition, some modern neural architectures have significantly lower computational costs, allowing their use on mobile devices. MobileNet  reduces the computational complexity by replacing the traditional convolution operation with a combination of depth-wise convolution and point-wise convolution. ShuffleNet  enables information flow between groups by adding a channel shuffle operation after group convolution. Mobilenet-v2  further uses a linear bottleneck and an inverted residual block to reuse the features and to overcome the manifold collapse problem produced by the ReLU operation. Han *et.al.* developed GhostNet  and built efficient neural networks by generating more features from some inexpensive operations. Despite the success of these networks and their variations, their design and implementation still require considerable human and computational resources. To address this, a number of neural architecture search (NAS) algorithms have been proposed to automatically search for optimal neural architectures in the given search space and dataset. Zoph *et.al.*  generated the model descriptions of neural networks using a recurrent network and produced higher-accuracy architectures by training the recurrent neural network (RNN) with reinforcement learning. Real *et.al.*  used a modified evolutionary algorithm to search for better neural architectures in a given search space by introducing an age property to favor younger genotypes. Liu *et.al.*  represented the network architecture based on continuous relaxation, which allowed efficient architecture searching using gradient descent. Wang *et.al.*  proposed an evolutionary method to automatically identify redundant filters in pre-trained deep neural networks. Pham *et.al.*  reduced the search cost by searching for an optimal subgraph within a large computational graph with a controller. While these NAS methods have significantly contribute to searching for better neural architectures, they have a significant limitation: in order to achieve an acceptable search cost, each searched architecture is not precisely optimized. To this end, early stopping is widely used in NAS for fast comparison. However, considering all sub-networks together in early stopping is highly unstable since they each have variable computational power. Figure [\[Fig:Intro\]](#Fig:Intro){reference-type="ref" reference="Fig:Intro"} illustrates a toy experiment comparing five simple networks on the CIFAR-100 dataset with different early stopping settings. Since the convergence of models with fewer parameters and lower computational complexity is usually faster, the early stopping results in the entire search space are biased. In addition, a consensus was recently reached  that random searching sometimes performs better than objective function-oriented NAS methods, also suggesting that the NAS evaluation procedure requires further refinement. In this paper, we present a divide-and-conquer NAS (DC-NAS) scheme to better evaluate and handle the huge search space of neural architectures. In doing so, we highlight that the unified early stopping strategy for evaluating all networks sampled from the entire search space is unreliable, since the networks all have different numbers of parameters and computational power. We first observe the gradient change of each network's layers and operations and cluster them into several categories using the conventional k-means algorithm. Then, network comparisons are conducted in the same cluster by exploiting the usual early stopping strategy. Optimal networks in each cluster are finally merged and carefully trained to derive the best neural architecture in the given search space. The DC-NAS pipeline is shown in Figure [\[Fig:pipeline\]](#Fig:pipeline){reference-type="ref" reference="Fig:pipeline"}. Since the gradient change can be directly calculated from the super-network with only limited cost and the k-means approach is also very efficient, DC-NAS does not obviously increase searching costs. Our extensive experimental results show that the proposed method can effectively solve the inaccurate evaluation problem and more efficiently perform NAS. Compared to state-of-the-art approaches, DC-NAS finds better performing networks in the same search space. # Related Works To solve the problem of inaccurate evaluation of different networks, this work aims to divide the complex NAS problem into several sub-problems and obtain the optimal architecture by merging their results. Current NAS algorithms can be divided into two evaluation approaches: the early stopping strategy for evaluation and predictor based architecture searching. ## Early Stopping in NAS In order to automatically design high-performance deep neural networks, a series of algorithms have been proposed to search neural architectures in a given search space. Zoph *et.al.*  first proposed the concept of large-scale image classifier searching, which encoded different operations (*e.g.* , convolution and pooling) and RNN connections to search for effective architectures using reinforcement learning (RL) by treating the accuracy of the current architecture as a reward and selecting policies to obtain the new architecture. Real *et.al.*  proposed an evolutionary-based algorithm (EA) to search the architectures. Specifically, each individual neural network was regarded as an architectural component. Searching was performed across generations by using mutations and re-combinations of architectural components, with components showing better performance on the validation set picked and inherited by the next generation during evolution. Pham *et.al.*  developed efficient-NAS (ENAS), which significantly reduced the search cost by training a large computational graph and searching for an optimal subgraph that maximized the expected reward on a validation set using the weight-sharing method. Note that the reward used in RL and component performance in EA require training a large number of neural networks to convergence, which makes the search cost expensive. Thus, the early stopping strategy is commonly used to reduce the search cost, which trains the neural network over only a few epochs and uses the intermediate accuracy as the surrogate reward or performance of the component. Early stopping is a very effective method for quickly evaluating or predicting the intermediate neural architectures during searches. However, effectiveness is compromised, since for different architectures, the relationship between the intermediate accuracy and the final accuracy is unclear. Specifically, taking different networks sampled from the entire search space and applying the same early stopping strategy is ineffective, since networks with more learnable parameters are usually harder to optimize. In addition to the EA-based  and RL-based NAS methods with early stopping, differentiable neural architecture searching (*e.g.* , DARTS , Hit-Detector ) also provides an efficient way to search deep neural networks. DARTS regarded the given super network as a continuous space and simultaneously maintained two sets of parameters with respect to the weights of the desired network and the weights for selecting different operations between nodes. SNAS  replaced the feedback mechanism triggered by constant rewards with gradient feedback from a generic loss. FBNet  proposed a hardware-aware efficient conv-net designing method by integrating the network architecture latency into the loss function. Differentiable NAS algorithms significantly increase the search speed by sharing weights across all sub-networks. However, determining the importance of each layer during the search is difficult. In other words, the parameter optimization results for the searched architectures are unreliable. ## Network Performance Predictor To avoid expensive search costs, a series of predictor-based methods have been proposed that better predict the latter part of the learning curve given the former part. For example, Domhan *et.al.*  extrapolated network architecture performance from the first part of a learning curve by mimicking the early termination of bad runs using a probabilistic model. Klein *et.al.*  studied the use of Bayesian neural networks to improve performance with a specialized learning curve layer. Swersky *et.al.*  assumed that the training loss during the fitting procedure roughly followed an exponential decay towards an unknown final value and proposed a regression model based on Bayesian optimization. Baker *et.al.*  proposed a sequential regression model to predict the validation accuracy using features based on network architectures, hyper-parameters, and time-series validation performance data. However, good performance relies on the assumption that the learning curve should be smooth, which is often not the case in reality, since the learning curve may abruptly change when the learning rate changes. Some other predictors try to directly predict architecture performance before training . Deng *et.al.*  proposed using long short-term memory (LSTM) to predict the performance of a given architecture. Specifically, each layer of the architecture was embedded into a feature vector according to some predefined rules, and the vectors were then concatenated to produce the LSTM input. Sun *et.al.*  encoded the network architecture by assuming that it is consisted of ResNet block and DenseNet block, extracted features based on it, and then predicted the accuracy with random forests. Xu *et.al.*  argued that the rankings between different models were much more important than absolute performance, and proposed a predictor based on a pairwise ranking-based loss function. Although a well-trained neural architecture predictor can replace the early stopping approach and avoid the mixed evaluation problem, collecting the ground-truth labels (*i.e.* , the exact network performance) to train the predictor is very expensive. Moreover, the predictor is sensitive to the number of training networks and the sampling strategy. Thus, NAS urgently requires an effective and accurate approach for comparing different searched architectures. # Divide-and-conquer Searching We first revisit the evaluation of different sampled neural architectures in NAS, which is the main reason that some excellent architectures cannot be maintained during the search. Then, we develop divide-and-conquer NAS method. The original search space will be split to several clusters according to sub-network similarity. ## Evaluation Problem in NAS NAS represents a series of well-design approaches for obtaining the optimal neural architecture for the target task and related dataset from a huge search space. For a given search space \(\mathcal S\) containing \(p\) different neural architectures, *i.e.* , \(\mathcal{S} = \{\mathcal{N}_1...,\mathcal{N}_p\}\), where \(\mathcal N_i\) is the \(i\)-th sampled architecture from \(\mathcal S\), each architecture is composed of a number of neural operations proven to be useful for deep learning (*e.g.* , convolution, pooling, short-cuts, *etc*.). Denoting the target dataset \(\mathbf{D}\), the performance of each neural architecture can be calculated as \[y_i = T(\mathcal{N}_i,\mathbf{D}),\] where \(y_i\) is the accuracy of \(\mathcal{N}_i\) on the test set and \(T(\cdot)\) is the training function, which is tuned for the sampled network from \(S\). In general, the training of a modern deep neural architecture is an intensive process (*e.g.* , over eight GPU\*days on ImageNet to train only one sub-network), and a large number of sub-networks exist in the search space. Evaluating all of these architectures individually is almost impossible. Thus, most NAS algorithms adopt an early stopping approach on a reduced dataset to evaluate each sub-network, *i.e.* , \[E(\mathcal{N}_i) = \tilde T(\mathcal{N}_i,\tilde{\mathbf{D}}), \label{Fcn:early}\] where \(\tilde T(\cdot)\) is the training function with the early stopping strategy and \(\tilde{\mathbf{D}}\) is the smaller dataset containing \(\sigma\) (*e.g.* , \(5\%\)) of the original training dataset to promote efficiency. Although Eq. [\[Fcn:early\]](#Fcn:early){reference-type="ref" reference="Fcn:early"} can significantly reduce the time taken to evaluate the searched networks, it is very hard to construct a smaller dataset and training method to satisfy the following objective function: \[\min_E\frac{1}{p}\sum_{i=1}^p||E(\mathcal{N}_i)-y_i||_2^2,\] where \(||\cdot||_2\) is the conventional \(\ell_2\)-norm. This is because deep neural networks are highly complex and hard to train on large-scale datasets, and there is no ranking-preserving relationship between early stopping performance and the final ground-truth accuracy of an arbitrary neural network. It is in fact unnecessary to predict the exact accuracy (or ground-truth accuracy) of the searched networks. If the order of all sub-networks can be preserved, the evaluation function \(E(\cdot)\) can also accurately help us to identify networks with better performance, significantly improving NAS efficiency. Therefore, the objective function for optimizing the evaluating function can be written as \[\min_E\sum_{i=1}^p\sum_{j=i+1}^p \text{sgn}(y_j-y_i)\times\text{sgn}(E(\mathcal{N}_i)-E(\mathcal{N}_j)), \label{Fcn:obj}\] where \(\text{sgn}(\cdot)\) is the sign function. Then, our goal is to find an efficient evaluator \(E(\cdot)\) and embed it into mainstream NAS algorithms. Figure [\[Fig:Intro\]](#Fig:Intro){reference-type="ref" reference="Fig:Intro"} shows that applying the same early stopping strategy to all networks cannot achieve the desired functionality, because the optimization routes of the various networks are different. For instance, some light-weight neural networks will first achieve a relatively high accuracy but their subsequent improvements are not obvious. However, if some neural networks have very close representations, their convergence statuses are similar. Therefore, the global early stopping strategy is unsuitable for constructing \(E(\cdot)\). ## Architecture Clustering As discussed in Eq. [\[Fcn:obj\]](#Fcn:obj){reference-type="ref" reference="Fcn:obj"}, an ideal evaluation function is defined to compare different network architectures during the search. In fact, Eq. [\[Fcn:obj\]](#Fcn:obj){reference-type="ref" reference="Fcn:obj"} can also be regarded as a predictive problem, with some existing works addressing this . However, these methods require a certain number of fully-trained networks sampled from the given search space to construct the performance predictor, which is also very resource intensive. Handling the performance comparison task using a universal early stopping strategy is unreliable; nevertheless, early stopping is still the cheapest way to compare a set of architectures without too many differences. Therefore, we propose to conduct NAS in a divide-and-conquer manner to reduce the difficulty in comparing various architectures during the search. In practice, we divide all the sub-networks in the given search space \(\mathcal{S}\) into \(K\) categories using \(K\) cluster centers to form \(K\) different groups, *i.e.* , \(\mathbf{G}=\{\mathbf{G}_1...,\mathbf{G}_K\}\). The corresponding objective function can be written as \[\arg\min_{\mathbf{G}} \sum_{k=1}^K\sum_{\mathcal{N}\in\mathcal{G}_k} ||F(\mathcal{N})-F(\tilde{\mathcal{N}}_k)||_2^2, \label{Fcn:arc_cl}\] where \(\tilde{\mathcal{N}}_k\) denotes the \(k\)-th clustering center of group \(\mathbf{G}_k\), and \(F(\cdot)\) is the feature representation of each input deep neural architecture. Establishing the relationship between deep neural architectures and their performance is difficult, and how to represent deep networks is also extremely complicated due to the various structures and billions of trainable parameters. Fortunately, the current mainstream search space is often regularized to a super-network , *i.e.* , the depths and types of connections are usually fixed, and all the operations needing to be searched are merged in it. Thus, we suggest representing each sampled network from the given search space \(\mathcal{S}\) using a code with fixed length \(L\), *i.e.* , the number of layers. One straightforward way to represent neural architectures is to regard the operations in each layer (*e.g.* , "conv" and "ReLU" ) or computational complexity (*i.e.* , FLOPS and memory ) as neural architecture features. However, directly using these features does not capture the relationship between any two layers and operations, and the computational complexity cannot be computed for some parameter-free layers, *e.g.* , pooling and short-cut layers. In addition, the phenomenon shown in Figure [\[Fig:Intro\]](#Fig:Intro){reference-type="ref" reference="Fig:Intro"} motivates us to encode the optimization difficulty of different neural architectures. Therefore, given \(L\) as the number of layers in the neural architectures and \(\eta\) as the maximum epochs trained on the training set, we propose using the following representation function to encode an arbitrary network \(\mathcal{N}_i\) into an \((L\times\eta)\)-dimensional matrix, *i.e.* , \[\hat F_{l,e}(\mathcal{N}_{i})=\frac{<{\theta_{i}^{l,1}}, {\theta}_{i}^{l,e}>}{||\theta_{i}^{l,1}||\cdot||{\theta}_{i}^{l,e}||}, \label{Fcn:pfeat}\] where \(\theta_{i}^{l,e}\) are the parameters in the \(l\)-th layer in network \(N_i\) trained on the reduced training set \(\tilde{\mathbf{D}}\) after \(e\) epochs. The above function calculates the changes in parameters of a given network between the first and the \(e\)-th epochs, which can reflect the sensitivity of each layer in the sampled network. For instance, a layer with fewer parameters will converge faster than another layer with more parameters due to the different optimization difficulty, as shown in Figure [\[Fig:Intro\]](#Fig:Intro){reference-type="ref" reference="Fig:Intro"}. Thus, we can use these features to distinguish neural architectures with different properties and divide the huge search space \(\mathcal{S}\) accordingly. However, Eq. [\[Fcn:pfeat\]](#Fcn:pfeat){reference-type="ref" reference="Fcn:pfeat"} also faces the same problem of not being able to represent some layers (such as pooling and short-cut) without trainable parameters. Thus, we further extend it to the output of each layer as the feature representation of a given neural network, *i.e.* , \[F_{l,e}(\mathcal{N}_{i})=\frac{<{o_{i}^{l,1}}, {o}_{i}^{l,e}>}{||o_{i}^{l,1}||\cdot||{o}_{i}^{l,e}||}, \label{Fcn:feat}\] where \(o_{i}^{l,e}\) is the averaged output feature of the \(l\)-th layer in network \(\mathcal{N}_{i}\) for a certain amount of data trained on \(\tilde{\mathbf{D}}\) with \(e\) epochs. To save the calculation of Eq. [\[Fcn:feat\]](#Fcn:feat){reference-type="ref" reference="Fcn:feat"} and balance the information of each dimensionality, we further apply a global average pooling on the feature representation \({o}\) of each layer before calculating \(F\). Then, we can utilize conventional k-means clustering or hierarchical clustering   to divide the original search space into \(K\) clusters according to the feature similarity between any two sampled neural architectures. [\[Tab:resp\]]{#Tab:resp label="Tab:resp"} ::: ## Validations on ImageNet After conducting experiments on CIFAR-100 data and analyzing the impact of each parameters in the proposed DC-NAS, we further employ the new method on the challenging large-scale ImageNet dataset . This dataset contains over 1.2M images from 1000 categories. FBNet  is selected as the baseline method because of the excellent performance on both model accuracy and latency. #### **Search Space Definition.** We use the same search space proposed in FBNet , which is a layer-wise search space with a fixed super-network. The super-network architecture is composed of a \(3\times3\) convolution layer, followed by seven SB blocks, a \(1\times1\) convolution layer, a \(7\times7\) average pooling layer and a fully-connected layer. Here SB block is the block that needs to be searched. Specifically, the block structure is fixed as a \(1\times1\) convolution followed by a \(k\times k\) depthwise convolution and another \(1\times1\) convolution. ReLU activation is used after each layer, except for the last \(1\times1\) convolution. When the stride of the block \(s=2\), the stride of the first \(1\times1\) convolution is 2. When \(s=1\), a skip connection is added between the input and the output of the block. When searching for the SB block, the expansion ratio \(e\), which determines the channel size expansion from input to output of the first \(1\times1\) convolution, can be searched from \(e\in\{1,3,6\}\), and the kernel size \(k\) of the depthwise convolution is \(k\in\{3,5\}\). Furthermore, the group convolution followed by a channel shuffle operation can be used in the first and last \(1\times1\) convolutions. Finally, a skip operation can be applied to the SB block, which actually cancels the block and reduces the architecture depth. There are \(9\) different candidate operations forming a search space of size \(9^{22}\). #### **Results on ImageNet.** Following , we first train the super-network on ImageNet-100 with 90 epochs. The first 10 epochs are trained with fixed operation parameters and the next 80 epochs are trained normally. In each epoch, the operator weight \(w\) is first trained on \(80\%\) of ImageNet-100 using SGD, and the probability parameters \(a\) are trained on the remaining \(20\%\) of the training set using Adam with an initial learning rate of 0.01 and weight decay of 0.0005. We then sample \(10^7\) different architectures from the search space according to the operation probability of the pre-trained super-network. Specifically, we normalize the probabilities of the operations in the same layer, and then select operation of that layer based on the normalized probability. After that, we extract features using Eq. [\[Fcn:feat\]](#Fcn:feat){reference-type="ref" reference="Fcn:feat"} with \(10000\) images sampled from the ImageNet-100 training set. Finally, the feature representations of \(10^7\) different samples are clustered into \(K\) different groups using the k-means algorithm, and the representative sub-network from each group is selected using Eq. [\[Fcn:res3\]](#Fcn:res3){reference-type="ref" reference="Fcn:res3"}. Considering the evaluation cost, we manually set a small cluster number \(K=5\) in our experiment. When increasing \(K\) to a larger number (*e.g.* , \(K=10\)), we do not discover a significant increase of the search result. The five representative sub-networks are fully trained on ImageNet, and the search results are shown in Table [\[Tab:imgnet\]](#Tab:imgnet){reference-type="ref" reference="Tab:imgnet"}, *i.e.* , DC-NAS-A to DC-NAS-E. #### **Compare to state-of-the-art methods.** The results of the proposed DC-NAS are compared to state-of-the-art models designed manually and automatically. The evaluation metrics are top-1/top-5 accuracies on the ImageNet validation set, and FLOPs and parameters of the searched models. During the experiment, we found that the results of FBNet  reported in the original paper is different from the results that is implemented by ourselves, which was also pointed out in  . Thus, we report both the evaluation metrics of the searched results mentioned in the original paper and the results implemented by us (denote as 'our impl.'). Table [\[Tab:imgnet\]](#Tab:imgnet){reference-type="ref" reference="Tab:imgnet"} shows that our DC-NAS achieves a top-1 accuracy of **\(75.1\%\)**, which is a new stat-of-the-art ImageNet accuracy among hardware-efficient NAS models. Meanwhile, we also compare the proposed DC-NAS with a number of state-of-the-art methods including NASNet , MnasNet , ProxylessNAS , *etc*. The comparison results shown in Table [\[Tab:imgnet\]](#Tab:imgnet){reference-type="ref" reference="Tab:imgnet"} also demonstrate that the proposed DC-NAS outperforms other methods under the same range of FLOPs. #### **Search cost.** The training process of super-net is exactly the same as in FBNet , which is 216 GPU hours. In this experiment, we do not need to adjust the hyper-parameter \(\eta\). Extract features of \(10^7\) different architectures using Eq. [\[Fcn:res3\]](#Fcn:res3){reference-type="ref" reference="Fcn:res3"} takes about 15 GPU hours. Finally, clustering architectures into different groups by applying k-means on the extracted features can be done in a few minutes. Thus, the total search cost of DC-NAS is 231 GPU hours, which is \(1.07\times\) compared to that of the baseline FBNet . In addition, it is easy to embed the proposed divide-and-conquer strategy into other frameworks to obtain better performance. #### **Latency.** Besides the FLOPS and model sizes, we also report the latency of different model on an ARM based mobile device for a fair comparison. The latency of the DC-NAS-E with the highest performance for predicting a \(224\times 224\) image is \(118.12ms\), which is very close to that (\(116.55ms\)) of the FBNet-C. At the same time, we can find from Table [\[Tab:imgnet\]](#Tab:imgnet){reference-type="ref" reference="Tab:imgnet"}, the latency of a neural network is not linearly related to FLOPS and model size. Thus, the hardware-aware strategy is essential for neural architecture search. Overall, the proposed DC-NAS can provide networks with the state-of-the-art performance on the given search space. # Conclusions In this paper we present a divide-and-conquer neural architecture search (DC-NAS) approach for effectively searching deep neural architectures. The proposed method overcomes the evaluation problem inherent in traditional NAS methods, namely they choose architectures that perform well on smaller datasets using the early stopping strategy while rejecting architectures that are actually acceptable after full training. Specifically, DC-NAS first extracts features that represent the speed of convergence of sub-networks according to the change in output features of each layer after each training epoch. It then calculates the similarity between two different architectures according to the feature representations. After that, traditional k-means clustering is used to divide the huge search space into several groups, and the best architectures in each group are further compared to obtain the best searched architecture. Our experimental results show that the proposed DC-NAS can significantly improve the performance of the searched architecture with only a slightly increase in the evaluation cost compared to traditional NAS methods.
{'timestamp': '2020-06-01T02:08:57', 'yymm': '2005', 'arxiv_id': '2005.14456', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14456'}
null
null
# Introduction The advent of quantum annealing devices  has spawned a renewed interest in the development of heuristic approaches to solve discrete optimization problems. On the one hand, the quantum revolution has inspired remarkable classical algorithms (see, for example, Ref. ) running on conventional CMOS hardware that have raised the bar for emerging quantum annealing hardware. On the other hand, substantial progress has been made in recent years on the development of programmable devices based on alternative technologies such as, for example, the coherent Ising machine based on optical parametric oscillators , digital MemComputing machines based on self-organizing logic gates , and the ASIC-based Fujitsu Digital Annealer . The rapid progression of novel computing platforms and algorithms demands tunable hard optimization problems for benchmarking purposes. Much effort has been devoted to generate binary synthetic benchmark problems whose optimal configurations are known *a priori*. These are frequently referred to as problems with *planted solutions*. In particular, benchmark problems that are easily scalable to large system sizes, and ideally with tunable hardness, facilitate systematic comparison of optimizers. Aside from their practical significance, theoretical investigation of such problem ensembles reveals intriguing insights into the nature of disordered systems, in particular, the interplay between frustration, thermodynamic behavior, and computational complexity . In this paper we introduce Chook (version 0.2.0), a comprehensive Python-based tool that integrates multiple solution planting schemes to provide a unified framework for generating benchmark problems for binary optimization problems. Chook currently supports tile planting , Wishart planting , deceptive cluster loops , and equation planting . In addition, the software allows for the construction of planted solutions for problems with higher-order (\(k>2\)) interactions, by combining problems with lower-order (\(k \leq 2\)) interactions. The paper is organized as follows. In Sec. [2](#sec:planting_schemes){reference-type="ref" reference="sec:planting_schemes"} we present an overview of the solution planting schemes included in Chook. Section [3](#sec:chook){reference-type="ref" reference="sec:chook"} provides instructions on installation and usage of the software, along with a detailed description of parameters and options, followed by concluding remarks. # Solution planting schemes {#sec:planting_schemes} In solution planting, the goal is to construct a binary cost function such that the minimizing configurations are known *a priori*. In the most general form, a cost function in Ising form with variables \(\boldsymbol{s} = (s_1, \dotsc, s_N)\), \(s_i \in \{\pm 1\}\) is given by \[\label{eq:main_hamiltonian} \mathcal{H}(\boldsymbol{s}) = \sum_{j \in V} h_j s_j + \sum_{k=2}^n \; \sum_{( i_1, i_2, \dotsc, i_k ) \in E} J_{i_1 i_2 \dotso i_k} s_{i_1} s_{i_2} \dotsm s_{i_k},\] where the hypergraph \(H = (V,E)\) with vertices \(V\) and hyperedges \(E\) captures the connectivity of the problem, and \(\{h_j\}\) are the local fields. A term containing a product of \(k\) spins, \(J_{i_1 i_2 \dotso i_k} s_{i_1} s_{i_2} \dotsm s_{i_k}\), is referred to as a \(k\)-local interaction with \(J_{i_1 i_2 \dotso i_k}\) being the coupling constant. Equation [\[eq:main_hamiltonian\]](#eq:main_hamiltonian){reference-type="eqref" reference="eq:main_hamiltonian"} can be readily mapped onto a cost function of Boolean variables \(\boldsymbol{x} = (x_1, x_2, \dotsc, x_N)\), \(x_i \in \{0, 1\}\) in the form of a high-order polynomial unconstrained binary optimization (HOBO) problem via the transformation \(s_i \rightarrow 1-2x_i\). Except for a few platforms like Azure Quantum, most of the software for binary optimization problems mainly targets up to 2-local interactions, in which case Eq. [\[eq:main_hamiltonian\]](#eq:main_hamiltonian){reference-type="eqref" reference="eq:main_hamiltonian"} reduces to \[\mathcal{H}(\boldsymbol{s}) = \sum_{j \in V} h_j s_j + \sum_{(i,j) \in E} J_{ij} s_i s_j,\] where \(G=(V,E)\) is the underlying problem graph. Among the planting schemes supported by Chook, tile planting, Wishart planting, and deceptive cluster loops methods construct cost functions with \(2\)-local interactions. Equation planting and \(k\)-local planting methods are capable of generating problems with higher-order (\(k>2\)) local interactions. In what follows, we provide a summary of each solution planting scheme supported by Chook. For a detailed description, the reader is referred to the the original references introducing the methods. ## Tile planting In tile planting  one seeks to decompose the problem graph into edge-disjoint vertex-sharing subgraphs and embed elementary Ising subproblems that share a common ground state over the subgraphs. The method produces scalable problems with highly-tunable complexity on cubic and square lattice topologies . It also extends to arbitrary graph structures, e.g., via lattice animals. Consider a decomposition of the problem graph \(G=(V,E)\) into subgraphs \(\{ G_l =(V_l, E_l) \}\) that ensures no edges are shared among the subgraphs (i.e., edge-disjoint). For each subgraph, we define an Ising cost function of the form \[\mathcal{H}_l = \sum_{(i,j) \in E_l} J_{ij} s_i s_j.\] The subproblem Hamiltonians \(\{\mathcal{H}_l\}\) are added to obtain the complete Hamiltonian \(\mathcal{H}_{_\text{TP}}\) over \(G\) as \[\mathcal{H}_{_\text{TP}} = \sum_{l} \mathcal{H}_l.\] The subproblems are constructed such that they share a common ground state configuration \(\boldsymbol{t}\), therefore the entire problem has a ground state characterized by the same local configuration \(\boldsymbol{t}\) occupying the constituent subgraphs. For simplicity, \(\boldsymbol{t}\) is taken to be the ferromagnetic ground state, i.e., \(\{+1, +1, \dotsc, +1\}\) (modulo \(\mathbb{Z}_2\) symmetry). Once the problem is constructed, the planted ferromagnetic ground state can be concealed by a gauge randomization in which the couplers \(\{J_{ij}\}\) are transformed as \(J_{ij}^\prime \leftarrow J_{ij} q_i q_j\), where \(\boldsymbol{q}\) is an arbitrary ground state. Chook supports the generation of tile-planted problems on square and cubic lattices with periodic boundary conditions. The regular structure of these lattices allows for a problem-graph decomposition that naturally renders a subset of the unit cells as the subgraphs. Figure [\[fig:checker_board\]](#fig:checker_board){reference-type="ref" reference="fig:checker_board"} illustrates this decomposition for square lattices, in which the resulting unit-cell subgraphs (dark color) form a checkerboard pattern. For square lattices we define four subproblem classes \(\{C_i\}\), \(i \in \{1,2,3,4\}\) that correspond to unit cycles (plaquettes) with different levels of frustration \[see Fig. [\[fig:subproblem_classes\]](#fig:subproblem_classes){reference-type="ref" reference="fig:subproblem_classes"}(a) for an illustration\]. A subproblem from the class \(C_i\) is constructed by assigning the antiferromagnetic value \(+1\) to a chosen coupler, the ferromagnetic value \(-1\) to randomly selected \(i-1\) couplers, and \(-2\) to the remaining couplers. Planted instances are generated by first assigning a subproblem type for each subgraph in the lattice, followed by a random rotation of the plaquette to allow for more disorder. We define instance classes based on the probability distribution over classes \(\{C_i\}\) according to which subproblem types are assigned to subgraphs. Specifically, we denote \(p_i\) to be the probability of choosing subproblems from class \(C_i\), and uniquely define each instance class based on the three probability parameters \(\{p_1, p_2, p_3\}\), where \(p_1 + p_2 + p_3 \leq 1\). Multiple complexity transitions have been observed in the multidimensional phase space defined by these parameters . For cubic lattices, Chook uses three subproblem types \(F_{22}\), \(F_{42}\), and \(F_6\), each having two, four, and six frustrated facets, respectively \[see Fig. [\[fig:subproblem_classes\]](#fig:subproblem_classes){reference-type="ref" reference="fig:subproblem_classes"}(b)\]. Each subproblem class consists of \(48\) members that are equivalent by octahedral symmetry under the operations of rotation and reflection . Similar to the square lattice case, problem construction begins by assigning subproblem types for the subgraphs according to the chosen probability distribution over classes \(\{F_{ij}\}\). Then for each subproblem type, one of the \(48\) members are selected randomly. Instance classes are defined based on the two probability parameters \(\{ p_{F_{22}}, p_{F_{42}} \}\), \(p_{F_{22}}+p_{F_{42}} \leq 1\), where \(p_{F_{22}}\) and \(p_{F_{42}}\) are the probabilities of choosing subproblems from the \(F_{22}\) class and \(F_{42}\) class, respectively. By varying these parameters one can achieve drastic changes in typical complexity, with higher concentrations of \(F_6\) subproblems resulting in problems that are many orders of magnitude harder than random problems with bimodal and Gaussian disorder . ## Wishart planting Wishart planting  generates Ising Hamiltonians on complete graphs of the form \[\mathcal{H}_{_\text{WP}}(\boldsymbol{s}) = \frac{1}{2} \sum_{i \neq j} J_{ij} s_i s_j = \frac{1}{2} \boldsymbol{s}^T \boldsymbol{J} \boldsymbol{s},\] in which the coupler matrix \(\boldsymbol{J}\) follows a Wishart distribution, a matrix generalization of the \(\chi^2\) distribution. The model exhibits a first-order phase transition in temperature, and allows for dramatic variations in typical hardness over many orders of magnitude as a control parameter is varied. In Wishart planting, one defines the coupler matrix \(\boldsymbol{J}\) in terms of a \(N \times M\) real-valued matrix \(\boldsymbol{W}\), where \(N\) is the number of spins and \(M\) (\(M \ge 1\)) is a tunable parameter which regulates the typical hardness and the thermodynamic behavior of the problem ensemble. Specifically, we define \(\tilde{\boldsymbol{J}}\) as \[\tilde{\boldsymbol{J}} = \frac{1}{N} \boldsymbol{W} \boldsymbol{W}^T,\] and zero the diagonal to obtain \(\boldsymbol{J} = \tilde{\boldsymbol{J}}-\text{diag} (\tilde{\boldsymbol{J}})\). It can be shown that the problem Hamiltonian \(\mathcal{H}_{_\text{WP}}\) then becomes \[\mathcal{H}_{_\text{WP}}(\boldsymbol{s}) = \frac{1}{N} \frac{1}{2} \|\boldsymbol{W}^T \boldsymbol{s}\|^2-\frac{1}{2} \text{Tr} (\tilde{\boldsymbol{J}}).\] Because the first term is in positive semidefinite quadratic form, \(\mathcal{H}(\boldsymbol{s})\) is minimized when \(\boldsymbol{s} = \boldsymbol{t}\) at which \(\boldsymbol{W}^T \boldsymbol{t} = 0\). Thus, the goal is to construct the matrix \(\boldsymbol{W}\) for a given planted solution \(\boldsymbol{t}\) such that the condition \(\boldsymbol{W}^T \boldsymbol{t} = 0\) is satisfied. We achieve this by drawing the \(M\) columns \(\{\boldsymbol{\omega}^\mu\}\) of \(\boldsymbol{W}\) from a correlated Gaussian distribution \({\boldsymbol{\omega}^\mu} \sim \mathcal{N}(0, \boldsymbol{\Sigma})\), where \(\boldsymbol{\Sigma} = N[ \boldsymbol{I}_N-\boldsymbol{t} \boldsymbol{t}^T/N ]/(N-1)\) is the covariance matrix. More precisely, we successively sample uncorrelated Gaussian variates \({\boldsymbol{z}^\mu} \sim \mathcal{N}(0, \boldsymbol{I}_N)\) and then multiply by the square root of \(\boldsymbol{\Sigma}\) to obtain \({\boldsymbol{\omega}^\mu}\), i.e., \({\boldsymbol{\omega}^\mu} = \boldsymbol{\Sigma}^{\frac{1}{2}} \boldsymbol{z}^\mu\). It can be shown that \(\langle \boldsymbol{\omega}^\mu, \boldsymbol{t} \rangle = 0\) for all \(\mu\) generated in this manner. The matrix \(\boldsymbol{W} \boldsymbol{W}^T\) is known to follow a Wishart distribution. Analogous to the clause-to-variable ratio in Boolean satisfiability problems, we define an equation-to-variable ratio \(\alpha = M/N\) for modulating the typical computational hardness of the problem ensemble. The class exhibits a pronounced easy-hard-easy complexity transition as \(\alpha\) is varied . One can construct problems with discrete coupler values via a simple modification of the sampling procedure. When generating \(\{\boldsymbol{\omega}^\mu\}\), instead of using Gaussian variates \({\boldsymbol{z}^\mu} \sim \mathcal{N}(0, \boldsymbol{I}_N)\), one can sample from a Rademacher distribution, i.e., draw samples independently and uniformly from \(\{-1, 1\}\). It can be shown that the scaled couplers \(J_{ij}^\prime = N^2 (N-1) J_{ij}\) assume values in the set of equally-spaced integers given by \[J_{ij}^\prime \in \{-4M(N-1)^2, \dotsc,-4, 0, 4, \dots, 4M(N-1)^2 \}.\] ## Deceptive cluster loops Deceptive cluster loops (DCL)  are a class of benchmark problems designed for the Chimera topology of the D-Wave 2000Q and D-Wave 2X quantum annealers, although the ideas can be generalized to other topologies. DCL problems are derived from the conventional frustrated cluster loops (FCL) problems . They have an additional control parameter that conceals the logical structure of the problem for a particular range of values. Such a feature makes these problems hard to solve using algorithms that exploit the underlying logical structure. Both DCL and FCL problems are based on the traditional frustrated loop problems introduced in Ref. . Frustrated loop problems are constructed by generating \(M = \alpha N\) loops on a graph \(G=(V,E)\), where \(N\) is the number of nodes and \(\alpha\) is the loop-to-node ratio. The loops are generated by placing random walkers on random nodes. A random walk is terminated when it crosses its own path, and the trailing tail segment is discarded to form a closed loop. On each loop \(k\), the coupler values \(J_{ij}^k\) are set to the ferromagnetic value \(-1\) except for a single, randomly-chosen coupler for which we assign the antiferromagnetic value \(+1\). The total Hamiltonian is formed by adding up the couplers belonging to all the loops \[\mathcal{H}_{_\text{DCL}} = \sum_{(i,j) \in E} \; \sum_{k=1}^M J_{ij}^k s_i s_j.\] The problem is discarded if \(|\sum_{k=1}^M J_{ij}^k| > R\) for any edge \((i,j) \in E\), where \(R\) is referred to as the "ruggedness." In frustrated cluster loop (FCL) problems , frustrated loops are generated on a two-dimensional logical lattice embedded on a Chimera graph. Here, all couplers within each Chimera unit cell are set to the ferromagnetic value \(-1\), forcing all physical spins within the unit cell to behave as a logical spin. The frustrated loops are then generated on the resulting \(L_x \times L_y\) two-dimensional logical lattice, where \(L_x\) and \(L_y\) are the linear dimensions of the parent Chimera graph. DCL problems are an extension of FCL problems. Here, all inter-cell couplers between Chimera unit cells are multiplied by a scaling factor \(\lambda\), while leaving all intra-cell couplers intact. For small values of \(\lambda\) (\(\lambda \sim 1\)), DCL problems can be described by a virtual planer model with each Chimera unit-cell behaving as a single virtual variable. For \(\lambda \gg 1\), the model behaves as a virtual fully-connected bipartite problem. For intermediate values of \(\lambda\), the problem behavior is nontrivial and no logical structures (as it happens for either small or large values of \(\lambda\)) can be determined to simplify the optimization of the problem; see Ref.  for details. ## Equation planting Systems of linear equations modulo 2, also known as "exclusive or satisfiability" (XORSAT) equations, are solvable in polynomial time by Gaussian elimination, but when formulated as optimization problems, they are often challenging for heuristic solvers . Equation planting  casts XORSAT problems as \(k\)-local (\(k>1\)) Ising cost functions. Consider a linear system of equations modulo 2 with \(N\) Boolean variables \(\{x_1, x_2, \dots, x_N\}\) and \(M\) equations \[\sum_{j=1}^N a_{ij} x_j = b_i,\] for \(i \in \{1, \dotsc, M \}\), where the coefficients \(\{a_{ij}, b_i\} \in \{0, 1\}\). Alternatively, each equation can be written in terms of the bit-wise XOR operation as \(a_{i1} x_1 \oplus \dotsm \oplus a_{iN} x_N = b_i\). When expressed in the Ising form, the above equation becomes \[\prod_{j: a_{ij}=1} s_j = (-1)^{b_i} \qquad s_j \in \{\pm 1\},\] in which only the variables with non-zero coefficients are included in the product. The linear system can be cast as an optimization problem with an Ising cost function, i.e., \[\mathcal{H}^\prime = \sum_{i=1}^M \left[ \prod_{j: a_{ij}=1} s_j-(-1)^{b_i} \right]^2,\] which, after dropping irrelevant constants, reduces to \[\mathcal{H}_{_\text{XORSAT}} =-\sum_{i=1}^M (-1)^{b_i} \prod_{j: a_{ij}=1} s_j.\] The ground state of the Ising cost function corresponds to the solution of the linear system, given that the linear system is solvable. Here we limit our attention to \(k\)-regular \(k\)-XORSAT problems, where each equation contains exactly \(k\) randomly selected variables out of the \(N\) variables (hence \(k\)-XORSAT), and each variable appears in exactly \(k\) equations (hence \(k\)-regular). Such a linear system consists of \(N\) equations (i.e., \(M=N\)), and the resultant Ising Hamiltonian contains \(N\) \(k\)-local terms. If the linear system has solutions, the ground-state energy of the Ising cost function is \(-M\), and the ground-state degeneracy (i.e., the number of minimizing configurations) is given by \(g = 2^{N-r}\), where \(r\) is the number of linearly independent (in arithmetic modulo 2) rows of the matrix \(\boldsymbol{A}=(a_{ij})\). For random \(k\)-regular \(k\)-XORSAT instances, \(r\) is typically \(\mathcal{O}(N)\) and hence the number of ground states grows sub-exponentially  . ## \(k\)-local planting Here we introduce a method of planting solutions for Hamiltonians with higher-order (\(k>2\)) interactions by combining Hamiltonians with lower-order (\(k \leq 2\)) interactions and known ground states. Consider a set of \(n\) problems described by the Hamiltonians \(\{ \mathcal{H}^{(1)}(\boldsymbol{s}^{(1)}), \mathcal{H}^{(2)}(\boldsymbol{s}^{(2)}), \dots, \mathcal{H}^{(n)}(\boldsymbol{s}^{(n)}) \}\) whose ground state energies are \(\{E_0^{(1)}, E_0^{(2)}, \dots, E_0^{(n)}\}\). The composite Ising cost function defined by the product \[\mathcal{H}_{_\text{comp}} = \prod_{i=1}^n \left[ \mathcal{H}^{(i)}-E_0^{(i)} \right]\] is minimized for \(\boldsymbol{s}^{(i)} = \boldsymbol{t}^{(i)}\), \(i \in \{1, \dotsc, n\}\), where \(\boldsymbol{t}^{(i)}\) is a ground state of \(\mathcal{H}^{(i)}\). To reduce the total number of variables in the composite problem, we allow spins to be shared among subproblems. The composite problem hence contains \(N = \text{max} \, \{ N^{(1)}, N^{(2)}, \cdots, N^{(n)}\}\) spins, where \(N^{(i)}\) is the number of spins in the \(i\)th problem. The locality of the highest-order term in the composite Hamiltonian \(\mathcal{H}_{_\text{comp}}\) is \(k_\text{max} = \sum_{i=1}^n k_\text{max}^{(i)}\), with \(k_\text{max}^{(i)}\) being the locality of the highest order term in \(\mathcal{H}^{(i)}\). Chook constructs higher-order (\(k>2\)) cost functions with even \(k_\text{max}\) by using tile-planted problems and Wishart-planted problems as constituent problems. Because these problem types consist of only \(2\)-local interactions, one cannot construct composite problems with odd \(k_\text{max}\) using these two problem types alone. Therefore when generating problems with odd \(k_\text{max}\), we also use a trivial Hamiltonian with \(1\)-local interactions, namely, Ising spins coupled to a bimodal random field, given by \(\mathcal{H}_\text{1-local} = \sum_{i=1}^{N_l} h_i s_i\), where \(N_l\) is the number of spins and \(\{h_i\}\) are the random fields drawn independently and uniformly from \(\{+1,-1\}\). The ground state of \(\mathcal{H}_\text{1-local}\) is trivially obtained by aligning all spins with their random fields. # Chook {#sec:chook} Chook is a platform-independent, Python-based tool distributed under the Apache License 2.0. The code is openly available on the GitHub software sharing platform (), as well as being included in this submission (see ancillary files). It is also hosted on the Python Package Index (PyPI) for easy installation via the package management system pip. We ask you to please cite this work if you choose to use Chook. ## Installation Chook requires Python version 3.4 or above for installation. We recommend installing Chook in a Python virtual environment to avoid potential conflicts with packages installed system-wide. If the Python package management system pip is available, Chook can be installed from the command line by running the command: $ pip install chook Alternatively, chook can be directly downloaded from PyPI or the GitHub repository and can be installed with the command: $ python setup.py install During installation, the prerequisite Python libraries numpy, scipy, and more-itertools will be automatically installed if they are not already available. ## Usage Chook can be executed from the command line providing two required positional arguments and , followed by zero or more optional arguments. The basic usage ignoring the optional arguments is $ chook <problem_type> <config_file> where the different types of are listed in Table [1](#tab:problem_types){reference-type="ref" reference="tab:problem_types"}, and is a configuration file in INI format that contains the problem-type specific parameters (see Sec. [3.4](#sec:config_file){reference-type="ref" reference="sec:config_file"}). Table [\[tab:arguments\]](#tab:arguments){reference-type="ref" reference="tab:arguments"} shows the complete list of optional arguments that can be appended to change the default behavior of Chook. ## Output Chook stores the generated problem instances in a subdirectory under the current working directly, which is named according to the problem type and major problem-specific parameters. For example, tile-planted problems on a square lattice with linear lattice size \(L=32\) and tuning parameters \(p_1=0.2\), \(p_2=0.5\), and \(p_3=0.1\) will be stored in a subdirectory named . Each problem instance will be stored in a separate file within the said subdirectory. Except for deceptive cluster loop problems for which the ground states cannot be decoded (except in specific limits), the ground-state energies will be stored in a separate file with two columns: the instance file name and the ground state energy. For the case of XORSAT problems, will contain a third column, the ground state degeneracy. The generated instances are expressed in the Ising form by default, but can be cast in the binary HOBO form by setting the optional argument . By default, the instance files are in plain text format. Each line in the instance file corresponds to a single \(k\)-local interaction term following the format <i_1> <i_2> ... <i_k> <J> where the first \(k\) elements are the indices of the spin (Boolean) variables, and the last element is the coupling constant. For the case of field terms (i.e., \(1\)-local interactions), the entry consists of two terms: the index of the spin (Boolean) variable followed by the field value. The user has the option to save the instances in the JavaScript Object Notation (JSON) format by setting the optional argument . ## Configuration file {#sec:config_file} As the second command-line argument, Chook requires a configuration file in INI format that specifies the parameters associated with the selected problem type. Chook is distributed with a sample configuration file which includes sample parameter specifications for all problem types. Each parameter is specified as an INI property with a and a , separated by an equal sign, i.e., . Properties are grouped into sections according to the problem types they are associated with, and the sections begin with section headers of the form . Table [1](#tab:problem_types){reference-type="ref" reference="tab:problem_types"} shows the section headers associated with the supported problem types. A section ends when the next section header is encountered, or when the end of file is reached. When Chook is executed, only the section associated with the chosen problem type is read from the configuration file, and the rest of the file is ignored. Table [\[tab:properties\]](#tab:properties){reference-type="ref" reference="tab:properties"} shows a comprehensive list of supported problem-specific properties. We recommend the users to modify the provided file to meet their needs rather than scripting their own configuration file to avoid potential errors. We now describe the parameter specification for the \(k\)-local planting method. In Chook, \(k\)-local problems are constructed by combining a sequence of constituent problems (or "subproblems") of three supported types, namely, tile planting, Wishart planting, and bimodal random field terms. Parameter specifications for the subproblems should be grouped into separate INI sections with user-defined headers and should be listed below the main section . The section contains two properties: which represents the locality \(k_\text{max}\) of the highest-order term in the composite Hamiltonian, and that accepts a list of identifiers representing the subproblems. Each subproblem identifier , enclosed within square brackets, i.e., , is used as the header of the section under which the subproblem properties are listed. Subproblem identifiers should begin with a letter, and may contain a combination of letters and numbers. One can reuse the same subproblem (with the same parameter specifications) multiple times in the construction procedure, in which case the corresponding subproblem identifier should be repeated accordingly in the . In addition to the usual problem-specific properties, each section defining a subproblem should contain an additional property , which is used to identify the type of the subproblem being defined. The allowed values are, "" for the bimodal random field terms, "" for tile planting, and "" for Wishart planting. As the bimodal random field terms can be trivially optimized, Chook enforces the user to minimize its usage, and it is only allowed when constructing problems with odd values of \(k_\text{max}\). Therefore, for even values of \(k_\text{max}\), one should use \(k_\text{max}/2\) subproblems with \(2\)-local interactions, which can be tile-planted problems and/or Wishart problems. For odd values of \(k_\text{max}\), one should use \((k_\text{max}-1)/2\) subproblems with \(2\)-local interactions, and a single subproblem with a \(1\)-local term (i.e., a bimodal random field term). # Summary {#sec:summary} We have presented a Python-based suite, Chook, for generating discrete optimization problems with known solutions using multiple popular solution planting schemes. Chook is distributed freely via Python Package Index (PyPI) and GitHub software sharing platform, and allows for fast and easy installation on any platform. The code supports the construction of cost functions with tunable hardness and local interactions spanning \(2\)-local to arbitrary higher-order. We believe that Chook will be highly beneficial for generating benchmark problem sets for current and future generations of programmable devices for discrete optimization.
{'timestamp': '2021-03-23T01:24:34', 'yymm': '2005', 'arxiv_id': '2005.14344', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14344'}
null
null
# Introduction The main aim of this work is to establish large deviation principle and small time asymptotics for the stochastic Navier-Stokes equation with anisotropic viscosity. We consider the following stochastic Navier-Stokes equation with anisotropic viscosity on the two dimensional (2D) torus \(\mathbb{T}^2=\mathbb{R}^2/(2\pi\mathbb{Z})^2\): \[\label{equation before projection}\aligned &du=\partial^2_1 udt-u\cdot \nabla u dt+\sigma(t, u)dW(t)-\nabla pdt,\\ &\text{div } u=0,\\ &u(0)=u_0, \endaligned\] where \(u(t,x)\) denotes the velocity field at time \(t\in[0,T]\) and position \(x\in\mathbb{T}^2\), \(p\) denotes the pressure field, \(\sigma\) is the random external force and \(W\) is an \(l^2\)-cylindrical Wiener process. Let's first recall the classical Navier-Stokes (N-S) equation which is given by \[\label{equation classical}\aligned &du=\nu\Delta udt-u\cdot \nabla u dt-\nabla pdt,\\ &\text{div } u=0,\\ &u(0)=u_0, \endaligned\] where \(\nu>0\) is the viscosity of the fluid. ([\[equation classical\]](#equation classical){reference-type="ref" reference="equation classical"}) describes the time evolution of an incompressible fluid. In 1934, J. Leray proved global existence of finite energy weak solutions for the deterministic case in the whole space \(\mathbb{R}^d\) for \(d=2, 3\) in the seminar paper. For more results on deterministic N-S equation, we refer to, ,, and reference therein. For the stochastic case, there exists a great amount of literature too. The existence and uniqueness of solutions and ergodicity property to the stochatic 2D Navier-Stokes equation have been obtained (see e.g., , ). Large deviation principles for the two-dimensional stochastic N-S equations have been established in and. Compared to [\[equation classical\]](#equation classical){reference-type="eqref" reference="equation classical"}, [\[equation before projection\]](#equation before projection){reference-type="eqref" reference="equation before projection"} only has partial dissipation, which can be viewed as an intermediate equation between N-S equation and Euler equation. System of this type appear in in geophysical fluids (see for instance and ). Instead of putting the classical viscosity \(-\nu\Delta\) in ([\[equation classical\]](#equation classical){reference-type="ref" reference="equation classical"}), meteorologist often modelize turbulent diffusion by putting a viscosity of the form: \(-\nu_h\Delta_h-\nu_3\partial^2_{x_3}\), where \(\nu_h\) and \(\nu_3\) are empiric constants, and \(\nu_3\) is usually much smaller than \(\nu_h\). We refer to the book of J. Pedlovsky for a more complete discussion. For the 3 dimensional case there is no result concerning global existence of weak solutions. In the 2D case, investigates both the deterministic system and the stochastic system ([\[equation before projection\]](#equation before projection){reference-type="ref" reference="equation before projection"}) for \(H^{0,1}\) initial value (For the definition of space see Section 2). The main difference in obtaining the global well-posedness for [\[equation before projection\]](#equation before projection){reference-type="eqref" reference="equation before projection"} is that the \(L^2\)-norm estimate is not enough to establish \(L^2([0,T], L^2)\) strong convergence due to lack of compactness. In, the proof is based on an additional \(H^{0,1}\)-norm estimate. In this paper, we want to establish the large deviation principles for the two-dimensional stochastic Navier-Stokes equations with anisotropic viscosity both for small noise and for short time. The large deviation theory concerns the asymptotic behavior of a family of random variables \(X_\varepsilon\) and we refer to the monographs and for many historical remarks and extensive references. It asserts that for some tail or extreme event \(A\), \(P(X_\varepsilon \in A)\) converges to zero exponentially fast as \(\varepsilon\rightarrow 0\) and the exact rate of convergence is given by the so-called rate function. The large deviation principle was first established by Varadhan in and he also studied the small time asymptotics of finite dimensional diffusion processes in. Since then, many important results concerning the large deviation principle have been established. For results on the large deviation principle for stochastic differential equations in finite dimensional case we refer to. For the extensions to infinite dimensional diffusions or SPDE, we refer the readers to, , , ,, ,, and the references therein. We first study the small noise large deviations by using the weak convergence approach. This approach is mainly based on a variational representation formula for certain functionals of infinite dimensional Brownian Motion, which was established by Budhiraja and Dupuis in. The main advantage of the weak convergence approach is that one can avoid some exponential probability estimates, which might be very difficult to derive for many infinite dimensional models. To use the weak convergence approach, we need to prove two conditions in Hypothesis [\[Hyp\]](#Hyp){reference-type="ref" reference="Hyp"}. In and, the authors use integration by parts and lead to some extra condition on diffusion coefficient. In, the authors use time discretization and require time-regularity of diffusion coefficient. In this paper, we use the argument in, in which the authors prove a moderate deviation principle by this argument, i.e. we first establish the convergence in \(L^2([0,T],L^2)\) and then by using this and Itô's formula, \(L^\infty([0,T], L^2)\bigcap L^2([0,T], H^{1,0})\) convergence can be obtained. By this argument, we can drop the extra condition on diffusion coefficient in and. For the small time asymptotics (large deviations) of the two-dimensional stochastic Navier-Stokes equations with anisotropic viscosity. This describes the limiting behaviour of the solution in time interval \([0,t]\) as \(t\) goes to zero. Another motivation will be to get the following Varadhan identity through the small time asymptotics: \[\lim_{t\rightarrow 0}2t\log P(u(0)\in B, u(t)\in C)=-d^2(B,C),\] where \(d\) is an appropriate Riemannian distance associated with the diffusion generated by the solutions of the two-dimensional stochastic Navier-Stokes equations with anisotropic viscosity. The small time asymptotics is also theoretically interesting, since the study involves the investigation of the small noise and the effect of the small, but highly nonlinear drift. To prove the small time asymptotics, we follow the idea of to prove the solution to ([\[equation before projection\]](#equation before projection){reference-type="ref" reference="equation before projection"}) is exponentially equivalent to the solution to the linear equation. The main difference compared to is that similar to \(L^2\)-norm estimate is not enough due to less dissipation and we have to do \(H^{0,1}\)-norm estimate. .10in **Organization of the paper** In Section 2, we introduce the basic notation, definition and recall some preliminary results. In Section 3, we will build the small noise large deviation principle. In Section 4, we prove the small time asymptotics for the the two-dimensional stochastic Navier-Stokes equations with anisotropic viscosity. .10in **Acknowledgement** The authors would like to thank Rongchan Zhu and Siyu Liang for helpful discussions. # Preliminary .10in **Function spaces on \(\mathbb{T}^2\)** We first recall some definitions of function spaces for the two dimensional torus \(\mathbb{T}^2\). Let \(\mathbb{T}^2=\mathbb{R}/2\pi\mathbb{Z}\times\mathbb{R}/2\pi\mathbb{Z}=(\mathbb{T}_h, \mathbb{T}_v)\) where \(h\) stands for the horizonal variable \(x_1\) and \(v\) stands for the vertical variable \(x_2\). For exponents \(p,q\in [1, \infty)\), we denote the space \(L^p(\mathbb{T}_h, L^q(\mathbb{T}_v))\) by \(L^p_h(L^q_v)\), which is endowed with the norm \[\|u\|_{L^p_h(L^q_v)(\mathbb{T}^2)}:=\{\int_{\mathbb{T}_h}(\int_{\mathbb{T}_v}|u(x_1, x_2)|^qdx_2)^{\frac{p}{q}}dx_1\}^{\frac{1}{p}}.\] Similar notation for \(L^p_v(L^q_h)\). In the case \(p, q=\infty\), we denote \(L^\infty\) the essential supremum norm. Throughout the paper, we denote various positive constants by the same letter \(C\). For \(u\in L^2(\mathbb{T}^2)\), we consider the Fourier expansion of \(u\): \[u(x)=\sum_{k\in\mathbb{Z}^2}\hat{u}_ke^{ik\cdot x} \text{ } \text{with} \text{ } \hat{u}_k=\overline{\hat{u}_{-k}},\] where \(\hat{u}_k:=\frac{1}{(2\pi)^2}\int_{[0, 2\pi]\times[0, 2\pi]}u(x)e^{-ik\cdot x}dx\) denotes the Fourier coefficient of \(u\) on \(\mathbb{T}^2\). Define the Sobolev norm: \[\|u\|_{H^s}^2:=\sum_{k\in\mathbb{Z}^2}(1+|k|^2)^s |\hat{u}_k|^2,\] and the anisotropic Sobolev norm: \[\|u\|^2_{H^{s, s'}}=\sum_{k\in\mathbb{Z}^2}(1+|k_1|^2)^s(1+|k_2|^2)^{s'}|\hat{u}_k|^2,\] where \(k=(k_1, k_2)\). We define the Sobolev spaces \(H^s(\mathbb{T}^2)\), \(H^{s,s'}(\mathbb{T}^2)\) as the completion of \(C^\infty(\mathbb{T}^2)\) with the norms \(\|\cdot\|_{H^s}\), \(\|\cdot\|_{H^{s,s'}}\) respectively. To formulate the stochastic Navier-Stokes equations with anisotropic viscosity, we need the following spaces: \[H:=\{u\in L^2(\mathbb{T}^2; \mathbb{R}^2); \text{div}\text{ } u=0\},\] \[V:=\{u\in H^1(\mathbb{T}^2; \mathbb{R}^2); \text{div}\text{ } u=0\},\] \[\tilde{H}^{s,s'}:=\{u\in H^{s,s'}(\mathbb{T}^2;\mathbb{R}^2); \text{div}\text{ } u=0\}.\] Moreover, we use \(\langle\cdot, \cdot\rangle\) to denote the scalar product (which is also the inner product of \(L^2\) and \(H\)) \[\langle u, v\rangle =\sum_{j=1}^2\int_{\mathbb{T}^2}u^j(x)v^j(x)dx\] and \(\langle\cdot, \cdot\rangle_X\) to denote the inner product of Hilbert space \(X\) where \(X=l^2\), \(V\) or \(\tilde{H}^{s,s'}\). Due to the divergence free condition, we need the Larey projection operator \(P_H: \text{ } L^2(\mathbb{T}^2)\rightarrow H\): \[P_H: u\mapsto u-\nabla \Delta^{-1}(\text{div } u).\] By applying the operator \(P_H\) to ([\[equation before projection\]](#equation before projection){reference-type="ref" reference="equation before projection"}) we can rewrite the equation in the following form: \[\label{equation after projection}\aligned &du(t)=\partial^2_1 u(t)dt-B(u(t))dt+\sigma(t, u(t))dW(t),\\ &u(0)=u_0, \endaligned\] where the nonlinear operator \(B(u,v)=P_H(u\cdot \nabla v)\) with the notation \(B(u)=B(u,u)\). Here we use the same symbol \(\sigma\) after projection for simplicity. For \(u,v,w\in V\), define \[b(u,v,w):=\langle B(u,v), w\rangle.\] We have \(b(u,v,w)=-b(u,w,v)\) and \(b(u,v,v)=0\). We put some estimates of \(b\) in the Appendix. .10in **Large deviation principle** We recall the definition of the large deviation principle. For a general introduction to the theory we refer to ,. .10in It is well known that the large deviation principle and the Laplace principle are equivalent if \(E\) is a Polish space and the rate function is good. The equivalence is essentially a consequence of Varadhan's lemma () and Bryc's converse theorem (). Note that proves that the equivalence holds when \(E\) is a completely regular topological space. Given a probabilty space \((\Omega,\mathcal{F},P)\), the random variables \(\{Z_\varepsilon\}\) and \(\{\overline{Z}_\varepsilon\}\) which take values in \((E,\rho)\) are called exponentially equivalent if for each \(\delta>0\), \[\lim_{\varepsilon\rightarrow 0}\varepsilon\log P(\rho(Z_\varepsilon,\overline{Z}_\varepsilon)>\delta)=-\infty.\] .10in .10in **Existence and uniqueness of solutions** We introduce the precise assumptions on the diffusion coefficient \(\sigma\). Given a complete probability space \((\Omega, \mathcal{F}, P)\) with filtration \(\{\mathcal{F}_t\}_{t\geqslant 0}\). Let \(L_2(l^2,U)\) denotes the Hilbert-Schmidt norms from \(l^2\) to \(U\) for a Hilbert space \(U\). We recall the following conditions for \(\sigma\) from: (i) **Growth condition** There exists nonnegative constants \(K'_i\), \(K_i\), \(\tilde{K}_i\) (\(i=0,1,2\)) such that for every \(t\in[0,T]\): .10in (A0) \(\|\sigma(t,u)\|^2_{L_2(l^2, H^{-1})}\leqslant K_0'+K_1'\|u\|^2_{H}\); (A1) \(\|\sigma(t,u)\|^2_{L_2(l^2, H)}\leqslant K_0+K_1\|u\|^2_{H}+K_2\|\partial_1 u\|^2_H\); (A2) \(\|\sigma(t,u)\|^2_{L_2(l^2, H^{0,1})}\leqslant \tilde{K}_0+\tilde{K}_1\|u\|^2_{H^{0,1}}+\tilde{K}_2(\|\partial_1 u\|_H^2+\|\partial_1\partial_2u\|^2_H)\); .10in (ii)**Lipschitz condition** There exists nonnegative constants \(L_1, L_2\) such that: .10in (A3) \(\|\sigma(t,u)-\sigma(t,v)\|^2_{L_2(l^2, H)}\leqslant L_1\|u-v\|^2_{H}+L_2\|\partial_1(u-v)\|^2_H\). .10in The following theorem from gives the well-posedness of equation ([\[equation after projection\]](#equation after projection){reference-type="ref" reference="equation after projection"}): .10in **A martingale lemma** The following remarkable result is from and: # Large deviation principle In this section, we consider the large deviation principle for the stochastic Navier-Stokes equations with anisotropic viscosity. We will use the weak convergence approach introduced by Budhiraja and Dupuis in. First we recall it. The starting point is the equivalence between the large deviation principle and the Laplace principle. This result was first formulated in and it is essentially a consequence of Varadhan's lemma and Bryc's converse theorem. Let \(\{W(t)\}_{t\geqslant 0}\) be a cylindrical Wiener process on \(l^2\) w.r.t. a complete filtered probability space \((\Omega, \mathcal{F}, \mathcal{F}_t, P)\) (i.e. the path of \(W\) take values in \(C([0,T]; U)\), where \(U\) is another Hilbert space such that the embedding \(l^2\subset U\) is Hilbert-Schmidt). For \(\varepsilon>0\), suppose \(g^\varepsilon\): \(C([0,T], U)\rightarrow E\) is a measurable map and \(u^\varepsilon:=g^\varepsilon(W(\cdot))\). Let \[\mathcal{A}:=\left\{v: v \text{ is }l^2\text{-valued }\mathcal{F}_t\text{-predictable process and }\int^T_0\|v(s)(\omega)\|^2_{l^2}ds<\infty\text{ a.s.}\right\},\] \[S_N:=\left\{\phi\in L^2([0,T],l^2):\text{ }\int^T_0\|\phi(s)\|^2_{l^2}ds\leqslant N\right\},\] \[\mathcal{A}_N:=\left\{v\in\mathcal{A}:\text{ } v(\omega)\in S_N\text{ P-a.s.}\right\}.\] Here we will always refer to the weak topology on \(S_N\) in the following if we do not state it explicitly. Now we formulate the following sufficient conditions for the Laplace principle of \(u^\varepsilon\) as \(\varepsilon\rightarrow 0\). Consider the following equation: \[\label{LDP eq.}\aligned &du^\varepsilon(t)=\partial^2_1 u^\varepsilon(t)dt-B(u^\varepsilon(t))dt+\sqrt{\varepsilon}\sigma(t, u^\varepsilon(t))dW(t),\\ &u^\varepsilon(0)=u_0. \endaligned\] By Lemma [\[ex. and uniq. of solution\]](#ex. and uniq. of solution){reference-type="ref" reference="ex. and uniq. of solution"}, under the assumptions (A0)-(A3), ([\[LDP eq.\]](#LDP eq.){reference-type="ref" reference="LDP eq."}) has a unique strong solution \(u^\varepsilon\in L^\infty([0,T], \tilde{H}^{0,1})\bigcap L^2([0,T], \tilde{H}^{1,1})\bigcap C([0,T], H^{-1})\) for \(u_0\in \tilde{H}^{0,1}\). It follows from Yamada-Watanabe theorem (See ) that there exists a Borel-measurable function \[g^\varepsilon: C([0,T],U)\rightarrow L^\infty([0,T], H)\bigcap L^2([0,T], \tilde{H}^{1,0})\bigcap C([0,T],H^{-1})\] such that \(u^\varepsilon=g^\varepsilon(W)\) a.s.. Let us introduce the following skeleton equation associated to ([\[LDP eq.\]](#LDP eq.){reference-type="ref" reference="LDP eq."}), for \(\phi\in L^2([0,T], l^2)\): \[\label{skeleton eq.}\aligned &dz^\phi(t)=\partial^2_1 z^\phi(t)dt-B(z^\phi(t))dt+\sigma(t, z^\phi(t))\phi(t)dt,\\ &\text{div }z^\phi=0,\\ &z^\phi(0)=u_0. \endaligned\] An element \(z^\phi\in L^\infty([0,T], H)\bigcap L^2([0,T], \tilde{H}^{1,0})\bigcap C([0,T],H^{-1})\) is called a (weak) solution to ([\[skeleton eq.\]](#skeleton eq.){reference-type="ref" reference="skeleton eq."}) if for any \(\varphi\in (C^\infty_0([0,T]\times \mathbb{T}^2))^2\) with \(\text{div} \varphi=0\), and \(t>0\), \[\langle z^\phi(t),\varphi(t)\rangle=\langle u_0,\varphi(0)\rangle+\int^t_0\langle z^\phi, \partial_t\varphi\rangle-\langle \partial_1z^\phi,\partial_1 \varphi\rangle+\langle-B(z^\phi)+\sigma(s, z^\phi)\phi, \varphi\rangle ds.\] The existence of the weak solution to ([\[skeleton eq.\]](#skeleton eq.){reference-type="ref" reference="skeleton eq."}) can be obtained by the same method as in (see Lemma [\[solution to skeleton eq.\]](#solution to skeleton eq.){reference-type="ref" reference="solution to skeleton eq."} in the following). Define \(g^0:C([0,T],U)\rightarrow L^\infty([0,T], H)\bigcap L^2([0,T], \tilde{H}^{1,0})\bigcap C([0,T],H^{-1})\) by \[\begin{aligned} g^0(h):= \left\{ \begin{array}{ll} z^\phi, &\text{ if }h=\int^\cdot_0\phi(s)ds \text{ for some }\phi\in L^2([0,T],l^2); \\ 0, &\text{ otherwise.} \end{array} \right. \end{aligned}\] Then the rate function can be written as \[\label{rate function LDP} I(z)=\inf\left\{\frac{1}{2}\int^T_0\|\phi(s)\|^2_{l^2}ds: \text{ }z=z^\phi,\text{ }\phi\in L^2([0,T],l^2)\right\},\] where \(z\in L^\infty([0,T], H)\bigcap L^2([0,T], \tilde{H}^{1,0})\bigcap C([0,T],H^{-1})\). The main result of this section is the following one: The proof is divided into the following lemmas. .10in The following Lemma shows that \(I\) is a good rate function. The proof follows essentially the same argument as in. For next step, consider the following equation: \[\label{eq. for weak convergence}\aligned dZ^\varepsilon_v(t)&=\partial^2_1 Z^\varepsilon_v(t)dt-B(Z_v^\varepsilon(t))dt+\sigma(t, Z^\varepsilon_v(t))v^\varepsilon(t)dt+\sqrt{\varepsilon}\sigma(t, Z_v^\varepsilon(t))dW(t),\\ \text{div}Z^\varepsilon_v&=0,\\ Z^\varepsilon_v(0)&=u_0, \endaligned\] where \(v^\varepsilon\in\mathcal{A}_N\) for some \(N<\infty\). Here \(Z^\varepsilon_v\) should have been denoted \(Z^\varepsilon_{v^\varepsilon}\) and the slight abuse of notation is for simplicity. Similar as, we have the following tightness lemma: # Small time asymptotics In this section, we consider the small time behaviour. We need the following additional assumption (A3') and (A4). Note that (A3') is stronger than (A3). (A3') \(\|\sigma(t,u)-\sigma(s,v)\|^2_{L_2(l^2, H)}\leqslant L_0|t-s|^\alpha+L_1\|u-v\|^2_{H}\). (A4) \(\|\sigma(t,u)\|^2_{L_2(l^2, V)}\leqslant \overline{K}_0+\overline{K}_1\|u\|_{V}^2\). Let \(\varepsilon>0\) and \(u\) be the solution to ([\[equation after projection\]](#equation after projection){reference-type="ref" reference="equation after projection"}), by the scaling property of the Brownian motion, \(u(\varepsilon t)\) coincides in law with the solution to the following equation: \[\label{eq. for small time}\aligned &du_\varepsilon=\varepsilon\partial_1^2u_\varepsilon dt-\varepsilon B(u_\varepsilon)dt+\sqrt{\varepsilon}\sigma(\varepsilon t, u_\varepsilon)dW(t),\\ &u_\varepsilon(0)=u_0. \endaligned\] Define a functional \(I^{u_0}\) on \(L^\infty([0,T], H)\bigcap C([0,T],H^{-1})\) by \[I^{u_0}(g)=\inf_{h\in\Gamma_g}\{\frac{1}{2}\int^T_0\|{h}(t)\|_{l^2}^2dt\},\] where \[\Gamma_g=\{h\in L^2([0,T],l^2): g(t)=u_0+\int^t_0\sigma(0,g(s)){h}(s)ds, \text{ }t\in[0,T]\}.\] The main theorem of this section is the following one: We aim to prove that \(u_\varepsilon\) is exponentially equivalent to the solution to the following equation: \[\label{eq for v} v_\varepsilon(t)=u_0+\sqrt{\varepsilon}\int^t_0\sigma(\varepsilon s, v_\varepsilon(s))dW(s).\] Because of the non-linear form \(b(\cdot,\cdot,\cdot)\) and the anisotropic viscosity, we split the proof into several lemmas. Since \(V\) is dense in \({\tilde{H}^{0,1}}\), there exists a sequence \(\{u^n_0\}\subset V\) such that \[\lim_{n\rightarrow +\infty}\|u^n_0-u_0\|_{\tilde{H}^{0,1}}=0.\] Let \(u_{n,\varepsilon}\) be the solution to ([\[eq. for small time\]](#eq. for small time){reference-type="ref" reference="eq. for small time"}) with the initial data \(u^n_{0}\). Similarly, let \(v_{n,\varepsilon}\) be the solution to ([\[eq for v\]](#eq for v){reference-type="ref" reference="eq for v"}) with the initial data \(u^n_{0}\). For \(M>0\), define a random time (which is also a stopping time with respect to \(\mathcal{F}_{t+}\) by Lemma [\[stopping time\]](#stopping time){reference-type="ref" reference="stopping time"}) \[\tau^n_{M,\varepsilon}:=T\wedge\inf\{t:\|u_{n,\varepsilon}(t)\|^2_{H}>M,\text{ or }\varepsilon\int^t_0\|\partial_1 u_{n,\varepsilon}(s)\|^2_{H}ds>M\}.\] From the proof of Lemma [\[lemma1\]](#lemma1){reference-type="ref" reference="lemma1"} and Lemma [\[lemma2\]](#lemma2){reference-type="ref" reference="lemma2"}, it follows that .10in The following lemma for \(v_{n,\varepsilon}\) is from : .10in The following lemma for \(v_\varepsilon\) is from: .10in
{'timestamp': '2020-06-01T02:11:15', 'yymm': '2005', 'arxiv_id': '2005.14526', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14526'}
# Introduction In the last two decades, random matrix theory (RMT) has produced numerous results that offer a better understanding of large random matrices. These advances have enabled interesting applications in communication theory and even though it can potentially contribute to many other data-rich domains such as brain imaging or genetic research, it has rarely been applied. The main barrier to the adoption of RMT may be the lack of concrete statistical results from the probability side. The straightforward adaptation of classical multivariate theory to high dimensions can sometimes be achieved, but such procedures are only valid under strict assumptions about the data such as normality or independence. Even minor differences between the model assumptions and the actual data lead to catastrophic results and such procedures also often do not have enough power. This paper proposes a statistical procedure for testing the equality of two covariance matrices when the number of potentially dependent data vectors \(n\) and the number of variables \(m\) are large. RMT denotes the investigation of estimates of covariance matrices \(\hat{\Sigma}\) or more precisely their eigenvalues and eigenvectors when both \(n\) and \(m\) tend to infinity with \(\lim \frac{m}{n}=c>0\). When \(m\) is finite and \(n\) tends to infinity the behaviour of the random matrix is well known and presented in the books of, and (or its original version ). In the RMT case, the behaviour is more complex, but many results of interest are known., and more recently contain comprehensive introductions to RMT and covers the case of empirical (estimated) covariance matrices. Although the existing theory builds a good intuition of the behaviour of these matrices, it does not provide enough of a basis to construct a test with good power, which is robust with respect to the assumptions. Inspired by the spike models, we extend the residual spikes introduced in and provide a description of the behaviour of this statistic under a null hypothesis when the perturbation is of order \(k\). These results enable the user to test the equality of two populations as well as other null hypotheses such as the independence of two sets of variables. This paper can be seen as a complex particular case of. However simulations show that equality between eigenvalues of the perturbation are not necessary for this complex statistic and moreover they show good robustness against perturbations of distributions.\ The remainder of the paper is organized as follows. In the next section, we develop the test statistic and discuss the problems associated with high dimensions. Then we present the main theorem [\[TH=Main\]](#TH=Main){reference-type="ref" reference="TH=Main"}. The proof itself is technical and presented in Appendix [\[appendixproof\]](#appendixproof){reference-type="ref" reference="appendixproof"}. The last section contains an example of an application. # Test statistic {#section:teststat} We compare the spectral properties of two covariance estimators \(\hat{\Sigma}_X\) and \(\hat{\Sigma}_Y\) of dimension \(m\times m\) which can be represented as \[\begin{aligned} \hat{\Sigma}_X=P_X^{1/2} W_X P_X^{1/2} \text{ and } \hat{\Sigma}_Y=P_Y^{1/2} W_Y P_Y^{1/2}. \end{aligned}\] In this equation, \(W_X\) and \(W_Y\) are of the form \[\begin{aligned} W_X=O_X \Lambda_X O_X \text{ and } W_Y=O_Y \Lambda_Y O_Y, \end{aligned}\] with \(O_X\) and \(O_Y\) being independent unit orthonormal random matrices whose distributions are invariant under rotations, while \(\Lambda_X\) and \(\Lambda_Y\) are independent positive random diagonal matrices, independent of \(O_X, O_Y\) with trace equal to m and a bound on the diagonal elements. Note that the usual RMT assumption, \(\frac{m}{n}=c\) is replaced by this bound! The (multiplicative) spike model of order \(k\) determines the form of \(P_X= {\rm I}_m + \sum_{s=1}^k (\theta_{X,s}-1) u_{X,s} u_{X,s}^t\) and \(P_Y= {\rm I}_m+ \sum_{s=1}^k(\theta_{Y,s}-1) u_{Y,s} u_{Y,s}^t\) where \(\left\langle u_{X,s} ,u_{X,r} \right\rangle=\left\langle u_{Y,s} ,u_{Y,r} \right\rangle=\delta_{s,r}\). Our results will apply to any two centered data matrices \({\mathbf{X}} \in \mathbb{R}^{m\times n_X}\) and \({\mathbf{Y}} \in \mathbb{R}^{m\times n_Y}\) which are such that \[\begin{aligned} \hat{\Sigma}_X= \frac{1}{n_X}{\mathbf{X}} {\mathbf{X}}^t \text{ and } \hat{\Sigma}_Y= \frac{1}{n_Y}{\mathbf{Y}} {\mathbf{Y}}^t \end{aligned}\] and can be decomposed in the manner indicated. This is the basic assumption concerning the covariance matrices. We will assume throughout that \(n_X\geq n_Y\). Because \(O_X\) and \(O_Y\) are independent and invariant by rotation we can assume without loss of generality that for \(s=1,2...,k\), \(u_{X,s}=e_s\) as in. Under the null hypothesis we have \(P_X=P_Y\) and we use the simplified notation \(P_k\) for both matrices where for \(s=1,2...,k\), \(\theta_{X,s}=\theta_{Y,s}=\theta_s\) and \(u_{X,s}=u_{Y,s}(=e_s)\). To test \(H_0:P_k=P_X=P_Y\) against \(H_1:P_X\neq P_Y\) it is natural to consider the extreme eigenvalues of \[\begin{aligned} \hat{\Sigma}_X^{-1/2} \hat{\Sigma}_Y \hat{\Sigma}_X^{-1/2}\.\label{eq:base1} \end{aligned}\] We could also swap the subscripts, but it turns our to be preferable to use the inversion on the matrix with larger sample size. The distributional approximations we will refer to are based on RMT, that is, they are derived by embedding a given data problem into a sequence of random matrices for which both \(n\) and \(m\) tend to infinity such that \(m/n\) tends to a positive constant \(c\). The most celebrated results of RMT describe the almost sure weak convergence of the empirical distribution of the eigenvalues (spectral distribution) to a non-random compactly supported limit law. An extension of this theory to the \"Spike Model\" suggests that we should modify \(\hat{\Sigma}\) because estimates of isolated eigenvalues derived from the usual estimates are asymptotically biased. The following corrections will be used. The matrix ([\[eq:base1\]](#eq:base1){reference-type="ref" reference="eq:base1"}) which serves as the basis for the test then becomes either \[\hat{\hat{\Sigma}}_X^{-1/2} \hat{\hat{\Sigma}}_Y \hat{\hat{\Sigma}}_X^{-1/2} \text{ or }\hat{\hat{\Sigma}}_X^{-1/2} \hat{\Sigma}_Y \hat{\hat{\Sigma}}_X^{-1/2} \.\label{eq:base2}\] In the particular case where \({\mathbf{X}}\) and \({\mathbf{Y}}\) have independent jointly normal columns vector with constant variance \(P_k=P_X=P_Y\), the distribution of the spectrum of the second of the above matrices is approximately Marcenko-Pastur distributed (see ). This follows because \(\hat{\hat{\Sigma}}_X\) is a finite perturbation. However, because of the non-consistency of the eigenvectors presented in, we may observe **residual spikes** in the spectra, as shown in Figure [\[fig=spike\]](#fig=spike){reference-type="ref" reference="fig=spike"}. Thus, even if the two random matrices are based on the same perturbation, we see some spikes outside the bulk. This observation is worse in the last plot because four spikes fall outside the bulk even if there is actually no difference! This poses a fundamental problem for our test, because we must be able to distinguish the spikes indicative of a true difference from the residual spikes. These remarks lead to the following definition. This paper studies these residual spikes by deriving the distribution of the extreme residual spikes under the null hypothesis. The philosophy is explained in Figure [\[fig=residualzone0\]](#fig=residualzone0){reference-type="ref" reference="fig=residualzone0"} with illustrations inspired by the i.i.d. normal case. All the eigenvalues inside the residual zone are potentially not indicative of real differences. However, when an eigenvalue is larger, we declare that this spike expresses a true difference. Most of our plots feature the seemingly more natural matrix \[\begin{aligned} \hat{\hat{\Sigma}}_X^{-1/2} \hat{\Sigma}_Y \hat{\hat{\Sigma}}_X^{-1/2}\. \end{aligned}\] But, although this choice simplifies the study in terms of convergence in probability when the perturbation is of order \(1\), this is no longer the case in more complex situations. In addition, the eigenvectors associated with the residual spikes are more accessible for the matrix in which all estimates are filtered. Let \(\hat\theta_{X,s}\) and \(\hat\theta_{Y,s}\) be isolated eigenvalues and construct the asymptotic unbiased estimators as in Equation ([\[eq:corrlambda\]](#eq:corrlambda){reference-type="ref" reference="eq:corrlambda"}) \[\begin{aligned} \hat{\hat{\theta}}_{X,s}=1+\frac{1}{\frac{1}{m-k} \sum_{i=k+1}^{m} \frac{\hat{\lambda}_{\hat{\Sigma}_{X},i}}{\hat{\theta}_{X,s}-\hat{\lambda}_{\hat{\Sigma}_{X},i}}} \text{ and } \hat{\hat{\theta}}_{Y,s}=1+\frac{1}{\frac{1}{m-k} \sum_{i=k+}^m \frac{\hat{\lambda}_{\hat{\Sigma}_{Y},i}}{\hat{\theta}_{Y,s}-\hat{\lambda}_{\hat{\Sigma}_{Y},i}}}, \end{aligned}\] where \(\hat{\lambda}_{\hat{\Sigma}_{X},i}\) and \(\hat{\lambda}_{\hat{\Sigma}_{Y},i}\) are the i\(^{th}\) ordered eigenvalue of \(\hat{\Sigma}_{X}\) and \(\hat{\Sigma}_{Y}\), respectively. The test statistic is then \[\begin{aligned} \lambda_{\min}\left(\hat{\hat{\Sigma}}_X^{-1/2} \hat{\hat{\Sigma}}_Y \hat{\hat{\Sigma}}_X^{-1/2} \right) \text{ and } \lambda_{\max}\left(\hat{\hat{\Sigma}}_X^{-1/2} \hat{\hat{\Sigma}}_Y \hat{\hat{\Sigma}}_X^{-1/2} \right)\,, \end{aligned}\] where the filtered matrices are constructed as in ([\[eq:corrSigma\]](#eq:corrSigma){reference-type="ref" reference="eq:corrSigma"}). These two statistics provide a basis for a powerful and robust test for the equality of (detectable) perturbations \(P_X\) and \(P_Y\). ## Null distribution {#sec=test} Under \(H_0\), \(\lambda_{\max}\left(\hat{\hat{\Sigma}}_X^{-1/2} \hat{\hat{\Sigma}}_Y \hat{\hat{\Sigma}}_X^{-1/2} \right)\) is obviously a function of \(\theta_s=\theta_{X,s}=\theta_{Y,s}\) for \(s=1,2...,k\). The suspected **worst case** occurs in the limit as \(\theta_s\to\infty\) for all \(s\) and it is this limit which will determine the critical values of the test. A criterion proposed in allows to check if this scenario is really the worst case. Let \[\begin{aligned} &&\lambda_{\max}\left(\hat{\hat{\Sigma}}_X^{-1/2} \hat{\hat{\Sigma}}_Y \hat{\hat{\Sigma}}_X^{-1/2} \right) \leqslant \lim_{\theta \rightarrow \infty} \lambda_{\max}\left(\hat{\hat{\Sigma}}_X^{-1/2} \hat{\hat{\Sigma}}_Y \hat{\hat{\Sigma}}_X^{-1/2} \right) =V_{\max} ,\\ &&\lambda_{\min}\left(\hat{\hat{\Sigma}}_X^{-1/2} \hat{\hat{\Sigma}}_Y \hat{\hat{\Sigma}}_X^{-1/2} \right) \geqslant \lim_{\theta \rightarrow \infty} \lambda_{\min}\left(\hat{\hat{\Sigma}}_X^{-1/2} \hat{\hat{\Sigma}}_Y \hat{\hat{\Sigma}}_X^{-1/2} \right) =V_{\min}. \end{aligned}\] Because of our focus on the worst case scenario under \(H_0\), we will investigate the asymptotic as \(\theta_i=\theta p_i\) for fixed \(p_i>0\) and \(\frac{\theta}{\sqrt{m}} \rightarrow \infty\). We recall that also allows some finite \(\theta_s\) but it seems intuitive that this scenario will not create a worst case in most situations. This intuition is highlighted by showing by simulation that the residual spike increase as a function of \(\theta\) assuming \(W_X=\frac{1}{n_X}{\mathbf{X}}\X^t\). Our test rejects the null hypothesis of equal populations if either \(\P\left( V_{\max} > \hat{\lambda}_{\max} \right)\) or \(\P\left( V_{\min} < \hat{\lambda}_{\min} \right)\) is small, where \(\hat{\lambda}_{\max}\) and \(\hat{\lambda}_{\min}\) are the observed extreme residual spikes. The following result describes the asymptotic behavior of the extreme eigenvalues and thus of \(V_{\max}\) and \(V_{\min}\). #### Special case {#special-case .unnumbered} If the spectra are Marcenko-Pastur distributed, we define \(c_X=m/n_X\) and \(c_Y=m/n_Y\). Then,\ (Proof Appendix [\[appendixproof\]](#appendixproof){reference-type="ref" reference="appendixproof"}. The red character is not proven and is a sum of two asymptotic uncorrelated marginally normal random variables that are certainly independent.) ## Discussion and simulation {#sec:smallsimulationmainth} The above theorem gives the limiting distribution of \(V_{\max}\) and \(V_{\min}\). In this subsection, we first check the quality of the approximations in Theorem [\[TH=Main\]](#TH=Main){reference-type="ref" reference="TH=Main"}. Then we investigate the worst case with regard to \(\theta\). Finally we relax some assumption on \(\theta_s\) and on the distribution. ### Some simulations Assume \(\mathbf{X} \in \mathbb{R}^{m\times n_X}\) and \(\mathbf{Y} \in \mathbb{R}^{m\times n_Y}\) with \(\mathbf{X}=\left(X_1,X_2...,X_{n_X}\right)\) and \(\mathbf{Y}=\left(Y_1,Y_2...,Y_{n_Y}\right)\). Let \(P_X= {\rm I}_m + (\theta_{X}-1) u_{X} u_{X}^t\) and \(P_Y= {\rm I}_m+ (\theta_{Y}-1) u_{Y} u_{Y}^t\) be two perturbations in \(\mathbb{R}^{m\times m}\). Then, \[\begin{aligned} \mathbf{X}_P=P_X^{1/2} \mathbf{X} \text{ and } \mathbf{Y}_P=P_Y^{1/2} \mathbf{Y},\\ \hat{\Sigma}_X=\frac{\mathbf{X}_P^t \mathbf{X}_P}{n_X} \text{ and } \hat{\Sigma}_Y=\frac{\mathbf{Y}_P^t \mathbf{Y}_P}{n_Y}. \end{aligned}\] We assume a common and large value for \(\theta\) and \(P_X=P_Y\). #### Multiple eigenvalues {#multiple-eigenvalues .unnumbered}  \ Despite the lack of a proof, the maximum residual distribution when the eigenvalues of the perturbations are multiple is well approximated by our Theorem. This can be seen in Table [\[tab:residual\]](#tab:residual){reference-type="ref" reference="tab:residual"} but also in Appendix [\[appendix:Tablecomplete\]](#appendix:Tablecomplete){reference-type="ref" reference="appendix:Tablecomplete"}. #### Different values of \(k\) {#different-values-of-k .unnumbered}  \ Scenario 3, 4 and 5 of Table [\[tab:residual\]](#tab:residual){reference-type="ref" reference="tab:residual"} shows that the result holds for different values of \(k\). The less accurate result of scenario 5 is due to the relatively large \(k\), whereas the theorem is based on an approximation which considers \(k\) to be small compared to \(m\). The precision of the asymptotic approximation would be better for \(k=15\) when \(m=10'000\) with the same \(c_X\) and \(c_Y\), for example. #### Wrong estimation of \(k\) {#wrong-estimation-of-k .unnumbered}  \ Scenario 6, 7 and 8 of Table [\[tab:residual\]](#tab:residual){reference-type="ref" reference="tab:residual"} shows the impact of using wrong values of \(k\). We see in Scenario 6 that a small overestimation of \(k\) leads to a small overestimation of the maximum and small underestimation the minimum. This will lead to conservative tests. Scenario 7 shows that underestimation of \(k\) can lead to a bad approximation but in this scenario we neglect perturbations of size \(500\)! Scenario 8 shows that neglecting two small perturbations of size \(6\) and \(8\), as we could easily do by mistake, still leads to very accurate approximations.\ The simulation of Table [\[tab:residual\]](#tab:residual){reference-type="ref" reference="tab:residual"} are done to convince the reader of the usefulness of Theorem [\[TH=Main\]](#TH=Main){reference-type="ref" reference="TH=Main"}. In practice, we must estimate the parameters needed in the approximation. An arguments based on the Cauchy-interlacing theorem can convinced the reader that we can estimate \[\begin{aligned} M_{X,s}=\frac{1}{m}\sum_{i=1}^m \lambda_{W_X}^s \end{aligned}\] by \[\begin{aligned} \hat{M}_{X,s}=\frac{1}{m-k}\sum_{i=k+1}^m \lambda_{\hat{\Sigma}_X}^s. \end{aligned}\] The impact of using a wrong value for \(k_{est}\) is investigate in Table [\[tab=simulationkestimation\]](#tab=simulationkestimation){reference-type="ref" reference="tab=simulationkestimation"} in Appendix [\[appendix:Simulationkest\]](#appendix:Simulationkest){reference-type="ref" reference="appendix:Simulationkest"}. #### Other simulations {#other-simulations .unnumbered} In appendix [\[appendix:Simulationkest\]](#appendix:Simulationkest){reference-type="ref" reference="appendix:Simulationkest"} we also investigate the approximation with estimated spectra for data with distributions that are not invariant by rotation. In some scenarios the approximation succeeds to estimate the location but failed to correctly estimate the variance. In others, the location of the maximum residual spike is overestimated and the minimum residual spike is underestimated. This would again lead to conservative tests, but suggests a lack of power. # An application In this section, we apply our procedure developed from Theorem [\[TH=Main\]](#TH=Main){reference-type="ref" reference="TH=Main"} to data \({\color{red}{{\mathbf{X}}}}\) and \({\color{red}{{\mathbf{Y}}}}\). First, each step is briefly explained. Then, an analysis is presented on simulated data together with the mathematical work and the important plots.\ This procedure is not unique and other solutions better adapted to the problem could be implemented. For example, the choice of \(k\) and the number of perturbations, could certainly be improved. The goal of this section is to provide a procedure as conservative as possible with reasonably good asymptotic power. 1. First, we center the data with regard to the rows and columns. 2. Then, we need to estimate \(k\) and rescale the variance. These two tasks are interconnected. One intuitive way to choose \(k\) for each matrix (\(k_X\) and \(k_Y\)) consists in looking at the spectra for spikes and keeping in mind that overestimation is preferable to underestimation of the actual value.\ Using \(k=\max(k_X,k_Y)\), we can then rescale the matrices \({\color{red}{{\mathbf{X}}}}\) and \({\color{red}{{\mathbf{Y}}}}\) to create \({\color{blue}{{\mathbf{X}}}}\) and \({\color{blue}{{\mathbf{Y}}}}\). 3. Next, we apply the procedure to \({\color{blue}{{\mathbf{X}}}}\) and \({\color{blue}{{\mathbf{Y}}}}\), using the above \(k\). In our case, this leads to two observed extreme residual spikes. 4. We compute the distribution of the residual spike by assuming \(k\) perturbation and estimating \(M_{s,X}\). 5. Finally, we can compare the extreme values with their distribution under \(\text{H}_0\) for testing purposes. ## Analysis {#sec:simulAnalysis} We observe data \({\color{red}{{\mathbf{X}}}}\in \mathbf{R}^{m \times n_X}\) and \({\color{red}{{\mathbf{Y}}}}\in \mathbf{R}^{m \times n_Y}\) that we suppose is already centred by rows and columns. We choose \(k\) by looking at the histogram of the matrices in Figure [\[Figexample1\]](#Figexample1){reference-type="ref" reference="Figexample1"} where \(m=1000\), \(n_X=2000\) et \(n_Y=500\). We try to overestimate a lower bound on \(k\) based on Figure [\[Figexample1\]](#Figexample1){reference-type="ref" reference="Figexample1"}. The spectrum of \({\color{red}{{\mathbf{X}}}}\) seems to have \(6\) isolated eigenvalues, but we could argue that two other eigenvalues are perturbations. The spectrum \({\color{red}{{\mathbf{Y}}}}\) clearly shows \(5\) isolated eigenvalues and at most \(2\) additional ones. We thus set \(k=8\) knowing that we probably overestimate the true value. Next, we estimate the variances, \[\begin{aligned} \hat{\sigma}_X^2= \frac{1}{m-k}\sum_{i=k+1}^m \lambda_i\left( \frac{1}{n_X}{\color{red}{{\mathbf{X}}}}\rX^t \right),\\ \hat{\sigma}_Y^2= \frac{1}{m-k} \sum_{i=k+1}^m \lambda_i\left( \frac{1}{n_Y}{\color{red}{{\mathbf{Y}}}}\rY^t \right). \end{aligned}\] We can then rescale the matrices \({\color{red}{{\mathbf{X}}}}\) and \({\color{red}{{\mathbf{Y}}}}\) by \(\hat{\sigma}_X\) and \(\hat{\sigma}_Y\), respectively, to create the covariance matrices \[\begin{aligned} \hat{\Sigma}_X=\frac{1}{n_X \hat{\sigma}_X^2} {\color{red}{{\mathbf{X}}}} {\color{red}{{\mathbf{X}}}}^t \text{ and } \hat{\Sigma}_Y=\frac{1}{n_Y \hat{\sigma}_Y^2} {\color{red}{{\mathbf{Y}}}} {\color{red}{{\mathbf{Y}}}}^t. \end{aligned}\] Finally, we filter the matrices as in definition [\[Def=unbiased\]](#Def=unbiased){reference-type="ref" reference="Def=unbiased"}. \[\begin{aligned} &&\hat{\hat{\Sigma}}_X = {\rm I}_m + \sum_{i=1}^k \left(\hat{\hat{\theta}}_{X,i}-1 \right) \hat{u}_{\hat{\Sigma}_X,i}\hat{u}_{\hat{\Sigma}_X,i}^t,\\ &&\hat{\hat{\theta}}_{X,i}= 1+\frac{1}{\frac{1}{m-k} \sum_{j=k+1}^m \frac{\hat{\lambda}_{ \hat{\Sigma}_X,j}}{\hat{\lambda}_{ \hat{\Sigma}_X,i}-\hat{\lambda}_{ \hat{\Sigma}_X,j}}}. \end{aligned}\] The computed residual spikes of \(\hat{\hat{\Sigma}}_X^{-1} \hat{\hat{\Sigma}}_Y\) are shown in Table [1](#Tabexample1){reference-type="ref" reference="Tabexample1"}. Using Figure [\[Figexample2\]](#Figexample2){reference-type="ref" reference="Figexample2"} a, these values are compared to the theoretical distributions of the extreme residual spikes assuming equality of the perturbations of order \(k\). The distribution in blue uses the usual estimator of the spectra and the distribution in orange uses the conservative estimator introduced in Appendix [\[appendix:Spectrumestimation\]](#appendix:Spectrumestimation){reference-type="ref" reference="appendix:Spectrumestimation"}. The moments of the spectra are summarize in Figure [\[Figexample2\]](#Figexample2){reference-type="ref" reference="Figexample2"} b. We finally clearly detect two residual spikes. Figure [\[Figexample3\]](#Figexample3){reference-type="ref" reference="Figexample3"} presents the residual eigenvectors of the residual eigenvalues. We conclude that the differences are in direction \(e_3\) and \(e_4\). As we see in the figure, two other eigenvectors also exhibit a structure. Without our test, we could have concluded that they also represent significant differences, but this residual structure is merely due to the biased estimation of the eigenvectors. ## Conclusion By studying perturbation of order \(1\) in and perturbation of order \(k\) in, we highlighted the lack of power of the usual procedure to detect differences between two groups. This paper extended the residual spike to perturbations of order \(k\) by using tools introduced in previous papers. While this test has weaker power than in , it has the important advantage do be able to deal with multiple equal eigenvalues. Additional simulations investigating the robustness of this new procedure are contained in the thesis and seems promising.
{'timestamp': '2020-07-13T02:08:11', 'yymm': '2005', 'arxiv_id': '2005.14524', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14524'}
# Introduction *A motivating question and our model.* In the idealized experiment shown in Figure [\[fig:idealized experiment\]](#fig:idealized experiment){reference-type="ref" reference="fig:idealized experiment"}, a pulse of inert gas at low pressure is pumped into a long but finite tube, which we refer to as the *channel.* The inner surface of the channel has some degree of roughness due to its molecular structure and surface irregularities. The experimenter is able to measure the rate of gas outflow using some device such as a mass spectrometer, which generates data of the kind represented by the graph on the right-hand side of the figure. From such data, transport characteristics of the gas flow through the channel can be derived, as described in. We assume a sufficiently small pulse, under vacuum conditions, to insure that molecular mean free path is much larger than the diameter of the channel. Thus collisions between the gas molecules can be ignored while gas-surface interaction is expected to influence transport properties most prominently. The property of interest here, which can be indirectly measured from such an experiment, is the Knudsen self-diffusivity coefficient of the gas, as explained, for example, in. The central question we wish to address is: How do the surface characteristics affect the Knudsen self-diffusivity? In this paper, we assume that gas-surface interaction amounts to perfectly elastic, or billiard-like, collisions between point masses (the *gas molecules*, also referred to here as *particles*) and the channel surface, and hence energy exchange between surface and molecules will be ignored. We assume moreover that the channel is two-dimensional and that its surface microstructure is static and periodic, and can be described by a relatively small number of geometric parameters. Thus the mathematical problem we pose here is to determine how the Knudsen self-diffusivity explicitly depends on these parameters. In the large Knudsen number limit (i.e., for large mean free paths), molecular trajectories are independent of each other and the diffusion process is derived from an analysis of individual trajectories of particles undergoing a random flight inside the channel. This random flight is governed by a Markov operator \(P\) that gives, at each particle-surface collision, the post-collision velocity of the particle as a random function of the pre-collision velocity. All the information about the periodic surface geometry relevant to the task of obtaining diffusivity is encoded in \(P\). In fact, diffusivity corresponds to the variance of a one-dimensional Wiener process obtained from the random flight determined by \(P\) via a Central Limit Theorem. (As explained in, this variance can be obtained from the mean exit time in the limit of long channel lengths in the context of the above idealized experiment. The mean exit time, as a function of the channel length, is the only information that needs to be extracted from the exit flow rate data. We won't deal here with this particular aspect of the analysis and assume, in effect, that the channel is infinite in length.) Our main goals are thus centered around two issues. First, we aim to establish a functional, analytic relationship among the aforementioned variance, the spectrum of the Markov operator \(P\), and parameters of the geometric microstructure. Second, we aim to obtain effective numerical methods for finding this dependence for any given geometric microstructure. *Main results.* The main results in the paper are centered around a detailed study of the Markov operator \(P\) and establish analytic and probabilistic properties of \(P\) and its corresponding Markov chain. To begin, we show that for a large class of microstructures, \(P\) has a positive spectral gap, which in turn establishes the ergodicity of the Markov chain as well as the fact that functionals of the Markov chain satisfy the Central Limit Theorem. We have shown in previous work that \(P\) is a self-adjoint, compact or quasi-compact operator on an appropriate Hilbert space, for microstructures whose sides are concave with curvature bounded away from zero. However, the present work establishes a positive spectral gap of \(P\) for a significantly larger class of microstructures. Using a conditioning technique, we show that \(P\) has positive spectral gap when only a certain positive measure portion of the billiard phase space is dispersing. It is now a classical result in the theory of Markov chains that one can obtain an expression of the diffusivity of the Markov chain corresponding to \(P\) in terms of an integral over the spectrum of \(P\). A key insight of the present work is that, for relatively flat microstructures, these quantities, namely the diffusivity and the spectral gap of \(P\), are directly connected with a single summary geometric parameter that can be computed in a straightforward way from a description of the surface microstructure, which we call the surface *flatness parameter* and denote by \(h\). The connection between these three properties of the system is obtained based on a fact which, to the best of our knowledge, has not been noted previously in the context of computing the Knudsen diffusivity. When scattering by \(P\) is relatively weak (in a sense to be made precise), it is natural to approximate the operator \(P\) in the form \(P=I+\mathcal L\), where \(I\) is the identity operator and \(\mathcal L\) may be expected to take the form of a differential (velocity diffusion) operator. We show that \(\mathcal L\) has a universal form: it is a constant (namely, up to a factor of 2, our flatness parameter \(h\)) times the Legendre operator, whose (purely discrete) spectrum is known explicitly. We are able to exploit the approximation of \(P\) by the Legendre operator to give an asymptotic expression and error estimates for the Knudsen diffusivity in terms of \(h\). The conceptual link we obtain between \(h\), the Knudsen diffusivity, and the spectral gap of \(P\) is, in our opinion, a new theoretical insight in a very classical subject, which also yields a very effective method of computation, at least in the case of small values of \(h\). The final concern of this work is to obtain and validate effective numerical methods for computing the Knudsen self-diffusivity in terms of the geometric microstructure parameters, in both the small and large \(h\) case. This will be discussed in detail in Subsections [2.4](#subsec:diff-approx){reference-type="ref" reference="subsec:diff-approx"} and [\[sec:Numerical-techniques-examples\]](#sec:Numerical-techniques-examples){reference-type="ref" reference="sec:Numerical-techniques-examples"} and Sections [\[sec:Diffusivity\]](#sec:Diffusivity){reference-type="ref" reference="sec:Diffusivity"} and [\[sec:Numerical-techniques\]](#sec:Numerical-techniques){reference-type="ref" reference="sec:Numerical-techniques"}. A number of numerical experiments involving different microstructures will also be explored. *Remarks on assumptions.* We make a few remarks about the assumptions in our model. The analysis developed in this paper does not require in an essential way all the assumptions made, but we hope that the greater simplicity of the present set-up will help to make clearer the main points. For example, we have made a deliberate choice to consider periodic profiles of microstructures with relatively few geometric parameters to emphasize the relationship between geometric parameters, the spectrum of the Markov operator, which in turn establishes the relationship between geometric parameters and Knudsen diffusivity. While it's possible to give similar formulas relating Knudsen diffusivity and geometric parameters for, say, randomly chosen profiles, such formulas are straightforward but tedious to express, and we fear would muddle the main point. When studying the Knudsen self-diffusivity, the observable which measures particle flight between collisions in the channel has infinite variance. A study of the Central Limit Theorem and Knudsen diffusivity for a different class of random billiard Markov chains with infinite variance observables has been done previously in. While the methods in the present work can be adapted to the case of infinite variance observables, we have chosen to use a cut-off observable to reduce to the finite variance case for the sake of clarity. Besides clarity, there are a number of physically relevant reasons for considering the cut-off observable we have used in our examples. Namely, (1) the cut-off can arise for macroscopic curvature of the channel in which the test particle traverses. It can also arise due to (2) a finite mean free path resulting from unlikely but non-zero probability particle-particle collisions in the large but finite Knudsen number regime, and (3) real systems where the channel is of finite length and bounded on either end. These physically relevant mechanisms are discussed in detail in. Finally, we should note that in the case of three dimensional cylinders, the inter-collision distance observable is always of finite variance, so our methods in the current paper serve as prototypes for this generalization. The techniques we introduce here are in fact not particular to dimension \(2\). Indeed, a multivariable Legendre operator on the unit disc, whose spectral theory is explicitly known, plays the same role in higher dimensions as the classical Legendre operator does in the present work. The details of this approximation and the corresponding models in higher dimensions---where we consider three-dimensional cylindrical channels, parallel plates, and allow for collisions that induce energy exchange between gas and surface at a given surface temperature---are at the core of future work currently in preparation. *Related work.* Better understanding of rarefied gas transport has practical implications for a number of engineering fields including high altitude gas dynamics, porous media, vacuum technology, nano-and microfluidics, among others. These applications have stimulated much experimental work. The following list of papers is a far from thorough or systematic sample of such work: . The reader interested in the more applied side of the subject should consult these sources and others cited in them. From a purely mathematical perspective, this is a rich source of well motivated and potentially fruitful problems in the general theory of stochastic processes, and, more specifically, in the study of the stochastic dynamics of *random billiard systems*. This is our main motivation for studying the subject. We mention from the mathematical literature the following, also necessarily incomplete, list:. *Organization of the paper.* The rest of this paper is organized as follows. In Section [\[sec:definitions and results\]](#sec:definitions and results){reference-type="ref" reference="sec:definitions and results"} we detail our main results after introducing the necessary definitions; we define what we call the *random billiard Markov chain* model in detail and state some of its basic properties. Among the main results stated in Section [\[sec:definitions and results\]](#sec:definitions and results){reference-type="ref" reference="sec:definitions and results"} (and proved in more general form later in the paper) we have that under certain geometric conditions on the boundary microstructure, the Markov chain has positive spectral gap and is uniformly ergodic. Numerical evidence for this is then given for a few examples. With ergodicity in hand, we discuss the central limit theory of the Markov chain providing explicit expressions for the variance of the limit diffusion in terms of the Markov operator \(P\). The main analytic technique for computing diffusivity, based on a Galerkin method for solving a Markov-Poisson equation and a key observation that \(P\) is closely related to the Legendre differential operator, is also given in this introductory section. This approach for obtaining diffusivity is then compared with other more straightforward methods for a family of microstructures we call the *simple bumps* family. A few more examples of microstructures are explored, having in mind the relation between geometric parameters, diffusivity, and spectral gap. Section [\[sec:Spectral-gap\]](#sec:Spectral-gap){reference-type="ref" reference="sec:Spectral-gap"} is dedicated to stating and proving the analytical results of the paper in their general form, while Section [\[sec:Diffusivity\]](#sec:Diffusivity){reference-type="ref" reference="sec:Diffusivity"} details, and adds further information, to the numerical methods and their validation. # Main definitions and results[\[sec:definitions and results\]]{#sec:definitions and results label="sec:definitions and results"} ## The billiard cell and its transition operator \(P\) The notation \(\mathcal{P}(\Omega)\) will be used below to denote the space of probability measures on a measurable space \(\Omega\). If \(\mu\) is a measure on \(\Omega\) and \(f:\Omega\rightarrow \mathbb{R}\) is \(\mu\)-integrable, we write the integral of \(f\) with respect to \(\mu\) as \[\mu(f):=\int_\Omega f(\omega)\, \mu(d\omega).\] The Hilbert space of square integrable functions with respect to \(\mu\) and its subspace of functions with mean zero will be written \[L^2(\Omega,\mu)=\left\{f: \mu\left(f^2\right)<\infty\right\}, \ L_0^2(\Omega,\mu)=\left\{f\in L^2(\Omega,\mu): \mu(f)=0\right\},\] with inner product \(\langle f,g\rangle_\mu:=\int_\Omega f(\omega)g(\omega)\, \mu(d\omega)\) and norm \(\|f\|_\mu:=\langle f,f\rangle_\mu^{1/2}\). Moreover, we define a norm on the space of square integrable probability measures on \(\Omega\) which are absolutely continuous with respect to \(\mu\) as follows. Let \(\nu\) be such a measure, so that \(f\) is the Radon-Nikodym derivative of \(\nu\) with respect to \(\mu\). Then \(\|\nu\|_\mu := \|f\|_\mu\). The general set-up will be that of a two-dimensional *random billiard* with static, periodic, geometric microstructure, as in. The periodic structure is defined by the choice of a *billiard cell* \(M\), from which the Markov operator \(P\) will be defined. The billiard cell is a subset \(M\) of \(\mathbb{T}\times \mathbb{R}\), where \(\mathbb{T}\) denotes the \(1\)-dimensional torus (equivalently, the interval \((0,\ell)\) with periodic condition imposed at the endpoints, where \(\ell\) will typically be set equal to \(1\).) The boundary of the billiard cell is assumed to be a piecewise smooth curve. For some of the results given below, the boundary will be the graph of a piecewise smooth function \(F:\mathbb{T}\rightarrow \mathbb{R}\), so that \(M\) consists of the points \((r,y)\) such that \(y\geq F(r)\). Choose an arbitrary value \(c\) such that \(c>F(r)\) for all \(r\in \mathbb{T}\). The line \(y=c\) will be called the *reference line*. At any point \((r,c)\) on the reference line we define the half spaces \(\mathbb{H}^2_-\) and \(\mathbb{H}^2_+\) of incoming and outgoing velocities, respectively. Thus \((r, c, v)\in M\times \mathbb{H}^2_-\) represents the initial conditions of an incoming particle trajectory. These conditions uniquely specify (for almost every \(r\) and \(v\)) a billiard trajectory: upon hitting a non-corner point on the cell boundary, the particle reflects specularly without changing speed, and upon crossing a vertical boundary line of \(M\) (more precisely, a line separating two adjacent cells, represented in Figure [\[fig:billiard cell\]](#fig:billiard cell){reference-type="ref" reference="fig:billiard cell"} by the vertical dashed lines) it reenters the other (dashed) line with unchanged velocity. With probability \(1\) on the set of initial conditions (due to Poincaré's recurrence), the trajectory returns to the reference line, at which point we register its outgoing velocity \(V(r,v)\in \mathbb{H}^2_+\) and new position \(r'\). Without risk of confusion we may identify (through reflection about the reference line) \(\mathbb{H}^2_-\) and \(\mathbb{H}^2_+\), denoting both by \(\mathbb{H}^2\). We have thus defined a transformation \((r,v)\mapsto (r',V(r,v))\) (for almost all initial conditions \((r,v)\)) on \(\mathbb{T}\times \mathbb{H}^2\). We call this transformation the *return billiard map*. Note that the vector norms satisfy \(|v|=|V|\) since collisions are elastic. We may, without loss of generality, assume that the particle trajectories have unit speed. The incoming or outgoing *state space*, consisting of initial or return velocities, can then be taken to be the interval \(\mathcal{X}=(0,\pi)\) of angles the particle velocity makes with the reference line. We can (and often will) equivalently define \(\mathcal{X}=(-1,1)\) as the set of values of the cosine of those angles. Given an initial velocity \(x \in \mathcal X\), we will often denote the return velocity by \(X(r,x)\in\mathcal X\) in analogy with the earlier notation of velocities \(v\) and \(V(r,v)\) in \(\mathbb{H}^2\). Let \(\mathcal{P}(\mathcal{X})\) denote the space of probability measures on \(\mathcal{X}\). Given an incoming velocity \(v\), let us suppose that \(r=U\) is a random variable with the uniform distribution over \(\mathbb T\). Thus \(X(U,x)\) becomes a random variable. We now define the Markov (or transition probabilities) operator \(P\) as follows. Let \(f\) be any bounded and continuous function on \(\mathcal{X}\) and define \[\left(Pf\right)(x):=E\left[f(X(U,x))\right] = \int_\mathbb{T} f(X(r,x))\, dr,\] where \(dr\) is the length element of normalized Lebesgue measure on \(\mathbb T\). Equivalently, we define a sequence of random variables \((X_n)_{n\geq 0}\) with a given initial distribution \(\mu \in \mathcal P(\mathcal X)\) as follows. Let \((U_n)_{n\geq0}\) be an independent, identically distributed sequence of random variables uniformly distributed on \(\mathbb T\), and, for each \(n\geq 0\), let \[X_{n+1} := X(U_n, X_n).\] The justification for assuming, at each scattering event, that the point \(r\) of entry over the opening of a billiard cell is random and uniformly distributed is due to our regarding the billiard cell as being very small relative to other length scales; any small uncertainty in the incoming velocity will make \(r\) nearly fully uncertain. See for a more detailed explanation of this point. We can also regard \(P\) as a map from \(\mathcal{P}(\mathcal{X})\) to itself: Given any \(\mu\in\mathcal{P}(\mathcal{X})\), let \(\mu P\in \mathcal{P}(\mathcal{X})\) be such that for any test function \(f\) (bounded and continuous), \[(\mu P)(f) := \mu(Pf).\] The following summarizes the basic properties of \(P\). For their proofs, see. We say that the billiard cell \(M\) is *bilaterally symmetric* (or simply *symmetric*) if it is invariant under reflection through the middle vertical line. When the boundary of the cell is the graph of a function \(F\), this means that \(F(r)=F(\ell-r)\) for all \(r\in (0,\ell)\). Note that when \(\mathcal X = (-1,1)\), it is straightforward to see by a change of variables that the stationary measure \(\pi\) is given by the uniform measure \(\pi(dx) = 1/2\,dx\). If the the billiard cell is not bilaterally symmetric, the adjoint of \(P\) is still closely related to \(P\) as described in and much of the analysis developed in this paper still applies. For simplicity, we do not consider the more general type of cells here. ## Spectral gap and ergodicity[\[sec:Spectral-gap\]]{#sec:Spectral-gap label="sec:Spectral-gap"} Let \((X_n)_{n\geq 0}\) be the Markov chain with transition operator \(P\) and initial distribution \(\mu\). Then the measure \(\mu P^n\) is the law of the \(n\)th step \(X_n\). We are interested in the convergence of \(\mu P^n\) to the stationary measure \(\pi\) in the sense of total variation. Recall that the *total variation* of a measure \(\mu\) is defined as \[\|\mu\|_{v}:= \sup_{A\subset \mathcal{X}} |\mu(A)|.\] The operator \(P\) has *spectral gap* if there exists a constant \(0<\rho<1\) such that \[\left\Vert Pf\right\Vert _{\pi}\leq\rho\left\Vert f\right\Vert _{\pi}\] for all \(f\in L_{0}^{2}(\mathcal{X},\pi)\). The value \(\gamma:=1-\rho\) is called the *spectral gap* of \(P\). It is straightforward to see that for a compact and self-adjoint \(P\), \(\rho\) is given by the largest eigenvalue of \(P\) restricted to \(L_{0}^{2}(\mathcal{X},\pi)\) and \(\gamma>0\). Finally, we note that if \(P\) has spectral gap and is self-adjoint, then for any initial distribution \(\mu\) which is absolutely continuous with respect to \(\pi\), there exists a constant \(M_{\mu}>0\) such that \[\left\Vert \mu P^{n}-\pi\right\Vert _{v}\leq M_{\mu}\rho^{n}.\] See. We will prove geometric ergodicity for a large class of microstructures satisfying certain geometric conditions. The following is a special case of a more general result to be stated and proved in Section [\[sec:Spectral-gap\]](#sec:Spectral-gap){reference-type="ref" reference="sec:Spectral-gap"}. We call the *height of the billiard cell* the supremum of the \(y\) coordinate function restricted to the boundary of the cell. Figure [\[fig:theorem hypothesis\]](#fig:theorem hypothesis){reference-type="ref" reference="fig:theorem hypothesis"} gives an example of billiard cell for which Theorem [\[thm:geo_erg\]](#thm:geo_erg){reference-type="ref" reference="thm:geo_erg"} holds. ## Central Limit and Diffusivity Referring back to Figure [\[fig:idealized experiment\]](#fig:idealized experiment){reference-type="ref" reference="fig:idealized experiment"}, one expects for a sufficiently long channel that the molecular random flight can be approximated by a Wiener process whose variance corresponds to the Knudsen self-diffusivity. This is justified by a Central Limit Theorem (CLT). This diffusivity has a convenient expression when the transition operator \(P\) is self-adjoint. We describe this expression here and prove further details later in the paper. Let \((X_n)_{n\geq 1}\) be, as above, the stationary Markov chain generated by \(P\), with stationary probability measure \(\pi\). Recall that \(X_n\) has values in the space of post-collision velocities \(\mathcal{X}\). This space can be parametrized by the values of the cosine of the angle the velocity vector makes with the horizontal reference line \(y=c\). (See Figure [\[fig:billiard cell\]](#fig:billiard cell){reference-type="ref" reference="fig:billiard cell"}.) Thus we may set \(\mathcal{X}=(-1,1)\). Let \(f:\mathcal{X}\rightarrow \mathbb{R}\) be the observable \[\tilde f(x)= 2 r x\left(1-x^2\right)^{-1/2}\] where \(r\) is the radius of the channel. We suppose, in the context of formulating a CLT for molecular trajectories, that the length of the channel is infinite. Note that \(\tilde f(X_n)\) is the distance travelled by the particle along the channel's horizontal axis between the \(n\)th and the \(n+1\)st collisions with the channel wall. The total horizontal displacement up to the \(n\)th collision is \[S_n(\tilde f)=\sum_{k=0}^{n-1} \tilde f(X_k).\] In its standard form, the CLT gives a limit in distribution for expressions of the form \(S_n(f)/\sqrt{n}\) where \(f\) is an observable having mean zero and finite variance. A simple calculation shows that the horizontal displacement function \(\tilde f\) has mean zero but infinite variance. For this reason we consider instead the following modified, cut-off displacement observable: \[\label{eqn:truncated}f_a(x):= \tilde f(x) \mathbbm{1}_{\{|\tilde f|\leq a\}}(x) + a \mathbbm{1}_{\{|\tilde f|>a\}}(x)\] for large \(a>0\). Here \(\mathbbm{1}_I(x)\) denotes the indicator function of the set \(I\), which is defined as \(\mathbbm{1}(x)=1\) if \(x\in I\) and \(0\) if \(x\notin I\). There are a number of physical mechanisms that could be invoked to make this cut-off plausible. For example, the channel might have a slight curvature along its length, setting an upper bound on the horizontal distance traveled. See for an outline of other mechanisms. We should also note that while the CLT with the usual scaling does not hold for the observable \(\tilde f\), the distribution of \(\tilde f(X_n)\) is still in the domain of attraction of the Gaussian law. One can check that \(\tilde f\) is slowly varying and, as a result, a CLT with nonstandard scaling holds for random billiard Markov chains with sufficient mixing. See for a detailed study of such Markov chains. The program we outline in this paper to estimate the diffusivity should hold in the infinite variance case as well, but we have chosen to focus on the finite variance case for the sake of clarity of exposition. It should also be noted that for cylindrical channels in dimension 3 (and higher), the observable that gives the distance traveled along the axis of the channel is of finite variance. We suppose the microstructure satisfies the same geometric assumptions of Theorem [\[thm:geo_erg\]](#thm:geo_erg){reference-type="ref" reference="thm:geo_erg"}. In particular, \(P\) is self-adjoint and has positive spectral gap. Let \(\Pi\) be the *spectral resolution* of \(P\)---the projection-valued measure on the spectrum \(\sigma(P)\subset [-1,1]\) granted by the Spectral Theorem for bounded self-adjoint operators. Then \[P=\int_{-1}^1 \lambda\, \Pi(d\lambda).\] Let \(f\) be any observable in \(L_0^2(\mathcal{X}, \pi)\) (for example, the truncated displacement function \(f_a\)) and define the measure \(\Pi_f\) supported on \(\sigma(P)\setminus \{1\}\) by \[\Pi_f(d\lambda):=\langle f, \Pi(d\lambda)f\rangle_\pi.\] The following is a special case of a theorem that will be stated and proved in Section [\[sec:Diffusivity\]](#sec:Diffusivity){reference-type="ref" reference="sec:Diffusivity"}. The expression for the diffusivity given above suggests the following approach for computing \(\sigma_{f}^{2}\). Let \(L:=P-I\) be the *Markov Laplacian* and \(g\) the solution to the *Markov-Poisson equation \(Lg=-f\)*. Then the dimensionless Knudsen self-diffusivity coefficient takes the form \[\label{eqn:eta} \eta=\frac{\sigma^2_f}{\sigma_0^2} = 1 +2 \|f\|_\pi^{-2} \left\langle f, Pg\right\rangle_\pi,\] where \(\sigma_0^2=\|f\|_\pi^2\) is the diffusivity for the process with independent post-collision velocities with the identical distribution \(\pi\). In the next subsection we explain one approach to carrying out this program by approximating \(L\) by an elliptic differential operator \(\mathcal{L}\) whose spectral theory is well understood. It turns out that \(\mathcal{L}\) has a canonical form as we show next. ## The Legendre Equation and Diffusion Approximation {#subsec:diff-approx} Our aim now is to show that it is possible to approximate the solution of the Markov-Poisson equation \(Lg=-f\) for a large class of random billiard microstructures when \(P\) is close to the identity operator \(I\). We consider families of microstructures indexed by a scalar quantity \(h\) that, in a sense to be made precise, characterizes a key geometric feature of the microscopic billiard cell, namely its flatness. For each microstructure with parameter \(h\), the corresponding Markov operator \(P_{h}\) defines the dynamics of the random billiard Markov chain as discussed previously. The key idea now is that for small values \(h\), the operator \(P_{h}\) will act nearly like the identity operator, due to the flatness of the geometry; the Markov-Laplace operator \(L_{h}:=P_{h}-I\), in the limit as \(h\to0\) and under some general assumptions on the microscopic billiard cell, will then have a canonical approximation by the classical Legendre differential operator, whose spectral theory is well understood. In the rest of the subsection, we make explicit the necessary assumptions on the geometry and give the statement of our operator approximation result and provide examples. Let the boundary of the billiard cell be the graph of a periodic function \(F:\mathbb{T}\to\mathbb{R}.\) (See Figure [\[fig:billiard cell\]](#fig:billiard cell){reference-type="ref" reference="fig:billiard cell"}.) In order to characterize how flat the microstructure boundary is, we consider the normal vector field \(\mathbbm n:\mathbb{T}\to\mathbb{R}^{2}\) along the graph of \(F\), and let \(\bar{\mathbbm n} = \bar{\mathbbm n}(r)\) denote its projection onto its first (horizontal) component. Finally, we let \[h:=\int_{\mathbb{T}}\bar{\mathbbm n}^{2}\,dr = \int_{\mathbb T}\frac{F'(r)^{2}}{1+F'(r)^{2}}\,dr.\label{eq:flat}\] It will be seen in examples that \(h\) captures information about the curvature of the boundary. For small values of \(h\), the collision events with the boundary will be relatively simple, often resulting in only a single collision with the cell's boundary and only a small deviation from specular reflection. This implies little change in the tangential momentum of the particle with high probability. It is in this sense that \(h\) can be thought to have a role similar to the accommodation coefficient \(\vartheta\) referred to earlier in the paper. Let \(\mathcal X = (-1,1)\) and let \(\mathcal{L}\) denote the differential operator acting on smooth functions \(f:\mathcal{X}\to\mathbb{R}\) as \[\mathcal{L}f(x)=\frac{d}{dx}\left(\left(1-x^{2}\right)\frac{d}{dx}f(x)\right).\label{eq:legendre}\] In the context of Theorem [\[thm:diffusion-app\]](#thm:diffusion-app){reference-type="ref" reference="thm:diffusion-app"} we observe that, for each \(x \in \mathcal X\), every initial condition with velocity \(x\) results in a trajectory that collides only once cell boundary as long as we take \(h\) to be sufficiently small. The differential operator \(\mathcal{L}\) has a well understood spectral theory that will be used to obtain information about \(P_{h}\). We recall that the eigenvalue problem \(\mathcal{L}f=\lambda f\) has square integrable solutions if and only if \(\lambda\) is of the form \(\lambda=-l(l+1)\) for integers \(l\geq0\). The associated eigenfunctions are the Legendre polynomials \(\phi_{l}\), \(l\geq0\), \[\phi_{0}=1,\ \ \phi_{1}(x)=x,\ \ \phi_{2}(x)=(3x^{2}-1)/2, \dots.\] The collection \((\phi_{l})_{l\geq0}\) forms a complete orthogonal basis for \(L^{2}(\mathcal X, \pi)\) and \[\langle\phi_{n},\phi_{m}\rangle_\pi =\int_{\mathcal X}\phi_{n}(x)\phi_{m}(x)\,\pi(dx)=\frac{1}{2n+1}\delta_{n,m},\] where \(\delta_{n,m}\) is the Kronecker delta symbol. As a first application of the approximation given in Theorem [\[thm:diffusion-app\]](#thm:diffusion-app){reference-type="ref" reference="thm:diffusion-app"}, we give an informal estimation of the spectral gap \(\gamma_h\) of \(P_{h}\) for values of \(h\) near 0. Note that the largest eigenvalue of \(P_{h}\) is 1, with eigenfunctions given by the constant functions. So \(\gamma_h\) is given by \(1-\lambda\) where \(\lambda\) is the second largest eigenvalue of \(P_{h}\). Using the approximation in Theorem [\[thm:diffusion-app\]](#thm:diffusion-app){reference-type="ref" reference="thm:diffusion-app"}, \[P_{h}\phi_{l}=\left(1-2hl(l+1)\right)\phi_{l}+O(h^{3/2}),\] where \(\phi_{l}\) is the Legendre polynomial associated to eigenvalue \(-l(l+1)\). This suggests that the second largest eigenvalue \(\lambda\) of \(P_{h}\) is given by \(\lambda\approx1-4h\). Equivalently, this suggests the following asymptotic estimate of \(\gamma_h\): \[\label{eq:gap}\gamma_h\approx 4h.\] The idea then will be to use the approximation \(\mathcal{L}\) of the Markov-Laplacian \(L\) in order to give an approximation of the function \(g=(I-P)^{-1}f\) that appears in the equation \[\sigma_f^2= \left\langle f, f\rangle_\pi + 2\langle f, P(I-P)^{-1}f\right\rangle_\pi\] obtained in Theorem [\[thm:clt\]](#thm:clt){reference-type="ref" reference="thm:clt"}. Note that \(g\) is a solution of the Markov-Poisson equation \(Lg=-f\). The following thorem shows that a series solution of the Poisson equation for \(\mathcal{L}\) can be given explicitly in terms of Legendre polynomials.
{'timestamp': '2021-04-13T02:11:28', 'yymm': '2005', 'arxiv_id': '2005.14318', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14318'}
# Introduction Over past decades, much attentions focus on multitemporal Synthetic Aperture Radar (SAR) image change detection, since a SAR is capable of working in all-time and all-weather without the influence of extremely bad weather and the cloud. In a past decade, most traditional SAR image change detection methods are developed how to extract changed areas from a difference image (DI), which suppose to include the information of changed regions. The DI calculated by the log-ratio (LR) is usually subject to the speckle and it is challenging to extract the accurate and clear information on the changed region. To tackle this issue, sparse learning was recently proposed learning robust features from the noisy DI. Wang et al. analyzed the affects of the SAR image speckle on change detection and proposed a sparse learning-based method for SAR image change detection. Recently, deep neural networks have been successfully employed to computer vision and remote sensing image analysis due to its ability to exploiting essential and robust structural features on categories of objects. It also has been introduced into the field of change detection. Gong et al proposed a deep neural network for SAR image change detection. Gao et al. proposed a simple convolutional neural network, known as PCA-Net, exploring robust features on the changed regions from the noisy DI. However, the performance of these two unsupervised methods are limited without the correct guidance. To tackle this issue, Wang et al. proposed a supervised PCA-Net to improve the performance by carefully collecting typical training samples, which obtains state-of-arts performance of bitemporal SAR image change detection. However, this two-layer convolutional neural network is low efficient, since the convolutional kernels are trained or generated by a Principle Component Analysis (PCA) decomposition. Recently, Li et al. proposed a convolutional neural network (CNN) for SAR image change detection based on both unsupervised and supervised learning. Zhao et al. proposed a bitemporal PolSAR image change detection by a joint classification and a similarity measurement. Currently, it is still an open problem to extract the changed regions from the noisy DI. Nowadays, a large volume of SAR images are acquired by satellites and it is imperative to develop an efficient model that can produce promising results of SAR image interpretation. Most above networks are too heavy and cost much computational burden. It is strongly required to develop a lightweight convolutional neural network. Recently, several lite networks are proposed to improve the inference efficiency. Howard et al. and Sandler et al. proposed two lite networks MobileNetV1 and MobileNetV2 for visual category. Recently, Howard et al. proposed to search for MobileNetV3. Tan et al. proposed an efficient network for visual category. These lite networks have been extensively employed to visual category and the experimental results show that they can achieve comparable performance with heavy networks, but with low latency and network capacity. It can be potentially performed on edge devices with low power. Most recently, Chen et al. proposed a lightweight multiscale spatial pooling network for bitemporal SAR image change detection. Following the idea of the lightweight neural network, in this letter, we focus on the application of lite networks in SAR image change detection. To achieve this, we propose a lite CNN for SAR image change detection. In the proposed network, bottleneck layers are introduced to reduce the number of output channel. Furthermore, the dilated convolutional layers are introduced to enlarge receptive field with a few of non-zero entries in the kernel, which reduces the number of network parameters. We verify the proposed network by comparing other conventional CNN. Compared with the lightweight network in, the proposed network is more robust with the residual and bottleneck structure. Experimental results on four sets of bitemporal SAR image show that our proposed method obtain comparable performance with CNN, while being much more efficient than CNNs. The rest of paper will be organized as follows. We will introduce our proposed method in Section 2. Then the proposed method will be verified on four datasets in Section 3. Finally, we will draw a conclusion in Section 4. # Proposed Method Given bitemporal SAR images \({\bf I}_1\) and \({\bf I}_2\), the DI can be generated as follows \[\label{di} {\bf I}_{DI} = {\bf I}_1 \ominus {\bf I}_2\] where \(\ominus\) denote the difference operator. However, most existing difference operator is subject to the speckle. Then we will propose a lightweight convolutional neural network to exploit the changed regions from the noisy DI. The whole framework of the proposed network can illustrated in Fig.[\[framework\]](#framework){reference-type="ref" reference="framework"}(a). It is shown that the network consists of five groups of bottleneck layers with an 1\(\times\)`<!-- -->`{=html}1 kernels, illustrated by variety of colorful bars, among which the former three ones work as the encoder, and the latter two ones as the decoder. The tensors of all layers are listed in Table [1](#tab:network){reference-type="ref" reference="tab:network"}. In the forward process, the network takes a patch of DI as the input. Firstly, the input data go through a normal convolutional layer and a max-pooling (MP) layer, respectively and then the outputs are concatenated. Next, the contact activations go through the decoder with three groups bottleneck layers. The essential structure of a bottleneck of encoder can be illustrated in Fig.[\[framework\]](#framework){reference-type="ref" reference="framework"}(b). It is shown that a bottleneck layer is constructed by a small residual block, including a maxpooling path and a convolutional path. More specifically, the convolutional path consists of two 1\(\times\)`<!-- -->`{=html}1 convolutions and one main convolution. The main convolution will vary with the various function of the bottleneck. It can be a normal convolution, a dilated convolution or an asymmetrical convolution. The tensors inside the encoding bottleneck are listed in Table [2](#tab:bo_en){reference-type="ref" reference="tab:bo_en"}. The first group consist a down-sampling bottleneck and four normal convolutional bottleneck layers. In the normal bottleneck layers, the main convolution component is default set as the main normal convolutional layer. Especially, in the down-sampling bottleneck, the main convolutional component is set as a normal convolution kernel with 3\(\times\)`<!-- -->`{=html}3 and the 1\(\times\)`<!-- -->`{=html}1 convolution component is replaced by a 2\(\times\)`<!-- -->`{=html}2 one. In the next two groups, to exploit the spatial context, we insert the bottleneck layers with asymmetrical and dilated convolution layers with various kernel sizes among the normal bottleneck, where the kernel sizes are set 2, 4, 8 and 16, respectively, as shown the digits below the green bars. In these bottleneck layers, the main convolutional layers are replaced by the dilated convolutional layers, where the kernels are sparse and most entries are zeros. Furthermore, the bottleneck layers with asymmetric convolution layers are also insert between the dilated and normal convolutional layer, illustrated by the blue bars. After encoding, the sizes of feature maps decrease as the one fourth as the original image. In the decoding part, the context information collected by the encoder will be propagated to the pixel level. To achieve this, inspired by the idea of U-Net, we schedule a upsampling layer and two bottleneck layers. The essential structure of bottleneck for decoder can be illustrated in Fig.[\[framework\]](#framework){reference-type="ref" reference="framework"}(c). Similar to the bottleneck for the encoder, the bottleneck for the decoder contains a pooling path and a convolution path. The former includes a maxpooling layer and a 1\(\times\)`<!-- -->`{=html}1 convolution, while the latter includes two 1\(\times\)`<!-- -->`{=html}1 convolutional layers and a 3\(\times\)`<!-- -->`{=html}3 convolutional layer. Especially, when the bottleneck layer is used for upsampling, the 3\(\times\)`<!-- -->`{=html}3 convolution component, illustrated by the yellow bar, will be replaced by a 3\(\times\)`<!-- -->`{=html}3 transpose convolution. Then the bottleneck will do the 2x upsampling. Trough two groups of decoding bottleneck layers, the feature map will be recover the same size as the input image. The tensors inside the decoding bottleneck are listed in Table [3](#tab:bo_de){reference-type="ref" reference="tab:bo_de"}. Finally, we put a 2\(\times\)`<!-- -->`{=html}2 convolutional layer to get the probability map of two categories. # Experimental Results {#sec:experiment} ## Experiment Datasets In this paper, the proposed method is verified on four sets of bitemporal SAR images. Two scenes (YR-A and YR-B) are from bitemporal Yellow River SAR images acquired by the Radarsat-2 satellite in 2008 and 2009, respectively. Their image sizes are 306 \(\times\) 291 and 400 \(\times\) 350, respectively. Other two are parts of TerraSAR-X images acquired prior to (on Oct. 20, 2010) and after (on May 6, 2011) the Sendai earthquake in Japan. Their sizes (Sendai-A and Sendai-B) are 590 \(\times\)`<!-- -->`{=html}687 and 689 \(\times\) 734, respectively. These four datasets are shown in Fig.[\[fig2\]](#fig2){reference-type="ref" reference="fig2"}). These four datasets are quite challenging, such as the linear-shape changed regions in YR-B dataset and complex scene in both Sendai-A and Sendai-B datasets. ## Implementations We have introduced a lite CNN for change detection for bitemporal SAR images. We first generate the DI by the Eq.([\[di\]](#di){reference-type="ref" reference="di"}) and the difference operator is implemented by the neighborhood-based LR operator. To train the network, we collect a training dataset according to the method in. The numbers of training samples for each dataset are listed in Table [4](#tab:nos){reference-type="ref" reference="tab:nos"}. More specifically, the patchsize of each sample is set as 32 \(\times\) 32 and 8 samples are fed in each training step. Additionally, the network is trained by an end-to-end back-propagation manner and the loss is set as the binary entropy function defined in . The training is optimized by the Adam algorithm in the training stage, where the initial learning rate is set as 0.005. The training is performed on the PyTorch platform built on the Ubuntu 16.04 installed in a PC with a 16 GB DDR memory and an NVIDIA TITAN Xp Graphics Processing Unit of 11 GB memory. The training process will converge at around 15 epochs. We show the variations of loss values and accuracies of training process in Fig.[\[fig:loss\]](#fig:loss){reference-type="ref" reference="fig:loss"}. ## Comparison Experiments To verify the benefits of the proposed method, it is compared with the unsupervised PCA-Net (U-PCA-Net), the supervised PCA-Net (S-PCA-Net) which achieves the state-of-arts performance on SAR image change detection. We also compare the proposed method with the deep neural network (DNN) method and CNN. Among these methods, DNN and U-PCA-Net are unsupervised methods,while S-PCA-Net, CNN and the proposed method are supervised ones. The performance of the compared methods is evaluated by probabilistic Missed Alarm (pMA), probabilistic False Alarm (pFA) and kappa coefficient, where pFA (pMA) are calculated by the ratios between FA (MA) and the number of Non-Changed pixels (NC). ## Experiment Results on Individual Dataset Change Detection In this experiment, for the supervised learning methods, we collect the training samples from an individual dataset, which covers 30% areas of the whole image frame. The rest part is employed for testing. The visual comparison results are shown in Fig.[\[fig3\]](#fig3){reference-type="ref" reference="fig3"}. It is shown that for the YR-A dataset, S-PCA-Net, DNN and Lite CNN get less noisy but more completed changed regions. Lite CNN can get more clear boundary of changed regions than DNN. For the YR-B dataset, Lite CNN can get more completed changed regions, especially the line at the bottom of the image. Other methods can not get the completed changed regions. For the Sendai-A dataset with complex scene, S-PCA-Net and the Lite CNN are less subject to the speckle and the background and get more clear changed regions, while other compared methods are subjected to the speckle and background and they are almost failed. Moreover, compared with S-PCA-Net, Lite CNN get better inner regional consistence. For the Sendai-B dataset, Lite CNN gets more accurate changed regions than other methods. Moreover, we show the quantitative evaluations in Fig.[\[eva\]](#eva){reference-type="ref" reference="eva"}. It is shown in Fig.[\[eva\]](#eva){reference-type="ref" reference="eva"} (a) that the proposed Lite CNN gets a lower pMA on YR-A, Sendai-A and Sendai-B dataset, while the CNN gets a lower pMA on YR-B dataset. It is shown in Fig.[\[eva\]](#eva){reference-type="ref" reference="eva"} (b) that the proposed Lite CNN gets a lower pFA on Sendai-B dataset, while S-PCA-Net gets a lower pFA on YR-A, YR-B and Sendai-A dataset. It is shown in Fig.[\[eva\]](#eva){reference-type="ref" reference="eva"} (c) that on the YR-A dataset, S-PCA-Net gets the best kappa among all the methods, while the Lite CNN gets the comparable kappas with other methods, except S-PCA-Net. On the YR-B dataset, Lite CNN gets the comparable kappas with other methods. However, on both Sendai-A and Sendai-B datasets, the Lite CNN performs better than other methods in terms of pMA and kappas. ## Experiment Results on Cross-dataset Change Detection To further compare the proposed method with other supervised learning methods, S-PCA-Net and CNN, we perform the comparisons on the cross-dataset change detection, where the network trained on several datasets is applied to an unknown testing dataset. More specifically, to achieve this, this experiment is conducted through the leave-one-out manner, i.e. each dataset alternative is selected as the testing dataset and others as training datasets. The visual comparisons are shown in Fig.[\[fig4\]](#fig4){reference-type="ref" reference="fig4"}. It is shown that on the YR-A dataset Lite CNN gets more clear visual result with less noisy spots. On the YR-B dataset, Lite CNN performs better than CNN, but not better than S-PCA-Net. There is many miss alarms in the results of Lite CNN. On both Sendai-A and Sendai-B datasets, Lite CNN gets better results than other two methods. The quantitative evaluations in terms of pFA, pMA and Kappa are shown in Fig.[\[eva2\]](#eva2){reference-type="ref" reference="eva2"}. It is shown in Fig.[\[eva2\]](#eva2){reference-type="ref" reference="eva2"}(a) that the S-PCA-Net gets a lower pMA on all datasets. It is shown in Fig.[\[eva2\]](#eva2){reference-type="ref" reference="eva2"}(b) that the Lite CNN gets a lower pFA on the Sendai-A dataset, while S-PCA-Net gets a lower pFA on the YR-A dataset and CNN gets a lower pFA on the YR-B and Sendai-B dataset. It is shown in Fig.[\[eva2\]](#eva2){reference-type="ref" reference="eva2"}(c) that Lite CNN performs better than CNN but comparable with S-PCA-Net on YR-A and YR-B datasets. However, Lite CNN shows great advantages over other two methods on Sendai-A and Sendai-B datasets. It indicates that the Lite CNN performs better than other two methods in model generalization, especially on challenging datasets with complex scenes. ## Discussion From the above comparisons, it is shown that Lite CNN can obtain comparable performance with other method on the YR-A and YR-B datasets. On the challenging datasets, e.g. Sendai-A and Sendai-B, Lite CNN outperforms other methods. Moreover, it has better ability to model generalization. Moreover, Lite CNN is more computationally efficient than S-PCA-Net and CNN. The training times of three supervised learning methods are compared in Table [5](#time){reference-type="ref" reference="time"}. It is shown that Lite CNN is easy to train and take less time than S-PCA-Net and CNN, while S-PCA-Net takes longer time, since the convolutional kernel is generated by the principle component analysis decomposition. Overall, Lite CNN can obtain comparable or even better performance than S-PCA-Net and CNN. It is also more computationally efficient than other two methods. It is expected that Lite CNN is more practical in change detection, especially for the requirement of real-time detection. # Conclusion {#sec:conlusion} In this paper, we develop a lightweight convolutional neural network for bitemporal SAR image change detection. The proposed network consists of groups of bottlenecks layers which exploit the image feature. To verify the benefits of our proposed method, we compare it with several traditional neural networks and the comparisons are performed on fours sets of bitemporal SAR images. The experimental results show that our proposed method Lite CNN performs better than other two methods on cross-dataset change detection, especially when the scene is complex. Furthermore, Lite CNN is a lightweight network, which is more computationally efficient than CNN and S-PCA-Net. In the future, we will further optimize Lite CNN and make it more efficient on the edge device.
{'timestamp': '2020-06-23T02:16:52', 'yymm': '2005', 'arxiv_id': '2005.14376', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14376'}
# Introduction {#sec:intro} In  Dag Prawitz proposed a natural deduction system for what was later called *Ecumenical logic* (EL), where classical and intuitionistic logic could coexist in peace. In this system, the classical logician and the intuitionistic logician would share the universal quantifier, conjunction, negation, and the constant for the absurd (*the neutral connectives*), but they would each have their own existential quantifier, disjunction, and implication, with different meanings. Prawitz' main idea is that these different meanings are given by a semantical framework that can be accepted by both parties. While proof-theoretical aspects were also considered, his work was more focused on investigating the philosophical significance of the fact that classical logic can be translated into intuitionistic logic. Pursuing the idea of having a better understanding of Ecumenical systems under the proof-theoretical point of view, in  an Ecumenical sequent calculus (\(\LEci\)) was proposed. This enabled not only the proof of some important proof theoretical properties (such as cut-elimination and invertibility of rules), but it also provided a better understanding of the Ecumenical nature of consequence: it is intrinsically intuitionistic, being classical only in the presence of classical succedents. Also in  a Kripke style semantics for EL was provided, and it was shown how worlds in the semantics could be adequately interpreted as nestings in nested sequents. This also enabled the proposal of an Ecumenical multi-succedent sequent system. In this work, we propose an extension of EL with the alethic modalities of *necessity* and *possibility*. There are many choices to be made and many relevant questions to be asked, : what is the ecumenical interpretation of Ecumenical modalities? Should we add classical, intuitionistic, or neutral versions for modal connectives? What is really behind the difference between the classical and intuitionistic notions of truth? We propose an answer for these questions in the light of Simpson's meta-logical interpretation of modalities  by embedding the expected semantical behavior of the modal operator into the Ecumenical first order logic. We start by highlighting the main proof theoretical aspects of \(\LEci\) (Section [2](#sec:LEci){reference-type="ref" reference="sec:LEci"}). This is vital for understanding how the embedding mentioned above will mold the behavior of Ecumenical modalities, since modal connectives are interpreted in first order logics using quantifiers. In Sections [3](#sec:modal){reference-type="ref" reference="sec:modal"} and [4](#sec:emodal){reference-type="ref" reference="sec:emodal"}, we justify our choices by following closely Simpson's script, with the difference that we prove meta-logical soundness and completeness using proof theoretical methods only. We then provide an axiomatic and semantical interpretation of Ecumenical modalities in Sections [5](#sec:ax){reference-type="ref" reference="sec:ax"} and [6](#sec:bi){reference-type="ref" reference="sec:bi"}. This makes it possible to extend the discussion, in Section [7](#sec:extensions){reference-type="ref" reference="sec:extensions"}, to relational systems with the usual restrictions on the relation in the Kripke model. That Section also brings two very interesting observations about intuitionistic \(\K\T\). We end the paper with a discussion about logical Ecumenism in general. # The system \(\LEci\) {#sec:LEci} The language \(\Lscr\) used for Ecumenical systems is described as follows. We will use a subscript \(c\) for the classical meaning and \(i\) for the intuitionistic, dropping such subscripts when formulae/connectives can have either meaning. Classical and intuitionistic n-ary predicate symbols (\(P_{c}, P_{i},\ldots\)) co-exist in \(\Lscr\) but have different meanings. The neutral logical connectives \(\{\bot,\neg,\wedge,\forall\}\) are common for classical and intuitionistic fragments, while \(\{\iimp,\ivee,\iexists\}\) and \(\{\cimp,\cvee,\cexists\}\) are restricted to intuitionistic and classical interpretations, respectively. The sequent system \(\LEci\) was presented in  as the sequent counterpart of Prawitz natural deduction system. The rules of \(\LEci\) are depicted in Fig. [\[Fig:LEci\]](#Fig:LEci){reference-type="ref" reference="Fig:LEci"}. Observe that the rules \(R_c\) and \(L_c\) describe the intended meaning of a classical predicate \(P_{c}\) from an intuitionistic predicate \(P_i\), \(\LEci\) has very interesting proof theoretical properties, together with a Kripke semantical interpretation, that allowed the proposal of a variety of ecumenical proof systems, such as a multi-conclusion and a nested sequent systems, as well as several fragments of such systems . Denoting by \(\vdash_{\mathsf{S}} A\) the fact that the formula \(A\) is a theorem in the proof system \(\mathsf{S}\), the following theorems are easily provable in \(\LEci\): 1. [\[neg\]]{#neg label="neg"} \(\vdash_{\LEci} (A \to_c \bot) \leftrightarrow_i (A \to_i \bot) \leftrightarrow_i (\neg A)\); 2. [\[and\]]{#and label="and"} \(\vdash_{\LEci} (A \vee_c B) \leftrightarrow_i \neg (\neg A \wedge \neg B)\); 3. [\[or\]]{#or label="or"} \(\vdash_{\LEci} (A \to_c B) \leftrightarrow_i \neg (A \wedge \neg B)\); 4. [\[foe1\]]{#foe1 label="foe1"} \(\vdash_{\LEci} (\exists_cx.A) \leftrightarrow_i \neg (\forall x.\neg A)\). Note that ([\[neg\]](#neg){reference-type="ref" reference="neg"}) means that the Ecumenical system defined in Fig. [\[Fig:LEci\]](#Fig:LEci){reference-type="ref" reference="Fig:LEci"} does not distinguish between intuitionistic or classical negations, thus they can be called simply \(\neg A\). We prefer to keep the negation operator in the language since the calculi presented in this work make heavy use of it. Theorems ([\[and\]](#and){reference-type="ref" reference="and"}) to ([\[foe1\]](#foe1){reference-type="ref" reference="foe1"}) are of interest since they relate the classical and the neutral operators: the classical connectives can be defined using negation, conjunction, and the universal quantifier. On the other hand, 5. \(\vdash_{\LEci} (A \to_i B) \to_i (A \to_c B)\) but \(\not\vdash_{\LEci} (A \to_c B) \to_i (A \to_i B)\) in general; 6. \(\vdash_{\LEci} A\vee_c\neg A\) but \(\not\vdash_{\LEci} A\vee_i\neg A\) in general; 7. \(\vdash_{\LEci} (\neg\neg A) \to_c A\) but \(\not\vdash_{\LEci} (\neg\neg A) \to_i A\) in general; 8. [\[mp\]]{#mp label="mp"} \(\vdash_{\LEci} (A\wedge(A \to_i B)) \to_i B\) but \(\not\vdash_{\LEci} (A\wedge(A \to_c B)) \to_i B\) in general; 9. [\[foe2\]]{#foe2 label="foe2"} \(\vdash_{\LEci} \forall x.A \iimp \neg \exists_cx.\neg A\) but \(\not\vdash_{\LEci} \neg\exists_cx.\neg A \to_i \forall x.A\) in general. Observe that ([\[foe1\]](#foe1){reference-type="ref" reference="foe1"}) and ([\[foe2\]](#foe2){reference-type="ref" reference="foe2"}) reveal the asymmetry between definability of quantifiers: while the classical existential can be defined from the universal quantification, the other way around is not true, in general. This is closely related with the fact that, proving \(\forall x.A\) from \(\neg\exists_cx.\neg A\) depends on \(A\) being a classical formula. We will come back to this in Section [3](#sec:modal){reference-type="ref" reference="sec:modal"}. On its turn, the following result states that logical consequence in \(\LEci\) is intrinsically intuitionistic. To preserve the "classical behaviour", , to satisfy all the principles of classical logic  *modus ponens* and the *classical reductio*, it is sufficient that the main operator of the formula be classical (see ). Thus, "hybrid\" formulas, , formulas that contain classical and intuitionistic operators may have a classical behaviour. Formally, For externally classical formulas we can now prove the following theorems 10. \(\vdash_{\LEci} (A \to_c B^{c}) \to_i (A \to_i B^{c})\). 11. \(\vdash_{\LEci} (A\wedge(A \to_c B^{c})) \iimp B^{c}\). 12. \(\vdash_{\LEci} \neg\neg B^c\iimp B^c\). 13. \(\vdash_{\LEci} \neg\exists_cx.\neg B^c \to_i \forall x.B^c\). Moreover, notice that all classical right rules as well as the right rules for the neutral connectives in \(\LEci\) are invertible. Since invertible rules can be applied eagerly when proving a sequent, this entails that classical formulas can be eagerly decomposed. As a consequence, the Ecumenical entailment, when restricted to classical succedents (antecedents having an unrestricted form), is classical. This sums up well, proof theoretically, the *ecumenism* of Prawitz' original proposal. # Ecumenical modalities {#sec:modal} In this section we will propose an ecumenical view for alethic modalities. Since there are a number of choices to be made, we will construct our proposal step-by-step. ## Normal modal logics {#sec:nml} The language of *(propositional, normal) modal formulas* consists of a denumerable set \(\Prop\) of propositional symbols and a set of propositional connectives enhanced with the unary *modal operators* \(\square\) and \(\lozenge\) concerning necessity and possibility, respectively . The semantics of modal logics is often determined by means of *Kripke models*. Here, we will follow the approach in , where a modal logic is characterized by the respective interpretation of the modal model in the meta-theory (called *meta-logical characterization*). Formally, given a variable \(x\), we recall the standard translation \(\tradm{\cdot}{x}\) from modal formulas into first-order formulas with at most one free variable, \(x\), as follows: if \(P\) is atomic, then \(\tradm{P}{x}=P(x)\); \(\tradm{\bot}{x}=\bot\); for any binary connective \(\star\), \(\tradm{A\star B}{x}=\tradm{A}{x}\star \tradm{B}{x}\); for the modal connectives where \(\rel(x,y)\) is a binary predicate. Opening a parenthesis: such a translation has, as underlying justification, the interpretation of alethic modalities in a Kripke model \(\m=(W,R,V)\): \[\label{eq:kripke} \begin{array}{l@{\qquad}c@{\qquad}l} \m, w \models \square A & \mbox{ iff } & \text{for all } v \text{ such that }w \rel v, \m, v \models A.\\ \m, w \models \lozenge A & \mbox{ iff } & \text{there exists } v \text{ such that } w \rel v \text{ and } \m, v\models A. \end{array}\] \(\rel(x,y)\) then represents the *accessibility relation* \(R\) in a Kripke frame. This intuition can be made formal based on the one-to-one correspondence between classical/intuitionistic translations and Kripke modal models . We close this parenthesis by noting that this justification is only motivational, aiming at introducing modalities. Models will be discussed formally in Section [6](#sec:bi){reference-type="ref" reference="sec:bi"}. The object-modal logic OL is then characterized in the first-order meta-logic ML as \[\vdash_{OL} A \quad\mbox{ iff } \quad \vdash_{ML} \forall x. \tradm{A}{x}\] Hence, if ML is classical logic (CL), the former definition characterizes the classical modal logic \(\logick\) , while if it is intuitionistic logic (IL), then it characterizes the intuitionistic modal logic \(\logicik\) . In this work, we will adopt EL as the meta-theory (given by the system \(\LEci\)), hence characterizing what we will defined as the ecumenical modal logic \(\EK\). ## An Ecumenical view of modalities {#sec:view} The language of *Ecumenical modal formulas* consists of a denumerable set \(\Prop\) of (Ecumenical) propositional symbols and the set of Ecumenical connectives enhanced with unary *Ecumenical modal operators*. Unlike for the classical case, there is not a canonical definition of constructive or intuitionistic modal logics. Here we will mostly follow the approach in  for justifying our choices for the Ecumenical interpretation for *possibility* and *necessity*. The ecumenical translation \(\tradme{\cdot}{x}\) from propositional ecumenical formulas into \(\LEci\) is defined in the same way as the modal translation \(\tradm{\cdot}{x}\) in the last section. For the case of modal connectives, observe that, due to Proposition [\[prop:ev\]](#prop:ev){reference-type="ref" reference="prop:ev"}, the interpretation of ecumenical consequence should be essentially *intuitionistic*. With this in mind, the semantical description of \(\square A\) given by [\[eq:kripke\]](#eq:kripke){reference-type="eqref" reference="eq:kripke"} should be understood, for an arbitrary \(v\), as: *assuming that \(wRv\), then \(A\) is satisfied in \(v\)*. Or: This implies that the box modality is a *neutral connective*. The diamond, on the other hand, has two possible interpretations: classical and intuitionistic, since its leading connective is an existential quantifier. Hence we should have the ecumenical modalities: \(\square, \ilozenge, \clozenge\), determined by the translations Observe that, due to the equivalence ([\[foe1\]](#foe1){reference-type="ref" reference="foe1"}), we have 14. \(\clozenge A\iequiv \neg\square\neg A\) On the other hand, \(\square\) and \(\ilozenge\) are not inter-definable due to ([\[foe2\]](#foe2){reference-type="ref" reference="foe2"}). Finally, if \(A^c\) is externally classical, then 15. \(\square A^c\iequiv \neg\clozenge\neg A^c\) This means that, when restricted to the classical fragment, \(\square\) and \(\clozenge\) are duals. This reflects well the ecumenical nature of the defined modalities. We will denote by \(\EK\) the Ecumenical modal logic meta-logically characterized by \(\LEci\) via \(\tradme{\cdot}{x}\). # A labeled system for \(\EK\) {#sec:emodal} One of the advantages of having an Ecumenical framework is that some well known classical/intuitionistic systems arise as fragments . In the following, we will seek for such systems by proposing a labeled sequent system for ecumenical modalities. The basic idea behind labeled proof systems for modal logic is to internalize elements of the associated Kripke semantics (namely, the worlds of a Kripke structure and the accessibility relation between them) into the syntax. *Labeled modal formulas* are either *labeled formulas* of the form \(x:A\) or *relational atoms* of the form \(x \rel y\), where \(x, y\) range over a set of variables and \(A\) is a modal formula. *Labeled sequents* have the form \(\Gamma \vdash x:A\), where \(\Gamma\) is a multiset containing labeled modal formulas. Following , we will prove the following meta-logical soundness and completeness theorem. where one decides to work on the formula \(\forall y.(\rel(x,y)\iimp\tradme{A}{y})=\tradme{\Box A}{x}\) obtaining a premise containing the formula \(\rel(x,y)\iimp\tradme{A}{y}\), with proof \(\pi\). Since \(\iimp L\) is semi-invertible on the right and the left premise is straightforwardly provable, then \(\pi\) can be substituted by the proof: Thus, by inductive hypothesis, \([xRy,y:A,x:\Box A,\Gamma\vdash z:C]\) is provable in \(\labEK\). ◻ The combination of axiom \(\ka\) with axioms \(\ka_1\) to \(\ka_4\) then exactly characterizes intuitionistic modal logic \(\IK\) . In the ecumenical setting, there are many more variants from \(\ka\), depending on the classical or intuitionistic interpretation of the implication and diamond. It is easy to see that the intuitionistic versions of the above axioms are provable in \(\EK\) (see Appendix [\[app\]](#app){reference-type="ref" reference="app"}). Hence, by combining this result with cut-elimination (Appendix [\[sec:cut\]](#sec:cut){reference-type="ref" reference="sec:cut"}), \(\EK\) is *complete* w.r.t. this set of axioms. Observe that, since the intuitionistic operators imply the classical ones, if we substitute \(i\) by \(c\), the resulting clause is either not provable in \(\EK\) or it is a consequence of the intuitionistic versions. Next we will show that \(\EK\) is also sound w.r.t. this set of axioms. For that, we propose an Ecumenical birrelational semantics for \(\EK\). The proof passes through a translation from \(\labEK\) to \(\mathcal L_{\Box\Diamond}\), so we remember that this last labeled system is sound and complete w.r.t. the birelational semantics of \(\IK\) . # Ecumenical birelational models {#sec:bi} In , the negative translation was used to relate cut-elimination theorems for classical and intuitionistic logics. Since part of the argumentation was given semantically, a notion of Kripke semantics for classical logic was stated, via the respective semantics for intuitionistic logic and the double negation interpretation (see also ). In  a similar definition was given, but under the Ecumenical approach, and it was extended to the first-order case in . We will propose a birelational Kripke semantics for Ecumenical modal logic, which is an extension of the proposal in  to modalities. Since, restricted to intuitionistic and neutral connectives, \(\modelse\) is the usual birelational interpretation \(\models\) for \(\IK\) (and, consequently, \(\mathcal L_{\Box\Diamond}\) ), and since the classical connectives are interpreted via the neutral ones using the double-negation translation, an Ecumenical modal Kripke model is nothing else than the standard birelational Kripke model for intuitionistic modal logic \(\IK\). Hence, it is not hard to prove soundness and completeness of the semantical interpretation above w.r.t. the sequent system \(\labEK\). We start by defining a translation from \(\labEK\) to \(\mathcal L_{\Box\Diamond}\). We will abuse the notation and represent the connectives of \(\IK/\mathcal L_{\Box\Diamond}\) using the neutral/intuitionistic correspondents in \(\EK/\labEK\). Since the translations above preserve the double-negation interpretation of classical connectives into intuitionistic (modal) logic, it is possible to prove: Now, observe that every formula in \(\IK\) is a formula in \(\EK\), hence the following theorem holds. Moreover, \(\EK\) is sound and complete w.r.t. the axioms \(\ka-\ka_4\) presented in Section [5](#sec:ax){reference-type="ref" reference="sec:ax"}. # Extensions {#sec:extensions} Depending on the application, several further modal logics can be defined as extensions of \(\K\) by simply restricting the class of frames we consider. Many of the restrictions one can be interested in are definable as formulas of first-order logic, where the binary predicate \(\rel(x,y)\) refers to the corresponding accessibility relation. Table [1](#tab:axioms-FOconditions){reference-type="ref" reference="tab:axioms-FOconditions"} summarizes some of the most common logics, the corresponding frame property, together with the modal axiom capturing it . In the Ecumenical setting, we adopt the motto that "relational predicates are second order citizens" suggested in Section [3.2](#sec:view){reference-type="ref" reference="sec:view"} and interpret the implications in the axioms intuitionisticaly. We will refer to the ecumenical logic satisfying the axioms \(F_1,\ldots, F_n\) as \(\EK F_1\ldots F_n\). We conjecture that the semantics of a given logic \(\EK F_1 \ldots F_n\) can be inferred from the one for \(\EK\) of Definition \(\ref{def:ekripke}\): We just consider Ecumenical models whose accessibility relation satisfies the set of properties \(\{F_1, \ldots, F_n\}\) in place of generic Ecumenical models. ::: Furthermore, following the approaches in , we can transform the axioms in Table [1](#tab:axioms-FOconditions){reference-type="ref" reference="tab:axioms-FOconditions"} into rules. In future work, we would like to investigate how these rules behave w.r.t the ecumenical setting. As a first step in this research direction, we finish this section with two very interesting observations about the case of axiom \(\T\), illustrating the complexity of the interaction of modal axioms and ecumenical connective. First of all, recall  that by itself, \(\square A \iimp A\) does not enforce reflexivity of an intuitionistic model. In fact, in frames having the reflexivity property, both \(\square A \iimp A\) and \(A \iimp \ilozenge A\) are provable. \[\infer[\wedge R]{xRx \vdash x: (\square A\iimp A) \wedge (A\iimp \ilozenge A)} {\infer[\iimp R]{xRx \vdash x:\square A\iimp A}{\infer[\square L]{xRx, x:\square A \vdash x: A}{\infer[\init]{xRx, x: A \vdash x: A}{}}}&\infer[\iimp R]{xRx \vdash x: A \iimp \ilozenge A}{\infer[\ilozenge R]{xRx, x: A \vdash x: \ilozenge A}{\infer[\init]{xRx, x: A \vdash x: A}{}}}}\] For the converse, since \(\square\) and \(\ilozenge\) are not inter-definable, we need to add \(A \iimp \ilozenge A\) in order to still be complete w.r.t. reflexive models. Finally, it is well known that the set intuitionistic propositional operators is "independent", , that each operator cannot be defined in terms of the others (Prawitz proposed a syntactical proof of this result in ). It is also known that in the case of (many) constructive modal logics the modal operators \(\Box\) and \(\lozenge\) are independent of each other, as it is the case in \(\EK\). But what would be the consequence of adding \(\neg\ilozenge\neg A\iimp \Box A\) as an extra axiom to \(\EK\)? The following derivation shows that the addition of this new axiom has a disastrous propositional consequence. \[\small \infer[\cut]{\vdash x:(A\ivee\neg A)} {\infer[eq]{\vdash x:\Box (A\ivee\neg A)} {\infer[\neg R]{\vdash x:\neg\ilozenge\neg (A\ivee\neg A)} {\infer[\ilozenge L]{x:\ilozenge\neg (A\ivee\neg A)\vdash x:\bot} {\infer=[\neg L,\ivee R2,\neg R]{xRy,y:\neg (A\ivee\neg A)\vdash x:\bot} {\infer[\neg L,\ivee R1]{xRy,y:A, y:\neg (A\ivee\neg A)\vdash y:\bot} {\infer[\init]{xRy,y:A, y:\neg (A\ivee\neg A)\vdash y:A}{}}}}}}& \infer[\T]{x:\Box (A\ivee\neg A)\vdash x:(A\ivee\neg A)} {\infer[\Box L]{xRx,x:\Box (A\ivee\neg A)\vdash x:(A\ivee\neg A)} {\infer[\init]{xRx,x: (A\ivee\neg A)\vdash x:(A\ivee\neg A)}{}}}}\] where \(eq\) represents the proof steps of the substitution of a boxed formula for its diamond version.[^1] That is, if \(\Box\) and \(\lozenge_i\) are inter-definable, then \(A\vee_i\neg A\) is a theorem and intuitionistic \(\K\T\) collapses to a classical system! # Discussion and conclusion {#sec:conc} Some questions naturally arise with respect to Ecumenical systems: what (really) are Ecumenical systems? What are they good for? Why should anyone be interested in Ecumenical systems? What is the real motivation behind the definition and development of Ecumenical systems? Based on the specific case of the Ecumenical system that puts classical logic and intuitionist logic coexisting in peace in the same codification, we would like to propose three possible motivations for the definition, study and development of Ecumenical systems. #### Philosophical motivation This was the motivation of Prawitz. Inferentialism, and in particular, logical inferentialism, is the semantical approach according to which the meaning of the logical constants can be specified by the rules that determine their correct use. According to Prawitz , > *"Gentzen's introduction rules, taken as meaning constitutive of the logical constants of the language of predicate logic, agree, as is well known, with how intuitionistic mathematicians use the constants. On the one hand, the elimination rules stated by Gentzen become all justified when the constants are so understood because of there being reductions, originally introduced in the process of normalizing natural deductions, which applied to proofs terminating with an application of elimination rules give canonical proofs of the conclusion in question. On the other hand, no canonical proof of an arbitrarily chosen instance of the law of the excluded middle is known, nor any reduction that applied to a proof terminating with an application of the classical form of reductio ad absurdum gives a canonical proof of the conclusion."* But what about the use classical mathematicians make of the logical constants? Again, according to Prawitz, > *"What is then to be said about the negative thesis that no coherent meaning can be attached on the classical use of the logical constants? Gentzen's introduction rules are of course accepted also in classical reasoning, but some of them cannot be seen as introduction rules, that is they cannot serve as explanations of meaning. The classical understanding of disjunction is not such that \(A\vee B\) may be rightly asserted only if it is possible to prove either A or B, and hence Gentzen's introduction rule for disjunction does not determine the meaning of classical disjunction."* As an alternative, in a recent paper  Murzi presents a different approach to the extension of inferentialism to classical logic. There are some natural (proof-theoretical) inferentialist requirements on admissible logical rules, such as harmony and separability (although harmonic, Prawitz' rules for the classical operators do not satisfy separability). According to Murzi, our usual logical practice does not seem to allow for an inferentialist account of classical logic (unlike what happens with respect to intuitionistic logic). Murzi proposes a new set of rules for classical logical operators based on: absurdity as a punctuation mark, and Higher-level rules . This allows for a "pure" logical system, where negation is not used in premises. #### Mathematical/computational motivation (This was actually the original motivation for proposing Ecumenical systems.) The first Ecumenical system (as far as we know) was defined by Krauss in a technical report of the University of Kassel  (the text was never published in a journal). The paper is divided in two parts: in the first part, Krauss' Ecumenical system is defined and some properties proved. In the second part, some theorems of basic algebraic number theory are revised in the light of this (Ecumenical) system, where constructive proofs of some "familiar classical proofs" are given (like the proof of Dirichlet's Unit Theorem). The same motivation can be found in the final passages of the paper , where Dowek examines what would happen in the case of axiomatizations of mathematics. Dowek gives a simple example from Set Theory, and ends the paper with this very interesting remark: > *"Which mathematical results have a classical formulation that can be proved from the axioms of constructive set theory or constructive type theory and which require a classical formulation of these axioms and a classical notion of entailment remains to be investigated."* #### Logical motivation In a certain sense, the logical motivation naturally combines certain aspects of the philosophical motivation with certain aspects of the mathematical motivation. According to Prawitz, one can consider the so-called classical first order logic as *"an attempted codification of a fragment of inferences occurring in \[our\] actual deductive practice"*. Given that there exist different and even divergent attempts to codify our (informal) deductive practice, it is more than natural to ask about what relations are entertained between these codifications. Ecumenical systems may help us to have a better understanding of the relation between classical logic and intuitionistic logic. But one could say that, from a logical point of view, there's nothing new in the ecumenical proposal: Based on translations, the new classical operators could be easily introduced by "explicit definitions". Let us consider the following dialogue between a classical logician (CL) and an intuitionistic logician (IL), a dialogue that may arise as a consequence of the translations mentioned above: - IL: if what you mean by \((A \vee B)\) is \(\neg (\neg A \wedge \neg B)\), then I can accept the validity of \((A \vee \neg A)\)! - CL: but I do not mean \(\neg (\neg A \wedge \neg \neg A)\) by \((A \vee \neg A)\). One must distinguish the excluded-middle from the the principle of non-contradiction. When I say that Goldbach's conjecture is either true or false, I am not saying that it would be contradictory to assert that it is not true and that it is not the case that it is not true! - IL: but you must realize that, at the end of the day, you just have one logical operator, the Sheffer stroke (or the Quine's dagger). - CL: But this is not at all true! The fact that we can define one operator in terms of other operators does not imply that we don't have different operators! We do have 16 binary propositional operators (functions). It is also true that we can prove \(\vdash (A \vee_{c} B) \leftrightarrow \neg(\neg A \wedge \neg B)\) in the ecumenical system, but this doest not mean that we don't have three different operators, \(\neg\), \(\vee_{c}\) and \(\wedge\). Maybe we can resume the logical motivation in the following (very simple) sentence: > Ecumenical systems constitute a new and promising instrument to study the nature of different (maybe divergent!) logics. Now, what can we say about *modal* Ecumenical systems? Regarding the **philosophical view**, in  we have used invertibility results in order to obtain a sequent system for Prawitz' Ecumenical logic with a minimal occurrences of negations, moving then towards a "purer" Ecumenical system. Nevertheless, negation still plays an important rôle on interpreting classical connectives. This is transferred to our definition of Ecumenical modalities, where the classical possibility is interpreted using negation. We plan to investigate what would be the meaning of classical possibility without impure rules. For the **mathematical view**, our use of intuitionistic/classical/neutral connectives allows for a more chirurgical detection of the parts of a mathematical proof that are intrinsically intuitionistic, classical or independent. We now bring this discussion to modalities. Finally, concerning the **logical view**, it would be interesting to explore some relations between general results on translations and Ecumenical systems, expanding this discussion to modalities. To finish, we would like to say a word about our choices. It seems to be a common view, in the proof theory community, that Simpson's view is the more reasonable approach for modalities and intuitionism. From that, the choice of a labeled proof system for \(\EK\) seems only natural. But labeled systems have a very unfortunate feature: it is really tricky to define an interpretation of sequents into the logical language. This problem often disappears when moving to nested-like systems , since the nestings keep the tree-structure information, matching exactly the history of a backwards proof search in an ordinary sequent calculus. Also, having an Ecumenical nested system would most probably allow for a comparison, in one system, between the nested sequent for \(\IK\)  and for \(\CK\) . Hence this is a path worth pursuing, together with the comparison of \(\labEK\) with other labelled sequent systems for intuitionistic modal logics, specially the recent ones proposed in  and . [^1]: We have presented a proof with \(\cut\) for clarity, remember that \(\labEK\) has the cut-elimination property (see Appendix [\[sec:cut\]](#sec:cut){reference-type="ref" reference="sec:cut"}).
{'timestamp': '2020-06-01T02:04:11', 'yymm': '2005', 'arxiv_id': '2005.14325', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14325'}
# Introduction In this paper, we study a priori interior Hessian estimates in all dimensions for the Lagrangian mean curvature equation \[F(D^{2}u)=\sum _{i=1}^{n}\arctan \lambda_{i}=\psi(x) \label{s}\] under the assumption that \(|\psi|\geq (n-2)\frac{\pi}{2}+\delta\) where \(\delta>0\), and \(\psi\) has bounded second derivatives. Here \(\lambda_i\)'s are the eigenvalues of the Hessian matrix \(D^2u\) and then the phase \(\psi\) becomes a potential for the mean curvature of the Lagrangian submanifold \((x,Du(x))\subseteq \mathbb{R}^n\times\mathbb{R}^n\). When the phase \(\psi\) is constant, denoted by \(c\), \(u\) solves the special Lagrangian equation \[\sum _{i=1}^{n}\arctan \lambda_{i}=c \label{s1}\] or equivalently, \[\cos c \sum_{1\leq 2k+1\leq n} (-1)^k\sigma_{2k+1}-\sin c \sum_{0\leq 2k\leq n} (-1)^k\sigma_{2k}=0.\] Equation ([\[s1\]](#s1){reference-type="ref" reference="s1"}) originates in the special Lagrangian geometry by Harvey-Lawson. The Lagrangian graph \((x,Du(x)) \subset \mathbb{R}^n\times\mathbb{R}^n\) is called special when the argument of the complex number \((1+i\lambda_1)...(1+i\lambda_n)\) or the phase \(\psi\) is constant, and it is special if and only if \((x,Du(x))\) is a (volume minimizing) minimal surface in \((\mathbb{R}^n\times\mathbb{R}^n,dx^2+dy^2)\) A dual form of ([\[s1\]](#s1){reference-type="ref" reference="s1"}) is the Monge-Ampére equation \[\sum_{i=1}^n \ln\lambda_i=c.\] This is the potential equation for special Lagrangian submanifolds in \((\mathbb {R}^n\times \mathbb {R}^n, dxdy)\) as interpreted in. The gradient graph \((x,Du(x))\) is volume maximizing in this pseudo-Euclidean space as shown by Warren. In the 1980s, Mealy showed that an equivalent algebraic form of the above equation is the potential equation for his volume maximizing special Lagrangian submanifolds in \((\mathbb R^n\times \mathbb R^n, dx^2-dy^2)\). The arctangent operator or the logarithmic operator is concave if \(u\) is convex, or if the Hessian of \(u\) has a lower bound \(\lambda\geq 0\). Certain concavity properties of the arctangent operator are still preserved for saddle \(u\). The concavity of the arctangent operator in ([\[s\]](#s){reference-type="ref" reference="s"}) depends on the range of the Lagrangian phase. The phase \((n-2)\frac{\pi}{2}\) is called critical because the level set \(\{ \lambda \in \mathbb{R}^n \vert \lambda\) satisfying \((\ref{s})\}\) is convex only when \(|\psi|\geq (n-2)\frac{\pi}{2}\). The concavity of the level set is evident for \(|\psi|\geq (n-1)\frac{\pi}{2}\) since that implies \(\lambda>0\) and then \(F\) is concave. For solutions of ([\[s1\]](#s1){reference-type="ref" reference="s1"}) with critical and supercritical phases \(|\psi|\geq (n-2)\frac{\pi}{2}\), Hessian estimates have been obtained by Warren-Yuan and Wang-Yuan. If the phase is subcritical \(|\psi|<(n-2)\frac{\pi}{2}\), solutions of ([\[s1\]](#s1){reference-type="ref" reference="s1"}) fail to have interior estimates as shown in examples of Nadirashvili-Vlăduţ and Wang-Yuan. Our main results in this paper are the following: In order to link the dependence of Hessian estimates to the potential \(u\) itself, we have the following gradient estimate. For the two dimensional case, Heinz derived a Hessian bound for solutions of the Monge-Ampère type equation including ([\[s1\]](#s1){reference-type="ref" reference="s1"}); Pogorelov derived Hessian estimates for solutions of these equations including ([\[s1\]](#s1){reference-type="ref" reference="s1"}) with \(|\psi|\geq\frac{\pi}{2}\). Later Pogorelov constructed his famous counterexamples for the three dimensional Monge-Ampère equation \(\sigma_3(D^2u) = \det(D^2u) = 1\), which also serve as counterexamples for cubic and higher order symmetric \(\sigma_k\) equations (see ). Gregori extended Heinz's estimate to a gradient bound in terms of the heights of the two dimensional minimal surfaces, and for graphs with non-zero mean curvature an additional requirement on the length of the mean curvature vector was assumed. Hessian estimates for solutions to Monge-Ampère equations and the \(\sigma_k\) equations for \(k\geq 2\) were established by Pogorelov and Chou-Wang under certain strict convexity constraints. For the three dimensional case, Trudinger, Urbas, and Bao-Chen obtained pointwise Hessian estimates in terms of certain integrals of the Hessian, for \(\sigma_k\) equations and the special Lagrangian equation ([\[s1\]](#s1){reference-type="ref" reference="s1"}) with \(c=\pi\) respectively. Bao-Chen-Guan-Ji obtained pointwise Hessian estimates for strictly convex solutions to quotient equations \(\sigma_n=\sigma_k\) in terms of certain integrals of the Hessian. Recently, along the integral way, Qiu proved Hessian estimates for solutions of the three dimensional quadratic Hessian equation with a \(C^{1,1}\) variable right hand side. Hessian estimates for convex solutions of general quadratic Hessian equations were obtained via a new pointwise approach by Guan-Qiu. For convex viscosity solutions of ([\[s1\]](#s1){reference-type="ref" reference="s1"}) Hessian estimates have been obtained by Chen-Warren-Yuan and Chen-Shankar-Yuan. Hessian estimates for semiconvex smooth solutions and almost convex viscosity solutions of \(\sigma_2(D^2u)=1\) were recently established by Shankar-Yuan in and respectively. Our proof of the Hessian estimates goes as follows: we first bound the Hessian of \(u\) by its integral followed by an integral of its gradient, then by the volume of the Lagrangian graph, and lastly, by the height of the Lagrangian graph, which is the gradient of the solution of ([\[s\]](#s){reference-type="ref" reference="s"}). The presence of \(\psi(x)\) in the non-uniformly elliptic equation [\[s\]](#s){reference-type="eqref" reference="s"} presents unique challenges. One of the difficulties is the unavailability of harmonic co-ordinates \(\Delta_g x=0\) since the Lagrangian graph \((x,Du(x))\subset \mathbb{R}^n\times\mathbb{R}^n\) is not a minimal surface. As a result, the linearized operator of ([\[s\]](#s){reference-type="ref" reference="s"}) at \(u\) does not represent the Laplace-Beltrami operator, like in the constant phase case. Another hurdle is proving Jacobi inequalities, which require differentiating [\[s\]](#s){reference-type="eqref" reference="s"} twice. In the homogeneous case, one can differentiate [\[s1\]](#s1){reference-type="eqref" reference="s1"} and recover \(D^3u\), but upon differentiating [\[s\]](#s){reference-type="eqref" reference="s"}, we end up with terms involving derivatives of \(\psi\), which, a priori, could be large compared to the coefficients \(DF(\lambda)\) of \(D^3u\). We prove a Jacobi type inequality for \(b=\ln\sqrt{1+\lambda_{\max}^2}\) where its Hessian is bounded below by its gradient and the \(C^{1,1}\) norm of \(\psi\). Applying a mean value inequality for \(b\) and certain Sobolev inequalities we estimate the integral of \(b\) by a weighted volume of the non-minimal Lagrangian graph. By a conformality identity, the weighted volume element turns out to be a linear combination of the elementary symmetric functions of \(D^2u\). The linear combination poses yet another difficulty but we take advantage of the divergence type structure to bound the weighted volume of the Lagrangian graph in terms of its height and the \(C^{1,1}\) norm of \(\psi\). Through out this paper we assume \(\psi\geq (n-2)\frac{\pi}{2}+\delta\) since by symmetry \(\psi\leq-(n-2)\frac{\pi}{2}-\delta\) can be treated similarly. This paper is divided into the following sections: in section two, we introduce some notations and state some well known trigonometric inequalities satisfied by solutions of ([\[s\]](#s){reference-type="ref" reference="s"}), which will be used later in the proofs. In section three, we establish the gradient estimates, thereby proving Theorem [\[main2\]](#main2){reference-type="ref" reference="main2"}. In section four, we prove the pointwise and integral Jacobi inequality. In section five, we prove a mean value inequality for functions satisfying a Jacobi type inequality on submanifolds with high co-dimension, followed by the proof of Theorem [\[main1\]](#main1){reference-type="ref" reference="main1"}.\ # Preliminaries ## Notations We introduce some notations that will be used in this paper. The induced Riemannian metric on the Lagrangian submanifold \(X=(x,Du(x))\subset \mathbb{R}^n\times\mathbb{R}^n\) is given by \[g=I_n+(D^2u)^2.\] We denote \[\begin{aligned} \partial_i=\frac{\partial}{\partial_{x_i}}\\ \partial_{ij}=\frac{\partial^2}{\partial_{x_i}\partial_{x_j}}\\ u_i=\partial_iu\\ u_{ij}=\partial_{ij}u. \end{aligned}\] Note that for the functions defined below, the subscripts on the left do not represent partial derivatives\[\begin{aligned} b_k=(\ln\sqrt{1+\lambda_1^2}+...+\ln\sqrt{1+\lambda_k^2})/k\\ h_{ijk}=\sqrt{g^{ii}}\sqrt{g^{jj}}\sqrt{g^{kk}}u_{ijk}\\ g^{ii}=\frac{1}{1+\lambda_i^2}. \end{aligned}\] Here \((g^{ij})\) is the inverse of the matrix \(g\) and \(h_{ijk}\) denotes the second fundamental form when the Hessian of \(u\) is diagonalized. The volume form, gradient, and inner product with respect to the metric \(g\) are given by \[\begin{aligned} dv_g=\sqrt{\det g}dx\\ \nabla_g v=g^{ij}v_iX_j\\ \langle\nabla_gv,\nabla_g w\rangle_g =g^{ij}v_iw_j\\ |\nabla_gv|^2=\langle\nabla_gv,\nabla_g v\rangle_g. \end{aligned}\] ## Laplace-Beltrami operator and mean curvature formula Taking variations of the energy functional \(\int |\nabla_g v|^2 dv_g\) with respect to \(v\), one has the Laplace-Beltrami operator of the metric \(g\): \[\begin{aligned} \Delta_g =\frac{1}{\sqrt{ g}}\partial_i(\sqrt{ g}g^{ij}\partial_j ) =g^{ij}\partial_{ij}+\frac{1}{\sqrt{g}}\partial_i(\sqrt{g}g^{ij})\partial_j \label{2!}\\ =g^{ij}\partial_{ij}-g^{jp}\psi_q u_{pq} \partial_j. \nonumber \end{aligned}\] The last equation follows from the following intrinsic and then extrinsic computations: \[\begin{aligned} \frac{1}{\sqrt{g}}\partial_i(\sqrt{g}g^{ij})=\frac{1}{\sqrt{g}}\partial_i(\sqrt{g})g^{ij}+\partial_ig^{ij}=\frac{1}{2}(\partial_i \ln g)g^{ij}+\partial_kg^{kj}\nonumber\\ =\frac{1}{2}g^{kl}\partial_i g_{kl}g^{ij}-g^{kl}\partial_k g_{lb}g^{bj}\nonumber\\ =-g^{jp}g^{ab}u_{abq}u_{pq} =-g^{jp}\psi_q u_{pq}\label{lolz} \end{aligned}\] where the last equation follows from ([\[111\]](#111){reference-type="ref" reference="111"}) and ([\[linearize\]](#linearize){reference-type="ref" reference="linearize"}) below. The first derivative of the metric \(g\) is given by \[\begin{aligned} \partial_i g_{ab}=\partial_i(\delta_{ab}+u_{ak}u_{kb})=u_{aik}u_{kb}+u_{bik}u_{ka}\overset{\text{at } x_0}{=}u_{abi}(\lambda_a+\lambda_b) \label{111} \end{aligned}\] assuming the Hessian of \(u\) is diagonalized at \(x_0\). On taking the gradient of both sides of the Lagrangian mean curvature equation ([\[s\]](#s){reference-type="ref" reference="s"}), we get \[\sum_{a,b=1}^{n}g^{ab}u_{jab}=\psi_j.\label{linearize}\] The coefficients, given by ([\[lolz\]](#lolz){reference-type="ref" reference="lolz"}), are in fact equal to the tangential part of the following decomposition of \(X_{ij}\) where \(X=(x,Du(x))\) \[\begin{aligned} X_{ij}=(X_{ij})^T+(X_{ij})^N=\langle X_{ij},X_a\rangle g^{ab}X_b+II_{ij}\\ =u_{ijk}u_{ka}g^{ab}X_b+II_{ij}\overset{\text{define }}=\Gamma^b_{ij}X_b+II_{ij} \end{aligned}\] where \(\Gamma_{ij}^b\) is the Christoffel symbol. On taking trace with respect to the metric \(g\) and projecting to the tangential direction \(X_l=(\partial_l, Du_l)\), we get \[g^{ab}\Gamma^m_{ab}=g^{ab}u_{kab}u_{kl}g^{lm}=\psi_k u_{kl}g^{lm},\] which is the coefficient derived in ([\[lolz\]](#lolz){reference-type="ref" reference="lolz"}). In turn, the normal part is \[\vec{H}=g^{ab}II_{ab}=g^{ab}(\partial_{ab}X-\Gamma^m_{ab}\partial_m X)=\Delta_g X.\] On the other hand, directly projecting to the normal direction \(J X_l\), we get the mean curvature vector of the Lagrangian submanifold \((x,Du(x))\) \[\vec{H}=g^{ab}\langle(-Du_{ab},0),-X_l\rangle g^{lm}JX_m=g^{ab}u_{lab}g^{lm}JX_m=\psi_l g^{lm}JX_m=J\nabla_g \psi \label{mean}\] where \(\nabla_g\) is the gradient operator for the metric \(g\) and \(J\) is the complex structure, or the \(\frac{\pi}{2}\) rotation matrix in \(\mathbb{R}^n\times \mathbb{R}^n\) and we used ([\[linearize\]](#linearize){reference-type="ref" reference="linearize"}) for the second last equation. Note that the above formula for mean curvature of the Lagrangian submanifold \((x,Du(x))\) was originally found in. Next we state the following Lemma. # Gradient Estimates We prove Theorem [\[main2\]](#main2){reference-type="ref" reference="main2"}. # The Jacobi inequality In this section we prove the Jacobi inequality and the integral Jacobi inequality, which is essential in proving the Hessian estimates. ## The integral Jacobi inequality In order to prove Hessian estimates we will need the following integral form of the Jacobi inequality ([\[J\]](#J){reference-type="ref" reference="J"}). # Hessian Estimates ## Mean Value Inequality In, Michael-Simon established the mean value inequality for a non-negative subharmonic function on a \(m\)-dimensional submanifold \(M\) of \(\mathbb{R}^n\). In order to prove the Hessian estimates, having the following mean value inequality for a variable Lagrangian phase is crucial. For completeness, we include a proof here. Let \(\gamma\) be a real valued function defined by \[\gamma(s)=\int_s^{\infty}t\phi(y-t)dt.\] Then \(\gamma(s)=0\) when \(s\geq y\). Note that \(\gamma(|x-x_0|)\) is in \(C^2(U)\) and vanishes outside a compact subset of \(U\) if \(y<1\). So for \(y<1\) we can use \(\gamma(r)\) as a test function. Next we observe that \[\begin{aligned} \Delta_g \gamma(r)=-\left[\phi(y-r)\sum_{i=1}^{n}\tilde{g}^{ii}-r\phi'(y-r)\sum_{i,j=1}^{n}\tilde{g}^{ij}(\frac{x_i-(x_0)_i}{r})(\frac{x_j-(x_0)_j}{r}) \right]-\\ \phi(y-r)\sum_{i=1}^{n}(x_i-(x_0)_i)H_i \end{aligned}\] where \(H_i\)'s denote the components of the mean curvature vector. So then by our assumption \(\Delta_{g}f\geq-\beta f\) and ([\[gec\]](#gec){reference-type="ref" reference="gec"}) we have \[\begin{aligned} mg_0(y)-\int_M fr\phi'(y-r)dv_g(x)\leq \int_M f|H|r\phi(y-r)dv_g+\int_M \beta f\gamma(r)dv_g\\ \implies mg_0(y)-\int_M fr\phi'(y-r)dv_g(x)\leq \int_M f|H|r\phi(y-r)dv_g+\int_M \beta f y\phi(y-r) dv_g. \end{aligned}\] In the last inequality we used \(\gamma(r)\leq \int _{r}^1 t\phi(y-t)dt\leq y\phi(y-r)\) since we need \(t\leq y\) for the function to be non-zero. This gives us \[mg_0(y)-\int_M fr\phi'(y-r)dv_g(x)\leq \int_M f|H|r\phi(y-r)dv_g+\int_M \beta f y\phi(y-r) dv_g. \label{imp1}\] Using the inequality \(r\phi'(y-r)\leq y\phi'(y-r)\) we get \[\int_M fr\phi'(y-r)dv_g\leq yg_0'(y).\] We see that \[\begin{aligned} \int_M f|H|r\phi(y-r)dv_g =\int_M f|H|\left[ \int_0^y r\phi'(t-r)dt \right]dv_g \\ \leq \int_M f|H|\left[ \int_0^y t\phi'(t-r)dt \right]dv_g\\ =\int_0^y th_0'(t)dt. \end{aligned}\] Therefore, ([\[imp1\]](#imp1){reference-type="ref" reference="imp1"}) reduces to \[mg_0(y)-\int_M fr\phi'(y-r)dv_g(x)\leq \int_0^y th_0'(t)dt+\int_M \beta f y\phi(y-r) dv_g\] which can be written as \[-\frac{d}{dy}\left[ \frac{g_0(y)}{y^m}\right]\leq y^{-m-1}\int_0^yth_0'(t)dt+y^{-m} \int_M \beta f \phi(y-r) dv_g.\] Using the fact \[\int_0^yth_0'(t)dt\leq y\int_0^yh'_0(t)dt=yh_0(y)\] we get \[-\frac{d}{dy}\left[ \frac{g_0(y)}{y^m}\right]\leq \frac{s_0(y)}{y^m}.\] Observe that \[\begin{aligned} s_0=\int_Mf(x)|H(x)|\phi(y-r)dv_g(x)+\int_M \beta f \phi(y-r) dv_g\\ \leq C\int_M f\phi(y-r)dv_g(x) \end{aligned}\] where \(C=(\beta,n,\Lambda_0)\). This shows \[-\frac{d}{dy}\left[ \frac{g_0(y)}{y^m}\right]\leq C\left[ \frac{g_0(y)}{y^m}\right].\] Integrating this we get \[\sup_{t\in (0,y)}\left[ \frac{g_0(t)}{t^m}\right]\leq e^{Cy}\left[ \frac{g_0(y)}{y^m}\right]\] for all \(y\in (0,1)\). Now we choose \(\phi\) such that \(\phi(s)=1\) when \(s\geq \varepsilon\) and letting \(\varepsilon\rightarrow 0+\), ([\[mvi\]](#mvi){reference-type="ref" reference="mvi"}) follows. ◻ Note that the condition \(u\) is smooth in section 4 can be clearly replaced by \(u\in C^4\). Now we prove our main Theorem. ## Proof of Theorem [\[main1\]](#main1){reference-type="ref" reference="main1"} **Acknowledgments.** The author is grateful to Yu Yuan for his guidance, support, and many useful discussions. The author is grateful to Ravi Shankar and Micah Warren for helpful comments.
{'timestamp': '2021-09-28T02:30:39', 'yymm': '2005', 'arxiv_id': '2005.14421', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14421'}
null
null
null
null
# Abstract {#abstract .unnumbered} Researchers and managers model ecological communities to infer the biotic and abiotic variables that shape species' ranges, habitat use, and co-occurrence which, in turn, are used to support management decisions and test ecological theories. Recently, species distribution models were developed for and applied to data from ecological communities. Model development and selection for ecological community data is difficult because a high level of complexity is desired and achieved by including numerous parameters, which can degrade predictive accuracy and be challenging to interpret and communicate. Like other statistical models, multi-species distribution models can be overparameterized. Regularization is a model selection technique that optimizes predictive accuracy by shrinking or eliminating model parameters. For Bayesian models, the prior distribution automatically regularizes parameters. We propose a tree shrinkage prior for Bayesian multi-species distributions models that performs regularization and reduces the number of regression coefficients associated with predictor variables. Using this prior, the number of regression coefficients in multi-species distributions models is reduced by estimation of unique regression coefficients for a smaller number of guilds rather than a larger number of species. We demonstrated our tree shrinkage prior using examples of presence-absence data for six species of aquatic vegetation and relative abundance data for 15 species of fish. Our results show that the tree shrinkage prior can increase the predictive accuracy of multi-species distribution models and enable researchers to infer the number and species composition of guilds from ecological community data. The desire to incorporate more detail and parameters into models must be tempered by the limitations of the data and objectives of a study, which may include developing models that have good predictive accuracy and output that is easier to share with policymakers. Our tree shrinkage prior reduces model complexity while incorporating ecological theory, expanding inference, and can increase the predictive accuracy and interpretability of Bayesian multi-species distribution models. # Introduction {#introduction .unnumbered} Over the past 20 years species distribution models (SDMs) have become one of the most widely used quantitative methods in ecology (@elith2009species [@franklin2010mapping; @guisan2017habitat]). Species distribution models are routinely fit to presence-only, presence-absence, and abundance data to understand the biotic and abiotic variables that influence the habitat use and geographic distribution of a species (@aarts2012comparative [@mcdonald2013location; @hefleyHSDM]). The output of SDMs are used in scientific studies to test ecological theories and in application to delineate areas of high conservation value which informs management decisions (e.g., Wisz et al.; @guisan2013predicting [@hefley2015use]). Regardless of the type of data or method, the ultimate goal when using SDMs includes making reliable inference and accurate predictions. In many applications, a SDM is fit to data from a single species. If the study objectives require the analysis of data from multiple species, then a SDM is fit to data from each species and the models are combined using stacking (Norberg et al. *in press* ; *in press*). Although this species-by-species approach is common it presents several challenges that limit the ability of researchers and managers to make reliable inference and accurate predictions (@hui2013mix [@madon2013community; @taylor2017joint]). For example, if the goal of a study is to produce accurate range maps then spatial predictions for a species that is rare will lack precision. Imprecise spatial predictions result from parameter estimates that have a high variance, which occurs because parameters are estimated using limited data from only a single rare species (e.g., @hefley2015existence). As another example, consider the case where the goal is to infer the influence of a predictor variable such as temperature. Fitting a SDM for each species requires estimating a unique temperature coefficients for each species. Even if there are only a few predictor variables it will be difficult to summarize the regression coefficients for a moderate number of species, which will hinder communication with policymakers. Recently, SDMs for multiple species have been developed. So-called joint-or multi-species distribution models (MSDMs) enable a single model to be fit simultaneously to data from multiple species; the benefits include: 1) community-level inference and resulting prediction; 2) incorporation of biotic interactions; 3) more accurate predictions of single-species' distributions due to "borrowing of strength" across data from co-occurring species; and 4) the potential for model simplification. Many types of MSDMs have been developed using statistical or machine learning approaches (see synthesis in Norberg et al. *in press* and @wilkinson2019comparison). Hierarchical Bayesian modeling is a statistical approach that is easily customizable and widely used to model the distribution of multiple species (e.g., @taylor2017joint [@johnson2017modeling; @lany2018asymmetric; @schliep2018joint; @ovaskainen2017make; @wilkinson2019comparison]). Briefly, hierarchical Bayesian models are specified using conditional probability distributions that represent the data collection process (i.e., the "data model"), the latent ecological process (i.e., the "process model"), and prior knowledge about parameters (i.e., the "parameter model"; @wikle2019spatio, pgs. 11; @hobbs2015bayesian, ch. 6). For presence-absence data, describes the quintessential hierarchical Bayesian MSDM. This includes the data model \[y_{i,j}|z_{i,j}\sim\text{Bern(}g^{-1}(z_{i,j}))\,,\] where \(y_{i,j}=1\) if the \(i^{\text{th}}\) site (\(i=1,2...,n\)) is occupied by the \(j^{\text{th}}\) species (\(j=1,2...,J\)) and \(y_{i,j}=0\) if absent, "Bern" is a Bernoulli distribution, \(g^{-1}(\cdot)\) is an inverse link function (e.g., logistic, probit), and \(z_{i,j}\) is the latent process on the link scale. For MSDMs, a widely used process model is \[\mathbf{z}|\boldsymbol{\mu},\ensuremath{\boldsymbol{\Sigma}}\sim\text{N(\ensuremath{\boldsymbol{\mu}}\ensuremath{,}\ensuremath{\boldsymbol{\Sigma}})\,,}\] where \(\mathbf{z}\) is a random vector with elements \(z_{i,j}\), \(\boldsymbol{\mu}\) is expected value (mean), and \(\ensuremath{\boldsymbol{\Sigma}}\) is the variance-covariance matrix of a multivariate normal distribution. The vector, \(\boldsymbol{\mu}\), has elements \(\mu_{i,j}\) and is typically specified using \[\mu_{i,j}=\alpha_{j}+\mathbf{x}_{i}^{'}\boldsymbol{\beta}_{j}\,,\] where, for the \(j^{\text{th}}\) species, \(\alpha_{j}\) is the intercept and \(\boldsymbol{\beta}_{j}\) are the \(K\) regression coefficients (i.e., \(\boldsymbol{\beta}_{j}\equiv(\beta_{j,1},\beta_{j,2}...,\beta_{j,K})^{'}\)). The vector \(\mathbf{x}_{i}\) contains \(K\) measured predictor variables at the \(i^{\text{th}}\) site, which are the same for all \(J\) species (i.e., \(\mathbf{x}_{i}\equiv(x_{i,1},x_{i,2}...,x_{i,K})^{'}\)). In Eq. 2, the process model is specified jointly (i.e., using a multivariate distribution) to enable sharing of information across species. In previous studies, the variance-covariance matrix, \(\boldsymbol{\Sigma}\) in Eq. 2, accounted for residual autocorrelation due to space, time, and/or biotic interactions. For example, within the literature on MSDMs, a main focus of methodological developments has been on parametrizing \(\boldsymbol{\Sigma}\) to account for biotic factors, such as species co-occurrence, that can not be explained by the measured predictor variables \(\mathbf{x}_{i}\) (e.g., @warton2008penalized [@warton2015so; @ovaskainen2017make; @niku2017generalized; @wilkinson2019comparison]). By comparison, however, there are only a few studies that have focused on the parameterization of \(\boldsymbol{\mu}\) in Eq. 2 (e.g., @johnson2017modeling). Regardless of the type of data, most MSDMs use a linear equation to model the influence of predictor variables. For example, all seven methods compared by use Eq. 3 which, if there are \(J\) species and \(K\) predictor variables, will result in \(J\times K\) regression coefficients. For even a small number of predictor variables and species, the overabundance of regression coefficients will be challenging to summarize and interpret and may result in a MSDM that is overparameterized. For many Bayesian MSDMs, the parameter model or prior is specified using simple distributions. For example, in six of the seven methods presented by priors for the regression coefficients were specified using uniform distributions or independent normal distributions with known hyperparameters (e.g., \(\beta_{j,k}\sim\text{N}(0,10)\)). Although using simple parameter models is common practice, more sophisticated parameter models are useful. For example, the seventh method in uses a multivariate normal distribution with unknown hyperparameters as a parameter model which enables estimation and inference regarding the correlation among regression coefficients. For MSDMs, the notion of a model for the parameters is important because it can enable novel inference and perform regularization. Regularization is a model selection technique used to optimize predictive accuracy by controlling model complexity (@bickel2006regularization [@hooten2015guide]). develop a hierarchical Bayesian MSDMs, which includes a parameter model that leverages the concept of ecological guilds (@simberloff1991guild). For MSDMs, the ecological guild concept is useful because it provides a framework to incorporate ecological theory and reduce the number of regression coefficients associated with predictor variables. For example, the ecological guild concept suggests that some species may respond to predictor variables in a similar direction and magnitude as a result of similar resource use or ecological role. In other words, species within the same guild may be associated with similar values of the regression coefficients in Eq. 3. If the regression coefficients for two or more species are effectively the same, then the complexity of the MSDM can be reduced by estimating unique regression coefficients for a smaller number of guilds rather than a larger number of species. If the guild membership is known, then incorporating the guild concept into MSDMs is trivial and involves using Eq. 3 with a guild by predictor variable interaction effect rather than a species by predictor variable (@johnson2017modeling). In nearly all applications, the number and species compositions of the guilds is unknown and must be estimated from data which can be accomplished using model-based techniques. For example, as a heuristic imagine that the species-specific regression coefficients for a single predictor variable in Eq. 3 were known. In this example, the number and species composition of guilds could be determined by classifying or clustering the regression coefficients into homogeneous groups. The classification model would be easier to interpret when compared to the larger number of species-specific regression coefficients because it provides a data-driven approach to determine which species can be modeled with a single guild-level regression coefficient. This ad-hoc approach is a useful heuristic because it gives insight into how a large number of regression coefficients can be summarized using a model for the parameters. Within a hierarchical Bayesian framework, formalizing this concept is straightforward by specifying an appropriate parameter model. Simple independent parameter models that are commonly used for MSDMs, such as \(\beta_{j,k}\sim\text{N}(0,10)\), do not leverage the information in the data shared among species. The independence assumption eliminates the possibility that information about parameters will be shared across species. Shared information among the species, however, can be accessed by incorporating the guild concept into the parameter model. For example, developed a hierarchical Bayesian MSDM using a Dirichlet process mixture for the parameter model, which enables regression coefficients to be estimated using data from all species within the same guild. Briefly, the Dirichlet process mixture is a distribution that can be used as a parameter model to cluster the species into guilds while simultaneously fitting a MSDM to community data. Classification and regression trees (CART; @CART1984) are a machine learning approach with widespread use in ecology (@de2000classification [@de2002multivariate; @elith2008working]). For ecological data, CART offer a semi-automated approach to build predictive models that are easy to interpret. Although Bayesian variants of CART have been available for some time (e.g., @chipman1998bayesian [@denison1998bayesian]), they are rarely used by ecologists. This is perhaps because accessible versions of Bayesian CART software are not easily modified to accommodate ecological data. For example, current implementations of Bayesian CART do not include a "data model," which is needed to account for imperfect measurements of ecological processes. Conceptually, CART can be embedded within hierarchical Bayesian models (at any level), which would enable ecologists to exploit the benefit of both approaches (@shaby2012embedding). In our work, we show how a specific type of CART can be used as a parameter model for Bayesian MSDMs. Similar to, our approach leverages the concept of ecological guilds but reduces model complexity via a novel tree shrinkage prior (TSP). We illustrate the TSP by fitting MSDMs to presence-absence and relative abundance data collected to inform management of freshwater aquatic vegetation and fish populations. These data are collected as part of a long-term environmental monitoring program intended to inform management of the Upper Mississippi River System. Managers are required to use these data to make and justify management recommendations. This requires understanding the predictor variables that influence the distribution of a large number of species using models that can be easily shared with policymakers but that are capable of making accurate predictions. The mechanics of incorporating guilds into hierarchical Bayesian MSDMs was presented by. For MSDMs, this involves a simple modification of Eq. 3 \[\mathbf{\boldsymbol{\mu}}_{i}=\mathbf{\boldsymbol{\alpha}}+(\mathbf{x}_{i}^{'}\otimes\mathbf{Z})\boldsymbol{\gamma}\,,\] where, \(\mathbf{\boldsymbol{\mu}}_{i}\equiv(\mu_{i,1},\text{\ensuremath{\mu_{i,2}}...,\ensuremath{\mu_{i,J}}})^{'}\) is a vector that specifies the expected value for the process model at the \(i^{\text{th}}\) site for \(J\) species, \(\boldsymbol{\alpha}\equiv(\alpha_{1},\alpha_{2}...,\alpha_{J})^{'}\) contains intercept parameters for each species, and \(\mathbf{x}_{i}\equiv(x_{i,1},x_{i,2}...,x_{i,K})^{'}\) contains \(K\) predictor variables measured at the \(i^{\text{th}}\) site. The matrix \(\mathbf{Z}\) has dimensions \(J\times G\) where the \(j^{\text{th}}\) row contains an indicator variable that links the predictor variables to the guild-specific regression coefficients contained within the vector \(\boldsymbol{\gamma}\). The mathematical symbol \(\otimes\) denotes a Kronecker product. For example, let there be \(J=4\) species, \(G=2\) guilds, and \(K=2\) predictor variables, then for the \(i^{\text{th}}\) site, one configuration of Eq. 4 is \[\begin{bmatrix}\mu_{i1}\\ \mu_{i2}\\ \mu_{i3}\\ \mu_{i4} \end{bmatrix}=\begin{bmatrix}\alpha_{1}\\ \alpha_{2}\\ \alpha_{3}\\ \alpha_{4} \end{bmatrix}+\left(\begin{bmatrix}x_{i1} & x_{i2}\end{bmatrix}\otimes\begin{bmatrix}1 & 0\\ 1 & 0\\ 0 & 1\\ 0 & 1 \end{bmatrix}\right)\begin{bmatrix}\gamma_{1,1}\\ \gamma_{2,1}\\ \gamma_{1,2}\\ \gamma_{2,2} \end{bmatrix}\,,\] where the first and second species are members of the first guild and the third and fourth species are members of the second guild. The guild-specific regression coefficients are \(\boldsymbol{\gamma}\equiv(\gamma_{1,1},\gamma{}_{2,1},\gamma_{1,2},\gamma_{2,2})^{'}\) where the subscripts, \(\gamma_{g,k}\), indicate the \(g^{\text{th}}\) guild and the \(k^{\text{th}}\) predictor variable. Modifications to the example given in Eq. 5, illustrates that incorporating the guild concept into MSDM results in a model that is flexible and includes two special cases. For example, if \(\mathbf{Z}\) is a \(4\times1\) matrix with all elements equal to one (i.e., \(\mathbf{Z}\equiv(1,1,1,1)^{'}\)), then all species would be in a single guild. Similarly if \(\mathbf{Z}\) is a \(4\times4\) identity matrix (i.e., a matrix with diagonal elements equal to one and zero on the off diagonal elements), then each species would be assigned to a unique guild; this results in the commonly used MSDM with unique species-specific regression coefficients (i.e., Eq. 3) and demonstrates that incorporating the guild concept into MSDMs can only improve the predictive accuracy. If the number and species composition of the guilds was known, then the matrix \(\mathbf{Z}\) would also be known. In practice, however, the number and species composition of the guilds are unknown, which requires estimation of \(\mathbf{Z}\). In turn, \(\mathbf{Z}\) regularizes the MSDM because \(\mathbf{Z}\) shrinks and reduces the number of regression coefficients from \(J\times K\) to \(G\times K\). A general introduction to tree-based methods is given in (2013; ch. 8) while provides a technical review of Bayesian tree approaches. We use vocabulary found in both (2013; ch. 8) and. The idea of a TSP is not new but, to our knowledge, has been used in only one unrelated setting ( *in press*). For MSDMs, the idea is simple; the species within terminal nodes of the tree represent the guilds and determines the matrix \(\mathbf{Z}\) in Eq. 4. Each terminal node is associated with guild-level regression coefficients for the predictor variables. For example, in what follows, we use presence-absence data for six species of aquatic vegetation and a single predictor variable (water depth). An example of a binary tree is given in Fig. 1 and shows which species share the same numerical value of the regression coefficients for the predictor variable water depth. In this example, the standard MSDM results in six regression coefficients (i.e., one for each species). For the predictor variable water depth, a MSDM specified using the tree shown in Fig. 1 results in only three regression coefficients. Recall that there are intercept parameters for each species, as a result the binary tree in Fig. 1 reduces the number of parameters in the MSDM from 12 to 9. There are a variety of techniques to construct tree priors discussed within the statistics and machine learning literature (@linero2017review). Most techniques rely on a tree generating stochastic process (@linero2017review). Binary trees, like the example in Fig. 1, are a type of stochastic branching process (@dobrow2016introduction, ch. 4). Specification of a tree generating stochastic process involves specifying probability distributions that generate a tree structure as a random variable. For example, a simple stochastic binary tree generating process for the six species of aquatic vegetation in Fig. 1 involves specifying a distribution that determines the splitting of parent nodes and a second distribution that determines the allocation of species to the child nodes (e.g., in Fig. 1 super guild 1 is a parent node with guilds 1 and 2 as child nodes). For the aquatic vegetation example, one way to specify a binary tree generating stochastic process would involve using a "splitting distribution" that determines if a parent node should be split into two child nodes. If a draw from the splitting distribution results in a value of one, the parent node is split and draws from a "assignment distribution" allocates the species within the parent node to one of the two child nodes. In practice, the assignment distribution is \(\text{Bern}(0.5)\) whereas the splitting distribution is \(\text{Bern}(p_{split})\), where the hyperparameter \(p_{split}\) controls the model complexity by inducing a prior on the guilds. For example, if \(p_{split}=1\) then a binary tree is generated with six terminal nodes (guilds) that contain only a single species; when \(p_{split}=0\) a tree with no splits is generated and all six species are in the same guild. Finally, the terminal nodes of the MSDM with a TSP has guild-level regression coefficients, \(\gamma_{g,k}\), which require the specification of priors. For tree-based methods, simple models like \(\gamma_{g,k}\sim\text{N(0,10)}\) are commonly used, (@linero2017review), however, more complex models have been developed (e.g., @gramacy2008bayesian). In sum, specifying a stochastic tree generating process results in an implied prior on the tree structure. For example, a so-called non-informative prior could be constructed by specifying a tree generating stochastic process that generates all possible combinations of guilds with equal probability (e.g., @atkinson1992generating). For the aquatic vegetation example such a prior would result in 63 unique guilds. For this example, the MSDM with the TSP could be implemented using Bayesian model averaging (@oliver1995pruning). Model averaging is a well-known technique among ecologists (e.g., @hobbs2015bayesian; Dormann et al. 2018), however, this would require fitting 63 models (i.e., a model for each unique guild). Although we could fit a MSDM with the TSP to the aquatic vegetation data using Bayesian model averaging, this approach would not work for a larger number of species. For example, the fisheries data used to illustrate the TSP contains 15 species which results in 32,767 unique guilds. Despite advances in computational statistics, implementation of tree-based methods using Bayesian model averaging is challenging because of the potential for a large number trees (@chipman2001practical [@hooten2015guide; @BB2L], ch. 15). In the next section, we describe alternative strategies for model fitting that may be less familiar among ecologists. ## MODEL FITTING {#model-fitting .unnumbered} Hierarchical Bayesian MSDMs can be fit to presence-absence, abundance, and presence-only data using a variety of algorithms. Markov chain Monte Carlo (MCMC) algorithms are a type of stochastic sampling approach routinely used by ecologists and implemented in standard software such as WinBugs, JAGS, and Stan (@BB2L). As such, we demonstrate the TSP using MCMC. Compared with other commonly used ecological models, MCMC based implementation of Bayesian trees usually requires highly specialized algorithms. As a result, an inability to easily construct efficient algorithms has likely slowed the adoption of Bayesian regression trees (@linero2017review). For example, Bayesian model averaging, used to fit Bayesian trees to data, requires specialized algorithms (e.g., @oliver1995pruning [@hernandez2018bayesian]). As mentioned, however, this may be computationally challenging or infeasible for the TSP when there is a large number of guilds. To increase computational efficiency, search algorithms have been used to identify higher probability tree structures, however, as noted by, the "procedure is a sophisticated heuristic for finding good models rather than a fully Bayesian analysis, which presently seems to be computationally infeasible." Significant progress continues in the development of computationally efficient implementations of Bayesian trees (@linero2017review), however, fitting tree-based models to data requires matching the model to computational algorithms which can be challenging for non-experts. An appealing implementation for ecologists is presenting by. The approach enables off-the-shelf software for tree-based methods, such as those available in R, to be embedded within hierarchical Bayesian models. This is appealing to ecologists because it makes the TSP accessible by eliminating the need to develop custom software to implement the TSP. Briefly, the technique of is an approximate Gibbs sampler that enables machine learning algorithms to be embedded within hierarchical Bayesian models. In what follows we use a model-based recursive partitioning approach that is available in the R package "partykit" and implemented within the `lmtree(...)` function (@hothorn2006unbiased [@zeileis2008model]; 2019). Model-based recursive partitioning estimates a binary tree and consequently \(\mathbf{Z}\) and \(\boldsymbol{\gamma}\) in Eq. 4. The approximate Gibbs sampler of is similar to an empirical Bayesian step within a Gibbs sampler because priors for a portion of the unknown model parameters are replaced with estimates (@casella2001empirical). As a result, when using the approach, there are no distributions or hyperparameters associated with the TSP that must be specified. In what follows, we use standard MCMC algorithms for MSDMs, but employ the approach. Constructing the approximate Gibbs sampler using the approach for the aquatic vegetation data example is incredibly simple and requires only six lines of R code and the ability to sample univariate normal and truncated normal distributions (e.g., using the R functions `rnorm(...)` and `rtruncnorm(...)`; see section 2.3 in Appendix S1). To assist readers implementing similar MSDMs with the TSP, we provide tutorials with the computational details, annotated computer code, and the necessary code to reproduce all results and figures related to the analysis for the aquatic vegetation data and fisheries data examples (see Appendix S1 and S2). ## STATISTICAL INFERENCE {#statistical-inference .unnumbered} A benefit of Bayesian inference is that uncertainty regarding the structure of the binary tree, and therefore the number and species composition of the guilds, is automatically accounted for. Under the Bayesian paradigm, samples from the posterior distribution of the trees are obtained during the model fitting process. The posterior distribution of the trees can be summarized to infer characteristics of the guilds. For example, the species composition of the guilds with the highest probability (given the data) can be obtained from the posterior distribution of the trees. In addition, posterior distributions of the species-level and guild-level regression coefficients can be sampled and summarized. The species-level regression coefficients, akin to \(\boldsymbol{\beta}\) in Eq. 3, are a derived quantity calculated using \[\boldsymbol{\beta}_{j}^{(m)}=\mathbf{W}_{j}^{(m)}\boldsymbol{\gamma}^{(m)}\,,\] where the superscript \(m\) is the current MCMC sample, \(\boldsymbol{\beta}_{j}\) is vector of regression coefficients for the \(j^{\text{th }}\) species, \(\mathbf{W}_{j}\) is a matrix that contains indicator variables linking the guild-level coefficients to the species. In the presence of guild membership uncertainty, the species-level regression coefficients result in a posterior distribution that is a mixture of the guild-level regression coefficients. When using the TSP, the posterior distribution of the regression coefficients for a species are akin to the model averaged posterior distribution obtained from fitting and averaging multiple MSDMs with differing species composition and numbers of guilds to the data. Similarly the guild-level regression coefficients are akin to the regression coefficients obtained from a single MSDM using a fixed guild structure. We recommend using the species-level regression coefficients to make inference because, with a finite amount of data, the species composition of the guilds will always be uncertain. Inference using the guild-level regression coefficients is conditional (i.e., valid for a fixed number and species composition of the guilds) and does not fully account for uncertainty. ## LONG-TERM RESOURCE MONITORING DATA {#long-term-resource-monitoring-data .unnumbered} The Mississippi River is the second longest river in North America and flows a distance of 3,734 km. The Upper Mississippi River System includes approximately 2,100 km of the Mississippi River channel and drains a basin covering 490,000 \(\text{km}^{2}\) that contains 30 million people. The Upper Mississippi River Restoration Program was authorized under the Water Resources Development Act of 1986 (). The U.S. Army Corps of Engineers provides guidance, has overall Program responsibility, and established a long term resource monitoring (LTRM) element that includes collecting biological and geophysical data. The LTRM element is implemented by the U.S. Geological Survey, Upper Midwest Environment Sciences Center, in cooperation with the five Upper Mississippi River System states of Illinois, Iowa, Minnesota, Missouri, and Wisconsin (@UMRR). The expressed goal of the LTRM element is to "support decision makers with the information and understanding needed to maintain the Upper Mississippi River System as a viable multiple-use large river ecosystem." The biological data collected by LTRM contains a large number of species and exemplifies the need for interpretable MSDMs with results that are easy to communicate to policymakers. For example, data from 154 species, some of which are rare or endangered, have been collected by the LTRM element since 1993; inferences from these data provide context for management recommendations for these or collections of these species. As part of LTRM element, data on aquatic vegetation and fish are collected at multiple sites within six study reaches of the Upper Mississippi River. To illustrate our method, we use aquatic vegetation and fisheries data from navigation pool 8 collected in 2015. Complete details of data collection procedures for the aquatic vegetation data and fisheries data are given by and respectively. Our objective for the first example is to illustrate the TSP using a simple MSDM. As such, this example was designed to demonstrate the proposed methods rather than to provide scientifically valid inference. As such, we use only a single predictor variable (water depth) and presence-absence absence data of six species of aquatic vegetation. At 450 unique sites, the presence or absence of a species was recorded. For our example, we use data for broadleaf arrowhead (*Sagittaria latifolia*), Canadian waterweed (*Elodea canadensis*), coontail (*Ceratophyllum demersum*), stiff arrowhead (*Sagittaria rigida*), white water lily (*Nymphaea odorata*), and wild celery (*Vallisneria americana*). This resulted in a total of 2,700 observations. For our analysis, we randomly selected 225 sites and used data from these for model fitting. We used data from the remaining 225 sites to test the predictive accuracy of the models. For the aquatic vegetation data, we use the data model \[\mathbf{y}_{i}|\ensuremath{\mathbf{\boldsymbol{\mu}}_{i}}\sim\text{Bern(\ensuremath{\Phi}(\ensuremath{\mathbf{\boldsymbol{\mu}}_{i}})})\,,\] where \(\mathbf{y}_{i}\equiv(y_{i,1},y_{i,2}...,y_{i,6})^{'}\) is the presence or absence of the six species at the \(i^{\text{th}}\) site (\(i=1,2...,225)\). The parameter vector \(\ensuremath{\mathbf{\boldsymbol{\mu}}_{i}}\equiv(\mu_{i,1},\mu_{i,2}...,\mu_{i,6})^{'}\) is mapped to a probability by applying the inverse probit link function, \(\Phi(\cdot)\), to each element. The parameter vector \(\ensuremath{\mathbf{\boldsymbol{\mu}}_{i}}\) is specified using Eq. 4, but is simplified due to the single predictor variable in this example \[\mathbf{\boldsymbol{\mu}}_{i}=\mathbf{\boldsymbol{\alpha}}+x_{i}\mathbf{Z}\boldsymbol{\gamma}\,,\] where \(\boldsymbol{\alpha}\equiv(\alpha_{1},\alpha_{2}...,\alpha_{6})^{'}\) is a vector that contains intercept parameters for each species and \(x_{i}\) is the recorded water depth at the \(i^{\text{th}}\) site. As in Eq. 4, the matrix \(\mathbf{Z}\) has dimensions \(J\times G\) where the \(j^{\text{th}}\) row contains an indicator variable that links the predictor variables to the guild-specific regression coefficients contained within the vector \(\boldsymbol{\gamma}\equiv(\gamma_{1,1},\gamma_{2,1}...,\gamma_{g,1})^{'}\). For the intercept, we use the prior \(\alpha_{j}\sim\text{N(0,1})\) because this results in a uniform distribution when \(\alpha_{j}\) is transformed using the function \(\Phi(\ensuremath{\alpha_{j}})\). That is, using the prior \(\alpha_{j}\sim\text{N(0,1})\) results in \(\Phi(\ensuremath{\alpha_{j}})\sim\text{unif(0,1})\). We used a computationally efficient MCMC algorithm to fit the MSDM to the aquatic vegetation data. This MCMC algorithm relies on an auxiliary variable formulation of the binary regression model and has been used to fit MSDMs to presence-absence data (@albert1993bayesian; @wilkinson2019comparison; @BB2L, pgs. 246). For each model fit, we use one chain and obtain 100,000 draws from the posterior distribution, but retain every \(10^{\text{th}}\) sample to decrease storage requirements. Each model fit takes approximately 30 minutes using a desktop computer (see Appendix S1). We inspect the trace plot for each parameter to ensure that the Markov chain is sampling from the stationary distribution (i.e., the posterior distribution). We discard the first 500 samples and use the remaining 9,500 samples for inference. The model-based recursive partitioning approach available in the R function `lmtree(...)` and used to implement the TSP requires the specification of a tuning parameter (hereafter `alpha`; see Appendix S1). This tuning parameter, `alpha`, must be between zero and one and controls the splitting of parent nodes. Similar to the tree generating stochastic process (see Section TREE SHRINKAGE PRIOR), when `alpha\,=1` the tree has terminal nodes (guilds) that contain only a single species. When `alpha\,=0` the tree does not split and all six species are in the same guild. One way to estimate the tree tuning parameter, `alpha`, is to find the value that results in the most accurate predictions (@hobbs2015bayesian). For this example, we illustrate two approaches by estimating the predictive accuracy of our models with scores that use either in-sample or out-of-sample data. For the out-of-sample score, we use data from the 225 sites that were not used to fit the model to calculate the log posterior predictive density (LPPD). For the in-sample score, we calculate the Watanabe-Akaike information criteria (WAIC). For comparison between scoring approaches, we report \(-2\times\text{LPPD}\) as we would expect this and WAIC to result in similar numerical values (@gelman2014understanding). For Bayesian models, computing in-sample scores like WAIC require a measurement of a model's complexity. In non-hierarchical non-Bayesian contexts, a model's complexity is the number of parameters in the model. For example, using the MSDM applied to the aquatic vegetation data, the number of parameters ranges from 7 (i.e., six intercept parameters and one regression coefficient) to 12 (i.e., six intercept parameters and six regression coefficients). Measuring the complexity of our Bayesian MSDM with the TSP is more complicated than simply counting the number of parameters because of the shrinkage effect and because it is not obvious how many parameters are required to estimate the number and species composition of the guilds. Fortunately, when calculating Bayesian information criterion like WAIC, measure of model complexity such as the "effective number of parameters" are available without any additional effort. To understanding how the TSP controls the complexity of the MSDM, we report the effective number of parameters using Eq. 12 from as `alpha` varies from zero to one. Our objective for the second example is to demonstrate a different and complex data type that necessitates a more sophisticated use of the TSP and deeper ecological interpretation, similar to what ecologists may encounter in practice. Here we use relative abundance data from 15 species of fish that were sampled at 83 sites, which included several species that were present at only a small number of sites and are considered rare or species of concern (Table 1). For example, at 79 of the 83 sites (95%), a count of zero was recorded for river redhorse (*Moxostoma carinatum*; Table 1). At each site, numerous predictor variables were measured, but for our analysis we use water temperature, speed, and depth as these were most relevant to management of the Upper Mississippi River System. The fisheries data were collected over three time periods which included period 1 (June 15 July 31), period 2 (August 1 September 14), and period 3 (September 15 October 31). The time periods are hypothesized to correspond to changes in habitat use. For example, one hypothesis is that species composition of the guilds and the regression coefficient estimates associated with water temperature, speed, and depth may be different during each period. In what follows, we demonstrate how to incorporate such dynamics into MSDMs using the fisheries data. For relative abundance data, discuss several commonly used MSDMs including a data model that has a marginal distribution of \[\mathbf{y}_{i}|\mathbf{z}_{i},\phi\sim\text{ZIP}(e^{\mathbf{z}_{i}},\phi)\,,\] where "ZIP" stands for zero-inflated Poisson, \(e^{\mathbf{z}_{i}}\) is the expected value of the Poisson mixture component, and \(\phi\) is the mixture probability (@BB2L; pg. 320). We specify the process model using Eq. 2 with \(\boldsymbol{\Sigma\equiv}\sigma_{\varepsilon}^{2}\mathbf{I}\) and \[\mathbf{\boldsymbol{\mu}}_{i}=\mathbf{\boldsymbol{\alpha}}+\left(\mathbf{x}_{i}^{'}\otimes\mathbf{Z}_{t}\right)\boldsymbol{\gamma}_{t},\] where the guild composition and regression coefficients vary over the three sample periods as indicated by subscript \(t\) such that \(\mathbf{Z}_{t}\) and \(\boldsymbol{\gamma}_{t}\) corresponds to period 1 (\(t=1\)), period 2 (\(t=2\)), or period 3 (\(t=3\)). The vector \(\mathbf{x}_{i}\equiv(x_{i,1},x_{i,2},x_{i,3})^{'}\) are the three predictor variables (water temperature, speed and depth) measured at the \(i^{\text{th}}\) site. In total, there are \(135\) unique regression coefficients if the guilds contained only a single species for all three periods, which would also be the case if the standard MSDM (i.e., Eq. 3) with simple priors for the regression coefficients was used. For the mixture probability, process model variance, and intercepts we used the priors \(\phi\sim\text{unif}(0,1)\), \(\sigma_{\varepsilon}^{2}\sim\text{IG}(2.01,1)\), and \(\alpha_{j}\sim\text{N(0,10}^{3})\) respectively. For each model fit, we use one chain and obtain 30,000 draws from the posterior distribution, but retain every \(10^{\text{th}}\) sample to decrease storage requirements. We inspect the trace plot for each parameter to ensure the Markov chain is sampling from the stationary distribution. We discard the first 500 samples and use the remaining 2,500 samples for inference. The computational cost to implement the TSP will increase as the number of species increase. In addition, allowing the number and species composition of the guilds to vary over the three periods increases the computational burden because the MSDM requires three TSPs instead of one. As a results, we do not select the value of the tree tuning parameter parameters that produces the best predictive model because fitting the MSDM once to the fisheries data takes about 23 hours using a desktop computer (see Appendix S2). Instead we choose a value of the tree tuning parameters that favors a small number of guilds, which we anticipate will make our results easier to share with policymakers. Similar to the aquatic vegetation example, the tree tuning parameters could be chosen to optimize the predictive ability of the model but this would make the annotated computer code provided in Appendix S2 difficult for many readers to use without access to high-performance computing resources. # Results {#results .unnumbered} The value of the tree tuning parameter that produces the most accurate predictions was 0.6 when scored using LPPD and 0.025 when scored using WAIC. In what follows, we present results obtained from the MSDM with the TSP that used a value of the tree tuning parameter of 0.025 because this value was optimal based on WAIC, results in only a slight reduction in predictive accuracy when scored using LPPD, and yields a relatively large reduction in the number of parameters which simplifies statistical inference (Fig. 2). For the six species of aquatic vegetation, the posterior distributions for the species-level regression coefficient, obtained from Eq. 6, shows that the presence of wild celery has no statistical relationship with water depth while the remaining five species of vegetation exhibit a strong negative response to increases in water depth (Fig. 3a,b). In addition to the posterior distribution for the regression coefficients, derived quantities from the posterior distribution of the tree can provide insightful inference. For example, Fig 3c shows the posterior distribution of the number of terminal nodes (i.e., guilds) and Fig 3d shows the expected value of the posterior distribution of species co-occurrence within the same guild, both of which were derived from the posterior distribution of the trees. As another example, summaries of the posterior distribution of the tree may be of interest. For example, Fig. 3e shows the most likely tree, which is obtained from the mode of the posterior distribution of the trees and can be used to infer which guild structure is most likely. For the most likely tree, figure 3f shows the posterior distribution of the two guild-level regression coefficients. Again, caution must be taken when making inference from the guild-level regression coefficients because these are conditional on a single tree and do not account for guild uncertainty. For the aquatic vegetation data, however, the inference does not differ among the species-level and guild-level regression coefficients because the uncertainty in the number and species composition of the guilds is relatively low. Similar to the aquatic vegetation example, we show the posterior distribution of the number of guilds (Fig. 4a,b,c), the expected value of species co-occurrence within the same guild (Fig. 4d,e,f), and the posterior distribution of the regression coefficients for each species (Figs. 5 and S1). During period 1, our results indicate that there are most likely two guilds (Fig 4a). The posterior distributions of the regression coefficients show that eight species (bluegill, bullhead minnow, emerald shiner, largemouth bass, mud darter, pugnose minnow, tadpole madtom, and weed shiner; hereafter "guild 1 during/in period 1") have large decreases in relative abundance when water temperature and depth increases (Figs. 5 and S1). These results suggest guild 1 during period 1 is more abundant in shallower side channels and off-channel habitats compared to the main channel, where depth is maintained at a minimum of 2.75 m for navigation. Of the species in guild 1 during period 1 many are nest spawners (e.g., bluegill, bullhead minnow, largemouth bass, pugnose minnow, tadpole madtom) and our results correspond with habitat requirements for successful reproduction. During period 1, the remaining seven species (golden redhorse, longnose gar, river redhorse, river shiner, shorthead redhorse, smallmouth bass, spotfin shiner; hereafter "guild 2 during/in period 1") have posterior distributions of the regression coefficients that indicate slight decrease in relative abundance when water temperature or depth increases, however, here is a non-negligible probability that these responses could be close to zero or even positive (Figs. 5 and S1). This suggest that during period 1 species in guild 2 are found over a broader range of conditions when compared to species in guild 1. Many of these species are classified as fluvial dependent or fluvial specialists, which are either generally found in lotic environments or require flowing water for some part of their life history (@galat2001conserving [@lifehistory]). During period 2, our results indicate that there is most likely a single guild that contains all 15 species of fish (Fig 4b). The posterior distributions of regression coefficients for all species generally have an expected value near zero, suggesting random associations with water depth, speed, and temperature (Fig. 5 and S1). The lack of a response to water depth, speed, and temperature during period 2 may be a result of active foraging in which species are moving in search of food. During period 3, our results indicate that there are most likely two guilds (Fig 4c). The posterior distributions of the regression coefficients associated with depth indicate a negative response for five species (bluegill, largemouth bass, pugnose minnow, tadpole madtom, weed shiner; hereafter "guild 1 during/in period 3"), which suggests an avoidance of the main channel (Figs. 5 and S1). In addition, our results show a negative response to water speed for the species in guild 1 during period 3 which suggest associations with lentic habitats such as backwater lakes. As temperatures decrease during period 3 (September 15 October 31), many of the species in guild 1 are known to move into slow-moving backwaters to minimize energy expenditures during winter conditions. During period 3, six species (bullhead minnow, emerald shiner, river redhorse, shorthead redhorse, smallmouth bass, spotfin shiner; "guild 2 during/in period 3") had a slightly positive association with water speed and negative association with water temperature (Figs. 5 and S1). These results suggest that species in guild 2 during period 3 are more likely to inhabit the main channel and side channels during this period than off-channel habitats. During period 3, there are four species (golden redhorse, longnose gar, mud darter, and river shiner) whose posterior distributions of regression coefficients do not clearly delineate guild association. These results suggest either a high level of guild uncertainty, insufficient data, or weaker associations with the variables examined. In summary, the number and composition of guilds changed over the three periods, suggesting shifts in habitat associations and species interactions through time. Whether these shifts were related to specific requirements for spawning, foraging, or overwintering would require additional field research designed to answer such questions, but our results are consistent with our understanding of fluvial dependence and general habitat guilds. # Discussion {#discussion .unnumbered} A benefit of hierarchical Bayesian modeling is that statistical models can be easily customized to match the goals of a study. In what follows, we discuss modifications to the data and/or process models that have been commonly used to accommodate different types and quality of data. The modifications we discuss can be incorporated without making major changes to the basic framework we presented. We begin by discussing modifications to the data model. For our aquatic vegetation and fisheries data examples we used data models that were appropriate for presence-absence and relative abundance data, respectively. Other types of ecological data may require the specification of different distributions for the data. For example, a beta distribution is often used for plant cover data, which are usually reported as percentages (@wright2017statistical; *in press*). Our approach, using the process model in Eq. 3 and TSP, could be used to develop a MSDM for plant cover data by specifying a beta distribution as the data model. Similarly, selecting a data model that matches key characteristics of the observed data (e.g., the support) is a common model building practice and applications using the TSP are straightforward (@hobbs2015bayesian [@BB2L]). Many types of ecological data are measured with error. For example, presence-absence data may contain false-negatives (@tyre2003improving [@martin2005zero; @gray2013influences]). For MSDMs, accounting for measurement error in the data is an important component of the model building process (@beissinger2016incorporating [@warton2016extending; @tobler2019joint]). For example, multi-species occupancy models have been developed to account for false-negatives in presence-absence community data (@dorazio2005estimating). Model selection is challenging for multi-species occupancy models (@broms2016model), however, using the approaches demonstrated in this paper, it is straightforward to implement the TSP for the multi-species occupancy model. This would involve adding a fourth level to the hierarchical MSDM in Eqs. 2 that accounts for the possibility of false-negatives in the presence-absence data (@BB2L, ch. 23). Using the information provided in Appendix S1 in concert with or (2019; ch. 23) would yield an efficient implementation that requires a minimal amount of additional programming. As noted in the introduction, a main focus of methodological development within the literature on MSDMs has been on parametrizing the variance-covariance matrix, \(\boldsymbol{\Sigma}\), for the process model in Eq. 2. In previous studies the variance-covariance matrix was specified to account for residual autocorrelation due to space, time, or biotic interactions. These modifications to the variance-covariance matrix can be incorporated into a MSDM that uses the TSP. For example, latent variables parameterizations have been used to induce dependence among species and estimate \(\boldsymbol{\Sigma}\) (@walker2011random [@warton2015so; @hui2016boral]). As another example, note that spatial or temporal autocorrelation can be accounted for by including basis functions to estimate \(\boldsymbol{\Sigma}\) (@hefley2017basis). In both the latent variables parameterization and basis function approach, the matrix \(\boldsymbol{\Sigma}\) is implicitly specified using a "random effects" or "first-order representation" (@hefley2017basis; @wikle2019spatio, pgs. 156). The TSP is easy to program using the approximate Gibbs sampling approach from and requires only a few additional lines of code when compared to Bayesian MSDMs that use simple priors. The computational burden to implement the TSP, however, is considerably larger which may increase the run-time required to fit MSDMs to data. For example, fitting independent models for single-species or MSDM with simple priors to data is faster because the number and species composition of the guilds does not have to be estimate and it may be easy to parallelize the computational procedure (@BB2L, ch. 19; *in press*). In general, the TSP will become more computationally challenging to implement as the number of species increases. For example, our implementation which uses a model-based recursive partitioning approach available in the R function `lmtree(...)` has a computational complexity that increase nonlinearly with the number of species. As a result fitting a MSDM to data for a small number of species is relatively fast as demonstrated by our example with six species of aquatic vegetation, however, model fitting requires much more time for a larger number of species as demonstrated by our example with 15 species of fish. The increase in computational time is caused by the increase in the number of possible guilds. Based on our experience and using the computational approaches presented in this paper, the TSP becomes infeasible to fit to data that contains more than roughly twenty species, however, feasibility will vary by data set and computer resources. Although this is a current limitation of the TSP, other Bayesian MSDMs that incorporate the guild concept face similar challenges (e.g., @johnson2017modeling) which demonstrates the need for more efficient algorithms for "big" ecological communities. Currently we suggest two approaches to alleviate the computational burden when applying our approach to a large number of species. The first suggestion is to choose off-the-shelf tree methods that use multiple processors (or cores). For example, we used the R function `lmtree(...)`which allows users to choose the number of processor cores for tree related computations. In practice, implementation that exploits multiple processors should reduce the time required to fit a MSDM with the TSP to data, however, gains will vary by application. The second approach to reduce the computational burden involves using values of the tree hyperparameters that favor a small number of guilds. In studies with a large number of species, choosing a value of the tree hyperparameters that results in a small number of guilds may reduce the predictive accuracy of the model, however, model fitting will likely be quicker. In addition a small number of guilds may be desirable for studies that contain a large number of species because interpretation of the results for a larger number of guilds may be challenging. Both techniques, using multiple cores and reducing the number of guilds, were illustrated in our fisheries data example (see Appendix S2). As with most computationally demanding statistical methods, advances may soon obviate the current challenges. Model development, implementation, and selection for data from ecological communities is difficult because a high level of complexity is desired which can be achieved by including numerous parameters. For example, commonly used MSDMs are specified so that each species has a unique regression coefficient for each predictor variable (e.g., @wilkinson2019comparison). As a result it is common practice to overparameterize MSDMs, which can degrade predictive accuracy and produce results that are difficult to interpret and communicate. We illustrated how to reduce the number of parameters in commonly used Bayesian MSDMs by replacing simple prior distributions for regression coefficients with a TSP. The TSP reduces model complexity while incorporating ecological theory, expanding inference, and can increase the predictive accuracy and interpretability of Bayesian MSDMs. # Data accessibility {#data-accessibility .unnumbered} The aquatic vegetation and fisheries data are publicly available from, but the specific subsets used in this study will be archived in the Dryad Digital Repository. For the purpose of peer review, the data have been submitted as supporting material as a compressed file labeled Data.zip.
{'timestamp': '2020-06-01T02:03:40', 'yymm': '2005', 'arxiv_id': '2005.14303', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14303'}
# General linear response NEGF formalism for heat transfer {#sec:genform} Consider a generic system exhibiting generalized displacements labeled \(x(t)\), which may represent electronic wavefunctions, collective nuclear oscillations giving rise to phonons, EM fields, or other oscillatory phenomena, and respond linearly to generalized forces labeled \(F(t)\). These degrees of freedom (DOFs) constitute collections which we generically call "components". Each component exhibits linear equations of motion representing its internal dynamics in isolation and in response to external forces, and each component may be linearly coupled to other components leading to energy transport among them. The following sections will make clear the identities of the components, couplings, generalized displacements, and generalized forces in different systems of interest, like PCHT or RHT; this section focuses on deriving relevant fully general formulas for energy transport among generic coupled components. Generically, in the time domain, the power radiated or absorbed by a component may be written as \(\dot{W} = \left\langle F(t) \frac{\partial x}{\partial t} \right\rangle\). Here, \(\bracket{\ldots}\) denotes a time average in the steady-state, which is equivalent to an ensemble average due to ergodicity. As we have specified that the internal dynamics and couplings are linear, we may equivalently work in the frequency domain, making it easier to apply the fluctuation--dissipation theorem  and thereby replace such ensemble averages with deterministic quantities representing the dissipation of the system. In the frequency domain (where we will generally suppress dependence on angular frequency \(\omega\) in the notation), we label these generalized displacements as \(\ket{x}\) and the generalized forces as \(\ket{F}\), as these quantities are vectors in a complex Hilbert space with the standard inner product. One of the operators relevant to this Hilbert space are the dynamical operator \(\hat{Z}^{(0)}\), representing the dynamical equations of motion for each component in isolation, and can equivalently be seen as a generalized impedance or spring constant; its inverse, \(\hat{Y}^{(0)} = \hat{Z}^{(0)-1}\), represents a generalized admittance for the components in isolation, such that an external force \(\ket{F^{(0)}}\) on the components *in isolation* produces a total displacement \(\ket{x} = \hat{Y}^{(0)} \ket{F^{(0)}}\). However, energy exchange among components is only possible if couplings are present: as will become clearer later, these couplings may act directly between components, or may act through other components whose equations are eliminated, resulting in effective self-couplings for the remaining components. These couplings are generically represented by the linear operator \(\Delta\hat{Z}\): the force \(\ket{F}\) on other components due to a displacement \(\ket{x}\) from equilibrium of a given component can be written as \(\ket{F} =-\Delta\hat{Z} \ket{x}\). We generally assume this system to be reciprocal, so that in this complex Hilbert space, \(\hat{Z}^{(0)} = \hat{Z}^{(0)\top}\) and \(\Delta\hat{Z} = \Delta\hat{Z}^{\top}\) hold, where \({}^{\top}\) denotes the transpose *without* conjugation and not the Hermitian adjoint \({}^{\dagger}\), and reciprocity of related operators follows from these relations. Additionally, causality implies that \(\hat{Y}^{(0)}(-\omega^{\star}) = \hat{Y}^{(0)\star}(\omega)\) for any complex frequency \(\omega\); passivity implies that \(\operatorname{asym}(Y^{(0)})\), where \(\operatorname{asym}(\hat{A}) \equiv (\hat{A}-\hat{A}^{\dagger})/(2\operatorname{i})\) for any operator \(\hat{A}\), which represents the dissipative contribution to the response of the uncoupled components, is Hermitian positive-definite (in the space of its own support) for any real positive frequency \(\omega\) . We now turn to the equations of motion for this system in the presence of coupling between its different components. In particular, the total generalized displacement can be written as the sum of the initial displacement \(\ket{x^{(0)}}\) and the response of the components \(\hat{Y}^{(0)}\), in isolation, to the total generalized force \(\ket{F}\); in order to avoid double-counting various contributions, the total generalized force simply arises from the total displacements through the couplings between different components \(\Delta\hat{Z}\), as we assume that no other external forces contribute to the system dynamics, and these couplings are the only way for energy to be transmitted among different components. Mathematically, this is written as \[\begin{split} \ket{x} &= \ket{x^{(0)}} + \hat{Y}^{(0)} \ket{F} \\ \ket{F} &=-\Delta\hat{Z} \ket{x} \end{split}\] and we formally solve this to yield \[\label{eq:totallinearresponse} \ket{x} = \hat{Y} \hat{Z}^{(0)} \ket{x^{(0)}}\] where we define the total response \(\hat{Y} = \hat{Z}^{-1}\) in terms of the total equations of motion (generalized impedance) \(\hat{Z} = \hat{Z}^{(0)} + \Delta\hat{Z}\). We stress that the total response \(\hat{Y}\) satisfies the same reciprocity, causality, and passivity properties as the decoupled response \(\hat{Y}^{(0)}\). At this point, we specify that the system can be partitioned into \(N\) components, with each component labeled \(n\) specifying a certain set of DOFs; the operator \(\hat{Z}^{(0)}\) (and also \(\hat{Y}^{(0)}\) by extension) can be written as a block-diagonal matrix as it represents the equations of motion of each component in the absence of coupling between components, so if \(\hat{P}_{n}\) is a projection into the subspace supported by the DOFs of component \(n\), then each diagonal block of \(\hat{Z}^{(0)}\) is \(\hat{Z}^{(0)}_{n} = \hat{P}_{n} \hat{Z}^{(0)} \hat{P}_{n}\), and likewise each diagonal block of \(\hat{Y}^{(0)}\) is \(\hat{Y}^{(0)}_{n} = \hat{P}_{n} \hat{Y}^{(0)} \hat{P}_{n}\), with \(\hat{Y}^{(0)}_{n} = \hat{Z}^{(0)-1}_{n}\). (We note that \(\hat{Z}\) and \(\hat{Y}\) will generally not be block-diagonal with respect to the different components.) If each component \(n\) is maintained independently at a corresponding temperature \(T_{n}\) (uniformly for all of the DOFs constituting that component), then we may write the frequency-domain fluctuation--dissipation theorem as \[\begin{gathered} \label{eq:FDT} \hat{P}_{m} \bracket{\ket{x^{(0)} (\omega)} \bra{x^{(0)} (\omega')}} \hat{P}_{n} = \\ \frac{2\Pi(\omega, T_{n})}{\omega} \operatorname{asym}(\hat{Y}^{(0)}_{n} (\omega)) \delta_{mn} \times 2\pi\delta(\omega-\omega') \end{gathered}\] where \(\bracket{\ldots}\) represents the quantum statistical expectation value; our use of the Planck function \(\Pi(\omega, T) = \frac{\hbar\omega}{2}\coth\left(\frac{\hbar\omega}{2k_{\mathrm{B}} T}\right)\) implicitly assumes that all DOFs we consider, when quantized, obey Bose statistics with no chemical potential, which is appropriate for EM fields and for coupled mechanical oscillators under consideration. We also point out that the use of \(\operatorname{asym}(\hat{Y}^{(0)}_{n})\), as opposed to \(\operatorname{asym}((\hat{Z}^{(0)}_{n} + \Delta\hat{Z}_{nn})^{-1})\) if \(\hat{P}_{n} \Delta\hat{Z} \hat{P}_{n} = \Delta\hat{Z}_{nn} \neq 0\), is valid because the former includes dissipation only within component \(n\), whereas the latter may implicitly include dissipation in other coupled components that have been eliminated. In order to compute the heat transfer from component \(m\) to component \(n\), we account only for fluctuations in component \(m\), so that \(\ket{x^{(0)}} = \hat{P}_{m} \ket{x^{(0)}}\) will hold, and compute the work done on component \(n\) according to \(\ket{F} =-\hat{P}_{n} \Delta\hat{Z} \ket{x}\) where \(\ket{x} = \hat{Y} \hat{Z}^{(0)} \hat{P}_{m} \ket{x^{(0)}}\). We then write the absorbed power (energy transfer) as \(\dot{W} = \int_{-\infty}^{\infty} \int_{-\infty}^{\infty} \bracket{\trace{-\operatorname{i}\omega \hat{P}_{n} \ket{x(\omega)} \bra{F(\omega')} \hat{P}_{n}} e^{-\operatorname{i}(\omega- \omega')t}}~\frac{\mathrm{d}\omega~\mathrm{d}\omega'}{(2\pi)^{2}}\). Algebraic manipulations involving the definitions of \(\ket{x}\) and \(\ket{F}\), along with the fluctuation--dissipation theorem in [\[FDT\]](#FDT){reference-type="eqref" reference="FDT"} applied to \(\ket{x^{(0)}}\) and the causality properties of the relevant response quantities, yield \[\begin{gathered} \dot{W} = \frac{2}{\pi} \int_{0}^{\infty} \Pi(\omega, T_{m}) \times \\ \trace{\hat{P}_{m} \operatorname{asym}(\hat{Z}^{(0)\dagger}) \hat{P}_{m} \hat{Y}^{\dagger} \operatorname{asym}(\hat{P}_{n} \Delta\hat{Z}) \hat{Y} \hat{P}_{m}}~\mathrm{d}\omega \end{gathered}\] as the gross energy transfer from component \(m\) at temperature \(T_{m}\) to component \(n\) among a collection of an arbitrary number of thermalized components. From this, we define the NEGF energy transfer spectrum between components \(m\) and \(n\) as \[\label{eq:Phimn} \Phi^{(m)}_{n} = 4~\trace{\hat{P}_{m} \operatorname{asym}(\hat{Z}^{(0)\dagger}) \hat{P}_{m} \hat{Y}^{\dagger} \operatorname{asym}(\hat{P}_{n} \Delta\hat{Z}) \hat{Y} \hat{P}_{m}}\] independently of the temperature of each component, while the integrated net power transfer can be written as \[\dot{W}_{m \to n} = \int_{0}^{\infty} (\Pi(\omega, T_{m})- \Pi(\omega, T_{n}))\Phi^{(m)}_{n}~\frac{\mathrm{d}\omega}{2\pi}\] in terms of the component temperatures \(T_{m}\) and \(T_{n}\). Furthermore, the heat transfer coefficient (thermal conductance) between two components may be derived by replacing \(\Pi(\omega, T_{m})-\Pi(\omega, T_{n})\) in the integrand with \(\lim_{T_{m} \to T_{n}} \frac{\Pi(\omega, T_{m})-\Pi(\omega, T_{n})}{T_{m}-T_{n}} = \frac{\partial}{\partial T} \Pi(\omega, T)\). It is worth noting that reciprocity, which has not been exploited in these derivations thus far, is required to show that \(\Phi^{(m)}_{n} = \Phi^{(n)}_{m}\) at each frequency. The formula for \(\Phi^{(m)}_{n}\) in [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"} is valid for any number of components maintained at their own uniform temperatures, and constitutes a generalization of Landauer/Caroli formulas often used to describe PCHT and RHT [@OteyJQSRT2014; @KrugerPRB2012; @VenkataramPRL2018; @JinPRB2019; @SegalARPC2016; @ZhangPRB2018; @WangPRE2018; @KlocknerPRB2018; @SadasivamPRB2017; @PaulyNJP2008]. The most fruitful analogies between RHT and PCHT can be extracted from consideration of heat transfer between two components, through direct contact or via contact with a third component. In what follows, we derive formulas for both situations: the first situation is most relevant to RHT between two bodies or PCHT combined with RHT between two bodies in direct contact, while the second situation is most relevant to PCHT combined with RHT between two bodies via a third intermediate body (typically a thin interface or a small atomic or molecular junction), though it can also be applied to formally deriving expressions for RHT between two bodies. ## Two components in direct contact For two components, labeled 1 or 2, in direct contact with each other, we may write the operators \(\hat{Z}^{(0)}\) and \(\Delta \hat{Z}\) describing the equations of motion and couplings among these components may be written as \(2\times 2\) block matrices \[\begin{aligned} \hat{Z}^{(0)} &= \begin{bmatrix} \hat{Z}^{(0)}_{1} & 0 \\ 0 & \hat{Z}^{(0)}_{2} \end{bmatrix} \\ \Delta \hat{Z} &= \begin{bmatrix} \Delta \hat{Z}_{1,1} & \Delta \hat{Z}_{1,2} \\ \Delta \hat{Z}_{2,1} & \Delta \hat{Z}_{2,2} \end{bmatrix} \end{aligned}\] which in turn implies that \[\hat{Y}^{(0)} = \begin{bmatrix} \hat{Y}^{(0)}_{1} & 0 \\ 0 & \hat{Y}^{(0)}_{2} \end{bmatrix}\] must also hold; the existence of nontrivial diagonal and off-diagonal blocks in \(\Delta \hat{Z}\) typically arises from couplings to other components that are mathematically eliminated in favor of these two components. Evaluation of the energy transfer spectrum [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"} requires inversion of these block matrices of operators, which is saved for the appendix for the sake of brevity in this section. The result is written as \[\begin{gathered} \Phi = 4~\operatorname{Tr}\Bigg[\operatorname{asym}(\hat{Z}^{(0)\dagger}_{1}) (\hat{Z}^{(0)\dagger}_{1} + \Delta \hat{Z}^{\dagger}_{1,1})^{-1} \times \\ (\hat{1}-\Delta \hat{Z}^{\dagger}_{2,1} (\hat{Z}^{(0)\dagger}_{2} + \Delta \hat{Z}^{\dagger}_{2,2})^{-1} \Delta \hat{Z}^{\dagger}_{1,2} (\hat{Z}^{(0)\dagger}_{1} + \Delta \hat{Z}^{\dagger}_{1,1})^{-1})^{-1} \times \\ \Delta \hat{Z}^{\dagger}_{2,1} (\hat{Z}^{(0)\dagger}_{2} + \Delta \hat{Z}^{\dagger}_{2,2})^{-1} \times \\ \operatorname{asym}(\hat{Z}^{(0)\dagger}_{2}) (\hat{Z}^{(0)}_{2} + \Delta \hat{Z}_{2,2})^{-1} \Delta \hat{Z}_{2,1} \times \\ (\hat{1}- (\hat{Z}^{(0)}_{1} + \Delta \hat{Z}_{1,1})^{-1} \Delta \hat{Z}_{1,2} (\hat{Z}^{(0)}_{2} + \Delta \hat{Z}_{2,2})^{-1} \Delta \hat{Z}_{2,1})^{-1} \times \\ (\hat{Z}^{(0)}_{1} + \Delta \hat{Z}_{1,1})^{-1}\Bigg] \end{gathered}\] and as \(\operatorname{asym}(\hat{Z}^{(0)\dagger}_{1})\) and \(\operatorname{asym}(\hat{Z}^{(0)\dagger}_{2})\) are Hermitian positive-semidefinite operators with well-defined Hermitian square roots, then the energy transfer spectrum is nonnegative. Exploiting this further allows for factorizing \(\operatorname{asym}(\hat{Z}^{(0)\dagger}_{n}) = (\operatorname{asym}(\hat{Z}^{(0)\dagger}_{n})^{1/2})^{2}\) for each component \(n \in \{1, 2\}\), and rearranging the trace allows for writing \[\begin{gathered} \label{eq:Phi2bodydirect} \Phi(\omega) = 4~\Bigg\Vert \operatorname{asym}(\hat{Z}^{(0)\dagger}_{2})^{1/2} (\hat{Z}^{(0)}_{2} + \Delta \hat{Z}_{2,2})^{-1} \Delta \hat{Z}_{2,1} \times \\ (\hat{1}- (\hat{Z}^{(0)}_{1} + \Delta \hat{Z}_{1,1})^{-1} \Delta \hat{Z}_{1,2} (\hat{Z}^{(0)}_{2} + \Delta \hat{Z}_{2,2})^{-1} \Delta \hat{Z}_{2,1})^{-1} \times \\ (\hat{Z}^{(0)}_{1} + \Delta \hat{Z}_{1,1})^{-1} \operatorname{asym}(\hat{Z}^{(0)\dagger}_{1})^{1/2} \Bigg\Vert_{\mathrm{F}}^{2} \end{gathered}\] where \(\left\Vert \hat{A} \right\Vert_{\mathrm{F}} = \sqrt{\trace{\hat{A}^{\dagger} \hat{A}}}\) is the Frobenius norm. This is the general NEGF formula for the energy transfer spectrum between two components in direct contact, in terms of their individual and mutual responses. ## Two components coupled via an intermediate component We now consider the case of the two components, labeled 1 or 2, which are coupled only to a third intermediate component, labeled 3, but not directly to each other. Mathematically, this means the operators \(\hat{Z}^{(0)}\) and \(\Delta \hat{Z}\) describing the equations of motion and couplings among these components may be written as \(3\times 3\) block matrices \[\begin{aligned} \hat{Z}^{(0)} &= \begin{bmatrix} \hat{Z}^{(0)}_{1} & 0 & 0 \\ 0 & \hat{Z}^{(0)}_{2} & 0 \\ 0 & 0 & \hat{Z}^{(0)}_{3} \end{bmatrix} \\ \Delta \hat{Z} &= \begin{bmatrix} 0 & 0 & \Delta \hat{Z}_{1,3} \\ 0 & 0 & \Delta \hat{Z}_{2,3} \\ \Delta \hat{Z}_{3,1} & \Delta \hat{Z}_{3,2} & 0 \end{bmatrix} \end{aligned}\] which in turn implies that \[\hat{Y}^{(0)} = \begin{bmatrix} \hat{Y}^{(0)}_{1} & 0 & 0 \\ 0 & \hat{Y}^{(0)}_{2} & 0 \\ 0 & 0 & \hat{Y}^{(0)}_{3} \end{bmatrix}\] must also hold, where the vanishing of the components \(\Delta\hat{Z}_{1,2} = (\Delta\hat{Z}_{2,1})^{\top}\) follows from the assumption that components 1 & 2 have no direct coupling to each other; we also point out that compared to the general two-component formula, here we do not include couplings between a given component and itself (i.e. \(\Delta \hat{Z}\) has vanishing diagonal blocks), as we assume that there are no other components which we have implicitly eliminated. Once again leaving the details to the appendix, and again making use of the fact that \(\operatorname{asym}(\hat{Y}^{(0)}_{1})\) and \(\operatorname{asym}(\hat{Y}^{(0)}_{2})\) are Hermitian positive-semidefinite operators to factorize the trace expression, we write [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"} as \[\begin{gathered} \label{eq:Phi2bodyviathird} \Phi(\omega) = 4~\Bigg\Vert \operatorname{asym}(\hat{Y}^{(0)}_{2})^{1/2} \Delta \hat{Z}_{2,3} \times \\ (\hat{Z}^{(0)}_{3}-\Delta \hat{Z}_{3,1} \hat{Y}^{(0)}_{1} \Delta \hat{Z}_{1,3}-\Delta \hat{Z}_{3,2} \hat{Y}^{(0)}_{2} \Delta \hat{Z}_{2,3})^{-1} \times \\ \Delta \hat{Z}_{3,1} \operatorname{asym}(\hat{Y}^{(0)}_{1})^{1/2} \Bigg\Vert_{\mathrm{F}}^{2} \end{gathered}\] so that all operator products may be evaluated in the space of component 3. This is the general NEGF formula for the energy transfer spectrum between two components in contact only with a third in terms of their individual responses and mutual couplings. In the previous subsection, it was noted that for heat transfer between two components that are directly coupled, the couplings \(\Delta \hat{Z}_{mn}\) for \(m, n \in \{1, 2\}\) (particularly the diagonal blocks) often arise from mathematically eliminating another component to which these two components are coupled, even if those are the only couplings. At this point, we rigorously prove this equivalence for the specific case where the two components are physically coupled only to a third component. We start by rewriting [\[totallinearresponse\]](#totallinearresponse){reference-type="eqref" reference="totallinearresponse"} in terms of the degrees of freedom of the three components and noting that \(\ket{x^{(0)}} = \hat{P}_{1} \ket{x^{(0)}}\) can be used when considering energy transfer from component 1 to component 2. Explicitly, this means writing \[\begin{bmatrix} \hat{Z}^{(0)}_{1} & 0 & \Delta \hat{Z}_{1,3} \\ 0 & \hat{Z}^{(0)}_{2} & \Delta \hat{Z}_{2,3} \\ \Delta \hat{Z}_{3,1} & \Delta \hat{Z}_{3,2} & \hat{Z}^{(0)}_{3} \end{bmatrix} \begin{bmatrix} \ket{x_{1}} \\ \ket{x_{2}} \\ \ket{x_{3}} \end{bmatrix} = \begin{bmatrix} \hat{Z}^{(0)}_{1} \ket{x^{(0)}_{1}} \\ 0 \\ 0 \end{bmatrix}\] and then eliminating \(\ket{x_{3}} =-\hat{Y}^{(0)}_{3} (\Delta \hat{Z}_{3,1} \ket{x_{1}} + \Delta \hat{Z}_{3,2} \ket{x_{2}})\). This yields the simpler equation in terms of \(2\times 2\) block matrices \[\begin{gathered} \begin{bmatrix} \hat{Z}^{(0)}_{1}-\Delta \hat{Z}_{1,3} \hat{Y}^{(0)}_{3} \Delta \hat{Z}_{3,1} &-\Delta \hat{Z}_{1,3} \hat{Y}^{(0)}_{3} \Delta \hat{Z}_{3,2} \\ -\Delta \hat{Z}_{2,3} \hat{Y}^{(0)}_{3} \Delta \hat{Z}_{3,1} & \hat{Z}^{(0)}_{2}-\Delta \hat{Z}_{2,3} \hat{Y}^{(0)}_{3} \Delta \hat{Z}_{3,2} \end{bmatrix} \begin{bmatrix} \ket{x_{1}} \\ \ket{x_{2}} \end{bmatrix} \\ = \begin{bmatrix} \hat{Z}^{(0)}_{1} \ket{x^{(0)}_{1}} \\ 0 \end{bmatrix} \end{gathered}\] whence the replacements \[\begin{aligned} \hat{Z}^{(0)} &\to \begin{bmatrix} \hat{Z}^{(0)}_{1} & 0 \\ 0 & \hat{Z}^{(0)}_{2} \end{bmatrix} \\ \Delta \hat{Z} &\to \begin{bmatrix} -\Delta \hat{Z}_{1,3} \hat{Y}^{(0)}_{3} \Delta \hat{Z}_{3,1} & -\Delta \hat{Z}_{1,3} \hat{Y}^{(0)}_{3} \Delta \hat{Z}_{3,2} \\ -\Delta \hat{Z}_{2,3} \hat{Y}^{(0)}_{3} \Delta \hat{Z}_{3,1} & -\Delta \hat{Z}_{2,3} \hat{Y}^{(0)}_{3} \Delta \hat{Z}_{3,2} \end{bmatrix} \end{aligned}\] may be made. Hence, the remainder of the derivation of the expression for heat transfer is the same, as [\[FDT\]](#FDT){reference-type="eqref" reference="FDT"} for component 1 and the expression \(\dot{W} = \int_{-\infty}^{\infty} \int_{-\infty}^{\infty} \bracket{\trace{-\operatorname{i}\omega \hat{P}_{2} \ket{x(\omega)} \bra{F(\omega')} \hat{P}_{2}} e^{-\operatorname{i}(\omega- \omega')t}}~\frac{\mathrm{d}\omega~\mathrm{d}\omega'}{(2\pi)^{2}}\) for the power transfer are both unchanged, thereby proving the equivalence between the two expressions ( and ) for the general NEGF energy transfer spectrum with these identifications in mind. Writing the energy transfer spectrum as [\[Phi2bodyviathird\]](#Phi2bodyviathird){reference-type="eqref" reference="Phi2bodyviathird"} can not only clarify analogies between PCHT and RHT, but it also naturally leads to expressions for upper bounds on the spectrum. To derive such bounds, it will be helpful to define the operators \(\hat{\Lambda}_{n} = \Delta \hat{Z}_{n,3}^{\dagger} \operatorname{asym}(\hat{Y}^{(0)}_{n}) \Delta \hat{Z}_{n,3}\), being the dissipation of each component \(n \in \{1, 2\}\) multiplied by the corresponding couplings to component 3, and the Green's function of component 3 \[\hat{Y}_{3} \equiv (\hat{Z}^{(0)}_{3}-\Delta \hat{Z}_{3,1} \hat{Y}^{(0)}_{1} \Delta \hat{Z}_{1,3}-\Delta \hat{Z}_{3,2} \hat{Y}^{(0)}_{2} \Delta \hat{Z}_{2,3})^{-1}\] which is modified from its bare value \(\hat{Y}^{(0)}_{3}\) due to couplings to components 1 & 2. Given this, we will show that the energy transfer spectrum can be written in the Landauer form [@KlocknerPRB2018; @KlocknerPRB2017; @SongAIPADV2015; @SegalARPC2016] as \(\Phi = \left\lVert \hat{t} \right\rVert_{\mathrm{F}}^{2}\) where \(\hat{t} = 2\hat{\Lambda}_{2}^{1/2} \hat{Y}_{3} \hat{\Lambda}_{1}^{1/2}\). The goal then will be to place bounds on the eigenvalues of \(\hat{t}^{\dagger} \hat{t}\) at each \(\omega\). The fact that \(\hat{t}^{\dagger} \hat{t}\) is Hermitian positive-semidefinite makes clear that its eigenvalues, called the transmission eigenvalues (as \(\hat{t}^{\dagger} \hat{t}\) is like a transmission intensity matrix), are all nonnegative, placing a lower bound on their values. The following will show how to derive upper bounds of unity on the transmission eigenvalues. The derivations thus far have actually not made use of the reciprocity of the system, namely that \(\hat{Z}^{(0)}_{3} = \hat{Z}^{(0)\top}_{3}\), \(\hat{Z}^{(0)}_{n} = \hat{Z}^{(0)\top}_{n}\), and \(\Delta \hat{Z}_{n,3} = \Delta \hat{Z}_{3,n}^{\top}\) for \(n \in \{1, 2\}\), but these reciprocity relations are needed for the upper bounds on the transmission eigenvalues. Additionally, two further assumptions are needed, namely that \(\operatorname{asym}(\hat{Z}^{(0)}_{3}) \to 0\), and that the block matrices \(\Delta \hat{Z}_{n,3}\) for \(n \in \{1, 2\}\) are purely real. These assumptions will later be justified for the particular cases of PCHT as well as RHT. With this, it can be seen that \(\operatorname{asym}(\hat{Y}_{3}) = \hat{Y}_{3}^{\dagger} \operatorname{asym}(\hat{Y}_{3}^{-1\dagger}) \hat{Y}_{3}\). Expanding the middle term after exploiting \(\operatorname{asym}(\hat{Z}^{(0)}_{3}) = 0\) gives \(\operatorname{asym}(\hat{Y}_{3}^{-1}) =-\hat{\Lambda}_{1}-\hat{\Lambda}_{2}\), as the real-valued and reciprocal nature of \(\Delta \hat{Z}_{n,3}\) imply \(\Delta \hat{Z}_{3,n} \operatorname{asym}(\hat{Y}^{(0)}_{n}) \Delta \hat{Z}_{n,3} = \Delta \hat{Z}_{n,3}^{\dagger} \operatorname{asym}(\hat{Y}^{(0)}_{n}) \Delta \hat{Z}_{n,3}\) for \(n \in \{1, 2\}\). This means \(\operatorname{asym}(\hat{Y}_{3}^{-1\dagger}) =-\operatorname{asym}(\hat{Y}_{3}^{-1}) = \hat{\Lambda}_{1} + \hat{\Lambda}_{2}\). Therefore, \(\operatorname{asym}(\hat{Y}_{3}) = \hat{Y}_{3}^{\dagger} (\hat{\Lambda}_{1} + \hat{\Lambda}_{2}) \hat{Y}_{3}\). This expression may be rearranged as \(\hat{Y}_{3}^{\dagger} \hat{\Lambda}_{1} \hat{Y}_{3} + \hat{Y}_{3}^{\dagger} \hat{\Lambda}_{2} \hat{Y}_{3}-\operatorname{asym}(\hat{Y}_{3}) = 0\), and as \(\hat{\Lambda}_{1}\) is Hermitian positive-semidefinite, then \(\hat{\Lambda}_{1}^{1/2}\) exists, so this expression may be multiplied on the left and right by \(2\hat{\Lambda}_{1}^{1/2}\) to yield \(\hat{t}^{\dagger} \hat{t} + 4\hat{\Lambda}_{1}^{1/2} \hat{Y}_{3}^{\dagger} \hat{\Lambda}_{1} \hat{Y}_{3} \hat{\Lambda}_{1}^{1/2}-\frac{2}{\operatorname{i}} \left(\hat{\Lambda}_{1}^{1/2} \hat{Y}_{3} \hat{\Lambda}_{1}^{1/2}-\hat{\Lambda}_{1}^{1/2} \hat{Y}_{3}^{\dagger} \hat{\Lambda}_{1}^{1/2} \right) = 0\), where as a reminder, \(\hat{t} = 2\hat{\Lambda}_{2}^{1/2} \hat{Y}_{3} \hat{\Lambda}_{1}^{1/2}\). Finally, adding the identity operator \(\hat{1}\) to both sides yields \(\hat{t}^{\dagger} \hat{t} + 4\hat{\Lambda}_{1}^{1/2} \hat{Y}_{3}^{\dagger} \hat{\Lambda}_{1} \hat{Y}_{3} \hat{\Lambda}_{1}^{1/2}-\frac{2}{\operatorname{i}} \left(\hat{\Lambda}_{1}^{1/2} \hat{Y}_{3} \hat{\Lambda}_{1}^{1/2}-\hat{\Lambda}_{1}^{1/2} \hat{Y}_{3}^{\dagger} \hat{\Lambda}_{1}^{1/2} \right) + \hat{1} = \hat{1}\). This expression can be rewritten as \(\hat{t}^{\dagger} \hat{t} + (\hat{1}-\frac{2}{\operatorname{i}} \hat{\Lambda}_{1}^{1/2} \hat{Y}_{3} \hat{\Lambda}_{1}^{1/2})^{\dagger} (\hat{1}-\frac{2}{\operatorname{i}} \hat{\Lambda}_{1}^{1/2} \hat{Y}_{3} \hat{\Lambda}_{1}^{1/2}) = \hat{1}\), showing that \(4\hat{t}^{\dagger} \hat{t}\) is added another Hermitian positive-semidefinite operator to yield the identity. Therefore, the eigenvalues of \(\hat{t}^{\dagger} \hat{t}\) can never exceed 1, matching the prior expressions [@Datta1995; @PaulyNJP2008; @KlocknerPRB2018; @SadasivamPRB2017]. Additionally, because the operator \(\hat{1}-\frac{2}{\operatorname{i}} \hat{\Lambda}_{1}^{1/2} \hat{Y}_{3} \hat{\Lambda}_{1}^{1/2}\) is not the zero operator, its rank must be at least 1, meaning at least one of its eigenvalues must be strictly positive; in turn, at least one of the eigenvalues of \(\hat{t}^{\dagger} \hat{t}\) must be strictly less than \(1\). We stress that whenever heat transfer between two components that are directly coupled can be physically equated to heat transfer between the same two components with effective couplings only via a third (possibly aggregate) component, these transmission eigenvalue bounds must hold for that system. Additionally, we expect that even if \(\Delta \hat{Z}\) were to have nonzero blocks other than \(\Delta \hat{Z}_{n,3}\) (and their transposes) for components \(n \in \{1, 2\}\), which could represent more general heat transfer between a pair of components among a collection of \(N\) components (for any integer \(N \geq 3\)) by virtue of aggregating the other components into an overall third intermediate component, similar bounds should hold in general, though we do not prove that statement; put simply, Landauer bounds of unity should hold for each channel even between two components connected via a third where each of these components could in principle be connected to many other components in turn. # Applications to PCHT {#sec:PCHT} The general NEGF formalism and expression for the energy transfer spectrum [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"} applies to PCHT among a collection of material bodies, modeled as effective harmonic oscillators connected to each other via harmonic short-or long-range couplings, each maintained at separate uniform temperature. Prior works have typically focused on PCHT between two large bodies, typically leads acting as thermal reservoirs, exchanging heat via harmonic coupling through a third small body in between, typically a molecular junction or a thin interfacial film; computationally, this has the benefit of allowing most matrix evaluations to occur in the much smaller space of the intermediate body as opposed to the larger space of one of the leads. Given this, in what follows, we derive the equations of motion for collective atomic oscillations effecting phonons from the Lagrangian for three bodies, each comprising collections of coupled oscillators with masses \(m_{\alpha a}\), displacements \(x_{\alpha ai}\), and spring couplings \(K_{\alpha ai, \beta bj}\) for body labels \(\alpha, \beta \in \{1, 2, 3\}\), atomic labels \(a, b, c\) within each body, and Cartesian indices \(i, j, k \in \{x, y, z\}\), with sources only in body \(\alpha = 1\) denoted \(x^{(0)}_{1ai}\). Note for comparison with previous work that bodies 1 and 2, representing infinite reservoirs (leads), are typically labeled L and R, while body 3, representing an compact intermediate (central) device, is typically labeled C. We emphasize that while our derivations focus on the particular case of two bodies connected to a third in order to make connections to past work clearer, the correspondence between abstract linear operators and specific quantities of interest to PCHT is easily generalized to PCHT among a collection of coupled bodies. The Lagrangian for this system is written as \[\begin{gathered} 2L = \sum_{a,i} m_{1a} (\dot{x}_{1ai}-\dot{x}^{(0)}_{1ai})^{2}- \\ \sum_{a,i,a',i'} K_{1ai,1a'i'} (x_{1ai}- x^{(0)}_{1ai})(x_{1a'i'}-x^{(0)}_{1a'i'})-\\ \sum_{a,i,c,k} (K_{1ai,3ck} + K_{3ck,1ai})x_{1ai}x_{3ck} + \\ \sum_{b,j} m_{2b} \dot{x}_{2bj}^{2}-\sum_{b,j,b',j'} K_{2bj,2b'j'} x_{2bj} x_{2b'j'} -\\ \sum_{b,j,c,k} (K_{2bj,3ck} + K_{3ck,2bj})x_{2bj} x_{3ck} + \\ \sum_{c,k} m_{3c} \dot{x}_{3ck}^{2}-\sum_{c,k,c',k'} K_{3ck,3c'k'} x_{3ck} x_{3c'k'} \end{gathered}\] and minimization of the action \(S = \int_{-\infty}^{\infty} L~\mathrm{d}t\) leads to the time domain classical equations of motion \[\begin{gathered} m_{1a} \ddot{x}_{1ai} + \sum_{a',i'} K_{1ai,1a'i'} x_{1a'i'} + \sum_{c,k} K_{1ai,3ck} x_{3ck} = \\ m_{1a} \ddot{x}^{(0)}_{1ai} + \sum_{a',i'} K_{1ai,1a'i'} x^{(0)}_{1a'i'} \\ m_{2b} \ddot{x}_{2bj} + \sum_{b',j'} K_{2bj,2b'j'} x_{2b'j'} + \sum_{c,k} K_{2bj,3ck} x_{3ck} = 0 \\ m_{3c} \ddot{x}_{3ck} + \sum_{c',k'} K_{3ck,3c'k'} x_{3c'k'} + \\ \sum_{a,i} K_{3ck,1ai} x_{1ai} + \sum_{b,j} K_{3ck,2bj} x_{2bj} =0 \end{gathered}\] for these displacements. In the frequency domain, these become \[\begin{gathered} -\omega^{2} m_{1a} x_{1ai} + \sum_{a',i'} K_{1ai,1a'i'} x_{1a'i'} + \sum_{c,k} K_{1ai,3ck} x_{3ck} = \\-\omega^{2} m_{1a} x^{(0)}_{1ai} + \sum_{a',i'} K_{1ai,1a'i'} x^{(0)}_{1a'i'} \\-\omega^{2} m_{2b} x_{2bj} + \sum_{b',j'} K_{2bj,2b'j'} x_{2b'j'} + \sum_{c,k} K_{2bj,3ck} x_{3ck} = 0 \\-\omega^{2} m_{3c} x_{3ck} + \sum_{c',k'} K_{3ck,3c'k'} x_{3c'k'} + \\ \sum_{a,i} K_{3ck,1ai} x_{1ai} + \sum_{b,j} K_{3ck,2bj} x_{2bj} = 0 \end{gathered}\] and these equations can be collected into matrix form with vectors \(x_{\alpha}\) and matrices \(K_{\alpha\beta}\) and \(M_{\alpha}\), upon which the identifications \(\hat{Z}^{(0)}_{\alpha} \to K_{\alpha\alpha}-\omega^{2} M_{\alpha}\) and \(\Delta \hat{Z}_{\alpha\beta} \to (1-\delta_{\alpha\beta})K_{\alpha\beta}\) can be made, where \(K_{\alpha\beta} = K_{\beta\alpha}^{\top}\) are real-valued, and \(M_{\alpha}\) are real-valued too; we note that the as the matrices \(K\) encode spring constants which multiply *differences* in atomic positions (i.e. relative displacements) to yield forces, the diagonal blocks \(K_{\alpha\alpha}\) entering \(\hat{Z}^{(0)}_{\alpha}\) should actually include the effects of couplings to other bodies as are present in the off-diagonal blocks \(K_{\alpha\beta}\) for all \(\beta \neq \alpha\), so that all forces are balanced in the equations of motion. With these replacements, the energy transfer spectrum becomes \[\begin{gathered} \Phi = \\ 4~\operatorname{Tr}\Bigg[K_{3,1} \operatorname{asym}((K_{1,1}- \omega^{2} M_{1})^{-1}) K_{1,3} (K_{3,3}-\omega^{2} M_{3}- \\ K_{3,1} (K_{1,1}-\omega^{2} M_{1})^{-1} K_{1,3}-K_{3,2} (K_{2,2}-\omega^{2} M_{2})^{-1} K_{2,3})^{-1\dagger} \times \\ K_{3,2} \operatorname{asym}((K_{2,2}-\omega^{2} M_{2})^{-1}) K_{2,3} (K_{3,3}-\omega^{2} M_{3}-\\ K_{3,1} (K_{1,1}-\omega^{2} M_{1})^{-1} K_{1,3}-K_{3,2} (K_{2,2}-\omega^{2} M_{2})^{-1} K_{2,3})^{-1}\Bigg] \end{gathered}\] where the identifications \[\hat{Y}^{(0)}_{\alpha} \to g_{\alpha} = (K_{\alpha\alpha}- \omega^{2} M_{\alpha})^{-1}\] as the retarded Green's function of lead \(\alpha \in \{1, 2\}\) (with \(g_{\alpha}^{\dagger}\) being the advanced Green's function), \[\hat{Y}_{3} \to G = (K_{3,3}-\omega^{2} M_{3}-K_{3,1} g_{1} K_{1,3}-K_{3,2} g_{2} K_{2,3})^{-1}\] as the retarded Green's function of the device including connections to the leads (with \(G^{\dagger}\) being the advanced Green's function), and \[\Lambda_{\alpha} = K_{3,\alpha} \operatorname{asym}(g_{\alpha}) K_{\alpha,3}\] for \(\alpha \in \{1, 2\}\) being the dissipation terms at the interface of the device with each lead can immediately be made. Thus, this general formalism does reproduce the standard Landauer formula [@MingoPRB2003; @KlocknerPRB2018; @KlocknerPRB2017; @SegalARPC2016] \[\Phi(\omega) = 4~\trace{\Lambda_{1} G^{\dagger} \Lambda_{2} G}\] for phonon heat transport between two leads across a device. Note that while \(K_{\alpha\alpha}\) and \(M_{\alpha}\) are real-valued, \(g_{\alpha}\) is complex-valued because inversion of an infinite-dimensional matrix is made finite-dimensional by considering propagation of phonons far from the device interface to be equivalent to energy loss (so \(G\) is also complex-valued in turn); alternatively, if the leads are large but finite, dissipation may be added heuristically by replacing, including in the definitions of \(g_{\alpha}\), every instance of \(-\omega^{2} M_{\alpha}\) with \(-\operatorname{i}\omega B_{\alpha}-\omega^{2} M_{\alpha}\) for \(\alpha \in \{1, 2\}\) where the diagonal positive-definite matrices \(B_{\alpha}\) represent appropriate dissipation coefficients for the oscillators. Additionally, the assumptions underlying the derivation of the upper bound on the transmission eigenvalues hold here, so those derivations remain valid in this context: all of the \(K\) and \(M\) matrices are real-valued and reciprocal, and \(\operatorname{asym}(K_{3,3}-\omega^{2} M_{3}) = 0\) because the compact device will not have any channels for dissipation in the absence of coupling to reservoirs (leads). Thus, the general NEGF formalism for heat transfer in linear response systems can be exactly mapped to the specific NEGF formalism for linear PCHT. Physically, the harmonic oscillators represent nuclei dressed by inner-shell electrons, and the couplings represent chemical bonds between these oscillators, typically computed via density functional theory and often anisotropic. We again stress that the correspondences \(\hat{Z}^{(0)}_{\alpha} \to K_{\alpha\alpha}-\omega^{2} M_{\alpha}\) and \(\Delta \hat{Z}_{\alpha\beta} \to (1-\delta_{\alpha\beta})K_{\alpha\beta}\) for PCHT are generally applicable even beyond the specific case of two bodies coupled only to a third intermediate body, which allows more general scenarios for PCHT to be treated using [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"}; moreover, these derivations do not assume that the material bodies exhibit any particular geometry or spatial symmetry properties. # Applications to RHT {#sec:RHT} The general NEGF formalism and expression for the energy transfer spectrum [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"} also applies to RHT among a collection of linearly polarizable bodies that can radiate EM fields. Prior works have typically focused on RHT between two polarizable bodies, whether spatially compact or of infinite extent, in vacuum. The connection to the above general linear response formalism for heat transfer requires somewhat more of a conceptual leap compared to the connection for PCHT. In particular, components 1 & 2 are the polarizable material bodies in question, while component 3, rather than representing a material body, is actually the *vacuum EM field* pervading all of space. A Lagrangian for this system can easily be written for the case where the polarizable bodies are made of atomic harmonic oscillators, with equilibrium positions \(\vec{r}_{\alpha a}\) for body \(\alpha \in \{1, 2\}\) and atom label \(a\), and with charges \(q_{\alpha a}\) that couple to EM fields; the sources are taken to be in body 1. That said, the results are generalizable to other linear media whose response functions are more complicated than those of harmonic oscillators, and to cases with more than 2 material bodies present; in particular, the use of partial bound charges associated with harmonic oscillators more accurately describes polar dielectric media compared to metals, but the results are generalizable to metals, semimetals, and other media with susceptibilities that may be nonlocal, inhomogeneous, or anisotropic. The Lagrangian for this system is written as \[\begin{gathered} 2L = \sum_{a,i} m_{1a} (\dot{x}_{1ai}-\dot{x}^{(0)}_{1ai})^{2}- \\ \sum_{a,i,a',i'} K_{1ai,1a'i'} (x_{1ai}- x^{(0)}_{1ai})(x_{1a'i'}-x^{(0)}_{1a'i'}) + \\ 2\sum_{a,i} q_{1a} \dot{x}_{1ai} A_{i} (\vec{r}_{1a}) + \sum_{b,j} m_{2b} \dot{x}_{2bj}^{2}-\\ \sum_{b,j,b',j'} K_{2bj,2b'j'} x_{2bj} x_{2b'j'} + 2\sum_{b,j} q_{2b} \dot{x}_{2bj} A_{j} (\vec{r}_{2b}) + \\ \int \left(\frac{1}{c^{2}} \left(\frac{\partial \vec{A}}{\partial t}\right)^{2}-(\nabla \times \vec{A})^{2}\right)~\mathrm{d}^{3} x \end{gathered}\] introducing the magnetic potential \(\vec{A}\), working in the Weyl gauge (vanishing electric potential). Minimizing the action \(S = \int_{0}^{\infty} L~\mathrm{d}t\) leads to the time domain classical equations of motion \[\begin{gathered} m_{1a} \ddot{x}_{1ai} + \sum_{a',i'} K_{1ai,1a'i'} x_{1a'i'}- q_{1a} E_{i} (\vec{r}_{1a}) = \\ m_{1a} \ddot{x}^{(0)}_{1ai} + \sum_{a',i'} K_{1ai,1a'i'} x^{(0)}_{1a'i'} \\ m_{2b} \ddot{x}_{2bj} + \sum_{b',j'} K_{2bj,2b'j'} x_{2b'j'}-q_{2b} E_{j} (\vec{r}_{2b}) = 0 \\ \left(\nabla \times (\nabla \times) + \frac{1}{c^{2}} \frac{\partial^{2}}{\partial t^{2}} \right) \vec{E} = \\ -\frac{1}{c^{2}} \left(\sum_{a} q_{1a} \ddot{\vec{x}}_{1a} \delta^{3} (\vec{x}-\vec{r}_{1a}) + \sum_{b} q_{2b} \ddot{\vec{x}}_{2b} \delta^{3} (\vec{x}-\vec{r}_{2b}) \right) \end{gathered}\] for the displacements \(x_{1ai}\) and \(x_{2bj}\) and electric field \(\vec{E}(t, \vec{x}) =-\frac{1}{c} \frac{\partial \vec{A}}{\partial t}\), where the magnetic contribution to the Lorentz force \(\frac{q_{\alpha a}}{c} \dot{\vec{x}}_{\alpha a} \times \vec{B}\) is dropped for each atom as it is a nonlinear term that has negligible contribution for speeds much less than the speed of light \(c\) (which is generally true for thermal fluctuations at reasonable temperatures). Although the third equation should initially be written in terms of \(\vec{A}\), a partial time derivative is applied to both sides of the equation to simplify the equations in terms of \(\vec{E}\). In the frequency domain, these equations of motion become \[\begin{gathered} -\omega^{2} m_{1a} x_{1ai} + \sum_{a',i'} K_{1ai,1a'i'} x_{1a'i'} -q_{1a} E_{i} (\vec{r}_{1a}) = \\-\omega^{2} m_{1a} x^{(0)}_{1ai} + \sum_{a',i'} K_{1ai,1a'i'} x^{(0)}_{1a'i'} \\ -\omega^{2} m_{2b} x_{2bj} + \sum_{b',j'} K_{2bj,2b'j'} x_{2b'j'} -q_{2b} E_{j} (\vec{r}_{2b}) = 0 \\ \left(\frac{c^{2}}{\omega^{2}} \nabla \times (\nabla \times)- 1\right) \vec{E} = \\ \left(\sum_{a} q_{1a} \vec{x}_{1a} \delta^{3} (\vec{x}-\vec{r}_{1a}) + \sum_{b} q_{2b} \vec{x}_{2b} \delta^{3} (\vec{x}-\vec{r}_{2b}) \right) \end{gathered}\] and these equations may again be collected into matrix form and identified with the generic linear response operators. For polarizable bodies \(\alpha \in \{1, 2\}\), the operators \[\hat{Z}^{(0)}_{\alpha} \to K_{\alpha\alpha}-\omega^{2} M_{\alpha}\] are the equations of motion defining the response. Meanwhile, \(\vec{E}\) is a field defined throughout all space, so matrix products correspond to convolution integrals in space: this means the operators \[\begin{aligned} \hat{Z}^{(0)}_{3} &\to \frac{c^{2}}{\omega^{2}} \nabla \times (\nabla \times)-1 \\ \hat{Y}^{(0)}_{3} &= \hat{Z}^{(0)-1}_{3} \to \mathbb{G}^{\mathrm{vac}} \end{aligned}\] correspond to the vacuum Maxwell partial differential operator and associated Green's function. Finally, in the first, second, and third equations, the coupling to the third component, i.e. the vacuum EM field, corresponds to \[\Delta \hat{Z}_{\alpha,3} \to-\sum_{a} q_{\alpha a} \delta_{ij} \delta^{3} (\vec{x}-\vec{r}_{\alpha a})\] which is the convolution operator representing the charge density of point dipoles constituting each polarizable body (with a sign flip due to the convention chosen for the general linear response formulas): these coupling operators are real-valued reciprocal operators, as evinced in the equations of motion. This also means that for \(\alpha \in \{1, 2\}\), the material response operators may be written in position space as \[\begin{gathered} \Delta \hat{Z}_{3,\alpha} \hat{Y}^{(0)}_{\alpha} \Delta \hat{Z}_{\alpha,3} \to \mathbb{V}_{\alpha ij} (\omega, \vec{x}, \vec{x}') = \\ \sum_{a,a'} q_{\alpha a} ((K_{\alpha\alpha}- \omega^{2} M_{\alpha})^{-1})_{ai,a'j} q_{\alpha a'} \delta^{3} (\vec{x}-\vec{r}_{\alpha a}) \delta^{3} (\vec{x}'- \vec{r}_{\alpha a'}) \end{gathered}\] which is exactly the susceptibility \(\mathbb{V}_{\alpha}\) of a collection of point dipolar harmonic oscillators, while \[\hat{Y}_{3} \to (\mathbb{G}^{\mathrm{vac}-1}-\mathbb{V}_{1}- \mathbb{V}_{2})^{-1} = \mathbb{G}\] is exactly the Maxwell Green's function in the presence of susceptibilities \(\hat{\chi}_{\alpha}\). Thus, the heat transfer between the two polarizable bodies can be written as \[\label{eq:GFPhi2bodyRHT} \Phi(\omega) = 4~\trace{\operatorname{asym}(\mathbb{V}_{1}) \mathbb{G}^{\dagger} \operatorname{asym}(\mathbb{V}_{2}) \mathbb{G}}\] which exactly matches the fluctuational EM expression . Additionally, the assumptions underlying the derivation of the upper bound on the transmission eigenvalues hold here, so those derivations remain valid in this context: the coupling operators representing the negative charge densities and real-valued and reciprocal, and \(\operatorname{asym}(\mathbb{G}^{\mathrm{vac}-1}) = 0\) comes from the properties of Maxwell's equations, while the fact that \(\operatorname{asym}(\mathbb{G}^{\mathrm{vac}})\) does not vanish due to free space supporting outward propagation of EM energy is irrelevant to those particular derivations. Thus, the general NEGF formalism for heat transfer in linear response systems can be exactly mapped to the specific fluctuational EM formalism for linear RHT. Physically, the harmonic oscillators may represent valence electrons or nuclei dressed by inner-shell electrons, and the couplings, namely the effective charges, along with the effective masses and spring constants are again computed via density functional theory. We again stress that the correspondences \(\Delta \hat{Z}_{3,\alpha} \hat{Y}^{(0)}_{\alpha} \Delta \hat{Z}_{\alpha,3} \to \mathbb{V}_{\alpha ij} (\omega, \vec{x}, \vec{x}')\) for RHT are generally applicable even for more than two polarizable bodies coupled to the vacuum EM field, which allows more general scenarios for PCHT to be treated using [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"} [@PolimeridisPRB2015; @VenkataramPRL2018]. Furthermore, the derivation of Landauer-like formulas for RHT [\[GFPhi2bodyRHT\]](#GFPhi2bodyRHT){reference-type="eqref" reference="GFPhi2bodyRHT"} is generally applicable for linear media even when the susceptibilities \(\mathbb{V}_{\alpha}\) do not describe harmonic oscillator response functions; our use of harmonic oscillators was for convenience in writing a Lagrangian and explaining salient features through physical intuition. Finally, we emphasize that unlike previous work which has typically depended on high-symmetry geometries and the assumption of the EM near-field regime [@TangPRAPP2019; @WangPRE2018; @ZhangPRB2018; @JiangPRB2017; @YuNATURE2017], these derivations are applicable to arbitrary geometries from the near-through far-field regimes. # Comparisons between PCHT and RHT {#sec:comparison} Before proceeding, it is useful to summarize the comparisons between PCHT and RHT specifically focusing on the case of two bodies interacting through a third component (either a third body for PCHT or the EM field for RHT), an analogy which is summarized Table [\[tab:comparisontab\]](#tab:comparisontab){reference-type="ref" reference="tab:comparisontab"} and illustrated schematically in . While the basic formalisms are essentially identical and both obey the same upper bounds, in what follows we emphasize a few of the distinctions. The typical situation considered for PCHT involves two semi-infinite leads connected by a much smaller molecular junction or interfacial region. As a result, when mapping \(\hat{Y}^{(0)}_{\alpha} \to g_{\alpha}\) for \(\alpha \in \{1, 2\}\), even though the microscopic oscillators have no dissipation so \(\operatorname{asym}(g_{\alpha}^{-1}) \to 0\), the fact that the leads are semi-infinite and act as thermodynamic reservoirs means \(\operatorname{asym}(g_{\alpha}) \neq 0\): this represents loss of energy through far-field propagation of phonons into the bulks of the leads. Meanwhile, when mapping \(\hat{Y}^{(0)}_{3} \to g_{3}\) for the junction or interfacial region, the compactness of that intermediate body precludes dissipation through far-field propagation of phonons, so not only is it true that \(\operatorname{asym}(g_{3}^{-1}) \to 0\) but it is also true that \(\operatorname{asym}(g_{3}) \to 0\). Moreover, the smallness of the intermediate body means that it is typically easier to evaluate the matrix products and inverses in the space of the intermediate body through [\[Phi2bodyviathird\]](#Phi2bodyviathird){reference-type="eqref" reference="Phi2bodyviathird"}. The situation is flipped for RHT, where typically energy exchange is considered between two compact bodies via EM fields that propagate through all of space. As a result, when mapping the response of lossless oscillators constituting each polarizable body in the mapping \(\Delta \hat{Z}_{3,\alpha} \hat{Y}^{(0)}_{\alpha} \Delta \hat{Z}_{\alpha,3} \to \mathbb{V}_{\alpha}\) for compact bodies \(\alpha \in \{1, 2\}\), taking literally the lack of dissipation would strictly imply that \(\operatorname{asym}(\mathbb{V}_{\alpha}) \to 0\), so heat transfer & other fluctuational EM phenomena would not exist. Realistically, these atomic oscillators are not perfectly lossless but are subject to losses through scattering and propagation of energy, which we do not consider here; this can be accounted for by properly including reservoir DOFs in the Lagrangian and performing some renormalization like decimation as in the phonon case for a physically-motivated reservoir, or more typically by phenomenologically adding an appropriate small imaginary part to some part of \(\mathbb{V}_{\alpha}\). Meanwhile, when mapping \(\hat{Y}^{(0)}_{3} \to \mathbb{G}^{\mathrm{vac}}\) through all of space, while it is true that \(\operatorname{asym}(\mathbb{G}^{\mathrm{vac}-1}) \to 0\) allows the same Landauer bounds to hold for RHT as for PCHT, the ability of free space to support outward propagation of EM energy also means \(\operatorname{asym}(\mathbb{G}^{\mathrm{vac}}) \neq 0\). Moreover, the fact that the polarizable bodies occupy compact regions in space (as opposed to all of space) means that it is typically easier to evaluate the matrix products and inverses in the spaces of the polarizable bodies through [\[Phi2bodydirect\]](#Phi2bodydirect){reference-type="eqref" reference="Phi2bodydirect"}. In particular, by using the operator correspondences from the previous section and linking [\[Phi2bodyviathird\]](#Phi2bodyviathird){reference-type="eqref" reference="Phi2bodyviathird"} to a special case of [\[Phi2bodydirect\]](#Phi2bodydirect){reference-type="eqref" reference="Phi2bodydirect"} as above, it can be shown that [\[Phi2bodydirect\]](#Phi2bodydirect){reference-type="eqref" reference="Phi2bodydirect"} exactly reproduces the T-operator formula for RHT . Along these lines, we finally note that in PCHT, the off-diagonal block of the Green's function of component 3 in isolation connecting the respective atoms coupled to each of the other components, which may be denoted \(P_{3(2)} g_{3} P_{3(1)}\), has a size, and therefore a maximum rank, that scales as the surface areas of component 3 coupled with each of the other components. For the case of RHT, the analogous quantity is \(\mathbb{P}_{2} \mathbb{G}^{\mathrm{vac}} \mathbb{P}_{1}\), where \(\mathbb{P}_{\alpha}\) is the projection operator onto the volume of body \(\alpha\): this seems to contrast with the dependence on surface area for PCHT. However, the EM surface equivalence theorem [@HarringtonJEWA1989; @RengarajanIEEE2000; @ReidPRA2013; @RodriguezPRB2013; @OteyJQSRT2014; @SCUFF1] shows that the fields radiated by any volumetric polarization distribution to the exterior of some fictitious bounding surface can be exactly reproduced in that exterior region by an equivalent surface current distribution, which therefore suggests that the rank of \(\mathbb{P}_{2} \mathbb{G}^{\mathrm{vac}} \mathbb{P}_{1}\) actually scales with the *surface* of each body, thereby producing a similar result as for mechanical waves. The underlying physical reasons are a little different: the general boundary conditions of EM fields at material interfaces for radiation contrast with the specific form of coupling of nearest-neighbor atoms for phonon propagation. That said, the similarities can be intuitively understood as arising from the similar physics governing mechanical wave propagation through homogeneous media as EM wave propagation through vacuum or homogeneous media: the spring constant matrix \(K\) governing mechanical wave propagation through a medium is essentially a discrete-space analogue of the \(\nabla \times (\nabla \times)\) operator governing EM wave propagation, and both of these operators are then equated to double time derivatives of the corresponding field quantities. Finally, we note that in the concluding remarks, we connect this paper to an accompanying manuscript that leverages this generic NEGF formalism to generalize recent bounds on RHT [@MoleskyPRB2020; @VenkataramPRL2020] to include PCHT: we point out that these bounds rely heavily on the singular values of the off-diagonal blocks \(\mathbb{P}_{2} \mathbb{G}^{\mathrm{vac}} \mathbb{P}_{1}\) in the case of RHT, or \(P_{3(2)} g_{3} P_{3(1)}\) in the case of PCHT. # Unifying PCHT and RHT {#sec:unification} At nanometric and smaller separations, we expect that both PCHT and RHT could exhibit comparable contributions to overall heat transfer between two material bodies, whether through approach to direct contact or through contact with an intermediate junction [@KimNATURE2015; @KloppstechNATURE2017; @CuiNATURE2017; @CuiSCIENCE2017; @CuiNATURE2019; @StGelaisNATURE2016]. Thus motivated, we use this section to present a method for unifying both forms of heat transfer in both of these scenarios. This method is based on the retarded many-body (RMB) framework of mesoscale fluctuational EM , allowing for accurate modeling of fluctuational EM phenomena, including RHT, in atom-scale systems. Each body \(\alpha \in \{1, 2, 3\}\) comprises \(N_{\alpha}\) atoms labeled \(a, b, c\). Each atom is centered at an equilibrium position \(\vec{r}_{\alpha a}\) and has an effective nuclear oscillator of mass \(m_{\mathrm{I}\alpha a}\) which couples to other nuclear oscillators within the same body and which may couple to nuclear oscillators in other bodies at interfaces: these couplings are encoded in the matrices \(K_{\mathrm{I}\alpha\alpha}\) within the same body and \(K_{\mathrm{I}\alpha\beta}\) between different bodies, where the former has dimension \(3N_{\alpha} \times 3N_{\alpha}\) while the latter has dimension \(3N_{\alpha} \times 3N_{\beta}\). The effective nuclear oscillator in each atom is also coupled to an effective valence electronic oscillator of mass \(m_{\mathrm{e}\alpha a}\) through an isotropic spring constant \(k_{\mathrm{e}\alpha a}\). The valence electronic oscillators couple as point charges to the vacuum EM field via the charge \(q_{\mathrm{e}\alpha a}\); these electrons along with the inner electrons screen the nuclei, so we model the nuclear oscillators as having no direct coupling to the EM field. The displacements of the effective valence electronic oscillators are labeled \(x_{\mathrm{e}\alpha ai}\), while those of the nuclear oscillators are labeled \(x_{\mathrm{I}\alpha ai}\), for Cartesian direction \(i\). We collect the displacements into \(3N_{\alpha}\)-dimensional vectors \(x_{\mathrm{e}\alpha}\) and \(x_{\mathrm{I}\alpha}\), and the masses, charges, and valence electronic spring couplings into diagonal \(3N_{\alpha} \times 3N_{\alpha}\) matrices \(M_{\mathrm{e}\alpha}\), \(M_{\mathrm{I}\alpha}\), \(Q_{\mathrm{e}\alpha}\), and \(K_{\mathrm{e}\alpha}\). Additionally, the electric field in vacuum must be evaluated at each equilibrium position \(\vec{r}_{\alpha a}\) when entering the equations of motion for the effective valence electronic oscillators, so we collect the \(N_{\alpha}\) Cartesian vectors \(\vec{E}(\vec{r}_{\alpha a})\) into the \(3N_{\alpha}\)-dimensional vector \(e_{\mathrm{e}\alpha}\). For two bodies coming into direct conductive contact (with no third intermediate material body present) and interacting via the vacuum EM field, we may use the above matrix notation to write the equations of motion as \[\begin{gathered} \label{eq:PCHTRHTequationsofmotion} (K_{\mathrm{e}\alpha}-\omega^{2} M_{\mathrm{e}\alpha})x_{\mathrm{e}\alpha}-K_{\mathrm{e}\alpha} x_{\mathrm{I}\alpha}-Q_{\mathrm{e}\alpha} e_{\mathrm{e}\alpha} \\ = ((K_{\mathrm{e}\alpha}-\omega^{2} M_{\mathrm{e}\alpha})x_{\mathrm{e}\alpha}-K_{\mathrm{e}\alpha} x_{\mathrm{I}\alpha})\delta_{\alpha, 1} \\ (K_{\mathrm{e}\alpha}- \omega^{2} M_{\mathrm{I}\alpha}) x_{\mathrm{I}\alpha} + \sum_{\beta} K_{\mathrm{I}\alpha\beta} x_{\mathrm{I}\beta}- K_{\mathrm{e}\alpha} x_{\mathrm{e}\alpha} = 0 \\ \left(\frac{c^{2}}{\omega^{2}} \nabla \times (\nabla \times)- 1\right) \vec{E} = \\ \sum_{\alpha,a} q_{\mathrm{e}\alpha a} \vec{x}_{\mathrm{e}\alpha a} \delta^{3} (\vec{x}-\vec{r}_{\alpha a}) \end{gathered}\] for each \(\alpha, \beta \in \{1, 2\}\), \(a \in \{1, \ldots, N_{\alpha}\}\), and \(i \in \{x, y, z\}\), for sources in body 1. We may then formally solve the final equation and eliminate \(e_{\mathrm{e}\alpha}\) in favor of \(x_{\mathrm{e}\alpha}\) and \(x_{\mathrm{I}\alpha}\), yielding the equations of motion \[\begin{gathered} \label{eq:PCHTRHTreducedequations} (K_{\mathrm{e}\alpha}-\omega^{2} M_{\mathrm{e}\alpha})x_{\mathrm{e}\alpha}-K_{\mathrm{e}\alpha} x_{\mathrm{I}\alpha}-\sum_{\beta} Q_{\mathrm{e}\alpha} G^{\mathrm{vac}}_{\alpha\beta} Q_{\mathrm{e}\beta} x_{\mathrm{e}\beta} \\ = ((K_{\mathrm{e}\alpha}-\omega^{2} M_{\mathrm{e}\alpha})x^{(0)}_{\mathrm{e}\alpha}- K_{\mathrm{e}\alpha} x^{(0)}_{\mathrm{I}\alpha})\delta_{\alpha, 1} \\ (K_{\mathrm{e}\alpha}-\omega^{2} M_{\mathrm{I}\alpha}) x_{\mathrm{I}\alpha} + \sum_{\beta} K_{\mathrm{I}\alpha,\beta} x_{\mathrm{I}\beta}-K_{\mathrm{e}\alpha} x_{\mathrm{e}\alpha} = 0 \end{gathered}\] where \(G^{\mathrm{vac}}_{\alpha\beta}\) is the \(3N_{\alpha} \times 3N_{\beta}\) matrix whose elements are \(G^{\mathrm{vac}}_{ij}(\omega, \vec{r}_{\alpha a}, \vec{r}_{\beta b})\) for each pair of atomic coordinates. Hence, we identify the relevant operators as \(2\times 2\) block matrices \[\label{eq:PCHTRHToperators} \begin{split} \hat{Z}^{(0)}_{\alpha} &\to \begin{bmatrix} K_{\mathrm{e}\alpha}-\omega^{2} M_{\mathrm{e}\alpha} & -K_{\mathrm{e}\alpha} \\ -K_{\mathrm{e}\alpha} & K_{\mathrm{e}\alpha} + K_{\mathrm{I}\alpha\alpha}-\omega^{2} M_{\mathrm{I}\alpha} \end{bmatrix} \\ \Delta \hat{Z}_{\alpha\beta} &\to \begin{bmatrix} -Q_{\mathrm{e}\alpha} G^{\mathrm{vac}}_{\alpha\beta} Q_{\mathrm{e}\beta} & 0 \\ 0 & K_{\mathrm{I}\alpha\beta} (1-\delta_{\alpha\beta}) \end{bmatrix} \end{split}\] where the top row and left column blocks represent the effective valence electronic DOFs, while the bottom row and right column blocks represent the effective nuclear degrees of freedom. Strictly speaking, the matrices \(-\omega^{2} M_{\mathrm{e}\alpha}\) and \(-\omega^{2} M_{\mathrm{I}\alpha}\) should respectively be replaced by \(-\operatorname{i}\omega B_{\mathrm{e}\alpha}-\omega^{2} M_{\mathrm{e}\alpha}\) and \(-\operatorname{i}\omega B_{\mathrm{I}\alpha}-\omega^{2} M_{\mathrm{I}\alpha}\) in order to account for nonzero dissipation, though the dissipation matrices \(B_{\mathrm{e}\alpha}\) and \(B_{\mathrm{I}\alpha}\) may be taken to be infinitesimal; also, once again, the diagonal blocks \(K_{\mathrm{I}\alpha\alpha}\) entering \(\hat{Z}^{(0)}_{\alpha}\) should actually include the effects of couplings to nuclear oscillators in other bodies as are present in the off-diagonal blocks \(K_{\mathrm{I}\alpha\beta}\) for all \(\beta \neq \alpha\). With details explained in [@VenkataramPRL2018; @VenkataramSCIADV2019], the RMB oscillator matrix parameters \(Q_{\mathrm{e}\alpha}\), \(M_{\mathrm{e}\alpha}\), \(M_{\mathrm{I}\alpha}\), \(K_{\mathrm{e}\alpha}\), and \(K_{\mathrm{I}\alpha\alpha}\) (the latter initially excluding couplings to nuclear oscillators in other bodies) along with the equilibrium atomic positions are all computed using density functional theory (DFT) for each body in isolation, while the matrices \(B_{\mathrm{e}\alpha}\) and \(B_{\mathrm{I}\alpha}\) are assigned phenomenological values. These \(2\times 2\) block matrices can then be used in place of \(\hat{Z}^{(0)}_{\alpha}\) and \(\Delta \hat{Z}_{\alpha\beta}\) in the formula for two components with general couplings [\[Phi2bodydirect\]](#Phi2bodydirect){reference-type="eqref" reference="Phi2bodydirect"} to find the combined heat transfer including PCHT and RHT: the couplings among valence electronic and nuclear DOFs through EM fields means that PCHT and RHT contributions are not separable, but in fact affect each other . For two bodies whose nuclear coordinates are coupled only to a third intermediate body, which also has nuclear and valence electronic DOFs, in which all electronic coordinates are coupled to the EM field, the formalism is similar to above. In particular, the formulas in [\[PCHTRHTequationsofmotion\]](#PCHTRHTequationsofmotion){reference-type="eqref" reference="PCHTRHTequationsofmotion"} still hold for all bodies \(\alpha, \beta \in \{1, 2, 3\}\), although \(K_{\mathrm{I}1,3}\) and \(K_{\mathrm{I}2,3}\) and their transposes are the only nonzero off-diagonal blocks of \(K_{\mathrm{I}}\). With that caveat in mind, this further means that [\[PCHTRHTreducedequations\]](#PCHTRHTreducedequations){reference-type="eqref" reference="PCHTRHTreducedequations"} and the correspondences in [\[PCHTRHToperators\]](#PCHTRHToperators){reference-type="eqref" reference="PCHTRHToperators"} holds as well for all bodies \(\alpha, \beta \in \{1, 2, 3\}\). That said, the fact that \(\Delta \hat{Z}_{\alpha\beta}\) has nonzero blocks for all \((\alpha, \beta)\) means that [\[Phi2bodyviathird\]](#Phi2bodyviathird){reference-type="eqref" reference="Phi2bodyviathird"} cannot be used. Instead, the more general formula [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"} for the energy transfer spectrum must be used, plugging the \(2\times 2\) block matrices in [\[PCHTRHToperators\]](#PCHTRHToperators){reference-type="eqref" reference="PCHTRHToperators"} into the overall \(3\times 3\) block matrices \[\begin{aligned} \hat{Z}^{(0)} &= \begin{bmatrix} \hat{Z}^{(0)}_{1} & 0 & 0 \\ 0 & \hat{Z}^{(0)}_{2} & 0 \\ 0 & 0 & \hat{Z}^{(0)}_{3} \end{bmatrix} \\ \Delta \hat{Z} &= \begin{bmatrix} \Delta \hat{Z}_{1,1} & \Delta \hat{Z}_{1,2} & \Delta \hat{Z}_{1,3} \\ \Delta \hat{Z}_{2,1} & \Delta \hat{Z}_{2,2} & \Delta \hat{Z}_{2,3} \\ \Delta \hat{Z}_{3,1} & \Delta \hat{Z}_{3,2} & \Delta \hat{Z}_{3,3} \end{bmatrix} \end{aligned}\] to evaluate [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"}. These formulas for the energy transfer spectrum and associated linear response operators are thus the application of the general NEGF formalism for combined PCHT and RHT. In contrast to the derivations of pure RHT which ultimately do not depend on the form of the susceptibilities \(\mathbb{V}_{\alpha}\) as long as it is linear, these particular derivations do depend on the harmonicity of the material models, though they may be generalizable through a more complicated formalism. However, beyond that approximation as well as the assumptions regarding material dissipation, these formulas are independent of specific geometries and material properties, and can be evaluated in the EM near-or far-field regimes. Additionally, we point out that unlike previous works which have cast formulas for combined electronic conduction and RHT in a more complicated (Meir--Wingreen) form rather than the typical Landauer/Caroli form [@ZhangPRB2018; @TangPRAPP2019; @WangPRE2018] as electrons and photons obey different quantum statistics, no such complication arises here because phonons and photons obey the same statistics. We apply this unified formalism to an illustrative model of heat transfer between two collinear 250 atom-long atomically thin wires, taken to be made of carbon (i.e. carbyne wires), and particularly compute the heat transfer coefficient \(\frac{\partial P}{\partial T}\) at room temperature (\(T = 300~\mathrm{K}\)). Specifically, we compute the heat transfer coefficient \(\frac{\partial P_{\mathrm{both}}}{\partial T}\) by calculating the Landauer energy transfer spectrum \(\Phi_{\mathrm{both}}\) arising from plugging [\[PCHTRHToperators\]](#PCHTRHToperators){reference-type="eqref" reference="PCHTRHToperators"} as written into [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"}, \(\frac{\partial P_{\mathrm{rad}}}{\partial T}\) by computing \(\Phi_{\mathrm{rad}}\) arising from plugging [\[PCHTRHToperators\]](#PCHTRHToperators){reference-type="eqref" reference="PCHTRHToperators"} with \(K_{\mathrm{I}\alpha\beta} = 0\) for \(\beta \neq \alpha\) (so \(K_{\mathrm{I}\alpha\alpha}\) refers only to the spring constant matrices among nuclei for each body in isolation) into [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"}, and \(\frac{\partial P_{\mathrm{cond}}}{\partial T}\) by computing \(\Phi_{\mathrm{cond}}\) arising from plugging [\[PCHTRHToperators\]](#PCHTRHToperators){reference-type="eqref" reference="PCHTRHToperators"} with \(G^{\mathrm{vac}} = 0\) for all pairs of electronic oscillators into [\[Phimn\]](#Phimn){reference-type="eqref" reference="Phimn"}; in all cases, \(\Phi\) refers to \(\Phi^{(1)}_{2}\). Within each body, as described above, the charges, masses, and spring constants are all taken from DFT evaluated for each body in isolation, the matrix elements of the Maxwell Green's function \(\mathbb{G}^{\mathrm{vac}}\) are evaluated in a Gaussian basis to mitigate short-range EM divergences [@VenkataramPRL2018; @HermannCR2017; @VenkataramPRL2017], and the dissipation matrices are chosen such that \(B_{\mathrm{e}} = \gamma_{\mathrm{e}} M_{\mathrm{e}}\) & \(B_{\mathrm{I}} = \gamma_{\mathrm{I}} M_{\mathrm{I}}\) hold with \(\gamma_{\mathrm{e}} = 10^{11}~\mathrm{s}^{-1}\) & \(\gamma_{\mathrm{I}} = 10^{13}~\mathrm{s}^{-1}\); the damping rates are chosen phenomenologically to be large enough to allow reasonably coarse frequency sampling, but small compared to the characteristic frequencies of the relevant polaritons. For computational simplicity, these properties are not recomputed as functions of the separation between the bodies, but while we expect such recomputation to yield significantly different results due to the greater probability of supporting longer-wavelength collective electronic and phononic waves when the wires are in proximity, such recomputation could in principle be performed consistently with this formalism. Likewise, for computational simplicity, the off-diagonal blocks of \(K_{\mathrm{I}}\) for each body (including both electronic and nuclear oscillator coordinates) have only the couplings between each end atom nearest to the other molecule be nonzero, and these are modeled via the Morse potential, but this could be further generalized in future work. The Morse potential spring constant for a bond of length \(r\) compared to equilibrium length \(a_{0}\) is computed as \(k(r) =-\frac{1}{r-a_{0}} \frac{\partial U_{\mathrm{Morse}}}{\partial r}\), where the potential energy \(U_{\mathrm{Morse}}(r) = U_{\mathrm{min}} (1-e^{-\sqrt{k_{0}/(2U_{\mathrm{min}})}(r-a_{0})})^{2}\) exhibits a harmonic well of depth \(U_{\mathrm{min}}\) and curvature defined by the equilibrium spring constant \(k(a_{0}) = k_{0}\), all of which are empirical parameters, and exponentially decays as \(r \gg a_{0}\). As can be seen in (a, b), many interesting features arise from the coupling of conductive and radiative processes. The exponential decay of the Morse potential with distance means that for \(d > 0.4~\mathrm{nm}\), conduction ceases to have any meaningful effect on the heat transfer, and the total heat transfer aligns with that of pure radiation. However, for decreasing \(d \leq 0.4~\mathrm{nm}\), not only does conduction become more significant, but the total heat transfer including both radiative and conductive processes falls *below* the corresponding individual cases, and only rises above both for \(d < 0.2~\mathrm{nm}\) before all three powers saturate. Therefore, this unified formalism is clearly necessary for subnanometric separations, as the total power including both PCHT and RHT is not simply the sum of the individual contributions (as has been found in related systems involving electronic conduction ), but behaves in a much more complicated way. In (c), the Landauer energy transfer spectra \(\Phi\) make clear that for small enough \(d\) where conduction is nontrivial (plotted for \(d = 0.281~\mathrm{nm}\)), the conduction spectrum only has nontrivial contributions at lower frequencies \(\omega < 10^{14}~\mathrm{rad/s}\). Meanwhile, the total spectrum rises above the radiation spectrum for larger \(\omega\) but falls below for smaller \(\omega\): the latter is more relevant given the exponential decay of \(\frac{\partial \Pi(\omega, T)}{\partial T}\) with \(\omega\), leading to \(P_{\mathrm{both}} < P_{\mathrm{rad}}\) there. Ultimately, this occurs due to the confluence of EM screening as captured by the Gaussian basis functions along with shifts in the response due to conductive coupling between nuclei of the two different wires: not only does this shift the frequencies of resonances in the Landauer energy transfer spectra, but it can also suppress the resulting amplitudes. This therefore makes clear that the existence of situations where \(P_{\mathrm{both}}\) (or its derivative with respect to \(T\)) falls between or below \(P_{\mathrm{cond}}\) or \(P_{\mathrm{rad}}\) is not simply a fluke arising from a particular choice of \(T\): \(\Phi\) is independent of \(T\), yet the spectrum \(\Phi_{\mathrm{both}}\), far from being a simple case of superimposing \(\Phi_{\mathrm{rad}}\) on \(\Phi_{\mathrm{cond}}\), shows a delicate interplay among radiative and conductive effects in creating new hybrid resonances. Our calculations are meant to be qualitatively illustrative of the complexities of heat transfer when both conduction and radiation contribute: they are not meant to be quantitatively predictive given the practical limitations in recomputing relevant oscillator parameters at each separation, but we stress that these limitations are not fundamental to the formalism we have presented. # Concluding Remarks {#sec:conclusion} We have demonstrated a general NEGF formulation of heat transfer applicable to a wide variety of bosonic systems. This NEGF framework is general enough to explain the salient features of PCHT and RHT separately, show how upper bounds on PCHT can be generalized and then applied to RHT, and demonstrate how to unify PCHT and RHT in situations when both are strongly coupled and relevant. The latter is particularly relevant at atomistic scales or separations, when continuum material models begin to fail and the net heat transfer is no longer simply the sum of individual radiative or phononic contributions. We stress that our approach is general enough to treat semiclassical heat transfer through other massless bosonic excitations, not just photons or phonons. Moreover, while our analysis of combined PCHT and RHT focused on effective valence electronic and nuclear response as being represented by coupled harmonic oscillators, more complicated linear response models could be considered as well, which we leave for future work. We expect this framework to pave the way for future works investigating the conjunction of PCHT and RHT in complex geometries, particularly at separations where each is relevant and where recent experiments have raised questions about where each form of heat transfer is dominant [@KimNATURE2015; @KloppstechNATURE2017; @CuiNATURE2017; @ChiloyanNATURE2015]. In an accompanying manuscript, we generalize bounds previously derived for RHT  using the generic NEGF formalism for heat transfer in linear systems presented in this paper. We particularly apply such bounds to PCHT, showing that channel-based bounds on PCHT can be much tighter than the Landauer limits of unity [@BurklePRB2015; @KlocknerPRB2017; @KlocknerPRB2018]. *Acknowledgments*.---The authors thank Sean Molesky for the helpful comments and suggestions. This work was supported by the National Science Foundation under Grants No. DMR-1454836, DMR 1420541, DGE 1148900, the Cornell Center for Materials Research MRSEC (award no. DMR1719875), the Defense Advanced Research Projects Agency (DARPA) under agreement HR00111820046, and the Spanish Ministry of Economy and Competitiveness (MINECO) (Contract No. FIS2017-84057-P). The views, opinions and/or findings expressed herein are those of the authors and should not be interpreted as representing the official views or policies of any institution.
{'timestamp': '2020-06-01T02:04:37', 'yymm': '2005', 'arxiv_id': '2005.14342', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14342'}
# Introduction In this note, we examine the efficacy of a recently developed approach to the recovery of nonlinear water waves from pressure measurements, by applying it to the celebrated extreme Stokes wave. The reconstruction of the water wave surface profile from bottom pressure measurements is an important issue for marine engineering applications, but corresponds to a difficult mathematical problem. From the viewpoint of the qualitative modelling of water waves, the pressure plays an important role in establishing various properties of travelling waves. Measuring the surface of water waves directly is extremely difficult and costly, particularly in the ocean, so a commonly employed alternative is to calculate the free-surface profile of water waves by way of the so-called pressure transfer function, which recovers the free-surface elevation using measurements from submerged pressure transducers. The key to the success of this approach is in the derivation of a suitable candidate for the pressure transfer function, an issue which is the subject of a large body of experimental and theoretical research . Until recent years, most studies were based on a linear transfer function, primarily due to the intractability of the nonlinear governing equations, and even then for irrotational waves (cf. for linear, and weakly nonlinear, recovery formulae for waves with vorticity). However, the inadequacy of linear formulae for waves of even moderate amplitude is well known , hence the importance of taking into account nonlinear effects. In, various nonlinear nonlocal equations relating the dynamic pressure on the bed and the wave profile were obtained without approximation from the governing equations using different approaches, however these formulae are quite entangled and not very transparent. This is a significant impediment in the pursuit of practical applications, and alternative approaches have focussed on the reconstruction of nonlinear water waves in approximate intermediate and shallow water regimes. Recently, new exact tractable relations were derived which allow a straightforward numerical procedure for deriving the free surface from the pressure at the bed. This surface reconstruction procedure requires the numerical resolution of an ordinary differential equation, and in it was shown that it is possible to solve this ODE analytically by recasting it in terms of an implicit functional equation. The approach of is quite unique in that it works directly with nonlinear waves in the physical plane, as opposed to transforming to a conformal plane, and instead obtains recovery formulae through the manipulation of holomorphic mappings of the physical variables. The directness of this approach offers a number of advantages, and we demonstrate the efficacy and immediate applicability of this approach, both from a theoretical and practical viewpoint, by applying it to the wave-profile recovery problem for Stokes extreme wave, or wave of greatest height. The wave of greatest height was postulated to exist by, who used formal arguments to obtain it as the limit of smooth periodic travelling waves. Remarkably, the existence of the extreme wave solution with a stagnation point at the crest, along with many important qualitative features (such as convexity, the existence of an angular crest with inner angle \(2\pi/3\)) were rigorously proven only in recent decades (cf. for surveys of the rigorous analysis of Stokes waves). Also, physical properties of the extreme Stokes wave are not obviously transparent: although it is the Stokes wave of greatest height, it is not the most energetic, or fastest, Stokes wave. While the rigorous mathematical analysis of nonlinear Stokes waves is already technically challenging for regular (smooth) waves, this is particularly so for the Stokes wave of greatest height, which is impervious to standard analytical methods due to the presence of a stagnation point at the wave-crest. A commonly employed approach for the extreme Stokes wave is to use continuation arguments which assume that the extreme wave is a uniform limit of smooth ('almost extreme') Stokes waves. Due to the direct nature of the pressure surface recovery approach developed in, we do not need to employ convoluted continuation arguments in our analysis. This illustrates the robustness and applicability of the reconstruction method of , which does not invoke intermediate conformal changes of variables, and which accordingly offers potential for further development towards capturing more physically complex scenarios, such as the recovery of nonlinear rotational water waves. For extreme and near-extreme waves, the advantage of working in the physical plane, instead of the conformal one, is outlined in; the present paper provides further support to this claim. # Hypothesis and notations {#secnot} We consider two-dimensional periodic travelling waves propagating on the surface of an incompressible inviscid fluid under the restoring force of gravity. The wave is periodic[^1] in the \(x\)-direction, with period \(L\), and the wavenumber is given by \(k=2\pi/L\). If \((X,Y)\) denotes horizontal and vertical coordinates in a fixed reference frame, with \((U,V)\) the respective velocity field, then the travelling wave hypothesis implies a functional dependence on the variables of the form \((X-ct,Y)\): the Galilean change of variables \[x=X-ct, \quad y=Y, \quad u=U-c, \quad v=V,\] transforms to a reference frame where the fluid motion is steady, with the resulting velocity field in the frame moving with the wave given by \((u,v)\). The wave phase velocity \(c\) is an arbitrary constant as long as we have not defined what we mean by "fixed frame of reference". If it is the frame where the horizontal velocity has zero mean at bottom (which corresponds to Stokes' first definition of the wave speed), the wave phase velocity \(c\) is such that \(\left<\/U_\text{b}\/\right>=0\) in the fixed frame, that is \(\left<\/u_\text{b}\/\right>=-c\) in the frame of reference moving with the wave. Here \(\left<\boldsymbol{\cdot} \right>\) is the Eulerian average operator over one wavelength and, in what follows, the subscripts '\(\text{s}\)' and '\(\text{b}\)' denote the restrictions to the free surface and at the bed, respectively. Note that \(c>0\) if the wave travels toward the increasing \(x\)-direction; a choice that can always be made without lost of generality. Many other definitions of \(c\) can of course be made, with resulting consequences for the Bernoulli constant, and the gauge condition for the velocity potential, for instance (cf. for discussions on this, and related, matters). The horizontal bottom is located at \(y=-\depth\), and the free surface is described by \(y=\eta(x)\): since these boundaries are impermeable and steady we have \(\sur{v}\/=\/\eta_x\/\sur{u}\) (with \(\eta_x\/=\/\mathrm{d} \eta/\mathrm{d} x\)) and \(\bot{v}\/=\/0\). The mean water level is located at \(y=0\), which implies that \(\left<\eta\right>=0\) for the (\(2\pi/k\))-periodic wave profile \(\eta\), that is \[\begin{aligned} \label{defmean} \left<\,\eta\,\right>\, \stackrel{\text{\tiny{def}}}{=}\ \frac{k}{2\,\pi}\int_{-{\pi/k}}^{\,{\pi/k}}\eta(x)\ \mathrm{d}\/x\ =\ 0. \end{aligned}\] The local spin or rotation of an infinitesimal fluid element is measured by the vorticity, which is expressed by \(\omega=u_y-v_x\) for two-dimensional motion. An inherent property of inviscid flows is that the vorticity of a given fluid element is preserved by the resultant fluid motion, and accordingly a fluid mass which is initially irrotational will remain so for all further times. Therefore assuming irrotational motion, \(u_y=v_x\), allied to the incompressibility condition \(\nabla \cdot (u,v)=0\), enables us to define a velocity potential, \(\phi(x,y)\), and stream function, \(\psi (x,y)\), respectively, such that \(u\/=\/\phi_x\/=\/\psi_y\) and \(v\/=\/\phi_y\/=\/-\/\psi_x\). It follows that the complex potential, defined by \(f(z)\/=\/\phi(x,y)\/+\/\mathrm{i}\/\psi(x,y)\), and the complex velocity, \(w\/=\mathrm{d} f/\mathrm{d} z\/=\/u\/-\/\mathrm{i}\/v\), are holomorphic functions of the complex abscissa \(z=x+\mathrm{i}\/y\) (where \(\mathrm{i}^2=-1\)). The stream function \(\psi\/=\/\Im\{f\}\) is constant at \(y=-\depth\) and at \(y=\eta\) since these boundaries are impermeable and steady, hence \(f(z)\) represents a conformal mapping from the fluid domain to a fixed rectangle, the so-called conformal plane, once the non-stagnation condition \[\label{stag} u(x,y) \leqslant \epsilon<0\] holds throughout the fluid domain. The equation of motion is given by the Euler equation which, for irrotational fluid, can be expressed in terms of the following Bernoulli condition \[\begin{aligned} \label{bernbase} 2\,p\ +\ 2\,g\,y\ + \ u^2\ +\ v^2\ =\ B, \qquad\ x \in \mathds{R},\-\depth \leqslant y \leqslant \eta, \end{aligned}\] where \(B\) is the Bernoulli constant, and \(p=p(x,y)\) is the pressure (relative to the atmospheric pressure) divided by the (constant) density. At the free surface, surface tension is neglected and the relative normalised pressure is zero, \(\sur{p}\/=\/0\). From ([\[defmean\]](#defmean){reference-type="ref" reference="defmean"}) and ([\[bernbase\]](#bernbase){reference-type="ref" reference="bernbase"}), we get \[\label{mt} B\ =\,\left<\,u_\text{s}^{\,2}\,+\,v_\text{s}^{\,2}\,\right>\,=\,\left<\,u_\text{b}^{\,2} \, \right>\,>\ 0,\] where the second equality in ([\[mt\]](#mt){reference-type="ref" reference="mt"}) follows from an application of the divergence theorem applied to the vector field \((-2uv,u^2-v^2)\), cf.. Note that \(B=c^2\) in deep water (\(\depth\to\infty\)), and for solitary waves (\(k\to0\)), since in these settings \((u,v)\to (-c,0)\) as \(y\to-\infty\), and \(|x|\rightarrow \infty\), respectively. Finally we observe that relations ([\[bernbase\]](#bernbase){reference-type="ref" reference="bernbase"}) and ([\[mt\]](#mt){reference-type="ref" reference="mt"}) yield \[\label{defpmean} \left<\,\mathfrak{p}\,\right>\,=\ g\,\depth,\] where \(\mathfrak{p}(x)\/\stackrel{\text{\tiny{def}}}{=}\/p(x,-\depth)=\bot{p}(x)\) is the normalised relative pressure at the bed. This is a useful formula for determining the mean fluid depth \(\depth\) from pressure measurements at the flat bed. # Stokes extreme wave In this paper, by 'Stokes wave' we mean a periodic, irrotational water wave, with a strictly monotone symmetric free-surface profile---increasing from trough-to-crest and decreasing from crest-to-trough ---which moves with a constant speed and with a constant form over a body of water on a flat bed. For such waves, the functions \(u\), \(\eta\), \(p\) are even functions and \(v\) is an odd function with respect to the \(x\)-variable; we assume the wave crest is located at \(x=0\), and the wave troughs are located at \(x=\pm\pi/k\). It was shown by, using formal methods, that regular wave solutions exist for which the strict inequality [\[stag\]](#stag){reference-type="eqref" reference="stag"} holds throughout the fluid domain. Given this inequality, it can be rigorously proven that a continuously differentiable free-surface must *a priori* be a symmetric, real-analytic graph of a function: surveys of rigorous analytical results for Stokes waves can be found in. Stokes also posited, using heuristic arguments, that a limiting wave solution exists for which [\[stag\]](#stag){reference-type="eqref" reference="stag"} fails and the equality \(u=0\) is attained precisely at the wave crest, with the associated breakdown in regularity of the wave-profile at the crest manifested in the form of an angular point[^2] which has a containing angle of \(2\pi/3\). The existence of Stokes waves is rigorously established by way of highly-technical bifurcation theory methods and, indeed, it was only in recent decades that a number of fundamental questions concerning the existence of an extreme Stokes wave, and properties of the associated wave profile, were rigorously settled (cf. ). For this limiting wave 'of greatest height', or extreme Stokes wave, it can be shown that the free-surface is real-analytic everywhere except for the stagnation point at the crest, where it is merely continuous. We note that the wave crest is an 'apparent' stagnation point, with fluid particles only coming to rest there instantaneously, cf.. All technical complications arising in the rigorous analysis of extreme Stokes waves essentially stem from the lack of regularity at the stagnation point, with the primary impediment being a breakdown in the conformality of the mapping \(f(z)\) due to the failure of condition [\[stag\]](#stag){reference-type="eqref" reference="stag"} at the wave-crest. Nevertheless, a detailed asymptotic description of the wave profile, and velocity field, in the neighbourhood of the wave-crest is possible. This work originated with, who postulated that the wave of maximum amplitude has an included crest angle of \(2\pi/3\), the crest being a stagnation point which, in the conformal plane, has a power \(2/3\) singularity. It was shown by that higher-order expansions in the vicinity of the crest involve non-algebraic powers (see also ); this work was placed on a rigorous footing in. Performing the same local analysis (around the crest at \(x = 0\) where \(\eta= a\)) in the physical plane, one obtains after some algebra \[\begin{aligned} \eta\, &=\ a\-\ 3^{-1/2}\,|\/x\/|\ +\ \beta\,\kappa^{\nu-1}\,|\/x\/|^{\nu}\ +\ O\!\left(|x|^{2\nu-1}\right), \label{etamaxloc}\\ w^2\, &=\ g\,(\/a\/+\/\mathrm{i}\/z\/)\ +\ \beta\,\kappa^{\nu-1}\left[\,3^{1+\nu}\,4^{-\nu}\, (1+\nu+\nu^2)\,\right]^{1\over2}g\,(\/a\/+\/\mathrm{i}\/z\/)^\nu\ +\ O\!\left((a\/+\/\mathrm{i}\/z)^{2\nu-1}\right), \label{w2maxloc} \end{aligned}\] where \(\beta\) is a strictly positive (dimensionless) constant, \(\kappa\) is a (freely choosable) characteristic wavenumber (e.g. \(\kappa=k\) or \(\kappa=g/B\)) and \(\nu\approx2.20401861065003478\) is the smallest positive root[^3] of the transcendental equation \[\label{traneq} \sqrt{3}\,\tan\!\left({\textstyle{1\over3}}\nu{\pi}\right)\,=\-\/1\-\ 2\,\nu^{-1}.\] In order to derive expression [\[w2maxloc\]](#w2maxloc){reference-type="eqref" reference="w2maxloc"}, we use (cf. eq. (3.3) in ) the relation \[\label{wCC} w_\text{s}^{\,2}\ =\ 2\,g\,(a-\eta)\,(1-\mathrm{i}\eta_x)\,/\,(1+\mathrm{i}\eta_x),\] and taking \(\eta\) of the form [\[etamaxloc\]](#etamaxloc){reference-type="eqref" reference="etamaxloc"}, for some \(\nu>1\), equation [\[wCC\]](#wCC){reference-type="eqref" reference="wCC"} yields \[\frac{w_\text{s}^{\,2}}{g}\ =\ \frac{|\/x\/|}{\sqrt{3}}\ +\ \mathrm{i}\,x\ +\ \beta\,|\/\kappa\/x\/|^{\nu-1} \frac{(3\nu-2)\,|x|\,-\,\mathrm{i}\,(\nu+2)\,\sqrt{3}\,x}{2}\ +\ O\!\left(|x|^{2\nu-1}\right),\label{w2smaxloc}\] that can be conveniently rewritten \[\frac{w_\text{s}^{\,2}}{g\,(a+\mathrm{i}\/z_\text{s})}\ =\ 1\-\ 3\,\beta\,|\/\kappa\/x\/|^{\nu-1} \frac{\sqrt{3}\,+\,\mathrm{i}\,(2\nu+1)\,\operatorname{sgn}(x)}{4}\ +\ O\!\left(|x|^{2\nu-2}\right).\label{w2smaxlocbis}\] Then, seeking a complex velocity of the form \(w^2=g(a+\mathrm{i} z)+A(a+\mathrm{i} z)^\nu+O\!\left((a+ \mathrm{i} z)^{2\nu-1}\right)\), comparison with [\[w2smaxlocbis\]](#w2smaxlocbis){reference-type="eqref" reference="w2smaxlocbis"} leads to \(A\) as defined by [\[w2maxloc\]](#w2maxloc){reference-type="eqref" reference="w2maxloc"} and the relation [\[traneq\]](#traneq){reference-type="eqref" reference="traneq"}. Note the simplicity of this approximation, in particular the leading approximation for \(w^2\approx g\/(\/a\/+\/\mathrm{i}\/z\/)\), which yields at once (from the Bernoulli equation) the following approximation for the pressure near the wave crest: \[\label{prescrest} p(x,y)\ \approx\ g\,(a-y)\-\ {\textstyle{1\over2}}\,g\,\sqrt{\,x^2\,+\,(a-y)^2\,}.\] This relation will play an important role in section [5](#secew){reference-type="ref" reference="secew"} below. To the best of our knowledge, relations [\[w2maxloc\]](#w2maxloc){reference-type="eqref" reference="w2maxloc"} and [\[prescrest\]](#prescrest){reference-type="eqref" reference="prescrest"} have not appeared before in the literature. A study of the qualitative behaviour of the velocity field for the extreme Stokes near the wave crest has been explored in, where it is shown that the velocity field exhibits the limiting behaviours \[\lim_{x\to 0} \frac{u^2(x,\eta(x))}{g\,|x|}\,=\,\frac{\sqrt3}{2}, \qquad \lim_{x\to 0} \frac{v^2(x,\eta(x))}{g\,|x|}\,=\,\frac{1}{2\,\sqrt3 }, \eqno{(\theequation{\mathit{a},\mathit{b}})}\label{limvel}\] which accord with the limits given by [\[w2maxloc\]](#w2maxloc){reference-type="eqref" reference="w2maxloc"} and [\[w2smaxloc\]](#w2smaxloc){reference-type="eqref" reference="w2smaxloc"}. On the crest line \(x=0\) (i.e., for \(\Re\{z\}=0\) and \(\Im\{z\}\leqslant a\)) we have \(\Re\{w^2\}=u^2\geqslant0\) and \(\Im\{w^2\}=0\), the relation [\[w2maxloc\]](#w2maxloc){reference-type="eqref" reference="w2maxloc"} then implies at once that \(\beta\) is necessarily positive. This result was first obtained by with much more convoluted arguments. However, also proved that \(\beta\neq0\), the possibility \(\beta=0\) being not easily ruled out here (that would require more than just a local analysis around the crest). From the inequality \(\beta>0\), the semi-derivatives at the crest are given by \[\lim_{x\to0^{\pm}} \eta_{x}\,=\,\mp\,3^{-1/2}, \qquad \lim_{x\to0^{\pm}} \eta_{xx}\,=\,0^{+}, \qquad \lim_{x\to0^{\pm}} \eta_{xxx}\,=\,\pm\,\infty, \eqno{(\theequation{\mathit{a},\mathit{b},\mathit{c}})}\label{limeta}\] in comparison with the corresponding semi-derivatives in the conformal plane (where, for example, \(\eta_\phi\) is infinite at the crest since \(\eta\propto|\phi|^{2/3}\) locally). # Wave surface recovery: regular waves {#secCC} In this section, we briefly recall the salient features of the surface profile recovery procedures presented in. The function \(\mathfrak{P}\) defined by \[\label{P} {\mathfrak P}(z)\ \stackrel{\text{\tiny{def}}}{=}\ {\textstyle{1\over2}}\,B\ +\ g\,\depth\-\ {\textstyle{1\over2}}\,w^2(z)\ =\ {\textstyle{1\over2}}\,B\ +\ g\,\depth\-\ {\textstyle{1\over2}}\,(u^2-v^2)\ +\ \mathrm{i}\,u\,v,\] is holomorphic, and its restriction at the flat bed coincides with the real-valued function \(\mathfrak{p}(x)\), since \(\bot{\mathfrak{P}}\/=\/\mathfrak{P}(x-\mathrm{i}\depth)\/=\/g\/d\/+\/{\textstyle{1\over2}}\/(\/B\/-\/u_\text{b}^{\,2}\/) \/=\/\mathfrak{p}(x).\) Accordingly \({\mathfrak P}(z)\/=\/{\mathfrak p}(z+\mathrm{i}\depth)\) and, since \(p\) is not a harmonic function , the flat bed is the only location where \(\mathfrak p\) coincides with \(\operatorname{Re}\mathfrak{P}\). It can be shown (cf. ) that \[\label{cde} g\,\eta\,(1\/-\/\mathrm{i}\/\eta_x)\ +\ \mathrm{i}\,B\,\eta_x\ =\ (\,\sur{\mathfrak{P}}\,-\, g\,\depth\,)\,(1\/+\/\mathrm{i}\/\eta_x),\] with \(\sur{\mathfrak P}\/=\/\mathfrak{P}(\sur{z})\/=\/\mathfrak{P}(x+\mathrm{i}\eta(x))\). The real and imaginary parts of ([\[cde\]](#cde){reference-type="ref" reference="cde"}) give the two equations \[\begin{aligned} g\,\eta\ &=\ \operatorname{Re}\{\mathfrak{P}_\text{s}\}\-\ g\,\depth\-\ \eta_x\, \operatorname{Im}\{\mathfrak{P}_\text{s}\}\ =\ {\textstyle{1\over2}}\,(\,B\,-\,u_\text{s}^{\,2}\,-\,v_\text{s}^{\,2}\,), \label{e1} \\ (B\,-\, g\,\eta)\,\eta_x\ &=\ (\,\operatorname{Re}\{\mathfrak{P}_\text{s}\}\,-\,g\,\depth\,)\,\eta_x\ +\ \operatorname{Im}\{\mathfrak{P}_\text{s}\}\ =\ {\textstyle{1\over2}}\,(\,B\,+\,u_\text{s}^{\,2}\,+\,v_\text{s}^{\,2}\,)\,\eta_x.\label{e2} \end{aligned}\] where the second equalities are obtained using ([\[P\]](#P){reference-type="ref" reference="P"}) and \(\sur{v}\/=\/\eta_x\/\sur{u}\). From the viewpoint of determining the wave amplitude \(a\), for regular Stokes waves we have \(\eta_x(0)=0\) at the crest \(z=\mathrm{i}\/\eta(0)=\mathrm{i}\/a\), and so [\[e1\]](#e1){reference-type="eqref" reference="e1"} reduces to a simple implicit equation which can be iteratively solved to find the amplitude \(a\) as solution of the equation \[\label{defamp} a\ =\ g^{-1}\,\Re\{\mathfrak{P}(\mathrm{i} a)\}\-\ d.\] The convergence of fixed point iterations of [\[defamp\]](#defamp){reference-type="eqref" reference="defamp"} was studied in considering the functional iterations (convergent for all regular waves) \[\label{defiteramp} y\, =\, \hat{F}(y)\, \stackrel{\text{\tiny{def}}}{=}\, y\, +\, g^{-1}\,p(0,y)\, =\, g^{-1}\,\Re\{\mathfrak{P}(\mathrm{i} y)\}\,-\, d\, =\, {\textstyle{1\over2}}\,B\,g^{-1}\,-\, {\textstyle{1\over2}}\,g^{-1}\,\Re\!\left\{w(\mathrm{i} y)^2\right\}.\] With the wave amplitude \(a\) so determined, in it was shown that \(\eta\) can subsequently be obtained by re-expressing ([\[e2\]](#e2){reference-type="ref" reference="e2"}) as the ordinary differential equation \[\label{r2} \eta_x\ =\ \operatorname{Im}\{\mathfrak{P}_\text{s}\}\ /\ \left(\,B\,-\, g\,\eta\, -\, \operatorname{Re}\{\mathfrak{P}_\text{s}\}\ +\ g\,\depth\,\right),\] with initial data \(\eta(0)=a\), which can iteratively be solved. In it was rigorously proven that these recovery procedures converge. An alternative, more direct approach to the wave profile recovery problem was instigated in by considering the holomorphic function \(\mathfrak{Q}\) defined by \[\begin{aligned} \label{defQfun} \mathfrak{Q}(z)\ \stackrel{\text{\tiny{def}}}{=}\ \int_{z_0}^z\left[\,\mathfrak{P}(z')\,-\,g\,\depth\,\right]\mathrm{d}\/z' \ =\ \int_{z_0}^z{\textstyle{1\over2}}\left[\,B\,-\,w(z')^2\,\right] \mathrm{d}\/z', \end{aligned}\] where \(z_0\) is an arbitrary constant. Taking, as in, \(z_0=\mathrm{i} a\) at the origin of the free surface, and integrating along the surface, leads to the expression \[\label{defQfunsurfeta} {\mathfrak{Q}}_\text{s}(x)\ =\ \int_0^xg\,\eta(x')\,\mathrm{d}\/x'\ +\ \mathrm{i}\left[\,\eta(x)\,-\,a\,\right]\left[\,B\,-\,{\textstyle{1\over2}}\,g\,a\,-\,{\textstyle{1\over2}}\,g\,\eta(x)\,\right].\] The imaginary part of ([\[defQfunsurfeta\]](#defQfunsurfeta){reference-type="ref" reference="defQfunsurfeta"}) yields an implicit relation defining \(\eta\) of the form \[\label{reletaimp} \eta\ =\ g^{-1}\left[\,B\,-\, \sqrt{\,(\/B\/-\/g\/a\/)^2\-\ 2\,g\, \operatorname{Im}{\mathfrak{Q}}_\text{s}\}\,}\,\right],\] which is a local algebraic (i.e., neither differential nor integral) equation for the free surface \(\eta\), and it is easily shown that ([\[reletaimp\]](#reletaimp){reference-type="ref" reference="reletaimp"}) is an exact implicit solution of ([\[r2\]](#r2){reference-type="ref" reference="r2"}). An explicit expression for \(\eta\) can be obtained numerically via fixed point iterations, whose convergence is determined as follows. Let be the functional iterations \[\label{defitF} y\ =\ F(y)\ \stackrel{\text{\tiny{def}}}{=}\ g^{-1}\left[\,B\,-\, \sqrt{\,(\/B\/-\/g\/a\/)^2\,-\, 2\,g\, \operatorname{Im}\{{\mathfrak{Q}}(x+\mathrm{i} y)\}\,}\,\right], \qquad y\in[-\depth,\eta(x)],\] for a known holomorphic function \({\mathfrak{Q}}\) at a fixed abscissa \(x\) and for a given \(B\). Iterations of ([\[defitF\]](#defitF){reference-type="ref" reference="defitF"}) converge if we can show that \(F\) is a contraction, that is, if \(-1<F_y<1\). The definition of \(F\) gives \[\begin{aligned} \label{Fy} F_y\, =\, \frac{\left[\,\operatorname{Im}\{{\mathfrak{Q}}\}\,\right]_y} {\sqrt{\,(\/B\/-\/g\/a\/)^2\,-\, 2\,g\,\operatorname{Im}\{{\mathfrak{Q}}\}\/}}\, =\, \frac{p\, +\, g\,y\, +\, v^2}{B\,-\, g\,y}\, =\, \frac{p\, +\, g\,y\, +\, v^2}{2\,p\,+\,g\,y\,+\,u^2\,+\,v^2}, \end{aligned}\] where we have used definitions ([\[P\]](#P){reference-type="ref" reference="P"}), ([\[defQfun\]](#defQfun){reference-type="ref" reference="defQfun"}) and the Bernoulli equation ([\[bernbase\]](#bernbase){reference-type="ref" reference="bernbase"}). The lower bound \(F_y>-1\) yields the inequality \(p+v^2+B>0\) that is obviously always satisfied. The upper bound for contraction condition \(F_y<1\) yields the inequality \(p+u^2>0\) that is always satisfied when [\[stag\]](#stag){reference-type="eqref" reference="stag"} holds. Therefore, for regular Stokes waves, \(F\) is a contraction everywhere in the bulk and at the free surface and the iterations ([\[defitF\]](#defitF){reference-type="ref" reference="defitF"}) converge to an unique solution. Note that, since \(F_y\) is independent of \(a\) (and so independent of the choice of \(z_0\) in the definition of \(\mathfrak{Q}\)), the convergence proof for the iterations ([\[defitF\]](#defitF){reference-type="ref" reference="defitF"}) is valid wherever \(z_0\) is chosen in the fluid. Furthermore, the analysis above for the wave profile recovery procedure is valid for all regular waves, periodic or not, with one or more crests and troughs per period, symmetric or not. It is not contingent on the waves being Stokes waves. # Wave surface recovery: extreme waves {#secew} The above considerations may breakdown for the extreme waves, where [\[stag\]](#stag){reference-type="eqref" reference="stag"} fails to hold at the stagnation point at a wavecrest. In this case the wavecrest located at \((0,\eta(0))=(0,a)\) takes an angular form with containing angle \(2\pi/3\), with an asymptotic description provided by [\[etamaxloc\]](#etamaxloc){reference-type="eqref" reference="etamaxloc"}, and so in particular \(\eta_x(0^\pm)\/\neq\/0\). The analysis of the previous section (see also ) then needs to be refined. ## Crest determination The analysis of the functional iterations ([\[defitF\]](#defitF){reference-type="ref" reference="defitF"}) assumes that the constants \(a\) and \(B\) are known. This is fine for a mathematical proof, but not so for practical applications because \(a\) and \(B\) are generally unknown *a priori*. Since the crest of an extreme wave is a stagnation point where \(u=v=p=0\), it follows directly from [\[bernbase\]](#bernbase){reference-type="eqref" reference="bernbase"} that \(B\/=\/2\/g\/a\), so only \(a\) remains to be determined before studying the iterations [\[defitF\]](#defitF){reference-type="eqref" reference="defitF"}. The convergence of fixed-point iterations of [\[defamp\]](#defamp){reference-type="eqref" reference="defamp"} determining the wave amplitude for extreme waves, where \(\eta_x\neq0\) at the crest, was not addressed in, however we remark that formula [\[defamp\]](#defamp){reference-type="eqref" reference="defamp"} is still applicable in this regime since \(\operatorname{Im}\{\mathfrak{P}_\text{s}\}=0\) along the crest-line (where \(v=v_y=0\)): fixed-point iterations determined by relation [\[defiteramp\]](#defiteramp){reference-type="eqref" reference="defiteramp"} converge if \(-1<\hat{F}_y<1\). At the crest of an extreme wave, employing the asymptotic relation [\[prescrest\]](#prescrest){reference-type="eqref" reference="prescrest"} (which is valid in a neighbourhood of the crest) we can compute \(\hat{F}_y=1+g^{-1} p_y(0,y)=1/2\), so it follows that the fixed point iterations defined by [\[defiteramp\]](#defiteramp){reference-type="eqref" reference="defiteramp"} converge.\ ## Remarks *i*-On the crest line of a Stokes wave the inequality \(-g\leqslant p_y<0\) holds: although the second inequality is physically quite intuitive, the rigorous proof of this fact for nonlinear waves relies on a fine technical analysis of harmonic functions for regular waves, with further complications needing to be addressed in the extreme wave setting. These bounds are sharp with respect to the analytical methods being employed. In this context, it is interesting that the asymptotic approximation [\[prescrest\]](#prescrest){reference-type="eqref" reference="prescrest"} yields that \(p_y=-g/2<0\) at the crest of an extreme wave: one might be tempted to conjecture as to whether the inequality \(-g\leqslant p_y\leqslant-g/2\) holds on the crest line of extreme waves and, perhaps, of regular Stokes waves which converge to the extreme wave by the standard limiting process. As a caveat to the latter postulation, we note that many physical properties of the extreme Stokes wave are not obviously transparent; for instance, although it is the Stokes wave of greatest height, it is not the most energetic, fastest, or impulsive of the Stokes waves. *ii*-A further consequence of the relation \(p_y=-g/2\) at the crest of an extreme wave is that, since the relation \(u\partial_x\left[ v(x,\eta(x)) \right]=-p_y-g\) holds along the wave profile \(y=\eta(x)\) for all Stokes waves, we must have \(\partial_x\left[ v(x,\eta(x)) \right]\) blowing up as \(x\to 0\) since \(u\) vanishes at the wave crest. It follows that \(u_y=v_x\) must also blow-up the wave-crest: this can also be seen directly from setting \(-p_y-g=-g/2\) in the second component of the Euler equation. *iii*-A useful relation involving the wave profile, particularly in the context of Stokes extreme wave, is obtained by multiplying ([\[e2\]](#e2){reference-type="ref" reference="e2"}) by \(\eta_x\) and adding ([\[e1\]](#e1){reference-type="ref" reference="e1"}), from which one gets (after some elementary algebra): \[\begin{aligned} g\,\eta\ &=\ \operatorname{Re}\{\mathfrak{P}_\text{s}\}\-\ g\,\depth\-\ (B\,-\,2\,g\,\eta)\,\eta_x^{\,2}\,\left(\,1+\,\eta_x^{\,2}\,\right)^{-1}.\label{e5} \end{aligned}\] At the crest of an extreme wave we have \(\eta_x\neq0\) is finite, since the angular crest is not a cusp, and \(B-2g\eta=0\), and so [\[e5\]](#e5){reference-type="eqref" reference="e5"} reduces to relation [\[defamp\]](#defamp){reference-type="eqref" reference="defamp"} at the crest. ## Surface determination The convergence of the functional iterations ([\[defitF\]](#defitF){reference-type="ref" reference="defitF"}) is proven above (see for more details) everywhere except at an angular crest where \(F_y(a)=1\): this corresponds to a so-called *positively neutral* fixed point. To determine if the iterations converge where \(F_y=1\), we can consider the second derivative of \(F\): \[\label{defFyy} F_{yy}\ =\ \frac{g\,F_y\,+\,p_y\, +\, g\, +\,2\,v\,v_y}{2\,p\,+\,g\,y\,+\,u^2\,+\,v^2}\ =\ \frac{g\,F_y\,+\,v\,v_y\,-\,u\,v_x}{B\,-\,g\,y}\ =\ \frac{g\,F_y\,+\,\operatorname{Im}\{\/w\,w_z\/\}}{B\,-\,g\,y}.\] In order to estimate \(F_{yy}\) at angular crests, we use the expansions [\[etamaxloc\]](#etamaxloc){reference-type="eqref" reference="etamaxloc"} and [\[w2maxloc\]](#w2maxloc){reference-type="eqref" reference="w2maxloc"}, to find that \(F_{yy}=3/2a>0\) at the angular crests. Hence, the fixed point \(y=a\) is monotonously semi-stable from below, which means that the iterations are convergent when the fixed point \(y=a\) is approached from the fluid side \(y<a\), and divergent when approached from above the surface \(y>a\). For practical applications, this results suggests that basic fixed-point iterations of [\[reletaimp\]](#reletaimp){reference-type="eqref" reference="reletaimp"} convergence very slowly in the vicinity of an angular crest. More sophisticated iterations (such as Newton and Levenberg--Marquardt methods) should then be used instead. It is not our purpose here to investigate these possibilities, however. ## Trough determination At the wave trough, where \(\eta=-b\leqslant0\) and so \(a+b\) is the total wave height, for all Stokes waves including the extreme wave, we have \(\eta_x(\pm \pi/k)=0\). Equation [\[e1\]](#e1){reference-type="eqref" reference="e1"} then reduces to the implicit equation \[\label{r1t} b\ =\ \depth\-\ g^{-1}\,\operatorname{Re}\{\mathfrak{P}(-\mathrm{i}\/b)\}.\] In, presented numerical evidence suggests that iterations of ([\[r1t\]](#r1t){reference-type="ref" reference="r1t"}) converge to \(b\), however a mathematically rigorous proof of this result is still lacking. Indeed, as shown in, convergence is guaranteed if \(-2g<p_y<0\) on the trough line \(y\in[-d,-b]\). The upper bound is ensured by the inequality \(p_y\leqslant-g\) on the trough line, which can be rigorously established for nonlinear Stokes waves of all amplitudes by way of maximum principles, using the fact that the pressure distribution is a super-harmonic function with respect to the physical variables, cf.. However, a rigorous proof of the lower bound for \(p_y\) is currently lacking, being unachievable by this approach. This is not a problem for extreme waves since \(b\) can be computed without relying on ([\[r1t\]](#r1t){reference-type="ref" reference="r1t"}). Indeed, \(a\) being given by [\[defamp\]](#defamp){reference-type="eqref" reference="defamp"}, the Bernoulli constant is \(B=2ga\) and \(b\) is obtained directly by computing [\[reletaimp\]](#reletaimp){reference-type="eqref" reference="reletaimp"} at a trough. # Conclusion {#secconclu} In this note, we examined the efficacy of exact relations for the recovery of nonlinear free surface wave profiles from pressure measurements at the bed, derived in, in particular their applicability to the reconstruction of the extreme Stokes wave. The extreme Stokes wave possesses intrinsic mathematical complications even beyond the level exhibited by regular nonlinear waves, due to the presence of a stagnation point at the wave-crest. There is a breakdown in regularity at the crest of an extreme Stokes wave, whereby the profile is no-longer differentiable, but merely continuous: the sharp wave-crest has an inner angle \(2\pi/3\). The relations introduced in employ a relatively simple local formulation without derivatives and integrations, which allows for great scope in their practical application. The directness of the surface reconstruction approach initiated in is due to the fact that physical variables, and the physical plane, are used throughout: intermediate conformal transformations are not invoked. The holomorphic function \(\mathfrak{Q}\) allows a reformulation of the problem into a simplified, but still exact, form. The convergence of the involved fixed-point iterations, required for obtaining the surface explicitly, was examined for the case of limiting extreme waves. A local analysis suggests (semi) convergence at angular crests, thereby offering an insight into the applicability of the reconstruction method in such an extreme case. Practical reconstructions of regular waves are demonstrated in via numerical examples, so they do not need to be reproduced here. An illustration for the extreme wave would require data (experimental or numerical) for the pressure at the seabed, that are not available. Beside the possible reconstruction of the extreme wave, one of our goals here is to illustrate the usefulness of working in the physical plane, since we could gain theoretical insights with only elementary mathematical tools, in addition to a practically useful method. It is hoped that the demonstrated robustness of this wave surface reconstruction approach will prove useful in treating other water wave problems, for instance the recovery of fully nonlinear rotational water wave profiles from pressure measurements, an objective which has hitherto proven unattainable. This will be the subject of future investigations.
{'timestamp': '2020-06-01T02:10:40', 'yymm': '2005', 'arxiv_id': '2005.14509', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14509'}
null
null
# Introduction {#sec:intro} Functional registration or time-warping, refers to the process of aligning two or more functions or curves in time and is often a pre-processing step necessary for appropriately analyzing such functions. By registering functions before performing statistical analysis on such functions, we can account for arbitrary reparameterizations of functions. This can lead to incorrect analyses of many functional data applications, such as the well-known growth rate curve analysis. Function registration is heavily relied upon in image and shape registration where analysis results can vastly differ depending on whether the data has been properly registered or not. More details on the importance of functional data registration can be found in, and. Functional data registration is also referred to as phase-amplitude separation, because the underlying goal of the procedure is to effectively distinguish phase (\(x\)-axis) from amplitude (\(y\)-axis) variation. For example, in tracking the migration paths of birds or hurricanes, functional data registration would allow one to isolate the statistical variation in the paths, from the statistical variation in the speed of traversing the paths. The registration of a pair of functions results in an optimal warping function, which enables one function to be aligned to the other. The resulting aligned functions characterize the amplitude variability, while the warping function captures the phase variability between the two functions. Early approaches to functional data alignment fall short in four major ways. (1) They lack the ability to characterize the uncertainty of the optimal warping function. (2) They assume the observed functions are naturally smooth and lack measurement error. (3) They do not consider more than one optimal alignment between a pair of functions. Finally, (4) Most methods do not use a proper distance as the objective function for registration. Traditional approaches to functional data alignment, which are demonstrated in, and, are not flexible enough to characterize the uncertainty of the resulting optimal alignment solution. These approaches make the common assumption that the functions to be aligned are smooth, and thus they break down when a function exhibits too much noise. These methods usually rely on a derivative which is extremely noisy when the original functions are noisy, presenting additional computational challenges. Recently, Bayesian frameworks have been proposed that can characterize the uncertainty of the warping function solution. The clear difference between these approaches is in how they specify a prior on the space of the warping function; as it lives on a nonlinear infinite dimensional manifold. The more recent Bayesian approaches by, and rely on the square root velocity function (SRVF) representation of the warping function space, introduced by and, to simplify the complicated geometry. We will also take advantage of this transformation and provide more details in Section [2](#sec:review){reference-type="ref" reference="sec:review"}. Although these approaches demonstrate how a Bayesian framework can naturally handle uncertainty quantification of the warping function through posterior inference, few have account for measurement error in the observed data and none allow for a multimodal posterior, i.e. multiple optimal warpings. Only the most recently proposed approach, has addressed the need to account for observed measurement error. There approach is for sparsely sampled functions where they propose a data-driven prior for inference and solely look at sparsely sampled functions and do not treat the dense problem. Previous approaches, Bayesian or otherwise, have assumed the observed functions to be aligned are naturally smooth. Although smoothness is a convenient assumption, it can be an invalid one in many practical applications. Recent work, utilized a fPCA construction to avoid overfitting when the data has additive amplitude variation. Wrobel, recently extended the alignment to non-Gaussian data. Both of these methods do not address the estimation of the additive noise process that we will address in this paper. Lastly, no current approaches consider the challenging case of multiple optimal alignments between a pair of functions; or briefly mention a possible solution without application. In this paper, we propose a hierarchical Bayesian approach to the registration of a pair of noisy functions on \(\mathbb{R}^1\) and demonstrate its advantages over previously proposed registration algorithms. We propose a new framework for functional alignment which relies on a proper distance metric, is robust to noise, capable of characterizing the uncertainty of the warping function, and can account for multiple optimal alignments. The novelty of our new framework is the following: Most notably, we employ parallel MCMC chains to capture multi-modal posterior distributions of our warping functions; to reflect the case when there are multiple optimal alignments. Additionally, we favor the geometric Hamiltonian Monte Carlo algorithm of (\(\infty\)-HMC), which is nontrivial to apply to problem of functional data alignment. The implementation of \(\infty\)-HMC within our MCMC sampler can appropriately account for the complex geometry of the target space and more efficiently sample the warping function. Lastly, our approach accounts for appropriate propagates measurement error, a challenge which has only recently been addressed by. This paper is organized in the following way. Section [2](#sec:review){reference-type="ref" reference="sec:review"} reviews pairwise functional registration in \(\mathbb{R}^1\), the general challenges associated with it, and introduces the square-root velocity function representation and proper distance metric relied upon throughout this paper. Section [3](#sec:pairwise){reference-type="ref" reference="sec:pairwise"} specifies our hierarchical Bayesian model for registering a pair of noisy functions on \(\mathbb{R}^1\), including our MCMC algorithm and multi-chain approach to the challenge of multiple alignments. In Section [4](#sec:examples){reference-type="ref" reference="sec:examples"}, we evaluate the approach on simulated functional data as well as two real data sets: a SONAR dataset that is naturally noisy and iPhone-collected accelerometer data with multiple possible alignments. Code for the method is found in the `fdasrvf` Matlab package on GitHub[^1]. Finally, we discuss the impact of this approach, extensions to multiple pairwise alignments, nontrivial extensions to functions on more complex geometries, and future work in Section [5](#sec:disc){reference-type="ref" reference="sec:disc"}. # A review of function registration in \(\mathbb{R}^1\) {#sec:review} Following the notation of and without loss of generality, let \(f\) be a real-valued and absolutely continuous function on domain \([0, 1]\). Note that in practice, \(f\) is observed as discrete and interpolation can be used to more easily perform the requisite calculations. Let \(\mathbb{F}\) denote the set of all such functions and \(\Gamma\) denote the set of boundary-preserving diffeomorphisms: \(\Gamma = \{\gamma: [0,1]\mapsto [0,1] \mid \gamma(0)=0,\gamma(1)=1\}\) such that the mapping \([0,1]\mapsto [0,1]\) is bijective (invertible) and differentiable. From this point on, we will refer to \(\Gamma\) as the set of warping functions. Then, for any \(f\in \mathbb{F}\) and any \(\gamma \in \Gamma,\) \(f \circ \gamma\) denotes the time-warping of \(f\) by \(\Gamma\). For simplicity, consider the pairwise alignment problem where we wish to align functions \(f_1,f_2 \in \mathbb{F}.\) A simplified registration problem can be formulated by finding a warping, \(\gamma^*,\) that minimizes the cost of translating \(f_2\) to \(f_1\), for chosen cost function \[\gamma^* = \text{argmin}_{\gamma} \| f_1-f_2 \circ \gamma\|^*,\] where \(\| \|^*\) is our distance metric yet to be chosen.[^2] There are a few main challenges that all alignment approaches face and handle differently. One challenge of function alignment, as pointed out by and, is finding a cost function to do the alignment that is both symmetric, that is, aligning \(f_1\) to \(f_2\) is the same as aligning \(f_2\) to \(f_1\), and positive-definite, so that the metric is always non-negative and zero if and only if \(f_1\) and \(f_2\) are the same function after alignment. A natural choice is the usual \(\mathbb{L}^2\) norm, denoted by \(\|\cdot\|^2\), but it does not satisfy the symmetry requirement. More precisely, \[\text{argmin}_{\gamma}\|f_1 \circ \gamma-f_2 \|^2 \neq \text{argmin}_{\gamma}\|f_1-f_2 \circ \gamma \|^2.\] Second, there can be the issue of degeneracy in which case \(\gamma^*\) is so distorted it can align functions which should not be aligned; giving a false impression that these functions are *close* in the \(\mathbb{L}^2\) sense when indeed they are not. Lastly, the \(\mathbb{L}^2\) norm is not invariant under warping. That is, \[\| f_1-f_2 \|^2 \neq \| f_1 \circ \gamma-f_2 \circ \gamma\|^2.\] This means that two functions which are similar in an \(\mathbb{L}^2\) sense, could be vastly different under the same warping, and vice versa. To overcome these three challenges, we follow, and and take advantage of the square-root velocity function (SRVF) representation introduced by. A function \(f\in \mathbb{F}\) can be represented as a SRVF via the mapping: \[q:[0,1]\mapsto \mathbb{R},\ \ q(f(t))=\hbox{sign}(\dot{f}(t))\sqrt{|\dot{f}(t)|} \hbox{ for any } f\in \mathbb{F}.\] There is an equivalency, up to a constant, between the SRVF of \(f\) and \(f\) itself and it is given by \(f(t) = f(0) + \int_0^t q(f(t))|q(f(t))| ds\), where \(|\cdot|\) is the absolute value. Moreover, the SRVF of \(f \circ \gamma\) is \((q \circ \gamma)\sqrt{\dot{\gamma}}\). The SRVF transformation lends itself naturally to the Fisher-Rao (FR) metric. It can be shown that the FR distance between two functions is equivalent to the \(\mathbb{L}^2\) distance between their respective SRVF transformations, i.e., \(\| f_1-f_2 \|_{FR} = \|q(f_1)-q(f_2) \|^2\) (see ). More importantly, the FR metric is phase invariant under warping, i.e., \(\| f_1 \circ \gamma-f_2 \circ \gamma \|_{FR} = \|f_1-f_2 \|_{FR}\) and shows that the FR metric is symmetric under warping as well, i.e., \(\| f_1 \circ \gamma-f_2 \|_{FR} = \| f_1-f_2 \circ \gamma \|_{FR}\). Following this framework and without loss of generality, we will align the SRVF of \(f_2\) to the SRVF of \(f_1\), and then map the aligned functions back to the original space \(\mathbb{F}\). In other words, we seek to estimate the warping function that minimizes \(||q_1-(q_2,\gamma)||^2\), where \((q_2,\gamma)=(q_2\circ\gamma)\sqrt{\dot{\gamma}}\) and \(q_j \doteq q(f_j(t))\) for \(j=1,2\). Additional challenges in function alignment come when placing the problem in a Bayesian framework, namely selecting a prior distribution for \(\gamma \in \Gamma\). Recall that \(\Gamma\) is the space of diffeomorphic function mappings from \([0,1] \mapsto [0,1]\). Both optimization and Bayesian inference over this space is difficult, in particular, because this space is nonlinear and infinite dimensional. For example, the sum or scalar product of functions in \(\Gamma\) is not necessarily still contained in \(\Gamma\). To overcome this difficulty, we follow the approach of which transforms \(\gamma\) to its corresponding SRVF representation, and exploits the Riemannian-geometric structure of this transformation. Which ultimately allows us to utilize more traditional inference or optimization algorithms that rely on the linearity of the underlying search space. To understand how this transformation works, it is helpful to think of the set of warping functions \(\Gamma\) as the space of univariate cumulative distribution functions for random variables on \([0,1]\). Then, for each \(\gamma \in \Gamma\) there is an associated density function. Now, let \(\psi=\sqrt{\dot{\gamma}}\) be the corresponding SRVF of \(\gamma\) and \(\Psi^+=\{\psi: [0,1]\mapsto \mathbb{R}^+\mid||\psi||^2=1\}\) be the space of square-root densities (SRD). The SRD space is the positive orthant of the unit sphere in the Hilbert space \(\mathbb{L}^2([0,1])\) denoted by \(\Psi\{\psi: [0,1]\mapsto \mathbb{R}\mid||\psi||^2=1\}\). While this space is still infinite and nonlinear, it is much more simply defined. Since the SRVF is a bijective mapping and \(\gamma(0)=0,\) we can reconstruct \(\gamma\) by the inverse mapping \(q^{-1}(\psi)(t)=\int_0^t\psi^2(s)ds.\) We can further simplify, and even linearize \(\Psi^+\) by mapping from the top half of the unit sphere onto a tangent space at \(\psi\) defined as \[T_{\psi}(\Psi)=\{g\in \mathbb{L}^2\mid\int_0^1g(s)\psi(s) ds=0\}.\] For simplicity, we typically take \(\psi = 1\), i.e., the identity function. Geometric details on \(T_1(\Psi)\) can be found in and. The exponential map and its inverse can be used to map between \(\Psi\) and \(T_1(\Psi):\) \[\begin{aligned} &\exp_1: & T_1(\Psi)\mapsto \Psi &\hspace{4mm} \exp_1(g)=\cos(||g||)+\sin(||g||)\frac{g}{||g||},~~ g\in T_1(\Psi)\\ &\exp^{-1}_1: & \Psi\mapsto T_1(\Psi) &\hspace{4mm} \exp^{-1}_1(\psi)=\frac{\theta}{\sin(\theta)}(\psi-\cos(\theta)) ,~\theta=d(1,\psi) \hbox{ and } \psi\in\Psi, \end{aligned}\] where \(d(1,\psi) = \cos^{-1}\left(\int_0^1 \psi(t) dt \right)\). Mapping \(\gamma\) onto the tangent space \(T_1(\Psi)\) (summarized in Figure [\[fig:mappings\]](#fig:mappings){reference-type="ref" reference="fig:mappings"}) gives a convenient representation of \(\gamma\) in the parametric vector space, and thus allows for a straight-forward prior specification to be placed on \(T_1(\Psi)\) (discussed further in [3.1](#sec:modelspec){reference-type="ref" reference="sec:modelspec"}). Intuitively, this linearization is akin to mapping the points on the top half of the sphere to the tangent plane at the the north pole. Moreover, because \(T_1(\Psi)\) is the space of square integrable functions with mean zero, one can parameterize this space of functions with a basis representation. Finally, through all of these transformations, the SRVF of \(f_2 \circ \gamma\), denoted as \(\mathcal{G}(g)\) can be written as \[\begin{aligned} \mathcal{G}(g(t))&:=(q_2,\gamma)(t)= q_2(\gamma(t))\sqrt{|\dot{\gamma(t)}|}&\\ &=q_2\bigg(\int_0^t\psi^2(s)ds\bigg)\psi(t)=q_2\bigg(\int_0^t\exp^2(g)(s)ds\bigg)\exp(g)(t),&&\\ \end{aligned}\] where \(g\) lives on the tangent space of \(\Psi^+\), which is again linear. # Pairwise registration in \(\mathbb{R}^1\) {#sec:pairwise} First, we will detail our proposed approach in the simple case of pairwise alignment of functions \(y_1\) and \(y_2\) on \(\mathbb{R}^1\). The functions are observed at a set of discretized time points \([t] = \{t_1,\dots,t_N\}\). In this section, we will fully specify our proposed Bayesian hierarchical framework for this pairwise alignment setting. Our Bayesian approach looks for optimal warping functions that warp one function to another using the \(\mathbb{L}^2\) distance of the SRVF representations of the two functions, as defined in the previous section. Furthermore, by mapping the space of warping functions to the linear tangent space \(T_1(\Psi)\) on the infinite dimensional half sphere we can perform the Bayesian inference over a parametrized, linear space. ## Model specification {#sec:modelspec} Let \(y_1\) and \(y_2\) be noisy observations of \(f_1, f_2 \in \mathbb{F}\), respectively. Then, at the first level of our hierarchical model we have, *Level 1.* \[y_1([t])=f_1([t])+\epsilon_1([t]),\ \epsilon_1([t]) \sim MVN(0_N,\sigma_1^2 I_N)\] and \[y_2([t])=f_2([t])+\epsilon_2([t]),\ \epsilon_2([t]) \sim MVN(0_N,\sigma_2^2 I_N),\] where the observed noise processes \(\epsilon_1, \epsilon_2\) are are assumed to follow a Gaussian white noise distribution with variances \(\sigma_1^2\) and \(\sigma_2^2\), respectfully, for each point in time. Here we assume no temporal correlation between noise parameters. Using the SRVF representation described in Section [2](#sec:review){reference-type="ref" reference="sec:review"}, we aim to align \(q_2(\gamma([t]))=q(f_2(\gamma([t]))\) to \(q_1([t])=q(f_1([t]))\). Using the transformations from the previous section, we can equate \(q_2(\gamma([t]))\) to \(\mathcal{G}(g([t]))\) where \(g\) is the projection of the square root density of \(\gamma\) onto the tangent space of the infinite half sphere and so we model \(q_1([t])-\mathcal{G}(g([t]))\) using a zero-mean multivariate Gaussian distribution following. It should be noted that \(q_2(\gamma([t])) = q_2(\int_0^{[t]}\psi(s)\,ds)\psi([t])\), where \(\int_0^{[t]}\psi(s)\,ds\) denotes the \(N\)-dimensional vector\ \(\{\int_0^{t_1}\psi(s)\,ds,\dots,\int_0^{t_N}\psi(s)\,ds\}\). Thus, at the second level we have, *Level 2.* \[q_1([t])-\mathcal{G}(g([t])) \sim MVN(0_N,\sigma^2 I_{N}),\] with negative log-likelihood \[\label{eq:phi} \Phi(g) :=-\log p(q_1,q_2; g)\propto\bigg(\frac{1}{\sigma^2}\bigg)^{N}\exp\bigg\{-\frac{1}{2\sigma^2}\sum_{i=1}^{N}\big(q_1(t_i)-(q_2,\gamma)(t_i)\big)\bigg\}.\] Following the approach of, we will assign a zero-mean Gaussian process prior to the sampled tangent space \(T_1(\Psi),\) \[g \sim GP(0,\mathcal{C}),\] with \(\mathcal{C}\) being a positive, self-adjoint and trace-class operator on \(\mathbb{R}^1.\) Zero-mean multivariate normal priors are assigned to mean functions \(f_1([t])\) and \(f_2([t])\) with structured kernel functions \(K_1\) and \(K_2\), i.e. \[f_1([t])\sim MVN(0_N,K_1) \hbox{ and } f_2([t]) \sim MVN(0_N,K_2).\] In this work, we specify the squared exponential kernel function \(K([t])=s^2\exp(-(d/2l)^2)\) for both \(K_1\) and \(K_2\) where \(d\) is the computed distance matrix of \([t].\) Conditionally-conjugate inverse-gamma priors are specified for all covariance parameters \(\sigma^2,\ \sigma_1^2,\ \sigma_2^2\) with the prior for \(\sigma^2\) less informative than prior for \(\sigma_1^2\) and \(\sigma_2^2\) to help with potential identifiability issues. Hyperparameters \(s_1^2, s_2^2\) and \(l_1,l_2\) are assigned inverse-gamma and uniform priors respectively. The full hierarchical posterior can now be written as \[p(g,\theta | y_1,y_2) = \left[ \prod_{j=1}^2p(y_j|f_j,\sigma_j^2) \right] \exp \left[-\Phi(g) \right]\pi(g,\theta),\] where \(\theta \doteq \{f_1,f_2,\sigma^2,\sigma_1^2,\sigma_2^2,\ s_1^2,\ s_2^2,\ l_1,\ l_2\}\), \(\pi(g,\theta)\) is the prior distribution over parameters \(g\) and \(\theta\), and \(p(y_j|f_j,\sigma_j^2)=\prod_{i=1}^Np(y_j(t_i)|f_j(t_i),\sigma_j^2)\) for \(j=1,2\) is a product of univariate Gaussian distributions. ## MCMC sampling A Metropolis within Gibbs sampler is used to sample from the complete posterior distribution \(p(g,\theta|y_1,y_2).\) For practical implementation, functions \(f_1, f_2\) are discretized and we specify a basis representation for \(g\), i.e., \(g=B\mathbf{v}\) where \(\bf{v}\) and \(B\) are the set of \(n_v\) basis coefficients and matrix of basis functions, respectively. The reason for this specification is as follows. Recall that \(g\) lives on \(T_1(\Psi)\), the tangent space to the top half of the infinite-dimensional unit sphere at the point \(\psi \in \Psi\). For simplicity, we take \(\psi\) to be the identity element so that \(T_1\) becomes the space of all \(\mathbb{L}^2\) integrable functions on \([0,1]\) that have zero mean with respect to unit weight, i.e., the uniform density on the unit interval. Even though \(g\) is still infinite-dimensional we can sample it using the Karhunen-Loève expansion where we specify the covariance operator \(C\) via its eigenpairs \((b_k,\lambda_k^2)\), where the set \(\{b_k(\cdot)\}\) forms an orthonormal basis for the functions space \(T_1(\Psi)\). We therefore sample independent variates \(v_k\sim\mathcal{N}(0,\lambda_k^2)\) and set \[g = \sum_{k=1}^M v_k b_k,\] where \(M\) is the number of basis functions. This is similar to the method proposed in. We can then use a Fourier series type representation to parameterize \(C\) in terms of a finite collection of basis coefficients, \(\mathbf{v}\), and discretized orthogonal basis vectors represented by columns of \(B\). The eigenvalues, \(\lambda_k\), are set to \(\sigma_g^2/k_2\), where \(\sigma_g\) is assumed to be known or provided. The choice of orthogonal basis functions are plentiful, but this paper uses the Fourier series and Legendre polynomial expansions. Both sets form a complete basis over the space of \(\mathbb{L}^2\) integrable functions on a compact interval. Moreover, for the application at hand, both basis functions (other than the constant) are orthogonal to the unit weight; thus making it easy to satisfy the tangent space property. The Fourier basis is typically used for periodic functions and so convergence can be hindered if the function values are different at the domain end points. Legendre polynomials do not have this limitation, but they are not as widely known. The smoother the function to be approximated is, the faster the decay of the basis coefficients. This means we need fewer basis coefficients to represent the underlying function. In fact if the function is infinitely differentiable, the decay of the basis coefficients can be spectral, i.e., exponentially decaying. This applies to both Fourier and polynomial based expansions (see ). The basis specification for \(C\) thus allows us to more efficiently explore the posterior space \(g|y_1,y_2,\theta\). To update \(g,\) we wish to sample from the conditional posterior \(p(g|y_1,y_2,\theta, B)\) \(\propto \exp\big(-\Phi(g)\big)\). To account for the complex geometry of the target space which \({g|\cdot}\) lies on and to allow for our sampler, we will exploit Hamiltonian dynamics. Specifically we use the \(\infty\)-HMC algorithm described in to sample \({g|\cdot}\) within our MCMC sampling procedure. \(\infty\)-HMC is a modification of the standard Hamiltonian Monte Carlo (HMC algorithm developed to be well-defined on the infinite-dimensional Hilbert Space and thus is ideal for sampling from \(T_1(\Psi)\). HMC is a natural choice for more complex geometries, as it allows for efficient sampling along posterior contours. As describes, HMC is an improvement over the preconditioned Crank-Nicholson method. Moreover, as we will show, in cases where the target density is multi-modal and separated by low probability regions, a parallel chain implementation with random starting points is needed to fully explore the state space of \({g|\cdot}\) (details given in Section [3.3](#sec:multalign){reference-type="ref" reference="sec:multalign"}). The algorithm, detailed in Algorithm [\[alg:infhmc\]](#alg:infhmc){reference-type="ref" reference="alg:infhmc"} utilizes an auxiliary variable. As suggested in and implemented in, we choose to specify the auxiliary variable \(v,\) interpreted as the *velocity* of \(g\). To implement Algorithm [\[alg:infhmc\]](#alg:infhmc){reference-type="ref" reference="alg:infhmc"}, and to update \(g\), it is necessary to define the location-specific preconditioner matrix \(\mathcal{K}(g)\) as the covariance of a local Gaussian approximation \(N(m(g),\mathcal{K}(g))\) to the posterior. We define this pre-conditioner through its inverse: \[\mathcal{K}(g)^{-1} = \mathcal{C}^{-1} + \beta \mathcal{H}(g),\] where \(\mathcal{H}(g)\) is chosen as the Gauss-Newton Hessian (GNH), i.e. \[\mathcal{H}(g) = \langle \bigtriangledown \mathcal{G} (g),\ \mathcal{C}^{-1}\bigtriangledown \mathcal{G} (g)\rangle.\] We can then calculate the natural gradient \(\eta\): \[\eta (g)=-\mathcal{K}(g) \big[ \bigtriangledown \Phi (g)-\beta \mathcal{H} (g) g\big],\] to calculate the Hamiltonian flow, \(\Xi^t.\) As the exact analytic expression of \(\Xi^t\) is often not available, \(\infty\)-HMC defines the flows \(\Xi_1^t,\ \Xi_2^t\) of a split Hamiltonian system to numerically approximate \(\Xi^t:\) \[\Xi_1^t(g,v)=\big(g,v+\frac{t}{2}\eta(g)\big)\ \hbox{ and }\ \Xi_2^t(g,v) = \big(g\cos t+v\sin t,-g\sin t+v\cos t\big).\] The leapfrog map \(\Psi_h(g,v): (u_0, v_0) \mapsto (g_h,v_h)\) is the composition of three sub-steps: \[\Psi_h(g,v)=\Xi_1^{h/2} \circ \Xi_2^h \circ \Xi_1^{h/2},\] and the exact Hamiltonian flow \(\Xi^T\) is then approximated by \[\Psi_h^{I}(g,v)=\Psi_h^{\lfloor T/h \rfloor},\] a concatenation of \(I=\lfloor T/h \rfloor\) Verlet steps. \(\infty\)-HMC requires user chosen time-step \(h\) and leap-frog step \(T.\) \(\bigtriangledown\Phi(g)\) is the directional derivative of \(\Phi\), defined in [\[eq:phi\]](#eq:phi){reference-type="eqref" reference="eq:phi"}, with respect to \(g\) which is provided in the [\[sec:deriv\]](#sec:deriv){reference-type="ref" reference="sec:deriv"}. Compared to the *Z-mixture pCN algorithm* used in to update \(\bf{v}\), we find that using \(\infty\)-HMC algorithm to update \(g\) is significantly more efficient. We favor \(\infty\)-HMC over Z-mixture pCN because we are sampling from an infinite dimensional space. demonstrates that random walk-like algorithms, like the Z-mixture pCN, are not efficient and can break down on these high dimensional spaces. Additionally, the gradient information \(\infty\)-HMC relies upon helps inform the sampler and has been shown to increase overall MCMC sampling performance for hierarchical models, especially when sampling on infinite dimensional spaces. For broader application and sampling efficiency of the prior on the space of diffeomorphisms we chose to implement \(\infty\)-HMC for these reasons. We found that the Z-mixture pCN algorithm, even when implemented via parallel chains with random starts, was not able to capture the expected bimodal posterior in our simulated data example. The posterior was biased towards one mode only as shown in the posterior samples and achieved higher SSE. Figures demonstrating these comparisons are given in [\[sec:mcmcdiag\]](#sec:mcmcdiag){reference-type="ref" reference="sec:mcmcdiag"}. The additional tuning parameters, specifically the leap frog and time step sizes (\(T\) and \(h\) in Algorithm [\[alg:infhmc\]](#alg:infhmc){reference-type="ref" reference="alg:infhmc"} respectively), available using \(\infty\)-HMC allowed for the posterior samples to more easily jump between the multiple possible target modes. Mean functions \(f_1, f_2 \in \mathbb{R}^1\) are sampled from their respective conditional posteriors \[p(f_k|y_k,\theta)\propto p(y_k|f_k,\sigma_k^2)p(q_k([t])-\mathcal{G}(g([t]))|y_1,y_2,\theta)\pi(f_k),\ k=1,2~,\] via Metropolis-Hastings with specified proposals \[f_k'([t]) \sim MVN(f_k([t]),\Sigma_k^*),\ k=1,2,\] and squared exponential correlation structures specified for \(\Sigma_1^*\) and \(\Sigma_2^*.\) Variance parameters \(\sigma^2,\ \sigma_1^2,\ \sigma_2^2\) and hyperparameters \(s_1^2\) and \(s_2^2\) can be Gibbs sampled from their respective inverse-gamma posteriors. Hyperparameters \(l_1\) and \(l_2\) can be sampled via Metropolis-Hastings with Gaussian proposal distributions and acceptance ratios: \[\alpha_{l_k}=\frac{p(f_k|y_k,l'_k)\pi(l_k)}{p(f_k|y_k,l_k)\pi(l'_k)},\ k=1,2.\] ## MCMC for multiple optimal alignments {#sec:multalign} Due to the high efficiency of the \(\infty\)-HMC algorithm, a single posterior chain generated using \(\infty\)-HMC would not be able to jump between modes and thus would be unable to capture multi-modal distributions. As highlighted by, if the target distribution is multi-modal with modes separated by regions of low probability density; it is nearly impossible for any HMC algorithm to transition between modes due to the conservation of energy property of Hamiltonian dynamics. To obtain a multi-modal posterior distribution for \(g|y_1,y_2,\theta,\) we run \(K\) parallel chains with initial values for the basis coefficients of \(g\) chosen randomly from a standard Normal distribution. The idea is to run separate chains at enough randomly generated starting points to land in the vicinity of the multiple modes; so that we don't have to rely on the HMC algorithm to cross the low-probability regions. Of course, we have no idea where those modes are in general, so it is important to explore the initial starting space. In this case the starting space is the space of coefficients, \(\mathbf{v}\), of the linear expansion of \(g\). Furthermore, under the assumption that each chain reaches their target sampling density after a thorough burn-in period, we can treat each chain as providing independent samples; and thus simply pool them together. For example, if each of the ten chains produce 10k samples, we can pool them together to obtain 100k samples. Alternatively, we can think of this approach as a type of parallel MCMC with a constant temperature parameter and no mixing. It is important to highlight that there could be more than one best possible solution. Having a posterior that can capture the total variability of the warping function sample all possible solutions, rather than simple pick one as a local optima, is an advantage of our method. However in practice, it may be necessary to choose between multiple possible solutions. This determination is application dependent; a good metric is to choose the best warping function that produces the smallest amplitude distance \(||q_1-(q_2,\gamma))||^2\) between the two SRVFs \(q_1\) and \(q_2\). Another suggestion is one sees see more of the posterior favoring one alignment over the other and this solution could be chosen. # Examples {#sec:examples} To demonstrate our proposed method, we will compare our flexible Bayesian approach with the state-of-the-art Dynamic Programming (DP) method of. In short, the DP algorithm solves the optimal warping function by proposing successively better piecewise linear pathways on a unit square grid; where better is defined in terms of the Fisher-Rao metric. First, we will assess our method's performance on simulated noisy data for which multiple optimal alignments exist. Next, we will apply our method to two real datasets: a SONAR dataset and an iPhone movement dataset. The SONAR data is notably noisy and thus difficult to register. The iPhone data is less noisy but has multiple optimal alignments that previous methods discussed in Section [1](#sec:intro){reference-type="ref" reference="sec:intro"} do not account for. Before we move on to the examples, we need to address the issue of computing means or averages in non-Euclidean geometries, e.g., the positive orthant of infinite-dimensional unit sphere. For problems of this type, we typically use the Karcher or Fréchet mean. This is obtained by minimizing the average squared distance between all pairs of sample points, \(x_1,\dots,x_N \in \Psi\) i.e. \[m = \text{arg} \min_{p \in \Psi} \sum_{i=1}^N d^2(p,x_i),\] where \(d\) is the metric or geodesic distance measure on \(\Psi\), the infinite-dimensional positive orthant of the unit sphere, given by \[d(\psi_1,\psi_2) = \cos^{-1}\left(\int_0^1 \psi_1(s)\psi_2(s) ds \right).\] Note that in the case of Euclidean geometry, the Karcher mean is simply the average. The computation of the Karcher median is analogous. We use the method presented in, which is an extension of Algorithm 2 in. Now, in the multiple alignment case, our posterior will be multi-modal. In order to find the centroid of these individual modes, we do the following. We begin by computing all the pairwise distances under the metric \(d\), between all posterior samples. We then use a clustering algorithm to separate the samples into their respective clusters. Then, for each cluster the Karcher mean or median can be computed as in the unimodal case. ## Simulated data {#sec:simex} Consider the misaligned and noisy observations \(y_1\) and \(y_2\) shown in Figure [\[fig:simf1f2\]](#fig:simf1f2){reference-type="ref" reference="fig:simf1f2"} simulated by adding Gaussian white noise with \(\sigma_1^2=\sigma_2^2=0.001\) to the true mean functions \(f_1\) and \(f_2\). Without loss of generality, we wish to align \(y_2\) to \(y_1.\) The right panel in Figure [\[fig:simf1f2\]](#fig:simf1f2){reference-type="ref" reference="fig:simf1f2"} shows the estimated posteriors for \(f_1\) and \(f_2\) given our Bayesian approach. Figure [\[fig:simwarping\]](#fig:simwarping){reference-type="ref" reference="fig:simwarping"} compares the dynamic programming (DP) solution with our Bayesian approach. On the left, we see the optimal warping function for \(y_2\) in blue, found by DP (\(\gamma_{DP}\)), which reflects some of the noise in the data and only identifies one possible warping function. The corresponding warped solution \(y_2 \circ \gamma_{DP}\) is also shown in blue on the right. Also the warped solution of \(\hat{f}_2 \circ \gamma_{DP}\) is shown in green, where \(\hat{f}_2\) smoothed version of \(y_2\) and DP is performed on a smoothed versions of \(y_1\) and \(y_2\). The smoothing in this case was performed using Gaussian process regression. In our Bayesian approach, we ran 8 MCMC chains each with 20,000 iterations, a burn-in of 5,000 iterations without thinning, for a total of 4,000 effective samples. The proposal parameters were chosen such that acceptance rates for each chain were between 0.2 and 0.4 (see Figure [\[fig:simex_chains\]](#fig:simex_chains){reference-type="ref" reference="fig:simex_chains"} for MCMC chains). Furthermore, we used \(n_v=10\) Fourier basis functions to approximate the function \(g\) on the tangent space \(T_1(\Psi)\) resulting in a dimensionality of 20 (two for each basis function). The left figure of Figure [\[fig:simwarping\]](#fig:simwarping){reference-type="ref" reference="fig:simwarping"} compares the posterior samples of \(\gamma|y_1,y_2\), with credible intervals and posterior mode to the DP solution. The right figure of Figure [\[fig:simwarping\]](#fig:simwarping){reference-type="ref" reference="fig:simwarping"} compares the posterior median warped solution to the DP warped solutions. From this we can see that the Bayesian approach gives us three possible solutions: (1) \(f_2\) is aligned to the leftmost peak of \(f_1\), (2) \(f_2\) is aligned to the rightmost peak of \(f_1\), and (3) \(f_2\) is aligned to both peaks of \(f_1\). Note that the DP method only gives us one out of the possible three solutions. Further exploration of the Bayesian approach is shown in Figure [\[fig:simcolored\]](#fig:simcolored){reference-type="ref" reference="fig:simcolored"}. Here, we break down the posteriors \(\gamma|y_1,y_2\) and \(f_2 \circ \gamma|y_1,y_2\) from the 8 different MCMC chains, colored by the 3 posterior modes found. It is clear that 3 unique alignments were captured in the posteriors of \(\gamma|y_1,y_2\) and \((f_2\circ \gamma)|y_1,y_2\) among the 8 different MCMC chains; identified by three distinct colors. The left shows the three posterior modes and respective 95% credible regions, characterizing the uncertainty of each possible warping and the uncertainty of \((f_2\circ \gamma)|y_1,y_2\). This is exhibited by the width of the color-coded samples on the right. To give a statement on computational cost our implementation of the MCMC algorithm is done in MATLAB; and one chain for \(3.2e4\) iterations takes 24 seconds on a 8 Core Mac Pro with 32GB of RAM. The dynamic programming algorithm is computationally \(O(N^2)\), where \(N\) is the dimension of the grid in the search space for the minimal energy, and for this simulated example \(N=101\). The code provided the `fdasrvf` MATLAB package for DP is written in C and runs in 0.2 seconds. We executed this simulation for 25 replicates and computed the point-wise sum-of-squared error (SSE) for the median warping from our method and the warping function from DP performed using the raw data, \(y_j,~j=1,2\); also from performing DP on the smoothed version of \(y_j\). Figure [\[fig:multsim_SSE\]](#fig:multsim_SSE){reference-type="ref" reference="fig:multsim_SSE"} presents a box plot for the SSE for all three methods. The SSE of the Bayesian method is similar to performing DP on the smoothed data. It should be noted that there is a larger spread in the inter-quartile region of the Bayesian method, and this is due to the fact that it is capturing multiple possible solutions that have different SSE values. Both of the DP solutions only find one solution, and this uncertainty (e.g., more than one registration) is not characterized in these methods. Figure [\[fig:multsim_ex\]](#fig:multsim_ex){reference-type="ref" reference="fig:multsim_ex"} presents four replicates from the simulated data with the median from the Bayesian posterior along with the posterior samples. The median of the posterior of \(y_1\) and \(y_2\) is shown respectively as \(f_1\) and \(f_2\). Additionally, the DP solutions for the noisy data (green) and the smoothed noisy data (blue). As expected the median of the Bayesian solution and the DP on the smoothed noisy data match nicely. However, the benefit of the Bayesian solution is shown in the posterior, where the multiple possible registrations are captured (with associated uncertainties) as the example as \(f_1\) has two peaks and \(f_2\) has one peak. ## SONAR data {#sec:sonar} Next, we apply our alignment approach to naturally noisy SONAR data collected at the Naval Surface Warfare Center Panama City Division's (NSWC PCD) test pond. For a description of the pond and measurement setup, the reader is referred to. In summary, the idea is to use the acoustic signals, generated from SONAR data, to discriminate and classify underwater "targets", e.g., unexploded ordnance. More precisely, acoustic signals were generated from the raw SONAR data to construct "target strength\" as a function of frequency and aspect angle. Due to the relatively small separation distances between the targets in the measurement setup and orientation, and uncertainty in the placement, the scattered fields from the targets overlap leading to misaligned signatures. This could lead to erroneous identification and classification of the target. For this example, we took two one-dimensional misaligned signatures, each with 1102 data samples, from a target that was a small notched aluminum cylinder. In our Bayesian approach, we ran 8 MCMC chains with 4,000 iterations each and a burn-in period of 2,000 steps without thinning; for a total of 16,000 samples. The proposal, prior, and hyperprior parameters were chosen such that acceptance rates were between 0.2 and 0.4 (see Figure [\[fig:sonar_chains\]](#fig:sonar_chains){reference-type="ref" reference="fig:sonar_chains"} for MCMC chains). We additionally specified \(n_v=4\) Fourier basis functions to approximate \(g\), as opposed to 8 in the previous example. We observed that reducing the number of basis functions \(n_v\), allowed our HMC algorithm to more easily explore the posterior space of \(g\); likely by allowing the inference to focus entirely on the lower frequency basis elements. Lastly, due to the noisiness of this data we only sampled \(20\%\) of the data, instead of the full set of 1102 data points, in order to obtain smooth estimates of \(f_1\) and \(f_2\) and avoid overfitting. The posteriors \(f_1|y_1\) and \(f_2|y_2\) of the acoustic signatures from the SONAR data are shown in Figure [\[fig:sonar_f1f2post\]](#fig:sonar_f1f2post){reference-type="ref" reference="fig:sonar_f1f2post"} on the left (gray) and right (in orange and yellow). On the right, we compare the DP aligned solution (in blue) and the Bayesian aligned solution (in gray). Note that our Bayesian approach offers multiple possible alignments, one of which is similar to the DP approach, but another which more accurately matches the maximum peaks of \(f_1\) and \(f_2\). Figure [\[fig:sonar_gampost\]](#fig:sonar_gampost){reference-type="ref" reference="fig:sonar_gampost"} on the right panel compares the MAP estimates to the DP solution. Figure [\[fig:sonar_gampost\]](#fig:sonar_gampost){reference-type="ref" reference="fig:sonar_gampost"} on the left compares the DP solution to the posterior distribution of \(\gamma|y_1,y_2\) and shows the posterior median and \(95\%\) credible region of \(\gamma|y_1, y_2\). The credible region quantifies the uncertainty around the estimated warping function \(\gamma\) and thus the warped function \((f_2 \circ \gamma)\). Note that the credible region obtained from the Bayesian approach encapsulates the DP solution, which itself is not able to adequately account for the noise in the data. Subsequently, the uncertainty can be pushed through any later analyses for any quantity of interest that may depend on the aligned or warped functions. For example, any statistical moment calculations performed on the aligned functions, e.g., principal component analysis, can be modified to account for the uncertainty in the warping functions.[^3] ## iPhone data {#sec:iphone} This data set consists of aerobic actions of subjects, such as biking, running, walking, etc., recorded using the Inertial Measurement Unit (IMU) on an Apple iPhone 4 smartphone; which these days is like using a cassette tape to listen to music. The IMU included a 3D accelerometer, gyroscope, and magnetometer. Each sample was taken at 60Hz, and manually trimmed to 500 samples (every 8.33s) to eliminate starting and stopping movements. For more information on the data set the reader is referred to. We chose to demonstrate our method on two of forty-five functional samples from the walking accelerometer data in the \(x\)-direction. In this context, we are specifically interested in the information contained in the separated phase and amplitude components, rather than the resulting alignment. For example we are only interested in the amplitude variability of the acceleration in the \(x\)-direction. Comparing the functions after warping would allow us to consider this variability. The two examples we are aligning, shown in the right figure of Figure [\[fig:iphone_f1f2post\]](#fig:iphone_f1f2post){reference-type="ref" reference="fig:iphone_f1f2post"}, clearly have multiple possible alignments of \(y_2\) to \(y_1\) that we would like to also capture in the posterior \(\gamma|y_1,y_2.\) To perform the Bayesian inference, we again ran 8 MCMC chains with 5,000 iterations each, a burn-in period of 1,000 steps, and thinning every other sample, for a total of 16,000 effective samples. The proposal, prior and hyperprior parameters were chosen such that acceptance rates were between 0.2 and 0.4 (see Figure [\[fig:iphone_chains\]](#fig:iphone_chains){reference-type="ref" reference="fig:iphone_chains"} for MCMC chains). We additionally specified \(n_v=8\) Legendre basis functions to approximate \(g.\) We specify Legendre polynomials here since the data is non-periodic in nature. The posteriors \(f_1|y_1\) and \(f_2|y_2\) can be seen in the left panel of Figure [\[fig:iphone_f1f2post\]](#fig:iphone_f1f2post){reference-type="ref" reference="fig:iphone_f1f2post"} along with \(y_1\) and \(y_2\) and the medians are shown in the right panel of Figure [\[fig:iphone_gampost\]](#fig:iphone_gampost){reference-type="ref" reference="fig:iphone_gampost"}. This image also compares the DP aligned solution \((y_2 \circ \gamma_{DP})\) to the posterior alignment of \(f_2|y_2\), \((f_2 \circ \gamma) |y_1,y_2,\) from our Bayesian approach. It is clear that our Bayesian approach can capture multiple possible alignments, including alignments similar to the DP solution. For example, in addition to the alignment captured by the DP algorithm, the Bayesian approach also accounted for an alignment of \(f_2\) to the leftmost peak of \(f_1\). It is interesting to note here that the method didn't match \(f_2\) to the rightmost peak of \(f_1\). This would be caused by an extremely distorted warping function and the Fisher Rao metric natively guards against that by penalizing too high of a gradient. Figure [\[fig:iphone_gampost\]](#fig:iphone_gampost){reference-type="ref" reference="fig:iphone_gampost"} on the left compares the DP solution to the posterior distribution of \(\gamma|y_1,y_2\) and shows the posterior median and \(95\%\) credible region of \(\gamma|y_1, y_2\). The credible region quantifies the uncertainty around the estimated warping function \(\gamma\) and warped function \((f_2 \circ \gamma)\). The DP solution, obtained by trying to align the noisy data without prior data smoothing, is not built to account for the multiple possible alignments. # Discussion {#sec:disc} We have proposed a new flexible Bayesian approach to functional alignment that handles measurement error and accounts for multiple optimal alignments in the posterior of the warping function \(\gamma.\) We have demonstrated its advantages over the state-of-the-art Dynamic Programming method that has been used in recent alignment literature using both simulated and real datasets. Unlike DP, a Bayesian approach can characterize the uncertainty in the warping function solution \(\gamma\), with Bayesian credible intervals. The hierarchical structure of our Bayesian method allows us to estimate measurement error observed in \(y_1\) and \(y_2\) and extract the mean functions \(f_1\) and \(f_2\) to be aligned, respectively. Accounting for measurement error directly in the method itself avoids any need for smoothing of the data typically done prior to applying DP in practice. Additionally, by running parallel MCMC chains, the posterior of the warping function \(\gamma\) is able to capture all possible alignments and visualize the posterior modes and respective credible regions for one or more distinct alignments. Although existing Bayesian methods can account for uncertainty in the warping function, they are not able to find more than one possible alignment. This is because they focus on converging efficiently to one solution, and do not account for measurement uncertainty. Without accounting for all possible alignments, we are missing information; and not accounting for all uncertainty in \(\gamma\). For future work, we look to extend the method to the multiple alignment problem. This will not be trivial in the case of multi-modal posteriors and multi-function alignment, as the solution will not be as simple as running multiple chains. The extension in our case would be the following: given \(I\) functions you would construct \(I\) pairwise alignments in Level 1 and Level 2 and then model the mean or template function using a Gaussian process prior and update. This processes would be somewhat similar to what was proposed in. However, there lies the additional difficulty in sampling a model which can give multiple solutions. For some cases, each pairwise alignment to the template would produce multiple possible gamma functions. One would either need to determine which mode (e.g., *optimal*) warping function to use or the uncertainty would need to be propagated to the sampling of the mean function. As noted in Cheng et al.,, this template is only identifiable up to an equivalence class of warpings. The issue is more pronounced in the case of multiple alignments. The use of wormhole MCMC () or something similar would need to be explored and possibly used in this situation. Additionally, we can extend this from curves to trajectories that lie on Riemannian manifolds \(\mathcal{M}\). In this case, one has to account for the non-zero curvature of the space and in particular, the calculation of the gradient in the Fisher Rao metric.
{'timestamp': '2021-03-05T02:15:32', 'yymm': '2005', 'arxiv_id': '2005.14372', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14372'}
null
null
null
null
null
null
null
null
null
null
null
null
# Introduction Molecular communication (MC) uses molecules as carriers of information. Molecular communication is envisioned to be applicable in a wide range of engineering and medical applications, especially as a means to realize communications among engineered biological nanomachines (see ). In diffusion-based MC, molecules are released into the medium by molecular transmitters. Information is coded by the transmitter in the type, number, or release time of the molecules. The released molecules randomly diffuse in the medium, with some reaching the molecular receivers. The receiver decodes the message sent by the transmitter based on the number of sensed molecules (see for some examples of modulation schemes). Broadly speaking, two main types of diffusion-based MC exists: microscale MC and macroscale MC. In microscale MC, a small number of molecules are released into the medium by transmitters. The movement of each molecule is random and follows Brownian motion. On the other hand, in macroscale MC, a large number of molecules are released into the medium (the number of released molecules is in the order of moles). Macroscale MC is of interest as an alternative to electromagnetic wave-based systems in certain media. In macroscale MC, instead of focusing on the location of individual molecules, by the law of large numbers, the *average concentration* of molecules is described by Fick's law of diffusion, which is a *deterministic* differential equation. Everything is described by deterministic equations until this point. However, various sources of noise or imperfection could be considered for molecular transmitters and receivers. In particular, the literature on MC usually associates a measurement noise to the receivers. The variance of this measurement noise depends on the concentration level of molecules at the receiver . In particular, a commonly used measurement noise is the "Poisson particle counting noise\" where the measurement follows a Poisson distribution whose mean is proportional to the concentration of molecules at the time of measurement. **Motivation:** One of the unique features of MC with no parallel in classical wireless communication is *chemical reactions*: different types of molecules can react with each other and form new types of molecules in the medium. This feature of MC poses a challenge in macroscale MC since equations describing chemical reaction with diffusing particles are *nonlinear* partial differential equations with no closed-form solutions. In other words, there is no analytical closed-form formula that describes the variations in the concentration of molecules over time and space for given boundary conditions, inputs to the medium, and system parameters such as the diffusion and reaction rate constants. These equations are commonly solved by numerical methods. While numerical techniques (such as the finite difference method and the finite element method) can provide accurate solutions, they require extensive computational resources. More importantly, these solutions are not generalizable: assume that we have solved the reaction-diffusion equations for one particular release pattern of molecules by the transmitters into the medium. Next, if we make some changes to the release pattern of molecules, we should start all over again and solve the reaction-diffusion equations again for the new release pattern. Numerical methods provide little insight into how the solution would change if the input or parameters of the medium change. This has a major drawback for the design of coding and modulation schemes, where we wish to optimize and find the best possible release pattern. A tractable (even if approximate) model for the solution of the reaction-diffusion systems is required to design codes or modulation schemes. Only with such a model can one formally the optimality of certain waveforms for a given communication problem. **Our contribution:** We apply the perturbation theory to design modulation schemes among manufactured devices in macroscale MC systems involving chemical reactions. Perturbation theory is a set of mathematical methods for finding approximate solutions. It was originally proposed to calculate the motions of planets in the solar system, which is an intractable problem (as the so-called three-body problem shows). The theory has been broadly applied in different scientific areas such as physics and mechanics for solving algebraic equations with no analytical solutions. While the perturbation theory has been used in the study of differential equations in general and in the context of fiber optics communication systems, to the best of our knowledge it has not been hitherto utilized in molecular communication.[^1] Just as non-linear functions can be locally approximated by the first terms of their Taylor series, perturbation theory shows that non-linear reaction-diffusion equations can be also approximated by their lower order terms. Our main contribution is a proposal to design coding and modulation schemes based on the lower order terms, which admit closed-form solutions. In other words, we provide an analytically tractable (approximate) model for studying chemical reactions in molecular communication. The accuracy of the model can be increasingly improved by including more terms from the Taylor series. We concretely illustrate the perturbation method by considering the following reaction-diffusion system in which molecules of type \(\mathtt{A}\) and \(\mathtt{B}\) react with each other in the medium and produce molecules of type \(\mathtt{C}\): \[\begin{aligned} \label{ex1:reactionN1} \mathtt{A} + \mathtt{B} \underset{\lambda_2}{\stackrel{\lambda_1}{\rightleftharpoons}} \mathtt{C}. \end{aligned}\] Forward and backward reaction rates \(\lambda_1\) and \(\lambda_2\) represent the speed at which the chemical reaction takes place in the forward and backward directions. This reaction-diffusion system is chosen because it is one of the simplest chemical reactions with no closed-form solution. This basic reaction appears in many contexts, e.g. \(\text{base}+\text{acid}\rightarrow \text{salt}\), or \(NH_3+{H_2O}\rightarrow {NH_4OH}\), \(\text{ADP}+\text{P}\rightarrow \text{ATP}\), or \(\text{lipoprotein} + \text{PRAP1} \underset{\lambda_2}{\stackrel{\lambda_1}{\rightleftharpoons}}\text{PRAP1-lipoprotein}\) in biology. It is used in to design a communication strategy between engineered devices. It may be also used in chemical computing, *e.g.* to implement a binary AND gate (as the product molecules are produced only when both reactants are present). The application considered in this paper is a communication system involving three engineered devices, two transmitters, and one receiver: the two transmitters release molecules of type \(\mathtt A\) and \(\mathtt B\) respectively, and the receiver senses the product molecules of type \(\mathtt C\). The goal is to compute the best transmission waveform for each transmitter so that the receiver has minimum error probability to decode the messages of both transmitters (a multiple access channel setting). In this setting, we find the optimal waveforms that minimize the error probability in the low rate reaction regime (or in the small transmission time interval regime). In particular, we show that instead of using a continuous release waveform, it is optimal for the transmitters to release molecules at two time instances. To illustrate the broad applicability of our technique, we also discuss other reaction-diffusion systems (different from [\[ex1:reactionN1\]](#ex1:reactionN1){reference-type="eqref" reference="ex1:reactionN1"}) in the Appendix [12](#ex2,3){reference-type="ref" reference="ex2,3"}. These examples cover scenarios where the chemical reaction is either facilitating or impeding effective communication. **Related works:** The math literature on nonlinear partial differential equations (PDEs) studies different aspects of these equations, such as the existence and uniqueness of the solution, semianalytical solutions, numerical solutions, etc. Since most PDEs do not have closed-form solutions, showing the existence and in some cases, uniqueness of solution are important topics in the theory of PDEs. Unlike ordinary differential equations (ODE) which have a straightforward theorem for the existence and uniqueness of a solution, there is no general method for PDEs to show the existence and uniqueness of the solution. For instance, the existence and smoothness of solutions for the Navier-Stokes equations that describe the motion of a fluid in space are fundamental open problems in physics. Semianalytical techniques are series expansion methods in which the solution is expressed as an infinite series of explicit functions. Semianalytical techniques include the Adomian decomposition method, Lyapunov artificial small parameter method, homotopy perturbation method, and perturbation methods . There are many numerical methods for solving PDEs which are classified in terms of complexity and stability of the solution. The finite element method, finite difference method, spectral finite element method, meshfree finite element method, discontinuous Galerkin finite element method are some examples of numerical techniques for solving PDEs. For example, in the finite difference method, we partition the domain using a mesh and approximate derivatives with finite differences computed over the mesh. One of the challenges of using this method is determining the appropriate mesh size to guarantee the stability of the solution.[^2] There are some prior works in the literature on chemical physics that utilize the perturbation theory. For instance, the average survival time of diffusion-influenced chemical reactions is studied in. In some classes of chemical kinetics (describe by ODEs) have been solved by the perturbation theory. However, the setup and approach in these problems differ from the one encountered in MC. Due to their evident importance to MC, chemical reactions have been the subject of various studies. A molecular communication system involves transmitters, receivers, and the molecular media; chemical reactions may occur in each of these individual building blocks. Transmitters could use chemical reactions to produce signaling molecules. This is a chemical reaction inside the transmitter unit. On the receiver side, one might have ligand (or other types of) receptors on the surface of the receiver which react with incoming molecules. These receptors have been the subject of various studies, e.g., see. Finally, chemical reactions have also been considered in the communication medium. This aspect of chemical reactions is of interest in this work. It is pointed out that chemical reactions could be used to suppress signaling molecules and thereby reduce intersymbol interference (ISI) and the signal-dependent measurement noise , or to amplify the signal. Complicated propagation patterns can be obtained by using chemical reactions, and negative molecular signals could be implemented using chemical reactions . Notably, chemical reactions are shown to be beneficial for coding and modulation design. Since solving the reaction-diffusion equations is intractable, these works either use numerical simulations to back up the presented ideas or else simplify the reaction-diffusion process via idealized assumptions about chemical reactions. Authors in provide an iterative numerical algorithm for solving reaction-diffusion equations. In, a neural network is used as the decoder in a medium with chemical reactions. This paper is organized as follows: in Section [2](#sec::generalperturbation){reference-type="ref" reference="sec::generalperturbation"}, we illustrate the perturbation method for solving reaction-diffusion equations through an example. In Section [3](#Sec:Mod){reference-type="ref" reference="Sec:Mod"} we design modulation schemes for our example in Section [2](#sec::generalperturbation){reference-type="ref" reference="sec::generalperturbation"}. In Section [4](#sec:Val){reference-type="ref" reference="sec:Val"}, we validate our model through numerical simulation. Finally concluding remarks and future work are given in Section [5](#Conclusion and Future Work){reference-type="ref" reference="Conclusion and Future Work"}. **Notations and Remarks:** For functions \(u_i(x,t)\) and \(v_i(x,t)\), we define index convolution as follows: \[\begin{aligned} \label{dicreteconv} (u_{0:i-1}*^d v_{0:i-1})(x,t)=\sum_{j=0}^{i-1} u_{j}(x,t)v_{i-1-j}(x,t). \end{aligned}\] For two functions \(u(x,t)\) and \(v(x,t)\), convolution in both time and space is denoted by \(**\) and defined as follows: \[\begin{aligned} (u**v)(x,t)=\int_{x'}\int_{t'}u(x,t)v(x-x',t-t')dx'dt'.\label{eqnconvts} \end{aligned}\] The concentration of molecules of type \(\mathtt{A}\) at location \(x\) and time \(t\) is denoted by \([\mathtt{A}](x,t)\). Similarly, we use \([\mathtt{B}](x,t)\) and \([\mathtt{C}](x,t)\) to denote the concentration of molecules of types \(\mathtt{B}\) and \(\mathtt{C}\) respectively. We write \([\mathtt{A}](x,t)\) as a series in the perturbation method and use \([\mathtt{A}]_{i}(x,t)\) as the coefficient for the \(i\)th term in the expansion. For simplicity, we sometimes show a function without its arguments, e.g. we write \([\mathtt{A}]_{i}\) or \([\mathtt{A}]\) instead of \([\mathtt{A}]_{i}(x,t)\) or \([\mathtt{A}](x,t)\). Finally, all chemical reactions are considered in the time interval \([0,T]\) for some \(T>0\). # Solving Reaction-Diffusion Equations via the Perturbation Method {#sec::generalperturbation} The perturbation method provides an explicit analytical solution in the form of an infinite series of functions. One can approximate the solution by taking a finite number of terms from this series. In this paper, we use the perturbation method to obtain an analytical model for the reaction-diffusion equations, which can be used for molecular communication. Our working example in the paper is as follows: consider two molecular transmitters \(\mathsf \mathsf T_{\mathtt {A}}\) and \(\mathsf \mathsf T_{\mathtt {B}}\), which release molecules \(\mathtt{A}\) and \(\mathtt{B}\), respectively. Molecules of type \(\mathtt{A}\) and \(\mathtt{B}\) react with each other in the medium and produce molecules of type \(\mathtt{C}\) as follows: \[\begin{aligned} \label{ex1:reaction} \mathtt{A} + \mathtt{B} \underset{\lambda_2}{\stackrel{\lambda_1}{\rightleftharpoons}} \mathtt{C} \end{aligned}\] We assume a molecular receiver \(\mathsf \mathsf R_{\mathtt {C}}\), which measures the concentration of molecules of type \(\mathtt{C}\) at its location in order to detect the messages of the two transmitters. For simplicity, assume that the transmitters and receiver are placed on a one-dimensional line, with \(\mathsf T_{\mathtt {A}}\), \(\mathsf T_{\mathtt {B}}\), and \(\mathsf R_{\mathtt {C}}\) being located at \(x=0\), \(x=d_\mathtt{B}\), and \(x=d_R\) respectively. This assumption is just for the simplicity of exposition; the problem could be solved in two or three dimensions and we also provide simulation results in dimensions two and three in Section [4](#sec:Val){reference-type="ref" reference="sec:Val"}. We assume that the transmitters and receivers are small in size and view them as points on the real line; the transmitter and receiver are considered to be transparent, not impeding the diffusion of the released molecules (assumption of point sources is adopted for simplicity and is common in the MC literature, e.g., ). This is depicted in Fig. [\[fig:ex1\]](#fig:ex1){reference-type="ref" reference="fig:ex1"}. Further details of the communication model are described in Section [3](#Sec:Mod){reference-type="ref" reference="Sec:Mod"} where we design a modulation scheme. In the rest of this section, we are merely interested in solving the reaction-diffusion equation describing reaction [\[ex1:reaction\]](#ex1:reaction){reference-type="eqref" reference="ex1:reaction"}. Let \(\gamma=\lambda_2/\lambda_1\) be the ratio of the backward and forward reaction rates, and set \(\lambda=\lambda_1,\lambda_2=\gamma\lambda\) for some \(\lambda\geq 0\). The following equation describes the system dynamic: \[\begin{aligned} &\frac{\partial[\mathtt{A}]}{\partial t}=D_\mathtt{A}~\frac{\partial^{2}[\mathtt{A}]}{{\partial x}^{2}}-\lambda~[\mathtt{A}][\mathtt{B}]+\gamma \lambda [\mathtt{C}]+f_\mathtt{A}(x,t),\label{A:ex1eq}\\ & \frac{\partial[\mathtt{B}]}{\partial t}=D_\mathtt{B}~\frac{\partial^{2}[\mathtt{B}]}{{\partial x}^{2}}-\lambda~[\mathtt{A}][\mathtt{B}]+\gamma \lambda [\mathtt{C}]+f_\mathtt{B}(x,t),\label{B:ex1eq}\\ & \frac{\partial[\mathtt{C}]}{\partial t}=D_\mathtt{C}~\frac{\partial^{2}[\mathtt{C}]}{{\partial x}^{2}}+\lambda~[\mathtt{A}][\mathtt{B}]-\gamma \lambda [\mathtt{C}]\label{C:ex1eq}, \end{aligned}\] where \(f_\mathtt{A}(x,t),f_\mathtt{B}(x,t)\) are the released concentration of molecules (called the transmission waveforms), and \(D_\mathtt{A}, D_\mathtt{B}, D_\mathtt{C}\) are the diffusion constants. The initial and boundary conditions are set to zero. We are interested in the solution for time \(t\in[0,T]\). For the special case of \(\lambda=0\), *i.e.,* when there is no reaction, the above system of equations is linear and tractable. Consider a solution of these equations in the form, \([\mathtt{A}](x,t)=\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{A}]_{i}(x,t)\), \([\mathtt{B}](x,t)=\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{B}]_{i}(x,t)\) and \([\mathtt{C}](x,t)=\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{C}]_{i}(x,t)\) for some Taylor series coefficients \([\mathtt{A}]_{i}(x,t)\), \([\mathtt{B}]_{i}(x,t)\) and \([\mathtt{C}]_{i}(x,t)\). By substituting these expressions in [\[A:ex1eq\]](#A:ex1eq){reference-type="eqref" reference="A:ex1eq"}, [\[B:ex1eq\]](#B:ex1eq){reference-type="eqref" reference="B:ex1eq"} and [\[C:ex1eq\]](#C:ex1eq){reference-type="eqref" reference="C:ex1eq"}, we obtain \[\begin{aligned} \label{New1h} &\frac{\partial}{\partial t}(\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{A}]_{i}) =D_\mathtt{A}~\frac{\partial^{2}}{{\partial x}^{2}}(\sum_{i=0}^{\infty}\lambda^{i}[\mathtt{A}]_{i})-\lambda (\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{A}]_{i})(\sum_{i=0}^{\infty}\lambda^{i}[\mathtt{B}]_{i})+\gamma\lambda \sum_{i=0}^{\infty}\lambda^{i}[\mathtt{C}]_{i} +f_\mathtt{A}(x,t), \end{aligned}\] \[\begin{aligned} \label{New2h:b} &\frac{\partial}{\partial t}(\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{B}]_{i}) =D_\mathtt{B}~\frac{\partial^{2}}{{\partial x}^{2}}(\sum_{i=0}^{\infty}\lambda^{i}[\mathtt{B}]_{i})-\lambda (\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{A}]_{i})(\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{B}]_{i})+\gamma\lambda \sum_{i=0}^{\infty}\lambda^{i}[\mathtt{C}]_{i}+ f_\mathtt{B}(x,t), \end{aligned}\] \[\begin{aligned} \label{New3h} &\frac{\partial}{\partial t}(\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{C}]_{i}) =D_\mathtt{C}~\frac{\partial^{2}}{{\partial x}^{2}}(\sum_{i=0}^{\infty}\lambda^{i}[\mathtt{C}]_{i})+\lambda (\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{A}]_{i})(\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{B}]_{i})-\gamma\lambda \sum_{i=0}^{\infty}\lambda^{i}[\mathtt{C}]_{i} . \end{aligned}\] Equations [\[New1h\]](#New1h){reference-type="eqref" reference="New1h"}, [\[New2h:b\]](#New2h:b){reference-type="eqref" reference="New2h:b"}, and [\[New3h\]](#New3h){reference-type="eqref" reference="New3h"} could be viewed as power series in \(\lambda\) for fixed values of \(x\) and \(t\). Matching the coefficients of \(\lambda^i\) on both sides of the equation, we obtain the following: \[\begin{aligned} \label{zerosol} \frac{\partial [\mathtt{A}]_{0}}{\partial t}=D_\mathtt{A}~\frac{\partial^{2}[\mathtt{A}]_{0}}{{\partial x}^{2}}+f_\mathtt{A}(x,t),~~ \frac{\partial [\mathtt{B}]_{0}}{\partial t}=D_\mathtt{B}~\frac{\partial^{2} [\mathtt{B}]_{0}}{{\partial x}^{2}}+f_\mathtt{B}(x,t),~~ \frac{\partial [\mathtt{C}]_{0}}{\partial t}=D_\mathtt{C}~\frac{\partial^{2} [\mathtt{C}]_{0}}{{\partial x}^{2}}. \end{aligned}\] For \(i\geq 1\) we obtain [\[othersolA\]]{#othersolA label="othersolA"} \[\begin{aligned} &\frac{\partial[\mathtt{A}]_{i}}{\partial t}=D_\mathtt{A}~\frac{\partial^{2}[\mathtt{A}]_{i}}{{\partial x}^{2}}-[\mathtt{A}]_{0:i-1}*^d [\mathtt{B}]_{0:i-1}+\gamma[\mathtt{C}]_{i-1},\label{othersolA} \\ &\frac{\partial[\mathtt{B}]_{i}}{\partial t}=D_\mathtt{B}~\frac{\partial^{2}[\mathtt{B}]_{i}}{{\partial x}^{2}}-[\mathtt{A}]_{0:i-1}*^d [\mathtt{B}]_{0:i-1}+\gamma[\mathtt{C}]_{i-1},\label{othersolB} \\ &\frac{\partial[\mathtt{C}]_{i}}{\partial t}=D_\mathtt{C}~\frac{\partial^{2}[\mathtt{B}]_{i}}{{\partial x}^{2}}-[\mathtt{A}]_{0:i-1}*^d [\mathtt{B}]_{0:i-1}-\gamma[\mathtt{C}]_{i-1},\label{othersolC} \end{aligned}\] where we used the index convolution defined in [\[dicreteconv\]](#dicreteconv){reference-type="eqref" reference="dicreteconv"}. The functions \([\mathtt{A}]_{i}(x,t)\), \([\mathtt{B}]_{i}(x,t)\) and \([\mathtt{C}]_{i}(x,t)\) could be find recursively by first computing \([\mathtt{A}]_{0}(x,t)\), \([\mathtt{B}]_{0}(x,t)\) and \([\mathtt{C}]_{0}(x,t)\) from [\[zerosol\]](#zerosol){reference-type="eqref" reference="zerosol"}, and then using [\[othersolA\]](#othersolA){reference-type="eqref" reference="othersolA"}-[\[othersolC\]](#othersolC){reference-type="eqref" reference="othersolC"} to compute \([\mathtt{A}]_{i}(x,t)\), \([\mathtt{B}]_{i}(x,t)\) and \([\mathtt{C}]_{i}(x,t)\) from \([\mathtt{A}]_{j}(x,t)\), \([\mathtt{B}]_{j}(x,t)\) and \([\mathtt{C}]_{j}(x,t)\) for \(j\leq i-1\). ## Limitation on the simulation time interval and a remedy The perturbation method provides recursive equations to find the functions \([\mathtt{A}]_{i}(x,t)\) and \([\mathtt{B}]_{i}(x,t)\). However, one still needs to show that the power series \(\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{A}]_{i}(x,t)\) and \(\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{B}]_{i}(x,t)\) are convergent to functions that satisfy the original reaction-diffusion differential equation. Perturbation theory does not provide a general recipe for showing this convergence, and it should be done on a case-by-case basis. We show in Appendix [6](#AppA0 ){reference-type="ref" reference="AppA0 "} that the series is convergent as long as \(\lambda\leq \mathcal{O}(1/T)\), *i.e.,* the radius of convergence of the series is proportional with the inverse of the total time period. In other words, we need \(\lambda\) to be sufficiently small (or for \(T\) to be sufficiently small). Provided that \(T\) is sufficiently small, Appendix [6](#AppA0 ){reference-type="ref" reference="AppA0 "} shows that the solution given by the perturbation method is equal to the true solution (satisfies the reaction-diffusion equations). Next, we propose an approach to tackle the above shortcoming if we wish to compute the solution for larger values of \(T\): we can divide the time interval \(T\) into \(k\) subintervals of size \(T/k\). Since the radius of convergence is of order \(\mathcal{O}(\frac 1T)\), reducing the size of the interval by a factor of \(k\) increases the radius of convergence by a multiplicative factor of \(k\). Thus, we can first compute the solution in the interval \([0,T/k]\) and use the value at \(T/k\) to compute the solution in the interval \([T/k,2T/k]\), etc. ## Solving equations [\[zerosol\]](#zerosol){reference-type="eqref" reference="zerosol"}-[\[othersolC\]](#othersolC){reference-type="eqref" reference="othersolC"} In order to solve [\[zerosol\]](#zerosol){reference-type="eqref" reference="zerosol"}, let \(\phi_\mathtt{A}(x,t)\) be the solution of the following equation with diffusion coefficient \(D_\mathtt{A}\): \[\begin{aligned} \label{greenA} \frac{\partial \phi_\mathtt{A}}{\partial t}=D_\mathtt{A}~\frac{\partial^{2}\phi_\mathtt{A}}{{\partial x}^{2}}+\delta(x)\delta(t). \end{aligned}\] We have \[\begin{aligned} \phi_\mathtt{A}(x,t)=\frac{1}{\sqrt{4\pi D_\mathtt{A} t}}\exp(-\frac{x^2}{4 D_\mathtt{A} t}),~ x\in \mathbb{R},~t\geq 0. \end{aligned}\] Similarly, we define \(\phi_\mathtt{B}(x,t)\) and \(\phi_\mathtt{C}(x,t)\) as the solutions of \[\begin{aligned} \label{greenBC} \frac{\partial \phi_\mathtt{B}}{\partial t}=D_\mathtt{B}~\frac{\partial^{2}\phi_\mathtt{B}}{{\partial x}^{2}}+\delta(x)\delta(t), \qquad \frac{\partial \phi_\mathtt{C}}{\partial t}=D_\mathtt{C}~\frac{\partial^{2}\phi_\mathtt{C}}{{\partial x}^{2}}+\delta(x)\delta(t). \end{aligned}\] Then, the solutions of [\[zerosol\]](#zerosol){reference-type="eqref" reference="zerosol"}, [\[othersolA\]](#othersolA){reference-type="eqref" reference="othersolA"}-[\[othersolC\]](#othersolC){reference-type="eqref" reference="othersolC"} are as follows: \[\begin{aligned} \label{ex1:A0,B0} &[\mathtt{A}]_{0}=\phi_\mathtt{A}**f_{\mathtt{A}},~~ [\mathtt{B}]_{0}=\phi_\mathtt{B}**f_{\mathtt{B}},~~[\mathtt{C}]_{0}=0, \end{aligned}\] and for \(i\geq 1\), \[\begin{aligned} &[\mathtt{A}]_{i}=-\phi_\mathtt{A}**([\mathtt{A}]_{0:i-1}*^d[\mathtt{B}]_{0:i-1}+\gamma[\mathtt{C}]_{i-1}),\label{recu-eq1}\\ &[\mathtt{B}]_{i}=-\phi_\mathtt{B}**([\mathtt{A}]_{0:i-1}*^d [\mathtt{B}]_{0:i-1}+\gamma[\mathtt{C}]_{i-1}),\label{recu-eq2}\\ &[\mathtt{C}]_{i}=+\phi_\mathtt{C}**([\mathtt{A}]_{0:i-1}*^d [\mathtt{B}]_{0:i-1}-\gamma[\mathtt{C}]_{i-1}),\label{recu-eq3} \end{aligned}\] where \(**\) stands for the two-dimensional convolution (see [\[eqnconvts\]](#eqnconvts){reference-type="eqref" reference="eqnconvts"}). In general, the perturbation method does not yield a closed-form analytical solution for the reaction-diffusion equation because it is not possible (in general) to find a closed-form solution for the recursive equations [\[recu-eq1\]](#recu-eq1){reference-type="eqref" reference="recu-eq1"}-[\[recu-eq3\]](#recu-eq3){reference-type="eqref" reference="recu-eq3"}. However, the following example indicates a special instance where a closed-form solution can be found. ## Interpretation in terms of Picard's iterative process An alternative way to understand the recursive equations [\[ex1:A0,B0\]](#ex1:A0,B0){reference-type="eqref" reference="ex1:A0,B0"}-[\[recu-eq3\]](#recu-eq3){reference-type="eqref" reference="recu-eq3"} is through Picard's iterative process. In this process, one converts the differential equation to an integral form and uses it to identify the Picard iteration operator. Consider the reaction-diffusion equations in [\[A:ex1eq\]](#A:ex1eq){reference-type="eqref" reference="A:ex1eq"}-[\[C:ex1eq\]](#C:ex1eq){reference-type="eqref" reference="C:ex1eq"}. To convert this system of differential equations to an integral form, we utilize the fact that the solution of the differential equation \(\frac{\partial[\mathtt{u}]}{\partial t}=D_\mathtt{u}~\frac{\partial^{2}[\mathtt{u}]}{{\partial x}^{2}}+g_{u}\) with zero initial and boundary condition is \(u=\phi_{u}**g_{u}\) where \(\phi_{u}\) is the solution of the differential equation for an impulse input (impulse response). Thus, from [\[A:ex1eq\]](#A:ex1eq){reference-type="eqref" reference="A:ex1eq"}-[\[C:ex1eq\]](#C:ex1eq){reference-type="eqref" reference="C:ex1eq"} we obtain \[\begin{aligned} &[\mathtt{A}](x,t)=\phi_{\mathtt A}**(-\lambda[\mathtt{A}][\mathtt{B}]+\gamma\lambda[\mathtt{C}]+f_{\mathtt{A}}(x,t)),\\ &[\mathtt{B}](x,t)=\phi_{\mathtt B}**(-\lambda[\mathtt{A}][\mathtt{B}]+\gamma\lambda[\mathtt{C}]+f_{\mathtt{B}}(x,t)),\\ &[\mathtt{C}](x,t)=\phi_{\mathtt C}**(\lambda[\mathtt{A}][\mathtt{B}]-\gamma\lambda[\mathtt{C}]). \end{aligned}\] Therefore, the Picard iteration operator is obtained as follows: \[\begin{aligned} &\mathcal{\tau}:\mathcal{C}\times \mathcal{C}\times \mathcal{C} \mapsto \mathcal{C}\times \mathcal{C}\times \mathcal{C}\nonumber\\ &\mathcal{\tau}(\mathtt{a},\mathtt{b},\mathtt{c})=(\phi_\mathtt{A}**(-\lambda\mathtt{a}\mathtt{b}+\lambda\gamma\mathtt{c}+f_\mathtt{A}),\phi_\mathtt{B}**(-\lambda\mathtt{a}\mathtt{b}+\lambda\gamma\mathtt{c}+f_\mathtt{B}),\phi_\mathtt{C}**(\lambda\mathtt{a}\mathtt{b}-\gamma\lambda\mathtt{c})), \end{aligned}\] where \(\mathcal{C}\) is the space of continuous functions. The solution of the reaction-diffusion system is a fixed point of the Picard iteration operator. Picard's iterative process suggests the following recursive algorithm to find a fixed point of the operator \(\mathcal{\tau}\): \[\begin{aligned} (\mathtt{a}^{(n+1)},\mathtt{b}^{(n+1)},\mathtt{c}^{(n+1)})=\mathcal{\tau}(\mathtt{a}^{(n)},\mathtt{b}^{(n)},\mathtt{c}^{(n)}),~~~(\mathtt{a}^{(-1)},\mathtt{b}^{(-1)},\mathtt{c}^{(-1)})=(0,0,0),~~n\geq-1\label{banchiter}, \end{aligned}\] where \((\mathtt{a}^{(n)},\mathtt{b}^{(n)},\mathtt{c}^{(n)})\) is the triple of functions that we obtain at the \(n\)th iteration. Picard's iterative process relates to the perturbation method as follows: using induction and comparing [\[recu-eq1\]](#recu-eq1){reference-type="eqref" reference="recu-eq1"}-[\[recu-eq3\]](#recu-eq3){reference-type="eqref" reference="recu-eq3"} with the recursive equations given in [\[banchiter\]](#banchiter){reference-type="eqref" reference="banchiter"}, one obtains \[\begin{aligned} \mathtt{a}^{(n)}&=\sum_{i=0}^{n}\lambda^{i} [\mathtt{A}]_{i}(x,t)&n=0,1\\ \mathtt{a}^{(n)}&=\sum_{i=0}^{n}\lambda^{i} [\mathtt{A}]_{i}(x,t)+\mathcal{O}(\lambda^{n+1})&n\geq 2. \end{aligned}\] A similar statement holds for \(\mathtt{b}^{(n)}\) and \(\mathtt{c}^{(n)}\), showing that their first \(n\) lower terms match the first \(n\) lower terms of the Taylor series expansion in the perturbation method. ## Approximate Solutions In practice, we can approximate the true concentrations of molecules by computing the first \(n\) terms in the Taylor series expansion: \[\begin{aligned} (x,t)\approx \sum_{i=0}^{n}\lambda^{i} [\mathtt{A}]_{i}(x,t) \end{aligned}\] for some fixed \(n\). One can stop at the \(n\)-term of the Taylor expansion when the contribution of the \((n+1)\)th term is negligible compared to the first \(n\) terms. While \(n\)th term can be explicitly found in Example [\[exampleA1\]](#exampleA1){reference-type="ref" reference="exampleA1"}, for general reaction-diffusion equations, there is no (non-recursive) explicit expression for the terms in the Taylor series expansion. In Section [4](#sec:Val){reference-type="ref" reference="sec:Val"}, we illustrate the sufficiency of choosing \(n=1\) or \(n=2\) when the length of the time interval \(T\) is in the order of seconds. In the following, we provide a theoretical justification for choosing \(n=1\) when the time interval \(T\) is small: consider the reaction-diffusion equations \[\begin{aligned} &\frac{\partial[\mathtt{A}]}{\partial t}=D_\mathtt{A}~\frac{\partial^{2}[\mathtt{A}]}{{\partial x}^{2}}-\lambda~[\mathtt{A}][\mathtt{B}]+\gamma \lambda [\mathtt{C}]+f_\mathtt{A}(x,t),\\ & \frac{\partial[\mathtt{B}]}{\partial t}=D_\mathtt{B}~\frac{\partial^{2}[\mathtt{B}]}{{\partial x}^{2}}-\lambda~[\mathtt{A}][\mathtt{B}]+\gamma \lambda [\mathtt{C}]+f_\mathtt{B}(x,t),\\ & \frac{\partial[\mathtt{C}]}{\partial t}=D_\mathtt{C}~\frac{\partial^{2}[\mathtt{C}]}{{\partial x}^{2}}+\lambda~[\mathtt{A}][\mathtt{B}]-\gamma \lambda [\mathtt{C}], \end{aligned}\] along with the initial conditions \([\mathtt{A}](x,0)=g_{\mathtt{A}}(x), [\mathtt{B}](x,0)=g_{\mathtt{B}}(x)\) and \([\mathtt{C}](x,0)=g_{\mathtt{C}}(x)\). The one-step finite difference iteration (in the finite difference method) for a small value of \(t\) is as follows: \[\begin{aligned} _{FDM}(x,t)&=[\mathtt{A}](x,0)+t\frac{\partial[\mathtt{A}]}{\partial t}(x,0) \nonumber\\&=g_{\mathtt{A}}(x)+t\left[ D_{\mathtt{A}}g_{\mathtt{A}}''(x)-\lambda g_{\mathtt{A}}(x)g_{\mathtt{B}}(x)+ \gamma\lambda g_{\mathtt{C}}(x)+ f_{\mathtt{A}}(x,0)\right] \nonumber\\&=g_{\mathtt{A}}(x)+\mathcal{O}(t).\end{aligned}\] Let \([\mathtt{A}]^{(1)}(x,t)=[\mathtt{A}]_{0}(x,t)+\lambda [\mathtt{A}]_{1}(x,t)\) be the approximate solution of the perturbation method up to the order one terms. In Appendix [9](#AppA:3){reference-type="ref" reference="AppA:3"} we show the following equivalence with the finite difference solution: As illustrated in Section [4](#sec:Val){reference-type="ref" reference="sec:Val"}, the time steps do not necessarily need to be very small for the perturbation solution to closely track the true solution (and can be in the order of seconds). Therefore, the perturbation method can be understood as a generalization of the finite difference method that allows for longer time steps. # Modulation Design {#Sec:Mod} In Section [2](#sec::generalperturbation){reference-type="ref" reference="sec::generalperturbation"}, a closed-form solution for the reaction-diffusion equation [\[ex1:reaction\]](#ex1:reaction){reference-type="eqref" reference="ex1:reaction"} was obtained. In this section, we use this solution to find the optimal release pattern of molecules by the transmitters in order to minimize the error probability of the communication system. Suppose transmitter \(\mathsf T_{\mathtt {A}}\) intends to send a message bit \(M_\mathtt{A}\in\{0,1\}\) to the receiver. The transmitter \(\mathsf T_{\mathtt {A}}\) releases molecules of type \([\mathtt {A}]\) into the medium according to \(f_\mathtt{A}^{0}(x,t)=a_0(t)\delta(x), 0\leq t\leq T\) if \(M_\mathtt{A}=0\), and according to \(f_\mathtt{A}^{1}(x,t)=a_1(t)\delta(x), 0\leq t\leq T\) if \(M_\mathtt{A}=1\). In other words, the waveform \(a_{0}(t)\) is the released concentration of molecules of type \(\mathtt A\) when \(M_\mathtt{A}=0\), and \(a_{1}(t)\) is the released density when \(M_\mathtt{A}=1\). Similarly, suppose that transmitter \(\mathsf T_{\mathtt {B}}\) encodes message \(M_\mathtt{B}\in\{0,1\}\) by \(f_{\mathtt{B}}^{j}(x,t)=b_{j}(t) \delta(x-d_{\mathtt{B}}), 0\leq t\leq T, j=0,1\), where the waveforms \(b_{0}(t)\) and \(b_{1}(t)\) are defined similarly for transmitter \(\mathsf T_{\mathtt {B}}\). The total amount of released molecules of types \(\mathtt A\) and \(\mathtt B\) during the transmission period \(T\) is assumed to be at most \(s_{\mathtt A}\) and \(s_{\mathtt B}\) respectively, *i.e.,* \[\begin{aligned} \int_{0}^T a_i(t)dt\leq s_{\mathtt A},~\int_{0}^T b_i(t)dt\leq s_{\mathtt B}, \quad i=0,1.\label{eqn:New6} \end{aligned}\] The input messages \({M}_\mathtt{A}, {M}_\mathtt{B}\) are assumed to be uniform Bernoulli random variables. Receiver \(\mathsf R_{\mathtt {C}}\) samples the density of molecules of type \(\mathtt{C}\) at its location at the end of the time slot at time \(t=T\). The receiver is assumed to be transparent and suffers from the particle counting noise. More specifically, the receiver is assumed to get a sample from \(\mathsf{Poisson}\big(V\cdot [\mathtt{C}](d_{R},T)\big)\) where \([\mathtt{C}](d_{R},T)\) is the density of molecules of type \(\mathtt C\) at time \(T\) and location \(d_{R}\), and \(V\) is a constant. Using this observation, \(\mathsf R_{\mathtt {C}}\) outputs its estimate of the transmitted message pair \((\hat{M}_\mathtt{A},\hat{M}_\mathtt{B})\in \{00,01,10,11\}\). The probability of error is \[Pr(e)=Pr\{ (M_{\mathtt{A}}, M_{\mathtt{B}})\neq (\hat{M}_\mathtt{A},\hat{M}_\mathtt{B})\}.\label{eqnErrorProb1}\] Having transmitted messages \(a_{m_{\mathtt{A}}}(t), b_{m_{\mathtt{B}}}(t)\) for a message pair \((m_{\mathtt{A}}, m_{\mathtt{B}})\), let \(\rho_{m_{\mathtt{A}}, m_{\mathtt{B}}}\) denote the density of molecules of type \(\mathtt{C}\) at the time of sampling. The receiver aims to recover \(\hat m_{\mathtt{A}}, \hat m_{\mathtt{B}}\) using a sample \(\mathsf{Poisson}(V\cdot \rho_{m_{\mathtt{A}}, m_{\mathtt{B}}})\). Our goal is to design nonnegative signals \(a_{i}(t), b_{j}(t)\) satisfying [\[eqn:New6\]](#eqn:New6){reference-type="eqref" reference="eqn:New6"} to minimize the error probability. The key utility of the technique given in Section [2](#sec::generalperturbation){reference-type="ref" reference="sec::generalperturbation"} is that it provides a closed-form expression for \(\rho_{m_{\mathtt{A}}, m_{\mathtt{B}}}\) in terms of \(a_i(t)\) and \(b_j(t)\). An order \(n\) approximation to the reaction-diffusion is when we consider the reaction-diffusion equations up to the terms of order \(\lambda^n\) in the Taylor expansion. We say that waveforms \(a_i(t)\) and \(b_j(t)\) are order \(n\) optimal waveforms if they minimize the error probability for the approximate reaction-diffusion equations up to order \(n\). For low reaction rates, we are mainly interested in order one optimal waveforms. In the following theorem, we show that for low reaction rates, one possible optimal strategy is for \(\mathsf T_{\mathtt {A}},\mathsf T_{\mathtt {B}}\) to release molecules in at most two time instances in a bursty fashion. The location of these instantaneous releases is determined by the message it wants to transmit. In other words, waveform \(a_{i}(t)\) is the sum of two Dirac's delta functions. In order to determine parameters in the statement of Theorem [\[th::1\]](#th::1){reference-type="ref" reference="th::1"} we need to optimize over constants \(\hat{a}_{ij}\), \(\hat{b}_{ij}\), \(t_j^{[a_i]},t_j^{[b_i]}\). From the first-order equation, \(\rho_{ij}\) (the concentration when the first transmitter sends bit \(i\in\{0,1\}\) and the second transmitter sends the bit \(j\in\{0,1\}\)) equals \[\begin{array}{*{20}{l}} \rho_{00}=\sum_{i,j=1}^{2}\hat{a}_{0i}\hat{b}_{0j}G(t_{i}^{[a_0]},t_{j}^{[b_0]}) \\ \rho_{01}=\sum_{i,j=1}^{2}\hat{a}_{0i}\hat{b}_{1j}G(t_{i}^{[a_0]},t_{j}^{[b_1]})\\ \rho_{10}=\sum_{i,j=1}^{2}\hat{a}_{1i}\hat{b}_{0j}G(t_{i}^{[a_1]},t_{j}^{[b_0]})\\ \rho_{11}=\sum_{i,j=1}^{2}\hat{a}_{1i}\hat{b}_{1j}G(t_{i}^{[a_1]},t_{j}^{[b_1]}), \end{array}\] where \[G(t_i,t_j)=\lambda\phi_{\mathtt{C}}(x,t)**\big(\phi_{\mathtt{A}}(x,t-t_i) \phi_{\mathtt{B}}(x-d_{\mathtt{B}},t-t_j)\big) |_{t=t_s,x=d_R}.\] To recover the messages of the transmitters, the receiver needs to solve a Poisson hypothesis testing problem (see Appendix [10](#AppB){reference-type="ref" reference="AppB"}) with four hypotheses: \(\rho=V\rho_{00}\) or \(\rho=V\rho_{01}\) or \(\rho=V\rho_{10}\) or \(\rho=V\rho_{11}\) for a constant \(V\). The error probability of this hypothesis testing problem should be minimized with respect to \(\hat{a}_{ij}\), \(\hat{b}_{ij}\), \(t_j^{[a_i]},t_j^{[b_i]}\). As an example, consider the following parameters in Table[\[tabj\]](#tabj){reference-type="ref" reference="tabj"}: Simulation results yield the optimal values for \(\hat{a}_{ij}\), \(\hat{b}_{ij}\), \(t_j^{[a_i]},t_j^{[b_i]}\) as in Table[\[tab78\]](#tab78){reference-type="ref" reference="tab78"} Figs. [\[probabilty1\]](#probabilty1){reference-type="ref" reference="probabilty1"} and [\[probabilty2\]](#probabilty2){reference-type="ref" reference="probabilty2"} show the optimal error probability (as defined in [\[eqnErrorProb1\]](#eqnErrorProb1){reference-type="eqref" reference="eqnErrorProb1"}) as a function of \(s=s_{\mathtt{A}}=s_{\mathtt{B}}\) for the above parameters. Fig. [\[pulsevsdelta\]](#pulsevsdelta){reference-type="ref" reference="pulsevsdelta"} compares the error probabilities of optimal waveforms (sum of two delta functions) with a pulse release pattern, *i.e.,* when we consider four waveforms \((f_{\mathtt{A}}^{0}(t)=a_{0}\mathbbm{1}_{0\leq t\leq T},f_{\mathtt{A}}^{1}(t)=a_{1}\mathbbm{1}_{0\leq t\leq T},f_{\mathtt{B}}^{0}(t)=b_{0}\mathbbm{1}_{0\leq t\leq T},f_{\mathtt{B}}^{1}(t)=b_{1}\mathbbm{1}_{0\leq t\leq T})\) as input signals to reaction diffusion equations. The error probability of the pulse waveforms is obtained by minimizing the error probability over pulse amplitudes \(a_0, a_1\leq s_{\mathtt{A}}/T\) and \(b_0, b_1\leq s_{\mathtt{B}}/T\). # Simulation {#sec:Val} In this section, we validate our method through numerical simulation. We need to specify the diffusion coefficients, reaction rate \(\lambda\), input signals \(f_{\mathtt A}\) and \(f_{\mathtt B}\) as well as the locations of the transmitters. Previous works in the literature commonly take the number of released molecules to be either in the order of \(10^{-14}\) moles (which is \(10^9\) molecules), or in the order of \(10^{-3}\) moles. The reaction rates in these works are generally in the order of \(1\) to \(10^8\) \(\text{mole}^{-1}.m^{3}.s^{-1}\) or equivalently \(10^{-23}\) to \(10^{-15}\) \(\text{molecules}^{-1}.m^{3}.s^{-1}\). We run three simulations for three choices of parameters for the reaction given in [\[ex1:reaction\]](#ex1:reaction){reference-type="eqref" reference="ex1:reaction"}. The exact solutions are obtained by the finite difference method (FDM). The first simulation borrows its system parameters from as in Table [\[tab1\]](#tab1){reference-type="ref" reference="tab1"}: In the second simulation we use the same parameters as in the first simulation, but make the three diffusion constants be the same \((D_{\mathtt{A}}=D_{\mathtt{B}}=D_{\mathtt{C}}=10^{-9}[m^2/s])\). Figs. [\[fig:1e-22,unequal,Nx=64,first\]](#fig:1e-22,unequal,Nx=64,first){reference-type="ref" reference="fig:1e-22,unequal,Nx=64,first"} and [\[fig:1e-22,equal,Nx=120,first\]](#fig:1e-22,equal,Nx=120,first){reference-type="ref" reference="fig:1e-22,equal,Nx=120,first"} are plotted based on the first and second set of system parameters respectively. They depict the concentration of the molecule of type \(\mathtt{C}\) at the receiver's location calculated by the first-order term of perturbation method along with the true solution (computed via FDM). It can be seen that for these system parameters, the first-order term of the perturbation series is closely following the true solution. Using the same parameters as in the second simulation, one can observe that the first-order term of perturbation series is still accurate as long as \(\lambda\leq 10^{-16} [\text{molecules}^{-1}.m.s^{-1}]\). Fig. [\[fig:1e-15,equal,Nx=120,first,T=15\]](#fig:1e-15,equal,Nx=120,first,T=15){reference-type="ref" reference="fig:1e-15,equal,Nx=120,first,T=15"} plots the curves for \(\lambda=10^{-15}\). As one can observe while the first-order term of the perturbation series does not track the exact solution for \(t>5s\), while the second-order term tracks the true solution in \(t<15s\). For \(t>15s\), the perturbation solution up to the second-order term does not track the exact solution well, hence to obtain an accurate solution we have to consider third or higher-order terms in the perturbation solution. This observation is consistent with the theoretical analysis given in Appendix [6](#AppA0 ){reference-type="ref" reference="AppA0 "}, where the convergence rate of perturbation solution depends on the length of the time interval \(T\). We also remark that in many prior works on chemical reactions in MC, the observation time \(T\) is rather small: uses \(T\leq 0.1 s\), uses \(T\leq 4 s\); uses \(T\leq 10 s\), while in other cases \(T\) is in taken of order \(\mu s\). Fig. [\[relative1\]](#relative1){reference-type="ref" reference="relative1"} fixes \(T=10[s]\) and plots the relative error of the first-order approximation solution of \([\mathtt{C}]\) for the second set of parameters in terms of \(\lambda\). Fig. [\[relative21\]](#relative21){reference-type="ref" reference="relative21"} draws a similar curve for the second-order approximation of the perturbation solution. These figures confirm (the theoretical result) that for sufficiently small reaction rates, the relative error is negligible. For instance, to have a relative error of at most \(0.01\), the first-order solution can be used for \(\lambda<3\times10^{-16}\) (Fig. [\[relative1\]](#relative1){reference-type="ref" reference="relative1"}) while the second-order solution is valid until \(\lambda<3\times10^{-15}\) (Fig. [\[relative21\]](#relative21){reference-type="ref" reference="relative21"}). Next, let us fix the relative error to be \(0.05\) and define the permissible time interval as \[\begin{aligned} T_{\max}=\max\left\{T:\left|\frac{[\mathtt{C}]_{FDM}(t)-[\mathtt{C}]_{PER-Order-1}(t)}{[\mathtt{C}]_{FDM}(t)}\right|\leq.05, \qquad \forall t\in [0,T]\right\}.\label{TmaxDef}\end{aligned}\] In other words, \(T_{\max}\) is the maximum simulation time interval for which the relative error is less than 5 percent. Fig. [\[maxt2\]](#maxt2){reference-type="ref" reference="maxt2"} shows the \(T_{\max}\) for the first-order approximation of \([\mathtt{C}]\) in terms of \(\lambda\). In some applications, a significantly larger number of molecules (in the order of moles) are released into the medium. In the third simulation, we consider this case and take the following parameters in Table [\[tab2\]](#tab2){reference-type="ref" reference="tab2"}: Fig. [\[fig:.1,equal,Na=1micromole,first\]](#fig:.1,equal,Na=1micromole,first){reference-type="ref" reference="fig:.1,equal,Na=1micromole,first"} shows that the first term of the perturbation series is close to the exact solution. **The effect of dimension:** While we assumed the transmitter and receivers to lie on a one-dimensional line, the problem can be solved in higher dimensions in a similar manner. In Figs. [\[dim2\]](#dim2){reference-type="ref" reference="dim2"} and [\[dim3\]](#dim3){reference-type="ref" reference="dim3"}, we compare the perturbation method (up to the first-order approximation) and the true solution in two and three dimensions. The parameters are the same as the second set of parameters with \(\lambda[{molecules}^{-1}.m^{3}.s^{-1}]=10^{-23}\). As we see our solution is still accurate. We observe that as the dimension of the medium increases, concentrations decay faster. This is due to the extra degrees of freedom in the dispersion of molecules. **The effect of diffusion coefficients:** In Fig. [\[DconC\]](#DconC){reference-type="ref" reference="DconC"} we plot \([\mathtt{C}]\) for different values of \(D_\mathtt{C}\), for the second set of parameters. Observe that \([\mathtt{C}]\) is a decreasing function of \(D_\mathtt{C}\). Fig. [\[maxt\]](#maxt){reference-type="ref" reference="maxt"} plots \(T_{\max}\) (as defined in [\[TmaxDef\]](#TmaxDef){reference-type="eqref" reference="TmaxDef"}) versus \(D_\mathtt{C}\) for the same parameters, showing that increasing \(D_\mathtt{C}\) decreases \(T_{\max}\). # Conclusion and Future Work {#Conclusion and Future Work} We addressed the difficulty of designing modulation due to the lack of existence of closed-form solutions for the reaction-diffusion equation by providing an approximate solution to the reaction-diffusion equations. We observed that for many choices of system parameters our solution is accurate. Also, we observed that the accuracy of our solution depends on time observation \(T\). Using the proposed model, we designed optimal waveforms for a multiple-access setting. In the Appendix[12](#ex2,3){reference-type="ref" reference="ex2,3"} of this paper two more examples are considered (Example II and Example III). In Example II, we consider a communication system with one transmitter and one receiver. The transmitter can send molecules of type \(\mathtt{A}\) or \(\mathtt{B}\), while the receiver can only measure molecules of type \(\mathtt{A}\). The medium has molecules of a different type \(\mathtt{C}\) that can react with both \(\mathtt{A}\) and \(\mathtt{B}\). The transmitter releases molecules of type \(\mathtt{B}\) in order to "clean up\" the medium of molecules of type \(\mathtt{C}\) so that molecules of type \(\mathtt{A}\) can reach the receiver without being dissolved through reaction with \(\mathtt{C}\) as they travel from the transmitter to the receiver. In Example III, we consider a two-way communication system with two transceiver nodes. In other words, each node aims to both send and receiver information from the other node. Transmitters use different molecule types and these molecules can react with each other. The chemical reaction in this scenario is destructive because it reduces the concentration of molecules at the two transceivers. Many other settings could be studied and left for future work. Firstly, we only considered transparent receivers in this work. The literature on MC also considers absorbing or ligand/reactive receivers. Since the perturbation method is broadly applicable to non-linear differential equations, the proposed framework can be also applied to absorbing or reactive receivers with more work. An absorbing receiver adds a boundary condition to the reaction-diffusion equations (the concentration of absorbed molecules being zero at the receiver's location). On the other hand, the reactive receiver adds an ordinary differential equation to the system's equations, for receptors on the surface of the receiver. Further, one could study the design of optimal waveforms when taking multiple samples in the transmission time slot (instead of just one sample, as in this paper) or study optimal waveform design for channels with ISI. These studies are possible and left as future work. Finally, there are other existing approaches in the literature for obtaining semianalytic solutions of chemical reaction-diffusion equations. Studying these approaches which might have a higher radius of convergence is also left as future work. # Convergence Analysis {#AppA0 } To show that the power series \(\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{A}]_{i}(x,t)\), \(\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{B}]_{i}(x,t)\) and \(\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{C}]_{i}(x,t)\) are convergent to functions that satisfy the original reaction-diffusion differential equation, we consider time \(t\in[0,T]\) for some fixed \(T\) and prove that \[\begin{aligned} \label{eqnNewN14} &\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{A}]_{i}(x,t),\quad \sum_{i=0}^{\infty}\lambda^{i} \frac{\partial}{\partial x} [\mathtt{A}]_{i}(x,t),\quad \sum_{i=0}^{\infty}\lambda^{i} \frac{\partial^2}{\partial x^2}[\mathtt{A}]_{i}(x,t),\quad\sum_{i=0}^{\infty}\lambda^{i} \frac{\partial}{\partial t}[\mathtt{A}]_{i}(x,t) \end{aligned}\] uniformly converge over all \(\lambda, x, t\). Similarly, we prove that the corresponding power series for molecules of types \(\mathtt B\) and \(\mathtt C\) also uniformly converge. Uniform convergence of the series given in equations [\[eqnNewN14\]](#eqnNewN14){reference-type="eqref" reference="eqnNewN14"} follows from Lemma [\[LemmaBounds\]](#LemmaBounds){reference-type="ref" reference="LemmaBounds"} given below. For a function \(f_{\mathtt{A}}(x,t)\) defined for \(x\in\mathbb{R}\) and \(t\in[0,T]\), we define \[\begin{aligned} &\lVert f_{\mathtt{A}}\lVert_{\infty}=\sup_{x,t\in[0,T]}|f_{\mathtt{A}}(x,t)|, \lVert f_{\mathtt{A}}(x,0)\lVert_{\infty}=\sup_{x}|f_{\mathtt{A}}(x,0)|, \lVert f_{\mathtt{A}}(x,t)\lVert_{1}=\int_{0}^{T}\int_{x}|f_{\mathtt{A}}(x,t)| dx dt. \end{aligned}\] Using this lemma and assuming \(|\lambda|<\frac{1}{T(12M_0+10\gamma)}\) where \(M_0\) is defined in Lemma [\[LemmaBounds\]](#LemmaBounds){reference-type="ref" reference="LemmaBounds"}, we obtain \(\sum_{i=N}^{\infty} \lambda^{i}\rVert[\mathtt{A}]_{i}\lVert_{\infty}\leq M_0/2^{N-1}\). Since \(M_0/(2^{N-1})\) is a universal upper bound that does not depend on \((\lambda, x, t)\), the power series \(\sum_{i=0}^{\infty}\lambda^{i} [\mathtt{A}]_{i}(x,t)\) will uniformly converge. Proof of the convergence of the other power series given above is similar. It remains to prove Lemma [\[LemmaBounds\]](#LemmaBounds){reference-type="ref" reference="LemmaBounds"}. # Increasing Radius of Convergence {#AppA:1 } For simplicity, assume \(\gamma=0\). We can extend our solution for given\((\lambda,T,f_{\mathtt A}(x,t),f_{\mathtt B}(x,t))\). If \(\lambda\leq 1/(12TM_0)\) we proved in Appendix [6](#AppA0 ){reference-type="ref" reference="AppA0 "} of paper, the solution is convergent(\(M_0=max\{\lVert \phi_{\mathtt A}**f_{\mathtt A} \rVert_{\infty},\lVert \phi_{\mathtt B}**f_{\mathtt B} \rVert_{\infty}\}\)). Let \(\lambda_{0}=1/(12TM_0)\) and \([\mathtt A]^{\lambda_0}\) and \([\mathtt B]^{\lambda_0}\) be solution of reaction-diffusion equation for \(\lambda=\lambda_0\). Now for \(\lambda>\lambda_{0}\),consider the solution as \([\mathtt{A}]=\sum_{i=0}^{\infty}(\lambda-\lambda_0)^{i}[\mathtt{A}]_{i}\) and \([\mathtt{B}]=\sum_{i=0}^{\infty}(\lambda-\lambda_0)^{i}[\mathtt{B}]_{i}\). By substituting these form in reaction-diffusion equations, we have: \[\begin{aligned} &[\mathtt A]_0=[\mathtt A]^{\lambda_0},~~[\mathtt B]_0=[\mathtt B]^{\lambda_0},\\ &[\mathtt A]_i=-\phi_{\mathtt A}**([\mathtt A]_{0:i-1}*^{d}[\mathtt B]_{0:i-1}) ~,i\geq 1,\\ &[\mathtt B]_i=-\phi_{\mathtt B}**([\mathtt A]_{0:i-1}*^{d}[\mathtt B]_{0:i-1}) ~,i\geq 1. \end{aligned}\] The solution are convergent if \(\lambda-\lambda_0\leq 1/(12TM')\), where \(M'=max\{\lVert [\mathtt A]^{\lambda_0} \rVert_{\infty},\lVert [\mathtt B]^{\lambda_0} \rVert_{\infty}\}\). In the following lemma we show \(M'\leq M_0\). Therefore, in the worse case \(\lambda-\lambda_0\leq 1/(12TM_0)=\lambda_0\), so we have \(\lambda\leq 2\lambda_0\). For \(\lambda=k\lambda_0+r(r<\lambda_0)\) ,we repeat \(k+1\) times this procedure. We proved that for any inputs one can compute solution by repeating perturbation method. # Low Rate Region for Especial reaction-diffusion Equation {#AppA:2 } For \(g(\lambda)=\sum_{i=0}^{\infty}a_i\lambda^{i}\), and given \(\alpha\), we define two \(n-\)th approximations as below: \[\begin{aligned} &Approximation~1:~g(\lambda)\approx \sum_{i=0}^{n}a_i\lambda^{i}~~if~~ \lambda \lVert \frac{a_{n+1}}{a_n} \rVert_{\infty}\leq \alpha,\\ &Approximation~2:~g(\lambda)\approx \sum_{i=0}^{n}a_i\lambda^{i}~~if~~ \lVert \frac{\sum_{i=n+1}^{\infty}a_i\lambda^{i}}{\sum_{i=0}^{n}a_i\lambda^{i}} \rVert_{\infty}\leq \alpha. \end{aligned}\] For given \(\alpha\) and observation time \(T\), if \(\lambda\leq\frac{3\alpha}{T^2}\), we have first kind of approximation of order \(1\). For For given \(n\) and \(\alpha\), we say \(\lambda\) is low rate of order \(n\) if \(\lambda\) satisfies approximation \(1\) or \(2\). The common values for \(\alpha\) are \(.1.05\). In this paper we approximate solution up tp first term. Unfortunately, in chemical reaction-diffusion, derivation explicit formula for low rate region of solution is not tractable. In other words for given arbitrary \(f_{\mathtt{A}},f_{\mathtt{B}},D_{\mathtt{A}},D_\mathtt{B}\) and \(\alpha\) the range of low rate solution can be obtained only by simulation. Here we consider very special case. For given \(\alpha\) and observation time \(T\), if \(\lambda\leq\frac{3\alpha}{T^2}\), we have first kind of approximation of order \(1\). For second kind of approximation of order \(1\), consider \(I=\sum_{i=1}^{\infty}\lambda^{i}[\mathtt{A}]_i=\sum_{i=0}^{\infty}\lambda^{i}(-1)^{i}\alpha_{i}t^{2i+1}=I_1-I_2\), where \(I_1=\sum_{i=1}^{\infty}\alpha_{2i}\lambda^{2i}t^{4i+1}\) and \(I_2=\sum_{i=0}^{\infty}\alpha_{2i+1}\lambda^{2i+1}t^{4i+3}\). Using upper and lower bound on \(\alpha_{i}\), for \(\lambda\leq\frac{2}{T^2}\) we have: \[\begin{aligned} &\dfrac{\lambda^2t^5}{9-\lambda^2t^4}\leq I_1\leq \dfrac{\lambda^2t^5}{4-\lambda^2t^4}\\ &\dfrac{3\lambda t^3}{9-\lambda^2t^4}\leq I_2\leq \dfrac{2\lambda t^3}{4-\lambda^2t^4}, \end{aligned}\] we obtain: \[\begin{aligned} &\dfrac{\lambda^2t^4}{9-\lambda^2t^4}-\dfrac{2\lambda t^2}{4-\lambda^2t^4}\leq \frac{I}{[\mathtt{A}]_{0}}\leq \dfrac{\lambda^2t^4}{4-\lambda^2t^4}-\dfrac{3\lambda t^2}{9-\lambda^2t^4}. \end{aligned}\] Let \(u=\lambda t^2\), we have: \[\begin{aligned} &g_d(u)=\dfrac{u^2}{9-u^2}-\dfrac{2u}{4-u^2}\leq \frac{I}{[\mathtt{A}]_{0}}\leq g_{up}(u)=\dfrac{u^2}{4-u^2}-\dfrac{3u}{9-u^2}. \end{aligned}\] For given \(\alpha\), we obtain two fourth order equations(\(g_{up}(u)=\pm \alpha, g_{d}(u)=-\alpha\)). By solving those equations, we can obtain upper bound on \(\lambda\). For example for \(\alpha=0.1\) we have \(\lambda\leq \frac{1}{5T^2}\), and for \(\alpha=0.01\) we obtain \(\lambda\leq \frac{1}{50T^2}\). # Proof of Theorem [\[thmN1\]](#thmN1){reference-type="ref" reference="thmN1"} {#AppA:3} The zero-order terms in the perturbation method satisfy \[\begin{aligned} &\frac{\partial [\mathtt{A}]_{0}}{\partial t}=D_\mathtt{A}~\frac{\partial^{2}[\mathtt{A}]_{0}}{{\partial x}^{2}}+f_\mathtt{A}(x,t),~~ \frac{\partial [\mathtt{B}]_{0}}{\partial t}=D_\mathtt{B}~\frac{\partial^{2} [\mathtt{B}]_{0}}{{\partial x}^{2}}+f_\mathtt{B}(x,t),~~ \frac{\partial [\mathtt{C}]_{0}}{\partial t}=D_\mathtt{C}~\frac{\partial^{2} [\mathtt{C}]_{0}}{{\partial x}^{2}},\\ &[\mathtt{A}]_{0}(x,0)=g_{\mathtt{A}}(x), ~[\mathtt{B}]_{0}(x,0)=g_{\mathtt{B}}(x), ~[\mathtt{C}]_{0}(x,0)=g_{\mathtt{C}}(x). \end{aligned}\] Setting \(t=0\) in above equations we have: \[\begin{aligned} &\frac{\partial [\mathtt{A}]_{0}}{\partial t}(x,0)=D_\mathtt{A}~\frac{\partial^{2}[\mathtt{A}]_{0}(x,0)}{{\partial x}^{2}}+f_\mathtt{A}(x,0)=D_\mathtt{A} g_{\mathtt{A}}''(x)+f_\mathtt{A}(x,0). \end{aligned}\] Thus, \([\mathtt{A}]_{0}(x,t )=[\mathtt{A}]_{0}(x,0)+\frac{\partial [\mathtt{A}]_{0}}{\partial t}(x,0)t +o(t )=g_{\mathtt{A}}(x)+t D_\mathtt{A} g_{\mathtt{A}}''(x)+t f_\mathtt{A}(x,0)+o(t ).\) For other terms in perturbation solution we have (\(i\geq 1\)): \[\begin{aligned} &\frac{\partial[\mathtt{A}]_{i}}{\partial t}=D_\mathtt{A}~\frac{\partial^{2}[\mathtt{A}]_{i}}{{\partial x}^{2}}-[\mathtt{A}]_{0:i-1}*^d [\mathtt{B}]_{0:i-1}+\gamma[\mathtt{C}]_{i-1},~\quad[\mathtt{A}]_{i}(x,0)=0,\\ &\frac{\partial[\mathtt{B}]_{i}}{\partial t}=D_\mathtt{B}~\frac{\partial^{2}[\mathtt{B}]_{i}}{{\partial x}^{2}}-[\mathtt{A}]_{0:i-1}*^d [\mathtt{B}]_{0:i-1}+\gamma[\mathtt{C}]_{i-1},~\quad[\mathtt{B}]_{i}(x,0)=0,\\ &\frac{\partial[\mathtt{C}]_{i}}{\partial t}=D_\mathtt{C}~\frac{\partial^{2}[\mathtt{B}]_{i}}{{\partial x}^{2}}-[\mathtt{A}]_{0:i-1}*^d [\mathtt{B}]_{0:i-1}-\gamma[\mathtt{C}]_{i-1},~\quad[\mathtt{C}]_{i}(x,0)=0. \end{aligned}\] Setting \(t=0\) in above equations we obtain: \[\begin{aligned} \frac{\partial[\mathtt{A}]_{1}}{\partial t}(x,0)=-g_{\mathtt{A}}(x)g_{\mathtt{B}}(x)+\gamma g_{\mathtt{C}}(x),\qquad \frac{\partial[\mathtt{A}]_{i}}{\partial t}(x,0)=0,\quad~~i\geq 2. \end{aligned}\] From the Taylor series expansion we have: \[\begin{aligned} &[\mathtt{A}]_{1}(x,t )=[\mathtt{A}]_{1}(x,0)+\frac{\partial [\mathtt{A}]_{1}}{\partial t}(x,0)t +o(t )=-t g_{\mathtt{A}}(x)g_{\mathtt{B}}(x)+t \gamma g_{\mathtt{C}}(x)+o(t ),\\ &[\mathtt{A}]_{i}(x,t )=[\mathtt{A}]_{i}(x,0)+ \frac{\partial [\mathtt{A}]_{i}}{\partial t}(x,0)t + \frac{\partial^{2}[\mathtt{A}]_{i}}{{\partial t}^2}(x,0)t ^2+o(t ^2)=\mathcal{O}(t ^2),~i\geq 2. \end{aligned}\] Therefore the perturbation solution is as follows: \[\begin{aligned} &[\mathtt{A}]_{PER}(x,t )=[\mathtt{A}]_{0}(x,t )+\lambda[\mathtt{A}]_{1}(x,t )+\sum_{i=2}^{\infty}\lambda^i[\mathtt{A}]_{i}(x,t )\nonumber\\ &=g_{\mathtt{A}}(x)+t D_\mathtt{A} g_{\mathtt{A}}''(x)+t f_\mathtt{A}(x,0)+\lambda(-t g_{\mathtt{A}}(x)g_{\mathtt{B}}(x)+t \gamma g_{\mathtt{C}}(x))+o(t )+\mathcal{O}(t^2). \end{aligned}\] Hence, \([\mathtt{A}]_{PER}(x,t )=[\mathtt{A}]_{FDM}(x,t )+\mathcal{O}(t^2).\) # Poisson Hypothesis Testing {#AppB} In a Poisson hypothesis testing problem with two hypotheses, we take a sample from a Poisson random variable \(X\) whose mean is either \(\rho_0\) (under hypothesis \(\textbf{H}_{0}\)) or \(\rho_1\) (under hypothesis \(\textbf{H}_{1}\)). Assume that the two hypotheses \(\textbf{H}_{0}\) and \(\textbf{H}_{1}\) are equally likely and \(\rho_0<\rho_1\). The MAP decision rule compares the observed \(X\) with threshold \(\mathbb{T}_{h}=({\rho_1-\rho_0})/({\log{\rho_1}-\log{\rho_0}})\) and declares \(\textbf{H}_{0}\) if and only if \(X<\mathbb{T}_{h}\). The error probability of the MAP decision rule, denoted by \(P_e(\rho_0, \rho_1)\), equals \[\begin{aligned} \frac{1}{2}\sum_{n\in\mathbb{Z}:~n\geq \mathbb{T}_{h}}^{\infty}\frac{e^{-\rho_0}\rho_{0}^{n}}{n!}+ \frac{1}{2}\sum_{n\in\mathbb{Z}:~0\leq n<\mathbb{T}_{h}}\frac{e^{-\rho_1}\rho_{1}^{n}}{n!} =\frac{1}{2}-TV(\mathsf{Poisson}(\rho_0),\mathsf{Poisson}(\rho_1)) \end{aligned}\] where \(TV(\cdot,\cdot))\) is the total variation distance. # Support Lemma {#AppC} Let \(\mathbb{P}\) be the space of all unnormalized probability distributions on the interval \([0,T]\) (*i.e.*, nonnegative functions with finite nonzero integral). For a distribution \(p(t)\in\mathbb{P}\) and a continuous function \(f(t)\), we define \(\mathbb{E}_{p}(f)=\int_{0}^{T} p(t)f(t) dt.\) This lemma shows that by replacing \(p\) with \(q\), we preserve the \(n\) linear constraints [\[eqn:Cn\]](#eqn:Cn){reference-type="eqref" reference="eqn:Cn"} and impose one linear inequality constraint [\[eqn:C12\]](#eqn:C12){reference-type="eqref" reference="eqn:C12"}. The support of \(q\) (the number of delta functions) is at most the number of constraints which is \(n\). Support lemmas of this type are commonly used in information theory, and follow from Fenchel-Bunt's extension of the Caratheodory theorem. For completeness, we give an intuitive sketch of the proof. For simplicity assume that \(p(t)\) is discrete but with support on an arbitrarily large set, *i.e.,* \(p(t)=\sum_{i=1}^{N}g_{i}\delta(t-\tilde{t}_i)\) for some large \(N\), and \(g_i\geq 0\), \(\tilde{t}_i\in[0,T]\). Consider functions of the form \(\tilde{q}(t)=\sum_{i=1}^{N}x_{i}\delta(t-\tilde{t}_i)\) for some \(x_1,\cdots, x_N\geq 0\). Consider the set of \((x_1, \cdots, x_N)\) for which we have \(\mathbb{E}_{\tilde q}(f_i)= \mathbb{E}_{p}(f_i)\), for \(i=1,\cdots, n\). This imposes \(n\) linear constraints on \((x_1, \cdots, x_n)\). These \(n\) linear constraints along with the inequality constraints \(x_1, \cdots, x_N\geq 0\) define a polytope in the \(N\)-dimensional region. This polytope is nonempty since \((x_1, \cdots, x_N)=(g_1, \cdots, g_N)\) belongs to this polytope. To enforce the inequality [\[eqn:C12\]](#eqn:C12){reference-type="eqref" reference="eqn:C12"}, let us minimize \(\mathbb{E}_{\tilde q}(f)\), which is a linear function in \((x_1, \cdots, x_N)\) over this polytope. The minimum of a linear function occurs at a vertex of the polytope. The key observation is that each vertex of the polytope has at most \(n\) nonzero entries, *i.e.,* if \((x^*_1, \cdots, x^*_N)\) is a vertex of the polytope, at most \(n\) entries of \((x^*_1, \cdots, x^*_N)\) are nonzero. This would imply the desired identification for \(q(x)\). To see this, observe that since the polytope is in \(N\) dimensions, every vertex of the polytope lies at the intersection of \(N\) hyperplanes. The hyperplanes defining the polytope are the \(n\) linear constraints along with \(x_1,\cdots, x_N\geq 0\). Any vertex has to satisfy \(N\) of these equations with equality. Thus, the vertex needs to pick at least \(N-n\) inequalities of the form \(x_i\geq 0\) and satisfy them with equality. In other words, for any vertex, at least \(N-n\) entries must be zero, meaning that the number of nonzero entries is at most \(n\). # Further Examples {#ex2,3} ## Example 2: Reaction for Channel Amplification The main example in Section [2](#sec::generalperturbation){reference-type="ref" reference="sec::generalperturbation"} used chemical reaction as a means to produce molecules that are detected by the receiver. However, reaction may be used for other purposes as well. For instance, it may be used to enhance the channel between the transmitter and the receiver. This concept is considered in the example below. Consider the following example with one transmitter and one receiver. The receiver can only measure the density of molecules of type \(\mathtt{A}\) at its location. The transmitter is also able to release molecules of types \(\mathtt{A}\) and \(\mathtt{B}\) into the medium. Assume that there is an enzyme \(\mathtt{C}\) in the medium (outside of our control) which reacts with molecules of type \(\mathtt{A}\). If the level of enzyme \(\mathtt{C}\) is high, molecules of type \(\mathtt{A}\) are mostly dissolved before reaching the receiver. To overcome this, the transmitter may release molecules of a different type \(\mathtt{B}\), which would also react with the enzyme \(\mathtt{C}\) and thereby reduce the concentration of \(\mathtt{C}\) in the medium. This "cleaning\" of the medium from molecules of type \(\mathtt{C}\) would enhance the channel from the transmitter to the receiver. More specifically, assume that the medium is governed by the following chemical reactions: \[\begin{aligned} \ce{\mathtt{A} + \mathtt{C}&->[\lambda_1]\mathtt{P}_1},\label{eqnNew3}\\ \ce{\mathtt{B} + \beta \mathtt{C} &->[\lambda_2] \mathtt{P}_2},\label{eqnNew4} \end{aligned}\] where \(\mathtt{P}_1\) and \(\mathtt{P}_2\) are some products which do not include molecules of type \(\mathtt{A},\mathtt{B}\) or \(\mathtt{C}\). Here \(\beta\) is a natural number. As an example, \(\mathtt{A}\) and \(\mathtt{B}\) can be two different acids, and \(\mathtt{C}\) is a base substance (which reacts with acids \(\mathtt{A}\) and \(\mathtt{B}\)). If \(\mathtt{B}\) is a stronger acid than \(\mathtt{A}\), the coefficient \(\beta\) can be large, and release of \(\mathtt{B}\) can be effective in canceling \(\mathtt{C}\) from the medium. In [\[eqnNew3\]](#eqnNew3){reference-type="eqref" reference="eqnNew3"} and [\[eqnNew4\]](#eqnNew4){reference-type="eqref" reference="eqnNew4"}, let \(\gamma=\lambda_2/\lambda_1\) be the ratio of the reaction rates. For simplicity of notation, set \(\lambda_1=\lambda,\lambda_2=\gamma\lambda\). Assume that the reaction occurs in a two-dimensional medium. For our modeling purposes, suppose that the transmitter is located at the origin and the receiver is located at \((d,0)\). There is also an independent source that releases molecule of type \(\mathtt{C}\) in the medium with a known concentration \(f_{\mathtt{c}}(x,y,t)\) at time \(t\). The source is assumed to be located at location \(r_0\). See Fig [\[fig:ex2\]](#fig:ex2){reference-type="ref" reference="fig:ex2"} for a depiction of this setting. Following equations describe the system dynamic. \[\begin{aligned} &\frac{\partial[\mathtt{A}]}{\partial t}=D_\mathtt{A}~\bigtriangledown^2 [\mathtt{A}]-\lambda~[\mathtt{A}] [\mathtt{C}]+f_{\mathtt{A}}(x,y,t),\label{cartesian2dim:1}\\ &\frac{\partial[\mathtt{C}]}{\partial t}=D_\mathtt{C}~\bigtriangledown^2 [\mathtt{C}]-\lambda~([\mathtt{A}][\mathtt{C}]+\gamma[\mathtt{B}][\mathtt{C}]^{\beta})+f_{\mathtt{C}}(x,y,t),\label{cartesian2dim:2}\\ & \frac{\partial[\mathtt{B}]}{\partial t}=D_\mathtt{B}~\bigtriangledown^2 [\mathtt{B}]-\gamma\lambda~[\mathtt{B}] [\mathtt{C}]^{\beta}+f_{\mathtt{B}}(x,y,t),\label{cartesian2dim:3} \end{aligned}\] where \(f_{\mathtt{A}}(x,y,t),f_{\mathtt{B}}(x,y,t)\) are input signals of the transmitter. The initial conditions for concentration of molecule of type \(\mathtt{A}\) and type \(\mathtt{B}\) are set to zero. For molecule of type \(\mathtt{C}\), the initial condition is \([\mathtt{C}](x,y,0)=\mathcal{I}_{\text{int}}(x,y)\). We assume that \(\mathcal{I}_{\text{int}}(x,y)\) is completely known. We assume that the diffusion occurs in the entire \(\mathbb{R}^2\) and do not assume any boundaries for the medium. For the case of no reaction, \(\lambda=0\), the system of equations has a closed-form solution. Consider a solution of the following form: \[\begin{aligned} \label{teylorex:2} &[\mathtt{A}](x,y,t)=\sum_{i=0}^{\infty}\lambda^{i}[\mathtt{A}]_{i}(x,y ,t),~ [\mathtt{C}](x,y,t)=\sum_{i=0}^{\infty}\lambda^{i}[\mathtt{C}]_{i}(x,y ,t),~ [\mathtt{B}](x,y,t)=\sum_{i=0}^{\infty}\lambda^{i}[\mathtt{B}]_{i}(x,y ,t). \end{aligned}\] By substituting [\[teylorex:2\]](#teylorex:2){reference-type="eqref" reference="teylorex:2"} in [\[cartesian2dim:1\]](#cartesian2dim:1){reference-type="eqref" reference="cartesian2dim:1"}, [\[cartesian2dim:2\]](#cartesian2dim:2){reference-type="eqref" reference="cartesian2dim:2"}, [\[cartesian2dim:3\]](#cartesian2dim:3){reference-type="eqref" reference="cartesian2dim:3"}, and matching the coefficients of \(\lambda^0,\lambda^1,\lambda^2\) on both side of equations, we obtain the following equations: For particle \(\mathtt{A}\) we have: \[\begin{aligned} &\frac{\partial[\mathtt{A}]_0}{\partial t}=D_\mathtt{A}~\nabla^2 [\mathtt{A}]_0+f_{\mathtt{A}}(x,y,t),~ \frac{\partial[\mathtt{A}]_1}{\partial t}=D_\mathtt{A}~\nabla^2 [\mathtt{A}]_1-[\mathtt{A}]_0 [\mathtt{C}]_0,\label{eq:ex2:A:01}\\ &\frac{\partial[\mathtt{A}]_2}{\partial t}=D_\mathtt{A}~\nabla^2 [\mathtt{A}]_2-([\mathtt{A}]_0 [\mathtt{C}]_1+[\mathtt{A}]_1 [\mathtt{C}]_0).\label{eq:ex2:A:2} \end{aligned}\] For molecule of type \(\mathtt{C}\) we have: \[\begin{aligned} \label{eq:ex2:C} & \frac{\partial[\mathtt{C}_0]}{\partial t}=D_\mathtt{C}~\nabla^2 [\mathtt{C}]_0+f_{\mathtt{C}}(x,y,t),~~ \frac{\partial[\mathtt{C}]_1}{\partial t}=D_\mathtt{C}~\nabla^2 [\mathtt{C}]_1-(\gamma[\mathtt{C}]_{0}^{\beta} [\mathtt{B}]_0+[\mathtt{C}]_{0}[\mathtt{A}]_0). \end{aligned}\] To impose the initial condition for concentration of molecule of type \(\mathtt{C}\), We set \([\mathtt{C}]_{0}(x,y,0)=\mathcal{I}_{\text{int}}(x,y)\) and for \(i\geq 1\) we set \([\mathtt{C}]_{i}(x,y,0)=0\). For particle \(\mathtt{B}\) we have: \[\begin{aligned} \label{eq:ex2:B} &\frac{\partial[\mathtt{B}]_0}{\partial t}=D_\mathtt{B}~\nabla^2 [\mathtt{B}]_0+f_{\mathtt{B}}(x,y,t). \end{aligned}\] Let \(\phi_{\mathtt{A}}(x,y,t)\) be the impulse response of heat equation with \(D_\mathtt{A}\), \[\begin{aligned} \frac{\partial \phi_\mathtt{A}}{\partial t}=D_\mathtt{A}~\nabla^2(\phi_\mathtt{A})+\delta(x)\delta(y)\delta(t). \end{aligned}\] we have: \[\begin{aligned} \label{greentwo} \phi_\mathtt{A}(x,y,t)=\frac{1}{4\pi D_\mathtt{A} t}\exp(-\frac{x^2+y^2}{4 D_\mathtt{A} t}),~~t\geq 0. \end{aligned}\] Similarly, \(\phi_{\mathtt{B}}(x,y,t)\) and \(\phi_{\mathtt{C}}(x,y,t)\) are the impulse responses of the heat equations with diffusion coefficients \(D_\mathtt{B}\) and \(D_\mathtt{C}\) respectively. The solutions of [\[eq:ex2:A:01\]](#eq:ex2:A:01){reference-type="eqref" reference="eq:ex2:A:01"},[\[eq:ex2:A:2\]](#eq:ex2:A:2){reference-type="eqref" reference="eq:ex2:A:2"},[\[eq:ex2:C\]](#eq:ex2:C){reference-type="eqref" reference="eq:ex2:C"}, and [\[eq:ex2:B\]](#eq:ex2:B){reference-type="eqref" reference="eq:ex2:B"} are: \[\begin{aligned} &[\mathtt{A}]_0=\phi_\mathtt{A}**f_{\mathtt{A}},~[\mathtt{C}]_0= \phi_\mathtt{C}**(f_{\mathtt{C}}+D_{\mathtt{C}}\nabla^{2}\mathcal{I}_{\text{int}})+\mathcal{I}_{\text{int}}, ~[\mathtt{B}]_0=\phi_\mathtt{B}**f_{\mathtt{B}},\label{ex2:final:sol:1}\\&[\mathtt{A}]_1=-\phi_\mathtt{A}**([\mathtt{A}]_0 [\mathtt{C}]_0), ~[\mathtt{C}]_1=-\phi_\mathtt{C}**(\gamma[\mathtt{B}]_0 [\mathtt{C}]_0^{\beta}+[\mathtt{C}]_0 [\mathtt{A}]_0),\label{ex2:final:sol:2}\\ &[\mathtt{A}]_2=-\phi_{\mathtt{A}}**([\mathtt{A}]_0 [\mathtt{C}]_1+ [\mathtt{A}]_1 [\mathtt{C}]_0).\label{ex2:final:sol:3} \end{aligned}\] The density of molecule \(\mathtt{A}\) is equal to: \[\begin{aligned} \label{ex2:Asol} [\mathtt{A}](x,y,t)= [\mathtt{A}]_0+\lambda [\mathtt{A}]_1+\lambda^{2} [\mathtt{A}]_2 +\mathcal{O}(\lambda^3) \end{aligned}\] For low reaction rates, we can approximate [\[ex2:Asol\]](#ex2:Asol){reference-type="eqref" reference="ex2:Asol"} as follows: \[\begin{aligned} \label{ex2:Asol2} [\mathtt{A}](x,y,t)\approx [\mathtt{A}]_0+\lambda [\mathtt{A}]_1+\lambda^{2} [\mathtt{A}]_2(x,y,t) \end{aligned}\] Using the above model, we design a modulation scheme in Section [12.2](#mod:ex2){reference-type="ref" reference="mod:ex2"}. ## Modulation Design For Example 2 {#mod:ex2} Consider a communication scenario consisting of a transmitter and a receiver. The transmitter releases molecules of type \(\mathtt{A}\) and \(\mathtt{B}\) into the medium to encodes a message \(M_{\mathtt{A}}\in\{0,1\}\). The concentration of the released molecules of type \(\mathtt{A}\) is described by the input signal \(f_{\mathtt{A}}^{i}(x,y,t) =a_i(t)\delta(x)\delta(y)\),\(0\le t\le T\) for \(i=0,1\). In other words, the density of released molecules of type \(\mathtt{A}\) at time \(t\) is \(a_{M_{\mathtt{A}}}(t)\) if message \(M_{\mathtt{A}}\) is transmitted for \(t\in[0,T]\). Similarly, \(f_{\mathtt{B}}(x,y,t)=b_{M_{\mathtt{A}}}(t)\delta(x)\delta(y)\) is the released concentration of molecules of type \(\mathtt{B}\) where \(b_0(t)\) and \(b_1(t)\) are two nonnegative waveforms for \(t\in[0,T]\). The total amount of released molecules of type \(\mathtt A ,\mathtt B\) during the transmission period \(T\) is assumed to be at most \(s_{\mathtt A},s_{\mathtt B}\) respectively, *i.e.,* \[\begin{aligned} \int_{0}^T a_i(t)dt\leq s_{\mathtt A},~\int_{0}^T b_i(t)dt\leq s_{\mathtt B} \quad i=0,1.\label{eqn:power2a} \end{aligned}\] Finally, we assume that molecules of type \(\mathtt C\) are being continuously generated throughout the medium according to some function \(f_{\mathtt{C}}(x,y,t)\) for \(x,y\in\mathbb{R}\), \(t\in[0,T]\). The function \(f_{\mathtt{C}}(x,y,t)\) and the initial density \([\mathtt{C}](x,y,0)\) at time \(t=0\) are assumed to be completely known to the receiver and the transmitter. Receiver samples the number of molecules of type \(\mathtt{A}\) at \((x=0,y=d,t=T)\). Similar to Example 1, receiver gets a number from a Poisson distribution with parameter \([\mathtt{A}](0,d,T)\). As before, the probability of error is defined as \[Pr(e)=Pr\{ M_{\mathtt{A}}\neq \hat{M}_\mathtt{A}\},\] where \(\hat{M}_\mathtt{A}\in\{0,1\}\) is the receiver's decoded message bit. Similar to Example 1, we wish to minimize the error probability by choosing the best possible waveforms \(a_i(t)\) and \(b_j(t)\). The following theorem states that in the low reaction rate regime (for the approximate reaction-diffusion equations when we consider first terms in the Taylor series expansion), one possible optimal waveforms \(a_i(t)\) and \(b_i(t)\) that achieve minimum probability of error are as follows: In order to determine parameters in the statement of Theorem [\[th::2\]](#th::2){reference-type="ref" reference="th::2"} we need optimize over constants \(t^{[a_1]},t^{[b_1]}\). As an example, consider the values of system parameters as follows in Table [\[tabex2\]](#tabex2){reference-type="ref" reference="tabex2"}. Simulation results yield the optimal values for \(t^{[a_1]},t^{[b_1]}\) as \(t^{[a_1]}=5.62,t^{[b_1]}=0\). Also, when we vary \(s_{\mathtt A}\in [500,5\times 10^{11}]\) while we fix the other parameters, we observe that \(t^{[b_1]}\) remains zero. In other words, it is best to release molecules of type \(\mathtt B\) as soon as interfering molecules of type \(\mathtt C\) are released. Moreover, the value of \(t^{[a_1]}\) is almost constant as we vary \(s_{\mathtt A}\). ## Example 3: Reaction for Two-way Communication Finally, our third example considers two transceivers (who are able to both transmit and receive signals) in a three-dimensional setting. Consider two molecular transceivers \(\mathsf T_1\) and \(\mathsf T_2\). The transceiver \(\mathsf T_1\) is able to release molecules of type \(\mathtt{A}\) and receive molecules of type \(\mathtt{B}\). On the other hand, the transceiver \(\mathsf T_2\) is able to release molecules of type \(\mathtt{B}\) and receive molecules of type \(\mathtt{A}\). If there is no reaction between \(\mathtt{A}\) and \(\mathtt{B}\), we have two distinct directional channels between the two transceivers (e.g., one channel is formed by \(\mathsf T_1\) releasing molecules of type \(\mathtt{A}\) and \(\mathsf T_2\) receiving them). However, if \(\mathtt{A}\) reacts with \(\mathtt{B}\) in the medium, the two channels become entangled. This would impact the transmission strategy of the two transceivers if they wish to establish a two-way communication channel, and send and receive messages at the same time. The chemical reaction would weaken both signals in this case. Assume that \[\ce{\mathtt{A} + \mathtt{B}->[\lambda] \mathtt{P}}.\] The following equations describe the dynamic of the system: \[\begin{aligned} &\frac{\partial[\mathtt{A}]}{\partial t}=D_\mathtt{A}\nabla^2[\mathtt{A}]-\lambda~[\mathtt{A}][\mathtt{B}]+f_\mathtt{A}(\vec{x},t),~\frac{\partial[\mathtt{B}]}{\partial t}=D_\mathtt{B}\nabla^2[\mathtt{B}]-\lambda~[\mathtt{A}][\mathtt{B}]+f_\mathtt{B}(\vec{x},t),\label{ex3:eq} \end{aligned}\] where \(f_\mathtt{A}(\vec{x},t),f_\mathtt{B}(\vec{x},t)\) are input signals of the two transceivers. The initial conditions are set to zero, and we allow diffusion in the entire \(\mathbb{R}^3\) with no boundaries. As before, for \(\lambda=0\) the system of equations is linear and analytically solvable. Consider a solution of the following form: \[\begin{aligned} \label{teylorex:2N} &[\mathtt{A}](\vec{x},t)=\sum_{i=0}^{\infty}\lambda^{i}[\mathtt{A}]_{i}(\vec{x} ,t),~[\mathtt{B}](\vec{x},t)=\sum_{i=0}^{\infty}\lambda^{i}[\mathtt{B}]_{i}(\vec{x} ,t). \end{aligned}\] By matching the coefficients of \(\lambda^0,\lambda^1\) on the both side of equations, we can find a solution for in low reaction rate regime. By matching the constant terms, we obtain \[\begin{aligned} \label{ex3:firstterm} &\frac{\partial[\mathtt{A}]_0}{\partial t}=D_\mathtt{A} \nabla^{2}[\mathtt{A}]_0 +f_\mathtt{A}(\vec{x},t),~\frac{\partial[\mathtt{B}]_0}{\partial t}=D_\mathtt{B}\nabla^{2}[\mathtt{B}]_0 +f_\mathtt{B}(\vec{x},t). \end{aligned}\] By matching the coefficients of \(\lambda\), we get \[\begin{aligned} \label{ex3:secondterm} &\frac{\partial[\mathtt{A}]_1}{\partial t}=D_\mathtt{A} \nabla^{2}[\mathtt{A}]_1-[\mathtt{A}]_{0}[\mathtt{B}]_{0},~\frac{\partial[\mathtt{B}]_1}{\partial t}=D_\mathtt{B}\nabla^{2}[\mathtt{B}]_1-[\mathtt{A}]_{0}[\mathtt{B}]_{0}. \end{aligned}\] The impulse response for heat equation is as follows: \[\label{greenthree} \phi_\mathtt{A}(\vec{x},t)=\frac{1}{(4\pi D_\mathtt{A}t)^{\frac{3}{2}} }\exp(-\frac{\lVert\vec{x}\rVert_{2}^{2}}{4 D_\mathtt{A} t}), ~~\vec{x}\in \mathbb{R}^{3}~,t\geq 0.\] The solution of [\[ex3:firstterm\]](#ex3:firstterm){reference-type="eqref" reference="ex3:firstterm"}, [\[ex3:secondterm\]](#ex3:secondterm){reference-type="eqref" reference="ex3:secondterm"} are given in the following form. \[\begin{aligned} \label{ex:3:final:density} &[\mathtt{A}]_0=\phi**f_\mathtt{A},~ [\mathtt{B}]_0=\phi**f_\mathtt{B},~ [\mathtt{A}]_1=-\phi_{\mathtt{A}}**([\mathtt{A}]_0 [\mathtt{B}]_0),~ [\mathtt{B}]_1=-\phi_{\mathtt{B}}**([\mathtt{A}]_0 [\mathtt{B}]_0). \end{aligned}\] This results in the following solution for low reaction rates: \[\begin{aligned} \label{ex3::finalsol} &[\mathtt{A}](\vec{x},t)= [\mathtt{A}]_0(\vec{x},t)+\lambda [\mathtt{A}]_1(\vec{x}, ,t)+\mathcal{O}(\lambda^2),~[\mathtt{B}](\vec{x},t)= [\mathtt{B}]_0(\vec{x},t)+\lambda [\mathtt{B}]_1(\vec{x}, ,t)+\mathcal{O}(\lambda^2). \end{aligned}\] Using these equations, we design a modulation scheme in Section [12.4](#mod:ex3){reference-type="ref" reference="mod:ex3"}. ## Design of Modulation For Example 3 {#mod:ex3} Suppose transceivers \(\mathsf T_{\mathtt {A}}, \mathsf T_{\mathtt {B}}\) encode messages \(M_{\mathtt{A}},M_{\mathtt{B}}\in\{0,1\}\) with input signals \(f_{\mathtt{A}}^{i}(\vec{x},t) =a_i(t)\delta(\vec{x}),f_{\mathtt{B}}^{i}(\vec{x},t) =b_i(t)\delta(\vec{x}-\vec{d_{\mathtt{B}}})\), for \(0\le t\le T\) and \(i=0,1\), where \(\vec{d_\mathtt{B}}=(d,0,0)\) is the location of \(\mathsf T_{\mathtt {B}}\). In other words, transceiver \(\mathsf T_{\mathtt {A}}\) releases a concentration of \(a_{M_{\mathtt{A}}}(t)\) at origin, and transceiver \(\mathsf T_{\mathtt {B}}\) releases a concentration of \(b_{M_{\mathtt{B}}}(t)\) at its location \(\vec{d_\mathtt{B}}\). As before, we restrict the total amount of released molecules of types \(\mathtt A\) and \(\mathtt B\) during the transmission period \(T\) as follows: \[\begin{aligned} \int_{0}^T a_i(t)dt\leq s_{\mathtt A},~\int_{0}^T b_j(t)dt\leq s_{\mathtt B} \quad i=0,1.\label{eqn:power3a} \end{aligned}\] Transceiver \(\mathsf{T_{\mathtt {A}}}\) samples the medium for molecules of type \(\mathtt {A}\) at the end of the time slot at time \(t=T\), and uses its observation to decode the message \(\hat{M}_{\mathtt{B}}\). Similarly, transceiver \(\mathsf{T_{\mathtt {B}}}\) decodes the message \(\hat{M}_{\mathtt{A}}\) using its sample at time \(T\). Four error probabilities could be considered in our problem: since transceiver \(\mathsf T_{\mathtt {B}}\) knows transmitted message \(M_{\mathtt{B}}\), for this transceiver we can consider error probabilities \[\begin{aligned} &J_1:= Pr(M_{\mathtt{A}}\neq \hat M_{\mathtt{A}}|M_{\mathtt{B}}=0), ~J_2:= Pr(M_{\mathtt{A}}\neq \hat M_{\mathtt{A}}|M_{\mathtt{B}}=1)\end{aligned}\] Similarly, for transceiver \(\mathsf T_{\mathtt {A}}\), we can consider \[\begin{aligned} &J_3:= Pr(M_{\mathtt{B}}\neq \hat M_{\mathtt{B}}|M_{\mathtt{A}}=0),~ J_4:= Pr(M_{\mathtt{B}}\neq \hat M_{\mathtt{B}}|M_{\mathtt{A}}=1)\end{aligned}\] We would like to make \(J_1, J_2, J_3, J_4\) as small as possible by choosing optimal waveforms \(a_i(t)\) and \(b_j(t)\). Since there is a tradeoff between minimizing \(J_1, J_2, J_3\) and \(J_4\), we can choose a cost function \(\mathcal{H}:[0,1]^{4}\rightarrow \mathbb{R}\) and minimize \(\mathcal{H}(J_{1},J_{2},J_{3},J_{4})\). While we could choose any arbitrary cost function, for simplicity of exposition, we adopt \(\mathcal{H}(J_1,J_2,J_3,J_4)=\sum_{i=1}^{4}\omega_{i}\log(J_{i})\) for some constants \(\omega_{i}, i=1, \cdots,4\). This particular choice for \(\mathcal{H}\) leads to very simple optimal waveforms \(a_i(t)\) and \(b_j(t)\) in the low reaction regime as shown in the following theorem (other choices for \(\mathcal{H}\) result in more delta terms in the optimal waveform). In order to determine parameters in the statement of Theorem [\[th::3\]](#th::3){reference-type="ref" reference="th::3"} we need optimize over constants \(\hat{a}_{1},\hat{b}_{1},t^{[a_1]},t^{[b_1]}\). Simulation results yield the optimal values for \(\hat{a}_{1},\hat{b}_{1},t^{[a_1]},t^{[b_1]}\) as \(\hat{a}_{1}=2\times 10^{8} ,\hat{b}_{1}=2.4\times 10^{9},t^{[a_1]}=0,\) and \(t^{[b_1]}=0\). [^1]: Note that uses the idea of *singular perturbation* which should not be confused with the *perturbation theory*. [^2]: Our own experiment with this method indicates that choosing the appropriate mesh size is particularly challenging when we have a reaction-diffusion system involving molecules that have very different diffusion constants (especially when one diffusion constant is more than ten times another diffusion constant).
{'timestamp': '2021-06-04T02:07:55', 'yymm': '2005', 'arxiv_id': '2005.14296', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14296'}
null
null
# Introduction Crowdsourced software engineering offers many opportunities for reducing time-to-market, producing alternative solutions, employing experts, learning through work, and democratizing participation in software engineering. There are several types of crowdsourced software engineering. One of the oldest and most common is open source software development. Another approach is competition-based crowdsourcing, where platforms such as TopCoder have increasingly become very popular with over 1,500,000 users. A more recent form of crowdsourced software engineering is microtask programming. Microtask programming decontextualizes work into self-contained microtasks, reducing the context necessary to onboard onto a software project and thereby decreasing joining barriers. At the same time, it may reduce the time to market for completing software work through parallelism. Several prior systems have explored approaches for microtasking programming work, using either manual or automatic approaches for decomposing programming tasks into microtasks. Manual approaches rely on a developer  or client to author each microtask . Microtask programming environments can reduce onboarding barriers through preconfigured web-based environments, such as Codepilot, CrowdCode, and Collabode. However, existing approaches for crowdsourced software development have significant limitations. Open-source software development and competition-based approaches suffer from onboarding barriers, both technical and social. Although there are countless examples of successful open-source projects, onboarding challenges for newcomers can make it difficult to quickly onboard new developers and dissuade casual contributors. Microtask programming approaches can reduce onboarding barriers, both by offering a preconfigured environment as well as by enabling developers to do programming work with less prior knowledge or awareness of the complete project. But existing approaches are still limited in their support for design and architecture activities necessary to scale to larger software projects. Moreover, decontextualizing programming work is hard, bringing with it many challenges in doing it effectively. For example, conflicts may occur when two crowd workers make conflicting assumptions, necessitating approaches to reduce or repair conflicts as they occur . In my work, I have been exploring new ways to increase the *scale* of microtask programming. I have developed a new behavior-driven development approach to microtask programming and conducted a series of studies to investigate the costs and benefits of microtask programming. In future work, I expect to continue to work to scale microtask programming to larger and more complex projects. # Crowdsourced Behavior-Driven Development To make microtask programming more efficient and reduce the potential for conflicts between contributors, I developed a new behavior-driven approach to microtasking programming. In our approach, each microtask asks developers to identify a behavior behavior from a high-level description of a function, implement a unit test for it, implement the behavior, and debug it. It enables developers to work on functions in isolation through high-level function descriptions and stubs. In addition, I developed the first approach for building microservices through microtasks. Building microservices through microtasks is a good match because our approach requires a client to first specify the functionality the crowd will create through an API. This API can then take the form of a microservice description. A traditional project may ask a crowd to implement a new microservice by simply describing the desired behavior in a API and recruiting a crowd. We implemented our approach in a web-based IDE, *Crowd Microservices*[^1] (Fig. [\[fig:workflow\]](#fig:workflow){reference-type="ref" reference="fig:workflow"}). It includes an editor for clients to describe the system requirements through endpoint descriptions as well as a web-based programming environment where crowd workers can identify, test, implement, and debug behaviors (Figure [\[fig:workflow\]](#fig:workflow){reference-type="ref" reference="fig:workflow"}). The system automatically creates, manages, assigns microtasks. After the crowd finishes, the system automatically deploys the microservice to a hosting site. *Study 1: Feasibility.* To evaluate the feasibility of this approach, we conducted a small study where 9 developers together worked to build a microservice. The results were promising. Participants submitted their first microtask less than half an hour after beginning, successfully submitted 350 microtasks, implemented 13 functions and 36 tests, completed microtasks in a median time under 5 minutes, correctly implemented 27 of 34 behaviors, and together implemented most of a functioning ToDo microservice . *Study 2: Comparing microtask programming to traditional development.* To directly compare traditional programming to microtasked programming, we conducted a controlled experiment. Twenty-eight developers worked either on traditional programming tasks, described through issues, or programming microtasks. We found that, compared to traditional software development, microtasking had important advantages in reducing onboarding time and time-to-market and, surprisingly, in increasing the quality of code and individual developer productivity. *Study 3: Using microtask programming in industry.* Our early studies were conducted entirely in artificial contexts, using artificial tasks and developers recruited specifically to work in the study. To examine the potential for using microtask programming in industry, we partnered with NTT, a large telecommunication company, to conduct a study of microtask programming within a real software project. We found that a microtask programming approach was successful in implementing and testing a project with 8000 lines of code in 14 functions. We also found that developers took time to understand the new concepts in microtask programming approach and be productive. We also found the value of having dedicated developers responsible for managing microtask projects. # Future Work My studies have offered initial evidence that microtask programming can be effective in small crowds with a few developers. But much of the promise of microtasking comes from large crowds, and there exists a direct relationship between the number of independent tasks and the parallelism in microtask programming which may reduce time to market. However, there are a number of significant challenges in scaling microtask programming to larger crowds. To date, the largest crowd we have used is only 9 developers. To begin to examine microtask programming at scale, we are planning to conduct a virtual hackathon with around 100 developers. Based on our findings, we will develop new techniques to scale microtask programming and more fully encompass software development work. One direction we expect to pursue is with team organization. In our current approach, clients specify a microservice and crowd developers work in a flat organization to complete microtasks. This organization may not work well for all projects. For instance, some projects have security considerations, like private APIs that they do not want to expose to the public. Or projects may benefit from more experienced team leads who tackle more complex tasks or help less experienced developers when they get stuck. We will explore ways to make better use of more experienced developers in crowds through defining separate roles for crowd workers. TopCoder is one successful example of this hybrid collaboration, and we will explore ways to adapt these ideas within microtask programming .
{'timestamp': '2020-06-01T02:03:44', 'yymm': '2005', 'arxiv_id': '2005.14306', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14306'}
null
null
# Introduction Let \(G=(V,E)\) be a simple undirected graph, with vertices \(V\) and edges \(E\subset~V\times V\), and let \(\mathbf{p} = \{ p_1, p_2, \dots p_n \} \in {\mathbb R}^{d n}\) be a set of vectors \(p_u\in{\mathbb R}^d\) assigned to the vertices, where \(n=|V|\) is the vertex cardinality. This assignment is a (real) *embedding* of \(G\) in \({\mathbb R}^d\). Every embedding induces a set of non-negative real edge lengths \(\bm{\lambda}= (\lVert p_u-p_v \rVert)_{(u,v) \in E}\), where \(\lVert \cdot \rVert\) denotes the Euclidean distance. The distances \(\bm{\lambda}\) represent a labelling of the graph edges; hence such graphs are also known as distance graphs. The embedding \(\mathbf{p}\) of \(G\) is called *rigid* if it admits only a finite number of other embeddings up to rigid motions, for the edge labelling induced by \(\mathbf{p}\), otherwise it is called *flexible*. This basic dichotomy can be associated to the graph for almost all embeddings with no reference to a specific embedding. This is achieved using the following genericity notion. A graph embedding is called *generic* if a small perturbation of the embedded vertices does not alter whether the embedding is rigid or flexible. Thus, \(G\) is *generically rigid* in \({\mathbb R}^{d}\) if it is rigid for every edge labelling induced by a generic embedding. Embeddings of simple graphs are also defined in \(\mathbb{C}^d\) and correspond to all possible configurations of \(n\) points \(\bm{x}\in\mathbb{C}^{d n}\) that satisfy the assignments \[\lambda_{u,v}^2= \sum\limits_{k=1}^d (x_{u,k}-x_{v,k})^2,\] for all edges \((u,v)\in E\). Note that this does not represent a norm in \(\mathbb{C}^d\). Additionally, a rigid graph is (generically) *minimally* rigid if any edge removal breaks the rigidity. A fundamental theorem in graph rigidity due to Maxwell gives a necessary (but not sufficient) condition on the edge count of a graph and all its subgraphs for the graph to be rigid. More precisely, if a graph \(G=(V,E)\) is minimally rigid in \({\mathbb R}^d\), then \(|E|=d \cdot |V|-\binom{d+1}{2}\) and \(|E'| \leq d\cdot |V'|-\binom{d+1}{2}\) for every subgraph \(G'(V',E') \subset G\). Minimally rigid graphs in \({\mathbb R}^2\) are known as *Laman graphs*, because of G. Laman's theorem that gives a full characterisation of them. Laman's theorem states that Maxwell's condition is also sufficient for minimally rigid graphs in \({\mathbb R}^2\). This condition is not the only one that verifies minimal rigidity in \({\mathbb R}^2\). For example, Henneberg constructions, pebble games and Recski's theorem have been used alternatively. In fact, Laman rediscovered the forgotten results of H. Pollaczek-Geiringer and in order to honour her we call minimally rigid graphs in \({\mathbb R}^3\) *Geiringer graphs* following. In dimension 3, a well-known theorem by Cauchy states that all strictly convex simplicial polyhedra are rigid. The edge-skeleta of these polyhedra constitute the subclass of planar (in the graph-theoretical sense) Geiringer graphs. On the other hand, there is no full characterization for the whole class of Geiringer graphs, since Maxwell's condition is not always sufficient for minimal rigidity in dimension 3 or higher (see Figure [\[fig:doubleb\]](#fig:doubleb){reference-type="ref" reference="fig:doubleb"} for a counter-example). Rigid graphs in \({\mathbb R}^2\) and \({\mathbb R}^3\) have attracted the principal interest of research because of their numerous applications. Such applications can be found in robotics, molecular biology, sensor network localization and architecture. Beyond these applications, rigidity theory has also a mathematical interest on its own and results on rigidity can be extended to arbitrary dimension and to other manifolds. More specifically, the set of minimally rigid graphs on every unit \(d\)-dimensional sphere \(S^d\), coincides with the set of minimally rigid graphs in \({\mathbb R}^d\). The main contribution of this paper is to employ a variety of algorithms from algebraic geometry in order to investigate minimally rigid graphs, relying on the observation that they can be adequately modeled by well-constrained algebraic systems. The total number of edge constraints according to Maxwell's theorem equals the total number of degrees of freedom (dof) of the rigid graph embedding. They equal the total number of vertex coordinates, namely \(d\cdot n\), after subtracting the \(\binom{d+1}{2}\) dof of rigid motions (rotations and translations). Besides, the inequalities in Maxwell's condition exclude any over-constrained subsystem. We shall concentrate on complex embeddings. Note that the number of complex embeddings of a minimally rigid graph \(G\) is the same for all generic assignments of lengths \(\bm{\lambda}\) (see  for Laman graphs and  on coefficient-parameter theory). This number is denoted by \(c_d(G)\) and is bounded by upper bounds on the number of (complex) solutions of the algebraic system. #### Previous work: A major open question in rigidity theory is to obtain optimal asymptotic upper bounds on the number of embeddings (see for example ). According to Maxwell's condition, there are \(O(d n)\) edge constraints that can be represented by the quadratic Euclidean edge length equations \(\displaystyle\lVert \mathbf{x}_u-\mathbf{x}_v \rVert^2~=~\lambda_{u,v}^2\). Applying Bézout's bound, this formulation yields \(O(2^{dn})\) as an upper bound on the number of embeddings. In the authors used mixed volume techniques on a set of equations that reformulates the quadratic edge length constraint equations to compute better BKK bounds (named after Bernstein, Khovanskii and Kushnirenko) on the number of embeddings for Laman graphs. We will also use this formulation, however, their polyhedral methods did not improve Bézout's asymptotic bound in the general case. Besides edge lengths equations, there are distance geometry methods to verify embeddings in \({\mathbb R}^d\), subject to determinantal equations and inequalities obtained from Cayley-Menger matrices. The best known upper bound for the number of embeddings of a rigid graph in dimension \(d\) uses these determinantal varieties, applying a theorem on their degree (for the degree of determinantal varieties, see ): \[\prod\limits_{k=0}^{n-d-2} \frac{\binom{n-1+k}{n-d-1-k}}{\binom{2k+1}{k}}.\] This bound does not improve upon Bézout's bound asymptotically. Let us now juxtapose these to lower bounds. Direct computations for Laman graphs have proved that there are graphs with \(2.50798^n\) complex embeddings in \(\mathbb{C}^2\) and Geiringer graphs with \(3.06825^n\) complex embeddings. On the sphere it is proven that there are graphs with \(2.5698^n\) complex embeddings. Computations on the number of embeddings for all graphs with given \(n\) have been completed only for relatively small \(n\) due to the amount of computation required (up to \(n=13\) in dimension 2 and \(n=10\) in dimension 3). In any case, the gap between asymptotic upper bounds and experimental results remains enormous. Finding the exact number of complex solutions requires some demanding computations. In the case of embeddings of Laman graphs both in \(\mathbb{C}^2\) and \(S^2\), there are combinatorial algorithms that speed up computations a lot, but still it is almost infeasible to compute \(c_d(G)\) for graphs with more than 18 vertices in a desktop computer. Since no similar algorithm exists for Geiringer graphs, solving algebraic systems for random instances is the only option: Groebner bases  and homotopy solvers like `phcpy` have been employed. For the 11-vertex case, `phcpy` fails to give all solutions for many graphs, while Groebner bases may take more then 3 days for a single graph (if the algorithm terminates). Another homotopy solver that has come recently to our attention is `MonodromySolver`, implemented in `Macaulay2`. We tested this solver for a variety of graphs and it seems more accurate and considerably faster than `phcpy`. Besides computing the exact number of embeddings, complex bounds have been considered as general estimates of the number of solutions. These bounds can also serve as input to homotopy continuation solvers. Mixed volume computation has been used, by applying suitable variable transformations. Even if mixed volume computations are generally faster than exact estimations, the computational limits of this method are also rather restrained. Let us comment that there are real algebraic bounds which are sharper than the complex ones for certain polynomial structures. These bounds are much higher than the (more general) complex bounds already mentioned in the case of minimally rigid graphs. #### Our contribution. In the present paper we use m-Bézout bounds on the number of complex embeddings. We present a new recursive combinatorial algorithm that adopts a graph-theoretic approach in order to speed up the computation of m-Bézout bounds in our case, based on a standard partition of variables. We also use matrix permanent computation, which are known to compute m-Bézout bounds, comparing runtimes with our algorithm. Applying the best known upper bounds for orientations of planar graphs  and permanents of \((0,1)\)-matrices (known as Brègman-Minc bound ), we improve asymptotic upper bounds for planar minimally rigid graphs in dimension 3, and for all minimally rigid graphs in dimensions \(d\geq 5\). We compare the m-Bézout bounds with mixed volume bounds and the actual number of complex embeddings of all Laman and Geiringer graphs with \(n\leq 9\) vertices, and some selected Laman graphs up to \(n=18\) and Geiringer graphs up to \(n=12\), and observe that m-Bézout is exact for the large majority of spherical embeddings in the case of planar Laman graphs, while it is exact for all planar Geiringer graphs. We adjust the Bernstein's discriminant conditions on the exactness of mixed volume to the case of m-Bézout bounds using Newton polytopes whose mixed volume equals to the m-Bézout. Our method exploits the system structure to ensure that some conditions are verified *à priori*, reducing the number of checks required by an exponential factor. This number of conditions remains exponential, but based on our experiments we conjecture that it suffices to check only a linear number of cases overall. These results are highlighted by certain examples. The rest of the paper is structured as follows. The next section discusses some background and introduces the algebraic formulation that we exploit. Section [3](#sec:mBez){reference-type="ref" reference="sec:mBez"} offers two approaches for efficiently computing m-Bézout bounds: first a combinatorial method and, second, a reduction to the permanent thus improving bounds for planar graphs in dimension \(3\) and for all graphs in the case of \(d\geq 5\). Section [4](#sec:exact){reference-type="ref" reference="sec:exact"} studies the exactness of m-Bézout bounds. The paper concludes with open questions. # Henneberg constructions and algebraic formulation {#sec:eq-sphere} In this section we present some preliminaries about the construction of rigid graphs and the computation of their embeddings. In general, Maxwell's condition is not suitable to find the set (or a superset) of all minimally rigid graphs with a given number of vertices. On the other hand, a sequence of moves known as Henneberg steps can construct such sets. Additionally, a characterization of minimally rigid graphs up to the last Henneberg move can be used to separate cases that have a trivial number from the the non-trivial ones. Subsequently, we present an algebraic formulation that is based on a variant of the quadratic edge lengths equations. This formulation has been used several times in the context of studies on rigid graphs that exploit sparse elimination techniques. ## Henneberg steps {#sec:Hsteps} Minimally rigid graphs in \({\mathbb R}^d\) can be constructed as a sequence of Henneberg moves starting from the complete graph on \(d\) vertices \(K_d\). In the case of \(d=2\) all minimally rigid graphs can be obtained by Henneberg 1 (H1) and Henneberg 2 (H2) operations, giving one more method to characterize Laman graphs. On the other hand these two moves are not sufficient to construct all the minimally rigid graphs in \(d=3\), so an extended Henneberg step is required. These 3 moves give a superset of Geiringer graphs. It is conjectured that H1, H2 and H3 completely characterize rigid graphs in \({\mathbb R}^3\). These moves generalize to arbitrary dimension. The H1 move in dimension \(d\) adds a new \(d\)-degree vertex, while H2 adds a \((d+1)\)-degree vertex removing also an edge. It has been proven that these moves always preserve rigidity in all dimensions. On the other hand, H3 step in dimension 4 is not always rigid . We used Henneberg steps to construct sets of Laman and Geiringer graphs up to isomorphism, using canonical labeling as in. Since Henneberg moves add a vertex with a fixed degree, we can separate the sets of graphs with the same number of vertices up to their minimal degree. So if a graph in dimension \(2\) has minimal degree \(2\), then it can be constructed with an H1 move in the last step. If the minimal degree is \(3\) it certainly requires an H2 move in the last step of the Henneberg sequence. Notice that the H1 move trivially doubles the number of embeddings, since the new vertex lies in the intersection of \(d\) different \((d-1)\)-spheres. This means that we may examine only graphs that are constructed with the other Henneberg moves. Let us comment that the Geiringer graphs whose construction requires an H3 move have minimal degree \(5\) and no such graph exist for any graph with \(n\leq 11\) vertices. [\[tab:Hsteps\]]{#tab:Hsteps label="tab:Hsteps"} ## Sphere equations In order to compute the number of embeddings of a rigid graph we used some standard algebraic formulation . First we remove rigid motions by fixing \(\binom{d+1}{2}\) coordinates yielding a \(0-\)dimensional system. In the case of dimension \(2\), we may fix both coordinates of one vertex and one coordinate of a second vertex. If these vertices are adjacent to one edge, then the length constraint imposes only one solution for the remaining coordinate of the second vertex up to rotations. In general, if the graph contains a complete subgraph with \(d\) vertices \(v_1,v_2,\dots v_d\), then we can choose the coordinates of this \(K_d\) graph in a way that they satisfy the edge lengths of this subgraph. So, in the case of Laman graphs, we need to fix an edge, while in 3 dimensions a triangle should be fixed. Note that for the first set of graphs there is always a \(K_2\) (edge). As for the 3-dimensional case, Geiringer graphs with no triangles (\(K_3\)) are very rare (the first one is the 10-vertex \(K_{6,4}\)). In that situation, the vertices of an edge are fixed, while a third vertex is located on the same fixed plane as the edge, leaving two degrees of freedom of this vertex free. In that way, every embedding is counted twice, so the number of solutions is divided by 2. We use two types of equations in our systems. The first set of equations at hand are the *edge equations*, which represent the edge length constraints between the adjacent vertices of an edge. Although these equations suffice to find the embeddings of a graph, we cannot take advantage of their structure and compute efficient bounds. To overcome this problem, we define the set of *magnitude equations* that introduce new variables representing the distance of each vertex from the origin. Following, we call the combination of these two sets of equations *sphere equations*. This algebraic system has \(m=d\cdot n-d^2\) edge equations and \(n-d\) magnitude equations if there is at least one subgraph \(K_d\) of \(G\). Notice that the edges of the fixed \(K_d\) serve to specify the fixed vertices and are not included in this set of equations, so \(m < |E|\). We remark that the m-Bézout bound (or the mixed volume bound) of a graph \(G\) may vary up to the choice of the fixed \(K_d\), so one needs to compute m-Bézout bounds up to all fixed \(K_d\)'s in order to find the minimal one. On the other hand \(c_d(G)\) is invariant under different choices of fixed \(K_d\). # Computing m-Bézout bounds {#sec:mBez} In this section we propose two methods for computing m-Bézout bounds for minimally rigid graphs. First, we give definitions of two classical complex bounds (m-Bézout, BKK) and we propose a natural partition in the set of variables for the m-Bézout. Subsequently, we introduce an algorithm based on a relation between indegree constrained graph orientations and the m-Bézout bound of minimally rigid graphs. Besides that, we also give an alternative way to compute this bound via the matrix permanent. Let us mention that matrix permanents have been already used to bound the number of Eulerian orientations (which are graph orientations with equal indegree and outdegree for every vertex) in , but to the best of our knowledge there are no published results on the connection between matrix permanents and indegree constrained graph orientations in the general case. Consequently, we use an existing bound on the orientations of planar graphs to improve the asymptotic upper bounds for planar Geiringer graphs. We also improve asymptotic upper bounds for \(d\geq5\) applying a bound on the permanents of \((0,1)\)-matrices. Finally, we compare our combinatorial algorithm with existing methods to compute upper bounds or the actual number of embeddings in the cases of \(\mathbb{C}^2\) and \(\mathbb{C}^3\). ## The m-Bézout bound of the sphere equations {#sec:SphmBez} Let us start with defining the bound in question. It is based on a classical theorem on bounding the number of solutions of 0-dimensional well-constrained (or square) algebraic systems, see e.g. This so-called m-Bézout bound improves considerably the classical Bézout bound, if the variables can be grouped in an appropriate way, exploiting the structure of the polynomial system.\ The structure of polynomials can be exploited further using sparse elimination techniques. One of the basic tools in sparse elimination theory is the notion of Newton Polytopes of a polynomial system. Given \[f= \sum \limits_{\alpha\in\ZZ^m} c_{\alpha} \mathbf{x}^{\alpha} \in K[x_1,x_2, \dots, x_m ],\quad \mathbf{x}=(x_1,\dots,x_m),\; c_\alpha\ne 0,\] the Newton polytope \(NP(f)\) is defined as the convex hull of its monomial exponent vectors \(\alpha\). A very important theorem relates the structure of these polytopes to the number of solutions of algebraic systems in the corresponding toric variety. The toric variety is a projective variety defined essentially by the Newton polytopes of the given system and contains the topological torus \((\mathbb{C}^*)^m\) as a dense subset. The set-theoretic difference of a toric variety and \((\mathbb{C}^*)^m\) is toric infinity in correspondence with projective infinity. In practical applications, as in this paper, one is interested in roots in the torus \((\mathbb{C}^*)^m\), hence all toric roots except from those lying at toric infinity, in other words only in affine toric roots. Roughly, without paying much attention to the underlying variety, we have the following relations as in : \[\# \text{complex solutions} \leq \text{ mixed volume} \leq \text{ m-B{\'e}zout} \leq \text{ B{\'e}zout}.\] On the other hand, the complexity of computing bounds goes in the opposite direction. Here, we concentrate on the m-Bézout bound of the sphere equations of a graph \(G=(V,E)\) up to a fixed complete subgraph \(K_d\). For the rest of the text, unless further specified, \(K_d\) will denote a given complete subgraph and not all possible choices. In general finding the optimal multihomogeneous partition is not in APX [^1], unless P=NP. Here we choose a natural partition such that each subset of variables contains these ones which correspond to the coordinates and the magnitude of a single vertex \(X_u\). In order to compute the m-Bézout bound, we will separate the magnitude equations from the edge equations. In the first ones, there is only one set of variables with degree 2, while in every edge equation the degree of the \(k\)-th set of variables is always 1: \[\label{bez_sphere} \begin{split} \prod_{u \in V'} 2\cdot X_u \prod_{(u,v) \in E'} (X_{u}+X_{v}) = 2^{n-d} \cdot \prod_{u \in V'} X_u \prod_{(u,v) \in E'} (X_{u}+X_{v}), \end{split}\] where \(E'=E\backslash edges(K_d)\), \(V'=V\backslash vertices(K_d)\) and \(X_{u} \equiv 0\) if \(u \in K_d\). This means that we only need to find the coefficient of the monomial \(\displaystyle\prod\limits_{u \in V'} X_u^d\) in the polynomial of the product: \[\label{eq:graph2mBezout} \prod_{(u,v) \in E'} (X_{u}+X_{v})\] Let us denote this coefficient by \(mB_{E}(G,K_d)\), which is related only to the combinatorial structure of edge equations. The m-Bézout bound for the number of embeddings of a graph in \(\mathbb{C}^d\) up to a fixed \(K_d\) is \(mB(G,K_d)=2^{n-d} \cdot mB_{E}(G,K_d)\). Notice that this bound is the same for spherical embeddings in \(S^d\). ## A combinatorial algorithm to compute m-Bézout bounds {#sec:comb} This subsection focuses on m-Bézout bounds for minimally rigid graphs. Our method is inspired by two different approaches that characterize Laman graphs. First, Recski's theorem states that if a graph is Laman then any multigraph obtained by doubling an edge should be the union of two spanning trees. Additionally, pebble games give a relation between the existence of an orientation and the number of constraints in a graph and its subgraphs. The following theorem gives a combinatorial method to compute the m-Bézout bound, proving that \(mB_{E}(G,K_d)\) is exactly the number of certain indegree-constrained orientations. This theorem gives another way to prove that an H1 move doubles the m-Bézout bound of minimally rigid graphs. Hence, minimally rigid graphs constructed only by H1 moves have at most \(2^{n-d}\) embeddings (actually this bound is tight, see Section [2.1](#sec:Hsteps){reference-type="ref" reference="sec:Hsteps"}). Let us demonstrate our method examining one Laman and one Geiringer graph. We have implemented a software tool in Python to count the number of orientations for an arbitrary graph given the desired indegrees. The basic part of this code (see Algorithm [\[alg:orient\]](#alg:orient){reference-type="ref" reference="alg:orient"}) is to decide recursively which choices of direction are allowed in every step. ## Computing m-Bézout bounds using the permanent The permanent of an \(m \times m\) matrix \(A=(a_{i,j})\) is defined as follows: \[\label{eq:permanent} \text{per }(A)= \sum\limits_{\sigma \in S_m} \prod_{i=1}^{m} a_{i,\sigma(i)},\] where \(S_m\) denotes the group of all permutations of \(m\) integers. One of the most efficient ways to compute the permanent is by using Ryser's formula : \[\label{eq:Ryser} \text{per }(A)= \sum \limits_{M \subseteq \{1,2,\dots ,m\}} (-1)^{m-|M|} \prod_{i=1}^{m} \sum\limits_{j \in M} a_{i,j}.\] There is a very relevant relation between \(\text{per}(A)\) and the m-Bézout bound, see: We will refer to \(A\) matrix as the *m-Bézout matrix* of a polynomial system. This implies that in the case of minimally rigid graphs, we obtain a square m-Bézout matrix \(A\) with columns associated to the equations of non-fixed edges, and \(n-d\) blocks of \(d\) rows each, corresponding to the non-fixed vertices. An entry \((r,c)\) is one if the vertex corresponding to \(r\) is adjacent to the edge corresponding to the equation indexing \(c\), otherwise it is zero. This is an instance of a \((0,1)\)-permanent. Therefore Theorem [\[thm:perm\]](#thm:perm){reference-type="ref" reference="thm:perm"} gives the coefficient \[mB_{E}(G,K_d)=\left(\frac{1}{d!}\right)^{n-d} \cdot \mbox{\rm per}(A),\] in bounding the system's roots, since all \(m_i=d\), while \(k=n-d\). The effect of the magnitude equations implies that we should multiply \(mB_{E}(G,K_d)\) by \(2^{n-d}\) as in Subsection [3.1](#sec:SphmBez){reference-type="ref" reference="sec:SphmBez"}. This yields the corollary below. The permanent formulation for the computation of the m-Bézout bound gives us another way to prove Corollary [\[cor:orientH1\]](#cor:orientH1){reference-type="ref" reference="cor:orientH1"}. Since \(mB(G^*,K_d)=\displaystyle\left(\frac{2}{d!}\right)^{n+1-d} \cdot \text{per }(A^*)\), it follows that \[mB(G^*,K_d)=2\cdot mB(G,K_d),\] as in Corollary [\[cor:orientH1\]](#cor:orientH1){reference-type="ref" reference="cor:orientH1"}.\ Let us give an example of this counting method for a minimally rigid graph. and its permanent is \(\text{per }(A_{L136})=192\), which gives the m-Bézout bound since \(d=2\). Given the relation between m-Bézout bounds and graph orientations (see Section [3.2](#sec:comb){reference-type="ref" reference="sec:comb"}), this proposition leads to the following improvement upon the asymptotic upper bound for the number of embeddings of the subclass of planar Geiringer graphs. We also employ the permanent to obtain asymptotic improvement upon Bézout's asymptotic bound for \(d\ge 5\) by using the following bound. This leads to the following result. 2 3 4 5 6 7 8 9 10 30 --------- --------- ---------- ---------- ---------- ----------- ----------- --------- ---------- ------------------------ \(4^n\) \(8^n\) \(16^n\) \(32^n\) \(64^n\) \(128^n\) \(256^n\) \(512^n\) \(1024^n\) \((1.07\cdot 10^9)^{n}\) \(4.9^n\) \(8.9^n\) \(16.7^n\) \(31.7^n\) \(60.8^n\) \(117.2^n\) \(226.9^n\) \(441^n\) \(860^n\) \((6.88\cdot 10^8)^n\) : Comparing Bézout's and permanent's asymptotic bounds (last two rows) for increasing \(d\) (top row), ## Runtimes The computation of the m-Bézout bounds using our combinatorial algorithm up to a fixed \(K_d\) is much faster than the computation of mixed volume and complex embeddings. In order to compute the mixed volume we used `phcpy` in `SageMath` and we computed complex solutions of the sphere equations using `phcpy` and and `MonodromySolver`. Let us notice that, `MonodromySolver` seems to be faster than mixed volume software we used in the case of Geiringer graphs. We also compared our runtimes with the combinatorial algorithm that counts the exact number of complex embeddings in \(\mathbb{C}^2\). We will try to give some indicative cases for which we compared the runtimes. For example, computing the mixed volume of the spherical embeddings up to one fixed edge for the maximal 12-vertex Laman graph for a given fixed \(K_2\) takes around 390ms, while our algorithm for the m-Bézout bound required 13ms. If we wanted to compute mixed volumes up to all fixed \(K_2\) we needed 8.6s, while the m-Bézout computation took 270ms. The runtime for the combinatorial algorithm that computes the number of complex embeddings is 6.363s for the same graph. For larger graphs i.e. 18-vertex graphs, the combinatorial algorithm may take \(\sim 17\)h to compute the number of complex embeddings in \(\mathbb{C}^2\). We tested a 18-vertex graph that did not require more than 0.12s to compute one m-Bézout bound and 4s to compute m-Bézout bounds up to all choices of fixed edges. In dimension 3 our model was the Icosahedron graph, which has 12 vertices. The computation of the mixed volume took more than 6 days in this case, while our algorithm needed 60ms to give exactly the same result (54,272). `MonodromySolver` could track all \(54,272\) solutions in \(\sim 1.3\) hour, while Gröbner basis computations failed multiple times to terminate. Computing the permanent required more time compared to our algorithm. For the Icosahedron the fastest computation could be done using `Maple`'s implementation in `LinearAlgebra` package. It took \(\sim 0.96\)s to compute the permanent up to a given fixed triangle with this one. On the other hand the implementations in `Python` and `Sage` took much more time for the same graph (\(\sim 8\)m and \(\sim10\)m respectively). This seems reasonable since the combinatorial algorithm has to check at most \(2^{m}\) cases, while according to the complexity to compute the permanent using Ryser's formula is in the order of \(m^2 \cdot 2^{m}\). # On the exactness of m-Bézout bounds {#sec:exact} In this section we examine the exactness of m-Bézout bounds. First, we use already published results (in the cases of \(\mathbb{C}^2\) and \(\mathbb{C}^3\)) and our own computations (in \(S^2\)) to compare m-Bézout bounds with the mixed volumes and the actual number of embeddings. Then, we present a general method to decide if the m-Bézout bound of a minimally rigid graph is tight or not based on Bernstein's second theorem on mixed volumes without directly computing the embeddings. We consider that the latter may be a first step to establish the existence of a particular class of graphs with tight m-Bézout bounds. ## Experimental results {#sec:res} We compared m-Bézout bounds with the number of embeddings and mixed volumes using existing results for the embeddings in \(\mathbb{C}^2\) and \(\mathbb{C}^3\). We also computed the complex solutions of the equations that count embeddings on \(S^2\) for all Laman graphs up to 8 vertices and a selection of graphs with up to 12 vertices that have a large number of embeddings. We remind that in general the m-Bézout bound is not unique up to all choices of a fixed \(K_d\). It is natural to consider the minimal m-Bézout bound as the optimal upper bound of the embeddings for a given graph. Let us notice that we checked if the m-Bézout is minimized when the fixed \(K_d\) has a maximal sum of vertex degrees or when the vertex with the maximum degree belongs to the fixed \(K_d\). There are counter-examples for both of these hypotheseis. #### Mixed volume and m-Bézout bound. In all cases we checked in \(\mathbb{C}^3\) and \(S^2\), the m-Bézout bound up to a fixed \(K_d\) is exactly the same as the mixed volume up to the same fixed points. There are some cases in \(\mathbb{C}^2\) for which the m-Bézout bound is bigger than the mixed volume for certain choices of \(K_2\). We shall notice that these cases do not correspond to the minimal m-Bézout bound for the given graph (thus the minimum m-Bézout and the minimum mixed volume are the same for these graphs). #### Spatial embeddings and the m-Bézout bound. As shown in , there are many cases for which the bounds of the sphere equations are larger than the actual number of complex embeddings. Nevertheless, we observed that for all planar graphs up to \(n=11\) the number of complex embeddings is exactly the same as the mixed volume bound and therefore the m-Bézout bound, while in the non-planar case the bounds are generally not tight. What is also interesting is that the m-Bézout bound is invariant for all choices of fixed triangles in the case of planar Geiringer graphs. The initial form \(f^w\) contains precisely the monomials whose exponent vector minimizes the inner product with \(w\) and excluding the others. Clearly \(P^w\) is a face of \(P\) and \(w\) is an inner normal to face \(P^w\). Hence, the algebraic system comprised of initial forms for a face normal \(w\) shall be called *face system*. The necessary and sufficient condition of BKK exactness is stated below. Recall that the Minkowski sum of sets is the set of all sums between elements of the first and elements of the second set. The Minkowski sum of convex polytopes is a convex polytope containing the vector sums of all points in the two summand polytopes. Let us note that although there is an infinite number of vectors that may appear as inner normals, Bernstein's condition can be verified choosing only one inner normal vector for every different face of \(P\). The results in Section [4.1](#sec:res){reference-type="ref" reference="sec:res"} motivated us to examine these conditions closely in order to determine when the m-Bézout bound is exact. The first step is to use Newton polytopes whose mixed volume equals to the m-Bézout bound (see for example ) since they are simpler than the Newton polytopes of the sphere equations. For a multihomogeneous system, simplices \(T^u_{d_u}\) belong to complementary subspaces. Then, each m-Bézout Polytope is the Newton polytope of the respective equation. For general systems, our procedure amounts to finding the smallest polytopes that contain the system's Newton polytopes and can be written as Minkowski sum of simplices lying in the complementary subspaces specified by the variable partition. In the case of rigid graphs in \(\mathbb{C}^d\), every set of variables has \(d+1\) elements. Thus, the m-Bézout Polytope of the magnitude equations for a vertex \(u\) is \(2 \cdot T_{d+1}^u\), while the m-Bézout Polytope of the equation for edge \((u,v)\) is \(T_{d+1}^u+T_{d+1}^v\). This implies that the Minkowski sum of the m-Bézout Polytopes for the sphere equations of a minimally rigid graph \(G=(V,E)\) is exactly \[B_G= \sum\limits_{u \in V'} ( \deg(u) +2) \cdot T_{d+1}^u,\] where \(\deg(u)\) is the degree of vertex \(u\) in the graph and \(V'\) the set of non-fixed edges. In general, it is hard to compute the Minkowski sum of polytopes in high dimension. But in the case of the m-Bézout Polytopes the following theorem describes the facet normals of \(B_G\). This theorem yields a method to find the H-representation of \(B_G\), in other words the polytope is described as the intersection of linear halfspaces and the respective equations are given by the theorem. In all cases where \(MV=mBe\), the polytopes \(B_G\) can be used instead of the Newton Polytopes of the equations. The verification of Bernstein's second theorem requires a certificate for the existence of roots of face systems for every face of \(B_G\), where faces range from vertices of dimension 0 to facets of codimension 1. We propose a method that confirms or rejects Bernstein's condition checking a much smaller number of systems based on the form of facet normals. For this, we shall distinguish three cases below. The normal of a lower dimensional face can be expressed as the vector sum of facet normals, whose cardinality actually equals the face codimension. This means that we need to verify normals distinguished in the following three cases: 1. vector sums of one or more "coordinate\" normals \(e_i\)'s, 2. vector sums of one or more "non-coordinate\" normals \(\delta_u\)'s, 3. "mixed\" vector sums containing both \(e_i\)'s and \(\delta_u\)'s. Notice that since there are \((d+2)\cdot (n-d)\) different normals, in order to check all resulting face systems, \(2^{(d+2)\cdot (n-d)}\) computations are required. We now examine each of these three cases separately, in order to exclude a very significant fraction of these computations. #### First case (coordinate normals). Let \(F=(f_i )_{1\leq i \leq m}\) be the system of the sphere equations, let the initial forms be \(f_i^{e}\) for some normal \(e\), and let \(F^e\) be the resulting face system. We will deal with the coordinate normals case starting with an example. This example shows that since all \(x_1\) monomials are removed, \(F^{e_1}\) is an over-constrained system that has the same number of equations as \(F\), but a smaller number of variables. The same holds obviously for every \(F^{e_i}\), while for \(e=\sum\limits_{i \in I} e_i\) (where \(I\) is an index set) the initial forms in \(F^{e}\) are obtained after removing all monomials that include one or more of the variables corresponding to the \(e_i\)'s of the sum. In other words, the initial forms in system \(F^{e}\) can be obtained by evaluating to zero all the variables indexed by the set \(I\). We can now exclude the case of sums of coordinate normals from our examination, since it shall not generically occur, because the next lemma shows that \(r\) has no zero coordinate. This lemma excludes a total of \(2^{(d+1)\cdot (n-d)}\) cases when verifying Bernstein's second theorem for a given algebraic system. #### Second case (non-coordinate normals). In the second case, the inner product of exponent vectors with \(\delta_u\) is minimized for all variables \(X_u\) of a vertex \(u\) with maximum degree. Let us give again an example to explain this statement. The number of equations of \(F^{\delta_u}\) equals the number of variables. Following Bernstein's proof on the discriminant conditions, we introduce a new system by applying a suitable variable transformation from the initial variable vector \(\mathbf{x}\) to a new variable vector \(\mathbf{t}\) with same indexing. This transformation uses an \(m\times m\) full rank matrix \(B\) such that every monomial \(\mathbf{x}^{\alpha}\) is mapped to \(\mathbf{t}^{B\cdot \alpha}\) (see for more details). Furthermore, \(|\det B| = 1\) so that the transformation preserves the mixed volume of \(F\). In our case, we construct matrix \(B\) with the following properties: \[\begin{aligned} B\cdot \delta_u^T & = & e_{(d+1)\cdot (u-1)+1}, \\ B\cdot e_{(d+1)\cdot (u-1)+j}^T & = & e_{(d+1)\cdot (u-1)+j} ,\ \forall j \in \{ 2,\dots, d+1\}, \\ \text{det}(B) & = & \pm 1. \end{aligned}\] The intuition behind these choices is given in Lemma [\[lem:Lcase2\]](#lem:Lcase2){reference-type="ref" reference="lem:Lcase2"} and its proof. This yields the following map from variables \(\mathbf{x}\) to new variables \(\mathbf{t}\): \[\begin{aligned} \label{eq:deltamap} x_{u,1} \mapsto \frac{1}{t_{u,1}}, & \,\ x_{u,2} \mapsto \frac{t_{u,2}}{t_{u,1}}, \,\ \cdots ,\,\ s_{u} \mapsto \frac{t_{u,d+1}}{t_{u,1}}. \end{aligned}\] We will refer to the set of \(x_{u,1}\)'s as the \(\delta\)-*variables* of \(F\), since the image of their exponent vectors is the set of \(\delta_u\)'s, while the exponent vectors for the other variables remain same. This transformation maps system \(F(\mathbf{x})\) to a new system \(\widehat{F}(\mathbf{t})\) of Laurent polynomials in the new variables. In the case of \(\mathbb{C}^2\), the sphere equations are mapped as follows: \[\begin{aligned} \widehat{f}_u= \frac{1}{t_{u,1}^2}+\frac{t_{u,2}^2}{t_{u,1}^2}-\frac{t_{u,3}}{t_{u,1}}, \,\,\ & \text{(magnitude equations)} \\ \widehat{f}_{(u,v)}= \frac{t_{u,3}}{t_{u,1}}+\frac{t_{v,3}}{t_{v,1}}-2\cdot \displaystyle\left(\frac{1}{t_{u,1}t_{v,1}}+\frac{t_{u,2}t_{v,2}}{t_{u,1}t_{v,1}}\right)+ \lambda_{u,v}^2 \,\,\ & \text{(edge equations).} \end{aligned}\] The degree \(\alpha(\widehat{f},t_{u,1})\) of a polynomial \(\widehat{f}\) with respect to the variable \(t_{u,1}\) will be either zero or negative. Let us now multiply every polynomial in \(\widehat{F}(\mathbf{t})\) with each one of the monomials \(t_{u,1}^{-\alpha(\widehat{f},t_{u,1})}\). These monomials are defined as the least common multiple of the denominators in the Laurent polynomials \(\widehat{f}\), yielding the following system \(\widetilde{F}(\mathbf{t})\): \[\begin{split} \widetilde{f}_u = 1+t_{u,2}^2-t_{u,1}t_{u,3}, \,\,\ \text{(magnitude equations)} \\ \widetilde{f}_{(u,v)}= t_{v,1}t_{u,3}+t_{u,1}t_{v,3}-2\cdot \displaystyle\left(1+t_{u,2}t_{v,2}\right)+\lambda_{u,v}^2\cdot t_{u,1}t_{v,1}. \,\,\ \text{(edge equations)} \end{split}\] This transformation yields the necessary conditions to verify if the face systems of the non-coordinate normals have solutions in \((\mathbb{C}^*)^m\). We will refer to \(t_{u,1}\)'s as the set of \(\delta\)-variables of \(\widetilde{F}(\mathbf{t})\), while the rest should be the \(e\)-variables. Note that the transformation gives a well-constrained system, while zero evaluations of the \(\delta\)-variables shall result to an over-constrained system, that should have no solutions if the bound is exact. The computational gain in this case is that, without the lemma, one would have checked every different combination of the \(\delta_u\)'s, namely a total of \(2^{n-d}\) checks. Now, it suffices to check only one zero evaluation for each of them, hence only \(n-d\) checks. #### Third case (mixed normals). The third case, that includes the sums of vectors \(\delta_u\) and \(e_i\) can be also treated with the transformation \(\widetilde{F}(\mathbf{t})\) introduced above. Since the minimization of the inner product is invariant for \(d\) of the \(d+1\) variables per vertex, the non-existence of zero solutions in \(\widetilde{F}(\mathbf{t})\) implies that no \(F^w\) has solutions in \((\mathbb{C}^*)^m\) for all vectors \(w\) that are sums of vectors \(\delta_u\) with those vectors \(e_i\) for which the equality \(B \cdot e_i^T=e_i\) holds. In order to proceed we need the following lemma. This shows that using \(d\) of the \(d+1\) \(e_i\)'s of a vertex suffices to verify if a face system of a mixed normal has solutions in \(\mathbb{C}^m\). Note that \(-\delta_u\) is the sum of \(d+1\) normals in complementary subspaces. Lemma [\[lem:alle\]](#lem:alle){reference-type="ref" reference="lem:alle"} reveals that in order to verify the conditions of Bernstein's theorem, we can use the transformations \(\widetilde{F}(\mathbf{t})\) for all choices of \(d\) variables from every set \(X_u\), since there is no need to check the cases that include the sum of all \(e_i\) normals of a single vertex. This result, combined with Lemmas [\[lem:e_i\]](#lem:e_i){reference-type="ref" reference="lem:e_i"} & [\[lem:Lcase2\]](#lem:Lcase2){reference-type="ref" reference="lem:Lcase2"} leads to the following corollary. Since the first \(d\) coordinate variables \(x_{u,j}\) are symmetric (while \(s_u\) variables are not), we can exploit these symmetries excluding some choices. So, without loss of generality, we may keep \(x_{1,1}\) as a \(\delta\)-variable from variable set \(X_1\), and check all possible choices for \(\delta\)-variables from all other variable sets \(X_u\), such that \(u\ne 1\) and \(u\) is not among the fixed vertices. #### Summary of three cases. In general, if one selects to take into consideration all possible sums of facet normals, then \(2^{(d+2)\cdot (n-d)}\) cases should be checked. We have shown that the category of face systems defined by a sum of coordinate normals cannot have toric solutions, discarding \(2^{(d+1)\cdot (n-d)}\) cases. In the two other cases, the investigation of toric solutions can be combined using the \(\widetilde{F}(\mathbf{t})\) transformation. If a face system has toric solutions, then in the non-coordinate normals case some \(\delta\)-variables may have zero solutions, while in the mixed normals case both \(\delta\)-variables and \(e\)-variables may have zero solutions. A naive approach to verify these two cases would result to \(2^{(d+1)\cdot (n-d)} \cdot (2^{ (n-d)}-1)\) checks, but using Corollary [\[cor:allconditions\]](#cor:allconditions){reference-type="ref" reference="cor:allconditions"} one needs to verify the zero evaluations of \(\delta\)-variables for all choices of \(\delta\)-variables. The latter, can be further reduced from \(d^{n-d}\) to \(d^{n-d-1}\), due to the fact that the coordinate variables are symmetric. Summarizing, when checking Bernstein's condition, for any of the \(d^{n-d-1}\) choices of \(\delta\)-variable transformation that construct \(\widetilde{F}(\mathbf{t})\), it suffices that \(n-d\) zero evaluations should be applied for each of the \(\delta\)-variables. This discussion yields an effective algorithmic procedure (see Algorithm [\[alg:exact\]](#alg:exact){reference-type="ref" reference="alg:exact"}) to verify whether the m-Bézout bound is exact. Function `ConstructDeltaPoly` takes as input the system of the sphere equations \(F\) and a list of \(\delta\)-variables to construct the polynomials \(\widetilde{F}(\mathbf{t})\). The central role is played by function `IsmBezoutOfGraphExact`, which verifies if the polynomials \(\widetilde{F}\) have zero solutions for the \(\delta\)-variables. Let us present two examples, further treated in the code found in . Another way to apply our method is the computation of a suitable resultant matrix for a given over-constrained system, which follows from evaluating some variable to zero. It is obvious that if the system has any solutions, the rank of the resultant matrix with sufficiently generic entries is strictly smaller than its size, otherwise it has full rank, assuming we have a determinantal resultant matrix. We have used `multires` module for `Maple` to examine the existence of solutions, repeating the previous results. However, these tools seem to be slower than other techniques which directly compute the number of embeddings.\ In our experimental computations, we noticed that the existence of zero solutions of only one choice of \(\widetilde{F}(\mathbf{t})\) (and not all \(d^{n-d-1}\)) suffice to verify Bernstein's conditions. Therefore, we state the following conjecture: If Conjecture [\[con:delta\]](#con:delta){reference-type="ref" reference="con:delta"} holds, then one only needs to check \(n-d\) face systems that correspond to the zero evaluations of \(\widetilde{F}(\mathbf{t})\) for each one of the \(\delta\)-variables, instead of the \((n-d)\cdot d^{n-d-1}\) face systems indicated in Theorem [\[thm:allcases\]](#thm:allcases){reference-type="ref" reference="thm:allcases"}. Algorithm [\[alg:exact\]](#alg:exact){reference-type="ref" reference="alg:exact"} includes the option to consider the Conjecture [\[con:delta\]](#con:delta){reference-type="ref" reference="con:delta"} to be either True or False. The first option takes into consideration only one choice of \(\delta\)-variables, while in the second one all different choices of \(\delta\)-variables are checked, as in Theorem [\[thm:allcases\]](#thm:allcases){reference-type="ref" reference="thm:allcases"}. # Conclusion and open questions We presented new methods to compute efficiently the m-Bézout bound of the complex embedings of minimally rigid graphs using graph orientations and matrix permanents. Exploiting existing bounds on planar graph orientations and matrix permanents, we improved the asymptotic upper bounds of the embeddings for planar graphs in dimension 3 and for all graphs in high dimension. We also compared our experimental results with existing ones indicating that some classes of graphs have tight m-Bézout bounds. Finally, we applied Bernstein's second theorem in the case of the m-Bézout bound for rigid graphs. Our findings in this topic can be generalized for every class of polynomial systems that have no zero solutions. Several open questions arise from our results. First of all, we would like to improve asymptotic upper bounds, especially for \(d=2\) and \(d=3\), exploiting the sparseness of minimally rigid graphs, closing the gap between upper bounds and experimental results. We would like to examine aspects of both extremal graph theory (for graph orientations) and permanent bounds of matrices with specific structure for this reason. Besides that, finding the minimal m-Bézout bound requires the computation of bounds up to all possible choices for a fixed \(K_d\). Thus, it would be convenient to find a method to select the \(K_d\) that attains the minimum without computing its bound. Regarding the exactness of the m-Bézout bound and the application of Bernstein's second theorem, the first priority would be a possible proof (or refutation) of Conjecture [\[con:delta\]](#con:delta){reference-type="ref" reference="con:delta"}. Another issue is to optimize this method using the appropriate tools. A first idea is to construct resultant matrices that exploit the multihomogeneous structure (see for example ). The rank of the matrix could indicate which zero evaluations have solutions for our systems. Last but not least, we would like to investigate a possible relation between planarity and tight upper bounds, especially in the case of Geiringer graphs.
{'timestamp': '2020-07-06T02:03:30', 'yymm': '2005', 'arxiv_id': '2005.14485', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14485'}
# Introduction Plasmonic lattices form a large class of optical metasurfaces. In recent years they gained great attention due to a combination of a simple for qualitative analysis design and unique optical properties. Hybrid photonic structures with inclusions of such lattices confine light and enhance light-matter interaction due to plasmonic resonances, whereas photonic counterpart provides high-quality resonances. These prerequisites lead to an application of such structures for sensing, light emission enhancement and routing, lasing, holography and many other purposes. Plasmonic lattices in homogeneous environments are well-known by specific non-typical lattice plasmon resonances (LPRs). LPRs are the modes associated with collective oscillations of individual nanoparticles coupled to each other by free photons propagating along the lattice. These resonances are unique since they potentially allow us to achieve very narrow lines in a plasmonic structure without the implementation of a photonic waveguide or any other high-\(Q\) dielectric resonator. Such resonances have been thoroughly investigated both theoretically and experimentally, powerful computational methods that can simplify their consideration have been developed. However, in most studies, only simple lattices have been considered. Recently, lattices with several particles in a cell attracted attention and were considered in a few studies. Nevertheless, there are still many promising designs of plasmonic lattices, particularly in homogeneous media, that are of great interest but have not been considered yet. In this paper, we consider a stack of two plasmonic lattices in a homogeneous environment. We study symmetries of their modes, observe Fabry-Perot resonances, show and explain the coupling of its lattice plasmon resonances and demonstrate that in some cases one of the hybridized LPRs arises exactly on the Rayleigh anomaly (RA). Such mode is narrower than a typical lattice resonance and is observed in a wide range of distances between lattices. Our results show that this effect can be efficiently used to set the resonance energy precisely since it is determined only by the structure period, which is a quantity most stably reproduced in an experiment. Although we do not provide a comprehensive classification of two-lattice structures and their modes, the presented techniques can be further applied to explore any similar structures. # Results and discussion Physical phenomena demonstrated in this article do not require a specific choice of materials and particles, so we consider simple square lattices of silver nanodiscs embedded in silica (\(\varepsilon_{\mathrm{SiO}_2}=2.1\)). Nanodiscs have radii of 30 nm, 20 nm height, and are described by Johnson&Christy optical constants. Period of the structure, \(a\), and thickness, \(H\), (see Fig. [\[fig:1\]](#fig:1){reference-type="ref" reference="fig:1"}) are varied along the study. Small plasmonic nanoparticles can be effectively described in the dipole approximation if their dimensions are much smaller than both the distance between them and wavelength of light. Such an approach has been developed and applied for plasmonic lattices in many papers and proved itself to be much faster than widespread finite element method (FEM) or finite-difference time-domain (FDTD). Concurrently, its high precision allows us to trust the results and use them for analysis of physical effects as well as for the design of optical devices. In this article all the calculations are conducted via the method developed by our group in recent papers, which allows to construct a scattering matrix of a plasmonic lattice in dipole approximation and integrate it in Fourier modal method (FMM) also known as Rigorous coupled-wave analysis (RCWA). In such representation, the interaction of any number of vertically-spaced lattices is easily accounted for by the calculation of their combined scattering matrix. At the same time, in order to provide an intuitive explanation of the demonstrated effects and interpretation of the results, here we apply the dipole model, which accounts for two spaced lattices as constituents of a single layer. Dipole moments of particles, \(\mathbf{P}\), in a certain cell can be found by an application of polarizability tensor, \(\hat{\alpha}\), to a background electric field acting on them: \[\begin{pmatrix} \mathbf{P}_1 \\ \mathbf{P}_2 \end{pmatrix} = \begin{pmatrix} \hat{\alpha} &0\\ 0&\hat{\alpha} \end{pmatrix}\begin{pmatrix} \mathbf{E}_1^{\mathrm{bg}} \\ \mathbf{E}_2^{\mathrm{bg}} \end{pmatrix},\] where indices \(1,2\) correspond to either upper or lower lattice. Dipole moments of particles in different cells are trivially connected with each other by Bloch's theorem. Taking into account that background field is a sum of an external electric field, \(\mathbf{E}^{0}\), of illuminating light and the field rescattered by neighboring particles of both lattices, we obtain the self-consistent system of equations: \[\begin{pmatrix} \mathbf{P}_1 \\ \mathbf{P}_2 \end{pmatrix}= \begin{pmatrix} \hat{\alpha} &0\\ 0&\hat{\alpha} \end{pmatrix}\left[ \begin{pmatrix} \mathbf{E}_1^0 \\ \mathbf{E}_2^0 \end{pmatrix} + \begin{pmatrix}\hat{C}_{11}&\hat{C}_{12}\\\hat{C}_{21}&\hat{C}_{22}\end{pmatrix} \begin{pmatrix} \mathbf{P}_1 \\ \mathbf{P}_2 \end{pmatrix}\right],\] where \(\hat{C}\) blocks are lattice sums of dyadic Green's function also known as dynamic interaction constants. Diagonal blocks are associated with the self-action of lattices, and since the background environment is homogeneous they are equal in our case \(\hat{C}_{11}=\hat{C}_{22}\). Off-diagonal blocks correspond to an interaction of upper and lower lattices. It should be especially noted that off-diagonal blocks are not equal to each other, \(\hat{C}_{12}\neq\hat{C}_{21}\), and equality is achieved only under some specific conditions, which is discussed in supporting information. Due to the absence of a relative in-plane shift of two lattices and subsequent high symmetry of the considered structure (see Fig. [\[fig:1\]](#fig:1){reference-type="ref" reference="fig:1"}) the off-diagonal elements of all the \(\hat{C}\) blocks vanish for normally incident light (\(\mathbf{k}_\parallel=0\)) (see supporting information). This means that the \(x\), \(y\), and \(z\)-polarized solutions get separated in terms of both dipole moments and incident light. Hence, the \(z\) component of the dipole moment can not be excited by normally incident light. Concurrently, \(x\) and \(y\)-polarized solutions are equivalent to each other which allows us to consider only \(x\) polarization without loss of generality: \[\begin{gathered} \begin{pmatrix} P_1^x \\ P_2^x \end{pmatrix}= \begin{pmatrix} \alpha_{xx} &0\\ 0&\alpha_{xx} \end{pmatrix}\times\\\left[ \begin{pmatrix} E_1^{0x} \\ E_2^{0x} \end{pmatrix} + \begin{pmatrix}C^{xx}_{11}&C^{xx}_{12}\\C^{xx}_{21}&C^{xx}_{11}\end{pmatrix} \begin{pmatrix} P^{x}_1 \\ P^{x}_2 \end{pmatrix}\right]. \end{gathered}\] The fact that \(C_{12}^{xx}=C_{21}^{xx}\) (see supporting information), makes the equations symmetric. In turn, such a symmetric system supports two modes corresponding to in-phase and antiphase dipole moment oscillations, which we denote by A and B subscripts. Further we refer to A and B modes as even and odd correspondingly. Appropriate choice of the basis makes the system diagonal: \[\begin{gathered} \begin{pmatrix} P_\mathrm{A} \\ P_\mathrm{B} \end{pmatrix}= \frac{\alpha_{xx}}{\sqrt{2}}\begin{pmatrix} E_1^{0x}+E_2^{0x} \\ E_1^{0x}-E_2^{0x} \end{pmatrix} +\\\alpha_{xx} \begin{pmatrix}C^{xx}_{11}+C^{xx}_{12}&0\\0&C^{xx}_{11}-C^{xx}_{12}\end{pmatrix} \begin{pmatrix} P_\mathrm{A} \\ P_\mathrm{B} \end{pmatrix}, \end{gathered}\] where \[\begin{aligned} \begin{pmatrix} P_\mathrm{A} \\ P_\mathrm{B} \end{pmatrix} &=\frac{1}{\sqrt{2}}\begin{pmatrix} 1&1\\1&-1 \end{pmatrix} \begin{pmatrix} P^{x}_1 \\ P^{x}_2 \end{pmatrix}. \end{aligned}\] Solution of this system gives us amplitudes of the modes in the explicit form: \[\begin{aligned} P_\mathrm{A}=\frac{E^{0x}_1(1+e^{ikH})/\sqrt{2}}{\alpha_{xx}^{-1}-(C^{xx}_{11}+C_{12}^{xx})},\label{eqn:dipmom1}\\ P_\mathrm{B}=\frac{E^{0x}_1(1-e^{ikH})/\sqrt{2}}{\alpha_{xx}^{-1}-(C^{xx}_{11}-C_{12}^{xx})},\label{eqn:dipmom2} \end{aligned}\] where \(k=k_0\sqrt{\varepsilon_{\mathrm{SiO}_2}}\) is the wavenumber in silica and the external incident light is assumed coming from above. It is important to emphasize that these expressions are strict in the framework of the dipole approximation. However, we derived them not to conduct computations and obtain the precise solution, but for qualitative analysis. As a first example, we consider the structure of \(a=395\) nm period and compute its spectra as a function of thickness, \(H\). Since ordinary lattice plasmons are observed in close vicinity of Rayleigh anomalies (RA) we consider energies near the first order RAs-\(\left<\pm1,0\right>\) and \(\left<0,\pm1\right>\). By means of our approach, we calculate \(\left|P_\mathrm{A}\right|\) and \(\left|P_\mathrm{B}\right|\) as they are most convenient for analysis (Fig. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"} (a-b)). There are lots of modes and peculiarities in these figures that we explain stepwise below. In the expressions for the modes amplitudes, (see Eqns. [\[eqn:dipmom1\]](#eqn:dipmom1){reference-type="ref" reference="eqn:dipmom1"},[\[eqn:dipmom2\]](#eqn:dipmom2){reference-type="ref" reference="eqn:dipmom2"}) numerators represent the effectiveness of incident light coupling to corresponding modes. They are periodic functions of \(H\) that oscillate between their maxima and zero. From the explicit expressions (Eqns. [\[eqn:dipmom1\]](#eqn:dipmom1){reference-type="ref" reference="eqn:dipmom1"},[\[eqn:dipmom2\]](#eqn:dipmom2){reference-type="ref" reference="eqn:dipmom2"}) we derive that amplitude of even mode A is zero for \(kH=\pi+2\pi n\) and amplitude of odd mode B for \(kH=2\pi n\), \(n\in \mathbb{N}\). In other words, when these conditions are satisfied, normally incident light is not able to excite one or another mode because of the symmetry mismatch. As we can see from Fig. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"} (a-b) thick green dashed lines, which correspond to these conditions indeed lay in a dark blue zone of no-excitation. Thin green lines are defined by the same formulas but correspond to the excitation maxima of complementary modes. When the photon energy matches the level of RA, its wavelength in silica is equal to the period of the structure (\(k=2\pi/a\)) by definition, which means that the intersection of thick green lines with a white dotted line of RA occurs at \(H=a/2+an\) or \(H=an\) depending on the symmetry. As the next step, we consider the hybridization of lattice plasmons. Taking into account the mode's parity and their proximity to RAs, one can easily obtain that the even lattice mode A (or odd lattice mode B) cannot be excited at \(H\approx200,600,\) and \(1000\) nm (or \(H\approx0,400,\) and \(800\) nm). However, these modes can be observed at thicknesses in between these values, which is confirmed by Fig. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"} (a-b). In Ref.  it was shown that in the case when both lattices lie in the same plane (\(H=0\)) and the relative in-plane shift between them tends to zero, \(x\)-components of diagonal and off-diagonal blocks \(C^{xx}\) are equal \(C^{xx}_{11}=C_{12}^{xx}\) in close vicinity of the first RA. However, since both of them diverge at RA and this divergence is due to harmonics propagating along the structure (\(k_z\approx0\)), this relation remains valid for \(H>0\) in some limits. Therefore, lattice sums add up in denominator for the A mode amplitude (Eqn. [\[eqn:dipmom1\]](#eqn:dipmom1){reference-type="ref" reference="eqn:dipmom1"}) and we observe the lattice plasmon in Fig. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"} (a) when the condition \(\mathrm{Re}\alpha_{xx}^{-1} = 2 C^{xx}_{11}\) is satisfied. Also, in this case, the sums diverge on RA and \(P_\mathrm{A}\) goes to zero exactly as in the case of a single lattice. However, much more interesting situation is observed for the odd mode B where the lattice sums cancel each other out, which means that in order to obtain meaningful results we should accurately account for their finite difference and finite contributions of other harmonics. Here we analyze analytical expressions to explain the most important effects. It is convenient to represent lattice sums in the vicinity of RA as a sum of diverging term (originating from diffraction harmonics of the first order) and the remaining part: \(C^{xx}_{11}=\frac{4\pi}{s}\frac{i k_0^2}{k_z} +\tilde{C}^{xx}_{11}\), \(C^{xx}_{12}=\frac{4\pi}{s}\frac{i k_0^2}{k_z}e^{i k_z H} +\tilde{C}^{xx}_{12}(H)\), where \(k_z=\sqrt{k^2-(2\pi/a)^2}\). What is important, \(\tilde{C}^{xx}_{11}\) is a smooth function of energy near RA and does not depend on \(H\) at all, whereas \(\tilde{C}^{xx}_{12}\) is smooth as well, but depend on \(H\). For relatively large thicknesses (more than 150-200 nm) this dependence is mostly determined by the zero order channel, which forces it to oscillate with a period of the wavelength in silica, which is close to the period of the structure, \(a\), near RA. In this way, denominator can be represented as follows: \[\begin{gathered} \alpha^{-1}_{xx}-C_{11}^{xx}+C_{12}^{xx}=\\ \alpha^{-1}_{xx}+\frac{4\pi}{s}\frac{i k_0^2}{k_z}(e^{i k_z H}-1)-\tilde{C}^{xx}_{11} +\tilde{C}^{xx}_{12}(H) \end{gathered}\] The main intrigue comes from the expression \((e^{i k_z H}-1)/k_z\) which is indeterminate on RA, which is easily resolved by an expansion in Taylor series: \[\begin{gathered} \alpha^{-1}_{xx}-C_{11}^{xx}+C_{12}^{xx}\approx\\ \alpha^{-1}_{xx}+\frac{4\pi}{s}\frac{i k_0^2}{k_z}(i k_z H-k_z^2 H^2/2)-\tilde{C}^{xx}_{11} +\tilde{C}^{xx}_{12}(H) = \\ \alpha^{-1}_{xx}-\frac{4\pi k_0^2}{s} H-\frac{4\pi k_0^2}{s} i k_z H^2/2-\tilde{C}^{xx}_{11} +\tilde{C}^{xx}_{12}(H) \label{eqn:9} \end{gathered}\] We see that divergent contributions compensate each other effectively for small thicknesses \(H\). The impact of the remaining smooth term \(-\tilde{C}^{xx}_{11} +\tilde{C}^{xx}_{12}(H)\) is not enough to change the behaviour of the structure and, therefore, we observe an ordinary wide line of localized plasmon resonance for \(H\) less than 200-250 nm (see Fig. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"} (b)). For slightly larger thicknesses, the linear term \(\frac{4\pi k_0^2}{s} H\) grows in such a way that at some moment it cancels out \(\alpha_{xx}^{-1}\) in the denominator of Eqn. [\[eqn:dipmom2\]](#eqn:dipmom2){reference-type="ref" reference="eqn:dipmom2"} and from \(H\approx200\) nm we observe bright yellow line of odd lattice plasmon right on the Rayleigh anomaly. The quadratic term in thickness \(-\frac{4\pi k_0^2}{s} i k_z H^2/2\) does not make any contribution when we consider energy of RA (\(k_z=0\)), however, it indicates that there should be a discontinuity of the energy derivative in this point. Moreover, jump of the derivative grows fast with thickness \(H\). As it will be shown further (see Fig. [\[fig:4\]](#fig:4){reference-type="ref" reference="fig:4"} (b-e)) this leads to strongly non-Lorentzian shapes of resonances. The common effect of the shape violation near RA was already considered for some other structures. Interestingly, this resonance is much narrower than conventional lattice plasmons. With the further increase of \(H\), the resonance condition on RA remains valid until approximately 350 nm, which is very close to the thick green line of no-excitation. When this resonance comes back after the intersection with this line it is shifted to the red zone as it should be in the regime of relatively weak coupling between two lattices. In the limit of a very large thickness, \(H\), there is no difference in energy of even, odd, and ordinary LPRs of a single lattice. The last type of resonance to be discussed is a Fabry-Perot-like one. Indeed, we observe several relatively narrow lines above the RA (see Fig. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"} (a,b)). In contrast with LPRs, which are mainly associated with photons having \(k_z\approx0\) and no phase difference between two lattices (\(\mathrm{Re}k_z H=0\)), these modes couple them by some sort of quantized photons. In order to understand their nature, we again analyze the denominators from Eqns. ([\[eqn:dipmom1\]](#eqn:dipmom1){reference-type="ref" reference="eqn:dipmom1"}-[\[eqn:dipmom2\]](#eqn:dipmom2){reference-type="ref" reference="eqn:dipmom2"}), but in slightly another way. It is obvious that symmetric and antisymmetric resonances arise when \(\alpha^{-1}_{xx}-C_{11}^{xx}\approx\pm C^{xx}_{12}(H)\). We again assume that interaction between lattices is mostly determined by the first diffraction harmonics \(C^{xx}_{12}\propto\frac{i}{k_z}e^{ik_z H}\) and, therefore, \(k_z H=-\pi/2 \pm \mathrm{arg} (\alpha^{-1}_{xx}-C_{11}^{xx})+2\pi n\). An expression \(\alpha^{-1}_{xx}-C_{11}^{xx}\) corresponds to a self-action of lattice. If we consider spectrum of the single lattice (see supporting information) then we will see that there is a peak of localized plasmon resonance in the energy range of 2.25-2.35 eV, which means that the phase of the considered expression is approximately \(-\pi/2\) in this range. Since \(k_x=2\pi/a\), even modes, which are associated with \(k_z H\approx \pi +2\pi n\) have the following \(H\)-dependence \(k=\sqrt{ \left({2\pi}/{a}\right)^2+\left({\pi+2 \pi n}/{H}\right)^2}\). For odd modes we have \(k_z H\approx 2\pi n\) and \(k=\sqrt{\left({2\pi}/{a}\right)^2+\left({2 \pi n}/{H}\right)^2}\) correspondingly. Although these estimations are rough-they are verified by the fact that corresponding thick magenta lines match with rigorously calulated resonances (see Fig. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"} (a,b)). It is worth noting that the first branches of this kind are better to associate with waveguide modes rather than Fabry-Perot ones due to the small phase difference. Also, it is interesting that only the zero phase shift provides us with both even and odd LPR modes. Amplitudes of even and odd modes are very convenient for analysis, however, in practice, we can observe only integral characteristics that provide us a compound of modes of all parities. For instance, the thickness-dependent extinction spectrum of normally-incident light (Fig. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"} (c)) shows that lattice plasmons of complementary symmetries, as well as Fabry-Perot modes, alternate each other with the thickness increase. We explained the origin of the resonances in this structure, but for further analysis, it is convenient to find energies of resonances as a function of structure parameters. Conventionally it is done by the search of poles of some response function (it would have been scattering matrix in our case) in the plane of complex energy. However, the most exciting odd (B-type) LPR, which attracts our attention has a non-Lorentzian shape when being located near RA and, therefore, can not be described by a single pole. In this work we do not go into detail of the correct representation of such resonances, but find eigenenergies just as local maxima of \(\left|P_\mathrm{A}(E)\right|\) and \(\left|P_\mathrm{B}(E)\right|\) functions. This approach allows us to easily plot the dependence of both LPR energies on the thickness for the same structure. From the Fig. [\[fig:3\]](#fig:3){reference-type="ref" reference="fig:3"} we see how localized surface plasmon resonance (LSPR) gradually transforms into odd lattice plasmon with the thickness increase. Moreover, we see that the peak of \(|P_\mathrm{B}|\) stands on RA not only for \(H\) in between approximately 200 and 350 nm, but also for smaller thicknesses. Indeed, there is also a small peak, which is not seen by eye, but exists. Blue and red lines of lattice plasmons of complementary parities indeed get closer with the rise of thickness and have the same energy for \(H \approx 900\) nm. Also, we clearly see the periodic oscillations of each resonance energy, which are due to the already discussed periodic behavior of \(\tilde{C}_{12}^{xx}(H)\). The presented calculations help us to understand the \(H\)-dependence of all the modes, including the odd B-type LPR. However, it is also important to explore how this mode behaves with the period variation. In order to do that we scan for periods and thicknesses simultaneously and plot the extinction of corresponding structures on RA (see Fig. [\[fig:4\]](#fig:4){reference-type="ref" reference="fig:4"} (a)). First of all, we see that there is a bright ridge, which corresponds to the resonant conditions of odd LPR. This ridge is cut by the thick green dashed lines \(H=a,2a\) that indicate the impossibility to excite odd modes as in Fig. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"} (b). The crosshatched region with a white edge in the upper-left part of the graph highlights the area of parameters for which the peak of \(\left|P_\mathrm{B}(E)\right|\) is right on the RA. Interestingly, the edge of this region acts as a crest of the ridge and separates the parameter space into two parts in such a way that half of the bright area corresponds to the peak of resonance on RA and the other half to the peak in its close vicinity. The shape of the bright ridge line can be easily estimated analytically. Indeed, since we consider energy of RA (\(E_{\mathrm{RA}}=\frac{h c }{a\sqrt{\varepsilon_{\mathrm{SiO}_2}}}\)) then \(k_z=0\) and, according to Eqn. [\[eqn:9\]](#eqn:9){reference-type="ref" reference="eqn:9"} resonant condition, which connects \(H\) and \(a\), has the following form: \[H=\frac{s}{4\pi k_0^2}\left(\alpha^{-1}_{xx}(E_\mathrm{RA})-\tilde{C}^{xx}_{11}(E_\mathrm{RA},a)+\tilde{C}^{xx}_{12}(E_\mathrm{RA},a,H)\right).\] We have already seen that smooth functions of energy and period \(\tilde{C}\) being added to the inverse polarizability tensor does not have significant impact on its behaviour. Therefore, in order to simplify our estimation we just omit them, but note that \(\tilde{C}^{xx}_{11}\) has nearly constant complex contribution to the value of \(H\) as a function of \(a\), whereas \(\tilde{C}^{xx}_{12}\) has periodic dependence of \(H\) which should make the dependence slightly oscillating. Taking into account that \(s=a^2\) and \(k_0^2 = 4\pi^2/a^2/\varepsilon_{\mathrm{SiO}_2}\) in this case, we obtain \[H(a)\approx \varepsilon_{\mathrm{SiO}_2}\frac{a^4}{16\pi^3}\alpha^{-1}_{xx}(\frac{hc}{\sqrt{\varepsilon_{\mathrm{SiO}_2}} a}).\] As we see from the Fig. [\[fig:4\]](#fig:4){reference-type="ref" reference="fig:4"} (a) red lines, which show both the estimation of the ridge position (real part) as well as it is width (imaginary part) indeed match the precise calculation. Moreover, we see that the discrepancy is well explained by the an unaccounted contribution of secondary terms \(\tilde{C}\). In order to provide a full picture, we compute extinction spectra for several structures, whose geometric parameters are indicated by markers in Fig [\[fig:4\]](#fig:4){reference-type="ref" reference="fig:4"} (a). The first group denoted by circles, which are located at the most bright part of the first \"hill\" of the ridge, is plotted in Fig [\[fig:4\]](#fig:4){reference-type="ref" reference="fig:4"} (b). The main peculiarity of this group is that they illustrate the case in which RA lays right onto the localized resonance and strongly deforms its shape. The green line shows the spectrum of the structure, whose parameters satisfy the relation \(H=a/2\), which means that even modes can not be excited and indeed, we observe only single odd resonance. Blue and red lines that have slightly different thicknesses \(H\) both demonstrate small peaks of even lattice modes in the red zone. As we can see from the inset all the lines have strongly non-Lorentzian shape and red line in contrast to the other ones have its peak slightly shifted to the red zone, which is in complete agreement with a relative position of the circles with respect to the white line of the ridge. The next group, depicted by squares, has the period, \(a\), of 395 nm, which corresponds to the structures considered in the Figs. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"} and [\[fig:3\]](#fig:3){reference-type="ref" reference="fig:3"}. From Fig. [\[fig:4\]](#fig:4){reference-type="ref" reference="fig:4"} (c) we see that in this case even LPRs are much more prominent and besides the two lines of lattice resonances we observe Fabry-Perot modes in the blue zone as well. Also, the extinction of the red line is strongly suppressed at the RA because of the vicinity of the green line of no-excitation. Diamonds correspond to such a period that odd modes excitation in the vicinity of RA is strongly suppressed. From the inset in Fig [\[fig:4\]](#fig:4){reference-type="ref" reference="fig:4"} (d) we see that there is no resonance at all for the green line (\(H=a\) in this case). The blue line peak is so small that it is not seen and the peak of the red one is slightly redshifted as it should be. Interestingly, the blue line in the vicinity of the RA has a step-like shape, which might be potentially applied for example in optical filtering. The last group of triangles corresponds to the second \"hill\" of the ridge. We see that in this case large thicknesses \(H\) result in the observation of several Fabry-Perot modes and very narrow lines of lattice modes due to their strong red shift far from the line of dissipative localized plasmon. Similar to the case considered in Fig [\[fig:4\]](#fig:4){reference-type="ref" reference="fig:4"} (b), the green line does not demonstrate the peak of the even lattice plasmon due to the specific relation of thickness and period, \(H=1.5a\). From the inset, we see that there is almost no significant difference between the lines near the RA. What is important, these calculations demonstrate that energy of very narrow resonances can be easily set to \(E_{\mathrm{RA}}\) by our approach. We hope that this unique property will be useful in problems, which require setting of high-\(Q\) resonances at predetermined positions. In this paper, we have considered the structure of a rather simple design. However, it has lots of degrees of freedom to be tuned for the achievement of the desired properties. For example, the relative in-plane shift of two lattices can interchange energies of even and odd modes or mix them. The choice of the shape and size of particles as well as the type of the lattice potentially allows to consider resonances with non-trivial polarization of dipole moments, demonstrate chiral and spin-orbit effects. Yet another way to go further in the exploration of plasmonic lattices is an increase of a number of particles in a cell or number of layers. Although it is a trivial step in terms of calculation, it can open exciting opportunities for light manipulation. # Conclusion {#conclusion .unnumbered} In this paper, we considered a stack of two plasmonic lattices and analyzed hybridized modes emerging in such structure. We showed that aside from localized plasmon it supports Fabry-Perot modes and lattice plasmons of different symmetries. Particularly, the demonstrated antisymmetric LPR is very untypical. It has a very high \(Q\)-factor for the given detuning from the line of LSPR. Moreover, it is located strictly on the Rayleigh anomaly for a wide range of structure parameters, which makes it possible to set the desired energy precisely by an appropriate period and independently choose its thickness from the wide range of accessible values. This unique property may be used either as an additional tuning parameter for optimization of the desired properties or as a protection against experimental errors. Also, it makes stacks of plasmonic lattices attractive for application in problems for which the precise positioning of resonant lines is crucial. In particular, one can employ them in light emission enhancement and routing, lasing from plasmonic structures, optical filtering.
{'timestamp': '2020-06-01T02:03:35', 'yymm': '2005', 'arxiv_id': '2005.14300', 'language': 'en', 'url': 'https://arxiv.org/abs/2005.14300'}