content
stringlengths
1
15.9M
\section{Introduction} The merger of binary neutron stars (NS) are believed to be important sources of gravitational waves (GW) to be detected by the advanced LIGO \citep{1992Sci...256..325A, 0264-9381-27-8-084006}, advanced VIRGO \citep{1748-0221-7-03-P03012}, and future gravitational wave detectors. NS mergers are also an important, if not dominant, contributor of rapid neutron capture ($r$-process) nucleosynthesis in the universe \citep{Lattimer&Schramm76,Symbalisty&Schramm82,Eichler+89,Freiburghaus+99}. The final outcome of a NS merger depends sensitively on the nuclear density equation of state (EoS) (e.g.~\citealt{Shibata&Taniguchi06}). If the mass of the NS binary is high and/or if the EoS is relatively soft, then the merger results in a massive NS remnant which usually collapses into a black hole on a relatively short timescale of tens of milliseconds or less (e.g.~\citealt{Bauswein&Stergioulas17}). If, on the other hand, the EoS allows a relatively large maximum non-rotating NS mass ($\gtrsim 2.3-2.4\,M_\odot$), then the merged core will create a long-lived supramassive NS (supported from immediate collapse even by its solid body rotation) or an indefinitely stable NS which never collapses (e.g. \citealt{2006Sci...311.1127D, Gao&Fan06,Metzger+08b,2010ApJ...724L.199O, 2012MNRAS.419.1537B, 2013ApJ...771L..26G, 2013ApJ...778...66K, MP14, 2015ApJ...812...24F, 2016ARNPS..66...23F, 2016arXiv161009381M,Ciolfi+17,Piro+17}). Due to the large angular momentum of the initial binary, any stable remnant NS will be rotating rapidly with an initial spin period close to the centrifugal break-up limit of $P_i \sim 1$~ms. The remnant will also possess an ultra-strong internal magnetic field $\gtrsim 10^{15}-10^{16}$ G, due rapid amplification of the initially weak field by Kelvin-Helmholtz instabilities during the merger (e.g.~\citealt{2006Sci...312..719P, 2013ApJ...769L..29Z,Kiuchi+15,2015ApJ...809...39G}) and the magneto-rotational instability (e.g.~\citealt{Siegel+13,Mosta+15,Guilet+16,Radice17}). The magnetar may also acquire a strong external dipole magnetic field $B \gtrsim 10^{13}-10^{15}$ G through magnetic buoyancy instabilities or via an efficient helical dynamo in the convective proto-magnetar \citep{1992ApJ...392L...9D}. A nearly maximally-spinning NS contains an enormous rotational energy reservoir of $\sim 10^{52}-10^{53}$ erg. A strong dipole magnetic field provides a mechanism to extract this energy in the form of a powerful magnetized wind (e.g.~\citealt{Thompson+04}). This wind emerges into the initially dense environment created by matter ejected promptly during the merger itself (e.g., \citealt{Hotokezaka+13,Sekiguchi+16}) and from the remnant accretion disk on a timescale of seconds (e.g.~\citealt{Fernandez&Metzger13,Metzger&Fernandez14,Just+15,Siegel&Metzger17}). The total ejecta mass of both components is typically $M_{\rm ej}\sim 10^{-2}-10^{-1}\,M_\odot$ (e.g.~\citealt{Wu+16}). At early times, this dense environment may collimate the magnetar wind into a bipolar jet \citep{2012MNRAS.419.1537B}, providing one explanation for the long-lived X-ray emission observed after some short gamma-ray bursts (GRB; \citealt{Metzger+08b,Rowlinson+13,Gompertz+15}). However, at later times, as the magnetar spins down, the weakening jet may become less stable, in which case a large fraction of its energy will instead be dissipated behind the ejecta by reconnection and shocks in the form of a pulsar wind nebula (PWN) \citep{MP14,Siegel&Ciolfi16a,Siegel&Ciolfi16b}. A millisecond magnetar also provides a promising site for accelerating particles to ultra-high energies \citep{1969PhRvL..22..728G,2016ApJ...826...97P}. A magnetospheric voltage drop of magnitude $\Phi_{\rm mag}\sim \mu\,\left(2\,\pi/P\right)^2/c^2=1.3\times10^{21}\,B_{14}\,P_{-3}^{-2}\,\rm V$ is produced across the open field lines that extend beyond the light cylinder located at $R_{\rm lc} = c/\Omega$, where $\mu \sim B\,R_*^3$ is the magnetic dipole moment, $B=10^{14}\,B_{14}\,\rm G$ is the strength of the surface magnetic field, $R_*\sim 10$~km is the NS radius, and $P=10^{-3}\,P_{-3}$~s is the spin period of the magnetar. An ion that taps a moderate fraction of this potential drop will reach ultrahigh energy (UHE; $E\geq10^{18}$~eV; \citealt{2000ApJ...533L.123B, Arons03}). Specifically, particle acceleration can occur as charged particles surf-ride in the magnetar wind with a velocity along the radial component of the electric field \citep{Arons03}, or by magnetic reconnection of the opposite open magnetic fluxes in the equatorial current sheet \citep{2014ApJ...785L..33P, 2014ApJ...795L..22C, 2015MNRAS.448..606C, 2016SSRv..tmp...84C}, or later by the wind termination shock \citep{2015JCAP...07..016L, 2015JCAP...08..026K}. Cosmic rays accelerated in the nascent magnetar nebula interact with ambient photons and baryons. For millisecond magnetars formed in normal core-collapse supernovae, the massive baryon envelope of the exploding progenitor star destroys particles accelerated at early times, significantly impacting the spectrum, flux, and chemical composition of the UHE cosmic rays (UHECR) that leak out of the nebula \citep{2012ApJ...750..118F, 2013JCAP...03..010F}. The interaction between cosmic rays and their surroundings produces charged pions that decay into high-energy neutrinos \citep{Murase09, Gao:2013ka, 2014PhRvD..90j3005F, 2015JCAP...06..004F} as well as neutral pions that decay into gamma rays \citep{2015ApJ...805...82M}. Magnetars formed in binary NS mergers are surrounded by orders of magnitude less mass than normal core collapse supernovae. However, a significant radiation field is still present as the result of non-thermal photons (X-ray) emitted by relativistic $e^\pm$ pairs in the nebula and thermal photons (optical/UV) emitted by the ionized ejecta \citep{MP14}. This radiation may lead to the production of TeV-PeV neutrinos and GeV photons, which follow the arrival of the gravitational wave chirp. The first detection of high-energy neutrinos was recently reported by the IceCube Observatory (\citealt{1242856}; \citealt{Halzen:2016ee} for a review). A diffuse flux of TeV-PeV neutrinos with an astrophysical origin is measured at the level of $\sim 10^{-8}\,\rm GeV^{-1}\,cm^{-2}\,s^{-1}\,sr^{-1}$ per-flavor \citep{2015arXiv151005223T}. No neutrino above 10 PeV has been detected \citep{2016PhRvL.117x1101A}, and no point source has been found in the 7-year data \citep{2017ApJ...835..151A}. The origin of these neutrinos remains a mystery \citep{2015AIPC.1666d0006M, Halzen:2016ee}. Multi-messenger searches by IceCube over past joint observational periods with LIGO and Virgo found no significant coincident events \citep{2014PhRvD..90j2002A}. The follow-up searches of gravitational wave events with ANTARES and IceCube are consistent with the expected background signal \citep{2016PhRvD..93l2010A, 2017arXiv170306298A}. General studies suggest that a joint search by advanced detectors is possible, although the chance of detection highly depends on specific source properties \citep{2011PhRvL.107y1101B, 2012PhRvD..85j3004B}. A template for the flux and light curve of neutrino emissions from merger products is timely and crucial for future searches. In this paper, we investigate the evolution of high-energy neutrino emission from a long-lived millisecond magnetar following a NS merger, by studying particle interaction with the thermal and non-thermal radiation field emitted by the magnetar nebula. We adopt the photon field model of \citet{MP14} which accounts for the evolution of the thermal and non-thermal radiation, and their coupling through absorption by the ejecta. Different from \citet{Gao:2013ka} which considers the secondary emission by particles accelerated in the shocked ejecta, we focus on a general scenario that cosmic rays accelerated in the magnetosphere confront a spherical hot nebula. We account for additional interaction and cooling channels of cosmic ray particles that were not considered in \citet{2016ApJ...826...97P}, which can crucially impact the high-energy emission of the merger remnant, as demonstrated by \citet{Murase09} in the case of magnetars formed in supernovae. The paper is organized as follows. In Section~\ref{sec:photonField} we describe the time evolution of the radiation of the magnetar nebula. The photon field is then used to calculate cosmic ray interaction in Section~\ref{sec:interaction}. We present the neutrino production from an individual merger event, as well as the integrated background signal from all-sky events, in Section~\ref{sec:results}. We discuss our results and conclude in Section~\ref{sec:discussion}. \section{Radiation Background}\label{sec:photonField} Magnetic spin-down is assumed to dissipate a large fraction of the magnetar's rotational energy to form a hot nebula behind the ejecta, similar to well-studied PWN like the Crab Nebula \citep{1984ApJ...283..694K} but in several ways more extreme. The nebula is composed of copious electron/positron pairs and non-thermal optical/UV/X-ray/$\gamma-$ray photons, due to a cascade of high-energy photons resulted from inverse Compton scattering of soft photons in the background ($e+\gamma\rightarrow e+\gamma$) and synchrotron emission in the nebula magnetic field, as well as electrons resulted from pair production of up-scattered photons ($\gamma+\gamma\rightarrow e^++e^-$). When the optical depth due to pair production is high at these early times (``compactness" parameter $\gg 1$), most gamma-rays produce pairs before they can escape the ejecta. Depending on the albedo of the ionized inner side of the ejecta, lower energy non-thermal UV/X-ray photons are either reflected back into the nebula, or absorbed and thermalized (see \citealt{Metzger+14} for a detailed discussion). As the ejecta expands with time, the optical depths of the nebula and ejecta decrease. Photons diffuse out of this environment, powering luminous optical/UV/X-ray emission (\citealt{Kotera+13,2013ApJ...776L..40Y,MP14,Siegel&Ciolfi16a,Siegel&Ciolfi16b, 2017arXiv170406276H}). At later times, as the ejecta becomes optically thin, the efficiency for thermalization decreases and the emission will become dominated by hard non-thermal X-ray/gamma-ray emission with a decreasing luminosity following the declining pulsar spin-down power. Following \citet{MP14}, the evolution of non-thermal radiation $E_{\rm nth}$ and thermal radiation $E_{\rm th}$ are approximately described by \begin{equation} \label{eqn:dE_nthdt} \frac{dE_{\rm nth}}{dt} = L_{\rm sd} -\frac{E_{\rm nth}}{R}\frac{dR}{dt} - (1 - {\cal{A}})\,\frac{E_{\rm nth}}{t_d^n}, \end{equation} \begin{equation} \label{eqn:dE_thdt} \frac{dE_{\rm th}}{dt} = (1 - {\cal{A}})\,\frac{E_{\rm nth}}{t_d^n} -\frac{E_{\rm th}}{R}\frac{dR}{dt} -\frac{E_{\rm th}}{t_d^{\rm ej}}. \end{equation} The first term on the right hand side of equation~\ref{eqn:dE_nthdt} is the magnetar's dipole spin-down power\footnote{Although we adopt the vacuum dipole expression for the spin-down rate, the expression for a force-free wind with an arbitrary inclination angle between the rotation and magnetic axes is identical to within a normalization factor of a few \citep{Spitkovsky06}.} \citep{1969ApJ...157.1395O}: \begin{eqnarray} L_{\rm sd} & =&\frac{4}{9}\frac{\mu^2\Omega^4}{c^3} \\ \nonumber &=& 2.6\times10^{47}\,B_{14}^2\,P_{i,-3}^{-4}\,\left(1+\frac{t}{t_{\rm sd}}\right)^{-2}\,{\rm erg\,s^{-1} }\\ \nonumber & \underset{t \gg t_{\rm sd}}=& 2.5\times10^{46}\, B_{14}^{-2}\,t_{5.5}^{-2}\,{\rm erg\,s^{-1}} \end{eqnarray} where $P_{i}=10^{-3}\,P_{i,-3}$~s is the initial spin period and \begin{equation} t_{\rm sd} \equiv \frac{E_{\rm rot}}{L_{\rm sd, 0}} = 1.4\times10^5 \,P_{i,-3}^2\,B_{14}^{-2}\,\rm s, \end{equation} is the initial spin-down time, where \begin{equation} E_{\rm rot} = \frac{1}{2} I \Omega_i^2 = 3.6\times10^{52}\,P_{i,-3}^{-2}\,\rm erg \end{equation} is the total rotational energy of a pulsar with assumed moment of inertia $I=2\,M_*\,R_*^2\,/5=1.8\times 10^{45}\,\rm g\,cm^2$, radius $R_{*} = 10$ km, and $M_{*} = 2.3M_{\odot}$. At $t = t_{5.5}\,10^{5.5}\,{\rm s}\gg t_{\rm sd}$, the spin-down luminosity scales as $\propto t^{-2}$ for a pulsar braking index of $3$ \citep{1969ApJ...157.1395O}. The energy deposited by magnetic spin-down is shared between three sinks: i) kinetic energy of the ejecta; ii) thermal emission; and iii) non-thermal emission. The second term in eqn.~\ref{eqn:dE_nthdt} and \ref{eqn:dE_thdt} describes the $PdV\sim (E/V)dV$ work done by the nebula on the ejecta, which causes the kinetic energy and mean ejecta velocity $v$ to increase according to \begin{equation} M_{\rm ej}v\frac{dv}{dt} = \frac{E_{\rm nth}}{R}\frac{dR}{dt} + \frac{E_{\rm th}}{R}\frac{dR}{dt} \label{eq:dvdt} \end{equation} and thus the mean ejecta radius to increase from its small initial value $R_0 \approx 100$ km according to \begin{equation} R = \int^{t} v dt' + R_0 \label{eq:R} \end{equation} As long as the spin-down time of the magnetar is sufficiently short (compared to the time required for the ejecta to become transparent), then to good approximation most of the rotational energy is used to accelerate the ejecta, in which case one has \begin{equation} \beta = \frac{v}{c} = \frac{1}{c}\left(\frac{2\,\int_0^t\,L_{\rm sd}dt'}{M_{\rm ej}} + v_{\rm 0}^2\right)^{1/2} \underset{t \gg t_{\rm sd}}\approx 1\,M_{\rm ej,-2}^{-1/2}\,P_{i,-3}^{-1} \label{eq:betaest} \end{equation} where $v_{\rm 0}\sim 0.1\,c$ is the initial ejecta velocity and \begin{equation} R \approx 9.5\times10^{15}\, \beta t_{5.5}\,\,\,\,{\rm cm}. \label{eq:Rest} \end{equation} We neglect special relativistic effects on the ejecta speed, which is not a terrible approximation as long as $M_{\rm ej} \gtrsim 10^{-2}M_{\odot}$, given many other (much larger) uncertainties in the formulation. Although we solve eqs.~(\ref{eq:dvdt},\ref{eq:R}) in our full numerical calculations, we employ eqs.~(\ref{eq:betaest},\ref{eq:Rest}) in our analytic estimates. As non-thermal UV/X-ray photons produced by the nebula reach the ejecta walls, a fraction $(1- {\cal {A}})$ experiences bound-free absorption and is ``reprocessed" to thermal radiation \citep{Metzger+14}. This process is described by the second loss term in eqn.~\ref{eqn:dE_nthdt} and the source term in eqn.~\ref{eqn:dE_thdt}, where $\cal{A}$ is the frequency-averaged ``albedo" of the ejecta walls. For simplicity we assume ${\cal{A}}=0$ (perfectly absorbing walls), which may be a reasonable approximation at UV/soft X-ray frequencies given the expected ionization parameter at times of interest \citep{MP14}. However, our results do not depend qualitatively on this assumption as long as $\cal{A} \ne$ 1, and this approximation can be improved by a more detailed calculation of the ejecta ionization structure in future work. The timescale for a photon to diffuse from the center of the nebula of size $\sim R$ to the inner edge of the ejecta (where it is absorbed or reflected) is given by \begin{equation} t_d^n \approx \frac{R}{c}\left(1+\tau_{\rm es}^n\right), \label{eq:tdn} \end{equation} where $\tau_{\rm es}^n = n_{\pm}\sigma_T\,R $ is the Thomson optical depth across the nebula, $n_\pm$ is the pair density in the nebula, and $\sigma_T$ is the Thomson cross section. At early times, the high compactness parameter of the PWN, $\ell= E_{\rm nth}\,\sigma_T\,R/(V\,m_e\,c^2)=15.3\,B_{14}^{-2}\,t_{5.5}^{-3}\,\beta^{-2}$, results in copious pair production from $\gamma\gamma$ interactions. The pair number density $n_\pm$ is estimated by assuming a balance between the pair creation rate, $\dot{N_\pm^+} = YL_{\rm sd} / (m_e\,c^2)$, and the pair annihilation rate, $\dot{N_\pm^-} = (3/16)\,\sigma_T\,c\,n_\pm\,N_\pm$, where $Y\approx 0.1$ is the pair multiplicity in a saturated state \citep{1987MNRAS.227..403S}.\footnote{The pair cascade resides in a saturated state ($\ell\gg1$) until a time $\sim 10^6$~s for $B\sim 10^{14}$~G, thereby encompassing most epochs of relevance in this paper.} The optical depth is then $\tau_{\rm es}^n = \left(4\,Y\,L_{\rm sd}\,\sigma_T/\pi\,m_e\,c^3\,R\right)^{1/2}\approx 3.2\,B_{14}^{-1}\beta^{-1/2}t_{5.5}^{-3/2}$. Radiation travels freely through the nebula (without experiencing significant adiabatic losses) when the diffusion time is less than the ejecta expansion timescale, $t = R/\beta c$. From eq.~\ref{eq:tdn}, this occurs after a time \begin{equation} t_{d,0}^n = 7.5\times10^5\,B_{14}^{-2/3}\beta^{1/3}\,\rm s, \end{equation} or equivalently when $\tau_{\rm es}^n \le \beta^{-1}$. The optical depth of the nebula can therefore be convenientily re-expressed as $\tau_{\rm es}^n = \beta^{-1}\,\left(t/t_{d,0}^n\right)^{-3/2}$. The fraction $\left(1-\cal{A}\right)$ of the non-thermal radiation which is absorbed by the ejecta and reprocess is described by the last term in eqn.~\ref{eqn:dE_thdt}. The photon diffusion time through the ejecta is given by \begin{equation} t_d^{\rm ej} \approx \frac{R}{c}\left(1+\tau_{\rm es}^{\rm ej} \right), \end{equation} where $\tau_{\rm es}^{\rm ej} = {3M_{\rm ej}\kappa}/{4\pi R^2}$ is the optical depth and $\kappa\sim 0.2-1\,\rm cm^2\,g^{-1}$ is the scattering/line opacity of the ejecta at optical/UV frequencies, which depends on the composition and ionization state of the ejecta (e.g.~\citealt{2000ApJ...530..757P,Kasen+15,Wollaeger+17}).\footnote{Given substantial neutrino irradiation of the disk wind ejecta in the case of a long-lived NS remnant, most of the ejecta is composed of Fe-group nuclei or light $r$-process nuclei \citep{Metzger&Fernandez14,Lippuner+17}. } As in the case of the nebula, photons can freely escape the ejecta once $t_d^{\rm ej} \le R/\beta c$, i.e.~after a timescale \begin{equation} t_{d,0}^{\rm ej} = 3.3\times10^4\, M_{-2}^{1/2}\left(\frac{\kappa}{0.2\,\rm cm^2\,g^{-1}}\right)^{1/2}\beta^{-1/2}\,\rm s. \end{equation} The optical depth $\tau_{\rm es}^{\rm ej}$ can be expressed as $\tau_{\rm es}^{\rm ej} =\beta^{-1}\, \left(t/t_{d,0}^{\rm ej}\right)^{-2}$. The dominant loss terms in equation (\ref{eqn:dE_nthdt}) change with time. At early times ($t\ll t_{d,0}^{n\,(\rm ej)}$), the kinetic term dominates the energy loss, while at late times ($t\gg t_{d,0}^{n\,(\rm ej)}$), non-thermal (thermal) emission is more important. Assuming instantaneous balance between the loss and source terms in eqn.~\ref{eqn:dE_nthdt}, one obtains the following approximate solution (\citealt{MP14}) \begin{eqnarray}\label{eqn:Enth} E_{\rm nth} &=& \begin{cases} L_{\rm sd}\,t & t \ll t_{d,0}^{n} \\ L_{\rm sd}\,t_{d,0}^n\,\left( {t}/{t_{d,0}^n}\right)^{-1/2} & t\gg t_{d,0}^n\end{cases} \\ E_{\rm th} &=&\begin{cases} L_{\rm sd}\,t_{d,0}^n\,\left(t/t_{d,0}^n\right)^{5/2}, & t \ll t_{d,0}^{\rm ej} \\ \nonumber L_{\rm sd}\,t\,t_d^{\rm ej}/t_d^{n}, & t_{d,0}^{\rm ej} \ll t\ll t_{d,0}^{\rm n} \\ L_{\rm sd}\,t_{d,0}^{\rm ej}\,\left(t/t_{d,0}^{\rm ej}\right)^{-1}, & t\gg t_{d,0}^n, \end{cases} \end{eqnarray} where we have assumed that $\chi \equiv t_{\rm d,0}^{\rm n} / t_{\rm d,0}^{\rm ej} = 22.7\,B_{14}^{-2/3}\,\beta^{5/6}\,M_{-2}^{-1/2} > 1$. As shown in Section~\ref{sec:interaction}, the time interval $t_{d,0}^{\rm ej} \ll t \ll t_{d,0}^n$ is most relevant epoch to particle interaction, during which time we have \begin{eqnarray} E_{\rm nth}&=& 6.1\times10^{51}\,B_{14}^{-2}\,t_{5.5}^{-1}\,\rm erg,\\ E_{\rm th} &=& 5.1\times10^{50}\,B_{14}^{-1}\,\beta^{1/2}\,t_{5.5}^{1/2}\,\rm erg. \end{eqnarray} These expressions will prove useful in our analytic estimates below. \begin{figure} \includegraphics[width=\linewidth] {n_photon.pdf} \caption{\label{fig:n_photon} Number densities of thermal photons, non-thermal photons, and baryons of the ejecta, from a stable millisecond magnetar as a function of time since the merger. Results are shown for a magnetar with initial rotation period $P=1\,\rm ms$ and surface magnetic field $B=10^{14}\,\rm G$. The photon number densities of non-thermal (thick blue line) and thermal (thin red line) radiation fields are computed by solving equations~\ref{eqn:dE_nthdt}, \ref{eqn:dE_thdt}, and \ref{eq:dvdt} numerically and integrating photon energy distribution over all frequencies. The dotted black line shows the average number density of baryons in the ejecta, computed from equation~\ref{eqn:np}, which is notably much lower than in the case of magnetars formed in supernovae. Characteristic times are marked for reference with vertical lines, including the spin-down time $t_{\rm sd}$, and the time after which photons diffuse freely through the ejecta ($t_{d,0}^{\rm ej}$) and nebula ($t_{d,0}^n$) without substantial adiabatic losses. } \end{figure} Thermal photons in the nebula have a temperature $T_{\rm th} = \left({E_{\rm th}}/{V a}\right)^{1/4}$ and number density \begin{eqnarray}\label{eqn:nth} n_{\rm th} &\sim & \frac{E_{\rm th}}{V\,k_B\,T_{\rm th}} \approx 1.1\times10^{14}\,B_{14}^{-3/4}\,\beta^{-15/8}\,t_{5.5}^{-15/8}\,\rm cm^{-3} , \nonumber \\ \end{eqnarray} where $a$ is the radiation constant. We assume that non-thermal photons follow a spectrum $n(\varepsilon) \propto \varepsilon^{-2}$ from the thermal bath energy $\varepsilon_{\rm min}\sim 3\,k_B\,T_{\rm th}$ to the pair creation threshold $\varepsilon_{\rm max}\sim 2\,m_e c^2\sim 1\,\rm MeV$ \citep{1987MNRAS.227..403S}. The number density can be estimated as \begin{eqnarray}\label{eqn:nnth} n_{\rm nth} &\sim& \frac{E_{\rm nth}}{V\,\varepsilon_{\rm min}\,\ln\left(\varepsilon_{\rm max}/\varepsilon_{\rm min}\right)} \\ \nonumber &=&3.3\times10^{13}\,B_{14}^{-7/4}\,t_{5.5}^{-27/8}\,\beta^{-19/8}\,\rm cm^{-3}. \end{eqnarray} The $\varepsilon^{-2}$ spectrum is motivated by observation of pulsar wind nebulae (e.g., \citealt{0004-637X-682-2-1166}). In practice, the non-thermal spectrum will be more complicated than we have assumed. Relativistic leptons in the nebula can up-scatter both soft photons from the background (external inverse Compton) and the photons from their own synchrotron emission (synchrotron self-Compton). Depending on the acceleration mechanism, the intrinsic spectrum of leptons could follow a broken power law. More dedicated study taking into account these effects finds a $\gamma$-ray spectrum comparable or slightly softer than $\varepsilon^{-2}$ (e.g., \citealt{2015ApJ...805...82M}). In our fiducial model, the density of thermal photons exceeds that of non-thermal photons at times most relevant to neutrino production, justifying moderate uncertainty in the non-thermal spectrum for our purposes. The baryon density in the ejecta is given by \begin{equation}\label{eqn:np} n_p=\frac{M_{\rm ej}}{V\,m_p} = 4.2\times10^6\,M_{\rm ej,-2}\,t_{5.5}^{-3}\,\beta^{-3}\,\rm cm^{-3}, \end{equation} which, due to the small ejecta mass and high velocity, is substantially lower than in the supernova case. Figure~\ref{fig:n_photon} summarizes the number densities of the hadron and radiation backgrounds. Solid lines show the density of thermal (thin red) and non-thermal (thick blue) photons, as computed by solving equations~\ref{eqn:dE_nthdt} and \ref{eqn:dE_thdt} and integrating the photon energy distribution over all frequencies. Note that at times $\gtrsim 10^5$~s, the density of thermal photons exceeds that of non-thermal photons. Finally, the nebula is strongly magnetized. The magnetic energy, $E_B = (B^2/8\,\pi)V$ evolves according to \begin{eqnarray} \frac{dE_B}{dt} = \epsilon_B\,L_{\rm sd} - \frac{E_B}{R}\,\frac{dR}{dt}, \end{eqnarray} where the nebula magnetization $\epsilon_B\sim10^{-2}$ is motivated by observations of PWN such as the Crab Nebula (e.g, \citealt{1984ApJ...283..694K}) and the final term assumes the magnetic field is tangled and isotropic, such that it behaves effectively as a $\gamma = 4/3$ gas. The magnetic field strength can be estimated by \begin{equation}\label{eqn:B_neb} B_{\rm n} \approx \left(\frac{8\pi\epsilon_B L_{\rm sd}t}{V}\right)^{1/2} \simeq 24.7\,\epsilon_{B,-2}^{1/2}\,B_{14}^{-1}\,\beta^{-3/2}\,t_{5.5}^{-2}\,\rm G. \end{equation} \section{Particle Interaction}\label{sec:interaction} \subsection{Particle Acceleration} Ions extracted from the NS surface gain energy by crossing open field lines in the pulsar magnetosphere. A cosmic ray particle with charge Z can be accelerated to \begin{eqnarray}\label{eqn:ECR} E_{\rm CR} = \eta\,Z\,e\,\Phi_{\rm mag} = 4.1\times10^{19}\,Z\,\eta_{-1}\,t_{5.5}^{-1}\,B_{14}^{-1}\,\rm eV \nonumber \\ \end{eqnarray} where $\eta=0.1\,\eta_{-1}$ is the acceleration efficiency, which can be interpreted as the fraction of the open-field voltage that particles experience on average. The charge density demanded by the electromagnetic field, $\rho_{\rm GJ} = -{\bf\Omega}\cdot{\bf B} / 2\pi c$ (the so-called Goldreich-Julian density; \citealt{JGR:JGR4198, Goldreich69}), serves as a reasonable measure of the ion density \citep{Arons03}. The cosmic ray production rate is \begin{equation}\label{eqn:dN_CRdt} \dot{N} = \frac{ \rho_{\rm GJ} } {Z e} \,2 A_{\rm pc} c = 8.5\times10^{37}\,B_{14}^{-1}\,Z^{-1}\,t_{5.5}^{-1}\,\rm s^{-1}, \end{equation} where $A_{\rm pc} = \pi\,R_*^2\,\left(R_*/{R_{\rm lc}}\right)$ is the size of the polar cap. Combining eqns.~\ref{eqn:ECR} and \ref{eqn:dN_CRdt} we obtain the injection spectrum of cosmic rays: \begin{equation} \frac{dN}{dE} = \frac{9}{8}\frac{c^2\,I}{Z\,e\,\mu}\,\frac{1}{E} = 3.9\times10^{43}\,Z^{-1}\,E^{-1}\,B_{14}^{-1}. \end{equation} Notice that the pulsar spin-down results in a very hard $E^{-1}$ spectrum. The acceleration is expected to occur promptly as particles travel across the potential gap. \subsection{Interaction Rates of Cosmic Rays} \begin{figure}[h] \centering \epsfig{file=t_proton.pdf,width=0.49\textwidth} \caption{\label{fig:t_proton} Cooling timescales of cosmic ray protons as a function of time since the merger. Quantities shown include the time for photomeson interaction with thermal (dashed red) and non-thermal (solid blue) radiation fields (equation~\ref{eqn:t_pgamma}), hadronuclear interaction with the ejecta baryons (dotted brown; equation~\ref{eqn:t_pp}), cooling due to the synchrotron emission (dash-dotted green; equation~\ref{eqn:t_p_IC}), and the light crossing time $t_{\rm cross}$ (solid black). } \end{figure} Accelerated particles possess Larmor radii $r_L =E/Z\,e\,B_n$ which are comparable to the total size of the nebula, $r_L/R = 0.6\,\eta_{-1}\,\beta^{1/2}\,\epsilon_{B,-2}^{-1/2}$. As the coherence length of a turbulent magnetic field is typically a fraction of the size of the magnetized region \citep{2009ApJ...705L..90C}, the particle Larmor radius is expected to be larger than the coherence length of the field. Cosmic rays will therefore propagate in a semi-linear fashion through the nebula on the light crossing time $t_{\rm cross}\sim R/c = 10^{5.5}\,t_{5.5}\,\beta^{-1}\,\rm s$. During its propagation, a cosmic ray experiences three major cooling processes. It interacts with i) the nebular radiation via photonuclear interaction, and ii) ejecta baryons via hadronuclear interaction. These two processes lead to the production of neutral and charged mesons, $p+\gamma (p)\rightarrow p + \pi^{\pm,0}$ \citep{1990acr..book.....B}. In addition, cosmic rays cool by radiative processes through iii) synchrotron radiation in the nebular magnetic field; this significantly suppresses the neutrino production at early times. Notice that as $\sqrt{E_p\,\varepsilon_{\rm th}}\gg m_p\,c^2$, the inverse Compton process of an UHE proton is suppressed due to the Klein-Nishina effect and hence is negligible \citep{1979rpa..book.....R}. A proton with Lorentz factor $\gamma_p$ interacts with the photon field of spectrum $n(\varepsilon)=dn/d\varepsilon$ on a characteristic timescale given by \begin{eqnarray}\label{eqn:t_pgamma} t_{p\gamma,\,\rm int}^{-1} = \frac{c}{2\gamma_p^2}\,\int_0^\infty\,d\varepsilon\,\frac{n(\varepsilon)}{\varepsilon^2}\,\int_0^{2\,\gamma_p\,\varepsilon}\,d\varepsilon'\,\varepsilon'\,\sigma_{p\gamma}(\varepsilon'), \end{eqnarray} where $\sigma_{p\gamma} $ is the cross section of photopion production, which is $\sim 5\times10^{-28}\,\rm cm^2$ \citep{2004PhLB..592....1E} at the $\Delta-$resonance, and $\sim1.6\times10^{-28}\,\rm cm^{-2}$ above the resonance. The cooling time is $t_{\,p\gamma} = t_{p\gamma,\,\rm int}/ \kappa_{p\gamma} $, where $\kappa_{p\gamma}\sim 0.15$ is the average fraction of energy lost from a proton per collision (the ``elasticity"). The cooling time due to photomeson interaction with non-thermal and thermal fields can be roughly estimated as $t_{p\gamma}\sim \left(n_\gamma\,\sigma_{p\gamma}\,\kappa_{p\gamma}\,c\right)^{-1}$, which for the thermal and non-thermal photon densities (eqs.~\ref{eqn:nth},\ref{eqn:nnth}) is given by \begin{eqnarray}\label{eqn:t_pg_nth} t_{p\gamma,\,\rm th} &=& 1.3\times10^{4}\,t_{5.5}^{15/8}\,B_{14}^{3/4}\,\beta^{15/8}\,\rm s \\ t_{p\gamma,\,\rm nth} &=& 4.2\times10^{4}\,t_{5.5}^{27/8}\,B_{14}^{7/4}\,\beta^{19/8}\,\rm s \end{eqnarray} Due to the low ejecta density (eq.~\ref{eqn:np}), the timescale for hadronuclear interaction is by comparison longer, \begin{equation} \label{eqn:t_pp} t_{pp} = \left(n_p\,\sigma_{pp}\,\kappa_{pp}\,c\right)^{-1} = 1.6\times10^8\,M_{\rm ej,-2}^{-1}\,t_{5.5}^3\,\beta^3\,\rm s, \end{equation} where $\sigma_{\rm pp}\sim 10^{-25}\,\rm cm^2$ (at around $10^{18}$~eV) and $\kappa_{\rm pp}\sim 0.5$ \citep{2004PhLB..592....1E}. Photopion and hadronuclear interactions lead to the creation of charged pions, which decay into neutrinos \citep{1990acr..book.....B}. The total pion creation rate is given by \begin{equation} t^{-1}_{\pi,\rm cre} = t_{p\gamma,\,{\rm th}}^{-1} + t_{p\gamma,\,{\rm nth}}^{-1} + t_{pp}^{-1} \end{equation} Pion production must compete with synchrotron cooling of the proton, which occurs on a timescale \begin{eqnarray}\label{eqn:t_p_IC} t_{p,\,\rm rad} &=& \frac{3\,m_p^3\,c}{4\,\sigma_T\,m_e^2\,\gamma_p\,u_B} \\ \nonumber &=&1.8\times10^5\,\eta_{-1}^{-1}\,t_{5.5}^5\,B_{14}^3\,\beta^3\,\epsilon_{B,-2}^{-1}\,\rm s, \end{eqnarray} where we have used equation (\ref{eqn:B_neb}) to estimate the nebular magnetic field. Pion creation also effectively ceases once the formation timescale exceeds the age of the source, $t_{\pi,\,\rm cre} \ge t_{\rm cross}$. Combining the effects described above, pion creation is effectively suppressed by a factor \begin{equation} f_{\rm sup}^p = \max(1, \frac{t_{\rm cross}}{t_{\pi,\rm cre}}, \frac{t_{\rm p,rad}}{t_{\pi,\rm cre}}). \end{equation} Figure~\ref{fig:t_proton} compares the proton cooling time of different processes as a function of time since the merger. At the earliest times, all cooling processes are much shorter than the nebula crossing time. Radiative cooling (green line) dominates at early times, suppressing pion production. However, this gives way to photopion interaction with thermal photons at $t \gtrsim 10^{5.5}$ s. Then, at late times $t \gtrsim 2\times10^6\,\rm s$, the radiation field becomes too dilute to interact with protons accelerated by the pulsar, and the window of pion (and thus neutrino production) closes. \subsection{Interaction Rates of Pions and Muons} \begin{figure}[h] \centering \epsfig{file=t_pi.pdf,width=0.49\textwidth} \caption{\label{fig:t_pi} Lifetime of pions (thick lines) and muons (thin lines) in the lab frame (solid black), compared to their characteristic cooling time due to hadronuclear interaction with the ejecta baryons (dotted brown; equation~\ref{eqn:t_xp}) and synchrotron radiation in the nebula (dash-dotted green; equation~\ref{eqn:t_x_rad}). } \end{figure} Charged mesons created by photopion and hadronuclear interactions decay into neutrinos via $\pi^\pm \rightarrow \mu^\pm + \nu_\mu(\bar{\nu}_\mu)\rightarrow e^\pm + \nu_e (\bar{\nu}_e)+\nu_\mu+\bar{\nu}_\mu$. The neutrino production competes with the radiative and hadronic cooling of the mesons and muons. The latter occur at a rate \begin{equation} t_{x,\,\rm c}^{-1} = t_{x p}^{-1} + t_{x,\rm rad}^{-1}, \end{equation} where $x$ denotes either $\pi$ or $\mu$, \begin{equation}\label{eqn:t_xp} t_{x p} = \left(n_p\,\sigma_{x p}\,\kappa_{x p}\,c\right)^{-1} \end{equation} is the hadronic cooling rate due to interaction with the ejecta baryons, and \begin{eqnarray} \label{eqn:t_x_rad} t_{x,\,\rm rad} = \frac{3\,m_x^4\,c^3}{4\,\sigma_T\,m_e^2\,E_x\,u_B} \end{eqnarray} is the energy loss time due to synchrotron radiation. The relevant time scales for pions and muons are shown in Fig.~\ref{fig:t_pi}. Synchrotron emission dominates the energy loss until $\sim 10^{5.5}$~s for pions and $\sim10^6$~s for muons. These cooling processes can be accounted for by introducing a second suppression factor on the neutrino production rate of the form, \begin{equation} f_{\rm sup}^x = \min \left(1, \frac{t_{x,\rm c}} {\gamma_x\,\tau_x} \right) \end{equation} This quantifies the fact that neutrinos are efficiently produced only if the decay time of a pion or muon is shorter than its cooling time. The suppression factor can be estimated analytically as \begin{eqnarray}\label{eqn:t_pi} f_{\rm sup}^\pi &=& 0.3 \, \eta_{-1}^{-2}\,B_{14}^4\,\beta^3\,\epsilon_{B,-2}^{-1}\,t_{5.5}^6\\ f_{\rm sup}^\mu &=& 1.5\times10^{-3}\, \eta_{-1}^{-2}\,B_{14}^4\,\beta^3\,\epsilon_{B,-2}^{-1}\,t_{5.5}^6 \end{eqnarray} where $\sigma_{\pi p} = 5\times10^{-26}\,\rm cm^2$, $\kappa_{\pi p}\sim0.8$, $\tau_\pi =2.6\times10^{-8}\,\rm s$, $\sigma_{\mu p} = 2\times10^{-28}\,\rm cm^2$, $\tau_\mu =2.2\times10^{-6}\,\rm s$ \citep{2004PhLB..592....1E}, and taking $E_\pi\sim 0.2\,E_p$ as the average ratio of pion energy to its parent proton energy in photopion production. Because the mean lifetime of a muon exceeds that of a pion by a factor of $\sim$100, muons almost immediately experience radiative cooling before decaying into secondary neutrinos. \section{Neutrino Production}\label{sec:results} \subsection{Individual sources} \begin{figure}[h!] \centering \epsfig{file=fluenceE.pdf,width=0.49\textwidth} \caption{\label{fig:fluence} All-flavor fluence of high-energy neutrinos from a stable millisecond magnetar on timescales from an hour to a year (solid lines) after the merger. The fiducial magnetar model assumes an initial spin period $P_{i} = 1$ ms, surface dipole magnetic field $B=10^{14}$ G, ejecta mass $M_{\rm ej}=0.01\,M_\odot$, and source distance $D = 10$ Mpc. The black dash-dotted line indicates the 90\% sensitivity of IceCube for a time-integrated search of point-like sources with one year of operation \citep{2017ApJ...835..151A} (which is comparable to its time-dependent sensitivity for a transient source with week-long duration; \citealt{Aartsen:2015jx}). The grey dashed line shows the estimated point-source sensitivity of ARA \citep{2012APh....35..457A} (or ARIANNA; \citealt{2015APh....70...12B}) from an one-year time-integrated search. } \end{figure} \begin{table*}[t] \caption{Summary of characteristic timescales} \label{table:timescales} \centering \begin{tabular}{ccc} \hline\hline time symbol \T & value [s] at $t_{\rm sd} \ll t \ll t_{d,0}^n$ & description \B \\ \hline $t_{d,0}^{\rm ej} \T $ & $3.3\times10^4\, M_{-2}^{1/2}\,\beta^{-1/2}$ & time after which photons escape the ejecta freely \\ $t_{\rm sd}$ & $1.4\times10^5 \,P_{i,-3}^2\,B_{14}^{-2}$ & spin-down time \\ $t_{\rm sup,\,0}^p$ & $1.4\times10^5\,\eta_{-1}^{8/25}\,B_{14}^{-18/25}\,\beta^{-9/25}\,\epsilon_{B,-2}^{8/25}$ & time when an efficient photopion production starts \\ $t_{\rm sup,\,0}^\pi$ & $3.9\times10^5\,\eta_{-1}^{1/3}\,B_{14}^{-2/3}\,\beta^{-1/2}\,\epsilon_{B,-2}^{1/6}$ & time when $\pi$s decay \\ $t_{d,0}^{n} \T $ & $7.5\times10^5\,B_{14}^{-2/3}\beta^{1/3}$ & time after which photons escape the nebula freely \\ $t_{\rm sup,\,0}^\mu$ & $9.3\times10^5\,\eta_{-1}^{1/3}\,B_{14}^{-2/3}\,\beta^{-1/2}\,\epsilon_{B,-2}^{1/6}$ & time when $\mu$s decay \\ $t_{\pi, 0} $ \T& $1.2\times10^7\,\beta^{-23/7}\,B_{14}^{-6/7}$ & time when neutrino production stops \B \\ \hline \end{tabular} \end{table*} Neutrino production is delayed until charged pions are both produced efficiently and avoid being cooled radiatively before decaying. The former occurs first, after the pion production rate exceeds the proton cooling timescale once $t_{\rm sup,\,0}^p \equiv t\left(t_{p,\,\rm rad} = t_{\pi,\,\rm cre}\right)$. However, radiative cooling of the pions prevents neutrino production until somewhat later, once $t_{\rm sup,\,0}^\pi \equiv t\left(t_{\pi,\,\rm rad} = \gamma_\pi\,\tau_\pi\right)$. At yet later times, muons obey the same decay timescale condition and thus also contribute to neutrino production; this happens after $t_{\rm sup,\,0}^\mu \equiv t\left(t_{\mu,\,\rm rad} = \gamma_\mu\,\tau_\mu\right)$. Neutrino production effectively ceases once the creation process freezes out, as occurs after the time $t_{\pi,0}\equiv t\left (t_{\pi,\,\rm cre} = t_{\rm cross}\right)$. Substantial high energy neutrino production is therefore typically limited to a window of hours to weeks following the merger. These characteristic timescales, as well as other important timescales in the problem, are summarized in Table~\ref{table:timescales}. The neutrino flux can be estimated by \begin{eqnarray} E_\nu^2\,\frac{dN_\nu}{dE_\nu} = E_{\rm CR}^2\,\frac{dN_{\rm CR}}{dE_{\rm CR}} \,\frac{f_{\rm sup}^p}{2}\,f_{\rm sup}^\pi\left(\frac{1}{4} + \frac{1}{2}\,f_{\rm sup}^\mu\right).\nonumber \\ \end{eqnarray} The first $1/2$ factor results because charged pions are produced in a $p\gamma$ interaction only half the time on average. The final factor in parentheses results from the fact that, when a pion decays, $\sim1/4$ of its energy goes to a muon neutrino; by contrast, when a muon decays, $\sim 2/3$ of its products are neutrinos. The neutrino flux peaks near the time $t_{\rm sup,0}^\mu$. For a fiducial parameters, a source at distance $D = 10\,\rm Mpc$ produces a peak fluence given by \begin{eqnarray}\label{eqn:fluence} \left(E_\nu^2\,J_\nu\right)_{\rm peak} &\approx& \left.\frac{E_\nu^2}{4\,\pi\,D^2}\frac{dN_\nu}{dE_\nu}\right|_{t= t_{\rm sup,\,0}^\mu}\\ \nonumber &=& 9.0\,\eta_{-1}^{2/3}\,B_{14}^{-4/3}\,\beta^{1/2}\,\epsilon_{B,-2}^{-1/6}\, D_{10\,\rm Mpc}^{-2}\\ \nonumber && f_{\rm sup}^p \,f_{\rm sup}^\pi\, f_{\rm sup}^\mu\,\rm GeV\,cm^{-2}. \end{eqnarray} To account in greater detail for the energy distribution of pions from a photopion production, we calculate the neutrino flux semi-analytically using the numerical package SOPHIA \citep{2000CoPhC.124..290M}. At each time step, we calculate the energy and flux of cosmic ray protons injected from the pulsar magnetosphere according to eqs.~\ref{eqn:ECR} and \ref{eqn:dN_CRdt}. These cosmic rays meet non-thermal and thermal photons in the nebula with number densities and spectra as determined by solving equations~\ref{eqn:dE_nthdt} and \ref{eqn:dE_thdt}. Meanwhile, protons are cooled by synchrotron radiation in the nebula magnetic field (equation~\ref{eqn:B_neb}). A fraction $f_{\rm sup}^p$ of the injected protons undergo photopion production. We use SOPHIA to compute the pion produced by UHECR interaction in the thermal background. Each $\pi^\pm$ product, depending on its energy $E_\pi$ and the system time, contributes a number of $f_{\rm sup}^\pi$ neutrino with energy $E_\pi/4$, and the same number of muon with energy $3\,E_\pi/4$. Each muon, again depending on its energy $E_\mu$ and the system time, contributes $2\times f_{\rm sup}^\mu$ neutrinos each with energy $E_\mu/3$. The neutrino flux from a stable fast-spinning magnetar formed from the merger is shown in Fig.~\ref{fig:fluence}. For initial spin period $P_i = 1$ ms and surface magnetic field $B=10^{14}$ G, the neutrino emission starts $\sim 1$~h after the merger, reaches the peak after $\sim 4$~days, and lasts for about a year before decreasing to $<5\%$ of the maximum flux. The neutrino spectrum peaks near an energy of $10^{17.5}$ eV. For comparison, we show the time-integrated sensitivity of IceCube with full configuration and one year operation for a source in the declination band $0<\delta<30^\circ$ \citep{2017ApJ...835..151A}. Note that this sensitivity is comparable to the IceCube sensitivity from a time-dependent search for a flare with week-long duration \citep{Aartsen:2015jx}. With millisecond initial spin period and $10^{14}$ G surface magnetic field, a post-merger magnetar is detectable by IceCube only when it is within $\sim10\,\rm Mpc$. With sensitivity windows focusing on EeV energies, the projected Askaryan Radio Array (ARA, \citealp{2012APh....35..457A}) and the Antarctic Ross Ice Shelf Antenna Neutrino Array (ARIANNA \citealp{2015APh....70...12B}) will be promising detectors to observe these neutrinos. In Fig.~\ref{fig:fluence}, we estimate the point-source sensitivity of ARA/ARIANNA by scaling the IceCube point-source sensitivity by the ratio of the differential sensitivity of ARA/ARIANNA to that of IceCube at 1~EeV. Such a crude estimation assumes that ARA/ARIANNA has an angular resolution that is comparable to that of IceCube at EeV, and that its effective area is independent of energy.\footnote{ARA/ARIANNA would improve the angular resolution of IceCube by a factor of $\sim 2$ and the effective area by a factor of 5 over two decades in energy \citep{2012APh....35..457A}. The shape and flux level of an ARA/ARIANNA sensitivity curve from the collaboration(s) in the future could therefore be different from our estimates in Figure~\ref{fig:fluence}.} Next generation telescopes, such as IceCube-Gen2 \citep{2014arXiv1412.5106I}, giant radio array for neutrino detection (GRAND, \citealp{2017EPJWC.13502001M}), and Cherenkov from astrophysical neutrinos telescope (CHANT, \citealp{2017PhRvD..95b3004N}) are expected to offer even better sensitivities that can probe high-energy neutrinos emitted by more distant mergers. Secondary protons and neutrons from the photomeson production may continue to participate in higher-order interactions, resulting in additional neutrinos at low energies \citep{2015JCAP...06..004F}. Moreover, UHE photons from the decay of neutral pions may cascade in or escape from the nebula, leading to potential observational signatures for nearby sources. The higher-order effect and UHE photon production will be explored in future work. \subsection{Diffuse flux} \begin{figure} \centering \epsfig{file=cumuFlux.pdf,width=0.49\textwidth} \caption{\label{fig:fluence_multi} All-flavor diffuse neutrino spectra for magnetar populations with different $B$, $P_i$, or $M_{\rm ej}$ values as labelled with different colors. All models assume that a large fraction of mergers result in the formation of a long-lived or stable magnetar ($f_{\rm mag} = 1$) and adopt a local NS merger rate of ${\cal R}(0)\sim 10^{-7}\,\rm Mpc^{-3}\,yr^{-1}$. In each case, other than the indicated parameter, the other parameters are set to be their default values as in Figure~\ref{fig:fluence}. More magnetized or slower spinning NSs are more challenging to detect. Heavier ejecta mass expands less rapidly and produces less neutrinos at early times due to more severe radiation cooling of primary and secondary particles. Also shown are 90\% C.L. sensitivities of current (black; IceCube \citealt{2016PhRvL.117x1101A} and Auger \citealt{PhysRevD.91.092008}) and some future UHE neutrino detectors (grey; ARA/ARIANNA \citealt{2012APh....35..457A, 2015APh....70...12B}, GRAND \citealt{2017EPJWC.13502001M}, CHANT \citealt{2017PhRvD..95b3004N}). } \end{figure} The total flux contributed by all binary NS mergers over cosmological distances can be estimated by \begin{equation} \Phi(E)= \frac{f_{\rm mag}}{4\pi} {\cal R}_0 \int\frac{c\,dz}{H(z)}\, f(z)\,\frac{d{N}}{dE'}(z), \end{equation} where ${\cal R}_0\sim 10^{-7}\,\rm Mpc^{-3}\,yr^{-1}$ is the estimated total rate\footnote{Although note that this rate is uncertain by at least 2 orders of magnitude, and current upper limits from Advanced LIGO allow a rate which is a factor of $\approx 10$ times higher than this fiducial estimate.} of NS binary mergers in the local universe (e.g.,~\citealt{2016ApJ...832L..21A}), $f_{\rm mag}$ is the fraction of mergers leaving long-lived or stable NS remnants, $H(z)$ is the Hubble constant at redshift z, and $f(z)$ describes the source evolution, which equals the ratio of the source rate at redshift z to that at today. Binary evolution models suggest that the NS-NS merger rate follows a history roughly comparable to the star formation rate (SFR) \citep{2013ApJ...779...72D}. Assuming that sources evolve with SFR \citep{0004-637X-613-1-200}, and taking the default parameters as in equation~\ref{eqn:fluence}, we obtain a peak flux of \begin{eqnarray} \left(E^2\Phi\right)_{\rm peak} &\approx& 2.8\times10^{-8}\,{\cal R}_{0,-7}f_{\rm mag}\,f_{\rm sup}^p \,f_{\rm sup}^\pi\, f_{\rm sup}^\mu\,\\ \nonumber &&\rm GeV\,cm^{-2}\,s^{-1}\,sr^{-1}. \end{eqnarray} Figure~\ref{fig:fluence_multi} presents the diffuse neutrino flux from numerical calculations, and demonstrates the flux dependence on the parameters $B$, $P_i$, and $M_{\rm ej}$. We have assumed in all cases that $f_{\rm mag} = 1$ and vary one out of the three other parameters at a time. Compared to the default case, a stronger dipole magnetic field (faster magnetar spin-down rate) enhances the synchrotron cooling of cosmic rays and hence leads to lower neutrino production. If $B\gg 10^{15}$~G, the millisecond magnetar would be subjected to substantial gravitational wave losses, in addition to electromagnetic radiation considered in this work \citep{1969ApJ...157.1395O}. The spindown time would be too short to allow accelerated particles to leave the dense and highly magnetized nebula. As $t_{\rm p,rad}\propto B^{-2}$, particles would be quickly cooled by synchrotron radiation and not produce neutrinos. By contrast, a weaker dipole magnetic field allows a slower deposition of the spin-down energy into the nebula, such that most particles are injected in a later time when the radiative loss is less severe. This also results in less interaction time for primary particles which results in a narrower distribution of the neutrino energy. A magnetar with larger $P_i$ as might be produced if gravitational waves carry away a large fraction of the magnetar power, is less powerful to produce cosmic particles in general. A higher mass ejecta expands less rapidly, making the cooling more efficient than decay for primary and secondary particles, and thus leads to a slightly lower neutrino flux at early times. The diffuse flux of neutrinos from binary NS mergers for $f_{\rm mag} = 1$ and ${\cal R}_0\sim 10^{-7}\,\rm Mpc^{-3}\,yr^{-1}$ is consistent with the upper limit based on 7 years of IceCube data, $\Phi_{\rm UL}\sim 3\times 10^{-8}\,\rm GeV\,cm^{-2}\,s^{-1}\,sr^{-1}$ \citep{2016PhRvL.117x1101A}. The flux level is in a promising regime that can be detected by current and future experiments. An absence of detection can in turn constrain the uncertain product $f_{\rm mag}\,{\cal R}_0$, or the magnetar fraction $f_{\rm mag}$ alone once the local merger rate ${\cal R}_0$ is measured by gravitational wave detectors. \section{Discussion and Conclusions}\label{sec:discussion} A long-lived, or indefinitely stable, millisecond magnetar may be formed by the coalescence of a binary NS system. In the hours to days following the merger, the resulting powerful and high voltage pulsar wind inflates a magnetized nebula behind the merger ejecta in which particles can be accelerated up to ultra-high energies. Depending on the age of the source (time since merger), the accelerated cosmic rays are cooled by synchrotron emission in the nebula, or they may interact with the non-thermal and thermal radiation fields of nebula to produce high-energy neutrinos. Following the evolution of the radiative background and the interaction of cosmic rays and their secondary particles, we have explored the neutrino signatures of such magnetar remnants. In optimistic scenarios in which an order unity fraction of NS mergers produce long-lived magnetar remnants with dipole magnetic field strengths of $\sim 10^{14}$~G, the cumulative neutrino background resulting from these events may be observed by the IceCube Observatory in the near future. Even in less optimistic scenarios, in which the magnetar fraction is small or the dipole magnetic field is stronger, the diffuse flux is potentially within the reach of next-generation neutrino telescopes. GW information alone may not be sufficient to confirm or refute the presence of a long-lived magnetar, even in systems in which the chirp inspiral phase is detected with high SNR. High frequency oscillations from the NS remnant (e.g.~\citealt{Clark+14}) can produce a measurable GW signal for hundreds of milliseconds following the merger and provide information on the NS EOS, but they are unlikely to provide unambiguous evidence for an extremely long remnant lifetime (the ringdown signature of the newly-formed BH will probably not be measurable). The magnetar itself will produce a periodic gravitational wave signal; however, its strength depends on the presence of a strong toroidal magnetic field misaligned with the rotation axis (e.g., \citealt{Stella+05,2013PhRvD..88f7304F, 2014PhRvD..89d7302L, 2015ApJ...798...25D}) or the growth and saturation of the f-mode instability (e.g., \citealt{Doneva+15}). We propose that high energy neutrinos, with a characteristic light curve peaking days after the merger, could provide a comparatively ``clean" way to verify the presence of a long-lived magnetar. Such a detection would also provide a more accurate sky localization for the source than provided by the GW signal, which could help identify the host galaxy if an electromagnetic counterpart is not detected. Future neutrino telescopes, such as GRAND \citep{2017EPJWC.13502001M} and CHANT \citep{2017PhRvD..95b3004N}, are designed to improve the sensitivity of IceCube at EeVs by roughly two orders of magnitude. With such improved sensitivities, the magnetar neutrino emission would be observable up to $\sim100$~Mpc, or at a rate of 0.4 NS merger event per year assuming ${\cal R}_0 = 10^{-7}\,\rm Mpc^{-3}\,yr^{-1}$ \citep{2016ApJ...832L..21A} and $f_{\rm mag}=1$. The fraction of NS mergers producing stable or long-lived magnetar remnants depends on the mass distribution of the merging NS binaries and, most sensitively, on the EoS of nuclear density matter through the maximum stable NS mass (e.g.~\citealt{Belczynski+08,Lawrence+15,Piro+17}). This is a large uncertainty of our model. But even in case that the maximum mass is relatively low $\lesssim 2.2\, M_\odot$, a significant amount of the rotational energy inherited from the merger can still be extracted from the merger remnant before it collapses into a black hole, in a timescale comparable to the spin-down time (see, e.g., \citealt{Metzger17}, their Fig.~8). Cosmic rays accelerated before the collapse could still produce a neutrino signal in this case, though the neutrino light curve would decay more rapidly at late times than in the stable magnetar case. Constraints have been placed on long-lived magnetar remnants of NS mergers from late-time radio observations of short-duration GRBs \citep{2014MNRAS.437.1821M, 2016ApJ...819L..22H, 2016ApJ...831..141F}. These works performed searches for radio emission from a group of well-localized short-duration GRBs on a timescale of months to years after the bursts. No coincident signal was found, deriving upper limits on the kinetic energy and the ejecta mass in several observational samples. Similar constraints on radio transients from stable magnetars are, or will be, constrained also by past or future planned wide-field radio transient surveys (\citealt{Metzger+15c}). While on the face these observations suggest $f_{\rm mag} \ll 1$, these constraints are sensitive to the assumed microphysical parameters of the shock and the density of the surrounding circumburst medium. It is also important to keep in mind that mergers giving rise to magnetars instead of black holes may not produce detectable prompt gamma-ray emission, in which case the GRB sample could be biased (though merger-produced magnetars should be accompanied by luminous optical/X-ray counterparts; \citealt{2013ApJ...776L..40Y,MP14, Siegel&Ciolfi16a,Siegel&Ciolfi16b, 2017PhRvD..95f3016C}). \citet{Piro&Kollmeier16} focused on the escape of UHECRs from low ejecta-mass explosions, suggesting stable magnetars from NS mergers as sources which can explain the rates and heavy composition of the UHECR measurement by the Auger Observatory \citep{Aab:2015bza}. They also estimate the neutrino emission from the hadronic interaction between UHECRs and ejecta baryons. However, \citet{Piro&Kollmeier16} ignored interaction with the radiation background, under the assumption that the cosmic rays are composed primarily of heavy nuclei, in which case the neutrino signal is much weaker signal due to energy losses being dominated by photo-disintegration instead of pion creation. Our work instead focuses on the interaction of cosmic-rays with the evolving radiation background of the post-merger environment, motivated as follows. First, cosmic rays in the energy range $\sim 10^{17.5}-10^{18.5}$~eV are inferred to possess a proton-dominated light composition by both the Auger Observatory \citep{Aab:2015bza} and the Telescope Array \citep{TA_ICRC15}. The neutrino signal at energies of $10^{17}$~eV should therefore be strong if magnetars from NS mergers indeed contribute the bulk of the UHECRs. Second, although the composition of the GRB jet and merger debris is likely to be composed of intermediate to heavy elements (resulting from nucleosynthesis following their decompression from high densities; \citealt{2011MNRAS.415.2495M}), the composition of the ions exacted from the stellar surface which are accelerated in the pulsar magnetosphere is less clear. Third, as shown in Figure~\ref{fig:t_proton}, the interaction rate of cosmic rays with photons exceeds by orders of magnitude that with the ejecta baryons. Thus, even if only a small fraction of the accelerated cosmic rays are protons, the photopion interaction will be more efficient than the hadronic interaction in producing neutrinos. As a result, including the effects of the radiation background on the UHECR cooling results in different neutrino spectrum and light curve. We also predict lower neutrino flux above $\sim 10^{18}$~eV and from highly magnetized systems (with $B\ge 10^{15}$~G) compared to \citet{Piro&Kollmeier16}. Finally, we note that similar transients powered by NSs with ultra-strong magnetic fields may be formed from the accretion-induced collapses (AIC) of white dwarfs \citep{1976A&A....46..229C, 1991ApJ...367L..19N}, or possibly in iron core collapse supernovae with very low ejecta masses (so-called ``ultra-stripped envelope supernovae"; \citealp{2013ApJ...774...58D, 2014ApJ...794...23D, 2015MNRAS.451.2123T}). Such events might occur at a comparable or potentially higher rate than NS mergers, although their gravitational wave emission will be significantly weaker. The neutrino emission from such events could be similar to that studied in this work, if these events also produce millisecond magnetars. \acknowledgements We thank Kohta Murase for helpful comments. KF acknowledges the support of a Joint Space-Science Institute prize postdoctoral fellowship. BDM gratefully acknowledges support from the National Science Foundation (AST-1410950, AST-1615084), NASA through the Astrophysics Theory Program (NNX16AB30G, NNX17AK43G) and the Fermi Guest Investigator Program (NNX16AR73G). \software{SOPHIA \citep{2000CoPhC.124..290M}}.
\section{Introduction} \subsection{Background} We consider the following semilinear wave equation with time-dependent damping. \begin{align} \label{NLDW} \tag{NLDW} \l\{ \begin{array}{ll} \partial_t^2 u - \Delta u + b(t)\partial_t u = |u|^{p}, & (t,x) \in [0,T) \times {\mathbb R}^n, \\ u(0,x)=\varepsilon u_0(x), u_t(0,x)=\varepsilon u_1(x), & x \in {\mathbb R}^n, \end{array} \r. \end{align} where $n \in {\mathbb N}$, $p>1$, $u=u(t,x)$ is a real-valued unknown function, $b=b(t)$ is a given smooth positive function, $u_0=u_0(x)$ and $u_1=u_1(x)$ are given real-valued functions, and $\varepsilon$ is a small positive parameter. The linear damped wave equation with $b(t)=1$ is derived from a heat conduction equation with a time delay effect (see \cite{Str11}). When $b(t)=0$, the linear equation is the wave equation and its energy is conserved by the solution flow. On the other hand, the energy is decreasing in the case of $b(t) \neq0$ so that we call the term $b(t)u_t$ a damping term. Here, the coefficient $b(t)$ denotes the strength of the damping. In this paper, we are interested in how the damping affects the global behavior of the solution to \eqref{NLDW}. To see this, we assume that $b$ satisfies $b\in C^1((0,\infty))$ and \begin{align*} b_1 (t+1)^{-\beta} \leq b(t) \leq b_2 (t+1)^{-\beta}, \quad |b'(t)| \leq b_3(t+1)^{-\beta-1}, \end{align*} for $t\geq0$ with some $\beta \in {\mathbb R}$ and some positive constants $b_1$, $b_2$, and $b_3$. The nonlinear term $|u|^p$ also affects the global behavior of the solutions. As a pioneering work, Fujita \cite{Fuj66} found the critical exponent $p_F:=1+2/n$, which is called the Fujita exponent, for the semilinear heat equation $v_t - \Delta v =v^p$ with the initial data $v(0)=v_0 \geq 0$. Namely, if $p<p_F$, the solution blows up in finite time even if the initial data is small and, if $p>p_F$, the solution exists globally in time when the initial data is small. After that, it is proved that the solution blows up in finite time in the critical case $p=p_F$ (see Hayakawa \cite{Hay73}, Sugitani \cite{Sug75}, Kobayashi, Sirao, and Tanaka \cite{KST77}, and Weissler \cite{Wei81}). We say that small data global existence holds when the following SDGE holds and that small data blow-up holds when the following SDBU holds. \begin{itemize} \item[(SDGE)] For any initial data $(u_0,u_1)$, there exists $\varepsilon_\ast>0$ such that the solution exists globally in time for any $\varepsilon \in (0,\varepsilon_\ast)$. \item [(SDBU)] There exists an initial data $(u_0,u_1)$ and $\varepsilon_\ast>0$ such that the solution blows up in finite time for any $\varepsilon \in (0,\varepsilon_\ast)$. \end{itemize} For the so-called classical damping, that is, $b(t)\equiv 1$, Li and Zhou \cite{LiZh95} proved that small data blow-up holds and obtain the sharp estimate of the lifespan when $n=1$ or $n=2$ and $p\leq p_F$. Moreover, they also proved small data global existence if $p >p_F$ when $n=1$ or $n=2$. For $n=3$, Nishihara \cite{Nis03} proved the similar result. For higher dimensional case, \textit{i.e.} $n\geq 4$, Todorova and Yordanov \cite{ToYo01} showed that the critical exponent is the Fujita exponent and Zhang \cite{Zha01} proved that small data blow-up holds in the critical case. For \eqref{NLDW} with $b(t)=(t+1)^{-\beta}$ for $\beta \in (-1,1)$, Nishihara \cite{Nis11} and Lin, Nishihara, and Zhai \cite{LNZ12} proved that the critical exponent is the Fujita exponent. D'Abbicco, Lucente, and Reissig \cite{DLR13} discussed a more general variable coefficient and the initial data. When $\beta=-1$, Wakasugi \cite{Wak17} proved that small data global existence holds if $p>p_F$ and Fujiwara, Ikeda, and Wakasugi \cite{FIW16a} showed that small data blow-up holds if $1<p<p_F$. However, it was not known whether small data blow-up holds when $\beta=-1$ and $p=p_F$. We will see that it holds by giving the sharp upper estimate of the lifespan. When $\beta<-1$ (overdamping) or $\beta \geq 1$ (non-effective damping), the Fujita exponent is no longer the critical exponent. When $\beta<-1$, recently, Ikeda and Wakasugi \cite{IkWap} proved that small data global existence holds for any $p>1$. Namely, there is no critical exponent. When $\beta \geq 1$, it is known that another critical exponent appears. See \cite{DLR15, LTW17a} and references therein in the non-effective damping case. In the present paper, we would like to obtain the sharp upper estimate of the lifespan when $b(t)=(t+1)^{-\beta}$ with $\beta\in [-1,1)$. \subsection{Known estimates of the lifespan} As stated above, there are many results for the global behavior of the solutions to \eqref{NLDW}. In this subsection, we focus on the estimates of the lifespan. To state the estimates, we give the definitions of an energy solution and its lifespan. \begin{definition}[Energy solution and its lifespan] Let $T>0$ and $(u_0,u_1)\in H^1({\mathbb R}^n) \times L^2({\mathbb R}^n)$. We say that $u$ is an energy solution to \eqref{NLDW} on $[0,T)$ if $u \in C^2([0,T);H^{-1}({\mathbb R}^n)) \cap C^1([0,T);L^{2}({\mathbb R}^n) ) \cap C([0,T);H^{1}({\mathbb R}^n))$ satisfies the initial condition $u(0)=\varepsilon u_0$ and $u_t(0)=\varepsilon u_1$ and satisfies the equation \[ \partial_t^2 u - \Delta u + b(t)\partial_t u = |u|^{p}, \] in the sense of $C([0,T):H^{-1}({\mathbb R}^n))$. Moreover, the lifespan $T(\varepsilon)=T(\varepsilon u_0, \varepsilon u_1)$ of an energy solution for \eqref{NLDW} is defined by \begin{align*} T(\varepsilon):= \sup \{ T\in(0,\infty]: \text{$u$ is a unique energy solution for \eqref{NLDW} on $[0,T)$}\}. \end{align*} \end{definition} The known results for the estimates of the lifespan are summarized in Table 1, where we consider the coefficient $b(t)=(t+1)^{-\beta}$ with $\beta<1$. \begin{table}[htb] {\renewcommand\arraystretch{2} \begin{tabular}{|c|c|c|c|} \hline $\beta \backslash p$ & $\displaystyle 1< p < p_F$ & $\displaystyle p= p_F$ \\ \hline $\beta<-1$ & $T(\varepsilon)=\infty$ \cite{IkWap} & $T(\varepsilon)=\infty$ \cite{IkWap} \\ \hline $\beta = -1$ & $T(\varepsilon) \ceq \exp \l( C \varepsilon^{-\frac{1}{\frac{1}{p-1}-\frac{n}{2}} } \r)$ & $\exp \l(\exp \l( C \varepsilon^{-(p-1)} \r)\r) \leq T(\varepsilon)$ \\ & lower and upper \cite{FIW16a} & lower \cite{FIW16a} \\ \hline $-1 < \beta < 1$ & $T(\varepsilon) \ceq C \varepsilon^{-\frac{1}{\l(\frac{1}{p-1}-\frac{n}{2}\r)(1+\beta)} }$ & $\exp (C\varepsilon^{-(p-1)}) \leq T(\varepsilon) \leq \exp(C\varepsilon^{-p})$ \\ \ & lower \cite{FIW16a} and upper \cite{IkWa15} & lower \cite{IkOg16,FIW16a} and upper \cite{IkOg16} \\ \ &\ & $ T(\varepsilon) \leq \exp (C\varepsilon^{-(p-1)})$ if $\beta=0$ \cite{LaZh17a}. \\ \hline \end{tabular} } \caption{Estimates of lifespan} \end{table} Ikeda and Wakasugi \cite{IkWap} proved small data global existence when $\beta<-1$ and $p>1$. Fujiwara, Ikeda, and Wakasugi \cite{FIW16a} obtained the lower bounds of the lifespan when $-1 \leq \beta<1$ and $1<p\leq p_F$ (see also \cite{IkOg16}). In the subcritical case $p<p_F$, the upper estimates of the lifespan were obtained by \cite{IkWa15} ($-1<\beta<1$) and \cite{FIW16a} ($\beta=-1$). See also \cite{LiZh95, Nis03} when $\beta=0$ and $n=1,2,3$. In the critical case $p=p_F$, Ikeda and Ogawa \cite{IkOg16} obtained the upper estimate of the lifespan $T(\varepsilon) \leq \exp(C \varepsilon^{-p})$ when $-1<\beta<1$. However, this is not sharp. Recently, Lai and Zhou \cite{LaZh17a} obtained the sharp upper estimate of the lifespan when $\beta=0$. We will give the sharp upper estimate of the lifespan when $-1\leq \beta <1$ and $p=p_F$ in the present paper. \subsection{Main result} In the present paper, we are interested in the upper estimate of the lifespan of the solution to \eqref{NLDW} with the Fujita exponent $p=p_F$. To this end, we assume that there exists $\beta \in [-1,1)\setminus \{0\}$ such that $b$ satisfies \begin{enumerate} \item[(B1)] $b\in C^2((0,\infty))$, \item[(B2)] $b(t) \ceq (t+1)^{-\beta}$ for $t\geq0$, \item[(B3)] $ |b'(t)| \ceq (t+1)^{-\beta-1}$ for $t\geq0$, \item[(B4)] $|b''(t)| \lesssim (t+1)^{-\beta-2}$ for $t\geq0$. \end{enumerate} \begin{remark} \ \begin{enumerate} \item The function $b(t)=(t+1)^{-\beta}$ with $\beta \in [-1,1) \setminus\{0\}$ satisfies (B1)--(B4). \item There is no function satisfying (B1)--(B4) with $\beta=0$. Indeed, (B3) is not compatible with (B2) when $\beta=0$. \item The classical damping $b(t)\equiv 1$ does not satisfy the third condition (B3), in particular, $|b'(t)| \gtrsim (t+1)^{-\beta-1}$. In the classical damping case, we do not need to assume $|b'(t)| \gtrsim (t+1)^{-\beta-1}$ or (B4). \end{enumerate} \end{remark} We define \begin{align*} b^*:=\int_{0}^{\infty} e^{-\int_{0}^{\tau} b(s)ds}d\tau. \end{align*} Then, we obtain the following sharp upper estimate of the lifespan of the energy solution to \eqref{NLDW}. \begin{theorem} \label{thm1.1} Let $p=p_F$. Assume that $b$ satisfies (B1)--(B4) with some $\beta \in [-1,1)\setminus\{0\}$. Let $(u_0,u_1)\in (H^1({\mathbb R}^n)\cap L^1({\mathbb R}^n) )\times( L^2({\mathbb R}^n)\cap L^1({\mathbb R}^n))$ satisfy \begin{align*} \int_{{\mathbb R}^n} u_0(x) + b^* u_1(x) dx >0. \end{align*} Then, for sufficiently small $\varepsilon>0$, the lifespan $T(\varepsilon)$ of the corresponding energy solution is estimated by \begin{align*} T(\varepsilon) \leq \begin{cases} \exp \l( \exp (C \varepsilon^{-(p-1)}) \r)& \text{ if } \beta=-1, \\ \exp (C \varepsilon^{-(p-1)}) & \text{ if } \beta\in (-1,1)\setminus\{ 0\}, \end{cases} \end{align*} where $C$ is a positive constant independent of $\varepsilon$. \end{theorem} \begin{remark} \ \begin{enumerate} \item As stated above, the lower estimate of the lifespan is obtained as follows (see \cite{IkOg16,FIW16a} and references therein). \begin{align*} T(\varepsilon) \geq \begin{cases} \exp \l( \exp (C \varepsilon^{-(p-1)}) \r)& \text{ if } \beta=-1, \\ \exp (C \varepsilon^{-(p-1)}) & \text{ if } \beta\in (-1,1)\setminus\{ 0\}. \end{cases} \end{align*} Thus, Theorem \ref{thm1.1} gives the sharp upper estimates of the lifespan. Moreover, this upper estimate means that small data blow-up occurs when $p=p_F$ and $\beta=-1$. \item The estimate in Theorem \ref{thm1.1} is same as the estimate of the lifespan for the corresponding heat equation \begin{align*} \l\{ \begin{array}{ll} b(t) v_{t}-\Delta v=v^{p_F}, & (t,x) \in [0,T) \times {\mathbb R}^n, \\ v(0,x)=\varepsilon v_0(x)>0, & x \in {\mathbb R}^n. \end{array} \r. \end{align*} Indeed, the estimate of this equation can be obtained by reducing this to the Fujita equation by setting $v(t,x)=w(\int_{0}^{t} b(s)^{-1}ds, x)$, and using the result of \cite{LeNi92} On the other hand, for \eqref{NLDW}, we cannot use such reduction since it has the twice time derivative term $u_{tt}$. \end{enumerate} \end{remark} \subsection{The idea of the proof} We use the method by Lai and Zhou \cite{LaZh17a}. They treated the classical damping case, that is, $b(t) \equiv 1$. We explain their idea briefly. They regarded \eqref{NLDW} as the semilinear heat equation with the forcing term $u_{tt}$ and obtained \begin{align*} u(t)= \varepsilon \cG(t) \ast u_0 + \int_{0}^{t} \cG(t-s) \ast \{ |u(s)|^{p} - u_{ss}(s) \} ds, \end{align*} where $\cG$ is the Gaussian function. By the integration by parts of the last term in the right hand side, we get the time decay from the Gaussian function. Therefore, we can regard this equation as the semilinear heat equation for large time $t>t_{\varepsilon}$. After $t_{\varepsilon}$, the lifespan is estimated by $ \exp (C \varepsilon^{-(p-1)})$ by reducing an ordinary differential inequality, which appears in the paper by Li and Zhou \cite{LiZh95}. Therefore, we obtain \begin{align*} T(\varepsilon) \leq t_\varepsilon + \exp (C \varepsilon^{-(p-1)}). \end{align*} By a direct calculation, we can prove that $t_{\varepsilon}$ depends polynomially on $\varepsilon$, which implies $t_{\varepsilon} \leq \exp (C \varepsilon^{-(p-1)})$ for small $\varepsilon>0$, and thus we obtain the sharp upper estimate of the lifespan. In the present paper, we use the idea of Lai and Zhou \cite{LaZh17a}. However, we have difficulties which come from the variable coefficient $b$. To obtain a time decay estimate from the Gaussian function, we need to rewrite \eqref{NLDW} to a divergence form. To do this, we use the transformation by Lin, Nishihara, and Zhai \cite{LNZ12}. Then, we get the divergence form \begin{align*} (g(t)u)_{tt} - g(t) \Delta u - (g'(t)u)_t +u_t = g(t)|u|^p, \end{align*} where $g$ is a positive function. According to the idea of Lai and Zhou, we regard the term $(g(t)u)_{tt} - (g'(t)u)_t$ as a forcing term. The first term has a good time decay, which comes from the Gaussian function. However, the second term has only one time derivative and thus the time decay is worse than that of the first term. To see this term as a remainder term for large time, we need to obtain the time decay from $g'$. Moreover, since we need to know how $t_{\varepsilon}$ depends on $\varepsilon$, we have to get the decay order of $g'$. Once we know how $t_{\varepsilon}$ depends on $\varepsilon$, by reducing an ordinary differential inequality, which is different from that in \cite{LaZh17a}, we obtain the sharp upper estimate of the lifespan in Theorem \ref{thm1.1}. {\bf Notations.} We give some notations. Let $L^p({\mathbb R}^n)$ denote the usual Lebesgue space equipped with the norm \begin{align*} \norm{f}_{L^p}&:=\l( \int_{{\mathbb R}^n} |f(x)|^p dx \r)^{1/p} \text{ if } 1\leq p<\infty, \\ \norm{f}_{L^\infty}&:= \esssup_{x\in {\mathbb R}^n}|f(x)|. \end{align*} For $s \in {\mathbb Z}_{\geq0}$ and $m \geq0$, we define the weighted Sobolev space $H^{s,m}({\mathbb R}^n)$ by \begin{align*} H^{s,m}({\mathbb R}^n)&:=\{ f \in L^2({\mathbb R}^n) | \norm{f}_{H^{s,m}}<\infty \}, \\ \norm{f}_{H^{s,m}}&:= \l( \sum_{|\alpha|\leq s} \int_{{\mathbb R}^n} (1+|x|^2)^{m} |\partial_x^\alpha f(x)|^2 dx \r)^{1/2}. \end{align*} In particular, let $H^{s}({\mathbb R}^n):=H^{s,0}({\mathbb R}^n)$. For an interval $I \subset {\mathbb R}$ and a Banach space $X$, we denote the space of $k$-times continuously differentiable $X$-valued function on $I$ by $C^{k}(I:X)$. We denote the Gaussian function by $\cG$, \textit{i.e.} \begin{align*} \cG(t)=\cG(t,x)=(4\pi t)^{-n/2}e^{-\frac{|x|^2}{4t}}. \end{align*} We set $\cG'(t):= \partial_t \cG(t,x)$ and $\cG''(t):=\partial_t^2 \cG(t,x)$. The symbol $A\lesssim B$ (resp. $A\gtrsim B$) stands for $A\leq C B$ (resp. $A\geq C B$) with some positive constant $C$. $A \ceq B$ means that $A\lesssim B$ and $A\gtrsim B$ hold. \section{Proof} \subsection{Rewriting the equation and using a test function} First, we rewrite the equation to a heat integral equation. We give the definition of a strong solution. \begin{definition} Let $T>0$ and $(u_0,u_1)\in H^2({\mathbb R}^n) \times H^1({\mathbb R}^n)$. We say that $u$ is a strong solution to \eqref{NLDW} on $[0,T)$ if $u \in C^2([0,T);L^2({\mathbb R}^n)) \cap C^1([0,T);H^{1}({\mathbb R}^n) ) \cap C([0,T);H^{2}({\mathbb R}^n))$ satisfies the initial condition $u(0)=\varepsilon u_0$ and $u_t(0)=\varepsilon u_1$ and satisfies the equation \[ \partial_t^2 u - \Delta u + b(t)\partial_t u = |u|^{p}, \] in the sense of $C([0,T):L^2({\mathbb R}^n))$. \end{definition} To apply Lai--Zhou's method, we need to rewrite \eqref{NLDW} to a divergence form. To do this, we use Lin--Nishihara--Zhai's transformation. Let $g$ satisfy \begin{align*} \l\{ \begin{array}{ll} g'(t)=b(t)g(t)-1, & t\geq 0, \\ g(0)=b^*, \end{array} \r. \end{align*} where we recall that \begin{align*} b^*=\int_{0}^{\infty} e^{-\int_{0}^{\tau} b(s)ds}d\tau. \end{align*} The solution $g$ of this ordinary differential equation is explicitly given by \[ g(t)= e^{\int_{0}^{t} b(s) ds} \l( \int_{0}^{\infty} e^{-\int_{0}^{\tau} b(s)ds}d\tau- \int_{0}^{t} e^{-\int_{0}^{\tau} b(s)ds}d\tau \r). \] Then, we get the following divergence form (see \cite{LNZ12}). \begin{align} (g(t)u)_{tt} - g(t) \Delta u - (g'(t)u)_t +u_t = g(t)|u|^p, \end{align} Namely, we get the following lemma. \begin{lemma} If $u$ is a strong solution to \eqref{NLDW} on $[0,T)$, then $u$ satisfies the equation \[ (g(t)u)_{tt} - g(t) \Delta u - (g'(t)u)_t +u_t = g(t)|u|^p, \] in the sense of $C([0,T):L^2({\mathbb R}^n))$. \end{lemma} We collect some properties of $g$, which are used in the sequel subsections. \begin{lemma} \label{lem2.2} The function $g$ satisfies the following properties. \begin{enumerate} \renewcommand{\theenumi}{\roman{enumi}} \item $\lim_{t \to \infty} b(t)g(t)=1$, \textit{i.e.}\ $\lim_{t \to \infty} g'(t)=0$. \item There exist positive constants $m$ and $M$ such that \[ m b(t)^{-1} \leq g(t) \leq M b(t)^{-1} \text{ for any } t>0.\] Namely, $g(t)\ceq (t+1)^{\beta}$. \item We have \begin{align*} \frac{g'(t)}{(b(t)^{-1})'} \to 1 \text{ as } t \to \infty. \end{align*} In particular, $|g'(t)| \ceq (t+1)^{\beta-1}$ for sufficiently large $t>0$. \item We define $G$ by \[ G(t):= \int_{0}^{t} g(s) ds.\] Then, $G$ is increasing and for any $t>0$, \[ G(t)+1 \thickapprox \begin{cases} \log(t+1)+1 & \beta=-1, \\ (t+1)^{\beta+1} & \beta \in (-1,1). \end{cases}\] \item We define $\Gamma$ by \[ \Gamma(t):= \int_{0}^{t} \frac{1}{g(s)}ds. \] Then, $\Gamma$ is increasing and for any $t>0$, \[ \Gamma(t)+1 \thickapprox (t+1)^{-\beta+1}. \] \end{enumerate} \end{lemma} We give the proof of this lemma in Appendix \ref{secA}. According to the idea of Lai and Zhou \cite{LaZh17a}, we regard the term $(g(t)u)_{tt} - (g'(t)u)_t$ as a forcing term of a heat equation. \begin{lemma} \label{lem2.3} If $u$ is a strong solution to \eqref{NLDW} on $[0,T)$, then $u$ satisfies the following integral equation. \begin{align} \label{eq3.2} u(t)&= \varepsilon \cG(G(t)) \ast u_0 \\ \notag &\quad + \int_{0}^{t} \cG(G(t)-G(s)) \ast \{ g(s)|u(s)|^{p} - (g(s)u(s))_{ss} + (g'(s)u(s))_s \} ds. \end{align} \end{lemma} \begin{proof} Since $u$ is the strong solution of \eqref{NLDW}, the function $F(t):=g(t)|u(t)|^{p} - (g(t)u(t))_{tt} + (g'(t)u(t))_t$ belongs to $L^{2}({\mathbb R}^n)$ for any $t \in[0,T)$. Taking the Fourier transform of \eqref{NLDW}, we get \begin{align*} \widehat{u_t}(t) + g(t) |\xi|^2 \widehat{u} (t) =\widehat{F}(t). \end{align*} Since we have $\partial_{t} \widehat{u} (t)=\widehat{u_t}(t)$ in $L^2({\mathbb R}^n)$, we have the ordinary differential equation \begin{align*} \partial_{t} \widehat{u}(t) + g(t) |\xi|^2 \widehat{u} (t) =\widehat{F}(t). \end{align*} For any $\varphi \in C_{0}^{\infty}({\mathbb R}^n)$, we obtain \begin{align*} \partial_{t} \tbra{ e^{G(t)|\xi|^2} \widehat{u}(t) }{\varphi}_{L^2} & = \tbra{ e^{G(t)|\xi|^2} \partial_{t} \widehat{u}(t)}{\varphi}_{L^2} + \tbra{ g(t)|\xi|^2 e^{G(t)|\xi|^2} \widehat{u}(t)}{\varphi}_{L^2}. \end{align*} Using the equation, we get \begin{align*} \partial_{t} \tbra{ e^{G(t)|\xi|^2} \widehat{u}(t) }{\varphi}_{L^2} & = \tbra{e^{G(t)|\xi|^2} \widehat{F}(t)}{\varphi}_{L^2}. \end{align*} Since the right hand side is continuous on $(0,T)$, we can use the fundamental theorem of calculus. Therefore, we obtain \begin{align*} \tbra{ e^{G(t)|\xi|^2} \widehat{u}(t) - \widehat{u}(0)}{\varphi}_{L^2}= \int_{0}^{t} \tbra{e^{G(s)|\xi|^2} \widehat{F}(s)}{\varphi}_{L^2} ds \end{align*} for every $t\in (0,T)$ and any $\varphi \in C_{0}^{\infty}({\mathbb R}^n)$. For fixed $t \in (0,T)$, taking $\varphi(\xi) = e^{-G(t)|\xi|^2} \phi (\xi)$ where $\phi \in C_{0}^{\infty}({\mathbb R}^n)$ is arbitrary, we obtain \begin{align*} \tbra{ e^{G(t)|\xi|^2} \widehat{u}(t) - \widehat{u}(0)}{e^{-G(t)|\xi|^2} \phi }_{L^2}= \int_{0}^{t} \tbra{e^{G(s)|\xi|^2} \widehat{F}(s)}{e^{-G(t)|\xi|^2} \phi }_{L^2} ds, \end{align*} for any $t \in (0,T)$. Thus, we get \begin{align*} \tbra{ \widehat{u}(t) - e^{-G(t)|\xi|^2} \widehat{u}(0)}{ \phi }_{L^2}= \int_{0}^{t} \tbra{e^{-(G(t)-G(s))|\xi|^2} \widehat{F}(s)}{\phi }_{L^2} ds, \end{align*} for any $t \in (0,T)$. Since we have \begin{align*} \int_{0}^{t} \tbra{e^{-(G(t)-G(s))|\xi|^2} \widehat{F}(s)}{\phi }_{L^2} ds= \tbra{ \int_{0}^{t} e^{-(G(t)-G(s))|\xi|^2} \widehat{F}(s) ds }{\phi }_{L^2}, \end{align*} by the Fubini--Tonelli theorem, we get \begin{align*} \tbra{ \widehat{u}(t) - e^{-G(t)|\xi|^2} \widehat{u}(0)}{ \phi }_{L^2} = \tbra{ \int_{0}^{t} e^{-(G(t)-G(s))|\xi|^2} \widehat{F}(s) ds }{\phi }_{L^2}. \end{align*} Since $\phi \in C_{0}^{\infty}({\mathbb R}^n)$ is arbitrary, we obtain \begin{align*} \widehat{u}(t) - e^{-G(t)|\xi|^2} \widehat{u}(0) = \int_{0}^{t} e^{-(G(t)-G(s))|\xi|^2} \widehat{F}(s) ds, \end{align*} for almost every $\xi\in{\mathbb R}^n$. We note that each term belongs to $L^2({\mathbb R}^n)$ for any $t \in (0,T)$. Taking the inverse Fourier transform, we obtain \begin{align*} u(t) - ( e^{-G(t)|\xi|^2} \widehat{u}(0))^{\vee}= \cF^{-1} \l( \int_{0}^{t} e^{-(G(t)-G(s))|\xi|^2} \widehat{F}(s) ds\r). \end{align*} By the Parseval identity and the Fubini--Tonelli theorem, we get \begin{align*} u(t) - ( e^{-G(t)|\xi|^2} \widehat{u}(0))^{\vee}=\int_{0}^{t} ( e^{-(G(t)-G(s))|\xi|^2} \widehat{F}(s))^{\vee} ds. \end{align*} Now, we have $( e^{-G(t)|\xi|^2}\widehat{f})^{\vee}(x) = \cG(G(t)) \ast f $ for $f \in L^2({\mathbb R}^n)$. The proof is completed. \end{proof} Choosing the Gaussian function as a test function, we get the following proposition. \begin{proposition} \label{prop2.4} The energy solution $u$ to \eqref{NLDW} satisfies \begin{align} \label{eq3.5} &\int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} u(t,x) dx +g(t) \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} \partial_t u(t,x) dx \\ \notag &= \varepsilon (4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \cG(2G(t)+1,x) (u_0+g(0)u_1)(x) dx \\ \notag & \quad + (4\pi (G(t)+1))^{n/2} \int_{0}^{t} g(s) \int_{{\mathbb R}^n} \cG(2G(t)-G(s)+1,x) |u(s,x)|^{p} dx ds \\ \notag & \quad - (4\pi (G(t)+1))^{n/2} \int_{0}^{t}g(s)^2 \int_{{\mathbb R}^n} \cG'(2G(t)-G(s)+1,x) \partial_su (s,x) dx ds, \end{align} for any $t \in (0,T(\varepsilon))$. \end{proposition} To prove this proposition, we use the following approximation argument. \begin{lemma} \label{lem2.5} Let $(u_0,u_1) \in H^1({\mathbb R}^n) \times L^2({\mathbb R}^n)$ and $u$ be the energy solution to \eqref{NLDW} on $[0,T(\varepsilon))$ with the initial data $(u_0,u_1)$. Then, there exists a sequence $\{(u_0^k,u_1^k)\}_{k \in {\mathbb N}} \subset H^2({\mathbb R}^n) \times H^1({\mathbb R}^n)$ such that $(u_0^k,u_1^k) \to (u_0,u_1)$ in $H^1({\mathbb R}^n) \times L^2({\mathbb R}^n)$ as $k\to \infty$ and \begin{align*} \norm{u^k-u}_{L^{\infty}(K:H^1({\mathbb R}^n))} + \norm{\partial_{t} u^k- \partial_{t} u}_{L^{\infty}(K:L^2({\mathbb R}^n))} \to 0 \text{ as } k \to \infty, \end{align*} for any compact set $K \subset [0,T(\varepsilon))$, where $u^k$ is the strong solution to \eqref{NLDW} with the initial data $(u_0^k,u_1^k)$. \end{lemma} \begin{proof} It is enough to prove persistency of the regularity and continuous dependence on initial data since the statement can be obtained by combining them. First, we show persistency. Namely, the lifespan of the strong solution $T_s$ equals to the lifespan $T$ of the energy solution if $(u_0,u_1) \in H^2({\mathbb R}^n) \times H^1({\mathbb R}^n)$. It is easy to show $T_s \leq T$ so that we prove $T_s \geq T$ by a contradiction argument. We suppose that $T_s < T$. Then, we have $T_s<\infty$ and thus \begin{align} \label{eq2.4} \lim_{t \to T_s} \norm{ ( u(t), u_t (t)) }_{H^2\times H^1}=\infty. \end{align} Since $T_s < T$, we have \begin{align*} M:= \sup_{0 < t < T_s} \norm{ ( u(t), u_t (t)) }_{H^1 \times L^2}<\infty. \end{align*} Take $t_0 \in (0,T_s)$ such that $T_s -t_0 <(2C_0 M^{p-1})^{-1}$. Then, by the energy estimate, we have \begin{align} \label{eq2.5} \sup_{t_0 \leq t \leq \tau} \norm{ ( u(t), u_t (t)) }_{H^2\times H^1} \lesssim \norm{ ( u(t_0), u_t (t_0)) }_{H^2\times H^1} + \int_{t_0}^{\tau} \norm{ |u(t)|^{p} }_{H^1} dt, \end{align} for any $\tau \in (t_0, T_s)$. Now, since $p\leq n/(n-2)$, by the Sobolev inequality, we obtain \begin{align*} \norm{ |u(t)|^{p} }_{L^2} = \norm{ u(t) }_{L^{2p}}^{p} \leq \norm{u(t)}_{H^1}^{p}. \end{align*} Moreover, by the H\"{o}lder inequality and the Sobolev inequality, we also obtain \begin{align*} \norm{ |u(t)|^{p} }_{\dot{H}^1} & \lesssim \norm{ |u(t)|^{p-1} |\nabla u(t)| }_{L^2} \\ & \leq \norm{ |u(t)|^{p-1} }_{L^n} \norm{\nabla u(t) }_{L^{\frac{2n}{n-2}}} \\ & \lesssim \norm{ u(t) }_{L^{n(p-1)}}^{p-1} \norm{u(t) }_{H^2} \\ & \lesssim \norm{ u(t) }_{H^1}^{p-1} \norm{u(t) }_{H^2}, \end{align*} where we use $n(p-1) \leq 2n/(n-2)$. Thus, combining them with \eqref{eq2.5}, we get \begin{align*} \sup_{t_0 \leq t \leq \tau} \norm{ ( u(t), u_t (t)) }_{H^2\times H^1} & \leq C \norm{ ( u(t_0), u_t (t_0)) }_{H^2\times H^1} \\ & \quad +C_0 (\tau-t_0) \sup_{t_0 \leq t \leq \tau} \l( \norm{ u(t) }_{H^1}^{p-1} \norm{u(t) }_{H^2}\r) \\ & \leq C \norm{ ( u(t_0), u_t (t_0)) }_{H^2\times H^1} \\ & \quad +C_0 M^{p-1} (T_s-t_0) \sup_{t_0 < t < \tau} \norm{ ( u(t), u_t (t)) }_{H^2\times H^1}, \end{align*} for any $\tau \in (t_0, T_s)$. By the definition of $t_0$, we have \begin{align*} \sup_{t_0 \leq t \leq \tau} \norm{ ( u(t), u_t (t)) }_{H^2\times H^1} \leq C \norm{ ( u(t_0), u_t (t_0)) }_{H^2\times H^1}, \end{align*} for any $\tau \in (t_0, T_s)$. Taking the limit $\tau \to T_s$, this contradicts \eqref{eq2.4}. Next, we show continuous dependence on initial data. Let $\{(u_0^k,u_1^k)\}_{k\in {\mathbb N}} \subset H^1({\mathbb R}^n) \times L^2({\mathbb R}^n)$ satisfy $(u_0^k,u_1^k) \to (u_0,u_1)$ in $H^1({\mathbb R}^n) \times L^2({\mathbb R}^n)$ as $k\to \infty$. We have $\norm{(u_0^k,u_1^k)}_{H^1 \times L^2} \leq 2\norm{(u_0,u_1)}_{H^1 \times L^2}$ for large $k$. By the energy estimate, there exists $T_1=T_1(\norm{(u_0,u_1)}_{H^1 \times L^2} )$ such that \begin{align*} \sup_{0\leq t \leq T_1}\norm{(u(t),u_t(t))}_{H^1 \times L^2} + \sup_{k\geq K} \sup_{0\leq t \leq T_1}\norm{(u^k(t),u_t^k(t))}_{H^1 \times L^2} \lesssim \norm{(u_0,u_1)}_{H^1 \times L^2}. \end{align*} This and the energy estimate give \begin{align*} &\norm{(u(t),u_t(t))-(u^k(t),u_t^k(t))}_{H^1 \times L^2} \\ &\quad \lesssim \norm{(u_0,u_1)-(u_0^k,u_1^k)}_{H^1 \times L^2} + \int_{0}^{T_1} \norm{(u(t),u_t(t))-(u^k(t),u_t^k(t))}_{H^1 \times L^2} dt. \end{align*} By the Gronwall inequality, we obtain \begin{align*} \sup_{0\leq t \leq T_1}\norm{(u(t),u_t(t))-(u^k(t),u_t^k(t))}_{H^1 \times L^2} \to 0 \end{align*} as $k \to \infty$. Iterating this to cover any compact subset of $(0, T)$, we finish the proof. \end{proof} \begin{proof}[Proof of Proposition \ref{prop2.4}] It is enough to show that the strong solution satisfies \eqref{eq3.5} since we find that the energy solution satisfies \eqref{eq3.5} for any $t \in (0,T(\varepsilon))$ by Lemma \ref{lem2.5} and the approximation argument. Let $u$ be the strong solution to \eqref{NLDW}. By Lemma \ref{lem2.3}, the strong solution satisfies \eqref{eq3.2}. Multiplying \eqref{eq3.2} by $(4\pi (G(t)+1))^{n/2} \cG(G(t)+1,x)$ and integrating it on ${\mathbb R}^n$, we get \begin{align} \label{eq2.6} &\int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} u(t,x) dx \\ \notag &= \varepsilon (4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \cG(G(t)+1,x)( \cG(G(t)) \ast u_0 )(x) dx \\ \notag &\quad +(4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \cG(G(t)+1,x) \int_{0}^{t} \cG(G(t)-G(s)) \ast g(s)|u(s)|^{p} ds dx \\ \notag &\quad -(4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \cG(G(t)+1,x) \int_{0}^{t} \cG(G(t)-G(s)) \ast (g(s)u(s))_{ss} ds dx \\ \notag &\quad +(4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \cG(G(t)+1,x) \int_{0}^{t} \cG(G(t)-G(s)) \ast (g'(s)u(s))_s ds dx. \end{align} By the semigroup property of the Gaussian, \textit{i.e.} $\cG(s) \ast \cG(t) = \cG(s+t)$ for any $s,t> 0$, and the Fubini--Tonelli theroem, we obtain \begin{align*} & \int_{{\mathbb R}^n} \cG(G(t)+1,x) \cG(G(t)) \ast u_0(x) dx = \int_{{\mathbb R}^n} \cG(2G(t)+1,x) u_0(x) dx, \end{align*} and also get \begin{align*} & \int_{{\mathbb R}^n} \cG(G(t)+1,x) \{\cG(G(t)-G(s))\ast |u(s)|^{p} \}(x) dx \\ & = \int_{{\mathbb R}^n} \cG(2G(t)-G(s)+1,x) |u(s,x)|^{p} dx. \end{align*} Morover, we have \begin{align*} & \int_{{\mathbb R}^n} \cG(G(t)+1,x) \int_{0}^{t} \cG(G(t)-G(s)) \ast (g(s)u(s))_{ss} ds dx \\ &=\int_{{\mathbb R}^n} \cG(G(t)+1,x) \int_{0}^{t} \cG(G(t)-G(s)) \ast (g'(s)u(s))_{s} ds dx \\ &\quad + \int_{{\mathbb R}^n} \cG(G(t)+1,x) \int_{0}^{t} \cG(G(t)-G(s)) \ast (g(s)u_s(s))_{s} ds dx, \end{align*} and \begin{align*} &\int_{{\mathbb R}^n} \cG(G(t)+1,x) \int_{0}^{t} \cG(G(t)-G(s)) \ast (g(s)u_s(s))_{s} ds dx \\ &= \int_{0}^{t} \int_{{\mathbb R}^n} \cG(2G(t)-G(s)+1,x) (g(s)u_s(s))_s(x)dx ds \\ &= g(t) \int_{{\mathbb R}^n} \cG(G(t)+1,x) u_t(t,x)dx - \varepsilon g(0) \int_{{\mathbb R}^n} \cG(2G(t)+1,x) u_1(x)dx \\ &\quad + \int_{0}^{t} \int_{{\mathbb R}^n} g(s)^2 \cG'(2G(t)-G(s)+1,x) u_s(s,x)dx ds. \end{align*} Therefore, \eqref{eq2.6} implies \eqref{eq3.5} for the strong solution. \end{proof} \subsection{Estimate of each term} To obtain an ordinary differential inequality, we give estimates for each term of \eqref{eq3.5}. We set \begin{align*} A(t) & := \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} u(t,x) dx, \\ B(t) & := g(t) \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} \partial_t u(t,x) dx, \\ C(t) & := \varepsilon (4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \cG(2G(t)+1,x) (u_0+g(0)u_1)(x) dx, \\ D(t) & := (4\pi (G(t)+1))^{n/2} \int_{0}^{t} g(s) \int_{{\mathbb R}^n} \cG(2G(t)-G(s)+1,x) |u(s,x)|^{p} dx ds, \\ E(t) & := - (4\pi (G(t)+1))^{n/2} \int_{0}^{t}g(s)^2 \int_{{\mathbb R}^n} \cG'(2G(t)-G(s)+1,x) \partial_su (s,x) dx ds. \end{align*} Namely, \eqref{eq3.5} is $A+B=C+D+E$. \subsubsection{Estimate of $A$} First, we estimate $A$. Let $p'$ denote the H\"{o}lder conjugate of $p$ \textit{i.e.}\ $p'=p/(p-1)$. By the H\"{o}lder inequality, we obtain \begin{align*} A(t) &= \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} u(t,x) dx \\ & \leq \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} |u(t,x)| dx \\ & \leq \l( \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} dx \r)^{1/p'} \l(\int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} |u(t,x)|^{p} dx\r)^{1/p} \\ & = ( 4\pi (G(t)+1) )^{\frac{n}{2p'}} \l(\int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} |u(t,x)|^{p} dx\r)^{1/p}. \end{align*} We denote the right hand side by $F$, \textit{i.e.}\ \begin{align*} F(t):= ( 4\pi (G(t)+1) )^{\frac{n}{2p'}} \l(\int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} |u(t,x)|^{p} dx\r)^{1/p}. \end{align*} \subsubsection{Estimate of $B$} Secondly, we estimate $B$. By the Leibnitz rule, we have \begin{align*} B(t) & = g(t) \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} \partial_t u(t,x) dx \\ & = g(t)A'(t) - \frac{ g(t)^2}{G(t)+1} \int_{{\mathbb R}^n} \frac{ |x|^2}{4(G(t)+1)} e^{-\frac{|x|^2}{4(G(t)+1)}} u(t,x) dx. \end{align*} Here, by the H\"{o}lder inequality, we have \begin{align*} &\l| \frac{ g(t)^2}{G(t)+1} \int_{{\mathbb R}^n} \frac{ |x|^2}{4(G(t)+1)} e^{-\frac{|x|^2}{4(G(t)+1)}} u(t,x) dx \r| \\ &\leq \frac{ g(t)^2}{G(t)+1} \int_{{\mathbb R}^n} \frac{ |x|^2}{4(G(t)+1)} e^{-\frac{|x|^2}{4(G(t)+1)}} |u(t,x)| dx \\ &\leq \frac{ g(t)^2}{G(t)+1} \l( \int_{{\mathbb R}^n} \l(\frac{ |x|^2}{4(G(t)+1)} \r)^{p'} e^{-\frac{|x|^2}{4(G(t)+1)}} dx\r) ^{1/p'}\l(\int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} |u(t,x)|^{p} dx\r)^{1/p} \\ &\ceq \frac{g(t)^2}{G(t)+1} F(t). \end{align*} Therefore, we get \begin{align*} B(t) \leq g(t)A'(t) +C_{n,p} \frac{g(t)^2}{G(t)+1} F(t). \end{align*} \subsubsection{Estimate of $D$} Thirdly, we estimate $D$. Since $0\leq G(s) < G(t)$ for $t>s\geq 0$, we have \begin{align*} 0 \leq G(s)+1\leq 2G(t)-G(s)+1 \leq 2G(t)+1 \leq 2(G(t)+1). \end{align*} Therefore, we get \begin{align*} D(t) & = (4\pi (G(t)+1))^{n/2} \int_{0}^{t} g(s) \int_{{\mathbb R}^n} \cG(2G(t)-G(s)+1,x) |u(s,x)|^{p} dx ds \\ &= \int_{0}^{t} \l(\frac{G(t)+1}{2G(t)-G(s)+1}\r)^{n/2}g(s) \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(2G(t)-G(s)+1)}} |u(s,x)|^{p} dx ds \\ &\geq 2^{-\frac{n}{2}} \int_{0}^{t} g(s) \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(s)+1)}} |u(s,x)|^{p} dx ds \\ &= 2^{-\frac{n}{2}} \int_{0}^{t} g(s) ( 4\pi (G(s)+1) )^{-\frac{np}{2p'}} F(s)^p ds \\ &= 2^{-\frac{n}{2}} ( 4\pi )^{-\frac{np}{2p'}} \int_{0}^{t} \frac{g(s)F(s)^p}{(G(s)+1) ^{\frac{n}{2}(p-1)}} ds, \end{align*} where we note that $p/p'=p-1$. \subsubsection{Estimate of $E$} We give an estimate of $E$. By the integration by parts, we obtain \begin{align*} E(t) &= - (4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} [g(s)^2 \cG'(2G(t)-G(s)+1,x) u (s,x)]_{s=0}^{s=t}dx \\ &\quad +(4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \int_{0}^{t} \partial_s \{ g(s)^2 \cG'(2G(t)-G(s)+1,x) \} u (s,x) dsdx \\ &= - (4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} g(t)^2 \cG'(G(t)+1,x) u (t,x)dx \\ &\quad + \varepsilon (4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} g(0)^2 \cG'(2G(t)+1,x) u_0 (x)dx \\ &\quad +(4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \int_{0}^{t} 2 g(s)g'(s) \cG'(2G(t)-G(s)+1,x) u (s,x) dsdx \\ &\quad -(4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)^3 \cG''(2G(t)-G(s)+1,x) u (s,x) dsdx \\ &=:E_1(t)+E_2(t)+E_3(t)+E_4(t). \end{align*} By a simple calculation, we have \begin{align*} \cG'(t) &=\l(-\frac{n}{2t}+\frac{|x|^2}{4t^2}\r)\cG(t). \end{align*} The first term is estimated as follows. \begin{align*} |E_1(t) &\leq (4\pi (G(t)+1))^{n/2} \frac{ng(t)^2}{2(G(t)+1)} \int_{{\mathbb R}^n} \cG(G(t)+1,x) |u (t,x)|dx \\ & \quad +(4\pi (G(t)+1))^{n/2} \frac{g(t)^2}{G(t)+1} \int_{{\mathbb R}^n} \frac{|x|^2}{4(G(t)+1)} \cG(G(t)+1,x) |u (t,x)|dx \\ &\leq \frac{ng(t)^2}{2(G(t)+1)} \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(G(t)+1)}} |u (t,x)|dx \\ & \quad + \frac{g(t)^2}{G(t)+1} \int_{{\mathbb R}^n} \frac{|x|^2}{4(G(t)+1)} e^{-\frac{|x|^2}{4(G(t)+1)}} |u (t,x)|dx. \end{align*} In the same way as the estimates of $A$ and $B$, we obtain \begin{align*} |E_1(t)| &\leq C_{n,p} \frac{g(t)^2}{G(t)+1} F(t). \end{align*} The second term $E_2$ is related to the initial data. The estimate of $E_2$ is considered in Section \ref{sec2.3}. Now, we only note that the following equality holds. \begin{align*} E_2(t) &=-\varepsilon \l( \frac{G(t)+1}{2G(t)+1}\r)^{n/2} \frac{n g(0)^2}{2(2G(t)+1)} \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(2G(t)+1)}} u_0 (x)dx \\ &\quad +\varepsilon \l( \frac{G(t)+1}{2G(t)+1}\r)^{n/2} \frac{g(0)^2 }{2G(t)+1} \int_{{\mathbb R}^n} \frac{|x|^2}{4(2G(t)+1)} e^{-\frac{|x|^2}{4(2G(t)+1)}} u_0 (x)dx. \end{align*} The third term $E_3$ is estimated as follows. Since $2G(t)-G(s)+1 > G(t)+1$ for $t > s\geq0$, we have \begin{align*} &|E_3(t)| \\ & \leq \frac{n(4\pi)^{n/2}}{2} ( G(t)+1)^{n/2-1} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)|g'(s)| \cG(2G(t)-G(s)+1,x) |u (s,x)| dsdx \\ &\quad +2(4\pi)^{n/2} (G(t)+1)^{n/2-1} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)|g'(s)| \frac{|x|^2 \cG(2G(t)-G(s)+1,x) }{4(2G(t)-G(s)+1)} |u (s,x)| dsdx \\ &=:E_{31}(t) + E_{32}(t). \end{align*} By the H\"{o}lder inequality and the Young inequality, we obtain \begin{align*} &E_{31}(t) \\ &\ceq ( G(t)+1)^{n/2-1} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)|g'(s)| \cG(2G(t)-G(s)+1,x) |u (s,x)| dsdx \\ &\leq ( G(t)+1)^{n/2-1} \l( \int_{{\mathbb R}^n} \int_{0}^{t} g(s)|g'(s)|^{p'} \cG(2G(t)-G(s)+1,x) dsdx\r)^{1/p'} \\ & \quad \times \l(\int_{{\mathbb R}^n} \int_{0}^{t} g(s)\cG(2G(t)-G(s)+1,x) |u (s,x)|^p dsdx \r)^{1/p} \\ &\ceq ( G(t)+1)^{\frac{n}{2p'}-1} \l( \int_{0}^{t} g(s)|g'(s)|^{p'} ds\r)^{1/p'} D(t)^{1/p} \\ &\leq \frac{1}{8}D(t) + C_{n,p} ( G(t)+1)^{\frac{n}{2}-p'} \l( \int_{0}^{t} g(s)|g'(s)|^{p'} ds\r). \end{align*} In the same manner, we get \begin{align*} & E_{32}(t) \\ & \ceq (G(t)+1)^{n/2-1} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)|g'(s)| \frac{|x|^2 \cG(2G(t)-G(s)+1,x) }{4(2G(t)-G(s)+1)} |u (s,x)| dsdx \\ & \leq (G(t)+1)^{n/2-1} \l(\int_{{\mathbb R}^n} \int_{0}^{t} g(s)\cG(2G(t)-G(s)+1,x) |u (s,x)|^p dsdx \r)^{1/p} \\ & \quad \times \l( \int_{{\mathbb R}^n} \int_{0}^{t} g(s)|g'(s)|^{p'} \l( \frac{|x|^2}{4(2G(t)-G(s)+1)} \r)^{p'}\cG(2G(t)-G(s)+1,x) dsdx\r)^{1/p'} \\ & \ceq (G(t)+1)^{\frac{n}{2p'}-1} D(t)^{1/p} \l( \int_{0}^{t} g(s)|g'(s)|^{p'}ds\r)^{1/p'} \\ & \leq \frac{1}{8}D(t) + C_{n,p} (G(t)+1)^{\frac{n}{2}-p'} \l( \int_{0}^{t} g(s)|g'(s)|^{p'}ds\r). \end{align*} Therefore, we conclude that \begin{align*} |E_3(t)| \leq \frac{1}{4} D(t) +C_{n,p} (G(t)+1)^{\frac{n}{2}-p'} \l( \int_{0}^{t} g(s)|g'(s)|^{p'}ds\r). \end{align*} At last, we consider $E_4$. Now, an easy calculation gives us \begin{align*} \cG''(t) & =\l(\frac{2n+n^2}{4t^2}-\frac{(n+2)|x|^2}{4t^3}+\frac{|x|^4}{16t^4}\r)\cG(t). \end{align*} Therefore, we have \begin{align*} E_4(t) &=-(4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)^3 \frac{(2n+n^2)\cG(2G(t)-G(s)+1,x) }{4(2G(t)-G(s)+1)^2} u (s,x) dsdx \\ &\quad +(4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)^3 \frac{(n+2)|x|^2\cG(2G(t)-G(s)+1,x) }{4(2G(t)-G(s)+1)^3} u (s,x) dsdx \\ &\quad -(4\pi (G(t)+1))^{n/2} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)^3 \frac{|x|^4\cG(2G(t)-G(s)+1,x) }{16(2G(t)-G(s)+1)^4} u (s,x) dsdx. \end{align*} Since $2G(t)-G(s)+1 > G(t)+1$ for $t > s\geq0$, we have \begin{align*} |E_4(t)| &\lesssim (G(t)+1)^{n/2-2} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)^3 \cG(2G(t)-G(s)+1,x) |u (s,x)| dsdx \\ & \quad + (G(t)+1)^{n/2-2} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)^3 \frac{|x|^2\cG(2G(t)-G(s)+1,x) }{4(2G(t)-G(s)+1)} |u (s,x) |dsdx \\ &\quad +(G(t)+1)^{n/2-2} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)^3 \frac{|x|^4\cG(2G(t)-G(s)+1,x) }{16(2G(t)-G(s)+1)^2} |u (s,x)| dsdx \\ &=: E_{41}(t)+E_{42}(t)+E_{43}(t). \end{align*} We estimate $E_{41}$. By the H\"{o}lder inequality and the Young inequality, we get \begin{align*} E_{41}(t)&\ceq (G(t)+1)^{n/2-2} \int_{{\mathbb R}^n} \int_{0}^{t} g(s)^3 \cG(2G(t)-G(s)+1,x) |u (s,x)| dsdx \\ &\leq (G(t)+1)^{n/2-2} \l( \int_{{\mathbb R}^n} \int_{0}^{t} g(s)^{2p'+1} \cG(2G(t)-G(s)+1,x) dsdx\r)^{1/p'} \\ & \quad \times \l(\int_{{\mathbb R}^n} \int_{0}^{t} g(s)\cG(2G(t)-G(s)+1,x) |u (s,x)|^p dsdx \r)^{1/p} \\ & \ceq ( G(t)+1)^{\frac{n}{2p'}-2} \l( \int_{0}^{t} g(s)^{2p'+1} ds\r)^{1/p'} D(t)^{1/p} \\ & \leq \frac{1}{12} D(t) +C_{n,p} ( G(t)+1)^{\frac{n}{2}-2p'} \l( \int_{0}^{t} g(s)^{2p'+1} ds\r). \end{align*} By the same way, $E_{42}$ and $E_{43}$ can be estimated as follows. \begin{align*} E_{42}(t),E_{43}(t) \leq \frac{1}{12} D(t) +C_{n,p} ( G(t)+1)^{\frac{n}{2}-2p'} \l( \int_{0}^{t} g(s)^{2p'+1} ds\r). \end{align*} By combining these estimates, we obtain \begin{align*} |E_{4}(t)| \leq \frac{1}{4} D(t) +C_{n,p} ( G(t)+1)^{\frac{n}{2}-2p'} \l( \int_{0}^{t} g(s)^{2p'+1} ds\r). \end{align*} \subsection{Reducing to an ordinary differential inequality} \label{sec2.3} We apply the above estimates to \eqref{eq3.5} to obtain an ordinary differential inequality. From \eqref{eq3.5}, by the estimate of $B$, we obtain \begin{align*} A(t)+g(t)A'(t)+C_{1} \frac{g(t)^2 F(t)}{G(t)+1} -E(t) \geq C(t) +D(t). \end{align*} By the estimate of $E$, we get \begin{align*} &A(t)+g(t)A'(t)+C_{2} \frac{g(t)^2 F(t)}{G(t)+1} \\ &+C_{3} ( G(t)+1)^{\frac{n}{2}-2p'} \l( \int_{0}^{t} g(s)^{2p'+1} ds\r) \\ &+C_{4} (G(t)+1)^{\frac{n}{2}-p'} \l( \int_{0}^{t} g(s)|g'(s)|^{p'}ds\r) \\ & \geq C(t)-E_2(t) +\frac{1}{2}D(t). \end{align*} Applying the estimate of $D$, we get, for any $t>0$, \begin{align} \label{eq3.6} A(t)+g(t)A'(t)+C_{2} \frac{g(t)^2 F(t)}{G(t)+1} \geq C_5 \int_{0}^{t} \frac{g(s)F(s)^p}{(G(s)+1) ^{\frac{n}{2}(p-1)}} ds +\varepsilon H(t) -I(t), \end{align} where we set \begin{align*} H(t)&:= \varepsilon^{-1}(C(t)-E_2(t) ), \\ I(t)&:=C_{3} ( G(t)+1)^{\frac{n}{2}-2p'} \l( \int_{0}^{t} g(s)^{2p'+1} ds\r) \\ &\quad +C_{4} (G(t)+1)^{\frac{n}{2}-p'} \l( \int_{0}^{t} g(s)|g'(s)|^{p'}ds\r). \end{align*} Multiplying $g(t)^{-1}e^{\Gamma(t)}=(e^{\Gamma(t)})'$, we get \begin{align*} &(e^{\Gamma(t)}A(t))' +C_{2} \frac{g(t) e^{\Gamma(t)} F(t)}{G(t)+1} \\ & \geq C_5 (e^{\Gamma(t)})' \int_{0}^{t} \frac{g(s)F(s)^p}{(G(s)+1) ^{\frac{n}{2}(p-1)}} ds +(e^{\Gamma(t)})'( \varepsilon H(t) -I(t)). \end{align*} Integrating this on $[0,t]$, we obtain \begin{align*} &e^{\Gamma(t)}A(t)-A(0)+C_{2} \int_{0}^{t} \frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau \\ &\geq C_5 \int_{0}^{t} (e^{\Gamma(\tau)})' \int_{0}^{\tau} \frac{g(s)F(s)^p}{(G(s)+1) ^{\frac{n}{2}(p-1)}} ds d\tau + \int_{0}^{t} (e^{\Gamma(\tau)})'( \varepsilon H(\tau) -I(\tau))d\tau. \end{align*} Since we have the identity \begin{align*} \int_{0}^{t} (e^{\Gamma(\tau)})' \int_{0}^{\tau} \frac{g(s)F(s)^p}{(G(s)+1) ^{\frac{n}{2}(p-1)}} ds d\tau = \int_{0}^{t} \frac{ (e^{\Gamma(t)}- e^{\Gamma(\tau)}) g(\tau)F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau, \end{align*} and the estimate of $A$, we obtain \begin{align*} &e^{\Gamma(t)}F(t)+C_{2} \int_{0}^{t} \frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau \\ &\geq C_5 \int_{0}^{t} \frac{ (e^{\Gamma(t)}- e^{\Gamma(\tau)}) g(\tau)F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau + \int_{0}^{t} (e^{\Gamma(\tau)})'( \varepsilon H(\tau) -I(\tau))d\tau+A(0). \end{align*} Multiplying $g^{-1}$ and integrating on $[0,t]$, we obtain \begin{align} \label{eq3.7} & \int_{0}^{t} \frac{1}{g(s)} e^{\Gamma(s)}F(s) ds +C_{2}\int_{0}^{t} \frac{1}{g(s)} \int_{0}^{s} \frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau ds \\ \notag &\geq C_5 \int_{0}^{t} \frac{1}{g(s)} \int_{0}^{s} \frac{ (e^{\Gamma(s)}- e^{\Gamma(\tau)}) g(\tau)F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau ds \\ \notag &+ \int_{0}^{t} \frac{1}{g(s)} \l\{ \int_{0}^{s} (e^{\Gamma(\tau)})'( \varepsilon H(\tau) -I(\tau))d\tau+A(0)\r\} ds. \end{align} We consider the left hand side. \begin{align} \label{eq3.8} &\int_{0}^{t} \frac{1}{g(s)} e^{\Gamma(s)}F(s) ds +C_{2}\int_{0}^{t} \frac{1}{g(s)} \int_{0}^{s} \frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau ds \\ \notag &\lesssim \int_{0}^{t} \l\{ \frac{1}{g(s)} e^{\Gamma(s)}F(s) + \frac{1}{g(s)} \int_{0}^{s} \frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau \r\} ds. \end{align} Letting $\chi_\beta =1$ if $\beta=-1$ and $\chi_\beta=0$ if $\beta\in(-1,1)$, then we have \begin{align*} &\frac{d}{ds} \l( \{ \log (s+1)+1\}^{\chi_\beta}(\Gamma(s)+1)\int_{0}^{s}\frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau\r) \\ &=\frac{\chi_\beta}{s+1} (\Gamma(s)+1)\int_{0}^{s}\frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau \\ &\quad +\{ \log (s+1)+1\}^{\chi_\beta}\frac{1}{g(s)}\int_{0}^{s}\frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau \\ &\quad +\{ \log (s+1)+1\}^{\chi_\beta}(\Gamma(s)+1) \frac{g(s) e^{\Gamma(s)} F(s)}{G(s)+1}. \end{align*} Since the first term in the right hand side is non-negative, $\{ \log (s+1)+1\}^{\chi_\beta} \geq1$ holds for any $ s\geq 0$ and $\beta \in [-1,1)$, and we have, by Lemma \ref{lem2.2}, \begin{align*} & \{ \log (s+1)+1\}^{\chi_\beta}(\Gamma(s)+1) \frac{g(s)}{G(s)+1} \\ & \ceq \begin{cases} \{ \log (s+1)+1\} (s+1)^{2} \frac{(s+1)^{-1}}{\log(s+1)+1} & \text{ if } \beta=-1, \\ (s+1)^{-\beta+1} \frac{(s+1)^{\beta}}{(s+1)^{\beta+1}} & \text{ if } \beta\in(-1,1) \end{cases} \\ & = \begin{cases} s+1 & \text{ if } \beta=-1, \\ (s+1)^{-\beta} & \text{ if } \beta\in(-1,1) \end{cases} \\ & \ceq \frac{1}{g(s)}, \end{align*} we get \begin{align*} &\frac{d}{ds} \l( \{ \log (s+1)+1\}^{\chi_\beta}(\Gamma(s)+1)\int_{0}^{s}\frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau\r) \\ & \gtrsim \frac{1}{g(s)} e^{\Gamma(s)}F(s) + \frac{1}{g(s)} \int_{0}^{s} \frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau. \end{align*} Therefore, by \eqref{eq3.8}, we get \begin{align*} &\int_{0}^{t} \frac{1}{g(s)} e^{\Gamma(s)}F(s) ds +C_{2}\int_{0}^{t} \frac{1}{g(s)} \int_{0}^{s} \frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau ds \\ &\lesssim \int_{0}^{t} \frac{d}{ds} \l( \{ \log (s+1)+1\}^{\chi_\beta}(\Gamma(s)+1)\int_{0}^{s}\frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau\r) ds \\ &= \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1)\int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau \\ &=:X(t). \end{align*} We set \begin{align*} Y(t):= \int_{0}^{t} \frac{1}{g(s)} \int_{0}^{s} \frac{ (e^{\Gamma(s)}- e^{\Gamma(\tau)}) g(\tau)F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau ds. \end{align*} Then, by \eqref{eq3.7}, we get \begin{align} \label{eq3.9} C_6 X(t) \geq C_5 Y(t)+ \int_{0}^{t} \frac{1}{g(s)} \l\{ \int_{0}^{s} (e^{\Gamma(\tau)})'( \varepsilon H(\tau) -I(\tau))d\tau+A(0)\r\} ds. \end{align} Now, we have \begin{align*} Y'(t)= \frac{1}{g(t)} \int_{0}^{t} \frac{ (e^{\Gamma(t)}- e^{\Gamma(\tau)}) g(\tau)F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau, \end{align*} and \begin{align*} Y''(t) &=- \frac{g'(t)}{g(t)^2} \int_{0}^{t} \frac{ (e^{\Gamma(t)}- e^{\Gamma(\tau)}) g(\tau)F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau + \frac{e^{\Gamma(t)} }{g(t)^2} \int_{0}^{t} \frac{ g(\tau)F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau \\ &=-\frac{g'(t)}{g(t)} Y'(t)+\frac{1}{g(t)}\l( Y'(t) + \frac{1}{g(t)} \int_{0}^{t} \frac{ e^{\Gamma(\tau)} g(\tau)F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau\r). \end{align*} Therefore, we have \begin{align} \label{eq2.11} g(t)Y''(t)+g'(t)Y'(t) -Y'(t) =\frac{1}{g(t)} \int_{0}^{t} \frac{ e^{\Gamma(\tau)} g(\tau)F(\tau)^p}{(G(\tau)+1)^{\frac{n}{2}(p-1)}} d\tau. \end{align} On the other hand, by the H\"{o}lder inequality, we have \begin{align} \label{eq2.12} X(t)&=\{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1)\int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)} F(\tau)}{G(\tau)+1} d\tau \\ \notag &\leq \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1) \l( \int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)} F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau \r)^{1/p} \\ \notag &\quad \times \l( \int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)}}{(G(\tau)+1) ^{\l(1-\frac{n(p-1)}{2p}\r)p'}} d\tau\r)^{1/p'} \\ \notag &= \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1) \l( \int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)} F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau \r)^{1/p} \\ \notag &\quad \times \l( \int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}} d\tau\r)^{1/p'}. \end{align} Therefore, combining \eqref{eq2.11} with \eqref{eq2.12}, we get \begin{align} \label{eq2.13} &g(t)Y''(t)+g'(t)Y'(t) -Y'(t) \\ \notag &=\frac{1}{g(t)} \int_{0}^{t} \frac{ e^{\Gamma(\tau)} g(\tau)F(\tau)^p}{(G(\tau)+1)^{\frac{n}{2}(p-1)}} d\tau \\ \notag &\geq \frac{1}{g(t)} X(t)^p \l[ \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1)\r]^{-p} \l( \int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}} d\tau\r)^{-p/p'}. \end{align} We want to apply \eqref{eq3.9} to the above inequality. It is not clear whether the right hand side in \eqref{eq3.9} is positive for any $t>0$. However, for sufficiently large $t$, the right hand side is positive. To see this, we consider the second term in the right hand side of \eqref{eq3.9}, that is, \begin{align*} \int_{0}^{t} \frac{1}{g(s)} \l\{ \int_{0}^{s} (e^{\Gamma(\tau)})'( \varepsilon H(\tau) -I(\tau))d\tau+A(0)\r\} ds. \end{align*} We recall that \begin{align*} H(t) &=\varepsilon^{-1}(C(t)-E_2(t) ) \\ & = \l( \frac{G(t)+1}{2G(t)+1}\r)^{n/2} \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(2G(t)+1)}} (u_0+g(0)u_1)(x) dx \\ &\quad + \l( \frac{G(t)+1}{2G(t)+1}\r)^{n/2} \frac{n g(0)^2}{2(2G(t)+1)} \int_{{\mathbb R}^n} e^{-\frac{|x|^2}{4(2G(t)+1)}} u_0 (x)dx \\ &\quad - \l( \frac{G(t)+1}{2G(t)+1}\r)^{n/2} \frac{g(0)^2 }{2G(t)+1} \int_{{\mathbb R}^n} \frac{|x|^2}{4(2G(t)+1)} e^{-\frac{|x|^2}{4(2G(t)+1)}} u_0 (x)dx. \end{align*} Since $G(t) \to \infty $ as $t\to \infty$ and $u_0$, $u_1$ belong to $L^1({\mathbb R}^n)$, the dominated convergence theorem implies \begin{align*} \lim_{t\to \infty} H(t) = 2^{-n/2} \int_{{\mathbb R}^n} u_0(x)+g(0)u_1(x) dx=:J_0. \end{align*} Moreover, by the assumption on the initial data, there exists $t_1 = t_1(n,u_0,u_1)>0$ such that \[ H(t) > \frac{J_0}{2}>0 \text{ for any } t \geq t_1.\] Next, we treat $I$. \begin{align*} I(t)&=C_{3} ( G(t)+1)^{\frac{n}{2}-2p'} \l( \int_{0}^{t} g(s)^{2p'+1} ds\r) \\ &\quad +C_{4} (G(t)+1)^{\frac{n}{2}-p'} \l( \int_{0}^{t} g(s)|g'(s)|^{p'}ds\r) \\ &=:I_1(t)+I_2(t). \end{align*} We consider the first term $I_1$. First, we consider the case of $\beta \in (-1,1)$. Since we have \begin{align*} \int_{0}^{t} g(s)^{2p'+1} ds \ceq \int_{0}^{t} (s+1)^{\beta(2p'+1)} ds \lesssim \begin{cases} (t+1)^{\beta(2p'+1)+1} & \text{ if } \beta \neq -1/(2p'+1), \\ \log(t+1) & \text{ if } \beta = -1/(2p'+1), \end{cases} \end{align*} and Lemma \ref{lem2.2} (iv), we obtain \begin{align*} I_1(t) & \lesssim \begin{cases} (t+1)^{(\beta+1) \l( \frac{n}{2}+1\r)-2p'} & \text{ if } \beta \neq -1/(2p'+1), \\ (t+1)^{(\beta+1)\l( \frac{n}{2}-2p'\r)} \log(t+1) & \text{ if } \beta = -1/(2p'+1) \end{cases} \\ &\leq \begin{cases} (t+1)^{(\beta+1) \l( \frac{n}{2}+1\r)-2p'} & \text{ if } \beta \neq -1/(2p'+1), \\ (t+1)^{(\beta+1)\l( \frac{n}{2}-2p'\r)+\delta} & \text{ if } \beta = -1/(2p'+1), \end{cases} \end{align*} for any $\delta>0$. Since $p=1+2/n$, we have $p' = 1+n/2$. Therefore, in the first case, \textit{i.e.} $ \beta \neq -1/(2p'+1)$, we get \begin{align*} (\beta+1) \l( \frac{n}{2}+1\r)-2p' =(\beta-1) \l( \frac{n}{2}+1\r) <0 \end{align*} since $\beta<1$. In the second case, \textit{i.e.} $ \beta = -1/(2p'+1)$, noting that $\beta = -1/(2p'+1)>-1$, we have \begin{align*} (\beta+1) \l( \frac{n}{2} -2p'\r) &\leq -(\beta+1) \l( \frac{n}{2} +2\r)<0. \end{align*} Take sufficiently small $\delta>0$ such that $(\beta+1) \l( n/2 -2p'\r) +\delta<0$. Then, we take $t_2=t_2(\varepsilon_0, \beta,n,p)>0$ such that \begin{align*} &t_2 =( C \varepsilon_0)^{\frac{1}{(\beta+1) \l( \frac{n}{2}+1\r)-2p'}} -1 \text{ if } \beta \neq -1/(2p'+1), \\ &t_2 =( C \varepsilon_0)^{\frac{1}{(\beta+1)\l( \frac{n}{2}-2p'\r)+\delta}}-1 \text{ if } \beta = -1/(2p'+1). \end{align*} Then we have \begin{align*} &(t+1)^{(\beta+1) \l( \frac{n}{2}+1\r)-2p'} \leq C \varepsilon_0 \text{ if } \beta \neq -1/(2p'+1), \\ &(t+1)^{(\beta+1)\l( \frac{n}{2}-2p'\r)+\delta} \leq C \varepsilon_0 \text{ if } \beta = -1/(2p'+1), \end{align*} for any $t>t_{2}$ and thus we have $I_1(t)\leq C \varepsilon_0$ for $t>t_2$. Next, we consider the case of $\beta=-1$. Then, $\beta \neq -1/(2p'+1)$. Therefore, \begin{align*} I_1(t) & \lesssim (\log (t+1)+1)^{\frac{n}{2}-2p'} (t+1)^{\beta(2p'+1)+1} \\ & \leq (\log (t+1)+1)^{\frac{n}{2}-2p'} (t+1)^{-2p'} \\ & \leq (t+1)^{-2p'}, \end{align*} since $n/2-2p'<0$. Thus, $I_1(t)\lesssim \varepsilon_0$ for $t>t_2=t_2(\varepsilon_0):= C \varepsilon_0^{-1/(2p')}-1$. Secondly, we treat the second term $I_2$. By Lemma \ref{lem2.2} (iii), there exists $t_3=t_3(\beta)>0$ such that $|g'(t)|\ceq (t+1)^{\beta-1}$ for $t>t_3$. We take $t_4=t_4 (\varepsilon_0, \beta,n,p)>0$ such that \begin{align*} t_4= \l(\frac{1}{2} \varepsilon_0\r)^{\frac{1}{(\beta-1)p'}}-1. \end{align*} Taking sufficiently small $\varepsilon_0>0$, we may assume that $t_4>t_3$. Then, $|g'(t)| \lesssim (t+1)^{\beta-1} \leq (\varepsilon_0/2)^{1/p'}$ for $t>t_4$. As seen in Lemma \ref{lem2.2} (i), $g'(t)$ converges to $0$ as $t \to \infty$ . Thus, we can define $m:=\max_{t\in[0,\infty)} |g'(t)| < \infty$. Then, for $t>t_4$, we have \begin{align*} \int_{0}^{t} g(s)|g'(s)|^{p'}ds &= \int_{0}^{t_4} g(s)|g'(s)|^{p'}ds + \int_{t_4}^{t} g(s)|g'(s)|^{p'}ds \\ &\leq m^{p'} G(t_4)+ \frac{C}{2} \varepsilon_0 G(t), \end{align*} where we have used $|g'(t)|^{p'}<\varepsilon_0/2 $ for $t>t_4$ We show that there exists $t_5=t_5 (\varepsilon_0,\beta,n,p)>0$ such that $m^{p'} G(t_4) \lesssim \varepsilon_0 G(t)/2$. We consider the case of $\beta \neq -1$. Then, we have \begin{align*} G(t_4 ) \leq C (t_4+1)^{\beta+1} \ceq \l( \frac{1}{2} \varepsilon_0\r)^{\frac{\beta+1}{(\beta-1)p'}}. \end{align*} Take $t_5=t_5(\varepsilon_0,\beta,n,p) := \varepsilon_0^{\frac{1}{(\beta-1)p'}-\frac{1}{\beta+1}}-1$. Then, for $t>t_5$, \begin{align*} \varepsilon_0 G(t) \geq \varepsilon_0 G(t_5) \gtrsim \varepsilon_0^{\frac{\beta+1}{(\beta-1)p'}} \geq G(t_4). \end{align*} We consider the case of $\beta = -1$. Then, we have \begin{align*} G(t_4) \leq C \log(t_4+1) \leq C \log\l\{ \l(\frac{1}{2} \varepsilon_0\r)^\frac{1}{(\beta-1)p'} \r\}. \end{align*} Take $t_5= t_5 (\varepsilon_0,\beta,n,p) = \exp \{ \varepsilon_0^{-1}\log (\varepsilon_0/2)^{\frac{1}{(\beta-1)p'} }\}-1$. Then, for $t>t_5$, \begin{align*} \varepsilon_0 G(t) \geq \varepsilon_0 G(t_5) \gtrsim \varepsilon_0 \log( t_5+1)= \log\l\{ \l(\frac{1}{2} \varepsilon_0\r)^\frac{1}{(\beta-1)p'} \r\} \gtrsim G(t_4). \end{align*} Therefore, for $t>t_5$, we have \begin{align*} \int_{0}^{t} g(s)|g'(s)|^{p'}ds \leq m^{p'} G(t_4)+ \frac{C}{2} \varepsilon_0 G(t) \leq C \varepsilon_0 G(t), \end{align*} and thus we obtain \begin{align*} I_2(t) \lesssim (G(t)+1)^{\frac{n}{2}-p'+1} \frac{\int_{0}^{t} g(s)|g'(s)|^{p'}ds}{G(t)} \lesssim \varepsilon_0, \end{align*} where we also use $n/2-p'+1 = 0$ in the last inequality. By the above argument, we get \begin{align*} I(t) \leq C' \varepsilon_{0} \end{align*} for $t>\max\{t_2,t_5\}$. Let $\varepsilon_0$ be sufficiently small such that $C' \varepsilon_0< J_0 \varepsilon /4$. Take large $t_6=t_6(\varepsilon, \beta, n,p)=\max \{t_1, t_2,\cdots, t_5 \}$, where $t_j$ ($j=1,\cdots, 5$) are defined before. Noting that $A(0)=\varepsilon A_0$, where $A_0$ is a constant, then, we get \begin{align*} &\int_{0}^{t} \frac{1}{g(s)} \l\{ \int_{0}^{s} (e^{\Gamma(\tau)})'( \varepsilon H(\tau) -I(\tau))d\tau+A(0)\r\} ds \\ & = \int_{0}^{t_6} \frac{1}{g(s)} \int_{0}^{s} (e^{\Gamma(\tau)})'( \varepsilon H(\tau) -I(\tau))d\tau ds \\ &\quad + \int_{t_6}^{t} \frac{1}{g(s)} \int_{0}^{t_6} (e^{\Gamma(\tau)})'( \varepsilon H(\tau) -I(\tau))d\tau ds \\ &\quad + \int_{t_6}^{t} \frac{1}{g(s)} \int_{t_6}^{s} (e^{\Gamma(\tau)})'( \varepsilon H(\tau) -I(\tau))d\tau ds \\ &\quad + \varepsilon A_0 \Gamma (t) \\ & =: I + I\!\!I + I\!\!I\!\!I + \varepsilon A_0 \Gamma (t) \end{align*} We estimate the terms $I$, $I\!\!I$, and $I\!\!I\!\!I$. For $t>t_6$, we have $H(t)>J_0/2>0$ as seen before. Moreover, we have $I(t) \leq C \varepsilon_0 \leq J_0 \varepsilon /4 $ for $t>t_6$. This implies that $\varepsilon H(t) -I(t) \geq J_0 \varepsilon /4$ for $t>t_6$. Noting that $(e^{\Gamma(t)})' \geq0$, we can estimate $I\!\!I\!\!I$ as follows. \begin{align*} I\!\!I\!\!I &\geq \frac{J_0}{4} \varepsilon \int_{t_6}^{t} \frac{1}{g(s)} \int_{t_6}^{s} (e^{\Gamma(\tau)})' d\tau ds \\ &= \frac{J_0}{4} \varepsilon \int_{t_6}^{t} \frac{1}{g(s)} (e^{\Gamma(s)}-e^{\Gamma(t_6)}) ds \\ &= \frac{J_0}{4} \varepsilon \l\{ (e^{\Gamma(t)}-e^{\Gamma(t_6)}) - (\Gamma(t)-\Gamma(t_6) ) e^{\Gamma(t_6)}\r\}. \end{align*} Next, we consider the estimate of $I\!\!I$. Now, since $H$ is continuous and has a limit as $t \to \infty$, $H$ is bounded on $[0,\infty)$. Therefore, we can set $M_h:=\max_{t\in [0,\infty)}H(t)<\infty$. Similarly, we can also define $M_i:=\max_{t\in [0,\infty)} I(t)<\infty$. Then, since we have $\varepsilon H(t) -I(t) \geq - (\varepsilon M_h +M_i)$, $I\!\!I$ can be estimated as follows. \begin{align*} I\!\!I & \geq - (\varepsilon M_h +M_i)\int_{t_6}^{t} \frac{1}{g(s)} \int_{0}^{t_6} (e^{\Gamma(\tau)})' d\tau ds \\ & = -(\varepsilon M_h +M_i) (\Gamma(t)-\Gamma(t_6)) (e^{\Gamma(t_{\varepsilon})}-1). \end{align*} At last, in the same manner, $I$ can be estimated as follows. \begin{align*} I &\geq - (\varepsilon M_h +M_i) \int_{0}^{t_6} \frac{1}{g(s)} \int_{0}^{s} (e^{\Gamma(\tau)})' d\tau ds \\ &= - (\varepsilon M_h +M_i) \l\{ (e^{\Gamma(t_6)}-1) - \Gamma(t_6) \r\}. \end{align*} Combining these estimates, we obtain \begin{align*} I + I\!\!I + I\!\!I\!\!I + \varepsilon A_0 \Gamma (t) &\geq - (\varepsilon M_h +M_i) \l\{ e^{\Gamma(t_6)}-1 +(\Gamma(t)-\Gamma(t_6)) e^{\Gamma(t_6)} -\Gamma(t) \r\} \\ & \quad + C\varepsilon \l\{ (e^{\Gamma(t)}-e^{\Gamma(t_6)}) - (\Gamma(t)-\Gamma(t_6) ) e^{\Gamma(t_6)}\r\} + \varepsilon A_0 \Gamma (t) \\ &\geq - (\varepsilon M_h +M_i) \l\{ e^{\Gamma(t_6)} +(\Gamma(t)-\Gamma(t_6)) e^{\Gamma(t_6)} \r\} \\ &\quad + C\varepsilon \l\{ (e^{\Gamma(t)}-e^{\Gamma(t_6)}) - (\Gamma(t)-\Gamma(t_6) ) e^{\Gamma(t_6)}\r\} + \varepsilon A_0 \Gamma (t) \\ &= - (\varepsilon M_h +M_i) \l\{ e^{\Gamma(t_6)} +(\Gamma(t)-\Gamma(t_6)) e^{\Gamma(t_6)} \r\} \\ & \quad + C\varepsilon \l\{ (e^{\Gamma(t)}-e^{\Gamma(t_6)}) - (\Gamma(t)-\Gamma(t_6) ) e^{\Gamma(t_6)}\r\} \\ & \quad + \varepsilon A_0 \Gamma (t)+\Gamma(t_6)\varepsilon |A_0| e^{\Gamma(t_6)}-\Gamma(t_6)\varepsilon |A_0| e^{\Gamma(t_6)} \\ &\geq - (\varepsilon M_h +M_i) \l\{ e^{\Gamma(t_6)} +(\Gamma(t)-\Gamma(t_6)) e^{\Gamma(t_6)} \r\} \\ &\quad + C\varepsilon \l\{ (e^{\Gamma(t)}-e^{\Gamma(t_6)}) - (\Gamma(t)-\Gamma(t_6) ) e^{\Gamma(t_6)}\r\} \\ & \quad - \Gamma (t) \varepsilon |A_0| e^{\Gamma(t_6)} +\Gamma(t_6)\varepsilon |A_0| e^{\Gamma(t_6)}-\Gamma(t_6)\varepsilon |A_0| e^{\Gamma(t_6)} \\ &= - (\varepsilon M_h +M_i) (\Gamma(t)-\Gamma(t_6)) e^{\Gamma(t_6)} - (\varepsilon M_h +M_i) e^{\Gamma(t_6)} \\ &\quad + C\varepsilon e^{\Gamma(t)}- C\varepsilon e^{\Gamma(t_6)} - C\varepsilon (\Gamma(t)-\Gamma(t_6) ) e^{\Gamma(t_6)} \\ &\quad - ( \Gamma (t) - \Gamma(t_6))\varepsilon |A_0| e^{\Gamma(t_6)} -\Gamma(t_6)\varepsilon |A_0| e^{\Gamma(t_6)} \\ &\geq - (\varepsilon M_h +M_i+C\varepsilon+\Gamma(t_6) \varepsilon |A_0| ) (\Gamma(t)-\Gamma(t_6)) e^{\Gamma(t_6)} \\ &\quad - (\varepsilon M_h +M_i +C\varepsilon+\Gamma(t_6) \varepsilon |A_0|) e^{\Gamma(t_6)} + C\varepsilon e^{\Gamma(t)} \\ &= e^{\Gamma(t_6)} \l\{ C\varepsilon e^{\Gamma(t)-\Gamma(t_6)} -K_{\varepsilon} -K_{\varepsilon} (\Gamma(t)-\Gamma(t_6))\r\}, \end{align*} where $K_{\varepsilon}:=\varepsilon M_h +M_i+C\varepsilon+\Gamma(t_6)\varepsilon |A_0|$. We set $\lambda(t):=\Gamma(t)-\Gamma(t_6)$ and $U(t):= C\varepsilon e^{\lambda(t)} -K_{\varepsilon}-K_{\varepsilon}\lambda(t)$. We find $t$ such that $U(t)> C_7 \varepsilon e^{\lambda(t)}$, where $C_7<C$. If we take $t_7$ such that $\lambda(t_7)> 2\log ((C-C_7)^{-1}K_{\varepsilon} \varepsilon^{-1}) + M$, where $M$ is a positive constant such that $e^{s/2}<e^{s}/(s+1)$ for $s>M$, then $U(t)-C_7 \varepsilon e^{\lambda(t)}$ is increasing for $t>t_7$ and thus \begin{align*} U(t)-C_7 \varepsilon e^{\lambda(t)} &= (C-C_7)\varepsilon e^{\lambda(t)} -K_{\varepsilon}-K_{\varepsilon}\lambda(t) \\ &\geq (C-C_7)\varepsilon e^{\lambda(t_7)} -K_{\varepsilon}-K_{\varepsilon}\lambda(t_7) \\ &=\l\{ (C-C_7)\varepsilon e^{\lambda(t_7)} \{\lambda(t_7)+1\}^{-1} -K_{\varepsilon} \r\} (\lambda(t_7)+1) \\ &> \l\{ (C-C_7)\varepsilon e^{\lambda(t_7)/2} -K_{\varepsilon} \r\}( \lambda(t_7)+1) \\ &\geq \l\{ (C-C_7)\varepsilon e^{\log ((C-C_7)^{-1}K_{\varepsilon} \varepsilon^{-1})} -K_{\varepsilon} \r\} ( \lambda(t_7)+1) =0. \end{align*} Now, since we have \begin{align*} \lambda(t_7) = \Gamma(t_7)-\Gamma(t_6) \gtrsim \{ (t_7+1)^{-\beta+1} - (t_6+1)^{-\beta+1}\}, \end{align*} it is enough to take $t_7$ such that \begin{align*} t_7 = \l[(t_6+1)^{-\beta+1} + C\l\{ 2\log ((C-C_7)^{-1}K_{\varepsilon} \varepsilon^{-1}) + M\r\} \r]^{1/(-\beta+1)}-1. \end{align*} Take $t_{\varepsilon}:= \max\{t_6,t_7\}$. Then, by the above argument, we obtain \begin{align*} \int_{0}^{t} \frac{1}{g(s)} \l\{ \int_{0}^{s} (e^{\Gamma(\tau)})'( \varepsilon H(\tau) -I(\tau))d\tau+A(0)\r\} ds \geq C_7 \varepsilon e^{\Gamma(t)}, \end{align*} for $t>t_{\varepsilon}$ and thus, by \eqref{eq3.9}, we have \begin{align} \label{eq2.14} C_6 X(t) \geq C_5 Y(t)+ C_7 \varepsilon e^{\Gamma(t)} \text{ for any } t>t_{\varepsilon}. \end{align} Therefore, applying \eqref{eq2.14} to \eqref{eq2.13} for $t>t_{\varepsilon}$, we obtain \begin{align} \label{eq2.15} &g(t)^2Y''(t)+g(t)g'(t)Y'(t) -g(t) Y'(t) \\ \notag &\geq C_5 X(t)^p \l[ \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1)\r]^{-p} \l( \int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}} d\tau\r)^{-p/p'} \\ \notag & \gtrsim (Y(t)+ \varepsilon e^{\Gamma(t)})^p \l[ \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1)\r]^{-p} \l( \int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}} d\tau\r)^{-p/p'}. \end{align} We set $Z(t):=e^{-\Gamma(t)} Y(t)$. Then, simple calculations give \begin{align*} Y'(t) &= g(t)^{-1} e^{\Gamma(t)} Z(t)+ e^{\Gamma(t)} Z'(t), \\ Y''(t) & = -g(t)^{-2} g'(t) e^{\Gamma(t)} Z(t) +g(t)^{-2} e^{\Gamma(t)} Z(t) + 2 g(t)^{-1} e^{\Gamma(t)} Z' (t)+ e^{\Gamma(t)} Z''(t), \end{align*} and thus we have \begin{align*} &g(t)^2Y''(t)+g(t)g'(t)Y'(t) -g(t) Y'(t) \\ & =g(t)^2 e^{\Gamma(t)} Z''(t) +g(t)(g'(t)+1) e^{\Gamma(t)} Z'(t). \end{align*} Therefore, from \eqref{eq2.15}, we obtain \begin{align*} &g(t)^2 e^{\Gamma(t)} Z''(t) +g(t)(g'(t)+1) e^{\Gamma(t)} Z'(t) \\ & \gtrsim e^{p\Gamma(t)} (Z(t)+ \varepsilon)^p \l[ \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1)\r]^{-p} \l( \int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}} d\tau\r)^{-p/p'}. \end{align*} Define $W(t):=Z(t)+\varepsilon$. Then, noting that $g'+1=gb$, we get \begin{align} \label{eq2.16} & W''(t) +b(t) W'(t) \\ \notag & \gtrsim W(t)^p g(t)^{-2} e^{(p-1)\Gamma(t)} \l[ \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1)\r]^{-p} \l( \int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}} d\tau\r)^{-p/p'}. \end{align} \begin{lemma} \label{lem2.6} For any $t>0$, we have \begin{align*} \int_{0}^{t}\frac{g(\tau) e^{\Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}} d\tau \lesssim \frac{g(t)^2 e^{\Gamma(t)}}{(G(t)+1) ^{p'-\frac{n}{2}}}. \end{align*} \end{lemma} \begin{proof} It is enough to consider the case of $t>\widetilde{t}$, where $\widetilde{t}>0$ is defined later. We have \begin{align*} \int_{\widetilde{t}}^{t}\frac{g(\tau) e^{\Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}} d\tau &= \int_{\widetilde{t}}^{t}\frac{ e^{ \frac{1}{2}\Gamma(\tau) }}{\frac{1}{2}g(\tau)} \cdot \frac{\frac{1}{2} g(\tau)^2 e^{\frac{1}{2} \Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}} d\tau. \end{align*} We set \begin{align*} f(\tau):= \frac{\frac{1}{2} g(\tau)^2 e^{\frac{1}{2} \Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}}. \end{align*} Then, by a simple calculation, we have \begin{align*} f'(\tau)= \frac{e^{\frac{1}{2}\Gamma(\tau)} g(\tau) (G(\tau)+1)^{p'-\frac{n}{2}-1} \l\{\l(g'(\tau) +\frac{1}{4}\r)(G(\tau)+1)- \frac{1}{2}\l(p'-\frac{n}{2}\r)g(\tau)^2 \r\} }{ (G(\tau)+1) ^{2p'-n}}. \end{align*} By Lemma \ref{lem2.2} (i), $|g'(\tau)|<1/8$ for sufficiently large $\tau>0$. Thus, we have \begin{align*} &\l(g'(\tau) +\frac{1}{4}\r)(G(\tau)+1)- \frac{1}{2}\l(p'-\frac{n}{2}\r)g(\tau)^2 \\ & \geq \l(\frac{1}{4}-\frac{1}{8}\r)(G(\tau)+1)- \frac{1}{2}\l(p'-\frac{n}{2}\r)g(\tau)^2 \\ & \gtrsim \l\{ \begin{array}{ll} \displaystyle \frac{1}{8}(\tau+1)^{\beta+1} - \frac{C}{2}\l(p'-\frac{n}{2}\r)(\tau+1)^{2\beta}, & \text{ if }\beta \in (-1,1), \\ \ \\ \displaystyle \frac{1}{8}\log (\tau+1)- \frac{C}{2}\l(p'-\frac{n}{2}\r)(\tau+1)^{-2}, & \text{ if }\beta=-1, \end{array} \r. \\ &>0, \end{align*} for large $\tau>0$ since $\beta<1$. We take $\widetilde{t}>0$ such that $f'(\tau)>0$ for $\tau>\widetilde{t}$. Then, $f(\tau)$ is increasing for $\tau>\widetilde{t}$. Therefore, we obtain \begin{align*} \int_{\widetilde{t}}^{t}\frac{g(\tau) e^{\Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}} d\tau &\leq \int_{\widetilde{t}}^{t}\frac{ e^{ \frac{1}{2}\Gamma(\tau) }}{\frac{1}{2}g(\tau)} d\tau \cdot \frac{\frac{1}{2} g(t)^2 e^{\frac{1}{2} \Gamma(t)}}{(G(t)+1) ^{p'-\frac{n}{2}}} \\ & \leq e^{\frac{1}{2}\Gamma(t)}\cdot \frac{\frac{1}{2} g(t)^2 e^{\frac{1}{2} \Gamma(t)}}{(G(t)+1) ^{p'-\frac{n}{2}}} \\ &= \frac{ g(t)^2 e^{ \Gamma(t)}}{2(G(t)+1) ^{p'-\frac{n}{2}}}, \end{align*} for $t>\widetilde{t}$. On the other hand, we have \begin{align*} \int_{0}^{\widetilde{t}} \frac{g(\tau) e^{\Gamma(\tau)}}{(G(\tau)+1) ^{p'-\frac{n}{2}}} d\tau &\leq C. \end{align*} Combining them, we get the statement. \end{proof} Then, by Lemma \ref{lem2.6} and \eqref{eq2.16}, we get \begin{align*} & W''(t) +b(t) W'(t) \\ & \gtrsim W(t)^p g(t)^{-2} e^{(p-1)\Gamma(t)} \l[ \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1)\r]^{-p} \l( \frac{g(t)^2 e^{\Gamma(t)}}{(G(t)+1) ^{p'-\frac{n}{2}}}\r)^{-p/p'} \\ &= W(t)^p g(t)^{-2p} \l[ \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1)\r]^{-p} (G(t)+1) ^{\l(p'-\frac{n}{2}\r)(p-1)}, \end{align*} for $t\geq t_{\varepsilon}$. To derive an ordinary differential inequality, we consider two cases, \textit{i.e.} $\beta \in (-1,1)$ and $\beta=-1$, separately. {\bf Case1.} We consider the case of $\beta \in (-1,1)$. When $\beta\in (-1,1)$, by Lemma \ref{lem2.2}, we have \begin{align*} &g(t)^{-2p} \l[ \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1)\r]^{-p} (G(t)+1) ^{\l(p'-\frac{n}{2}\r)(p-1)} \\ &= g(t)^{-2p} (\Gamma(t)+1)^{-p} (G(t)+1) ^{\l(p'-\frac{n}{2}\r)(p-1)} \\ &\ceq (t+1)^{-2\beta p} (t+1)^{(\beta-1) p} (t+1) ^{\l(p'-\frac{n}{2}\r)(p-1)(\beta+1)} \\ & = (t+1) ^{\l\{ \l(p'-\frac{n}{2}\r)(p-1) -p \r\}(\beta+1)}. \end{align*} Since $p'=p/(p-1)$, we have \begin{align*} \l\{ \l(p'-\frac{n}{2}\r)(p-1) -p \r\}(\beta+1) =-\frac{n}{2}(p-1)(\beta+1). \end{align*} Thus, we obtain \begin{align*} W''(t) +b(t) W'(t) \gtrsim W(t)^p (t+1) ^{-\frac{n}{2}(p-1)(\beta+1)}. \end{align*} for $t\geq t_{\varepsilon}$. Now, by the Fubini--Tonelli theorem, we have \begin{align*} W'(t) &=Z'(t) \\ &=g(t)^{-1} e^{-\Gamma(t)}\l\{ \int_{0}^{t} \frac{ (e^{\Gamma(t)}- e^{\Gamma(\tau)}) g(\tau)F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau \r. \\ &\quad \l. - \int_{0}^{t} \frac{1}{g(s)} \int_{0}^{s} \frac{ (e^{\Gamma(s)}- e^{\Gamma(\tau)}) g(\tau)F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau ds\r\} \\ &=g(t)^{-1} e^{-\Gamma(t)} \int_{0}^{t} \frac{1}{g(s)} \int_{0}^{s} \frac{ e^{\Gamma(\tau)} g(\tau)F(\tau)^p}{(G(\tau)+1) ^{\frac{n}{2}(p-1)}} d\tau ds \\ & \geq 0, \end{align*} for any $t>0$. Therefore, since $W'$ is positive and $p=1+2/n$, we get \begin{align} \label{eq2.17} (t+1)^{\beta} W''(t) +C W'(t) \gtrsim \frac{ W(t)^p }{ t+1} \text{ for }t\geq t_{\varepsilon}. \end{align} {\bf Case2.} We consider the case of $\beta=-1$. When $\beta=-1$, by Lemma \ref{lem2.2}, we have \begin{align*} &g(t)^{-2p} \l[ \{ \log (t+1)+1\}^{\chi_\beta}(\Gamma(t)+1)\r]^{-p} (G(t)+1) ^{\l(p'-\frac{n}{2}\r)(p-1)} \\ &\ceq (t+1)^{2p} \{ \log (t+1)+1\} ^{-p} (t+1)^{-2p} (\log(t+1)+1) ^{\l(p'-\frac{n}{2}\r)(p-1)} \\ & = (\log(t+1)+1) ^{\l(p'-\frac{n}{2}\r)(p-1)-p}. \end{align*} Since $p'=p/(p-1)$, we have \begin{align*} \l(p'-\frac{n}{2}\r)(p-1)-p =-\frac{n}{2}(p-1). \end{align*} Therefore, we obtain \begin{align*} W''(t) +b(t) W'(t) \gtrsim W(t)^p (\log(t+1)+1) ^{-\frac{n}{2}(p-1)} \end{align*} for $t\geq t_{\varepsilon}$. Since $W'$ is positive and $p=1+2/n$, we get \begin{align} \label{eq2.18} (t+1)^{-1} W''(t) +C W'(t) \gtrsim \frac{ W(t)^p }{ (t+1)(\log(t+1)+1) } \text{ for }t\geq t_{\varepsilon}. \end{align} We get objective ordinary inequalities. \begin{proof}[Proof of Theorem \ref{thm1.1}] We prove \begin{align} \label{eq2.19} \l\{ \begin{array}{ll} T(\varepsilon) \leq t_\varepsilon + \exp(C\varepsilon ^{-(p-1)}), & \text{ when } \beta \in (-1,1), \\ T(\varepsilon) \leq t_\varepsilon + \exp \l(\exp(C\varepsilon ^{-(p-1)})\r), & \text{ when } \beta =-1. \end{array} \r. \end{align} Since the above estimates hold if $T(\varepsilon)<t_\varepsilon$, we may assume that $T(\varepsilon)>t_\varepsilon$. Then, by the above argument, \eqref{eq2.17} or \eqref{eq2.18} hold for $t \in (t_\varepsilon, T(\varepsilon))$. To apply Lemmas \ref{lemA.1} and \ref{lemA.2} in Appendix \ref{secA} to \eqref{eq2.17} and \eqref{eq2.18} respectively, we check the positivity condition on the initial data. We have \begin{align*} W(t_\varepsilon)&=Z(t_\varepsilon)+\varepsilon>0. \end{align*} Moreover, as seen above, we also have \begin{align*} W'(t_\varepsilon) \geq 0. \end{align*} Taking sufficiently small $\varepsilon>0$, we can use Lemmas \ref{lemA.1} and \ref{lemA.2} and thus we get \eqref{eq2.19}. By the definition of $t_\varepsilon$, for sufficiently small $\varepsilon>0$, we have $t_\varepsilon < \exp(C\varepsilon ^{-(p-1)})$ when $\beta \in (-1,1)$ and $t_\varepsilon < \exp \l(\exp(C\varepsilon ^{-(p-1)})\r)$ when $\beta=-1$. Therefore, we obtain the sharp upper estimate of the lifespan: \begin{align*} \l\{ \begin{array}{ll} T(\varepsilon) \leq \exp(C\varepsilon ^{-(p-1)}), & \text{ when } \beta \in (-1,1), \\ T(\varepsilon) \leq \exp \l(\exp(C\varepsilon ^{-(p-1)})\r), & \text{ when } \beta =-1. \end{array} \r. \end{align*} \end{proof}
\section{\label{sec:Introduction}Introduction} Ultracold atoms coupled to an optical cavity mode have proved to be an exciting field of physics \cite{RitschEsslinger2013}. In recent experiments \cite{ BaumannEsslinger2010, KlinderHemmerich2015}, ultracold bosonic atoms placed in an optical cavity have realized a Dicke phase transition \cite{DomokosRitsch2002, DimerCarmichael2007, NagyDomokos2008, PiazzaZwerger2013}. By additionally confining the atomic gas with external optical lattice potentials, a modified Bose-Hubbard model with long-range interactions has been experimentally realized \cite{KlinderHemmerichPRL2015, LandigEsslinger2016}. This has been investigated theoretically \cite{ElliotMekhov2016, BakhtiariThorwart2015} and, in particular, the effect of the long-range interactions on the superfluid to Mott insulator transition has been analyzed \cite{MaschlerRitsch2005, MaschlerRitsch2008, LarsonLewenstein2008, NiedenzuRitsch2010, SilverSimons2010, VidalMorigi2010, LiHofstetter2013}. More complex combined cavity-atom systems have been proposed, as the organization of bosonic atoms in triangular or hexagonal lattices \cite{SafaeiGremaud2015, LeonardDonner2017, LeonardEsslinger2017}, or of fermionic atoms into superradiant phases \cite{LarsonLewensteinPRA2008, MullerSachdev2012, KeelingSimons2014, PiazzaStrack2014, ChenZhai2014}. Disordered structures might be realized in setups such as multimode cavities \cite{Gopalakishnan2009, NimmrichterArndt2010, StrackSachdev2011, Gopalakishnan2011, HabibianMorigi2013, JanotRosenow2013, BuchholdDiehl2013}. Phases for which the spin-orbit coupling plays an important role have been discussed for standing-wave cavities \cite{DengYi2014, DongPu2014, PanGuo2015, PadhiGhosh2014}, or ring cavities \cite{MivehvarFeder2014, MivehvarFeder2015}. Another class of systems which has attracted a lot of interest recently, are ultracold atomic systems coupled to artificial gauge fields \cite{DalibardOhberg2011, GoldmanSpielman2014}. The generation of an artificial gauge field has been realized in different ways such as Raman coupling \cite{LinSpielman2009, LinSpielmanNature2009}, lattice shaking \cite{StruckSengstock2011}, or laser-assisted hopping \cite{AidelsburgerBloch2011,MiyakeKetterle2013}. These artificial gauge fields for neutral atoms have similar effects as magnetic fields for charged particles. The minimal geometry in which the effects of gauge fields are important is the quasi-one-dimensional ladder structure. For weakly interacting ultracold bosons on a ladder a Meissner and a vortex superfluid phase were observed \cite{AtalaBloch2014}. Theoretically, other exciting phases such as vortex lattice and biased ladder superfluid phase, Meissner and vortex Mott insulator were predicted to occur \cite{OrignacGiamarchi2001, TokunoGeorges2014, PiraudSchollwock2015, GreschnerVekua2015, GreschnerVekua2016, Dhar2012, Dhar2013, WeiMuller2014, UchinoTokuno2015, Uchino2016, PetrescuHur2015, StrinatiMazza2016, PetrescuHur2017, DioChiofalo2015, OrignacChiofalo2016, OrignacPalo2017}. In recent years proposals have been put forward for the dynamic generation of gauge fields by a cavity-assisted tunneling. The artificial magnetic field emerges dynamically due to the feedback mechanism between the cavity field and the motion of atoms \cite{CorinnaAmenehStefanPRL2016, KollathBrennecke2016,WolffKollath2016, SheikhanKollath2016, ZhengCooper2016, BallantineKeeling2017}. The steady state diagram and the dynamics has been determined in the case of noninteracting fermions including states with chiral currents on a ladder geometry \cite{CorinnaAmenehStefanPRL2016, KollathBrennecke2016,WolffKollath2016} or non-trivial topological properties in two dimensions \cite{SheikhanKollath2016}. In the present work we consider interacting bosons on a ladder structure coupled to a cavity mode and explore the steady state diagram for different interaction strengths, different magnetic fluxes and different fillings. We characterize the self-organized phases that arise and we investigate the stability of these phase in the coupled atomic cavity system. Additionally, we investigate the influence a trapping potential has on the stability of the phases, since in most present day setups such trapping potentials are present. The structure of the paper is as follows, in Sec.~\ref{2a} we describe the setup of the bosonic atoms in the optical cavity and the theoretical model. In Sec.~\ref{2b} we derive an effective model for the atomic degrees of freedom by performing the adiabatic elimination of the cavity field. In Sec.~\ref{2c} we derive a stability condition for the steady states. In Sec.~\ref{sec:selfconst} we show how one can relate the solutions of the effective model to the steady states of the coupled system and in Sec.~\ref{sec:effectiveH} we discuss the properties of the effective Hamiltonian. In Sec.~\ref{sec:method} we give typical parameters used within the numerical density matrix renormalization group method. The stable self-organized phases with a finite cavity field and their properties are presented in Sec.~\ref{sec:results} and the influence of a trapping potential is discussed. \section{\label{sec:Model}Model and Method} \subsection{\label{sec:setup}Description of the setup} \label{2a} \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure1.eps} \caption{(a) Sketch of the setup. The bosonic atoms in an optical cavity are placed in an optical super-lattice potential which creates an array of ladders. The atoms tunnel along the legs with the amplitude $J_\|$, along the rungs via the cavity-induced tunneling with an effective amplitude $J_\perp$ and have an on-site interaction of strength $U$. (b) Level scheme of the cavity-induced tunneling: $\ket{g}$, $\ket{e}$ denote the ground and excited internal electronic states. The energy offset between two neighboring wells, $\Delta$, strongly suppresses the tunneling along the rungs. This is restored by two Raman processes each of which involve the cavity mode with vacuum Rabi frequency $g_0$ and a transverse pump beam with Rabi frequency $\Omega_{1,2}$, respectively. $\delta_{ep}$ and $\delta_{cp}$ are the frequencies of the excited state and the cavity mode in the rotating frame. } \label{fig:setup} \end{figure} We study an ultracold bosonic gas placed in an optical cavity and additionally subjected to optical lattice potentials (Fig.~\ref{fig:setup}). A similar setup has been introduced and discussed in previous work in the context of fermionic atoms \cite{CorinnaAmenehStefanPRL2016, KollathBrennecke2016,WolffKollath2016}. The optical super-lattice potentials confine the atoms to an array of decoupled ladders. The first step in obtaining this structure is to create two-dimensional decoupled layers by applying a strong optical lattice potential along the $z$-direction. One applies an optical lattice of wavelength $\lambda_y$ along the $y$-direction. A superposition of two optical lattices with wavelengths $\lambda_x$ and $\lambda_x/2$ is applied along the $x$-direction, such that decoupled double wells are formed with an energy offset $\Delta$ between the two wells. The lattice height along the $y$-direction is sufficiently low such that the atoms tunnel with amplitude $J_\|$ between neighboring sites. The potential offset between the two wells along $x$-direction strongly suppresses the tunneling along the rungs. The tunneling is restored by two balanced Raman transitions each of them involving a standing-wave cavity mode and a running-wave pump laser (Fig.~\ref{fig:setup}(b)). The cavity mode has the frequency $\omega_c$, vacuum Rabi frequency $g_0$ and the wave-vector ${\bf k}_c=k_c{\bf e}_x$ along the $x$-direction, where ${\bf e}_i$, with $i=x,y,z$, denote the unit vectors along the three spatial directions. All other cavity modes are assumed to be far detuned from the possible transitions and are not considered. The pump laser beams have the frequency $\omega_{p,i=1,2}$ and the wave-vector ${\bf k}_{p,i}=k_{p,i}{\bf e}_y$, with $i=1,2$. The pump and cavity modes are considered to be far detuned from the internal atomic transition, i.e. $\omega_e\gg\omega_c,\omega_{p,i=1,2}$, thus the excited state population is negligible. The detuning between the cavity mode and the first pumping beam is chosen such that it is close to the potential offset, $\hbar(\omega_c-\omega_{p,1})\approx-\Delta$ and the difference between the two pump beam frequencies is $\hbar(\omega_{p,2}-\omega_{p,1})\approx 2\Delta$. Let us note that the offset $\Delta$ needs to be choosen large enough in order to assure a resonant tunneling process even in the presence of the finite cavity line width. A cavity-induced Raman tunneling along the rungs of the ladder is obtained, via the feedback mechanism between the motion of the atoms and the cavity mode. In the following we will use the rotating frame with the frequency $\omega_p=(\omega_{p,2}+\omega_{p,1})/2$ and $\lambda_{p}= \lambda_{p,1,(2)}$ as the wavelengths of the pump beams are approximately the same, i.e.~$\lambda_{p,1}\approx\lambda_{p,2}$ \cite{notewavelength}. During the Raman processes a spatially dependent phase factor $\text{e}^{-i \Delta\bf{k\cdot r}}$ is imprinted onto the atomic wave-function, where $\Delta{\bf k}=\pm k_c{\bf e}_x+k_{p}{\bf e}_y$. The cavity mode does not give a contribution if the tunneling around a plaquette is considered. However, due to the running-wave nature of the pump beam the atoms collect a phase $\varphi(j+1)=\pi \lambda_y/\lambda_p(j+1) $ tunneling on the rung $j+1$ and a phase $-\varphi j$ on the rung $j$, where $\varphi\simeq\pi \lambda_y/\lambda_p$, The accumulated phase $\varphi$ is equivalent to the Aharonov-Bohm phase for charged particles subjected to a magnetic field. Thus, the bosonic atoms experience an artificial magnetic field in the presence of a finite cavity field. In an experimental realization, the flux $\varphi$ can be varied by modifying the angle of the pump beams with respect to the $x$-$y$-plane. We perform an expansion in the Wannier basis of the atomic field operators, obtaining a model for the atomic-cavity system in the tight-binding description. The Hamiltonian describing the coupled system reads \begin{align} \label{eq:Hamiltonian} &H=H_c+H_\parallel+H_{int}+H_{trap}+H_{ac} \\ &H_c= \hbar\delta_{cp} a^\dagger a\nonumber\\ &H_\parallel=-J_\parallel \sum_{j,m=0,1} (b_{m,j}^\dagger b_{m,j+1} + b_{m,j+1}^\dagger b_{m,j})\nonumber\\ &H_{int}=\frac{U}{2} \sum_{j,m=0,1} n_{m,j}(n_{m,j}-1)\nonumber\\ &H_{trap}=\frac{4 V_{trap}}{L^2}\sum_{j,m=0,1}\qty(j-j_0)^2 n_{m,j}\nonumber\\ &H_{ac}= -\hbar\tilde{\Omega} ( a + a^\dagger) ( K_\perp + K_\perp^\dagger)\nonumber\\ &K_\perp= \sum_{j} e^{i\varphi j}b_{0,j}^\dagger b_{1,j}\nonumber. \end{align} The bosonic operators $a$ and $a^\dagger$ are the annihilation and creation operators for the cavity photon mode. The term $H_c$ gives the dynamics of the cavity mode in the rotating frame, with $\delta_{cp}=\omega_{c}-\omega_{p}$. The operators $b_{m,j}$ and $b_{m,j}^\dagger$ are the bosonic annihilation and creation operators of the atoms where $m=0,1$ labels the legs of the ladder and $j$ the rungs of the ladder. The operator $n_{m,j}=b_{m,j}^\dagger b_{m,j}$ is the number operator. $L$ denotes the number of rungs of the ladder and the total number of bosons is $N$. The filling per site is defined as $\rho=N/(2L)$. $H_\|$ describes the tunneling of the atoms along the legs of the ladder with the tunneling amplitude $J_\|$. The term $H_{int}$ represents the repulsive on-site interaction of strength $U>0$. The term $H_{trap}$ represents an external harmonic trapping potential with $j_0=(L+1)/2$ which is typically present in nowadays experimental setups. The coupling between the atoms and the cavity field is described by $H_{ac}$, where a tunneling event along the rungs occurs by creation or annihilation of a cavity photon. The tunneling along the rungs with the spatially dependent phase imprint is represented by the operator $K_\perp$. In order to prevent a privileged direction of tunneling, the tunneling in each direction is coupled to both the creation and annihilation operators of the cavity field, using two pump laser beams \cite{DimerCarmichael2007}. The process has the amplitude $\hbar\tilde{\Omega}=\frac{\hbar\Omega_{p,1} g_0}{\omega_e-\omega_{p,1}} \phi_\| \phi_\perp$, where the effective parameters $\phi_\|$ and $\phi_\perp$ contain contributions of the overlap of the wavefunctions from neighboring sites and can be controlled by the geometry of the lattice \cite{CorinnaAmenehStefanPRL2016}. The two Raman processes are balanced due to the choice of the Rabi frequency for the second pump beam $\Omega_{p,2}= \Omega_{p,1}\frac{\omega_e-\omega_{p,2}}{\omega_e-\omega_{p,1}}$. Dissipative processes are present due to the imperfections of the cavity mirrors where losses of the cavity photons occur. The dissipative dynamics is approximated by a Lindblad master equation. The evolution of an operator $O$ is given by \begin{align} \label{eq:Lindblad} & \pdv{t} O = \frac{i}{\hbar} \left[ H, O \right] + \mathcal{D}(O), \end{align} with the dissipator $\mathcal{D}(O) = \kappa \left( 2a^\dagger O a - O a^\dagger a - a^\dagger a O \right)$, which gives the loss of cavity photons, via the imperfect mirrors. \subsection{\label{sec:adiabiatic}Adiabatic elimination of the cavity field} \label{2b} In this section we will derive an effective model for the bosonic atoms, obtained from the adiabatic elimination of the cavity field \cite{RitschEsslinger2013, CorinnaAmenehStefanPRL2016, KollathBrennecke2016}. A full simulation of the problem would be interesting in order to investigate whether retardation effects of the cavity field might occur. However, here we approximate the cavity field with its steady state value, which fulfills the condition $\partial_t \langle a\rangle=0$. Using Eq. (\ref{eq:Lindblad}) the condition is given by \begin{equation}\label{eq:dyn_photon} i \partial_t \langle a\rangle=-\tilde{\Omega}\langle K_\perp+K_\perp^\dagger \rangle +(\delta_{cp}- i \kappa ) \langle a\rangle=0. \end{equation} This condition relates the expectation value of the directed rung tunneling to the value of the cavity field by \begin{equation}\label{eq:alpha} \alpha=\langle a \rangle = \frac{\tilde{\Omega}}{\delta_{cp}- i \kappa }\langle K_\perp+K_\perp^\dagger\rangle. \end{equation} The model exhibits a $\mathbb{Z}_2$ symmetry, associated with the inversion of the sign of both the rung tunneling, $K_\perp+K_\perp^\dagger$, and the cavity field, $a+a^\dagger$. In an experiment this symmetry will be spontaneously broken such that each of the realizations of non-trivial steady state has the same magnitude of the expectation value $\abs{\langle a+a^\dagger\rangle}$, however, with a spontaneously chosen sign. We choose without loss of generality $\langle K_\perp+K_\perp^\dagger\rangle>0$ and even find for the considered phases that we can choose $\langle K_\perp\rangle>0$. The equations of motion of the bosonic operators read \begin{eqnarray} \label{eq:dyn_boson} i \hbar \partial_t \langle b_{0,j} \rangle=-J_\|\langle b_{0,j+1} + b_{0,j-1} \rangle-U\langle b_{0,j}(1-n_{0,j}) \rangle\nonumber \\-\hbar\tilde{\Omega}\langle a+a^\dagger\rangle e^{i\varphi j} \langle b_{1,j} \rangle +\frac{4V_{trap}}{L^2}(j-j_0)^2 \langle b_{0,j} \rangle~~~ \nonumber\\ i \hbar \partial_t \langle b_{1,j} \rangle= -J_\|\langle b_{1,j+1} + b_{1,j-1} \rangle-U\langle b_{1,j}(1-n_{1,j}) \rangle\nonumber \\-\hbar\tilde{\Omega}\langle a+a^\dagger\rangle e^{-i\varphi j} \langle b_{0,j} \rangle +\frac{4V_{trap}}{L^2}(j-j_0)^2 \langle b_{1,j} \rangle.~~ \end{eqnarray} In the derivation of the equations we have used a mean-field decoupling of the atomic and cavity degrees of freedom. We substitute the expectation value for the cavity field, Eq.~(\ref{eq:alpha}), into the equations of motion of the bosonic operators, Eq.~(\ref{eq:dyn_boson}). The dynamics given by the obtained set of equations can be described by an effective Hamiltonian for the atoms \begin{align} &H=H_\parallel+H_\perp+H_{int}+H_{trap} \label{eq:eff_ham} \\ &H_\parallel=-J_\|\sum_{j,m=0,1} (b_{m,j}^\dagger b_{m,j+1} + b_{m,j+1}^\dagger b_{m,j})\nonumber\\ &H_\perp= -J_\perp (K_\perp + K_\perp ^\dagger) \nonumber\\ &H_{int}=\frac{U}{2} \sum_{j,m=0,1} n_{m,j}(n_{m,j}-1)\nonumber\\ &H_{trap}=\frac{4 V_{trap}}{L^2}\sum_{j,m=0,1}\qty(j-j_0)^2n_{m,j}\nonumber \end{align} and typically the ground state of this effective model corresponds to the steady state of the equations of motion. The parameter $J_\perp$, which represents the rung tunneling amplitude, has to be determined self-consistently as it depends on the expectation value of $\langle K_\perp \rangle$, $J_\perp=A\langle K_\perp \rangle$, with $A= \frac{4\hbar\tilde{\Omega}^2\delta_{cp}}{\delta_{cp}^2 +\kappa^2}$. The self-consistency condition reflects the global nature of the coupling of the atoms to the cavity by the presence of the global rung tunneling. In order to get a non-trivial solution ($\alpha\neq 0$) of the self-consistency condition we must require $A>0$, which implies $\delta_{cp}>0$. \subsection{\label{sec:stability}Stability analysis} \label{2c} The non-trivial self-consistent solution(s) derived from the effective Hamiltonian, Eq.~(\ref{eq:eff_ham}), might not be stable. Thus, in this section we derive a stability condition for our model using pertubations around the steady state \cite{RitschEsslinger2013}. We follow the notations introduced in Ref.~\cite{Tian2016}. Starting from the equation of motion for the cavity field, given by Eq.~(\ref{eq:dyn_photon}), we introduce the averages of the coordinate and momentum quadratures of the cavity field, $x_a=\langle a+a^\dagger\rangle$ and $p_a=-i\langle a-a^\dagger\rangle$. Using Eq.~(\ref{eq:dyn_photon}) and its conjugate we have \begin{align} \label{eq:quadratures} &\frac{\partial}{\partial t} x_a=-\kappa x_a+\delta_{cp}p_a\\ &\frac{\partial}{\partial t} p_a=-\delta_{cp}x_a-\kappa p_a+4\tilde{\Omega} \langle K_\perp \rangle. \nonumber \end{align} The stationary solutions of these equations, which satisfy the relations $\partial_tx_a^{(s)}=0$ and $\partial_tp_a^{(s)}=0$ are \begin{align} \label{eq:statsol} &x_a^{(s)}=\frac{4\delta_{cp}\tilde{\Omega}\langle K_\perp \rangle^{(s)}}{\delta_{cp}^2+\kappa^2},\\ &p_a^{(s)}=\frac{4\kappa\tilde{\Omega}\langle K_\perp \rangle^{(s)}}{\delta_{cp}^2+\kappa^2}, \nonumber \end{align} where the average of the directed tunneling $\langle K_\perp \rangle$ computed in the ground state of the effective model, Eq.~(\ref{eq:eff_ham}), can have a nonlinear dependence on the stationary coordinate quadrature $x_a^{(s)}$. We will consider linear fluctuations around the stationary solutions, i.e., $x_a=x_a^{(s)}+\tilde{x}_a$ and $p_a=p_a^{(s)}+\tilde{p}_a$, and also linearize the average of the directed tunneling in terms of the fluctuations \begin{equation} \label{eq:kperlin} \langle K_\perp \rangle=\langle K_\perp \rangle^{(s)}+\frac{d\langle K_\perp \rangle^{(s)}}{dx_a^{(s)}}\tilde{x}_a\;, \end{equation} where $\langle K_\perp \rangle^{(s)}$ is the value of the directed rung tunneling corresponding to the stationary solution $x_a^{(s)}$. From Eqs.~(\ref{eq:quadratures}) and (\ref{eq:kperlin}) we can derive a set of differential equations for the fluctuations \begin{align} \label{eq:fluctuations} &\frac{\partial}{\partial t} \tilde{x}_a=-\kappa \tilde{x}_a+\delta_{cp}\tilde{p}_a\\ &\frac{\partial}{\partial t} \tilde{p}_a=\left(-\delta_{cp}+4\tilde{\Omega}\frac{d\langle K_\perp \rangle^{(s)}}{dx_a^{(s)}}\right)\tilde{x}_a-\kappa \tilde{p}_a. \nonumber \end{align} The eigenvalues of the Jacobian of this set of differential equations are given by \begin{equation} \label{eq:eigenvalue} \lambda_{\pm}=-\kappa\pm\sqrt{\left(-\delta_{cp}^2+4\delta_{cp}\tilde{\Omega}\frac{d\langle K_\perp \rangle^{(s)}}{dx_a^{(s)}}\right)}. \end{equation} The stable stationary solutions are the ones for which the eigenvalues have a negative real part. Thus the stability condition for the system with $\delta_{cp}>0 $ is \begin{equation} \label{eq:condition1} \frac{\delta_{cp}^2+\kappa^2}{4\delta_{cp}\tilde{\Omega}}>\frac{d\langle K_\perp \rangle^{(s)}}{dx_a^{(s)}}. \end{equation} This condition can be rewritten in a form that we can easily use in our model, using the relation $J_\perp^{(s)}=\hbar \tilde{\Omega}x_a^{(s)}$ \begin{equation} \label{eq:condition2} \frac{d\langle K_\perp \rangle^{(s)}}{dJ_\perp^{(s)}}<\frac{1}{A}. \end{equation} Let us comment that this stability condition means that if the pump strength A is slightly increased, the slope of the line $J_\perp/ A$ will decrease. If we start from a stable solution, the corresponding slightly changed solution lies at larger values of $\langle K_\perp \rangle$ and $J_\perp$, whereas if we start from an unstable solution its value decreases, moving closer to the trivial solution of $\langle K_\perp \rangle=0$ and $J_\perp=0$. \subsection{\label{sec:selfconst}Self-consistent solution} We determine the stable steady states of the coupled cavity-atomic model using three steps: First we perform a ground-state search using matrix product state methods (DMRG) for the effective model Eq.~(\ref{eq:eff_ham}), for fixed flux $\varphi$, filling $\rho$ and on-site interaction $U/J_\parallel$, while varying the rung tunneling amplitude $J_\perp/J_\parallel$. We compute the expectation value $\langle K_\perp\rangle$ obtaining its dependence on $J_\perp/J_\parallel$. In the second step we find the solution of the self-consistent problem reformulated as \begin{equation} \label{eq:condition3} \langle K_\perp \rangle=\frac{J_\|}{A}~\frac{J_\perp}{J_\|}. \end{equation} The left-hand side contains the nonlinear behavior of $\langle K_\perp \rangle$ given by the effective model and the right-hand side is a linear function with slope $J_\|/A$. Graphically, the solutions are the crossings of the two curves. The last step is to work out which of these solutions are stable. The stability condition, Eq.~(\ref{eq:condition2}), tells us that we need to compare the slope of the two curves at their intersection point(s). The solution is stable if the slope of $\langle K_\perp \rangle$ is smaller than the slope of the linear function. The results will be shown in Sec.~\ref{sec:results}. \subsection{\label{sec:effectiveH}Properties of the effective Hamiltonian} \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure2.eps} \caption{Current patterns and on-site density for some of the different phases of the effective model, (a) vortex liquid (V-SF) phase with a vortex density $1/3<\rho_v<2/5$, (b)-(c) vortex lattices (VL$_{1/2,1/3}$-SF) with (b) $\rho_v=1/2$, and (c) $\rho_v=1/3$, (d) the Meissner phase (M-SF, M-MI), and (e) the biased-ladder phase (BLP-SF). The length of the arrows is proportional to the strength of the local currents and the size of the red circles scales with the on-site density (DMRG data). The dashed rectangles represent the unit cell for the vortex lattice phases. } \label{fig:current_patterns} \end{figure} The effective model, Eq.~(\ref{eq:eff_ham}), in the abscence of a trapping potential, has been studied as a stand-alone model describing bosonic two-leg ladders with repulsive contact interaction in the presence of a uniform, external gauge field. DMRG and bosonization studies have explored the phase diagram \cite{OrignacGiamarchi2001,TokunoGeorges2014,PiraudSchollwock2015, GreschnerVekua2015,GreschnerVekua2016, Dhar2012, Dhar2013, WeiMuller2014, UchinoTokuno2015, Uchino2016, PetrescuHur2015, StrinatiMazza2016, PetrescuHur2017, DioChiofalo2015, OrignacChiofalo2016, OrignacPalo2017}, observing Meissner, vortex and vortex lattices phases on top of superfluid or Mott-insulating states. The phase transitions that occur in this model take place in two sectors. These sectors correspond, in the limit of weak coupling (i.e. $J_\perp/J_\|\ll 1$), to the symmetric ($b_{0,j}+b_{1,j}$) and antisymmetric ($b_{0,j}-b_{1,j}$) combination of the operators on the two legs. The Mott insulator to superfluid transition is located in the symmetric sector, while the Meissner to vortex phase transitions occur in the antisymmetric sector. One quantity which gives information on the phases is the central charge $c$, which can be interpreted as the number of gapless modes. The central charge can be extracted from the scaling of the von Neumann entanglement entropy $S_{vN}(l)$ of an embedded subsystem of length $l$ in a chain of length $L$. For open boundary conditions the entanglement entropy for the ground state of gapless phases scales as \cite{VidalKitaev2003,CalabreseCardy2004, HolzeyWilczek1994} \begin{equation} \label{eq:entropy} S_{vN}=\frac{c}{6}\log\left(\frac{L}{\pi}\sin\frac{\pi l}{L}\right)+s_1, \end{equation} where $s_1$ is a non-universal constant and we have neglected logarithmic corrections \cite{AffleckLudwig1991} and oscillatory terms \cite{LaflorencieAffleck2006} due to the finite size of the system. One can distinguish between the superfluid and Mott-insulating phases by the decay of the single particle correlation, here we use $\langle b^\dagger_{m,L/4} b_{m,L/4+d}+\text{H.c.} \rangle$, with distance $d$. The correlations decay algebraically with distance in a superfluid state and exponentially in a Mott-insulating state \cite{Giamarchibook}. Important characteristics of the quantum chiral phases (Meissner, vortex liquid, or vortex lattice) can be inferred from the configurations of the local currents, which is experimentally accessible in the bosonic ladder system \cite{AtalaBloch2014, StuhlSpielman2015}. We define the local currents on the leg $j^\|_{m,j}$ and the rung $j^\perp_{j}$, respectively, as \begin{align} \label{eq:localcur} &j^\|_{m,j} = -i J_\|(b_{m,j}^\dagger b_{m,j+1} -\text{H.c.}),\nonumber \\ &j^\perp_{j} = -i J_\perp (e^{i\varphi j}b_{1,j}^\dagger b_{0,j} -\text{H.c.}). \end{align} In addition to the local currents, the chiral current $J_c$ and the average rung current $J_r$ are of interest and defined as \begin{align} \label{eq:cur} &J_c = \frac{1}{2L} \sum_j \langle j^\|_{0,j} - j^\|_{1,j} \rangle,\nonumber\\ &J_r=\frac{1}{L} \sum_j |\langle j^\perp_{j}\rangle|. \end{align} All non-trivial phases considered here have a finite chiral current. The Meissner phases are characterized by a vanishing average rung current, $J_r=0$, and the vortex and vortex lattice phases by non-zero rung currents, $J_r>0$. An additional quantity, the vortex density is defined as the inverse of the vortex length, $\rho_v=l_v^{-1}$. Where $l_v$ is the typical size of the vortices and we extract it from the Fourier transform of the local rung current configurations $\langle j_r^\perp \rangle$. From the value of $\rho_v$ one identifies the periodicity of the vortex lattice phases. In computing the observables we only use the central region, $j\in[L/4,3L/4]$, of the ladder, in order to reduce the influence of boundary effects. In the following we will describe the phases that appear as steady states for the sets of parameters that will be considered in Sec.~\ref{sec:results}. A summary is given in Fig.~\ref{fig:current_patterns}. The vortex superfluid phase (V-SF), with the local current and density pattern depicted in Fig.~\ref{fig:current_patterns}(a), has two gapless modes, thus it has a central charge $c=2$. It is also characterized by a finite vortex density, $\rho_v$, which is incommensurate with the ladder. The existence of vortex lattice phases has been demonstrated in bosonic ladders by Refs.~\cite{Dhar2012, Dhar2013, GreschnerVekua2015, GreschnerVekua2016}, for different vortex densities. In Fig.~\ref{fig:current_patterns}(b)-(c) we have represented the current and density pattern for the vortex lattice superfluid phases ($\text{VL}_{\rho_v}\text{-SF}$) with $\rho_v=1/2$ and $1/3$. Where the vortices are commensurate with the ladder. Both of these two phases have a central charge, $c=1$, since the symmetric sector is gapless and the antisymmetric one is gapped. Due to the spontaneous symmetry breaking of the translation symmetry in the vortex lattices, the unit cell becomes $q$-fold enlarged, with $q=2$ and $3$ in these cases. This can lead to a change in the sign of the chiral current \cite{GreschnerVekua2015}. In Fig.~\ref{fig:current_patterns}(d) we depicted a Meissner phase, which can be a Meissner superfluid (M-SF) or a Meissner Mott insulator (M-MI). Both of these phases have vanishing currents on the rungs in the bulk of the system and a finite chiral current. The distinction between the two phases can be made by calculating the central charge. The Meissner superfluid has a gapless symmetric sector, while the Meissner Mott insulator is totally gapped. The biased-ladder phase (BLP) \cite{WeiMuller2014,UchinoTokuno2015, Uchino2016,GreschnerVekua2015,GreschnerVekua2016}, Fig.~\ref{fig:current_patterns}(e), breaks the discrete $\mathbb{Z}_2$ symmetry associated with the inversion of the two legs of the ladder and the sign of the flux. The characteristic signature of this phase is that the density is higher on one of the legs, compared to the other. We will use the density imbalance, $\Delta n$, to identify this phase. The imbalance is defined as \begin{equation} \label{eq:imbalance} \Delta n=\frac{1}{2L} \abs\Big{\sum_j \langle n_{0,j}-n_{1,j} \rangle}. \end{equation} The biased ladder phase has a gapless mode in the symmetric sector, and a vanishing rung current. As the biased ladder phase state spontaneously breaks the $\mathbb{Z}_2$ symmetry between the two legs, it results in a twofold degenerate ground state. The DMRG ground state search can choose any state within this degenerate subspace, resulting in an arbitrary value of the density imbalance between zero and the maximal value. In the following we will present the procedure employed in order to obtain the ground state with maximal value of $\Delta n$. After numerically obtaining one of the ground states, $\ket{\psi_1}$, we compute the orthogonal wavefunction, $\ket{\psi_2}$, which is degenerate in energy with $\ket{\psi_1}$. For this, the second ground state search is performed enforcing the orthogonality by the following Hamiltonian \begin{equation} \label{eq:Horth} \tilde{H}=H+w\ket{\psi_1}\bra{\psi_1}, \end{equation} where $H$ is the Hamiltonian given in Eq.~(\ref{eq:eff_ham}) and the weight $w>0$ introduces an energy penalty for any finite overlap with $\ket{\psi_1}$ and guarantees the orthogonality. We use a typical value of $w=10$ and checked consistency with higher values up to $w=100$. As an initial state for the search we use a state with an inverse density imbalance compared to the state $\ket{\psi_1}$. Having obtained an orthonormal basis in the ground state manifold, we move on to construct the superposition of these two states, $\ket{\psi_\lambda}=\lambda\ket{\psi_1}+\sqrt{1-\lambda^2}\ket{\psi_2}$ with $\lambda\in[0,1]$, that has the maximum density imbalance $\Delta n$. Compared to the induced symmetry breaking by an externally applied potential, we found this method to more reliably identify the imbalanced phase. The described states do not represent an exhaustive list of the possible phases of the ground-state of the bosonic ladder. We focused on the ones we can stabilize dynamically in the cavity, for the considered parameters. Beside the mentioned phases there exists numerical evidence for vortex and vortex lattice Mott insulators \cite{PiraudSchollwock2015, GreschnerVekua2015}, vortex lattice superfluid with $\rho_v=1/4$ and charge density waves \cite{GreschnerVekua2016}, also Laughlin states have been proposed \cite{PetrescuHur2015,StrinatiMazza2016, PetrescuHur2017}. \subsection{\label{sec:method}DMRG Method} The results presented in this work were obtained using a finite-size density matrix renormalization group (DMRG) algorithm in the matrix product state form \cite{White1992, Schollwock2005, Schollwock2011, Hallberg2006, Jeckelmann2008}, using the ITensor Library \cite{itensor}. We simulate the presented model Eq.~(\ref{eq:eff_ham}) typically for a ladder with $L=120$ rungs and with the bond dimension up to 1500 in the matrix product state representation. We checked the converge of the method for different system sizes and bond dimensions. Since we are dealing with finite interactions the local Hilbert space of bosons is infinite, thus a cutoff for its dimension is needed. We use a maximal dimension of five bosons per site, where the higher cutoff of six bosons per site gives consistent results. \section{\label{sec:results}Results} \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure3.eps} \caption{(a) Graphical interpretation of the self-consistency condition for the parameters $\varphi=0.8 \pi$, $\rho=0.8$, $U=1J_\|$, and $V_{trap}=0$. The directed rung tunneling $\langle K_\perp \rangle/L$ is represented for two system sizes, $L=120$ and $L=60$. The straight (red) line represents the right-hand side of the self-consistency condition, which is a linear function with slope $\frac{J_\|}{AL}$. The crossings of the two curves give the solutions of the self-consistency condition. (b) The solutions $J_\perp/J_\|$ of the self-consistency equation which are proportional to the cavity field $ Re(\alpha)$ versus the pump strength $AL/J_\|$. The filled colored areas represent the extent of different phases. In the grey area the stability of the solutions is not clear for all system sizes. } \label{fig:kpersol08} \end{figure} \subsection{\label{sec:parameters1}Steady state diagram at flux $\varphi=0.8 \pi$, \\filling $\rho=0.8$ and on-site interaction $U=1J_\|$ in a homogeneous system} \label{3b} \begin{figure}[!hbtp] \centering \includegraphics[width=.5\textwidth]{figure4.eps} \caption{(a) Chiral current $J_c$ and average rung current $J_r$, (b) central charge $c$, and (c) the density imbalance between the two legs of the ladder as a function of the pump strength $AL/J_\|$ in the stable regions for the parameters $\varphi=0.8\pi$, $\rho=0.8$, $U=1J_\|$, and $V_{trap}=0$. The central charge is extracted fitting the scaling of entanglement entropy. The error bars of the fit are smaller than the symbols used. Dashed horizontal lines indicate the constant value 0 or 1, as a guide to the eye. } \label{fig:observables08} \end{figure} In this subsection we solve the self-consistency condition and identify the steady states which can be stabilized as we vary the pump strength $A$, for flux $\varphi=0.8\pi$, filling $\rho=0.8$ and on-site interaction $U=1J_\|$ in a homogeneous system. For this case the dynamic stabilization of $\text{VL}_{1/3}\text{-SF}$, biased ladder superfluid, and Meissner superfluid states is possible. As mentioned, the first step in tackling the self-consistency condition, Eq.~(\ref{eq:condition3}), is to calculate the expectation value of the directed rung tunneling $\langle K_\perp \rangle/L$. The intersections of this curve with the linear function $\frac{J_\|}{AL}$ give the solutions of the self-consistency condition, shown in Fig.~\ref{fig:kpersol08}. From Fig.~\ref{fig:kpersol08}(a) we can also infer the stability of the solutions, using Eq.~(\ref{eq:condition2}), by comparing the slopes of the two curves. If the derivative of $\langle K_\perp \rangle/L$ is less than the slope of the linear function, the solution is stable. We evaluate the derivative numerically by computing the left and right finite derivatives with the help of the two adjacent points. We consider a solution stable if both the left and right finite derivatives satisfy the condition given by Eq.~(\ref{eq:condition2}). The expectation value of the directed rung tunneling $\langle K_\perp \rangle/L$ has a concave curvature, with some additional substructure especially close to the phase transitions. For small values of $J_\perp$, $\langle K_\perp \rangle/L$ has a strong dependence on the size of the system, as we observe from Fig.~\ref{fig:kpersol08}(a) and thus the stability in this region depends crucially on the size of the system. In the following we will concentrate on the states which are stable for all considered system sizes. The non-trivial stable solutions are plotted in Fig.~\ref{fig:kpersol08}(b), where we have always chosen the solution $J_\perp>0$. Not shown are the corresponding solutions at the inverse of the value which exist due to the $\mathbb{Z}_2$ symmetry of the model. \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure5.eps} \caption{The vortex density $\rho_v$ as a function of the pump strength $AL/J_\|$, where the rung current is finite, for the parameters $\varphi=0.8\pi$, $\rho=0.8$, $U=1J_\|$, and $V_{trap}=0$. The vortex density has the value $\rho_v=1/3$ for $3.19J_\|/L\lesssim A\lesssim 3.59J_\|/L$, which represents the $\text{VL}_{1/3}\text{-SF}$ phase. Dashed horizontal line indicates the constant value $1/3$. } \label{fig:vortexd08} \end{figure} One can observe from Fig.~\ref{fig:kpersol08}(b) that we have (system size independent) non-trivial stable solutions with a finite occupation of the cavity field above the pump strength $A\approx3.19J_\|/L$. The next step consists in identifying the properties of the steady states that correspond to the stable solutions. We have to analyze the behavior of the observables characterizing these states (Fig.~\ref{fig:observables08}), as explained in Seq.~\ref{sec:effectiveH}. We find a vortex state, with finite rung currents, for $3.19J_\|/L\lesssim A\lesssim 3.59J_\|/L$. We extract the central charge by fitting Eq.~(\ref{eq:entropy}) to the numerically computed von Neumann entropy. The central charge has a value of $c\approx 1$ in this region, which points, together with the finite rung current, towards a lattice vortex superfluid state. The superfluid nature can also be confirmed by an algebraic decay of the single particle correlation function along the ladder (see Fig.~\ref{fig:corr08}(a)). The algebraic decay is modulated by a periodic function, with the period of three lattice sites. From the vortex density (Fig.~\ref{fig:vortexd08}), we identify the $\text{VL}_{1/3}\text{-SF}$ state corresponding to this modulation. \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure6.eps} \caption{The absolute value of the single particle correlations, $|\langle b^\dagger_{m,L/4} b_{m,L/4+d}+\text{H.c.}\rangle|$, along one of the legs represented in a logarithmic plot for the parameters $L=240$, $\varphi=0.8\pi$, $\rho=0.8$, $U=1J_\|$, and $V_{trap}=0$, in the (a) $\text{VL}_{1/3}$ state, for $A=3.44 J_\|/L$, (b) Meissner state, for $A=6.26 J_\|/L$. The correlations show an algebraic decay with distance, which signals the superfluid phase. The straight (red) lines are fits of the function $\propto x^{-\alpha}$, where the fit parameter is (a) $\alpha=0.098\pm 0.001$, (b) $\alpha=0.377\pm 0.001$. } \label{fig:corr08} \end{figure} In the region $3.66J_\|/L\lesssim A\lesssim 5.01J_\|/L$, the density imbalance between the two legs acquires finite values with a sharp onset at the lower boundary. This signals the biased ladder state. Our numerical data is not precise enough in order to identify the transition between $\text{VL}_{1/3}\text{-SF}$ and the biased ladder states in the region $3.59J_\|/L\lesssim A\lesssim 3.66J_\|/L$. Whereas our numerical data (Fig.~\ref{fig:kpersol08}(b)) suggests multiple solutions for the same value of the pump strength, from our numerical resolution we cannot decide on their stability condition. In the biased ladder state, the currents along the rungs of the ladder are suppressed, which is consistent with the numerical data from Fig.~\ref{fig:observables08}(a). Additionally, the charge remains constant around $c\approx 1$. For large values of the pump strength $A\gtrsim 5.01J_\|/L$, the density imbalance vanishes (see Fig.~\ref{fig:observables08}(c)). The chiral current saturates, while the currents on the rungs are still suppressed (see Fig.~\ref{fig:observables08}(a)). The single particle correlation function decays algebraically. Considering these previous findings together with the fact that the state has one gapless mode ($c\approx 1$), the state above $A\gtrsim 5.01J_\|/L$ is a Meissner superfluid. Thus, for the parameters $\varphi=0.8\pi$, $\rho=0.8$ and $U=1J_\|$ the dynamical stabilization of a vortex lattice superfluid with $\rho_v=1/3$, a biased ladder superfluid and a Meissner superfluid states is possible. \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure7.eps} \caption{(a) The expectation value of the directed rung tunneling $\langle K_\perp \rangle/L$ for the parameters $\varphi=0.9\pi$, $\rho=0.5$, $U=1.5J_\|$, and $V_{trap}=0$, for two system sizes, $L=120$ and $L=60$. The straight (red) line represents the right-hand side of the self-consistency condition, which is a linear function with the slope $\frac{J_\|}{AL}$. The crossings of the two curves give the solutions of the self-consistency equation. (b) The solutions $J_\perp/J_\|$ of the self-consistency equation which are proportional to the cavity field $2\hbar\tilde{\Omega} Re(\alpha)$ versus the pump strength $AL/J_\|$ for $L=120$. The filled colored areas represent the extent of different phases. In the grey area the stability of the solutions is not clear for all system sizes. } \label{fig:kpersol09} \end{figure} \subsection{\label{sec:parameters2}Steady state diagram at flux $\varphi=0.9\pi$, \\filling $\rho=0.5$ and on-site interaction $U=1.5J_\|$ in a homogeneous system} \label{3c} \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure8.eps} \caption{(a) Chiral current $J_c$ and average rung current $J_r$ as a function of the pump strength $AL/J_\|$, (b) central charge $c$, computed from the scaling of entanglement entropy, for the parameters $\varphi=0.9\pi$, $\rho=0.5$, $U=1.5J_\|$, and $V_{trap}=0$. The errorbars represented the fit error. In the vortex superfluid region we represented the value of the central charge for two system sizes, $L=120$ and $L=60$, which shows a strong size dependent behavior. Dashed horizontal lines indicate the constant value 0, 1 or 2, as a guide to the eye.} \label{fig:observables09} \end{figure} \begin{figure}[thbp] \centering \includegraphics[width=.5\textwidth]{figure9.eps} \caption{The vortex density $\rho_v$ as a function of the pump strength $AL/J_\|$, where the rung current is finite for the parameters $\varphi=0.9\pi$, $\rho=0.5$, $U=1.5J_\|$, and $V_{trap}=0$. The vortex density has the value $\rho_v=1/2$ for $5.3J_\|/L\lesssim A\lesssim 6.1J_\|/L$, which represents the $\text{VL}_{1/2}\text{-SF}$ phase. Dashed horizontal line indicates the constant value $1/2$. } \label{fig:vortexd09} \end{figure} In the following, we will present which steady states can be dynamically organized for the parameters ${\varphi=0.9\pi}$, $\rho=0.5$ and $U=1.5J_\|$ in a homogeneous system. We show that a dynamical stabilization of a vortex superfluid, a $\text{VL}_{1/2}\text{-SF}$, and a Meissner Mott-insulating state is possible. In Fig.~\ref{fig:kpersol09}(a) the expectation value of the directed rung tunneling $\langle K_\perp \rangle/L$ has been plotted for $L=120$ and $L=60$. For small $J_\perp$, corresponding to the vortex phases, $\langle K_\perp \rangle$ increases rapidly with $J_\perp$, whereas for large $J_\perp$, in the Meissner phase, $\langle K_\perp \rangle$ has a slow increase. In the regime where the two system sizes agree (for $J_\perp>1.8$), $\langle K_\perp \rangle$ is monotonic and concave, with small jumps near the phase transitions. From the intersection of this curve with a line with the slope $\frac{J_\|}{AL}$ and checking the stability condition (\ref{eq:condition2}), we compute the stable solutions plotted in Fig.~\ref{fig:kpersol09}(b). For the size $L=120$ a stable solution can be found in the entire parameter regime shown, beside close to the phase transitions \cite{notesystsize}. Due to the shape of $\langle K_\perp \rangle$, one can find non-trivial solutions above a certain value of the pump strength $A\approx 4.6J_\|/L$ (see Fig.~\ref{fig:kpersol09}(b)), where the cavity field takes a finite value. The coupling between a many-body system and an optical cavity can result in the presence of bifurcation points in its phase diagram~\cite{Tian2016, GuckenheimerHolmes1983}. In the case of $L=120$ we can see that around $A\approx 4.6J_\|/L$ the steady state diagram shows a transition from a trivial stable solution to one of the two nontrivial solutions, $J_\perp(A)$ or $-J_\perp(A)$. In the regions where the phase transitions take place $5.3J_\|/L\lesssim A\lesssim 5.4J_\|/L$ and $6.07J_\|/L\lesssim A\lesssim 6.1J_\|/L$, multiple solutions of the self-consistency condition can exist for the same value of the pump strength. Due to the limited numerical resolution, we cannot decide which solutions are stable. \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure10.eps} \caption{The absolute value of the single particle correlations, $|\langle b^\dagger_{m,L/4} b_{m,L/4+d}+\text{H.c.} \rangle|$, in a semi-logarithmic plot, in the Meissner phase, for $L=240$, $A=6.7 J_\|/L$, $\varphi=0.9\pi$, $\rho=0.5$, $U=1.5J_\|$, and $V_{trap}=0$. The correlations decay exponentially, which signals the Mott-insulating phase. The red curve is the fit $\propto e^{-\alpha x}$, with the fit parameter is $\alpha=0.112\pm 0.02$. } \label{fig:corr09} \end{figure} In the following, we characterize the steady states which correspond to the stable solutions. In Fig.~\ref{fig:observables09}(a), we can see that below $A\lesssim 6.1J_\|/L$ the rung currents take finite values which indicates a vortex state. A clear abrupt change of the rung current and other observables signals another transition between states at approximately $5.3J_\|/L\lesssim A\lesssim 5.4J_\|/L$. The vortex state in between $5.4J_\|/L \lesssim A\lesssim 6.1J_\|/L$ is characterized by a stable vortex density $\rho_{v}=1/2$ which points towards a $\text{VL}_{1/2}\text{-SF}$ state. This state is confirmed by the value of the central charge $c\approx 1$ (Fig.~\ref{fig:observables09}(b)) and the algebraic decay of the single particle correlation functions (not shown). We observe that in the $\text{VL}_{1/2}\text{-SF}$ phase the chiral current changes its sign due to the increase of the unit cell, as explained in Refs.~\cite{GreschnerVekua2015, GreschnerVekua2016}. The incommensurate vortex density below $A\lesssim 5.4J_\|/L$ suggests a vortex liquid state. It would have a central charge of two. However, the value of the central charge extracted from our numerical calculations still depends crucially on the system size as shown in Fig.~\ref{fig:observables09}(b) such that a final conclusion is difficult. For a pump strength above $A\gtrsim 6.1J_\|/L$ the rung current is suppressed and the current flows only along the legs of the ladder. The central charge vanishes indicating a totally gapped system. This is confirmed by the exponential decay of the single-particle correlations with distance as seen in Fig.~\ref{fig:corr09}. This state is a Meissner Mott-insulator. Thus for the parameters $\varphi=0.9\pi$, $\rho=0.4$ and $U=1.5J_\|$ the dynamical stabilization of a vortex liquid superfluid, vortex lattice superfluid with $\rho_v=1/2$ and a Meissner Mott-insulating states is possible. \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure11.eps} \caption{The expectation value of the directed rung tunneling $\langle K_\perp \rangle$ in the presence of a harmonic trapping potential, $V_{trap}=1.5J_\|$, for the parameters $\varphi=0.9\pi$, $U=1.5J_\|$ and $L=60$, for two particle numbers, $N= 60$ and $N= 30$. For the points marked with red circles we identified the phases present in the center part of the trap and they are discussed in the main text. } \label{fig:kpertrap} \end{figure} \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure12.eps} \caption{(a) The expectation value of the local density $\langle n_{m,j} \rangle$ (blue line) and the local rung current $\langle j_{j}^\perp \rangle$ (purple line), for $J_\perp=2.5J_\|$, in the $\text{VL}_{1/2}\text{-SF}$ state. (b) The expectation value of the local density $\langle n_{m,j} \rangle$ on the two legs of the ladder $m=0$ (blue line) and $m=1$ (red line), for $J_\perp=4J_\|$, in the biased ladder phase. The parameters used are $\varphi=0.9\pi$, $U=1.5J_\|$, $N=60$ and $L=60$, in the presence of a harmonic trapping potential, $V_{trap}=1.5J_\|$. } \label{fig:trap1} \end{figure} \subsection{\label{sec:trap}The effect of a harmonic potential on the steady states} In the previous sections we have focused on the homogeneous case without any trapping potentials, in this subsection we will consider the effect of a harmonic trapping potential $H_{trap}$ on the steady states. \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure13.eps} \caption{The value of the single particle correlations, weighted by the inhomogeneous density, $\sqrt{\langle n_{1,16+d}\rangle}^{-1}\langle b^\dagger_{1,16} b_{1,16+d}+\text{H.c.} \rangle$, in the biased ladder state. The correlations decay algebraically, which signals the superfluid state. The red curve is the fit $\propto x^{-\alpha}\cos(\beta x)$, with the fit parameters $\alpha=0.263\pm 0.007$ and $\beta=1.114\pm 0.001$. The parameters used are $J_\perp=4J_\|$, $\varphi=0.9\pi$, $U=1.5J_\|$, $N=60$ and $L=60$, in the presence of a harmonic trapping potential, $V_{trap}=1.5J_\|$ (the same as in Fig.\ref{fig:trap1}(b)). } \label{fig:trapcorr1} \end{figure} \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure14.eps} \caption{a) The expectation value of the local density $\langle n_{m,j} \rangle$ (blue line) and the local rung current $\langle j_{j}^\perp \rangle$ (purple line), for $J_\perp=2.2J_\|$, in the $\text{VL}_{1/2}\text{-SF}$ state. (b) The expectation value of the local density $\langle n_{m,j} \rangle$, for $J_\perp=4.5J_\|$, in the Meissner-Mott insulating state. The parameters used are $\varphi=0.9\pi$, $U=1.5J_\|$, $N=30$ and $L=60$, in the presence of a harmonic trapping potential, $V_{trap}=1.5J_\|$. The dashed horizontal line indicates the constant value $0.5$. } \label{fig:trap2} \end{figure} \begin{figure}[hbtp] \centering \includegraphics[width=.5\textwidth]{figure15.eps} \caption{(a) The absolute value of the single particle correlations, weighted by the inhomogeneous density, $\sqrt{\langle n_{m,23+d}\rangle}^{-1}|\langle b^\dagger_{m,23} b_{m,23+d}+\text{H.c.} \rangle|$, in a logarithmic plot, for $J_\perp=2.2J_\|$. The correlations decay algebraically, which signals the superfluid state. The red curve is the fit $\propto x^{-\alpha}$, with the fit parameter $\alpha=0.15\pm 0.01$. (b) The absolute value of the single particle correlations, in a semi-logarithmic plot, for $J_\perp=4.5J_\|$. The correlations decay exponentially, which signals the Mott-insulating state. The red curve is the fit $\propto e^{-\alpha x}$, with the fit parameter $\alpha=0.34\pm 0.04$. The parameters used are $\varphi=0.9\pi$, $U=1.5J_\|$, $N=30$ and $L=60$, in the presence of a harmonic trapping potential, $V_{trap}=1.5J_\|$. } \label{fig:trapcorr2} \end{figure} In the following, we will discuss which steady states can be dynamically organized for flux ${\varphi=0.9\pi}$, on-site interaction $U=1.5J_\|$ and two values of the total particle number $N= 60$ and $N=30$, in a harmonic trap of strength $V_{\text{trap}}=1.5J_\|$. Due to the trapping potential, the density of the atoms varies throughout the system and a coexistence of different states can be found across the trapped region. Thus, in order to identify the states we analyze local observables, as the local density or the local rung currents, Eq.~(\ref{eq:localcur}). We focus on the states that are present in the center region of the trap, where the gradient of the trapping potential is relatively small. The simulated system size has been chosen such that the density decays to zero before reaching the boundary. In Fig.~\ref{fig:kpertrap} the expectation value of the directed tunneling $\langle K_\perp \rangle$ has been plotted for the two values of the filling. We can see that we have stable steady states for $J \gtrsim 1.5 J_\|$ (for $N=60$) and $J \gtrsim 1J_\|$ (for $N=30$). We marked in Fig.~\ref{fig:kpertrap} the points for which we identify the nature of these stable steady states. In Fig.~\ref{fig:trap1}(a) the density profile along one leg of the ladder and the local rung current pattern are depicted for the case with particle number $N=60$, which leads to a central filling of $\rho\approx0.86$ and $J_\perp=2.5J_\|$, corresponding to a pump strength of $A\approx0.067J_\|$. One can observe a varying density distribution along the leg of the ladder, which points towards a compressible state, namely a superfluid phase. The rung current pattern in the central region exhibits commensurate vortices with a vortex density of $\rho_v=1/2$. Thus, we identify this state as the $\text{VL}_{1/2}\text{-SF}$. For the same particle number $N= 60$ and $J_\perp=4J_\|$, corresponding to pump strength $A\approx0.094J_\|$, the density profile for each leg of the ladder has been plotted in Fig.~\ref{fig:trap1}(b). We observe that a density imbalance between the two legs of the ladder is present throughout the ladder, except at the boundaries where the density is close to $0$. The finite density imbalance indicates that in the central region a biased ladder state forms. The superfluid nature of this state is confirmed by the algebraic decay of the single particle correlation function, weighted by the inhomogeneous density \cite{KollathZwerger2004}, along one of the legs of the ladder (see Fig.~\ref{fig:trapcorr1}). In the case of $N=30$ and $J_\perp=2.2J_\|$, corresponding to a pump strength of $A\approx0.103J_\|$, we also identify a $\text{VL}_{1/2}\text{-SF}$ state in the center of the trap, by analyzing the local density profile and the rung current configuration depicted in Fig.~\ref{fig:trap2}(a). The single particle correlation function, weighted by the inhomogenous density, decays algebraically in this superfluid state. By increasing the pump strength to $A\approx0.168J_\| $ with self-consistent solution of $J_\perp=4.5J_\|$, an incompressible state is formed in the center of the trap which is indicated by the density plateau at filling $\rho=0.5$ as shown in Fig.~\ref{fig:trap2}(b). The exponential decay of the single particle correlations in the plateau region (see Fig.~\ref{fig:trapcorr2}(b)) and suppressed rung currents, confirm the presence of a Meissner Mott-insulator in the center of the ladder which is stabilized via the coupling of the atoms to the cavity. The Mott-insulating state is surrounded by a small region of a superfluid. Thus, we confirm that even in the presence of a harmonic trapping potential the dynamical stabilization of vortex lattice superfluid with $\rho_v=1/2$, biased ladder and Meissner Mott-insulating states is achievable. We expect that other interesting states are similarly robust and can also be stabilized in the presence of a harmonic trapping potential. \section{\label{sec:conclusion}Conclusions} In this work we investigated the steady state diagram of bosonic atoms coupled to an optical cavity. The bosonic atoms are confined to quasi-one-dimensional ladder structures with a large potential offset between the legs formed by optical lattices in the presence and abscence of a harmonic trapping potential. Due to the chosen coupling of the atoms and the cavity field, the tunneling on the rungs takes place via the generation or annihilation of a cavity photon and has a spatial dependent phase imprint, which breaks the time reversal symmetry. Above a critical value of the pump strength, due to the feedback between the atoms and the cavity field, a finite occupation of the cavity field mode arises and the bosonic atoms feel an artificial gauge field. We demonstrated the stabilization of Meissner phases both in the superfluid (M-SF) and in the Mott insulator (M-MI) regimes. Additionally, we find vortex superfluid phases which can be incommensurate (V-SF), or commensurate with the ladder ($\text{VL}_{\rho_v}\text{-SF}$), the vortex lattice states. Finally, a biased-ladder superfluid phase with imbalanced density on the two legs of the ladder is also stabilized. Furthermore, we show that in the presence of the harmonic trapping potential, a vortex lattice superfluid $\text{VL}_{\rho_v}\text{-SF}$, a biased ladder and a Meissner Mott-insulating states are stablized in the center of the trap. One of the advantages of the dynamic stabilization of the states is their robustness. The evolution towards the steady states is characterized by an dissipative attractor dynamics which means that many external perturbations will decay exponentially towards the steady state. The extension of the presented scheme to a two-dimensional geometry is of interest since the ground state of the two-dimensional Bose-Hubbard model in an artificial magnetic field can exhibit exciting phases like vortex lattice superfluid phases with different vortex configurations, that are breaking the spatial symmetry, \cite{GoldbaumMueller2008, GoldbaumMueller2009, PowellSarma2011}, or bosonic integer and fractional quantum Hall states \cite{HeVishwanath2017}. Experimentally, the proposed setup can be implemented in different ways. We mentioned the ladder structures created using superlattice potentials, however, an alternative method is to use the synthetic lattice dimension. In this implementation the atoms are confined to one-dimensional structures and the second direction is implemented by internal states of the atoms \cite{CeliLewenstein2014, ManciniFallani2015, StuhlSpielman2015}. The transitions between the two states are implemented via Raman transitions employing the cavity mode and an external pump beam. In order to distinguish the different steady states one can perform different measurements. A very important measurement is the occupation of the cavity field which can be obtained from the leaking of the photons of the cavity. This already gives the distinction between the trivial and non-trivial self-organized phases and identifies by this the dynamically organized gauge field. Additionally, one would like to obtain more information on the state of the atomic component. There are different possibilities and depending on the experimental setup and the state one is particularly interested in. From insitu measurements of local densities, one can identify the biased ladder phase and obtain information on the different vortex patterns. In Ref.~\cite{AtalaBloch2014}, Atala et al. (2014) measure the chiral currents and the momentum distribution, from a measurement schedule involving the projection onto double wells. Furthermore, in Ref.~\cite{GreschnerVekua2016} by Greschner et al. (2016) a connection between the peak in the momentum distribution and the vortex density is drawn. From the vortex density one can distinguish the vortex liquids from the vortex lattices. Additionally to these destructive measurement of the the atomic component, a non-destructive method to measure the chiral current from the photons leaking from the cavity has been introduced \cite{KollathBrennecke2016}. This uses a probe beam and another cavity mode in which the tunneling along chain of the ladder is coupled to the empty probe cavity mode and the chiral current can, thus, be directly measured by observing the appropriate quadrature using a heterodyne detection scheme. \section*{\label{sec:acknowledgments}Acknowledgments} We thank F. Heidrich-Meisner, U. Schollw\"ock, and S. Wolff for fruitful discussions. We acknowledge financial support from the DFG (individual research grant, FOR 1807 and TR 185).
\section{Analysis of simulated noise maps} \label{Analysis_maps} In this section we describe the noise maps produced with MADAM from timelines simulated with the TOAST pipeline described above. We analyse these maps to assess the robustness of the \textit{CORE}\ scanning strategy in measuring the sky Stokes parameters with adequate purity. We also explore possible tweaks to the scanning parameters to verify if they lead to increase robustness. Finally, we analyse the properties of the noise maps to find requirements on the detector knee frequency that ensure that residual contributions to the map on large angular scales are kept under control. \begin{table} \centering \begin{tabular}{|l|l|c|} \hline \multicolumn{2}{|l|}{Parameter} & Value \\ \hline \hline \multicolumn{2}{|l|}{Precession angle [$^\circ$]} & 30 \\ \hline \multicolumn{2}{|l|}{Spin angle [$^\circ$]} & 65 \\ \hline \multicolumn{2}{|l|}{Precession period [days]} & 4 \\ \hline \multicolumn{2}{|l|}{Spin period [s]} & 120 \\ \hline \multicolumn{2}{|l|}{Hours of observation per day [h]} & 24 \\ \hline \multicolumn{2}{|l|}{Length of a single chunk of data [h]} & 24 \\ \hline \multicolumn{2}{|l|}{Observation duration [days]} & 366 \\ \hline \multicolumn{2}{|l|}{Number of detectors} & 2 \\ \hline \multicolumn{2}{|l|}{Frequency [GHz]} & 145 \\ \hline \multicolumn{2}{|l|}{FWHM [arcmin]} & 7.68 \\ \hline \multicolumn{2}{|l|}{Sampling rate [Hz]} & 84.97 \\ \hline \multicolumn{2}{|l|}{Polarization orientation detector 1 [$^\circ$] }& -22.5 \\ \hline \multicolumn{2}{|l|}{Polarization orientation detector 2 [$^\circ$]} & 67.5 \\ \hline \multicolumn{2}{|l|}{Knee frequency $f_k$ [mHz]} & 0, 10, 20, 50 \\ \hline \multicolumn{2}{|l|}{Noise slope $\alpha$} & 1.0 \\ \hline \multicolumn{2}{|l|}{NET [$\mathrm{\mu K\!\sqrt{\mathrm{s}}}$]} & 52.3 \\ \hline \multirow{2}{3 cm}{Deviation from boresight [$^\circ$]} & `high' & +4.7 \\ \cline{2-3} & `low' & -4.7 \\ \hline \multicolumn{2}{|l|}{$\mathrm{N_{side}}$} & 1024 \\ \hline \multicolumn{2}{|l|}{Offset length (with noise prior) [s]} & 1.0 \\ \hline \end{tabular} \caption{\footnotesize{Parameters supplied to TOAST to generate the baseline simulations. See text for details. The sampling rate is chosen to ensure four samples per beam FWHM.}}\label{tab:toast_parameters} \end{table} In Table \ref{tab:toast_parameters} we summarize the parameters we selected as input to TOAST to produce the maps we analyse in this Section. More detail about the parameters in this Table and on \textit{CORE}'s scanning strategy is given in \cite{ECO.instrument.paper}). We consider the \textit{CORE}\ baseline scanning strategy with spin and precession angles of $65^\circ$ and $30^\circ$ respectively, with corresponding periods of 120 s and 4 days respectively. In this Section we consider timelines containing only instrumental noise. Signal contributions are examined in Sections \ref{sec:BandpassMismatch}, \ref{sec:AsymmetricBeam} and \ref{sec:Calibration} below. We simulate an entire year of observations divided into segments of 24 hours. These are then combined to produce the final map. This segment size is a reasonable compromise between the need to capture long timescale features in the noise and the desire to minimize computational and memory requirements. We assume a noise model with power spectrum density: \begin{equation}\label{eq:noisemodel} P(f)=A\left[\left(\frac{f_k}{f}\right)^\alpha+1\right] \end{equation} where $f$ is the frequency, $f_k$ the knee frequency which we will vary below, $A$ the amplitude and $\alpha$ a slope equal to 1. A reasonable choice for \textit{CORE}\ two detector system is $f_k=20$\,mHz and an amplitude corresponding to a NET of $53.2\; \mathrm{\mu K\!\sqrt{\mathrm{s}}}$. The impact of cross-correlation of noise between detectors is discussed in Section \ref{sec:CorrelatedNoise} below, were we employ, in place of MADAM a dedicated map-making code, ROMA \citep{2016A&A...593A..15D}, capable of taking cross-correlation information in account to deliver a lower noise solution. In the remainder of this Section we consider a pair of polarization sensitive detectors at 145\,GHz at the same position in the focal plane, either at the boresight or at the edges of the focal plane, oriented at $-22.5^\circ$ and $67.5^\circ$ with respect to the scan direction. This choice equalizes the noise power in the $Q$ and $U$ Stokes parameters and produces EE and BB angular power spectra with similar amplitude. In any case, any particular choice of orientation becomes irrelevant when producing maps from a large number of detectors, assuming their orientations are evenly spaced. We adopt these particular values for the sole purpose of achieving balance in the Stokes parameters in this minimal two-detector exercise. We also simulate the sky as observed by detectors at the edge of the focal plane. These are modelled by considering two pairs of detectors at $\pm 4.7^\circ$ with respect to the boresight along the direction orthogonal to the scan direction. These have the same polarization orientation as the boresight detectors and are labelled as `high' and `low' detectors in Table \ref{tab:toast_parameters} and hereinafter. The hit map for the two-detector case described above is given in Fig.~\ref{fig:hitsmap}, having chosen a boresight direction. The irregular small-scale features, hardly visible at standard figure size, would be diluted when considering a larger number of detectors. From this simple exercise, we show that the \textit{CORE}\ scanning strategy leads to a complete sky coverage in around 6 months, yet a coverage of around 45\% of the full sky is achieved in just 4 days thanks to the wide precession. After one year, all pixels in the sky have been observed at least 200 times by a pair of detectors, assuming 3.4 arcmin pixels (HEALPix\ $\mathrm{N_{side}}=1024$). The hit map in Galactic coordinates is overplotted with an estimate of the total diffuse polarized foregrounds at 70\,GHz, where emission is close to a minimum \citep{Planck_2015_X}. This estimate was obtained using the \textit{Planck}\ 353\,GHz and 30\,GHz polarized maps respectively as dust and synchrotron templates. This simple exercise shows how the \textit{CORE}\ scanning strategy provides high signal-to-noise sampling of regions that are remarkably clean of polarized foreground emission. Of course, the use of specific component separation techniques will reduce residual foreground emission considerably \citep{ECO.foregrounds.paper}. \begin{figure} \centering \includegraphics[scale=0.6]{Figures/hmap_single.pdf} \includegraphics[scale=0.6]{Figures/hmap_foreground.pdf} \caption{\footnotesize{Hit map for a pair of detectors located at the center of the focal plane after one year of observation. The map is shown in Ecliptic coordinates (left) and in Galactic coordinates (right). We also show (orange contours) an estimate of the polarization amplitude of the foregrounds at 70\,GHz, a frequency close to the minimum emission of diffuse foregrounds. The outermost contour corresponds to $1.3$\ifmmode \,\mu$K$\else \,$\mu$\hbox{K}\fi\ in polarized intensity, and the subsequent contours to further steps of $1.3$\ifmmode \,\mu$K$\else \,$\mu$\hbox{K}\fi.}} \label{fig:hitsmap} \end{figure} We compute the white noise covariance matrix for the chosen scanning strategy. This gives a $3\times3$ symmetric positive definite matrix for $(I,Q,U)$ in each pixel. In so doing, we ignore $1/f$ contributions that would generate correlations between pixels. For these $3\times3$ matrices we compute the reciprocal condition number (RCN), defined as the ratio of its smallest to largest eigenvalue. The RCN is an useful indicator to decide whether a matrix is ill-conditioned. We employ it here to verify the purity of the map-making solution for the Stokes parameters. A RCN of $1/2$ is achieved only in ideal cases, while values too low, even if still adequate from a purely numerical standpoint, may leave the system vulnerable to non-idealities, by amplifying the effects of systematic contributions in the timeline. We set a limit of a minimum RCN of $10^{-2}$ for the present analysis. We also compute the angular power spectra (APS) of the simulated noise maps. The noise APS allow to assess the destriping efficiency of MADAM in controlling spurious low-frequency contributions. \subsection{Baseline scanning strategy} \begin{figure} \centering \includegraphics[scale=0.3]{Figures/wcov_II.pdf} \includegraphics[scale=0.3]{Figures/wcov_QQ.pdf} \includegraphics[scale=0.3]{Figures/wcov_II_galattiche.pdf} \includegraphics[scale=0.3]{Figures/wcov_QQ_galattiche.pdf}\\ \includegraphics[scale=0.3]{Figures/wcov_UU.pdf} \includegraphics[scale=0.3]{Figures/wcov_QU.pdf} \includegraphics[scale=0.3]{Figures/wcov_UU_galattiche.pdf} \includegraphics[scale=0.3]{Figures/wcov_QU_galattiche.pdf}\\ \includegraphics[scale=0.3]{Figures/wcov_IQ.pdf} \includegraphics[scale=0.3]{Figures/wcov_IU.pdf} \includegraphics[scale=0.3]{Figures/wcov_IQ_galattiche.pdf} \includegraphics[scale=0.3]{Figures/wcov_IU_galattiche.pdf} \caption{\footnotesize{Elements of the white noise covariance matrix for a pair of boresight detectors displayed as maps in units of $\mu K^2$: $II$ (top left), $QQ$ (top right), $UU$ (center left), $QU$ (center right), $IU$ (bottom left), $IQ$ (bottom right). Coordinates are Ecliptic (left columns) and Galactic (right columns). Notice that $IQ$ and $IU$ correlations are very weak.}}\label{fig:noisemaps} \end{figure} In Fig. \ref{fig:noisemaps} we show maps of the elements of the $3\times3$ white noise covariance matrices produced by MADAM for the case of boresight detectors for both Ecliptic and Galactic coordinates, and histograms of these matrix elements are shown in Fig. \ref{fig:histcov}. Larger values of these histograms reflect larger pixel variance of the noise maps. An effective scanning strategy will achieve compact histograms with low mean values and minimal tails. These requirements are reasonably satified by \textit{CORE}, as observed in Fig. \ref{fig:histcov}: the histograms do not possess large tails, total intensity has smaller values with respect to polarization by a factor of 2, and the $QQ$ and $UU$ histograms are very similar to one another. This last property is influenced by the particular choice of the orientations of the detectors as explained above. In addition, intensity and polarization show almost negligible correlations, while $QU$ does show significant correlation features. These however are expected to vanish when a multi-detector map from an entire frequency channel is produced, in view of the large number of detectors per frequency expected by \textit{CORE}, and the desirable variation in mutual orientation (in fact, it would suffice to consider only four detectors with polarization angles at exactly $45^\circ$ to each other to have this correlation vanish). \begin{figure} \centering \includegraphics[scale=0.39]{Figures/TT_baseline_b_h_l.pdf} \includegraphics[scale=0.39]{Figures/QQ_baseline_b_h_l.pdf} \includegraphics[scale=0.39]{Figures/UU_baseline_b_h_l.pdf}\\ \includegraphics[scale=0.39]{Figures/TQ_baseline_b_h_l.pdf} \includegraphics[scale=0.39]{Figures/TU_baseline_b_h_l.pdf} \includegraphics[scale=0.39]{Figures/QU_baseline_b_h_l.pdf}\\ \includegraphics[scale=0.39]{Figures/TT_baseline_b_galattiche.pdf} \includegraphics[scale=0.39]{Figures/QQ_baseline_b_galattiche.pdf} \includegraphics[scale=0.39]{Figures/UU_baseline_b_galattiche.pdf}\\ \includegraphics[scale=0.39]{Figures/TQ_baseline_b_galattiche.pdf} \includegraphics[scale=0.39]{Figures/TU_baseline_b_galattiche.pdf} \includegraphics[scale=0.39]{Figures/QU_baseline_b_galattiche.pdf} \caption{\footnotesize{Histograms of the $3\times3$ pixel covariance matrix elements in Ecliptic coordinates (first and second rows) and in Galactic coordinates (third and fourth rows). There are minimal intensity-to-polarization couplings (notice the change of scale) but significant $QU$ residual correlation.}} \label{fig:histcov} \end{figure} As described above, a useful quantity for assessing the map-making inversion is the RCN. The RCN for the boresight solution is shown in Fig \ref{fig:invcov_baseline}. Reasonable requirements for optimal inversion are an average value across the histogram higher than 0.25 and no pixels with values lower than $10^{-2}$. With the \textit{CORE}\ scanning strategy, we obtain an average value of about 0.41 and no pixels with values lower than 0.2, hence the separation of the Stokes parameters as allowed by the scanning strategy alone is very good. This shows that from the point of view of map-making effectiveness, \textit{CORE}\ can efficiently modulate polarization without resorting to a rotating half-wave plate. It should be mentioned that we have investigated the ideal performance of the scanning strategy here, neglecting, for example, cross-polar leakage. In Fig.~\ref{fig:histcov} we also show the histograms of the noise covariance matrix for the high (blue) and low (red) detectors. One of the risks for detectors at the edge of the focal plane is not achieving complete sky coverage. This is avoided by imposing the condition that the sum of the spin and precession angles is more than $90^\circ$ for the entire focal plane. In \textit{CORE}, the sum of these angles for the low detectors is $90.3^\circ$ allowing for the complete sky coverage across the whole focal plane. We have used these simulations to verify that this is indeed the case. The histogram shapes are similar to the boresight ones, and there are no anomalous values of the noise covariance matrix elements. In Fig. \ref{fig:invcov_baseline} we show the RCN for the high and low detectors, which on average are quite similar to boresight. Low detectors show slightly higher RCN, high detectors show slightly lower RCN. This allows us to extend the above conclusions about the clean separation of the Stokes parameters to the whole focal plane. \begin{figure} \centering \includegraphics[scale=0.5]{Figures/rcond_baseline_b_h_l.pdf} \caption{\footnotesize{Histograms of the reciprocal condition numbers for the boresight, high and low detectors.}} \label{fig:invcov_baseline} \end{figure} In Fig.~\ref{fig:APSbase} we show the average $TT$, $EE$ and $BB$ APS from 1000 noise realizations for the boresight, high and low detectors (details of our Monte Carlo pipeline are given in Appendix A). We also show the $1\,\sigma$ dispersion of the boresight case. As already noted for the RCN, the APS of different detectors are all similar. The APS of low detectors show slightly lower amplitudes than the other two. The $EE$ and $BB$ amplitudes are practically the same as a result of the choice of the polarization orientations. All spectra show a large scale (low multipole) excess, due to residual $1/f$ contribution after destriping. The impact of different knee frequencies is discussed in Section \ref{fknee}. \begin{figure} \centering \includegraphics[scale=0.39]{Figures/TT_baseline_b_h_l_core_paper.pdf} \includegraphics[scale=0.39]{Figures/EE_baseline_b_h_l_core_paper.pdf} \includegraphics[scale=0.39]{Figures/BB_baseline_b_h_l_core_paper.pdf} \caption{\footnotesize{Angular power spectra for $TT$ (left), $EE$ (centre) and $BB$ (right) of the baseline simulations for the boresight, high and low detectors. We show the average of 1000 simulations and the $1\,\sigma$ dispersion for the boresight case (shaded regions).}} \label{fig:APSbase} \end{figure} \subsection{Optimizing the scanning strategy} We investigate possible optimizations of the \textit{CORE}\ scanning strategy by analysing the effect of varying the spin angle and the precession angle. We consider seven pairs of values keeping the sum of these angles equal to $95^\circ$ for the boresight detectors in order to preserve full sky coverage for the entire focal plane. In this way we define seven `tweaked' cases to be compared to the baseline \textit{CORE}\ scanning strategy (see Table \ref{tab:tweak_cases} for the chosen values, all the other parameters are the same as in Table~\ref{tab:toast_parameters}). \begin{table} {\footnotesize \centering \begin{tabular}{|l|c|c|c|c|c|c|c|c|} \hline Parameter & Baseline & Tweak 1 & Tweak 2 & Tweak 3 & Tweak 4 & Tweak 5 & Tweak 6 & Tweak 7 \\ \hline \hline Precession angle [$^\circ$] & 30 & 32 & 34 & 36 & 38 & 40 & 45 & 50 \\ \hline Spin angle [$^\circ$] & 65 & 63 & 61 & 59 & 57 & 55 & 50 & 45 \\ \hline \end{tabular}} \caption{\footnotesize{Parameters modified with respect to Table~\ref{tab:toast_parameters} to obtain tweaked cases to evaluate a possible optimization of the \textit{CORE}\ scanning strategy. The first column gives the baseline parameters.}}\label{tab:tweak_cases} \end{table} In Fig. \ref{fig:invcov_tweak} we show the RCN of the noise covariance matrices for the tweaked cases considering the boresight, high and low detectors. The RCN are all quite similar with average values around $0.4$ for all cases. Cases from 1 to 5 show larger tails towards lower RCN values and therefore their average RCN is slightly lower. Cases 6 and 7 show slightly improved RCN with respect to the baseline especially for the boresight detectors. The improvements are less evident when the high and low detectors are considered. The highest mean RCN is achieved by case 6 with a value of about 0.42 for the boresight detector which, given the dispersion of the RCN values shown in Fig.~\ref{fig:invcov_tweak}, is not significantly different from the 0.41 achieved by the baseline, in view of the generous spread of RCN values. This is a small improvement that would require significant changes in spin and precession angles, and would have negative impacts on other subsystems of the spacecraft (for example, a lower power supply due to the change in solar aspect angle). \begin{figure} \centering \includegraphics[scale=0.39]{Figures/rcond_boresight_tweak_cases.pdf} \includegraphics[scale=0.39]{Figures/rcond_high_tweak_cases.pdf} \includegraphics[scale=0.39]{Figures/rcond_low_tweak_cases.pdf} \caption{\footnotesize{Histograms of the RCN for the boresight (left), high (centre) and low (right) detectors in the tweaked cases compared to the baseline (cyan). The vertical dotted lines show the mean values.}} \label{fig:invcov_tweak} \end{figure} In Fig.~\ref{fig:APS_tweak} we show the APS of the noise maps for the boresight, high and low detectors. All the APS here are the result of the average over 10 noise realizations. The APS of the tweaked cases are compared to the baseline and its $1\,\sigma$ dispersion delimited by the cyan shaded region. At small scales the APS are all almost identical. Larger differences are evident at large scales, but they are well inside the $1\,\sigma$ dispersion. \begin{figure} \centering \includegraphics[scale=0.39]{Figures/TT_boresight_tweak_cases_paper.pdf} \includegraphics[scale=0.39]{Figures/EE_boresight_tweak_cases_paper.pdf} \includegraphics[scale=0.39]{Figures/BB_boresight_tweak_cases_paper.pdf} \caption{\footnotesize{$TT$ (left), $EE$ (centre) and $BB$ (right) APS of the baseline simulations for the boresight detectors compared to the tweaked cases described in Table \ref{tab:tweak_cases}.}}\label{fig:APS_tweak} \end{figure} Our conclusion from this exercise is that any gain in tweaking the scanning strategy parameters is modest and probably is not worth attempting, at least for the figures of merit considered above, but does leave some flexibility to optimize others. \subsection{$1/f$ noise performance}\label{fknee} In this Section we investigate the effect of the low frequency noise properties. We simulate a year of observations for a pair of boresight, high or low detectors considering several knee frequencies $f_k$ in the range between $0$-$50$\,mHz, a range that appears reasonable in view of \textit{CORE}'s planned detectors. As mentioned above, we make use of a noise prior in MADAM, which requires as input an estimate of the noise power spectral density. We provide here the true underlying power spectrum of the noise. Even if this may be considered an optimistic choice, in practice the impact on the results of a mismatch between the true and estimated noise properties is weak, as noted in Sect.~\ref{sec:simulations} above. We always use 1\,s as the MADAM offset length. We generate 1000 Monte Carlo (MC) realizations (see Appendix A) and apply MADAM to produce noise-only maps. The amplitude of residuals can be turned in a requirement on the maximum acceptable knee frequency. \begin{figure} \centering \includegraphics[scale=0.39]{Figures/TT_MC_totale_core_paper.pdf} \includegraphics[scale=0.39]{Figures/EE_MC_totale_core_paper.pdf} \includegraphics[scale=0.39]{Figures/BB_MC_totale_core_paper.pdf} \caption{\footnotesize{$TT$ (left), $EE$ (centre) and $BB$ (right) APS of the baseline simulations for the boresight detectors considering several knee frequencies $f_k$. We show the APS from the boresight detectors (solid lines), high detectors (dotted lines) and low detectors (dashed lines).}} \label{fig:APS_fknee} \end{figure} In Fig. \ref{fig:APS_fknee} we show the average APS from 1000 MC realizations for the knee frequencies $f_k$ of 10\,mHz (red line), 20\,mHz (blue line), 50\,mHz (black line). They are compared with the pure white noise case $f_k=0$\,mHz and its $1\,\sigma$ dispersion (cyan line and shaded region). In the same Figure we show the results for a pair of low detectors (dashed lines) and high detectors (dotted lines). As expected, we do not observe any difference between the position of the detectors in the focal plane. The effect of the destriping residuals is a larger amplitude of the noise spectrum at large scales ($\ell < 100$) and, as expected, the residuals increase with increasing $f_k$. The 10\,mHz case lies at the edge of the $1\,\sigma$ dispersion of the white noise MC. Knee frequencies lower than this value will generate noise maps that cannot be practically distinguished from pure white noise both in temperature and polarization. Therefore low frequency noise drifts have negligible effects if $f_k<10$\,mHz. We notice that a knee frequency of 20\,mHz is still an acceptable compromise showing an increase in the noise APS mostly confined to $\ell < 10$. We now turn to comparing the amplitude of $1/f$ noise residuals with primordial polarization signals. In the above analysis we considered a pair of detectors at 145\,GHz. The proposed configuration of \textit{CORE}\ has 2100 detectors in the frequency range from 60 to 600\,GHz \citep{ECO.instrument.paper}. We can use the above results to infer the impact in the APS of a noise map obtained from the entire focal plane. We consider the six cosmological channels between 130 and 220\,GHz which have the lowest noise, and produce a noise power spectrum from the combination of these channels by inverse noise weighting. We then rescale the amplitude of the noise APS derived from a pair of detectors (shown in Fig. \ref{fig:APS_fknee}) to match this noise spectrum at $\ell=300$. This approach does not fold in contributions to the final error budget arising from sources other than instrumental noise (e.g. foreground separation residuals) and for this reason we avoid using channels below 130\,GHz and above 220\,GHz, which still contain useful CMB signal. The same combination of channels has been considered in the \textit{CORE}\ cosmological parameters and inflationary forecasts discussed in \cite{ECO.Parameters.paper} and \cite{CORE_inflation}. \begin{figure} \centering \includegraphics[scale=0.5]{Figures/Realistic_noise2.pdf} \caption{\footnotesize{Polarized noise angular power spectra (coloured lines) in $EE$ and $BB$ for \textit{CORE}\ (red and blue lines respectively) and \textit{miniCORE}\ (magenta and cyan respectively), considering all channels between 130 and 220\,GHz, compared to $EE$ and $BB$ CMB theoretical spectra for several values of the tensor-to-scalar ratio $r$ (the solid curve includes lensing B modes). The shading corresponds to the $1\,\sigma$ uncertainty region. See text for details.}} \label{fig:test_noise} \end{figure} Results are shown in Fig.\ \ref{fig:test_noise}, where they are compared to $EE$ and $BB$ CMB spectra, considering for the latter several values of the tensor to scalar ratio $r$, while the other cosmological parameters are kept to the \textit{Planck}\ 2015 updated best fit values \citep{2016A&A...596A.107P}. The red dashed line shows the noise spectrum from the inverse noise weighting of the six CMB channels as described above. The solid line shows noise APS of a pair of detectors as result of the average of 1000 noise realizations (assuming $f_k=50$\,mHz and a beam of 5 arcmin), rescaled to match the dashed line at $\ell=300$. We show both $EE$ (blue line) and $BB$ (red line) spectra although they are almost indistinguishable. We also show the $1\,\sigma$ dispersion of the realizations as the shaded region. The effect of $1/f$ noise is noticeable at $\ell \lesssim 100$. However, even in this pessimistic assumption of $f_k=50$\,mHz, the noise spectrum is well below the $BB$ spectrum for $r=10^{-3}$ for $\ell \lesssim 10$. We also show in Fig.~\ref{fig:test_noise} the forecasted noise spectra (magenta for $EE$, cyan for $BB$) for the so-called \textit{miniCORE}\ design, a down-scoped configuration of \textit{CORE}\ (see \cite{ECO.instrument.paper} for more detail). We follow the same approach described above, but consider the \textit{miniCORE}\ parameters for the beam FHWM (11.9 arcmin at 145\,GHz, corresponding to a sampling rate of 54.8 Hz) and averaging over 10 noise realizations instead of 1000. All the other parameters, except of course the number of detectors per channel, are identical to \textit{CORE}\ (see table \ref{tab:toast_parameters}). Despite the noise level for \textit{miniCORE}\ is now significantly closer to the $BB$ spectrum for $r=10^{-3}$, this design still allows plenty of margin for an accurate measurement of tensor modes in view of $1/f$ residual contamination, especially considering that $f_k=50$\,mHz is taken here as a worst case scenario. \section*{Appendix A: Monte Carlo simulations} In order to run TOAST to simulate one year of observations, we need a supercomputer. During the initial development of the \textit{CORE}\ pipeline, making single runs and small sets of Monte Carlo realizations (10 at maximum), we used the high performance computing (HPC) resources at the National Energy Research Scientific Computing Center\footnote{http://www.nersc.gov} (NERSC) in the USA. In particular we used the Edison machine, a Cray XC30 supercomputer with 134,064 compute cores for a peak performance of 2.57 petaflop/s. For the larger MC runs needed to derive the results shown in Sect.~\ref{Analysis_maps} and in particular the ones for the destriping tests in Sect.~\ref{fknee}, we used the Centre for Scientific Computing (CSC) Sisu supercomputer\footnote{http://www.csc.fi} in Finland. It is a Cray XC40 supercomputer with a total theoretical peak performance of 1.69 petaflop/s. We considered 12 cases, generating 1000 realizations for each case. For each run we used 960 cores (40 nodes). We used four values of the knee frequency, $f_{k} = (0, 10, 20, 50)\,\mathrm{mHz}$, and for each value of $f_{k}$ we generated maps for the `boresight', `high', and `low' detector positions (see Table~\ref{tab:toast_parameters}). In Table~\ref{tab:noisemc_resources} we report the CPU and memory resources needed for each case. We saved the simulated noise, destriped and not, for all 1000 realizations, and the hit-map, the white noise covariance matrix and its inverse from the first realization (these are identical for all the realizations). The total size of these files is 3.4 TB. The total computational cost of these simulations was 162\,100 CPU-hours. \begin{table}[t]\footnotesize \begin{center} \begin{tabular}{|c|c|c|} \hline $f_{k}$ [mHz] & CPU time [CPUh] & Memory footprint [GB] \\ \hline \multicolumn{3}{|c|}{Boresight} \\ \hline $0$ & $18\,320$ & $586$ \\ $10$ & $11\,580$ & $586$ \\ $20$ & $12\,280$ & $586$ \\ $50$ & $11\,730$ & $586$ \\ \hline \multicolumn{3}{|c|}{High} \\ \hline $0$ & $18\,270$ & $570$ \\ $10$ & $11\,480$ & $570$ \\ $20$ & $11\,260$ & $570$ \\ $50$ & $11\,950$ & $570$ \\ \hline \multicolumn{3}{|c|}{Low} \\ \hline $0$ & $18\,610$ & $600$ \\ $10$ & $11\,650$ & $600$ \\ $20$ & $11\,690$ & $600$ \\ $50$ & $13\,280$ & $600$ \\ \hline \end{tabular} \label{tab:noisemc_resources} \caption{Resource consumption of the noise Monte Carlo cases} \end{center} \end{table}\mbox{} \section*{Appendix B: Algebra for cross correlation map-making} \label{Appendix:B} In this Appendix we briefly review the algebra of the map-making procedure and derive the formalism adopted in Section~\ref{sec:CorrelatedNoise}. We suggest the interested reader refers to the references given in the text for a detailed discussion. We model the observed data as follows: \begin{equation} \mathbf{d} = \mathbf{A} \mathbf{m} + \mathbf{n}, \end{equation} where the timelines of the $k$ detectors are combined: \begin{equation} \mathbf{d} \equiv \left( \begin{array}{c} \mathbf{d}^{(1)} \\ \vdots \\ \mathbf{d}^{(k)} \end{array} \right), \end{equation} and the generalized $k N_d \times 3 N_p$ pointing matrix becomes: \begin{equation} \mathbf{A} \equiv \left( \begin{array}{ccccc} A_{tp}^{(1)} &&A_{tp}^{(1)} \cos 2 \psi_t^{(1)} && A_{tp}^{(1)} \sin 2 \psi_t^{(1)} \\ \vdots && \vdots && \vdots \\ A_{tp}^{(k)} && A_{tp}^{(k)} \cos 2 \psi_t^{(k)}&& A_{tp}^{(k)} \sin 2 \psi_t^{(k)} \\ \end{array} \right). \end{equation} Here the $N_d\times N_p$ matrix $A^{(j)}_{tp}$ is the pointing matrix of the $j$-th detector, with elements equal to unity if the pixel $p$ is observed at time $t$ and zero otherwise. Each row of the pointing matrix is multiplied either by the cosine or the sine of $2\psi_t$, where $\psi_t$ is the angle defining the polarimeter orientation at time $t$ with respect to the chosen reference frame. Similarly, the sky signal can be expressed as a $3 N_p$ vector: \begin{equation} \mathbf{m} \equiv \left( \begin{array}{c} \mathbf{I} \\ \mathbf{Q} \\ \mathbf{U} \end{array} \right), \end{equation} where $\mathbf{I}$, $ \mathbf{Q}$ and $ \mathbf{U}$ are $N_p$ Stokes parameter vectors of the pixelized CMB sky. The noise timeline is: \begin{equation} \mathbf{n} \equiv \left( \begin{array}{c} \mathbf{n}^{(1)} \\ \vdots \\ \mathbf{n}^{(k)} \end{array} \right). \end{equation} where $\mathbf{n}^{(j)}$ is the $N_{d}$ element noise vector of the $j$-th detector, accounting for instrumental noise, atmospheric and temperature fluctuations, cosmic-ray hits and any other random systematic effect. In the case of white noise, the generalized least squared (GLS) approach yields the following optimal estimator $\widetilde{\mathbf{m}}$ of ${\mathbf{m}}$: \begin{equation} \mathbf{\widetilde m} = \left( \mathbf{A}^T \mathbf{A}\right)^{-1} \mathbf{A}^T \mathbf{d}. \end{equation} This simply means to bin the samples in the map pixels. In the presence of correlated $1/f$ noise, this approach, usually known as `naive' map-making, leaves stripy structures in the map. Thus, the above formula is extended like follows: \begin{equation} \mathbf{\widetilde m} = \left( \mathbf{A}^T \mathbf{N}^{-1} \mathbf{A}\right)^{-1} \mathbf{A}^T \mathbf{N}^{-1} \mathbf{d}, \end{equation} where $\mathbf{N}$ is the noise covariance matrix $\left\langle\mathbf{n}\mathbf{n}^T\right\rangle$. The matrix $\mathbf{N}$ is block-diagonal with respect to the detector index and each block can be inverted independently. Including also the cross-correlated noise among different detectors (i.e. the off-diagonal terms), the most general matrix $\mathbf{N}$ is given by: \begin{equation} \mathbf{N} \equiv \left\langle \mathbf{n}_t \mathbf{n}_{t^\prime}\right\rangle= \left( \begin{array}{ccc} \left\langle n_t^{(1)} n_{t^\prime}^{(1)} \right\rangle & \cdots & \left\langle n_t^{(1)} n_{t^\prime}^{(k)} \right\rangle \\ \vdots & \ddots & \vdots \\ \left\langle n_t^{(k)} n_{t^\prime}^{(1)} \right\rangle & \cdots & \left\langle n_t^{(k)} n_{t^\prime}^{(k)} \right\rangle \end{array} \right), \end{equation} where $\left\langle \cdot \right\rangle$ denotes the expectation value. Some assumptions are made on the noise, in particular we assume that its statistical properties do not change over the mission life time (stationarity). The stationarity property implies that $\mathbf{N}$ is a block-circulant matrix\footnote{Strictly speaking, stationarity implies that this matrix is block-Toeplitz, not block-circulant. Assuming it is circulant produces undesirable correlations between the end and the beginning of each block. This effect can be avoided by carefully zero padding the blocks before they are Fourier transformed.} In this way, the inversion of $\mathbf{N}$ is much easier, since the Fourier counterpart of a block-circulant matrix is block-diagonal. Let us define the multichannel Fourier operator $\bar{F}$ such that: \begin{equation} \bar{\mathbf{n}}=\bar{F}{\mathbf{n}}, \end{equation} where: \begin{equation} \bar{\mathbf{n}} \equiv \left( \begin{array}{c} F{\mathbf{n}}^{(1)} \\ \vdots \\ F{\mathbf{n}}^{(k)} \end{array} \right), \end{equation} contains end to end the Fourier transforms, $F{\mathbf{n}}^{(j)}$, of each segment of ${\mathbf{n}}$. Thus, in the case of a number of cross-correlated detectors, the inverse of $\mathbf{N}$ is given by: \begin{equation} {\mathbf{N}}^{-1}=\bar{F}^{T}{\mathbf{R}}^{-1}\bar{F}, \end{equation} where, under the assumption that the $N_d\times N_d$ matrix $ \left\langle n_t^{(i)} n_{t^\prime}^{(j)} \right\rangle $ is circulant, $R^{(ij)}$ is a diagonal matrix with elements given by the noise cross-power spectrum between detectors $i$ and $j$ at frequency $f$: \begin{equation} {R^{(ij)}}_{ff^\prime}=P^{(ij)}(f) \delta^{f^\prime}_f, \end{equation} To find $ \mathbf{\widetilde m}$, the optimal GLS formula can be solved iteratively by the use of a Fourier-based, preconditioned conjugate gradient method. To achieve a good convergence speed it is of paramount importance to provide a good preconditioner for the matrix $\left( \mathbf{A}^T\mathbf{N}^{-1} \mathbf{A}\right)$. Our choice is to approximate the matrix $\mathbf{N}^{-1}$ with its diagonal part and our preconditioner, $\mathbf{H}$, will be: \begin{equation} \mathbf{H} = \left[\mathbf{A}^T diag \left(\mathbf{N}^{-1}\right) \mathbf{A}\right]^{-1}. \end{equation} It can be shown that the preconditioning operator $\mathbf{H}$ is a $3\times 3$ block diagonal matrix, where each block is the linear operator that solves for the three Stokes parameters of the given pixel (assuming white noise). We define the inverse pixel condition number $\mathrm{R_{cond}}$ as the ratio of the absolute values of the smallest and largest eigenvalue of each block of $\mathbf{H}$. The condition number is a useful tool to trace the errors in the Stokes parameter estimation due to an inadequate polarization angle coverage on the given pixel. In particular $0 \leq \mathrm{R_{cond}} \leq 0.5$, assuming its lower value in the worst case and $\mathrm{R_{cond}} = 0.5$ in the limit of uniform angle coverage. \section{Asymmetric beam} \label{sec:AsymmetricBeam} \begin{figure} \includegraphics[width=\textwidth]{Figures/core_dragone_beams_all} \caption{Simulated 145\,GHz beams for the cross-Dragonian design of the \textit{CORE}\ telecope. The three rows show the beams for the high, boresight, and low detectors (see text for details). The first 4 columns show the $I$, $Q$, $U$, and $V$ Stokes parameters of the beams on a linear scale. The last column shows a wider view of the $I$ Stokes parameter on a logarithmic scale. The Stokes parameters have been normalized to unity at the peak in intensity.} \label{fig:beam_maps} \end{figure} The convolution of the CMB signal with an asymmetric beam will cause leakage between intensity and and $E$- and $B$-mode polarization when $I$, $Q$ and $U$ maps are reconstructed using the generalized least squares solution of equation \ref{eq:gls_mm} without proper measures to take into account this beam asymmetry. Given that the primordial intensity signal is much larger than the polarization signal, the most important effect is the temperature-to-polarization leakage. In this section, we both investigate the amplitude of this effect for representative \textit{CORE}\ beams, and propose methods to correct this effect by data processing. To this effect, we first generate simulations of the \textit{CORE}\ beams at 145\,GHz for the cross-Dragonian design of the telescope. Beam maps are computed using GRASP for three locations in the focal plane, the boresight, a `high' detector 4 degrees from the boresight towards the spin axis, and a `low' detector 4 degrees from the boresight in the opposite direction (note the locations of the high and low detectors considered here differ from those assumed in Sect.~\ref{Analysis_maps}). In each location all components of the beams (Stokes parameters $I$, $Q$, $U$ and $V$) are simulated for two orthogonal polarizations, $x$ and $y$, where $x$ is aligned with the scan direction. This arrangement of detectors does not reflect the layout of a real focal plane, which would naturally have detectors of the same frequency grouped together. Instead it is designed to explore the variation of the beam shapes with position in the focal plane using a representative CMB-dominated frequency channel as a test case. Figure~\ref{fig:beam_maps} shows the Stokes parameters of the $x$-polarized beams for the three locations. The corresponding $y$-polarized beams are almost identical in shape, and only differ in the sign of the $Q$ and $U$ Stokes parameters. These beams are then used to simulate the CMB signal observed by the \textit{CORE}\ instrument. Two complementary paths have been followed in this investigation. The first starts with simulated \textit{CORE}\ timelines using a high-resolution implementation of direct-space convolution. Maps of $I$, $Q$, and $U$ are reconstructed using equation \ref{eq:gls_mm}, and beam asymmetry effects are corrected using a re-observation of the reconstructed map of $I$. In the second, we directly use a power-spectrum approach, the QuickPol formalism \citep{Hivon:2016}, to estimate and correct for biases in the power spectra. We now describe simulations and results for these two approaches. \subsection{Real space convolution and first-order de-projection} The beams of the proposed \textit{CORE}\ mission are relatively small. The impact of beam asymmetry must be calculated with sufficient numerical precision. To this effect, we implement a real-space convolution of the CMB sky by a pixelized beam map, which allows us to simulate a realistic timeline signal for any beam shape. Deviations of the beam from a symmetric Gaussian shape project onto the time ordered signal in a manner that reflects the orientation of the beam along the scan. The real space beam convolution technique uses a method specifically designed for a spinning experiment, which breaks up a $N \times N$ pixelized beam map into $N$ rows that are aligned with the scanning direction. In each row, every beam pixel observes the same signal, up to a time shift and a global scaling term, that is, the contribution of the row to the total signal is obtained by one-dimensional convolution of a signal timeline by the corresponding beam cut (a row of beam pixels). The data timeline is cut in smaller periods with some overlap to perform the convolution in practice. After each timeline is convolved in Fourier space by the corresponding beam row, the sum of all the individual rows gives us the full convolved timeline. This method scales as $N \times log(N)$ instead of $N^{2}$ as would be the case if the contribution of all $N^{2}$ pixels was computed independently for each data point. The real space convolution has the added advantage of reducing sub-pixel effects, for a more accurate timeline signal that avoids part of the sky pixelization effects. This is illustrated in Fig.~\ref{fig:real_space_convolution}, which compares the timeline obtained by real-space convolution with an $8^\prime$ Gaussian symmetric beam, with that obtained by scanning with a pencil beam the map after convolution with the same beam in harmonic space. The real-space convolution, which uses beam pixels of size $\simeq 1^\prime$, produces a smoother signal, without the numerical artifacts due to the discontinuities between the pixels of the HEALPix map. All simulations performed here use high resolution maps at $N_{\mathrm{side}} = 4096$ for adequate sampling of the underlying CMB signal, and hence good numerical precision. \begin{figure}[h] \centering \includegraphics[width=0.7\linewidth]{Figures/real_space_conv.png} \caption{Comparison of signals obtained from various beam convolution methods. The signal obtained using a pencil beam to scan a map pre-smoothed in harmonic space with an $8^\prime$ beam (green) is compared to the signal obtained using the real-space convolution technique to scan an un-smoothed map with the same pixel size (red). All calculations are performed using HEALPix maps at $N_{\mathrm{side}}=4096$, corresponding to a pixel size of about 52$^{\prime\prime}$. The green and the red signals signals follow each other closely, although we distinguish small discontinuities in the former due to pixelization, which are absent in the latter.} \label{fig:real_space_convolution} \end{figure} Simulations for \textit{CORE}\ are performed by scanning an unsmoothed CMB map using the pixelized beam maps of Fig.~\ref{fig:beam_maps} with the real space convolution described above. Maps made from the resulting timelines suffer from the temperature-to-polarization leakage due to the asymmetric beams and from sub-dominant cross-polarization terms, projected onto the reconstructed `observed' map as a function of the scanning strategy. Reconstructed maps of $Q$ and $U$ (and hence $E$ and $B$), are thus contaminated with leakage from temperature to polarization. These effects can be quite large, as illustrated in Fig.~\ref{beam_asymmetry_leakage_spectra}, in particular for detectors near the edge of the focal plane, which have more asymmetric beams than those of detector located at the boresight, for which even the $E$ modes would be significantly contaminated. We note however that the temperature-to-polarization leakage is reduced for maps obtained with two detectors instead of one, when these two detectors are in the same location, but are sensitive to orthogonal polarizations. This happens because the $I$ beams of two such detectors are very similar, which leads to much of the leakage being cancelled in the map-making stage. To correct for the temperature-to-polarization leakage in the map due to the beams, we consider an intensity map that has been observed by our given set of detectors as a template. This template, however, is not perfect because it contains noise and errors due to the beam asymmetry itself. Still, we can use this template to estimate the intensity-to-polarization leakage to first order. To do this, the template is deconvolved in harmonic space using an effective average symmetric beam that best fits the angular resolution of the channel. In practice, this deconvolution is performed only up to a certain limit of $\ell$ (see \cite{Banerji-beams} for details). This deconvolved map is then re-scanned using the same scanning strategy and the intensity beam of the detector of interest. The resulting timeline will therefore contain the intensity signal, along with higher order leakage terms due to the asymmetric beams, and noise, as well as the initial leakage terms being observed again. When projected onto $(Q, U)$ maps, this timeline propagates an estimate of the intensity leakage terms to the polarization map for that particular detector (or detector set when several timelines are combined). Thus to first-order, we can use it to estimate the temperature-to-polarization leakage due to asymmetric beams. The leakage in the observed polarization maps is then cleaned by subtracting the estimated leakage maps. At first order, this method does not correct for cross-polar leakage that mixes $E$ and $B$ modes, which would require additional modelling terms (see discussion about systematics in \cite{2017arXiv170604516D} for a general introduction). After such first-order correction, as seen in Fig.~\ref{beam_asymmetry_correction_spectra}, the leakage for a single \textcolor{red}{high/low} detector is significantly reduced, below the $BB$ lensing signal for $l \leq 300$. For one boresight detector the residual leakage is at the level of the primordial BB spectra for $r=0.001$ for the first few $10$'s of multipoles. For the pair of boresight detectors, the residual leakage is dominated by cross-polar leakage (which is not corrected for in this analysis) and is well below the primordial $BB$ spectrum f for all $l \leq 200$, even for $r=0.001$. \begin{figure}[h] \centering \includegraphics[width=0.9\linewidth]{Figures/leakage_spectra_comparison.png} \caption{$EE$ and $BB$ spectra of leakage due to beam asymmetry and cross-polarization. The spectra are computed from the difference of the output CMB map with the input map. The effect of the additional asymmetry of the edge detectors is reflected in the increase in the leakage spectra as compared to the boresight detector. The leakage is decreased when using a pair of orthogonally polarized detectors due to better modulation of angles.} \label{beam_asymmetry_leakage_spectra} \end{figure} \begin{figure}[h] \centering \includegraphics[width=0.9\linewidth]{Figures/beam_residual_leakage_spectra.png} \caption{$EE$ and $BB$ spectra of the residual beam leakage after correction by the real-space method. The residual spectra are dominated by cross-polar leakage and by pixelization noise due to the process of deconvolution and re-observation of the template map.} \label{beam_asymmetry_correction_spectra} \end{figure} \subsection{Harmonic space} \begin{figure} \centering{ \includegraphics[width=0.8\textwidth]{Figures/W_QP_Core2_sim_sp_y00axy00a.png} \includegraphics[width=0.8\textwidth]{Figures/W_QP_Core2_sim_sp_y00xy00.png} } \caption[Beam leakage]{Discrepancy between the measured $\ell(\ell+1)C_\ell$ and the input, smoothed with $\Delta \ell=31$, for a single \textit{CORE}\ detector (6 upper panels) and for a pair of orthogonally polarized detectors in the same location (6 lower panels) at the boresight. Results obtained in noiseless simulations of \textit{CORE}\ observations (red lines) are to be compared with those of the QuickPol formalism (blue lines). In panels where it does not vanish, a fraction of the input power spectrum is also shown in black dots for comparison.} \label{fig:beam_leakage} \end{figure} An alternative way to account and correct for the effect of the beam leakage is to work at the angular power spectrum level. The QuickPol formalism \citep{Hivon:2016}, allows such a description, as illustrated in Fig.~\ref{fig:beam_leakage} where its predictions are compared to simulations of observations of either a single detector or the pair of detectors at the boresight. The agreement with the simulations is very good, including at very large multipoles, where the sub-pixel effects, discussed in Sec.~\ref{sec:pointing_accuracy}, dominate. The formalism only needs a description of the detector scanning strategy, in the form of the statistics of the orientation of the detectors on the sky in a subset of sky pixels, the spherical harmonic representation of the beams, and some extra description of the detectors: orientation in the focal plane, gain calibration, polarization efficiency. It returns a beam matrix describing how, at each multipole $\ell$, the input $TT$, $TE$, $EE$, and $BB$ $C_{\ell}$ power spectra are related to the measured $\widetilde{C}_{\ell}$ spectra, that is \begin{equation} \widetilde{C}^{XY}_{\ell} = \sum_{X'Y'} W^{XY,\; X'Y'}_\ell C^{X'Y'}_{\ell}, \label{eq:beam_matrix} \end{equation} with $X,Y,X',Y' \in \{T,E,B\}$. Such a $W^{XY,\; X'Y'}_\ell$ beam matrix can be used in the cosmological analysis of the measured power spectra, in order to determine the model that best fits the data. Since the algorithm is very fast, it can be used for a Monte-Carlo determination of the systematics-related error bars on the final $C_\ell$. It simply has to be run multiple times while varying the values of the instrumental parameters known with limited accuracy, such as the polarization efficiency or even the beam shape. \subsection{Beam asymmetry conclusions} In the absence of fast modulation of polarization such as with a rotating half-wave plate, the non-idealities of the beams could hinder the precise measurements of primordial $BB$ spectrum by \textit{CORE}. However, as we have shown, we have at our disposal two different and complementary approaches to deal with such systematics, one map based, and the other one power spectrum based. They both allow us to simulate rapidly and precisely the impact of \textit{CORE}\ beam non-idealities on the maps or the power spectra, and can therefore be used to respectively clean the maps of most of these systematic effects, and account precisely for these systematics in the cosmological analysis of the measured power spectra, even with an imperfect knowledge of the instrument features. While these investigations must be pursued in more detail, no technical limitation has been identified from beam asymmetry effects for the \textit{CORE}\ space mission. Further investigations must also address the simultaneous deprojection of all potential systematics, and are postponed to further study. \section{Bandpass mismatch} \label{sec:BandpassMismatch} Difference in detector bandpasses induces leakage from intensity to polarization for any astrophysical component with a non-CMB spectrum after calibrating the data on the CMB. This arises after differencing measurement from detectors, with slightly different sensitivity to component signals, to estimate the polarization signal. This effect is studied in~\cite{BPMMpaper1}, and it has been shown that the amplitude of the leakage is strongly coupled to the single detector cross-linking parameters measuring the uniformity of angle coverage in each pixel. This systematic effect was observed in \textit{Planck}\ data~\citep{2016A&A...596A.107P} at the percent level and required correction to avoid biasing the estimation of CMB polarization~\citep{planck.2015.08.HFI.data.processing.calibration.and.maps}. Given the sensitivity of the \textit{CORE}\ mission, this effect has to be studied carefully and correction methods must be designed. In this section, we study this effect in the specific case of \textit{CORE}\ baseline scanning strategy. We first describe our model of the effect and the simulations performed. We then introduce a correction approach and show to which accuracy the effect could be reduced. \subsection{Model of the bandpass mismatch effect} As discussed in Sect.~\ref{sec:map-making} (see in particular Eq.~\ref{eq:signal_model_mm}), a detector observing the sky at the frequency $\nu_0$ with a polarizer oriented at an angle $\psi_t$ at time $t$ measures the quantity: \begin{equation} d_t(\nu_0) = I_{p(t)}(\nu_0) + Q_{p(t)}(\nu_0) \cos\left(2\psi_t\right) + U_{p(t)}(\nu_0) \sin\left(2\psi_t\right) + n_t, \label{pol_obv_model} \end{equation} where $I_{p(t)}(\nu_0)$, $Q_{p(t)}(\nu_0)$ and $U_{p(t)}(\nu_0)$ are the Stokes parameters at the position $p(t)$ on the sky measured in the local reference frame and $n_t$ is the random instrumental and photon noise. For a given sky pointing, each of the Stokes parameters $(I, Q, U)$ receives contributions due to the emission of different components $c$. For simplicity, let us model the intensity in terms of these components. After integrating over the detector bandpass, the total flux par unit steradian received by a detector from the sky can be written as (see~\cite{BPMMpaper1} for details on this model): \begin{equation} {dF\over d\Omega} = \int \sum_{c} g(\nu) f_c(\nu,p) d\nu, \end{equation} where $g(\nu)$ is the detector bandpass, $f_c(\nu,p)$ the emission spectrum of the $c$ component, which can depend on the pixel. After calibrating on the CMB, the intensity reads: \begin{equation} I(\nu_0) = I_{\rm CMB}(\nu_0) + \sum_{c \, \neq \, {\rm CMB}} \gamma_c(p) I_c(\nu_0), \end{equation} where $I_c(\nu_0)$ is the mean intensity of component $c$ at a reference frequency $\nu_0$ and $\gamma_c(p)$ the relative amplitude of component $c$ in CMB temperature units, which is slightly pixel dependent if the component spectra depend on the sky region considered. Since the signal has been calibrated on the CMB, the factor $\gamma_{\rm CMB}$ is normalized to unity. The component amplitude coefficient, defined for the reference frequency $\nu_0$, can be related to the transmission of the band and the spectrum of the component by: \begin{equation} \gamma_c = {\int g(\nu) f_c(\nu) f_c(\nu_0)^{-1} d\nu \over \int g(\nu)\left.{dB(\nu,T_0)\over d\nu}\right |_{\nu_0} d\nu}\left.{dB(\nu,T_0)\over d\nu}\right|_{\nu_0}, \label{IntgT} \end{equation} where $T_0$ is the mean temperature of the CMB and $B(\nu,T_0)$ is the blackbody spectrum of the CMB. The quantity $\gamma_c$ is close to 1 for a chosen $\nu_0$ near the center of the band. A similar relationship applies for the $Q$ and $U$ Stokes parameters. The expression above describes an ideal situation and does not include real-world complications such as beam asymmetries and miscalibration. We follow this approach in order to isolate the bandpass mismatch effect. Potential couplings with other systematic effects are ignored at this stage, in the spirit of the discussion in Sect.~\ref{sec:intro}. The problem of bandpass mismatch can be understood by calculating the data model for the sky signal for a set of detectors $\lbrace(i)\rbrace$. Each detector $(i)$ in the set will have its own $\gamma_c^{(i)}$ which can be written as \begin{equation} \gamma_c^{(i)} = \overline{\gamma}_c + \delta\gamma_c^{(i)} \end{equation} where $\overline{\gamma}_c$ is the mean of scaling parameter $\gamma$ for the set $\lbrace(i)\rbrace$ and the component $c$ and $\delta\gamma_c^{(i)}$ is its deviation from this mean. The data model for the sky signal can now be written, using a vector notation in boldface, as \begin{equation} \label{eq:bandpass-leakage-model} \vt{d}^{(i)} \, = \, \sum_c \overline{\gamma}_c \left [ \vt{I}_c + \vt{Q}_c \cos\left(2\psi\right) + \vt{U}_c \sin\left(2\psi\right) \right ] + \sum_{c \, \neq \, {\rm CMB}} \delta\gamma^{(i)}_c \left [ \vt{I}_c + \vt{Q}_c \cos\left(2\psi\right) + \vt{U}_c \sin\left(2\psi\right) \right ] + \vt{n}. \end{equation} The first term on the right hand side is the `ideal' sky signal with all components including CMB, while the second term is the leakage term of non-CMB components due to their different bandpasses. Since the signal for each detector has been calibrated on the CMB, we expect $\delta \gamma_{CMB}$ to be zero, so it is absent from the second term. \subsection{Simulations of the bandpass mismatch effect} We evaluate the impact of the mismatch on a set of simulations of the data using a simplified version of the \textit{Planck}\ sky model (PSM, see \citet{2013A&A...553A..96D}), which comprises only two foreground components (thermal dust and synchrotron) and CMB at $145$\,GHz, at HEALPix resolution $N_{\mathrm{side}}=1024$, and symmetric Gaussian beams of FWHM $7.6^\prime$. We use four detectors, with polarization angles evenly spaced at intervals of $45^\circ$, at the boresight, and with varying square bandpasses with a 1\% random error on the edge of the bands. This gives similar variations of the $\gamma$ parameters than for the most pessimistic cases of \textit{Planck}\ filters. Nevertheless, we expect less variations between future mission detector filters. The sky component is integrated over the corresponding spectrum following Eq.~\ref{IntgT}, using a top hat instrumental bandpass. In simulations, we have included the complexity of component spectra as modelled in the PSM, and consequently the resulting $\gamma$ parameters are pixel dependent. We have run simulations of pure signal and of signal plus white noise separately, using the nominal noise level expected for \textit{CORE}, observing for one year using the baseline \textit{CORE}\ scanning strategy as discussed in Sect.~\ref{Analysis_maps} above. As described in Sect.~\ref{sec:map-making}, we produce intensity and polarization maps using the maximum likelihood estimator for the Stokes parameters, Eq.~\eqref{eq:gls_mm}. In the first step we ignore the correction for bandpass leakage and use the same pixelization as the input maps to avoid introducing additional pixelization effects. Maps of the timeline noise are made separately and subtracted from total maps. This is justified since the map-making method which has been used is linear, and so instrumental noise will be purely additive. In the absence of bandpass leakage, that is, if all $\gamma_c^{(i)}$, for each detector $(i)$ are identical, and there is sufficient modulation of the polarization angle $\psi$, we expect $\widehat{Q_p} = \overline{Q}_p$ and $\widehat{U_p} = \overline{U}_p$, the actual signal on the sky with no additional bias, for all pixels given our noiseless simulations. By comparing the resulting polarization maps with the input, we estimate the impact of bandpass leakage on the polarization measurement for the chosen detector set. We compute the $\widehat{Q}$ and $\widehat{U}$ maps and compute the $EE$ and $BB$ power spectra of the difference with the input CMB $Q$ and $U$ maps after masking 25\% of the sky where the Galactic dust emission is the brightest. The resulting power spectrum of the residual signal (see Fig.~\ref{bandpass_leakage_correction}) is above the primordial $B$-mode signal even for $r=0.1$, and is thus completely unacceptable for measuring $r=0.001$. It is also above the lensing signal for $\ell < 100$ (see, again, Fig~\ref{bandpass_leakage_correction}). The prediction for any number of detectors $N_{\rm det}$ can be obtained by rescaling the power spectrum of a factor $4 / N_{\rm det}$ (since the result described here is for four detectors), assuming independent filter variations between detectors. The scaling of the spectrum with the inverse of the number of detectors is demonstrated in~\cite{BPMMpaper1}. \subsection{Correction algorithm} We now describe an approach to correct the data for bandpass mismatch that consists in estimating jointly the map $Q$ and $U$ Stokes parameters as well as the leakage component using as input data timelines built from the individual detectors at $145$\,GHz bands and the templates built from $350$\,GHz and $90$\,GHz recovered intensity maps for thermal dust and synchrotron respectively. Correction methods specific to the \textit{Planck}\ mission were implemented at the map as well as timeline level and are detailed in~\cite{planck.2015.08.HFI.data.processing.calibration.and.maps} and~\cite{2016A&A...596A.107P}. We now develop a more generalized correction algorithm based on the model of the data introduced in the last section and describe the simulation employed to validate it. The baseline focal plane design for the \textit{CORE}\ mission uses detectors with dual polarization sensitivity in one single focal plane pixel, as well as pairs of single polarization detectors with orthogonal polarization sensitivity scanning the sky along the same trajectory. The former can directly be differenced to cancel intensity and get a polarization signal, while the latter can also be differenced but after correcting for the appropriate time-shift. Differencing in this way the timelines of two orthogonal detectors, we obtain \begin{align} \vt{d} = & \, \frac{1}{2} \left( \vt{d}^{(a)} - \vt{d}^{(b)} \right) \nonumber \\ = &\, \sum_c \overline{\gamma}_c \left [ \vt{Q}_c \cos\left(2\psi\right) + \vt{U}_c \sin\left(2\psi\right) \right ] + \frac{1}{2} \left[ \sum_{c \, \neq \, {\rm CMB}} \left( \delta\gamma^{(a)}_c - \delta\gamma^{(b)}_c \right) \vt{I}_c \right] + \left( \vt{n}^{(a)} - \vt{n}^{(b)} \right) \nonumber \\ = & \, \vt{Q} \cos\left(2\psi\right) + \vt{U} \sin\left(2\psi\right) + \sum_{c \, \neq \, {\rm CMB}} y_c \, \vt{I}_c + \vt{n}, \label{eq:leakage-pair-model} \end{align} and we are left with a reduced set of Stokes parameters $[\vt{Q}, \vt{U}]$ from the CMB and Galactic sources, $\vt{I}_c$ are the timelines from reference foreground intensity maps with $y_c$ their corresponding amplitude, each of them given by $\frac{1}{2} \left( \delta\gamma^{(a)}_c - \delta\gamma^{(b)}_c \right)$, and $\vt{n}$ is the noise term. In equation \ref{eq:leakage-pair-model}, the first term on the right hand side is the term of interest (a linear combination of the polarization Stokes parameters), while the other two are nuisance terms, a bandpass leakage term proportional to a sum of foreground components, and a noise term $\vt{n}$. By recasting our data set in the form of equation \ref{eq:leakage-pair-model}, we have isolated a leakage term which is a sum of bandpass mismatch coefficients times foreground intensity templates. If the bandpass mismatch coefficients $y_c$ are perfectly known by calibration, our measurements can be considered as linear combinations of $\sum \vt{Q}_c$ (sky Stokes $Q$ in channel $c$), $\sum \vt{U}_c$ (sky Stokes $U$ in channel $c$), and additional foreground intensity maps $\vt{I}_c$. The system can be inverted in the usual way. If however the calibration of the bandpasses is not perfect, we want to solve also for $y_c$. We propose to correct for bandpass mismatch terms with the following approximation. Assume that we have at hand measured templates for the foregrounds. Such measurements can be obtained directly for \textit{CORE}\ intensity data, either at other frequency (i.e. higher frequency for a dust template, or lower for a synchrotron template), or at the reference frequency of the channel of interest after component separation in intensity. Such templates are not perfect, i.e. \begin{equation} \vt{I}_c = k \, \widetilde {\vt{I}}_c + \delta \vt {I}_c, \end{equation} where $k$ is a global scaling factor, and $\delta \vt{I}_c$ the difference between the scaled template and the real foreground map. By replacing the (unknown) $\vt{I}_c$ by its expression in terms of the (known) template $\widehat {\vt{I}}_c$ in Eq.~\ref{eq:leakage-pair-model}, neglecting the second-order term proportional to $y_c \delta \vt{I}_c$, and absorbing the global scaling factor $k$ in $y_c$, we get, in matrix-vector notation \begin{equation} \vt{d} = \vt{A} \vt{m} + \vt{T} \vt{y} + \vt{n}, \label{eq:model-leakage-vecmat} \end{equation} where $\tn{A}$ is a reduced pointing matrix with has two non-zero elements in each row \begin{equation} \vt{A}_{tp(t)} = \begin{bmatrix} \cos\left(2\psi_t\right) & \sin\left(2\psi_t\right) \\ \end{bmatrix}, \end{equation} $\vt{m}$ is the reduced set of Stokes parameters, containing only $[\vt{Q}, \vt{U}]$ from both the CMB and the Galactic sources, $\vt{T}$ is built from the \emph{known} foreground template maps $\widetilde{\vt{I}}_c$, $\vt{y}$ is the set of amplitudes of the leakage of the corresponding templates in that difference timeline, and $\vt{n}$ is the noise term. We find an unbiased estimator $\widetilde{\vt{m}}$ free (to first order) from the leakage term with a standard generalized least square estimator of the form \begin{equation} \label{eq:direct_estimator_S} \widetilde{\vt{m}} = \left( \vt{A}^T \vt{N}^{-1} \vt{F}_{\vt{T}} \vt{A} \right)^{-1} \vt{A} \vt{N}^{-1} \vt{F}_{\vt{T}} \vt{d}, \end{equation} \begin{equation} \label{eq:direct_estimator_y} \widetilde{\vt{y}} = \left( \vt{T}^T \vt{N}^{-1} \vt{F}_{\vt{A}} \vt{T} \right)^{-1} \vt{T} \vt{N}^{-1} \vt{F}_{\vt{A}} \vt{d}, \end{equation} and \begin{equation} \label{eq:filter_S} \vt{F}_{\vt{A}} = \left\lbrace \mathbf{1} - \vt{A} \left( \vt{A}^T \vt{N}^{-1} \vt{A} \right)^{-1} \vt{A}^T \vt{N}^{-1} \right\rbrace, \end{equation} \begin{equation} \label{eq:filter_y} \vt{F}_{\vt{T}} = \left\lbrace \mathbf{1} - \vt{T} \left( \vt{T}^T \vt{N}^{-1} \vt{T} \right)^{-1} \vt{T}^T \vt{N}^{-1} \right\rbrace. \end{equation} We identify the terms $\vt{F}_{\vt{A}}$ and $\vt{F}_{\vt{T}}$ as operators that filter out the component of the signal in the respective space of $\vt{A}$ and $\vt{T}$. Also, the noise covariance term $\vt{N}$ for the case of white noise is diagonal given by $\sigma^2 \mathbf{1}$, where $\sigma$ is the standard deviation of the white noise, and it cancels out in the previous equations. We thus freely drop the noise covariance term $\vt{N}$. It is to be noted that this algorithm can be suited for any number of systematic effects whose leakage signal can be modelled as a nuisance term proportional to a temporal template as shown in equation \eqref{eq:leakage-pair-model}. An analogous approach to subtract temporal templates was implemented in~\cite{Poletti_2017} for the Polarbear experiment using the direct estimation of maps as in equation \eqref{eq:direct_estimator_S}. To make matters computationally feasible we perform our correction iteratively by first estimating the amplitudes $\vt{y}$ of the templates using Eq.~\eqref{eq:direct_estimator_y}, then use these to perform a simple GLS map-making by subtracting the leakage term from the timeline by \begin{equation} \widetilde{\vt{m}} = \left( \vt{A}^T \vt{A} \right)^{-1} \vt{A}^T \left( \vt{d} - \vt{T} \, \widetilde{\vt{y}} \, \right) \end{equation} \begin{figure}[h] \centering \includegraphics[width=\hsize]{Figures/bandpass_correction_plot.png} \caption{$EE$ and $BB$ power spectra of bandpass mismatch leakage for a set of 4 detectors at 145\,GHz before and after implementing the correction algorithm described in the text. After subtracting the leakage induced by thermal dust and synchrotron to first order, the power is reduced by more than two orders of magnitude (from blue to red for $EE$ and from green to light blue for $BB$).} \label{bandpass_leakage_correction} \end{figure} We test here this correction algorithm on the simulations described in the previous subsection. For our templates we simulate intensity maps for thermal dust at at 350\,GHz and synchrotron at 90\,GHz using the PSM. The $EE$ and $BB$ power spectra of the leakage maps are shown in Fig.~\ref{bandpass_leakage_correction}. The algorithm reduces the leakage by more than two orders of magnitude in power. The residual after correction for a set of 4 detectors is now comparable to the primordial B-modes for a level of $r$ in the 0.001-0.01 range, and below the lensing signal for $\ell \geq 10$. As already emphasized, the power spectrum of the leakage after averaging $N$ pairs of detectors will be reduced by $N$. The \textit{CORE}\ 145\,GHz channel comprises 144 detectors (72 pairs). Hence we estimate that the residual leakage after correction and averaging all detectors of the channel will be one order of magnitude or more below the target sensitivity at all angular scales. If necessary, this approach can be extended to second order to further reduce the residuals. \section{Calibration} \label{sec:Calibration} In this section we discuss the systematic effects that can potentially affect the quality of the photometric calibration of \textit{CORE}'s detectors. By `photometric calibration', we mean the process of converting the output produced by a detector into the amplitude of the signal entering \textit{CORE}'s optical system. Assuming that the output of the detectors depends linearly on the input signal entering the optical system, the result of a photometric calibration is a timeline of multiplicative calibration factors that convert the output of a detector into thermodynamic temperature. In the case of \textit{Planck}\ HFI, the stability of the detectors was good enough to allow the use of a constant calibration factor over the 2.5 years of the nominal mission \citep{planck.2013.08.HFI.calibration.and.mapmaking,planck.2015.08.HFI.data.processing.calibration.and.maps}. In this work, we aim to determine how well we can detect changes in the calibration factors of \textit{CORE}\ detectors that unfold over timescales of the order of a few hours to a few days. The ability to track changes in the value of the calibration factors is affected by the strength of the signal used for the calibration. As was the case with \textit{WMAP}\ and \textit{Planck}, we plan to use the dipolar signal induced by the motion of the Sun with respect to the CMB rest frame as a calibration signal. We call this signal the `dipole' for brevity. For simplicity, in this analysis we neglect the contribution of the time-varying orbital dipole, caused by the yearly motion of the \textit{CORE}\ spacecraft with respect to the Solar System. This component, called the \emph{orbital dipole}, is usually $\sim10\,\%$ of the \emph{solar dipole}, the component due to the motion of the Sun with respect to the CMB rest frame \citep{planck.2015.05.LFI.calibration}. Including this component would have improved the estimation of the calibration factors at the expense of a more complex analysis pipeline. We have developed an improved version of the calibration code used for \textit{Planck}\ LFI \citep{planck.2015.05.LFI.calibration}, because code has the ability to track changes of the calibration with time\footnote{Unlike HFI, which used stable bolometric detectors based on transition edge sensors (TES), LFI implemented square-law detectors based on high electron mobility transistors (HEMT), which have shown non-negligible changes (of the order of several percent) in the gain constants over the 4 years of the extended mission.}. Using an approach similar to the one described by \citet{Tristram_2011}, the LFI calibration algorithm, named DaCapo, is an hybrid calibration and map-making tool which is able to estimate the calibration factors, the $1/f$ noise timelines, and the sky map simultaneously, by means of a modified destriping algorithm. We have rewritten the code from scratch in Python\ 3 and have incorporated it in TOAST. DaCapo uses a maximum-likelihood approach which is similar to destriping techniques employed to solve map-making problems, and it shares with them a number of concepts (See Sect.~\ref{sec:map-making} above). We have modified the original algorithm in order to allow the timescale on which the calibration is assumed to be constant to vary. In the original version for the \textit{Planck}\ LFI, this timescale was assumed to be one pointing period of 40--60\,min. We present a brief overview of the algorithm here; for additional details, the reader can refer to the source code of the programs we have used in this analysis \citep[]{2016ascl.soft12007T}. The DaCapo algorithm models the output of a detector scanning the sky using the following approximation: \begin{equation} \label{eq:calDaCapoRadiometerModel} s (t_i) = G_k \bigl(T_i + D_i\bigr) + b_n + n_i, \end{equation} where $s (t_i)$ is the signal measured by the detector at time $t_i$, $T_i$ is the temperature of the sky (including Galactic signals, CMB, point sources, etc.)\footnote{We do not attempt to model polarized signals in Eq.~\eqref{eq:calDaCapoRadiometerModel}, as we have found that the systematic effect induced by this approximation is far smaller than other systematics discussed later.}, $D_i$ is the amplitude of the solar and orbital components of the Doppler dipole (due to the motion of the spacecraft on its orbit in the solar system, and of the solar system with respect to the CMB: as previously mentioned, we neglect the orbital contribution in the following analysis), $n_i$ is a white-noise term, $G_k$ is the gain, and $b_n$ is an offset which keeps track of slow fluctuations due to $1/f$ noise. The DaCapo algorithm obtains a maximum-likelihood estimate of $G_k$, $T_i$, and $b_n$ given $s$ and $D$. The last quantity is given by: \begin{equation} D(\mathbf{x}, t) = T_\mathrm{CMB} \left(\frac1{\gamma\, \bigl(1 - \mathbf{\beta}\cdot \mathbf{x}\bigr)} - 1\right), \end{equation} where $T_\mathrm{CMB}$ is the mean temperature of the CMB, $\mathbf{\beta} = \mathbf{v}/c$ is the velocity of the spacecraft with respect to the CMB rest frame, $\gamma = (1 - \beta)^{1/2}$, and $\mathbf{x}$ is the direction of the detector's main beam axis at time $t$. The values for $T_\mathrm{CMB}$ and $\mathbf{v}$ have been taken from \citet{mather1999} and \citet{planck.2015.01.Overview}, respectively. The quantities $G$ and $b$ in Eq.~\eqref{eq:calDaCapoRadiometerModel} are indexed by $k$ and $n$ instead of $i$. This relates to the fact that the sampling rate of these two quantities must be smaller than the sampling rate of $s$: in this way, the number of unknowns of the calibration problem is smaller than the number of variables. We call the inverse of the sampling rate of $G_k$ the `calibration period'; its fluctuations unfold on periods of the order of several hours; the inverse of the sampling rate of $b_n$ is the `offset period', and it must be shorter than the knee frequency of the $1/f$ noise component. Unlike the code used in \citet{planck.2015.05.LFI.calibration}, we allow the calibration period to be different from the offset period; in this way, we have an additional free parameter that can be tuned to optimize the quality of the calibration. Specifically, this change allows us to make the calibration period longer than the offset period, thus potentially improving the detection of the dipole signal thanks to a better S/N without degrading too much the estimation of the $1/f$ component. This change is important in the context of the \textit{CORE}\ proposal, as we expect \textit{CORE}\ detectors to be more stable than those of \textit{Planck}\ LFI. We solve for the unknowns in Eq.~\eqref{eq:calDaCapoRadiometerModel} by minimizing the quantity \begin{equation} \label{eq:calChiSquare} \chi^2 = \sum_i \frac{\bigl(s_i - s(t_i)\bigr)^2}{\sigma_i^2}, \end{equation} where $s_i$ is the sample acquired by the detector, and $s(t_i)$ is the model in Eq.~\eqref{eq:calDaCapoRadiometerModel}. To make the problem well-posed, \citet{planck.2015.05.LFI.calibration} adds the constraint that the map $\mathbf{m}$ of the sky temperature $T$ be orthogonal to the dipole map $D$, and that the monopole of map $T$ be zero. Using Lagrange multipliers, the coupling between the minimization of Eq.~\eqref{eq:calChiSquare} and these additional constraints leads to the following solution\footnote{In the following equations, we adopt the convention of using \textbf{bold} to indicate vectors and matrices, and \textit{italic} to indicate scalar values. The $ij$ coefficient of matrix $\mathbf{m}$ is therefore indicated as $m_{ij}$.}: \begin{equation} \label{eq:calDaCapoSolution} \mathbf{F}^T \mathbf{N}_w^{-1} \mathbf{Z} \mathbf{F} \mathbf{a} = \mathbf{F}^T \mathbf{N}_w^{-1} \mathbf{Z} \mathbf{s}, \end{equation} where $\mathbf{N}_w$ is the covariance matrix of the white noise component $n_i$ in Eq.~\eqref{eq:calDaCapoRadiometerModel}, $\mathbf{a}$ is a vector containing all the values of $b_n$ and $G_k$, $\mathbf{F}$ is defined by the following relation \begin{equation} \sum_j F_{ij} a_j \equiv G_k \left(D_i + \sum_p P_{ip} m_p\right) + b_n \end{equation} and \begin{align} \mathbf{Z} &= \mathbf{I} - \mathbf{\tilde P} \bigl(\mathbf{M} + \mathbf{N}_w^{-1} \bigr)^{-1} \mathbf{\tilde P}^T \mathbf{N}_w^{-1},\\ \mathbf{M} &= \mathbf{\tilde P}^T \mathbf{N}_w^{-1} \mathbf{\tilde P},\\ \bigl(\mathbf{M} + \mathbf{N}_w^{-1}\bigr) &= \mathbf{M}^{-1} - \mathbf{M}^{-1} \mathbf{m}_c \bigl(\mathbf{m}_c^T \mathbf{M}^{-1} \mathbf{m}_c\bigr)^{-1} \mathbf{m}_c^{-1} \mathbf{M}^{-1}, \end{align} where $\mathbf{I}$ is the identity matrix, $\mathbf{m}_c$ is a two-column matrix containing the map of the dipole signal $D$ and a constant map with each pixel set to 1, and $\mathbf{\tilde P}$ is the pointing matrix $\mathbf{P}$ where each non-zero element has been multiplied by the corresponding gain $G_k$. In the next paragraphs, we discuss how this model can be applied to timelines of signals acquired by detectors scanning the sky using \textit{CORE}'s scanning strategy, the kind of statistical and systematics errors we should expect using this approach, and the estimated quality of the results. \subsection{Time dependence of the dipole signal} \label{sec:calDipoleTimeDependence} \begin{figure}[tb] \centering \includegraphics[width=0.4\columnwidth]{Figures/dipole_amplitude.pdf} \includegraphics[width=0.45\columnwidth]{Figures/dipole_histogram.pdf} \caption{\textit{Left:} Peak-to-peak amplitude of the hourly dipole signal as seen by \textit{CORE}\ (thin black line for 6 hour baseline and thin dotted line for 96 hour baseline) and \textit{Planck}\ (thick grey line). \textit{CORE}'s faster variations will allow to pinpoint the calibration constant more accurately than was possible with \textit{Planck}\ data. \textit{Right:} Distribution of the amplitudes shown in the left plot. Although the maximum amplitude of the hourly dipole signal seen by \textit{CORE}\ is smaller than those seen by \textit{Planck}, the tail at low amplitudes is considerably smaller. Thus, the median amplitude seen during each hour of \textit{CORE}'s sky observation is 5.8\,mK, instead of \textit{Planck}'s value of 4.7\,mK ($\sim 20\,\%$ larger).} \label{fig:calDipoleAmplitudeVsPlanck} \end{figure} The quality of the estimates for $G_k$ (Eq.~\ref{eq:calDaCapoRadiometerModel}) depends on the peak-to-peak variation in the amplitude of the dipole $D$ during each calibration period. We have therefore studied the variation in time of the dipole signal $D$ as observed by a typical \textit{CORE}\ detector. Figure~\ref{fig:calDipoleAmplitudeVsPlanck} shows the expected peak-to-peak variation of $D$ within one calibration period, for different values of this period. We have considered periods going from 6\,hours to 4\,days; the latter case is interesting, since this is the precession period used in \textit{CORE}'s baseline scanning strategy. Therefore, using calibration periods of this length produces large coverages within each period. We compare our estimates with the peak-to-peak variation of $D$ as seen by a \textit{Planck}\ detector LFI27M-00), whose calibration periods lasted 1 hour: \textit{CORE}'s scanning strategy will lead to larger peak-to-peak variations in the calibration signal $D$, thus potentially improving the quality of the calibration. In the next sections we show the results of a number of simulations run under different assumptions, and quantify the quality of \textit{CORE}'s calibration more precisely. \subsection{Systematics} \label{sec:calSystematics} \begin{figure} \centering \includegraphics[width=\textwidth]{Figures/foreground_maps.pdf} \caption{Foreground maps used to estimate the quality of the calibration of \textit{CORE}\ detectors. Temperatures are expressed in mK. \textit{Left:} The CMB map produced by \textit{Planck} in the Ecliptic coordinates. \textit{Right:} The \textit{Planck}\ HFI 143\,GHz temperature map in the Ecliptic coordinates.} \label{fig:calForegroundMaps} \end{figure} We run a number of simulations to estimate the impact of different systematics on the calibration of the \textit{CORE}\ detectors. Our simulations are generated using the following approach: \begin{enumerate} \item Created timelines by scanning sky maps under the assumption of \textit{CORE}'s proposed scanning strategy\footnote{The code used to produce the timelines is based on TOAST. It is freely available at \url{https://github.com/ziotom78/create_timelines}.}. The signal in the timelines is \begin{equation} \label{eq:calTodSimulation} s (t_i) = G \times \bigl(I_i + Q_i\cos2\psi + U_i\sin2\psi\bigr) + \tilde n_i, \end{equation} where $G$ is the gain, constant throughout the whole simulation, $I_i$, $Q_i$, and $U_i$ are the Stokes parameters of the pixel being observed at time $t_i$, and $\tilde n_i$ is a $1/f$ plus white noise realization. The knee frequency of the $1/f$ noise has been set to 20\,mHz. We produce two sets of timelines using two sky maps: the first one being the \textit{Planck}\ 2015 CMB map, the second one being \textit{Planck}\ 2015 143\,GHz map. \item We run DaCapo on the simulated timelines using different values of the calibration period, and compare the estimates of the gains $G_k$ with the input gain $G$ used in Eq.~\eqref{eq:calTodSimulation}. \end{enumerate} \begin{figure} \centering \includegraphics[width=\textwidth]{Figures/gain_timelines_cmbonly.pdf} \caption{\textit{Left:} Variation of the gains estimated in the case of a CMB-only sky. The gain $G$ used in Eq.~\protect\eqref{eq:calTodSimulation} to produce the simulated timelines was 35.0\,K/V. \textit{Right:} Violin plots of the gain estimates shown on the left. Increasing the length of a calibration period reduces the dispersion of the gain estimates.} \label{fig:calGainTimelinesCmbOnly} \end{figure} We consider 5 values for the calibration period $\Delta t_G$: 6\,hours, 12\,hours, 1\,day, 2\,days, and 4\,days. The value actually used in the analysis of the data acquired by \textit{CORE}\ will depend on the overall stability of the detectors; the experience acquired with HFI shows that bolometers are extremely stable, and intrinsic variations are usually smaller than gain uncertainties \citep{planck.2015.08.HFI.data.processing.calibration.and.maps}. The results of our simulations are shown in Fig.~\ref{fig:calGainTimelinesCmbOnly}. The amplitude of the fluctuations is reduced for large values of the calibration period, as expected. For the best case ($\Delta t_G = 4\,\text{days}$), the estimated gain is $G = 34.996_{-0.008}^{+0.010}\,\text{K/V}$ (95\,\% C.L.), in agreement with the input value $G = 35\,\text{K/V}$ within $0.01\,\%$. \begin{figure} \centering \includegraphics[width=0.6\textwidth]{Figures/gain_error_timelines.pdf} \caption{The uncorrelated statistical errors for the gains shown in the plot on the left of Fig.~\protect\ref{fig:calGainTimelinesCmbOnly} in the case of a CMB-only sky for different lengths of the calibration period. The errors have been computed assuming diagonality for the gain covariance matrix, and they are therefore a lower bound. Both the short- and long-period fluctuations in the error are anticorrelated with the amplitude of the dipole signal; see the plot on the left of Fig.~\protect\ref{fig:calDipoleAmplitudeVsPlanck}.} \label{fig:calGainErrors} \end{figure} The algorithm is able to estimate the error of each gain estimate, under the following assumptions: \begin{enumerate} \item Only the statistical noise is considered (that is, due to the presence of the $n_i$ term in Eq.~\eqref{eq:calDaCapoRadiometerModel}); \item No correlation is assumed between the gains of the same timeline. \end{enumerate} This estimate is a lower bound on the true statistical error, since the latter will also include the effect of imperfect $1/f$ cleaning and the correlation between pairs of gains. The behaviour of the errors is shown in Fig.~\ref{fig:calGainErrors}: their time dependence is clearly anticorrelated with the amplitude of the dipole variations shown in Fig.~\ref{fig:calDipoleAmplitudeVsPlanck}. \subsection{Systematics due to the Galaxy} \label{sec:calGalacticSystematics} The presence of a Galactic signal in the temperature measured by \textit{CORE}\ detectors is more problematic than the presence of the CMB signal considered in Sect.~\ref{sec:calSystematics}, because the Galaxy shows large scale features that can be easily mistaken for a component of the dipole signal, thus causing leakage from $T$ to $D$ in Eq.~\eqref{eq:calDaCapoRadiometerModel}. There are two effectsthat are caused by this leakage\footnote{Obviously, the sum of two dipolar signal on the sky is still a dipolar signal, as it can be readily proven by adding their harmonic coefficients.}; they depend on the relative orientation of the Galactic dipole axis with respect to the CMB dipole axis: \begin{enumerate} \item The axis of the total dipole is tilted with respect to the CMB dipole axis; this induces a time-dependent bias whose exact shape depends on the scanning strategy, but in any case it is likely to produce large-scale stripes in the sky maps; \item The amplitude of the dipole is either increased or decreased, depending on whether the angular separation between the two axes is smaller or larger than 90$^\circ$, respectively; this effect leads to a constant offset of the gain estimates $G_k$, as it does not depend on the scanning strategy. The effect of this systematic effect is to change the amplitude of the CMB signal. \end{enumerate} Both effects are potentially dangerous and should be properly characterized. One possible approach to reducing the impact of Galactic contamination would be to use foreground map templates of the form $\epsilon_k \textbf{F}_k$ in Eq.~\eqref{eq:calDaCapoRadiometerModel}, where $k$ indexes different foregrounds (synchrotron, CO lines, dust, etc.), and solve for the unknown scalar factors $\epsilon_k$; this is the approach used by \textit{Planck}\ to characterize bandpass mismatches among HFI bolometers \citep{planck.2015.08.HFI.data.processing.calibration.and.maps}. A possibly better approach would be to do the calibration in tandem with a component separation algorithm, using the following iterative procedure: \begin{enumerate} \item \label{enum:calCleaningEstimateG} Estimate the gains $G_k$ ignoring the presence of the Galaxy, and produce maps of the sky signal at different frequencies; \item Run a component-separation algorithm on the maps and estimate the Galactic signal; \item \label{enum:calCleaningDecalibration} Scan the map of the Galactic signal into a timeline, and use the gains estimated in step~\ref{enum:calCleaningEstimateG} to decalibrate this timeline; \item Clean the data timeline using the one estimated in step~\ref{enum:calCleaningDecalibration} and repeat the process from the beginning. \end{enumerate} \begin{figure} \centering \includegraphics[width=\textwidth]{Figures/dust_masks.pdf} \caption{\label{fig:calDipoleAxesSeparation} \textit{Left:} Mollweide projection of the three masks used to remove the contribution of the Galactic dust from the data used in the calibration simulations. The masks have been created using the \textit{Planck}\ 353\,GHz temperature maps. They are shown here in Ecliptic coordinates. \textit{Right:} Angular separation between the axis of the Galactic dipole in the \textit{Planck}\ HFI 143\,GHz temperature map and the axis of the CMB solar dipole, as a function of the Galactic mask. For every mask, the two axes are nearly perpendicular; however, in the case of the 90\,\% mask the separation is slightly less than 90$^\circ$. This has implications for the calibration, as shown in Fig.~\protect\ref{fig:calGainTimelinesGalaxy}.} \end{figure} For the purpose of this work, we adopt the simpler approach of applying a mask which removes the brightest parts of the Galaxy from the computation, as was done in \citet{planck.2015.05.LFI.calibration}. To produce the timelines, we simulate the observation using the 143\,GHz map from the \textit{Planck}\ 2015 data release. The masks have been created using the 353\,GHz map from the same data release to remove those sky regions where the dust signal is strongest. In Fig.~\ref{fig:calDipoleAxesSeparation} we show the three sky masks we use and the angular separation between the Galactic dipole axis and the CMB dipole axis as a function of the sky mask. Since the axis of the Galactic dipole in the \textit{Planck}\ sky maps is nearly perpendicular to the CMB dipole axis\footnote{This is true for the sky maps produced by \textit{WMAP}\ and \textit{Planck}\ LFI and HFI, as the angle between the two dipole axes always differs from $90^\circ$ by only a few arcseconds.}, slightly varying the masked region can make the separation between the two axes smaller or greater than $90^\circ$, thus changing the sign of the overall bias induced by the Galaxy. As the right-hand side of Fig.~\ref{fig:calDipoleAxesSeparation} shows, in the case of the 143\,GHz map, we expect the bias to be positive for the 90\,\% mask, and negative in the other cases. \begin{figure} \centering \includegraphics[width=\textwidth]{Figures/gain_timelines_galaxy.pdf} \caption{Variation of the estimated gains with time in the case of a realistic sky (\textit{Planck}\ HFI 143\,GHz map). As in Fig.~\protect\ref{fig:calGainTimelinesCmbOnly}, $G = 35.0\,\text{K/V}$. The presence of the Galaxy induces a systematic offset, mainly due to the additional dipolar component which biases the calibration. Applying masks helps in reducing this effect, as the cases with a 80\,\% mask show. The sign of the bias is always negative except in the case of the 90\,\% mask: this depends on the relative orientation of the Galactic dipole axis with respect to the CMB solar dipole, as explained in the text. (See also Fig.~\protect\ref{fig:calDipoleAxesSeparation}.)} \label{fig:calGainTimelinesGalaxy} \end{figure} Figure~\ref{fig:calGainTimelinesGalaxy} shows the results of the simulations. Unlike Fig.~\ref{fig:calGainTimelinesCmbOnly}, the two systematic effects we expected are now clearly evident: (1) a systematic bias in the overall level of the gains, which is positive when the 90\,\% mask is used and negative otherwise, and (2) time-dependent fluctuations which are not reduced if longer calibration periods are used. If a calibration period of 4\,days is used, and 80\,\% of the sky is used, then the gain estimate is $G = 34.97_{-0.06}^{+0.04}\,\text{K/V}$, which should again be compared to the reference value $G = 35\,\text{K/V}$ used in Eq.~\eqref{eq:calTodSimulation}. The results are still consistent with the reference value, with a $0.1\,\%$ error. \begin{figure} \centering \includegraphics[width=\textwidth]{Figures/cl_differences.pdf} \caption{\textit{Left:} Comparison of the power spectrum of the CMB map with the spectrum of the difference between the same CMB map and the output map produced by DaCapo. \textit{Right:} The same comparison for the HFI 143\,GHz map.} \label{fig:calAPS} \end{figure} Our results show that residual Galactic emission outside the mask produces a systematic effect in the determination of $G$. We have tested this and found that this effect is larger than the systematic error due to neglecting polarization in the map (see Eq.~\ref{eq:calDaCapoRadiometerModel}), as the latter is at least one order of magnitude smaller. To assess the impact of this kind of systematic error on the scientific outcome of \textit{CORE}, a more detailed set of simulations need to be carried out. However, we expect that the impact of such errors on polarization measurements will be smaller than 0.1\,\%, as the error on $G$ is highly correlated between detectors. Therefore, it should cancel when differencing data from detector pairs like the one used in our simulations (that is, two detectors oriented at $-22.5^\circ$ and $67.5^\circ$ with respect to the scan direction of motion). In fact, for a given detector pair the systematic contamination due to the Galaxy will cancel out to first order when differencing the data. When averaging $N$ such pairs, oriented the same way, residual noise will be dominated by uncorrelated contributions, thus scaling down as $1/\sqrt{N}$. Figure~\ref{fig:calAPS} shows a comparison between the power spectrum of the input map and the that of the residual map between the input and the output map produced by DaCapo. In the case of a CMB sky, the residuals are more than two orders of magnitude smaller than the map itself. In the case of a realistic sky with Galactic dust emission, the residuals become of the same order of magnitude as the signal itself at large angular scales ($\ell < 10$). To address these discrepancies, we expect to use the calibration pipeline in tandem with high quality models of the sky and component-separation methods. As a result, the overall calibration accuracy should fall between the optimistic case presented in Sect.~\ref{sec:calSystematics} (0.01\,\%) and the pessimistic case discussed in Sect.~\ref{sec:calGalacticSystematics} (0.1\,\%). \section{Conclusions} \label{sec:conclusions} In the context of the proposed \textit{CORE}\ satellite mission to map CMB polarization, we have discussed the impact of the main systematic effects we expect to affect the observations, with emphasis on their projected impact on frequency maps. We have chosen to deal with one effect at a time, for the sake of carefully assessing its impact in isolation from the others. In a real world application, however, systematic effects will interact one another, implying that their combined effect cannot always be deduce by linear superposition. Their treatment will thus require a global processing pipeline. An accurate assessment by means of complete end-to-end simulations is needed, but will have to wait until we will possess detailed knowledge of the individual effects. We therefore defer this analysis to future work. We have employed the TOAST simulation pipeline to generate timelines of realistic instrumental noise and beam-convolved sky signals. We have also employed the flexible generalized destriping code MADAM to produce maps with statistically optimal noise properties, having tuned the algorithm to the specific \textit{CORE}\ design and scanning strategy. We have explored in detail the properties of the \textit{CORE}\ noise maps, focusing for the sake of simplicity on a pair of detectors at 145\,GHz, at positions in the centre and at the edges of the focal plane, to produce a triplet of $(I,Q,U)$ maps. We find that for all cases this set-up achieves full sky coverage and is able to cleanly separate the Stokes parameters, in the sense that the map-making equations are well-conditioned as measured by the reciprocal condition number of the covariance matrix of Stokes parameters in each pixel. This is a reassuring test, since an ill-conditioned map-making system is vulnerable to several systematic effects. Its outcome was not obvious beforehand: in the absence of an active hardware modulator such as a half-wave plate, the \textit{CORE}\ instrument only relies on the spacecraft's scanning strategy to modulate the polarization signal. We have also verified that the pixel covariance matrices exhibit low intensity-to-polarization couplings, a desirable property that helps to keep intensity-to-polarization leakage low either by design, or under control with proper analysis tools. At the same time, residual $QU$ couplings are not negligible and need to be accounted for during analysis. We have also attempted to optimize the scanning strategy, in particular the telescope offset and precession angles, finding that any advantage over the baseline configuration is minimal within a range compatible with reasonable assumptions about the spacecraft's design and operational constraints. As a consequence of the very well interconnected scanning strategy, the \textit{CORE}\ map-making achieves excellent levels of suppression of the correlated (`$1/f$' type) noise component. We find that the residual correlation in the noise maps are in fact negligible for a detector knee frequency of the order of 10\,mHz and could easily be handled even for values a few times higher. We hence do not expect $1/f$ noise to be a driver in the design and performance of the mission. Foreground contamination, which may leave hard to minimize residuals, is more of a concern on the largest angular scales, although it appears that the frequency coverage of \textit{CORE}\ is adequate to guarantee a detection of $r \simeq 0.001$ even in the presence of complex foregrounds \citep{ECO.foregrounds.paper}. We have also taken in consideration the case of noise correlations between detectors, such as those generated by a `common mode' of thermal or other origin. Assuming a realistic model for this component (derived from \textit{Planck}\ results), we find that a dedicated map-making scheme that takes such cross-correlations into account within the noise correction model would be beneficial for \textit{CORE}\ (at the cost, however, of significantly increasing the computational burden of the problem, whose cost grows quadratically with the number of correlated detectors). Since the \textit{CORE}\ analysis uses multi-detector map-making (using a minimal set of two or four detectors as explored in this paper), bandpass mismatch leakage is a potential source of concern. Since there is no reason for the bandpass leakage systematic to be correlated between detectors, the effect is predicted to average out when increasing the number of detectors. In addition, we have implemented and demonstrated a correction scheme, which reduces the amount of leakage to a level well below the bounds on primordial $BB$ spectrum allowed by the \textit{CORE}\ error budget. Leakage from intensity to polarization arising due to beam asymmetries is a potential concern for high-precision CMB polarization experiment. The case of \textit{CORE}\ requires even greater attention, due to the lack of active modulation in the optical path to regularize the beam shape independently of the scan. We have demonstrated two complementary approaches, in real space and harmonic space, that both allow to model accurately and quickly the impact of \textit{CORE}\ beam non-idealities on the maps or the power spectra. When these simulations are employed to clean the \textit{CORE}\ data, the uncorrected level of residuals is well within the \textit{CORE}\ science requirements, even when accounting for imperfect knowledge of the instrument. In an effort to move away from ideal simulations at the stage before map-making, we have implemented a prototype calibration pipeline for \textit{CORE}, based on that used for \textit{Planck}\ LFI. We have discussed its robustness to several non-idealities, arising due to the instrument and the sky, concluding that the calibration requirements of \textit{CORE}\ can be already met with existing knowledge and algorithms. Without doubt, an all-sky experiment to map the CMB polarization to cosmic variance level is an ambitious effort. Systematic contributions are expected to dominate the error budget and, if the mission is selected, a considerable effort will be necessary in the years ahead to build an analysis pipeline that accurately deals with them. While such a task will only be completed after critical information about the instrument will become available (that is, during the study phase and later), it would make sense to start building the necessary infrastructure as soon as possible. At the same time, it is reassuring that simple yet realistic assumptions about the main contaminants, implemented within quick and robust simulation and correction algorithms -- all of which owe much to the heritage of \textit{Planck}\ -- demonstrate that our requirement to keep \textit{CORE}\ systematics under control rests on solid grounds. \section{Cross-correlated noise} \label{sec:CorrelatedNoise} Cross-correlated noise contributions between different detectors have been reported by several CMB experiments \citep[see e.g.][]{2006A&A...458..687M, 2008ApJ...681..708P,2016A&A...596A.107P}. They are a source of potential concern for the densely packed focal planes of the current and forthcoming generation of CMB experiments. The presence of these common modes is usually neglected during analysis, though optimal treatment can easily be included in the GLS framework discussed in Sect.~\ref{sec:map-making}, at the cost of increasing the computational burden \citep{2008ApJ...681..708P,2016A&A...593A..15D}, as detailed in Appendix~B. In short, a solution formally identical to Eq.~\ref{eq:gls_mm} can be obtained for the the estimated map $\widetilde{\mathbf{m}}$: \begin{equation} \mathbf{\widetilde m} = \left( \mathbf{A}^T \mathbf{N}^{-1} \mathbf{A}\right)^{-1} \mathbf{A}^T \mathbf{N}^{-1} \mathbf{d}, \end{equation} where $\mathbf{d}$ and $\mathbf{A}$ are respectively a multi-detector timeline and pointing matrix and $\mathbf{N}$ a generalized noise matrix: \begin{equation} \mathbf{N} \equiv \left\langle \mathbf{n}_t \mathbf{n}_{t^\prime}\right\rangle= \left( \begin{array}{ccc} \left\langle n_t^{(1)} n_{t^\prime}^{(1)} \right\rangle & \cdots & \left\langle n_t^{(1)} n_{t^\prime}^{(k)} \right\rangle \\ \vdots & \ddots & \vdots \\ \left\langle n_t^{(k)} n_{t^\prime}^{(1)} \right\rangle & \cdots & \left\langle n_t^{(k)} n_{t^\prime}^{(k)} \right\rangle \end{array} \right), \end{equation} where $\left\langle \cdot \right\rangle$ denotes the expectation value and $( \cdot )$ labels different channels. As is customary, we assume stationary noise, implying that the statistical properties of the noise do not change over the mission lifetime. To be specific, when considering the $j$-th and $\ell$-th detectors and the noise elements $n_t^{(j)}$ and $n_{t^\prime}^{(\ell)}$ at time $t$ and $t^\prime$, respectively, we assume that $\left\langle n_t^{(j)} n_{t^\prime}^{(\ell)}\right\rangle $ only depends on $|t-t^{\prime}|$. Moreover, we consider that the noise statistical properties are known and completely described by the noise covariance matrix. We assume that the noise auto- and cross-spectra can be estimated either by on-ground instrument calibration or directly from observational data by dark-sky measurements or iterative procedures \citep[see e.g.][]{2001misk.conf..421P}. To find $\mathbf{\widetilde m}$, the optimal GLS formula can be solved iteratively using a Fourier based, preconditioned conjugate gradient method as outlined in Sect.~\ref{sec:map-making}. Note however that, given the full noise covariance matrix (whose effective size is proportional to $N+N_c\times(N_c-1)/2$, where $N$ is the total number of detectors and $N_c$ is the number of with cross-correlated noise), a single iteration of the preconditioned conjugate gradient solver scales linearly with the total number of samples, but quadratically with $N_c$. We set up a \textit{CORE}\ test case by generating a noise timeline with the TOAST software assuming the \textit{CORE}\ scanning strategy and detector parameter baseline (see Tab.~\ref{tab:toast_parameters}), considering the cases of 2 and 4 detectors for 1 year of operations. Following the behaviour of \textit{Planck}\ HFI \citep{2016A&A...596A.107P}, we assume that the noise of the $i$-th detector has the following properties: \begin{eqnarray} n_i &=& \tilde{n}_i + n_c\\ P_i(f) \equiv \left<\tilde{n}_i \tilde{n}_i\right> &=& A \left [\left ( \frac{f_k}{f} \right) + 1 \right] \\ P_{ij}(f) \equiv \left<n_i n_j \right> = \left<n_c n_c\right> &=& A \left [\left ( \frac{f_1}{f} \right)^2 + C \right] \mathrm{for\ } i \ne j \end{eqnarray} where $\tilde{n}_i$ and $n_c$ refer to the self- and cross-correlated noise component, with knee frequencies $f_k = f_1 = 20$\,mHz. We assume $C=0$ and use the NET from Table~\ref{tab:toast_parameters} for the amplitude $A$. We then generate noise maps with: \begin{enumerate} \item a GLS map-making algorithm that considers only the diagonal terms of the noise covariance matrix that correspond to the auto-correlated $1/f$ noise (the ROMA MPI-parallel code, see \citealt{2001A&A...372..346N} and \citealt{2005A&A...436.1159D}); \item an optimal GLS map-making algorithm extended to account for all the off-diagonal terms of the noise covariance matrix that correspond to the correlations between detectors (the extended ROMA MPI-parallel code, see \citealt{2016A&A...593A..15D}). \end{enumerate} For each case above, we generate the noise-only maps of the Stokes parameters $Q$ and $U$. In Fig.\ref{fig:diff_map} we show the difference of the noise-only $Q$ and $U$ maps between the cases with and without cross-correlated noise in the map-making code (for the 2 detector case). These difference maps show stripy structures, suggesting that the inclusion of the cross-correlation properties in the noise model mitigates the residual correlation along the scan. We then compute the r.m.s.\ values of the maps, noting very slight differences between cases 1 and 2 above (of few parts out of $10^4$). However, it should be emphasized that the map r.m.s.\ is not the most appropriate figure of merit here, since the effect of accounting for the noise cross-correlation is limited only to the very large angular scales. An APS analysis is better suited inasmuch as it separates the contribution of different angular scales. We therefore produce 20 Monte Carlo noise-only maps and generate the corresponding APS. We then compare the average spectra for cases 1 and 2 above by calculating their ratio (see Fig.\ref{fig:comp_spec}). We notice that neglecting the noise cross-correlation results in a larger noise amplitude at very large angular scales. This excess is suppressed by accounting for the detector cross-correlation in the map-making: in fact, we have a decrease of the noise spectrum amplitude up to 5-10\% at very low multipoles. Finally, we compare the APS standard errors as computed from the the dispersion of the simulated Monte Carlo maps (see Fig.\ref{fig:comp_spec}). We find that the inclusion of the cross-correlated noise provides smaller error-bars at the largest angular scales (again, up to 5-10\%), while, as expected, we do not find any relevant difference at smaller scales. Results shown in Fig.\ref{fig:comp_spec} correspond to the 2 detector case. Tests on the 4 detector case have shown the same qualitative behaviour: we still find a decrease in both noise spectrum amplitude and standard deviations of 5-10\% after including the noise cross-correlation information in the map-making process. We emphasize that the common-mode noise contribution does not easily integrate down with increasing the number of detectors, as opposite to the auto noise component. For this reason, the noise cross-correlation should be carefully accounted for in any polarization experiment with a large number of detectors, and the map-making process is the natural place to deal with it. We emphasize that the amplitude of this effect is not straightforward to forecast accurately (as it will crucially depend of the instrumental set-up), but we highlight the importance of having a pipeline able to handle it. Indeed, our analysis shows that the effect of the noise cross-correlation is not negligible. Due to the faintness of the B-mode polarization signal, the improvement provided by the extended map-making algorithm may prove crucial for accurate characterization of such contribution at the largest angular scales: accurate modelling of noise at low resolution is an important task to reliably measure the B mode reionization bump, since for some highly efficient estimators devoted to this task noise misestimation may induce bias \citep{2015MNRAS.453.3174M}, contrary to what happens for GLS map-making. \begin{figure} \centering \includegraphics[width=0.49\textwidth]{Figures/diff_q_2det_last.png} \includegraphics[width=0.49\textwidth]{Figures/diff_u_2det_last.png} \caption{\footnotesize{Difference of the noise-only maps of the Stokes parameters $Q$ (left) and $U$ (right) between the cases accounting for and ignoring cross-correlated noise in the map-making (Cartesian projection). Maps have been estimated assuming 2 detectors and one year of operation. Maps are in Ecliptic coordinates, in units of $\mu K$ and at resolution HEALPix $N_{side}$=1024 (3.435 arcmin/pixel). The stripes are due to the cross-correlated noise, which is mitigated when it is taken into account in the map-making algorithm.}} \label{fig:diff_map} \end{figure} \begin{figure} \centering \includegraphics[angle=90,width=0.49\textwidth]{Figures/EE_comp.pdf} \includegraphics[angle=90,width=0.49\textwidth]{Figures/BB_comp.pdf} \caption{\footnotesize{Comparison of $EE$ and $BB$ angular power spectra between the cases accounting for and ignoring the cross-correlated noise in the map-making algorithm. Spectra have been estimated from 20 noise-only Monte Carlo realizations, assuming 2 detectors and one year of operation. On the top: fractional difference of $EE$ (left) and $BB$ (right) average spectra between the two cases. On the bottom: $EE$ (left) and $BB$ (right) spectrum standard deviations of the cases accounting for (dashed red line) and ignoring (solid black line) cross-correlation. Standard deviations correspond to the dispersion of the simulations.}} \label{fig:comp_spec} \end{figure} \section{Introduction} \label{sec:intro} The Standard Model of Cosmology owes its emergence to increasingly accurate observations as much as to theoretical advancement. As new experiments are designed and deployed, the quest for precision and accuracy is becoming more demanding than ever. In the field of cosmic microwave background (CMB) observations, the forefront of research has shifted in recent years from the temperature anisotropies to polarization, a much weaker signal, which has increased scientific expectations and concerns about the analysis. Accurate measurements of CMB polarization pose significant challenges to observational strategies \citep{ECO.instrument.paper} as well as to the analysis of data. The \textit{Planck}\ results have set a milestone by reaching a level where systematic errors, arising either in the instrumental chain or from contamination by spurious emission, surpass those from stochastic noise in the detectors, both for the CMB temperature power spectrum \citep{2014A&A...571A..15P,2016A&A...594A..11P} and for polarization on large angular scales \citep{2016A&A...594A..11P,2016A&A...596A.107P}. The error budget of future experiments, whose focal plane arrays will contain thousands of polarization sensitive detectors, will be dominated by systematics even for small scale polarization. It is therefore critical to ensure that these contaminants can be controlled to a level that does not jeopardize the science goals of the mission. The impact of systematic effects plays a central role in the analysis of modern CMB experiments \citep{2016A&A...594A...2P,2016A&A...594A...7P,2013ApJS..208...20B,2016arXiv161002360L,2015ApJ...806..247B,2016PhRvL.116c1302B} and is the main subject of several papers as well (e.g., \cite{2013ApJS..207...14K,2016A&A...594A...3P,2009PhRvD..79f3008M,2004ApJ...603..371G}), many of them focusing specifically on polarization specific systematics and their treatment \citep{2002AIPC..609..209K,2008PhRvD..77h3003S,2009PhRvD..79j3002M,2009PhRvD..80d3522P}. The definition of a systematic effect is somewhat dependent on the context. Strictly speaking, any contamination which is not the signal of interest and does not exhibit a purely stochastic behavior may be regarded as a systematic. The CMB community has traditionally used the term in a wider sense, considering any contamination that deviates from ideal, white noise as a systemetic. In this sense, long time scale (i.e., correlated or `$1/f$') noise may be considered as a systematic contribution, while being from another point of view a purely random component with a zero expectation value. This paper is part of a set describing the scientific performance of the proposed \textit{CORE}\ satellite, which is designed to map CMB polarization to an accuracy only limited by cosmic variance over a broad range of scales. It explores several aspects related to the expected quality of \textit{CORE}'s polarization measurements. We employ a realistic simulation pipeline to produce time ordered data for a year's worth of observations, which we then reduce to maps of intensity and polarization using a state of the art map-making code. We analyse these maps to assess the overall quality of the \textit{CORE}\ full sky polarization measurements, in view of the proposed scanning strategy and instrumental design. We include in the simulations a number of realistic effects that may impact the accuracy of the observations, and show that they are either under control or can be kept under control by employing analysis techniques already used by the CMB community. The approach we follow consists in studying one effect at a time, which allows us to evaluate each contribution in isolation and carefully assess its impact. The obvious drawback is that we may miss potential interactions between different effects, a situation that may be addressed by employing full end-to-end simulations (see, e.g., \cite{2016A&A...594A..12P}). We defer this very demanding analysis to future studies. The plan of this paper is as follows. We provide in Sect.~\ref{sec:map-making} a brief introduction to the CMB map-making methodology, which we use throughout this work. In Sect.~\ref{sec:simulations} we describe the timeline-to-map simulation engine that was used in this work, based on the publicly available TOAST software package. We produce noise-only maps based on a realistic noise model, which are analyzed in Sect.~\ref{Analysis_maps} to infer results about the purity of the Stokes parameter maps and show how polarization can be resolved by modulating observations using only the scanning strategy, as opposed to adopting specific hardware such as a rotating half wave plate. In this Section, we also explore possible ways of optimizing the scanning strategy and study the noise properties of detectors in several positions in the focal plane. In Sect.~\ref{sec:CorrelatedNoise} we address the case of dealing with noise that is correlated between detectors. We begin addressing signal related simulations with Sect.~\ref{sec:BandpassMismatch} where we show how a bandpass mismatch between detectors can be effectively mitigated for \textit{CORE}. Temperature-to-polarization leakage arising from beam non-idealities is discussed in Sect.~\ref{sec:AsymmetricBeam} where we present correction schemes to be applied either in making the map or in harmonic space afterwards, the latter being supported by a specific semi-analytical approach whose performance is compared to simulations. Sect.~\ref{sec:Calibration} presents a prototype in-flight calibration pipeline for \textit{CORE}\ and discusses its robustness to selected systematic contamination. We discuss in Sect.~\ref{sec:pointing_accuracy} the impact of effects not considered earlier and finally draw our conclusions in Sect.~\ref{sec:conclusions}. \section{Map-making for CMB experiments} \label{sec:map-making} This paper deals extensively with the propagation of \textit{CORE}\ simulated data from time-ordered observations (also called `timelines') to maps of the sky. To provide some context, we briefly review map-making algorithms for CMB experiments. We begin by considering a simple model, which only accounts for ideal sky signal and stochastic instrumental noise, and discuss the standard approaches and their computational implications. This model will be elaborated in the following sections to include systematics contributions and to discuss specific procedures to mitigate their impact. Map-making deals with estimation of maps from timelines containing redundant observations of the sky. This subject has closely followed experimental progress in the field. Map-making schemes devised for COBE \citep{1994ApJ...436..452L}, whose differential measuring technique proved effective in reducing correlated noise, were extended to maps containing millions of pixels for \textit{WMAP}\ \citep{1996ApJ...458L..53W}. More recent CMB experiments (including \textit{Planck}) adopt a direct measurement scheme, as opposed to a differential one, in order to gain sensitivity and reduce the complexity of the optical system. This approach, also adopted for \textit{CORE}, faces higher levels of $1/f$ noise, which has to be kept under control by employing suitable analysis methods (see, e.g., \citet{2001A&A...374..358D,2001A&A...372..346N,2002PhRvD..65b2003S,Tristram_2011,2005A&A...436.1159D,2008ApJ...681..708P}) A widely employed model assumes that the timeline $\mathbf{d}$ depends linearly on the map $\mathbf{m}$ by means of a `pointing' operator $\mathbf{A}$: \begin{equation}\label{eq:data_model_mm} \mathbf{d} = \mathbf{A}\, \mathbf{m} + \mathbf{n}, \end{equation} where the time-ordered vector $\mathbf{n}$ is a stochastic noise component with zero mean and (usually non-diagonal) covariance matrix $N_{tt^\prime} \equiv \langle n_t n_{t^\prime}\rangle$ ($t$ labels time samples) and the vector $\mathbf{m}$ is a discretized image of the sky\footnote{We shall employ the HEALPix pixelization scheme in what follows \citep{2005ApJ...622..759G}.}, containing maps of the Stokes parameters for intensity $I$ and linear polarization $Q$ and $U$\footnote{Circular polarization $V$ is seldom considered for CMB, since it cannot be produced by Thomson scattering over electrons by an unpolarized and anisotropic radiation field \citep{1999NewAR..43..157K}. Instruments employed for CMB measurements do not normally possess the capability to measure circular polarization.}. The simplest possible model for $\mathbf{A}$ is the so-called `pencil beam' approximation, which ignores the convolution of the signal by the instrumental beam. In this limit, the projection from the sky to the timeline of Eq.~\ref{eq:data_model_mm} reads: \begin{equation}\label{eq:signal_model_mm} d_t = I + Q \cos2\psi_t + U \sin2\psi_t +n_t, \end{equation} where $(I,Q,U)$ are the value of the Stokes parameters of the sky for a given instrumental pointing and $\psi_t$ is the instantaneous detector orientation with respect to a chosen celestial frame. Hence, the pencil beam pointing matrix has only three non-zero entries in each row, equal to $[1, \cos2\psi_t, \sin2\psi_t]$. If the instrumental beam is azimuthally symmetric, the pointing and beam convolution operations commute. If this is the case, we may retain the pencil beam approximation and look for an estimate of the beam-convolved map. On the other hand, if the beam is asymmetric the model \ref{eq:signal_model_mm} leads to a biased estimate of the map unless proper treatment is included. This situation is addressed in Section~\ref{sec:AsymmetricBeam} below. An estimate of the map, $\widetilde{\mathbf{m}}$, can be obtained by applying the generalized least squares (GLS) procedure to Eq.~\ref{eq:data_model_mm}: \begin{equation}\label{eq:gls_mm} \widetilde{\mathbf{m}} = (\mathbf{A}^T \mathbf{N}^{-1} \mathbf{A})^{-1}\mathbf{A}^T\mathbf{N}^{-1}\mathbf{d}, \end{equation} where $\mathbf{A}^T$ denotes the transpose of the pointing operator. The quantity $(\mathbf{A}^T \mathbf{N}^{-1} \mathbf{A})^{-1}$ is the covariance matrix of $\widetilde{\mathbf{m}}$. The GLS estimate enjoys a number of desirable properties: provided the noise matrix $\mathbf{N}$ is correct (in practice, it must be estimated from the data) it is the minimum variance estimator. Furthermore, if the noise is drawn from a multivariate Gaussian distribution, the GLS estimate becomes the maximum likelihood solution. It is, however, intractable to compute the matrix for a real world situation with trillions of time samples and millions of map pixels. The problem can be effectively solved by resorting to iterative techniques, typically employing a conjugate gradient solver \citep{2001A&A...372..346N}. For the moment, we restrict the model to a single detector. Multiple detector maps can be trivially accounted for in the absence of noise that is correlated between detectors. If this is not the case, an optimal solution can still be obtained by taking the correlations in account. We discuss an application to \textit{CORE}\ of this scenario is Section \ref{sec:CorrelatedNoise} below. In the case of large datasets, it may be desirable to further reduce the computational burden. This can be achieved by using approximate versions of Eq.~\ref{eq:gls_mm}. A straightforward way to obtain such an approximation is to model the correlated component of the noise using a set of basis functions (typically piecewise constant offsets of given constant length, although more complicated bases can be used) superimposed on white noise. The problem then reduces to finding a suitable estimate of the coefficients of the basis functions. This class of map-making codes is called destripers \citep[see, for example,][]{burigana.1997.destriping,Delabrouille_1998_destriping,Maino1999,keihanen2004,2005MNRAS.360..390K,2009A&A...506.1511K}. Sophisticated implementations of these algorithms can produce results which are statistically indistinguishable from GLS map-making while requiring significantly less computational resources. In this scenario, prior information on the correlated noise properties may be needed \citep{2009A&A...506.1511K}. The most desirable feature of destriping algorithms is that they can be tuned to the desired precision while still controlling their computational cost. The latter of course scales unfavourably with precision, but in real-world applications an advantageous compromise can be usually found by tweaking the offset length. In the following we will make extensive use of a public domain implementation of a generalized destriper, MADAM \citep{2005MNRAS.360..390K,2010A&A...510A..57K}. \section{Pointing accuracy and reconstruction uncertainty} \label{sec:pointing_accuracy} \begin{figure}[!tbp] \centering \includegraphics[width=0.75\textwidth]{Figures/pointing_noise_v2.pdf} \caption[Pointing noise spectrum]{Angular power spectrum of the noise induced by pointing inaccuracy (red, green and blue curves), after correction of the beam window functions, compared to the $EE$ and $BB$ (either pure lensing or primordial with $r=10^{-3}$) spectra (grey and black curves). The instrumental noise (purple curves) is assumed to be 2$\mu$K$\cdot$arcmin, the expected \textit{CORE}\ sensitivity to CMB polarization.} \label{fig:pointing_noise_Cl} \end{figure} The variation of the temperature signal at scales smaller than the beam size may induce spurious polarized signals in two different, but closely related, ways. (1) Sub-pixel effects due to the variation of the sky signal within a map pixel can generate artefacts, that depend mainly on the distance between the nominal pixel centre and the average position of the samples in the pixel, multiplied by the local signal gradient. If the pointing were perfectly known, and once a first estimate of the signal is available, they could be corrected iteratively at the map or at the power spectrum level \citep{Hivon:2016}. This is, however, limited by (2) the accuracy of the pointing reconstruction (for example, a few arcsec in the case of \textit{Planck}), which will create a pointing noise contaminating all power spectra at a comparable amplitude. If the pointing error in a pixel, integrated over all the samples and detectors contributing to the map, is assumed to be weakly correlated with the adjacent pixels, then the resulting pointing induced noise will also be white, with an amplitude determined by the pointing error variance and the variance of the temperature gradient. Figure \ref{fig:pointing_noise_Cl} shows how this pointing-induced noise compares to the angular power spectra of the polarized signal and instrumental noise, for residual pointing error per pixel of 1, 3, and 10\,arcsec \emph{rms} and beam FWHM of 5 and 10\,arcmin. This shows that a pointing error of a few arcsec or less is enough to allow a good measurement of the $BB$ power spectrum. Furthermore, assuming that the pointing error variance is measured, correction schemes can be implemented, as proven by several CMB experiments, including \textit{Planck}\ \citep{2016A&A...594A...7P} and \textit{Spider}. If the pointing error is correlated between pixels, and presents some long term drifts or correlations with external factors, then specific tools would have to be developed to treat it. \section{Simulations} \label{sec:simulations} Simulations play a number of critical roles in CMB missions: \begin{enumerate} \item Optimization of the design of the mission (both the instrument and the observation) to ensure that the dataset obtained will be sufficient to meet the science goals; \item Validation and verification of the data analysis pipeline to ensure that the science can be extracted from the mission dataset; \item Uncertainty quantification and debiasing of the data analysis results using Monte Carlo methods in lieu of the computationally intractable full data covariance matrix. \item Encapsulation of knowledge on the data taking and processing, allowing e.g.\ for novel analyses outside of the team. \end{enumerate} All of these require a joint simulation and analysis pipeline capable of generating a detailed realization of the full mission dataset and reducing it to the science results; figure \ref{simda} provides a schematic overview of such a pipeline. The model of the mission includes both the instrument (including the detector properties, focal plane layout and optical path) and the observations (including the scanning strategy and data-flagging), while the sky model includes the CMB together with all foregrounds (and their impact on the CMB through lensing and scattering). The data simulation operator then applies the mission model to the sky model to generate synthetic time-domain data. The steps of the analysis pipeline alternate between mitigation of the systematic effects in the current data domain (pre-processing, component separation, post-processing) and reduction of the statistical uncertainties by transforming the data to a new domain with higher signal-to-noise (map-making, power spectrum estimation). The map- and spectral-domain products are then used to constrain the parameters of any given model of cosmology and fundamental physics, typically in conjunction with other cosmological datasets. Finally the various data representations can be used to provide feedback to refine the mission and sky models. In this work we particularly focus on the simulation and mitigation of systematic effects to address all three questions, the optimization of the mission design, the validation and verification of the mitigation algorithms and implementations, and the quantification of the residuals after mitigation and their impact on the science results. \begin{figure}[htbp] \begin{center} \includegraphics[scale=0.15]{Figures/simda_pipeline} \caption{A schematic CMB simulation and analysis pipeline, with rectangular operators acting on oval data objects, which may be time samples (red), map pixels (blue) or spectral multipoles (green). Note the many loops, implying iterative processing.} \label{simda} \end{center} \end{figure} In the absence of the explicit data covariance matrix, the most computationally challenging elements of this pipeline are those that manipulate the full time-domain data, and in particular the generation and analysis of Monte Carlo realizations used in lieu of this matrix for uncertainty quantification and debiasing. Given the volume of data to be processed, we require highly optimized massively parallel implementations of the simulation, pre-processing and map-making algorithms and significant high performance computing resources. Moreover, since data movement -- whether between disk and memory or across distributed memory -- is expensive, these steps must be tightly-coupled within an overall time-domain data framework. One such framework, developed for the \textit{Planck}\ satellite mission \citep{2016A&A...594A..12P} but with broad applicability for both satellite and suborbital CMB missions, is the Time-Ordered Astrophysics Scalable Tools (TOAST) package\footnote{http://github.com/hpc4cmb/toast}. As well as being highly computationally efficient, any such framework must also be readily adaptable, allowing the rapid prototyping of new algorithms. TOAST is therefore implemented as a python wrapper and data management layer into which new modules can easily be dropped, coupled with compiled libraries (both internal and external) which can be called wherever computational efficiency is a limiting factor. TOAST has been extensively validated and verfied, primarily in conjunction with its use in the \textit{Planck}\ full focal plane simulations \citep{2016A&A...594A..12P} but also through simulations of the \textit{CORE}\ and \textit{LiteBIRD}\ satellite missions, and in stand-alone comparisons with both analytic calculations and other computational tools. In this work the TOAST framework calls four main libraries, two internal and two external to the TOAST package: \begin{enumerate} \item the TOAST pointing library, which generates the dense-sampled pointings for each detector from the sparse-sampled satellite boresight pointing. \item the TOAST noise simulation library, which generates timelines of noise from each detector's piecewise stationary noise power spectral density functions, provided either as a set of arrays of explicit frequency/power pairs, or as the parameters of an analytic function (typically a white noise level and correlated noise knee frequency and spectral index). \item the libCONVIQT beam convolution library\footnote{http://github.com/hpc4cmb/libconviqt}, a TOAST-compatible implementation of the CONVIQT beam convolution algorithm \citep{2010ApJS..190..267P}, which generates timelines of sky signals from each detector's full asymmetric beam and pointings and the simulated sky being observed. \item the libMADAM map-making library\footnote{http://github.com/hpc4cmb/libmadam}, a TOAST-compatible implementation of the MADAM map-making algorithm \citep{2005MNRAS.360..390K,2010A&A...510A..57K}, which makes a destriped map of the sky given some set of time-ordered data and pointings, for some set of detectors. \end{enumerate} Using 1+2+4 we generate coverage and noise maps to evaluate scanning strategies and correlated noise performance, while using 1+3+4 we generate sky signal maps to evaluate the impact of asymmetric beams. In general, the parameters used, and the analyses of the resulting maps, are discussed in detail in the following sections. For consistency though we employ the same MADAM destriping parameters throughout, in particular setting the destriping offset length and the prior on the correlated noise to maximize statistical efficiency. We have carried out several tests, considering a variety of offset lengths with and without a noise prior. For simulations, where we know the noise properties, it can be taken to be a priori known and exact; for real data it would be necessary to estimate the noise properties from the timeline data, although the accuracy of this estimate does not need to be especially high for typical applications \citep{2002A&A...383.1100N}. For the \textit{CORE}\ scanning strategy and the noise properties described in Table \ref{tab:toast_parameters}, we found that the best MADAM performance is achieved for a offset of $1$ s and using the exact noise prior (i.e. the description provided to the TOAST noise simulation tool).
\section{Results} $C_{4}^{p}$ \textbf{symmetry and band topology} Due to the weak out-of-plane coupling (along c-axis), the electronic properties of Fe-based SCs are mainly contained in the FeAs plane, where the Fe atoms form a square lattice and the As atoms alternate above or below the Fe plaquette center (Fig.\ref{lattice}a). Because of the checkerboard pattern of As lattice, the FeAs plane does not respect the site-centered $% C_{4}^{s}$ symmetry, but is invariant under the site-centered $C_{4}^{s}$ rotation followed by a mirror reflection with respect to the plane\cite% {S4HuHao2012}: $S_{4}\equiv C_{4}^{s}\times R_{z}$. We further discover that the plaquette-centered rotation symmetry $C_{4}^{p}$ is preserved. Among the five $d$-orbitals, the low-energy physics near the FS is mainly contributed by the $d_{xz},d_{yz},d_{xy}$ orbitals. Instead of a direct tunneling via the wave function overlap, the hopping between $d_{xz}$- and $% d_{yz}$-orbitals is primarily contributed by their hybridization with the $p$% -orbitals on the As atoms, whereas the $d_{xy}$ orbitals do not have this privilege and are not included in our minimal model. The As atoms on plaquette centers polarize the $d_{xz}$- and $d_{yz}$-orbitals into $% d_{x^{\prime }z}$- and $d_{y^{\prime }z}$-orbitals to maximize energy gain from hopping (Fig.\ref{lattice}a and Fig.\ref{lattice}b). Therefore the square lattice with $d_{x^{\prime }z}$ and $d_{y^{\prime }z}$ orbitals on each site is effectively factorized into the top and bottom layers where each site has one orbital but the unit cell has to be doubled. As shown in Fig.\ref{lattice}b, the top layer has $d_{x^{\prime }z}$ living on the odd lattice sites (denoted as A) and $d_{y^{\prime }z}$ on the even lattice sites (denoted as B). Likewise, the bottom layer has $d_{y^{\prime }z}$ living on the odd lattice sites (denoted as C) and {\ }$d_{x^{\prime }z}$ on the even lattice sites (denoted as D). For convenience we will denote the top layer as "AB layer" while the bottom layer as "CD layer". Albeit weakly coupled by inter-layer tunneling, the two layers are related by the $S_{4}$ symmetry, while the sublattice degrees of freedom inside each layer are rotated by $C_{4}^{p}$. To demonstrate the symmetries, we introduce the notion $\tau _{\mu \nu }\equiv I_{\mu }\otimes I_{\nu }$, $\mu ,\nu =0,1,2,3$, where the first Pauli matrix $I_{\mu }$ acts on the $S_{4}$ spinor space spanned by those states living on either layer, and the latter Pauli matrix $I_{\nu }$ acts on the $C_{4}^{p}$ spinor space composed of states living on each sublattice. By choosing the simple gauge as shown in Fig.\ref{lattice}b, the representation of $S_{4}$ and $C_{4}^{p}$ symmetries can be explicitly expressed as \begin{eqnarray*} &&S_{4}:\left( \begin{array}{c} \begin{array}{c} A_{\mathbf{k},\sigma } \\ B_{\mathbf{k},\sigma } \\ C_{\mathbf{k},\sigma } \\ D_{\mathbf{k},\sigma }% \end{array}% \end{array}% \right) \rightarrow \left( \begin{array}{c} \begin{array}{c} C_{\mathbf{k^{\prime }},\sigma } \\ -D_{\mathbf{k^{\prime }},\sigma } \\ -A_{\mathbf{k^{\prime }},\sigma } \\ B_{\mathbf{k^{\prime }},\sigma }% \end{array}% \end{array}% \right) =i\tau _{23}\left( \begin{array}{c} \begin{array}{c} A_{\mathbf{k^{\prime }},\sigma } \\ B_{\mathbf{k^{\prime }},\sigma } \\ C_{\mathbf{k^{\prime }},\sigma } \\ D_{\mathbf{k^{\prime }},\sigma }% \end{array}% \end{array}% \right) , \\ &&C_{4}^{p}:\left( \begin{array}{c} \begin{array}{c} A_{\mathbf{k},\sigma } \\ B_{\mathbf{k},\sigma } \\ C_{\mathbf{k},\sigma } \\ D_{\mathbf{k},\sigma }% \end{array}% \end{array}% \right) \rightarrow \left( \begin{array}{c} \begin{array}{c} B_{\mathbf{k^{\prime }},\sigma } \\ -A_{\mathbf{k^{\prime }},\sigma } \\ -D_{\mathbf{k^{\prime }},\sigma } \\ C_{\mathbf{k^{\prime }},\sigma }% \end{array}% \end{array}% \right) =i\tau _{32}\left( \begin{array}{c} \begin{array}{c} A_{\mathbf{k^{\prime }},\sigma } \\ B_{\mathbf{k^{\prime }},\sigma } \\ C_{\mathbf{k^{\prime }},\sigma } \\ D_{\mathbf{k^{\prime }},\sigma }% \end{array}% \end{array}% \right) , \end{eqnarray*}% where $\mathbf{k^{\prime }}=C_{4}\mathbf{k}$. Since the spin-orbit coupling is not concerned, the spin degeneracy is always present. The rotation factor contributed by the spin rotation $(1+i\sigma _{z})/\sqrt{2}$ does not affect the physics and can be absorbed by a basis transformation. Moreover, we would like to point out that these two symmetries commute with each other. \begin{figure}[t] \includegraphics[width=7cm]{C4pKFe2As2_fig1_lattice.pdf} \caption{Lattice configuration of the iron-pnictides. (a) The transverse view of the Fe-As plane shows the hopping of $3d_{x^{\prime }(y^{\prime })z}$ orbital via hybridization with $p_{x^{\prime }(y^{\prime })}$ orbital on arsenic atoms, either above or below the Fe square lattice plane. (b) The $% 3d_{x^{\prime }(y^{\prime })z}$ orbitals on the Fe lattice can be approximately decoupled into two groups which hop around via the arsenic atom on top or bottom of the plane respectively. Thus the lattice can be viewed as "factorized" into the top and bottom layers, which are related by $% S_{4}$ symmetry. (c) For $d$-wave representation of plaquette-centered rotation symmetry $C_{4}^{p}$, the $\Gamma $ point is the source of Berry flux carrying topological winding number $w=\mp 2$ for AB (CD) layer. The red arrow denotes the polarization of $C_{4}^{p}$ spinor on the Fermi pocket, where spin up represents A(C) orbitals and spin down represents B(D) orbitals.} \label{lattice} \end{figure} Formally, the $C_{4}^{p}$ symmetry operation is indeed diagonal in the $% S_{4} $ spinor space and mainly rotates the intra-layer sublattices, while the $S_{4}$ operation is diagonal in each sublattice but primarily rotates the layers. It is worth noticing that the $S_{4}$ spinor and $C_{4}^{p}$ spinor look like dual to each other. But the inter-sublattice hopping is much stronger than the inter-layer tunneling, which makes the $S_{4}$ doublet weakly coupled but $C_{4}^{p}$ doublet strongly hybridized. The power of the $S_{4}$ symmetry lies in that, once the dynamics of one layer is obtained, it is straightforward to derive the other. Therefore, in the presence of $S_{4}$ symmetry, we are bestowed with a minimal $C_{4}^{p}$ spinor model living on either layer. In the following we focus on the properties of the top layer before paying a revisit to the complete $S_{4}$ spinor. As shown in Fig.\ref{lattice}b, the kinetic part of the model Hamiltonian mainly involves anisotropic nearest neighbor (NN) hopping $t_{1}$ and the next nearest neighbor (NNN) hopping $t_{2}$ or $t_{2}^{\prime }$, which can be recombined and decomposed into $s$-wave and $d$-wave representation: $% t_{1s}=\left( t_{1x}+t_{1y}\right) /2$, $t_{1d}=\left( t_{1x}-t_{1y}\right) /2$, $t_{2s}=\left( t_{2}+t_{2}^{\prime }\right) /2$, and $t_{2d}=\left( t_{2}-t_{2}^{\prime }\right) /2$. In terms of the $C_{4}^{p}$ spinor $\Psi _{% \mathbf{k},\sigma }\equiv \left( A_{\mathbf{k},\sigma },B_{\mathbf{k},\sigma }\right) ^{T}$, it is then expressed as \begin{equation} H_{t}^{\text{AB}}=\frac{1}{2}\sum_{\mathbf{k},\sigma }\Psi _{\mathbf{k}% ,\sigma }^{\dagger }\left[ \epsilon _{0}(\mathbf{k})+\epsilon _{x}(\mathbf{k}% )I_{1}+\epsilon _{z}(\mathbf{k})I_{3}\right] \Psi _{\mathbf{k},\sigma }, \end{equation}% where $\mathbf{k}$ ranges in the unfolded BZ and \begin{eqnarray*} \epsilon _{0}(\mathbf{k}) &=&4t_{2s}\cos k_{x}\cos k_{y}-\mu , \\ \epsilon _{z}(\mathbf{k}) &=&-4t_{2d}\sin k_{x}\sin k_{y}, \\ \epsilon _{x}(\mathbf{k}) &=&2t_{1d}\left( \cos k_{x}-\cos k_{y}\right) +2t_{1s}\left( \cos k_{x}+\cos k_{y}\right) \\ &\equiv &\epsilon _{xd}(\mathbf{k})+\epsilon _{xs}(\mathbf{k}). \end{eqnarray*}% Note that $\epsilon _{z}(\mathbf{k})$ denotes the sublattice energy difference and $\epsilon _{x}(\mathbf{k})$ is the energy gain from the NN hopping process. A vector can be defined by $\mathbf{h}(\mathbf{k})\equiv (\epsilon _{x},0,\epsilon _{z})$, which acts as a "magnetic field" in the momentum space and pinning the $C_{4}^{p}$ spinor (Fig.\ref{lattice}c). It should be noted that the sublattice degree of freedom in AB layer is locked with the atomic internal angular momentum i.e. the odd sites carry $% d_{x^{\prime }z}$ orbitals while the even sites carry $d_{y^{\prime }z}$ orbitals, so that the $C_{4}^{p}$ spinor is actually a composite of the sublattice degree of freedom and the internal atomic angular momentum. For instance, when $t_{1s}=0$,$\ t_{1d}<0$,$\ t_{2s}>0$, and$\ t_{2d}>0$, the spinor along $k_{x}$ with the lowest energy is composed of the equal superposition of $d_{x^{\prime }z}$-orbitals on odd sites and $d_{y^{\prime }z}$-orbitals on even sites (Fig.\ref{lattice}c), equivalent to $d_{xz}$% -orbitals. But along the BZ diagonal, the spinor with the lowest energy consists of the $d_{x^{\prime }z}$-orbitals on odd sites or $d_{y^{\prime }z} $-orbitals on even sites. Before diagonalization, there are several remarks about the symmetries in this kinetic part. The $d$-wave and $s$-wave NN hopping correspond to two distinctive symmetry representations of the plaquette-centered rotation symmetry, respectively. Based on the sketch of a snapshot of the wave function distribution in Fig.\ref{lattice}b, we naturally expect $% |t_{1d}|\gg |t_{1s}|\approx 0$. Indeed, adding a nonzero $t_{1s}$ would break the symmetry $C_{4}^{p}$. So the ideal case of $t_{1s}=0$ and $% t_{1d}\neq 0$ respects the symmetry $C_{4}^{p}$, which can faithfully characterize the FS structure of iron-pnictides. \begin{figure}[t] \includegraphics[width=7cm]{C4pKFe2As2_fig2_bandstructure.pdf} \caption{Band structures and Fermi surfaces of the minimal model without considering any electron interactions for various systems of Fe-based superconductors. Left panel shows the band structure for varying parameters while right panel shows the corresponding FS in the unfolded BZ. (a) The parameters are $t_{1d}=-0.3$, $t_{1s}=0$, $t_{2s}=0.5$, in unit of $t_{2d}=1$% . Hole pocket is located around $\Gamma $ and electron pocket around $X$, describing the FS structure for iron-pnictides. The $\Gamma $ point is a double Dirac point with quadratic band touching dispersion. (b) The parameters are $t_{1d}=-1.2$, $t_{1s}=0$, $t_{2s}=0.5$, in unit of $t_{2d}=1$% . Electron pocket vanishes, while the hole pocket around $\Gamma $ is robust, standing for the heavily hole doped iron-pnictides. (c) The parameters are $t_{1d}=-1.2$, $t_{1s}=-0.3$, $t_{2s}=0.5$, in unit of $% t_{2d}=1$. Mixing $d$-wave NN hopping with $s$-wave component can split the double Dirac point into two Dirac points while elongating the hole pocket. Hole pocket could be further torn apart.} \label{band} \end{figure} In the helicity basis, $H_{t}^{\text{AB}}$ can be directly diagonalized \begin{equation} H_{t}^{\text{AB}}=\frac{1}{2}\sum_{\mathbf{k},\sigma }\left[ \xi _{e}(% \mathbf{k})\alpha _{\mathbf{k},\sigma }^{\dagger }\alpha _{\mathbf{k},\sigma }+\xi _{h}(\mathbf{k})\beta _{\mathbf{k},\sigma }^{\dagger }\beta _{\mathbf{k% },\sigma }\right] , \end{equation}% where $\xi _{e(h)}(\mathbf{k})=\epsilon _{0}\pm \sqrt{\epsilon _{x}^{2}+\epsilon _{z}^{2}}$ represents the electron (hole) band with $\pm $ helicity, respectively: \begin{eqnarray} \alpha _{\mathbf{k},\sigma }^{\dagger } &=&\left( \cos \frac{\theta _{% \mathbf{k}}}{2}\right) A_{\mathbf{k},\sigma }^{\dagger }+\text{sgn}\left( \epsilon _{x}\right) \left( \sin \frac{\theta _{\mathbf{k}}}{2}\right) B_{% \mathbf{k},\sigma }^{\dagger }, \notag \\ \beta _{\mathbf{k},\sigma }^{\dagger } &=&\left( \cos \frac{\theta _{\mathbf{% k}}}{2}\right) B_{\mathbf{k},\sigma }^{\dagger }-\text{sgn}\left( \epsilon _{x}\right) \left( \sin \frac{\theta _{\mathbf{k}}}{2}\right) A_{\mathbf{k}% ,\sigma }^{\dagger }, \label{hybrid_rel} \end{eqnarray}% and the hybridization angle is given by $\theta _{\mathbf{k}}=\tan ^{-1}% \frac{\left\vert \epsilon _{x}\right\vert }{\epsilon _{z}}\in \left[ 0,\pi % \right] $. The band dispersion and the corresponding FS structures can be easily obtained. Fig.\ref{band}a exhibits the coexistence of a hole pocket around $\Gamma $ and an electron pocket around $X$ point in the absence of the $s$-wave NN hopping, a characteristic FS structure of most iron-pnictides. As the $d$-wave NN hopping is growing, the electron band is gradually pushed upwards, shrinking the electron pocket. It finally leads to the FS structure of $\text{KFe}_{2}\text{As}_{2}$ (Fig.\ref{band}b), where the electron pocket completely vanishes. This evolution is also related to the doping process of Ba$_{1-x}$K$_{x}$Fe$_{2}$As$_{2}$ iron-pnictides\cite% {Grinenko2017}. Note that the shape of the hole pocket has the $C_{4}$ rotational symmetry thanks to the symmetry $C_{4}^{p}$, and the two bands touch each other quadratically at zone center $\Gamma $ point, which is not accidental but rather due to the topological nature. Namely, the helical spinor is pinned by the vector field $\mathbf{h}(\mathbf{k})$ to wind around the $\Gamma $ point twice, yielding a topological number $w=2\text{sgn}\left( t_{1d}t_{2d}\right) $ (Ref.\cite{RanZhaiVishwanathLee2009}). It is this topological number that forces the electron and hole bands to touch quadratically at the vortex core of $\mathbf{h}(\mathbf{k})$, which becomes the source of the Berry flux experienced by the helical spinor (see Fig.\ref% {lattice}c). Consequently, the hole pocket surrounding the vortex core is protected by topology, whereas the electron pocket is less robust. As long as the time reversal (TR) symmetry is present, the occurrence of $I_{2}$ is forbidden and this vortex core is robust. However, the TR symmetry cannot prevent the double Dirac point at $\Gamma $ from splitting apart into two separated Dirac nodes, which could be driven by a weak $C_{4}^{p}$-breaking perturbation. This is indeed the case when the $s$-wave hoping comes in mixing the $d$-wave NN hopping (Fig.\ref{band}c), where the hole pocket experiences a "nematic force" and is simultaneously elongated. When the $% C_{4}^{p}$ symmetry breaking term is large enough, the hole pocket around $% \Gamma $ is going to be torn apart, resulting in two pockets surrounding the Dirac nodes, which is not seen in the real materials. So the iron-pnictides with hole pockets around $\Gamma $ robustly observed in experiments must preserve the $C_{4}^{p}$ symmetry, at least approximately. In other words, the FS structure of iron-pnictides is stabilized by the $C_{4}^{p}$ symmetry which helps the TR symmetry protect and confine the double Dirac point to the hole pocket center. In this sense, the $C_{4}^{p}$ symmetry is one of the key relevant features of iron-pnictides, which can tolerate only tiny amount of $s$-wave hopping. In the next section, we will focus on the ideal case of $d$-wave NN hopping limit by sending $t_{1s}\rightarrow 0$ for $% \text{KFe}_{2}\text{As}_{2}$. Specifically, we choose the realistic hopping parameters as $t_{1d}=-1.2$, $t_{2s}=0.5$, and $t_{2d}=1$, whose corresponding band structure is given by Fig.\ref{band}b. When things are clear in the ideal case, we will introduce a weak $s$-wave NN hopping to model the more realistic material later on. $C_{4}^{p}$ \textbf{protected }$d$\textbf{-wave renormalized pairing SC} Provided the electronic structure of KFe$_{2}$As$_{2}$, we need to include the electronic interactions. The strong correlation evidenced by experiments% \cite{UjiFSmassEnhance,HardyCorrelationIncoherence2013,Uchida2014} requires a strong coupling approach. Particularly, the optical measurement\cite% {Uchida2014} had showed the incoherent spectral weight of $\text{KFe}_{2}% \text{As}_{2}$ as high as 10\% hole-doped $\text{La}_{2-x}\text{Sr}_{x}\text{% CuO}_{4}$, revealing the strong local AF correlation similar to the cuprates. Therefore, we would like to model this system with AF super-exchanges containing the NN and NNN interactions as shown in Fig.\ref% {lattice}b. Distinct from the $t-J_{1}-J_{2}$ model in the previous form\cite% {HuBernevig2orbitalExchange}, our model Hamiltonian is subjected to a constraint that projects out double-occupancy. Thus, the model Hamiltonian for AB layer is described by $H^{\text{AB}}=\mathcal{P}H_{t}^{\text{AB}}% \mathcal{P}+H_{J}^{\text{AB}}$ with interaction terms:% \begin{eqnarray} H_{J}^{\text{AB}} &=&J_{1}\sum_{\mathbf{r},\mathbf{\delta }}S_{\mathbf{r}% }^{A}\cdot S_{\mathbf{r}+\mathbf{\delta }}^{B} \notag \\ &&+J_{2}\sum_{\mathbf{r}}\left( S_{\mathbf{r}}^{A}\cdot S_{\mathbf{r}+\left( \hat{x}+\hat{y}\right) }^{A}+S_{\mathbf{r}}^{B}\cdot S_{\mathbf{r}+\left( \hat{x}-\hat{y}\right) }^{B}\right) \notag \\ &&+J_{2}^{\prime }\sum_{\mathbf{r}}\left( S_{\mathbf{r}}^{A}\cdot S_{\mathbf{% r}+\left( \hat{x}-\hat{y}\right) }^{A}+S_{\mathbf{r}}^{B}\cdot S_{\mathbf{r}% +\left( \hat{x}+\hat{y}\right) }^{B}\right) , \end{eqnarray}% where $\mathbf{\delta }=\pm \hat{x},\hat{y}$ is the NN vector. As the low-energy descendant of the on-site Hubbard interaction, the AF super-exchange $J$-terms rely on the corresponding hopping integrals. Like cuprates, the parameters can be chosen as $J_{2}=0.5$ and $J_{2}^{\prime }=0.2$ as roughly one third of the corresponding hopping integrals and the dopant concentration is fixed at $0.05$. Note that although $J_{2}^{\prime }$ differs from $J_{2}$, only the combination $J_{2s}\equiv 2J_{2}J_{2}^{\prime }/(J_{2}+J_{2}^{\prime })$ contributes to pairing. So that the physics is essentially captured by the competition between $J_{1}$ and $J_{2s}$. The parameter $J_{1}$ is chosen as the tuning parameter that mimics the inverse pressure when compared with the pressure experiments\cite{TaftiTaillefer2013}% . The projector $\mathcal{P}$ declares the particle occupancy constraints: $% \sum_{\sigma }A_{\mathbf{r},\sigma }^{\dagger }A_{\mathbf{r},\sigma }\leq 1$ and $\sum_{\sigma }B_{\mathbf{r},\sigma }^{\dagger }B_{\mathbf{r},\sigma }\leq 1$, which lead to emergent spin-charge separation physics. To tackle the constraint, we adopt the well-established slave-boson decomposition to factorize electron into fermionic spinon and bosonic holon: \begin{equation} A_{\mathbf{r},\sigma }=h_{\mathbf{r}}^{\dagger }a_{\mathbf{r},\sigma },B_{% \mathbf{r},\sigma }=h_{\mathbf{r}}^{\dagger }b_{\mathbf{r},\sigma }, \end{equation}% in which way the constraint becomes equalities: $\sum_{\sigma }a_{\mathbf{r}% ,\sigma }^{\dagger }a_{\mathbf{r},\sigma }+h_{\mathbf{r}}^{\dagger }h_{% \mathbf{r}}=1\text{ and }\sum_{\sigma }b_{\mathbf{r},\sigma }^{\dagger }b_{% \mathbf{r},\sigma }+h_{\mathbf{r}}^{\dagger }h_{\mathbf{r}}=1$, and can be enforced via a Lagrangian multiplier. After the bosonic holons are condensed $\left\langle h_{\mathbf{r}}^{\dagger }\right\rangle =\left\langle h_{% \mathbf{r}}\right\rangle =\sqrt{x}$, we introduce the uniform valence bond and singlet pairing order parameters \begin{equation*} \kappa _{ij}=-\frac{J}{4}\left\langle \sum_{\sigma }a_{i,\sigma }^{\dagger }a_{j,\sigma }\right\rangle ,\Delta _{ij}=\frac{J}{4}\left\langle a_{i,\uparrow }a_{j,\downarrow }-a_{i,\downarrow }a_{j,\uparrow }\right\rangle , \end{equation*}% to decouple the local AF interactions. Moreover, the NN and NNN valence bond and singlet pairing order parameters in real space can be rearranged into the $s$-wave and $d$-wave representations: $\kappa _{1}$ is automatically of $d$-wave symmetry required by $C_{4}^{p}$ symmetry and other valence bond orders are% \begin{eqnarray} \kappa _{2s} &=&(\kappa _{2}+\kappa _{2}^{\prime })/2,\ \kappa _{2d}=(\kappa _{2}-\kappa _{2}^{\prime })/2,\ \notag \\ \Delta _{1s} &=&(\Delta _{1x}+\Delta _{1y})/2,\ \Delta _{1d}=(\Delta _{1x}-\Delta _{1y})/2,\ \notag \\ \Delta _{2s} &=&(\Delta _{2}+\Delta _{2}^{\prime })/2,\Delta _{2d}=(\Delta _{2}-\Delta _{2}^{\prime })/2. \end{eqnarray} Finally, a mean-field Hamiltonian can be obtained \begin{equation} H_{\text{MF}}^{\text{ab}}=H_{t}^{\text{ab}}+H_{\Delta }^{\text{ab}}, \end{equation}% which describes the superconducting quasiparticles on the AB layer. The kinetic part $H_{t}^{\text{ab}}$ has the same band structure as we discussed in the last section. $H_{t}^{\text{AB}}\rightarrow H_{t}^{\text{ab}}$ requires replacing the electrons with the corresponding quasiparticles $\Psi _{\mathbf{k},\sigma }=\left( A_{\mathbf{k},\sigma },B_{\mathbf{k},\sigma }\right) ^{T}\rightarrow \psi _{\mathbf{k},\sigma }\equiv \left( a_{\mathbf{k% },\sigma },b_{\mathbf{k},\sigma }\right) ^{T}$, while renormalizing the hopping integrals and the chemical potential as \begin{eqnarray} t_{1d} &\rightarrow &\tilde{t}_{1d}=\left( t_{1d}x+\kappa _{1}\right) ,\text{ }t_{1s}\rightarrow \tilde{t}_{1s}=t_{1s}x, \notag \\ t_{2s} &\rightarrow &\tilde{t}_{2s}=\left( t_{2s}x+\kappa _{2s}\right) , \notag \\ t_{2d} &\rightarrow &\tilde{t}_{2d}=\left( t_{2d}x+\kappa _{2d}\right) , \notag \\ \mu _{0} &\rightarrow &\mu =\mu _{0}-\lambda -\left( J_{2}+J_{3}\right) /4. \end{eqnarray}% The hybridization relation Eq. (\ref{hybrid_rel}) also holds by replacing A(B) with a(b), and the mean-field pairing terms can be compactly expressed in terms of the $C_{4}^{p}$ spinor: \begin{equation} H_{\Delta }^{\text{ab}}=\frac{1}{2}\sum_{\mathbf{k}}\left[ \psi _{\mathbf{k}% ,\uparrow }^{\dagger }\left( \Delta _{0}+i\Delta _{x}I_{x}+\Delta _{z}I_{z}\right) (\psi _{\mathbf{k},\downarrow }^{\dagger })^{T}+h.c.\right] \end{equation}% with \begin{eqnarray*} \Delta _{0}(\mathbf{k}) &=&4\Delta _{2s}\cos k_{x}\cos k_{y},\Delta _{z}(% \mathbf{k})=4\Delta _{2d}\sin k_{x}\sin k_{y}, \\ \Delta _{x}(\mathbf{k}) &=&2\Delta _{1s}\left( \cos k_{x}+\cos k_{y}\right) +i2\Delta _{1d}\left( \cos k_{x}-\cos k_{y}\right) . \end{eqnarray*}% Provided with all the form factors available from the interactions, we can eliminate some of them which are apparently unfavorable energetically. In this minimal model for KFe$_{2}$As$_{2}$, within the AB layer there is only a small hole pocket around $\Gamma $ point. The Cooper pair formed on the FS is more likely to be scattered onto the same FS with small momentum transfer. And the pairing interactions $J_{1}(q)\propto -2J_{1}\left( \cos q_{x}+\cos q_{y}\right) $ and $J_{2s}(q)\propto -4J_{2s}\cos q_{x}\cos q_{y}$ are attractive when $q\approx 0$, while $J_{2d}(q)\propto 4J_{2d}\sin q_{x}\sin q_{y}$ tends to vanish. Therefore, the pairing components $\Delta _{1d}$ and $\Delta _{2d}$ are energetically unfavorable compared to $\Delta _{1s}$ and $\Delta _{2s}$, which endow the FS with largest possible energy gain. In fact, we did some self-consistent calculation numerically to verify the results $\Delta _{1d}=\Delta _{2d}=0$. Thus we are left with two $s$% -wave pairing components $\Delta _{1s}$ and $\Delta _{2s}$ to be determined self-consistently by minimizing the ground state energy. As there is only single hole pocket FS in the low energy excitations, we can project the effective Hamiltonian onto the hole band and especially focus on the vicinity of FS. Turned to the band basis $\Gamma _{\mathbf{k},\sigma }\equiv \left( \alpha _{\mathbf{k},\sigma },\beta _{\mathbf{k},\sigma }\right) ^{T}$, the mean-field Hamiltonian can be straightforwardly obtained \begin{eqnarray} &&H_{\text{eff}}^{\text{ab}}=\frac{1}{2}\sum_{\mathbf{k},\sigma }\xi _{h}(% \mathbf{k})\beta _{\mathbf{k},\sigma }^{\dagger }\beta _{\mathbf{k},\sigma } \\ &&+\frac{1}{2}\sum_{\mathbf{k}}\left( \Delta _{0}(\mathbf{k})-\frac{% i\epsilon _{xd}(\mathbf{k})\Delta _{x}(\mathbf{k})}{\sqrt{\epsilon _{xd}^{2}+\epsilon _{z}^{2}}}\right) \beta _{\mathbf{k},\uparrow }^{\dagger }\beta _{-\mathbf{k},\downarrow }^{\dagger }+h.c.. \notag \end{eqnarray}% Here we can see that the $s$-wave pairing component $\Delta _{x}$ arising from the NN spin exchange interaction is renormalized by a $d$-wave form factor $\epsilon _{xd}\propto \left( \cos k_{x}-\cos k_{y}\right) $, which is inherited from the NN hopping integral in the $C_{4}^{p}$ symmetry representation. Actually it should be no surprise, since we can physically understand this renormalization factor in the following way. The NN pairing interaction glues the inter-sublattice particles, which coexist in the hole band with probability proportional to the hybridization energy gain. As a result, the effective intra-hole-band pairing condensate is supposed to be renormalized by $\epsilon _{xd}$. As shown in Fig.\ref{lattice}c, along the zero lines of hybridization energy $\epsilon _{xd}$, there is no coexistence of the sublattice degrees of freedom so that there are no inter-orbital Cooper pairs, regardless of their internal pairing symmetry. Such a mechanism is parallel to the effective intra-band $p$-wave pairing induced on the helical electrons in proximity to the $s$-wave superconductors\cite% {FuKane2008}. Then the Bogoliubov quasi-particle spectrum can be derived \begin{equation} E(\mathbf{k})=\pm \sqrt{\xi _{h}^{2}\left( \mathbf{k}\right) +\Delta _{0}^{2}\left( \mathbf{k}\right) +\tilde{\Delta}_{x}^{2}(\mathbf{k})}, \end{equation}% where $\tilde{\Delta}_{x}(\mathbf{k})\equiv \frac{\epsilon _{xd}(\mathbf{k})% }{\sqrt{\epsilon _{xd}^{2}+\epsilon _{z}^{2}}}\Delta _{x}(\mathbf{k})$ and $% E(\mathbf{k})$ exhibits the nodal excitations when $\Delta _{0}\left( \mathbf{k}\right) =0$. Note that the inter-band pairing between hole band and high energy electron band only contributes second order perturbation corrections to the gap structure, but is unable to alter its symmetry. The $% d $-wave gap nodes carrying one unit of vorticity in the Nambu space are topologically protected\cite{FaDunghai,eDopedZhuZhang}. Within the AB layer, there are only two ways to destroy these nodes. The first one is to generate a mass upon the massless Bogoliubov quasi-particles\cite{ZhuWangZhang} which is forbidden by the TR symmetry in pairing sector. The mass term is an additional pairing component with phase difference that cannot be gauged away. The other way is to move the nodes with opposite vorticity to annihilate each other, which is prevented by the $C_{4}^{p}$ symmetry that confines the nodes to the unfolded BZ diagonal. Now we have two competing pairing components: the NNN Cooper pair condensate $\Delta _{0}(\mathbf{k})$ with the $s_{x^{2}y^{2}}$-wave form factor and the NN Cooper pair condensate $\tilde{\Delta}_{x}(\mathbf{k})$ carrying the $% d_{x^{2}-y^{2}}\times s_{x^{2}+y^{2}}$-wave form factor. They can be varied by the NN interaction $J_{1}$ for a fixed NNN interaction $J_{2s}\simeq 0.3$% . The detailed self-consistency calculation explicitly shows phase transitions of pairing symmetry displayed in Fig.\ref{phase}. When $J_{1}\ll J_{2s}$, the NNN interaction overwhelms the NN interaction, leading to the $% s_{x^{2}y^{2}}$-wave pairing, whereas $J_{1}\gg J_{2s}$ results in the $% d_{x^{2}-y^{2}}\times s_{x^{2}+y^{2}}$-wave pairing. In between, the SC with a mixed pairing $s+id\times s$ is energetically more favorable, which spontaneously breaks the TR symmetry. To compare with the pressure experiments\cite{TaftiTaillefer2013}, we notice that, upon increasing pressure, both $t_{2}$ and $J_{2}$ are expected to grow faster than $t_{1}$ and $J_{1}$. Since the dopant concentration is fixed and the small hole pocket FS does not change qualitatively, we expect that decreasing the ratio of $J_{1}/J_{2s}$ is adequate to capture the essential physics during the period of increasing pressure. When the superfluid density does not vary drastically, the superconducting critical temperature would be roughly proportional to the maximum gap on the FS, and it turns out the tendency of maximum gap on the FS along $J_{1}$ shown by the black solid line in Fig.\ref% {phase} concurs qualitatively well with the $T_{c}$ trend under decreasing pressure in experiments\cite{TaftiTaillefer2013}. Moreover, the phase transition from the $d\times s$-wave nodal SC to the $s+id\times s$ nodeless SC belongs to the TR breaking mass generation scenario of destroying the pairing gap nodes. \begin{figure}[t] \includegraphics[width=7.8cm]{C4pKFe2As2_fig3_phasetransition.pdf} \caption{Phase diagram of the superconducting phases for KFe$_{2}$As$_{2}$ under pressure (decreasing $J_{1}$ mimics the trend of increasing pressure). The parameters are $x=0.05$, $t_{1d}=-1.2$, $t_{2s}=0.5$, $J_{2}=0.5$, $% J_{2}^{\prime }=0.2$ in unit of $t_{2d}=1$. Red line is for the NN Cooper pair $|\Delta _{1s}|$ that obtains $s_{x^{2}y^{2}}$ form factor in momentum space, while blue line is for the NNN Cooper pair condensate $|\Delta _{2s}|$ who is endowed with $d_{x^{2}-y^{2}}\times s_{x^{2}+y^{2}}$-wave form factor. The $d_{x^{2}-y^{2}}\times s_{x^{2}+y^{2}}$-wave SC comes to replace the $s_{x^{2}y^{2}}$-wave SC when $J_{1}$ overwhelms $J_{2s}$. The grey color region marks the intermediate phase region with $% s_{x^{2}y^{2}}+id_{x^{2}-y^{2}}\times s_{x^{2}+y^{2}}$ mixed pairing SC. Black solid line shows the maximal gap along the FS, which is roughly proportional to the critical temperature when superfluid density does not vary drastically. Insets show the pairing gap structure on the FS, characteristic of the three pairing phases, respectively. } \label{phase} \end{figure} For the CD layer, we can simply apply the $S_{4}$ symmetry to obtain its low-energy effective Hamiltonian: \begin{eqnarray} &&H_{\text{eff}}^{\text{cd}}=\frac{1}{2}\sum_{\mathbf{k},\sigma }\xi _{h}(% \mathbf{k})\gamma _{\mathbf{k},\sigma }^{\dagger }\gamma _{\mathbf{k},\sigma } \\ + &&\frac{\eta }{2}\sum_{\mathbf{k}}\left( \Delta _{0}(\mathbf{k})+\frac{% \epsilon _{xd}(\mathbf{k})}{\sqrt{\epsilon _{xd}^{2}+\epsilon _{z}^{2}}}% i\Delta _{x}(\mathbf{k})\right) \gamma _{\mathbf{k},\uparrow }^{\dagger }\gamma _{-\mathbf{k},\downarrow }^{\dagger }+h.c. \notag \end{eqnarray}% where $\gamma _{\mathbf{k},\sigma }^{\dagger }=\left( \cos \frac{\theta _{% \mathbf{k}}}{2}\right) c_{\mathbf{k},\sigma }^{\dagger }-\text{sgn}\left( \epsilon _{xd}\right) \left( \sin \frac{\theta _{\mathbf{k}}}{2}\right) d_{% \mathbf{k},\sigma }^{\dagger }$. $\eta $ embodies the global phase difference between the pairing condensates of the two layers, and is restricted to be either $\pm 1$ or $\pm i$ as the one-dimensional representations of the $S_{4}$ point group\cite{S4HuHao2012}. The relative phase difference can be pinned down by inter-layer couplings for the benefit of energetics. \textbf{Octet nodal SC from distorting }$d$\textbf{-wave pairing} We are now in a good position to focus on the nodal phase at ambient pressure, which appears like a sphinx in a variety of experiments. Based on what we obtained, we have two $S_{4}$-related $C_{4}^{p}$ symmetric hole pockets which are absolutely degenerate. They can form $d$-wave pairing condensates with degenerate quartet nodes residing on the unfolded BZ diagonal (Fig.\ref{nodes}a and \ref{nodes}b). Such degeneracy is highly unstable against any arbitrary perturbation, so we are obliged to return to the more realistic materials by involving the weak $C_{4}^{p}$-breaking hopping $t_{1s}$ and inter-layer tunneling $t_{c}$. As for the inter-layer tunneling, the $s$-wave NN tunneling would be the dominant term, from the estimate of orbitals overlap and symmetry analysis (see Fig.\ref{lattice}b). Note that the on-site tunneling is suppressed because of the orbital orthogonality. Surprisingly, the $S_{4}$ symmetry survives this tunneling process. When $t_{c}\ll t_{1s}\ll t_{1d}$, the effective Hamiltonians for the AB and CD layers are modified by $t_{1s}$ in their respective ways:% \begin{eqnarray} H_{\text{eff}}^{\text{ab}} &\rightarrow &\frac{1}{2}\sum_{\mathbf{k},\sigma }\xi _{h}^{+}(\mathbf{k})\beta _{\mathbf{k},\sigma }^{\dagger }\beta _{% \mathbf{k},\sigma } \\ &&+\frac{1}{2}\sum_{\mathbf{k}}\frac{\epsilon _{xd}(\mathbf{k})+\epsilon _{xs}(\mathbf{k})}{\sqrt{\left( \epsilon _{xd}+\epsilon _{xs}\right) ^{2}+\epsilon _{z}^{2}}}\Delta _{x}(\mathbf{k})\beta _{\mathbf{k},\uparrow }^{\dagger }\beta _{-\mathbf{k},\downarrow }^{\dagger }+h.c. \notag \\ H_{\text{eff}}^{\text{cd}} &\rightarrow &\frac{1}{2}\sum_{\mathbf{k},\sigma }\xi _{h}^{-}(\mathbf{k})\gamma _{\mathbf{k},\sigma }^{\dagger }\gamma _{% \mathbf{k},\sigma } \\ &&+\frac{\eta }{2}\sum_{\mathbf{k}}\frac{-\epsilon _{xd}(\mathbf{k}% )+\epsilon _{xs}(\mathbf{k})}{\sqrt{\left( \epsilon _{xd}-\epsilon _{xs}\right) {}^{2}+\epsilon _{z}^{2}}}\Delta _{x}(\mathbf{k})\gamma _{% \mathbf{k},\uparrow }^{\dagger }\gamma _{-\mathbf{k},\downarrow }^{\dagger }+h.c. \notag \end{eqnarray}% where the global phase of $\Delta _{1s}$ has been gauged to absorb the phase factor $-i$. Meanwhile, the normal state dispersion and the hybridization angle for AB/CD layer are given by \begin{equation} \xi _{h}^{\pm }(\mathbf{k})=\epsilon _{0}(\mathbf{k})-\sqrt{\left( \epsilon _{xd}\pm \epsilon _{xs}\right) ^{2}+\epsilon _{z}^{2}}, \end{equation}% and $\theta ^{\pm }=\tan ^{-1}\frac{\left\vert \epsilon _{xd}\pm \epsilon _{xs}\right\vert }{\epsilon _{z}}$, so that the quasiparticles, $\beta _{% \mathbf{k},\sigma }^{\dagger }$ and $\gamma _{\mathbf{k},\sigma }^{\dagger }$ are adapted (see Supplementary Material for detail). As a result, the $d$% -wave nodal lines that used to lie across the unfolded BZ diagonal are now twisted and dragged away from the $\Gamma $ point by a "nematic force", resulting in a simultaneous movement of nodes along the elongating direction of the hole Fermi pockets (Fig.\ref{nodes}a and \ref{nodes}b). Since the nodes with opposite vorticity need to travel a finite path along the FS before annihilation, they can survive a finite weak $C_{4}^{p}$-breaking term depending on the size of the FS. \begin{figure}[t] \includegraphics[width=7.8cm]{C4pKFe2As2_fig4_octetnodes.pdf} \caption{Distorted $d$-wave nodes on the Fermi surfaces. The white diamond emphasizes the folded BZ; the orange dashed lines denote the nodal lines of the effective $d_{x^{2}-y^{2}}$-wave pairing condensate on the FS distorted by $s_{x^{2}+y^{2}}$-wave factor (the effect of weak $s$-wave is moderately exaggerated for illustration); The FS is separated by pairing nodal lines into the segments with positive (negative) pairing condensate marked by red (blue) color, respectively. (a) In the AB layer, the mixing weak $s$-wave NN hopping acts like a "nematic force" that elongates the FS and distorts the $d $-wave nodal lines, leading to shifted quartet nodes. (b) As the CD layer is related to AB layer by the $S_{4}$ symmetry, the distortion occurs in the perpendicular direction. (c) Near unfolded BZ diagonal the quasi-particles from the AB and CD layers are strongly hybridized with each other by any infinitesimal inter-layer tunneling. The intersecting elliptic hole pockets are therefore reconstructed into inner and outer pockets. The inner one has nodeless pairing gap whereas the outer one shows octet nodal gap structure. The origin of nodes can be attributed to a rather simple symbolic equation "8=4+4".} \label{nodes} \end{figure} The hole pockets from the AB and CD layers are required by $S_{4}$ symmetry to intersect at the unfolded BZ diagonal (Fig.\ref{nodes}c). Degeneracy at this point is unstable against any arbitrarily weak perturbation of inter-layer tunneling: \begin{eqnarray} H_{c} &=&\frac{1}{2}\sum_{\mathbf{k},\sigma }\left[ \epsilon _{c}(\mathbf{k}% )\left( a_{\mathbf{k},\sigma }^{\dagger }d_{\mathbf{k},\sigma }+b_{\mathbf{k}% ,\sigma }^{\dagger }c_{\mathbf{k},\sigma }\right) +h.c.\right] \notag \\ &\rightarrow &\frac{1}{2}\sum_{\mathbf{k},\sigma }\left[ \tilde{\epsilon}% _{c}(\mathbf{k})\beta _{\mathbf{k},\sigma }^{\dagger }\gamma _{\mathbf{k}% ,\sigma }+h.c.\right] . \end{eqnarray}% So the degenerate Fermi-points at the unfolded BZ diagonal are split by $% \tilde{\epsilon}_{c}(\mathbf{k})$ into two Fermi-points, whose corresponding quasi-particles are given by the bonding and anti-bonding states of the two layers. The split Fermi points smoothly join the Fermi sheets far away from the unfolded BZ diagonal, where $\tilde{\epsilon}_{c}(\mathbf{k})$ amounts only up to second order perturbation corrections (Fig.\ref{nodes}c). Next let's consider how the pairing matrix changes with the inter-layer tunneling. It is expected that $\eta =1$ to avoid the destructive interference along the BZ diagonal where two layers strongly hybridize. Therefore, the pairing condensates on the unfolded BZ diagonal were identical for hole pockets from both layers, guaranteed by the $S_{4}$ symmetry (Fig.\ref{nodes}c). The bonding of the two layers does not affect the pairing matrix along unfolded BZ diagonal, which maintains diagonal in the form of identity (see Supplementary Material for detail). As a result, the two reconstructed bands yield the outer and inner hole pockets and are decoupled in pairing sector to the leading order. The outer pocket inherits the total octet nodes (Fig.\ref{nodes}c), which still carry vorticity in the Nambu space and are protected by topology. On the inner pocket the pairing gap is nodeless. It should be made clear that our outer pocket corresponds to the "middle pocket" termed in experimental report\cite{OctetOkazaki2012}, because the $d_{xy}$ orbital has been neglected in our minimal model. In this picture, we have seen how the octet nodes come out naturally as observed in the laser ARPES\cite{OctetOkazaki2012}, and we can understand why every two of the octet nodes are located so close to the unfolded BZ diagonal in experiment, because they are essentially born of the $d$-wave representation of $C_{4}^{p}$ albeit distorted by the weak $C_{4}^{p}$% -breaking term. Therefore, the so-called "octet-noded monster" is neither accidental nor some crazy Cooper pair of angular momentum as high as $g$% -wave, but the combination of two distorted $d$-wave related by the $S_{4}$ symmetry. In short, the origin of nodes can be attributed to a symbolic equation "$8=4+4$". The nodes share the same fate with the FS structure that protests against strong breaking of $C_{4}^{p}$ symmetry. Therefore, we settle the disagreement between $d$-wave gap structure and the observation of octet nodes on one of the hole pockets. All in all, the key feature lies in the multi-orbital character. \section{Discussion} Inspired by this organizing principle governed by $C_{4}^{p}$ and $S_{4}$ symmetries, we can gain some insight into the electronic structure and pairing symmetry of iron-selenide (FeSe). While the $d$-wave representation $% C_{4}^{p}$ of plaquette-centered rotation symmetry stabilizes the FS structure of iron-pnictides, the $s$-wave representation $\tilde{C}_{4}^{p}$ captures the key feature of FSs in FeSe as shown in Fig.\ref{FeSe}a, where the NN $s$-wave hopping dominates. In Fig.\ref{FeSe}b, it can be shown that, when the $d$-wave NN hopping is completely replaced by the $s$-wave hoping followed by a particle-hole transform, we can obtain the FS with a robust electron pocket around $X$ point without hole pocket around $\Gamma $ point, which is characteristic of FeSe\cite{ZXShenFeSe2016}. In this case, the electron pocket and its central double Dirac point are protected by the TR symmetry together with the $s$-wave representation of the plaquette-centered rotation symmetry $\tilde{C}_{4}^{p}\equiv \tau _{31}$. Thus, the band structure of FeSe is related to that of iron-pnictides by a gauge transform combined with a particle-hole transform. \begin{figure}[h] \includegraphics[width=7.8cm]{C4pKFe2As2_fig5_FeSe.pdf} \caption{(a) Gauge choice characteristic of FeSe, followed by a particle-hole transform. (b) Band dispersion typical of iron-chalcogenides, where the electron pocket around $(\protect\pi ,0)$ is robust while hole pocket around (0,0) is dispensable. The parameters for the demonstration are chosen to be $t_{1d}=0$, $t_{1s}=0.45$, $t_{2s}=0.5$ in unit of $t_{2d}=1$. } \label{FeSe} \end{figure} When the pairing symmetry is considered, we can just focus on the monolayer FeSe with only electron Fermi pockets around $X$ point\cite{ZXShenFeSe2016}. Parallel to the above discussion for $\text{KFe}_{2}\text{As}_{2}$, there are two possible pairing symmetries for the monolayer FeSe: one is the $% s_{x^{2}y^{2}}$-wave Cooper pair glued by the dominant NNN AF coupling $% J_{2} $ and the other one is the effective $s_{x^{2}+y^{2}}\times d_{x^{2}-y^{2}}$-wave Cooper pair on the electron pockets around the $X$ point for a relatively large NN AF coupling $J_{1}$. Although the inter-orbital Cooper pairs glued by $J_{1}$ has $d_{x^{2}-y^{2}}$-wave symmetry, whose nodal line avoids the FS to maximize the energy gain, the projection of the inter-orbital Cooper pairs onto the FS yields an additional $s_{x^{2}+y^{2}}$ form factor inherited from the electronic structure. However, when $J_{2}$ overwhelms $J_{1}$, the pairing symmetry is the $s_{x^{2}y^{2}}$-wave. Without more interactions, the two layers tolerating weak inter-layer tunneling tend to lock their respective phases of Cooper pairs to be identical, otherwise there would be destructive interference. This supports the plain s-wave pairing symmetry as observed by the STM measurement\cite{DLFengPlainS}. But when $J_{1}$ dominates over $% J_{2}$, the effective $s_{x^{2}+y^{2}}\times d_{x^{2}-y^{2}}$-wave pairing condensate would show a gap minimum near the folded BZ boundary and a gap maximum along the unfolded BZ boundary, which seems to concur with the superconducting gap anisotropy measured by ARPES\cite{ZXShenFeSe2016}.
\section{Introduction} Let $G = (V(G),E(G))$ be a simple graph, and let $c:V(G) \to \{1,2,3\ldots\}$ be a coloring of the vertices of $G$. A \emph{proper coloring} of $G$ is a coloring so that no edge of $G$ is monochromatic. When $q$ colors are used (i.e. $c:V(G) \to \{1,\ldots,q\}$) we will often refer to a proper coloring as a \emph{proper $q$-coloring}. Other types of vertex colorings have recently been investigated. One such variation places the allowable colors as the vertices in a graph $H$ and joins two vertices of $H$ with an edge if those colors can appear across an edge in $G$. For a given $H$, an \emph{$H$-coloring of $G$}, or \emph{graph homomorphism from $G$ to $H$}, is a coloring of $G$ using the scheme from the graph $H$; more precisely, an $H$-coloring of $G$ is a function $f: V(G) \to V(H)$ so that if $v,w \in V(G)$ with $vw \in E(G)$, then $f(v)f(w) \in E(H)$. Notice that when $H=K_q$, the complete graph on $q$ vertices, an $H$-coloring of $G$ corresponds to a proper $q$-coloring of $G$. When $H$ is an edge with one looped endvertex, an $H$-coloring of $G$ corresponds to an \emph{independent set}, or \emph{stable set}, in $G$. Finding an $H$-coloring of a graph $G$ can be difficult, and so much recent research has investigated a related extremal problem: \emph{Given a family of graphs $\calG$, which $G \in \calG$ has the largest (smallest, respectively) number of $H$-colorings?} An answer to this question produces bounds on the number of $H$-colorings for any graph in $\calG$, and also implies bounds on the probability that a random coloring of the vertices of $G \in \calG$ from the vertices of $H$ will be an $H$-coloring of $G$. Some families $\calG$ that have been considered include regular graphs, graphs with fixed minimum degree, and graphs with a fixed number of edges. For results and conjectures on the extremal $H$-coloring question in these families, we refer the reader to two surveys, \cite{Cutler} and \cite{Zhao}, and the numerous references therein. One specific family that will be applicable in this paper is the family of all $n$-vertex trees, which will be denoted by $\calT(n)$. Extremal independent set counts in trees were first studied in \cite{ProdingerTichy}, while extremal $H$-coloring counts in trees for all other $H$ have also been considered \cite{CsikvariLin,EngbersGalvin,Sidorenko}. In particular, for any $H$ the star is always the tree with the largest number of $H$-colorings, but interestingly the path is not always the tree with the smallest number of $H$-colorings. See \cite{CsikvariLin} for more details, and \cite{EngbersGalvin} for a class of $H$ such that the path is the tree with the smallest number of $H$-colorings. Note that every tree on $n$ vertices has the same number of proper $q$-colorings. We may view $H$-colorings as placing a restriction on the colors that can appear across an edge in $G$. Other vertex coloring schemes have also recently been considered, arising from generalizing proper $q$-colorings by using color restrictions on other subsets of $V(G)$ (and not exclusively on pairs of vertices in $E(G)$). Two natural subsets of vertices to use for color restrictions are $N(v)$ and $N[v]$, which are the neighborhood and closed neighborhood, respectively, of a vertex $v \in V(G)$. The extremal question then becomes the following: \emph{Given a family of graphs $\calG$ and a set of color restrictions, which $G \in \calG$ has the largest (smallest, respectively) number of colorings?} Extremal results for colorings of regular graphs with restricted lists on $N(v)$ and $N[v]$ appear in \cite{CutlerRadcliffe}. In this paper, we will focus on this extremal question for a number of types of colorings in the family of $n$-vertex trees $\calT(n)$. Let $P_n$ and $S_n$ in $\calT(n)$ denote the path and star on $n$ vertices, respectively. \section{Definitions and Statements of Results}\label{sec-thms} In this section we define various types of colorings and state the corresponding extremal results for those colorings, and in Section \ref{sec-proofs} we provide the proofs of these extremal results. We start with the notion of a conflict-free coloring. \begin{definition} A \emph{conflict-free coloring} of a graph $G$ with $q$ colors is a function $c:V(G) \to \{1,\ldots,q\}$ such that for every $v \in V(G)$ there is a color occurring exactly once in $N[v]$. The number of conflict-free colorings of $G$ with $q$ colors is denoted $\chi_{cf}(G;q)$. \end{definition} This definition of conflict-free colorings of a graph is a special case of conflict-free colorings of a hypergraph, which was introduced in \cite{NP,SmorThesis}. Considering conflict-free colorings with restrictions on paths instead of closed neighborhoods was studied in \cite{CheilarisToth}. Finding the minimum number of colors needed to admit a conflict-free coloring, even for disks in the plane, is NP-complete \cite{NP}. One application of conflict-free colorings occurs in frequency assignments for cellular networks. Here, the vertices represent base stations and the colors represent frequencies assigned to the base stations. For a client to receive a signal from a base station, they must tune to the signal from some (nearby) base station, and they require that signal to come from only one station in order to avoid signal interference. By representing spatially close base stations via edge adjacency, this frequency assignment problem is modeled by a conflict-free coloring of the associated graph. For a survey of conflict-free colorings and its applications, see \cite{Smor}. We determine the trees with the extremal number of conflict-free colorings. \begin{theorem}\label{thm-conffree} Let $q \geq 2$ and $T \in \calT(n)$. Then \[ \chi_{cf}(S_n;q) \leq \chi_{cf}(T;q) \leq \chi_{cf}(P_n;q). \] Equality occurs in the upper bound if and only if $T=P_n$. When $q>2$, equality occurs in the lower bound if and only if $T=S_n$. When $q=2$, equality occurs in the lower bound if and only if $T$ does not contain a non-trivial subtree $T'$ with the property that each vertex in $T'$ has exactly one neighbor outside of $T'$. \end{theorem} We next define two colorings that are related to conflict-free colorings. \begin{definition} An \emph{odd coloring} of a graph $G$ with $q$ colors is a function $c:V(G) \to \{1,\ldots,q\}$ such that for each $v \in V(G)$ there is a color occurring an odd number of times in $N[v]$. The number of odd colorings of $G$ with $q$ colors is denoted $\chi_{odd}(G;q)$. \end{definition} \begin{definition} A \emph{star rainbow coloring} of a graph $G$ with $q$ colors is a function $c:V(G) \to \{1,\ldots,q\}$ such that for each $v \in V(G)$ no color occurs more than once in $N[v]$. The number of star rainbow colorings of $G$ with $q$ colors is denoted $\chi_{sr}(G;q)$. \end{definition} Odd colorings were first introduced in \cite{CKP}. It is clear that every star rainbow coloring of $G$ is a conflict-free coloring of $G$, and every conflict-free coloring of $G$ is an odd coloring of $G$. We determine the trees with the extremal number of odd and star rainbow colorings. \begin{theorem}\label{thm-odd} Let $q \geq 2$ and $T \in \mathcal{T}(n)$. Then \[ \chi_{odd}(S_n;q) \leq \chi_{odd}(T;q) \leq \chi_{odd}(P_n;q). \] Equality occurs in the upper bound if and only if $T=P_n$. When $q>2$, equality occurs in the lower bound if and only if $T=S_n$. When $q=2$, equality occurs in the lower bound if and only if $T$ contains at most one vertex of even degree. \end{theorem} \begin{theorem}\label{thm-rainbowcols} Let $q \geq 2$ and $T \in \calT(n)$. Then \[ \chi_{sr}(S_n;q) \leq \chi_{sr}(T;q) \leq \chi_{sr}(P_n;q). \] Equality occurs in the lower bound if and only if $T=S_n$ and in the upper bound if and only if $T=P_n$. \end{theorem} Next we define a non-monochromatic coloring, and give the corresponding extremal result for trees. \begin{definition} A \emph{non-monochromatic coloring} of a graph $G$ with $q$ colors is a function $c:V(G) \to \{1,\ldots,q\}$ such that for each $v \in V(G)$ there are at least two colors occurring in $N[v]$. The number of non-monochromatic colorings of $G$ with $q$ colors is denoted $\chi_{nm}(G;q)$. \end{definition} \begin{theorem}\label{thm-nm} Let $q \geq 2$ and $T \in \calT(n)$. Then \[ \chi_{nm}(S_n;q) \leq \chi_{nm}(T;q) \leq \chi_{nm}(P_n;q). \] Equality occurs in the lower bound if and only if $T=S_n$ and in the upper bound if and only if $T=P_n$. \end{theorem} As these results show, the extremal trees are often $P_n$ or $S_n$. It is tempting to conjecture that any color restriction on $N[v]$ will cause $P_n$ to maximize the number of colorings among all trees; in other words, that a maximizing graph is independent of the color restriction on $N[v]$. The corresponding statement in the family of regular graphs is in fact true: the regular graph that maximizes the number of colorings given by a restriction on the colors on $N[v]$ or on $N(v)$ is independent of the coloring lists \cite[Theorem 9]{CutlerRadcliffe}. The situation for trees, however, is different. We next present a related coloring scheme where the maximizing graph for the number of these colorings is not $P_n$ or $S_n$. \begin{definition} A \emph{2-strong-conflict-free coloring} of a graph $G$ with $q$ colors is a function $c:V(G) \to \{1,\ldots,q\}$ such that for each $v \in V(G)$ there are at least two colors that occur exactly once in $N[v]$. The number of 2-strong-conflict-free colorings of $G$ with $q$ colors is denoted $\chi_{2scf}(G;q)$. \end{definition} The $2$-strong-conflict-free colorings (in fact, $k$-strong-conflict-free colorings) were originally studied in \cite{Abel} under the name $k$-conflict-free colorings; see also \cite{Smor}. For $2$-strong-conflict-free colorings we have the following lower bound. \begin{theorem}\label{thm-2scf} Let $q \geq 3$ and $T \in \calT(n)$. Then \[ \chi_{2scf}(P_n;q) \leq \chi_{2scf}(T;q). \] Equality occurs if and only if $T=P_n$. \end{theorem} Furthermore, for 2-strong-conflict-free colorings neither the path nor the star is the maximizer. Take $n=6$ and $q=3$. Then it is easy to see that $\chi_{2scf}(P_6;3) = 6$ and $\chi_{2scf}(S_6;3) = 3\cdot 5 \cdot 2 = 30$ (all colorings of $S_6$ are obtained by coloring the center of $S_6$ with one color, exactly one leaf with a second color, and the remaining leaves with the third color). But now consider the tree $T$ which is a balanced double star, i.e., it has two adjacent vertices $v_1$ and $v_2$ (the centers of the double star), each with two leaves. There are $6$ ways to have distinct colors on $v_1$ and $v_2$, and $3$ ways to color each pair of leaves, noting that a leaf must have a different color from its neighbor. There are $3$ ways to have the same color on $v_1$ and $v_2$, and $2$ ways to color each pair of leaves in this situation. Therefore $\chi_{2scf}(T;3) = 6 \cdot 3 \cdot 3 + 3 \cdot 2 \cdot 2 = 66$. For general $n$, it is not clear what the maximizing tree is in this case. These results show that the extremal graphs in $\calT(n)$ are not independent of the list restrictions, unlike the results for regular graphs. Note that in regular graphs all neighborhoods (closed neighborhoods, respectively) have the same size, whereas the size of a neighborhood (closed neighborhood, respectively) in a tree can vary significantly from vertex to vertex. We also consider colorings where the color classes induce a forest of stars. Here the color restrictions are on paths in the tree. \begin{definition} A \emph{star coloring} of a graph $G$ with $q$ colors is a function $c:V(G) \to \{1,\ldots,q\}$ such that (1) $v_1v_2 \in E(G)$ implies $c(v_1)\neq c(v_2)$, and (2) for each (not necessarily induced) $P_4$ in $G$, $c|_{P_4}$ maps onto at least three colors. The number of star colorings of $G$ with $q$ colors is denoted $\chi_{s}(G;q)$. \end{definition} Star colorings were first introduced by Gr\"unbaum in \cite{Grunbaum}, and \cite{FRR} contains results on the star chromatic number of various families of graphs. We determine the trees with the extremal number of star colorings. \begin{theorem}\label{thm-starcols} Let $q \geq 3$ and $T \in \calT(n)$. Then \[ \chi_s(P_n;q) \leq \chi_s(T;q) \leq \chi_s(S_n;q). \] Equality occurs in the lower bound if and only if $T=P_n$ and in the upper bound if and only if $T=S_n$. \end{theorem} We remark that the path \emph{minimizes} and the star \emph{maximizes} the number of star colorings in $\calT(n)$, which differs from the corresponding extremal results for conflict-free, odd, star rainbow, and non-monochromatic colorings. Our techniques also allow us to extend a result from \cite{CutlerRadcliffe} for $q=2$ colors to arbitrary $q$. In that paper, the concept of an existence homomorphism is introduced and investigated. \begin{definition}[\cite{CutlerRadcliffe}] Suppose that $G$ and $H$ are graphs with $H$ possibly having loops. We say that a map $\phi:V(G) \to V(H)$ is an \emph{existence homomorphism} if, for every $v \in V(G)$, there exists a $w \in N(v)$ such that $\phi(v)\phi(w) \in E(H)$. We let $\text{xhom}(G,H)$ be the number of existence homomorphisms from $G$ to $H$. \end{definition} In \cite{CutlerRadcliffe} the authors consider $H= E_q^\circ$, the completely looped graph on $q$ isolated vertices, and in this case an existence homomorphism from a graph $G$ to $E_q^\circ$ is a coloring of the vertices of $G$ with $q$ colors so that each color class has no isolated vertices (note that a color class may be empty). They show the following. \begin{theorem}[Cutler-Radcliffe \cite{CutlerRadcliffe}]\label{thm-CR} If $T$ is a tree on $n$ vertices, then \[ \xhom(T,E_2^\circ) \leq \xhom(P_n,E_2^\circ), \] with equality if and only if $T = P_n$. \end{theorem} We generalize Theorem \ref{thm-CR} to $q>2$ colors and also find the minimizing tree. \begin{theorem}\label{thm-xhom} Let $q \geq 2$ and $T \in \calT(n)$. Then \[ \xhom(S_n,E_q^\circ) \leq \xhom(T,E_q^\circ) \leq \xhom(P_n,E_q^\circ). \] Equality occurs in the lower bound if an only if $T=S_n$ and in the upper bound if and only if $T=P_n$. \end{theorem} It would be interesting to investigate the maximum and minimum number of these colorings for various other families of graphs, including regular graphs (see \cite[Proposition 18]{CutlerRadcliffe} for maximizing $\xhom(G,E_2^\circ)$ over all $2$-regular graphs), graphs with a fixed minimum degree, and graphs with a fixed number of edges. \section{Proofs}\label{sec-proofs} In this section, we present the proofs of the theorems stated in Section \ref{sec-thms}. \subsection{Odd colorings --- Proof of Theorem \ref{thm-odd}} First, we prove the extremal result for odd colorings. Recall that an odd coloring is a vertex coloring where for every vertex $v$ there is a color occurring an odd number of times in $N[v]$. \begin{proof}[Proof of Theorem \ref{thm-odd}] Let $T \in \calT(n)$. Notice that if $v \in T$ is a vertex such that $d(v)$ is even, then by parity considerations some color will appear an odd number of times on $N[v]$. Also note that if $v$ is an uncolored leaf whose neighbor is colored, then there are at most $q-1$ ways to extend the odd coloring to $v$ (by considering only the restrictions on the leaf $v$). So by coloring all non-leaves first, we see that if $T$ has $k$ leaves then $\chi_{odd}(T;q) \leq q^{n-k}(q-1)^k$. Since $P_n$ is the unique tree with at most two leaves and in $P_n$ every non-leaf has even degree, the above observations show that $P_n$ is the unique tree maximizing the number of odd colorings, and $\chi_{odd}(P_n;q) = q^{n-2}(q-1)^2$. Since every tree $T$ has $q(q-1)^{n-1}$ proper colorings and every proper coloring is an odd coloring, we have $\chi_{odd}(T;q) \geq q(q-1)^{n-1}$. As $S_n$ has $n-1$ leaves, it also has at most $q(q-1)^{n-1}$ odd colorings, and so $\chi_{odd}(S_n;q) = q(q-1)^{n-1}$. The remainder of the proof characterizes the trees that minimize the number of odd colorings. To do so, we characterize the trees $T$ admitting an odd coloring which is not proper. Suppose there is a path $P_4$ in $T$. When $q>2$, we color the middle two vertices with color $1$ and the outer two vertices with color $2$. Then we color each neighbor of these four vertices with color $3$. From here, we iteratively complete the coloring by coloring an uncolored vertex $v$ that has a neighbor $w$ that is colored by assigning a color for $v$ that is distinct from the color on $w$. Note that the set of colored vertices is always connected and so each uncolored vertex has at most one colored neighbor. By construction, the vertices on the path $P_4$ all have color $2$ appearing once on their closed neighborhood, and any vertex $v$ not on the path $P_4$ has the color on $v$ appearing once on $N[v]$. Since this produces an odd coloring which is not proper, when $q>2$ the only tree that minimizes the number of odd colorings is the star. Finally, assume that $q=2$. We show that there is an odd coloring of $T$ which is not proper if and only if $T$ has at least two vertices of even degree. Suppose first that $T$ has two vertices of even degree, and let $v$ and $w$ denote a pair of distinct vertices with even degree that has the minimum positive distance between them. This implies that each vertex on the path between $v$ and $w$ has odd degree. We color the vertices of this path with color $1$, and then iteratively properly color the rest of $T$. If $v'$ is not on the path, then the color on $v'$ is distinct from all neighbors of $v'$ and so appears once on $N[v']$. Since $v$ and $w$ have even degree, by parity considerations they have a color appearing an odd number of times on their closed neighborhoods. Finally, any other vertices on the path between $v$ and $w$ have exactly three vertices in their closed neighborhood with color $1$. This exhibits an odd coloring of $T$ which is not proper. Now suppose that there is at most one even degree vertex in $T$, and suppose that there is a non-proper odd coloring of $T$. Consider a maximal length monochromatic path in a non-proper coloring of $T$. One of the endpoints of this monochromatic path, say $v$, must have $d(v)$ odd, and by maximality $v$ has exactly two vertices receiving one color in $N[v]$. But as the number of vertices in $N[v]$ is even it follows that $v$ has an even number of vertices colored with the other color, which contradicts the definition of odd coloring at vertex $v$. Therefore there is no odd coloring which is not proper in a tree with at most one even degree vertex. \end{proof} \subsection{Conflict-free and non-monochromatic colorings --- Proofs of Theorems \ref{thm-conffree} and \ref{thm-nm}} We now prove the extremal results for conflict-free and non-monochromatic colorings. Recall first that a conflict-free coloring is a vertex coloring where for every vertex $v$ there is a color occurring exactly once in $N[v]$. \begin{proof}[Proof of Theorem \ref{thm-conffree}] Let $T \in \calT(n)$. For minimizing, notice that every proper coloring of $T$ is a conflict-free coloring of $T$, and every conflict-free coloring of $T$ is an odd coloring of $T$. All odd colorings of $S_n$ are proper, and so all conflict-free colorings of the star are proper. Furthermore, the proof of Theorem \ref{thm-odd} shows that any tree with a $P_4$ has a non-proper conflict-free coloring when $q>2$. For $q=2$, we show that a tree $T$ has only proper conflict-free colorings if and only if $T$ does not contain a non-trivial subtree $T'$ with the property that each vertex in $T'$ has exactly one neighbor outside $T'$. Suppose that a tree $T$ has a non-proper conflict-free coloring, and consider a color class containing a non-trivial component. Notice that every vertex in that non-trivial component must have exactly one neighbor outside the component (which necessarily is colored with the other color). Conversely, if a tree $T$ has a non-trivial subtree $T'$ in which each vertex in $T'$ has exactly one neighbor outside $T'$, then we can color $T'$ with color $1$ and iteratively properly color the rest of the tree to produce a non-proper conflict-free coloring of $T$. We now turn to the maximization question. First, notice that $\chi_{cf}(P_1;q) = q$, $\chi_{cf}(P_2;q) = q(q-1)$, and $\chi_{cf}(P_3;q) = q(q-1)^2$. For $P_n$ with $n \geq 4$ we denote the vertices as $v_1,v_2,\ldots,v_n$, and we enumerate the conflict-free colorings of $P_n$ by conditioning on whether or not $v_2$ and $v_3$ have the same color. If they don't, then deleting $v_1$ leaves a conflict-free coloring on the remaining path. If they do, then deleting $v_1$ and $v_2$ leaves a conflict-free coloring of the remaining path, since in this case $v_3$ must have a different color from $v_4$. Since in either case the only restriction for the color on $v_1$ is that it must differ from the color on $v_2$, we have the recurrence \[ \chi_{cf}(P_n;q) = (q-1)\chi_{cf}(P_{n-1};q) + (q-1)\chi_{cf}(P_{n-2};q) \qquad (n \geq 4). \] Similarly, we can condition on whether or not $v_{\ell+1}$ and $v_{\ell+2}$ have the same color, and from there properly color $v_{1},\ldots,v_{\ell}$ (giving $q-1$ choices for a color on these $\ell$ vertices). If $\ell \geq 2$, notice that there is a non-proper conflict-free extension in which $v_{2}$ and $v_{3}$ have the same color (from the case where $v_{\ell+1}$ and $v_{\ell+2}$ have distinct colors). This implies that \begin{equation}\label{eqn-pathcf} \chi_{cf}(P_n;q) > (q-1)^\ell \chi_{cf}(P_{n-\ell};q) + (q-1)^{\ell} \chi^{cf}(P_{n-\ell-1};q) \qquad (\ell \geq 2). \end{equation} With these calculations in hand, we move to proving that $\chi_{cf}(T;q) \leq \chi_{cf}(P_n;q)$. Note by the characterization of uniqueness for minimizing the number of conflict-free colorings we have $\chi_{cf}(S_n;q) < \chi_{cf}(P_n;q)$ for $n \geq 4$ and $q \geq 2$. We induct on $n$ to show that the path $P_n$ is the unique tree maximizing the number of conflict-free colorings. The base cases $n \leq 3$ are trivial, so suppose that $n \geq 4$, $q \geq 2$, and $T_n \neq S_n$ is a tree on $n$ vertices. Find a maximum length path in $T_n$ and let $v$ be a penultimate vertex on this path. Denote the leaves adjacent to $v$ by $u_1,u_2,\ldots,u_\ell$ and let $w$ be the non-pendant neighbor of $v$ (here we use that $T_n \neq S_n$). Then partition the conflict-free colorings of $T_n$ based on whether $v$ and $w$ have the same color or not. If they don't, we delete $u_1$, $u_2$,$\ldots$, $u_\ell$, which results in a conflict-free coloring of the remaining tree. Since each $u_i$ must have a different color from the color on $v$, letting $T_{n-\ell}:=T_n - \{u_1,\ldots,u_\ell\}$ there are at most $(q-1)^\ell \chi_{cf}(T_{n-\ell};q)$ conflict-free colorings of $T_n$ where the colors on $v$ and $w$ are not the same. If the colors on $v$ and $w$ are the same, we delete $u_1$, $u_2,\ldots$, $u_\ell,$ and $v$, which results in a conflict-free coloring of the resulting tree $T_{n-\ell-1}:= T_n - \{v,u_1,\ldots,u_{\ell}\}$. In this case we know that $v$ and $w$ must have the same color, and each $u_i$ must have a color differing from $v$. This produces an upper bound of $(q-1)^\ell \chi_{cf}(T_{n-\ell-1};q)$ for the number of conflict-free colorings of $T_n$ where the colors on $v$ and $w$ are the same. Putting these together and using the inductive hypothesis along with (\ref{eqn-pathcf}), we have \begin{eqnarray*} \chi_{cf}(T_n;q) &\leq& (q-1)^\ell \chi_{cf}(T_{n-\ell};q) + (q-1)^\ell \chi_{cf}(T_{n-\ell-1};q)\\ &\leq& (q-1)^\ell \chi_{cf}(P_{n-\ell};q) + (q-1)^\ell \chi_{cf}(P_{n-\ell-1};q)\\ &\leq& \chi_{cf}(P_{n};q). \end{eqnarray*} Furthermore, the last inequality is an equality only when $\ell=1$ by (\ref{eqn-pathcf}). When $\ell=1$, we have strict inequality in moving from the first line to the second line unless deleting a leaf and deleting a leaf plus its neighbor from $T_n$ leaves $P_{n-1}$ and $P_{n-2}$, respectively, which implies that $T_n = P_n$. \end{proof} The proof for non-monochromatic colorings is similar to conflict-free colorings. Recall that a non-monochromatic coloring is a vertex coloring where for every vertex $v$ there are at least two colors occurring in $N[v]$. We remark that every proper coloring is a non-monochromatic coloring. \begin{proof}[Proof of Theorem \ref{thm-nm}] We describe the changes needed to the proof of Theorem \ref{thm-conffree}. Notice that again a leaf must receive a different color from its neighbor, and so the only non-monochromatic colorings of the star are proper colorings. For uniqueness, suppose that there exists a $P_4$ in a tree $T$. Coloring the two leaves of the path with color $2$ and the remaining two vertices with color $1$, and then iteratively properly coloring the rest of the tree, produces a non-proper coloring of $T$. For maximizing, in $P_n$ we again condition on whether or not $v_2$ and $v_3$ have the same color. If they don't, then we delete $v_1$; if they do, then we delete $v_1$ and $v_2$. This gives \[ \chi_{nm}(P_n;q) = (q-1)\chi_{nm}(P_{n-1};q) + (q-1)\chi_{nm}(P_{n-2};q) \qquad (n \geq 4). \] We also have $\chi_{nm}(P_1;q) = q$, $\chi_{nm}(P_2;q) = q(q-1)$, and $\chi_{nm}(P_3;q) = q(q-1)^2$. As before, for $\ell \geq 2$ we also can condition on $v_{\ell+1}$ and $v_{\ell+2}$ having the same color or not, giving \[ \chi_{nm}(P_n;q) > (q-1)^\ell\chi_{nm}(P_{n-\ell};q) + (q-1)^\ell\chi_{nm}(P_{n-\ell-1};q) \qquad (\ell \geq 2). \] We prove the result for trees $T \neq S_n$ by induction on $n$, with the base cases trivial. With the above bounds in place, the induction proceeds exactly as in the proof of Theorem \ref{thm-conffree}. \end{proof} \subsection{Star rainbow colorings --- Proof of Theorem \ref{thm-rainbowcols}} Here we prove the extremal results for star rainbow colorings. Recall that a star rainbow coloring is a vertex coloring where for every vertex $v$ all colors occur at most one time in $N[v]$. Notice that all star rainbow colorings are proper colorings and that every coloring that uses a distinct color for each vertex is a star rainbow coloring. \begin{proof}[Proof of Theorem \ref{thm-rainbowcols}] By considering the center of $S_n$, we see that each vertex in a star rainbow coloring of $S_n$ must have a different color. Therefore we have $\chi_{sr}(S_n;q)=q(q-1)\cdots(q-n+1)$, which is the minimum number for any $n$-vertex tree. Also, any tree containing a path $P_{4}$ admits a star rainbow coloring where the two ends of the $P_{4}$ have color $1$ and the remaining vertices have distinct colors. This shows that $S_n$ uniquely minimizes the number of star rainbow colorings. Notice that we can obtain the count of the number of star rainbow colorings of a tree $T$ by iteratively coloring $T$ starting with a leaf. To color a vertex $v$ (adjacent to a colored vertex $w$), the color on $v$ must avoid all of the distinct colors appearing on the neighbors of $N[w]$ that have already been colored. Using $T=P_n$, we see that $\chi_{sr}(P_n;q) = q(q-1)(q-2)^{n-2}$. If $T_n \neq P_n$, then $T_n$ has a vertex of degree at least three, and so by iteratively coloring from a leaf there is one vertex with at most $q-3$ color possibilities. This gives $\chi_{sr}(T_n;q) \leq q(q-1)(q-2)^{n-3}(q-3)$. Therefore the unique tree the the most number of star rainbow colorings is the path. \end{proof} Notice that the iterative coloring procedure in the proof of Theorem \ref{thm-rainbowcols} gives the number of star rainbow colorings for any tree. In particular, let $T_n$ be a tree with $n$ vertices, and let $v_1$ be a leaf of $T_n$. Let $v_2,v_3,...,v_n$ be iteratively chosen vertices so that the induced graph on $v_1,\ldots,v_i$ for each $i \in [2,n]$ forms a tree. Then the number of star rainbow colorings of $T_n$ is given by \[ \chi_{sr}(T_n;q) = q\cdot \prod_{i=2}^n \left(q - |\{k : k<i, j<i, v_i \sim v_j \sim v_k\}|-1\right). \] In words, when coloring vertex $v_i$, we must avoid the color on its unique neighbor $v_j$ that already has a color, and also any colors appearing on a vertex $v_k$ that is in the closed neighborhood of $v_j$. \subsection{2-Strong-Conflict-Free Colorings --- Proof of Theorem \ref{thm-2scf}} Here we prove the lower bound for 2-strong-conflict-free colorings of a tree. We first recall that a 2-strong-conflict-free coloring is a vertex coloring where for every vertex $v$ there are at least two colors that occur exactly once in $N[v]$. \begin{proof}[Proof of Theorem \ref{thm-2scf}] Note that $\chi_{2scf}(P_n;q) = q(q-1)(q-2)^{n-2}$, since the 2-strong-conflict-free colorings of $P_n$ are exactly the star rainbow colorings of $P_n$. Now let $T$ be an $n$-vertex tree, and root $T$ at a leaf. Color the root and its unique neighbor, and then iteratively color out so that each vertex receives a different color than the color on the two closest vertices on the path to the root. This produces a 2-strong-conflict-free coloring of $T$ and so $\chi_{2scf}(T;q) \geq q(q-1)(q-2)^{n-2}$. If $v$ is a vertex with degree at least three, then one of the two neighbors of $v$ that is not closest to the root can receive the same color as the neighbor of $v$ closest to the root. Therefore if $T \neq P_n$ then $\chi_{2scf}(T;q)>q(q-1)(q-2)^{n-2}=\chi_{2scf}(P_n;q)$. \end{proof} \subsection{Star colorings --- Proof of Theorem \ref{thm-starcols}} Here we prove the extremal result for star colorings. Recall that a star coloring is a vertex coloring that is proper and has no 2-colored path $P_4$. \begin{proof}[Proof of Theorem \ref{thm-starcols}] Star colorings are proper colorings with color restrictions on all $P_4$ subgraphs. Since $S_n$ is the unique tree that has no $P_4$ subgraph, all proper colorings of $S_n$ are star colorings, and every other tree admits a proper coloring that is not a star coloring. In particular, $S_n$ uniquely maximizes the number of star colorings. We now turn to minimizing the number of star colorings. As in the proof of Theorem \ref{thm-conffree}, we first find a recursion for the number of star colorings of paths, and to start we have $\chi_s(P_1;q)=q$, $\chi_s(P_2;q)=q(q-1)$, and $\chi_s(P_3;q)=q(q-1)^2$. For $n\geq 4$ suppose the path $P_n$ has vertices $v_1,v_2,\ldots,v_n$, and we partition the star colorings of $P_n$ based on whether $v_1$ and $v_3$ have the same color or not. If they do, then $v_2$ and $v_4$ must have different colors, and those colors must also differ from the color on $v_3$. Deleting $v_1$ and $v_2$ produces a star coloring of $P_{n-2}$, and furthermore any star coloring of this $P_{n-2}$ extends to $q-2$ star colorings of $P_n$ of this type. If $v_1$ and $v_3$ have different colors, then we delete $v_1$ and are left with a star coloring of $P_{n-1}$. But any star coloring of $P_{n-1}$ extends to $q-2$ star colorings of $P_n$ of this type, as $v_2$ and $v_3$ have different colors so we can color $v_1$ with any color that differs from those on $v_2$ and $v_3$. Putting this together, we have \[ \chi_{s}(P_n;q) = (q-2)\chi_{s}(P_{n-1};q) + (q-2)\chi_{s}(P_{n-2};q) \qquad (n \geq 4). \] We now show that $\chi_{s}(P_n;q) \leq \chi_{s}(T;q)$. We induct on $n$ to show that the path $P_n$ is the unique tree minimizing the number of star colorings. The base cases $n \leq 3$ are trivial, so suppose that $n \geq 4$, $q \geq 2$, and $T_n$ is a tree on $n$ vertices. By the uniqueness of the upper bound we have $\chi_s(S_n;q) > \chi_{s}(P_n;q)$, so we may assume $T_n \neq S_n$. Let $v$ be a vertex with at most one non-pendant neighbor (take, for example, $v$ to be a penultimate vertex in a maximal path). We let distinct vertices $u$, $w$, and $x$ be such that $u$ is a leaf and $u \sim v \sim w \sim x$, and partition the star colorings of $T_n$ based on the colors on $u$ and $w$. If the colors on $u$ and $w$ are different, we delete $u$. This gives a star coloring of $T_{n-1} := T_n - u$. But all star colorings of $T_n$ of this type come from a star coloring of $T_{n-1}$ by giving $u$ a different color from $v$ and $w$, so there are exactly $(q-2)\chi_s(T_{n-1};q)$ colorings of $T_n$ where the colors on $u$ and $w$ are distinct. If the colors on $u$ and $w$ are the same, we delete $v$ and the $\ell$ pendant neighbors of $v$ (including $u$). We recover all star colorings of $T_n$ of this type from a star coloring of the remaining tree $T_{n-\ell-1}$ by giving $v$ a color different from the colors on $w$ and $x$, $u$ the color on $w$, and all other pendants a color that differs from $v$. Therefore there are exactly $(q-2)(q-1)^{\ell-1}\chi_s(T_{n-\ell-1};q)$ colorings of $T_n$ where the colors on $u$ and $w$ are the same. The preceding arguments show \[ \chi_s(T_n;q) = (q-2)\chi_s(T_{n-1};q) + (q-2)(q-1)^{\ell-1}\chi_s(T_{n-\ell-1};q). \] Now any star coloring of $P_{n-2}$ (with vertices $v_1,\ldots,v_{n-2}$) is obtained by starting with a star coloring of $P_{n-\ell-1}$ (vertices $v_1,\ldots,v_{n-\ell-1}$), and iteratively coloring the remaining vertices as a star coloring. Since a star coloring is a proper coloring, this implies that there are at most $q-1$ choices for a color on each of $v_{n-\ell},\ldots,v_{n-2}$, which gives $(q-1)^{\ell-1} \chi_s(P_{n-\ell-1};q) \geq \chi_s(P_{n-2};q)$. Therefore, we see that \begin{eqnarray*} \chi_s(T_n;q) &=& (q-2)\chi_s(T_{n-1};q) + (q-2)(q-1)^{\ell-1}\chi_s(T_{n-\ell-1};q)\\ &\geq& (q-2)\chi_s(T_{n-1};q)+(q-2)(q-1)^{\ell-1}\chi_s(P_{n-\ell-1};q)\\ &\geq& (q-2)\chi_{s}(P_{n-1};q) + (q-2)\chi_{s}(P_{n-2};q)\\ &=&\chi_s(P_n;q). \end{eqnarray*} This proves the inequality, and so we move now to the characterization of equality. We first argue that to have equality requires $\ell=1$, which will follow from showing that $(q-1)^{\ell-1}\chi_s(P_{n-\ell-1};q)>\chi_s(P_{n-2};q)$ for $\ell>1$. Given a star coloring of $v_1,\ldots,v_{n-\ell-1}$, we use an iterative proper coloring of $v_{n-\ell},\ldots,v_{n-2}$ for the non-strict inequality. But if $\ell>1$, one such coloring will have the same colors on $v_{n-\ell-1}$ and $v_{n-\ell-3}$ and will choose a color on $v_{n-\ell}$ that appears on $v_{n-\ell-2}$. This creates a 2-colored $P_4$ in $P_{n-2}$, and so is a proper coloring extension that is not a star coloring of $P_{n-2}$. Therefore $(q-1)^{\ell-1}\chi_s(P_{n-\ell-1};q)>\chi_s(P_{n-2};q)$ for $\ell>1$. Finally, if $\ell=1$, then by induction we have equality only when $T_{n-1}$ and $T_{n-2}$ are $P_{n-1}$ and $P_{n-2}$. respectively, which implies that $T_n=P_n$. \end{proof} \subsection{Existence Homomorphisms --- Proof of Theorem \ref{thm-xhom}} Here we prove the results about existence homomorphisms to $E_q^\circ$. Recall that an existence homomorphism from $T$ to $E_{q}^\circ$ is a vertex coloring of $T$ so that no color class contains an isolated vertex. \begin{proof}[Proof of Theorem \ref{thm-xhom}] For minimizing, notice that each tree can be monochromatically colored. For $S_n$, these are the only possible colorings, since a leaf must have the same color as its neighbor. And if a tree $T$ has a path $P_4$, then coloring one leaf and its neighbor $v$ with color $1$ and the other leaf and its neighbor $w$ with color $2$, and monochromatically coloring the vertices in each component of $T-vw$, we see that every $T \neq S_n$ has an existence homomorphism to $E_q^\circ$ (with $q \geq 2$) that is not a monochromatic coloring of $T$. For maximizing, we again begin by giving a recursive definition for $\xhom(P_n,E_q^\circ)$. As a leaf must have the same color as its neighbor, we have that $\xhom(P_2,E_q^\circ) = q$ and $\xhom(P_3,E_q^\circ) = q$. Let $P_n$ have vertices $v_1,v_2,\ldots,v_n$, and consider an existence homomorphism from $P_n$ to $E_{q}^\circ$. If the colors on $v_2$ and $v_3$ are the same, then this color must also be the color on $v_1$, and we delete $v_1$ and obtain an existence homomorphism from the remaining path to $E_{q}^\circ$. If the colors on $v_2$ and $v_3$ differ, then we delete $v_1$ and $v_2$ to obtain an existence homomorphism from the remaining path to $E_q^\circ$. Since in this latter case the color on $v_1$ and $v_2$ has $(q-1)$ possibilities, this gives the recurrence \[ \xhom(P_n,E_q^\circ) = \xhom(P_{n-1},E_q^\circ) +(q-1)\xhom(P_{n-2},E_q^\circ) \qquad (n \geq 4). \] Given $\ell$ with $2 \leq \ell \leq n-3$ we can condition on whether or not $v_{\ell+1}$ and $v_{\ell+2}$ have the same color. By monochromatically coloring $v_1,\ldots,v_\ell$, we see that \begin{equation}\label{eq-xhom} \xhom(P_n,E_q^\circ) > \xhom(P_{n-\ell},E_q^\circ)+(q-1)\xhom(P_{n-\ell-1},E_q^\circ), \end{equation} with strict inequality coming from a coloring of $P_n$ in which $v_2$ and $v_3$ have distinct colors (in the case where $v_{\ell+1}$ and $v_{\ell+2}$ have the same color). Now we induct on $n$ to show that $P_n$ is the unique $n$-vertex tree $T_n$ maximizing $\xhom(T_n,E_q^\circ)$. Notice that by the minimizing result, we may assume that $T_n \neq S_n$ as $\xhom(S_n,E_q^\circ) = q < \xhom(P_n,E_q^\circ)$ for $n \geq 4$. Consider a maximum length path in $T_n$ and let $v$ be a penultimate vertex on this path. Denote the leaves adjacent to $v$ by $u_1,\ldots,u_\ell$ (so that $\ell \leq n-3$) and let $w$ be a non-pendant neighbor of $v$. Then we enumerate the existence homomorphisms to $E_q^\circ$ based on whether or not $v$ and $w$ have the same color. Note that the color on $u_1,\ldots,u_{\ell}$ must be the same as the color on $v$. If $v$ and $w$ have the same color, delete $u_1,\ldots,u_\ell$ and obtain a tree $T_{n-\ell}$ that has an existence homomorphism to $E_{q}^\circ$. Each existence homomorphism of $T_{n-\ell}$ comes from one existence homomorphism of $T_{n}$ of this type and vice versa, and so there are $\xhom(T_{n-\ell},E_{q}^{\circ})$ existence homomorphisms of $T_n$ so that $v$ and $w$ have the same color. When $v$ and $w$ do not have the same color, we delete $u_1,\ldots,u_\ell$ and $v$. This produces a tree $T_{n-\ell-1}$ that has an existence homomorphism to $E_q^\circ$. Since the color of the deleted vertices must differ from the color on $w$, there are $(q-1)\xhom(T_{n-\ell-1},E_q^\circ)$ existence homomorphisms from $T_n$ to $E_q^\circ$ where $v$ and $w$ do not have the same color. By the remarks above, induction, and (\ref{eq-xhom}) we have \begin{eqnarray*} \xhom(T_n,E_q^\circ) &=& \xhom(T_{n-\ell},E_q^\circ) + (q-1)\xhom(T_{n-\ell},E_q^\circ)\\ &\leq& \xhom(P_{n-\ell},E_q^\circ) + (q-1)\xhom(P_{n-\ell-1},E_q^\circ)\\ &\leq& \xhom(P_n,E_q^\circ). \end{eqnarray*} For equality, by (\ref{eq-xhom}) we have $\ell=1$. Given this, by induction we have $T_{n-1}=P_{n-1}$ and $T_{n-2} = P_{n-2}$, which implies that $T_n=P_n$. \end{proof}
\section*{Introduction}\label{s-intro} \baselineskip18pt A~group $G$ is called an \emph{Engel group} if for every $x,g\in G$ the equation $[x,g,g,\dots , g]=1$ holds, where $g$ is repeated in the commutator sufficiently many times depending on $x$ and $g$. (Throughout the paper, we use the left-normed simple commutator notation $[a_1,a_2,a_3,\dots ,a_r]=[...[[a_1,a_2],a_3],\dots ,a_r]$.) Of course, any locally nilpotent group is an Engel group. In some classes of groups the converse is also known to be true. For example, a finite Engel group is nilpotent by Zorn's theorem \cite{zorn}. Wilson and Zelmanov~\cite{wi-ze} proved that profinite Engel groups are locally nilpotent, and Medvedev~\cite{med} extended this result to compact (Hausdorff) groups. As a next step, it is natural to consider groups that are `almost Engel' in the sense of restrictions on so-called Engel sinks. An Engel sink of an element $g\in G$ is a set ${\mathscr E}(g)$ such that for every $x\in G$ all sufficiently long commutators $[x,g,g,\dots ,g]$ belong to ${\mathscr E}(g)$, that is, for every $x\in G$ there is a positive integer $n(x,g)$ such that $$[x,\underbrace{g,g,\dots ,g}_n]\in {\mathscr E}(g)\qquad \text{for all }n\geq n(x,g). $$ Engel groups are precisely the groups for which we can choose ${\mathscr E}(g)=\{ 1\}$ for all $g\in G$. In \cite{khu-shu162} we considered finite, profinite, and compact groups in which every element has a finite Engel sink. We proved in \cite{khu-shu162} that compact groups with this property are finite-by-(locally nilpotent). Results for finite groups have to be of quantitative nature. Obviously, in a finite group every element has the smallest Engel sink, so from now on we use the term Engel sink for the minimal Engel sink of $g$, denoted by ${\mathscr E}(g)$, thus eliminating ambiguity in this notation. We proved in \cite[Theorem~3.1]{khu-shu162} that if $G$ is a finite group and there is a positive integer $m$ such that $|{\mathscr E}(g)|\leq m$ for all $g\in G$, then $G$ has a normal subgroup $N$ of order bounded in terms of $m$ such that the quotient $G/N$ is nilpotent. In this paper we consider finite groups in which there is a bound for the rank of the subgroups generated by the Engel sinks. Here, the \textit{rank} of a finite group is the minimum number $r$ such that every subgroup can be generated by $r$ elements. \bt \label{t-main} Suppose that $G$ is a finite group such that for every $g\in G$ the Engel sink ${\mathscr E}(g)$ generates a subgroup of rank $r$. Then $G$ has a normal subgroup $N$ of rank bounded in terms of $r$ such that the quotient $G/N$ is nilpotent. \et Clearly, the conclusion can also be stated as ``Then the rank of the nilpotent residual $\g _{\infty}(G)$ is bounded in terms of $r$.'' Here, $\g _{\infty}(G)=\bigcap_i\g_i(G)$ is the intersection of all terms of the lower central series. First we prove the theorem for soluble finite groups. Then we consider the nonsoluble case (where we use the classification of finite simple groups). \section{Preliminaries} \label{s-prel} The following result was obtained by Kov\'acs~\cite{kov} for soluble groups, and extended independently by Guralnick \cite{gur} and Lucchini \cite{luc} using the classification (improving a bound $2d$ of Longobardi and Maj \cite{lo-ma}). \begin{lemma}\label{l-kov} If $d$ is the maximum of the ranks of the Sylow subgroups of a~finite group, then the rank of this group is at most~$d+1$. \end{lemma} The following lemma appeared independently and simultaneously in the papers of Gorchakov~\cite{grc}, Merzlyakov~\cite{me}, and as ``P.\,Hall's lemma" in the paper of Roseblade~\cite{rs}. \begin{lemma}\label{l-gmh} Let $p$ be a~prime number. The rank of a~$p$-group of automorphisms of an abelian finite $p$-group of rank~$r$ is bounded in terms of~$r$. \end{lemma} The next two lemmas must also be well known. For brevity we say that a quantity is \textit{$a$-bounded} if it is bounded above in terms of a parameter $a$. \begin{lemma}\label{l-r-coprime} A~finite $p'$-group $Q$ of linear transformations of a vector space of dimension $n$ over a field of characteristic $p$ has $n$-bounded rank. \end{lemma} \begin{proof} By Lemma~\ref{l-kov} we can assume that $Q$ is a $q$-group for a prime $q$. Choose a maximal abelian normal subgroup $A$ in $Q$. Since $Q/A$ acts faithfully on $A$, by Lemma~\ref{l-gmh} it suffices to bound the rank of~$A$. After extension of the field, $A$ is diagonalizable, which gives the result since finite multiplicative subgroups of fields are cyclic. \end{proof} Let $F(G)$ denote the Fitting subgroup of a group $G$, the largest normal nilpotent subgroup. The Fitting series starts with $F_1(G)=F(G)$, and then by induction $F_{i+1}(G)$ is the inverse image of $F(G/F_i(G))$. The Fitting height of a soluble finite group $G$ is the minimum $h$ such that $F_h(G)=G$. We also use the usual notation $O_{p'}(G)$ for the largest normal $p'$-subgroup of $G$, and $O_{p',p}(G)$ for the inverse image of the largest normal $p$-subgroup of $G/O_{p'}(G)$. \begin{lemma}\label{l-r-fh} A~finite soluble group $G$ of rank $r$ has $r$-bounded Fitting height. \end{lemma} \begin{proof} For every prime $p$ the quotient $G/O_{p',p}(G)$ acts faithfully on the Frattini quotient of $O_{p',p}(G)/O_{p'}(G)$ and therefore is a linear group of dimension at most~$r$. By Zassenhaus' theorem \cite[15.1.3]{rob}, the derived length of $G/O_{p',p}(G)$ is $r$-bounded . Hence the same is true for $G/F(G)=G/\bigcap _{p}O_{p',p}(G)$. \end{proof} The next technical lemma is also a well-known fact (see, for example, \cite[Lemma~10]{khu-maz}). \bl \label{l-f2} For any finite group $H=F_2(H)$ of Fitting height~$2$ we have $$\gamma _{\infty}(H)=\prod _{q}[F_q,\,H_{q'}],$$ where $F_q$ is the Sylow $q$-sub\-group of~$F(H)$ and $H_{q'}$ is a Hall $q'$-sub\-group of~$H$. \el The following elementary lemma will be used several times. \begin{lemma}\label{l-prod} Suppose that a group $A$ acts by automorphisms on a group $G$. If $A=\langle a_1,\dots ,a _k\rangle$, then $[G,A]=[G,a_1]\cdots [G,a _k]$. \end{lemma} \begin{proof} The product $[G,a_1]\cdots [G,a _k]$ is a normal subgroup of $G$. This product is also $A$-invariant, since it is invariant under every generator $a_i$ of $A$: $$ \big[[G,a_1]\cdots [G,a _k],\,a_i\big]\leq [G,a_i]\leq [G,a_1]\cdots [G,a _k]. $$ Furthermore, $A$ acts trivially on the quotient by this product, since so does every generator of $A$. Hence, $[G,A]\leq [G,a_1]\cdots [G,a _k]$. The reverse inclusion is obvious. \ep The following lemma relates Engel sinks in finite groups to coprime actions. We denote the derived subgroup of a group $X$ by $X'$. \begin{lemma}\label{l0} Let $P$ be a finite $p$-subgroup of a group $G$, and $g\in G$ a $p'$-element normalizing $P$. Then $[P,g]\leq \langle {\mathscr E}(g)\rangle$. \end{lemma} \begin{proof} For the abelian $p$-group $V=[P,g]/[P,g]'$ we have $V=[V,g]$ and $C_V(g)=1$ because the action of $g$ on $V$ is coprime. Then $V=\{[v,g]\mid v\in V\}$ and therefore also $$ V=\{[v,\underbrace{g,\dots ,g}_n\,]\mid v\in V\} $$ for any $n$. Hence, $V$ is contained in the image of ${\mathscr E}(g)\cap [P,g]$ in $[P,g]/[P,g]'$, whence the result. \ep \section{Soluble groups}\label{s-sol} Throughout what follows, let ${\bf r}(X)$ denote the rank of a finite group~$X$. \bpr \label{pr1} Let $q$ be a prime, let $Q$ be a finite $q$-group, and $U$ a $q'$-group of automorphisms of $Q$. Suppose that ${\bf r}([Q,u])\leq r$ for every $u\in U$. Then \begin{itemize} \item[\rm (a)] ${\bf r}(U)$ is $r$-bounded; \item[\rm (b)] ${\bf r}([Q,U])$ is $r$-bounded; \item[\rm (c)] if $U$ is soluble, then the derived length of $U$ is $r$-bounded. \end{itemize} \epr \begin{proof} (a) First suppose that $U$ is abelian. We consider the Frattini quotient $V=Q/\Phi (Q)$ as a faithful ${\mathbb F} _qU$-module. Pick $u_1\in U$ such that $[V,u_1]\ne 0$. By Maschke's theorem, $V= [V,u_1]\oplus C_V(u_1)$, where both summands are $U$-invariant, since $U$ is abelian. If $C_U([V,u_1])=1$, then ${\bf r}(U)$ is $r$-bounded by Lemma~\ref{l-r-coprime}. Otherwise pick $1\ne u_2\in C_U([V,u_1])$; then $V= [V,u_1] \oplus [V,u_2] \oplus C_V(\langle u_1,u_2\rangle )$. If $1\ne u_3\in C_U([V,u_1]\oplus [V,u_2])$, then $V= [V,u_1]\oplus [V,u_2]\oplus [V,u_3] \oplus C_V(\langle u_1,u_2,u_3\rangle )$, and so on. If $C_U([V,u_1]\oplus\dots \oplus [V,u_k])=1$ at some step $k\leq r$, then again ${\bf r}(U)$ is $r$-bounded by Lemma~\ref{l-r-coprime}. However, if there are too many steps, say, $k$ steps for $k>r$, then for the element $w=u_1u_2\cdots u_k$ we shall have $0\ne [V,u_i]= [[V,u_i],w]$, so that $[V,w] = [V,u_1]\oplus\dots \oplus [V,u_k]$ will have rank greater than $r$, a contradiction. We now consider the general case. Let $P$ be a Sylow $p$-subgroup of $U$, and $M$ a maximal normal abelian subgroup of $P$. By the above, ${\bf r}(M)$ is $r$-bounded. Then ${\bf r}(P)$ is $r$-bounded by Lemma~\ref{l-gmh}, since $P/M$ acts faithfully on $M$. Thus, the rank of a Sylow $p$-subgroup of $U$ is $r$-bounded for every $p$, which implies that the rank of $U$ is $r$-bounded by Lemma~\ref{l-kov}. (b) By part (a), in particular, $U=\langle a_1,\dots ,a_f\rangle$ for some $r$-bounded $f$. Then $[Q,U]=[Q,a_1]\cdots [Q,a_f]$ by Lemma~\ref{l-prod}. Since each of the normal subgroups $[Q,a_i]$ has rank at most $r$ and $f$ is $r$-bounded, the rank of $[Q,U]$ is also $r$-bounded. (c) The group $U$ acts faithfully on the Frattini quotient $[Q,U]/\Phi ([Q,U])$, which can be regarded as a vector space over $\F _q$, the dimension of which is $r$-bounded by part (b). If $U$ is soluble, then its derived length is $r$-bounded by Zassenhaus' theorem \cite[15.1.3]{rob}. \ep \bt\label{t-sol} Suppose that $G$ is a finite soluble group such that for every $g\in G$ the Engel sink ${\mathscr E}(g)$ generates a subgroup of rank $r$. Then ${\bf r}(\g _{\infty}(G))$ is $r$-bounded. \et \bp Note that the hypothesis is inherited by all sections. By Lemma~\ref{l0}, the hypothesis implies that for any $p$-subgroup $P$ of any section of $G$ and a $p'$-element $g$ of this section normalizing $P$, the rank of $[P,g]$ is at most $r$. First we prove that the Fitting height $h(G)$ is $r$-bounded. Since $F(G)=\bigcap_{p}O_{p',p}(G)$, it is sufficient to bound the Fitting height of each quotient $\bar G=G/O_{p',p}(G)$. Since a Hall $p'$-subgroup of $\bar G$ acts faithfully on the Frattini quotient of $O_{p',p}(G)/O_{p'}(G)$, the rank of a Hall $p'$-subgroup of $\bar G$ is $r$-bounded by Proposition~\ref{pr1}(a). Then the Fitting height of a Hall $p'$-subgroup of $\bar G$ is also $r$-bounded by Lemma~\ref{l-r-fh}. Therefore, in order to bound the Fitting height $h(\bar G)$, it remains to bound the $p$-length of $\bar G$. Let $P$ be a Sylow $p$-subgroup of $\bar G$. Then $P$ acts faithfully on $F(\bar G)=Q_1\times\cdots \times Q_s$, where $Q_i$ is a $q_i$-subgroup and $q_i\ne p$ for all $i$. For every $i$, the derived length of $P/C_P(Q_i)$ is $r$-bounded by Proposition~\ref{pr1}(c). Since $\bigcap _iC_P(Q_i)=1$, the derived length of $P$ is $r$-bounded, and therefore the $p$-length of $\bar G$ is $r$-bounded by the theorems of Hall and Higman \cite[Theorem~A]{ha-hi} for $p\ne 2$, and of Berger and Gross \cite{ber-gro} and Bryukhanova~\cite{bry81} for $p=2$ Thus, the Fitting height $h(G)$ is $r$-bounded. We now use induction on $h(G)$ to prove that ${\bf r}(\g _{\infty}(G))$ is $r$-bounded. Clearly, we only need to consider the case $G=F_2(G)$. Then by Lemma~\ref{l-f2} we have $\g _{\infty}(G)=\prod _q[F_q,H_{q'}]$, where $F_q$ is a Sylow $q$-subgroup of $F(G)$ and $H_{q'}$ is a Hall $q'$-subgroup of $G/C_G(F_q)$. The rank of each subgroup $[F_q,H_{q'}]$ is $r$-bounded by Proposition~\ref{pr1}(b). Therefore the rank of $\g _{\infty}(G)$ is also $r$-bounded. \ep \section{Nonsoluble groups}\label{s-nons} In the interests of brevity, with a slight abuse of terminology, we say that in a finite group $G$ {\it all Engel sinks are of rank $r$} if for every $g\in G$ the Engel sink ${\mathscr E}(g)$ generates a subgroup of rank at most $r$. \bl \label{l-simple} Let $G$ be a finite nonabelian simple group with all Engel sinks of rank~$r$. Then $G$ has $r$-bounded rank. \el \bp We can assume that $G$ is either an alternating group or a group of Lie type. For an alternating group $G=A_n$ it is easy to see that $n$ is $r$-bounded. Indeed, every finite group of order $m$ can be embedded in $A_n$ with $m$-bounded $n$, and there are groups of $r$-bounded order with ${\bf r}(\langle{\mathscr E}(g)\rangle)=r+1$ for some element $g$. (For example, in the semidirect product $A\langle b\rangle$ of an elementary abelian $3$-group $A$ of rank $r+1$ and its group of automorphisms $\langle b\rangle$ of order $2$ that acts fixed-point-freely, we have ${\bf r}(\langle{\mathscr E}(b)\rangle)=r+1$, and $|A\langle b\rangle|=2\cdot 3^{r+1}$.) So let $G$ be a finite simple group of Lie type $G=L_n(\F _{p^k})$ of degree $n$ over a field of order $p^k$, where $p$ is a prime. It is sufficient to show that both $n$ and $k$ are $r$-bounded. Indeed, then the linear covering group $\hat G=\hat L_n(\F _{p^k})$ in its natural representation of dimension $n$ over $\F _{p^k}$ can be regarded as a linear group of $r$-bounded dimension $nk$ over $\F _p$. Therefore the rank of a Sylow $p$-subgroup of $\hat G$ is $r$-bounded by Lemma~\ref{l-gmh}, and the rank of a Sylow $t$-subgroup for $t\ne p$ is $r$-bounded by Lemma~\ref{l-r-coprime}. Then the rank of $\hat G$ is bounded by Lemma~\ref{l-kov}. For $G=L_n(\F _{p^k})$, to obtain a bound for $k$ in terms of $r$, it is sufficient to show that $G$ has an element $g$ such that ${\mathscr E}(g)$ contains a subgroup isomorphic to the additive group of the field $\F _{p^k}$. This follows from the well-known facts about simple groups of Lie type. To be specific, one of the ways to show this is to use the fact that $G=L_n(\F _{p^k})$ either contains a subgroup isomorphic to $SL_2(p^k)$ or $PSL_2(p^k)$, or is a Suzuki group (over the field $\F _{p^k}$). For example, even stronger statements are proved in \cite{Liebeck--Nikolov--Shalev}. In $SL_2(p^k)$, put $$g=\begin{pmatrix} \zeta ^{-1}&0\\0&\zeta \end{pmatrix},$$ where $\zeta $ is a nontrivial $p'$-element of the multiplicative group of the field $\F _{p^k}$ such that $\zeta ^2\ne 1$ (the latter condition can always be satisfied for $k>1$). This element normalizes and acts fixed-point-freely on the abelian $p$-subgroup of upper-triangular matrices $$T=\left\{\left.\begin{pmatrix} 1&a\\0&1\end{pmatrix}\right| a\in \F _{p^k}\right\},$$ which is isomorphic to the additive group of $\F _{p^k}$. Then $T\subseteq {\mathscr E}(g)$ by Lemma~\ref{l0}. In the quotient $PSL_2(p^k)$ of $SL_2(p^k)$ by the centre, the image of $T$ is isomorphic to $T$. Finally, the case of $G$ being a Suzuki group is dealt with in similar fashion, by considering the action of a diagonal $2'$-element on a Sylow $2$-subgroup. Thus, $k$ is $r$-bounded. For $G=L_n(\F _{p^k})$, to obtain a bound for $n$, it suffices to consider the Weyl subgroup, which, for large $n$, contains a subgroup isomorphic to a symmetric group of large degree, which in turn contains Engel sinks of large rank, as explained at the beginning of the proof. As explained above, bounds in terms of $r$ for $n$ and $k$ imply that the rank of $G=L_n(\F _{p^k})$ is $r$-bounded. \ep \bl \label{l-gen} Given a prime $p$, any non-abelian finite simple group $T$ of rank~$s$ can be generated by $s$-boundedly many $p'$-elements. \el \bp If $p\ne 2$, then we can use Guralnick's result \cite[Theorem~A]{gur2} that $T$ is generated by an involution and a Sylow $2$-subgroup, which has rank at most $s$ by hypothesis. If $p=2$, we can use King's result \cite{king} that $T=\langle i,a\rangle$, where $|i|=2$ and $|a|$ is an odd prime; then $T=\langle a, a^i\rangle$, since this is an $a$-invariant and $i$-invariant subgroup, which is therefore normal. \ep \bpr \label{p-fs} Let $G$ be a finite group such that $G=[G,G]$ and $G/F(G)$ is a non-abelian simple group. Suppose that all Engel sinks of $G$ have rank $r$. Then $G$ has $r$-bounded rank. \epr \bp By Lemma~\ref{l-simple} the quotient $G/F(G)$ has $r$-bounded rank. Thus, we need to show that the rank of $F(G)$ is $r$-bounded. It suffices to show that the rank of each Sylow $p$-subgroup of $F(G)$ is $r$-bounded. Considering the quotient of $G$ by the Hall $p'$-subgroup of $F(G)$, we can assume that $F(G)$ is a $p$-group. Using Lemma~\ref{l-gen} we write $G/F(G)=\langle\bar a_1,\dots , \bar a_k\rangle$, where all the $\bar a_i$ are $p'$-elements, while $k$ is $r$-bounded. We can choose some $p'$-elements $a_1,\dots ,a_k$ that are preimages of $\bar a_1, \dots , \bar a_k$ in $G$. Let $S=\langle a_1,\dots ,a_k\rangle$; then $G=F(G)S$. We have $$ [F(G),S]=[F(G),a_1]\cdots [F(G),a_k] $$ by Lemma~\ref{l-prod}. The rank of each of the normal subgroups $[F(G),a_1]$ is at most $r$ by Lemma~\ref{l0}. Since $k$ is $r$-bounded, the rank of $[F(G),S]$ is $r$-bounded. Therefore, factoring out $[F(G),S]$, we can assume that $[F(G),S]=1$. Then $S$ is a normal subgroup of $G$. Since $G=G'$ and $F(G)$ is nilpotent, it follows that $G=S$. Under our assumption $[F(G),S]=1$, the group $G=S$ is a perfect group that is a central extension of the finite simple group $G/F(G)$. Hence $F(G)$ is isomorphic to a subgroup of the Schur multiplier of the simple group $G/F(G)$. Therefore $F(G)$ has rank at most $3$, as follows from the classification. \ep We are now ready to prove the main result in the general case. \bt If $G$ is a finite group with all Engel sinks of rank $r$, then $\g _{\infty} (G)$ has $r$-bounded rank. \et \bp By Theorem~\ref{t-sol} applied to the soluble radical $R(G)$, the rank of $\g _{\infty}(R(G))$ is $r$-bounded. Factoring out $\g _{\infty}(R(G))$ we can assume that the soluble radical is nilpotent: $R(G)=F(G)$. Let the socle of $G/F(G)$ be $S_1\times \cdots \times S_m$, where the $S_i$ are non-abelian simple groups. We claim that the number of factors $m$ is at most $r$. Indeed, by the Feit--Thompson theorem and Frobenius' theorem, each $S_i$ has a nontrivial $2$-subgroup $T_i$ normalized but not centralized by a $2'$-element $a_i\in S_i$. Then $\langle {\mathscr E}(a_1a_2\cdots a_m)\rangle$ has rank at least $m$, so $m\leq r$. Let $\bar G=G/F(G)$ and let $N=\bigcap N_{\bar G}(S_i)$. Since $m\leq r$ and the quotient $\bar G/N$ acts faithfully by permutations of the factors $S_1,\dots, S_m$, the order $|\bar G/N|$ is $r$-bounded. By the usual argument, since $\bigcap C_{\bar G}(S_i)=1$, the group $N$ embeds in the direct product of $m$ almost simple groups that are extensions of the $S_i$ by outer automorphisms. By Lemma~\ref{l-simple}, each $S_i$ has $r$-bounded rank. It follows from the classification that the order of the outer automorphism group of every $S_i$ is $r$-bounded. Indeed, alternating groups of $r$-bounded rank have $r$-bounded order. For a group of Lie type $L_n(p^f)$, the order $|{\rm Out}\,L_n(p^f)|$ is bounded in terms of $n$ and $f$, and both these parameters are $r$-bounded, as we saw in Lemma~\ref{l-simple}. Hence $|N/(S_1\times\dots\times S_m)|$ is $r$-bounded. As a result, the composition length of $G/F(G)$ is $r$-bounded. We now complete the proof by induction on this composition length. Let $G_1$ be a normal subgroup of $G$ containing $F(G)$ with $G/G_1$ simple (abelian or non-abelian). By the induction hypothesis, $\g _{\infty }(G_1)$ has $r$-bounded rank. By passing to $G/\g _{\infty }(G_1)$ we can assume that $G/F(G)$ is simple. If it is abelian, then Theorem~\ref{t-sol} applies to $G$. If it is non-abelian, then Proposition~\ref{p-fs} applies to $\g _{\infty }(G)$. \ep \section*{Acknowledgements} The first author was supported by the Russian Science Foundation, project no. 14-21-00065, and the second by FAPDF and CNPq-Brazil. The first author thanks the University of Brasilia for the hospitality that he enjoyed during his visit to Brasilia.
\section{Introduction} The purpose of this article is to describe the convergence sets of formal power series with holomorphic coefficients. The study of convergence sets comes from generalizations of Hartogs Theorem (see \cite{Lelong 1951,AM,S,Levenberg and Molzon 1988, spallek}). Our approach is motivated by recent work \cite{B.M,B.D.N,Ma T} concerning formal power series $F(z,t)=\sum_{n=0}^{\infty} P_n(z)t^n$, whose coefficients are polynomials of one or more complex variables. In some of these studies the authors focus on power series of the form $F(z,t)=f(tz_1,\dots,tz_N)=\sum_{n=0}^{\infty} P_n(z)t^n$, where $P_n(z)$ are homogeneous polynomials of degree $n$ for $n\in \NN$. We say that $E\subset\CC^N$ is the convergence set of $F$ if for every $z\in E $ there exists some $r_z>0$ such that $F(z,t)$ converges for $t<r_z$ while for each $z\in \CC^N\setminus E$ the radius of convergence of $F(z,t)$ equals 0. Note that it is always assumed that $\deg P_n\leq n$ in these investigations. Some related problems from operator calculus and renormalization of quantum field theory ( see, {\it e.g.,} \cite{knill}) are concerned with the formal series of the form $$ F(T,t)=\sum_{n=0}^\infty K_n(T)t^n,$$ where $K_n(T)$ belong to the $C^\ast$ algebra generated by some operator $T$. It is necessary to discuss the convergence set of $F(z,t)$ for both spectrum analysis of $F(T,t)$ and perturbation theory. Here $K_n(T)$ are holomorphic functions on some neighborhood of the compact set $K$, the spectra of $T$. It is desirable to find the necessary and sufficient conditions for a set $E$ to be the convergence set of some $F(z,t)=\sum_{n=0}^\infty f_n(z)t^n$. This article answers the question completely when $N=1$. \section{Convergence Sets} Let $\Omega$ be an open subset in the complex space $\CC^N$. Denote by { $\mathscr O(\Om)$} the set of holomorphic functions on $\Omega$. We consider the power series of the form \begin{equation}\label{*} f(z,t)=\sum^{\infty}_{n=0}f_n(z)t^n,\quad z\in \Omega, \end{equation} where $f_n(z)\in\mathscr{O}(\Om)$ and $t$ is a complex variable. We denote by { $\mathscr{O}(\Om)[[t]]$} the collection of the series of form (1). \bD Let $f(z,t)\in\mathscr{O}(\Om)[[t]]$. We define the { {\it convergence set of $f$ in} $\Om$} by $$ \Conv_\Om (f)=\{z\in \Omega:\ f(z,t)\ \hbox{converges in some neighborhood of}\ 0 \}, $$ or equivalently, $$ \Conv_\Om (f)=\{z\in \Omega:\ |f_n(z)|<r_z^n\ \hbox{for some}\ r_z>0\ \hbox{and every}\ n\in\NN\}. $$ \eD \bD A subset $E\subset\Omega$ is said to be a {\it convergence set in $\Om$} if there exists an $f\in\mathscr{O}(\Om)[[t]]$ such that $E=\Conv_\Om(f)$. A convergence set in $\CC^N$ is also simply called as {\it convergence set}. \eD \bP Let $K$ be a polynomially convex compact set in $\CC^N$. Then $K$ is a convergence set { in $\CC^N$}.\eP \bpp Let $m$ be any positive integer and $y\in \CC^N \setminus K$. Since $K$ be a polynomially convex, there exists a polynomial $P_y(z)$ such that $|P_y(y)|>m$ and $|P_y(z)| \leq 1$ for $z\in K$. Set $U_{y}=\{x\in\CC^N:|P_{y}(x)|> m\}.$ The open cover $U_{y}, y\in\CC^N\setminus K$, of the set $\CC^N\setminus K$ contains a countable subcover $ U_{y_{k}}, k=1,2,\ldots$. Now denote by $P_{mk}(z)=P_{y_{k}}(z)$. For each $m$ we get a sequence $\{P_{mk}\}_{k=1}^\infty.$ Since the set $\{P_{mk}\}$ is countable we can arrange it as a sequence $\{h_j(z)\}_{j=1}^ \infty$. Set $$ f(z,t)=\sum_{j=1}^\infty h_j^j(z)t^j. $$ Suppose that $z\in K$. Then for each $j$, $|h_j(z)|\le 1$. Hence $z\in \Conv_{\CC^N}(f)$. Consequently, $K\subset\Conv_{\CC^N}(f)$. Now suppose that $z\in \CC^N\setminus K$. Then for each $m\in \NN$ there is a $k\in \NN$ such that $|P_{mk}(z)|\ge m$. It follows that the sequence $\{|h_\ell(z)|\}$ is unbounded. So the formal power series $f(z,t)$ is divergent at $z$. Consequently, $\Conv_{\CC^N}(f)\subset K$. That is, $K$ is a convergence set in $\CC^N$. \epp The following proposition provides a necessary condition for a set to be a convergence set. \bP\label{226} Let $E$ be a convergence set in $\Om\subset \CC^N$. Then $E$ is an $F_\sigma$ set.\eP \begin{proof} Suppose that $E=\Conv_\Om(f)$, where \ba{ f(z,t)=f_0(z)+f_1(z)t+\cdots+f_n(z)t^n+\cdots\in \mathscr O(\Om)[[t]].} For $j\in\NN$ denote by $K_j=\{z\in\Omega:\ \hbox{dist}\{z,\partial \Omega\}\ge \frac 1j\ \hbox{and}\ |z|<j$. Then $\Om=\cup_{j=1}^\infty K_j$ and each $K_j$ is contained in the interior of $K_{j+1}$. We now prove that \begin{equation}\label{trial} E=\bigcup_{j=1}^{\infty}\bigcap_{n=0}^\infty \{z\in K_j: \;|f_n(z)|\leq j^n\}. \end{equation} For $z\in E$, suppose that $z\in K_L$ for some integer $L$. By the definition of convergence set, there exists a positive integer $J$ such that $$ |f_n(z)|<J^n,\;n\in\NN. $$ Let $m=\max\{L,J\}$. Then $z\in \bigcap_{n=0}^\infty \{z\in K_m: \;|f_n(z)|\leq m^n\}$. On the other hand, assume that $z\in \bigcup_{j=1}^{\infty}\bigcup_{l=1}^{\infty} \{z\in K_j: \;|f_n(z)|\leq j^n\}$. Then there exist a positive integer $j$ such that $z\in \bigcap_{n=0}^\infty \{z\in K_l: \;|f_n(z)|\leq j^n\}$. So $|f_n(z)|\leq j^n$ for all $n$, i.e., $z\in E$. It is clear that $\bigcap_{n=0}^\infty \{z\in K_j: \;|f_n(z)|\leq j^n\}$ are closed. By (\ref{trial}), $E$ is an $F_\sigma$ set. \end{proof} The converse of Theorem~\ref{226} is not true, for which we will give a counterexample in the next section. \vskip2mm We now discuss the intersection of several convergence sets. { \bP\label{intersection} Let $E_1,\dots, E_k$ be convergence sets in $\Om$. Then the intersection $E:=\cap_{j=1}^k E_j$ is also a convergence set in $\Om$. \eP} \begin{proof} It suffices to prove that the intersection of two convergence sets in $\Om$ is a convergence set in $\Om$. Suppose that we have two formal power series { in $\mathscr{O}(\Om)[[t]]$} \ba{ f(z,t)=f_0(z)+f_1(z)t+\cdots+f_n(z)t^n+\cdots,} and \ba{ g(z,t)=g_0(z)+g_1(z)t+\cdots+g_n(z)t^n+\cdots} and the corresponding convergence sets $A=\hbox{Conv}_{\Om}(f)$ and $B=\hbox{Conv}_{\Om}(g)$, respectively. Define by \ba{F(z,t)&=F_0(z)+F_1(z)t+\cdots= f(z,t^2)+ tg(z,t^2)\\ & =f_0(z)+g_0(z)t+f_1(z)t^2+g_1(z)t^3+\cdots.} Then \begin{equation}\label{} F_n(z)=\left\{\begin{array}{ll} f_{\frac n2}(z),&\ n\ \hbox{is even};\\ g_{\frac{n-1}2}(z),& \ n\ \hbox{is odd}.\end{array}\right. \end{equation} For $z\in A\cap B$ suppose that $|f_n(z)|<r_A^n$ and $|g_n(z)|<r_B^n$ for some $r_A,r_B>0$ and every $n\in \NN$. Then $|F_n(z)|<((\max\{r_A,r_B\})^{\frac12})^n$. So $A\cap B\subset \Conv_\Om(F)$. On the other hand, for $z\in \Conv_\Om(F)$ suppose that $|F_n(z)|<r^n$. Then both $|f_n(z)|$ and $|g_n(z)|$ are less than $(r^2)^n$, i.e., $\Conv_\Om(F)\subset A\cap B.$ \end{proof} In the rest of the article we only consider the case $N=1$. We discuss some properties for the convergence sets in the complex plane. For any countable set $E$ in $\CC$ we in the following theorem construct a formal series whose convergence set in $\CC$ is exactly $E$. For the convenience of the proof, denote by {\it i.e.}, \ba{N_r(S)=\{z\in\CC: |z-p|<r\;\text{ for some $p\in S$}\}} for $S\subset \CC$ and $r>0$. \bT\label{cont conv} Let $S=\{z_1,z_2,\dots\}$ be a countable infinite subset of $\CC$. Define an $F\in\CC[z][[t]]$ by $$F(z,t)=\sum_{n=0}^\infty C_{n} \Big[\prod_{j=1}^n (z-z_{j})\Big]t^n, $$ where $C_{n}={(n/\gamma_{n}})^n$, and $$\gamma_{n}=\min(\frac{1}{2}\min_{1\leq i<j\leq n+1} |z_{i}-z_{j}|,{1}/{n}).$$ { Then $\Conv_\CC(F)=S$.}\eT \begin{proof} Note that $\gamma_n$ is positive since $z_i$ are pairwise distinct. Let $L_j=\{z_1,\cdots,z_j\}$ for $j\in\NN$. We now prove that \bee\label{a1}\bigcap_{j=k}^\infty N_{{\gamma_{j}}}(L_j)=L_k,\ k\in\NN.\eee We only need to prove $\bigcap_{j=k}^\infty N_{{\gamma_{j}}}(L_j) \subset L_k$ , which would follow from the following statement: \bee\label{a2}\bigcap_{s=k}^\infty N_{{\gamma_{s}}}(L_s)\subset N_{\gamma_j}(L_k),\ \mbox{for} \ j\geq k.\eee We prove (\ref{a2}) by induction on $j$. It is obvious for $j=k$ since $N_{{\gamma_{k}}}(L_k)=U_k$. Suppose the statement is true for $j=N\geq k$. Let $z\in \bigcap_{s=k}^\infty N_{{\gamma_{s}}}(L_s).$ For $i\not=j$, $1\le i,j\le N+1$, since $|z_j-z_i|\geq 2\gamma_N$, we get that $N_{\gamma_N}(z_i)\cap N_{\gamma_N}(z_j)=\emptyset$. It follows that \bee\label{a3} \Big(\bigcup_{\ell=k+1}^{N+1} N_{\gamma_{N}}(z_{\ell}) \Big) \cap \Big(N_{\gamma_N}(L_k)\Big)= \emptyset.\eee By the induction hypothesis $z\in N_{\gamma_N}(L_k)$ and by (\ref{a3}), $z\notin \bigcup_{\ell=k+1}^{N+1} N_{\gamma_{N}}(z_{\ell})$. Since $\gamma_{N+1}\leq \gamma_{N}$ we see that $\bigcup_{\ell=k+1}^{N+1} N_{\gamma_{N+1}}(z_{\ell})\subset \bigcup_{\ell=k+1}^{N+1} N_{\gamma_{N}}(z_{\ell})$, hence \bee \label{a54}z\notin\bigcup_{\ell=k+1}^{N+1} N_{\gamma_{N+1}}(z_{\ell}).\eee On the other hand, we know that \bee\label{a55} z\in N_{{\gamma_{N+1}}}(L_{N+1})=\Big(\bigcup_{\ell=k+1}^{N+1} N_{\gamma_{N+1}}(z_{\ell}) \Big) \cup \Big(N_{\gamma_{N+1}}(L_k)\Big).\eee By (\ref{a54}) and (\ref{a55}), $z\in N_{\gamma_{N+1}}(L_k)$. This completes the induction step, and therefore the statement is proved. Now let $P_0(z)=1$ and, for $n\geq1$, \begin{equation} P_n(z)= C_n \prod_{k=1}^n (z-z_{k}). \end{equation} Then $ F(z,t)=\sum_{n=0}^\infty P_n(z)t^n $. For $n\geq k$, we have $P_n(z_k)=0$. It follows that $S\subset\Conv_\CC(F)$. Now suppose that $z\not\in S$. By (\ref{a1}), $z\notin\bigcap_{j=k}^\infty U_j$ for each $k$. It follows that there is a strictly increasing sequence $j_k$ of positive integers such that $z\notin U_{j_k} $ for $ k=1,2,\cdots$. Then \begin{equation} |P_{j_k}(z)|\geq (\frac{j_k}{\gamma_{j_k}})^{j_k}\prod_{i=1}^{j_k}({\gamma_{i}})\geq({j_{k}})^{j_k}, \end{equation} since $\gamma_i\geq \gamma_{j_k}$ for $i \leq j_k.$ This implies that $z\notin \Conv_\CC(f).$ Therefore $S=\Conv_\CC(f).$ \end{proof} \bE By Theorem~\ref{cont conv} the set $\mathbb Q$ of rational numbers is a convergence set in $\CC$. But by Theorem~\ref{226} the set $\RR\setminus \QQ$ of irrational numbers is not so, since it is not an $F_{\sigma}$ set. \eE { \bT Let $\Omega \subset \CC$, let $ S$ be a countable dense subset of $\Omega$, let $\{C_{n}\}$ be a sequence of positive numbers, and let { $A=\{a_1,a_2,\cdots,a_k\}$ be any finite subset of $\Omega$. Then there exists an enumeration $\{z_1, z_2, \dots\}$ of $S$, such that $A\subset \Conv_\Om(F)$, }where $F$ is defined by $$F(z,t)=\sum_{n=0}^\infty C_{n}\Big[ \prod_{j=1}^n (z-z_{j})\Big]t^n.$$\eT} \begin{proof}Suppose that the diameter of $A$ is $d$. Let $S=\{s_1,s_2,\dots\}$. We choose distinct points $z_1,z_2,\cdots,$ from $S$ such that the following are satisfied: \begin{enumerate} \item $|z_{l(k+1)+i}-a_i|<d,$ and $ C_{l(k+1)+i+p}|z_{l(k+1)+i}-a_i|<\frac d{(l+2)!}$, for $l=0,1,2,\cdots,\ i=1,2,\cdots,k,\ p=0,1,\cdots,k$; \item for $l=1,2,\cdots,\ z_{l(k+1)}=s_{\tau(l)}$, where $$\tau(l)=\min\{p\in\NN:|s_p-a_i|<ld,s_p\in S\setminus \{z_1,\cdots,z_{l(k+1)-1}\}\}.$$ \end{enumerate} We now show that \begin{equation} \nonumber |C_n(a_i-z_1)\cdots(a_i-z_n)|<(2d)^n,\ n\geq k+1,\ i=1,\cdots,k. \end{equation} \indent Fix $n\geq k+1$ and $1\leq i\leq k$. Choose $l\geq 0$ and $0\leq p\leq k$ such that $n=l(k+1)+i+p$.\\ Since $$ |a_i-z_{m(k+1)+j}|\leq |a_i-a_j|+|a_j-z_{m(k+1)+j}|<d+d=2d,$$ for $m=1,2,\cdots$ and $1\leq j\leq k$, and since $$ |a_i-z_{m(k+1)}|<(m+1)d<(m+1)(2d),$$ for $m=1,2,\cdots$, we have \begin{eqnarray}\label{a} &\ &|C_n(a_i-z_1)\cdots(a_i-z_n)|\\ \nonumber&=&|(a_i-z_1)\cdots (a_i-z_{l(k+1)+i-1})|\cdot|C_{l(k+1)+i+p}(a_i-z_{l(k+1)+i})|\cdot \\ \nonumber &\ &|a_i- z_{l(k+1)+i+1}|\cdots|a_i-z_{l(k+1)+i+p}| \\ \nonumber &\leq& (l+2)!(2d)^{l(k+1)+i-1}[\frac d {(l+2)!}](2d)^{p}\\ \nonumber&=&(2d)^{n-1}(l+2)!\frac d{(l+2)!}<(2d)^n. \end{eqnarray} In the above formula, the factor $(l+2)!$ comes from those factors $(a_i-z_{\alpha(k+1)})$ for $\alpha=0,1,\cdots,l+1.$ By (\ref{a}) we know that the convergence radius of $F(z,t)$ is $>1/(2d)$ for all $a_i\in A$ as the power series of $t$, which completes the proof. \end{proof} \section{$\sigma$\it-convex-sets and Convergence Sets} {\bD\label{definition} Let $E$ be a compact subset of $\Omega$. The holomorphic hull of $E$ in $\Om$ is defined by $$ \hat{E}_\Om=\{z\in \Omega:|h(z)|\leq\max_{\zeta\in E}|h(\zeta)|\ \hbox{for all}\ h\in \mathscr{O}(\Om)\}. $$ If $E=\hat{E}_\Om$ we say that $E$ is holomorphically convex in $\Om$. \eD} { \bP \cite[Theorem~1.3.4]{hormander} \label{hull1}A compact subset $E$ of $\Om\subset \CC$ is holomorphically convex in $\Om$ if and only if none of the bounded connected components of its complement is contained in $\Omega$.\eP} By Proposition~\ref{hull1} it is easy to prove the following proposition. \bP \label{hull2} Let $E$ be a compact subset of $\Om$. Then $\hat{E}_\Om=E\cup (\cup_\alpha C_\alpha)$, where $\{C_\alpha\}$ is the set of bounded connected components of $\CC\setminus E$ that are contained in $\Om$.\eP \bL \label{finite} Let $K$ be a holomorphically convex compact set in $\Om\subset \CC$. Then $\CC\setminus K$ has only finite components.\eL \bpp Suppose that $\CC\setminus K$ has an infinite number of bounded components. We may denote by $C_i,i=1,2,\cdots,$ those components since $\CC\setminus K$ is an open set. Again denote $d=\max_{w\in K}|w|$. It is obvious that $\{z\in \CC: |z|>d\}$ must be in the unbounded component of $\CC\setminus K$. So $C_i\cap\{z\in \CC: |z|>d\}=\emptyset,\forall i\in 1,2,\cdots $. We get that $U=\bigcup_{i=1}^\infty C_i\subset\{z\in \CC:|z|\leq d\}$. That is, $U$ is bounded. By Proposition \ref{hull1}, for any $j\in \NN$, $C_j$ can not be contained in $\Om$. Then we may choose $w_j\in C_j\setminus \Om$. Let $w$ be a limited point of the bounded set $\{w_j\}_{j=1}^\infty$. Without the confusion, we may assume that $w_j\rightarrow w$ when $j\rightarrow\infty$. Denote by \begin{equation}\label{inner} d_j=2{ \sup} \{r>0: \text{ { There exists $a\in C_j$ such that }} D(a,r) \subset C_j \} \end{equation} the inner diameter of $C_j$. By the above argument we get $\sum^\infty_{j=1}{ \frac14}\pi d_j^2\leq \text{area}(U)\leq \pi d^2$. So we obtain that $d_j$ tends to $0$. Now by (\ref{inner}), we have $$ \text{dist}(w_j,K)\leq d_j $$ because $D(w_j,r)\subset C_j$ for all $r<\text{dist}(w_j,K)=\text{dist}(w_j,\partial C_j)$. Thus we obtain that $\text{dist}(w,K)=\lim_{j\rightarrow\infty}\text{dist}(w_j,K)=0$, i.e., $w\in K\subset \Omega$. It is impossible because $\Omega$ contains only inner points { while} $w$ is a limited point of { points outer} of $\Om$. Thus $\CC\setminus K$ has only finite bounded components. \epp { \bD A subset $K$ of $\Om\subset \CC$ is said to be a {\it \shc} set in $\Om$ if it is the union of a countable collection of holomorphically convex compact subsets of $\Om$. Moreover, $K$ is a $\sigma$\it-convex-set \rm if it is the union of a countable collection of polynomial convex compact sets. \eD} \bL \label{lunar} Every holomorphically convex compact $K$ in $\Om$ is a $\sigma$-convex-set.\eL \bpp By Lemma \ref{finite}, $\CC\setminus K$ has only finite components. We first suppose that it has only one bounded one, named as $C$. Let $a\in C$ and $ 0<r<R$ such that $K\subset\mathfrak{R}_{rR}=\{z\in\CC:r<|z-a|<R\}$. For $1<j\in\NN$, set $$E_j=\{z=\rho e^{i\theta}+a:\;r<\rho<R;0\leq \theta\leq \Big(1-\frac{1}{j}\Big)2\pi\}$$ and $K_j=K\cap E_j$. Then $K=\cup_{j=2}^\infty K_j$. We need to prove that $K_j$ is polynomially convex for all $j>1$. Let $w\notin K_j$ for some one $j\in \NN$. If $w$ is not in $K$, it should be in $C$ or the unbounded component of $\CC\setminus K${. And in either case, } $w$ can be connected with $\infty$ by a path not intersecting with $K_j$. If $w$ is not in the simply connected set $E_j$ it is still path-connected with $\infty$. So $\CC\setminus K_j$ has no bounded component, that is, $K_j$ is polynomially convex by Proposition \ref{hull1} and the remark after Definition \ref{definition}. \vspace{3mm} For the case that $K$ is $m$-connected the proof is still valid when we take place of the fan family $\mathfrak{R}_{rR}=\{z\in\CC:r<|z-a|<R\}\setminus E_j$ by a curved fan family, each of which cut $K$ into a polynomially convex set. \epp The following proposition is obvious. \bP Let $\{K_j\}_{j=1}^\infty$ be a sequence of \shc sets in { $\Om$}. Then $\cup_{j=1}^\infty K_j$ is \shct.\eP By Lemma \ref{lunar} and the above proposition we have the following corollary. \bC\label{cor} Let $E$ be a \shc set in { $\Om$}. Then it is also $\sigma$-convex.\eC \vskip2mm \noindent So we only say the $\sigma$-convex set and not the \shc set in the rest of this paper. \vskip2mm Here are two easy examples of $\sigma$-convex sets. Let $\Delta(a,r)=\{z\in\CC:|z-a|<r\}$. \bE Every open set in the complex plane is a $\sigma$-convex set. Suppose $E\subset \CC$ is open, then \begin{equation} E= \bigcup_{j=1}^\infty \overline{\Delta{(w_j,\frac {r_{w_j}}2)}}, \end{equation} where $\{w_j\}^\infty_1$ is a dense countable subset of $E$ and $\frac {r_{w_j}}2=\text{dist}(w_j,\partial E)$.\eE \bE The unit circle $\Gamma$ is a $\sigma$-convex set since $\Gamma=\cup_{j=1}^\infty\{e^{i\theta}:\;0\leq \theta\leq \Big(1-\frac{1}{j}\Big)2\pi\}$.\eE The following is a counterexample. \bE (Sierpinski triangle):\rm \ Let { $T$} be the equilateral triangle with vertices $A,B,C$ and sides of length $1$. And let $D,E,F$ be the mid-points of sides $AB,BC,AC$ respectively. Denote $4$ equilateral triangles by{ $$T_{1}=\triangle_{ADF},T_{2}=\triangle_{DBE},T_{3}=\triangle_{ECF},T_{4}=\triangle_{DEF},$$ among which $T_{4}$ }is only the inverted triangle. { Forgot $T_4$ and for $i_1=1,2$ or $3$ we still obtain $T_{i_1}=T_{i_11}\cup T_{i_12}\cup T_{i_12}\cup T_{i_13}\cup T_{i_14}$.} Continue the process, for every $T_{i_1\cdots i_k}$ ($i_l=1,2$ or $3$, $1\leq l\leq k$), we obtain the decomposition: $T_{i_1\cdots i_k}=T_{i_1\cdots i_k1}\cup T_{i_1\cdots i_k2}\cup T_{i_1\cdots i_k3}\cup T_{i_1\cdots i_k4}$ where $T_{i_1\cdots i_k4}$ is inverted one. It is obvious that the side length of $T_{i_1\cdots i_k}$ is $\frac1{2^{k-1}}$. The Sierpinski triangle $S$ \rm is defined by \begin{equation}\label{sier} S=\cap_{k=1}^{\infty}\cup_{{ i_l=1,2\text{ or }3}, 1\leq l\leq k}T_{i_1\cdots i_k}= { T\setminus(T_4\cup}\cup_{k=1}^{\infty}\cup_{{ i_l=1,2\text{ or }3}, 1\leq l\leq k}T^o_{i_1\cdots i_k4}), \end{equation} where $T^o_{i_1\cdots i_k4}$ means the inner part of $T_{i_1\cdots i_k4}$.\\ \indent Let $S$ be contained in one open set $\Om$ in $\CC$. The Sierpinski triangle is not a $\sigma$-convex set. Otherwise, suppose that in $\Om$ there exists a sequence of holomorphically convex compact sets $K_j,\ j=1,2,\dots$, such that $S=\cup_{j=1}^\infty K_j$. But as the closed set of the complete metric space $\Om$, the Sierpinski triangle is itself a complete metric space, and hence a set of second category. By Bair category theorem there is at least one $K_j$ containing an induced non-empty open set $V$ in $S$. So there exists an open subset $U \subset\Om$, such that $V=U\cap S \subset K_j$. Let $v\in V\subset U$. For every $k\in \NN$ satisfying $2^{-k}<\text{dist}(v,\partial U)$, by (\ref{sier}), $v$ belongs to some one $T_{i_1\cdots i_k}$. Then $T_{i_1\cdots i_k}\subset U$. So $T_{i_1\cdots i_k4}$ is also in $U$. Since $\partial T_{i_1\cdots i_k4}\subset S$ we get $\partial T_{i_1\cdots i_k4}\subset V\subset K_j$. Then $T^o_{i_1\cdots i_k4}$ is one of the complement of $K_j$, it is clear that $T^o_{i_1\cdots i_k4}$ is also in $K_j$, which contradicts with Lemma \ref{finite}. \eE \bP \label{hull} Let $K_1$, $K_2$ be compact sets in $\CC$ with $K_1 \cap K_2=\emptyset$. Then $(K_1\cup K_2) ^\wedge= \widehat{K}_1\cup \widehat{K}_2$.\eP \begin{proof} It suffices to show that $(K_1\cup K_2) ^\wedge\subset \widehat{K}_1\cup \widehat{K}_2$. Let $U$ be a bounded connected component of $\CC\setminus ( K_1\cup K_2)$, and put $Q=\partial\widehat{\overline{U}}$. Then $$ Q\subset\partial{\overline{U}}\subset\partial U\subset\partial(\CC\setminus(K_1\cup K_2))=\partial K_1\cup K_2)\subset\overline{K_1\cup K_2}=K_1\cup K_2. $$ Since $Q$ is connected, it follows that $Q\subset K_1$ or $K_2$, and hence $U\subset\widehat{Q}\subset \widehat{K}_1\cup \widehat{K}_2$. Therefore, $(K_1\cup K_2) ^\wedge\subset \widehat{K}_1\cup \widehat{K}_2$. \end{proof} \bT \label{main} Let $E$ be a $\sigma$-convex set. Then there exist polynomially convex compact sets $E_n,\;n=1,2,\dots$ in $\Om$, such that $E_{n}\subset E_{n+1}$ for $ n\geq 1$ and $E= \cup_{n=1}^\infty E_n$.\eT \begin{proof} By the definition of $\sigma$-convex-set, $E$ can be written as \begin{equation} E =\bigcup_{j=1}^\infty K_{j}, \end{equation} where $K_j$ is the polynomially convex compact set for each $j$. For $r>0$ we denote by $N_r(A)$ the $r$-neighborhood of $A$. For a positive integer $n$ set $$F_{n1}= L_{n1}=K_1.$$ And step by step define \bee\label{lll}L_{nj}= K_j\setminus N_{1/n}\Big(\bigcup_{i=1}^{j-1} K_{i}\Big), \ F_{nj}={\widehat L}_{nj}, \ \hbox{for} \ 2\leq j\leq n.\eee Again denote by $$ E_n=\bigcup_{j=1}^n F_{nj}.$$ By Proposition \ref{hull} we obtain \begin{equation}\label{} E_n=\bigcup_{j=1}^{n}F_{nj}=\bigcup_{j=1}^{n}{\widehat L}_{nj}=\widehat{\bigcup_{j=1}^{n} L_{nj}}, \end{equation} i.e., the set $E_n$ is the polynomial hull of $\bigcup_{j=1}^{n} L_{nj}$. Since $L_{nj}\subset L_{(n+1)j}$ for each $n\in\NN$ and $1\leq j\leq n$ we have $E_n\subset E_{n+1}$. We now prove that \bee E=\bigcup_{n=1}^{\infty}E_n.\eee Let $z\in E$. Assume that $j$ is the first positive integer such that $z\in K_j$, i.e., $z$ in $ K_j$ but not in $K_j,i< j$. Then for $n>{1}/{\mathrm{dist}(z,\cup_{i=1}^{j-1}K_i)}$ we have $z\in K_j\setminus N_{\frac1n}(\cup_{i=1}^{j-1}K_i)=L_{nj}$. And so $E\subset\bigcup_{n=1}^{\infty}E_n$. On the other hand, let $z\in \bigcup_{n=1}^{\infty}E_n$. Then there exist $n$ such that $z\in E_n=\bigcup_{j=1}^{n}{F_{nj}}\subset \bigcup_{j=1}^{n}\widehat{K_j}=\bigcup_{j=1}^{n}K_j\subset E$.Therefore $E=\bigcup_{n=1}^{\infty} E_n$. \end{proof} We denote by $d(E,F)$ the Euclidean distance between subsets $E$ and $F$. \bL \label{L314} Let $E, \{K_n\}, \{E_n\}$ be as in Theorem \ref{main}. Let $U_n= N_{\frac{1}{3n}} (E_n)$. Then for every positive integer $m$, we have \bee \label{1}{\bigcap_{j=m}^{\infty} U_j \subset E}.\eee \eL \begin{proof} Otherwise, we suppose that there is an $m>0$ and $z\in\CC$ such that \bee \label{2} z\in (\bigcap_{j=m}^{\infty} U_j)\setminus E.\eee We first claim that \bee \label{3} z\in N_{\frac{1}{3n}} \big(\bigcup_{j=1}^{m} F_{nj}\big),\; \hbox{for} \ n=m, m+1,\dots.\eee We prove (\ref{3}) by induction on $n$. (\ref{3}) obviously holds for $n=m$ by $E_n=\cup_{j=1}^nF_{nj}$ and (\ref{2}). If there exists a positive integer $N$ so that (\ref{3}) is true for $n=N-1$ but not $n=N$. Put \bee Q=\bigcup_{j=m+1}^{N} F_{Nj}, \ R=Q\cap \big(\bigcup_{j=1}^{m}F_{Nj}\big), \ \hbox{and} \ S=\big(\bigcup_{j=1}^{m} F_{Nj}\big) \setminus R.\eee Suppose that $z\in R$. Then there exists $i$ and $k$ with $1\leq i\leq m<k\leq N$ such that $z\in F_{Ni}\cap F_{Nk}\subset K_i\cap F_{Nk}$. Hence, $z$ is not in $L_{Nk}$. Since $z\in F_{Nk}=\widehat{L_{Nk}}$, we have that $z$ belongs to one of the bounded components of the complement of $L_{Nk}$. But $N_{\frac1N}(z)\subset N_{\frac1N}(K_i)$ is contained in the complement of $L_{Nk}$. So $N_{\frac1N}(z)$ is just in this bounded component. Then $N_{\frac1N}(z)$ is contained in the polynomially convex of $L_{Nk}$, i.e., $N_{\frac1N}(z)\subset \widehat{L_{Nk}}=F_{Nk}$. So we obtain \begin{equation}\label{NR} N_{\frac{1}{N}}(R)\subset Q. \end{equation} Fix $i\leq m$. Let $z$ be in $K_i$ but not in $F_{Nk}$ for $m\leq k\leq N$. Then $z$ must be in the unbounded component of the complement of $L_{Nk}$ for $m\leq k\leq N$. Since $N_{\frac1N}(z)\subset N_{\frac1N}(K_i)$ does not intersect with $L_{Nk}$, we have that $N_{\frac1N}(z)$ is just in that unbounded component. That is $N_{\frac1N}(z)\cap \widehat{L_{Nk}}=\emptyset$ for each $m\leq k\leq N$. So we have \begin{equation}\label{NS} d(S,Q)\geq \frac1N. \end{equation} Since (\ref{3}) is assumed to hold for $N-1$, and $N_{\frac{1}{3N-3}} \big(\bigcup_{j=1}^{m} F_{N-1,j}\big)$ is the subset of $N_{\frac{1}{3N-3}}(\bigcup_{j=1}^{m}F_{Nj})=N_{\frac{1}{3N-3}} (S\cup R)$, we see that \bee \label{4} z\in N_{\frac{1}{3N-3}} (S\cup R).\eee But by the assumption that $z\notin E$, (\ref{NR}) and \bee \nonumber N_{\frac{1}{3N-3}} \big( R\big)\subset N_{\frac{1}{N}}\big(R\big)\subset Q\subset E\eee we obtain \begin{equation}\label{nnn} z\notin N_{\frac{1}{3N}} \big( R\big)\subset N_{\frac{1}{3N-3}} \big( R\big). \end{equation} It follows that \bee \label{5} z\in N_{\frac{1}{3N-3}}(S).\eee By (\ref{NS}) we obtain \ba {d(z,Q)&\geq d(Q,S)-d(z,S)\\ &\geq \frac{1}{N}-\frac{1}{3N-3} \geq \frac{1}{3N}\ .} Thus \bee \label{6} z\notin N_{\frac{1}{3N}} (Q)\ .\eee Combining (\ref{nnn}) with (\ref{6}) contradicts with $z\in U_N=N_{\frac{1}{3N}} (Q\cup S)$. Then we complete the induction step for (\ref{3}). At last, by $\bigcup_{j=1}^{m}F_{nj}\subset \bigcup_{j=1}^{m}K_j$, we see that \bee \hbox{d}\big(z, \bigcup_{j=1}^{m} K_j \big) < \frac{1}{3n} \ , \ \forall n\geq m. \eee Therefore, $z\in \bigcup_{j=1}^{m} K_j\subset E$, contradicting with (\ref{2}). The proof is complete. \end{proof} \bT \label{conv} Let $E$ be a convergence set { in $\Om$}. Then $E$ is a $\sigma$-convex set. Moreover, there exists an ascending sequence $\{E_j\}$ of holomorphically convex compact sets in $\Om$ such that $E=\cup_{j=1}^\infty E_j$.\eT \begin{proof} Let $E$ be the convergence set $\Conv_\Om(f)$ for $$ {f(z,t)=f_0(z)+f_1(z)t+\cdots+f_n(z)t^n+\cdots,}$$ where $f_{n} (z)\in \mathscr{O}(\Om)$. Denote by \begin{equation} E_{jn} = \{z\in\Om:\dist(z,\partial \Om)\ge 1/j, |z|\leq j, |f_n(z)|\leq j^n\},\;\forall j,n\in\NN, \end{equation} where $\dist(z,\partial \Om)$ is the distance between $z$ and the boundary of $\Om$. Every $E_{jn}$ is obviously compact. Let \begin{equation} E_j=\bigcap_{n=1}^\infty E_{jn},\;j\in\NN. \end{equation} Then we have \begin{equation} E_j\subset E_{j+1}, \;\;\text{for}\; j\geq 1. \end{equation} By the proof of Theorem~\ref{226}, $E=\cup_{j=1}^\infty E_j$. It follows from the definition of holomorphically convex sets that each $E_{jn}$ is holomorphically convex { in $\Om$}. It is also a direct consequence of the definition that the intersection of a family of holomorphically convex sets { in $\Om$} is holomorphically convex. Therefore each $E_j$ is a holomorphically convex compact set{ in $\Om$}. The proof of Theorem \ref{conv} is complete. \end{proof} For the domain $\Omega$ and a positive integer $m$ denote by \begin{equation} \Omega_m = \{z: z\in\Om, \dist(z,\partial \Om)\ge 1/m, |z|\leq m\}. \end{equation} \bL \label{9} Let $K$ be a polynomially convex compact subset in $\Omega$, $U\subset\Omega$ an open set containing $K$, and $m$ a positive integer. Then there exist a finite number of polynomials, $P_{m1}(z),\dots,P_{m\ell}(z)$, such that \begin{equation}\label{last1} |P_{mj}(z)| \leq 1, \ j=1,\cdots,\ell, \ \mathrm{for\ all}\ z\in K, \end{equation} and \begin{equation}\label{last2} \max_{j}\{|P_{m1}(z)|,\dots,|P_{m\ell}(z)|\}\geq m \ , \ \mathrm{for\ all}\ z\in \Omega_m\setminus U. \end{equation} \eL \begin{proof} Due to the polynomial convexity of $K$, for each $z_0\in \Om_m \setminus U$ there exists a polynomial $Q(z)$ such that $$ |Q(z)|\leq 1, \ \mathrm{for} \ z\in K, \ \ \hbox{and} \ \ |Q(z_0)|\geq m+1. $$ Then there is some neighborhood $V(z_0) \ \hbox{of}\ z_0$ such that $ |Q(z)|\geq m \ \hbox{for each} \ z\in V(z_0)$. Since $\Om_m \setminus U$ is compact there are a finite number of such open sets $V(z_1),\dots,V(z_{\ell})$ covering $\Om_m \setminus U$. The corresponding polynomials are denoted by $P_{mj}(z), \ \forall j=1,\dots, \ell$. Then $P_{mj}(z), \ \forall j=1,\dots, \ell$, satisfy (\ref{last1}) and (\ref{last2}). \end{proof} \rm Now we prove the main theorem of this paper. \bT \label{quas} $E\subset\Om$ is a convergence set { in $\Om$} if and only if it is $\sigma$-convex.\eT \begin{proof} By Corollary~ \ref{cor} and Theorem~ \ref{conv} we only need to prove 'if'.\\ \indent Let $E$ be a $\sigma$-convex set. By Theorem~\ref{main}, there exist polynomially convex compact sets $E_n$ such that $E=\bigcup_{n=1}^{\infty} E_n$, and $E_n\subset E_{n+1} \ \hbox{for} \ n\geq 1$. Let $U_n$ be the neighborhood of $E_n$ in Theorem~\ref{L314}, then we have $$\bigcup_{k=1}^{\infty}\bigcap_{n=k}^{\infty} U_n\subset E. $$ And by $E_k\subset E_{k+1}$ and $E_k\subset U_n$ for $n\geq k$ we obtain \bee \label{22} \nonumber E=\bigcup_{k=1}^{\infty}\bigcap_{n=k}^{\infty} U_n.\eee Now for each $k\in \NN$, let $P_{k1},\cdots,P_{kn_k}$ be the polynomials for $\Om_m=\Om_k,K=E_k$ and $U=U_k$ by Lemma \ref{9}. Then we have $$ |P_{ks}(z)| \leq 1 \ , \mathrm{for} \ z\in E_k,\ 1\leq s\leq n_k $$ and for every $z\in \Omega_{k}\setminus U_k$ there exists $j$, $1\leq j\leq n_k$, such that $$ |P_{kj}(z)|\ge k.$$ Enumerate the countable set of polynomials $\{\{P_{kj}\}_{j=1}^{n_k}\}_{k=1}^{\infty}$ by $\{h_\ell\}_{\ell=1}^{\infty}$ such that $h_1=P_{11},h_2=P_{12},\cdots,h_{n_1}=P_{1n_1},h_{n_1+1}=P_{21},\cdots$. Define $$ f_0(z)=1$$ and $$ f_{\ell}(z)=h_{\ell}^{\ell}(z) \ , \ \forall \ell\in\NN^+. $$ For any $z\in E$ there exist $k$ such that $z\in E_n$ for $n\geq k$. Then for $\ell>n_1+\cdots+n_k$ we have $|f_\ell(z)|\leq |h_\ell(z)| \leq1$. {It implies that $z\in \Conv_\Om(f)$. Thus $E\subset \Conv_\Om(f)$.} For any $z\in \Om\setminus E=\Om\setminus(\bigcup_{k=1}^{\infty}\bigcap_{n=k}^{\infty} U_n)=\bigcap_{k=1}^{\infty}\bigcup_{n=k}^{\infty} (\Om\setminus U_n)=\bigcap_{n=1}^{\infty}(\Om\setminus U_n)$, chose any positive integer $m$ such that $z\in \Om_{m}$. Then for any $k>m$ we have $z\in \Om_{k}$. By Lemma \ref{9} and taking $\Om_m=\Om_{k},K=E_k, U=U_k$, we have a polynomial $P_{kj}(z)$ such that $|P_{kj}(z)|> k$. Let $\ell=n_1+\cdots+n_{k-1}+j$. We obtain $$ |f_l(z)|> k^l\geq m^l. $$ To summarize, for each $z\notin E$, and for each positive integer $m$, there exist infinite positive integers $\ell$ such that $|f_{\ell}(z)|>m^{\ell}$. Consequently, it implies that { $z\notin \Conv_\Om(f)$. Hence $\Conv_\Om(f)\subset E$. Therefore $E=\Conv_\Om(f)$.} \end{proof} \noindent It is difficult to directly deal with the union of a countable collection of convergence sets { in $\Om$}. But by Theorem~\ref{quas} it is equivalent to the case of $\sigma$-convex sets, while the latter is easily done by definition. \bC The union of a countable collection of convergence sets { in $\Om$} is a convergence set { in $\Om$}.\eC \brs In this paper we don't confine the degree of the coefficient polynomials in the definition of the convergence set. However it is mentioned in the first section that $\Conv(f)$ is a polar set if the degree of coefficients $P_n(z)$ are assumed not great than $n$. While it is surprising that it is not essential for the degree of the coefficient polynomial when it is great than $n$. For $\varepsilon>0$, let the $n$-th term coefficients of $f(z,t)$ is polynomial with degree not great than $n^{1+\varepsilon}$. We call $\Conv(f)$ as the $\varepsilon$-convergence-set. Then the $E\subset \CC$ is a convergence set if only if it is an $\varepsilon$-convergence-set. In fact, Let $E=\Conv(f)$, where$ f(z,t)=\sum_{j=0}^\infty P_n(z)t^n$. Denote by $d_n$ the degree of $P_n$, $n=0,1,2,\cdots$. We take $m_{n}$ be a sequence of increasing integers satisfy that $m_n>(\frac{d_n}{n^{1+\varepsilon}})^{\frac1\varepsilon}$. Now let $F(z,t)=\sum_{j=0}^\infty (P_n(z))^{m_n}t^{nm_n}. $ Then $E=\Conv(f)=\Conv(F)$, and $E=\Conv(F)$ be an $\varepsilon$-convergence-set. \ers {\bf Acknowledgment.} We thank Buma Fridman for helpful discussions. Part of the third named author's work was done while visiting Tshinghua University Yau Mathematical Sciences Center during his sabbatical leave in spring 2014. He is grateful for the Center's hospitality and financial support.
\section{Introduction} When examining questions of algorithmic complexity, there are two principal approaches. The first of these approaches is based on Baire category; the second on measure. In each case, there are a variety of notions which formalize the concept of an unremarkable, or typical, subset of $\omega$ -- the set of all natural numbers. Following a convention established by set theorists, subsets of $\omega$ are referred to as {\em reals}. According to the category approach, a real is unremarkable if it is generic. That is, an unremarkable real must be an element of some prescribed collection of dense open subsets of the Cantor space $2^\omega$. The simplest example is that of a weakly 1-generic real: a real is {\em weakly 1-generic} iff it is a member of every dense computably enumerable (c.e.)~open subset of $2^\omega$. (An open set is c.e.~if it is the union of a set of basic neighborhoods determined by a c.e.~set of binary strings.) In a sense, weak 1-genericity is an effective form of Cohen genericity as considered in the theory of forcing. A number of natural notions arising in computablility theory turn out to be inherent properties of generic reals. For example, weakly 1-generic reals are {\em hyperimmune}. That is, the increasing enumeration of a weakly 1-generic subset of $\omega$ is not computably bounded. The present paper considers the following form of Cohen genericity. \begin{definition} A real $R \in 2^\omega$ is {\em $n$-generic} iff, for any $\Sigma^0_n$ set of strings $X \subseteq 2^{<\omega}$, either some initial segment of $R$ is in $X$ or some initial segment of $R$ has no extension in $X$. \end{definition} Turning to the measure theory approach, the associated formulation of ``unremarkable'' is that coming from algorithmic randomness. In the broadest terms, a real is random if it avoids every member of a specified class of null sets. For instance, a real is {\em Martin-L\"of random} if it is contained in no null $\Pi^0_2$ class $\bigcap_n U_n$ such that the Lebesgue measure of $U_n$ is bounded by $2^{-n}$. These null sets are referred to as {\em Martin-L\" of tests}. It has been argued that the definition of a Martin-L\"of test is too broad since the measures of the sets $U_n$ are potentially only left c.e.~real numbers. Of interest here is the following weaker notion of randomness. \begin{definition} A real is {\em Schnorr random} iff it is a member of no null $\Pi^0_2$ class $\bigcap_n U_n \subseteq 2^\omega$ where the measure of $U_n$ is uniformly computable in $n$ and bounded by $2^{-n}$. \end{definition} Intriguingly, there is a form of immunity -- called canonical immunity -- which is very closely associated with Schnorr randomness. The definition of canonical immunity is due to Bj\o rn Kjos-Hanssen and requires the concept of a canonical numbering. \begin{definition} Let $\mathcal P_{\sf fin} (\omega)$ denote the set of finite subsets of $\omega$. A {\em canonical numbering} is a surjective function $D: \omega \rightarrow \mathcal P_{\sf fin}(\omega)$ such that the predicate \[ P(x,e) \iff x \in D(e) \] and the function \[ e \mapsto \max (D(e)) \] are both computable. Equivalently, if $\mathcal P_{\sf fin} (\omega)$ is identified with the set of canonical codes for finite subsets of $\omega$, a canonical numbering can be regarded as a computable surjection $D : \omega \rightarrow \mathcal P_{\sf fin} (\omega)$. \end{definition} \begin{definition}[\cite{bkk}] An infinite set $R \subseteq \omega$ is {\em canonically immune} iff there is a total computable function $h : \omega \rightarrow \omega$ such that, given any fixed canonical numbering $D : \omega \rightarrow \mathcal P_{\sf fin} (\omega)$, \[ D(i) \subseteq R \implies |D(i)| \leq h(i) \] for all but finitely many $i$. Such a witnessing function $h$ is a {\em modulus of immunity} for $R$. \end{definition} The first author, together with Mushfeq Khan and Bj\o rn Kjos-Hanssen \cite{bkk}, have shown that every canonically immune set is immune and, moreover, that every Schnorr random is canonically immune with modulus of immunity $i \mapsto i$. The present paper provides some counterpoints to these observations and shows that the notion of canonical immunity is quite distinct from the standard notions of immunity and genericity in computability theory. The first main result of this paper shows in a strong way that canonical immunity is not a property of Cohen generic reals. \begin{thm::2-generic} If $G \in 2^\omega$ is 2-generic, $G$ computes no canonically immune set. \end{thm::2-generic} A corollary is that the class of reals which compute no canonically immune set is comeager. Theorem~\ref{2-generic} must be contrasted with the fact that, by Theorem~\ref{CI+HI} below, there are reals which are both canonically immune and hyperimmune. Kurtz \cite{kurtz} has shown that every hyperimmune is of weak 1-generic degree. Thus, there are weakly 1-generic reals which are Turing equivalent (and hence compute) canonically immune sets -- although the former must not be 2-generic by Theorem~\ref{2-generic}. There is another form of genericity in computability theory which arises from an effective version of a forcing poset introduced by A.~R.~D.~Mathias \cite{mathias}. Computable Mathias forcing has been studied in several papers. Notably, Cholak, Dzhafarov, Hirst and Slaman \cite{cdhs} show that every Mathias generic computes an $n$-generic. Section~\ref{mathias} below explores the connection between canonical immunity and Mathias genericity. Whereas $n$-generics (for $n \geq 2$) do not even compute canonically immune sets, Mathias generic sets are always canonically immune. Section~\ref{preliminaries} contains the necessary definitions relevant to Mathias forcing and Section~\ref{mathias} contains a proof of the following result. \begin{thm::mathias-generic} Every Mathias generic is canonically immune. \end{thm::mathias-generic} Using further forcing arguments, the last theorem can be used to show the following. \begin{thm::eff} There exists a set $R \subseteq \omega$ which is canonically immune and computes no effectively immune set. \end{thm::eff} In light of Theorems~\ref{2-generic} and \ref{mathias-generic}, canonical immunity can be regarded as a form of immunity associated with Mathias genericity rather than Cohen genericity. The final main result of this paper shows that there are canonically immune sets which are not Schnorr random, demonstrating that the class of canonically immune sets properly contains the class of Schnorr random reals. \begin{thm::schnorr} There exists a set $R\subseteq \omega$ which is a canonically immune set and not Schnorr random. \end{thm::schnorr} The proof of this result hinges on the observation that Mathias generics cannot be Schnorr random. \section{Preliminaries and notation}\label{preliminaries} \subsection{Standard notation} To a great extent, this paper follows the notation and terminology of Soare \cite{soare}. For the sake of completeness, the most important points are presented below. For $e \in \omega$, let $\{ e \} (n)$ denote the result of applying the Turing machine coded by $e$ to input $n$ -- regardless of whether or not this computation terminates. If $A$ is a subset of $\omega$, a function $\omega \rightarrow \omega$, or a finite string, then $\{ e \}^A (n)$ denotes the result of applying the oracle machine coded by $e$, with oracle $A$, to input $n$. When a finite string is used as an oracle and the oracle machine makes any queries outside the domain of the string, the computation automatically diverges. The notation $W_e$ indicates the domain of the Turing machine coded by $e$. If $A$ is an oracle, $W^A_e$ denotes the domain of the oracle machine coded by $e$ with oracle $A$. When computation time is restricted, $W^A_{e,s}$ denotes the domain of the oracle machine coded by $e$ with oracle $A$, when it is only allowed to run for $s$ computation stages. For sets $A , B \subseteq \omega$, write $A \leq_T B$ if $A$ is Turing reducible to $B$, i.e., there is a code $e$ for an oracle machine such that $\{ e \}^B$ is the characteristic function of $A$. For finite strings $\alpha , \beta \in 2^{< \omega}$, write $\alpha \preceq \beta$ to indicate that $\alpha$ is an initial segment of $\beta$. Let $\alpha {}^\smallfrown \beta$ denote the concatenation of $\alpha$ and $\beta$. If $R \subseteq 2^\omega$ and $\alpha \in 2^{<\omega}$, the notation $\alpha \prec R$ indicates that $\alpha$ is an initial segment of $R$. For a string $\alpha$, the length of $\alpha$ is indicated by ${\rm length} (\alpha)$. If $X \subseteq 2^{<\omega}$ is a set of binary strings and $\sigma \in 2^{<\omega}$, then $X$ is {\em dense below $\sigma$} iff every $\tau \succeq \sigma$ has an extension in $X$. If every binary string has an extension in $X$, then $X$ is called {\em dense}. If $F \subseteq \omega$ is a finite set and $\alpha \in 2^{<\omega}$ is a finite string, $F \subseteq \alpha$ means that $\alpha (n) = 1$ for each $n \in F$, i.e., $F$ is a subset of the finite set of which $\alpha$ is the characteristic function. For any set $S$, let $|S|$ be the cardinality of $S$. A function $f : \omega \rightarrow \omega$ is $\Delta^0_2$ or {\em limit computable} iff there is a uniformly computable sequence $(f_s)_{s \in \omega}$ of total functions such that $f$ is the pointwise limit of $(f_s)_{s \in \omega}$. If $F \subseteq \omega$ is a finite set, the {\em canonical code} for $F$ is the integer $\sum_{n \in F} 2^n$. The set $\mathcal P_{\sf fin} (\omega)$ of all finite subsets of $\omega$ is identified with the set of all canonical codes. With this in mind, it is sensible to consider computable functions $D : \omega \rightarrow \mathcal P_{\sf fin} (\omega)$. The key properties of a computable function $D : \omega \rightarrow \mathcal P_{\sf fin} (\omega)$ are \begin{enumerate} \item the predicate ``$x \in D(i)$'' is computable and \item the function $i \mapsto \max (D(i))$ is computable. \end{enumerate} \subsection{The Ellentuck topology and Mathias forcing} While $n$-genericity derives from a study of the standard topology on $2^\omega$, Mathias genericity is based upon a non-standard topology on the space of infinite subsets of $\omega$. Let $[\omega]^{\aleph_0}$ denote the set of all infinite subsets of $\omega$, regarded as a $G_\delta$ subspace of $2^\omega$. Given a finite set $a \subseteq \omega$ and an infinite set $A \subseteq \omega$ with $\max (a) < \min (A)$, let \[ [a,A] = \{ R \in [\omega]^{\aleph_0} : a \subseteq R \subseteq a \cup A\}. \] The sets $[a,A]$ form the basis of a strong Choquet (hence Baire) topology on $[\omega]^{\aleph_0}$, which is not second countable. This topology is called the {\em Ellentuck topology}. The fact that the Ellentuck topology is Baire implies that the countable intersection of dense open sets is nonempty. Section 19.D of Kechris \cite{kechris} is a clear account of the most important properties of the Ellentuck topology. \begin{remark} For $[a,A]$ and $[b,B]$ as above, $[b,B] \subseteq [a,A]$ iff $a \subseteq b$, $b\setminus a \subseteq A$ and $A \supseteq B$. (See Kechris \cite{kechris}, exercise 19.12.) \end{remark} The analogue of the Ellentuck topology in the context of computability theory is the {\em effective Ellentuck topology}, wherein the basic open sets consist only of those $[a , A]$ such that $A$ is an infinite computable subset of $\omega$. This topology is also strong Choquet and is, in addition, second countable. The effective Ellentuck topology is the basis of computable Mathias forcing (see Cholak, Dzhafarov, Hirst and Slaman \cite{cdhs}). The basic open sets in the effective Ellentuck topology are called {\em Mathias conditions}. \begin{definition} If $\mathcal X$ is a family of Mathias conditions -- i.e., basic open sets in the effective Ellentuck topology -- and $R \in [\omega]^{\aleph_0}$, then $R$ {\em meets} $\mathcal X$ iff there exists $[a,A] \in \mathcal X$ such that $R \in [a,A]$. A family $\mathcal X$ of Mathias conditions is {\em dense} iff every Mathias condition contains a member of $\mathcal X$. A set $R \subseteq \omega$ is {\em Mathias generic} iff $R$ meets every arithmetically definable dense set of Mathias conditions. \end{definition} A set $\mathcal X$ of Mathias conditions is dense iff the open set $\bigcup \mathcal X$ is dense in the effective Ellentuck topology on $[\omega]^{\aleph_0}$. This observation, combined with the fact that the effective Ellentuck topology is Baire, guarantees the existence of Mathias generic reals. \begin{remark} If $R \subseteq \omega$ is Mathias generic, then $R$ is infinite. This follows from the fact that \[ \mathcal X_n = \{ [a,A] : |a| \geq n\} \] is a dense set of conditions. \end{remark} \section{Basic results} The proof of the following theorem shows a method for producing a $\Delta^0_2$ canonically immune set. An immediate consequence of this is that there are canonically immune sets which do not compute any 2-generic reals. \begin{theorem}\label{delta two} There is a $\Delta^0_2$ set $R \subseteq \omega$ which is canonically immune. \end{theorem} \begin{proof} Let $\varphi : \omega^2 \rightarrow \mathcal P_{\sf fin} (\omega)$ be a universal partial computable function and define \[ D_{e,s} (i) = \begin{cases} \varphi_e (i) &\mbox{if $\varphi_e (i)$ converge in $s$ or fewer stages},\\ \emptyset &\mbox{otherwise}. \end{cases} \] In particular, given a canonical numbering $D : \omega \rightarrow \mathcal P_{\sf fin} (\omega)$, there is an $e \in \omega$ such that for each $i$, \[ D(i) = \lim_s D_{e,s} (i). \] For $s \in \omega$, inductively pick $x_{n,s} \in \omega$ to be least such that \[ x_{0,s} < x_{1,s} < \ldots \] and \[ x_{n,s} \notin \bigcup \{ D_{e,s} (i) : e,i \leq n \mbox{ and } |D_{e,s} (i)| > i\}. \] Let $x_n = \lim_s x_{n,s}$. For each $n \in \omega$, this limit exists because $s$ may be chosen large enough that $D_{e,s} (i)$ has stabilized for all $e,i \leq n$. Note that \[ x_0 < x_1 < \ldots \] and let \[ R = \{ x_n : n \in \omega\}. \] Observe that $R$ is $\Delta^0_2$. {\em Claim.} $R$ is canonically immune. It suffices to show that, for each canonical numbering $D$, there exists $k \in \omega$ such that $|D(i)| \leq i$ whenever $D(i) \subseteq R$ and $i \geq k$. Indeed, fix a canonical numbering $D : \omega \rightarrow \mathcal P_{\sf fin} (\omega)$ with $D = \lim_s D_{e,s}$. Suppose that $D(i) \subseteq R$ for some $i \geq e$. Let $n$ be least such that \[ D(i) \subseteq \{ x_0 , \ldots , x_n\}. \] Pick $s$ large enough that $D_{j,s} (q)$ (for $j,q \leq i$) and $x_{p,s}$ (for $p \leq n$) have all stabilized. If $n < i$, then \[ |D(i)| \leq n+1 \leq i. \] On the other hand, if $n \geq i$, the choice of $x_{n,s}$ and the fact that \[ x_{n,s} = x_n \in D(i) = D_{e,s} (i) \] guarantee $|D(i)| \leq i$ since $e , i \leq n$. As $D$ was arbitrary, this shows that $R$ is canonically immune and completes the proof. \end{proof} \begin{theorem}\label{bci} There is a set $R \subseteq \omega$ such that both $R$ and $\omega \setminus R$ are canonically immune, i.e., $R$ is {\em bi-canonically immune}. \end{theorem} \begin{proof} Let $D_0 , D_1 , \ldots$ list all canonical numberings and let $\langle \cdot , \cdot \rangle$ be a fixed computable pairing function. Let $f : \omega \rightarrow \omega$ be a computable function having the property that \[ \langle e , i \rangle \leq f(i) \] for all $i \geq e$, e.g., $f(i) = \max_{e \leq i} \langle e , i \rangle$. For convenience, denote by $I_p$ the set $\{ 2p , 2p+1 \}$ for each $p \in \omega$. The construction of $R$ proceeds in stages and produces finite sets $R_s , Q_s , F_s \subseteq \omega$ such that \begin{itemize} \item $|F_s| \leq 2s$, \item $R_s \cap Q_s = \emptyset$ and \item $R_s \cup Q_s = \bigcup_{p \in F_s} I_p$. \end{itemize} To begin with, define \[ R_0 = Q_0 = F_0 = \emptyset. \] Suppose now, at stage $s = \langle e , i \rangle$, the finite sets $R_s$, $Q_s$ and $F_s$ are given with the above properties. {\em Case 1.} If either $i < e$ or $|D_e (i)| \leq 4f(i) + 3$, let $R_{s+1} = R_s$, $Q_{s+1} = Q_s$, $F_{s+1} = F_s$ and end the stage. {\em Case 2.} Suppose $i \geq e$ and $|D_e(i)| > 4f(i) + 3$. Because $|F_s| \leq 2s$, the finite union $\bigcup_{p \in F_s} I_p$ has cardinality at most $4s = 4\langle e , i \rangle \leq 4 f(i)$. Thus, there are distinct $p_s,q_s \notin F_s $ with \[ D_e (i) \cap I_{p_s} \neq \emptyset \mbox{ and } D_e (i) \cap I_{q_s} \neq \emptyset. \] Let $x , y , z , w \in \omega$ be such that $I_{p_s} = \{ x , y \}$, $I_{q_s} = \{ z , w \}$, $x \in D_e (i) \cap I_{p_s}$ and $z \in D_e (i) \cap I_{q_s}$. Now define \begin{itemize} \item $R_{s+1} = R_s \cup \{ y , z\}$, \item $Q_{s+1} = Q_s \cup \{ x , w \}$ and \item $F_{s+1} = F_s \cup \{ p_s , q_s \}$. \end{itemize} This completes case 2 of stage $s$. To finish the construction, let $F = \bigcup_s F_s$, \[ R = \{ 2p : p \notin F\} \cup \bigcup_s R_s \] and \[ Q = \{ 2p+1 : p \notin F\} \cup \bigcup_s Q_s. \] Notice that $R$ and $Q$ are both infinite and $R = \omega \setminus Q$. The construction is symmetric in $R$ and $Q$. Hence, the following claim suffices to complete the proof. {\em Claim.} $R$ is canonically immune with modulus of immunity $i \mapsto 4f(i) + 3$. Indeed, fix a canonical numbering $D_e : \omega \rightarrow \mathcal P_{\sf fin} (\omega)$ and suppose \[ |D_e(i)| > 4f(i) + 3 \] for some $i \geq e$. By adding $p_s$ to $F_s$, the strategy at stage $s = \langle e , i \rangle$ renders $I_{p_s}$ unavailable for use at later stages and guarantees that $R_t$ does not contain $D_e (i)$ for any $t \geq s$. Specifically, the element $x \in D_e (i) \cap I_{p_s}$ is permanently withheld from $\bigcup_s R_s$. Since $\{ 2p : p \notin F \}$ is disjoint from $\bigcup_s R_s$, the larger set $R$ must also not contain $D_e (i)$. \end{proof} \begin{theorem} The canonically immune degrees are cofinal in the Turing degrees. \end{theorem} \begin{proof} The objective is to construct a canonically immune set $R$ such that $A \leq_T R$ for any fixed $A \subseteq \omega$. Let $D_0 , D_1 , \ldots$ list all canonical numberings. Choose natural numbers \[ p_0 < p_1 < \ldots \] such that \[ 2p_n , 2p_n +1 \notin \bigcup \{ D_e (i) : e,i \leq n \mbox{ and } |D_e(i)| > i\}. \] Let \[ Q = \{ 2p_n : n \in \omega \} \cup \{ 2p_n + 1 : n \in \omega\}. \] To see that $Q$ is canonically immune with modulus of immunity $i \mapsto 2i+1$, suppose $D_e (i) \subseteq Q$ for some $i \geq e$. Pick the least $n$ such that \[ D_e (i) \subseteq \{ 2p_j : j \leq n \} \cup \{ 2p_j + 1 : j \leq n\}. \] In particular, either $2p_n \in D_e (i)$ or $2p_n + 1 \in D_e (i)$. If $n < i$, then \[ |D_e (i)| \leq 2n + 2 \leq 2i + 1. \] On the other hand, if $n \geq i$, the choice of $p_n$ guarantees that $|D_e (i)| \leq i$. Now suppose that $A \subseteq \omega$ is any fixed set. Let \[ R = \{ 2p_n : n \in A\} \cup \{ 2p_n + 1 : n \notin A\}. \] As an infinite subset of the canonically immune set $Q$, $R$ must itself be canonically immune. Also $A \leq_T R$ since, for each $n \in \omega$, \[ n \in A \iff \mbox{the $n$th element of $R$ is even.} \] This completes the proof. \end{proof} \section{Cohen generic reals}\label{generic} Whereas Cohen genericity (especially weak 1-genericity) is closely related to immunity and hyperimmunity, the following initial observation already shows that there is not as strong a connection between Cohen genericity and canonical immunity. \begin{theorem} No weak 1-generic is canonically immune. \end{theorem} \begin{proof} Suppose that $G \in 2^\omega$ is weakly 1-generic. Fix a computable function $f: \omega \rightarrow \omega$ and a canonical numbering $D : \omega \rightarrow \mathcal P_{\sf fin} (\omega)$ such that, for infinitely many $i$, \begin{itemize} \item $\min (D(i)) > i$ and \item $|D(i)| > f(i)$. \end{itemize} Let \[ X_n = \{ \sigma \in 2^{< \omega} : (\exists i \geq n)(D(i) \subseteq \sigma \mbox{ and } |D(i)| > f(i) )\}. \] Each $X_n$ is c.e.~and dense. Thus, $G$ has an initial segment in each $X_n$. In particular, there are infinitely many $i$ such that $D(i) \subseteq G$ and $|D(i)| > f(i)$. It follows that $f$ is not a modulus of immunity for $G$. As $f$ was arbitrary, $G$ cannot be canonically immune. \end{proof} As a counterpoint, there are weakly 1-generic reals which are Turing equivalent to canonically immune sets. This is a consequence of the following theorem, along with the fact, due to Kurtz \cite{kurtz}, that every hyperimmune is Turing equivalent to a weak 1-generic. \begin{theorem}\label{CI+HI} There is a canonically immune set $R$ which is also hyperimmune. \end{theorem} \begin{proof} Let $D_0 , D_1 , \ldots$ be a list of all canonical numberings and $f_0 , f_1 , \ldots$ a list of all total computable functions. For each $s \in \omega$, consider the finite set \[ F_s = \bigcup \{ D_e (i) : i,e \leq s \mbox{ and } |D_e(i)| > i\}. \] Inductively pick $x_s \notin F_s$ large enough that \[ x_s > x_{s-1} \mbox{ and } x_s > f_s (s). \] Let $R = \{ x_s : s \in \omega\}$. {\em Claim.} $R$ is canonically immune with modulus of immunity $i \mapsto i$. Fix a canonical numbering $D = D_e$ and suppose $i \geq e$ is such that \[ D_e(i) \subseteq R \mbox{ and } |D_e (i) | > i. \] By the choice of $x_s$, \[ D_e (i) \subseteq \{ x_0 , \ldots , x_{i - 1}\}. \] In particular, $|D_e (i)| \leq i$, which is a contradiction. Thus, for all $i \geq e$, if $D_e(i) \subseteq R$, then $|D_e(i)| \leq i$. {\em Claim.} $R$ is hyperimmune. To see this, note that $x_0 < x_1 < \ldots$ is the increasing enumeration of $R$ and, since each $x_s$ is greater than $f_s (s)$, there is no computable bound for the function \[ s \mapsto x_s. \] This completes the proof. \end{proof} On the other hand, a canonically immune set need not be hyperimmune. \begin{theorem}\label{cinothi} There exists a set $R \subseteq \omega$ which is canonically immune and such that neither $R$ nor $\omega \setminus R$ are hyperimmune. \end{theorem} \begin{proof} Let $D_0 , D_1 , \ldots$ list all canonical numberings and let $\langle \cdot , \cdot \rangle$ be a fixed computable pairing function. As in the proof of Theorem~\ref{bci}, choose a computable function $f: \omega \rightarrow \omega$ such that, for all $e$ and $i \geq e$, \[ \langle e,i \rangle \leq f(i), \] and let $I_p = \{ 2p , 2p+1\}$ for $p \in \omega$. The proof proceeds inductively and produces finite sets $R_s , F_s \subseteq \omega$ such that \begin{itemize} \item $|F_s| \leq s$ and \item $R_s \subseteq \bigcup_{p \in F_s} I_p$. \end{itemize} To begin the induction, let $R_0 = F_0 = \emptyset$. At stage $s = \langle e,i \rangle$, suppose that $R_s$ and $F_s$ are given with the above properties. There are two cases. {\em Case 1.} If $i < e$ or $|D_e (i)| \leq 2 f(i)$, let $R_{s+1} = R_s$ and $F_{s+1} = F_s$. {\em Case 2.} Suppose $i \geq e$ and $|D_e (i)| > 2 f(i)$. Also, $|D_e(i)| > 2s$ since $f(i) \geq \langle e,i \rangle = s$ by the choice of $f$. It follows that \[ D_e(i) \setminus \bigcup_{p \in F_s} I_p \neq \emptyset \] because $|F_s| \leq s$ and each $I_p$ has cardinality 2. Therefore, pick $p_s \notin F_s$ and $x_s \in I_{p_s}$ such that \[ x_s \in D_e(i) \cap I_{p_s}. \] Let \[ R_{s+1} = R_s \cup (I_{p_s} \setminus \{ x_s \}) \] and \[ F_{s+1} = F_s \cup \{ p_s \}. \] Now let $F = \bigcup_s F_s$ and \[ R = \bigcup_s R_s \cup \{ 2p : p \notin F\}. \] {\em Claim.} $R$ is canonically immune with modulus of immunity $i \mapsto 2 f(i)$. Suppose that $D_e : \omega \rightarrow \mathcal P_{\sf fin} (\omega)$ is a canonical numbering and $|D_e (i)| > 2f(i)$ for some $i \geq e$. As in the proof of Theorem~\ref{bci}, the strategy at stage $s = \langle e , i \rangle$ ensures that the element $x_s \in D_e (i)$ is withheld from $R$. {\em Claim.} $R$ and $\omega \setminus R$ are not hyperimmune. Indeed, for each $p \in \omega$, \[ | R \cap I_p | = |(\omega \setminus R) \cap I_p| = 1. \] Given that $I_p = \{ 2p , 2p+1\}$, the $k$th elements of $R$ and $\omega \setminus R$ must both be no more that $2k$. In other words, the increasing enumerations of $R$ and $\omega \setminus R$ are bounded by the computable function $k \mapsto 2k$. \end{proof} \begin{remark} Theorem~\ref{cinothi} could also be obtained by constructing a Schnorr random of density $\frac{1}{2}$ and then using the fact that every Schnorr random is canonically immune along with the observation that a set of positive density cannot be hyperimmune. \end{remark} The main result proved in this section (Theorem~\ref{2-generic}) states that no 2-generic real computes a canonically immune set. Although the next theorem is a consequence of Theorem~\ref{2-generic}, its proof illustrates the method used to diagonalize against canonically immune sets in the proof of Theorem~\ref{2-generic}. \begin{theorem} There is a set $R \subseteq \omega$ which is hyperimmune and not canonically immune. \end{theorem} \begin{proof} For each total computable function $f : \omega \rightarrow \omega$, let $H_f : \omega \rightarrow \mathcal P_{\mathsf{fin}} (\omega)$ be a computable function such that \begin{itemize} \item $|H_f (n)| > f(2n)$, \item $\min \left(H_f (n)\right) \geq n$ and \item the $H_f (n)$ are pairwise disjoint sets. \end{itemize} Let $f_0 , f_1 , \ldots$ list all total computable functions and let $\langle \cdot , \cdot \rangle$ be a fixed computable pairing function. Define $n_p$ inductively as follows: if $0 = \langle a , b \rangle$, let $n_0 > f_a (0)$. Given $p = \langle i , k \rangle$ and $n_0 , \ldots , n_{p-1}$, let \[ s = \sum_{\langle j,q \rangle < p} \left| H_{f_j} (n_{\langle j , q \rangle}) \right| \] and choose $n_p \in \omega$ such that \begin{itemize} \item $n_p > f_i (s+1)$ and \item $H_{f_i} (n_p)$ is disjoint from all $H_{f_j} (n_{\langle j,q \rangle})$ for $\langle j,q \rangle < p$. \end{itemize} It possible to choose such an $n_p$ because the sets $H_{f_i} (n)$ are pairwise disjoint and nonempty for each fixed $f_i$. Let \[ R = \bigcup_{i,k \in \omega} H_{f_i} (n_{\langle i,k \rangle}). \] Noting that $R$ is infinite, the following two claims suffice to complete the proof. {\em Claim.} $R$ is hyperimmune. It suffices to show that the increasing enumeration of $R$ is not eventually bounded by any of the $f_i$. Indeed, fix $k \in \omega$ and let \[ s = \sum_{\langle j,q \rangle < \langle i , k \rangle} \left| H_{f_j} (n_{\langle j,q \rangle}) \right|. \] The minimum element of $H_{f_i} (n_{\langle i , k \rangle})$ is therefore the $(s+1)$st element of $R$. By the choice $n_{\langle i , k \rangle}$ and the definition of $H_{f_i}$, \[ f_i(s+1) < n_{\langle i , k \rangle} \leq \min \left( H_{f_i} (n_{\langle i,k \rangle}) \right). \] As $k$ was arbitrary, the increasing enumeration of $R$ must infinitely often exceed $f_i$. {\em Claim.} $R$ is not canonically immune. Fix one of the $f_i$. To see that $f_i$ is not a modulus of immunity for $R$, let $D : \omega \rightarrow \mathcal P_{\mathsf{fin}} (\omega)$ be a canonical numbering with the property that \[ D(2n) = H_{f_i} (n) \] for each $n \in \omega$. For $k \in \omega$, \[ D(2 n_{\langle i, k \rangle}) \subseteq R \] and, by the definition of $H_{f_i}$, \[ \left| D(2 n_{\langle i,k \rangle}) \right| > f_i (2 n_{\langle i,k \rangle}). \] This completes the proof. \end{proof} As discussed in the introduction, no 2-generic bounds a canonically immune real. \begin{theorem}\label{2-generic} If $G \in 2^\omega$ is 2-generic, $G$ computes no canonically immune real. \end{theorem} \begin{proof} Fix a 2-generic real $G \in 2^\omega$. It suffices to show that $W^G_e$ is not canonically immune for any $e \in \omega$. To this end, fix $e \in \omega$ and a computable function $f: \omega \rightarrow \omega$. The objective of the proof is to show that $f$ is not a modulus of immunity for $W^G_e$. Consider first the $\Pi^0_1$ set of strings \[ X = \{ \sigma \in 2^{< \omega} : (\forall \tau \succeq \sigma) (W^\tau_{e , {\rm length} (\tau)} = W^\sigma_{e , {\rm length} (\sigma)})\}. \] As $G$ is 2-generic, there is either an initial segment of $G$ in $X$, or some $\sigma \prec G$ such that no extension of $\sigma$ is in $X$. In the first case, $W^G_e$ is finite and consequently not canonically immune. In the second case, suppose $\sigma \prec G$ is such that no extension of $\sigma$ is in $X$. In particular, for each $\tau \succeq \sigma$, there exists $\tau' \succeq \tau$ with \[ W^{\tau'}_{e , {\rm length} (\tau')} \setminus W^\tau_{e , {\rm length} (\tau)} \neq \emptyset. \] By induction, it follows that, for each $\tau \succeq \sigma$ and $n \in \omega$, there is a $\rho \succeq \tau$ with \[ \left| W^\rho_e \right| \geq n. \] Fix a computable enumeration $\alpha_0 , \alpha_1 , \ldots$ of $2^{<\omega}$ and a computable pairing function $\langle \cdot , \cdot \rangle$. Let $\beta : \omega^2 \rightarrow 2^{<\omega}$ be a computable function such that, for each $i , n \in \omega$, \[ |W^{\sigma {}^\smallfrown \alpha_i {}^\smallfrown \beta( i , n )}_e| > f(2 \langle i , n \rangle). \] The function $\beta$ is defined for every pair $i,n$ since each $\tau \succeq \sigma$ has an extension $\rho$ with $|W^\rho_e| > f(2\langle i , n \rangle)$ by remarks above. Let $H : \omega^2 \rightarrow \mathcal P_{\sf fin} (\omega)$ be a computable function such that, for $i,n \in \omega$, \begin{itemize} \item $|H(i,n)| > f( 2 \langle i , n \rangle)$ and \item $H( i , n ) \subseteq W^{\sigma {}^\smallfrown \alpha_i {}^\smallfrown \beta( i , n )}_e$. \end{itemize} For instance, $H$ could output a canonical index for the finite set consisting of the first $f(2\langle i , n \rangle) + 1 $ elements enumerated into $W^{\sigma {}^\smallfrown \alpha_i {}^\smallfrown \beta( i , n )}_e$. Consider now the $\Sigma^0_1$ set of strings \[ Y_n = \{ \sigma {}^\smallfrown \alpha_i {}^\smallfrown \beta ( i , n ) : i , n \in \omega\}. \] Observe that each $Y_n$ is dense below $\sigma$. Hence, each $Y_n$ must contain an initial segment of $G$ since $G$ is 2-generic and $\sigma \prec G$. For each pair $i , n \in \omega$ with $\sigma {}^\smallfrown \alpha_i {}^\smallfrown \beta (i , n) \prec G$, \[ H ( i , n ) \subseteq W^{\sigma {}^\smallfrown \alpha_i {}^\smallfrown \beta( i , n )}_e \subseteq W^G_e, \] by the choice of $H$. Therefore, let $D : \omega \rightarrow \mathcal P_{\sf fin} (\omega)$ be any canonical numbering such that \[ D( 2 \langle i , n \rangle ) = H( i , n ). \] Whenever $\sigma {}^\smallfrown \alpha_i {}^\smallfrown \beta (i , n) \prec G$, \[ D(2 \langle i , n \rangle) \subseteq W^G_e. \] In particular, there are infinitely many $k$ such that $D(k) \subseteq W^G_e$ and $|D(k)| > f(k)$. As $f$ was arbitrary, it follows that $W^G_e$ is not canonically immune. \end{proof} \begin{remark} The proof of Theorem~\ref{2-generic} actually establishes a stronger result than necessary: no canonically immune real is $\Sigma^0_1$ (i.e., c.e.) in a 2-generic. \end{remark} Because the set of 2-generic reals is comeager, Theorem~\ref{2-generic} yields the following corollary. \begin{corollary} The set of reals which bound no canonically immune set is comeager. \end{corollary} \section{Mathias generic reals}\label{mathias} In this section, if $a \subseteq \omega$ is a finite set, $\chi_a \in 2^{<\omega}$ denotes the binary string of length $\max(a) + 1$ such that \[ \chi_a (n) = 1 \iff n \in a. \] As described in the introduction, there is a relationship between canonical immunity and Mathias genericity. \begin{theorem}\label{mathias-generic} Every Mathias generic is canonically immune. \end{theorem} \begin{proof} For each canonical numbering $D : \omega \rightarrow \mathcal P_{\sf fin} (\omega)$, define a family $\mathcal X_D$ of Mathias conditions by \[ \mathcal X_D = \{ [a,A] : (\forall i \geq |a| ) (D(i) \subseteq a \cup A \implies |D(i)| \leq i)\}. \] {\em Claim.} For each canonical numbering $D$, the set $\mathcal X_D$ of Mathias conditions is dense. Indeed, fix a Mathias condition $[a,A]$. Let $n \mapsto x_n$ be the increasing enumeration of the infinite computable set $A$. Inductively choose \[ n_{|a|+1} < n_{|a|+ 2} < \ldots, \] where each $n_i$ is least such that \[ x_{n_i} \notin \bigcup_{|a| \leq j < i} D(j) \] for $i > |a|$. Let \[ B = \{ x_{n_i} : i > |a|\} \] and observe that $B$ is an infinite computable subset of $A$. To see that $[a,B] \in \mathcal X_D$, suppose $D(i) \subseteq a \cup B$ for some $i \geq |a|$. By the choice of $n_i$, \[ D(i) \subseteq a \cup \{ x_{n_{|a|+1}} , \ldots , x_{n_i}\}. \] In particular, $|D(i)| \leq |a| + (i - |a|) = i$ and hence $[a,B] \in \mathcal X_D$. Since $B \subseteq A$, it follows that $[a,A] \supseteq [a,B]$. This shows that $\mathcal X_D$ is dense. {\em Claim.} If $R$ meets each $\mathcal X_D$, then $R$ is canonically immune. Fix a canonical numbering $D$ and let $[a,A]$ be such that \[ R \in [a,A] \in \mathcal X_D. \] If $i \geq |a|$ and $D(i) \subseteq R$, then also $D(i) \subseteq a \cup A$ and hence, by the definition of $\mathcal X_D$, \[ |D(i)| \leq i. \] As $D$ was arbitrary, $R$ must be canonically immune with modulus of immunity $i \mapsto i$. It now follows that any Mathias generic real is canonically immune. \end{proof} \begin{remark} When working with computable Mathias forcing, the typical approach is to identify each Mathias condition $[a,A]$ with a pair $(x,e)$ where $x$ is a canonical code for the finite set $a$ and $e$ is a Turing machine code for the characteristic function of $A$. Thus, the statement that $[a,A]$ is a Mathias condition is equivalent to the $\Pi^0_2$ statement \begin{enumerate} \item $\{ e \}$ is total, \item $(\forall n) (\{ e \} (n) \in \{ 0 , 1 \})$, \item $(\exists^\infty n ) (\{ e \} (n) = 1)$ (i.e., $A$ is infinite) and \item $\max (a) < \min (A)$. \end{enumerate} Examining the proof of Theorem~\ref{mathias-generic} reveals that the dense sets $\mathcal X_D$ required to show that Mathias generics are canonically immune are $\Pi^0_1$ definable sets of Mathias conditions. Thus, the sets of codes for these conditions are $\Pi^0_2$ and hence $\Sigma^0_3$. In particular, only Mathias 3-genericity is required to obtain canonical immunity. Refer to \cite{cdhs} for the definition of Mathias $n$-genericity. \end{remark} In view of the remarks above, Theorem~\ref{2-generic}, along with the result of Theorem~\ref{mathias-generic}, gives an alternative proof of a result from \cite{cdhs}. \begin{corollary}[Cholak-Dzhafarov-Hirst-Slaman~\cite{cdhs}] If $G$ is Cohen 2-generic, then $G$ bounds no Mathias 3-generic. \end{corollary} Binns, Kjos-Hanssen, Lerman and Solomon \cite[Corollary 6.7]{Binns}, have shown that every Mathias 3-generic is {\em high}, i.e., if $G$ is Mathias 3-generic, $G' \geq_T \emptyset''$. On the other hand, Kurtz showed in his Ph.D.~thesis that the set of reals which are not high has Lebesgue measure 1 in $2^\omega$. In particular, there are Schnorr random reals -- hence, canonically immune reals -- which are not high since the class of Schnorr random reals also has measure 1. It follows that there is a measure 1 set of canonically immune reals which do not compute Mathias 3-generics. Therefore, by asserting that no 2-generic computes a canonically immune set, Theorem~\ref{2-generic} above is strictly stronger than the Cholak-Dzhafarov-Hirst-Slaman result. The last topic of this section is the relationship between canonical and effective immunity. The following proposition is a consequence of existing results. \begin{proposition} Every effectively immune set computes a canonically immune set. \end{proposition} \begin{proof} Every effectively immune set computes a fixed point free function and hence a DNC. By unpublished work of Noam Greenberg and Joe Miller, every DNC computes an infinite subset of a Martin-L\" of random and hence computes an infinite subset of a Schnorr random. The proposition now follows by Beros--Khan--Kjos-Hanssen \cite[Corollary 5.6]{bkk}, which states that every infinite subset of a Schnorr random computes a canonically immune set. \end{proof} \begin{theorem}\label{eff} There exists a set $R \subseteq \omega$ which is canonically immune and computes no effectively immune set. \end{theorem} The following lemma is a typical application of forcing methods in computability theory. Combining it with the assertion (Theorem~\ref{mathias-generic}) that every Mathias generic is canonically immune yields the theorem above. \begin{lemma}\label{computes} If $R \in [\omega]^{\aleph_0}$ is Mathias generic, then $R$ computes no effectively immune set. \end{lemma} \begin{proof} Given $e \in \omega$ and a computable function $h : \omega \rightarrow \omega$, let $\mathcal D_{e , h}$ be the set of Mathias conditions $[a,A]$ such that either \begin{enumerate} \item $(\exists i \in \omega) (W_i \subseteq W^{\chi_a}_e \mbox{ and } |W_i| > h(i))$ or \item $(\exists n \in \omega) (\forall b \in \mathcal P_{\sf fin} (\omega)) ( a \subseteq b \subseteq a \cup A \implies |W^{\chi_b}_e| \leq n)$. \end{enumerate} The sets $\mathcal D_{ e , h }$ are all arithmetical families of Mathias conditions. {\em Claim.} Each $\mathcal D_{e , h}$ is dense. To this end, fix a Mathias condition $[a,A]$. Suppose first that there exists $n \in \omega$ such that, for every $R \in [a,A]$, \[ \left|W^R_e\right| \leq n. \] In this case, $[a,A] \in \mathcal D_{ e , h }$ since $[a,A]$ satisfies condition (2) above. Suppose now that, given any $n \in \omega$, there exists $R \in [a,A]$ such that $\left|W^R_e\right| > n$. In particular, for every $n \in \omega$, there is a finite set $b$ with $a \subseteq b \subseteq a \cup A$ and \[ |W^{\chi_b}_e| > n. \] Therefore, let $g : \omega \rightarrow \omega$ and $\rho : \omega \rightarrow \mathcal P_{\sf fin} (A)$ be computable functions such that \[ W_{g(i)} \subseteq W^{\chi_{a \cup \rho(i)}}_e \] and \[ |W_{g(i)}| > h(i). \] Using the Recursion Theorem, let $j$ be a fixed point for the function $g$, i.e., $W_{g(j)} = W_j$. Set $b = a \cup \rho(j)$ and take \[ B = A \cap [\max (\rho(j)) + 1 , \infty). \] It follows that $[b,B] \subseteq [a,A]$ and $[b,B]$ satisfies condition (1) above, i.e., $[b,B] \in \mathcal D_{ e , h }$. This establishes that each $\mathcal D_{ e , h }$ is dense. Let $R$ be Mathias generic. Given $e \in \omega$ and a computable function $h : \omega \rightarrow \omega$, let $[a,A] \in \mathcal D_{ e , h }$ with $R \in [a,A]$. If $[a,A]$ satisfies condition (1) in the definition of $\mathcal D_{ e , h }$, then $W^R_e$ is not effectively immune via $h$ since there exists $i \in \omega$ \[ W_i \subseteq W^{\chi_a}_e \subseteq W^R_e \] with $|W_i| > h(i)$. On the other hand, if $[a,A]$ satisfies condition (2), $W^R_e$ is finite and again not effectively immune. It now follows that $W^R_e$ is not effectively immune for any $e \in \omega$. In particular, $R$ computes no effectively immune subset of $\omega$. \end{proof} \begin{remark} On the other hand, every canonically immune set contains an effectively immune set. In particular, there are reals which are both canonically immune and effectively immune. Such reals are not bounded by any Mathias generic. To construct an effectively immune subset of a canonically immune set $R = \{ r_0 < r_1 < \ldots\}$, run the standard construction of an effectively immune set inside $R$: at stage $s$, pick the least $e \leq s$ such that \[ X_s = W_e \cap \{ r_{2e} , r_{2e + 1} , \ldots \} \neq \emptyset \] and remove $y_s = \min (X_s)$ from $R$. The resulting set \[ Q = R \setminus \{ y_s : s \in \omega\} \] is still infinite since \[ \left| Q \cap \{ r_0 , \ldots , r_n\}\right| \geq n/2 \] for each $n \in \omega$. As an infinite subset of a canonically immune set, $Q$ is canonically immune. Furthermore, $Q$ is effectively immune because any $W_e \subseteq Q$ is a subset of \[ \{ r_0 , r_1 , \ldots , r_{2e-1}\} \] and must therefore have cardinality at most $2e$. \end{remark} \section{Canonical immunity vs.~Schnorr randomness}\label{schnorr-randomness} The final result of this paper is an application of the fact that every Mathias generic is canonically immune. \begin{theorem}\label{schnorr} There exists a set $R\subseteq \omega$ which is a canonically immune set and not Schnorr random. \end{theorem} \begin{proof} Because every Mathias generic is canonically immune, it suffices to show that there are Mathias generics which are not Schnorr random. In fact, it turns out that every Mathias generic is not Schnorr random. Let $F_1 , F_2 , \ldots \subseteq \omega$ be pairwise disjoint consecutive intervals with $|F_i| = i$. For each $n \in \omega$, define the open set \[ U_n = \{ R \in 2^\omega : (\exists i > n) (R \cap F_i = \emptyset)\}. \] Notice that the Lebesgue measure of $U_n$ is exactly $2^{-n}$. In particular, the $\Pi^0_2$ class \[ \bigcap_n U_n = \{ R \in 2^\omega : (\exists^\infty i) (R \cap F_i = \emptyset)\} \] is a Schnorr test. {\em Claim.} There is a dense $\Sigma^0_2$-definable set $\mathcal X$ of Mathias conditions such that $\bigcup \mathcal X \subseteq \bigcap_n U_n$. To verify this claim, let \[ \mathcal X = \{ [a,A] : (\exists^\infty i) (A \cap F_i = \emptyset)\} \] and observe that $\bigcup \mathcal X \subseteq \bigcap_n U_n$. To see that $\mathcal X$ is dense, fix any Mathias condition $[a,A]$ with \[ A = \{ x_0 < x_1 < \ldots \}. \] Inductively choose $x_{m_0} < x_{m_1} < \ldots$ and $i_0 < i_1 < \ldots$ such that the map $p \mapsto x_{m_p}$ is computable and, for all $p \in \omega$, \[ \max (F_{i_p}) < x_{m_p} < \min (F_{i_{p+1}}). \] This is always possible because $A$ is an infinite computable set. Define a computable subset of $A$ by letting \[ B = \{ x_{m_p} : p \in \omega\} \] and note that there are infinitely many $i$ with $B \cap F_i = \emptyset$, i.e., $[a,B] \in \mathcal X$. Also, $[a,B] \subseteq [a,A]$ and, as $[a,A]$ was arbitrary, this shows that $\mathcal X$ is dense and establishes the claim. Any Mathias generic real must meet every dense arithmetical set of conditions. In particular, a Mathias generic $G$ must be a member of $\bigcup \mathcal X \subseteq \bigcap_n U_n$. Hence, $G$ is not Schnorr random. \end{proof} \begin{remark} As noted above, Binns, Kjos-Hanssen, Lerman and Solomon \cite[Corollary 6.7]{Binns} showed that every Mathias generic is high. By Nies--Stephan--Terwijn \cite[Theorem 4.2]{nst}, every high set is Turing equivalent to a Schnorr random. Thus, although no Mathias generic is Schnorr random, every Mathias generic is of Schnorr random degree. \end{remark}
\section{Introduction}\label{sec:intro} Regular expressions are compact and convenient devices that are widely used to specify regular languages, e.\,g., when searching for a pattern in a string. In order to overcome their limited expressive power while, at the same time, preserving their desirable compactness, their definition has undergone various modifications and extensions in the past decades. These amendments have led to several competing definitions, which are collectively referred to as \emph{extended regular expressions} (or: \emph{REGEX} for short). Hence, today's text editors and programming languages (such as Java and Perl) use individual notions of (extended) regular expressions, and they all provide so-called \emph{REGEX engines} to conduct a \emph{match test}, i.\,e., to compute the solution to the membership problem for any language given by a REGEX and an arbitrary string. While the introduction of new features of extended regular expressions has frequently not been guided by theoretically sound analyses, recent studies have led to a deeper understanding of their properties (see, e.\,g., C\^ampeanu et al.~\cite{cam:afo}).\par A common feature of extended regular expressions not to be found in the original definition is the option to postulate that each word covered by a specific REGEX must contain a variable substring at several recurrent positions (so-called \emph{backreferences}). Thus, they can be used to specify a variety of non-regular languages (such as the language of all words $w$ that satisfy $w = xx$ for arbitrary words $x$), and this has severe consequences on the complexity of their basic decision problems. In particular, their vital membership problem (i.\,e., in other words, the match test) is NP-complete (see Aho~\cite{aho:alg}). Although this matter is hardly discussed by the literature on the application of extended regular expressions (see, e.\,g., Friedl \cite{fri:mas}), many implementations of REGEX engines impose restrictions on the backreferences -- e.\,g., by limiting their number to $9$ -- in order to manage the trade-off between expressive power and time complexity. Recent developments of REGEX engines that are particularly tailored to efficiency even completly abandon the support of backreferences (see, e.\,g., Google's RE2 \cite{goo:re2} and Le Maout \cite{lem:reg}), so that they can make use of the well-developed theory of finite automata as acceptors of regular languages. On the other hand, the original introduction of backreferences has been motivated by practical needs, which implies that such radical solutions cannot be used in various applied settings. Furthermore, as demonstrated by Freydenberger \cite{fre:ext}, regular expressions with backreferences allow the specification of regular languages in a much more compact manner than their counterparts without backreferences. More precisely, the size difference between extended regular expressions and equivalent ``normal'' regular expressions is not bounded by any recursive function. Thus, users of regular expressions will inevitably wish to specify such languages via backreferences, and the match test for expressions with backreferences can be considerably faster than that for expressions that do not make use of this concept. We therefore consider it a worthwhile task to investigate alternative approaches to the match test of REGEX with backreferences and to establish large classes of extended regular expressions that have a polynomial-time match test. Moreover, in order to support an integration with existing state-of-the-art REGEX engines that do not support backreferences, it is desirable that the corresponding concepts are based on appropriate automata.\par It is the purpose of this paper to propose and study such an alternative method. In order to keep the technical details reasonably concise we do not directly use a particular REGEX definition, but we consider a well-established type of formal languages that, firstly, is defined in a similar yet simpler manner, secondly, is a proper subclass of the languages generated by extended regular expressions and, thirdly, shows the same properties with regard to the membership problem: the \emph{pattern languages} as introduced by Angluin~\cite{ang:fin2}; our results can then directly be transferred to extended regular expressions. In this context, a \emph{pattern} $\alpha$ is a finite string that consists of \emph{variables} and \emph{terminal symbols} (taken from a fixed alphabet $\Sigma$), and its language is the set of all words that can be derived from $\alpha$ when substituting arbitrary words over $\Sigma$ for the variables. For example, the language $L$ generated by the pattern $\alpha := x_1 \ta x_2 \tb x_1$ (where $x_1, x_2$ are variables and $\ta, \tb$ are terminal symbols) consists of all words with an arbitrary prefix $u$, followed by the letter $\ta$, an arbitrary word $v$, the letter $\tb$ and a suffix that equals the prefix $u$. Thus, $w_1 := \ta \ta \ta \tb \tb \ta \ta$ is contained in $L$, whereas $w_2 := \tb\ta\ta\tb\ta$ is not.\par In the definition of pattern languages, the option of using several occurrences of a variable exactly corresponds to the backreferences in extended regular expressions, and therefore the membership problem for pattern languages captures the essence of what is computationally complex in the match test for REGEX. Thus, it is not surprising that the membership problem for pattern languages is also known to be NP-complete (see Angluin~\cite{ang:fin2} and Jiang et al.~\cite{jia:pat}). Furthermore, Ibarra et al.~\cite{iba:ano} point out that the membership problem for pattern languages is closely related to the solvability problem for certain Diophantine equations. More precisely, for any word $w$ and for any pattern $\alpha$ with $m$ terminal symbols and $n$ different variables, $w$ can only be contained in the language generated by $\alpha$ if there are numbers $s_i$ (representing the lengths of the substitution words for the variables $x_i$) such that $|w| = m + \sum_{i=1}^n a_i s_i$ (where $a_i$ is the number of occurrences of $x_i$ in $\alpha$ and $|w|$ stands for the \emph{length} of $w$). Thus, the membership test needs to implicitly solve this NP-complete problem, which is called \emph{Money-Changing} or \emph{Coin Problem} and -- due to its fundamentality and its practical relevance, e.\,g., in Operations Research -- has been intensively studied. All these insights into the complexity of the membership problem do not depend on the question of whether the pattern contains any terminal symbols. Therefore, we can safely restrict our considerations to so-called \emph{terminal-free} pattern languages (generated by patterns that consist of variables only); for this case, NP-completeness of the membership problem has indirectly been established by Ehrenfeucht and Rozenberg~\cite{ehr:fin}. This restriction again improves the accessibility of our technical concepts, without causing a loss of generality.\par As stated above, these results on the complexity of the problem (and the fact that probabilistic solutions might often be deemed inappropriate for it) motivate the search for large subclasses with efficiently solvable membership problem and for suitable concepts realising the respective algorithms. Rather few such classes are known to date. They either restrict the number of \emph{different} variables in the patterns to a fixed number $k$ (see Angluin~\cite{ang:fin2}, Ibarra et al.~\cite{iba:ano}), which is an obvious option and leads to a time complexity of $\landau(n^k)$, or they restrict the number of \emph{occurrences} of each variable to $1$ (see Shinohara~\cite{shi:pol1}), which turns the resulting pattern languages into regular languages. \par In the present paper, motivated by Shinohara's~\cite{shi:pol2} \emph{non-cross} pattern languages, we introduce major classes of pattern languages (and, hence, of extended regular expressions) with a polynomial-time membership problem that do not show any of the above limitations. Thus, the corresponding patterns can have any number of variables with any number of occurrences; instead, we consider a rather subtle parameter, namely the \emph{distance} several occurrences of any variable $x$ may have in a pattern (i.\,e., the maximum number of different variables separating any two consecutive occurrences of $x$). We call this parameter the \emph{variable distance} $\vd$ of a pattern, and we demonstrate that, for the class of all patterns with $\vd \leq k$, the membership problem is solvable in time $\landau(n^{k + 4})$. Referring to the proximity between the subject of our work and the solvability problem of Diophantine equations (which does not depend on the order of variables in the patterns, but merely on their numbers of occurrences), we consider this insight quite remarkable, and it is only possible since the Money Changing Problem is \emph{weakly} NP-complete, i.\,e., it is only NP-complete since its input merely consists of numbers in binary representation, which means that the input length for the Money Changing Problem is exponentially smaller than for the membership problem for pattern languages, where we have to regard the lengths of the input strings as input length of the problem. We also wish to point out that, in terms of our concept, Shinohara's non-cross patterns correspond to those patterns with $\vd = 0$.\par We prove our main result by introducing the concept of a \emph{Janus automaton}, which is a variant of a two-way two-head automaton (see Ibarra~\cite{iba:ont}), amended by the addition of a number of counters. Janus automata are algorithmic devices that are tailored to performing the match test for pattern languages, and we present a systematic way of constructing them. While an intuitive use of a Janus automaton assigns a distinct counter to each variable in the corresponding pattern $\alpha$, we show that in our advanced construction the number of different counters can be limited by the variable distance of $\alpha$. Since the number of counters is the main element determining the complexity of a Janus automaton, this yields our main result. An additional effect of the strictness of our approach is that we can easily discuss its quality in a formal manner, and we can show that, based on a natural assumption on how Janus automata operate, our method leads to an automaton with the smallest possible number of counters.\par This paper is organised as follows. In Section~\ref{sec:definitions} the basic definitions and the concept of pattern languages are introduced. The purpose of Section~\ref{sec:janus} is to introduce our new model, the Janus automaton. In Section~\ref{sec:pattern} we show how we can effectively construct Janus automata to recognise pattern languages. Then, in Section~\ref{sec:varDist}, the above mentioned concept of the variable distance is introduced. Also in this section, we shall use this notion to present and prove our main result. Finally, we summarise this paper in Section~\ref{sec:conclusion}, and we give an overview of related and further research ideas. \section{Basic Definitions}\label{sec:definitions} Let $\bbN := \{0,1, 2, 3, \ldots \}$. For an arbitrary alphabet $A$, a \emph{string} (\emph{over $A$}) is a finite sequence of symbols from $A$, and $\varepsilon$ stands for the \emph{empty string}. The symbol $A^+$ denotes the set of all nonempty strings over $A$, and $A^*:=A^+ \cup \{ \varepsilon \}$. For the \emph{concatenation} of two strings $w_1, w_2$ we write $w_1 \cdot w_2$ or simply $w_1 w_2$. We say that a string $v \in A^*$ is a \emph{factor} of a string $w \in A^*$ if there are $u_1, u_2 \in A^*$ such that $w = u_1 \cdot v \cdot u_2$. The notation $|K|$ stands for the size of a set $K$ or the length of a string $K$; the term $|w|_a$ refers to the number of occurrences of the symbol $a$ in the string $w$. \par For any alphabets $A, B$, a \emph{morphism} is a function $h: A^*\rightarrow B^*$ that satisfies $h(vw)=h(v)h(w)$ for all $v,w\in A^*$. Let $\Sigma$ be a (finite) alphabet of so-called \emph{terminal symbols} and $X$ an infinite set of \emph{variables} with $\Sigma \cap X = \emptyset$. We normally assume $X := \{ x_1, x_2, x_3, \ldots \}$. A \emph{pattern} is a nonempty string over $\Sigma \cup X$, a \emph{terminal-free pattern} is a nonempty string over $X$ and a \emph{word} is a string over $\Sigma$. For any pattern $\alpha$, we refer to the set of variables in $\alpha$ as $\var(\alpha)$. We shall often consider a terminal-free pattern in its variable factorisation, i.\,e.\ $\alpha = y_1 \cdot y_2 \cdot \ldots \cdot y_n$ with $y_i \in \{x_1, x_2, \ldots, x_{m}\}$, $1 \leq i \leq n$ and $m = |\var(\alpha)|$. \par A morphism $\sigma:\left(\Sigma\cup X\right)^*\rightarrow\Sigma^*$ is called a \emph{substitution} if $\sigma(a)=a$ for every $a\in\Sigma$. We define the \emph{pattern language} of a terminal-free pattern $\alpha$ by $\PL(\alpha) := \{ \sigma(\alpha) \mid \sigma: X^* \to \Sigma^* \mbox{ is a substitution} \}$. Note, that these languages, technically, are terminal-free E-pattern languages (see Jiang et al.~\cite{jia:pat}). Since in our work the dependency on the alphabet $\Sigma$ is negligible, we mostly denote pattern languages by $L(\alpha)$. Furthermore, we ignore all patterns $\alpha$ satisfying, for a variable $x$, $|\alpha|_x = 1$, as then $\PL(\alpha) = \Sigma^*$.\par The problem to decide for a given pattern $\alpha$ and a given word $w \in \Sigma^*$ whether $w \in L(\alpha)$ is called the \emph{membership problem}.\par Finally, we assume the reader to be familiar with the basic concepts of automata theory and refer to Hopcroft et al. \cite{hop:int2} for terms not defined explicitly. \section{Janus Automata}\label{sec:janus} In order to prove the main results of this paper, we introduce a novel type of automata, the so-called Janus automata, that are tailored to solving the membership problem for pattern languages. We shall first explain this model in an informal way and then give a formal definition.\par A Janus automaton is a two-way automaton with two input heads. In addition to that, a Janus automaton has a constant number of restricted counters. In every step of the computation the Janus automaton provides a distinct counter bound for every counter. The counter values can only be incremented or left unchanged, and they count strictly modulo their counter bound, i.\,e., once a counter value has reached its counter bound, a further increment forces the counter to start at counter value $0$ again. Depending on the current state, the currently scanned input symbols and on whether the counters have reached their bounds, the transition function determines the next state, the input head movements and the counter instructions, and this is done completely deterministically. In addition to the counter instructions of incrementing and leaving the counter unchanged, it is also possible to reset a counter. In this case, the counter value is set to $0$ and a new counter bound is nondeterministically guessed. Furthermore, we require the first input head to be always positioned to the left of the second input head, so there are a well-defined left and right head. This explains why we call this model a \emph{Janus} automaton.\par Any string $\cent w \$$, where $w \in \Sigma^*$ and the symbols $\cent, \$$ (referred to as left and right endmarker, respectively) are not in $\Sigma$, is an input. Initially, the input tape stores some input $w$, the automaton is in the initial state, all counter bounds and counter values are $0$ and both input heads scan $\cent$. The word $w$ is accepted by an automaton if and only if it is possible to reach an accepting state by successively applying the transition function. \par Janus automata are nondeterministic, but their nondeterminism differs from that of common nondeterministic finite automata. The only nondeterministic step a Janus automaton is able to perform consists in guessing a new counter bound for some counter. Once a new counter bound is guessed, the previous one is lost. Apart from that, each transition, i.\,e., entering a new state, moving the input heads and giving instructions to the counters, is defined completely deterministically.\par The vital point of a computation of a Janus automaton with $k$ counters is then that the automaton is only able to store exactly $k$ (a constant number, not depending on the input word) different numbers at a time (the counter bounds). We shall see that this number of counters is the crucial number for the complexity of the \emph{acceptance problem}, i.\,e., to decide, for a given word $w$, whether $w$ is in the language accepted by the automaton. \par We are now ready to present a formal definition of Janus automata: \begin{definition} A \emph{Janus automaton with $k$ counters} (denoted by \emph{$\jfa(k)$} in the sequel) is a device $M := (k, Q, \Sigma, \delta, q_0, F)$, where $k \geq 0$ is the number of \emph{counters}, $Q$ is a finite nonempty set of \emph{states}, $\Sigma$ is a finite nonempty alphabet of \emph{input symbols}, $q_0 \in Q$ is the \emph{initial state}, $F \subseteq Q$ is the set of \emph{accepting states} and $\delta$ is a mapping $Q \times \Sigma^{2} \times \{\mathtt{t_{=}}, \mathtt{t_{<}}\}^{k} \rightarrow Q \times \{\mathtt{-1}, \mathtt{0}, \mathtt{1}\}^2 \times \{\mathtt{0}, \mathtt{1}, \mathtt{r}\}^{k}$. The mapping $\delta$ is called the \emph{transition function}.\par An \emph{input} to $M$ is any string of the form $\cent w \$$, where $w \in \Sigma^*$ and the symbols $\cent, \$$ (referred to as \emph{left} and \emph{right endmarker}, respectively) are not in $\Sigma$. Let $\delta(p, a_1, a_2, s_1, \hdots, s_k) = (q, r_1, r_2, d_1, \hdots, d_k)$. For each $i \in \{1, 2\}$, we call the element $a_i$ the \emph{input symbol scanned by head $i$} and $r_i$ the \emph{instruction for head $i$}. For each $j \in \{1, 2, \ldots, k\}$, the element $s_j \in \{\mathtt{t_{=}}, \mathtt{t_{<}}\}$ is the \emph{counter message of counter $j$}, and $d_j$ is called the \emph{counter instruction for counter $j$}. \end{definition} The transition function $\delta$ of a $\jfa(k)$ determines whether the input heads are moved to the left ($r_i = \mathtt{-1}$), to the right ($r_i = \mathtt{1}$) or left unchanged ($r_i = \mathtt{0}$), and whether the counters are incremented ($d_j = \mathtt{1}$), left unchanged ($d_j = \mathtt{0}$) or reset ($d_j = \mathtt{r}$). Next, in order to define the language accepted by a Janus automaton, we need to introduce the concept of a $\jfa(k)$ computation. \begin{definition} \label{computationDefinition} Let $M := (k, Q, \Sigma, \delta, q_0, F)$ be a $\jfa(k)$ and $w := b_1 \cdot b_2 \cdot \ldots \cdot b_{n}$, $b_i \in \Sigma$, $1 \leq i \leq n$. A \emph{configuration of $M$ (on input $\cent w\$$)} is an element of the set \begin{align*} \widehat{C}_M := \{(q, h_1, h_2, (c_1, C_1), \hdots, (c_k, C_k))~|~&q \in Q, 0 \leq h_1 \leq h_2 \leq n + 1,\\ &0 \leq c_i \leq C_i \leq n, 1 \leq i \leq k\}\enspace. \end{align*} The pair $(c_i, C_i)$, $1 \leq i \leq k$, describes the current configuration of the i$^{th}$ counter, where $c_i$ is the \emph{counter value} and $C_i$ the \emph{counter bound}. The element $h_i$, $i \in \{1, 2\}$, is called the \emph{head position of head $i$}.\par An \emph{atomic move of $M$ (on input $\cent w\$$)} is denoted by the relation $\vdash_{M, w}$ over the set of configurations. Let $\delta(p, a_1, a_2, s_1, \hdots, s_k) = (q, r_1, r_2, d_1, \hdots, d_k)$. Then, for all $c_i, C_i$, $1 \leq i \leq k$, where $c_i < C_i$ if $s_i = \mathtt{t_{<}}$ and $c_i = C_i$ if $s_i = \mathtt{t_{=}}$, and for all $h_1$, $h_2$, $0 \leq h_1 \leq h_2 \leq n + 1$, with $b_{h_i} = a_i$, $i \in \{1, 2\}$, we define $(p, h_1, h_2, (c_1, C_1), \hdots, (c_k, C_k))$ $\vdash_{M, w}$ $(q, h'_1, h'_2, (c'_1, C'_1), \hdots, (c'_k, C'_k))$. Here, the elements $h'_i$, $i \in \{1, 2\}$, and $c'_j, C'_j$, $1 \leq j \leq k$, are defined as follows: \begin{align*} h'_i:=&\begin{cases} h_i + r_i& \mbox{if~$0 \leq h_1 + r_1 \leq h_2 + r_2 \leq n + 1$}\enspace,\\ h_i& \mbox{else}\enspace. \end{cases} \end{align*} For each $j \in \{1, \hdots, k\}$, if $d_j = \mathtt{r}$, then $c'_j := 0$ and, for some $m \in \{0, 1, \ldots, n\}$, $C'_j := m$. If, on the other hand, $d_j \neq \mathtt{r}$, then $C'_j := C_j$ and \begin{equation*} c'_j := c_j + d_j \mod (C_j + 1)\,. \end{equation*} To describe a \emph{sequence of (atomic) moves of $M$ (on input $w$)} we use the reflexive and transitive closure of the relation $\vdash_{M, w}$, denoted by $\vdash^*_{M, w}$. $M$ accepts the word $w$ if and only if $\widehat{c}_0 \vdash^*_{M, w} \widehat{c}_f$, where $\widehat{c}_0 := (q_0, 0, 0, (0, 0), \hdots$, $(0, 0))$ is the \emph{initial configuration}, and $\widehat{c}_f := (q_f, h_1, h_2, (c_1, C_1), \hdots$ $(c_k, C_k))$ is a \emph{final configuration}, for some $q_f \in F$, $0 \leq h_1 \leq h_2 \leq n + 1$ and $0 \leq c_i \leq C_i \leq n$, $1 \leq j \leq k$. For any Janus automaton $M$, let $L(M)$ denote the set of words accepted by $M$. \end{definition} By definition, the movements of the input heads are bounded by the left and right endmarkers and the first head is always positioned to the left of the second head. The two counter messages denote whether the counter value is still less than the counter bound ($\mathtt{t_{<}}$) or equals the counter bound ($\mathtt{t_{=}}$). If $\mathtt{r}$ is used in order to reset a counter, a new counter bound is nondeterministically guessed and the counter value is set to $0$.\par In our applications of this automata model, we use the counters in a particular but natural way. Let us assume that $n$ is the counter bound of a certain counter with counter value $0$. We can define the transition function in a way such that an input head is successively moved to the right and, in every step, the counter is incremented. As soon as the counter reaches its counter bound (i.\,e., its counter message changes from $\mathtt{t_{<}}$ to $\mathtt{t_{=}}$) we stop that procedure and can be sure that the input head has been moved exactly $n$ steps. In this way an automaton can scan whole factors of the input, induced by counter bounds. Furthermore, as we have two input heads, we can use the counter with bound $n$ to move them simultaneously to the right, checking symbol by symbol whether two factors of equal length are the same. It is also worth mentioning that we can use counters in the same way to move input heads from right to left instead of from left to right.\par This way of using counters shall be made clear by sketching how a Janus automaton $M$ could be defined that recognises the language \begin{equation*} L := \{u \cdot a \cdot v \cdot b \cdot v \cdot u \mid u, v \in \{a, b\}^*\}\,. \end{equation*} The Janus automaton $M$ uses two counters and applies the following strategy to check whether an input word $w$ is in $L$. First, we reset both counters and therefore guess two new counter bounds $C_1$ and $C_2$. Then we check if $w = u \cdot a \cdot v \cdot b \cdot v \cdot u$ with $|u| = C_1$ and $|v| = C_2$. This is done by using the first counter to move the right head from position $1$ (the symbol next to the left endmarker) to the right until it reaches position $C_1 + 1$. Then it is checked whether $a$ occurs at this position. After that, by using the second counter, the right head is moved further to the right to position $C_1 + C_2 + 2$, where $M$ checks for the occurrence of the symbol $b$. Next, again by using the second counter, the right head is moved another $C_2 + 1$ steps to the right in order to place it exactly where we expect the second occurrence of factor $u$ to begin. Now, both input heads are moved simultaneously to the right for $C_1$ steps, checking in each step whether they scan the same symbol and whether after these $C_1$ steps the right head scans exactly the right endmarker. If this is successful, we know that $w$ is of form $u \cdot a \cdot v \cdot b \cdot v' \cdot u$, with $|u| = C_1$ and $|v| = |v'| = C_2$. Hence, it only remains to check whether or not $v = v'$. This can be done by positioning both heads at the first positions of the factors $v$ and $v'$, i.\,e., moving the left head one step to the right and the right head $C_1 + C_2$ steps back to the left. In order to perform this, as well as the final matching of the factors $v$ and $v'$, $M$ can apply its counters in the same way as before. If this whole procedure is successful, $M$ shall enter an accepting state, and reject its input otherwise.\par It is obvious that $w \in L$ if and only if there is a possibility to guess counter bounds such that $M$ accepts $w$; thus, $L(M) = L$. \section{Janus Automata for Pattern Languages}\label{sec:pattern} In this section, we demonstrate how Janus automata can be used for recognising pattern languages. More precisely, for an arbitrary terminal-free pattern $\alpha$, we construct a $\jfa(k)$ $M$ satisfying $L(M) = L(\alpha)$. Before we move on to a formal analysis of this task, we discuss the problem of deciding whether $w \in L(\alpha)$ for given $\alpha$ and $w$, i.\,e., the membership problem, in an informal way.\par Let $\alpha = y_1 \cdot y_2 \cdot \ldots \cdot y_n$ be a terminal-free pattern with $m := |\var(\alpha)|$, and let $w \in \Sigma^*$ be a word. The word $w$ is an element of $L(\alpha)$ if and only if there exists a factorisation $w = u_1 \cdot u_2 \cdot \ldots \cdot u_n$ such that $u_j = u_{j'}$ for all $j, j'$, $1 \leq j < j' \leq |\alpha|$, with $y_j = y_{j'}$. We call such a factorisation $w = u_1 \cdot u_2 \cdot \ldots \cdot u_n$ a \emph{characteristic factorisation for $w \in L(\alpha)$} (or simply \emph{characteristic factorisation} if $w$ and $\alpha$ are obvious from the context). Thus, a way to solve the membership problem is to initially guess $m$ numbers $l_1, l_2, \ldots, l_{m}$, then, if possible, to factorise $w = u_1 \cdot \ldots \cdot u_n$ such that $|u_j| = l_i$ for all $j$ with $y_j = x_i$ and, finally, to check whether this is a characteristic factorisation for $w \in L(\alpha)$. A $\jfa(m)$ can perform this task by initially guessing $m$ counter bounds, which can be interpreted as the lengths of the factors. The two input heads can be used to check if this factorisation has the above described properties. However, the number of counters that are then required directly depends on the number of variables, and the question arises if this is always necessary.\par In the next definitions, we shall establish the concepts that formalise and generalise the way of checking whether or not a factorisation is a characteristic one. \begin{definition}\label{matchingOrderDef} Let $\alpha := y_1 \cdot y_2 \cdot \ldots \cdot y_n$ be a terminal-free pattern, and, for each $x_i \in \var(\alpha)$, let $n_i := |\alpha|_{x_i}$. The set \emph{$\varpos{i}(\alpha)$} is the set of all positions $j$ satisfying $y_j = x_i$. The sequence $((l_1, r_1), (l_2, r_2), \ldots, (l_{n_i - 1}, r_{n_i - 1}))$ with $(l_j, r_j) \in \varpos{i}(\alpha)^2$ and $l_j < r_j$, $1 \leq j \leq n_i - 1$, is a \emph{matching order for $x_i$ in $\alpha$} if and only if the graph $(\varpos{i}(\alpha), \{(l_1, r_1), (l_2, r_2), \ldots, (l_{n_i - 1}, r_{n_i - 1})\})$ is connected. \end{definition} We consider an example in order to illustrate Definition~\ref{matchingOrderDef}. If, for some pattern $\alpha$ and some $x_i \in \var(\alpha)$, $\varpos{i}(\alpha) := \{1, 3, 5, 9, 14\}$, then the sequences $((5, 1)$, $(14, 3)$, $(1, 3)$, $(9, 3))$, $((1, 3)$, $(3, 5)$, $(5, 9)$, $(9, 14))$ and $((5, 1)$, $(5, 3)$, $(5, 9)$, $(5, 14))$ are some of the possible matching orders for $x_i$ in $\alpha$, whereas the sequences $((1, 3), (9, 1), (3, 9), (5, 14))$ and $((1, 3), (3, 5), (5, 9), (9, 1))$ do not satisfy the conditions to be matching orders for $x_i$ in $\alpha$.\par To obtain a matching order for a whole pattern $\alpha$ we simply combine matching orders for all $x \in \var(\alpha)$: \begin{definition}\label{completeMatchingOrderDefinition} Let $\alpha$ be a terminal-free pattern with $m := |\var(\alpha)|$ and, for all $i$ with $1 \leq i \leq m$, $n_i := |\alpha|_{x_i}$ and let $(m_{i, 1},m_{i, 2}, \ldots, m_{i, n_i - 1})$ be a matching order for $x_i$ in $\alpha$. The tuple $(m_1, m_2, \ldots, m_k)$ is a \emph{complete matching order for $\alpha$} if and only if $k = \sum_{i = 1}^{m} (n_i - 1)$ and, for all $i, j_i$, $1 \leq i \leq m$, $1 \leq j_i \leq n_i - 1$, there is a $j'$, $1 \leq j' \leq k$, with $m_{j'} = m_{i, j_i}$. The elements $m_j \in \varpos{i}(\alpha)^2$ of a matching order $(m_1, m_2, \ldots, m_k)$ are called \emph{matching positions}. \end{definition} We introduce an example pattern \begin{equation*} \beta := x_1 \cdot x_2 \cdot x_1 \cdot x_2 \cdot x_3 \cdot x_2 \cdot x_3\,, \end{equation*} which we shall use throughout the whole paper in order to illustrate the main definitions. Regarding Definition~\ref{completeMatchingOrderDefinition}, we observe that all possible sequences of the matching positions in $\{(1,3)$, $(2,4)$, $(4,6)$, $(5,7)\}$ are some of the possible complete matching orders for $\beta$. As pointed out by the following lemma, the concept of a complete matching order can be used to check whether a factorisation is a characteristic one. \begin{lemma}\label{matchingOrderLemma} Let $\alpha = y_1 \cdot y_2 \cdot \ldots \cdot y_n$ be a terminal-free pattern and let $((l_1, r_1)$, $(l_2, r_2)$, $\ldots, (l_{k}, r_{k}))$ be a complete matching order for $\alpha$. Let $w$ be an arbitrary word in some factorisation $w = u_1 \cdot u_2 \cdot \ldots \cdot u_n$. If $u_{l_j} = u_{r_j}$ for every $j$, $1 \leq j \leq k$, then $w = u_1 \cdot u_2 \cdot \ldots \cdot u_n$ is a characteristic factorisation. \end{lemma} \begin{proof} Let $x_i \in \var(\alpha)$ be arbitrarily chosen and let the sequence $((l'_1, r'_1), (l'_2, r'_2),$ $\ldots, (l'_{k\rq{}}, r'_{k\rq{}}))$ be an arbitrary matching order for $x_i$ in $\alpha$. Assume that $u_{l'_j} = u_{r'_j}$ for all $j$, $1 \leq j \leq k\rq{}$. As $(\varpos{i}(\alpha), \{(l'_1, r'_1), (l'_2, r'_2), \ldots, (l'_{k\rq{}}, r'_{k\rq{}})\})$ is a connected graph and as the equality of words is clearly a transitive relation, we can conclude that $u_j = u_{j'}$ for all $j, j'$, $1 \leq j < j' \leq |\alpha|$, with $y_j = y_{j'} = x_i$. Applying this argumentation to all variables in $\alpha$ implies the statement of Lemma~\ref{matchingOrderLemma}. \end{proof} With respect to the complete matching order $((4,6), (1,3), (2,4), (5,7))$ for the example pattern $\beta$, we apply Lemma~\ref{matchingOrderLemma} in the following way. If $w$ can be factorised into $w = u_1 \cdot u_2 \cdot \ldots \cdot u_7$ such that $u_4 = u_6$, $u_1 = u_3$, $u_2 = u_4$ and $u_5 = u_7$, then $w \in L(\beta)$.\par Let $(l_1, r_1)$ and $(l_2, r_2)$ be two consecutive matching positions of a complete matching order. It is possible to perform the comparison of factors $u_{l_1}$ and $u_{r_1}$ by positioning the left head on the first symbol of $u_{l_1}$, the right head on the first symbol of $u_{r_1}$ and then moving them simultaneously over these factors from left to right, checking symbol by symbol if these factors are identical (cf. the example Janus automaton in Section~\ref{sec:janus}). After that, the left head, located at the first symbol of factor $u_{l_1 + 1}$, has to be moved to the first symbol of factor $u_{l_2}$. If $l_1 < l_2$, then it is sufficient to move it over all the factors $u_{l_1 + 1}, u_{l_1 + 2}, \ldots, u_{l_2 - 1}$. If, on the other hand, $l_2 < l_1$, then the left head has to be moved to the left, and, thus, over the factors $u_{l_1}$ and $u_{l_2}$ as well. Furthermore, as we want to apply these ideas to Janus automata, the heads must be moved in a way that the left head is always located to the left of the right head. The following definition shall formalise these ideas. \par \begin{definition}\label{janusOperatingModeDefinition} In the following definition, let $\lambda$ and $\rho$ be constant markers. For all $j, j' \in \mathbb{N}$ with $j < j'$, we define a mapping $g$ by $g(j, j') := (j + 1, j + 2, \ldots, j' - 1)$ and $g(j', j) := (j', j' - 1, \ldots, j)$.\par Let $((l_1, r_1), (l_2, r_2), \ldots, (l_k, r_k))$ be a complete matching order for a terminal-free pattern $\alpha$ and let $l_0 := r_0 := 0$. For every matching position $(l_i, r_i)$, $1 \leq i \leq k$, we define a sequence $D^{\lambda}_i$ and a sequence $D^{\rho}_i$ by \begin{align*} D^{\lambda}_i &:= ((p_1, \lambda), (p_2, \lambda), \ldots, (p_{k_1}, \lambda)) \text{ and}\\ D^{\rho}_i &:= ((p'_1, \rho), (p'_2, \rho), \ldots, (p'_{k_2}, \rho))\,, \end{align*} where $(p_1, p_2, \ldots, p_{k_1}) := g(l_{i - 1}, l_{i})$, $(p'_1, p'_2, \ldots, p'_{k_2}) := g(r_{i - 1}, r_{i})$.\par Now let $D'_i := ((s_1, \mu_1), (s_2, \mu_2), \ldots, (s_{k_1 + k_2}, \mu_{k_1 + k_2}))$ be a tuple satisfying the following two conditions. Firstly, it contains exactly the elements of $D^{\lambda}_i$ and $D^{\rho}_i$ such that the relative orders of the elements in $D^{\lambda}_i$ and $D^{\rho}_i$ are preserved. Secondly, for every $j$, $1 \leq j \leq k_1 + k_2$, $s_{j_l} \leq s_{j_r}$ needs to be satisfied, with $j_l = \max(\{j' \mid 1 \leq j' \leq j, \mu_{j'} = \lambda\} \cup \{j'_l\})$ and $j_r = \max(\{j' \mid 1 \leq j' \leq j, \mu_{j'} = \rho\} \cup \{j'_r\})$, where $(s_{j'_l}, \mu_{j'_l})$ and $(s_{j'_r}, \mu_{j'_r})$ are the leftmost elements of $D'_i$ with $\mu_{j'_l} = \lambda$ and $\mu_{j'_r} = \rho$, respectively.\par Now we append the two elements $(r_{i}, \rho)$, $(l_{i}, \lambda)$ in exactly this order to the end of $D'_i$ and obtain $D_i$. Finally, the tuple $(D_1, D_2, \ldots, D_k)$ is called a \emph{Janus operating mode for $\alpha$ (derived from the complete matching order $((l_1, r_1), (l_2, r_2), \ldots, (l_k, r_k))$)}. \end{definition} We once again consider the example $\beta = x_1 \cdot x_2 \cdot x_1 \cdot x_2 \cdot x_3 \cdot x_2 \cdot x_3$. According to Definition~\ref{janusOperatingModeDefinition} we consider the tuples $D^{\lambda}_i$ and $D^{\rho}_i$ with respect to the complete matching order $((4,6), (1,3), (2,4), (5,7))$ for $\beta$. We omit the markers $\lambda$ and $\rho$ for a better presentation. The tuples $D^{\lambda}_i$ and $D^{\rho}_i$, $1 \leq i \leq 4$, are given by \begin{align*} D^{\lambda}_1 &= (1, 2, 3)\,, &D^{\rho}_1 &= (1, 2, \ldots, 5)\,,\\ D^{\lambda}_2 &= (4, 3, 2, 1)\,, &D^{\rho}_2 &= (6, 5, 4, 3)\,,\\ D^{\lambda}_3 &= ()\,, &D^{\rho}_3 &= ()\,,\\ D^{\lambda}_4 &= (3, 4)\,, &D^{\rho}_4 &= (5, 6)\,. \end{align*} Therefore, $\Delta_{\beta} := (D_1, D_2, D_3, D_4)$ is a possible Janus operating mode for $\beta$ derived from $((4,6)$, $(1,3)$, $(2,4)$, $(5,7))$, where \begin{align*} D_1 &= ((1, \rho), (1, \lambda), (2, \rho), (2, \lambda), (3, \rho), (3, \lambda), (4, \rho), (5, \rho), (6, \rho), (4, \lambda)),\\ D_2 &= ((4, \lambda), (3, \lambda), \ldots, (1, \lambda), (6, \rho), (5, \rho), \ldots, (3, \rho), (3, \rho), (1, \lambda)),\\ D_3 &= ((4, \rho), (2, \lambda)),\\ D_4 &= ((3, \lambda), (5, \rho), (4, \lambda), (6, \rho), (7, \rho), (5, \lambda)). \end{align*} Intuitively, we interpreted a complete matching order as a list of instructions specifying how to check whether a factorisation is a characteristic one. Similarly, a Janus operating mode derived from a complete matching order can be seen as an extension of this complete matching order that also contains information of how two input heads have to be moved from one matching position to the next one. Hence, there is an immediate connection between Janus operating modes and Janus automata for terminal-free pattern languages, and we shall see that it is possible to transform a Janus operating mode for any pattern directly into a Janus automaton recognising the corresponding pattern language. As we are particularly interested in the number of counters a Janus automaton needs, we introduce an instrument to determine the quality of Janus operating modes with respect to the number of counters that are required to actually construct a Janus automaton. \begin{definition}\label{counterNumber} Let $\Delta_{\alpha} := (D_1, D_2, \ldots, D_k)$ be a Janus operating mode for a terminal-free pattern $\alpha := y_1 \cdot y_2 \cdot \ldots \cdot y_n$. The \emph{head movement indicator} of $\Delta_{\alpha}$ is the tuple $\overline{\Delta_{\alpha}} = ((d'_1, \mu'_1)$, $(d'_2, \mu'_2)$, $\ldots, (d'_{k'}, \mu'_{k'}))$ with $k' = \sum_{i = 1}^{k} |D_i|$ that is obtained by concatenating all tuples $D_j$, $1 \leq j \leq k$, in the order given by the Janus operating mode. For every $i$, $1 \leq i \leq k'$, let \begin{equation*} s_i := |\{x~|~\exists~j, j' \mbox{ with } 1 \leq j < i < j' \leq k', y_{d'_j} = y_{d'_{j'}} = x \neq y_{d'_{i}}\}|\,. \end{equation*} Then the \emph{counter number of $\Delta_{\alpha}$} (or \emph{$\cn(\Delta_{\alpha})$} for short) is $\max\{s_i~|~1 \leq i \leq k'\}$. \end{definition} We explain the previous definition in an informal manner. Apart from the markers $\lambda$ and $\rho$, the head movement indicator $\overline{\Delta_{\alpha}}$, where $\Delta_{\alpha}$ is a Janus operating mode for some $\alpha$, can be regarded as a sequence $(d'_1, d'_2, \ldots, d'_{k'})$, where the $d'_i$, $1 \leq i \leq k'$, are positions in $\alpha$. Hence, we can associate a pattern $D_{\alpha} := y_{d'_1} \cdot y_{d'_2} \cdot \ldots \cdot y_{d'_{k'}}$ with $\overline{\Delta_{\alpha}}$. In order to determine the counter number of $\Delta_{\alpha}$, we consider each position $i$, $1 \leq i \leq k'$, in $D_{\alpha}$ and count the number of variables different from $y_{d'_{i}}$ that are parenthesising position $i$ in $D_{\alpha}$. The counter number is then the maximum over all these numbers.\par With regard to our example $\beta$, it can be easily verified that $\cn(\Delta_{\beta}) = 2$. We shall now see that, for every Janus operating mode $\Delta_{\alpha}$ for a pattern $\alpha$, we can construct a Janus automaton recognising $L(\alpha)$ with exactly $\cn(\Delta_{\alpha}) + 1$ counters: \begin{theorem}\label{janusConstructionTheorem} Let $\alpha$ be a terminal-free pattern and let $\Delta_{\alpha}$ be an arbitrary Janus operating mode for $\alpha$. There exists a $\jfa(\cn(\Delta_{\alpha}) + 1)$ $M$ satisfying $L(M) = L(\alpha)$. \end{theorem} Before we can prove this result, we need the following technical lemma: \begin{lemma} \label{crossingLemma} Let $\alpha$ be a terminal-free pattern with $|\var(\alpha)| \geq 2$, and let $\Gamma := \{z_1, z_2, \ldots, z_m\} \subseteq \var(\alpha)$. The following statements are equivalent: \renewcommand*\theenumi{\alph{enumi}} \begin{enumerate} \item \label{a_stat} For all $z, z' \in \Gamma$, $z \neq z'$, the pattern $\alpha$ can be factorised into $\alpha = \beta \cdot z \cdot \gamma \cdot z' \cdot \gamma' \cdot z \cdot \delta$ or $\alpha = \beta \cdot z' \cdot \gamma \cdot z \cdot \gamma' \cdot z' \cdot \delta$. \item \label{b_stat} There exists a $z \in \Gamma$ such that $\alpha$ can be factorised into $\alpha = \beta \cdot z \cdot \gamma$ with $(\Gamma \slash \{z\}) \subseteq (\var(\beta) \cap \var(\gamma))$. \end{enumerate} \end{lemma} \begin{proof} We prove by contraposition that \ref{a_stat} implies \ref{b_stat}. Hence, we assume that there exists no $z \in \Gamma$ such that $\alpha$ can be factorised into $\alpha = \beta \cdot z \cdot \gamma$ with $(\Gamma \slash \{z\}) \subseteq (\var(\beta) \cap \var(\gamma))$. Next, we define $l_{1}, l_{2}, \ldots, l_{m}$ to be the leftmost occurrences and $r_{1}, r_{2}, \ldots, r_{m}$ to be the rightmost occurrences of the variables $z_{1}, z_{2}, \ldots, z_{m}$. Furthermore, we assume $l_{1} < l_{2} < \ldots < l_{m}$. By assumption, it is not possible that, for every $i$, $1 \leq i \leq m - 1$, $r_i > l_m$ as this implies that $\alpha$ can be factorised into $\alpha = \beta \cdot z_m \cdot \gamma$, $|\beta| = l_m - 1$ with $(\Gamma \slash \{z_m\}) \subseteq (\var(\beta) \cap \var(\gamma))$. So we can assume that there exists an $i$, $1 \leq i \leq m - 1$, with $r_i < l_m$. This implies that, for $z_i, z_m$, $\alpha$ can neither be factorised into $\alpha = \beta \cdot z_i \cdot \gamma \cdot z_m \cdot \gamma' \cdot z_i \cdot \delta$ nor into $\alpha = \beta \cdot z_m \cdot \gamma \cdot z_i \cdot \gamma' \cdot z_m \cdot \delta$. This proves that \ref{a_stat} implies \ref{b_stat}.\par The converse statement, \ref{b_stat} implies \ref{a_stat}, can be easily comprehended. We assume that $z \in \Gamma$ satisfies the conditions of \ref{b_stat}, i.\,e., $\alpha$ can be factorised into $\alpha = \beta \cdot z \cdot \gamma$ with $(\Gamma \slash \{z\}) \subseteq (\var(\beta) \cap \var(\gamma))$. Now we arbitrarily choose $z', z'' \in \Gamma$, $z' \neq z''$, and we shall show that $\alpha = \beta' \cdot z' \cdot \gamma' \cdot z'' \cdot \gamma'' \cdot z' \cdot \delta'$ or $\alpha = \beta' \cdot z'' \cdot \gamma' \cdot z' \cdot \gamma'' \cdot z'' \cdot \delta'$. If either $z' = z$ or $z'' = z$, this is obviously true. In all other cases, the fact that there are occurrences of both $z'$ and $z''$ to either side of the occurrence of $z$ directly implies the existence of one of the aforementioned factorisations. \end{proof} Now we are able to present the proof of Theorem~\ref{janusConstructionTheorem}: \begin{proof} Let $\pi := \cn(\Delta_{\alpha}) + 1$. In order to prove Theorem~\ref{janusConstructionTheorem}, we illustrate a general way of transforming a Janus operating mode $\Delta_{\alpha} := (D_1, D_2, \ldots, D_k)$ of an arbitrary terminal-free pattern $\alpha := y_1 \cdot y_2 \cdot \ldots \cdot y_n$ into a Janus automaton $M$ with $\cn(\Delta_{\alpha}) + 1$ counters satisfying $L(M) = L(\alpha)$. We shall first give a definition of the automaton and then prove its correctness, i.\,e., $L(M) = L(\alpha)$.\par We assume that the Janus operating mode is derived from the complete matching order $(m_1, m_2, \ldots, m_k)$. Let us recall the main definitions that are used in this proof, namely the complete matching order and the Janus operating mode. We know that each element $m_i$, $1 \leq i \leq k$, of the complete matching order is a matching position, i.\,e., $m_i = (l_i, r_i)$, $l_i < r_i$ and $y_{l_i} = y_{r_i}$. The complete matching order is included in the Janus operating mode, since, for each $i$, $1 \leq i \leq k$, the tuple $D_i$ corresponds to the matching position $m_i$ in the following way: If $m_i = (l_i, r_i)$, then the last two elements of $D_i$ are $(r_i, \rho)$ and $(l_i, \lambda)$. All the other pairs in a $D_i$ are of form $(j, \mu)$ where $1 \leq j \leq |\alpha|$ and $\mu \in \{\lambda, \rho\}$. \par Before we move on to the formal definitions of the states and transitions of the automaton, let us illustrate its behaviour in an informal way. As described at the beginning of Section~\ref{sec:pattern}, the membership problem can be solved by checking the existence of a characteristic factorisation $u_1 \cdot u_2 \cdot \ldots \cdot u_n$ of the input $w$. Furthermore, by Lemma~\ref{matchingOrderLemma}, the complete matching order can be used as a list of instructions to perform this task. The factorisation is defined by the counter bounds, i.\,e., for every variable $x \in \var(\alpha)$, the automaton uses a certain counter, the counter bound of which defines the length of all the factors $u_i$ with $y_i = x$. However, if $\pi < |\var(\alpha)|$ is satisfied, then the automaton does not have the number of counters required for such a representation. Therefore, it might be necessary to reuse counters. To define which counter is used for which variables, we use a mapping $\co : \var(\alpha) \rightarrow \{1, 2, \ldots, \pi\}$. Note that, in case of $\pi < |\var(\alpha)|$, this mapping is not injective. We defer a complete definition of the mapping $\co$ and, for now, just assume that there exists such a mapping. \par Next, we show how a tuple $D_p$ for an arbitrary $p$, $1 \leq p \leq k$, can be transformed into a part of the automaton. Therefore, we define \begin{equation*} D_p := ((j_1, \mu_1), (j_2, \mu_2), \ldots, (j_{k'}, \mu_{k'}), (j_r, \rho), (j_l, \lambda)) \end{equation*} with $\mu_i \in \{\lambda, \rho\}$, $1 \leq i \leq k'$. Recall that $D_p$ corresponds to the matching position $m_p := (j_l, j_r)$. Let us interpret the tuple $D_p$ as follows: The pairs $(j_1, \mu_1), (j_2, \mu_2), \ldots, (j_{k'}, \mu_{k'})$ define how the heads have to be moved in order to reach factors $u_{j_l}$ and $u_{j_r}$, which then have to be matched. Let $(j_i, \mu_i)$, $1 \leq i \leq k'$, be an arbitrary pair of $D_p$. If $\mu_i = \lambda$ (or $\mu_i = \rho$), then the meaning of this pair is that the left head (or the right head, respectively) has to be moved a number of steps defined by the counter bound of counter $\co(y_{j_i})$. The direction the head has to be moved to depends on the matching position corresponding to the previous element $D_{p - 1}$. In order to define these ideas formally, we refer to this previous matching position by $m_{p - 1} := (j'_l, r'_l)$.\par If $j'_l < j_l$, then we have to move the left head to the right passing the factors $u_{j'_{l} + 1}, u_{j'_l + 2}, \ldots, u_{j_l - 1}$; thus, we introduce the following states: \begin{equation*} \{\lforth_{p, q} \mid j'_l + 1 \leq q \leq j_l - 1\}\enspace. \end{equation*} In every state $\lforth_{p, q}$, $j'_l + 1 \leq q \leq j_l - 1$, we move the left head as many steps to the right as determined by the currently stored counter bound for counter $\co(y_{q})$. Hence, for every $q$, $j'_l + 1 \leq q \leq j_l - 1$, for all $a, a' \in \Sigma$ and for every $s_i \in \{\mathtt{t_{=}}, \mathtt{t_{<}}\}$, $i \in \{1, \ldots, \pi\} \slash \{\co(y_{q})\}$, we define \begin{equation*} \delta(\lforth_{p, q}, a, a', s_1, s_2, \ldots, s_{\pi}) := (\lforth_{p, q}, 1, 0, d_1, d_2, \ldots, d_{\pi})\enspace, \end{equation*} where $s_{\co(y_{q})} := \mathtt{t_{<}}$, $d_{\co(y_{q})} := 1$, and, for every $i \in \{1, \ldots, \pi\} \slash \{\co(y_{q})\}$, $d_i := 0$.\par Analogously, if $j_l < j'_l$, then we have to move the left head to the left over the factors $u_{j'_{l}}, u_{j'_{l} - 1}, \ldots, u_{j_{l} + 1}, u_{j_{l}}$; to this end we use the following set of states: \begin{equation*} \{\lback_{p, q} \mid j_{l} \leq q \leq j'_l\}\enspace. \end{equation*} As before, for every $q$, $j_{l} \leq q \leq j'_l$, for all $a, a' \in \Sigma$ and for every $s_i \in \{\mathtt{t_{=}}, \mathtt{t_{<}}\}$, $i \in \{1, \ldots, \pi\} \slash \{\co(y_{q})\}$, we define \begin{equation*} \delta(\lback_{p, q}, a, a', s_1, s_2, \ldots, s_{\pi}) := (\lback_{p, q}, -1, 0, d_1, d_2, \ldots, d_{\pi})\enspace, \end{equation*} where $s_{\co(y_{q})} := \mathtt{t_{<}}$, $d_{\co(y_{q})} := 1$, and, for every $i \in \{1, \ldots, \pi\} \slash \{\co(y_{q})\}$, $d_i := 0$.\par Note that, in the above defined transitions, the only difference between the cases $j'_l < j_l$ and $j_l < j'_l$, apart from the different states, is the head instruction for the left head. The states for the right head, i.\,e., $\rforth_{p, q}$ and $\rback_{p, q}$, and their transitions are defined analogously.\par Up to now, we have introduced states that can move the input heads back or forth over whole factors of the input word. This is done by moving an input head and simultaneously incrementing a counter until it reaches the counter bound, i.\,e., the counter message changes to $\mathtt{t_{=}}$. It remains to define what happens if an input head is completely moved over a factor and the counter message changes to $\mathtt{t_{=}}$. Intuitively, in this case the automaton should change to another state and then move a head in dependency of another counter. Thus, e.\,g., if in state $\lforth_{p, i}$ the counter message of counter $\co(y_{i})$ is $\mathtt{t_{=}}$, then the automaton should change into state $\lforth_{p, i + 1}$. In order to simplify the formal definition we assume $j'_l < j_l$ and $j'_r < j_r$, as all other cases can be handled similarly. For every $q$, $1 \leq q \leq k' - 1$, for all $a, a' \in \Sigma$ and for every $s_i \in \{\mathtt{t_{=}}, \mathtt{t_{<}}\}$, $i \in \{1, \ldots, \pi\} \slash \{\co(y_{q})\}$, we define \begin{align*} &\delta(\lforth_{p, q}, a, a', s_1, s_2, \ldots, s_{\pi}) := (\lforth_{p, q + 1}, 0, 0, d_1, d_2, \ldots, d_{\pi})\enspace,\\ &\mbox{if $\mu_p = \lambda$ and $\mu_{p + 1} = \lambda$}\enspace, \end{align*} \begin{align*} &\delta(\lforth_{p, q}, a, a', s_1, s_2, \ldots, s_{\pi}) := (\rforth_{p, q + 1}, 0, 0, d_1, d_2, \ldots, d_{\pi})\enspace,\\ &\mbox{if $\mu_p = \lambda$ and $\mu_{p + 1} = \rho$}\enspace, \end{align*} \begin{align*} &\delta(\rforth_{p, q}, a, a', s_1, s_2, \ldots, s_{\pi}) := (\lforth_{p, q + 1}, 0, 0, d_1, d_2, \ldots, d_{\pi})\enspace,\\ &\mbox{if $\mu_p = \rho$ and $\mu_{p + 1} = \lambda$}\enspace, \end{align*} \begin{align*} &\delta(\rforth_{p, q}, a, a', s_1, s_2, \ldots, s_{\pi}) := (\rforth_{p, q + 1}, 0, 0, d_1, d_2, \ldots, d_{\pi})\enspace,\\ &\mbox{if $\mu_p = \rho$ and $\mu_{p + 1} = \rho$}\enspace, \end{align*} where $s_{\co(y_{q})} := \mathtt{t_{=}}$, $d_{\co(y_{q})} = 1$, and, for every $i \in \{1, \ldots, \pi\} \slash \{\co(y_{q})\}$, $d_i := 0$.\par Now, for every $i$, $1 \leq i \leq k' - 1$, the transition changing the automaton from the state corresponding to the pair $(j_i, \mu_i)$ into the state corresponding to $(j_{i + 1}, \mu_{i + 1})$ has been defined. Note, that in these transitions we increment the counter $\co(y_{q})$ once more without moving the input head to set its value back to $0$ again, such that it is ready for the next time it is used. However, it remains to define what happens if the counter $\co(y_{j_{k'}})$ reaches its counter bound in the state that corresponds to the final pair $(j_{k'}, \mu_{k'})$. In this case, the automaton enters a new state $\match_p$, in which the factors $u_{j_l}$ and $u_{j_r}$ are matched. In the following definition, let $q := j_{k'}$. For all $a, a' \in \Sigma$ and for every $s_i \in \{\mathtt{t_{=}}, \mathtt{t_{<}}\}$, $i \in \{1, \ldots, \pi\} \slash \{\co(y_{q})\}$, we define \begin{align*} &\delta(\lforth_{p, q}, a, a', s_1, s_2, \ldots, s_{\pi}) := (\match_{p}, 0, 0, d_1, d_2, \ldots, d_{\pi})\enspace,\\ &\mbox{if $\mu_{j_{k'}} = \lambda$}\enspace, \end{align*} \begin{align*} &\delta(\rforth_{p, q}, a, a', s_1, s_2, \ldots, s_{\pi}) := (\match_{p}, 0, 0, d_1, d_2, \ldots, d_{\pi})\enspace,\\ &\mbox{if $\mu_{j_{k'}} = \rho$}\enspace, \end{align*} where $s_{\co(y_{q})} := \mathtt{t_{=}}$, $d_{\co(y_{q})} := 1$, and, for every $i \in \{1, \ldots, \pi\} \slash \{\co(y_{q})\}$, $d_i := 0$.\par In the state $\match_{p}$ the factors $u_{j_l}$ and $u_{j_r}$ are matched by simultaneously moving both heads to the right. In the following definition, let $q := j_l$. For every $a \in \Sigma$ and for every $s_i \in \{\mathtt{t_{=}}, \mathtt{t_{<}}\}$, $i \in \{1, \ldots, {\pi}\} \slash \{\co(y_{q})\}$, we define \begin{equation*} \delta(\match_{p}, a, a, s_1, s_2, \ldots, s_{\pi}) := (\match_{p}, 1, 1, d_1, d_2, \ldots, d_{\pi})\enspace, \end{equation*} where $s_{\co(y_{q})} := \mathtt{t_{<}}$, $d_{\co(y_{q})} := 1$, and, for every $i \in \{1, \ldots, {\pi}\} \slash \{\co(y_{q})\}$, $d_i := 0$.\par Note, that these transitions are only applicable if both input heads scan the same symbol. If the symbol scanned by the left head differs from the one scanned by the right head, then no transition is defined and thus the automaton stops in a non-accepting state.\par Finally, the very last transition to define in order to transform $D_p$ into a part of the automaton is the case when counter $\co(y_{j_l})$ has reached its counter bound in state $\match_{p}$. For the sake of convenience, we assume that the first pair of $D_{p + 1}$ is $(j', \lambda)$ and, furthermore, that $m_{p + 1} := (j''_l, j''_r)$ with $j_l < j''_l$. For all $a, a' \in \Sigma$ and for every $s_i \in \{\mathtt{t_{=}}, \mathtt{t_{<}}\}$, $i \in \{1, \ldots, \pi\} \slash \{\co(y_{q})\}$, we define \begin{equation*} \delta(\match_{p}, a, a', s_1, s_2, \ldots, s_{\pi}) := (\lforth_{p+1, j'}, 0, 0, d_1, d_2, \ldots, d_{\pi})\enspace, \end{equation*} where $s_{\co(y_{q})} := \mathtt{t_{=}}$, $d_{\co(y_{q})} := 1$, and, for every $i \in \{1, \ldots, \pi\} \slash \{\co(y_{q})\}$, $d_i := 0$.\par As mentioned above, this is merely the transition in the case that the first pair of $D_{p + 1}$ is $(j', \lambda)$ and $j_l < j''_l$ is satisfied. However, all the other cases can be handled analogously. In the case that the first pair of $D_{p + 1}$ is $(j', \rho)$ instead of $(j', \lambda)$ we have to enter state $\rforth_{p+1, j'}$ instead of $\lforth_{p+1, j'}$. If $j_l > j''_l$ holds instead of $j_l < j''_l$ we have to enter a back-state (e.\,g., $\lback_{p+1, j'}$) instead. These transitions can also be interpreted as the passage between the part of the automaton corresponding to $D_p$ and the part corresponding to the next tuple $D_{p + 1}$ of the Janus operating mode. \par We have to explain a few special cases concerning the definitions above. Regarding the tuples $D_1$ and $D_k$ we have to slightly change the definitions. Initially, both heads are located at the very left position of the input, i.\,e., the left endmarker ``$\cent$'', therefore only $\lforth_{1, q}$ and $\rforth_{1, q}$ states are needed to transform $D_1$ into a part of the automaton. When the automaton is in state $\match_{k}$ and the counter has reached its counter bound, then the state $q_f$ is entered, which is the only final state of $M$. We recall, that $\alpha = y_1 \cdot y_2 \cdot \ldots \cdot y_n$. Whenever the automaton, for a $p$, $1 \leq p \leq k$, is in a state in $\{\lforth_{p, n}, \lback_{p, n}, \rforth_{p, n}, \rback_{p, n}\}$ or in a state $\match_{p}$, where $m_{p} = (j, n)$, for some $j$, $j < n$, is a matching position, then this means that a head is moved over the rightmost factor $u_n$. When the automaton is in such a state for the first time and the counter bound of counter $\co(y_n)$ is reached, then the automaton blocks if the head does not scan the right endmarker ``$\$$'', as this implies $|u_1 \cdot u_2 \cdot \ldots \cdot u_n| < |w|$. In case that $|u_1 \cdot u_2 \cdot \ldots \cdot u_n| > |w|$ the automaton blocks at some point when it tries to move a head to the right that scans $\$$ since this transition is not defined. A formal definition of these special cases is omitted.\par Obviously, each of the above defined transitions depend on a certain counter determined by the mapping $\co$, so let us now return to the problem of defining this mapping. As already mentioned, this mapping $\co$ is in general not injective, hence it is possible that $\co(x) = \co(z)$ for some $x \neq z$. This means, intuitively speaking, that there seems to be an undesirable connection between the lengths of factors $u_j$ with $y_j = x$ and factors $u_{j'}$ with $y_{j'} = z$. However, this connection does not have any effect if it is possible to, initially, exclusively use the counter bound of counter $\co(x) = \co(z)$ for factors corresponding to $x$ and then exclusively for factors corresponding to variable $z$ and never for factors corresponding to $x$ again. In this case the automaton may reset this counter after it has been used for factors corresponding to $x$ in order to obtain a new length for factors corresponding to $z$. This means that a counter is reused. We now formalise this idea.\par Let $\overline{\Delta_{\alpha}} := ((d'_1, \mu'_1), (d'_2, \mu'_2), \ldots, (d'_{k''}, \mu'_{k''}))$ be the head movement indicator of the Janus operating mode. We consider the pattern $D_{\alpha} := y_{d'_1} \cdot y_{d'_2} \cdot \ldots \cdot y_{d'_{k''}}$. If, for some $x, z \in \var(\alpha)$, $x \neq z$, $D_{\alpha}$ can be factorised into $D_{\alpha} = \beta \cdot x \cdot \gamma \cdot z \cdot \gamma' \cdot x \cdot \delta$, then the automaton cannot use the same counter for variables $x$ and $z$; thus, $\co$ has to satisfy $\co(x) \neq \co(z)$.\par\bigskip\noindent \emph{Claim} There exists a total mapping $\co : \var(\alpha) \rightarrow \{1, 2, \ldots, \pi\}$ such that, for all $x, z \in \var(\alpha)$, $x \neq z$, if $D_{\alpha} = \beta \cdot x \cdot \gamma \cdot z \cdot \gamma' \cdot x \cdot \delta$ or $D_{\alpha} = \beta \cdot z \cdot \gamma \cdot x \cdot \gamma' \cdot z \cdot \delta$, then $\co(x) \neq \co(z)$.\par\medskip\noindent \emph{Proof (Claim).} If there is no set of variables $\Gamma \subseteq \var(\alpha)$ with $|\Gamma| > \pi$ such that for all $x, z \in \Gamma$, $x \neq z$, $D_{\alpha} = \beta \cdot x \cdot \gamma \cdot z \cdot \gamma' \cdot x \cdot \delta$ or $D_{\alpha} = \beta \cdot z \cdot \gamma \cdot x \cdot \gamma' \cdot z \cdot \delta$, then there obviously exists such a mapping $\co$. So we assume to the contrary, that there exists a set of variables $\Gamma$, $|\Gamma| = \pi + 1$, with the above given properties. Now we can apply Lemma~\ref{crossingLemma} to the pattern $D_{\alpha}$ and conclude that there exist a $z' \in \Gamma$ such that $D_{\alpha}$ can be factorised into $D_{\alpha} = \beta \cdot z' \cdot \gamma$ with $(\Gamma \slash \{z'\}) \subseteq (\var(\beta) \cap \var(\gamma))$. This directly implies $\cn(\Delta_{\alpha}) \geq \pi = \cn(\Delta_{\alpha}) + 1$, which is a contradiction.\par \hfill \emph{q.e.d. (Claim)} \par\bigskip\noindent This shows that such a mapping $\co$ exists and, furthermore, we can note that it is straightforward to effectively construct it.\par As already mentioned above, it may be necessary for the automaton to reset counters. More formally, if, for some $j$, $1 \leq j \leq \pi$, and for some $x, z \in \var(\alpha)$, $x \neq z$, $\co(x) = \co(z) = j$, then this counter $j$ must be reset. We now explain how this is done. By definition of the states and transitions so far, we may interpret states as being related to factors $u_q$, i.\,e., for every $p$, $1 \leq p \leq k$, and every $q$, $1 \leq q \leq n$, the states in $\{\lforth_{p, q}, \lback_{p, q}, \rforth_{p, q}, \rback_{p, q}\}$ correspond to factor $u_q$ and state $\match_{p}$ corresponds to both factors $u_l$ and $u_r$, where $m_p = (l, r)$. For every $x \in \var(\alpha)$, the automaton resets counter $\co(x)$, using the special counter instruction $\mathtt{r}$, immediately after leaving the last state corresponding to a factor $u_q$ with $y_q = x$. In order to define this transition formally, we assume that, for example, $\lforth_{p, q}$ with $y_q = x$ is that state and $\lforth_{p, q + 1}$ is the subsequent state. For all $a, a' \in \Sigma$ and for every $s_i \in \{\mathtt{t_{=}}, \mathtt{t_{<}}\}$, $i \in \{1, \ldots, \pi\} \slash \{\co(x)\}$, we define \begin{equation*} \delta(\lforth_{p, q}, a, a', s_1, s_2, \ldots, s_{\pi}) = (\lforth_{p, q + 1}, 0, 0, d_1, d_2, \ldots, d_{\pi})\enspace, \end{equation*} where $s_{\co(x)} := \mathtt{t_{=}}$, $d_{\co(x)} := \mathtt{r}$, and, for every $i \in \{1, \ldots, \pi\} \slash \{\co(x)\}$, $d_i := 0$.\par We recall, that by definition of a Janus automaton, all counter bounds are initially $0$, so the automaton must initially reset all $\pi$ counters. To define this transition formally, let $\lforth_{1,1}$ be the state corresponding to the first element of $D_1$. The first transition is defined by \begin{equation*} \delta(q_0, \cent, \cent, \mathtt{t_{=}}, \mathtt{t_{=}}, \ldots, \mathtt{t_{=}}) = (\lforth_{1,1}, 0, 0, \mathtt{r}, \mathtt{r}, \ldots, \mathtt{r})\enspace, \end{equation*} where $q_0$ is the initial state of $M$. This concludes the definition of the automaton and we shall now prove its correctness, i.\,e., $L(M) = L(\alpha)$.\par Let $w \in \Sigma^*$ be an arbitrary input word. From the above given definition, it is obvious that the automaton treats $w$ as a sequence of factors $u_1 \cdot u_2 \cdot \ldots \cdot u_n$. The lengths of these factors $u_i$, $1 \leq i \leq n$, are determined by the counter bounds guessed during the computation. If $|u_1 \cdot u_2 \cdot \ldots \cdot u_n| \neq |w|$, then the automaton does not accept the input anyway, so we may only consider those cases where suitable counter bounds are guessed that imply $|u_1 \cdot u_2 \cdot \ldots \cdot u_n| = |w|$. Recall the complete matching order $(m_1, m_2, \ldots, m_k)$ with $m_p = (l_p, r_p)$, $1 \leq p \leq k$. By definition, in the states $\match_p$, $1 \leq p \leq k$, the automaton matches factor $u_{l_p}$ and $u_{r_p}$. If $M$ reaches the accepting state $q_f$, then, for every $p$, $1 \leq p \leq k$, $u_{l_p} = u_{r_p}$ and, by applying Lemma~\ref{matchingOrderLemma}, we conclude that $u_1 \cdot u_2 \cdot \ldots \cdot u_n$ is a characteristic factorisation. Hence, $w \in L(\alpha)$.\par On the other hand, let $w' \in L(\alpha)$ be arbitrarily chosen. This implies that we can factorise $w'$ into $w' = u_1 \cdot u_2 \cdot \ldots \cdot u_n$ such that for all $j, j'$, $1 \leq j < j' \leq n$, $y_j = y_{j'}$ implies $u_j = u_{j'}$, i.\,e., $u_1 \cdot u_2 \cdot \ldots \cdot u_n$ is a characteristic factorisation. By definition, it is possible that the automaton guesses counter bounds such that the input word $w'$ is treated in this factorisation $w' = u_1 \cdot u_2 \cdot \ldots \cdot u_n$, so $M$ accepts $w'$ and thus $w' \in L(M)$. Consequently, $L(M) = L(\alpha)$, which concludes the proof of correctness, and hence the proof of Theorem~\ref{janusConstructionTheorem}. \end{proof} We conclude this section by discussing the previous results in a bit more detail. The main technical tool defined in this section is the Janus operating mode. So far, we interpreted Janus operating modes as instructions specifying how two input heads can be used to move over a word given in a certain factorisation in order to check on whether this factorisation is a characteristic one. So, in other words, a Janus operating mode can be seen as representing an algorithm, solving the membership problem for the pattern language given by a certain pattern. Theorem~\ref{janusConstructionTheorem} formally proves this statement.\par A major benefit of this approach is, that from now on we can focus on Janus operating modes rather than on the more involved model of a Janus automaton. More precisely, the previous result shows that the task of finding an optimal Janus automaton for a terminal-free pattern language is equivalent to finding an optimal Janus operating mode for this pattern. Before we investigate this task in the subsequent section, we revise our perspective regarding Janus operating modes. There is no need to consider input words anymore and, thus, in the following we shall investigate properties of patterns and Janus operating modes exclusively. Therefore, we establish a slightly different point of view at Janus operating modes, i.\,e., we interpret them as describing input head movements over a pattern instead of over a word given in a factorisation: \begin{remark}\label{inputHeadsPerspectiveRemark} Let $\Delta_{\alpha} := (D_1, D_2, \ldots, D_k)$ be an arbitrary Janus operating mode for some pattern $\alpha := y_1 \cdot y_2 \cdot \ldots \cdot y_n$ and let $\Delta_{\alpha}$ be derived from the complete matching order $(m_1, m_2, \ldots, m_k)$. Furthermore, let $\overline{\Delta_{\alpha}} := ((d'_1, \mu'_1)$, $(d'_2, \mu'_2), \ldots, (d'_{k'}, \mu'_{k'}))$ be the head movement indicator of the canonical Janus operating mode. We can interpret $\overline{\Delta_{\alpha}}$ as a sequence of input head movements over the pattern $\alpha$, i.\,e., after $i$ movements or steps of $\overline{\Delta_{\alpha}}$, where $1 \leq i \leq k'$, the left input head is located at variable $y_{d'_i}$ if $\mu'_i = \lambda$ or, in case that $\mu'_i = \rho$, the right input head is located at $y_{d'_i}$. So for every $i$, $1 \leq i \leq k'$, the sequence $\overline{\Delta_{\alpha}}$ determines the positions of both input heads after the first $i$ movements of $\overline{\Delta_{\alpha}}$. More precisely, for every $i$, $1 \leq i \leq k'$, after $i$ steps of $\overline{\Delta_{\alpha}}$, the positions $l_i$ and $r_i$ of the left head and the right head in $\alpha$ are given by \begin{align*} l_i &= \max\{d'_j \mid 1 \leq j \leq i, \mu'_j = \lambda\} \text{ and}\\ r_i &= \max\{d'_j \mid 1 \leq j \leq i, \mu'_j = \rho\}\,. \end{align*} We note that $\{d'_j \mid 1 \leq j \leq i, \mu'_j = \lambda\} = \emptyset$ is possible, which means that $\mu_j = \rho$, $1 \leq j \leq i$, or, in other words, that so far only the right head has been moved. In this case, we shall say that the left head has not yet entered $\alpha$ and therefore is located at position $0$. The situation $\{d'_j \mid 1 \leq j \leq i, \mu'_j = \rho\} = \emptyset$ is interpreted analogously. As already mentioned above, for every $i$, $1 \leq i \leq k'$, we have either $l_i = d'_i$ or $r_i = d'_i$ (depending on $\mu_i$). Furthermore, for every $i$, $1 \leq i \leq k'$, it is not possible that both heads are located at position $0$. \end{remark} This special perspective towards Janus operating modes, described in the previous remark, shall play a central role in the proofs for the following results. \section{Patterns with Restricted Variable Distance}\label{sec:varDist} We now introduce a certain combinatorial property of terminal-free patterns, the so-called variable distance, which is the maximum number of different variables separating any two consecutive occurrences of a variable: \begin{definition}\label{vdDefinition} The \emph{variable distance} of a terminal-free pattern $\alpha$ is the smallest number $k \geq 0$ such that, for every $x \in \var(\alpha)$, every factorisation $\alpha = \beta \cdot x \cdot \gamma \cdot x \cdot \delta$ with $\beta, \gamma, \delta \in \var(\alpha)^*$ and $|\gamma|_{x} = 0$ satisfies $|\var(\gamma)| \leq k$. We denote the variable distance of a terminal-free pattern $\alpha$ by $\vd(\alpha)$. \end{definition} Obviously, $\vd(\alpha) \leq |\var(\alpha)| - 1$ for all terminal-free patterns $\alpha$. To illustrate the concept of the variable distance, we consider the pattern $\beta' := x_1 \cdot x_2 \cdot x_3 \cdot x_2 \cdot x_3 \cdot x_1 \cdot x_4 \cdot x_3 \cdot x_5 \cdot x_5 \cdot x_4$. In the following figure, for every two successive occurrences of any variable in $\beta'$, the number of different variables occurring between these occurrences is pointed out: \begin{tikzpicture} \coordinate (coord0) at (0,0); \coordinate (coord1) at ($(coord0) + (1,0)$); \coordinate (coord2) at ($(coord1) + (1,0)$); \coordinate (coord3) at ($(coord2) + (1,0)$); \coordinate (coord4) at ($(coord3) + (1,0)$); \coordinate (coord5) at ($(coord4) + (1,0)$); \coordinate (coord6) at ($(coord5) + (1,0)$); \coordinate (coord7) at ($(coord6) + (1,0)$); \coordinate (coord8) at ($(coord7) + (1,0)$); \coordinate (coord9) at ($(coord8) + (1,0)$); \coordinate (coord10) at ($(coord9) + (1,0)$); \draw ($(coord0) - (0.8,0)$) node {$\beta' = $}; \draw (coord0) node {$x_1$}; \draw (coord1) node {$x_2$}; \draw (coord2) node {$x_3$}; \draw (coord3) node {$x_2$}; \draw (coord4) node {$x_3$}; \draw (coord5) node {$x_1$}; \draw (coord6) node {$x_4$}; \draw (coord7) node {$x_3$}; \draw (coord8) node {$x_5$}; \draw (coord9) node {$x_5$}; \draw (coord10) node {$x_4$}; \draw[black] ($(coord0) + (-0.05,0.9)$) -- ($(coord0) + (-0.05,0.2)$); \draw[black] ($(coord0) + (-0.30,0.2)$) -- ($(coord0) + (0.2,0.2)$); \draw[black] ($(coord0) + (-0.30,0.2)$) -- ($(coord0) + (-0.30,0.1)$); \draw[black] ($(coord0) + (0.2,0.2)$) -- ($(coord0) + (0.2,0.1)$); \draw[black] ($(coord5) + (-0.05,0.9)$) -- ($(coord5) + (-0.05,0.2)$); \draw[black] ($(coord5) + (-0.30,0.2)$) -- ($(coord5) + (0.2,0.2)$); \draw[black] ($(coord5) + (-0.30,0.2)$) -- ($(coord5) + (-0.30,0.1)$); \draw[black] ($(coord5) + (0.2,0.2)$) -- ($(coord5) + (0.2,0.1)$); \draw[black] ($(coord0) + (-0.05,0.9)$) -- ($(coord5) + (-0.05,0.9)$); \draw[black] ($(coord2) + (0.5,1.1)$) node {$2$}; \draw[black] ($(coord2) + (-0.05,0.4)$) -- ($(coord2) + (-0.05,0.2)$); \draw[black] ($(coord2) + (-0.30,0.2)$) -- ($(coord2) + (0.2,0.2)$); \draw[black] ($(coord2) + (-0.30,0.2)$) -- ($(coord2) + (-0.30,0.1)$); \draw[black] ($(coord2) + (0.2,0.2)$) -- ($(coord2) + (0.2,0.1)$); \draw[black] ($(coord4) + (-0.05,0.4)$) -- ($(coord4) + (-0.05,0.2)$); \draw[black] ($(coord4) + (-0.30,0.2)$) -- ($(coord4) + (0.2,0.2)$); \draw[black] ($(coord4) + (-0.30,0.2)$) -- ($(coord4) + (-0.30,0.1)$); \draw[black] ($(coord4) + (0.2,0.2)$) -- ($(coord4) + (0.2,0.1)$); \draw[black] ($(coord2) + (-0.05,0.4)$) -- ($(coord4) + (-0.05,0.4)$); \draw[black] ($(coord3) + (0,0.6)$) node {$1$}; \draw[black] ($(coord6) + (-0.05,0.4)$) -- ($(coord6) + (-0.05,0.2)$); \draw[black] ($(coord6) + (-0.30,0.2)$) -- ($(coord6) + (0.2,0.2)$); \draw[black] ($(coord6) + (-0.30,0.2)$) -- ($(coord6) + (-0.30,0.1)$); \draw[black] ($(coord6) + (0.2,0.2)$) -- ($(coord6) + (0.2,0.1)$); \draw[black] ($(coord10) + (-0.05,0.4)$) -- ($(coord10) + (-0.05,0.2)$); \draw[black] ($(coord10) + (-0.30,0.2)$) -- ($(coord10) + (0.2,0.2)$); \draw[black] ($(coord10) + (-0.30,0.2)$) -- ($(coord10) + (-0.30,0.1)$); \draw[black] ($(coord10) + (0.2,0.2)$) -- ($(coord10) + (0.2,0.1)$); \draw[black] ($(coord6) + (-0.05,0.4)$) -- ($(coord10) + (-0.05,0.4)$); \draw[black] ($(coord8) + (0,0.6)$) node {$2$}; \draw[black] ($(coord1) + (-0.025,-0.4)$) -- ($(coord1) + (-0.025,-0.2)$); \draw[black] ($(coord1) + (-0.3,-0.2)$) -- ($(coord1) + (0.25,-0.2)$); \draw[black] ($(coord1) + (-0.3,-0.2)$) -- ($(coord1) + (-0.3,-0.1)$); \draw[black] ($(coord1) + (0.25,-0.2)$) -- ($(coord1) + (0.25,-0.1)$); \draw[black] ($(coord3) + (-0.025,-0.4)$) -- ($(coord3) + (-0.025,-0.2)$); \draw[black] ($(coord3) + (-0.3,-0.2)$) -- ($(coord3) + (0.25,-0.2)$); \draw[black] ($(coord3) + (-0.3,-0.2)$) -- ($(coord3) + (-0.3,-0.1)$); \draw[black] ($(coord3) + (0.25,-0.2)$) -- ($(coord3) + (0.25,-0.1)$); \draw[black] ($(coord1) + (-0.025,-0.4)$) -- ($(coord3) + (-0.025,-0.4)$); \draw[black] ($(coord2) + (0,-0.6)$) node {$1$}; \draw[black] ($(coord4) + (-0.025,-0.4)$) -- ($(coord4) + (-0.025,-0.2)$); \draw[black] ($(coord4) + (-0.3,-0.2)$) -- ($(coord4) + (0.25,-0.2)$); \draw[black] ($(coord4) + (-0.3,-0.2)$) -- ($(coord4) + (-0.3,-0.1)$); \draw[black] ($(coord4) + (0.25,-0.2)$) -- ($(coord4) + (0.25,-0.1)$); \draw[black] ($(coord7) + (-0.025,-0.4)$) -- ($(coord7) + (-0.025,-0.2)$); \draw[black] ($(coord7) + (-0.3,-0.2)$) -- ($(coord7) + (0.25,-0.2)$); \draw[black] ($(coord7) + (-0.3,-0.2)$) -- ($(coord7) + (-0.3,-0.1)$); \draw[black] ($(coord7) + (0.25,-0.2)$) -- ($(coord7) + (0.25,-0.1)$); \draw[black] ($(coord4) + (-0.025,-0.4)$) -- ($(coord7) + (-0.025,-0.4)$); \draw[black] ($(coord5) + (0.5,-0.6)$) node {$2$}; \draw[black] ($(coord8) + (-0.025,-0.4)$) -- ($(coord8) + (-0.025,-0.2)$); \draw[black] ($(coord8) + (-0.3,-0.2)$) -- ($(coord8) + (0.25,-0.2)$); \draw[black] ($(coord8) + (-0.3,-0.2)$) -- ($(coord8) + (-0.3,-0.1)$); \draw[black] ($(coord8) + (0.25,-0.2)$) -- ($(coord8) + (0.25,-0.1)$); \draw[black] ($(coord9) + (-0.025,-0.4)$) -- ($(coord9) + (-0.025,-0.2)$); \draw[black] ($(coord9) + (-0.3,-0.2)$) -- ($(coord9) + (0.25,-0.2)$); \draw[black] ($(coord9) + (-0.3,-0.2)$) -- ($(coord9) + (-0.3,-0.1)$); \draw[black] ($(coord9) + (0.25,-0.2)$) -- ($(coord9) + (0.25,-0.1)$); \draw[black] ($(coord8) + (-0.025,-0.4)$) -- ($(coord9) + (-0.025,-0.4)$); \draw[black] ($(coord8) + (0.5,-0.6)$) node {$0$}; \end{tikzpicture}\\ Referring to the previous figure it can be easily comprehended that $\vd(\beta') = 2$.\par The problem of computing the variable distance $\vd(\alpha)$ for an arbitrary pattern $\alpha$ is not a difficult one as pointed out by the following proposition: \begin{proposition}\label{vdEfficiencyProp} For every terminal-free pattern $\alpha$, the number $\vd(\alpha)$ can be efficiently computed. \end{proposition} \begin{proof} Let $\alpha := y_1 \cdot y_2 \cdot \ldots \cdot y_n$ be a terminal-free pattern. It is possible to compute the variable distance of $\alpha$ in the following way. We move over $\alpha$ from left to right. Whenever a variable $x$ is encountered for the first time, we initialise a set $S_x$, which we delete again after passing the last occurrence of $x$. Furthermore, for every $x$ that we pass, we add $x$ to all existing sets $S_{x\rq{}}$, $x \neq x\rq{}$, and completely empty the set $S_x$. The variable distance is then the maximum cardinality of any of these sets during this procedure. \end{proof} The following vital result shows that for every possible Janus operating mode for some pattern $\alpha$, its counter number is at least equal to the variable distance of $\alpha$. Hence, the variable distance is a lower bound for the counter number of Janus operating modes. \begin{theorem}\label{cnGeqVd} Let $\Delta_{\alpha}$ be an arbitrary Janus operating mode for a terminal-free pattern $\alpha$. Then $\cn(\Delta_{\alpha}) \geq \vd(\alpha)$. \end{theorem} \begin{proof} Let $\alpha := y_1 \cdot y_2 \cdot \ldots \cdot y_n$ be a terminal-free pattern and let $(m_1, m_2, \ldots, m_k)$ be the complete matching order for $\alpha$ from which $\Delta_{\alpha} := (D_1, D_2, \ldots, D_{k})$ is derived. Furthermore, let $\overline{\Delta_{\alpha}} := ((d'_1, \mu'_1), (d'_2, \mu'_2), \ldots, (d'_{k'}, \mu'_{k'}))$ be the head movement indicator of the Janus operating mode. This sequence $\overline{\Delta_{\alpha}}$ contains numbers $d'_i$, $1 \leq i \leq k'$, that are positions of $\alpha$, i.\,e., $1 \leq d'_i \leq |\alpha|$, $1 \leq i \leq k'$. Hence, we can associate a pattern $D_{\alpha}$ with $\overline{\Delta_{\alpha}}$ and $\alpha$ in the following way: $D_{\alpha} := y_{d'_1} \cdot y_{d'_2} \cdot \ldots \cdot y_{d'_{k'}}$. By definition of the variable distance, we know that there exists an $x \in \var(\alpha)$ such that $\alpha = \beta \cdot x \cdot \gamma \cdot x \cdot \delta$ with $|\gamma|_{x} = 0$ and $|\var(\gamma)| = \vd(\alpha)$. We assume $\vd(\alpha) \geq 1$ (i.\,e., $\var(\gamma) \neq \emptyset$), as in the case $\vd(\alpha) = 0$, $\cn(\Delta_{\alpha}) \geq \vd(\alpha)$ trivially holds.\par In the following, let $\Gamma := \var(\gamma) \cup \{x\}$. We shall prove the statement of the theorem by showing that there exists a variable $z \in \Gamma$ such that $D_{\alpha} = \overline{\beta} \cdot z \cdot \overline{\gamma}$ with $|(\var(\overline{\beta}) \cap \var(\overline{\gamma})) \slash \{z\}| \geq \vd(\alpha)$, which implies $\cn(\Delta_{\alpha}) \geq \vd(\alpha)$. To this end, we first prove the following claim: \par\bigskip\noindent \emph{Claim} For all $z, z' \in \Gamma$, $z \neq z'$, we can factorise $D_{\alpha}$ into $D_{\alpha} = \widetilde{\beta} \cdot z \cdot \widetilde{\gamma_1} \cdot z' \cdot \widetilde{\gamma_2} \cdot z \cdot \widetilde{\delta}$ or $D_{\alpha} = \widetilde{\beta} \cdot z' \cdot \widetilde{\gamma_1} \cdot z \cdot \widetilde{\gamma_2} \cdot z' \cdot \widetilde{\delta}$. \par\medskip\noindent \emph{Proof (Claim).} For arbitrary $z, z' \in \Gamma$, $z \neq z'$, there are two possible cases regarding the positions of the occurrences of $z$ and $z'$ in $\alpha$. The first case describes the situation that there exists an occurrence of $z'$ (or $z$) in $\alpha$ such that $z$ (or $z'$, respectively) occurs to the left and to the right of this occurrence. If this is not possible, the occurrences of $z$ and $z'$ are separated, i.\,e., the rightmost occurrence of $z$ (or $z'$) is to the left of the leftmost occurrence of $z'$ (or $z$, respectively). More formally, it is possible to factorise $\alpha$ into \begin{equation}\label{equ1} \alpha = \widehat{\beta} \cdot z \cdot \widehat{\gamma_1} \cdot z' \cdot \widehat{\gamma_2} \cdot z \cdot \widehat{\delta} \end{equation} or into \begin{equation}\label{equ2} \alpha = \beta \cdot x \cdot \widehat{\gamma_1} \cdot z \cdot \widehat{\gamma_2} \cdot z' \cdot \widehat{\gamma_3} \cdot x \cdot \delta \end{equation} with $|\beta \cdot x \cdot \widehat{\gamma_1} \cdot z \cdot \widehat{\gamma_2}|_{z'} = 0$ and $|\widehat{\gamma_2} \cdot z' \cdot \widehat{\gamma_3} \cdot x \cdot \delta|_z = 0$. The two factorisations obtained by changing the roles of $z$ and $z'$ can be handeled analogously and are, thus, omitted. We note that in the second factorisation, $\widehat{\gamma_1} \cdot z \cdot \widehat{\gamma_2} \cdot z' \cdot \widehat{\gamma_3}$ equals the factor $\gamma$ from the above introduced factorisation $\alpha = \beta \cdot x \cdot \gamma \cdot x \cdot \delta$. This is due to the fact that we assume $z, z' \in \Gamma$.\par We first observe that $z = x$ or $z' = x$ implies that the first factorisation is possible. If we cannot factorise $\alpha$ according to factorisation (\ref{equ1}), then we can conclude that the rightmost occurrence of $z$ is to the left of the leftmost occurrence of $z'$ and, furthermore, as both $z, z' \in \Gamma$ and $z \neq x \neq z'$, these occurrences are both in the factor $\gamma$. Hence, factorisation (\ref{equ2}) applies. We now show that in both cases the variables $z, z'$ satisfy the property described in the Claim. However, throughout the following argumentations, we need to bear in mind that the claim made above describes a property of $D_{\alpha}$ and the two considered factorisations are factorisations of $\alpha$.\par We start with the case that $\alpha$ can be factorised into $\alpha = \widehat{\beta} \cdot z \cdot \widehat{\gamma_1} \cdot z' \cdot \widehat{\gamma_2} \cdot z \cdot \widehat{\delta}$. Let $p := |\widehat{\beta} \cdot z \cdot \widehat{\gamma_1} \cdot z' \cdot \widehat{\gamma_2}| + 1$, thus $y_{p} = z$. In the complete matching order $(m_1, \ldots, m_k)$ there has to be an $m_q$, $1 \leq q \leq k$, with $m_q := (j_l, j_r)$ and either $j_l = p$ or $j_r = p$. We assume that $j_l = p$; the case $j_r = p$ can be handled analogously. This implies, by definition of Janus operating modes, that the last element of $D_q$ is $(p, \lambda)$.\par In the following, we interpret the Janus operating mode as a sequence of input head movements over $\alpha$, as explained in Remark~\ref{inputHeadsPerspectiveRemark}. Both heads start at the very left position of the input, so in order to move the left head to position $p$ in the pattern, it has to pass the whole part to the left of position $p$, i.\,e.\ $y_1 \cdot y_2 \cdot \ldots y_{p - 1}$, from left to right (possibly changing directions several times). In this initial part of the pattern, the variables $z$ and $z'$ occur in exactly this order. We conclude that the left head has to pass an occurrence of $z$, then pass an occurrence of $z'$ and finally reaches position $p$, where variable $z$ occurs. Regarding $D_{\alpha}$ this means that a factorisation $D_{\alpha} = \widetilde{\beta} \cdot z \cdot \widetilde{\gamma_1} \cdot z' \cdot \widetilde{\gamma_2} \cdot z \cdot \widetilde{\delta}$ is possible.\par Next, we consider the case that it is not possible to factorise $\alpha = \widehat{\beta} \cdot z \cdot \widehat{\gamma_1} \cdot z' \cdot \widehat{\gamma_2} \cdot z \cdot \widehat{\delta}$. As explained above, this implies that $\alpha = \beta \cdot x \cdot \widehat{\gamma_1} \cdot z \cdot \widehat{\gamma_2} \cdot z' \cdot \widehat{\gamma_3} \cdot x \cdot \delta$ with $|\beta \cdot x \cdot \widehat{\gamma_1} \cdot z \cdot \widehat{\gamma_2}|_{z'} = 0$ and $|\widehat{\gamma_2} \cdot z' \cdot \widehat{\gamma_3} \cdot x \cdot \delta|_z = 0$. Let $r_z := |\beta \cdot x \cdot \widehat{\gamma_1}| + 1$ and $l_{z'} := |\beta \cdot x \cdot \widehat{\gamma_1} \cdot z \cdot \widehat{\gamma_2}| + 1$ be the positions of the variables $z$ and $z'$ pointed out in the factorisation above. Obviously, $r_z$ is the rightmost occurrence of $z$ and $l_{z'}$ is the leftmost occurrence of $z'$. These positions $r_z$ and $l_{z'}$ have to be covered by some matching positions in the complete matching order $(m_1, \ldots, m_k)$, i.\,e., there exist matching positions $m_i := (l_z, r_z)$ and $m_{i'} := (l_{z'}, r_{z'})$. We can assume that $r_z$ is the right element and $l_{z'}$ the left element of a matching position, as these positions describe the rightmost and the leftmost occurrences of the variable $z$ and $z'$, respectively. Moreover, $(m_1, \ldots, m_k)$ has to contain a complete matching order for variable $x$ in $\alpha$. Since there is no occurrence of $x$ in the factor $\gamma$, this implies the existence of a matching position $m_{i''} := (l_x, r_x)$ with $l_x \leq |\beta| + 1$ and $|\beta \cdot x \cdot \widehat{\gamma_1} \cdot z \cdot \widehat{\gamma_2} \cdot z' \cdot \widehat{\gamma_3}| + 1 \leq r_x$. We simply assume that $l_x = |\beta| + 1$ and $r_x = |\beta \cdot x \cdot \widehat{\gamma_1} \cdot z \cdot \widehat{\gamma_2} \cdot z' \cdot \widehat{\gamma_3}| + 1$, as this is no loss of generality regarding the following argumentation. Hence, we deal with the following situation (recall that $l_x$, $r_x$, $r_z$ and $l_{z'}$ are positions of $\alpha$):\\ \begin{tikzpicture} \draw (-0.5, 0.4) node {$\alpha = $}; \draw[black] (0,0) -- (0,0.8); \draw[black] (0,0.8) -- (10.4,0.8); \draw[black] (10.4,0.8) -- (10.4,0); \draw[black] (10.4,0) -- (0,0); \draw[black] (1.5,0) -- (1.5,0.8); \draw[black] (2.0,0) -- (2.0,0.8); \draw[black] (3.8,0) -- (3.8,0.8); \draw[black] (4.3,0) -- (4.3,0.8); \draw[black] (6.1,0) -- (6.1,0.8); \draw[black] (6.6,0) -- (6.6,0.8); \draw[black] (8.4,0) -- (8.4,0.8); \draw[black] (8.9,0) -- (8.9,0.8); \draw (0.75, 0.4) node {$\beta$}; \draw (1.75, 0.4) node {$x$}; \draw (2.9, 0.4) node {$\widehat{\gamma_1}$}; \draw (4.05, 0.4) node {$z$}; \draw (5.2, 0.4) node {$\widehat{\gamma_2}$}; \draw (6.35, 0.4) node {$z'$}; \draw (7.5, 0.4) node {$\widehat{\gamma_3}$}; \draw (8.65, 0.4) node {$x$}; \draw (9.65, 0.4) node {$\delta$}; \draw[black] (1.75, -0.2) -- (1.75, -0.5); \draw[black] (1.75, -0.2) -- (1.85, -0.3); \draw[black] (1.75, -0.2) -- (1.65, -0.3); \draw (1.75, -0.8) node {$l_{x}$}; \draw[black] ($(1.75, -0.2) + (2.3,0)$) -- ($(1.75, -0.5) + (2.3,0)$); \draw[black] ($(1.75, -0.2) + (2.3,0)$) -- ($(1.85, -0.3) + (2.3,0)$); \draw[black] ($(1.75, -0.2) + (2.3,0)$) -- ($(1.65, -0.3) + (2.3,0)$); \draw ($(1.75, -0.8) + (2.3,0)$) node {$r_{z}$}; \draw[black] ($(1.75, -0.2) + (4.6,0)$) -- ($(1.75, -0.5) + (4.6,0)$); \draw[black] ($(1.75, -0.2) + (4.6,0)$) -- ($(1.85, -0.3) + (4.6,0)$); \draw[black] ($(1.75, -0.2) + (4.6,0)$) -- ($(1.65, -0.3) + (4.6,0)$); \draw ($(1.75, -0.8) + (4.6,0)$) node {$l_{z'}$}; \draw[black] ($(1.75, -0.2) + (6.9,0)$) -- ($(1.75, -0.5) + (6.9,0)$); \draw[black] ($(1.75, -0.2) + (6.9,0)$) -- ($(1.85, -0.3) + (6.9,0)$); \draw[black] ($(1.75, -0.2) + (6.9,0)$) -- ($(1.65, -0.3) + (6.9,0)$); \draw ($(1.75, -0.8) + (6.9,0)$) node {$r_{x}$}; \end{tikzpicture} Now, in the same way as before, we interpret the Janus operating mode as a sequence of input head movements. We proceed by considering two cases concerning the order of the matching positions $m_{i'} = (l_{z'}, r_{z'})$ and $m_{i''} = (l_x, r_x)$ in the complete matching order, i.\,e., either $i' < i''$ or $i'' < i'$. In the latter case, $i'' < i'$, the right input head is moved from the leftmost variable in $\alpha$ to position $r_x$, hence, it passes $z$ and $z'$ in this order. Furthermore, the left input head is moved to position $l_x$. After that, since $i'' < i'$, the left input head has to be moved from position $l_x$ to position $l_{z'}$, thus, passing position $r_z$ where variable $z$ occurs. Hence, we conclude $D_{\alpha} = \widetilde{\beta} \cdot z \cdot \widetilde{\gamma_1} \cdot z' \cdot \widetilde{\gamma_2} \cdot z \cdot \widetilde{\delta}$. Next, we assume $i' < i''$, so the left input head is moved from the leftmost variable in $\alpha$ to position $l_{z'}$, so again, an input head passes $z$ and $z'$ in this order. After that, the left input head is moved from position $l_{z'}$ to position $l_x$, thus, it passes variable $z$ on position $r_z$. Again, we can conclude $D_{\alpha} = \widetilde{\beta} \cdot z \cdot \widetilde{\gamma_1} \cdot z' \cdot \widetilde{\gamma_2} \cdot z \cdot \widetilde{\delta}$. \hfill \emph{q.e.d. (Claim)}\par\bigskip\noindent Hence, for all $z, z' \in \Gamma$, $z \neq z'$, $D_{\alpha}$ can be factorised into $D_{\alpha} = \widetilde{\beta} \cdot z \cdot \widetilde{\gamma_1} \cdot z' \cdot \widetilde{\gamma_2} \cdot z \cdot \widetilde{\delta}$ or $D_{\alpha} = \widetilde{\beta} \cdot z' \cdot \widetilde{\gamma_1} \cdot z \cdot \widetilde{\gamma_2} \cdot z' \cdot \widetilde{\delta}$, and therefore we can apply Lemma~\ref{crossingLemma} and conclude that there exists a $z \in \Gamma$ such that $D_\alpha$ can be factorised into $D_\alpha = \overline{\beta} \cdot z \cdot \overline{\gamma}$ with $(\Gamma \slash \{z\}) \subseteq (\var(\overline{\beta}) \cap \var(\overline{\gamma}))$. This directly implies that $\cn(\Delta_{\alpha}) \geq |\Gamma| - 1 = \vd(\alpha)$. \end{proof} In the previous section, the task of finding an optimal Janus automaton for a pattern was shown to be equivalent to finding an optimal Janus operating mode for this pattern. Now, by the above result, a Janus operating mode $\Delta_{\alpha}$ for some pattern $\alpha$ is optimal if $\cn(\Delta_{\alpha}) = \vd(\alpha)$ is satisfied. Hence, our next goal is to find a Janus operating mode with that property. To this end, we shall first define a special complete matching order from which the optimal Janus operating mode is then derived. \begin{definition}\label{canonicalMatchingOrderDefinition} Let $\alpha := y_1 \cdot y_2 \cdot \ldots \cdot y_n$ be a terminal-free pattern with $p := |\var(\alpha)|$. For every $x_i \in \var(\alpha)$, let $\varpos{i}(\alpha) := \{j_{i, 1}, j_{i, 2}, \ldots, j_{i, n_i}\}$ with $n_i := |\alpha|_{x_i}$, $j_{i, l} < j_{i, l + 1}$, $1 \leq l \leq n_i - 1$. Let $(m_1, m_2, \ldots, m_k)$, $k = \sum_{i = 1}^{p} n_i - 1$, be an enumeration of the set $\{(j_{i, l}, j_{i, l + 1})~|~1 \leq i \leq p, 1 \leq l \leq n_i - 1\}$ such that, for every $i'$, $1 \leq i' < k$, the left element of the pair $m_{i'}$ is smaller than the left element of $m_{i' + 1}$. We call $(m_1, m_2, \ldots, m_k)$ the \emph{canonical matching order for $\alpha$}. \end{definition} \begin{proposition}\label{canonicalMOProp} Let $\alpha$ be a terminal-free pattern. The canonical matching order for $\alpha$ is a complete matching order. \end{proposition} \begin{proof} For every $x_i \in \var(\alpha)$, let $\varpos{i}(\alpha) := \{j_{i, 1}, j_{i, 2}, \ldots, j_{i, n_i}\}$ with $n_i := |\alpha|_{x_i}$, $j_{i, l} < j_{i, l + 1}$, $1 \leq l \leq n_i - 1$. The tuple \begin{equation*} ((j_{i, 1}, j_{i, 2}), (j_{i, 2}, j_{i, 3}), \ldots, (j_{i, n_i - 2}, j_{i, n_i - 1}), (j_{i, n_i - 1}, j_{i, n_i})) \end{equation*} is clearly a matching order for $x_i$ in $\alpha$. As the canonical matching order contains all these matching orders for each variable $x_i \in \var(\alpha)$, it is a complete matching order for $\alpha$. \end{proof} Intuitively, the canonical matching order can be constructed by simply moving through the pattern from left to right and for each encountered occurrence of a variable $x$, this occurrence and the next occurrence of $x$ (if there is any) constitutes a matching position. For instance, the canonical matching order for the example pattern $\beta$ introduced in Section~\ref{sec:pattern} is $((1,3), (2,4), (4,6), (5,7))$.\par We proceed with the definition of a Janus operating mode that is derived from the canonical matching order. Before we do so, we informally explain how this is done. To this end, we employ the interpretation of Janus operating modes as instructions for input head movements. In each step of moving the input heads from one matching position to another, we want to move first the left head completely and then the right head. This is not a problem as long as the part the left head has to be moved over and the part the right head has to be moved over are not overlapping. However, if they are overlapping, then the left head would overtake the right head which conflicts with the definition of Janus operating modes. So in this special case, we first move the left head until is reaches the right head and then we move both heads simultaneously. As soon as the left head reaches the left element of the next matching position, we can keep on moving the right head until it reaches the right element of the next matching position. \begin{definition}\label{canonicalJanusOperatingMode} Let $(m_1, m_2, \ldots, m_k)$ be the canonical matching order for a ter\-minal-free pattern $\alpha$. For any $m_{i - 1} := (j'_1, j'_2)$ and $m_i := (j_1, j_2)$, $2 \leq i \leq k$, let $(p_1, p_2, \ldots, p_{k_1}) := g(j'_1, j_1)$ and $(p'_1, p'_2, \ldots, p'_{k_2}) := g(j'_2, j_2)$, where $g$ is the function introduced in Definition~\ref{janusOperatingModeDefinition}. If $j_1 \leq j'_2$, then we define \begin{equation*} D_i := ((p_1, \lambda), (p_2, \lambda), \ldots, (p_{k_1}, \lambda), (p'_1, \rho), (p'_2, \rho), \ldots, (p'_{k_2}, \rho), (j_2, \rho), (j_1, \lambda))\enspace. \end{equation*} If, on the other hand, $j'_2 < j_1$, we define $D_i$ in three parts \begin{align*} D_i := (&(p_1, \lambda), (p_2, \lambda), \ldots, (j'_2, \lambda), \\ &(j'_2 + 1, \rho), (j'_2 + 1, \lambda), (j'_2 + 2, \rho), (j'_2 + 2, \lambda), \ldots, (j_1 - 1, \rho), (j_1 - 1, \lambda), \\ &(j_1, \rho), (j_1 + 1, \rho), \ldots, (j_2 - 1, \rho), (j_2, \rho), (j_1, \lambda))\enspace. \end{align*} Finally, $D_1 := ((1, \rho), (2, \rho), \ldots, (j - 1, \rho), (j, \rho), (1, \lambda))$, where $m_1 = (1, j)$. The tuple $(D_1$, $D_2$, $\ldots$, $D_k)$ is called the \emph{canonical Janus operating mode}. \end{definition} If we derive a Janus operating mode from the canonical matching order $((1,3)$, $(2,4)$, $(4,6)$, $(5,7))$ for $\beta$ as described in Definition~\ref{canonicalJanusOperatingMode} we obtain the canonical Janus operating mode $(((1, \rho)$, $(2, \rho)$, $(3, \rho)$, $(1, \lambda))$, $((4, \rho)$, $(2, \lambda))$, $((3, \lambda)$, $(5, \rho)$, $(6, \rho)$, $(4, \lambda))$, $((7, \rho)$, $(5, \lambda)))$. This canonical Janus operating mode has a counter number of $1$, so its counter number is smaller than the counter number of the example Janus operating mode $\Delta_{\beta}$ given in Section~\ref{sec:pattern} and, furthermore, equals the variable distance of $\beta$. Referring to Theorem~\ref{cnGeqVd}, we conclude that the canonical Janus operating mode for $\beta$ is optimal. The next lemma shows that this holds for every pattern. \begin{lemma}\label{canonicalCnEqualsVd} Let $\alpha$ be a terminal-free pattern and let $\Delta_{\alpha}$ be the canonical Janus operating mode for $\alpha$. Then $\cn(\Delta_{\alpha}) = \vd(\alpha)$. \end{lemma} \begin{proof} Let $\alpha := y_1 \cdot y_2 \cdot \ldots \cdot y_n$ and let $\overline{\Delta_{\alpha}} := ((d'_1, \mu'_1), (d'_2, \mu'_2), \ldots, (d'_{k'}, \mu'_{k'}))$ be the head movement indicator of the canonical Janus operating mode. This sequence $\overline{\Delta_{\alpha}}$ contains numbers $d'_i$, $1 \leq i \leq k'$, that are positions of $\alpha$, i.\,e.\ $1 \leq d'_i \leq |\alpha|$, $1 \leq i \leq k'$. Hence, we can associate a sequence of variables $(y_{d'_1}, y_{d'_2}, \ldots, y_{d'_{k'}})$ with $\overline{\Delta_{\alpha}}$.\par In order to prove Lemma~\ref{canonicalCnEqualsVd}, we assume to the contrary that $\cn(\Delta_{\alpha}) > \vd(\alpha)$. This implies that there is a $p$, $1 \leq p \leq k'$, and a set $\Gamma$ of at least $\pi := \vd(\alpha) + 1$ different variables $z_1, z_2, \ldots, z_{\pi}$ such that $y_{d'_p} \notin \Gamma$ and, for every $z \in \Gamma$, there exist $j, j'$, $1 \leq j < p < j' \leq k'$, with $y_{d'_j} = y_{d'_{j'}} = z$.\par We can interpret $\overline{\Delta_{\alpha}}$ as a sequence of input head movements over the pattern $\alpha$ as explained in Remark~\ref{inputHeadsPerspectiveRemark}. We are particularly interested in the position of the \emph{left} head in $\alpha$ at step $p$ of $\overline{\Delta_{\alpha}}$. Thus, we define $\widehat{p}$ such that $d'_{\widehat{p}} = \max\{d'_j \mid 1 \leq j \leq p, \mu'_j = \lambda\}$. However, we note that $\{d'_j \mid 1 \leq j \leq p, \mu'_j = \lambda\} = \emptyset$ is possible and in this case $d'_{\widehat{p}}$ would be undefined. So for now, we assume that $\{d'_j \mid 1 \leq j \leq p, \mu'_j = \lambda\} \neq \emptyset$ and consider the other case at the end of this proof. Moreover, we need to define the rightmost position in $\alpha$ that has been visited by any input head when we reach step $p$ in $\overline{\Delta_{\alpha}}$. By definition of the canonical matching order, this has to be the right input head, as it is always positioned to the right of the left input head. Thus, we define $p_{\max}$ such that $d'_{p_{\max}} := \max\{d'_j \mid 1 \leq j \leq p\}$.\par Now, we can consider $\alpha$ in the factorisation \begin{equation*} \alpha = \beta \cdot y_{d'_{\widehat{p}}} \cdot \gamma \cdot y_{d'_{p_{\max}}} \cdot \delta\enspace. \end{equation*} By definition of the positions $\widehat{p}$ and $p_{\max}$ above, we can conclude the following. After performing all steps $d'_{j}$ with $1 \leq j \leq p$, position $d'_{\widehat{p}}$ is the position where the left head is located right now. This implies, by definition of the canonical Janus operating mode, that no head will be moved to one of the positions in $\beta$ again. The position $d'_{p_{\max}}$ is the rightmost position visited by any head so far. Hence, until now, no head has reached a position in $\delta$. \par Regarding the sequence of variables $(y_{d'_1}, y_{d'_2}, \ldots, y_{d'_{k'}})$ we can observe that for every $j$, $1 \leq j \leq p$, $y_{d'_j} \in \var(\beta \cdot y_{d'_{\widehat{p}}} \cdot \gamma \cdot y_{d'_{p_{\max}}})$, and, for every $j'$, $p < j' \leq k'$, $y_{d'_{j'}} \in \var(\gamma \cdot y_{d'_{p_{\max}}} \cdot \delta)$. This follows directly from our interpretation of $\overline{\Delta_{\alpha}}$ as a sequence of input head movements over $\alpha$. Moreover, since for every $z \in \Gamma$, there exist $j, j'$, $1 \leq j < p < j' \leq k'$, with $y_{d'_j} = y_{d'_{j'}} = z$, we can conclude that $\Gamma \subseteq (\var(\beta \cdot y_{d'_{\widehat{p}}} \cdot \gamma \cdot y_{d'_{p_{\max}}}) \cap \var(\gamma \cdot y_{d'_{p_{\max}}} \cdot \delta))$. We can further show that $\Gamma \subseteq \var(\gamma \cdot y_{d'_{p_{\max}}})$. To this end, we assume that for some $z \in \Gamma$, $z \notin \var(\gamma \cdot y_{d'_{p_{\max}}})$, which implies $z \in (\var(\beta \cdot y_{d_{\widehat{p}}}) \cap \var(\delta))$. Hence, we can conclude that there exists a matching position $(l_z, r_z)$ in the canonical matching order, where the left element $l_z$ is a position in $\beta \cdot y_{d_{\widehat{p}}}$ and the right element $r_z$ is a position in $\delta$, i.\,e., $1 \leq l_z \leq |\beta \cdot y_{d_{\widehat{p}}}|$ and $|\beta \cdot y_{d'_{\widehat{p}}} \cdot \gamma \cdot y_{d'_{p_{\max}}}| + 1 \leq r_z \leq |\alpha|$. By definition of the canonical Janus operating mode, this implies that the rightmost position in $\alpha$, that has been visited by any input head when we reached step $p$ in $\overline{\Delta_{\alpha}}$ has to be at least position $r_z$. Since $r_z > d'_{p_{\max}}$, this is clearly a contradiction. Consequently, we conclude that $\Gamma \subseteq \var(\gamma \cdot y_{d'_{p_{\max}}})$.\par We recall that position $d'_{p_{\max}}$ of $\alpha$ has already been reached by the right head and that in the canonical Janus operating mode, the right head is exclusively moved from the right element of some matching position $(l, r)$ to the right element of another matching position $(l', r')$. Consequently, either $r \leq d'_{p_{\max}} \leq r'$ or $r' \leq d'_{p_{\max}} \leq r$ and, furthermore, the left elements $l$ and $l'$ must be positions in the factor $\beta \cdot y_{d'_{\widehat{p}}}$. Thus, there has to be a matching position $(l, r)$ in the canonical matching order with $l \leq d'_{\widehat{p}}$ and $r \geq d'_{p_{\max}}$. Therefore, we can refine the factorisation from above by factorising $\beta \cdot y_{d'_{\widehat{p}}}$ into $\beta_1 \cdot y_l \cdot \beta_2$ and $y_{d'_{p_{\max}}} \cdot \delta$ into $\delta_1 \cdot y_r \cdot \delta_2$; thus, we obtain \begin{equation*} \alpha = \beta_1 \cdot y_l \cdot \beta_2 \cdot \gamma \cdot \delta_1 \cdot y_r \cdot \delta_2\enspace. \end{equation*} In the following, we show that the factor between the left and right element of the matching position $(l, r)$, i.\,e., $\beta_2 \cdot \gamma \cdot \delta_1$, contains too many distinct variables different from $y_l = y_{r}$. More precisely, the number of such variables is clearly bounded by the variable distance, but, by means of the variables in $\Gamma$, we obtain a contradiction by showing that there are $\vd(\alpha) + 1$ such variables in the factor $\beta_2 \cdot \gamma \cdot \delta_1$. To this end, we first recall that we have already established that $\Gamma \subseteq \var(\gamma \cdot y_{d'_{p_{\max}}})$ and, furthermore, $y_{d'_p} \notin \Gamma$ and $(l, r)$ is a matching position; thus, $y_l = y_r$. \par By the factorisation above, we know that $d'_{p_{\max}} \leq r$. If $d'_{p_{\max}} < r$, then $\Gamma \subseteq \var(\gamma \cdot y_{d'_{p_{\max}}})$ implies $\Gamma \subseteq \var(\gamma \cdot \delta_1)$. We can further note, that $y_r$ cannot be an element of $\Gamma$ as this contradicts to the fact that $(l, r)$ is a matching position. Thus, we have $|\Gamma|$ variables different from $y_l = y_r$ occurring in $\beta_2 \cdot \gamma \cdot \delta_1$ and we obtain the contradiction as described above. \par In the following, we assume that $d'_{p_{\max}} = r$ and note that this implies $\delta_1 = \varepsilon$. We observe that there are two cases depending on whether or not $y_{d'_{p_{\max}}} \in \Gamma$. We start with the easy case, namely $y_{d'_{p_{\max}}} \notin \Gamma$, and note that in this case $\Gamma \subseteq \var(\gamma \cdot y_{d'_{p_{\max}}})$ implies $\Gamma \subseteq \var(\gamma)$. In the same way as before, this leads to a contradiction.\par It remains to consider the case that $y_{d'_{p_{\max}}} \in \Gamma$. Here, $\Gamma \subseteq \var(\gamma)$ is not satisfied anymore, as $(l, d'_{p_{\max}})$ is a matching position (recall that we still assume $d'_{p_{\max}} = r$) and, thus, $y_{d'_{p_{\max}}} \notin \var(\gamma)$. In the following we consider the variable $y_{d'_p}$, for which, by definition, $y_{d'_p} \notin \Gamma$ is satisfied. Hence, in order to obtain a contradiction, it is sufficient to show that $y_{d'_p} \in \var(\beta_2 \cdot \gamma \cdot \delta_1)$. To this end, we need the following claim:\par\bigskip\noindent \emph{Claim} $l \leq d'_{p}$. \par\medskip\noindent \emph{Proof (Claim).} If $\mu'_{p} = \lambda$, then, by definition, $d'_{\widehat{p}} = d'_{p}$ and if $\mu'_{p} = \rho$, then $d'_{\widehat{p}} < d'_{p}$, since $\widehat{p}$ is the position of the left head and $d'_{p}$ is the position of the right head. Hence, since $l \leq d'_{\widehat{p}}$, we conclude $l \leq d'_{\widehat{p}} \leq d'_{p}$. \hfill \emph{q.e.d. (Claim)} \par\bigskip If $l < d'_{p}$, then $y_{d'_p} \in \var(\beta_2 \cdot \gamma \cdot \delta_1)$, since $y_{d'_p} = y_{d'_{p_{\max}}}$ is not possible as, by assumption, $y_{d'_{p_{\max}}} \in \Gamma$ and $y_{d'_p} \notin \Gamma$. Hence, we assume $l = d'_{p}$, which implies $y_l = y_{d'_{p}}$. We can show that this is a contradiction. First, we recall that $(l, d'_{p_{\max}})$ is a matching position, so $y_l = y_{d'_{p_{\max}}}$ and since $y_{d'_{p_{\max}}} \in \Gamma$, $y_{l} \in \Gamma$ as well. Furthermore, $y_{d'_{p}} \notin \Gamma$, which contradicts $y_l = y_{d'_{p}}$. We conclude that $y_{d'_p} \in \var(\beta_2 \cdot \gamma \cdot \delta_1)$ must be satisfied.\par Hence, for each possible case, we obtain $|\var(\beta_2 \cdot \gamma \cdot \delta_1)| \geq \pi$, which is a contradiction.\par It still remains to consider the case $\{d'_j \mid 1 \leq j \leq p, \mu'_j = \lambda\} = \emptyset$. In this case we have $\mu'_i = \rho$ for every $i$ with $1 \leq i \leq p$. This implies that until now the left input head has not yet entered $\alpha$ and the right head has been moved directly from the first position of $\alpha$ to position $d'_p$ without reversing direction. Furthermore, we know that the first matching position of the canonical matching order is $(1, r)$, where $d'_p \leq r$.\par If $d'_p = r$, we can factorise $\alpha$ into \begin{equation*} \alpha = y_1 \cdot \beta \cdot y_{d'_p} \cdot \gamma\,, \end{equation*} where $(1, d'_p)$ is a matching position. As for every $z \in \Gamma$ there exists an $i$, $1 \leq i < p$, with $y_{d_i} = z$ and since $y_{d'_p} \notin \Gamma$, we conclude $\Gamma \subseteq \var(\beta)$. This directly implies $\vd(\alpha) \geq \pi$, which is a contradiction.\par If, on the other hand, $d'_p < r$, then we can factorise $\alpha$ into \begin{equation*} \alpha = y_1 \cdot \beta_1 \cdot y_{d'_p} \cdot \beta_2 \cdot y_r \cdot \gamma\,. \end{equation*} In the same way as before, we can conclude that $\Gamma \subseteq \var(y_1 \cdot \beta_1)$, thus, $(\Gamma \slash \{y_1\}) \subseteq \var(\beta_1)$. Now, as $y_{d'_p} \notin \Gamma$, we have $(\Gamma \slash \{y_1\}) \cup \{y_{d'_p}\} \subseteq \var(\beta_1 \cdot y_{d'_p} \cdot \beta_2)$, where $|(\Gamma \slash \{y_1\}) \cup \{y_{d'_p}\}| = \pi$ and, since $(1,r)$ is a matching position, $\vd(\alpha) \geq \pi$ follows, which is a contradiction. This concludes the proof of Lemma~\ref{canonicalCnEqualsVd}. \end{proof} The above lemma, in conjunction with Theorems~\ref{janusConstructionTheorem}~and~\ref{cnGeqVd}, shows that the canonical Janus operating mode for a pattern $\alpha$ can be transformed into a Janus automaton that is optimal with respect to the number of counters. We subsume this first main result in the following theorem: \begin{theorem}\label{vdCorollary} Let $\alpha$ be a terminal-free pattern. There exists a $\jfa(\vd(\alpha) + 1)$ $M$ such that $L(M) = L(\alpha)$. \end{theorem} The Janus automaton obtained from the canonical Janus operating mode for a pattern $\alpha$ (in the way it is done in the proof of Theorem~\ref{janusConstructionTheorem}) is called the \emph{canonical Janus automaton}. As already stated above, Theorem~\ref{vdCorollary} shows the optimality of the canonical automaton. However, this optimality is subject to a vital assumption: we assume that the automaton needs to know the length of a factor in order to move an input head over this factor. Although this assumption is quite natural, we shall reconsider it in more detail in Section~\ref{sec:conclusion}.\par As stated in Section~\ref{sec:intro}, the variable distance is the crucial parameter when constructing canonical Janus automata for pattern languages. We obtain a polynomial time match test for any class of patterns with a restricted variable distance: \begin{theorem}\label{mainComplexityResult} There is a computable function that, given any terminal-free pattern $\alpha$ and $w \in \Sigma^*$, decides on whether $w \in L(\alpha)$ in time $\landau(|\alpha|^3\,|w|^{(\vd(\alpha) + 4)})$. \end{theorem} \begin{proof} We present an algorithm solving the membership problem for terminal-free pattern languages within the time bound claimed in Theorem~\ref{mainComplexityResult}. Our algorithm, on input $\alpha$ and $w$, simply constructs the canonical Janus automaton $M$ for $\alpha$ and then solves the acceptance problem for $M$ on input $w$. As $L(M) = L(\alpha)$, this algorithm clearly works correctly.\par Regarding the time complexity we have to investigate two aspects: Firstly, the time complexity of transforming $\alpha$ into the canonical Janus automaton $M$ and, secondly, the time complexity of solving the acceptance problem for $M$ on input $w$. To simplify the estimations of time complexities, we define $n := |w|$. In the strict sense, the input has length $|w| + 2$ and there are $|w| + 1$ possible counter bounds to guess, but as we shall use the Landau notation, $n$ is sufficiently accurate for the following analysis.\par We begin with transforming $\alpha := y_1 \cdot y_2 \cdot \ldots \cdot y_{n'}$ into $M$. To this end, we construct the canonical matching order $(m_1, m_2, \ldots, m_k)$, which can be obtained from $\alpha$ in time $\landau(|\alpha|)$. Definition~\ref{canonicalJanusOperatingMode} shows that the canonical Janus operating mode $\Delta_{\alpha} := (D_1, \ldots, D_k)$ can be directly constructed from the canonical matching order and the time complexity required to do so is merely the size of $\Delta_{\alpha}$. Obviously, every $D_i$, $1 \leq i \leq k$, has $\landau(|\alpha|)$ elements and $k \leq |\alpha|$. Thus, we conclude that $\Delta_{\alpha}$ can be constructed in $\landau(|\alpha|^2)$. Let $\overline{\Delta_{\alpha}} = ((d'_1, \mu'_1), (d'_2, \mu'_2), \ldots, (d'_{k'}, \mu'_{k'}))$ be the head movement indicator of $\Delta_{\alpha}$, and let $D_{\alpha} := y_{d'_1} \cdot y_{d'_2} \cdot \ldots \cdot y_{d'_{k'}}$, where, as described above, $k' \leq |\alpha|^2$. Next, we have to construct a mapping $\co : \var(\alpha) \rightarrow \{1, \ldots, \vd(\alpha) + 1\}$ with the required properties described in the proof of Theorem~\ref{janusConstructionTheorem}, i.\,e., if, for some $z, z' \in \var(\alpha)$, $z \neq z'$, $D_{\alpha}$ can be factorised into $D_{\alpha} = \beta \cdot z \cdot \gamma \cdot z' \cdot \gamma' \cdot z \cdot \delta$, then $\co(z) \neq \co(z')$. Such a mapping can be constructed in the following way. Assume that it is possible to mark counters either as free or as occupied. We move over the pattern $y_{d_1} \cdot y_{d_2} \cdot \ldots \cdot y_{d_{k'}}$ from left to right and whenever a variable $x_i$ is encountered for the first time, we set $\co(x_i) := j$ for some counter $j$ that is not occupied right now and then mark this counter $j$ as occupied. Whenever a variable $x_i$ is encountered for the last time, counter $\co(x_i)$ is marked as free. As we have to move over $\overline{\Delta_{\alpha}}$ in order to construct $\co$ in this way, time $\landau(k') = \landau(|\alpha|^2)$ is sufficient. We note that this method can be applied as it is not possible that there are more than $\cn(\Delta_{\alpha}) + 1 = \vd(\alpha) + 1$ variables such that for all $z, z'$, $z \neq z'$ of them, $D_{\alpha}$ can be factorised into $D_{\alpha} = \beta \cdot z \cdot \gamma \cdot z' \cdot \gamma' \cdot z \cdot \delta$ or $D_{\alpha} = \beta \cdot z' \cdot \gamma \cdot z \cdot \gamma' \cdot z' \cdot \delta$. This can be shown in the same way as we have already done in the proof of Theorem~\ref{janusConstructionTheorem}.\par Next we transform each $D_p$, $1 \leq p \leq k$, into a part of the automaton $M$, following the construction in the proof of Theorem~\ref{janusConstructionTheorem}. For the remainder of this proof, we define $\pi := \vd(\alpha) + 1$. We show how many states are needed to implement an arbitrary $D_p$ with $p \geq 2$. Therefore, we define \begin{equation*} D_p := ((j_1, \mu_1), (j_2, \mu_2), \ldots, (j_{k''}, \mu_{k''}), (j_r, \rho), (j_l, \lambda)) \end{equation*} with $\mu_q \in \{\lambda, \rho\}$, $1 \leq q \leq k''$, and the tuples $(j'_r, \rho)$, $(j'_l, \lambda)$ to be the last two elements of $D_{p - 1}$. We need the following sets of states. \begin{align*} &Q_{p, l} := \begin{cases} \{\lforth_{p,q} \mid 1 \leq q \leq k'', \mu_q = \lambda \}& \mbox{if $j'_l < j_l$}\enspace,\\ \{\lback_{p,q} \mid 1 \leq q \leq k'', \mu_q = \lambda \}& \mbox{else}\enspace. \end{cases}\\ &Q_{p, r} := \begin{cases} \{\rforth_{p,q} \mid 1 \leq q \leq k'', \mu_q = \rho \}& \mbox{if $j'_r < j_r$}\enspace,\\ \{\rback_{p,q} \mid 1 \leq q \leq k'', \mu_q = \rho \}& \mbox{else}\enspace. \end{cases}\\ &Q_p := Q_{p, l} \cup Q_{p, r} \cup \{\match_p\}\enspace. \end{align*} The set $Q_1$ is defined analogously, with the only difference that only forth-states are needed. Clearly, $|Q_p| = k'' + 1 = \landau(|\alpha|)$, $1 \leq p \leq k$. So as $k = \sum_{i = 1}^{|\var(\alpha)|} (|\alpha|_{x_i} - 1) = |\alpha| - |\var(\alpha)| \leq |\alpha|$, we can conclude that $|Q| = \landau(|\alpha|^2)$, where $Q := \bigcup_{i = 1}^{k} Q_i$. For each element $y$ in $(|Q| \times \{0, 1, \ldots, n + 1\}^2 \times \{\mathtt{t_{=}}, \mathtt{t_{<}}\}^{\pi})$ we need to define $\delta(y)$, so $\delta$ can be constructed in time $\landau(|\alpha|^2\,n^2\,2^\pi)$. This shows that the automaton $M$ can be constructed in time $\landau(|\alpha|^2\,n^2\,2^\pi)$.\par Next we shall investigate the time complexity of solving the acceptance problem for $M$ on input $w$. We apply the following idea. We construct a directed graph of possible configurations of $M$ as vertices, connected by an edge if and only if it is possible to get from one configuration to the other by applying the transition function $\delta$. Then we search this graph for a path leading from the initial configuration to a final configuration, i.\,e., an accepting path. For an arbitrary vertex $v$, we denote the number of edges starting at $v$ by \emph{outdegree of $v$} and the number of edges ending at $v$ by \emph{indegree of $v$}. The nondeterminism of the computation of $M$ is represented by the fact that there are vertices with outdegree greater than $1$, namely those configurations where a new counter bound is guessed. So the existence of an accepting path is a sufficient and necessary criterion for the acceptance of the input word $w$. Searching this graph for an accepting path leads to a \emph{deterministic} algorithm correctly solving the acceptance problem for $M$. Let $(V, E)$ be this graph. The problem of finding an accepting path can then be solved in time $\landau(|V| + |E|)$. We illustrate this idea more formally and define the set of vertices, i.\,e., the set of all possible configurations of $M$ on input $w$: \begin{align*} \widehat{C}'_{M, w} := \{(q, h_1, h_2, (c_1, C_1), \ldots, (c_{\pi}, C_{\pi}))~|~&q \in Q, 0 \leq h_1 \leq h_2 \leq n + 1,\\ &0 \leq c_i \leq C_i \leq n, 1 \leq i \leq \pi\}\enspace. \end{align*} Now we obtain $\widehat{C}_{M, w}$ by simply deleting all the configurations of $\widehat{C}'_{M, w}$ that cannot be reached in any computation of $M$ on input $w$. How this can be done shall be explained at the end of the proof. Furthermore, we define a set of edges $\widehat{E}_{M, w}$, connecting the configurations in $\widehat{C}_{M, w}$ as follows: for all $\widehat{c}_1, \widehat{c}_2 \in \widehat{C}_{M, w}$, $(\widehat{c}_1, \widehat{c}_2) \in \widehat{E}_{M, w}$ if and only if $\widehat{c}_1 \vdash_{M, w} \widehat{c}_2$. We call $\widehat{G}_{M, w} := (\widehat{C}_{M, w}, \widehat{E}_{M, w})$ the \emph{full computation graph of $M$ on input $w$}. To analyse the time complexity of searching $\widehat{G}_{M, w}$ for an accepting path, we have to determine the size of $\widehat{C}_{M, w}$ and $\widehat{E}_{M, w}$. By the construction given in the proof of Theorem~\ref{janusConstructionTheorem}, for all configurations $(q, h_1, h_2, (c_1, C_1), \ldots, (c_{\pi}, C_{\pi})) \in \widehat{C}_{M, w}$, there is at most one $i$, $1 \leq i \leq \pi$, with $c_i \geq 1$. That is due to the fact that when $M$ increments a counter, then this counter is incremented until the counter value jumps back to $0$ again before another counter is incremented. Thus, for each $i$, $1 \leq i \leq \pi$, there are $|Q|\,n^{\pi + 3}$, possible configurations $(q, h_1, h_2, (c_1, C_1), \ldots, (c_{\pi}, C_{\pi}))$ such that $c_i \geq 1$. Therefore, we obtain \begin{equation*} |\widehat{C}_{M, w}| = \landau(|Q|\,\pi\,n^{\pi + 3}) = \landau(|\alpha|^2\,(\vd(\alpha) + 1)\,n^{\pi + 3}) = \landau(|\alpha|^3\,n^{\pi + 3})\enspace. \end{equation*} Next, we analyse the number of edges in $\widehat{G}_{M, w}$. As already mentioned, due to the nondeterminism of Janus automata, there are vertices in $\widehat{G}_{M, w}$ with an outdegree greater than one. One such vertex is the initial configuration, as in the initial configuration, all $\pi$ counters are reset. Thus, the initial configuration has outdegree of $\landau(n^{\pi})$. Furthermore, if $M$ resets a counter by changing from one configuration $\widehat{c_1}$ to another configuration $\widehat{c_2}$, then $\widehat{c_1}$ has outdegree greater than one. However, there is at most one counter reset by changing from one configuration to another, so, for these configurations, the outdegree is bounded by $n$. We know that $M$ has $|\var(\alpha)|$ states such that a counter is reset in this state and, furthermore, if a counter is reset, all counter values are $0$. Hence the number of configurations with outdegree $n$ is $\landau(|\var(\alpha)|\,n^{\pi + 2})$ and so we count $\landau(|\var(\alpha)|\,n^{\pi + 3})$ edges for these configurations. Finally, all the other vertices not considered so far have outdegree $1$, and, as the complete number of vertices is $\landau(|\alpha|^3\,n^{\pi + 3})$, we can conclude that the number of vertices with outdegree $1$ does not exceed $\landau(|\alpha|^3\,n^{\pi + 3})$. We obtain \begin{equation*} |\widehat{E}_{M, w}| = \landau(n^{\pi} + |\var(\alpha)|\,n^{\pi + 3} + |\alpha|^3\,n^{\pi + 3}) = \landau(|\alpha|^3\,n^{\pi + 3})\enspace. \end{equation*} Consequently, $\landau(|\widehat{C}_{M, w}| + |\widehat{E}_{M, w}|) = \landau(|\alpha|^3\,n^{\pi + 3})$ and, as $\pi = \vd(\alpha) + 1$, $\landau(|\widehat{C}_{M, w}| + |\widehat{E}_{M, w}|) = \landau(|\alpha|^3\,n^{\vd(\alpha) + 4})$. However, it remains to explain how exactly we can search the graph for an accepting path. This can be done in the following way. We start with the initial configuration of $M$ on input $w$ and then we construct the graph $\widehat{G}_{M, w}$ step by step by using a Depth-First-Search approach. By this method an accepting configuration is found if there exists one and, furthermore, we do not need to construct the whole set of configurations $\widehat{C}'_{M, w}$ first. This concludes the proof. \end{proof} This main result also holds for more general classes of extended regular expressions, e.\,g., those containing terminal symbols (see our example in Section~\ref{sec:janus}) or imposing regular restrictions to the sets of words variables can be substituted with, i.\,e., for every variable $x \in \var(\alpha)$ a regular language $R_{x}$ is given and the pattern describes then the set of all words $w$ that can be obtained from $\alpha$ by substituting every $x \in \var(\alpha)$ by some word in $R_x$. We anticipate, though, that the necessary amendments to our definitions involve some technical hassle. \section{Conclusions}\label{sec:conclusion} In the present work, we have studied an important NP-complete problem, namely the match test for extended regular expressions. We have pointed out that the match test shows the same characteristics as the membership problem for terminal-free pattern languages, and therefore we have restricted our technical considerations to the latter problem, which can be defined in a more concise manner. We have introduced the concept of the variable distance of a pattern, and our studies have revealed that the complexity of the membership problem is essentially determined by this subtle combinatorial property. Any restriction of this parameter has yielded major classes of pattern languages (and, hence, of extended regular expressions) with a polynomial-time match test. \par We have also been able to prove our approach to be optimal. However, this optimality is subject to the following vital assumption. We assumed that a Janus automaton needs to know the length of a factor in order to move an input head over this factor and, thus, needs to store this length in form of a counter bound. Although this assumption is quite natural, it might be worthwhile to consider possibilities to abandon it. For instance, a Janus automaton is able to detect the left and right end of its input by means of the endmarkers. Therefore, it can move an input head from any position to either end of the input without using any counter. So if an input head has to be moved from one position to another, there are three ways of doing this. We can either move it directly over the intermediate factors (how it is done in the original definition of Janus operating modes) or we can move it first to either the left or the right endmarker and then from there to the new position. In the latter two cases, only the information of the lengths of the factors between the left endmarker or the right endmarker and the target position are required. It is straightforward to extend the definition of Janus operating modes in accordance with these new ideas. Furthermore, we could again use the concept of the counter number of Janus operating modes and transform these refined Janus operating modes into Janus automata in a similar way as done in the proof of Theorem~\ref{janusConstructionTheorem}. The following example points out that, using this new approach, we can find Janus automata with less counters than the canonical Janus automata. \begin{example} Let $\alpha := x_1 \cdot x_2 \cdot x_3 \cdot x_1 \cdot x_2 \cdot x_4 \cdot x_4 \cdot x_5 \cdot x_5 \cdot x_3$. Clearly, $\vd(\alpha) = 4$, thus the canonical Janus automaton for $\alpha$ needs $5$ counters. We observe that there exists a $\jfa(4)$ $M$ with $L(M) = L(\alpha)$. This automaton $M$ matches factors according to the complete matching order $((1,4),(2,5),(6,7),(8,9),(3,10))$. The trick is that after matching the factors related to the matching position $(6,7)$, i.\,e., the factors corresponding to the occurrences of $x_4$, the counter responsible for factors corresponding to $x_4$ is reused to match the factors related to the matching position $(8,9)$. Hence, so far, we only needed $4$ counters, but, obviously, we lost the information of the length of factors corresponding to $x_4$. Now, we find the situation that it still remains to match the factors corresponding to the occurrences of $x_3$, i.\,e.\ the matching position $(3,10)$, but we cannot simply move the left head back to factor $3$, as the automaton does not know the length of the factors corresponding to $x_4$ anymore. However, we can move it to the left endmarker first, and then from there, over the factors corresponding to $x_1$ and $x_2$, to factor $3$. We can do this without storing the lengths of factors related to $x_4$ and $x_5$. Hence, $4$ counters are sufficient. \end{example} The above illustrated amendments to our approach further complicate the definition of Janus operating modes and we do not know anymore how to efficiently compute the Janus operating mode that is optimal with respect to the counter number. An exhaustive search of all Janus operating modes is inappropriate, as we would have to deal with a vast number of possible such Janus operating modes. In summary, we anticipate that these potential amendments to our approach lead to very challenging technical problems, and therefore we leave them for future research. \bibliographystyle{elsarticle-num}
\section{Introduction} For a finite group $G$, a {\it character ratio} is a complex number of the form $\frac{\chi(g)}{\chi(1)}$, where $g\in G$ and $\chi$ is an irreducible character of $G$. Upper bounds for absolute values of character values and character ratios have long been of interest, for various reasons; these include applications to random generation, covering numbers, mixing times of random walks, the study of word maps, representation varieties and other areas. For example, character ratios are connected with the well-known formula \[ \frac{\prod_{i=1}^k |C_i|}{|G|}\sum_{\chi\in {\mathrm {Irr}}(G)} \frac{\chi(c_1)\cdots \chi(c_k)\chi(g^{-1})}{\chi(1)^{k-1}} \] expressing the number of ways of writing an element $g \in G$ as a product $x_1x_2\cdots x_k$ of elements $x_i\in C_i$, where $C_i = c_i^G$ are $G$-conjugacy classes of elements $c_i$, $1 \leq i \leq k$, and the sum is over the set ${\mathrm {Irr}}(G)$ of all irreducible characters of $G$ (see \cite[10.1]{AH}). This connection is sometimes a starting point for such applications; it has been particularly exploited for almost simple (or quasisimple) groups $G$. Another classical formula involving character ratios goes back to Frobenius in 1896 \cite{F}. It asserts that, for any finite group $G$, the number $N(g)$ of ways to express an element $g \in G$ as a commutator $[x,y]$ ($x,y \in G$) satisfies \[ N(g)= |G| \sum_{\chi \in {\mathrm {Irr}}(G)} \frac{\chi(g)}{\chi(1)}. \] This formula is widely used, and served (together with character bounds) as an important tool in the proof of Ore's conjecture \cite{LOST}. We are particularly interested in so called {\it exponential character bounds}, namely bounds of the form \[ |\chi(g)| \le \chi(1)^{\alpha_g}, \] sometimes with a multiplicative constant, holding for {\it all} characters $\chi \in {\mathrm {Irr}}(G)$, where $0 \le \alpha_g \le 1$ depends on the group element $g \in G$. Obviously, if $g$ is central in $G$, then we must have $\alpha_g =1$, but for most elements $g$ we aim to find $\alpha_g < 1$ which is as small as possible. One advantage of exponential character bounds is that they imply the inequality $|\frac{\chi(g)}{\chi(1)}| \le \chi(1)^{-(1-\alpha_g)}$, so the upper bound on the character ratio becomes smaller as the character degree grows. The first exponential character bound was established in 1995 for symmetric groups ${\sf S}_n$ by Fomin and Lulov \cite{FL}. They show that, for permutations $g \in {\sf S}_n$ which are products of $n/m$ cycles of length $m$ and for all characters $\chi \in {\mathrm {Irr}}({\sf S}_n)$ we have \begin{equation}\label{fomlul} |\chi(g)| \le c(m) n^{\frac{1}{2}-\frac{1}{2m}} \chi(1)^{\frac{1}{m}}, \end{equation} for a suitable function $c: \mathbb N \to \mathbb N$. In \cite{fuchs1} this bound and some extensions of it were applied in various contexts, including the theory of Fuchsian groups. Subsequently, exponential character bounds which hold for {\it all} permutations $g \in {\sf S}_n$ and which are essentially best possible were established in 2008 in \cite{LarS}, with applications to a range of problems: mixing times of random walks, covering by powers of conjugacy classes, as well as probabilistic and combinatorial properties of word maps. Can we find good exponential character bounds for groups of Lie type? This problem has turned out to be quite formidable; it has been considered by various researchers over the past two decades, and various approaches have been attempted, but it is only in this paper that strong (essentially best possible) such bounds are established. The first significant bound on character ratios for groups of Lie type was obtained in 1993 by Gluck \cite{Gl1}, who showed that $\frac{|\chi(g)|}{\chi(1)} \le Cq^{-1/2}$ for any non-central element $g \in G(q)$, a group of Lie type over $\mathbb F_q$, and any non-linear irreducible character $\chi$ of $G(q)$, where $C$ is an absolute constant. In \cite{gluck}, he proved a bound of the form \[ \frac{|\chi(g)|}{\chi(1)} \le \chi(1)^{-\gamma/n}, \] when $G(q)$ is a classical group with natural module $V = \mathbb F_q^n$ of dimension $n$, and $\gamma = \gamma(q,d)$ is a positive real number depending on $q$ and on $d = \dim [V,g]$, the dimension of the commutator space of $g$ on $V$. While this result provides an exponential character bound $|\chi(g)| \le \chi(1)^{\alpha_g}$, the exponent $\alpha_g = 1 -\gamma/n$ is not explicit, and in the general case we have $\gamma(q,d) \le 0.001$, so $\alpha_g \ge 1- \frac{1}{1000n}$, which is very close to $1$. An explicit character bound for finite classical groups, with natural module $V = \mathbb F_q^n$, in terms of the {\it support} ${\mathrm {supp}}(g)$ of the element $g$ was obtained in \cite[4.3.6]{LST}: namely, \begin{equation}\label{support} \frac{|\chi(g)|}{\chi(1)} < q^{-\sqrt{{\mathrm {supp}}(g)}/481}, \end{equation} where ${\mathrm {supp}}(g)$ is the codimension of the largest eigenspace of $g$ on $V \otimes_{\mathbb F_q}\overline\mathbb F_q$. These results have applications to covering, mixing times and word maps. In this paper we obtain asymptotically much stronger bounds for character ratios of finite groups of Lie type in good characteristic (this restriction comes from the fact that our proof relies on certain results in the Deligne-Lusztig theory, which currently are only known to hold in good characteristics). In fact we provide the first explicit exponential character bounds for groups of Lie type, and show that these bounds are asymptotically optimal in many cases. These character bounds lead to several new results on random walks and covering by products of conjugacy classes that are far stronger than previously known such results. Further applications to the theory of representation varieties of Fuchsian groups and probabilistic generation of groups of Lie type will be given in a sequel to this paper \cite{lst2}. We also prove the first bounds on character ratios for Brauer characters, for the groups $SL_n(q)$ and $GL_n(q)$, and in characteristics coprime to $q$. We now describe our results. Throughout the paper, let ${\mathbb K}$ be an algebraically closed field of characteristic $p$, ${\mathcal G}$ a connected reductive algebraic group over ${\mathbb K}$, $F:{\mathcal G} \to {\mathcal G}$ a Frobenius endomorphism, and $G = {\mathcal G}^F$. For a subgroup $X$ of ${\mathcal G}$ write $X_{{\rm {unip}}}$ for the set of {\it non-identity} unipotent elements of $X$. For a fixed $F$, a Levi subgroup ${\mathcal L}$ of ${\mathcal G}$ will be called {\it split}, if it is an $F$-stable Levi subgroup of an $F$-stable proper parabolic subgroup of ${\mathcal G}$. For an $F$-stable Levi subgroup ${\mathcal L}$ of ${\mathcal G}$ and $L={\mathcal L}^F$, we define $$\alpha(L) := \hbox{ {\rm {max}} }_{u \in L_{{\rm {unip}}}} \frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}},~~ \alpha({\mathcal L}) := \hbox{ {\rm {max}} }_{u \in {\mathcal L}_{{\rm {unip}}}} \frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}}$$ if ${\mathcal L}$ is not a torus, and $\alpha(L)=\alpha({\mathcal L}) := 0$ otherwise. \begin{thm}\label{main1} There exists a function $f:\mathbb N \to \mathbb N$ such that the following statement holds. Let ${\mathcal G}$ be a connected reductive algebraic group such that $[{\mathcal G},{\mathcal G}]$ is simple of rank $r$ over a field of good characteristic $p > 0$. Let $G := \GC^{F}$ for a Frobenius endomorphism $F: {\mathcal G} \to {\mathcal G}$. Let $g \in G$ be any element such that ${\bf C}_G(g) \leq L := {\mathcal L}^F$, where ${\mathcal L}$ is a split Levi subgroup of ${\mathcal G}$. Then, for any character $\chi \in {\mathrm {Irr}}(G)$ and $\alpha:=\alpha(L)$, we have $$|\chi(g)| \leq f(r)\chi(1)^\alpha.$$ \end{thm} \begin{rem}\label{rems} {\em (i) The $\alpha$-bound in Theorem \ref{main1} is sharp in several cases -- see Example \ref{sharpness}. In fact, this $\alpha$-bound is {\it always} sharp in the case of $GL_n(q)$ and $SL_n(q)$, by Theorem \ref{main2}. (ii) If $r \geq 9$ and $q \geq r^2+1$, then the function $f(r)$ in Theorem \ref{main1} can be chosen to be $2^{2r+\sqrt{2r}+3} \cdot (r!)^2$ (with the main term being the square of the largest order of the Weyl group of a simple algebraic group of rank $r$) -- see Proposition \ref{frbd}. Moreover, $\alpha \lesssim_r 1-1/r$ by Theorem \ref{ratio} and $\chi(1) \geq q^r/3$ if $\chi(1) > 1$ by \cite{LSe}, hence Theorem \ref{main1} yields $|\chi(g)| \lesssim_r \chi(1)^{\alpha+1/2r} \lesssim_r \chi(1)^{1-1/2r}$ if $q > r^{4r}$; in fact, $\chi(1) \geq q^{r^2/2}$ for most of $\chi \in {\mathrm {Irr}}(G)$, for which the bound becomes $|\chi(g)| \lesssim_r \chi(1)^{\alpha+1/3r} \lesssim_r \chi(1)^{1-2/3r}$ if $q > r^{12}$. (Here, we say that $f_1(x) \lesssim_x f_2(x)$ for two functions $f_1,f_2 : \mathbb R \to \mathbb R_{\geq 0}$ if $\limsup_{x \to \infty} f_1(x)/f_2(x) \leq 1$.) (iii) Although the aforementioned choice of $f(r)$ in Theorem \ref{main1} can be improved, Example \ref{sharpness}(vi) shows that $f(r)$ should be at least the largest degree of complex irreducible characters of the Weyl group $W({\mathcal G})$ of ${\mathcal G}$, which can be quite close to $|W({\mathcal G})|^{1/2}$. In particular, choosing ${\mathcal G}$ of type $A_r$ and applying \cite{LoS}, \cite{VK}, we get $f(r) > e^{-1.283\sqrt{r+1}}\sqrt{(r+1)!}$.} \end{rem} Note that Theorem \ref{main1} and its various consequences also apply for finite twisted groups of Lie type. \begin{thm}\label{main2} In the notation of Theorem \ref{main1}, there is a constant $C_n >0$ depending only on $n$ such that the following statement holds. For $G = {\mathcal G}^F = GL_n(q)$ with $q \geq C_n$ and for any split Levi subgroup ${\mathcal L}$ of ${\mathcal G}$, there is a semisimple element $g \in G$ and a unipotent character $\chi \in {\mathrm {Irr}}(G)$ such that ${\bf C}_G(g) = L = {\mathcal L}^F$ and $$\chi(g) \geq \frac{1}{4} \chi(1)^{\alpha(L)}.$$ The same conclusion holds for $SL_n(q)$, if for instance we choose $q$ so that $q-1$ is also divisible by $(n!)^n$. \end{thm} \medskip In the case of $GL_n(q)$ and $SL_n(q)$ we can also prove a version of Theorem \ref{main1} for Brauer characters in cross-characteristic. \begin{thm}\label{main1b} There exists a function $h:\mathbb N \to \mathbb N$ such that the following statement holds. Let ${\mathcal G} = GL_n$ or $SL_n$ be an algebraic group over a field of characteristic $p > 0$ and $F: {\mathcal G} \to {\mathcal G}$ a Frobenius endomorphism, such that $G = {\mathcal G}^F \cong GL_n(q)$ or $SL_n(q)$. Let $\ell = 0$ or a prime not dividing $q$. Let $g \in G$ be any $\ell'$-element such that ${\bf C}_G(g) \leq L := {\mathcal L}^F$, where ${\mathcal L}$ is a split Levi subgroup of ${\mathcal G}$. Then for any irreducible $\ell$-Brauer character $\varphi$ of $G$ and $\alpha := \alpha(L)$, we have $$|\varphi(g)| \leq h(n)\varphi(1)^\alpha.$$ \end{thm} The above results do not cover, for instance, the case where $g \in \GC^{F}$ is a unipotent element. However, we have been able to obtain a complete result covering all elements in $GL_n(q)$ and $SL_n(q)$: \begin{thm}\label{main1c} There is a function $h:\mathbb N \to \mathbb N$ such that the following statement holds. For any $n \geq 5$, any prime power $q$, any irreducible complex character $\chi$ of $H:= GL_n(q)$ or $SL_n(q)$, and any non-central element $g \in H$, $$|\chi(g)| \leq h(n) \cdot \chi(1)^{1-\frac{1}{2n}}.$$ \end{thm} For the remaining groups of Lie type, character bounds, which work for arbitrary elements $g \in \GC^{F}$, and are weaker than the one in Theorem \ref{main1} but asymptotically stronger than the ones in \cite{gluck} and \cite{LST}, will be proved in a sequel to this paper. \smallskip To be able to apply Theorem \ref{main1} we need information on the values of $\alpha(L) \leq \alpha({\mathcal L})$. For classical groups, we prove the following upper bound. \begin{thm} \label{ratio} If ${\mathcal G}$ is a classical algebraic group over ${\mathbb K}$ in good characteristic, and ${\mathcal L}$ is a Levi subgroup of ${\mathcal G}$, then \[ \alpha({\mathcal L}) \le {1\over 2}\left( 1+ {{\dim {\mathcal L}} \over {\dim {\mathcal G}}}\right). \] \end{thm} For exceptional types we obtain fairly complete information. \begin{thm}\label{alphaexcep} If ${\mathcal G}$ is an exceptional algebraic group in good characteristic, the values of $\alpha({\mathcal L})$ for (proper, non-toral) Levi subgroups ${\mathcal L}$ are as in Table $\ref{extab}$. \end{thm} In Table \ref{extab}, for ${\mathcal G} = F_4$ or $G_2$ the symbols $\tilde A_1, \tilde A_2$ refer to Levi subsystems consisting of short roots. For ${\mathcal G} = E_7$, there are two Levi subgroups $A_5$ and $A_5'$: using the notation for the fundamental roots $\alpha_i\,(1\le i\le 7)$ as in \cite{bour}, these are the Levi subgroups with fundamental roots $\{\alpha_i : i=1,3,4,5,6\}$ and $\{\alpha_i : i=2,4,5,6,7\}$ respectively. The notation $\triangleright A_4$, for instance, means that ${\mathcal L}'=[{\mathcal L},{\mathcal L}]$ has a simple factor of type $A_4$. \begin{table}[h!] \caption{$\alpha$-values for exceptional groups} \label{extab} \vspace{-7mm} \[ \begin{array}{r|cccccccccc} \hline &&&&&&&&&& \\ \vspace{-8mm}\\ {\mathcal G}=E_8,\,{\mathcal L} '= & E_7 & D_7 & {\mathcal L}'\triangleright E_6 & D_6 & A_7 & \triangleright D_5 & \triangleright A_6 & \triangleright A_5 & \triangleright D_4 & \hbox{rest} \\ \alpha({\mathcal L})= & \frac{17}{29} & \frac{9}{23} & \frac{11}{29} & \frac{9}{29} & \frac{15}{56} & \frac{7}{29} & \frac{5}{23} & \frac{4}{23} & \frac{5}{29} & \le \frac{1}{6} \\ \vspace{-3mm}\\ \hline &&&&&&&&&& \\ \vspace{-8mm}\\ {\mathcal G}=E_7,\,{\mathcal L} '= & E_6 & D_6 & {\mathcal L}'\triangleright D_5 & A_6 & A_5 & \triangleright A_5' & \triangleright D_4 & \triangleright A_4 & \triangleright A_3 & \hbox{rest} \\ \alpha({\mathcal L})= & \frac{11}{17} & \frac{5}{9} & \frac{7}{17} & \frac{5}{13} & \frac{4}{13} & \frac{1}{3} & \frac{5}{17} & \le \frac{1}{4} & \le \frac{1}{5} & \le \frac{1}{6} \\ \vspace{-3mm}\\ \hline &&&&&&&&&& \\ \vspace{-8mm}\\ {\mathcal G}=E_6,\,{\mathcal L} '= & D_5 & A_5 & D_4 & {\mathcal L}'\triangleright A_4 & \triangleright A_3 & \triangleright A_2 & A_1^k &&&\\ \alpha({\mathcal L})= & \frac{7}{11} & \frac{1}{2} & \frac{5}{11} & \frac{3}{8} & \frac{3}{11} & \le \frac{7}{27} & \le \frac{3}{20}&&& \\ \vspace{-3mm}\\ \hline &&&&&&&&&& \\ \vspace{-8mm}\\ {\mathcal G}=F_4,\,{\mathcal L} ' =& B_3 & C_3 & A_2\tilde A_1,A_2 & \tilde A_2A_1 & \tilde A_2 & A_1\tilde A_1 & A_1 & \tilde A_1 &&\\ \alpha({\mathcal L})= & \frac{1}{2} & \frac{7}{15} & \frac{1}{4} & \frac{2}{9} & \frac{1}{5} & \frac{1}{7} & \frac{1}{8} & \frac{1}{11}&& \\ \vspace{-3mm}\\ \hline &&&&&&&&&& \\ \vspace{-8mm}\\ {\mathcal G}=G_2,\,{\mathcal L} '= & A_1 & \tilde A_1&&&&&&&& \\ \alpha({\mathcal L})= & \frac{1}{3} & \frac{1}{4}&&&&&&&& \\ \vspace{-3mm}\\ \hline \end{array} \] \end{table} We can now easily deduce the following. \begin{cor}\label{keycor} Let ${\mathcal G}$, $G = {\mathcal G}^F$, and $f$ be as in Theorem $\ref{main1}$. Suppose $y\in G$ is a (semisimple) element such that ${\bf C}_G(y) = {\mathcal L}^F$, where ${\mathcal L}$ is a split Levi subgroup of ${\mathcal G}$. Then for any non-linear $\chi \in {\rm Irr}(G)$, \[ |\chi(y)| \le f(r) \, \chi(1)^{1-\frac{1}{2}\frac{\dim y^{{\mathcal G}}}{\dim {\mathcal G}}}. \] \end{cor} Next, we establish a new strong bound on character ratios given the support (which is defined right after \eqref{support}) of the semisimple part of the ambient element. \begin{thm}\label{supp} Assume ${\mathcal G} = SL_n(\overline\mathbb F_q)$ with $n \geq 2$, $Sp_n(\overline\mathbb F_q)$ with $n \geq 4$, or $Spin_n(\overline\mathbb F_q)$ with $n \geq 7$, all in good characteristic, and define $$c := c({\mathcal G}) = \left\{ \begin{array}{ll} (r+1)/(2r+4), & {\mathcal G} = SL_{r+1},\\ r/(4r+2), & {\mathcal G} = Sp_{2r},\\ r/(4r-2), & {\mathcal G} = Spin_{2r},\\ 1/4, & {\mathcal G} = Spin_{2r+1}. \end{array} \right.$$ Let $G = {\mathcal G}^F = G(q)$ and $f$ be as in Theorem \ref{main1}, and let $g \in G$ be any element such that its semisimple part $y$ has centralizer ${\bf C}_G(y) = {\mathcal L}^F$, where ${\mathcal L}$ is a split Levi subgroup of ${\mathcal G}$. Then, for any non-linear $\chi \in {\rm Irr}(G)$, \[ \frac{|\chi(g)|}{\chi(1)} \leq 3f(r) \, q^{-c\cdot{\mathrm {supp}}(y)}. \] \end{thm} In particular it follows that $\frac{|\chi(y)|}{\chi(1)} \leq 3f(r) \, \chi(1)^{-c\cdot{\mathrm {supp}}(y)}$, and that for any $\epsilon > 0$, $r \ge r(\epsilon)$ and $q$ larger than a suitable function of $r$, we have \[ \frac{|\chi(y)|}{\chi(1)} \le q^{-(b-\epsilon)\cdot{\mathrm {supp}}(y)}, \] where $b = 1/2$ in the $SL_{r+1}$ case and $b = 1/4$ in the other cases. Theorem \ref{supp} and its consequences considerably improve the bound (\ref{support}) from \cite[4.3.6]{LST} for elements as above. \medskip We also obtain more precise character bounds for $GL_n$. To state them we need some notation. For positive integers $n_1, \ldots , n_m$ define \[ \beta(n_1, \ldots , n_m) := \max \frac{\sum_{i=1}^m (n_i^2 - \sum_{j=1}^n a_{ij}^2)} {n^2 - \sum_{j=1}^n (\sum_{i=1}^m a_{ij})^2}, \] where $n = n_1 + \ldots + n_m$ and the maximum is taken over all non-negative integers $a_{ij}$ ($1\le i \le m$, $1 \le j \le n$) satisfying $$\sum_{j=1}^n a_{ij} = n_i, ~~a_{i1} \geq a_{i2} \geq \ldots \geq a_{in}, ~~1 \leq i \leq m,~~~\max_{1 \leq i \leq m}a_{i2} > 0,$$ if $\max_{1 \leq i \leq m}n_i \geq 2$, and let $\beta(1,1, \ldots,1) = 0$. \begin{thm} \label{GL} Let $G = GL_n(q)$ and let $L \le G$ be a Levi subgroup of the form $L = GL_{n_1}(q) \times \cdots \times GL_{n_m}(q)$, where $n_i \ge 1$ and $\sum_{i=1}^m n_i =n$. Let $n_{i_0} = \max_{1 \leq i \leq m}n_i$. Then \[ \frac{n_{i_0}-1}{n-t} \leq \alpha(L) = \beta(n_1, \ldots, n_m) \leq \frac{n_{i_0}}{n} \] if $n_{i_0} \geq 2$ and $t$ is the number of $1 \leq j \leq m$ such that $n_j = n_{i_0}$, and $\alpha(L) = \beta(n_1, \ldots ,n_m) = 0$ if $n_{i_0} = 1$. Consequently, for every $g \in G$ with ${\bf C}_G(g) \le L$ and every $\chi \in {\mathrm {Irr}}(G)$ we have \[ |\chi(g)| \le f(n-1) \chi(1)^{\beta(n_1, \ldots , n_m)}, \] where $f: \mathbb N \to \mathbb N$ is the function specified in Theorem \ref{main1}. \end{thm} Suppose now that $m$ divides $n$ and $n_1 = \ldots = n_m = n/m >1$. Then we can show that $\beta(n_1, \ldots , n_m) = \frac{1}{m}$, so we immediately obtain the following. \begin{cor} \label{FL} Let $G = GL_n(q)$ where $q$ is a prime power. Let $m < n$ be a divisor of $n$ and let $L \le G$ be a Levi subgroup of the form $L = GL_{n/m}(q)^m$. Let $g \in G$ with ${\bf C}_G(g) \le L$. Then we have \[ |\chi(g)| \le f(n-1) \chi(1)^{\frac{1}{m}} \] for all characters $\chi \in {\mathrm {Irr}}(G)$, where $f: \mathbb N \to \mathbb N$ is the function specified in Theorem \ref{main1}. \end{cor} Example \ref{sharpness} again shows that the exponent $1/m$ in Corollary \ref{FL} is sharp. In general, Theorem \ref{GL} determines $\alpha(L)$ up to within $1/n$. It is reasonable to conjecture that, under the hypotheses of Theorem \ref{GL}, $\alpha(L) = (n_{i_0}-1)/(n-t)$. This conjecture is confirmed in Theorem \ref{GL2} for the case $m=2$ (as well as in the cases, where either $n \leq 8$, or $m \leq 4$ and $n \leq 13$, by direct calculation). The bound in Theorem \ref{GL} and some variations on it have applications to Fuchsian groups (see \cite{lst2}). Corollary \ref{FL} may be regarded as a Lie analogue of the Fomin-Lulov character bound (\ref{fomlul}) for ${\sf S}_n$ mentioned before. \vspace{4mm} We now present some applications of the above results to the theory of {\it mixing times} for random walks on finite quasisimple groups of Lie type corresponding to conjugacy classes. Let $G = G(q)$ be such a group, let $y\in G$ be a non-central element, and let $C = y^G$, the conjugacy class of $y$. Consider the random walk on the corresponding Cayley graph starting at the identity, and at each step moving from a vertex $g$ to a neighbour $gs$, where $s \in y^G$ is chosen uniformly at random. Let $P^t(g)$ be the probability of reaching the vertex $g$ after $t$ steps. The mixing time of this random walk is defined to be the smallest integer $t = T(G,y)$ such that $||P^t-U||_1< \frac{1}{e}$, where $U$ is the uniform distribution and $||f||_1 = \sum_{g\in G} |f(g)|$ is the $l_1$-norm. Mixing times of such random walks have been extensively studied since the pioneering work of Diaconis and Shashahani \cite{DS} on the case $G = {\sf S}_n$ and $C$ the class of transpositions in ${\sf S}_n$. Additional results on random walks in symmetric and alternating groups have been obtained in various papers, see for instance \cite{Roi}, \cite{V}, \cite{LP} and \cite{LarS}. The latter paper obtains essentially optimal results on mixing times in these groups. However, if we turn from symmetric groups to finite groups $G$ of Lie type, good estimates on mixing times have been obtained only in very few cases. Hildebrand \cite{Hil} showed that the mixing time for the class of tranvections in $SL_n(q)$ is of the order of $n$. In \cite{chardeg} it is shown that if $y \in G$ is a regular element, then the mixing time $T(G,y)$ is $2$ when $G \ne PSL_2(q)$ is large. In \cite{S1} it is proved that, if $G$ is any finite simple group, then for a random $y \in G$ we have $T(G, y) = 2$ (namely, the latter equality holds with probability tending to $1$ as $|G| \to \infty$). Other than that, the mixing times $T(G,y)$ for groups $G$ of Lie type remain a mystery. The next result contains bounds for mixing times, and also (in parts (I)(a) and (II)) for the number of steps required so that $P^t$ is close to $U$ in the $l_\infty$-norm, which is stronger than the $l_1$-norm condition for mixing time (and also implies that the random walks hits all elements of $G$). Here we define $||f||_\infty = |G|\,{\rm max}_{x\in G}|f(x)|$, and say that $C^t = G$ {\it almost uniformly pointwise} as $q\rightarrow \infty$ if $||P^t-U||_\infty \rightarrow 0$ as $q\rightarrow \infty$. We denote by $h:=h({\mathcal G})$, the Coxeter number of ${\mathcal G}$, defined by \[ h({\mathcal G}) = \frac{\dim{{\mathcal G}}}{r} -1, \] where $r$ is the rank of ${\mathcal G}$. Note that $h \ge 2$ and that $h \to \infty$ as $r \to \infty$. \begin{thm}\label{mix} Suppose ${\mathcal G}$ is a simple algebraic group in good characteristic, and $G = G(q) = {\mathcal G}^F$ is a finite quasisimple group over $\mathbb F_q$. Let $y \in G$ be such that ${\bf C}_G(y) \le L$, where $L = {\mathcal L}^F$ for a split Levi subgroup ${\mathcal L}$ of ${\mathcal G}$. Write $C = y^G$. \begin{itemize} \item[{\rm (I)}] Suppose ${\mathcal G}$ is of classical type. \begin{itemize} \item[{\rm (a)}] If $t > (4+\frac{4}{h})\frac{\dim {\mathcal G}}{\dim {\mathcal G}- \dim {\mathcal L}}$, then $C^t = G$ almost uniformly pointwise as $q \rightarrow \infty$. In particular, $C^t = G$ for sufficiently large $q$. \item[{\rm (b)}] The mixing time $T(G,y) \le \lceil (2+\frac{2}{h})\frac{\dim {\mathcal G}}{\dim {\mathcal G} - \dim {\mathcal L}}\rceil$ for large $q$. \end{itemize} \item[{\rm (II)}] Suppose ${\mathcal G}$ is of exceptional type. Then $C^6 = G$ almost uniformly pointwise as $q \rightarrow \infty$, and the mixing time $T(G,y) \le 3$. \end{itemize} \end{thm} \noindent {\bf Remarks } (i) Note that the multiplicative constants above are very small. For example, $2 + \frac{2}{h} \le 3$ and it tends to $2$ as $r \to \infty$. (ii) The constant $2+\frac{2}{h}$ in part I(b) of Theorem \ref{mix} is best possible for some classes, for example homologies $y = \hbox{diag}(\mu I_{n-1},\lambda)$ in $G = SL_n(q)$ (where $\mu,\lambda \in \mathbb F_q^\times$ and $\mu \neq \lambda$ and so $q \geq 3$), for which the bound given by part (I)(b) is $T(G,y) \le n+3$ and for which the mixing time is at least $n$ by Lemma \ref{mix-subset}(ii). (iii) The bound $T(G,y) \le 3$ for exceptional groups in (II) is best possible for many classes -- namely, those classes for which $\dim y^{\mathcal G}$ is smaller than $\frac{1}{2}\dim {\mathcal G}$. For such classes, $|y^G|^2 < |G|/2$ for large $q$, so the mixing time cannot be 2 by Lemma \ref{mix-subset}(i). \vspace{4mm} Theorem \ref{mix}(I)(b) implies the following linear bounds for classical groups. \begin{cor}\label{linearbd} Let $G = {\mathcal G}^F$ be a quasisimple classical group over $\mathbb F_q$, where ${\mathcal G}$ is simple of rank $r$ over $\mathbb F_q$, and let $y \in G$ be as in Theorem $\ref{mix}$. Then for large $q$, \begin{enumerate}[\rm(i)] \item the diameter ${\rm diam}(G,y^G) \le 2r+4$, and \item the mixing time $T(G,y) \le r+2$. \end{enumerate} \end{cor} A linear bound for the diameter (of the order of $40r$), which holds for all non-central conjugacy classes, can be found in \cite{LLi}. Using Theorem \ref{main1c} we can obtain such a bound for {\it all} conjugacy classes in $SL_n(q)$: \begin{cor}\label{linearbdsl} Let $G= SL_n(q)$, let $x$ be an arbitrary non-central element of $G$ and let $C = x^G$. \begin{itemize} \item[{\rm (i)}] If $t>4n+4$, then $C^t = G$ almost uniformly pointwise as $q\rightarrow \infty$. \item[{\rm (ii)}] The mixing time $T(G,x) \le 2n+3$ for large $q$. \end{itemize} \end{cor} Note that \cite[Theorem 1]{lev} shows that $C^n=G$ for any nontrivial conjugacy class $C$ of $G=PSL_n(q)$, where $n\ge 3, q\ge 4$. We can also use Theorem \ref{gl-uni} (or rather its corollary \ref{sl-uni}) to obtain a better bound for unipotent elements of $SL_n(q)$. \begin{thm}\label{mix-gluni} Let $G = SL_n(q)$ and let $u$ be a non-identity unipotent element in $G$. Write $C = u^G$. \begin{itemize} \item[{\rm (i)}] If $t > 2n$, then $C^t = G$ almost uniformly pointwise as $q \rightarrow \infty$. In particular, $C^t = G$ for sufficiently large $q$. \item[{\rm (ii)}] The mixing time $T(G,u) \le n$ for sufficiently large $q$. \end{itemize} \end{thm} One can compare part (ii) of the above theorem with Hildebrand's result \cite{Hil} for transvections, where he proves that for $n$ varying, the mixing time for the class of tranvections in $SL_n(q)$ is of the order of $n$. In our case $n$ may still vary, but $q$ should be much larger than $n$. The coincidence of values seems striking. It is interesting to compare the mixing time $T(G,y)$ with the {\it covering number} $cn(G,C)$ of the conjugacy class $C = y^G$, defined as the minimal $t$ for which $C^t = G$. It is known that there is an absolute constant $b$ such that for any conjugacy class $C \ne \{ 1 \}$ of any finite simple group $G$ we have \[ \frac{\log |G|}{\log |C|} \le cn(G,C) \le b \frac{\log |G|}{\log |C|}. \] Indeed the first inequality is trivial, while the second is \cite[1.2]{lishdiam}. It is easy to see that, with the above notation, \begin{equation}\label{time} \frac{\log |G| + \log (1-e^{-1})}{\log |C|} \le T(G,y). \end{equation} Indeed, this follows from Lemma \ref{mix-subset}. It is conjectured in \cite[4.3]{S3} that there is an absolute constant $c$ such that for any finite simple group $G$ of Lie type and any non-identity element $y \in G$ we have \begin{equation}\label{1.1} T(G, y) \le c \frac{\log |G|}{\log |C|}, \end{equation} where $C = y^G$. Note that this statement does not hold for alternating groups $G$ (take $y \in G$ to be a cycle of length around $n/2$ -- then $\frac{\log |G|}{\log |C|}$ is bounded, while $T(G,y)$ is of the order of $\log n$). The above conjecture is related to an older conjecture posed by Lubotzky in \cite[p.179]{lub}. Lubotzky conjectured that, if $G$ is a finite simple group and $C$ is a non-trivial conjugacy class of $G$, then the mixing time of the Cayley graph $\Gamma(G, C)$ of $G$ with $C$ as a generating set is linearly bounded above in terms of the diameter of $\Gamma(G, C)$. Since this diameter is exactly the covering number $cn(G,C)$, this conjecture (combined with the more recent upper bound on $cn(G,C)$ mentioned above) implies conjecture (\ref{1.1}). Applying Theorem \ref{mix} we are able to prove the above conjectures in many interesting cases. Let ${\mathcal G}$ be a simple algebraic group in good characteristic, and $G = G(q) = {\mathcal G}^F$ a finite quasisimple group over $\mathbb F_q$. We say that a non-central element $y \in G$ is {\it nice} if ${\bf C}_G(y) = L$, where $L = {\mathcal L}^F$ for a split Levi subgroup ${\mathcal L}$ of ${\mathcal G}$. Note that (non-central) split semisimple elements are nice. \begin{cor}\label{lub} Let ${\mathcal G}$, $G(q)$ be as above, and suppose $q$ is large (given ${\mathcal G}$). Then Conjecture (\ref{1.1}) holds for all nice elements $y$ of the quasisimple group $G(q)$. In particular, the conjecture holds for all split semisimple elements of $G(q)$. \end{cor} Indeed, this readily follows from part I(b) of Theorem \ref{mix}, with a very small constant $c$ (around $3$). Conjecture (\ref{1.1}) and Corollary \ref{lub} suggest a distinctive difference between mixing times for ${\sf S}_n$ as opposed to classical groups $Cl_n(q)$. Our final result essentially determines the mixing time $T(G,y)$ in terms of the support of $y$ as follows (recall the notation $f_1(x) \lesssim_x f_2(x)$ from Remark \ref{rems}). \begin{thm}\label{mix-supp} Assume ${\mathcal G} = SL_n(\overline\mathbb F_q)$ with $n \geq 2$, $Sp_n(\overline\mathbb F_q)$ with $n \geq 4$, or $Spin_n(\overline\mathbb F_q)$ with $n \geq 7$, and define $$r' := r'({\mathcal G}) = \left\{ \begin{array}{ll} r(2r+4)/(r+1), & {\mathcal G} = SL_{r+1},\\ 4r+2, & {\mathcal G} = Sp_{2r},\\ 4r-2, & {\mathcal G} = Spin_{2r},\\ 4r, & {\mathcal G} = Spin_{2r+1}. \end{array} \right.$$ Let $G = {\mathcal G}^F = G(q)$ and $f$ be as in Theorem \ref{main1}, and let $g \in G$ be any element such that its semisimple part $y$ has centralizer ${\bf C}_G(y) = {\mathcal L}^F$, where ${\mathcal L}$ is a split Levi subgroup of ${\mathcal G}$. Suppose $q$ is large enough (given $r$). Then we have \[ T(G,g) \le \lceil (2+\frac{2}{h})r'/{\mathrm {supp}}(y)\rceil. \] Furthermore, we have \[ \frac{1}{2} r'/{\mathrm {supp}}(y) \lesssim_{|G|} T(G,y) \le \lceil (2+\frac{2}{h})r'/{\mathrm {supp}}(y)\rceil. \] \end{thm} Thus, under the above conditions, the mixing time $T(G,y)$ is essentially $n/{\mathrm {supp}}(y)$ (up to a small multiplicative constant). \section{Character bounds: Proof of Theorem \ref{main1}}\label{sec:main1} Throughout this section, let ${\mathcal G}$ be a connected reductive algebraic group over a field of characteristic $p > 0$, $F:{\mathcal G} \to {\mathcal G}$ a Frobenius endomorphism, and let $G := {\mathcal G}^F$. We will say $\GC^{F}$ is defined over $\mathbb F_q$, if $q$ is the common absolute value of eigenvalues of $F$ acting on $X({\mathcal T})\otimes \mathbb R$, where $X({\mathcal T})$ is the character group of an $F$-stable (maximally split) maximal torus ${\mathcal T}$ of ${\mathcal G}$. First we prove the following statement concerning Harish-Chandra restriction. \begin{prop}\label{fixed} Suppose that $g \in G$ is such that ${\bf C}_G(g) \leq {\mathcal L}^F$, where ${\mathcal L}$ is an $F$-stable Levi subgroup of an $F$-stable parabolic subgroup ${\mathcal P} = {\mathcal U}{\mathcal L}$ of ${\mathcal G}$ with unipotent radical ${\mathcal U}$. Let $\ell = 0$ or a prime not dividing $p|g|$, $\mathbb F$ an algebraically closed field of characteristic $\ell$, and let $\varphi$ be the Brauer character of some $\mathbb F G$-module $V$. Also, let $\psi$ denote the Brauer character of the ${\mathcal L}^F$-module ${\bf C}_V({\mathcal U}^F)$. Then $$\varphi(g) = \psi(g).$$ \end{prop} \noindent {\bf Proof $\;$ } (a) Write $L := {\mathcal L}^F$, $P := {\mathcal P}^F$, and $U := {\mathcal U}^F$. First we handle the case $\ell = 0$. Consider the map $f:U \to U$ given by $f(u) = g^{-1}ugu^{-1}$. Then, for $u, v \in U$ we have that $$f(u) = f(v) \Leftrightarrow v^{-1}u \in U \cap {\bf C}_G(g) \subseteq U \cap L = 1 \Leftrightarrow u = v.$$ Thus the map $f$ is injective, and so bijective. Hence, when $u$ runs over $U$, $ugu^{-1}$ runs over the elements of $gU$, each element once: $$\{ugu^{-1} \mid u \in U\} = gU.$$ Now we decompose $V = {\bf C}_V(U) \oplus [V,U]$ as a $P$-module (note that $P = {\bf N}_G(U)$), and let $\Phi= {\mathrm {diag}}(\Phi_1,\Phi_2)$ denote the representation of $P$ with respect to some basis respecting this decomposition. In particular, no irreducible constituent of $(\Phi_2)|_U$ is trivial, and so $\sum_{u \in U}\Phi_2(u) = 0$. It follows that $$\sum_{u \in U}\Phi(ugu^{-1}) = \sum_{u \in U}\Phi(gu) = \Phi(g)\sum_{u \in U}\Phi(u) = $$ $$ = {\mathrm {diag}}(\Phi_1(g)\sum_{u \in U}\Phi_1(u),\Phi_2(g)\sum_{u \in U}\Phi_2(u)) = {\mathrm {diag}}(|U|\Phi_1(g),0).$$ Taking the trace of both sides, we obtain $|U|\varphi(g) = |U|\psi(g)$, as stated. \smallskip (b) For the modular case $\ell > 0$, let $\chi^\circ$ denote the restriction of any complex character $\chi$ of $G$ or $P$ to $\ell'$-elements. It is well known, see e.g \cite[Theorem 15.14]{Is}, that any Brauer character of $G$ is a $\mathbb Z$-combination of $\chi^\circ$ with $\chi \in {\mathrm {Irr}}(G)$. It follows that (in the Grothendieck group of $\mathbb F G$-modules) we can write $V = V_1-V_2$, where $V_1$ and $V_2$ are some reductions modulo $\ell$ of $\mathbb C G$-modules $W_1$ and $W_2$ affording complex characters $\chi_1$ and $\chi_2$. Since $\ell \neq p$, ${\bf C}_V(U) = {\bf C}_{V_1}(U)-{\bf C}_{V_2}(U)$ in the Grothendieck group of $\mathbb F P$-modules. Now $g \in P$, $\varphi(g) = \chi_1(g)-\chi_2(g)$, and the statement follows by applying the results of (a) to $W_1$ and $W_2$. \hal Recall that the complex irreducible characters of $G = {\mathcal G}^F$ can be partitioned into {\it Harish-Chandra series}, see \cite[Chapter 9]{C}. We refer to \cite{C} and \cite{DM} for basic facts on {\it Harish-Chandra restriction} $\tw* R^G_L$ and {\it Harish-Chandra induction} $R^G_L$. \begin{prop}\label{hc} There is a constant $A = A(r)$ depending only on the semisimple rank $r$ of ${\mathcal G}$ with the following property. Suppose that $\chi \in {\mathrm {Irr}}(G)$ is such that $\tw* R^G_L(\chi) \neq 0$ for $L = {\mathcal L}^F$, where ${\mathcal L}$ is a split Levi subgroup of ${\mathcal G}$. Then the total number of irreducible constituents of the $L$-character $\tw* R^G_L(\chi)$ (with counting multiplicities) is at most $A$. In fact, if $[{\mathcal G},{\mathcal G}]$ is simple then one can choose $A = W(r)^2$, where $W(r)$ denotes the largest order of the Weyl group of a simple algebraic group of rank $r$. \end{prop} \noindent {\bf Proof $\;$ } Since $\tw* R^G_L(\chi) \neq 0$, $\chi$ is not cuspidal. By \cite[Proposition 9.3.1]{C}, we may assume that ${\mathcal L}$ is a standard $F$-stable Levi subgroup of a standard $F$-stable parabolic subgroup ${\mathcal P}={\mathcal U}{\mathcal L}$ of ${\mathcal G}$. Suppose that $\chi$ belongs to the Harish-Chandra series labeled by a standard Levi subgroup $L_1$ and a cuspidal character $\psi \in {\mathrm {Irr}}(L_1)$. Here, $L_1 = {\mathcal L}_1^F$, where ${\mathcal L}_1$ is a split Levi subgroup of ${\mathcal G}$, and $\chi$ is an irreducible constituent of $R^G_{L_1}(\psi)$. Suppose now that $\eta$ is any irreducible constituent of $\tw* R^G_L(\chi)$, and let $\eta$ belongs to the Harish-Chandra series labeled by a standard Levi subgroup $L_2$ (of $L$) and a cuspidal character $\delta \in {\mathrm {Irr}}(L_2)$. Then $\eta$ is an irreducible constituent of $R^L_{L_2}(\delta)$. Then by the adjointness of the Harish-Chandra induction and restriction and their transitivity \cite[Proposition 4.7]{DM}, we have that $$\begin{aligned}0 & < c_\eta := [\tw* R^G_L(\chi),\eta]_{L} & = [\chi,R^G_L(\eta)]_G & \\ & \leq [\chi,R^G_L(R^L_{L_2}(\delta))]_G & = [\chi,R^G_{L_2}(\delta)]_G & \leq [R^G_{L_1}(\psi),R^G_{L_2}(\delta)]_G.\end{aligned}$$ Since $\psi \in {\mathrm {Irr}}(L_1)$ and $\delta \in {\mathrm {Irr}}(L_2)$ are cuspidal, it follows by \cite[Proposition 9.1.5]{C} that the pair $(L_1,\psi)$ is $G$-conjugate to the pair $(L_2,\delta)$ and $R^G_{L_1}(\psi) = R^G_{L_2}(\delta)$. Hence, with no loss of generality we may replace $(L_1,\psi)$ by $(L_2,\delta)$. Furthermore, by \cite[Proposition 9.2.4]{C}, $[R^G_{L_1}(\psi),R^G_{L_1}(\psi)]_G$ can be bounded by the order of the Weyl group $W({\mathcal G})$ of ${\mathcal G}$ and so in terms of the semisimple rank $r$ as well. Thus we can bound $c_\eta$ in terms of $r$. The same is true for $[R^L_{L_1}(\psi),R^L_{L_1}(\psi)]_L$, and so for the number of possibilities for $\eta$. In particular, if $[{\mathcal G},{\mathcal G}]$ is simple, then $|W({\mathcal L})| \leq |W({\mathcal G})| \leq W(r)$ and so we can choose $A(r) = W(r)^2$. \hal From now on we assume that $p$ is a good prime for ${\mathcal G}$ (and ${\mathbb K} = \overline{\mathbb K}$ is a field of characteristic $p$). Then a theory of {\it generalized Gelfand-Graev representations} (GGGRs) was developed by Kawanaka \cite{K}: for each unipotent element $u \in G = {\mathcal G}^F$ one can associate a GGGR with character $\Gamma_u$ (which depends only the conjugacy class of $u$ in $G$). Suppose now that ${\mathcal O}=u^{\mathcal G}$ is an $F$-stable unipotent conjugacy class in ${\mathcal G}$. By the Lang-Steinberg theorem, since ${\mathcal G}$ is connected we may assume that $u \in G$. Then ${\mathcal O}$ is called a {\it unipotent support} for a given $\rho \in {\mathrm {Irr}}(G)$ if \begin{enumerate}[\rm(i)] \item $\sum_{g \in {\mathcal O}^F}\rho(g) \neq 0$; \item If ${\mathcal O}'$ is any $F$-stable unipotent class of ${\mathcal G}$ such that $\sum_{g \in {\mathcal O}'^F}\rho(g) \neq 0$, then $\dim {\mathcal O}' \leq \dim {\mathcal O}$. \end{enumerate} As shown in \cite{Geck}, as $p$ is a good prime for ${\mathcal G}$, each $\rho \in {\mathrm {Irr}}({\mathcal G}^F)$ has a unique unipotent support ${\mathcal O}_\rho$ (see also \cite{GM}). Next, ${\mathcal O} \cap G$ is a disjoint union $\cup^r_{i=1}u_i^G$ of, say, $r$ conjugacy classes in $G$. If $A(x) = {\bf C}_{\mathcal G}(x)/{\bf C}_{\mathcal G}(x)^\circ$ is the component group of the centralizer of $x \in {\mathcal G}$, then one defines $$\tilde\Gamma_u := \sum^r_{i=1}[A(u_i):A(u_i)^F]\Gamma_{u_i}.$$ Then ${\mathcal O}$ is called a {\it wave front set} for a given $\rho \in {\mathrm {Irr}}(G)$ if \begin{enumerate}[\rm(i)] \item $[\tilde\Gamma_u,\rho]_G \neq 0$; \item If ${\mathcal O}' = v^{\mathcal G}$ is a unipotent class of ${\mathcal G}$ with $v \in {\mathcal G}^F$ such that $[\tilde\Gamma_v,\chi]_G \neq 0$, then $\dim{\mathcal O}' \leq \dim{\mathcal O}$. \end{enumerate} Work of Lusztig \cite{L} and subsequently \cite[Theorem 14.10]{Ta} show that each $\rho \in {\mathrm {Irr}}(G)$ has a unique wave front set ${\mathcal O}^*_\rho$. Moreover, if ${\bf Z}({\mathcal G})$ is connected, then ${\mathcal O}^*_\rho$ is the unipotent class denoted by $\xi(\rho)$ in \cite[(13.4.3)]{L}, and, if $G$ is defined over $\mathbb F_q$, then as a polynomial in $q$ with rational coefficients, the degree of $\rho$ is \begin{equation}\label{degree1} \rho(1) = \frac{1}{n_\rho}q^{(\dim {\mathcal O}^*_\rho)/2} + \mbox{ lower powers of }q, \end{equation} for some positive integer $n_\rho$ dividing $|A(u)|$ if $u \in {\mathcal O}_\rho$. Furthermore, if $D_G$ denotes the {\it Alvis-Curtis duality} (cf. \cite[Chapter 8]{DM}), and $\rho^* = \pm D_G(\rho) \in {\mathrm {Irr}}(G)$ for $\rho \in {\mathrm {Irr}}(G)$, then \begin{equation}\label{dual} {\mathcal O}_{\rho^*} = {\mathcal O}^*_\rho, \end{equation} (see e.g. \cite[\S1.5]{Ta}). \vspace{4mm} The next two lemmas are well known to the experts. In particular, they have similar conclusions and proofs to Theorems 4.1(ii) and 1.7 of \cite{chardeg}. However, for application to bounding the function $f(r)$ in Theorem \ref{main1} (see Proposition \ref{frbd}), we need the extra detail in the lemmas concerning polynomials being products of cyclotomic polynomials, which is not made explicit in \cite{chardeg}. We omit their proofs. \begin{lem}\label{bounded2} There is a constant $N = N(r)$ depending only on $r$ and a collection of $N$ monic polynomials, each being a product of cyclotomic polynomials, such that the following statement holds. If ${\mathcal G}$ is a connected reductive group of semisimple rank $\leq r$ in good characteristic $p$, $\GC^{F}$ is defined over $\mathbb F_q$, and $s \in \GC^{F}$ is semisimple, then $$[{\mathcal G}^F:({\bf C}_{\mathcal G}(s)^\circ)^F]_{p'} = f(q),$$ where $f$ is one of the chosen polynomials. \end{lem} In what follows, with a slight abuse of language, we also view $t$ as a cyclotomic polynomial in variable $t$. \begin{lem}\label{bounded3} There are constants $B_1 = B_1(r)$ and $B_2 = B_2(r)$ depending only on $r$, and $B_2$ monic polynomials, each being a product of cyclotomic polynomials in one variable $t$, such that the following statement holds for any connected reductive algebraic group ${\mathcal G}$ of semisimple rank $\leq r$ with connected center in good characteristic. When $\GC^{F}$ is defined over $\mathbb F_q$ and $\chi \in {\mathrm {Irr}}({\mathcal G}^F)$, then $$\chi(1) = (1/n_\chi){\mathrm {Deg}}^*_\chi(q),$$ where ${\mathrm {Deg}}_\chi^*$ is one of the chosen monic polynomials, $n_\chi \in \mathbb N$, $1 \leq n_\chi \leq B_1$. In fact, if $[{\mathcal G},{\mathcal G}]$ is simple, then one can take $B_1$ to be the largest order of the component group ${\bf C}_{\mathcal H}(u)/{\bf C}_{\mathcal H}(u)^\circ$, where ${\mathcal H}$ is any simple algebraic group of rank $r$ and $u \in {\mathcal H}$ any unipotent element. \end{lem} Recall that the set of unipotent classes in ${\mathcal G}$ admit the partial order $\leq$, where $u^{\mathcal G} \leq v^{\mathcal G}$ if and only if $u^{\mathcal G} \subseteq \overline{v^{\mathcal G}}$. \begin{prop}\label{closure1} Let $p$ be a good prime for ${\mathcal G}$, $G = {\mathcal G}^F$, and let $u \in G$ be a unipotent element. Then the following statements hold. \begin{enumerate}[\rm(i)] \item $D_G(\Gamma_u)$ is unipotently supported, i.e. is zero on all non-unipotent elements of $G$. \item Suppose that $D_G(\Gamma_u)(v) \neq 0$ for some unipotent element $v \in G$. If ${\bf Z}({\mathcal G})$ is disconnected, assume in addition that $q$ is large enough compared to the semisimple rank of ${\mathcal G}$. Then $u^{\mathcal G} \leq v^{\mathcal G}$. \end{enumerate} \end{prop} \noindent {\bf Proof $\;$ } (i) is well known, and (ii) is \cite[Scholium 2.3]{DLM2}. (Even though \cite{DLM2} assumes $p$ is large enough, in fact the proof of \cite[Scholium 2.3]{DLM2} needs only that $p$ is a good prime. As pointed out to the authors by J. Michel and J. Taylor, the proof in \cite{DLM2} relies on the validity of the results in \cite{L3}, which were shown to hold under the indicated hypotheses by Shoji \cite{Sh1}, cf. \cite[Theorem 4.2]{Sh2}.) \hal \begin{prop}\label{closure2} Let ${\mathcal G}/{\bf Z}({\mathcal G})$ be simple, $p$ be a good prime for ${\mathcal G}$, $G = {\mathcal G}^F$, and let ${\bf Z}({\mathcal G})$ be connected. Suppose that $\chi \in {\mathrm {Irr}}(G)$ is such that $\tw* R^G_L(\chi) \neq 0$ for $L = {\mathcal L}^F$, where ${\mathcal L}$ is a split Levi subgroup of ${\mathcal G}$, and let $\eta \in {\mathrm {Irr}}(L)$ be an irreducible constituent of $\tw* R^G_L(\chi)$. Let ${\mathcal O}^*_\chi = v^{\mathcal G}$ and ${\mathcal O}^*_\eta = u^{\mathcal L}$. Then $\dim u^{\mathcal G} \leq \dim v^{\mathcal G}$. \end{prop} \noindent {\bf Proof $\;$ } (i) To distinguish between GGGRs for $G$ and $L$, we will add the relevant superscript to their notation, e.g. $\Gamma^L_u$ is the GGGR of $L$ labeled by $u$. First we show that if $R^G_L(D_L\Gamma^L_u)(w) \neq 0$ for $w \in G$, then $w$ is unipotent and $u^{\mathcal G} \leq w^{\mathcal G}$. Indeed, by Proposition \ref{closure1}(i), the generalized character $D_L\Gamma^L_u$ is unipotently supported, whence $R^G_L(D_L\Gamma^L_u)$ is also unipotently supported. In particular, $w$ is unipotent. Recall that ${\mathcal L}$ is a Levi subgroup of an $F$-stable parabolic subgroup ${\mathcal P}$ with unipotent radical ${\mathcal U}$. The condition on $w$ now implies that some $G$-conjugate of $w$ is $w' = xy$ where $x \in {\mathcal U}^F$, $y \in L$, and $D_L\Gamma^L_u(y) \neq 0$. By Proposition \ref{closure1} applied to $D_L\Gamma^L_u$, $y$ is unipotent and $u^{\mathcal L} \leq y^{\mathcal L}$. It then follows by \cite[Lemma 5.2]{GHM} (which is true for any connected reductive group ${\mathcal G}$) that $$u^{\mathcal G} \leq y^{\mathcal G} \leq (xy)^{\mathcal G} = w^{\mathcal G},$$ as stated. \smallskip (ii) By the assumption, we may assume that $u \in L$ and $\eta$ is an irreducible constituent of the GGGR $\Gamma^L_u$. It follows that $$0 < [\tw* R^G_L(\chi),\eta]_L \leq [\tw* R^G_L(\chi),\Gamma^L_u]_L = [\chi,R^G_L(\Gamma^L_u)]_G = $$ $$= [D_G(\chi),D_G(R^G_L(\Gamma^L_u))]_G = [D_G(\chi),R^G_L(D_L\Gamma^L_u)]_G.$$ Here we use the self-adjointness of $D_G$ and the intertwining property of $D_G$ with $R^G_L$ (see \cite[Proposition 8.10, Theorem 8.11]{DM}). In particular, there must exist some $w \in G$ such that $$D_G(\chi)(w) \neq 0,~~R^G_L(D_L\Gamma^L_u)(w) \neq 0.$$ Let $\chi^* = \pm D_G(\chi) \in {\mathrm {Irr}}(G)$ so that ${\mathcal O}_{\chi^*} = {\mathcal O}^*_\chi = v^{\mathcal G}$ with $v \in G$. By (i), the condition $R^G_L(D_L\Gamma^L_u)(w) \neq 0$ implies that $w$ is unipotent and $$u^{\mathcal G} \leq w^{\mathcal G}.$$ Now we can apply \cite[Theorem 8.1]{AA} (which uses only the assumption that ${\bf Z}({\mathcal G})$ is connected and ${\mathcal G}/{\bf Z}({\mathcal G})$ is simple; cf. also \cite[Corollary 13.6]{Ta}) to obtain from $\chi^*(w) \neq 0$ that $$\dim w^{\mathcal G} \leq \dim v^{\mathcal G}.$$ It follows that $$\dim u^{\mathcal G} \leq \dim \overline{w^{\mathcal G}} = \dim w^{\mathcal G} \leq \dim v^{\mathcal G},$$ as desired. \hal \vspace{4mm} \noindent {\large {\bf Proof of Theorem \ref{main1}.} } (i) Denoting $\rho = \tw* R^G_L(\chi)$, we have by Proposition \ref{fixed} that $|\chi(g)| = |\rho(g)| \leq \rho(1)$. Hence, it suffices to bound $\rho(1)$ in terms of $\chi(1)$. Fix the semisimple rank $r$ of ${\mathcal G}$. First we handle the case where ${\bf Z}({\mathcal G})$ is connected. Note that ${\mathcal H} := {\mathcal G}/{\bf Z}({\mathcal G})$ is simple (of rank $r$) as $[{\mathcal G},{\mathcal G}]$ is simple. Consider any irreducible constituent $\eta$ of $\rho$ and let ${\mathcal O}^*_\eta = u^{\mathcal L}$ for some $u \in L$ and ${\mathcal O}^*_\chi = v^{\mathcal G}$ for some $v \in G$. By Proposition \ref{closure2} we have $\dim u^{\mathcal G} \leq \dim v^{\mathcal G}$. On the other hand, $\dim u^{\mathcal L} \leq \alpha (\dim u^{\mathcal G})$ by the choice of $\alpha$, and so \begin{equation}\label{degree2} \dim u^{\mathcal L} \leq \alpha(\dim v^{\mathcal G}). \end{equation} Now \eqref{degree1} and Lemma \ref{bounded3} imply that $$\eta(1) \leq (q+1)^{(\dim u^{\mathcal L})/2},~~B_1\chi(1) \geq (q-1)^{(\dim v^{\mathcal G})/2}.$$ Let $D = D(r)$ denote the largest dimension of unipotent classes in simple algebraic groups of rank $r$. Using \eqref{degree2} and noting that $\dim v^{\mathcal G} = \dim v^{\mathcal H} \leq D(r)$, we then get $$\eta(1) \leq \left( \frac{q+1}{q-1} \right)^{\alpha D/2}\cdot B_1^\alpha\chi(1)^\alpha.$$ Setting $C := 3^{D/2}$ and applying Proposition \ref{hc}, we now obtain $$\rho(1) \leq A(\max_\eta\eta(1)) \leq AB_1C\chi(1)^\alpha, $$ and we are done in this case. \smallskip (ii) Next we handle the general case, where ${\bf Z}({\mathcal G})$ may be disconnected. Consider a regular embedding of ${\mathcal G}$ into $\tilde{\mathcal G}$ with connected center and with compatible Frobenius map $F:\tilde{\mathcal G} \to \tilde{\mathcal G}$, and set $\tilde G := \tilde{\mathcal G}^F$, ${\mathcal Z} := {\bf Z}(\tilde{\mathcal G})$. As $\tilde{\mathcal G} = {\mathcal Z}[{\mathcal G},{\mathcal G}]$, $\tilde{\mathcal G}$ and ${\mathcal G}$ have the same semisimple rank. Also, if ${\mathcal L}$ is a Levi subgroup of an $F$-stable parabolic subgroup ${\mathcal P}$ of ${\mathcal G}$, then we can embed ${\mathcal P}$ in the $F$-stable parabolic subgroup $\tilde{\mathcal P} = {\mathcal U}\tilde{\mathcal L} = {\bf N}_{\tilde{\mathcal G}}({\mathcal U})$, with the same unipotent radical ${\mathcal U}$ as of ${\mathcal P}$ and with $\tilde{\mathcal L} = {\mathcal Z}{\mathcal L}$. Now, set $\tilde L:= \tilde{\mathcal L}^F$ and note that \begin{equation}\label{levi} \tilde G = G\tilde L. \end{equation} Consider any $\chi \in {\mathrm {Irr}}(G)$ and some $\tilde\chi \in {\mathrm {Irr}}(\tilde G)$ lying above $\chi$, and denote $$\rho := \tw* R^G_L(\chi),~~\tilde\rho := \tw* R^{\tilde G}_{\tilde L}(\tilde \chi).$$ Note that $\tilde{\mathcal P}^F = U\tilde L$, and by \eqref{levi} we can choose a set of representatives of $G$-cosets in $\tilde G$ that is contained in $\tilde L$. Hence, by Clifford's theorem we can write $$\tilde\chi|_G = \sum^t_{i=1}\chi^{x_i},$$ where $1=x_1, \ldots ,x_t \in \tilde L$. As $\tilde L$ normalizes $U$, we see that the Harish-Chandra restrictions $\rho_i$ of $\chi^{x_i}$ to the Levi subgroup $L$ all have the same dimension, equal to $[\chi|_U,1_U]_U$. Thus $$\rho(1) = \tilde\rho(1)/t,~~\chi(1) = \tilde\chi(1)/t.$$ Now, any unipotent element $v \in \tilde L$ is contained in $\tilde L \cap {\mathcal G} = L$, and $v^{\tilde{\mathcal G}} = v^{\mathcal G}$ and similarly $v^{\tilde{\mathcal L}} = v^{{\mathcal Z}{\mathcal L}} = v^{\mathcal L}$. Thus the constants $\alpha$ for $L$ and for $\tilde L$ as defined in Theorem \ref{main1} are the same. Applying Lemma \ref{fixed} to $\chi$ and the result of (i) to $\tilde\chi$, we now have $$|\chi(g)| = |\rho(g)| \leq \rho(1) = \frac{1}{t}\tilde\rho(1) \leq \frac{1}{t}f(r)\tilde\chi(1)^\alpha \leq f(r)\chi(1)^\alpha.$$ This completes the proof of Theorem \ref{main1}. \hal \vspace{2mm} \noindent {\bf Remark } In the case of $GL_n(q)$, it is possible to give an alternate proof of Theorem \ref{main1} which does not use recent results on unipotent supports and wave front sets; we do not give this here, but a sketch can be found in the last section of \cite{mwlprinceton}. \vspace{4mm} The next result provides a bound for the function $f$ in Theorem \ref{main1}. \begin{prop}\label{frbd} Under the assumptions of Theorem \ref{main1}, suppose that $q \geq q_0 \geq 2$. Then $f(r)$ can be chosen to be $$W(r)^2\cdot B(r) \cdot \left( \frac{q_0+1}{q_0-1} \right)^{(d(r)-r)/2},$$ where $W(r)$ is the largest order of the Weyl group of ${\mathcal H}$, $B(r)$ is the largest order of $A(u)$ for unipotent elements $u \in {\mathcal H}$, and $d(r)$ is the largest dimension of ${\mathcal H}$, when ${\mathcal H}$ runs over simple algebraic groups of rank $r$. In particular, if $r \geq 9$ and $q \geq r^2+1$, one can take $$f(r) = 2^{2r+\sqrt{2r}+3}(r!)^2.$$ \end{prop} \noindent {\bf Proof $\;$ } By the proof of Theorem \ref{main1} we may choose $f(r) = AB_1C_1$, with $C_1 = ( \frac{q_0+1}{q_0-1})^{(d(r)-r)/2}$ (because $D = d(r)-r$). Next, $A \leq W(r)^2$ by Proposition \ref{hc} and $B_1 \leq B(r)$ by Lemma \ref{bounded3}. Now assume that $r \geq 9$ and $q_0 \geq r^2+1$. Then $W(r) = 2^r \cdot r!$, $d(r) = 2r^2+r$ and so $$\left( \frac{q_0+1}{q_0-1}\right)^{(d(r)-r)/2} \leq \left(1+\frac{2}{r^2}\right)^{r^2}.$$ It remains to bound $B(r)$. If ${\mathcal H} = Spin_n$ (with $n = 2r$ or $2r+1$) and $u = \sum_i J_i^{r_i}$ is a unipotent element in ${\mathcal H}$ with $r_i$ Jordan blocks of size $i \geq 1$, then, according to \cite[\S3.3.5]{LS}, $|A(u)| \leq \max(2,2^k)$, where $k$ is the number of odd $i$ with $r_i > 0$. Note that $$2r+1 \geq \sum^{k}_{j=1}(2j-1) = k^2,$$ and so $|A(u)| \leq 2^{\sqrt{2r+1}}$. Other simple groups of rank $r$ can be analyzed similarly using \cite[Theorem 3.1]{LS} and yield smaller bound on $|A(u)|$. Hence we can take $B(r) = 2^{\sqrt{2r+1}}$ and complete the proof by observing that $$\left(1+\frac{2}{r^2}\right)^{r^2} \cdot 2^{\sqrt{2r+1}} < 2^{\sqrt{2r}+3}.$$ \hal \vspace{4mm} We conclude the section with some examples illustrating the sharpness of the $\alpha$-bound in Theorem \ref{main1}. \begin{exa}\label{sharpness} \begin{enumerate}[\rm(i)] \item {\em Let $G := GL_n(q)$ with $q > 2$, and let $g = {\mathrm {diag}}(\epsilon,I_{n-1}) \in G$ for some $1 \neq \epsilon \in \mathbb F_q^\times$. Then $L := {\bf C}_G(g) = GL_1(q) \times GL_{n-1}(q)$ is a Levi subgroup of $G$. Let $\chi=\rho_n$ denote the unipotent character of $GL_n(q)$ labeled by the partition $(n-1,1)$. Then $\rho_n(1) = (q^n-q)/(q-1)$. A computation inside the Weyl group of $G$ (using the Comparison Theorem \cite[Theorem 5.9]{HL}) shows that $$\tw* R^G_L(\rho_n) = 1_{GL_1(q)} \otimes (\rho_{n-1}+1_{GL_{n-1}(q)}).$$ Now Proposition \ref{fixed} implies that $$|\chi(g)| = \rho_{n-1}(1)+1 = \frac{q^{n-1}-1}{q-1} \approx \chi(1)^{\frac{n-2}{n-1}}$$ if $q$ is large enough. For this Levi subgroup $L$, the value of $\alpha$ in Theorem \ref{main1} is precisely $\frac{n-2}{n-1}$ (see Proposition \ref{gengl}), so the $\alpha$-bound is perfectly sharp in this example. \item The Steinberg character ${\sf {St}}$ of a group $G = {\mathcal G}^F$ as in Theorem \ref{main1} provides a good source of examples, since its values are easily calculated (see \cite[6.4.7]{C}): for a semisimple element $g \in G$, \[ |{\sf {St}} (g) | = |{\bf C}_G(g)|_p, \] (where $p$ is the underlying characteristic). As a first example, let $G = GL_n(q)$ and let $g = {\mathrm {diag}}(\epsilon,I_{n-1})$ as in the previous example. Then \[ {\sf {St}} (g) = |GL_{n-1}(q)|_p = q^{\frac{1}{2}(n-1)(n-2)} = {\sf {St}}(1)^{\frac{n-2}{n}}, \] while $\alpha = \frac{n-2}{n-1}$ for the Levi subgroup ${\bf C}_G(g)$, as observed above. As another example, let $G = GL_n(q)$ and suppose $n=mk$, where $2\le m\le q-1$ and $k>1$. Let $\lambda_1,\ldots ,\lambda_m$ be distinct elements of $\mathbb F_q^\times$, and define \[ g = {\rm diag}(\lambda_1 I_k,\cdots ,\lambda_m I_k) \in G. \] Let $L = {\bf C}_G(g) = GL_k(q)^m$. By Corollary \ref{FL}, $\alpha(L) = \frac{1}{m}$. On the other hand, \[ {\sf {St}} (g) = q^{\frac{1}{2}mk(k-1)} = {\sf {St}}(1)^{\frac{k-1}{mk-1}}, \] and the exponent $\frac{k-1}{mk-1}$ is close to $\alpha = \frac{1}{m}$ for $k$ large and $m$ fixed. Similar examples showing the sharpness of Theorem \ref{main1} for the Steinberg character of other classical groups can be constructed using \cite[Lemma 3.4]{lst2}. \item Fix $m \geq 2$ and consider $G = GL_{2m}(q)$ with $q$ large enough (compared to $m$). Again let $\lambda_1,\ldots ,\lambda_m$ be distinct elements of $\mathbb F_q^\times$, and define \[ g = {\rm diag}(\lambda_1 I_2,\cdots ,\lambda_m I_2) \in G. \] Then $L = {\bf C}_G(g) = GL_2(q)^m$, and $\alpha=\alpha(L) = 1/m$ as mentioned above. Consider the unipotent characters $\chi^{(2m-j,j)}$ of $G$ labeled by the partition $(2m-j,j)$, $0 \leq j \leq m$. Then $\sum^j_{i=0}\chi^{(2m-i,i)}$ is the permutation character of $G$ acting on the set of $j$-dimensional subspaces of the natural module $V = \mathbb F_q^{2m}$. Note that $g$ fixes $mq^{m-1}(1+O(q^{-1}))$ $(m-1)$-dimensional subspaces of $V$, and $(q+1)^m(1+O(q^{-1}))$ $m$-dimensional subspaces of $V$. It follows that for $\chi :=\chi^{(m,m)}$ we have $$\chi(g) = q^m(1+O(q^{-1})),$$ whereas $\chi(1) = q^{m^2}(1+O(1/q))$. Thus $\chi(g) \approx \chi(1)^\alpha$. \item More generally, fix $k,m \geq 2$ and consider $G = GL_{mk}(q)$ with $q$ large enough (compared to $\max(m,k)$). Again let $\lambda_1,\ldots ,\lambda_m$ be distinct elements of $\mathbb F_q^\times$, and define \[ g = {\rm diag}(\lambda_1 I_k,\cdots ,\lambda_m I_k) \in G. \] Then $L = {\bf C}_G(g) = GL_k(q)^m$, and $\alpha=\alpha(L) = 1/m$ as mentioned above. Consider the unipotent character $\chi:=\chi^\mu$ of $G$ labeled by the partition $\mu := (m^k) \vdash mk$. Observe that $\tw* R^G_L(\chi)$ contains the Steinberg character ${\sf {St}}_L$ of $L$. (Indeed, by \cite[Proposition 5.3]{GLT}, the Alvis-Curtis duality functor $D_G$ sends $\chi$ to $\pm \chi^\nu$, where $\nu = \mu'= (k^m) \vdash mk$, whereas $D_L(1_L) = {\sf {St}}_L$. Now, by \cite[Corollary 8.13]{DM} we have $$\begin{array}{lll} [\tw* R^G_L(\chi),{\sf {St}}_L]_L & = [\tw* R^G_L(\pm D_G(\chi^\nu)),{\sf {St}}_L]_L & = \pm [D_L(\tw* R^G_L(\chi^\nu)),D_L(1_L)]_L\\ & = \pm [\tw* R^G_L(\chi^\nu),1_L]_L & = \pm [\chi^\nu,R^G_L(1_L)]_G.\end{array}$$ But note that $L$ is a Levi subgroup of a rational parabolic subgroup of type $\nu$ of $GL_{mk}(\overline\mathbb F_q)$, whence $\chi^\nu$ is an irreducible constituent of $R^G_L(1_L)$, and the claim follows.) Since $\chi$ is a unipotent character and the Harish-Chandra restriction preserves rational series, every irreducible constituent of $\tw* R^G_L(\chi)$ is a unipotent character of $L$ and so contains $g \in {\bf Z}(L)$ in its kernel. It now follows from Proposition \ref{fixed} that $$\chi(g) = \tw* R^G_L(\chi)(g) = \tw* R^G_L(\chi)(1) \geq {\sf {St}}_L(1) = q^{mk(k-1)/2}.$$ On the other hand, the degree formula \cite[\S13.8]{C} implies that $$\chi(1) = q^{m^2k(k-1)/2}(1+O(q^{-1})),$$ and we again obtain that $\chi(g) \gtrsim \chi(1)^\alpha$. \item As far as the exceptional groups of Lie type are concerned, it is again interesting to use the Steinberg character to test the sharpness of Theorem \ref{main1}. For example, let $G = E_8(q)$, and suppose $g \in G$ is a semisimple element with centralizer a Levi subgroup of type $E_7$. Then \[ {\sf {St}} (g) = |E_7(q)|_p = q^{63} = {\sf {St}} (1)^\beta, \] where $\beta = \frac{21}{40}$, while the $\alpha$-value of this Levi is $\frac{17}{29}$, by Theorem \ref{alphaexcep}. One can calculate such $\beta$-values for all the Levi subgroups in Table \ref{extab} of Theorem \ref{alphaexcep}; it is never the case that $\beta=\alpha$, but in some cases the values of $\beta$ and $\alpha$ are quite close. \item We offer one more example with $G = {\mathcal G}^F = SL_n(q)$, with $q \geq n+2$, and \[ g = {\mathrm {diag}}(\lambda_1,\lambda_2,\cdots ,\lambda_n) \in G, \] where $\lambda_1, \ldots,\lambda_n \in \mathbb F_q^\times$ are pairwise distinct. Then $T={\bf C}_G(g)$ is a maximally split maximal torus. Let $\mu \vdash n$ be such that the irreducible character $S^\mu$ of the Weyl group $W({\mathcal G}) \cong {\sf S}_n$ labeled by $\mu$ has the largest possible degree, and let $\chi:=\chi^\mu$ denote the unipotent character of $G$ labeled by $\mu$. As in (iv), every irreducible constituent of $\tw* R^G_T(\chi)$ is trivial at $g$. A computation in $W({\mathcal G})$ and Proposition \ref{fixed} show that $$\chi(g) = \tw* R^G_T(\chi)(g) = \tw* R^G_T(\chi)(1) = S^\mu(1),$$ whereas $\alpha(T) = 0$. Thus for the function $f$ in Theorem \ref{main1} we have $$f(n-1) \geq S^\mu(1) \geq e^{-1.283\sqrt{n}}\sqrt{n!},$$ with the latter following from the main result of \cite{LoS}, \cite{VK}. } \end{enumerate} \end{exa} \section{General and special linear groups}\label{sec:main1b} In this section we prove Theorems \ref{main2}, \ref{main1b} and \ref{main1c}. Along the way we establish character bounds for unipotent elements of $GL_n(q)$ (see Theorem \ref{gl-uni}), and also for elements with extension-field centralizers for its semisimple parts (Theorem \ref{gl-ext}). \subsection{Proof of Theorem \ref{main1b}}\label{pf13} We will keep the notation of \S\ref{sec:main1}. \smallskip (i) First we consider the case ${\mathcal G} = GL_n$. In this case, the centralizer of any element in ${\mathcal G}$ is connected and one can check (e.g. using \cite{Green}) that $n_\rho = 1$ in \eqref{degree1}. Let $\varphi$ be an irreducible $\ell$-Brauer character of $G = {\mathcal G}^F = GL_n(q)$ and $g \in G$ as in Theorem \ref{main1b}. By Proposition \ref{fixed}, $|\varphi(g)| = |\psi(g)|$ for $\psi := \tw* R^G_L(\varphi)$. According to \cite[Theorem B]{BK}, one can label complex and $\ell$-Brauer characters of $G$ and find a complex character $\chi \in {\mathrm {Irr}}(G)$ with the same label as of $\varphi$ such that both the generic degree of $\chi$ and the lower bound (given in \cite[Theorem B]{BK}) are monic polynomials in $q$ of same degree say $N_\chi$. Using \eqref{degree1} and the equality $n_\chi = 1$, we have $$N_\chi := (\dim {\mathcal O}^*_\chi)/2.$$ As $\chi(1)$ is a product of cyclotomic polynomials in $q$, we also have that $$\chi(1) \leq (q+1)^{N_\chi}.$$ Furthermore, one can easily check that the lower bound in \cite[Theorem B]{BK} satisfies $$\varphi(1) \geq (q-1)^{N_\chi}.$$ As $N_\chi \leq \dim {\mathcal G} = n^2$, there is a constant $D=D(n) \leq 3^{n^2}$ such that \begin{equation}\label{degree3} \frac{\chi(1)}{\varphi(1)} \leq D. \end{equation} Since $\chi$ and $\varphi$ have the same labeling, $\varphi$ is a constituent of the restriction $\chi^\circ$ of $\chi$ to $\ell'$-elements of $G$. Let ${\mathcal P} = {\mathcal U}{\mathcal L}$ be an $F$-stable parabolic subgroup of ${\mathcal G}$ with Levi subgroup ${\mathcal L}$ and unipotent radical ${\mathcal U}$. As $U := {\mathcal U}^F$ is an $\ell'$-group, we also have that $$\psi(1) = [\varphi|_U,1_U]_U \leq [\chi|_U,1_U]_U = \rho(1),$$ where $\rho := \tw* R^G_L(\chi)$. The proof of Theorem \ref{main1} yields a function $f:\mathbb N \to \mathbb N$ such that $$\rho(1) \leq f(n)\chi(1)^\alpha.$$ Choosing $h$ such that $h(n) \geq f(n)D$ and applying \eqref{degree3}, we obtain $$|\varphi(g)| = |\psi(g)| \leq \psi(1) \leq \rho(1) \leq h(n)\varphi(1)^\alpha,$$ as desired. \smallskip (ii) Now we consider $S = SL_n(q)$ as the derived subgroup of $G = GL_n(q)$, an irreducible $\ell$-Brauer character $\varphi_1$ of $S$, and its Harish-Chandra restriction $\psi_1$ to the Levi subgroup $L \cap S$, where $L$ is a suitable split Levi subgroup of $G$. Note that we can choose a set of representatives of $S$-cosets in $G$ that is contained in $L$. If $\varphi \in {\mathrm {IBr}}(G)$ lies above $\varphi_1$, then by Clifford's theorem and the last observation we can write $$\varphi|_S = \sum^t_{i=1}(\varphi_1)^{x_i},$$ where $1=x_1, \ldots ,x_t \in L$. As $L$ normalizes $U$, we see that the Harish-Chandra restrictions $\psi_i$ of $(\varphi_1)^{x_i}$ to the Levi subgroup $L \cap S$ all have the same dimension. Thus $$\psi_1(1) = \psi(1)/t,~~\varphi_1(1) = \varphi(1)/t.$$ Applying Proposition \ref{fixed} and the results of (i), we now have $$|\varphi_1(g)| = |\psi_1(g)| \leq \psi_1(1) = \frac{1}{t}\psi(1) \leq \frac{1}{t}h(n)\varphi(1)^\alpha \leq h(n)\varphi_1(1)^\alpha,$$ and so we are done. \hal \subsection{Proof of Theorem \ref{main2}} (i) First we consider the case $G = GL_n(q)$. If ${\mathcal L}$ is a torus, we can choose a regular semisimple element $g \in L$ and take $\chi = 1_G$. Assume now that ${\mathcal L}$ is not a torus, and choose $u \in L_{\mathrm {unip}}$ such that \begin{equation}\label{opt-1} \alpha(L) = (\dim u^{\mathcal L})/(\dim u^{\mathcal G}). \end{equation} We may assume that \begin{equation}\label{opt-1a} L = GL_{n_1}(q) \times GL_{n_2}(q) \times \cdots \times GL_{n_r}(q),~~ u = {\mathrm {diag}}(u_1,u_2, \ldots ,u_r) \end{equation} where $n_1 \geq n_2 \geq \ldots \geq n_r \geq 1$; furthermore, $u_i \in GL_{n_i}(q)$ is a unipotent element, the sizes of whose Jordan blocks form a partition $\lambda_i \vdash n_i$. Let $\mu_i \vdash n_i$ be the partition conjugate to $\lambda_i$ and let $\chi^{\mu_i}$ be the unipotent character of $GL_{n_i}(q)$ labeled by $\mu_i$. Now Green's formula for the degree of $\chi^{\mu_i}$ (see the discussion before \cite[Theorem A]{BK}) implies that $\chi^{\mu_i}(1)$ is a monic polynomial in $q$ of degree $(1/2)\dim u_i^{\mathcal L}$. Hence, if we choose $C_n$ large enough, then using Lemma \ref{bounded2} we see that \begin{equation}\label{opt-2} \gamma(1) \geq (1/2)q^{(1/2)\dim u^{\mathcal L}}, \end{equation} for $\gamma:= \chi^{\mu_1} \otimes \chi^{\mu_2} \otimes \ldots \otimes \chi^{\mu_r} \in {\mathrm {Irr}}(L)$ whenever $q \geq C_n$. Next, let $\mu := \mu_1 + \mu_2 + \ldots + \mu_r$, where we have added zero parts to $\mu_i$ so that $\mu_1, \ldots ,\mu_r$ have the same number of parts, and then take the $i^{\mathrm {th}}$ part of $\mu$ to be the sum of all the $i^{\mathrm {th}}$ parts of $\mu_1, \ldots,\mu_r$. Again using Green's formula, we then see that the unipotent character $\chi = \chi^\mu$ of $G$ labeled by $\mu$ is a monic polynomial in $q$ of degree $(1/2)\dim^{u^{\mathcal G}}$, whence \begin{equation}\label{opt-3} \chi(1) \leq 2q^{(1/2)\dim u^{\mathcal G}} \end{equation} if $q \geq C_n$. For any $\nu \vdash m$, let $S^\nu$ denote the irreducible character of ${\sf S}_m$ labeled by $\nu$. An application of the Littlewood-Richardson formula \cite[2.8.14]{JK} shows that the restriction of $S^\mu$ to ${\sf S}_{n_1} \times {\sf S}_{n_2} \times \ldots \times {\sf S}_{n_r}$ contains $S^{\mu_1} \otimes S^{\mu_2} \otimes \ldots \otimes S^{\mu_r}$. This computation in the Weyl groups of ${\mathcal G}$ and ${\mathcal L}$ implies that $\gamma$ is an irreducible constituent of $\tw* R^G_L(\chi)$. Now, if $q \geq n+1$, then we can choose a semisimple element $g \in {\bf Z}(L)$ such that ${\bf C}_G(g) = L$. As in Example \ref{sharpness}(iv), we have that every irreducible constituent of $\tw* R^G_L(\chi)$ has $g$ in its kernel, and so by Proposition \ref{fixed}, $$\chi(g) = \tw* R^G_L(\chi)(g) = \tw* R^G_L(\chi)(1) \geq \gamma(1).$$ Hence the statement follows from the choice \eqref{opt-1} of $u$ and the bounds \eqref{opt-2}, \eqref{opt-3}. \smallskip (ii) To handle the case of $SL_n(q)$, first we recall that any unipotent character of $G$ remains irreducible over $SL_n(q)$. Furthermore, as mentioned in the proof of Theorem \ref{main1}, for any split Levi subgroup ${\mathcal L}$ of ${\mathcal G} = GL_n(\overline\mathbb F_q)$ we have ${\mathcal G} = [{\mathcal G},{\mathcal G}]{\mathcal Z}$ and ${\mathcal L} = ({\mathcal L} \cap [{\mathcal G},{\mathcal G}]){\mathcal Z}$, where ${\mathcal Z} := {\bf Z}({\mathcal G})$. It follows that $$\dim u^{\mathcal G} = \dim u^{[{\mathcal G},{\mathcal G}]},~~\dim u^{\mathcal L} = \dim u^{{\mathcal L} \cap [{\mathcal G},{\mathcal G}]}$$ for any element $u \in {\mathcal L}_{\mathrm {unip}} = ({\mathcal L} \cap [{\mathcal G},{\mathcal G}])_{\mathrm {unip}}$. Finally, the condition $(n!)^n$ divides $q-1$ implies by the next Lemma \ref{det1} that, for any non-toral Levi subgroup $L$ given in \eqref{opt-1a} we can find an element $g \in SL_n(q)$ with ${\bf C}_G(g) = L$. Now the statement for $SL_n(q)$ follows from (i). \hal \begin{lem}\label{det1} Let $1 \leq n_1 \leq n_2 \leq \ldots \leq n_r$ with $r,n_r \geq 2$, $n = \sum^r_{i=1}n_i$, and let $q$ be a prime power such that $N:= n_r\cdot \prod^{r-1}_{i=1}(n_i+1)$ divides $q-1$. Then, for $$L := GL_{n_1}(q) \times GL_{n_2}(q) \times \cdots \times GL_{n_r}(q) < G := GL_n(q),$$ there exists a semisimple element $s \in SL_n(q)$ such that ${\bf C}_G(s) = L$. \end{lem} \noindent {\bf Proof $\;$ } Choose $\zeta \in \mathbb F_q^\times$ of order $N$, and for any $d|N$ let $\zeta_d := \zeta^{N/d}$. Define $$h_i = \zeta_{(n_1+1)(n_2+1) \ldots (n_i+1)}^{-1}I_{n_i} \in GL_{n_i}(q),~1 \leq i \leq r-1,~~ h_r = \zeta I_{n_r} \in GL_{n_r}(q).$$ We prove by induction on $1 \leq i \leq r-1$ that $\prod^i_{j=1}\det(h_i) = \zeta_{(n_1+1)(n_2+1) \ldots (n_i+1)}$. The induction base $i=1$ is obvious. For the induction step from $i-1$ to $i \geq 2$, we have $$\prod^i_{j=1}\det(h_i) = \zeta_{(n_1+1)(n_2+1) \ldots (n_{i-1}+1)}\zeta_{(n_1+1)(n_2+1) \ldots (n_i+1)}^{-n_i} = \zeta_{(n_1+1)(n_2+1) \ldots (n_i+1)}.$$ Hence, for $s := {\mathrm {diag}}(h_1, h_2, \ldots,h_r) \in {\bf Z}(L)$ we have $$\det(s) = \zeta_{(n_1+1)(n_2+1) \ldots (n_{r-1}+1)}\zeta^{-n_r} = 1.$$ The construction of $s$ and the condition $n_r \geq 2$ ensure that ${\bf C}_G(s) = L$. \hal \subsection{Elements with extension-field centralizers} \begin{thm}\label{gl-ext} Let $G = GL_n(q)$ with $n \geq 2$ and $q \geq 8$, and let $g = su = us$ with $s \in G$ semisimple and $u \in G$ unipotent. Suppose that ${\bf C}_G(s) \cong GL_{n/k}(q^k)$ for some $1 < k \mid n$. Then $$\frac{|\chi(g)|}{\chi(1)} \leq \frac{f(n)}{q^{n/3}}$$ for any $\chi \in {\mathrm {Irr}}(G)$ with $\chi(1) > 1$ and $f(n) = (11/7)^n-13/10$. In particular, if $q \geq 227$ then $|\chi(g)| \leq \chi(1)^{1-1/2n}$ for all $\chi \in {\mathrm {Irr}}(G)$. \end{thm} \noindent {\bf Proof $\;$ } We proceed by induction on $n \geq 2$. Let $L:= SL_n(q)$ and let $W = \mathbb F_q^n$ denote the natural $G$-module. Since $\chi(1) > 1$, all irreducible constituents of $\chi_L$ are non-trivial. In particular, if $n \geq 3$ then $\chi(1) \geq (q^n-q)/(q-1) > q^{n-1}$ by \cite[Theorem 1.1]{TZ}. \smallskip (i) First we consider the case $k = n$. Since $|{\bf C}_G(g)| \leq |{\bf C}_G(s)| = q^n-1$, we have that $|\chi(g)| \leq \sqrt{|{\bf C}_G(g)|} < q^{n/2}$; in particular, \begin{equation}\label{gl-ext-1} |\chi(g)|/\chi(1) \leq q^{1-n/2} \leq q^{-n/3} \end{equation} if $n \geq 6$, or if $n = 5$ and $\chi(1) \geq q^5$. The condition ${\bf C}_G(s) \cong GL_1(q^n)$ also implies that no eigenvalue of $g$ on $W$ can belong to $\mathbb F_q$. Assume now that $n = 5$ and $\chi(1) < q^5$. By \cite[Theorem 3.1]{TZ}, every irreducible constituent of $\chi_L$ is one of $q-1$ Weil characters, of degree $(q^n-1)/(q-1) - \delta$ with $\delta = 0$ or $1$. Since Weil characters of $L$ extend to Weil characters of $G$, $\chi$ is a Weil character. Since no eigenvalue of $g$ on $W$ belongs to $\mathbb F_q$, using the well-known character formula for Weil characters of $G$, see e.g. \cite[(1.1)]{T}, we now see that $|\chi(g)| \leq q+1$ and so $$|\chi(g)|/\chi(1) < (q^2-1)/(q^5-q) < q^{-n/3}.$$ Consider the case $n = 4$. If $\chi(1) \geq (q-1)(q^3-1)/2$, then $$\frac{|\chi(g)|}{\chi(1)} \leq \frac{(q^4-1)^{1/2}}{(q^3-1)(q-1)/2} < q^{-n/3}$$ as $q \geq 8$. Assume now that $\chi(1) < (q^3-1)(q-1)/2$. By \cite[Theorem 3.1]{TZ}, every irreducible constituent of $\chi_L$ is one of $q-1$ Weil characters, all of which extend to Weil characters of $G$. Arguing as in the previous case, we see that $$|\chi(g)|/\chi(1) < (q^2-1)/(q^4-q) < q^{-n/3}.$$ If $n = 3$, then inspecting the character table of $G$ \cite{St} we get $$\frac{|\chi(g)|}{\chi(1)} \leq \max\left(\frac{1}{q(q+1)},\frac{3}{(q^2-1)(q-1)}\right) < q^{-n/3}.$$ Similarly, for $n = 2$ we have $|\chi(g)|/\chi(1) \leq 2/(q-1) < (1.15)q^{-n/3}$ as $q \geq 8$. Note that $f(n) > 1.16$ for all $n \geq 2$. Hence, to complete the induction base $2 \leq n \leq 5$, it remains to consider the case $(n,k) = (4,2)$. Again inspecting the character table of $G$ \cite{Chevie}, we see that $$|\chi(g)|/\chi(1) < 1/(q-1)^2 < q^{-n/3}.$$ \smallskip (ii) From now on we may assume that $n \geq 6$ and $2 \leq k < n$. Consider the action of $u$ on the natural module $W' = \mathbb F_{q^k}^{n/k}$ of ${\bf C}_G(s)$. If this action induces an element with only one Jordan block, then $|{\bf C}_G(g)| = |{\bf C}_{GL_{n/k}(q^k)}(u)| < q^n$ and again \eqref{gl-ext-1} holds. Thus we may assume that the $\langle g\rangle$-module $W'$ is decomposable as a direct sum of two $\langle g\rangle$-submodules: $W' = W'_1 \oplus W'_2$, with $$\dim_{\mathbb F_{q^k}}W'_1 = a \geq n/2k,~\dim_{\mathbb F_{q^k}}W'_2 = b \geq 1.$$ Viewing $W'_i$ as vector spaces over $\mathbb F_q$, we get a $g$-invariant decomposition $W = W_1\oplus W_2$, with $\dim W_1 = ak \geq n/2$ and $\dim W_2 = bk \geq 2$. Writing $g = {\mathrm {diag}}(g_1,g_2)$ with $g_i \in G_i:= GL(W_i)$ and let $s_i$ denote the semisimple part of $g_i$, we have $${\bf C}_{G_1}(s_1) = GL(W'_1) \cong GL_a(q^k),~~{\bf C}_{G_2}(s_2) = GL(W'_2) \cong GL_b(q^k).$$ In particular, the induction hypothesis applies to the elements $g_i \in G_i$. \smallskip (iii) Let $V$ be a $\mathbb C G$-module affording the character $\chi$, and denote $L_i := [G_i,G_i]$ for $i = 1,2$. We decompose the $G_1 \times G_2$-module $V$ as $$V = V_1 \oplus V_2 \oplus V_3,$$ where $V_1 := {\bf C}_V(L_1)$, every irreducible constituent of $V_2$ is trivial on $L_2$ but {\it not} on $L_1$, and every irreducible constituent of $V_3$ is nontrivial on $L_1$ and on $L_2$. Let $\chi_j$ denote the $G_1 \times G_2$-character afforded by $V_j$, for $1 \leq j \leq 3$. If $\alpha \otimes \beta$ is any irreducible constituent of $\chi_3$, then $\alpha(1), \beta(1) > 1$ by the construction of $V_3$, whence $$|\alpha(g_1)|/\alpha(1) \leq f(ak)q^{-ak/3},~~|\beta(g_2)|/\beta(1) \leq f(bk)q^{-bk/3}$$ by the induction hypothesis applied to $g_1 \in G_1$ and $g_2 \in G_2$. It follows that \begin{equation}\label{gl-ext2} |\chi_3(g)|/\chi_3(1) \leq f(ak)f(bk)q^{-n/3}. \end{equation} Next, let $\alpha \otimes \beta$ be any irreducible constituent of $\chi_2$. Then $\alpha(1) > 1$ and $\beta(1) = 1$ by the construction of $V_2$, whence $$|\alpha(g_1)|/\alpha(1) \leq f(a)q^{-ak/3},~~|\beta(g_2)| = 1$$ by the induction hypothesis applied to $g_1 \in G_1$. It follows that \begin{equation}\label{gl-ext3} |\chi_2(g)|/\chi_2(1) \leq f(a)q^{-ak/3}. \end{equation} \smallskip (iv) We will now estimate $\chi_j(1)/\chi(1)$ for $j = 1,2$. Let $d(X)$ denote the smallest degree of a nontrivial complex representation of a finite group $X$, and let $$a_{m,q} := \frac{\sqrt{q-1}}{d(SL_m(q))} + \frac{1}{d(SL_{m-1}(q))},~~b_{m,q} := \sum^{\infty}_{i=m+1}a_{i,q}.$$ The proof of \cite[Proposition 4.2.3]{LST} shows that, if $U$ is any nontrivial irreducible $\mathbb C SL_n(q)$-module for $n > m \geq 3$ and $SL_m(q)$ is embedded naturally in $SL_n(q)$, then \begin{equation}\label{gl-ext4} \dim {\bf C}_U(SL_m(q)) \leq b_{m,q}\dim U. \end{equation} By \cite[Theorem 1.1]{TZ}, for $m \geq 4$ we have $a_{m,q} < (q+\sqrt{q-1})/q^{m-2}(q+1)$. It follows that \begin{equation}\label{gl-ext5} b_{m,q} <\frac{q+\sqrt{q-1}}{q+1}\sum^{\infty}_{i=m-1}q^{-i} = \frac{q(q+\sqrt{q-1})}{q^{m-1}(q^2-1)} < \frac{1.36}{q^{m-1}} \end{equation} if $m \geq 3$ and $q \geq 8$. As $a_{3,q} = \sqrt{q-1}/(q^2+q) + e/(q-1)$ with $e := 3-\gcd(q,2)$ and $q \geq 8$, we then have \begin{equation}\label{gl-ext6} b_{2,q} = a_{3,q} + b_{3,q} < 1.3q^{-2/3}. \end{equation} Now, since $ak \geq n/2 \geq 3$, we have $ak-1 \geq n/3$. Applying \eqref{gl-ext4} and \eqref{gl-ext5}, we get \begin{equation}\label{gl-ext7} \chi_1(1)/\chi(1) \leq b_{ak}(q) < 1.36q^{-n/3}. \end{equation} Similarly, \begin{equation}\label{gl-ext8} \chi_2(1)/\chi(1) \leq b_{bk}(q) < 1.36q^{-(bk-1)} \leq 0.17q^{-bk/3}. \end{equation} if $bk \geq 3$, and \begin{equation}\label{gl-ext9} \chi_2(1)/\chi(1) \leq b_2(q) < 1.3q^{-2/3}. \end{equation} if $bk \geq 2$ (using \eqref{gl-ext6} instead of \eqref{gl-ext5}). Note that in the case $bk = 2$, we must have $6 \leq n = ak+2$, and so $ak \geq 4$, $ak-1 \geq 1+n/3$, whence instead of \eqref{gl-ext7} we have \begin{equation}\label{gl-ext10} \chi_1(1)/\chi(1) \leq b_{ak}(q) < 0.17q^{-n/3}. \end{equation} \smallskip (v) Now, if $bk \geq 3$, then putting \eqref{gl-ext2}, \eqref{gl-ext3}, \eqref{gl-ext7}, \eqref{gl-ext8} together, we obtain $$|\chi(g)| \leq |\chi_1(1)| + |\chi_2(g)| + |\chi_3(g)| \leq \frac{\chi(1)}{q^{n/3}} \cdot (1.36+0.17f(ak)+f(ak)f(bk)).$$ If $bk = 2$, then \eqref{gl-ext2}, \eqref{gl-ext3}, \eqref{gl-ext9}, \eqref{gl-ext10} altogether imply $$|\chi(g)| \leq |\chi_1(1)| + |\chi_2(g)| + |\chi_3(g)| \leq \frac{\chi(1)}{q^{n/3}} \cdot (0.17+1.3f(ak)+f(ak)f(bk)).$$ The choice $f(n) = (11/7)^n-1.3$ ensures that $$f(n) = f(ak)f(bk) + 1.3f(ak)+1.3f(bk) + 0.39 > f(ak)f(bk) + 0.17f(ak)+ 1.36,$$ whence $|\chi(g)|/\chi(1) \leq f(n)q^{-n/3}$, completing the induction step of the proof. The last statement then follows, since $f(n) < q^{n/12}$ when $q \geq 227$ and $\chi(1) < q^{n^2/2}$. \hal \subsection{Unipotent elements in general linear groups} \begin{thm}\label{gl-uni} There is a function $g:\mathbb N \to \mathbb N$ such that the following statement holds. For any $n \geq 2$, any prime power $q$, $\ell = 0$ or any prime not dividing $q$, any irreducible $\ell$-Brauer character $\varphi$ of $G:= GL_n(q)$, and any unipotent element $1 \neq u \in G$, $$|\varphi(u)| \leq g(n) \cdot \varphi(1)^{\frac{n-2}{n-1}}.$$ \end{thm} \noindent {\bf Proof $\;$ } Note that the statement holds when $n=2$ (choosing $g(2) = 1$) as in this case we have $|\varphi(u)| \leq 1$. So in what follows we may assume $n \geq 3$. Recall the partial order $\leq$ on the set of unipotent classes of ${\mathcal G} = GL_n(\overline\mathbb F_q)$: $x^{\mathcal G} \leq y^{\mathcal G}$ precisely when $x^{\mathcal G} \subseteq \overline{y^{\mathcal G}}$, and we consider $G = {\mathcal G}^F$ for a suitable Frobenius endomorphism $F$. Note that the unipotent classes in ${\mathcal G}$ are parametrized by partitions of $n$. We will prove by induction using the partial order $\leq$ that, if $u$ is parametrized by a partition $\lambda \vdash n$ then $$|\varphi(g)| \leq g_\lambda(n) \cdot \varphi(1)^{\frac{n-2}{n-1}}$$ for some positive constant $g_\lambda(n)$ depending only on $\lambda$. Then the statement follows by taking $$g(n) := \max_{\lambda \vdash n}g_\lambda(n).$$ Observe that $u$ is a {\it Richardson} unipotent element, that is, we can find an $F$-stable parabolic subgroup ${\mathcal P}$ with unipotent radical ${\mathcal U}$ such that $u^{\mathcal G} \cap {\mathcal U}$ is an open dense subset of ${\mathcal U}$ that forms a single ${\mathcal P}$-orbit. Indeed, as shown in \cite[\S5.5]{Hu}, if $\mu = (\mu_1, \ldots ,\mu_l) \vdash n$ is the conjugate partition associated to $\lambda$, then one can just take ${\mathcal P}$ to be the standard parabolic subgroup generated by the upper-triangular Borel subgroup together with matrices in the block-diagonal form, with block sizes $\mu_1 \times \mu_1, \ldots ,\mu_l \times \mu_l$. Furthermore, ${\bf C}_{\mathcal G}(u)$ is connected (as ${\mathcal G} = GL_n(\overline\mathbb F_q)$), of dimension equal to $\dim{\mathcal P}-\dim{\mathcal U}$, and contained in ${\mathcal P}$, see \cite[Corollary 5.2.2]{C}. Since $u^{\mathcal G} \cap {\mathcal U}$ is a single ${\mathcal P}$-orbit and ${\bf C}_{\mathcal G}(u) = {\bf C}_{\mathcal G}(u)^\circ = {\bf C}_{\mathcal P}(u)$ is connected, by the Lang-Steinberg theorem, $u^{\mathcal G} \cap {\mathcal U}$ contains an $F$-stable element $u'$, i.e. $u' \in u^{\mathcal G} \cap U$ for $U := {\mathcal U}^F$. The connectedness of ${\bf C}_{\mathcal G}(u)$ implies by the Lang-Steinberg theorem that $u,u' \in u^{\mathcal G} \cap U$ are $G$-conjugate. Replacing $u$ by $u'$, we may assume that $u \in u^{\mathcal G} \cap U$. Then, again applying the Lang-Steinberg theorem, we see that any element $w \in u^{\mathcal G} \cap U$ can be written as $huh^{-1}$ for some $h \in P := {\mathcal P}^F$. Conversely, the $P$-orbit of $u$ is contained in $u^{\mathcal G} \cap U$. Thus $u^{\mathcal G} \cap U$ is a single $P$-orbit, and so $$|u^{\mathcal G} \cap U| = [P:C],$$ where $C := {\bf C}_P(u) = {\bf C}_{\mathcal P}(u)^F = {\bf C}_{\mathcal G}(u)^F$. The structure of ${\bf C}_{\mathcal G}(u)$ is given in \cite[Theorem 3.1]{LS}. As $\dim{\bf C}_{\mathcal G}(u) = \dim{\mathcal P}-\dim{\mathcal U}$, there is a constant $A(n)$ depending only on $n$ such that \begin{equation}\label{for-u} |u^{\mathcal G} \cap U| \geq \frac{2}{3}|U| \end{equation} for all $q \geq A(n)$ and all $\lambda \vdash n$. By taking $g(n)$ large enough, say \begin{equation}\label{for-g} g(n) \geq \max_{q'= p^r < A(n)} \left\{ \frac{|\psi(w)|}{\psi(1)^{\frac{n-2}{n-1}}} \mid 1 \neq w \in GL_n(q'),~w \mbox{ unipotent},~\psi \in {\mathrm {IBr}}_\ell(GL_n(q')) \right\}, \end{equation} we may assume that the condition $q \geq A(n)$ is indeed satisfied. Let $1 \neq v \in U \smallsetminus u^{\mathcal G}$ be labeled by $\nu \vdash n$. Then $$v \in {\mathcal U} = \overline{u^{\mathcal G} \cap {\mathcal U}},$$ and so $v^{\mathcal G} \leq u^{\mathcal G}$. In particular, if $u^{\mathcal G}$ is minimal with respect to $\leq$, then no such $v$ exists. If $u^{\mathcal G}$ is not minimal, then by the induction hypothesis applied to $v^{\mathcal G}$ we have \begin{equation}\label{for-v} |\varphi(v)| \leq g_\nu(n) \cdot \varphi(1)^{\frac{n-2}{n-1}} \end{equation} for some positive constant $g_\nu(n)$ depending only on $\nu$. We will let $g'_\lambda(n)$ be the largest among all $g_\nu(n)$ when $\nu$ runs over the partitions for all such $v$. Let $\rho := \tw* R^G_L(\varphi)$, where $L$ is a Levi subgroup of $P$. Then $$ \rho(1) = [\varphi_U,1_U]_U = \frac{1}{|U|}\left( \varphi(1) + \sum_{1 \neq v \in U \smallsetminus u^{\mathcal G}}\varphi(v) + \sum_{w \in u^{\mathcal G} \cap U}\varphi(w)\right),$$ and so $$|u^{\mathcal G} \cap U|\cdot|\varphi(u)| \leq |U|\rho(1) + \sum_{1 \neq v \in U \smallsetminus u^{\mathcal G}}|\varphi(v)| + \varphi(1).$$ It now follows from \eqref{for-u} and \eqref{for-v} that $$|\varphi(u)| \leq \frac{3}{2}\rho(1) + \frac{1}{2}g'_\lambda(n)\varphi(1)^{\frac{n-2}{n-1}} + \frac{3}{2|U|}\varphi(1).$$ The proof of Theorem \ref{main1b} and the bound $\alpha \le \frac{n-2}{n-1}$ in Proposition \ref{gengl} imply that $$\rho(1) \leq h(n)\varphi(1)^{\frac{n-2}{n-1}}.$$ On the other hand, $|U| \geq q^{n-1}$ and $\varphi(1) < q^{n^2/2}$, whence for $n \geq 4$ we have $$ \frac{\varphi(1)}{|U|} < \varphi(1)^{\frac{n-2}{n-1}}.$$ The same conclusion holds for $n = 3$ since $\varphi(1) < q^4$ in this case. Hence the statement follows for $u$ by taking $$g_\lambda(n) := \frac{3}{2}h(n) + \frac{1}{2}g'_\lambda(n) + \frac{3}{2}.$$ \hal \subsection{Special linear groups} \begin{prop}\label{gl-sl} Let $n\geq 3$ and let $\mathbb F$ be an algebraically closed field of characteristic $\ell$, where either $\ell = 0$ or $\ell \nmid q$. Let $V$ be an irreducible $\mathbb F GL_n(q)$-module which is reducible over $SL_n(q)$. Then one of the following holds: \begin{enumerate}[\rm(i)] \item $\dim(V) > q^{(n^{2}+n)/4}(q-1)$. \item $n = 3$ and $\dim(V) \geq (q-1)(q^2-1)$. \item $n = 4$ and $\dim(V) \geq (q-1)(q^{2}-1)(q^{3}-1)$. \item $2|n$, and $\dim(V) = \prod^{n/2}_{j=1}(q^{2j-1}-1)$ or $\prod^{n/2}_{j=1}(q^{n/2+j}-1)/(q^j-1)$. Furthermore, $V$ is as described in {\rm \cite[Proposition 5.10(ii), (iii)]{KT}}, and $V_{SL_n(q)}$ is a sum of two irreducible constituents. \end{enumerate} \end{prop} \noindent {\bf Proof $\;$ } Repeat the same proof of \cite[Proposition 5.10]{KT}, but for all $n$. \hal \subsection{Proof of Theorem \ref{main1c}} (i) In this proof, let $G := GL_n(q) = {\mathcal G}^F$ in the notation of \S2, and let $S := [G,G]$. Write $g = su = us$ with $s \in G$ semisimple and $u \in G$ unipotent. By Theorem \ref{main1b} and Proposition \ref{gengl}, we may assume that there is no split Levi subgroup ${\mathcal L}$ of ${\mathcal G}$ such that ${\bf C}_G(s) \leq {\mathcal L}^F$, equivalently, ${\bf C}_G(s) \cong GL_{n/k}(q^k)$ for some $k|n$. For a fixed $n$, by choosing $h(n)$ large enough (similarly to the choice \eqref{for-g} of $g(n)$), we may assume that $q \geq 227$. Hence, we are done by Theorems \ref{gl-ext} (when $k > 1$) and \ref{gl-uni} (when $k = 1$) if $H = G$. From now on we will assume that $H = S$, and let $\tilde\chi \in {\mathrm {Irr}}(G)$ be lying above $\chi$. Applying the result for $G$, we are done if $\chi=\tilde\chi|_S$. Hence, we may assume that $\tilde\chi|_S$ is reducible, and so either \begin{equation}\label{sl-1} \chi(1) \geq \tilde\chi(1)/[G:S] > q^{(n^2+n)/4} \end{equation} or case (iv) of Proposition \ref{gl-sl} holds for a $\mathbb C G$-module $V$ affording $\tilde\chi$. Since $$\frac{1}{2}\prod^{n/2}_{j=1}(q^{2j-1}-1) > q^{n^2/4}(1-\sum^{n/2}_{j=1}q^{1-2j})/2 > q^{(n^2-1)/4}$$ when $2|n$ and $q \geq 227$, we now have that \begin{equation}\label{sl-2} \chi(1) > q^{(n^2-1)/4}. \end{equation} Assume in addition that $g^S = g^G$. By Clifford's theorem we may write $\tilde\chi|_S = \sum^{t}_{i=1}\chi^{x_i}$ for some elements $x_i \in G$. Since $g^S=g^G$, $g^{x_i}$ is $S$-conjugate to $g$ and so $\chi^{x_i}(g) = \chi(g)$. It follows that $$|\chi(g)|/\chi(1) = |\sum^t_{i=1}\chi^{x_i}(g)|/t\chi(1) = |\tilde\chi(g)|/\tilde\chi(1),$$ and so we are done again. So we may assume that $g^S \neq g^G$. \smallskip (ii) Here we consider the case $k > 1$, and recall that $u$ is a unipotent element in ${\bf C}_G(s) = GL_{n/k}(q^k)$. Note that $\det_{\mathbb F_{q^k}}$ maps ${\bf C}_G(s)$ onto $\mathbb F^\times_{q^k}$, and the norm map $\mathbb F^\times_{q^k} \to \mathbb F_q^\times$ is surjective. It follows that $s^G = s^S$. Hence, our assumption $g^G \neq g^S$ implies that $u \neq 1$. It is well known that the centralizer of any non-central element in $GL_m(q)$ has order at most $q^{m^2-2m+2}$. It follows that $$|{\bf C}_G(g)| = |{\bf C}_{{\bf C}_G(s)}(u)| \leq q^{n^2/k-2n+2k} \leq q^{n^2/2-2n+4},$$ whence $|\chi(g)| \leq |{\bf C}_G(g)|^{1/2} \leq q^{n^2/4-n+2}$. Together with \eqref{sl-2}, this implies $$|\chi(g)| < \chi(1)^{1-1/2n}.$$ \smallskip (iii) Now we consider the case $k = 1$, i.e. $s \in {\bf Z}(G)$, and prove the stronger bound that \begin{equation}\label{bound-unip} |\chi(g)| \leq h(n)\chi(1)^{\frac{n-2}{n-1}}. \end{equation} Without loss of generality we may assume that $g=u$. Let $r_i$ denote the number of Jordan blocks of size $i$ in the Jordan canonical form of $u$ for each $i \geq 1$; in particular, $\sum_i ir_i = n$. It is easy to see that $g^G = g^S$ if $\gcd(i \mid r_i\geq 1) = 1$. So the assumption $g^G \neq g^S$ implies \begin{equation}\label{sl-3} \gcd(i \mid r_i \geq 1) > 1, \end{equation} in particular, $r_1 = 0$. We claim (for $n \geq 5$) that either \begin{equation}\label{sl-4} |{\bf C}_G(g)| \leq q^{(n^2-3n+6)/2} \end{equation} or $g$ has type $J_2^{n/2}$ (i.e. $r_2 = n/2$). Indeed, by \cite[Theorem 3.1]{LS} we have that $|{\bf C}_G(g)| < q^N$, where \begin{equation}\label{for-N} N := \sum_i ir_i^2 + 2\sum_{i < j}ir_ir_j. \end{equation} Now, if $r_2 = 0$, then $3N \leq (\sum_i ir_i)^2 = n^2$ and so \eqref{sl-4} holds for $n \geq 6$. If $r_2 = 0$ and $n = 5$, then \eqref{sl-3} implies that $r_5 = 1$, again yielding \eqref{sl-4}. Suppose now that $n/2 > r:= r_2 > 0$, whence $r_3 = 0$ by \eqref{sl-3} and $n-2r = t:= \sum_{j \geq 4}jr_j \geq 4$. Then $$N = 2r^2 + 4r\sum_{j \geq 4} r_j + \sum_{j \geq 4}jr_j^2 + 2 \sum_{4 \leq j < j'}jr_jr_{j'} \leq 2r^2 + rt + t^2/4 \leq (n^2-4n+8)/2.$$ In the case of \eqref{sl-4}, $|\chi(g)| \leq q^{(n^2-3n+6)/4}$ and so \eqref{bound-unip} holds because of \eqref{sl-2}. It remains to consider the case $g = J_2^{n/2}$. Let $W = \mathbb F_q^n = \langle e_1, \ldots ,e_n \rangle_{\mathbb F_q}$ denote the natural module for $G$, with $g(e_1) = e_1$. Here, $|{\bf C}_G(g)| < q^{n^2/2}$ by \eqref{for-N}, whence \begin{equation}\label{sl-5} |\chi(g)| \leq q^{n^2/4}. \end{equation} Suppose first that \begin{equation}\label{sl-6} \chi(1) > q^{(n-1)(n-2)/2}. \end{equation} If $n \geq 8$, then \eqref{sl-5} and \eqref{sl-6} immediately imply \eqref{bound-unip}. In the remaining case we have $n=6$. An application of Clifford's theorem to the normal subgroup $SL_6(q){\bf Z}(GL_6(q))$ of $GL_6(q)$ yields $2 \leq \tilde\chi(1)/\chi(1) \leq 6$. In particular, in the case of Proposition \ref{gl-sl}(iv) we have $$\chi(1) \leq \frac{(q^4-1)(q^5-1)(q^6-1)}{2(q-1)(q^2-1)(q^3-1)} < q^{10},$$ contrary to \eqref{sl-6}. Thus Proposition \ref{gl-sl}(i) must hold, whence $$\chi(1) \geq \frac{1}{6}q^{21/2}(q-1) \geq q^{45/4}$$ (for $q \geq 1301$, which can be guaranteed by taking $h(6)$ large enough). The latter, together with \eqref{sl-5}, implies \eqref{bound-unip}. It remains to consider the case where \eqref{sl-6} does not hold. Let $\chi$ be afforded by a $\mathbb C S$-module $V$ and let $P := Stab_S(\langle e_1 \rangle_{\mathbb F_q}) = UL$. We decompose the $P$-module $V$ as ${\bf C}_V(U) \oplus [U,V]$ and let $\gamma$, respectively $\delta$, denote the $P$-character of ${\bf C}_V(U)$, respectively of $[U,V]$. In particular, $\gamma = \tw* R^S_L(\chi)$, and so, arguing as in part (ii) of the proof of Theorem \ref{main1b} we get \begin{equation}\label{sl-7} |\gamma(g)| \leq \gamma(1) \leq f(n)\chi(1)^{\frac{n-2}{n-1}} \end{equation} (for some function $f:\mathbb N \to \mathbb N$). Next, we decompose $$[U,V] = \sum_{1_U \neq \lambda \in {\mathrm {Irr}}(U)}V_\lambda,$$ as a direct sum of $U$-eigenspaces, which are transitively permuted by $L \cong GL_{n-1}(q)$. Note that $g$ has prime order $p|q$, and it acts on ${\mathrm {Irr}}(U) \smallsetminus \{1_U \}$ with exactly $q^{n/2}-1$ fixed points. Certainly, the trace of $g$ in its action on $\sum_{\lambda \in {\mathcal O}}V_\lambda$ for any nontrivial $g$-orbit ${\mathcal O}$ on ${\mathrm {Irr}}(U) \smallsetminus \{1_U \}$ is zero. Since $\chi(1) \leq q^{(n-1)(n-2)/2}$, we have that $$|\delta(g)| \leq (q^{n/2}-1)\dim(V_\lambda) = (q^{n/2}-1) \cdot \frac{\dim([U,V])}{q^{n-1}-1} < \frac{\chi(1)}{q^{n/2-1}} \leq \chi(1)^{\frac{n-2}{n-1}}.$$ Together with \eqref{sl-7}, this completes the proof. \hal The above proof yields the following analogue of Theorem \ref{gl-uni}: \begin{cor}\label{sl-uni} Let $S := SL_n(q) \leq G:= GL_n(q)$, and let $u \in G$ be any nontrivial unipotent element. Assume that either $\ell = 0$, or $\ell \nmid q$ and $u^G = u^S$. Then for any $\varphi \in {\mathrm {IBr}}_\ell(S)$, $$|\varphi(u)| \leq g(n) \cdot \varphi(1)^{\frac{n-2}{n-1}}.$$ \end{cor} \begin{rem} {\em For any $\varepsilon > 0$, it seems possible to improve the term $q^{n/3}$ in Theorem \ref{gl-ext} to $q^{n/(2+\varepsilon)}$ at the price of using much bigger $f(n)$, as well as a much bigger lower bound on $q$. As a consequence, one could perhaps improve the exponent $1-1/2n$ in Theorem \ref{main1c} to $1-1/((1+\varepsilon) n)$. But we did not try to pursue it.} \end{rem} \section{Bounds for the constant $\alpha({\mathcal L})$: Proof of Theorems~\ref{ratio}, \ref{alphaexcep} and \ref{GL}} For the proof of Theorem \ref{ratio}, it is convenient to handle the classical types $SL$, $Sp$ and $SO$ separately. As in the theorem, let ${\mathbb K}$ be an algebraically closed field of good characteristic. Note that by the defnition of $\alpha({\mathcal L})$, this value does not depend on the isogeny type of ${\mathcal G}$. \subsection{Case ${\mathcal G} = GL_n({\mathbb K})$ or $SL_n({\mathbb K})$} To prove Theorem \ref{ratio} in this case we use the following lemma, which transfers attention from unipotent to semisimple elements in the analysis of $\alpha({\mathcal L})$. Denote by $J_i$ a unipotent $i\times i$ Jordan block matrix, and by $\sum_i J_i^{n_i}$ the matrix in $SL_n({\mathbb K})$ with $n_i$ diagonal blocks $J_i$ for each $i$, where $n = \sum in_i$. \begin{lem}\label{uss} Let $u = \sum_iJ_i^{n_i}$ be a unipotent element of $GL_n({\mathbb K})$ where $n = \sum in_i$. Let $\lambda_j~(j\in \mathbb N)$ be distinct scalars in ${\mathbb K}^\times$, and for each $i$ let $D_i = {\rm diag}(\lambda_1,\lambda_2,\ldots ,\lambda_i)$. Define \[ s := \sum_i D_i^{n_i} \in GL_n({\mathbb K}). \] Then $\dim {\bf C}_{GL_n({\mathbb K})}(u) = \dim {\bf C}_{GL_n({\mathbb K})}(s)$. \end{lem} \noindent {\bf Proof $\;$ } Observe that \[ \begin{array}{ll} \dim {\bf C}_{GL_n({\mathbb K})}(s) & = \left(\sum_{i\ge 1} n_i\right)^2 + \left(\sum_{i\ge 2} n_i\right)^2 + \cdots \\ & = \sum_i in_i^2 + 2\sum_{i<j}in_in_j \end{array} \] which is equal to $\dim {\bf C}_{GL_n({\mathbb K})}(u)$ by \cite[3.1]{LS}. \hal \vspace{4mm} For a subgroup $X$ of $GL_n({\mathbb K})$, define $X_{\mathrm {ss}} $ to be the set of semisimple elements of $X$. \begin{cor}\label{sscomp} If $n \geq 2$ and ${\mathcal L}$ is a Levi subgroup of ${\mathcal G} = GL_n({\mathbb K})$ or $SL_n({\mathbb K})$, then \[ \alpha({\mathcal L}) \leq \hbox{{\rm {max}}}_{s \in {\mathcal L}_{\mathrm {ss}} \smallsetminus {\bf Z}({\mathcal G})} \frac{\dim s^{{\mathcal L}}}{\dim s^{{\mathcal G}}}. \] \end{cor} \noindent {\bf Proof $\;$ } We have ${\mathcal L} = {\mathcal G} \cap \prod_{j=1}^rGL_{a_j}({\mathbb K})$, where $\sum_{j=1}^r a_j=n$. Let $u \in {\mathcal L}_{\mathrm {unip}}$, so that \[ u = \sum_{j=1}^r \sum_iJ_i^{n_{ij}}, \] where $\sum_i in_{ij} = a_j$. The condition $u \neq 1$ means that there are some $i \geq 2$ and $j \geq 1$ such that $n_{ij} > 0$. If we define $s = \sum_{j=1}^r \sum_iD_i^{n_{ij}}$, where $D_i$ is as in the statement of Lemma \ref{uss} (and the scalars $\lambda_j$ are chosen so that $s$ has determinant 1 in the case where ${\mathcal G} = SL_n({\mathbb K})$), then $s \notin {\bf Z}({\mathcal G})$. Now Lemma \ref{uss} shows that $\dim {\bf C}_{{\mathcal L}}(u) = \dim {\bf C}_{{\mathcal L}}(s)$ and $\dim {\bf C}_{{\mathcal G}}(u) = \dim {\bf C}_{{\mathcal G}}(s)$. \hal \vspace{4mm} \noindent {\bf Proof of Theorem \ref{ratio} for $GL_n({\mathbb K})$, $SL_n({\mathbb K})$} \vspace{2mm} We prove the theorem for ${\mathcal G} = GL_n({\mathbb K})$ and point out the small adjustment needed for $SL_n({\mathbb K})$ at the end of the proof. Let ${\mathcal L}$ be a Levi subgroup of ${\mathcal G}$. Adopting an obvious notational convention we take \[ {\mathcal L} = GL_a({\mathbb K}) \times GL_b({\mathbb K}) \times \cdots \times GL_z({\mathbb K}). \] Write $V_n = V_a \oplus V_b \oplus \cdots \oplus V_z$ for the corresponding direct sum decomposition of $V_n = {\mathbb K}^n$. In view of Corollary \ref{sscomp}, it suffices to prove that \begin{equation}\label{ineqa} \hbox{max}_{s \in {\mathcal L}_{\mathrm {ss}} \smallsetminus {\bf Z}({\mathcal G})} \frac{\dim s^{{\mathcal L}}}{\dim s^{{\mathcal G}}} \le \frac{1}{2}\left(1+ \frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right). \end{equation} Let $s$ be a semisimple element of ${\mathcal L}$, and let $\lambda_1,\ldots ,\lambda_k$ be the distinct eigenvalues of $s$ on $V_n$. Write \[ s|_{V_a} = \hbox{diag}\,(\lambda_1^{(a_1)},\ldots ,\lambda_k^{(a_k)}), \ldots ,s|_{V_z} = \hbox{diag}\,(\lambda_1^{(z_1)},\ldots ,\lambda_k^{(z_k)}), \] where $\sum_{i=1}^k a_i = a$, and so on (superscripts denote multiplicities). Then \[ {\bf C}_{\mathcal G}(s) = GL_{a_1+b_1+\ldots }({\mathbb K}) \times \cdots \times GL_{a_k+b_k+\ldots }({\mathbb K}), \] \[ {\bf C}_{\mathcal L}(s) = \prod_{i=1}^k GL_{a_i}({\mathbb K}) \times \prod_{i=1}^k GL_{b_i}({\mathbb K}) \times \cdots . \] To prove (\ref{ineqa}) we need to show \begin{equation}\label{try} {1\over 2}{{\dim {\mathcal G} - \dim {\mathcal L}} \over {\dim {\mathcal G}}} \le {{\dim s^{\mathcal G} - \dim s^{\mathcal L}} \over {\dim s^{\mathcal G}}}. \end{equation} Now \[ {1\over 2}{{\dim {\mathcal G} - \dim {\mathcal L}} \over {\dim {\mathcal G}}} = {{ab+ac+bc+\ldots } \over {(a+b+\ldots )^2}}, \] while \[ {{\dim s^{\mathcal G} - \dim s^{\mathcal L}} \over {\dim s^{\mathcal G}}} = {{\sum_{i\ne j} (a_ib_j+a_ic_j+b_ic_j+\ldots )} \over {\sum_{i<j} (a_i+b_i+\cdots )(a_j+b_j+\cdots )}}. \] Hence (\ref{try}) is equivalent to the inequality \begin{equation}\label{ineqb} \begin{array}{l} \left(\sum a_i\sum b_i + \sum a_i \sum c_i + \sum b_i \sum c_i + \cdots\right) \cdot \left(\sum_{i<j} (a_i+b_i+\cdots )(a_j+b_j+\cdots )\right) \\ \le \left(\sum a_i + \sum b_i + \cdots \right)^2 \cdot \sum_{i\ne j} (a_ib_j + a_ic_j + b_ic_j+ \cdots ). \end{array} \end{equation} Now observe that all the terms on the left hand side of this inequality appear with at most the same multiplicity on the right hand side. Hence (\ref{ineqb}) holds, and the proof is complete for ${\mathcal G} = GL_n({\mathbb K})$. For the case where ${\mathcal G} = SL_n({\mathbb K})$, we need to prove the inequality (\ref{ineqb}) with the first term on the right hand side replaced by $\left(\sum a_i + \sum b_i + \cdots \right)^2-1$. This remains true, since the terms on the right hand side but not the left hand side of (\ref{ineqb}) include $\sum_{i\ne j} (a_i^3b_j + a_i^3c_j + b_i^3c_j+ \cdots )$, which is at least $\sum_{i\ne j} (a_ib_j + a_ic_j + b_ic_j+ \cdots ) \geq 1$. \hal \vspace{4mm} We also deduce the following general bound, which was used in the proof of Theorem \ref{gl-uni} and also in Example \ref{sharpness}. \begin{prop}\label{gengl} If ${\mathcal L}$ is a Levi subgroup of ${\mathcal G} = GL_n({\mathbb K})$, then $\alpha({\mathcal L}) \le \frac{n-2}{n-1}$, with equality if and only if ${\mathcal L} = GL_{n-1}({\mathbb K}) \times GL_1({\mathbb K})$. \end{prop} \noindent {\bf Proof $\;$ } Choose maximal $a\le \frac{n}{2}$ such that ${\mathcal L} \le GL_a({\mathbb K})\times GL_{n-a}({\mathbb K})$. By Theorem \ref{ratio} for $GL_n({\mathbb K})$, proved above, we have \[ \alpha({\mathcal L}) \le \frac{1}{2}\left(1+\frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right) \le \frac{1}{2}\left( 1+\frac{a^2+(n-a)^2}{n^2}\right). \] One checks that the right hand side is less than $\frac{n-2}{n-1}$ for $n\ge 2a$, except in the following cases: \begin{itemize} \item[(a)] $a=1$, in which case ${\mathcal L} = GL_1({\mathbb K})\times GL_{n-1}({\mathbb K})$ (by the maximal choice of $a$); \item[(b)] $a=2$, $n\le 5$. \end{itemize} In case (b) we compute the values of $\alpha({\mathcal L})$ and find that $\alpha({\mathcal L}) \le \frac{1}{2} < \frac{n-2}{n-1}$ (note that $n \ge 2a = 4$ in this case). Hence it remains to consider case (a). We claim that in this case, $\alpha({\mathcal L}) = \frac{n-2}{n-1}$. Let $u$ be a nontrivial unipotent element of ${\mathcal L}$, and write $u = \sum J_i^{n_i}$, where $\sum in_i = n$. Then $u$ projects to the element $J_1^{n_1-1}+\sum_{i\ge 2}J_i^{n_i}$ in the factor $GL_{n-1}({\mathbb K})$ of ${\mathcal L}$, so by \cite[3.1]{LS}, we have \[ \begin{array}{l} \dim {\bf C}_{{\mathcal G}}(u) = \sum in_i^2 + 2\sum_{i<j}in_in_j, \\ \dim {\bf C}_{{\mathcal L}}(u) = 1+(n_1-1)^2 + \sum_{i\ge 2} in_i^2 + 2(n_1-1)\sum_{j\ge 2}n_j + 2\sum_{2\le i<j}in_in_j. \end{array} \] Defining $s:= \dim [V,u] = n-\sum n_i$, it follows that \[ (\dim {\mathcal G} - \dim {\mathcal L})-(\dim {\bf C}_{\mathcal G} (u)-\dim {\bf C}_{\mathcal L} (u)) = 2s. \] Next observe that \[ \begin{array}{ll} \frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}} \le \frac{n-2}{n-1}& \Leftrightarrow (n-1)\left((\dim {\mathcal G} - \dim {\mathcal L})-(\dim {\bf C}_{\mathcal G} (u)-\dim {\bf C}_{\mathcal L} (u))\right) \ge \dim u^{\mathcal G} \\ & \Leftrightarrow 2(n-1)s \ge \dim u^{\mathcal G}. \end{array} \] By \cite[3.4(i)]{lish99} and its proof, we have $\dim u^{\mathcal G} \le s(2n-s)$, so the above inequality holds when $s \ge 2$. Finally, when $s=1$ we have $u = J_2+J_1^{n-2}$, and we calculate that $\frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}} = \frac{n-2}{n-1}$. Hence $\alpha({\mathcal L}) = \frac{n-2}{n-1}$ in case (1), and the proof is complete. \hal \subsection{Symplectic groups} Now we prove Theorem \ref{ratio} for symplectic groups. We revert to Lie-theoretic notation, so assume that \[ {\mathcal G} = C_n = Sp_{2n}({\mathbb K}) = Sp(V), \] where $V = V_{2n}(K)$ is the natural module for ${\mathcal G}$ and $n\ge 2$. Let ${\mathcal L}$ be a Levi subgroup of ${\mathcal G}$, so that ${\mathcal L}' = C_{n-r}\times \prod A_{r_i} \le C_{n-r} \times A_{r-1} $, where $1\le r\le n$. The first lemma deals with the case where $r=n$. \begin{lem}\label{firstcn} If ${\mathcal L} \le A_{n-1}T_1$, then $\alpha({\mathcal L}) \le \frac{1}{2}$. \end{lem} \noindent {\bf Proof $\;$ } Assume ${\mathcal L} \le A_{n-1}T_1 = GL_n$, and let $u$ be a nontrivial unipotent element of ${\mathcal L}$. Write $u = \sum J_i^{n_i} \in SL_n$, where $\sum in_i = n$. As an element of $G = Sp_{2n}$, $u$ has Jordan form $\sum J_i^{2n_i}$. Hence by \cite[3.1]{LS}, \[ \begin{array}{l} \dim {\bf C}_{GL_n}(u) = \sum in_i^2+2\sum_{i<j}in_in_j := c_u, \\ \dim {\bf C}_{{\mathcal G}}(u) = 2\sum in_i^2+4\sum_{i<j}in_in_j + \sum_{i\;odd}n_i. \end{array} \] So $\dim {\bf C}_{{\mathcal G}}(u) = 2c_u + s_u$, where $s_u = \sum_{i\;odd}n_i$. It follows that \[ \frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}} \le \frac{\dim u^{GL_n}}{\dim u^{\mathcal G}}\le \frac{n^2-c_u}{2n^2+n-2c_u-s_u} \le \frac{1}{2}, \] and the conclusion follows. \hal \begin{lem}\label{secondcn} If ${\mathcal L} = C_{n-r}T_r$, then $\alpha({\mathcal L}) \le \frac{1}{2}\left( 1+ \frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right)$. \end{lem} \noindent {\bf Proof $\;$ } Let $u$ be a nontrivial unipotent element of ${\mathcal L}' = C_{n-r} = Sp_{2n-2r}$, and write $u = \sum J_i^{n_i}$ with $\sum in_i = 2n-2r$. In $G = Sp_{2n}$, $u$ has Jordan form $J_1^{n_1+2r}+\sum_{i\ge 2}J_i^{n_i}$. Using \cite[3.1]{LS}, we find that \begin{equation}\label{diff} \dim {\bf C}_{{\mathcal L}}(u) - \dim {\bf C}_{{\mathcal G}}(u) = 2r\sum n_i + 2r^2. \end{equation} As in \cite[p.509]{lish99}, define \[ s : = \dim [V,u] = 2n-2r - \sum n_i. \] Then (\ref{diff}) implies that $\dim u^{\mathcal G} - \dim u^{\mathcal L} = 2rs$. It also follows from \cite[3.4]{lish99} and its proof that \begin{equation}\label{99res} \dim u^{\mathcal G} \le \frac{1}{2}s(4n-s+1). \end{equation} Now observe that \[ \begin{array}{ll} \frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}} \le \frac{1}{2}\left( 1+ \frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right) & \Leftrightarrow \dim u^{\mathcal G} \le \frac{2\dim {\mathcal G} ( \dim u^{\mathcal G} - u^{\mathcal L})}{\dim {\mathcal G} - \dim {\mathcal L}} \\ & \Leftrightarrow \dim u^{\mathcal G} \le \frac{2s(2n^2+n)}{2n-r}. \end{array} \] Clearly (\ref{99res}) implies that the last inequality holds, and so we are done. \hal \begin{lem}\label{thirdcn} Suppose ${\mathcal L}' \le C_{n-r}\times A_{r-1} \le C_{n-r}\times C_r < {\mathcal G}$ with $r>1$, and let $u = u_1u_2 \in {\mathcal L}$ be a unipotent element with $u_1 \in C_{n-r}$, $u_2 \in A_{r-1} < C_r$. Then \[ \dim u^{\mathcal G} \ge \dim u_1^{\mathcal G} + \dim u_2^{C_r}. \] \end{lem} \noindent {\bf Proof $\;$ } Let $u_1 = \sum J_i^{a_i} \in C_{n-r}$ and $u_2 = \sum J_i^{b_i} \in A_{r-1}$, where $\sum ia_i = 2n-2r$, $\sum ib_i = r$. Then \[ \begin{array}{l} u_1 = J_1^{a_1+2r} + \sum_{i\ge 2}J_i^{a_i} \in {\mathcal G} = Sp_{2n}, \\ u_2 = \sum J_i^{2b_i} \in C_r, \hbox{ and }\\ u = \sum J_i^{a_i+2b_i} \in {\mathcal G}. \end{array} \] Now using \cite[3.1]{LS}, we compute that \[ \begin{array}{ll} & \dim {\bf C}_{\mathcal G}(u_1)+\dim {\bf C}_{C_r}(u_2)-\dim {\bf C}_{\mathcal G}(u) \\ = & 2r^2+r+2r\sum a_i - 2\sum ia_ib_i -2\sum_{i<j}i(a_ib_j+a_jb_i) \\ = & 2r^2+r + 2\left((\sum a_i)(\sum ib_i) - \sum ia_ib_i -\sum_{i<j}i(a_ib_j+a_jb_i)\right) \\ \ge & 2r^2+r \\ = & \dim C_r, \end{array} \] and the result follows. \hal \vspace{4mm} \noindent {\bf Proof of Theorem \ref{ratio} for ${\mathcal G} = C_n$} \vspace{2mm} Let ${\mathcal L}$ be a Levi subgroup of ${\mathcal G}$, so ${\mathcal L}' = C_{n-r}\times \prod A_{r_i} \le C_{n-r} \times A_{r-1} \le C_{n-r} \times C_r$, where $1\le r\le n$. Let $u = u_1u_2$ be a nontrivial unipotent element of ${\mathcal L}$, where $u_1 \in C_{n-r}$, $u_2 \in A_{r-1}$. Using Lemma \ref{thirdcn}, we have \begin{equation}\label{finalcn} \frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}} \le \frac{\dim u_1^{C_{n-r}} + \dim u_2^{A_{r-1}}}{\dim u_1^{\mathcal G} + \dim u_2^{C_r}}. \end{equation} Also Lemmas \ref{firstcn} and \ref{secondcn} imply that \[ \frac{\dim u^{A_{r-1}}}{\dim u^{C_r}} \le \frac{1}{2},\;\; \hbox{ and } \frac{\dim u^{C_{n-r}}}{\dim u^{\mathcal G}} \le \frac{1}{2}\left(1+ \frac{\dim C_{n-r}T_r}{\dim {\mathcal G}}\right). \] Hence (\ref{finalcn}) implies that \[ \frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}} \le \frac{1}{2}\left(1+ \frac{\dim C_{n-r}T_r}{\dim {\mathcal G}}\right) \le \frac{1}{2}\left(1+ \frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right). \] This completes the proof of Theorem \ref{ratio} for ${\mathcal G} = C_n$. \subsection{Orthogonal groups} We complete the proof of Theorem \ref{ratio} by handling the orthogonal groups. The proof for ${\mathcal G} = B_n = SO_{2n+1}({\mathbb K})$ is very similar to that for ${\mathcal G} = C_n$: one shows that Lemmas \ref{firstcn}--\ref{thirdcn} also hold in the $B_n$ case (with ${\mathcal L} = B_{n-r}T_r$ in Lemma \ref{secondcn} and ${\mathcal L}'\le B_{n-r}\times A_{r-1} \le B_{n-r}\times D_r$ in Lemma \ref{thirdcn}), and the theorem follows. Things are a little different in the $D_n$ case, so assume now that \[ {\mathcal G} = D_n = SO_{2n}({\mathbb K}) = SO(V) \;\;(n\ge 4). \] Let ${\mathcal L}$ be a Levi subgroup of ${\mathcal G}$. Then ${\mathcal L}' = D_{n-r} \times \prod A_{r_i} \le D_{n-r} \times A_{r-1}$, where $1 \le r \le n$ and $r \ne n-1$. \begin{lem}\label{firstdn} Suppose ${\mathcal L}' \le A_{n-1}$ and ${\mathcal L}'\ne A_{n-1}$. Then $\alpha({\mathcal L}) \le \frac{1}{2}$. \end{lem} \noindent {\bf Proof $\;$ } By assumption, ${\mathcal L} \le GL_a \times GL_b$ where $a+b = n$ and $a,b\ge 1$. Let $u = u_1u_2 \in {\mathcal L}$, where $u_1 = \sum J_i^{a_i} \in GL_a$ and $u_1 = \sum J_i^{b_i} \in GL_b$ (so $\sum ia_i = a$, $\sum ib_i = b$). Then $u = \sum J_i^{2a_i+2b_i} \in {\mathcal G}$. By \cite[3.1]{LS}, \[ \dim {\bf C}_{\mathcal L}(u) = \sum ia_i^2 + \sum ib_i^2 + 2\sum ia_ia_j + 2\sum ib_ib_j =: c_u, \] and \[ \begin{array}{ll} \dim {\bf C}_{\mathcal G}(u) & = 2\sum i(a_i+b_i)^2 + 4\sum_{i<j} i(a_i+b_i)(a_j+b_j) - \sum_{i\;odd}(a_i+b_i) \\ & = 2c_u + 4\sum ia_ib_i + 4\sum_{i<j}i(a_ib_j+a_jb_i) - \sum_{i\;odd}(a_i+b_i). \end{array} \] Then $\dim u^{\mathcal L} = a^2+b^2-c_u$, while \[ \dim u^{\mathcal G} = 2(a+b)^2-(a+b)-(2c_u + 4\sum ia_ib_i + 4\sum_{i<j}i(a_ib_j+a_jb_i) - \sum_{i\;odd}(a_i+b_i)). \] To prove the lemma we need to show that $\dim u^{\mathcal G} \ge 2(a^2+b^2-c_u)$. Using the equations $\sum ia_i = a$, $\sum ib_i = b$, this amounts to showing that \begin{equation}\label{ineqz} 4\sum (i^2-i)a_ib_i + 4\sum_{i<j}i(j-1)(a_ib_j+a_jb_i)+ \sum_{i\;odd}(a_i+b_i) \ge \sum ia_i+\sum jb_j. \end{equation} Consider a term $ka_k+lb_l$ on the right hand side, with $a_k,b_l \ne 0$. If $k=l=1$ this occurs in the sum $\sum_{i\;odd}(a_i+b_i)$; if $k=l\ge 2$ it is less then or equal to the term $4 (k^2-k)a_kb_k$ on the left hand side; and if $k<l$ or $l<k$, it is at most $4k(l-1)a_kb_l$ or $4l(k-1)a_kb_l$, respectively. Hence the inequality (\ref{ineqz}) holds, completing the proof of the lemma. \hal The proofs of the next two lemmas are very similar to those of Lemmas \ref{secondcn} and \ref{thirdcn}. \begin{lem}\label{seconddn} If ${\mathcal L} = D_{n-r}T_r$, then $\alpha({\mathcal L}) \le \frac{1}{2}\left( 1+ \frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right)$. \end{lem} \begin{lem}\label{thirddn} Suppose ${\mathcal L}' \le D_{n-r}\times A_{r-1} \le D_{n-r}\times D_r < {\mathcal G}$ with $r>1$, and let $u = u_1u_2 \in {\mathcal L}$ be a unipotent element with $u_1 \in D_{n-r}$, $u_2 \in A_{r-1} < D_r$. Then \[ \dim u^{\mathcal G} \ge \dim u_1^{\mathcal G} + \dim u_2^{D_r}. \] \end{lem} Let ${\mathcal L}' = D_{n-r} \times {\mathcal L}_1 \le D_{n-r} \times A_{r-1}$, where ${\mathcal L}_1 = \prod A_{r_i} \le A_{r-1}$. If either ${\mathcal L}_1 < A_{r-1}$ or $r=1$, then Theorem \ref{ratio} follows from Lemmas \ref{firstdn}--\ref{thirddn} just as in the argument following (\ref{finalcn}) for the case where ${\mathcal G} = C_n$. Hence it remains to handle the case where ${\mathcal L}' = D_{n-r} \times A_{r-1}$ with $2\le r \le n$, $r \ne n-1$. We deal with this case in the next two lemmas. \begin{lem}\label{fourthdn} Suppose ${\mathcal L}' = D_{n-r} \times A_{r-1}$ with $r\ge 3$. Then $\alpha({\mathcal L}) \le \frac{1}{2}\left(1+\frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right)$. \end{lem} \noindent {\bf Proof $\;$ } Let $u = u_1u_2$ be a unipotent element of ${\mathcal L}$, where $u_1 \in D_{n-r}$, $u_2 \in A_{r-1}< D_r$. We will show that \begin{equation}\label{ineqdn} \frac{\dim u_2^{A_{r-1}}}{\dim u_2^{D_r}} \le \frac{1}{2}\left(1+\frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right). \end{equation} Given this, the lemma follows, since by Lemma \ref{thirddn} we have \[ \frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}} \le \frac{\dim u_1^{D_{n-r}} + \dim u_2^{A_{r-1}}}{\dim u_1^{\mathcal G} + \dim u_2^{D_r}}, \] and this is at most $\frac{1}{2}\left(1+\frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right)$ by Lemma \ref{seconddn} and (\ref{ineqdn}). It remains to establish (\ref{ineqdn}). Let $u_2 = \sum J_i^{a_i} \in A_{r-1} = SL_r$, so that $u_2$ has Jordan form $\sum J_i^{2a_i}$ in $D_r$. Then \[ \begin{array}{l} \dim {\bf C}_{GL_r}(u_2) = \sum ia_i^2+2\sum_{i<j}ia_ia_j,\\ \dim {\bf C}_{D_r}(u_2) = 2\sum ia_i^2+4\sum_{i<j}ia_ia_j - \sum_{i\;odd}a_i. \end{array} \] Write $s_2 := \sum_{i\;odd}a_i$. Then $$\frac{\dim u_2^{A_{r-1}}}{\dim u_2^{D_r}} = \frac{1}{2}(1+\frac{r-s_2}{\dim u_2^{D_r}}),$$ so to prove (\ref{ineqdn}) it suffices to show \begin{equation}\label{ineqdn1} \frac{r-s_2}{\dim u_2^{D_r}} \le \frac{\dim {\mathcal L}}{\dim {\mathcal G}} = \frac{2(n-r)^2-(n-r)+r^2}{2n^2-n}. \end{equation} It is straightforward to see that the right hand side of (\ref{ineqdn1}) is at least $\frac{1}{3}$, so (\ref{ineqdn1}) holds if $\dim u_2^{D_r} \ge 3(r-s_2)$. The minimum value of $\dim u_2^{D_r}$ occurs when $u_2 = J_2+J_1^{r-2} \in SL_r$, in which case $\dim u_2^{D_r} = 4r-6$. This shows that (\ref{ineqdn1}) holds when $r\ge 6$. It remains to establish (\ref{ineqdn1}) for $r = 3,4,5$. For $r=5$, the possibilities for $u_2 \in SL_r$ are as follows: \[ \begin{array}{|c|c|c|c|c|c|c|} \hline \\[-13pt] u_2 \in SL_5 & J_2+J_1^3 & J_2^2+J_1 & J_3+J_1^2 & J_3+J_2 & J_4+J_1 & J_5 \\ \hline \\[-12pt] \dim u_2^{D_5} & 14 & 20 & 26 & 28 & 32 & 36 \\ \hline s_2 & 3 & 1 & 3 & 1 & 1 & 1 \\ \hline \end{array} \] For all these possibilities (\ref{ineqdn1}) holds. The arguments for $r=3,4$ are similar. \hal \begin{lem}\label{fifthdn} Suppose ${\mathcal L}' = D_{n-2} \times A_{1}$. Then $\alpha({\mathcal L}) \le \frac{1}{2}\left(1+\frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right)$. \end{lem} \noindent {\bf Proof $\;$ } Let $u = u_1u_2 \in {\mathcal L}$ with $u_1 = \sum J_i^{n_i} \in D_{n-2}$ (so $\sum in_i = 2n-4$) and $u_2 \in A_1$. If $u_2=1$ then the conclusion follows from Lemma \ref{seconddn}, so assume $u_2 \ne 1$. Then $\dim u_2^{A_1} = 2$ and $u = J_2^{n_2+2}+\sum_{i\ne 2}J_i^{n_i} \in {\mathcal G} = D_n$. By \cite[3.1]{LS}, \[ \begin{array}{l} \dim {\bf C}_{\mathcal L}(u) = \frac{1}{2}\sum in_i^2 + \sum_{i<j}in_in_j -\frac{1}{2}\sum_{i\;odd}n_i+2, \\ \dim {\bf C}_{\mathcal G}(u) = \frac{1}{2}\sum in_i^2 + \sum_{i<j}in_in_j -\frac{1}{2}\sum_{i\;odd}n_i +2n_1 + 4\sum_{i\ge 2}n_i+4. \end{array} \] Define $s := \dim [V,u] = 2n-\sum n_i-2$. Then \[ \dim u^{\mathcal G} - \dim u^{\mathcal L} = 4s+2n_1-8. \] Also \cite[3.4]{lish99} gives $\dim u^{\mathcal G} \le \frac{1}{2}s(4n-s+1)$. Hence we see that the desired inequality $ \frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}} \le \frac{1}{2}\left(1+\frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right)$ is equivalent to the following \begin{equation}\label{lastdn} \frac{1}{2}s(4n-s+1) \le \frac{(2n^2-n)(4s+2n_1-8)}{4n-7}. \end{equation} Now $2n-4 = \sum in_i \ge 2\sum_{i\ge 2}n_i$, and hence \[ s = 2n-2 - n_1 -\sum_{i\ge 2}n_i \ge 2n-2-n_1 -(n-2) = n-n_1. \] It follows that $4s+2n_1 \ge 2n+2s$, and hence (\ref{lastdn}) holds provided $$\frac{1}{2}s(4n-s+1) \le \frac{(2n^2-n)(2n+2s-8)}{4n-7},$$ which is true for all $s$ when $n\ge 5$. Finally, when $n=4$ the conclusion of the lemma is easily checked directly. This completes the proof. \hal \vspace{4mm} This completes the proof of Theorem \ref{ratio}. \subsection{Exceptional groups: Proof of Theorem \ref{alphaexcep}} Let ${\mathcal G}$ be a simple algebraic group of exceptional type in good characteristic. In principle one can check Theorem \ref{alphaexcep} by going through all possible Levi subgroups ${\mathcal L}$ of ${\mathcal G}$, in each case listing all the unipotent class representatives $u$ in ${\mathcal L}$ and using Theorem 3.1 and Tables 22.1.1--5 of \cite{LS} to write down the dimensions of $u^{\mathcal L}$ and $u^{\mathcal G}$. In fact, this is precisely what we do for the Levi subgroups listed in Table \ref{extab}, and for the remaining ones (labelled ``rest" in Table \ref{extab}) we need a short argument. We will give the proof of Theorem \ref{alphaexcep} just for ${\mathcal G} = E_7$ and leave the other entirely similar cases to the reader. First suppose that the Levi subgroup ${\mathcal L}$ is one of those listed for ${\mathcal G}=E_7$ in Table \ref{extab}. In each case we adopt the above procedure of listing unipotent representatives $u$ in ${\mathcal L}$ and calculating $\dim u^{\mathcal L}$ and $\dim u^{\mathcal G}$. We illustrate below with the case ${\mathcal L}' = D_6$, listing in the first row the Jordan form of $u$ on the 12-dimensional module for ${\mathcal L}'$ and in the second row the class of $u$ in ${\mathcal G}$ as in \cite[Table 22.1.2]{LS}: {\small \[ \begin{array}{|c|c|c|c|c|c|c|c|} \hline \\[-11pt] u \hbox{ in }D_6 & (2^2,1^8) & (3,1^9) & (2^4,1^4) & (2^6) & (2^6)' & (3,2^2,1^5) & (3,2^4,1)\\ u \hbox{ in }E_7 & A_1 & A_1^2 & A_1^2 & (A_1^3)^{(1)} & (A_1^3)^{(2)} & (A_1^3)^{(2)} & A_1^4 \\ \dim u^{\mathcal L} & 18 & 20 & 28 & 30 & 30 & 32 & 36 \\ \dim u^{\mathcal G} & 34 & 52 & 52 & 54 & 64 & 64 & 70 \\ \hline \end{array} \] \[ \begin{array}{|c|c|c|c|c|c|c|c|} \hline \\[-11pt] (3,2,1^6) & (3^2,2^2,1^2) & (3^3,1^3) & (3^4) & (4^2,1^4) & (5,1^7) & (4^2,2^2) & (4^2,2^2)' \\ A_2 & A_2A_1 & A_2A_1^2 & A_2^2 & A_3 & A_3 & (A_3A_1)^{(1)} & (A_3A_1)^{(2)} \\ 34 & 40 & 42 & 44 & 44 & 36 & 46 & 46 \\ 66 & 76 & 82 & 84 & 84 & 84 & 86 & 92 \\ \hline \end{array} \] \[ \begin{array}{|c|c|c|c|c|c|c|c|} \hline \\[-11pt] (5,2^2,1^3) & (4^2,3,1) & (5,3^2,1) & (5^2,1^2) & (6^2) & (6^2)' & (7,1^5) & (5,3,1^4) \\ (A_3A_1)^{(1)} & A_3A_1^2 & A_3A_2 & A_4 & (A_5)^{(1)} & (A_5)^{(2)} & D_4 & D_4(a_1) \\ 44 & 48 & 50 & 52 & 54 & 54 & 48 & 46 \\ 86 & 94 & 98 & 100 & 102 & 108 & 96 & 94 \\ \hline \end{array} \] \[ \begin{array}{|c|c|c|c|c|c|c|} \hline \\[-11pt] (7,2^2,1) & (5,3,2^2) & (9,1^3) & (7,3,1^2) & (11,1) & (9,3,) & (7,5) \\ D_4A_1 & D_4(a_1)A_1 & D_5 & D_5(a_1) & D_6 & D_6(a_1) & D_6(a_2) \\ 52 & 48 & 56 & 54 & 60 & 58 & 56 \\ 102 & 96 & 112 & 106 & 118 & 114 & 110 \\ \hline \end{array} \] } To compute the information in the tables, we list the possible Jordan forms for unipotent elements $u$ of $D_6$, and in each case find a Levi subgroup of $D_6$ in which $u$ is contained as a regular element; this Levi subgroup then gives the label of $u$ as an element of $E_7$ in Table 22.1.2 of \cite{LS}. For cases where all the Jordan blocks have even size -- namely the Jordan forms $(2^6)$, $(4^2,2^2)$ and $(6^2)$ -- there are two $D_6$-classes (see \cite[3.11]{LS}), and the corresponding $E_7$-classes can be worked out by computing the dimension of ${\bf C}_{L(E_7)}(u)$ using the restriction $L(E_7)\downarrow D_6$ (see \cite[11.8]{LS}), where $L(E_7)$ denotes the Lie algebraa of ${\mathcal G} = E_7$. Inspecting the tables above, we see that the maximum value of $\frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}}$ is equal to $\frac{30}{54}$, and is attained when $u$ has Jordan form $(2^6)$ in $D_6$ and is in the class $(A_1^3)^{(1)}$ of $E_7$. Hence for ${\mathcal L}'=D_6$ we have $\alpha({\mathcal L}) = \frac{5}{9}$, as in Table \ref{extab} of Theorem \ref{alphaexcep}. Now suppose ${\mathcal L}$ is not one of the Levi subgroups listed for ${\mathcal G}=E_7$ in Table \ref{extab} (i.e. ${\mathcal L}$ does not have a factor $E_6$, $D_r$ or $A_r$ ($r\ge 3$). Then $\dim {\mathcal L} \le \dim A_2A_2A_1T_2 = 21$. Let $u$ be a nontrivial unipotent element in ${\mathcal L}$, and assume for a contradiction that \[ \frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}} > \frac{1}{6}. \] Now $\dim u^{\mathcal L} \le \dim {\mathcal L}-7\le 14$, and hence $\dim u^{\mathcal G} < 84$. It then follows from Table 22.1.2 of \cite{LS} that $u$ is in one of the following $E_7$-classes : \[ A_1, A_1^2, (A_1^3)^{(1)}, (A_1^3)^{(2)}, A_1^4, A_2, A_2A_1, A_2A_1^2. \] For these classes the maximum possible value of $\dim u^{\mathcal L}$ occurs for ${\mathcal L}' = A_2A_2A_1$ or $A_1^4$, and is as follows:\\ {\small \[ \begin{array}{|c|c|c|c|c|c|c|c|c|} \hline \\[-11pt] u & A_1 & A_1^2 & (A_1^3)^{(1)} & (A_1^3)^{(2)} & A_1^4 & A_2 & A_2A_1 & A_2A_1^2 \\ \hline \\[-11pt] \hbox{ max dim }u^{\mathcal L}, & 4 & 8 & - & 10 & - & 6 & 10 & 12 \\ {\mathcal L}' = A_2A_2A_1 &&&&&&&& \\ \hline \\[-11pt] \hbox{ max dim }u^{\mathcal L},& 2 & 4 & 6 & 6 & 8 & - & -& - \\ {\mathcal L}' = A_1^4 &&&&&&&& \\ \hline \\[-11pt] \dim u^{\mathcal G} & 34 & 52 & 54 & 64 & 70 & 66 & 76 & 82 \\ \hline \end{array} \] } In all cases we see that $\frac{\dim u^{\mathcal L}}{\dim u^{\mathcal G}} < \frac{1}{6}$, which is a contradiction. This completes the proof of Theorem \ref{alphaexcep} for ${\mathcal G} = E_7$. \hal \subsection{Proof of Corollary \ref{keycor} and Theorem \ref{supp}} The proof of Corollary \ref{keycor} is immediate, since \[ 1-\frac{1}{2}\frac{\dim y^{{\mathcal G}}}{\dim {\mathcal G}} = \frac{1}{2}\left(1+ \frac{\dim {\bf C}_{\mathcal G}(y)}{\dim {\mathcal G}}\right) = \frac{1}{2}\left(1+ \frac{\dim {\mathcal L}}{\dim {\mathcal G}}\right), \] and the right hand side above is at least $\alpha({\mathcal L})$ by Theorems \ref{ratio} and \ref{alphaexcep}. \hal \medskip To prove Theorem \ref{supp}, note that $\chi(1) \geq q^r/3$ by \cite{LSe}. Also, ${\bf C}_G(g) \leq {\bf C}_G(y) = L$, so by Theorem \ref{main1} and the inequality $\alpha(L) \le 1-\frac{1}{2}\frac{\dim y^{{\mathcal G}}}{\dim {\mathcal G}}$ obtained above, we have $$|\chi(g)| \le f(r) \, \chi(1)^{1-\frac{1}{2}\frac{\dim y^{{\mathcal G}}}{\dim {\mathcal G}}}.$$ Hence it suffices to prove that $\gamma r \geq cs$, where $\gamma := (\dim y^{\mathcal G})/(2\dim {\mathcal G})$ and $s: = {\mathrm {supp}}(y)$. Define $a:=1$ if ${\mathcal G} = SL_n$ and $a:=1/2$ otherwise. Lemma 3.4 of \cite{lish99} relates the support of elements of prime order in $G$ with the size of their conjugacy class. The proof of this lemma only uses the fact that these elements are semisimple or unipotent. Since $y \in {\bf Z}(L)$ is semisimple, the lemma applies and shows in particular that $|y^G| \ge c' q^{ans}$, where $c' >0$ is an absolute constant. This implies that $\dim y^{\mathcal G} \ge ans$, and so \[ \gamma r \geq \frac{ans}{2\dim {\mathcal G}}r = \frac{anr}{2\dim {\mathcal G}}s = c s, \] as needed. \hal \medskip \subsection{Bounds for $GL_n$: proof of Theorem \ref{GL} and Corollary \ref{FL}} Let ${\mathbb K}$ an algebraically closed field of characteristic $p$, and let ${\mathcal L} = GL_{n_1}({\mathbb K}) \times \cdots \times GL_{n_m}({\mathbb K})$, so that the Levi subgroup $L$ in Theorem \ref{GL} can be viewed as ${\mathcal L}^F$ for a suitable Frobenius endomorphism $F$. Fix $n$ pairwise distinct elements $\lambda_1, \ldots,\lambda_n \in {\mathbb K}^\times$. The statements follow from Theorem \ref{main1} if $n_{i_0} = 1$, so we will assume that $n_{i_0} \geq 2$. Any unipotent element $u \in L$ can be written as ${\mathrm {diag}}(u_1, \ldots, u_m)$, where $u_i \in {\mathcal L}_i := GL_{n_i}({\mathbb K})$ is unipotent. Write $u_i = J_{b_{i1}} \oplus \ldots \oplus J_{b_{ir_i}}$ for a partition $\nu_i := (b_{i1} \geq b_{i2} \geq \ldots \geq b_{ir_i} \geq 1)$ of $n_i$, and define $$s_i := {\mathrm {diag}}(\lambda_1, \lambda_2,\ldots,\lambda_{b_{i1}},\lambda_1, \lambda_2,\ldots,\lambda_{b_{i2}}, \ldots, \lambda_1, \lambda_2,\ldots,\lambda_{b_{ir_i}}) \in {\mathcal L}_i$$ Note that if $a_{ij}$ is the multiplicity of $\lambda_j$ as an eigenvalue of $s_i$, then $(a_{i1} \geq a_{i2} \geq \ldots \geq a_{in} \geq 0)$ is the partition of $n_i$ conjugate to $\nu_i$. Now Lemma \ref{uss} shows that $$\dim u_i^{{\mathcal L}_i} = \dim s_i^{{\mathcal L}_i} = n_i^2 - \sum^n_{j=1}a_{ij}^2.$$ Similarly, setting $s := {\mathrm {diag}}(s_1, \ldots, s_m) \in {\mathcal L}$, we then get $$\dim u^{\mathcal G} = \dim s^{\mathcal G} = n^2 - \sum^n_{j=1}(\sum^m_{i=1}a_{ij})^2.$$ Note that $u \neq 1$ precisely when $\max_{1 \leq i \leq m}a_{i2} > 0$. Thus $\alpha(L) = \beta(n_1, \ldots, n_m)$. Now Theorem \ref{GL} follows immediately from Theorem \ref{main1} and Theorem \ref{GL2}(i) below, \smallskip Note by the Cauchy-Schwartz inequality that $(\sum_{i = 1}^m a_{ij})^2 \le m \sum_{i=1}^m a_{ij}^2$ for each $j$, with equality attained exactly when $a_{1j} = a_{2j} = \ldots = a_{mj}$. Setting $\Delta := \sum_{i, j} a_{ij}^2$, we have \begin{equation}\label{4.3} \beta(n_1, \ldots , n_m) \le \max_{\Delta} \frac{ (\sum_{i=1}^m n_i^2) - \Delta }{ n^2 - m\Delta}. \end{equation} Now suppose $n_i = n/m$ for $i = 1, \ldots , m$. Then $\sum_{i=1}^m n_i^2/n^2 = 1/m$, and so \eqref{4.3} implies that $\beta(n_1, \ldots,n_m) \leq 1/m$. In fact equality holds if we choose $a_{1j} = a_{2j} = \ldots = a_{mj}$ for all $j$. Thus Corollary \ref{FL} follows. \hal In what follows, for any partitions $\alpha = (a_1 \geq a_2 \geq \ldots \geq a_n \geq 0) \vdash A$ and $\beta = (b_1 \geq b_2 \geq \ldots \geq b_n \geq 0) \vdash B$ of $A, B \geq 1$ we set \begin{equation}\label{gl21-1} g(\alpha) := A^2-\sum^n_{i=1}a_i^2,~~h(\alpha) := \frac{g(\alpha)}{A},~~\alpha+\beta := (a_1+b_1,a_2+b_2, \ldots,a_n+b_n) \vdash (A+B). \end{equation} \begin{lem}\label{GL21} Let $\alpha = (a_1 \geq a_2 \geq \ldots \geq a_n \geq 0) \vdash A$ and $\beta = (b_1 \geq b_2 \geq \ldots \geq b_n \geq 0) \vdash B$ be two partitions of $A, B \geq 1$. Then $h(\alpha) + h(\beta) \leq h(\alpha+\beta)$. \end{lem} \noindent {\bf Proof $\;$ } We need to show that $$\frac{A^2-\sum^n_{i=1}a_i^2}{A}+\frac{B^2-\sum^n_{i=1}b_i^2}{B} \leq \frac{(A+B)^2-\sum^n_{i=1}(a_i+b_i)^2}{A+B},$$ equivalently, $\Gamma \geq 0$, where $$\begin{aligned}\Gamma & := AB\sum_{i \neq j}(a_i+b_i)(a_j+b_j)-(A+B)(B\sum_{i \neq j}a_ia_j+A\sum_{i \neq j}b_ib_j)\\ & = AB\sum_{i \neq j}(a_ib_j+a_jb_i)-(B^2\sum_{i \neq j}a_ia_j+A^2\sum_{i \neq j}b_ib_j)\\ & = AB(2AB-2\sum_ia_ib_i)-B^2(A^2-\sum_ia_i^2)-A^2(B^2-\sum_ib_i^2)\\ & = B^2\sum_ia_i^2+A^2\sum_ib_i^2-2AB\sum_ia_ib_i. \end{aligned}$$ By the Cauchy-Schwarz inequality, $$2AB\sum_ia_ib_i \leq 2\cdot B(\sum_ia_i^2)^{1/2} \cdot A (\sum_ib_i^2)^{1/2} \leq B^2\sum_ia_i^2+A^2\sum_ib_i^2,$$ and the claim follows. \hal \begin{thm}\label{GL2} In the notation of Theorem \ref{GL}, assume that $$n_1 = n_2 = \ldots = n_t > n_{t+1} \geq \ldots \geq n_m \geq 1.$$ Then the following statements hold. \begin{enumerate}[\rm(i)] \item $n_1/n \geq \beta(n_1, \ldots,n_m) \geq (n_1-1)/(n-t).$ \item If $m=2$, then $\beta(n_1,n_2) = (n_1-1)/(n-t)$. Moreover, if $$1 \neq u = {\mathrm {diag}}(u_1,u_2) \in GL_{n_1}(q) \times GL_{n_2}(q) = L$$ is a unipotent element, then $(\dim u^{\mathcal L})/(\dim u^{\mathcal G}) = \alpha(L)$ precisely when one of the following conditions holds. \begin{enumerate}[\rm(a)] \item $n_1 = n_2$, and $u_1$ and $u_2$ have the same Jordan canonical form. \item $n_1 > n_2$, $u_1$ is a transvection and $u_2 = 1$. \item $n_1 = n_2+1$, and the sizes of Jordan blocks for $u_1$ and $u_2$ are $$c_1 \geq \ldots \geq c_{j-1} \geq c_j \geq c_{j+1} \geq \ldots \geq c_s,~~ c_1 \geq \ldots \geq c_{j-1} \geq c_j-1 \geq c_{j+1} \geq \ldots \geq c_s,$$ respectively. \end{enumerate} \end{enumerate} \end{thm} \noindent {\bf Proof $\;$ } (i) To prove the lower bound for $\beta(n_1,\ldots,n_m)$, we choose $(a_{i1},\ldots,a_{in})$ to be $(n_1-1,1,0,\ldots,0)$ if $1\leq i \leq t$ and $(n_i,0,\ldots,0)$ otherwise. To prove the upper bound, for $1 \leq i \leq m$ consider the partition $\alpha_i:=(a_{i1},a_{i2}, \ldots,a_{in}) \vdash n_i$. By Lemma \ref{GL21} we have \begin{equation}\label{gl21-2} \sum^m_{i=1}\frac{g(\alpha_i)}{n_i} = h(\alpha_1)+h(\alpha_2) + \ldots + h(\alpha_m) \leq h(\sum^m_{i=1}\alpha_i) = \frac{g(\sum^m_{i=1}\alpha_i)}{n} \end{equation} in the notation of \eqref{gl21-1}. Note that the condition $\max_{1 \leq i \leq m} a_{i2} > 0$ ensures that $g(\sum^m_{i=1}\alpha_i) > 0$. Since $n_1 = \max_{1 \leq i \leq m} n_i$, \eqref{gl21-2} now implies that $$\beta(n_1,n_2, \ldots,n_m) = \frac{\sum^m_{i=1}g(\alpha_i)}{g(\sum^m_{i=1}\alpha_i)} \leq \frac{n_1(\sum^m_{i=1}g(\alpha_i)/n_i)}{g(\sum^m_{i=1}\alpha_i)} \leq \frac{n_1}{n}.$$ \smallskip (ii) We may assume $A := n_1 > B:= n_2$ by Corollary \ref{FL} and its proof. To ease the notation, also write $$(a_{11},a_{12}, \ldots,a_{in}) = (a_1, a_2, \ldots,a_n),~~(a_{21},a_{22}, \ldots,a_{2n}) = (b_1, b_2, \ldots,b_n).$$ Then we need to show that $$\frac{\sum_{1 \leq i \neq j \leq n}(a_ia_j+b_ib_j)}{\sum_{1 \leq i \neq j \leq n}(a_i+b_i)(a_j+b_j)} \leq \frac{A-1}{A+B-1},$$ equivalently, $\Sigma \geq 0$, where $$\begin{aligned}\Sigma & := (A-1)\sum_{i \neq j}(a_i+b_i)(a_j+b_j)-(A+B-1)\sum_{i \neq j}(a_ia_j+b_ib_j)\\ & = (A-1)\sum_{i \neq j}(a_ib_j+a_jb_i)-B\sum_{i \neq j}(a_ia_j+b_ib_j)\\ & = (A-1)(2AB-2\sum_ia_ib_i)-B(A^2+B^2-\sum_ia_i^2-\sum_ib_i^2)\\ & = B(A^2-2A-B^2)+B(\sum_ia_i^2+\sum_ib_i^2)-2(A-1)\sum_ia_ib_i\\ & = B(A^2-2A-B^2)+B\sum_i(a_i-b_i)^2-2(A-1-B)\sum_ia_ib_i\\ & = (A-1-B)((A-1+B)B-2\sum_ia_ib_i)+B(\sum_i(a_i-b_i)^2-1)\\ & = (A-1-B)(\sum_i(A-1+B-2a_i)b_i)+B(\sum_i(a_i-b_i)^2-1). \end{aligned}$$ Note that the condition $A \geq B+1$ implies that $\sum_i(a_i-b_i)^2 \geq 1$, with equality attained exactly when \begin{equation}\label{GL2-1} A=B+1,~~(a_1,a_2, \ldots,a_n) = (b_1, \ldots ,b_{i-1},b_i+1,b_{i+1}, \ldots,b_n). \end{equation} First we consider the case when $A-1+B \geq 2a_i$ for all $i$. As $B \geq 1$, we see that $\Sigma \geq 0$, with equality attained exactly when \eqref{GL2-1} holds, which means the corresponding unipotent element satisfies (c). Suppose now that $A-1+B \leq 2a_i-1$ for some $i$. Then $a_i \geq \sum_{j \neq i}a_j+B$. As $B \geq 1$ and $a_1 \geq a_2 \geq \ldots \geq a_n$, this can happen only for one index $i$, and this index $i$ is $1$, and so \begin{equation}\label{GL2-2} a_1 \geq A'+B, \end{equation} where $A' := \sum_{j \geq 2}a_j$. In particular, $A-1+B \geq 2a_j$ for all $j \geq 2$. Now by \eqref{GL2-2} we have $$\begin{aligned} \Sigma' := & (A-1-B)((A-1+b_1)b_1-2a_1b_1)+b_1(a_1-b_1)^2\\ = &~b_1((A-1-B)(b_1-1+A'-a_1)+(a_1-b_1)^2)\\ = &~b_1((a_1-b_1)(A'-1)+(A'-1-B')(b_1-1+A'-a_1))\\ = &~b_1((a_1-b_1)B'+(A'-1)^2-B'(A'-1))\\ = &~b_1((a_1-A'-b_1+1)B'+(A'-1)^2) \geq 0, \end{aligned}$$ with equality exactly when \begin{equation}\label{GL2-3} B' := \sum_{j \geq 2}b_j = 0,~~A' =1. \end{equation} It follows that, if $\sum_{j \geq 2}(a_j-b_j)^2 \geq 1$, then $\Sigma \geq 0$, with equality exactly when \eqref{GL2-3} holds, which means the corresponding unipotent element satisfies (b). Assume finally that $\sum_{j \geq 2}(a_j-b_j)^2 \leq 0$. Then $a_j=b_j$ for all $j \geq 2$ and $A'=B'$. As $\max(a_2,b_2) > 0$, we must have $A'=B' \geq 1$, and so by \eqref{GL2-2} $$\Sigma' = b_1((a_1-b_1-1)A'+1) \geq 2b_1,$$ yielding $\Sigma \geq b_1 \geq 1$. \hal We note that Theorem \ref{GL2}(i) was inspired by some correspondence with M. Fraczyk who is studying the situation in Theorem \ref{GL} using different methods. \section{Random walks} In this section we prove Theorems \ref{mix}--\ref{mix-gluni} concerning random walks and covering numbers. \vspace{2mm} \noindent {\bf Proof of Theorem \ref{mix}} Suppose ${\mathcal G}$ is a simple algebraic group of rank $r$ in good characteristic, and $G = G(q) = {\mathcal G}^F$ is a finite quasisimple group over $\mathbb F_q$. Let $y \in G$ be such that ${\bf C}_G(y) \le L = {\mathcal L}^F$ for a split Levi subgroup ${\mathcal L}$ of ${\mathcal G}$. Write $C = y^G$, and let $h$ be the Coxeter number of ${\mathcal G}$. For a real number $s$, define \begin{equation}\label{zetadef} \zeta^G(s) = \sum_{\chi \in {\mathrm {Irr}}(G)} \chi(1)^{-s}. \end{equation} We will need the following result, which is \cite[Theorem 1.1]{chardeg}. \begin{lem}\label{zetabd} If $s>\frac{2}{h}$, then $\zeta^G(s) \rightarrow 1$ as $q\rightarrow \infty$. \end{lem} We first prove part I(a) of Theorem \ref{mix} together with the first statement of part (II) (the $C^6=G$ statement). We will prove the mixing time assertions later. Let $t$ be a positive integer. By a well-known result (see \cite[Chapter 1, 10.1]{AH}), for $g \in G$ the number of ways of writing $g$ as a product of $t$ conjugates of $y$ is \[ N(g) = \frac{|C|^t}{|G|} \sum_{\chi \in {\mathrm {Irr}}(G)} \frac{\chi(y)^t \chi(g^{-1})} {\chi(1)^{t-1}}. \] Define $P^t(g) = \frac{N(g)}{|C|^t}$, the probability that a random product of $t$ conjugates of $y$ is equal to $g$, and let $U(g) = \frac{1}{|G|}$, the uniform probability distribution on $G$. Then \begin{equation}\label{one} |P^t(g)- U(g)| \le \frac{1}{|G|}\sum_{\chi(1)> 1} \left(\frac{|\chi(y)|}{\chi(1)}\right)^t\chi(1)^2. \end{equation} Define \[ ||P^t-U||_\infty = |G|\,\hbox{max}_{g\in G}|P^t(g)-U(g)|. \] Write $\alpha = \alpha({\mathcal L})$. Then Theorem \ref{main1} gives $\frac{|\chi(y)|}{\chi(1)} \le f(r)\chi(1)^{\alpha-1}$, and so (\ref{one}) implies \[ \begin{array}{ll} ||P^t-U||_\infty & \le f(r)^t \sum_{\chi(1)> 1} \chi(1)^{t(\alpha-1)+2} \\ & = f(r)^t\left(\zeta^G\left(t(1-\alpha)-2\right)-1\right). \end{array} \] By Lemma \ref{zetabd}, $\zeta^G(t(1-\alpha)-2)-1 \rightarrow 0$ as $q\rightarrow \infty$ provided \begin{equation}\label{ineqal} t(1-\alpha)-2 > \frac{2}{h}. \end{equation} If ${\mathcal G}$ is of exceptional type $G_2,F_4,E_6,E_7$ or $E_8$, then $\frac{2}{h}$ is $\frac{1}{3}$, $\frac{1}{6}$, $\frac{1}{6}$, $\frac{1}{9}$ or $\frac{1}{15}$ respectively, and Theorem \ref{alphaexcep} shows that (\ref{ineqal}) holds in all cases, provided $t \ge 6$. This proves the first statement of Theorem \ref{mix}(II). Now suppose ${\mathcal G}$ is of classical type. Then $\alpha \le \frac{1}{2}(1+\frac{\dim {\mathcal L}}{\dim {\mathcal G}})$ by Theorem \ref{ratio}. This implies that (\ref{ineqal}) holds provided $t > (4+\frac{4}{h})\frac{\dim {\mathcal G}}{\dim {\mathcal G} - \dim {\mathcal L}}$, proving Theorem \ref{mix}(I)(a). \vspace{2mm} We now prove the assertions on mixing times in Theorem \ref{mix}. For these we use the Diaconis--Shashahani bound \cite{DS}: \begin{equation}\label{upperbd} (||P^t-U||_1)^2 \le \sum_{\chi \in {\mathrm {Irr}}(G), \chi\ne 1} \left(\frac{|\chi(y)|}{\chi(1)}\right)^{2t} \chi(1)^2. \end{equation} As above, Theorem \ref{main1} shows that the right hand side of (\ref{upperbd}) is less than \linebreak $f(r)^{2t}\left(\zeta^G(2t(1-\alpha)-2)-1\right)$, and hence tends to 0 as $q\rightarrow \infty$ provided $2t(1-\alpha)-2 > \frac{2}{h}$. Using Theorems \ref{alphaexcep} and \ref{ratio}, we now see as before that this inequality holds provided $t \ge 3$ when ${\mathcal G}$ is of exceptional type, and provided $t > (2+\frac{2}{h})\frac{\dim {\mathcal G}}{\dim {\mathcal G} - \dim {\mathcal L}}$ when ${\mathcal G}$ is classical. This proves the mixing time assertions, completing the proof of Theorem \ref{mix}. \hal \vspace{4mm} \noindent {\bf Proof of Theorem \ref{mix-gluni}} This is very similar to the previous proof, using Corollary \ref{sl-uni} instead of Theorem \ref{main1}. Let $G = SL_n(q)$ and let $u \in G$ be a non-identity unipotent element. Let $t \in \mathbb N$, and for $g\in G$ let $P^t(g)$ be the probability that a random product of $t$ conjugates of $u$ is equal to $g$, and $U(g) = \frac{1}{|G|}$. As in (\ref{one}), \[ |P^t(g)- U(g)| \le \frac{1}{|G|}\sum_{\chi \in {\mathrm {Irr}}(G),\chi(1)> 1} \left(\frac{|\chi(u)|}{\chi(1)}\right)^t\chi(1)^2. \] By Corollary \ref{sl-uni}, $\frac{|\chi(u)|}{\chi(1)} \le g(n)\,\chi(1)^{-\frac{1}{n-1}}$ for $\chi \in {\mathrm {Irr}}(G)$, and hence \[ \begin{array}{ll} ||P^t-U||_\infty & \le g(n)^t \sum_{\chi(1)> 1} \chi(1)^{-\frac{t}{n-1}+2} \\ & = g(n)^t\left(\zeta^G(\frac{t}{n-1}-2)-1\right). \end{array} \] By Lemma \ref{zetabd}, $\zeta^G(\frac{t}{n-1}-2)-1 \rightarrow 0$ as $q\rightarrow \infty$ provided $\frac{t}{n-1}-2 > \frac{2}{n}$, which holds provided $t > 2n$. This proves part (i) of Theorem \ref{mix-gluni}. Part (ii) is proved in the same way, using the bound (\ref{upperbd}). \hal \vspace{4mm} \noindent {\bf Corollaries \ref{linearbd} and \ref{linearbdsl}} Corollary \ref{linearbd} follows immediately from Theorem \ref{mix}(I)(b). Corollary \ref{linearbdsl} is proved exactly as above, using Theorem \ref{main1c}. \vspace{4mm} Next, we use some well-known observations to justify the remarks made after the statement of Theorem \ref{mix}. \begin{lem}\label{mix-subset} \begin{enumerate}[\rm(i)] \item Let $G$ be a finite group, and let $S$ be a generating subset of $G$ that satisfies $|S^N| < |G|(1-1/e)$ for some integer $N \geq 1$. Then the mixing time $T(G,S)$ of the random walk on the Cayley graph corresponding to $S$ is at least $N+1$. \item Let $G = SL_n(q)$ with $n \geq 2$ and $S = y^G$ with $y = {\mathrm {diag}}(\mu I_{n-1},\lambda)$, where $\mu, \lambda \in \mathbb F_q^\times$ and $\mu \neq \lambda$. Then $T(G,y) \geq n$. \end{enumerate} \end{lem} \noindent {\bf Proof $\;$ } (i) Define $P(g)$ to be $1/|S|$ if $g \in S$ and $0$ otherwise, and let $U(g) = 1/|G|$ for all $g \in G$. Consider any $1 \leq k \leq N$. Note that $|S^k| \leq |S^{k+1}|$ and so $|S^k| \leq |S^N|$, whence $$||P^k-U||_1 \geq \sum_{g \in G \smallsetminus S^k}|P^k(g)-U(g)| = \sum_{g \in G \smallsetminus S^k}|U(g)| \geq \frac{|G \smallsetminus S^k|}{|G|} > 1/e.$$ It follows that $T(G,S) \geq N+1$. (ii) Note that $(y^G)^{n-1}$ is contained in $X$, the set of elements $x \in G$ that have eigenvalue $\mu$ on $V = \mathbb F_q^n$. Now if we fix $0 \neq v \in V$ and let $Y := \{ x \in G \mid x(v) = \mu v\}$, then it is easy to see that $|{\bf N}_G(Y)|/|Y| \geq q-1 \geq 2$. Hence, $$|X| = |\cup_{g \in G}gYg^{-1}| \leq |Y| \cdot [G:{\bf N}_G(Y)] \leq |G|/2.$$ Now we can apply (i) to $S := y^G$. \hal We conclude with a proof of our last theorem, connecting the mixing times of random walks on classical groups with the support of certain elements. \vspace{2mm} \noindent {\bf Proof of Theorem \ref{mix-supp}} Set $s:= {\mathrm {supp}}(y)$. Then ${\bf C}_G(g) \le {\bf C}_G(y) = L$. Theorem \ref{mix} I(b) gives $$T(G,g) \le \lceil (2+\frac{2}{h})\frac{\dim {\mathcal G}}{\dim {\mathcal G} - \dim {\mathcal L}}\rceil$$ for large $q$. Now, $\dim {\mathcal G} - \dim {\mathcal L} = \dim {\mathcal G} - \dim {\bf C}_{{\mathcal G}}(y) = \dim y^{{\mathcal G}} \ge ans$ as shown in the proof of Theorem \ref{supp}. This yields \[ T(G,g) \le \lceil (2+\frac{2}{h})\frac{\dim {\mathcal G}}{ans}\rceil. \] Let $c = c({\mathcal G})$ be as in Theorem \ref{supp}. Then we have $\frac{\dim {\mathcal G}}{an} = \frac{r}{c} = r'$. We obtain \[ T(G,g) \le \lceil (2+\frac{2}{h})r' / s \rceil, \] proving the first assertion. It remains to prove the lower bound on $T(G,y)$. By (\ref{time}) we have \[ T(G,y) \ge \frac{\log |G| + \log (1 - e^{-1})}{\log |y^{G}|} \gtrsim_{|G|} \frac{\dim {\mathcal G}}{\dim y^{{\mathcal G}}}. \] It follows from \cite[3.4]{lish99} and its proof that, for $y$ semisimple, we have $|y^G| \le 2ans$. Hence $\dim y^{{\mathcal G}} \le 2ans$, which, combined with the inequality above, implies \[ T(G,y) \gtrsim_{|G|} \frac{\dim {\mathcal G}}{2ans} \ge \frac{\dim {\mathcal G}}{2an}/s = \frac{1}{2} r' / s, \] as required. \hal
\section*{Abstract} Microtubules (MTs) are filamentous protein polymers roughly 25 nm in diameter. Ubiquitous in eukaryotes, MTs are well known for their structural role but also act as actuators, sensors, and, in association with other proteins, checkpoint regulators. The thin diameter and transparency of microtubules classifies them as sub-resolution phase objects, with concomitant imaging challenges. Label-free methods for imaging microtubules are preferred when long exposure times would lead to phototoxicity in fluorescence, or for retaining more native structure and activity. This method approaches quantitative phase imaging of MTs as an inverse problem based on the Transport of Intensity Equation. In a co-registered comparison of MT signal-to-background-noise ratio, TIE Microscopy of MTs shows an improvement of more than three times that of video-enhanced bright field imaging. This method avoids the anisotropy caused by prisms used in differential interference contrast and takes only two defocused images as input. Unlike other label-free techniques for imaging microtubules, in TIE microscopy background removal is a natural consequence of taking the difference of two defocused images, so the need to frequently update a background image is eliminated. \section*{Introduction} Microtubules (MTs) play essential roles in biological processes including structure, transport, motility, and cell division; MT defects are associated with a broad range of fundamental pathologies \cite{bailey2013}. MTs form the framework for many classical and current {\itshape in vitro} experiments, including biophysical experiments involving force measurement with optical tweezers \cite{block1990,bailey2013}, for which extended live-viewing requirements make label-free MT imaging techniques a requirement. A variety of label-free methods for imaging MTs have been demonstrated previously: dark-field \cite{horio1986}, video enhanced image processing with \cite{soboeiro1988} or without \cite{medina2010} differential interference contrast, quantitative polarisation \cite{oldenbourg1998}, reflected methods based on interference \cite{amos2011,andrecka2016}, and phase contrast \cite{kandel2017} have all been demonstrated for {\itshape in vitro} microtubule experiments. Despite the availability of label-free methods, fluorescence microscopy continues to dominate {\itshape in vitro} microtubule imaging thanks to high contrast and specificity. However, fluorescence imaging intrinsically adds two non-negligible perturbations: phototoxicity and photobleaching, which can damage microtubules \cite{guo2006}. Even in the absence of excitation illumination, labeling can alter MT activity and dynamic interactions \cite{kandel2017}. Consequently, experiments that require extended timelapse or constant live viewing make especially poor candidates for fluorescence microscopy. Label-free imaging with video-enhanced DIC (VE-DIC) is widely used in conjunction with optical tweezers \cite{bailey2013}, and more recently video-enhanced bright field imaging was demonstrated using the same image processing \cite{candia2013}. The latter avoids the distortion of optical traps caused by DIC prisms, which can cause anisotropies in trap stiffness of about 30\% as described in \cite{lang2002}. An alternative solution to trap anisotropy is to employ a 4f relay to physically remove the DIC prism from the trapping beam path as in \cite{deng2017}. In practice, maintaining sufficient contrast in VE-DIC to image single MTs requires frequent prism re-alignment. Bright field microscopy, combined with similar image processing to that employed in VE-DIC, avoids VE-DIC anisotropies at the cost of lower contrast \cite{medina2010,candia2013}. As pure phase objects, contrast at best focus is negligible for MTs, and in Video-Enhanced Bright Field (VE-BF) MTs are necessarily defocused for imaging as noted in \cite{candia2013}. This defocus-based contrast inverts from dark to light as the phase object passes from above to below the focal plane. Contrast, {\itshape i.e.} the intensity of a phase object image in relation to background noise, propagates in a predictable way described by the Transport of Intensity Equation (TIE, Eq. \ref{eq:TIE}). TIE microscopy of MTs maintains the unperturbed optical path of VE-BF, does away with a requirement for dedicated background acquisition and subtraction, and improves contrast over VE-BF to be comparable to VE-DIC. This is achieved by solving the inverse problem of light intensity due to defocus to compute phase map images of microtubules. TIE microscopy requires two or more defocused images as inputs. Defocused images for TIEM can be obtained by physically moving a sample stage \cite{barty1998}, refocusing an optical element (such as a tuneable lens \cite{zuo2013}), or one of several single-shot multifocus options \cite{abrahamsson2012,waller2010}. In this demonstration I use a precision piezo stage to move the sample to several different defocus positions.. \begin{figure}[!h] \includegraphics[keepaspectratio,scale=0.42]{./fig1VisualSummary8.png} \caption{{\bf TIEM of Microtubules and Comparison to Other Imaging Modes} \\ {\bf (a)} Video-enhanced bright field micrograph of microtubules adhered to a coverslip (average of 42 frames with background subtracted), defocused 225 nm below the sample plane ($I_b$). {\bf (b)} VE-BF at the sample plane ($I_0$). {\bf (c)} VE-BF 225 nm above the sample plane ($I_a$). {\bf (d)} TIE phase contrast micrograph of microtubules. {\bf (e)} The gradient of {\bf d} mimicking DIC contrast with a y-axis shear. {\bf (f)} Gradient of {\bf d} mimicking DIC contrast with a x-axis shear. Contrast in {\bf e} and {\bf f} is essentially nonexistent for MTs parallel to the shear axis. {\bf (g)} The Laplacian ($\nabla^2[\phi(x,y)]$) of {\bf d}. {\bf (h)} The intensity difference image ($I_a-I_b$). For micrographs of sufficiently thin phase objects, the first term in Eq. \ref{eq:productrule} goes to 0 and {\bf h} and {\bf g} are mathematically equivalent. {\bf (i)} `Through the eyepiece' (no background subtraction) view of the sample plane.} \label{fig:vissummary} \end{figure} \section*{Materials and Methods} \subsection*{Transport of intensity in the case of microtubules} The transport of intensity equation (TIE) describes the change in intensity of a wavefront that passes through a thin phase object at different planes of focus. This was derived by Teague in 1983 \cite{teague1983}, and later applied to visible light microscopy \cite{barty1998}. The TIE describes the first derivative of intensity with respect to focus $z$ as: \begin{equation} k_0 \frac{\partial I(x,y,z)} {\partial z} = - \nabla [I_{z=0}(x,y,z) \nabla (\phi_{z=0}(x,y,z)) ] \label{eq:TIE} \end{equation} Where $I_{z=0}(x,y,z)$ is the intensity at the focal plane, $\phi(x,y,z)$ is the phase, and $k_0 = \frac{2\pi}{\lambda}$ is the wavenumber. The first derivative with respect to focus is measured empirically as the difference of two images, $I_a$ and $I_b$, focused above and below the sample plane, respectively. We can follow Teague \cite{teague1983} in introducing an additional function $\psi(x,y,z)$ defined as $ \nabla(\psi(x,z,y)) := I_{z=0}(x,y,z)\nabla(\phi_{z=0}(x,y,z)) $, so that the right hand side of Eq \ref{eq:TIE} becomes a Poisson's equation. \begin{equation} k_0\frac{I_a-I_b}{\Delta z} = - \nabla^2 ( \psi(x,y,z)) \end{equation} This simplification allows us to approach the problem of TIE phase retrieval with our choice of Poisson solver. A simple and computationally fast approach takes advantage of the Fourier transform pair for the Laplacian operator as in \cite{gureyev1997}. After taking the Fourier transform, rearranging to solve for $\Psi$ yields: \begin{equation} \Psi(k_x,k_y) =- \frac{ k_0\mathcal{F}[\frac{\partial I}{\partial z}]}{4\pi^2(k_x^2+k_y^2)} \label{eq:FourierPair} \end{equation} As spatial frequencies approach the DC bias term, we run the risk of dividing by zero due to the presence of $k_x^2 +k_y^2$ in the denominator. Low spatial frequency inaccuracies in the estimate of $\frac{\partial I}{\partial z}$ will be disproportionately amplified as a result, which can be seen as a fog-like artifact in some TIE images. To prevent division by zero and decrease sensitivity to noise, we can add an offset in the Fourier domain. To restrict the effect of our offset to low spatial frequencies, we add this offset in the form of a 2D Hanning window modified to center the window at DC frequency. Adding the Hanning window attenuates the low-pass filter effects in the Fourier domain as well as avoiding division by zero. This is especially well suited to our objective of imaging sub-resolution phase objects such as MTs, because these are represented at high frequencies at the limits of the imaging system's capabilities. For other imaging situations, such as cells or microspheres, the scale of the Hanning function can be adjusted to retain more low spatial frequencies as required. The Hanning function centered at zero frequency is described as: \begin{equation} k_r = \sqrt{k_x^2 + k_y^2} \end{equation} \begin{equation} f_{Hann}(k_r)|_{k_r \leq \omega_0} = \frac{\alpha}{2} (1+cos( \frac{\pi k_r}{\omega_0} )) \end{equation} \begin{equation} f_{Hann}(k_r)|_{k_r \geq \omega_0} = 0 \label{eq:hanning} \end{equation} Where $\omega_0$ is the spatial frequency at which the Hanning function goes to 0 and $\alpha$ is a scaling factor. \begin{figure}[!h] \includegraphics[keepaspectratio,scale=.225]{./fig31D.png} \caption{{\bf A Hanning Bump Stabilizes the TIE in the Fourier domain.} This figure demonstrates how solving the TIE amplifies large objects and attenuates small objects and noise. In the Fourier domain large image objects occur near 0 spatial frequency, smaller objects are represented by higher spatial frequencies. In these cross sections 0 spatial frequency has been shifted to the center. {\bf (a)} The quadratic in the Fourier domain Laplacian illustrates the instability of the TIE: the result will blow up at low spatial frequencies as the denominator approaches 0. Adding a global offset prevents the denominator from reaching 0, but a Hanning bump can be used to smoothly and specifically adjust the TIE, resulting in less deviation from the analytical solution. {\bf (b)} Demonstrates the effect of adding a Hanning bump or a global offset to prevent division by 0. {\bf (c)} Simulated signal with added noise. The spike in the middle, a thin Gaussian function, has an amplitude 8 times the standard deviation of the background noise. {\bf (d)} Simulated signal plus noise after convolution with {\bf b}, illustrating the effect of using a Hanning bump instead of a global offset. An interactive version of this figure is available in Figure S3.} \label{fig:VEBFTIELap} \end{figure} By taking the inverse Fourier transform of the right hand side of Eq \ref{eq:FourierPair} we are left with the auxiliary function $\psi$ we introduced earlier. We can solve for $\phi$ by integrating as Teague suggests \cite{teague1983}, or reuse our Fourier domain Poisson solver, taking the gradient of the quotient of $\psi$ and $I_{z=0}$ to generate a new Poisson's equation, this one yielding $\phi$ when solved as above \cite{gorthi2012}. Once we have a phase map, $\phi(x,y)$ of our sample plane, we can process the complex wavefront {\itshape in silico} yielding diverse imaging modes (Fig. \ref{fig:vissummary}). DIC imaging is sensitive to the gradient of phase, so we can simulate DIC microscopy with a chosen shear axis by taking the gradient of our phase image \cite{lue2007}. Applying the Laplacian operator to the phase image, we can highlight small features with improved isotropic contrast. Laplace Phase Microscopy (LPM) has been shown to be advantageous for label-free study of the fine details of intracellular organelle transport \cite{wang2011}. When imaging MTs, we can use the intensity difference of two symmetrically defocused images as a close estimate of the Laplacian of phase micrograph thanks to a particular simplification of the TIE for thin phase objects. A visual inspection of a Laplacian micrograph and the defocused image $I_a - I_b$ (Fig \ref{fig:vissummary}) reveals a striking similarity. We can apply the product rule for gradients to Eq \ref{eq:TIE} to describe the TIE in two terms (dropping the coordinate dependencies here for simplicity): \begin{equation} k_0 \frac{\partial I} {\partial z} = -[ \nabla (I_{z=0})\nabla(\phi_{z=0}) + I_{z=0}\nabla^2 (\phi_{z=0})] \label{eq:productrule} \end{equation} For a sufficiently thin pure phase object, contrast is minimal when the sample is at best focus (as noted by Frits Zernike in 1955 \cite{zernike}, where he summarizes earlier work \cite{abbe} by Ernst Abbe). Zernike noted that a microscopist working with unstained cells is likely to continuously and unconsciously focus in fine increments about the sample plane, building a mental picture of the phase object. This is similar to what we aim to accomplish here computationally. At best focus a thin phase object visualized by a microscope creates a uniform, featureless image, and the corresponding gradient is zero everywhere, except for contributions from the imaging system and due to noise. Non-uniform illumination due to the imaging system is contained in both defocused images, and is removed by taking their difference. Therefore we can eliminate the first term in Eq \ref{eq:productrule} and replace $I_0(x,y)$ with its mean, a constant. We then use our Fourier Poisson solver to recover $\phi$, and the defocus image $\frac{\partial I}{\partial z}$ can act as a low-computation substitute for the Laplacian phase micrograph calculated from $\phi(x,y)$ in Fig \ref{fig:vissummary}, because for sufficiently thin phase objects the difference of two defocused microscopical images is proportional to the Laplacian of the optical path length of the object. This relationship between the difference of defocused images and the Laplacian of phase has been noted before as the premise for defocusing microscopy, and demonstrated as a means for studying membrane fluctuations \cite{agero2004}. As described above, the first derivative of intensity can be estimated by the difference of two images at different levels of defocus. More images can be used to improve the estimate of $\frac{\partial I}{\partial z}$, as has been described previously \cite{soto2007,waller2010} and the estimate of $\frac{\partial I}{\partial z}$ can be improved by considering the noise level and magnitude of intensity transport for a given imaging context \cite{carranza2014,jingshan2014}. For the purposes of this paper, I used two images defocused by distances of 200 to 500 nm to estimate $\frac{\partial I}{\partial z}$ for computing TIE phase maps. \subsubsection*{Microscope Setup} A cartoon representation of the microscope used in these experiments, part of a custom optical tweezers system, is shown in Figure \ref{fig:TIEMCartoon}. Three lenses (L0, L1, and L2) are used to conjugate the image of the LED chip to an iris diaphragm (ID 1), which is in turn conjugated to the back focal plane of the illumination objective, providing K\"ohler illumination. The illumination objective is a high NA oil immersion objective (Nikon E Plan 100X, NA = 1.25) for purposes of collecting the trapping beam of the optical tweezers system, but the effective illumination NA is stopped down using the iris diaphragm ID. Limiting the illumination increases depth-of-field and illumination coherence, improving the resulting TIE phase map. A piezo stage moves the sample plane to provide defocus (BIO3.100, Piezoconcept, Lyon, France). The sample plane is imaged onto a camera (Mako G-125, www.alliedvision.com) by the imaging objective (Nikon Plan Fluor 100X, NA = 1.3) and lens L3 (f = 200 mm). \begin{figure}[!h] \includegraphics[keepaspectratio,scale=0.35]{./tweezersDesignTIEMThb.png} \caption{{\bf Cartoon Representation of Optical Tweezers Microscope} The microscope used to demonstrate TIE microscopy of microtubules is part of an optical tweezers system. The trapping arm, not used in this paper, is shown in red and the imaging arm is shown in green. {\bf Inset:} Microsphere trapped by optical tweezers and held in the vicinity of microtubule bundles, imaged with TIE microscopy. An arrow indicates the trapped microsphere, scale bar 5 $\upmu$m. } \label{fig:TIEMCartoon} \end{figure} \subsubsection*{SNR Measurements} Signal to noise ratios were measured according to the definition presented in \cite{bormuth2007}. Using a MATLAB script, I measured the peak-to-peak value of the average of 21 MT cross-section profile plots and divided the result by the standard deviation of a rectangular region of nearby background, a 20 by 20 pixels area free from microtubules and blobs on the coverslip. To avoid attributing SNR differences due to variation across images to the method used, I measured co-registered sections of MTs at the same timepoint. The reported frames are the total frames used to create each image, excepting the additional requirement for VE-BF of a background image (an average of many frames acquired at 3 microns negative defocus). \subsubsection*{Preparation of Stable Microtubule Seeds} Stabilized microtubule seeds were prepared by incubating a 3.8 $\upmu$M porcine tubulin mixture with 1 mM guanylyl-($\upalpha,\upbeta$)-methylenediphosphate (GMPCPP, a non-hydrolysable GTP analogue) at 37$^\circ$C for one hour in MRB80 buffer (80 mM Pipes, 4 mM MgCl$_2$, and 1 mM EGTA, pH 6.8). Before incubation, the mixture was left on ice for 5 minutes to ensure tubulin depolymerization. I then spun the mix on an airfuge (www.beckmancoulter.com, 347855) at 30 psi for 5 minutes to remove un-polymerized tubulin, resuspending the resulting transparent pellet in 200 $\upmu$l MRB80. Microtubule seeds were stable at room temperature for a week or longer, and were used within 4 days for experiments described in this document. \subsubsection*{Unlabeled/Labeled Tubulin Dynamic MT Timelapse Experiments} Zeiss \#1 1/2 coverslips (www.micro-shop.zeiss.com, 474030-9000-000 and 474030-9020-000) were plasma-cleaned in a ceramic holder for two cycles of 30 s at 10 mA using a Turbo Carbon Coater and Auxiliary Power Unit (www.agarscientific.com, AGB7230 and AGB7252). The cleaned coverslips were then silanized by placing in a solution of 125 $\upmu$l Dichlorodimethylsilane (www.sigmaaldrich.com, 440272) in ~250 ml Trichlorethylene (www.sigmaaldrich.com, 251402) for 1 hour. The silanization solution was removed and the coverslips were placed in fresh methanol (www.VWR.com, 20847.307) for three subsequent rounds of sonication of 5, 15, and 30 minutes in a sonicator bath. To construct flow chambers, I cut channels out of Parafilm (www.parafilm.com, PM-996) and sandwiched them between 18x18 and 22x22 mm cleaned and silanized coverslips, sealing the flow chambers by melting the Parafilm on a 100$^\circ$C heating block. The glass/Paraflim/glass stack transitions from cloudy to clear in appearance when sealed. Each channel holds less than 10 $\upmu$l volume. Channels were filled with 40 $\upmu$l of MRB80, then incubated with 10 $\upmu$l of 200X diluted anti-$\upbeta$ antibodies (www.sigmaaldrich.com, T8578). After a wash with 40 $\upmu$l of MRB80, 10 $\upmu$l 1\% pluronic F127 was flowed into the channel. Another 40 $\upmu$l MRB80 wash was followed by an incubation with 10 $\upmu$l of stable microtubule seeds, followed by a final wash and the introduction of 20 $\upmu$l of dynamic MT reaction mixture. All incubations were 5 minutes at room temperature. Dynamic MT reaction mix was made by combining 15 $\upmu$M porcine tubulin (or 14.1 $\upmu$M porcine tubulin with 0.9 $\upmu$M Rhodamine-labeled tubulin from www.cytoskeleton.com, TL590M), with 50 mM KCl, 0.5 mg/ml $\upkappa$-casein, 1 mM GTP, 20 mM glucose, and oxygen scavenger mix (400 $\upmu$g/mL glucose oxidase, 200 $\upmu$g/mL catalase, and 4 mM DTT). The final volume for the reaction mix was 20 $\upmu$l, the remainder of which was MRB80 buffer. \subsubsection*{Analysis of Dynamic Timelapse Images} Dynamic MT timelapses were analyzed in ImageJ (https://imagej.nih.gov/ij/)\cite{rasband2016}, catastrophes were counted in blinded timelapse images by volunteers otherwise uninvolved in the study, and dynamic MT traces in Figure \ref{fig:dynMTs} were measured using ImageJ's line segment measure tool. I used the R statistical package to perform a Poisson statistical test to compare labeled and unlabeled catastrophe rates \cite{R}. Timelapse imaging was conducted at room temperature. \section*{Results and Discussion} \subsection*{Rhodamine-Labeled Dynamic Microtubules Have a Lower Catastrophe Frequency} To demonstrate the utility of TIE Microscopy for imaging dynamic microtubules I performed time lapse imaging of coverslip-attached dynamic microtubules. I chose catastrophe frequency as a metric to determine if MT dynamics differ for unlabeled vs labeled tubulin, as I expect blinded analysis of catastrophes to be more objective then measurements of growth and depolymerization. Figure \ref{fig:dynMTs} shows typical timelapse length measurements of dynamic MTs, with periods of slow growth, pausing, and transitions to rapid depolymerization (catastrophes). The mean results for catastrophe counts in more than 24 microtubule-hours of timelapse images are presented in Table \ref{tab:cats}. Using a Poisson test in the R statistical programming package, I determined that the number of catastrophes for each condition can not be explained by a single catastrophe frequency (p = 5.76e-10). \begin{table}[!ht] \centering \caption{ {\bf Catastrophe rates for unlabeled and 6\% Rhodamine-labelled dynamic MTs}} \begin{tabular}{|l|c|} \hline {\bf Catastrophe rates} & \\ \hline { Rhodamine-Labeled} & 0.03662 min$^{-1}$ \\ \hline { Unlabeled} & 0.1477 min$^{-1}$ \\ \hline {\bf Ratio} & 0.116 to 0.477 (99\% C.I.) \\ \hline \end{tabular} \label{tab:cats} \end{table} The 6\% rhodamine-tubulin labeling density I used in this experiment is well within the range of concentrations reported in the literature \cite{hunt1998}. Label-free methods such as the one presented here offer a way to compare the effects of {\itshape in vitro} conditions (including recovery tags or fluorescence labels) for their effect on microtubule dynamics against MTs in as nearly native a form as possible. \begin{figure}[!h] \includegraphics[keepaspectratio,scale=0.5]{./fig3DynTracesCat.png} \caption{{\bf Dynamic MT tracking with TIE phase imaging} Dynamic lengths of individual microtubules, demonstrating periods of polymerization, catastrophe, and pausing. Traces are manually offset to make it easy to distinguish the traces for each individual MT. Black arrows indicate catastrophes.} \label{fig:dynMTs} \end{figure} \subsubsection*{TIEM Achieves Greater SNR with Fewer Frames than VE-BF} I compared SNRs calculated for the same region of interest in corresponding video-enhanced bright field (VE-BF) and Transport of Intensity Equation (TIE) phase imaging. In fact, the VE-BF images are the inputs to the TIE algorithm with a separately acquired background subtracted. In TIE microscopy the background is effectively removed when taking the difference of the input images, so no separate background has to be acquired. The SNRs for each imaging mode are presented in Table \ref{tab:SNRs}, where TIEM images of microtubules always have a greater SNR than an equivalent VE-BF image, and the frames required to generate a useful image is lower in TIEM. \begin{table}[!ht] \centering \caption{{\bf SNRs measured for VE-BF and TIEM images of MTs}} \begin{tabular}{l |c |c | l } {\bf Vertical MT } & {\bf SNR} & {\bf Frames } & \\ \hline VE-BF Defocused 225 nm & 1.0668 & 18 & \\ $\phi(x,y)$ & 2.8910 & 18 & \\ VE-BF Defocused 225 nm & 0.9360 & 28 & \\ $\phi(x,y)$ & 3.7821 & 28 & \\ VE-BF Defocused 225 nm & 0.9734 & 42 & \\ $\phi(x,y)$ & 3.7431 & 42 & \\ {\bf Horizontal MT }& & & \\ \hline VE-BF Defocused 225 nm & 1.1724 & 18 & \\ $\phi(x,y)$ & 3.2406 & 18 & \\ VE-BF Defocused 225 nm & 1.3412 & 28 & \\ $\phi(x,y)$ & 3.3045 & 28& \\ VE-BF Defocused 225 nm & 1.7841 & 42 & \\ $\phi(x,y)$ & 4.0716 & 42 & \\ \label{table:SNR} \label{tab:SNRs} \end{tabular} \label{table:SNR} \end{table} SNR is not an ideal metric for assessing MT image quality. A recognizable image of an MT may arise as a correlated pattern in the characteristic rod shape even with a peak-to-peak amplitude at the same scale as the background noise. As we see in Fig \ref{fig:SNRCrossSections}, the SNRs calculated for VE-BF microscopy in this way are sometimes below 1.0, even where MTs are clearly recognizable. A better metric for MT imaging utility is how well the MTs can be recognized and localized by an experienced human operator or algorithm. Without an effective and objective way to test this directly, I leave the final judgment on image utility up to the reader. This can be assessed by comparing the imaging modes in Fig \ref{fig:vissummary} and additional examples in supplementary Fig S6. \begin{figure}[!h] \includegraphics[keepaspectratio,scale=0.5]{./fig5SNRplots1_22.png} \caption{{\bf TIE phase and VE-BF images used for calculating signal to noise ratios.} {\bf (a)} TIE phase map of microtubules. Colored boxes indicate MT sections used to calculate the SNRs in Table 1. {\bf (b)} VE-BF image defocused 225 nm below the focal plane.{\bf (c)} VE-BF image defocused 225 nm above the focal plane. {\bf (d)} Profile plot of averaged MT cross-sections in TIE phase map. {\bf (e)} Profile plot of averaged MT cross-sections from -225 nm defocused VE-BF image. {\bf (f)} Profile plot of averaged MT cross-sections from +225 nm defocused VE-BF image } \label{fig:SNRCrossSections} \end{figure} \newpage \section*{Conclusions} TIE phase imaging is an accessible label-free method to increase contrast for sub-resolution phase objects, with considerable improvement in SNR over video-enhanced bright field images of the same scene with fewer frames (Table \ref{table:SNR}). This SNR improvement over VE-BF is obtained while retaining a minimal optical setup, and in an optical tweezers system this means the optical trapping beam is unperturbed, {\itshape e.g.} by DIC prisms. Contrast is more isotropic than that of VE-DIC, and there are no prisms to periodically re-align. Both VE-BF and VE-DIC rely on background subtraction, and the background image (an average of many frames focused about 3 microns below the coverslip) has to be updated regularly. In TIE microscopy, background is removed as a result of subtracting two images at different focus depths, as both images contain the optical system and sample background. Consequently, TIEM has no imaging overhead associated with updating a background mask. The result of subtracting two images, equivalent to the Laplacian of the sample phase profile, is qualitatively similar to Laplacian Phase Microscopy and can be used as a low-computation imaging mode for visualizing microtubules. TIEM shares the benefits of competing and complementary label-free MT imaging methods, and offers the additional advantage of a minimal setup. In an optical tweezers system, TIEM avoids phototoxicity and photobleaching that would be inherent to extended live viewing with fluorescence microscopy. In an optical tweezers system, moving the sample to defocus the image does reduce the ability to record force measurements and TIE images simultaneously. However, this limitation could be circumvented by one of several motion-free options for defocusing, such as using a tuneable lens \cite{zuo2013}, a multifocus diffraction optical element \cite{abrahamsson2012} or a spatial light modulator \cite{maurer2010} My favorite option for defocusing without moving the sample, attractive for its simplicity, is the use of chromatic aberrations as defocused images. This was previously demonstrated for TIE microscopy of cells and test patterns \cite{waller2010}. I speculate that this could be implemented for TIEM of MTs based on single exposures using a white light source and RGB color camera as in \cite{waller2010}, or by sequentially switching the illumination wavelength. The minimum hardware requirements for TIEM MT imaging are a standard brightfield microscope capable of focusing at increments of a few hundred nanometers. The optics for the enhanced phase imaging I demonstrate in this report are entirely computational; this technique can be widely adopted on existing microscopes already in use. \section*{Supporting Information} Supporting information, including videos, python code, and interactive figures can be found at \url{https://github.com/qtzd/TIEMicroscopyOfMTs} \paragraph*{{\bf S1: Video: Dynamic, Unlabeled MTs Visualized with TIEM. } } \paragraph*{{\bf S2: Video: Dynamic MTs Labeled with Rhodamine and Visualized with TIEM. }} \paragraph*{{\bf S3: Jupyter Notebook Interactive Figure S3: Exploring Offset Methods for Stabilizing the 1D TIE in the Fourier Domain}} {\bf (a)} The quadratic (found in the Fourier domain TIE) demonstrates the instability of the TIE. As the spatial frequency goes to 0, the FD TIE will blow up. We can add a small global offset to the denominator to prevent division by 0, or as we see here we can add a small sinusoidal bump (a shifted Hanning function) to selectively offset the quadratic for low spatial frequencies. {\bf (b)} The Fourier domain TIE demonstrates the effect of adding a Hanning bump (green) vs. a global offset (red). {\bf (c)} Simulated signal + noise used in this figure. {\bf (d)} Signal + noise recovered after convolution with {\bf b}. {\bf (e)} Recovered signal with simulated noise removed. To adjust width and amplitude of the Hanning bump, use the blue sliders at the bottom of the figure \paragraph*{{\bf S4: Jupyter Notebook Interactive Figure : Effect of Parameter Choice on TIE Phase Micrograph of Rod Phantom}} Fourier domain Poisson solvers and recovered TIE micrographs for a simulated rod phantom. {\bf (a)} Fourier domain Poisson solver with a Hanning bump offset {\bf (b)} Fourier domain Poisson solver with a global offset {\bf (c)} Rod phantom phase map recovered with Hanning bump TIE solver {\bf (d)} Rod phantom phase map recovered with global offset TIE solver Blue sliders can be used to adjust $w_0$ and offset amplitude. Although the signal-to-noise ratio is reported here according to the definition for MT micrographs described in [1], the optimal choice of parameters depends on one's objectives. Setting amplitude and $w_0$ aggressively can be used for high contrast images with MTs that are more easily recognizable to a human user or pattern-recognition software. If accurate optical path lengths are desired for quantitative analysis lesser offsets may be desirable. Furthermore, high amplitude and low $w_0$ Hanning bumps create an integrated Fourier band-pass filter in the TIE solver and should be minimized for quantitative images of larger phase objects such as cells \paragraph*{{\bf S5: Jupyter Notebook Interactive Figure : Effect of Parameter Choice on TIE Phase Micrograph of MTs}} Fourier domain Poisson solvers and recovered TIE micrographs of microtubules. {\bf (a)} Fourier domain Poisson solver with a Hanning bump offset {\bf (b)} Fourier domain Poisson solver with a global offset {\bf (c)} Microtubules micrograph phase map recovered with Hanning bump TIE solver {\bf (d)} Microtubules micrograph phase map recovered with global offset TIE solver The choice of parameters for the Hanning bump width and amplitude has effects the quality of the computed phase map. The left column displays the Fourier domain TIE solver filter and the resulting phase map, and the right column displays the Fourier domain solver using a global offset and the resulting phase map. This figure can be used to make decisions about when to use a global offset and when and what parameter settings to use with a Hanning bump. To adjust width and amplitude of the Hanning bump, use the blue sliders at the bottom of the figure \paragraph*{{\bf S6: Comparison of VE-BF, TIEM, and Additional Computational Imaging Modes for Visualizing MTs}} S6 is an interactive version of Figure 1: TIEM of microtubules and comparison to other imaging modes. Three examples of MT images are available for comparison, or the user can replace these with their own image stacks for comparison. {\bf (a)}) Video-enhanced bright field micrograph of microtubules adhered to a coverslip (average of 42 frames with background subtracted), defocused below the sample plane {\bf (b)}) VE-BF at the sample plane ($I_0$) {\bf (c)}) VE-BF 225 nm above the sample plane ($I_a$). {\bf d)} TIE phase contrast micrograph of microtubules. {\bf (d)}) TIE phase contrast micrograph of microtubules. {\bf (e)}) The gradient of {\bf d)} mimicking DIC contrast with a y-axis shear. {\bf (f)}) Gradient of {\bf d)} mimicking DIC contrast with a x-axis shear. Contrast in {\bf e)}) and {\bf f)} is essentially nonexistent for MTs parallel to the shear axis. {\bf (g)}) The Laplacian ($\nabla^2[\phi(x,y)]$) of {\bf d)}. {\bf (h)}) The intensity difference image ($I_a-I_b$). For micrographs of sufficiently thin phase objects, the first term in Eq. \ref{eq:productrule} goes to 0 and {\bf (h)} and {\bf g)} are mathematically equivalent. {\bf (i)}) Through the eyepiece' (no background subtraction) view of the sample plane. \paragraph*{\bf S7: TIEMMT.py} {{\bf Python Code: TIE microscopy for microtubules}} This algorithm estimates a solution to the transport of intensity equation and returns a phase micrograph. The algorithm assumes a sufficiently thin phase object, as described in Eq. \ref{eq:productrule}. This code is included as part of the Jupyter notebook that produces Figures S3-S5. \section*{Acknowledgments} I gratefully acknowledge the efforts of Valerie Bentivegna and Thomas Rabl for counting microtubule catastrophes in over 24 MT-hours of blinded timelapse images, and Sascha Reidt for helpful commentary concerning the mathematics. Discussions with Rainer Heintzmann on the TIE were very helpful. David McGloin and Tomoyuki Tanaka of the University of Dundee provided equipment, reagents, and space. Harinath Doudhi, Valerie Bentivegna, Tomoyuki Tanaka, and David McGloin provided general comments on the manuscript. \section*{Funding} This project has received funding from the European Union's Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 608133.
\section{Introduction} There is considerable interest in developing theoretical formalism to allow lattice QCD to determine the properties of resonances for which some of the decay channels involve three or more particles. Such formalism is needed for the study of most of the strong-interaction resonances that appear in nature, e.g.~the $\omega$ meson and the Roper baryon. Specifically, what is needed on the theoretical side is a quantization condition that relates the energies of multiparticle states in a finite volume to the infinite-volume scattering amplitudes of these particles. While such a quantization has long been known for two particles (based on Refs.~\cite{Luscher:1986n2,Luscher:1991n1} and subsequent generalizations), the three particle quantization condition is relatively new~\cite{Hansen:2014eka,Hansen:2015zga,Briceno:2017tce} (and not yet completely general). Since the formalism is rather involved, it is important to provide detailed checks that test all aspects of the approach.\footnote{% An alternative approach to the three-particle quantization condition was proposed very recently in Refs.~\cite{Hammer:2017uqm,Hammer:2017kms}. The threshold expansion in this new approach has not yet been derived.} The present work is aimed at extending previous tests of the formalism of Refs.~\cite{Hansen:2014eka,Hansen:2015zga,Briceno:2017tce} by considering the prediction of the quantization condition for a system of three identical scalar particles near threshold. These particles are confined to a cubic box of side $L$ (as in a lattice simulation) and it is assumed that there is a $Z_2$ symmetry restricting interactions to those involving an even number of particles. The total momentum\footnote{% I use "momentum" for three-momentum throughout this work aside from in Appendix~\ref{app:K}.} is taken to be zero. Under these assumptions, Ref.~\HSTH\ derived the expansion of the energy of the three-particle threshold state in powers of $1/L$, keeping terms up to $\cO(1/L^6)$. This threshold expansion was derived for an arbitrary $Z_2$-symmetric effective field theory. Unlike the two-particle case, where the derivation of the threshold expansion is rather straightforward, the derivation for three particles is itself very involved, requiring the summation of several infinite series. Thus the test presented here is a check of the derivation of the threshold expansion as well as of the underlying formalism. The general formula for the threshold expansion is given in terms of infinite-volume quantities such as the two-particle scattering length. This result is tested here by calculating the same expansion in a specific $Z_2$-symmetric theory---$\lambda \phi^4$ theory---and expressing the result in terms of the same infinite-volume quantities. This test has previously been passed at third order in $\lambda$, and through $\cO(1/L^6)$ in the volume expansion, in Ref.~\HSPT, and what is presented here is the fourth-order calculation to the same order in $1/L$. The specific motivation for carrying out this lengthy and quite tedious calculation is that the fourth-order calculation tests qualitatively new aspects of the general prediction. Specifically, the general formalism contains a ``divergence-free" three-particle scattering amplitude that is obtained from the three-to-three amplitude $\cM_3$ by subtracting an infinite series of terms such that the physical singularities are removed. I stress that such singularities are inevitably present in $\cM_3$ and must be dealt with. A simplified version of this subtraction procedure is sufficient at threshold~\HSTH, and defines a quantity called $\Mthr$. The $\cO(\lambda^3)$ calculation did not test all the subtraction terms in the definition of $\Mthr$, but the present calculation does. It turns out that, as part of the calculation of the three-particle threshold energy, one needs all the ingredients necessary to determine the two-particle threshold energy. Thus the latter energy can also be compared to the general result that follows from the formalism of Refs.~\cite{Luscher:1986n2,Luscher:1991n1}. Since by now there is no doubt that this formalism is correct, this subsidiary calculation provides a check on the methods used here. This paper is organized as follows. The following section contains a summary of the methods introduced in Ref.~\HSPT\ to determine the threshold energy in perturbation theory, and presents the general results from Ref.~\HSTH\ that are being tested. Section~\ref{sec:DE24} concerns the two-particle energy shift, and provides a sketch of the calculation and the final results. These require the two-loop contribution to the effective range. Section~\ref{sec:DE34} describes the calculation of the contributions to the energy shift that are specific to three particles. This requires a particular off-shell version of the two-loop infinite-volume scattering amplitude, the calculation of which is similar to, but different from, that of the effective range. I conclude in Sec.~\ref{sec:conc}. Technical details are collected in three appendices: the first recalling some general results for finite-volume sums, the second listing the needed counterterms, and the third describing the calculation of the on- and off-shell two-loop scattering amplitude near threshold. \section{Overview of methods and results to be tested} \label{sec:methods} The method I use is that introduced in Ref.~\cite{Hansen:2015zta}, and I recall here only the essential features. The theory has the Euclidean Lagrangian density \begin{equation} {\cal L} = \frac12 \partial_\mu\phi\partial_\mu \phi + \frac{m^2}2 \phi^2 + \frac{\lambda}{4!} \phi^4 + \frac{\delta Z}2 \partial_\mu\phi\partial_\mu \phi + \frac{\delta Z_m}2 m^2 \phi^2 + \frac{{\delta Z_\lambda}}{4!} \phi^4 \,, \label{eq:action} \end{equation} with $\phi$ a scalar field. An on-shell renormalization scheme is used: $\delta Z$ and $\delta Z_m$ are tuned so that $m$ is the physical mass and the residue of the (infinite-volume) propagator at the pole is unity. The counterterm $\delta Z_\lambda$ is defined by the requirement that the scattering amplitude at threshold is given by $-\lambda$ to all orders. Since this threshold amplitude is, by definition, proportional to the scattering length, $a$, this renormalization condition implies the exact relation \begin{equation} \lambda = 32 \pi m a\,. \label{eq:lambdadef} \end{equation} I will need the two-loop form of $\delta Z_\lambda$, and this is given in Appendix~\ref{app:counter}. The finite-volume (FV) energies are extracted from the long-time behavior of the following correlation functions: \begin{align} \label{eq:C2def} C_2(\tau) &=\frac{(2m)^2}{2 L^6} e^{2m\tau} \left\langle \widetilde \phi_{\vec 0}(\tau)^2 \widetilde \phi_{\vec 0}(0)^2 \right\rangle \,, \\ \label{eq:C3def} C_3(\tau) &=\frac{(2m)^3}{6 L^9} e^{3m\tau} \left\langle \widetilde \phi_{\vec 0}(\tau)^3 \widetilde \phi_{\vec 0}(0)^3 \right\rangle \,. \end{align} Here $\tau$ is Euclidean time, which is always taken to be positive or zero, and the interpolating fields are \begin{equation} \widetilde \phi_{\vec p}(\tau) = \int_L d^3 x \; e^{-i \vec p \cdot \vec x} \phi(\vec x, \tau)\,, \end{equation} with the subscript $L$ indicating that the integral is over the cubic box. Periodic boundary conditions are applied to $\phi$, so that momenta are quantized as $\vec p = 2\pi \vec n/L$, with $\vec n$ a vector of integers. Euclidean time is taken to have infinite range. The prefactors in Eqs.~(\ref{eq:C2def}) and (\ref{eq:C3def}) are chosen so that $C_j(\tau) =1$ for all $\tau$ if $\lambda=0$. In this limit the interpolating operators couple to the states consisting of $j$ particles at rest. When $\lambda \ne 0$ the correlators behave as (recalling that $\tau \ge 0$) \begin{equation} C_j(\tau) = \sum_k A_{j,k} \, e^{-\Delta E_{j,k} \tau}\,, \qquad \Delta E_{j,k} \equiv E_{j,k}-j m \,, \label{eq:amps} \end{equation} where $j=2$ or $3$, $k$ labels the finite-volume states that couple to the interpolators, and $A_{j,k}$ are the corresponding amplitudes. The state of interest is that nearest threshold for which $\Delta E_{j,k}\to 0$ as $\lambda \to 0$. This is labeled by $k=\thr$. The procedure developed in Ref.~\cite{Hansen:2015zta} for picking out its energy is to first calculate $C_2(\tau)$ and $C_3(\tau)$ order by order in perturbation theory, then remove by hand exponentially growing or falling contributions. The resulting subtracted correlators have the form \begin{equation} C_{j,\thr}(\tau) = \CZZ j + \tau \big [ \CTT j \big ] + {\cal O}(\tau^2)\,. \label{eq:Cjexpand} \end{equation} Finally, the shift of the desired energy from threshold is given by \begin{equation} \Delta E_{j,\thr} = - \frac{\CTT j}{\CZZ j}\,. \label{eq:DeltaEmethod} \end{equation} The justification for this method is explained in Ref.~\HSPT. The perturbative expansions of the quantities appearing in this expression are\footnote{% Here I am expanding in the renormalized coupling, whereas the corresponding expansions in Ref.~\cite{Hansen:2015zta} were in powers of the bare coupling. For the sake of brevity, I continue to use the same notation for the expansion coefficients, although the values of these coefficients differ.} \begin{align} \CZZ j &= 1 + \sum_{n=1}^\infty \lambda^n \CZ j n \,, \label{eq:Cjthr0exp} \\ \CTT j &= \sum_{n=1}^\infty \lambda^n \big [\CT j n \big ] \,, \label{eq:Cjthr1exp} \\ \Delta E_{j,\thr} &= \sum_{n=1}^\infty \lambda^n \Delta E_{j,\thr}^{(n)} \,. \label{eq:DeltaEexp} \end{align} Inserting these expansions into Eq.~(\ref{eq:DeltaEmethod}), the result for the fourth order term in $\Delta E_{j,\thr}$ is \begin{multline} \Delta E_{j,\thr}^{(4)} = - \CT j 4 + \CZ j 1 \big [\CT j 3 \big ] + \CZ j 2 \big [\CT j 2 \big ] + \CZ j 3 \big [\CT j 1 \big ]\\ - \big[\CZ j 1\big]^2 \big [\CT j 2\big ] - 2 \CZ j 1 \CZ j 2 \big [\CT j 1 \big ] + \big[\CZ j 1\big]^3 \big [\CT j 1 \big ] \,. \label{eq:DeltaE4} \end{multline} I calculate $\Delta E_{j,\thr}^{(4)}$ only up to order $1/L^6$ in the volume expansion. From Ref.~\cite{Hansen:2015zta} the leading $1/L$ behavior of the terms in Eq.~(\ref{eq:DeltaE4}) is known to be \begin{equation} \begin{gathered} \CZ j 2 \sim 1/L^2\,, \qquad \CZ j 1 \sim \big[\CT j 1\big] \sim 1/L^3\,,\\ \big[\CT j 2 \big] \sim 1/L^4\,, \qquad \big[\CT j 3\big] \sim 1/L^5\,. \label{eq:CZj2} \end{gathered} \end{equation} Explicit examples are given below. Thus the only contributions that must be kept are \begin{equation} \Delta E_{j,\thr}^{(4)} = - \CT j 4 + \CZ j 2 \big [\CT j 2 \big ] + \CZ j 3 \big [\CT j 1 \big ] + {\cal O}(1/L^7)\,. \label{eq:DeltaE4fin} \end{equation} Since $\CZ j 2$, $\big[\CT j 2 \big]$ and $\big[\CT j 1\big]$ are determined in Ref.~\cite{Hansen:2015zta}, the only new quantities needed here are the $1/L^6$ contributions to $\big[\CT j 4\big]$ and the $1/L^3$ contributions to $\CZ j 3$. For both quantities these are the leading contributions in the $1/L$ expansion. \bigskip I now describe the results that I aim to check. The threshold expansion for the energy shift for two particles follows from the general formalism of Refs.~\cite{Luscher:1986n2,Luscher:1991n1}. It is worked out through $\cO(1/L^5)$ in Ref.~\cite{Luscher:1986n2} and the $1/L^6$ term is given in Ref.~\cite{Hansen:2015zta}. The result is \begin{equation} \Delta E_{2,\thr} = \frac{4 \pi a}{m L^3} \left\{ 1 - \left(\frac{a}{\pi L}\right)\cI + \left(\frac{a}{\pi L}\right)^2(\cI^2-\cJ) + \left(\frac{a}{\pi L}\right)^3\left[-\cI^3 + 3\cI \cJ - \cK\right] + \frac{2\pi r a^2}{L^3} - \frac{\pi a}{m^2 L^3} \right\} + \cO(L^{-7})\,, \label{eq:DE2gen} \end{equation} with $a$ the scattering length (defined to be positive for repulsive interactions), $r$ the effective range, and $\cI$, $\cJ$, $\cK$ are known sums over functions of integer vectors (see Appendix~\ref{app:sumint}). The result for the three-particle threshold energy is~\cite{Hansen:2016fzj}\footnote{% In the initial published version the coefficient of $\cK$ was $-9$, but this was corrected in an Erratum to $+15$~\cite{Hansen:2016fzj}.} \begin{multline} \Delta E_{3,\thr} = \frac{12 \pi a}{m L^3} \Bigg\{ 1 - \left(\frac{a}{\pi L}\right)\cI + \left(\frac{a}{\pi L}\right)^2(\cI^2+\cJ) + \frac{64 \pi^2 a^2 \cC_3}{mL^3} + \frac{3\pi a}{m^2 L^3} + \frac{6\pi r a^2}{L^3} \\ + \left(\frac{a}{\pi L}\right)^3\left[ -\cI^3 +\cI\cJ + 15 \cK + c_L \log(N_{\rm cut}) + \cC_F + \cC_4 + \cC_5 \right] \Bigg\} - \frac{\Mthr}{48 m^3 L^6} + \cO(L^{-7}) \,, \label{eq:DE3gen} \end{multline} where $N_{\rm cut}=mL/(2\pi)$, $c_L= 16 \pi^3 (\sqrt3-4\pi/3)$, and $\cC_F$, $\cC_3$, $\cC_4$ and $\cC_5$ are sums over integer vectors that are defined and evaluated in Ref.~\cite{Hansen:2016fzj}. The new amplitude entering at $\cO(1/L^6)$ is the divergence-free three-to-three threshold amplitude $\Mthr$, which begins at $\cO(\lambda^2)$ in perturbation theory. The numerical values of $\cC_3$, $\cC_4$ and $\cC_5$ depend on the choice of UV cutoff, but this dependence cancels with that of $\Mthr$. This cancelation is necessary because $\Delta E_{3,\thr}$ is a physical quantity. Since $a$ and $\lambda$ are proportional [Eq.~(\ref{eq:lambdadef})], the dependence of $\Delta E_{j,\thr}$ on $\lambda$ is manifest except for the terms involving $r$ and $\Mthr$. To make the perturbative expansion clearer I rewrite $r$, using its definition, as \begin{equation} 32 \pi m^3 r a^2 \equiv - \lambda - 2 \cK'_{2,s,\thr} \,, \end{equation} where \begin{equation} \cK'_{2,s,\thr} \equiv m^2 \frac{d \cK_{2,s}}{d q^2} \bigg|_{\thr} \,, \label{eq:Kprime} \end{equation} Here $\cK_{2,s}$ is the two-particle s-wave K matrix, and $q$ is the momentum of each particle in the two-particle CM frame. The perturbative series for $\cK'_{2,s,\thr}$ and $\Mthr$ both begin at $\cO(\lambda^2)$: \begin{equation} \cK'_{2,s,\thr} = \sum_{n=2}^\infty \lambda^n \cK'^{(n)}_{2,s,\thr}\,, \qquad \Mthr = \sum_{n=2}^\infty \lambda^n \Mthr^{(n)} \,. \end{equation} Combining these results, the predictions above imply that the fourth-order terms are \begin{align} \Delta E_{2,\thr} ^{(4)} &= \frac{1}{2^{18}\pi^6 m^5 L^6} \left[ -\cI^3 + 3\cI \cJ - \cK \right] - \frac{\cK'^{(3)}_{2,s,\thr}}{2^6 m^5 L^6} + \cO(L^{-7}) \,, \label{eq:DE24} \\ \Delta E_{3,\thr}^{(4)} &= \frac{3}{2^{18}\pi^6 m^5 L^6} \left[ -\cI^3 +\cI\cJ + 15 \cK + c_L \log(N_{\rm cut}) + \cC_F + \cC_4 + \cC_5 \right] - \frac{9 \cK'^{(3)}_{2,s,\thr}}{2^6 m^5 L^6} - \frac{\Mthr^{(4)}}{48 m^3 L^6} + \cO(L^{-7}) \,. \label{eq:DE34} \end{align} In order to separate out effects that are particular to the three-particle case, it is convenient to consider the difference \begin{equation} \Delta_{32} = \Delta E_{3,\thr} - 9 \Delta E_{2,\thr} = \sum_{n=2}^\infty \lambda^n \Delta_{32}^{(n)} \,, \end{equation} for which the fourth-order coefficient is predicted to be \begin{equation} \Delta_{32}^{(4)} = \frac{3}{2^{18}\pi^6 m^5 L^6} \left[ 2\cI^3 - 8\cI\cJ+18\cK + c_L \log(N_{\rm cut}) + \cC_F + \cC_4 + \cC_5 \right] - \frac{\Mthr^{(4)}}{48 m^3 L^6} + \cO(L^{-7}) \,. \label{eq:DE324} \end{equation} Note that the effective range has canceled from this expression. To motivate the definition of $\Delta_{32}$, I recall from Ref.~\cite{Hansen:2015zta} that the three-particle correlators can be split into a ``connected'' part, containing contributions in which the Feynman diagram connects all three particles, a ``disconnected'' part in which one particle is a spectator (possibly having self-energy insertions) and the other two are connected, and the fully disconnected remainder (which does not lead to power-law finite-volume effects). Since there are three possible two-particle pairs in a three-particle system, the following relations hold for all $n$, \begin{equation} C^{(n)}_{3,\thr,\disc}(0) = 3\, \CZ 2 n\,, \qquad \partial_\tau C^{(n)}_{3,\thr,\disc}(0) = 3\, \CT 2 n\,. \end{equation} As noted in Ref.~\cite{Hansen:2015zta}, for $n=1$ and $2$, connected contributions to $C_3$ do not begin until $\cO(1/L^6)$, so that \begin{align} \CZ 3 n &= 3\, \CZ 2 n + \cO(L^{-6}) & (n=1,2) \,. \label{eq:CZ32rel} \end{align} while the low order contributions to the connected part of $\CZ 3 {n}$ satisfy \begin{equation} \partial_\tau C^{(1)}_{3,\thr,\conn}(0) = 0 \,,\qquad \partial_\tau C^{(2)}_{3,\thr,\conn}(0) = \cO(L^{-6})\,. \end{equation} Combining these results yields \begin{equation} \Delta_{32}^\four = -\partial_\tau C^{(4)}_{3,\thr,\conn}(0) + 3 \, \CZcon 3 3 \CT 2 1+ 6\, \CT 2 4 + \cO(L^{-7}) \,. \label{eq:D32calc} \end{equation} showing that several two-particle quantities have canceled in the difference. To summarize the previous discussion, the new quantities that are needed to determine $\Delta E_{3,\thr}^{(4)}$ are $\CZ 2 3$, $\CT 2 4$, $\CTcon 3 3$ and $\CTcon 3 4$. Once these quantities have been calculated it requires no extra work to determine the result for $\Delta E_{2,\thr}^\four$. Having done so, it is convenient to consider $\Delta_{32}^\four$ instead of $\Delta E_{3,\thr}^{(4)}$. Breaking up the calculation in this way also proved useful in practice for tracking down errors. \bigskip The calculation of the finite-volume correlation functions proceeds as in Ref.~\HSPT. Propagators are written in their time-momentum form, i.e. $\exp(-|\Delta t| \omega_p)/(2 \omega_p)$ with $\omega_p=\sqrt{m^2 + p^2}$ and $p=|\vec p|$. The integrals over the vertex times, $\tau_i$, are then straightforward but tedious.\footnote{% I use Mathematica to do these integrals, and have found that doing more than two integrals at once can lead to incorrect results. Thus all integrals are done stepwise, with numerical checks at each stage.} This leaves a sum over momenta of a summand that is, in general, quite complicated. For the sake of brevity, I do not display these summands except in a few cases.\footnote{% Expressions for all integrands or summands are available upon request from the author.} The sums are always UV finite after inclusion of counterterms. There are up to three loop-momenta in the diagrams considered. At this stage the sums are replaced by integrals plus a volume-dependent difference. The general analysis of Refs.~\cite{Luscher:1986n2,Kim:2005,Hansen:2015zta}, implies that the sum-integral difference is exponentially suppressed in $L$ (typically as $e^{-m L}$) except for loops in which intermediate particles can go on shell. Such loops have summands that diverge in the IR, and the results collected in Appendix~\ref{app:sumint} can be used to pull out the dominant volume dependence. What is left is a finite integral that is, in the present calculation, at most of two-loop order. Such integrals can easily be evaluated numerically. The tests presented here also requires a two-loop calculation of the scattering length and the three-particle subtracted threshold amplitude, $\Mthr$. These are infinite-volume quantities where the calculations are most easily done using standard momentum-space Feynman rules and dimensional regularization. The calculations are outlined in Appendix~\ref{app:K}. \section{Determining $\Delta E_{2,\thr}^{(4)}$.} \label{sec:DE24} In this section I calculate the $\lambda^4$ contribution to $\Delta E_{2,\thr}$. Given the form of the expected answer, I write \begin{equation} \Delta E_{2,\thr}^\four = \frac{a_{2}^\four}{2^{18} \pi^6 m^5 L^6} + \cO(L^{-7})\,, \label{eq:a24def} \end{equation} and quote results for $a_2^\four$. I begin by collecting results from Ref.~\cite{Hansen:2015zta} that are needed in order to evaluate $\Delta E_{2,\thr}^{(4)}$ using Eq.~(\ref{eq:DeltaE4fin}):\footnote{% The results in Eq.~(\ref{eq:CZT22}) look different from those given in Eqs.~(27) and (28) of Ref.~\cite{Hansen:2015zta} because here I expand in the renormalized rather than the bare coupling. In particular, terms proportional to $A_2/L^3$ present in Ref.~\cite{Hansen:2015zta} are canceled here by contributions from the $\mathcal O(\lambda^2)$ counterterm.} \begin{align} \CZ 2 1 &= -\frac1{16 m^3 L^3}\,, &\CT 2 1 = - \frac{1}{8 m^2 L^3} \,, \label{eq:CZT21} \\ \CZ 2 2 &= \frac{\mathcal I}{2^8 \pi^2 m^3 L^4} + {\cal O}(L^{-6})\,, &\CT 2 2 = - \frac{\mathcal J}{2^{10} \pi^4 m^2 L^2} + {\cal O}(L^{-3})\,, \label{eq:CZT22} \end{align} Using these results one can immediately determine the $\CZ 2 2 \CT 2 2$ contribution in Eq.~(\ref{eq:DeltaE4fin}), leading to\footnote{% Here and in the following I use the proper superset symbol $\supset$ to indicate individual contributions to quantities (with the quantity here being $a_2^\four$). In the course of the calculation I determine all contributions of the desired order and collect them in a final result.} \begin{equation} a_2^\four \supset - I J \label{eq:DE24term22} \end{equation} What remains is to calculate $\CZ 2 3$ and $\CT 2 4$. \subsection{Calculating $\CZ 2 3$} \label{sec:CZ23} \begin{figure}[tbh] \begin{center} \vskip -.2truein \includegraphics[scale=0.5]{fig1.pdf} \vskip -4.2truein \caption{Feynman diagrams contributing to $C_2(\tau)$ at $\mathcal O (\lambda^3)$. Solid squares are vertex counterterms, with the number indicating the power of $\lambda$. External particles have zero three-momentum. Diagrams related by vertical or horizontal reflection are not shown explicitly. Interpreted as contributions to the infinite-volume scattering amplitude, these are the diagrams required to calculate the two-loop counterterms in Appendix~\ref{app:counter}, and the two-loop K matrix in Appendix~\ref{app:K}. The momentum labels in (f) and (g) are used in the latter calculation. Time runs from left to right in both applications. } \label{fig:C2lam3} \end{center} \end{figure} The diagrams needed to calculate $\CZ 2 3$ are shown in Fig.~\ref{fig:C2lam3}. Since $\CZ 2 3$ appears in Eq.~(\ref{eq:DeltaE4fin}) multiplied by $\CT 2 1={\cal O}(L^{-3})$, $\CZ 2 3$ itself is needed only up to ${\cal O}(L^{-3})$. \subsubsection{SS diagram} I begin by determining the contribution of Fig.~\ref{fig:C2lam3}(d), together with the $A_{2s}$ contribution to Fig.~\ref{fig:C2lam3}(b), plus its horizontal reflection, and the $A_{3ss}$ contribution to Fig.~\ref{fig:C2lam3}(a). I label the left- and right-hand loop momenta $p$ and $q$, respectively. If both momenta vanish then the contribution is of $\cO(L^{-9})$, well below the order of interest. Contributions of $\cO(L^{-3})$ do arise, however, if one or both momenta are nonzero. Consider first the case in which one momentum vanishes, say $q$. Then it is possible for all three time integrals to give factors of $1/p^2$, each arising from integrals of the form \begin{equation} \int_{\tau_i}^{\tau_k} d\tau_j \, e^{-(\tau_k-\tau_j) 2(\omega_p-m)} \propto \frac{1-e^{-(\tau_k-\tau_i) 2 (\omega_p-m)}}{2(\omega_p-m)} \sim \frac{1}{p^2}\,. \end{equation} Explicit evaluation (including a factor of $2$ from the fact that either loop momentum can vanish) yields \begin{align} \CZ 2 3 &\supset - \frac{1}{2^8m^3 L^9} \sum_{\vec p\ne 0} \frac1{p^6} \left[1 + \mathcal O(p^2) \right] \\ &= -\frac{\mathcal K}{2^{14} \pi^6 m^3 L^3}\left[1 + \mathcal O(L^{-1}) \right] \,, \end{align} Here I have kept only the most singular part of the summand, since less singular terms contribute at subleading order in $L^{-1}$. To obtain the second line I have used Eq.~(\ref{eq:Kdef}). Note that, although a sum over $p$ usually absorbs a single factor of $L^{-3}$ (in order to become an integral), the presence of the $1/p^6$ IR divergence means that a factor of $L^{-6}$ is absorbed. This brings the contribution up to the desired order. If both loop momenta are nonvanishing, the summand is simple and so I display the complete result: \begin{align} \CZ 2 3 &\supset \frac{1}{2^9 m^3 L^3} \Bigg\{ \frac1{L^3}\sum_{\vec p\ne 0}\frac{m^2}{\omega_p p^4} \left[\frac1{L^3}\sum_{\vec q\ne 0} \!-\!\int_q\right]\frac1{\omega_q q^2} + (p\leftrightarrow q) - \frac12 \left[\frac1{L^3}\sum_{\vec p\ne 0}\! -\!\int_p\right]\frac1{\omega_p p^2} \left[\frac1{L^3}\sum_{\vec q\ne 0} \!-\!\int_q\right]\frac1{\omega_q q^2}\Bigg\} \label{eq:C30SS} \\ &= \frac{\cI\cJ}{2^{14} \pi^6 m^3 L^3}\left[1 + \mathcal O(L^{-1}) \right] \,. \end{align} To obtain the second line I have used Eqs.~(\ref{eq:Idef}) and (\ref{eq:Jdef}). Note that the maximal degree of IR divergence is the same as for when one momentum vanishes, but now the divergence is split between $p$ and $q$. The final term in Eq.~(\ref{eq:C30SS}) has a lower degree of IR divergence, and gives a subleading contribution. \subsubsection{Remaining diagrams} The TT diagram, Fig.~\ref{fig:C2lam3}(e), combines with the $A_{2t}$ contribution to Fig.~\ref{fig:C2lam3}(c), and the $A_{3tt}$ contribution to Fig.~\ref{fig:C2lam3}(a). In this case, the absence of physical cuts allows the replacement of sums with integrals. The combined integrand, including counterterms, is UV and IR convergent: \begin{align} \CZ 2 3 &\supset - \frac1{2^{12} \pi^4 m^3 L^3} I^{\rm TT}\,, \label{eq:TT} \\ I^{\rm TT} &=8 \pi^4 \int_p \int_q \frac{m^3}{\omega_p^3 (\omega_p+m) \omega_q^3(\omega_q+m)(\omega_p+\omega_q)} = \frac{2(\pi-3)}{3} \,. \label{eq:ITT} \end{align} The SU diagram of Fig.~\ref{fig:C2lam3}(f) combines with the $A_{2s}+A_{2u}$ contribution to Fig.~\ref{fig:C2lam3}(c), and the $A_{3su}$ contribution to Fig.~\ref{fig:C2lam3}(a). Again, sums can be replaced by integrals, leading to \begin{align} \CZ 2 3 &\supset - \frac1{2^9 \pi^4 m^3 L^3} I^{\rm SU}\,, \qquad I^{\rm SU} = {0.0396563} \,. \label{eq:ISU} \end{align} I only give the result of numerical integration, since the integrand is long and uninformative. Finally, the ST diagram, Fig.~\ref{fig:C2lam3}(e), combines the $A_{2t}+A_{2u}$ contribution to Fig.~\ref{fig:C2lam3}(b), and the $A_{3st}$ contribution to Fig.~\ref{fig:C2lam3}(a), together with their horizontal reflections. The total contribution only scales as $1/p^2$ in the IR, with no IR divergence in $q$. Thus both sums can be replaced by integrals up to corrections of relative size $L^{-1}$, leading to \begin{align} \CZ 2 3 &\supset - \frac{I^{\rm ST}}{2^9 \pi^4 m^3 L^3} \,,\qquad I^{\rm ST} = 0.099447 \,. \label{eq:ST} \end{align} \subsubsection{Total contribution to $\Delta E_{2,\thr}^\four$} \begin{comment} The total contribution is thus \begin{align} \CZ 2 3 &\supset \frac{(\mathcal I\mathcal J - \mathcal K)}{2^{14} \pi^6 m^3 L^3} -\frac{0.3018}{2^{10} \pi^4 m^3 L^3} \,. \end{align} \end{comment} Multiplying the above results by $\CT 2 1$ from Eq.~(\ref{eq:CZT21}) yields \begin{align} a_2^\four&\supset -2\cI \cJ + 2 \cK + 2^6 \pi^2 (I^{\rm ST}+\tfrac18 I^{\rm TT} +I^{\rm SU}) \,. \label{eq:DECT3} \end{align} \subsection{Contribution of $\CT 2 4$} \label{sec:CT24} \begin{figure*}[tbh] \begin{center} \includegraphics[scale=0.5]{fig2.pdf} \vskip -3 truein \caption{Subset of Feynman diagrams contributing $C_2(\tau)$ at $\mathcal O (\lambda^4)$. Notation as in Fig.~\ref{fig:C2lam3}. Figures (b)-(k) show all the diagrams (aside from reflections, and additional placements of counterterms) for which there is a two-particle cut. Figure (l) shows a single example of the many diagrams without such cuts. See text for further discussion.} \label{fig:C2lam4} \end{center} \end{figure*} In this section I calculate the contribution to $a_2^\four$ from $\CT 2 4$. A large number of diagrams contribute to $\CT 2 4$, a subset of which is shown in Fig.~\ref{fig:C2lam4}. I first describe some general properties of the contributions of these diagrams {\em if all loop momenta are nonzero}. In this case, a term linear in $\tau$ arises only from a configuration in which all vertices lie close in time and are integrated as a group over the full time interval. Configurations in which some vertices are separated by $\cO(\tau)$ are exponentially suppressed. Thus the contribution to $\CT 2 4$ arises from two particles at rest propagating freely between $0$ and $\tau$, except for a single quasilocal interaction. From this one can show that, as $L\to\infty$, the leading volume dependence of $\CT 2 4$ has the form $c/(8 m^2 L^3) $, where $c$ is the contribution of the diagram (now viewed as an infinite-volume scattering diagram) to the scattering amplitude at threshold, $\cM_{2,\thr}$.\footnote{% Indeed, this is exactly the form that arises at tree level, where $\lambda \CT 2 1= -\lambda/(8 m^2 L^3)$.} Note that, when taking the $L\to\infty$ limit, all sums are replaced by integrals, $(1/L^3)\sum_{\vec p} \to \int_p$. \begin{comment} To show this in detail one uses the results of Ref.~\HSQCb\ to relate the correlation function to a ``finite-volume scattering amplitude" whose infinite-volume limit is the physical scattering amplitude. This relation requires amputation, which is what is achieved by the overall factors in the definition of $C_2(\tau)$ and the $-1/(8 L^3)$ factor in $\CT 2 4$. \end{comment} This result has two important consequences. The first is practical: it allows the determination of the integrand of $\cM_{2,\thr}$ from the summand appearing in $\CT 2 4$ on a diagram by diagram basis. The prescription is simply to multiply the summand by $8 m^2 L^{12}$. Here the factor of $8 m^2 L^3$ noted above is multiplied by $L^9$ due to the conversion of three momentum sums into integrals. I use this result to calculate the counterterms quoted in Appendix~\ref{app:counter}. The second consequence is that the constant $c$ vanishes when each three-loop diagram is combined with the corresponding counterterms. This is because the $\cO(\lambda^4)$ contributions to $\cM_{2,\thr}$ vanish in the renormalization scheme I use. (Indeed, the only contribution is of $\cO(\lambda)$.) Since $c$ is obtained by replacing momentum sums with integrals, it follows that all finite-volume corrections arise from sum-integral differences. I stress again that this argument holds for the case in which all loop momenta are nonvanishing. From this result follows a key simplification in the calculation of $\CT 2 4$: only diagrams containing two-particle cuts can contribute. These are the diagrams shown in Figs.~\ref{fig:C2lam4}(f)-(k). For diagrams without such cuts, such as Fig.~\ref{fig:C2lam4}(l), sum-integral differences are exponentially suppressed and do not lead to power law volume dependence. Furthermore, for diagrams without cuts, the cases in which loop momenta vanish do not require separate consideration, as there are no IR divergences. For the diagrams with two-particle cuts, one must also consider the cases in which one or more loop momenta vanish. In these cases the summands are not related to integrands of $\cM_{2,\thr}$, do not vanish, and must be calculated explicitly. If one loop momentum vanishes, then the contribution is of $\cO(L^{-6})$ if the other loop sums are replaced by integrals.\footnote{% It is possible in principle that IR divergences could reduce the power of $1/L$, but this does not occur in practice.} If two loop momenta vanish then the contribution begins at $\cO(L^{-9})$ and can be raised to the desired $L^{-6}$ behavior only if there is a $1/p^6$ IR divergence. This only occurs for Fig.~\ref{fig:C2lam4}(f). If all three loop momenta vanish, then the contribution is of $\cO(L^{-12})$ and can be dropped. I now consider Figs.~\ref{fig:C2lam4}(f)-(k) in turn, calling them, respectively, the SSS, SST, STS, STT, SSU and TST diagrams. \subsubsection{SSS diagram} Figure.~\ref{fig:C2lam4}(f) combines with the $A_{4sss}$ part of Fig.~\ref{fig:C2lam4}(a), the $A_{3ss}$ part from Fig.~\ref{fig:C2lam4}(b), the $A_{2s}^2$ part from Fig.~\ref{fig:C2lam4}(c) and the $A_{2s}$ part from Fig.~\ref{fig:C2lam4}(d). I find \begin{align} \CT 2 4 &\supset \frac{\cI^3 - 6\cI \cJ + 3\cK}{2^{18}\pi^6 m^5 L^6} \,, \label{eq:SSS} \end{align} with the three terms arising, respectively, from having zero, one and two nonzero loop momenta. \subsubsection{SST diagram} Next I consider Fig.~\ref{fig:C2lam4}(g), together with the $A_{4sst}$ contribution to Fig.~\ref{fig:C2lam4}(a), the $A_{3st}$ contribution to Fig.~\ref{fig:C2lam4}(b), the $A_{2s} (A_{2t}+A_{2u})$ contribution to Fig.~\ref{fig:C2lam4}(c), the $A_{2t}+A_{2u}$ contribution to Fig.~\ref{fig:C2lam4}(d), and the $A_{2s}$ contribution to Fig.~\ref{fig:C2lam4}(e). The sum over the momenta in the rightmost loop can always be converted to an integral since the summand is nonsingular. Thus at most one of the remaining loops can have vanishing momenta. I describe the calculations in some detail. If all three loop momenta are nonvanishing, contributions arise from (a) a sum-integral difference on the left loop (with the other loops integrated), (b) a sum-integral difference on the central loop (with other loops integrated), and (c) sum-integral differences on left and central loops (with the rightmost loop integrated). I find by explicit calculation that the summands/integrands for the first two cases vanish identically. The explicit expression for case (c) is (including the horizontal reflection): \begin{align} \CT 2 4 &\supset \frac1{2^{10} L^3} \left\{\left[\frac1{L^3} \sum_{\vec p \ne 0}-\int_p\right] \frac{1}{\omega_p\vec p^2}\right\} \left\{ \left[\frac1{L^3}\sum_{\vec k\ne 0} -\int_k\right] \frac{1}{\omega_k\vec k^2} \int_q \frac{f^{\rm SST}(\vec k,\vec q)}{\omega_q^3} \right\}\,, \label{eq;C24g2} \\ f^{\rm SST}(\vec k, \vec q)& = -1 + \frac{2\omega_q^2 (\omega_k+W_{qk})}{\omega_{qk}(W_{qk}^2-1)} \,, \end{align} where $W_{qk}=\omega_q+\omega_k+\omega_{qk}$ and $\omega_{qk}^2 = m^2 +(\vec q + \vec k)^2$. A key result is that $f^{SST}(0, \vec q)=0$. Using Eq.~(\ref{eq:Idef}), one sees that the expression in the left-hand curly braces is proportional to $1/L$, while that in the right-hand curly braces is proportional to $1/L^3$, so that the overall contribution to $\CT 2 4$ is proportional to $1/L^7$ and can be dropped. If the leftmost loop momentum vanishes, it turns out that the central loop has an integrable $1/k^2$ IR divergence. Replacing the central momentum sum with an integral [valid up to corrections of $\cO(L^{-1})$], and including the horizontal reflection, yields the result \begin{align} \CT 2 4 &\supset \frac{I^{\rm SST0}}{2^{13} \pi^4 m^5 L^6}\,, \quad I^{\rm SST0}=0.19889\,. \label{eq:SST0} \end{align} Here $I^{\rm SST0}$ is a UV convergent two-loop integral of a lengthy expression that I evaluate numerically. I note that the relation $I^{\rm SST0}=2 I^{\rm ST}$ holds numerically. If the central loop momentum vanishes, then, if the left-hand momentum sum is replaced by an integral, the result vanishes identically. It follows that there is no $\cO(L^{-6})$ contribution to $\CT 2 4$. \subsubsection{STS diagram} Figure~\ref{fig:C2lam4}(h) combines with Fig.~\ref{fig:C2lam4}(d) (in which the $A_{2t}+A_{2u}$ counterterm is placed on the middle vertex), as well as the $A_{3st}$ contribution to Fig.~\ref{fig:C2lam4}(b) (together with its reflection) and the $A_{4sts}$ contribution to Fig.~\ref{fig:C2lam4}(a). The central loop sum can always be converted to an integral without power-law volume corrections. If both of the outer loop momenta are nonzero, I find (with $\vec p$ and $\vec k$ the momenta in the outer loops, and $\vec q$ the central momentum) \begin{align} \CT 2 4 &\supset \frac1{2^{11} m^2 L^3} \left[\frac1{L^3} \sum_{\vec p \ne 0}- \int_p\right] \left[\frac1{L^3} \sum_{\vec k\ne 0}-\int_k\right] \frac{1}{\vec p^2 \vec k^2} \int_q f^{\rm STS1}(\vec p, \vec k, \vec q) \nonumber \\ &\quad+ \frac1{2^{10} m^2 L^3} \left[\frac1{L^3} \sum_{\vec p \ne 0}- \int_p\right] \frac{1}{\vec p^2 } \int_k \int_q f^{\rm STS2}(\vec p, \vec k,\vec q) \,. \label{eq:C24h4} \end{align} The relevant properties of the functions $f^{\rm STS1}$ and $f^{\rm STS2}$ will be given below. To study the first term in Eq.~(\ref{eq:C24h4}), I introduce \begin{equation} g^{\rm STS1}(\vec p^{\,2}, \vec k^{\, 2}, \vec p\cdot \vec k) = \int_q f^{\rm STS1}(\vec p, \vec k, \vec q) \,, \end{equation} where the form of the arguments of $g^{ \rm STS1}$ is determined by rotation invariance. Generalizing the analysis leading to Eq.~(\ref{eq:Idef}) gives \begin{multline} \left[\frac1{L^3} \sum_{\vec p \ne 0}- \int_p\right] \left[\frac1{L^3} \sum_{\vec k\ne 0}-\int_k\right] \frac{g(\vec p^{\,2},\vec k^{\,2}, \vec p \cdot \vec k)}{\vec p^2 \vec k^2} = \left(\frac{\mathcal I}{4\pi^2 L}\right)^2 g(0,0,0) - \frac{\mathcal I}{4 \pi^2 L^4} \left[\frac{\partial}{\partial p^2}+\frac{\partial}{\partial k^2}\right] g\Bigg|_{\vec p=\vec k=0} + {\cal O}(1/L^6) \,. \end{multline} Using the result $g^{\rm STS1}(0,0,0) = 0$, which follows from the renormalization condition, I find that the leading finite-volume term is proportional to $L^{-7}$. Turning to the second term in Eq.~(\ref{eq:C24h4}), I introduce \begin{equation} g^{\rm STS2}(\vec p^{\,2}) = \int_k\int_q f^{\rm STS2}(\vec p, \vec k,\vec q) \,, \end{equation} which is a function of $\vec p^{\,2}$ by rotation invariance. Using \begin{equation} g^{\rm STS2}(0)= 0\,, \qquad {g^{\rm STS2}}'(0) = \frac{I^{\rm STS}}{8 m^3 \pi^4}\,, \quad I^{\rm STS} = -0.37115\,, \end{equation} together with Eq.~(\ref{eq:Idef}), the second term in Eq.~(\ref{eq:C24h4}) contributes \begin{align} \CT 2 4 &\supset \frac{-I^{\rm STS}}{2^{13} \pi^4 m^5 L^6} \,. \label{eq:STS} \end{align} If one or other of the outer momenta vanishes, then I find \begin{align} \CT 2 4 &\supset \frac{I^{\rm STS0}}{2^{13} \pi^4 m^5 L^6}\,,\qquad I^{\rm STS0} =I^{\rm SST0} \,, \label{eq:STS0} \end{align} where the latter equality holds to numerical precision. \subsubsection{STT diagram} Figure~\ref{fig:C2lam4}(i) combines with the $A_{2t}$ contribution to Fig.~\ref{fig:C2lam4}(e) (with the counterterm on the two right-hand vertices), the $A_{3tt}$ contribution to Fig.~\ref{fig:C2lam4}(b) and the $A_{4stt}$ contribution to Fig.~\ref{fig:C2lam4}(a). The sums over momenta in the right-hand loops can be converted to integrals. If no loop momenta vanish then the result, including the horizontal reflection, is \begin{align} \CT 2 4 &\supset \frac1{2^{10}m^3L^3} \left[\frac1{L^3}\sum_{p\ne 0}-\int_p\right] \frac{f^{\rm STT}(p^2)}{p^2}\,, \\ f^{\rm STT}(0) &= 0\,, \qquad\qquad {f^{\rm STT}}'(0) = \frac{I^{\rm TT}}{32 \pi^4}\,. \end{align} Using Eq.~(\ref{eq:Idef}), this yields \begin{align} \CT 2 4 &\supset -\frac{I^{\rm TT}}{2^{15} \pi^4 m^5L^6} \,. \label{eq:STT} \end{align} If the left-hand loop momentum vanishes, I find \begin{align} \CT 2 4 &\supset \frac{I^{\rm TT}}{2^{14} \pi^4 m^5 L^6} \,, \label{eq:STT0} \end{align} with $I^{\rm TT}$ given in Eq.~(\ref{eq:ITT}). \subsubsection{SSU diagram} Figure~\ref{fig:C2lam4}(j) combines with the $A_{2s}+A_{2u}$ contributions on the right-hand vertices in Fig.~\ref{fig:C2lam4}(e), the $A_{3su}$ contribution in Fig.~\ref{fig:C2lam4}(b) and the $A_{4ssu}$ counterterm in Fig.~\ref{fig:C2lam4}(a). The fact that $A_{2u}$ contributes is not obvious but can be understood by a careful accounting of the Wick contractions. Momentum sums in the two right-hand loops can be replaced by integrals. I label the momenta in these loops $q$ and $k$, while that in the left-hand loop is denoted $p$. This is the most tedious of the diagrams to calculate. If $\vec p\ne 0$ then the contribution takes the form \begin{align} \CT 2 4 &\supset \frac1{2^8 m^5 L^3} \left[\frac1{L^3}\sum_{\vec p\ne 0}-\int_p\right] \frac1{p^2} \int_{q,k} g^{\rm SSU}(\vec p, \vec q, \vec k) \,. \end{align} Using the fact that $g^{\rm SSU}$ vanishes when $\vec p=0$ (which again follows from the renormalization condition), expanding $g^{\rm SSU}$ in powers of $\vec p$, and using Eq.~(\ref{eq:Idef}), I find \begin{align} \CT 2 4 &= - \frac1{2^{11} \pi^4 m^5 L^6} {I^{\rm SSU}}\,,\qquad I^{\rm SSU} = 0.156906 \,. \label{eq:ISSU} \end{align} If $\vec p=0$, the result is \begin{align} \CT 2 4 &= \frac1{2^{11} \pi^4 m^5 L^6} {I^{\rm SU}}\,, \label{eq:SSU0} \end{align} where $I^{\rm SU}$ is given in Eq.~(\ref{eq:ISU}). \subsubsection{TST diagram} The final diagram is the boxlike Fig.~\ref{fig:C2lam4}(k), which is combined with the $A_{2t}+A_{2u}$ contribution to Fig.~\ref{fig:C2lam4}(e) and the $(A_{2t}+A_{2u})^2$ contribution to Fig.~\ref{fig:C2lam4}(c). The sums over the outer momenta can be replaced by integrals. If the central loop momentum (denoted $\vec p$) is nonvanishing, I find \begin{align} \CT 2 4 &\supset \frac1{2^{10}m^5 L^3} \left[\frac1{L^{3}} \sum_{p\ne 0} - \int_p\right] \frac{f^{\rm TST}(p^2)}{p^2}\,, \\ f^{\rm TST}(0)&=0\,,\qquad f^{\rm TST'} = \frac{I^{\rm TT}}{32 \pi^4}\,. \end{align} Using Eq.~(\ref{eq:Idef}) then yields \begin{align} \CT 2 4 &\supset - \frac{I^{\rm TT}}{2^{15}m^5 L^6} \,. \label{eq:TST} \end{align} If $\vec p=0$, the result is \begin{align} \CT 2 4 &\supset \frac{I^{\rm TT}}{2^{15} m^5 L^{6}} \,. \label{eq:TST0} \end{align} Thus the total contribution from this diagram vanishes. \subsubsection{Total contribution to $\Delta E_{2,\thr}^{(4)}$} Combining the results from Eqs.~(\ref{eq:SSS}), (\ref{eq:SST0}), (\ref{eq:STS}), (\ref{eq:STS0}), (\ref{eq:STT}), (\ref{eq:STT0}), (\ref{eq:ISSU}), (\ref{eq:SSU0}), (\ref{eq:TST}) and (\ref{eq:TST0}), I obtain \begin{align} a_2^\four &\supset -\mathcal I^3 + 6 \mathcal I \mathcal J - 3 \mathcal K -2^{5}\pi^2 \left(I^{\rm SST0}- I^{\rm STS} +I^{\rm STS0}+\tfrac14 I^{\rm TT}-4 I^{\rm SSU} +4 I^{\rm SU}\right) \,. \label{eq:CT24tot} \end{align} \subsection{Mass and wave-function renormalization} \label{sec:renorm2} \begin{figure}[tbh] \begin{center} \includegraphics[scale=0.5]{fig3.pdf} \vskip -4truein \caption{Examples of Feynman diagrams contributing to $\CT 2 4$ involving mass and wave-function renormalization subdiagrams. Mass and wave-function counterterms are indicated by filled boxes.} \label{fig:renorm} \end{center} \end{figure} Both $\CZ 2 3$ and $\CT 2 4$ receive contributions from many diagrams involving mass and wave-function renormalization parts. Examples are shown in Fig.~\ref{fig:renorm}. In all cases loop sums can be replaced by integrals. As explained in Ref.~\HSPT, tadpole bubbles, such as those in Fig.~\ref{fig:renorm}(a), cancel identically with the corresponding counterterms, here shown in Fig.~\ref{fig:renorm}(d). For loop diagrams such as those in Figs.~\ref{fig:renorm}(b) and (c), however, the cancelation with the counterterms of Figs.~\ref{fig:renorm}(e) and (f) is not exact. When one constructs the renormalized propagator by the usual geometric sum, what remains are contact terms in position space. These, however, cannot go on shell, and thus cannot be cut, so loops involving them do not lead to finite-volume dependence. Instead, either they lead to contributions to the amplitudes $A_{j,k}$ [see Eq.~(\ref{eq:amps})] which thus cancel from $\Delta E_2$---exemplified by the case of Fig.~\ref{fig:renorm}(b)---or their contribution is canceled by coupling-constant counterterms---as is the case for Fig.~\ref{fig:renorm}(c). I have checked this explicitly for several examples. The net result is that this class of diagrams does not need to be considered. \subsection{Total result and comparison with expectation} Combining the results in Eqs.~(\ref{eq:DE24term22}), (\ref{eq:DECT3}) and (\ref{eq:CT24tot}) gives the final result for the two-particle energy shift \begin{align} a_2^\four &=-\cI^3 + 3 \cI \cJ - \cK -2^{5}\pi^2 \left(I^{\rm SST0} - 2 I^{\rm ST}- I^{\rm STS} +I^{\rm STS0}-4 I^{\rm SSU} + 2 I^{\rm SU}\right) \,. \label{eq:a24fin} \end{align} This should be compared to the result expected from the quantization condition, Eq.~(\ref{eq:DE24}), which yields \begin{align} a_2^\four &= -\cI^3 + 3\cI \cJ - \cK - 2^{12} \pi^6 \cK'^{(3)}_{2,s,\thr} \,. \label{eq:a24pred} \end{align} The coefficients of the geometric constants agree. For the remaining part the result for $\cK'^{(3)}_{2,s,\thr}$ from Appendix~\ref{app:K} is needed. Combining Eqs.~(\ref{eq:KSU}) and (\ref{eq:KST}), the result is \begin{equation} \cK'^{(3)}_{2,s,\thr} = \frac{I^{\rm STr}}{2^8 \pi^4} + \frac{I^{\rm SUr}}{2^6 \pi^4} \,. \end{equation} Agreement between Eqs.~(\ref{eq:a24fin}) and (\ref{eq:a24pred}) holds because of the numerical relations \begin{align} I^{\rm SST0} - 2 I^{\rm ST} - I^{\rm STS} + I^{\rm STS0} &= \tfrac12 I^{\rm STr} \,, \\ -4 I^{\rm SSU} + 2 I^{\rm SU} &= 2 I^{\rm SUr}\,. \end{align} From the point of view of the present calculation this agreement appears highly nontrivial, as the two sides of these equations are obtained in very different ways. I stress that the agreement holds separately for subsets of diagrams: the SSU contribution to $\CT 2 4$, combined with the SU contribution to $\CZ 2 3 \CT 2 1$ matches with $\cK'^{(3,su)}_{2,s,\thr}$, while the SST and STS contributions to $\CT 2 4$, combined with the ST contribution to $\CZ 2 3\CT 2 1$, matches with $\cK'^{(3,st)}_{2,s,\thr}$. This diagram-level matching holds also for the SSS, STT and TST classes of diagrams, where there is no contribution to $\cK'^{(3)}_{2,s,\thr}$. \section{Determining $\Delta_{32}^{(4)}$} \label{sec:DE34} In this section I calculate $\Delta_{32}^{(4)}$ in order to test the result (\ref{eq:D32calc}) obtained from the three-particle quantization condition. It is convenient to write \begin{equation} \Delta_{32}^{(4)} = \frac{3 a_3^\four}{ 2^{18} \pi^6 m^5 L^6} + \cO(L^{-7}) \end{equation} and quote results for $a_3^\four$. As shown in Eq.~(\ref{eq:DE324}), the calculation requires determining $\CT 2 4$, $\CZcon 3 3$ and $\CTcon 3 4$. The former was worked out in Sec.~\ref{sec:CT24}, and from Eq.~(\ref{eq:CT24tot}) I find \begin{align} a_3^\four\Big|_{\CT 2 4} &= 2\mathcal I^3 -12 \mathcal I \mathcal J +6 \mathcal K + 2^{6}\pi^2 \left(I^{\rm SST0}+ I^{\rm STS0} -I^{\rm STS}+\tfrac14 I^{\rm TT}+4 I^{\rm SU}-4 I^{\rm SSU} \right) \,. \label{eq:a34CT24} \end{align} In the following two subsections I calculate the other two required quantities. \subsection{Calculation of $\CZcon 3 3$} \label{sec:CZcon33} \begin{figure}[tbh] \begin{center} \includegraphics[scale=0.5]{fig4.pdf} \vskip -3.9truein \caption{Feynman diagrams for $\CZcon 3 3$ that give contributions of $\cO(L^{-3})$.} \label{fig:C33} \end{center} \end{figure} In order to give rise to an $\cO(L^{-6})$ contribution to $\Delta_{32}^\four$, $\CZcon 3 3$ must scale as $L^{-3}$. Since connected diagrams begin at $\cO(1/L^6)$, to reach the required dependence requires a $1/p^6$ IR divergence. This is possible in third order diagrams only if there is a time ordering of vertices in which all intermediate states contain only three particles (for each such intermediate state can yield a factor of $1/p^2$). This singles out the two diagrams shown in Fig.~\ref{fig:C33}, which I denote, following Ref.~\HSPT, as (a) the bull's head and (b) the s-channel fish diagram. The calculation is very straightforward as only one time ordering is required. The contribution from the bull's head diagram is \begin{align} \CZcon 3 3 &\supset - \frac{3}{2^7 m^3 L^9} \sum_{\vec p\ne 0} \frac{-2 + \cO(p^2)}{p^6} = \frac{3}{2^{13} \pi^6 m^3 L^3} (2 \cK) + \cO(1/L^4) \,, \end{align} while that from the s-channel fish (together with its horizontal reflection) is \begin{align} \CZcon 3 3 &\supset - \frac{3}{2^7 m^3 L^9} \sum_{\vec q\ne 0} \frac{1+ \cO(q^2)}{q^6} = \frac{3}{2^{13} \pi^6 m^3 L^3} (-\cK) + \cO(1/L^4) \,. \end{align} In both cases I have used Eq.~(\ref{eq:Kdef}). Combining these results and multiplying by $3\,\CT 2 1$ yields \begin{equation} a_3^\four\Big|_{\CZcon 3 3} = -12 \cK \,. \label{eq:a34CZ33} \end{equation} \subsection{Calculation of $\CTcon 3 4$} \label{sec:CTcon34} At $\cO(\lambda^4)$, connected three-particle diagrams contain two loops. A selection of the many such diagrams is shown in Figs.~\ref{fig:3part1}, \ref{fig:3part2} and \ref{fig:3part3}, including the subset that will need to be considered in detail. As for $\CT 2 4$, the diagrams have an initial volume scaling of $L^{-12}$. This can be raised to the desired $L^{-6}$ dependence either by converting two sums over intermediate momenta to integrals or by having a single loop sum that diverges in the IR as $1/p^6$. The latter case requires that the second loop momentum vanishes.\footnote{% This is the most IR singular summand possible at this order because, of the four integrals over the times of the vertices, one is needed to produce the factor of $\tau$, while each of the other three can lead to a factor of $1/p^2$.} As already noted above, to obtain the most singular IR divergence the diagram must be such that there is a time ordering in which all intermediate states involve three particles. The diagrams for which this holds are Figs.~\ref{fig:3part1}(a), (d) and (g), Fig.~\ref{fig:3part2}(a) and Fig.~\ref{fig:3part3}(a). If both loop momenta vanish then the contributions are proportional to $1/L^{12}$ and thus of too high order. When both loop momenta are nonzero, there are two further general results that simplify the calculations. The first is that, as for $\CT 2 4$, the vertex times, $\tau_i$, must satisfy $0 < \tau_i < \tau$. The second concerns the summand that remains after the time integrals are done (leaving only momentum sums). For $\CT 2 4$, this summand was proportional to the integrand of $\cM_{2}$ at threshold. Here, by a similar argument, one can show that the summand of a contribution to $\CTcon 3 4$, when multiplied by $48 m^3 L^{12}$, gives the integrand of $\cM_3$ at threshold.\footnote{% The factor of $48$ can be understood from the case of a local $\lambda_6\phi^6/6!$ interaction, for which $\cM_3=-\lambda_6$. The contribution to $\CTcon 3 4$ is then $-\lambda_6/[6 (2m)^3]$, with the $6$ arising from the numerator in ratio defining $\CT 3 4$, Eq.~(\ref{eq:C3def}), and the $(2m)^{-3}$ arising from the three propagators that are not canceled in this ratio.} This implies that if both loop sums can be replaced by integrals, which is allowed in the absence of IR divergences, then the diagram will give a contribution of the form\footnote{% In the remainder of this section the fact that there are contributions of $\cO(L^{-7})$ will not be noted explicitly.} \begin{equation} \CTcon 3 4 \supset \frac{\Mthr}{48 m^3 L^6} + \cO(L^{-7}) \,. \label{eq:standard} \end{equation} I will refer to this as the ``standard form" of contribution. Thus the only diagrams that need to be considered in detail are those containing IR divergences. These arise when the diagram has three-particle cuts. Thus, for example, Fig.~\ref{fig:3part1}(b) need not be considered, since it has no three-particle cuts and thus contributes only to the standard form, Eq.~(\ref{eq:standard}). All diagrams having three-particles cuts are included in Figs.~\ref{fig:3part1}, \ref{fig:3part2} and \ref{fig:3part3}, with the exception of those with self-energy insertions or that are one-particle reducible. The latter do not lead to nonstandard contributions and are discussed in Sec.~\ref{sec:remaining}. A further distinction allows a subset of the diagrams with three-particle cuts to be removed from consideration. If the IR divergence occurs inside a loop, then it must be stronger than $1/p^2$ in order for Eq.~(\ref{eq:standard}) to be invalidated, as such an IR divergence is integrable. Since each three-particle cut only leads to a $1/p^2$ divergence, this implies that, for diagrams in which the three-particle cuts run through loops, there must be at least two such cuts in order to obtain a result different from Eq.~(\ref{eq:standard}). Thus Fig.~\ref{fig:3part1}(c) need not be considered. The alternative is that the single three-particle cut does not pass through a loop, which is the case for Fig.~\ref{fig:3part2}(c) and Figs.~\ref{fig:3part2}(d), (e) and (f). These diagrams can lead to contributions of a form differing from Eq.~(\ref{eq:standard}) and must be considered in detail. The final general issue arises from the fact that $\cM_3$ at threshold is IR divergent and thus ill-defined. This is not the case for $\cM_2$ and adds another level of complication to the three-particle analysis. To obtain a well-defined three-particle amplitude at threshold one must add an IR regulator, make some subtractions, and then remove the regulator~\HSQCa. The choice of subtraction introduces scheme dependence, and a particularly simple choice was introduced in Ref.~\HSTH\ and used to define the quantity $\Mthr$ that occurs in the prediction that I am testing, Eq.~(\ref{eq:DE324}). The general implication is that, for diagrams with IR divergences that are not integrable, one must determine both their contributions to $\CTcon 3 4$ and, in a separate infinite-volume calculation, to $\Mthr$, so that the deviation from the standard result (\ref{eq:standard}) can be found. In the following I work systematically through all such diagrams carrying out this procedure. It will be useful to have in mind the form of the IR subtractions that are needed. These are defined in Eq.~(114) of Ref.~\HSTH\ and the subsequent text. The schematic form is \begin{equation} \Mthr \equiv \lim_{\delta\to 0} \left\{ \cM_{3,\delta} - I_{0,\delta} - \int_{k_1,\delta} \Xi_1(\vec k_1) - \int_{k_1,\delta} \int_{k_2,\delta} \Xi_2(\vec k_1, \vec k_2) \right\} \,. \label{eq:Mthrdef} \end{equation} Here $\delta$ is an IR regulator defined such that threshold is attained when $\delta\to 0$. The specific form of this regulator, as well as the explicit expressions for $I_{0,\delta}$, $\Xi_1$ and $\Xi_2$, will be given below when needed. $I_{0,\delta}$ contains terms of all orders in $\lambda$ starting at $\lambda^2$, while $\Xi_1$ contains terms proportional to $\lambda^3$ and $\lambda^4$, and $\Xi_2$ is proportional to $\lambda^4$. Thus several new features of the subtraction scheme are being tested by working at $\cO(\lambda^4)$. I also note that $I_{0,\delta}$ is used to subtract IR divergences in the diagrams of Figs.~\ref{fig:3part2} and \ref{fig:3part3}, while $\Xi_1$ and $\Xi_2$ are needed for some of the diagrams in Fig.~\ref{fig:3part1}. \begin{figure}[tbh] \begin{center} \includegraphics[scale=0.5]{fig5new.pdf} \vskip -0.7truein \caption{A subset of Feynman diagrams contributing to $\CT 3 4$ and $\Mthr$. Solid squares are vertex counterterms, with the number indicating the power of $\lambda$. External particles have zero three-momentum. Diagrams related by vertical or horizontal reflection are not shown.} \label{fig:3part1} \end{center} \end{figure} \subsubsection{Double triangle diagram: Fig.~\ref{fig:3part1}(a)} This is the first example of a class of diagrams arising first at fourth order, which involve a double triangle or diamond. Its IR behavior arises from a process in which there are three $2\to 2$ scatterings, with the spectator particle alternating. As shown in Ref.~\cite{Hansen:2016fzj}, this leads to a logarithmic IR divergence in the corresponding threshold amplitude, requiring the subtraction of the fourth-order term $\Xi_2$. If one of the loop momenta vanishes, the result is \begin{align} \CTcon 3 4 &\supset \frac{3}{2^8 m^5 L^{12} } \sum_{\vec p \ne 0} \frac{-2 + \cO(p^2)}{p^6} \ \ \Rightarrow\ \ a_3^\four \supset 32 \cK \,, \label{eq:res1} \end{align} where I have used Eq.~(\ref{eq:Kdef}) to obtain the second result. The result if both loop momenta are nonzero is \begin{align} \CTcon 3 4 &\supset \frac{1}{48 m^3 L^{12}} \sum_{\vec p\ne 0}\sum_{\vec q\ne 0} \frac{9}{16 } \frac{g(\vec p,\vec q)}{p^2 q^2 (W_{pq}^2 - 9 m^2)}\,, \label{eq:DTresa} \end{align} where $W_{pq}=\omega_p+\omega_q + \omega_{pq}$, $\omega_{pq}^2 =m^2+ (\vec p+\vec q)^2$, and $g(\vec p,\vec q)$ is a nonsingular function that I do not reproduce, except to note that $g(0,0)=3/m^2$. The logarithmic IR divergence can be seen by noting that, for small momenta, \begin{equation} W_{pq}^2 - 9 m^2 = 6\left(p^2 + q^2 + \vec p\cdot\vec q \right) + \cdots\,. \label{eq:Wpqexp} \end{equation} As explained in the introduction to this section, the summand in Eq.~(\ref{eq:DTresa}) is the integrand of the contribution of the double-triangle diagram to $\cM_3$ at threshold. The prescription of Ref.~\HSTH\ to remove the IR divergences in this case is to subtract the quantity \begin{equation} \frac1{\lambda^4}\Xi_2(\vec p,\vec q) = \frac{9 }{16 m^2} \frac{H(\vec p)^2 H(\vec q)^2}{p^2 q^2 [p^2 + q^2 + (\vec p+\vec q)^2]} \,, \end{equation} where $H(\vec p)$ is a UV regulator whose detailed form will not matter here other than the property $H(0)=1$. After subtraction the result can be integrated and defines the contribution of this diagram to the threshold amplitude, which I label $\Mthr^{\rm DT}$. Thus I proceed by adding and subtracting the $\Xi_2$ term, leading to \begin{align} \CTcon 3 4 &\supset \frac{1}{48 m^3 L^{12}} \sum_{\vec p\ne 0}\sum_{\vec q\ne 0} \left[\frac{9}{16} \frac{g(\vec p,\vec q)}{p^2 q^2 (W_{pq}^2 - 9 m^2)} - \frac{\Xi_2(\vec p,\vec q)}{\lambda^4}\right] + \frac{1}{48 m^3 L^{12}} \sum_{\vec p\ne 0}\sum_{\vec q\ne 0} \frac{\Xi_2(\vec p,\vec q)}{\lambda^4} \\ &= \frac{1}{48 m^3 L^{6}} \int_{p,q} \left[\frac{9}{16} \frac{g(\vec p,\vec q)}{p^2 q^2 (W_{pq}^2 - 9 m^2)} - \frac{\Xi_2(\vec p,\vec q)}{\lambda^4}\right] + \frac{1}{48 m^3 L^{12}} \sum_{\vec p\ne 0}\sum_{\vec q\ne 0} \frac{\Xi_2(\vec p,\vec q)}{\lambda^4} \\ &= \frac{\Mthr^{\rm (4,DT)}}{48 m^3 L^{6}} + \frac{3}{2^{18} \pi^6 m^5 L^6} \left( \frac{64\pi^4}3 \log N_{\rm cut} - {\cC_5}\right) \,. \label{eq:DTresc} \end{align} In the second line, the sum of the IR regulated difference has been replaced by an integral, which is valid up to a $1/L^7$ contribution arising from the difference between the sum and integral of an integrand with a $1/p^2$ divergence. To obtain the final form, the expression for the sum over $\Xi_2$ given in Eqs.~(C18) and (C19) of Ref.~\cite{Hansen:2016fzj} has been used. \subsubsection{Diver diagram: Fig.~\ref{fig:3part1}(d)} This diagram is combined with the $A_{2s}$ part of the counterterm diagram Fig.~\ref{fig:3part1}(f). This turns out to be the most involved calculation from Fig.~\ref{fig:3part1}. I denote the momentum in the outer loop by $p$, while that in the diver's head loop is denoted by $q$. If $\vec p=0$, the IR divergence is sufficient to lead to a contribution at the desired order, specifically \begin{align} \CTcon 3 4 &\supset \frac{3 }{2^{10} m^5 L^6} \frac1{L^6} \sum_{\vec q\ne 0} \frac{1 + \cO(q^2)}{q^6} \ \ \Rightarrow\ \ a_3^\four \supset -4 \cK \,. \label{eq:res2} \end{align} If $\vec p \ne 0$, Fig.~\ref{fig:3part1}(d) alone gives \begin{align} \CTcon 3 4 &\supset \frac{3}{2^{11} m^3 L^{12}} \sum_{\vec p\ne 0} \sum_{\vec q} \frac1{\omega_p^3\omega_q} \frac{g^D(\vec p, \vec q)}{p^4 (W_{pq}^2-9m^2)} \,, \label{eq:diver1} \end{align} where $g^D$ is a complicated function that is finite when $p$ and/or $q$ vanish. Thus the summand does not diverge when $\vec q=0$, allowing the sum over $\vec q$ to include this point. The sum over $\vec q$ is UV divergent, but this is canceled by the counterterm contribution, which is \begin{align} \CTcon 3 4 &\supset - \frac{3 A_{2s}}{2^8 m^3 L^9} \sum_{\vec p\ne 0} \frac{3\omega_p^2-m^2}{\omega_p^3 p^4} \,. \end{align} Combining, I find \begin{align} \CTcon 3 4 &\supset \frac{3}{2^{11} m^3 L^{6}} \left( S_1 + S_2\right) \,, \label{eq:S1S2} \\ S_1 &= \frac1{L^3}\sum_{\vec p \ne 0} \frac{f^D(p)}{\omega_p^3 p^4} \,, \\ f^D(p) &= \int_q \frac1{\omega_q q^2} \left[ {q^2} \frac{g^D(\vec p, \vec q)}{(W_{pq}^2-9m^2)} - (3 \omega_p^2-m^2) \right] \,, \\ S_2 &= \frac1{L^3}\sum_{\vec p \ne 0} \frac1{\omega_p^3 p^4} \left[\frac1{L^3}\sum_{\vec q} - \int_q\right] \frac{g^D(\vec p, \vec q)}{\omega_q (W_{pq}^2-9m^2)} \,. \label{eq:S2def} \end{align} Consider first $S_1$. Its IR behavior is determined by the form of $f^D(p)$ near $p=0$. Using the explicit form of $g^D$ I find that $f^D(0)=0$. To next pull out the leading IR behavior of the integrand using Eq.~(\ref{eq:Wpqexp}): \begin{align} f^D(p) &= \widetilde f^D(p) + 2m I^D(p) \,, \\ \widetilde f^D(p) &= \int_q\left[\frac{g^D(\omega_p,\omega_q,\omega_{pq})}{\omega_q(W^2-9m^2)} -\frac{2m}{p^2+q^2+\vec p\cdot\vec q} -\frac{3\omega_p^2-m^2-2m\omega_q}{\omega_q q^2}\right]\,, \\ I^D(p) &= \int_q \left[ \frac1{p^2 + q^2 + \vec p\cdot \vec q} - \frac1{q^2}\right]\,, \end{align} The key property of the residue function is that $f^D(p) \propto p^2$ near $p=0$. The integral $I^D$ is well defined as long as one does the angular integral first, and gives \begin{align} I^D(p) &= - \frac{\sqrt{3}\, p}{8 \pi} \,. \end{align} This shows that $f^D(p)$ is a function of $p$ and not $p^2$. Combining these results yields the $S_1$ contribution to $\CTcon 3 4$: \begin{align} \CTcon 3 4 &\supset \frac{1}{48 m^3 L^6} \frac{9}{2^7 L^{3}} \sum_{\vec p\ne 0} \left[- \frac{\sqrt3 m }{4 \pi \omega_p^3 p^3} + \frac{\widetilde f^D(p)}{\omega_p^3 p^4} \right] \,. \label{eq:diverfinal} \end{align} The next step is to express this result in terms of the contribution of the diver diagram to $\Mthr$, which I denote $\Mthr^{\rm D}$, and determine the remainder. Using the general result described in the introduction to this subsection, it follows from Eq.~(\ref{eq:diverfinal}) that the contribution of the diver diagram to the amplitude at threshold is \begin{equation} \mathcal M_3^{\rm (4,D)} = \frac{9}{2^7} \int_p \left[- \frac{\sqrt3 m }{4 \pi \omega_p^3 p^3} + \frac{\widetilde f^D(p)}{\omega_p^3 p^4} \right]\,. \end{equation} This is IR divergent, and to obtain $\Mthr^{\rm (4,D)}$ one must subtract from this integral of the $\lambda^4$ part of $\Xi_1$. The full expression for $\Xi_1$ is [see Eqs.~(191)-(121) of Ref.~\HSTH] \begin{equation} \Xi_1(p) = - \frac{9\lambda^3}{8m}\left[ \frac{ H(\vec p)^2}{p^4} + \frac{\lambda}{32\pi m} \frac{\sqrt3}{2} \frac{H(\vec p)^3}{p^3} \right] \,, \label{eq:Xi1def} \end{equation} and I need here only the second term. Thus I find \begin{equation} \Mthr^{\rm (4,D)} = \frac{9}{2^7} \int_p \left[- \frac{\sqrt3 m }{4 \pi \omega_p^3 p^3} + \frac{\sqrt3 H(\vec p)^3}{4 \pi m^2 p^3} + \frac{\widetilde f^D(p)}{\omega_p^3 p^4} \right]\,, \end{equation} which indeed is IR (as well as UV) convergent. This allows the result (\ref{eq:diverfinal}) to be rewritten as \begin{align} \CTcon 3 4 &\supset \frac{\Mthr^{\rm (4,D)}}{48 m^3 L^6} - \frac{3}{2^{11} m^3 L^{9}} \sum_{\vec p\ne 0} \frac{\sqrt3 H(\vec p)^3}{4 \pi m^2 p^3} \label{eq:diverfinal2} \\ &= \frac{\Mthr^{\rm (4,D)}}{48 m^3 L^6} - \frac1{48 m^3 L^6}\frac{\chi_{1,B}}{\lambda^4} \\ &= \frac{\Mthr^{\rm (4,D) }}{48 m^3 L^6} - \frac{3}{2^{18} \pi^6 m^5 L^6} \left( 16 \pi^3 \sqrt3 \log N_{\rm cut} + {\cC_4}\right) \,. \label{eq:res3} \end{align} In the second step I use the definition of $\chi_{1,B}$ given in Eq.~(C13) of Ref.~\cite{Hansen:2016fzj}, and in the last step I use the evaluation of $\chi_{1,B}$ presented in Eq.~(C15) of that work. \bigskip Now I turn to $S_2$. Naively, it appears that the sum-integral difference appearing in Eq.~(\ref{eq:S2def}) is exponentially suppressed, because there are no singularities in the region of integration over $\vec q$ when $\vec p\ne 0$ (since $W_{pq}> 3m$). However the singularities are nearby, and the ``suppression" is by $\exp(-p L)\sim \cO(L^0)$. It follows that this term must be kept. Fortunately, it turns out that it can be related analytically to the $\cC_F$ contribution to $\Delta_{32}^\four$ in Eq.~(\ref{eq:DE324}). To do so I rewrite $S_2$ by setting $W_{pq}\to 3m$ everywhere except for the $1/(W_{pq}-3m)$ pole. This leads only to corrections suppressed by $\exp(-mL)$. Using the result \begin{equation} \frac{g^D(\omega_p,\omega_q,\omega_{pq})}{W_{pq}+3m}\Bigg|_{W_{pq}=3m} = \frac{\omega_p^2 (m+\omega_p)^2}{2m^2} \,, \end{equation} I find \begin{align} S_2 &= - \frac1{L^3}\sum_{\vec p \ne 0} \frac1{p^4} \frac{(m+\omega_p)^2}{2m^2} \left[\frac1{L^3}\sum_{\vec q} - \int_q\right] \frac{1}{\omega_p \omega_q \omega_{pq} (3m -W_{pq})} \,. \end{align} Observing that the sum over $\vec p$ is dominated by $p \sim 1/L$, and dropping higher order corrections in $1/L$, this can be rewritten as \begin{align} S_2 &= - \frac1{L^3}\sum_{\vec p \ne 0} \frac2{p^4} \left[\frac1{L^3}\sum_{\vec q} - \int_q\right] \frac{1}{\omega_p \omega_q \omega_{pq} (3m -W_{pq})} = - \frac{2^7}{9} \frac{\chi_F}{\lambda^4}\,. \end{align} Here $\chi_F$ is a quantity introduced in Ref.\HSTH, which evaluates to \begin{equation} \chi_F = \lambda^4 \frac{ 9}{2^{14} \pi^6 m^2} \cC_F \,. \end{equation} Combining these results with Eq.~(\ref{eq:S1S2}) I find the contribution of the $S_2$ term to be \begin{align} \CTcon 3 4 &\supset - \frac3{2^{18} \pi^6 m^5 L^6} \cC_F \,. \label{eq:res4} \end{align} \subsubsection{Figure~\ref{fig:3part1}(e)} This diagram is combined with the $A_{2t}$ contribution from Fig.~\ref{fig:3part1}(g). I denote the momentum in the bull's head loop by $\vec p$ and the other loop momentum by $\vec q$. The sum over $\vec q$ can be replaced by an integral since the summand is IR finite. For any nonzero choice of $\vec p$, the factorization of the two loops then implies that there is an exact cancellation between Figs.~\ref{fig:3part1}(e) and (f). For $\vec p=0$ the absence of an IR divergence in $\vec q$ implies that the contribution is of $\cO(L^{-9})$. Thus these diagrams make no contribution to $\CTcon 3 4$. They also make no contribution to $\Mthr$. To understand this first note that both the relevant IR subtraction terms in the definition of $\Mthr$, Eq.~(\ref{eq:Mthrdef}), namely $\Xi_1$ and $\Xi_2$, have already been used for the earlier diagrams. Thus the contribution of Fig.~\ref{fig:3part1}(e) together with the counterterm must be IR finite by itself. This is a somewhat subtle issue since the bull's head loop alone has a nonintegrable $1/p^4$ dependence in the IR~\HSPT. To understand this issue requires using the IR regularization defined in Ref.~\HSTH: external momenta are set to zero, and an IR cutoff is applied to the loop momentum, $p \ge \delta$. The result should then be IR finite when $\delta\to 0$. The point is that, since the two loops factorize, the cancelation with the counterterm is exact for any nonzero $\vec p$, and so the contribution to $\Mthr$ vanishes for all nonzero $\delta$ and thus also in the limit $\delta\to 0$. \subsubsection{Figure~\ref{fig:3part1}(f)} This diagram is combined with the $A_{2u}$ contribution from Fig.~\ref{fig:3part1}(g). I denote the momentum in the upper loop by $\vec p$ and that in the lower loop by $\vec q$. In contrast to Fig.~\ref{fig:3part1}(e), here the loops do not factorize, because the momentum $\vec p$ passes through the lower loop. This implies, as explained below, that the diagram (plus counterterm) contributes to both $\CTcon 3 4$ and $\Mthr$. However, this contribution turns out to be only of the standard form, Eq.~(\ref{eq:standard}), so no explicit calculation is needed. The analysis of the diagram starts by noting that, as for Fig.~\ref{fig:3part1}(e), the sum over $\vec q$ can be replaced by an integral since the summand is IR finite, The addition of the counterterm renders the integral finite in the UV, and evaluating the integral leads to a function $J(p^2)$ that vanishes when $\vec p=0$ (since then, as for Fig.~\ref{fig:3part1}(e), the cancelation with the counterterm is exact). Thus $J(p^2) \propto p^2$, and this reduces the IR divergence from $1/p^4$ to $1/p^2$. Since the latter form is integrable, the sum over $\vec p$ can be replaced by an integral up to $\mathcal O(1/L^7)$ corrections. Thus, at the order I work, no finite-volume contributions arise aside from the standard contribution involving $\Mthr$. \subsubsection{Figure~\ref{fig:3part1}(h)} Figure.~\ref{fig:3part1}(h) combines with the $A_{2s}$ part of Fig.~\ref{fig:3part1}(j), together with horizontal reflections. Viewed as a contribution to $\Mthr$, the argument given for the previous diagram continues to hold: there is an exact cancelation between the s-channel loop and its counterterm. This is not the case, however, when the diagram is evaluated as a contribution to $\CT 3 4$. This is because the s-channel loop momentum is summed in Fig.~\ref{fig:3part1}(h) but integrated (in $A_{2s}$) in Fig.~\ref{fig:3part1}(j). The sum-integral difference leads to a finite-volume residue that, combined with the IR divergence from the bull's head diagram, leads to a $1/L^6$ correction. There are three contributions of this type. The first occurs when both loop momenta are nonzero: \begin{align} \CTcon 3 4 &\supset \frac{3}{2^9 m^5 L^6} \frac1{L^3} \sum_{\vec p \ne 0} \frac{m^4}{\omega_p^3 p^4 } \left[\frac1{L^3} \sum_{\vec q \ne 0} - \int_q\right] \frac{1 + 3 \vec p^2/(2m^2)}{\omega_q q^2} \\ &= \frac{3}{2^{18} m^5 L^6} (8 \cI \cJ) \,. \end{align} The second arises when the s-channel loop momentum vanishes: \begin{align} \CTcon 3 4 &\supset \frac{3}{2^9 m^5 L^6} \frac1{L^6} \sum_{\vec p\ne 0} \frac{-2 + \cO(p^2)}{p^6} = \frac{3}{2^{18} \pi^6 m^5 L^6} (-16 \cK) \,. \end{align} The final contribution occurs when the bull's head loop momentum vanishes: \begin{align} \CTcon 3 4 &\supset \frac{3 }{2^9 m^5 L^6} \frac1{L^6} \sum_{\vec q\ne 0} \frac{1 + \cO(q^2)}{q^6} = \frac{3}{2^{18} \pi^6 m^5 L^6} (8 \cK) \,. \end{align} In total, this diagram gives \begin{equation} a_2^\four \supset -8\cI\cJ + 8 \cK\,. \label{eq:res5} \end{equation} \subsubsection{Figure~\ref{fig:3part1}(i)} The final diagram of this class is Fig.~\ref{fig:3part1}(i), which combines with the $A_{2t}+A_{2u}$ part of Fig.~\ref{fig:3part1}(j). Here the argumentation is not so straightforward since the two loops do not factorize. Thus, while the UV divergence is canceled by the counterterm, there will be a finite residue. This residue vanishes, however, when the momentum in the bull's head loop itself vanishes. This in turn implies that the IR divergence in the bull's head loop is canceled. It then follows that the difference between the momentum sum and integral is exponentially suppressed, so that the contribution to $\CT 3 4$ is simply of the standard form, Eq.~(\ref{eq:standard}). \begin{figure}[tbh] \begin{center} \includegraphics[scale=0.5]{fig6.pdf} \vskip -2.4truein \caption{Further diagrams contributing to $\CTcon 3 4$ and $\Mthr$. Reflections are not shown.} \label{fig:3part2} \end{center} \end{figure} \subsubsection{Double fish diagram: Fig.~\ref{fig:3part2}(a)} \label{sec:2Sfish} I now turn to the two-loop radiative corrections to the three-particle tree diagram, starting with those involving two separate loops, shown in Fig.~\ref{fig:3part2}. The first diagram is that containing two s-channel fish, Fig.~\ref{fig:3part2}(a), which combines with the contributions to Figs.~\ref{fig:3part2}(d) and (f) in which the counterterms are $A_{2s}$. If one momentum vanishes the result is \begin{align} \CTcon 3 4 &\supset 2 \times \frac{3}{2^{11} m^5 L^6} \frac1{L^6} \sum_{\vec p\ne 0} \frac{1+ \cO(p^2)}{p^6} \ \ \Rightarrow\ \ a_2^\four \supset -4 \cK \,, \label{eq:res7} \end{align} where the initial factor of $2$ arises because there are two choices of vanishing loop momentum. If both momenta are nonvanishing then I find \begin{align} \CTcon 3 4 &\supset \frac{3}{2^{11} m^5 L^6} \Bigg\{ \left[\frac1{L^3} \sum_{\vec p\ne 0}-\int_p\right] \left[\frac1{L^3} \sum_{\vec q\ne 0}-\int_q\right] \frac1{ \omega_p p^2}\frac1{\omega_q q^2} \nonumber\\ &\qquad -\frac1{L^3} \sum_{\vec p\ne 0}\left[\frac1{L^3} \sum_{\vec q\ne 0}-\int_q\right] \frac{m^2}{\omega_p p^4} \frac{1}{\omega_q q^2} -\frac1{L^3} \sum_{\vec q\ne 0}\left[\frac1{L^3} \sum_{\vec p\ne 0}-\int_p\right] \frac1{\omega_p p^2} \frac{m^2}{\omega_q q^4} \Bigg\} \label{eq:SfishSint} \\ \Rightarrow a_2^\four &\supset -4 \cI \cJ \,. \label{eq:SfishS} \end{align} All contributions here involve at least one sum-integral difference, a result that arises due to the cancelation with counterterms. Thus there is no contribution to $\CTcon 3 4$ of the standard form involving $\Mthr$, Eq.~(\ref{eq:standard}). This implies that, in order to be consistent with Eq.~(\ref{eq:DE324}), the double-fish diagram, viewed as an infinite-volume scattering diagram, must give a vanishing contribution to $\Mthr^\four$. To see that this is indeed the case, I recall how the IR regulation and subtraction of Ref.~\HSTH\ works for such a diagram. Since the diagram diverges at threshold (due to the intermediate propagator), one must insert momenta, then perform the subtraction (in this case of $I_{0,\delta}$), and then take the threshold limit. Using the labeling in Fig.~\ref{fig:3part2}(a), the momentum configuration chosen in Ref.~\HSTH\ is that the spectator momenta vanish ($\vec p=\vec k=0$), implying that the momentum flowing through the intermediate propagator also vanishes, $\vec q=\vec P-\vec p-\vec k=0$, while the ``nonspectator pair'' have nonzero momenta, $\vec a=-\vec b \ne 0$. The CM energy flowing through the diagram is then \begin{equation} E = 3 m + \frac{a^2}{m} + \cO(a^4/m^3) \,. \end{equation} The intermediate propagator is \begin{equation} \Delta(q) = \frac{i}{q^2-m^2+i\epsilon} = \frac{i}{(E-m)(E-3m+i\epsilon)} \,, \end{equation} and the $i\epsilon$ can be dropped provided $a\ne 0$. The scattering amplitudes attached to both vertices are then partially off shell, since $q^2\ne m^2$. I label them $\cM_{2,\off}^{\rm (2,S)}$, with the superscript indicating $2$ for second order and $S$ for the s-channel loop. According the definition in Ref.~\HSTH, this amplitude should be s-wave projected. However, this is automatically satisfied here, since the amplitude depends only on $s=4 (m^2+a^2)\equiv s_a$ and not on the direction of $\vec a$. The result is thus \begin{equation} i\cM_3^{(u,u)} \supset i\cM_{2,\off}^{\rm (2,S)}(s_a) \frac{i}{(E-m)(E-3m)} i\cM_{2,\off}^{\rm (2,S)}(s_a) \,. \label{eq:M3fish} \end{equation} The superscript $(u,u)$ on $\cM_3$ follows the notation of Ref.~\HSTH\ and indicates that the amplitude is unsymmetrized. In order to obtain a finite threshold amplitude, the appropriate part of $I_{0,\delta}$ must be subtracted. This is~\HSTH \begin{align} iI_0^{(u,u)} &= i\cM_{2,s}^{\rm (2,S)}(s_a) i G^\infty_{s} i \cM_{2,s}^{\rm (2,S)}(s_a)\,, \label{eq:I0fish} \\ iG^\infty_s &= \frac{i}{2m(E-3m + i\epsilon)} \,, \end{align} where again the $i\epsilon$ can be dropped. Here the subscript $2,s$ indicates that this is a contribution to the two-particle s-wave scattering amplitude. Now I note that the s-channel loop amplitude is independent of the value of $q^2$, so that, in fact, $\cM_{2,\off}^{\rm (2,S)}=\cM_{2,s}^{\rm (2,S)}$. Thus the difference between Eqs.~(\ref{eq:M3fish}) and (\ref{eq:I0fish}) can be simplified to \begin{equation} i\left(\cM_3^{(u,u)}-I_0^{(u,u)}\right) = i \cM_{2,s}^{\rm (2,S)}(s_a) \frac1{2m (E-m)}\cM_{2,s}^{\rm (2,S)}(s_a) \xrightarrow{E\to3m} i \cM_{2,s}^{\rm (2,S)}(4m^2) \frac1{(2m)^2}\cM_{2,s}^{\rm (2,S)}(4m^2) = 0 \,. \end{equation} In the last step I have taken the threshold limit by sending $a\to 0$, which is possible since the IR divergence has canceled. I find that the result vanishes in this limit because, by definition, all second and higher-order contributions to the scattering amplitude vanish at threshold. The final step is to symmetrize the result, which does not change the fact that the result vanishes. Thus the double-fish diagram does not contribute to $\Mthr^\four$. \subsubsection{Fish and sinker diagram: Fig.~\ref{fig:3part2}(b)} \label{sec:1S1Tfish} This diagram combines with the $A_{2t}+A_{2u}$ part of Fig.~\ref{fig:3part2}(d), the $A_{2s}$ part of Fig.~\ref{fig:3part2}(e), and the $(A_{2t}+A_{2u})A_{2s}$ part of Fig.~\ref{fig:3part2}(f), together with horizontal reflections. When evaluating the contribution to $\CTcon 3 4$, the momentum integrals in the counterterms can be converted into sums at the order I work. I then find that the total summand vanishes identically, so that there is no contribution to $\CTcon 3 4$. As for the double-fish diagram, this implies that, if Eq.~(\ref{eq:DE324}) is to hold, then the fish and sinker diagram must give no contribution to $\Mthr^\four$. The argument that this is the case is more subtle than for the double-fish diagram, because the off-shell two-to-two amplitude appearing at the right-hand vertex in Fig.~\ref{fig:3part2}(b) now depends on $q^2$. I label this amplitude $\cM_{2,\off}^{\rm (2,T)}(s_a,t_a,u_a)$, with the superscript T indicating the t/u-channel loop. Because it is off shell it depends on all three Mandelstam variables, and thus on $q^2$ through the relation $s_a+t_a+u_a=3m^2 + q^2$. For the kinematic configuration explained above the Mandelstam variables are $s_a=4(m^2+a^2)$ and $t_a=u_a=m(3m-E)$. Since these are independent of the direction of $\vec a$, the off-shell amplitude is pure s-wave so there is no need to apply the s-wave projection. The IR subtraction now takes the form (before symmetrization) \begin{equation} i\cM_{2,\off}^{\rm (2,S)}(s_a) \frac{i}{(E-m)(E-3m)} i\cM_{2,\off}^{\rm (2,T)}(s_a,t_a,u_a) - i\cM_{2,s}^{\rm (2,S)}(s_a) \frac{i}{2m(E-3m)} i \cM_{2,s}^{\rm (2,T)}(s_a)\,, \end{equation} where in the second term $\cM_{2,s}^{(2,\rm T)}$ is the contribution to the on-shell, s-wave, two-particle amplitude coming from the t/u-channel diagram. I stress that this is not the same as $\cM_{2,\off}^{\rm (2,T)}$, although the difference vanishes at threshold since both quantities vanish there. The difference can be rewritten as \begin{equation} i\cM_{2,s}^{\rm (2,S)}(s_a) \frac{i}{2m(E-m)} i\cM_{2,s}^{\rm (2,T)}(s_a) + i\cM_{2,s}^{(2,S)}(s_a) \frac{i}{2m(E-3m)} \left[i \cM_{2,\off}^{\rm (2,T)}(s_a,t_a,u_a)- i\cM_{2,s}^{\rm (2,T)}(s_a)\right]\,, \end{equation} Both terms are finite when $E\to 3m$, but again the limiting value is zero because $\cM_{2,s}^{\rm (2,S)}$ vanishes at threshold. \subsubsection{Double-sinker diagram: Fig.~\ref{fig:3part2}(c)} \label{sec:1T1Tfish} This diagram combines with the contributions from Figs.~\ref{fig:3part2}(e) and (f) in which the counterterms are $A_{2t}+A_{2u}$. Here both loop sums can be converted to integrals, and the cancelation with the counterterms is exact. Thus there is no contribution to $\CTcon 3 4$. Because of this I expect no contribution from these diagrams also to $\Mthr^\four$. Including the subtraction, the result for the unsymmetrized amplitude is \begin{equation} i\cM_{2,\off}^{\rm (2,T)}(s_a,t_a,u_a) \frac{i}{(E-m)(E-3m)} i\cM_{2,\off}^{\rm (2,T)}(s_a,t_a,u_a) - i\cM_{2,s}^{\rm (2,T)}(s_a) \frac{i}{2m(E-3m)} i \cM_{2,s}^{\rm (2,T)}(s_a) \,. \label{eq:doublesinker} \end{equation} Using the facts that $\cM_{2,\off}^{\rm (2,T)}(s_a,t_a,u_a)-\cM_{2,s}^{\rm (2,T)}(s_a) \propto (E-3m)$ [with the explicit form of this difference given in Eq.~(58) of Ref.~\HSTH] and $\cM_{2,s}^{\rm (2,T)}(4m^2)=0$, the difference (\ref{eq:doublesinker}) can be shown to vanish when $E\to 3m$. \subsubsection{SS single-fish diagram: Fig.~\ref{fig:3part3}(a)} \label{sec:ssfish} \begin{figure}[tbh] \begin{center} \includegraphics[scale=0.5]{fig7.pdf} \vskip -1.truein \caption{Further diagrams contributing to $\CTcon 3 4$ and $\Mthr$. Reflections are not shown.} \label{fig:3part3} \end{center} \end{figure} I now move to radiative corrections to the three-particle tree diagram that involve a single two-loop correction. These diagrams are shown in Fig.~\ref{fig:3part3}, and I begin with that involving a ``fish" with two s-channel loops, Fig.~\ref{fig:3part3}(a), which combines with the $A_{2s}$ parts of Figs.~\ref{fig:3part3}(g) and (h) and the $A_{3ss}$ part of Fig.~\ref{fig:3part3}(k), along with their horizontal reflections. If both momenta are nonzero, the result has the same form as that for the double-fish diagram, Eq.~(\ref{eq:SfishSint}), except for an overall additional factor of 2 because of the reflected diagram. Similarly there are contributions when one of the loop momenta vanishes that are twice those from the double-fish diagram. Thus in total I find \begin{align} a_2^\four &\supset 8 \cI \cJ - 8 \cK \,. \label{eq:SSfish} \end{align} Turning now to the contribution to $\Mthr^\four$, the subtracted amplitude takes the form \begin{equation} i\cM_{2,\off}^{\rm (3,SS)}(s_a) \frac{i}{(E-m)(E-3m)} (-i) - i\cM_{2,s}^{\rm (3,SS)}(s_a) \frac{i}{2m(E-3m)} (-i ) \,, \label{eq:SSdiff} \end{equation} where the superscript indicates the third-order contribution involving two s-channel loops. As above, the s-channel loops give a result that does not depend on the off-shellness, $q^2$, so $\cM_{2,\off}^{\rm (3,SS)} = \cM_{2,s}^{\rm (3,SS)}$. Thus the difference (\ref{eq:SSdiff}) can be written as \begin{equation} i \cM_{2,s}^{\rm (3,SS)}(s_a) \frac1{m(m-E)} \xrightarrow{E\to 3m} -i \cM_{2,s}^{\rm (3,SS)}(4m^2) \frac1{2m^2} \,, \end{equation} which vanishes because $\cM_{2,s}^{\rm (3,SS)}(4m^2)=0$. \subsubsection{TS fish diagram: Fig.~\ref{fig:3part3}(b)} \label{sec:tsfish} This diagram combines with the $A_{2t}+A_{2u}$ part of Fig.~\ref{fig:3part3}(g), and the $A_{3st}$ part of Fig.~\ref{fig:3part3}(k), plus reflections. In this case the contribution to $\CT 3 4$ does not vanish because the cancelation with the counterterms is not exact. The result can be written (after converting counterterm integrals into sums) as \begin{equation} \CTcon 3 4 \supset \frac{3}{2^{9} m^5 L^6} \frac1{L^6} \sum_{\vec p, \vec q} f^{\rm TS}(\vec p, \vec q) \,. \end{equation} The sum is convergent in the IR and UV and thus can be replaced by an integral at the order I work. The result of the numerical integration is \begin{align} \CTcon 3 4 &\supset \frac{3}{2^{9} m^5 L^6} \frac{I^{\rm TSf}}{8\pi^4} \,,\qquad I^{\rm TSf}= I^{\rm STS0}\,. \label{eq:res9} \end{align} The agreement with $I^{\rm STS0}$ is to the accuracy of the numerical evaluation. Turning now to the contribution to $\Mthr$, I again find it vanishes. The argument is as for the SS fish diagram, and relies on the result that $\cM_{2,\off}^{(3,{\rm TS})}$ depends only on $s_a$ (and not on $q^2$), implying that it equals $\cM_{2,s}^{(3,{\rm TS})}$, and also that $\cM_{2,s}^{(3,{\rm TS})}(4m^2)=0$. \subsubsection{ST fish diagram: Fig~\ref{fig:3part3}(c)} \label{sec:stfish} The ST fish diagram combines with the $A_{2t}+A_{2u}$ part of Fig.~\ref{fig:3part3}(h) and the $A_{3st}$ part of Fig.~\ref{fig:3part3}(k), plus reflections. As for the TS diagram the contribution to $\CT 3 4$ involves an IR and UV convergent sum that can be converted to an integral. Numerical evaluation leads to \begin{align} \CTcon 3 4 &\supset \frac{3}{2^{9} m^5 L^6} \frac{I^{\rm STf}}{8\pi^4} \,,\qquad I^{\rm STf} = 0.355066 \,. \label{eq:ISTf} \end{align} The ST fish diagram also gives a nonvanishing contribution to $\Mthr^\four$. This can be written as \begin{equation} i\Mthr^{\rm (4,STf)} = \lim_{E\to 3m}2 \cS \left\{ i\left[\cM_{2,\off}^{(3,\ST)}(s_a,t_a,u_a) -\cM_{2,s}^{(3,\ST)}(s_a)\right] \frac{i}{q^2-m^2} (-i) \right\} \,, \label{eq:MthrTS} \end{equation} where the overall factor of 2 arises from the reflection, and $\cS$ indicates symmetrization over the choice of initial and final state spectator particle (which in the end simply leads to a factor of $9$). The superscripts indicate the third-order ST scattering diagram contained in Fig.~\ref{fig:3part3}(c), and I have simplified using the result that $\cM_{2,s}^{(3,{\rm ST})}(4m^2)=0$. The difference between off- and on-shell amplitudes is proportional to $q^2-m^2$ and thus leads to a finite result in the limit. To determine this result requires calculating the off-shell two-loop amplitude near threshold. This is closely related to the calculation of the two-loop contribution to the scattering length presented in Appendix~\ref{app:K}, and thus I present the details of the off-shell calculation in Appendix~\ref{app:MthrST}. The result is that \begin{equation} \Mthr^{\rm (4,STf)} = 9 \frac {1}{m^2(4\pi)^4} I^{\rm STM} \,,\qquad I^{\rm STM} =0.214978\,. \label{eq:MthrST} \end{equation} Combining this with the result (\ref{eq:ISTf}) leads to the total contribution from this diagram \begin{equation} \CTcon 3 4 \supset \frac{\Mthr^{\rm (4,STf)}}{48 m^3 L^6} + \frac{3(I^{\rm STf}-I^{\rm STM})}{2^{12}\pi^4 m^5 L^6} \,. \label{eq:res10} \end{equation} \subsubsection{TT fish diagram: Fig.~\ref{fig:3part3}(f)} \label{sec:ttfish} This diagram combines with the $A_{2t}$ parts of Figs.~\ref{fig:3part3}(i) and (j) and the $A_{3tt}+A_{3uu}$ part of Fig.~\ref{fig:3part3}(k), together with reflections. The contribution to $\CT 3 4$ is simple enough to reproduce in full: \begin{align} \CTcon 3 4 &\supset \frac{3}{2^{9} m^5 L^6} \frac1{L^6} \sum_{\vec p, \vec q} \frac{m^3} {4 \omega_p^3 (\omega_p+m) \omega_q^3 (\omega_q+m) (\omega_p + \omega_q)} = \frac{3}{2^{9} m^5 L^6} \frac{I^{\rm TT}}{32 \pi^4} + \cO(L^{-7}) \,. \end{align} The value of $I^{\rm TT}$ is given in Eq.~(\ref{eq:ITT}). There is also a potential contribution to $\Mthr^\four$ that, before symmetrization, has the form \begin{equation} 2 i\left[\cM_{2,\off}^{\rm (3,TT)}(s_a,t_a,u_a) -\cM_{2,s}^{\rm (3,TT)}(s_a)\right] \frac{i}{q^2-m^2} (-i) \,. \label{eq:MthrTT} \end{equation} Since the two t-channel loops factorize, however, I can use the result from Ref.~\HSPT\ that a single such loop gives a contribution proportional to $q^2-m^2$. This implies that the contribution of two loops is proportional to $(q^2-m^2)^2$, so that the overall result vanishes at threshold when $q^2 \to m^2$. \subsubsection{SU fish diagram: Fig.~\ref{fig:3part3}(d)} \label{sec:sufish} This diagram combines with the $A_{2s}+A_{2u}$ part of Fig.~\ref{fig:3part3}(i) and the $A_{3tu}/2$ part of Fig.~\ref{fig:3part3}(k), as well as the reflections of all diagrams. The contribution to $\CT 3 4$ is again a finite integral \begin{align} \CTcon 3 4 &\supset \frac{3}{2^{8} m^5 L^6} \frac{I^{\rm SU}}{16\pi^4} \,, \end{align} where $I^{\rm SU}$ is given in Eq.~(\ref{eq:ISU}). The contribution to $\Mthr^\four$ is worked out in Appendix~\ref{app:MthrSU}, yielding \begin{align} \Mthr^{\rm (4, SUf)} &= 9 \frac{1}{m^2(4\pi)^4} (- I^{\rm SUr}) \,,\qquad I^{\rm SUr} = -0.274156\,. \label{eq:MthrSUf} \end{align} Thus in total the SU fish diagram gives \begin{equation} \CTcon 3 4 \supset \frac{\Mthr^{\rm (4, SUf)}}{48 m^3 L^6} + \frac{3(I^{\rm SU}+I^{\rm SUr})}{2^{12}\pi^4 m^5 L^6} \,. \label{eq:CTcon34SUf} \end{equation} \subsubsection{US fish diagram: Fig.~\ref{fig:3part3}(e)} \label{sec:usfish} This is the final diagram of this class, and combines with the $A_{2s}+A_{2u}$ part of Fig.~\ref{fig:3part3}(j) and the $A_{3tu}/2$ part of Fig.~\ref{fig:3part3}(k), as well as reflections. The contribution to $\CT 3 4$ is \begin{align} \CTcon 3 4 &\supset \frac{3}{2^{8} m^5 L^6} \frac{I^{\rm USf}}{16\pi^4} \,,\qquad I^{\rm USf} =-0.13788 \,. \label{eq:CTcon34USfa} \end{align} The contribution to $\Mthr^\four$ is worked out in Appendix~\ref{app:MthrUS}, and leads to \begin{equation} \CTcon 3 4 \supset \frac{\Mthr^{\rm (4, USf)}}{48 m^3 L^6} + \frac{3(I^{\rm US}-I^{\rm USM})}{2^{12}\pi^4 m^5 L^6} \,,\qquad I^{\rm USM} =0.096623\,. \label{eq:CTcon34USf} \end{equation} \subsection{Remaining diagrams} \label{sec:remaining} \begin{figure}[tbh] \begin{center} \includegraphics[scale=0.5]{fig8.pdf} \vskip -2.5truein \caption{Examples of Feynman diagrams contributing to $\CTcon 3 4$ that do not lead to nonstandard finite-volume dependence. See text for further discussion.} \label{fig:renorm3} \end{center} \end{figure} Finally, I discuss diagrams of various classes that turn out either not to contribute, or to contribute only results of the standard form, Eq.~(\ref{eq:standard}). The first class are those with mass and wave-function renormalization parts. Examples of their contributions to $\CTcon 3 4$ are shown in Figs.~\ref{fig:renorm3} (a), (b) and (c). The arguments of Sec.~\ref{sec:renorm2} can be used to show that, when combined with the corresponding counterterms these either cancel completely, which is the case for Fig.~\ref{fig:renorm3}(a), or lead to contact terms, as is true for Figs.~\ref{fig:renorm3}(b) and (c). These contact terms then either lead to contributions to the amplitudes $A_{j,k}$ of Eq.~(\ref{eq:amps}) alone, and not to $\Delta E_{3,\thr}$, as is the case for Fig.~\ref{fig:renorm3}(b), or lead to contributions to $\CTcon 3 4$ of the standard form, Eq.~(\ref{eq:standard}), an example being Fig.~\ref{fig:renorm3}(c). There is one diagram, that of Fig.~\ref{fig:renorm3}(d), requiring special treatment, because it has a physical cut through the renormalization part. This implies that there is a nonzero remainder when the momentum sums in this part are replaced by integrals. However, by explicit calculation I find that this remainder is subleading in $1/L$ because the IR divergence is rather weak. Thus this diagram also gives only the standard contribution of Eq.~(\ref{eq:standard}). There are also many other diagrams that are one-particle reducible, e.g. Fig.~\ref{fig:renorm3}(e). Although some of these diagrams, such as this example, have three-particle cuts, the resulting summands only have $1/p^2$ IR divergences and so sums can be converted to integrals at the order I work. Thus all such diagrams lead to contributions of the standard form, Eq.~(\ref{eq:standard}). Finally, there are partially disconnected diagrams such as Fig.~\ref{fig:renorm3}(f). As explained in Ref.~\HSPT, these amount to studying the three-particle threshold energy using, on one or both sides, an operator that creates a single particle, and can be dropped. \subsection{Summary} Combining the results from Eqs.~(\ref{eq:res1}), (\ref{eq:DTresc}), (\ref{eq:res2}), (\ref{eq:res3}), (\ref{eq:res4}), (\ref{eq:res5}), (\ref{eq:res7}), (\ref{eq:SfishS}), (\ref{eq:SSfish}), (\ref{eq:res9}), (\ref{eq:res10}), (\ref{eq:CTcon34SUf}), and (\ref{eq:CTcon34USf}), and recalling the definitions Eqs.~(\ref{eq:D32calc}) and (\ref{eq:a24def}), leads to the following total contribution to $a_2^\four$ from $\CTcon 3 4$: \begin{multline} a_2^\four\Big|_{\CTcon 3 4} = -\frac{2^{14} m^2 \pi^6}{9} \Mthr^{(4)} + \left[4 \cI \cJ + 24 \cK+ c_L \log(N_{\rm cut}) + \cC_4 + \cC_5 + \cC_F \right] \\ - 2^{6} \pi^2 \left(I^{\rm STS0}+I^{\rm STf}-I^{\rm STM} +\tfrac14 I^{\rm TT} + I^{\rm SU}+I^{\rm SUr}+I^{\rm US}- I^{\rm USM}\right) \,. \label{eq:CTcon34res} \end{multline} Combining this result with those in Eqs.~(\ref{eq:a34CT24}) and (\ref{eq:a34CZ33}) gives the final result for $a_2^\four$: \begin{align} a_2^\four&= - \frac{2^{14} m^2 \pi^6}{9} \Mthr^{(4)} + \left[2 \cI^2 -8 \cI\cJ +18 \cK + c_L \log(N_{\rm cut}) + \cC_4 + \cC_5 + \cC_F \right] + 2^6 \pi^2 {\cal R}\,, \label{eq:a24final} \\ {\cal R} &= \left[I^{\rm SST0}\!-\! I^{\rm STS0}\right] + \left[I^{\rm STS0}\!-\!I^{\rm STS}\!-\!I^{\rm STf}\!+\!I^{\rm STM}\right] + \left[ I^{\rm SU}\!-\! 2 I^{\rm SSU} \!-\! I^{\rm SUr}\right] + \left[2 I^{\rm SU} \!-\!I^{\rm US}\!-\! 2 I^{\rm SSU} \!+\! I^{\rm USM}\right] \,. \label{eq:a24residue} \end{align} This result should be compared to that obtained from the general FV formalism, which, using Eq.~(\ref{eq:DE324}), is given by the first two terms in Eq.~(\ref{eq:a24final}). Thus agreement requires the residue $\mathcal R$ to vanish. In fact, each of the four quantities in square brackets vanishes separately to within the numerical accuracy of integration (roughly five significant figures). This completes the desired check. The fact that cancelations occur in subsets of quantities indicates that the cancelations can be understood at a diagrammatic level. \section{Conclusions} \label{sec:conc} The calculation presented here has confirmed the threshold expansion derived from the three-particle quantization condition of Refs.~\cite{Hansen:2014eka,Hansen:2015zga}. It provides a further nontrivial test of the quantization condition as well as of the rather involved determination of the threshold expansion from the quantization condition~\cite{Hansen:2016fzj}. Comparing the form of the predictions for $\Delta E_{2,\thr}^{(4)}$ and $\Delta E_{3,\thr}^{(4)}$, given in Eqs.~(\ref{eq:DE24}) and (\ref{eq:DE34}) respectively, one sees that the latter contains additional ``geometric" constants, $\cC_F$, $\cC_4$, and $\cC_5$, as well as the $\Mthr$ term. The new constants arise from the need to subtract IR divergences from diagrams in which there is alternating pairwise two-particle scattering. The calculation presented here checks that these subtractions do the job for which they were designed. By working at fourth order all terms contributing to the IR subtraction have been tested. As noted in Ref.~\HSPT, the result from the present relativistic calculation cannot be compared to those obtained using nonrelativistic quantum mechanics both because relativistic effects enter at $\cO(L^{-6})$ and because the nonrelativistic analogs of $\Mthr$ differ, in general, by finite amounts. Nevertheless, I observe that the coefficients of $\cI^3$, $\cI \cJ$ and $\cK$ do agree with those of Ref.~\Beane. It will be interesting and useful to test other approaches to the three-particle quantization condition, such as that using a nonrelativistic, particle-dimer approach~\cite{Hammer:2017uqm,Hammer:2017kms}, by confirming that they reproduce the three-particle threshold expansion. \section*{Acknowledgments} This work was supported in part by the United States Department of Energy grant No. DE-SC0011637. I thank Ra\'ul Brice\~no, Max Hansen and John Spencer for discussions and comments. \newpage
\section{Instrument and Dataset} H.E.S.S.\ is an array of five Imaging Atmospheric Cherenkov Telescopes (IACTs) located in the Khomas Highlands of Namibia. The Crab nebula has been observed with the H.E.S.S.\ telescopes since the beginning of operations in 2004. For the measurement presented here we only use observations with the four IACTs of the first phase of H.E.S.S.\ In addition to the standard run-quality selection criteria~\cite{2006_HessCrab}, we apply additional cuts e.g.\ on the maximum wind speed ($< 3\,\mathrm{m}/\mathrm{s}$), the observation wobble offset ($< 0.8^{\circ}$), and the zenith angle of the observations ($< 55^{\circ}$) to define a high-quality dataset for extension measurements. The resulting Crab nebula dataset consists of observations performed between February 2004 and November 2011, amounting to a total deadtime-corrected live time of $25.7\,$h. Since the Crab nebula is a Northern source, the typical observation zenith angles at the H.E.S.S.\ site in the Southern hemisphere are $45^{\circ}-50^{\circ}$. \section{Analysis and Results} The data analysis is performed using semi-analytical air-shower templates~\cite{2009_deNaurois}. To further improve the angular resolution, we use a tight cut on the direction reconstruction uncertainty for the event selection. Furthermore, we demand energies of $E > 0.7\,$TeV to eliminate potential systematic effects near the energy threshold of the dataset\footnote{The H.E.S.S.\ energy threshold for the Crab nebula is relatively large because the source is only visible under large zenith angles.}. We detect the Crab nebula with a statistical significance of $137\sigma$ (using Eq.~$17$ from \cite{1983_LiMa}) and obtain a signal to background ratio of $58$ within $0.1^{\circ}$ around the source position. We find a total number of about $4600$ excess events, the majority of them with energies between the lower cut of $0.7\,$ and $10\,$TeV. \begin{figure*} \centering \includegraphics[width=\textwidth]{Theta2_CrabHiResAbove700GeV_Convolved.png} \caption{\textit{Top:} $\vartheta^2$ histogram of gamma-ray-like events from the Crab nebula ($ON$) along with background events from displaced sky regions ($OFF$, scaled to the $ON$ region). The background events are barely visible in the plot due to the large $S/B$ ratio. For comparison, the simulated PSF and the PSF convolved with the best-fit Gaussian are shown as well. \textit{Bottom:} Significance of the bin-wise deviation ($MC-data$) of the measured excess when compared to the plain PSF (black) and the convolved one (orange).} \label{fig_theta2} \end{figure*} We show the resulting distribution of events as a histogram in squared angular distance ($\vartheta^2$) in the \textit{top} panel of Fig.~\ref{fig_theta2}. The value of $\vartheta^2$ is calculcated with respect to the centroid of the gamma-ray excess count distribution in the sky. The centroid position in equatorial coordinates (J2000) is $\alpha = 5\mathrm{h}34\mathrm{m}30.9\mathrm{s} \pm (1.2\mathrm{s})_{\mathrm{stat}} \pm (20\mathrm{s})_{\mathrm{sys}}$, $\delta = +22^\circ00'44.5'' \pm 1.1''_\mathrm{stat} \pm 20''_\mathrm{sys}$ (systematic error from \cite{2004_Gillessen}), at a distance of $16.8''$ from, and within uncertainties compatible with, the Crab pulsar location. Dedicated run-wise Monte-Carlo (MC) simulations of the dataset, including the actual instrument and observation conditions at the time the data were recorded, are generated as described in~\cite{2017_RWS_ICRC}. We re-weight the simulations to mimic the energy spectrum of the Crab nebula and analyse them with the same algorithms and analysis configurations as the actual data. The resulting $\vartheta^2$ histogram of this MC analysis serves as the PSF for this source and dataset and is shown in the upper panel of Fig.~\ref{fig_theta2}. The $68\%$, $80\%$, and $90\%$ containment radii of our PSF are $0.05^\circ$, $0.07^\circ$, and $0.09^\circ$, respectively. As shown in Fig.~\ref{fig_theta2}, the PSF is highly inconsistent with the distribution of the gamma-ray excess counts. The residuals in the lower panel of Fig.~\ref{fig_theta2} indicate a clear broadening of the data compared to the simulated PSF. To study this further, we perform a 2D morphology fit with \textit{Sherpa}~\cite{2001_Sherpa}, using the sky images of gamma-ray-like events around the Crab nebula, of gamma-ray-like background events estimated from a ring well outside the source~\cite{2007_Berge_Background}, as well as the simulated PSF. To determine the best fit, we convolve the PSF with a 2D Gaussian with different widths. For each width, we calculate a likelihood value to assess the compatibility of the data and the convolved PSF. We find the best-fit extension to be $\sigma_{2\mathrm{D,G}} = 52.2'' \pm 2.9''_{\mathrm{stat}} \pm 7.8''_{\mathrm{sys}}$, with a preference of an extension of the Crab nebula over a point-source assumption of $\mathrm{TS} \approx 83\,$\footnote{$\mathrm{TS}$ is the likelihood ratio test statistic and $\sqrt{\mathrm{TS}}$ can be interpreted as statistical significance.}. As systematic uncertainty of the extension we quote the quadratic sum of uncertainties related to the calibration and analysis method, to the spectral shape used to re-weight the MC PSF, and to the fit method. The resulting best-fit convolution is also plotted in Fig.~\ref{fig_theta2}. It clearly provides a good description of the data both in the upper panel and the residuals in the lower panel. To demonstrate the robustness of our results, we apply the same analysis using time-dependent simulations to two other bright and highly significant extragalactic gamma-ray sources, the active galactic nuclei PKS$~$2155-304 and Markarian$~$421. \begin{figure*} \centering \includegraphics[width=0.8\textwidth]{point-like_label.pdf} \caption{Overview of the derived extension upper limits of PKS 2155-304 and Markarian 421, as well as the measured extension of the Crab nebula and systematic checks. The low and high zenith angle band correspond to $44-46^{\circ}$ and $46-55^{\circ}$, respectively.} \label{fig_uls_ext} \end{figure*} As illustrated in Fig.~\ref{fig_uls_ext}, we find both sources compatible with being point-like and show upper limits on their extension. In both cases, these limits are well below the measured extension of the Crab nebula. We note that Markarian$~$421 culminates at large zenith angles of $\theta > 60^{\circ}$ at the H.E.S.S.\ site, making this source a particularly convincing test of our PSF understanding: even under such challenging observation conditions, Markarian$~$421 appears to be point-like. As we also show in Fig.~\ref{fig_uls_ext}, we tested the Crab nebula dataset for a zenith angle dependence by splitting the observations in two datasets above and below $46^{\circ}$. The measured extensions are compatible with each other. Also shown in Fig.~\ref{fig_uls_ext} is the extension of the Crab nebula cross-checked with an independent calibration, reconstruction, and analysis method~\cite{2014_ImPACT}. We find this second extension measurement slightly larger than our nominal value, and incorporate the difference as one of our systematic uncertainties mentioned above. \begin{figure*} \centering \includegraphics[width=0.49\textwidth]{UVcrab.png} \includegraphics[width=0.475\textwidth]{Xraycrab.png} \caption{\textit{Left:} UV ($\lambda = 291\,$nm) image of the Crab nebula~\cite{2017_Dubner}. The MAGIC and HEGRA extension upper limits of $2.2'$~\cite{2008_MAGIC_Crab} and $1.5'$~\cite{2000_HEGRA_Crab} are drawn as dash-dotted and dashed lines, respectively. The extent of the sky region of the \textit{right} panel is indicated as dotted square, and the H.E.S.S.\ extension (Gaussian $\sigma$ as given in the main text) is drawn as a solid circle. All circles are centred on the Crab pulsar position. \textit{Right:} \emph{Chandra} X-ray image of the Crab nebula. The H.E.S.S.\ extension is shown as solid white circle overlaid on top of shaded annuli indicating the statistical and systematic uncertainties of our measurement.} \label{fig_mwl} \end{figure*} Our VHE gamma-ray extension of the Crab nebula is compared to the morphology found at UV wavelengths and X-ray energies in the \textit{left} and \textit{right} panel of Fig.~\ref{fig_mwl}, respectively. The H.E.S.S.\ extension covers a good fraction of the optical nebula. Comparing the TeV gamma-ray emission from Inverse Compton scattering to the keV synchrotron X-ray emission, we find that the nebula measured with H.E.S.S.\ is significantly larger than when measured with \emph{Chandra}. This result is naturally explained by the radiation cooling of electrons. The Crab nebula size therefore decreases with increasing electron energy, and the energies of electrons producing the TeV gamma rays are well below those of electrons emitting the hard X-rays measured by \emph{Chandra}. The measured size of the TeV gamma-ray nebula can be reproduced within the standard magnetohydrodynamic model of Kennel and Coroniti~\cite{1984ApJ...283..694K,1984ApJ...283..710K} assuming a magnetisation parameter $\sigma \approx 0.01$. \section{Conclusions} Here we document the ability of the H.E.S.S.\ IACT array to robustly measure VHE gamma-ray source extensions down to $30-40''$. The performance boost provided by using time-dependent simulations allows us to resolve for the first time the Inverse Compton component of the Crab nebula. The emission region size we find is well below the previously most constraining upper limit of $1.5'$~\cite{2000_HEGRA_Crab} and is determined with a high accuracy of $\approx 15\%$. Compared to the synchrotron Crab nebula seen in keV X-rays, the VHE gamma-ray emission region is clearly more extended. \section*{Acknowledgements} We gratefully acknowledge the support from the agencies and institutions listed \href{https://www.mpi-hd.mpg.de/hfm/HESS/pages/publications/auxiliary/HESS-Acknowledgements-ICRC2017.html}{here}. \bibliographystyle{JHEP}
\section{Introduction} One of the important goals of nuclear structure physics is the description of both shell and cluster aspects on the same footing. The real nuclear systems have both characters, and the mixing, or competition of these two, is an important subject for the physics of quantum many-body systems~\cite{CSC,Suhara.PhysRevC87.054334.2013,Suhara2015}. Our strategy is to establish a framework, which starts with the cluster model side, contrary to standard approaches, and includes shell correlations. \par As it is well-known, when we take zero limit for the relative distances between clusters, the model space coincides with that of the lowest shell model configuration. This is called SU(3) limit~\cite{elli58}, and for $N=Z$ nuclei with magic numbers of three dimensional harmonic oscillator ($N=Z=2,8,20,\ldots$), cluster model wave functions agree with the doubly closed shell configurations. Here both spin-orbit favored ($j$-upper) and unfavored ($j$-lower) single particle orbits are filled and we can forget about the spin-orbit contribution. However, the spin-orbit effect exists in other cases, and in most of the conventional cluster models, this effect cannot be taken into account; the spin-orbit contribution cancels because of the assumption of $\alpha$ cluster that four nucleons have the same form of the spatial wave function. \par To overcome this difficulty of the cluster model, we proposed antisymmetrized quasi-cluster model (AQCM)~\cite{Itagaki.PhysRevC71.064307,Masui,Yoshida2,Ne-Mg,Suhara.PhysRevC87.054334.2013,Suhara2015,Itagaki2016,Matsuno2017}, which enables us to describe the $jj$-coupling shell model states with the spin-orbit contribution starting with the cluster model wave function. In AQCM, the transition from the cluster- to shell-model-structure can be described by two parameters; $R$ representing the distance between $\alpha$ clusters, and $\varLambda$, which characterizes the transition of $\alpha$ cluster(s) to quasi-cluster(s) and quantifies the role of the spin-orbit interaction. In Ref.~\cite{Suhara.PhysRevC87.054334.2013}, the AQCM wave function was shown to correspond to the $(0s_{1/2})^4 (0p_{3/2})^8$ closed shell configuration of $^{12}\mathrm{C}$, and strong contribution of the spin-orbit interaction was taken into account. The optimal ground state of $^{12}\mathrm{C}$ was shown to have an intermediate character between the three $\alpha$ clusters and shell model states. In a similar way, the subclosure configuration of $0d_{5/2}$ was described in $^{28}\mathrm{Si}$, and characteristic magic numbers of the $jj$-coupling shell model, $28$ and $50$, were successfully described in $^{56}\mathrm{Ni}$ and $^{100}\mathrm{Sn}$~\cite{Itagaki2016}. \par However, the particle hole excitations of single particles are not fully established yet from cluster model point of view. The purpose of the present study is to show that the framework of AQCM can be extended even to the states with the character of single particle excitations. The first example is $^{12}\mathrm{C}$. Some configurations, which are excited from the subclosure configuration of $0p_{3/2}$ of the $jj$-coupling shell model, are introduced, and the effects of BCS-like pairing for the proton part, neutron part, and proton-neutron part are taken into account. Also the coupling effect with the cluster states is investigated. \par So far the features of $^{12}\mathrm{C}$ have been investigated using many different models; various cluster models~\cite{Kamimura.NuclPhysA351.456.1981,Uegaki.ProgTheorPhys57.1262.1977,Funaki.PhysRevC67.051306R.2003}, shell models including modern \textit{ab initio} ones~\cite{Cohen-Kurath,Navratil.PhysRevC68.034305.2003}, and so on. The $0_2^+$ state, which is known as the Hoyle state, is nicely described by the three $\alpha$ cluster models; however they cannot describe detailed properties related to the $\alpha$ cluster breaking effect especially in the ground state rotational band. On the other hand, in principle the shell model provides a complete set, but the cluster states are in practice difficult to be described within finite model space. Takigawa \textit{et al.} have introduced a hybrid model to mix $\alpha$ cluster model and $p$ shell SU(3) basis states~\cite{Takigawa}. Our spirit is based on this idea; however we transform the cluster model wave functions directly to the ones of the $jj$-coupling shell model and try to pave the way to establish a generalized description of the nuclear structure. Also, antisymmetrized molecular dynamics (AMD) and Fermionic molecular dynamics (FMD) have been successfully introduced to describe both characters of shell and cluster models~\cite{AMD-1,AMD-2,FMD-1,FMD-2,FMD-3}. In these models, central positions of all the nucleons are optimized under some constrains. On the other hand, in our approach, we introduce much fewer and controllable parameters, which allow the description of excited configurations. \par In AQCM, we transform Brink-type $\alpha$ cluster model wave function~\cite{Brink} to the $jj$-coupling shell model wave function by giving imaginary part for the Gaussian center parameters. This procedure has some similarity with the idea of Fock-Bargmann space developed by Filippov \textit{et al.}~\cite{Filippov}. In Ref.~\cite{Filippov}, they discussed $^6\mathrm{He}$ and the hyperspherical harmonics basis states have been introduced for the description of two valence neutrons outside of the $\alpha$ core, and the matrix elements of the Hamiltonian have been extracted from the expectation value obtained by using a Gaussian wave packet. We also use Gaussian wave packets; however, in our study, we directly transform the wave function to the $jj$-coupling shell model and the breaking effect of the $\alpha$ cluster part can be discussed. \par This paper is organized as follows. We describe our formulation in this work including the review for AQCM in Sec.~\ref{Sec.Formulation}. The results and discussion are given in Sec.~\ref{Sec.ResultsAndDiscussion}. Finally, we present conclusion and outlook in Sec.~\ref{Sec.Conclusion}. \section{Formulation} \label{Sec.Formulation} \subsection{AQCM wave function} As in many conventional models, the single-particle wave function of AQCM ($\phi_i$) consists of the spatial ($\psi_i$), spin ($\chi_i$), and isospin ($\tau_i$) parts, \begin{align} \phi_i=\psi_i\chi_i\tau_i. \label{Eq.SingleParticleWaveFunction} \end{align} The spatial part of the single-particle wave function has a Gaussian shape~\cite{Brink}, \begin{align} \psi_i=\left(\frac{2\nu}{\pi}\right)^{\frac{3}{4}}\exp[-\nu(\bvec{r}-\bvec{\zeta}_i)^2], \label{Eq.SpatialPart} \end{align} where $\nu$ is the width parameter. From these single-particle wave functions, the Slater determinant of $A$ nucleon system $\varPsi=\mathcal{A}[\phi_1,\ldots,\phi_A]$ is constructed, where $\mathcal{A}$ is the antisymmetrizer for all nucleons. If we give the same value for the Gaussian center parameter $\bvec{\zeta}_i$ of four nucleons (spin-up proton, spin-down proton, spin-up neutron, and spin-down neutron) as in the so-called Brink model, they form an $\alpha$ cluster, and the contribution of the spin-orbit interaction vanishes because of the antisymmetrization effect. \par In Ref.~\cite{Itagaki.PhysRevC71.064307}, the AQCM wave functions were shown to describe subclosure configurations of the $jj$-coupling shell model. The Gaussian center parameters $\{ \bvec{\zeta}_i \}$ are complex vectors, and the imaginary parts are introduced as \begin{align} \mathrm{Im}\bvec{\zeta}_i=\varLambda\bvec{e}_i^{(\mathrm{spin})}\times\mathrm{Re}\bvec{\zeta}_i, \label{idea} \end{align} where $\bvec{e}_i^{(\mathrm{spin})}$ is a unit vector for the intrinsic-spin orientation of $i$-th nucleon, and $\varLambda$ is an order parameter for the dissolution of the cluster. By introducing $\varLambda$, $\alpha$ clusters are transformed to quasi clusters with the spin-orbit contribution. \subsection{Description of subclosure configuration ($^{12}\mathrm{C}$ case)} \label{Sec.DescriptionOfSubclosureConfiguration12CCase} Before extending AQCM to describe single particle excitations, here we review the description of the subclosure configuration for the $^{12}\mathrm{C}$ case~\cite{Suhara.PhysRevC87.054334.2013}. This part is the mathematical interpretation of AQCM and not needed in the actual calculation; however we have to recall the important parts for further extension of the model. Since the neutron part is introduced in the completely same way, here we concentrate on the proton part. The protons $i=1$ and $2$ are in a common quasi cluster with spin-up and spin-down. Based on the original idea of Eq.~(\ref{idea}), the Gaussian center parameters are introduced as \begin{align} \bvec{\zeta}_{i=1}=R(\bvec{e}_x+i\varLambda\bvec{e}_y) \label{Eq.zeta1} \end{align} and \begin{align} \bvec{\zeta}_{i=2}=R(\bvec{e}_x-i\varLambda\bvec{e}_y), \label{Eq.zeta2} \end{align} where $\bvec{e}_x$ and $\bvec{e}_y$ are unit vectors on the $x$ and $y$ axes, respectively. There are put on the $x$ axis, and imaginary parts are given in the $y$ and $-y$ directions, since their intrinsic spins are quantized along the $z$ axis ($z$ and $-z$ directions). They are introduced as time reversal partners. The squares in the powers of the single-particle wave functions can be expanded as \begin{align} \phi_{i=1}=\left(\frac{2\nu}{\pi}\right)^{\frac{3}{4}}\exp[-\nu(\bvec{r}^2+\bvec{\zeta}_1^2)+2\nu\bvec{r}\cdot\bvec{\zeta}_1]\chi_\uparrow\tau_1, \label{spwf1} \end{align} \begin{align} \phi_{i=2}=\left(\frac{2\nu}{\pi}\right)^{\frac{3}{4}}\exp[-\nu(\bvec{r}^2+\bvec{\zeta}_2^2)+2\nu\bvec{r}\cdot\bvec{\zeta}_2]\chi_\downarrow\tau_2, \end{align} where $\chi_\uparrow$ and $\chi_\downarrow$ stand for spin-up and down, respectively, and $\tau_1$ and $\tau_2$ are isospin wave functions of the protons. In Eq.~(\ref{spwf1}), the cross-term part in the power of the exponential can be Taylor expanded, and by substituting Eq.~(\ref{Eq.zeta1}), this factor is described as \begin{align} \exp[2\nu\bvec{r}\cdot\bvec{\zeta}_1]=\sum_{l=0}^\infty\frac{1}{l!}(2\nu{}Rr)^l\left(\frac{x+i\varLambda{}y}{r}\right)^l. \label{Taylor} \end{align} For $\varLambda=1$, by using the spherical harmonics $Y_{lm}(\varOmega)$ and introducing the radial part of the spatial wave function $R_{0l}(r)$, the single-particle wave function of the proton $i=1$ can be expressed as \begin{align} \phi_{i=1}=\left(\frac{2\nu}{\pi}\right)^{\frac{3}{4}}\sum_{l=0}^\infty\frac{(2\nu{}R)^l}{l!s_lt_l}R_{0l}(r)Y_{ll}(\varOmega)\chi_\uparrow\tau_1, \end{align} where \begin{align} \left(\frac{x+iy}{r}\right)^l=\frac{1}{s_l}Y_{ll}(\varOmega) \end{align} and \begin{align} r^l\exp[-\nu\bvec{r}^2] \equiv \frac{1}{t_l}R_{0l}(r), \label{Eq.RadialWaveFunction} \end{align} and $s_l$ and $t_l$ are the normalization factors of $Y_{ll}(\varOmega)$ and $R_{0l}(r)$, respectively. The proton $i=1$ has spin-up, and the spherical harmonics $Y_{ll}(\varOmega)$ with spin-up has $j_z=l+1/2$, which only couples to $j=l+1/2$ (stretched configuration), and the spin-orbit interaction works attractively. Thus the proton $i=1$ is described as a linear combination of $j$-upper orbits with $j=l+1/2$ and $j_z = j$, \begin{align} \phi_{i=1}=\sum_{j=1/2}^\infty{}a_jR^{j-\frac{1}{2}} \langle \bvec{r} |j,j\rangle\tau_1, \label{Eq.phi1ExpandedByjj} \end{align} where $a_j$ is a coefficient for the $\langle \bvec{r} |j,j\rangle$ orbit with a separated factor of $R^{j-\frac{1}{2}}$. The proton $i=2$ is the time reversal partner of $i=1$ with spin-down, \begin{align} \phi_{i=2}=\sum_{j=1/2}^\infty{}a_{-j}R^{j-\frac{1}{2}} \langle \bvec{r} |j,-j\rangle\tau_2. \label{Eq.phi2ExpandedByjj} \end{align} \par For other protons, $i=3$ and $4$ are introduced as in the same quasi cluster, and $i=5$ and $6$ also belong to the same quasi cluster, but this is different from the one for $i=3$ and $i=4$. Their wave functions are introduced by rotating both the spatial and spin parts of the protons $i=1,2$ about the $y$ axis as \begin{align} \phi_{i+2}=\hat{R}(\alpha=0, \beta=\theta_1, \gamma=0)\phi_i, \\ \phi_{i+4}=\hat{R}(\alpha=0, \beta=\theta_2, \gamma=0)\phi_i, \end{align} where $i=1,2$. The rotation does not change the total angular momentum $j$, and the resultant single-particle wave functions are also linear combinations of $j$-upper orbits. Here, $\alpha$, $\beta$, $\gamma$ are the Euler angles, and $\hat{R}$($\alpha$, $\beta$, $\gamma$) is the rotation operator. The parameters $\theta_1$ and $\theta_2$ are rotational angles, and they are introduced as $\theta_1=2\pi/3$ and $\theta_2=4\pi/3$, which give an equilateral triangular shape of the three $\alpha$ clusters when $\varLambda$ is equal to zero. The $\langle \bvec{r}|j,j\rangle$ orbit after the rotation can be expressed as \begin{align} \hat{R}(\alpha=0, \beta=\theta, \gamma=0)\langle \bvec{r}|j,j\rangle=\sum_{m=-j}^jd^j_{mj}(\theta)\langle \bvec{r}|j,m\rangle, \end{align} where $d^j_{km}(\beta)$ is Wigner's small $d$ function, \begin{align} \langle{}j,k|\hat{R}(\alpha,\beta,\gamma)|j,m\rangle=\exp[-ik\alpha]d^j_{km}(\beta)\exp[-im\gamma]. \end{align} Thus the rotated single-particle wave function is expressed as \begin{align} \hat{R}(\alpha=0, \beta=\theta, \gamma=0)\phi_1=\sum_{j=1/2}^\infty\sum_{m=-j}^ja_jR^{j-\frac{1}{2}}d^j_{mj}(\theta) \langle \bvec{r}|j,m\rangle\tau_1. \end{align} The result shows that when $\varLambda$ is equal to unity, all the single-particle wave functions are described as the linear combinations of $j$-upper orbits, and the Slater determinant has only the $(0s_{1/2})^4(0p_{3/2})^8$ component at the lowest order of $R$. \subsection{Extension of AQCM} \label{Sec.TheModel} Here we explain our new model, which is the extension of AQCM. \subsubsection{Total wave function} The total wave function is expressed as a linear combination of different Slater determinants based on the generator coordinate method (GCM) as \begin{align} \varPhi^n=&\sum_kc_k^n\varPsi_k, \\ \varPsi_k=&\hat{P}^J_{MK}\hat{P}^\pi\mathcal{A}[\phi_1\cdots\phi_{12}]_k, \end{align} where $\hat{P}^J_{MK}$ and $\hat{P}^\pi$ are the angular momentum and parity projection operators. Here $k=1,2\ldots$ is a label for different basis states. The coefficients $\{ c_k^n \}$ are determined by solving the Hill-Wheeler equation, and $n=1,2,\ldots$ denotes the $n$-th excited state obtained after the diagonalization of the Hamiltonian. In this paper, we particularly pay attention to the $0^+$ states, thus $J=M=K=0$ and $\pi=+$. \par \begin{figure} \centering \includegraphics[width=.4\textwidth, trim= 0cm 0cm 0cm 0cm, clip]{model.eps} \caption{(Color online) Schematic figure for the cluster model configurations. The red spheres show the $\alpha$ clusters.} \label{Fig.model} \end{figure} For the basis states, we prepare both the shell and cluster model ones. For the shell model part, we use AQCM, and in addition to the subclosure configuration of $0p_{3/2}$, we introduce five different two particle two hole (2p2h) configurations. For the cluster model space, we introduce thirty different three $\alpha$ configurations. In total, we superpose $6+30=36$ basis states and diagonalize the Hamiltonian. For the width parameter $\nu$ $(=1/2b^2)$ in Eq.~(\ref{Eq.SpatialPart}), we take $b=1.4\,\mathrm{fm}$. \par For the shell model basis states, as shown in the previous subsection, we can transform the $\alpha$ cluster model wave function to the $0p_{3/2}$ subclosure configuration of the $jj$-coupling shell model using AQCM. This is $(0s_{1/2})^2(0p_{3/2})^4$ for the proton and neutron parts, and here we call it zero particle zero hole (0p0h) state. To generate this state, we take a small enough $R$ value of $R=0.1\,\mathrm{fm}$ in Eqs.~(\ref{Eq.zeta1}) and (\ref{Eq.zeta2}). In addition, we newly introduce five 2p2h configurations. Four of them correspond to the normal BCS-like pairing effect of protons or neutrons; $(0s_{1/2})^2(0p_{3/2})^2(0p_{1/2})^2$ and $(0s_{1/2})^2(0p_{3/2})^2(0d_{5/2})^2$ are introduced for the proton part or neutron part. We further taken into account the proton-neutron pairing effect. For this purpose, we prepare a basis state, where one proton and one neutron are excited from $0p_{3/2}$ to $0p_{1/2}$; $(0s_{1/2})^2(0p_{3/2})^3(0p_{1/2})^1$ for both proton and neutron parts. This is also 2p2h, but each isospin (proton or neutron) part is one particle one hole (1p1h). In total we introduce six configurations for the $0^+$ states of $^{12}\mathrm{C}$; 0p0h for both proton and neutron parts ($pn$-0p0h), 2p2h excitation to $0p_{1/2}$ for the proton part ($pp$-$p_{1/2}$-2p2h), that for the neutron part ($nn$-$p_{1/2}$-2p2h), 2p2h excitation to $0d_{5/2}$ for the proton part ($pp$-$d_{5/2}$-2p2h), that for the neutron part ($nn$-$d_{5/2}$-2p2h), and 1p1h to $0p_{1/2}$ for both proton and neutron parts ($pn$-$p_{1/2}$-2p2h). The 1p1h configuration is explained in Sec.~\ref{Sec.DescriptionOfOneParticleOneHole}, and the 2p2h configurations are explained in Sec.~\ref{Sec.DescriptionOfTwoParticleTwoHoleByAntisymmetrizationEffect} and Sec.~\ref{Sec.DescriptionOf0s1/20p3/20d5/2ConfigurationByARegularTriangleStructure}. \par For the cluster model basis states, as schematically shown in Fig.~\ref{Fig.model}, the configurations are introduced with isosceles triangular shapes. The parameters $d$ and $h$ are the base and height of the isosceles triangle, respectively, and they are taken as $d=1,2,\ldots,5\,\mathrm{fm}$ and $h=1,2,\ldots,6\,\mathrm{fm}$. There are $5\times6=30$ basis states for the cluster model side. \subsubsection{Hamiltonian} The Hamiltonian used in the present calculation is \begin{align} \hat{H}=\hat{T}-\hat{T}_\mathrm{G}+\hat{V}_\mathrm{C}+\hat{V}_\mathrm{LS}+\hat{V}_\mathrm{Coulomb}, \end{align} where $\hat{T}$ is the total kinetic energy operator and $\hat{T}_\mathrm{G}$ is the kinetic energy operator of the center of mass motion. For the central force $\hat{V}_\mathrm{C}$, we use the Volkov No.2 force~\cite{Volkov.NuclPhys74.33.1965} given by \begin{align} \hat{V}_\mathrm{C}=\sum_{i<j}^A\left[V_a\exp\left(-\frac{\hat{\bvec{r}}_{ij}^2}{\alpha^2}\right)+V_r\exp\left(-\frac{\hat{\bvec{r}}_{ij}^2}{\rho^2}\right)\right]\left[W+B\hat{P}^\sigma_{ij}-H\hat{P}^\tau_{ij}-M\hat{P}^\sigma_{ij}\hat{P}^\tau_{ij}\right], \end{align} where $V_a=-60.65\,\mathrm{MeV}$, $V_r=61.14\,\mathrm{MeV}$, $\alpha=1.80\,\mathrm{fm}$, and $\rho=1.01\,\mathrm{fm}$ are the original values. We take $M=1-W=0.6$. Here, $B$ and $H$ denote the Bartlett and Heisenberg terms, which are added to remove the bound state of two neutrons. We take $B=H=0.125$. For the spin-orbit force $\hat{V}_\mathrm{LS}$, we use the spin-orbit part of the G3RS force~\cite{Tamagaki.ProgTheorPhys39.91.1968} given by \begin{align} \hat{V}_\mathrm{LS}=\sum_{i<j}^A\left[V_\mathrm{LS1}\exp\left(-\frac{\hat{\bvec{r}}_{ij}^2}{\eta_1^2}\right)+V_\mathrm{LS2}\exp\left(-\frac{\hat{\bvec{r}}_{ij}^2}{\eta_2^2}\right)\right]\hat{P}_{ij}(^3O)\hat{\bvec{L}}_{ij}\cdot\hat{\bvec{S}}_{ij}, \end{align} where $\eta_1=0.447\,\mathrm{fm}$ and $\eta_2=0.6\,\mathrm{fm}$ are the original values. The coefficients $V_\mathrm{LS1}=-V_\mathrm{LS2}=1600\,\mathrm{MeV}$ are determined to give a reasonable energy for the ground state in $^{12}\mathrm{C}$. Also, the validity of $V_\mathrm{LS1}=-V_\mathrm{LS2}=1600\,\mathrm{MeV}$ is checked in Ref~\cite{Suhara.PhysRevC87.054334.2013}. The operator $\hat{V}_\mathrm{Coulomb}$ is the Coulomb potential for protons. \section{Results and discussion} \label{Sec.ResultsAndDiscussion} As already seen, the closure configurations of the major shells can be described by conventional $\alpha$ cluster models, and subclosure configurations of the $jj$-coupling shell model can be described by AQCM. Here we extend AQCM. At first we discuss the AQCM wave functions with general $\varLambda$ values and next show how to describe particle hole excitations. For $^{12}\mathrm{C}$, single particle excitations from $0p_{3/2}$ to $0p_{1/2}$ and $0d_{5/2}$ are introduced for the proton part, neutron part, and proton-neutron part, and the effect of BCS-like pairing is incorporated. Finally these shell-model-like wave functions are coupled with the three $\alpha$ cluster wave functions. \subsection{AQCM wave functions with general $\varLambda$ values} We already discussed that $\varLambda = 0$ corresponds to $\alpha$ cluster states and $\varLambda=1$ with small $R$ corresponds to the $jj$-coupling shell model states. However, the discussion for the general $\varLambda$ values ($\varLambda\neq 0,1$) is insufficient. In this subsection, we investigate the feature of the AQCM wave functions with general $\varLambda$ values in $^{12}\mathrm{C}$. \par Using the relations for the spherical harmonics \begin{align} \frac{x+iy}{r}=&\frac{1}{s_1}Y_{11}(\varOmega), \\ \frac{x-iy}{r}=&\frac{1}{s_{-1}}Y_{1-1}(\varOmega)=-\frac{1}{s_1}Y_{1-1}(\varOmega), \end{align} and Eqs.~(\ref{Taylor}) and (\ref{Eq.RadialWaveFunction}), the single-particle wave function of the proton $i=1$ [Eq.~(\ref{spwf1})] with general $\varLambda$ becomes \begin{align} \phi_{i=1}=&\left(\frac{2\nu}{\pi}\right)^{\frac{3}{4}}e^{-\nu{}R^2(1-\varLambda^2)} \nonumber \\ &\times\left[\frac{1}{s_0t_0}R_{00}(r)Y_{00}(\varOmega)+\frac{2\nu{}R}{s_1t_1}R_{01}(r)\left(\frac{1+\varLambda}{2}Y_{11}(\varOmega)-\frac{1-\varLambda}{2}Y_{1-1}(\varOmega)\right)+\mathcal{O}(R^2)\right]\chi_\uparrow\tau_1. \end{align} We introduce $jj$-coupling bases using the Clebsch-Gordan coefficients, \begin{align} \ket{j=\frac{3}{2},j_z=\frac{1}{2}}=&R_{01}(r)\left(\frac{1}{\sqrt{3}}Y_{11}(\varOmega)\chi_\downarrow+\sqrt{\frac{2}{3}}Y_{10}(\varOmega)\chi_\uparrow\right), \label{Eq.3/21/2} \\ \ket{j=\frac{3}{2},j_z=-\frac{1}{2}}=&R_{01}(r)\left(\sqrt{\frac{2}{3}}Y_{10}(\varOmega)\chi_\downarrow+\frac{1}{\sqrt{3}}Y_{1-1}(\varOmega)\chi_\uparrow\right), \label{Eq.3/2-1/2} \\ \ket{j=\frac{1}{2},j_z=\frac{1}{2}}=&R_{01}(r)\left(\sqrt{\frac{2}{3}}Y_{11}(\varOmega)\chi_\downarrow-\frac{1}{\sqrt{3}}Y_{10}(\varOmega)\chi_\uparrow\right), \label{Eq.1/21/2} \\ \ket{j=\frac{1}{2},j_z=-\frac{1}{2}}=&R_{01}(r)\left(\frac{1}{\sqrt{3}}Y_{10}(\varOmega)\chi_\downarrow-\sqrt{\frac{2}{3}}Y_{1-1}(\varOmega)\chi_\uparrow\right). \label{Eq.1/2-1/2} \end{align} Thus the single-particle wave function of proton $i=1$ with general $\varLambda$ becomes \begin{align} \phi_{i=1}=&e^{-\nu{}R^2(1-\varLambda^2)} \nonumber \\ &\times\left[a_{1/2}\ket{s\frac{1}{2}\frac{1}{2}}\right. \nonumber \\ &\hspace{3ex} \left.+a_{3/2}R\left(\frac{1+\varLambda}{2}\ket{p\frac{3}{2}\frac{3}{2}}-\frac{1-\varLambda}{2}\left(\frac{1}{\sqrt{3}}\ket{p\frac{3}{2}\frac{-1}{2}}-\sqrt{\frac{2}{3}}\ket{p\frac{1}{2}\frac{-1}{2}}\right)\right)+\mathcal{O}(R^2)\right]\tau_1, \end{align} where $s$ and $p$ are indexes to distinguish the $s$ and $p$ orbits. Similarly, the single-particle wave function of the proton $i=2$, which is time reversal of $i=1$, becomes \begin{align} \phi_{i=2}=&e^{-\nu{}R^2(1-\varLambda^2)} \nonumber \\ &\times\left[a_{-1/2}\ket{s\frac{1}{2}\frac{-1}{2}}\right. \nonumber \\ &\hspace{3ex} \left.+a_{-3/2}R\left(-\frac{1-\varLambda}{2}\left(\frac{1}{\sqrt{3}}\ket{p\frac{3}{2}\frac{1}{2}}+\sqrt{\frac{2}{3}}\ket{p\frac{1}{2}\frac{1}{2}}\right)+\frac{1+\varLambda}{2}\ket{p\frac{3}{2}\frac{-3}{2}}\right)+\mathcal{O}(R^2)\right]\tau_2. \end{align} The single-particle wave functions of protons $i=3-6$ are generated by multiplying the rotational operators $\hat{R}(0,2\pi/3,0)$ or $\hat{R}(0,4\pi/3,0)$ for the single-particle wave functions of protons $i=1,2$ as in original AQCM~\cite{Suhara.PhysRevC87.054334.2013}, \begin{align} \phi_{i=3}=&e^{-\nu{}R^2(1-\varLambda^2)} \nonumber \\ &\times\left[a_{1/2}\left(\frac{1}{2}\ket{s\frac{1}{2}\frac{1}{2}}+\frac{\sqrt{3}}{2}\ket{s\frac{1}{2}\frac{-1}{2}}\right)\right. \nonumber \\ &\hspace{1eM}+a_{3/2}R\left(-\frac{1-2\varLambda}{8}\ket{p\frac{3}{2}\frac{3}{2}}+\frac{1+2\varLambda}{8}\ket{p\frac{3}{2}\frac{1}{2}}-\sqrt{2}\frac{1-\varLambda}{4}\ket{p\frac{1}{2}\frac{1}{2}}\right. \nonumber \\ &\left.\left.\hspace{2eM}+\frac{1}{\sqrt{3}}\frac{7+2\varLambda}{8}\ket{p\frac{3}{2}\frac{-1}{2}}+\sqrt{\frac{2}{3}}\frac{1-\varLambda}{4}\ket{p\frac{1}{2}\frac{-1}{2}}+\sqrt{3}\frac{1+2\varLambda}{8}\ket{p\frac{3}{2}\frac{-3}{2}}\right)+\mathcal{O}(R^2)\right]\tau_3, \end{align} \begin{align} \phi_{i=4}=&e^{-\nu{}R^2(1-\varLambda^2)} \nonumber \\ &\times\left[a_{-1/2}\left(-\frac{\sqrt{3}}{2}\ket{s\frac{1}{2}\frac{1}{2}}+\frac{1}{2}\ket{s\frac{1}{2}\frac{-1}{2}}\right)\right. \nonumber \\ &\hspace{1eM}+a_{-3/2}R\left(-\sqrt{3}\frac{1+2\varLambda}{8}\ket{p\frac{3}{2}\frac{3}{2}}+\frac{1}{\sqrt{3}}\frac{7+2\varLambda}{8}\ket{p\frac{3}{2}\frac{1}{2}}-\sqrt{\frac{2}{3}}\frac{1-\varLambda}{4}\ket{p\frac{1}{2}\frac{1}{2}}\right. \nonumber \\ &\left.\left.\hspace{2eM} -\frac{1+2\varLambda}{8}\ket{p\frac{3}{2}\frac{-1}{2}}-\sqrt{2}\frac{1-\varLambda}{4}\ket{p\frac{1}{2}\frac{-1}{2}}-\frac{1-2\varLambda}{8}\ket{p\frac{3}{2}\frac{-3}{2}}\right)+\mathcal{O}(R^2)\right]\tau_4, \end{align} \begin{align} \phi_{i=5}=&e^{-\nu{}R^2(1-\varLambda^2)} \nonumber \\ &\times\left[a_{1/2}\left(-\frac{1}{2}\ket{s\frac{1}{2}\frac{1}{2}}+\frac{\sqrt{3}}{2}\ket{s\frac{1}{2}\frac{-1}{2}}\right)\right. \nonumber \\ &\hspace{1eM}+a_{3/2}R\left(\frac{1-2\varLambda}{8}\ket{p\frac{3}{2}\frac{3}{2}}+\frac{1+2\varLambda}{8}\ket{p\frac{3}{2}\frac{1}{2}}-\sqrt{2}\frac{1-\varLambda}{4}\ket{p\frac{1}{2}\frac{1}{2}}\right. \nonumber \\ &\left.\left.\hspace{2eM}-\frac{1}{\sqrt{3}}\frac{7+2\varLambda}{8}\ket{p\frac{3}{2}\frac{-1}{2}}-\sqrt{\frac{2}{3}}\frac{1-\varLambda}{4}\ket{p\frac{1}{2}\frac{-1}{2}}+\sqrt{3}\frac{1+2\varLambda}{8}\ket{p\frac{3}{2}\frac{-3}{2}}\right)+\mathcal{O}(R^2)\right]\tau_5, \end{align} \begin{align} \phi_{i=6}=&e^{-\nu{}R^2(1-\varLambda^2)} \nonumber \\ &\times\left[a_{-1/2}\left(-\frac{\sqrt{3}}{2}\ket{s\frac{1}{2}\frac{1}{2}}-\frac{1}{2}\ket{s\frac{1}{2}\frac{-1}{2}}\right)\right. \nonumber \\ &\hspace{1eM}+a_{-3/2}R\left(-\sqrt{3}\frac{1+2\varLambda}{8}\ket{p\frac{3}{2}\frac{3}{2}}-\frac{1}{\sqrt{3}}\frac{7+2\varLambda}{8}\ket{p\frac{3}{2}\frac{1}{2}}+\sqrt{\frac{2}{3}}\frac{1-\varLambda}{4}\ket{p\frac{1}{2}\frac{1}{2}}\right. \nonumber \\ &\left.\left.\hspace{2eM} -\frac{1+2\varLambda}{8}\ket{p\frac{3}{2}\frac{-1}{2}}-\sqrt{2}\frac{1-\varLambda}{4}\ket{p\frac{1}{2}\frac{-1}{2}}+\frac{1-2\varLambda}{8}\ket{p\frac{3}{2}\frac{-3}{2}}\right)+\mathcal{O}(R^2)\right]\tau_6. \end{align} Thus the proton part of the wave function becomes \begin{align} \varPsi_p=&\mathcal{A}[\phi_1,\ldots,\phi_6] \nonumber \\ =&-\frac{9}{16}e^{-6\nu{}R^2(1-\varLambda^2)}(a_{1/2}a_{-3/2}-a_{-1/2}a_{3/2})^2a_{3/2}a_{-3/2}R^4 \nonumber \\ &\times\mathcal{A}\left[\ket{s\frac{1}{2}\frac{1}{2}},\ket{s\frac{1}{2}\frac{-1}{2}}, -\frac{1}{2}\ket{p\frac{3}{2}\frac{3}{2}}+\frac{\sqrt{3}}{2}\ket{p\frac{3}{2}\frac{-1}{2}}, \frac{\sqrt{3}}{2}\ket{p\frac{3}{2}\frac{1}{2}}-\frac{1}{2}\ket{p\frac{3}{2}\frac{-3}{2}},\right. \nonumber \\ &\hspace{1eM} \left.-\frac{1-\varLambda}{\sqrt{2}}\ket{p\frac{1}{2}\frac{1}{2}}+\frac{1+2\varLambda}{\sqrt{3}}\ket{p\frac{3}{2}\frac{-3}{2}}, -\frac{1+2\varLambda}{\sqrt{3}}\ket{p\frac{3}{2}\frac{3}{2}}-\frac{1-\varLambda}{\sqrt{2}}\ket{p\frac{1}{2}\frac{-1}{2}}\right] \nonumber \\ &+\mathcal{O}(R^5), \label{Eq.PsiWithOnlyLambda} \end{align} where we omit the isospin part of the wave function. The neutron part is introduced in the completely same way. In Eq.~(\ref{Eq.PsiWithOnlyLambda}), two protons occupy $0s$ orbits and the others are described by the superposition of four different $0p$ orbits. We can easily check that $\varLambda=1$ gives the $(0s_{1/2})^2(0p_{3/2})^4$ configuration with a small enough $R$ value as in original AQCM~\cite{Suhara.PhysRevC87.054334.2013}. \subsection{Description of 2p2h ($p_{1/2}$-2p2h) } \label{Sec.DescriptionOfTwoParticleTwoHoleByAntisymmetrizationEffect} We show that the AQCM wave functions describe the 2p2h excitations of protons from the subclosure configuration to $0p_{1/2}$ [$(0s_{1/2})^4(0p_{3/2})^6(0p_{1/2})^2$] by using a different $\varLambda$ parameter for each quasi-$\alpha$ cluster (completely the same procedure can be applied also to the neutron part). We introduce two $\varLambda$ parameters, $\varLambda_a$ for protons $i=1-2$ and $\varLambda_b$ for protons $i=3-6$. After the antisymmetrization, the proton part of the wave function becomes \begin{align} \varPsi_p=&\mathcal{A}[\phi_1,\ldots,\phi_6] \nonumber \\ =&e^{-2\nu{}R^2(3-\varLambda_a^2-2\varLambda_b^2)}a_{1/2}a_{-1/2}a_{3/2}^2a_{-3/2}^2R^4 \nonumber \\ &\times\mathcal{A}\left[\ket{s\frac{1}{2}\frac{1}{2}},\ket{s\frac{1}{2}\frac{-1}{2}}, \right. \nonumber \\ &\hspace{1eM} -\frac{3+2(\varLambda_a-\varLambda_b)}{8}\ket{p\frac{3}{2}\frac{3}{2}}+\frac{1}{\sqrt{3}}\frac{9-2(\varLambda_a-\varLambda_b)}{8}\ket{p\frac{3}{2}\frac{-1}{2}}+\sqrt{\frac{2}{3}}\frac{\varLambda_a-\varLambda_b}{4}\ket{p\frac{1}{2}\frac{-1}{2}}, \nonumber \\ &\hspace{1eM} \frac{1}{\sqrt{3}}\frac{9-2(\varLambda_a-\varLambda_b)}{8}\ket{p\frac{3}{2}\frac{1}{2}}-\sqrt{\frac{2}{3}}\frac{\varLambda_a-\varLambda_b}{4}\ket{p\frac{1}{2}\frac{1}{2}}-\frac{3+2(\varLambda_a-\varLambda_b)}{8}\ket{p\frac{3}{2}\frac{-3}{2}}, \nonumber \\ &\hspace{1eM} -\frac{1-2(\varLambda_a+\varLambda_b)}{4}\ket{p\frac{3}{2}\frac{1}{2}}-\frac{2-(\varLambda_a+\varLambda_b)}{\sqrt{2}}\ket{p\frac{1}{2}\frac{1}{2}}+\sqrt{3}\frac{3+2(\varLambda_a+\varLambda_b)}{4}\ket{p\frac{3}{2}\frac{-3}{2}}, \nonumber \\ &\hspace{1eM} \left.-\sqrt{3}\frac{3+2(\varLambda_a+\varLambda_b)}{4}\ket{p\frac{3}{2}\frac{3}{2}}+\frac{1-2(\varLambda_a+\varLambda_b)}{4}\ket{p\frac{3}{2}\frac{-1}{2}}-\frac{2-(\varLambda_a+\varLambda_b)}{\sqrt{2}}\ket{p\frac{1}{2}\frac{-1}{2}}\right] \nonumber \\ &+\mathcal{O}(R^5). \label{Eq.PsipLambdaaLambdab} \end{align} Here, we used the time reversal relations, $a_{-1/2}=a_{1/2}$ and $a_{-3/2}=-a_{3/2}$, and omitted the isospin part. As easily recognized, the conditions $3+2(\varLambda_a-\varLambda_b)=0$ and $3+2(\varLambda_a+\varLambda_b)=0$, namely $(\varLambda_a,\varLambda_b)=(-3/2,0)$, allow us to remove the components of $|p,3/2,3/2\rangle$ and $|p,3/2,-3/2\rangle$. In this case, the proton part of the wave function [Eq.~(\ref{Eq.PsipLambdaaLambdab})] becomes \begin{align} \varPsi_p=&6e^{-\frac{3}{2}\nu{}R^2}a_{1/2}a_{-1/2}a_{3/2}^2a_{-3/2}^2R^4 \nonumber \\ &\times\mathcal{A}\left[\ket{s\frac{1}{2}\frac{1}{2}},\ket{s\frac{1}{2}\frac{-1}{2}},\ket{p\frac{3}{2}\frac{1}{2}},\ket{p\frac{3}{2}\frac{-1}{2}},\ket{p\frac{1}{2}\frac{1}{2}},\ket{p\frac{1}{2}\frac{-1}{2}}\right]+\mathcal{O}(R^5), \end{align} and it coincides with the $(0s_{1/2})^2(0p_{3/2})^2(0p_{1/2})^2$ configuration ($p_{1/2}$-2p2h) at the limit of $R\to0$. By imposing other conditions, we can change the hole configuration. The conditions $9-2(\varLambda_a-\varLambda_b)=0$ and $1-2(\varLambda_a+\varLambda_b)=0$, namely $(\varLambda_a,\varLambda_b)=(5/2,-2)$, allow us to remove the components of $|p,3/2,1/2\rangle$ and $|p,3/2,-1/2\rangle$. Thus the proton part of the wave function [Eq.~(\ref{Eq.PsipLambdaaLambdab})] becomes \begin{align} \varPsi_p=&\frac{27}{8}e^{\frac{25}{2}\nu{}R^2}a_{1/2}a_{-1/2}a_{3/2}^2a_{-3/2}^2R^4 \nonumber \\ &\times\mathcal{A}\left[\ket{s\frac{1}{2}\frac{1}{2}},\ket{s\frac{1}{2}\frac{-1}{2}},\ket{p\frac{3}{2}\frac{3}{2}},\ket{p\frac{3}{2}\frac{-3}{2}},\ket{p\frac{1}{2}\frac{1}{2}},\ket{p\frac{1}{2}\frac{-1}{2}}\right]+\mathcal{O}(R^5), \end{align} and it coincides with the $(0s_{1/2})^2(0p_{3/2})^2(0p_{1/2})^2$ configuration ($p_{1/2}$-2p2h) at the limit of $R\to0$. This is also the 2p2h excitation from $0p_{3/2}$ to $0p_{1/2}$, but the configuration is slightly different from the previous case. \subsection{Description of 1p1h} \label{Sec.DescriptionOfOneParticleOneHole} Next we further improve the AQCM wave function to describe the 1p1h excitations from the subclosure configuration. For this purpose, we generalize the Gaussian center parameter in Eq.~(\ref{Eq.SpatialPart}) as \begin{align} \bvec{\zeta}_i=R(a_i\bvec{e}_x+ib_i\bvec{e}_y+c_i\bvec{e}_z), \label{Eq.zeta.eq.aibici} \end{align} where $R$ is a real number with a dimension of length, and $a_i$, $b_i$, and $c_i$ are dimensionless real numbers. Here $\bvec{e}_x$, $\bvec{e}_y$, and $\bvec{e}_z$ are unit vectors for the $x$, $y$, and $z$ axes, respectively. The spin orientation is no longer fixed along the $z$ axis, and the spin wave function $\chi_i$ is more generalized as \begin{align} \chi_i=\cos\frac{\beta_i}{2}\chi_\uparrow+\sin\frac{\beta_i}{2}\chi_\downarrow, \label{Eq.chi.eq.cosbetaplussinbeta} \end{align} where $\beta_i$ is taken as a real parameter for simplicity. If $(a_i,b_i,c_i)=(1,\varLambda,0)$ and $\beta_i=0$ are satisfied, Eq.~(\ref{Eq.zeta.eq.aibici}) coincides with original AQCM in Eq.~(\ref{Eq.zeta1}). \par The single-particle wave function is expanded with the $jj$-coupling shell model bases, $\{|j,j_z\rangle\}$, as in the previous subsections. Using the relation \begin{align} \frac{a_ix+ib_iy+c_iz}{r}=&A_i\frac{x+iy}{r}+B_i\frac{x-iy}{r}+C_i\frac{\sqrt{2}z}{r} \nonumber \\ =&\frac{1}{s_1}\left(A_iY_{11}(\varOmega)-B_iY_{1-1}(\varOmega)-C_iY_{10}(\varOmega)\right), \end{align} and Eqs.~(\ref{Eq.RadialWaveFunction}), (\ref{Eq.3/21/2})$-$(\ref{Eq.1/2-1/2}), this generalized single-particle wave function becomes \begin{align} \phi_i=&e^{-\nu{}R^2(a_i^2-b_i^2+c_i^2)} \nonumber \\ &\times\left[a_{1/2}\left(\cos\frac{\beta_i}{2}\ket{s\frac{1}{2}\frac{1}{2}}+\sin\frac{\beta_i}{2}\ket{s\frac{1}{2}\frac{-1}{2}}\right)\right. \nonumber \\ &\hspace{1eM}+a_{3/2}R\left(A_i\cos\frac{\beta_i}{2}\ket{p\frac{3}{2}\frac{3}{2}}+\frac{1}{\sqrt{3}}\left(A_i\sin\frac{\beta_i}{2}-\sqrt{2}C_i\cos\frac{\beta_i}{2}\right)\ket{p\frac{3}{2}\frac{1}{2}}\right. \nonumber \\ &\hspace{3eM}+\frac{1}{\sqrt{3}}\left(\sqrt{2}A_i\sin\frac{\beta_i}{2}+C_i\cos\frac{\beta_i}{2}\right)\ket{p\frac{1}{2}\frac{1}{2}}-\frac{1}{\sqrt{3}}\left(\sqrt{2}C_i\sin\frac{\beta_i}{2}+B_i\cos\frac{\beta_i}{2}\right)\ket{p\frac{3}{2}\frac{-1}{2}} \nonumber \\ &\hspace{3eM}\left.\left.-\frac{1}{\sqrt{3}}\left(C_i\sin\frac{\beta_i}{2}-\sqrt{2}B_i\cos\frac{\beta_i}{2}\right)\ket{p\frac{1}{2}\frac{-1}{2}}-B_i\sin\frac{\beta_i}{2}\ket{p\frac{3}{2}\frac{-3}{2}}\right)+\mathcal{O}(R^2)\right]\tau_i, \label{Eq.GeneralAQCMSingleparticleWaveFunction} \end{align} where $A_i=(a_i+b_i)/2$, $B_i=(a_i-b_i)/2$, and $C_i=c_i/\sqrt{2}$, respectively. The single-particle wave function has all the four components of $0p_{3/2}$ orbits and all the two components of $0p_{1/2}$ orbits with different coefficients. \par Now a proton has all the six components of $0p$ orbits, and we remove some of them by imposing conditions. If $A_i\sin(\beta_i/2)-\sqrt{2}C_i\cos(\beta_i/2)=0$ is satisfied, we can eliminate the component of $|p,3/2,1/2\rangle$. Similarly, if $C_i\sin(\beta_i/2)-\sqrt{2}B_i\cos(\beta_i/2)=0$ is satisfied, the component of $|p,1/2,-1/2\rangle$ vanishes. Thus, if $A_i\sin(\beta_i/2)-\sqrt{2}C_i\cos(\beta_i/2)=0$ and $C_i\sin(\beta_i/2)-\sqrt{2}B_i\cos(\beta_i/2)=0$ are simultaneously satisfied, the single-particle wave function does not have the $|p,3/2,1/2\rangle$ and $|p,1/2,-1/2\rangle$ components. This was for one proton; however if all the protons satisfy the same conditions, the proton part of the wave function also does not have the components of $|p,3/2,1/2\rangle$ and $|p,1/2,-1/2\rangle$. This is nothing but 1p1h excitation to $0p_{1/2}$. \par \begin{table}[!h] \caption{Example of $\{(a_i,ib_i,c_i)\}$ and coefficients for the spin wave functions for the six protons ($i=1-6$), which describes the 1p1h configuration. The required conditions are $a_i^2-b_i^2=2c_i^2$ and $\tan(\beta_i/2)=\mathrm{sign}(a_ic_i)\sqrt{2(a_i-b_i)/(a_i+b_i)}$. The center of mass of the system is set to the origin. The parameters $a_i$, $b_i$, and $c_i$ are introduced in Eq.~(\ref{Eq.zeta.eq.aibici}), and the parameter $\beta_i$ is introduced in Eq.~(\ref{Eq.chi.eq.cosbetaplussinbeta}). } \label{Tab.ExampleOfTheSet} \centering \begin{tabular}{ccccccc} \hline \hline $i$ & 1 & 2 & 3 & 4 & 5 & 6 \\ \hline $a_i$ & $1$ & $1$ & $-\frac{1}{2}$ & $-\frac{1}{2}$ & $-\frac{1}{2}$ & $-\frac{1}{2}$ \\ $ib_i$ & $i$ & $-i$ & $\frac{1}{2}i\varLambda$ & $-\frac{1}{2}i\varLambda$ & $\frac{1}{2}i\varLambda$ & $-\frac{1}{2}i\varLambda$ \\ $c_i$ & $0$ & $0$ & $\frac{\sqrt{1-\varLambda^2}}{2\sqrt{2}}$ & $\frac{\sqrt{1-\varLambda^2}}{2\sqrt{2}}$ & $-\frac{\sqrt{1-\varLambda^2}}{2\sqrt{2}}$ & $-\frac{\sqrt{1-\varLambda^2}}{2\sqrt{2}}$ \\ coefficient for $\chi_\uparrow$ ($\cos\frac{\beta_i}{2}$) & $1$ & $0$ & $\sqrt{\frac{1-\varLambda}{3+\varLambda}}$ & $\sqrt{\frac{1+\varLambda}{3-\varLambda}}$ & $\sqrt{\frac{1-\varLambda}{3+\varLambda}}$ & $\sqrt{\frac{1+\varLambda}{3-\varLambda}}$ \\ coefficient for $\chi_\downarrow$ ($\sin\frac{\beta_i}{2}$) & $0$ & $1$ & $-\sqrt{2}\sqrt{\frac{1+\varLambda}{3+\varLambda}}$ & $-\sqrt{2}\sqrt{\frac{1-\varLambda}{3-\varLambda}}$ & $\sqrt{2}\sqrt{\frac{1+\varLambda}{3+\varLambda}}$ & $\sqrt{2}\sqrt{\frac{1-\varLambda}{3-\varLambda}}$ \\ \hline \hline \end{tabular} \end{table} In the following part, we simplify the conditions to describe 1p1h. The conditions $A_i\sin(\beta_i/2)-\sqrt{2}C_i\cos(\beta_i/2)=0$ and $C_i\sin(\beta_i/2)-\sqrt{2}B_i\cos(\beta_i/2)=0$ are equivalent to $\tan(\beta_i/2)=\sqrt{2}C_i/A_i=\sqrt{2}B_i/C_i$. Substituting $A_i=(a_i+b_i)/2$, $B_i=(a_i-b_i)/2$, and $C_i=c_i/\sqrt{2}$, the conditions become $a_i^2-b_i^2=2c_i^2$. As $a_i$, $b_i$, and $c_i$ are real numbers, another condition of $|a_i|\ge|b_i|$ is required. As a result, the conditions for the spin part of the wave function become $\tan(\beta_i/2)=\mathrm{sign}(a_ic_i)\sqrt{2(a_i-b_i)/(a_i+b_i)}$, where $\mathrm{sign}(\xi)=\xi/|\xi|$. As an example which realizes the conditions, $a_i^2-b_i^2=2c_i^2$ and $\tan(\beta_i/2)=\mathrm{sign}(a_ic_i)\sqrt{2(a_i-b_i)/(a_i+b_i)}$, we show a set for the six protons in Table~\ref{Tab.ExampleOfTheSet}. The center of mass of the system is set to the origin. The parameters for protons $i=1$ and $2$ are equivalent to the ones for the original AQCM wave function~\cite{Suhara.PhysRevC87.054334.2013}. We can confirm that the presence of a real parameter $\varLambda$ avoids the risk that some of the single particle orbits are not linear independent. For the range of $\varLambda$, only $0<\varLambda<1$ is allowable. Using these parameters, the wave function of the proton part $\varPsi_p=\mathcal{A}[\phi_1,\ldots,\phi_6]$ describes the $(0s_{1/2})^2(0p_{3/2})^3(0p_{1/2})^1$ configuration at the limit of $R\to0$. \par \begin{table}[!h] \caption{Example of $\{(a_i,ib_i,c_i)\}$ and coefficients for the spin wave functions for the six neutrons ($i=7-12$), which describes the 1p1h configuration. The required conditions are $a_i^2-b_i^2=2c_i^2$ and $\tan(\beta_i/2)=-\mathrm{sign}(a_ic_i)\sqrt{(a_i-b_i)/[2(a_i+b_i)]}$. The center of mass of the system is set to the origin. The parameters $a_i$, $b_i$, and $c_i$ are introduced in Eq.~(\ref{Eq.zeta.eq.aibici}), and the parameter $\beta_i$ is introduced in Eq.~(\ref{Eq.chi.eq.cosbetaplussinbeta}). } \label{Tab.ExampleOfTheSet2} \centering \begin{tabular}{ccccccc} \hline \hline $i$ & 7 & 8 & 9 & 10 & 11 & 12 \\ \hline $a_i$ & $1$ & $1$ & $-\frac{1}{2}$ & $-\frac{1}{2}$ & $-\frac{1}{2}$ & $-\frac{1}{2}$ \\ $ib_i$ & $i$ & $-i$ & $\frac{1}{2}i\varLambda$ & $-\frac{1}{2}i\varLambda$ & $\frac{1}{2}i\varLambda$ & $-\frac{1}{2}i\varLambda$ \\ $c_i$ & $0$ & $0$ & $\frac{\sqrt{1-\varLambda^2}}{2\sqrt{2}}$ & $\frac{\sqrt{1-\varLambda^2}}{2\sqrt{2}}$ & $-\frac{\sqrt{1-\varLambda^2}}{2\sqrt{2}}$ & $-\frac{\sqrt{1-\varLambda^2}}{2\sqrt{2}}$ \\ coefficient for $\chi_\uparrow$ ($\cos\frac{\beta_i}{2}$) & $1$ & $0$ & $\sqrt{2}\sqrt{\frac{1-\varLambda}{3-\varLambda}}$ & $\sqrt{2}\sqrt{\frac{1+\varLambda}{3+\varLambda}}$ & $\sqrt{2}\sqrt{\frac{1-\varLambda}{3-\varLambda}}$ & $\sqrt{2}\sqrt{\frac{1+\varLambda}{3+\varLambda}}$ \\ coefficient for $\chi_\downarrow$ ($\sin\frac{\beta_i}{2}$) & $0$ & $1$ & $\sqrt{\frac{1+\varLambda}{3-\varLambda}}$ & $\sqrt{\frac{1-\varLambda}{3+\varLambda}}$ & $-\sqrt{\frac{1+\varLambda}{3-\varLambda}}$ & $-\sqrt{\frac{1-\varLambda}{3+\varLambda}}$ \\ \hline \hline \end{tabular} \end{table} We need to couple all the nucleons to $0^+$, and 1p1h for the proton part and that for the neutron part must be introduced as time reversal partners. For the protons, we choose the parameters in Table~\ref{Tab.ExampleOfTheSet}, and the wave function becomes \begin{align} \mathcal{A}\left[\ket{s\frac{1}{2}\frac{1}{2}},\ket{s\frac{1}{2}\frac{-1}{2}},\ket{p\frac{3}{2}\frac{3}{2}},\ket{p\frac{1}{2}\frac{1}{2}},\ket{p\frac{3}{2}\frac{-1}{2}},\ket{p\frac{3}{2}\frac{-3}{2}}\right]. \end{align} Thus the neutron part must be introduced as \begin{align} \mathcal{A}\left[\ket{s\frac{1}{2}\frac{1}{2}},\ket{s\frac{1}{2}\frac{-1}{2}},\ket{p\frac{3}{2}\frac{3}{2}},\ket{p\frac{3}{2}\frac{1}{2}},\ket{p\frac{1}{2}\frac{-1}{2}},\ket{p\frac{3}{2}\frac{-3}{2}}\right]. \end{align} The conditions which eliminate the components of $|p,3/2,-1/2\rangle$ and $|p,1/2,1/2\rangle$ in Eq.~(\ref{Eq.GeneralAQCMSingleparticleWaveFunction}) are $\sqrt{2}C_i\sin(\beta_i/2)+B_i\cos(\beta_i/2)=0$ and $\sqrt{2}A_i\sin(\beta_i/2)+C_i\cos(\beta_i/2)=0$. These conditions are equivalent to $a_i^2-b_i^2=2c_i^2$ and $\tan(\beta_i/2)=-\mathrm{sign}(a_ic_i)\sqrt{(a_i-b_i)/[2(a_i+b_i)]}$. As an example which satisfies these conditions, we show a set of $\{(a_i,ib_i,c_i)\}$ and coefficients for the spin wave functions for the six neutrons in Table~\ref{Tab.ExampleOfTheSet2}. The center of mass of the system is set to the origin. We choose these parameters in Table~\ref{Tab.ExampleOfTheSet2} for the neutron part. \subsection{Description of $(0s_{1/2})^2(0p_{3/2})^2(0d_{5/2})^2$ configuration ($d_{5/2}$-2p2h)} In this subsection, we describe the 2p2h excitations to a higher major shell. In the conventional Brink model, the excitation was described by changing the spatial configuration of $\alpha$ clusters. The excitation to the $sd$ shell, $(0s)^2(0p)^2(0d)^2$ for the protons, was described by assuming a configuration that the three $\alpha$ clusters are on a straight line. Because of the antisymmetrization effect, two protons are excited from $0s$ to $0p$ orbits, and two protons are further excited to $0d$ orbits. At that time there was no spin-orbit effect, but now we have to transform this $0d$ orbits to $0d_{5/2}$ orbits of the $jj$-coupling shell model. Here we describe the $(0s_{1/2})^2(0p_{3/2})^2(0d_{5/2})^2$ configuration ($d_{5/2}$-2p2h) of $^{12}\mathrm{C}$ in two ways. If we take up to the second order of $R$, the single-particle wave functions in Eqs.~(\ref{Eq.phi1ExpandedByjj}) and (\ref{Eq.phi2ExpandedByjj}) become \begin{align} \phi_{i=1}=&\left[a_{1/2}\ket{\frac{1}{2}\frac{1}{2}}+a_{3/2}R\ket{\frac{3}{2}\frac{3}{2}}+a_{5/2}R^2\ket{\frac{5}{2}\frac{5}{2}}+\mathcal{O}(R^3)\right]\tau_1, \\ \phi_{i=2}=&\left[a_{-1/2}\ket{\frac{1}{2}\frac{-1}{2}}+a_{-3/2}R\ket{\frac{3}{2}\frac{-3}{2}}+a_{-5/2}R^2\ket{\frac{5}{2}\frac{-5}{2}}+\mathcal{O}(R^3)\right]\tau_2, \end{align} respectively. These two single-particle wave functions are used in both methods. \subsubsection{Description of $(0s_{1/2})^2(0p_{3/2})^2(0d_{5/2})^2$ configuration by a linear structure} Here we assume a linear shape, and the single-particle wave functions of protons $i=3,4$ are generated by multiplying the rotational operator $\hat{R}(\alpha=0,\beta=\pi,\gamma=0)$ for the protons $i=1,2$, respectively, and \begin{align} \phi_{i=3}=&\hat{R}(\alpha=0,\beta=\pi,\gamma=0)\phi_{i=1} \nonumber \\ =&\left[a_{1/2}\ket{\frac{1}{2}\frac{-1}{2}}+a_{3/2}R\ket{\frac{3}{2}\frac{-3}{2}}+a_{5/2}R^2\ket{\frac{5}{2}\frac{-5}{2}}+\mathcal{O}(R^3)\right]\tau_3, \\ \phi_{i=4}=&\hat{R}(\alpha=0,\beta=\pi,\gamma=0)\phi_{i=2} \nonumber \\ =&\left[-a_{-1/2}\ket{\frac{1}{2}\frac{1}{2}}-a_{-3/2}R\ket{\frac{3}{2}\frac{3}{2}}-a_{-5/2}R^2\ket{\frac{5}{2}\frac{5}{2}}+\mathcal{O}(R^3)\right]\tau_4. \end{align} Note that the rotation angle is $\pi$ so as to generate a linear structure. The Gaussian center parameters of protons $i=5,6$ are set to the origin, and $\bvec{\zeta}_{i=5}=\bvec{\zeta}_{i=6}=\bvec{0}$, where $i=5$ and $6$ are spin-up and spin-down protons, respectively, \begin{align} \phi_{i=5}=&a_{1/2}\ket{\frac{1}{2}\frac{1}{2}}\tau_5, \\ \phi_{i=6}=&a_{-1/2}\ket{\frac{1}{2}\frac{-1}{2}}\tau_6. \end{align} These six protons are arranged on a straight line, which creates additional nodes owing to the antisymmetrization effect. Thus the proton part of the wave function becomes \begin{align} \varPsi_p=&\mathcal{A}[\phi_1,\ldots,\phi_6] \nonumber \\ =&-a_{1/2}a_{-1/2}(a_{3/2}a_{-5/2}-a_{-3/2}a_{5/2})^2R^6 \nonumber \\ &\times\mathcal{A}\left[\ket{\frac{1}{2}\frac{1}{2}},\ket{\frac{1}{2}\frac{-1}{2}},\ket{\frac{3}{2}\frac{3}{2}},\ket{\frac{3}{2}\frac{-3}{2}},\ket{\frac{5}{2}\frac{5}{2}},\ket{\frac{5}{2}\frac{-5}{2}}\right]+\mathcal{O}(R^7), \end{align} where the isospin part is omitted. This wave function coincides with the $(0s_{1/2})^2(0p_{3/2})^2(0d_{5/2})^2$ configuration ($d_{5/2}$-2p2h) at the limit of $R\to0$. The same procedure can be applied to the neutron part in the completely same way. \subsubsection{Description of $(0s_{1/2})^2(0p_{3/2})^2(0d_{5/2})^2$ configuration by a regular triangle structure} \label{Sec.DescriptionOf0s1/20p3/20d5/2ConfigurationByARegularTriangleStructure} Here we describe the $(0s_{1/2})^2(0p_{3/2})^2(0d_{5/2})^2$ configuration ($d_{5/2}$-2p2h) in a different way; we do not assume a linear shape and the configuration remains with a regular triangular shape. However, in return, the protons $i=3-6$, are rotated not about the $y$ axis but about the $z$ axis. Then, not only the total angular momentum $j$, the $z$ component $j_z$ is unchanged after the rotation. The single-particle wave functions of protons $i=3,4$ are generated by multiplying the rotational operator $\hat{R}(\alpha=2\pi/3,\beta=0,\gamma=0)$ to the protons $i=1,2$, respectively, and \begin{align} \phi_{i=3}=&\hat{R}(\alpha=2\pi/3,\beta=0,\gamma=0)\phi_{i=1} \nonumber \\ =&\left[a_{1/2}e^{-i\frac{\pi}{3}}\ket{\frac{1}{2}\frac{1}{2}}+a_{3/2}e^{-i\pi}R\ket{\frac{3}{2}\frac{3}{2}}+a_{5/2}e^{-i\frac{5\pi}{3}}R^2\ket{\frac{5}{2}\frac{5}{2}}+\mathcal{O}(R^3)\right]\tau_3, \\ \phi_{i=4}=&\hat{R}(\alpha=2\pi/3,\beta=0,\gamma=0)\phi_{i=2} \nonumber \\ =&\left[a_{-1/2}e^{i\frac{\pi}{3}}\ket{\frac{1}{2}\frac{-1}{2}}+a_{-3/2}e^{i\pi}R\ket{\frac{3}{2}\frac{-3}{2}}+a_{-5/2}e^{i\frac{5\pi}{3}}R^2\ket{\frac{5}{2}\frac{-5}{2}}+\mathcal{O}(R^3)\right]\tau_4. \end{align} The single-particle wave functions of protons $i=5,6$ are generated by multiplying the rotational operator $\hat{R}(\alpha=4\pi/3,\beta=0,\gamma=0)$ to the single-particle wave functions of protons $i=1,2$, respectively, and \begin{align} \phi_{i=5}=&\hat{R}(\alpha=4\pi/3,\beta=0,\gamma=0)\phi_{i=1} \nonumber \\ =&\left[a_{1/2}e^{-i\frac{2\pi}{3}}\ket{\frac{1}{2}\frac{1}{2}}+a_{3/2}e^{-2i\pi}R\ket{\frac{3}{2}\frac{3}{2}}+a_{5/2}e^{-i\frac{10\pi}{3}}R^2\ket{\frac{5}{2}\frac{5}{2}}+\mathcal{O}(R^3)\right]\tau_5, \\ \phi_{i=6}=&\hat{R}(\alpha=4\pi/3,\beta=0,\gamma=0)\phi_{i=2} \nonumber \\ =&\left[a_{-1/2}e^{i\frac{2\pi}{3}}\ket{\frac{1}{2}\frac{-1}{2}}+a_{-3/2}e^{2i\pi}R\ket{\frac{3}{2}\frac{-3}{2}}+a_{-5/2}e^{i\frac{10\pi}{3}}R^2\ket{\frac{5}{2}\frac{-5}{2}}+\mathcal{O}(R^3)\right]\tau_6. \end{align} These six protons are arranged in a regular triangular shape and the proton part of the wave function becomes \begin{align} \varPsi_p=&\mathcal{A}[\phi_1,\ldots,\phi_6] \nonumber \\ =&[(e^{-i\pi}-e^{-i\frac{\pi}{3}})(e^{-i\frac{10\pi}{3}}-e^{-i\frac{2\pi}{3}})-(e^{-2i\pi}-e^{-i\frac{2\pi}{3}})(e^{-i\frac{5\pi}{3}}-e^{-i\frac{\pi}{3}})] \nonumber \\ &\times[(e^{i\pi}-e^{i\frac{\pi}{3}})(e^{i\frac{10\pi}{3}}-e^{i\frac{2\pi}{3}})-(e^{2i\pi}-e^{i\frac{2\pi}{3}})(e^{i\frac{5\pi}{3}}-e^{i\frac{\pi}{3}})]a_{1/2}a_{-1/2}a_{3/2}a_{-3/2}a_{5/2}a_{-5/2}R^6 \nonumber \\ &\times\mathcal{A}\left[\ket{\frac{1}{2}\frac{1}{2}},\ket{\frac{1}{2}\frac{-1}{2}},\ket{\frac{3}{2}\frac{3}{2}},\ket{\frac{3}{2}\frac{-3}{2}},\ket{\frac{5}{2}\frac{5}{2}},\ket{\frac{5}{2}\frac{-5}{2}}\right]+\mathcal{O}(R^7), \end{align} where the isospin part is omitted. This wave function coincides with the $(0s_{1/2})^2(0p_{3/2})^2(0d_{5/2})^2$ configuration ($d_{5/2}$-2p2h) at the limit of $R\to0$. This is another method to create the $d_{5/2}$-2p2h configuration. The same procedure can be applied to the neutron part. \subsection{Energy levels and principal quantum numbers} We couple all of the 2p2h configurations to the subclosure configuration of $0p_{3/2}$, and finally the three $\alpha$ cluster wave functions are mixed. Concerning the $R$ and $\varLambda $ values, for the 1p1h configuration in Sec.~\ref{Sec.DescriptionOfOneParticleOneHole}, $R=0.1\,\mathrm{fm}$ and $\varLambda=0.1$ are employed, and for the 2p2h excitation to $0p_{1/2}$ in Sec.~\ref{Sec.DescriptionOfTwoParticleTwoHoleByAntisymmetrizationEffect}, we take $R=0.1\,\mathrm{fm}$ and $(\varLambda_a,\varLambda_b)=(-3/2,0)$. For the 2p2h excitation to $0d_{5/2}$ in Sec.~\ref{Sec.DescriptionOf0s1/20p3/20d5/2ConfigurationByARegularTriangleStructure}, we take $R=0.1\,\mathrm{fm}$ in Eqs.~(\ref{Eq.zeta1}) and (\ref{Eq.zeta2}). We discuss the obtained $0^+$ energy levels, principal quantum numbers, and $E0$ transition matrix elements. \subsubsection{Energy levels with the shell model basis states} \begin{figure} \centering \includegraphics[width=.6\textwidth, trim= 0cm 0cm 0cm 0cm, clip]{EnergyOfShell.eps} \caption{$0^+$ energy levels of $^{12}\mathrm{C}$ calculated with shell model-like basis states. (a): $0^+$ energy of the subclosure configuration of $0p_{3/2}$ ($pn$-0p0h), (b): $0^+$ levels obtained after coupling with the 2p2h states.} \label{Fig.EnergyOfShell} \end{figure} We start with the shell model configurations introduced in Sec.~\ref{Sec.TheModel}. Figure~\ref{Fig.EnergyOfShell} (a) shows the $0^+$ energy of $^{12}\mathrm{C}$ with the subclosure configuration of $0p_{3/2}$ ($pn$-0p0h), which is $-84.5\,\mathrm{MeV}$ (the experimental value $-92.2\,\mathrm{MeV}$ \cite{NNDC}). In Fig.~\ref{Fig.EnergyOfShell} (b), the $0^+$ levels obtained after coupling with the 2p2h configurations are shown. Here, we mixed five different 2p2h configurations; two nucleons are excited from $0p_{3/2}$ to $0p_{1/2}$ ($pp$-$p_{1/2}$-2p2h, $nn$-$p_{1/2}$-2p2h), or they are excited to $0d_{5/2}$ ($pp$-$d_{5/2}$-2p2h, $nn$-$d_{5/2}$-2p2h). In addition, we couple a configuration that one proton and one neutron are excited from $0p_{3/2}$ to $0p_{1/2}$ ($pn$-$p_{1/2}$-2p2h). In this way, we include the effects of BCS-like pairing for the proton part, neutron part, and proton-neutron part. The energy of the ground state becomes $-86.9\,\mathrm{MeV}$, and this is lower than that of the subclosure configuration by $2.4\,\mathrm{MeV}$. The reduction is caused by the coherent effects of the three BCS-like pairings. The squared overlap between the ground state of the shell-model basis states and subclosure configuration of $0p_{3/2}$ ($pn$-0p0h) is $0.91$. \subsubsection{Competition of shell and cluster structures} \begin{table}[!h] \caption{$0^+$ energies [$E\,(\mathrm{MeV})$] and principle quantum numbers ($N$) of $^{12}\mathrm{C}$ calculated using the shell (shell), cluster (cluster) model basis states. The values for the mixed model space, subclosure configuration of $0p_{3/2}$ and cluster model basis states, are shown in the column ``$pn$-0p0h+cluster''. The values for the full model space, shell and cluster basis states, are shown in the column ``shell+cluster''.} \label{Tab.} \centering \begin{tabular}{cccccccccccc} \hline \hline & \multicolumn{2}{c}{shell} & & \multicolumn{2}{c}{cluster} & & \multicolumn{2}{c}{$pn$-0p0h+cluster} & & \multicolumn{2}{c}{shell+cluster} \\ \cline{2-3}\cline{5-6}\cline{8-9}\cline{11-12} & $E$ & $N$ & & $E$ & $N$ & & $E$ & $N$ & & $E$ & $N$ \\ \hline $0_1^+$ & $-86.9$ & $8.00$ & & $-89.1$ & $11.22$ & & $-91.8$ & $\ \, 9.40$ & & $-92.6$ & $\ \, 9.15$ \\ $0_2^+$ & $-58.9$ & $8.01$ & & $-79.1$ & $20.01$ & & $-83.2$ & $13.82$ & & $-83.4$ & $14.00$ \\ \hline \hline \end{tabular} \end{table} Finally we couple the shell and cluster basis states. In Table~\ref{Tab.}, the $0^+$ energies [$E\,(\mathrm{MeV})$] and principle quantum numbers ($N$) of $^{12}\mathrm{C}$ are shown. The present interaction gives slightly lower ground state energy for the cluster basis states ($-89.1\,\mathrm{MeV}$) compared with the one for the shell model basis states ($-86.9\,\mathrm{MeV}$), but this is related to the fine tuning of the interaction parameters. The ground state energy gets lower by $3.5\,\mathrm{MeV}$ from the one for the cluster model basis states by mixing both the shell and cluster model basis states ($-92.6\,\mathrm{MeV}$), since the spin-orbit interaction was not be taken into account within the cluster model basis states. If we calculate without the 2p2h basis states, namely only within the subclosure configuration of $0p_{3/2}$ and cluster model basis states, the energy is $-91.8\,\mathrm{MeV}$. This is higher by $0.8\,\mathrm{MeV}$ than the final result, and the mixing of the 2p2h configurations is found to have a certain effect. The principal quantum number for the ground state obtained with the shell model basis states is close to $8$, which is the lowest possible value, even though the 2p2h excitations to $0d_{5/2}$ are allowed. On the other hand, the cluster model gives rather large value of $11.22$, and this is reduced to $9.15$ after coupling with the shell model basis states. The three $\alpha$ configuration shrinks after coupling with the $jj$-coupling shell model states, as discussed in many preceding works including ours~\cite{Suhara2015,AMD-1,AMD-2,FMD-2}. \par The $0_2^+$ state is the famous Hoyle state, which has the character of weakly interacting three $\alpha$ clusters. Experimentally the state appears at $E_x = 7.65\,\mathrm{MeV}$, and our final result gives $9.2\,\mathrm{MeV}$. Only within the cluster model basis states, the principal quantum number is $20.01$, and this is reduced to $14.00$ after coupling with the shell model basis states. Since the ground state wave function is drastically changed after mixing the shell model basis states to the cluster configurations, the $0_2^+$ state is also influenced because of the orthogonal condition~\cite{Itagaki-NP}. The matrix element of the $E0$ transition between the $0_1^+$ and $0_2^+$ states is $7.36\,e\,\mathrm{fm}^2$, which is $9.22\,e\,\mathrm{fm}^2$ only within the cluster model basis states (experimental value is $5.52\,e\,\mathrm{fm}^2$). \par \begin{table}[!h] \caption{Squared overlaps between the $0_{1,2}^+$ states and the six shell model basis states.} \label{Tab.SquaredOverlap} \centering \begin{tabular}{ccccccc} \hline \hline & $pn$-0p0h & $pn$-$p_{1/2}$-2p2h & $pp$-$p_{1/2}$-2p2h & $nn$-$p_{1/2}$-2p2h & $pp$-$d_{5/2}$-2p2h & $nn$-$d_{5/2}$-2p2h \\ \hline $0_1^+$ & $4.21\times10^{-1}$ & $3.96\times10^{-2}$ & $6.78\times10^{-2}$ & $6.86\times10^{-2}$ & $9.26\times10^{-4}$ & $9.64\times10^{-4}$ \\ $0_2^+$ & $3.28\times10^{-1}$ & $1.10\times10^{-4}$ & $4.30\times10^{-4}$ & $5.27\times10^{-4}$ & $8.41\times10^{-4}$ & $7.92\times10^{-4}$ \\ \hline \hline \end{tabular} \end{table} In Table~\ref{Tab.SquaredOverlap}, we show the squared overlaps between the $0_{1,2}^+$ states obtained with the full model space and the six shell model basis states introduced in the calculation. The squared overlap between the $0_1^+$ state and the $pn$-0p0h is $0.42$, which is reduced from the one only within the shell model basis states ($0.91$). This is because, using the present interaction parameters, the cluster model basis states gives lower ground state energy compared with the shell model basis states; however this tendency may change when we use slightly different parameter set. Concerning the 2p2h configurations, the squared overlaps between the $0_1^+$ state and the $pn$-, $pp$-, and $nn$-$p_{1/2}$-2p2h are about $0.04-0.07$, which are not negligible. However, the squared overlap between the $0_1^+$ state and $pp$-$d_{5/2}$-2p2h or $nn$-$d_{5/2}$-2p2h is more than an order of magnitude smaller. For the $0_2^+$ state, it has the squared overlap with $pn$-0p0h by $0.33$, but the squared overlaps with the 2p2h configurations are quite small. \section{Conclusion} \label{Sec.Conclusion} We have developed the framework of AQCM to describe not only the subclosure configuration of the $jj$-coupling shell model but also the 2p2h configurations, in addition to the cluster model wave functions. In $^{12}\mathrm{C}$, it was shown that the 2p2h excitations from $0p_{3/2}$ to $0p_{1/2}$ and that to $0d_{5/2}$ were successfully described, which enables us to include the effects of BCS-like pairing for the proton part, neutron part, and proton-neutron part. The correlation energy from the optimal configuration can be estimated not only in the cluster part but also in the shell model part. \par For the ground $0^+$ state of $^{12}\mathrm{C}$, the interaction of the present calculation gives slightly lower energy for the cluster model basis states ($-89.1\,\mathrm{MeV}$) compared with the one for the shell model basis states ($-86.9\,\mathrm{MeV}$), and the ground state energy gets lower by $3.5\,\mathrm{MeV}$ by mixing both the shell and cluster model basis states ($-92.6\,\mathrm{MeV}$). This is because the spin-orbit interaction is not be taken into account within the cluster model basis states. If we calculate without the 2p2h basis states, the energy becomes $-91.8\,\mathrm{MeV}$, about $0.8\,\mathrm{MeV}$ higher, and the mixing of the 2p2h configurations is found to have a certain effect. Only within the cluster model basis states, the principal quantum number is rather large, $11.22$, and this is reduced to $9.15$ after coupling with the shell model basis states. The three $\alpha$ configuration shrinks after coupling with the $jj$-coupling shell model states. The squared overlap between the ground $0^+$ state and the 0p0h configuration of the $jj$-coupling shell model is $0.42$, and the overlaps with some of the 2p2h configurations are $0.04-0.07$, which are not negligible. \par The $0_2^+$ state is the famous Hoyle state, and the present model gives $E_x = 9.2\,\mathrm{MeV}$. The cluster model basis states give the principal quantum number of $20.01$, and this is reduced to $14.00$ after coupling with the shell model basis states. Since the ground state wave function is drastically changed after mixing the shell model basis states to the cluster configurations, the $0_2^+$ state is also influenced because of the orthogonal condition. \par The method of describing particle hole excitations is considered to be applied to other light or even heavier nuclei. As an example, description of four particle for hole configurations such as $(0s_{1/2})^4(0p_{3/2})^8(0d_{5/2})^4$ and the coupling with the cluster model wave functions ($^{12}\mathrm{C}$+$\alpha$, four $\alpha$'s) are going on for $^{16}\mathrm{O}$; the understanding of ``the mysterious $0^+$ state'' is a long-standing problem~\cite{Haxton}. The systematic description of competition between particle hole excitations and cluster states is a challenging subject to be performed in near future. \section*{Acknowledgments} The authors are grateful for the computer facility at Yukawa Institute for Theoretical Physics, Kyoto University. This work was supported by JSPS KAKENHI Grant Number 17K05440.
\section{Introduction} \let\thefootnote\relax\footnotetext{The work of A. G. Burr and K. Cumanan was supported by H2020- MSCA-RISE-2015 under grant number 690750. The work on which this paper is based was carried out in collaboration with COST Action CA15104 (IRACON). In addition, the work is supported by LPDP (Indonesia Endowment Fund for Education).} Massive multiple-input multiple-output (MIMO) is a promising technique to achieve high data rate \cite{massivetddMarzetta14,ouricc1,ouricc2}. However, high performance multiuser MIMO (MU-MIMO) uplink techniques rely on the availability of full channel state information (CSI) of all user terminals at the base station (BS) receiver, which presents a major challenge to their practical implementation. This paper considers an uplink multiuser system where the BS is equipped with $M$ antennas and serves $K_s$ decentralized single antenna users ($M\gg K_s$). In the uplink mode, the BS estimates the uplink channel and use a linear receivers to separate the transmitted data. The BS receiver uses the estimated channel to implement the zero-forcing (ZF) receiver which is suitable for Massive MIMO systems. To investigate the performance of MIMO systems, an accurate multi-user channel model is necessary. Most standardized MIMO channel models such as IEEE $802.11$, the 3GPP spatial model, and the COST 273 model rely on clustering \cite{standard}. Geometry-based stochastic channel models (GSCMs) consider more physical reality of clusters such as their relative locations to the BS and users in the cell to investigate the performance of MIMO systems \cite{Molish_tufvesson}. This paper investigates the throughput in the uplink for the Massive MIMO with carrier frequency around 2 GHz, but the principles can also apply to other frequency bands, including mmWave. Most existing Massive MIMO techniques rely on the availability of the full CSI of all users at the BS, which presents a major challenge of channel estimation in implementing Massive MIMO. As a result, Massive MIMO techniques with reduced CSI requirement are of great interest. Recently, a range of user scheduling schemes have been proposed for Massive MIMO systems. Most of these, including \cite{Lee14user}, require accurate knowledge of the channel from all potential users to the BS --which in Massive MIMO case is completely infeasible to obtain; \cite{XuFDDuser} proposed a greedy user selection scheme by exploiting the instantaneous CSI of all users. However, in this paper we focus on a simplified and robust user scheduling algorithm, by considering the effect of the cell geometry. \subsection{Contributions of This Work} Our study on a new user selection algorithm considers high frequency stochastic geometry-based channels with large numbers of antennas at the BS receiver. Given a map of the area of the micro-cell, we perform efficient user scheduling based only on the position of users and clusters in the cell. In GSCMs, grouping multipath components (MPCs) from common clusters cause high correlation which reduces the rank of the channel \cite{Alister10ISWCS, katsumimocost, cairespatial13inftheory}. In this paper, we investigate the effect of common clusters on the Massive MIMO multi-user performance. Our results and contributions are summarized as follows: \textbf{1)} We show a novel user scheduling scheme for cellular systems equipped with a large antenna array at the BS. Using the map of the area and positions of users, the new user scheduling scheme works \textit{without CSI at the BS, as far as the location of multipath clusters is known}. Assuming the positions of the clusters in the area are fixed, cluster localization can be done offline. \\\ {\textbf{2)} For large numbers of transmit antennas and users, it is shown that the throughput benefits from multiuser diversity, even under the \textit{no-CSI condition}. Simulation results show significant performance improvement compared to conventional user scheduling algorithms, especially for indoor and outdoor micro-cells. The proposed scheme significantly reduces the overhead channel estimation in Massive MIMO systems. \\\ {\textbf{3)} The robustness of the proposed algorithm to the uncertainties of cluster localization is demonstrated through numerical simulations taking into account the error bounds of the SAGE parameter estimates. } Note that in this paper, uppercase and lowercase boldface letters are used for matrices and vectors, respectively. The notation $\mathbb{E}(\cdot)$ denotes expectation; $|\cdot|$ stands for the absolute value. The conjugate transpose of vector $\textbf{x}$ is $\textbf{x}^{H}$. Moreover, $\textbf{X}^{\dag}$, $\textbf{X}^{-1}$ and $\textbf{X}^{T}$ denote the pseudo-inverse, inverse and transpose of matrix $\textbf{X}$, respectively. The Kronecker product of $\textbf{X}$ and $\textbf{Y}$ is presented by $\textbf{X} \otimes\textbf{Y}$. Finally, $\text{vec}(\textbf{X})$ denotes the column vector obtained by stacking the columns of the matrix $\textbf{X}$. The rest of the paper is organized as follows. Section II describes the system model. The proposed user scheduling scheme is presented in Section III. {The robustness of the proposed user scheduling algorithm to cluster localization errors is investigated in Section IV.} Numerical results are presented in Section V. Finally, Section VI concludes the paper. \vspace{-.2cm}\section{SYSTEM MODEL} Consider uplink transmission in a single cell with $M$ antennas at the BS and $K$ single antenna {mobile stations (MSs)} on the same time-frequency resource. Here, we assume TDD mode where the uplink and downlink channel are the same. \vspace{-.2cm} \subsection{Uplink Training} In this section, we investigate the problem of estimating the channel in the TDD mode. Suppose $\textbf{H}\in\mathbb{C}^{M\times K}$ represents the uplink aggregate channel matrix between the users and the BS. The channel covariance matrix $\textbf{R}\in \mathbb{C}^{MK\times MK}$ is given by \begin{equation} \textbf{R} = \mathbb{E}\{\tilde{\textbf{h}}\tilde{\textbf{h}}^H\}, \end{equation} where $\tilde{\textbf{h}}=\text{vec}(\textbf{H})$. For MMSE estimation of the channel, we use a pilot sequence \cite{debbah_cor_es}, \cite{kay}. Let us assume ${\boldsymbol{\Phi}}_p \in \mathbb{C}^{K\times \tau_p}$ denotes pilot matrix, where $\tau_p$ is the length of pilot sequence for each user. The received pilot signal at the BS, $\textbf{Y}\in\mathbb{C}^{{M\times \tau_p}}$, is given by \begin{equation} \textbf{Y}=\textbf{H}{\boldsymbol{\Phi}}_p+\textbf{N}, \end{equation} where $\text{vec}(\textbf{N})\sim \mathcal{CN}(0,\sigma_n^2\textbf{I})$ denotes circularly symmetric complex Gaussian noise, and $\textbf{I}\in\mathbb{C}^{M\tau_p\times M\tau_p}$ is the identity matrix. The Bayesian MMSE estimator of the channel is given by \cite{debbah_cor_es} \begin{equation} \tilde{\textbf{h}}_{MMSE}=\textbf{R}\tilde{{\boldsymbol{\Phi}}}_p^H(\tilde{{\boldsymbol{\Phi}}}_p\textbf{R}\tilde{{\boldsymbol{\Phi}}}_p^{H}+\sigma_n^2\textbf{I})^{-1}\tilde{\textbf{y}}, \label{htilde} \end{equation} where $\tilde{{\boldsymbol{\Phi}}}_p={\boldsymbol{\Phi}}_p^T \otimes \textbf{I}$ and $\tilde{\textbf{y}}=\text{vec}(\textbf{Y})$. \vspace{-.2cm} \subsection{Uplink Transmission} The $M \times 1$ received signal at the BS when $K_s\, (K_s\ll M)$ users have been selected from the pool of $K$ users, is given by \begin{equation} \textbf{r}= \sqrt{p_k}\textbf{H}_s\textbf{x}+\textbf{n}, \end{equation} where $\textbf{x}$ represents the symbol vector of $K_s$ users, and is constrained to have total expected power of $ \mathbb{E}\left\{|\textbf{x}^H\textbf{x}|\right\}=K_s$, $p_k$ is the average uplink transmit power of the $k$th user and $\textbf{H}_s$ denotes the aggregate $M \times K_s$ channel of all selected users. The BS is assumed to have CSI only of the selected users. We are interested in a linear ZF receiver which can be provided by evaluating the pseudo-inverse of the estimated channel, $\tilde{\textbf{H}}_s$, the aggregate channel of all selected users according to $\mathbf{W}=\tilde{\textbf{H}_s}^{\dag}=(\tilde{\textbf{H}_s}^{H}\tilde{\textbf{H}}_s)^{-1}\tilde{\textbf{H}_s}^{H}$ \cite{GoldsmithJurnal,myiet_master,my-master-vtc}. Then after using the detector, the received signal at the BS is \begin{equation} \textbf{y}= \sqrt{p_k}\textbf{W}\textbf{H}_s\textbf{x}+\textbf{W}\textbf{n}. \label{yy} \end{equation} Let us consider equal power allocation between users, i.e. $p_k=\frac{P}{K_s},~\forall k $, in which $P$ denotes the total power. The achievable sum-rate of the system is obtained as \begin{equation} R=\sum_{k=1}^{K_s}{\log_{2} \bigg({{ 1+\frac{p_k|{\mathbf{w}_k}{\mathbf{h}_k}|^2}{1+\sum_{i=1,i\ne{k}}^{K}p_i|\mathbf{w}_k\mathbf{h}_i|^2}}}\bigg)}, \end{equation} where $\textbf{w}_k$ and $\textbf{h}_k$ are respectively the $k$th rows of the matrix $\textbf{W}=[\textbf{w}_1^T,\textbf{w}_2^T,\cdots,\textbf{w}_{K_s}^T]^T$, and the \textit{k}th column of $\textbf{H}_s=[\textbf{h}_1,\textbf{h}_2,\cdots,\textbf{h}_{K_s}]$. If perfect CSI is available at the BS, and assuming Gaussian input, the ergodic capacity is given by \begin{IEEEeqnarray}{rCl} C = \mathbb{E} \left\{\log_2\det \left(\textbf{I}+\dfrac{P}{K_s}\textbf{H}_s\textbf{H}_s^H\right)\right\}, \end{IEEEeqnarray} where the term $\frac{P}{K_s}$ is due to the equal-power allocation and $\textbf{I}$ refers to an identity matrix. \subsection{Geometry-based Stochastic Channel Model} \begin{figure} \center \includegraphics[width=68mm]{cluster_bounce.eps} \vspace{-0.07in} \caption{The general description of the cluster model. The spatial spreads for $C$th cluster are given. The figure also gives an example of a shared cluster and a distinct cluster.} \label{cluster} \end{figure} In GSCMs the double directional channel impulse response is a superposition of MPCs as given by \cite{Costaction} \begin{small} \begin{equation} h(t\!,\!\tau\!,\!{\boldsymbol{\phi}}^{\text{BS}}\!,\!{\boldsymbol{\theta}}^{\text{MS}}\!)\!=\!\sum_{j=1}^{N_C}\!\sum_{i=1}^{N_p}\!a_{i,j}\delta(\phi^{\text{BS}}-\phi_{i,j}^{\text{BS}})\delta(\theta^{\text{MS}}\!-\!\theta_{i,j}^{\text{MS}})\delta(\tau-\tau_{i,j}),\! \label{h1} \end{equation} \end{small} where $N_p$ denotes the number of MPCs, $t$ is time, $\tau$ denotes the delay, $\delta$ denotes the Dirac delta function, and ${\boldsymbol{\phi}}^{\text{BS}}$ and ${\boldsymbol{\theta}}^{\text{MS}}$ represent the direction of departure (DoD) and direction of arrival (DoA) respectively. Similar to \cite{Costaction}, we group the MPCs with similar delay and directions into clusters. The circular visibility region (VR) determines whether the cluster is active or not for a given user. The MPC's gain scales by a transition function of the VR that is given by \cite{Costaction} \begin{equation} A_{\text{VR}}(\bar{\boldsymbol r}_{\rm MS})=\dfrac{1}{2}-\dfrac{1}{\pi}\arctan\left(\dfrac{2\sqrt{2}\left(L_c+d_{\text{MS,VR}}-R_C\right)}{\sqrt{\lambda L_c}}\right), \label{vr} \end{equation} where $\bar{\textbf{r}}_{MS}$ is a position vector, $R_C$ denotes the VR radius, $L_C$ is the size of the transition region and $d_{\text{MS,VR}}=|| r_{\text{MS}}-r_{\text{VR}}||$ denotes the distance between the mobile station (MS) and the VR centre. The cluster power attenuation is given by \begin{equation} A_C=\max (\exp[-k_\tau (\tau_C-\tau_0) ], \exp[-k_\tau (\tau_B-\tau_0) ]), \label{AC} \end{equation} where $k_\tau$ denotes the power decay parameter, $\tau_B$ is the cut-off delay, and $\tau_C$ refers to the delay of a cluster. We assume Rayleigh fading for the MPCs within each cluster. Hence, the complex amplitude of the $i$th MPC in the $j$th cluster in (\ref{h1}) is given by \begin{equation} a_{i,j}=L_pA_{VR}\sqrt{A_C A_{\text{MPC}}}, \label{a} \end{equation} where $L_p$ is the channel path loss, $A_{\text{MPC}}$ is the Rayleigh-faded power of each MPC. For the non-line-of-sight (NLoS) case of the micro-cell scenario, the path loss is $ L = 26 \log_{10}d_{\text{BS,MS}}+20\log_{10}(4\pi/\lambda), $ where $d_{\text{BS,MS}}$ and $\lambda$ denote the distance from the BS to the MS and the wavelength {in meters}, respectively. \vspace{-0.2in} Finally, assuming a linear array response at the BS side the channel matrix is given (\ref{H3}) (defined at the top of this page), where $\textit{C}(k)$ denotes the clusters seen by the $k$th user and $\alpha=-2\pi\frac{d}{\lambda}$, where $d$ denotes the spacing between two antenna elements. Note that the index $\small{\text{BS}}$ is dropped for simplicity. In GSCMs, shared (common) clusters can reduce the rank of the channel and the capacity of the system, especially at finite signal-to-noise ratio (SNR). These common clusters also affect the multiplexing gain of the system. Fig. \ref{cluster} illustrates the concept of common and distinct clusters. \begin{figure*}[!t] \normalsize \begin{IEEEeqnarray}{rCl}\begin{split} \small \!\textbf{H}_s\!=\! \begin{bmatrix} \!\sum_{j\in \textit{C}(1)}\!\sum_{i=1}^{N_p}a_{i,j} & \!\sum_{l\in \textit{C}(2)}\!\sum_{i=1}^{N_p}a_{i,l} & \!\ldots\! & \sum_{m\in \textit{C}(K_s)}\sum_{i=1}^{N_p}a_{i,m} \\ \!\sum_{j\in \textit{C}(1)}\!\sum_{i=1}^{N_p}a_{i,j}e^{j\alpha\sin\phi_{i,j}} & \!\sum_{l\in \textit{C}(2)}\!\sum_{i=1}^{N_p}a_{i,l}e^{j\alpha\sin\phi_{i,l}} & \ldots & \!\sum_{m\in \textit{C}(K_s)}\!\sum_{i=1}^{N_p}a_{i,m}e^{j\alpha\sin\phi_{i,m}} \\ \vdots & \vdots & \ddots & \vdots \\ \!\sum_{j\in \textit{C}(1)}\!\sum_{i=1}^{N_p}a_{i,j}e^{j\alpha(M-1)\sin\phi_{i,j}} & \!\sum_{l\in \textit{C}(2)}\!\sum_{i=1}^{N_p}a_{i,l}e^{j\alpha(M-1)\sin\phi_{i,l}} & \ldots & \sum_{m\in \textit{C}(K_s)}\!\sum_{i=1}^{N_p}a_{i,m}e^{j\alpha(M-1)\sin\phi_{i,m}} \end{bmatrix}, \label{H3} \end{split} \end{IEEEeqnarray} \vspace{-.24in} \hrulefill \end{figure*} \section{Geometry-based User Scheduling} In this section, we consider user scheduling with ZF based on the position of clusters and users in a cell. In order to avoid a huge channel estimation load in the uplink of a Massive MIMO system with many users and antennas, we propose to estimate only the channels of the selected users. The reduction in the amount of channel estimation required between each transmit and receive antenna is the important result of the proposed scheme. The gain achieved by selecting users with the strongest channel is referred to as multiuser diversity and requires CSI of all users \cite{GoldsmithJurnal}. When the number of clusters is less than the number of BS antennas and all clusters are shared between the users, it is impossible to achieve the maximum multiplexing gain \cite{Alister10ISWCS,burrijas}. However, we propose a new user selection scheme which relies on maximizing the number of distinct clusters seen by the scheduled users. In the next subsection, we present a scheme to select users which maximizes the long term (over time-varying channels due to movement of a user) sum rate. As it is based on the position of the users and does not need the estimated channel of all users in the uplink, it is considered to be a practical user selection scheme for large MIMO systems. \subsection{Proposed Geometry-based User Scheduling (GUS)} In this section, an algorithm is proposed for increasing the system throughput based on the geometry of the system and without estimating the channels of all the users in the area. Once the set of active users has been determined, the receiver BS estimates the channels of the selected users and the users transmit data. The performance of the proposed user selection algorithm to maximize the sum-rate is evaluated. In large MIMO systems with large numbers of users estimating the channels of all users is practically difficult. So the proposed user scheduling algorithm can be an efficient way to reduce the overhead of channel estimation.\\ First, we generate a user-cluster pathloss matrix $\textbf{V}$, as the following \begin{equation} \textbf{{V}}= \begin{bmatrix} v_{1}^1 & v_{2}^1 & \ldots & {v}_{N_C}^1 \\ v_{1}^2 & {v}_{2}^2 & \ldots & {v}_{N_C}^2 \\ \vdots & \vdots & \ddots & \vdots \\ v_{1}^K & v_{2}^K & \ldots & v_{N_C}^K \end{bmatrix}, \end{equation} where \begin{equation} v_{i}^j=\sqrt{L_{p}^j}A_{VR,i}^j\sqrt{A_{C,i}^j}, \label{a} \end{equation} where $L_{p}^j$ denotes the channel path loss for user $j$, $A_{VR,i}^j$ is the MPC power attenuation as a function of the distance between user $j$ and the centre of the VR activating the $i$th cluster and is given by (\ref{vr}); $A_{C,i}^j$ denotes the cluster power attenuation, given (\ref{AC}), by for the user $j$ and the $i$th cluster. So, the matrix $\textbf{V}$ is a function of the distance from the BS to users, the distance of the BS from clusters and from users to the centre of the VR. The BS uses the functions $f_1(\textbf{v}_i)$ and $f_2(\textbf{v}_i)$ where $\textbf{v}_i$ is the $i$th row of matrix ${\textbf{V}}$ and we define the functions $f_1(\textbf{v})$ and $f_2(\textbf{v})$ in Algorithm 1. \begin{algorithm}[t!] Step 1) Initialization:~~$\mathcal{W}_{0}=[1,\cdots,K]$, $\mathcal{S}_{0}=\emptyset$, $i=1$,\caption{{\small Geometry-based User Scheduling (GUS) Algorithm}} Step 2) Load position of users, for example by means of GPS,\\ Step 3) Generate matrix $\textbf{V}$,\\ Step 4) Greedy Algorithm: \begin{itemize} \item{4.1}\begin{small} $\pi(1)=\operatornamewithlimits{argmax}\limits_{k \in \mathcal{W}_{0}}f_1(||\textbf{v}_k||)=\operatornamewithlimits{argmax}\limits_{k \in \mathcal{W}_{0}}||\textbf{v}_k||$,\\ $\mathcal{S}_{0}\gets \mathcal{S}_{0}\cup \{k\}$, $\hat{\textbf{v}}_{(i)}=\textbf{v}_{(\pi(i))}$,\\ \end{small} \item{4.2}~If $|\mathcal{S}_{0}|<K_s$, $\mathcal{W}_{i}=\{k \in \mathcal{W}_{i-1}, k \ne \pi(i) \}$,\\ \item{4.3} \begin{small} $\pi(i)=\operatornamewithlimits{argmin}\limits_{k \in \mathcal{W}_{i-1}}f_2(\textbf{v}_k,\hat{\textbf{v}}_{(i)})=\operatornamewithlimits{argmin}\limits_{k \in \mathcal{W}_{i-1}}\frac{ |\textbf{v}_k\hat{\textbf{v}}_{(i)}^{*}| }{ ||\textbf{v}_k||||\hat{\textbf{v}}_{(i)}|| } \}$,~$\mathcal{S}_{0}\gets \mathcal{S}_{0}\cup \{k\}$, $\hat{\textbf{v}}_{(i)}=\textbf{v}_{(\pi(i))}$, \end{small} \item{4.4}~then $i=i+1$, and go to step 4.3, Else, end. \end{itemize} Step 5) The BS estimates the channels of the selected users. \end{algorithm} {Suppose $\mathcal{W}_{0}$ contains user indices considered in the proposed algorithm. The proposed algorithm, executed at each symbol time, using the position of users as described in the above algorithm, always selects $K_s$ users. Finally, $\mathcal{S}_{0}$ contains $K_s=|\mathcal{S}_{0}|$ indices of the selected users.} As described in step $4.1$ in Algorithm 1, the algorithm starts by calculating the summation over all cluster powers, i.e. $f_1(\parallel\textbf{v}_k\parallel|) = \parallel\textbf{v}_k\parallel,~ \forall ~k$, and selects the user with the strongest received power at the BS. Then in the next step, the proposed algorithm finds a set of users with smallest orthogonality to the selected users. Here, orthogonality among the user $k$ and the user $j$ is defined as $f_2(\textbf{v}_k,{\textbf{v}}_{j})=\frac{ |\textbf{v}_k{\textbf{v}}_{j}^{*}| }{ ||\textbf{v}_k||||{\textbf{v}}_{j}||}$. Note that MPCs from shared clusters cause high correlation which reduces the rank of the channel. Hence, the proposed Algorithm 1 selects users with lowest correlation to improve the throughput. The capacity analysis have have been investigated in \cite{ouriet_mic}. Moreover, investigating the effectiveness of the proposed user scheduling scheme in the distributed Massive MIMO systems \cite{ourjournal1,ourjournal2} is an interesting topic for future work. \vspace{-.1cm} \section{Robustness of the Proposed User Scheduling Algorithm} \subsection{Cluster Localization} The BS can estimate the direction of arrival \cite{handbook}, and hence the direction of the scattering objects should be available at the BS. There is a well-known algorithm to estimate the delay, DoA and the DoD of the channel paths; SAGE-based algorithm \cite{crlbc, crlbj}. As a result, the BS can identify the direction of the clusters which can be seen by the users in the cell area, and hence build up a map of the location of the scattering objects. The convenient tool that has overcame the challenge of making the position of the scatterers available is the use of environment maps \cite[Chapter~2]{Costaction}, which also shows how measured DoA can be identified with physical objects in the environment, and hence can be located on the map. Successive interference cancellation has also been introduced in \cite{molish-tuf-position} for scattering object identification: it uses the channel impulse response peaks in the delay domain to map scatterers to two-dimensional coordinates. \vspace{-.1cm} \subsection{{Robustness}} In order to study the robustness of the proposed algorithm to possible uncertainty in cluster localization, we assume the well-known SAGE algorithm \cite{crlbc,crlbj} as a means to estimate DoAs and delays at the BS, operating offline, as mentioned above. In cluster localization, we consider a receiver BS with an $M$-element antenna array located at an reference point \cite{crlbc}-\cite{crlbj}. Moreover, we consider planar wavefronts with $M_x$ sensor at each direction. The closed-form Cramer-Rao lower bound (CRLB) for the delay, azimuth ($\phi$) and elevation ($\theta$) of the path are given by \cite{crlbc} \begin{subequations} \begin{eqnarray} & \text{CRLB}(\tau) =\dfrac{1}{\gamma_O}\dfrac{1}{8\pi^2BW} \label{crlb1}\\ & \text{CRLB}(\theta) = \dfrac{1}{\gamma_O}\dfrac{M}{2\Delta \cos (\theta)} \label{crlb2}\\ & \text{CRLB}(\phi) = \dfrac{1}{\gamma_O}\dfrac{M}{2\Delta}\label{crlb3}, \end{eqnarray} \label{crlb} \end{subequations} where $BW$ is the bandwidth, $\Delta=4\pi^2(\frac{d}{\lambda})^2(\frac{7}{3}M_x^3-8M_x^2+\frac{29}{3}M_x-4)$, $\gamma_O=MIN_c|f(\phi)|^2\gamma_I$, where $I$ is the number of periods of the received signal, $N_c$ denotes the length of the used pseudonoise (PN) sounding sequence available at the receiver and $\gamma_I$ is the SNR at the input of each antenna \cite{crlbc}-\cite{crlbj}. Moreover, the antenna electric field pattern can be given by $ f(\phi)=0.67+2.67\phi-6.79\phi^2+5.7\phi^3-1.71\phi^3. $ \\ \textit{\textbf{Remark 1:}} The distance between the BS and single-bounce cluster ($d_{BS,C}$) is given by geometrical calculation: \begin{IEEEeqnarray}{rCl} (c_0\tau-d_{BS,C})^2 & = &(h_{BS}-h_{MS}+d_{BS,C}\sin(\phi))^2+ \nonumber \\ & &(d_{BS,MS}-d_{BS,C}\cos(\phi)\cos(\theta))^2, \label{dis} \end{IEEEeqnarray} where $c_0$ denotes the velocity of light, $d_{BS,MS}$ is the distance between the user and the BS in $x-y$ plane. The distance between the user and a single-bounce cluster is easily given by $d_{MS,C}+d_{BS,C}=c_0\tau$. \\\\ Hence, using Remark 1, after the offline localization, the BS can build up the matrix $\tilde{\textbf{V}}$ at the beginning of each time-slot, as the following \begin{equation} {\tilde{\textbf{V}}}= \begin{bmatrix} \tilde{v}_{1}^1 & \tilde{v}_{2}^1 & \ldots & \tilde{v}_{N_C}^1 \\ \tilde{v}_{1}^2 & \tilde{v}_{2}^2 & \ldots & \tilde{v}_{N_C}^2 \\ \vdots & \vdots & \ddots & \vdots \\ \tilde{v}_{1}^K & \tilde{v}_{2}^K & \ldots & \tilde{v}_{N_C}^K \end{bmatrix}, \label{vtilde} \end{equation} where \begin{equation} \tilde{v}_{i}^j=\sqrt{L_{p}^j}\tilde{A}_{VR,i}^j\sqrt{\tilde{A}_{C,i}^j}, \label{a} \end{equation} where $\tilde{A}_{VR,i}^j$ and $\tilde{A}_{C,i}^j$ can be calculated by the distances obtained in (\ref{dis}). Finally, for the matrix \textbf{V}, the following equation holds \begin{equation} \textbf{V} = \tilde{\textbf{V}}+\textbf{E}, \label{err} \end{equation} where $\textbf{E}$ is due to the estimation error in cluster localization. Then, we use $\tilde{\textbf{V}}$ instead of $\textbf{V}$ in the proposed algorithm. The numerical results verify the robustness of the proposed algorithm to this error. \\ \textit{\textbf{Remark 2:}} Similar to \cite{SUSGoldsmithGlobcom}, we only serve the selected users and the users which are not selected by the proposed user scheduling scheme are served in different time and channel transmission resources. Evaluation of resource assignment provides possible directions for future work. \section{Numerical Results and Discussion} In this section, simulation results have been provided to validate the performance of the proposed schemes with different system parameters. We evaluate the throughput of the system, averaging over 300 random realizations of the locations of the users, clusters and shadow fading. A square cell with a side length of $2\times R$ has been considered; we call $R$ the cell size and also assume users are uniformly distributed in the cell. As in \cite{MarzettaMRC13}, we assume that there is no user closer than $R_{th}=0.1\times R$ to the BS. We simulate a micro-cell environment for the NLoS case and set the operating frequency $f_C=2$ GHz. The external parameters and stochastic parameters are extracted from chapter 6 of \cite{corria} and chapter 3 of \cite{Costaction}. The BS and user heights are assumed to be $h_{BS}=5$ m and $h_{MS}=1.5$ m, respectively. The number of clusters and their visibility and transition regions, specified in Section II-C, are set $N_C=3$, $R_C=50$, and $L_C=20$. Moreover, we consider $N_{P}=6$ MPCs per cluster. The noise power is given by $ P_n = \text{BW} k_B T_0 W $, where $\text{BW}=20$ MHz denotes the bandwidth, $k_B = 1.381 \times 10^{-23}$ represents the Boltzmann constant, and $T_0 = 290$ Kelvin denotes the noise temperature \cite{marzetta_free16}. Moreover, $W=9$ dB is the noise figure. For the sake of simplicity and without loss of generality, equal power allocation between users is assumed, ie., $p_k=\frac{P}{K_s},~\forall k$, as it is given in (\ref{yy}). \begin{figure}[t!] \center \includegraphics[width=90mm]{20010_correct.eps} \vspace{-.19in} \caption{The average sum-rate vs. total transmit power for $M=200$ and different values of $K_s=10$, $K_s=5$, and $R=1000$ m.} \label{vsp} \end{figure} \begin{figure}[t!] \center \includegraphics[width=90mm]{vsM.eps} \vspace{-.19in} \caption{The channel estimation load vs. value of error of antennas at the receiver BS for different values of total number of users in the cell with $R=1000$ m.} \label{vsM} \end{figure} \begin{figure}[t!] \center \includegraphics[width=90mm]{crlb_m200.eps} \vspace{-.19in} \caption{{The average sum-rate vs. the estimation error for different values of total number of selected users in the cell and the cell size.}} \label{e} \end{figure} \subsection{Numerical Results} For this network setup, the average sum-rate is evaluated for the three scenarios. In the GUS scheme, it has been proposed that the receiver BS selects users that maximize the number of distinct clusters in the cell. We evaluate the average throughput of the greedy weight clique (GWC) scheme \cite{SUSGoldsmithGlobcom, ITC09_Userselection_GWC}. For the case of GWC, similar to \cite{ITC09_Userselection_GWC}, we set the optimal channel direction constraint to achieve the best performance for GWC, so the complexity of GWC is much higher than GUS. Fig. \ref{vsp} depicts the average sum-rate with total number of receive antennas at the BS $M=200$, and two values of the number of selected users $K_s=10$ and $K_s=5$ while adopting the proposed scheme with ZF receiver. As expected, since GWC exploits perfect CSI, it has the best throughput. The amount of channel estimation load required in both GWC and the proposed GUS is presented in Fig. \ref{vsM}, where we use $N^{load}=2MK_s$ to calculate the total channel estimation load. As the figure shows the channel estimation load of the proposed GUS is far less than that of the GWC scheme. {To investigate the robustness of the proposed scheme to different values of the error, we set $|e|=\Omega\times \sqrt{\text{CRLB}(\rho)}$, where $|e|$ denotes the absolute value of the estimation error, $\Omega$ is an integer number and $\text{CRLB}(\rho)$ is given by (\ref{crlb1})-(\ref{crlb3}), where the parameter $\rho$ can be the delay, azimuth and elevation. Fig. \ref{e} shows the average sum-rate with total number of receive antennas at the BS $M=400$, and two values of the number of selected users $K_s=10$ and $K_s=5$ versus $\Omega$. We set the SNR at the input of each antenna $\gamma_I=20$ dB and the bandwidth $BW=20$ MHz. Moreover, in equations (\ref{crlb1}) to (\ref{crlb3}), $M_x=5$, $N_c=127$, which are extracted from \cite{crlbc}. The figure shows the robustness of the proposed algorithm to poor cluster localization.} \section{Conclusions} In this paper, we have investigated GUS under uplink Massive MIMO conditions. By applying knowledge the geometry of the system (the location of clusters and the users), we suppose that the BS does not need to estimate the channels of all users and selects users based only on the location of users and clusters in the area. The results show that while sum-rate slightly decreases along with the reduced overhead of channel estimation, the proposed algorithm can be an efficient scheme to reduce the complexity of user scheduling in Massive MIMO systems. {The proposed algorithm shows good robustness against the estimation error of cluster locations.} \bibliographystyle{IEEEtran}
\section*{Appendix} \noindent\textit{Proposition~\ref{thm:settings}} \\ \noindent Let $P$ be an lc-program over $\mathcal{A}\cup\mathcal{L}$ and $P'$ an lc-program over $\mathcal{A}\cup\mathcal{L}'$ such that $P=P'$. \begin{enumerate} \item \label{th:dsr} If \( \mathcal{L}=\mathcal{L}\cap\head{P} \), then \( \smsetlc{P}\subseteq\smset{P} \) \item \label{th:rsen} If \( \mathcal{L}=\mathcal{L}^\rightarrow\setminus\head{P} \), then \( \smset{P}\subseteq\smsetlc{P} \) \item \label{th:ssn} If \( \mathcal{L}'=\mathcal{L}'^\rightarrow \), then \( \smsetlc{P}\subseteq\smsetlc{P'} \) \end{enumerate} \noindent\textit{Proof of Proposition~\ref{thm:settings}.\ref{th:dsr}} \begin{itemize} \item The lc-atoms of $P$ are of type defined only, thus \( \mathcal{L}= \mathcal{L}\cap\head{P} \). \item If \( \code{a}\in\mathcal{L}^\leftrightarrow \), then $\PS{P}{\mathcal{S}}$ contains either `\code{:- not a.}' or `\code{:- a.}' regarding to $\code{a}\in\mathcal{S}$ or $\code{a}\not\in\mathcal{S}$, respectively. \item On the other hand, if \( \code{a}\in\mathcal{L}^\rightarrow \) then $\PS{P}{\mathcal{S}}$ may contain just the latter one. \item Due to the fact that adding an integrity rule to a program can just remove regular stable models, we obtain \( \smsetlc{P}\subseteq\smset{P} \). $\hfill\square$ \end{itemize} \noindent\textit{Proof of Proposition~\ref{thm:settings}.\ref{th:rsen}} \begin{itemize} \item The lc-atoms of $P$ are of type \lcatype{external}{non-strict} only, thus \( \mathcal{L}= \mathcal{L}^\rightarrow\setminus\head{P} \). \item Note that in this case $\emptyset\subseteq\mathcal{L}$ is always an lc-solution, since (i) and (ii) are trivially satisfied. \item Then we obtain $P=\PS{P}{\emptyset}$ and thus \( \smset{P}= \smset{\PS{P}{\emptyset}} \). \item If $\mathcal{S}\neq\emptyset$ then $\PS{P}{\mathcal{S}}$ may includes choice rules containing lc-atoms, and thus we probably obtain an lc-stable model $X\not\in\smset{P}$. \item Finally, \( \smset{P}\subseteq\smsetlc{P} \) holds. $\hfill\square$ \end{itemize} \noindent\textit{Proof of Proposition~\ref{thm:settings}.\ref{th:ssn}} \begin{itemize} \item If $\mathcal{L}=\mathcal{L}^\rightarrow$, then $\smsetlc{P}=\smsetlc{P'}$ holds trivially. \item Due to this observation it is sufficient to assume \( \mathcal{L}= \mathcal{L}^\leftrightarrow \). \item The lc-atoms of $P$ are of type strict only and the lc-atoms of $P'$ are of type non-strict only, thus \( \mathcal{L}= \mathcal{L}^\leftrightarrow \) and \( \mathcal{L}'= \mathcal{L}'^\rightarrow \) respectively. \item First, note that \( \{\mathcal{S}\mid\mathcal{S}\subseteq\mathcal{L}\text{ lc-solution}\}\subseteq \{\mathcal{S}\mid\mathcal{S}\subseteq\mathcal{L}'\text{ lc-solution}\} \), since elements of the first set need to satisfy (i) and (ii), where elements of the latter just need to satisfy (i). \item This observation leads to \( \smsetlc{P}\subseteq\smsetlc{P'} \) regarding to $\{\mathcal{S}\mid\mathcal{S}\subseteq\mathcal{L}\text{ lc-solution}\}$, since \PS{P}{\mathcal{S}} with $\code{a}\in\mathcal{S}$ contains either `\code{a.}' or `\code{:- not a.}' for $\code{a}\in\mathcal{L}\setminus\head{P}$ or $\code{a}\in\mathcal{L}\cap\head{P}$, respectively. \item Whereas \PS{P'}{\mathcal{S}} contains just `\code{\{a\}.}' for $\code{a}\in\mathcal{L}'\setminus\head{P}$. \item Obviously, the latter leads to more stable models, due to choice rules and the absence of integrity rules. \item Note that we can omit observations for $\code{a}\not\in\mathcal{S}$, since this case adds the same integrity for both \PS{P}{\mathcal{S}} and \PS{P'}{\mathcal{S}}. \item If we now consider \( \mathcal{S}\in\{\mathcal{S}\mid\mathcal{S}\subseteq\mathcal{L}'\text{ lc-solution}\}\setminus \{\mathcal{S}\mid\mathcal{S}\subseteq\mathcal{L}\text{ lc-solution}\} \), then we note that this cannot remove lc-stable models of $\smsetlc{P'}$ that we already got from \( \{\mathcal{S}\mid\mathcal{S}\subseteq\mathcal{L}\text{ lc-solution}\} \), it can only be the case that we obtain additional stable models. \item Finally, we get \( \smsetlc{P}\subseteq\smsetlc{P'} \), regarding their respective signature. $\hfill\square$ \end{itemize} \noindent\textit{Proposition~\ref{thm:settings2}} \\ \noindent There exist lc-programs $P$ over $\mathcal{A}\cup\mathcal{L}$ with \( \mathcal{L}=\mathcal{L}^\leftrightarrow\setminus\head{P} \), so that \( \smset{P}\not\subseteq\smsetlc{P} \) or \( \smsetlc{P}\not\subseteq\smset{P} \).\\[2mm] \noindent\textit{Proof of Proposition~\ref{thm:settings2}} \begin{itemize} \item The lc-atoms of $P$ are of type \lcatype{external}{strict} only, thus \( \mathcal{L}= \mathcal{L}^\leftrightarrow\setminus\head{P} \). \item The proof based on the property of lc-theory that the theory consists contradicting elements (e.g. inverse elements). \item First, we show \( \smset{P}\not\subseteq\smsetlc{P} \). \item Let $P=\{$\lstinline@ :- @$\code{a}$\lstinline@. :- @$\overline{\code{a}}$\lstinline@.@$\}$, where $\overline{\code{a}}\in\mathcal{L}$ represents the inverse of $\code{a}\in\mathcal{L}$. \item Obviously, $\smset{P}=\{\emptyset\}$. \item On the other hand, $\mathcal{S}=\{\code{a}\}$ and $\mathcal{S}'=\{\overline{\code{a}}\}$ are the only lc-solutions regarding to strict semantics. \item Thus, $\PS{P}{\mathcal{S}}=P\cup\{\code{a.}\}$ and $\PS{P}{\mathcal{S}'}=P\cup\{\overline{\code{a}}.\}$, which is contradicting to `\lstinline@ :- @$\code{a.}$' and `\lstinline@:- @$\overline{\code{a}}.$', respectively. \item We get $\smsetlc{P}=\emptyset$ and thus \( \smset{P}\not\subseteq\smsetlc{P} \). \item Let now $P=\{$\lstinline@:- not @$\code{a.}\}$ with $\smset{P}=\emptyset$. \item Note that $\mathcal{S}=\{\code{a}\}$ is a lc-solutions. \item We obtain \( \PS{P}{\mathcal{S}}= P\cup\{\code{a.}\} \) with \( \smset{\PS{P}{\mathcal{S}}}= \{\{\code{a}\}\} \). \item Thus \( \smsetlc{P}\not\subseteq\smset{P} \) holds. $\hfill\square$ \end{itemize} \section{Answer Set Programming with Linear Constraints}\label{sec:background} Our paper centers upon the theory reasoning capabilities of \sysfont{clingo}{} that allow us to extend ASP with linear constraints, also referred to as \ASPm{lc}. We focus below on the corresponding syntactic and semantic features, and refer the reader to the literature for an introduction to the basics of ASP. We consider (disjunctive) \emph{logic programs with linear constraints}, for short% \footnote{We keep using the prefix `\emph{lc-}' throughout as a shorthand for concepts related to linear constraints.} \emph{lc-programs}, over sets $\mathcal{A}$ and $\mathcal{L}$ of ground \emph{regular} and \emph{linear constraint atoms}, respectively. An expression is said to be \emph{ground}, if it contains no ASP variables. Accordingly, such programs consist of \emph{rules} of the form \begin{lstlisting}[mathescape,numbers=none] a$_1$;...;a$_m$ :- a$_{m+1}$,...,a$_n$,not a$_{n+1}$,...,not a$_o$ \end{lstlisting} where each \lstinline[mathescape]{a$_i$} is either a {regular atom} in $\mathcal{A}$ of form \lstinline[mathescape]{p(t$_1$,...,t$_k$)} such that all \lstinline[mathescape]{t$_i$} are ground terms or an {lc-atom} in $\mathcal{L}$ of form% \footnote{In \sysfont{clingo}, theory atoms are preceded by `\texttt{\&}'.} `\lstinline[mathescape]@&sum{a$_1$*x$_1$;$\dots$;a$_l$*x$_l$}<=k@' that stands for the linear constraint \( a_1\cdot x_1+\dots+a_l\cdot x_l\leq k \). All \lstinline[mathescape]{a$_i$} and \lstinline[mathescape]{k} are finite sequences of digits with at most one dot% \footnote{In the input language of \sysfont{clingo}, sequences containing dots must be quoted to avoid clashes.} and represent real-valued coefficients $a_i$ and $k$. Similarly all \lstinline[mathescape]{x$_i$} stand for the real (or integer) valued variables $x_i$. As usual, \lstinline[mathescape]{not} denotes (default) \emph{negation}. A rule is called a \emph{fact} if ${m,o}=1$, \emph{normal} if $m=1$, and an \emph{integrity constraint} if $m=0$. A linear constraint of form \( x_1-x_2\leq k \) is called a \emph{difference constraint}, and represented as `\lstinline[mathescape]@&sum{x$_1$; -1*x$_2$}<=k@' (or `\lstinline[mathescape]@&diff{x$_1$-x$_2$}<=k@' in pure difference logic settings). To ease the use of ASP in practice, several extensions have been developed. First of all, rules with ASP variables are viewed as shorthands for the set of their ground instances. Further language constructs include \emph{conditional literals} and \emph{cardinality constraints} \cite{siniso02a}. The former are of the form \lstinline[mathescape]{a:b$_1$,...,b$_m$}, the latter can be written as \lstinline[mathescape]+s{d$_1$;...;d$_n$}t+, where \lstinline{a} and \lstinline[mathescape]{b$_i$} are possibly default-negated (regular) literals and each \lstinline[mathescape]{d$_j$} is a conditional literal; \lstinline{s} and \lstinline{t} provide optional lower and upper bounds on the number of satisfied literals in the cardinality constraint. We refer to \lstinline[mathescape]{b$_1$,...,b$_m$} as a \emph{condition}, and call it \textit{static} if it is evaluated during grounding, otherwise it is called \textit{dynamic}. The practical value of such constructs becomes apparent when used with ASP variables. For instance, a conditional literal like \lstinline[mathescape]{a(X):b(X)} in a rule's antecedent expands to the conjunction of all instances of \lstinline{a(X)} for which the corresponding instance of \lstinline{b(X)} holds. Similarly, \lstinline[mathescape]+2{a(X):b(X)}4+ is true whenever at least two and at most four instances of \lstinline{a(X)} (subject to \lstinline{b(X)}) are true. Likewise, \sysfont{clingo}'s syntax of linear constraints offers several convenience features. As above, elements in linear constraint atoms can be conditioned (and use ASP variables), viz.\ `\lstinline[mathescape]@&sum{a$_1$*x$_1$:c$_1$;...;a$_l$*x$_l$:c$_n$}<=k@' where each \lstinline[mathescape]{c$_i$} is a condition. As above, the usage of ASP variables allows for forming arbitrarily long expressions (cf.\ Listing~\ref{encoding:yale}). That is, by using static or dynamic conditions, we may formulate linear constraints that are determined relative to a problem instance during grounding and even dynamically during solving, respectively. Also, linear constraints can be formed with further relations, viz.\ \texttt{>=}, \texttt{<}, \texttt{>}, \texttt{=}, and \texttt{!=}. Moreover, the theory language for linear constraints offers a domain declaration for real variables, `\lstinline[mathescape]@&dom{lb..ub}=x@' expressing that all values of \texttt{x} must lie between \texttt{lb} and \texttt{ub}, inclusive. And finally the maximization (or minimization) of an objective function can be expressed with \lstinline[mathescape]@&maximize{a$_1$*x$_1$:c$_1$;...;a$_l$*x$_l$:c$_n$}@ (or by \texttt{minimize}). The full theory grammar for linear constraints over reals is available at~\url{https://potassco.org/clingo/examples}. Semantically, a logic program induces a set of \emph{stable models}, being distinguished models of the program determined by the stable models semantics~\cite{gellif91a}. To extend this concept to logic programs with linear constraints, we follow the approach of lazy theory solving~\cite{baseseti09a}. We abstract from the specific semantics of a theory by considering the lc-atoms representing the underlying linear constraints. The idea is that a regular stable model $X$ of a program over $\mathcal{A}\cup\mathcal{L}$ is only valid wrt the theory, if the constraints induced by the truth assignment to the lc-atoms in $\mathcal{L}$ are satisfiable in the theory. In our setting, this amounts to finding an assignment of reals (or integers) to all numeric variables that satisfies a set of linear constraints induced by $X\cap\mathcal{L}$. Although this can be done in several ways, as detailed below, let us illustrate this by a simple example. The (non-ground) logic program containing the fact `\lstinline[mathescape]{a("1.5").}' along with the rule `\lstinline[mathescape]@&sum{R*x}<=7 :- a(R).@' has the regular stable model \lstinline[mathescape]@$\{$a("1.5")$,\;$&sum{"1.5"*x}<=7$\}$@. Here, we easily find an assignment, e.g.\ $\{x\mapsto 4.2\}$, that satisfies the only associated linear constraint `$1.5*x\leq 7$'. In what follows, we make this precise by instantiating the general framework of logic programs with theories in~\cite{gekakaosscwa16a} to the case of linear constraints over reals and integers (and so difference constraints). Also, we focus on one theory at a time. Thereby, our emphasis lies on the elaboration of alternative semantic options for stable models with linear constraints, which pave the way for different implementation techniques discussed in Section~\ref{sec:system}. We use the following notation. Given a rule $r$ as above, we call $\{\mathtt{a}_1,\dots,\mathtt{a}_m\}$ its \emph{head} and denote it by \head{r}. Furthermore, we define \( \head{P}=\bigcup_{r\in P}\head{r} \). First of all, we may distinguish whether linear constraints are only determined outside or additionally inside a program. Accordingly, we partition $\mathcal{L}$ into \emph{defined} and \emph{external} lc-atoms, namely $\mathcal{L}\cap\head{P}$ and $\mathcal{L}\setminus\head{P}$, respectively.\footnote{This distinction is analogous to that between head and input atoms, defined via rules or \lstinline{#external} directives \cite{gekakasc14b}, respectively.} While external lc-atoms must only be satisfied by the respective theory, defined ones must additionally be derivable through rules in the program. The second distinction is about the logical correspondence between theory atoms and theory constraints. To this end, we partition $\mathcal{L}$ into \emph{strict} and \emph{non-strict} lc-atoms, denoted by $\mathcal{L}^\leftrightarrow$ and $\mathcal{L}^\rightarrow$, respectively. The strict correspondence requires a linear constraint to be satisfied \textit{iff} the associated lc-atom in $\mathcal{L}^\leftrightarrow$ is true. A weaker condition is imposed in the non-strict case. Here, a linear constraint must hold \textit{only if} the associated lc-atom in $\mathcal{L}^\rightarrow$ is true. Thus, only lc-atoms in $\mathcal{L}^\rightarrow$ assigned true impose requirements, while constraints associated with falsified lc-atoms in $\mathcal{L}^\rightarrow$ are free to hold or not. However, by contraposition, a violated constraint leads to a false lc-atom. Different combinations of such correspondences are possible, and we may even treat some constraints differently than others. In view of this, we next provide an extended definition of stable models that accommodates all above correspondences. Following~\cite{gekakaosscwa16a}, we accomplish this by mapping the semantics of lc-programs back to regular stable models. To this end, we abstract from the actual constraints and identify a solution with a set of linear constraint atoms. More precisely, we call \( \mathcal{S}\subseteq\mathcal{L} \) a \emph{linear constraint solution}, if there is an assignment of reals (or integers) to all real (integer) valued variables represented in $\mathcal{L}$ that \begin{enumerate} \item[(i)] \label{en:lcsol1} satisfies all linear constraints associated with strict and non-strict lc-atoms in $\mathcal{S}$ and \item[(ii)] \label{en:lcsol2} falsifies all linear constraints associated with strict lc-atoms in $\mathcal{L}^\leftrightarrow\setminus\mathcal{S}$. \end{enumerate} Then, we define a set $X\subseteq\mathcal{A}\cup\mathcal{L}$ as an \emph{lc-stable model} of an lc-program~$P$, if there is some lc-solution $\mathcal{S}\subseteq\mathcal{L}$ such that $X$ is a (regular) stable model of the logic program \newcommand{\code}[1]{\text{\texttt{#1}}} \begin{align} \hspace{-10pt} P &{}\cup \{\code{a.} \mid \code{a}\in (\mathcal{L}^\leftrightarrow\setminus\head{P})\cap \mathcal{S}\} \cup \{\code{:- not a.}\mid \code{a}\in (\mathcal{L}^\leftrightarrow\cap\head{P})\cap \mathcal{S}\} \label{eq:stable:strict} \\ &{}\cup \{\code{\{a\}.} \mid \code{a}\in (\mathcal{L}^\rightarrow\setminus\head{P})\cap \mathcal{S}\} \cup \{\code{:- a.} \mid \code{a}\in (\mathcal{L}\cap\head{P})\setminus \mathcal{S}\}\rlap{.} \label{eq:stable:non-strict} \end{align} The rules added to~$P$ express conditions aligning the lc-atoms in $X\cap\mathcal{L}$ with a corresponding lc-solution~$\mathcal{S}$. To begin with, the set of facts on the left in~\eqref{eq:stable:strict} makes sure that all lc-atoms in~$\mathcal{S}$ that are external and strict also belong to~$X$. Unlike this, the corresponding set of choice rules in~\eqref{eq:stable:non-strict} merely says that non-strict external lc-atoms from~$\mathcal{S}$ may be included in~$X$ or not. The integrity constraints in~\eqref{eq:stable:strict} and~\eqref{eq:stable:non-strict} take care of defined lc-atoms, viz.\ the ones in~$\head{P}$. The set in~\eqref{eq:stable:strict} again focuses on strict lc-atoms and stipulates that the ones from~$\mathcal{S}$ are included in~$X$ as well. Finally, for both strict and non-strict defined lc-atoms, the integrity constraints in~\eqref{eq:stable:non-strict} assert the falsity of atoms that are not in~$\mathcal{S}$. \section{Changes in view of reviewers comments} \label{sec:changes} We are grateful for the helpful comments by the reviewers. We describe below how we addressed their comments \begin{itemize} \item We added a paragraph on the usage of strict/non-strict and external/defined lc-atoms, as raised by reviewers 1 and 3, at the end of Section~\ref{sec:background}: \begin{quote} Finally, let us comment on the usability of both types of lc-atoms. Their \lcatype{external}{strict} interpretation allows for deriving information from the respective theory. This generates some overhead since the corresponding propagators have to deal with two relations between lc-atoms and their associated constraints. This approach is advantageous in our planning example in Section~\ref{sec:multishot}, where \lcatype{external}{strict} lc-atoms allow us to naturally express goal conditions as integrity constraints. Conversely, we face the following difficulties. First, defined lc-atoms must also occur in some rule head, which is rarely the case with goal conditions. Second, non-strict lc-atoms may be false although the actual constraint is satisfied. On the other hand, in the \lcatype{defined}{non-strict} setting, the stable model semantics delineates the effective set of constraints that needs to be satisfied. False lc-atoms are considered as unknown and can therefore be disregarded by the corresponding propagators. We draw on this in our scheduling encodings where it halves the number of constraints and helps with faster propagation via the program's completion. The impact of this is investigated in Section~\ref{sec:experiments}. As a rule of thumb, the choice between both settings depends on who should be in charge of delineating the set of constraints in focus. If this is the theory propagator, an \lcatype{external}{strict} setting is preferable, since the strict correspondence induces the relevant lc-atoms without any interference with derivable lc-atoms. If this is the actual ASP system, a \lcatype{defined}{non-strict} setting is favorable, in which derivable lc-atoms delineate the set of constraints checked by the constraint propagator. \end{quote} \item Reviewer 1 raised the question \texttt{why clingcon could only use certain solvers}. This is a misunderstanding. Indeed, \sysfont{clingcon}{} series 1 and 2 comprise the off-the-shelf CP solver \sysfont{gecode}. Unlike this, \sysfont{clingcon}{} 3 relies on constraint propagators implemented by us. We tried to make this more explicit by rewriting the introductory sentence to clingcon in Section~\ref{sec:system}: \begin{quote} \textbf{\sysfont{clingcon}} series~3 offers a \sysfont{clingo}-based ASP system with handcrafted propagators for constraints over integers~\cite{bakaossc16a}. \end{quote} \item Reviewer 1 asked for {\tt more explanation of the benchmark programs and expe\-riments}. Although due to lacking space, we refrained from adding the actual encodings to the paper, we make all encodings and instances available online at \url{https://potassco.org/labs/{clingoDL,clingoLP}}. \item Reviewer 2 remarks that {\tt from a KR perspective, it would be better to avoid a special treatment of fluent dead} \ to formalize that {\tt "the turkey stays dead"} on page 7. We agree that this would be a more uniform encoding. However, we would like to leave it as is, since (1) fluent \textit{dead} persists once satisfied, and (2) it avoids the introduction of another fluent \textit{alive} (and thus keeps things smaller). \item We addressed the specific suggestions by Reviewer 2 and changed the indicated phrases accordingly. \end{itemize} \section{Summary}\label{sec:summary} We presented several truly hybrid ASP systems incorporating difference and linear constraints. Previous approaches addressed this by resorting to translations into foreign solving paradigms like MILP or SMT. This difference is analogous to the one between genuine ASP solvers like \sysfont{clasp}{} and \sysfont{wasp}{} and earlier ones like \sysfont{assat}\ and \sysfont{cmodels}\ that translate ASP to SAT. The resulting systems \clingod{dl} and \clingod{lp} comprise several complementary aspects. For instance, \clingod{dl} relies upon customized propagators, one variant using a Python{} API, the other a C++{} API. This is similar to the approach of \sysfont{inca}{} and \sysfont{clingcon}~3 for Constraint ASP. Unlike this, \clingod{lp} builds upon the Python{} API to incorporate off-the-shelf LP solvers for propagation, optionally \sysfont{cplex}{} or \sysfont{lpsolve}. This is similar to the approach of \sysfont{dlvhex}[\textsc{cp}] and \sysfont{clingcon}~2 integrating \sysfont{gecode}{} for constraint processing. Both \clingod{dl} and \clingod{lp} allow for dealing with integer as well as real variables. The former admits two, the latter an arbitrary number of such variables per linear constraint. This is complemented by \sysfont{clingcon}~3 adding constraint processing to \sysfont{clingo}{} by using a low level API. We accomplished this by instantiating the generic framework of ASP modulo theories described in~\cite{gekakaosscwa16a}. We defined lc-stable models and elaborated upon different types of lc-atoms, ultimately settling on the combinations \lcatype{defined}{non-strict} and \lcatype{external}{strict} for \clingod{dl} and \clingod{lp}.% \footnote{This is our recommendation in view of our analysis in Section~\ref{sec:background}; both systems actually support all four combinations of strict/non-strict and defined/external lc-atoms.} Our underlying formal analysis on the interaction of strict- and definedness has actually a much broader impact given that other systems follow similar principles. Although we lack a deeper analysis, \sysfont{inca}{} and \sysfont{dlvhex}[\textsc{cp}] appear to adhere to an \lcatype{external}{strict} treatment of constraint atoms, just as our previous systems \sysfont{clingcon}, \sysfont{dingo}, and \sysfont{mingo}, while \sysfont{ezsmt}{} and \sysfont{ezcsp}{} seem to follow an \lcatype{external}{non-strict} approach. Moreover, the results in Proposition~\ref{thm:settings} are of a general nature and apply well beyond ASP systems dealing with linear constraints. We provided a conceptual and empirical comparison of \clingod{dl} and \clingod{lp} with related systems for dealing with different forms of linear constraints in ASP. Our experiments focused on, first, examining different types of lc-atoms and APIs for both \sysfont{clingo}{} derivatives, and, second, comparing them with related systems. In the first case, \clingod{dl} using \lcatype{defined}{non-strict} lc-atoms along with the C++\ API yields the best results, and in the second one, the aforementioned \clingod{dl} configuration outperforms the other systems for the set of benchmarks only involving difference constraints, and \sysfont{clingcon}\ has an edge over all other systems regarding the set of benchmarks featuring arbitrary (integer-based) linear constraints. Finally, we showed how easily our machinery can be applied to online reasoning scenarios by using \sysfont{clingo}'s multi-shot and theory reasoning capabilities in tandem. \section{Experimental analysis}\label{sec:experiments} We begin with an empirical analysis of our \sysfont{clingo}{} derivatives in different settings. We investigate, first, different types of lc-atoms, viz.\ \lcatype{defined}{non-strict} versus \lcatype{external}{strict}, second, different levels of theory interfaces, Python\ or C++, for \clingod{dl}, and, third, different levels of integration, namely, dedicated implementations versus off-the-shelf solver. Finally, we contrast the performance of our systems with other systems for \ASPm{lc}. We ran each benchmark on a Xeon E5520 2.4 GHz processor under Linux limiting RAM to 20~GB and execution time to 1800s. For \clingod{dl} and \clingod{lp}, we use \sysfont{clingo}~5.2.0. Furthermore, we use \sysfont{clingcon}~3.2.0, \sysfont{dingo}~v.2011-09-23, \sysfont{mingo}~v.2012-09-30, \sysfont{ezsmt}~1.0.0, and \sysfont{ezcsp}~1.7.9 for our experiments. We upgraded \sysfont{dingo}\ and \sysfont{mingo}{} to use recent versions of their back-end solvers. Hence, in our experiments, the LP-based systems \clingod{lp} and \sysfont{mingo}{} use \sysfont{cplex}~12.7.0.0 and the SMT-based systems \sysfont{dingo}{} and \sysfont{ezsmt}{} use \sysfont{z3}~4.4.2. The benchmark set consists of 165 instances, among which 110 can be encoded using difference constraints~(\textsc{dl}) and 55 require linear constraints with more than two variables~(\textsc{lc}). In detail, the \textsc{dl}\ set consists of 38 instances of two-dimensional strip packing~(\textsc{2sp})~\cite{sointabana10a}, and 72 instances of flow shop~(\textsc{fs}), job shop~(\textsc{js}), and open shop~(\textsc{os}) problems~\cite{taillard93a}, selecting three instances for each job and machine at random. Since not all systems support optimization over variable values, we bounded the instances with 1.2 times the best known bound and solved the resulting decision problem. The \textsc{lc}\ instance set includes 20 instances of incremental scheduling~(\textsc{is}), 15 instances of reverse folding~(\textsc{rf}), and 20 instances of weighted sequence~(\textsc{ws}). Encodings have been adopted from ~\cite{liesus16a} in combination with the instances from the ASP competition.% \footnote{We refrained from using the other three benchmark classes from this source because the available instances were too easy in view of producing informative results.} Our empirical evaluation focuses on available systems sharing comparable encodings. This was not the case for \sysfont{aspartame}, \sysfont{aspmt2smt}, \sysfont{inca}, and \sysfont{dlvhex}[\textsc{cp}]. The first two systems have a proper and thus different input language and encoding philosophy, \sysfont{inca}\ produced incorrect results (cf.~\cite{bakaossc16a} for details), and \sysfont{dlvhex}[\textsc{cp}] is no longer maintained. Table~\ref{tab:clingolc} compares \clingod{dl} and \clingod{lp} with different encoding techniques, types of theory atoms, and programming language hosting the theory interface by measuring average time~(\textsc{t}) and timeouts~(\textsc{to}). \input{tables/clingolc} Each column consists of one combination of form \emph{system}/\emph{atom}/\emph{language}, where \emph{system} is either \textsc{dl} or \textsc{lp} for \clingod{dl} and \clingod{lp}, \emph{atom} either \atomtype{dns} or \atomtype{es} for \lcatype{defined}{non-strict} and \lcatype{external}{strict} lc-atoms, and \emph{language} either \textsc{py} or \textsc{cpp} for Python\ and C++, respectively. To compare \clingod{dl} and \clingod{lp}, we restrict the set of benchmarks to \textsc{dl}. We observe that \atomtype{dns} performs better than \atomtype{es} in all settings. Under lc-stable model semantics, defined lc-atoms are more tightly constrained. External lc-atoms, on the other hand, induce an implicit choice leading to a larger search space and might introduce duplicate solutions with different assignments. Furthermore, strict lc-atoms double the amount of implications that have to be considered by the propagator. As expected, the C++\ variant of \clingod{dl} outperforms its Python\ counterpart, even though the performance gain does not reach an order of magnitude. Table~\ref{tab:systems} compares different systems dealing with \ASPm{lc} by average time~(\textsc{t}) and timeouts~(\textsc{to}). \input{tables/systems} Only the best configurations from Table~\ref{tab:clingolc} were selected for comparison. All systems were tested using their default configurations. For \textsc{dl}{}, \clingolc{dl}{dns}{cpp} performs best overall, even though \sysfont{clingcon}\ is better for \textsc{2sp}\ and \textsc{js}. The class \textsc{fs}\ generates the most difference constraints among all benchmark classes, making it less suited for translation-based approaches, like \sysfont{dingo}, \sysfont{mingo}, and \sysfont{ezsmt}, and producing overhead for more involved propagation as in \sysfont{clingcon}. By default, \sysfont{ezcsp}\ performs the theory consistency check on full answer sets, and by doing so avoids handling vast amounts of constraints during search and therefore performs comparatively well on \textsc{fs}. For the other classes though, this generate and test approach is less effective. Regarding \textsc{lc}\ and overall results, \sysfont{clingcon}\ clearly dominates the competition, followed by the two translation-based approaches \sysfont{mingo}\ and \sysfont{ezsmt}\ with underlying state-of-the-art solvers \sysfont{cplex}\ and \sysfont{z3}, respectively. \clingolc{lp}{dns}{py} falls behind, since it is a straightforward Python\ implementation and uses an exponential consistency check. In addition, distinct features of \clingod{lp} like real-valued variables and optimization as well as dynamic conditions are not supported by other systems and thus not included in the benchmark set. \section{Introduction}\label{sec:introduction} Answer Set Programming (ASP;~\cite{baral02a}) has become an established paradigm for knowledge representation and reasoning, in particular, when it comes to solving knowledge-intense combinatorial (optimization) problems. Despite its versatility, however, ASP falls short in handling non-Boolean constraints, such as linear constraints over unlimited integers or reals. This shortcoming was broadly addressed in the recent \sysfont{clingo}~5 series~\cite{gekakaosscwa16a} by providing generic means for incorporating theory reasoning. They span from theory grammars for seamlessly extending \sysfont{clingo}'s input language with theory expressions to a simple interface for integrating theory propagators into \sysfont{clingo}'s solver component. We instantiate this framework with different forms of linear constraints and elaborate upon its formal properties. Given this, we discuss the respective implementations, and present techniques for using these constraints in a reactive context. In more detail, we introduce extensions to \sysfont{clingo}{} with difference and linear constraints over integers and reals, respectively, and realize them in complementary ways. For handling difference constraints, we provide customized implementations of well-established algorithms in Python{} and C++, while we use \sysfont{clingo}'s Python{} API to connect to off-the-shelf linear programming solvers, viz.\ \sysfont{cplex}{} and \sysfont{lpsolve}, to deal with linear constraints. In both settings, we support integer as well as real valued variables. For a complement, we also consider \sysfont{clingcon}, a derivative of \sysfont{clingo}, integrating constraint propagators for handling linear constraints over integers at a low-level. While this fine integration must be done at compile-time, the aforementioned Python{} extensions are added at run-time. Our empirical analysis complements the study in~\cite{liesus16a} with experimental results on our new systems \clingod{dl} and \clingod{lp}. Finally, we provide a comparison of different semantic options for integrating theories into ASP and a systematic overview of the various features of state-of-the-art ASP systems handling linear constraints. \section{Multi-Shot ASP Solving with Linear Constraints} \label{sec:multishot} Multi-shot solving~\cite{gekakasc14b} is about solving continuously changing logic programs in an operative way. This can be controlled via reactive procedures that loop on solving while reacting, for instance, to outside changes or previous solving results. These reactions may entail the addition or retraction of rules that the operative approach can accommodate by leaving the unaffected program parts intact within the solver. This avoids re-grounding and benefits from heuristic scores and nogoods learned over time. In fact, evolving logic programs with linear constraints can be extremely useful in dynamic applications, for example, to add new resources in a planning domain, or to set the value of an observed variable measured using sensors. The abstraction from actual constraints to constraint atoms allows us to easily extend multi-shot solving to lc-programs. To illustrate how seamlessly our systems \clingod{dl} and \clingod{lp} support multi-shot solving, we apply the exemplary Python\ script, shipped with \sysfont{clingo}\ to illustrate incremental solving, to model the spoiling Yale shooting scenario~\cite{caotpo00a}. Multi-shot solving in \sysfont{clingo}\ relies on two directives (cf.~\cite{gekakasc14b}), the \texttt{\#program} directive for regrouping rules and the \texttt{\#external} directive for declaring atoms as being external to the program at hand. The truth value of such external atoms can be set via \sysfont{clingo}'s API\@. The aforementioned Python\ script loops over increasing integers until a stop criterion is met. It presupposes three groups of rules declared via \texttt{\#program} directives. At step 0 the programs named \texttt{base} and \texttt{check(n)} are grounded and solved for $\texttt{n}=0$. Then, in turn programs \texttt{check(n)} and \texttt{step(n)} are added for $\texttt{n}>0$, grounded, and the resulting overall program solved. In addition, at each step $\texttt{n}$ an external atom \texttt{query(n)} is introduced; it is set to true for the current iteration $\texttt{n}$ and false for all previous instances with smaller integers than $\texttt{n}$. We refer the reader to~\cite{gekakasc14b} for further details on the Python{} part. Notably, for dealing with lc-programs, we can use the exemplary Python\ script as is---once the respective propagator is registered with the solver. In the spoiled Yale shooting scenario~\cite{caotpo00a}, we have a gun and two actions, viz.\ load and shoot. If we load, the gun becomes loaded. If we shoot, it kills the turkey, if the gun was loaded for no more than 35 minutes. Otherwise, the gun powder is spoiled. We model this planning problem in \ASPm{lc}. \lstinputlisting[caption={Spoiled Yale shooting instance},float=ht,label=encoding:yalebase,basicstyle=\ttfamily\footnotesize]{encodings/base.lps} We start by including the incremental Python\ program, the grammar, and the propagator for linear constraints in the first line of Listing~\ref{encoding:yalebase}.% \footnote{For uniformity, we use semi-colons '\texttt{;}' rather than '\texttt{,}' for separating body elements.} This listing is the base program. All actions and their durations are introduced in Lines~4 and~5. At the initial situation, the gun is unloaded (Line~6). Line~7 and~8 initialize integer variables \texttt{at(0)} and \texttt{armed(0)} with 0 (see below). \lstinputlisting[caption={Spoiled Yale shooting scenario},float=ht,label=encoding:yale,basicstyle=\ttfamily\footnotesize]{encodings/yale.lps} Listing~\ref{encoding:yale} gives the dynamic part of the problem; it is grounded for each step \texttt{n}. Line~2 enforces that exactly one action is done per step. The exact times at which each step takes place is captured by the integer variables \texttt{at(n)}. The difference between two consecutive time steps is the duration of the respective action (Line~3). The next three lines make the fluents inertial, viz.\ the gun stays loaded/unloaded if it was loaded/unloaded before, and the turkey remains dead. Lines~9 and~10 use the integer variable \texttt{armed(n)} to describe for how long the weapon has been loaded at step \texttt{n}. Whenever it is unloaded, \texttt{armed(n)} is 0, otherwise it is increased by the duration of the last action. The following four lines (12--15) encode the conditions and effects of the actions. When we load the gun, it becomes loaded; when we shoot, it becomes unloaded. If we shoot and the gun was loaded for no longer than 35 minutes (and thus the gun powder is unspoiled), the turkey is dead. The last line ensures that we cannot shoot if the gun is not loaded. Together with the initial situation and the actions from Listing~\ref{encoding:yalebase} this encodes the spoiled Yale shooting problem, and any solution represents an executable plan. \lstinputlisting[caption={Query for the spoiled Yale Shooting Scenario.},float=ht,label=encoding:yalequery,basicstyle=\ttfamily\footnotesize]{encodings/query.lps} Listing~\ref{encoding:yalequery} adds a query to our problem. In Line~2 we require that the turkey is dead at step \texttt{n}. As this constraint is subject to the external atom \texttt{query(n)}, it is only active at solving step \texttt{n}. The next line ensures that we kill the turkey within 100 minutes. And as an additional constraint, we added some preparation time such that we are not allowed to shoot in the first 35 minutes. It is possible to solve this problem within three steps. There exist two solutions at this time point, one of them containing \texttt{unloaded(0)}, \texttt{do(wait,1)}, \texttt{unloaded(1)}, \texttt{do(load,2)}, \texttt{loaded(2)}, \texttt{do(shoot,3)}, \texttt{unloaded(3)}, \texttt{dead(3)}. That is, we simply wait before loading and shooting. The second solution loads the gun instead of waiting, thus loading the gun twice before shooting. \section{\sysfont{clingo}{} derivatives and related systems}\label{sec:system} In this section, we give an overview of systems extending ASP with linear constraints. We start with our own systems \clingod{dl} and \clingod{lp} both relying upon \sysfont{clingo}'s interface for theory propagators. We also include \sysfont{clingcon}, since it is based on a much lower level API using the internal functions of \sysfont{clingo}{} (and \sysfont{clasp}) in C++. While \sysfont{clingcon}{} implements a highly sophisticated system using advanced preprocessing and solving techniques, the Python{} variants of \clingod{dl} and \clingod{lp} provide easily modifiable and maintainable propagators for difference and linear constraints, respectively. This carries over to the C++{} variant of \clingod{dl} since the C++{} and Python{} API share the same functionality. \input{tables/features} Table~\ref{tab:features} shows a comparative list of features for these systems. The two flexible \sysfont{clingo}{} derivatives support all four combinations of strict/non-strict and defined/external lc-atom types, whereas \sysfont{clingcon}{} has a fixed one. Also the bandwidth of supported constraints is different. While \clingod{dl} only supports difference constraints, the other two support n-ary linear constraints. Notably, \clingod{dl} and \clingod{lp} support (approximations of) real numbers (see below). Moreover, all three \sysfont{clingo}{} derivatives allow for optimizing objective functions over numeric variables (in addition to optimization in ASP). \textbf{\clingod{dl}} extends \sysfont{clingo}{} with difference constraints of the form $x-y\leq k$, where $x$ and $y$ are integer (or real) variables and $k$ is an integer (real) constant. Despite the restriction to two variables, they allow for naturally encoding timing related problems, as e.g., in scheduling, and are solvable in polynomial time. \clingod{dl} uses \sysfont{clingo}{}'s theory interface to realize a stateful propagator that checks during search whether the current set of implied difference constraints is satisfiable~\cite{cotmal06a}. To this end, it makes use of the stateful nature of the theory interface that allows for incrementally updating internal states and thus for backtracking to previous states without having to rebuild the internal representation. By default, all difference constraint atoms are considered to be non-strict. In this case, it is only necessary to keep track of lc-atoms that are assigned true since only then the constraint is required to hold. In the strict case, false assignments to difference constraint atoms are considered as well. This is done by adding $y-x\leq-k-1$ whenever `\lstinline[mathescape]@&diff{x-y}<=k@' is assigned false. As a side-product of the satisfiability check, an integer (real) assignment for all variables is obtained and ultimately printed for all lc-stable models. Usually, several or even an infinite number of assignments exist. The returned assignment is the one with the lowest sum of the absolute values of all variables. For instance, in terms of scheduling problems, this amounts to scheduling each job as soon as possible. \textbf{\clingod{lp}} fully covers the extension of \ASPm{lc} described in Section~\ref{sec:background}. This \sysfont{clingo}{} derivative accepts lc-atoms containing integer and real variables possibly subject to dynamic conditions. That is, \clingod{lp} extends ASP with constraints as dealt with in Linear Programming (LP;~\cite{dantzig63a}) as well as according objective functions for optimization. In \clingod{lp}, the latter are subject to dynamic conditions and thus depend on the respective Boolean assignment (as in regular ASP optimization). As above, the theory interface of \sysfont{clingo}{} is used to integrate a stateful propagator that checks during search the satisfiability of the current set of linear constraints. Here, however, this is done with a generic interface to dedicated LP solvers, currently supporting \sysfont{cplex}\ and \sysfont{lpsolve}. (Note that both LP solvers do an exponential consistency check.) The Python\ interfaces of \sysfont{cplex}\ and \sysfont{lpsolve}\ natively support relations $=$, $\geq$, and $\leq$. We add support for $<$, $>$, and $\neq$. To this end, we translate $<$ and $>$ into $\leq$ and $\geq$ by subtracting or adding an $\varepsilon$ to the right-hand-side of a linear constraint, respectively.% \footnote{This $\varepsilon$ can be configured using the command line and defaults to $10^{-3}$ (as in \sysfont{cplex}).} Furthermore, $\neq$ is treated as a disjunction of $<$ and $>$. By default, \clingod{lp} treats lc-atoms in a non-strict manner. Thus only linear constraints represented by true lc-atoms are considered. When treating them strictly, false lc-atoms are handled using the complementary relation. In this case, the corresponding linear constraint is derived by using the complementary relation. Notably, \clingod{lp} offers dynamic conditions in lc-atoms. This allows for linear constraints of variable length even during search. All conditions have to be decided before such a constraint is included in the consistency check. Furthermore, \clingod{lp} updates its internal state incrementally but rebuilds the linear constraint system after backtracking to avoid accumulating rounding errors. Also, it uses an Irreducible Inconsistent Set algorithm~\cite{loon81} for extracting minimal sets of conflicting constraints to support conflict learning in the ASP solver. On the one hand, this extraction is expensive, on the other hand, such core conflicts may significantly reduce the search space. To control this trade-off, \clingod{lp} only enables this feature after a certain percentage of lc-atoms and conditions is assigned (by default 20\%). Similarly, frequent theory consistency checks are expensive and a conflict is less likely to be found within a small assignment; accordingly, an analogous percentage based threshold allows for controlling their invocation (default 0\%). \textbf{\sysfont{clingcon}} series~3 offers a \sysfont{clingo}-based ASP system with handcrafted propagators for constraints over integers~\cite{bakaossc16a}; it is implemented in C++{} and features a strict, external semantics. Sophisticated preprocessing techniques are supported and non-linear constraints such as the global \emph{distinct} constraint are translated into linear ones. Integer variables are represented using the order encoding~\cite{crabak94a}, and customized propagators using state-of-the-art lazy nogood and variable generation are employed. The propagators do not only ensure bound consistency on the variables but also derive new bounds. Furthermore, multi-objective optimization on integer variables is supported. In contrast to \clingod{lp}, conditions on integer variables must be static. Our systems are available at \url{https://potassco.org/labs/{clingoDL,clingoLP}} and \url{https://potassco.org/clingcon}.
\section{Introduction} Seven years ago, the CREMA (Charge Radius Experiments with Muonic Atoms) Collaboration \cite{crema1} measured very precisely the Lamb shift of muonic hydrogen. This event opened a new era of precise investigation of the energy spectrum of simple atoms. Furthermore, in the new experiments of this Collaboration with muonic deuterium and ions of muonic helium a charge radii of light nuclei were obtained with very high precision \cite{crema2,crema3,crema4}. In the case of muonic hydrogen and muonic deuterium it was shown that obtained values of the charged radii are significantly different from those which were extracted from experiments with electronic atoms and in the scattering of the electrons with nuclei and were recommended for using by the CODATA \cite{Mohr:2012tt}. At present, several experimental groups plan to measure the hyperfine structure (HFS) of various muonic atoms with more high precision \cite{ma_2017,adamczak_2017,pohl_2017}. This will make it possible to better understand the existing "puzzle" of the proton charge radius, to check the Standard Model with greater accuracy and, possibly, to reveal the source of previously unaccounted interactions between the particles forming the bound state. One way to overcome the crisis situation is a deeper theoretical analysis of the fine and hyperfine structure of muonic atom spectrum, in the verification of previously calculated contributions and the more accurate construction of the particle interaction operator in quantum field theory, the calculation of new corrections whose value for muonic atoms can increase substantially in comparison with electronic atoms. The expected results will allow to get also a new very important information about the forces which are responsible for the structure of atoms. From the theory side it is urgently needed to study the possible effects of exchanges between muon and proton which can contribute to hyperfine structure of muonic hydrogen. One of such effects was considered in recent papers \cite{apmlet,pascalutsa,pang,kou}. It arises from the effective pion exchange between muon and proton induced by coupling of the pion to two photons (see Fig.~\ref{fig1}~(left)). Despite the fact that numerically such contribution was found to be rather small, it can be important for the interpretation of new data. In this Letter we consider the additional contribution to hyperfine structure of muonic hydrogen which is related to the axial-vector mesons exchanges (see Fig.~\ref{fig1}~(right)). We would like to point out, that one can expect the important contribution of this exchange to spin dependent part of muon-proton interaction because the exchange particle has the spin one. Furthermore, it is also well known that in the channel with quantum number $1^{++}$ axial anomaly effects can play an important role and, in particularly, these effects might be considered as a cornerstone to solve so-called "proton spin crisis" \cite{Anselmino:1994gn}. \section{Axial-vector meson exchange contribution to muon-proton interaction induced by axial anomaly} One-photon exchange interaction in quantum electrodynamics gives the leading order contribution to the interaction operator in muonic hydrogen. The potential of hyperfine interaction has the following form \cite{apm2004}: \begin{equation} \label{eq:3} \Delta V_B^{hfs}=\frac{8\pi\alpha\mu_p}{3m_\mu m_p}({\bf S}_p{\bf S}_\mu)\delta({\bf r}) -\frac{\alpha\mu_p(1+a_\mu)}{m_\mu m_pr^3}\left[({\bf S}_p{\bf S}_\mu)-3({\bf S}_p{\bf n}) ({\bf S}_p{\bf n})\right]+ \end{equation} \begin{displaymath} \frac{\alpha\mu_p}{m_\mu m_pr^3}\left[1+\frac{m_\mu}{m_p}-\frac{m_\mu}{2m_p\mu_p}\right]({\bf L}{\bf S}_p) \end{displaymath} where $m_\mu $, ${\bf S}_\mu$ and $m_p$, ${\bf S}_p$ are masses and spins of muon and proton, correspondingly, $\mu_p$ is the proton magnetic moment. The potential (\ref{eq:3}) gives the main contribution of order $\alpha^4$ to the hyperfine structure of muonic atom. Precision calculation of the hyperfine structure of the spectrum, which is necessary for a comparison with experimental data, requires the consideration of various corrections to the vacuum polarization, nuclear structure and recoil, and relativistic corrections \cite{apm2004,egs,borie,apm2017}. We calculate further the contribution to HFS which is determined by the axial-vector $f_1(1285)$, $a_1(1260)$ and $f_1(1420)$ meson exchanges shown in Fig.~\ref{fig1} (right). \begin{figure}[th] \centerline{ \includegraphics[scale=1.0]{axx1.eps} \includegraphics[scale=1.0]{axx2.eps} } \caption{Muon-proton interaction induced by mesonic exchange.} \label{fig1} \end{figure} The coupling of the axial-vector meson to two photon state is possible through anomalous triangle diagram, shown in Fig.~\ref{fig2}. The general structure of this vertex takes the form \cite{Rose63,ABJ69,bell}: \begin{eqnarray} T^{\mu\nu\alpha}&=& 4\pi i \alpha \, \varepsilon_{\rho \sigma \tau \alpha} \, \biggl\{ \left[\nu \left(A_3 k_1^{\tau}- \tilde{A}_3k_2^{\tau}\right) + k_2^2 A_4 k_1^{\tau} -k_1^2 \tilde{A}_4 k_2^{\tau}\right] g^{\mu \rho}g^{\sigma \nu} \nonumber \\ &&\quad +A_3 k_1^{\nu} k_1^{\rho} k_2^{\sigma}g^{\tau \mu}- \tilde{A}_3 k_2^{\mu} k_1^{\rho} k_2^{\sigma}g^{\tau \nu}+A_4 k_2^{\nu} k_1^{\rho} k_2^{\sigma}g^{\tau \mu} -\tilde{A}_4 k_1^{\mu} k_1^{\rho} k_2^{\sigma}g^{\tau \nu} \biggr\}.\label{eq:a1} \end{eqnarray} where $A_i\equiv A_i(t^2,k_1^2,k_2^2)$, $\tilde{A}_i\equiv A_i(t^2,k_2^2,k_1^2)$. Another form of the tensor describing the transition from initial state of two virtual photons with four-momenta $k_1$, $k_2$ to an axial-vector meson ${\cal A}$ ($J^{PC}=1^{++}$) with the mass $M_A$ is presented in \cite{Pascalutsa:2012pr}\footnote{ The only difference between our expression \eqref{eq:aa1} and their work is related to the normalized factor $1/M_A^2$ used in \cite{Pascalutsa:2012pr}.}: \begin{equation} \label{eq:aa1} T^{\mu\nu\alpha}=4\pi i\alpha\varepsilon_{\rho\sigma\tau\alpha}\Bigr[ R^{\mu\rho}(k_1,k_2)R^{\nu\sigma}(k_1,k_2)(k_1-k_2)^\tau\nu F^{(0)}_{A\gamma^\ast\gamma^\ast}(k_1^2,k_2^2)+ \end{equation} \begin{displaymath} +R^{\nu\rho}(k_1,k_2)\left(k_1^\mu-\frac{k_1^2}{\nu}k_2^\mu\right)k_1^\sigma k_2^\tau F^{(1)}_{A\gamma^\ast\gamma^\ast}(k_1^2,k_2^2)+ \end{displaymath} \begin{displaymath} +R^{\mu\rho}(k_1,k_2)\left(k_2^\nu-\frac{k_2^2}{\nu}k_1^\nu\right)k_2^\sigma k_1^\tau F^{(1)}_{A\gamma^\ast\gamma^\ast}(k_2^2,k_1^2)\Bigl], \end{displaymath} \begin{displaymath} \nu=(k_1k_2)=\frac{1}{2}[(k_1+k_2)^2-k_1^2-k_2^2]=\frac{1}{2}[t^2-k_1^2-k_2^2], \end{displaymath} \begin{displaymath} R^{\mu\nu}=R^{\nu\mu}=-g^{\mu\nu}+\frac{1}{X}\left[(k_1k_2)(k_1^\mu k_2^\nu+k_1^\nu k_2^\mu)- k_1^2k_2^\mu k_2^\nu-k_2^2k_1^\mu k_1^\nu\right], \end{displaymath} \begin{displaymath} X=(k_1k_2)^2-k_1^2k_2^2=\frac{1}{4}\left[t^4-2t^2(k_1^2+k_2^2)+(k_1^2-k_2^2)^2\right]. \end{displaymath} \begin{figure}[th] \centerline{\includegraphics[scale=0.9]{axx3a.eps}} \caption{Coupling of axial-vector mesons to two photons.} \label{fig2} \end{figure} The relation between $A_i$, $\tilde A_i$ and form factors in \eqref{eq:aa1} is the following: \begin{equation} F_{{\cal A} \gamma^\ast \gamma^\ast}^{(1)}(t^2,k_1^2, k_2^2) =\frac{\nu}{X} \left[k_2^2(\tilde{A}_3 - A_4)+ \nu (\tilde{A}_4 - A_3)\right], \end{equation} \begin{displaymath} F^{(1)}_{{\cal A} \gamma^\ast \gamma^\ast}(t^2,k_2^2, k_1^2) = \frac{\nu}{X} \left[k_1^2( A_3 - \tilde{A}_4 )+ \nu( A_4 - \tilde{A}_3 ) \right] \end{displaymath} \begin{displaymath} F^{(0)}_{{\cal A} \gamma^\ast \gamma^\ast}(t^2,k_1^2, k_2^2) = \frac{1}{\nu(k_1^2-k_2^2)}\left[ (\nu A_3 + k_2^2 A_4) (k_1^2+\nu)-(k_1^2 \tilde{A}_4 + \nu \tilde{A}_3) (k_2^2+\nu)\right]. \end{displaymath} The form factors $F^{(0)}_{A \gamma^\ast\gamma^\ast} (k_1^2,k_2^2)$ and $ F^{(1)}_{A\gamma^\ast\gamma^\ast}(k_1^2, k_2^2)$ entering in \eqref{eq:aa1} are dependent on the squares of the 4-momenta of virtual photons. With increasing $k_1^2$, $k_2^2$, these functions must decrease rapidly to ensure the ultraviolet convergence of the loop integral in the interaction amplitude. We should mention that in the opposite to the case of pion coupling to two photons, axial-vector meson can not decay into two real photons, according to the Landau-Yang theorem \cite{Landau:1948kw,Yang:1950rg}. Nevertheless, the coupling of $1^{++}$ mesons to two photons is still possible in the case when one or both photons are virtual. For small values of relative momenta of particles in the initial and final states and small value of transfer momentum $t$ between muon and proton, the transition amplitude presented in \eqref{eq:a1} takes a simple form \begin{equation} \label{eq:a1a} T^{\mu\nu\alpha}=8\pi i\alpha\varepsilon_{\mu\nu\alpha\tau}k^\tau k^2 F^{(0)}_{AV\gamma^\ast\gamma^\ast}(t^2,k^2,k^2), \end{equation} where $k=k_1=-k_2$. To extract HFS part of the interaction in the case of the S-states the following projection operators are used for states with spin S=0 and S=1 \cite{apm2002}: \begin{equation} \label{eq:5} \hat\Pi_{S=0}[u(0)\bar v(0)]_{S=0}=\frac{1+\gamma^0}{2\sqrt{2}}\gamma_5,~~~~~ \hat\Pi_{S=1}[u(0)\bar v(0)]_{S=1}=\frac{1+\gamma^0}{2\sqrt{2}}\hat\varepsilon, \end{equation} where $\varepsilon^\mu$ is the polarization vector of $^3S_1$ state. The amplitude of the muon-proton interaction presented in Fig.~\ref{fig1} (right) has the following structure: \begin{equation} \label{eq:c1} i{\cal M}=[\bar l (q_1)\Gamma_\alpha^{(\mu)} l (p_1)]{\cal D}^{\alpha\beta}(t) [\bar N(p_2)\Gamma_\beta^{(p)} N(q_2)], \end{equation} where the vertex operator in the proton line is fixed by the Hamiltonian of nucleon-axial-vector meson interaction \begin{equation} H_I(a_{1NN})=g_{a_1NN}\bar N {\mathstrut\bm\tau}\gamma_\mu\gamma_5N {\bf a}_1^\mu, \end{equation} for $a_1$ exchange and \begin{equation} H_I(f_{1NN})=g_{f_1NN}\bar N\gamma_\mu\gamma_5N f_1^\mu \end{equation} for $f_1$ exchange. The vertex operator in the lepton line $\Gamma_\alpha^{(\mu)}$ is fixed by the integration over $k$ in photonic loop, and ${\cal D}^{\alpha\beta}(t)$ is the axial-vector meson propagator. It is easy to show that \begin{equation} \Gamma_\alpha^{(\mu)}\sim \gamma_\alpha\gamma_5, \end{equation} and using the relations \cite{Anselmino:1994gn} \begin{equation} \bar N (P,S_p)\gamma_\tau\gamma_5N(P,S_p)=2S_p^\tau ,\ \ \bar l (q,S_\mu)\gamma_\tau\gamma_5l(q,S_\mu)= 2S_\mu^\tau , \end{equation} one can see that the interaction \eqref{eq:c1} contains the spin-spin interaction, ${\cal M}\sim {\bf S}_p {\bf S}_\mu $ which contributes to hyperfine splitting. Performing the projection of the amplitude \eqref{eq:c1} to the two particle states with the help of \eqref{eq:5}, we obtain that the numerator of the one-meson exchange amplitude (see Fig.~\ref{fig1} (right)) contains a trace of the product of the Dirac gamma-matrices and numerous convolutions by the Lorentz indices: \begin{equation} \label{eq:a3} {\cal N_A}=8\pi i\alpha\varepsilon_{\rho\sigma\tau\alpha}g^{\mu\rho}g^{\nu\sigma}k^\tau k^2 g^{\alpha\beta}F^{(0)}_{AV\gamma^\ast\gamma^\ast}(t^2,k^2,k^2)g_{AVNN} \times \end{equation} \begin{displaymath} Tr\left[ (\hat q_1+m_\mu)\gamma^\nu(\hat p_1-\hat k+m_\mu)\gamma^\mu(\hat p_1+m_\mu)\frac{1+\gamma_0}{2\sqrt{2}} \hat\varepsilon(\hat p_2-m_p)\gamma_\beta \gamma_5(\hat q_2-m_p)\hat\varepsilon^\ast\frac{1+\gamma_0}{2\sqrt{2}} \right], \end{displaymath} where $p_{1,2}$ ($q_{1,2}$) are initial (final) momenta of the muon and proton. For the case of spin zero state the substitution $\hat\varepsilon\to \gamma_5$ should be done in \eqref{eq:a3}. Introducing the total and relative momenta of particles in the initial and final states $p=(0,{\bf p})$ and $q=(0,{\bf q})$, and taking into account their smallness in the bound state ($|{\bf p}|\sim\mu\alpha$, $|{\bf q}|\sim\mu\alpha$) ($\mu$ is the reduced mass), we can obtain the leading order contribution to ${\cal N_A}$ which does not have terms proportional to the powers of transfer momentum $t=p-q$. Our result for hyperfine part of the potential is the following: \begin{equation} \label{eq:a4} \Delta V^{hfs}_{AV}({\bf p}-{\bf q})=-\frac{32\alpha^2g_{AVpp}}{3\pi^2({\bf t}^2+M^2_A)} \int id^4k \frac{(2k^2+k_0^2)}{k^2(k^2-2m_\mu k_0)}F^{(0)}_{AV\gamma^\ast\gamma^\ast}(0,k^2,k^2). \end{equation} After an analytical integration in \eqref{eq:a4} over angular variables more simple formula for the potential can be obtained: \begin{equation} \label{eq:a5} \Delta V^{hfs}_{AV}({\bf p}-{\bf q})=-\frac{32\alpha^2g_{AVpp}}{3\pi^2({\bf t}^2+M^2_A)} \int\limits_0^\infty d k^2 L_\mu(k^2) F^{(0)}_{AV\gamma^\ast\gamma^\ast}(0,k^2,k^2), \end{equation} \begin{displaymath} L_\mu(k^2) =\frac{\pi^2}{8m_\mu^4}\left[ k^2 (k^2 - 6 m_\mu^2) - (k^2 - 8 m_\mu^2) \sqrt{k^2(k^2 + 4 m_\mu^2)}\right], \end{displaymath} where the kernel $L_\mu(k^2)$ behaves as $\sim2\pi^2\sqrt{k^2}/m_\mu$ for small $k^2$ while the asymptotic value for large $k^2$ is $9\pi^2/4$. Therefore $L_\mu(k^2)$ effectively suppresses the region of small $k^2$. \section{Model estimations} One of the main ingredients in \eqref{eq:a4} is the form factor of transition of $1^{++}$ meson to two photons $F_{AV\gamma^\ast\gamma^\ast}(t^2,k^2,k^2)$. Unfortunately, at present we have only few experimental data on it \cite{L3C,L3Ca,aihara}. In the paper \cite{L3C} of the L3 Collaboration the reaction $e^+e^- \to e^+e^-\gamma^\ast\gamma^\ast \to e^+e^-f_1(1285)\to e^+e^- \eta \pi^+\pi^-$ was studied and $f_1(1285)$ transition form factor was measured for the case when one of the photons is real and another one is virtual. In \cite{L3Ca} the production of $f_1(1420)$ was investigated by the same Collaboration in the reaction $\gamma^\ast\gamma^\ast\rightarrow K_S^0K^{\pm}\pi^\mp$. Using these data, we can parameterize the transition form factor for the case of two photons with equal virtualities as \begin{equation} \label{eq:n1} F^{(0)}_{AV\gamma^\ast\gamma^\ast}(M_{A}^2,k^2,k^2)=F^{(0)}_{AV\gamma^\ast\gamma^\ast}(M_{A}^2,0,0)F^2_{AV}(k^2), \end{equation} where \begin{equation} \label{eq:n16} F_{AV}(k^2)=\frac{\Lambda_A^4}{(\Lambda_A^2-k^2)^2}. \end{equation} It should be mentioned that in comparison with the case of light $\pi^0$ exchange, the effects of off-shellness for the exchange by massive $f_1$ mesons might be important. The effect of off-shellness was investigated in \cite{dorokhov1,dorokhov3}, and in \cite{ls} a simple parametrization was proposed. The simplest way to take it into account is to introduce an exponential suppressive factor \cite{ls}: \begin{equation} \label{eq:n6} \frac {F^{(0)}_{AV\gamma^\ast\gamma^\ast}(t^2,0,0)} {F^{(0)}_{AV\gamma^\ast\gamma^\ast}(M_{A}^2,0,0)} \approx e^{(t^2-M_{A}^2)/M_{A}^2}, \end{equation} which gives the factor $\sim e^{-1}$ for $t^2\approx 0$. The values of the form factors in \eqref{eq:n1} for the case of $f_1(1285)$ and $f_1(1420)$ can be fixed from the L3 data using the relations given by the nonrelativistic quark model \cite{Pascalutsa:2012pr}: \begin{equation} \label{eq:n7} F^{(0)}_{AV\gamma^\ast\gamma^\ast}(M_{A}^2,0,0)=-F^{(1)}_{AV\gamma^\ast\gamma^\ast}(M_{A}^2,0,0) \end{equation} and \begin{equation} \label{eq:n8} \tilde\Gamma_{\gamma^\ast\gamma^\ast}(AV)=\frac{\pi\alpha^2M^5_{A}}{12}[F^{(1)}_{AV\gamma^\ast\gamma^\ast}(M_{A}^2,0,0)]^2, \end{equation} where $\tilde\Gamma_{\gamma^\ast\gamma^\ast}(AV)$ is the decay width of axial-vector meson. We would like to mention that according to the nonrelativistic quark model the sign of $F^{(0)}_{AV\gamma^\ast\gamma^\ast}(M_{A}^2,0,0)$ should be positive \cite{cahn}. Finally, we obtain from the L3 data: \begin{eqnarray} \label{eq:n9} &&F^{(0)}_{f_1(1285)\gamma^\ast\gamma^\ast}\left(M_{f_1(1285)}^2,0,0\right)=(0.266 \pm 0.043)~\mathrm{GeV}^{-2}, \nonumber\\ &&F^{(0)}_{f_1(1420)\gamma^\ast\gamma^\ast}\left(M_{f_1(1420)}^2,0,0\right)=(0.193 \pm0.041)~\mathrm{GeV}^{-2}. \end{eqnarray} The value of form factor $ F^{(0)}_{f_1(1285)\gamma^\ast\gamma^\ast}(M_{f_1(1285)}^2,0,0)$ can be estimated also within nonrelativistic quark model \cite{cahn} using the relation \begin{equation} \label{eq:n2} F^{(0)}_{f_1\gamma^\ast\gamma^\ast}(M_{f_1}^2,0,0)=24<e_q^2>R'(0) \frac{\sqrt{2}}{\sqrt{\pi}M_{A}^{9/2}}, \end{equation} where $R'(0)$ is the derivative of the radial wave function at the origin, $<e_q^2>$ is effective quark charge squared in the bound state. For the isospin $I=1$ state $(u\bar u-d\bar d)/\sqrt{2}$ ($a_1$ meson) we have $<e_q^2>=\sqrt{2}/6$, and for the isosinglet state $(u\bar u+d\bar d)/\sqrt{2}$ ($f_1$ meson) $<e_q^2>$=$5\sqrt{2}/18$. The value of $R'(0)$ can be estimated from the decay width $f_2(1270)\to\gamma+\gamma$ \cite{PDG} $3.034$~keV by means of the expression \begin{equation} \label{eq:n2} \Gamma(f_2(1270)\to\gamma^\ast\gamma^\ast)=\frac{576}{5}\alpha^2<e_q^2>\frac{|R'(0)|^2}{M_A^4}, \end{equation} assuming that the radial wave functions for $f_1(1285)$ and $f_2(1270)$ at the origin are the same. The equation \eqref{eq:n2} leads to $R'(0)\approx 0.099~GeV^{5/2}$ and \begin{equation} \label{eq:n10} F^{(0)}_{f_1(1285)\gamma^\ast\gamma^\ast}(M_{f_1(1285)}^2,0,0)\approx 0.240~GeV^{-2}, \end{equation} which is very close to the L3 value \eqref{eq:n9}. Therefore, one can believe that nonrelativistic quark model describes the dynamics of axial-vector mesons rather well. However, below we will use the L3 value for $F^{(0)}_{f_1(1285)\gamma^\ast\gamma^\ast}$ form factor to decrease the dependence of our predictions from the model. Unfortunately, there is no data for $a_1(1260)$ meson production in $\gamma^\ast\gamma^\ast$ collisions. We estimate $F^{(0)}_{a_1\gamma^\ast\gamma^\ast}(M_{a_1}^2,0,0)$ using the diagram presented in Fig.~\ref{fig2} and introducing the value of quark-meson couplings $g_{a_1qq}$ and $g_{f_1qq}$. The chiral symmetry gives the relation $g_{a_1qq}=g_{f_1qq}$ (see, for example \cite{Osipov:2017ray}). Finally, the ratio of $a_1(1260)$ and $f_1(1285)$ form factors in this case should be equal to the ratio of the effective quark charges squared for $f_1(1285)$ and $a_1(1260)$: \begin{equation} \label{eq:ratio} \frac{F^{(0)}_{a_1(1260)\gamma^\ast\gamma^\ast}(M_{a_1(1260)}^2,0,0)}{F^{(0)}_{f_1(1285)\gamma^\ast\gamma^\ast}(M_{f_1(1285}^2,0,0)} \approx \frac{3}{5}. \end{equation} Then we obtain from \eqref{eq:n9} and \eqref{eq:ratio}: \begin{equation} \label{a1ff} F^{(0)}_{a_1(1260)\gamma^\ast\gamma^\ast}(M_{a_1(1260)}^2,0,0)\approx 0.160~ GeV^{-2}. \end{equation} Our potential \eqref{eq:a5} of hyperfine interaction can be rewritten in the form: \begin{equation} \label{eq:a15} \Delta V^{hfs}_{AV}({\bf p}-{\bf q})=-\frac{32\alpha^2g_{AVpp}F^{(0)}_{AV\gamma^\ast\gamma^\ast}(0,0,0)} {3\pi^2({\bf t}^2+M^2_A)}I\left(\frac{m_\mu}{\Lambda_A}\right), \end{equation} where $I\left({m_\mu/\Lambda_A}\right)$ is a convolution of the kernel $L_\mu(k^2)$ and form-factor $F^2_{A}(k^2)$ which are dependent on the muon mass $m_\mu$ and hadron scale $\Lambda_A$ correspondingly ($a_\mu=2m_\mu/\Lambda_A$): \begin{equation} \label{eq:a6b} I\left(\frac{m_\mu}{\Lambda_A}\right)=-\int\limits_0^\infty d k^2 L_\mu(k^2) F^2_{A}(k^2)= -\frac{\pi^2\Lambda_A^2}{4(1-a_\mu^2)^{5/2}}\left[3\sqrt{1-a_\mu^2}-a_\mu^2(5-2a_\mu^2)\ln\frac{1+\sqrt{1-a_\mu^2}}{a_\mu}\right]. \end{equation} Making the Fourier transform of \eqref{eq:a15} and averaging the obtained expression with the wave functions of the $1S$ and $2S$ states, we obtain the following contribution to hyperfine splitting coming from the axial-vector exchange: \begin{equation} \label{eq:a6} \Delta E^{hfs}_{AV}(1S)=\frac{32\alpha^5\mu^3g_{AVpp}F^{(0)}_{AV\gamma^\ast\gamma^\ast}(0,0,0) } {3M_A^2\pi^3 \Bigl(1+\frac{2W}{M_A}\Bigr)^2}I\left(\frac{m_\mu}{\Lambda_A}\right), \end{equation} \begin{equation} \label{eq:a6a} \Delta E^{hfs}_{AV}(2S)=\frac{2\alpha^5\mu^3g_{AVpp}F^{(0)}_{AV\gamma^\ast\gamma^\ast}(0,0,0) \left(2+\frac{W^2}{M_A^2}\right)} {3M_A^2\pi^3 \Bigl(1+\frac{W}{M_A}\Bigr)^4}I\left(\frac{m_\mu}{\Lambda_A}\right), \end{equation} where $W=\mu \alpha$ and $\mu$ is the reduced mass. For numerical estimate we fix the slope of form factors according to the L3 data to $\Lambda_{f_1(1285)}=1.040\pm 0.078$ GeV \cite{L3C} and $\Lambda_{f_1(1420)}=0.926\pm 0.078$ GeV \cite{L3Ca}, and assume that $\Lambda_{a_1(1260)}\approx \Lambda_{f_1(1285)}$. Unfortunately, there is no direct experimental data on the value of axial-vector meson couplings to the quarks and proton. Therefore, we estimate them using nonrelativistic quark model with chiral symmetry. One of the examples of such model is the NJL model \cite{Osipov:2017ray}. Within this model the form factor of $f_1(1285)$ meson can be obtained by the calculation of triangle diagram presented in Fig.~\ref{fig2}: \begin{equation} \label{eq:anomaly} F^{(0)}_{f_1(1285)\gamma^\ast\gamma^\ast}(M_{f_1(1285)}^2,0,0)=\frac{5g_{f_1(1285)qq}}{72\pi^2m^2}, \end{equation} where m is the dynamical quark mass related to the spontaneous chiral symmetry breaking. Another couplings are related to each others by using chiral symmetry and $SU(6)$-model for wave function of the proton as follows: \begin{equation} \label{eq:coupl1} g_{a_1(1260)qq}=g_{f_1(1285)qq}, ~~~g_{f_1(1285)pp}=g_{f_1(1285)qq}, ~~~g_{a_1(1260)pp}=\frac{5}{3}g_{f_1(1285)qq}. \end{equation} In the most versions of quark models which are used in hadron spectroscopy, the value of quark mass is in the interval $m\sim 0.25\div 0.35$ GeV. At the central value $m=0.300$ GeV we get the following couplings: \begin{equation} \label{eq:coupl2} g_{a_1(1260)qq}=g_{f_1(1285)qq}=g_{f_1(1285)pp}=3.40\pm 1.19, ~~~g_{a_1(1260)pp}=5.67\pm 1.98. \end{equation} The error in determining the interaction constants, which is at least 35 percent, is written out directly in \eqref{eq:coupl2}. In the case of $f_1(1420)$ meson one should take into account the singlet-octet mixing effects \cite{L3Ca},\cite{Close:1997nm}. The estimation given in \cite{Close:1997nm} shows that the wave function of this meson in flavour space is equal \begin{equation} f_1(1420)\approx |s\bar s>+\delta|n\bar n>, \label{f11420} \end{equation} where $n\bar n=\frac{1}{\sqrt{2}}(u\bar u+d\bar d)$ and $\delta\approx 0.4\div 0.5 $. Therefore, for the proton wave function in the OZI limit one can neglect the interaction of strange component of $f_1(1420)$ with proton and obtain the following estimation: \begin{equation} g_{f_1(1420)pp}\approx 1.36\div 1.70. \label{f11420coupl} \end{equation} The central value $g_{f_1(1420)pp}=1.51$ is taken for numerical estimate. Our results for the contribution of the axial-vector mesons to HFS are presented in Table~\ref{tb1}. For the case of both $1S$ and $2S$ states, the summary contribution of axial-vector meson exchanges is more than an order of magnitude greater than the contribution of pseudoscalar mesons and very important to obtain the total value of the HFS with high precision. We can use the obtained expressions \eqref{eq:a6}-\eqref{eq:a6a} to estimate the similar contribution to the hyperfine structure of electronic hydrogen. In the case of the 1S state, the total contribution of the axial vector mesons $f_1$, $a_1$ is about 0.8 kHz, which is comparable with the error in calculating the contribution to the proton polarizability \cite{fm2002}. \begin{table}[h] \caption{\label{tb1} Axial-vector meson contributions to hyperfine structure of muonic hydrogen.} \bigskip \begin{tabular}{|c|c|c|c|c|c|c|} \hline AV meson & $I^G(J^{PC})$ & $\Lambda_A$ & $g_{AVpp}$& $F^{(0)}_{AV\gamma^\ast\gamma^\ast}(0,0)$ & $\Delta E^{hfs}(1S)$ & $\Delta E^{hfs}(2S)$ \\ & & in GeV & & in GeV$^{-2}$ & in meV & in meV \\ \hline $f_1(1285)$ & $0^+(1^{++})$ & 1.040&3.40 & 0.266 &$-0.0090\pm 0.0033$ & $-0.0011\pm 0.0004$ \\ \hline $a_1(1260)$ & $1^-(1^{++})$ &1.040 &5.67 & 0.160 & $-0.0094\pm 0.0038$ &$-0.0012\pm 0.0005$ \\ \hline $f_1(1420)$ & $0^+(1^{++})$ &0.926 &1.51 & 0.193 & $-0.0019\pm 0.0011$ & $-0.0002\pm 0.0001$ \\ \hline \end{tabular} \end{table} \section{Conclusion} A new important contribution to the muon-nucleon interaction is discovered. It is determined by the effective axial-vector meson exchange induced by anomalous axial-vector meson vertex with two photon state. The contribution of this exchange to hyperfine structure of muonic hydrogen is calculated in the framework of quasipotential method in quantum electrodynamics and with the use of the technique of projection operators on states of two particles with a definite spin. It is shown that this contribution is large and should be taking into account for the interpretation of new data on HFS in muonic hydrogen. As has been mentioned above the CREMA Collaboration measured two transition frequencies in muonic hydrogen for the 2S triplet state $(2P_{3/2}^{F=2}-2S_{1/2}^{F=1})$ and for the 2S singlet state $(2P_{3/2}^{F=1}-2S_{1/2}^{F=0})$ \cite{crema2}. From these measurements it is possible to extract the value of hyperfine splitting of the $2S$ level. The obtained value $\Delta E^{hfs}_{exp}(2S)=22.8089(51)$ meV allows to get the value of the Zemach radius with accuracy $3.4~\%$ $r_Z=1.082(31)^{exp}(20)^{th}$ with the help of following relation: $\Delta E^{hfs}_{th}=22.9843(15)-0.1621(10) R_Z$. This is in the agreement with another numerical values $r_Z=1.086(12)$ fm \cite{p1}, $r_Z = 1.045(4)$ fm \cite{p2}, $r_Z = 1.047(16)$ fm \cite{p3}, $r_Z = 1.037(16)$ fm \cite{p4} obtained from electron-proton scattering and from hydrogen and muonium spectroscopy. At present the theory estimates of hadronic corrections to the 1S hyperfine splitting in muonic hydrogen are known with a precision near 400 ppm \cite{crema3} (see more detailed analysis in a recent paper \cite{tomalak}). We should emphasize that the changing the theoretical value of the HFS on 0.001 meV leads to the changing of the Zemach radius on 0.006 fm. Therefore, our contribution coming from axial-vector meson exchange leads to new value of the radius $R_Z=1.067(37)$ fm, which is greater in the comparison with most listed results but still agree with them within errorbars. The CREMA Collaboration have performed successively several experiments with muonic hydrogen. In the first experiment of 2010 \cite{crema1}, the frequency of a single $2P_{3/2}^{F=2}-2S_{1/2}^{F=1}$ transition was measured. To extract a new value of the proton charge radius in this case, there was used the theoretical expression for the hyperfine splitting of the 2S-level in the form: \begin{equation} \label{eq:ls} \Delta E_{th}(2P_{3/2}^{F=2}\div 2S_{1/2}^{F=1})=209.9779(49)-5.2262 r_p^2+0.0347 r_p^3. \end{equation} Since in this paper we are just calculating the hyperfine structure of the spectrum, our result could be related to the correction of the proton charge radius. But already in the experiment of 2013 \cite{crema2} two transition frequencies were measured, which made it possible to find the experimental value of the hyperfine splitting of the 2S-level. The theoretical result was used for the hyperfine structure of the P-levels. Since the hyperfine splitting of the 2S-level can now be considered fixed from the experiment and used further, the theoretical contribution to the HFS obtained in this paper does not lead to a change in the proton charge radius, which remains equal to $r_p=0.84087(39)$ fm \cite{crema2} and differs from the value recommended by CODATA-2014, $r_p=0.8751(61) $ fm \cite{Mohr:2012tt}, based on H spectroscopy and electron-proton scattering. There are a number of uncertainties related to the main used parameters, among which the key role are played by the value of form factor $F^{(0)}_{AV\gamma^\ast\gamma^\ast}(0,0)$ (or $R'(0)$) and coupling constants $g_{AVpp}$. The errors in determining the parameters $\tilde\Gamma_{\gamma \gamma} $ and $ \Lambda_A $, through which $R'(0)$ is expressed, are $25~\% $ and $ 8~\% $, respectively. Another error of about $35~\% $ for the mesons $f_1(1285) $, $ a_1(1260 $) and $ f_1(1420) $ is related to the magnitude of the interaction constants of the axial vector mesons with the nucleon. Therefore, from the experimental data and model approximations for constructing the transition form factor and the interaction potential of particles, we estimate the error in calculating the contribution of the axial vector mesons $ f_1 (1285) $ to $ 35~\% $, $ a_1(1260)$ to $ 40~\% $, and the meson $ f_1(1420) $ in $ 60~\% $. All theoretical errors are directly indicated in Table~\ref{tb1}. It is necessary to mention that our estimations are mainly based on the data of the L3 Collaboration on the transition form factors of the axial vector mesons in photon-photon interaction. These data are restricted by rather small kinematical region. A new, more detailed measurements of these form factors are urgently needed. Such type experiment is possible, for example by the BESIII and BELLEII Collaborations. We also believe that it is important to investigate this new contribution to the hyperfine structure of the muonic deuterium and muonic helium. In this case it might be even possible to separate contributions coming from $a_1$ and $f_1$ mesons due to different isospin structure of these nuclei. The research in this direction is in progress. \begin{acknowledgments} The authors are grateful to R.~Pohl for careful reading of our manuscript and useful remarks. The work is supported by Russian Science Foundation (grant No. RSF 15-12-10009) (A.E.D.), the Chinese Academy of Sciences visiting professorship for senior international scientists (grants No. 2013T2J0011) (N.I.K.) and President's international fellowship initiative (Grant No. 2017VMA0045) (A.E.R.), Russian Foundation for Basic Research (grant No. 16-02-00554) (A.P.M., F.A.M.). \end{acknowledgments}
\section{Introduction} \label{sec:intro} Small dust particles are ubiquitous in many different astrophysical bodies ranging from planetary and cometary atmospheres, zodiacal clouds, planetary rings to debris disks and protoplanetary systems. The way those small particles scatter and absorb stellar light affects the thermal structure of the body under study and subsequently its chemical and dynamical properties. The spectral dependence of light scattered by those particles is widely used for retrieving the physical properties of the grains and their spatial distribution. Dust grains in planetary atmospheres (\citet{rages1983}, \citet{tomasko1999}, \citet{wolff2010}), debris and protoplanetary disks (\citet{weinberger1999}) usually produce strong forward scattering and nearly a flat dependence of the scattering angle at side- and back-scattering regions. This seems to indicate the presence of compact and/or aggregate dust grains with sizes ranging from sub-micron up to tens of microns. Those findings are in agreement with laboratory measurements of cosmic dust analogues (\citet{volten2006}, \citet{volten2007}, \citet{laan2009}, \citet{munoz2012}, \citet{dabrowska2015}). There are some astronomical observations that indicate the presence of millimeter-sized cosmic dust grains. Such is the case of comet 67P/Churyumov-Gerasimenko, target of the ESA Rosetta mission. Main conclusions from the GIADA (Grain Impact Analyser and Dust Accumulator) instrument provide a scenario in which we can find compact particles with sizes ranging from 0.03 mm up to 1 mm and fluffy aggregates from sub-micron up to 2.5 mm (\citet{fulle2015}). Moreover, pre-perihelion observations of the OSIRIS (Optical, Spectroscopic, and Infrared Remote Imaging System) cameras indicate that dust optical scattering is dominated by 100 $\mu$m to millimeter-sized grains (\citet{rotundi2015}). Apart from comets, circumstellar disks also can host large cosmic dust grains (e.g. \citet{andrews2005}, \citet{canovas2015}, \citet{kataoka2016}, \citet{canovas2016}). Interesting case studies related to circumstelar disks are reported by \citep{kalas2005} and \citet{milli2017} for dust orbiting Fomalhaut and HR 4796A, respectively. HST imaging of Fomalhaut shows that a very small fraction of the stellar light is scattered into our line of sight. Moreover, the phase function at side- and back-scattering regions increases with the scattering angle \citep{lebouquin2009}. A similar behavior has been recently reported by \citet{milli2017} for the HR 4796A dust ring. This scattering behavior could be caused by the presence of large grains; r $\geq$ 100 $\mu$m in the Fomalhaut, and r$\sim$ 30 $\mu$m in the HR 4796 A dust rings, respectively (\citet{min2010}, \citet{milli2017}). Subsequent analysis of far-infrared images of Fomalhaut obtained with the Herschell Space Observatory (\citet{acke2012}) indicates that the belt around Fomalhaut could consist of fluffy aggregates. The main reason is that large compact grains do not have the thermal properties needed to explain the far-infrared images. On the contrary, fluffy aggregates consisting of small monomers could have the absorption properties of small grains showing the scattering anisotropy of large particles. Still, simulated phase functions of fractal aggregates (e.g. \citet{bertini2007}, \citet{misha2007}, \citet{moreno2007}, \citet{okada2008}, \citet{min2016}) and experimental phase functions of aggregates with sizes larger than the wavelength of the incident light (\citet{volten2007}), provide a strong diffraction spike but do not reproduce the observed slope of the phase function at side- and back-scattering angles. We might note that numerical scattering simulations of fractal aggregates are limited to sizes of the order or slightly larger than the wavelength of the incident light. Therefore, the solution of the problem remains unclear. Those are examples that illustrates that the retrieval of the physical characteristics of cosmic dust grains from the observed scattered light is far from trivial. If the dust cloud of interest consists of spherical particles we can perform computations without any restriction about the size or composition by means of the Lorenz-Mie theory (\citet{vandehulst1957}). However the scattering properties of irregular cosmic dust grains can differ dramatically from those of equivalent spheres. Due to their complicated morphology in most of the cases computations for polydisperse cosmic dust grains have to be replaced by simplified models such as spheroids (\citet{misha1997}, \citet{kim1995}), or hollow spheres \citep{min2005}. Experimental data should then be used to validate the computational results. Computations for dust grains of arbitrary shapes are more complicated and limited to particles with sizes comparable to the wavelength \citep{mackowski2011}. Thus, controlled laboratory experiments of light scattering by cosmic dust grains covering different size ranges, shapes and compositions remain an indispensable tool to study the scattering behavior of irregular dust grains. In this work we present the measured phase functions for three different types of millimeter-sized cosmic dust grains analogues. This size range is still poorly studied due to the limitations of the numerical codes and technical difficulties related to the experiments. The paper is organized as follows: in Section~\ref{sec:theory} we summarize the main concepts of light scattering providing a description of the experimental apparatus in Section~\ref{sec:setup}. Test measurements regarding the reliability of the experimental data are presented in Section~~\ref{sec:test}. In Sections~\ref{sec:samples} and \ref{sec:results}, we describe the physical characteristics of the dust grains and experimental phase functions, respectively. Finally, we summarize our results in Section~\ref{sec:conclusions}. \section{The scattering matrix formalism}\label{sec:theory} The flux vector of the light scattered by one particle in a particular orientation, p, is related to the flux vector of the incident beam, ${\pi \bf\Phi_{0}}$ by means of the scattering matrix, ${\bf F^{p}}$, as follows \citep{hovenier2004}: \begin{equation} {\bf\Phi_{det}} = \frac{\lambda^{2}}{4\pi^{2}D^{2}} {\bf F^{p}}{\bf \Phi_{0}}, \end{equation} \noindent where $\lambda$ is the wavelength, and $D$ is the distance between the particle and the detector. Here, {$\pi \bf \Phi_{det}$} is the flux vector at the detector and ${\bf F^{p}}$ is the scattering matrix of the particle in a particular orientation. All elements of ${\bf F^{p}}$ are dimensionless and depend on the physical properties of the particle (size, shape, porosity, surface roughness, and refractive index), and the direction of scattering, i.e., the direction from the particle to the detector. The direction of scattering is defined by the scattering angle, $\theta$, the angle between the directions of propagation of the incident and the scattered beams (0$\leq \theta\leq \pi$), and an azimuth angle, $\phi$, that ranges from 0 to 2$\pi$. In general {\bf $F^{p}$} contains 16 non vanishing elements: \begin{equation} {\bf F^{p}}= \left( \begin{array}{c c c c} F^{p}_{11}& F^{p}_{12} & F^{p}_{13} & F^{p}_{14} \\ F^{p}_{21}& F^{p}_{22} & F^{p}_{23} & F^{p}_{24} \\ F^{p}_{31}&F^{p}_{32}& F^{p}_{33} & F^{p}_{34} \\ F^{p}_{41} & F^{p}_{42} & F^{p}_{43} & F^{p}_{44} \end{array}\right). \end{equation} In the case of a particle in random orientation, all scattering planes are equivalent. Thus, the scattering direction is fully described by the scattering angle $\theta$. Further, for an homogeneous sphere the scattering matrix has only four independent elements that are not identically equal to zero, i.e. it has the form: \begin{equation} {\bf F^{p}}= \left( \begin{array}{c c c c} F^{p}_{11} & F^{p}_{12} & 0 & 0 \\ F^{p}_{12} & F^{p}_{11} & 0 & 0 \\ 0 & 0 & F^{p}_{33} & F^{p}_{34} \\ 0 & 0 & -F^{p}_{34} & F^{p}_{33} \end{array}\right). \end{equation} For unpolarized incident light, the first element of the scattering matrix, $F^{p}_{11}(\theta)$, is proportional to the flux of the scattered light and is called the phase function or the scattering function. \section{Experimental Apparatus} \label{sec:setup} The light scattering measurements have been performed at the IAA COsmic DUst LABoratory (\citet{munoz2010}, \citet{munoz2011}). In this work, the experimental apparatus has been adapted to measure the angular dependence of the flux scattered by a single particle with a size much larger than the wavelength of the incident light. A schematic overview of the experimental apparatus is presented in Figure~\ref{fig:setup}, (a). We use a linearly polarized continuous-wave tunable Argon-Krypton laser tuned at 520 nm. A spatial filter has been used to avoid spatial intensity variations in the laser beam. In this way we assure a homogeneous illumination over the entire particle. The homogeneous beam is collimated by a lens before passing through a polarizer (P) oriented at 45 degrees. The polarized beam is scattered by the particle of interest. This is located on a 2mm conical-tip flat black holder mounted on a x-y rotating table (Figure~\ref{fig:setup}, (b)). A filter wheel (FW) equipped with grey filters of different density is located between the laser and spatial filter. It is operated from the computer so that the flux of the incident beam can be scaled to its most appropriate value for each scattering angle. The unscattered part of the incident beam is absorbed by a beam-stop. Moreover, we use a diaphragm behind the polarizer (P) to control the width of the beam so that only the particle of interest is illuminated and not the holder. The scattered light is detected by a photomultiplier tube (9828A Electron tubes\copyright), the detector. Another photomultiplier tube (the monitor) is located at a fixed position and is used to correct for fluctuations in the laser beam. Both photomultipliers are positioned on a ring with an outer diameter of one meter. Detector and Monitor are mounted on dove tails (dt) so that they can be moved forward and backward. In this case the detector is located at a distance, D, of 62 cm to the particle. The detector moves along the ring in steps of 5 degrees, 1 degree or even smaller if a higher angular resolution is required, covering a scattering angle range from 3 degrees (nearly forward scattering) to 170 degrees (nearly backward scattering). \begin{figure} \gridline{\fig{./esquemalab3.pdf}{0.45\textwidth}{(a)} \fig{./Holdercortapinta.pdf}{0.25\textwidth}{(b)} } \caption{(a): Schematic overview of the experimental light scattering apparatus as seen from above. (b): Photograph of the flat black holder mounted on the x-y rotating table. The N-BK7 glass sphere is located on its conical tip.} \label{fig:setup} \end{figure} \section{Test Measurements} \label{sec:test} The reliability of the measurements is tested by comparing the measured phase function of two calibration spheres to results of Lorenz-Mie calculations for the corresponding size and refractive index. Physical properties of the N-BK7 glass and Sapphire spheres (Edmund Optics) are presented in Table~1. The size of the calibration spheres has been chosen similar to that of our particles of interest. \begin{table}[h!] \label{tab:properties} \renewcommand{\thetable}{\arabic{table}} \centering \caption{Properties of the calibration spheres and cosmic dust grains.} \begin{tabular}{lllc} \hline Composition & diameter (mm) & m=n+ki (520 nm)& \\ \hline N-BK7 & 5.0 & 1.5168+9E-9i & Edmund Optics Catalog \\ Sapphire & 5.0 & 1.77+0i & Edmund Optics Catalog \\ Enstatite & 6.4\footnotemark[1] & 1.58+2E-05i& \citet{dorschner1995}\\ Quartz & 7.8\footnotemark[1] & 1.54+0i & \citet{klein1993} \\ Etna & 7.0\footnotemark[1] & 1.59+0.01i & \citet{ball2015} \\ \hline \footnotetext{diameter of the volume-equivalent sphere.} \end{tabular} \end{table} In Figures \ref{fig:spheres} (a) and (b), we present the measured and calculated phase functions as functions of the scattering angle for the N-BK7 and Sapphire calibration spheres, respectively. The measured and calculated $F_{11}^{p}(\theta)$ are plotted on a logarithmic scale and normalized to 1 at 30 degrees. During the test measurements the detector is moved along the ring in steps of 1 degree. The plotted values corresponding to Lorenz-Mie calculations are averaged over $\pm$ 0.25 degrees according to the angular resolution of the experimental setup. As shown in Figures~\ref{fig:spheres} (a) and (b), the measured phase functions show an excellent agreement with the Lorenz-Mie computations over the entire angle range. Small differences might be caused by small inhomogeneities in the calibration sphere. Moreover, the measured results are strongly dependent on the exact position of the calibration sphere at the center of the measuring ring. \begin{figure} \gridline{\fig{./Figure2_a.pdf}{0.45\textwidth}{(a)} \fig{./Figure2_b.pdf}{0.45\textwidth}{(b)} } \caption{Comparison of phase functions based on the measured data and the Lorenz-Mie computations (solid black) for the N-BK7 (a) and Sapphire (b) calibration spheres (gray circles).} \label{fig:spheres} \end{figure} \section{Dust grains} \label{sec:samples} In this work we study three types of mm-sized grains consisting of enstatite, quartz, and volcanic material from Mount Etna, respectively. The three grains have been chosen so that they would have similar sizes but different absorbing properties. Mount Etna is a quite dark material whereas Enstatite and Quartz present a nearly zero imaginary part of the refractive index at the studied wavelength (527 nm). In this way we can study how absorption affects the measured phase functions. Their physical properties are summarized in Table~1. Moreover, all dust grains present similar sizes as the BK7 and Sapphire spheres used to test the experimental apparatus. In this way we assure a homogeneous illumination over the entire grain. In Figure~\ref{fig:camara} we present optical images of the three dust grains. It is interesting to note that even in the optical images we can distinguish surface roughness. This is in particular the case of the Etna grain that presents the typical structure of vesicular volcanic grains composed of porous material and cratery surfaces \citep{riley2003}. The vesicular structure is produced by gas bubbles that scape when the volcanic melt is cooled to glass. To estimate the scale of the surface roughness of our dust grains in Figures~\ref{fig:ME_Ensta}-\ref{fig:ME_Etna} we present Scanning Electronic Microscope images. As shown the three studied grains present not only intrinsic surface roughness with sizes of the order or smaller than the wavelength of the incident light, but also micron-sized grains that might affect their optical properties (Figures~\ref{fig:ME_Ensta}-\ref{fig:ME_Etna}, top right panels). \begin{figure*}[ht!] \gridline{\fig{./Figure3_a.pdf}{0.3\textwidth}{(a)} \fig{./Figure3_b.pdf}{0.3\textwidth}{(b)} \fig{./Figure3_c.pdf}{0.3\textwidth}{(c)} } \caption{Optical images of Enstatite (a), Quartz (b) and Etna (c) grains. \label{fig:camara}} \end{figure*} \begin{figure*} \gridline{\fig{./Figure4_a.pdf}{0.3\textwidth}{(a)} \fig{./Figure4_b.pdf}{0.3\textwidth}{(b)} \fig{./Figure4_c.pdf}{0.3\textwidth}{(c)} } \caption{Scanning Electronic Microscope images of Enstatite. White bars denote 500 $\mu$m (a), 100 $\mu$m (b), and 10 $\mu$m (c), respectively. \label{fig:ME_Ensta}} \end{figure*} \begin{figure*} \gridline{\fig{./Figure5_a.pdf}{0.3\textwidth}{(a)} \fig{./Figure5_b.pdf}{0.3\textwidth}{(b)} \fig{./Figure5_c.pdf}{0.3\textwidth}{(c)} } \caption{Scanning Electronic Microscope images of Quartz. White bars denote 500 $\mu$m (a), and 50 $\mu$m (b) and (c), respectively. \label{fig:ME_Quartz}} \end{figure*} \begin{figure*} \gridline{\fig{./Figure6_a.pdf}{0.3\textwidth}{(a)} \fig{./Figure6_b.pdf}{0.3\textwidth}{(b)} \fig{./Figure6_c.pdf}{0.3\textwidth}{(c)} } \caption{Scanning Electronic Microscope images of the Etna grain. White bars denote 500 $\mu$m (a), 50 $\mu$m (b), and 10 $\mu$m (c), respectively. \label{fig:ME_Etna}} \end{figure*} \section{Results and discussion} \label{sec:results} In Figure~\ref{fig:stones} we present the measured phase functions for the Enstatite, Etna and Quartz dust grains at 520 nm. The measurements are presented together with the observed phase function of the Fomalhaut dust grains obtained with the Henyey-Greenstein parametrization retrieved by \cite{kalas2005}. The Henyey-Greenstein phase function is constrained to the observable range of the Fomalhaut system. All phase functions are normalized to unity at 30 degrees scattering angle and are presented on a logarithmic scale. The procedure of the measurements is as follows: The detector is moved along the ring in steps of 1 or 5 degrees covering the scattering angle range from 3 to 170 degrees. During the measurements the particles are located on the rotating conical holder shown in Figure~\ref{fig:setup}, (b). A rigorous 3D orientation average could be obtained by a sufficient number of Euler rotations: i. Rotation around the vertical axis, $\alpha$, ii. Rotation around the direction of the laser beam, $\beta$, and iii. Rotation around the axis perpendicular to the base of the particle, $\gamma$. For an optimal performance, $\alpha$ and $\gamma$ should be uniformly distributed while $\beta$ ought to follow a distribution proportional to sin($\beta$) \citep{misha2017}. Such a procedure would require a holder with two degrees of freedom that would significantly complicate the performance of the measurements. Instead, we have assumed a 1-axis orientation average as an approximate solution. This is equivalent to a 3D orientation average in the case that the revolution volume of the particle is symmetrical with regard to the scattering plane. This condition is fulfilled up to a high degree by our cosmic grains as shown in Figure~\ref{fig:camara}. Thus, to simulate random orientation the plotted figures, $F_{11}(\theta)$, are the results of averaging over 36 $F_{11}^{p}(\theta)$, corresponding to 36 different orientations. Starting with a given orientation, a particle is measured after each of 36 successive rotations of 10 degrees. We assume that the number of orientations is sufficient when adding more orientations of the particle on the vertical axis (perpendicular to the direction of the detector) does not affect the final result. Special tests are performed to verify that other directions are irrelevant for such irregular grains. In those tests the position of the grain on the holder is rotated 90 degrees about a horizontal plane. Starting from a given position, the grain was measured after each of two 90 degrees rotation about the vertical axis. It is verified that adding those extra orientations does not affect the final result. In conclusion, taking into account the orientation over the horizontal axis plays no significant role in our experimental results. That is a good indication that the measurements can be considered in random orientation even though strictly speaking the phase function has not been averaged over all possible orientations. In all three measured phase functions we can distinguish two well defined regions. Firstly, soft forward peaks in the 3 to $\sim$20 degrees. Secondly, in the scattering angle range from $\sim$20 to 170 degrees, the three phase functions increase with the scattering angle. This increase is stronger in the case of the two non-absorbing grains, Enstatite and Quartz. For the sizes of our dust grains the ray optics approximation can be used. It is based on the assumption that the incident plane wave can be represented as a collection of independent parallel rays. The rays hitting the particle result in two phenomena i) diffraction, that is constrained into a narrow intensive lobe around the exact forward direction (0 degrees) and ii) reflection and refraction that contribute to the total scattering by the particle \citep{vandehulst1957}. The angular width of the diffraction peak for the size of our dust grains and distance to the detector, D, is of the order of $\pm$0.8 degrees around the exact forward direction that is beyond the measurable angle range of our experiment. Therefore, diffraction by the large grains cannot be responsible for the measured forward peaks. It is known that wavelength-scale surface roughness can significantly affect the scattering properties of dust grains \citep{munoz2007}, \citep{nousiainen2011}, \citep{lindqvist2011}, \citep{escobar2017}. As presented in Figures~\ref{fig:ME_Ensta}-\ref{fig:ME_Etna} our particles are covered not only by various types of surface structures and cavities but also by small particles. Therefore the measured forward peaks in the 3 to $\sim$ 20 degrees scattering angle range might be due to scattering by the wavelength-scale surface roughness and surface micron-sized particles of our grains. As mentioned, at side- and back-scattering regions all measured $F_{11}(\theta)$ increase with the scattering angle. In the case of the Etna grain, that presents a high imaginary part of the refractive index the transmitted part can be ignored and therefore the measured phase function in the $\sim$20-170 degrees region might be due to reflexion on the surface of the particle. That is not the case for the enstatite and quartz grains in which refracted light, after another refraction, may emerge from the particle, contributing to the measured intensity at side- and back-scattering regions producing the measured higher slope of $F_{11}(\theta)$ in the mentioned region. As shown in Figure~\ref{fig:stones}, the empirical phase function of the grains orbiting Fomalhaut lies within the domains occupied by the measured phase functions for the mm-sized non-absorbing and highly absorbing dust grains, respectively. That seems to indicate that the Fomalhaut dust ring could be dominated by very large grains. Several model particles have been suggested to reproduce the HST optical and/or Herschel far-infrared images of the Fomalhaut system. Dust grains should be large enough so that the diffraction spike is narrowly forward peaked and therefore outside of the observable angle range. The analysis of HST optical images performed by \citet{min2010} establishes a lower limit diameter of 100 $\mu$m for the grains in the Fomalhaut dust ring. Further studies including analysis of Herschel far-infrared images add another constraint to the dust grains populating the disk. They should simultaneously scatter light like large grains and absorb and emit like small grains. That calls for more sophisticated model particles such us fluffy aggregates \citep{acke2012} that in principle could fulfill both conditions. In Figure~\ref{fig:stonesdust} we present the experimental phase functions for three different samples of cosmic dust analogues namely, a size distribution of silicate-type compact particles \citep{munoz2007}, a size distribution of fluffy aggregates \citep{volten2007}, and the Etna grain presented in this work. The experimental data are presented together with the retrieved phase function for the Fomalhaut disk grains. The compact sample consists of a silicate dust particles collected in the Sahara desert (Libya). Its refractive index at the measurements wavelength (632.8 nm) is equal to $m=1.5+i0.0004$ similar to that found in enstatite, an iron-free pyroxene \citep{dorschner1995}. Its effective radius, $r_{eff}$, and variance, $v_{eff}$ are equal to 125 $\mu$m and 0.15, respectively. Therefore, the dust grains of this sample show sizes larger than the lower limit established by \citep{min2010}. Further details can be found in \cite{munoz2007}. The aggregate sample was produced in a condensation flow apparatus in an experiment intended to mimic the formation of circumstelar dust. The phase function presented in Figure~\ref{fig:stonesdust} corresponds to a magnesiosilica sample labeled as Aggregate1 in \citep{volten2007}. The measurements are performed at 632.8 nm. The aggregate size is estimated to be of the order 20 $\mu$m with modal grain sizes ranging from 50 nm to 120 nm depending on its composition i.e. it consists of aggregates with sizes similar to those estimated for the grains populating the HR 4796A dust ring. A detailed description of the sample is provided in \citep{volten2007}. The measured phase function for the compact and aggregate samples are freely available in the Amsterdam-Granada light scattering database (www.iaa.es/scattering) under request of citation of \citep{munoz2012} and the paper in which the data were published. As shown in Figure~\ref{fig:stonesdust}, both the compact and aggregate samples produce a narrow diffraction spike compatible with the HST Fomalhaut images. However, in both cases the measured phase functions decrease at side-scattering angles showing a nearly flat dependence in the scattering angle range from 90 to 177 degrees. This seems to be a general trend for irregular dust particles with sizes ranging from sub-micron up to hundred microns \citep{munoz2012}. That behavior does not agree with the observed slope of the phase function for Fomalhaut and HR 4796A grains. On the contrary, the phase function for the millimeter-sized Etna grain shows a nearly perfect fit to the observations. That seems to support the hypothesis that the Fomalhaut and HR 4796A dust rings could be dominated by dust grains significantly larger than hundred microns. In the case of Fomalhaut, those large grains should present a fractal structure to mimic the observed far-infrared spectra. However, it is not clear yet if such large aggregates can reproduce the observed phase function. Unfortunately, computations for aggregates are limited to sizes significantly smaller than the size of the grains expected to be in protoplanetary and debris disks as the finding of the Rosetta mission indicate (e.g. \citep{fulle2015}, \citep{rotundi2015}, \citep{hilchenbach2016}, \citep{mannel2016}). Even with ever-increasing algorithms sophistication, light scattering computations for dust grains of arbitrary shapes are still limited to particles with sizes comparable to the wavelength \citep{mackowski2011}. Thus, further experimental phase functions of millimeter-sized aggregates consisting of micron-sized monomers are needed to know if such large aggregates could produce the observed slopes of the phase functions in the Fomalhaut and HR 4796A dust rings. \begin{figure} \begin{center} \rotatebox{0}{ \resizebox{0.8\textwidth}{!} { \includegraphics{./Figure7.pdf} }} \caption{Experimental phase functions at 520 nm for Quartz (filled circles), Enstatite (filled squares), and Etna (triangles). The observed phase function of the Fomalhaut disk grains from \citet{kalas2005} is also shown. All phase functions are normalized to unity at 30 degrees. Errors are indicated by error bars or are within the symbols. \label{fig:stones}} \end{center} \end{figure} \begin{figure} \begin{center} \rotatebox{0}{ \resizebox{0.8\textwidth}{!} { \includegraphics{./Figure8.pdf} }} \caption{Experimental phase functions for the Etna dust grain (r=3.5mm) triangles, compact particles (r$_{eff}$=124.75 $\mu$m) \citep{munoz2007}, and micron-sized fluffy aggregates (circles) \citep{volten2006}. The observed phase function of the Fomalhaut disk grains from \citet{kalas2005} is also shown. All phase functions are normalized to unity at 30 degrees. Errors are indicated by error bars or are within the symbols.}\label{fig:stonesdust} \end{center} \end{figure} \section{Conclusions} \label{sec:conclusions} We present the experimental phase function of three millimeter-sized cosmic dust analogues. The measurements are performed at 520 nm covering the scattering angle range from 3 to 170 degrees. The reliability of the experimental apparatus has been tested by comparison of the measured phase function of two calibration spheres from Edmund Optics with Lorenz-Mie computations for the corresponding size and refractive index. The three studied grains consists of enstatite, quartz and volcanic material from Mount Etna. In all studied cases the measured phase functions show two well defined regions: i) a soft forward peak and ii) a continuous increase with the scattering angle at side- and back-scattering regions. That increase is stronger in the case of the non-absorbing grains, namely enstatite and quartz. Experimental data presented in this work indicate that the scattering in the disk around Fomalhaut and HR 4796A could be dominated by large irregular cosmic dust grains. In the case of Fomalhaut, the combination of this conclusion with that based on the analysis of the far-infrared spectra as reported by \citet{acke2012}, would drive us to a model of dust grains consisting of fractal aggregates with sizes significantly larger than the wavelength of the incident light. Such large particles are in agreement with last findings obtained for comet 67P/Churyumov-Gerasimenko, target of the ESA Rosetta mission (e.g. \citep {fulle2015}, \citep{rotundi2015}, \citep{hilchenbach2016}, \citep{mannel2016}). Further experiments and computations with millimeter-sized fluffy aggregates will be needed to draw some conclusions about the fluffy/compact nature of such large dust grains. Polarization laboratory measurements and observations also appear to be a good diagnostic tool for retrieving the nature of such dust grains, since light is on average scattered more within compact particles decreasing the degree of linear polarization \citep{xing1997}. The measured phase functions will be freely available in digital form in the Amsterdam-Granada light scattering database (www.iaa.es/scattering) under request of citation of \citet{munoz2012} and this paper. \acknowledgments Comments of an anonymous referee on an earlier version of this paper are gratefully acknowledge. We are indebted to Roc\'{\i}o M\'{a}rquez from the Scientific Instrumentation center of the University of Granada for providing the SEM images. This work been supported by the Plan Nacional de Astronom\'{\i}a y Astrof\'{\i}sica contracts AYA2015-67152-R and AYA2015-71975-REDT.
\section{Introduction} The initial distribution of stellar masses as the outcome of star formation is a fundamentally important key for understanding the evolution of stellar systems on star-cluster and galaxy scales. Much effort has been invested in constraining the shape and possible variation of the stellar IMF on the star cluster scale, showing an invariant IMF \citep{Scalo1986,Kroupa2001,Chabrier2003,Bastian2010,Kroupa2013,Hopkins2013}, and on the galaxy scale, suggesting an variant IMF \citep{Salpeter1955,Matteucci1990,Vazdekis2003,Hoversten2008,Meurer2009,Lee2009,Gunawardhana2011}. While the theories describing star formation and IMF are neither fully developed nor understood. A successful theory must be consistent with the observations both on star cluster and on galaxy scales and also it needs to be able to make predictions of new phenomena. Here we study a particular approach, the IGIMF theory, developed for calculating galaxy-wide IMFs but starting with the IMF constrained observationally on star-cluster scales. With this semi-empirical approach, we can constrain the star-cluster-scale IMF and galaxy-wide IMF and potentially understand the variations of the IMF in different stellar systems. The IGIMF theory was introduced by \cite{Kroupa2003} where it was called the "field-star IMF". It was originally based on a universal IMF on the star-cluster scale (with later adoption of a systematically varying IMF, see \ref{axiom: IMF} below) and an embedded cluster mass function (ECMF)\footnote{An embedded cluster refers to a correlated star formation event, i.e., a gravitationally-driven collective process of transformation of the interstellar gaseous matter into stars in molecular-cloud overdensities on a spatial scale of about one pc and within about one Myr \citep{Lada2003, Kroupa2013,Megeath2016}. $M_{\mathrm{ecl}}$ is the mass of all stars formed in the embedded cluster.} to generate a variable IGIMF on the galactic scale, leading to a good description in explaining observations, e.g., most recently, \cite{Gargiulo2015, Fontanot2017}. The theory also made the prediction that dwarf galaxies must show a deficit of H$\alpha$ emission relative to UV emission \cite{Pflamm-Altenburg2007,Pflamm-Altenburg2009}. This was verified to be the case \cite{Lee2009}. It is important to know that there is an additional condition for the IGIMF theory to work. That is, one needs to apply a certain sampling method which determines the stellar masses of a stellar system with a given IMF. It has been shown that the IGIMF theory with random unconditional sampling from an IMF is not consistent with observations (e.g. \citealt{Fumagalli2011,Andrews2013,Dib2017} as further discussed in Appendix~\ref{Appendix_mMrelation}). Although the shape of the IMF can be estimated by observations to some extent, the sampling procedure that determines the mass of each generated star in a simulation is another issue. Whether it should be random sampling, deterministic sampling, or somewhere in between needs to be clarified. Evidence collated in \cite{Kroupa2002}; \cite{Kroupa2013} has been indicating that the simplest interpretation of the IMF, the IMF being a probability distribution function from which stars are randomly sampled, may fail to reproduce the observations as the observed IMF power-law index above a few M$_{\odot}$ shows a scatter smaller than random sampling would give (see \citealt{Kroupa2013} their figure 27). \cite{Hsu2012, Hsu2013} shows in addition that there are star-forming regions with large total stellar mass but a significant deficiency in massive stars, which is inconsistent with a stochastic scenario where 1000 small star clusters of 100 M$_{\odot}$ would statistically generate the same stellar population as a single $10^5$ M$_{\odot}$ star cluster. In addition, the recent studies from \cite{Stephens2017} and others (see Fig.~\ref{fig:MmaxMecl} below) support a significant empirical correlation of the maximum stellar mass in a cluster and the mass in stars of an embedded cluster (the $m_{\mathrm{str, max}}$--$M_{\mathrm{ecl}}$ relation). The relation was first indicated by \cite{Weidner2006} and was further discussed in \cite{Weidner2013a}. The author argue that the data disagree with the random sampling with a high confidence. However, there is still a discussion about whether the $m_{\mathrm{str, max}}$--$M_{\mathrm{ecl}}$ relation is consistent with a randomly sampled invariant IMF. Even though it has been shown by \cite{Weidner2014} that the $m_{\mathrm{str, max}}$--$M_{\mathrm{ecl}}$ observations disfavor random sampling, we will discuss this issue in more detail in the future. A further study applying two statistical tests (KS test and standard deviations of the distance between data points) in \citet[in preparation]{Yan2017b} shows that the observations disfavor the scenario of random sampling of stellar masses with a confidence of $4\sigma$. This paper studies a deterministic method called "optimal sampling" introduced by \cite{Kroupa2013}. With this method the IMF is populated smoothly with no Poisson noise which is favored by observations in comparison with random sampling as will be demonstrated in Sec.~\ref{secsub:m_max-M_ecl} below. One counter argument against the optimal sampling scenario is that high-mass stars form only in massive parent clusters according to the optimal sampling. But it appears that about 4\% of the O stars are observed in an isolated state. This disagreement has been lifted since \cite{Gvaramadze2012} show that most known isolated O stars are ejected stars related to a parent cluster and the remaining ones that cannot be traced back to their birth cluster, being very rare cases, are possibly due to the two-step ejection mechanism described by \cite{Pflamm-Altenburg2010}. Recently using the HST, \cite{Stephens2017} specifically looked at 7 massive stars thought previously, from Spitzer observations, to be isolated massive stars in the Large Magellanic Cloud (LMC). All of the 7 stars turn out to be within substantial but compact clusters lying on the $m_{\mathrm{str, max}}$--$M_{\mathrm{ecl}}$ relation, which support \cite{Gvaramadze2012}'s conclusion and statistically disfavors the random drawing scenario. In the present paper, we focus on studying optimal sampling on the galactic scale for the first time. It is worth noting that the mathematical formulation of optimal sampling has been improved by \cite{Schulz2015} (hereafter SPK). We follow the formulation of SPK in this paper even though the original formulation leads to insignificantly different results. The core idea of optimal sampling is not mathematical idealism but to develop a deterministic sampling method that can describe what a self-regulated nature would do to account for the small scatter of the observations. When choosing a sampling method for the numerical initialization of stellar systems, it is most important to consider that the sampled result is consistent with a variety of observations. We will demonstrate later that this is exactly what the OSGIMF model achieves. The paper is organized as follows: In Section \ref{sec:Model}, the assumptions underlying the IGIMF theory and optimal sampling are described. The python module, GalIMF, we developed to simulate the theory is described in Section \ref{sec: galIMF} and make available for general use\footnote{GalIMF version 1.0.0 is available at https://github.com/Azeret/galIMF. See Sec.\ref{sec: galIMF}}. The results from GalIMF are presented in Section \ref{sec:result} and are compared with observations. Sections \ref{sec:discussion} \& \ref{sec:CONCLUSIONS} contain the discussion and conclusions, respectively. \section{Model}\label{sec:Model} \subsection{The IGIMF}\label{sec:Model-IGIMF} The underlying idea of the IGIMF theory is overly simple and realistic which is that the IMFs assembled in star forming regions must add up to the IMF of the whole galaxy, i.e., first a series of embedded star clusters is generated from the ECMF, then a series of stars for each embedded cluster is generated from the IMF, finally, stars from all the clusters are summed up to generate the galaxy-wide IMF. To formulate the IGIMF theory, the following five axioms are assumed (see also \citealt{Recchi2015,Fontanot2017}\footnote{We think there are some typos in \cite{Fontanot2017}. In their equation 5, the number -1.06 should be -0.106; In their equation 6, the number 2.35 should be 2.3 and $10^4$ should be $10^6$. In their equation 7, $M_{\mathrm{cl}}$ will be $M_{\rm ecl}$ in our notation.} for comparison) with notation clarified in Table~\ref{table}. Note that we use different symbols for integration variable and object mass. The integration variable applies to the continuous mass distribution function while the object mass accounts to the discretized sampled mass. \begin{table} \caption{Notation} \label{table} \centering \begin{tabular}{c c c c} \hline\hline Notation & Meaning \\ \hline $m$ & integration variable for stellar mass \\ $m_{\rm max}$ & integration upper limit for stellar mass\\ $m_{\rm min}$ & integration lower limit for stellar mass\\ $m_{\rm str}$ & stellar mass \\ $m_{\rm str,max}$ & most massive stellar mass \\ $M$ & integration variable for star-cluster mass \\ $M_{\rm max}$ & integration upper limit for cluster mass\\ $M_{\rm min}$ & integration lower limit for cluster mass\\ $M_{\rm ecl}$ & embedded star-cluster mass \\ $M_{\rm ecl,max}$ & most massive embedded star-cluster mass \\ $M_{\rm cl}$ & mass of the pre-cluster molecular cloud \\ \hline \end{tabular} \end{table} \begin{enumerate}[leftmargin=0cm,itemindent=0cm,labelwidth=\itemindent,labelsep=0cm,align=left,listparindent=\parindent,label=Axiom \arabic*] \setlength\itemsep{1em} \item \label{axiom: star form in EC} : Every star in the galaxy is generated in an embedded cluster. This assumption is physically plausible because stars form in molecular cloud overdensities which contain much more mass than the mass of the least massive star ($\approx 0.08$ M$_\odot$). This means when a gas cloud collapses to form stars it always forms more than one star, following the particular stellar IMF. Stars in small embedded clusters, e.g., $M_{\mathrm{ecl}}$ less than 50 M$_{\odot}$ or so, will quickly dissolve into the galaxy and may be observed as a distributed young stellar component (e.g. \citealt{Kroupa2003a}). Observations indeed suggest that most and perhaps all the observed stars were formed in embedded clusters \citep{Lada2003, Kroupa2005, Megeath2016}. The properties of galactic-field binary stars also suggest this to be the case \citep{Kroupa1995a, Kroupa1995b}. \item \label{axiom: IGIMF} : We define two functions describing (a) the mass distribution of stars that follows the stellar IMF, $\xi_{\mathrm{\star}}(m) = \mathrm{d}N_{\mathrm{\star}}/\mathrm{d}m$, where $\mathrm{d}N_{\mathrm{\star}}$ is the number of stars with mass in the range $m$ to $m+\mathrm{d} m$, and (b) the embedded cluster mass distribution in the galaxy that follows the ECMF, $\xi_{\mathrm{ecl}}(M)=\mathrm{d}N_{\mathrm{ecl}}/\mathrm{d}M$, where $\mathrm{d}N_{\mathrm{ecl}}$ is the number of embedded clusters with mass in stars in the range $M$ to $M+\mathrm{d} M$. Then the stellar mass function for the whole galaxy is the sum of stars in all embedded clusters and can therefore be integrated as: \begin{equation}\label{eq:xi_IGIMF} \xi_{\mathrm{IGIMF}}(m,\mbox{SFR})=\int_{0}^{+\infty} \xi_{\mathrm{\star}}(m,M)~\xi_{\mathrm{ecl}}(M,\mbox{SFR})\,\mathrm{d}M. \end{equation} This formalism represents a general prescription for the construction of the galaxy-wide IMF from locally valid stellar IMFs. It specifically implies that even if the IMF is universal and fixed on the star-cluster scale, the galaxy-wide IMF can vary. As an extreme example, 1000 small star clusters of 10 M$_{\odot}$ would have the same total mass but a different stellar population than a single $10^4$ M$_{\odot}$ star cluster, simply because all stars more massive than 10 M$_{\odot}$ only exist in the latter case. \item \label{axiom: IMF} : The stellar IMF, $\xi_{\mathrm{\star}}(m)$, is canonical \citep{Kroupa2001} if the embedded cluster is forming in a gas cloud with a molecular cloud core density $\rho_{\mathrm{cl}}<9.5\times 10^4$ [M$_{\odot}$pc$^{-3}$] (where the molecular cloud core density accounts for the mass of stars and gas as defined in Eq.~\ref{eq:rho_clD} below, following \citealt{Marks2012a}): \begin{equation}\label{eq:xi_star} \xi_{\mathrm{\star}}(m,M) = \begin{cases} 0, & m<0.08~\mathrm{M}_{\odot}, \\ 2k_{\mathrm{\star}} m^{-1.3}, & 0.08~\mathrm{M}_{\odot} \leqslant m<0.5~\mathrm{M}_{\odot}, \\ k_{\mathrm{\star}} m^{-2.3}, & 0.5~\mathrm{M}_{\odot} \leqslant m<1\mathrm{M}_{\odot}, \\ k_{\mathrm{\star}} m^{-\alpha_3}, & 1~\mathrm{M}_{\odot} \leqslant m<m_{\mathrm{max}}(M), \\ 0, & m_{\mathrm{max}}(M) \leqslant m, \end{cases} \end{equation} where $\alpha_3=2.3$ is the constant Salpeter-Massey index for the invariant canonical IMF but will change for larger $\rho_{\mathrm{cl}}$ to account for IMF variation under star-burst conditions \citep{Elmegreen2003, Shadmehri2004, Dib2007,Dabringhausen2009,Dabringhausen2012, Marks2012a}. 0.08 M$_{\odot}$ in Eq.~\ref{eq:xi_star} is about the lower mass limit of stars \citep{Thies2015}. The parameters $k_{\mathrm{\star}}$ and $m_{\mathrm{max}}$ in Eq. \ref{eq:xi_star} are determined simultaneously by solving Eq.~\ref{eq:MeclintMstar} \& \ref{eq:1intMstar} together, i.e., using the mass conservation of the embedded cluster: \begin{equation}\label{eq:MeclintMstar} M_{\mathrm{ecl}}=\int_{0.08~\mathrm{M}_{\odot}}^{m_{\mathrm{max}}}m~\xi_{\mathrm{\star}}(m)\,\mathrm{d}m, \end{equation} and the optimal sampling normalization condition (which will be explained at the end of \ref{axiom: ECMF}): \begin{equation}\label{eq:1intMstar} 1=\int_{m_{\mathrm{max}}}^{150~\mathrm{M}_{\odot}}\xi_{\mathrm{\star}}(m)\,\mathrm{d}m, \end{equation} where 150 M$_{\odot}$ is the adopted stellar upper mass limit \citep{Weidner2004a, Figer2005, Oey2005, Koen2006, Maiz2007}. Higher mass stars are most likely to be formed through mergers \citep{Banerjee2012a,Banerjee2012b}. For larger $\rho_{\mathrm{cl}}$, $\xi_{\mathrm{\star}}(m)$ becomes top-heavy where a $\alpha_3(\rho_{\mathrm{cl}})$ relation is adopted from \cite{Marks2012a}: \begin{equation}\label{eq:alpha_3} \alpha_3= \begin{cases} 2.3, & \rho_{\mathrm{cl}}<9.5\times 10^4, \\ 1.86-0.43\log_{10}(\rho_{\mathrm{cl}}/10^6), & \rho_{\mathrm{cl}} \geq 9.5\times 10^4. \end{cases} \end{equation} Here \begin{equation}\label{eq:rho_clD} \rho_{\mathrm{cl}}=3M_{\mathrm{cl}}/4\pi r_{\rm h}^3 \end{equation} in the unit of $[\mathrm{M}_{\odot}/\mathrm{pc}^3]$ is the pre-cluster molecular cloud core density when the embedded cluster is forming, with $M_{\mathrm{cl}}$ being the original molecular cloud core mass including gas and stars, and $r_{\rm h}$ being the formal half mass radius of the embedded cluster at its theoretical birth time (see \citealt{Marks2012}). Observed binary-star distribution functions constrain this birth density of the cluster. For a star formation efficiency of 33\%, $M_{\mathrm{cl}}$ is three times the mass of the embedded cluster, $M_{\rm ecl}$. From \cite{Marks2012} we adopt $\log_{10}\rho_{\mathrm{ecl}}=0.61\log_{10}M_{\rm ecl}+2.08$ and $r_{\rm h}/\mbox{pc}=0.1M_{\rm ecl}^{0.13}$, where $M_{\rm ecl}$ is in the unit of [$\mathrm{M}_{\odot}$]. Together with $\rho_{\mathrm{ecl}}=3M_{\rm ecl}/4\pi r_{\rm h}^3$ (Note here the subscript, ecl, is different from Eq.~\ref{eq:rho_clD}, cl.) we have 5 relations and 5 unknown parameters, leading to: \begin{equation}\label{eq:rho_cl} \log_{10}\rho_{\mathrm{cl}}=0.61\log_{10}M_{\rm ecl}+2.85. \end{equation} Note that the star formation efficiency of 33\% is reasonable but not strict \citep{Banerjee2015,Megeath2016}, and the original molecular cloud core density is not observable. What we realy have here is an empirical relation between $\alpha_3$ and $M_{\rm ecl}$ (combining Eq.~\ref{eq:alpha_3} and \ref{eq:rho_cl}) derived from star cluster observations without a metallicity selection. Although Eq.~\ref{eq:alpha_3} only depends on $\rho_{\mathrm{cl}}$, it does not suggest that a fixed Solar metallicity assumption is applied because there is a correlation between the metallicity and $\rho_{\mathrm{cl}}$ (\citealt{Telford2016}\footnote{\cite{Telford2016} conclude a metallicity--SFR relation of galaxies, while SFR correlates with $\rho_{\mathrm{cl}}$ according to our \ref{axiom: ECMF} and \ref{axiom: star formation epoch} below.}). A decomposed empirical relation considering specifically the metallicity environment can also be adopted from \cite{Marks2012a}. We refer to it as the $\alpha_3(x)$ relation: \begin{equation}\label{eq:alpha_3_metal} \alpha_3= \begin{cases} 2.3, & x<-0.87, \\ -0.41x+1.94, & x>-0.87, \end{cases} \end{equation} where $x=-0.14[\mathrm{Fe}/\mathrm{H}]+0.99\log_{10}(\rho_{\mathrm{cl}}/10^6)$. We note the independent observational evidence for this $\alpha_3(x)$ variation in Eq.~\ref{eq:alpha_3_metal} from a recent analysis of star clusters in M31 \citep{Zonoozi2016, Haghi2017}. Applying Eq.~\ref{eq:alpha_3_metal} instead of \ref{eq:alpha_3} will affect the high mass end of the IMF and the high mass end of all the following results (Fig. \ref{fig:IGIMF_SFR_} to \ref{fig:alpha3SFR}), but only slightly. Here we choose Eq. \ref{eq:alpha_3} as our fiducial model. Eq. \ref{eq:alpha_3_metal} with fixed Solar metallicity ([Fe/H]=0) being the SolarMetal model will only be considered as a robustness check shown in our final result (Fig. \ref{fig:alpha3SFR}) and Appendix \ref{Appendix}. In general, the fiducial model should be more reliable than a constant metallicity assumption although the difference is not significant for metallicities close to solar value. With the $\alpha_3$--$\rho_{\mathrm{cl}}$ relation (Eq.~\ref{eq:alpha_3}) and the $\rho_{\mathrm{cl}}$--SFR relation that high SFR galaxies form star clusters reaching to larger masses and thus to higher cloud core densities (see Eq.~\ref{eq:MtotintMecl}, \ref{eq:SFR*deltat} and \ref{eq:rho_cl}), it follows that the IGIMF will become top-heavy for high galaxy-wide SFRs. This is demonstrated in Fig. \ref{fig:IGIMF_SFR_} below. \item \label{axiom: ECMF} : The ECMF is a single slope power law with a variable power-law index, $\beta$, that depends on the SFR of the galaxy: \begin{equation}\label{eq:xi_ecl} \xi_{\mathrm{ecl}}(M,\mbox{SFR})= \begin{cases} 0, & M<M_{\mathrm{min}},\\ k_{\mathrm{ecl}} M^{-\beta(SFR)}, & M_{\mathrm{min}} \leqslant M<M_{\mathrm{max}}(\mathrm{SFR}),\\ 0, & M_{\mathrm{max}}(\mathrm{SFR}) \leqslant M, \end{cases} \end{equation} where $M_{\mathrm{min}}=5$ M$_{\odot}$ is the assumed lower limit of embedded cluster masses roughly corresponding to the smallest stellar groups observed \citep{Kirk2012,Kroupa2003a}, $M_{\mathrm{max}}$ is the upper integration limit in the optimal sampling method defined in SPK and $k_{\mathrm{ecl}}$ is a normalization constant. The determination of these parameters will be detailed below. Following \cite{Weidner2013b} we assume the ECMF to be flattened (top-heavy) for galaxies with a high SFR: \begin{equation}\label{eq:beta-SFR} \beta=-0.106\log_{10}\mbox{SFR}+2, \end{equation} where SFR is in the unit of $[\mathrm{M}_{\odot}/\mathrm{yr}]$. The single slope power law assumption (Eq. \ref{eq:xi_ecl}) is suggested by observation \citep{Lada2003}. The actual shape of the ECMF might be more complicated, e.g. a Schechter-type form that follows the single power law form at the low mass end but turns down rapidly at the high mass end (see \citealt{Lieberz2017}). This kind of modification does not significantly influence the conclusions of the present paper. The sensitive assumption here is Eq. \ref{eq:beta-SFR}, which directly links the dependency of the IGIMF shape on the SFR (the IGIMF-shape--SFR relation in Fig.~\ref{fig:IGIMF_SFR_} below). The power-law index $\beta$ was observationally found to lie between 1.5 and 2.5 \citep{Weidner2004} which is consistent with Eq. \ref{eq:beta-SFR} for $-5<\log_{10}(\mathrm{SFR}/[\mathrm{M}_{\odot}/\mathrm{yr}])<5$. However, our assumption differs from \cite{Weidner2013b} as they only use Eq. \ref{eq:beta-SFR} for SFR $>1$ M$_{\odot}$yr$^{-1}$ instead of for every SFR. This is because adopting the $\beta$--SFR relation (Eq.~\ref{eq:beta-SFR}) for all SFRs naturally fits the observationally suggested $\alpha_3^{\mathrm{gal}}$--SFR relation for galaxies and our result is actually similar to \cite{Weidner2013b}, which will be shown later in Fig. \ref{fig:alpha3SFR}. The difference in IGIMF shape between applying our and \cite{Weidner2013b}'s $\beta$--SFR relation assumption is shown in Fig.~\ref{fig:IGIMF_SFR_} and Fig.~\ref{fig:alpha3_change_beta_Weidner}, respectively. Again, the parameters $k_{\mathrm{ecl}}$ and $M_{\mathrm{max}}$ in Eq.~\ref{eq:xi_ecl} are determined by solving Eq.~\ref{eq:MtotintMecl} \& \ref{eq:1intMecl} together, i.e., by invoking the embedded cluster population mass conservation: \begin{equation}\label{eq:MtotintMecl} M_{\mathrm{tot}}=\int_{M_{\mathrm{min}}}^{M_{\mathrm{max}}}M~\xi_{\mathrm{ecl}}(M)\,\mathrm{d}M, \end{equation} where $M_{\mathrm{tot}}$ is the stellar mass formed within time $\delta t$ that will be introduced in Eq.~\ref{eq:SFR*deltat}, and the optimal sampling normalization condition: \begin{equation}\label{eq:1intMecl} 1=\int_{M_{\mathrm{max}}}^{10^9~\mathrm{M}_{\odot}}\xi_{\mathrm{ecl}}(M)\,\mathrm{d}M, \end{equation} where the upper integration limit of $10^9$ M$_{\odot}$ is the hypothetical physical upper bound of embedded cluster mass roughly corresponding to the limit where star-cluster-type stellar-dynamical systems (ultra compact dwarf galaxies) appear to end (e.g. \citealt{Dabringhausen2008}). Originally, the normalization form of Eq. \ref{eq:1intMecl} comes from the notion that there is exactly one object in the mass range from $M_{\mathrm{max}}$ to $10^9~\mathrm{M}_{\odot}$. But according to the method of SPK, an embedded cluster is not actually generated in this mass range. So this normalization method is only justified by its ability to describe observations. It can be seen from Fig. \ref{fig:MmaxMecl} \& \ref{fig:SFRMecl} below, respectively, that the generated maximum stellar and embedded cluster mass, $m_{\mathrm{str, max}}$ and $M_{\mathrm{ecl, max}}$\footnote{The meaning of the symbols and notation is listed in Table~\ref{table}.}, fit well with the observational constraints. It is possible to modify the hypothetical upper mass limit or the value on the left-hand side of Eq. \ref{eq:1intMecl} to change the resulting $M_{\mathrm{ecl, max}}$--SFR relation and fit the data but this is not a concern of the present paper. \item \label{axiom: star formation epoch} : An ensemble of embedded clusters that optimally populate the ECMF is formed in a $\delta t=10$ Myr period with a constant SFR. This is reasonable because, although the short-term fluctuation of the local ($<$ few pc scale) SFR can happen on a dynamical timescale of less than one to a few Myr, a stable long-term galaxy-wide variation typically happens on a timescale of a few hundred Myr (see \citealt{Renaud2016} for interacting galaxies). The period $\delta t$ is called a star formation epoch and we have the following relation: \begin{equation}\label{eq:SFR*deltat} M_{\mathrm{tot}}=\mbox{SFR}\cdot \delta t, \end{equation} with $M_{\mathrm{tot}}$ being the total stellar mass of embedded clusters formed in $\delta t$ throughout the galaxy. We note that $\delta t\approx 10$ Myr accounts for the typical observationally deduced galaxy-wide interstellar medium (ISM) time-scale of transforming the ISM via molecular clouds into a new stellar population (\citealt{Egusa2004,Egusa2009}; review: \citealt{Fukui2010}, \citealt{Meidt2015}). The disappearance of large molecular clouds around young star clusters also takes about 10 Myr \citep{Leisawitz1989}. In our model, $\delta t$ was actually determined by the empirical $M_{\mathrm{ecl, max}}$--SFR relation as a larger $\delta t$ will result in a larger $M_{\mathrm{ecl, max}}$, which can violate the $M_{\mathrm{ecl, max}}$--SFR relation. It has been tested in this and previous work (\citealt{Weidner2004}; SPK) that a 10 Myr epoch ensures that the generated embedded clusters reproduce the observed $M_{\mathrm{ecl, max}}$--SFR relation. This consistency between the observationally estimated ISM timescale and the $\delta t$ needed to fit the observational $M_{\mathrm{ecl, max}}$--SFR data is noteworthy and encouraging. \end{enumerate} \subsection{The OSGIMF}\label{sec: Model-OSGIMF} Different from making an integration and resulting in a smooth function with our \ref{axiom: IGIMF}, a sampling procedure will give a discrete list of stellar masses. We use the optimal sampling method from SPK, their equations 1 to 7 \& 9, where their symbol $M_{\mathrm{max}}$ is $M_{\mathrm{max}}$ or $m_{\mathrm{max}}$ here, and $M_{\mathrm{trunc}}$ in their paper is set to be $10^9$ M$_{\odot}$ and 150 M$_{\odot}$ in our Eq. \ref{eq:1intMecl} and \ref{eq:1intMstar}, respectively. We refer readers to SPK for more details of the sampling method. Here we only highlight some important points as SPK made some improvements on the optimal sampling formalism. In the SPK method, the mass upper integration limit is not the most massive object mass itself but the upper integration limit of the most massive object. This means the mass of the most massive embedded cluster, $M_{\mathrm{ecl,max}}$\footnote{$M_{\mathrm{ecl}}$ stands for the actual embedded cluster mass in star obtained from observation or sampled by our code. It explicitly indicates that $M_{\mathrm{ecl,max}}$ is the most massive object mass instead of an upper integration limit like $M_{\mathrm{max}}$. See Table~\ref{table}.}, in the empirical $M_{\mathrm{ecl,max}}$--SFR relation will not be the upper mass limit $M_{\mathrm{max}}$ in Eq.~(\ref{eq:MtotintMecl}). Rather, $M_{\mathrm{max}}$ is calculated by equation (9) in SPK. The empirical $M_{\mathrm{ecl,max}}$--SFR relation is automatically fulfilled if $\delta t=10$ Myr as stated in \ref{axiom: IMF}. This is shown in Fig.~\ref{fig:SFRMecl} below. The case of sampling stars within an embedded cluster is similar. The mass of the most massive star in an embedded cluster, $m_{\mathrm{str,max}}$\footnote{$m_{\rm str}$ stands for the actual stellar mass similar to $M_{\mathrm{ecl}}$.}, in the empirical $m_{\mathrm{str,max}}$--$M_{\mathrm{ecl}}$ relation is not used as the upper integration limit, $m_{\mathrm{max}}$, in Eq.~\ref{eq:MeclintMstar}. The SPK optimal sampling formalism with a stellar truncation mass of 150 M$_{\odot}$ automatically fulfills the $m_{\mathrm{str,max}}$--$M_{\mathrm{ecl}}$ relation as is shown in Fig.~\ref{fig:MmaxMecl} below. The new SPK sampling formalism is more reasonable in the sense that physical mass is only the integration result rather than being the integration upper limit. In addition, the SPK formalism reduces the number of assumptions for the model. The $M_{\mathrm{ecl,max}}$--SFR relation becomes a natural result of optimal sampling instead of an assumption, e.g., \citet[their axiom (5)]{Weidner2013b}. \section{The publicly available module: GalIMF}\label{sec: galIMF} A freely available Python code, GalIMF, is developed to compute the IGIMF and the OSGIMF for a given galaxy-wide SFR and metallicity. The current version, GalIMF version 1.0.0, incorporates the axioms as detailed in Sec.~\ref{sec:Model}. Modifications, e.g., allowing the stellar IMF to vary with metallicity below 1 M$_\odot$ as described in \cite{Marks2012a}, are easy to implement by changing the model number flags. GalIMF version 1.0.0 developed for the current paper is downloadable at: https://github.com/Azeret/galIMF Code usage example, gallery, and future version of GalIMF is available at GalIMF homepage: https://sites.google.com/view/galimf/home \section{RESULTS}\label{sec:result} With GalIMF, we confirm the previous studies that the IGIMF theory, with and without a discretization by sampling procedure, is consistent with the observed $m_{\mathrm{str, max}}$--$M_{\mathrm{ecl}}$, $M_{\mathrm{ecl}}$--SFR and $\alpha_3^{\mathrm{gal}}$--SFR relations, where $\alpha_3^{\mathrm{gal}}$ is the effective power-law index of the galaxy-wide IMF for stars above 1 M$_{\odot}$ and SFR is the galaxy-wide SFR. An inference relation between the galaxy-wide SFR and SNII occurrence is given as a test of the OSGIMF theory. The OSGIMF, which is the discretized version of the IGIMF, shows additional serrated features that only appear when the deterministic sampling, e.g., optimal sampling\footnote{Optimal sampling as introduced in \cite{Kroupa2013} and improved by \cite{Schulz2015} is not the only possible formalism for a deterministic sampling. There are other deterministic ways to sample a distribution and yield different results, e.g., one could modify the current optimal sampling normalization condition.} with a large ECMF slope of $\beta>2.1$ is applied. \subsection{$m_{\mathrm{\rm str,max}}$--$M_{\rm ecl}$}\label{secsub:m_max-M_ecl} The $m_{\mathrm{str,max}}$--$M_{\rm ecl}$ relation for the optimally sampled result is shown in Fig. \ref{fig:MmaxMecl} to compare with the observations. We plot not only the most massive but also the second and third massive sampled stellar mass. Keep in mind that stellar ejections and mergers \citep{Oh2012, Oh2017} may alter the relation calculated from optimal sampling. A steepening-feature appears in the $m_{\rm max}$--$M_{\rm ecl}$ relation at $M_{\rm ecl} > 10^{3.49}\,M_\odot$ if the $\alpha_3(\rho_{\rm cl})$ relation (Eq.~\ref{eq:alpha_3}) is used (also shown as thin lines in Fig.~\ref{fig:MmaxMecl23}) when compared to the flatter $m_{\rm str,max}$--$M_{\rm ecl}$ relation at $M_{\rm ecl} > 10^{3.49}\,M_\odot$ if $\alpha_3=$ constant (thick lines in Fig.~\ref{fig:MmaxMecl23}). This steepening, although not so pronounced, is critical to understand a spoon-feature in Fig.~\ref{fig:OSGIMF} that will be discussed in Sec.~\ref{secsub:OSGIMFs} and Appendix~\ref{Appendix2}. The data points come from different papers. Clusters in \cite{Stephens2017} are estimated to have an age younger than 5 Myr. The average values of "1 Myr estimated" and "2.5 Myr estimated" $M_{\rm ecl}$ in \cite{Stephens2017}'s table 6 are used. The uncertainty of $M_{\rm ecl}$ comes from the estimation of the cluster ages and the resulting $M_{\rm ecl}$ error is approximately from a normal distribution with a $2\sigma$ certainty range of about $\pm 44\%$, or $+0.158/-0.252$ dex according to the description in their section 5.3.. But their $M_{\rm ecl}$ is likely to be underestimated due to extinction and the effect is unclear. Thus we assume an overall error according to a normal distribution in the logarithmic scale with standard deviation $\sigma = 0.126$ dex. The $m_{\rm max}$ values can be overestimated due to the multiplicity of the stars and underestimated due to extinction and the fact that the stars may still be accreting. The $m_{\rm max}$ estimation also suffers several other ambiguous processes and the error was not given (see their section 4.3). Thus we assume an overall error according to a normal distribution in the logarithmic scale with standard deviation $\sigma = 0.13$ dex. From \cite{Kirk2012}, we adopt the top panel of their figure 13. The mass estimations have an uncertainty of order $50\%$ as stated in \citet[their section 2.1]{Kirk2011} which is $+0.176/-0.301$ dex. \cite{Weidner2013a} collate an inhomogeneous set of data culled from the literature for very young clusters without supernova remnants. The catalog contains only clusters with age below 5 Myr to exclude the possibility that the most massive star has already exploded as a supernova and no other selection criterion was applied. The average $M_{\mathrm{ecl}}$ uncertainty is $\pm 0.34$ dex and the average $m_{\mathrm{str,max}}$ uncertainty is $\pm 0.16$ dex for \cite{Weidner2013a}'s data. The uncertainty of the $M_{\rm ecl}$ and $m_{\mathrm{str,max}}$ data points are calculated and the data points are plotted in Fig.~\ref{fig:MmaxMecl} with a different shade of gray, lighter being for larger uncertainties\footnote{The light gray data points are slightly larger for better visibility.}. The blue data points from \citet[their figure 11]{RamirezAlegria2016} are five young clusters but with ages older than the other data presented here. Their ages are roughly up to 10, 7.5, 9, 20 and 7 Myr for data points from left to right. The largest discrepancy for this sample from our model is also the oldest cluster (i.e. 20 Myr) which may already have lost its most massive star though stellar evolution or dynamical ejection. A stellar mass estimation error is not provided by \cite{RamirezAlegria2016}. It is noteworthy how these data follow the dotted line, as expected for such older clusters. \begin{figure}[!hbt] \center \includegraphics[width=9cm]{MmaxMecl} \caption{The (most)-massive-stellar-mass--embedded-cluster-mass ($m_{\mathrm{str, max}}$--$M_{\mathrm{ecl}}$) relation. Optimally-sampled result for the most, second and third massive star mass as a function of embedded cluster mass is shown as solid curve, \textcolor{blue}{blue dashed curve} and \textcolor{green}{green dotted curve}, respectively. Observational data come from: \cite{Kirk2012} (\textcolor{orange}{orange dots}), \cite{Stephens2017} (\textcolor{red}{red dots}), \cite{Weidner2013a} (\textcolor{gray}{gray dots}) and \cite{RamirezAlegria2016} (\textcolor{blue}{blue dots}), where \cite{Weidner2013a} is an inhomogeneous set of data culled from the literature for very young clusters without supernova remnants. The average $M_{\mathrm{ecl}}$ uncertainty is 0.34 dex and the average $m_{\mathrm{str,max}}$ uncertainty is 0.16 dex for the gray dots and the gray color is lighter for data points with larger uncertainties. The thin solid line indicates the $M_{\mathrm{ecl}}=m_{\mathrm{str,max}}$ limit and the horizontal thin dashed line indicates the 150 M$_{\odot}$ limit in our Eq. \ref{eq:1intMstar}.} \label{fig:MmaxMecl} \end{figure} The observational data points in Fig. \ref{fig:MmaxMecl} show no evidence for an intrinsic scatter and support the optimal sampling scenario. This statement is well established in \citet[their figure 1]{Weidner2013a} by showing most of the observational data lie within the region where only 66\% of them should be if stars were randomly sampled from the IMF. A further quantitative discussion disfavoring the random sampling scenario is performed in \citet[in preparation]{Yan2017b} with randomly sampled $m_{\mathrm{str,max}}$--$M_{\rm ecl}$ relations directly compared with the observations. The scatter of the data points is shown to be significantly smaller than random sampling from the IMF and is consistent with no intrinsic scatter given the observational uncertainties. \subsection{$M_{\mathrm{ecl}}$--SFR}\label{secsub:M_ecl-SFR} The $M_{\mathrm{ecl}}$--SFR relation for our sampled result is shown in Fig. \ref{fig:SFRMecl}. The data points provided by \cite{Weidner2004} comprise a homogeneous data set of galaxies with young star clusters. The uncertainties of these data points are about 0.5 dex and 0.2 dex for cluster mass and SFR respectively. The cluster masses in this data set are calculated from a magnitude-mass relation assuming the fixed canonical IMF. So this data is consistent with the present analysis when SFR $<0.1$ M$_{\odot}$/yr. For higher SFRs, our $|\alpha_3|$ becomes smaller according to Eq. \ref{eq:alpha_3} (this can be seen explicitly from our Fig. \ref{fig:OSalphaMstar} where the lines for SFR $>10^{-1}$ M$_{\odot}$/yr drop down at $\log_{10}m/\mathrm{M}_{\odot}=0$). The $M_{\mathrm{ecl}}$ values derived with our $\alpha_3$ assumption would be smaller than the data adopted from \cite{Weidner2004} with their canonical $\alpha_3$ assumption. It is possible that the additive constant "2" in Eq.~\ref{eq:beta-SFR} is larger which would fit the data points better, i.e., closer to the green dashed line rather than the blue dotted line (and also makes the "fiducial model" higher in Fig.~\ref{fig:alpha3SFR} below). \cite{Randriamanakoto2013} extend the observation of the empirical relation between the brightest cluster magnitude in a galaxy and the host SFR to higher SFRs. As the $\alpha_3$--SFR dependence makes the $M_{\mathrm{ecl}}$ determination from magnitude very complicated, this data set is not added into our plot. But \cite{Randriamanakoto2013} explicitly note that the small scatter of their data is inconsistent with random sampling from the ECMF, corroborating on the conclusion reached using different data by \cite{Pflamm-Altenburg2013}. \begin{figure}[!hbt] \center \includegraphics[width=9cm]{SFRMecl} \caption{The most-massive young-cluster-mass--galaxy-wide-SFR ($M_{\mathrm{ecl, max}}$--SFR) relation. Optimally-sampled results for different $\beta$ are shown as \textcolor{red}{red solid curve} for $\beta$ following Eq. \ref{eq:beta-SFR}, \textcolor{blue}{blue dotted curve} for $\beta=2$, \textcolor{green}{green dashed curve} for $\beta=2.4$. Observational data (gray dots) adopted from \cite{Weidner2004} have a typical uncertainty of 0.3 dex. The $\beta=2$ and 2.4 curves are almost identical with \cite{Weidner2004}'s figure 6 (middle dotted and middle dashed curves, respectively) that also adopt the $\delta t =10$ Myr assumption. See also \cite{Randriamanakoto2013}.} \label{fig:SFRMecl} \end{figure} The data points in Fig. \ref{fig:SFRMecl} again display a small scatter which is consistent with the scenario of a highly self-regulated behavior on galaxy scales (see \citealt{Disney2008} and \citealt{Kroupa2015} for a relevant discussion). In addition, our result suggests that a variable $\beta$ assumption (Eq.~\ref{eq:beta-SFR}), shown by the red solid curve, fits better with the observations and may be superior to a constant $\beta$ assumption, as indicated by the green dashed curve and blue dotted curve. This result supports our assumed $\beta$--SFR relation in Eq. \ref{eq:beta-SFR}, which applies to all SFRs. \subsection{IGIMFs}\label{secsub:IGIMFs} The calculated IGIMFs for different SFRs are shown in Fig.~\ref{fig:IGIMF_SFR_} and can be compared with previous IGIMF works from \cite{Weidner2013b} and \cite{Fontanot2017}. Here we define the logarithmic IMF, \begin{equation}\label{eq:xi_L_IGIMF} \xi_{\mathrm{L,IGIMF}}(m)=\frac{\mathrm{d}N}{\mathrm{d}\log_{10}m}=m~\ln(10)~\xi_{\mathrm{IGIMF}}(m), \end{equation} where $\mathrm{d}N$ is the number of stars in the logarithm mass interval $\log_{10}m$ to $\log_{10}m+\mathrm{d}\log_{10}m$ and $\xi_{\mathrm{IGIMF}}$ is defined in Eq.~\ref{eq:xi_IGIMF}. Our result differs slightly from the previous papers because of our newly applied improved optimal sampling formalism following SPK as explained in Section \ref{sec: Model-OSGIMF} and \ref{sec:discussion}. \begin{figure}[!hbt] \center \includegraphics[width=9cm]{IGIMF_SFR_} \caption{Logarithmic integrated galaxy-wide IMFs, $\xi_{\mathrm{L,IGIMF}}$ (Eq.~\ref{eq:xi_L_IGIMF}), for different SFRs and formed over a 10 Myr epoch. The unit of $\xi_{\mathrm{L,IGIMF}}$ is number of stars per log-mass interval. Each line is normalized to the same values at $m<1$ M$_{\odot}$. Solid curves are IGIMFs for galactic SFR=\textcolor{blue}{$10^{-5}$}, \textcolor{green}{$10^{-4}$} ... $10^{5}$ M$_{\odot}$/yr from bottom left to top right. The dashed line is the canonical IMF (Eq.~\ref{eq:xi_star}) with $\alpha_3=2.3$. The lines lower than the dashed line deviate from the canonical IMF above 1.1 M$_{\odot}$ which is the most massive stellar mass in the least-massive embedded clusters $M \approx M_{\mathrm{min}} = 5$ M$_{\odot}$. The lines on top of the dashed line deviate from the canonical IMF above 1 M$_{\odot}$ which is the lower mass limit for applying $\alpha_3$ as defined in Eq. \ref{eq:xi_star} and \ref{eq:alpha_3}. This plot is comparable with earlier IGIMF works from \cite{Weidner2013b} and \cite{Fontanot2017}.} \label{fig:IGIMF_SFR_} \end{figure} The result shows top-heavy IMFs for high SFR galaxies and bottom-heavy IMFs for low SFR galaxies. We note that this behavior is consistent with recent observational constraints from low mass X-ray binaries \citep{Peacock2017}. Fig.~\ref{fig:IGIMF_SFR_} also implies that galaxies with a small SFR do not form massive stars. For instance, a galaxy with a SFR$=10^{-4}$ M$_\odot$/yr will be forming no stars more massive than 10 M$_\odot$ as will be discussed in Sec.~\ref{secsub:mmax-SFR}. \subsection{OSGIMFs}\label{secsub:OSGIMFs} The OSGIMFs provide the specific masses for all the individual stars in a simulated stellar system and it follows the IGIMFs tightly. The OSGIMF for different SFRs are shown in Fig.~\ref{fig:OSGIMF} with the IGIMF overlaid, where the IGIMFs are the same as in Fig. \ref{fig:IGIMF_SFR_} but here normalized to $M_{\mathrm{tot}}$ by Eq.~\ref{eq:MtotintMecl} and \ref{eq:SFR*deltat}. The difference between the IGIMF and the OSGIMF is an additional serrated feature in the latter, arising from optimal sampling on the assumed ECMF with a sharp minimum edge at $M_{\rm min}=5$ M$_\odot$. With optimal sampling, the large number of minimum mass embedded clusters will have a similar most-massive-star mass. This is demonstrated by the decomposition plots of the OSGIMF colored in red, green, and blue, counting only the first, the second and the third massive stars of embedded clusters, respectively. i.e., the left edge of the \textcolor{red}{red} histograms in Fig.~\ref{fig:OSGIMF} is formed by the most massive stars in all the embedded clusters with mass close to $M_{\mathrm{ecl,min}}$. According to optimal sampling, those stars must have the same mass, leading to a sharp peak and the serrated feature around 1 M$_{\odot}$ that is best visible in the upper right panel and demonstrated as a derivative in Fig.~\ref{fig:OSalphaMstar} below (see caption of Fig.~\ref{fig:OSGIMF} and further discussions in Sec.~\ref{secsub:OSGIMF shape}). If a smooth changing for the ECMF lower-mass limit is assumed rather than an abrupt cutoff, then the serrated feature will be reduced. The small drop down glitch (which makes the spoon-feature that we mentioned above) around $\log_{10}(m/M_\odot)=1.7$ in the decomposition plots is caused by the steepening feature of the $m_{\mathrm{str,max}}$--$M_{\rm ecl}$ relation in Fig.~\ref{fig:MmaxMecl}. The steepening in Fig.~\ref{fig:MmaxMecl} and the spoon-feature in Fig.~\ref{fig:OSGIMF} will disappear if a fixed $\alpha_3$ is applied, as shown in Appendix~\ref{Appendix2}. The number of sampled stars shows a dispersion at the low mass end in the SFR $=10^{-5}$ M$_{\odot}$/yr panel, which originates from optimal sampling. Remember, we first discretely sampled clusters, then we discretely sampled stars for each cluster. So there will be coincidences of very similar stellar masses from clusters with different masses. The scatter is not Poissonian and is prominent at the low-mass end of the stellar mass function only because the bin size is sufficiently small. \begin{figure*}[!hbt] \center \includegraphics[width=\hsize]{OSGIMF} \caption{Optimally-sampled galaxy-wide IMFs for different SFRs. The unit of $\xi_{\mathrm{OSGIMF}}$ is number-of-stars-per-linear-mass-interval. The black histogram is the entire stellar sample in the galaxy formed in a 10 Myr epoch. The large scatter in the upper left panel and the serrated feature around $\log_{10}(m/\mathrm{M}_{\odot})=0$ for every panel is explained in the text. The \textcolor{red}{red}, the \textcolor{green}{green} and the \textcolor{blue}{blue} histograms, comprising our decomposition plot, are the OSGIMFs counting only the first, the second and the third most-massive stars of embedded clusters. Note the spoon feature at $m>10^{1.6}$ M$_\odot$ in the red, green and blue curves. The stellar mass distribution is saturated at the high mass end because of the 150 M$_{\odot}$ limit. The thin smooth curves are the IGIMFs as in Fig. \ref{fig:IGIMF_SFR_}, calculated by Eq. \ref{eq:xi_IGIMF} and normalized to give the mass in stars when integrated over the relevant stellar mass ranges.} \label{fig:OSGIMF} \end{figure*} \subsection{$\alpha$ plot}\label{secsub:alpha-plot} We define the incident galaxy-wide IMF power-law index or slope as: \begin{equation}\label{eq:alpha_gal} \alpha^{\mathrm{gal}}(m)=-\frac{\mathrm{d}(\log_{10}\xi_{\mathrm{GIMF}})}{\mathrm{d}(\log_{10} m/\mathrm{M}_{\odot})}, \end{equation} where $\xi_{\mathrm{GIMF}}$ can be the integrated galaxy-wide IMF, $\xi_{\mathrm{IGIMF}}$, or the optimally-sampled galaxy-wide IMF, $\xi_{\mathrm{OSGIMF}}$. The alpha-plot \citep{Kroupa2001} for the OGIMF and the IGIMF for different SFRs is shown in Fig. \ref{fig:OSalphaMstar} as colored lines and black lines respectively. The figure shows a diversion at the high mass end for different SFRs and a systematic fluctuation around 1 M$_{\odot}$ which is caused by the serrated feature mentioned above. \begin{figure}[!hbt] \center \includegraphics[width=9cm]{OSalphaMstar8} \caption{The galaxy-wide IMF power-law index, $\alpha^{\mathrm{gal}}$ (Eq.~\ref{eq:alpha_gal}), for the OSGIMF (colored thin lines) and the IGIMF (black lines) for SFR $=10^{-5}$, $10^{-4}$ ... $10^{5}$ M$_{\odot}$/yr from upper to lower lines. (For the SFR=$10^{5}$ M$_{\odot}$/yr case, only the IGIMF index is plotted because a star-by-star sampling costs too much computational time.) Below 1 M$_{\odot}$, the plot reproduces the canonical IMF indexes of 1.3 and 2.3 as defined in Eq. \ref{eq:xi_star}. Between 1 and 1.1 M$_{\odot}$, $\alpha^{\mathrm{gal}}$ follows the variable $\alpha_3$ defined in Eq. \ref{eq:alpha_3}. At higher masses, $\alpha^{\mathrm{gal}}$ varies with SFR. The OSGIMF index deviates from the IGIMF one around 1 M$_{\odot}$. This result may lead to a large observational scatter at intermediate and high mass ranges. The large $\alpha^{\mathrm{gal}}$ scatter for the OSGIMF at the low mass end and low SFR has been explained in the text for Fig.~\ref{fig:OSGIMF}. The vertical dashed line at $m=1.3$ M$_{\odot}$ divides the IGIMF into two parts as mentioned in Sec.~\ref{sec:discussion IGIMF shape}} \label{fig:OSalphaMstar} \end{figure} \subsection{$\alpha_3^{\mathrm{gal}}$--SFR}\label{secsub:alpha3-SFR} Fig.~\ref{fig:alpha3SFR} is the extracted $\alpha_3^{\mathrm{gal}}$--SFR relation ($\alpha_3^{\mathrm{gal}}$ is $\alpha^{\mathrm{gal}}$ in Eq.~\ref{eq:alpha_gal} for $m>1$ M$_{\odot}$) from the alpha-plot (Fig. \ref{fig:OSalphaMstar}) at different stellar masses, $m$, where the IGIMF is curved and can not be described by a single power-law. As each $m$ value gives a different $\alpha_3^{\mathrm{gal}}$--SFR relation, we plot a few lines from black to gray for stellar masses from 1.58 to 100 M$_{\odot}$. Generally we have a top-heavy IMF for large-SFR galaxies and bottom-heavy IMF for low-SFR galaxies. Unlike the model result, the data points obtained by the respective observational studies assume a single power law IMF model\footnote{The models have a single power index either for the entire IMF or at the high stellar mass end.} The data points should therefore not be considered as IMF power-law indices probed for a specific stellar mass range and are not directly comparable with our model. For the plotted data and our model to be directly comparable, one still needs to: 1. Use the current model to simulate the initial stellar population for an entire star formation history of the galaxy instead of only a star formation epoch as performed here. 2. Simulate the current stellar population and galaxy spectrum with star evolution models considering the age of each star. 3. Simulate the observed spectrum considering extinction and a telescope model. 4. Use the same single power-law IMF model and all other assumptions to fit the simulated observed spectrum exactly as the observational studies did. As these procedures require much more investment and may only provide similar results, we use the data points in Fig.~\ref{fig:alpha3SFR} as only an indicator to show that the general trend of our model is consistent with the observational research results. The data points of \cite{Gunawardhana2011} were extracted from the panel (a) in their figure 13. The data points of \cite{Lee2009} were extracted from the IGIMF model by \citet[their figure 4]{Pflamm-Altenburg2007}\footnote{For simplicity, the $\alpha_3$ value extracted here for Fig.~\ref{fig:alpha3SFR} is only a characteristic value for \cite{Pflamm-Altenburg2007}'s curved IGIMF shape. In principle, it should also be shown as a few lines in Fig.~\ref{fig:alpha3SFR} as for our own calculation. Also, the SFR $>2$ M$_{\odot}$/yr part of the \cite{Pflamm-Altenburg2007} result is not adopted because their stellar IMF is fixed without the $\alpha_3$ dependence assumed here in Eq. \ref{eq:alpha_3} which changes the IMF shape at higher SFRs.}. \cite{Lee2009} examined 11HUGS data of far ultraviolet non-ionizing continuum and H$\alpha$ nebular emission for a volume limited sample of about 300 nearby star-forming dwarf galaxies, finding a systematic change of the H$\alpha$ over UV flux and concluded that the IGIMF is consistent with these 11HUGS observations which indicate a systematic deficit of ionizing massive star in galaxies with low SFRs. The observational constraints from \cite{Lee2009} indicate an upwards turn in the $\alpha_3^{\mathrm{gal}}$ curves towards very small SFRs. This is, remarkably, a natural outcome of the IGMF theory, having been predicted by \cite{Pflamm-Altenburg2007,Pflamm-Altenburg2009}. The data from \cite{Weidner2013b} is extracted from their figure 1 where they assume $\beta=2$ and $\alpha_3(x)$ (our Eq.~\ref{eq:alpha_3_metal}). \cite{Gargiulo2015} checked the consistency between the IGIMF theory and [$\alpha$/Fe] abundance ratios of elliptical galaxies. They use a constant-$\beta$ and a preliminary version of the $\alpha_3$--$M_{\mathrm{ecl}}$ relation. The middle line in their figure 1 (for "$\beta=2$, $M_{\mathrm{ecl}}^{\mathrm{min}}=5$ M$_{\odot}$") is shown in our Fig.~\ref{fig:alpha3SFR} as the yellow dashed line. Concerning the Solar neighborhood data evident in Fig.~\ref{fig:alpha3SFR} that do not appear to fit the IGIMF theory: These data points are plotted using the MW SFR $\approx 1$ M$_{\odot}$/yr estimated by \cite{Robitaille2010}. But this Galactic estimation can be higher than the local SFR in the Solar neighborhood as we are in an inter-arm region that has a relatively lower SFR than the average Galactic value as suggested by extra-galactic studies (e.g. \citealt{Seigar2002}). In addition, the local field $\alpha_3$ value can also be different from $\alpha_3^{\mathrm{gal}}$. Several past studies \citep{Kennicutt1983,Kennicutt1994,Baldry2003} indeed reported a discrepancy between the IMF of the Solar neighborhood (Scalo IMF; \citealt{Scalo1986}) and other late-type galaxies similar to the MW (Salpeter IMF; \citealt{Salpeter1955}). Variation of the local field IMF as a result of the changing local SFR are discussed by \cite{Elmegreen2006}. Thus, the local field study can only be taken as a reference for the galaxy-wide SFR--$\alpha_3^{\mathrm{gal}}$ relation of the MW. \begin{figure*}[!hbt] \center \includegraphics[width=\hsize]{alpha3SFR} \caption{The observed high mass end power-law index of the galaxy-wide IMF as resulting from the here calculated IGIMF, $\alpha_3^{\mathrm{gal}}$ (i.e. $\alpha^{\mathrm{gal}}$ in Eq.~\ref{eq:alpha_gal} for $m>1$ M$_{\odot}$), for a constant SFR over $\delta t=10$ Myr in dependence of the galaxy-wide SFR. In Fig. \ref{fig:OSalphaMstar}, $\alpha_3^{\mathrm{gal}}$ values diverge for different SFRs and also vary for different $m$ at the high mass end. As at each $m$ value there exists a different $\alpha_3^{\mathrm{gal}}$--SFR relation, we plot solid lines for $\log_{10}(m/$M$_{\odot})=$0.2, 0.4, ..., 2, i.e., 1.58, 2.51, ..., 100 M$_{\odot}$ from black to gray (top to bottom) for the fiducial model and dotted lines for the corresponding SolarMetal model defined in Sec. \ref{sec:Model-IGIMF}. \textcolor{blue}{Blue squares} are data from the GAMA galaxy survey \citep{Gunawardhana2011}. \textcolor{red}{Red triangles} and the \textcolor{red}{red dash-dotted line} are data from \cite{Weidner2013b} where the left triangle is for the MW field, middle three triangles are galaxy studies, the right triangle is for the bulges of the MW and M31 and the dash-dotted line is their IGIMF model assuming $\beta=2$. A recent study has suggested that the 2 M$_{\odot}$/yr SFR for MW is overestimated \citep{Chomiuk2011} but we leave this data point the same as in \cite{Weidner2013b}. \cite{Gargiulo2015} report consistency between their IGIMF model assuming $\beta=2$ (\textcolor{orange}{thick yellow dashed line}) and the [$\alpha$/Fe] abundance ratios of elliptical galaxies. The \textcolor{purple}{purple diamond} is an individual analysis for the dwarf galaxy NGC 2915 \citep{Bruzzese2015}. \textcolor{green}{Green stars} are based on the \cite{Lee2009} 11HUGS observations of dwarf galaxies. The black circle is an observation for the solar neighborhood from \cite{Rybizki2015} with adopted MW SFR from \cite{Robitaille2010} as an upper limit of the solar neighborhood SFR because the Sun is located in an inter-arm region where the relevant SFR is significantly smaller (towards the direction indicated by the arrow, see Sec.~\ref{secsub:alpha3-SFR} for further details). The thin horizontal dashed line represents the canonical IMF index $\alpha_2=\alpha_3=2.3$.} \label{fig:alpha3SFR} \end{figure*} We note that the data points shown in Fig.~\ref{fig:alpha3SFR} are not direct measurements but interpretations from flux measurements, e.g., H$\alpha$ / UV ratios. A variable IMF is not necessarily the only way to explain such observations. Differences in the treatments of processes or a special star formation history (SFH) may lead to similar results. However, the attempt of changing the SFH to account for the observations requires all the galaxies being analyzed to be in-phase in their SFH (see "coordinated bursts" in \citealt{Hoversten2008}). As the cited studies used a large number of galaxies, this scenario becomes highly unlikely. In addition, the magnitude of SFR variation required in this special SFH scenario is unrealistic as stated by \citet[their section 4.5]{Lee2009}. A comprehensive discussion can also be found at \citet[their section 6]{Gunawardhana2011}. In addition, a recent study of the Sagittarius dwarf galaxy \citep{Hasselquist2017} performed an analysis on elemental abundances for 16 different elements on 158 red giant stars suggesting that this low SFR dwarf galaxy needed a top-light IMF. Nevertheless, here the argument is not that the observationally suggested $\alpha_3^{\mathrm{gal}}$--SFR relation must be true, but that the apparent agreement between this suggested relation and our derived relation from the locally valid observations and our theory is remarkable. The general shape of the IGIMF model's prediction (gray lines in Fig.~\ref{fig:alpha3SFR}) follows the empirical extra-galactic constraints well and the results calculated here are comparable to previous work (\citealt{Weidner2013b,Gargiulo2015} \footnote{They both use the assumption $\beta=2$ while our $\beta$ is 2 only when $\log_{10}($SFR$)=0$ and varies from 1.5 to 2.5. This difference makes our result steeper as shown in Fig.~\ref{fig:alpha3SFR}.}). Although the comparison with the IGIMF slopes is illustrative rather than quantitative as the observational constraints are obtained by assuming the galaxy-wide IMF to be a single power-law function, this is still particularly encouraging. We emphasize as a central point that this is a remarkable outcome because the IGIMF model's prediction as shown in Fig.~\ref{fig:alpha3SFR} is sensitive to Eqs.~\ref{eq:alpha_3} and \ref{eq:beta-SFR}, i.e., the $\alpha_3$--$\rho_{\rm cl}$ and $\beta$--SFR relations, which are independently determined by different empirical data\footnote{We do simplify the empirical format of Eq.~\ref{eq:beta-SFR} in comparison with \cite{Weidner2013b} but follow the same parameters.}. The good agreement between the modeled $\alpha_3^{\mathrm{gal}}$--SFR relation and the observations is a natural result of the IGIMF theory. \subsection{$m_{\mathrm{str,max}}$--SFR}\label{secsub:mmax-SFR} Fig.~\ref{fig:MmaxSFR} shows the most-, second- and third-most massive star in a galaxy as a function of the SFR of the galaxy. It results from a combination of Fig.~\ref{fig:MmaxMecl} and Fig.~\ref{fig:SFRMecl}. \begin{figure}[hbt] \center \includegraphics[width=9cm]{SFRMmax} \caption{The optimally-sampled most-, second- and third-most massive star to be found in a galaxy as a function of the galaxy-wide SFR are shown as solid curve, \textcolor{blue}{blue dashed curve} and \textcolor{green}{green dotted curve}, respectively, resulting from a combination of Fig.~\ref{fig:MmaxMecl} and Fig.~\ref{fig:SFRMecl}. The thin horizontal dashed line indicates the mass-limit below which SNII explosions are not likely ($8\,$M$_\odot$), and the vertical thin dashed line shows the SFR below which galaxies are not expected to host SNII events, subject to the axioms adopted in the present study. See Sec.~\ref{secsub:mmax-SFR} for more details.} \label{fig:MmaxSFR} \end{figure} For the here valid axioms Fig.~\ref{fig:MmaxSFR} implies that, if there were no binaries, a galaxy with a SFR $<10^{-4}$ M$_\odot$/yr would have no Type II supernova (SNII) or any other core collapse supernova events, allowing a potential observational test of the IGIMF theory as axiomatized here. However, since most stars are formed as binaries some of these may merge to form a massive star despite the low galaxy-wide SFR. This can result in delayed SNII events (see \citealt{Zapartas2017}). Issues which remain uncertain are however not only that stars in some mass range and metallicity range may implode rather than explode, faking this IGIMF-induced SNII deficit. Also, the ECMF may change its character in dwarf galaxies in that massive embedded clusters may form preferentially in disks with low-shear motions \citep{Weidner2010a}, perhaps implying that below a SFR threshold the ECMF may become bimodal by containing low-mass embedded clusters and a massive one as well. In such a case the IGIMF theory remains valid since the galaxy-wide IMF remains to be the sum over all embedded clusters each of them contributing their own stellar IMF to the galaxy, but the predictions will change with the form of the ECMF. Nevertheless, observations of a putative deficit of SNII events in a particular complete volume of galaxies are important to test the axioms underlying the IGIMF theory. This is why Fig.~\ref{fig:MmaxSFR} is an important quantification for the particular set of axioms made in this study. The occurrence of supernova within the IGIMF theory (but without the variation of $\alpha_3$ as implemented by Eq.~\ref{eq:alpha_3} and \ref{eq:alpha_3_metal} here) has been investigated in more detail by \cite{Weidner2005}. This is qualitatively interesting as \cite{Tsujimoto2011} noted in his chemical modeling of the Formax dSph satellite galaxy the need for a lack of stars more massive than 25 M$_\odot$.\\ In summary, the OSGIMF fulfills the currently-available observational requirements of the $m_{\mathrm{str,max}}$--$M_{\mathrm{ecl}}$, $M_{\mathrm{ecl,max}}$--SFR and $\alpha_3^{\mathrm{gal}}$--SFR relations and can be applied to galaxy evolution studies. A deficit of SNII events in galaxies with low SFRs is expected. \section{DISCUSSION}\label{sec:discussion} \subsection{IGIMF shape}\label{sec:discussion IGIMF shape} The IGIMF shape in Fig.~\ref{fig:IGIMF_SFR_} shows a moderate difference from previous works \citep{Weidner2013b,Fontanot2017} because our assumptions on $\alpha_3(\rho_{\mathrm{cl}})$ and $\beta(\mathrm{SFR})$ are different, and because we use an integration upper limit rather than a maximum object mass in our Eq. \ref{eq:MtotintMecl} and \ref{eq:MeclintMstar} following SPK. For example, equation 3 and 4 of \cite{Fontanot2017}, their "$M_{\mathrm{cl}}^{\mathrm{max}}$" and "$m_{\mathrm{\star}}^{\mathrm{max}}$" were specifically defined and used as the integration upper limit in their equation 8. In the present paper, these values need to be calculated by solving our equation set \ref{eq:MtotintMecl} \& \ref{eq:1intMecl} and equation set \ref{eq:MeclintMstar} \& \ref{eq:1intMstar}. Different assumptions on $\alpha_3(\rho_{\mathrm{cl}})$ and $\beta(\mathrm{SFR})$ result in different IGIMF shapes. We list examples in Appendix \ref{Appendix}.\\ The IGIMF shape can be divided into three parts as is shown in Fig. \ref{fig:IGIMF_SFR_} \& \ref{fig:OSalphaMstar}: (1) Below 1.3 M$_{\odot}$ and given our axioms, the IGIMF shape is identical with the stellar IMF where it has three different slopes i.e., 1.3, 2.3 and $\alpha_3$. The least massive embedded clusters, $M_{\rm ecl}\approx M_{\mathrm{min}} = 5$ M$_{\odot}$, have an optimally-sampled most massive star of $\approx 1.1$ M$_{\odot}$, so every embedded cluster can populate the mass function from 0.08 M$_{\odot}$ to a mass little larger than 1.1 M$_{\odot}$. Thus the lower mass end of the IGIMF is not influenced by cluster mass assignment. This will change if the IMF below 1 M$_{\odot}$ varies with metallicity (equation 3 in \citealt{Kroupa2002}; equation 12 in \citealt{Marks2012a}). (2) For $m>1.1$ M$_{\odot}$ to part three below, $\alpha^{\mathrm{gal}}$ in Eq.~\ref{eq:alpha_gal}, i.e., $\alpha_3^{\mathrm{gal}}$, does not change much as shown in Fig.~\ref{fig:OSalphaMstar} and \ref{fig:alpha3SFR} especially for the high SFR cases. When SFR $<1$ M$_{\odot}/$yr (or equivalently $\beta>2$ from Eq. \ref{eq:beta-SFR}), there is a deficit of massive clusters that are able to generate massive stars. Thus the slope of the IGIMF at the high mass end, $\alpha_3^{\mathrm{gal}}$, is largely influenced by the number of massive embedded clusters, i.e., it depends on $\beta$. When SFR $>1$ M$_{\odot}/$yr ($\beta<2$), there are enough massive embedded clusters to fully populate the IMF. So a larger SFR resulting in more massive clusters would not change the shape of the galaxy-wide IMF anymore. Under this condition, $\alpha_3^{\mathrm{gal}}$ is only influenced by Eq.~\ref{eq:xi_star} \& \ref{eq:alpha_3}, where the IMF index $\alpha_3$ changes according to the physical condition of the molecular cloud that forms the star cluster. (3) After the second part of the IGIMF with a relatively constant slope, the IGIMF bends down rapidly and behaves like a Schechter-type function for SFR $<10^{-3}$ M$_{\odot}$/yr at the high mass end. \subsection{OSGIMF shape}\label{secsub:OSGIMF shape} The OSGIMF mimics the IGIMF but shows additional features. It differs from the IGIMF because the optimally-sampled result is a discrete function under binning. If all the clusters in the model would have the same mass, optimal sampling will generate the same list of stars for all these clusters. This leads to gaps between the sampled stellar masses and peaks at the sampled masses. In reality, clusters with different masses can smoothen this effect. With the currently used ECMF (\ref{axiom: ECMF} in Sec.\ref{sec:Model-IGIMF}), there exists a large fraction of clusters with mass $M_{\mathrm{ecl}} \approx$ 5 or 6 M$_{\odot}$. The serrated features are the legacy of these clusters. Only when the ECMF slope $\beta<2.1$, there can be enough high mass clusters all with different masses to smoothen out the serrated feature. If a smoothly varying probability distribution of cluster masses is assumed at the mass boundaries rather than the sharp-edged ECMF in Eq.~\ref{eq:xi_ecl}, there would also be no serrated features. The above discussion only applies to the perfect deterministic scenario. Although astrophysical nature shows evidence to be closer to deterministic, i.e., a high level of self-regulation, it still possesses some level of randomness due to additional parameters not known to the theory. For instance, the angular momenta of clouds when star clusters form are not likely to be the same. This can result in a different stellar list for the embedded star clusters with the same mass and smoothen the final result. For the present purpose, here we point out that if nature is somewhere close to the optimal sampling of stellar masses, there will be physical consequences. In particular the SFRs, stellar-mass buildup times and gas-depletion time scales of galaxies are affected significantly \citep{Pflamm-Altenburg2007,Pflamm-Altenburg2008,Pflamm-Altenburg2009ApJ}. Different sampling methods with the same cluster scale IMF actually lead to different physical results. If the serrated feature is detected, it will strongly support optimal sampling and give direct information on the ECMF. \section{CONCLUSIONS}\label{sec:CONCLUSIONS} We have updated the $m_{\mathrm{str,max}}$--$M_{\mathrm{ecl}}$ and $M_{\mathrm{ecl,max}}$--SFR relation with newest observations. Comparison of the optimal sampling and random sampling predictions, indicates that the optimal sampling scenario is favored. The $\alpha_3^{\mathrm{gal}}$--SFR relation as a natural outcome of the IGIMF theory is also updated. It agrees with the observationally suggested trend. For the first time, optimal sampling is introduced in the context of the IGIMF theory to generate a list of definite masses of stars in a galaxy. As a side effect, this also makes the sampling of stellar masses in a very massive galaxy computationally efficient\footnote{Unlike random sampling, the optimal sampling follows a deterministic equation, giving a quick method to calculate the number of stars in a given mass range without sampling each star one by one.}. We test and apply the improved optimal sampling and normalization method to further constrain the IGIMF theory. A prediction of the IGIMF model as defined by the here adopted axioms is that dwarf galaxies with SFR $<10^{-4}$ M$_\odot$/yr should host no SNII events in the absence of binary stars. The OSGIMF largely agrees with previous IGIMF studies and shows a special serrated structure that previous integration calculations did not contain. This structure, if existing, will be strong evidence for a deterministic and self-regulated star formation process. Finally, we provide the publicly available Python computer module GalIMF for general use. \medskip
\section{Introduction} The celebrated Pontryagin maximum principle \cite{pontryagin1962} is a powerful tool for analyzing continuous-time optimal control problems for finite-dimensional nonlinear control systems. Since its discovery in the late 1950s, a considerable amount of effort has been spent in extending the maximum principle in various directions, which has resulted in a significant amount of literature. We briefly mention two such directions: the first considers the setting of smooth manifolds instead of Euclidean spaces (see, for example, \cite{AS2004,barbero2009, kipka-ledyaev-2014a, kipka-ledyaev-2015a, sussmann1997}) while the second considers discrete-time optimal control problems for finite-dimensional nonlinear control systems (see, for example, \cite{boltyanskii1978, mordukhovich2006b} or \cite{bourdin2013} and references therein). As discussed in \cite{bourdin2013}, the formulation of the maximum principle for discrete-time optimal control problems becomes quite tricky since the maximization condition cannot be expected to hold in general and in fact some of the early literature on this topic was mathematically incorrect (see \cite{boltyanskii1978, mordukhovich2006b} for a number of interesting counterexamples). However, the maximization condition does hold under appropriate convexity assumptions on the dynamics and moreover an approximate maximization condition can be derived (under suitable assumptions) in the absence of such assumptions (see \cite[Section 6.4]{mordukhovich2006b}). It is quite surprising to note that there has been almost no investigation into a maximum principle for discrete-time optimal control problems defined on manifolds despite the fact that smooth manifolds arise quite naturally in many practical control problems such as robotics (see, for example, \cite{kobilarov2007, kobilarov2011} and references therein) and spacecraft attitude control (see, for example, \cite{gupta2015, kalabic2016, phogat2015} and references therein). Indeed the interested reader can find a wide variety of geometric control problems in texts such as \cite{AS2004,bloch2003,bullo-lewis2005,jurdjevic1997geometric}. With this motivation, in this paper we obtain necessary conditions for optimality for discrete-time optimal control problems defined on manifolds and thereby arrive at a maximum principle for such problems. The maximum principle is in fact a necessary condition for a control to be \emph{critical} for a cost function, though such a control may not be minimizing. In many cases it is useful to consider necessary conditions for a control to be $\Delta$-\emph{critical} for $\Delta \ge 0$. In particular, this paper is concerned with careful analysis of $\Delta$-critical points for a function \begin{equation} \label{eq:jdef} J(\s{u}) = \ell(q_n) + \sum_{i = 0}^{n-1} L_i(q_i,u_i), \end{equation} where $(u_i)_{i = 0}^{n-1}$ is a control sequence generating a state sequence $(q_i)_{i = 0}^n$ through a discrete-time geometric control system (see Definition \ref{defn:dgcs}). For $\Delta = 0$ such controls are critical points of $J$ in a classical sense. For $\Delta > 0$ the notion of $\Delta$-critical controls is closely related to that of \emph{strong slope} introduced in \cite{de1980problems}. The reader can find a number interesting applications of strong slope in \cite{guler2010foundations} and our definition of $\Delta$-critical, below in Definition \ref{defn:critical}. \subsection{Organization and Contributions} This paper is organized as follows. In the section following we establish novel necessary conditions for $\Delta$-critical controls: Theorem \ref{thm:dmp}. As first applications of Theorem \ref{thm:dmp} we ($i$) derive a discrete-time geometric maximum principle applicable to a wide variety of control problems, including those arising from discretization schemes such as those of Hans Munthe-Kaas \cite{munthe1999high} and ($ii$) relate critical controls to structure-preserving variational integrators for Lie groups \cite{lee2005lie}. This section concretely demonstrates that the maximum principle for discrete-time optimal control problems and the Hamiltonian formulation of variational integrators are different manifestations of the same phenomenon. We then turn to questions of exact penalization for constrained problems on manifolds, beginning in Section \ref{sec:decrease-princ} with a derivation of a decrease principle in a geometric setting. Such principles are well studied and of much use in optimization \cite{clarke2013, penot2013} and indeed have been considered before in the geometric setting \cite{azagra2007applications}. The main result of this section, Theorem \ref{thm:penalty}, is closely related to the decrease condition and solvability theorem of \cite{azagra2007applications} (see \cite{clarkeand1998} for proofs in the Hilbert space setting). We provide a novel proof in terms of Fr\'echet subgradient without the assumption that the underlying Riemannian manifold is complete. In addition, while the propositions of \cite{azagra2007applications} require local assumptions on the norm of the subgradient, Theorem \ref{thm:penalty} requires assumptions only on a closed set and its Clarke tangent cone. Finally, the conditions of Theorem \ref{thm:penalty} are given in terms of directional derivatives rather than norms of subdifferentials. As such these conditions have a direct interpretation in terms of discrete-time controllability. Following this we introduce a new constraint qualification, \emph{strict $\varphi_i$-normality}, for discrete-time geometric control problems. We show in Section \ref{sec:decrease-princ} that strict $\varphi_i$-normality may be used to state sufficient conditions for exact penalization and for calmness of the value function in a geometric setting. In the final section of the paper we apply techniques of exact penalization to derive maximum principles for discrete-time geometric control problems with either pure state or mixed constraints. As an illustration of these techniques, we conclude the paper with a discussion of a discrete-time geometric optimal control problem with mixed constraints given by a family of smooth inequality constraints $g_j(q_i, u_i) \le 0$, although we emphasize that the results developed below are quite general and are by no means limited to inequality constraints. Before continuing we provide the main definitions, notations, and standing assumptions used in this paper. \subsection{Definitions, Notations, and Standing Assumptions} \begin{definition} \label{defn:dgcs} A \emph{discrete-time geometric control system} is a collection of finite-\\dimensional manifolds $Q$ and $\left\{U_i\right\}_{i = 0}^{n-1}$, not necessarily of the same dimension; a finite collection of closed sets $\U_i \subseteq U_i$; and a finite collection $\left\{F_i\right\}_{i = 0}^{n-1}$ of mappings $F_i : Q \times U_i \rightarrow Q$. \end{definition} We write $\cU \subset \prod_{i = 0}^{n-1} U_i$ for the set of all $\s{u}$ satisfying $u_i \in \U_i$ for $0 \le i \le n-1$. \begin{definition} A sequence $\s{u} \in \cU$ is said to be a \emph{control sequence}. \end{definition} \begin{definition} Given a control sequence $\s{u}$ and initial state $q_0$, a \emph{state sequence} is the sequence $(q_i)_{i = 0}^n$ determined for $1 \le i \le n$ through \begin{equation} \label{eq:update-rule} q_i = F_{i-1}(q_{i-1}, u_{i-1}). \end{equation} \end{definition} Throughout this paper we denote sequences using bold so that, for example, $\s{q}$ denotes a sequence $\s{q} = \left(q_i\right)_{i = 0}^n$. A sequence of sequences will be denoted $\left(\s{q}_k\right)_{k = 1}^\infty$ so that, for example, $\s{q}_k = \left(q_{k,i}\right)_{i = 0}^n$. Letters $q,r$ refer in all cases to states and $u,c$ to controls. We typically study cost functions $J : \cU \rightarrow \R$ for fixed $q_0$ as defined by \eqref{eq:jdef}, although variations in $q_0$ are considered in Section \ref{subsec:initial-variation}. The following assumptions are in place throughout the paper unless explicitly stated otherwise. \textbf{Standing Assumptions:} \emph{Functions $\ell$ and $L_i$ in \eqref{eq:jdef} are locally Lipschitz; the maps $F_i$ in \eqref{eq:update-rule} are $C^1$-smooth; and the manifolds $U_i$ are Riemannian with metric $g_i$.} We remark that the assumption of a Riemannian structure on $U_i$ is made without loss of generality. These metrics induce a product metric $g$ on $\prod_{i = 0}^{n-1}U_i$ through \begin{equation*} g(\s{v}, \s{w}) \colonequals \sum_{i = 0}^{n-1} g_i(v_i, w_i). \end{equation*} Finally, we will denote the pushforward of a map $F : M \rightarrow N$ through $DF(q) : T_qM \rightarrow T_{F(q)}N$ and the pullback through $DF(q)^* : T^*_{F(q)}N \rightarrow T^*_qM$. Often we will have need to write $D_q F(q,u) : T_q Q \rightarrow T_{F(q,u)}Q$ for the partial derivative of $F$ with respect to $q$. Likewise, we may write $d_q L_i(q,u) \in T_q^* Q$ for the partial exterior derivative of $L_i : Q \times U_i \rightarrow \R$. \subsubsection{Nonsmooth Analysis} Techniques of nonsmooth or variational analysis play a central role in this paper. Here we provide definitions for the particular subgradients, normal cones, and tangent cones used in the paper. A useful introduction to the techniques of nonsmooth analysis on smooth manifolds can be found in \cite{ledyaevzhu2007}. We recommend \cite{clarke2013} or \cite{clarkeand1998} for an introduction to nonsmooth analysis in the context of optimization and control. We also mention as useful references the books \cite{borweinzhu2005,schirotzek2007} and the comprehensive volumes \cite{mordukhovich2006a,mordukhovich2006b}. \begin{definition} \label{defn:lipschitz} A function $f : M \rightarrow \R$ is \emph{locally Lipschitz} at $q \in M$ if there exists a coordinate chart $\varphi : M \rightarrow \R^d$ whose domain $\cO$ includes $q$ such that the function $f \circ \varphi^{-1} : \R^d \rightarrow \R$ is Lipschitz on $\varphi(\cO)$. \end{definition} \begin{remark} When $M$ is Riemannian with distance function $d$, Definition \ref{defn:lipschitz} is equivalent to the usual metric space definition and we use the two interchangeably in this case. \end{remark} \begin{definition} For $f : M \rightarrow \R$ locally Lipschitz, the \emph{lower Dini derivative} is defined, for $v \in T_qM$, by \begin{equation*} \underline{D}f(q;v) \colonequals \liminf_{\lambda \downarrow 0} \frac{f(c_v(\lambda)) - f(q)}{\lambda} \end{equation*} where $c_v : \R \rightarrow M$ is any smooth curve satisfying $c_v^\prime(0) = v$. \end{definition} \begin{definition} A function $f : M \rightarrow \R \cup \left\{\infty\right\}$ is \emph{lower semicontinuous} at $q \in M$ if for any sequence $(q_n)_{n = 1}^\infty$ converging to $q$ there holds \begin{equation*} f(q) \le \liminf_{n \rightarrow \infty} f(q_n). \end{equation*} \end{definition} \begin{definition} \label{defn:frechet} A covector $p \in T_q^*M$ is a \emph{Fr\'echet subgradient} for a lower semicontinuous function $f$ at $q$ if there exists a $C^1$-smooth function $g : M \rightarrow \R$ such that $p = dg(q)$ and $f - g$ has a local minimum at $q$. The \emph{Fr\'echet subdifferential} $\pF f(q)$ is the (possibly empty) set of all such covectors. \end{definition} \begin{definition} \label{defn:limiting} A covector $p \in T_q^*M$ is a \emph{limiting subgradient} for a lower semicontinuous function $f$ at $q$ if there exist sequences $q_n \rightarrow q$ and $p_n \in \pF f(q_n)$ such that $f(q_n) \rightarrow f(q)$ and $p_n \rightarrow p$. The \emph{limiting subdifferential} $\pL f(q)$ is the (possibly empty) set of all such covectors. \end{definition} Occasionally we will have need for the partial limiting subgradient $\pu f(q,u)$, which is simply the limiting subgradient of the function $u \mapsto f(q,u)$. \begin{definition} \label{defn:limiting-normal} Given a closed set $S \subset M$, the \emph{limiting normal cone} to $S$ at $s \in S$ is the set $N_S^L(s) \colonequals \pL \chi_S(s)$, where $\chi_S : M \rightarrow \R \cup \left\{\infty\right\}$ is the function \begin{equation*} \chi_S(s) \colonequals \begin{cases} \hspace{4pt} 0 &s \in S \\ \hspace{1.5pt} \infty &s \not \in S. \end{cases} \end{equation*} \end{definition} \begin{definition} \label{defn:clarke-tangent} The \emph{Clarke tangent cone} $T_S^C(q)$ to $S$ at $q$ is the polar of the limiting normal cone: \begin{equation*} T_S^C(q) \colonequals \left\{v \in T_q M \, : \, \left<p,v\right> \le 0 \; \mathrm{for} \; \mathrm{all} \; p \in N_S^L(q)\right\}. \end{equation*} \end{definition} It can be useful to study $\pL f(q)$, $N_S^L(q)$, and $T_S^C(q)$ in local coordinates. In this direction we mention \cite[Theorem 4.1]{ledyaevzhu2007}: \begin{theorem} \label{thm:subgrad-invariance} Let $f : \R^d \rightarrow \R \cup \left\{ \infty\right\}$ be lower semicontinuous, $\cO \subset M$ an open set, and $\varphi : \cO \rightarrow \R^d$ a $C^1$-smooth diffeomorphism. If $x\colonequals \varphi(q)$ then \begin{equation} \label{eq:subgrad-invariance} \pL (f \circ \varphi)(q) = \varphi^* \pL f(x). \end{equation} \end{theorem} If we are given a closed set $S \subset M$, a point $q \in S$, and a coordinate chart $\varphi : M \rightarrow \R^d$ whose domain $\cO$ includes $q$ then we can write $x \colonequals \varphi(q)$ and obtain from \eqref{eq:subgrad-invariance} the useful formula \begin{equation} \label{eq:local-normal} N_S^L(q) = \varphi^* N_{\varphi(S \cap \cO)}^L(x). \end{equation} Although in general $\varphi(S \cap \cO) \subset \R^d$ may not be a closed set, Definition \ref{defn:limiting-normal} continues to make sense in \eqref{eq:local-normal} because the function $\chi_{\varphi(S \cap \cO)}$ is lower semicontinuous on a neighborhood of $x$. Likewise, the reader may wish to check the dual formula \begin{equation} \label{eq:local-tangent} \varphi_* T_S^C(q) = T_{\varphi(S \cap \cO)}^C(x), \end{equation} which is itself a consequence of \eqref{eq:local-normal} and Definition \ref{defn:clarke-tangent}. As a consequence of \eqref{eq:local-tangent}, the Clarke tangent cone retains on manifolds many of the attractive features developed in \cite{clarkeand1998} for Banach spaces. Finally, we will have need for the following theorem, which is a geometric version of a result due to Subbotin \cite{subbotin1991property}: \begin{theorem} \label{thm:subbotin} Let $V \subset T_qM$ be a compact, convex set and $f : M \rightarrow \R$ locally Lipschitz. For any \begin{equation*} \rho \le \inf_{v \in V} \underline{D}f(x;v) \end{equation*} there exists $p \in \pL f(x)$ such that \begin{equation*} \rho \le \inf_{v \in V} \left< p,v\right>. \end{equation*} \end{theorem} \begin{proof} A version of this Theorem for $M = \R^d$ can be obtained by combining Theorem 3.4.2 and Proposition 3.4.5 in \cite{clarkeand1998}. The general manifold case can then be obtained using the local coordinate formula of Theorem \ref{thm:subgrad-invariance}. \end{proof} \section{Necessary Conditions for Approximate Critical Points} We turn now to the first result of this paper, a necessary condition for control $\s{u}$ to be approximately critical in the following sense: \begin{definition} \label{defn:critical} Control $\s{u}$ is \emph{$\Delta$-critical} ($\Delta \ge 0$) for function $J : \cU \rightarrow \R$ if for any $\s{v} \in T_{\cU}^C(\s{u})$ there holds \begin{equation} \label{eq:defn-critical} - \Delta \left\|\s{v} \right\|_g \le \underline{D}J(\s{u}; \s{v}). \end{equation} In the case where $\Delta = 0$ we simply say that $\s{u}$ is \emph{critical}. \end{definition} We mention that in the theorem following \eqref{eq:endpoint-condition} is in analogy with the transversality condition of the classical maximum principle; \eqref{eq:discrete-adjoint} with the adjoint equations; and \eqref{eq:discrete-amp} with the maximum principle and indeed our proof uses techniques related to those in \cite{kipka-ledyaev-2014a}. These connections are made stronger in later sections. \begin{theorem} \label{thm:dmp} If $\s{u} \in \cU$ is $\Delta$-critical for $J$ then, under the standing assumptions, there exist sequences $\s{a} = (a_i)_{i = 1}^n$ and $\s{b} = (b_i)_{i = 0}^{n-1}$ with $a_n \in \pL \ell(q_n)$, $b_0 \in \pu L_0(q_0, u_0)$, and $(a_i, b_i) \in \pL L_i(q_i, u_i)$ which determine a sequence of costates $p_i \in T_{q_i}^*Q$ for $1 \le i \le n$ through \begin{align} \label{eq:endpoint-condition} -p_n & = a_n \in \pL \ell(q_n)\\ \label{eq:discrete-adjoint} p_{i-1} &= -a_{i-1} + D_q F_{i-1}(q_{i-1}, u_{i-1})^* p_i \hspace{10pt} (2 \le i \le n) \end{align} satisfying for all $v \in T_{\U_i}^C(u_i)$ \begin{equation} \label{eq:discrete-amp} - \Delta \left\|v\right\|_g \le \left<b_i - D_u F_i(q_i,u_i)^* p_{i+1}, v \right> \hspace{10pt} (0 \le i \le n-1). \end{equation} \end{theorem} \begin{proof} With $\s{u}$, $\Delta$, and $J$ as above we denote by $\s{q}$ the state sequence associated with $\s{u}$. Fix a vector $\s{v} \in T_{\cU}^C(\s{u})$, let $\s{u}(\lambda)$ denote a smooth curve taking values in $\prod_{i = 0}^{n-1} U_i$ and satisfying $\s{u}^\prime(0) = \s{v}$, and write $\s{q}(\lambda)$ for the corresponding state sequence. We introduce, for $0 \le i < j \le n$, mappings $\cF_{i,j} : T_{q_i}M \rightarrow T_{q_j}M$ defined by \begin{equation*} \cF_{i,j} \colonequals D_qF_{j-1}(q_{j-1}, u_{j-1}) \circ \dots \circ D_q F_{i}(q_{i}, u_{i}) \end{equation*} We let $\cF_{i,i}$ denote the identity map on $T_{q_i}M$ so that $\cF_{i,j}$ is defined for $0 \le i \le j \le n$. \begin{lemma} With $q_j(\lambda)$ and $\s{v} = (v_i)_{i = 0}^{n-1} \in T_{\cU}^C(\s{u})$ defined as above there holds \begin{equation} \label{eq:flow-derivative} q_j^\prime(0) = \sum_{i = 0}^{j-1} \cF_{i+1,j} D_uF_i(q_i,u_i)v_i. \end{equation} \end{lemma} \begin{proof} We leave it to the reader to check that \eqref{eq:flow-derivative} holds for $j = 0$ and $j = 1$ and we proceed to prove the formula for $j > 1$ through induction. Fix $j > 1$ and suppose that \eqref{eq:flow-derivative} holds for $j-1$. Then \begin{equation*} \begin{aligned} q_j^\prime(0) & = \left. \frac{d }{d \lambda} \right|_{\lambda = 0} F_{j-1}(q_{j-1}(\lambda),u_{j-1}(\lambda)) \\ & = D_q F_{j-1}(q_{j-1}, u_{j-1}) q_{j-1}^\prime(0) + D_u F_{j-1}(q_{j-1}, u_{j-1})v_{j-1}. \end{aligned} \end{equation*} From the induction hypotheses there now follows \begin{equation} \label{eq:variational-step} \begin{aligned} q_j^\prime(0) & = D_q F_{j-1}(q_{j-1}, u_{j-1}) \sum_{i = 0}^{j-2} \cF_{i+1,j-1} D_uF_i(q_i,u_i)v_i + D_u F_{j-1}(q_{j-1}, u_{j-1})v_{j-1} \\ & = \sum_{i = 0}^{j-2} \cF_{j-1,j}\cF_{i+1,j-1} D_uF_i(q_i,u_i)v_i +\cF_{j,j} D_u F_{j-1}(q_{j-1}, u_{j-1})v_{j-1}. \end{aligned} \end{equation} Using the definition one may check that the maps $\cF_{i,j}$ satisfy the following semigroup law: \begin{equation} \label{eq:forward-semigroup} \cF_{j,k} \circ \cF_{i,j} = \cF_{i,k} \hspace{10pt} (0 \le i \le j \le k \le n). \end{equation} Thus \eqref{eq:variational-step} can be simplified to \begin{equation*} q_j^\prime(0) = \sum_{i = 0}^{j-2} \cF_{i+1,j} D_uF_i(q_i,u_i)v_i +\cF_{j,j} D_u F_{j-1}(q_{j-1}, u_{j-1})v_{j-1} \end{equation*} and this is the same as \eqref{eq:flow-derivative}. \end{proof} We now consider the manifold \begin{equation*} M \colonequals U_0 \times \dots \times U_{n-1} \times \underbrace{Q \times \dots \times Q}_{n\text{-}\mathrm{copies}} \end{equation*} and we denote elements of $M$ through $(\s{c}, \s{r}) = (c_0,\dots, c_{n-1}, r_1, \dots , r_n)$ in order to match indices on controls and states. Let $\mathcal{J} : M \rightarrow \R$ be the function \begin{equation*} \mathcal{J}(\s{c}, \s{r}) = \ell(r_n) + L_0(q_0, c_0) + \sum_{i = 1}^{n-1} L_i(r_i,c_i) \end{equation*} and let $V \subseteq T_{(\s{u},\s{q})}M$ denote the set \begin{equation*} V\colonequals\left\{ \left(v_0, \dots, v_{n-1}, q_1^\prime(0), \dots ,q_n^\prime(0) \right) \, : \, \s{v} \in T_{\cU}^C(\s{u}), \; \left\|\s{v}\right\|_g \le 1\right\}, \end{equation*} where $(q_i(\lambda))_{i = 1}^n$ is the variation of the state $\s{q}$ corresponding to $\s{v}$. We write $(\s{v},\s{w})$ for any such vector and index $(\s{v},\s{w})$ as $(v_0,\dots, v_{n-1}, w_1, \dots, w_n)$. Because $\mathcal{J}$ is locally Lipschitz, \eqref{eq:defn-critical} implies that \begin{equation*} - \Delta \le \inf_{(\s{v},\s{w}) \in V} \underline{D}\mathcal{J}(\s{u}, \s{q} ;\s{v}, \s{w}) \end{equation*} and this formula holds for any $(\s{v}, \s{w}) \in V$. Moreover, $T_{\cU}^C(\s{u})$ is closed and convex and so formula \eqref{eq:flow-derivative} with the constraint $\left\|\s{v}\right\|_g \le 1$ imply that $V$ is both compact and convex. Applying Theorem \ref{thm:subbotin} we obtain $(\s{b}, \s{a}) \in \pL \mathcal{J}(\s{u}, \s{q})$ for which \begin{equation*} -\Delta \le \inf_{(\s{v},\s{w}) \in V} \left<(\s{b}, \s{a}), (\s{v},\s{w}) \right>. \end{equation*} Indexing $(\s{b}, \s{a})$ as $(b_0, \dots, b_{n-1}, a_1, \dots, a_n)$ we check that $b_0 \in \pu L_0(q_0, u_0)$, $a_n \in \pL \ell(q_n)$, $(a_i, b_i) \in \pL L_i(q_i, u_i)$ for $1 \le i \le n-1$, and for $\s{v} \in T_{\cU}^C(\s{u})$ with $\left\|\s{v}\right\|_g \le 1$ \begin{equation*} -\Delta \le \sum_{i = 0}^{n-1} \left<b_i, v_i \right> + \sum_{j = 1}^n \left< a_j, q_j^\prime(0) \right>. \end{equation*} Using \eqref{eq:flow-derivative} we write this as \begin{equation} \label{eq:unit-vector-step-pmp} -\Delta \le \sum_{i = 0}^{n-1} \left<b_i, v_i \right> + \sum_{j = 1}^n \sum_{i = 0}^{j-1} \left< a_j, \cF_{i+1,j}D_u F_i(q_i,u_i)v_i \right>. \end{equation} Since \eqref{eq:unit-vector-step-pmp} holds for all unit vectors in the cone $T_{\cU}^C(\s{u})$, the inequality \begin{equation*} -\Delta \left\|\s{v}\right\|_g \le \sum_{i = 0}^{n-1} \left<b_i, v_i \right> + \sum_{j = 1}^n \sum_{i = 0}^{j-1} \left< a_j, \cF_{i+1,j}D_u F_i(q_i,u_i)v_i \right> \end{equation*} holds for all vectors $\s{v} \in T_{\cU}^C(\s{u})$. Rearranging the double sum we obtain \begin{equation*} -\Delta \left\|\s{v}\right\|_g \le \sum_{i = 0}^{n-1} \left<b_i, v_i \right> + \sum_{i= 0}^{n-1} \sum_{j = i+1}^{n} \left< a_j, \cF_{i+1,j}D_u F_i(q_i,u_i)v_i \right> \end{equation*} thus proving that for all $\s{v} \in T_{\cU}^C(\s{u})$ \begin{equation} \label{eq:amess} -\Delta \left\|\s{v}\right\|_g \le \sum_{i = 0}^{n-1} \left<b_i, v_i \right> + \sum_{i= 0}^{n-1} \left< D_u F_i(q_i,u_i)^*\sum_{j = i+1}^{n} \cF_{i+1,j}^* a_j, v_i \right>. \end{equation} We now define a sequence $(p_i)_{i =1}^{n}$ through $p_i = -\displaystyle \sum_{j = i}^n \cF_{i,j}^* a_j$ so that \eqref{eq:amess} is \begin{equation*} -\Delta \left\|\s{v}\right\|_g \le \sum_{i = 0}^{n-1} \left<b_i-D_u F_i(q_i,u_i)^*p_{i+1}, v_i \right>. \end{equation*} Recalling that $T_{\cU}^C(\s{u}) = T_{\U_0}^C(u_0) \times T_{\U_1}^C(u_1) \times \dots \times T_{\U_{n-1}}^C(u_{n-1})$, which follows from \eqref{eq:local-tangent} and \cite[page 85]{clarkeand1998}, and choosing the vector $(0, \dots, 0, v, 0, \dots, 0)$ for arbitrary $v \in T_{\U_i}^C(u_i)$ we obtain \eqref{eq:discrete-amp}. We note that $-p_n = a_n \in \pL \ell(q_n)$ and for $1 \le i \le n$ we have $p_i \in T_{q_i}^*M$. All that remains is to check that \eqref{eq:discrete-adjoint} holds. For this we note that \eqref{eq:forward-semigroup} implies \begin{equation} \label{eq:semigroup} \cF_{i,j}^* \circ \cF_{j,k}^* = \cF_{i,k}^* \hspace{10pt} (0 \le i \le j \le k \le n) \end{equation} For any $2 \le i \le n$, the definition of $p_i$ and the relation \eqref{eq:semigroup} imply the equalities \begin{align*} p_{i-1} &= -\sum_{j = i-1}^n \cF_{i-1,j}^* a_j = -a_{i-1} - \cF^*_{i-1,i} \sum_{j = i}^n \cF_{i, j}^* a_j \\ &= - a_{i-1} + D_q F_{i-1}(q_{i-1}, u_{i-1})^* \left(-\sum_{j = i}^n \cF_{i, j}^* a_j \right) \end{align*} and this is precisely \eqref{eq:discrete-adjoint}. \end{proof} \subsection{Varying the Initial State} \label{subsec:initial-variation} In certain applications it can be useful to allow variations in the initial state, $q_0$. Since we have assumed that the sets $U_i$ are manifolds, it is interesting to study this case by considering the initial state $q_0$ to be a control. In particular, let $J : Q \times \cU \rightarrow \R$ be defined by \begin{equation} \label{eq:cost-with-initial-condition} J(q_0,\s{u}) = \kappa(q_0) + \ell(q_n) + \sum_{i = 0}^{n-1} L_i(q_i, u_i), \end{equation} where $\kappa : Q \rightarrow \R$. We suppose that initial state $q_0$ is required to lie a closed set $S \subset Q$ and generalize Definition \ref{defn:critical} as follows: \begin{definition} \label{defn:general-critical} State $q_0$ and control $\s{u} \in \cU$ are \emph{$\Delta$-critical} ($\Delta \ge 0$) for function $J$ defined by \eqref{eq:cost-with-initial-condition} if for any $w \in T_S^C(q_0)$ and $\s{v} \in T_{\cU}^C(\s{u})$ there holds \begin{equation} \label{eq:gen-defn-critical} - \Delta \left(\left\|w\right\|^2+\left\|\s{v} \right\|^2\right)^{1/2} \le \underline{D}J(q_0,\s{u};w, \s{v}). \end{equation} \end{definition} \begin{theorem} \label{thm:dmp-initial-variation} If $q_0 \in Q$ and $\s{u} \in \cU$ are $\Delta$-critical for $J$ in the sense of Definition \ref{defn:general-critical}, the standing assumptions hold, and $\kappa : Q \rightarrow \R$ is locally Lipschitz, then there exist sequences $\s{a} = (a_i)_{i = 1}^n$ and $\s{b} = (b_i)_{i = 0}^{n-1}$ with $a_n \in \pL \ell(q_n)$, $b_0 \in \pu L_0(q_0, u_0)$, and $(a_i, b_i) \in \pL L_i(q_i, u_i)$ which determine a sequence of costates $p_i \in T_{q_i}^*Q$ ($0 \le i \le n$) through \eqref{eq:endpoint-condition} \begin{equation*} p_{i-1} = -a_{i-1} + D_q F_{i-1}(q_{i-1}, u_{i-1})^* p_i \hspace{10pt} (1 \le i \le n) \end{equation*} satisfying \eqref{eq:discrete-amp} for all $v \in T_{\U_i}^C(u_i)$. In addition, there exists $\beta \in \pL \kappa(q_0)$ such that for all $v \in T_S^C(q_0)$ \begin{equation} \label{eq:p0-condition} - \Delta \left\|v\right\| \le \left<\beta - p_{0}, v \right>. \end{equation} \end{theorem} \begin{proof} Define a collection of Riemannian manifolds $\left\{U_i\right\}_{i = -1}^{n-1}$ by setting $U_{-1} = Q$ and $U_i = U$ for $0 \le i \le n-1$ and let $\what{F}_i : Q \times U_i \rightarrow Q$ be given by \begin{equation*} \what{F}_{-1}(q,\wtilde{q}) \colonequals \wtilde{q}, \, \what{F}_i(q,u) \colonequals F_i(q,u) \hspace{10pt} (0 \le i \le n-1). \end{equation*} Let $\what{L}_i : Q \times U_i \rightarrow \R$ be \begin{equation*} \what{L}_{-1}(q,\wtilde{q}) \colonequals \kappa(\wtilde{q}), \, \what{L}_i(q,u) \colonequals L_i(q,u) \hspace{10pt} (0 \le i \le n-1). \end{equation*} We agree to write $q_{-1} \colonequals q_0$ and $\what{\s{w}}$ for controls $(q,\s{w}) \in S \times \cU$. One may then check that because $(q_0, \s{u})$ is $\Delta$-critical for the cost function \eqref{eq:cost-with-initial-condition} in the sense of Definition \ref{defn:general-critical}, the control $\what{\s{u}} \colonequals (q_0, \s{u})$ is $\Delta$-critical for \begin{equation*} \what{J}(\what{\s{w}}) \colonequals \ell(q_n) + \sum_{i = -1}^{n-1} \what{L}_i(q_i, w_i) \end{equation*} in the sense of Definition \ref{defn:critical}. The result now follows from Theorem \ref{thm:dmp}. \end{proof} It's interesting to note that if $T_S^C(q_0) = T_{q_0}^*Q$, for example, if $q_0$ is in the interior of $S$, then \eqref{eq:p0-condition} simplifies to $p_0 \in \pL \kappa(q_0) + \Delta \ol{B}$, where $B$ is the open unit ball in $T_{q_0}^*Q$. \section{Applications} As first applications of Theorem \ref{thm:dmp} we consider in this section ($i$) applications to geometric control systems in the absence of state constraints and ($ii$) applications to variational integrators. A careful study of problems for which there are pure state or mixed constraints will be undertaken below, beginning in Section \ref{sec:decrease-princ}. \subsection{A Discrete-Time Geometric Maximum Principle} \label{sec:discrete-gmp} In continuous-time,\\ the Pontryagin maximum principle is used to study trajectories of control systems \begin{equation} \label{eq:classical-control-system} \dot{q}(t) = f(q(t), u(t)) \end{equation} in which $f : Q \times U \rightarrow TQ$ is a $C^1$-smooth map satisfying $f(q,u) \in T_qQ$ for all $(q,u) \in Q \times U$ \cite{AS2004, barbero2009, kipka-ledyaev-2014a, kipka-ledyaev-2015a, sussmann1997}. In this section we undertake a brief study of discrete-time geometric control systems which the update maps $F_i$ arise through discretization of \eqref{eq:classical-control-system}. Let us suppose we are given finite interval $\left[0,T\right]$ and positive numbers $(h_i)_{i = 0}^{n-1}$ for which $\sum_{i = 0}^{n-1} h_i = T$. If $Q$ is a Riemannian manifold, then a natural generalization of the classical scheme $x_i = x_{i-1} + h_{i-1} f(x_{i-1}, u_{i-1})$ is given by \begin{equation*} q_i \colonequals \exp_{q_{i-1}}\left(h_{i-1} f(q_{i-1}, u_{i-1})\right). \end{equation*} In this case the update map $F_i : Q \times U \rightarrow Q$ factors as \begin{equation} \label{eq:riemannian-factorization} \begin{tikzcd} Q \times U \arrow[rr,"F_i"] \arrow{dr}[swap]{f_i} & & Q \\ & TQ \arrow{ur}[swap]{\exp} \end{tikzcd} \end{equation} More generally, we may replace $\exp : TQ \rightarrow Q$ with a smooth map $E : TQ \rightarrow Q$. For example, because the Riemannian exponential can be expensive to calculate in practice, approximate exponentials $E : TQ \rightarrow Q$ are useful in certain applications; we refer the reader to \cite{absil2007optimization}. Thus it can be desirable consider a more general scheme in which $F_i$ factors as $E \circ f_i$ for a $C^1$-smooth map $E : TQ \rightarrow Q$. On the other hand, one would sometimes like to consider the case in which $F_i$ factors through a Lie algebra. In particular, suppose that $F_i$ factors as \begin{equation} \label{eq:lie-algebra-factorization} \begin{tikzcd} Q \times U \arrow[rr,"F_i"] \arrow{dr}[swap]{f_i \times \pi_1} & & Q \\ & \g \times Q \arrow{ur}[swap]{\lambda} \end{tikzcd} \end{equation} where $\pi_1$ denotes projection onto the first coordinate and $\lambda : \g \times Q \rightarrow Q$ is a left action of a Lie algebra $\g$ on $Q$. For example, the update scheme \begin{equation*} q_i \colonequals \lambda\left( h_{i-1}f(q_{i-1}, u_{i-1}), q_{i-1}\right) \end{equation*} arises naturally in the \emph{Runge-Kutta-Munthe-Kaas} method for numerical solution of ODEs on manifolds \cite{munthe1999high}. We recommend \cite{iserles2000lie} for a comprehensive overview of this and related techniques. With the above examples in mind, we consider in this section a vector bundle $\pi : X \rightarrow Q$ along with a $C^1$-smooth map $E : X \rightarrow Q$. We suppose that the update maps $F_i$ factor as \begin{equation} \label{eq:factorization} \begin{tikzcd} Q \times U \arrow[rr,"F_i"] \arrow{dr}[swap]{f_i} & & Q \\ & X \arrow{ur}[swap]{E} \end{tikzcd} \end{equation} where $f_i : Q \times U \rightarrow X$ are maps satisfying $f_i(q,u) \in X_q \colonequals \pi^{-1}(q)$. This scheme includes \eqref{eq:riemannian-factorization}, \eqref{eq:lie-algebra-factorization}, and others. Let us recall the following: \begin{definition} For a vector bundle $\pi : X \rightarrow Q$ and a smooth map $E : X \rightarrow M$, the \emph{fibre derivative} of $E$ at $v \in X$ is the linear map $\mathbb{F}E_v : X_{\pi(v)} \rightarrow T_{E(v)}M$ defined by \begin{equation*} \mathbb{F}E_v(w) \colonequals \left. \frac{d}{dt} \right|_{t = 0} E(v + t w). \end{equation*} \end{definition} We introduce the following assumptions: \textbf{Assumptions ($\mathsf{A}$):} The maps $F_i$ factor as \eqref{eq:factorization}; the control manifolds $U_i$ are subsets of $\R^{k_i}$ for natural numbers $k_0, \dots, k_{n-1}$; control sets $\U_i$ are closed and convex; mappings $f_i : Q \times \U_i \rightarrow X$ are affine in $u$ for each fixed $q$; and functions $L_i : Q \times \U_i \rightarrow \R$ are convex in $u$ for each fixed $u$. \begin{theorem} \label{thm:discrete-geometric-pmp} Suppose that control $\s{u}$ is a local minimizer for the cost function \eqref{eq:jdef} and that in addition to the standing assumptions, assumptions \textnormal{\textbf{(}}$\mathsf{A}$\textnormal{\textbf{)}} are true. Then there are sequences $(a_i)_{i = 1}^n$ and $(b_i)_{i = 0}^{n-1}$ which satisfy $b_0 \in \pL L_0(q_0, u_0)$, $(a_i, b_i) \in \pL L_i(q_i, u_i)$ for $1 \le i \le n-1$, and $a_n \in \pL \ell(q_n)$ such that the sequence of costates defined by $p_n \colonequals - a_n$ and \eqref{eq:discrete-adjoint} satisfies the maximum principle \begin{equation} \label{eq:max-princ-fiber-version} H_i(u_i, p_{i+1}) = \max_{u \in \U_i} H_i(u, p_{i+1}) \hspace{10pt} (0 \le i \le n-1) \end{equation} where $H_i : \U_i \times T_{q_{i+1}}^* Q \rightarrow \R$ is defined through \begin{equation*} H_i(u,p) \colonequals \left<\mathbb{F}E_{f_i(q_i,u_i)}^* p, f(q_i,u) \right> - L_i(q_i,u). \end{equation*} \end{theorem} \begin{proof} Since $\s{u}$ is a local minimizer for $J$, we have $\underline{D}J(\s{u};\s{v}) \ge 0$ for all $\s{v} \in T_{\cU}(\s{u})$. Applying Theorem \ref{thm:dmp} with $\Delta = 0$ we obtain everything except \eqref{eq:max-princ-fiber-version}. To prove \eqref{eq:max-princ-fiber-version} we first check that because $f$ is control affine \begin{align*} D_u F_i(q,u) \left(v - u\right) &= \left. \frac{d}{dt} \right|_{t = 0} E \left( (1-t) f(q, u) + t f(q,v) \right)\\& = \mathbb{F}_{f(q,u)}E \left(f(q,v) - f(q,u)\right). \end{align*} We next recall \cite[Proposition 2.5.5]{clarkeand1998} that for a closed convex set $\U_i \subset \R^k$ \begin{equation*} T_{\U_i}^C(u_i) = c \ell \bigcup_{t > 0} t \left(\U_i - u_i\right). \end{equation*} Thus inequality \eqref{eq:discrete-amp} implies \begin{equation} \label{eq:sufficient-condition} 0 \le \left<b_i, u - u_i \right> - \left< \mathbb{F}_{f_i(q_i,u_i)}E^* p_{i+1}, f(q_i,u) - f(q_i,u_i) \right> \end{equation} Since $\U_i$ is a convex set and $L$ is convex in control, \eqref{eq:sufficient-condition} is sufficient for \eqref{eq:max-princ-fiber-version}. \end{proof} \subsection{Lie Groups and Variational Integrators} \label{sec:liegroups} We now apply Theorem \ref{thm:dmp} to the study of control problems on Lie groups by allowing controls to be group elements and using multiplication for the update maps. More precisely, suppose that we are given a Lie group $G$ with Lie algebra $\g$, let the control sets $\U$ be given by $\U = U = G$, and consider the control system \begin{equation} \label{eq:multiplication-lie} g_{i} \colonequals g_{i-1} u_{i-1}. \end{equation} Let us agree to identify $TG$ with $G \times \g$ through $T_gG = \left\{ DL_{g}a \, : \, a \in \g\right\}$, where $L_g : G \rightarrow G$ is the left multiplication map $L_g(h) \colonequals gh$. Let $\mu : G \times G \rightarrow G$ denote the multiplication map and $\psi : G \rightarrow \mathrm{Aut}(G)$ the automorphism map $\psi(g)(h) \colonequals ghg^{-1}$. Recall that the \emph{adjoint representation} of $G$ is the map $\mathrm{Ad} : G \rightarrow \mathrm{Aut}(\g)$ given by $\mathrm{Ad}(g) \colonequals D\psi(g)(e)$ and the \emph{coadjoint representation}, which is the map $\mathrm{Ad}^* : G \rightarrow \mathrm{Aut}(\g^*)$ given by $\mathrm{Ad}^*(g) \colonequals \mathrm{Ad}(g^{-1})^*$. For ease of notation, we will write $\mathrm{Ad}^*_g\colonequals\mathrm{Ad}^*(g)$. \begin{theorem} \label{thm:a-lie-group-theorem} If $\s{u}$ is critical for \eqref{eq:jdef} with $F_i$ given by \eqref{eq:multiplication-lie}, $\ell : G \rightarrow \R$ locally Lipschitz, and $L_i : G \times G \rightarrow \R$ $C^1$-smooth, then the sequence $p_i \in \g^*$ defined by \begin{equation} \label{eq:definition-Lie-pi} p_i = d_u L_{i-1}(g_{i-1}, u_{i-1}) \hspace{10pt} (1 \le i \le n) \end{equation} evolves according to \begin{equation} \label{eq:Lie-adjoint} p_{i+1} = \mathrm{Ad}^*_{u_i}( p_i) + \mathrm{Ad}^*_{u_i}( d_gL_i(g_i,u_i)) \hspace{10pt} (1 \le i \le n-1) \end{equation} and satisfies the endpoint condition \begin{equation} \label{eq:Lie-endpoint} -p_n \in \pL \ell(g_n). \end{equation} \end{theorem} \begin{proof} In order to apply Theorem \ref{thm:dmp} we remind the reader of the following lemma: \begin{lemma} \label{lem:derivatives} As maps from $\g$ to $\g$, $D_1 \mu(g,h) = \mathrm{Ad}_{h^{-1}}$ and $D_2 \mu(g,h) = Id_{\g}$. \end{lemma} \begin{proof} Note that $\left. \frac{d}{dt}\right|_{t = 0} g \exp(ta)h = \left. \frac{d}{dt}\right|_{t = 0} gh h^{-1} \exp(ta) h = DL_{gh} \mathrm{Ad}_{h^{-1}}(a)$. The proof for $Id_{\g}$ is similar. \end{proof} Thus from Theorem \ref{thm:dmp} and Lemma \ref{lem:derivatives} we obtain a sequence $(p_i)_{i = 1}^n$ which satisfies \eqref{eq:Lie-endpoint} and \begin{equation} \label{eq:abstract-lie-adjoint} p_i = -d_g L_i(g_i,u_i) + \mathrm{Ad}_{u^{-1}_i}^*(p_{i+1}), \end{equation} Solving \eqref{eq:abstract-lie-adjoint} for $p_{i+1}$ we obtain \eqref{eq:Lie-adjoint}. That $p_i$ satisfies \eqref{eq:definition-Lie-pi} follows from \eqref{eq:discrete-amp}, which holds for all $v \in T_{\U}^C(u_i) = T_{u_i}G$. \end{proof} We point out that \eqref{eq:definition-Lie-pi} corresponds to the discrete-time Legendre transform \begin{equation} \label{eq:discrete-legendre} p = \mathbb{F}^+L(g,u) \colonequals d_u L_i(g,u) \end{equation} defined in \cite{marsden2001}. Indeed there is a deeper connection to the discrete-time mechanics of \cite{marsden2001}. Let us consider the particular case in which $J$ is a function of the type \begin{equation} \label{eq:action-sum} J(\s{u}) = \sum_{i = 0}^{n-1} \left\{h K(u_i) - \frac{h}{2} \varphi(g_i) - \frac{h}{2} \varphi(g_iu_i) \right\}, \end{equation} where $K$ represents a discrete-time kinetic energy and $\varphi$ a potential.\footnote{Strictly speaking, such physical notions are not necessary for Theorem \ref{thm:variational-stepping}. However in most applications such functions correspond to discrete-time action sums (see, for example, \cite{lee2005lie}).} \begin{theorem} \label{thm:variational-stepping} Suppose that $\s{u}$ is critical for a function of the form \eqref{eq:action-sum}, functions $K$ and $\varphi$ are $C^2$-smooth, and $K$ satisfies: \begin{enumerate}[(i)] \item As a smooth map between manifolds, $dK : G \rightarrow \g^*$ is full rank at $e \in G$; \item $dK(e) = 0$. \end{enumerate} Let $p_i$ denote the discrete-time momentum $p_i \colonequals \mathbb{F}^+ L(g_i, u_i)$ and let $m_i \colonequals d\varphi(g_i) \in \g^*$. Then for $1 \le i \le n-1$ and sufficiently small step size $h$, $(g_{i+1}, p_{i+1})$ may be obtained from $(g_i,p_i)$ by solving, first for $u_i$, then $g_{i+1}$, and finally $p_{i+1}$, the equations \begin{align} p_i &= h \left( \mathrm{Ad}^*_{u^{-1}_i} dK(u_i) +\frac{h}{2} m_i \right) \label{eq:moser-veselov} \\ g_{i+1} & = g_iu_i \nonumber \\ \label{eq:lie-adjoint} p_{i+1} &= \mathrm{Ad}^*_{u_i}( p_i) - \frac{h}{2}\mathrm{Ad}^*_{u_i}( m_i) - \frac{h}{2}m_{i+1} . \end{align} \end{theorem} \begin{proof} From Theorem \ref{thm:a-lie-group-theorem} we obtain a sequence $(p_i)_{i = 1}^n$ which evolves according to \eqref{eq:lie-adjoint}. We also obtain from \eqref{eq:definition-Lie-pi} the equation \begin{equation*} p_{i+1} = h dK(u_i) - \frac{h}{2} m_{i+1} \end{equation*} and by plugging this into \eqref{eq:lie-adjoint} and rearranging we obtain \eqref{eq:moser-veselov}. We need only check that \eqref{eq:moser-veselov} is solvable for sufficiently small $h$. To see this, note that by our first assumption on $K$, $dK$ restricts to a diffeomorphism on a neighborhood of $e \in G$. The image of this neighborhood includes $0$ by the second assumption and so equation \eqref{eq:moser-veselov} is uniquely solvable for sufficiently small step size $h$. \end{proof} We remark that for $G = SO(3)$ with \begin{equation*} K(u) = \frac{1}{h} \mathrm{tr} \left( \left(I_{3 \times 3} - u\right)J_d \right) \end{equation*} for $J_d$ a positive definite matrix, this scheme corresponds to the Hamiltonian equations derived in \cite{lee2005lie}. In this case \eqref{eq:moser-veselov} reduces to the famous equation of Moser and Veselov \cite{moser1991}. \section{Exact Penalization and Sensitivity} \label{sec:decrease-princ} For the remainder of the paper we undertake a careful study of necessary optimality conditions for problems of discrete-time geometric optimal control. As before we consider a cost function $J : \cU \rightarrow \R$ defined by \eqref{eq:jdef} and we now suppose that the controls and the states are subject either to pure state constraints of the type $q_i \in S_i \subset Q$ or to mixed constraints of the type $(q_i, u_i) \in S_i \subset Q \times U_i$. We introduce in Section \ref{sec:mixed-constraints} a constraint qualification which corresponds to abnormality of necessary optimality conditions and we derive in that section results on sensitivity of the value function to perturbations in constraints. In Section \ref{sec:pmp-constraints} we present a discrete-time geometric maximum principle. These results are rooted in Clarke's technique of exact penalization and in this section we prove a lemma which provides the link between abnormality of constraints and exact penalization. Since we will make extensive use of the exact penalization technique in the remainder of this paper, we present it here and refer the reader to \cite{clarkeand1998} for further applications. Let us recall that if $\cX$ is a metric space with metric $d_\cX$ and $S \subset \cX$ is a set then \begin{equation*} d_S(x) \colonequals \inf \left\{ d_{\cX}(x,s) \, : \, s \in S\right\}. \end{equation*} \begin{lemma}[Exact Penalization] Let $S \subset X$ be closed and $f : \cX \rightarrow \R$ locally Lipschitz with constant $K_f$. For any $x_* \in S$ and $\ve \ge 0$ satisfying $f(x_*) \le \inf \left\{ f(s) \, :\, s \in S\right\} + \ve$ there exists $\delta > 0$ such that for all $K > K_f$ we have \begin{equation*} \label{eq:exact-penalization} f(x_*) \le \inf \left\{ f(x) + K d_S(x)\, : \, d_{\cX}(x,x_*) \le \delta \right\}+\ve. \end{equation*} \end{lemma} \begin{proof} Let $\delta > 0$ be such that for all $x_1,x_2 \in \cX$ satisfying $d_\cX(x_i,x_*) \le 3\delta$ we have $f(x_1) - f(x_2) \le K_f d_\cX(x_1,x_2)$ and let $x \in \cX$ be such that $d_\cX(x,x_*) \le \delta$. Note that if $x \in S$ then we have $f(x) \ge f(x_*) - \ve$. If $x \not \in S$ then for any $0 < \gamma < \delta$ we may pick $s \in S$ satisfying $d_\cX(s,x) \le d_S(x) + \gamma$. The reader can check that $d_\cX(s,x_*) < 3 \delta$ and so we can write \begin{align*} f(x) + Kd_S(x) & \ge f(s) - K_f d(x,s) + K d_S(x) \\ & \ge f(x_*) - \ve - K_f d_S(x) + K d_S(x) - K_f \gamma \\ & \ge f(x_*) - \ve - K_f \gamma. \end{align*} Letting $\gamma \downarrow 0$ we see that $f(x) + K d_S(x) \ge f(x_*) - \ve$ for all $x$ satisfying $d_\cX(x,x_*)\le \delta$. \end{proof} Thus a local minimizer or $\ve$-minimizer of $f$ over the set $S$ is a local unconstrained minimizer (or unconstrained $\ve$-minimizer) of the function $f + Kd_S$. In the following we will also need the next result on Clarke tangent cone: \begin{lemma} \label{lem:clarke-tangent} Let $S$ be closed and $v \in T_S^C(q)$. For any $q_n \rightarrow q$ and $t_n \downarrow 0$ and any chart $\varphi : \cO \rightarrow \R^d$ whose domain includes $q$ there exists a sequence $r_n \rightarrow q$ for which $r_n \in S$ and \begin{equation} \label{eq:sequence-characterization-tangent} \lim_{n \rightarrow \infty} \frac{\varphi(r_n) - \varphi(q_n)}{t_n} = \varphi_*(q) v. \end{equation} \end{lemma} \begin{proof} Let $x \colonequals \varphi(q)$ and $x_n \colonequals \varphi(q_n)$. By \eqref{eq:local-tangent} we have $\varphi_*(q)v \in T_{\varphi(\cO \cap S)}^C(x)$ and so we can use \cite[Proposition 2.5.2]{clarkeand1998} to obtain a sequence $w_n \rightarrow \varphi_*(q)v$ for which $x_n + t_n w_n \in \varphi(\cO \cap S)$. Setting $r_n \colonequals \varphi^{-1}(x_n + t_n w_n)$ gives us \eqref{eq:sequence-characterization-tangent}. \end{proof} We mention the following specialization, which can be useful in the case of Riemannian manifolds: \begin{lemma} \label{lem:clarke-tangent-riemannian} Let $S \subset M$ be a closed subset of a Riemannian manifold and $v \in T_S^C(q)$. Then for any sequence $t_n \downarrow 0$ there exists a sequence $v_n \in T_qM$ for which $v_n \rightarrow v$ and $\exp(t_n v_n) \in S$. \end{lemma} \begin{proof} In Lemma \ref{lem:clarke-tangent} we take $q_n \equiv q$ and $\varphi^{-1} \colonequals \exp$, so that $\varphi^{-1} : T_qM \cong \R^d \rightarrow M$. Repeating the same proof as above we obtain a sequence $v_n \in T_qM$ for which $\varphi^{-1}(t_nv_n) \in S$. \end{proof} \subsection{Decrease Condition} Let us consider a Riemannian manifold $M$ with metric $g$ and distance function $d_g$. We suppose we are given a closed subset $\cU \subset M$, a metric space $E$ with metric $d_E$, and a nonnegative function $P : E \times M \rightarrow \R$. We are interested in the set $\cA(e) \subset \cU$ consisting of those $q \in \cU$ for which $P(e,q) = 0$. We make the following definition: \begin{definition} \label{defn:strong-decrease} Function $P$ satisfies the \emph{strong decrease condition} for $\cU$ near $q_0 \in \cA(e_0)$ if there exist $\ve, \Delta > 0$ such that for any $(e,q) \in E \times \cU$ satisfying $P(e,q) > 0$ and \begin{equation*} d_g(q,q_0) + d_E(e,e_0) < \ve \end{equation*} there exists nonzero $v \in T_{\cU}^C(q)$ such that \begin{equation*} \liminf_{\lambda \downarrow 0} \frac{P(e, c_v(\lambda)) - P(e,q)}{\lambda} \le - \Delta \left\|v\right\|_g, \end{equation*} where $c_v : \R \rightarrow M$ is any smooth curve satisfying $c_v^\prime(0) = v$. \end{definition} We remark that because the lower Dini derivative of Lipschitz functions is positive homogeneous in $v$, it suffices to suppose that $\left\|v\right\|_g = 1$ when $P$ is Lipschitz in $q$. Moreover, we are requiring in Definition \ref{defn:strong-decrease} only that $c_v : \R \rightarrow M$, not $c_v : \R \rightarrow \cU$. The Lemmas \ref{lem:clarke-tangent} and \ref{lem:clarke-tangent-riemannian} ensure that this is enough, as we will see below. \begin{theorem} \label{thm:penalty} If $P$ is jointly continuous in $(e,q)$; Lipschtiz in $q$ for $(e,q)$ in a neighborhood of $(e_0,q_0)$; and satisfies the strong decrease condition near $q_0 \in \cA(e_0)$ then there exists a neighborhood $\cO\subset E \times \cU$ of $(e_0,q_0)$ such that for all $(e,q) \in \cO$ there holds \begin{equation} \label{eq:penalty} d_{\cA(e)}(q) \le \frac{1}{\Delta} P(e,q). \end{equation} In particular, the sets $\cA(e)$ are nonempty. \end{theorem} \begin{proof} Suppose that $P$ satisfies the strong decrease condition near $q_0 \in \cA(e_0)$ and fix $\ve, \Delta > 0$ as in Definition \ref{defn:strong-decrease}. Since $P(e_0,q_0) = 0$ we may choose $0 < \ve_* < \frac12 \ve$ such that for all $(e,q) \in E \times \cU$ satisfying \begin{equation} \label{eq:distance-less-than-ve-star} d_g(q,q_0) + d_E(e,e_0) < \ve_* \end{equation} we have \begin{equation} \label{eq:P-is-small} \frac{4}{\Delta} P(e,q) < \frac12 \ve. \end{equation} Now suppose by way of contradiction that there exists $(e_1,q_1) \in E \times \cU$ which satisfies \eqref{eq:distance-less-than-ve-star} but not \eqref{eq:penalty}. Then we may fix $1 < \gamma < 2$ such that \begin{equation} \label{eq:assume-bwoc} d_{\cA(e_1)}(q_1) > \frac{\gamma^2}{\Delta} P(e_1,q_1). \end{equation} Inequality \eqref{eq:assume-bwoc} implies $P(e_1,q_1) > 0$. Consequently, because $\gamma$ is strictly greater than $1$ and $P$ is nonnegative we must have \begin{equation*} P(e_1,q_1) < \inf \left\{ P(e_1,q) \, : \, q \in \cU \;\; \mathrm{s.t.} \;\; d_g(q_0,q) \le 2\ve \right\} + \gamma P(e_1,q_1). \end{equation*} Applying the Ekeland variational principle to the function $q \mapsto P(e_1,q)$ defined on the complete metric space $\left\{q \in \cU \, : \, d_g(q_0,q) \le 2\ve \right\}$ with \begin{equation*} \ve = \gamma P(e_1,q_1), \, \sigma = \frac{\gamma^2}{\Delta} P(e_1,q_1) \end{equation*} we obtain $q_2 \in \cU$ with \begin{equation} \label{eq:ekeland-sigma} d_g(q_2,q_1) < \frac{\gamma^2}{\Delta} P(e_1,q_1) \end{equation} which minimizes the function \begin{equation} \label{eq:ekeland-penalty-function} q \mapsto P(e_1,q) + \frac{\Delta}{\gamma} d_g(q_2,q) \end{equation} over $q \in \cU$ satisfying $d_g(q_0,q) \le 2 \ve$. Combining inequalities \eqref{eq:assume-bwoc} and \eqref{eq:ekeland-sigma} we find $d_g(q_2, q_1) < d_{\cA(e_1)}(q_1)$ and so $q_2 \not \in \cA(e_1)$. It follows that $P(e_1,q_2) > 0$. In addition, from \eqref{eq:distance-less-than-ve-star} and \eqref{eq:ekeland-sigma} we see \begin{equation*} d_g(q_2,q_0) + d_E(e_1,e_0) \le d_g(q_2, q_1) + d_g(q_1, q_0)+ d_E(e_1,e_0) \le \ve_* +\frac{4 }{\Delta} P(e_1,q_1). \end{equation*} Thus \eqref{eq:P-is-small} implies that $d_g(q_2,q_0) + d_E(e_1,e_0) \le \frac12 \ve + \frac12 \ve = \ve$ and so there exists a nonzero $v \in T_{\cU}^C(q_2)$ and a smooth curve $c_v : \R\rightarrow M$ satisfying $c_v^\prime(0) = v$ and \begin{equation*} \liminf_{\lambda \downarrow 0} \frac{P(e_1,c_v(\lambda)) - P(e_1, q_2)}{\lambda} \le - \Delta \left\|v\right\|_g. \end{equation*} We now pick a sequence $(\lambda_n)_{n = 1}^\infty$ satisfying \begin{equation} \label{eq:strong-decrease-e1q2} \lim_{n \rightarrow \infty} \frac{P(e_1,c_v(\lambda_n)) - P(e_1, q_2)}{\lambda_n} \le - \Delta \left\|v\right\|_g \end{equation} and apply Lemma \ref{lem:clarke-tangent-riemannian} to obtain a sequence of vectors $v_n \in T_{q_2}M$ with $v_n \rightarrow v$ and $\exp_{q_2}(\lambda_n v_n) \in \cU$. Since the map $q \mapsto P(e,q)$ is locally Lipschitz, \eqref{eq:strong-decrease-e1q2} implies \begin{equation*} \lim_{n \rightarrow \infty} \frac{P(e_1,\exp_{q_2}(\lambda_n v_n)) - P(e_1, q_2)}{\lambda_n} \le - \Delta \left\|v\right\|_g. \end{equation*} At the same time, because $q_2$ is a local minimizer for the function \eqref{eq:ekeland-penalty-function} over $\cU$ and because $\exp_{q_2}(\lambda_n v_n) \in \cU$ we have \begin{equation} \label{eq:optimality} P(e_1, q_2) \le P(e_1, \exp_{q_2}(\lambda_n v_n)) + \frac{\Delta}{\gamma} d_g(q_2, \exp_{q_2}(\lambda_n v_n)) \end{equation} Now use $d_g(q_2, \exp_{q_2}(\lambda_n v_n)) = \lambda_n \left\|v_n\right\|_g$ and \eqref{eq:optimality} to obtain, for sufficiently large $n$, \begin{equation*} 0 \le \frac{ P(e_1, \exp_{q_2}(\lambda_n v_n)) - P(e_1, q_2)}{\lambda_n} + \frac{\Delta}{\gamma} \left\|v_n\right\|_g. \end{equation*} Letting $n \rightarrow \infty$ we arrive at the contradiction \begin{equation*} 0 \le -\Delta \left\|v\right\|_g+ \frac{\Delta}{\gamma} \left\|v\right\|_g < 0, \end{equation*} since $\gamma > 1$. It must therefore be that \eqref{eq:penalty} holds for all $(e,q) \in E \times \cU$ satisfying \eqref{eq:distance-less-than-ve-star}. \end{proof} \subsection{Exact Penalization for Regular Constraints} \label{sec:mixed-constraints} We now apply Theorem \ref{thm:penalty} to an derive exact penalization result for constraints of the type \begin{equation*} x \in S(e) \subset M, \end{equation*} where $M$ is a Riemannian manifold and $S$ is a family of closed sets depending on a parameter $e$ in a metric space $E$. Because we are working on a Riemannian manifold it will be useful to recall the following facts: \begin{lemma} \label{lem:norm-lemma} If $a \in \pL d_S(q)$ then $\left\|a\right\|_g \le 1$. If $q \not \in S$ then $\left\|a\right\|_g = 1$ and if $q \in S$ then $a \in N_S^L(q)$. \end{lemma} \begin{proof} The facts follow from Proposition 3.5 and Corollary 7.14 in \cite{ledyaevzhu2007}. \end{proof} \subsubsection{Regularity of Constraints} We assume we are given a nonnegative function $\varphi : E \times M \rightarrow \R$, locally Lipschitz in $x$ uniformly with respect to $e$, which characterizes $S(e)$ in the sense that $S(e) = \left\{x \, : \, \varphi(e,x) = 0\right\}$. This assumption can be made without loss of generality as one may always take $\varphi(e,x) \colonequals d_{S(e)}(x)$. \begin{definition} \label{defn:regular-constraints} We say that $S(e_0) \subset M$ is $\varphi$-\emph{regular} at $x_0 \in S(e_0)$ if: \begin{enumerate}[(i)] \item There exists $\ve, \Delta > 0$ such for any $(e,x)$ satisfying $d_E(e,e_0) + d_M(x,x_0) < \ve$ and $\varphi(e,x) > 0$ and any $p \in \partial_{L,x}\varphi(e,x)$ we have $\left\|p\right\| \ge \Delta$; \item If $(e_i, x_i) \rightarrow (e_0, x_0)$ and $p_i \in \partial_{L,x} \varphi(e_i,x_i)$ then there is a subsequence for which $p_{i_j} \rightarrow p \in \partial_{L,x} \varphi(e_0,x_0)$. \end{enumerate} \end{definition} This type of condition is quite common (see, for example, \cite[Section 3.3]{clarkeand1998} or \cite[Theorem 3.6.3]{borweinzhu2005}) and covers a very broad range of applications. For example, if a closed set $S \subset M$ has no parameter dependence then $S$ is $d_S$-regular at each $x \in S$. Indeed in this case $(ii)$ reduces to boundedness of the sequence $(p_i)_{i = 1}^\infty$ and definition of limiting subgradient. In $(i)$ we may take $\Delta = 1$ by Lemma \ref{lem:norm-lemma}. We emphasize that if one is willing to work with the distance function then \emph{every closed set $S$ is $d_S$-regular} in the sense of Definition \ref{defn:regular-constraints}. Distance to a closed set can be difficult to calculate however, even in $\R^d$, and so we point out a second important example covered by $\varphi$-regularity. Suppose that we have $r$ inequality constraints $g_i(x) \le e_i$ and $s$ equality constraints $h_j(x) = e_{r+j}$, with $e \in \R^{r+s}$ and functions $g_i, h_j$ $C^1$-smooth. Let \begin{equation} \label{eq:max-type-penalty-function} \varphi(e,x) \colonequals \max\left\{0,g_1(x) - e_1, \dots, g_r(x)- e_r, \left|h_1(x) - e_{r+1}\right|, \dots, \left|h_s(x) - e_{r+s}\right| \right\} \end{equation} so that \begin{equation*} S(e) = \left\{ x \in M \, : \, g_i(x) \le e_i\, , \, h_j(x) = e_{r + j} \right\}. \end{equation*} \begin{lemma} \label{lem:equality-inequality-regular} If the only solution to \begin{equation*} \sum_{i = 1}^r \lambda_i dg_i(x_0) + \sum_{j = 1}^s \mu_j dh_j(x_0) = 0 \end{equation*} for $(\lambda, \mu) \in \R^{r+s}$ satisfying the nonnegativity condition $\lambda_i \ge 0$ and complementary slackness condition $\lambda_i g_i(x) = 0$ is the trivial solution then $S(0)$ is $\varphi$-regular at $x_0$. \end{lemma} \begin{proof} We refer the reader to the Lemma of page 132 in \cite{clarkeand1998}, along with the formula for the subgradient of a maximum-type function applied in local coordinates. For the latter, see \cite[Theorem 3.5.8]{borweinzhu2005}. We remark that while the result in \cite{clarkeand1998} is given in terms of the proximal subgradient, the same argument goes through without change for Fr\'echet subgradient. \end{proof} In problems of discrete-time control we will suppose that states $q_i$ and controls $u_i$ are subject, in addition to the usual control constraint $u_i \in \U_i \subset U_i$, to mixed constraints of the form $(q_i, u_i) \in S_i \subseteq Q \times U_i$ with $S_i$ depending on a parameter $e$ in a metric space $E$. We thus require: \begin{equation*} u_i \in \U_i \hspace{10pt} (0 \le i \le n-1) \end{equation*} and \begin{equation} \label{eq:abstract-mixed-constraints} \left\{\begin{aligned} u_0 & \in S_0(e) \subset U_0 \\ (q_i,u_i) & \in S_i(e) \subset Q \times U_i \hspace{10pt} (1 \le i \le n-1) \\ q_n & \in S_n(e) \subset Q. \end{aligned}\right. \end{equation} As before we let $\cU \subset \prod_{i = 0}^{n-1} U_i$ denote the set of sequences $\s{u}$ for which $u_i \in \U_i$. We will write $\cA(e) \subset \cU$ for the set of all control sequences $\s{u}$ for which the corresponding state sequence $\s{q}$ satisfies, along with with $\s{u}$, constraints \eqref{eq:abstract-mixed-constraints}. We will require these constraints to be $\varphi$-regular in the sense of Definition \ref{defn:regular-constraints} at $u_0 \in S_0(e)$, $(q_1, u_1) \in S_1(e)$, and so on. In order to avoid a lengthy list of assumptions with each theorem we make the following definition: \begin{definition} \label{defn:regular-along} Constraints \eqref{eq:abstract-mixed-constraints} are $\varphi_i$-\emph{regular along} $\s{u} \in \cA(e)$ if $S_0(e)$ is $\varphi_0$-regular at $u_0$, $S_i(e)$ is $\varphi_i$-regular at $(q_i,u_i)$ for $1 \le i \le n-1$, and $S_n(e)$ is $\varphi_n$-regular at $q_n$. \end{definition} We assume a different type of regularity on the control sets: \begin{definition} \label{defn:globally-regular} A closed set $S \subset M$ is \emph{Clarke regular} if for every $s \in S$, $v \in T_S^C(s)$, and $s_n \rightarrow s$ there exists a sequence $v_n \in T_S^C(s_n)$ which converges to $v$. \end{definition} Closed, convex subsets of $\R^m$ are Clarke regular and the condition can be characterized entirely in terms of the \emph{Bouligand tangent cone} (see \cite[Corollary 3.6.13]{clarkeand1998}). \subsubsection{Penalty Functions and Constraint Qualification} Let functions $\varphi_i : E \times M \rightarrow \R$ characterize constraints \eqref{eq:abstract-mixed-constraints} and consider a function $P : E \times \cU \rightarrow \R$ defined through \begin{equation} \label{eq:pdefn} P(e,\s{u}) \colonequals \varphi_0(e,u_0) + \varphi_n(e,q_n) + \sum_{i = 1}^{n-1} \varphi_i(e, q_i, u_i), \end{equation} so that $\s{u} \in \cA(e)$ if and only if $\s{u} \in \cU$ and $P(e,\s{u}) = 0$. Let us suppose that we are given some $\ol{\s{u}} \in \cA(\ol{e})$. The results of this section provide a sufficient condition in the form of a constraint qualification for the following inequality to hold for $(e,\s{u})$ sufficiently close to $(\ol{e}, \ol{\s{u}})$ and $\kappa$ sufficiently large: \begin{equation*} d_{\cA(e)}(\s{u}) \le \kappa P(e,\s{u}). \end{equation*} The sufficient condition we provide is given in terms of the following constraint qualification: \begin{definition} \label{defn:strictly-normal} Control $\s{u} \in \cA(e)$ is said to be \emph{strictly $\varphi_i$-normal} if the only sequences \begin{equation*} \left\{ \begin{aligned} b_0 &\in \partial_{L,u} \varphi_0(e,u_0) \\ (a_i, b_i) &\in \partial_{L,(q,u)} \varphi_i(e,q_i,u_i) \hspace{10pt} (1 \le i \le n-1) \\ a_n &\in \partial_{L,q}\varphi_n(q_n) \end{aligned} \right. \end{equation*} which generate a costate sequence $(p_i)_{i = 1}^n$ through $-p_n = a_n$ and \begin{equation} \label{eq:normal-adjoint} p_{i-1} = a_{i-1} - D_q F_{i-1}(q_{i-1}, u_{i-1})^*p_i \end{equation} that satisfies for all $v \in T_{\U_i}^C(u_i)$ \begin{equation} \label{eq:normal-max} 0 \le \left<b_{i-1} - D_u F_{i-1}(q_{i-1}, u_{i-1})^* p_i, v \right> \hspace{10pt} (1 \le i \le n-1) \end{equation} are the sequences $\s{a} \equiv 0$ and $\s{b} \equiv 0$. \end{definition} \begin{theorem} \label{thm:strong-decrease-necessary} If the sets $\U_i$ are Clarke regular, constraints \eqref{eq:abstract-mixed-constraints} $\varphi_i$-regular along $\s{u}$, and control $\ol{\s{u}} \in \cA(\ol{e})$ strictly $\varphi_i$-normal then the function $P$ defined by \eqref{eq:pdefn} satisfies the strong decrease condition for $\cU$ near $(\ol{e}, \ol{\s{u}})$. \end{theorem} \begin{proof} Let $\delta > 0$ be the minimum of the numbers $\Delta$ appearing in Definition \ref{defn:regular-constraints}. Thus, for example, if $(e,q,u)$ is sufficiently close to $(\ol{e}, \ol{q}_i, \ol{u}_i)$, $\varphi_i(e,q,u) > 0$, and $(a,b) \in \partial_{L,(q,u)} \varphi_i(e,q,u)$ then $\left\|(a,b)\right\| \ge \delta$. Suppose by way of contradiction that there exists a sequence $(\Delta_k)_{k = 1}^\infty$ with $\Delta_k \downarrow 0$ such that for each $k$ there exist $e_k \in E$ and $\s{u}_k \in \cU$ with the properties $d_E(e_k,\ol{e}) + d(\s{u}_k, \ol{\s{u}}) < \Delta_k$, $P(e_k,\s{u}_k) > 0$, and for any nonzero $\s{v} \in T_{\cU}^C(\s{u}_k)$ \begin{equation*} \liminf_{\lambda \downarrow 0} \frac{P(e_k, c_{\s{v}}(\lambda)) - P(e_k, \s{u}_k)}{\lambda} \ge - \Delta_k \left\|\s{v}\right\|_g, \end{equation*} where $c_{\s{v}} : \R \rightarrow \prod_{i = 0}^{n-1} U_i$ is a smooth function satisfying $c_{\s{v}}^\prime(0) = \s{v}$. Let $\s{q}_k$ be the trajectory for control $\s{u}_k$. From Theorem \ref{thm:dmp} we obtain sequences $(\s{a}_k)_{k = 1}^\infty$, $(\s{b}_k)_{k = 1}^\infty$ and $(\s{p}_k)_{k = 1}^\infty$ with $b_{k,0} \in \partial_{L,u} \varphi_0(e_k, u_{k,0})$, $(a_{k,i},b_{k,i}) \in \partial_{L,(q,u)}\varphi_i(e_k, q_{k,i},u_{k,i})$, $-p_{k,n} = a_{k,n} \in \partial_{L,q} \varphi_n(e_k,q_{k,n})$ which satisfy \begin{equation} \label{eq:state-constraint-adjoint} p_{k,i-1} = -a_{k,i-1} + D_qF_{i-1}(q_{k,i-1}, u_{k,i-1})^* p_{k,i} \end{equation} and for all v $\in T_{\U_i}^C(u_{k,i})$ \begin{align} \label{eq:state-constraint-pmp} -\Delta_k \left\|v \right\|_g \le \left<b_{k,i-1} -D_u F_{i-1}(q_{k,i-1},u_{k,i-1})^*p_{k,i} , v \right> \hspace{10pt} (1 \le i \le n-1). \end{align} Since the sets $S_i$ are $\varphi_i$-regular along $\s{u}$ we may pass to a subsequence for which the sequences $(\s{a}_k)_{k = 1}^\infty$ and $(\s{b}_k)_{k = 1}^\infty$ converge to sequences $\s{a}$ and $\s{b}$ which satisfy $b_{0} \in \partial_{L,q} \varphi_0(e,u_0)$, $(a_{i},b_{i}) \in \partial_{L,(q,u)} \varphi_i(e,q_{i},u_{i})$, and $a_{n} \in \partial_{L,q} \varphi_n(e,q_{n})$. Moreover, because $P(e_k,\s{u}_k) > 0$ we may choose the subsequence to insure that at least one element of either $\s{a}$ or $\s{b}$ has norm bounded below by $\delta > 0$. Taking the limit in \eqref{eq:state-constraint-adjoint} we obtain a costate sequence $\s{p}$ which satisfies \eqref{eq:normal-adjoint}. Because the sets $\U_i$ are Clarke regular, we may take the limit in \eqref{eq:state-constraint-pmp} and obtain \eqref{eq:normal-max}. Strict $\varphi_i$-normality of control $\s{u}$ now requires that $\s{a}$ and $\s{b}$ are identically equal to zero and this is a contradiction. Consequently $P$ must satisfy the strong decrease condition near $\ol{\s{u}} \in \cA(\ol{e})$. \end{proof} The following corollary is now immediate from Theorem \ref{thm:penalty} and Theorem \ref{thm:strong-decrease-necessary}: \begin{corollary} \label{cor:penalization-for-mixed} If the sets $\U_i$ are Clarke regular, constraints \eqref{eq:abstract-mixed-constraints} $\varphi_i$-regular along $\ol{\s{u}} \in \cA(\ol{e})$, and control $\ol{\s{u}}$ strictly $\varphi_i$-normal, then there exist $\ve, \kappa > 0$ such that for all $(e,\s{u}) \in E \times \cU$ satisfying $d_E(e, \ol{e})+d_{\cU}(\s{u}, \ol{\s{u}}) < \ve$ there holds \begin{equation*} d_{\cA(e)}{\s{u}} \le \kappa P(e, \s{u}). \end{equation*} In particular, the sets $\cA(e)$ are nonempty for $d_E(e,\ol{e}) < \ve$. \end{corollary} \subsection{Sensitivity} We mention two consequences Corollary \ref{cor:penalization-for-mixed} related to the value function $v : E \rightarrow \R \cup \left\{\infty\right\}$, which is defined as usual through \begin{equation*} v(e) = \inf \left\{ J(\s{u}) \, : \, \s{u} \in \cA(e) \right\}. \end{equation*} The results in this section are of a very classical flavor (see, for example, Clarke \cite[Section 6.4]{clarke1983}). \begin{corollary} \label{cor:finite-value-function} Suppose that control $\s{u} \in \cU$ is optimal for $J$ subject to the constraint $\s{u} \in \cA(0)$, so that $J(\s{u}) = v(0)$. If sets $\U_i$ are Clarke regular, constraints \eqref{eq:abstract-mixed-constraints} are $\varphi_i$-regular along $\s{u}$, and control $\s{u}$ strictly $\varphi_i$-normal then $v$ locally finite at $e=0$. \end{corollary} \begin{proof} By Corollary \ref{cor:penalization-for-mixed}, the sets $\cA(e)$ are nonempty for $e$ in a neighborhood of $0$. \end{proof} \begin{theorem} \label{thm:calm-value} In addition to the assumptions of Corollary \ref{cor:finite-value-function}, suppose that $E$ is a closed subset of $\R^m$ and the functions $J$ and $P$ are globally Lipschitz. Then $v$ is \emph{calm} at $0 \in \R^m$ in the sense that \begin{equation} \label{eq:defn-calm} -\infty < \liminf_{e \rightarrow 0} \frac{v(e) - v(0)}{\left\|e\right\|}. \end{equation} \end{theorem} \begin{proof} Let $(e_i)_{i = 0}^\infty$ be a sequence converging to $0 \in \R^m$. Since $v(e_i)$ is eventually finite we may choose for each $i$ a control $\s{u}_i \in \cA(e_i)$ such that $J(\s{u}_i) \le v(e_i) + \left\|e_i \right\|^2$. Let $K_J$ be a Lipschitz constant for $J$ and choose $\kappa > K_J$. Using exact penalization we can see that $J(\s{u}_i) + \kappa d_{\cA(0)}(\s{u}_i) \ge v(0)$. From this and our choice of $\s{u}_i$ we obtain \begin{align*} \frac{v(e_i) - v(0)}{\left\|e\right\|} & \ge \frac{J(\s{u}_i) - \left\|e_i \right\|^2 - v(0)}{\left\|e_i\right\|} \ge -\left\|e_i\right\| - \frac{\kappa d_{\cA(0)}(\s{u}_i)}{\left\|e_i\right\|}. \end{align*} Now use Corollary \ref{cor:penalization-for-mixed} and $P(e_i,\s{u}_i) = 0$ to write \begin{align*} \frac{v(e_i) - v(0)}{\left\|e\right\|} & \ge - \left\|e_i\right\| + \kappa \frac{P(e_i,\s{u}_i) - P(0, \s{u}_i)}{\left\|e_i\right\|}, \end{align*} for a possibly larger value of $\kappa$ and for $i$ sufficiently large. Since $P$ is Lipschitz and sequence $(e_i)_{i = 1}^\infty$ is arbitrary, \eqref{eq:defn-calm} follows. \end{proof} \subsection{Application to Smooth Equality and Inequality Constraints} Suppose we are interested in minimizing a function $J : \cU \rightarrow \R$ as in \eqref{eq:jdef}, subject to the constraints \begin{equation*} \left\{ \begin{aligned} g_j(q_i,u_i)& \le e_j \hspace{20pt} (1 \le i \le n-1, \; 1 \le j \le r) \\ h_j(q_i,u_i)& = e_{r+j} \hspace{10pt} (1 \le i \le n-1, \; 1 \le j \le s) \end{aligned} \right. \end{equation*} as well as constraints \begin{equation*} \left\{ \begin{aligned} G_j(q_n)& \le e_j \hspace{20pt} (1 \le j \le r) \\ H_j(q_n)& = e_{r+j} \hspace{10pt} (1 \le j \le s). \end{aligned} \right. \end{equation*} Suppose that we have a control $\s{u}$ which minimizes $J$ for $e = 0$, so that $J(\s{u}) = v(0)$. Suppose also that for each $1 \le i \le n-1$ the only solution to the following problem: \begin{equation*} \sum_{j = 1}^r \lambda_j dg_j(q_i, u_i) + \sum_{j = 1}^s \mu_j h_j(q_i,u_i) = 0 \end{equation*} satisfying the nonnegativity condition $\lambda_j \ge 0$ and the complementary slackness condition $\lambda_j g_j(q_i,u_i) = 0$ is $(\lambda, \mu) = 0$. Under the analogous assumption on $dG_j(q_n)$ and $dH_j(q_n)$, Lemma \ref{lem:equality-inequality-regular} assures us that the constraints are $\varphi_i$-regular along $\s{u}$ for functions $\varphi_i$ defined as in \eqref{eq:max-type-penalty-function}. Thus if control sets $\U_i$ are Clarke regular then one of the following must hold. First, it may be that $\s{u}$ is not strictly $\varphi_i$-normal. In this case there exists a costate sequence $(p_i)_{i = 1}^n$ and a nonzero sequence $(\lambda_{j,i}, \mu_{j,i})_{i =1, j = 1}^{n,r}$ such that \begin{equation*} -p_n = \sum_{j = 1}^r \lambda_{n,j} dG_j(q_n) + \sum_{j = 1}^s \mu_{n,j} dH_j(q_n) \end{equation*} and \begin{align*} p_{i-1} &= -\sum_{j = 1}^r \lambda_{i-1,j} d_qg_j(q_{i-1}, u_{i-1}) - \sum_{j = 1}^s \mu_{i-1,j} d_q h_j(q_{i-1}, u_{i-1}) \\ & \quad + D_qF_{i-1}(q_{i-1}, u_{i-1})^* p_{k,i} \end{align*} and for all $v \in T_{\U_i}^C(u_i)$ \begin{align*} & \left< \sum_{j = 1}^r \lambda_{i-1,j} d_ug_j(q_{i-1}, u_{i-1}) + \sum_{j = 1}^s \mu_{i-1,j} d_u h_j(q_{i-1}, u_{i-1})-D_u F_{i-1}(q_{i-1},u_{i-1})^*p_{i},v\right>\\ & \ge 0 \hspace{10pt} (1 \le i \le n-1). \end{align*} For each $i$ both the complementary slackness and positivity conditions hold on $\lambda$. Moreover, we must have either $\s{p} \ne 0$ or else there exists an index $i$ for which \begin{equation*} \sum_{j = 1}^r \lambda_{i-1,j} d_ug_j(q_{i-1}, u_{i-1}) + \sum_{j = 1}^s \mu_{i-1,j} d_u h_j(q_{i-1}, u_{i-1}) \ne 0. \end{equation*} On the other hand $\s{u}$ may be strictly $\varphi_i$-normal. In this case the feasible sets are nonempty for sufficiently small perturbations $e$ of the right-hand side. If in addition one can show that functions $\varphi_i$ are globally Lipschitz then the value function is calm at $0$. This is the case, for example, if $Q$ and $U_i$ are compact and $e$ is restricted to a compact neighborhood of the origin in $\R^{r+s}$. We turn now to the study of necessary optimality conditions for constrained problems. \section{Discrete-Time Geometric Maximum Principle for Constrained Pro-blems} \label{sec:pmp-constraints} In this section we develop the maximum principle for the problem of minimizing a function $J$ defined by \eqref{eq:jdef} subject to control constraints $u_i \in \U_i \subset U$ and constraints of the following types: \begin{enumerate}[(i)] \item Pure state constraints: $q_i \in S_i \subset Q$; \item Mixed constraints: $(q_i, u_i) \in S_i \subset Q \times U$ for $1 \le i \le n-1$, $q_n \in S_n \subset Q$. \end{enumerate} We consider first the case of pure state constraints. \subsection{Pure State Constraints} For the sake of exposition we will assume in this section that $\ell$ and $L_i$ are $C^1$-smooth functions. This simplifies the statements of the theorems and covers a great deal of applications. We emphasize, however, that Lipschitz costs may be covered using exactly the same techniques. \begin{theorem} \label{thm:pure-state-max-princ} Suppose that $\s{u} \in \cU$ minimizes a cost function $J$ defined by \eqref{eq:jdef} subject to pointwise state constraints \begin{equation*} q_i \in S_i \colonequals \left\{q \in Q \, : \, \varphi_i(q) = 0 \right\} \end{equation*} for locally Lipschitz, nonnegative functions $\varphi_i$. If the sets $\U_i$ are Clarke regular, and functions $\ell$, $L_i$ are $C^1$-smooth, and the constraints are $\varphi_i$-regular along $\s{u}$ then there is a number $\lambda_0 \in \left\{0,1\right\}$ and a costate sequence $\s{p}$ which: \begin{enumerate}[(i)] \item Satisfies the endpoint condition: $- p_n \in \lambda_0 d \ell(q_n) + \partial_L \varphi_n(q_n)$; \item Evolves according to: \begin{equation} \label{eq:abstract-adjoint-1} p_{i-1} + D_q F_{i-1}(q_{i-1}, u_{i-1})^* p_i \in \lambda_0 d_q L_{i-1}(q_{i-1}, u_{i-1}) + \pL \varphi_{i-1}(q_{i-1}); \end{equation} \item And satisfies for all $v \in T_{\U_{i-1}}^C(u_{i-1})$ \begin{align} \label{eq:sc-max-princ} 0 \le \left<\lambda_0d_u L_{i-1}(q_{i-1}, u_{i-1}) - D_u F_{i-1}(q_{i-1}, u_{i-1})^* p_i , v\right> \hspace{10pt} (1 \le i \le n). \end{align} \end{enumerate} Moreover, either $\lambda_0 = 1$ or $\s{p}$ is not identically equal to zero. \end{theorem} \begin{proof} We consider two possibilities: either $\s{u}$ is strictly $\varphi_i$-normal or it is not. If $\s{u}$ is not strictly $\varphi_i$-normal then the theorem holds with $\lambda_0 = 0$, since in this case the conclusions are a restatement of Definition \ref{defn:strictly-normal}. We need only check that $\s{p}$ may be chosen so that it has at last one nonzero entry. This is a straightforward consequence of Definition \ref{defn:strictly-normal}, the endpoint condition, and \eqref{eq:abstract-adjoint-1}. On the other hand, if $\s{u}$ is strictly $\varphi_i$-normal then there exist real numbers $\ve, \kappa > 0$ such that \begin{equation*} d_{\cA}(\s{c}) \le \kappa \sum_{i = 1}^n \varphi_i(r_i) \end{equation*} for all controls $\s{c}$ within distance $\ve$ of $\s{u}$, where we have written $\s{r}$ for the state sequence corresponding to control $\s{c}$. Again using an exact penalization argument and possibly increasing $\kappa$ we can see that $\s{u}$ is a local minimizer of the function \begin{equation*} \Lambda(\s{c}) \colonequals J(\s{c}) + \kappa \sum_{i = 1}^n \varphi_i(r_i). \end{equation*} Thus $\s{u}$ is critical for $\Lambda$ and the result now follows with $\lambda_0 = 1$. \end{proof} As in Section \ref{sec:discrete-gmp} we may make additional assumptions to arrive at a maximum principle. \begin{theorem} Suppose that $F_i$ and $\U_i$ satisfy assumptions \textnormal{\textbf{(}}$\mathsf{A}$\textnormal{\textbf{)}} of Section \ref{sec:discrete-gmp}, the constraints are $\varphi_i$-regular along $\s{u}$, and functions $\ell$, $L_i$ are $C^1$-smooth. Then in the conclusions of Theorem \ref{thm:pure-state-max-princ} we may replace \eqref{eq:sc-max-princ} with \begin{equation*} H_i(\lambda_0,u_i,p_{i+1}) = \max_{u \in \U_i} H_i(\lambda_0,u_i,p_{i+1}) \hspace{10pt} (0 \le i \le n-1) \end{equation*} where $H_i : \left\{0,1\right\} \times \U_i \times T_{q_{i+1}}^* Q \rightarrow \R$ by \begin{equation} \label{eq:hamiltonian-constraints} H_i(\lambda,u,p) \colonequals \left<\mathbb{F}E_{f_i(q_i,u_i)}^* p, f(q_i,u) \right> - \lambda L_i(q_i,u). \end{equation} \end{theorem} \begin{proof} The details follow those of Theorems \ref{thm:discrete-geometric-pmp} and \ref{thm:pure-state-max-princ}. We note that the assumption of Clarke regularity, which is necessary for Theorem \ref{thm:pure-state-max-princ}, is automatic from the convexity of $\U_i$. \end{proof} We emphasize that every closed set is $d_S$-regular and so, if one is willing to accept results in terms of the normal cone, then \eqref{eq:abstract-adjoint-1} can be written as \begin{equation*} p_{i-1} + D_q F_{i-1}(q_{i-1}, u_{i-1})^* p_i \in \lambda_0 d_q L_{i-1}(q_{i-1}, u_{i-1}) + N_{S_{i-1}}^L(q_{i-1}) \end{equation*} without any assumptions on the constraint sets $S_i$ beyond asking that they be closed. \subsection{Mixed Constraints} \label{sec:mixed-sensitivity} As before we assume in this section that $\ell$ and $L_i$ are $C^1$-smooth functions in order to simplify statements of Theorem and remark that Lipschitz costs may be covered using exactly the same techniques. We consider the following problem: \emph{Minimize $J : \cU \rightarrow \R$ defined by \eqref{eq:jdef} subject to constraints} \begin{equation} \label{eq:constant-mixed-constraints} \left\{ \begin{aligned} (q_i,u_i) & \in S_i \hspace{2pt} \colonequals \left\{(q,u) \in Q \times U_i \, : \, \varphi_i(q,u) = 0 \right\} \hspace{10pt} (1 \le i \le n-1) \\ q_n & \in S_n \colonequals \left\{q \in Q \, : \, \varphi_n(q) = 0 \right\} \end{aligned} \right. \end{equation} \emph{where functions $\varphi_i$ are locally Lipschitz and nonnegative}. \begin{theorem} \label{thm:mixed-max-princ} Suppose that $\s{u} \in \cU$ minimizes a cost function $J$ defined by \eqref{eq:jdef} subject to mixed constraints \eqref{eq:constant-mixed-constraints}. If the sets $\U_i$ are Clarke regular, the constraints are $\varphi_i$-regular along $\s{u}$, and functions $F_i, \ell, L_i$ are $C^1$-smooth then there exist sequences $\s{a} = (a_i)_{i = 1}^n$ and $\s{b} = (b_i)_{i = 0}^{n-1}$ with $b_0 = 0$ \begin{equation*} \left\{ \begin{aligned} (a_i,b_i) & \in \pL \varphi_i(q_i,u_i) \hspace{10pt} (1 \le i \le n-1) \\ a_n & \in \pL \varphi_n(q_n) \end{aligned} \right. \end{equation*} for which the costate sequence $\s{p}$ defined by \begin{equation} \label{eq:mixed-constraints-endpoint} p_n = -a_n - \lambda_0 d \ell(q_n) \end{equation} and \begin{equation} \label{eq:mixed-constraints-adjoint} p_{i-1} = \lambda_0 d_q L_{i-1}(q_{i-1}, u_{i-1}) + a_i - D_q F_{i-1}(q_{i-1}, u_{i-1})^* p_i \end{equation} satisfies for all $v \in T_{\U_{i-1}}^C(u_{i-1})$ \begin{align*} 0 \le \left< \lambda_0 dL_{i-1}(q_{i-1}, u_{i-1}) + b_i - D_u F_{i-1}(q_{i-1}, u_{i-1})^*p_i , v\right> \hspace{10pt} (1 \le i \le n). \end{align*} Moreover, either $\s{a}$ and $\s{b}$ are not both identically zero or else $\lambda_0 = 1$. \end{theorem} \begin{proof} If $\s{u}$ is not strictly $\varphi_i$-normal, then result follows from the definition of strict $\varphi_i$-normality. On the other hand, if $\s{u}$ is strictly $\varphi_i$-normal then there exist real numbers $\ve, \kappa > 0$ such that \begin{equation*} d_{\cA}(\s{c}) \le \kappa \varphi_n(r_n) + \kappa \sum_{i = 1}^n \varphi_i(r_i, c_i) \end{equation*} for all $\s{c}$ within distance $\ve$ of $\s{u}$. Using a standard exact penalization argument and possibly increasing $\kappa$ we can see that $\s{u}$ is a local minimizer of the function \begin{equation*} \Lambda(\s{c}) \colonequals J(\s{c}) + \kappa \varphi_n(r_n) + \kappa \sum_{i = 1}^n \varphi_i(r_i, c_i). \end{equation*} Thus $\s{u}$ is extremal for $\Lambda$ and the result now follows with $\lambda_0 = 1$. \end{proof} Theorem \ref{thm:mixed-max-princ} is lacking the usual nondegeneracy condition on $\s{p}$ and the conditions on $\s{a}$ and $\s{b}$ may not be very informative. By strengthening the assumptions on the sets $S_i$ we can obtain a nondegeneracy result for $\s{p}$: \begin{corollary} Suppose that in addition to the hypotheses of Theorem \ref{thm:mixed-max-princ} we suppose that the sets $S_i$ for $1 \le i \le n-1$ satisfy, for some $\kappa > 0$, the following \emph{bounded slope} condition: \begin{equation} \label{eq:bounded-slope-condition} (a,b) \in \partial_L \varphi_i(q,u) \Rightarrow \left\|b\right\| \le \kappa \left\|a \right\|. \end{equation} Then either $\s{p}$ is nonzero or $\lambda_0 = 1$. \end{corollary} \begin{proof} In the case where $\lambda_0 = 0$ we must have $\s{a} \ne 0$, for otherwise the bounded slope condition will force both $\s{a}$ and $\s{b}$ to be zero. We can then see that $\s{p}$ is nonzero from \eqref{eq:mixed-constraints-endpoint} and \eqref{eq:mixed-constraints-adjoint}. \end{proof} It's worth comparing the bounded slope condition given by \eqref{eq:bounded-slope-condition} with that found in the later chapters of \cite{clarke2013}, the source from which we borrow the name. \subsection{Discussion} We conclude with an analysis of an abstract discrete-time optimal control problem in order to demonstrate some of the above theorems. Let us suppose we are interested in minimizing a function \begin{equation*} J(\s{u}) = \ell(q_n) + \sum_{i = 1}^{n-1} L_i(q_i, u_i) \end{equation*} subject to mixed constraints \begin{equation*} \left\{ \begin{aligned} g_j(q_i,u_i) &\le 0 \hspace{10pt} (1 \le i \le n-1, \; 1 \le j \le r) \\ h_j(q_i,u_i) &= 0 \hspace{10pt} (1 \le i \le n-1, \; 1 \le j \le s) \end{aligned} \right. \end{equation*} and endpoint constraints \begin{equation*} \left\{ \begin{aligned} G_j(q_n) &\le 0 \hspace{10pt} (1 \le j \le r) \\ H_j(q_n) & \le 0 \hspace{10pt} (1 \le j \le s). \end{aligned} \right. \end{equation*} We suppose the all of the above functions are $C^1$-smooth and the the controls are subject only to the mixed constraints, so that $\U_i \colonequals U_i$. Thus the sets $\U_i$ are all Clarke regular. Suppose that control $\s{u}$ is optimal for the problem and that for each $1 \le i \le n-1$, the only solution to \begin{equation*} \sum_{j = 1}^r \lambda_j dg_j(q_i, u_i) + \sum_{j = 1}^s \mu_j dh_j(q_i,u_i) = 0 \end{equation*} satisfying the nonnegativity condition $\lambda_j \ge 0$ and the complementary slackness condition $\lambda_j g_j(q_i,u_i) = 0$, each for $1 \le j \le r$, is $\lambda_j, \mu_j \equiv 0$. We make the analogous assumption for constraints $G_j$ and $H_j$. In this case the constraints are $\varphi_i$-regular along $\s{u}$ and so by Theorem \ref{thm:mixed-max-princ} we can find a sequence $(\lambda_{j,i},\mu_{j,i})_{i = 1, j = 1}^{n, r}$ satisfying the nonnegativity condition $\lambda_{j,i} \ge 0$ and the complementary slackness conditions \begin{equation*} \left\{ \begin{aligned} \lambda_{j,i} g_j(q_i,u_i) & = 0 \hspace{10pt} (1 \le i \le n-1,\; 1 \le j \le r)\\ \lambda_{n,i} G_j(q_i) & = 0 \hspace{10pt} (1 \le j \le r) \end{aligned}\right. \end{equation*} along with a number $\lambda_0 \in \left\{0,1\right\}$ such that the costate sequence defined by \begin{equation*} -p_n \colonequals \lambda_0 d\ell(q_n) + \sum_{j = 1}^r \lambda_{n,j} dG_j(q_n) \end{equation*} and \begin{align*} p_{i-1} & = - \lambda_0 d_q L_{i-1}(q_{i-1}, u_{i-1}) - \sum_{j = 1}^r \lambda_{j,i-1} d_q g_j (q_{i-1}, u_{i-1}) \\ & \quad - \sum_{j = 1}^s \mu_{j,i-1} d_q h_j (q_{i-1}, u_{i-1}) + D_qF_{i-1}(q_{i-1}, u_{i-1})^* p_i \end{align*} satisfies for all $v \in T_{u_{i}} U_i$ \begin{align*} &\left< \lambda_0 d_u L_{i}(q_{i}, u_{i})+\sum_{j = 1}^r \lambda_{j,i}d_u g_{j}(q_{i}, u_{i}) + \sum_{j = 1}^s \mu_{j,i}d_u h_{j}(q_{i}, u_{i})- D_uF_{i}(q_{i}, u_{i})^* p_{i+1},v\right>\\ & \quad \ge 0 \hspace{10pt} (0 \le i \le n-1). \end{align*} This last inequality forces \begin{align*} D_uF_{i-1}(q_{i-1}, u_{i-1})^* p_i &= \lambda_0 d_u L_{i-1}(q_{i-1}, u_{i-1})+\sum_{j = 1}^r \lambda_{j,i-1}d_u \varphi_{i-1}(q_{i-1}, u_{i-1}) \\ & \quad + \sum_{j = 1}^s \mu_{j,i}d_u h_{j}(q_{i}, u_{i}) \end{align*} Moreover, either $\lambda_0 = 1$, $p_n \ne 0$, or for some $1 \le j \le n-1$ we have \begin{equation*} \sum_{j = 1}^r \lambda_{j,i} dg_j(q_i,u_i) + \sum_{j = 1}^r \mu_j dh_j(q_i, u_i) \ne 0. \end{equation*} If in addition the constraints can be shown to satisfy the bounded slope condition: \begin{align*} & \left\|\sum_{j = 1}^r \lambda_{j,i} d_u g_j(q_i,u_i) + \sum_{j =1}^s \mu_{j,i} d_u h_j(q_i, u_i) \right\| \\ & \quad \le \kappa \left\|\sum_{j = 1}^r \lambda_{j,i} d_q g_j(q_i,u_i) + \sum_{j =1}^s \mu_{j,i} d_q h_j(q_i, u_i) \right\| \end{align*} for some $\kappa > 0$ and for $1 \le i \le n-1$ then we may suppose that either $\lambda_0 = 1$ or else $\s{p} \not \equiv 0$. The results of Section \ref{sec:mixed-sensitivity} can be applied to study the sensitivity of this problem to perturbations in the constraints. Finally, we remark that in many cases much more can be said using the results of this paper. For example, if the problem evolves on a Lie group according to $g_{i} \colonequals g_{i-1} u_{i-1}$ then the techniques of Section \ref{sec:liegroups} may be applied and if $F_i$ factors as \eqref{eq:factorization} then in many applications $D_qF_i^*$ can be profitably expressed in terms of the fibre derivative. In this case, additional assumptions will lead in a natural way to a maximum principle as in \eqref{eq:max-princ-fiber-version} and \eqref{eq:hamiltonian-constraints}. \section*{Acknowledgment} The work presented in this paper was carried out while the second author was a postdoctoral fellow at the Institute for Mathematics and its Applications (IMA) during the IMA's annual program on \textit{``Control Theory and its Applications''}. \bibliographystyle{abbrv}
\section{Introduction \label{sc:in}} With the discover of the Higgs boson\cite{Chatrchyan:2012xdj, Aad:2012tfa}, the last remaining unobserved particle of Standard Model (SM) was found. The attention now comes to the seek of signals of particles that not included in SM. Among of these (several) beyond Standard Model (BSM) new particles includes the radion~\cite{goncalves2010RadproexcproCERLHC}, a particle related tho Randall-Sundrum scenario of large extra dimensions and the dilaton, a BSM particle related which is a pseudo-Nambu-Goldstone boson in spontaneous breaking of scale symmetry\cite{Goncalves:2015oua} and also signals of extra dimensions~\cite{thiel2013HeaquaproblaholevaLHC,goncalves2014DifZbospaiproLHClarextdimsce}. An another predicted BSM particle, the magnetic monopole proposed by Dirac\cite{dirac1931QuaSinEleFie} gives a natural way to explain the quantization of electric charge. The magnetic monopole are also predicted in Grand Unified Theories (GUT)\cite{tHooft:1974kcl, Polyakov:1974ek}. Unfortunately, the predicted mass is very large and, until now the several experimental searches not confirm his existence, only experimental limits on his mass and charge. Recently, the MOEDAL\cite{acharya2014PhyProMoEExpLHC}, a dedicated experiment on highly ionizating exotic particles is set on LHC and announces his first results\cite{MoEDAL:2016jlb,Acharya:2016ukt}. An revision of the state-of-art of theoretical and experimental status of magnetic monopole can be found in \cite{olive2014RevParPhy}. In this work, we analyze the production of magnetic monopoles and the bound state, the monopolium\cite{Hill:1982iq}, by photon fusion in peripheral hadronic (proton-proton and ion-ion) collisons in present high energies at LHC and also in electron-positron expected at CLIC (see \cite{Aicheler:2012bya}). In particular, we consider the central exclusive production: the projectiles does not dissociate and the particle is produced in the central region of rapidity of the detector, giving a clean experimental signal of this process. We compare the our results with the previous ones in $pp$ collisions \cite{kurochkin2006promagmonviagamgamfushigeneppcol,dougall2009Dirmagmonprophofusprocol,epele2012LoomagmonLHCdipeve} and we present a prediction for the production of pairs of monopole/antimonopole and monopolium in $Pb-Pb$ collisions at LHC as well as in electron/positron collisions in the planned CLIC. This paper are organized as follows. In next session, we present a overview of the theory of magnetic monopoles with a short review of cross section production of a pair of monopoles and monopolium. In section \ref{sc:fpc}, we present the mechanism of central production in peripheral collisions with the central system of particles produced by a pair of high energy photons. The results of the calculation are showed and discussed in the section \ref{sc:res}. Finally, a summary and the conclusions are presented in the section \ref{sc:cls}. \section{Magnetic monopoles and monopolium \label{sc:mmr}} Since the inception of the Classical Electrodynamics, is clear that the Maxwell Equations are not symmetric in relation of the electric charges. The possibility of existence of isolated magnetic charges, the magnetic monopoles, have interesting consequences, both in classical and quantum levels\cite{milton2006Theexpstamagmon,rajantie2012MagMonFieTheCos}. Probably, the most important is the Dirac quantization charge relation, which established that, if the magnetic charge exists, then the electric charge is quantized. The possibility of magnetic monopoles was found in Grand Unified Theories (GUT)\cite{tHooft:1974kcl, Polyakov:1974ek}. A review of the state-of-art of magnetic monopoles is found in \cite{olive2014RevParPhy}. See \cite{Patrizii:2015uea} for a recent review of experimental searches of this particles in colliders and cosmic rays. Meanwhile, the experimental difficulties for the experimental observation of isolated magnetic monopoles suggest the existence of a bound state, the monopolium\cite{ vento2008HidDirMon,epele2008MonKeytomon}. We revisit the results of production of monopoles in $pp$ collisions at LHC energies\cite{ginzburg1998SeaheamagmonTevCERLHC,ginzburg1999Viseffverheamagmoncol,kurochkin2006promagmonviagamgamfushigeneppcol,dougall2009Dirmagmonprophofusprocol} and investigate the same process in ion-ion collisons in LHC and electron-electron collisions at CLIC. The production in nuclear collisions was proposed in \cite{roberts1986DirMagMonPaiProRelNucNucCol,he1997SeaDirmagmonhignuccol} in context of thermal quark-gluon plasma. In this context, in \cite{gould2017Magmonmasbouheaioncolandneusta} calculate bounds in the monopole mass from heavy ion collisions and neutron stars. Ginzburg and Schiller\cite{ginzburg1998SeaheamagmonTevCERLHC} previously consider the monopole pair production in electron-positron collisions for planned colliders and for photon luminosity of \cite{budnev1975TwophoparpromecPhyproAppEquphoapp}. One of the ingredients of the calculation is the cross section of the process of fusion of two photons into a monopole/antimonopole pair or a monopolium. Unfortunately, due the high values of the coupling, a true perturbative calculation for all energies is questionable and therefore, the results presented here can be seen as an estimation for the cross sections. The coupling of the monopoles with photons can be quantified by two different forms. First, from Dirac himself, takes the coupling constant as $\alpha_{mag} = g^2/4\pi$ whereas the so-called beta coupling, consider $\alpha_{mag} = (\beta g)^2/4\pi$ where $\beta$ is the speed of monopole (in natural units)\cite{milton2006Theexpstamagmon}. We will use the Dirac expression for our results. In the case of production of a antimonopole-monopole pair, the cross section can be obtained from the QED fundamental process of annihilation of a lepton pair into a pair of photons, changing the relevant physical quantities. In the center of mass frame, reads as \begin{equation} {\sigma}^{(\bar m m)}_{\gamma\gamma} = \frac{\pi g^4(1-\beta^2)\beta^4}{2m^2}\left[ (3 - \beta^4)\ln\left(\frac{1 + \beta^2}{1 - \beta^2} \right) -2\beta(2-\beta^2) \right] . \label{eq:mn} \end{equation} For the monopolium production, we use the known result of cross section for the production of a massive ressonance, \begin{equation} \sigma(\gamma\gamma \rightarrow M) = \frac{4\pi}{\hat{s}}\frac{M^2\Gamma(\sqrt{\hat{s}})\Gamma_M}{(\hat{s} - M^2)^2 +M^2\Gamma^2_M}, \label{sec_monopolium1} \end{equation} where $M = 2m + E_{bound}$ is the monopolium mass, $\Gamma_M = \unit{10}{\GeV}$\cite{epele2008MonKeytomon} and \[ \Gamma(\sqrt{\hat{s}}) = \frac{8 \pi \alpha_{mag}^{2}}{m^2}|\psi_M(0)|^2. \] with $\psi_M(0)$ is the value of the wave function in the origin of the bound system of monopole/antimonopole. In this case, the pair are a bound state and are described as a massive resonance, characterized by your mass and decay widths. Related with the above process, an experimental signal of the monopolium production is the two photon production with the monopolium as a massive ressonance state, $\gamma\gamma \rightarrow M \rightarrow \gamma\gamma$. A possible background for this process is the production of two photons by a loop of leptons/quarks, which cross section can be estimated by results from the Standard Model. The values of $\psi(0)$ and $E_{bound}$ are obtained for the solution of the radial Schr\"odinger equation for the Coulomb like potential\cite{epele2008MonKeytomon} \begin{equation} V(r) \simeq -\frac{g^2}{4\pi}\frac{1}{r}. \end{equation} We use the solutions for this potential for the energy eigenvalues, \begin{equation} E_n = -\left(\frac{1}{8\alpha_{elm}}\right)^2\frac{m}{n^2} \end{equation} and the value of wave eigenfunctions in the origin, \begin{equation} \psi_{n00} = \frac{1}{\sqrt{\pi}}\left(\frac{m}{8\alpha_{elm}n}\right)^{3/2}. \end{equation} The condition of bound state, $0\leq 2m + E_n \leq 2m$, imposes a condition on allowed values of $n$. With the above eigenvalues, only values $n\geq 13$ are possible and we will use $n=13$. Recently, \cite{Barrie:2016wxf_2} proposed a monopolium model with finite size based on the 't Hooft-Polyakov solution and $U(1)$ lattice gauge theory which result on a binding potential with a linear term, similar to the Cornell potential of the quarkonium states in QCD\cite{Eichten:1978tg}. A similar approach was also proposed in \cite{saurabh2017MonIntPot}. In a future work, we will consider the numerical solutions for the eigenstates of monopolium for this class of confining potentials. \section{Formalism of peripheral collisions \label{sc:fpc}} The process of central production of particles\cite{khoze2001DoudifprohigresmismasexpTev,khoze2000CanHigbeseerapgapeveTevorLHC} has attracted much attention in the recent years, specially with the start of the LHC operation and besides the dedicated experiments to his observation\cite{albrow2009FP4ampProHigNewPhyforproLHC}. Beyond the Higgs boson, several other particles can be produced, some in a expressive ratio, inside this mechanism. The process can be described\cite{khoze2000CanHigbeseerapgapeveTevorLHC,khoze2001DoudifprohigresmismasexpTev,petrov2004ExcdoudifeveMenLHC} as the collision of two hadrons (or leptons) which interact themselves by the gauge boson exchange (see Fig. \ref{fig:ff}). In exclusive channels, the projectiles remain intact after the interaction and the gauge bosons combine, generating a massive resonance with the same quantum numbers of the vacuum, resulting in rapidity gaps in the detector. \begin{figure}[ht] \begin{center} \includegraphics*[width=0.45\columnwidth]{process_open.eps} \includegraphics*[width=0.45\columnwidth]{process_bound.eps} \end{center} \caption{Production of monopole/antimonopole pair (left) and monopolium (right). The straight lines are the projectiles, the wavy lines, photons and the dotted lines, monopoles or monopolium.} \label{fig:ff} \end{figure} This mechanism presents some advantages, as, for example, a very clean experimental signature, a improved mass resolution and a suppressed background. For another side, there exist disadvantages: the theory is not free of divergences, the measure of cross sections is hard-working, requiring detectors installed away of the interaction point\cite{albrow2010CenExcParProHigEneHadCol} and the experimental signal is low. Our focus is at photon processes in peripheral collisions\cite{baur2002Cohgamgamgamintverpercolrelioncol,bertulani2005Phyultnuccol,baltz2008PhyUltColLHC}. This process is described using the photon equivalent approximation. In this picture, a electric charged particle with high energy have the electromagnetic fields concentrated in his transverse region and can be substituted by a equivalent photon flux. This photons interact to produce the massive resonance. In peripheral collisions, the impact parameter is great than the sum of radius of the particles, avoid frontal collisions and thus high particle multiplicities produced in the interaction. Using the most simple model \cite{nystrand2005Eleintnucprocol} for a estimation for total cross sections in all the cases: electron-electron, proton-proton and ion-ion collisions, \begin{equation} \label{eq:photequiv} \sigma_\mathrm{tot} = \int_{M_{\gamma\gamma}^2/s_{NN}}^1 dx_1 f_A(x_1) \int_{M_{\gamma\gamma}^2/x_1s_{NN}}^1 dx_2 f_B(x_2) \sigma_{\gamma\gamma}(\hat{s}) \end{equation} where $M_{\gamma\gamma}$ is the mass of the central produced system, $s_{NN}$ is the center-of-mass energy of the projectiles, $x_i$ is the fraction of the energy of the photon $i$, $\hat{s} = x_1 x_2 s_{NN}$ and $f(x)$ is the photon energy spectrum produced by a charged particle. The Weizsacker/Williams\cite{williams1934Nathigparpenradstaionradfor} expression for photon spectrum (used for ion collisions) is \begin{equation} \label{eq:ww} f_\mathrm{WW}(x) = \frac{\alpha_{elm}Z^2}{\pi}\frac{1}{x}\left[ 2YK_0(Y)K_1(Y) - Y^2\left(K_1^2(Y) - K_0^2(Y)\right) \right], \end{equation} with $Y=xM_Ab_{min}$ where $\alpha_{elm}$ is the fine structure caonstant, $Z$ is the atomic number of the projectile, $M_A$ is the mass of projectiles, $b_{min}$ is the minimum impact parameter and $K_i$ is the modified Bessel functions. For proton collisions, we use the Dress and Zeppenfeld photon spectrum\cite{drees1989ProSupParElaepCol} given by \begin{equation} f_\mathrm{DZ}(x) = \frac{\alpha_{elm}Z^2}{2\pi x}\left[1+(1-x)^2\right]\left[ \ln A - \frac{11}{6} + \frac{3}{A} - \frac{3}{2A^2} + \frac{1}{3A^3}\right] \end{equation} where \[ A = 1 + \frac{\unit{0.71}{\GeV^2}}{Q^2_\mathrm{min}},\qquad Q_\mathrm{min}^2 \simeq \frac{m_p^2x^2}{1-x}. \] For the electron case, we use the expression of Frixione\cite{frixione1993ImpWeiappele-procol}, \begin{equation} f_{e}(x) = \frac{\alpha_{elm}}{2\pi} \bigg\{ 2m_{e}^{2}x \left[ \frac{1}{q^2_{max}} - \frac{1}{q^2_{min}}\right] + \frac{1+(1-x)^2}{x}\log\left(\frac{q^2_{min}}{q^2_{max}}\right) \bigg\} \end{equation} where \[ q^2_{max} = -\frac{m_{e}^{2}x^2}{1-x},\quad q^2_{min} = -\frac{m_{e}^{2}x^2}{1-x} - E^2(1-x)\theta_c^2 \] with $m_e$ is the electron mass and $E$ is the energy beam and $\theta_{c} = \unit{30}{mrad}$. Same question are address in this process: the rise of the photon flux with atomic number of projectiles ($Z^4$); the low luminosity in ion-ion collisions; the Coulomb dissociation and excited states of projectiles \cite{hencken1995PholumrelheaioncolLHCene,baltz1998SupheaiongamgamproHigbyCoudis} (not consider here) and the nuclear charge form factor which modifies the photon flux and the overlap of hadron tails in the collision. \section{Results \label{sc:res}} We calculate the cross section as a function of the mass of central system at fixed center-of-mass energies corresponding to different colliders. First, we present in the Fig. (\ref{fig:pb}) the results of lead-lead collisions at LHC energy ($\sqrt{s} = \unit{5.5}{\GeV}$) for the production of monopole/antimonopole pairs and monopolium. As expected, the cross section decreases with the raise of the mass and the values are very low, although the enhancement in atomic number ($Z^4$) in the photon luminosity of the projectiles. As the massive central system requires a great amount of energy, there are very few energetic photons produced by a ionic projectile, diminish the cross section. \begin{figure}[ht] \begin{center} \includegraphics*[width=0.45\columnwidth]{mm-chumbo} \includegraphics*[width=0.45\columnwidth]{M-chumbo} \end{center} \caption{Total cross section for the production of monopole-antimonopole (left) and monopolium (right) in lead-lead collisions at LHC energies as function of the mass of monopole/monopolium.} \label{fig:pb} \end{figure} Next, we calculate the same quantity for proton-proton collisions in the LHC energy ($\sqrt{s} = \unit{14.0}{\GeV}$) and displayed the results in the Fig. (\ref{fig:pp}). The above general features of the result are the same as in lead-lead collision case, except that the cross section in this case are greater than the previous one. Comparing different produced particles scenarios, the monopolium have a cross section three orders of magnitude smaller. For comparison with the previous results\cite{kurochkin2006promagmonviagamgamfushigeneppcol,dougall2009Dirmagmonprophofusprocol,epele2012LoomagmonLHCdipeve}, the present one for both cases are agree with the previous results found in the literature. \begin{figure}[ht] \begin{center} \includegraphics*[width=0.45\columnwidth]{mm-proton} \includegraphics*[width=0.45\columnwidth]{M-proton} \end{center} \caption{Total cross section for the production of monopole-antimonopole (left) and monopolium (right) in proton-proton collisions at LHC energies as function of the mass of monopole/monopolium.} \label{fig:pp} \end{figure} At last, we present the results of cross section for the production of monopoles and monopolium at electron-positron collisions at future CLIC energies\cite{Aicheler:2012bya}. Again, in comparison with the results from hadron projectiles, we obtain a same behavior as a function of the central produced system but with a significant larger cross section. As in previous cases, due the large mass of monopolium, his cross is smaller than the monopole/antimonopole case. \begin{figure}[ht] \begin{center} \includegraphics*[width=0.45\columnwidth]{mm-eletron} \includegraphics*[width=0.45\columnwidth]{M-eletron} \end{center} \caption{Total cross section for the production of monopole-antimonopole (left) and monopolium (right) in electron-electron collisions at planned CLIC energies as function of the mass of monopole/monopolium.} \label{fig:ee} \end{figure} \section{Summary and conclusions \label{sc:cls}} In this work, we consider the central exclusive production of (Dirac) magnetic monopoles and the bound state of a monopole and antimonopole, the monopolium, for hadronic and eletronic collissions at LHC and (planned) CLIC energies. We present a prediction for the cross sections for lead-lead collisions and electron-electron collisions and, for the proton case, a comparison with the previous results. In the treatment of the production of magnetic monopoles exist several drawbacks. One of them is the strong coupling with photons, which not justificate a perturbative calculation. Another problem is absence of direct experimental observation of magnetic monopoles. In the literature, only estimatives of mass and charge can be found. Other disadvantage is the large mass of the central state, already delimitaded by the experimental results avaliable. In present formalism, the production of this central states are disfavored due the very small number of equivalent photons with required energy to produce this particles. In the lead case, we have a large radii and, as we interessed in exclusive processes, the number of photons rise quickly, nullyfing the gain in atomic number $Z$ in comparisson with proton collisions and also have a low luminosity in the collider. However, besides the above issues, the results are promissing in the case of electronic and proton collisions. In particular, the productiion in a electron-electron collider will be measurable in a significative rate of events, basead in the planned luminosity of the CLIC collider and the above results for the cross section in this case, for a large gap of monopole mass values and even in the case of exclusive production, which have a small cross section. Comparing the proton and electron processes, the first one could include inclusive and inelastic processes, that rises the total cross section, while the electron collisions only have the process consider in this work, which gives a very clean experimental signal. \begin{acknowledgments} The authors thanks the Grupo de Altas e M\'edias Energias for the support in all stages of this work. J.T.R. thanks CAPES for the financial support during the development of this work. \end{acknowledgments}
\section{Introduction} Highly collimated relativistic jets, most evident in radio emission, are a remarkable observational phenomenon of active galactic nuclei (AGNs). Consensus has been reached that jets are a direct consequence of the accretion process onto black holes (BHs). Decades after their discovery, however, it is still a fundamental question in accretion theory regarding the mechanism of the launching, accelerating, collimating and propagating of a jet (for reviews see, e.g., \citealt{1998ARA&A..36..539F,2010LNP...794..233S,2015SSRv..191..441H}). It also remains open as to what physical factors govern the jet power and thus the radiative output. The accretion rate is obviously a key factor, but additional factors should also play their roles (see below). Observationally, in the studies of the radio emission of AGNs, radio loudness $\mathcal{R}$ is widely adopted to characterize the relative radiative importance of the jet to the accretion disk (AD). It is defined as the ratio of the radio luminosity (traditionally at \mbox{5\,GHz}) to either the UV luminosity (monochromatic, at the $B$ band) or the X-ray luminosity (integrated in the 2--10 keV range); i.e., $\mathcal{R}=L_\nu(\mbox{\rm 5\,GHz})/L_\nu(B)$ \citep{1989AJ.....98.1195K} or $\nu L_\nu(\mbox{\rm 5\,GHz})/L_X(\mbox{\rm 2--10\,keV})$ \citep{2003ApJ...583..145T}. There have been a lot of observational investigations on the relation between $\mathcal{R}$ and other AGN parameters such as AGN luminosity or the Eddington ratio \citep[$\ensuremath{\ell}} %%{\ensuremath{L/\ledd} \equiv \ensuremath{L{_{\rm bol}}}/\ensuremath{L{_{\rm Edd}}}$; see][]{2002ApJ...564..120H \footnote{\,The parameter Eddington ratio (\ensuremath{\ell}} %%{\ensuremath{L/\ledd}) is defined as the ratio between the bolometric luminosity (\ensuremath{L{_{\rm bol}}}) and the Eddington luminosity ($L_{\rm Edd} = 1.3\times 10^{38}\, (M_{\rm BH}/M_{\odot})\,{\rm erg\,s^{-1}}$). In accretion-powered radiation systems, \ensuremath{\ell}} %%{\ensuremath{L/\ledd}\ is often referred to as the dimensionless accretion rate $\dot{m}$ (the mass accretion rate normalized by the Eddington accretion rate, $\dot{m} \equiv \dot{M}/\dot{M}_{\rm Edd}$), as $\dot{m}$ is not a direct observable. Yet, the two notations are different, both in meaning and in scope of application; see Footnote~8 of \cite{2011ApJ...736...86D}. }, BH mass \citep[\ensuremath{M_{\rm BH}}; see][]{2000ApJ...543L.111L, 2002ApJ...564..120H}, host-galaxy morphology \citep[as a proxy of BH spin; see][]{2007ApJ...658..815S}, galactic environment \citep[e.g.,][]{2009ApJ...697.1656S}, etc. Unfortunately, no consensus has been reached \citep[see the references above; also][]{2008ApJ...685..801Y,2016A&ARv..24...10T,2016ApJ...833...30C,2017MNRAS.466..921C}. For instance, is the apparent dichotomy between radio quiet ($\mathcal{R} < 10$) and radio loud intrinsic or not? What is the primary driver of $\mathcal{R}$, \ensuremath{M_{\rm BH}}\ or \ensuremath{\ell}} %%{\ensuremath{L/\ledd}\ (or both)? On the other hand, empirical relations have been explored in the line of the coupling between accretion disk and jet. \citet{2003MNRAS.345.1057M} extended the work of the radio/X-ray correlation discovered in BH X-ray binaries (BHXBs) (\citealt{2003A&A...400.1007C,2013MNRAS.428.2500C}) to AGNs, and discovered a linear (in logarithmic space) correlation among $L_R$, $L_X$ and $\ensuremath{M_{\rm BH}}$, which is usually called the `fundamental plane' (FP) of BH activity (see also \citealt{2004A&A...414..895F,2008ApJ...688..826L,2009ApJ...706..404G,2014ApJ...788L..22G, 2015MNRAS.453.3447D,2015MNRAS.447.1289P,2016ApJ...818..185F,2017ApJ...836..104X}). Note that in FP studies only continuous/steady jets rather than transient/episodic jets are considered (see \citealt{2009MNRAS.396.1370F} for the classification of these two types of jets in X-ray binaries). The FP can be written as \begin{equation} \log L_{R}=\xi_X \log L_{X}+\xi_M \log M_{\rm BH} +C ~ . \label{FP} \end{equation} The best-fit parameters achieved by \citet{2003MNRAS.345.1057M} are $\xi_X=0.60^{+0.11}_{-0.11}$, $\xi_M=0.78^{+0.11}_{-0.09}$, and $C=7.33^{+4.05}_{-4.07}$. Later works found that the FP is remarkably tight; and individual systems reveal that the FP or the standard radio/X-ray correlation holds for a large dynamic range in $L_{\rm X}/L_{\rm Edd}$, even for the so-called quiescent BHXBs (\citealt{2014MNRAS.445..290G,2017ApJ...834..104P}). They are consistent with the theoretical expectation of the coupled accretion--jet models (\citealt{2005ApJ...629..408Y}; see also \citealt{2003MNRAS.343L..59H}). Furthermore, FPs with different coefficients seem to apply in bright, radiatively efficient AGNs (see, e.g., \citealt{2014ApJ...787L..20D}), as well as in faint, jet-emission-dominated AGNs (see, e.g., \citealt{2009ApJ...703.1034Y,2017ApJ...836..104X}). However, several BHXBs (\citealt{2011MNRAS.414..677C,2013MNRAS.428.2500C}) and one AGN, NGC 7213 (\citealt{2011MNRAS.411..402B,2016MNRAS.463.2287X}), may be yet classified as ``outliers" to the standard FP, as their individual variability exhibits hybrid radio/X-ray correlations rather than a single power-law relation with a constant index $\xi_X$ (cf. \S3.1). Following the discovery of the FP, there have been intense discussions in the literature, particularly focusing on understanding the physics of the AD--jet coupling in AGNs (of different accretion rates) with the insights from the accretion states and state transitions of BHXBs (e.g., \citealt{2006MNRAS.372.1366K}), and on applying the FP to estimate \ensuremath{M_{\rm BH}}\ (e.g., \citealt{2009ApJ...706..404G}). Apart from those implications and applications, even if the FP were valid only statistically (namely in an ensemble sense) for AGNs, it provides a coherent interpretation to the aforementioned observed phenomena concerning $\mathcal{R}$, at least as an empirical induction that may instill a deeper insight. In the FP studies, there is a clear gap in \ensuremath{M_{\rm BH}}\ between the BHXBs with stellar-mass BHs and common AGNs with supermassive BHs (SMBHs, $\ensuremath{M_{\rm BH}} \gtrsim 10^{6.5} \ensuremath{M_{\odot}}$). As noted in \citet{2014ApJ...788L..22G}, accreting systems with $\ensuremath{M_{\rm BH}} \approx 10^{2-6}$\,\ensuremath{M_{\odot}}\ (a range that includes low-mass AGNs) are crucial. There are several reasons for this. First, these systems will fill the mass gap of current FP research. Second, the evolutionary timescale of accretion onto the BHs is likely systematically shorter than that in common AGNs. Consequently, it is possible in the future to investigate the FP in \textit{individual} low-mass AGNs of very small \ensuremath{M_{\rm BH}}, i.e., the radio/X-ray correlation at given \ensuremath{M_{\rm BH}}\ values exhibited in the variability of individual sources, similar to the case of BHXBs; see, e.g., NGC\,7213 (Bell et~al.\ 2011), and NGC\,4395 (King et~al.\ 2013). The radio/X-ray correlation of individual sources will provide a cleaner environment, where systematic uncertainties caused by the BH spin and relativistic beaming effect due to different viewing angles are eliminated. \citet{2014ApJ...788L..22G} for the first time used low-mass AGNs to check the two FP relations of \citet{2009ApJ...706..404G}, one based on a SMBH-only sample and the other based on a combined SMBH$+$BHXB sample. Their result suggested that there exists a universal FP that is valid for accreting systems with \ensuremath{M_{\rm BH}}\ of all scales , i.e., SMBHs, low-mass AGNs and stellar-mass BHs. However, the low-mass AGN sample size of \citet{2014ApJ...788L..22G} is rather limited, with only 10 data points (including 3 sources with only upper limits on radio or X-ray measurements). Further investigations of the FP with more low-mass AGNs are needed. In this work, we developed a new method to obtain the radio measurement directly from the images of the VLA FIRST survey (\citealt{1995ApJ...450..559B}), and applied it to the low-mass AGN sample of \cite{2012ApJ...755..167D}. This results in 19 new low-mass AGNs for FP research, with known virial \ensuremath{M_{\rm BH}}\ estimated from their broad emission lines, firm X-ray detection, and radio detection with S/N $>3$ (8 of the 19 objects can be regarded as reliable radio sources). The method and our measurements, as well as the collection of low-mass AGNs in the literature suitable for FP research, are presented in \S2. \S3 presents our data analysis and results. \S4 gives a brief summary and plans for the future works. Throughout the paper, we assume a flat cosmology with $H_0=70\ \rm km\ s^{-1}\ Mpc^{-1}$, $\Omega_{\rm m}=0.3$, and $\Omega_{\lambda}=0.7$. \section{Data of low-mass AGNs} The low-mass AGN sample used in this work includes two datasets. The main dataset is our measurements based on VLA FIRST images and archival X-ray observations, comprising 19 sources with known virial mass \ensuremath{M_{\rm BH}}. With measurements of all the three parameters ($L_R$, $L_X$ and \ensuremath{M_{\rm BH}}), they represent significant increment to the research of BH FP. This new dataset is listed in Table~1. For completeness, we also collect all the low-mass AGNs in the literature with reliable measurements of $L_R$ and $L_X$ and having \ensuremath{M_{\rm BH}}\ estimates that are not from the BH FP relation. This supplementary literature dataset includes 10 sources in total (see Table~2). The entire low-mass AGN sample includes 29 sources, 18 of which have well-measured radio luminosities. The sources of the entire sample are moderately bright, as shown in Figure~\ref{rxedd} (the $x$-axis). With four exceptions, all sources have $10^{-3}\la L_X/\ensuremath{L{_{\rm Edd}}} \la 1$, clustering in the range $L_X/\ensuremath{L{_{\rm Edd}}} \approx 10^{-2}$\,--\,$10^{-0.5}$. According to the $L_X/\ensuremath{L{_{\rm Edd}}} \approx 1\times 10^{-3}$ separation between bright AGNs and low-luminosity AGNs based on their distinctive properties (e.g. \citealt{2008ARA&A..46..475H,2015MNRAS.447.1692Y}), the low-mass AGNs here mainly belong to the bright AGN category. Below we describe the radio and X-ray measurements of the new dataset, and the compilation of the literature dataset. \subsection{Our measurements} \label{sample} Our parent low-mass AGN sample is the 309 broad-line AGNs with $\ensuremath{M_{\rm BH}} < 2 \times 10^6 \ensuremath{M_{\odot}}$ compiled by \citet{2012ApJ...755..167D}. The $\ensuremath{M_{\rm BH}}$ was derived from the luminosity and width of the broad H${\alpha}$ emission line, using the virial formalism calibrated by \cite{2007ApJ...670...92G} based on single-epoch spectra. The statistical uncertainty of the estimated $\ensuremath{M_{\rm BH}}$ should be around 0.3\ dex typically (see, e.g., \citealt{2009ApJ...707.1334W} for the uncertainty estimation for an AGN sample); yet the uncertainty for some individual sources can be as large as 1 order of magnitude (e.g., Vestergaard \& Peterson 2006). We set the uncertainty of \ensuremath{M_{\rm BH}}\ (and accordingly the Eddington luminosity \ensuremath{L{_{\rm Edd}}}) to be 0.6~dex in the subsequent fitting (\S3.1) and plottings (\S3.1 and \S3.2). Among the sources of \citet{2012ApJ...755..167D}, 288 sources are covered by the VLA FIRST survey. For these sources, we fit the FIRST images \footnote{https://third.ucllnl.org/cgi-bin/firstcutout} and measure the fluxes and the corresponding rms (root of mean square) noises (the details of the fitting and noise determination can be found in \S\ref{sec:rflux}). The sources with flux greater than 3 times the rms noise (namely S/N $>3$) are deemed to have radio detections. This criterion is a tradeoff between minimizing false detections and maximizing the number of reliable radio sources (or candidates of high probability). We will analyze this criterion at the end of this subsection and check it in \S3. There are 52 such radio-detected sources. Then we match them to the X-ray archive, NASA's HEASARC \footnote{http://heasarc.gsfc.nasa.gov} and find 22 sources that we can obtain their X-ray fluxes (\S2.1.2). Among the 22 low-mass AGNs with both radio and X-ray fluxes, there are 3 sources that have already been included in the literature (e.g., included in the low-mass AGN dataset used by \citealt{2014ApJ...788L..22G}; see also Table~2 of \citealt{2012ApJ...753..103N}); they are J0914$+$0853, J1240$-$0029 (namely GH10 after \citealt{2004ApJ...610..722G}), and J1324$+$0446. Excluding those 3 sources (they are listed in the literature dataset instead; see Table~2), our new dataset includes 19 sources. \newline Here we must evaluate our criterion of radio detection, S/N $>3$. We set such a criterion instead of the commonly used flux limit S/N $>5$ (or called 5$\sigma$ if the noise is random and Gaussian), out of the tradeoff between reliability and the purpose to select as many as possible radio-detected sources or candidates. Radio-detected low-mass AGNs are rather rare, and thus even the selection of candidate radio sources has its own merit. Assuming the noise of the FIRST images is Gaussian, the trial penalty, namely the probability of mistaking one or more random fluctuations as radio source(s) with S/N $>3$ out of the parent sample of 288 objects covered by the FIRST survey, is $1-\left(\int^{3\sigma}_{-\infty} G(x)\, \mathrm{d} x\right)^{288} = 0.32$. Here $G(x)$ is the Gaussian probability density function, zero-centered and with a standard deviation $\sigma$. A chance probability of 0.32 is fairly large. To be worse, there are often correlated errors in radio images, and thus the noise is not purely random Gaussian and the false-detection probability would be greater than the above estimated trail penalty; this is the very reason why the conservative flux limit of $5\sigma$ is commonly used. Certainly, on the other hand, our estimation of noise (namely rms; see \S2.1.1) is not merely the random component, but is able to incorporate other error sources to some degree. In order to make up the shortcoming of the S/N $>3$ criterion, we divide the 19 sources into two groups: 8 sources with S/N $>4.43$ (including 4 sources with S/N $>5$) are grouped as the reliable radio detections, and the remaining 11 with radio $3<$ S/N $<4.43$, conservatively speaking, are only candidates. The dividing S/N of 4.43 is set in terms of trial penalty, as follows. For one source, assuming random Gaussian noise the chance probability of false detection associated with the $S/N >3$ criterion is \mbox{$1-\int^{3\sigma}_{-\infty} G(x)\,\mathrm{d} x$} $= 0.0013$. We now require the chance probability for our parent sample of 288 objects to be the same level, i.e., \mbox{$1-\left(\int^{n\sigma}_{-\infty} G(x) \, \mathrm{d} x\right)^{288}$} $\approx 0.0013$, then we get $n = 4.43$. In the subsequent analyses (\S3.1 and \S3.2), we will compare the candidate radio sources with our reliable sources and the literature sources, in the radio/X-ray correlation and in the FP. We find no difference between the two groups of sources. \subsubsection{Radio Flux} \label{sec:rflux} We adopt a new method to obtain the (faint) radio flux for as many low-mass AGNs as possible. This method was first used by \cite{2017ApJ...837..109L}, to measure the 1.4\,GHz flux directly from the VLA FIRST image, when the radio emission is faint and below the flux threshold (1 mJy) set to the official FIRST catalog (\citealt{1995ApJ...450..559B,1997ApJ...475..479W}). Low-mass AGNs are generically radio quiet ($\mathcal{R} < 10$), with only a few ($<6$\%) being radio loud (\citealt{2006ApJ...636...56G}); this is supposedly due to their relatively high accretion rate by selection (as well as small \ensuremath{M_{\rm BH}}\ compared with common AGNs with SMBHs; cf. \S4 below). Among the 288 low-mass AGNs covered by the FIRST survey, only 17 are included in the FIRST catalog. We fit a two-dimensional Gaussian to the FIRST images of every sources. The potential radio sources are assumed to be point-like, with the Gaussian FWHM set to be the beam size (5\farcs4). The center of the Gaussian is fixed to be the optical position of the broad-line nucleus determined by the Sloan Digital Sky Survey (SDSS; \citealt{2000AJ....120.1579Y}). The only free parameter is the flux of the point source. In addition, a CLEAN bias always makes an underestimate of the flux, which is typically \mbox{0.25\,mJy} for point sources (see \S4.3 of \citealt{1997ApJ...475..479W} and \S7.2 of \citealt{1995ApJ...450..559B}). We thus correct this bias for the best-fit flux by adding 0.25 mJy, as all versions of the official FIRST catalog released after 1995 October did (\citealt{1997ApJ...475..479W}) \footnote{See also the handling of the CLEAN bias in the current version of the FIRST catalog (dated 2014 December 17, which is used in our present work):\\ http://sundog.stsci.edu/first/catalogs/readme\_14mar04.html\#cleanbias\,. We caution that such a correction of 0.25 mJy might be inappropriate when the radio sources are close to the rms level; this should be tested by future deeper observations.} As the CLEAN bias arises from that CLEAN algorithm steals flux from discrete sources and spreads it around the image, it also has some influence on the rms noise, which is not yet well understood. We simply measure the rms noise in an empty region of size $9\hbox{$^{\prime\prime}$}\times 9\hbox{$^{\prime\prime}$}$, 20\hbox{$^{\prime\prime}$}\ away from the center of the Gaussian, and take it as the uncertainty of the \mbox{1.4\,GHz} flux. Note that our thus-measured rms values are the actual ones directly from the final co-added images, different from what were used in the FIRST catalog construction (namely the so-called 5$\sigma$ flux threshold) and listed in the catalog (the `RMS' column). The latter was based on the weighted combination of noise values derived from the whole-image rms for each grid map that contributes to that image, as displayed in the rms sensitivity map of the FIRST coverage; \cite{1997ApJ...475..479W} noted that ``it [the coverage-map rms value] should not be used to establish a definitive upper limit to the radio flux density from a given location in the sky; rather, the flux density in the relevant co-added image should be measured directly.'' We consider the sources with the flux (prior to the correction for the CLEAN bias) higher than 3 times the rms noise (namely S/N $>3$) as candidate radio detections. Note that in the S/N calculation the flux is the one prior to the correction for the CLEAN bias. There are 52 such radio-detected sources (including the 17 already in the FIRST catalog), 22 of which have archival X-ray data. We derived their radio flux at 5 GHz from our measured 1.4 GHz flux. Since our sources are relatively bright (namely actively accreting) with X-ray Eddington ratio $10^{-3} < L_X/\ensuremath{L{_{\rm Edd}}} < 1$, we adopt the typical spectral index of bright AGNs, $\alpha_R = -0.5$ (defined as $F_\nu \propto \nu^{\alpha_R}$), for the conversion. We simply assume a 20\% uncertainty in $\alpha_R$, which would cause a 13\% uncertainty in the 5 GHz flux. \newline Admittedly the validity of this new method needs to be tested. For this purpose, we collect radio point sources that have radio flux data and are covered by the FIRST survey, use our new method to measure their radio fluxes, and then make the comparison. We limit our method and the comparison for radio point-like sources only, to minimize the contamination of the radio emission from the host galaxies. The point-like sources are selected in two ways. One part is the 6 unresolved sources among the aforementioned 17 low-mass AGNs included in the FIRST catalog; they are selected to have the beam-corrected major-axis FWHM $<1\farcs5$ (the parameter `\textit{Deconv.\,MajAx}' in the catalog). The other part is the 6 sources that are in the literature dataset (Table~2) and are covered by the FIRST survey (but excluding those with \textit{Deconv.\,MajAx} $\geqslant 1\farcs5$ in the FIRST catalog). Most of the sources are faint, close to the 1 mJy threshold of the FIRST catalog \footnote{When \cite{2014ApJ...788L..22G} selected the targets for their \mbox{5\,GHz} observation, they found that part of their 10 radio sources were not in the FIRST catalog at that time. All the 10 radio sources now are included in the current FIRST catalog (dated 2014 Dec 17; http://sundog.stsci.edu/cgi-bin/searchfirst\,).} The comparison is summarized in Table~\ref{radio_flux}. We can see that the values by our method ($f_{\rm our}$) are in good agreement (all within a factor of $\leqslant$\,1.3) with the fiducial values ($f_{\rm cat}$; from the FIRST catalog). The mean and standard deviation of the relative difference $(f_{\rm our}-f_{\rm cat})/f_{\rm cat}$ are $-0.11$ and $0.10$, respectively. That is, the systematic error and the random uncertainty of our measured flux are both on the level of 10\% only. Therefore it is reliable to apply our method to point-like sources to obtain their radio fluxes. The standard error of the estimated mean (namely, the systematic offset) is only 2.9\%, meaning that the systematic offset is fairly stable. Thus we correct this offset of $-11$\% from our measured fluxes in the subsequent fitting (\S3.1) and plottings (Figures~1 and 2). \subsubsection{X-ray Flux} The $3\sigma$ confidence interval of the positional uncertainty of FIRST is about 1\farcs8 \citep{1995ApJ...450..559B}. The $3\sigma$ confidence intervals of the positional uncertainties of XMM-Newton and Chandra are 4\hbox{$^{\prime\prime}$}\ \citep{2007MNRAS.382..279P} and 2\farcs7 \citep{2007ApJS..169..401K}, respectively. The matching radii of FIRST sources to XMM-Newton and Chandra sources are set to the square root of the quadratic sum of the $3\sigma$ confidence intervals of FIRST and respective X-ray positions, i.e. 4\farcs4, and 3\farcs2, respectively. As to X-ray sources detected by ROSAT, because the positional uncertainty of ROSAT is fairly large, with 1$\sigma$ being 20\hbox{$^{\prime\prime}$}\ \citep{1993AdSpR..13..391V}, we simply set a conservative matching radius of 20\hbox{$^{\prime\prime}$}. Among the 52 radio sources, 22 have X-ray detections (including 3 sources in the literature dataset). The largest offset between the matched ROSAT sources (totaling 8) and their FIRST counterparts is 12\hbox{$^{\prime\prime}$}, which is large and liable to false matching. Thus, if a source has observations of sufficient quality by multiple missions, we adopt the data with the best spatial resolution (or equivalently, with the best positional accuracy), namely in the descending order of Chandra, XMM-Newton and ROSAT. Finally, of the 19 sources in our new dataset, 10 sources adopt Chandra data, 3 adopt XMM-Newton data, and the rest 6 adopt ROSAT data (see Table~1). The final adopted X-ray sources turn out to have the offset distances to their optical positions within 6\hbox{$^{\prime\prime}$}\ (ROSAT), 2\hbox{$^{\prime\prime}$}\ (XMM-Newton) and 2\hbox{$^{\prime\prime}$}\ (Chandra), respectively. The small offsets of the ROSAT matches with respect to their matching radius are owing to the small number (6 sources). Such positional offsets are roughly within the optical extent of their SDSS images. We visually inspect their various optical images available in the NED% \footnote{http://ned.ipac.caltech.edu}, and find no ambiguous sources coinciding within their offset distances. The X-ray flux (or count rate) and its uncertainty are retrieved from HEASARC. The flux is measured in the energy range of 0.3 to 8 keV for Chandra, and in 0.2 to 12 keV for XMM-Newton; the count rate of ROSAT is measured in the energy range of 0.1 to 2.4 keV. With these data, we then use the WebPIMMS\footnote{heasarc.gsfc.nasa.gov/cgi-bin/Tools/w3pimms/w3pimms.pl} of HEASARC to convert the X-ray flux or count rate to the flux in the energy range of 2--10 keV, assuming an absorbed power-law form with photon index taken to its typical value of $2$. We simply assume a 10\% uncertainty in photon index in the subsequent error analysis, which would cause a 15\% to 30\% uncertainty in the 2--10 keV flux. For the absorption, we only consider that from our Galaxy, and the Galactic hydrogen column density is obtained with the $N_{\rm H}$ too \footnote{http://heasarc.gsfc.nasa.gov/cgi-bin/Tools/w3nh/w3nh.pl} of HEASARC with LAB map. Two sources (J0824$+$3800 and J1347$+$4743) were also included in \cite{2015ApJ...808..163P}; their measured fluxes based on the XMM-Newton data agree well with our measurements. \subsection{Sources from the literature} \label{literature} In Table~\ref{literaturetable}, we list all the low-mass AGNs for the FP studies in the literature. These include the 7 sources of \citet{2014ApJ...788L..22G} that had firm detections in both radio and X-ray (with the 3 upper-limit sources dropped) and had virial \ensuremath{M_{\rm BH}}\ from \cite{2007ApJ...670...92G}. In addition, we also include NGC 4395 and NGC 404 \citep{2012ApJ...753..103N}, and Henize 2-10 \citep{2016ApJ...830L..35R}. The \ensuremath{M_{\rm BH}}\ of NGC 4395 is obtained by reverberation mapping, and the \ensuremath{M_{\rm BH}}\ of NGC 404 is obtained by dynamical measurements. The \ensuremath{M_{\rm BH}}\ of Henize 2-10 is estimated from the stellar mass of the host galaxy. See the above references for the details of the radio and X-ray measurements and the \ensuremath{M_{\rm BH}}\ estimation. \section{Low-mass AGNs on the fundamental plane} \subsection{The radio/X-ray correlation} Before exploring the FP of BH activity, we first examine the radio/X-ray correlation among low-mass AGNs. We consider their radio and X-ray luminosities in terms of Eddington unit, i.e. $L_R/\ensuremath{L{_{\rm Edd}}}$ and $L_X/\ensuremath{L{_{\rm Edd}}}$, in order to reduce the impact of $\ensuremath{M_{\rm BH}}$. Figure~\ref{rxedd} shows the $L_R/\ensuremath{L{_{\rm Edd}}}$\,--\,$L_X/\ensuremath{L{_{\rm Edd}}}$ relationship, where the sources of the new dataset are shown as pentagons (the 8 reliable radio sources with S/N $>4.43$; see \S2.1) or triangles (the 11 candidate radio sources with $3<$ S/N $<4.43$), while the literature dataset are shown as open circles. We fit the entire sample with a single power-law model (i.e., linear in the log--log scale), using the LINMIX\_ERR program (\citealt{2007ApJ...665.1489K}) that accounts for measurement errors in both axes. The systematic offset of our measured $L_R$ values with respect to the fiducial ones ($-11$\%; see \S2.1.1) is corrected in the fitting. The total uncertainty of $L_R$ is the quadrature sum of the following three terms: the rms noise, the error introduced by the assumed $\alpha_R$, and the random uncertainty with respect to the fiducial (see \S2.1.1 for the details of the three terms). The total uncertainty of $L_X$ is the quadrature sum of the following two terms: the uncertainty from the archive and the error introduced by the assume photon index (see \S2.1.2 for the details). The uncertainty of \ensuremath{L{_{\rm Edd}}}\ is simply 0.6 dex (see \S2.1). The fitting result is as follows (the dotted line in Figure~\ref{rxedd}), \begin{equation} \label{eq_LrLx0} \log (L_R/{\ensuremath{L{_{\rm Edd}}}}) = (0.70 \pm 0.05)\, \log (L_X/{\ensuremath{L{_{\rm Edd}}}}) -(4.75 \pm 0.18) ~ , \end{equation} with a reduced $\chi^2=0.56$. We can see from Figure~\ref{rxedd} that a data point at $\log\,L_X/{\ensuremath{L{_{\rm Edd}}}} = -3.75$ deviates from the best-fit line by about 3$\sigma$; this outlier is \mbox{NGC\,4395}. When \mbox{NGC\,4395} is excluded, the best fit becomes \begin{equation} \label{eq_LrLx} \log (L_R/{\ensuremath{L{_{\rm Edd}}}}) = (0.64 \pm 0.04)\, \log (L_X/{\ensuremath{L{_{\rm Edd}}}}) -(4.77 \pm 0.11) ~ , \end{equation} with a reduced $\chi^2=0.25$; see the solid line in Figure~\ref{rxedd}. Such a small reduced $\chi^2$ indicates that the uncertainties of the data are over-estimated to some degree. This best fit is close to the $L_R\propto L_X^{0.62}$ relation reported in GX 339-4, a typical BHXB \citep{2013MNRAS.428.2500C}, implying that all the low-mass AGNs (probably except \mbox{NGC\,4395}) are standard ones (namely, obeying a single power-law $L_R\propto L_X^{\xi_X}$) rather than ``outliers" in terms of the radio/X-ray correlation of BH accreting systems (cf. \S1). In order to test the difference between the candidate sources (3 $<$ S/N $<$ 4.43) and the well-measured sources (S/N $>$ 4.43, excluding NGC 4395), we exclude the candidate sources as well as NGC 4395, and perform the fitting again. The best fit is almost the same as Eq.~\ref{eq_LrLx}, being $\log (L_R/{\ensuremath{L{_{\rm Edd}}}}) = (0.66 \pm 0.04)\, \log (L_X/{\ensuremath{L{_{\rm Edd}}}}) -(4.69 \pm 0.14)$. We note in passing that the outlier \mbox{NGC\,4395} deserves further investigation in the future. It has a reliable \ensuremath{M_{\rm BH}}\ measurement by reverberation mapping method (\citealt{2005ApJ...632..799P}). From a joint monitoring in radio (VLA) and X-ray ({\it Swift}/XRT) in 2011, \mbox{NGC\,4395} seemed to follow a flat radio/X-ray correlation, i.e. $L_R\propto L_X^{\sim 0}$ (\citealt{2013ApJ...774L..25K}). Although that result was not robust due to the very limited dynamic range in both $L_R$ and $L_X$, it suggested that \mbox{NGC\,4395} might be a source that follows the flat branch of the hybrid radio/X-ray correlation (\citealt{2016MNRAS.456.4377X}; cf. NGC 7213, \citealt{2016MNRAS.463.2287X}). \subsection{The fundamental plane} We then examine the low-mass AGNs in the FP of BH activity. Because our sample is still not large and the data (particularly the radio fluxes) demand to be refined, in this work we refrain from fitting the data to get a new relation. Instead, we take the same approach as \citet{2014ApJ...788L..22G}, by examining our data with respect to several well-known FP relations in the literature. Three FPs are considered: the \citet{2003MNRAS.345.1057M} relation ($\xi_X=0.60$, $\xi_M=0.78$, and $C=7.33$), and the SMBH-only (i.e., fitted with SMBH systems only; $\xi_X=0.50$, $\xi_M=2.08$, and $C=0.40$) and the universal (i.e., fitted with their combined sample of SMBH and stellar-mass BH systems; $\xi_X=0.67\pm0.12$, $\xi_M=0.78\pm0.27$, and $C=4.80\pm0.24$) FP relations of \cite{2009ApJ...706..404G}; they are illustrated in Figure~\ref{fp_large_range}, from left to right, respectively. Note that in the figure the systematic offset of our measured $L_R$ values with respect to the fiducial ones ($-11$\%; see \S2.1.1) is corrected, and the error bars of our data points are calculated with the error terms listed in the above (\S3.1) in terms of the standard error propagation formula. The low-mass AGNs match best the universal FP of \cite{2009ApJ...706..404G}; this confirms the conclusion of \citet{2014ApJ...788L..22G}. We further test the difference between the candidate sources (our 11 objects with 3 $<$ S/N $<$ 4.43, called Group 1) and the well-measured sources (our 8 new objects with S/N $>$ 4.43 plus the 9 sources from the literature excluding NGC 4395, called Group 2 here), in terms of the FP. We calculate the orthogonal distances of every sources to the line of the edge-on viewed universal FP of \cite{2009ApJ...706..404G} as depicted in Figure~\ref{fp_large_range} (right panel). The mean and standard deviation of the distances are 0.20 and 0.35, respectively, for Group 1; 0.29 and 0.26, respectively, for Group 2. The standard errors for the two mean values are therefore 0.10 (Group 1) and 0.06 (Group 2). Thus the difference (namely 0.09) between the mean values of the two groups is well within 1-$\sigma$ error. We also perform Kolmogorov-Smirnov test for the two distributions of the distances. The resultant $p$-value (chance probability) is 0.70, meaning that we cannot reject the hypothesis that the distributions of the two groups are the same. \subsection{AGN radio loudness and its dependence on \ensuremath{M_{\rm BH}}} It is now generally believed that, in non-blazar AGNs of either low or high accretion rates, the radio emission comes predominantly from the jet, while the high-frequency emission (from the optical through X-ray) comes from the accretion flow and thus is treated as an indicator of accretion rate, namely the Eddington ratio (\ensuremath{\ell}} %%{\ensuremath{L/\ledd}) in practice~\citep[e.g.][]{2003MNRAS.343L..59H,2015MNRAS.450.2317S}. For AGNs, we can simply assume \ensuremath{\ell}} %%{\ensuremath{L/\ledd}\ \mbox{$\propto L_X/ M_{\rm BH}$}. In the literature the bolometric correction $\kappa_{\rm x}$ (defined as \ensuremath{L{_{\rm bol}}}/$L_X$) values for AGNs once differed considerably, and depended on \ensuremath{L{_{\rm bol}}}\ and \ensuremath{\ell}} %%{\ensuremath{L/\ledd}. This mainly arose from the spectral complexity associated with absorption (see Vasudevan et~al.\ 2010 and references therein). The recent studies, with various improvements in calculating the intrinsic X-ray luminosity and particularly the bolometric luminosity, indicate that $\kappa_{\rm x}$ is typically in the range 10--30 derived from the observational data with an intrinsic scatter of \mbox{$\sim$0.2\,dex}, not as large as previous deemed, and that its dependence on either \ensuremath{L{_{\rm bol}}}\ or \ensuremath{\ell}} %%{\ensuremath{L/\ledd}\ is mild for the observed \ensuremath{\ell}} %%{\ensuremath{L/\ledd}\ regime ($\approx$10$^{-3}$ to 1); see, e.g., Vasudevan et~al.\ (2010), Brightman et~al.\ (2017) and references therein. Such a magnitude of $\kappa_{\rm x}$ variation does not impact our deduction here. Thus it is easy to understand the dependence of $\mathcal{R}$ on \ensuremath{M_{\rm BH}}\ and \ensuremath{\ell}} %%{\ensuremath{L/\ledd}\ in terms of the FP (Eq.~\ref{FP}), as follows \begin{equation} \log\mathcal{R} = (\xi_X -1) \log {\ensuremath{\ell}} %%{\ensuremath{L/\ledd}} + (\xi_M +\xi_X -1) \log M_{\rm BH} + const. ~~ . \label{loudness_FP} \end{equation} With the coefficients and their uncertainties of the universal FP of \cite{2009ApJ...706..404G}, Eq.~\ref{loudness_FP} reads: \begin{equation} \log\mathcal{R} = (-0.33\pm0.12) \log {\ensuremath{\ell}} %%{\ensuremath{L/\ledd}} + (0.45\pm0.30) \log M_{\rm BH} + const. ~~ . \label{loudness_FP_G09} \end{equation} It attracts us to speculate that the radio loudness of AGNs depends not only on \ensuremath{\ell}} %%{\ensuremath{L/\ledd}\ but probably also on \ensuremath{M_{\rm BH}}, even possibly to an almost equal degree (tentatively judging from the similar magnitudes of the best-fit power-law indexes). The correlation might be positive with \ensuremath{M_{\rm BH}}\ albeit the statistical significance being only 1.5-$\sigma$ ($\mathcal{R} \propto M_{\rm BH}^{0.45\pm0.30}$), and negative with \ensuremath{\ell}} %%{\ensuremath{L/\ledd}\ albeit the statistical significance being 3-$\sigma$ ($\mathcal{R} \propto \ensuremath{\ell}} %%{\ensuremath{L/\ledd}^{-0.33\pm0.12}$). If we adopt the fitting result of \citet{2003MNRAS.345.1057M}, where the best-fit $\xi_X$, its uncertainty, and the $\xi_M$ value are all similar to the universal relation of \cite{2009ApJ...706..404G} but the uncertainty to $\xi_M$ is reduced by a half, then the \ensuremath{\ell}} %%{\ensuremath{L/\ledd}\ dependence would be of 3.6-$\sigma$ significance, and the \ensuremath{M_{\rm BH}}\ dependence would be of 2.4-$\sigma$ significance. The currently large error bars on the indexes of the above FP relations allow a considerable chance probability, 7\% (namely single-sided 1.5-$\sigma$ Gaussian deviance), for no correlation or a negative correlation between $\mathcal{R}$ and \ensuremath{M_{\rm BH}}, thus the above speculation is yet to be verified. On the other hand, this speculation is consistent with---and somehow reinforced by---almost all the significant $\mathcal{R}$-related correlations in AGNs with either \ensuremath{M_{\rm BH}}\ or \ensuremath{\ell}} %%{\ensuremath{L/\ledd}\ that were discovered mainly by bivariate correlation analysis before \citep[e.g.][]{2000ApJ...543L.111L,2006ApJ...636...56G}. Furthermore, now Eq.~(\ref{loudness_FP_G09}) seems to evoke a panoramic---and probably more insightful (see below)---understanding. The negative $\mathcal{R}$--$\ensuremath{\ell}} %%{\ensuremath{L/\ledd}$ correlation can be easily understood under the widely accepted coupled accretion--jet models \citep{2005ApJ...629..408Y, 2003MNRAS.343L..59H}, where the accretion flow responsible for the X-ray is a hot component, either a hot accretion flow \citep{2014ARA&A..52..529Y} or a corona located above the cold accretion disk (\citealt{1973A&A....24..337S}). In this model, the key factor to produce such a negative correlation is the mass accretion rate $\dot{M}$. Hot accretion flow predicts $L_X\propto \dot{M}_{\rm BH}^{\approx2-3}$ \citep{2003MNRAS.345.1057M, 2014ARA&A..52..529Y}, while the scale-invariant jet model predicts $L_R\propto \dot{M}_{\rm BH}^{\approx1.4}$ \citep{2003MNRAS.343L..59H}. Regarding the potentially strong and positive correlation between $\mathcal{R}$ and \ensuremath{M_{\rm BH}}, on the other hand, it is not so easy to understand from a theoretical perspective. Despite the currently large error bars on that index, which could be consistent with no correlation or a negative correlation by a chance probability of 7\% as described in the above, we try to give an explanation for a strong, positive correlation as follows. As \citet{2003MNRAS.343L..59H} argued, the dependence on $\ensuremath{M_{\rm BH}}$ is mainly determined by jet physics itself. A larger $\ensuremath{M_{\rm BH}}$ leads to a relatively stronger magnetic field near the BH, which would make it easier to launch a jet. Arguably, a stronger magnetic field strength would result in a higher acceleration, and consequently a larger jet velocity. This appears true observationally; i.e., there is likely a positive correlation between the Lorentz factor of AGN jets $\Gamma_{\rm jet}$ and $\ensuremath{M_{\rm BH}}$, as follows. In AGNs with SMBHs, the jets are usually relativistic, with $\Gamma_{\rm jet}\sim 10$ \citep{2004ApJ...609..539K}, whereas in NLS1s (where \ensuremath{M_{\rm BH}}\ is not too higher than the BHs in low-mass AGNs), the jets are only mildly relativistic \citep{2015ApJS..221....3G}. Certainly, it remains unclear whether a large-scale magnetic field can be developed around a cold AD or not, and thus further efforts are required, not the least of which include better constraining any potential \ensuremath{M_{\rm BH}}\ dependence of radio loudness. \section{Summary and future work} In studies on the fundamental plane of BH activity, BHs in low-mass AGNs---just like the so-called intermediate-mass BHs ($\ensuremath{M_{\rm BH}} \approx 10^{2-5}$\ensuremath{M_{\odot}})---are important, as they bridge the $\ensuremath{M_{\rm BH}}$ gap between BH X-ray binaries (BHXBs) and common supermassive AGNs, and can help to constrain the dependence on $\ensuremath{M_{\rm BH}}$. In this work, we use a new method to acquire radio flux directly from the images of the VLA FIRST survey, for the low-mass AGNs of \cite{2012ApJ...755..167D} that have virial \ensuremath{M_{\rm BH}}\ estimated from the broad H\ensuremath{\alpha}\ lines. As a result, we increase the number of the low-mass AGNs with both \ensuremath{M_{\rm BH}}\ estimation, firm X-ray measurement, and radio detection of high statistical significance: from 10 in the literature to 18, with a total of 29 including sources with less well-constrained radio detections (see Tables 1 and 2). Of the 19 new sources (or candidates) out of the parent sample of 288 objects covered by the FIRST survey, 4 sources have S/N $> 5$ in radio flux and 4 additional have S/N $>4.43$; these 8 sources can be regarded as reliably radio-detected, with a trial penalty (chance probability) less than 0.0014 (see \S2.1). The other 11 sources with radio $3<$ S/N $<4.43$, conservatively speaking, are only candidates; in other words, one merit of this work is the target selection for future deeper radio observations. Given the current data, we can only state that the distributions in the radio/X-ray correlation and in the FP of the candidate radio sources are not different from the corresponding ones of our reliable radio sources and the literature sources. We find that most (if not all) of the low-mass AGNs follow a standard radio/X-ray correlation (see Eq.~3 and Figure~1) as given by \citet{2013MNRAS.428.2500C}, suggesting that they are not ``outliers". The correlation slope between $L_R$ and $L_X$ supports the picture that the accretion and jet processes are quite similar in accreting systems of different BH masses. Further, the low-mass AGNs obey the universal FP relation fitted with the combined dataset of BHXBs and AGNs by \citet{2009ApJ...706..404G}. In view of the FP, BH mass seems to play an important role in determining the power of jets with respect to the accretion power; i.e., at a given X-ray Eddington ratio ($L_X/\ensuremath{L{_{\rm Edd}}}$), systems with higher $\ensuremath{M_{\rm BH}}$ tend to be systematically brighter in radio (namely larger radio loudness $\mathcal{R}$). If it is the case, this implies that the accretion--jet physics is mass-dependent. In other words, for the observed correlations concerning radio emission (see \S1), we speculate a coherent picture that the $\mathcal{R}$ of AGNs depends not only on Eddington ratio, but probably also on \ensuremath{M_{\rm BH}}\ (even possibly to an almost equal degree). Certainly, this speculation is yet to be verified observationally, since the currently large error bars on the FP indexes allow a considerable chance probability (7\%). Theoretically, the $M_{\rm BH}$ dependence may be related to magnetic field strength which gets stronger with increasing $M_{\rm BH}$. There are several lines of work for the future. First of all, we are proposing synthesis imaging observations of a higher spatial resolution and a deeper depth to pin down the exact radio emission from the nuclei of the low-mass AGNs used in this work. With the better data, we will be able to better constrain the FP relationship or alike of BH activity. As a by-product, with the better-constrained FP relation we can make it clear for sure whether the radio loudness $\mathcal{R}$ of AGNs depends on both BH mass and Eddington ratio. In the line of our new method to harness the VLA FIRST images, it would be interesting to apply it to the whole data set of low-$z$ Seyfert galaxies in the SDSS, trying to address why the jets in Seyfert galaxies cannot be fully developed. Meanwhile, we will find more radio-detected low-mass AGNs, enabling the update of the present work. \acknowledgments We thank the anonymous referee for the thorough and helpful comments and suggestions (including improving the English presentation), particularly for his/her analyzing our S/N criterion from the perspective of trial penalty. We thank Prof. Qizhou Zhang and Qian Long for helpful discussions. This work is supported by National Key R\&D Program of China No. 2017YFA0402600, State Key Development Program for Basic Research (2015CB857100), Natural Science Foundation of China grants (NSFC No.~11473062 and 11603036), and the Open Project Program of the Key Laboratory of FAST, NAOC, Chinese Academy of Sciences. FGX is supported in part by the National Key Research and Development Program of China (2016YFA0400804), the Youth Innovation Promotion Association of CAS (id.~2016243), and the Natural Science Foundation of Shanghai (No.~17ZR1435800). This research has made use of the NASA/IPAC Extragalactic Database (NED) which is operated by the Jet Propulsion Laboratory, California Institute of Technology, under contract with the National Aeronautics and Space Administration.
\section{Introduction} Microwave kinetic inductance detectors (MKIDs)~\cite{Day,Doyle,Baselmans} are superconducting pair breaking detectors based on high-quality (high-$Q$) superconducting resonators~\cite{zmuidzinas,yiwen}. MKIDs have received great attention in astronomy~\cite{Eyken,Sayers,Monfardini} and other sensitive detection fields~\cite{Rowe,Jiansong} because they are simple to fabricate and easy to multiplex into large arrays. A MKID array with thousands of pixels can be fabricated with one or a few standard photo-lithography steps and read out with a pair of coaxial cables into the cryostat. For a large MKID array, with hundreds or thousands of pixels, an important task is to definitively correspond each physical pixel to its measured resonance frequency. In certain applications where the resonance frequency spacing is large, the resonators can be easily identified by their designed frequencies. In most cases, however, resonators are packed as close as possible in frequency space to maximize the multiplexing factor. The measured resonance frequencies are shifted unpredictably from their designed values due to imperfections in the fabrication process, such as variations in superconducting transition temperature ($T_c$), film thickness, and over-etching depth. For these reasons, mapping the measured resonance frequencies to the physical pixel locations on a large MKID array is usually a challenging task. For example, we are developing feed-horn coupled dual-polarization sensitive MKID~\cite{Hubmayr} arrays made from titanium-nitride/titanium (TiN/Ti) multilayer films with target $T_{c}\approx 1.4$~K for the BLAST-TNG experiment~\cite{Galitzki}. We have made a 90 pixel hexagonal close-packed TiN MKID array on a 76.2~mm intrinsic Si wafer to study the wafer uniformity (Fig.~1(a)). Each pixel is identical to the BLAST-TNG pixel design~\cite{Dober} in the 500 $\mu$m band, which consists of orthogonal TiN absorbers~\cite{Vissers, Vissers2} attached to a pair of lumped-element resonators (Fig.~1(b)). The 5~mm pixel-to-pixel spacing is also the same as in the BLAST-TNG 500 $\mu$m MKID array. The measured $S_{21}$ transmission of the sub-array including all the X-pol resonators (Fig. 1(c)) shows $90$ resonance dips in a narrow frequency range spanned from $530$ MHz to $590$ MHz. The number of resonances and the frequency range match the designed pixel number and the target frequency band. Although the resonators are designed to have evenly spaced frequencies by systematically varying the size of interdigitated capacitor (IDC), the measured resonance frequencies clearly deviate from such a regular pattern, making it impossible to unambiguously correspond a physical pixel to its actual frequency from the transmission data. A common approach to identification is cryogenic beam mapping, which typically requires a vacuum-sealed window, IR filters to control radiative load, and complicated coupling optics~\cite{Eyken,Sayers}. In this paper, we demonstrate a cryogenic wafer mapper based on light emitting diodes (LEDs), which is easy to implement and has low cost, low power dissipation and no moving parts at cryogenic temperature. We further demonstrate using this tool to determine the wafer uniformity. \section{LED array} \begin{figure}[ht] \includegraphics{fig1.pdf} \caption{ (a) Photo of the 76.2~mm MKID array mounted in a circular sample holder with input/output SMA connectors. (b) Schematic drawing (not to scale) of the single pixel design showing orthogonal X- and Y-polarization sensitive TiN absorbers attached to a pair of lumped-element MKIDs. The waveguide aperture, which illuminates the inductive parts, is depicted by the red shaded circular region. (c) $S_{21}$ measured at 40 mK using a vector network analyzer. $90$ resonances appear in the designed $\sim$ $60$ MHz frequency span around $0.56$ GHz, corresponding to the 90 X-pol resonators. The 90 Y-pol resonators are designed to be in a different frequency band.} \end{figure} To make a wafer mapper for MKID arrays, we started by looking for a small-sized and energy-efficient element that can be close-packed, individually addressed and can perturb a single detector pixel with an identifiable response distinguishing it from other unperturbed MKID pixels. At the same time this element should be able to work at low temperature and with easy connection and control. Inspired by Ref.~\cite{Forgues}, we find LEDs are ideal elements for this task. In this reference, a number of LED models are verified to emit light at cryogenic temperature down to 4~K. As for our wafer mapper, we require LEDs that can emit weak optical power on the order of 100~nW at a few millikelvin (mK) to induce a measurable frequency shift in the resonator. In our work, we have verified many LED models that satisfy our requirement at a few mK and cause negligible thermal dissipation. In addition, LEDs have a variety of sizes and shapes, such as round-shaped LED with 3~mm or 5~mm diameters and surface mount LEDs as small as 1~mm by 0.5~mm. It is not difficult to choose a LED size that fits the spacing of the pixels. It is also not difficult to collimate visible light onto individual pixels through horns or lenses. Last, common LEDs are very inexpensive commercial products (less than $\$1$ per LED) and the total cost to build the LED mapper with 126 LEDs described in this letter is less than $\$500$. We designed a printed circuit board (PCB) and populated 126 round LEDs (3~mm in diameter) onto this PCB. The LED array has the same hexagonal packing scheme as the pixels on the Si wafer (see Fig.~2(a)). To bias and address the 126 LEDs with a minimal number of DC wires, we divide the hexagon into two regions each containing 63 LEDs. We then group the 63 LEDs in each region into 9 rows and 7 columns, which requires $9+7=16$ addressing wires. We further take advantage of the polarity of LEDs to multiplex the wires going to the two regions, which doubles the number of LEDs that can be addressed individually (see supplementary material for more details on the wiring scheme of the 126-LED MKID wafer mapper). In the end, we used a total of 16 DC wires and wired all the 126 LEDs to a 16-pin connector on the PCB. In addition, we designed an aluminum lid (Fig.~2(b)) with a hexagonal array of drilled horns (1~mm in diameter), which serve as collimators. When assembled together at room temperature with a few locking screws, the center positions of the LEDs on the PCB and the horn collimators on the lid are aligned to the center positions of the inductive absorber strip (Fig.~2(c)). We used a microscope to check the alignment by directly observing whether the ``cross'' formed by the orthogonal absorbers of each pixel lies in the center of the horn aperture. The alignment is verified to be better than 100~$\mu$m on average. When one of the LEDs is turned on, the light will be shining onto one pixel. By individually turning on each LED, we can measure the frequency shifts of all the resonators. The resonator showing the largest response should be the pixel located below the LED. In this way, we can correspond each physical pixel with its measured resonance frequency. \begin{figure}[ht] \includegraphics{fig2.pdf} \caption{(a) A total number of $127$ LEDs are mounted on the PCB. The hexagonal LED array matches the target pixel array shown in Fig. 1(a). The LEDs, except for the center one, are wired to a black 16-pin connector on the top left corner. So there are 126 active LEDs that can be addressed. (b) Horn array drilled on the aluminum lid as collimators. (c) The horn array matches with both the LED array on the PCB and the MKID array on the wafer so that the light emitted from a single LED is collimated onto the corresponding pixel on the wafer.} \end{figure} \section{Experiments} The assembly, with the MKID wafer, horn array and LED array aligned together, is mounted on the mixing chamber (MC) stage in a dilution refrigerator (DR) and cooled down to a base temperature of $40$ mK. We can conveniently apply voltage/current to an individual LED using a breakout box and voltage/current source at room temperature. In the MKID array design, we separated the X-pol resonators and Y-pol resonators into two different frequency bands. Here we only study the $90$ X-pol resonators since they are distributed in a much narrower band and it is more challenging to distinguish them due to the smaller frequency spacing. We first measured the transmission $S_{21}$ of the MKID array in the dark by using a vector network analyzer (VNA) sweeping in the designed frequency band centered at $\sim 0.56$ GHz. As shown in Fig. 1(c), $90$ resonance dips are clearly observed and all the X-pol resonators are present, suggesting the yield is very high ($100\%$ for this fabrication). We index these resonances as Res. $1$, Res. $2$, $\cdots$, Res. $90$ respectively in ascending frequency order in our following discussion. In our initial experiment, $5$ mm round LEDs (OPTEK OVLEW1CB9) were used since they were reported to work down to $3$ K according to Ref.~\cite{Forgues}. Later we found that $3$ mm round LEDs (Risym F3) are also able to work for our wafer mapper at ultra-low temperature down to $40$ mK. They are used for our final experiment reported in this letter because their smaller size makes the alignment easier. We turn on a specific LED by applying a current of $0.08$ $\mu$A (or a voltage of 3.58~V) through the corresponding address lines. When a single LED is turned on, we sweep all the resonances again and measure the frequency shifts compared to the dark sweep data. All the resonance frequencies are determined by the fitting procedures outlined in Ref.~\cite{Gao}. The LED induced fractional frequency shift $\delta f_r/f_r$ vs. resonator index is shown in Fig. 3(a). Here, $\delta f_r/f_r = (f_{r0}-f_{r})/f_{r0}$, where $f_{r0}$ is the resonance frequency in the dark and $f_{r}$ is the resonance frequency under illumination. One can see that the frequency of one resonator (Res. $52$) shifts significantly more than other resonators, suggesting Res. $52$ is the resonator directly under the illuminated LED. Note that the responses from the other resonators are nonzero, which may be attributed to the light (reflected from the metal surface, Si surface or box walls) inside the device box leaking to other pixels, especially those next to the illuminated resonator. In future experiment, we plan to further reduce the leakage light by applying light absorbing material inside the box. Nevertheless, the pixel responses from unilluminated pixels are at least an order of magnitude lower than the illuminated pixel. Therefore we can identify the physical pixel corresponding to Res. $52$ with a very high confidence level. \begin{figure}[ht] \includegraphics{fig3.pdf} \caption{(a): The fractional frequency shifts vs. resonator index for all 90 X-pol resonators when a single LED is illuminated. Res. $52$ shows the largest response indicating that Res. $52$ corresponds to the pixel beneath the illuminated LED. (b): $S_{21}$ of Res. $52$ as a function of LED bias current. The inset shows the fractional frequency shift is approximately linear with the LED bias current.} \end{figure} Next we measured the frequency responses of Res. $52$ under different LED bias currents. The result is plotted in Fig. 3(b). As we increase the bias current, both the resonance frequency and the quality factor decrease due to photon-induced Copper-pair breaking. As shown in the inset, the fractional frequency shift is almost linear with the LED bias current $I$. Our result implies that the resonators have a linear frequency response to the optical power, i.e., the fractional frequency shift $\delta f_r/f_r \propto P_{opt}$, considering $P_{opt}\propto I\Delta$. Here, $P_{opt}$ is the applied optical power and $\Delta$ the band gap of the LED. This linear optical response for TiN MKID has been reported earlier in sub-millimeter wave measurement and the underlying physics is now an active area of research~\cite{Hubmayr}. It is interesting to observe the linear response of TiN MKID to optical photons whose energy is 3 orders of magnitude higher than mm-wave photons. This observation provides valuable information for the study of disordered superconductors. At the bias condition $I = 0.08$ $\mu$A and $V = 3.58$~V used for Fig.~3(a), we estimate the power dissipated on the mixing chamber plate to be less than $0.29$ $\mu$W, far less than the cooling power of our DR. $V$= 3.58~V is both the voltage output of the power supply and the actual voltage dropped on the LED, because the bias wire resistance (a few tens of $\Omega$) is orders of magnitude smaller than the resistance of the LED (a few M$\Omega$) at 40~mK. Furthermore, we pulsed the LED to generate a light pulse of 200~ns in width and the recovery time of the resonance response of all the resonators is measured to be less than $10$ $\mu$s, suggesting that the frequency shift of the illuminated resonator is dominated by optical response instead of thermal effect (the time scale is on the order of a few seconds) and that the response from other unilluminated resonators is mainly due to leakage light instead of the whole wafer warming up. \begin{figure}[htb] \includegraphics{fig4.pdf} \caption{Wafer uniformity information extracted by using the LED mapper. (a) The map of the physical pixels in the order of their measured frequencies. The blue circle represents a 76.2~mm MKID wafer. The red path line indicates the feedline, and the arrow shows the direction of increasing frequency in design. The pixels on the center row are diced out for a separate measurement (not discussed in this letter). They are left as blanks in the wafer map. (b) The normalized design (simulated) resonance frequency $f^*_{sim}$ and measured resonance frequency $f^*_{mea}$ vs. the number of IDC fingers $N_\mathrm{IDC}$. Both lines are normalized by their values for the pixel with $N_\mathrm{IDC} = 160.8$, i.e., $f^*_\mathrm{mea} = f_\mathrm{mea}/f_\mathrm{mea}(N_\mathrm{IDC} = 160.8)$ and $f^*_\mathrm{sim} = f_\mathrm{sim}/f_\mathrm{sim}(N_\mathrm{IDC} = 160.8)$. $f_{sim}$ was derived from Sonnet (a commercial EM Software) simulation using the method described in Ref.~\cite{Wisbey} by assuming a kinetic inductance of $L_\mathrm{ki} = 20$ pH for the TiN/Ti multilayer film and a dielectric constant of $11.7$ for the Si substrate. (c) A color-coded surface plot visualizing the position-dependent fractional frequency deviation $\delta$ on the 76.2~mm wafer. The black dots indicate the center positions of the measured pixels, whose values are linearly interpolated to generate the 2D plot over the entire area. (d) $\delta$ of the pixels vs. their distance to the wafer center $R$ clearly shows a radial dependence.} \end{figure} \section{Wafer non-uniformity} By turning on each LED individually, we mapped out all the physical pixels corresponding to their measured resonance frequencies, as shown in Fig. 4(a). The frequency of the MKID array was initially designed to monotonically increase along the winding direction of the meandering feedline (the red path line in Fig. 4(a)) by gradually decreasing the total number of IDC fingers $N_\mathrm{IDC}$. The measured frequencies roughly follow this trend but frequency re-shuffling occurs on a few adjacent resonators. With the measured frequency to pixel correspondence data, we can further study the wafer uniformity. We first compare the measured resonance frequency $f^*_\mathrm{mea}$ with the designed resonance frequency $f^*_\mathrm{sim}$ for each pixel, which is plotted by the blue and red curves in Fig.~4(b), respectively. Note that both lines have been normalized by the resonance frequency of the pixel with $N_\mathrm{IDC} = 160.8$ which is located near the center of the wafer. In Fig.~4(b), we see a periodic deviation between the measured and designed frequency, suggesting wafer non-uniformity. We define a position-dependent fractional frequency deviation $\delta =(f^*_\mathrm{mea} -f^*_\mathrm{sim})/f^*_\mathrm{sim}$. The maximum deviation $|\delta|_\mathrm{max}$ is a figure of merit that measures the frequency uniformity over the entire wafer. Small $|\delta|_\mathrm{max}$ indicates better wafer uniformity. A color-coded surface plot visualizing the position-dependent fractional frequency deviation $\delta$ over the hexagonal area covered by the pixels is shown in Fig. 4(c). It exhibits a radially decreasing pattern of $\delta$, and this trend is more evident in Fig.~4(d) which plots $\delta$ as a function of the radial position $R$. From Fig.~4(c) and (d) we conclude that the frequency non-uniformity of our wafer is $|\delta|_\textrm{max} \lesssim 1.6\%$ and the largest deviation occurs on the edge of the wafer. There are several factors that may contribute to the radial frequency non-uniformity revealed in Fig.~4. It is important to determine whether this non-uniformity is associated with capacitance variation or inductance variation across the wafer. For example, the etch chemistry used to pattern the TiN IDC will over-etch into the Si substrate and a non-uniform over-etch depth distribution may lead to capacitance variation across the wafer. To test this hypothesis, we further measured the over-etch depths for several resonators across the wafer by using a profilometer and found that the over-etch depths range from 136~nm to 141~nm. Electromagnetic simulation using Sonnet software shows that the fractional capacitance change corresponding to the minimum and maximum over-etch depths of our IDC with 2~$\mu$m finger/gap width is $\Delta C/C \approx$ $0.13\%$. This translates into a maximum of $0.06\%$ fractional frequency deviation, which is too small to explain the $1.6\%$ frequency non-uniformity. This suggests that the over-etch effect is not the major factor to produce the measured frequency non-uniformity. On the other hand, cross-wafer variation of film $T_c$, normal resistivity $\rho_n$ and thickness $t$ may lead to inductance variation through the relation $L_\mathrm{ki} = \frac{\hbar R_\mathrm{sn}}{\pi \Delta} \propto \frac{\rho_\mathrm{n}}{t T_c}$\cite{PropTiN}, where $R_\mathrm{sn}$ is the normal sheet resistance and $\Delta\approx 1.76k_{B}T_c$ is the superconducting gap. Previous measurements of multilayer TiN films show small non-uniformity and decreasing $T_c$ with radius~\cite{Vissers2}. A lower $T_c$ results in a larger kinetic inductance $L_\mathrm{ki}$ and a lower resonance frequency. The measured $1.6\%$ frequency non-uniformity suggests a $3.2\%$ $T_c$ non-uniformity, which agrees well with our previous $T_c$ measurement~\cite{Vissers2}. We think this is the dominant contribution to the measured frequency non-uniformity. \section{Discussions and Conclusions} We have also tested a number of other LED models, including both circular and surface mount types. All the LEDs in our test are able to illuminate and induce a frequency shift in the MKID, which provides a wider selection for different pixel packing densities. The LEDs we verified to work for our purpose at low temperature down to $40$ mK are summarized in Table~$1$. It should be noted that we are operating the LEDs in a weakly turn-on condition, different from a few other cryogenic applications of LEDs~\cite{Forgues}. In our case, biased at the same forward voltage of $3.58$ V, the LED forward current decreases from 59~mA at room temperature to 0.08~$\mu$A at 40~mK and the emitted optical power reduces from $>$ 100~mW to $\sim100$~nW (assuming $50\%$ optical conversion efficiency), mainly due to carrier freeze-out ~\cite{Fred}. Because our detectors are designed to be sensitive to pW of mm-wave loading power~\cite{Hubmayr}, 100 nW of optical power is sufficient to induce a significant shift in the resonator while the power is still small enough for the fridge to handle. We speculate that many other LED types and models other than the ones listed in Table~$1$ may work for our pixel-to-frequency mapper at millikelvin temperature. \begin{table} \newcommand{\tabincell}[2]{\begin{tabular}{@{}#1@{}}#2\end{tabular}} \centering \begin{tabular}{|c|c|c|}\hline LED Model & Type \\\hline OPTEK OVLEW1CB9 & \tabincell{c}{round, $\Phi$ 5 mm, white} \\\hline Risym F3 & \tabincell{c}{round, $\Phi$ 3 mm, white} \\\hline \tabincell{c}{HSMD-C190} & \tabincell{c}{SMD0603, ~1.6 mm * 0.8 mm, orange~} \\\hline \tabincell{c}{LTST-C193TBKT-5A} & \tabincell{c}{SMD0603, ~1.6 mm * 0.8 mm, blue~} \\\hline \end{tabular} \caption{LED models verified to work for our mapper at 40 mK.} \end{table} In conclusion, we have experimentally demonstrated a cryogenic LED wafer mapper that can spatially map a MKID array at millikelvin temperatures. It provides a simple and effective way to correspond a physical pixel on the wafer to its measured resonance frequency. As a demonstration of this powerful tool, we have studied the wafer uniformity and found a radially position-dependent frequency non-uniformity $\lesssim 1.6\%$ over the 76.2~mm wafer using the frequency-to-pixel correspondence information obtained by the LED mapper. Made from LEDs and PCB, our wafer mapper has very low cost and is very easy to implement, requiring minimal number of DC wires and dissipating only sub-microwatts of power. In an optimized wiring scheme that takes advantage of the LED polarity, one can use $m$ wires to address a maximum number of $P(m,2) = m(m+1)$ LEDs, where P denotes permutation. For example, an array of $1000$ pixels can be mapped out by a LED mapper with only 33 bias wires. By using LEDs of smaller footprint, such as surface mount LED SMD0402 ($1.0$ mm * $0.5$ mm), our mapper can be applied to more densely packed arrays. The LED mapper may find broad applications in which an array of elements (such as superconducting resonators, detectors, and qubits) sensitive to light are multiplexed in the frequency domain. \section{Supplementary Material} More details on the wiring scheme of the 126-LED MKID wafer mapper are provided. \begin{large} \section*{Acknowledgement} \end{large} The MKID devices were fabricated in the NIST-Boulder microfabrication facility. This work was supported in part by the National Natural Science Foundation of China (Grant Nos. 61301031, U1330201).
\section{Introduction} The Arcminute Microkelvin Imager (AMI) instrument consists of two synthesis radio telescopes located at the Mullard Radio Astronomy Observatory near Cambridge. AMI, which operates in the 12--18\,GHz frequency band, was designed primarily for the study of galaxy clusters by observing secondary anisotropies in the cosmic microwave background (CMB) arising from the Sunyaev-Zel'dovich (SZ) effect \citep{sz}. AMI is made up of two arrays: the Small Array (SA), and the Large Array (LA). The SA telescope comprises ten 3.7\,m diameter paraboloid dishes in a compact configuration and is designed for observing structures on arcminute scales. The LA, which was created by reconfiguring the eight 12.8\,m dishes of the Ryle Telescope has an angular resolution of 0.5 arcminutes and has approximately ten times the flux-density sensitivity of the SA. The LA, observing concurrently with the SA, is used to measure the intensities of contaminating small-diameter radio sources. The original AMI correlator \citep{Zwart2008} was of an analogue "XF" design, whereby the antenna signals were cross-correlated over a range of delays and then Fourier transformed into spectral channels. The original correlator recorded visibilities in eight frequency channels over AMI's 12--18\,GHz band, providing limited capability for recognising and removing interfering signals as well as limited ability to mitigate chromatic aberration out to the edge of field of view. As a result, the sensitivity of the instrument was significantly reduced, particularly at low declinations, where interference from geostationary satellites could result in up to 90\% of the data being unusable. The XF system had a performance that was also limited by the path-length inaccuracies of analogue delay compensation and analogue correlation, which resulted in direction-dependent systematic errors and poor dynamic range. Starting in 2014, a project was undertaken to build a digital correlator for the telescope based on the second-generation Reconfigurable Open Architecture Computing Hardware board (ROACH2\footnote{\url{https://casper.berkeley.edu/wiki/ROACH-2_Revision_2}}), developed by the Collaboration for Astronomy Signal Processing and Electronics Research (CASPER\footnote{\url{https://casper.berkeley.edu}}) and used extensively in radio-astronomy digital signal processing (DSP) applications \citep{hickish-casper}. ROACH2 is a powerful real-time signal processing platform based around a Xilinx Virtex 6 Field Programmable Gate Array (FPGA) which provides up to 80\,Gbps of \highlight{Ethernet-based} I/O, and may be interfaced with a variety of analogue to digital converters (ADCs). The primary goal of the project was to equip AMI with a digital correlator providing over one hundred times the frequency resolution of the original system with superior inter-channel rejection, allowing better frequency-confinement of interfering signals as well as overcoming some of the limitations of analogue lag correlator. The wide bandwidth of the AMI receiver required an optimised FPGA correlator design, capable of operating at the relatively high clock speed of 312.5\,MHz, to be developed. This correlator, which \highlight{comprises an independent instrument for each of the AMI arrays uses 18 ROACH2 boards (ten for the SA, and eight for the LA) to digitise, channelise and then cross-correlate analogue inputs from the antennas in the AMI arrays.} Communication between boards in each AMI array is achieved using an industry-standard 10\,Gb Ethernet (10\,GbE) network, with an off-the-shelf switch providing interconnect. This so-called "Packetized Correlator" architecture was pioneered by the CASPER group \citep{Parsons2008, hickish-casper} and has been well proven at multiple radio-telescopes \citep{kocz-leda, Foley01082016, eovsa, swarm}. In this paper we summarize the design of, and first commissioning results from the new AMI correlator. In Section~\ref{sec:arch-overview} we describe the architecture of the system deployed, which comprises an overhauled analogue front-end and a new digital back-end. In Section~\ref{sec:dig-implementation} details of the implementation of the digital back-end are presented. The instrument's control system and data reduction pipeline are outlined in Sections~\ref{sec:control} and \ref{sec:reduction}, respectively, with commissioning results from the new system given in Section~\ref{sec:results}. \section{Architecture Overview}\label{sec:arch-overview} \highlight{The AMI correlator upgrade continues to use the front-end systems developed in \cite{Zwart2008}, with a new final IF stage and digital signal processing backend. A summary of the telescope specifications is given in Table~\ref{table:TECHDATA}.} \begin{table} \centering \caption{Summary of AMI technical data. Specifications pertaining to frequency coverage (slightly reduced) and frequency resolution (dramatically increased), which have changed since \citet{Zwart2008} appear in bold.} \label{table:TECHDATA} \begin{tabular}{c|cc} & Small Array & Large Array \\ \hline \hline Antenna diameter (m) & 3.7 & 12.8 \\ Antenna efficiency & 0.75 & 0.67 \\ Number of antennas & 10 & 8 \\ Number of baselines & 45 & 28 \\ Baseline lengths (m) & 5--20 & 18--110 \\ Primary beam ($@$15.5 GHz) & 20\arcmin{.} & 5\arcmin{.} \\ Synthesized beam & $\approx$ 3\arcmin & $\approx$ 30\arcsec \\ Flux sensitivity (mJy s$^{1/2}$) & 30 & 3 \\ Declination range ($^{\circ}$) & > -15 & > -20 \\ Elevation limit ($^{\circ}$) & +20 & +5 \\ \textbf{Observing frequency (GHz)} & \multicolumn{2}{c}{13.1--17.9} \\ \textbf{Number of channels} & \multicolumn{2}{c}{4096} \\ \textbf{Channel bandwidth (MHz)} & \multicolumn{2}{c}{1.22} \\ System temperature (K) & \multicolumn{2}{c}{25} \\ Polarisation measurement & \multicolumn{2}{c}{I+Q} \\ \end{tabular} \end{table} \subsection{Analogue Front-End} The AMI front-end system consists of a feed assembly, first down-converting mixer and second mixer stage as shown in Figure~\ref{fig:AMIRF}. Each feed assembly contains the horn antenna, cryostat, radio-frequency (RF) amplifiers, noise injection, bias box and the cryogenic support system. Each cryostat has three temperature zones separated by thermal shielding; 15--20\,K, 50--70\,K and 300\,K. There are two RF amplifiers: the first is mounted on the 20\,K coldhead of the cryostat, and the second is at 300\,K. Noise at a constant level may be switched into the front-end via a noise source which is outside the cryostat on the SA, and inside the cryostat at 300\,K on the LA. A detailed description of the \highlight{feed assembly, down-converter, and Automatic Gain Control (AGC) systems, which have not been modified as part of this work,} is given in \cite{Zwart2008}. The RF (12--18\,GHz) signals from the antenna feeds are down-converted to an intermediate-frequency (IF) band of 6--12\,GHz using a 24\,GHz local oscillator (LO). Phase-switching is provided by modulating this LO signal by Walsh functions which are generated by the digital correlator. The IF is fed from the antenna hub to a correlator room where an AGC unit is used to maintain a constant power level prior to further down-mixing. A second mixer assembly splits the down-converted IF output into two 2.3\,GHz wide sub-bands by first filtering the low and high bands and then mixing with an 8.5\,GHz common local oscillator. Custom-manufactured low pass filters are used to further limit the bandpass of the baseband signal prior to being fed into ADCs. The terms "low band" and "high band" used here to describe the two AMI correlator basebands refer to the frequencies of the mixer bandpass filters, not their respective RF input frequencies, as shown in Table \ref{table:AMIBANDS}. The second mixer assembly for the new system provides approximately 5\,GHz of the original 6\,GHz AMI frequency channel. The improvements in dynamic range are evident even with the loss in sensitivity due to processing less channel bandwidth. \begin{table} \centering \caption{The AMI frequency bands.} \label{table:AMIBANDS} \begin{tabular}{c|ccc} & RF (GHz) & IF (GHz) & Baseband (GHz) \\ \hline \hline Low Band & 15.6--17.9 & 6.1--8.4 & 0.1--2.4 \\ High Band & 13.1--15.4 & 8.6--10.9 & 0.1--2.4 \\ \end{tabular} \end{table} \begin{figure} \centering \includegraphics[width=\columnwidth]{./pictures/rf-overview3.png} \caption{The AMI RF and IF system diagram. Isolators and attenuators used in the chain are not shown. The \emph{Mixer} units in the system are newly developed as part of the correlator upgrade.} \label{fig:AMIRF} \end{figure} \subsection{Digital Back-End} The AMI digital correlator is implemented using the standard "FX" architecture favoured by most modern correlators. In this architecture analogue signals from each antenna are first digitised before being split into spectral channels using an FFT-based algorithm (the "F" processing stage). Spectra from pairs of antennas are then multiplied and time-averaged on a per-frequency-channel basis (the "X" processing stage). The F-stage processing of such a correlator can be trivially parallelised over the multiple antennas in an array, whilst the X-stage computation is parallel over multiple frequency channels. Interconnect exists between the F and X processors to facilitate a data transpose---often referred to as a \emph{corner-turn}---which allows data to be aggregated appropriately so as to allow parallel processing. The AMI correlator uses FPGAs to perform the F and X processing, owing to their support for high input and output data rates and ease of interfacing to high-speed ADCs. Interconnect is provided by commercial off-the-shelf (COTS) 10\,Gb/s Ethernet (10\,GbE) switches, which offer cost-effective, flexible and reliable performance. Such switches also support useful functionality such as multicast (point to multi-point data transmission) which may be used in future correlator operating modes. This ``packetised correlator'' architecture has been well-developed by the CASPER collaboration, which provides and maintains software and firmware libraries to facilitate rapid deployment of digital astronomical systems. Though not required by the packetised architecture, the AMI correlator design uses the same physical processors for its F and X stages (Figure~\ref{fig:top-block}). This allows the complete system to be efficiently implemented with minimal hardware. Once correlation matrices have been computed and averaged for an appropriate time window, these are sent over a 1\,Gb Ethernet network where the results are aggregated by a standard x86 GNU/Linux server. \begin{figure} \centering \includegraphics[width=0.6\columnwidth]{./pictures/dcorr_top_block-crop.pdf} \caption{The top-level correlator architecture. Digitisation is performed by a pair of 5\,Gsps ADC cards interfaced to a ROACH2. The ROACH2 firmware implements both channelisation and cross-multiplication functionality, with a 10\,GbE switch providing interconnect between the two phases of processing. Averaged correlation results are output over a separate 1\,Gb Ethernet network.} \label{fig:top-block} \end{figure} \subsubsection{Digital Hardware} The digital processing platform chosen for the AMI correlator is the mature and ubiquitous CASPER-designed ROACH2 board\footnote{\url{https://casper.berkeley.edu/wiki/ROACH-2_Revision_2}}. This is a general-purpose FPGA platform, built around a Xilinx Virtex 6 (XC6VSX475T-1FFG1759C) FPGA, supported by four 72\,Mb QDR memory chips, 1\,GB of DRAM, and up to eight 10\,GbE interfaces via a pair of SFP+ mezzanine cards. The ROACH2 also provides two 40-pair LVDS interfaces via Z-DOK connectors, which can be used to interface the ROACH2's FPGA to a variety of CASPER-supported ADC cards. For the AMI correlator, both Z-DOKs are populated with CASPER ADC1x5000\footnote{\url{https://casper.berkeley.edu/wiki/ADC1x5000-8}} cards. Each of these hosts an e2v EV8AQ160: a quad-core digital sampler capable of sampling a single RF input at up to 5\,Gsps. The ADC1x5000 was designed by the Academia Sinica Institute of Astronomy and Astrophysics (ASIAA) and has been extensively characterised by \cite{Patel2014} as part of the development of a new wideband correlator for the Submillimetre Array \citep[SMA,][]{swarm}. Each ROACH2 in the AMI system is fed with two timing signals derived from a COTS Trimble Thunderbolt E GPS-disciplined oscillator, which provides a pulse-per-second (PPS) reference and 10\,MHz frequency standard. The PPS is distributed to each ROACH2 in the system via a 16-way buffered splitter and is used to synchronise and timestamp the data outputs from each board. The 10\,MHz reference is used to derive a 2500\,MHz clock, which is amplified and split so that it may drive the 5000\,Msps ADC samplers synchronously. The complete ROACH2 processing node is shown in Figure \ref{fig:ROACH2}. The node interfaces comprise: \begin{enumerate} \item An SMA input a for 2.5\,GHz clock (used to derive the 5\,Gsps ADC sampling rate). \item An SMA input for a TTL Pulse-per-second (PPS) time reference. \item SMA inputs for the high and low baseband inputs from the analogue front-end of a single AMI antenna. \item Level-shifting circuitry to allow interfacing of the ROACH2 FPGA with the AMI phase and noise modulation infrastructure (see Section \ref{sec:walsh}). \item A 1000BASE-T Ethernet interface to the FPGA, for data output. \item A 1000BASE-T Ethernet interface to ROACH2's on-board CPU, which is used for controlling and monitoring the board. \item Four SFP+ connectors, each providing a 10\,GbE interface. \end{enumerate} \begin{figure} \centering \includegraphics[width=\columnwidth]{./pictures/Roach_LA_Top_View.pdf} \caption{The CASPER ROACH2 platform on which the AMI digital correlator is implemented. Here the board is shown with two 5\,Gsps ADC daughter cards, a quad-SFP+ mezzanine card, and a Walsh switch interface box.} \label{fig:ROACH2} \end{figure} A key part of the correlator hardware infrastructure is the 10\,GbE switch facilitating interconnection between the 10 (8) boards in the SA (LA) system. This is a Mellanox SX1012, 12-port, 40\,Gb Ethernet switch, capable of operating as a 48-port 10\,GbE switch using interconnecting cables to connect each of the switch's QSFP+ ports to four independent SFP+ interfaces. The complete rack of digital equipment for the SA correlator is shown in Figure~\ref{fig:digital-rack}. \begin{figure} \centering \includegraphics[width=\columnwidth]{./pictures/dig_rack_sa_annotated.pdf} \caption{The digital correlator rack for the 10-antenna AMI Small Array.} \label{fig:digital-rack} \end{figure} \section{Correlator Firmware}\label{sec:dig-implementation} \subsection{Analogue-to-Digital Converters} The CASPER collaboration (and in particular CASPER members in the Submillimetre Array correlator group) provide open-source interface firmware\footnote{\url{https://github.com/casper-astro/mlib_devel}} and software\footnote{\url{https://github.com/sma-wideband/adc_tests}} to stream data from the e2v EV8AQ160 ADC into the ROACH2 board via its Z-DOK connector. This interface expects data to be presented to the FPGA at a quarter of the ADC sample rate, over four parallel 8-bit buses. At a maximum sampling rate of 5\,Gsps, this results in 32 parallel data lines, each running at 1.25\,Gbps. Once captured by the FPGA, these parallel samples are demultiplexed by a further factor of four, so that on every FPGA clock cycle, 16~samples are processed in parallel. In the AMI design the signal processing pipeline is clocked synchronously with the ADC, at a rate of 312.5\,MHz. At the time of design, the interface provided by CASPER did not function at the full 5\,Gsps rate of which the ADCs are capable. As part of this work, the interface has been modified to increase performance and released back to the CASPER community. \highlight{We note that since the ADC used by AMI is of multicore design, data are liable to artifacts caused by mismatch in the timing, gain, and voltage offsets of the different sampler cores \cite{Patel2014}. Currently the AMI system flags the frequency channels associated with artifacts from voltage offsets (this is the channel at the center of the digitized band), but does not correct for timing and gain mismatches. Further work is needed to assess the effect of these mismatches on the broadband images AMI produces, but they are not thought to limit the performance of the array, due to the suppression effects provided by fringe-tracking, and time- and frequency-averaging.} \subsection{Front-end noise injection \& phase switching control} \label{sec:walsh} In the original AMI analogue correlator, phase and noise modulation functions were generated by a bank of look-up tables driven by a 65536\,Hz counter. In order to simplify the new digital system, it was decided that the correlator FPGAs should be responsible for generation of the switching signals. In this way the switching frequencies are synchronous with the ADC sampling, and can easily be chosen such that an integral number of switching periods occur in each channelisation window and correlator integration period. In order that the FPGAs are able to drive the existing front-end switching infrastructure, simple interface boards were constructed to convert a pair of 1.5\,V ROACH2 general-purpose IO (GPIO) outputs to drive 5\,V differential signals over Category 5 UTP cable. Though unused in the AMI correlator, the interface boards are also capable of converting a pair of differential signals to single-ended 1.5\,V inputs, which may be used to drive ROACH2 GPIO pins. \subsection{F-Engine} \label{sec:f-engine} The bulk of the new AMI correlator design comprises the ``F-Engine'' processing pipeline; the channelisation of pairs of 5\,Gsps data streams into 2048 critically-sampled subbands, which are output over 10\,GbE as User Datagram Protocol (UDP) data streams (Figure~\ref{fig:ami-f}). Stages of the pipeline are: \paragraph*{Phase-demodulation} Immediately after samples are captured into the FPGA, the phase modulation applied in the antenna's first mixer stage is removed by a simple multiplication of ADC samples by $\pm 1$. The modulation/demodulation pattern used is unique to each antenna, and stored in the firmware in a runtime-programmable look up table. A programmable delay between the modulation GPIO output (Section~\ref{sec:walsh}) and the internal demodulation signal allows compensation for delays associated with cable lengths of the control and RF signals. \paragraph*{Coarse delay} After demodulation, each antenna's digital data stream may be delayed by up to 16,384 ADC samples. This delay allows for compensation of geometric delays in the array (the largest baseline in the LA is approximately 110\,m) and RF cabling. The desired delays are calculated by the telescope control computer based on the current pointing of the array, and any pre-computed delay calibration solutions. The frequency resolution of the AMI digital correlator is $1.22$\,MHz, giving an inverse-channel-bandwidth of around 800\,ns. This inverse-bandwidth sets the accuracy with which variable delays must be applied to avoid losing coherence of the antenna signals; for AMI, it is sufficient to update coarse delays on $\sim$second timescales. For simplicity of data analysis, the correlator control software ensures that delay updates are applied synchronously with new visibility accumulations, such that no coarse delay changes occur mid-integration. \paragraph*{Polyphase Filterbank} The largest component of the F-Engine processing pipeline is a polyphase filterbank (originally proposed by \cite{bellanger}, see \cite{harris-haines, price2016spectrometers} for relevant overviews), which breaks the 5\,Gsps data streams into 2048 critically sampled subbands, each of bandwidth 1.22\,MHz. The CASPER group provide parameterised finite impulse response (FIR) filter and fast Fourier transform (FFT) libraries for implementing polyphase filterbanks -- these have been utilised here, after various optimisations were applied to reduce FPGA resource utilisation and to maximise clock frequency. \highlight{These optimisations are publically available\footnote{See the \texttt{ami\_devel} branch of the CASPER libraries at \url{https://github.com/jack-h/mlib_devel/tree/ami-devel}} and include: \begin{itemize} \item Reductions in overall FPGA fabric use by reducing control logic. \item Improved timing performance of reordering blocks when per-clock enabling is not necessary. \item Utilization of FPGA single instruction, multiple data (SIMD) instructions for complex addition and subtraction operations. \item Improved timing performance or integer rounding operations by allowing the use of dedicated FPGA arithmetic cells. \end{itemize} } Signals within the channeliser are processed with 18 bits of precision in both channeliser coefficients and data path, resulting in output subbands (spectra) which are complex-valued, with each of the real and imaginary components represented as signed 18-bit numbers. \paragraph*{Autocorrelation sub-system} After channelisation, the power of each spectrum is computed and fed into a vector accumulator. This provides (without requiring the downstream correlator infrastructure) an averaged power-spectrum for each antenna signal. The autocorrelation subsystem can also demodulate by the Walsh pattern used to drive the noise injection at each of the antenna feeds, providing a measurement of the system-temperature of each antenna. Since the system temperature of antennas varies with weather, constant measurements of these "rain-gauge" values are performed and stored with final data products. \paragraph*{Requantization} In order to reduce FPGA output bandwidth, data samples are rounded to 4-bit values -- real and imaginary parts in the range $(-7,+7)$ -- with saturation logic prior to being streamed over Ethernet. In order to use the available 4-bits of range most efficiently, before quantisation each of the 2048 subbands associated with an ADC data stream are equalised by multiplying by per-antenna, per-subband coefficients. These coefficients are runtime-programmable, and can be calculated either by examining data from the autocorrelation sub-system or the final correlator data products. \paragraph*{Data buffering and transmission} The CASPER cross-correlation module used in the correlator \citep{Parsons2008, HickishThesis} expects data to be presented in windows of 1024 samples from each frequency channel in turn. To achieve this, 1024 spectra, each of 2048 channels, must be re-ordered in memory to gather similar channels into contiguous blocks. This reordering operation requires a buffer of $\sim$MB size. Such memory is not available on the FPGA chip itself, so external 72\,Mb Quad Data Rate (QDR) memory chips (of which four are provided by the ROACH2 platform) are used for this reorder operation. Once data are suitably ordered, they are transmitted as streams of UDP packets over an Ethernet network. The destination address of each packet is determined by the frequency channel associated with the data in that packet's payload, with the end result that each ROACH2 in the network receives data associated with all antennas in the array, but only certain frequency channels. \begin{figure*} \centering \includegraphics[width=2\columnwidth]{./pictures/ami_f-crop.pdf} \caption{A schematic depiction of the AMI F-Engine firmware. Two such F-Engines are instantiated on each ROACH2 FPGA.} \label{fig:ami-f} \end{figure*} \subsection{Data Interconnect} After 4-bit requantization, the data output rate from each dual-band F-engine is 40\,Gbps. These data are transmitted as a stream of UDP packets, with each packet's payload comprising 1024 time samples from a single frequency channel. When transmitted over Ethernet as a stream of UDP packets, transmission protocol overhead -- Ethernet, Internet Protocol, UDP and application headers -- must also be accommodated. In order to transmit the stream over four 10\,GbE links the AMI system takes advantage of the fact that F- and X-processors are located on the same physical hardware. This allows frequency channels with the same source and destination ROACH2 to be routed internally, bypassing the Ethernet interconnect. Such routing reduces the necessary throughput of the interconnection by 10\% (12.5\%) for the Small (Large) AMI array. Including transmission protocol overhead, the aggregate output data rate from each 10\,GbE interface is 9.4 (9.1)\, Gbps for the Small (Large) array. \highlight{The full 2.5\,GHz digitized bands are output, though in the case of the Small Array only 2040 of the total 2048 frequency channels from each band are processed, in order to equally share channels among the 10 processing nodes in the system.} \subsection{X-Engine} The second stage in the correlator is the ``X-Engine'', which is responsible for performing a per-frequency-channel cross-multiplication of data from different antenna pairs. The X-Engine pipeline is shown in Figure~\ref{fig:ami-x}, and its components comprise: \paragraph*{Input buffering} Data are received from the Ethernet network on the same four SFP+ interfaces used for transmission, as well as an internal routing path. The order that packets from different antenna sources are received from the network is not known in advance -- a circular buffer is used to collect, and appropriately order, data from different antennas prior to cross-multiplication. Once all antenna packets have been received for a given frequency channel, $n$, which is indicated by the arrival of a packet of channel $n+2$, a window of data is streamed into a cross-multiplication engine. \paragraph*{Cross-Multiplication} The cross-multiplication engine is responsible for taking 1024 samples from a single frequency channel from all antennas, and delivering a visibility matrix integrated over these samples. The correlation engine used in AMI is based on a ``windowed X-Engine'' design by \cite{Parsons2008} which is now maintained by the CASPER community. The AMI version of this module has been ported to Verilog (rather than the CASPER standard of Xilinx System Generator and MATLAB Simulink). \highlight{This makes the module more portable to non-CASPER projects which do not use Simulink and more easily version controlled and simulated using industry-standard tools which are not designed for use with Simulink model files. As part of the porting process, the module was also significantly optimised to minimise FPGA resource utilisation and maximise performance.} Firstly, AMI's X-engine has a parameterisable input bandwidth, which can be any multiple of the FPGA clock speed. This allows a reduction in control-logic versus multiple instances of a fixed input-bandwidth engine. Secondly, the cross-multiplication and accumulation cores at the heart of the X-engine have been optimised for 4+4-bit complex inputs, allowing a $75\%$ reduction in multiplier use. This is achieved by offsetting the 4-bit correlator inputs to unsigned values, and appropriately packing pairs of them in 18-bit representations such that four 4-bit multiplications may be computed in a single 18 $\times$ 18-bit operation. A full description of this implementation can be found in \cite{HickishThesis}, which builds on the 4-bit packing speed-ups of \cite{deSouza2007} and is similar to more recent work targeting cross-multiplication of astronomical signals on Graphics Processing Units (GPUs) by \cite{Chime2015}. As a result, the footprint of the cross-multiplication component of the AMI digital correlator has been reduced to a very small fraction of the overall design (Table~\ref{table:resources}). \highlight{The code for this X-Engine is freely available\footnote{See the \texttt{ami\_devel} branch of the CASPER libraries at \url{https://github.com/jack-h/mlib_devel/tree/ami-devel}} and is provided with a parameterized Simulink wrapper for use in CASPER systems. Though not used in the AMI project, a dual-polarization version of this module is under development, which provides a drop-in replacement for the standard CASPER Simulink module and offers a superset of the CASPER block's parameters.} \paragraph*{Vector Accumulator} Per-frequency-channel visibility matrices, which have been integrated over 1024 samples, must be further time-averaged to reduce output data-rate to an acceptable level. This long-term ($\sim$second) averaging uses external Quad Data Rate (QDR) memory for data storage, at the end of which data are transmitted via a 1\,Gb Ethernet interface to a data acquisition and storage server. \begin{figure*} \centering \includegraphics[width=2\columnwidth]{./pictures/ami_x-crop.pdf} \caption{A schematic depiction of the AMI X-Engine firmware.} \label{fig:ami-x} \end{figure*} \subsection{FPGA Floorplanning} A significant hurdle in the deployment of the new AMI correlator was achieving timing-closure of the firmware designs at the required 312.5\,MHz FPGA clock rate. Ultimately, this was achieved by constraining the placement of most of the $\sim$1000 multiplier cores and $\sim$400 RAM blocks in the design to small regions of the FPGA chip. \highlight{Placement was manually defined for most modules, but in the case of the FFT cores, a pair of which comprise the majority of the signal processing in the firmware, a set of Python scripts was used to automate constraint generation. These scripts compute the number of multiplier and memory cores needed by each FFT, based on the known number of DSP slices and memory blocks needed by the CASPER FFT butterfly architecture, and the number of butterflies required to implement an FFT meeting the bandwidth and transform length specifications of the AMI channeliser. Constraints are then generated which stripe sequential butterflies over user-defined columns of DSP and memory resources. Having placed these resources, much of the FFT logic, which aims to provide pipelining between arithmetic components, could be removed, resulting in an FFT circuit that is smaller, can be run at higher clock rate, and, critically, has timing performance which is relatively stable when other areas of the FPGA design are modified.} To the knowledge of the authors, the AMI design represents the fastest clocked ROACH2 in any deployed packetised-correlator system, with the largest instantaneous processed bandwidth per board. We note, however, that the AMI firmware resource requirements (Table~\ref{table:resources}) are modest when compared to some other deployments, such as \cite{swarm}. Experience with newer FPGA platforms also suggests that many of the timing issues encountered during development of the AMI correlator may be unique to the ROACH2's Virtex 6 FPGA. \begin{table*} \centering \caption{FPGA resource utilisation in the AMI SA correlator design. The AMI LA design uses slightly fewer resources, owing to the smaller number of antennas requiring correlation in the X-Engine stage of the design.} \begin{tabular}{c|cccc} & DSP slices & BRAMs (36\,kB) & LUTs & Flip Flops \\ \hline \hline Coarse Delay (dual-band) & 0 & 16 & 2024 & 2314 \\ FIR filter (dual-band) & 128 & 66 & 3952 & 11890 \\ FFT (dual-band) & 736 & 112 & 38206 & 100748 \\ X-Engine input buffers & 0 & 81 & 3162 & 10747 \\ X-Engine & 98 & 18 & 2002 & 4722 \\ \hline Total Design & 1203 & 409 & 105068 & 166051 \\ FPGA Capacity & 2016 & 1064 & 297600 & 595200 \\ \% Utilisation & 60 & 38 & 35 & 28 \\ \end{tabular} \label{table:resources} \end{table*} \section{Control System}\label{sec:control} The control systems for the two arrays are independent, and are described in detail in \cite{Zwart2008}. In each case, the only modifications needed for the new correlator have been replacement of the correlator microprocessor by the data acquisition and control server, situated in the digital rack and visible in Figure \ref{fig:digital-rack}, and replacement of the Sun-Microsystems workstation used for telescope and observation control by a Linux desktop system. Apart from the data acquisition components described below, the rest of the control software, written in C for the Solaris operating system, has simply been recompiled for the Linux platform. \subsection{Data Acquisition} The Linux server used for correlator control and data acquisition is a standard single-socket machine, configured with 20\,TB of local disc storage to accommodate several months of raw data. \highlight{Data are captured from the ROACH2 boards over a 1\,Gbps Ethernet interface (Figure~\ref{fig:top-block}). A separate 1\,Gbps interface is used for exchanging quick-look data samples and observation metadata with the telescope control system over a local Ethernet connection, as described in Section~\ref{sec:data-handling}}. This machine also acts as the DHCP/NFS server for the ROACH2 private network. A suite of Python scripts to configure the ROACH2 boards and perform data collection has been developed for AMI, and is available on github\footnote{\url{https://github.com/jack-h/ami_correlator_sw.git}}. There are separate scripts for programming and initialising the ROACH2 boards, and for computing the equalisation coefficients for requantization (Section~\ref{sec:f-engine}). Acquisition scripts deal with applying coarse path compensation delays to the digital data streams, exchanging metadata and visibilities with the telescope control machine and recording visibility data from the correlator at a programmable dump rate (currently every 0.86\,s) in HDF5\footnote{\url{https://www.hdfgroup.org/HDF5/}} format on the server's local discs. The arrangement for monitoring the relative system temperature of each antenna using amplitude-modulated injected noise referred to earlier and described in \citet{Zwart2008} is retained, and samples of the demodulated noise, derived from the autocorrelation measurements, are stored with the data for use during calibration processing. Important features of the software design include the use of a standard configuration file, which allows the same code to be used for both arrays, and a REmote Dictionary Service (Redis\footnote{\url{http://redis.io/}}) key-value data store to share all data among the independently executed processes. A comprehensive set of utilities for monitoring the state of the correlator and visualising the datasets is also included in the AMI software package. Independently of data acquisition from the correlator, but at a similar sampling rate, metadata such as antenna pointing and instrumental monitoring information (e.g. cryostat temperatures, AGC readings) are collected by the telescope control machine, and exchanged with the correlator server over the local Ethernet. \subsection{Data Handling}\label{sec:data-handling} The HDF5 format data files, one per observation, include correlated visibility data, noise-injection measurements and metadata samples, and accumulate on discs local to the correlator control server. Typical raw data rates are shown in Table \ref{table:DATARATE}. These files are the primary data products from the telescope and contain uncalibrated, full spectral resolution data. \begin{table} \centering \caption{Typical AMI data rates.} \label{table:DATARATE} \begin{tabular}{c|cc} & Small Array & Large Array \\ \hline \hline Sampling rate (Mbps) & 16.8 & 11.0 \\ Recording rate (GBph) & 8 & 5.2 \\ 8-hour observation (GB) & 64 & 42 \\ \end{tabular} \end{table} After each observation the HDF5 dataset is converted to FITS-IDI\footnote{\url{http://www.nrao.edu/aips/FITSIDI.pdf}} format for calibration and further processing using standard reduction packages, and is transferred from the observatory to a data repository at the Cavendish Laboratory. The conversion script is based on the pyFitsidi\footnote{\url{http://telegraphic.github.io/pyfitsidi}} Python module, and also performs the following operations: \begin{itemize} \item \highlight{removal of spike artefacts in a few fixed channels of the ADC readout which are contaminated by ADC core offset mismatches, by flagging these channels to zero.} \item removal of the channel readout delay phase shift. \item re-ordering of the ADC channels into increasing RF order. \item fringe rotation to remove the astronomical path difference over each sub-band. \item \highlight{amplitude correction to compensate for loss-of-signal due to averaging over 0.86s time windows; this is a function of the fringe rate and can be as much as a few \% for some of the Large Array baselines.} \item amplitude calibration for system temperature using the noise-injection system. \item flagging for instrumental problems (e.g. AGCs, cryostats, pointing, shadowing). \item optional binning of frequency channels, to reduce the dataset size. \end{itemize} In parallel to the above, the raw data samples received from the correlator are binned to 8 $\times$ 0.625 GHz frequency channels by a new task added to the real-time software on the telescope control system, and are recorded in legacy format for quick-look using the in-house software tool, REDUCE. These 8 channels are chosen to correspond to those used by the old analogue correlator, and availability of these datasets has proved invaluable for data evaluation and diagnostics throughout the development process and during routine operation. \section{Data Reduction}\label{sec:reduction} The FITS-IDI files contain visibility data to which instrumental flagging and some initial calibration steps have been applied, and these can now be imported to the standard reduction packages for radio interferometric data such as AIPS\footnote{\url{http://www.aips.nrao.edu/}} and CASA\footnote{\url{http://casa.nrao.edu}} for full calibration, radio-frequency interference (RFI) flagging and map-making. A generalised pipeline script has been developed to process these datasets within the CASA framework, and deals with: \begin{itemize} \item RFI flagging, both broad-band and at full frequency channel resolution. \item bandpass (amplitude and phase) and flux calibration, using observations of standard calibrators. \item phase calibration, using data from interleaved visits to nearby high flux density, unresolved radio sources. \item imaging. \end{itemize} Primary beam correction and mosaicing is currently done in AIPS due to difficulties in importing new primary beam models into CASA. This is the recommended route for processing AMI data for science. The 8-channel legacy format datasets described above are also available and can be processed using the in-house REDUCE software to provide useful results for some projects, but lose the benefits of the full spectral resolution that the new correlator provides. \section{Commissioning Results}\label{sec:results} \subsection{RFI rejection} One of the main motivators for constructing a correlator with such improved spectral resolution was to be able to identify and remove radio-frequency interference (RFI), which is typically confined to narrow frequency bands. RFI is generally worse at low elevation, due to the location of geostationary satellites. With the old correlator, this limited the useable declination range, particularly for the SA with its larger primary beam. \highlight{RFI flagging levels on the SA reached $\approx$\,85\% at $\delta \approx\,2^{\circ}$; in practice observations were rarely made below $\delta=20^{\circ}$. In Figure~\ref{Fi:RFI} we show part of an observation of a low-declination ($\approx\,0^{\circ}$) field on both the LA and the SA with the new correlator. The RFI is clearly localized in time- and frequency-space and affected regions of data can be easily excised using automated algorithms such as `rflag' as implemented in CASA, which searches for deviations from the median r.m.s.\ of the data in time and frequency space; see the AIPS cookbook, Section E.5 \footnote{\url{ftp://ftp.aoc.nrao.edu/pub/software/aips/TEXT/PUBL/COOKE.PS.gz}} for more detail on the algorithm. This removal process is illustrated in Fig.~\ref{Fi:RFI_flagging}. At $\delta \approx\,0^{\circ}$ the RFI flagging level is now $\approx$\,20\% on the LA and $\approx$\,25 -- 35\% on the SA. These are comparable to flagging percentages in similar frequency bands at other facilities, for example the Very Large Array which loses $\approx$\,15\% at Ku-band\footnote{see, e.g.\ \url{https://science.nrao.edu/facilities/vla/observing/RFI/jul-2014-d-configuration/Ku-Band_spectra_201407D}}, accounting for the fact that the AMI arrays are more compact and therefore more sensitive to ground-based RFI, and have larger primary beams.} \begin{figure*} \centering \includegraphics[trim={1.5cm, 1.5cm, 0.5cm, 0.8cm}, clip=,width=\columnwidth]{./pictures/LA_preflag.png} \includegraphics[trim={1.5cm, 1.5cm, 0.5cm, 0.8cm}, clip=,width=\columnwidth]{./pictures/SA_preflag.png} \caption{`Waterfall' plots of a low-declination ($\approx\,0^{\circ}$) field observed with the LA (SA) on the left (right), showing time against channel for the lower (upper) half of the bandwidth on a single baseline. The RFI can be clearly seen as bright signals localised in frequency and time and is easily removed using automated algorithms such as `rflag' in CASA; see Fig~\ref{Fi:RFI_flagging}.} \label{Fi:RFI} \end{figure*} \begin{figure*} \centering \includegraphics[trim={1.5cm, 1.5cm, 0.5cm, 0.8cm}, clip=,width=\columnwidth]{./pictures/LA_postflag.png} \includegraphics[trim={1.5cm, 1.5cm, 0.5cm, 0.8cm}, clip=,width=\columnwidth]{./pictures/LA_postflag2.png} \caption{An illustration of RFI removal from the LA observation shown in Fig.~\ref{Fi:RFI}. The left-hand-side shows the effect of a $5\sigma$ flagging step using the CASA `rflag' algorithm; the bright, narrow-band signals have been removed as well as some of the wider-band signals. On the right, we have binned in frequency down to 32 channels and made another $5\sigma$ cut, which removes most of the remaining wider-band signals.} \label{Fi:RFI_flagging} \end{figure*} \subsection{Dynamic range} The uneven lag spacings of the old correlator limited the dynamic range, since maps of fields near high flux density sources would be contaminated by artefacts introduced by the correlator. The digital correlator has removed this issue and consequently the dynamic range of the telescope, defined as the ratio of the brightest believable flux to brightest non-believable flux on the map, has increased from $\sim$\,100 to $\sim$\,1000. Figure~\ref{Fi:3C147_LA} and Figure~\ref{Fi:3C286_SA} show example maps of a bright source produced on the LA and the SA, in comparison to similar maps using old correlator data. The improved dynamic range of the new AMI system is enabling, for example, the observation of galaxy clusters containing bright radio galaxies, which were previously excluded from cluster samples potentially introducing unquantifiable biases. \begin{figure*} \centering \includegraphics[trim={1.5cm 1.5cm 4.7cm 0.8cm},clip=,width=0.4325\linewidth]{./pictures/3C147_old_LA.png} \includegraphics[trim={1.5cm 1.5cm 0.6cm 0.8cm},clip=,width=0.5575\linewidth]{./pictures/3C147_new_LA_mJy.png} \caption{An LA observation of the bright, unresolved source 3C147 using the old (new) correlator on the left (right). The colour scales are the same, and have been truncated to show the systematic residuals around the source. These are at most 9.3 (1.1)\,mJy\,beam$^{-1}$, giving a dynamic range of 260 (2300).} \label{Fi:3C147_LA} \end{figure*} \begin{figure*} \centering \includegraphics[trim={1.5cm 1.5cm 4.7cm 0.8cm},clip=,width=0.4325\linewidth]{./pictures/3C286_SA_old.png} \includegraphics[trim={1.5cm 1.5cm 0.6cm 0.8cm},clip=,width=0.5575\linewidth]{./pictures/3C286_SA_new_mJy.png} \caption{An SA observation of the bright, unresolved source 3C286 using the old (new) correlator on the left (right). The colour scales are the same, and have been truncated to show the systematic residuals around the source. These are at most 15 (1.2)\,mJy\,beam$^{-1}$, giving a dynamic range of 230 (3000). The integration time for the new correlator map was much longer, in order for the thermal noise to fall below the level of the systematic errors. The triple of sources visible to the east of 3C286 in the new correlator map is real (the central source is FIRST J133148.5+303147); the source to the north of 3C286 is also real (FIRST J133052.9+303807). They are all under the level of the residuals in the old correlator map.} \label{Fi:3C286_SA} \end{figure*} \subsection{Scientific Collaboration} AMI has been operating routinely with the upgraded correlator since January 2016. \highlight{The telescope operates under the terms of a Scientific Collaboration Agreement involving the University of Cambridge and the University of Manchester, but welcomes external collaborators. The current scientific programmes include: SZ observations of galaxy clusters, for example extending the previous follow-up of \emph{Planck} galaxy clusters \citep{Perrott2015}; source surveys, extending the 10C source counts (e.g.\ \citealt{10Ccont}) to lower flux densities and adding to the multi-wavelength legacy datasets available in fields such as Stripe 82 (e.g.\ \citealt{Stripe82} and COSMOS (e.g.\ \citealt{COSMOS}); monitoring of variable and transient radio sources such as supernovae, GRBs, quasars and X-ray binaries; observations of supernova remnants with reported anomalous microwave emission (AME) detections at low resolution (\citealt{QUIJOTE_W44}, \citealt{Onic_IC443}), to test for the presence of AME at the angular scales measured by AMI. In each case, the new correlator has allowed AMI to operate more effectively in challenging radio source environments than was previously possible. This is a result of the greater RFI containment -- which allows observations of low-declination fields -- and enhanced dynamic range -- which allows significant improvements in source subtraction capability -- of the new instrument.} \highlight{The first results using data taken with the upgraded correlator have been published \citep{Munoz-Darias, Mooley2017}, with some work leveraging the new instrument in reobservations of sources originally detected by AMI's analogue correlator \citep{perrott2018}. More results are currently in preparation.} \section{Conclusions}\label{sec:conclusion} In this paper we have presented a new digital correlator system for the AMI telescope, which replaces the telescope's previous analogue lag-correlator. This real-time FX correlator is implemented using the popular ``packetised correlator'' architecture, in which interconnect between processors is provided by commercial Ethernet switches. Processing in the new correlator is performed on CASPER open-source hardware; FPGA-based ROACH2 platforms are used to digitise, filter into 1.2\,MHz-wide channels, and correlate a pair of down-converted sub-band signals at 5 Gsps, providing a usable RF band of 13.1--17.9 GHz. This wideband performance has been achieved by clocking the signal processing pipelines on the ROACH2's Xilinx Virtex 6 FPGAs at 312.5\,MHz, requiring optimisation and floorplanning of the firmware design. The improvement in performance of the new instrument when compared to the original analogue XF correlator is evident; the new correlator achieves over an order of magnitude improvement in imaging dynamic range, and is far more effective at operating in the presence of RFI -- paricularly interference at low-declination observations from geostationary satellites -- owing to superior spectral resolution. As a result of the improved performance, a new scientific collaboration has been established for the operation of AMI, and a broad range of observations are currently being performed with the telescope, which is now highly subscribed. \section*{Acknowledgements} We acknowledge support from the European Research Council under grant ERC-2012- StG-307215 LODESTONE. The images in Figures~\ref{Fi:RFI} to~\ref{Fi:3C286_SA} were prepared using the {\sc Cubehelix} colour palette \citep{Green2011}. This work has been supported by the generous donation of FPGA hardware and programming tools by the Xilinx University Program. \bibliographystyle{mnras}
\section{Introduction} Despite its success at predicting the results of particle experiments, the Standard Model remains widely unloved. Its unpopularity is due in part to a few inexplicably small parameters, including the $\mathcal O(10^{-16})$ ratio between the electroweak and Planck scales, the puzzling array of Yukawa couplings, and the degree to which QCD conserves the discrete charge ($C$) and parity ($P$) symmetries, $\abs{\theta} < 10^{-10}$. In addition, the Standard Model is clearly incomplete, failing to describe gravitation, dark matter, and neutrino masses. Prominent solutions to these theoretical shortcomings include supersymmetry (\ensuremath{\textsc{susy}} ), which stabilizes the electroweak scale and can support dark matter; extra dimensions and composite models, which can generate hierarchies dynamically; and axions, which explain the smallness of the QCD $CP$ parameter $\theta$ while supplying a dark matter candidate. In this paper we consider a hybrid of these elements, a supersymmetric composite axion model, as a solution to the strong $CP$ problem that is free from fine-tuning. At issue (for more complete discussion, see Refs.~\cite{Peccei:1996ax,Kim:2008hd}) is the $\theta$ term of the QCD Lagrangian, \begin{equation} \mathcal L = \frac{g^2}{32\pi^2} \bar\theta ~\epsilon^{\mu\nu\rho\sigma} G_{\mu \nu}^a G_{\rho\sigma}^a \equiv \frac{g^2}{32\pi^2} \bar\theta ~G_{\mu \nu}^a \tilde{G}^{a\mu\nu}, \end{equation} which violates both $P$ and $CP$. $\bar\theta$ is the physical combination of the intrinsic coefficient $\theta$ and a phase in the quark mass matrix, \begin{equation} \bar\theta \equiv \theta + \text{arg}\, \text{det}\, M_Q. \end{equation} Measurements of the neutron electric dipole moment require $\abs{\bar\theta}<10^{-10}$ \cite{Afach:2015sja}. Such a tiny value appears to require an extraordinary cancellation between two apparently unrelated quantities. In a simple axion model, $\bar\theta$ is associated with the transformation parameter of an approximate global $\ensuremath{U(1)_\text{PQ}}$ symmetry \cite{Peccei:1977ur,Peccei:1977hh,Wilczek:1977pj,Weinberg:1977ma,Kim:1979if,Shifman:1979if,Dine:1981rt}. \ensuremath{U(1)_\text{PQ}}\ is spontaneously broken at some high scale $f_a$ by the expectation value of a \ensuremath{U(1)_\text{PQ}}-charged scalar field or the formation of a \ensuremath{U(1)_\text{PQ}}-charged fermion condensate, resulting in a pseudo-Nambu--Goldstone boson (pNGB): the axion $a$. Due to the nonzero $SU(3)_c^2$-$\ensuremath{U(1)_\text{PQ}}$ anomaly, non-perturbative QCD dynamics induce an expectation value for the axion such that $CP$ is a symmetry of the vacuum, and the axion acquires a small mass. At energies below $f_a$, the effective Lagrangian contains the term: \begin{equation} \mathcal L = \frac{g^2}{32\pi^2} \left( \bar\theta + \mathcal A \frac{a}{f_a} \right) G_{\mu \nu}^a \tilde{G}^{a\mu\nu}, \end{equation} where $\mathcal A$ is the $SU(3)_c^2$-$\ensuremath{U(1)_\text{PQ}}$ anomaly coefficient. Nonperturbative QCD generates a periodic potential for the axion which can be heuristically described by \begin{equation} V[a] = m_\pi^2 f_\pi^2 \left( 1 - \cos\left[ \mathcal A \frac{a}{f_a} + \bar\theta\right] \right), \label{eq:vainst} \end{equation} where $m_\pi$ and $f_\pi$ are the pion mass and decay constant, respectively. This potential is minimized when $\ev{a} = -f_a \bar\theta /\mathcal A$, leading to $CP$ conservation in the vacuum. We choose to normalize the \ensuremath{U(1)_\text{PQ}}\ charges so that $\mathcal A=1$, for which the axion mass is\footnote{ More careful treatments based on the QCD chiral Lagrangian~\cite{DiVecchia:1980yfw} result in a potential given by: $V[a]= m_\pi^2 f_\pi^2 \left( 2 - \sqrt{1+ \frac{2 m_u m_d}{(m_u + m_d)^2 } \left( \cos\left[\mathcal A \frac{a}{f_a} +\bar\theta\right] \right) } \right)$, where $m_{u,d}$ are the up- and down-quark masses, and leading to an axion mass $m_a^2 = \frac{m_u m_d}{(m_u+m_d)^2} \frac{m_\pi^2 f_\pi^2}{f_a^2}$. The distinction between these two expressions for $V[a]$ is unimportant in terms of assessing the axion quality, and we use Eq.~\ref{eq:vainst} for our analysis.}, \begin{equation} m_a^2 = \frac{m_\pi^2 f_\pi^2}{f_a^2}. \label{eq:vamasses} \end{equation} Experimental observations set bounds on the value of $f_a$. A lower bound $f_a \gtrsim 10^{9} ~\ensuremath{\text{\small GeV}} $ is derived from constraints on stellar and supernova cooling~\cite{Raffelt:2006cw}, while the axion relic abundance suggests $f_a \lesssim10^{12}\, \ensuremath{\text{\small GeV}}$ in the absence of cosmological fine tuning~\cite{Fox:2004kb}. \paragraph{Axion Quality Problem:} Simple axion models are plagued by the theoretical inconsistencies endemic to theories containing fundamental scalar fields. The expectation value of the new complex scalar $\ev{\phi} \sim f_a$ receives additive corrections from high-energy physics which, while less severe than the electroweak hierarchy \cite{deGouvea:2014xba}, remains a concerning source of fine-tuning. Models of axions also suffer from a different concern which is potentially much more troubling: the \emph{axion quality problem}. Any \ensuremath{U(1)_\text{PQ}}-violating effects in the scalar potential can shift the axion VEV away from $\theta=0$, inducing the strong $CP$ problem rather than solving it. In particular, non-perturbative quantum gravity is expected to violate global symmetries \cite{Giddings:1987cg,Lee:1988ge,Kamionkowski:1992mf,Barr:1992qq,Kallosh:1995hi,Alonso:2017avz}, leading to terms in the low energy effective action of the form \begin{equation} \mathcal L_g \sim \frac{\abs{\phi}^p (\phi + \phi^\star) }{\ensuremath{M_\text{P}}^{p-3}}, \label{eq:lgex} \end{equation} which is inconsistent with $\abs{\theta}<10^{-10}$ unless the $p=4$ term has a coefficient smaller than $\mathcal O(10^{-55})$. Considering that the axion is introduced to explain fine-tuning of $\mathcal O(10^{-10})$, this calls its motivation into serious question, and any successful axion model must prevent linear shifts of the form $\ev{a} \rightarrow \ev{a} + f_a \Delta \theta$ with $\Delta \theta > 10^{-10}$. More generally, we can analyze arbitrary \ensuremath{U(1)_\text{PQ}}\ violation by including it in the axion potential $V[a]$ as \begin{equation} \delta V[a] = (Q~ f_a^4 ) \cos \left(\kappa \left[\frac{a}{f_a} + \bar\theta\right] + \theta_0\right), \label{eq:quality} \end{equation} for a dimensionless ``quality factor" $Q$, an integer $\kappa$ and an angle $\theta_0$. Experimental measurements of $\ev{\theta}$ set a maximum bound on $Q$; we derive the general expression in Appendix~\ref{appx:quality}. For $\kappa\sin\theta_0 \sim \mathcal O(1)$, $\abs{{\theta}}<10^{-10}$ requires: \begin{equation} Q < 10^{-62} \left( \frac{10^{12} ~\ensuremath{\text{\small GeV}}}{f_a} \right)^4 = 10^{-50} \left( \frac{10^{9}~ \ensuremath{\text{\small GeV}}}{f_a} \right)^4. \end{equation} \paragraph{Consistent Axion Models:} Several solutions to the axion quality problem are known, in which the \ensuremath{U(1)_\text{PQ}}\ is protected by associating it with new gauged symmetries. In the simplest solutions a gauged discrete $\ensuremath{\mathbbm{Z} }_N$ symmetry~\cite{Chun:1992bn} forbids \ensuremath{U(1)_\text{PQ}}-violating operators of dimensions smaller than $N$. More sophisticated models can employ discrete groups as small as $\ensuremath{\mathbbm{Z} }_4$ while forbidding the problematic operators~\cite{Carpenter:2009zs,Harigaya:2013vja}. Solutions without gauged discrete symmetries also exist: for example, a composite model~\cite{Randall:1992ut} with a gauged $SU(N)\times SU(m) \times SU(3)_c$ protects \ensuremath{U(1)_\text{PQ}}\ to arbitrarily high order. More recently~\cite{DiLuzio:2017tjx}, a qualitatively different $SU(N)_L \times SU(N)_R \times SU(3)_c$ model has been shown to suppress Planck scale corrections appropriately. Other constructions protect $\ensuremath{U(1)_\text{PQ}}$ by gauging a related Abelian group. In one model~\cite{Cheng:2001ys} with a compact extra dimension, a gauged $U(1)$ symmetry is spontaneously broken by fields localized on two separated four-dimensional branes. One combination of the fields is eaten by the gauge field, while the other acts as the QCD axion and is protected from gravitational corrections. A related model~\cite{Hill:2002kq} gauges a product group of the form $U(1)^k$ with $k\geq14$, which can also be interpreted as a $k$ site deconstruction of a compact fifth dimension. In a different class of models~\cite{Barr:1992qq,Fukuda:2017ylt}, the fields are assigned large and relatively prime $U(1)$ charges, so that an accidental $\ensuremath{U(1)_\text{PQ}}$ is protected from low-dimensional operators. Some of these models, while successful at forbidding low-dimensional \ensuremath{U(1)_\text{PQ}}-breaking operators, still suffer from a hierarchy problem. One resolution is supersymmetry (\ensuremath{\textsc{susy}}), which protects $f_a$ from loop-level corrections, so that the theory is technically natural if the \ensuremath{\textsc{susy}}-breaking scale is not much larger than $f_a$. Another compelling direction is composite models, which can suppress dangerous gravitational contributions to the axion potential while additionally offering the potential to determine the scale of \ensuremath{U(1)_\text{PQ}}\ breaking from the confining dynamics. For asymptotically free gauge theories the confinement scale is expected to be exponentially suppressed compared to \ensuremath{M_\text{P}}, so the hierarchy between $f_a$ and \ensuremath{M_\text{P}}\ can be naturally generated dynamically. In this article, we present a qualitatively new supersymmetric composite axion model which tames both the quality and hierarchy problems. The axion is a composite formed of large product of fundamental fields, such that the quality problem is ameliorated by a sufficiently large power of $(\Lambda / \ensuremath{M_\text{P}})^n$, where $f_a \sim \Lambda$ is dynamically generated by the confinement of a product of non-Abelian gauge theories. Supersymmetry allows for control over the low energy physics of the non-perturbative confining dynamics, and additionally stabilizes any other mass scales (including, perhaps, the electroweak scale). Our work is laid out as follows: in Section~\ref{sec:main}, we explore a minimal construction in terms of its UV degrees of freedom. In Section~\ref{sec:confinement}, we analyze its low energy behavior after confinement, with Section~\ref{sec:ssb} discussing the breaking of the global symmetries, including \ensuremath{U(1)_\text{PQ}}. Section~\ref{sec:grav} estimates the size of the leading gravitational corrections, and determines parameters such that the axion quality problem is ameliorated to a sufficient degree. In Section~\ref{sec:dynsp}, we show how a simple extension of the basic model can dynamically generate superpotential terms on which the basic module relies, resulting in a theory in which all of the essential mass scales are dynamically generated. In Section~\ref{sec:conclusions}, we conclude. As we shall see, solving the quality problem can imply that a theory whose low energy limit looks like a rather standard invisible axion model may blossom at high energies into a rich interlocking structure of gauge dynamics. \section{Axion from a Supersymmetric Product Group} \label{sec:main} We consider theories in which the axion emerges as a composite in the low energy description of confining supersymmetric gauge dynamics. In order to generate the scale $f_a$ dynamically as a by-product of confinement, we further specialize to s-confining theories~\cite{Csaki:1996sm,Csaki:1996zb}, in which a set of gauge-invariant operators provides a smooth description of the moduli space (valid at the origin), and a dynamically generated superpotential enforces the classical constraints. Our basic building blocks are $SU(N)$ gauge theories with one antisymmetric $A$, four fundamental quarks $Q$, and $N$ antifundamental antiquarks $\ensuremath{\overline{Q}}$; and $Sp(2n)$ gauge theories with $(2n+4)$ quarks $Q$. Both of these theories have been shown to s-confine~\cite{Berkooz:1995km,Poppitz:1995fh,Pouliot:1995me,Intriligator:1995ne}, and the $A+4Q+N\ensuremath{\overline{Q}}$ module has an $SU(4)$ flavor symmetry (acting on the $Q$ fields) into which $SU(3)_c$ QCD can be embedded. Gauging the $SU(4)$ flavor symmetry requires an additional four quarks $q$ transforming in the antifundamental representation of $SU(4)$ to cancel the $SU(4)^3$ anomaly. Supplemented by an appropriately chosen external superpotential, the $SU(N)$ confines and an appropriate $\ensuremath{U(1)_\text{PQ}}$ can be spontaneously broken. However, the resulting axion quality from this simple module is far from sufficient to accommodate $\abs{{\theta}}<10^{-10}$. \begin{figure}[t] \centering \includegraphics[scale=1.0]{dimoose.pdf} \caption{Moose diagram indicating the matter content and gauge interactions of the $SU(N)^\ell\times SU(4)\times SU(N)^\ensuremath{r}$ composite axion model. Each $G_i$ and $\ensuremath{\tilde{G}}_i$ corresponds to a gauged $SU(N)$, whereas $SU(N)$ flavor symmetries are represented by dashed circles. The bifundamental fields $Q$, $\ensuremath{\overline{Q}}_i$, $\ensuremath{q}$, and $\ensuremath{\overline{q}}_i$ are depicted as directed line segments connecting adjacent groups, while the field $A$ ($\ensuremath{\overline{A}}$) transforms under $G_1$ ($\ensuremath{\tilde{G}}_1$) in the antisymmetric two-tensor representation. } \label{fig:moose} \end{figure} High axion quality can be enforced by expanding the $SU(N)$ into a product group. It has recently been demonstrated that s-confining product group models can be constructed by gauging the $SU(N)$ flavor symmetry of the $A+4Q+N\ensuremath{\overline{Q}}_1$ theory, such that the field $\P_1$ transforms as a bifundamental under $SU(N)\times SU(N)$, with $N$ quarks $\P_2$ canceling the anomalies~\cite{Lillard:2017mon}. Iterating to $SU(N)^k$, the matter fields include the $SU(N)_{(1)}$-charged $A+4Q$; a string of $SU(N)_{(i)} \times SU(N)_{(i+1)}$ bifundamentals $\ensuremath{\overline{Q}}_i$; and $N$ fields $\ensuremath{\overline{Q}}_k$ charged only under the gauged $SU(N)_{(k)}$. The gauge-invariant operators include ``mesons" of the form $(Q \P_1 \P_2 \ldots \P_k)$ and $(A \P_1^2 \ldots \P_k^2)$; ``baryons" $(\P_i^N)$ for each $i=1\ldots k$; and special baryons $(A^{\frac{N-p}{2}} Q^{p})$ for $0\leq p\leq 4$, subject to the condition that $(N-p)$ is even. An axion living in a combination of these fields enjoys the feature that increasing $k$ and $N$ results in increasingly suppressed gravitational corrections. Extending the gauge symmetries on both sides, we arrive at a theory in which the full matter content is $\{A, Q, \P_1 \ldots \P_\ensuremath{r}; \ensuremath{\overline{A}}, q, \ensuremath{\overline{q}}_1 \ldots \ensuremath{\overline{q}}_\ell\}$, with the gauge group $SU(N)^\ell \times SU(4) \times SU(N)^\ensuremath{r}$. The gauge structure and matter assignments is represented as a moose diagram in Figure~\ref{fig:moose}, and is vaguely reminiscent of a deconstructed extra dimension with a bulk $SU(N)$ broken to $SU(4)$ on a defect. For convenience, we introduce the notation $SU(N)^\ell = \ensuremath{\tilde{G}}_1 \times \ensuremath{\tilde{G}}_2 \times \ldots \times \ensuremath{\tilde{G}}_\ell$ and $SU(N)^\ensuremath{r} = G_1 \times G_2 \times \ldots \times G_\ensuremath{r}$, where $\ensuremath{\tilde{G}}_i$ and $G_i$ confine at scales $\ensuremath{ \tilde{\Lambda}}_i$ and $\Lambda_i$ respectively. Up to a constant, the holomorphic scales $\ensuremath{ \tilde{\Lambda}}_i$ and $\Lambda_i$ are defined as \begin{align} \tLb{i} \equiv \mu^b \exp\{ -8\pi^2/\tilde{g}_i^2 + i \tilde{\theta}_{i} \} &,& \Lb{i} \equiv \mu^b \exp\{ -8\pi^2/g_i^2 + i \theta_{i} \} , \end{align} where $\tilde{g}_i$ and $g_i$ are the coupling constants of the gauge groups $\ensuremath{\tilde{G}}_i$ and $G_i$. In the dynamically generated superpotential for each group there is an overall constant that is not determined by symmetry arguments; to simplify the notation, we absorb these constants into $\tLb{i}$ and $\Lb{i}$. In the absence of an external superpotential, there is a conserved $U(1)_A\times U(1)_B \times U(1)_C \times U(1)_R \times SU(N)_L \times SU(N)_R$ global symmetry, and an approximate $\ensuremath{U(1)_\text{PQ}}$ that is broken by the $SU(4)^2$-$U(1)$ anomaly. Charges are shown in Table~\ref{table:UVtheory}, where for convenience, we have taken the $U(1)_R$ charges of $Q$ and $A$ to be equal to $\ensuremath{q}$ and $\ensuremath{\overline{A}}$, respectively, with $q_Q = \frac{N-4}{N}$ and $q_A= \frac{16-2N}{N(N-2)}$. By defining \ensuremath{U(1)_\text{PQ}}\ as in Table~\ref{table:UVtheory}, we assume that the operator $(A \P_1^2 \ldots \P_\ensuremath{r}^2)$ is more suppressed than $(\ensuremath{\overline{A}} \ensuremath{\overline{q}}_1^2 \ldots \ensuremath{\overline{q}}_\ell^2)$, so that \ensuremath{U(1)_\text{PQ}}\ is expected to be a better symmetry than $U(1)_A$. Appropriate \ensuremath{U(1)_\text{PQ}}\ charges in the opposite limit can be recovered by performing the following outer automorphism on the moose diagram: \begin{align} \ell \leftrightarrow \ensuremath{r} &,& G_i \leftrightarrow \ensuremath{\tilde{G}}_i &,& \Lambda_i \leftrightarrow \ensuremath{ \tilde{\Lambda}}_i &,& A \leftrightarrow \ensuremath{\overline{A}} &,& Q \leftrightarrow q &,& \P_i \leftrightarrow \ensuremath{\overline{q}}_i . \end{align} \begin{table}[t] \hspace*{-0.75cm} \begin{tabular}{| c | c | c c c | c | c c c | c || c c c c | c |} \hline \Tstrut \Bstrut &$SU(N)_L$ &$\ensuremath{\tilde{G}}_\ell$ &$\ldots$&$\ensuremath{\tilde{G}}_1$&$SU(4)$&$G_1$ &$\ldots$&$G_\ensuremath{r}$&$SU(N)_R$ &$U_A$ & $U_B$ & $U_C$ & $U_R$ & $\ensuremath{U(1)_\text{PQ}}$ \\ \hline $\ensuremath{\overline{q}}_\ell$ &\ensuremath{\tiny\yng(1)} & \ensuremath{\tiny\yng(1)} & & & & & & & & 0 & 0 & $\pm1$ & 0 & 0 \\ $\ensuremath{\overline{q}}_{\ell-1}$& & \ensuremath{\tiny \overline{\yng(1)}} & \ensuremath{\tiny\yng(1)} & & & & & & & $0$ & 0 &$\mp1$ & 0 & 0 \\ $\vdots$& & &$\ddots$ & & & & & & &$\vdots$&$\vdots$ &$\vdots$&$\vdots$ & $\vdots$ \\ $\ensuremath{\overline{q}}_1$& & & \ensuremath{\tiny \overline{\yng(1)}} & \ensuremath{\tiny\yng(1)} & & & & & & 0 & 0 & 1 & 0 & 0 \\ $\ensuremath{\overline{A}}$& & & & \ensuremath{ \tiny\Yvcentermath1\overline{\yng(1,1)}} & & & & & & $-4$ & 0 &$\frac{-N}{N-2}$&$q_A$ & 0 \\ $\ensuremath{q}$& & & & \ensuremath{\tiny \overline{\yng(1)}} & \ensuremath{\tiny \overline{\yng(1)}} & & & & & $N-2$& 0 & 0 &$q_Q$ & 0 \\ \hline \Tstrut $Q$& & & & & \ensuremath{\tiny\yng(1)} & \ensuremath{\tiny\yng(1)} & & & &$2-N$ & 0 & 0 &$q_Q$ &$\frac{2-N}{N}$ \\ $A$& & & & & & \ensuremath{\tiny\Yvcentermath1 \yng(1,1)} & & & &$4$ &$\frac{-N}{N-2}$& 0 &$q_A$ &$4/N$ \\ $\P_1$& & & & & & \ensuremath{\tiny \overline{\yng(1)}} & \ensuremath{\tiny\yng(1)} & & & 0 & 1 & 0 & 0 & 0 \\ $\vdots$& & & & & & &$\ddots$ & & &$\vdots$&$\vdots$ &$\vdots$ &$\vdots$ & $\vdots$ \\ $\P_{\ensuremath{r}-1}$& & & & & & & \ensuremath{\tiny \overline{\yng(1)}} & \ensuremath{\tiny\yng(1)} & & 0 &$\mp1$ & 0 & 0 & 0 \\ $\P_{\ensuremath{r}}$& & & & & & & & \ensuremath{\tiny \overline{\yng(1)}} & \ensuremath{\tiny\yng(1)} & 0 &$\pm1$ & 0 & 0 & 0 \\ \hline \end{tabular} \caption{Representations of the matter fields under the gauged $SU(N)^\ell \times SU(4) \times SU(N)^\ensuremath{r}$ symmetries, the flavor symmetries $SU(N)_L \times SU(N)_R \times U(1)^4$, and the approximate \ensuremath{U(1)_\text{PQ}}\ symmetry. } \label{table:UVtheory} \end{table} At a generic point on the moduli space the full global symmetry is spontaneously broken, producing a number of Nambu-Goldstone bosons. Although the explicit symmetry breaking from gravity would supply masses for the pNGB s, a tree-level external superpotential \begin{equation} \ensuremath{W_\text{tree}} = \frac{ (\ensuremath{\overline{A}} \ensuremath{\overline{q}}_1^2 \ensuremath{\overline{q}}_2^2 \ldots \ensuremath{\overline{q}}_\ell^2)}{M_A^{2\ell-2}} + \frac{(\P_1^N)}{M_B^{N-3}} + \frac{(\ensuremath{\overline{q}}_1^N)}{M_C^{N-3}} + \frac{(A^{m} Q)(A^{m-1} Q^3)}{M_R^{N-1} } + \frac{(\ensuremath{\overline{A}}^{m} \ensuremath{q})(\ensuremath{\overline{A}}^{m-1} \ensuremath{q}^3)}{M_r^{N-1} } \label{eq:wtree} \end{equation} increases the pNGB\ masses by breaking the global symmetries more severely. This is essential in the case of the second ($M_B$) term, which as we shall see below determines the PQ symmetry breaking scale $f_a$ after confinement. The remaining $M_i$ could be safely taken to be $\ensuremath{M_\text{P}}$ without harm. In addition, to avoid deforming the $G_1$ confinement, we choose them to satisfy $\Lambda_1\lesssim M_i$. In Section~\ref{sec:dynsp} we discuss the possibility that some of the terms in \eqref{eq:wtree} are generated dynamically through the s-confinement of a strongly coupled $Sp(2n)$ gauge group, providing a natural and completely dynamical origin for the scale $f_a$. \subsection{Confinement} \label{sec:confinement} We choose the UV gauge couplings such that $SU(N)^\ell$ and $SU(N)^\ensuremath{r}$ confine at an intermediate scale where $SU(4)$ remains weakly coupled and supersymmetry is unbroken. For odd $N=2m+1$, the groups $SU(N)^\ell$ and $SU(N)^\ensuremath{r}$ confine separately to produce the following hadrons: \begin{align} J_L = (\ensuremath{\overline{q}}_\ell \ensuremath{\overline{q}}_{\ell-1} \ldots \ensuremath{\overline{q}}_1 \ensuremath{q}) &,& K_L =(\ensuremath{\overline{q}}_\ell^2 \ensuremath{\overline{q}}_{\ell-1}^2 \ldots \ensuremath{\overline{q}}_1^2 \ensuremath{\overline{A}}) &,& \ensuremath{x}_1 = (\ensuremath{\overline{A}}^m \ensuremath{q}) &,& \ensuremath{y}_1 = (\ensuremath{\overline{A}}^{m-1} \ensuremath{q}^3) &,& \ensuremath{z}_i = (\ensuremath{\overline{q}}_i)^N ,\\ J_R = (Q \ensuremath{\overline{Q}}_1 \ensuremath{\overline{Q}}_2 \ldots \ensuremath{\overline{Q}}_\ensuremath{r}) &,& K_R =(A \ensuremath{\overline{Q}}_1^2 \ensuremath{\overline{Q}}_2^2 \ldots \ensuremath{\overline{Q}}_\ensuremath{r}^2) &,& X_1 = (A^m Q) &,& Y_1 = (A^{m-1} Q^3) &,& Z_i = (\ensuremath{\overline{Q}}_i)^N . \end{align} Their transformation properties under the global symmetries are summarized in Table~\ref{table:IRtheory}. These operators obey quantum-modified equations of motion, for which we define the shorthand notation: \begin{align} (\tilde{\Pi}_{1}^{\ell} \ensuremath{z}) &= \left\{ \begin{array}{l l} \text{even $\ell$:} & \begin{array}{l} (\ensuremath{z}_1 \ensuremath{z}_2 \ensuremath{z}_3 \ldots \ensuremath{z}_\ell) - \tLb{2} (\ensuremath{z}_3 \ensuremath{z}_4 \ldots \ensuremath{z}_\ell) - \ensuremath{z}_1 \tLb{3} (\ensuremath{z}_4 \ldots \ensuremath{z}_\ell) + \tLb{2} \tLb{4} (\ensuremath{z}_5 \ldots \ensuremath{z}_\ell) + \ldots \\ ~~~ + (\tLb{2}\tLb{4} \tLb{6} \ldots \tLb{\ell-2}) \ensuremath{z}_{\ell-1} \ensuremath{z}_\ell + (\tLb{2}\tLb{4} \tLb{6} \ldots \tLb{\ell-2} \tLb{\ell}), \end{array} \vspace{0.2cm} \\ \text{odd $\ell$:} & \begin{array}{l}(\ensuremath{z}_1 \ensuremath{z}_2 \ensuremath{z}_3 \ldots \ensuremath{z}_\ell) - \tLb{2} (\ensuremath{z}_3 \ensuremath{z}_4 \ldots \ensuremath{z}_\ell) - \ensuremath{z}_1 \tLb{3} (\ensuremath{z}_4 \ldots \ensuremath{z}_\ell) + \tLb{2} \tLb{4} (\ensuremath{z}_5 \ldots \ensuremath{z}_\ell) + \ldots \\~~~ + \ensuremath{z}_1 (\tLb{3}\tLb{5} \tLb{7} \ldots \tLb{\ell} ) + \ldots + (\tLb{2}\tLb{4} \tLb{6} \ldots \tLb{\ell-1} \ensuremath{z}_{\ell}) ; \end{array} \end{array} \right. \end{align} \begin{align} (\tilde{\Pi}_{1}^{\ensuremath{r}} Z) &= \left\{ \begin{array}{l l} \text{even $\ensuremath{r}$:} & \begin{array}{l} (Z_1 Z_2 Z_3 \ldots Z_\ensuremath{r}) - \Lb{2} (Z_3 Z_4 \ldots Z_\ensuremath{r}) - Z_1 \Lb{3} (Z_4 \ldots Z_\ensuremath{r}) + \Lb{2} \Lb{4} (Z_5 \ldots Z_\ensuremath{r}) + \ldots \\ ~~~ + (\Lb{2}\Lb{4} \Lb{6} \ldots \Lb{\ensuremath{r}-2}) Z_{\ensuremath{r}-1} Z_\ensuremath{r} + (\Lb{2}\Lb{4} \Lb{6} \ldots \Lb{\ensuremath{r}-2} \Lb{\ensuremath{r}}), \end{array} \vspace{0.2cm} \\ \text{odd $\ensuremath{r}$:} & \begin{array}{l} (Z_1 Z_2 Z_3 \ldots Z_\ensuremath{r}) - \Lb{2} (Z_3 Z_4 \ldots Z_\ensuremath{r}) - Z_1 \Lb{3} (Z_4 \ldots Z_\ensuremath{r}) + \Lb{2} \Lb{4} (Z_5 \ldots Z_\ensuremath{r}) + \ldots \\~~~ + Z_1 (\Lb{3}\Lb{5} \Lb{7} \ldots \Lb{\ensuremath{r}} ) + \ldots + (\Lb{2}\Lb{4} \Lb{6} \ldots \Lb{\ensuremath{r}-1} Z_{\ensuremath{r}}) . \end{array} \end{array} \right. \label{eq:sharr} \end{align} The constraint equations include: \begin{align} \begin{array}{c} K_L^m J_L = \ensuremath{x} (\tilde{\Pi}_{1}^{\ell} \ensuremath{z}) \\ K_R^m J_R = X (\tilde{\Pi}_{1}^{\ensuremath{r}} Z) \end{array} && \begin{array}{c} K_L^{m-1} J_L^3 = \ensuremath{y} (\tilde{\Pi}_{1}^{\ell} \ensuremath{z}) \\ K_R^{m-1} J_R^3 = Y (\tilde{\Pi}_{1}^{\ensuremath{r}} Z) \end{array} && \begin{array}{c} \ensuremath{x} \ensuremath{y} = 0 \\ X Y = 0 . \end{array} \label{eq:qmconst} \end{align} Not shown above, $X$, $Y$, $\ensuremath{x}$, and $\ensuremath{y}$ each carry an $SU(4)$ gauge index, which is summed over in the expressions $\ensuremath{x}^\alpha \ensuremath{y}_\alpha = X_\alpha Y^\alpha = 0$. Each term in the equations above is invariant under the $SU(N)_L \times SU(N)_R$ family symmetry. Combinatoric coefficients have been suppressed for clarity. \begin{table}[t] \centering \begin{tabular}{| c | c | c c | c |} \hline &$SU(4)$&$SU(N)_L$&$SU(N)_R$ &$\ensuremath{U(1)_\text{PQ}}$ \\ \hline $\ensuremath{x}_1$ & \ensuremath{\tiny \overline{\yng(1)}} \Tstrut & & & 0 \\ $\ensuremath{y}_1$ & \ensuremath{\tiny\yng(1)} & & & 0 \\ $\ensuremath{z}_i$ & 1 & & & 0 \\ \hline $J_L$ & \ensuremath{\tiny \overline{\yng(1)}} \Tstrut & \ensuremath{\tiny\yng(1)} & & 0 \\ $K_L$ & 1 & \ensuremath{\tiny\Yvcentermath1 \yng(1,1)} & \Bstrut & 0 \\ \hline $X_1$ & \ensuremath{\tiny\yng(1)} & & & 1 \\ $Y_1$ & \ensuremath{\tiny \overline{\yng(1)}} & & & $-1$ \\ $Z_i$ & 1 & & & 0 \\ \hline $J_R$ & \ensuremath{\tiny\yng(1)} & & \ensuremath{\tiny\yng(1)} & $\frac{2-N}{N}$ \Tstrut \\ $K_R$ & 1 & & \ensuremath{\tiny\Yvcentermath1 \yng(1,1)} \Bstrut & $4/N$ \\ \hline \end{tabular} \caption{Operators describing infrared degrees of freedom in the confined phase of $SU(N)^\ell \times SU(N)^\ensuremath{r}$, and their transformation properties under the approximate $SU(N)_L \times SU(N)_R \times \ensuremath{U(1)_\text{PQ}}$ flavor symmetries.} \label{table:IRtheory} \end{table} The analysis is simplified by introducing spurion superfields $X_{i>1}$, $Y_{i>1}$, $\ensuremath{x}_{i>1}$ and $\ensuremath{y}_{i>1}$, such that the constraints between operators follow directly from the dynamically generated superpotential $W_d = W_L + W_R$, where \begin{align} W_L &= \frac{\ensuremath{x}_1 \ensuremath{y}_1 \ensuremath{z}_1 - \ensuremath{x}_1 \ensuremath{y}_2 - \ensuremath{y}_1 \ensuremath{x}_2}{\tLb{1}} + \sum_{i=2}^{\ell-1} \frac{\ensuremath{x}_i \ensuremath{y}_i \ensuremath{z}_i - \ensuremath{x}_i \ensuremath{y}_{i+1} - \ensuremath{y}_i \ensuremath{x}_{i+1} }{\tLb{1} \tLb{2} \ldots \tLb{i} } + \frac{\ensuremath{x}_\ell \ensuremath{y}_\ell \ensuremath{z}_\ell - \ensuremath{x}_\ell K_L^{m-1} J_L^3 - \ensuremath{y}_\ell K_L^m J_L }{\tLb{1} \tLb{2} \ldots \tLb{\ell}} \\ W_R &= \frac{X_1 Y_1 Z_1 - X_1 Y_2 - Y_1 X_2}{\Lb{1}} + \sum_{i=2}^{\ensuremath{r}-1} \frac{X_i Y_i Z_i - X_i Y_{i+1} - Y_i X_{i+1} }{\Lb{1} \Lb{2} \ldots \Lb{i} } + \frac{X_\ensuremath{r} Y_\ensuremath{r} Z_\ensuremath{r} - X_\ensuremath{r} K_R^{m-1} J_R^3 - Y_\ensuremath{r} K_R^m J_R }{\Lb{1} \Lb{2} \ldots \Lb{\ensuremath{r}}} . \end{align} Each of the fields $\{X_{i>1},Y_{i>1},\ensuremath{x}_{i>1},\ensuremath{y}_{i>1} \}$ is a redundant operator: that is, the equations of motion determine the low-energy behavior of each superfield exactly, leaving no independent degrees of freedom. For example, the constraint $\partial W_d/ \partial X_i = 0$ determines the value of $Y_{i+1}$: \begin{align} Y_2 = Y_1 Z_1 &,& Y_3 =Y_1 (Z_1 Z_2 - \Lb{2}) &,& Y_{i+1} = Y_i Z_i - \Lb{i} Y_{i-1} = Y_1 (\tilde{\Pi}_1^i Z). \end{align} After confinement, the tree-level superpotential \eqref{eq:wtree} leads to \begin{equation} \ensuremath{W_\text{tree}} \rightarrow \frac{(K_L)_{i_1 i_2} }{M_A^{2\ell-2}} + \frac{Z_1}{M_B^{N-3}} + \frac{\ensuremath{z}_1}{M_C^{N-3}} + \frac{X_1^\alpha Y_1^\alpha}{M_R^{N-1}} + \frac{\ensuremath{x}_1^\alpha \ensuremath{y}_1^\alpha}{M_r^{N-1}}, \end{equation} where the indices $i$ and $\alpha$ refer to $SU(N)_L$ and $SU(4)$, respectively. In the discussion that follows, we assume that $M_B$ is several orders of magnitude below $\ensuremath{M_\text{P}}$, and that $M_B \lesssim M_{A,C,R,r} \lesssim \ensuremath{M_\text{P}}$. \subsection{Symmetry Breaking} \label{sec:ssb} Each term in \ensuremath{W_\text{tree}}\ is introduced to break an undesired global symmetry: however, the $Z_1$ and $\ensuremath{z}_1$ tadpoles induced by $\ensuremath{W_\text{tree}}$ also have a significant effect on the vacuum structure. Added to the full superpotential, \begin{equation} W = \ensuremath{W_\text{tree}} + W_L + W_R, \end{equation} the $Z_1$ and $\ensuremath{z}_1$ tadpole terms in \ensuremath{W_\text{tree}}\ shift the moduli space away from the origin: specifically, their equations of motion cause $\ev{X_1 Y_1}$ and $\ev{\ensuremath{x}_1 \ensuremath{y}_1}$ to be nonzero. In this section we consider the case $\ev{X_1 Y_1} \gg \ev{\ensuremath{x}_1 \ensuremath{y}_1}$ and show that $SU(4)\times \ensuremath{U(1)_\text{PQ}}$ is spontaneously broken to $SU(3)_c$. It is convenient to normalize the infrared operators by appropriate factors of $\Lambda_i$ so as to give them canonical mass dimension $+1$: \begin{align} \ensuremath{\tilde{J}}_L \equiv \frac{J_L}{\Lambda_L^\ell} &,& \ensuremath{\tilde{K}}_L \equiv \frac{K_L}{(\Lambda_L^\ell)^2} &,& \ensuremath{\tilde{\x}} \equiv \frac{\ensuremath{x}_1}{\ensuremath{ \tilde{\Lambda}}_1^m} &,& \ensuremath{\tilde{\y}} \equiv \frac{\ensuremath{y}_1}{\ensuremath{ \tilde{\Lambda}}_1^{m+1}} &,& \ensuremath{\tilde{\z}}_i \equiv \frac{\ensuremath{z}_i}{\ensuremath{ \tilde{\Lambda}}_i^{N-1}} \\ \ensuremath{\tilde{J}}_R \equiv \frac{J_R}{\Lambda_R^\ensuremath{r}} &,& \ensuremath{\tilde{K}}_R \equiv \frac{K_R}{(\Lambda_R^\ensuremath{r})^2} &,& \ensuremath{\tilde{X}} \equiv \frac{X_1}{\Lambda_1^m} &,& \ensuremath{\tilde{Y}} \equiv \frac{Y_1}{\Lambda_1^{m+1}} &,& \ensuremath{\tilde{Z}}_i \equiv \frac{Z_i}{\Lambda_i^{N-1}} \end{align} where \begin{align} \Lambda_L^\ell \equiv (\ensuremath{ \tilde{\Lambda}}_1 \ensuremath{ \tilde{\Lambda}}_2 \ldots \ensuremath{ \tilde{\Lambda}}_\ell) &,& \Lambda_R^\ensuremath{r} \equiv (\Lambda_1 \Lambda_2 \ldots \Lambda_\ensuremath{r}). \end{align} In terms of these operators, the tree-level superpotential \eqref{eq:wtree} becomes \begin{eqnarray} \ensuremath{W_\text{tree}} & \rightarrow & \Lambda_L^2 \left(\frac{\Lambda_L}{M_A} \right)^{2\ell-2} (\ensuremath{\tilde{K}}_L)_{i_1 i_2} + \Lambda_1^2 \left( \frac{\Lambda_1}{M_B} \right)^{N-3} \ensuremath{\tilde{Z}}_1 + \ensuremath{ \tilde{\Lambda}}_1^2 \left( \frac{\ensuremath{ \tilde{\Lambda}}_1}{M_C} \right)^{N-3} \ensuremath{\tilde{\z}}_1 \nonumber\\&&~~~~+ \Lambda_1 \left( \frac{\Lambda_1}{M_R}\right)^{N-1} \ensuremath{\tilde{X}} \ensuremath{\tilde{Y}} + \ensuremath{ \tilde{\Lambda}}_1 \left( \frac{\ensuremath{ \tilde{\Lambda}}_1}{M_r}\right)^{N-1} \ensuremath{\tilde{\x}} \ensuremath{\tilde{\y}}, \end{eqnarray} and the dynamically generated superpotential includes the leading terms \begin{equation} W_L + W_R = \ensuremath{\tilde{\x}} \ensuremath{\tilde{\y}} \ensuremath{\tilde{\z}}_1 + \ensuremath{\tilde{X}} \ensuremath{\tilde{Y}} \ensuremath{\tilde{Z}}_1 - \frac{x_1 y_2 + y_1 x_2}{\tLb{1}} - \frac{X_1 Y_2 + Y_1 X_2}{\Lb{1}} + \ldots \end{equation} The equation of motion $\partial W/\partial \ensuremath{\tilde{Z}}_1=0$ enforces: \begin{equation} \ensuremath{\tilde{X}}_\alpha \ensuremath{\tilde{Y}}^\alpha = -\frac{\Lambda_1^{N-1}}{M_B^{N-3}} \equiv \sigma^2. \label{eq:mbsigma} \end{equation} By performing an $SU(4)$ gauge transformation, the nonzero expectation values can be rotated into the $\alpha=4$ component such that \begin{align} \ev{\ensuremath{\tilde{X}}}_{(4)} = \beta \sigma, && \ev{\ensuremath{\tilde{Y}}}_{(4)} = \frac{1}{\beta} \sigma, && \ev{\ensuremath{\tilde{X}}}_{\alpha=1,2,3} = \ev{\ensuremath{\tilde{Y}}}_{\alpha=1,2,3} = 0, \end{align} where $\beta$ parametrizes a flat direction of the degenerate vacua, which is likely to be lifted in a particular model of \ensuremath{\textsc{susy}}\ breaking; we treat it as a free parameter. An $SU(3)_c$ subgroup of $SU(4)$ remains as an infrared symmetry, and the other $15-8=7$ generators of $SU(4)$ are broken. Through the super-Higgs mechanism, 7 of the 8 would-be NGB s are eaten by the $SU(4)$ superfields to make them massive, and a single NGB\ remains massless. The matter fields decompose into irreducible representations of $SU(3)_c$ as follows: \begin{align} \begin{array}{rcl} \ensuremath{\tiny\yng(1)} &\longrightarrow& \ensuremath{\tiny\yng(1)} \oplus {\ensuremath{{\bf 1}}}, \\ \ensuremath{\tilde{X}}_{\alpha'} &\longrightarrow& \ensuremath{\tilde{X}}_\alpha \oplus \ensuremath{\tilde{X}}_{(4)}, \end{array} && \begin{array}{rcl} \ensuremath{\tiny \overline{\yng(1)}} &\longrightarrow& \ensuremath{\tiny \overline{\yng(1)}} \oplus {\ensuremath{{\bf 1}}}, \\ \ensuremath{\tilde{Y}}_{\alpha'} &\longrightarrow& \ensuremath{\tilde{Y}}_\alpha \oplus \ensuremath{\tilde{Y}}_{(4)}, \end{array} && \begin{array}{rcl} \ensuremath{{\bf Adj}} &\longrightarrow& \ensuremath{{\bf Adj}} \oplus \ensuremath{\tiny\yng(1)} \oplus \ensuremath{\tiny \overline{\yng(1)}} \oplus \ensuremath{{\bf 1}}, \\ \lambda_a &\longrightarrow& \lambda_a' \oplus \lambda^+ \oplus \lambda^- \oplus \lambda^0. \end{array} \end{align} A combination of the superfields $\ensuremath{\tilde{X}}_{\alpha=1,2,3}$ and $\ensuremath{\tilde{Y}}_{\alpha=1,2,3}$ are eaten by the massive $\lambda^{\pm}$ vector supermultiplets. Another linear combination of $\ensuremath{\tilde{X}}$ and $\ensuremath{\tilde{Y}}$ is eaten by the diagonal $T^{15}$ generator of $SU(4)$, leaving exactly one massless superfield to play the role of the axion. We introduce the real scalar fields $\phi_1$, $\phi_2$, $a$ and $\eta$ to describe the bosonic degrees of freedom: \begin{align} \begin{array}{rcl} \ensuremath{\tilde{X}}_{(4)} &=& \left( \frac{\phi_1}{\sqrt2} + \ev{\ensuremath{\tilde{X}}_{(4)}} \right)\exp\left[ \frac{i}{f_a} \left( a + \alpha \eta \right) \right] \\ \ensuremath{\tilde{Y}}_{(4)} &=& \left( \frac{\phi_2}{\sqrt2} + \ev{\ensuremath{\tilde{Y}}_{(4)}} \right)\exp\left[ \frac{i}{f_a} \left( -a + \frac{1}{\alpha} \eta \right) \right], \end{array} \label{eq:qcdaxion} \end{align} where $f_a$ is the axion decay constant, and $\alpha$ is a constant determined by requiring canonical normalization of the scalar kinetic terms. It is convenient to define $v_{1,2}$ such that \begin{align} v_1 = \sqrt2 \abs{\ev{\ensuremath{\tilde{X}}_{(4)}}} = \sqrt2 \abs{ \beta\sigma }&& v_2 = \sqrt2 \abs{\ev{\ensuremath{\tilde{Y}}_{(4)}}} = \sqrt2 \abs{ \frac{\sigma }{\beta}}, \end{align} so that normalization of the scalar fields requires \begin{align} f_a^2 = v_1^2 + v_2^2 &,& \alpha = \frac{v_2}{v_1}. \label{eq:fav1v2} \end{align} In the discussion above we assume that $\ensuremath{\tilde{X}}$ and $\ensuremath{\tilde{Y}}$ are the only \ensuremath{U(1)_\text{PQ}}-charged fields with nonzero expectation values. This is not necessarily true: for example, $\ev{K_R}$ may acquire an expectation value without breaking $SU(3)_c$. In the limit where $\ev{K_R} \ll \sigma$ its contribution to the axion potential is vanishingly small, and the physics remains approximately as discussed here. For completeness, in Appendix~\ref{sec:generalkinetic} we derive the composition of the physical axion in the more general $\ev{K_R}\neq0$ case. To preserve $SU(3)_c$ in the vacuum, the QCD-charged components of the scalars $\ensuremath{\tilde{\x}}$, $\ensuremath{\tilde{\y}}$, $\ensuremath{\tilde{J}}_L$ and $\ensuremath{\tilde{J}}_R$ must not acquire expectation values, which places mild constraints on the unspecified nature of \ensuremath{\textsc{susy}}-breaking. Nonzero VEVs for the $i=4$ components of the scalar fields are permitted. \subsection{Gravitational Corrections} \label{sec:grav} Non-perturbative gravity produces \ensuremath{U(1)_\text{PQ}}-violation, which at low energies are described by local gauge invariant operators in an effective superpotential. The leading (in $1/\ensuremath{M_\text{P}}$) terms are: \begin{equation} W_g = \rho_1 \frac{(\ensuremath{\overline{q}}_\ell \ensuremath{\overline{q}}_{\ell-1} \ldots \ensuremath{\overline{q}}_1 \ensuremath{q} Q \P_1 \P_2 \ldots \P_\ensuremath{r})}{\ensuremath{M_\text{P}}^{\ell+\ensuremath{r}-1}} + \rho_2 \frac{(\ensuremath{\overline{q}}_\ell \ensuremath{\overline{q}}_{\ell-1} \ldots \ensuremath{\overline{q}}_1 \ensuremath{q} )(A^m Q)}{\ensuremath{M_\text{P}}^{\ell+m-1}} + \rho_3 \frac{(\ensuremath{\overline{A}}^m \ensuremath{q})(A^m Q) }{\ensuremath{M_\text{P}}^{2m-1}} + \rho_4 \frac{(A \P_1^2 \P_2^2 \ldots \P_\ensuremath{r}^2)}{\ensuremath{M_\text{P}}^{2\ensuremath{r}-2}}, \label{eq:wg} \end{equation} with coefficients $\rho_i$ which encode the details of the unknown quantum gravitational physics. Naive power counting would argue for $\rho_i \sim \mathcal O(1)$, whereas computations based on wormhole configurations or stringy realizations of quantum gravity favor $\rho_i \sim \mathcal O\left( \exp \left[ -S_{\rm wh} \right] \right)$ with $S_{\rm wh} \sim \ensuremath{M_\text{P}} / f_a$. To capture the range of possibilities, we will consider a range of $\rho_i$ (all taken to have roughly equal magnitudes) in our analysis below. After confinement, $W_g$ maps on to: \begin{equation} W_g \rightarrow \rho_1 \frac{\Lambda_L^\ell \Lambda_R^\ensuremath{r}}{\ensuremath{M_\text{P}}^{\ell+\ensuremath{r}-1}} (\ensuremath{\tilde{J}}_L \ensuremath{\tilde{J}}_R) + \rho_2 \frac{\Lambda_L^\ell \Lambda_1^m}{\ensuremath{M_\text{P}}^{\ell+m-1}} (\ensuremath{\tilde{J}}_L \ensuremath{\tilde{X}}) + \rho_3 \frac{\ensuremath{ \tilde{\Lambda}}_1^m \Lambda_1^m}{\ensuremath{M_\text{P}}^{2m-1}} (\ensuremath{\tilde{\x}} \ensuremath{\tilde{X}}) + \rho_4 \frac{(\Lambda_R^\ensuremath{r})^2}{\ensuremath{M_\text{P}}^{2\ensuremath{r}-2}} (\ensuremath{\tilde{K}}_R)_{j_1 j_2}, \label{eq:wgconf} \end{equation} where the index $j$ refers to the $SU(N)_R$ family symmetry. There are two types of tree-level corrections to the axion potential. In the supersymmetric limit, the equations of motion from $\ensuremath{W_\text{tree}}+W_d+W_g$ produce operators in the Lagrangian of the form \begin{equation} \mathcal L_g \sim \left(\prod_{i,j} \phi_i \phi_j^\star\right)\left( \Phi + \Phi^\star\right), \end{equation} where $\Phi$ has non-zero \ensuremath{U(1)_\text{PQ}}\ charge (and thus some of its phase is part of the axion), and $\phi_i$ and $\phi_j^\star$ are scalar fields as determined by the equations of motion. Replacing the fields with their expectation values, $\mathcal L_g$ corrects the axion potential by: \begin{equation} \delta V[a] \sim \left(\prod_{i,j} \ev{\phi_i} \ev{ \phi_j^\star}\right) \ev{\Phi} \cos\left( \frac{q_\Phi a}{f_a} + \theta_0 \right). \end{equation} Clearly this type of correction is only operative if all of the relevant fields $\phi_{i,j}$ have non-zero expectation values. The second type of tree-level correction arises once \ensuremath{\textsc{susy}}\ is broken, and the low energy Lagrangian contains $A$-terms of the form \begin{equation} \mathcal L_g \sim m_s W_g + h.c. \end{equation} (where $W_g$ should be understood to have its super-fields replaced by their scalar components, and there is a separate \ensuremath{\textsc{susy}}-breaking coefficient of ${\mathcal O}(m_s)$ for each term in $W_g$). In the cases where the necessary scalar fields have zero expectation values, these terms can still correct the axion potential at loop level. As can be seen from \eqref{eq:qmconst}, the moduli space includes vacua with $\ev{K_{R}} = \ev{J_{R}} = 0$. These flat directions are lifted by \ensuremath{\textsc{susy}}-breaking, and thus model-dependent. Rather than getting bogged down in the details of a specific model, we make the pessimistic assumption that the resulting expectation values are large: \begin{equation} \ev{\ensuremath{\tilde{J}}^j_{(4)}}, \ev{\ensuremath{\tilde{K}}^{j_1 j_2}} \sim \mathcal O(m_s). \end{equation} This assumption additionally simplifies the analysis in that for such large expectation values, the tree-level corrections to the axion potential are expected to dominate over any of the loop level corrections. Generically, the leading contributions to the axion potential are expected to arise from \ensuremath{\textsc{susy}}-breaking rather than from the equations of motion. This is because the equations of motion from $W_d$ involve high-dimensional operators, which are only important at tree level if all of the participating fields have relatively large expectation values. For example, \begin{eqnarray} \abs{ \frac{\partial W}{\partial \ensuremath{\tilde{J}}_R} }^2 &=& \abs{ \frac{\Lambda_L^\ell \Lambda_R^\ensuremath{r}}{\ensuremath{M_\text{P}}^{\ell+\ensuremath{r}-1} } (\ensuremath{\tilde{J}}_L) - \frac{ (\ensuremath{\tilde{X}}_k \ensuremath{\tilde{J}}_R^{2}) \ensuremath{\tilde{K}}_R^{m-1} }{\Lambda_\ensuremath{r}^{m}} - \frac{(\ensuremath{\tilde{Y}}_k ) \ensuremath{\tilde{K}}_R^{m} }{\Lambda_\ensuremath{r}^{m-1}} }^2 \end{eqnarray} reduces to \begin{eqnarray} \mathcal L_g &\sim& \left( \frac{\Lambda_L^\ell \Lambda_R^\ensuremath{r}}{\ensuremath{M_\text{P}}^{\ell+\ensuremath{r}-1} } \frac{\ev{\ensuremath{\tilde{K}}_R^m}}{\Lambda_\ensuremath{r}^{m-1}} \right) \ev{\ensuremath{\tilde{J}}_L^\star} \ensuremath{\tilde{Y}}_k + h.c. \label{eq:lgsusyex} \end{eqnarray} In the product $\ev{\ensuremath{\tilde{K}}_R^m}$, the $SU(N)_R$ indices are contracted antisymmetrically. If some of the expectation values are close to zero, the entire product vanishes. Only in the case where $\ev{\ensuremath{\tilde{K}}}$ and $\ev{\ensuremath{\tilde{J}}}$ are comparable to $\Lambda_\ensuremath{r}$ does \eqref{eq:lgsusyex} contribute significantly. \paragraph{Quality Factors:} The \ensuremath{\textsc{susy}}-breaking $A$-term corresponding to the $\rho_1$ term in $W_g$ is \begin{equation} \mathcal L_g \sim m_s \rho_1 \left(\frac{\Lambda_L^\ell \Lambda_R^\ensuremath{r}}{\ensuremath{M_\text{P}}^{\ell+\ensuremath{r}-1}} \right) (\ensuremath{\tilde{J}}_L)_i^\alpha (\ensuremath{\tilde{J}}_R)^\alpha_j + h.c., \end{equation} where the indices $i$ and $j$ correspond to the $SU(N)_L \times SU(N)_R$ global symmetry. As $\ensuremath{\tilde{J}}_R$ is charged under \ensuremath{U(1)_\text{PQ}}\, $\ev{\ensuremath{\tilde{J}}_L \ensuremath{\tilde{J}}_R} \neq 0$ shifts the axion potential by \begin{equation} \delta V[a] \sim \rho_1 m_s \left(\frac{\Lambda_L^\ell \Lambda_R^\ensuremath{r}}{\ensuremath{M_\text{P}}^{\ell+\ensuremath{r}-1}} \right) \abs{\ev{\ensuremath{\tilde{J}}_L} \ev{\ensuremath{\tilde{J}}_R}} \cos\left( q_J \frac{a}{f_a} + \theta_0 \right), \end{equation} with $q_J = \frac{2-N}{N} = \mathcal O(1)$. From \eqref{eq:quality}, consistency with $\abs{\bar\theta}< 10^{-10}$ requires \begin{equation} \rho_1 ~\frac{m_s \ensuremath{M_\text{P}} \abs{\ev{\ensuremath{\tilde{J}}_L} \ev{\ensuremath{\tilde{J}}_R}} }{\left(10^{12} \, \ensuremath{\text{\small GeV}}\right)^4} \left(\frac{\Lambda_L^\ell \Lambda_R^\ensuremath{r}}{\ensuremath{M_\text{P}}^{\ell+\ensuremath{r}}} \right) < 10^{-62}. \label{eq:q1} \end{equation} A limit on $\ensuremath{r}$ is set by the $\rho_4$ term: \begin{equation} \delta V[a] \sim \rho_4 m_s \frac{\Lambda_R^{2r}}{\ensuremath{M_\text{P}}^{2r-2}} \abs{\ev{(\ensuremath{\tilde{K}}_R)_{j_1 j_2}}} \cos\left( q_K \frac{a}{f_a} + \theta_0 \right), \end{equation} where $q_K = 4/N $. Ignoring the $\mathcal O(1)$ number $q_K$, \begin{equation} \rho_4 ~\frac{m_s \ensuremath{M_\text{P}}^2 \abs{\ev{\ensuremath{\tilde{K}}_R}} }{\left(10^{12} \, \ensuremath{\text{\small GeV}}\right)^4} \left(\frac{\Lambda_R}{\ensuremath{M_\text{P}}} \right)^{2\ensuremath{r}} < 10^{-62}. \label{eq:q4} \end{equation} From the $\rho_3$ term \begin{equation} \delta V[a] \sim m_s \rho_3 \frac{\ensuremath{ \tilde{\Lambda}}_1^m \Lambda_1^m}{\ensuremath{M_\text{P}}^{2m-1}} \abs{\ev{\ensuremath{\tilde{\x}}_{(4)}} \ev{\ensuremath{\tilde{X}}_{(4)}} } \cos\left(\frac{a}{f_a} + \theta_0\right), \end{equation} we find a constraint on $N=2m+1$: \begin{equation} \rho_3 ~\frac{m_s \ensuremath{M_\text{P}} \ev{\ensuremath{\tilde{\x}}_{(4)}} \ev{\ensuremath{\tilde{X}}_{(4)}} }{\left(10^{12} \, \ensuremath{\text{\small GeV}}\right)^4} \left(\frac{\ensuremath{ \tilde{\Lambda}}_1}{\ensuremath{M_\text{P}}}\right)^m \left(\frac{\Lambda_1}{\ensuremath{M_\text{P}}}\right)^m < 10^{-62}. \label{eq:q3} \end{equation} Finally, the $\rho_2$ term sets an additional constraint on $\ell$ and $N$: \begin{equation} \delta V[a] \sim m_s \rho_2 \frac{\Lambda_L^\ell \Lambda_1^m}{\ensuremath{M_\text{P}}^{\ell+m-1}} \abs{ \ev{J_L^{(4)}} \ev{\ensuremath{\tilde{X}}_{(4)}} } \cos\left(\frac{a}{f_a} + \theta_0 \right), \end{equation} \begin{equation} \rho_2 ~\frac{m_s \ensuremath{M_\text{P}} \ev{J_L} \ev{\ensuremath{\tilde{X}}_{(4)}} }{\left(10^{12} \, \ensuremath{\text{\small GeV}}\right)^4} \left(\frac{\Lambda_L}{\ensuremath{M_\text{P}}} \right)^\ell \left(\frac{\Lambda_1}{\ensuremath{M_\text{P}}} \right)^m < 10^{-62} . \label{eq:q2} \end{equation} As long as $\beta$ is neither very large nor very small, Eqs.~(\ref{eq:q1}), (\ref{eq:q4}), (\ref{eq:q3}) and~(\ref{eq:q2}) provide the most restrictive constraints on $m$, $\ell$ and $\ensuremath{r}$. A wide range of values is allowed for each of the parameters, as we discuss in more detail below. \subsection{Benchmark Models:} \begin{table}[t] \centering \begin{tabular}{| c | c | } \hline {\bf B1} & (\ensuremath{\text{\small GeV}}) \\ \hline $f_a$ & $10^{17}$ \\ $\Lambda_1$ & $10^{17}$ \\ $\Lambda_{i>1}$& $10^{15}$ \\ $\ensuremath{ \tilde{\Lambda}}_{i}$ & $10^{15}$ \\ $m_s$ & $10^{6}$ \\ \hline \end{tabular} \begin{tabular}{| c | c | } \hline {\bf B2} & (\ensuremath{\text{\small GeV}}) \\ \hline $f_a$ & $10^{12}$ \\ $\Lambda_1$ & $10^{12}$ \\ $\Lambda_{i>1}$& $10^{9}$ \\ $\ensuremath{ \tilde{\Lambda}}_{i}$ & $10^{9}$ \\ $m_s$ & $10^{4}$ \\ \hline \end{tabular} \begin{tabular}{| c | c | } \hline {\bf B3} & (\ensuremath{\text{\small GeV}}) \\ \hline $f_a$ & $10^{9}$ \\ $\Lambda_1$ & $10^{9}$ \\ $\Lambda_{i>1}$& $10^{4}$ \\ $\ensuremath{ \tilde{\Lambda}}_{i}$ & $10^{4}$ \\ $m_s$ & $10^{4}$ \\ \hline \end{tabular} \caption{Three benchmark points in the parameter space of $\Lambda_i$ and $\ensuremath{ \tilde{\Lambda}}_i$. With the exception of $\ev{\ensuremath{\tilde{X}}}$ and $\ev{\ensuremath{\tilde{Y}}}$, the expectation values of the $SU(3)_c$ singlet fields are taken to be $\mathcal O(m_s)$.} \label{table:bench} \end{table} In this section we consider the quality of the axion potential in three particular models, with $f_a=10^{17} \, \ensuremath{\text{\small GeV}}$, $f_a=10^{12} \, \ensuremath{\text{\small GeV}}$ and $f_a=10^{9} \, \ensuremath{\text{\small GeV}}$. For simplicity, we take $\Lambda_1 \sim M_B \sim f_a$ and $\Lambda_{i\neq 1} \sim \ensuremath{ \tilde{\Lambda}}_i$ for each model, and we allow all QCD singlet scalar fields to acquire $\mathcal O(m_s)$ expectation values. Choices for each of these scales are shown in Table~\ref{table:bench}. Model {\bf B1} is particularly susceptible to gravitational disruptions, as the scales $\Lambda_{i}$ and $\ensuremath{ \tilde{\Lambda}}_i$ are taken to be relatively close to the Planck scale $\ensuremath{M_\text{P}}\sim10^{19} \, \ensuremath{\text{\small GeV}}$. In this model even exponential suppression of the constants $\rho_i \sim \exp (-\ensuremath{M_\text{P}}/f_a) \sim 10^{-44}$ cannot account for the high quality of the axion potential, and large values of $N$, $\ell$ and $\ensuremath{r}$ are required. Models {\bf B2} and {\bf B3} have values of $f_a \lesssim 10^{12}\, \ensuremath{\text{\small GeV}}$ consistent with the axion dark matter hypothesis; with its smaller values of $\Lambda_i$ and $\ensuremath{ \tilde{\Lambda}}_i$, model {\bf B3} is more adept at suppressing gravitational corrections. \begin{figure} \centering \includegraphics[scale=1.0]{qualityfactorsX.pdf} \caption{Minimum values for $m$, $\ell$ and $\ensuremath{r}$ consistent with $\abs{\bar\theta} < 10^{-10}$ are shown as a function of $\rho_{1\ldots 4}$. For the first benchmark model with $f_a = 10^{17}\, \ensuremath{\text{\small GeV}}$, we show only values of $\rho \gtrsim \exp(-\ensuremath{M_\text{P}}/f_a) \approx 10^{-43.4}$. The $f_a = 10^{12}\, \ensuremath{\text{\small GeV}}$ and $f_a = 10^{9}\, \ensuremath{\text{\small GeV}}$ models are depicted using dotted and solid lines, respectively.} \label{fig:qualityplot} \end{figure} In Figure~\ref{fig:qualityplot} we show minimum values for $m\equiv\frac{N-1}{2}$, $\ell$, and $\ensuremath{r}$ consistent with $\abs{\bar\theta}<10^{-10}$ for the $SU(N)^\ell \times SU(4) \times SU(N)^\ensuremath{r}$ composite axion, as a function of the parameters $\rho_i$. A wide range is shown for $\rho$, to accommodate both exponentially suppressed and $\mathcal O(1)$ values. In the $\rho_i = \mathcal O(1)$ limit, the minimal gauge groups for the three benchmark models are: \begin{align} \begin{array}{r l} \text{\bf B1:} ~&~ SU(23)^{11} \times SU(4) \times SU(23)^{9} \\ \text{\bf B2:} ~&~ SU(9)^3 \times SU(4) \times SU(9)^4 \\ \text{\bf B3:} ~&~ SU(7)^2 \times SU(4) \times SU(7)^3 . \end{array} \label{eq:b123rho1} \end{align} Naturally, if after \ensuremath{\textsc{susy}}\ breaking the scalar fields $\ensuremath{\tilde{J}}_{L,R}$, $\ensuremath{\tilde{\x}}$, $\ensuremath{\tilde{\y}}$, and $\ensuremath{\tilde{K}}_R$ do not acquire expectation values, then the \ensuremath{U(1)_\text{PQ}}\ violation induced by $W_g$ affects the axion potential only at loop level, and smaller values for $N$, $\ell$ and $\ensuremath{r}$ are permitted. In the limit where $\rho$ is exponentially suppressed, $\abs{\bar\theta}<10^{-10}$ no longer constrains $m$, $\ell$ or $\ensuremath{r}$. Although Eqs.~(\ref{eq:q1}), (\ref{eq:q4}), (\ref{eq:q3}) and~(\ref{eq:q2}) are valid only for $m \geq2$, $\ensuremath{r} \geq 1$ and $\ell \geq 0$, smaller values for $m$ and $\ensuremath{r}$ are shown in Figure~\ref{fig:qualityplot} to indicate where $\rho$ is small enough that compositeness is no longer necessary. \section{Dynamically Generated \ensuremath{W_\text{tree}}} \label{sec:dynsp} As described in Section~\ref{sec:main}, the $SU(N)^\ell \times SU(4) \times SU(N)^\ensuremath{r}$ composite accidental axion has a high-quality scalar potential and most of the important scales are derived from the confining dynamics, with the exception of $M_B$ in the tree-level superpotential. This is a relatively minor shortcoming: $f_a$ is determined by the relationship between $M_B$, $\Lambda_1$, and $\beta^2 = \ev{\ensuremath{\tilde{X}}}/\ev{\ensuremath{\tilde{Y}}}$, \begin{equation} f_a^2 = 2 \abs{\frac{\Lambda_1^{N-1} }{M_B^{N-3}} \left(\beta^2 + \frac{1}{\beta^2}\right) }, \label{eq:fambbeta} \end{equation} and the scale $M_B \ll \ensuremath{M_\text{P}}$ is added ``by hand" in the tree-level superpotential. In this section we show how the $M_B$ term in \ensuremath{W_\text{tree}}\ can be dynamically generated by the s-confinement of an $Sp(2N-4)$ gauge group, so that all of the important mass scales are determined by strong dynamics. A gauge theory with $2N$ quarks $\ensuremath{\psi}$ charged under $Sp(2N-4)$ in the fundamental representation s-confines~\cite{Intriligator:1995ne} to form mesons $M_{i j}= \epsilon_{ab} \ensuremath{\psi}^a_i \ensuremath{\psi}^b_j$, with the superpotential \begin{equation} W_d = \frac{\ensuremath{\text{Pf}\,} M}{\Lambda_0^{2N-1}}. \end{equation} We break the $SU(2N)$ flavor symmetry by gauging its $SU(N)_1 \times SU(N)_2 = G_1 \times G_2$ subgroup: \begin{align} {\ensuremath{\tiny\yng(1)}} \longrightarrow (\ensuremath{\tiny\yng(1)}, \ensuremath{{\bf 1}}) \oplus(\ensuremath{{\bf 1}}, \ensuremath{\tiny\yng(1)}) && \ensuremath{\psi}^a_i \longrightarrow (\ensuremath{\psi}_1)_\alpha^a \oplus (\ensuremath{\psi}_2)^a_\beta, \end{align} where $\alpha$ and $\beta$ correspond respectively to the $SU(N)_1$ and $SU(N)_2$ gauge indices. The meson $M \sim \ensuremath{\tiny\Yvcentermath1 \yng(1,1)}$ decomposes into irreducible representations of $G_1 \times G_2$: \begin{align} \ensuremath{\tilde{M}}_1^{\alpha_1 \alpha_2} = \frac{(\ensuremath{\psi}_1)_a^{\alpha_1} (\ensuremath{\psi}_1)_b^{\alpha_2} \epsilon_{ab}}{\Lambda_0} &,& \ensuremath{\overline{Q}}_1^{\alpha\beta} = \frac{(\ensuremath{\psi}_1)_a^{\alpha} (\ensuremath{\psi}_2)_b^{\beta} \epsilon_{ab}}{\Lambda_0} &,& \ensuremath{\tilde{M}}_2^{\beta_1 \beta_2} = \frac{(\ensuremath{\psi}_2)_a^{\beta_1} (\ensuremath{\psi}_2)_b^{\beta_2} \epsilon_{ab}}{\Lambda_0} , \end{align} where $\Lambda_0$ is the confinement scale of $Sp(2N-4)$. In terms of these operators the dynamically generated superpotential is \begin{equation} W_d = \frac{\ensuremath{\text{Pf}\,}(\ensuremath{\psi}^2)}{\Lambda_0^{2N-3} } = \frac{(\Lambda_0)^{N}}{\Lambda_0^{2N-3}} \left[ \ensuremath{\tilde{M}}_1^m \ensuremath{\overline{Q}}_1 \ensuremath{\tilde{M}}_2^m + \ensuremath{\tilde{M}}_1^{m-1} \ensuremath{\overline{Q}}_1^{3} \ensuremath{\tilde{M}}_2^{m-1} + \ldots + \ensuremath{\tilde{M}}_1 \ensuremath{\overline{Q}}_1^{2m-1} \ensuremath{\tilde{M}}_2 + \ensuremath{\overline{Q}}_1^{2m+1} \right], \label{eq:wdsp} \end{equation} in the case where $N=2m+1$ is odd. Combinatoric factors for each term in the expansion of $\ensuremath{\text{Pf}\,} M$ such as $\ensuremath{\overline{Q}}_1^N \equiv \det \P_1$ have been suppressed. To match this theory with the $A+4Q +N\ensuremath{\overline{Q}}$ model, the $M_1$ and $M_2$ degrees of freedom must be removed. This is achieved by adding the following matter fields charged under $SU(N)_1 \times SU(N)_2$: \begin{equation} 2 A' + 4 Q + \chi + N \ensuremath{\overline{Q}}_2 = 2 {(\ensuremath{\tiny\Yvcentermath1 \yng(1,1)}, \ensuremath{{\bf 1}})} \oplus 4 {(\ensuremath{\tiny\yng(1)}, \ensuremath{{\bf 1}})} \oplus {(\ensuremath{{\bf 1}}, \ensuremath{ \tiny\Yvcentermath1\overline{\yng(1,1)}})} \oplus N {(\ensuremath{{\bf 1}}, \ensuremath{\tiny \overline{\yng(1)}})} . \end{equation} In the $SU(N)^\ell \times SU(4) \times SU(N)^\ensuremath{r}$ composite model, the $SU(4)$ and $SU(N)$ family symmetries of the $Q$ and $\ensuremath{\overline{Q}}_2$ are gauged. The full matter content of the theory is shown in Figure~\ref{fig:spmoose}. \begin{figure}[t] \centering \includegraphics[scale=1.0]{spmoose.pdf} \caption{The matter content of the $SU(N)^\ell\times SU(4)\times Sp(2n) \times SU(N)^\ensuremath{r}$ composite axion model is depicted in the moose diagram above, with $Sp_{2n} \equiv Sp(2N-4)$. The $SU(2)$ family symmetry of the $A'$ fields is broken explicitly by the tree-level superpotential \eqref{eq:wtreesp}. } \label{fig:spmoose} \end{figure} Gauge-invariant operators of the form $(A' \ensuremath{\psi}_1^2)$ and $(\chi \ensuremath{\psi}_2^2)$ can be added as marginal operators in a tree-level superpotential: \begin{equation} \ensuremath{W_\text{tree}} = \lambda_i (A'_i)^{\alpha_1\alpha_2} (\ensuremath{\psi}_1)_{\alpha_1}^{a_1} (\ensuremath{\psi}_1)_{\alpha_2}^{a_2} \epsilon_{a_1 a_2} + \lambda_0 \chi^{\beta_1 \beta_2} (\ensuremath{\psi}_2)_{\beta_1}^{a_1} (\ensuremath{\psi}_2)_{\beta_2}^{a_2} \epsilon_{a_1 a_2}, \label{eq:wtreesp} \end{equation} where the indices $i$, $a$, $\alpha$ and $\beta$ correspond to $SU(2)$, $Sp(2N-4)$, $SU(N)_1$ and $SU(N)_2$, respectively, and $\lambda_i$ and $\lambda_0$ are dimensionless coupling constants. After $Sp(2N-4)$ confines, \ensuremath{W_\text{tree}}\ becomes \begin{equation} \ensuremath{W_\text{tree}} = \lambda_i \Lambda_0 (A'_i)^{\alpha_1\alpha_2} \ensuremath{\tilde{M}}_1^{\alpha_1 \alpha_2} + \lambda_0 \Lambda_0 \chi^{\beta_1 \beta_2} \ensuremath{\tilde{M}}_2^{\beta_1 \beta_2} . \end{equation} This is extremely convenient: in the limit where $\Lambda_0 \gg \Lambda_1$, the fields $M_1$, $M_2$, $\chi$, and the linear combination ``$(A'_1+ A'_2)$" all acquire large masses and decouple. One linear combination of $A'_1$ and $A'_2$ remains massless, which we define as $A$: \begin{equation} A \equiv \frac{\lambda_2 A_1 - \lambda_1 A_2}{\mathcal N}, \end{equation} with some normalization factor $\mathcal N$. The dynamically generated superpotential simplifies greatly when we consider the fact that $\ensuremath{\tilde{M}}_1$ and $\ensuremath{\tilde{M}}_2$ have $\mathcal O(\Lambda_0)$ masses from \ensuremath{W_\text{tree}}: \begin{align} \frac{\partial W}{\partial A'_i} = \lambda_i \Lambda_0 \ensuremath{\tilde{M}}_1 &,& \frac{\partial W}{\partial \chi} = \lambda_0 \Lambda_0 \ensuremath{\tilde{M}}_2. \end{align} After integrating out the heavy fields, the superpotential becomes \begin{equation} W = \frac{\ensuremath{\overline{Q}}_1^N}{\Lambda_0^{N-3}}. \end{equation} Not only is this the desired tree-level superpotential for the composite axion model, but all of the extra matter fields $A'$, $\chi$, $\ensuremath{\tilde{M}}_1$ and $\ensuremath{\tilde{M}}_2$ have decoupled, leaving only $A$ and $\ensuremath{\overline{Q}}_1$ as infrared degrees of freedom. In \eqref{eq:fambbeta} $M_B$ is replaced by $\Lambda_0$, so that \begin{equation} f_a^2 = 2 \abs{\frac{\Lambda_1^{N-1} }{\Lambda_0^{N-3}} \left(\beta^2 + \frac{1}{\beta^2}\right) }. \label{eq:fasp} \end{equation} Every important scale other than \ensuremath{M_\text{P}}\ is now determined solely by confining dynamics. \begin{table}[t] \centering \begin{tabular}{| c | c | c c c c | c | c |} \hline &$Sp(2N-4)$&$SU(N)_1$&$SU(N)_2$&$SU(N)_3$&$SU(4)$ &$SU(2)$ & \ensuremath{U(1)_\text{PQ}} \\ \hline $\ensuremath{\psi}_1$ &\ensuremath{\tiny\yng(1)} & \ensuremath{\tiny \overline{\yng(1)}} & & & & & $-2/N$ \\ $\ensuremath{\psi}_2$& \ensuremath{\tiny\yng(1)} & & \ensuremath{\tiny\yng(1)} & & & & $+2/N$ \\ \hline $A'$& & \ensuremath{\tiny\Yvcentermath1 \yng(1,1)} \Tstrut & & & & \bf 2 & $4/N$ \\ $\chi$ & & & \ensuremath{ \tiny\Yvcentermath1\overline{\yng(1,1)}} \Bstrut & & & \bf 1 & $-4/N$ \\ \hline $Q$& & \ensuremath{\tiny\yng(1)} & & & \ensuremath{\tiny\yng(1)} & &$\frac{2-N}{N}$ \Tstrut \\ $\ensuremath{\overline{Q}}_2$& & & \ensuremath{\tiny \overline{\yng(1)}} & \ensuremath{\tiny\yng(1)} & & & 0 \\ \hline \end{tabular} \caption{A subset of the matter fields in the $Sp(2N-4)$ model are shown with their Peccei-Quinn charges. All of the non-Abelian groups except for $SU(2)$ are gauged. } \label{table:spcomplete} \end{table} The nonzero $Sp(2N-4)^2$-$U(1)_B$ anomaly breaks $U(1)_B$ explicitly, as can be seen from the $W_d$ of \eqref{eq:wdsp}. Although in principle the new fields $\chi$ and $A'$ provide two additional anomaly-free $U(1)$ symmetries, these are broken by the tree-level superpotential \eqref{eq:wtreesp}, and only the $SU(N)_L \times SU(N)_R \times U(1)_A \times U(1)_C \times U(1)_R$ global symmetry remains. Introducing \begin{equation} \delta \ensuremath{W_\text{tree}} = \frac{ (\ensuremath{\overline{A}} \ensuremath{\overline{q}}_1^2 \ensuremath{\overline{q}}_2^2 \ldots \ensuremath{\overline{q}}_\ell^2)}{M_A^{2\ell-2}} + \frac{(\ensuremath{\overline{q}}_1^N)}{M_C^{N-3}} + \frac{(A^{m} Q)(A^{m-1} Q^3)}{M_R^{N-1} } + \frac{(\ensuremath{\overline{A}}^{m} \ensuremath{q})(\ensuremath{\overline{A}}^{m-1} \ensuremath{q}^3)}{M_r^{N-1} } \end{equation} with $M_A \sim M_C \sim M_R \sim M_r \sim \ensuremath{M_\text{P}}$ is sufficient to give masses to the additional pNGB s. In Table~\ref{table:spcomplete}, the Peccei-Quinn charges of each field is shown. \paragraph{Axion Quality:} Of the new superpotential terms which break \ensuremath{U(1)_\text{PQ}}, the leading terms are \begin{equation} W_g \sim \frac{\chi^m \ensuremath{\overline{Q}}_2 \ensuremath{\overline{Q}}_3 \ldots \ensuremath{\overline{Q}}_\ensuremath{r}}{\ensuremath{M_\text{P}}^{m+\ensuremath{r}-4}} + \sum_{p} \frac{(A_1^{m-p} A_2^p Q)(\ensuremath{q} \ensuremath{\overline{q}}_1 \ensuremath{\overline{q}}_2 \ldots \ensuremath{\overline{q}}_\ell)}{\ensuremath{M_\text{P}}^{m+\ell-1}} \end{equation} As $\chi$ has a mass of $\mathcal O(\Lambda_0)$ and no expectation value, the $\chi^m$ interaction has no tree-level effect on the axion potential. The only effects are loop-induced and receive additional suppression. One linear combination in the $(A_1^{m-p} A_2^p Q)$ sum corresponds to the infrared operator $(A^m Q)$, which has the expectation value $\ev{X_1}$. This term is already included in the $W_g$ of \eqref{eq:wg}. Every other term in the sum includes a power of the massive combination $(\lambda_1 A_1 + \lambda_2 A_2)$, which has no expectation value, and is therefore less disruptive to the axion potential than the effects already considered in \eqref{eq:wg}. Aside from the replacement of $M_B$ by $\Lambda_0$, the quality factors calculated in Section~\ref{sec:grav} are largely unchanged. Operators involving $\ensuremath{\overline{Q}}_1$ are the exception: now that $\ensuremath{\overline{Q}}_1 = \ensuremath{\psi}_1 \ensuremath{\psi}_2 /\Lambda_0$, a suppression of $\Lambda_0/\ensuremath{M_\text{P}}$ is added to the operators involving $J_R$ and $K_R$, marginally improving Eqs.~(\ref{eq:q1}) and~(\ref{eq:q4}): \begin{align} \rho_1\, \frac{m_s \ensuremath{M_\text{P}} \abs{\ev{\ensuremath{\tilde{J}}_L} \ev{\ensuremath{\tilde{J}}_R}} }{\left(10^{12} \, \ensuremath{\text{\small GeV}}\right)^4} \left(\frac{\Lambda_0}{\ensuremath{M_\text{P}}}\right) \left(\frac{\Lambda_L^\ell \Lambda_R^\ensuremath{r}}{\ensuremath{M_\text{P}}^{\ell+\ensuremath{r}}} \right) ~<~& 10^{-62} \label{eq:q1b} \\ \rho_4 \, \frac{m_s \ensuremath{M_\text{P}}^2 \abs{\ev{\ensuremath{\tilde{K}}_R}} }{\left(10^{12} \, \ensuremath{\text{\small GeV}}\right)^4} \left(\frac{\Lambda_0}{\ensuremath{M_\text{P}}}\right)^2 \left(\frac{\Lambda_R}{\ensuremath{M_\text{P}}} \right)^{2\ensuremath{r}} ~<~& 10^{-62}. \label{eq:q4b} \end{align} For many values of $\rho_i$ this decreases the minimum value for $\ensuremath{r}$ by one, as can be seen from the three benchmark models at $\rho_i = \mathcal O(1)$: \begin{align} \begin{array}{r l} \text{\bf B1:} ~&~ SU(23)^{11} \times SU(4)\times Sp(42) \times SU(23)^{9} \\ \text{\bf B2:} ~&~ SU(9)^3 \times SU(4)\times Sp(14) \times SU(9)^3 \\ \text{\bf B3:} ~&~ SU(7)^2 \times SU(4) \times Sp(10) \times SU(7)^2 . \end{array} \end{align} \paragraph{Alternate Confinement Order:} Thus far, we have required that $\Lambda_0 > \Lambda_1$, simply because the dual of $SU(N): 2 A + 4 Q + (2N-4) \ensuremath{\overline{Q}}$ with the tree-level superpotential $\ensuremath{W_\text{tree}} \sim A \ensuremath{\overline{Q}}^2$ does not appear in the literature. In principle the infrared behavior of the $2A+4 Q + (2N-4) \ensuremath{\overline{Q}}$ theory with $\ensuremath{W_\text{tree}}\neq 0$ can be determined using ``deconfinement" techniques~\cite{Berkooz:1995km} and a sequence of dualities: a similar calculation~\cite{Craig:2011wj} has been completed for $A+F Q + (N+F-4)\ensuremath{\overline{Q}}$ with a superpotential of the form $W\sim A \ensuremath{\overline{Q}}^2$. Without calculating the degrees of freedom and the superpotential in the infrared dual of $SU(N): 2A + 4Q + (2N-4)\ensuremath{\overline{Q}}$, it is not known how the scale $f_a$ is set in the dual theory. If in the $\Lambda_0 \ll \Lambda_1$ limit $\ensuremath{U(1)_\text{PQ}}$ is still broken at the scale $f_a^2 \sim \Lambda_1^{N-1} / \Lambda_0^{N-3}$, then $f_a \sim 10^{12}\, \ensuremath{\text{\small GeV}}$ can be achieved with much smaller values of $\Lambda_0$ and $\Lambda_1$, significantly improving the axion quality. We leave detailed exploration of this limit to future work. \section{Conclusions} \label{sec:conclusions} In the composite axion model based on the gauge group $SU(N)^\ell \times SU(4) \times SU(N)^\ensuremath{r}$, a \ensuremath{U(1)_\text{PQ}}\ is spontaneously broken by the vacuum expectation values of the $SU(4)$-charged hadrons $X_1 = (A^m Q)$ and $Y_1 = (A^{m-1} Q^3)$, simultaneously producing the QCD axion and breaking $SU(4)$ to $SU(3)_c$. All important scales in the axion model are generated dynamically from confinement, and are naturally small compared to the Planck scale. By calculating the disruption to the axion potential $V[a]$ induced by Planck-scale effects, we have demonstrated that the composite model is successful at preserving the quality of the axion potential even when large expectation values are permitted for all of the \ensuremath{U(1)_\text{PQ}}-charged QCD-singlet scalar fields. In realistic models incorporating \ensuremath{\textsc{susy}}\ breaking with positive quadratic terms for these scalars such that no large expectation values result, the quality of the axion potential will improve significantly for any given $N$, $\ell$ and $\ensuremath{r}$, as the terms in $W_g$ disrupt the axion potential to a lesser degree. It would be worthwhile to further investigate such constructions. It is likely that the success of the $SU(N)^\ell \times SU(4) \times SU(N)^\ensuremath{r}$ composite axion can be replicated by embedding $SU(3)_c$ within the $SU(N)_R$ flavor symmetry of the $A+4Q + N \ensuremath{\overline{Q}}$ model. In this case \ensuremath{U(1)_\text{PQ}}\ will be more closely associated with the $U(1)_B$ flavor symmetry of Table~\ref{table:UVtheory} rather than $U(1)_A$, and the axion will be generated from a linear combination of $(\ensuremath{\overline{Q}}_i^N)$ baryons. Compositeness can cure the axion quality problem, and as our models demonstrate, may provide clues to the existence of interesting dynamics in the ultraviolet. \section*{Acknowledgments} This research was supported in part by the NSF grant PHY-1316792. The authors are grateful for helpful conversations with A.~Rajaraman, M.~Ratz, Y.~Shirman, and P.~Tanedo.
\section{Introduction} Accurate localization is an important requirement for a variety of applications and in GPS-challenged environments (e.g. indoors), it is typically realized by deploying a network of transceivers, known as \emph{anchors}, over the region of interest (Fig. \ref{fig:small_L}). Depending on the localization technique used (e.g., time-of-arrival (ToA), angle-of-arrival (AoA) etc.), a target should have line-of-sight (LoS) to at least a minimum number of anchors for unambiguous localization (e.g., for ToA-based localization over a 2D-plane, this number equals three). However, in many applications, the LoS link between a target and an anchor may be blocked by obstacles present in the environment. If a target does not have LoS to the required number of anchors, then a unique estimate of its position cannot be obtained and hence, is said to be in a \emph{blind-spot}. \begin{figure} \centering \includegraphics[scale=0.5]{Aditya_WCL2017-0392_fig1.eps} \caption{The unshadowed area (white region) surrounding a target is difficult to characterize due to the overlaps in the shadow regions caused by different obstacles.} \label{fig:small_L} \end{figure} If all the obstacle locations are known, then a deterministic, blind-spot eliminating placement of the anchors can be obtained by solving the art-gallery problem \cite{Gonzalez-Banos:2001:RAA:378583.378674}. On the other hand, if the obstacle locations are unknown, then the LoS blocking between a target and multiple anchors is a statistically dependent random phenomenon, where the extent of correlation is a function of the obstacle locations and sizes (e.g., in Fig. \ref{fig:small_L}, the blocking of anchors A1 and A2 to the target by a common obstacle induces correlation). A common assumption in the literature is to consider the blocking across different links to be mutually independent \cite{Schlo_Dhill_Buehr_2015, Bai_Vaze_Heath_2013}, which is reasonable for small obstacle sizes. However, for larger obstacles, this assumption can lead to the underestimation of a target's blind-spot probability. For instance, if two closely-spaced anchors are each blocked to a given target with probability $p$, then their joint blocking probability to the same target is also approximately $p$, which exceeds $p^2$, the result obtained by neglecting the blocking correlation and assuming independent blocking instead. Thus, it is important to consider the impact of obstacle-induced blocking correlation while analyzing a target's blind-spot probability. In this paper, we characterize the worst-case impact of correlated blocking and introduce the notion of the \emph{asymptotic blind-spot probability} of the \emph{typical} target. In particular, we consider a stochastic geometry based approach by modeling the obstacles as a \emph{line process}, before deriving a closed-form expression for the asymptotic blind-spot probability of the typical target. Our approach is summarized below: \begin{itemize} \item We assume the obstacles to be opaque to radio waves and model them using a Poisson line process (PLP) in ${\mathbb{R}}^2$, where the projection of the origin, ${\mathbf{o}}$, onto the lines forms a homogeneous Poisson point process (PPP). This, in turn, induces a random polygon tessellation of ${\mathbb{R}}^2$. \item We then show that the area distribution of the polygon enclosing the typical target coincides with that of a typical Poisson-Voronoi cell. \item For anchors deployed according to a homogeneous PPP, we derive a closed-form expression for the asymptotic blind-spot probability of the typical target, using a well-known approximation for the area distribution of a typical Poisson-Voronoi cell. \end{itemize} To the best of our knowledge, this is the first work that studies the impact of worst-case correlated blocking. The resulting expression that we obtain for a typical target's asymptotic blind-spot probability is an upper bound for the more realistic scenario when the obstacles have finite dimensions. Thus, our analysis provides useful design insights, such as the intensity with which anchors need to be deployed so that the blind-spot probability of a typical target does not exceed a desired threshold, $\epsilon$. \section{System Model} \label{sec:sysmodel} For our analysis, we focus on ToA-based localization over ${\mathbb{R}}^2$. The extension to ${\mathbb{R}}^3$ as well as other localization methods follows in a similar manner. Consider a network of anchors, each having a communication range, $R$, deployed over ${\mathbb{R}}^2$ according to a homogeneous PPP, ${\mathbf{X}}_{\rm a}$, of intensity $\lambda$. \begin{figure} \centering \includegraphics[scale=0.53]{Aditya_WCL2017-0392_fig2.eps} \caption{If the projection, ${\mathbf{p}}$, of ${\mathbf{o}}$ onto a line $l_{{\mathbf{p}}}$ lies inside the above disk, then $l_{{\mathbf{p}}}$ intersects the diameter from ${\mathbf{o}}$ to the point $(R,\phi')$.} \label{fig:3ints} \end{figure} We assume the obstacles to be opaque to radio signals and thus, it is convenient to imagine them as line-segments, since the obstacle thickness does not influence the LoS blocking between two points. For this obstacle shape, it is intuitive that the blocking correlation increases with line-segment length. Thus, to characterize the worst-case impact of correlated blocking on a target's blind-spot probability, we use lines to model the obstacle shapes in this work. As discussed in Section \ref{sec:asymp}, this enables us to obtain a useful performance bound for the more realistic, but less tractable, scenario of finite-sized obstacles. In Cartesian coordinates, a line in ${\mathbb{R}}^2$ can be expressed as follows: \begin{align} \label{eq:line} x\cos \phi + y \sin \phi = r \end{align} where ${\mathbf{p}}=(r,\phi)$ denotes the projection of ${\mathbf{o}}$ onto the line (e.g., Fig. \ref{fig:3ints}) in polar coordinates (i.e., $r\in[0,\infty), \phi \in [0,2\pi)$). It is easily seen that ${\mathbf{p}}$ uniquely determines a line in ${\mathbb{R}}^2$. To capture the randomness in the obstacle locations, we model the obstacles using a line process, denoted by ${\mathbf{X}}_{l_{{\mathbf{p}}}}$. From (\ref{eq:line}), it can be seen that this gives rise to a point process, ${\mathbf{X}}_{{\mathbf{p}}}$, formed by the set of points, $\{{\mathbf{p}}\}$, which are the projections of ${\mathbf{o}}$ onto the lines in ${\mathbf{X}}_{l_{{\mathbf{p}}}}$. For the sake of tractability, we assume that ${\mathbf{X}}_{{\mathbf{p}}}$ forms a homogeneous PPP of intensity $\lambda_0$ over ${\mathbb{R}}^2$, which results in ${\mathbf{X}}_{l_{{\mathbf{p}}}}$ forming a PLP, where each pair of lines has a unique point of intersection, with probability one. Consequently, ${\mathbf{X}}_{l_{{\mathbf{p}}}}$ splits ${\mathbb{R}}^2$ into a collection of non-overlapping convex polygons, denoted by ${\mathcal{C}}({\mathbf{X}}_{l_{{\mathbf{p}}}})$, that form a tessellation of ${\mathbb{R}}^2$. Let $C_{\mathbf{o}}(\lambda_0) \in {\mathcal{C}}({\mathbf{X}}_{l_{{\mathbf{p}}}})$ denote the polygon containing ${\mathbf{o}}$ and let $D_{{\mathbf{o}}}(R)=\{(r,\phi): r\in [0,R], \phi \in [0,2\pi)\}$ denote the disk of radius $R$, centered at ${\mathbf{o}}$. Due to the stationarity of the anchor PPP, it can be assumed without loss of generality that a target is situated at ${\mathbf{o}}$, which we refer to as the \emph{typical target}. Based on our model, the anchors having LoS to the typical target are constrained to lie in $C_{\mathbf{o}}(\lambda_0) \cap D_{{\mathbf{o}}}(R)$ (Fig. \ref{fig:large_L}). Hence, the typical target is in a blind-spot if and only if there are fewer than three anchors present in $C_{\mathbf{o}}(\lambda_0) \cap D_{{\mathbf{o}}}(R)$. The special case when $C_{\mathbf{o}}(\lambda_0) \subseteq D_{{\mathbf{o}}}(R)$ is of particular interest as the blind-spot probability of the typical target depends only on the area distribution of $C_{\mathbf{o}}(\lambda_0)$ (as shall be seen in Section \ref{sec:asymp}), for which accurate closed-form approximations exist. It is intuitive that as $\lambda_0$ increases, $C_{\mathbf{o}}(\lambda_0) \subseteq D_{{\mathbf{o}}}(R)$ with high probability (Fig. \ref{fig:large_L}). To formalize this notion, let \begin{align} v(r,\phi)&= \begin{cases} & 1, ~ \mbox{ if the point $(r,\phi)$ has LoS to ${\mathbf{o}}$} \\ & 0, ~ \mbox{ else}. \end{cases} \end{align} If $C_{\mathbf{o}}(\lambda_0) \nsubseteq D_{{\mathbf{o}}}(R)$, then there exists at least one direction $\phi'\in[0,2\pi)$ such that $v(R,\phi')=1$. For this condition to be satisfied, no point from ${\mathbf{X}}_{{\mathbf{p}}}$ should lie in a disk of diameter $R$, centered at $(R/2,\phi')$ (see Fig. \ref{fig:3ints}). Therefore, ${\mathbb{P}}(v(R,\phi')=1)=\exp(-\lambda_0 \pi R^2/4)$, for any $\phi' \in [0,2\pi)$. Hence, for an arbitrarily small $\delta \in (0,1)$ such that $\exp(-\lambda_0 \pi R^2/4) < \delta$, $C_{\mathbf{o}}(\lambda_0) \subseteq D_{{\mathbf{o}}}(R)$ with probability greater than $1-\delta$. Therefore, we develop our analysis under the assumption that $C_{\mathbf{o}}(\lambda_0) \subseteq D_{{\mathbf{o}}}(R)$ by considering a sufficiently large value of $\lambda_0$, determined by the parameter $\delta$. \begin{figure} \centering \includegraphics[scale=0.3]{Aditya_WCL2017-0392_fig3.eps} \caption{If the obstacles are lines, then the unshadowed region is a convex region. In particular, it is a convex polygon if no point at a distance $R$ from the target has LoS to it.} \label{fig:large_L} \end{figure} \section{Asymptotic Blind-spot Probability} \label{sec:asymp} Let $A_v$ denote the area of $C_{\mathbf{o}}(\lambda_0)$ and $g(A_v;\lambda,\lambda_0)$ the blind-spot probability of the typical target, conditioned on $A_v$, with parameters $\lambda$ and $\lambda_0$. Then, \begin{align} \label{eq:g_wc} g(A_v;\lambda,\lambda_0)&= \displaystyle\sum\limits_{k=0}^2 {\mathbb{P}}(k \mbox{ anchors present in } C_{\mathbf{o}}(\lambda_0)) \notag \\ &= e^{-\lambda A_v}\left(1+\lambda A_v + \frac{(\lambda A_v)^2}{2}\right). \end{align} \begin{definition} The asymptotic blind-spot probability of the typical target, denoted by $b_{\rm as}(\lambda,\lambda_0)$, is defined as follows: \begin{align} \label{eq:pbs_wc} b_{\rm as}(\lambda,\lambda_0)&\triangleq \displaystyle\int\limits_0^\infty g(A_v;\lambda,\lambda_0) f(A_v) {\rm d}A_v \end{align} where $f(A_v)$ denotes the probability density function (pdf) of $A_v$. \end{definition} Thus, $b_{\rm as}(\lambda,\lambda_0)$ is the unconditional blind-spot probability of the typical target, due to ${\mathbf{X}}_{l_{{\mathbf{p}}}}$ and ${\mathbf{X}}_{\rm a}$, and depends on the area distribution of $C_{\mathbf{o}}(\lambda_0)$. In particular, $f(A_v)$ fully captures the worst-case impact of correlated blocking as the obstacles are \emph{infinitely long}. We now proceed to characterize $f(A_v)$, for which we define the following terms, before stating our main result in Theorem \ref{thm:main}. Although the result presented in Theorem \ref{thm:main} exists in the literature on random polygon tessellations (see \cite{Hilhorst_Calka_2008}), it has, to the best of our knowledge, never been applied to a localization setting previously. Since its proof is quite straightforward, we include it for completeness. \begin{definition}[Voronoi cell] \label{def:vor} For a countable set of points ${\mathcal{A}} \subseteq{\mathbb{R}}^2$, the Voronoi cell of ${\mathbf{x}}\in {\mathcal{A}}$, denoted by ${\mathcal{V}}_{{\mathbf{x}}}({\mathcal{A}})$, is defined as follows: \begin{align} {\mathcal{V}}_{{\mathbf{x}}}({\mathcal{A}})=\{{\mathbf{y}}\in {\mathbb{R}}^2: \|{\mathbf{y}}-{\mathbf{x}}\|_2 \leq \inf_{{\mathbf{u}} \in {\mathcal{A}} \setminus {\mathbf{x}} } \|{\mathbf{y}}-{\mathbf{u}}\|_2\} \end{align} where $\|.\|_2$ denotes the $L_2$-norm. In other words, ${\mathcal{V}}_{{\mathbf{x}}}({\mathcal{A}})$ contains all the points in ${\mathbb{R}}^2$ that are closer to ${\mathbf{x}}$ than any other point in ${\mathcal{A}}$. \end{definition} \begin{definition}[Poisson-Voronoi cell] \label{def:Pois_vor} If ${\mathcal{A}}$ is a realization of a homogeneous PPP of intensity $\mu$, then ${\mathcal{V}}_{\mathbf{x}}({\mathcal{A}})$ is referred to as a Poisson-Voronoi cell with parameter $\mu$, for ${\mathbf{x}} \in {\mathcal{A}}$. In particular, the expected area of ${\mathcal{V}}_{\mathbf{x}}({\mathcal{A}})$ equals $1/\mu$. \end{definition} \begin{theorem}\label{thm:main} The area distribution of $C_{\mathbf{o}}(\lambda_0)$ coincides with that of a typical Poisson-Voronoi cell with parameter $\lambda_0/4$. \end{theorem} \begin{IEEEproof} The point process $2{\mathbf{X}}_{{\mathbf{p}}}$ is a homogeneous PPP of intensity $\lambda_0/4$. By the Slivnyak-Mecke Theorem \cite{Sto_et_al_full_2013}, ${\mathcal{A}}=2{\mathbf{X}}_{{\mathbf{p}}} \cup \{{\mathbf{o}}\}$ has the same distribution as $2{\mathbf{X}}_{{\mathbf{p}}}$. Hence, from Definition \ref{def:Pois_vor}, ${\mathcal{V}}_{{\mathbf{o}}}({\mathcal{A}})$ is a Poisson-Voronoi cell with parameter $\lambda_0/4$. By construction, ${\mathcal{V}}_{{\mathbf{o}}}({\mathcal{A}})$ coincides with $C_{{\mathbf{o}}}(\lambda_0)$, as illustrated in Fig. \ref{fig:proofdiag}. Therefore, $C_{{\mathbf{o}}}(\lambda_0)$ has the same area distribution as ${\mathcal{V}}_{{\mathbf{o}}}({\mathcal{A}})$. \end{IEEEproof} \begin{figure} \centering \includegraphics[scale=0.25]{Aditya_WCL2017-0392_fig4.eps} \caption{The interior of the polygon, $C_{{\mathbf{o}}}(\lambda_0)$, surrounded by the red lines is the Voronoi cell, ${\mathcal{V}}_{\mathbf{o}}({\mathcal{A}})$, where ${\mathcal{A}}$ contains ${\mathbf{o}}$ and the points shown in black circles.} \label{fig:proofdiag} \end{figure} For a typical Poisson-Voronoi cell with parameter $\lambda_0/4$, the pdf of its area is well-approximated by a three-parameter Gamma distribution \cite{Hinde_Miles_1980, Tanemura_2003_statisticaldistributions}, given by: \begin{align} \label{eq:Av_pdf} \hspace{-8mm} f(A_v)&= \begin{cases} & \hspace{-3mm}\frac{ab^{(c/a)}}{\Gamma(c/a)}\left(\frac{\lambda_0}{4}\right)^c A_v^{c-1}e^{-b(\lambda_0 A_v/4)^a}, A_v\geq 0 \\ & 0, ~ \mbox{else} \end{cases} \end{align} where $a=1.07950$, $b=3.03226$, $c=3.31122$ and $\Gamma(z)=\int_0^\infty x^{z-1} e^{-x} {\rm d}x$ for $z>0$. Substituting (\ref{eq:Av_pdf}) in (\ref{eq:pbs_wc}) and evaluating the integral, we obtain $b_{\rm as}(\lambda,\lambda_0)$. On the other hand, if we ignore correlated blocking and assume independent blocking, the unblocked anchors to the typical target form a point process obtained by independently sampling the anchor PPP, where the sampling probability of an anchor at $(r,\phi)\in D_{{\mathbf{o}}}(R)$ equals ${\mathbb{P}}(v(r,\phi)=1)$. As a result, the unblocked anchors form a non-homogenous PPP \cite{Sto_et_al_full_2013} over $D_{{\mathbf{o}}}(R)$ whose intensity at the point $(r,\phi)$, denoted by $\lambda_{\rm ind}(r,\phi)$, is given by \begin{align} \label{eq:indep_intensity} \lambda_{\rm ind}(r,\phi)= \lambda \mathbb{P}(v(r,\phi)=1) = \lambda e^{-\lambda_0 \pi r^2/4}. \end{align} For a non-homogeneous PPP with intensity $\lambda_{\rm ind}(r,\phi)$, the number of points in $D_{{\mathbf{o}}}(R)$ is a Poisson random variable with mean $\lambda {\mathbb{E}}[A_v]$, given by \begin{align} \lambda {\mathbb{E}}[A_v] = \displaystyle\int\limits_0^{2\pi} \displaystyle\int\limits_0^R \lambda_{\rm ind}(r,\phi) r {\rm d}r {\rm d}\phi &= \frac{4\lambda}{\lambda_0}(1-e^{-\frac{\lambda_0 \pi R^2}{4}}). \end{align} Therefore, the blind-spot probability of the typical target due to the independent blocking assumption, denoted by $b_{\rm as}^{\rm ind}(\lambda,\lambda_0)$, has the following expression, similar to (\ref{eq:g_wc}): \begin{align} \label{eq:pbs_indep} b_{\rm as}^{\rm ind}(\lambda,\lambda_0)&= e^{-\lambda {\mathbb{E}}[A_v] }\left(1+ \lambda {\mathbb{E}}[A_v] + \frac{({\mathbb{E}}[A_v])^2}{2}\right). \end{align} To model the realistic case of obstacles having finite dimensions, each line $l_{{\mathbf{p}}}\in {\mathbf{X}}_{l_{{\mathbf{p}}}}$ can be truncated to a line segment of length $L$ with mid-point ${\mathbf{p}}$, as shown in Fig. \ref{fig:small_L}. For this scenario, let $B_v$ denote the area of the unshadowed region in $D_{{\mathbf{o}}}(R)$, surrounding the typical target. Similar to (\ref{eq:g_wc}), the conditional blind-spot probability of the typical target, denoted by $g(B_v;\lambda,\lambda_0,L,R)$ with parameters $\lambda$, $\lambda_0$, $L$ and $R$, has the following expression, similar to (\ref{eq:g_wc}): \begin{align} g(B_v;\lambda,\lambda_0,L,R)&= e^{-\lambda B_v}\left(1+\lambda B_v + \frac{(\lambda B_v)^2}{2}\right). \end{align} The unconditional blind-spot probability of the typical target, denoted by $b(\lambda,\lambda_0,L,R)$, is then given by: \begin{align} \label{eq:pbs_true} b(\lambda,\lambda_0,L,R)&=\displaystyle\int\limits_0^{\pi R^2} g(B_v;\lambda,\lambda_0,L,R) f(B_v) {\rm d}B_v \end{align} where $f(B_v)$ denotes the pdf of $B_v$ and in a manner similar to $f(A_v)$, captures the blocking correlation induced by obstacles of length $L$. However, unlike $f(A_v)$, a closed-form characterization of $f(B_v)$ is difficult to obtain due to the generally non-convex shape of the unshadowed region, which is further complicated by the overlaps in the shadow regions induced by the obstacles (Fig. \ref{fig:small_L}). However, since larger obstacles cause more blocking, the following inequality holds: \begin{align} \label{ineq:len} b(\lambda,\lambda_0,l_1,R) &\leq b(\lambda,\lambda_0,l_2,R) \hspace{2mm} \mbox{for} \hspace{2mm} l_1 \leq l_2. \end{align} Hence, for sufficiently large $\lambda_0$ such that $C_{{\mathbf{o}}}(\lambda_0) \subseteq D_{{\mathbf{o}}}(R)$ with high probability, \begin{align} \label{eq:final} b(\lambda,\lambda_0,L,R) \leq \lim_{l \rightarrow \infty} b(\lambda,\lambda_0,l,R) = b_{\rm as}(\lambda,\lambda_0) \end{align} for any $L>0$. Therefore, $b_{\rm as}(\lambda,\lambda_0)$ can be used as a design tool to determine the anchor intensity required such that the blind-spot probability of a typical target is no more than a desired threshold, $\epsilon$. Finally, for completeness, if we assume independent blocking for the finite obstacle case, then the resulting blind-spot probability of the typical target, denoted by $b^{\rm ind}(\lambda,\lambda_0,L,R)$, has the following expression, similar to (\ref{eq:pbs_indep}): \begin{align} \hspace{-4mm} b^{\rm ind}(\lambda,\lambda_0,L,R) &= e^{-\lambda {\mathbb{E}}[B_v] }\left(1+ \lambda {\mathbb{E}}[B_v] + \frac{(\lambda {\mathbb{E}}[B_v])^2}{2}\right) \notag \\ \label{eq:pbs_indep_asymp} &\leq \lim_{l \rightarrow \infty} b^{\rm ind}(\lambda,\lambda_0,l,R)= b_{\rm as}^{\rm ind}(\lambda,\lambda_0) \end{align} where the inequality in (\ref{eq:pbs_indep_asymp}) holds for any $L>0$. \section{Numerical Results} We consider a circle of radius $R=20{\rm m}$ to be our region of interest. For $\delta=10^{-4}$, the plot of $b_{\rm as}(\lambda,\lambda_0)$ as a function of $\lambda$ is shown in Fig. \ref{fig:sim}, based on $10^{5}$ Monte Carlo simulations for each $\lambda$. The closed-form expression for $b_{\rm as}(\lambda,\lambda_0)$ obtained in (\ref{eq:pbs_wc}) mirrors the empirically observed results, thereby justifying the approximation that $C_{{\mathbf{o}}}(\lambda_0) \subseteq D_{{\mathbf{o}}}(R)$ for the chosen value of $\lambda_0$. On the other hand, $b_{\rm as}^{\rm ind}(\lambda,\lambda_0)$ underestimates $b_{\rm as}(\lambda,\lambda_0)$ since it ignores the blocking correlation. Furthermore, if $C_{{\mathbf{o}}}(\lambda_0) \subseteq D_{{\mathbf{o}}}(R)$, then clearly, $b(\lambda,\lambda_0,L,R)=b_{\rm as}(\lambda,\lambda_0)$ for $L\geq 2R$, since each obstacle forms a secant. However, we observe from Fig. \ref{fig:Lcompare} that the the bound in (\ref{eq:final}) is tight for much smaller obstacle lengths starting from approximately $R/2$. Additionally, we also observe in Fig. \ref{fig:Lcompare} that the independent blocking assumption reasonable for small $L$, but breaks down for larger $L$ as the extent of blocking correlation increases. \begin{figure} \centering \includegraphics[scale=0.43]{Aditya_WCL2017-0392_fig5.eps} \caption{$b_{\rm as}(\lambda,\lambda_0)$ accurately chracterizes the blind-spot probability if there exists a sufficiently high intensity of `large' obstacles.} \label{fig:sim} \end{figure} \begin{figure} \centering \includegraphics[scale=0.43]{Aditya_WCL2017-0392_fig6.eps} \caption{The dashed blue, solid red and solid black curves plot $b(\lambda,\lambda_0,L,R)$, $b_{\rm as}(\lambda,\lambda_0)$ and $b^{\rm ind}(\lambda,\lambda_0,L,R)$, respectively. For $L\geq R/2$, the line assumption for obstacles holds, given a sufficiently high intensity of obstacles.} \label{fig:Lcompare} \end{figure} \section{Conclusion} In this letter, we investigated the worst-case impact of correlated blocking on the blind-spot probability of a typical target in a localization network by assuming a PLP obstacle model, which induces a random polygon tessellation of the plane. We then defined the notion of the asymptotic blind-spot probability of the typical target and derived a closed-form expression for it using results from the theory of Poisson-Voronoi tessellations. For the more realistic scenario when the obstacle dimensions are finite, our analysis yields an upper bound for the true blind-spot probability of a typical target, provided there exists a sufficiently high intensity of obstacles. Therefore, the asymptotic blind-spot probability can be used to design localization networks such that a typical target's blind-spot probability does not exceed a desired threshold, $\epsilon$. \bibliographystyle{IEEEtran}
\section{\textsc{Methodical Counting}\xspace} \label{algorithm} \begin{figure*} \hrule \caption{\textsc{Methodical Counting}\xspace algorithm for the leader. $N$ is the set of neighbors of the leader in the current round. The parameters $d,p,r$ and $\tau$ are as defined in Theorem~\ref{thm}.} \label{leaderAlg} \vspace{.1in} \hrule \begin{algorithmic}[1] \Procedure{Count}{ \State $\rho\gets 0$ \Comment{accumulator of consumed potential} \State $\Phi\gets 0$ \Comment{current potential} \State $k\gets 2$ \Comment{current estimate} \State $status\gets normal$ \Comment{status$=$normal$|$alarm$|$done} \While{$status\neq done$} \Comment{\dk{iterating} epochs} \label{epochs} \For{$phase=1$ to $p$} \Comment{\dk{iterating} phases} \label{phases} \For{$round=1$ to $r$} \Comment{\dk{iterating} rounds} \label{rounds} \State Broadcast $\langle\Phi,status\rangle$ and Receive $\langle\Phi_i,status_i\rangle, \forall i\in N$ \If{$status=normal$ {\bf and} $|N|\leq d-1$ {\bf and} $\forall i\in N:status_i=normal$} \State $\Phi\gets \Phi + \sum_{i\in N}\Phi_i/d - |N|\Phi/d$ \Comment{\dk{update potential}} \label{potupdate} \Else \Comment{$k$ is wrong} \label{leadertoomany} \State $status\gets alarm$\label{alarminsecondleader} \State $\Phi\gets 1$ \EndIf \EndFor \markcomment{3}{{\tt\slash* $r$ rounds completed *\slash}} \If{$phase=1$ {\bf and} $\Phi> \tau$} \Comment{$k$ is wrong} \label{leaderthreshold} \State $status\gets alarm$ \State $\Phi\gets 1$ \EndIf \If{$status=normal$} \Comment{prepare for next phase} \State $\rho \gets \rho + \Phi$ \label{rhoupdate} \State $\Phi \gets 0$ \label{phireset} \EndIf \EndFor \markcomment{2}{{\tt\slash* $p$ phases completed *\slash}} \If{$status=normal$ {\bf and} $k-1-1/k\leq \rho\leq k-1$} \Comment{the size is $k$} \label{range} \State $status\gets done$ \Else \Comment{prepare for next epoch} \label{reset} \State $\rho\gets 0$ \State $\Phi\gets 0$ \State $k\gets k+1$ \State $status\gets normal$ \EndIf \For{$round=1$ to $k$} \Comment{disseminate termination} \label{leadernotification} \State Broadcast $\langle status\rangle$ and Receive $\langle status_i\rangle, \forall i\in N$ \EndFor \markcomment{2}{{\tt\slash* epoch completed *\slash}} \EndWhile \State \textbf{return} $k$ \EndProcedure \end{algorithmic} \hrule \end{figure*} \begin{figure*} \hrule \caption{\textsc{Methodical Counting}\xspace algorithm for each non-leader node $i$. $N$ is the set of neighbors of $i$ in the current round. The parameters $d,p,r$ and $\tau$ are as defined in Theorem~\ref{thm}.} \label{otherAlg} \vspace{.1in} \hrule \begin{algorithmic}[1] \Procedure{Count}{} \State $\Phi\gets 0$ \Comment{current potential} \State $k\gets 2$ \Comment{current estimate} \State $status\gets normal$ \Comment{status$=$normal$|$alarm$|$done} \While{$status\neq done$} \Comment{\dk{iterating} epochs} \label{epochs} \For{$phase=1$ to $p$} \Comment{\dk{iterating} phases} \label{phases} \For{$round=1$ to $r$} \Comment{\dk{iterating} rounds} \label{rounds} \State Broadcast $\langle\Phi,status\rangle$ and Receive $\langle\Phi_i,status_i\rangle, \forall i\in N$ \If{$status=normal$ {\bf and} $|N|\leq d-1$ {\bf and} $\forall i\in N:status_i=normal$} \State $\Phi\gets \Phi + \sum_{i\in N}\Phi_i/d - |N|\Phi/d$ \Comment{update potential} \label{newpot} \Else \Comment{$k$ is wrong} \label{othertoomany} \State $status\gets alarm$\label{alarminsecondother} \State $\Phi\gets 1$ \EndIf \EndFor \markcomment{3}{{\tt\slash* $r$ rounds completed *\slash}} \If{$phase=1$ {\bf and} $\Phi> \tau$} \Comment{$k$ is wrong} \label{otherthreshold} \State $status\gets alarm$ \label{thresholdalarm} \State $\Phi\gets 1$ \EndIf \EndFor \markcomment{2}{{\tt\slash* $p$ phases completed *\slash}} \For{$round=1$ to $k$} \Comment{disseminate termination} \label{othernotification} \State Broadcast $\langle status\rangle$ and Receive $\langle status_i\rangle, \forall i\in N$ \If{$\exists i\in N:status_i=done$} \State $status\gets done$ \EndIf \EndFor \If{$status\neq done$} \State $k\gets k+1$ \State $status\gets normal$ \EndIf \markcomment{2}{{\tt\slash* epoch completed *\slash}} \EndWhile \State \textbf{return} $k$ \EndProcedure \end{algorithmic} \hrule \end{figure*} In this section we present \textsc{Methodical Counting}\xspace. First, we give the intuition of the algorithm, the details can be found in Figures~\ref{leaderAlg} and~\ref{otherAlg}. (References to algorithm lines are given as $\langle figure\#\rangle.\langle line\#\rangle$.) Initially, the leader is assigned a potential of $0$ and all the other nodes are assigned a potential of~$1$. Then, the algorithm is composed by epochs, each of which is divided into phases composed by rounds of communication. Epoch $k$ corresponds to a size estimate $k$ that is iteratively increased from epoch to epoch until the correct value $n$ is found. Each epoch is divided into $p$ phases. The purpose of each phase is for the leader to collect as much potential as possible from the other nodes in a mass-distribution fashion as follows. Each phase is composed by $r$ rounds of communication. In each round, each node\footnote{As opposed to previous work, in \textsc{Methodical Counting}\xspace the leader also follows this procedure.} broadcasts its potential and receives the potential of all its neighbors. Each node keeps only a fraction $1/d$ of the potentials received. The parameters $p$, $r$, and $d$ are functions of $k$. The specific functions needed to guarantee correctness \dk{and saught efficiency} are defined in Theorem~\ref{thm}. \dk{This varying way of distributing potential is different from previous approaches using mass distribution.} After communication, each node updates its own potential accordingly (cf. Lines~\ref{leaderAlg}.\ref{potupdate} and~\ref{otherAlg}.\ref{newpot}). That is, it adds a fraction $1/d$ of the potentials received, and subtracts a fraction $1/d$ of the potential broadcasted times the number of potentials received. Then, a new round starts. At the end of each phase the leader ``consumes'' its potential. That is, it increases an internal accumulator $\rho$ with its current potential, which is zeroed for \dk{starting} the next phase (cf. Lines~\ref{leaderAlg}.\ref{rhoupdate} and~\ref{leaderAlg}.\ref{phireset}). A node stops the update of potential described, raises its potential to $1$, and broadcasts an alarm in each round until the end of the epoch if any of the following happens: 1) at the end of the first phase its potential is above some threshold $\tau$ as defined in Theorem~\ref{thm} (cf. Lines~\ref{leaderAlg}.\ref{leaderthreshold} and~\ref{otherAlg}.\ref{otherthreshold}), 2) at any round it receives more than $d-1$ messages \dk{(cf. Lines~\ref{leaderAlg}.\ref{leadertoomany} and~\ref{otherAlg}.\ref{othertoomany})}, or 3) at any round it receives an alarm (cf. Lines~\ref{leaderAlg}.\ref{leadertoomany} and~\ref{otherAlg}.\ref{othertoomany}). The alarm for case 1) allows the leader to detect that the estimate is wrong when $k^{1+\epsilon}<n$ for some $\epsilon>0$ (Lemmas~\ref{unalarmed} and~\ref{alarmsoon}), the alarm for case 2) allows the leader to detect that $d$ is too small and hence the estimate is wrong, and the alarm for case 3) allows dissemination of all alarms. In the alarm status the potential is set to $1$ to facilitate the analysis, but it is not strictly needed by the algorithm. At the end of each epoch, the leader checks the value of $\rho$. If $k-1-1/k\leq \rho\leq k-1$ the current estimate is correct and the leader changes its status to ``done'' (cf. Line~\ref{leaderAlg}.\ref{range}). Otherwise, all its variables are reset to start a new epoch with the next estimate (cf. Line~\ref{leaderAlg}.\ref{reset}). Before starting a new epoch the network is flooded with the status of the leader for $k$ rounds (cf. Lines~\ref{leaderAlg}.\ref{leadernotification} and~\ref{otherAlg}.\ref{othernotification}). If $k=n$, \dk{the leader initiates message ``done''} and the $k$ rounds are enough for all the nodes to receive the ``done'' status and after completing the $k$ rounds stop. Otherwise, nodes will not receive the ``done'' status and after completing the $k$ rounds they start a new epoch. \section{Analysis} \label{analysis} In this section we analyze \textsc{Methodical Counting}\xspace. References to algorithm lines are given as $\langle figure\#\rangle.\langle line\#\rangle$. \mig{ We will use the standard notation for the $L_p$ norm of vector $\vec{x}=(x_1,x_2,\dots,x_n)$ as $||\vec{x}||_p = \left(\sum_{i=1}^n |x_i|^p\right)^{1/p}$, for any $p\geq 1$. } Only for the analysis, nodes are labeled as $0,1,2,\dots,n-1$, where the leader has label $0$. The potential of a node $i$ at the beginning of round $t$ is denoted as $\Phi_{t}[i]$, and the potential of all nodes at the beginning of round $t$ is denoted as a vector $\vec{\Phi}_t$. The aggregated potential is then $||\vec{\Phi}_t||_1$. The subindex $t$ is used for rounds, phases, or dropped as needed. We will refer to the potential right after the last round of a phase as $\vec{\Phi}_{r+1}$. Such round does not exist in the algorithm, but we use this notation to distinguish between the potential right before the leader consumes its own potential (cf. Line~\ref{leaderAlg}.\ref{reset}) and the potential at the beginning of the first round of the next phase. First, we provide a broad description of our analysis of \textsc{Methodical Counting}\xspace. Consider the vector of potentials $\vec{\Phi}_i$ held by nodes at the beginning of any given phase $i$. The way that potentials are updated in each round (cf. Lines~\ref{leaderAlg}.\ref{potupdate} and~\ref{otherAlg}.\ref{newpot}) is equivalent to the progression of a $d$-lazy random walk on the evolving graph underlying the network topology~\cite{michal}, where the initial vector of potentials is equivalent to an initial distribution $\vec{p}_i$ on the overall potential $||\vec{\Phi}_i||_1$ \dk{and the probability of choosing a specific neighbor is $1/d$}. For instance, the initial vector of potentials $\vec{\Phi}_0=\langle0,1,1,\dots\rangle$, corresponds to a distribution $\vec{p}_0=\langle 0,1/(n-1),1/(n-1),\dots\rangle$ on the initial $||\vec{\Phi}_0||_1=n-1$. \dk{Note that our \textsc{Methodical Counting}\xspace\ is not a simple ``derandomization'' of the lazy random walk on evolving graphs. First, in the {Anonymous Dynamic Network}\xspace\ model neighbors cannot be distinguished, and even their number is unknown at transmission time (only at receiving time the node learns the number of its neighbors). Second, due to unknown network parameters, it may happen in an execution of \textsc{Methodical Counting}\xspace\ that the total potential received could be bigger than $1$. Third, our algorithm does not know a priori when to terminate and provide result even with some reasonable accuracy, as the formulas on mixing and cover time of lazy random walks depend on (a priori unknown) number of nodes $n$. Nevertheless, we can still use some results obtained in the context of analogous lazy random walks in order to prove useful properties of parts of algorithm \textsc{Methodical Counting}\xspace, namely, some parts in which parameters are temporarily fixed and the number of received messages does not exceed parameter $d$.} It was shown in~\cite{michal} that random walks on $d$-regular explorable evolving graphs have a uniform stationary distribution, and bounds on the mixing and cover time were proved as well. Moreover, it was observed that those properties hold even if the graph is not regular and $d$ is only an upper bound on the degree.\footnote{Their analysis relies on Lemma 12, which bounds the eigenvalues of the transition matrix as long as it is stochastic, connected, symmetric, and non-zero entries lower bounded by $1/d$. Those conditions hold for all the transition matrices, even if the evolving graph is not regular.} Thus, for the cases where $d$ is an upper bound on the number of neighboring nodes, we analyze the evolution of potentials within each phase leveraging previous work on random walks on evolving graphs. Specifically, we use the following result which is an extension of Corollary 14 in~\cite{michal}. \begin{theorem} \label{koucky} (Corollary 14 in~\cite{michal}.) After $t$ rounds of a $d_{\max}$-lazy random walk on an evolving graph with $n$ nodes, dynamic diameter $D$, upper bound on maximum degree $ d_{\max}$, and initial distribution $\vec{p}_0$, the following holds. \begin{align*} \left|\left|\vec{p}_t - \frac{\vec{I}}{n}\right|\right|_2^2 \leq \left(1-\frac{1}{ d_{\max}Dn}\right)^t\left|\left|\vec{p}_0 - \frac{\vec{I}}{n}\right|\right|_2^2 \end{align*} \end{theorem} In between phases the leader ``consumes'' its potential, effectively changing the distribution at that point. Then, a new phase starts. In \textsc{Methodical Counting}\xspace, given that $d$ is a function of the estimate $k$, if the estimate is low there may be inputs for which $d$ is not an upper bound on the number of neighbors. We show in our analysis that in those cases the leader detects the error and after some time all nodes increase the estimate. First, we prove correctness when $k=n$ as follows. \begin{lemma} \label{correct} If $d\geq k$ and $k=n$, after running the \textsc{Methodical Counting}\xspace protocol for $p\geq\frac{k}{1-1/k}\ln (k(k-1))$ phases, each of $r\geq4dk^2\ln k$ rounds, the potential $\rho$ consumed by the leader is $k-1-1/k \leq \rho \leq k-1$. \end{lemma} \begin{proof} The second inequality is immediate because the initial total potential in the network is $n-1$ and it does not increase during the execution. So, if $k=n$, the potential consumed by the leader cannot be more than $k-1$. For the first inequality, consider the vector of potentials $\vec{\Phi}_1$ at the beginning of round $1$ of any phase $i$. As explained above, we analyze the evolution of potentials within phase $i$ as a random walk on the evolving graph underlying the network topology. Consider the initial distribution $\vec{p}_i$ on the overall potential $||\vec{\Phi}_1||_1$. Then, using Theorem~\ref{koucky}, we know that after a phase $i$ of $r\geq4dk^2\ln k$ rounds the distribution is such that \begin{align} \left|\left|\vec{p}_{r+1} - \frac{\vec{I}}{k}\right|\right|_2^2 &\leq \left(1-\frac{1}{d{\cal D}k}\right)^r\left|\left|\vec{p}_1 - \frac{\vec{I}}{k}\right|\right|_2^2\label{distance}\\ &\leq \exp\left(-\frac{r}{d{\cal D}k}\right)\nonumber\\ &\leq \exp\left(-\frac{4dk^2\ln k}{d{\cal D}k}\right),\textrm{ given that $k=n>{\cal D}$,}\nonumber\\ &\leq \exp\left(-4\ln k\right)\nonumber\\ &= \frac{1}{k^4}.\nonumber \end{align} Given that $(p_{r+1}[0] - 1/k)^2 \leq \left|\left|\vec{p}_{r+1} - \frac{\vec{I}}{k}\right|\right|_2^2$, we have that $(p_{r+1}[0]-1/k)^2 \leq 1/k^4$ and hence $p_{r+1}[0] \geq 1/k - 1/k^2$. Notice that the latter is true for any initial distribution, as the distance to uniform in Equation~\ref{distance} has been upper bounded by $1$. Thus, applying recursively we have that after $p\geq\frac{k}{1-1/k}\ln (k(k-1))$ phases it is \begin{align*} ||\vec{\Phi}_p||_1 &\leq \left(1-\frac{1}{k}\left(1-\frac{1}{k}\right)\right)^p (k-1)\\ &\leq \exp\left(-\frac{p}{k}\left(1-\frac{1}{k}\right)\right) (k-1)\\ &\leq 1/k. \end{align*} Thus, the claim follows. \hfill$\square$ \end{proof} The previous lemma shows that if $\rho>k-1$ or $\rho<k-1-1/k$ we know that the estimate $k$ is wrong, but the complementary case, that is, $k-1-1/k \leq \rho \leq k-1$, may occur even if the estimate is $k<n$ and hence the error has to be detected by other means. To prove correctness in that case, we show first that if $k<n\leq k^{1+\epsilon}$ for some $\epsilon>0$ the leader must consume $\rho>k-1$ potential if the protocol is run long enough. To ensure that $d\geq \Delta+1$, we restrict $d\geq k^{1+\epsilon}$. \begin{lemma} \label{ksquare} If $1<k<n\leq k^{1+\epsilon}\leq d$, $\epsilon>0$, after running the \textsc{Methodical Counting}\xspace protocol for $p\geq\frac{(2+\epsilon)k^{1+\epsilon}}{1-1/k}\ln k$ phases, each of $r\geq(4+2\epsilon)dk^{2+2\epsilon}\ln k$ rounds, the potential $\rho$ consumed by the leader is $\rho > k-1$. \end{lemma} \begin{proof} Given that $d\geq n$, we can use Theorem~\ref{koucky} as in Lemma~\ref{correct} to show that after a phase $i$ of $r\geq(4+2\epsilon)dk^{2+2\epsilon}\ln k$ rounds the distribution is such that \begin{align} \left|\left|\vec{p}_{r+1} - \frac{\vec{I}}{n}\right|\right|_2^2 &\leq \left(1-\frac{1}{d{\cal D}n}\right)^r\left|\left|\vec{p}_1 - \frac{\vec{I}}{n}\right|\right|_2^2\nonumber\\ &\leq \exp\left(-\frac{r}{d{\cal D}n}\right)\nonumber\\ &\leq \exp\left(-\frac{(4+2\epsilon)dk^{2+2\epsilon}\ln k}{d{\cal D}n}\right) \ ,\textrm{ given that $k^{1+\epsilon}\geq n > {\cal D}$,}\nonumber\\ &\leq \exp\left(-(4+2\epsilon)\ln k\right)\nonumber\\ &= \frac{1}{k^{4+2\epsilon}} \ .\nonumber \end{align} Given that $(p_{r+1}[0] - 1/n)^2 \leq \left|\left|\vec{p}_{r+1} - \frac{\vec{I}}{n}\right|\right|_2^2$, we have that $(p_{r+1}[0]-1/n)^2 \leq 1/k^{4+2\epsilon}$ and hence $p_{r+1}[0] \geq 1/n - 1/k^{2+\epsilon}$. The latter is true for any initial distribution, as the distance to uniform has been upper bounded by $1$. So, applying recursively, we have that after $p\geq\frac{(2+\epsilon)k^{1+\epsilon}}{1-1/k}\ln k$ phases it is \begin{align*} ||\vec{\Phi}_p||_1 &\leq \left(1-\left(\frac{1}{n}-\frac{1}{k^{2+\epsilon}}\right)\right)^p (n-1)\\ &\leq \exp\left(-p\left(\frac{1}{n}-\frac{1}{k^{2+\epsilon}}\right)\right) (n-1) \ , \textrm{ since $k^{1+\epsilon}\geq n$,}\\ &\leq \exp\left(-\frac{p}{k^{1+\epsilon}}\left(1-\frac{1}{k}\right)\right) (n-1) \ , \textrm{ replacing $p$,}\\ &\leq \frac{n-1}{k^{2+\epsilon}} \ , \textrm{ given that $k^{1+\epsilon}>n-1$,}\\ &< 1/k \ . \end{align*} Thus, the potential consumed by the leader is $\rho\geq n-1-1/k > k-1$ for any integers $n>k>1$. \hfill$\square$ \end{proof} It remains to show that even if $n>k^{1+\epsilon}$ \textsc{Methodical Counting}\xspace still detects that the estimate is low. First, we prove the following two claims that establish properties of the potential during the execution of \textsc{Methodical Counting}\xspace. (Recall that we use round $r+1$ to refer to potentials at the end of the phase right before the leader consumes its potential in Line~\ref{leaderAlg}.\ref{reset}.) \begin{claim} \label{conservation} Given an {Anonymous Dynamic Network}\xspace of $n$ nodes running \textsc{Methodical Counting}\xspace with parameter $d$, for any round $t$ of the first phase, such that $1\leq t\leq r+1$, if $d$ was larger than the number of neighbors of each node $x$ for every round $t'<t$, then $||\vec{\Phi}_t||_1=n-1$. \end{claim} \begin{proof} For the first round the claim holds as the initial potential of each node is $1$ except the leader that gets $0$. That is, $||\vec{\Phi}_1||_1 = n-1$. For any given round $1< t\leq r+1$ in phase $1$ and any given node $x$, if $d$ is larger than the number of neighbors of $x$, the potential is updated only in Lines~\ref{leaderAlg}.\ref{potupdate} and~\ref{otherAlg}.\ref{newpot} as \begin{align*} \Phi_{t+1}[x] &= \Phi_{t}[x] + \sum_{i\in N_{t}[x]}\Phi_{t}[i]/d - |N_{t}[x]|\Phi_{t}[x]/d \ . \end{align*} Where $N_{t}[x]$ is the set of neighbors of node $x$ in round $t$. Inductively, assume that the claim holds for some round $1\leq t\leq r$. We want to show that consequently it holds for $t+1$. The potential for round $t+1$ is \begin{align} ||\vec{\Phi}_{t+1}||_1 &= ||\vec{\Phi}_{t}||_1 + \frac{1}{d}\sum_{x\in V} \left( \sum_{y\in N_{t}[x]}\Phi_{t}[y] - |N_{t}[x]|\Phi_{t}[x] \right) \ .\label{potvecupdate} \end{align} In the {Anonymous Dynamic Network}\xspace model, communication is symmetric. That is, for every pair of nodes $x,y\in V$ and round $t$, it is $x\in N_{t}[y] \iff y\in N_{t}[x]$. Fix a pair of nodes $x',y' \in V$ such that in round $t$ it is $y'\in N_{t}[x']$ and hence $x'\in N_{t}[y']$. Consider the summations in Equation~\ref{potvecupdate}. Due to symmetric communication, we have that the potential $\Phi_{t}[y']$ appears with positive sign when the indeces of the summations are $x=x'$ and $y=y'$, and with negative sign when the indices are $x=y'$ and $y=x'$. This observation applies to all pairs of nodes that communicate in any round $t$. Therefore, we can re-write Equation~\ref{potvecupdate} as \begin{align*} ||\vec{\Phi}_{t+1}||_1 &= ||\vec{\Phi}_{t}||_1 + \frac{1}{d}\sum_{\substack{x,y\in V:\\y\in N_{t}[x]\\}} \bigg(\Phi_{t}[y] - \Phi_{t}[x] + \Phi_{t}[x] - \Phi_{t}[y] \bigg) = ||\vec{\Phi}_{t}||_1 \ . \end{align*} Thus, the claim follows. \hfill$\square$ \end{proof} \begin{claim} \label{potbounds} Given an {Anonymous Dynamic Network}\xspace of $n$ nodes running \textsc{Methodical Counting}\xspace, for any round $t$ of any phase and any node $x$, it is $0\leq \Phi_t[x]\leq 1$. \end{claim} \begin{proof} If $t=1$ the potential of the leader is $\Phi_1[0]=0$ and the potential of any non-leader node $x$ is $\Phi_1[x]=1$. Thus, the claim follows. Inductively, for any round $2<t\leq r+1$, we consider two cases according to node status. If a node $x$ is in alarm status at the beginning of round $t$, then it is $\Phi_t[x]=1$ as, whenever the status of a node is updated to alarm, its potential is set to $1$ and will not change until the next epoch (cf. Figures~\ref{leaderAlg} and~\ref{otherAlg}). On the other hand, if a node $x$ is in normal status at the beginning of round $t$, it had its potential updated in all rounds $t'<t$ only in Lines~\ref{leaderAlg}.\ref{potupdate} and~\ref{otherAlg}.\ref{newpot} as \begin{align*} \Phi_{t'+1}[x] &= \Phi_{t'}[x] + \sum_{y\in N_{t'}[x]}\Phi_{t'}[y]/d - |N_{t'}[x]|\Phi_{t'}[x]/d. \end{align*} For all rounds $t'<t$, node $x$ exchanged potential with less than $d$ neighbors, because otherwise it would have been changed to alarm status in Lines~\ref{leaderAlg}.\ref{alarminsecondleader} and~\ref{otherAlg}.\ref{alarminsecondother}. Therefore it is $|N_{t'}[x]|\Phi_{t'}[x]/d < \Phi_{t'}[x]$ which implies $\Phi_t[x]\geq 0$. It can also be seen that $\Phi_t[x]\leq 1$ because, for any $t'<t$, it is \begin{align*} \Phi_{t'+1}[x] &= \Phi_{t'}[x] + \sum_{y\in N_{t'}[x]}\Phi_{t'}[y]/d - |N_{t'}[x]|\Phi_{t'}[x]/d\\ &\leq \Phi_{t'}[x] + \frac{|N_{t'}[x]|}{d} - \frac{|N_{t'}[x]|}{d}\Phi_{t'}[x]\\ &= \Phi_{t'}[x] + \frac{|N_{t'}[x]|}{d}(1 - \Phi_{t'}[x])\\ &\leq \Phi_{t'}[x] + 1 - \Phi_{t'}[x] =1. \end{align*} \hfill$\square$ \end{proof} It remains to show that even if $n>k^{1+\epsilon}$ \textsc{Methodical Counting}\xspace still detects that the estimate is low. We focus on the first phase. We define a threshold $\tau$ such that, after the phase is completed, all nodes that have potential above $\tau$ can send an alarm to the leader, as such potential indicates that the estimate is low. We show that the alarm must be received after $k^{1+\epsilon}$ further rounds of communication. \begin{lemma} \label{unalarmed} For $\epsilon>0$, after running the first phase of the \textsc{Methodical Counting}\xspace protocol, there are at most $k^{1+\epsilon}$ nodes that have potential at most $\tau=1-1/k^{1+\epsilon}$. \end{lemma} \begin{proof} We define the \emph{slack} of node $x$ at the beginning of round $t$ as $s_t[x]=1-\Phi_t[x]$ and the vector of slacks at the beginning of round $t$ as $\vec{s}_t$. In words, the slack of a node is the ``room'' for additional potential up to $1$. Recall that the overall potential at the beginning of round $1$ of phase $1$ is $||\vec{\Phi}_1||_1=n-1$. Also notice that for any round and any node $x$ the potential of $x$ is non-negative as shown in Claim~\ref{potbounds}. Therefore, the overall slack with respect to the maximum potential that could be held by all the $n$ nodes at the beginning of round $1$ is $||\vec{s}_1||_1=1$. Consider a partition of the set of nodes $\{L,H\}$, where $L$ is the set of nodes with potential at most $\tau=1-1/k^{1+\epsilon}$ at the end of the first phase, before the leader consumes its own potential in Line~\ref{leaderAlg}.\ref{reset}. That is, $\Phi_{r+1}[x] \leq \tau$ for all $x\in L$. Assume that the slack held by nodes in $L$ at the end of the first phase is at most the overall slack at the beginning of the phase. That is, $\sum_{x\in L}s_{r+1}[x] \leq ||\vec{s}_1||_1 = 1$. By definition of $L$, we have that for each node $x\in L$ it is $s_{r+1}[x]=(1-\Phi_{r+1}[x])\geq 1-\tau$. Therefore, $|L|(1-\tau) \leq \sum_{x\in L} s_{r+1}[x] \leq 1$. Thus, $|L| \leq 1/(1-\tau) = k^{1+\epsilon}$ and the claim follows. Then, to complete the proof, it remains to show that $\sum_{x\in L}s_{r+1}[x]\leq 1$. Let the scenario where $d$ is larger than the number of neighbors that each node has in each round of the first phase be called ``case 1'', and ``case 2'' otherwise. Claim~\ref{conservation} shows that in case 1 at the end of the first phase it is $||\vec{\Phi}_{r+1}||_1=n-1$. Therefore, the slack held by all nodes is $||\vec{s}_{r+1}||_1=1$ and the slack held by nodes in $L\subseteq V$ is $\sum_{x\in L}s_t[x]\leq 1$. We show now that indeed case 1 is a worst-case scenario. That is, in the complementary case 2 where some nodes have $d$ neighbors or more in one or more rounds, the slack is even smaller. To compare both scenarios we denote the slack for each round $t$, each node $x$, and each case $i$ as $s^{(i)}_t[x]$. Assume that some node $x$ is the first one to have $d'>d-1$ neighbors. Let $1\leq t\leq r$ be the round of the first phase when this event happened. We claim that $||\vec{s}_{t+1}^{(2)}||_1\leq ||\vec{s}_{t+1}^{(1)}||_1$. The reason is the following. Given that more than $d-1$ potentials are received, node $x$ increases its potential to $1$ for the rest of the epoch (cf. Lines~\ref{leaderAlg}.\ref{leadertoomany} and~\ref{otherAlg}.\ref{othertoomany}). That is, the slack of $x$ is $s_{t+1}^{(2)}[x]\leq s_t^{(2)}[x]=s_t^{(1)}[x]$. Additionally, the potential shared by $x$ with all neighbors during round $t$ is $d'\Phi_{t}[x]/d>\Phi_{t}[x](1-1/d)$ (cf. Lines~\ref{leaderAlg}.\ref{potupdate} and~\ref{otherAlg}.\ref{newpot}). That is, the potential shared by $x$ with neighbors in case 2 is more than the potential that $x$ would have shared in case 1. Then, combining both effects (the relative increase in potential of $x$ and its neighbors') the overall slack is $||\vec{s}_{t+1}^{(2)}||_1\leq ||\vec{s}_{t+1}^{(1)}||_1$. The same argument applies to all other nodes with $d$ or more neighbors in round $t$. Additionally, for any round $t'$ of the first phase, such that $t<t'\leq r$, we have to additionally consider the case of a node $y$ that, although it does not receive more than $d-1$ potentials, it moves to alarm status because it has received an alarm in round $t'$. Then, notice that the potential of $y$ is $\Phi_{t'+1}[y]=1 \geq \Phi_{t'}[y]$, and it will stay in $1$ for the rest of the epoch (cf. Lines~\ref{leaderAlg}.\ref{alarminsecondleader} and~\ref{otherAlg}.\ref{alarminsecondother}). Therefore, the slack of $y$ is $s_{t+1}^{(2)}[y]\leq s_{t+1}^{(1)}[y]$. Combining all the effects studied over all rounds, the slack at the end of the first phase is $||\vec{s}_{r+1}^{(2)}||_1\leq ||\vec{s}_{r+1}^{(1)}||_1$. Given that $L\subseteq V$, it is $\sum_{x\in L}s_{r+1}^{(2)}[x] \leq ||\vec{s}_{r+1}^{(2)}||_1\leq ||\vec{s}_{r+1}^{(1)}||_1 \leq 1$ which completes the proof. \hfill$\square$ \end{proof} In our last lemma, we show that if $k^{1+\epsilon}<n$ the leader detects the error. \begin{lemma} \label{alarmsoon} If $k^{1+\epsilon}<n$, $\epsilon>0$, and $r\geq(4+2\epsilon- 2\ln(k^\epsilon-1)/\ln k)dk^2\ln k$, within the following $k^{1+\epsilon}$ rounds after the first phase of the \textsc{Methodical Counting}\xspace protocol, the leader has received an alarm message. \end{lemma} \begin{proof} Using Theorem~\ref{koucky}, we know that after phase $1$ of $r\geq(4+2\epsilon- 2\ln(k^\epsilon-1)/\ln k)dk^2\ln k$ rounds, if $k=n$, the distribution is such that \begin{align*} \left|\left|\vec{p}_{r+1} - \frac{\vec{I}}{k}\right|\right|_2^2 &\leq \left(1-\frac{1}{d{\cal D}k}\right)^r\left|\left|\vec{p}_1 - \frac{\vec{I}}{k}\right|\right|_2^2\\ &\leq \exp\left(-\frac{r}{d{\cal D}k}\right)\nonumber\\ &\leq \exp\left(-\frac{(4+2\epsilon - 2\ln(k^\epsilon-1)/\ln k)dk^2\ln k}{d{\cal D}k}\right),\textrm{ given that $k=n>{\cal D}$,}\nonumber\\ &\leq \exp\left(-(4+2\epsilon- 2\ln(k^\epsilon-1)/\ln k)\ln k\right)\nonumber\\ &= 1/k^{4+2\epsilon- 2\ln(k^\epsilon-1)/\ln k}.\nonumber \end{align*} Given that for any node $j$, it is $(p_{r+1}[j] - 1/k)^2 \leq \left|\left|\vec{p}_{r+1} - \frac{\vec{I}}{k}\right|\right|_2^2$, we have that $(p_{r+1}[j]-1/k)^2 \leq 1/k^{4+2\epsilon- 2\ln(k^\epsilon-1)/\ln k}$. Hence, it is $p_{r+1}[j] \leq 1/k + 1/k^{2+\epsilon- \ln(k^\epsilon-1)/\ln k}$ for any node $j$. Moreover, if $k=n$ the total potential in the network would be $k-1$ (cf. Claim~\ref{conservation}) and no individual node should have potential larger than $(k-1)(1/k + 1/k^{2+\epsilon- \ln(k^\epsilon-1)/\ln k})$. We show that the latter is at most $\tau = 1-1/k^{1+\epsilon}$ as follows. \begin{align*} (k-1)(1/k + 1/k^{2+\epsilon- \ln(k^\epsilon-1)/\ln k}) &\leq 1-1/k^{1+\epsilon}\\ (k-1)/k^{2+\epsilon- \ln(k^\epsilon-1)/\ln k} &\leq (k^\epsilon -1)/k^{1+\epsilon}\\ k^{1 - \ln(k^\epsilon-1)/\ln k} &\geq (k-1)/(k^\epsilon -1)\\ \left(1 - \frac{\ln(k^\epsilon-1)}{\ln k}\right) \ln k &\geq \ln(k-1)-\ln(k^\epsilon -1)\\ \ln k &\geq \ln(k-1). \end{align*} And the latter is true for any $k>1$. Consider a partition of the set of nodes $\{L,H\}$, where $L$ is the set of nodes with potential at most $\tau=1-1/k^{1+\epsilon}$ at the end of the first phase. At the end of the first phase, the size of $L$ is at most $k^{1+\epsilon}$ (cf. Lemma~\ref{unalarmed}), and the size of $H$ is at least $1$ because $n>k^{1+\epsilon}$. Thus, there is at least one node changing to alarm status in Line~\ref{otherAlg}.\ref{thresholdalarm} in round $1$ of phase $2$, and due to $1$-interval connectivity at least one new node moves from $L$ to $H$ in each of the following rounds. Thus, the claim follows. \hfill$\square$ \end{proof} Based on the above lemmata, we establish our main result in the following theorem. \begin{theorem} \label{thm} Given an {Anonymous Dynamic Network}\xspace with $n$ nodes, after running \textsc{Methodical Counting}\xspace for each estimate $k=2,3,\dots,n$ with parameters \begin{align*} d &= k^{1+\epsilon},\\ p &= \left\lceil \frac{(2+\epsilon)k^{1+\epsilon}}{1-1/k}\ln k \right\rceil,\\ r &= \left\lceil \left(4+2\epsilon +\max\left\{0,- \frac{2\ln(k^\epsilon-1)}{\ln k}\right\}\right) dk^{2+2\epsilon}\ln k \right\rceil,\\ \tau &= 1-1/k^{1+\epsilon}, \end{align*} where $\epsilon>0$, all nodes stop after $\sum_{k=2}^n (pr+k)$ rounds of communication and output $n$. \end{theorem} \begin{proof} Notice that the above parameters fulfill the conditions of the previous lemmas. First we prove that \textsc{Methodical Counting}\xspace is correct. To do so, it is enough to show that for each estimate $k<n$ the algorithm detects the error and moves to the next estimate, and that if otherwise $k=n$ the algorithm stops and outputs $k$. We consider three cases: $k=n$, $k<n\leq k^{1+\epsilon}$, and $k^{1+\epsilon}<n$, for a chosen value of $\epsilon>0$. Assume first that $k<n\leq k^{1+\epsilon}$. Then, even if the leader does not receive an alarm during the execution, as shown in Lemma~\ref{ksquare}, at the end of the epoch in Line~\ref{leaderAlg}.\ref{range} the leader will detect that $\rho$ is out of range and will not change its status to done. Therefore, no other node will receive a termination message (loop in Line~\ref{leaderAlg}.\ref{leadernotification}), and all nodes will continue to the next epoch. Assume now that $k^{1+\epsilon}<n$. Lemma~\ref{alarmsoon} shows that within the following $k^{1+\epsilon}$ rounds after the first phase the leader has received an alarm message, even if no node has more than $d-1$ neighbors during the execution and alarms due to this are not triggered. For the given value of $p$ and $k\geq 2$, the epoch has more than one phase. Therefore, within $k^{1+\epsilon}$ rounds into the second phase the leader will change to alarm status in Line~\ref{leaderAlg}.\ref{alarminsecondleader}, will not change its status to done later in this epoch, and no other node will receive a termination message. Hence, all nodes will continue to the next epoch. Finally, if $k=n$, Lemma~\ref{correct} shows that the accumulated potential $\rho$ will be $k-1-1/k\leq \rho\leq k-1$. Thus, in Line~\ref{leaderAlg}.\ref{range} the leader will change its status to done, and in the loop of Line~\ref{leaderAlg}.\ref{leadernotification} will inform all other nodes that the current estimate is correct. The number of iterations of such loop are enough due to $1$-interval connectivity. The claimed running time can be obtained by inspection of the algorithm, either for the leader or non-leader since they are synchronized. Refer for instance to the leader algorithm in Figure~\ref{leaderAlg}. The outer loop in Line~\ref{leaderAlg}.\ref{epochs} corresponds to each epoch with estimates $k=2,3,\dots, n$. For each epoch, Line~\ref{leaderAlg}.\ref{phases} starts a loop of $p$ phases followed by $k$ rounds in Line~\ref{leaderAlg}.\ref{leadernotification}. Each of the $p$ phases has $r$ rounds. Thus, the overal number of rounds is $\sum_{k=2}^n (pr+k)$. \hfill$\square$ \end{proof} Choosing $\epsilon = \log_k 2$, the following holds. \begin{corollary} The time complexity of \textsc{Methodical Counting}\xspace is $O(n^5 \log^2 n)$. \end{corollary} \begin{align*} \sum_{k=2}^n (pr+k) &= \sum_{k=2}^n \left(\left\lceil \frac{(2+\epsilon)k^{2+\epsilon}}{k-1}\ln k \right\rceil \left\lceil \left(4+2\epsilon +\max\left\{0,- \frac{2\ln(k^\epsilon-1)}{\ln k}\right\}\right) k^{3+3\epsilon}\ln k \right\rceil + k \right)\\ &= \sum_{k=2}^n \left(\left\lceil \frac{2(2+\log_k 2)k^{2}}{k-1}\ln k \right\rceil \left\lceil \left(4+2\log_k 2 \right) 2^3k^{3}\ln k \right\rceil + k \right)\\ &\leq \sum_{k=2}^n \left(\left\lceil \frac{6k^{2}}{k-1}\ln k \right\rceil \left\lceil 48k^{3}\ln k \right\rceil + k \right)\\ &\in O(n^5 \log^2 n). \end{align*} \section{Extensions} \label{s:extensions} We argue that \textsc{Methodical Counting}\xspace\ can be extended to compute the sum of values stored in the nodes, and thus also the average (as it computes the number of nodes $n$), and other functions. Assume that each node of the {Anonymous Dynamic Network}\xspace\ initially stores a value, represented as a sequence of bits. W.l.o.g. we could assume that the value stored at the leader is zero; otherwise, the nodes could compute the sum of other initial values (with the leader value set up to $0$), and later the leader could propagate its actual initial value appended to the message ``done'' at the end of the execution to be added to the computed sum of other nodes. The modified \textsc{Methodical Counting}\xspace\ prepends the potential to the sequence. Instead of sending potential by the original \textsc{Methodical Counting}\xspace, each node transmits its current sequence (in which the potential stands in the first location). Changes at each position of the sequence are done independly by the same algorithm as used for the potential, cf. Figures~\ref{leaderAlg} and~\ref{otherAlg}. Re-setting the values, in the beginning of each epoch, means putting back the initial values of the sequence. It means that the modified algorithm maintains potential in exactly the same way as the original \textsc{Methodical Counting}\xspace, regardless of the initial values. At the end of some epoch, with number corresponding to the number of nodes $n$, all nodes terminate. When it happens, each node recalls the sequence stored in it at the end of the first phase of the epoch, multiplies the values stored at each position of the sequence by the epoch number $n$, and rounds each of the results to the closest integer; then it sums up the subsequent values multiplied by corresponding (consecutive) powers of $2$. Note that such ``recalling'' could be easily implemented by storing and maintaining the sequence after the first phase of each epoch. We argue that the computed value is the sum of the initial values. It is enough to analyze how the modified algorithm processes values at one position of the sequence, as positions are treated independently; therefore, w.l.o.g. we assume that each node has value $0$ or $1$ in the beginning. Consider the last epoch before the leader sends the final sequence (in our case, representing one value). In the beginning of the epoch, the values are re-set to the original one, and manipulated independently according to the rules in Figures~\ref{leaderAlg} and~\ref{otherAlg}. Therefore, let us focus on the first phase of this epoch. Since we already proved that the estimate of the last epoch is equal to the number of nodes, the value of $d$ in this epoch (and thus also in its first phase) is an upper bound on the node degree. Thus, the mass distribution scaled down by the sum of the initial values behaves exactly the same as the probabilities of being at nodes in the corresponding round of the lazy random walk, with parameter $d$ and starting from initial distribution equal to the initial values divided by the sum. Since the length of the phase is set up to guarantee that the distribution is close to the stationary uniform within error $1/n$, and the sum of bits is not bigger than $n$, at the end of the phase the value stored by each node is close to the sum (i.e., scaling factor) divided by $n$ by at most $1/n^4$ (cf. Equation~\ref{distance}). Therefore, after multiplying it by $n$, each node gets value of sum within error of at most $1/n^3$, which after rounding will give the integer equal to the value of the sum. Once having the number $n$ and the sum, each node can compute the average. As argued in~\cite{KDGgossip}, the capacity of computing the sum of the input values makes possible the computation of more complex functions. Moreover, as opposed to~\cite{KDGgossip} where the computation only converges, our approach outputs the exact sum. Therefore, the extension to database queries that can be approximated using \emph{linear synopses} \footnote{Additive functions on multisets, e.g. $f(A\cup B)=f(A)+f(B)$.} is straightforward. Boolean functions $f:\{0,1\}^n\to\{0,1\}$, such as AND (sum $= n$), OR (sum $>0$), and XOR (sum $=1$), as well as their complementaries NAND (sum $\neq n$), NOR (sum $= 0$), and XNOR (sum $\neq 1$), can also be implemented having $n$ and the sum. \dk{This applies also to other ``symmetric'' Boolean functions, i.e., which do not depend on the order of variables, as they could be computed based on computed sum of ones and $n$~\cite{KRANAKISboolean}.} Maximum ($L_\infty$ norm) and minimum can be computed subsequently by flooding. That is, each node broadcasts the maximum and minimum input values seen so far. Due to $1$-interval connectivity within $n$ rounds all nodes have the answers. \dk{Note that all these computations, including the \textsc{Methodical Counting}\xspace, could be done using only polynomial estimates of values, that is, with messages of length $O(\log n)$, multiplied by the maximum number of coordinates of any of the initial values. This could be also traded for time: we could use only messages of length $O(\log n)$ with time increased by the maximum number of coordinates of any initial value (which is still polynomial in the size of the input,\footnote The input in this case is distributed among the nodes, and each node possesses at least one bit} which in this case is at least $n$ plus the maximum number of coordinates). } \section{Open Directions} Straightway questions emerging from our work include existence of polynomial (in $n$) lower bound and improvement of our upper bound. One of the potential ways could be through investigating bi-directional relationships between random processes and computing algebraic functions in {Anonymous Dynamic Network}\xspace. Extending the range of polynomially computable functions is another intriguing future direction. Finally, generalizing the model by not assuming connectivity in every round or dropping assumption on synchrony could introduce even more challenging aspects of communication and computation, including group communication and its impact on the common knowledge about the system parameters. \section{Introduction}\label{sec:introduction}} \section{Introduction}\label{sec:introduction} In this work, we address the \mig{standing} question of whether the number of nodes of an {Anonymous Dynamic Network}\xspace (ADN) can be counted deterministically in polynomial time or not. We answer this question positively by presenting the \textsc{Methodical Counting}\xspace algorithm, and proving formally that after a polynomial number of rounds of communication all nodes know the size of the network and stop. The problem has been thoroughly studied~\cite{spirakis,conscious,oracle,experimentalConscious,LunaB15,opodisCounting,netysCounting} because Counting is central for distributed computing. Indeed, more complex tasks need the network size to make various decisions on state agreement, synchronization, termination, and others. However, {Anonymous Dynamic Networks}\xspace pose a particularly challenging scenario. On one hand, nodes are indistinguishable from each other. For instance, they may lack identifiers or their number may be so massive that keeping record of them is not feasible. On the other hand, the topology of the network is highly dynamic. Indeed, the subsets of nodes that may communicate with each other may change all the time. All these features make ADN a valid model for anonymous ad hoc communication and computation. In such a restrictive scenario, finding a way of providing theoretical guarantees of deterministic polynomial time has been elusive until now. Indeed, previous papers have either weaken the objective (e.g., computing only upper bound, only stochastic guarantees, etc.), assumed availability of network information (e.g., maximum number of neighbors, size upper bound, etc.), relied on a stronger model of communication, or provided only superpolynomial time guarantees. \textsc{Methodical Counting}\xspace uses no information about the network. After completing its execution, all nodes obtain the exact size of the network and stop. Moreover, they stop all at the same time, allowing the algorithm to be concatenated with other computations. Our algorithm is based on nodes continuously sharing some magnitude, which we call \emph{potential},\footnote{In previous related works this quantity, used in a different way, was termed \emph{energy}. We steer away from such denomination to avoid confusion with node energy supply.} resembling \emph{mass-distribution} and \emph{push-pull} algorithms. Unlike previous algorithms, in \textsc{Methodical Counting}\xspace carefully and periodically (i.e. , ``methodically'') some potential is removed from the network, rather than greedily doing so continuously. This approach is combined with another methodological innovation testing whether the candidate value (for the network size) is within some polynomial range of the actual network size. This complex strategy yields an algorithm \dk{in which the progress in mass-distribution} can be analyzed as a sequence of \dk{parametrized} Markov chains (even though the algorithm itself is purely deterministic) \dk{enhanced by mass drift and alarms controlling the process and its parameters}. Our analysis approach opens the path to study more complex tasks in {Anonymous Dynamic Networks}\xspace \mig{applying similar techniques.} \mig{ Finally, we also present a variety of extensions of \textsc{Methodical Counting}\xspace to compute more complex functions. Most notably, we present an extension that, concurrently with finding the network size, computes the sum of input values held at each node without asymptotic time overhead. Having a method to compute the sum and network size, more complex computations are possible in polynomial time as well. Indeed, we also describe how to compute a variety of algebraic and Boolean functions. To the best of our knowledge, ours are the first algorithms for anonymous dynamic Counting and other algebraic computations that can be implemented in practice with worst-case guarantees. } \subsubsection*{Roadmap:} The rest of the paper is organized as follows. We specify the model and notation details in Section~\ref{prelim}. Then, we overview previous work in Section~\ref{relwork} and present our results in Section~\ref{results}. Section~\ref{algorithm} includes the details of \textsc{Methodical Counting}\xspace, and we prove its correctness and running time in Section~\ref{analysis}. Extensions to other functions are presented in Section~\ref{s:extensions}. \section*{Acknowledgments} The authors would like to thank Michal Kouck{\`y} and Alessia Milani for useful discussions. \bibliographystyle{abbrv} \section{Model, Problem, and Notation} \label{prelim} \subsubsection*{The Counting Problem:} The definition of the problem is simple. An algorithm solves the Counting Problem if, after completing its execution, all nodes have obtained the exact size of the network and stop. \subsubsection*{{Anonymous Dynamic Networks}\xspace:} The following model is customary in the {Anonymous Dynamic Networks}\xspace literature. We consider a network composed by a set $V$ of $n>1$ network \emph{nodes} with processing and communication capabilities. It was shown in~\cite{spirakis} that Counting cannot be solved in Anonymous Networks without the availability of at least one distinguished node in the network. Thus, we assume the presence of such node called \emph{leader}. Aside from the leader, we assume that all other nodes are indistinguishable from each other. That is, we do not assume the availability of labels or identifiers, and all non-leader nodes execute exactly the same program. Each pair of nodes that are able to communicate define a communication \emph{link}, and the set of links is called the \emph{topology} of the network. The nodes in a communication link are called \emph{neighbors}. The event of sending a message to neighbors is called a \emph{broadcast} or \emph{transmission}. Nodes and links are reliable, in the sense that no communication or node failures occur. Hence, a broadcasted message is received by all neighbors. Moreover, links are \emph{symmetric}, that is, if node $a$ is able to send a message to node $b$, then $b$ is able to send a message to $a$. Without loss of generality, we discretize time in \emph{rounds}. In any given round, a node may broadcast a message, receive all messages from broadcasting neighbors, and carry out some computations, in that order. The time taken by the computations is assumed to be negligible. The set of links among nodes may change from round to round, and nodes have no way of knowing which were the neighbors they had before. These topology changes are arbitrary, limited only to maintain the network connected in each round. That is, at any given round the topology is such that there is a \emph{path}, i.e., a sequence of links, between each pair of nodes, but the set of links may change arbitrarily from round to round. This adversarial model of dynamics was called \emph{$1$-interval connectivity} in~\cite{KuhnLO2010}. The following notation will be used. The maximum number of neighbors that any node may have at any given time is called the \emph{dynamic maximum degree} and it is denoted as $\Delta$. The maximum length of a path between any pair of nodes at any given time is called the \emph{dynamic diameter} and it is denoted as $D$. The maximum length of an opportunistic path between any pair of nodes over many time slots is called the \emph{chronopath}~\cite{FCFMMZ:randomgeocast} and it is denoted as $\mathcal{D}$. \section{Previous Work} \label{relwork} In this section we overview previous work directly related to this paper. A comprehensive overview of work related to {Anonymous Dynamic Networks}\xspace can be found in a survey by Casteigts et al.~\cite{arnaudSurvey} and references in the papers cited here. The related work overviewed, in comparison with our results, is summarized in Table~\ref{table}. With respect to lower bounds, it was proved in~\cite{baldoni} that at least $\Omega(\log n)$ rounds are needed, even if $D$ is constant. Also, a trivial observation is that $\Omega(\mathcal{D})$ is a lower bound as at least one node needs to hear about all other nodes to obtain the right count, and the chronopath $\mathcal{D}$ is the largest number of hops that a message from some node needs to take to reach other node in the network, possibly along multiple time slots. Counting was already studied in~\cite{spirakis}, together with the problem of \emph{Naming}, for dynamic and static networks. It was shown in this work that it is impossible to solve Counting without the presence of a distinguished node, even if nodes do not move. The Counting protocol presented for {Anonymous Dynamic Networks}\xspace requires knowledge of an upper bound on $\Delta$, and the count obtained is only an upper bound on the network size, which may be as bad as exponential. An exact count is obtained by the Conscious Counting algorithm presented in~\cite{conscious}. However, the computation relies on knowing initially an upper bound on the network size. The running time of this protocol is exponential only if the initial upper bound is tight. In the same work and follow-up papers~\cite{oracle,experimentalConscious}, the authors presented protocols under more challenging scenarios where $\Delta$ is not known. However, either the protocol does not terminate~\cite{conscious}, and hence the running time cannot be bounded, or the protocol is terminated heuristically~\cite{experimentalConscious}. In experiments~\cite{experimentalConscious}, such heuristic was found to perform well on dense topologies, but for other topologies the error rate was high. That is, the results only apply to dense {Anonymous Dynamic Networks}\xspace. Another protocol in~\cite{oracle} is shown to terminate eventually, without running-time guarantees and under the assumption of having for each node an estimate of the number of neighbors in each round. In~\cite{spirakis} it was conjectured that some knowledge of the network such as the latter would be necessary, but the conjecture was disproved later in~\cite{LunaB15}. On the other hand the protocol in~\cite{LunaB15} requires exponential space. Recently, a protocol called Incremental Counting was presented in~\cite{opodisCounting}. This algorithm reduced exponentially the running time guarantees with respect to previous works developed under the same model. Incremental Counting obtains the exact count, all nodes terminate simultaneously, the topology dynamics is only limited to $1$-interval connectivity, it only requires polynomial space, and it only requires knowledge of the dynamic maximum degree $\Delta$. The superpolynomial running time proved still does not provide enough guarantee for practical application, but reducing from doubly-exponential to exponential was an important step towards understanding the complexity of Counting. In a follow-up paper~\cite{netysCounting}, Incremental Counting was tested experimentally showing a promising polynomial behavior. The study was conducted on pessimistic inputs designed to slow the convergence, such as bounded-degree trees rooted at the leader uniformly chosen at random for each round, and a single path starting at the leader with non-leader nodes permuted uniformly at random for each round. The protocol was also tested on static versions of the inputs mentioned, classic random graphs, and networks where some disconnection is allowed. The results exposed important observations. Indeed, even for topologies that stretch the dynamic diameter, the running times obtained are below $\Delta n^3$. It was also observed that random graphs, as used in previous experimental studies~\cite{experimentalConscious}, reduce the convergence time, and therefore are not a good choice to indicate worst-case behavior. These experiments showed good behavior even for networks that sometimes are disconnected, indicating that more relaxed models of dynamics, such as ($\alpha,\beta$)-connectivity~\cite{FCFMMZ:randomgeocast,geocast}, are worth to study. All in all, the experiments in~\cite{netysCounting} showed that Incremental Counting behaves well in a variety of pessimistic inputs, but not having a proof of what a worst-case input looks like, and being the experiments restricted to a range of values of $n$ far from the expected massive size of an {Anonymous Dynamic Network}\xspace, a theoretical proof of polynomial time remained an open problem even from a practical perspective. In a recent manuscript~\cite{BaldoniTR} a polynomial Counting algorithm is presented relying on the availability of an algorithm to compute average with polynomial convergence time. Such average computation is modeled as a Markov chain with underlying doubly-stochastic matrix, which requires topology information within two hops (cf.~\cite{nedic2009}). In our model of {Anonymous Dynamic Network}\xspace, such information is not available, and gathering it may not be possible due to possible topology changes from round to round. \section{Our Contributions} \label{results} We present and analyze a deterministic distributed algorithm to compute the number of nodes in an {Anonymous Dynamic Network}\xspace. We call such algorithm \textsc{Methodical Counting}\xspace. As opposed to previous works, our algorithm does not require any knowledge of network characteristics, such as dynamic maximum degree or an upper bound on the size. After $O(n^5\ln^2 n)$ communication rounds of running \textsc{Methodical Counting}\xspace, all nodes obtain the network size and stop at the same round. To the best of our knowledge, this is the first polynomial deterministic Counting algorithm in the pure model of {Anonymous Dynamic Network}\xspace. Our algorithm is based on distributing potential in a mass-distribution fashion, similarly as previous works for Counting. The main algorithmic novelty in our approach is that the leader participates in the process as any other node, removing potential only after it has accumulated enough. This approach allowed us to leverage previous work on random walks in evolving graphs. For this approach to work, we combine it with testing whether the candidate value for the network size is polynomially close to the actual value. Our approach also opens the path to study more complex computations in {Anonymous Dynamic Networks}\xspace using the same analysis. \mig{Finally, we also present extensions of \textsc{Methodical Counting}\xspace to compute more complex functions. Most notably, we show how to modify \textsc{Methodical Counting}\xspace to compute the sum of input values held by nodes at the same time than counting. Having an algorithm to compute the network size and the sum of input values, we also show how to compute other algebraic and Boolean functions.}
\section{Overview} The paper subsumes and examines the population of TeV pulsar wind nebulae (PWNe) found to date. An updated census presents 14 objects reanalysed in the H.E.S.S. Galactic Plane Survey\ (HGPS) pipeline, which are considered to be firmly identified PWNe. Five more objects could be found outside that catalogue range or pipeline. In an evaluation of candidate PWNe, we conclude that there are ten strong further candidates in the HGPS data. Most of the PWNe are located in the bright and dense Crux Scutum arm of the inner Milky Way (\fref{fig:pwn_galaxy}). A spatial correlation study confirmed the picture drawn in earlier studies, namely that only young, energetic pulsars grow TeV pulsar wind nebulae that are bright enough for detection with presently available Cherenkov telescopes. For the first time, flux upper limits for undetected PWNe are given around 22 pulsars with a spin-down power beyond $10^{35}\eh{erg\,s^{-1}}$ and with expected apparent extensions (plus offsets) below $0.6^{\circ}$ in the sky. \begin{figure} \centerline{\includegraphics[width=0.7\linewidth]{pwnpop_face_on_milky_way_distinguished}} \centerline{\includegraphics[width=0.7\linewidth]{pwnpop_face_on_milky_way_onestyle}} \caption{Schematic of the objects discussed here in the context of the Milky Way and its spiral arms. The yellow and blue curves outline the sensitivity horizon of the HGPS for point-like sources with an integrated gamma-ray luminosity ($1$--$10\eh{TeV}$) of 1\% and 10\% of the Crab luminosity, respectively. Top: Firmly identified PWNe, candidates, and energetic pulsars ($\dot{E} > 10^{35}\eh{erg\,s^{-1}}$) without detected TeV wind nebula. Bottom: Simplified view with all firm (HGPS and external) identifications and positively rated candidates displayed with the same symbol, and negative candidates removed. The figures are reproduced from H.E.S.S. Collaboration {\em et al.}\ 2017$^1$, but the sizes of the symbols are scaled with $\log{L_{1-10\,\mathrm{TeV}}}$} here. \label{fig:pwn_galaxy} \end{figure} \section{Census of PWNe around high-$\dot{E}$ pulsars} Of the 17 most energetic ATNF pulsars, with a spin-down power of $\dot{E} \geq 10^{37}\eh{erg\,s^{-1}}$, 11 have either an identified TeV wind nebula (9) or candidate (2) featured in the present study. Of the remaining 6, \begin{itemize} \item 3 are included in Table~5 in H.E.S.S. Collaboration {\em et al.} 2017 \cite{pwnpop}, where all flux limits of pulsars without detected PWN are listed; \item 3 are out of the range of the HGPS: \begin{itemize} \item PSR J2022+3842: SNR~G076.9+01.0, contains an X-ray PWN; not reported in TeV \item PSR J2229+6114: Boomerang, contains an X-ray PWN; detected by MILAGRO and VERITAS, but of unclear nature in TeV \item J0540$-$6919: In the Large Magellanic Cloud; a limit is given in H.E.S.S. Collaboration {\em et al.}\ 2015 \cite{hess_lmc_science}. \end{itemize} \end{itemize} Concluding, only 5 of the 17 highest-$\dot{E}$ pulsars remain without a detected potential counterpart in the TeV band. \section{PWN evolution} Figures~5 to 10 in H.E.S.S. Collaboration {\em et al.} 2017 \cite{pwnpop}\ show, like \fref{fig:lum_ext} and \fref{fig:sb_off} in this proceedings paper, a variety of trends between pulsar and TeV wind nebula parameters, and consistently compare them to a simple one-zone time-dependent emission model of the TeV emission with a varied range of model input parameters. The main conclusion is that for several observables, a trend was found in the data that is consistent with the trends suggested by our model. With a moderate variation of the model input parameters, we can mimic also the spreads of the observables. Our first-order understanding of the evolution of TeV pulsar wind nebulae with ages up to some tens of kiloyears therefore seems to be compatible with what the whole population of detected and undetected PWNe suggests. More concretely, using the flux limits for undetected PWNe, we find evidence that the TeV luminosity of PWNe decays with time while they expand in size, preventing the detection of those whose pulsar has dropped below a spin-down of $\sim 10^{36}\eh{erg\,s^{-1}}$ (roughly corresponding to several tens of kiloyears). This was implicitly known before from the mere non-detection of old TeV pulsar wind nebulae, but for the first time could be put into a quantitative perspective, both by fitting data and limits, and by comparing the data to model predictions. The power-law relation between TeV luminosity and pulsar spin-down could be estimated as $L_{1-10\,\mathrm{TeV}}\sim\dot{E}^{0.58\pm0.21}$, in consistency with the model, which suggests a power index of around $0.5$. \begin{figure} \begin{minipage}{0.48\linewidth} \centerline{\includegraphics[width=1.0\linewidth]{luminosity_edot}} \end{minipage} \hfill \begin{minipage}{0.48\linewidth} \centerline{\includegraphics[width=1.0\linewidth]{extension_age}} \end{minipage} \caption[]{Left: Relation of TeV luminosity and pulsar $\dot{E}$. Right: PWN extension evolution with time, in comparison to the modelling considered in this work. The figures are reproduced from H.E.S.S. Collaboration {\em et al.} 2017 \cite{pwnpop}.} \label{fig:lum_ext} \end{figure} Another feature that was discussed on some individual objects before (e.g. \cite{hess_j1825_detection}) is the ``crushing" of PWNe, which can be exerted by the inward-bound reverse front of the supernova shock wave. For SNRs that develop asymmetrically, for instance due to an inhomogeneous surrounding medium, this crushing may result in distortion and displacement of the wind nebula. A very bright, very extended example of this is HESS~J1825$-$137, also presented at this conference \cite{alison_j1825}. Put to a population-scoped context, it becomes clear that pulsar proper motions alone are not sufficient to explain the large offsets observed, and some kind of a crushing mechanism may indeed be the dominant and frequent cause of pulsar-PWN offset in middle-aged systems. Furthermore, the offsets of PWNe from their pulsars appear to relate to high efficiency (\fref{fig:sb_off}, right), suggesting that the PWNe either gain energy and brightness through the process that causes the offset or that dense surroundings amplify both the IC luminosity and the offset between pulsar and wind nebula. While the evidence for this at present is not very strong, following up with expanded future studies is certainly worthwhile. The expansion of PWNe with time was also shown to be evident in the data. The fitted relation $R\sim\tau\tin{c}^{0.55 \pm 0.23}$ suggests an average expansion coefficient in between those expected in theory ($1.2$ and $0.3$). The data set is not comprehensive enough to do a fit with two power laws, but appears to be consistent with the model (\fref{fig:lum_ext}, right). Notably, this expansion is not so clear in X-rays, where the synchrotron emission always remains very local because it only traces the young particles in areas of high magnetic field relatively close to the pulsar. Most of the old objects ($>30\eh{kyr})$ are therefore smaller than $1\eh{pc}$ in their bright X-ray core emission. As a consequence of the two moderate correlations of luminosity and spatial extent with pulsar $\dot{E}$, a stronger correlation was found between the PWN surface brightness and pulsar $\dot{E}$ (\fref{fig:sb_off}, left). What stands out is not only the correlation itself, but also its relatively low scatter. \begin{figure} \begin{minipage}{0.48\linewidth} \centerline{\includegraphics[width=1.0\linewidth]{surf_br_edot}} \end{minipage} \hfill \begin{minipage}{0.48\linewidth} \centerline{\includegraphics[width=1.0\linewidth]{efficiency_offset_age_sorted}} \end{minipage} \caption[]{Left: Relation of TeV surface brightness and pulsar $\dot{E}$. Right: TeV efficiency as a function of pulsar offset, plotted for pulsars of different age groups. High-offset systems tend to be more TeV-efficient than low-offset systems. The figures are reproduced from H.E.S.S. Collaboration {\em et al.} 2017 \cite{pwnpop}.} \label{fig:sb_off} \end{figure} The evolution trend of the photon index remains an open issue at present. Neither the data nor the model are particularly clear about it for the young to middle-aged PWNe we investigated. \section{Detection biases} Since both the H.E.S.S. Galactic Plane Survey\ and the ATNF pulsar database only cover a fraction of the Milky Way, depending on TeV and pulsar brightnesses, the study in H.E.S.S. Collaboration {\em et al.} 2017 \cite{pwnpop}\ suffers from several selection biases discussed throughout the paper. For TeV-bright, high-$\dot{E}$, young pulsar systems ($>10^{36}\eh{erg\,s^{-1}}$) we achieve a relatively good coverage, whereas for systems beyond some tens of kiloyears of age we likely miss many sources. In the plots discussing flux-related quantities, this is partly compensated by the inclusion of flux limits, allowing for statements that consider the presence of non-detections. For extension- and position-related quantities, however, we can only rely on the detected cases. It would require a full population synthesis study to judge whether some of the correlations are genuine or include side effects of other correlations or selection biases. This usually needs many astrophysical assumptions and theoretical suppositions, which was beyond the scope of this experimental paper. One presumably very influential parameter ignored in this study is the density of matter and background light at the position of each pulsar. It is likely due to such circumstances that 3C\,58, CTA~1 and {Vela\,X}, also presented at this conference \cite{luigi_velax} are so faint (see \fref{fig:pwn_galaxy}), and {N\,157B}\ (in the Large Magellanic Cloud) is so bright. In the scope of a population synthesis study, one could use a specific Milky Way model to ``calibrate" the calorimetric objects that TeV pulsar wind nebulae are assumed to be. \section{Modelling} On the modelling side, we are able to describe the trends and scatter of the TeV properties of the present PWN population with a relatively simple time-dependent modelling described in Appendix A of H.E.S.S. Collaboration {\em et al.} 2017 \cite{pwnpop}\ and whose basic evolution is displayed in \fref{fig:model}. Its $12$ free parameters ($7$ of which were varied for the \emph{varied model}) were well below the $4\times 19$ observed parameters that the firmly identified PWNe provided. It is remarkable that the adaptive parameters needed to be varied in a fairly small range, compared to what one may fathom from the modelling literature, while still producing sufficient scatter in the predicted observables. Whether this indicates that the variations of the individual PWN parameters are indeed small, or whether this is an effect of the parameters being (anti-)correlated (see caveats discussion in A.7 of H.E.S.S. Collaboration {\em et al.} 2017 \cite{pwnpop}), could not be clarified in this work. It might require a deeper physical model of the pulsars and possibly a multidimensional likelihood fit to correctly quantify all correlations and identify the true distributions of its parameters. \begin{figure} \begin{minipage}{0.48\linewidth} \centerline{\includegraphics[width=1.0\linewidth]{general_evolution_plot}} \end{minipage} \hfill \begin{minipage}{0.48\linewidth} \centerline{\includegraphics[width=1.0\linewidth]{general_composition_plot}} \end{minipage} \caption[]{Modelled spectral energy distribution (SED) of a generic PWN according to the model given in \cite{pwnpop}, Appendix A. Left: Time evolution of the SED, ranging from $1\eh{kyr}$ to $200\eh{kyr}$. Right: Decomposition of the SED of a middle-aged PWN ($10\eh{kyr}$; black dashed curve) into contributions by leptons from various injection epochs (coloured lines). The grey-shaded bands indicate the energy range of $1$--$10\eh{TeV}$ explored in this work. The figures are reproduced from H.E.S.S. Collaboration {\em et al.} 2017 \cite{pwnpop}. } \label{fig:model} \end{figure} \section{Outlook} In the CTA era, many of the PWNe that will be detected in addition to the now assessed population will be middle-aged and old systems that are too faint or too extended to be detected with current instruments. Also, improvements in the radio and gamma-ray band coverage will enlarge the sample of pulsars detected in our Galaxy. To gain new insights from studying these systems, a solid and publicly available modelling code is needed that includes the difficult reverse shock interaction phase of a PWN in a reproducible way. This may help to understand the effect and influence of the amount of crushing and pulsar offset of the PWN, which is likely an influential factor of later PWN evolution. On the analysis side, it would be beneficial to (i) improve the angular resolution and get to smaller scales of extension, (ii) find ways to reliably disentangle overlapping sources and their spectra, and (iii) aim for detecting objects larger than the IACT camera FOV. It is only if this is improved that larger datasets and more exposure can help us to unriddle sources that are closeby or occult each other in the densely populated arms of the Galaxy. \section*{Acknowledgments} \small The support of the Namibian authorities and of the University of Namibia in facilitating the construction and operation of H.E.S.S. is gratefully acknowledged, as is the support by the German Ministry for Education and Research (BMBF), the Max Planck Society, the German Research Foundation (DFG), the French Ministry for Research, the CNRS-IN2P3 and the Astroparticle Interdisciplinary Programme of the CNRS, the U.K. Science and Technology Facilities Council (STFC), the IPNP of the Charles University, the Czech Science Foundation, the Polish Ministry of Science and Higher Education, the South African Department of Science and Technology and National Research Foundation, the University of Namibia, the Innsbruck University, the Austrian Science Fund (FWF), and the Austrian Federal Ministry for Science, Research and Economy, and by the University of Adelaide and the Australian Research Council. We appreciate the excellent work of the technical support staff in Berlin, Durham, Hamburg, Heidelberg, Palaiseau, Paris, Saclay, and in Namibia in the construction and operation of the equipment. This work benefitted from services provided by the H.E.S.S. Virtual Organisation, supported by the national resource providers of the EGI Federation. \normalsize
\section{Introduction} Within the coming years spectroscopy will likely be employed to identify molecules that are indicative of life in the atmosphere of exoplanets\cite{seager2016a}. In the context of the search for extraterrestrial life, it is useful to establish the necessary conditions for life to be present for such observations. Broadly speaking this relies upon two ingredients. The first is an unknown quantity -- the fraction of planets on which life begins. The causes of the emergence of life on Earth are not understood, and thus we do not have a complete theory for predicting where life may begin elsewhere. The second is the probability that life has persisted from its inception to observation. In this work we will show that this is highly likely, as events which could lead to life being completely eradicated are rare. To establish this we break from the usual study in the literature\cite{ruderman1974a,chapman1994a,dar1998a,beech2011a,piran2014a} of the possible paths to ending human life, and broaden the analysis to consider those astrophysical events which could rather remove all life by analysing the most resilient of species -- tardigrades. Tardigrades can survive for a few minutes at temperatures as low as -272$\;^\circ\text{C}\;$ or as high as 150$\;^\circ\text{C}\;$, and -20$\;^\circ\text{C}\;$ for decades\cite{hengherr2009a,tsujimoto2016a}. They withstand pressures from virtually 0 atm in space\cite{jonsson2008a} up to 1200 atm at the bottom of the Marianas Trench\cite{seki1998a}. They are also resistant to radiation levels $\sim 5000-6200 \; \text{Gy}$\cite{hashimoto2016a}. For complete sterilisation we must establish the necessary event to kill all such creatures. We consider three types of astrophysical events which could constitute a threat to the continuation of our chosen life forms: large asteroid impact, supernovae (SNe), and gamma-ray bursts (GRBs). GRBs and SNe can be deadly due to the lethal doses of radiation and in particular the shock wave associated with the burst. Radiation can cause the depletion of the ozone layer, removing the shield that protects us from cosmic radiation\cite{ruderman1974a,ellis1995a,thorsett1995a}. The effects of gamma-ray bursts (GRBs) on humans and land-based life could be disastrous as the eradication of the ozone layer would leave us exposed to deadly levels of radiation\cite{ruderman1974a}. However, in such circumstances life could continue below the ground. Significantly, several marine species would not be adversely affected, as the large body of water would provide shielding. Even the complete loss of the atmosphere would not have an effect on species living at the ocean's floor. The impact of a large asteroid could lead to an ``impact winter'', in which the surface of the planet receives less sunlight and temperatures drop. This would prove catastrophic for life dependent on sunlight, but around volcanic vents in the deep ocean life would be unaffected. Similarly, an increase in pressure, or acidity spread across the entirety of the (deep) ocean is an unlikely scenario for extinction. The physical processes by which ocean pressure could significantly increase involve increasing planetary mass; such impacts would first lead to extreme heating. Even following extreme events, spreading acidity through the entire ocean is unlikely. The removal of the atmosphere would also lead to mass extinction. However, following such an event the remaining ocean water would form a new atmosphere below which oceans could still form. The energy requirements for total sterilisation of the planet through atmospheric removal are significantly greater than those for boiling the oceans, so the threat of atmospheric removal is contained within that of oceans boiling. We are therefore led to consider death due to heat or radiation. \section{Analysis} To raise the entire ocean temperature by $T$ requires a deposit of $E=M_o \mathcal{C} T$ wherein $M_o$ is the ocean mass and $\mathcal{C}$ the specific heat capacity of water. In order to increase the temperature of the entirety of the Earth's oceans we need to introduce a large amount of thermal energy. The total mass of water in the oceans is around $1.35 \times 10^{21} \; \text{kg}$. The specific heat capacity of water is $4184 \; \text{J}\,\text{kg}^{-1}\,^\circ\text{C}^{-1}$ so we require $5.6 \times 10^{24} \; \text{J}$ to raise the ocean temperature by 1$\;^\circ\text{C}\;$. Thus the tardigrade with a tolerance of up to 100$\;^\circ\text{C}\;$ would survive until around $5.6\times 10^{26} \; \text{J}$ were deposited into the ocean. This is a lower bound -- such heat would not be evenly distributed, being it most likely to be deposited in the upper ocean. To provide a conservative bound, we seek to minimise the depth of the deepest ocean on any planet -- a uniform distribution of oceans across the planet's surface. When ocean mass is small compared to that of the planet, the depth of the ocean is approximately \begin{equation} D= \frac{\alpha \rho^{2/3} M_p^{1/3}}{(36\pi)^{1/3} \rho_w}. \end{equation} Here $\rho= 3M_p/(4\pi R_p^3)$ is the average planet density, $\alpha$ the fraction of the mass in ocean (on Earth $M_o \approx 2.3 \times 10^{-4} M_\Earth$) and $\rho_w$ the density of water. Most of Earth's water is contained within rocks. To remain conservative, we consider only the mass of liquid water in the oceans. There may exist planets that are almost entirely water ($\alpha \approx 1$), however for life as we know it, we focus on Earth-like planets with oceans on the surface of a rocky planet. We give these explicitly as we will assume they are broadly unchanged between planets. For the Earth, this implies that there must be an ocean of at least 2.5 km in depth. This is far shallower than the deepest points, however it will constitute a lower bound. The intensity of gamma rays is attenuated by interaction with matter by a factor $\exp\left(-\mu D\right)$, wherein $D$ is the depth and $\mu$ the attenuation coefficient. This varies based on the material and the frequency of the incident radiation. The tardigrade is capable of withstanding over 6000 Gy (enough to endow every kilogram of material with 6000 J of energy). If the ocean depth is greater than $\frac{1}{\mu} \log(700)$ (the latter figure being the ratio of the energy deposit per unit mass required to boil water to that to kill a tardigrade) the water above will be boiling. In fact, if we consider a sufficient radiative flux to kill a tardigrade at depth $D$, the total energy deposited upon the planet is at least $E = \frac{6000 \pi R_p^2 }{\mu} (e^{\mu D} - 1)$. If our oceans are more than a few metres deep, this exceeds the threshold energy at which the oceans would boil before radiation would kill the tardigrade. We therefore consider temperature increase as the primary source of sterilisation. Large asteroids are the leading candidate for causing of the Cretaceous-Tertiary extinction which took place 65 million years ago, annihilating approximately 75\% of species on the planet leaving the Chicxulub crater. This event devastated larger land animals. Of those with masses over 25 kg only a few ectothermic species survived. However, around 90\% of bony fish species survived\cite{kriwet2004a} and deep ocean creatures were largely unaffected by the event. We estimate an upper bound for the energy deposited by an asteroid of mass $M_a$ as being its free-fall energy from infinity to the surface of the planet $E = 1 / 2 M_a (v_\infty^2 + v_e^2)$, where $v_e = \sqrt{2 G M_p / R_p}$ is the escape velocity of the planet ($v_e \approx 11.2 \; \text{km}\,\text{s}^{-1}$ for Earth), and $v_\infty$ is given by \"Opik's close encounter theory\cite{opik1976a}. In order to raise the ocean's temperature by $T$, we require an asteroid of mass \begin{equation} M_a = \frac{2 \alpha \mathcal{C} T}{v_\infty^2 + v_e^2} M_p. \end{equation} To annihilate tardigrades on Earth we require a mass over $\sim 1.7 \times 10^{18} \; \text{kg}$. The largest observed asteroids in the Solar System are Vesta and Pallas, with masses of $2.7 \times 10^{20} \; \text{kg}$ and $2.2 \times 10^{20} \; \text{kg}$ respectively. There are only 17 other known asteroids of sufficient mass, and a few dwarf planets, the most massive ones being Eris and Pluto, whose masses are $1.7 \times 10^{22} \; \text{kg}$ and $1.3 \times 10^{22} \; \text{kg}$ respectively. We reiterate that our estimate of the required energy is conservative -- it is likely that it would take a significantly more massive impact as ocean heat would only be a fraction of the total energy. Since we consider Earth-like planets, the order of magnitude of this mass does not vary greatly between the largest and smallest planets -- if oceans constitute an equal fraction of mass this changes by less than an order of magnitude. In figure~\ref{fig:asteroids} we present a model for the impact rate of asteroids as a function of the mass. This is based on the extrapolation of relation between crater diameter and impact rate\cite{hergarten2015a}. The mass of the object is related to crater diameter following Ref.\cite{collins2005a}, assuming asteroids with density $\rho \sim 5 \; \text{g}\,\text{cm}^{-3}$ entering the atmosphere with incidence angle of 90$^\circ$ with respect to the normal. In reality, most asteroids have $\rho \approx 2 \; \text{g}\,\text{cm}^{-3}$, and in the case of comets this value is even lower, being the value here assumed a conservative assumption. This is highly dependent on the asteroid distribution in our Solar System -- we assume in the absence of other evidence, that other systems are similar, however this remains to be verified. \begin{figure} \includegraphics[width=\columnwidth]{Asteroids-ImpactRate.eps} \caption{The cumulative impact rate per year for different masses of asteroids. This follows the parameterisation given in Ref.~\cite{bland2006a} up to $M = 10^{15} \; \text{kg}$; for $M > 10^{15} \; \text{kg}$ the impact rate is inferred following Ref.~\cite{hergarten2015a}. Dashed vertical lines indicate the minimum mass needed for complete sterilisation assuming a typical asteroid with density ($\rho = 2000 \; \text{kg/m}^3$). The lower bound ($m_1$) is that which could cause boiling of the oceans if the entirety of its energy were converted into heat spread homogeneously throughout the Earth's oceans. The upper bound ($m_2$) is the mass of an asteroid whose impact crater is equal to the size of the planet, causing complete destruction. Here we find that even with the most conservative bound, the likelihood of complete sterilisation is lower than around $10^{-5}$ over the lifetime of the planet.} \label{fig:asteroids} \end{figure} The bulk of the energy output of a supernova is carried by the shock wave. To give an upper bound on the range at which a supernova would remove all life from the planet, we assume that the shock wave carries all the energy released. The fraction of energy incident on a planet of radius $R_p$ at a distance $d$ from the supernova is given by the fraction of the sphere of radius $d$ which is covered by the planet's surface $\frac{\pi R_p^2}{4 \pi d^2}$. To raise the temperature of a planet by $T$, we would require a supernova within a distance $d$ given: \begin{equation} d_{SN} = \left(\frac{3}{32 \pi M_p^{1/2} \rho} \right)^{\frac{1}{3}} \left( \dfrac{E_s}{\alpha \mathcal{C} T} \right)^\frac{1}{2} \end{equation} For the Earth, this sterilisation distance is around 0.04 pc, far closer than the closest stars, Proxima Centauri. Were a supernova to occur at that distance, the ocean temperature would only rise by about 0.1$\;^\circ\text{C}\;$. Furthermore, although there is a dependence on the mass of the planet, this dependence is quite weak. Note that none of the stars in the Alpha Centauri system are large enough to go supernova. The nearest potential supernova is the IK Pegasi system, approximately 45 pc away, which is three orders of magnitude farther than the estimated sterilisation radius. To assess the relative risk faced by any planet in our galaxy, we approximate the odds of a close enough supernova happening over a timespan of $10^9$ years. We find the expected number of stars of sufficient mass within the sterilisation distance of a planet, and the odds that one of these stars goes supernova. The galactic habitable zones, regions wherein complex life may evolve, depends on the occurrence rate of supernovae. A detailed simulation-based study was done by Lineweaver {\it et al.}\cite{lineweaver2004a}. We evaluate the rate of SN at a position $(r, z)$ (cylindrical coordinates) as follows: \begin{equation} P_{SN}(r,z) = \chi \int_{M_{min}}^{M_{max}} dm \, \xi(m) n_\star(r,z) \tau^{-1}(m), \end{equation} with $n_\star$ being the number density of stars~\cite{juric2008a}. Following Ref.\cite{juric2008a} we select $M_{min}=8M_\odot$ and $M_{max}=25M_\odot$ for supernova progenitors. $\xi(m)$ and $\tau^{-1}(m)$ are respectively the initial mass function and the lifetime of a star of mass $m$. This is normalised to the global supernova rate in the Milky Way\cite{tammann1994a}. The rate of supernovae explosions within the sterilisation radius (0.04 pc) over 1 billion years is shown in figure~\ref{fig:SNrates}, for differing galactic locations. \begin{figure} \includegraphics[width=\columnwidth]{GHZ-SNRates-Death.eps} \caption{The expected number of supernovae within the sterilisation sphere of radius 0.04 pc per Gyr as a function of galactic position. The black circle indicates the position of the Solar System. Closer to the galactic centre, the stellar density is higher, and thus the likelihood of encountering a nearby supernova increases. However, this density is only sufficient to give a total rate of around 0.01 expected events per billion years, and thus total sterilisation through supernovae is still an improbable event.} \label{fig:SNrates} \end{figure} Because the nearest star is about 1.3 pc away, we can conclude that Earth is located in a fortunate position. Near the galactic centre the density of stars increases and the probability of a SN sterilising life is higher. Nonetheless, this rate is almost insignificant even close to the galactic core, reaching only around 1\% of planets being sterilised. The calculation for GRBs is similar to the one for SNe, but now we have to assume that the energy is collimated into in jets. As before, we assume the most pessimistic scenario -- the smallest jet angle with the largest energy. The energy is typically the same as that of a supernova, $10^{44} \; \text{J}$, but the jet angles can be as low as $2^\circ$, hence the energy incident on a target of radius $r$ which lies entirely within the beam angle at a distance $d$ is: \begin{equation} E = E_{GRB} \frac{\pi r^2}{\Omega d^2} = \frac{10^{62 } r^2}{d^2} \;\text{J} \end{equation} Hence for an increase of 100$\;^\circ\text{C}\;$ in the ocean temperatures, we would need a GRB within about 13.8 pc; again, this is an upper limit. The rate of occurrence of short GRBs per volume in the universe is $0.04 \; \text{Gpc}^{-3} \; \text{yr}^{-1}$, and long GRBs is $0.15 \; \text{Gpc}^{-3} \; \text{yr}^{-1}$\cite{piran2014a}. We will restrict these occurrences to within galactic discs of stars, therefore we divide this by the product of the comoving number density of galaxies ($\approx 10^{7} \; \text{Gpc}^{-3}$) and the volume occupied of the galactic disc ($10^{11} \: \text{pc}^3 $), we find that the rate is around $2\times 10^{-10} \; \text{pc}^{-3} \; \text{Gyr}^{-1}$, and hence the probability of a GRB within the a distance at which it would sterilise a planet, aligned such that one of the beams hit the planet is $3.2 \times 10^{-10} \; \text{Gyr}^{-1}$. This number is extremely small and we can conclude that such event is unlikely. Planetary systems can also be disrupted by passing-by stars. The rate, $R$, of such encounters for a given stellar density, $n_\star$, is \begin{equation} R = n_\star \sigma v, \end{equation} where $\sigma$ is the cross section to disrupt the orbit of the planet, and $v$ the velocity of the star. Typically, $v \approx 40 \; \text{km s}^{-1}$. In the neighbourhood of the Solar System $n_\star \sim 10^{-3} \; \text{pc}^{-3}$~\cite{juric2008a}. In the case of Earth~\cite{laughlin2000a}, $\sigma \sim 10^{-9} \; \text{pc}^{2}$. Therefore, the rate of interactions of stars and the Earth-Sun system would be $R \sim 3\times 10^{-8} \; \text{Gyr}^{-1}$. If we repeat this calculation for the average stellar density in the galaxy, which is $\sim 0.1 \; \text{pc}^{-3}$, the rate would be increased to $\sim 10^{-6} \; \text{Gyr}^{-1}$. This number is an upper bound -- we expect that only a fraction of systems that experience disruption would eject a planet -- yet it is still extremely small and we can conclude that ejection by this mechanism is a very rare event. \section{Discussion} Our analysis has focussed on providing an absolute upper bound for the rate of complete sterilisation of an Earth-like planet during its evolution, by considering the required events that would lead to the death of the hardiest species on Earth. With such assumptions, we find that the probability is less than $10^{-7}$ per billion years. The overall likelihood of complete sterilisation is small even for planets which could exist around dwarf stars for ten trillion years, the most likely time for life to find itself\cite{loeb2016a}. For asteroids the impact rate of deadly objects is $\lesssim 10^{-5} \; \text{Gyr}^{-1}$. Eventually the evolution of the host star will render a planet sterile, either through expansion to the point of oceans boiling, or through a post-collapse freezing. There is a third scenario, where life continues around geothermal vents on a rogue planet until capture by a new host system, or the source of heat is extinguished. The time scale for the former is conservatively bounded by the rate of disruption of planetary systems by wandering stars, being therefore $\sim 30 \; \text{Myr}$ in regions with density of stars comparable to the vicinity of the Solar System; the time scale for the latter depends on properties of the planet, but are of the order of billion years. Consequently, life could perdure on a rogue planet long enough for it to be recaptured. We do not fully understand the mechanisms by which life started, but once it exists on an Earth-like planet, the complete removal of all life (other than through evolution of the host star) is a very unlikely event. In this analysis we have considered only direct effects of astrophysical events such as the direct boiling of oceans; however such events could serve as a trigger for a second change. An example of this is the runaway greenhouse effect~\cite{goldblatt2015a} in which a less energetic event could evaporate a fraction of the ocean, which in turn leads to increased temperatures. Such an occurrence would have a lower threshold energy, as total evaporation of the oceans is no longer necessary; however the precise details of such an event are not known. As an upper bound, we can presume that this would have to increase global temperatures by a larger amount than seasonal variations and changes in solar output. In essence this would reduce our energy threshold by about two orders of magnitude, still leaving such an occurrence very rare. Throughout this analysis we have made several assumptions, the primary being that life elsewhere will be similar to that found on Earth. To justify this assumption, we consider that when searches are conducted for exoplanetary life, the template used is that of life on Earth. We make the further assumption that life will evolve to adapt to the extreme environments of exoplanets as it has to those on Earth. Again, we justify this by the ubiquity of life across environmental conditions. Finally, we note that the type of life we expect to survive all but the most extreme of events is that which could survive elsewhere in our own solar system. The history of Mars indicates that it had an atmosphere\cite{jakosky2015a} that could have supported life, albeit in conditions that on Earth would be considered inhospitable, with both the \emph{Mars 2020} and \emph{ExoMars} programs aiming for experimental verification. Organisms with similar tolerances to radiation and temperature such as tardigrades would be the only kind of life that could survive long-terms in such conditions, and even then they would have to be significantly below the surface. The subsurface oceans that are posited to exist on Europa and Enceladus would have conditions similar to the deep oceans of Earth where taridgrades are found - volcanic vents providing heat in an environment devoid of light. The presence of extremophiles in the locations would be a significant step in narrowing the question of life starting on exoplanets. \section*{Acknowledgements} D.S. and R.A.B. acknowledge the financial support from the John Templeton Foundation. \section*{Author contributions statement} \noindent The idea of this work was conceived by A.L. \noindent D.S. and R.A.B. contributed equally to the analysis of results, with some input from A.L. D.S. did most of the writing, with aid of R.A.B. Figures were produced by R.A.B. \noindent A.L. was responsible for the scope and accuracy checking of the analysis. \section*{Additional information} The authors declare no competing financial interest. \bibliographystyle{unsrt}
\section{Introduction} Narrow-gap semiconductors having conduction and valence bands of opposite parity, like Pb$_{1-x}$Sn$_{x}$Te and Pb$_{1-x}$Sn$_{x}$Se, or orbital character, as Hg$_{1-x}$Cd$_x$Te, may undergo band inversion under compositional variation. It is feasible to grow heterojunctions (for instance, PbTe/Pb$_{1-x}$Sn$_{x}$Te with $x>0.36$, PbSe/Pb$_{1-x}$Sn$_{x}$Se with $x>0.14$ or HgTe/CdTe) where the fundamental gap, defined as the difference between the band-edge energy of the bands with a given orbital character or parity, has opposite sign on each semiconductor. Such band-inverted junctions received much attention because a treatment of the simplest two-band approximation predicted the occurrence of midgap subbands of electron-like and hole-like interface states~\cite{Volkov85,Korenman87,Agassi88,Pankratov90}. These midgap subbands were found to be gapless with linear dispersion, resembling a two-dimensional Dirac cone. Band inversion is an essential ingredient in topological insulators. Consequently, since the advent of the topological band theory there is a renewed interest in band-inverted junctions made of II-VI and IV-VI compound semiconductors \cite{Hasan2010,Bansil2016}. In 2006, Bernevig \emph{et al.}~\cite{Bernevig06} studied theoretically the confined states in HgTe/CdTe quantum wells. HgTe is an inverted-band material and CdTe is a normal-band one, so interface states are expected at each junction. Additionally, varying the thickness of the HgTe layer leads to an inversion of the quantum-well hole-like and electron-like subbands. They predicted the occurrence of a topological phase transition at a critical value of the thickness of the quantum well, giving rise to the concept of topological insulator~\cite{Shen12,Bernevig13}. Such prediction was experimentally confirmed shortly afterwards \cite{Konig07}. In this paper we study interface states in a band-inverted quantum well of IV-VI semiconductors using a two-band model when an external electric field is applied along the growth direction. We do not consider the quantum-well states confined in the middle layer; rather, we concentrate in the behavior of the interface states, which present a linear dispersion relation in single heterojunctions. Our main results can be summarized as follows: (i)~In contrast to the single junction, the dispersion relation is quadratic in the interface momentum and a gap opens. (ii)~Gap opening arises from the coupling between the Dirac cones of the two interfaces due to the finite width of the quantum well. Most importantly, (iii)~the interface gap shrinks upon increasing the electric field, so that its magnitude can be substantially modified in experiments. Thus, the electric field can be considered as an external way to modify the coupling of the interface states. \section{Theoretical model} \label{sec:model} The two-band model is a reliable approach to obtain the electron states near the band edges in narrow-gap IV-VI semiconductors, for which the coupling to other bands is negligible \cite{Melngailis72,Burkhard79,Agassi88,Assaf16}. It can even be applied to certain III-V semiconductors if such band coupling is small \cite{Zawadzki11}. The electron wave function is written as a sum of products of band-edge Bloch functions with slowly varying envelope functions. The corresponding envelope function ${\bm\chi}({\bm r})$ is a four-component column vector composed by the two-component spinors ${\bm\chi}_{+}({\bm r})$ and ${\bm\chi}_{-}({\bm r})$ belonging to the two bands. Electron states near the band edges are determined from the Dirac-like equation $\mathcal{H}{\bm\chi}({\bm r})=E{\bm\chi}({\bm r})$ with~\cite{Agassi88,Pankratov90} \begin{equation} \mathcal{H}=v_{\bot}{\bm\alpha}_{\bot}\cdot{\bm p}_{\bot}+v_z\alpha_z p_z +\frac{1}{2}\,E_{\mathrm{G}}(z)\beta+V_{\mathrm C}(z)\ , \label{eq:01} \end{equation} where the $Z$ axis is parallel to the growth direction $[111]$. It is understood that the subscript $\bot$ in a vector indicates the nullification of its $z$-component. $E_{\mathrm{G}}(z)$ denotes the position-dependent gap and $V_{\mathrm C}(z)$ gives the position of the gap center. ${\bm\alpha}=(\alpha_x,\alpha_y,\alpha_z)$ and $\beta$ denote the usual $4\times 4$ Dirac matrices \begin{equation*} \alpha_i=\begin{pmatrix} \mathbb{0}_2 & \sigma_i \\ \sigma_i & \mathbb{0}_2 \end{pmatrix} \ , \quad \beta=\begin{pmatrix} \mathbb{1}_2 & \mathbb{0}_2 \\ \mathbb{0}_2 & -\mathbb{1}_2 \end{pmatrix} \ , \quad i=x,y,z\ , \end{equation*} $\sigma_i$ being the Pauli matrices, and $\mathbb{1}_n$ and $\mathbb{0}_n$ are the $n\times n$ identity and null matrices, respectively. Here $v_{\bot}$ and $v_z$ are interband matrix elements having dimensions of velocity. Although they may be different in general, we assume isotropic semiconductors and define $v=v_{\bot}=v_z$ hereafter. In order to keep the algebra as simple as possible, we restrict ourselves to the symmetric situation with same-sized and aligned gaps [$V_\mathrm{C}(z)=0$]. This is not a serious limitation but the calculations are largely simplified. Thus, a single and abrupt interface presents the following profile for the magnitude of the gap \begin{equation} E_{\mathrm{G}}(z)=2\Delta\sgn(z)\ , \label{eq:02} \end{equation} where $\sgn(z)=\theta(z)-\theta(-z)$ is the sign function and $\theta(z)$ is the Heaviside step function. The envelope function decays exponentially with distance at each side ${\bm\chi}({\bm r})={\bm\chi}(z) \exp\big(i{\bm r}_{\bot}\cdot{\bm k}_{\bot}\big)$ with~\cite{Adame94} \begin{subequations} \begin{equation} {\bm\chi}(z)\sim\exp\left(-\,\frac{|z|}{d}\right)\ , \qquad d=\frac{\hbar v}{\Delta}\ , \label{eq:03a} \end{equation} and the dispersion is linear in the interface momentum (see, e.g., Ref.~\cite{Pankratov90}) \begin{equation} E({\bm k}_{\bot})=\pm\hbar v|{\bm k}_{\bot}|\ . \label{eq:03b} \end{equation} \label{eq:03} \end{subequations} \section{Quantum well with band inversion} \label{sec:unbiased} For completeness, in this section we present and discuss the salient features of a quantum well of width $2a$ with band-inversion in the absence of an applied electric field. We introduce an alternative derivation of the interface states, although the final results agree with those obtained in Ref.~\cite{Korenman87}. Assuming that the interface states spread over distances much larger than the interface region, we can consider an abrupt profile for the two band-inverted junctions forming the quantum well. Therefore, the gap profile is now given by \begin{equation} E_{\mathrm{G}}(z)=2\Delta\Big[1-2\theta(z+a)+2\theta(z-a)\Big]\ , \label{eq:04} \end{equation} as depicted in Figure~\ref{fig0}, where we have taken the inverted semiconductor embedded in the non-inverted one. \begin{figure} \centerline{\includegraphics[width=0.5\columnwidth]{figure0.png}} \caption{$L_6^{+}$ and $L_6^{-}$ band-edge profile of two band-inverted junctions with aligned and same-sized gaps, located at the $XY$ plane. The distance between the junctions is $2a$ and the magnitude of the gap is $2\Delta$.} \label{fig0} \end{figure} Electronic states of the Hamiltonian~(\ref{eq:01}) can be addressed with the aid of the Feynman-Gell-Mann \textit{ansatz} as follows~\cite{Feynman58} \begin{equation} {\bm\chi}(z)\!=\!\Big[\hbar v \Big(\! -i\alpha_z \frac{d\phantom{z}}{dz} +{\bm\alpha}_{\bot}\cdot{\bm k}_{\bot}\!\Big) +\frac{1}{2}\,E_{\mathrm{G}}(z)\beta+E\Big]{\bm\psi}(z)\ . \label{eq:05} \end{equation} Defining the following dimensionless quantities ${\bm\kappa}={\bm k}_{\bot}d$, $\xi=z/d$, $\xi_0=a/d$, $\varepsilon=E/\Delta$, and by applying the Hamiltonian~(\ref{eq:01}) to~(\ref{eq:05}), we obtain \begin{subequations} \begin{equation} \left[-\frac{d^2}{d\xi^2}+U(\xi)+\lambda^2\right]{\bm \psi}(\xi)=0\ , \label{eq:06a} \end{equation} with \begin{equation} U(\xi)=2i\beta\alpha_z \Big[\delta(\xi-\xi_0)-\delta(\xi+\xi_0)\Big]\ , \label{eq:06b} \end{equation} and \begin{equation} \lambda^2=\kappa^2+1-\varepsilon^2\ . \label{eq:06c} \end{equation} \label{eq:06} \end{subequations} We have used the anticommutation relations of the Dirac matrices and $d\theta(\xi)/d\xi=2\delta(\xi)$. We can find exactly the electron energy by means of the Green's function approach. To this end, we can treat the term $U(\xi)$ in Eq.~(\ref{eq:06a}) as a perturbation. The retarded Green's function for the unperturbed problem satisfies \begin{subequations} \begin{equation} \left[-\frac{\partial^2}{\partial \xi^2}+\lambda^{2}\right] \mathcal{G}_{0}^{+}(\xi,\xi^{\prime};\varepsilon)=\delta(\xi-\xi^{\prime})\mathbb{1}_4\ , \label{eq:07a} \end{equation} which can be factorized as $\mathcal{G}_{0}^{+}(\xi,\xi^{\prime};\varepsilon)=G_{0}^{+}(\xi,\xi^{\prime};\varepsilon)\mathbb{1}_4$ and it is understood that $\mathrm{Im}(\lambda^2)<0$. Since we are interested in midgap states, we consider $\mathrm{Re}(\lambda^2)>0$. The Green's function for the free particle problem is known to be~\cite{Economou06} \begin{equation} G_{0}^{+}(\xi,\xi^{\prime};\varepsilon)=\frac{1}{2\lambda}\exp\left(-\lambda|\xi-\xi^{\prime}|\right) \ . \label{eq:07b} \end{equation} \label{eq:07} \end{subequations} We can now apply Dyson's equation to obtain the complete Green's function $\mathcal{G}^{+}(\xi,\xi^{\prime};\varepsilon)$ associated to Eq.~(\ref{eq:06a}) as follows \begin{eqnarray} \mathcal{G}^{+}(\xi,\xi^{\prime};\varepsilon) & = & \mathcal{G}_{0}^{+}(\xi,\xi^{\prime};\varepsilon) + \int d\xi^{\prime\prime} \mathcal{G}_{0}^{+}(\xi,\xi^{\prime\prime};\varepsilon) \nonumber \\ & \times & U(\xi^{\prime\prime})\mathcal{G}^{+}(\xi^{\prime\prime},\xi^{\prime};\varepsilon) \ . \label{eq:08} \end{eqnarray} Dyson's equation~(\ref{eq:08}) can be exactly solved due to the simple expression of the potential term~(\ref{eq:06b}). The retarded Green's function $\mathcal{G}^{+}(\xi,\xi^{\prime};\varepsilon)$ is analytic in the lower half plane $\mathrm{Im}(\lambda^2)<0$. Thus, it may have simple poles when it is analytically continued to the upper half plane. After some straightforward algebra, the poles are obtained from the scalar Green's function by solving the following equation \begin{eqnarray} \Big[ 1 &-& 4G_{0}^{+}(\xi_0,\xi_0;\varepsilon)G_{0}^{+}(-\xi_0,-\xi_0;\varepsilon) \nonumber\\ &+&4G_{0}^{+}(\xi_0,-\xi_0;\varepsilon)G_{0}^{+}(-\xi_0,\xi_0;\varepsilon)\Big]^2 \nonumber\\ & = &4 \Big[ G_{0}^{+}(\xi_0,\xi_0;\varepsilon)-G_{0}^{+}(-\xi_0,-\xi_0;\varepsilon)\Big]^2\ . \label{eq:09} \end{eqnarray} Recalling Eq.~(\ref{eq:07b}), we get $\lambda^{2}-1+\exp(-4\lambda \xi_0)=0$. For not too narrow quantum wells and reverting the change of variables we finally are arrive at \begin{equation} E({\bm k}_{\bot})=\pm\sqrt{\hbar^2 v^2 k_{\bot}^2+\Delta^2 \exp\left(-4a/d\right)} \ . \label{eq:10} \end{equation} The dispersion is no longer linear and an interface gap of magnitude $2\Delta_{w0}$ opens, where \begin{equation} \Delta_{w0}=\Delta \exp\left(-2\,\frac{a}{d}\right)\ . \label{eq:11} \end{equation} The subscript $0$ refers to the absence of applied electric field. The gap is due to the coupling of the two interface states arising at the well boundaries. This finite-size effect turns the interface Dirac fermions massive \cite{Zhou2008,Lu2010}. \section{Quantum well under bias} \label{sec:biased} Now we turn to the interface states of a quantum well with band-inversion subjected to a uniform electric field ${\bm F}=-F\,\widehat{\bm z}$, following the approach introduced in Ref.~\cite{Diaz-Fernandez17}. The Dirac equation then reads $\big(\mathcal{H}-eFz\big){\bm\chi}({\bm r})=E{\bm\chi}({\bm r})$, where $\mathcal{H}$ is given in~(\ref{eq:01}). The Feynman-Gell-Mann \emph{ansatz}~(\ref{eq:05}) with the replacement $E\to E+eFz$ renders the Dirac-like equation into a Schr\"{o}dinger-like equation \begin{equation} \left[-\frac{d^2}{d\xi^2}+U(\xi)-f^2\xi^2-if\alpha_z-2\varepsilon f\xi +\lambda^2\right]{\bm \psi}(\xi)=0\ . \label{eq:12} \end{equation} where $f=F/F_{\mathrm{C}}$ and $F_{\mathrm{C}}=\Delta/ed=\Delta^2/e\hbar v$. The term $-f^2\xi^2$ is negligible under the assumption that $F < F_{\mathrm{C}}$ because the envelope function is vanishingly small if $\xi > 1$. Note that this is the usual regime in experiments since typical values for IV-VI compounds are $\Delta=75\,$meV and $d=4.5\,$nm~\cite{Korenman87}, yielding $F_\mathrm{C}=170\,$kV/cm. Regarding the constant matrix term $-if\alpha_z$, it is easily diagonalized by a unitary transformation. Nevertheless, we have checked that it has a small impact on the final results even at moderate fields~\cite{Diaz-Fernandez17}. Thus, we omit those two terms in what follows. We can regard again the term $U(\xi)$ in~(\ref{eq:12}) as a perturbation and seek for the retarded Green's function of the unperturbed problem $\mathcal{G}_{0}^{+}(\xi,\xi^{\prime};\varepsilon)=G_{0}^{+}(\xi,\xi^{\prime};\varepsilon)\mathbb{1}_4$, where the scalar Green's function obeys the following equation \begin{equation} \left[-\frac{\partial^2}{\partial\xi^2}-2\varepsilon f\xi +\lambda^2\right]G_{0}^{+}(\xi,\xi^{\prime};\varepsilon)= \delta(\xi-\xi^{\prime})\ . \label{eq:13} \end{equation} Equation~(\ref{eq:13}) is analogous to the problem of a non-relativistic particle in a tilted potential solved in Refs.~\cite{Ludviksson87,Jung09}. Let us define \begin{equation} \mu=(2|\varepsilon| f)^{1/3}\ , \quad p(\xi)=-s_{\varepsilon}\mu\,\xi+\frac{\lambda^2}{\mu^2}\ . \label{eq:14} \end{equation} with the shorthand notation $s_{\varepsilon}=\mathrm{sgn}\left[\mathrm{Re}(\varepsilon)\right]$. In terms of these parameters the retarded Green's function is written as \begin{eqnarray} G_{0}^{+}(\xi,\xi^{\prime};\varepsilon)&=&-\frac{\pi s_{\varepsilon}}{\mu}\Big\{ \theta\left[(\xi^{\prime}-\xi)s_{\varepsilon}\right] \mathrm{Ai}\left(p(\xi)\right) \mathrm{Ci}^{+}\left(p(\xi^{\prime})\right) \nonumber\\ &+& \theta\left[(\xi-\xi^{\prime})s_{\varepsilon}\right]\mathrm{Ai}\left(p(\xi^{\prime})\right) \mathrm{Ci}^{+}\left(p(\xi)\right)\Big\}\ , \label{eq:15} \end{eqnarray} where $\mathrm{Ci}^{+}(z)=\mathrm{Bi}(z)+i\mathrm{Ai}(z)$, $\mathrm{Ai}(z)$ and $\mathrm{Bi}(z)$ being the Airy functions~\cite{Abramowitz72}. It is worth mentioning that $G_{0}^{+}(\xi,\xi^{\prime};\varepsilon)$ is continuous on the line $\xi=\xi^{\prime}$. Once the retarded Green's function for the unperturbed problem is known, we can get the energy levels from~(\ref{eq:09}). In the presence of the electric field, poles are of the form $E({\bm \kappa}_{\bot})-i\Gamma({\bm \kappa}_{\bot})/2$ and correspond to resonant states. Therefore, electrons can tunnel into the continuum and escape from the quantum well. This is a common feature in the quantum-confined Stark effect~\cite{Miller84}. Nonetheless, the level width is exponentially small in the low-field regime, namely, tunneling is only important at very high fields~\cite{Diaz-Fernandez17}. Thus, we omit the imaginary part hereafter. \section{Low-field limit} \label{sec:low-field} We can simplify~(\ref{eq:15}) in the low-field regime $F<F_\mathrm{C}$ by noticing that $|\lambda(\varepsilon,\kappa)|\gg \mu(\varepsilon)$. In this limiting case we approximate the Airy functions to their asymptotic expansions for large argument~\cite{Abramowitz72}. In this regime we take $\mathrm{Ci}^{+}(z)\simeq\mathrm{Bi}(z)$ and \begin{equation} \mathrm{Ai}(z) \simeq \frac{1}{2\sqrt{\pi}}\, \frac{e^{-\phi}}{z^{1/4}}\,L(-\phi) \ , \quad \mathrm{Bi}(z) \simeq \frac{1}{\sqrt{\pi}}\,\frac{e^{\phi}}{z^{1/4}}L(\phi)\ , \label{eq:16} \end{equation} with $\phi=(2/3)z^{3/2}$ and $L(\phi)=1+\sum_{\ell=1}^{\infty}u_{\ell}\phi^{-\ell}$, where $u_{\ell}=\Gamma(3\ell + 1/2)/54^{\ell}\, \ell!\, \Gamma(\ell + 1/2)$, $\Gamma(z)$ being the $\Gamma$ function. We can now obtain an expression to the lowest order in the field as follows \begin{eqnarray} G_{0}^{+}(\pm \xi_0,\pm \xi_0;\varepsilon)&=&-\frac{1}{2\lambda} \left(1\pm\frac{|\varepsilon|\xi_0}{\lambda^2}f\right)\ , \nonumber \\ G_{0}^{+}(\pm \xi_0,\mp \xi_0;\varepsilon)&=&-\frac{1}{2\lambda}\, \exp\left(-2\lambda \xi_0\right)\ . \label{eq:17} \end{eqnarray} Finally, inserting~(\ref{eq:17}) into~(\ref{eq:09}) yields an approximate expression to obtain the energy of the interface states in the quantum well \begin{equation} \varepsilon^2=\kappa^2+\exp\left(-4\lambda \xi_0\right) -\frac{2|\varepsilon|\xi_0}{\lambda}\,f. \label{eq:18} \end{equation} In order to verify the accuracy of the result, we numerically tested~(\ref{eq:18}) from the numerical solution of Eq.~(\ref{eq:09}) using the exact Green's function. Taking $s_\varepsilon=1$ for concreteness, from~(\ref{eq:15}) we get \begin{eqnarray} G_{0}^{+}(\pm\xi_0,\pm\xi_0;\varepsilon) &=&-\frac{\pi}{\mu}\,\mathrm{Ai}(z_{\pm})\mathrm{Ci}^{+}(z_{\pm})\ , \nonumber \\ G_{0}^{+}(\pm\xi_0,\mp\xi_0;\varepsilon) &=&-\frac{\pi}{\mu}\,\mathrm{Ai}(z_{-})\mathrm{Ci}^{+}(z_{+})\ , \label{eq:19} \end{eqnarray} with $z_{\pm}=\lambda^2/\mu^2\mp\mu\xi_0$. Figure~\ref{fig1}(a) shows the dispersion relation for two values of the applied field ($F=0.2F_{\mathrm{C}}$ and $F=0.8F_{\mathrm{C}}$) and two widths of the quantum well ($a=d/2$ and $a=d$). Dashed lines show the approximate low-field limit~(\ref{eq:18}). We conclude that the analytical result fits the numerics quite well except at high field ($F=0.8F_{\mathrm{C}}$) and small width ($a=d/2$), as expected. From the dispersion relation we can obtain the gap of the interface states $\Delta_w$ as the difference of the positive and negative energy solutions at ${|{\bm k}_{\bot}|}\to 0$. Figure~\ref{fig1}(b) shows that this gap shrinks upon increasing the electric field. Therefore, we come to the conclusion that the gap can be controlled to a large extent by the field. \begin{figure}[ht] \begin{center} \includegraphics[width=0.5\linewidth]{figure1.png} \end{center} \caption{(Color online) (a)~Energy in units of $\Delta=E_G/2$ as a function of the in-plane momentum for two values of the applied field ($F=0.2F_{\mathrm{C}}$ and $F=0.8F_{\mathrm{C}}$) and two widths of the quantum well ($a=d/2$ and $a=d$). Mirror images are obtained for negative energies. (b)~Interface gap $2\Delta_{w}$ in units of the fundamental gap $2\Delta$ as a function of the electric field for two different widths. Dashed lines show the approximate solution given in~(\ref{eq:18}).} \label{fig1} \end{figure} It is worth mentioning that Eq.~(\ref{eq:18}) can be further simplified when the quantum well is not too narrow. In this case we can take $\lambda\simeq 1$. Reverting the change of variables we get \begin{equation} E({\bm k}_{\bot})=\pm \Big[\sqrt{(eFa)^2+\hbar^2 v^2 k_{\bot}^2 +\Delta_{w0}^2} -eFa\Big]\ , \label{eq:20} \end{equation} where $\Delta_{w0}$ is given by~(\ref{eq:11}). Notice that turning off the field we recover Eq.~(\ref{eq:10}). The gap of the interface states is then approximately given as $2\Delta_w$ with \begin{equation} \Delta_w = \sqrt{(eFa)^2+\Delta_{w0}^2}-eFa\ . \label{eq:21} \end{equation} Equation~(\ref{eq:21}) is very remarkable and it is our main result. Although being approximate, we have found that it is very accurate unless the field is high and the quantum well is narrow. It implies that applying an electric field perpendicular to the junction, the interface gap diminishes. Notice that there exist two different regimes. At low field, i.~e., $eFa<\Delta_{w0}$, the gap decreases linearly as $\Delta_w\simeq \Delta_{w0}-eFa$. On the contrary, at high field the gap vanishes according to the power law $\Delta_w\simeq \Delta_{w0}^2/2eFa$. Since the gap is a consequence of the hybridization of the interface states, the electric field can be viewed as an external means to control the coupling of these bands. \section{Conclusions} In this work we have studied band-inverted quantum wells subjected to an electric field applied along the growth direction. We used a spinful two-band model that is equivalent to the Dirac model for relativistic electrons. The mass term is half the bandgap and changes its sign across the junction. In the case of a single band-inverted junction, the envelope function of the interface states is exponentially localized in the growth direction with decay length $d=\hbar v/\Delta$. The corresponding interface dispersion is linear, as given by~(\ref{eq:03b}), and is commonly called a Dirac cone. A second junction at a distance $2a$ not large compared to $d$ yields the splitting of the Dirac cones into two massive subbands and an interface gap opens, as expressed by Eq.~(\ref{eq:11}). Therefore, finite-size effects give mass to the Dirac fermions, transforming their linear dispersion into a parabola at small wave vectors. Remarkably, although the interface gap never closes, it can be dramatically reduced by the electric field. Under certain reasonable assumptions we have found a simple expression for the interface gap as a function of the field, as shown in~(\ref{eq:21}). This expression predicts a linear reduction of the gap if the electric field is smaller than $F_{\text{C}}\exp(-2a/d)d/a$, while it decays as a power law at higher fields. \ack A.~D.-F.\ and F.~D-A.\ thank the Theoretical Physics Group of the University of Warwick for their warm hospitality. This work was supported by the Spanish MINECO under grants MAT2013-46308, MAT2016-75955 and FIS2015-64654-P. \section*{References}
\section{\bf Introduction} Spin-polarized electron beams in high energy physics have been used to probe the sub-atomic structure of matter, and elementary particles. In condensed matter, spin-polarized transport, in a way, was anticipated in 1936 by Nevill Mott \cite{1}. It has become a subject of intense research in the recent years. Immense scope for spintronics in microelectronics, material science and quantum information technology is being explored. The discovery of giant magnetoresistance (GMR) in the alternating layers of ferromagnetic metals (FM) and nonmagnetic metals (NM), and the spin-polarized tunneling (SPT) provided a great impetus to the spintronics \cite{2,3,4}. The most remarkable fact, not sufficiently highlighted in the literature, is that spintronics essentially deals with the intrinsic magnetic moment of electron; Prinz used the more realistic word magnetoelectronics for this field in 1995 \cite{2}. Spin accumulation, diffusion and transport in general signify the control and the manipulation of the spin magnetic moment of the electron $\mu_B$ in whch electric charge and electron spin are inseparably linked \begin{equation} \mu_B = \frac{e \hbar}{2m_e c} \end{equation} To put this point in perspective recall the experiments that measure the magnetic moment \cite{5}. Classically magnetic moment of a charged rotating object, whether a point particle or a rigid body, is intrinsically related to its angular momentum. In quantum theory, postulating spin angular momentum of $\hbar/2$ for the electron following Uhlenbeck-Goudsmit hypothesis or assuming Dirac equation, once electric charge is introduced the presence of spin manifests through magnetic moment (1). Therefore, an issue of fundamental importance in spintronics is the nature of charge, spin and their relationship. In a more direct way one may ask whether electric charge and electron spin could be separated and independently manipulated. In some theoretical models of superconductivity based on one-dimensional Hubbard model it is speculated that there exist two kinds of excitations: electrically neutral fermions called spinons, and spinless charged objects called holons. Spinons and holons have different Fermi velocities making it possible to separate charge and spin transport. An early experiment gave evidence for spin and charge separation \cite{6}. If one looks at a fundamental level then the quantum description of electron has to be considered. Since Dirac equation is the most acceptable representation an important property of Dirac equation may be mentioned: it admits separated charge center and center of mass, for a critical discussion and early references see Barut and Bracken \cite{7}. What is the relationship of this property of the Dirac equation with the separate charge and spin transport in matter? It seems this question has not been asked in the literature. In the conventional electronics and the classical electrodynamics electron spin and spin magnetic moment $\mu_B$ have no role; the later enters into the picture only through the magnetic properties of the matter. It seems rather strange that in spite of a vast literature on the Dirac equation the correspondence between Maxwell-Dirac and Maxwell-Lorentz equations has not been investigated except a recent work \cite{8}. In the present paper we make this correspondence more definitive and study its novel implications on spintronics. Two-vortex internal structure of the electron \cite{9} throws light on charge and spin transport in a unifying idea \cite{10} that charge also has origin in the fractional spin. The paper is organized as follows. To elucidate the nature of the problem emanating from spintronics we first discuss aspects of spin transport in the next section. The proposed new approach to the Maxwell-Dirac equations is developed in Section 3. Physical implications on the spintronics are discussed in Section 4, and concluding remarks constitute the last section. \section{\bf Physics of spin transport} The physics of magnetic materials, the well-known ferromagnetic elements Fe, Ni and Co, antiferromagnetic like Cr, and many new exotic novel materials is believed to originate in the microscopic quantum theory of electron spin/magnetic moment, and their interactions. In GMR, layers of FM-NM, for example, Fe-Cr and Co-Cu are used. Hybrid structures, replacing NM by semiconductors, FM-NMS, have also been studied in semiconductor spintronics. Discovery of ferromagnetic semiconductor (FS) $Ga_{1-x}Mn_xAs$ has led to new devices: recently FS has been used as spin injector and spin detector on a high mobility 2-dimensional electron gas formed at the $Ga_{1-x}Mn_xAs-GaAs$ interface \cite{11}. The experimental results seem to disagree with the standard drift-diffusion theory motivating the authors \cite{11} to put forward ballistic spin transport hypothesis: a mean free path comparable to the device dimensions results into ballistic motion rather than the diffusive one. This hypothesis reminds us the collisionless pure ballistic transport directly observed in submicron GaAs devices in 1985 \cite{12}, and the controversy surrounding this \cite{13}. A viewpoint \cite{14} on \cite{11} brings out some intriguing questions related with it. Chen and Zhang \cite{15} develop spin and directional dependent local chemical potential approach to the spinor Boltzmann transport equation (BTE) to study ballistic spin transport. Note that the momentum and spin relaxation times in the BTE assume the existence of local quasi-equilibrium, and one could introduce equilibrium and nonequilibrium parts of the distribution function, see Eq.(3) in \cite{15}. A simpler idea could be that of postulating two ensembles of partial local quasi-equilibrium and ballistic carriers, termed lucky electrons in \cite{13}. Spin Hall effect (SHE), SPT and ballistic spin transport show the interplay between spin, magnetic moment, charge conduction and the electromagnetic fields. The role of spin-orbit coupling also has varied degree of significance in spintronics. The microscopic mechanism of various condensed matter systems in the context of spintronics is not the purpose of the present work; we limit ourselves to the macroscopic phenomenology of spin dynamics and electrodynamics. In the classical Maxwell-Lorentz theory the Drude model of the conductivity has proved to be immensely useful \begin{equation} \sigma = \frac{e^2 n \tau}{m_e} \end{equation} The formal structure (2) is preserved in the quantum theory such that the free electron mass is modified to the effective mass in an energy band of the solid, and the relaxation time $\tau$ is calculated from quantum theory of scattering \cite{1}. For a transition metal Mott suggests the following formula \begin{equation} \sigma_M = \frac{e^2n_s \tau_s}{m_s} + \frac{e^2 n_d \tau_d}{m_d} \end{equation} Here suffixes 's' and 'd' refer to s- and d- orbit electrons respectively, and n is the charge carrier number density. The spin-dependent conduction is understood in terms of two Brillouin zones in the single-particle approximation. Band structure of a FM splits into spin up and spin down bands \cite{3}, and one treats two component current conduction corresponding to two spin directions. The spin-mixing can arise from spin-flip scattering between two current channels through the momentum exchange via electron-magnon collisions. Note, however that spin-lattice interaction and spin-orbit coupling are responsible for the relaxation of spin accumulation. In fact, spin-orbit coupling induces spin-polarized currents in SHE, and this is also traced to the early work of Mott \cite{16}. An unpolarized electron beam scattering with an unpolarized target results into a spatial separation of polarized electrons due to spin-orbit interaction. Dyakonov and Perel \cite{17} predicted spin accumulation on the surface of a sample using this mechanism where spin-layer thickness is determined by spin-diffusion. The basic approach is to assume a spin-density continuity equation for spin-density vector ${\bf S}$; spin-flux tensor $Q_{ij}$ and the spin relaxation time $\tau_{spin}$ are introduced to write \begin{equation} \frac{\partial S_i}{\partial t} + \frac{\partial Q_{ij}}{\partial x_j} + \frac{S_i}{\tau_{spin}} =0 \end{equation} The tensor $Q_{ij}$ is assumed to comprise of three terms: spin-drift, spin-diffusion and spin-orbit interaction. In the second paper \cite{18} the effect of magnetic field is considered generalizing Eq.(4), and the phenomenological parameters are obtained in terms of the scattering amplitude. SHE has been experimentally observed in semiconductors and metals since then \cite{19}. Chudnovsky \cite{20} formulates an analogue of Drude model for SHE. The starting point of his model is the nonrelativistic form of Dirac Hamiltonian for relativistic quantum electron. Assuming the effect of static crystal potential, impurities/imperfections potential and the external potential are embodied in the potential $U({\bf r})$ a classical approach is employed to derive Newton's equation of motion. Introducing relaxation time the Drude model is arrived at: theoretical calculations seem to compare fairly well with the experimental data on spin Hall conductivity. The expression for the current density in terms of charge conductivity $\sigma_c$ and spin Hall conductivity $\sigma_{sh}$ derived in \cite{20} is \begin{equation} {\bf J} = \sigma_c {\bf E} + \sigma_{sh} ({\bf \xi} \times {\bf E}) \end{equation} \begin{equation} \sigma_c = \frac{e^2 n \tau}{m} \end{equation} \begin{equation} \sigma_{sh} =\frac{\hbar e^3 n \tau^2}{2 m^3 c^2} A \end{equation} The spin polarization vector of the electron fluid ${\bf \xi}$ has the magnitude between 0 and 1 defined by \begin{equation} \xi = \frac{n_+ -n_-}{n} \end{equation} Here $n_+(n_-)$ denotes the carrier number density for spin parallel (antiparellel) to ${\bf \xi}$, and the total charge carrier density is $n=n_+ +n_-$. The constant A in (7) for a specific case is calculated to be \begin{equation} A = \frac{4\pi}{3} Z e n_o \end{equation} where -Ze and $n_0$ are the ionic charge and number density respectively. The author argues towards the end of the paper that both effective mass and free electron mass have to be taken into account: in the Bohr magneton it has to be $m_e$ while for orbital motion and the kinetic energy term in the Hamiltonian it has to be the effective mass. Ultimately, for metals $Zn_0 ~ \rightarrow n$, and only $m_e$ appears in the expression \begin{equation} \sigma_{sh} = \frac{2\pi \hbar}{ 3 m_e c^2} \sigma_c^2 \end{equation} The calculation of spin Hall conductivity is carried out using the expression (10). To summarize: Mott's discussion on expression (3) and Fert's exposition in the light of new advances, and Chudnovsky's approach underline the significance of two issues. First one concerns the importance of effective mass and relaxation time. The second is the role of quantum theory whether one has to consider Pauli-Schroedinger or Dirac equation. It may be asked if two length scales, namely, the electron charge radius $r_e=\frac{e^2}{m_e c^2}$ and the Compton wavelength $\lambda_c =\frac{\hbar}{m_e c}$ have fundamental role in the charge and spin transport. These issues bring out the necessity to understand the classical limit of the Maxwell-Dirac equation. \section{\bf Maxwell-Dirac theory: charge and spin currents} The Maxwell-Lorentz theory is the Maxwell field equation and a relativistic generalization of the Newton-Lorentz equation of a point electron \begin{equation} \partial_\mu F^{\mu\nu} =J^\nu \end{equation} \begin{equation} m\frac{dv^\mu}{d\tau} =e v_\nu F^{\mu\nu} \end{equation} Here the velocity 4-vector $v^\mu =\frac{dx^\mu}{d\tau}$, and $\tau$ is proper time. Let us stress the fact that the formal structure of Eqs. (11) and (12) is abstracted from the experiments. Once it became known that charge, mass and spin are the observed physical attributes of the electron, there would have been a natural question whether the spin current or effect was hidden in this set of equations or these were incomplete. Logically both possibilities are allowed. One may reason that the experiments lacked the precision to detect the presence of electron spin when the Maxwell-Lorentz theory was developed, and therefore this description is incomplete. Or, the spin effect was implicitly present in the experiments hence it is hidden in the theory. Here it may be mentioned that there exists an approach in which the Maxwell equation(11) is retained as such, and an equation of motion for spin vector $S^\mu$ in analogy to Eq.(12) is discussed \cite{21}. The continuity equation for spin vector (4) in Dyakonov-Perel work may be viewed in this spirit. Now quantum electrodynamics (QED) is the most successful modern theory in terms of the empirical precision tests. The experimental value of electron magnetic moment is not exactly $\mu_B$, and the QED calculated value in the power of $\alpha =\frac{e^2}{\hbar c}$ explains the anomalous part extremely well. Neglecting higher order terms electron magnetic moment in QED is calculated to be \begin{equation} \mu_e = \mu_B [1+\frac{\alpha}{2\pi}] \end{equation} On the other hand, single particle Dirac theory predicts spin magnetic moment given by expression (1). Dirac's own work and many investigations in the past have revealed intriguing aspects of the Dirac equation, some of them, e. g. zitterbewegung, continue to be puzzling even today. Though the theoretical origin of (13) belongs to QED, we propose a paradigm shift: treat $\mu_e$ as a physical attribute of the electron and seek alternative explanation \cite{22}. A new interpretation of $\mu_e$ is possible rearranging expression (13) in the following form \begin{equation} \mu_e =\frac{e}{mc} [\frac{\hbar}{2} +\frac{f}{2}] \end{equation} \begin{equation} f=\frac{e^2}{2\pi c} \end{equation} Could we re-interpret $\frac{f}{2}$ as additional spin of electron? The standard practice is to express angular momentum in terms of Planck constant, if we follow this the spin $\frac{f}{2}$ is fractional. We suggest that the alternative interpretation, though a radical one, deserves serious consideration. For this purpose Maxwell-Dirac theory is analyzed here. Practical utility of the nonrelativistic approximation to the Dirac equation, and treating Maxwell field semiclassically have been known since long. In the preceding section the usefulness of the nonrelativistic Dirac Hamiltonian for SHE \cite{20} has been discussed. A small, but important point is that nonrelativistic approximation does not mean classical limit, in fact, the presence of the Planck constant in Equation (1) of \cite{20} itself shows the quantum mechanical nature of the approximate Dirac Hamiltonian. However the classical approach is used in all the derivations leading to the spin Hall conductivity. The author does mention that one could instead use the Heisenberg equation of motion, but treats physical variables as c-numbers that is inconsistent with quantum theory. Of course, the well known consequences of the nonrelativistic limit of Dirac equation are the understanding of Pauli spin effect, spin-orbit coupling and Darwin term, and Dirac bispinor approximates to a 2-component spinor \cite{23}. Rather than nonrelativistic approximation let us examine the classical limit. In the Maxwell-Dirac theory the Maxwell field equation (11) retains the formal structure in which the charge current density $J^\mu$ is replaced by the Dirac current \begin{equation} \partial_\nu F^{\mu\nu} =e \bar{\Psi} \gamma^\mu \Psi \end{equation} where bispinor $\Psi$ obeys the Dirac equation \begin{equation} \gamma^\mu (i\hbar \partial_\mu - \frac{e}{c} A_\mu ) \Psi -m c \Psi =0 \end{equation} and the electromagnetic field tensor is defined in terms of the 4-vector potential $A^\mu$ \begin{equation} F^{\mu\nu} = \partial^\mu A^\nu - \partial^\nu A^\mu \end{equation} We use the standard notations, see \cite{8} for details. A remarkable property of the Dirac current $J^\mu_D =e\bar{\Psi} \gamma^\mu \Psi$ is that even in the presence of the electromagnetic interaction its form does not change; one could prove it using Dirac equation or by deriving Noether current for global and local U(1) gauge invariance of the Maxwell-Dirac action. Moreover the electric charge unit is put by hand; the actual Dirac current is probability current such that probability density is positive definite. An insightful approach to the Dirac current is the Gordon decomposition into Gordon and spin magnetization currents \begin{equation} J^\mu_D = J^\mu_G +J^\mu_M \end{equation} \begin{equation} J^\mu_G = i \mu_B [\bar{\Psi} \partial^\mu \Psi - (\partial^\mu \bar{\Psi}) \Psi] \end{equation} \begin{equation} J^\mu_M =i \mu_B \partial_\nu M^{\mu\nu} \end{equation} \begin{equation} M^{\mu\nu} = \frac{1}{2} \bar{\Psi}[\gamma^\mu \gamma^\nu - \gamma^\nu \gamma^\mu] \Psi \end{equation} For an interacting electron Dirac current and spin magnetization current remain unaltered in the presence of $A^\mu$ while Gordon current modifies to \begin{equation} J^\mu_{G, int} = i \mu_B [\bar{\Psi} \partial^\mu \Psi - (\partial^\mu \bar{\Psi}) \Psi] -\frac{e^2}{mc^2} A^\mu \bar{\Psi} \Psi \end{equation} It is natural to ask which of the currents corresponds to the charge current in the Maxwell equation (11). To answer this question we proceed following the earlier study \cite{8} seeking the classical limit $\hbar \rightarrow 0$ assuming the Dirac bispinor to be \begin{equation} \Psi =C e^{\frac{iS}{\hbar}} \end{equation} and expanding 4-component column vector C in the power of Planck constant $C= C_0 +\frac{\hbar}{i} C_1 + higher~ order ~powers ~in~ \hbar$. We obtain \begin{equation} J^\mu_{D, cl} = e ~\bar{C_0} \gamma^\mu C_0 \end{equation} \begin{equation} J^\mu_{M, cl} =0 \end{equation} \begin{equation} J^\mu_{G, cl, int} = -\frac{e}{mc} \rho (\partial^\mu S +\frac{e}{c} A^\mu) \end{equation} where we have defined \begin{equation} \rho = \bar{C_0} C_0 \end{equation} Note that the Gordon current in the nonrelativistic approximation corresponds to the Schroedinger current for the charge flow since the expressions for probability density and probability current density in Schroedinger theory are known to be \begin{equation} \rho_s = \Psi_s^* \Psi_s \end{equation} \begin{equation} {\bf J}_s = -\frac{i\hbar}{2m} (\Psi_s^* {\bf \nabla} \Psi_s -{\bf \nabla} \Psi_s^* \Psi_s) - \frac{e}{mc} {\bf A} \Psi_s^* \Psi_s \end{equation} Here $\Psi_s$ is Schroedinger wave function. Therefore the structure of (27) is suggestive of it being the analogue of $J^\mu$ in the Maxwell equation (11). In the quantum theory it has to be pointed out that the probability interpretation is correct for the Dirac current, but not for Gordon current. Thus the classical limit of Dirac current $e \bar{C_0} \gamma^0 C_0$ differs from $\rho$ given by expression (28) for the Gordon current. Having discussed the classical correspondence the crucial step is to prove the consistency between Eqs. (11) and (16). Departing from the conventional approach we introduce modified charge current density and the electromagnetic field tensor \begin{equation} J^\mu_m =J^\mu_{G,int} \end{equation} \begin{equation} F^{\mu\nu}_m =F^{\mu\nu} -i \mu_B M^{\mu\nu} \end{equation} such that \begin{equation} \partial_\nu F^{\mu\nu}_m =J^\mu_m \end{equation} An important property of the Gordon decomposition (19) is that each of the currents separately satisfies the continuity equation $\partial_\mu J^\mu_G=0$ and $ \partial_\mu J^\mu_M=0$. This property would ensure the mathematical consistency of the proposition (31) to (33). What is the physical significance of our proposition? First, the charge current (31) hides the electromagnetic potential and the spin magnetization tensor is hidden in the electromagnetic field tensor. Secondly the Compton wavelength of the electron in the first term, and the electron charge radius in the second term of the Gordon current (23) signify the importance of two length scales in the charge current. Alternatively, in terms of the spin both $\frac{\hbar}{2}$ and $\frac{f}{2}$ have significance in the current $J^\mu_m$. Third one is a subtle point. To derive the Gordon decomposition one has to use the Dirac equation with nonzero mass term. For a massless particle the Dirac equation splits into the Weyl equations for the left-handed $\Psi_L$ and right-handed $\Psi_R$ two-component Weyl spinors \begin{equation} i \hbar {\bf \sigma}.{\bf \nabla} \Psi_L = \frac{i\hbar}{c} \frac{\partial \Psi_L}{\partial t} \end{equation} \begin{equation} i \hbar {\bf \sigma}.{\bf \nabla} \Psi_R =- \frac{i\hbar}{c} \frac{\partial \Psi_R}{\partial t} \end{equation} Comparing Dirac equation (17) with the set of Weyl equations (34)-(35) it is easily noticed that the Planck constant could be cancelled in the later while due to mass term in the Dirac equation it cannot be factored out. Since $f$ has the dimension of action/angular momentum, a sub-quantum description is envisaged \cite{9} such that the sub-quantum Weyl equations are given by \begin{equation} i f {\bf \sigma}.{\bf \nabla} \Psi_L^s = \frac{if}{c} \frac{\partial \Psi_L^s}{\partial t} \end{equation} \begin{equation} i f {\bf \sigma}.{\bf \nabla} \Psi_R^s =- \frac{if}{c} \frac{\partial \Psi_R^s}{\partial t} \end{equation} Attention is drawn to an important aspect in the Maxwell-Lorentz theory: the charge unit $e$ can be factored out in the Maxwell equations and it appears as $e^2$ in the Lorentz force expression and the Lagrangian density when the fields are expressed in the geometrical unit ${length}^{-2} $. Introducing $\hbar$ in the redefined fields we have proposed a new interpretation that the electromagnetic field tensor represents angular momentum per unit area of the photon fluid \cite{10}. The present considerations on the Dirac current pave the path for a unifying picture: both charge current and spin current represent angular momentum flows. Electron mass is proposed to couple massless Weyl fermions $(\Psi_L, \Psi_R)$ and sub-quantum Weyl fermions $(\Psi_L^s, \Psi_R^s)$. Thus qualitatively a symbolic picture of the electron is as follows \begin{equation} e^- = \Psi^s_L ; \Psi_L,\Psi_R \end{equation} \begin{equation} e^+ = \Psi^s_R ; \Psi_L,\Psi_R \end{equation} The sign of the electric charge is determined by the handedness of sub-quantum Weyl spinor, and the length scales $r_e$ and $\lambda_c$ correspond to sub-quantum and quantum states of the electron structure respectively. \section{\bf Electron vortex and spintronics} The microscopic theory of spin transport and technical complexities involved in spintronics are specialized topics receiving a great deal of attention. However the applicability of Dirac equation in this field has a general validity at a basic level. Interpretation of Dirac equation has been approached from diverse angles in the literature \cite{7, 24,25,26,27,28,29,30}. Physical interpretation of Dirac equation assuming a point electron leads to a counter-intuitive picture of zitterbewegung which is not observable, a length scale of the order of $\lambda_c$, and the presence of the center of charge and center of mass separated by $\lambda_c /2$. An alternative, though investigated by very few physicists, seeks an internal structure of the electron incorporating zitterbewegung and the Compton wavelength. Such efforts are reminiscent of the past electron models beginning with that of Thomson inspired by classical electron charge radius. The failure of such models does not necessarily imply the validity of a point electron, in fact, the foundational problems originating from the infinities show the limitations of the point field theories e. g. QED. It is also true that to make progress in the internal structure models a radically new idea is imperative. We have proposed two-vortex model towards this aim \cite{9} and given a qualitative picture in \cite{22}. The new analysis on the Maxwell-Dirac theory shows that the spin transport and the charge transport are physically same at the basic level both being the angular momentum flows. The role of mass, coupling massless Weyl and sub-quantum Weyl spinors, and the vortex model of the electron are proposed to have a profound implication on the spintronics. Though nonrelativistic limit of Dirac equation and semiclassical equations of motion are used in Chudnovsky's phenomenological model of SHE \cite{20} an interesting insight could be obtained from this work. Charge and spin conductivity depend on the mass of the electron but the significance of mass parameter to be used whether free electron mass $m_e$ or the effective mass in the material $m_{eff}$ depends on physical arguments. Chudnovsky suggests that $m^2$ in the spin-orbit term should be the product $m_e m_{eff}$, and shows that finally it is only $m_e$ that appears in the expression (10). Now if we take the limit $m_e \rightarrow 0$ in Eq.(10) then charge conductivity vanishes but $\sigma_{sh}$ could be nonzero. It may be argued that this implies pure spin transport. A recent study based on the standard theory of spin-orbit coupling analyzes the conversion between spin and charge currents by Edelstein and inverse Edelstein effects \cite{31}. Note that Dirac cone and spinor Boltzmann equation are used in this study. The nature of mass becomes important in this connection. Usually the classical correspondence of quantum theory is approached taking the limit $\hbar ~ \rightarrow ~ 0$. In a different approach \cite{32} the question is raised as to the consequence of taking the limit $m ~\rightarrow ~0$ in the Schroedinger equation. It is argued that this opens up the possibility of a field interpretation. Free particle Schroedinger equation for this purpose is rewritten in the form \begin{equation} \nabla ^2 \Psi_s = \frac{2m}{i\hbar} \frac{\partial \Psi_s}{\partial t} \end{equation} that reduces to the Laplace equation as $m~\rightarrow ~0$. Simplest relativistic generalization is then \begin{equation} \nabla ^2 \Psi_s=\frac{1}{c^2} \frac{\partial ^2 \Psi_s}{\partial t^2} \end{equation} Interpreting mass as the influence of the surrounding medium a modified Schroedinger equation is obtained \cite{32}. An alternative derivation of Dirac equation using this idea was also given. What is the physical meaning of the surrounding medium? Is it akin to de Broglie's hidden thermostat \cite{33}? In an interesting paper \cite{34} Dirac equation in Weyl representation is derived assuming stochastic process for massless Weyl spinors undergoing random spin flips such that the mass determines the rate of the flips. Once again the source of stochasticity is undefined. However the stochastic approach to quantum theory developed over past many decades \cite{35} indicates that some of the arguments have a potential to offer an alternative to quantum mysteries. We propose to develop the electron model represented by the symbolic equivalence (39) introducing two new ideas: deriving a vortex solution to the Weyl equation, and embedding the vortex in a host Gaussian wavepacket of stochastic origin. It is found that there exists a singularity in the Weyl equation. The nature of singularity is that of a vortex; in fact, it is a phase singularity given a fluid dynamical analogy \cite{10}. Phase singularity is defined by a vanishing field on the axis where phase is indeterminate. Vortex represents a phase singularity, and in the fluid dynamical interpretation phase is a velocity potential. A line singularity around which the flow takes place in concentric circles is a vortex line. In the standard treatment, neutrino Weyl equation is solved assuming infinite plane wave \begin{equation} \Psi = e^{-\frac{i}{\hbar} (E t -{\bf p}.{\bf x})} u(p) \end{equation} Nonvanishing solutions exist if $E=\pm |{\bf p}| c$. The sign of energy corresponds to a definite helicity. Physical electron neutrino has spin antiparallel to the direction of propagation and satisfies Eq.(34) for positive energy solution. We seek a vortex solution to Weyl equation, let us consider Eq.(35). Assuming the spinor to be $\left(\begin{array}{cc} \Phi\\ 0 \\ \end{array} \right)$ this equation becomes \begin{equation} i \hbar \left(\begin{array}{cc} \frac{\partial\Phi}{\partial z} +\frac{1}{c} \frac{\partial \Phi}{\partial t}\\ \frac{\partial\Phi}{\partial x} +i \frac{\partial \Phi}{\partial y} \\ \end{array} \right)=0 \end{equation} A general solution of Eq.(43) in cylindrical coordinates $(r, \theta, z)$ is obtained to be \begin{equation} \Phi =\Phi_0 r^l e^{i l \theta} e^{-\frac{i}{\hbar}(E t -p_z z)} \end{equation} where $\Phi_0$ is a constant amplitude and the azimuthal index $l$ determines the order of the singularity: $\Phi$ vanishes at $r=0$ and phase $l\theta$ becomes undefined. This topological defect is a phase vortex. However just like infinite plane wave that extends over whole space the solution (44) is unphysical as the field grows in the transverse plane to infinity as $r \rightarrow \infty$; in fact, this behavior is worse than the plane wave. To solve this problem two physical arguments are used. First we seek guidance from the physics of the optical vortices \cite{10}. Experimentally it is known that the electric field in laser beams could possess a phase singularity in a host wavepacket of Hermite-Gaussian (HG) and Laguerre-Gaussian (LG) modes \cite{36}. Curiously HG and LG modes are the solutions of the paraxial wave equation, and these are inconsistent with the Maxwell field equations \cite{10,37}. Analogous approach for the Weyl equation could be to use the paraxial wave equation for the Weyl spinor since it also satisfies the d'Alembert wave equation. However we adopt a different approach: the exact solution (44) is embedded in a Gaussian wavepacket that has origin in the external space. What is this 'external space' ? Let us recall that de Broglie in the thermodynamic argument \cite{33} speculates that, 'a particle, even when isolated from a complete macroscopic body, is constantly in thermal contact with a kind of thermostat residing in what we shall call the void'. The quantum vacuum of the modern quantum field theories is known to have observable physical effects, therefore we may identify this with the external space. Note that for the zero-point field the ground state wavepacket of a harmonic oscillator is a Gaussian function; the Gaussian is a minimum uncertainty wavepacket. The importance of zero-point radiation field in the stochastic electrodynamics is also recognized \cite{35,38}. Secondly the normal or Gaussian distribution is one of the most useful continuous probability distributions. Hence it is reasonable to assume Gaussian function for a physical vortex: the vortex field (44) is implanted in a Gaussian profile in the transverse plane to obtain \begin{equation} \Phi_{phys} = e^{-\frac{r^2}{R^2}} ~ \Phi \end{equation} We have not included the normalization factor in Eq.(45). Phase vortex solutions of the kind (45) would immediately follow for the Weyl and sub-quantum Weyl equations (34)-(37). Denoting the Weyl and sub-quantum Weyl vortices by C and O respectively the dimensionless vortex strengths for them are given by \begin{equation} \Gamma_g =\frac{1}{2} \end{equation} \begin{equation} \Gamma_e =\frac{\alpha}{4\pi} \end{equation} The sign of the charge, i. e. negative for electron, corresponds to the anti-vortex $O^-$ with strength $\Gamma_e$ and the spin vortex $C$ has strength $\Gamma_g$. The conventional picture of spin up and spin down point electron is altered to inequivalent internal structures $(O^-,C^+)$ and $(O^-,C^-)$ respectively. The internal constituents of the electron travel with the velocity of light independently in the longitudinal direction (along z-axis), and have azimuthal flow in the transverse plane that determines the angular momentum: here the physical picture is similar to Huang's \cite{24} in which intrinsic spin is attributed to the orbital angular momentum of electron in a circular orbit of radius $\lambda_c$. Since the vortices are embedded in a Gaussian wavepacket the stochastic process results into an interaction between them. The half-width parameter of the wavepacket and the separation between the vortices determines the interaction. The study on the vortex-vortex interaction in optical fields \cite{39} throws light on a plausible mechanism for the electron vortices. Let the vortex C be positioned on the z-axis, and the vortex O is at ${\bf r}_0 =(x_0,y_0)$ at a radial distance $\lambda_c$. The vortex O would undergo a spiral motion such that its momentum along z-direction $p_z$ acquires a tilt at some angle, say $\theta_0$ from the z-axis. Transverse component $p_z sin \theta_0$, assuming $p_z =m_e c$ and $\theta_0 =\alpha/2\pi$ gives the orbital angular momentum \begin{equation} p_z \frac{\alpha}{2\pi} \lambda_c =\frac{e^2}{2\pi c} =f \end{equation} where $sin \theta_0$ approximates to $\theta_0$ for small tilt. This naive argument shows that the fractional spin $f$ is linked to the orbiting vortex $O^-$. In contrast to a counter-intuitive consequence of a point electron in Dirac equation having two centers \cite{7,25} the present model gives a concrete physical explanation of both Compton wavelength and electron charge radius. Spintronics and topological matter seem to be important for testing the vortex electron model: the main idea is that the topology of the internal structure of electron manifests in the topological properties of the matter, and spin transport and charge transport have fundamentally same physical nature, i. e. angular momentum flow. For a quantitative prediction Eqs (31) -(33) have to be related with the spin current phenomenology \cite{11,17,18,19,20,31}. To understand topological implications a rigourous treatment of vortex dynamics is required. However it could be anticipated that the host Gaussian wavepacket in matter will have different value of R and it will have temperature dependence since the lattice vibrations become important. As a consequence the interaction between the vortices O and C will be changed, and in certain situations charge vortex O and spin vortex C could travel with velocity of light independent of each other. Thus the charge and spin separation implies the motion at light speed in this model, and it should be testable. \section{\bf Conclusion} The present work brings out salient features of the Maxwell-Dirac theory by taking the classical limit. Its application in spintronics is pointed out. A vortex solution is obtained for the Weyl equation. Two-vortex model of electron \cite{9} is developed with new ingredients of the Weyl and sub-quantum Weyl vortices. There are at least two directions for further development of these ideas. The theory of vortex dynamics and vortex-vortex interaction in the present model requires a rigorous treatment. The second issue is regarding the incorporation of mass term and establishing its equivalence with the Dirac equation. Though we anticipate the usefulness of the previous works \cite{32,34} in this objective we have not been able to do it at present. A simple method generalizing, for example, (35) and (36) as coupled equations using $m_e$ does not work since Eq.(36) becomes \begin{equation} i \hbar {\bf \sigma}.{\bf \nabla} \Psi_L^s = \frac{i\hbar}{c} \frac{\partial \Psi_L^s}{\partial t}+\frac{2 \pi}{\alpha} m_e c \Psi_R \end{equation} It is also not clear what the stochastic process could be.
\section{Introduction} Newton's third law states that whenever one body exerts a force on a second, the second body exerts an equal and opposite force on the first. The electromagnetic field exerts forces on matter via the Lorentz force law. I will argue that matter exerts equal and opposite forces on the field. Talk of forces on fields is generally resisted as fields seem too insubstantial to be acted upon by forces. It would be hard to understand how fields could feel forces if they had neither masses nor accelerations. Fortunately, fields have both. Fields respond to forces in much the same way that matter does. Few authors explicitly reject the idea that matter exerts forces on the electromagnetic field. Instead, the rejection is implied by conspicuous omission. In deriving and discussing the conservation of momentum, one speaks freely of the \emph{force} on matter but only of the \emph{rate of change of the momentum} of the electromagnetic field (e.g., \citealp{cullwick1952}; \citealp[section 8.2]{griffiths}; \citealp[section 4.9]{rohrlich}). My primary goal in this article is to argue that Newton's third law holds in the special relativistic theory of electromagnetism because the force from the electromagnetic field on matter is balanced by an equal and opposite force from matter on the field. I show that the field experiences forces by giving a force law for the electromagnetic field using hydrodynamic equations which describe the flow of the field's mass (originally studied by \citealp{poincare1900}). In the course of this analysis I clarify the inertial role played by the field's mass---it quantifies the resistance the field itself has to being accelerated. I also point out that Maxwell's stress tensor is in fact a momentum flux density tensor, not---as its title would suggest---a stress tensor, and give the true stress tensor for the electromagnetic field. Finally, I explore the extent of the resemblance between the electromagnetic field and a relativistic fluid, asking (i) whether we can replace Maxwell's equations with fluid equations, (ii) if it is possible to understand the classical electromagnetic field as composed of photons, and (iii) how we can attribute proper mass to the field. \section{Apparent Violation of the Third Law}\label{apparentviolation} If one takes charged particles to exert electromagnetic forces directly upon one another at a distance, violations of Newton's third law are easy to generate. Consider the following case (\citealp[section 5.2]{lange}): There are two particles of equal charge initially held in place (at rest) and separated by a distance $r_1$. Then, one particle is quickly moved directly towards the other as depicted in figure \ref{particlepaths} so that at time $t$ the distance between the two particles is $r_2$. Because there is a light-speed delay in the way charged particles interact with one another, the force that each particle feels from the other at $t$ cannot be calculated just by looking at what's going on at $t$. The force on the stationary particle at $t$ is calculated by looking at the state of the particle that moved at the time when a light-speed signal from that particle would just reach the stationary particle at $t$. At this earlier time, the particle was a distance $r_1$ from where the stationary particle is at $t$. The general law describing how the force on one charge depends on the state of another at an earlier time is complex,\footnote{The law giving the force that one charged particle exerts on another is calculated from the retarded Li\'{e}nard-Wiechert potentials (\citealp[chapter 10]{griffiths}; \citealp[section 21-1]{feynman2}; \citealp[pg. 30]{lange}; \citealp[section 2]{earman2011}). Newton's third law is violated in this sort of case because we are calculating forces directly between particles, not because of the particular choice to use retarded potentials in order to do so. If advanced potentials were used instead, a similar violation would arise if the swerve were placed in the future instead of the past. If half-retarded half-advanced potentials were used to calculate the forces between particles, either swerve would be sufficient to generate a violation.} but in this simple case where both particles are at rest at the relevant times, the repulsive force that the stationary particle feels at $t$ has magnitude $\frac{q^2}{r_1^2}$. Similarly, the force on the particle that moved is calculated by looking at the state of the stationary particle at a time when the stationary particle was at a distance $r_2$ from where the particle that moved is at $t$. The repulsive force the particle that moved feels at $t$ has magnitude $\frac{q^2}{r_2^2}$, opposite but not equal the force on the stationary particle. \begin{figure}[htb]\centering \includegraphics[width=10 cm]{Figure00.jpeg} \caption{The two gray lines represent spacetime trajectories of charged particles. The dotted lines indicate which point one must examine on each particle's spacetime trajectory to calculate the force on the other at $t$---taking into account the light-speed delay on interactions.} \label{particlepaths} \end{figure} As a second example \citep[section 8.2.1]{griffiths}, imagine two particles of equal charge, both equidistant from the origin and approaching at the same speed. Particle 1 approaches along the $x$-axis from positive infinity and particle 2 along the $y$-axis. Both are guided so that they unerringly follow their straight paths at constant speed. In this case the electric forces on the two particles are equal and opposite but the magnetic forces are equal in magnitude but not opposite in direction. The magnetic force on particle 1 is in the $y$-direction whereas the magnetic force on 2 is in the $x$-direction. According to Griffiths, we should be troubled by this violation because ``...the proof of conservation of momentum rests on the cancellation of internal forces, which follows from the third law. When you tamper with the third law, you are placing the conservation of momentum in jeopardy, and there is no principle in physics more sacred than \emph{that}.'' Griffiths then immediately neutralizes the threat, writing that ``Momentum conservation is rescued in electrodynamics by the realization that the fields themselves carry momentum.'' \citet[sections 26-2 and 27-6]{feynman2} respond to apparent violations of the third law in a similar manner. They write that they will leave it to the reader to worry about whether action is equal to reaction, but point out that momentum is conserved---provided that the field momentum is included---and seem satisfied with this resolution of the puzzle. I believe these responses capture the general attitude of physicists to the apparent violation of Newton's third law and they are correct as far as they go. However, by shifting the focus to conservation of momentum they leave the question of whether Newton's third law holds unanswered. Since conservation of momentum has been upheld and the status of Newton's third law remains uncertain, one might reasonably conclude that conservation of momentum is the deeper principle. This common attitude appears in the \citet{wikipedia} article on Newton's laws of motion: ``Newton used the third law to derive the law of conservation of momentum; from a deeper perspective, however, conservation of momentum is the more fundamental idea (derived via Noether's theorem from Galilean invariance), and holds in cases where Newton's third law appears to fail, for instance when force fields as well as particles carry momentum, and in quantum mechanics.'' \citet[pg. 163]{lange} gives a more definitive rejection of the third law as a footnote to his discussion of conservation of energy and momentum, ``However, Newton's third Law (`Every action is accompanied by an equal and opposite reaction') is still violated, even if fields are real. Bodies do not exert forces on fields; bodies alone feel forces. Newton's third law was thus abandoned before relativity theory came on the scene.''\footnote{According to \citet[pg. 16]{frisch2016}, \citet{ritz1908} made a similar point while defending a version of electromagnetism without an electromagnetic field (in which charged particles act directly upon one another) and criticizing versions of the theory that include field or aether: ``[Ritz] also notes that a theory presupposing an aether does not obey the equality of action and reaction, since the particle does not react back when the aether acts on a particle.''} Another possible reaction to our quandary is to view the third law as immediately saved by the fact that momentum is conserved. If force is simply the rate of change of momentum, then the fact that the amount of momentum in the field is changing is sufficient to demonstrate that forces act on the field (presumably from matter as it is the only other actor on the scene). Because momentum is conserved, changes in momentum must cancel and thus forces must balance---Newton's third law is preserved. I think it is ultimately correct that the third law is saved by the fact that forces act on fields. However, I find this quick version of the argument unsatisfactory. One reason for dissatisfaction is that although the presence of forces on fields is suggested, a mathematical account of how forces act on fields is absent. Another problem with this quick argument is that it begs the question against someone who thinks that the conservation of momentum is a deeper principle than Newton's third law and may hold in cases where Newton's third law does not, as this argument makes obedience of the third law an immediate consequence of the conservation of momentum. Some readers might balk at the idea that forces could act upon the electromagnetic field because they think that the field is merely a useful tool, not a real thing. If the field isn't real, it's hard to see how either Newton's third law or the conservation of momentum could hold (though some clever maneuvers have been made to save Newton's third law and conservation of momentum in field-less versions of electromagnetism; see \citealp{wheeler1949}; \citealp[chapter 5]{lange}; \citealp[section 4.2]{Lazarovici2017}). Over the years, much has been said in favor of, and in opposition to, taking the electromagnetic field to be real. For my purposes here, I would like to avoid entering this debate by simply assuming a certain resolution---that the field is real---and addressing the status of the third law given this assumption. Once complete, one might take the story presented here to provide new reasons for believing the field to be real. But, I will not explicitly draw them out as this debate is not my focus. In what follows I will give a more thorough defense of the idea that forces act on fields and explain how they do so. I take the mark of a force to be the obedience of something like Newton's second law, $\vec{F}=m\vec{a}$. However, we continue to speak in terms of forces despite certain modifications to that simple equation. In particular, the second law can be extended to special relativitistic continuum mechanics. What further modifications the law can sustain while still counting as a force law is more a choice of convention than a question of deep metaphysics. Perhaps the best convention is to be liberal about such modifications and to say that wherever there is change in momentum there is force. Fortunately, we need not judge such modifications in order to determine whether the electromagnetic field experiences forces. There are two laws of relativistic continuum mechanics which might deserve to be called force laws and both are obeyed by the electromagnetic field. Establishing this requires making sense of an $m\vec{a}$ type reaction of the field to the forces it experiences. We turn to this problem in the next two sections. \section{The Eulerian Perspective}\label{fmfv} In extending Newton's second law from the case of discrete bodies to continuum mechanics we face a choice as to how to describe the physics. There are two equations that might deserve to be called ``the force law,'' an Eulerian and a Lagrangian equation of motion. In this section, I give an Eulerian force law for the electromagnetic field \eqref{momentumconservationfield} by first explaining how one can attribute mass and velocity to the field. The Eulerian force law makes clear what force matter exerts on the field but obscures the nature of field-on-field forces. In the next section, I give a Lagrangian force law \eqref{finalforcelaw} which clarifies these forces. Nonrelativistically, bodies respond to forces according to $\vec{F}=m\vec{a}$ where the mass $m$ quantifies the resistance to acceleration. Relativistically, bodies respond to forces by \begin{equation} \vec{F} = \frac{d\vec{p}}{dt}=\frac{d}{dt}\left(m_r\vec{v}\right)\ , \label{relativisticforce} \end{equation} where $\vec{p}=m_r\vec{v}$ is the body's momentum and $m_r$ is the velocity-dependent relativistic mass of the body, related to its proper mass by $m_r=\gamma m_0$ with $\gamma=\left(1-\frac{v^2}{c^2}\right)^{-\frac{1}{2}}$. (In this article I will use the word ``mass'' without prefix to mean relativistic---not proper---mass, as it is relativistic mass which is most central to the analysis here.) Because the time derivative of $m_r$ is taken in \eqref{relativisticforce}, mass no longer acts as a simple constant of proportionality between force and acceleration. To clarify the new way in which $m_r$ quantifies resistance to acceleration in relativistic particle mechanics, the force law can be rewritten as\footnote{This alternative form is arrived at by expanding the derivative of $\gamma$ in \eqref{relativisticforce}; see \citet[pg. 49]{landaulifshitzfields} for the application to electromagnetic force.} \begin{equation} \vec{F}-\frac{\vec{v}}{c^2}\left( \vec{v} \cdot \vec{F} \right)= m_r\vec{a}\ . \label{relativisticforcealternative} \end{equation} If we are interested in the force per unit volume on a continuous distribution of mass instead of the force on a discrete body, \eqref{relativisticforce} can be replaced by \begin{equation} \vec{f}=\frac{\partial}{\partial t}\left(\rho_m \vec{v}_m\right)-\vec{\nabla}\cdot \sigmaT_{\!m}\ , \label{momentumconservationfluid} \end{equation} an Eulerian force law familiar from fluid mechanics. Here $\vec{f}$ is the force per unit volume on the fluid, $\rho_m$ is the fluid's relativistic mass density, $\vec{v}_m$ is a velocity field describing the flow of this mass, $\rho_m \vec{v}_m$ is the momentum density, and $\sigmaT_{\!m}$ is the momentum flux density tensor for the fluid.\footnote{The tensor $\sigmaT_{\!m}$ used here is equal to minus the momentum flux density tensor as it is usually defined (see the tensor $\tensor{\Pi}$ in \citealp[equation 23.16]{mihalas}; \citealp[pg. 47]{landaulifshitzfluids}).} All of these quantities are functions of space and time. The subscript $m$ denotes properties of matter (as opposed to $f$ for field). If the source of the force on matter is the electromagnetic field, $\vec{f}$ is the Lorentz force per unit volume, \begin{equation} \vec{f} = \rho^q_m \left( \vec{E} + \frac{1}{c}\vec{v}^{\,q}_m \times\vec{B} \right)\ , \label{lorentzforce} \end{equation} where $\rho^q_m$ is the charge density and $\vec{v}^{\,q}_m$ is the velocity field describing the flow of charge.\footnote{For simplicity, I assume that the matter has a charge density but neither a magnetic nor an electric dipole moment density. Such properties would complicate the interaction between matter and field, e.g., in \eqref{lorentzforce}.} The superscript $q$ denotes that these quantities describe the flow of charge as opposed to mass. Section \ref{propermassdensitysec} explains why $\vec{v}^{\,q}_m\neq\vec{v}_m$. The Eulerian force law for a continuous distribution of mass can alternatively be expressed in integral form by integrating \eqref{momentumconservationfluid} over an arbitrary volume $V$ and applying the divergence theorem to $\vec{\nabla}\cdot \sigmaT_{\!m}$, \begin{equation} \iiint \frac{\partial}{\partial t}(\rho_m \vec{v}_m) dV =\iiint \vec{f}\: dV+ \oiint \sigmaT_{\!m}\cdot \hat{n}\: dA\ , \label{integralformmomentumconservationfluid} \end{equation} where $\hat{n}$ is a unit vector normal to the surface of the volume. This equation equates the rate at which the momentum of matter in a fixed volume changes over time with the force exerted on the matter in that volume plus the flux of momentum into that volume from matter outside. Although I speak of matter as a fluid, nothing I say depends on whether it is solid, liquid, or gas (or some combination). The equations I am appealing to---such as \eqref{momentumconservationfluid} and \eqref{integralformmomentumconservationfluid}---are equations of continuum mechanics, valid for solids as well as fluids. Use of this continuum-level description is neutral as to whether the matter under discussion is ultimately continuous or particulate. I refer to the matter as a fluid and imagine it as ultimately composed of charged particles because I think having such a concrete picture in mind is helpful in developing a physical understanding of the mathematics. I do not mean to be making any substantive assumptions about the kind of matter that is interacting with the field. Momentum is conserved in electromagnetism because change in the momentum of matter, as expressed in \eqref{momentumconservationfluid}, is balanced by a compensating change in the momentum of the electromagnetic field, \begin{equation} -\vec{f}=\frac{\partial}{\partial t}\left(\frac{\vec{S}}{c^2}\right)-\vec{\nabla}\cdot \sigmaT_{\!f}\ . \label{momentumconservation} \end{equation} This equation can be derived from Maxwell's equations and the Lorentz force law. The momentum density of the electromagnetic field is $\frac{\vec{S}}{c^2}$, where $\vec{S}$ is the Poynting vector which gives the energy flux density, \begin{equation} \vec{S}= \frac{c}{4\pi} \vec{E} \times \vec{B}\ . \label{poyntingvector} \end{equation} The (symmetric) tensor $\sigmaT_{\!f}$ in \eqref{momentumconservation} is the momentum flux density tensor of the electromagnetic field (also known as the ``Maxwell stress tensor,'' though I'll explain why I dislike that name later) which can be expressed in terms of the electric and magnetic fields as, \begin{equation} \sigmaT_{\!f}=\frac{1}{4\pi}\vec{E}\otimes\vec{E}+\frac{1}{4\pi}\vec{B}\otimes\vec{B}-\frac{1}{8\pi}\left(E^2+B^2\right)\tensor{I} \ , \label{maxwellstresstensor} \end{equation} where $\otimes$ is the tensor product and $\tensor{I}$ is the identity tensor.\footnote{In this paper I use the standard expressions for the energy density, momentum density, and momentum flux density tensor of the electromagnetic field. These quantities together form the field's four-dimensional symmetric stress-energy tensor \citep[section 12.10]{jackson}.} Here and throughout I use cgs units The equations which quantify the rate at which matter and field momenta change, \eqref{momentumconservationfluid} and \eqref{momentumconservation}, are quite similar. This similarity suggests taking $-\vec{f}$ to be a force exerted by matter on the field, equal and opposite to that of the field on matter. However, the momentum of the electromagnetic field is an exotic thing and its change does not obviously resemble the ordinary response of a body to a force. The momentum density of the electromagnetic field is $\frac{\vec{S}}{c^2}$, not $\rho_m \vec{v}_m$. To show that the field responds to forces in just the same way that matter does, we must attribute mass and velocity to the field. The fact that the electromagnetic field has mass can be seen as a result of the special relativistic equivalence of mass and energy (\citealp[pg. 204]{einstein1906}). The field's relativistic mass density is equal to the energy density over $c^2$ (by $\mathcal{E}=m_r c^2$), \begin{equation} \rho_f=\frac{1}{8 \pi c^2}\left(E^2+B^2\right)\ . \label{massdensityfield} \end{equation} In general, the (relativistic) mass of matter will vary over time as it exchanges energy with the electromagnetic field. Attributing the above mass to the electromagnetic field ensures that the total mass of matter and field is conserved and that the center of mass for a closed system moves inertially \citep{einstein1906}. These considerations provide strong motivation for saying that the field has mass. But, one might wonder: Does the field act like it truly has \emph{inertial} mass, the kind of mass that quantifies resistance to acceleration? It has often been noted that the field around or inside a body can contribute to the inertial mass of that body (e.g., consider accelerating a box of radiation or a spherical charge and its surrounding field; see \citealp[pg. 51--52]{whittaker2}; \citealp[section 5]{griffithsletter}). But, this is an indirect way to get at the inertial role played by the mass of the field. The mass of the field does not merely make it more difficult to accelerate bodies. We will see that the mass of the field quantifies the resistance to acceleration \emph{of the field itself}, just as the mass of a fluid quantifies its resistance to acceleration. In addition to field mass, we must also make sense of field velocity if we are to understand forces on fields analogously to forces on matter. The field velocity can be found by analyzing the flow of energy. The conservation of energy for the electromagnetic field is expressed by Poynting's theorem (which, like \eqref{momentumconservation}, is derivable from Maxwell's equations and the Lorentz force law), \begin{align} \frac{\partial}{\partial t}\left[\frac{1}{8 \pi}\left(E^2+B^2\right)\right]+\vec{\nabla}\cdot \vec{S}&=-\vec{f}\cdot\vec{v}^{\,q}_m \nonumber \\ &=-\left[\frac{\partial}{\partial t}\left(\rho_m c^2\right) + \vec{\nabla}\cdot \left(\rho_m \vec{v}_m c^2\right)\right]\ . \label{energycons} \end{align} Here I've equated the change in energy of the field with the change in energy of the matter. The rate of energy transfer between fields and matter, $\vec{f}\cdot\vec{v}^{\,q}_m$, is equal to $\vec{J}\cdot\vec{E}$ where $\vec{J}=\rho_m^q\vec{v}^{\,q}_m$ is the current density.\footnote{Being careful, velocity fields like $\vec{v}^{\,q}_m$ only give a coarse-grained description of the velocities of the particles which compose the fluid. If we assume all of the particles have equal charge, $\vec{v}^{\,q}_m$ assigns to each point in space at each time the average velocity of particles in a very small volume around that point over a very short period of time (\citealp[section 2.2]{chapman}, \citealp[section 1.2]{batchelor}). There will be particles with velocities unequal to the mean velocity and they will experience different Lorentz forces. However, because the Lorentz force depends linearly on velocity, the average velocity can be used to correctly calculate the force per unit volume on the left-hand side of \eqref{momentumconservationfluid} via \eqref{lorentzforce}. The rate of energy transfer is also linearly dependent on the velocity (since it is proportional to the dot product of the velocity and the electric field), so the average velocity can be used on the right hand side of the first line of \eqref{energycons} as well.\label{average}} In the second line of \eqref{energycons}, $\rho_m c^2$ is the energy density of matter and $\rho_m \vec{v}_m c^2$ is the energy flux density. Divide each term in \eqref{energycons} by $c^2$ and it expresses the conservation of mass. The first term becomes $\frac{\partial \rho_f}{\partial t}$ by \eqref{massdensityfield}. When integrated over a volume, the second term, $\vec{\nabla}\cdot \left(\frac{\vec{S}}{c^2}\right)$, gives the rate at which the field's mass leaves the volume. If we treated the field as having a velocity, that term would be $\vec{\nabla}\cdot (\rho_f \vec{v}_f)$ and the equation would become, \begin{align} \frac{\partial \rho_f}{\partial t}+\vec{\nabla}\cdot \left(\rho_f \vec{v}_f\right)&=\frac{-\vec{f}\cdot\vec{v}^{\,q}_m}{c^2} \nonumber \\ &= -\left[\frac{\partial \rho_m}{\partial t} + \vec{\nabla}\cdot (\rho_m \vec{v}_m)\right]\ . \label{emcontinuity} \end{align} This suggests taking the field velocity to be \begin{equation} \vec{v}_f=\frac{\vec{S}}{\rho_f c^2}\ , \label{fieldvelocity} \end{equation} equal to the field momentum density divided by the mass density or, equivalently, equal to the energy flux density divided by the energy density.\footnote{There are other possible definitions of field velocity that agree on the rate at which field mass leaves any closed volume. However, such alternative definitions would not retain the appropriate relations between velocity, energy flux density, and momentum density. Still, one could cast doubt on this definition of field velocity by challenging the standard expressions for energy flux density and momentum density---or even energy density (see \citealp[section 27-4]{feynman2}; \citealp[pg. 347, footnote 1]{griffiths}; \citealp{lange2001, lange}; \citealp[sections 31-33]{landaulifshitzfields}; \citealp[sections 6.7 and 12.10]{jackson}).} This velocity is not often discussed, but when it is it goes by the name of the ``velocity of energy transport''---though we could just as well call it the ``velocity of (relativistic) mass transport'' (\citealp{poincare1900}, \citealp[section 14.2.1]{bornwolf}; \citealp[section 12.6.2]{holland}; \citealp[box 8.3]{lange}). The magnitude of the velocity is maximized at $c$ when $\vec{E}$ is perpendicular to $\vec{B}$ and $|\vec{E}|=|\vec{B}|$. Using the mass and velocity just introduced, the conservation of momentum equation for the field \eqref{momentumconservation} looks just like the Eulerian force law for matter \eqref{momentumconservationfluid}, \begin{equation} -\vec{f}=\frac{\partial}{\partial t}\left(\rho_f \vec{v}_f\right)-\vec{\nabla}\cdot \sigmaT_{\!f}\ . \label{momentumconservationfield} \end{equation} Putting \eqref{momentumconservationfluid} and \eqref{momentumconservationfield} together, we see that the matter and the field interact like two overlapping fluids, exerting equal and opposite forces on one another via \begin{align} \frac{\partial}{\partial t}\left(\rho_f \vec{v}_f\right)-\vec{\nabla}\cdot \sigmaT_{\!f}&=-\vec{f} \nonumber \\ &=-\left[\frac{\partial}{\partial t}\left(\rho_m \vec{v}_m\right)-\vec{\nabla}\cdot \sigmaT_{\!m}\right]\ , \label{together1} \end{align} and exchanging mass with one another by \eqref{emcontinuity}. The interaction between matter and field is entirely local. The force density $\vec{f}$ on matter at a point in space is balanced exactly by a force density $-\vec{f}$ on the field. \citet{poincare1900} proposed that we treat the energy of the electromagnetic field as a ``fictitious fluid,'' with mass and velocity essentially as described above, in order to recover Newton's third law.\footnote{See \citet{weinstein2012} for a helpful translation of Poincar\'{e}'s equations into modern notation.} Poincar\'{e} sometimes talks as if matter can exert forces on the electromagnetic field, writing that the forces on a volume must be balanced by the inertial forces of the matter and the inertial forces of the fictitious fluid. He explains the way in which the action on matter is matched by an equal and opposite action on the field as follows: ``...since the electromagnetic energy behaves as a fluid which has inertia, we must conclude that, if any sort of device produces electromagnetic energy and radiates it in a particular direction, that device must \emph{recoil} just as a cannon does when it fires a projectile.'' Poincar\'{e}'s nice story is marred by the fact that he considers this fluid and its associated mass to be fictitious.\footnote{\citet{stein2014} has argued that this failure to properly appreciate the true possession of inertial mass by the field was a key reason why Poincar\'{e} did not arrive at Einstein's special theory of relativity and symptomatic of his preference for systematizing existing knowledge as opposed to generating novel consequences. Poincar\'{e} had hoped for the principle of action and reaction to be satisfied among matter alone and resisted the idea that the ether (or the electromagnetic field) is a real physical entity on a par with ordinary matter.} In the 1900 paper, Poincar\'{e} wrote that the fluid should not be considered real because it can be created and destroyed. That alone cannot be the problem. I was created and I will be destroyed. And yet, I exist. Perhaps it is only unacceptable for mass to be created and destroyed. However, from a modern (special relativistic) perspective this is commonplace---the relativistic mass of ordinary matter changes over time as well (as it exchanges energy with the field via \eqref{emcontinuity}). If we consider field and matter together, there is no creation or destruction of mass (just transfer). Poincar\'{e} has identified a way in which relativistic mass is unlike non-relativistic mass, but I don't believe he has given us any reason to think the field, its mass, or its velocity are not real. In understanding the resemblance of field to fluid noted by Poincar\'{e} and explored in this section, it is helpful to contrast it with a more widely known analogy between hydrodynamics and electromagnetism utilized by \citet{maxwelllinesofforce} in ``On Faraday's Lines of Force.'' Faraday made great progress understanding electromagnetic phenomena in terms of electric and magnetic lines of force, precursors to the modern electric and magnetic fields. Inquiring into ``the nature of the lines of magnetic force,'' Faraday at one point puts forward the hypothesis that ``physical lines of magnetic force are currents,'' seeing that these lines of force could potentially be understood as describing some kind of flow (\citealp[section 3269]{faraday3}; \citealp[pg. 243]{whittaker1}; \citealp[pg. 112]{darrigol}). Using Faraday's lines of force, Thomson developed an analogy between electrostatics and heat flow---in which heat is taken to flow along electric lines of force---and an analogy between magnetism and hydrodynamics---in which an incompressible fluid is taken to flow along magnetic lines of force (\citealp[pg. 77--80]{harman1998}; \citealp[pg. 114--118, 128--132, 136]{darrigol}). Building on the work of Faraday and Thomson, \citet{maxwelllinesofforce} introduced, as ``a purely imaginary substance,'' one incompressible fluid that flows along the electric lines of force and a second fluid that flows along magnetic lines of force (\citealp[pg. 242--244]{whittaker1}; \citealp[pg. 85--88]{harman1982}; \citealp[pg. 87--90]{harman1998}; \citealp[pg. 142--147]{darrigol}; \citealp[pg. 47--50]{lange}). These heat and fluid analogies played an important role in the development of electromagnetic theory as they allowed Thomson and Maxwell to import mathematical tools and physical insight from better understood physical theories. It should be clear that Maxwell's fluid analogy is quite different from Poincar\'{e}'s. Poincar\'{e} treated the electric and magnetic fields together as a single compressible fluid which flows in the direction of energy flux. \section{The Lagrangian Perspective}\label{forcelawforfield} Although the Eulerian force law \eqref{momentumconservationfield} captures the forces from matter on the field well, it does not make clear what forces the field exerts on itself. To see the problem, consider integrating \eqref{momentumconservationfield} over an arbitrary volume $V$ to arrive at an integral form similar to \eqref{integralformmomentumconservationfluid}, \begin{equation} \iiint \frac{\partial}{\partial t}(\rho_f \vec{v}_f) dV =\iiint \left(-\vec{f}\:\right)dV+ \oiint \sigmaT_{\!f}\cdot \hat{n}\: dA\ . \label{integralform} \end{equation} One might incorrectly read this as saying that the reaction of the field in the volume is equal to the sum of a body force and a surface force where the body force has a density per unit volume of $\vec{f}_b=-\vec{f}$ which is integrated over the volume to give the total force from matter on the field and the surface force has a density per unit area with normal $\hat{n}$ of $\vec{f}_s= \sigmaT_{\!f}\cdot \hat{n}$ which is integrated over the surface to give the total force on the field inside the volume from the field outside the volume (see figure \ref{surfaceforces}). \citet[pg. 261]{jackson} makes this misstep when he writes that if his equation for the conservation of momentum is correct, $\sigmaT_{\!f}\cdot\hat{n}$ gives ``the flow per unit area [with normal unit vector $\hat{n}$] of momentum across the surface $S$ into the volume $V$. In other words, it is the force per unit area transmitted across the surface $S$ and acting upon the combined system of particles and fields inside $V$.''\footnote{I should note that the way Jackson phrases this point suggests that forces can act on fields, though he is not very explicit about this.} This reading of \eqref{integralform} erroneously equates momentum flux and force. The first term on the right side of \eqref{integralform} is indeed a body force on the field. However, the second term is not a surface force giving the force from the field outside the volume (as would be suggested by the fact that $\sigmaT_{\!f}$ is called the stress tensor). It is the net flux of (field) momentum into the volume. The force on the field from matter is correct but the force from the field is not. To properly understand this force, we must move from an Eulerian to a Lagrangian description. Because the electromagnetic field obeys an Eulerian force law, it will also obey a Lagrangian force law.\footnote{Deriving the Lagrangian force law and thereby finding a mathematical expression for field-on-field forces requires an understanding of the field's velocity, not just its momentum. This gives us further reason to attribute velocity to the field (in addition to momentum).} \begin{figure}[htb]\centering \includegraphics[width=9 cm]{Figure1ver2.jpeg} \caption{This figure depicts the surface force $\vec{F}_s$ exerted by the field outside of a given volume containing varied charged particles and fields.} \label{surfaceforces} \end{figure} The problem with reading the surface force off of \eqref{integralform} stems from the fact that the left side of the equation gives the change in the field momentum contained within a fixed volume, not the change in momentum of the field mass which happens to be at that moment contained within the volume. The rate of change in momentum of that field mass is given by \begin{equation} \frac{D}{Dt} \iiint \rho_f \vec{v}_f \:dV\ , \label{emresponse} \end{equation} where $\frac{D}{Dt}$ is the material derivative which gives the rate of change of a quantity while following the flow (it is also known as the comoving or Lagrangian derivative). Taking the material derivative inside the integral, \eqref{emresponse} becomes \begin{equation} =\iiint \left[ \frac{D}{Dt}\left(\rho_f \vec{v}_f\right) + \rho_f \vec{v}_f \left(\del \cdot \vec{v}_f\right) \right]dV \ , \end{equation} where the second term accounts for the fact that we must consider the deformation of the volume when calculating the time evolution (see the discussion of the Reynolds transport theorem in \citealp[section 2.1]{mihalas}; \citealp[section 1.3.2]{slattery}; \citealp[sections 3.5.3 and 7.12.1]{belytschko}; \citealp[section 10]{gurtin}). Using the product rule on the material derivative yields \begin{equation} =\iiint \left[ \rho_f\frac{D\vec{v}_f}{Dt}+\vec{v}_f\frac{D\rho_f}{Dt}+ \rho_f \vec{v}_f \left(\del \cdot \vec{v}_f\right) \right]dV \ . \label{stepxxxx} \end{equation} Expanding the material derivatives gives \begin{equation} =\iiint \left[ \rho_f\frac{\partial \vec{v}_f}{\partial t}+\rho_f\left(\vec{v}_f\cdot\del\right)\vec{v}_f+\vec{v}_f\frac{\partial \rho_f}{\partial t}+ \vec{v}_f \left( \vec{v}_f \cdot \del\right)\rho_f+ \rho_f \vec{v}_f \left(\del \cdot \vec{v}_f\right) \right]dV \ . \end{equation} This simplifies to \begin{equation} =\iiint \left[\frac{\partial}{\partial t}\left(\rho_f\vec{v}_f\right)+\del\cdot\left(\rho_f\: \vec{v}_f\otimes\vec{v}_f\right)\right]dV\ . \end{equation} Using the conservation of momentum \eqref{momentumconservationfield} to expand the first term, this becomes \begin{equation} =\iiint \left[-\vec{f}+\del\cdot\left(\sigmaT_{\!f} + \rho_f\: \vec{v}_f\otimes\vec{v}_f\right)\right]dV\ . \label{almostthere} \end{equation} Applying the divergence theorem, we arrive at \begin{equation} \frac{D}{Dt} \iiint \rho_f \vec{v}_f \:dV = \iiint \left(-\vec{f}\:\right)dV + \oiint \left[\sigmaT_{\!f} + \rho_f\left(\vec{v}_f\otimes\vec{v}_f\right)\right]\cdot \hat{n}\: dA\ . \label{finalforcelaw} \end{equation} This is the Lagrangian force law for the electromagnetic field. The left-hand side is the response of the electromagnetic field in a region to forces acting on it. The first term on the right-hand side is the force resulting from interaction with matter. It is equal and opposite the Lorentz force of the fields on matter. The second term on the right-hand side is a surface force from the electromagnetic field outside of the volume (figure \ref{surfaceforces}). By parallel reasoning to the derivation of \eqref{finalforcelaw} (except that the force is opposite), the matter will satisfy \begin{equation} \frac{D}{Dt} \iiint \rho_m \vec{v}_m \:dV = \iiint \vec{f}\:dV + \oiint \left[\sigmaT_{\!m} + \rho_m\left(\vec{v}_m\otimes\vec{v}_m\right)\right]\cdot \hat{n}\: dA\ . \label{finalforcelawmatter} \end{equation} As is clear from comparing \eqref{finalforcelaw} and \eqref{finalforcelawmatter}, the mass of the electromagnetic field plays exactly the same inertial role in resisting acceleration as does the mass of a relativistic fluid. In fluid mechanics, it is $\sigmaT_{\!m} + \rho_m\left(\vec{v}_m\otimes\vec{v}_m\right)$, not $\sigmaT_{\!m}$, which gets the name ``stress tensor'' because integrating it over a surface gives the force exerted by the matter on that surface (\citealp[equation 23.17]{mihalas}; \citealp[section 15]{landaulifshitzfluids}). Similarly, we should call $\sigmaT_{\!f} + \rho_f\left(\vec{v}_f\otimes\vec{v}_f\right)$ the stress tensor for the electromagnetic field because integrating it over a surface gives the force exerted by the field on that surface. However, that name is already taken by $\sigmaT_{\!f}$ itself, the Maxwell stress tensor.\footnote{For discussion of how Maxwell arrived at his stress tensor, see \citet[pg. 270--273]{whittaker1}; \citet[pg. 168--170, 410--411]{darrigol}.} This is unfortunate. The tensor $\sigmaT_{\!f}$ is a momentum flux density tensor, not a stress tensor.\footnote{This observation in no way impugns the use of the Maxwell stress tensor as the spatial-spatial part of the four-dimensional electromagnetic stress-energy tensor which characterizes the flow of the electromagnetic field's energy and momentum. It does, however, suggest that of the different names sometimes used for the stress-energy tensor, ``energy-momentum tensor'' may be the most perspicuous.} The tensor $\sigmaT_{\!f}$ gives the flow of momentum per unit area (when dotted with the unit normal $\hat{n}$) and thus is the correct tensor to use in an Eulerian force law \eqref{integralform} where we are concerned with determining the flow of momentum in and out of a fixed volume. But, the force per unit area exerted across the surface is different, given instead by $\sigmaT_{\!f} + \rho_f\left(\vec{v}_f\otimes\vec{v}_f\right)$. It is this tensor which is used to calculate surface forces in the Lagrangian force law \eqref{finalforcelaw}. To see the difference, consider a plane wave in vacuum. The momentum flux density tensor, $\sigmaT_{\!f}$, will be non-zero as there is a flow of mass in the direction of wave propagation. However, the true stress tensor, $\sigmaT_{\!f} + \rho_f\left(\vec{v}_f\otimes\vec{v}_f\right)$, will be zero since the field's mass is everywhere flowing steadily without impediment or assistance from the surrounding field.\footnote{In more detail: Consider a linearly polarized plane wave propagating in the $x$-direction as described at a moment by $\vec{E}(\vec{x})=E_0 \cos(k x) \hat{y}$ and $\vec{B}(\vec{x})=E_0 \cos(k x) \hat{z}$. The momentum flux density tensor can be calculated via \eqref{maxwellstresstensor} yielding a single non-zero component, $\sigmaT_{\!f}=-\frac{1}{4\pi}E_0^2\cos^2(k x) \ \hat{x}\otimes\hat{x}$, describing a flow of momentum in the direction of the electromagnetic wave's propagation. The rate of change of the field's momentum density in \eqref{momentumconservation} is the divergence of this tensor, $\vec{\nabla}\cdot \sigmaT_{\!f}=\frac{1}{2\pi}E_0^2\sin(2 k x) \hat{x}$. Because $\rho_f\left(\vec{v}_f\otimes\vec{v}_f\right)$ as calculated using \eqref{massdensityfield} and \eqref{fieldvelocity} is $\frac{1}{4\pi}E_0^2\cos^2(k x) \ \hat{x}\otimes\hat{x}$, the true stress tensor $\sigmaT_{\!m} + \rho_m\left(\vec{v}_m\otimes\vec{v}_m\right)$ is zero.\label{planewavedetail}} We have seen that the electromagnetic field exerts surface forces. It is important to keep in mind that these are forces from the field on the field. The electromagnetic field does not exert surface forces on matter. It only exerts a body force with density $\vec{f}$. Still, one can calculate the force on the matter within a volume by integrating the Maxwell stress tensor over the surface enclosing that volume in special cases---when the field momentum in the volume is unchanging, $\iiint \frac{\partial}{\partial t}(\rho_f \vec{v}_f) dV=0$. Similarly, one can calculate the force on the matter within a volume by integrating the true stress tensor when there is no net force on the field in that volume, $\frac{D}{Dt} \iiint \rho_f \vec{v}_f \:dV=0$. The Lagrangian force law \eqref{finalforcelaw} can be expressed in differential form by expanding only the second material derivative in \eqref{stepxxxx}, using \eqref{emcontinuity}, equating the expression thus arrived at with \eqref{almostthere}, and dropping the volume integral, \begin{equation} \rho_f \frac{D\vec{v}_f}{Dt}= \del \cdot \left[\sigmaT_{\!f} + \rho_f\left(\vec{v}_f\otimes\vec{v}_f\right)\right]-\vec{f}+\frac{\vec{v}_f}{c^2}\left(\vec{f}\cdot\vec{v}^{\,q}_m\right)\ . \label{finalforcelawdiffform} \end{equation} This form of the force law resembles \eqref{relativisticforcealternative} where force is related to mass times acceleration (the force per unit volume on the field being $-\vec{f}\:$). This further illustrates that the field's mass, $\rho_f$, is truly an inertial mass quantifying the field's resistance to acceleration, $\vec{a}=\frac{D\vec{v}_f}{Dt}$. Although the analysis thus far has focused on the electromagnetic field, the idea that forces act on fields is quite general. For any field with well-defined energy and momentum densities, we can introduce a relativistic mass density which is proportional to the energy density and a velocity field which is the momentum density divided by the relativistic mass density. If that field obeys laws of conservation of energy and conservation of momentum in its interaction with matter (and other fields), then equations of the form of \eqref{emcontinuity} and \eqref{momentumconservationfield} will hold. From \eqref{momentumconservationfield}, \eqref{finalforcelaw} can be derived. \section{Field as Fluid}\label{fieldasfluid} In the preceding sections I have argued that Newton's third law holds in electromagnetism by showing that the electromagnetic field acts very much like a relativistic fluid. Here are three questions that might come to mind upon encountering this analogy: First, can we take these fluid equations as among the fundamental equations of electromagnetism, supplanting Maxwell's equations? Second, can we understand the field's mass density and velocity as describing properties of a large number of discrete particles at a coarse-grained level in the way that mass density and velocity are understood for ordinary fluids? Third, why has the discussion thus far focused so heavily on relativistic mass instead of proper mass? One section will be devoted to each of these three questions. These sections can be read in any order or skipped depending on the reader's curiosities. The thorough and consistent similarity between the equations with the $f$ (field) subscripts and the equations with the $m$ (matter) subscripts suggests that perhaps it is possible to give an alternative ontology for electromagnetism.\footnote{As was noted at the end of section \ref{forcelawforfield}, other non-electromagnetic fields will generally also resemble fluids in this way. One might take this as evidence that the electromagnetic field is not particularly fluid-like or as evidence that we may be able to reformulate all field theories as fluid theories.} Electromagnetism is commonly understood to be a theory describing the interaction between matter and field. The electromagnetic field appears to be a quite different sort of thing from matter, described by field variables (such as $\vec{E}$ and $\vec{B}$, the four-dimensional Faraday tensor field $F^{\mu\nu}$, or the electromagnetic four-potential $A^{\mu}$) evolving in accordance with field equations. But, the discussion in the previous sections suggests that it may be possible to treat the field as just more matter, the state of which can be represented by fluid variables (including the mass density $\rho_f$ and velocity field $\vec{v}_f$) evolving in accordance with fluid equations (such as \eqref{emcontinuity} and \eqref{momentumconservationfield}, in the Eulerian picture). Maxwell's equations, the Lorentz force law, and the use of electric and magnetic fields could then be interpreted\footnote{Evaluating the merits of such a reinterpretation may involve further comparison of field to fluid (e.g., asking whether the electromagnetic field is composed of particles, as in section \ref{numberdensitysec}).} as non-fundamental ways of describing the evolution of this fluid---a cloak which hides the true nature of the electromagnetic field.\footnote{Taking the electromagnetic field to truly be a fluid would, in a sense, mark a return to the idea of a luminiferous aether---a substance filling all of space within which electromagnetic waves propagate. However, on this picture electromagnetic waves are really more like gusts of wind (flows of mass) than sound waves (propagating disturbances in a largely stationary medium). Unlike the old aether theories, this proposal is not intended to recover an absolute notion of rest or simultaneity. The electromagnetic field would be interpreted as a \emph{relativistic} fluid, something entirely in harmony with the tenets of special relativity.} In this section I will explain briefly why I think such a reformulation would be valuable, why the preceding discussion does not immediately yield such a reformulation, and how the electromagnetic field differs from an ordinary fluid. Although there may not be experimentally detectable differences between taking the electromagnetic field to be fundamentally a field governed by Maxwell's equations or a kind of matter governed by fluid equations, I still think it would be worthwhile to develop such a reformulation of the theory. One of Einstein's primary motivations in developing his special theory of relativity was to unify the electric and magnetic fields. The Faraday tensor field is often taken to be that unification.\footnote{Another candidate for this unification is the complex-valued vector field $\vec{F}=\vec{E}+i\vec{B}$ (\citealp{good1957}; \citealp[section 16.II.A]{dresden}; \citealp{bialynicki1996}; \citealp{holland2005}).} But, fields are somewhat exotic and tensor fields are more so. If the electromagnetic field can instead be understood as a fluid, then in unifying the electric and magnetic fields we move from the more arcane to the more familiar, not vice versa. Apart from this more metaphysical motivation, there is reason to seek such a reformulation for the sake of doing physics. It is generally useful to have alternative formulations of physical theories at hand when we are solving problems or developing new theories \citep[chapter 7]{feynman}.\footnote{Hertz wrote that although ``we should in no wise confuse the simple and homely figure [of Maxwell's theory], as it is presented to us by nature, with the gay garment with which we use to clothe it'' (which is a matter of interpretation and cannot be determined by experiment), such inventive tailoring is capable of ``aiding our powers of imagination'' (\citealp[pg. 28]{hertz}; discussed in \citealp[pg. 212--215]{hesse}).} As a third motivation, such a reformulation could improve our understanding of symmetries. For example, once you replace the field with a fluid, it should be easier to show that the electromagnetism is truly time reversal invariant and invariant under Lorentz transformations. \citet[chapter 1]{albert} has pointed out that time-reversing a sequence of states (in which the particle locations and field values are fully specified) in the most obvious way (without flipping the sign of $\vec{E}$ or $\vec{B}$) does not generally take law-abiding sequences to law-abiding sequences. But, a time-reversed history of the fluid would clearly involve flipping $\vec{v}_f$ and this might explain the flip in $\vec{B}$ required for the theory to be time-reversal invariant (looking at \eqref{poyntingvector} and \eqref{fieldvelocity}, this seems plausible). Similarly, the way $\vec{E}$ and $\vec{B}$ transform under Lorentz transformations is non-trivial and often derived from the assumption that the theory is Lorentz invariant (e.g., \citealp[section 12.3.2]{griffiths}). One might hope to derive these transformation rules from less contestable transformation laws for the fluid.\footnote{This potential advantage in understanding symmetries using a fluid ontology is analogous to the advantage of a fluid ontology for quantum mechanics in understanding symmetries discussed in \citet[section 12]{sebens2015}.} If we are to replace the fundamental equations of relativistic electromagnetism with fluid equations, like \eqref{emcontinuity} and \eqref{momentumconservationfield}, we must introduce additional variables to describe the state of this fluid beyond those we've seen thus far. The Maxwell stress tensor---which is needed to calculate the dynamics of the fluid using \eqref{momentumconservationfield} or \eqref{finalforcelaw}---cannot be determined from the mass density and the velocity alone. (Too see this, imagine rotating the electric and magnetic field together about $\vec{v}_f$. This will generally change $\sigmaT_{\!f}$ but cannot affect $\rho_f$ or $\vec{v}_f$.) Further, even if we have $\rho_f$, $\vec{v}_f$, and $\sigmaT_{\!f}$ at our disposal (which contain the same information as the four-dimensional stress-energy tensor of the electromagnetic field), we will not know enough about the field to calculate the force on matter. (Consider swapping the electric and magnetic fields and multiplying one of the fields by $-1$. By inspection of \eqref{maxwellstresstensor}, \eqref{massdensityfield}, and \eqref{fieldvelocity} it is clear that this will not effect $\rho_f$, $\vec{v}_f$, or $\sigmaT_{\!f}$. But, it will in general change the forces felt by charged bodies.\footnote{If you knew the rates of change of $\rho_f$ and $\vec{v}_f$, you could calculate the Lorentz force by \eqref{momentumconservationfield}. But, then this equation would no longer be able to tell you how the field evolves.}) Thus, there must be additional degrees of freedom characterizing the state of the fluid beyond just $\rho_f$ and $\vec{v}_f$ and they must include information not present in $\sigmaT_{\!f}$. To make this proposal for new fundamental laws work, one would have to identify appropriate variables to represent these additional degrees of freedom, physically interpret them, and find additional equations to govern their time evolution.\footnote{If we think of the field as a fluid of photons, it may be possible to understand the additional degrees of freedom as describing---in aggregate---the spins/polarizations of the photons as this information does not seem to be captured by the mass density or velocity of the field.} \citet{bialynicki1997, bialynicki2003} have devised a way of introducing such additional variables, though the resulting equations are not simple and the physical interpretation of the new variables is not entirely clear. \citet{holland2005} has proposed an alternative way of introducing fluid variables to describe the electromagnetic field. As was mentioned in section \ref{fmfv}, in describing the matter as a ``fluid'' I have been speaking somewhat loosely. The use of a mass density and velocity field obeying equations like \eqref{momentumconservationfluid}, \eqref{emcontinuity}, and \eqref{finalforcelawmatter} to describe a substance does not determine whether it is fluid or solid. Similarly, in asking here whether we might be able to understand the field as a fluid, I am really asking whether we can understand it using the framework of continuum mechanics (which encompasses both solid and fluid mechanics). It is important to recognize that there are important ways in which the electromagnetic field will not resemble a true fluid. Consider a constant electric field between two oppositely charged parallel plates separated from one another by a gap in the $x$-direction, $\vec{E}=E \hat{x}$. Because there is no magnetic field, the field velocity is zero. The momentum flux density tensor is \begin{equation} \sigmaT_{\!f}=\left(\begin{matrix} \frac{E^2}{8 \pi} & 0 & 0 \\ 0 & \frac{-E^2}{8 \pi} & 0 \\ 0 & 0 & \frac{-E^2}{8 \pi} \end{matrix}\right)\ , \end{equation} by \eqref{maxwellstresstensor}. As $\vec{v}_f=0$, the momentum flux density tensor, $\sigmaT_{\!f}$, is equal to the stress tensor for the field, $\sigmaT_{\!f} + \rho_f\left(\vec{v}_f\otimes\vec{v}_f\right)$. The force per unit area with normal $\hat{n}$ is thus $\sigmaT_{\!f}\cdot\hat{n}$. If $\hat{n}$ points in the $y$ or $z$-direction, the force is compressive. But, if $\hat{n}$ points in the $x$-direction the force has the opposite sign. The electromagnetic field is sustaining a tensile force (pulling the two plates towards one another). Solids can sustain such tensile forces but fluids cannot \citep[pg. 70]{mihalas}. In this way, the electromagnetic field more closely resembles a solid than a fluid. To see another disanalogy between the electromagnetic field and a true fluid, take $\hat{n}$ to point halfway between the $x$ and $y$-directions. In this case, the force per unit area, $\sigmaT_{\!f}\cdot\hat{n}$, will not be parallel to $\hat{n}$, indicating the presence of shearing forces. An ordinary fluid cannot sustain such shearing forces when at rest (\citealp[pg. 12--14]{batchelor}; \citealp[pg. 105]{gurtin}; \citealp[pg. 70]{mihalas}). \section{Photons and the Classical Electromagnetic Field}\label{numberdensitysec} Relativistic quantum field theories can either be understood as quantum theories of relativistic fields or relativistic theories of quantum particles. In particular, the photons which mediate electromagnetic interactions between charged particles in quantum electrodynamics may be understood either as field or particle. There is debate about whether particle or field is more fundamental in quantum field theory, but to some degree the theory can be interpreted either way. What I would like to explore in this section is the extent to which we are already able to treat photons as either particle or field at the classical level. The mass density and velocity field of a relativistic fluid, $\rho_m$ and $\vec{v}_m$, describe at a coarse-grained level the properties of the particles which compose the fluid. Can we similarly understand the mass density and velocity field of the electromagnetic field as describing properties of the photons which compose the field? Photons have no proper mass and always travel at the speed of light. These features make them unusual but not unsuitable candidates for a fluid-level description.\footnote{Also, the mean free path for photons is typically large (light beams generally pass through one another undisturbed). So, photons at some location $(\vec{x},t)$ are likely to have velocities far from the mean velocity $\vec{v}_f(\vec{x},t)$ and not to be carried along with the flow. (See \citealp[chapter 1]{shu2}.)} Even if each particle is traveling at $c$, $|\vec{v}_f|$ may still be less than the speed of light as $\vec{v}_f$ describes the net flow of relativistic mass and not the actual velocity of any individual particle. Further, (as was discussed when the field velocity was introduced) $|\vec{v}_f|$ cannot be greater than $c$, which we may view as explained by the fact that the field is made of photons each traveling at $c$. There is no problem with the field having a non-trivial mass density even if its constituent particles are massless. Particles without proper mass can still have relativistic mass and collections of particles without proper mass will generally together have proper mass---proportional to the energy they posses in their collective center of momentum frame (see section \ref{propermassdensitysec}). Thus far I have focused primarily on the relativistic mass densities of fluids and fields. But, a relativistic fluid also has a number density and if the electromagnetic field is composed of particles it seems like it should have one too. Because photons are quantum particles, we must look to quantum physics to find a number density for the electromagnetic field. The possibility of finding a well-defined number-density is threatened by the fact that quantum mechanically there can be a superposition of different number densities (see \citealp[pg. 545]{holland}). It is possible to give a ``classical'' expression for the photon number density without considering the full complexities of quantum physics. Consider the electromagnetic field in vacuum. A natural strategy for finding the photon number density would be to divide the energy density of the field, $\rho^{\,\mathcal{E}}_f(\vec{x})=\frac{1}{8\pi}(|\vec{E}(\vec{x})|^2+|\vec{B}(\vec{x})|^2)$, by the energy per photon. From quantum physics, we know that the energy of a photon with wave vector $\vec{k}$ is $\mathcal{E}= |\vec{k}| \hbar c$. Because of the dependence on $\vec{k}$, it is hard to execute that natural strategy. But, it is possible to divide the energy density by the energy per photon to arrive at a number density if we work in $\vec{k}$-space. Integrating this number density over $\vec{k}$-space gives the total number of photons, \begin{equation} N=\iiint{ \frac{|\vec{\widetilde{E}}(\vec{k})|^2+|\vec{\widetilde{B}}(\vec{k})|^2}{8 \pi |\vec{k}| \hbar c} d^3 k} \ , \label{fieldnumber} \end{equation} where $\vec{\widetilde{E}}(\vec{k})$ and $\vec{\widetilde{B}}(\vec{k})$ are the Fourier transformed electric and magnetic fields,\footnote{Because the transformed fields are complex-valued, $|\vec{\widetilde{E}}(\vec{k})|^2$ is shorthand for $\vec{\widetilde{E}}^*\!\!(\vec{k})\cdot\vec{\widetilde{E}}(\vec{k})$.} \begin{align} \vec{\widetilde{E}}(\vec{k})&=\frac{1}{(2\pi)^{3/2}}\iiint{ \vec{E}(\vec{x}) e^{- i \vec{k} \cdot \vec{x}} d^3 x} \nonumber \\ \vec{\widetilde{B}}(\vec{k})&=\frac{1}{(2\pi)^{3/2}}\iiint{ \vec{B}(\vec{x}) e^{- i \vec{k} \cdot \vec{x}} d^3 x} \ . \label{ftransforms} \end{align} If you expand $\vec{\widetilde{E}}(\vec{k})$ and $\vec{\widetilde{B}}(\vec{k})$ in \eqref{fieldnumber} using \eqref{ftransforms} and perform the integral over $\vec{k}$, \eqref{fieldnumber} becomes \begin{equation} N=\frac{1}{16 \pi^3 \hbar c}\iiint{\!\!\!\iiint{ \frac{\vec{E}(\vec{x})\cdot \vec{E}(\vec{y})+\vec{B}(\vec{x})\cdot \vec{B}(\vec{y})}{|\vec{x}-\vec{y}|^2} d^3 x\: d^3 y}} \ . \end{equation} (This method of counting photons was proposed by \citealp{zeldovich}; see also \citealp[pg. 318]{bialynicki1996}; \citealp{avron}.) One can generate a number density by simply dropping one of the spatial integrals, \begin{align} \rho^{\,N}_f\!(\vec{x})&=\frac{1}{16 \pi^3 \hbar c}\iiint{ \frac{\vec{E}(\vec{x})\cdot \vec{E}(\vec{y})+\vec{B}(\vec{x})\cdot \vec{B}(\vec{y})}{|\vec{x}-\vec{y}|^2} d^3 y} \nonumber \\ &=\frac{1}{16 \pi^3 \hbar c}\left[\vec{E}(\vec{x})\cdot\iiint{\frac{\vec{E}(\vec{x}+\vec{r})}{r^2} d^3 r}+\vec{B}(\vec{x})\cdot\iiint{\frac{\vec{B}(\vec{x}+\vec{r})}{r^2} d^3 r}\right] \ , \label{fieldnumberdensity} \end{align} with $\vec{r}$ defined as $\vec{y}-\vec{x}$. It is odd that the density of photons at one point depends on what's happening everywhere else (through the spatial integral), but not obviously unacceptable---figuring out what kind of photons there are at a certain point may require examining the way the field behaves nearby (nearby field values are most important as the factor of $|\vec{x}-\vec{y}|^2$ in the denominator suppresses contributions from distant locations). To check that \eqref{fieldnumberdensity} is at least a minimally sensible expression, consider the simple case of a linearly polarized plane wave propagating in the $x$-direction with $\vec{E}(\vec{x})=E_0 \cos(k x) \hat{y}$ and $\vec{B}(\vec{x})=E_0 \cos(k x) \hat{z}$. The energy density of the plane wave is $\frac{E_0^2}{4\pi}\cos^2(k x)$ and the energy per photon is $k \hbar c$. As the reader can confirm, the photon density derived using \eqref{fieldnumberdensity} is $\frac{E_0^2 \cos^2(k x)}{4\pi k \hbar c}$, exactly as it should be. \section{Proper Mass Density}\label{propermassdensitysec} In attributing fluid-like properties to the electromagnetic field, we have not yet given it a proper mass density. The reason for this is that there are a number of oddities involved in defining the proper mass density for a relativistic fluid. It is no more difficult to define a proper mass density for the electromagnetic field, but the oddities afflicting the fluid case are inherited. There are five densities for a fluid that have come up in our discussion thus far: charge density, energy density, relativistic mass density, proper mass density, and particle number density. Corresponding to these five densities are five velocity fields which describe their flows: $\vec{v}^{\,q}_m$, $\vec{v}^{\,\mathcal{E}}_m$, $\vec{v}^{\,m_r}_m$, $\vec{v}^{\,m_0}_m$, and $\vec{v}^{\,N}_m$. Are any of these five velocity fields equal to one another? For the most part, no. The only equality that holds in general is between the velocities describing energy and relativistic mass flow (since energy is directly proportional to relativistic mass). This velocity, $\vec{v}^{\,\mathcal{E}}_m=\vec{v}^{\,m_r}_m$, is the velocity we have focused on thus far and denoted $\vec{v}_m$ (without a superscript). This velocity is generally not equal to the velocity describing the flow of particle number, $\vec{v}^{\,N}_m$, because sometimes energy (and thus relativistic mass) flows as a result of something other than the bulk motion of particles in the fluid, e.g., when there is heat flux (see \citealp[pg. 505]{landaulifshitzfluids}). If we add the assumption that the particles which compose the fluid have equal charge $q$, then the charge density is $q$ times the number density and $\vec{v}^{\,q}_m$ is equal to $\vec{v}^{\,N}_m$ (but because $\vec{v}_m \neq \vec{v}^{\,N}_m$, $\vec{v}^{\,q}_m$ will generally differ from $\vec{v}_m$, as was mentioned in section \ref{fmfv}). If the particles have equal proper mass $m_0$ and we assume (as an idealization) that all of the particles near $(\vec{x},t)$ can be treated (contra footnote \ref{average}) as moving with the same velocity $\vec{v}^{\,N}_m(\vec{x},t)$, then the proper mass density is simply $m_0$ times the number density and, because of this proportionality, the velocity describing the flow of proper mass, $\vec{v}^{\,m_0}_m$, is equal to the velocity describing the flow of particle number, $\vec{v}^{\,N}_m$ (see \citealp[equation 39.5]{mihalas}). Relaxing this idealization, the proper mass density can be defined in two different ways, each of which has undesirable features. The first method is to tie proper mass density closely to number density, insisting that the proper mass density is the particle proper mass $m_0$ times the number density and that $\vec{v}^{\,N}_m$ is, as before, equal to $\vec{v}^{\,m_0}_m$. As number density is locally conserved and transforms trivially under Lorentz transformations (picking up a factor of $\gamma$ since it is a density and length contraction shrinks the volumes over which it is integrated, \citealp[eq. 39.4]{mihalas}), proper mass density so defined will inherit these properties. But, with this definition there is little connection between proper mass density and energy density (or relativistic mass density). To see why this is so, consider a simple case in which there is no flow of particle number and no flow of energy, $\vec{v}^{\,N}_m=\vec{v}^{\,\mathcal{E}}_m=0$. Because the proper mass of a system in its rest frame is equal to the system's energy divided by $c^2$, one might hope that in this state of rest the fluid's energy density is equal to the proper mass density times $c^2$. With this definition, that will not be so. The proper mass density defined as $\rho^{\,m_0}_m=m_0\times\rho^{\,N}_m$ does not account for contributions to the energy in this frame other than the rest mass energies of the particles, such as the contribution from the heat of the fluid (the energy due the random motion of particles about their mean velocity). The second method for defining the proper mass density of a fluid ties it more closely to relativistic mass density and energy density. The proper mass density is defined in terms of the energy density, $\rho^{\,\mathcal{E}}_m=\rho_m c^2$, and the momentum density, $\rho_m \vec{v}_m$, by $\rho_m^2 c^2-\rho_m^2 |\vec{v}_m|^2=(\rho^{\, m_0}_m)^2 c^2$ (taking the relativistic relation between energy, momentum, and proper mass $(\mathcal{E}/c)^2-|\vec{p}|^2=m_0^2 c^2$, as applied to the densities of these quantities, to be definitional of proper mass density). From this equation it follows that $\rho^{\, m_0}_m=\frac{\rho_m}{\gamma}=\frac{\rho^{\,\mathcal{E}}_m}{\gamma c^2} $ where the velocity that appears in $\gamma$ is the velocity that describes the flow of relativistic mass, $\vec{v}_m$. If we consider the fluid at a point from a frame where the momentum density at that point is zero, the proper mass density will simply be given by the energy density at that point divided by $c^2$. This definition resolves the problem raised for the previous definition since all contributions to the energy are included ($\rho^{\, m_0}_m$ will thus generally be greater than $m_0\times\rho^{\,N}_m$). If we idealize away the effect of heat by assuming that all of the particles near $(\vec{x},t)$ have velocity $\vec{v}^{\,N}_m(\vec{x},t)$ and assume that there are no other contributions to the energy that need to be included beyond the rest mass and kinetic energies of the particles, then $\vec{v}^{\,N}_m=\vec{v}_m$, the energy density is $\rho^{\,\mathcal{E}}_m= m_0 \gamma c^2 \times\rho^{\,N}_m$, and the rest mass density is exactly $\rho^{\,m_0}_m= m_0 \times \rho^{\,N}_m$ (the two alternative definitions agree). On this second definition, local conservation of proper mass cannot be derived straightforwardly from either conservation of particle number or conservation of energy. This makes it difficult to find an appropriate velocity $\vec{v}^{\,m_0}_m$ to describe the flow of proper mass. On neither of the two proposed definitions will integrating the proper mass density of the fluid over the volume occupied by the fluid give the proper mass of the fluid as a whole. This is because proper mass is not additive. Consider the collection of particles that compose a gas as described by their positions and velocities, not yet by densities and velocity fields. Summing the proper masses of the particles will not give the proper mass of the gas. The proper mass of the gas is found by dividing the energy of the gas by $c^2$ in the frame where the net momentum of the gas is zero---the rest frame of the gas (see \citealp[chapter 8]{lange2001, lange}). Similarly, the proper mass of a fluid described using densities and velocity fields can be determined by integrating the fluid's energy density in the frame in which the net momentum of the fluid is zero and dividing by $c^2$. As with a relativistic fluid, the field's proper mass density can be defined in two ways. If we define it as the mass of each particle times the number density and take the field to be composed of massless photons, then the proper mass density is everywhere and always zero. Alternatively, we can derive a proper mass density using the relation $(\mathcal{E}/c)^2-|\vec{p}|^2=m_0^2 c^2$ as applied to the energy, momentum, and proper mass densities of the field (see \citealp[pg. 244]{lange}): \begin{equation} \rho^{\,m_0}_f=\frac{1}{4 \pi c^2}\sqrt{\frac{1}{4}\left(E^2-B^2\right)^2+(\vec{E}\cdot\vec{B})^2}\ . \label{fieldpropermassdensity} \end{equation} We saw earlier that the proper mass density of a fluid (defined in this second way) can be more than the particle mass times the number density, $m_0\times\rho^{\,N}_m$, because of other contributions to the energy---e.g., random particle motion a.k.a. heat. If a fluid is made of massless particles its proper mass must come entirely from such contributions as $m_0=0$. Note that the proper mass density in \eqref{fieldpropermassdensity} is frame-independent\footnote{See \citet[pg. 244]{lange} alongside \citet[problem 11.14]{jackson}; \citet[section 161]{garg}.} whereas the proper mass density for a relativistic fluid of massive particles (similarly defined) is frame-dependent. With proper mass density as with speed, only fleet-footed photons manage to appear the same in every frame.\footnote{In \citet{lange} the guiding question is whether electromagnetic interactions are local. Lange argues that this turns on the question of whether the electromagnetic field is real. On pg. 247 he summarizes his case that it is: \begin{quote} ``...we tried to use the ontological status of energy and momentum to support the field's reality ... But this argument ultimately failed when we learned from relativity theory that energy and momentum are frame-dependent, and hence unreal. Relativity did, however, reveal [proper] mass to be real. Its ontological status has now come to underwrite the electromagnetic field's reality, since the field has turned out to possess [proper] mass.'' \end{quote} The analysis in this section challenges that reasoning. It is true that, as Lange emphasizes, the proper mass density of the field as defined by \eqref{fieldpropermassdensity} is frame-independent. But, this is a special feature of the electromagnetic field and thus an odd hook on which to hang its reality. The proper mass density for a relativistic fluid similarly defined will be frame-dependent, and yet we do not doubt whether such fluids are real. Of course, there is another reason available for taking relativistic fluids to be real: the particles that compose such fluids have frame-invariant proper masses.} As was the case for a relativistic fluid, the proper mass of the field as a whole is not the integral of the proper mass density. Instead, it can be determined by integrating the field's energy density in the frame in which the net momentum of the field is zero and dividing by $c^2$. This method of determining the field's proper mass raises problems. There may be no rest frame for the field as a whole (as would happen if, for example, the field is that of a plane wave traveling at $c$; see \citealp{rohrlich1970}). To avoid this problem we can define the proper mass of the field in a particular frame in terms of the field's total energy and momentum in that frame by $(\mathcal{E}/c)^2-|\vec{p}|^2=m_0^2 c^2$. Because the three-dimensional hyperplane of simultaneity in a moving frame will not agree with the hyperplane of simultaneity in the original frame and in the gaps between these hyperplanes there may be an exchange of energy (and momentum) between the field and matter, the field's proper mass will end up differing from frame to frame. This can seem problematic when it is put as a lament that the field's energy and momentum do not transform as a four-vector: the inner product of the energy-momentum four-vector with itself, $(\mathcal{E}/c)^2-|\vec{p}|^2=m_0^2 c^2$, is frame-dependent. (If there is no matter present and the field is truly isolated this problem will not arise.\footnote{This can be put another way: the total energy and momentum of the field will transform as a four-vector if there is no matter present because the divergence of the stress-energy tensor is zero everywhere \citep[problem 12.18]{jackson}.}) In response to this second problem, we can either define the field's energy, momentum, and proper mass as relative to a specified hyperplane (\citealp{rohrlich1970, rohrlich26, rohrlich}) or just note that only when we speak of matter and field together will energy and momentum transform as a four-vector and proper mass be frame-invariant (\citealp{griffithsowen}; \citealp{rohrlich26}). \section{Conclusion} In electromagnetism, as in Newton's mechanics, action is always equal to reaction. The force from the electromagnetic field on matter is balanced by an equal and opposite force from matter on the field. The response of the field to this force can be given in Eulerian \eqref{momentumconservationfield}, \eqref{integralform} or Lagrangian \eqref{finalforcelaw}, \eqref{finalforcelawdiffform} form. These equations perfectly match those that govern a relativistic fluid. From examination of the analogy it is clear that the mass of the field plays exactly the same inertial role as the mass of a fluid and also that the Maxwell stress tensor is really a momentum flux density tensor, not a stress tensor. This perfect match of field and fluid equations suggests that it may be possible to reinterpret the electromagnetic field as a fluid of photons.\\\\ \noindent \textbf{Acknowledgments} \noindent Thank you to Craig Callender, Dirk-Andr\'{e} Deckert, Mario Hubert, and Mark Lange for valuable discussions and helpful feedback on drafts of the paper. Special thanks to Erik Curiel, Dennis Lehmkuhl, and James Weatherall. Thanks also to the anonymous referees who provided useful comments on the paper.
\section{Conclusion} In this paper we have proposed a new method for finding spatial interference regions for VLC using off the shelf LEDs and the rolling shutter effect. Spatial interference detection can be used in AR applications for Ubiquitous networks and IoT, for instance as a discreet replacement for QR codes. Our method allows to increase the number of LEDs used to transmit a single message. By introducing such spacial parallelism, we are able to strikingly increase the bandwidth of the system. Our protocol is efficient for very shot transmissions such as IDs of devices, it contains too much overhead for a continuous flow. In future works, we plan to design another protocol which would enable to exploit spatial parallelism for longer transmissions, and integrate it in high power lightbulbs in a similar way as LiFi~\cite{lifi}. In order to achieve this goal, we should be able to take care of some problems we overlooked in our work such as the orientation of the interference region, as well as the situation where the interference region gets bigger than the transmission regions. \section{Acknowledgements} This research has been supported, in part, by General Research Fund 26211515 from the Research Grants Council of Hong Kong, Innovation and Technology Fund ITS/369/14FP from the Hong Kong Innovation and Technology Commission. \section{Evaluation} \label{sec:eval} In this section we evaluate the parameters that may affect the performance of our method, both analytically and experimentally. To analyze how the distance between Light sources affects the interference regions we assume both sources are identical, located at equal height $h$ from the surface, and have equal cut off angle of 60 degrees. We assume $\phi,\theta$ are equal to each other for computation simplicity. The channel equation becomes: \begin{equation} cos(\phi)=cos(\theta)=\dfrac{h}{\sqrt{x^2+y^2+h^2}} \end{equation} \begin{equation} H_i(0) = \dfrac{C_1cos(\phi)cos(\theta)}{h^2+x^2+y^2} = \dfrac{C_1h^2}{(h^2+x^2+y^2)^2} \label{eq:channel} \end{equation} From~\ref{eq:channel} we observe that the region characteristics depend on the height (distance to surface) $h$ and $d_{xy}=\sqrt{x^2+y^2}$, the position of the LED relatively to its reflection in the 2D plane. To analyze the effect of $d_xy$ and $h$ we simulate the light intensity model with Matlab. In a first time, we consider $h$ as constant and vary $d_{xy}$ then we consider $d_{xy}$ as a constant and vary $h$. \subsection{Effect of distance between Light sources} \label{sec:theory} In this section, we compare the normalized energy ratio between the transmission regions and the interference regions, relatively to $h$ and $d_{xy}$. This energy ratio can be computed as $\dfrac{1}{E_{min}}$, $E_{min}$ being the local minimum energy level between two energy peaks (see Figure~\ref{fig:EnergySim}). The results of the simulations are displayed Figure~\ref{fig:EnergyRatio}. \begin{figure}[t] \centering \includegraphics[width=0.45\textwidth]{figs/EnergySim.eps} \caption{Simulated energy plot $L_t$ corresponds to length of transmission region in pixels, $L_i$ corresponds to length of interference region in pixels.} \label{fig:EnergySim} \vspace{-0.5em} \end{figure} We also compare the size of the interference region relatively to the size of the transmission regions for various $h$ and$d_{xy}$. To do so, we first define a cut off energy level as $E_c = \dfrac{1+E_{min}}{2}$. Using this cut off energy we can define both the transmission and the interference regions as: \begin{equation} \left\{ \begin{array}{ll} transmission & E>E_c \\ interference & E<E_c\\ \end{array} \right\} \end{equation} When light sources are close to each other or when h gets larger, different light sources act as a single point source. Therefore, the transmission and interference regions cannot be separated. We display the results of this simulation Figure~\ref{fig:AreaRatio}. Both Figures~\ref{fig:EnergyRatio} and~\ref{fig:AreaRatio} display the same phenomenon. The behavior of increasing h and $d_{xy}$ is similar for both energy and area ratios. This suggests that interference region can be characterized by the ratio between h and $d_xy$. We identify three cases, that we represented on Figures~\ref{fig:EnergyRatio} and~\ref{fig:AreaRatio}: \begin{enumerate} \item Light sources are very close to each other, with high $\dfrac{h}{d_{xy}}$ and act as a point source. \item Light sources are at a medium distance, a clear interference region is created by the cut off angle. \item Light sources are at far distance to each other with wider cut off angle and low $\dfrac{h}{d_{xy}}$ ratio. In this case there is a large interference region with low energy. \end{enumerate} \begin{figure}[t] \centering \includegraphics[width=0.45\textwidth]{figs/EnergyRatio.eps} \caption{Energy ratio of maximum and minimum points, which corresponds to transmission and interference regions. h = 50. As the ratio decreases it is easier to detect regions.} \label{fig:EnergyRatio} \vspace{-0.5em} \end{figure} \begin{figure}[t] \centering \includegraphics[width=0.45\textwidth]{figs/AreaRatio.eps} \caption{Area ratio plot. } \label{fig:AreaRatio} \vspace{-0.5em} \end{figure} In the first case, the light intensities of the sources are approximately equal on the illuminated surface. This causes the majority of the illuminated region to appear as an interference region. Recovering the transmitted code in these condition becomes challenging. In the second case, the interference region borders are clearly visible due to the sudden change in energy. It is easy to detect both interference regions and the transmission. This case can be represented in real life as a LED array sending parallel data. In the third case, we observe a smooth transition of energy levels between the interference and transmission regions. However the area of the interference region becomes larger than the transmission region as change on x,y locations is not affecting the total distance as much as changes in height. Cases two and three show that the light intensity of the interference region is strongly dependent on the position of the LEDs, and can even get lower than the transmission region. In such a scenario, a method based on energy of frequency contents would be more robust instead of detecting interference by light intensity. Moreover, Figure~\ref{fig:EnergyRatio} shows that varying the height or the xy location has contradictory effects. If the LEDs get too close to each other, the interference region gets difficult to differentiate from the transmission regions. On the other hand, putting the LEDs at a lower height enables optimal conditions for interference detection. \subsection{Experimental illustration} \begin{figure}[h!t] \centering \includegraphics[width=0.45\textwidth]{figs/setup.eps} \caption{The experimental setup} \label{fig:setup} \vspace{-1em} \end{figure} In this section, we aim to display the effect of various $h$ to $d_{xy}$ in real life conditions. To this purpose, we connected consumer market LEDs to an Intel Gallileo which handles the modulation and synchronization (see Figure~\ref{fig:setup}). The LEDs have 0.3\,W power and work with 5\,V from an USB outlet. The Intel Galileo modulates the LEDs at 8\,KHz. Due to the low power of the LEDs, we kept a low constant $h$=100\,mm. We ran the experiment in three different scenarios: \begin{itemize} \item High $\frac{h}{d_{xy}}=5$, cutoff angle of 60\textdegree \item Medium $\frac{h}{d_{xy}}=2$, cutoff angle of 60\textdegree \item Low $\frac{h}{d_{xy}}=0.3$. In this case, the $h$ to $d_{xy}$ ratio is so high that we had to use a cutoff angle high enough to get both light sources to merge on the reflection surface. \end{itemize} \begin{figure}[h!t] \centering \includegraphics[width=0.49\textwidth]{figs/interferenceExperiment.eps} \caption{Interference Regions on image taken by a camera. (a) The LEDs act like single point source, the illuminated area is covered by the interference region. (b) Interference and transmission regions are clearly repeatable, (c) the interference region is at a very low energy area, due to limitations of LEDs and smart phone camera it is hard to capture a robust image from this area.} \label{fig:experiment} \vspace{-1em} \end{figure} Figure~\ref{fig:experiment} displays the effect of high, medium and low $\frac{h}{d_{x}}$. In Figure~\ref{fig:experiment}.a, both LEDs are too close to each other compared to the distance to the surface (Zone A of Figure~\ref{fig:AreaRatio}), and the transmission region is hard to distinguish. On Figure~\ref{fig:experiment}.b, both interference and transmission regions are clearly distinguishable and the signal can be properly decoded. Finally Figure~\ref{fig:experiment}.c displays the effect of a low $\frac{h}{d_{xy}}$. As we are using low power LED and a short exposure time, the effect is harder to display on a picture. This shows what may happen when LEDs are too far away from each other, as it may happen for instance when illuminating an object from all sides in a display case. However, for most applications, we expect LEDs to be close to each other, resulting in the situations presented in Figures~\ref{fig:experiment}.a and~\ref{fig:experiment}.b. This section confirms the theoretical results presented in Section~\ref{sec:theory} : the optimal ratio to detect the interference region is comprised between 0.5 and 2. \section{Introduction} The recent emergence of new technologies such as Augmented Reality (AR) or the Internet of Things (IoT) introduced new use cases which heavily rely on unique object identification. For instance, an application may need to spatially identify several connected devices in order display informations and controls to the user. In such a scenario, multiple objects have to be recognized in real time using the camera of a smartphone or smartglasses, in order to superimpose a virtual control layer on top of the physical world. Two main approaches are currently used for object identification: markers that convey a message to the receiver and markerless systems that use image processing techniques~\cite{Genc:2002:MTA:850976.854956}. Markerless systems rely on computation-heavy vision algorithm to identify devices. Their complexity dramatically increase when several similar looking devices have to be uniquely identified. Using markers therefore presents various benefits. If most ongoing techniques rely on image recognition, the detection algorithms are lightweight enough to operate seamlessly on mobile devices. Besides, each marker transmits a specific message. This latter property is especially useful for building ubiquitous networks and their related AR applications, as those networks may integrate similar looking devices, or even non visible appliances embedded inside the walls. QR codes are the most widely deployed marker based approach to identify such objects due to their ability to contain large amounts of information combined with deployment simplicity. However, QR codes present several critical drawbacks. First of all, QR codes is not aesthetically pleasing. For instance, in a home IoT situation, users may not want to cover their walls with markers for the sake of efficiency~\cite{wein2014visual}. Second, depending on the position of the marker, it may be tricky for a human to figure out which object it's related to, as the format doesn't present any additional human readable information. Finally, as the technology is vision-based, the markers require an unobstructed line of sight, with a small enough viewing angle to be decoded. Similarly, transmitting over longer distances requires QR codes of increasing sizes. Visible Light Communication(VLC) may then be considered to solve such issues. By modulating the intensity of a light source at a higher frequency than the human eye can detect, VLC can be inconspicuously introduced in various environments, for instance in the lighting or status LEDs of the corresponding object. Moreover, distance, viewing angle and line of sight will cause VLC to operate with degraded performance to some extent, as opposed as the \textit{all-or-nothing} behavior of QR codes. In this article, we propose to increase the effectiveness of current VLC based object identification through parallel transmission. If this solution displays several obvious advantages (easy identification of separate objects, increased bandwidth), it also introduces new challenges to address: \begin{itemize} \item identifying which light sources are linked together. \item isolating the regions of different transmission. \item identifying objects close to each other by recognition of the interference region. \end{itemize} To face those challenges, we design a specific data-link layer protocol. By employing orthogonal preambles, we are able to identify the interference regions and isolate the different signals. This article is organized as follows: after reviewing research studies related to VLC and marker-based object identification (section~\ref{sec:related}), we describe our system design in section~\ref{sec:system}. We finally analyze the performances and limitations of our model in section~\ref{sec:eval}. \section{Related Works} \label{sec:related} Marker systems based on VLC can be divided into three categories: color codes, spacial codes and temporal codes. Color codes are very vulnerable to lighting variations. While they can be used alone for tracking algorithms, they only provide very small data rates~\cite{koutaki2015poster}. For this reason they are generally used in combination with temporal or spatial codes to provide additional information~\cite{Fath:14,Hu:2015:CID:2716281.2836097}. One of the most used spatial code is the QR code. QR codes have the benefit of high data density and easy application\cite{ISO18004}. However they are prone to errors caused by lighting and orientation changes. Another study proposed to exploit light reflection only to identify moving vehicles~\cite{Wang:2016:PCA:2999572.2999584}. Temporal codes provide more robustness against lighting and orientation variation. By modulating LEDs with very high frequency, several teams managed to send data at rates reaching gigabit/s~\cite{azhar2013gigabit,tsonev20143}. However, such high data rates can only be achieved with silicon photo diodes. On the other hand, the camera on a smartphone can only provide a connection with low data rates~\cite{jovicic2013visible}. Even though communication with a CMOS camera is much slower, there are several reasons to prefer using it over photo diodes for object identification: \begin{itemize} \item Photo diodes lack the spatial information that cameras have. \item CMOS cameras are already built in smartphones, while fast response photo diodes are not readily available. \end{itemize} Due to Nyquist theorem~\cite{oppenheim1999discrete}, temporal communication through cameras over frames can only achieve a data rate of 15\,Bit/s if the camera can record 30 frames per second. Nevertheless, Christos Danakis et al. have showed that by exploiting the rolling shutter effect on CMOS cameras, it is possible to increase the data rate to 1\,Kb/s~\cite{danakis2012using}. The rolling shutter effect has opened many possibilities for VLC applications on smartphones. Panasonic already has a commercial VLC marker project "Light ID"~\cite{lightid}. Luxapose uses the rolling shutter effect to identify different LEDs and use them for accurate indoor positioning~\cite{kuo2014luxapose}. Rajagopal et al. have used modulated ambient light in the 8Khz frequency range (making the flickering invisible to the human eye), and successfully separated 29 channels in the time domain with 0.2khz channel separation using rolling shutter effect~\cite{rajagopal2014visual}. DisCo group has constructed a system that introduces robustness against occlusion, movement and distance~\cite{jo2014disco}. Several studies have been performed on combining spatial and time domain to increase visible light communication transmission rates. VRCodes uses binary coding with color, time and space domain to increase data rates by modulating LCD screens or projectors~\cite{woo2012vrcodes}. COBRA uses a color barcode stream system to utilize color, time, space domain~\cite{hao2012cobra}. T. Langlotz and O. Bimber also proposed 4D barcodes projected by screens~\cite{langlotz2007unsynchronized}. However these works focus on transmission through lcd screens. In our work we introduce a method using orthogonal preamble to separate channels on spatial domain. Our work focuses on identifying interference regions of multiple LEDs used for illumination and introduce spatial parallelism to VLC using LEDs. \section{System Design} \label{sec:system} In this study, we consider a scenario for AR applications interacting with ubiquitous computing networks. In this arrangement, a large amount devices have to be identified in real time. The conditions of detection may vary from optimal -- marker at close distance, right in front of the camera -- to the marker being partially occulted. In order to achieve those goals, we exploit the rolling shutter effect of the smartphone's camera, in combination with a specific protocol for the message to be recovered by the receiver. \subsection{The rolling shutter effect} Most CMOS cameras integrated in smartphones take pictures using a rolling shutter. The scene is therefore scanned in one direction, line by line, instead of taking a snapshot of the whole scene. As all parts of the scene are not recorded at the same instant, fast moving objects and rapid variation of light leave a distinctive, predictable pattern on the image. By flashing the LED at a high frequency (around 10\,KHz) on the transmitter side, and exploiting the rolling shutter effect on the receiver side, the light source will leave specific black stripes on the picture, each stripe corresponding to a moment the LED is switched off. Exploiting this effet, we are able to squeeze more data bits in a single frame of the camera (in our protocol, 28), increasing the effective bandwidth of the system. Another advantage of this technique resides in the fact that the camera doesn't have to be directly pointed towards the light source. In our case, we use the reflected light on a surface as the main transmission medium. \subsection{Transmitter} Our protocol transmits one byte of data per LED for identification, with the lowest channel capacity available. The transmitter sends two preamble bits before every symbol, and four preamble bits to signal the end of transmission, making the full transmission 28 bits long for (see Figure~\ref{fig:protocol} ). As the transmission is only one byte long, using a short preamble actually yields similar results compared to using a single long preamble, and ensures recovery of every symbol even in degraded conditions, while making the interference region easier to isolate. \begin{figure}[ht] \centering \includegraphics[width=0.4\textwidth]{figs/protocol.eps} \caption{The transmission protocol: 2 bits preamble before each actual data bit and 4 bits for end of transmission.} \label{fig:protocol} \end{figure} Regarding the modulation, Manchester coding is usually favored for its ability to code clock data into the signal. However, on/off keying uses half of the bandwidth. With this protocol, on/off keying permits us to transmit data with similar efficiency as if we used Manchester Coding with a single long preamble. We make sure that consecutive LEDs transmit orthogonal preambles so that intersecting preambles cancel each other and create a region without modulation. Let $sp_i(t)$ be the preamble signal, $st_i(t)$ the on off keying signal, $\phi$ the irradiation angle, $\theta$ the incidence angle, $T$ the period of modulation, $i$ the LED number and ${x_i}$ is transmitted bit by $i^{th}$ Led ($x_i \in [0,1]$). We can describe $sp_i(t)$ as follows: \begin{equation} sp_i(t) = \left\{ \begin{array}{ll} \dfrac{1+(-1)^i}{2} & t<T \\ \dfrac{1-(-1)^i}{2} & T<t<2T \\ \end{array} \right\},\ st_i={x_i\ t<T},\ \end{equation} The full transmission can then be represented as: \begin{equation} P_i(t) = \left\{ \begin{array}{ll} sp_i(t) & if\ preamble \\ st_i(t) & if\ sending\ bit \\ \end{array} \right\} \label{eq:preamble} \end{equation} \subsection{Receiver} The receiver exploits the rolling shutter effect to recover the encoded signal. In this section, we call X axis the axis perpendicular to the rolling shutter direction, and Y axis the axis parallel to the shutter direction. Our X axis is therefore always the axis parallel to the black stripes generated by the LEDs. The reception process is composed of three phases : \begin{itemize} \item Detecting the different light areas. \item Finding the interference regions for each area. \item Demodulate the signal and recover the message. \end{itemize} \subsubsection{Light source detection} The light source detection process is similar to Luxapose\cite{kuo2014luxapose}. We first pass the image through a Gaussian filter to eliminate the dark areas caused by modulation. Then we find the contours of the white areas to extract the different light sources. As the camera's shutter speed is fast, the ambient light is filtered out, isolating the transmitting light sources. We then proceed to find the interference region for each light source. \subsubsection{Finding interference region} The CMOS camera of a smartphone captures the reflected light from a surface. To recover the signal and detect the interferences, we focus on the relative light intensity distribution on surface. \begin{figure}[t] \centering \includegraphics[width=0.25\textwidth]{figs/optical.eps} \caption{The Lambertian radiance pattern} \label{fig:lambertian} \vspace{-0.8em} \end{figure} We use the Lambertian radiance pattern as the channel model (Figure~\ref{fig:lambertian}). Let $A$ be the Area of the receiver, $d$ the distance of the light source to the surface, $\phi$ the irradiation angle, $\theta$ the incidence angle and $m$ the Lambertian coefficient (constant, depends on cut off angle of LED, m=1 for $60^o$). We consider the equation for a single LED $i$ The radiance $H$ can be expressed as~\cite{kahn1997wireless}: \begin{equation} H_i(0) = A\dfrac{m+1}{2\pi}\dfrac{cos(\phi)^mcos(\theta)}{d_i^2} \label{eq:lambert} \end{equation} To simplify the equation we consider $C_1=A\dfrac{m+1}{2\pi}$ and assume the surface and the light sources are perpendicular to each other. Then $\theta = \phi$ The channel equation becomes: \begin{equation} H_i(0)=\dfrac{C_1}{d_i^2}cos(\phi)^{m+1} \end{equation} And from~\ref{eq:preamble} and~\ref{eq:lambert} the light intensity is: \begin{multline} s_r(d,t)=\sum_i{H_i(0)P_i(t)+s_a(t)}\\ =\sum_i{\dfrac{P_i(t)C_1}{d_i^2}cos(\phi_i)^{m+1}+s_a(t)} \end{multline} $s_a(t)$ representing the ambient light. With the rolling shutter mechanism, light is captured line by line, and only the spatial location is available in the X direction. However columns sample both spatial and temporal information. We simulated two overlapping light regions with random signals. The results are presented on Figure~\ref{fig:Interference}. On Figure~\ref{fig:Interference}.a is represented the simulated LEDs, with the interference region in the center. Figure~\ref{fig:Interference}.b represents the same region after applying the edge detection algorithm. As we can see, the high frequency content of the interference region is negligible, leaving a distinguishable mark in the center. Finally, Figure~\ref{fig:Interference}.c shows the actual picture of 2 interfering LEDs, to validate the results of the simulation. \begin{figure}[t] \centering \includegraphics[width=0.45\textwidth]{figs/simLEDInterference.eps} \caption{a) Simulated LEDs with an interference region. b) edge detection algorithm applied to the simulated image, high frequency content at interference region is minimal. c) an image taken by a smart phone camera. } \label{fig:Interference} \vspace{-0.8em} \end{figure} We detect interference region by calculating the average of the energy levels of high frequency content over the X axis. We start by computing the average energy levels over a window on the Y axis. Let $T_d$ be the amount of pixels required to transmit one bit of data. $T_d=\dfrac{T}{T_s}$, with T the modulation period and $T_s$ the sampling period. To ensure the presence of at least a single preamble in the window, its length has to be larger than $3T_d$. The average of the window is then subtracted to the signal eliminate its DC content. We finally compute the remaining energy of the signal as follows: \begin{equation} E=\sum_{n=0}^{3T_d}{|X[n]|^2} \end{equation} We then repeat this operation over the X axis and compute the sliding average of the resulting energy levels. In Figure~\ref{fig:region detection}, we can observe how the energy levels change according to the regions: at the transmission region of LED $i$, the high frequency content is higher, thus the energy levels are also higher. When getting closer to the interference region, the energy levels start to drop, then rise again when approaching the transmission region of LED $i+1$. The local minimum points of the graph will give the center of the interference regions, where SNR is lowest. Once the regions of transmission are detected, the algorithm considers them as sub images, and decodes them separately. As our system transmits only one byte of information per LED, we decided to process the light sources linearly: the first region sends the first part of the signal, the second region sends the second etc. Similarly, we solve the problem of orientation by always using an even number of LEDs. As we use two orthogonal preambles, the signal starts with the LED showing the first preamble and ends with the last LED to use the other one. \begin{figure}[t] \centering \includegraphics[width=0.45\textwidth]{figs/interference_region_detection.eps} \caption{a) interference region captured with a smartphone camera b) Energy levels of window slices through X axis. The energy levels drop around the interference zone} \label{fig:region detection} \vspace{-0.8em} \end{figure} \subsubsection{Demodulation} The demodulation of the signal is done along the Y axis. First the DC content is filtered out and 2D image is converted to 1D image. As the lighting conditions may vary along Y axis, we made the choice to remove the DC component by subtracting the moving average to the signal instead of using the full signal mean. The window size of the moving average filter is chosen to be $3*T_n$ to include preamble into mean calculation. \begin{equation} f(z) = \left\{ \begin{array}{ll} 0.5 & z>0 \\ -0.5 & z<0\\ \end{array} \right\} \end{equation} where z is the current pixel value on gray-scale. As the channel noise is relatively low in visible light communication, the threshold function does not cause large jumps between sample points. The whole decoding process is shown on Figure~\ref{fig:decode}. \begin{figure}[t] \centering \includegraphics[width=0.45\textwidth]{figs/decoding.eps} \caption{On top the the signal array converted 1D is given. DC content is not filtered out yet, but modulation is visible. Second panel shows the processed signal. function.} \label{fig:decode} \vspace{-0.5em} \end{figure} To recover the clock, we use a digital early late clock recovery algorithm. The frequent preamble signals satisfy the required high to low, low to high transitions for the algorithm to work.
\section{Introduction} This paper is motivated by one of the major open problems in Linear Dynamics, see \cite[Question 4.3]{BaGr06} and also \cite[Problem 44]{GMZ16}. \begin{question}[Bayart, Grivaux 2006] \label{q1} Let $T$ be an invertible frequently hypercyclic operator. Is $T^{-1}$ frequently hypercyclic? \end{question} It is a consequence of the Baire category theorem (via the Birkhoff transitivity theorem) that the corresponding result is true for classical hypercyclicity, see \cite{BaMa09}, \cite{GrPe11}. Since an operator and its inverse share all their periodic points, the result is also true for chaotic operators. However, the Baire category theorem loses its power for frequent hypercyclicity, see \cite[Proposition 4.1]{BaGr06}, hence the interest in Question \ref{q1}. There seems to be a consensus that the answer to the question should be negative. And a good (as well as tractable) candidate might be a suitable bilateral weighted shift operator. Bayart and Ruzsa \cite{BaRu15} have recently obtained the somewhat surprising result that a bilateral weighted shift on $\ell^p(\IZ)$, $1\leq p<\infty$, is frequently hypercyclic if and only if it is chaotic, which then excludes these operators as counter-examples. This leaves the space $c_0(\IZ)$ as a natural underlying space, even more so as shifts on spaces of null sequences have already provided various counter-examples in Linear Dynamics, see \cite{BaGr07}, \cite{BaRu15}, \cite{BMPP16}, \cite{BoGr17}. Invertible frequently hypercyclic bilateral weighted shifts on $c_0(\IZ)$ have been characterised by Bayart and Ruzsa \cite{BaRu15}, but the complexity of the conditions has so far not allowed to decide Question \ref{q1} for such operators; see also \cite[p.~707]{BaRu15}. Recently, the related notion of upper frequent hypercyclicity has attracted some attention, see \cite{BaRu15}, \cite{BMPP16}, \cite{BoGr17}. Again, the following problem, which appears implicitly in the paper of Bayart and Ruzsa \cite{BaRu15}, is open. \begin{question}\label{q2} Let $T$ be an invertible upper frequently hypercyclic operator. Is $T^{-1}$ upper frequently hypercyclic? \end{question} Interestingly, Bayart and Ruzsa show that if $T$ is invertible and frequently hypercyclic then $T^{-1}$ is upper frequently hypercyclic. They also show that the answer to Question \ref{q2} is positive for weighted backward shifts $B_w$ on $\ell^p(\IZ)$, $1\leq p<\infty$, which suggests again shifts on $c_0(\IZ)$ as the next candidates for a counter-example. The main result of this paper is to dispel this hope. \begin{theorem}\label{t-main} Let $B_w$ be an invertible weighted backward shift on $c_0(\IZ)$. If $B_w$ is upper frequently hypercyclic then so is $B_w^{-1}$. \end{theorem} The proof requires both constructive arguments and an application of the Baire category theorem. Indeed, the fact that Baire is back in force for the notion of upper frequent hypercyclicity was first noticed by Bayart and Ruzsa \cite{BaRu15} and then further developped in \cite{BoGr17}. This, then, might suggest that the answer to Question \ref{q2} is positive for all operators. However, the Birkhoff type theorem for upper frequent hypercyclicity obtained in \cite{BoGr17} is fundamentally non-symmetric, which leaves open the possibility that the answer is nonetheless negative in general. The paper is organized as follows. In Section \ref{s-nn} we fix terminology and notation; in particular we associate a space $\widehat{X}$ to a Banach sequence space $X$ in which the canonical unit sequences form a basis. In Section \ref{s-bilwsarb} we characterise (under suitable assumptions) when a weighted backward shift on $\widehat{X}$ is $\mathcal{A}$-hypercyclic for $X$, and this for arbitrary Furstenberg families $\mathcal{A}$. The proof is constructive. In Section \ref{s-fortoin} we show how one may pass from $\mathcal{A}$-hypercyclicity \textit{for} $X$ to $\mathcal{A}$-hypercyclicity \textit{in} $X$ in the case when $\mathcal{A}$ is an upper Furstenberg family; this result might also be of independent interest. Its proof uses the Baire category theorem. As an application we obtain a characterisation of $\mathcal{A}$-hypercyclicity for weighted backward shifts on $X$ for such families, see Section \ref{s-bilwsupp}. This then allows us to prove Theorem \ref{t-main}. In Section \ref{s-bilwsXarb} we obtain a (different) characterisation of $\mathcal{A}$-hypercyclicity for weighted backward shifts on $X$ for arbitrary Furstenberg families. We end with a remark on unilateral weighted backward shifts, see Section \ref{s-uni}. \section{Terminology and notation}\label{s-nn} An operator $T$ on a (real or complex) Banach space $X$ is \textit{hypercyclic} if it admits a dense orbit $\{T^nx:n\geq 0\}$, in which case $x$ is called a \textit{hypercyclic vector}; for the operator to be \textit{chaotic} we need, in addition, a dense set of periodic points. The operator $T$ is called \textit{frequently hypercyclic} if there is a vector $x\in X$ such that, for any non-empty open subset $U$ of $X$, the set $\{n\geq 0 : T^nx\in U\}$ has positive lower density, that is, \[ \liminf_{N\to\infty} \frac{1}{N+1} \text{card}\{n\leq N : T^nx\in U\} >0; \] the vector $x$ is then called a \textit{frequently hypercyclic vector}. If one replaces lower by upper density one arrives at the notion of \textit{upper frequent hypercyclicity}. For an introduction to Linear Dynamics we refer to the monographs \cite{BaMa09} and \cite{GrPe11}. More generally, let $\mathcal{A}$ be a \textit{Furstenberg family}, that is, a non-empty family of subsets of $\mathbb{N}_0$ such that if $A\in\mathcal{A}$ and $B\supset A$ then $B\in \mathcal{A}$. Then the operator $T$ is called \textit{$\mathcal{A}$-hypercyclic} if there is a vector $x\in X$ (which is then called an \textit{$\mathcal{A}$-hypercyclic vector}) such that, for any non-empty open subset $U$ of $X$, we have that \[ \{n\geq 0 : T^nx\in U\}\in \mathcal{A}. \] Hypercyclicity (respectively frequent hypercyclicity, upper frequent hypercyclicity) is the special case for the Furstenberg family of all infinite sets (respectively of all sets of positive lower density or of all sets of positive upper density). $\mathcal{A}$-hypercyclicity has recently been studied in \cite{BMPP16} and \cite{BoGr17}. A crucial idea in this paper is to consider operators whose orbits only allow one to approximate vectors from a closed subspace $Z$ of $X$. More precisely, $T$ is called \textit{$\mathcal{A}$-hypercyclic for $Z$} if there is a vector $x\in X$ (called \textit{$\mathcal{A}$-hypercyclic for $Z$}) such that, for any open subset $U$ of $X$ with $U\cap Z\neq\varnothing$, we have that \[ \{n\geq 0 : T^nx\in U\}\in \mathcal{A}. \] This restricted type of density for orbits was first considered by the author in \cite{Gro87}. The notion should not be confused with the recent concept of subspace hypercyclicity, see \cite{MaMa11}. A \textit{Banach sequence space over $\IZ$} is a Banach space that is a subspace of the space $\mathbb{K}^{\mathbb{\IZ}}$ of all (real or complex) sequences and such that each coordinate functional $x=(x_n)_{n\in\IZ}\to x_k$, $k\in\IZ$, is continuous. The canonical unit sequences are denoted by $e_n=(\delta_{n,k})_{k\in\IZ}$. We will study bilateral weighted backward shifts $B_w$ on sequence spaces over $\IZ$. They are defined by \[ B_w(x_n)_{n\in\IZ} = (w_{n+1}x_{n+1})_{n\in\IZ}, \] where $w=(w_n)_{n\in\IZ}$ is a sequence of non-zero scalars. The unweighted shift (with $w_n=1$ for all $n\in\IZ$) is denoted by $B$. Let $X$ be a Banach sequence space over $\IZ$ in which $(e_n)_{n\in \IZ}$ is a basis. It is well known that \[ \vertiii{x} = \sup_{m,n\geq 0} \Big\|\sum_{-m\leq k\leq n} x_k e_k\Big\| \] defines an equivalent norm on $X$. Since this value is defined for any sequence of scalars $x=(x_n)$ we may introduce the sequence space \[ \widehat{X} = \{ x=(x_n)_{n\in\IZ} : \vertiii{x}<\infty\}. \] It is easily seen that $\widehat{X}$ is a Banach sequence space that contains $X$ as a closed subspace. The space appears, for example, in Singer \cite[p.~39]{Sin70} or in Bellenot \cite{Bel84}, but does not seem to have been given a name or a universally accepted notation. We have, for example, that $\widehat{c_0(\IZ)} = \ell^\infty(\IZ)$. If, now, $B_w$ is a weighted backward shift operator on $X$ then a simple calculation shows that $B_w$ is also an operator on $\widehat{X}$. On the other hand, any weighted backward shift operator on $\widehat{X}$ maps $X$ into itself. Moreover, $B_w$ is invertible on $X$ if and only if it is invertible on $\widehat{X}$. In the final section of this paper we will be looking at sequence spaces over $\IN_0$, with the obvious adaptations of the notions above. \section{Bilateral shifts on $\widehat{X}$ for arbitrary Furstenberg families}\label{s-bilwsarb} In the sequel we will write for simplicity a sequence $x=(x_n)$ as a formal series \[ \sum_{n\in\IZ} x_n e_n \] without necessarily requiring the convergence of this series. \begin{theorem}\label{t-bahcgen} Let $X$ be a Banach sequence space over $\IZ$ in which $(e_n)_{n\in \IZ}$ is a basis. Suppose that the backward shift $B$ is an operator on $X$. Let $\mathcal{A}$ be a Furstenberg family. If for some (equivalently, for all) sequences $(\varepsilon_p)_{p\geq 1}$ of positive numbers tending to $0$ there is a sequence $(A_p)_{p\geq 1}$ of pairwise disjoint sets in $\mathcal{A}$ such that, for any $p,q\geq 1$, any $m\in A_q$, and $j=-p,\ldots,p$, \begin{equation}\label{eq1} \Vertiii{\sum_{\substack{n\in A_p\\n\neq m}} e_{n-m+j}} <\min(\varepsilon_p,\varepsilon_q), \end{equation} then $B:\widehat{X}\to \widehat{X}$ is $\mathcal{A}$-hypercyclic for $X$. If $(e_n)_{n\in \IZ}$ is an unconditional basis in $X$ then the converse also holds. If $B$ is invertible, then it suffices to require \eqref{eq1} for $j=0$. \end{theorem} The proof is similar to that of \cite[Theorem 6.1]{BoGr17}. \begin{proof} In order to see that the assumption `for some sequences $(\varepsilon_p)_{p\geq 1}$' implies the assumption `for all sequences $(\varepsilon_p)_{p\geq 1}$' it suffices to pass to a subsequence of $(A_p)_{p\geq 1}$. For the final assertion of the theorem, let $M=\max(\vertiii{B}, \vertiii{B^{-1}})$. We then choose $(\varepsilon_p)_{p\geq 1}$ in such a way that $(\widetilde{\varepsilon}_p):=(M^p\varepsilon_p)$ converges monotonically to zero. Hence, for $j=-p,\ldots,p$, \[ \Vertiii{\sum _{\substack{n\in A_p\\n\neq m}} e_{n-m+j}} \leq M^p \Vertiii{\sum _{\substack{n\in A_p\\n\neq m}} e_{n-m}}<M^p\min(\varepsilon_p,\varepsilon_q) \leq \min(\widetilde{\varepsilon}_p,\widetilde{\varepsilon}_q), \] and the claim follows. We first show that, in addition to the hypothesis, we may assume that, for an arbitrarily fixed sequence $(\alpha_p)_{p\geq 1}$ of positive numbers we have, for any $p\geq 1$, \begin{equation}\label{eq2} \Vertiii{\sum_{\substack{n\in A_p}} e_{n+p}} <\alpha_p. \end{equation} Indeed, we start with sequences $(\varepsilon_p)$ and $(A_p)$. We fix an element $m\in A_1$, $m>0$. Then there exists a strictly increasing sequence $(r_p)_{p\geq 1}$ of positive integers such that $r_1>1$, $r_p\geq m+p$ and $\varepsilon_{r_p}\leq \min(\varepsilon_p,\alpha_p)$ for $p\geq 1$. Let \[ \widetilde{A}_p = A_{r_p}, \quad p\geq 1. \] Then in view of $m+p\leq r_p$ we have that \[ \Vertiii{\sum _{\substack{n\in \widetilde{A}_p}} e_{n+p}} = \Vertiii{\sum _{\substack{n\in A_{r_p}}} e_{n-m+(m+p)}}<\varepsilon_{r_p}\leq \alpha_p. \] And condition \eqref{eq1} remains valid for the sequence $(\widetilde{A}_p)$. Thus we may assume \eqref{eq2} in addition to \eqref{eq1}. We will now show that $B:\widehat{X}\to \widehat{X}$ is $\mathcal{A}$-hypercyclic for $X$. We set, for $p\geq 1$, \[ \alpha_p = \frac{1}{2^pp \sum_{j=-p}^p \vertiii{B}^{p-j}}\quad\text{and}\quad \varepsilon_p = \frac{1}{p(2p+1)4^p}. \] Let $(A_p)_{p\geq 1}$ be a sequence of pairwise disjoint sets in $\mathcal{A}$ such that \eqref{eq1} and \eqref{eq2} hold. Since $(e_n)_{n\in\IZ}$ is a basis in $X$, there is a dense sequence $(y^{(p)})_{p\geq 1}$ of elements in $X$ of the form \[ y^{(p)} = \sum_{j=-p}^p y^{(p)}_j e_j,\quad \max_{-p\leq j\leq p}|y_j^{(p)}|\leq p. \] We set \[ x=\sum_{p=1}^\infty \sum_{j=-p}^p y^{(p)}_j \sum_{n\in A_p} e_{n+j} \] (only the interior sum is formal) and claim that $x$ is a well-defined element of $\widehat{X}$ that is $\mathcal{A}$-hypercyclic for $X$. Indeed, by \eqref{eq2}, \[ \sum_{j=-p}^p y^{(p)}_j B^{p-j}\sum_{n\in A_p} e_{n+p}= \sum_{j=-p}^p y^{(p)}_j \sum_{n\in A_p}e_{n+j} \] belongs to $\widehat{X}$. Moreover, \begin{align*} \Vertiii{ \sum_{j=-p}^p y^{(p)}_j \sum_{n\in A_p}e_{n+j}}&\leq \sum_{j=-p}^p |y^{(p)}_j| \Vertiii{B^{p-j}\sum_{n\in A_p} e_{n+p}} \\&\leq p \sum_{j=-p}^p \vertiii{B}^{p-j}\Vertiii{\sum_{n\in A_p} e_{n+p}}\leq p \sum_{j=-p}^p \vertiii{B}^{p-j}\alpha_p= \frac{1}{2^p}, \end{align*} which implies that $x$ defines an element in $\widehat{X}$. Now let $q\geq 1$. Then we have for any $m\in A_q$ that \[ B^mx-y^{(q)} = \sum_{p=1}^\infty \sum_{j=-p}^p y^{(p)}_j \sum_{n\in A_p}e_{n-m+j}-\sum_{j=-q}^q y^{(q)}_je_j= \sum_{p=1}^\infty \sum_{j=-p}^p y^{(p)}_j \sum_{\substack{n\in A_p\\n\neq m}}e_{n-m+j}; \] note that the terms $n= m$ disappear: if $p\neq q$ then use the fact that $A_p$ and $A_q$ are disjoint; if $p=q$ then the term with $n=m$ cancels. By \eqref{eq1} and the choice of $(\varepsilon_p)$ we have that for $j=-p,\ldots,p$, if $p<q$ then \[ \Vertiii{\sum_{\substack{n\in A_p\\n\neq m}} e_{n-m+j}} < \frac{1}{q(2q+1)4^q}\leq \frac{1}{p(2p+1)2^p2^q}, \] while if $p\geq q$ then \[ \Vertiii{\sum_{\substack{n\in A_p\\n\neq m}} e_{n-m+j}} < \frac{1}{p(2p+1)4^p}\leq\frac{1}{p(2p+1)2^p2^q}. \] Altogether we have that, for any $q\geq 1$ and $m\in A_q$, \[ \vertiii{B^mx-y^{(q)}} \leq \sum_{p=1}^\infty \sum_{j=-p}^p |y^{(p)}_j|\Vertiii{\sum_{\substack{n\in A_p\\n\neq m}} e_{n-m+j}}\leq \sum_{p=1}^\infty\frac{1}{2^p2^q} = \frac{1}{2^q}, \] so that $x$ is $\mathcal{A}$-hypercyclic for $X$. For the converse we now suppose that $(e_n)_{n\in\IZ}$ is an unconditional basis of $X$. We will need the following properties. \begin{itemize} \item[(F)] There is a sequence $(\beta_p)_{p\geq 1}$ of positive numbers such that, for any $p\geq 1$, $\vertiii{x}<\beta_p$ implies that $|x_{j}|< 1$ for $j=-p,\ldots,p$. \end{itemize} This follows from the continuity of the coordinate projections. \begin{itemize} \item[(M)] If $\sum_{n\in\IZ}x_ne_n\in \widehat{X}$ and $(a_n)_{n\in\IZ}$ is a bounded sequence of scalars then $\sum_{n\in\IZ}a_nx_ne_n\in \widehat{X}$. Moreover, there is an absolute constant $C>0$ such that \[ \Vertiii{\sum_{n\in\IZ}a_nx_ne_n}\leq C \sup_{n\in\IZ}|a_n|\, \Vertiii{\sum_{n\in\IZ}x_ne_n}. \] \end{itemize} This is, for $x\in X$, a consequence of the unconditionality of the basis and extends directly to all of $\widehat{X}$. Let $x\in \widehat{X}$ be an $\mathcal{A}$-hypercyclic vector for $X$, and let $(\varepsilon_p)_{p\geq 1}$ be a decreasing sequence of positive numbers with $\varepsilon_p\leq 1$, $p\geq 1$. Let $(\beta_p)_{p\geq 1}$ and $C>0$ be given by properties (F) and (M). We then define inductively numbers $C_p\geq \max(1,C)$ for $p\geq 1$ such that if $q=p\geq 1$ with $-p\leq j < k\leq p$, or if $q>p\geq 1$ with $-p\leq j\leq p$ and $-q\leq k\leq q$, then \begin{equation}\label{eq-dpf} (k+q+1)\frac{C_q}{\varepsilon_q}-(j+p+1)\frac{C_p}{\varepsilon_p}\geq 2. \end{equation} Let \[ y^{(p)} = \sum_{j=-p}^p\Big(1+(j+p+1)\frac{C_p}{\varepsilon_p}\Big) e_j\in X,\quad p\geq 1, \] and choose numbers $\rho_p>0$ such that the open balls of radius $\rho_p$ in $\widehat{X}$ around $y^{(p)}$, $p\geq 1$, are pairwise disjoint. Then, by $\mathcal{A}$-hypercyclicity of $x$, there are sets $A_p\in\mathcal{A}$, $p\geq 1$, such that, for all $n\in A_p$, \begin{equation}\label{eq-dpf2} \vertiii{B^nx-y^{(p)}}<\min \Big(\rho_p,\beta_{p},\frac{\varepsilon_p}{C_p}\Big). \end{equation} It follows that the sets $A_p$, $p\geq 1$, are pairwise disjoint. We will show that they satisfy the hypothesis of the theorem. We deduce from \eqref{eq-dpf2} with (F) that, for any $n\in A_p$ and $j=-p,\ldots,p$, \begin{equation}\label{eq-dp} \Big|x_{n+j}-\Big(1+(j+p+1)\frac{C_p}{\varepsilon_p}\Big)\Big|<1, \end{equation} hence \begin{equation}\label{eq-dp2} \Big|\frac{1}{x_{n+j}}\Big|<\frac{\varepsilon_p}{(j+p+1)C_p}\leq \varepsilon_p. \end{equation} Now let $p,q\geq 1$, $m\in A_q$ and $j=-p,\ldots,p$. Then \[ \vertiii{B^mx-y^{(q)}} < \frac{\varepsilon_q}{C_q}, \] and hence with \eqref{eq-dp2} in view of (M) \begin{equation}\label{eq-M} \Vertiii{\sum_{\substack{n\in A_p\\n\neq m}} \frac{1}{x_{n+j}}[B^mx-y^{(q)}]_{n-m+j} e_{n-m+j}}<\varepsilon_p\varepsilon_q\leq\min(\varepsilon_p,\varepsilon_q), \end{equation} where $[z]_k$ denotes the $k$th entry of the sequence $z$. Let $n\in A_p$, $n\neq m$, and $k=-q,\ldots,q$. Then by \eqref{eq-dp} we have that \[ \Big|x_{n+j} -x_{m+k}-(j+p+1)\frac{C_p}{\varepsilon_p}+(k+q+1)\frac{C_q}{\varepsilon_q}\Big|<2. \] This implies that $n+j\neq m+k$. Indeed, equality can hold by \eqref{eq-dpf} only if $p=q$ and $j=k$, which is impossible since $m\neq n$. Thus we have that $|n-m+j|>q$ and therefore \[ [B^mx-y^{(q)}]_{n-m+j}=x_{n+j}. \] Hence \eqref{eq-M} reduces to the hypothesis of the theorem. \end{proof} \begin{remark}\label{r-spread} For later use we note that one may assume in addition that, for any $p,q\geq 1$, \[ \min_{\substack{n\in A_p, m\in A_q\\n\neq m}}|n-m|>p+q. \] Indeed, let us choose $\varepsilon_p\leq \beta_p$ for $p\geq 1$, where the $\beta_p$ satisfy the condition in (F). Then \eqref{eq1} implies that, for any $p,q\geq 1$, any $m\in A_q$, $k=-q,\ldots,q$, any $n\in A_p$, $j=-p,\ldots,p$, \[ n-m+j\neq k, \] in other words $|n-m|> p+q$. \end{remark} General weighted shifts can now be treated in the way described in \cite[Section 4.1]{GrPe11}. Let $B_w$ be a bilateral weighted backward shift operator on the sequence space $X$. We define $v=(v_n)_{n\in\mathbb{Z}}$ by \begin{equation}\label{vns} v_n=\begin{cases} \frac{1}{w_1\cdots w_n},& \text{for $n>0$},\\ 1,& \text{for $n=0$},\\ {w_{n+1}\cdots w_0},& \text{for $n < 0$}, \end{cases} \end{equation} and we set \[ X(v)=\{(x_n) : (x_nv_n)\in X\}. \] Then $B_w$ on $X$ is conjugate to $B$ on $X(v)$ via the bijection $\phi_v: X(v)\to X$, $(x_n)\to (x_nv_n)$, see \cite[pp.~100-101]{GrPe11}. \begin{theorem}\label{t-bwahcgen} Let $X$ be a Banach sequence space over $\IZ$ in which $(e_n)_{n\in \IZ}$ is a basis. Suppose that the weighted backward shift $B_w$ is an operator on $X$, and define $v$ by \eqref{vns}. Let $\mathcal{A}$ be a Furstenberg family. If for some (equivalently, for all) sequences $(\varepsilon_p)_{p\geq 1}$ of positive numbers tending to $0$ there is a sequence $(A_p)_{p\geq 1}$ of pairwise disjoint sets in $\mathcal{A}$ such that, for any $p,q\geq 1$, any $m\in A_q$, and $j=-p,\ldots,p$, \begin{equation}\label{eq10} \Vertiii{\sum_{\substack{n\in A_p\\n\neq m}} v_{n-m+j} e_{n-m+j}} <\min(\varepsilon_p,\varepsilon_q), \end{equation} then $B_w:\widehat{X}\to \widehat{X}$ is $\mathcal{A}$-hypercyclic for $X$. If $(e_n)_{n\in \IZ}$ is an unconditional basis in $X$ then the converse also holds. If $B_w$ is invertible, then it suffices to require \eqref{eq10} for $j=0$. \end{theorem} \begin{remark}\label{r-equivcond} The hypothesis can be rephrased equivalently in a more natural way: \textit{For some (equivalently, for all) sequences $(\varepsilon_p)_{p\geq 1}$ of positive numbers tending to $0$ there is a sequence $(A_p)_{p\geq 1}$ of pairwise disjoint sets in $\mathcal{A}$ such that \begin{itemize} \item[\rm (i)] for any $p,q\geq 1$ \[ \min_{\substack{n\in A_p, m\in A_q\\n\neq m}}|n-m|>p+q; \] \item[\rm (ii)] for any $p,q\geq 1$, any $m\in A_q$, and any $j=-p,\ldots,p$, \[ \Vertiii{\sum _{\substack{n\in A_p\\n< m}} \Big(\prod_{\nu=n-m+j+1}^{0}w_\nu\Big) e_{n-m+j}} <\min(\varepsilon_p,\varepsilon_q) \] and \[ \Vertiii{\sum _{\substack{n\in A_p\\n> m}} \frac{1}{\prod_{\nu=1}^{n-m+j}w_\nu}e_{n-m+j}} <\min(\varepsilon_p,\varepsilon_q). \] \end{itemize} } Indeed, by Remark \ref{r-spread}, one may assume condition (i) without loss of generality. In that case we have, whenever $m\in A_q$, $n\in A_p$ and $j=-p,\ldots,p$, that $n-m+j<0$ if $n< m$ and $n-m+j>0$ if $n> m$. Thus the single norm in \eqref{eq10} can be split equivalently into the two norms above, up to an irrelevant factor 2. \end{remark} \section{From hypercyclicity \textit{for} $X$ to hypercyclicity \textit{in} $X$}\label{s-fortoin} Theorem \ref{t-bwahcgen} provides a characterisation of when a weighted backward shift on $\widehat{X}$ is $\mathcal{A}$-hypercyclic for $X$. We will improve this result in the case when $\mathcal{A}$ is an upper Furstenberg family. This will follow from a more general result for arbitrary operators on Banach spaces that we derive in this section; this result might also be of independent interest. Let us first recall the notion of upper Furstenberg family, which was recently introduced in \cite{BoGr17}. \begin{definition}\label{d-upperfur} A Furstenberg family $\mathcal{A}$ is called \emph{upper} if it does not contain the empty set and it can be written as \[ \mathcal{A} = \bigcup_{\delta\in D} \mathcal{A}_{\delta}\quad \mbox{with}\quad \mathcal{A}_{\delta}:=\bigcap_{\mu\in M} \mathcal{A}_{\delta,\mu} \] for some families $\mathcal{A}_{\delta,\mu}$ ($\delta\in D,\mu\in M$), where $D$ is arbitrary but $M$ is countable, and such that \begin{itemize} \item[(i)] for any $A\in \mathcal{A}_{\delta,\mu}$ there is a finite set $F\subset\mathbb{N}_0$ such that if $B\supset A\cap F$ then $B\in\mathcal{A}_{\delta,\mu}$; \item[(ii)] for any $A\in \mathcal{A}$ there is some $\delta\in D$ such that, for all $n\geq 0$, $A-n\in \mathcal{A}_\delta$. \end{itemize} \end{definition} For example, the family of sets of positive upper density is an upper Furstenberg family. Thus the results in this section hold, in particular, for upper frequent hypercyclicity. In \cite{BoGr17} the authors have obtained a Birkhoff type theorem for upper Furstenberg families; the proof is by a simple application of the Baire category theorem. We will need here only the following implication. Let $T$ be an operator on a separable Banach space $X$ and $\mathcal{A} = \bigcup_{\delta\in D}\bigcap_{\mu\in M} \mathcal{A}_{\delta,\mu}$ an upper Furstenberg family. If \begin{itemize} \item[(B)] for any non-empty open subset $V$ of $X$ there is some $\delta\in D$ such that for any non-empty open subset $U$ of $X$ and any $\mu\in M$ there is some $x\in U$ such that \[ \{n\geq 0 : T^n x\in V\} \in \mathcal{A}_{\delta,\mu}, \] \end{itemize} then $T$ is $\mathcal{A}$-hypercyclic. In addition, we need a necessary condition for $\mathcal{A}$-hypercyclicity for a subspace. \begin{proposition}\label{p-Birksub} Let $Y$ be a Banach space, $X$ a closed subspace of $Y$, and $T$ an operator on $Y$. Let $\mathcal{A} = \bigcup_{\delta\in D}\bigcap_{\mu\in M} \mathcal{A}_{\delta,\mu}$ be an upper Furstenberg family. If $T$ is $\mathcal{A}$-hypercyclic for $X$ then, for any open subset $V$ of $Y$ with $V\cap X\neq \varnothing$, there is some $\delta\in D$ such that for any open subset $U$ of $Y$ with $U\cap X\neq \varnothing$ there is some $y\in U$ such that \[ \{n\geq 0 : T^n y\in V\} \in \mathcal{A}_{\delta}. \] \end{proposition} \begin{proof} We fix an $\mathcal{A}$-hypercyclic vector $y'$ for $X$ under $T$. Let $V$ be an open subset of $Y$ with $V\cap X\neq \varnothing$. Then \[ \{n\geq 0 : T^n y' \in V\} \in \mathcal{A}. \] By property (ii) of upper Furstenberg families there is some $\delta\in D$ such that, for all $m\geq 0$, \[ \{n\geq 0 : T^n y' \in V\}-m \in \mathcal{A}_{\delta}. \] Now let $U$ be an open subset of $Y$ with $U\cap X\neq \varnothing$. Again by $\mathcal{A}$-hypercyclicity there is some $m\geq 0$ such that $y:=T^my'\in U$, and therefore \[ \{n\geq 0 : T^ny\in V\} = \{k\geq 0 : T^ky'\in V\}-m \in \mathcal{A}_{\delta}, \] which had to be shown. \end{proof} We can now derive the announced result. \begin{theorem}\label{t-transfer} Let $T$ be an operator on a Banach space $Y$ and $X$ a closed subspace of $Y$ that is invariant under $T$. Let $\mathcal{A}$ be an upper Furstenberg family. Suppose that the following property holds: For all $x_2\in X$ and $\varepsilon_2>0$ there are $x_2'\in X$ and $\eta_2>0$ such that for all $x_1\in X$ and $\varepsilon_1>0$ there are $x'_1\in X$ and $\eta_1>0$ so that for all $y\in Y$ and all finite subsets $F\subset \mathbb{N}_0$, if \begin{equation}\label{eq-transfer1} \|x'_1-y\|<\eta_1 \text{ and } \|x'_2-T^ny\|<\eta_2 \text{ for all $n\in F$} \end{equation} then there is some $x\in X$ such that \begin{equation}\label{eq-transfer2} \|x_1-x\|<\varepsilon_1 \text{ and } \|x_2-T^nx\|<\varepsilon_2 \text{ for all $n\in F$}. \end{equation} Then the following assertions are equivalent: \begin{itemize} \item[\emph{(a)}] $T:Y\to Y$ is $\mathcal{A}$-hypercyclic for $X$. \item[\emph{(b)}] $T:X\to X$ is $\mathcal{A}$-hypercyclic. \end{itemize} \end{theorem} \begin{proof} Since (b) trivially implies (a) we need only deduce (b) from (a). We write $\mathcal{A} = \bigcup_{\delta\in D}\bigcap_{\mu\in M} \mathcal{A}_{\delta,\mu}$ according to Definition \ref{d-upperfur}. Let $T:Y\to Y$ be $\mathcal{A}$-hypercyclic for $X$. We want to show that $T:X\to X$ satisfies the Birkhoff type condition (B) stated above. To see this, let $V$ be a non-empty open subset of $X$. Without loss of generality we may assume that $V=B(x_2,\varepsilon_2)$, the open ball of radius $\varepsilon_2>0$ in $X$ around a point $x_2\in X$. Let $V_Y=B(x'_2,\eta_2)$ be the open ball taken in $Y$, where $x'_2\in X$ and $\eta_2>0$ are given by the hypothesis. Let $\delta>0$ be a value associated to $V_Y$ according to Proposition \ref{p-Birksub}. Next, let $U$ be a non-empty open subset of $X$. Without loss of generality we may assume that $U=B(x_1,\varepsilon_1)$ with $x_1\in X$ and $\varepsilon_2>0$. Let $U_Y=B(x'_1,\eta_1)$ be the ball taken in $Y$, where $x'_1\in X$ and $\eta_1>0$ are given by the hypothesis. Now, by Proposition \ref{p-Birksub}, for any $\mu\in M$ there is some $y\in U_Y$ such that \[ \{n\geq 0 : T^n y\in V_Y\} \in \mathcal{A}_{\delta,\mu} \] (in fact, $y$ may even be chosen independently of $\mu$, but that will not be used). Note that the point $y$ lies in $Y$; it remains to show that it can be replaced by a point $x$ in $X$ that satisfies (B). Thus, let $\mu\in M$. By property (i) of upper Furstenberg families there is a finite set $G\subset\mathbb{N}_0$ such that any superset of \[ F:=\{n\geq 0 : T^n y\in V_Y\}\cap G \] belongs to $\mathcal{A}_{\delta,\mu}$. Thus condition \eqref{eq-transfer1} holds. By hypothesis there is some $x\in X$ such that \eqref{eq-transfer2} holds. We then have that $x\in B(x_1,\varepsilon_1)=U$, and the set \[ \{n\geq 0 : T^n x\in V\} = \{n\geq 0 : \|x_2-T^nx\|<\varepsilon_2\} \] contains $F$ and thus belongs to $\mathcal{A}_{\delta,\mu}$. Altogether we have shown that condition (B) holds, which implies (b). \end{proof} One may understand condition (b) as saying that the operator $T: Y\to Y$ admits an $\mathcal{A}$-hypercyclic vector for $X$ that comes from $X$. Thus our result is similar in spirit to Theorem 2.1 of Herzog \cite{Hzg94}. \section{Bilateral shifts on $X$ for upper Furstenberg families}\label{s-bilwsupp} The previous general theorem easily implies an improvement of Theorem \ref{t-bwahcgen} for upper Furstenberg families (under the assumption of unconditionality of the basis). \begin{theorem}\label{t-bwahcupper} Let $X$ be a Banach sequence space over $\IZ$ in which $(e_n)_{n\in \IZ}$ is an unconditional basis. Suppose that the weighted backward shift $B_w$ is an operator on $X$, and define $v$ by \eqref{vns}. Let $\mathcal{A}$ be an upper Furstenberg family. Then the following assertions are equivalent. \begin{itemize} \item[\emph{(a)}] For some (equivalently, for all) sequences $(\varepsilon_p)_{p\geq 1}$ of positive numbers tending to $0$ there is a sequence $(A_p)_{p\geq 1}$ of pairwise disjoint sets in $\mathcal{A}$ such that, for any $p,q\geq 1$, any $m\in A_q$, and $j=-p,\ldots,p$, \begin{equation}\label{eq6} \Vertiii{\sum_{\substack{n\in A_p\\n\neq m}} v_{n-m+j}e_{n-m+j}} <\min(\varepsilon_p,\varepsilon_q). \end{equation} \item[\emph{(b)}] $B_w:\widehat{X}\to \widehat{X}$ is $\mathcal{A}$-hypercyclic for $X$. \item[\emph{(c)}] $B_w:X\to X$ is $\mathcal{A}$-hypercyclic. \end{itemize} \noindent If $B_w$ is invertible, then it suffices to require \eqref{eq6} for $j=0$. \end{theorem} \begin{remark}\label{r-equivcondrem} Remark \ref{r-equivcond} retains its validity. \end{remark} \begin{proof} In view of Theorems \ref{t-bwahcgen} and \ref{t-transfer} we need only show that $B_w$ satisfies the hypothesis of Theorem \ref{t-transfer} with $Y=\widehat{X}$. Thus, let $x^{(1)}, x^{(2)}\in X$ and $\varepsilon_1,\varepsilon_2>0$ be given (note that we prove a stronger version of the hypothesis). By density we may assume that $x^{(1)}$ and $x^{(2)}$ are finitely non-zero sequences. We set $\eta_1= \varepsilon_1/C$, $\eta_2= \varepsilon_2/C$, where $C$ is a constant for which condition (M) above is satisfied. Let $\widehat{x}\in \widehat{X}$ and $F\subset \mathbb{N}_0$ be finite such that \[ \vertiii{x^{(1)}-\widehat{x}}<\eta_1=\varepsilon_1/C \text{ and } \vertiii{x^{(2)}-B_w^n\widehat{x}}<\eta_2=\varepsilon_2/C \text{ for all $n\in F$}. \] Suppose that \[ \widehat{x}= \sum_{n\in\IZ} x_ne_n. \] Then, for $l\geq 0$, we define \[ x = \sum_{|n|\leq l} x_ne_n, \] which belongs to $X$ as a finitely non-zero sequence. Since $x^{(1)}$ is finitely non-zero, if $l$ is sufficiently large, then $x^{(1)}-x$ can be obtained from $x^{(1)}-\widehat{x}$ by deleting entries. Similarly, for any $n\in \mathbb{N}_0$, if $l$ is sufficiently large, then $x^{(2)}-B_w^n x$ can be obtained from $x^{(2)}-B_w^n \widehat{x}$ by deleting entries. It then follows from (M) that for all sufficiently large $l$, \[ \vertiii{x^{(1)}-x}<\varepsilon_1 \text{ and } \vertiii{x^{(2)}-B_w^nx}<\varepsilon_2 \text{ for all $n\in F$}; \] note that we have used here that $F$ is a finite set. Thus $B_w$ satisfies the hypothesis of Theorem \ref{t-transfer}. \end{proof} Keeping Remark \ref{r-equivcondrem} in mind we spell out the special case of the theorem for $X=c_0(\IZ)$. \begin{corollary}\label{c-bwahc0} Let $B_w$ be a weighted backward shift on $c_0(\IZ)$, and let $\mathcal{A}$ be an upper Furstenberg family. Then the following assertions are equivalent. \begin{itemize} \item[\emph{(a)}] For some (equivalently, for all) sequences $(\varepsilon_p)_{p\geq 1}$ of positive numbers tending to $0$ there is a sequence $(A_p)_{p\geq 1}$ of pairwise disjoint sets in $\mathcal{A}$ such that \begin{itemize} \item[\rm (i)] for any $p,q\geq 1$ \[ \min_{\substack{n\in A_p, m\in A_q\\n\neq m}}|n-m|>p+q; \] \item[\rm (ii)] for any $p,q\geq 1$, any $m\in A_q$, $n\in A_p$, any $j=-p,\ldots,p$, if $n<m$ then \[ \prod_{\nu=n-m+j+1}^{0}|w_\nu| <\min(\varepsilon_p,\varepsilon_q) \] and if $n>m$ then \[ \prod_{\nu=1}^{n-m+j}|w_\nu|>\frac{1}{\min(\varepsilon_p,\varepsilon_q)}. \] \end{itemize} \item[\emph{(b)}] $B_w:\ell^\infty(\IZ)\to \ell^\infty(\IZ)$ is $\mathcal{A}$-hypercyclic for $c_0(\IZ)$. \item[\emph{(c)}] $B_w:c_0(\IZ)\to c_0(\IZ)$ is $\mathcal{A}$-hypercyclic. \end{itemize} \noindent If $B_w$ is invertible, then it suffices to require $j=0$ in condition \emph{(ii)}. \end{corollary} This result should be compared with the case of upper frequent hypercyclicity in \cite[Theorem 12]{BaRu15}. First of all, the result of Bayart and Ruzsa is now extended to not necessarily invertible operators and to arbitrary upper Furstenberg families. But the main improvement is to eliminate the (non-symmetric) condition (c) in their result. In fact, removing this condition has been the main goal of our work here: this leads to the following result, which contains Theorem \ref{t-main} as a special case. \begin{theorem}\label{t-main2} Let $B_w$ be an invertible weighted backward shift on $c_0(\IZ)$ and $\mathcal{A}$ be an upper Furstenberg family. If $B_w$ is $\mathcal{A}$-hypercyclic then so is $B_w^{-1}$. \end{theorem} \begin{proof} The inverse of $B_w$ is the weighted forward shift $F_{1/w}: y\to (\frac{1}{w_{n}}y_{n-1})_{n\in\IZ}$. Via the bijection $\phi(x)=(x_{-n})$ on $c_0(\IZ)$, this forward shift is conjugate to the weighted backward shift $B_{w'}$ with \[ w'_n=\frac{1}{w_{-n+1}},\quad n\in\IZ, \] that is, we have that $\phi\circ B_{w'}=F_{1/w}\circ \phi$. Since the characterising condition in Corollary \ref{c-bwahc0} is invariant under the passage from $w$ to $w'$ (it suffices to consider $j=0$) the result follows. \end{proof} \section{Bilateral shifts on $X$ for arbitrary Furstenberg families}\label{s-bilwsXarb} As a by-product of Theorem \ref{t-bwahcgen} we may also obtain a characterisation of the $\mathcal{A}$-hypercyclicity of weighted backward shifts on $X$ itself for arbitrary Furstenberg families, thereby providing an analogue of the result in \cite{BoGr17} for unilateral shifts. The price we have to pay is the introduction of an additional condition. \begin{theorem}\label{t-bwahcgenX} Let $X$ be a Banach sequence space over $\IZ$ in which $(e_n)_{n\in \IZ}$ is a basis. Suppose that the weighted backward shift $B_w$ is an operator on $X$, and define $v$ by \eqref{vns}. Let $\mathcal{A}$ be a Furstenberg family. If for some (equivalently, for all) sequences $(\varepsilon_p)_{p\geq 1}$ of positive numbers tending to $0$ there is a sequence $(A_p)_{p\geq 1}$ of pairwise disjoint sets in $\mathcal{A}$ such that \begin{itemize} \item[\emph{(i)}] for any $p\geq 1$ \[ \sum_{n\in A_p} v_{n+p}e_{n+p} \quad \text{converges in $X$}; \] \item[\emph{(ii)}] for any $p,q\geq 1$, any $m\in A_q$, and $j=-p,\ldots,p$, \begin{equation}\label{eq11} \Big\|\sum_{\substack{n\in A_p\\n\neq m}} v_{n-m+j} e_{n-m+j}\Big\| <\min(\varepsilon_p,\varepsilon_q), \end{equation} \end{itemize} then $B$ is $\mathcal{A}$-hypercyclic. If $(e_n)_{n\in \IZ}$ is an unconditional basis in $X$ then the converse also holds. If $B_w$ is invertible, then it suffices to require \eqref{eq11} for $j=0$; and in \emph{(i)} one may demand that $\sum_{n\in A_p} v_{n}e_{n}$ converges in $X$ for any $p\geq 1$. \end{theorem} \begin{remark}\label{r-equivcondrem2} Once more we recall Remark \ref{r-equivcond} for an equivalent statement of condition (ii). \end{remark} \begin{proof} It suffices to consider the unweighted case when $w_n=v_n=1$ for all $n\in \IZ$. For sufficiency we proceed exactly as in the proof of Theorem \ref{t-bahcgen}; the sole difference is that condition (i) ensures that $\sum_{n\in A_p} e_{n+p} \in X$, so that the whole proof can now be performed in $X$, leading to an $\mathcal{A}$-hypercyclic vector $x\in X$. Incidentally, the fact that the series in (ii) converge follows from (i) and an application of a suitable power of $B_w$. Likewise for necessity we can repeat the proof of Theorem \ref{t-bahcgen} verbatim. Since, now, $x\in X$ we have that, for any $p\geq 1$, \[ \sum_{n\in\IZ} x_{n+p}e_{n+p} \] converges in $X$. Since, by \eqref{eq-dp2}, \[ \Big|\frac{1}{x_{n+p}}\Big|\leq \varepsilon_p \] for any $n\in A_p$, unconditionality of the basis then implies (i) in addition to (ii). \end{proof} In view of Question \ref{q1} it may be of interest to state explicitly the result for $X=c_0(\IZ)$, where we take account of Remark \ref{r-equivcondrem2}. \begin{corollary}\label{c-bwahcgenX} Let $B_w$ be a weighted backward shift on $c_0(\IZ)$, and let $\mathcal{A}$ be a Furstenberg family. Then the following assertions are equivalent. \begin{itemize} \item[\emph{(a)}] For some (equivalently, for all) sequences $(\varepsilon_p)_{p\geq 1}$ of positive numbers tending to $0$ there is a sequence $(A_p)_{p\geq 1}$ of pairwise disjoint sets in $\mathcal{A}$ such that \begin{itemize} \item[\rm (i)] for any $p,q\geq 1$ \[ \min_{\substack{n\in A_p, m\in A_q\\n\neq m}}|n-m|>p+q; \] \item[\rm (ii)] for any $p\geq 1$, \[ w_1\cdots w_{n+p}\to \infty\quad\text{as $n\to\infty$, $n\in A_p$}; \] \item[\rm (iii)] for any $p,q\geq 1$, any $m\in A_q$, $n\in A_p$, any $j=-p,\ldots,p$, if $n<m$ then \[ \prod_{\nu=n-m+j+1}^{0}|w_\nu| <\min(\varepsilon_p,\varepsilon_q) \] and if $n>m$ then \[ \prod_{\nu=1}^{n-m+j}|w_\nu|>\frac{1}{\min(\varepsilon_p,\varepsilon_q)}. \] \end{itemize} \item[\rm (b)] $B_w$ is $\mathcal{A}$-hypercyclic on $c_0(\IZ)$. \end{itemize} If $B_w$ is invertible, then it suffices to require $j=0$ in condition \emph{(iii)}; and in \emph{(ii)} one may demand that, for any $p\geq 1$, $w_1\cdots w_{n}\to \infty$ as $n\to\infty$, $n\in A_p$. \end{corollary} This extends the case of frequent hypercyclicity in \cite[Theorem 12]{BaRu15} to not necessarily invertible operators and to arbitrary Furstenberg families. But the question posed by Bayart and Ruzsa \cite[p.~707]{BaRu15} remains: can one drop the (non-symmetric) condition (ii) for frequent hypercyclicity (as we did in the previous section for upper Furstenberg families)? If so then the bilateral weighted shifts on $c_0(\IZ)$ could not serve as counter-examples to Question \ref{q1}. \section{Unilateral shifts}\label{s-uni} We may apply the same techniques as in Sections \ref{s-bilwsarb} and \ref{s-bilwsupp} to unilateral weighted backward shifts on sequence spaces over $\IN_0$, which leads to the following. \begin{theorem}\label{t-bwahcupperuni} Let $X$ be a Banach sequence space over $\IN_0$ in which $(e_n)_{n\geq 0}$ is a basis. Suppose that the unilateral weighted backward shift $B_w$ is an operator on $X$. Let $\mathcal{A}$ be a Furstenberg family. Consider the following assertions: \begin{itemize} \item[\emph{(a)}] For some (equivalently, for all) sequences $(\varepsilon_p)_{p\geq 1}$ of positive numbers tending to $0$ there is a sequence $(A_p)_{p\geq 1}$ of pairwise disjoint sets in $\mathcal{A}$ such that, for any $p,q\geq 1$, any $m\in A_q$, and $j=0,\ldots,p$, \[ \Vertiii{\sum_{\substack{n\in A_p\\n> m}} \frac{1}{\prod_{\nu=1}^{n-m+j}w_\nu}e_{n-m+j}} <\min(\varepsilon_p,\varepsilon_q). \] \item[\emph{(b)}] $B_w:\widehat{X}\to \widehat{X}$ is $\mathcal{A}$-hypercyclic for $X$. \item[\emph{(c)}] $B_w:X\to X$ is $\mathcal{A}$-hypercyclic. \end{itemize} Then \emph{(a)} implies \emph{(b)}. If $(e_n)_{n\geq 0}$ is an unconditional basis, then \emph{(a)} and \emph{(b)} are equivalent. If $(e_n)_{n\geq 0}$ is an unconditional basis and $\mathcal{A}$ is an upper Furstenberg family then all three assertions are equivalent. \end{theorem} In other words, the Baire category theorem again allows one to drop the convergence condition in \cite[Theorem 6.2]{BoGr17} for upper Furstenberg families. On the other hand, for such families we have seen in \cite[Theorem 5.3]{BoGr17} that, also by Baire, it suffices to have a single set $A$ instead of a sequence $(A_p)_{p\geq 1}$ in \cite[Theorem 6.2]{BoGr17}. Thus one might be tempted to expect that both simplifications are possible at the same time. This, however, is not the case. \begin{example} There is a unilateral weighted backward shift $B_w$ on $c_0=c_0(\IN)$ such that, for any $p \geq 0$ and $M > 0$, there exists a subset $A$ of $\IN_0$ of positive upper density such that, for any $n,m \in A$, $n > m$, \[ |w_1w_2\cdots w_{n-m+p}|>M, \] but that is not upper frequently hypercyclic. In other words, $B_w$ satisfies condition (ii) of \cite[Corollary 5.4]{BoGr17}, but not the convergence condition (i) there. It suffices to consider the example of \cite[Theorem 7.1]{BoGr17}: the weighted backward shift $B_w$ on $c_0$ constructed there is not upper frequently hypercyclic. However, for any $j\geq 0$, the set \[ A=\{ l.10^j:l\geq 1\} \] has positive (upper) density, and for any $p\geq 0$ and $n,m\in A$ with $n>m$ one has by construction that, for $j\geq p$, \[ w_1w_2\cdots w_{n-m+p} =\varpi_{n-m+p}\geq 2^{j+p}, \] which can be made arbitrarily large. \end{example} It seems that one may benefit from Baire once, but not twice.
\section{Introduction} Nanostructures have been considered for photovoltaic applications since the advent of epitaxial growth, with the quantum well solar cell (QWSC) development as one of the pioneering activities \cite{barnham:90}. As early as 2001, the rapidly growing interest in nanostructures and the challenge of efficient as well as cost-effective photovoltaic energy conversion had led to a seminal workshop on nanostructures for photovoltaics in Dresden, where a large number of concepts and structures with different functionalities (optical, electronic, vibrational) were discussed, which for the most part belonged to the then emerging field of third generation photovoltaics \cite{green:01}. This included quantum well and quantum dot heterostructures for tunable absorbers in multi-junction solar cells \cite{green:00}, for the formation of intermediate bands for sequential multi-photon absorption \cite{marti:01_ted}, for the modification of carrier-phonon interaction to slow down cooling in hot-carrier solar cells \cite{conibeer:08}, and for the engineering of efficient carrier multiplication processes in colloidal quantum dots \cite{ellingson:05}. Additionally, a wide range of optical nanostructures have been proposed for nanophotonic or plasmonic light-trapping, spectral splitting and up-conversion or down-shifting \cite{atwater:10,mokkapati:12}. In many cases, efficiencies far beyond the single junction Shockley-Queisser limit were predicted based on detailed balance calculations. Since then, research groups around the globe have been working on the implementation of those promising concepts. However, to date, in very few cases only could efficiencies be reached that are close to the detailed balance limits. The poor performance of nanostructure-based solar cells is mainly attributed to a detrimental increase of recombination losses due to a larger number of internal interfaces that are prone to the accumulation of recombination-active defect states, and to wave function localization in nanostructure states which leads to trapping and slow carrier extraction. On the other hand, the notable exception of the strain-balanced QWSC \cite{adams:10} shows that -- if the aforementioned problems can be circumvented -- a nanostructure-based solar cell holds the potential to outperform the conventional bulk devices. The large discrepancy between the predicted and the achieved efficiency values questions the adequacy of the theoretical approach used to obtain these performance estimates and calls for a more realistic assessment of the potential of a given nanostructure-based solar cell concept that is capable of reaching beyond the semi-classical bulk picture \cite{ae:jstqe_13}. In this Review, such a theoretical picture of extended validity is discussed and its predictions are compared against those provided by the conventional semiclassical framework for the modeling of solar cell device characteristics in the case of nanostructure-based architectures. The Review is organized as follows. In the section following this introduction, the conventional solar cell device simulation models based on global detailed balance relations and macroscopic continuity equations with drift-diffusion currents and semiclassical rate terms are briefly reviewed, after which the basic formalism of the quantum-kinetic framework underlying the advanced picture is outlined. In a third section, deviations from flat-band bulk behavior are identified for solar cell devices with nanostructure components of decreasing dimensionality, from ultra-thin absorbers to quantum well and quantum dot architectures, by analyzing the results of the different simulation approaches. \section{Modeling approaches for nanostructure photovoltaics} The central figure of merit of a solar cell device is its conversion efficiency $\eta=P^{\nearrow}_{\mathrm{el}}/P_{\mathrm{rad}}^{\swarrow}$, where $P^{\nearrow}_{\mathrm{el}}$ is the electrical output power and $P_{\mathrm{rad}}^{\swarrow}$ is the incident radiative power. The main task of any solar cell model therefore consists in providing the electrical output power as a function of the incident photon flux. The electrical power is defined by the product of charge current $I$ and voltage $V$ at a certain point of operation, such that the efficiency is given by $\eta=\max_{V}\{J(V)\cdot V\}/J_{\gamma}$, where $J$ is the charge current density and $J_{\gamma}$ is the illumination intensity. Thus, the key quantity to determine is the current-voltage characteristics $J(V)$ of the solar cell, which is an integral and scalar quantity, but which contains the full complexity of the device in terms of optical and electronic properties in any of its constituent parts, including nanostructured regions exhibiting peculiar non-bulk-like dynamics. In the following, the evaluation of the current-voltage characteristics is discussed for different levels of complexity in the hierarchy of modeling approaches. The focus thereby is on the electronic aspects rather than optical engineering, as the latter subject is well-covered by the literature. \subsection{Thermodynamical models for global detailed balance limits} In the most elementary of the methods, the device characteristics are obtained based on external radiative properties only, by equating the extracted charge current density with the difference of absorbed and emitted photon flux \cite{araujo:94}, \begin{align} J(V)=-q\big\{\Phi_{\mathrm{abs}}(\phi_{0\gamma}^{\swarrow})-\Phi_{\mathrm{em}}(V)\big\}, \end{align} where $q$ is the elementary charge, $\phi_{0\gamma}^{\swarrow}$ is the incident photon flux and $V$ is the voltage applied between contacts. In the global radiative detailed balance limit, the two quantities are related via their dependence on the absorptance of the device \cite{araujo:94,wuerfel:82}, \begin{align} \Phi_{\mathrm{abs}}(\phi_{0\gamma}^{\swarrow})&=\int dE_{\gamma}\,\phi_{0\gamma}^{\swarrow}(E_{\gamma})a(\Omega^{\swarrow},E_{\gamma}),\label{eq:phiabs}\\ \Phi_{\mathrm{em}}(V)&\approx\int dE_{\gamma}\int d\Omega\,a(\Omega,E_{\gamma})\bar{\phi}_{\mathrm{bb}}(\Omega,E_{\gamma})\big\{\exp(qV/k_{B}T)-1\big\},\label{eq:phiem} \end{align} where $E_{\gamma}$ is the photon energy, $a$ is the absorptance (at angle of incidence $\Omega^{\swarrow}$) -- related to the absorption coefficient $\alpha$ and refractive index $n$ via some optical model for the light propagation, such as, e.g., Lambert-Beer’s law or the Transfer-Matrix Method (TMM) for coherent wave propagation -- and $\bar{\phi}_{\mathrm{bb}}$ is the black-body radiation flux for emission into solid angle $\Omega$. In the above formulation, the model assumes perfect carrier extraction due to infinite mobility, corresponding to flat quasi-Fermi levels split by the voltage at the contacts, $\Delta\mu=qV$. The model can be extended to the case of finite mobility and non-radiative recombination by replacing in Eq.~(\ref{eq:phiem}) the absorptance with the external quantum efficiency \cite{rau:07}. However, there are limits in the applicability of this reciprocity relation that stem from the voltage or illumination dependence of the external quantum efficiency which lead to the breakdown of the superposition principle. \subsection{Hybrid models for local characteristics from macroscopic parameters} In order to capture effects of finite mobility, the transport of photogenerated or electronically injected charge carriers needs to be considered. For a detailed investigation of the impact of a specific nanostructured device component on the overall device characteristics, the local charge carrier dynamics has to be included in the model. In general, this is achieved by combining a drift-diffusion model for carrier transport (upper/lower sign is for electrons/holes) \begin{align} \mathbf{J}_{c}[\mu_{c},D_{c}](\mathbf{r})=\mp q \big\{\pm\rho_{c}(\mathbf{r})\mu_{c}(\mathbf{r})\nabla \phi(\mathbf{r})-D_{c}(\mathbf{r})\nabla\rho_{c}(\mathbf{r})\big\}\qquad (c=e,h)\label{eq:dd_curr} \end{align} with Fermi-Golden-Rule rates for the carrier generation ($\mathcal{G}$) and recombination ($\mathcal{R}$) \begin{align} \mathcal{G}[\alpha,n](\mathbf{r})&=\int dE_{\gamma}\,\eta_{\mathrm{gen}}(E_{\gamma})\alpha(\mathbf{r},E_{\gamma})\phi_{\gamma}[\alpha,n](\mathbf{r},E_{\gamma}),\label{eq:genrate}\\ \mathcal{R}[\alpha,n](\mathbf{r})&=\mathcal{B}(\mathbf{r})\rho_{e}(\mathbf{r})\rho_{h}(\mathbf{r}),\quad \mathcal{B}(\mathbf{r})=n_{i}^{-2}\int dE_{\gamma}\,\alpha(\mathbf{r},E_{\gamma})\tilde{\phi}_{bb}[n](E_{\gamma}),\label{eq:recrate} \end{align} obtained from the local microscopic electronic structure information, in a balance equation for charge continuity \begin{align} \mp q^{-1}\nabla \cdot \mathbf{J}_{c}[\mu_{c},D_{c}]=\mathcal{G}[\alpha,n]-\mathcal{R}[\tau]\label{eq:baleq} \end{align} coupled to the Poisson equation for the electrostatic potential $\phi$, \begin{align} \epsilon_{0}\nabla\cdot\left\{\varepsilon(\mathbf{r})\nabla \phi(\mathbf{r})\right\}=q\left\{\rho_{e}(\mathbf{r})-\rho_{h}(\mathbf{r})-N_{\textrm{dop}}(\mathbf{r})\right\}.\label{eq:poisseq} \end{align} In the above equations, $\mu$ is the mobility, $D$ the diffusion constant, $\rho$ ($n_{i}$) the (intrinsic) carrier density, $\phi_{\gamma}$ is the local photon flux due to the external illumination, $\eta_{\mathrm{gen}}$ is the fraction of photons generating electron-hole pairs, $\tilde{\phi}_{\mathrm{bb}}[n]$ is the angle-integrated black-body flux for isotropic emission into medium with refractive index $n$, $\tau$ is the carrier lifetime associated with the recombination process, $\varepsilon_{0}$ and $\varepsilon$ are the free space and relative permittivities, and $N_{\mathrm{dop}}$ is the density of ionized dopants. Conventionally, the carrier density is expressed in terms of an effective density of states $\mathcal{N}$ that reflects the electronic structure close to the band edge, and of the carrier distribution function, for which it is common to use Boltzmann statistics with quasi-Fermi level $E_{F_{c}}$: \begin{align} \rho_{c}(\mathbf{r})=\mathcal{N}_{c}(\mathbf{r})\exp\{[\pm E_{F_{c}}(\mathbf{r})\mp E_{B}(\mathbf{r})]/k_{B}T\},\label{eq:sc_dens} \end{align} where upper (lower) sign applies to electrons (holes), and $E_{B}$ is the band edge energy. Solution of Eqns. \eqref{eq:dd_curr}, \eqref{eq:baleq}-\eqref{eq:sc_dens} provides the current-voltage characteristics as a function of quasi-Fermi-levels $E_{F_{n,p}}$ for electrons and holes and of the electrostatic potential $\phi$. Modified versions of Expr.~(\ref{eq:baleq}) have been used in cases with vanishing current between absorbers and/or absent coupling to contact states \cite{ae:jstqe_13}. Such a hybrid approach is limited in validity by the assumptions underlying the drift-diffusion picture, i.e., band-like transport with completely thermalized carrier distributions, which does not include any quantum effects such as confinement, tunneling or ballistic transport on very short length scales. Moreover, in most cases, the model used for the electronic structure relies on the flat band bulk picture, which is not applicable in nanostructure regions. \subsection{Quantum kinetic models for microscopic non-equilibrium dynamics} The challenges of describing opto-electronic device operation under consideration of quantum effects are manifold. Firstly, one has to treat an open quantum system, which in principle requires a description based on scattering states rather than the eigenstates provided by the solution of Schr\"odinger's equation for the closed system. Due to the essential inclusion of light-matter interaction and the sizable effects of electron-phonon coupling under the standard condition of room temperature operation, a mixed state representation is indicated. Among the suitable theories, the non-equilibrium Green’s function (NEGF) formalism is most versatile and powerful and has found wide-spread application in the modeling of nanostructure-based quantum opto-electronic devices such as photodetectors based on QW \cite{henrickson:02} and QD \cite{naser:07}, QW lasers \cite{pereira:98}, quantum cascade lasers \cite{lee:prb_02,kubis:09}, and QW LEDs \cite{steiger:iwce_09}. In the field of nanostructure photovoltaics, applications of the NEGF formalism so far include carbon nanotube photodiodes \cite{stewart:05}, multi-QW and QW superlattice solar cells \cite{ae:prb_08, ae:nrl_11}, nanowire solar cells \cite{buin:13}, QD superlattice solar cells \cite{ae:oqel_12,berbezier:15}, ultra-thin absorber devices \cite{cavassilas:15,ae:jpv_16}, and QW tunnel junctions for multi-junction solar cells \cite{ae:prb87_13}. For a detailed introduction to the NEGF approach for the simulation of nanostructure-based solar cell devices, the reader is referred to Ref.~\cite{ae:jcel_11}. Here, we give only the elements that are linked to the device characteristics and which are required for relation to the other approaches introduced above. In the NEGF picture, a microscopic conservation law similar to the continuity equation \eqref{eq:baleq} can be formulated, \begin{align} \nabla \cdot \mathbf{J}[G]=\mathcal{G}[G,\Sigma]-\mathcal{R}[G,\Sigma], \label{eq:negf_baleq} \end{align} where now both the (electron) charge current on the left hand side, \begin{align} \mathbf{J}[G](\mathbf{r})=\lim_{\mathbf{r}'\rightarrow \mathbf{r}}\frac{e\hbar}{m_{0}}\big(\nabla_{\mathbf{r}}-\nabla_{\mathbf{r}'}\big) \int\frac{dE}{2\pi}G^{<}(\mathbf{r},\mathbf{r}',E), \end{align} and the rate expressions on the right hand side, \begin{align} \mathcal{G}/\mathcal{R}[G,\Sigma](\mathbf{r})=\int d^{3}r'\int dE\,G^{\gtrless}(\mathbf{r},\mathbf{r}',E)\Sigma^{\lessgtr}[G^{\lessgtr}](\mathbf{r'},\mathbf{r},E),\label{eq:negf_rates} \end{align} are formulated in terms of the charge carrier Green’s functions $G$, and of self-energies $\Sigma$ encoding the interaction of the carriers with the environment in terms of scattering and coupling to contacts. The Green’s functions follow from the steady-state Dyson and Keldysh equations in the framework of non-equilibrium quantum statistical mechanics \cite{kadanoff:62,keldysh:65}, \begin{align} G^{R(A)}({\mathbf r_{1}},{\mathbf r}_{1'},E)&=G_{0}^{R(A)}({\mathbf r_{1}},{\mathbf r}_{1'},E)+\int d^{3}r_{2}\int d^{3}r_{3}G_{0}^{R(A)}({\mathbf r}_{1}, {\mathbf r}_{2},E)\nonumber\\&\quad\quad\times\Sigma^{R(A)}({\mathbf r}_{2},{\mathbf r}_{3},E) G^{R(A)}({\mathbf r}_{3},{\mathbf r}_{1'},E),\\ G^{\lessgtr}({\mathbf r}_{1},{\mathbf r}_{1'},E)=&\int d^{3}r_{2}\int d^{3}r_{3} G^{R}({\mathbf r}_{1}, {\mathbf r}_{2},E)\Sigma^{\lessgtr}({\mathbf r}_{2},{\mathbf r}_{3},E) G^{A}({\mathbf r}_{3},{\mathbf r}_{1'},E).\label{eq:keldysh} \end{align} The interaction component of the carrier self-energy $\Sigma$ encodes the coupling of electrons and holes to photons and phonons, enabling the essential description of photogeneration, radiative recombination and relaxation of carriers. The interaction of charge carriers with electromagnetic radiation is described on two levels: for the coherent processes of absorption and stimulated emission, minimal coupling to the classical vector potential $\mathbf{A}$ - obtained, e.g., by solving Maxwell's equations - in dipole approximation provides the self-energy \begin{align} \Sigma^{\lessgtr}(\mathbf{r},\mathbf{r}',E)=\Big(\frac{e}{m_{0}}\Big)^{2}\sum_{\mu\nu}\int dE_{\gamma} \Big[&A_{\mu}(\mathbf{r},E_{\gamma}) p_{cv}^{\mu}(\mathbf{r}) G^{\lessgtr}(\mathbf{r},\mathbf{r}',E\mp E_{\gamma})\nonumber\\&\times A_{\nu}^{*}(\mathbf{r}',E_{\gamma})p_{cv}^{\nu*}(\mathbf{r}')\Big].\label{eq:se_phot_coh} \end{align} Here, greek subscripts denote polarization indices, and $\mathbf{p}_{cv}$ is the momentum matrix. Spontaneous emission, on the other hand, requires incoherent coupling to the entirety of photon modes available as encoded in the photon Green’s function ${\mathcal{D}}$. The corresponding self-energy on the level of the self-consistent Born approximation (SCBA) from second-order perturbation theory in the interaction of charge carriers with the quantized photon field reads \begin{align} \Sigma^{e\gamma,\lessgtr}(\mathbf{r},\mathbf{r}',E)=i\hbar\mu_{0}\Big(\frac{e}{m_{0}}\Big)^2&\sum_{\mu\nu}\lim_{\mathbf{r}''\rightarrow\mathbf{r}} \Big[\frac{1}{2}\left\{\hat{p}^{\mu}(\mathbf{r})-\hat{p}^{\mu}(\mathbf{r}'')\right\}\hat{p}^{\nu}(\mathbf{r}') \nonumber\\&\times \int\frac{dE'}{2\pi\hbar}\mathcal{D}^{\lessgtr}_{\mu\nu}(\mathbf{r}'',\mathbf{r'},E') G^{\lessgtr}(\mathbf{r},\mathbf{r'},E-E')\Big],\label{eq:se_phot_inc} \end{align} where $\hat{\mathbf{p}}=-i\hbar\nabla$ is the momentum operator. A similar SCBA self-energy is used for the description of electron-phonon interaction. The contact self-energies, on the other hand, implement the open boundary conditions required for the description of charge carrier extraction and injection, and have the general form $\Sigma^{B}=\mathcal{T}g^{B}\mathcal{T}^{\dagger}$ , where $\mathcal{T}$ encodes the coupling to the contact and $g^{B}$ is the surface Green’s function of the electrode. The level of electronic injection is set by the chemical potentials of left and right electrodes, with their separation corresponding to the applied bias voltage, $\mu_{R}-\mu_{L}=~qV$. The evaluation of the Green’s functions (GF) is again self-consistently coupled to the computation of the electrostatic potential via Poisson’s equation (8) through the expression of the carrier density in terms of the GF: \begin{align} \rho_{e/h}(\mathbf{r})=\mp i\int \frac{dE}{2\pi}G_{c/v}^{\lessgtr}(\mathbf{r},\mathbf{r},E).\label{eq:negf_dens} \end{align} In contrast to the semiclassical bulk picture, this formalism provides non-local microscopic non-equilibrium dynamics in arbitrary potentials under explicit consideration of the relevant scattering processes, which covers transport from ballistic to diffusive regimes and rigorous treatment of tunneling and size quantization effects. Due to the consistent description of spectral quantities and integral characteristics, the approach is ideally suited to mediate between microscopic material properties and nanostructure configurations on the one hand, and macroscopic device behavior on the other hand, providing a natural framework for multi-scale simulation of nanostructure-based solar cells. On the other hand, a multi-scale approach is also indicated due to the very large computational cost of the NEGF approach, that stems from the microscopic resolution in energy, momentum and real space, and of the requirement for self-consistent computations, and which currently limits the applicability of the formalism to nanostructure regions of mesoscopic extension. Massively parallel implementations of the approach may help to cope with the immense computational load, but are challenging due to the communication overhead resulting from the coupling in energy and momentum space when considering inelastic scattering, and non-locality in real space requiring the computation of off-diagonal GF elements. \section{Applications} Two common aspects of nano-scale or nanostructure absorbers are in the focus of the investigation here: the effects of departure from flat band potentials due to strong built-in fields, and the impact of finite size effects such as the presence of non-classical contact regions. These are investigated by application of the simulation approaches introduced above to three different generic solar cell device architectures which deviate increasingly from the bulk situation in terms of the spatial confinement of the absorber states: ultra-thin absorber solar cells, single quantum well photo-diodes and quantum dot superlattice solar cells. \subsection{Ultra-thin solar cells} \begin{figure}[t] \begin{center} \includegraphics[width=1\textwidth]{Fig_1.eps} \caption{(a) Layer structure, doping levels and corresponding band profile of an ultra-thin GaAs $p$-$i$-$n$ solar cell with carrier selective contacts \cite{ae:apl_16}. (b) Device characteristics of the solar cell device in (a) in the dark and under monochromatic illumination with photon energy $E_{\gamma}=1.44$ eV and intensity of 0.1 kW/m$^{2}$. While there is a significant deviation of the NEGF result from the drift-diffusion characteristics based on flat band bulk material parameters, use of the NEGF rates in the drift-diffusion formalism reproduces the full NEGF result, pointing at ideal carrier extraction \cite{ae:jpv_16}.\label{fig:fig_1}} \end{center} \end{figure} Recently, strongly enhanced to almost complete light absorption in ultra-scaled absorber layers with thicknesses in the deep sub-wavelength regime and nanophotonic light trapping has been shown both theoretically \cite{wang:13,llorens:14} and experimentally \cite{massiot:12,massiot:13,massiot:14}. This opens up a route to highly efficient photovoltaic devices with vastly reduced material consumption and increased radiation tolerance \cite{wang:13_jpv,yang:14_jap,vandamme:15,hirst:16}. The understanding and design of quasi-confined or resonant optical modes is key to the realization of ultra-thin solar cells, however, the strong reduction of spatial extension affects also the electronic properties. While there is no heterostructure potential in the absorber region, the non-classical contact regions occupy a significant fraction of the device and have a pronounced influence on the device characteristics. Figure \ref{fig:fig_1}(a) displays the structure of the ultra-thin GaAs $p$-$i$-$n$ device under consideration here. The total thickness of the device is less than 100 nm. The light is incident from the left without any anti-reflection coating, and is reflected at a gold mirror forming the right contact. The gold layer is considered explicitly only in the optical simulation. The optical model is based on the transfer-matrix method in all cases, thus including the effects of multiple reflections. The optical rates and transport equations are computed either using the semiclassical formalism [Eqs.~\eqref{eq:dd_curr}-\eqref{eq:sc_dens}] as implemented in the 1D thin-film solar cell simulator {\it ASA} \cite{pieters:06}, or the quantum-kinetic formalism [Eqs. \eqref{eq:negf_baleq}-\eqref{eq:keldysh}] for a two band effective mass Hamiltonian. In the latter case, while the generation and recombination processes are enabled directly via the single particle interaction self-energies \eqref{eq:se_phot_coh} and \eqref{eq:se_phot_inc} for coherent and incoherent coupling to the (quantized) electromagnetic field, respectively, the representation of the optical rates as in \eqref{eq:negf_rates} can be used to express the absorption coefficient in terms of microscopic quantities: \begin{align} \alpha(z,E_{\gamma})\approx&\frac{\hbar c_{0}}{6 n_{r}(z,E_{\gamma})E_{\gamma}}\sum_{\mu}\int dz' \mathrm{Re}\Big[i\hat{\Pi}_{\mu\mu}(\mathbf{0},z',z,E_{\gamma})\Big], \end{align} where \begin{align} \Pi_{\mu\nu}^{\lessgtr}(\mathbf{q}_{\parallel},z,z',E_{\gamma})=&-i\hbar\mu_{0}\Big(\frac{e}{m_{0}}\Big)^{2}p_{cv}^{\mu*}(z)p_{cv}^{\nu}(z')\mathcal{P}_{cv}^{\lessgtr}(\mathbf{q}_{\parallel},z,z',E_{\gamma}) \end{align} is the photon self-energy for the electron-hole polarization function \begin{align} \mathcal{P}_{cv}^{\lessgtr}(\mathbf{q}_{\parallel},z,z',E_{\gamma})=&\mathcal{A}^{-1}\sum_{\mathbf{k}_{\parallel}}\int \frac{dE}{2\pi\hbar}G_{c}^{\lessgtr}(\mathbf{k}_{\parallel},z,z',E)G_{v}^{\gtrless}(\mathbf{k}_{\parallel} -\mathbf{q}_{\parallel},z',z,E-E_{\gamma}).\label{eq:polfun} \end{align} In the above equations, the slab representation adequate for planar geometries is used, with $z$ denoting the perpendicular coordinate and $\mathbf{k}_{\parallel}$ ($\mathbf{q}_{\parallel}$) the transverse momentum of electrons (photons) associated with the periodic in-plane dimensions. $\mu$ and $\nu$ are polarization indices, $\mu_{0}$ is the vacuum permeability, $\mathbf{p}_{cv}$ is the interband momentum matrix element and $\mathcal{A}$ is the transverse cross section. In terms of the photon self-energy and Green’s function, i.e., in a picture that allows for a consistent description of absorption and emission, the absorptance appearing in the global detailed balance limit acquires the form ($\hat{\mathcal{D}}\equiv \mathcal{D}^{>}-\mathcal{D}^{<}$, $\hat{\Pi}\equiv \Pi^{>}-\Pi^{<}$) \begin{align} a_{\mu\nu}(\mathbf{q}_{\parallel},E_{\gamma})=&-\int dz\int dz'~\Big[\hat{\mathcal{D}}_{v,\mu\nu}(\mathbf{q}_{\parallel},z,z',E_{\gamma})\hat{\Pi}_{\nu\mu}(\mathbf{q}_{\parallel},z',z,E_{\gamma})\Big].\label{eq:negf_absorpt} \end{align} In the same picture, the spectral emission rate corresponding to the integrand in the semiclassical expression \eqref{eq:recrate} reads \begin{align} r^{\mu}(\mathbf{q}_{\parallel},z,E_{\gamma})=&\sum_{\nu}\int dz'~(2\pi\hbar)^{-1}\mathcal{D}^{>}_{\mu\nu}(\mathbf{q}_{\parallel},z,z',E_{\gamma})\Pi_{\nu\mu}^{<}(\mathbf{q}_{\parallel},z',z,E_{\gamma}). \end{align} In the band profile displayed in Fig. \ref{fig:fig_1}(a), two salient features are the sizable bend bending due to the large built-in field, and the carrier selective contacts imposed by blocking layers with potential barriers for minority carriers. Fig. \ref{fig:fig_1}(b) displays the current-voltage characteristics for the case of perfect selectivity ($\Delta E_{C,V}\rightarrow \infty$), in the dark and under monochromatic illumination at $E_{\gamma}=1.44$ eV and an intensity of 0.1 kW/m$^{2}$. The sizable discrepancies in dark and photocurrent between the semiclassical drift-diffusion results and the NEGF characteristics are largely explained by the strong field effects on absorption and emission that lead to deviations from flat band bulk (FBB) properties regarding generation and recombination, as shown in Fig. \ref{fig:fig_2}(a) for the absorption coefficient and the emission rate at the center of the intrinsic region. In the FBB case, the following expression is used for the absorption coefficient: \begin{align} \alpha_{\mathrm{bulk}}^{pb}(E_{\gamma})=&\frac{(2m_{r}^{*})^{\frac{3}{2}}}{2\pi\hbar^2\sqrt{\varepsilon_{b}}\varepsilon_{0}c_{0}E_{\gamma}}\Big(\frac{e}{m_{0}} p_{cv}\Big)^2\sqrt{E_{\gamma}-E_{g}}\Theta(E_{\gamma}-E_{g}), \end{align} with $m_{r}^{*}$ the reduced effective mass, $\varepsilon_{b}$ the background dielectric constant and $E_{g}$ the band gap energy. Remarkably, if the NEGF rates \eqref{eq:negf_rates} are used in the semiclassical balance equation \eqref{eq:baleq}, the NEGF characteristics are reproduced. While the actual transport regime might still be very different in the two cases (ballistic extraction in the NEGF picture versus diffusive band-like transport in the drift-diffusion picture), the coincidence roots in perfect carrier extraction due to the long radiative lifetime \cite{ae:jpv_16}. \begin{figure}[!h] \begin{center} \includegraphics{Fig_2.eps} \caption{(a) Absorption coefficient and emission rate at the center of the intrinsic region, as provided by a flat-potential parabolic two-band bulk model (lines) using the Van Roosbroeck- Shockley formalism, and as obtained from the NEGF formalism (symbols) for the same two-band model, but including the actual band profile \cite{ae:jpv_16}. (b) Absorptance and normal emission at the left surface of the solar cell, demonstrating the breakdown of the photovoltaic reciprocity between external quantum efficiency at zero bias voltage and luminescent emission at large forward bias: the strong modification of the absorptance with bias invalidates the use of the short circuit absorptance in the Generalized Kirchhoff law for the emission. The difference in the emission with respect to the dash-dotted line corresponding to the integrated internal emission rate is a signature of photon recycling effects \cite{ae:17_prl}.\label{fig:fig_2}} \end{center} \end{figure} As a direct consequence of the pronounced field effects, the large variation of the longitudinal field with terminal voltage $V$ causes the breakdown of the superposition principle and, eventually, of the photovoltaic reciprocity relation \cite{rau:07} between photocurrent extraction -- expressed by the external quantum efficiency -- and the luminescent emission due to carrier injection under applied bias voltage. Figure \ref{fig:fig_2}(b) shows the change of the absorptance when going from short circuit conditions ($V=0$ V) to large forward bias close to open circuit conditions ($V=1.1$ V). The absorptance obtained from the Green’s functions by evaluation of Eq. \eqref{eq:negf_absorpt} is in excellent agreement with the quantity directly obtained form the transfer-matrix model, which validates the photon Green’s function approach. As demonstrated further in Fig. \ref{fig:fig_2}(b), the generalized Kirchhoff law for the emission spectrum based on the absorptance -- i.e., Eq. \eqref{eq:phiem} -- applies only, if the absorptance at the point of operation is used, while the emission based on the absorptance at $V=0$ V exhibits a strong broadening and red-shift. The difference between internal and external emission caused by reabsorption becomes visible in Fig. \ref{fig:fig_2}(b), where the integrated (normal) emission rate is shown ($R^{\mathrm{glob}}_{\mathrm{em}}$, dash-dotted line) together with the (normal) emission from the left surface \cite{ae:17_prl}. \begin{figure}[t] \begin{center} \includegraphics{Fig_3.eps} \caption{(a) Spectral current flow in a 50-nm thick $p$-$i$-$n$ photodiode with perfectly selective, open and blocking layer contacts, respectively. The open contact configuration leads to pronounced leakage losses at forward bias, while blocking layers at both contacts induce size quantization effects. (b) Current-voltage characteristics for the different configurations: for open contacts, leakage losses result in strong reduction of the open circuit voltage, while contact barriers lead to a reduction in short circuit current. (c) The short circuit current losses induced by barriers are the consequence of reduced absorption due to the appearance of non-classical regions of reduced density of states in the vicinity of the barriers \cite{ae:apl_16}. \label{fig:fig_3}} \end{center} \end{figure} The second feature that is characteristic for nanoscale absorbers concerns finite size effects related to contact regions that span a non-negligible fraction of the active device and which have a measurable impact on the overall device performance \cite{ae:apl_16}. Figure \ref{fig:fig_3}(a) displays the spectral current flow in a 50-nm ultrathin device at 0.87 V of forward bias voltage under monochromatic illumination with $E_{\gamma}=1.44$ eV and at an intensity of 0.1 kW/m$^{2}$. The three different contact configurations considered are: ideally “selective” ($\Delta E_{C,V}\rightarrow \infty$), “open” ($\Delta E_{C,V}\rightarrow 0$) and with electron and hole “blocking layers” (EBL/HBL) inducing finite potential barriers at the contacts ($0 < \Delta E_{C,V} < \infty$). In the case of GaAs, suitable contact layers can be engineered using alloys such as AlGaAs \cite{vandamme:15} or InGaP \cite{yang:14_jap} or a combination thereof \cite{cavassilas:15}. The ideally selective contact blocks reverse current flow -- i.e., leakage current -- of minority carriers completely, while majority carriers are extracted without barrier. In the absence of the barrier for minority carriers (open contact), carriers that are injected at the majority carrier contact or which are photogenerated inside the intrinsic region can leave the device via the minority carrier contact, which represents a significant leakage loss. In the case of photocurrent leakage, the short circuit current is reduced, while leakage of electrically injected carriers contributes to the dark saturation current and hence results in a reduction of open circuit voltage V$_{\textrm{OC}}$. Figure \ref{fig:fig_3}(b) displays the current-voltage characteristics of the different contact configurations. While the loss in V$_{\textrm{OC}}$ is explained by the dark current due to leakage as discussed above, the reduction of short circuit current J$_{\textrm{SC}}$ in the presence of the blocking layers is due to the appearance of non-classical regions of reduced density of states in close proximity of the barriers, which translates to a reduced absorption coefficient [Fig. \ref{fig:fig_3}(c)]. In the case of simultaneous presence of electron and hole blocking layers with finite barriers also for majority carriers, size quantization enhances this effect and leads to both a resonance structure in the spectral current and a strongly reduced absorptance at photon energies close to the band gap, as shown in Fig. \ref{fig:fig_3}(c). \subsection{Quantum well solar cells} Quantum well solar cells have been introduced as tunable band gap absorbers in single and multijunction configurations \cite{barnham:90,ned:01}. Advanced strain-balancing approaches allow for the exploitation of a large material parameter space while keeping the density of structural defects low \cite{ned:99_2}. In quantum well solar cells, the absorber contains regions of lower dimensional electronic states that are partially confined in transport direction owing to the variation in band gap and electron affinity of the constituent bulk materials. In conventional multi-quantum-well architectures, the quantum well states are not directly coupled to the contacts, and carriers generated in such localized states have to be transferred to extended continuum states prior to extraction \cite{ae:solmat_10,ae:spie_10}. The escape of carriers proceeds via thermionic emission, direct or phonon assisted tunneling, depending on the temperature, injection level and strength of the built-in field. The situation is different in superlattices of strongly coupled QW \cite{wang:12}, where extraction proceeds via confined states related to miniband formation, with transport regimes ranging from ballistic escape to sequential tunneling assisted by phonon emission \cite{ae:nrl_11,ae:jpe_14}. \begin{figure}[b] \begin{center} \includegraphics{Fig_4.eps} \caption{ (a) Structure and band profile of a GaAs $p$-$i$-$n$ photodiode with a single InGaAs quantum well embedded in the intrinsic region. (b) Confined states in the QW for flat band potential, as provided by the solution of the effective mass Schr\"odinger equation with closed system boundary conditions. (c) Corresponding local density of states obtained from the NEGF formalism. (d) LDOS for the self-consistent potential at forward bias of 0.8 V, i.e., close to the maximum power point. The deviation from flat band potential leads to Stark shifts and partial unbinding of the QW states.\label{fig:fig_4}} \end{center} \end{figure} Here, in order to investigate the impact of the additional deviation from an ultra-thin, but otherwise homogeneous bulk-like absorber, we study a GaAs $p$-$i$-$n$ photodiode with a single InGaAs quantum well embedded in the intrinsic region, as displayed in Fig. \ref{fig:fig_4}(a). As in the case of the ultrathin absorber device, the light is incident from the left, and the gold reflector is considered in the optical simulation only. In Fig. \ref{fig:fig_4}(b), the envelope functions of confined electron and hole states of the field-free quantum well as obtained by solving the effective mass Schr\"odinger equation with closed-system (Dirichlet) boundary conditions are shown. The corresponding local density of states provided by the NEGF formalism based on the same effective mass Hamiltonian at flat band conditions is displayed in Fig. \ref{fig:fig_4}(c). This time, the LDOS includes the perturbed continuum above the well, featuring quasi-continuum states that give rise to transmission resonances. While the flat band NEGF picture coincides with the closed-system Schr\"odinger picture for the confined states in terms of resonance energy and spatial variation, the NEGF LDOS for the self-consistent potential at the operating point of 0.8 V of forward bias voltage exhibits strong field effects in terms of Stark shifts and partial unbinding of the higher confinement levels [Fig. \ref{fig:fig_4}(d); please note the difference in energy scale with respect to (b) and (c)]. Following the derivation of the states in the square well potential (SW) under vanishing and self-consistent field, a similar analysis is performed for the absorption coefficient: Figure \ref{fig:fig_5}(a) displays the textbook absorption coefficient as obtained from the Fermi-Golden-Rule (FGR) rate based on the flat band square well potential states, \begin{align} \alpha_{\mathrm{SW}}(E_{\gamma})= f\cdot E_{\gamma}^{-1}\sum_{i,j}|M_{c_{i}v_{j}}|^2\Theta\big(E_{\gamma}-\varepsilon_{c_{i}v_{j}}\big) \end{align} with $\Theta$ the unit step function and \begin{align} f=\frac{e^2 m_{r}^{*}P_{cv}^2}{m_{0}^2\hbar n_{r}c_{0}\varepsilon_{0}L_{w}} \end{align} where $m_{r}^{*}$ is the reduced effective mass, $P_{cv}=\sqrt{E_{P}m_{0}/6}$ is the bulk momentum matrix element for Kane energy $E_{P}=26.9$ eV, $n_{r}=3.7$ is the refractive index of the bulk material, and $c_{0}$ and $\varepsilon_{0}$ are speed of light and permittivity in vacuum, respectively. The overlap matrix elements \begin{align} M_{c_{i}v_{j}}=\int_{L} dz~ \psi^{*}_{c_{i}}(z)\psi_{v_{j}}(z), \end{align} where $L(>L_{w})$ is the normalization length of the envelope functions in $z$-direction $\psi$, introduce the optical selection rules according to the WF symmetry that suppress a number of transitions, as indicated by dashed arrows. The NEGF absorption coefficient which is related to the LDOS in Fig. \ref{fig:fig_4}(c) reproduces the FGR result, up to the effects of finite broadening, but including the selection rules, which is a highly non-trivial result, as it requires the consideration of the full non-locality in the evaluation of the joint density of states encoded in the polarization function \eqref{eq:polfun} \cite{ae:prb89_14}. However, the NEGF absorption coefficient based on the LDOS in Fig. \ref{fig:fig_4}(d) bares little resemblance to the square well flat band absorption, as the strong field leads to a pronounced red shift of the absorption edge and to a relaxation of selection rules due to symmetry breaking, while the unbinding of states removes the 2D character of the (joint) density of states. \begin{figure}[!h] \begin{center} \includegraphics{Fig_5.eps} \caption{(a) Absorption coefficient of the single quantum well photodiode in the energy range below the bulk band gap of the host material, for the three cases displayed in Fig. 4: from Fermi-Golden-Rule rate (FGR) using the flat band square-well potential states (SW), from NEGF for flat band, and from NEGF for the self-consistent potential at 0.8 V. While the NEGF absorption coefficient reproduces the FGR result up to some broadening effects, including the symmetry-induced selection rules, the absorption coefficient at 0.8 V exhibits a pronounced red-shifting, relaxation of selection rules due to symmetry breaking and deviation from purely two-dimensional density of states. (b) Current-voltage characteristics of the single quantum well photodiode for monochromatic illumination with $E_{\gamma}=1.3$ eV and at an intensity of 0.1 kW/m$^{2}$, as provided by: the detailed balance picture (DB) with absorptance from Lambert-Beer law (LB) or the transfer-matrix method (TMM) for square well absorption coefficient ($\alpha_{SW}$); the semiclassical drift-diffusion-Poisson model (DD) coupled to TMM; and the full NEGF-Poisson model. While the LB and TMM laws provide slightly different absorptance levels, consideration of the absorption coefficient as provided by the NEGF formalism results in semiclassical characteristics that match closely those of the full NEGF model.\label{fig:fig_5}} \end{center} \end{figure} In the global detailed balance and the semiclassical picture, the absorption coefficient is the main ingredient for the computation of the current-voltage characteristics of the device at the radiative limit. In the former case, it is used for the computation of the absorptance in Eqs. \eqref{eq:phiabs} and \eqref{eq:phiem}, while in the latter it provides the generation and recombination rates via Eqs. \eqref{eq:genrate} and \eqref{eq:recrate}, respectively. In Fig. \ref{fig:fig_5}(b), the characteristics are shown for monochromatic illumination with $E_{\gamma}=1.3$ eV and at an intensity of 0.1 kW/m$^{2}$ for different theoretical descriptions: the global detailed balance picture (DB) with absorptance from Lambert-Beer law (LB) or the transfer-matrix method (TMM) for square well absorption coefficient ($\alpha_{\textrm{SW}}$); the semiclassical drift-diffusion-Poisson model (DD) coupled to TMM; and the full NEGF-Poisson model. The LB and TMM pictures provide slightly different absorptance levels, and the DD model exhibits an increased dark saturation current due to the emission into the full solid angle as compared to the loss cone in the case of the global models, and the absence of photon recycling. Remarkably, consideration of the absorption coefficient $\alpha_{\textrm{NEGF}}$ as provided by the NEGF formalism results in semiclassical characteristics that match closely those of the full NEGF model. This justifies {\it a posteriori} the assumption of unit escape probability of carriers generated in quantum well states that is used in the semiclassical model and which is based on experimental observations for device operation at room temperature and moderate well depth \cite{nelson:93}. As in the case of the ultrathin absorber, this unit extraction efficiency is here a consequence of the long radiative lifetime, such that the escape is much faster than the recombination. In reality, escape competes with much faster non-radiative recombination channels, which in deep wells and at large forward bias corresponding to low fields results in incomplete carrier extraction. Furthermore, in a proper treatment of the charge density component related to confined states, accumulation of charge in the QW will have effects on both the electrostatic potential as well as the recombination rate. If the confinement is neglected, as in the semiclassical approach used here, carriers are generated in extended states only and drift or diffuse away quickly. \subsection{Quantum dot solar cells} In quantum dots, the deviation from bulk material properties is maximum due to confinement induced by inhomogeneity in all three spatial dimensions. There is a large variety of quantum dot architectures studied for photovoltaic applications, ranging from hybrid organic-inorganic bulk heterojunction type solar cells based on colloidal nanoparticle to superlattices of epitaxially grown QD of regular shape \cite{nozik:02,kamat:08,nozik:10}. Here, the focus is set on regimented arrays of inorganic low band gap nanoparticles embedded in a wide band gap host material, which enable the formation of extended states due to strong coupling of adjacent nanoparticles and have been investigated for applications as tunable band gap absorbers in tandem configuration \cite{jiang:06,conibeer:08_tandem} or for intermediate band solar cells \cite{marti:01_ted}. \begin{figure}[b] \begin{center} \includegraphics[width=1\textwidth]{Fig_6.eps} \caption{ (a) Schematic representation of a mesoscopic model for quantum dot array solar cells, including on-site energy, interdot hopping and coupling to carrier selective contacts \cite{berbezier:15}. (b) Local density of states (LDOS) of the lowest electron and hole minibands for a 20 QD array at vanishing field, where the states extend over the entire array. Hybridization with the bulk electrode induces strong broadening of the LDOS at the contacts \cite{berbezier:15}. (c) In the presence of finite built-in fields, the minibands break up and the wave functions localize over a few neighboring QD. This has potentially detrimental impact on the carrier extraction efficiency, as sequential relaxation processes are required for transport to the contacts \cite{ae:oqel_12}. \label{fig:fig_6}} \end{center} \end{figure} \begin{figure}[b] \begin{center} \includegraphics[width=1\textwidth]{Fig_7.eps} \caption{ Local density of states of the lowest electron “miniband” of a 20 QD array with selective contact to the dot number 20. Even at low dot-contact coupling, the finite size of the array results in a spatial variation of the site-resolved LDOS. Increasing dot-contact coupling induces a renormalization of the states adjacent to the contact, which results in a shift to lower energies and formation of a strongly localized surface state \cite{berbezier:15}. \label{fig:fig_7}} \end{center} \end{figure} \begin{figure}[b] \begin{center} \includegraphics[width=1\textwidth]{Fig_8.eps} \caption{(a) Absorption cross section and (b) spectral emission rate for a 20 QD array with varying values of inter-dot coupling $t_{c}=t_{v}$ and dot-contact coupling $V_{B}$. The contact contributes primarily a broadening up to very strong coupling, where a localized surface state is induced. The interdot coupling affects the bandwidth of the spectral response, including the size effective gap which has a strong impact on the magnitude of the emission. (c) Photocarrier extraction efficiency in a 20 QD array as a function of configurational parameters (inter-dot coupling $t_{c,v}$ and dot-contact coupling $V_{B}$) and carrier recombination lifetime $\tau_{r}$. The dot-contact coupling limits the extraction efficiency, while inter-dot coupling becomes critical only for very low lifetime \cite{berbezier:15}. \label{fig:fig_8}} \end{center} \end{figure} \noindent Figure \ref{fig:fig_6}(a) shows a schematic representation of an effective mesoscopic model of such an array, furnished with on-site energies, inter-dot hopping constants and a term describing the coupling to carrier-selective contacts \cite{berbezier:15}. Contact selectivity is essential to ensure charge separation close to flat band conditions. Since atomistic resolution is out of discussion for extended arrays, a coarse grained localized basis approach is chosen where the QD wave functions are expressed in terms of QD orbitals. This amounts to field operators of the form \begin{align} \hat{\Psi}(\mathbf{r},t)=\sum_{i,n}\psi_{in}(\mathbf{r})\hat{d}_{in}(t), \end{align} with $\psi$ the QD orbital wave function and $\hat{d}$ the annihilation operator for electrons in QD orbitals. In this basis, the model corresponds to a simple nearest-neighbor tight-binding chain expressed by the Hamiltonian \begin{align} \hat{\mathcal{H}}_{0}^{b}=&\sum_{i=1}^{N_{QD}-1} t_{b,ii+1}\Big[\hat{d}_{b,i+1}^{\dagger}\hat{d}_{b,i}+h.c.\Big]+\sum_{i=1}^{N_{QD}}\varepsilon_{b,i}\hat{n}_{b,i}, \end{align} where $N_{QD}$ is the number of dots, $t_{b}$ is the inter-dot coupling, $\hat{n}_{b}\equiv\hat{d}_{b}^{\dagger}\hat{d}_{b}$ is the carrier density operator and $\varepsilon_{b}$ is the QD energy level. The dot-contact coupling is considered in the usual way by means of a contact self-energy that vanishes for closed contacts. In the flat band case displayed in Fig. \ref{fig:fig_6}(b), the coupling of the dots leads to the delocalization of the wave functions over the entire array. At the contacts, the hybridization of the dot states with the electrode induces a broadening of the LDOS, corresponding to the reduction of lifetime due to carrier escape to the contacts. In the presence of strong built-in fields, the wave functions localize over a limited number of neighboring quantum dots, which slows down carrier extraction due to the requirement of sequential carrier relaxation processes \cite{ae:oqel_12}. This is shown in Fig. \ref{fig:fig_6}(c) for the case of a hetero-superlattice of silicon quantum dots laterally confined in silicon oxide and vertically separated by barrier layers of silicon carbide \cite{ding:energy_procedia11}. Even at flat band conditions, the site-resolved LDOS is not uniform throughout the finite-size array, as shown in Fig. \ref{fig:fig_7} for the lowest electron miniband in a 20 QD array with contact to dot number 20. For strong dot-contact coupling $V_{\mathrm{cR}}$, the states in the vicinity of the contact are renormalized, which amounts to a shift to lower energies and results in the formation of a strongly localized surface state. The impact of inter-dot and dot contact coupling parameters $t_{\mathrm{c,v}}$ and $V_{\mathrm{B}}$ on the radiative rates is shown in Figs.~\ref{fig:fig_8}(a) and (b) displaying the absorption cross section and the spectral emission rate of the 20 QD array for different values of the coupling parameters. Up to the critical contact coupling where surface states are formed, the main impact of the contact is to induce a slight broadening to the contributions of the individual dots to the spectra. The interdot coupling, on the other hand, determines the band width of the spectral response, which in turn has a pronounced effect on the magnitude of the emission via the size of the effective band gap. In order to study the impact of configurational parameters on the efficiency of photocarrier extraction, the ratio $\eta_{\textrm{ext}}=J_{\textrm{SC}}/J_{\textrm{abs}}$ of short circuit current to generation current as obtained from the absorption cross section is evaluated for different values $\tau_{\textrm{r}}$ of radiative lifetime and coupling parameters, respectively. As shown in Fig. \ref{fig:fig_8} for a 20 QD array at flat band conditions and under monochromatic resonant excitation with the central frequency of the miniband, it is the contact coupling that limits the performance in all situations, while the interdot coupling becomes critical only at very low photocarrier lifetime \cite{berbezier:15}. \section{Summary and conclusions} The operation of nanostructure-based photovoltaic devices exhibits substantial deviations from bulk physics, not only regarding the electronic, optical and vibrational structure, but also in the dynamical processes involving nanostructure states. As a consequence, the device characteristics are determined by the operating conditions and inhomogeneities in structure and composition as well as finite size and surface effects rather than by the flat-band bulk properties of the constituent materials. The semiclassical macroscopic bulk picture conventionally used for the simulation of photovoltaic device characteristics fails to capture many of these effects by default. On the other hand, a microscopic generalization of the steady-state balance equations on the level of quantum statistical mechanics is able to provide a comprehensive quantum theory of photovoltaics at the nanoscale. This allows to assess on physical grounds the impact of configurational parameters on the photovoltaic device performance. Comparison of the predictions based on the different simulation approaches shows that in situations where transport is mediated by extended bulk states, consideration of the actual density of states at the operating point for the evaluation of the optical rates used in the semiclassical balance equations is sufficient to obtain the correct characteristics. The effects of potential barriers on charge extraction, on the other hand, still requires the full evaluation of the quantum transport problem. In general, a comprehensive and accurate, but still efficient assessment of nanostructure solar cell devices based on simulation will require a multiscale simulation framework relying on suitable combinations of the modelling approaches discussed in the present work. At this point it is indicated to point out that non-classical regions in solar cells are not restricted to nano-structure based devices, but appear in the form of interface and hetero-contact regions in a large variety of applications, from the a-Si:H/c-Si interface of the silicon heterojunction solar cell to grain boundaries and selective contacts in perovskite devices. The advanced theoretical analysis proposed here has thus applications in a wide range of current photovoltaic device research activities. \section*{Acknowledgment} This work has benefited from fruitful discussions within COST action MP1406 -- MultiscaleSolar. \section*{References} \bibliographystyle{ieeetr} \input{references.bbl} \end{document}
\section{\label{sec:level1}Introduction} Under time-periodic modulations, the long-time behavior of a quantum system is governed by its Floquet states, which may carry topological features absent in its equilibrium predecessor. Originally anticipated in quantum chaos and nonlinear dynamics~\cite{Leboeuf1990}, Floquet topological phases are under intensive studies in recent years. Theoretically, a large class of topological Floquet states has been proposed, including Floquet topological insulators~\cite{Oka2009,Kitagawa2011,Lindner2011,GongPRL2012,Gomezleon2013,Rudner2013,Cayssol2013}, Floquet Anderson insulators~\cite{Titum2015,Titum2016}, Floquet Majorana Fermions~\cite{Jiang2011,Kundu2013,Gong2013,Klinovaja2016,Thakurathi2017}, Floquet topological semimetals~\cite{WangFWSM2014,Raditya2016,Zhou2016,Raditya2016b}, etc. New classification schemes for these states have also been introduced, which go beyond their static counterparts~\cite{Harper2016a,Harper2016b}. Experimentally, Floquet techniques have been implemented successfully to realize the long-awaited Haldane Chern insulator in cold-atom systems~\cite{Jotzu2014}. The flexibility of driving fields in manipulating topological surface states have also been demonstrated~\cite{Wang453}. Meanwhile, various photonic~\cite{Rechtsman2013,Hu2015,Maczewsky2017,Mukherjee2017}, phononic and acoustic~\cite{Xiao2015,Susstrunk2015,Susstrunk2017} analogs of Floquet topological phases with robust transport along their edges were observed, revealing a new strategy to harness the propagation of light and sound~\cite{Peano2015}. One important reason why Floquet topological phases are attractive is that their topological invariants can be very large \cite{GongPRL2012, Gong2013,Derek2014,Zhou2014,Xiong2016}. This hints that Floquet topological matter may be able to exploit a considerable number of edge state channels to realize robust and appreciable edge state transport. However, very few studies have investigated this possibility from the perspective of two-terminal transport. In conventional electronic devices, it is well known that in the quantum Hall regime, the Hall conductance is quantized and equal to $e^2/h$ times the number of chiral edge modes on the Fermi surface lying between Landau levels~\cite{Buttiker1988,Datta1995}. Consider now a sample subject to a periodic driving field. { Stroboscopically, the system is described by the Floquet operator and its eigenstates, with new features absent in the instantaneous eigenstates of the system Hamiltonian.} Its transport properties may then dramatically change {, because the electrons can now absorb or emit photons from the driving field, resulting in a photon-dressed steady state which may explore conduction channels inaccessible in the static case. Therefore} studies of the transport of Floquet edge modes in a two-terminal device are necessary but not straightforward. We also mention that before the advent of Floquet topological phases, many efforts have been devoted to understanding driven transport at the nanoscale~\cite{Tien1963,Platero2004,Kohler2005}. Various theoretical approaches, such as nonequilibrium Green's functions~(NEGF)~\cite{Jauho1994,Arrachea2005,Tsuji2008}, master equations~\cite{Kohler2005,Bruder1994}, and Floquet scattering matrix~\cite{Moskalets2002,Kim2004,Arrachea2006} have been adopted to study this problem from different perspectives. Regarding the potential applications of Floquet topological phases in transport devices, the key questions to be answered are then as follows: (i) Are Floquet topological phases indeed useful in achieving tunable, appreciable and robust conductance? (ii) How is the Floquet edge state conductance related to the symmetry and topological invariants of the system? (iii) Is the conductance of Floquet edge states quantized? If not, why and when? Answers to these questions are of both theoretical and experimental interest. We note that a couple of recent studies have focused on edge state transport in Floquet topological insulators. In Refs.~\cite{Gu2011,Foatorres2014,Kundu2014}, it was shown that the DC conductance of a Floquet topological insulator is not linked to the topological invariants of the full Floquet bands, and therefore not quantized in general. Yet, by employing a Floquet sum rule proposed in Ref.~\cite{Kundu2013}, the authors of Refs.~\cite{Farrell2015,Farrell2016} found a way to recover the conductance quantization of Floquet edge states in a quantum spin Hall insulator, which was further confirmed in a Floquet-Chern insulator model~\cite{Fruchart2016}. In Ref.~\cite{Fulga2016}, a scattering matrix invariant is introduced to describe the conductance of Floquet edge states at a given quasienergy, which assumes only integer values. {Using a boundary-condition matching approach generalized to Floquet systems, the authors in Ref.~\cite{Gu2011} studied the scaling of conductance in an irradiated graphene nanoribbon.} In the meantime, a couple of complementary works reveal some anomalous transport properties of Floquet edge states in larger systems due to the interplay between driving fields and reservoir-induced cooling~\cite{Dehghani2015a,Dehghani2015b,Dehghani2016}. These interesting debates and discoveries, together with the lack of experiments on Floquet edge states transport in electronic systems, call for more efforts to understand the conductance property of Floquet topological edge states and their relevant experimental signatures. In this work, we apply the Keldysh nonequilibrium Green's function (NEGF) approach and the recursive Floquet-Green's function method to explore a number of aspects of Floquet edge state transport in a two-lead setup. As an example, we focus on a quantum well heterostructure, which is described by the Hofstadter lattice model subject to a harmonic driving and coupled to two metallic leads. The effective magnetic flux in the Hofstadter model breaks time reversal symmetry, giving rise to a model system even simpler than the driven quantum spin Hall system studied in Refs.~\cite{Farrell2015,Farrell2016}. By calculating the DC conductance, DC profile and time-averaged local density of states (LDOS) in both pristine and disordered samples, we present intriguing transport properties for different types of Floquet edge states. In particular, we indeed find robust and tunable edge current as we change the system parameters and the characteristics of the driving field. In certain parameter regimes, quantized DC conductance as large as $8e^2/h$ is found after applying the Floquet sum rule. We also discuss possible experimental observations of such theoretical observations. Furthermore, by introducing disorder and defects to the driven quantum well heterostructure, the robustness of three types of Floquet edge states are compared. It is found that co-propagating Floquet chiral edge states are more robust than counter-propagating and symmetry-restricted Floquet edge states. Finally, we study how the transport property of Floquet edge modes is modified if the leads have a finite bandwidth. All these detailed results constitute a necessary guide towards the potential use of Floquet topological matter in designing novel transport devices. This paper is organized as follows. In Sec.~\ref{sec:theory} we outline the theoretical framework and introduce the transport quantities studied in this work. Readers not interested in technical details may skip this section. In Sec.~\ref{sec:model}, we introduce the harmonically-driven Hofstadter model in a two-terminal setup. In Sec.~\ref{subsec:large}, we analyze the two-terminal transport via Floquet edge states in pristine samples. In Sec.~\ref{subsec:robust}, we study the response of Floquet edge states to disorder and defect. We then investigate the implications of finite-bandwidth leads on the quantization of DC conductance in Sec.~\ref{subsec:finiteBW}. This paper ends with conclusion and outlook in Sec.~\ref{sec:conclusion}. \section{\label{sec:theory}Theory} In this section, we first outline the Keldysh framework for quantum transport. {Next, we introduce the Floquet representation of Green's functions~\cite{AokiRMP2014,GomezLeon_Keldysh}.} This then leads us to three transport quantities: ($1$) DC conductance, ($2$) local DC profile, and ($3$) time-averaged local density of states (T-LDOS), which we use to investigate edge state transport. Lastly, we discuss how to compute the Floquet-Green's functions of interest. Throughout this paper, we use the following notations: $\mathscr{T}$ for the period of the driving field, $\Omega=2\pi/\mathscr{T}$ for the driving frequency, $\epsilon$ for quasienergy and $E$ for energy. Note that although the central system is under periodic driving and hence what matters is its quasienergy, the leads are however not driven and its energy must be specified in a theory of quantum transport. \subsection{\label{subsec:transport}Transport within the Keldysh-NEGF framework} The Hamiltonian of noninteracting electrons in a tight-binding square lattice subject to driving fields can be generally written as {$H(t)=\sum_{i,j}J_{ij}(t)c_i^\dag c_j$, where $c^{\dagger}_i$~($c_i$) is the creation (annihilation) operator on lattice site $i$, $J_{ij}(t)=J^*_{ji}(t)$ is a time-dependent hopping amplitude~($i\neq j$) or onsite potential~($i=j$).} Following Ref.~\cite{Jauho1994}, we consider the driving fields to be switched on in the distant past, but not switched off throughout the duration of our interest. In a two-terminal device, the central system $H(t)$ is connected to a left and a right electronic lead, which are kept in equilibrium with chemical potentials $\mu_L$ and $\mu_R$, respectively. The electronic current from the left lead to the central system is given by $I^L(t)=e\langle\mathrm{d}N_L/\mathrm{d}t\rangle$, where the electron charge is $-e$, and $N_L$ is the particle number operator of the left lead. The explicit time dependence of the current is due to the driving field applied to the center. In the Keldysh-NEGF framework, the contour-ordered Green's function is defined as $G(\tau,\tau')=-\frac{\mathrm{i}}{\hbar}\mathcal{T}\langle c(\tau)c^\dag(\tau')\rangle$, where $\cal{T}$ orders contour time variables $\tau,\tau'$ along the Keldysh contour~\cite{Haug2008,Wang2008,Jishi2014}. Following the Meir-Wingreen prescription, the expression of the current reads~\cite{Jauho1994}: \begin{equation} I^L(t) = e \left[\int_\mathcal{C} \mathrm{Tr}_{\Lambda}\Big[\Sigma_L(\tau,\tilde{\tau})G(\tilde{\tau},\tau')\Big]\mathrm{d}\tilde{\tau} \right]^<_{\tau=\tau'\mapsto t} + \mathrm{c.c.}, \label{current3} \end{equation} where $\Sigma_L(\tau,\tilde{\tau})$ is the self-energy of the left lead. $\int_{\mathcal{C}}\mathrm{d}\tilde{\tau}\cdots$ is an integral over the Keldysh contour~\cite{Wang2008,Wang2014}$.\ \mathrm{Tr}_{\Lambda}[\cdots]$ is a trace over the central lattice system. $[\cdots]^<$ means resolving a contour function into its lesser component, which can be done following the Langreth's rules~\cite{Haug2008}. The notation $\cdots|_{\tau=\tau'\mapsto t}$ means setting the two contour times $\tau,\tau'$ at equal time $t$. \subsection{Green's functions in Floquet representation} {The Green's functions of a periodically-driven system depend on two independent time variables, even in a steady state. In the Wigner representation, a two-point correlation function $g(t,t')$ is given by $\bar{g}(T=\frac{t+t'}{2},\tau=t-t')=g(t,t')$, where $T$ ($\tau$) is the average (relative) time variable~\cite{Tsuji2008}. The Floquet representation of this correlation function is then obtained by the following transformation~\cite{Tsuji2008}}: \begin{equation} \begin{split} \bm{g}_{mn}(E)=&\frac{1}{\mathscr{T}}\int_0^\mathscr{T} \mathrm{d}T\;\mathrm{e}^{\mathrm{i}(m-n)\Omega t}\\ &\times \int_{\mathbb{R}}\mathrm{d}\tau\;\mathrm{e}^{\mathrm{i}(E+\frac{m+n}{2}\hbar\Omega)\frac{\tau}{\hbar}}\ \bar{g}(T,\tau). \label{eq:FloquetRepresentation} \end{split} \end{equation} The Floquet representation is especially convenient when manipulating convolution integrals, because it turns them into (infinite) matrix product~\cite{Tsuji2008}: $[\int_{\mathbb{R}}\mathrm{d}\tilde{t}\; f(t,\tilde{t})g(\tilde{t},t')]_{mn}(E) = \sum_{k\in\mathbb{Z}}\bm{f}_{mk}(E)\bm{g}_{kn}(E)$. The following convention for Floquet representation of Green's functions will be used. If the spatial components of a Green's function in the Floquet representation need to be specified, we write $\bm{g}_{(i,j;m,n)}(E)$, with the first two indices of the subscript $(i,j;m,n)$ corresponding to lattice site indices $i,j$, and the last two indices $m,n$ corresponding to Floquet indices as in Eq.~(\ref{eq:FloquetRepresentation}). \subsection{Transport quantities} If a periodic steady state is attained, the correlation functions in the Wigner representation are also periodic with respect to the average time $T$, i.e., $\bar{g}(T,\tau)=\bar{g}(T+\mathscr{T},\tau)$. Then { the Floquet decomposition is made possible and} it can be shown that the DC component of the current is given by~\cite{Kohler2005,Cuevas2010}: \begin{equation} \begin{split} I^L_{\mathrm{DC}} = e\int_\mathbb{R}\frac{\mathrm{d}E}{2\pi\hbar}\sum_{k\in\mathbb{Z}}& \Big\{\mathrm{Tr}_{\Lambda}\left[ \bm{G}^r_{k0}\bm{\Gamma}^L_{00}\bm{G}^a_{0k}\bm{\Gamma}^R_{kk} \right] f^L \\ &- \mathrm{Tr}_{\Lambda}\left[ \bm{G}^r_{k0}\bm{\Gamma}^R_{00}\bm{G}^a_{0k}\bm{\Gamma}^L_{kk} \right] f^R \Big\} , \label{eq:KLH} \end{split} \end{equation} where $\bm{G}^{r(a)}_{k0}(E)$ is the Floquet representation of retarded (advanced) Green's functions $G^{r(a)}(t,t')$, defined by: \begin{equation} \begin{split} G^{r}(t,t') &= - \frac{\mathrm{i}}{\hbar} \theta \left( t- t'\right) \langle\{c(t),c^\dag(t')\}\rangle, \\ G^{a}(t,t') &= \frac{\mathrm{i}}{\hbar} \theta \left( t'- t\right) \langle\{c(t),c^\dag(t')\}\rangle, \end{split} \end{equation} and $f^{L(R)}$ is the Fermi function of the left~(right) lead. $\Gamma^{L(R)}=\mathrm{i}\{\Sigma^r_{L(R)}-[\Sigma^r_{L(R)}]^\dagger\}$ is the {level width function} of the left~(right) lead, with $\bm{\Gamma}^{L(R)}_{kk}$ being the corresponding matrix in the Floquet representation. In general, all these functions depend explicitly on energy $E$. \subsubsection{DC Conductance} We now define the \emph{transmission coefficient} at an energy $E$ from the left to right lead as $T_{LR}(E)=\sum_{k\in\mathbb{Z}} \mathrm{Tr}_{\Lambda}\left[\bm{G}^r_{k0}\bm{\Gamma}^L_{00}\bm{G}^a_{0k}\bm{\Gamma}^R_{kk}\right]$ [and analogously for $T_{RL}(E)$ with $L\leftrightarrow R$]. When a bias voltage $V$ is applied between the two reservoirs, the chemical potentials of the leads become $\mu_{L/R}=\mu_0\pm eV/2$. At zero temperature and to first order in $V$, one can linearize the Fermi function as: $f_{L/R}(E)=\theta(\mu_0\pm eV/2 -E)\approx \theta(\mu_0-E)\mp \delta(\mu_0-E) eV/2$. Under this condition, Eq.~\eqref{eq:KLH} simplifies to: \begin{equation} \begin{split} I^L_{\mathrm{DC}} &= e\int_{-\infty}^{\mu_0}\frac{\mathrm{d}E}{2\pi\hbar}\left[T_{LR}(E)-T_{RL}(E)\right] \\ &+ \frac{e^2}{h}\frac{T_{LR}(\mu_0)+T_{RL}(\mu_0)}{2}V\label{eq:ILDC}. \end{split} \end{equation} When there is an inversion symmetry between left and right leads (which is the case in all our numerical calculations), we have $T_{LR}(E)=T_{RL}(E)$~\cite{Foatorres2014}. Under this condition, the DC conductance ${\rm d}I^L_{\mathrm{DC}}/{\rm d}V$ \emph{at a given energy $E$} is simply given by $e^2/h$ times the transmission coefficient $T(E)=T_{LR}(E)=T_{RL}(E)$, which reads \begin{equation} T(E) = \sum_{k\in\mathbb{Z}} \mathrm{Tr}_{\Lambda}\left[\bm{G}^r_{k0}(E)\bm{\Gamma}^L_{00}(E)\bm{G}^a_{0k}(E)\bm{\Gamma}^R_{kk}(E)\right]. \label{eq:Transmission} \end{equation} \subsubsection{\label{subsubsec:DCprofile}Local DC Profile} The Heisenberg equation for the particle number operator $n_i=c_i^{\dagger}c_i$ at lattice site $i$ is given by~\cite{footnote1}: \begin{equation} \begin{split} & \langle\dot{n}_i(t)\rangle = J_{i+\bm{\hat{\mathrm{x}}},i}(t)G^<_{i,i+\bm{\hat{\mathrm{x}}}}(t,t)+J_{i-\bm{\hat{\mathrm{x}}},i}(t)G^<_{i,i-\bm{\hat{\mathrm{x}}}}(t,t) \\ &+J_{i+\bm{\hat{\mathrm{y}}},i}(t)G^<_{i,i+\bm{\hat{\mathrm{y}}}}(t,t)+J_{i-\bm{\hat{\mathrm{y}}},i}(t)G^<_{i,i-\bm{\hat{\mathrm{y}}}}(t,t) + \mathrm{c.c.}, \end{split} \end{equation} which is similar to the case without a driving field~\cite{Cresti2003,Waintal2008,Lewenkopf2013}, apart from the explicit time dependences of the hopping terms. We may then define the local current from site $i+\bm{\hat{\mathrm{x}}}$ to site $i$ as: $I_{i\leftarrow i+\bm{\hat{\mathrm{x}}}}(t) = J_{i+\bm{\hat{\mathrm{x}}},i}(t)G^<_{i,i+\bm{\hat{\mathrm{x}}}}(t,t) + \mathrm{c.c.}=-I_{i+\bm{\hat{\mathrm{x}}}\leftarrow i}$, {and analogously for all other neighbors of $i$. From this one defines the time-averaged local current vector: \begin{equation} \begin{split} \vec{I}_i &= \frac{1}{\mathscr{T}}\int_0^\mathscr{T} \mathrm{d}t\Big\{ \bm{\hat{\mathrm{x}}}[I_{i\leftarrow i-\bm{\hat{\mathrm{x}}}}(t)+I_{i+\bm{\hat{\mathrm{x}}} \leftarrow i}(t)]\\ &+\bm{\hat{\mathrm{y}}} [I_{i\leftarrow i-\bm{\hat{\mathrm{y}}}}(t)+I_{i+\bm{\hat{\mathrm{y}}} \leftarrow i}(t)]\Big\}, \end{split} \end{equation} which represents both the magnitude and direction of the local current at site $i$}. Numerically, the time-averaged local current, e.g., $\frac{1}{\mathscr{T}}\int_0^\mathscr{T}\mathrm{d}t\;I_{i\leftarrow i-\bm{\hat{\mathrm{x}}}}(t)$, is given in the Floquet representation by: \begin{equation} \begin{split} \frac{1}{\mathscr{T}}\int_0^\mathscr{T}\mathrm{d}t&\;I_{i\leftarrow i-\bm{\hat{\mathrm{x}}}}(t) \\ &= \sum_{m\in\mathbb{Z}}\int_{\mathbb{R}}\frac{\mathrm{d}E}{2\pi\hbar}\tilde{J}_{i-\bm{\hat{\mathrm{x}}},i}(m)\bm{G}^<_{(i,i-\bm{\hat{\mathrm{x}}};0,m)}(E), \end{split} \end{equation} where $\tilde{J}_{i-\bm{\hat{\mathrm{x}}},i}(m)=\frac{1}{\mathscr{T}}\int_0^\mathscr{T}\mathrm{d}t\,\mathrm{e}^{\mathrm{i} m\Omega t}J_{i-\bm{\hat{\mathrm{x}}},i}(t)$ is the $m$th Fourier component of the $\mathscr{T}$-periodic function $J_{i-\bm{\hat{\mathrm{x}}},i}(t)$. Furthermore, at a particular energy $E$, the \emph{energy-resolved} time-averaged local current is defined as: $I_{i\leftarrow i-\bm{\hat{\mathrm{x}}}}(E)=\sum_{m\in\mathbb{Z}}\tilde{J}_{i-\bm{\hat{\mathrm{x}}},i}(m)\bm{G}^<_{(i,i-\bm{\hat{\mathrm{x}}};0,m)}(E)$. Correspondingly, the energy-resolved local DC component of current vector at site $i$ reads: \begin{widetext} \begin{equation} \begin{split} \vec{I}_i(E) = \sum_{m\in\mathbb{Z}} &\bm{\hat{\mathrm{x}}}\big[ \tilde{J}_{i-\bm{\hat{\mathrm{x}}},i}(m)\bm{G}^<_{(i,i-\bm{\hat{\mathrm{x}}};0,m)}(E)+ \tilde{J}_{i,i+\bm{\hat{\mathrm{x}}}}(m)\bm{G}^<_{(i+\bm{\hat{\mathrm{x}}},i;0,m)}(E) \big]\\ + &\bm{\hat{\mathrm{y}}}\big[\tilde{J}_{i-\bm{\hat{\mathrm{y}}},i}(m)\bm{G}^<_{(i,i-\bm{\hat{\mathrm{y}}};0,m)}(E) + \tilde{J}_{i,i+\bm{\hat{\mathrm{y}}}}(m)\bm{G}^<_{(i+\bm{\hat{\mathrm{y}}},i;0,m)}(E) \big] +\mathrm{c.c.} \end{split}\label{eq:localcurrent} \end{equation} \end{widetext} The DC profile is constructed by plotting this quantity at every site $i$ of the central system. \subsubsection{Time-averaged LDOS} The time-averaged LDOS discribes the spatial distribution of states, thus allowing us to recognize whether there are edge states at a certain energy $E$. For static systems, the LDOS is defined by $\mathrm{LDOS}_i(E)=-\frac{1}{\pi}\mathrm{Im}G^r_{ii}(E)$. To extend this notion to Floquet systems, we need to decompose the dynamics into two parts, corresponding to the average time $T$ and relative time $\tau$ in the Wigner representation of Green's functions~\cite{Mikami2016}. When a periodic steady state is achieved, it is natural to average the Green's function over a driving period, yielding the generalized expression of time-averaged LDOS: $\textrm{T-LDOS}_i(E) = -\frac{1}{\pi} \mathrm{Im}\frac{1}{\mathscr{T}}\int_0^{\mathscr{T}}\mathrm{d}T\;\bar{G}^r_{ii}(T,E)$. In the Floquet representation, it has the following expression: \begin{equation} \textrm{T-LDOS}_i(E)=-\frac{1}{\pi}\mathrm{Im}\bm{G}^r_{(i,i;0,0)}(E), \label{eq:TLDOS} \end{equation} which is used in our computational study. \subsection{\label{subsec:RFGF}Computational approach to Floquet-Green's function} Thus far, we have expressed physical quantities in terms of Green's functions and self-energies. We also have the following relations to help simplify algebraic manipulations: (i) causality, i.e., $[\bm{G}^r_{(i,j;m,n)}]^\dag(E)=\bm{G}^a_{j,i;n,m}(E)$, and (ii) fluctuation-dissipation relations for leads, i.e., $\bm{\Sigma}^<_{L/R}=-[\bm{\Sigma}^r_{L/R}-(\bm{\Sigma}^r_{L/R})^\dag]f^{L/R}$ \cite{Haug2008,Wang2008}. As shown in Eqs.~\eqref{eq:Transmission},~\eqref{eq:localcurrent} and~\eqref{eq:TLDOS}, for the calculations of physical quantities, it all boils down to two Green's functions: the retarded and lesser. Hence, we give here their governing equations, which can be calculated with the center Hamiltonian and lead self-energies as input. The retarded Green's function satisfies the Dyson equation, which in the Floquet representation is given by~\cite{Kitagawa2011}: \begin{equation} \begin{split} \sum_{k\in\mathbb{Z}}\Big[&(E+m\hbar\Omega)\delta_{mk} -H_{m-k} \\ &-(\bm{\Sigma}^r_L+\bm{\Sigma}^r_R)_{mk} \Big] \bm{G}^r_{kn}(E) = \delta_{mn}. \label{eq:FloquetDyson} \end{split} \end{equation} The solution of this equation is found by truncating over Fourier components, followed by a matrix inversion. In practice, if we need to deal with large system sizes and large number of harmonics, direct inversion is not feasible, since its complexity scales like $(N_x N_y n_{\mathrm{F}})^3$, where $N_x$~($N_y$) is the number of lattice sites along $x$~($y$) direction, and $n_{\mathrm{F}}$ is the truncated number of harmonics in frequency space. To surmount this difficulty, we adapt the recursive Green's function method~\cite{Lewenkopf2013,Ryndyk2015} to Floquet systems (see App.~\ref{app:RFGF}). The lesser Green's function is related to the retarded Green's function through the Keldysh equation~\cite{Haug2008,Wang2008,Jishi2014}. In the Floquet representation, it reads: \begin{equation} {\bm G}^<_{mn}(E) = \sum_{p,q\in\mathbb{Z}}{\bm G}^r_{mp}(E)({\bm \Sigma}^<_L+{\bm \Sigma}^<_R)_{pq}(E){\bm G}^a_{qn}(E). \end{equation} \section{\label{sec:model}Model} \begin{figure}[H] \centering \def0.9\columnwidth{0.5\columnwidth} \begingroup% \makeatletter% \providecommand\color[2][]{% \errmessage{(Inkscape) Color is used for the text in Inkscape, but the package 'color.sty' is not loaded}% \renewcommand\color[2][]{}% }% \providecommand\transparent[1]{% \errmessage{(Inkscape) Transparency is used (non-zero) for the text in Inkscape, but the package 'transparent.sty' is not loaded}% \renewcommand\transparent[1]{}% }% \providecommand\rotatebox[2]{#2}% \ifx0.9\columnwidth\undefined% \setlength{\unitlength}{441.83893568bp}% \ifx\svgscale\undefined% \relax% \else% \setlength{\unitlength}{\unitlength * \real{\svgscale}}% \fi% \else% \setlength{\unitlength}{0.9\columnwidth}% \fi% \global\let0.9\columnwidth\undefined% \global\let\svgscale\undefined% \makeatother% \begin{picture}(1,0.55456154)% \put(0,0){\includegraphics[width=\unitlength,page=1]{schematicSystemEvenSmallerWithAxes.pdf}}% \put(0.41028281,0.43828048){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\begin{minipage}{0.21550681\unitlength}\raggedright $\vec{B}$\end{minipage}}}% \put(0.1600211,0.22580974){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\begin{minipage}{0.21550679\unitlength}\raggedright $\mu_L$\end{minipage}}}% \put(0.663394,0.22580924){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\begin{minipage}{0.21550679\unitlength}\raggedright $\mu_R$\end{minipage}}}% \put(0.66386565,0.4316183){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\begin{minipage}{0.41634649\unitlength}\raggedright $J_y\cos(\Omega t)$\end{minipage}}}% \put(0,0){\includegraphics[width=\unitlength,page=2]{schematicSystemEvenSmallerWithAxes.pdf}}% \put(0.80897614,0.04141596){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\begin{minipage}{0.10319834\unitlength}\raggedright $x$\end{minipage}}}% \put(0.76104657,0.13143502){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\begin{minipage}{0.10319833\unitlength}\raggedright $y$\end{minipage}}}% \end{picture}% \endgroup% \caption{(color online) Schematic of the system studied in this work. The left~(right) lead has chemical potential $\mu_L$~$(\mu_R)$. The central system is a square tight-binding lattice subject to a perpendicular magnetic field $\vec{B}$ and a harmonic driving field with driving amplitude $J_{y}\cos({\Omega}t)$.} \label{Fig:model} \end{figure} We consider a two-terminal device as illustrated in Fig.~\ref{Fig:model}. The central system is a quantum well heterostructure described by the harmonically driven Hofstadter model (HDHM). This model has been shown to host many interesting Floquet topological phases, e.g. with nearly flat bands, very large Chern numbers, and counter-propagating edge states~\cite{Zhou2014,Zhao2014}. In this work, we put this model in a two-terminal transport setup: the central system is coupled to two metallic leads, which are kept separately in thermal equilibrium with chemical potentials $\mu_{L}$ and $\mu_{R}$. The total Hamiltonian $\mathcal{H}(t)$ describing the central system, leads and their couplings is given by: \begin{equation} \mathcal{H}(t) = H_L + V_{L} + H(t) + V_{R} + H_R, \end{equation} where \begin{equation} \begin{split} H(t) = \sum_{i}& \{J_x c^\dag_{i}c_{i+\bm{\hat{\mathrm{x}}}} \\ &+ J_y\left[s+\cos(\Omega t)\right]\mathrm{e}^{\mathrm{i} 2\pi\alpha x_i}c^\dagger_{i} c_{i+\bm{\hat{\mathrm{y}}}}+\mathrm{h.c.} \} \label{Hamiltonian} \end{split} \end{equation} is the Hamiltonian of HDHM~\cite{Zhou2014,Zhao2014} at the center, with a magnetic flux $\alpha=p/q\in\mathbb{Q}$ per unit area. $q\in\mathbb{N}$ is the number of sublattices in each magnetic unit cell, and $\Omega$ is the frequency of the driving field. We abbreviate the lattice coordinates as $i\equiv (x_i,y_i)$. The leads are modeled as two semi-infinite (along $x$) square lattices, with nearest-neighbor hopping amplitudes $t_{x/y}$ along $x/y$ directions and a uniform onsite potential $v$: \begin{equation} H_{L/R} = \sum_i \left[\left( t_x a^\dag_i a_{i+\bm{\hat{\mathrm{x}}}} + t_y a^\dag_i a_{i+\bm{\hat{\mathrm{y}}}} +\mathrm{h.c.} \right)+va^\dag_i a_i\right]. \label{eq:lead} \end{equation} In our transport calculations, we take the tunneling amplitude between the leads and central system along $x$-direction to be the same as $t_x$. Under this choice, the Hamiltonian describing the coupling between the left (right) lead and the central system is give by: \begin{equation} V_{L(R)} = t_x\sum_{\ell,i:\left[x_\ell=-1(+1),x_i=0\right]} \left(a_\ell^\dag c_i + \mathrm{h.c.}\right). \end{equation} Along $y$-direction, we take open boundary condition for the central system in all our transport calculations below. \subsection{\label{subsec:Hofstadter}Floquet spectrum} Taking periodic boundary conditions along $x/y$-direction and open boundary condition for the other direction, we can Fourier transform the coordinate $x/y$ in Eq.~(\ref{Hamiltonian}) into a quasimomentum $k_x/k_y$. The resulting Hamiltonian is given by either of the following: \begin{equation} \begin{split} H_{k_y}&(t) = \sum_{x=0}^{N_x-1}\{J_x\big(c^\dag_{x,k_y}c_{x+1,k_y}+\mathrm{h.c.} \big)\\ & +2J_y\left[s+\cos(\Omega t)\right]\cos(2\pi\alpha x+k_y)c^\dag_{x,k_y}c_{x,k_y} \}, \\ H_{k_x}&(t) = \sum_{y=0}^{N_y-1}\bigg\{ J_x\Big(c^\dag_{q-1,y}c_{0,y}\mathrm{e}^{\mathrm{i} k_x q}+ \sum_{j=0}^{q-2}c^\dag_{j,y}c_{j+1,y} \Big) \\&+ J_y\left[s+\cos(\Omega t)\right]\sum_{j=0}^{q-1}\left(c^\dag_{j,y}c_{j,y+1}\mathrm{e}^{\mathrm{i} 2\pi\alpha j}+\mathrm{h.c.}\right) \bigg\}. \end{split} \end{equation} These are just $1$D descendants of the HDHM, also called the driven Harper model~\cite{Kolovsky2012,Zhou2014}. One can then obtain the Floquet spectrum with respect to $k_x$ or $k_y$ by solving the Floquet-Schr\"{o}dinger equation~\cite{Shirley1965,Sambe1973} using $H_{k_x}(t)$ or $H_{k_y}(t)$. The nontrivial topology of a Floquet band is then signaled by the presence of gapless edge states. Furthermore, {as the quasienergy is defined modulo the driving frequency, it is possible for gapless edge modes to wind around the Floquet-Brillouin zone, a scenario absent in} static systems~\cite{Rudner2013,Zhou2014,Zhao2014,Derek2014,GomezLeon_counter}. Note also that, one may intuitively prefer to inspect the edge states with open boundary condition along $y$, so as to plot the dispersion relation of the edge states as a function of $k_x$ to understand the transport along the $x$ direction. However, in terms of understanding the bulk-edge correspondence and locating the edge states in connection with the Floquet spectrum gap (exceptions to be discussed below), choosing $H_{k_y}(t)$ or $H_{k_x}(t)$ for the Floquet spectrum to digest the transport results is just a matter of taste. \section{\label{sec:results}Computational Results} Using the theoretical and computational methods discussed in Sec.~\ref{sec:theory}, we now investigate the transport of Floquet edge states in the two-terminal device introduced in Sec.~\ref{sec:model}. We first look into the DC conductance of our model system in the pristine limit, where we observe a conductance quantization by the Floquet sum rule~\cite{Kundu2013,Farrell2015}. Next, we introduce defects and disorder into our system, and present a detailed comparison of the robustness among three different types of gapless Floquet edge states. Finally, we consider a practical situation in which the leads have a finite bandwidth, and discuss its impact on Floquet edge state transport. In all our calculations presented, we take $J_x=1$ as the unit of energy. \subsection{\label{subsec:large} Edge-state transport under harmonic driving} Following the discussions of Sec.~\ref{sec:theory}, the DC conductance at low bias in zero temperature is given by Eq.~(\ref{eq:Transmission}) in units of $e^2/h$. Using the HDHM (Eq.~\eqref{Hamiltonian}) as our Hamiltonian, we now present results of DC conductance for different sets of system parameters (Fig.~\ref{fig:TransmissinClean}). The curves (except black triangles) in the left panels of Fig.~\ref{fig:TransmissinCleana} represent $T(E+n\hbar\Omega)$, i.e. the DC conductance in units of $e^2/h$ \emph{at energy} $E+n\hbar\Omega$, with different values of $n$. In other words, $T(E+n\hbar\Omega)$ is the contribution of the $n$th Floquet sideband to the DC conductance \emph{at a given quasienergy} $\mu=E\in[-\hbar\Omega/2,\hbar\Omega/2]$. We take the wide-band approximation (WBA) for the self-energy of the leads, which is valid when the lead has a much larger bandwidth compared to that of the central system~\cite{Haug2008,Jauho1994,Lewenkopf2017,Velicky2010,Stefanucci2004}. Under this approximation, the self energies due to the leads are independent of energy $E$. More explicitly, these self-energy functions satisfy $\Sigma^L_{ij}\propto -\mathrm{i} \delta_{x_i,0}\delta_{i,j} \Gamma^L/2$ and $\Sigma^{R}_{ij}\propto -\mathrm{i} \delta_{x_i,N_x-1}\delta_{i,j} \Gamma^R/2$, where $\Gamma^{L/R}>0$ are constants taken to be the same as $J_x$. In Sec.~\ref{subsec:finiteBW}, we shall discuss the consequences if this assumption is lifted. Also, in all of our calculations, we have made sure that the number of Floquet sidebands $n_{\mathrm{F}}$ is large enough. Specifically, $n_{\mathrm{F}}=13$ is a truncation dimension that guarantees convergence in all our computational examples. \begin{figure} \captionsetup[subfloat]{captionskip=-4pt} \centering \subfloat[\label{fig:TransmissinCleana}]{ \includegraphics[width=0.45\columnwidth]{4edgeTransmWithInset.pdf} } \subfloat[\label{fig:TransmissinCleanb}]{ \includegraphics[width=0.45\columnwidth]{4edgeBandstrucSmall.pdf} } \\[-1ex] \centering \subfloat[\label{fig:TransmissinCleanc}]{ \includegraphics[width=0.45\columnwidth]{5edgeTransmWithInset.pdf} } \subfloat[\label{fig:TransmissinCleand}]{ \includegraphics[width=0.45\columnwidth]{5edgeBandstrucSmall.pdf} } \\[-1ex] \centering \subfloat[\label{fig:TransmissinCleane}]{ \includegraphics[width=0.45\columnwidth]{8edgeTransmWithInset2.pdf} } \subfloat[\label{fig:TransmissinCleanf}]{ \includegraphics[width=0.45\columnwidth]{8edgeBandstrucSmall.pdf} } \\[-1ex] \subfloat{ \includegraphics[width=0.9\columnwidth]{legend.pdf} } \caption{(color online) Two-terminal DC conductance of the HDHM at zero temperature. Left panels: transmission $T(E+n\hbar\Omega)$ vs. energy $E$ of an incoming electron at different Floquet indices $n$. Results are shown for $E$ in the upper half of the quasienergy Brillouin zone. Curves with black triangles are obtained after applying the Floquet sum rule, with insets zoomed in to the plateaux of interest. Right panels: Floquet spectrum of the same model with PBC (OBC) along $y$($x$)-direction. Red $``|"$s and green crosses denote states localized at left and right edges of the sample. System parameters are $J_y=1.6,\alpha=1/5,\Omega=\pi,s=1,N_x=N_y=100$ for panels (a) and (b), $J_y=1.3,\alpha=2/7,\Omega=\pi,s=1,N_x=N_y=80$ for panels (c) and (d), and $J_y=1.3,\alpha=1/5,\Omega=\pi/2,s=0,N_x=N_y=100$ for panels (e) and (f).} \label{fig:TransmissinClean} \end{figure} For the parameters used to compute Fig.~\ref{fig:TransmissinCleana}, the system admits five Floquet bulk bands, as shown in Fig.~\ref{fig:TransmissinCleanb}. In the first gap above the middle band, there are four Floquet edge states, with a net gap chirality of $2$. Within this quasienergy gap, the transmissions of each Floquet sideband (curves other than black triangles) form well-defined plateaux. The fact that these plateaux are not quantized can be understood as follows \cite{Farrell2015,Farrell2016}. Each Floquet sideband $n$, corresponding to an incoming state at \emph{energy} $E+n\hbar\Omega$, has a non-unity overlap with the Floquet edge state at \emph{quasienergy} $\epsilon=E$ hosted by the central system, leading to a transmission smaller than the expected number of edge states. This understanding \cite{Farrell2015,Farrell2016} provides an intuitive motivation to the so-called Floquet sum rule~\cite{Kundu2013}, a transport feature unique to Floquet topological phases that is not yet well recognized. More concretely, the Floquet sum rule dictates that, if one observes gapless edge modes in the Floquet spectrum, then quantized transmission \emph{at a quasienergy} $\epsilon_0=E_0\in[-\hbar\Omega/2,\hbar\Omega/2]$ can be recovered by summing over the transmissions \emph{at energies} $E+n\hbar\Omega$ due to different Floquet sidebands: \begin{equation} T(\epsilon_0) = \sum_{n\in\mathbb{Z}}T(E_0+n\hbar\Omega). \label{eq:sumrule} \end{equation} As shown in Fig.~\ref{fig:TransmissinCleana}, we found $T(\epsilon_0)=4,4,2$ for $\epsilon_0$ in the first, second and third quasienergy band gaps above the middle Floquet band, an observation fully consistent with the Floquet gap features (such as the number of edge states) shown in Fig.~\ref{fig:TransmissinCleanb}. In addition to several studies regarding the Floquet sum rule in Floquet quantum spin Hall insulators~\cite{Farrell2015,Farrell2016} and Floquet Chern insulators~\cite{Fruchart2016}, here we confirm it in Floquet quantum Hall insulators. Furthermore, in the first and third quasienergy gaps above $\epsilon=0$ in Fig.~\ref{fig:TransmissinCleanb}, we observe counter-propagating gapless edge modes at the same edge~\cite{Zhou2014,Zhao2014,Derek2014}, which are unique to Floquet topological phases \cite{footnote2}. The corresponding DC conductance calculations (Fig.~\ref{fig:TransmissinCleana}) confirm that these counter-propagating edge modes also adhere to the Floquet sum rule. We note that experimental observation of the above-confirmed Floquet sum rule is not so straightforward. One needs to prepare different initial states at chemical potentials $E+n\hbar\Omega$ to execute different experimental runs in order to measure the contributions from all Floquet sidebands to the transport at quasienergy $\epsilon=E$. Nevertheless, it would be of great interest to experimentally confirm the results in Figs.~\ref{fig:TransmissinCleanc} and \ref{fig:TransmissinCleane}. There, one sees that at suitable system parameters, the DC conductances of Floquet edge states (after applying the Floquet sum rule) can reach $5e^2/h$ and even $8e^2/h$, which surpass the largest edge state conductance ever realized experimentally in undriven systems. By contrast, for transport situations where the chemical potential is fixed (not allowed to adjust), the Floquet edge state transport is unlikely to be substantially larger than static systems, as indicated by the individual sidebands (curves other than black triangles) in Figs.~\ref{fig:TransmissinCleana},~\ref{fig:TransmissinCleanc} and~\ref{fig:TransmissinCleane}. The robustness of such Floquet edge state transport will be studied in the next subsection. \subsection{\label{subsec:robust}Topological protection of Floquet edge currents} One advantage of topological edge state transport is its robustness against {structural imperfections. While this has been demonstrated by the conductance plateaux in disordered quantum Hall samples~\cite{Klitzing1980}, the robustness of Floquet topological systems is yet to be confirmed experimentally.} {Here we numerically study the response of gapless Floquet edge modes to disorder and defects. Thanks to the richness of the harmonically-driven Hofstadter model, we are able to realize: (i) co-propagating, (ii) counter-propagating, (iii) symmetry-restricted gapless edge states, and probe their robustness with the tools we developed.} \begin{figure}[H] \subfloat[]{ \includegraphics[width=.25\textwidth]{schematic_copropa.pdf} } \subfloat[]{ \includegraphics[width=.25\textwidth]{schematic_counterpropa.pdf} } \subfloat[]{ \includegraphics[width=.5\textwidth]{schematic_symmRestr.pdf} } \caption{ Schematic of three different types of edge states. The open boundary condition is taken along only one direction. Shaded regiones represent bulk bands. Lines represent co-propagating edge bands in panel (a), counter-propagating edge bands in panel (b), and symmetry-restricted gapless edge bands in panel (c). In panel (c), only when the open (periodic) boundary condition is taken along $y$-direction ($x$-direction) does one observe the edge states.} \label{fig:schematicEdge} \end{figure} {Before presenting the numerical results, we briefly describe each type of edge modes. The first kind, co-propagating Floquet edge states, are chiral in the following sense: under a stripe geometry, each edge only hosts states dispersing in a fixed direction. They have a modified bulk-edge correspondence to the nontrivial topology of the bulk bands \cite{Titum2015} as there may exist anomalous winding edge states in Floquet systems. The second type, counter-propagating edge modes, are as the name suggests: under a stripe geometry, each edge hosts states that are moving forward and backward. If the chirality (number of left movers minus number of right movers) is zero, unlike the spin-locked helical edge states in quantum spin Hall effect \cite{Zhang2010}, one generally does not expect protection of these counter-propagating edge modes against disorder. The third kind, dubbed symmetry-restricted edge modes, are gapless but only exist when the stripe is taken in a particular way. They may be co- or counter-propagating, but in our model the ones we found are counter-propagating. A schematic illustrating the Floquet spectra in presence of these edge modes is given in Fig.~\ref{fig:schematicEdge}.} { Since these three types of edge modes are not mutually exclusive (i.e. two of them may simultaneously exist at different quasienergies for the same system parameters), we organize the following discussions by the type of imperfections (disorder or defect). Our computational studies are summarized in Table~\ref{table:stability}.} \subsubsection{Response to on-site disorder} We introduce disorder to the HDHM by assigning to each site a random on-site potential. The resulting Hamiltonian of the disordered central system is given by: \begin{equation} {H}_{\textrm{dis}}(t) = {H}(t) + \sum_i \xi_i c_i^\dag c_i. \end{equation} The term $\sum_i \xi_i c_i^\dag c_i$ changes the potential on each site $i$ by $\xi_i$, where ${\xi_i}$ is a random number uniformly distributed in $[-W,W]$ {, where $W$ is the disorder strength.} Consider first the case in which the Floquet spectrum of the HDHM without disorder is shown in Fig.~\ref{subfig:3edge5bandClean}, where there are three co-propagating chiral edge states in the first gap above the middle Floquet band, and a pair of counter-propagating edge states winding around quasienergies $\epsilon=\pm\hbar\Omega/2$. Such counter-propagating edge states are unique to Floquet systems~\cite{Lababidi2014,Derek2014}. To investigate their robustness to disorder, we calculate the transmission coefficients and T-LDOS at different quasienergies. \begin{figure} \subfloat[\label{subfig:DOSpristine0}]{ \includegraphics[width=0.25\columnwidth]{copropaDOSdisord_Pristine_noCB.pdf} } \subfloat[\label{subfig:DOSdirty0}]{ \includegraphics[width=0.25\columnwidth]{copropa_disord200trial.pdf} } \subfloat[\label{subfig:DOSpristine1}]{ \includegraphics[width=0.25\columnwidth]{counterpropa_Pristine_noCB.pdf} } \subfloat[\label{subfig:DOSdirty1}]{ \includegraphics[width=0.25\columnwidth]{counterpropa_avgd200_noCB.pdf} } \\ \centering \subfloat{ \includegraphics[width=0.35\columnwidth]{copropa_CB.pdf} } \hspace{3cm} \subfloat{ \includegraphics[width=0.35\columnwidth]{counterpropa_CB.pdf} } \caption{(color online) Time-averaged LDOS at quasienergy $\epsilon=0.25$ for panels (a), (b), and $\epsilon=1.3$ for panels (c), (d), after summing over the contributions from Floquet sidebands as in the Floquet sum rule. {Panels (a) and (c)} show results for pristine central systems, {whereas panels (b) and (d)} show results for disordered central systems, each averaged over {$200$} different disorder realizations. The disorder is implemented via onsite random potentials, which penetrates all four edges by a depth of three layers each. The disorder strength is $W=0.7$. The system size is $N_x=N_y=40$. Other system parameters are $J_y=1.5,\alpha=1/5,\Omega=\pi$ and $s=0.7$.} \label{fig:DOSdisord} \end{figure} \begin{figure} \subfloat[\label{subfig:3edge5bandClean}]{ \includegraphics[height=5cm,width=0.5\columnwidth]{3edgeBandstrucSmall.pdf} } \subfloat[\label{subfig:3edge5bandDisord}]{ \includegraphics[height=5cm,width=0.5\columnwidth]{3edge5band_transm100trial.pdf} } \caption{(color online) Left panel: Floquet spectrum of the HDHM with PBC (OBC) along $y$($x$)-direction. Red $``|"$s and green crosses denote states localized at left and right edges of the sample. Right panel: transmission coefficient $T(\epsilon)$ (after applying the Floquet sum rule) at different quasienergies $\epsilon$ in the upper half of the Floquet quasienergy Brillouin zone for both pristine and disordered samples. The disorder strength {$W=1$}. The results for disordered sample are averaged over {$100$} different disorder realizations. Other system parameters are the same as those shown in the caption of Fig.~\ref{fig:DOSdisord}.} \end{figure} \begin{figure} \subfloat[\label{subfig:copropaBandstruc}]{ \includegraphics[height=5cm,width=0.25\columnwidth]{4edgeCopropaBandstruc.pdf} } \subfloat[\label{subfig:copropaBandstruc2}]{ \includegraphics[height=5cm,width=0.25\columnwidth]{shapeRestrictedBandstruc.pdf} } \subfloat[\label{subfig:copropaTransmission}]{ \includegraphics[height=5cm,width=0.5\columnwidth]{4edgeTransm100trial.pdf} } \caption{ (color online) Panel (a): Floquet spectrum of the HDHM with PBC (OBC) along $y$($x$)-direction. Red $``|"$s and green crosses denote states localized at left and right edges of the sample. Panel (b): Floquet spectrum of the HDHM with the same parameters, but with PBC (OBC) along $x$($y$)-direction. Panel (c): transmission $T(\epsilon)$ (after applying the Floquet sum rule) at different quasienergies $\epsilon$ in the upper half of the Floquet quasienergy Brillouin zone for both pristine and disordered samples. The disorder strength $W=1$. The results for disordered sample are averaged over {$100$} different disorder realizations. The other system parameters are $J_y=1.25,\alpha=1/3,\Omega=\pi/2,s=0$ and $N_x=N_y=45$.} \label{fig:copropa} \end{figure} From the T-LDOS for a pristine lattice depicted in Figs.~\ref{subfig:DOSpristine0} and \ref{subfig:DOSpristine1}, we see that the chiral modes at $\epsilon=0.25$ and the counter-propagating modes at $\epsilon=1.3$ are indeed localized at the edges. Upon the introduction of disorder---even at a strength comparable to the size of the spectral gap---the T-LDOS still retain their edge features. At first glance, this seems to suggest that both types of edge states are favorably robust against disorder. However, if we inspect the DC conductance, where, as shown in Fig.~\ref{subfig:3edge5bandDisord} for $\epsilon/(\hbar\Omega) \sim 0.4-0.5$, the conductance plateau due to counter-propagating edge states is appreciably pushed down by disorder from being quantized at $2$. Thus from the perspective of conductance quantization, counter-propagating Floquet edge states are actually not robust. Indeed, the net winding number at quasienergies $\epsilon=\pm\hbar\Omega/2$ is zero. Hence the corresponding edge states are topologically trivial and are generally not expected to resist disorder. This is in contrast to the anomalous Floquet edge modes with non-vanishing winding numbers studied in Ref.~\cite{Titum2016}, which are robust against disorder. From Fig.~\ref{subfig:3edge5bandDisord} one can draw two more observations. First, the plateau due to co-propagating chiral edge states remains intact under disorder, akin to the static quantum Hall insulators. Of topological origin, this robustness is related to the Chern numbers of the Floquet bands which cannot change without closing the spectral gaps. Second, the very high conductance peaks are suppressed when disorder is introduced into the pristine sample. This is evidence that these peaks originate from Floquet bulk states and as such they are not topologically protected. This remarkable response of bulk states to disorder should allow one to draw a line between conductance contributions from bulk and from topological edge states. As a side note, we mention another type of Floquet edge states restricted by the symmetry of the system. One such example is presented in Figs.~\ref{subfig:copropaBandstruc} and~\ref{subfig:copropaBandstruc2} for a 3-band case, where counter-propagating edge modes appear in quasienergy band gaps around $\pm\hbar\Omega/2$, only if the periodic boundary condition is taken along the $x$-direction. This is similar to graphene, where zero-energy edge states appear only in ribbons with zigzag edges~\cite{Fujita1996}. To study the robustness of transport contributed by such kind of edge states, we again calculate the DC conductance in the presence of disorder. As shown in Fig.~\ref{subfig:copropaTransmission}, there are two plateaux corresponding to the same quantized conductance $4e^2/h$. The one closer to the central Floquet band (due to co-propagating Floquet edge modes) is manifestly more robust against disorder than the one further away (due to symmetry-restricted Floquet edge modes). For completeness, we also studied the transport property of topologically trivial gapped Floquet edge states, and found that they are indeed not robust to disorder and defects. More details are presented in App.~\ref{app:gapped}. \subsubsection{Response to sample defects} {A hallmark of quantum Hall insulators is the existence of chiral edge modes, which can move past defects located at sample boundaries and maintain their propagation directions without being scattered backward.} In photonic and phononic analog of Floquet topological insulators, the robustness of edge states against sample defects have been demonstrated in Refs.~\cite{Rechtsman2013,Fleury2016,Bandres2016}. Here we propose the local DC profile (Sec.~\ref{subsubsec:DCprofile}) as a tool to study the response of edge states to defects in Floquet quantum Hall insulators. We introduce a defect to the system by removing all terms coupled to the defect from the system Hamiltonian. For example, the Hamiltonian of the HDHM with a single defect at site $d\equiv(x_d,y_d)$ is given by: \begin{equation} \begin{split} H_{\mathrm{def}}&(t) = H(t) - \big\{J_x c^\dag_d c_{d\pm \bm{\hat{\mathrm{x}}}} \\ & + J_y \left[s+\cos(\Omega t)\right] \mathrm{e}^{\pm\mathrm{i} 2\pi\alpha x_d }c^\dag_d c_{d\pm \bm{\hat{\mathrm{y}}}} + \mathrm{h.c.} \big\}. \end{split} \end{equation} \begin{figure} \subfloat[\label{fig:bandstructcounterpropa}]{ \includegraphics[height=5cm,width=.5\columnwidth]{counterpropaBandstruc.pdf} } \subfloat[\label{fig:transmDefectCounterpropa}]{ \includegraphics[height=5cm,width=.5\columnwidth]{transmDefectCounterpropa.pdf} } \caption{(color online) Panel (a): Floquet spectrum of the HDHM with PBC (OBC) along $y$($x$)-direction. Red $``|"$s and green crosses denote states localized at left and right edges of the sample. Panel (b): transmission coefficient vs. quasienergy with the Floquet sum rule applied. The curve with crosses (circles) corresponds to the perfect (defective) sample shown in left (right) panels of Fig.~\ref{fig:DCprofileCounterpropa}. Other system parameters are chosen as $J_x=1,~J_y=1.6,~\alpha=1/3,~\Omega=\pi,~s=1$.} \label{fig:bandstructtranscounterpropa} \end{figure} \begin{figure} \subfloat[\label{subfig:perfectHarmonic-1}$n=-1$]{ \includegraphics[height=5cm,width=0.5\columnwidth]{currentProfile_noCB_n-1.pdf} } \subfloat[\label{subfig:defectHarmonic-1}$n=-1$]{ \includegraphics[height=5cm,width=0.5\columnwidth]{correctProfile_noCB_defect_n-1.pdf} } \\ \subfloat[\label{subfig:perfectHarmonic0}$n=0$]{ \includegraphics[height=5cm,width=0.5\columnwidth]{currentProfile_noCB_n0.pdf} } \subfloat[\label{subfig:defectHarmonic0}$n=0$]{ \includegraphics[height=5cm,width=0.5\columnwidth]{correctProfile_noCB_defect_n0.pdf} } \\ \subfloat[\label{subfig:perfectSumRule}Floquet sum rule applied]{ \includegraphics[height=5cm,width=0.5\columnwidth]{currentProfile_noCB_sumrule.pdf} } \subfloat[\label{subfig:defectSumRule}Floquet sum rule applied]{ \includegraphics[height=5cm,width=0.5\columnwidth]{correctProfile_noCB_defect_sumrule.pdf} } \\ \centering \subfloat{ \includegraphics[width=0.35\columnwidth]{Colorbar.pdf} } \caption{Local DC profile for perfect (left panels) and defective (right panels) samples. Arrows point along the direction of local currents, whose magnitude is indicated by the color intensity as given in the colorbar (in units of $J_x/\hbar$). The system parameters are $E=1.5,\mu_L=1.51,\mu_R=1.49,N_x=41,N_y=30,J_y=1.6,\alpha=1/3,\Omega=\pi$ and $s=1$.} \label{fig:DCprofileCounterpropa} \end{figure} The local DC profile is then determined as follows: at each site of the lattice, evaluate Eq.~(\ref{eq:localcurrent}) and then represent the result as an arrow. Following the rationale behind the Floquet sum rule, this will be done for not just a single energy and chemical potential at $(E,\mu_L,\mu_R)$, but also for those that are at integer multiples of the driving frequency away, i.e., with chemical potentials at $(E+n\hbar\Omega,\mu_L+n\hbar\Omega,\mu_R+n\hbar\Omega)$. We present the DC profile at energy $E=1.5+n\hbar\Omega$ in Fig.~\ref{fig:DCprofileCounterpropa}, with the same system parameters as in Fig.~\ref{fig:bandstructtranscounterpropa}. The chemical potentials of the left and right leads are set at $\mu_L=1.51+n\hbar\Omega$ and $\mu_R=1.49+n\hbar\Omega$, both within the Floquet band gap. We introduce small blocks of defects to our sample as shown in Fig.~\ref{fig:DCprofileCounterpropa}. In Figs.~\ref{subfig:perfectHarmonic-1} and \ref{subfig:perfectHarmonic0}, we see that the local currents due to harmonics $n=-1$ and $n=0$ flow mainly along the top and bottom boundaries of the sample, respectively. Contributions from other Floquet sidebands are negligible and therefore not shown. After applying the Floquet sum rule, we obtain the DC profile as shown in Fig.~\ref{subfig:perfectSumRule}, which shows two edge channels propagating from the left to the right leads along the sample boundaries. We then turn to defective samples. In Fig.~\ref{subfig:defectHarmonic-1}, the local current associated with harmonic $n=-1$ bypasses the defects and maintains its propagation direction along the upper edge. Similarly, along the lower edge, the local current due to harmonic $n=0$ is immune to backscattering (Fig.~\ref{subfig:defectHarmonic0}). Remarkably, along the upper boundary, the harmonic $n=0$ contributes a non-vanishing current that flows against the bias. This backward-moving channel clearly indicates the sensitivity of counter-propagating edge modes to sample defects. Fig.~\ref{subfig:defectSumRule} presents the overall DC profile after summing over contributions from all Floquet sidebands at quasienergy $\epsilon=1.5$. Here a weaker edge current signal compared to that of Fig.~\ref{subfig:perfectSumRule} is observed, suggesting a deviation from conductance quantization due to defects. This is confirmed by the string of circles hanging off the plateau of crosses in the right end of the transmission characteristics shown in Fig.~\ref{fig:transmDefectCounterpropa}. For completeness, we also checked the case with co-propagating Floquet chiral edge modes, and find that they are robust against defects (Fig.~\ref{subfig:transmGappedCopropa} and~\ref{subfig:copropaDefectpattern} in App.~\ref{app:gapped}). In summary, we have confirmed that counter-propagating Floquet edge states are not robust against defects, as expected from a vanishing winding number across the Floquet-Brillouin zone. Also, as a computational tool, the local DC profile carries more information than the DC conductance and T-LDOS, in that it is able to distinguish the chirality of different harmonics, which all correspond to the same quasienergy. \begin{table} \centering \begin{tabular}{c|c|c|c|c|c|c|} \cline{2-7} & \multicolumn{2}{c|}{DC conductance} & \multicolumn{2}{c|}{Time-averaged LDOS} & \multicolumn{2}{c|}{Local DC profile} \\ \cline{2-7} & Plateau & Stable & Edge pattern & Persists under disorder & Flows on edge & Bypasses defect \\ \hline \multicolumn{1}{|c|}{Gapped} & $\times$ & $\times$ & \checkmark & $\times$ & \checkmark & $\times$ \\ \hline \multicolumn{1}{|c|}{Symmetry-restricted gapless} & \checkmark & $\times$ & \checkmark & $\times$ & \checkmark & $\times$ \\ \hline \multicolumn{1}{|c|}{Counter-propagating gapless} & \checkmark & $\times$ & \checkmark & \checkmark & \checkmark & \checkmark \\ \hline \multicolumn{1}{|c|}{Co-propagating gapless} & \checkmark & \checkmark & \checkmark & \checkmark & \checkmark & \checkmark \\ \hline \end{tabular} \caption{Four types of edge states and their response towards disorder and defect. The check mark (cross mark) means robust (not robust) to the corresponding perturbation.} \label{table:stability} \end{table} In Table \ref{table:stability}, we summarize the robustness of Floquet edge states studied in this subsection. For completeness, the robustness of topologically trivial gapped edge states is also listed here, with more details spelled out in App.~\ref{app:gapped}. The co-propagating chiral edge states in Floquet quantum Hall insulators are the most robust against local perturbations, and therefore potentially most useful in realizing high-precision electronic transport devices. \subsection{\label{subsec:finiteBW}Beyond the wide-band approximation} Up to now, our calculations were done under the WBA~\cite{Haug2008,Jauho1994,Lewenkopf2017,Velicky2010,Stefanucci2004}, {where the leads are assumed to be able to accommodate, uniformly, all energy states of the central system}. However, in Floquet topological systems, the transport \emph{at a quasienergy} requires contributions from energies spanning several Floquet-Brillouin zones. Thus, it is all the more appealing to model the leads as having only finite bandwidths. \begin{figure} \subfloat[\label{subfig:bandstrucFiniteBW}]{ \includegraphics[height=5cm,width=0.5\columnwidth]{simplePhaseforFiniteBWbandstruc.pdf} } \subfloat[\label{subfig:transmFiniteBW}]{ \includegraphics[height=5cm,width=0.5\columnwidth]{transmFiniteBW.pdf} } \caption{(color online) Panel (a): Floquet spectrum of the HDHM with PBC (OBC) along $y$($x$)-direction. Panel (b): DC component of the transmission coefficient $T(\epsilon)$ at different quasienergies (with the Floquet sum rule applied) for leads with three types of bandwidth. The broad (narrow) bandwidth corresponds to $t_x=t_y=3$ ($t_x=t_y=0.5)$. The crosses mark the points at which we analyze the contribution of each side-peak to $T(\epsilon)$ in Figs.~\ref{fig:largeBW} and \ref{fig:narrowBW}. The systems parameters are taken as $J_y=1.6,\alpha=1/3,\Omega=\pi,s=0$ and $N_x=N_y=30$.} \label{fig:WidebandBoardNarrow} \end{figure} For this purpose, it suffices to focus on a parameter regime as given in Fig.~\ref{subfig:bandstrucFiniteBW}. We model the leads as square lattices with nearest-neighbor hoppings described by Eq.~\eqref{eq:lead} and compute the DC transmission. For broadband leads (dash-dotted line in Fig.~\ref{subfig:transmFiniteBW}), upon applying the Floquet sum rule, the conductance quantization remains intact for quasienergies that are close to the center of the gap. On the contrary, for the case of a narrow-band leads (dotted line in Fig.~\ref{subfig:transmFiniteBW}), one no longer observes conductance quantization. These two results should be compared with the ideal case under the WBA, which corresponds to the use of leads with infinitely-broad band (dashed line in Fig.~\ref{subfig:transmFiniteBW}). \begin{figure}[H] \subfloat[\label{subfig:largeBW}]{ \def0.9\columnwidth{0.75\columnwidth} \begingroup% \makeatletter% \providecommand\color[2][]{% \errmessage{(Inkscape) Color is used for the text in Inkscape, but the package 'color.sty' is not loaded}% \renewcommand\color[2][]{}% }% \providecommand\transparent[1]{% \errmessage{(Inkscape) Transparency is used (non-zero) for the text in Inkscape, but the package 'transparent.sty' is not loaded}% \renewcommand\transparent[1]{}% }% \providecommand\rotatebox[2]{#2}% \ifx0.9\columnwidth\undefined% \setlength{\unitlength}{458.03759781bp}% \ifx\svgscale\undefined% \relax% \else% \setlength{\unitlength}{\unitlength * \real{\svgscale}}% \fi% \else% \setlength{\unitlength}{0.9\columnwidth}% \fi% \global\let0.9\columnwidth\undefined% \global\let\svgscale\undefined% \makeatother% \begin{picture}(1,0.5108454)% \put(0,0){\includegraphics[width=\unitlength,page=1]{largeBWsmallFile.pdf}}% \put(1.13374113,0.37552678){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\begin{minipage}{0.10978508\unitlength}\raggedright \end{minipage}}}% \put(-0.00315782,0.34183325){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\begin{minipage}{0.31131668\unitlength}\raggedright $E/\hbar$\end{minipage}}}% \put(0,0){\includegraphics[width=\unitlength,page=2]{largeBWsmallFile.pdf}}% \end{picture}% \endgroup% } \subfloat[\label{subfig:barlargeBW}]{ \includegraphics[angle=90,width=0.25\columnwidth]{largeBW_bar_E_zeropoint5.pdf} } \caption{(color online) When attached to leads with a finite, yet broad enough bandwidth $(t_x=t_y=3)$, quantized transmission is observed after applying the Floquet sum rule. In (a), the color indicates the local density of states of the leads, calculated over $0,\pm1$ Floquet zones, with energy as the vertical and $y$-direction as the horizontal axis. The HDHM has a quasienergy spectrum which repeats itself over integer multiples of the driving frequency $\Omega$. The red dashed line at $E_0=0.5$ refers to the energy of the incoming electron. In (b), the side-peak contributions to the quantized DC conductance are shown. Dashed rectangles indicate the case of wideband limit.} \label{fig:largeBW} \end{figure} To understand these observations, let us select a quasienergy in the middle of the gap, $\epsilon=E_0=1.5$ (crossed markers in Fig.~\ref{subfig:transmFiniteBW}). Consider now the three Floquet sidebands that contribute to a quantized conductance in the WBA (dashed rectangles in Figs.~\ref{subfig:barlargeBW} and~\ref{subfig:barnarrowBW}). When the WBA is relaxed, the leads must have non-vanishing density of states in these Floquet zones, in order for the corresponding sidebands to participate in the transport at $\epsilon=1.5$. This is the case for the broadband leads (Fig.~\ref{subfig:largeBW}), whose DOS spreads uniformly throughout the first three $(0,\pm1)$ Floquet zones. Hence, undeterred by a slight redistribution of the sideband weights (colored rectangles in Fig.~\ref{subfig:barlargeBW}), the DC conductance remains quantized as shown by the crossed marker in Fig.~\ref{subfig:transmFiniteBW}. Next, consider the case of narrow-band leads. Since their density of states is non-vanishing only at the $n=0$ Floquet zone (Fig.~\ref{subfig:narrowBW}), no electrons at energies $E_0\pm\hbar\Omega$ can contribute to the transport at quasienergy $\epsilon=E_0$. Indeed, as shown in Fig.~\ref{subfig:barnarrowBW}, there is only one single colored rectangle at the center, which is, worse still, diminished compared to the case of WBA (dashed rectangle). Therefore, even the Floquet sum rule cannot salvage its conductance quantization (green cross in Fig.~\ref{subfig:transmFiniteBW}), because the lead bandwidths are simply too narrow for anything other than $E=E_0$ to contribute to the transport. {The above observation calls attention to the leads when studying the transport of Floquet topological systems. Let us consider the case in which the central system is governed by a certain energy scale $J$, with the bandwidths of the leads characterized by $\Gamma$, such that $\Gamma \gg J$. In static systems, one can then simplify the problem using the WBA. But if the Floquet edge modes of interest are scattered throughout $\mathcal{N}$ dominant sidebands, such that $\mathcal{N}\Omega \gg \Gamma$, then the leads have states only within $\Gamma$, which, by the assumption $\mathcal{N}\Omega \gg \Gamma$, do not span some of the Floquet zones. It would then be inappropriate, in this case, to invoke the WBA right at the beginning.} In brief, unless sufficiently broad, the bandwidth of electronic leads may result in non-quantized DC edge conductances in Floquet Hall insulators. This suggests that any attempt at detecting quantized DC conductance (upon applying the Floquet sum rule) must involve electronic leads with bands wide enough to cover all contributing Floquet sidebands. \begin{figure} \subfloat[\label{subfig:narrowBW}]{ \def0.9\columnwidth{0.75\columnwidth} \begingroup% \makeatletter% \providecommand\color[2][]{% \errmessage{(Inkscape) Color is used for the text in Inkscape, but the package 'color.sty' is not loaded}% \renewcommand\color[2][]{}% }% \providecommand\transparent[1]{% \errmessage{(Inkscape) Transparency is used (non-zero) for the text in Inkscape, but the package 'transparent.sty' is not loaded}% \renewcommand\transparent[1]{}% }% \providecommand\rotatebox[2]{#2}% \ifx0.9\columnwidth\undefined% \setlength{\unitlength}{458.03759781bp}% \ifx\svgscale\undefined% \relax% \else% \setlength{\unitlength}{\unitlength * \real{\svgscale}}% \fi% \else% \setlength{\unitlength}{0.9\columnwidth}% \fi% \global\let0.9\columnwidth\undefined% \global\let\svgscale\undefined% \makeatother% \begin{picture}(1,0.51084558)% \put(0,0){\includegraphics[width=\unitlength,page=1]{narrowBWsmallFile2.pdf}}% \put(1.13374113,0.37552676){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\begin{minipage}{0.10978508\unitlength}\raggedright \end{minipage}}}% \put(-0.00315782,0.34183323){\color[rgb]{0,0,0}\makebox(0,0)[lt]{\begin{minipage}{0.31131668\unitlength}\raggedright $E/\hbar$\end{minipage}}}% \put(0,0){\includegraphics[width=\unitlength,page=2]{narrowBWsmallFile2.pdf}}% \end{picture}% \endgroup% } \subfloat[\label{subfig:barnarrowBW}]{ \includegraphics[angle=90,width=0.25\columnwidth]{narrowBW_bar_E_zeropoint5.pdf} } \caption{(color online) For leads with narrow bandwidth $(t_x=t_y=0.5)$, there is no quantized transmission even after performing the Floquet sum rule. This figure is plotted the same way as Fig.~\ref{fig:largeBW}}. \label{fig:narrowBW} \end{figure} \section{\label{sec:conclusion}Conclusion and outlook} In this work, we have theoretically and computationally studied how Floquet topological phases with many edge state channels may lead to robust transport in a two-terminal setup. Under the Keldysh-NEGF framework and using the recursive Floquet-Green's function method, we have investigated the two-terminal DC conductance, time-averaged LDOS and local DC profile of a harmonically-driven Hofstadter model in several parameter regimes. Thanks to the Floquet sum rule, we are able to observe tunable and quantized Floquet edge state transport, with the largest DC conductance demonstrated in this work being $8e^2/h$. We have also presented a detailed comparison among Floquet chiral, counter-propagating and symmetric-restricted edge states regarding their robustness to disorder and defects. Our results indicate that in terms of transport, Floquet chiral edge modes are the most resistant to sample imperfections. We have also shown that, even after invoking the Floquet sum rule, one cannot guarantee quantization of the DC conductance of Floquet edge modes, if the bandwidth of the lead is not wide enough. Finally, we note that it remains unclear how to exploit the tunability of Floquet topological matter to \emph{directly} realize large, robust, and quantized DC conductance at a given chemical potential (namely, without using the Floquet sum rule). Some results from Ref.~\cite{Cuevas2010} lead us to believe that this could be made possible by driving the leads appropriately, which may be an interesting future direction. \begin{acknowledgments} H.H.~Y. thanks Patrick Haughian for fruitful discussions. This work is supported by the Singapore NRF grant No. NRF-NRFI2017-04 (WBS No. R-144-000-378-281) and by the Singapore Ministry of Education Academic Research Fund Tier I~(WBS No. R-144-000-353-112). \end{acknowledgments}
\section{Introduction} The usual classical energy conditions, (NEC, WEC, SEC, DEC, and their variants), are most typically used within the context of various singularity theorems in general relativity, where they are used to enforce focussing (or defocussing) of null or timelike geodesics~\cite{Hell,Martin-Moruno:2013a,Martin-Moruno:2013b,Martin-Moruno:2015,LNP,Visser:1994,Visser:1997, Balakrishnan:2017,Fu:2017,Fu:2016, Koeller:2015, Bousso:2015}. Similarly the usual Hawking--Ellis (Segr\'e--Pleba\'nski) classification of stress-energy tensors, (type I, type II, type III, type IV), is also most typically used in special and general relativity, wherein this Hawking--Ellis classification effectively controls the extent to which the stress-energy tensor can be diagonalized by local Lorentz transformations~\cite{Hell,Plebanski:1964,LNP}. (It is the Lorentzian signature of spacetime that makes this non-trivial.) Complementing and refining these two classification schemes we shall develop a version of the (generalized) Rainich conditions. The usual Rainich condition amounts to the observation that the (mixed-component) stress-energy tensor of the classical electro-magnetic field $T^a{}_a$ satisfies the purely \emph{algebraic} constraints~\cite{1925,Misner:1957,Witten:1959} \begin{equation} (T^2)^a{}_b = {{\mathrm{tr}}(T^2)\over4} \; \delta^a{}_b; \qquad {\mathrm{tr}}(T)=0. \end{equation} (See appendix \ref{A:B} for a sketch of a proof.) When inserted into the Einstein equations this implies that any \emph{electro-vac} spacetime can be (partially) characterized by simple \emph{purely geometric} statements regarding the (mixed-component) Ricci tensor $R^a{}_b$: \begin{equation} (R^2)^a{}_b = {{\mathrm{tr}}(R^2)\over4} \; \delta^a{}_b; \qquad {\mathrm{tr}}(R)=0. \end{equation} This is the mathematical basis of the so-called ``already unified'' approach to the long sought for unification of classical gravity and classical electromagnetism. We shall seek to generalize this observation as much as possible, somewhat along the lines of references~\cite{Senovilla:2000, Bergqvist:2001,Senovilla:2002,Bergqvist:2004,Plebanski:1994,Torre:2013,Krongos:2015,Santos:2016,Balfagon:2007}. We will be working within classical general relativity, aiming for algebraic constraints on the stress-energy tensor and Ricci tensor that can be related to simple physical statements regarding the material sources. The main technical tools we will use are based on considerations of the generalized eigenvalue problem \begin{equation} (T_{ab}-\lambda \,g_{ab}) V^b =0, \end{equation} which we recast as \begin{equation} (T^a{}_{b}-\lambda\, \delta^a{}_{b}) V^b =0. \end{equation} It is the observation that the mixed-component $T^a{}_{b}$ is \emph{not} symmetric that is the source of all the technical difficulties.\footnote{In Euclidean (4+0) signature everything trivializes and all stress energy tensors are type I~\cite{LNP}. Physically, we are interested in Lorentzian (3+1) $\equiv$ (1+3) signature. We shall deem (2+2) signature physically inappropriate, though we shall sometimes encounter it in the mathematical analysis below.} The main mathematical tools we will use are general properties of matrix analysis, in particular the characteristic polynomial, the minimal polynomial, and the Jordan normal form~\cite{HJ1,HJ2}. While the mixed-component matrix $T^a{}_{b}$ is certainly \emph{not} symmetric, it is also not the most general asymmetric matrix possible. Indeed, in an orthonormal basis, $T^a{}_{b}$ is of the form \begin{equation} T^a{}_b = \left[ \begin{array}{c|c} \rho& f^j \\ \hline - f_i & \pi^{ij} \end{array} \right] \end{equation} with $\pi^{ij}$ being symmetric. (Algebraically this corresponds, in an orthonormal basis, to the mixed tensor $T^a{}_{b}$ satisfying $T^\mathrm{transpose} = \eta\,T\,\eta$.) Because of this algebraic structure (and avoiding interchange of columns and rows) not all Jordan normal forms need necessarily arise, (and the interplay between Jordan normal forms and the timelike/null/spacelike nature of the eigenvectors is nontrivial). This paper can be outlined as follows: Section \ref{sec:main} contains the main body of the paper. In section \ref{sec:f} we present the general mathematical framework on which we base the new stress-energy tensor classification. In section \ref{sec:ps} we discuss this classification in detail, emphasizing the physically interesting cases. We then present some applications of this new classification; these are the formulation of some generalized Rainich conditions, presented in section \ref{sec:Rc}, and the relation between various energy conditions, explicated in section \ref{sec:EC}. In section \ref{sec:d} we discuss our results. Finally, we include some comments about the Hawking--Ellis classification in appendix \ref{A:A}, summarize the classic Rainich algebraic conditions in appendix \ref{A:B}, and consider the classification for $(1+1)$-dimensional scenarios in appendix \ref{A:C}. \section[Stress-energy tensor classification]{Stress-energy tensor classification: \\Characteristic and minimal polynomials}\label{sec:main} We shall classify stress-energy tensors using their \emph{algebraic} properties. \subsection{Framework}\label{sec:f} Let us consider the stress-energy tensor $T^{ab}$ and lower one index: $T^a{}_b$. More formally, if the specific indices are not important, we write $T^\bullet{}_\bullet$. One can now construct the Lorentz-invariant \emph{characteristic polynomial} \begin{equation} c(\lambda) = \det\left( T^\bullet{}_\bullet - \lambda\, \delta^\bullet{}_\bullet \right). \end{equation} This can be written in terms of the (distinct) eigenvalues of $T^a{}_b$ as \begin{equation} c(\lambda) = \prod_i (\lambda-\lambda_i)^{n_i}=\lambda^4+a_{3}\lambda^{3}+...+a_1\lambda+a_0, \end{equation} where $n_i$ is the (algebraic) multiplicity of the eigenvalue $\lambda_i$, with $\sum_i n_i=4$ in any 4-dimensional spacetime. Furthermore, from the Cayley--Hamilton theorem we know \begin{equation} c(T^\bullet{}_\bullet)=0. \end{equation} This implies in particular that (in 4 dimensions) the 4th power of the stress-energy tensor is a always cubic polynomial of lower powers \begin{equation} (T^4)^a{}_b = p_3 (T^a{}_b) = \sum_{j=0}^3 k_i \, (T^i)^a{}_b, \end{equation} where $(T^2)^a{}_b = T^a{}_c\, T^c{}_b$, $(T^3)^a{}_b = T^a{}_c\,T^c{}_d\, T^d{}_b$, and $(T^4)^a{}_b = T^a{}_c\,T^c{}_d\,T^d{}_f\, T^f{}_b$. This is the most general (and weakest) Rainich-like condition one might encounter, but it is more useful if one refines this condition with extra physical information. For instance, the \emph{minimal polynomial} for $ T^a{}_b$ is the lowest-degree polynomial $m(\lambda)$ such that $m( T^\bullet{}_\bullet) = 0$. The degree of the minimal polynomial can, therefore, run from 1 to 4 in (3+1) dimensions. We have \begin{equation} m(\lambda) = \prod_i (\lambda-\lambda_i)^{m_i}, \end{equation} where $m_i$ is the dimension of the largest Jordan block corresponding to eigenvalue $\lambda_i$. Hence we have $1\leq m_i\leq n_i$ and so $ 1\leq \sum_i 1 \leq \sum_i m_i \leq 4$. In view of this, we can consider a classification of stress-energy tensors according to the degree of their minimal polynomial $m(\lambda)$. This, in a (3+1)-dimensional spacetime we can have four different classes of stress-energy tensors, defined by having a minimal polynomial of degree 1, 2, 3 or 4, respectively. Each class will in turn be composed of different sub-classes of stress-energy tensors depending of the spectral decomposition of the matrix $T^\bullet{}_\bullet$. We shall discuss these cases in detail throughout the next sections, whereas we consider the $1+1$-dimensional case in appendix \ref{A:C}. \subsection{Physical scenarios}\label{sec:ps} Let us now explicitly write down the possible classes and sub-classes of stress-energy tensors according to this classification, giving some examples of relevant situations of physical interest that can be described by these stress-energy tensors. \paragraph{Degree 1:} The only possibility is $m(\lambda) = (\lambda-\lambda_*)$ and $c(\lambda)=(\lambda-\lambda_*)^4$. So we have only one eigenvalue, which has to be real. That is: \begin{equation} T^a{}_b \sim \left[\begin{array}{cccc} \lambda_* &0 &0 &0\\ 0 &\lambda_*& 0 &0\\ 0&0& \lambda_* & 0\\0&0&0&\lambda_*\\\end{array}\right]. \end{equation} This is a special case of type I according to the Hawking--Ellis classification, where $\lambda_* = -\rho = p_1 = p_2 = p_3$. Physically this describes \emph{vacuum energy}. \paragraph{Degree 2:} There are two sub-cases: \begin{description} \item[I:] Only one distinct eigenvalue, which has to be real. So, $m(\lambda) = (\lambda-\lambda_*)^2$, and $c(\lambda)=(\lambda-\lambda_*)^4$. Then \begin{equation}\label{12} T^a{}_b \sim \left[\begin{array}{cc|cc} \lambda_* &1 &0 &0\\ 0 &\lambda_*& 0 &0\\ \hline 0&0& \lambda_* & 0\\0&0&0&\lambda_*\\\end{array}\right]. \end{equation} This is type II in the special case that $\lambda_* = -\mu =p_1=p_2=p_3$. \\ (See appendix \ref{A:A} for conventions.)\\ Physically this corresponds to a \emph{null flux parallel to the x-axis superimposed on a EM field parallel to the x-axis}. \item[II:] Two distinct eigenvalues, then $m(\lambda) = (\lambda-\lambda_1)(\lambda-\lambda_2)$. There are two sub-cases: \begin{description} \item[a:] $c(\lambda)=(\lambda-\lambda_1)^2(\lambda-\lambda_2)^2$. Then \begin{equation} T^a{}_b \sim \left[\begin{array}{cc|cc} \lambda_1 &0 &0 &0\\ 0 &\lambda_1& 0 &0\\ \hline 0&0& \lambda_2 & 0\\0&0&0&\lambda_2\\\end{array}\right], \end{equation} where both eigenvalues have to be real.\footnote{If the eigenvalues were to be complex they would have to be a repeated complex conjugate pair, but this is not compatible with (3+1) signature, it would imply (2+2) signature. To see this, rewrite $\lambda_2 = \lambda_1^*$, and rearrange $T^a{}_b$ to read \begin{equation*} T^a{}_b \sim \left[\begin{array}{cc|cc} \lambda_1 &0 &0 &0\\ 0 &\lambda_1^*& 0 &0\\ \hline 0&0& \lambda_1 & 0\\0&0&0&\lambda_1^*\\\end{array}\right]. \end{equation*} Each of these two $2\times2$ blocks corresponds to (1+1) dimensional type IV, see \ref{A:A}, so the $4\times4$ matrix is only compatible with (2+2) signature. } \\ This is special case of type I with $\lambda_1=-\rho=p_1$, and $\lambda_2 = p_2=p_3$. \\ Interesting physical examples are specific \emph{spherical symmetric} scenarios with $\rho=-p_r$~\cite{Jacobson:2007}, and a \emph{non-null EM field} when $\lambda_1=-\lambda_2$. \item[b:] $c(\lambda)=(\lambda-\lambda_1)(\lambda-\lambda_2)^3$. Then \begin{equation} \hspace{-1cm} T^a{}_b \sim \left[\begin{array}{c|ccc} \lambda_1 &0 &0 &0\\ \hline 0 &\lambda_2& 0 &0\\ 0&0& \lambda_2 & 0\\0&0&0&\lambda_2\\\end{array}\right] \quad {\rm or}\quad T^a{}_b \sim \left[\begin{array}{ccc|c} \lambda_1 &0 &0 &0\\ 0 &\lambda_1& 0 &0\\ 0&0& \lambda_1 & 0\\ \hline 0&0&0&\lambda_2\\\end{array}\right], \end{equation} with, of course, real eigenvalues. Note that, as in this case the Jordan form is diagonal, it is not important whether the triple eigenvalue is associated only to spacelike eigenvectors or to spacelike and a timelike eigenvector. The stress-energy tensor on the left is a special case of type I with $\lambda_1=-\rho$, and $\lambda_2 = p_1=p_2=p_3$, describing, for example, a \emph{perfect fluid} (if $\lambda_2=0$ this specializes to \emph{dust}). This can also be used to describe a \emph{scalar field}. The stress-energy tensor on the right is also a special case of type I, now with $\lambda_1=-\rho=p_1=p_2$ and $\lambda_2 = p_3$. When $p_3=3\rho$ this describes the \emph{Casimir vacuum between parallel plates}. \end{description} \end{description} \paragraph{Degree 3:} Here we have three possibilities: \begin{description} \item[I:] Only one distinct eigenvalue, which must be real. \\ We have $m(\lambda) = (\lambda-\lambda_*)^3$ and $c(\lambda)=(\lambda-\lambda_*)^4$. Then \begin{equation}\label{14} T^a{}_b \sim \left[\begin{array}{ccc|c} \lambda_* &1 &0 &0\\ 0 &\lambda_*& 1 &0\\ 0&0& \lambda_* & 0\\ \hline0&0&0&\lambda_*\\\end{array}\right]. \end{equation} This is a special case of type III with $\lambda_*=-\rho=p_3$. (See \ref{A:A}.)\\ This form of stress-energy tensor \emph{does not occur} classically in nature, and does not even seem to occur semi-classically. \item[II:] Two distinct eigenvalues, then $m(\lambda) = (\lambda-\lambda_1)^2(\lambda-\lambda_2)$. There are two sub-cases. \begin{description} \item[a:] $c(\lambda)=(\lambda-\lambda_1)^2(\lambda-\lambda_2)^2$. Then\\ \begin{equation}\label{15} T^a{}_b \sim \left[\begin{array}{cc|cc} \lambda_1 &1 &0 &0\\ 0 &\lambda_1& 0 &0\\ \hline 0&0& \lambda_2 & 0\\0&0&0&\lambda_2\\\end{array}\right]. \end{equation} This is type II in the special case $\lambda_1 = -\mu$, and $\lambda_2 = p_1=p_2$.\\ Physically this corresponds, for example, to a \emph{null flux superimposed on spherical or planar symmetry}. \item[b:] $c(\lambda)=(\lambda-\lambda_1)^3(\lambda-\lambda_2)$. Then\\ \begin{equation}\label{16} T^a{}_b \sim \left[\begin{array}{cc|c|c} \lambda_1 &1 &0 &0\\ 0 &\lambda_1& 0 &0\\ \hline 0&0& \lambda_1 & 0\\ \hline 0&0&0&\lambda_2\\\end{array}\right]. \end{equation} This is type II in the special case $\lambda_1 = -\mu=p_2$ and $\lambda_2 = p_3$.\\ Physically this corresponds, for example, to a \emph{null flux} superimposed on a somewhat specific background (with the quantity of the null flux degenerate with the amount of stress in one of the orthogonal spacelike directions). \end{description} \item[III:] Three distinct eigenvalues, then $m(\lambda) = (\lambda-\lambda_1)(\lambda-\lambda_2)(\lambda-\lambda_3)$. \\ Then $c(\lambda)=(\lambda-\lambda_1)^2(\lambda-\lambda_2)(\lambda-\lambda_3)$. So we have \begin{equation} \hspace{-2cm} T^a{}_b \sim \left[\begin{array}{cc|cc} \lambda_1 &0 &0 &0\\ 0 &\lambda_1& 0 &0\\ \hline 0&0& \lambda_2 & 0\\0&0&0&\lambda_3\\ \end{array}\right]\, {\rm or}\, \left[\begin{array}{c|cc|c} \lambda_2 &0 &0 &0\\ \hline 0 &\lambda_1& 0 &0\\ 0&0& \lambda_1 & 0\\ \hline 0&0&0&\lambda_3\\ \end{array}\right]\,{\rm or}\, \left[\begin{array}{cc|cc} \lambda_2 &0 &0 &0\\ 0 &\lambda_3& 0 &0\\ \hline 0&0& \lambda_1 & 0\\0&0&0&\lambda_1\\ \end{array}\right] \end{equation} Analogous to the situation in case degree 2IIb, it is not important whether the double eigenvalue is associated only to a pair of spacelike eigenvectors, or to a spacelike and a timelike eigenvector. From left to right, this is a specialization of type I, first with $\lambda_1=-\rho=p_1$, $\lambda_2=p_2$, and $\lambda_3=p_3$; second with $\lambda_1=-\rho$, $\lambda_2=p_1=p_2$, and $\lambda_3=p_3$; and finally, with \emph{spherical or planar symmetry}, $\lambda_2=-\rho$, $\lambda_3=p_1$, and $\lambda_1=p_2=p_3$. \end{description} \paragraph{Degree 4:} There are now four possibilities: \begin{description} \item[I:] Only one distinct eigenvalue, then $m(\lambda) = (\lambda-\lambda_*)^4$ and $c(\lambda)=(\lambda-\lambda_*)^4$. We have \begin{equation}\label{18} T^a{}_b \sim \left[\begin{array}{cccc} \lambda_* &1 &0 &0\\ 0 &\lambda_*& 1 &0\\ 0&0& \lambda_* & 1\\ 0&0&0&\lambda_*\\\end{array}\right]. \end{equation} \emph{It cannot exist}, since this (algebraic) case is not compatible with the Hawking--Ellis classification, and this incompatibility is ultimately due to the fact that this case is incompatible with (3+1) Lorentzian signature. Specifically, this particular case has no spacelike eigenvector, in contrast to all types in the Hawking--Ellis classification. \item[II:] Two distinct eigenvalues. There are two sub-cases. \begin{description} \item[a:] $m(\lambda) = (\lambda-\lambda_1)^2(\lambda-\lambda_2)^2$ and $c(\lambda)=(\lambda-\lambda_1)^2(\lambda-\lambda_2)^2$. We have \begin{equation} T^a{}_b \sim \left[\begin{array}{cc|cc} \lambda_1 &1 &0 &0\\ 0 &\lambda_1& 0 &0\\ \hline 0&0& \lambda_2 & 1\\0&0&0&\lambda_2\\\end{array}\right]. \end{equation} \emph{It cannot exist, at least not in (3+1) dimensions}.\footnote{The $4\times4$ matrix above block diagonalizes into two (1+1) dimensional type II stress-energy tensors, so it corresponds to physically inappropriate (2+2) signature.} \item[b:] $m(\lambda) = (\lambda-\lambda_1)^3(\lambda-\lambda_2)$ and $c(\lambda)=(\lambda-\lambda_1)^3(\lambda-\lambda_2)$. We have \begin{equation}\label{20} T^a{}_b \sim \left[\begin{array}{ccc|c} \lambda_1 &1 &0 &0\\ 0 &\lambda_1& 1&0\\ 0&0& \lambda_1 & 0\\ \hline 0&0&0&\lambda_2\\\end{array}\right]. \end{equation} This is a generic type III stress-energy tensor.\\ This tensor \emph{does not occur} classically in nature, and does not even seem to occur semi-classically. \end{description} \item[III:] Three distinct eigenvalues. We now have $m(\lambda) = (\lambda-\lambda_1)^2(\lambda-\lambda_2)(\lambda-\lambda_3)$ and $c(\lambda)=(\lambda-\lambda_1)^2(\lambda-\lambda_2)(\lambda-\lambda_3)$. Then \begin{equation}\label{21} T^a{}_b \sim \left[\begin{array}{cc|cc} \lambda_1 &1 &0 &0\\ 0 &\lambda_1& 0 &0\\ \hline 0&0& \lambda_2 & 0\\0&0&0&\lambda_3\\ \end{array}\right]. \end{equation} This is a generic type II stress-energy tensor, (see references \cite{Peres, Bonnor} for specific examples of this kind of tensor).\\ Physically this corresponds, for example, to a \emph{null flux superimposed on a non-symmetric background}. \item[IV:] Four distinct eigenvalues. Then $m(\lambda) = (\lambda-\lambda_1)(\lambda-\lambda_2)(\lambda-\lambda_3)(\lambda-\lambda_4)$ and $c=(\lambda-\lambda_1)(\lambda-\lambda_2)(\lambda-\lambda_3)(\lambda-\lambda_4)$. We have: \begin{equation} T^a{}_b \sim \left[\begin{array}{cccc} \lambda_1 &0 &0 &0\\ 0 &\lambda_2& 0 &0\\ 0&0& \lambda_3 & 0\\0&0&0&\lambda_4\\ \end{array}\right]. \end{equation} This is either generic type I, if all $\lambda_i$ are real, or generic type IV, if there are two complex and two real eigenvalues.\footnote{We cannot have four complex eigenvalues since that would correspond to two $2\times2$ blocks of (1+1) dimensional type IV, implying a physically inappropriate (2+2) signature.} \end{description} It should be noted that in the stress-energy tensors given by (\ref{12}) (\ref{14}), (\ref{15}), (\ref{16}), (\ref{18}), (\ref{20}), and (\ref{21}) the non-diagonal Jordan block appears in the timelike direction. This is because $T_{ab}$ is a symmetric tensor, which implies that its spatial Euclidean block is diagonalizable and, therefore, at least one of the spacelike Jordan blocks of $T^a{}_b$ also is diagonalizable. \subsection{Generalized Rainich conditions}\label{sec:Rc} As is well known~\cite{1925,Misner:1957,Witten:1959}, (see also appendix~\ref{A:B}), for the electromagnetic field the squared stress-energy tensor is proportional to the identity. Specifically \begin{equation} (T^2)_a{}^b = \left\{ {1\over 4} \{|\vec E|^2- |\vec B|^2\}^2 +\{\vec E\cdot\vec B\}^2 \right\} \delta_a{}^b. \end{equation} As for electromagnetism one has $T={\mathrm{tr}}(T)=0$, in general relativity this implies \begin{equation} (R^2)_a{}^b \propto \delta_a{}^b, \end{equation} which is the algebraic Rainich condition. The new classification that we have presented above allows us to show that this is just a particular case of the more general relation that can be obtained for degree 2 stress-energy tensors. \paragraph{Degree 1:} Then $T^a{}_b$ necessarily has only 1 distinct eigenvalue $\lambda_*$. So in this case $m(T^\bullet{}_\bullet)=T^\bullet{}_\bullet-\lambda_* \,\delta^\bullet{}_\bullet=0$. For the stress-energy tensor $T^a{}_b= {1\over4} T\,\delta^a{}_b$ with $T={\rm tr}(T^\bullet{}_\bullet)=T^a{}_a$. So, in general relativity we have $ R^a{}_b= \frac{1}{4}R\,\delta^a{}_b$. That is, for a degree 1 stress-energy tensor the geometry necessarily is an Einstein space-time. \paragraph{Degree 2:} If $m(\lambda)$ has degree 2, there are two sub-cases. \begin{description} \item[I:] $T^a{}_b$ has only 1 distinct eigenvalue $\lambda_*$, then $m(T^\bullet{}_\bullet)=(T^2)^\bullet{}_\bullet-2\lambda_* T^\bullet{}_\bullet+\lambda_*^2 \delta^\bullet{}_\bullet=0$. This implies \begin{equation} (T^2)^a{}_b=\frac{{\mathrm{tr}}(T)}{2} \, T^a{}_b-\frac{{\mathrm{tr}}(T)^2}{16}\, \delta^a{}_b\quad\Longrightarrow\quad {\rm tr}(T^2)=\frac{{\mathrm{tr}}(T)^2}{4}. \end{equation} Assuming the Einstein equations, we translate this into the geometric condition \begin{equation} (R^2)^a{}_b=\frac{1}{2}{\mathrm{tr}}(R)\,R^a{}_b-\frac{1}{16}{\mathrm{tr}}(R)^2\,\delta^a{}_b\quad\Longrightarrow\quad {\rm tr}(R^2)=\frac{1}{4}{\mathrm{tr}}(R)^2. \end{equation} \item[II:] $T^a{}_b$ has 2 distinct eigenvalues. Then \begin{equation} (T^2)^a{}_b=(\lambda_1+\lambda_2) T^a{}_b-\lambda_1\lambda_2 \delta^a{}_b, \end{equation} which leads to the geometrical condition \begin{equation} (R^2)^a{}_b=\alpha R^a{}_b-\beta \delta^a{}_b, \end{equation} with $\alpha={\mathrm{tr}}(R)+(\lambda_1+\lambda_2)\kappa$ and $\beta={1\over4}\left[{\mathrm{tr}}(R)^2+2{\mathrm{tr}}(R)(\lambda_1+\lambda_2)\kappa+4\lambda_1\lambda_2\kappa^2\right]$, and $\kappa=8\pi G$.\\ Note that for the particular case $\lambda_1=-\lambda_2$, we will have \begin{equation} \hspace{-1cm} (T^2)^a{}_b =\lambda_1^2 \delta^a{}_b,\quad\Longrightarrow\quad (R^2)^a{}_b={\mathrm{tr}}(R) R^a{}_b-\frac{1}{4}\left[{\mathrm{tr}}(R)^2-{\rm tr}(R^2)\right] \delta^a{}_b. \end{equation} Noting that in this specific case ${\mathrm{tr}}(T)={\mathrm{tr}}(R)=0$, this reduces to the Rainich condition for classical electromagnetism $(R^2)^a{}_b = {1\over4}{\mathrm{tr}}(R^2)\, \delta^a{}_b$. If we do not impose this specific relationship between $\lambda_1$ and $\lambda_2$ then the generalized Rainich condition $(R^2)^a{}_b=\alpha R^a{}_b-\beta \delta^a{}_b$ is appropriate for geometrizing both perfect fluid sources and/or scalar field sources~\cite{Krongos:2015}. \end{description} \noindent For degree 2 a nice result is to note that $T^2 = A \,T + B\,I$ implies $T^3 = A \,T^2 + B\,T$, so that taking traces \begin{equation} {\mathrm{tr}}(T^2) = A\, {\mathrm{tr}}(T) + 4\, B; \qquad\qquad {\mathrm{tr}}(T^3) = A\, {\mathrm{tr}}(T^2) + B\,{\mathrm{tr}}(T). \end{equation} These simultaneous linear equations can be solved for $A$ and $B$, with the general result that for degree 2 we have the explicit expression \begin{equation} \hspace{-0.5cm} (T^2)^a{}_b = \left\{ {\mathrm{tr}}(T)\, {\mathrm{tr}}(T^2) - 4 {\mathrm{tr}}(T^3) \over {\mathrm{tr}}(T)^2 - 4 {\mathrm{tr}}(T^2) \right\} T^a{}_b - \left\{ {\mathrm{tr}}(T^2)^2 - {\mathrm{tr}}(T) \,{\mathrm{tr}}(T^3) \over {\mathrm{tr}}(T)^2 - 4 {\mathrm{tr}}(T^2) \right\} \delta^a{}_b. \end{equation} If we work with the traceless piece of the stress-energy $\hat T^a{}_b = T^a{}_b - {1\over 4} T \, \delta^a_b$, then (noting that the distribution of blocks in the Jordan normal form, and so the degree of the minimal polynomial, is left unchanged when the tensor is shifted by a multiple of the identity), this simplifies to \begin{equation} (\hat T^2)^a{}_b = \left\{ {\mathrm{tr}}(\hat T^3) \over {\mathrm{tr}}(\hat T^2) \right\} \hat T^a{}_b + {1\over 4} {\mathrm{tr}}(\hat T^2)\, \delta^a{}_b. \end{equation} While this is not precisely the usual Rainich condition it is remarkably close. (The classical electromagnetic Rainich condition corresponds to ${\mathrm{tr}}(T^3)=0={\mathrm{tr}}(T)$.) Working at the level of geometry, since the Einstein equation relates the stress-energy to the Ricci tensor shifted by a multiple of the identity, for degree 2 the equivalent statement for the Ricci tensor is \begin{equation}\label{R2} \hspace{-0.5cm} (R^2)^a{}_b = \left\{ {\mathrm{tr}}(R)\, {\mathrm{tr}}(R^2) - 4 {\mathrm{tr}}(R^3) \over {\mathrm{tr}}(R)^2 - 4 {\mathrm{tr}}(R^2) \right\} R^a{}_b - \left\{ {\mathrm{tr}}(R^2)^2 - {\mathrm{tr}}(R) \,{\mathrm{tr}}(R^3) \over {\mathrm{tr}}(R)^2 - 4 {\mathrm{tr}}(R^2) \right\} \delta^a{}_b. \end{equation} (A \emph{massless minimally coupled scalar field} corresponds to $R_{ab}= \nabla_a \phi \; \nabla_b\phi$, so that ${\mathrm{tr}}(R^m) = (\nabla\phi\cdot\nabla\phi)^m = {\mathrm{tr}}(R)^m$, implying $R^2 = {\mathrm{tr}}(R)\, R$.) For the traceless part of the Ricci tensor, $\hat R^a{}_b = R^a{}_b - {1\over 4} R\, \delta^a_b$, the discussion above simplifies to \begin{equation}\label{R22} (\hat R^2)^a{}_b = \left\{ {\mathrm{tr}}(\hat R^3) \over {\mathrm{tr}}(\hat R^2) \right\} \hat R^a{}_b + {1\over 4} {\mathrm{tr}}(\hat R^2)\, \delta^a{}_b. \end{equation} Note that both equation (\ref{R2}) and equation (\ref{R22}) are purely geometric conditions; they therefore generalize the usual Rainich condition for any degree 2 stress-energy tensor. We can easily recover the usual Rainich condition directly from equation (\ref{R2}) when ${\mathrm{tr}}(R^3)={\mathrm{tr}}(R)=0$. \paragraph{Degree 3:} Let us treat all of the sub-cases for degree 3 together. We have \begin{eqnarray} \hspace{-0.5cm} (T^3)^a{}_b=(\lambda_1+\lambda_2+\lambda_3)\,(T^2)^a{}_b -(\lambda_1\lambda_2+\lambda_1\lambda_3+\lambda_2\lambda_3)\,T^a{}_b+\lambda_1\lambda_2\lambda_3\,\delta^a{}_b, \end{eqnarray} with $\lambda_1=\lambda_2=\lambda_3$ for case I, $\lambda_1=\lambda_2\neq\lambda_3$ for case II, and $\lambda_1\neq\lambda_2\neq\lambda_3$ for case III. We then obtain the following geometric equation \begin{equation} (R^3)^a{}_b=\alpha_2\,(R^2)^a{}_b-\alpha_1\, R^a{}_b+\alpha_0\,\delta^a{}_b, \end{equation} where \begin{eqnarray} \alpha_2&=&\frac{3}{2}{\mathrm{tr}}(R)+(\lambda_1+\lambda_2+\lambda_3)\kappa,\\ \alpha_1&=&\frac{3}{4}{\mathrm{tr}}(R)^2+\frac{1}{4}{\mathrm{tr}}(R)^2(\lambda_1+\lambda_2+\lambda_3)\kappa+(\lambda_1\lambda_2+\lambda_1\lambda_3+\lambda_2\lambda_3)\kappa^2,\\ \alpha_0&=&\frac{1}{8}{\mathrm{tr}}(R)^3+\frac{1}{4}{\mathrm{tr}}(R)^2(\lambda_1+\lambda_2+\lambda_3)\kappa+\frac{1}{2}{\mathrm{tr}}(R)(\lambda_1\lambda_2+\lambda_1\lambda_3+\lambda_2\lambda_3)\kappa^2\nonumber\\ &+&\lambda_1\lambda_2\lambda_3\kappa^3.\;\;\; \end{eqnarray} For degree 3 an explicit result in terms of traces of powers of the stress-energy is possible but is unfortunately somewhat unedifying. Noting that $T^3 = A \,T^2 + B\,T + C\, I$ implies both $T^4 = A \,T^3 + B\,T^2 + C\, T$ and $T^5 = A \,T^4 + B\,T^3 + C\, T^2$, taking traces yields \begin{equation} \hspace{-1.5cm} {\mathrm{tr}}(T^3) = A\, {\mathrm{tr}}(T^2) + B\, {\mathrm{tr}}(T) + 4\, C; \quad {\mathrm{tr}}(T^4) = A\, {\mathrm{tr}}(T^3) + B\, {\mathrm{tr}}(T^2) + C \,{\mathrm{tr}}(T); \end{equation} and \begin{equation} {\mathrm{tr}}(T^5) = A\, {\mathrm{tr}}(T^4) + B\, {\mathrm{tr}}(T^3) + C\,{\mathrm{tr}}(T^2). \end{equation} These simultaneous linear equations can be solved for $A$, $B$, and $C$, resulting in an explicit but ugly expression for degree 3 that does not seem worth writing out. Note that, analogously with the previous case, once we have an expression for $T^3$ in terms of lower powers of $T$ and ${\mathrm{tr}}(T^m)$ with $m\leq3$, we can consider a shift to find an expression of $R^3$ in terms of lower powers of $R$ and ${\mathrm{tr}}(R^m)$ with $m\leq3$. A more subtle construction is this: For degree 3 at least one eigenvalue $\lambda_*$ is doubled, (or even tripled or quadrupled), and corresponds to a spacelike eigenvector~$s_a$. Eliminate this spacelike eigenvector by defining \begin{equation} (T')^a{}_b = T^a{}_b - \lambda_*\; s^a s_b. \end{equation} The tensor $T'$ is now a singular matrix, and has only 3 eigenvalues corresponding to those occurring in the minimal polynomial $m(\lambda)$ of $T$. Now we can write \begin{equation} (T^3)^a{}_b = {\mathrm{tr}}(T') \, (T^2)^a{}_b + {1\over2}\left\{{\mathrm{tr}}([T']^2) - {\mathrm{tr}}(T')^2\right\}\,T^a{}_b + {\mathrm{pdet}}(T')\, \delta^a{}_b. \end{equation} Here ${\mathrm{pdet}}(T')$ is the pseudo-determinant, the product over non-zero eigenvalues. This expression is simple and evocative, but somewhat implicit. \paragraph{Degree 4:} Analogously, for degree 4 we have \begin{eqnarray} (T^4)^a{}_b&=&(\lambda_1+\lambda_2+\lambda_3+\lambda_4)\,(T^3)^a{}_b\nonumber\\ &&-(\lambda_1\lambda_2+\lambda_1\lambda_3+\lambda_2\lambda_3+\lambda_1\lambda_4+\lambda_2\lambda_4+\lambda_3\lambda_4)\,(T^2)^a{}_b\nonumber\\ &&+(\lambda_1\lambda_2\lambda_3+\lambda_1\lambda_2\lambda_4+\lambda_1\lambda_3\lambda_4+\lambda_2\lambda_3\lambda_4)\,T^a{}_b -\lambda_1\lambda_2\lambda_3\lambda_4\,\delta^a{}_b. \end{eqnarray} (Here $\lambda_1=\lambda_2=\lambda_3\neq\lambda_4$ for case II, $\lambda_1=\lambda_2\neq\lambda_3\neq\lambda_4$ for case III, while $\lambda_1\neq\lambda_2\neq\lambda_3\neq\lambda_4$ for case IV.) We can now easily re-express this in terms of the elementary symmetric polynomials as \begin{eqnarray} \hspace{-35pt} (T^4)^a{}_b&=&e_1(T)\,(T^3)^a{}_b -e_2(T)\,(T^2)^a{}_b +e_3(T)\,T^a{}_b -e_4(T)\,\delta^a{}_b. \end{eqnarray} Because we are in 4 dimensions, the general explicit formula for the third symmetric polynomial, $e_3(T) =\frac{1}{6}\left[({\mathrm{tr}}(T)^3-3{\mathrm{tr}}(T){\mathrm{tr}}(T^2)+2{\mathrm{tr}}(T^3))\right]$, can be more compactly rewritten in terms of the cofactor matrix,\footnote{If a matrix $X$ is nonsingular, then the cofactor matrix is ${\mathrm{cof}}(X) = \det(X) \, (X^{-1})^T$, but the cofactor matrix continues to make sense even if the matrix is singular.} $e_3(T) = {\mathrm{tr}}[{\mathrm{cof}}(X)]$, while $e_4(T)$ reduces to $\det(T)$. Thence \begin{eqnarray} \hspace{-35pt} (T^4)^a{}_b&=&{\mathrm{tr}}(T)\,(T^3)^a{}_b +{1\over2}\{{\mathrm{tr}}(T^2) - {\mathrm{tr}}(T)^2\}\,(T^2)^a{}_b\nonumber\\ &+& \{{\mathrm{tr}}[{\mathrm{cof}}(T)]\}\,T^a{}_b -\det(T)\,\delta^a{}_b. \end{eqnarray} Similarly we obtain the geometric relation \begin{eqnarray} (R^4)^a{}_b&=&{\mathrm{tr}}(R)\,(R^3)^a{}_b +{1\over2}\{{\mathrm{tr}}(R^2) - {\mathrm{tr}}(R)^2\}\,(R^2)^a{}_b\nonumber\\ &+& \{{\mathrm{tr}}[{\mathrm{cof}}(R)]\}\,R^a{}_b-\det(R)\,\delta^a{}_b. \end{eqnarray} By considering the traceless part of the stress-energy and Ricci tensors we can write \begin{eqnarray} (\hat T^4)^a{}_b&=& +{1\over2}\{{\mathrm{tr}}(\hat T^2) \}\,(T^2)^a{}_b + \{{\mathrm{tr}}[{\mathrm{cof}}(\hat T)]\}\,\hat T^a{}_b -\det(\hat T)\,\delta^a{}_b,\;\; \end{eqnarray} and \begin{eqnarray} (\hat R^4)^a{}_b&=& +{1\over2}\{{\mathrm{tr}}(\hat R^2) \}\,(\hat R^2)^a{}_b + \{{\mathrm{tr}}[{\mathrm{cof}}(\hat R)]\}\,\hat R^a{}_b -\det(\hat R)\,\delta^a{}_b. \end{eqnarray} The geometric conditions presented in this section show that the effect of \emph{any} stress-energy tensor can be described considering expressions written just with invariants of the Ricci curvature (traces of powers, the determinant, the trace of the cofactor matrix). Hence, any physical acceptable geometry (that is, generated by a reasonable stress-energy tensor) should satisfy one of the generalized (algebraic) Rainich conditions that we have obtained. We do not consider in this paper the extension of the differential Rainich equation, related with the dynamics of the source of the curvature. \subsection{Applications to the energy conditions}\label{sec:EC} The relations between the different powers of the stress-energy tensor presented in the previous sections allow us in some cases to extract information regarding relations with the energy conditions, at least for degrees 1 and 2. For instance \paragraph{Degree 1:} As we have $T^a{}_b= {1\over4} T\,\delta^a{}_b$, then: \begin{itemize} \item The WEC is satisfied if and only if the trace energy condition (TEC) is fulfilled ($T\leq0$). \emph{This corresponds to positive vacuum energy, positive cosmological constant.} \item A minimum requirement for the DEC to be satisfied is that the TEC is fulfilled. \item The SEC, that is $V_a\,[T^a{}_b-{1\over2} {\mathrm{tr}}(T)\,\delta^a{}_b]V^b\geq0$, is satisfied if and only if the TEC is violated. Therefore, the WEC and the SEC cannot be simultaneously satisfied. \end{itemize} \paragraph{Degree 2:} For degree 2 the condition $T^2=A\,T+B\,I$ implies \begin{equation} (T^2)_{ab} V^a V^b = A\,T_{ab} V^a V^b + B\, (g_{ab} V^aV^b); \quad {\mathrm{tr}}(T^2) = A\,{\mathrm{tr}}(T)+4B. \end{equation} Consequently, in degree 2, ``quadratic'' energy conditions, such as the DEC, FEC, and TOSEC, automatically reduce to linear conditions on the stress-energy. We have two cases. \begin{description} \item[I:] $T^a{}_b$ has only 1 distinct eigenvalue $\lambda_*$: $(T^2)^a{}_b=\frac{{\mathrm{tr}}(T)}{2} \, T^a{}_b-\frac{{\mathrm{tr}}(T)^2}{16}\delta^a{}_b$. This implies (see definitions in references~\cite{Martin-Moruno:2013a,Martin-Moruno:2013b,Martin-Moruno:2015,LNP}): \begin{itemize} \item ${\rm tr}(T^2) = {1\over4} T^2 \geq0$, so TOSEC is satisfied. \item If the WEC is satisfied, then the TEC ($T\leq0$) is a necessary requirement for the FEC to be fulfilled. \end{itemize} \item[II:] $T^a{}_b$ has 2 distinct eigenvalues $\lambda_1$ and $\lambda_2$: $(T^2)^a{}_b=(\lambda_1+\lambda_2) \,T^a{}_b-\lambda_1\lambda_2\, \delta^a{}_b$. \begin{itemize} \item If we want to have any hope of the FEC and WEC to be simultaneously satisfied, at least one of the eigenvalues has to be negative. \item If the NEC is satisfied, a necessary requirement for the FEC to be fulfilled is that at least one of the eigenvalues has to be negative. \item If the TEC is satisfied, at least one of the eigenvalues has to be negative for the TOSEC to be fulfilled. \item For the particular case $\lambda_1=-\lambda_2$, we will have $(T^2)^a{}_b =\lambda_1^2 \, \delta^a{}_b$. Then the FEC is satisfied. \end{itemize} \end{description} Since energy conditions (as presently defined) entail the consideration of quantities that are linear or quadratic in the stress-energy tensor, we see that although interesting relations between inequalities may be found for stress-energy tensors of degrees 3 and 4, they will generically not relate just the energy conditions. \section{Discussion and conclusions}\label{sec:d} So what have we learned from this exercise? Mathematically the (mixed component) stress-energy tensor forms a closed algebraic field of degree at most 4 over the real numbers. Algebraically, in (3+1) dimensions there will always be some exponent $1\leq N\leq4$ such that \begin{equation} (T^N)^\bullet{}_\bullet = \sum_{i=0}^{N-1} k_i \; (T^i)^\bullet{}_\bullet. \end{equation} Physically, powers of stress tensors close in on themselves rather rapidly. Even for the worst behaved stress-energy tensor in (3+1) dimensions the 4th power is always expressible in terms of lower powers. Simple (and physically attractive) stress-energy tensors often exhibit this behaviour even at 2nd order. As (currently defined) point-like energy conditions entail the consideration of terms linear or quadratic in the stress-energy tensor, some relations between the fulfillment of some of those energy conditions can be found for stress-energy tensors of degrees 1 and 2. On the other hand, for each degree of the classification based on the minimal polynomials, one can write a purely geometric expression for the curvature of the corresponding spacetime. The resulting expressions can be interpreted as generalized Rainich conditions that will \emph{always} be satisfied. This construction gives us an alternative way of classifying stress-energy tensors, often providing a refinement of the usual classical and/or semi-classical energy conditions~\cite{Hell,Martin-Moruno:2013a,Martin-Moruno:2013b,Martin-Moruno:2015,LNP,Visser:1994,Visser:1997,Balakrishnan:2017,Fu:2017,Fu:2016, Koeller:2015, Bousso:2015} and/or the Hawking--Ellis (Segr\'e--Pleba\'nski) classification~\cite{Hell,Plebanski:1964,LNP}. \section*{Acknowledgments} PMM acknowledges financial support from the projects FIS2014-52837-P (Spanish MINECO) and FIS2016-78859-P (AEI/FEDER, UE). MV acknowledges financial support via the Marsden Fund administered by the Royal Society of New Zealand.
\section{Introduction} \label{sec:intro} Behavioral equivalences and modal logics have been successfully employed for the specification and verification of communicating concurrent systems, henceforth processes. The former ones provide a simple and elegant tool for comparing the observable behavior of processes. The latter ones allow for an immediate expression of the desired properties of processes. Since the work of \cite{HM85} on the Hennessy-Milner logic (HML), these two approaches are connected by means of \emph{logical characterizations} of behavioral equivalences: two processes are behaviorally equivalent if and only if they satisfy the same formulae in the logic. Hence, the characterization of an equivalence subsumes both the fact that the logic is as expressive as the equivalence and the fact that the equivalence preserves the logical properties of processes. It is common agreement that when also quantitative properties of processes are taken into account a metric semantics is favored over behavioral equivalences, since the latter ones are too sensible to small variations in the probabilistic properties of processes. Therefore, the interest in logical characterizations of the so called \emph{behavioral metrics} \cite{BW05,DGJP04,DJGP02,GJS90,KN96,DCPP06,SDC07,AFS09,AMRS08,LMP12}, namely the quantitative analogues of equivalences that quantify how far the behavior of two processes is apart, is constantly growing. In this paper we propose a logical characterization of the \emph{strong} and \emph{weak} variants of the \emph{trace metric} \cite{SDC07} for nondeterministic probabilistic processes (PTSs \cite{S95}). To this aim we follow the approach of \cite{CGT16a} in which a logical characterization of the bisimilarity metric is provided. We introduce two boolean logics $\LL$ and $\LLw$, providing a probabilistic choice operator capturing the probability weights that a process assigns to arbitrary traces, which we prove to characterize resp.\ the \emph{strong} and \emph{weak probabilistic trace equivalences} of \cite{S95tr}. Such a characterization is obtained by introducing the novel notion of \emph{mimicking formulae of resolutions}, i.e.\ formulae capturing, for each possible resolution of nondeterminism for a process, all the executable traces as well as the probability weights assigned to them. Then we introduce the notions of \emph{distance between formulae} in $\LL$ and $\LLw$ which are $1$-bounded (pseudo)metrics assigning to each pair of formulae a suitable quantitative analogue of their syntactic disparities. These lift to metrics over processes, called resp.\ $\LL$-\emph{distance} and $\LLw$-\emph{distance}, corresponding to the Hausdorff lifting of the distance between formulae to the sets of formulae satisfied by the two processes. We prove that our $\LL$-distance and $\LLw$-distance correspond resp.\ to the strong and weak trace metric. An important feature of our characterization method is that, although it is firmly based on the mimicking formulae of resolutions, it does not actually depend on how these resolutions of nondeterminism are obtained from processes. For instance, in this paper we consider resolutions obtained via a \emph{deterministic scheduler} \cite{S95tr,BdNL14}, but our approach would not be different when applied to \emph{randomized resolutions} \cite{S95tr,BdNL14}. Our approach differs from the ones proposed in the literature in that in general logics equipped with a real-valued semantics are used for the characterization, which is then expressed as \begin{equation} \label{eq:intro} d(s,t) = \sup_{\varphi \in L} |\val{\varphi}{s} - \val{\varphi}{t}| \end{equation} where $d$ is the behavioral metric of interest, $L$ is the considered logic and $\val{\varphi}{s}$ denotes the value of the formula $\varphi$ at process $s$ accordingly to the real-valued semantics \cite{DGJP04,DJGP02,AFS09,AMRS08,DDG16}. In \cite{BBLM15} it is proved that the trace metric on Markov Chains (MCs) can be characterized in terms of the probabilistic LTL-model checking problem. Roughly speaking, a characterization as in~\eqref{eq:intro} is obtained from the boolean logic LTL by assigning a real-valued semantics to it, defined by exploiting the probabilistic properties of the MC: the value of a formula $\varphi \in$ LTL at state $s$ is given by the probability of $s$ to execute a run satisfying $\varphi$. In this paper we show that we can obtain a similar result by means of our distance between formulae. More precisely, we provide an alternative characterization of the trace metric on PTSs $\TraceMetric$ in terms of the probabilistic $\LL$-model checking problem. In detail, we define a real-valued semantics for $\LL$ by assigning to each formula $\Psi \in \LL$ at process $s$ the value $\val{\Psi}{s}$ corresponding to the minimal distance between $\Psi$ and any formula satisfied by $s$. Thus we could use this real-valued semantics to verify whether process $s$ behaves within an allowed tolerance wrt.\ to the specification given by the formula $\Psi$. Then, by exploiting some properties of the Hausdorff metric, we will be able to conclude that $ \displaystyle \TraceMetric(s,t) = \sup_{\Psi \in \LL} \mid \val{\Psi}{s} - \val{\Psi}{t} \mid $ thus giving that the verification of any $\LL$-formula in $s$ cannot differ from its verification in $t$ for more than $\TraceMetric(s,t)$ which, in turn, constitutes the maximal observable error in the approximation of $s$ with $t$. We can summarize our contributions as follows: \begin{enumerate} \item Logical characterization of both strong and weak trace metric: we define a distance on the class of formulae $\LL$ (resp.\ $\LLw$) and we prove that the strong (resp.\ weak) trace metric between two processes equals the syntactic distance between the sets of formulae satisfied by them. \item Logical characterization of strong trace metric in terms of a probabilistic $\LL$-model checking problem: by means of the distance between formulae we equip $\LL$ with a real-valued semantics and we use it to establish a characterization of the trace metric as in \eqref{eq:intro}. \item Logical characterization of both strong and weak probabilistic trace equivalence: by exploiting the notion of mimicking formula, we prove that two processes are strong (resp.\ weak) trace equivalent if and only if they satisfy the same (resp.\ syntactically equivalent) formulae in $\LL$ (resp.\ $\LLw$). \end{enumerate} \section{Background} \label{sec:background_chap7} \subsection{Nondeterministic probabilistic transition systems} Nondeterministic probabilistic transition systems \cite{S95} combine LTSs \cite{K76} and discrete time Markov chains \cite{HJ94,Ste94}, allowing us to model reactive behavior, nondeterminism and probability. As state space we take a set $\proc$, whose elements are called $\emph{processes}$. We let $s,t,\ldots$ range over $\proc$. Probability distributions over $\proc$ are mappings $\pi \colon \proc \to [0,1]$ with $\sum_{s \in \proc} \pi(s) = 1$ that assign to each $s \in \proc$ its probability $\pi(s)$. By $\ProbDist{\proc}$ we denote the set of all distributions over $\proc$. We let $\pi, \pi',\dots$ range over $\ProbDist{\proc}$. For $\pi \in \ProbDist{\proc}$, we denote by $\support(\pi)$ the support of $\pi$, namely $\support(\pi) = \{ s \in \proc \mid \pi(s) >0\}$. We consider only distributions with \emph{finite} support. For $s \in \proc$ we denote by $\delta_s$ the \emph{Dirac distribution} defined by $\delta_s(s)= 1$ and $\delta_s(t)=0$ for $s \neq t$. The convex combination $\sum_{i \in I} p_i \pi_i$ of a family $\{\pi_i\}_{i \in I}$ of distributions $\pi_i \in \ProbDist{\proc}$ with $p_i \in (0,1]$ and $\sum_{i \in I} p_i = 1$ is defined by $(\sum_{i \in I} p_i \pi_i)(s) = \sum_{i \in I} (p_i \pi_i(s))$ for all $s \in \proc$. \begin{definition}[PTS, \cite{S95}] A \emph{nondeterministic probabilistic labeled transition system (PTS)} is a triple $(\proc,\Act,\trans[])$, where: \begin{inparaenum}[(i)] \item $\proc$ is a countable set of processes, \item $\Act$ is a countable set of \emph{actions}, and \item $\trans[] \subseteq {\proc \times \Act \times \ProbDist{\proc}}$ is a \emph{transition relation}. \end{inparaenum} \end{definition} We call $(s,a,\pi)\in\trans[]$ a \emph{transition}, and we write $s\trans[a]\pi$ for $(s,a,\pi) \in\trans[]$. We write $s \trans[a] $ if there is a distribution $\pi \in \ProbDist{\proc}$ with $s \trans[a] \pi$, and $s \ntrans[a]$ otherwise. Let $\init{s} =\{ a \in \Act \mid s\trans[a]\}$ denote the set of the actions that can be performed by $s$. Let $\der{s,a} =\{\pi\in\ProbDist{\proc} \mid s\trans[a]\pi\}$ denote the set of the distributions reachable from $s$ through action $a$. We say that a process $s \in \proc$ is \emph{image-finite} if for all actions $a \in\init{s}$ the set $\der{s,a}$ is finite \cite{HPSWZ11}. In this paper we consider only processes that are image-finite. Throughout the paper we will introduce some equivalence relations on traces and on modal formulae. To deal with the equivalence of probability distributions over these elements, we need to introduce the notion of \emph{lifting} of a relation. \begin{definition} \label{def:lifting_relation} Let $X$ be any set. Consider a relation $\rel \subseteq X \times X$. Then the \emph{lifting} of $\rel$ is the relation $\reldist \subseteq \ProbDist{X} \times \ProbDist{X}$ with $\pi \reldist \pi'$ if whenever $\pi = \sum_{i \in I} p_i \delta_{x_i}$ then $\pi' = \sum_{i \in I, j_i \in J_i} p_{j_i} \delta_{y_{j_i}}$ with $\sum_{j_i \in J_i} p_{j_i} = p_i$ and $x_i \rel y_{j_i}$ for all $j_i \in J_i$. \end{definition} Moreover, we can lift relations to relations over sets. Given a relation $\rel \subseteq X \times Y$, we say that two subsets $X' \subseteq X, Y' \subseteq Y$ are in relation $\rel$, notation $X' \rel Y'$, if{f} \begin{inparaenum}[(i)] \item for each $x \in X'$ there is an $y \in Y'$ with $x \rel y$, and \item for each $y \in Y'$ there is an $x \in X'$ with $x \rel y$. \end{inparaenum} \subsection{Strong probabilistic trace equivalence} A probabilistic trace equivalence is a relation over $\proc$ that equates processes $s,t \in \proc$ if for all resolutions of nondeterminism they can mimic each other's sequences of transitions with the same probability. \begin{definition} [Computation, \cite{BdNL14}] \label{def:computation} Let $P = (\proc, \Act, \trans[])$ be a PTS and $s,s' \in \proc$. We say that $c := s_0 \ctrans[a_1] s_1 \ctrans[a_2] s_2 \dots s_{n-1} \ctrans[a_n] s_n$ is a \emph{computation} of $P$ of length $n$ from $s = s_0$ to $s'= s_n$ if{f} for all $i = 1,\dots,n$ there exists a transition $s_{i-1} \trans[a_i] \pi_i$ in $P$ such that $s_i \in \support(\pi_i)$, with $\pi_i(s_i)$ being the \emph{execution probability} of step $s_{i-1} \ctrans[a_i] s_i$ conditioned on the selection of transition $s_{i-1} \trans[a_i] \pi_i$ of $P$ at $s_{i-1}$. We denote by $\pr(c) = \prod_{i = 1}^{n} \pi_i(s_i)$ the product of the execution probabilities of the steps in $c$. \end{definition} Let $s,s',s'' \in \proc$. Given any computation $c' = s' \ctrans[a_1] s_1 \ctrans[a_2] \dots \ctrans[a_n] s''$ from $s'$ to $s''$, we write $c = s \ctrans[a] c'$ if $c = s \ctrans[a] s' \ctrans[a_1] \dots \ctrans[a_n] s''$ is a computation from $s$ to $s''$. We say that $c$ is a \emph{computation from $s$} if $c$ is a computation from $s$ to some process $s'$. Then, $c$ is \emph{maximal} if it is not a proper prefix of any other computation from $s$. We denote by $\C(s)$ (resp.\ $\C_{\max}(s)$) the set of computations (resp.\ maximal computations) from $s$. Given any $\C \subseteq \C(s)$, we define $\pr(\C) = \sum_{c \in \C} \pr(c)$ whenever none of the computations in $\C$ is a proper prefix of any of the others. We denote by $\Act^{\star}$ the set of \emph{finite sequences} of actions in $\Act$ and we call \emph{trace} any element $\alpha \in \Act^{\star}$. The special symbol $\e \not \in \Act$ denotes the empty trace. We say that a computation is \emph{compatible} with the trace $\alpha \in \Act^{\star}$ if{f} the sequence of actions labeling the computation steps is equal to $\alpha$. We denote by $\C(s,\alpha) \subseteq \C(s)$ the set of computations of $s$ which are compatible with $\alpha$, and by $\C_{\max}(s,\alpha)$ the set $\C_{\max}(s,\alpha) = \C_{\max}(s) \cap \C(s,\alpha)$. \begin{definition} \label{def:trc} Let $s \in \proc$ and consider any $c \in \C(s)$. We denote by $\tr(c) \in \Act^{\star}$ the trace to which $c$ is compatible. We extend this notion to sets by letting $\tr(\C') = \{\tr(c) \mid c \in \C'\}$ for any $\C' \subseteq \C(s)$. We say that $\tr(\C(s))$ is the \emph{set of traces} of $s$ and $\tr(\C_{\max}(s))$ is the \emph{set of maximal traces} of $s$. \end{definition} To establish trace equivalence we need first to deal with nondeterministic choices of processes. To this aim, we consider all possible resolutions of nondeterminism one by one. Using the notation of \cite{BdNL14}, our resolutions correspond to the resolutions obtained via a \emph{deterministic scheduler} (see Fig.~\ref{fig:ex_resolutions} for an example). \begin{definition} [Resolution, \cite{BdNL14}] \label{def:det_res} Let $P = (\proc, \Act,\trans[])$ be a PTS and $s \in \proc$. We say that a PTS $\Z = (Z,\Act,\trans[]_{\Z})$ is a \emph{resolution} for $s$ if{f} there exists a state correspondence function $\corr{\Z} \colon Z \to \proc$ such that $s = \corr{\Z}(z_s)$ for some $z_s \in Z$, called the \emph{initial state} of $\Z$, and moreover it holds that: \begin{itemize} \item $z_s \not \in \support(\pi)$ for any $\pi \in \bigcup_{z \in Z, a \in \Act} \der{z,a}$. \item Each $z \in Z\setminus\{z_s\}$ is such that $z \in \support(\pi)$ for some $\pi \in \bigcup_{z' \in Z\setminus\{z\}, a \in \Act} \der{z',a}$. \item Whenever $z \trans[a]_{\Z} \pi$, then $\corr{\Z}(z) \trans[a] \pi'$ with $\pi(z') = \pi'(\corr{\Z}(z'))$ for all $z' \in Z$. \item Whenever $z \trans[a_1]_{\Z} \pi_1$ and $z \trans[a_2]_{\Z} \pi_2$ then $a_1 = a_2$ and $\pi_1 = \pi_2$. \end{itemize} We let $\res(s)$ be the set of resolutions for $s$ and $\res(\proc) = \bigcup_{s \in \proc} \res(s)$ be the set of all resolutions on $\proc$. \end{definition} \begin{figure}[t!] \begin{center} \begin{tikzpicture} \node at (2.8,4.7){$\boldsymbol{s}$}; \draw[->](2.8,4.5)--(1.4,3.9); \node at (1.7,4.3){$\boldsymbol{a}$}; \draw[->](2.8,4.5)--(4.2,3.9); \node at (3.1,4.3){$\boldsymbol{a}$}; \draw[->](2.8,4.5)--(5.6,3.9); \node at (5.1,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](1.4,3.9)--(0.7,3.3); \node at (0.7,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](1.4,3.9)--(2.1,3.3); \node at (2.1,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](4.2,3.9)--(3.5,3.3); \node at (3.5,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](4.2,3.9)--(4.9,3.3); \node at (4.9,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](5.6,3.9)--(5.6,3.3); \node at (5.8,3.7){$\boldsymbol{1}$}; \node at (0.7,3){$\boldsymbol{s_1}$}; \node at (2.1,3){$\boldsymbol{s_2}$}; \node at (3.5,3){$\boldsymbol{s_3}$}; \node at (4.9,3){$\boldsymbol{s_4}$}; \node at (5.6,3){$\boldsymbol{s_5}$}; \draw[->](0.7,2.8)--(0,2.2); \node at (0.1,2.6){$\boldsymbol{b}$}; \draw[->](0.7,2.8)--(1.4,2.2); \node at (1.3,2.6){$\boldsymbol{c}$}; \draw[->](2.1,2.8)--(2.1,2.2); \node at (2.3,2.6){$\boldsymbol{d}$}; \draw[->](3.5,2.8)--(2.8,2.2); \node at (3,2.6){$\boldsymbol{b}$}; \draw[->](3.5,2.8)--(4.2,2.2); \node at (4,2.6){$\boldsymbol{d}$}; \draw[->](4.9,2.8)--(4.9,2.2); \node at (5.1,2.6){$\boldsymbol{c}$}; \draw[->](5.6,2.8)--(5.6,2.2); \node at (5.8,2.6){$\boldsymbol{b}$}; \node at (0,2){$\CIRCLE$}; \node at (1.4,2){$\CIRCLE$}; \node at (2.1,2){$\CIRCLE$}; \node at (2.8,2){$\CIRCLE$}; \node at (4.2,2){$\CIRCLE$}; \node at (4.9,2){$\CIRCLE$}; \node at (5.6,2){$\CIRCLE$}; \node at (7.7,4.7){$\boldsymbol{z_s}$}; \draw[->](7.7,4.5)--(7.7,3.9); \node at (7.9,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](7.7,3.9)--(7,3.3); \node at (7,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](7.7,3.9)--(8.4,3.3); \node at (8.4,3.7){$\boldsymbol{0.5}$}; \node at (7,3){$\boldsymbol{z_{s_1}}$}; \node at (8.4,3){$\boldsymbol{z_{s_2}}$}; \draw[->](8.4,2.8)--(8.4,2.2); \node at (8.6,2.6){$\boldsymbol{d}$}; \node at (8.4,2){$\CIRCLE$}; \node at (7.7,1.2){$\Z_s \in \res(s)$}; \node at (10.5,4.7){$\boldsymbol{z'_s}$}; \draw[->](10.5,4.5)--(10.5,3.9); \node at (10.7,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](10.5,3.9)--(9.8,3.3); \node at (9.8,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](10.5,3.9)--(11.2,3.3); \node at (11.2,3.7){$\boldsymbol{0.5}$}; \node at (9.8,3){$\boldsymbol{z'_{s_1}}$}; \node at (11.2,3){$\boldsymbol{z'_{s_2}}$}; \draw[->](9.8,2.8)--(9.8,2.2); \node at (10,2.6){$\boldsymbol{b}$}; \draw[->](11.2,2.8)--(11.2,2.2); \node at (11.4,2.6){$\boldsymbol{d}$}; \node at (9.8,2){$\CIRCLE$}; \node at (11.2,2){$\CIRCLE$}; \node at (10.5,1.2){$\Z_s' \in \res(s)$}; \node at (13.3,4.7){$\boldsymbol{z''_s}$}; \draw[->](13.3,4.5)--(13.3,3.9); \node at (13.5,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](13.3,3.9)--(12.6,3.3); \node at (12.6,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](13.3,3.9)--(14,3.3); \node at (14,3.7){$\boldsymbol{0.5}$}; \node at (12.6,3){$\boldsymbol{z''_{s_3}}$}; \node at (14,3){$\boldsymbol{z''_{s_4}}$}; \draw[->](12.6,2.8)--(12.6,2.2); \node at (12.8,2.6){$\boldsymbol{d}$}; \draw[->](14,2.8)--(14,2.2); \node at (14.2,2.6){$\boldsymbol{c}$}; \node at (12.6,2){$\CIRCLE$}; \node at (14,02){$\CIRCLE$}; \node at (13.3,1.2){$\Z_s'' \in \res(s)$}; \end{tikzpicture} \end{center} \caption{\label{fig:ex_resolutions} An example of three distinct resolutions for process $s$. Black circles stand for the probability distribution $\delta_{\mathrm{nil}}$, with $\mathrm{nil}$ process that cannot execute any action.} \end{figure} \emph{Strong probabilistic trace equivalence} equates two processes if their resolutions can be matched so that they assign the same probability to all traces. \begin{definition} [Strong probabilistic trace equivalence, \cite{S95tr,BdNL14}] \label{def:prob_trace_dist} Let $P=(\proc,\Act,\trans[])$ be a PTS. We say that $s,t \in \proc$ are \emph{strong probabilistic trace equivalent}, notation $s \STr t$, if{f} it holds that: \begin{itemize} \item For each resolution $\Z_s \in \res(s)$ of $s$ there is a resolution $\Z_t \in \res(t)$ of $t$ such that for all traces $\alpha \in \Act^{\star}$ we have $ \pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha)). $ \item For each resolution $\Z_t \in \res(t)$ of $t$ there is a resolution $\Z_s \in \res(s)$ of $s$ such that for all traces $\alpha \in \Act^{\star}$ we have $ \pr(\C(z_t,\alpha)) = \pr(\C(z_s,\alpha)). $ \end{itemize} \end{definition} \begin{figure} \begin{center} \begin{tikzpicture} \node at (1.75,4.7){$\boldsymbol{t}$}; \draw[->](1.75,4.5)--(1.75,3.9); \node at (1.95,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](1.75,3.9)--(0.7,3.3); \node at (0.7,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](1.75,3.9)--(2.8,3.3); \node at (2.8,3.7){$\boldsymbol{0.5}$}; \node at (0.7,3){$\boldsymbol{t_1}$}; \node at (2.8,3){$\boldsymbol{t_2}$}; \draw[->](0.7,2.8)--(0,2.2); \node at (0.2,2.6){$\boldsymbol{b}$}; \draw[->](0.7,2.8)--(1.4,2.2); \node at (1.2,2.6){$\boldsymbol{c}$}; \draw[->](2.8,2.8)--(2.1,2.2); \node at (2.3,2.6){$\boldsymbol{b}$}; \draw[->](2.8,2.8)--(3.5,2.2); \node at (3.3,2.6){$\boldsymbol{d}$}; \node at (0,2){$\CIRCLE$}; \node at (1.4,2){$\CIRCLE$}; \node at (2.1,2){$\CIRCLE$}; \node at (3.5,2){$\CIRCLE$}; \node at (4.9,4.7){$\boldsymbol{z_t}$}; \draw[->](4.9,4.5)--(4.9,3.9); \node at (5.1,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](4.9,3.9)--(4.2,3.3); \node at (4.2,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](4.9,3.9)--(5.6,3.3); \node at (5.6,3.7){$\boldsymbol{0.5}$}; \node at (4.2,3){$\boldsymbol{z_{t_1}}$}; \node at (5.6,3){$\boldsymbol{z_{t_2}}$}; \draw[->](5.6,2.8)--(5.6,2.2); \node at (5.8,2.6){$\boldsymbol{d}$}; \node at (5.6,2){$\CIRCLE$}; \node at (4.9,1.2){$\Z_t \in \res(t)$}; \node at (7.7,4.7){$\boldsymbol{z'_t}$}; \draw[->](7.7,4.5)--(7.7,3.9); \node at (7.9,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](7.7,3.9)--(7,3.3); \node at (7,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](7.7,3.9)--(8.4,3.3); \node at (8.4,3.7){$\boldsymbol{0.5}$}; \node at (7,3){$\boldsymbol{z'_{t_1}}$}; \node at (8.4,3){$\boldsymbol{z'_{t_2}}$}; \draw[->](7,2.8)--(7,2.2); \node at (7.2,2.6){$\boldsymbol{b}$}; \draw[->](8.4,2.8)--(8.4,2.2); \node at (8.6,2.6){$\boldsymbol{d}$}; \node at (7,2){$\CIRCLE$}; \node at (8.4,2){$\CIRCLE$}; \node at (7.7,1.2){$\Z_t' \in \res(t)$}; \node at (10.5,4.7){$\boldsymbol{z''_t}$}; \draw[->](10.5,4.5)--(10.5,3.9); \node at (10.7,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](10.5,3.9)--(9.8,3.3); \node at (9.8,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](10.5,3.9)--(11.2,3.3); \node at (11.2,3.7){$\boldsymbol{0.5}$}; \node at (9.8,3){$\boldsymbol{z''_{t_1}}$}; \node at (11.2,3){$\boldsymbol{z''_{t_2}}$}; \draw[->](9.8,2.8)--(9.8,2.2); \node at (10,2.6){$\boldsymbol{c}$}; \draw[->](11.2,2.8)--(11.2,2.2); \node at (11.4,2.6){$\boldsymbol{d}$}; \node at (9.8,2){$\CIRCLE$}; \node at (11.2,2){$\CIRCLE$}; \node at (10.5,1.2){$\Z_t'' \in \res(t)$}; \node at (13.3,4.7){$\boldsymbol{z'''_t}$}; \draw[->](13.3,4.5)--(13.3,3.9); \node at (13.5,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](13.3,3.9)--(12.6,3.3); \node at (12.6,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](13.3,3.9)--(14,3.3); \node at (14,3.7){$\boldsymbol{0.5}$}; \node at (12.6,3){$\boldsymbol{z'''_{t_1}}$}; \node at (14,3){$\boldsymbol{z'''_{t_2}}$}; \draw[->](12.6,2.8)--(12.6,2.2); \node at (12.8,2.6){$\boldsymbol{b}$}; \draw[->](14,2.8)--(14,2.2); \node at (14.2,2.6){$\boldsymbol{b}$}; \node at (12.6,2){$\CIRCLE$}; \node at (14,2){$\CIRCLE$}; \node at (13.3,1.2){$\Z_t''' \in \res(t)$}; \end{tikzpicture} \end{center} \caption{\label{fig:strong_trace} Process $t$ is strong trace equivalent to process $s$ in Fig.~\ref{fig:ex_resolutions}} \end{figure} \begin{example} \label{ex:strong_trace} Consider process $s$ in Fig.~\ref{fig:ex_resolutions} and process $t$ in Fig.~\ref{fig:strong_trace}. We have that $s \STr t$. Briefly, it is immediate to check that the three resolutions $\Z_s ,\Z'_s,\Z''_s \in \res(s)$ in Fig.~\ref{fig:ex_resolutions} are matched resp.\ by the three resolutions $\Z_t,\Z_t',\Z_t'' \in \res(t)$ in Fig.~\ref{fig:strong_trace}. Moreover, for all other resolutions, we notice that accordingly to the chosen resolutions for processes $t_1$ and $t_2$, process $s$ can always match their traces and related probabilities by selecting the proper $a$-branch. In particular, resolution $\Z_t''' \in \res(t)$ in Fig.~\ref{fig:strong_trace} is matched by the resolution for $s$ corresponding to the rightmost $a$-branch. \end{example} \subsection{Weak probabilistic trace equivalence} We extend the set of actions $\Act$ to the set $\Acttau$ containing also the silent action $\tau$. We let $\A$ range over $\Acttau$. Usually, traces are not distinguished by any occurrence of $\tau$ in them \cite{SDC07}. Hence, we introduce the notion of \emph{equivalence of traces}. \begin{definition} [Equivalence of traces] \label{def:eqtrace} The relation of \emph{equivalence of traces} $\eqtrace \subseteq \Acttau^{\star} \times \Acttau^{\star}$ is the smallest equivalence relation satisfying \begin{inparaenum} \item $\varepsilon \eqtrace \varepsilon$ and \item given $\alpha = \A_1 \alpha'$, $\beta = \A_2 \beta'$ we have $\alpha \eqtrace \beta$ if{f} \end{inparaenum} \begin{itemize} \item either $\A_1 = \tau$ and $\alpha' \eqtrace \beta$, \item or $\A_2 = \tau$ and $\alpha \eqtrace \beta'$ \item or $\A_1 = \A_2$ and $\alpha' \eqtrace \beta'$. \end{itemize} \end{definition} For each trace $\alpha \in \Acttau^{\star}$, we denote by $[\alpha]_{\mathrm{w}}$ the equivalence class of $\alpha$ with respect to $\eqtrace$, namely $[\alpha]_{\mathrm{w}} = \{\beta \in \Acttau^{\star} \mid \beta \eqtrace \alpha\}$. Moreover, for each computation $c$, we let $\trw(c) = [\tr(c)]_{\mathrm{w}}$. Given any process $s \in \proc$ and any trace $\alpha \in \Acttau^{\star}$, we say that a computation $c \in \C(s)$ is in $\Cw(s,\alpha)$ if{f} $\tr(c) \eqtrace \alpha$ and $c$ is not a proper prefix of any other computation in $\Cw(s,\alpha)$. This is to avoid to count multiple times the same execution probabilities in the evaluation of $\pr(\Cw(s,\alpha))$. \begin{definition} [Weak probabilistic trace equivalence] \label{def:weak_trace_equivalence} Let $P=(\proc,\Act,\trans[])$ be a PTS. We say that $s,t \in \proc$ are \emph{weak probabilistic trace equivalent}, notation $s \WTr t$, if{f} it holds that: \begin{itemize} \item For each resolution $\Z_s \in \res(s)$ of $s$ there is a resolution $\Z_t \in \res(t)$ of $t$ such that for all traces $\alpha \in \Act^{\star}$ we have $ \pr(\Cw(z_s,\alpha)) = \pr(\Cw(z_t,\alpha)). $ \item For each resolution $\Z_t \in \res(t)$ of $t$ there is a resolution $\Z_s \in \res(s)$ of $s$ such that for all traces $\alpha \in \Act^{\star}$ we have $ \pr(\Cw(z_t,\alpha)) = \pr(\Cw(z_s,\alpha)). $ \end{itemize} \end{definition} \section{Trace metrics} \label{sec:trace_metrics} In this section we introduce the quantitative analogues of strong and weak probabilistic trace equivalence, namely the \emph{strong} and \emph{weak trace metric}, resp., which are $1$-bounded pseudometrics that quantify how much the behavior of two processes is apart wrt.\ the strong (resp.\ weak) probabilistic trace semantics. Our metrics are a revised version of the trace metric proposed in \cite{SDC07}. Briefly, in \cite{SDC07} there is a distinction between the notions of \emph{path} and \emph{trace}: any $\alpha \in \Acttau^{\star}$ is called path and the trace related to a path is obtained by deleting any occurrence of $\tau$ from it. The metric in \cite{SDC07} is then defined only on traces and it has inspired our strong trace metric. In the present paper we distinguish between the strong and the weak case and we regain the results in \cite{SDC07} by our equivalence of traces: the weak trace metric coincides with the strong one on the quotient space wrt.\ $\eqtrace$. \subsection{The Kantorovich and Hausdorff lifting functionals} In the literature we can find several examples of behavioral metrics on systems with probability and nondeterminism (see among others \cite{AFS09,BW01a,B05,DCPP06,DGJP04,SDC07}). In this paper we follow the approach of \cite{BW01a,DCPP06,SDC07} in which two kind of metrics are combined to obtain a metric on the system. The \emph{Kantorovich metric} \cite{K42} quantifies the disparity between the probabilistic properties of processes and it is defined by means of the notion of \emph{matching}. For any set $X$, a matching for distributions $\pi,\pi' \in \ProbDist{X}$ is a distribution over the product space $\w \in \Delta(X \times X)$ with $\pi$ and $\pi'$ as left and right marginal resp., namely $\sum_{y\in X} \w(x,y)=\pi(x)$ and $\sum_{x\in X} \w(x,y)=\pi'(y)$ for all $x,y \in X$. Let $\W(\pi,\pi')$ denote the set of all matchings for $\pi,\pi'$. \begin{definition} [Kantorovich metric, \cite{K42}] \label{def:Kantorovich} Let $d\colon X \times X \to [0,1]$ be a 1-bounded metric. The \emph{Kantorovich lifting} of $d$ is the 1-bounded metric $\Kantorovich(d)\colon \ProbDist{X} \times \ProbDist{X} \to [0,1]$ defined for all $\pi,\pi' \in \ProbDist{X}$ by \[ \Kantorovich(d)(\pi,\pi') = \min_{\w \in \W(\pi,\pi')} \sum_{x,y \in X}\w(x,y) \cdot d(x,y). \] \end{definition} We remark that since we are considering only probability distributions with finite support, the minimum over $\W(\pi,\pi')$ is well defined for all $\pi,\pi'\in \ProbDist{X}$. The \emph{Hausdorff metric} allows us to lift any distance over probability distributions to a distance over sets of probability distributions. \begin{definition} [Hausdorff metric] \label{def:Hausdorff} Let $\hat{d} \colon \ProbDist{X} \times \ProbDist{X} \to [0,1]$ be a 1-bounded metric. The \emph{Hausdorff lifting} of $\hat{d}$ is the $1$-bounded metric $\Hausdorff(\hat{d})\colon \powset{\ProbDist{X}} \times \powset{\ProbDist{X}} \to [0,1]$ defined by \[ \Hausdorff(\hat{d})(\Pi_1,\Pi_2) = \max \Big\{ \sup_{\pi_1 \in \Pi_1}\inf_{\pi_2 \in \Pi_2} \hat{d}(\pi_1,\pi_2), \sup_{\pi_2\in \Pi_2}\inf_{\pi_1\in \Pi_1} \hat{d}(\pi_2,\pi_1) \Big\} \] for all $\Pi_1,\Pi_2 \subseteq \ProbDist{X}$, where $\inf \emptyset = 1$, $\sup \emptyset = 0$. \end{definition} Hence, given two processes $s,t\in \proc$, the idea is to quantify the distance between each pair of their resolutions by exploiting the Kantorovich metric, which quantifies the disparities in the probabilities of the two processes to execute the same traces. Then, we lift this distance on resolutions to a distance between $s$ and $t$ by means of the Hausdorff metric. Intuitively, as each resolution captures a different set of nondeterministic choices of a process, we use the Hausdorff metric to compare the possible choices of the two processes and to match them in order to obtain the minimal distance. \subsection{Strong trace metric} \label{sec:strong_trace_metric} To define the strong trace metric we start from a distance between traces, defined as the discrete metric over traces: two traces are at distance $1$ if they are distinct, otherwise the distance is set to $0$. Differently from \cite{SDC07} we do not consider any discount on the distance between traces. Trace equivalences, and thus metrics, are usually employed when the observations on the system cannot be done in a step-by-step fashion, but only the total behavior of the system can be observed. Hence, a step-wise discount does not fit in this setting. However, the discount would not introduce any technical issue. \begin{definition} [Distance between traces] \label{def:trace_metric_traces} The \emph{distance between traces} $d_T \colon \Act^{\star} \times \Act^{\star} \to [0,1]$ is defined for any pair of traces $\alpha, \beta \in \Act^{\star}$ by \[ d_T(\alpha, \beta) = \begin{cases} 0 & \text{ if } \alpha = \beta \\ 1 & \text{ otherwise.} \end{cases} \] \end{definition} Following \cite{SDC07} we aim to lift the distance $d_T$ to a distance between resolutions by means of the Kantorovich lifting functiona which, we recall, is defined on probability distributions. As shown in the following example, we are not guaranteed that the function $\pr(\C(\_,\_))$ defines a probability distribution on the set of traces of a resolution. \begin{example} \label{ex:Pr_not_prob_dist} Consider process $t$ and the resolution $\Z_r \in \res(t)$ for it, represented in Fig.~\ref{fig:strong_trace}. We can distinguish three computations for $z_t$: \[ \begin{array}{l} c_1 = z_t \ctrans[a] z_{t_1} \\ c_2 = z_t \ctrans[a] z_{t_2} \\ c_3 = z_t \ctrans[a] z_{t_2} \ctrans[d] \mathrm{nil}. \end{array} \] Clearly, $\tr(\C(z_t)) = \{a, ad\}$. Then we have \[ \begin{array}{l} \pr(\C(z_t,a)) = \sum_{c \in \C(z_t,a)} \pr(c) = \pr(c_1) + \pr(c_2) = 1 \\[0.5 ex] \pr(\C(z_t,ad)) = \sum_{c \in \C(z_t,ad)} \pr(c) = \pr(c_3) = 0.5 \end{array} \] from which we gather \[ \sum_{\alpha \in \tr(\C(z_t))} \pr(\C(z_t,\alpha)) = \pr(\C(z_t,a)) + \pr(\C(z_t,ad)) = 1 + 0.5 > 1. \] \end{example} However, as shown in the following lemma, if we consider only maximal computations we obtain a probability distribution over traces. \begin{lemma} \label{lem:prob_computation_sum_to_1} Consider any resolution $\Z \in \res(\proc)$ with initial state $z$. We have that $\sum_{c \in \C_{\max}(z)} \pr(c) = 1$. \end{lemma} \begin{proof} We proceed by induction over the depth of $z$. The base case $\depth{z}=0$ is immediate since we have that $\C(z) = \{\varepsilon\}$ and $\pr(\varepsilon) = 1$. Consider now the inductive step $\depth{z}>0$. Assume, wlog., that $z \trans[a]_{\Z} \pi$. Therefore, each trace $c \in \C_{\max}(z)$ will be of the form $c = z \ctrans[a] c'$ for some $c' \in \C_{\max}(z')$ for any $z' \in \support(\pi)$ and moreover for such a trace $c$ it holds that $\pr(c) = \pi(z') \pr(c')$. Thus we have \[ \begin{array}{llr} \sum_{c \in \C_{\max}(z)} \pr(c) &={} \sum_{z' \in \support(\pi) \atop c' \in \C_{\max}(z')} \pi(z') \pr(c') \\ & ={} \sum_{z' \in \support(\pi)} \pi(z') \Big( \sum_{c' \in \C_{\max}(z')}\pr(c') \Big) \\ & ={}\sum_{z' \in \support(\pi)} \pi(z') \cdot 1 & \text{(by induction over $\depth{z'} < \depth{z}$)} \\ & ={} 1. \end{array} \] \end{proof} \begin{definition} [Trace distribution] \label{def:trace_distribution} Consider any resolution $\Z \in \res(\proc)$, with initial state $z$. We define the \emph{trace distribution} of $\Z$ as the function $\TD_{\Z} \colon \Act^{\star} \to [0,1]$ defined for each $\alpha \in \Act^{\star}$ by \[ \TD_{\Z}(\alpha) = \pr(\C_{\max}(z,\alpha)). \] \end{definition} Notice that only maximal computations are in the support of $\TD_{\Z}$. This guarantees that $\TD_{\Z}$ is a distribution. \begin{lemma} \label{lem:trace_distribution} Consider any resolution $\Z \in \res(\proc)$, with initial state $z$. Then the trace distribution $\TD_{\Z}$ of $\Z$ is a probability distribution over $\Act^{\star}$. \end{lemma} \begin{proof} By definition and by Lemma~\ref{lem:prob_computation_sum_to_1} we have that for each $\alpha \in \Act^{\star}$ \[ 0 \le \pr(\C_{\max}(z,\alpha)) = \sum_{c \in \C_{\max}(z,\alpha)} \pr(c) \le \sum_{c \in \C_{\max}(z)} \pr(c) = 1 \] Hence, we are guaranteed that $\TD_{\Z}(\alpha) \in [0,1]$ for each $\alpha \in \Act^{\star}$. Thus, to prove the thesis we simply need to show that $\sum_{\alpha \in \Act^{\star}} \TD_{\Z}(\alpha) = 1$. We have that \[ \begin{array}{rlr} \sum_{\alpha \in \Act^{\star}} \TD_{\Z}(\alpha) ={} & \sum_{\alpha \in \Act^{\star}} \pr(\C_{\max}(z,\alpha)) \\ ={} & \sum_{\alpha \in \tr(\C_{\max}(z))} \pr(\C_{\max}(z,\alpha)) \\ ={} & \sum_{\alpha \in \tr(\C_{\max}(z)), c \in \C_{\max}(z,\alpha)} \pr(c) \\ ={} & \sum_{c \in \bigcup_{\alpha \in \tr(\C_{\max}(z))} \C_{\max}(z,\alpha)} \pr(c) \\ ={} & \sum_{c \in \C_{\max}(z)} \pr(c) \\ ={} & 1 \end{array} \] where \begin{itemize} \item the second equality follows from the fact that by definition $\pr(\C_{\max}(z,\alpha)) = 0$ for each $\alpha \not \in \tr(\C_{\max}(z))$; \item the fourth equality follows from the fact that each maximal computation of $z$ belongs to a set $\C_{\max}(z,\alpha)$ for at most one trace $\alpha$, namely $\bigcup_{\alpha \in \tr(\C_{\max}(z))} \C_{\max}(z,\alpha)$ is a disjoint union (and therefore no probability weight is counted more than once); \item the fifth equality follows by the fact that the disjoint union $\bigcup_{\alpha \in \tr(\C_{\max}(z))} \C_{\max}(z,\alpha)$ is a partition of $\C_{\max}(z)$; \item the sixth equality follows by Lemma~\ref{lem:prob_computation_sum_to_1}. \end{itemize} \end{proof} We remark that function $\TD_{\_}$ plays the role of the \emph{trace distribution} introduced in \cite{S95tr}. Formally, in \cite{S95tr} the trace distribution for a resolution is defined as the probability space built over its set of traces. Here, we simply identify it with the probability distribution defined on the probability space. In this setting, two resolutions are said to be \emph{trace distribution equivalent} if they have the same trace distribution and thus two processes are trace equivalent if their resolutions are pairwise equivalent. \begin{lemma} \label{lem:computations_same_sum} Consider any resolution $\Z \in \res(\proc)$ with initial state $z$. Consider any trace $\alpha \in \Act^{\star}$. Then $\pr(\C(z,\alpha)) = \sum_{c \in P_{\max}(z,\alpha)} \pr(c)$, where $P_{\max}(z,\alpha)$ is the set of maximal computations from $z$ having a prefix which is compatible with $\alpha$. \end{lemma} \begin{proof} For simplicity let us distinguish two cases. \begin{enumerate} \item $\pr(\C(z,\alpha)) = 0$. This implies that there is no computation from $z$ which is compatible with $\alpha$. Clearly, this gives that there can not be any maximal computation from $z$ having a prefix compatible with $\alpha$, namely $P_{\max}(z,\alpha) = \emptyset$. Thus we have $\sum_{c \in P_{\max}(z,\alpha)} \pr(c) = 0$ from which the thesis follows. \item $\pr(\C(z,\alpha)) > 0$. In this case, we proceed by induction over $|\alpha|$. \begin{itemize} \item Base case $|\alpha|=0$, namely $\alpha = \varepsilon$. The only computation compatible with $\alpha$ is the empty computation for which it holds that $\pr(\C(z,\alpha)) = 1$. Since the empty computation is a prefix for all computations from $z$ we have that $P_{\max}(z,\alpha) = \C_{\max}(z)$. By Lemma~\ref{lem:prob_computation_sum_to_1} we have that $\sum_{c \in \C_{\max}(z)}\pr(c) = 1$ and thus the thesis follows. \item Inductive step $|\alpha|>0$. Assume wlog that the only transition inferable for $z$ in $\Z$ is $z \trans[a]_{\Z}\pi$. Hence $\alpha = a\alpha'$ for some $\alpha' \in \Act^{\star}$, with $|\alpha'|< |\alpha|$. Then we have \[ \begin{array}{rlr} \pr(\C(z,\alpha)) ={} & \sum_{z' \in \support(\pi)} \pi(z') \pr(\C(z',\alpha')) \\ ={} & \sum_{z' \in \support(\pi)} \Big( \pi(z') \cdot \sum_{c' \in P_{\max}(z',\alpha')} \pr(c') \Big) & \text{(by induction over $|\alpha'|$)}\\ ={} & \sum_{z' \in \support(\pi),\, c' \in P_{\max}(z',\alpha')} \pi(z') \pr(c') \\ ={} & \sum_{c \in P_{\max}(z,a\alpha')} \pr(c) \end{array} \] where the last equality follows by considering that \[ P_{\max}(z,a\alpha') = \Big\{ c \mid c = z \trans[a]_{\Z} c' \text{ and } c' \in \bigcup_{z'\in \support(\pi)}P_{\max}(z',\alpha') \Big\}. \] \end{itemize} \end{enumerate} \end{proof} \begin{proposition} \label{prop:equivalence_S95tr_BdNL14_strong} For any pair of resolutions $\Z_1,\Z_2 \in \res(\proc)$, with initial states $z_1,z_2$ resp., we have that $\TD_{\Z_1} = \TD_{\Z_2}$ if{f} $\Pr(\C(z_1,\alpha)) = \Pr(\C(z_2,\alpha))$ for all traces $\alpha \in \Act^{\star}$. \end{proposition} \begin{proof} The thesis follows by applying the same arguments used it the proof of Theorem~\ref{thm:equivalent_resolutions} below. \end{proof} Hence, we can now follow \cite{SDC07} to define the \emph{trace metric}. \begin{definition} [Trace distance on resolutions] \label{def:trace_metric_det_res} The \emph{trace distance on resolutions} $D_T \colon \res(\proc) \times \res(\proc) \to [0,1]$ is defined for any $\Z_1,\Z_2 \in \res(\proc)$ by \[ D_T(\Z_1,\Z_2) = \Kantorovich(d_T)(\TD_{\Z_1}, \TD_{\Z_2}). \] \end{definition} \begin{proposition} [\!\protect{\cite[Proposition~2]{SDC07}}] \label{prop:kernel_trace_distribution} The kernel of $D_T$ is strong trace distribution equivalence of resolutions. \end{proposition} To deal with nondeterministic choices, we lift the distance over deterministic resolutions to a pseudometric over processes by means of the Hausdorff lifting functional. \begin{definition} [Strong trace metric] \label{def:trace_metric} \emph{Strong trace metric} $\TraceMetric \colon \proc \times \proc \to [0,1]$ is defined for all $s,t \in \proc$ as \[ \TraceMetric(s,t) = \Hausdorff(D_T)(\res(s), \res(t)). \] \end{definition} \begin{proposition} [\!\protect{\cite[Proposition~3]{SDC07}}] \label{prop:kernel_trace_equivalent} The kernel of $\TraceMetric$ is probabilistic strong trace equivalence. \end{proposition} \begin{figure} \begin{center} \begin{tikzpicture} \node at (2.1,4.7){$\boldsymbol{s}$}; \draw[->](2.1,4.5)--(1.4,3.9); \node at (1.6,4.3){$\boldsymbol{a}$}; \draw[->](2.1,4.5)--(2.8,3.9); \node at (2.7,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](1.4,3.9)--(0.7,3.3); \node at (0.7,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](1.4,3.9)--(2.1,3.3); \node at (2.1,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](2.8,3.9)--(2.8,3.3); \node at (3,3.7){$\boldsymbol{1}$}; \node at (0.7,3){$\boldsymbol{s_1}$}; \node at (2.1,3){$\boldsymbol{s_2}$}; \node at (2.8,3){$\boldsymbol{s_3}$}; \draw[->](0.7,2.8)--(0,2.2); \node at (0.1,2.5){$\boldsymbol{b}$}; \draw[->](0.7,2.8)--(1.4,2.2); \node at (1.3,2.5){$\boldsymbol{c}$}; \draw[->](2.1,2.8)--(2.1,2.2); \node at (2.3,2.5){$\boldsymbol{d}$}; \draw[->](2.8,2.8)--(2.8,2.2); \node at (3,2.5){$\boldsymbol{b}$}; \node at (0,2){$\CIRCLE$}; \node at (1.4,2){$\CIRCLE$}; \node at (2.1,2){$\CIRCLE$}; \node at (2.8,2){$\CIRCLE$}; \node at (5.95,4.7){$\boldsymbol{t}$}; \draw[->](5.95,4.5)--(5.95,3.9); \node at (6.2,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](5.95,3.9)--(4.9,3.3); \node at (4.9,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](5.95,3.9)--(7,3.3); \node at (7,3.7){$\boldsymbol{0.5}$}; \node at (4.9,3){$\boldsymbol{t_1}$}; \node at (7,3){$\boldsymbol{t_2}$}; \draw[->](4.9,2.8)--(4.2,2.2); \node at (4.4,2.6){$\boldsymbol{b}$}; \draw[->](4.9,2.8)--(5.6,2.2); \node at (5.4,2.6){$\boldsymbol{c}$}; \draw[->](7,2.8)--(6.3,2.2); \node at (6.5,2.6){$\boldsymbol{b}$}; \draw[->](7,2.8)--(7.7,2.2); \node at (7.5,2.6){$\boldsymbol{d}$}; \node at (4.2,2){$\CIRCLE$}; \node at (5.6,2){$\CIRCLE$}; \node at (6.3,2){$\CIRCLE$}; \node at (7.7,2){$\CIRCLE$}; \node at (9.8,4.7){$\boldsymbol{z_s}$}; \draw[->](9.8,4.5)--(9.8,3.9); \node at (10,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](9.8,3.9)--(9.1,3.3); \node at (9.1,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](9.8,3.9)--(10.5,3.3); \node at (10.5,3.7){$\boldsymbol{0.5}$}; \node at (9.1,3){$\boldsymbol{z_{s_1}}$}; \node at (10.5,3){$\boldsymbol{z_{s_2}}$}; \draw[->](9.1,2.8)--(9.1,2.2); \node at (9.3,2.6){$\boldsymbol{c}$}; \node at (9.1,2){$\CIRCLE$}; \node at (9.8,1.2){$\Z_s \in \res(s)$}; \node at (12.6,4.7){$\boldsymbol{z_t}$}; \draw[->](12.6,4.5)--(12.6,3.9); \node at (12.8,4.3){$\boldsymbol{a}$}; \draw[dotted,thick,->](12.6,3.9)--(11.9,3.3); \node at (11.9,3.7){$\boldsymbol{0.5}$}; \draw[dotted,thick,->](12.6,3.9)--(13.3,3.3); \node at (13.3,3.7){$\boldsymbol{0.5}$}; \node at (11.9,3){$\boldsymbol{z_{t_1}}$}; \node at (13.3,3){$\boldsymbol{z_{t_2}}$}; \draw[->](11.9,2.8)--(11.9,2.2); \node at (12.1,2.6){$\boldsymbol{c}$}; \draw[->](13.3,2.8)--(13.3,2.2); \node at (13.5,2.6){$\boldsymbol{b}$}; \node at (11.9,2){$\CIRCLE$}; \node at (13.3,2){$\CIRCLE$}; \node at (12.6,1.2){$\Z_t \in \res(t)$}; \end{tikzpicture} \end{center} \caption{\label{fig:strong_metric} Processes $s,t$ are such that $s \not\STr t$ and $\TraceMetric(s,t) = 0.5$.} \end{figure} \begin{example} \label{ex:strong_metric} Consider processes $s,t$ in Fig.~\ref{fig:strong_metric}. We have that $s \not \STr t$. Notice that none of the resolutions for $s$ can exhibit both traces $ab$ and $ac$. Thus, whenever we chose resolution $\Z_t \in \res(t)$ in Fig.~\ref{fig:strong_metric} for $t$, then there is no resolution for $s$ that can match $\Z_t$ on all traces. Let us evaluate the trace distance between $s$ and $t$. Since resolution $\Z_t$ for $t$ distinguishes the two processes, we start by evaluating its distance from the resolutions for $s$. Consider the resolution $\Z_s \in \res(s)$ in Fig.~\ref{fig:strong_metric}. By Def.~\ref{def:trace_distribution}, we have \[ \TD_{\Z_s} = 0.5 \delta_{ac} + 0.5 \delta_{a} \qquad \TD_{\Z_t} = 0.5 \delta_{ac} + 0.5 \delta_{ab}. \] Clearly, $d_T(ac,ac) = 0$ and $d_T(ac,a) = d_T(ac,ab) = d_T(a,ab) = 1$. Thus, by Def~\ref{def:trace_metric_det_res} we have \[ \begin{array}{rlr} D_T(\Z_s,\Z_t) ={} & \Kantorovich(d_T)(\TD_{\Z_s}, \TD_{\Z_t}) \\ ={} & \min_{\w \in \W(\TD_{\Z_s}, \TD_{\Z_t})} \sum_{\alpha \in \support(\TD_{\Z_s}), \beta \in \support(\TD_{\Z_t})} \w(\alpha,\beta) \cdot d_T(\alpha,\beta) \\ ={} & 0.5 \cdot d_T(ac,ac) + 0.5 \cdot d_T(a,ab) \\ ={} & 0.5 \end{array} \] where to minimize the distance we have matched the two occurrences of the trace $ac$. By similar calculations, one can easily obtain that \[ 0.5 = D_T(\Z_t,\Z_s) = \sup_{\Z_2 \in \res(t)}\, \inf_{\Z_1 \in \res(s)}\, D_T(\Z_2,\Z_1). \] Moreover, it is immediate to check that whichever resolution for $s$ we choose, there is always a resolution for $t$ which is at trace distance $0$ from it, namely \[ 0 = \sup_{\Z_1 \in \res(s)}\, \inf_{\Z_2 \in \res(t)} D_T(\Z_1,\Z_2). \] Therefore, we can conclude that \[ \TraceMetric(s,t) = \Hausdorff(D_T)(\res(s), \res(t)) = \max\{0,\, 0.5\} = 0.5 \] \end{example} \subsection{Weak trace metric} \label{sec:weak_trace_metric} To obtain the quantitative analogue of the weak trace equivalence, it is enough to adapt the notion of distance between traces (Definition~\ref{def:trace_metric_traces}) to the weak context. The idea is that since silent steps cannot be observed, then they should not count on the trace distance. Thus we introduce the notion of \emph{weak distance between traces} which is a $1$-bounded pseudometric over $\Acttau^{\star}$ having $\eqtrace$ as kernel. \begin{definition} [Weak distance between traces] \label{def:weak_trace_metric_traces} The \emph{weak distance between traces} $\dw \colon \Acttau^{\star} \times \Acttau^{\star} \to [0,1]$ is defined for any pair of traces $\alpha, \beta \in \Acttau^{\star}$ by \[ \dw (\alpha, \beta) = \begin{cases} 0 & \text{ if } \alpha \eqtrace \beta \\ 1 & \text{ otherwise.} \end{cases} \] \end{definition} It is clear that $\dw$ is a $1$-bounded pseudometric whose kernel is the equivalence of traces. By substituting $d_T$ with $\dw$ in Definition~\ref{def:trace_metric_det_res} we obtain the notion of \emph{weak trace distance between resolutions}, denoted by the $1$-bounded pseudometric $\Dw$. By lifting the relation of equivalence of traces $\eqtrace$ to an equivalence on probability distributions over traces $\eqtrace^{\dagger}$, we obtain that the kernel of $\Dw$ is given by the lifted equivalence on trace distributions, namely by the weak trace distribution equivalence of resolutions. We can prove that our characterization of weak trace equivalence is equivalent to the one proposed in \cite{S95tr} in terms of trace distributions. To simplify the reasoning in the upcoming proofs, let us define the weak version of the trace distribution given in Definition~\ref{def:trace_distribution}. The idea is that we want to define a probability distribution on the traces executable by a resolution up-to trace equivalence. \begin{definition} \label{def:weak_trace_distribution} Let $s \in \proc$ and consider any resolution $\Z \in \res(\proc)$, with $z = \corr{\Z}^{-1}(s)$. We define the \emph{weak trace distribution} for $\Z$ as the function $\TDw_{\Z} \colon \Acttau^{\star} \to [0,1]$ defined by $ \TDw_{\Z}(\alpha) = \Pr(\Cw_{\max}(z,\alpha)). $ \end{definition} \begin{lemma} \label{lem:weak_trace_distribution} For each $\Z \in \res(\proc)$, the weak trace distribution $\TDw_{\Z}$ is a probability distribution over $\Act^{\star}$. \end{lemma} \begin{proof} The thesis follows by applying the same arguments used in the proof of Lemma~\ref{lem:trace_distribution} above. \end{proof} \begin{remark} \label{rmk:tdw_probability} Notice that $\TDw_{\_}$ is not a probability distribution over $\Acttau^{\star}$. In fact it is enough to consider the simple resolution $\Z$ having $z$ as initial state for which the only transition in $\Z$ is $c = z \trans[a]_{\Z} \delta_{\nihl}$, namely $z$ executes $a$ and then with probability $1$ it ends its execution. Clearly we have that $a \eqtrace \tau^{n} a \tau^{m}$ for all $n,m \ge 0$. Let $\alpha_{n,m} = \tau^{n} a \tau^{m}$. Then by definition of weak trace distribution (Definition~\ref{def:weak_trace_distribution}) we would have that $\TDw_{\Z}(\alpha_{n,m}) = \pr(\Cw_{\max}(z,\alpha_{n,m})) = \pr(c) = 1$, for all $n,m \ge 0$. Clearly this would imply that $\sum_{\alpha \in \Acttau^{\star}} \TDw_{\Z}(\alpha) = \sum_{n,m \ge 0} \TDw_{\Z}(\alpha_{n,m}) > 1$. However we remark hat $\TD_{\Z}$ is a probability distribution over $\Acttau^{\star}$ and thus $\Dw$ is well defined. \end{remark} We aim to show now that there is a strong relation between the trace distribution for a resolution and its weak version: they are equivalent distributions. \begin{lemma} \label{lem:equivalent_TD} For each $\Z \in \res(\proc)$ we have that $\TD_{\Z} \eqtrace^{\dagger} \TDw_{\Z}$. \end{lemma} \begin{proof} The thesis follows by applying the same arguments used in the proof of Lemma~\ref{lem:mimicking_equiv_weak_mimicking} below. \end{proof} \begin{proposition} \label{prop:equivalent_definitions_of_weak} For any pair of resolutions $\Z_1, \Z_2 \in \res(\proc)$, with initial states $z_1$ and $z_2$ resp., we have that $\TD_{\Z_1} \eqtrace^{\dagger} \TD_{\Z_2}$ if{f} $\pr(\Cw(z_1, \alpha)) = \pr(\Cw(z_2,\alpha))$ for all $\alpha \in \Act^{\star}$. \end{proposition} \begin{proof} The thesis follows by the same arguments used in the proof of Theorem~\ref{thm:equivalent_resolutions_weak} below. \end{proof} \begin{proposition} \label{prop:kernel_weak_trace_metric_det_res} The kernel of $\Dw$ is weak trace distribution equivalence of resolutions. \end{proposition} \begin{proof} The thesis follows by the same arguments used in the proof of Theorem~\ref{thm:kernel_of_Dtrddw} below. \end{proof} By substituting $D_T$ with $\Dw$ in Definition~\ref{def:trace_metric} we obtain the notion of \emph{weak trace metric}, denoted by the $1$-bounded pseudometric $\wTraceMetric$. \begin{definition} [Weak trace metric] \label{def:weak_trace_metric} The \emph{weak trace metric} $\wTraceMetric \colon \proc \times \proc \to [0,1]$ is defined for all $s,t \in \proc$ as \[ \wTraceMetric(s,t) = \Hausdorff(\Dw)(\res(s), \res(t)). \] \end{definition} The kernel of the weak trace metric is weak trace equivalence. \begin{proposition} \label{prop:kernel_weak_trace_metric} The kernel of $\wTraceMetric$ is probabilistic weak trace equivalence. \end{proposition} \begin{proof} ($\Rightarrow$) Assume first that $\wTraceMetric(s,t) = 0$. We aim to show that $s \WTr t$. Since \begin{itemize} \item by definition $\wTraceMetric(s,t) = \Hausdorff(\Dw)(\res(s),\res(t))$ and \item the kernel of $\Dw$ is $\eqtrace^{\dagger}$ by Proposition~\ref{prop:kernel_weak_trace_metric_det_res} \end{itemize} from $\wTraceMetric(s,t) = 0$ we can infer that $\res(s) \eqtrace^{\dagger} \res(t)$. Then, by Proposition~\ref{prop:equivalent_definitions_of_weak} we can conclude that $s \WTr t$. ($\Leftarrow$) Assume now that $s \WTr t$. We aim to show that this implies that $\wTraceMetric(s,t) = 0$. By Proposition~\ref{prop:equivalent_definitions_of_weak} we have that $s \WTr t$ implies that $\res(s) \eqtrace^{\dagger} \res(t)$. Since the kernel of $\Dw$ is given by $\eqtrace^{\dagger}$ (Proposition~\ref{prop:kernel_weak_trace_metric_det_res}), we can infer \[ \wTraceMetric(s,t) = \Hausdorff(\Dw)(\res(s), \res(t)) = 0. \] \end{proof} \section{Modal logics for traces} \label{sec:logic_for_traces} In this section we introduce two minimal modal logics $\LL$ and $\LLw$ that will allow us to characterize resp.\ the strong trace metric and its weak version, as well as the equivalences constituting their kernels. The logic $\LL$ (and consequently $\LLw$) can be seen either as a simplified version of the modal logic $\logic$ from \cite{DD11}, which has been successfully employed in \cite{CGT16a} to characterize the bisimilarity metric \cite{DGJP04,BW01a,DCPP06}, or more simply as a probabilistic version of the logic characterizing the trace semantics in the fully nondeterministic case \cite{BFvG04}. More precisely, $\LL$ consists of two classes of formulae. The class $\LLt$ of \emph{trace formulae}, which are constituted by (finite) sequences of diamond operators and that will be used to represent traces, exactly as in the fully nondeterministic case. Then, since we are treating traces as \emph{distributions over traces}, to capture the considered trace semantics we introduce the class $\LLd$ of \emph{trace distribution formulae}, which are defined by a probabilistic choice operator $\bigoplus$ as \emph{probability distributions over trace formulae}. \begin{definition} [Modal logic $\LL$] \label{def:logic_LL} The classes of \emph{trace distribution formulae} $\LLd$ and \emph{trace formulae} $\LLt$ over $\Act$ are defined by the following BNF-like grammar: \[ \LLd\colon\; \Psi ::= \; \displaystyle \bigoplus_{i \in I} r_i \Phi_i \qquad\qquad \LLt \colon\; \Phi ::= \; \top \ | \ \diam{a}\Phi \] where: \begin{inparaenum}[(i)] \item $\Psi$ ranges over $\LLd$, \item $\Phi$ ranges over $\LLt$, \item $a\in\Act$, \item $I \neq \emptyset$ is a finite set of indexes, \item the formulae $\Phi_i$ for $i \in I$ are pairwise distinct, namely $\Phi_i \neq \Phi_j$ for each $i,j \in I$ with $i \neq j$ and \item for all $i\in I$ we have $r_i\in (0,1]$ and $\sum_{i\in I} r_i = 1$. \end{inparaenum} \end{definition} To improve readability, we shall write $r_1\Phi_1 \oplus r_2 \Phi$ for $\bigoplus_{i \in I} r_i \Phi_i$ with $I=\{1,2\}$ and $\Phi$ for $\bigoplus_{i \in I} r_i \Phi_i$ with $I = \{i\}$, $r_i = 1$ and $\Phi_i = \Phi$. \begin{definition} [Depth] \label{def:depth_LL} The \emph{depth of trace distribution formulae} in $\LLd$ is defined as $\depth{\bigoplus_{i \in I} r_i \Phi_i} = \max_{i \in I} \depth{\Phi_i}$ where the \emph{depth of trace formulae} in $\LLt$ is defined by induction on their structure as \begin{inparaenum}[(i)] \item $\depth{\top} = 0$ and \item $\depth{\diam{a}\Phi} = 1+ \depth{\Phi}$. \end{inparaenum} \end{definition} \begin{definition} [Semantics of $\LLt$] \label{def:satisfiability_LLt} The \emph{satisfaction relation} $\models \, \subseteq \C \times \LLt$ is defined by structural induction over trace formulae in $\LLt$ by \begin{itemize} \item $c \models \top$ always; \item $c \models \diam{a}\Phi$ if{f} $c = s \ctrans[a] c'$ for some computation $c'$ such that $c' \models \Phi$. \end{itemize} \end{definition} We say that a computation $c$ from a process $s$ is \emph{compatible} with the trace formula $\Phi \in \LLt$, notation $c \in \Ct(s,\Phi)$, if $c \models \Phi$ and $|c| = \depth{\Phi}$. \begin{definition} [Semantics of $\LLd$] \label{def:satisfiability_LLd} The \emph{satisfaction relation} $\models \, \subseteq \proc \times \LLd$ is defined by \begin{itemize} \item $s \models \bigoplus_{i \in I} r_i \Phi_i$ if{f} there is a resolution $\Z \in \res(s)$ with $z = \corr{\Z}^{-1}(s)$ such that for each $i \in I$ we have $ \pr(\Ct_{\max}(z,\Phi_i)) = r_i. $ \end{itemize} \end{definition} We let $\LL(s)$ denote the set of formulae satisfied by process $s \in \proc$, namely $\LL(s) = \{\Psi \in \LLd \mid s \models \Psi\}$. \begin{example} \label{ex:logic} Consider process $t$ in Fig.~\ref{fig:strong_metric}. It is easy to verify that $t \models 0.5 \diam{a}\diam{c}\top \oplus 0.5 \diam{a}\diam{b}\top$. In fact, if we consider the resolution $\Z_t \in \res(t)$ in the same figure, we have that the computation $c_1 = z_t \ctrans[a] z_{t_1} \ctrans[c] \mathrm{nil}$ is compatible with the trace formula $\diam{a}\diam{c}\top$ and that the computation $c_2 = z_t \ctrans[a] z_{t_2} \ctrans[b] \mathrm{nil}$ is compatible with the trace formula $\diam{a}\diam{b}\top$. Moreover, we have $\pr(\Ct_{\max}(z_t,\diam{a}\diam{c}\top)) = 0.5$ and $\pr(\Ct_{\max}(z_t,\diam{a}\diam{b}\top)) = 0.5$. \end{example} The modal logic $\LLw$ differs from $\LL$ solely in the labels of the diamonds in $\LLwt$ which range over $\Acttau$ in place of $\Act$. Hence, syntax and semantics of $\LLw$ directly follow from Definition~\ref{def:logic_LL} and Defs.~\ref{def:satisfiability_LLt}-\ref{def:satisfiability_LLd}, resp. We let $\LLw(s)$ denote the set of formlae satisfied by process $s \in \proc$, namely $\LLw(s) = \{\Psi \in \LLwd \mid s \models \Psi\}$. We introduce the $\LLw$-\emph{equivalence} which extends the equivalence of traces $\eqtrace$ to trace formulae. \begin{definition} [$\LLw$-equivalence of formulae] \label{def:equivalence_of_formulae} The relation of $\LLw$-\emph{equivalence of trace formulae} $\eqtrace \subseteq \LLwt \times \LLwt$ is the smallest equivalence relation satisfying \begin{inparaenum}[(i)] \item $\top \eqtrace \top$ and \item $\diam{\A_1}\Phi_1 \eqtrace \diam{\A_2}\Phi_2$ if{f} \end{inparaenum} \begin{itemize} \item either $\A_1 = \tau$ and $\Phi_1 \eqtrace \diam{\A_2}\Phi_2$, \item or $\A_2 = \tau$ and $\diam{\A_1}\Phi_1 \eqtrace \Phi_2$ \item or $\A_1 = \A_2$ and $\Phi_1 \eqtrace \Phi_2$. \end{itemize} Then, the relation of $\LLw$-\emph{equivalence of trace distribution formulae} $\eqtrace^{\dagger} \subseteq \LLwd \times \LLwd$ is obtained by lifting $\eqtrace$ to a relation on probability distributions over trace formulae. \end{definition} \begin{remark} \label{rmk:equivalence_is_equality} Clearly we have $\LLw_{/\eqtrace} = \LL$, namely the notion of $\eqtrace$ coincides with the equality of formulae when restricted to $(\LLd \times \LLd) \cup (\LLt \times \LLt)$. Given any $\Psi_1,\Psi_2 \in \LLd$, we say that $\Psi_1 = \Psi_2$ if they express the same probability distribution over trace formulae. \end{remark} Notice that we are using the same symbol $\eqtrace$ to denote both the equivalence of traces and $\LLw$-equivalence. The meaning will always be clear from the context. \section{Logical characterization of relations} \label{sec:char_of_trace_equivalence} In this section we present the characterization of strong (resp.\ weak) trace equivalence by means of $\LL$ (resp.\ $\LLw$) (Theorem~\ref{thm:det_char} and Theorem~\ref{thm:weak_char}). Following \cite{CGT16a}, we introduce the notion of \emph{mimicking formula} of a resolution as a formula expressing the trace distribution for that resolution. Mimicking formulae characterize the (weak) trace distribution equivalence of resolutions: two resolutions are (weak) trace distribution equivalent if{f} their mimicking formulae are equal (resp.\ $\LLw$-equivalent) (Theorem~\ref{thm:equivalent_resolutions} and Theorem~\ref{thm:equivalent_resolutions_weak}). The \emph{mimicking formula} of a resolution $\Z \in \res(\proc)$ is defined as a trace distribution formula assigning a positive weight only to the maximal traces of $\Z$. Hence, we need to identify each maximal trace of $\Z$ with a proper trace formula. This is achieved through the notion of \emph{tracing formula} of a trace. \begin{definition} [Tracing formula] \label{def:tracing_formula} Given any trace $\alpha \in \Act^{\star}$ we define the \emph{tracing formula} of $\alpha$, notation $\Phi_{\alpha} \in \LLt$, inductively on the structure of $\alpha$ as follows: \[ \Phi_{\alpha} = \begin{cases} \top & \text{ if } \alpha = \varepsilon \\ \diam{a}\Phi_{\alpha'} & \text{ if } \alpha = a \alpha', \alpha' \in \Act^{\star}. \end{cases} \] \end{definition} \begin{lemma} \label{lem:computation_and_tracing_formula} Let $s \in \proc$ and $\alpha \in \Act^{\star}$. For each $c \in \C(s)$ we have $\tr(c) = \alpha$ if{f} $c \models \Phi_{\alpha}$ and $|c| = \depth{\Phi_{\alpha}}$. \end{lemma} \begin{proof} ($\Rightarrow$) Assume first that $\tr(c)= \alpha$. We aim to show that this implies that $|c| = \depth{\Phi_{\alpha}}$ and $c \models \Phi_{\alpha}$. To this aim we proceed by induction over $|c|$. \begin{itemize} \item Base case $|c| = 0$, namely $c$ is the empty computation. Since $\alpha = \tr(c)$, this gives that $\alpha = \varepsilon$ and therefore, by Def.~\ref{def:tracing_formula}, $\Phi_{\varepsilon} = \top$. Then from Def.~\ref{def:depth_LL} we gather $\depth{\Phi_{\alpha}} = 0 = |c|$ and by Def.~\ref{def:satisfiability_LLt} we are guaranteed that $c \models \Phi_{\varepsilon}$. \item Inductive step $|c| > 0$. Assume wlog that $c = s \ctrans[a] c'$. In particular this implies that $|c'| < |c|$. Therefore, from $\alpha = \tr(c)$ we get that $\alpha$ must be of the form $\alpha = a\alpha'$ for $\alpha' = \tr(c')$. By Def.~\ref{def:tracing_formula}, $\alpha = a\alpha'$ implies $\Phi_{\alpha} = \diam{a}\Phi_{\alpha'}$. From $\alpha'= \tr(c')$ and the inductive hypothesis over $|c'|$ we get that $\depth{\Phi_{\alpha'}} = |c'|$ and $c' \models \Phi_{\alpha'}$. This, taken together with $c = s \ctrans[a] c'$ gives $c \models \Phi_{\alpha}$. Moreover, we have \[ \depth{\Phi_{\alpha}} = \depth{\Phi_{\alpha'}} + 1 = |c'| + 1 = |c| \] thus concluding the proof. \end{itemize} ($\Leftarrow$) Assume now that $|c| = \depth{\Phi_{\alpha}}$ and $c \models \Phi_{\alpha}$. We aim to show that this implies that $\tr(c) = \alpha$, namely that $c$ is compatible with $\alpha$. From $c \models \Phi_{\alpha}$ and the definition of tracing formula (Definition~\ref{def:tracing_formula}) we gather that the sequence of the labels of the first $\depth{\Phi_{\alpha}}$ execution steps of $c$ matches $\alpha$. Moreover, $|c| = \depth{\Phi_{\alpha}}$ implies that those steps are actually the only execution steps for $c$. Therefore we can immediately conclude that $\tr(c) = \alpha$. \end{proof} We remark that a computation $c$ is compatible with $\Phi_{\alpha}$ if{f} $c$ and $\alpha$ satisfy previous Lemma~\ref{lem:computation_and_tracing_formula}. \begin{definition} [Mimicking formula] \label{def:mimicking_formula_for_traces} Consider any resolution $\Z \in \res(\proc)$ with initial state $z$. We define the \emph{mimicking formula} of $\Z$, notation $\Psi_{\Z}$, as \[ \Psi_{\Z} = \bigoplus_{\alpha \in \tr(\C_{\max}(z))} \pr(\C_{\max}(z,\alpha)) \Phi_{\alpha} \] where, for each $\alpha \in \tr(\C_{\max}(z))$, the formula $\Phi_{\alpha}$ is the tracing formula of $\alpha$. \end{definition} \begin{lemma} \label{lem:mimic_well_defined} For any resolution $\Z \in\res(\proc)$, the mimicking formula of $\Z$ is a well defined trace distribution formula. \end{lemma} \begin{proof} By definition of mimicking formula (Definition~\ref{def:mimicking_formula_for_traces}) we have \[ \Psi_{\Z} = \bigoplus_{\alpha \in \tr(\C_{\max}(z))} \pr(\C_{\max}(z,\alpha)) \Phi_{\alpha} \] where for each $\alpha \in \tr(\C_{\max}(z))$ the formula $\Phi_{\alpha}$ is the tracing formula of trace $\alpha$. Hence, to prove that $\Psi_{\Z}$ is a well defined trace distribution formula we simply need to show that \[ \sum_{\alpha \in \tr(\C_{\max}(z))} \pr(\C_{\max}(z,\alpha)) = 1 \] which follows by Lemma~\ref{lem:trace_distribution} by noticing that $\sum_{\alpha \in \tr(\C_{\max}(z))} \pr(\C_{\max}(z,\alpha)) = \sum_{\alpha \in \Act^{\star}} \pr(\C_{\max}(z,\alpha))$. \end{proof} \begin{example} \label{ex:mimicking_res} Consider the resolutions $\Z_s \in \res(s)$ and $\Z_t \in \res(t)$ for processes $s$ and $t$, resp., in Fig.~\ref{fig:strong_metric}. The mimicking formulae for them are, resp. \begin{align*} & \Psi_{\Z_s} = 0.5 \diam{a}\diam{c}\top \oplus 0.5 \diam{a}\top \\ & \Psi_{\Z_t} = 0.5 \diam{a}\diam{c}\top \oplus 0.5 \diam{a}\diam{b}\top. \end{align*} \end{example} The following results give us a first insight on the characterizing power of mimicking formulae: given $s \in \proc$, the set of the mimicking formulae of its resolutions constitutes the set of formulae satisfied by $s$. \begin{proposition} \label{prop:s_models_res_mimicking} Let $s \in \proc$. For each $\Z \in \res(s)$ it holds that $s \models \Psi_{\Z}$. \end{proposition} \begin{proof} Let $\Z \in \res(s)$, with $z = \corr{\Z}^{-1}(s)$. Hence, by definition of mimicking formula (Definition~\ref{def:mimicking_formula_for_traces}) we have that \[ \Psi_{\Z} = \bigoplus_{\alpha \in \tr(\C_{\max}(z))} \pr(\C_{\max}(z,\alpha)) \Phi_{\alpha} \] where, for each $\alpha \in \tr(\C_{\max}(z))$ we have that $\Phi_{\alpha}$ is the tracing formula of $\alpha$. We need to show that $s \models \Psi_{\Z}$, namely we need to exhibit a resolution $\bar{\Z} \in \res(s)$, with $\bar{z} = \corr{\bar{\Z}}^{-1}(s)$, s.t.\ for each $\alpha \in \tr(\C_{\max}(z))$ we have that $\pr(\Ct(\bar{z}, \Phi_{\alpha})) = \pr(\C_{\max}(z,\alpha))$. We aim to show that $\Z$ is such a resolution, namely that for each $\alpha \in \tr(\C_{\max}(z))$ we have \[ \pr(\Ct_{\max}(z,\Phi_{\alpha})) = \pr(\C_{\max}(z,\alpha)). \] Let $\alpha \in \tr(\C_{\max}(z))$. By definition we have \begin{align*} \Ct_{\max}(z,\Phi_{\alpha}) ={} & \{c \in \C_{\max}(z) \mid c \models \Phi_{\alpha} \wedge |c| = \depth{\Phi_{\alpha}}\} \\ ={} & \{c \in \C_{\max}(z) \mid \tr(c) = \alpha\} & \text{(by Lemma~\ref{lem:computation_and_tracing_formula})} \\ ={} & \C_{\max}(z,\alpha) & \text{($\alpha \in \tr(\C_{\max}(z))$)}. \end{align*} Thus, we can conclude that \[ \pr(\Ct_{\max}(z,\Phi_{\alpha})) = \sum_{c \in \Ct_{\max}(z,\Phi_{\alpha})} \pr(c) = \sum_{c \in \C_{\max}(z,\alpha)} \pr(c) = \pr(\C_{\max}(z,\alpha)). \] \end{proof} \begin{theorem} \label{thm:LLs_is_cup_tracing_formula_resolution} Let $s \in \proc$. We have that $ \LL(s) = \{1\top\} \cup \{\Psi_{\Z} \mid \Z \in \res(s)\}. $ \end{theorem} \begin{proof} From Proposition~\ref{prop:s_models_res_mimicking} and the definition of the relation $\models$ (Definition~\ref{def:satisfiability_LLd}) we can immediately infer that $\{\Psi_{\Z} \mid \Z \in \res(s)\} \subseteq \LL(s)$. Moreover $1\top \in \LL(s)$ is immediate. To conclude the proof we need to show that also the opposite inclusion holds, namely that $\LL(s) \setminus \{1\top\} \subseteq \{ \Psi_{\Z} \mid \Z \in \res(s)\}$. To this aim, consider any $\Psi = \bigoplus_{i \in I} r_i \Phi_i$ and assume that $\Psi \in \LL(s)$. We have to show that $\Psi$ is the mimicking formula of some resolution for $s$. Since $s \models \Psi$, from Definition~\ref{def:satisfiability_LLd} we can infer that there is at least one resolution $\Z \in \res(s)$ with $z = \corr{\Z}^{-1}(s)$ s.t.\ for each $i \in I$ we have $ \pr(\Ct_{\max}(z,\Phi_i)) = r_i. $ We aim to prove that among the resolutions ensuring that $s \models \Psi$, there is a particular resolution $\Z \in \res(s)$ s.t. \begin{equation} \label{eq:thm_LL_res_proof_ob} \Psi = \Psi_{\Z}. \end{equation} First of all we recall that by definition of trace distribution formula (Definition~\ref{def:logic_LL}), for each $i \in I$ we have $r_i > 0$ and moreover $\sum_{i \in I} r_i = 1$. By definition of $\Ct$, we have that $c \in \Ct_{\max}(z,\Phi_i)$ if{f} $c \models \Phi_i$ and $|c| = \depth{\Phi_i}$, which by Lemma~\ref{lem:computation_and_tracing_formula} implies that $\Phi_i = \Phi_{\tr(c)}$. Hence, let us consider the resolution $\Z \in \res(s)$ s.t. for each $i \in I$ we have $\Ct_{\max}(z,\Phi_i) \subseteq \C_{\max}(z)$, namely the resolution s.t. the computations compatible with the trace formulae $\Phi_i$ are all maximal. Notice that the existence of such a resolution is guaranteed by $s \models \Psi$. Since for each $c \in \Ct_{\max}(z,\Phi_i)$ we have $c \in \C_{\max}(z)$, we can infer that $\tr(c) \in \tr(\C_{\max}(z))$, namely $\Phi_i = \Phi_{\alpha}$ for some $\alpha \in \tr(\C_{\max}(z))$. This gives that whenever $\Phi_i = \Phi_{\alpha}$, for some $\alpha \in \tr(\C_{\max}(z))$, then we can prove (as done in the proof of Proposition~\ref{prop:s_models_res_mimicking}) that \begin{equation} \label{eq:thm_LL_res_weights} \pr(\Ct_{\max}(z, \Phi_i)) = \pr(\C_{\max}(z,\alpha)). \end{equation} Furthermore, we have obtained that $ \{\Phi_i \mid i \in I\} \subseteq \{ \Phi_{\alpha} \mid \alpha \in \tr(\C_{\max}(z))\}. $ To prove Equation~\eqref{eq:thm_LL_res_proof_ob} we need to show that also the opposite inclusion holds. Assume by contradiction that there is at least one $\beta \in \tr(\C_{\max}(z))$ s.t.\ there is no $i \in I$ with $\Phi_i = \Phi_{\beta}$. Then we would have \[ \begin{array}{rlr} 1 ={} & \sum_{i \in I} r_i \\ ={} & \sum_{i \in I} \pr(\Ct_{\max}(z,\Phi_i)) \\ \le & \sum_{\alpha \in \tr(\C_{\max}(z)) \setminus \{\beta\}} \pr(\C_{\max}(z,\alpha)) & \text{(by Equation~\eqref{eq:thm_LL_res_weights})}\\ < & \sum_{\alpha \in \tr(\C_{\max}(z))} \pr(\C_{\max}(z,\alpha)) & \text{($\beta \in \tr(\C_{\max}(z))$ implies $\pr(\C_{\max}(z,\beta))>0$)} \\ ={} & 1 & \text{(by Lemma~\ref{lem:trace_distribution})} \end{array} \] which is a contradiction. Hence we can conclude that $ \{\Phi_i \mid i \in I\} = \{ \Phi_{\alpha} \mid \alpha \in \tr(\C_{\max}(z))\} $ and thus, due to Equation~\eqref{eq:thm_LL_res_weights}, that Equation~\eqref{eq:thm_LL_res_proof_ob} holds. \end{proof} \begin{remark} In Theorem~\ref{thm:LLs_is_cup_tracing_formula_resolution}, $1\top$ is not included in the set of mimicking formulae of resolutions merely for sake of presentation, as $1\top$ is the mimicking formula of the resolution for $s$ in which no action is executed. \end{remark} The following theorem states that two resolutions are trace distribution equivalent if{f} their mimicking formulae are the same. \begin{theorem} \label{thm:equivalent_resolutions} Let $s,t \in \proc$ and consider $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, and $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$. Then $\Psi_{\Z_s} = \Psi_{\Z_t}$ if{f} for all $\alpha \in \Act^{\star}$ it holds that $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$. \end{theorem} \begin{proof} ($\Rightarrow$) Assume first that $\Psi_{\Z_s} = \Psi_{\Z_t}$. We aim to show that this implies $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$ for all $\alpha \in \Act^{\star}$. By definition of mimicking formula (Definition~\ref{def:mimicking_formula_for_traces}) we have \[ \Psi_{\Z_s} = \bigoplus_{\alpha \in \tr(\C_{\max}(z_s))} \pr(\C_{\max}(z_s,\alpha)) \Phi_{\alpha} \] where for each $\alpha \in \tr(\C_{\max}(z_s))$ the formula $\Phi_{\alpha}$ is the tracing formula of $\alpha$. Analogously \[ \Psi_{\Z_t} = \bigoplus_{\beta \in \tr(\C_{\max}(z_t))} \pr(\C_{\max}(z_t,\beta)) \Phi_{\beta} \] where for each $\beta \in \tr(\C_{\max}(z_t))$ the formula $\Phi_{\beta}$ is the tracing formula of $\beta$. Then from the assumption $\Psi_{\Z_s} = \Psi_{\Z_t}$ we gather \begin{enumerate} \item \label{item:same_max_computations} $\tr(\C_{\max}(z_s)) = \tr(\C_{\max}(z_t))$; \item \label{item:same_r} from previous item~\ref{item:same_max_computations} we have that $ \pr(\C_{\max}(z_s,\alpha)) = \pr(\C_{\max}(z_t,\alpha)) $ for each $\alpha \in \tr(\C_{\max}(z_s))$. \end{enumerate} We notice that item~\ref{item:same_max_computations} above implies the stronger relation \begin{equation} \label{eq:same_computations} \tr(\C(z_s)) = \tr(\C(z_t)). \end{equation} In fact each $\alpha \in \tr(\C(z_s))$ is either a trace in $\tr(\C_{\max}(z_s))$ or a proper prefix of a trace in that set. In both cases item~\ref{item:same_max_computations} guarantees that each trace in $\tr(\C(z_s))$ has a matching trace in $\tr(\C(z_t))$ and viceversa. Now, consider any $\alpha \in \Act^{\star}$. We aim to show that $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$. For simplicity of presentation, we can distinguish two cases. \begin{itemize} \item $\pr(\C(z_s,\alpha)) = 0$. In this case we have that no computation from $z_s$ is compatible with $\alpha$, namely there is no computation from $z_s$ for which the sequence of the labels of the execution steps matches $\alpha$. More precisely, we have that $\alpha \not \in \tr(\C(z_s))$. Since by Equation~\eqref{eq:same_computations} we have that $\tr(\C(z_s)) = \tr(\C(z_t))$ we can directly conclude that $\alpha \not \in \tr(\C(z_t))$, namely $\pr(\C(z_t,\alpha)) = 0$. \item $\pr(\C(z_s,\alpha)) > 0$. In this case we have that $\alpha \in \tr(\C(z_s))$ and by Equation~\eqref{eq:same_computations} we have that this implies that $\alpha \in \tr(\C(z_t))$. Hence we are guaranteed that $\pr(\C(z_t,\alpha)) > 0$. It remains to show that $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$. We have \[ \begin{array}{rlr} \pr(\C(z_s,\alpha)) ={} & \sum_{c \in P_{\max}(z_s,\alpha)} \pr(c) & \text{(by Lemma~\ref{lem:computations_same_sum})} \\ ={} & \sum_{\beta \in \tr(P_{\max}(z_s,\alpha))} \pr(\C_{\max}(z_s, \beta)) & \text{(by def.\ of $P_{\max}$)} \\ ={} & \sum_{\beta \in \tr(P_{\max}(z_s,\alpha))} \pr(\C_{\max}(z_t, \beta)) & \text{($P_{\max}(z_s,\alpha) \subseteq \C_{\max}(z_s)$ and item~\ref{item:same_r})} \\ ={} & \sum_{\beta' \in \tr(P_{\max}(z_t,\alpha))} \pr(\C_{\max}(z_t,\beta')) & \text{(by Equation~\eqref{eq:same_computations})} \\ ={} & \sum_{c' \in P_{\max}(z_t,\alpha)} \pr(c') & \text{(by def.\ of $P_{\max}$)} \\ ={} & \pr(\C(z_t,\alpha)) & \text{(by Lemma~\ref{lem:computations_same_sum}).} \end{array} \] \end{itemize} ($\Leftarrow$) Assume now that for all $\alpha \in \Act^{\star}$ it holds that $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$. We aim to show that this implies that $\Psi_{\Z_s} = \Psi_{\Z_t}$. By definition of mimicking formula (Definition~\ref{def:mimicking_formula_for_traces}) we have \begin{align*} \Psi_{\Z_s} = \bigoplus_{\alpha \in \tr(\C_{\max}(z_s))} \pr(\C_{\max}(z_s,\alpha)) \Phi_{\alpha} \\ \Psi_{\Z_t} = \bigoplus_{\beta \in \tr(\C_{\max}(z_t))} \pr(\C_{\max}(z_t,\beta)) \Phi_{\beta}. \end{align*} Therefore, to prove $\Psi_{\Z_s} = \Psi_{\Z_t}$ we need to show that \begin{flalign} & \label{eq:proof_obligation_same_traces} \tr(\C_{\max}(z_s)) = \tr(\C_{\max}(z_t)) \\ & \label{eq:proof_obligation_same_weights} \pr(\C_{\max}(z_s,\alpha)) = \pr(\C_{\max}(z_t,\alpha)) \text{ for each } \alpha \in \tr(\C_{\max}(z_s)). \end{flalign} First of all we notice that $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$ for each $\alpha \in \Act^{\star}$ implies that $\tr(\C(z_s)) = \tr(\C(z_t))$. This is due to the fact that by definition, given any $\alpha \in \Act^{\star}$, $\pr(\C(z_s,\alpha)) > 0$ if{f} there is at least one computation $c \in \C(z_s)$ s.t.\ $\alpha = \tr(c)$. Since $\pr(\C(z_s,\alpha )) > 0$ implies $\pr(\C(z_t,\alpha)) > 0$ we can infer that for each $\alpha \in \tr(\C(z_s))$ there is at least one computation $c' \in \tr(\C(z_t))$ s.t.\ $\alpha = \tr(c')$, namely $\tr(\C(z_s)) \subseteq \tr(\C(z_t))$. As the same reasoning can be applied symmetrically to each $\alpha \in \tr(\C(z_t))$, we can conclude that \begin{equation} \label{eq:same_set_traces} \tr(\C(z_s)) = \tr(\C(z_t)). \end{equation} Next we aim to show that a similar result holds even if we restrict our attention to maximal computations, that is we aim to prove Equation~\eqref{eq:proof_obligation_same_traces}. Let $\alpha \in \tr(\C_{\max}(z_s))$. Notice that for this $\alpha$ we have $\C_{\max}(z_s,\alpha) \subseteq P_{\max}(z_s,\alpha)$. Then we have \[ \begin{array}{rlr} \pr(\C(z_s,\alpha)) ={} & \sum_{c \in P_{\max}(z_s,\alpha)} \pr(c) & \text{(by Lemma~\ref{lem:computations_same_sum})} \\ ={} & \sum_{c \in \C_{\max}(z_s,\alpha)} \pr(c) + \sum_{c' \in P_{\max}(z_s,\alpha) \setminus \C_{\max}(z_s,\alpha)} \pr(c'). \numberthis\label{eq:division} \end{array} \] Moreover, by Lemma~\ref{lem:computations_same_sum} it holds that $ \pr(\C(z_t,\alpha)) = \sum_{c'' \in P_{\max}(z_t,\alpha)} \pr(c''). $ Therefore, from $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$ we gather that \begin{equation} \label{eq:for_contradiction} \sum_{c \in \C_{\max}(z_s,\alpha)} \pr(c) + \sum_{c' \in P_{\max}(z_s,\alpha) \setminus \C_{\max}(z_s,\alpha)} \pr(c') = \sum_{c'' \in P_{\max}(z_t,\alpha)} \pr(c''). \end{equation} Assume by contradiction that $P_{\max}(z_t,\alpha) \cap \C_{\max}(z_t,\alpha) = \emptyset$, namely there is no maximal computation from $z_t$ which is compatible with $\alpha$. Then for each action $a \in \Act$ consider the trace $\alpha a$ and define $\add_{z_s}(\alpha) = \{ a \in \Act \mid \alpha a \in \tr(\C(z_s))\}$. From Equation~\eqref{eq:same_set_traces} we can directly infer that $\add_{z_s}(\alpha) = \add_{z_t}(\alpha)$. Moreover, since we are assuming that no maximal computation from $z_t$ is compatible with $\alpha$, we get \begin{flalign} & \label{eq:for_contradiction_1} \bigcup_{a \in \add_{z_s}(\alpha)} P_{\max}(z_s,\alpha a) = P_{\max}(z_s,\alpha) \setminus \C_{\max}(z_s,\alpha) \\ & \label{eq:for_contradiction_2} \bigcup_{a \in \add_{z_t}(\alpha)} P_{\max}(z_t,\alpha a) = P_{\max}(z_t,\alpha) \end{flalign} where the unions are guaranteed to be disjoint (a single computation cannot be compatible with more than one trace $\alpha a$). Furthermore, by Lemma~\ref{lem:computations_same_sum} we have that for each $a \in \add_{z_s}(\alpha)$ \[ \begin{array}{rlr} \pr(\C(z_s, \alpha a)) = \sum_{c_1 \in P_{\max}(z_s, \alpha a)} \pr(c_1) \\ \pr(\C(z_t, \alpha a)) = \sum_{c_2 \in P_{\max}(z_t, \alpha a)} \pr(c_2) \end{array} \] from which we get that for each $a \in \add_{z_s}(\alpha)$ it holds that \begin{equation} \label{eq:for_contradiction_3} \sum_{c_1 \in P_{\max}(z_s, \alpha a)} \pr(c_1) = \sum_{c_2 \in P_{\max}(z_t, \alpha a)} \pr(c_2). \end{equation} Therefore we have that \[ \begin{array}{rlr} & \sum_{c \in \C_{\max}(z_s,\alpha)} \pr(c) + \sum_{c' \in P_{\max}(z_s, \alpha) \setminus \C_{\max}(z_s, \alpha)} \pr(c') \\ ={} & \sum_{c \in \C_{\max}(z_s, \alpha)} \pr(c) + \sum_{c' \in \bigcup_{a \in \add_{z_s}(\alpha)} P_{\max}(z_s, \alpha a)} \pr(c') & \text{(by Equation~\eqref{eq:for_contradiction_1})} \\ ={} & \sum_{c \in \C_{\max}(z_s,\alpha)} \pr(c) + \sum_{a \in \add_{z_s}(\alpha)} \Big( \sum_{c' \in P_{\max}(z_s, \alpha a)} \pr(c') \Big) & \text{(disjoint union)} \\ ={} & \sum_{c \in \C_{\max}(z_s, \alpha)} \pr(c) + \sum_{a \in \add_{z_s}(\alpha)} \Big( \sum_{c'' \in P_{\max}(z_t,\alpha a)} \pr(c'') \Big) & \text{(by Equation~\eqref{eq:for_contradiction_3})} \\ ={} & \sum_{c \in \C_{\max}(z_s, \alpha)} \pr(c) + \sum_{c'' \in \bigcup_{a \in \add_{z_t}(\alpha)}P_{\max}(z_t, \alpha a)} \pr(c'') & \text{($\add_{z_s}(\alpha) = \add_{z_t}(\alpha)$)} \\ ={} & \sum_{c \in \C_{\max}(z_s, \alpha)} \pr(c) + \sum_{c'' \in P_{\max}(z_t, \alpha)} \pr(c'') & \text{(by Equation~\eqref{eq:for_contradiction_2})}. \end{array} \] Thus we have obtained that \[ \sum_{c \in \C_{\max}(z_s,\alpha)} \pr(c) + \sum_{c' \in P_{\max}(z_s, \alpha) \setminus \C_{\max}(z_s, \alpha)} \pr(c') = \sum_{c \in \C_{\max}(z_s, \alpha)} \pr(c) + \sum_{c'' \in P_{\max}(z_t, \alpha)} \pr(c'') \] which, since by the choice of $\alpha$ we have that $\sum_{c \in \C_{\max}(z_s, \alpha)} \pr(c) > 0$, is in contradiction with Equation~\eqref{eq:for_contradiction}. Therefore, we have obtained that whenever $\alpha \in \tr(\C_{\max}(z_s))$ then there is at least one maximal computation $c$ from $z_t$ s.t.\ $\alpha = \tr(c)$, that is $\tr(\C_{\max}(z_s)) \subseteq \tr(\C_{\max}(z_t))$. Since the same reasoning can be applied symmetrically to each $\alpha \in \tr(\C_{\max}(z_t))$ we gather that also $\tr(\C_{\max}(z_t)) \subseteq \tr(\C_{\max}(z_s))$ holds. The two inclusions give us Equation~\eqref{eq:proof_obligation_same_traces}. Finally, we aim to prove Equation~\eqref{eq:proof_obligation_same_weights}. Let $\alpha \in \tr(\C_{\max}(z_s))$. We can distinguish two cases. \begin{itemize} \item $|\alpha| = \depth{z_s}$. First of all we notice that from Equation~\eqref{eq:same_set_traces} and the assumption $\pr(\C(z_s,\beta)) = \pr(\C(z_t,\beta))$ for each $\beta \in \Act^{\star}$, we can infer that $|\alpha| = \depth{z_t}$. Hence, we have \[ \pr(\C_{\max}(z_s,\alpha)) = \pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha)) = \pr(\C_{\max}(z_t,\alpha)). \] \item $|\alpha| < \depth{z_s}$. Then we have \[ \begin{array}{rlr} & \pr(\C_{\max}(z_s, \alpha)) \\ ={} & \sum_{c \in \C_{\max}(z_s, \alpha)} \pr(c) \\ ={} & \sum_{c' \in P_{\max}(z_s, \alpha)} \pr(c') - \sum_{c'' \in P_{\max}(z_s, \alpha) \setminus \C_{\max}(z_s, \alpha)} \pr(c'') \\ ={} & \pr(\C(z_s, \alpha)) - \sum_{c'' \in P_{\max}(z_s, \alpha) \setminus \C_{\max}(z_s, \alpha)} \pr(c'') \\ ={} & \pr(\C(z_t, \alpha)) - \sum_{c'' \in P_{\max}(z_s, \alpha) \setminus \C_{\max}(z_s, \alpha)} \pr(c'') \\ ={} & \sum_{c''' \in P_{\max}(z_t, \alpha)} \pr(c''') - \sum_{c'' \in P_{\max}(z_s, \alpha) \setminus \C_{\max}(z_s, \alpha)} \pr(c'') \\ ={} & \sum_{c_1 \in \C_{\max}(z_t, \alpha)} \pr(c_1) + \sum_{c_2 \in P_{\max}(z_t, \alpha) \setminus \C_{\max}(z_t, \alpha)} \pr(c_2) - \sum_{c'' \in P_{\max}(z_s, \alpha) \setminus \C_{\max}(z_s, \alpha)} \pr(c'')\\ ={} & \sum_{c_1 \in \C_{\max}(z_t, \alpha)} \pr(c_1) + \sum_{c_2 \in \bigcup_{b \in \add_{z_t}(\alpha)} P_{\max}(z_t, \alpha b)} \pr(c_2) - \sum_{c'' \in \bigcup_{b \in \add_{z_s}(\alpha)}P_{\max}(z_s, \alpha b)} \pr(c'') \\ ={} & \sum_{c_1 \in \C_{\max}(z_t, \alpha)} \pr(c_1) + \sum_{b \in \add_{z_t}(\alpha)} \Big( \sum_{c_2 \in P_{\max}(z_t, \alpha b)} \pr(c_2) \Big) + \\ & - \sum_{b \in \add_{z_s}(\alpha)}( \sum_{c'' \in P_{\max}(z_s, \alpha b)} \pr(c'') ) \\ ={} & \sum_{c_1 \in \C_{\max}(z_t, \alpha)} \pr(c_1) + \sum_{b \in \add_{z_t}(\alpha)} \pr(\C(z_t, \alpha b)) - \sum_{b \in \add_{z_s}(\alpha)} \pr(\C(z_s, \alpha b)) \\ ={} & \sum_{c_1 \in \C_{\max}(z_t, \alpha)} \pr(c_1) \\ ={} & \pr(\C_{\max}(z_t, \alpha)) \end{array} \] where \begin{itemize} \item the second and the sixth steps follow by Equation~\eqref{eq:division}; \item the third, fifth and ninth steps follow by Lemma~\ref{lem:computations_same_sum}; \item the fourth step follows by $\pr(\C(z_s, \alpha)) = \pr(\C(z_t, \alpha))$; \item the seventh step follows by Equation~\eqref{eq:for_contradiction_1}; \item the tenth step follows by $\add_{z_s}(\alpha) = \add_{z_t}(\alpha)$ (given by Equation~\eqref{eq:same_set_traces}) and the initial assumption which guarantees that for each $b \in \add_{z_s}(\alpha)$, $\pr(\C(z_s, \alpha b)) = \pr(\C(z_t, \alpha b))$. \end{itemize} \end{itemize} \end{proof} Then we can derive the characterization result for the strong case: two processes $s,t$ are strong trace equivalent if{f} they satisfy the same formulae in $\LL$. \begin{theorem} \label{thm:det_char} For all $s,t \in \proc$ we have that $s \STr t$ if{f} $\LL(s) = \LL(t)$. \end{theorem} \begin{proof} ($\Rightarrow$) Assume first that $s \STr t$. We aim to sow that this implies that $\LL(s) = \LL(t)$. By Definition~\ref{def:prob_trace_dist} $s \STr t$ implies that \begin{enumerate}[(i)] \item \label{item:thm_det_char_1} for each resolution $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, there is a resolution $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$, s.t.\ for each $\alpha \in \Act^{\star}$ we have $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$; \item \label{item:thm_det_char_2} for each resolution $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$, there is a resolution $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, s.t.\ for each $\alpha \in \Act^{\star}$ we have $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$. \end{enumerate} Consider any $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, and let $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$, be any resolution of $t$ satisfying item~\eqref{item:thm_det_char_1} above. By Theorem~\ref{thm:equivalent_resolutions}, $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$ for all $\alpha \in \Act^{\star}$ implies that $\Psi_{\Z_s} = \Psi_{\Z_t}$. More precisely, we have that \begin{equation} \label{eq:thm_det_char_1} \text{for each } \Z_s \in \res(s) \text{ there is } \Z_t \in \res(t) \text{ s.t.\ } \Psi_{\Z_s} = \Psi_{\Z_t}. \end{equation} Symmetrically, item~\eqref{item:thm_det_char_2} above taken together with Theorem~\ref{thm:equivalent_resolutions} gives that \begin{equation} \label{eq:thm_det_char_2} \text{for each } \Z_t \in \res(t) \text{ there is a } \Z_s \in \res(s) \text{ s.t.\ } \Psi_{\Z_t} = \Psi_{\Z_s}. \end{equation} Therefore, from Equations~\eqref{eq:thm_det_char_1} and~\eqref{eq:thm_det_char_2} we gather \begin{equation} \label{eq:thm_det_char_3} \{\Psi_{\Z_s} \mid \Z_s \in \res(s)\} = \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}. \end{equation} By Theorem~\ref{thm:LLs_is_cup_tracing_formula_resolution} we have that $\LL(s) = \{1\top\} \cup \{\Psi_{\Z_s} \mid \Z_s \in \res(s)\}$ and similarly $\LL(t) = \{1\top\} \cup \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}$. Therefore, from Equation~\eqref{eq:thm_det_char_3} we can conclude that $ \LL(s) = \LL(t). $ ($\Leftarrow$) Assume now that $\LL(s) = \LL(t)$. We aim to show that this implies that $s \STr t$. By Theorem~\ref{thm:LLs_is_cup_tracing_formula_resolution} we have that $\LL(s) = \{1\top\} \cup \{ \Psi_{\Z_s} \mid \Z_s \in \res(s)\}$ and analogously $\LL(t) = \{1\top\} \cup \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}$. Hence, from the assumption we can infer that $ \{\Psi_{\Z_s} \mid \Z_s \in \res(s)\} = \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}. $ Clearly the equality between the two sets implies that \begin{itemize} \item for each $\Z_s \in \res(s)$ there is a $\Z_t \in \res(t)$ s.t.\ $\Psi_{\Z_s} = \Psi_{\Z_t}$ and \item for each $\Z_t \in \res(t)$ there is a $\Z_s \in \res(s)$ s.t.\ $\Psi_{\Z_t} = \Psi_{\Z_s}$. \end{itemize} By applying Theorem~\ref{thm:equivalent_resolutions} to the two items above we obtain that \begin{itemize} \item for each resolution $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, there is a resolution $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$, s.t.\ for each $\alpha \in \Act^{\star}$ we have $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$; \item for each resolution $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$, there is a resolution $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, s.t.\ for each $\alpha \in \Act^{\star}$ we have $\pr(\C(z_s,\alpha)) = \pr(\C(z_t,\alpha))$; \end{itemize} from which we can conclude that $s \STr t$. \end{proof} The notions of \emph{tracing formula} and \emph{mimicking formula} and the related results Lemma~\ref{lem:computation_and_tracing_formula}, Lemma~\ref{lem:mimic_well_defined}, Proposition~\ref{prop:s_models_res_mimicking} and Theorem~\ref{thm:LLs_is_cup_tracing_formula_resolution} can be easily extended to the weak case by extending the set of traces $\Act^{\star}$ to the set $\Acttau^{\star}$. The following theorem gives the characterization of weak trace distribution equivalence: two resolutions are weak trace distribution equivalent if{f} their mimicking formulae are $\LLw$-equivalent. To simplify the upcoming proofs, we introduce an alternative version of the \emph{weak mimicking formula}, which captures the weak trace distribution (see Definition~\ref{def:weak_trace_distribution}) of resolutions. \begin{definition} \label{def:weak_mimicking} Consider any resolution $\Z \in \res(\proc)$ with initial state $z$. We define the \emph{weak mimicking formula} of $\Z$ as the trace distribution formula $\Psiw_{\Z}$ given by \[ \Psiw_{\Z} = \bigoplus_{\alpha \in \trw(\C_{\max}(z))} \pr(\Cw_{\max}(z,\alpha)) \Phi_{\alpha} \] where, for each $\alpha \in \trw(\C_{\max}(z))$, the formula $\Phi_{\alpha}$ is the tracing formula of $\alpha$. \end{definition} Notice that from the definitions of $\Cw_{\max}(\_,\_)$ and $\trw(\_)$ we can infer that $\Psiw_{\_}$ represents a trace distribution formula over the quotient space of $\LLw$ wrt.\ $\eqtrace$, that is $\Psiw_{\_} \in \LLd$. \begin{lemma} \label{lem:mimicking_equiv_weak_mimicking} For each $\Z \in \res(\proc)$ it holds that $\Psi_{\Z} \eqtrace^{\dagger} \Psiw_{\Z}$. \end{lemma} \begin{proof} Consider $\Z \in \res(\proc)$ with initial state $z$. First of all we recall that by definition of mimicking formula (Definition~\ref{def:mimicking_formula_for_traces}) we have \[ \Psi_{\Z} = \bigoplus_{\alpha \in \tr(\C_{\max}(z))} \pr(\C_{\max}(z,\alpha)) \Phi_{\alpha} \] where for each $\alpha \in \tr(\C_{\max}(z))$, the formula $\Phi_{\alpha}$ is the tracing formula of $\alpha$. By definition of weak mimicking formula (Definition~\ref{def:weak_mimicking}) we have \[ \Psiw_{\Z} = \bigoplus_{\beta \in \trw(\C_{\max}(z))} \pr(\Cw_{\max}(z,\beta)) \Phi_{\beta} \] where for each $\beta \in \trw(\C_{\max}(z))$, the formula $\Phi_{\beta}$ is the tracing formula of $\beta$. Moreover, we have that for each $\beta \in \trw(\C_{\max}(z))$ \[ \begin{array}{rlr} \pr(\Cw_{\max}(z,\beta)) ={} & \sum_{c \in \Cw_{\max}(z,\beta)} \pr(c) \\ ={} & \sum_{c \in \C_{\max}(z) \text{ s.t. } \tr(c) \eqtrace \beta} \pr(c) \\ ={} & \sum_{\alpha \in \tr(\C_{\max}(z)) \text{ s.t. } \alpha \eqtrace \beta} \pr(\C_{\max}(z,\alpha)). \end{array} \] Furthermore, by definition of tracing formula (Definition~\ref{def:tracing_formula}) and of $\eqtrace$ (Definition~\ref{def:eqtrace}), it is immediate that $\alpha \eqtrace \beta$ if{f} $\Phi_{\alpha} \eqtrace \Phi_{\beta}$, for each $\alpha, \beta \in \Act^{\star}$. For simplicity, we denote by $\alpha_{\beta}$ each $\alpha \in \tr(\C_{\max}(z))$ s.t.\ $\alpha \eqtrace \beta$ for some $\beta \in \trw(\C_{\max}(z))$. Notice that by construction of $\trw(\_)$, no trace $\alpha \in \tr(\C_{\max}(z))$ can be equivalent to more than one $\beta \in \trw(\C_{\max}(z))$. Therefore, we have obtained that \[ \begin{array}{rlr} \Psiw_{\Z} ={} & \bigoplus_{\beta \in \trw(\C_{\max}(z))} \pr(\Cw_{\max}(z,\beta)) \Phi_{\beta} \\ \eqtrace^{\dagger} & \bigoplus_{\beta \in \trw(\C_{\max}(z)) \atop \alpha_{\beta} \in \tr(\C_{\max}(z))} \pr(\C_{\max}(z, \alpha_{\beta})) \Phi_{\alpha_{\beta}} \\ \eqtrace^{\dagger} & \bigoplus_{\alpha \in \tr(\C_{\max}(z))} \pr(\C_{\max}(z,\alpha)) \Phi_{\alpha} \\ ={} & \Psi_{\Z}. \end{array} \] \end{proof} \begin{theorem} \label{thm:equivalent_resolutions_weak} Let $s,t \in \proc$ and consider $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, and $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$. Then $\Psi_{\Z_s} \eqtrace^{\dagger} \Psi_{\Z_t}$ if{f} for all $\alpha \in \Act^{\star}$ it holds that $\pr(\Cw(z_s,\alpha)) = \pr(\Cw(z_t,\alpha))$. \end{theorem} \begin{proof} ($\Rightarrow$) Assume first that $\Psi_{\Z_s} \eqtrace^{\dagger} \Psi_{\Z_t}$. We aim to show that $\pr(\Cw(z_s,\alpha)) = \pr(\Cw(z_t,\alpha))$ for all $\alpha \in \Act^{\star}$. By Lemma~\ref{lem:mimicking_equiv_weak_mimicking} we have that \[ \Psi_{\Z_s} \eqtrace^{\dagger} \Psiw_{\Z_s} \quad\text{ and }\quad \Psi_{\Z_t} \eqtrace^{\dagger} \Psiw_{\Z_t}. \] Thus, $\Psi_{\Z_s} \eqtrace^{\dagger} \Psi_{\Z_t}$ implies $\Psiw_{\Z_s} \eqtrace^{\dagger} \Psiw_{\Z_t}$. Hence the prove the proof obligation, it is enough to prove that \begin{equation} \label{eq:thm_weak_equivalent_proof_obligation} \Psiw_{\Z_s} \eqtrace^{\dagger} \Psiw_{\Z_t} \;\text{ implies }\; \pr(\Cw(z_s,\alpha)) = \pr(\Cw(z_t,\alpha)) \text{ for each } \alpha \in \Act^{\star}. \end{equation} From $\Psiw_{\Z_s} \eqtrace^{\dagger} \Psiw_{\Z_t}$ we get that \[ \Psiw_{\Z_t} = \bigoplus_{\alpha \in \trw(\C_{\max}(z_s)) \atop \beta_{\alpha} \in \trw(\C_{\max}(z_t)) \cap [\alpha]_{\mathrm{w}}} \pr(\Cw_{\max}(z_t,\beta_{\alpha})) \Phi_{\beta_{\alpha}} \] where, for each $\alpha \in \trw(\C_{\max}(z_s))$, $\sum_{\beta_{\alpha} \in \trw(\C_{\max}(z_t)) \cap [\alpha]_{\mathrm{w}}} \pr(\Cw_{\max}(z_t,\beta_{\alpha})) = \pr(\Cw_{\max}(z_s,\alpha))$ and $\Phi_{\beta_{\alpha}} \eqtrace \Phi_{\alpha}$ for each $\beta_{\alpha} \in \trw(\C_{\max}(z_t)) \cap [\alpha]_{\mathrm{w}}$. We notice that by definition the elements of $\trw(\C_{\max}(z_t))$ represent distinct equivalence classes with respect to $\eqtrace$. Thus we are guaranteed that for each $\alpha \in \trw(\C_{\max}(z_t)) \cap [\alpha]_{\mathrm{w}}$ contains a single trace $\beta_{\alpha}$. Therefore, in this particular case, $\Psiw_{\Z_s} \eqtrace^{\dagger} \Psiw_{\Z_t}$ is equivalent to say that $\Psiw_{\Z_s} = \Psiw_{\Z_t}$. Moreover, since the representative of the equivalence classes wrt $\eqtrace$ can always be chosen in $\Act^{\star}$, we can always construct the sets $\trw(\C_{\max}(z_s))$ and $\trw(\C_{\max}(z_t))$ in such a way that $\trw(\C_{\max}(z_s)) \cap \Act^{\star} = \trw(\C_{\max}(z_s))$ and $\trw(\C_{\max}(z_t)) \cap \Act^{\star} = \trw(\C_{\max}(z_t))$. Hence, the same argumentations presented in the first part of the proof of Theorem~\ref{thm:equivalent_resolutions} allow us to prove the proof obligation Equation~\eqref{eq:thm_weak_equivalent_proof_obligation}. ($\Leftarrow$) Assume now that for all $\alpha \in \Act^{\star}$ it holds that $\pr(\Cw(z_s,\alpha)) = \pr(\Cw(z_t,\alpha))$. We aim to show that this implies that $\Psi_{\Z_s} \eqtrace^{\dagger} \Psi_{\Z_t}$. To this aim we show that the assumption $\pr(\Cw(z_s,\alpha)) = \pr(\Cw(z_t,\alpha))$ for all $\alpha \in \Act^{\star}$ implies $\Psiw_{\Z_s} = \Psiw_{\Z_t}$. This follows from the same argumentations presented in the second part of the proof of Theorem~\ref{thm:equivalent_resolutions}. Then, since from Lemma~\ref{lem:mimicking_equiv_weak_mimicking} we have $\Psi_{\Z_s} \eqtrace^{\dagger} \Psiw_{\Z_s}$ and $\Psi_{\Z_t} \eqtrace^{\dagger} \Psiw_{\Z_t}$, we can conclude that $\Psi_{\Z_s} \eqtrace^{\dagger} \Psi_{\Z_t}$ as required. \end{proof} Then we can derive the characterization result for the weak case: two processes $s,t$ are weak trace equivalent if{f} they satisfy equivalent formulae in $\LLw$. \begin{theorem} \label{thm:weak_char} For all $s,t \in \proc$ we have that $s \WTr t$ if{f} $\LLw(s) \eqtrace^{\dagger} \LLw(t)$. \end{theorem} \begin{proof} ($\Rightarrow$) Assume first that $s \WTr t$. We aim to sow that this implies that $\LLw(s) \eqtrace^{\dagger} \LLw(t)$. By Definition~\ref{def:weak_trace_equivalence} $s \WTr t$ implies that \begin{enumerate}[(i)] \item \label{item:thm_weak_char_1} for each resolution $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, there is a resolution $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$, s.t.\ for each $\alpha \in \Act^{\star}$ we have $\pr(\Cw(z_s,\alpha)) = \pr(\Cw(z_t,\alpha))$; \item \label{item:thm_weak_char_2} for each resolution $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$, there is a resolution $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, s.t.\ for each $\alpha \in \Act^{\star}$ we have $\pr(\Cw(z_s,\alpha)) = \pr(\Cw(z_t,\alpha))$. \end{enumerate} Consider any $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, and let $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$, be any resolution of $t$ satisfying item~\eqref{item:thm_weak_char_1} above. By Theorem~\ref{thm:equivalent_resolutions_weak}, $\pr(\Cw(z_s,\alpha)) = \pr(\Cw(z_t,\alpha))$ for all $\alpha \in \Act^{\star}$ implies that $\Psi_{\Z_s} \eqtrace^{\dagger} \Psi_{\Z_t}$. More precisely, we have that \begin{equation} \label{eq:thm_weak_char_1} \text{for each } \Z_s \in \res(s) \text{ there is } \Z_t \in \res(t) \text{ s.t.\ } \Psi_{\Z_s} \eqtrace^{\dagger} \Psi_{\Z_t}. \end{equation} Symmetrically, item~\eqref{item:thm_weak_char_2} above taken together with Theorem~\ref{thm:equivalent_resolutions_weak} gives that \begin{equation} \label{eq:thm_weak_char_2} \text{for each } \Z_t \in \res(t) \text{ there is a } \Z_s \in \res(s) \text{ s.t.\ } \Psi_{\Z_t} \eqtrace^{\dagger} \Psi_{\Z_s}. \end{equation} Therefore, from Equations~\eqref{eq:thm_weak_char_1} and~\eqref{eq:thm_weak_char_2} we gather \begin{equation} \label{eq:thm_weak_char_3} \{\Psi_{\Z_s} \mid \Z_s \in \res(s)\} \eqtrace^{\dagger} \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}. \end{equation} By Theorem~\ref{thm:LLs_is_cup_tracing_formula_resolution} we have that $\LLw(s) = \{1\top\} \cup \{\Psi_{\Z_s} \mid \Z_s \in \res(s)\}$ and similarly $\LLw(t) = \{1\top\} \cup \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}$. Therefore, from Equation~\eqref{eq:thm_weak_char_3} we can conclude that $ \LLw(s) \eqtrace^{\dagger} \LLw(t). $ ($\Leftarrow$) Assume now that $\LLw(s) \eqtrace^{\dagger} \LLw(t)$. We aim to show that this implies that $s \WTr t$. By Theorem~\ref{thm:LLs_is_cup_tracing_formula_resolution} we have that $\LLw(s) = \{1\top\} \cup \{ \Psi_{\Z_s} \mid \Z_s \in \res(s)\}$ and analogously $\LLw(t) = \{1\top\} \cup \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}$. Hence, from the assumption we can infer that $ \{\Psi_{\Z_s} \mid \Z_s \in \res(s)\} \eqtrace^{\dagger} \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}. $ Clearly the equivalence between the two sets implies that \begin{itemize} \item for each $\Z_s \in \res(s)$ there is a $\Z_t \in \res(t)$ s.t.\ $\Psi_{\Z_s} \eqtrace^{\dagger} \Psi_{\Z_t}$ and \item for each $\Z_t \in \res(t)$ there is a $\Z_s \in \res(s)$ s.t.\ $\Psi_{\Z_t} \eqtrace^{\dagger} \Psi_{\Z_s}$. \end{itemize} By applying Theorem~\ref{thm:equivalent_resolutions_weak} to the two items above we obtain that \begin{itemize} \item for each resolution $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, there is a resolution $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$, s.t.\ for each $\alpha \in \Act^{\star}$ we have $\pr(\Cw(z_s,\alpha)) = \pr(\Cw(z_t,\alpha))$; \item for each resolution $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$, there is a resolution $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, s.t.\ for each $\alpha \in \Act^{\star}$ we have $\pr(\Cw(z_s,\alpha)) = \pr(\Cw(z_t,\alpha))$; \end{itemize} from which we can conclude that $s \WTr t$. \end{proof} \section{Logical characterization of trace metrics} \label{sec:char_of_trace_metric} In this section we present the logical characterization of strong and weak trace metric (resp.\ Theorem~\ref{thm:LL_metric_char} and Theorem~\ref{thm:LLw_metric_char}). We define a suitable distance on formulae in $\LL$ (resp.\ $\LLw$) and we characterize the strong (resp.\ weak) trace metric between processes as the distance between the sets of formulae satisfied by them. \subsection{$\LL$-characterization of strong trace metric} \label{sec:char_metric_strong} Firstly, we need to define a distance on trace formulae. \begin{definition} [Distance on $\LLt$] \label{def:metric_on_LLt} The function $\Dtrtd \colon \LLt \times \LLt \to [0,1]$ is defined over $\LLt$ as follows: \[ \Dtrtd( \Phi_1, \Phi_2 ) = \begin{cases} 0 & \text{ if } \Phi_1 = \Phi_2 \\ 1 & \text{ otherwise.} \end{cases} \] \end{definition} \begin{proposition} \label{prop:distance_on_LLt_is_metric} The function $\Dtrtd$ is a $1$-bounded metric over $\LLt$. \end{proposition} \begin{proof} The thesis follows by noticing that $\Dtrtd$ is the discrete metric over $\LLt$. \end{proof} To define a distance over trace distribution formulae we see them as probability distribution over trace formulae and we define the distance over $\LLd$ as the Kantorovich lifting of the metric $\Dtrtd$. \begin{definition} [Distance on $\LLd$] \label{def:metric_on_LLd} The function $\Dtrdd \colon \LLd \times \LLd \to [0,1]$ is defined over $\LLd$ as follows: \[ \Dtrdd(\Psi_1, \Psi_2) = \Kantorovich(\Dtrtd)(\Psi_1, \Psi_2). \] \end{definition} \begin{proposition} \label{prop:distance_on_LLd_is_metric} The function $\Dtrdd$ is a $1$-bounded metric over $\LLd$. \end{proposition} \begin{proof} First we prove that $\Dtrdd$ is a metric over $\LLd$, namely that \begin{enumerate} \item \label{item:identity} $\Dtrdd(\Psi_1,\Psi_2) = 0$ if{f} $\Psi_1 = \Psi_2$; \item \label{item:symmetry} $\Dtrdd(\Psi_1,\Psi_2) = \Dtrdd(\Psi_2,\Psi_1)$; \item \label{item:triang_ineq} $\Dtrdd(\Psi_1,\Psi_2) \le \Dtrdd(\Psi_1,\Psi_3) + \Dtrdd(\Psi_3,\Psi_2)$. \end{enumerate} \underline{\emph{Proof of item~\ref{item:identity}}} ($\Leftarrow$) Assume first that $\Psi_1 = \Psi_2$. Then $\Dtrdd(\Psi_1,\Psi_2) = 0$ immediately follows from Definition~\ref{def:metric_on_LLd}, since the Kantorovich metric is a pseudometric. ($\Rightarrow$) Assume now that $\Dtrdd(\Psi_1,\Psi_2) = 0$. We aim to show that this implies that $\Psi_1 = \Psi_2$. Assume wlog. that $\Psi_1 = \bigoplus_{i \in I} r_i \Phi_i$ and that $\Psi_2 = \bigoplus_{j \in J} r_j \Phi_j$. Then we have \begin{equation} \label{eq:Kantorovich_0} \Dtrdd(\Psi_1, \Psi_2) = \min_{\w \in \W(\Psi_1,\Psi_2)} \sum_{i \in I, j \in J} \w(\Phi_i,\Phi_j) \Dtrtd(\Phi_i,\Phi_j) \end{equation} and the distance in Equation~\eqref{eq:Kantorovich_0} is $0$ if, given the optimal matching $\bar{\w}$ \[ \bar{\w}(\Phi_i,\Phi_j) > 0 \text{ if{f} } \Dtrtd(\Phi_i,\Phi_j) = 0. \] By Proposition~\ref{prop:distance_on_LLt_is_metric} we have that $\Dtrtd(\Phi_i,\Phi_j) = 0$ if{f} $\Phi_i = \Phi_j$. In particular, let $\Phi_{j_i}$ be any formula in $\{\Phi_j \mid j \in J\}$ s.t.\ $\Phi_i = \Phi_{j_i}$. Since by Definition~\ref{def:logic_LL} the trace formulae $\Phi_i$ occurring in $\Psi_1$ are pairwise distinct and, analogously, the trace formulae $\Phi_j$ occurring in $\Psi_2$ are pairwise distinct, we gather that \[ \begin{array}{rlr} r_i = \sum_{j \in J} \bar{\w}(\Phi_i,\Phi_j) = \sum_{j_i \in J} \bar{\w}(\Phi_i,\Phi_{j_i}) = \bar{\w}(\Phi_i,\Phi_{j_i}) \\ r_j = \sum_{i \in I} \bar{\w}(\Phi_i,\Phi_j) = \sum_{i_j \in I} \bar{\w}(\Phi_{i_j},\Phi_j) = \bar{\w}(\Phi_{i_j},\Phi_j). \end{array} \] Therefore we can infer that $\Psi_1 = \Psi_2$ as probability distributions over $\LLt$. \underline{\emph{Proof of item~\ref{item:symmetry}}} Immediate from the discrete metric and the matching being both symmetric. \underline{\emph{Proof of item~\ref{item:triang_ineq}}} Assume wlog. that $\Psi_1 = \bigoplus_{i \in I} r_i \Phi_i$, $\Psi_2 = \bigoplus_{j \in J} r_j \Phi_j$ and $\Psi_3 = \bigoplus_{h \in H} r_h \Phi_h$. Let $\w_{1,3} \in \W(\Psi_1, \Psi_3)$ be an optimal matching for $\Psi_1, \Psi_3$, namely \[ \Dtrdd(\Psi_1, \Psi_3) = \min_{\w \in \W(\Psi_1,\Psi_3)} \sum_{i \in I \atop h \in H} \w(\Phi_i,\Phi_h) \Dtrtd(\Phi_i,\Phi_h) = \sum_{i \in I \atop h \in H} \w_{1,3}(\Phi_i,\Phi_h) \Dtrtd(\Phi_i,\Phi_h) \] and let $\w_{2,3}\in \W(\Psi_2, \Psi_3)$ be an optimal matching for $\Psi_2, \Psi_3$, that is \[ \Dtrdd(\Psi_2,\Psi_3) = \min_{\w \in \W(\Psi_2,\Psi_3)} \sum_{j \in J \atop h \in H} \w(\Phi_j,\Phi_h) \Dtrtd(\Phi_j,\Phi_h) = \sum_{j \in J \atop h \in H} \w_{2,3}(\Phi_j, \Phi_h) \Dtrtd(\Phi_j,\Phi_h). \] Consider now the function $f \colon I \times J \times H \to [0,1]$ defined by \[ f(i,j,h) = \w_{1,3}(\Phi_i, \Phi_h) \cdot \w_{2,3}(\Phi_j, \Phi_h) \cdot \frac{1}{r_h}. \] Then, we have $\sum_{j \in J} f(i,j,h) = \w_{1,3}(\Phi_i, \Phi_h)$ namely the projection of $f$ over the first and third components coincides with the optimal matching for $\Psi_1, \Psi_3$. Similarly, $\sum_{i \in I} f(i,j,h) = \w_{2,3}(\Phi_j, \Phi_h)$ namely the projection of $f$ over the second and third components coincides with the optimal matching for $\Psi_2, \Psi_3$. Moreover, it holds that $\sum_{j \in J,\, h \in H} f(i,j,h) = r_i$ and $\sum_{i \in I,\, h \in H} f(i,j,h) = r_j$, that is $f(i,j,h)$ is a matching in $\W(\Psi_1,\Psi_2)$. Therefore, \[ \begin{array}{rlr} \Dtrdd(\Psi_1, \Psi_2) ={} & \min_{\w \in \W(\Psi_1,\Psi_2)} \sum_{i \in I,\, j \in J} \w(\Phi_i,\Phi_j) \Dtrtd(\Phi_i,\Phi_j) & \text{(by definition)}\\ \le{} & \sum_{i \in I,\, j \in J,\, h \in H} f(i,j,h) \Dtrtd(\Phi_i,\Phi_j) & \text{(by construction of $f$)}\\ \le{} & \sum_{i \in I,\, j \in J,\, h \in H} f(i,j,h) \big( \Dtrtd(\Phi_i, \Phi_h)\, + \,\Dtrtd(\Phi_j,\Phi_h) \big) & \text{(since $\Dtrtd$ is a metric)}\\ ={} & \sum_{i \in I,\, j \in J,\, h \in H} f(i,j,h) \Dtrtd(\Phi_i, \Phi_h) + \\ & \sum_{i \in I,\, j \in J,\, h \in H} f(i,j,h) \Dtrtd(\Phi_j,\Phi_h) \\ ={} & \sum_{i \in I,\, h \in H} \Big(\sum_{j \in J} f(i,j,h) \Big) \cdot \Dtrtd(\Phi_i, \Phi_h) + \\ & \sum_{j \in J,\, h \in H} \Big( \sum_{i \in I} f(i,j,h) \Big) \cdot \Dtrtd(\Phi_j,\Phi_h) \\ ={} & \sum_{i \in I,\, h \in H} \w_{1,3}(\Phi_i, \Phi_h) \Dtrtd(\Phi_i, \Phi_h) +\\ & \sum_{j \in J,\, h \in H} \w_{2,3}(\Phi_j, \Phi_h) \Dtrtd(\Phi_j, \Phi_h) & \text{(by construction of $f$)}\\ ={} & \Kantorovich(\Dtrtd)(\Psi_1, \Psi_3) + \Kantorovich(\Dtrtd)(\Psi_3, \Psi_2) & \text{(by definition of $\w_{1,3}, \w_{2,3}$)} \\ ={} & \Dtrdd(\Psi_1, \Psi_3) + \Dtrdd(\Psi_3, \Psi_2)& \text{(by definition)}. \end{array} \] To conclude, we need to show that $\Dtrdd$ is $1$-bounded, namely that for each $\Psi_1,\Psi_2 \in \LLd$ we have $\Dtrdd(\Psi_1,\Psi_2) \le 1$. Assume wlog that $\Psi_1 = \bigoplus_{i \in I} r_i \Phi_i$ and $\Psi_2 = \bigoplus_{j \in J} r_j \in \Phi_j$. We have \[ \begin{array}{rlr} \Dtrdd(\Psi_1,\Psi_2) ={} & \min_{\w \in \W(\Psi_1,\Psi_2)} \sum_{i \in I, j \in J} \w(\Phi_i, \Phi_j) \Dtrtd(\Phi_i, \Phi_j) \\ \le & \sum_{i \in I, j \in J} \w(\Phi_i, \Phi_j) \Dtrtd(\Phi_i, \Phi_j) & \text{(for an arbitrary $\w$)} \\ \le & \sum_{i \in I, j \in J} \w(\Phi_i, \Phi_j) & \text{($\Dtrtd$ is either $1$ or $0$)} \\ ={} & 1 & \text{($\w$ is probability distribution)}. \end{array} \] \end{proof} \begin{example} \label{ex:Dtrdd} Consider the formulae $\Psi_1 = 0.6 \diam{a}\diam{b}\top \oplus 0.4 \diam{a}\diam{c}\top$ and $\Psi_2 = 0.7 \diam{a}\diam{c}\top \oplus 0.3 \diam{a}\diam{b}\top$. We have that \[ \begin{array}{rlr} \Dtrdd(\Psi_1,\Psi_2) ={} & \min_{\w \in \W(\Psi_1,\Psi_2)} \sum_{\Phi \in \support(\Psi_1) \atop \Phi' \in \support(\Psi_2)} \w(\Phi,\Phi') \Dtrtd(\Phi,\Phi') \\ \le & 0.3 \Dtrtd(\diam{a}\diam{b}\top, \diam{a}\diam{b}\top) + 0.4 \Dtrtd(\diam{a}\diam{c}\top, \diam{a}\diam{c}\top) + 0.3 \Dtrtd(\diam{a}\diam{b}\top, \diam{a}\diam{c}\top) \\ ={} & 0.3 \cdot 0 + 0.4 \cdot 0 + 0.3 \cdot 1 \\ ={} & 0.3 \end{array} \] \end{example} Next result derives from our characterization of trace distribution equivalence of resolutions (Theorem~\ref{thm:equivalent_resolutions}). \begin{theorem} \label{thm:kernel_of_Dtrdd} The kernel of $\Dtrdd$ is trace distribution equivalence of resolutions. \end{theorem} \begin{proof} Let $s,t \in \proc$ and consider $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, and $\Z_t \in \res(t)$, with $z_t = \corr{\Z_s}^{-1}(t)$. By Theorem~\ref{thm:equivalent_resolutions} we have that $z_s \STr z_t$ if{f} $\Psi_{\Z_s} = \Psi_{\Z_t}$. Since by Proposition~\ref{prop:distance_on_LLd_is_metric} $\Dtrdd$ is a metric on $\LLd$, we have that $\Dtrdd(\Psi_{\Z_s}, \Psi_{\Z_t}) = 0$ if{f} $\Psi_{\Z_s} = \Psi_{\Z_t}$. Thus we can conclude that \[ z_s \STr z_t \quad \text{ if{f} } \quad \Psi_{\Z_s} = \Psi_{\Z_t} \quad \text{ if{f} } \quad \Dtrdd(\Psi_{\Z_s}, \Psi_{\Z_t}) = 0. \] \end{proof} We lift the distance over formulae to a distance over processes as the Hausdorff distance between the sets of formulae satisfied by them. \begin{definition} \label{def:LL_logical_distance} The $\LL$-\emph{distance} over processes $\DLLd \colon \proc \times \proc \to [0,1]$ is defined, for all $s,t \in \proc$, by \[ \DLLd(s,t) = \Hausdorff(\Dtrdd)(\LL(s), \LL(t)). \] \end{definition} \begin{proposition} \label{prop:DLLd_is_metric} The mapping $\DLLd$ is a $1$-bounded pseudometric over $\proc$. \end{proposition} \begin{proof} First we show that $\DLLd$ is a pseudometric over $\proc$, namely that for each $s,t,u \in \proc$ \begin{flalign} & \label{eq:identity} \DLLd(s,s) = 0 \\ & \label{eq:symmetry} \DLLd(s,t) = \DLLd(t,s) \\ & \label{eq:triang_ineq} \DLLd(s,t) \le \DLLd(s,u) + \DLLd(u,t) \end{flalign} Equation~\eqref{eq:identity} and Equation~\eqref{eq:symmetry} are immediate from the definition of $\DLLd$ (Definition~\ref{def:LL_logical_distance}). Let us prove Equation~\eqref{eq:triang_ineq}. Firstly, we notice that from the definition of Hausdorff distance we have \[ \DLLd(s,t) = \max \{ \sup_{\Psi \in \LL(s)} \, \inf_{\Psi' \in \LL(t)} \, \Dtrdd(\Psi,\Psi'), \; \sup_{\Psi' \in \LL(t)} \, \inf_{\Psi \in \LL(s)} \, \Dtrdd(\Psi,\Psi') \}. \] Thus, for all $s,t,u \in \proc$ we can infer that \begin{flalign} & \label{eq:Hausdorff_su} \sup_{\Psi \in \LL(s)}\, \inf_{\Psi'' \in \LL(u)} \, \Dtrdd(\Psi, \Psi'') \le \DLLd(s,u)\\ & \label{eq:Hausdorff_ut} \sup_{\Psi'' \in \LL(u)}\, \inf_{\Psi' \in \LL(t)} \, \Dtrdd(\Psi'', \Psi') \le \DLLd(u,t). \end{flalign} As a first step, we aim to show that \begin{equation} \label{eq:limited_sup_st} \sup_{\Psi \in \LL(s)}\, \inf_{\Psi' \in \LL(t)} \, \Dtrdd(\Psi, \Psi') \le \DLLd(s,u) + \DLLd(u,t). \end{equation} For sake of simplicity, we index formulae in $\LL(s)$ by indexes in the set $J$, formulae in $\LL(t)$ by indexes in set $I$ and formulae in $\LL(u)$ by indexes in $H$. By definition of infimum we have that for each $\varepsilon_1 > 0$ \begin{equation} \label{eq:epsilon_su} \text{for each } \Psi_j \in \LL(s) \text{ there is a } \Psi_{h_{j}} \in \LL(u) \text{ s.t. } \Dtrdd(\Psi_j, \Psi_{h_j}) < \inf_{\Psi_h \in \LL(u)} \,\Dtrdd(\Psi_j, \Psi_h) + \varepsilon_1 \end{equation} and analogously for each $\varepsilon_2 > 0$ \begin{equation} \label{eq:epsilon_ut} \text{for each } \Psi_h \in \LL(u) \text{ there is a } \Psi_{i_h} \in \LL(t) \text{ s.t. } \Dtrdd(\Psi_h, \Psi_{i_h}) < \inf_{\Psi_i \in \LL(t)} \, \Dtrdd(\Psi_h, \Psi_i) + \varepsilon_2. \end{equation} In particular given $\Psi_j \in \LL(s)$ let $\Psi_{h_j} \in \LL(u)$ be the index realizing Equation~\eqref{eq:epsilon_su}, with respect to $\varepsilon_1$, and let $\Psi_{i_{h_j}} \in \LL(t)$ be the index realizing Equation~\eqref{eq:epsilon_ut} with respect to $\Psi_{h_j}$ and $\varepsilon_2$. Then we have \[ \begin{array}{rlr} & \Dtrdd(\Psi_j, \Psi_{i_{h_j}}) \\ \le & \Dtrdd(\Psi_j, \Psi_{h_j}) + \Dtrdd(\Psi_{h_j}, \Psi_{i_{h_j}}) \\ < & \big( \inf_{\Psi_h \in \LL(u)} \, \Dtrdd(\Psi_j, \Psi_h) + \varepsilon_1 \big) + \big( \inf_{\Psi_i \in \LL(t)} \, \Dtrdd(\Psi_{h_j}, \Psi_i) + \varepsilon_2 \big) & \text{(Eq.~\ref{eq:epsilon_su},\ref{eq:epsilon_ut})}\\ \le & \big( \sup_{\Psi_j \in \LL(s)}\, \inf_{\Psi_h \in \LL(u)} \, \Dtrdd(\Psi_j, \Psi_h) + \varepsilon_1 \big) + \big( \sup_{\Psi_h \in \LL(u)}\, \inf_{\Psi_i \in \LL(t)} \, \Dtrdd(\Psi_h, \Psi_i) + \varepsilon_2 \big) \end{array} \] from which we gather \[ \inf_{\Psi_i \in \LL(t)} \Dtrdd(\Psi_j, \Psi_i) \le \Dtrdd(\Psi_j, \Psi_{i_{h_j}}) < \sup_{\Psi_j \in \LL(s)}\, \inf_{\Psi_h \in \LL(u)} \, \Dtrdd(\Psi_j, \Psi_h) + \sup_{\Psi_h \in \LL(u)}\, \inf_{\Psi_i \in \LL(t)} \, \Dtrdd(\Psi_h, \Psi_i) + \varepsilon_1 + \varepsilon_2. \] Thus, since $j$ was arbitrary, we obtain \[ \sup_{\Psi_j \in \LL(s)}\, \inf_{\Psi_i \in \LL(t)}\, \Dtrdd(\Psi_j, \Psi_i) \le \sup_{\Psi_j \in \LL(s)}\, \inf_{\Psi_h \in \LL(u)} \, \Dtrdd(\Psi_j, \Psi_h) + \sup_{\Psi_h \in \LL(u)}\, \inf_{\Psi_i \in \LL(t)} \, \Dtrdd(\Psi_h, \Psi_i) + \varepsilon_1 + \varepsilon_2 \] and since this relation holds for any $\varepsilon_1$ and $\varepsilon_2$ we can conclude that \[ \sup_{\Psi_j \in \LL(s)}\, \inf_{\Psi_i \in \LL(t)}\, \Dtrdd(\Psi_j, \Psi_i) \le \sup_{\Psi_j \in \LL(s)}\, \inf_{\Psi_h \in \LL(u)} \, \Dtrdd(\Psi_j, \Psi_h) + \sup_{\Psi_h \in \LL(u)}\, \inf_{\Psi_i \in \LL(t)} \, \Dtrdd(\Psi_h, \Psi_i). \] Then, by the inequalities in Equation~\eqref{eq:Hausdorff_su} and Equation~\eqref{eq:Hausdorff_ut} we can conclude that \[ \sup_{\Psi_j \in \LL(s)}\, \inf_{\Psi_i \in \LL(t)}\, \Dtrdd(\Psi_j,\Psi_i) \le \DLLd(s,u) + \DLLd(u, t) \] and thus Equation~\eqref{eq:limited_sup_st} holds. Switching the roles of $s$ and $t$ in the steps above allows us to infer \begin{equation} \label{eq:limited_sup_ts} \sup_{\Psi_i \in \LL(t)}\, \inf_{\Psi_j \in \LL(s)}\, \Dtrdd(\Psi_j,\Psi_i) \le \DLLd(s, u) + \DLLd(u,t). \end{equation} Finally, we have \[ \begin{array}{rlr} \DLLd(s, t) ={} & \max\{\sup_{\Psi_j \in \LL(s)}\, \inf_{\Psi_i \in \LL(t)}\, \Dtrdd(\Psi_j, \Psi_i), \sup_{\Psi_i \in \LL(t)}\, \inf_{\Psi_j \in \LL(s)}\, \Dtrdd(\Psi_j, \Psi_i)\} \\ \le{} & \DLLd(s,u) + \DLLd(u,t) \end{array} \] where the last relation follows by Equations~\eqref{eq:limited_sup_st} and \eqref{eq:limited_sup_ts}. To conclude, we need to show that $\DLLd$ is $1$-bounded. We recall that by Proposition~\ref{prop:distance_on_LLd_is_metric}, $\Dtrdd$ is $1$-bounded. We have \[ \begin{array}{rlr} \DLLd(s,t) ={} & \Hausdorff(\Dtrdd)(\LL(s), \LL(t)) \\ ={} & \max \left\{ \sup_{\Psi_i \in \LL(s)}\, \inf_{\Psi_j \in \LL(t)}\, \Dtrdd(\Psi_i, \Psi_j),\; \sup_{\Psi_j \in \LL(t)}\, \inf_{\Psi_i \in \LL(s)}\, \Dtrdd(\Psi_i, \Psi_j) \right\} \\ \le & \max \{ 1,\,1 \} \\ ={} & 1. \end{array} \] \end{proof} \begin{proposition} \label{prop:LLs_closure} Let $s \in \proc$. The set $\LL(s)$ is a closed subset of $\LL$ wrt.\ the topology induced by $\Dtrdd$. \end{proposition} \begin{proof} As we are working on a metric space, the proof obligation is equivalent to prove that each sequence in $\LL(s)$ that admits a limit converges in $\LL(s)$, namely \begin{equation} \label{eq:prop_closure_proof_obligation} \text{for each } \{\Psi_n\}_{n \in \N} \subseteq \LL(s) \text{ s.t. there is } \Psi \in \LL \text{ with } \lim_{n \to \infty} \Psi_n = \Psi \text{ then } \Psi \in \LL(s). \end{equation} From Theorem~\ref{thm:LLs_is_cup_tracing_formula_resolution} we have that $ \LL(s) = \{\top\} \cup \{\Psi_{\Z} \mid \Z \in \res(s) \}. $ Since a finite union of closed sets is closed, the proof obligation Equation~\eqref{eq:prop_closure_proof_obligation} is equivalent to prove that \begin{flalign} \label{eq:true} & \{ \top \} \text{ is closed}\\ \label{eq:diam} & \{\Psi_{\Z} \mid \Z \in \res(s)\} \text{ is closed} \end{flalign} Equation~\eqref{eq:true} is immediate since the only sequence in $\{\top\}$ admitting a limit is the constant sequence $\Psi_n = \top$ for all $n \in \N$. Let us deal now with Equation~\eqref{eq:diam}. First of all, we notice that sequences in $\{\Psi_{\Z} \mid \Z \in \res(s)\}$ can be written in the general form \[ \Psi_n = \bigoplus_{i \in I_n} r_i^{(n)} \Phi_i^{(n)} \] with $\{\bigoplus_{i \in I_n} r_i^{(n)}\Phi_i^{(n)}\}_{n \in \N} \subseteq \LL(s) \setminus \{\top\}$. Assume that there is a trace distribution formula $\Psi \in \LLd$ s.t.\ $\lim_{n \to \infty} \Psi_n = \Psi$. We aim to show that $\Psi \in \LL(s)$, namely that \begin{equation} \label{eq:seq_diam} \Psi = \Psi_{\Z} \text{ for some } \Z \in \res(s). \end{equation} In what follows, we assume wlog that limit trace distribution formula $\Psi$ has the form $\Psi = \bigoplus_{j \in J} r_j \Phi_j$. From $\{\bigoplus_{i \in I_n} r_i^{(n)} \Phi_i^{(n)}\}_{n \in \N} \subseteq \LL(s) \setminus \{\top\}$ we gather that for each $n \in \N$ there is a resolution $\Z_n \in \res(s)$ s.t.\ $\Psi_{\Z_n} = \bigoplus_{i \in I_n} r_i^{(n)} \Phi_i^{(n)}$. For each $n \in \N$, let $z_n = \corr{\Z_n}^{-1}(s)$. Then $\Psi_{\Z_n} = \bigoplus_{i \in I_n} r_i^{(n)} \Phi_i^{(n)}$ implies that $\displaystyle I_n = \tr(\C_{\max}(z_n))$, namely $I_n$ is the set of traces to which the maximal computations of the process $z_n$ are compatible. Hence, for each $i \in I_n$ we have that $\Phi_i^{(n)}$ is the tracing formula of the trace indexed by $i$ and $\displaystyle r_i^{(n)} = \pr(\C_{\max}(z_n,i))$. We notice that \[ \begin{array}{rlr} & \lim_{n \to \infty} \Psi_n = \Psi \\ \text{if{f} } & \lim_{n \to \infty} \Dtrdd(\Psi_n, \Psi) = 0 \\ \text{if{f} } & \lim_{n \to \infty} \Kantorovich(\Dtrtd)(\Psi_n, \Psi) = 0 \end{array} \] that is if{f} the sequence $\{\Psi_n\}_{n \in \N}$ converges to $\Psi$ with respect to the Kantorovich metric. Since we are considering distributions with finite support, the convergence with respect to the Kantorovich metric is equivalent to the weak convergence of probability distributions (also called convergence in distribution) which states that $\lim_{n \to \infty}\Psi_n(\Phi) = \Psi(\Phi)$ for each continuity point $\Phi \in \LLt$ of $\Psi$. Since the probability distribution over trace formuale $\Psi$ is discrete and with finite support, its continuity points are the trace formulae which are not in its support. Hence, we have that $\lim_{n \to \infty}\Psi_n(\Phi) = 0$ for each $\Phi \not\in \{\Phi_j \mid j \in J\}$. More specifically, we obtain that $\lim_{n \to \infty} I_n = J$ which gives that if there is an index $\tilde{i}$ s.t.\ $\lim_{n \to \infty}\Phi_{\tilde{i}}^{(n)} \not \in \{\Phi_j \mid j \in J\}$, or if $\{\Phi_{\tilde{i}}^{(n)}\}_{n \in N}$ has no limit, then $\lim_{n \to \infty} r_{\tilde{i}}^{(n)} = 0$. Furthermore, since $\Dtrtd$ is the discrete metric over $\LLt$, we have that a sequence of trace formulae $\{\Phi^{(n)}\}_{n \in \N}$ converges to $\Phi$ if{f} the sequence is definitively constant, namely if{f} there is an $N \in \N$ s.t.\ $\Phi^{(n)} = \Phi$ for all $n \ge N$. Therefore, from $\lim_{n \to \infty} I_n = J$ we can infer that there is an $N \in \N$ s.t.\ $I_n = J$ for all $n \ge N$. Consequently, by construction of the sets $I_n$, we obtain that $J = \tr(\C_{\max}(z_N))$ thus giving that, for each $j \in J$, $\Phi_j$ is the tracing formula of the trace indexed by $j$. Since moreover we are considering image-finite processes, for each $j \in J$ $\pr(\C_{\max}(z_n,j))$ assumes only a finite number of values wrt\ $n \ge N$. Therefore, we can infer that there is an $M \ge N \in \N$ s.t.\ for each $j \in J$ we have $\pr(\C_{\max}(z_n,j)) = \pr(\C_{\max}(z_m,j))$ for all $n,m \ge M$. Thus, from Definition~\ref{def:mimicking_formula_for_traces}, we infer that the resolution $\Z_M \in \res(s)$, namely the resolution whose mimicking formula corresponds to the $M$-th trace distribution formula in the sequence $\{\Psi_n\}_{n \in \N}$, is s.t.\ $\Psi = \Psi_{\Z_M}$, thus proving Equation~\eqref{eq:seq_diam} and concluding the proof. \end{proof} From our $\LL$-characterization of strong trace equivalence (Theorem~\ref{thm:det_char}) we obtain the following result. \begin{theorem} \label{thm:kernel_of_DLLd} The kernel of $\DLLd$ is trace equivalence. \end{theorem} \begin{proof} ($\Rightarrow$) Assume first that $s \STr t$. We aim to show that this implies that $\DLLd(s,t) = 0$. By Theorem~\ref{thm:det_char} we have that $s \STr t$ implies that $\LL(s) = \LL(t)$ from which we gather \[ \DLLd(s,t) = \Hausdorff(\Dtrdd)(\LL(s), \LL(t)) = 0. \] ($\Leftarrow$) Assume now that $\DLLd(s,t) = 0$. We aim to show that this implies that $s \STr t$. Since $\LL(s)$ and $\LL(t)$ are closed by Proposition~\ref{prop:LLs_closure} and since $\DLLd$ is a pseudometric by Proposition~\ref{prop:DLLd_is_metric}, from $\DLLd(s,t) = 0$ we can infer that $\LL(s) = \LL(t)$. By Theorem~\ref{thm:det_char} we can conclude that $s \STr t$. \end{proof} Finally, we obtain the characterization of the strong trace metric. \begin{theorem} [Characterization of strong trace metric] \label{thm:LL_metric_char} For all $s,t \in \proc$ we have $\TraceMetric(s,t) = \DLLd(s,t)$. \end{theorem} \begin{proof} By definition of trace metric (Definition~\ref{def:trace_metric}) we have that \[ \TraceMetric(s,t) ={} \max \left\{ \sup_{\Z_s \in \res(s)}\, \inf_{\Z_t \in \res(t)} \, D_T(\Z_s,\Z_t), \; \sup_{\Z_t \in \res(t)} \, \inf_{\Z_s \in \res(s)} D_T (\Z_s, \Z_t) \right\}. \] By definition of $\LL$-distance over processes (Definition~\ref{def:LL_logical_distance}) we have that \[ \begin{array}{rlr} \DLLd(s,t) ={} & \Hausdorff(\Dtrdd)(\LL(s), \LL(t)) \\ ={} & \Hausdorff(\Dtrdd)(\{\top\} \cup \{\Psi_{\Z_s} \mid \Z_s \in \res(s)\}, \{\top\} \cup \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}) \\ ={} & \Hausdorff(\Dtrdd)(\{\Psi_{\Z_s} \mid \Z_s \in \res(s)\}, \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}) \\ ={} & \max \left\{ \sup_{\Z_s \in \res(s)}\, \inf_{\Z_t \in \res(t)} \, \Dtrdd(\Psi_{\Z_s}, \Psi_{\Z_t}), \; \sup_{\Z_t \in \res(t)} \, \inf_{\Z_s \in \res(s)} \Dtrdd (\Psi_{\Z_s}, \Psi_{\Z_t}) \right\} \end{array} \] where the third equality follows from the fact that by Def.~\ref{def:metric_on_LLd} we have $\Dtrdd(\top,\top) = 0$ and $\Dtrdd(\top, \Psi) = 1$ for any $\Psi \neq \top$. Thus we have that $\top = \argmin_{\Psi \in \{\top\} \cup \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}} \Dtrdd(\top, \Psi)$ and symmetrically $\top = \argmin_{\Psi \in \{\top\} \cup \{\Psi_{\Z_s} \mid \Z_s \in \res(s)\}} \Dtrdd(\Psi, \top)$. Moreover, for any $\Psi \neq \top$ we have that $\Dtrdd(\Psi, \Psi') \le \Dtrdd(\Psi, \top)$ for any $\Psi' \in \{\Psi_{\Z_t} \mid \Z_t \in \res(t)\}$ and $\Dtrdd(\Psi'', \Psi) \le \Dtrdd(\top, \Psi)$ for any $\Psi'' \in \{\Psi_{\Z_s} \mid \Z_s \in \res(s)\}$. Hence, to prove the thesis it is enough to show that \begin{equation} \label{eq:thm_LL_metric_char_proof_obligation} D_T(\Z_s, \Z_t) = \Dtrdd(\Psi_{\Z_s}, \Psi_{\Z_t}) \text{ for all } \Z_s \in \res(s), \Z_t \in \res(t). \end{equation} Let $\Z_s \in \res(s)$, with $z_s = \corr{\Z_s}^{-1}(s)$, and $\Z_t \in \res(t)$, with $z_t = \corr{\Z_t}^{-1}(t)$. Then by definition of mimicking formula (Definition~\ref{def:mimicking_formula_for_traces}) we have \[ \Psi_{\Z_s} = \bigoplus_{\alpha \in \tr(\C_{\max}(z_s))} \pr(\C_{\max}(z_s,\alpha)) \Phi_{\alpha} \] where for each $\alpha \in \tr(\C_{\max}(z_s))$ we have that $\Phi_{\alpha}$ is the tracing formula for the trace $\alpha$. Similarly, \[ \Psi_{\Z_t} = \bigoplus_{\beta \in \tr(\C_{\max}(z_t))} \pr(\C_{\max}(z_t,\beta)) \Phi_{\beta} \] where for each $\beta \in \tr(\C_{\max}(z_t))$ we have that $\Phi_{\beta}$ is the tracing formula for the trace $\beta$. By definition of trace distance between resolutions (Definition~\ref{def:trace_metric_det_res}) we have that \begin{equation} \label{eq:DTZsZt} D_T(\Z_s, \Z_t) = \min_{\w \in \W(\TD_{\Z_s}, \TD_{\Z_t})} \sum_{\alpha \in \tr(\C_{\max}(z_s)), \beta \in \tr(\C_{\max}(z_t))} \w(\alpha,\beta) d_T(\alpha,\beta) \end{equation} where, by definition of trace distance between traces (Definition~\ref{def:trace_metric_traces}), we have that $d_t (\alpha, \beta) = 0$ if $\alpha = \beta$ and $d_t(\alpha,\beta) = 1$ otherwise. Hence, by definition of tracing formula (Definition~\ref{def:tracing_formula}), we have that for all $\alpha \in \tr(\C_{\max}(z_s)), \beta \in \tr(\C_{\max}(z_t))$ we have $ d_T (\alpha, \beta) = \Dtrtd(\Phi_{\alpha}, \Phi_{\beta}) $, thus giving \begin{equation} \label{eq:DTZsZt2} \eqref{eq:DTZsZt} = \min_{\w \in \W(\TD_{\Z_s}, \TD_{\Z_t})} \sum_{\alpha \in \tr(\C_{\max}(z_s)), \beta \in \tr(\C_{\max}(z_t))} \w(\alpha,\beta) \Dtrtd(\Phi_{\alpha}, \Phi_{\beta}). \end{equation} Let $\bar{\w}$ be an optimal matching for $D_T(\Z_s, \Z_t)$, namely \begin{equation} \label{eq:DTZsZt3} \eqref{eq:DTZsZt2} = \sum_{\alpha \in \tr(\C_{\max}(z_s)), \beta \in \tr(\C_{\max}(z_t))} \bar{\w}(\alpha, \beta) \Dtrtd(\Phi_{\alpha}, \Phi_{\beta}). \end{equation} Then, by definition of matching and of $\TD_{\_}$ (Definition~\ref{def:trace_distribution}) we have that for any $\alpha \in \tr(\C_{\max}(z_s)), \beta \in \tr(\C_{\max}(z_t))$ \[ \begin{array}{rlr} \pr(\C_{\max}(z_s,\alpha)) = \TD_{\Z_s}(\alpha) = \sum_{\beta \in \tr(\C_{\max}(z_t))} \bar{\w}(\alpha,\beta) \\ \pr(\C_{\max}(z_t,\beta)) = \TD_{\Z_t}(\beta) = \sum_{\alpha \in \tr(\C_{\max}(z_s))} \bar{\w}(\alpha,\beta). \end{array} \] Therefore we have obtained that $\bar{\w}$ is a matching for $\Psi_{\Z_s}$ and $\Psi_{\Z_t}$. In particular we notice that $\bar{\w}$ is actually an optimal matching for $\Psi_{\Z_s}, \Psi_{\Z_t}$. This follows from the optimality of $\bar{\w}$ for $\TD_{\Z_s}, \TD_{\Z_t}$. In fact each matching for $\Psi_{\Z_s}, \Psi_{\Z_t}$ can be constructed from a matching for $\TD_{\Z_s}, \TD_{\Z_t}$ using the same technique proposed above. Moreover, given $\w_1 \in \W(\TD_{\Z_s}, \TD_{\Z_t})$ and $\w_2$ being the matching for $\Psi_1,\Psi_2$ built from it, the reasoning above guarantees that \[ \sum_{\alpha \in \tr(\C_{\max}(z_s)), \beta \in \tr(\C_{\max}(z_t))} \w_1(\alpha, \beta) d_T(\alpha, \beta) = \sum_{\alpha \in \tr(\C_{\max}(z_s)) \atop \beta \in \tr(\C_{\max}(z_t))} \w_2(\alpha, \beta) \Dtrtd(\Phi_{\alpha}, \Phi_{\beta}). \] $\bar{\w}$ being optimal for $D_T$ implies $\tilde{\w}$ being optimal for $\Dtrdd$. Hence by Definition~\ref{def:metric_on_LLd} we have \[ \Dtrdd(\Psi_{\Z_s}, \Psi_{\Z_t}) = \sum_{\alpha \in \tr(\C_{\max}(z_s)), \beta \in \tr(\C_{\max}(z_t))} \bar{\w}(\alpha, \beta) \Dtrtd(\Phi_{\alpha}, \Phi_{\beta}). \] From Equation~\eqref{eq:DTZsZt3} we infer $ D_T(\Z_s, \Z_t) = \Dtrdd(\Psi_{\Z_s}, \Psi_{\Z_t}) $ thus proving Equation~\eqref{eq:thm_LL_metric_char_proof_obligation} and concluding the proof. \end{proof} \subsection{$\LLw$-characterization of weak trace metric} \label{sec:char_metric_weak} The idea behind the definition of a metric on $\LLw$ is pretty much the same to the strong case. The main difference is that the distance on $\LLw$ is a pseudometric whose kernel is given by $\LLw$-equivalence. \begin{definition} [Distance on $\LLwt$] \label{def:metric_on_LLwt} The function $\Dtrtdw \colon \LLwt \times \LLwt \to [0,1]$ is defined over $\LLwt$ as follows: \[ \Dtrtdw( \Phi_1, \Phi_2 ) = \begin{cases} 0 & \text{ if } \Phi_1 \eqtrace \Phi_2 \\ 1 & \text{ otherwise.} \end{cases} \] \end{definition} Clearly, $\Dtrtdw$ is a pseudometric on $\LLwt$ whose kernel is given by equivalence of trace formulae and we can lift it to a pseudometric over $\LLwd$ via the Kantorovich lifting functional. \begin{definition} [Distance on $\LLwd$] \label{def:metric_on_LLwd} The function $\Dtrddw \colon \LLwd \times \LLwd \to [0,1]$ is defined over $\LLwd$ as follows: \[ \Dtrddw(\Psi_1, \Psi_2) = \Kantorovich(\Dtrtdw)(\Psi_1, \Psi_2). \] \end{definition} \begin{proposition} \label{prop:distance_on_LLwd_is_metric} The function $\Dtrddw$ is a $1$-bounded pseudometric over $\LLwd$. \end{proposition} \begin{proof} The same arguments used in the proof of Proposition~\ref{prop:distance_on_LLd_is_metric} apply, where in place of item~\ref{item:identity} we simply need to show that $\Dtrddw(\Psi,\Psi) = 0$, which is immediate from the definition through the Kantorovich pseudometric. \end{proof} \begin{theorem} \label{thm:kernel_of_Dtrddw} The kernel of $\Dtrddw$ is $\LLw$-equivalence of trace distribution formulae. \end{theorem} \begin{proof} ($\Rightarrow$) Assume first that $\Dtrddw(\Psi_1,\Psi_2) = 0$ for $\Psi_1 = \bigoplus_{i \in I} r_i \Phi_i$ and $\Psi_2 = \bigoplus_{j \in J} r_j \Phi_j$. We aim to show that this implies $\Psi_1 \eqtrace^{\dagger} \Psi_2$. From the assumption, we have \[ \begin{array}{rlr} 0 ={} & \Dtrddw(\bigoplus_{i \in I} r_i \Phi_i, \bigoplus_{j \in J} r_j \Phi_j)\\ ={} & \min_{\w \in \W(\Psi_1, \Psi_2)} \sum_{i \in I,\, j \in J} \w(\Phi_i, \Phi_j) \Dtrtdw(\Phi_i ,\Phi_j) \\ ={} & \sum_{i \in I,\, j \in J} \w(\Phi_i,\Phi_j) \Dtrtdw(\Phi_i,\Phi_j) & \text{(for $\w$ optimal matching)}. \end{array} \] Thus, for each $i \in I$ and $j \in J$ we can distinguish two cases: \begin{itemize} \item either $\w(\Phi_i, \Phi_j)=0$, \item or $\w(\Phi_i, \Phi_j) >0$, implying $\Dtrtdw(\Phi_i, \Phi_j)=0$, which is equivalent to say that $\Phi_i \eqtrace \Phi_j$ by Definition~\ref{def:metric_on_LLwt}. \end{itemize} For each $i \in I$, let $J_i \subseteq J$ be the set of indexes $j_i$ for which $\w(\Phi_i, \Phi_{j_i})>0$ and, symmetrically, for each $j \in J$ let $I_j \subseteq I$ be the set of indexes $i_j$ for which $\w(\Phi_{i_j}, \Phi_j)>0$. So we have \[ \begin{array}{rlr} \Psi_1 ={} & \bigoplus_{i \in I} r_i \Phi_i \\ ={} & \bigoplus_{i \in I} \big(\sum_{j \in J} \w(\Phi_i, \Phi_j)\big) \Phi_i & \text{($\w \in \W(\Psi_1,\Psi_2)$)} \\ \eqtrace^{\dagger} & \bigoplus_{i \in I} \big(\sum_{j_i \in J_i} \w(\Phi_i, \Phi_{j_j}) \big) \Phi_i & \text{(by construction of each $J_i$)}\\ \eqtrace^{\dagger} & \bigoplus_{i \in I,\, j_i \in J_i} \w(\Phi_i, \Phi_{j_i}) \Phi_{j_i} & \text{($\Phi_i \eqtrace \Phi_{j_i}$ for each $j_i \in J_i$)} \\ \eqtrace^{\dagger} & \bigoplus_{i \in I,\, j_i \in J_i,\, i'_{j_i} \in I_{j_i}} \w(\Phi_{i'_{j_i}}, \Phi_{j_i}) \Phi_{i'_{j_i}} & \text{($\Phi_{i'_{j_i}} \eqtrace \Phi_{j_i}$ for each $i'_{j_i} \in I_{j_i}$)} \\ \eqtrace^{\dagger} & \bigoplus_{i_j \in I_j,\, j \in J} \w(\Phi_{i_j}, \Phi_j) \Phi_{i_j} & \text{(all indexes $j \in J$ are involved)}\\ \eqtrace^{\dagger} & \bigoplus_{j \in J} \big( \sum_{i_j \in I_j} \w(\Phi_{i_j}, \Phi_j) \big) \Phi_j & \text{($\Phi_j \eqtrace \Phi_{i_j}$ for each $i_j \in I_j$)} \\ \eqtrace^{\dagger} & \bigoplus_{j \in J} \big( \sum_{i \in I} \w(\Phi_i, \Phi_j) \big) \Phi_j & \text{(by construction of each $I_j$)}\\ ={} & \bigoplus_{j \in J} r_j \Phi_j & \text{($\w \in \W(\Psi_1,\Psi_2)$)} \\ ={} & \Psi_2. \end{array} \] $(\Leftarrow)$. Assume that $\Psi_1 \eqtrace^{\dagger} \Psi_2$. We aim to show that $\Dtrddw(\Psi_1, \Psi_2) = 0$. Assume wlog. that $\Psi_1 = \bigoplus_{i \in I} r_i \Phi_i$. By definition of $\eqtrace$ (Definition~\ref{def:eqtrace}) and definition of lifting of a relation (Definition~\ref{def:lifting_relation}), from $\Psi_2 \eqtrace^{\dagger} \bigoplus_{i \in I} r_i \Phi_i$ we gather $\Psi_2 = \bigoplus_{i \in I \atop j_i \in J_i} r_{j_i}\Phi_{j_i}$ with $\sum_{j_i \in J_i} r_{j_i} = r_i$ and $\Phi_{j_i} \eqtrace \Phi_i$ for all $j_i \in J_i, i \in I$. Then \[ \begin{array}{rlr} \Dtrddw(\Psi_1,\Psi_2) ={} & \Dtrddw(\bigoplus_{i \in I} r_i \Phi_i, \bigoplus_{i \in I,\, j_i \in J_i} r_{j_i} \Phi_{j_i}) \\ ={} & \min_{\w \in \W(\Psi_1, \Psi_2)} \sum_{i \in I,\, j_h \in J_h \atop h \in I} \w(\Phi_i, \Phi_{j_h}) \Dtrtdw(\Phi_i ,\Phi_{j_h}) \\ \le{} & \sum_{i \in I,\, j_h \in J_h \atop h \in I} \tilde{\w}(\Phi_i, \Phi_{j_h}) \Dtrtdw(\Phi_i ,\Phi_{j_h}) \\ ={} & \sum_{i \in I,\, j_i \in J_i} r_{j_i} \Dtrtdw(\Phi_i ,\Phi_{j_i}) \\ ={} & 0 & \text{($\Phi_i \eqtrace \Phi_{j_i}$ for each $j_i \in J_i$)} \end{array} \] where the inequality follows by observing that function $\tilde{\w}$ defined by $\tilde{\w}(\Phi_i, \Phi_{j_h}) = r_{j_i}$ if $h = i$ and $\tilde{\w}(\Phi_i, \Phi_{j_h}) = 0$ otherwise, is a matching in $\W(\Psi_1, \Psi_2)$. \end{proof} \begin{corollary} \label{cor:kernel_of_Dtrddw} $\Z_1,\Z_2 \in \res(\proc)$ are weak trace distribution equivalent if{f} $\Dtrddw(\Psi_{\Z_1}, \Psi_{\Z_2}) = 0$. \end{corollary} \begin{proof} ($\Rightarrow$) Assume first that $\Z_1$ and $\Z_2$ are weak trace distribution equivalent. Then from Theorem~\ref{thm:equivalent_resolutions_weak} we infer that $\Psi_{\Z_1} \eqtrace \Psi_{\Z_2}$. By Theorem~\ref{thm:kernel_of_Dtrddw} this implies $\Dtrddw(\Psi_{\Z_1}, \Psi_{\Z_2}) = 0$. ($\Leftarrow$) Assume now that $\Dtrddw(\Psi_{\Z_1},\Psi_{\Z_2}) = 0$. Then from Theorem~\ref{thm:kernel_of_Dtrddw} we infer that $\Psi_{\Z_1} \eqtrace \Psi_{\Z_2}$. By Theorem~\ref{thm:equivalent_resolutions_weak} this implies that $\Z_1$ and $\Z_2$ are weak trace distribution equivalent. \end{proof} By the Hausdorff functional we lift the pseudometric $\Dtrddw$ to a pseudometric over processes. \begin{definition} \label{def:LLw_logical_distance} The $\LLw$-\emph{distance} over processes $\DLLdw \colon \proc \times \proc \to [0,1]$ is defined, for all $s,t \in \proc$, by \[ \DLLdw(s,t) = \Hausdorff(\Dtrddw)(\LLw(s), \LLw(t)). \] \end{definition} \begin{proposition} \label{prop:DLLdw_is_metric} The mapping $\DLLdw$ is a $1$-bounded pseudometric over $\proc$. \end{proposition} \begin{proof} The same arguments used in the proof of Proposition~\ref{prop:DLLd_is_metric} apply. \end{proof} \begin{proposition} \label{prop:LLsw_closure} Let $s \in \proc$. The set $\LLw(s)$ is a closed subset of $\LLw$ wrt.\ the topology induced by $\Dtrddw$. \end{proposition} \begin{proof} Since $(\LLwd,\Dtrddw)$ is a pseudometric space (Proposition~\ref{prop:distance_on_LLwd_is_metric} and Theorem~\ref{thm:kernel_of_Dtrddw}), to prove the thesis we need to show that the quotient space $\LLw(s)_{/\eqtrace}$ is a closed subset of $\LLw_{/\eqtrace}$ with respect to the topology induced by $\Dtrddw$ (in fact $(\LLwd_{/\eqtrace}, \Dtrddw)$ is a metric space). From Remark~\ref{rmk:equivalence_is_equality} we have that $\LLwd_{/\eqtrace} = \LLd$ and $\LLw(s)_{/\eqtrace} = \LL(s)$. Moreover, we have that $\Dtrddw\mid_{\LLwd_{/\eqtrace}} = \Dtrdd$. Hence, the same arguments used in the proof of Proposition~\ref{prop:LLs_closure} allow us to prove that $\LLw(s)_{/\eqtrace}$ is a closed subset of $\LLw_{/\eqtrace}$ wrt. the topology induced by $\Dtrddw$. This gives the result also for $\LLw(s)$ wrt to $\LLw$ and $\Dtrddw$. \end{proof} \begin{theorem} \label{thm:kernel_of_DLLdw} The kernel of $\DLLdw$ is weak trace equivalence. \end{theorem} \begin{proof} ($\Rightarrow$) Assume that $s \WTr t$. We aim to show that $\DLLdw(s,t) = 0$. By Theorem~\ref{thm:weak_char} we have that $s \WTr t$ implies that $\LLw(s) \eqtrace^{\dagger} \LLw(t)$. Since the kernel of $\Dtrddw$ is given by $\eqtrace^{\dagger}$ (Theorem~\ref{thm:kernel_of_Dtrddw}), we can infer \[ \DLLdw(s,t) = \Hausdorff(\Dtrtdw)(\LLw(s), \LLw(t)) = 0. \] ($\Leftarrow$) Assume now that $\DLLdw(s,t) = 0$. We aim to show that this implies that $s \WTr t$. Since \begin{inparaenum}[(i)] \item $\LLw(s)$ and $\LLw(t)$ are closed by Proposition~\ref{prop:LLsw_closure}, \item $\DLLdw$ is a pseudometric by Proposition~\ref{prop:DLLdw_is_metric} and \item the kernel of $\Dtrddw$ is $\eqtrace^{\dagger}$ by Theorem~\ref{thm:kernel_of_Dtrddw}, \end{inparaenum} from $\DLLdw(s,t) = 0$ we can infer $\LLw(s) \eqtrace^{\dagger} \LLw(t)$. Then, by Theorem~\ref{thm:weak_char} we can conclude $s \WTr t$. \end{proof} Finally, we obtain the characterization of the weak trace metric. \begin{theorem} [Characterization of weak trace metric] \label{thm:LLw_metric_char} For all $s,t \in \proc$ we have $\wTraceMetric(s,t) = \DLLdw(s,t)$. \end{theorem} \begin{proof} The same arguments used in the proof of Thm~\ref{thm:LL_metric_char} apply. \end{proof} \section{From boolean to real semantics} \label{sec:boom} In this section we focus on $\LL$ and we exploit the distance between formulae to define a real valued semantics for it, namely given a process $s$ we assign to each formula a value in $[0,1]$ expressing the probability that $s$ satisfies it. Then we show that our logical characterization of trace metric can be restated in terms of the general schema $\displaystyle\TraceMetric(s,t) = \sup_{\Psi \in \LLd} \mid \val{\Psi}{s} - \val{\Psi}{t} \mid$ where $\val{\Psi}{s}$ denotes the value of the formula $\Psi$ at process $s$, accordingly to the new real valued semantics. We remark that although, due to space restrictions, we present only the result for $\LL$, the technique we propose would lead to the same results when applied to $\LLw$. First of all, we recall the notion of \emph{distance function}, namely the distance between a point and a set. \begin{definition} [Distance function] \label{def:distance_function} Let $\LL' \subseteq \LLd$. Given any $\Psi \in \LLd$ we denote by $\Dtrdd(\Psi, \LL')$ the \emph{distance between $\Psi$ and the set} $\LL'$ defined by $ \displaystyle \Dtrdd(\Psi, \LL') = \inf_{\Psi' \in \LL'} \Dtrdd(\Psi, \Psi'). $ \end{definition} Then we obtain the following characterization of the Hausdorff distance. \begin{proposition} \label{prop:char_Hausdorff} Let $\LL_1, \LL_2 \subseteq \LLd$. Then it holds that $ \displaystyle \Hausdorff(\Dtrdd)(\LL_1,\LL_2) = \sup_{\Psi \in \LLd} | \Dtrdd(\Psi, \LL_1) - \Dtrdd(\Psi, \LL_2) |. $ \end{proposition} \begin{proof} It is clear that \begin{equation} \label{eq:gen_Hausdorff} \Hausdorff(\Dtrdd)(\LL_1,\LL_2) = \max \left\{ \sup_{\Psi_1 \in \LL_1} \Dtrdd(\Psi_1,\LL_2),\; \sup_{\Psi_2 \in \LL_2} \Dtrdd(\Psi_2, \LL_1) \right\}. \end{equation} Firstly we show that \begin{equation} \label{eq:hausdorff_le} \Hausdorff(\Dtrdd)(\LL_1,\LL_2) \le \sup_{\Psi \in \LLd} | \Dtrdd(\Psi, \LL_1) - \Dtrdd(\Psi, \LL_2) |. \end{equation} Without loss of generality, we can assume that $\Hausdorff(\Dtrdd)(\LL_1, \LL_2) = \sup_{\Psi_1 \in \LL_1} \Dtrdd(\Psi_1,\LL_2)$. Then we have \[ \begin{array}{rlr} \sup_{\Psi_1 \in \LL_1} \Dtrdd(\Psi_1,\LL_2) ={} & \sup_{\Psi_1 \in \LL_1} | \Dtrdd(\Psi_1,\LL_2) - \Dtrdd(\Psi_1, \LL_1) | \\ \le & \sup_{\Psi \in \LLd} |\Dtrdd(\Psi, \LL_2) - \Dtrdd(\Psi, \LL_1)| \end{array} \] from which Equation~\eqref{eq:hausdorff_le} holds. Next, we aim to show the converse inequality, namely \begin{equation} \label{eq:hausdorff_ge} \Hausdorff(\Dtrdd)(\LL_1,\LL_2) \ge \sup_{\Psi \in \LLd} | \Dtrdd(\Psi, \LL_1) - \Dtrdd(\Psi, \LL_2) |. \end{equation} To this aim, we show that \begin{equation} \label{eq:hausdorff_ge_1} \text{for each } \Psi \in \LLd \text{ it holds }| \Dtrdd(\Psi, \LL_1) - \Dtrdd(\Psi, \LL_2) | \le \Hausdorff(\Dtrdd)(\LL_1,\LL_2) . \end{equation} \begin{itemize} \item Assume $\Psi \in \LL_1$. Then $\Dtrdd(\Psi, \LL_1) = 0$ so that $|\Dtrdd(\Psi, \LL_1) - \Dtrdd(\Psi, \LL_2)| = \Dtrdd(\Psi, \LL_2)$. Moreover \[ \Dtrdd(\Psi, \LL_2) \le \sup_{\Psi_1 \in \LL_1} \Dtrdd(\Psi_1, \LL_2) \le \Hausdorff(\Dtrdd)(\LL_1,\LL_2) \] and Equation~\eqref{eq:hausdorff_ge_1} follows in this case. \item The case of $\Psi \in \LL_2$ is analogous and therefore Equation~\eqref{eq:hausdorff_ge_1} follows also in this case. \item Finally, assume that $\Psi \not\in \LL_1 \cup \LL_2$. Without loss of generality, we can assume that $\Dtrdd(\Psi, \LL_1) \ge \Dtrdd(\Psi, \LL_2)$. By definition of \emph{infimum} it holds that for each $\epsilon > 0$ there is a formula $\Psi_{\epsilon} \in \LL_2$ s.t.\ \begin{equation} \label{eq:inf_limit} \Dtrdd(\Psi, \Psi_{\epsilon}) < \Dtrdd(\Psi, \LL_2) + \epsilon. \end{equation} Analogously, for each $\epsilon' > 0$ and for each $\Psi_2 \in \LL_2$ there is a $\Psi_{\epsilon'} \in \LL_1$ s.t.\ \begin{equation} \label{eq:inf_limit_1} \Dtrdd(\Psi_2, \Psi_{\epsilon'}) < \Dtrdd(\Psi_2, \LL_1) + \epsilon'. \end{equation} Let us fix $\epsilon, \epsilon' > 0$. Then let $\Psi_{\epsilon} \in \LL_2$ be the formula realizing Equation~\eqref{eq:inf_limit}, with respect to $\Psi$, and let $\tilde{\Psi_{\epsilon'}}$ be the formula in $\LL_1$ realizing Equation~\eqref{eq:inf_limit}, with respect to this $\Psi_{\epsilon}$. Therefore, we have \[ \begin{array}{rlr} & |\Dtrdd(\Psi, \LL_1) - \Dtrdd(\Psi, \LL_2)|\\ = & \Dtrdd(\Psi, \LL_1) - \Dtrdd(\Psi, \LL_2)\\ < & \Dtrdd(\Psi, \LL_1) - \Dtrdd(\Psi, \Psi_{\epsilon}) + \epsilon & \text{(by Equation~\eqref{eq:inf_limit})} \\ = & \inf_{\Psi_1 \in \LL_1} \Dtrdd(\Psi, \Psi_1) - \Dtrdd(\Psi, \Psi_{\epsilon}) + \epsilon & \text{(by Definition~\ref{def:distance_function})} \\ < & \Dtrdd(\Psi, \tilde{\Psi_{\epsilon'}}) - \Dtrdd(\Psi, \Psi_{\epsilon}) + \epsilon \\ \le & \Dtrdd(\Psi, \Psi_{\epsilon}) + \Dtrdd(\Psi_{\epsilon}, \tilde{\Psi_{\epsilon'}}) - \Dtrdd(\Psi, \Psi_{\epsilon}) + \epsilon & \text{(by triangle inequality)} \\ = & \Dtrdd(\Psi_{\epsilon}, \tilde{\Psi_{\epsilon'}}) + \epsilon \\ < & \Dtrdd(\Psi_{\epsilon}, \LL_1) + \epsilon' + \epsilon & \text{(by Equation~\eqref{eq:inf_limit_1})}\\ \le & \sup_{\Psi_2 \in \LL_2} \Dtrdd(\Psi_2, \LL_1) + \epsilon' + \epsilon \\ \le & \Hausdorff(\Dtrdd)(\LL_1,\LL_2) + \epsilon' + \epsilon & \text{(by Equation~\eqref{eq:gen_Hausdorff}).} \end{array} \] Summarizing, we have obtained that \[ |\Dtrdd(\Psi, \LL_1) - \Dtrdd(\Psi, \LL_2)| < \Hausdorff(\Dtrdd)(\LL_1,\LL_2) + \epsilon' + \epsilon \] and since this inequality holds for each $\epsilon$ and $\epsilon'$, we can conclude that Equation~\eqref{eq:hausdorff_ge_1} holds. \end{itemize} Equation~\eqref{eq:hausdorff_le} and Equation~\eqref{eq:hausdorff_ge} taken together prove the thesis. \end{proof} To define the real-valued semantics of $\LLd$ we exploit the distance $\Dtrdd$. Informally, to quantify how much the formula $\Psi$ is satisfied by process $s$ we evaluate first how far $\Psi$ is from being satisfied by $s$. This corresponds to the minimal distance between $\Psi$ and a formula satisfied by $s$, namely to $\Dtrdd(\Psi, \LL(s))$. Then we simply notice that, as our distances are all $1$-bounded, being $\Dtrdd(\Psi, \LL(s))$ far from $s$ is equivalent to be $1 - \Dtrdd(\Psi, \LL(s))$ close to it. Thus we assign to $\Psi$ the real value $1 - \Dtrdd(\Psi, \LL(s))$ in $s$. \begin{definition} [Real-valued semantics of $\LLd$] \label{def:real_valued_semantics} We define the \emph{real-valued semantics} of $\LLd$ as the function $\val{\_}{\_} \colon \LLd \times \proc \to [0,1]$ defined for all $\Psi \in \LLd$ and $s \in \proc$ as $ \val{\Psi}{s} = 1 - \Dtrdd(\Psi, \LL(s)). $ \end{definition} We can restate our characterization theorem (Theorem~\ref{thm:det_char}) as a probabilistic $\LLd$-model checking problem. \begin{theorem} [Characterization of strong trace metric II] \label{thm:det_char_2} For all $s,t \in \proc$ we have \[ \TraceMetric(s,t) = \sup_{\Psi \in \LLd} \mid \val{\Psi}{s} - \val{\Psi}{t} \mid. \] \end{theorem} \begin{proof} From Theorem~\ref{thm:det_char} we have $\TraceMetric(s,t) = \DLLd(s,t)$. Hence the thesis is equivalent to prove \[ \DLLd(s,t) = \sup_{\Psi \in \LLd} \mid \val{\Psi}{s} - \val{\Psi}{t} \mid. \] We have \[ \begin{array}{rlr} \DLLd(s,t) ={} & \Hausdorff(\Dtrdd)(\LL(s),\LL(t)) & \text{(by Definition~\ref{def:LL_logical_distance})} \\ ={} & \sup_{\Psi \in \LLd} \mid \Dtrdd(\Psi, \LL(s)) - \Dtrdd(\Psi, \LL(t)) \mid & \text{(by Proposition~\ref{prop:char_Hausdorff})} \\ ={} & \sup_{\Psi \in \LLd} \mid \Dtrdd(\Psi, \LL(s)) - \Dtrdd(\Psi, \LL(t)) +1 -1 \mid \\ ={} & \sup_{\Psi \in \LLd} \mid 1 - \Dtrdd(\Psi, \LL(t)) - \big( 1 - \Dtrdd(\Psi, \LL(s)) \big) \mid \\ ={} & \sup_{\Psi \in \LLd} \mid \val{\Psi}{t} - \val{\Psi}{s} \mid & \text{(by Definition\ref{def:real_valued_semantics})}. \end{array} \] \end{proof} \section{Concluding remarks} \label{sec:conclusions_chap7} We have provided a logical characterization of the strong and weak variants of trace metric on finite processes in the PTS model. Our results are based on the definition of a \emph{distance} over the two-sorted boolean logics $\LL$ and $\LLw$, which we have proved to characterize resp.\ strong and weak probabilistic trace equivalence by exploiting the notion of \emph{mimicking formula} of a resolution. Our distance is a $1$-bounded pseudometric that quantifies the syntactic disparities of the formulae and we have proved that the trace metric corresponds to the distance between the sets of formulae satisfied by the two processes. This approach, already successfully applied in \cite{CGT16a} to the characterization of the bisimilarity metric, is not standard. Logical characterizations of the trace metrics have been obtained in terms of the probabilistic $L$-model checking problem, where $L$ is the class of logical properties of interest, \cite{BBLM15,DHKP16,AFS09}. However we have proved that our approach can be exploited to regain classical one: by means of our distance between formulae we have defined a real-valued semantics for $\LL$, namely a probabilistic model checking of a formula in a process, and then we have proved that the trace metric constitutes the least upper bound to the error that can be observed in the verification of an $\LL$ formula. Another interesting feature of our approach is its generality, since it can be easily applied to some variants of the trace equivalence and trace metric. In \cite{S95tr,BdNL14} the authors distinguish between resolutions obtained via deterministic schedulers and the ones obtained via randomized schedulers. The only difference between the two classes is in the evaluation of the probability weights: in deterministic resolutions, which are the ones we have considered in this paper, each possible resolution of nondeterminism is considered singularly and thus the target probability distributions of their transitions are the same as in the considered process. In randomized resolutions, internal nondeterminism is solved by assigning a probability weight to each choice and thus the target distributions are obtained from the convex combination of the target distributions of the considered process. Since the definition of the mimicking formulae depends solely on the values of the probability weights in the resolutions and not on how these weights are evaluated, our characterization can be applied also to the case of trace equivalences and metrics defined in terms of randomized resolutions. As a first step in the future development of our work, we aim to extend our results to the trace equivalence defined in \cite{BdNL14} which, differently from the equivalence of \cite{S95tr} considered in this paper, is compositional wrt.\ the parallel composition operator. Roughly speaking, in \cite{BdNL14} for each given trace it is checked whether the resolutions of two processes assign the same probability it, whereas in \cite{S95tr} for a chosen resolution of the first process we check whether there is a resolution for the second process that assigns the same probability to all traces. Furthermore, no trace metric has been defined yet for the equivalence in \cite{BdNL14}. Our idea is then firstly to define such a trace metric and secondly to simplify the logic $\LL$ by substituting the trace distribution formulae with a simple test on the execution probability of a trace, with an operator similar to the probabilistic operator in \cite{PS07}. By applying our approach to the new logic we will obtain the characterization of the trace equivalence and metric. Then, we will study metrics and logical characterizations for the testing equivalences defined in \cite{BdNL14}. Further, in \cite{BBLM15} a sequence of Kantorovich bisimilarity-like metrics converging to the trace metric on MCs is provided. Hence we aim to combine our characterization results in \cite{CGT16a} with the ones in this paper in order to see if a similar result of convergence can be obtained also with our technique on PTSs. Finally, it would be interesting to apply the SOS-based decomposition method proposed in \cite{CGT16b} to $\LL$ (resp.\ $\LLw$) in order to derive congruence formats for the probabilistic strong (resp.\ weak) trace equivalence from its logical characterization. We also aim to extend this technique in order to derive compositional properties, as \emph{uniform continuity} \cite{GT15}, of strong and weak trace metric. \bibliographystyle{eptcs}
\subsection{Preliminaries} We will use the matrices \begin{align*} \sigma_{00}& := \begin{pmatrix}1 & 0\\ 0 & 1\end{pmatrix},\, \sigma_{01} := \begin{pmatrix}0 & 1\\ 1 & 0\end{pmatrix},\, \sigma_{10} := \begin{pmatrix}1 & 0\\ 0 & -1\end{pmatrix},\\ \sigma_{11}& := \sigma_{10} \sigma_{01} = \begin{pmatrix}0 & 1\\ -1 & 0\end{pmatrix}, \end{align*} which are the Pauli matrices up to applying $-i$ to $\sigma_{11}$, and the Bell basis, i.e.\ the ordered basis of $\mathbb{C}^4$ which we define by \begin{align*} \ket{\sigma_{00}} &:= \frac{1}{\sqrt{2}}(\ket{00} + \ket{11}),\, \ket{\sigma_{01}} := \frac{1}{\sqrt{2}}(\ket{01} + \ket{10}),\\ \ket{\sigma_{10}} &:= \frac{1}{\sqrt{2}}(\ket{00} - \ket{11}),\, \ket{\sigma_{11}} := \frac{1}{\sqrt{2}}(\ket{01} - \ket{10}). \end{align*} The notation is supposed to highlight the fact that $\ket{\sigma_i} = \vecc(\sigma_i)/\sqrt{2}$, where $\vecc$ is the linear map defined by $\vecc(\ket{x}\bra{y}) = \ket{x}\ket{y}$ for computational basis states $x$, $y$. The $\vecc$ operator preserves inner products: $\ip{\vecc(A)}{\vecc(B)} = \tr A^\dag B$. For $s \in \{0,1\}^{2n}$, we write $\sigma_s := \sigma_{s_1 s_2} \otimes \dots \otimes \sigma_{s_{2n-1} s_{2n}}$, $\ket{\sigma_s} := \ket{\sigma_{s_1 s_2}} \dots \ket{\sigma_{s_{2n-1} s_{2n}}}$. Up to multiplying by $-1$, $\sigma_s \sigma_t = \sigma_{s \oplus t}$. Measurement in the Bell basis can be implemented by applying the circuit \[ \Qcircuit @C=1em @R=.7em { & \ctrl{1} & \gate{H} & \qw \\ & \targ & \qw & \qw } \] and measuring in the computational basis. Given a pure state of $2n$ qubits divided into systems $A_1,\dots,A_n$, $B_1,\dots,B_n$, we call the operation of measuring each pair $A_i B_i$ of qubits in the Bell basis {\em Bell sampling}. Each such measurement returns a $2n$-bit string. For any state $\ket{\psi}$, let $\ket{\psi^*}$ denote the complex conjugate (taken in the computational basis). \begin{lem} \label{lem:bsamp} Let $\ket{\psi}$ be a state of $n$ qubits. Bell sampling on $\ket{\psi}^{\otimes 2}$ returns outcome $r$ with probability \[ \frac{|\bracket{\psi}{\sigma_r}{\psi^*}|^2}{2^n}. \] \end{lem} \begin{proof} We have $\ket{\psi}\ket{\psi} = \vecc(\ket{\psi}\bra{\psi^*})$, so $|\ip{\sigma_r}{\psi}\ket{\psi}|^2 =$ $2^{-n} |\tr \sigma_r^\dag \ket{\psi}\bra{\psi^*}|^2 = 2^{-n} |\bracket{\psi}{\sigma_r}{\psi^*}|^2$. \end{proof} \section{Learning stabilizer states} We now show that Bell sampling can be used to learn stabilizer states efficiently. By a result of~\cite{dehaene02} (see~\cite{vandennest08} for an alternative proof), up to an overall phase every stabilizer state $\ket{\psi}$ can be written in the form \[ \ket{\psi} = \frac{1}{\sqrt{|A|}} \sum_{x \in A} i^{\ell(x)} (-1)^{q(x)} \ket{x}, \] where $A$ is an affine subspace of $\mathbb{F}_2^n$, and $\ell,q: \{0,1\}^n \rightarrow \{0,1\}$ are linear and quadratic (respectively) polynomials over $\mathbb{F}_2$. As $\ell$ is linear, $\ell(x) = s \cdot x$ for some $s \in \{0,1\}^n$, so we have $i^{\ell(x)} = \prod_{k \in S} i^{x_k}$ for some $S \subseteq [n]$. Hence \[ \ket{\psi^*} = \sigma_{10}^{\otimes S} \ket{\psi}. \] If we perform Bell sampling on $\ket{\psi}^{\otimes 2}$, by Lemma \ref{lem:bsamp} we receive outcome $r$ with probability \begin{equation} \label{eq:stabsamp} \frac{|\bracket{\psi}{\sigma_r}{\psi^*}|^2}{2^n} = \frac{| \bra{\psi} \sigma_r \sigma_{10}^{\otimes S}\ket{\psi} |^2}{2^n}. \end{equation} Any stabilizer state $\ket{\psi}$ is uniquely specified by a commuting subgroup $G$ of Pauli matrices $M$ (with potentially additional overall phases $\pm1$) such that $|G|=2^n$, $M\ket{\psi} = \ket{\psi}$ for all $M \in G$, and $\bracket{\psi}{M}{\psi} = 0$ for all Pauli matrices $M \notin G$. Let $T$ denote the set of strings $t \in \{0,1\}^{2n}$ such that $\sigma_t \in G$, up to a phase. Then $T$ is an $n$-dimensional linear subspace of $\mathbb{F}_2^{2n}$. Determining $T$ suffices to uniquely determine $\ket{\psi}$: although $T$ does not contain information about phases, once we have found a basis for $T$, we can measure $\ket{\psi}$ in the eigenbasis of each corresponding Pauli matrix $M$ to decide whether $M\ket{\psi} = \ket{\psi}$ or $M\ket{\psi} = -\ket{\psi}$. By eqn.\ (\ref{eq:stabsamp}), Bell sampling gives an outcome $r$ which is uniformly distributed on the set $\{t \oplus s:t \in T\}$ for some $s \in \{0,1\}^{2n}$. Thus, for any two such outcomes $r_1$, $r_2$, the sum $r_1 \oplus r_2$ is uniformly distributed in $T$. In order to find a basis for $T$, we can therefore produce $k+1$ Bell samples $r_0,r_1,\dots,r_k$, for some $k$, and consider the uniformly random elements of $T$ given by $r_1 \oplus r_0,r_2 \oplus r_0,\dots,r_k \oplus r_0$. If the dimension of the subspace of $\mathbb{F}_2^{2n}$ spanned by these vectors is $n$, any basis of this subspace is a basis for $T$. We give an explicit description of this algorithm as Algorithm \ref{alg:stabilizer} (boxed). The algorithm uses $5n+2$ copies of $\ket{\psi}$. The time complexity of the algorithm is dominated by the basis-determination step, which can be achieved using Gaussian elimination in time $O(n^3)$; technically, this can be improved to $O(n^\omega)$, where $\omega < 2.373$ is the matrix multiplication exponent. Note that any algorithm for learning a stabilizer state requires time $\Omega(n^2)$ just to write the output. \boxdfn{Learning stabilizer states}{ \begin{enumerate} \vspace{-11pt} \item Set $S = \emptyset$. \item Create two copies of $\ket{\psi}$ and perform Bell sampling, obtaining outcome $r_0$. \item Repeat the following $2n$ times: \begin{enumerate} \item Create two copies of $\ket{\psi}$ and perform Bell sampling, obtaining outcome $r$. \item Add $r \oplus r_0$ to $S$. \end{enumerate} \item Determine a basis for $S$; call this basis $B$. \item For each element of $B$, measure a copy of $\ket{\psi}$ in the eigenbasis of the corresponding Pauli matrix $M$ to determine whether $M\ket{\psi} = \ket{\psi}$ or $M\ket{\psi} = -\ket{\psi}$. \end{enumerate} \label{alg:stabilizer} } The algorithm fails (i.e.\ does not identify $\ket{\psi}$) if each of the $2n$ samples $r \oplus r_0$ lies in a subspace of $T$ of dimension at most $n-1$. The probability that the samples are all contained in any one such subspace is $2^{-2n}$; by a union bound over all subspaces of dimension $n-1$, the algorithm fails with probability at most $2^{-n}$. Algorithm \ref{alg:stabilizer} can be seen as a generalisation of a result of R\"otteler~\cite{roetteler09} which gives an $O(n)$-query algorithm for learning functions $f:\{0,1\}^n \rightarrow \{0,1\}$ which are polynomials of degree 2 over $\mathbb{F}_2$. The algorithm of~\cite{roetteler09} works by producing states of the form \[ \ket{\psi} = \frac{1}{\sqrt{2^n}} \sum_{x \in \{0,1\}^n} (-1)^{f(x)} \ket{x}, \] and then proceeds in a similar way to Algorithm \ref{alg:stabilizer} (although it is presented differently). {\bf Acknowledgements.} This work was largely carried out while the author was at the University of Cambridge, and was supported by the UK EPSRC (EP/G049416/2, EP/L021005/1). Thanks to Joe Fitzsimons for pointing out ref.~\cite{zhao16}. \bibliographystyle{plain}
\section{Introduction} The geometric nature of value distribution theory of complex analytic maps is well-known. One of the most notable results is the geometric interpretation of the precise maximum `2' for the number of exceptional values of a nonconstant meromorphic function on the complex plane $\C$. Here we call a value that a function or map never attains an {\it exceptional value} of the function or map. In fact, Ahlfors \cite{Ah1935} and Chern \cite{Ch1960} proved that the least upper bound for the number of exceptional values of a nonconstant holomorphic map from $\C$ to a closed Riemann surface $\overline{\Sigma}_{\gamma}$ of genus $\gamma$ coincides with the Euler characteristic of $\overline{\Sigma}_{\gamma}$ by using Nevanlinna theory (see also \cite{Ko2003, Ne1970, NO1990, NW2013, Ru2001}). In particular, for a nonconstant meromorphic function on $\C$, the geometric meaning of the maximal number `2' of exceptional values is the Euler characteristic of the Riemann sphere $\RC :=\C\cup \{\infty\}$. We remark that if the closed Riemann surface is of $\gamma \geq 2$, then such a map does not exist because the Euler characteristic is negative. There exist several classes of immersed surfaces in 3-dimensional space forms whose Gauss maps have value-distribution-theoretic property. For instance, Fujimoto (\cite[Theorem I]{Fu1988}, \cite{Fu1997}) proved that the Gauss map of a nonflat complete minimal surface in Euclidean 3-space ${\R}^{3}$ can omit at most 4 values. Moreover, Fujimoto \cite{Fu1993} obtained a unicity theorem for the Gauss maps of nonflat complete minimal surfaces in ${\R}^{3}$, which is analogous to the Nevanlinna unicity theorem (\cite{Ne1926}) for meromorphic functions on $\C$. On the other hand, the author and Nakajo \cite{KN2012} showed that the maximal number of exceptional values of the Lagrangian Gauss map of a weakly complete improper affine front in the affine 3-space is 3, unless it is an elliptic paraboloid. Moreover, the author \cite{Ka2014} gave a similar result for flat fronts in hyperbolic 3-space ${\H}^{3}$. The purpose of this review paper is to give geometric interpretation of value-distribution-theoretic property for their Gauss maps. The paper is organized as follows: In Section \ref{M-results}, we first give a curvature bound for the conformal metric $ds^{2}=(1+|g|^{2})^{m}|\omega|^{2}$ on an open Riemann surface $\Sigma$, where $m$ is a positive integer, $\omega$ is a holomorphic 1-form and $g$ is a meromorphic function $g$ on $\Sigma$ (Theorems \ref{thm2-1} and \ref{thm2-2}). As a corollary of it, we prove that the precise maximum for the number of exceptional values of $g$ on $\Sigma$ with the complete conformal metric $ds^{2}$ is `$m+2$' (Corollary \ref{thm2-3}). We note that the geometric interpretation of the `2' in `$m+2$' is the Euler characteristic of the Riemann sphere (Remark \ref{rmk2-1-1}). We also give a unicity theorem (Theorem \ref{thm2-5}) for $g$ on $\Sigma$ with the complete metric $ds^{2}$. In Section \ref{appli}, as application of our main results, we show some value-distribution-theoretic properties for the Gauss maps of the following classes of surfaces: minimal surfaces in ${\R}^{3}$ (Section \ref{appli-mini}), improper affine fronts in ${\R}^{3}$ (Section \ref{appli-improper}) and flat fronts in ${\H}^{3}$ (Section \ref{appli-flat}). Section \ref{sec-further} is denoted value-distribution-theoretic property for the Gauss map of a complete minimal surface in ${\R}^{4}$ (Section \ref{further-4}) and a complete minimal surface of finite total curvature in ${\R}^{3}$ (Section \ref{further-algebraic}). \section{Main results}\label{M-results} We first give the following curvature bound for the conformal metric $$ ds^{2}=(1+|g|^{2})^{m}|\omega|^{2} $$ on an open Riemann surface $\Sigma$. \begin{theorem}[\cite{Ka2013}]\label{thm2-1} Let $\Sigma$ be an open Riemann surface with the conformal metric \begin{equation}\label{eq2-1} ds^{2}=(1+|g|^{2})^{m}|\omega|^{2}, \end{equation} where $\omega$ is a holomorphic $1$-from, $g$ is a meromorphic function on $\Sigma$, and $m$ is a positive integer. Assume that $g$ omits $q\geq m+3$ distinct values. Then there exists a positive constant $C$, depending on $m$ and the set of exceptional values, but not the surface, such that for all $p\in \Sigma$, we have \begin{equation}\label{eq2-2} |K_{ds^{2}}(p)|^{1/2}\leq \dfrac{C}{d(p)}, \end{equation} where $K_{ds^{2}}(p)$ is the Gaussian curvature of $ds^{2}$ at $p$ and $d(p)$ is the geodesic distance from $p$ to the boundary of $\Sigma$, that is, the infimum of the lengths of the divergent curves in $\Sigma$ emanating from $p$. \end{theorem} More generally, when all of the multiple values of the meromorphic function $g$ in the metric (\ref{eq2-1}) are totally ramified, the following theorem holds. \begin{theorem}[\cite{Ka2015}]\label{thm2-2} Let $\Sigma$ be an open Riemann surface with the conformal metric given by (\ref{eq2-1}). Let $q$ be a positve integer, ${\alpha}_{1}, \ldots, {\alpha}_{q}\in \RC$ be distinct and ${\nu}_{1}, \ldots, {\nu}_{q}\in {\Z}_{+}\cup \{\infty\}$. Assume that \begin{equation}\label{eq2-3} \gamma := \displaystyle \sum_{j=1}^{q} \biggl{(}1-\dfrac{1}{{\nu}_{j}} \biggr{)}> m+2. \end{equation} If $g$ satisfies the property that all ${\alpha}_{j}$-points of $g$ have multiplicity at least ${\nu}_{j}$, then there exists a positive constant $C$, depending on $m$, $\gamma$ and ${\alpha}_{1}, \ldots, {\alpha}_{q}$ but not the surface, such that for all $p\in \Sigma$ inequality (\ref{eq2-2}) holds. \end{theorem} This is a generalization of Theorem \ref{thm2-1}. Indeed, we can show it by setting ${\nu}_{1}=\cdots ={\nu}_{q=m+3}= \infty$. As an application of this theorem, we obtain an analogue of a special case of the Ahlfors islands theorem (See \cite{Be2000} for details of this theorem) for the meromorphic function $g$ on $\Sigma$ with the complete conformal metric $ds^{2}$. For more details, see \cite{Ka2015}. As a corollary of these theorems, we give the least upper bound for the number of exceptional values of the meromorphic function $g$ on $\Sigma$ with the complete conformal metric given by (\ref{eq2-1}). \begin{corollary}[\cite{Ka2013}]\label{thm2-3} Let $\Sigma$ be an open Riemann surface with the conformal metric given by (\ref{eq2-1}). If the metric $ds^{2}$ is complete and the meromorphic function $g$ is nonconstant, then $g$ can omit at most $m+2$ distinct values. \end{corollary} \begin{proof} By way of contradiction, suppose that $g$ omits $m+3$ distinct values. By Theorem \ref{thm2-1}, (\ref{eq2-1}) holds. If $ds^{2}$ is complete, then we may set $d(p)= +\infty$ for all $p\in \Sigma$. Thus $K_{ds^{2}}\equiv 0$ on $\Sigma$. On the other hand, the Gaussian curvature with respect to the metric $ds^{2}$ is given by $$ K_{ds^{2}}=-\dfrac{2m|g_{z}'|^{2}}{(1+|g|^{2})^{m+2}|\hat{\omega}_{z}|^{2}}, $$ where $\omega =\hat{\omega}_{z}dz$, $g'_{z}=dg/dz$. Thus $K_{ds^{2}}\equiv 0$ if and only if $g$ is constant. This contradicts the assumption that $g$ is nonconstant. \end{proof} We give examples which ensure that Corollary \ref{thm2-3} is optimal. \begin{proposition}\label{thm2-4} Let $\Sigma$ be either the complex plane punctured at $q-1$ distinct points ${\alpha}_{1}, \ldots, {\alpha}_{q-1}$ or the universal cover of that punctured plane. We set $$ \omega=\dfrac{dz}{{\prod}_{i=1}^{q-1}(z-{\alpha}_{i})}, \quad g=z. $$ Then $g$ omits $q$ distinct values and the metric $ds^{2}=(1+|g|^{2})^{m}|\omega|^{2}$ is complete if and only if $q\leq m+2$. In particular, there exist examples whose metric $ds^{2}$ is complete and $g$ omits $m+2$ distinct values. \end{proposition} \begin{proof} We can easily show that $g$ omits the $q$ distinct values ${\alpha}_{1}, \ldots, {\alpha}_{q-1}$ and $\infty$ on $\Sigma$. A divergent curve $\Gamma$ in $\Sigma$ must tend to one of the points ${\alpha}_{1}, \ldots, {\alpha}_{q-1}$ or $\infty$. Thus we have $$ \int_{\Gamma}ds=\int_{\Gamma}(1+|g|^{2})^{m/2}|\omega|=\int_{\Gamma}\dfrac{(1+|z|^{2})^{m/2}}{\prod_{i=1}^{q-1}|z-{\alpha}_{i}|}|dz|= +\infty, $$ when $q\leq m+2$. \end{proof} \begin{remark}\label{rmk2-1-1} The geometric interpretation of the `$2$' in `$m+2$' is the Euler characteristic of the Riemann sphere. Indeed, if $m=0$ then the metric $ds^{2}=(1+|g|^{2})^{0}|\omega|^{2}=|\omega|^{2}$ is flat and complete on $\Sigma$. We thus may assume that $g$ is a meromorphic function on ${\C}$ because $g$ is replaced by $g\circ \pi$, where $\pi\colon \C\to \Sigma$ is a holomorphic universal covering map. On the other hand, Ahlfors \cite{Ah1935} and Chern \cite{Ch1960} showed that the best possible upper bound `$2$' of the number of exceptional values of nonconstant meromorphic functions on $\C$ coincides with the Euler characteristic of the Riemann sphere. Hence we get the conclusion. Remark that Ros \cite{Ro2002} gave a different approach of this fact by using `Bloch-Zalcman principle'. \end{remark} We next provide another type of value-distribution-theoretic property of the meromorphic function $g$ on an open Riemann surface $\Sigma$ with the conformal metric given by (\ref{eq2-1}). Nevanlinna \cite{Ne1926} showed that two nonconstant meromorphic functions on $\C$ having the same images for 5 distinct values must identically equal to each other. We obtain the following analogue to this unicity theorem. \begin{theorem}[\cite{Ka2015}]\label{thm2-5} Let $\Sigma$ be an open Riemann surface with the conformal metric \begin{equation}\label{eq2-4} ds^{2}=(1+|g|^{2})^{m}|\omega|^{2}, \end{equation} and $\widehat{\Sigma}$ another open Riemann surface with the conformal metric \begin{equation}\label{eq2-5} d{\hat{s}}^{2}=(1+|\hat{g}|^{2})^{m}|\hat{\omega}|^{2}, \end{equation} where $\omega$ and $\hat{\omega}$ are holomorphic $1$-forms, $g$ and $\hat{g}$ are nonconstant meromorphic functions on $\Sigma$ and $\widehat{\Sigma}$ respectively, and $m$ is a positive integer. We assume that there exists a conformal diffeomorphism $\Psi\colon \Sigma \to \widehat{\Sigma}$. Suppose that there exist $q$ distinct points ${\alpha}_{1}, \ldots, {\alpha}_{q}\in \RC$ such that $g^{-1}({\alpha}_{j})=(\hat{g}\circ \Psi)^{-1}({\alpha}_{j})$ $(1\leq j\leq q)$. If $q \geq m+5 \,(=(m+4)+1)$ and either $ds^{2}$ or $d{\hat{s}}^{2}$ is complete, then $g\equiv \hat{g}\circ \Psi$. \end{theorem} We remark that Theorem \ref{thm2-5} coincides with the Nevanlinna unicity theorem when $m=0$. The maps $g$ and $\hat{g}\circ \Psi$ are said to share the value $\alpha$ (ignoring multiplicity) when $g^{-1}(\alpha)= (\hat{g}\circ \Psi)^{-1}(\alpha)$. Theorem \ref{thm2-5} is optimal for an arbitrary even number $m\, (\geq 2)$ because there exist the following examples. \begin{proposition}[\cite{Fu1993, Ka2015}]\label{thm2-6} For an arbitrary even number $m\, (\geq 2)$, we take $m/2$ distinct points ${\alpha}_{1}, \ldots, {\alpha}_{m/2}$ in $\C\backslash \{0, \pm 1 \}$. Let $\Sigma$ be either the complex plane punctured at $m+1$ distinct points $0$, ${\alpha}_{1}, \ldots, {\alpha}_{m/2}$, $1/{\alpha}_{1}, \ldots, 1/{\alpha}_{m/2}$ or the universal covering of that punctured plane. We set $$ \omega = \dfrac{dz}{z\prod_{i=1}^{m/2} (z-{\alpha}_{i})({\alpha}_{i}z-1)}, \quad g(z)=z\,, $$ and $$ \hat{\omega}\, (=\omega) = \dfrac{dz}{z\prod_{i=1}^{m/2} (z-{\alpha}_{i})({\alpha}_{i}z-1)}, \quad \hat{g}(z)=\dfrac{1}{z}. $$ We can easily show that the identity map $\Psi\colon \Sigma \to \Sigma$ is a conformal diffeomorphism and the metrics $ds^{2}=(1+|g|^{2})^{m}|\omega|^{2}$ is complete. Then the maps $g$ and $\hat{g}$ share the $m+4$ distinct values $$ 0,\, \infty,\, 1,\, -1,\, {\alpha}_{1},\,\ldots, {\alpha}_{m/2},\, 1/{\alpha}_{1},\, \ldots,\, 1/{\alpha}_{m/2}$$ and $g\not\equiv \hat{g}\circ \Psi$. These show that the number `$m+5$' in Theorem \ref{thm2-5} cannot be replaced by `$m+4$'. \end{proposition} \section{Applications}\label{appli} In this section, as applications of the main results, we give some value-distribution-theoretic properties for the Gauss maps of several classes of surfaces. \subsection{Gauss map of a complete minimal surface in ${\R}^{3}$}\label{appli-mini} We first recall some basic facts of minimal surfaces in Euclidean 3-space ${\R}^{3}$. Details can be found, for example, in \cite{Fu1993-2}, \cite{La1982} and \cite{Os1986}. Let $X=(x^{1}, x^{2}, x^{3})\colon \Sigma \to {\R}^{3}$ be an oriented minimal surface in ${\R}^{3}$. By associating a local complex coordinate $z=u+\sqrt{-1}v$ with each positive isothermal coordinate system $(u, v)$, $\Sigma$ is considered as a Riemann surface whose conformal metric is the induced metric $ds^{2}$ from ${\R}^{3}$. Then \begin{equation}\label{equ-411-Laplacian} {\triangle}_{ds^{2}}X=0 \end{equation} holds, that is, each coordinate function $x^{i}$ is harmonic. With respect to the local complex coordinate $z=u+\sqrt{-1}v$ of the surface, (\ref{equ-411-Laplacian}) is given by $$ \bar{\partial}\partial X = 0, $$ where $\partial =(\partial /\partial u -\sqrt{-1}\partial /\partial v)/2$, $\bar{\partial} =(\partial /\partial u +\sqrt{-1}\partial /\partial v)/2$. Hence each ${\phi}_{i}:=\partial x^{i}dz$ $(i=1, 2, 3)$ is a holomorphic 1-form on $\Sigma$. If we set that \begin{equation}\label{eq:W-date3} \omega ={\phi}_{1}-\sqrt{-1}{\phi}_{2}, \quad g=\dfrac{{\phi}_{3}}{{\phi}_{1}-\sqrt{-1}{\phi}_{2}}, \end{equation} then $\omega$ is a holomorphic 1-form and $g$ is a meromorphic function on $\Sigma$. Moreover the function $g$ coincides with the composition of the Gauss map and the stereographic projection from ${\mathbf{S}}^{2}$ onto $\RC$, and the induced metric is given by \begin{equation}\label{equ-412-metric} ds^{2}=(1+|g|^{2})^{2}|\omega|^{2}. \end{equation} Applying Theorem \ref{thm2-1} to the metric $ds^{2}$, we can obtain the Fujimoto curvature bound for a minimal surface in ${\R}^{3}$. \begin{theorem}\cite[Theorem I and Corollary 3.4]{Fu1988}\label{thm3-1} Let $X\colon \Sigma \to {\R}^{3}$ be an oriented minimal surface whose Gauss map $g\colon \Sigma \to \RC$ omits greater than or equal to $5$ $(=2+3)$ distinct values. Then there exists a positive constant $C$ depending on the set of exceptional values, but not the surface, such that for all $p\in \Sigma$ inequality (\ref{eq2-2}) holds. In particular, the Gauss map of a nonflat complete minimal surface in ${\R}^{3}$ can omit at most $4$ $(=2+2)$ values. \end{theorem} We note that this theorem is a generalization of the Bernstein theorem, stating that the only solution to the minimal surface equation over the whole plane is the trivial solution: a linear function (\cite{Be1915, Ca1970}). \begin{remark}\label{thm3-2-1} For the Gauss maps of complete embedded minimal surfaces in ${\R}^{3}$, there exists an interesting conjecture called `Four Point Conjecture'. For more details, see \cite{MP2012}. \end{remark} Moreover, by applying Theorem \ref{thm2-5}, we can get the Fujimoto unicity theorem for the Gauss maps of complete minimal surfaces in ${\R}^{3}$. \begin{theorem}[{\cite[Theorem I]{Fu1993-2}}]\label{thm3-2} Let $X\colon \Sigma \to {\R}^{3}$ and $\widehat{X}\colon \widehat{\Sigma}\to {\R}^{3}$ be two nonflat minimal surfaces and assume that there exists a conformal diffeomorphism $\Psi\colon \Sigma \to \widehat{\Sigma}$. Let $g\colon \Sigma \to \RC$ and $\hat{g}\colon \widehat{\Sigma}\to \RC$ be the Gauss maps of $X(\Sigma)$ and $\widehat{X}(\widehat{\Sigma})$, respectively. If $g\not\equiv \hat{g}\circ \Psi$ and either $X(\Sigma)$ or $\widehat{X}(\widehat{\Sigma})$ is complete, then $g$ and $\hat{g}\circ \Psi$ share at most $6\,(=2+4)$ distinct values. \end{theorem} \subsection{Lagrangian Gauss map of a weakly complete improper affine front in ${\R}^{3}$}\label{appli-improper} Improper affine spheres in the affine $3$-space ${\R}^{3}$ also have similar properties to minimal surfaces in Euclidean $3$-space (for example, see \cite{Ca1970}). Recently, Mart\'inez \cite{Ma2005} discovered the correspondence between improper affine spheres and smooth special Lagrangian immersions in the complex $2$-space ${\C}^{2}$ and introduced the notion of {\it improper affine fronts}, that is, a class of (locally strongly convex) improper affine spheres with some admissible singularities in ${\R}^{3}$. We note that this class is called `improper affine maps' in \cite{Ma2005}, but we call this class `improper affine fronts' because all of improper affine maps are wave fronts in ${\R}^{3}$ (\cite{Na2009}, \cite{UY2011}). The differential geometry of wave fronts is discussed in \cite{SUY2009}. Moreover, Mart\'inez gave the following holomorphic representation for this class. \begin{theorem}[{\cite[Theorem 3]{Ma2005}}] Let $\Sigma$ be a Riemann surface and $(F, G)$ a pair of holomorphic functions on $\Sigma$ such that $\text{Re}(FdG)$ is exact and $|dF|^{2}+|dG|^{2}$ is positive definite. Then the induced map $\psi\colon \Sigma \to {\R}^{3}=\C\times {\R}$ given by $$ \psi :=\biggl{(}G+\overline{F}, \dfrac{|G|^{2}-|F|^{2}}{2}+\text{Re}\biggl{(} GF- 2\int FdG \biggr{)} \biggr{)} $$ is an improper affine front. Conversely, any improper affine front is given in this way. Moreover we set $x:= G+\overline{F}$ and $n:= \overline{F}-G$. Then $L_{\psi}:=x+\sqrt{-1}n\colon \Sigma \to {\C}^{2}$ is a special Lagrangian immersion whose induced metric $d{\tau}^{2}$ from ${\C}^{2}$ is given by $$ d{\tau}^{2}=2(|dF|^{2}+|dG|^{2}). $$ In addition, the affine metric $h$ of $\psi$ is expressed as $h:=|dG|^{2}-|dF|^{2}$ and the singular points of $\psi$ correspond to the points where $|dF|=|dG|$. \end{theorem} We remark that Nakajo \cite{Na2009} constructed a representation formula for indefinite improper affine spheres with some admissible singularities. The nontrivial part of the Gauss map of $L_{\psi}\colon \Sigma \to {\C}^{2}\simeq {\R}^{4}$ (see \cite{CM1987}) is the meromorphic function $\nu\colon \Sigma \to \RC$ given by $$ \nu := \dfrac{dF}{dG}, $$ which is called the {\it Lagrangian Gauss map} of $\psi$. An improper affine front is said to be {\it weakly complete} if the induced metric $d{\tau}^{2}$ is complete. We note that $$ d{\tau}^{2}=2(|dF|^{2}+|dG|^{2})=2(1+|\nu|^{2})|dG|^{2}. $$ Applying Theorem \ref{thm2-1} to the metric $d{\tau}^{2}$, we can get the following theorem. \begin{theorem}[{\cite[Theorem 4.6]{Ka2013}}]\label{thm3-3} Let $\psi\colon \Sigma \to {\R}^{3}$ be an improper affine front whose Lagrangian Gauss map $\nu\colon \Sigma \to \RC$ omits greater than or equal to $4$ $(=2+2)$ distinct values. Then there exists a positive constant $C$ depending on the set of exceptional values, but not $\Sigma$, such that for all $p\in \Sigma$ we have $$ |K_{d{\tau}^{2}}(p)|^{1/2}\leq \dfrac{C}{d(p)}, $$ where $K_{d{\tau}^{2}}(p)$ is the Gaussian curvature of the metric $d{\tau}^{2}$ at $p$ and $d(p)$ is the geodesic distance from $p$ to the boundary of $\Sigma$. In particular, if the Lagrangian Gauss map of a weakly complete improper affine front in ${\R}^{3}$ is nonconstant, then it can omit at most $3$ $(=1+2)$ values. \end{theorem} Since the singular points of $\psi$ correspond to the points where $|\nu|=1$, we can obtain a simple proof of the parametric affine Bernstein theorem (\cite{Ca1958}, \cite{Jo1954}) for improper affine spheres from the viewpoint of value-distribution-theoretic properties of the Lagrangian Gauss map. \begin{corollary}[{\cite{Ca1958, Jo1954}}]\label{them3-4} Any affine complete improper affine sphere in ${\R}^{3}$ must be an elliptic paraboloid. \end{corollary} \begin{proof} Since an improper affine sphere has no singularities, the complement of the image of its Lagrangian Gauss map $\nu$ contains at least the circle $\{|\nu| =1\}\subset \RC$. Thus, by exchanging roles of $dF$ and $dG$ if necessarily, $|\nu|< 1$ holds, that is, $|dF|<|dG|$. On the other hand, we have $$ h= |dG|^{2}-|dF|^{2}< 2(|dF|^{2}+|dG|^{2}) = d{\tau}^{2}. $$ Thus if an improper affine sphere is affine complete, then it is also weakly complete. From Theorem \ref{thm3-3} and \cite[Proposition 3.1]{KN2012}, it is an elliptic paraboloid. \end{proof} By applying Theorem \ref{thm2-5}, we give the following unicity theorem for the Lagrangian Gauss maps of weakly complete improper affine fronts in ${\R}^{3}$. \begin{theorem}[{\cite[Theorem 4.24]{Ka2015}}]\label{thm3-5} Let $\psi\colon \Sigma \to {\R}^{3}$ and $\widehat{\psi}\colon \widehat{\Sigma}\to {\R}^{3}$ be two improper affine fronts and assume that there exists a conformal diffeomorphism $\Psi\colon \Sigma \to \widehat{\Sigma}$. Let $\nu\colon \Sigma \to \RC$ and $\hat{\nu}\colon \widehat{\Sigma}\to \RC$ be the Lagrangian Gauss maps of $\psi(\Sigma)$ and $\widehat{\psi}(\widehat{\Sigma})$ respectively. Suppose that there exist $q$ distinct points ${\alpha}_{1}, \ldots, {\alpha}_{q}\in \RC$ such that ${\nu}^{-1}({\alpha}_{j})=(\hat{\nu}\circ \Psi)^{-1}({\alpha}_{j})$ $(1\leq j\leq q)$. If $q \geq 6 \,(=(1+4)+1)$ and either $\psi (\Sigma)$ or $\widehat{\psi} (\widehat{\Sigma})$ is weakly complete, then either $\nu\equiv \hat{\nu}\circ \Psi$ or $\nu$ and $\hat{\nu}$ are both constant, that is, $\psi (\Sigma)$ and $\widehat{\psi} (\widehat{\Sigma})$ are both elliptic paraboloids. \end{theorem} \subsection{Ratio of canonical forms of a weakly complete flat front in ${\H}^{3}$}\label{appli-flat} For a holomorphic Legendrian immersion $\Lc\colon \Sigma \to SL(2, \C)$ on a simply connected Riemann surface $\Sigma$, the projection $$ f:= \Lc{\Lc}^{\ast}\colon \Sigma \to {\H}^{3} $$ gives a {\it flat front} in ${\H}^{3}$. Here, flat fronts in ${\H}^{3}$ are flat surfaces in ${\H}^{3}$ with some admissible singularities (see \cite{KRUY2007}, \cite{KUY2004} for the definition of flat fronts in ${\H}^{3}$). We call $\Lc$ the {\it holomorphic lift} of $f$. Since $\Lc$ is a holomorphic Legendrian map, ${\Lc}^{-1}{d\Lc}$ is off-diagonal (see \cite{GMM2000}, \cite{KUY2003}, \cite{KUY2004}). If we set $$ {\Lc}^{-1}{d\Lc} = \left( \begin{array}{cc} 0 & \theta \\ \omega & 0 \end{array} \right), $$ then the pull-back of the canonical Hermitian metric of $SL(2, \C)$ by $\Lc$ is represented as $$ ds^{2}_{\Lc}:=|\omega|^{2}+|\theta|^{2} $$ for holomorphic $1$-forms $\omega$ and $\theta$ on $\Sigma$. A flat front $f$ is said to be {\it weakly complete} if the metric $ds^{2}_{\Lc}$ is complete (\cite{KRUY2009, UY2011}). We define a meromorphic function on $\Sigma$ by the ratio of canonical forms $$ \rho := \dfrac{\theta}{\omega}. $$ Then a point $p\in \Sigma$ is a singular point of $f$ if and only if $|\rho (p)|=1$ (\cite{KRSUY2005}). We note that $$ ds^{2}_{\Lc}=|\omega|^{2}+|\theta|^{2}=(1+|\rho|^{2})|\omega|^{2}. $$ Applying Theorem \ref{thm2-1} to the metric $ds^{2}_{\Lc}$, we can get the following theorem. \begin{theorem}[{\cite[Theorem 4.8]{Ka2013}}]\label{thm3-6} Let $f\colon \Sigma \to {\H}^{3}$ be a flat front on a simply connected Riemann surface $\Sigma$. Suppose that the ratio of canonical forms $\rho\colon \Sigma \to \RC$ omits greater than or equal to $4$ $(=2+2)$ distinct values. Then there exists a positive constant $C$ depending on the set of exceptional values, but not $\Sigma$, such that for all $p\in \Sigma$ we have $$ |K_{ds_{\Lc}^{2}}(p)|^{1/2}\leq \dfrac{C}{d(p)}, $$ where $K_{ds^{2}_{\Lc}}(p)$ is the Gaussian curvature of the metric $ds^{2}_{\Lc}$ at $p$ and $d(p)$ is the geodesic distance from $p$ to the boundary of $\Sigma$. In particular, if the ratio of canonical forms of a weakly complete flat front in ${\H}^{3}$ is nonconstant, then it can omit at most $3$ $(=1+2)$ values. \end{theorem} If $\Sigma$ is not simply connected, then we consider that $\rho$ is a meromorphic function on its universal covering surface $\widetilde{\Sigma}$. As an application of Theorem \ref{thm3-6}, we can obtain a simple proof of the classification of complete nonsingular flat surfaces in ${\H}^{3}$. For the proof, see \cite[Corollary 3.5]{Ka2014}. \begin{corollary}[\cite{Sa1973, VV1971}]\label{thm3-7} Any complete nonsingular flat surface in ${\H}^{3}$ must be a horosphere or a hyperbolic cylinder. \end{corollary} Finally, by applying Theorem \ref{thm2-5}, we provide the following unicity theorem for the ratios of canonical forms of weakly complete flat fronts in ${\H}^{3}$. \begin{theorem}[{\cite[Theorem 4.29]{Ka2015}}]\label{thm3-8} Let $f\colon \Sigma \to {\H}^{3}$ and $\widehat{f}\colon \widehat{\Sigma}\to {\R}^{3}$ be two flat fronts on simply connected Riemann surfaces and assume that there exists a conformal diffeomorphism $\Psi\colon \Sigma \to \widehat{\Sigma}$. Let $\rho\colon \Sigma \to \C\cup\{\infty \}$ and $\hat{\rho}\colon \widehat{\Sigma}\to \C\cup\{\infty \}$ be the ratio of canonical forms $f(\Sigma)$ and $\widehat{f}(\widehat{\Sigma})$ respectively. If $\rho \not\equiv \hat{\rho}\circ \Psi$ and either $f(\Sigma)$ or $f(\widetilde{\Sigma})$ is weakly complete, then $\rho$ and $\hat{\rho}\circ \Psi$ share at most $5=(1+4)$ distinct values. \end{theorem} \begin{remark}\label{rmk3-9} The hyperbolic Gauss map of a weakly complete or complete flat front in ${\H}^{3}$ has also interesting geometric property. For more details, see \cite{KRSUY2005}, \cite{KUY2003}, \cite{KUY2004} and \cite{MUY2014}. \end{remark} \section{Further topics}\label{sec-further} In this section, we give geometric interpretations of the maximal number of exceptional values and unicity theorem for the Gauss maps of complete minimal surfaces in ${\R}^{4}$. We also provide an effective estimate for the maximal number of exceptional values of the Gauss map of a nonflat complete minimal surface of finite total curvature in ${\R}^{3}$. \subsection{Gauss map of a complete minimal surface in ${\R}^{4}$}\label{further-4} We first give an optimal estimate for the size of the image of the holomorphic map $G=(g_{1}, \ldots, g_{n})\colon \Sigma \to (\RC)^{n}:= \underbrace{\RC\times \cdots \times \RC}_{n}$ on an open Riemann surface $\Sigma$ with the complete conformal metric \begin{equation}\label{equ4-0} ds^{2}= \prod_{i=1}^{n}(1+|g_{i}|^{2})^{m_{i}}|\omega|^{2}. \end{equation} \begin{theorem}[{\cite[Theorem 2.1]{AAIK2017}}]\label{thm4-1} Let $\Sigma$ be an open Riemann surface with the conformal metric $$ ds^{2}=\displaystyle \prod_{i=1}^{n}(1+|g_{i}|^{2})^{m_{i}}|\omega|^{2}, $$ where $G=(g_{1}, \ldots , g_{n})\colon \Sigma \to (\RC)^{n}$ is a holomorphic map, $\omega$ is a holomorphic $1$-form on $\Sigma$ and each $m_{i}$ $(i=1, \cdots, n)$ is a positive integer. Assume that $g_{i_{1}}, \ldots, g_{i_{k}}$ $(1\leq i_{1}< \cdots <i_{k} \leq n)$ are nonconstant and the others are constant. If the metric $ds^{2}$ is complete and each $g_{i_{l}}$ $(l=1, \cdots , k)$ omits $q_{i_{l}}> 2$ distinct values, then we have \begin{equation}\label{equ-4-2} \displaystyle \sum_{l=1}^{k} \dfrac{m_{i_{l}}}{q_{i_{l}}-2}\geq 1. \end{equation} \end{theorem} We note that Theorem \ref{thm4-1} also holds for the case where at least one of $m_{1}, \ldots, m_{n}$ is positive and the others are zeros. For instance, we assume that $g:= g_{i_{1}}$ is nonconstant and the others are constant. If $m:=m_{i_{1}}$ is a positive integer and the others are zeros, then inequality (\ref{equ4-0}) coincides with $$ \dfrac{m}{q-2}\geq 1 \, \Longleftrightarrow \, q \leq m+2, $$ where $q:=q_{i_{1}}$. The result corresponds with Corollary \ref{thm2-3}. We next give a unicity theorem for the holomorphic map $G=(g_{1}, \ldots, g_{n})\colon \Sigma \to (\RC)^{n}$ on an open Riemann surface $\Sigma$ with the complete conformal metric defined by (\ref{equ4-0}). \begin{theorem}[{\cite[Theorem 2.1]{HK2017}}]\label{thm4-2} Let $\Sigma$ be an open Riemann surface with the conformal metric $$ ds^{2}=\displaystyle \prod_{i=1}^{n}(1+|g_{i}|^{2})^{m_{i}}|\omega|^{2} $$ and $\widehat{\Sigma}$ another open Riemann surface with the conformal metric $$ d\hat{s}^{2}= \displaystyle \prod_{i=1}^{n}(1+|\hat{g}_{i}|^{2})^{m_{i}}|\hat{\omega}|^{2}, $$ where $\omega$ and $\hat{\omega}$ are holomorphic $1$-forms, $G$ and $\widehat{G}$ are holomorphic maps into $(\RC)^{n}$ on $\Sigma$ and $\widehat{\Sigma}$ respectively, and each $m_{i}$ $(i=1, \cdots, n)$ is a positive integer. We assume that there exists a conformal diffeomorphism $\Psi \colon \Sigma \to \widehat{\Sigma}$, and $g_{i_{1}}, \ldots, g_{i_{k}}$ and $\hat{g}_{i_{1}}, \ldots, \hat{g}_{i_{k}}$ $(1\leq i_{1}< \cdots < i_{k}\leq n)$ are nonconstant and the others are constant. For each $i_{l}$ $(l=1, \cdots, k)$, we suppose that $g_{i_{l}}$ and $\hat{g}_{i_{l}}\circ \Psi$ share $q_{i_{l}}> 4$ distinct values and $g_{i_{l}} \not\equiv \hat{g}_{i_{l}}\circ \Psi$. If either $ds^{2}$ or $d\hat{s}^{2}$ is complete, then we have \begin{equation}\label{eq-4-3} \displaystyle \sum_{l=1}^{k} \dfrac{m_{i_{l}}}{q_{i_{l}}-4}\geq 1. \end{equation} \end{theorem} We remark that Theorem \ref{thm4-2} also holds for the case where at least one of $m_{1}, \ldots, m_{n}$ is positive and the others are zeros. For instance, we assume that $g:= g_{i_{1}}$ and $\hat{g}:= \hat{g}_{i_{1}}$ are nonconstant and the others are constant. If $m:= m_{i_{1}}$ is a positive integer and the others are zeros, then inequality (\ref{eq-4-3}) coincides with $$ \dfrac{m}{q-4}\geq 1 \, \Longleftrightarrow \, q \leq m+4, $$ where $q:= q_{i_{1}}$. The result corresponds with Theorem \ref{thm2-5}. We will apply these results to the Gauss maps of complete minimal surfaces in ${\R}^{4}$. We briefly summarize here basic facts on minimal surfaces in ${\R}^{4}$. For more details, we refer the reader to \cite{Ch1965, HO1980, HO1985, Os1964}. Let $X=(x^{1}, x^{2}, x^{3}, x^{4})\colon \Sigma \to {\R}^{4}$ be an oriented minimal surface in ${\R}^4$. By associating a local complex coordinate $z=u+\sqrt{-1}v$ with each positive isothermal coordinate system $(u, v)$, $\Sigma$ is considered as a Riemann surface whose conformal metric is the induced metric $ds^{2}$ from ${\R}^{4}$. With respect to the local complex coordinate $z=u+\sqrt{-1}v$ of the surface, it holds that $$ \bar{\partial} \partial X =0, $$ where $\partial =(\partial /\partial u - \sqrt{-1}\partial /\partial v)/2$, $\bar{\partial} =(\partial /\partial u + \sqrt{-1}\partial /\partial v)/2$. Hence each ${\phi}_{i}:= \partial x^{i} dz$ ($i=1, 2, 3, 4$) is a holomorphic $1$-form on $\Sigma$. If we set $$ \omega = {\phi}_{1} -\sqrt{-1} {\phi}_{2}, \qquad g_{1}=\dfrac{{\phi}_{3}+\sqrt{-1}{\phi}_{4}}{{\phi}_{1} -\sqrt{-1} {\phi}_{2}}, \qquad g_{2}=\dfrac{-{\phi}_{3}+\sqrt{-1}{\phi}_{4}}{{\phi}_{1} -\sqrt{-1} {\phi}_{2}}, $$ then $\omega$ is a holomorphic $1$-form, and $g_{1}$ and $g_{2}$ are meromorphic functions on $\Sigma$. Moreover the holomorphic map $G:=(g_{1}, g_{2})\colon \Sigma \to \RC \times \RC$ coincides with the Gauss map of $X(\Sigma)$. We remark that the Gauss map of $X(\Sigma)$ in ${\R}^{4}$ is the map from each point of $\Sigma$ to its oriented tangent plane, the set of all oriented (tangent) planes in ${\R}^{4}$ is naturally identified with the quadric $$ \mathbf{Q}^{2}(\C) =\{[w^{1}: w^{2}: w^{3}: w^{4}] \in \mathbf{P}^{3}(\C) \, ;\, (w^{1})^{2}+\cdots +(w^{4})^{2} = 0\} $$ in $\mathbf{P}^{3}(\C)$, and $\mathbf{Q}^{2}(\C)$ is biholomorphic to the product of the Riemann spheres $\RC \times \RC$. Furthermore the induced metric from ${\R}^{4}$ is given by \begin{equation}\label{equ4-4} ds^{2}= (1+|g_{1}|^{2})(1+|g_{2}|^{2})|\omega|^{2}. \end{equation} Applying Theorem \ref{thm4-1} to the induced metric, we can obtain the Fujimoto theorem for the Gauss map of a complete minimal surface in ${\R}^{4}$. \begin{theorem}\cite[Theorem I\hspace{-.1em}I]{Fu1988}\label{thm-4-3} Let $X\colon \Sigma \to {\R}^{4}$ be a complete nonflat minimal surface and $G=(g_{1}, g_{2})\colon \Sigma \to \RC \times \RC $ the Gauss map of $X(\Sigma)$. \begin{enumerate} \item[(i)] Assume that $g_{1}$ and $g_{2}$ are both nonconstant and omit $q_{1}$ and $q_{2}$ distinct values respectively. If $q_{1}> 2$ and $q_{2}> 2$, then we have \begin{equation}\label{equ4-5} \dfrac{1}{q_{1}-2}+\dfrac{1}{q_{2}-2}\geq 1. \end{equation} \item[(i\hspace{-.1em}i)] If either $g_{1}$ or $g_{2}$, say $g_{2}$, is constant, then $g_{1}$ can omit at most $3$ distinct values. \end{enumerate} \end{theorem} \begin{proof} We first show (i). Since $g_{1}$ and $g_{2}$ are both nonconstant and $m_{1}=m_{2}=1$ from (\ref{equ4-4}), we can prove inequality (\ref{equ4-5}) by Theorem \ref{thm4-1}. Next we show (i\hspace{-.1em}i). If we set that $g_{1}$ omits $q_{1}$ values, then we obtain $$ \dfrac{1}{q_{1}-2}\geq 1 $$ from Theorem \ref{thm4-1} because $m_{1}=1$. Thus we have $q_{1}\leq 3$. \end{proof} Hence we reveal that the Fujimoto theorem depends on the orders of the factors $(1+|g_{1}|^{2})$ and $(1+|g_{2}|^{2})$ in the induced metric from ${\R}^{4}$ and the Euler characteristic of the Riemann sphere $\RC$. In \cite{AAIK2017}, we give some applications of this theorem, for example, to provide optimal results for the maximal number of exceptional values of the nontrivial part of the Gauss map of a complete minimal Lagrangian surface in the complex 2-space ${\C}^{2}$ and the generalized Gauss map of a complete nonorientable minimal surface in ${\R}^{4}$. In the same way, by Theorem \ref{thm4-2}, we obtain a unicity theorem for the Gauss maps of complete minimal surfaces in ${\R}^{4}$. \begin{theorem}\cite[Theorem 1.2]{HK2017}\label{thm-cor} Let $X\colon \Sigma \to {\R}^{4}$ and $\widehat{X}\colon \widehat{\Sigma} \to {\R}^{4}$ be two nonflat minimal surfaces, and $G=(g_{1}, g_{2})\colon \Sigma \to \RC\times \RC$, $\widehat{G}=(\hat{g}_{1}, \hat{g}_{2})\colon \widehat{\Sigma} \to \RC\times \RC$ the Gauss maps of $X(\Sigma)$, $\widehat{X}(\widehat{\Sigma})$ respectively. We assume that there exists a conformal diffeomorphism $\Psi \colon \Sigma \to \widehat{\Sigma}$ and either $X(\Sigma)$ or $\widehat{X}(\widehat{\Sigma})$ is complete. \begin{enumerate} \item[(i)] Assume that $g_{1}, g_{2}, \hat{g}_{1}, \hat{g}_{2}$ are nonconstant and, for each $i$ $(i=1, 2)$, $g_{i}$ and $\hat{g}_{i}\circ \Psi$ share $p_{i} >4$ distinct values. If $g_{1}\not\equiv \hat{g}_{1}\circ \Psi$ and $g_{2}\not\equiv \hat{g}_{2}\circ \Psi$, then we have \begin{equation}\label{eq4-6} \dfrac{1}{p_{1}-4}+\dfrac{1}{p_{2}-4}\geq 1. \end{equation} In particular, if $p_{1}\geq 7$ and $p_{2}\geq 7$, then either $g_{1}\equiv \hat{g}_{1}\circ \Psi$ or $g_{2}\equiv \hat{g}_{2}\circ \Psi$, or both hold. \item[(i\hspace{-.1em}i)] Assume that $g_{1}, \hat{g}_{1}$ are nonconstant, and $g_{1}$ and $\hat{g}_{1}\circ \Psi$ share $p$ distinct values. If $g_{1}\not\equiv \hat{g}_{1}\circ \Psi$ and $g_{2}\equiv \hat{g}_{2}\circ \Psi$ is constant, then we have $p\leq 5$. In particular, if $p\geq 6$, then $G\equiv \widehat{G}\circ \Psi$. \end{enumerate} \end{theorem} \subsection{Gauss map of a complete minimal surface of finite total curvature in ${\R}^{3}$}\label{further-algebraic} We review some of the standard facts on complete minimal surfaces of finite total curvature in ${\R}^{3}$. Let $X=(x^{1}, x^{2}, x^{3})\colon \Sigma \to {\R}^{3}$ be an oriented minimal surface in ${\R}^{3}$. Set ${\phi}_{i}:= \partial x^{i} dz$ ($i=1, 2, 3$). These satisfy \begin{enumerate} \item[(C)] $\sum {\phi}^{2}_{i}=0$: conformal condition, \item[(R)] $\sum |{\phi}_{i}|^{2}> 0$: regularity condition, \item[(P)] For every loop $\gamma \in H_{1}(\Sigma, \Z)$, $\Re \int_{\gamma} {\phi}_{i} =0$: period condition. \end{enumerate} For the meromorphic function $g$ and holomorphic $1$-form $\omega$ given by (\ref{eq:W-date3}), $$ {\phi}_{1}=\dfrac{1}{2}(1-g^{2})\omega, \quad {\phi}_{2}=\dfrac{\sqrt{-1}}{2}(1+g^{2})\omega, \quad {\phi}_{3}= g\omega $$ hold. We call $(\omega, g)$ the Weierstrass data (W-data, for short). If we are given the W-data on $\Sigma$, we get ${\phi}_{j}$'s by this formula. They satisfy condition (C) automatically, and condition (R) is interpreted as the poles of $g$ of order $l$ coincides exactly with the zeros of $\omega$ of order $2k$, because the induced metric $ds^{2}$ is given by (\ref{equ-412-metric}). In general, for a given meromorphic function $g$ on $\Sigma$, it is not so hard to find a holomorphic 1-form $\omega$ satisfying condition (R). However, the period condition (P) always causes trouble. The total curvature of $X(\Sigma)$ is given by $$ \tau (\Sigma) :=\displaystyle \int_{\Sigma} K_{ds^{2}}dA = -\int_{\Sigma} \dfrac{2\sqrt{-1}dg\wedge d\bar{g}}{(1+|g|^{2})^{2}}, $$ where $dA$ is the area element with respect to the metric $ds^{2}$. Note that $|\tau (\Sigma)|$ is the area of $\Sigma$ with respect to the metric induced from the Fubini-Study metric of the Riemann sphere $\RC$ by $g$. \begin{theorem}\label{thm-4-2-1} A complete minimal surface of finite total curvature $X\colon \Sigma \to {\R}^{3}$ satisfies \begin{enumerate} \item[(i)] $\Sigma$ is conformally to $\overline{\Sigma}_{\gamma}\backslash \{ p_{1},\ldots ,p_{k} \}$, where $\overline{\Sigma}_{\gamma}$ is a closed Riemann surface of genus $\gamma$ and $p_{1}, \ldots, p_{k}\in \overline{\Sigma}$ $($\cite{Hu1957}$)$, \item[(i\hspace{-.1em}i)] The W-date $(\omega, g)$ can be extended meromorphically to $\overline{\Sigma}_{\gamma}$ $($\cite{Os1964}$)$. \end{enumerate} \end{theorem} From this fact, we call such surfaces {\it algebraic minimal surfaces}. Osserman proved the following result for the number of exceptional values of the Gauss map of a complete minimal surface of finite total curvature in ${\R}^{3}$. \begin{theorem}\cite[Theorem 3]{Os1964}\label{thm4-2-2} The Gauss map of a nonflat complete minimal surface of finite total curvature omits at most 3 values. \end{theorem} The author, Kobayashi and Miyaoka refined Theorem \ref{thm4-2-2} and give the following estimate for the number of exceptional values of the Gauss map of a complete minimal surface of finite total curvature in ${\R}^{3}$. \begin{theorem}\cite[Theorem 3.3]{KKM2008}\label{thm4-2-3} Let $X\colon \Sigma= \overline{\Sigma}_{\gamma}\backslash \{ p_{1},\ldots ,p_{k} \}\to {\R}^{3}$ be a nonflat complete minimal surface of finite total curvature, $g\colon \Sigma\to \RC$ its Gauss map, $d$ the degree of $g$ considered as a map on $\overline{\Sigma}_{\gamma}$. Then the number $D_{g}$ of exceptinal values of $g$ satisfies \begin{equation}\label{eq4-2-1} D_{g}\leq 2+\dfrac{2}{R}, \qquad R=\dfrac{d}{\gamma -1+(k/2)}> 1. \end{equation} \end{theorem} \begin{proof} By a suitable rotation of the surface in ${\R}^{3}$, we may assume that the Gauss map $g$ has neither zero nor pole at $p_{j}$ and that the zeros and poles of $g$ are simple. The simple poles of $g$ coincide with the double zeros of $\omega$ because the surface satifies the regularity condition (R). By the completeness of the surface, $\omega$ has a pole at each end $p_{j}$ (\cite{Ma1963}, \cite[Lemma 9.6]{Os1986}). Moreover, since the surface satisfies the period condition (P), $\omega$ has a pole of order ${\mu}_{j}\geq 2$ at $p_{j}$ (\cite{Os1964}). Applying the Riemann-Roch theorem to $\omega$ on $\overline{\Sigma}_{\gamma}$, we obtain that $$ \displaystyle 2d-\sum_{j=1}^{k}{\mu}_{j} = 2\gamma -2. $$ Thus we have \begin{equation}\label{eq4-2-2} \displaystyle d=\gamma -1+\dfrac{1}{2}\sum_{j=1}^{k}{\mu}_{j}\geq \gamma -1+k > \gamma -1+(k/2), \end{equation} and $R>1$. On the other hand, we assume that $g$ omits $D_{g}$ values. Let $n_{0}$ be the sum of the branching orders at the image of exceptional values. Then we have $$ k\geq dD_{g} -n_{0}. $$ Let $n_{g}$ be the total branching order of $g$ on $\overline{\Sigma}_{\gamma}$. Then applying the Riemann-Hurwitz formula to the meromorphic function $g$ on $\overline{\Sigma}_{\gamma}$, we have \begin{equation}\label{eq4-2-3} n_{g}=2(d+\gamma -1). \end{equation} Hence we have $$ D_{g}\leq \dfrac{n_{0}+k}{d}\leq \dfrac{n_{g}+k}{d}=2+\dfrac{2}{R}. $$ \end{proof} \begin{remark}\label{rmk4-2-4} More precisely, (\ref{eq4-2-1}) holds for the totally ramified value number ${\nu}_{g}$ for the Gauss map of a complete minimal surface of finite total curvature in ${\R}^{3}$. One of the most important results for the number is to discover nonflat complete minimal surfaces of finite total curvature in ${\R}^{3}$ with ${\nu}_{g}=2.5$. For the details, see \cite{Ka2006}. \end{remark} By the proof of Theorem \ref{thm4-2-3}, we reveal that the reason why the upper bound for $D_{g}$ changes from `4' to `3' is that the order $\mu_{j}$ of a pole of $\omega$ at each end $p_{j}$ changes from `$\mu_{j}\ge 1$' to `$\mu_{j}\ge 2$'. Remark that this principle is equivalent to the distinction between the Cohn-Vossen inequality and the Osserman inequality on the total curvature of a complete minimal surface of finite total curvature in ${\R}^{3}$. There still remains the following question. \begin{problem}[\cite{Os1964}]\label{pro4-2-5} Does there exist a complete minimal surface of finite total curvature in ${\R}^{3}$ whose Gauss map omits 3 values? \end{problem} If so, Theorems \ref{thm4-2-2} and \ref{thm4-2-3} are optimal. If not, the maximum is `2' and is attained by the catenoid and examples constructed by Miyaoka and Sato \cite{MS1994}. In regards to this problem, the following facts are well-known. \begin{proposition}\label{pro4-2-6} For a nonflat complete minimal surface of finite total curvature in ${\R}^{3}$, \begin{enumerate} \item[(i)] When $\gamma =0$, the Gauss map omits at most 2 values $($\cite{Os1964}, \cite{KKM2008}$)$, \item[(i\hspace{-.1em}i)] When $\gamma =1$ and the surface has a non-embedded end, the Gauss map omits at most 2 values $($\cite{Ga1976}, \cite{Fa1993}, \cite{KKM2008}$)$, \item[(i\hspace{-.1em}i\hspace{-.1em}i)] If the Gauss map omits 3 values, then $\gamma \geq 1$ and the total curvature $\tau (\Sigma)\leq -20\pi$ $($\cite{Os1964}, \cite{WX1987}, \cite{Fa1993}$)$. \end{enumerate} \end{proposition} By virtue of Theorem \ref{thm4-2-3} and this proposition, if there exists a complete minimal surface of finite total curvature whose Gauss map omits 3 values, then it has the complexity of topological data. Thus it is very hard to solve the period condition (P) of the surface. This is the difficulty of this problem.
\section{introduction} The rich phase diagrams of correlated electron materials are a central concern in both condensed matter physics and technological application \cite{dagotto05,davis13,Fradkin2015}. One archetypical example is the emerging of superconductivity (SC) upon suppression of a `parent' electronic order typically by doping. This generally yields a dome structure of the SC critical temperature $T_c$ as a function of the doping level $x$. The parent competing order (CO) ranges from the antiferormagnetic spin order in cuprates \cite{Lee2006,fischer2007,Badoux2016,Hussey2016,Rybicki2016} and heavy-fermion rare-earth compounds \cite{Jeffries2005}, to the ferro-orbital and antiferormagnetic spin dipolar/quadruplar orders in iron pnictides/chalcogenides \cite{yin_book2015,lee09,onari14,Yu2015}, and to the charge order in titanium oxypnictides \cite{frandsen14} and transition-metal dichalcogendies \cite{Morosan2006}. A particularly interesting case is the cuprate high-temperature superconductors, where the parent and SC phases do not appear to coexist but the phase competition is actually intensified by the emerging of a ``strange metal'' normal state with pseudogap opening at a temperature $T^*$ well above $T_{c}$ in the underdoped regime \cite{fischer2007}. The origin of the pseudogap has been controversial, being attributed to preformation of Cooper pairs \cite{Anderson1987,zhang1988,Kotliar1988,Emery1995,shi2008,kanigel2008} or a hidden CO such as $d$-density wave (DDW) \cite{chakravarty2001,ubbens1992,yang2006,greco2009,cappelluti1999,bejas2012}, spin-density wave (SDW) \cite{Scalapino2012,Demler2001,Moon2009,das2012}, loop-current \cite{Varma1997}, nematic or stripe order \cite{yamase2000,Kivelson2003,Fischer2011,hashimoto2010,he2011,lipscombe2009}, and pair density wave \cite{Lee2014,Berg2009}, etc. It has been observed that upon doping, $T^*$ decreases gradually in the normal state above the $T_c$ dome, and enters into the SC dome near the optimal doping level at $x^{}_{\text{OP}}$. To date, how $T^*$ evolves with doping under the $T_c$ dome is a key missing piece of the pseudogap puzzle \cite{Badoux2016,Hussey2016}. The conventional notion \cite{Lee2006,fischer2007} is that $T^*$ follows smoothly its normal-state behavior and ends ($T^*=0$) at the quantum critical point (QCP) $x^{}_{\text{QCP}} >x^{}_{\text{OP}}$ in the overdoped regime [see Fig.~\ref{F1}(a)]. However, a revised phase diagram was suggested by some recent angle-resolved photoemission spectroscopy (ARPES) measurements on Bi$_{2}$Sr$_{2}$CaCu$_{2}$O$_{8+\delta}$ (Bi-2212) cuprates \cite{vishik2012,hashimoto2015}: At slight overdoping, the system seems to change from a coexisting pseudogap-SC state to the pure SC state as temperature decreases to zero, leading to a back-bending behavior of $T^*$ as a function of $x$ under the $T_{c}$ dome [cf., Fig.~\ref{F1}(b)]. This possibility stimulates new thinking about the phase competition in the high-$T_{c}$ superconductors. For example, can the existence or nonexistence of the $T^*$ back bending be able to confirm or rule out some proposed COs as the pseudogap state? Interestingly, a similar back-bending phenomenon and revised phase diagram was clearly established in the iron-based high-$T_c$ superconductor Ba(Fe$_{1-x}$Co$_{x}$)$_{2}$As$_{2}$ (Ba-122) \cite{nandi2010,ni2008,fernandes2010}, where the QCP is located at the underdoped region, i.e., $x^{}_{\text{QCP}}<x_{\text{OP}}$ [see Figs.~\ref{F1}(c)-(d)], although undoped iron pnictides are bad metals rather than Mott insulators like cuprates. Theoretically, a back bending of $T^*$ was obtained in a simple Landau theory for certain competition between two orders \cite{wu2005}. Thus, the revised phase diagram can happen in principle, but whether it does take place in real materials or the realistic microscopic models for them remains elusive. A mean-field-type theory of the $t$-$J$ model for the cuprates \cite{cappelluti1999,bejas2012} predicted a ``pre-back-bending'' of $T^*$ due to DDW, namely it starts well above the $T_c$ dome and even exists without SC, in disagreement with what was suggested above by the Landau theory and the ARPES data. The ultimate detection and comprehensive understanding of the revised phase diagram demand a study of how it is related to the many unusual spectroscopy observations. For example, previous ARPES measurements showed clear evidence that the antinodal gap enhances with temperature at optimally doped Bi$_{2}$Sr$_{2}$CuO$_{6+\delta}$ (Bi-2201) \cite{kondo2011,kondo2007} and La$_{2-x}$Sr$_x$CuO$_4$ (La-214) \cite{terashima2007}. A recent study on Bi-2201 further reported that the anomalous temperature dependence of the measured gap, from slight underdoping to slight overdoping, extends to temperatures above $T_{c}$ (below $T^*$) \cite{kaminski2015}. In comparison, the gap remains nearly unchanged below $T_{c}$ in the deeply underdoped region where the pseudogap dominates, but follows the traditional BCS-like temperature dependence in the heavily overdoped region where the SC gap dominates. Moreover, the gap evolution can be clearly detected by electronic Raman scattering (ERS) as well. By choosing the incident and scattered light polarization vectors, one can probe the gap magnitude in different regions of the Brillouin zone (BZ). In particular, the B$_{1g}$ and B$_{2g}$ channels measure the gap features of the antinodal and nodal regions, respectively \cite{devereaux2007}. The antinodal and nodal gaps, considered to be pseudogap and SC dominated, respectively, exhibit distinct doping dependence \cite{Loret2016,guyard2008-1,guyard2008,blanc2010,le_tacon2006,sacuto2011,kanigel2006}. Their temperature evolution in slightly underdoped cuprates is rather unexpected: The gap extracted from the B$_{1g}$ channel remains nearly unchanged or even increases as temperature increases toward $T_c$, rather than decreasing to zero as predicted by the standard BCS theory for $d$-wave SC. Similar enhancement in the ERS signals were discovered in lightly underdoped iron-pnictide Ba-122 \cite{chauviere2010}, further indicating a close connection between the cuprate and iron-pnictide high-$T_{c}$ superconductors. Here, we carry out a systematical study of the phase competition between SC and a CO using both Ginzburg-Landau theory (Section II) and different mean-field theories of the extended $t$-$J$ model for the cuprates (Section III). We show that the revised and original phase diagrams in high-$T_{c}$ superconductors can be established with the moderate and weak competitions, respectively. In the latter microscopic model, the nearest-neighbor Coulomb interaction $V$ as well as the second and third nearest-neighbor hopping integrals $t^{\prime}$ and $t^{\prime\prime}$ are included to tune the competition. We found that the back-bending of $T^*$ under the $T_{c}$ dome is quite robust against those parameter tunings but $t^{\prime}$ is necessary to prevent the pre-back-bending of $T^*$ in the absence of SC. Inclusion of the much neglected feedback effect of SC on pseudogap can push the back-bending point from optimal doping to the overdoped regime, in better agreement with the experiments \cite{vishik2012,hashimoto2015}. In Section IV, we calculate out the ARPES and ERS spectral functions in mean-field theory of the realistic $t$-$t^{\prime}$-$t^{\prime\prime}$-$J$-$V$ model to reveal that the back-bending of $T^*$ can provide a simple explanation of the observed anomalous temperature dependence of the antinodal gap via a two-step evolution where the SC and CO dominate low- and high-temperature regions, respectively. In Section V, we consider SDW and show that it produces a less severe back-bending of $T^*$ and worse agreement with ERS than DDW. The implications of our results are discussed in Section VI and the article is summarized in Section VII. \begin{figure}[btp] \center \includegraphics[width=\columnwidth]{Fig1-phase_bb.eps} \caption{Phase diagrams of the competing SC (yellow), CO (cyan), and coexisting (pink) states in Ginzburg-Landau theory. (a) The original type, where $x^{}_{\text{QCP}}>x_{\text{OP}}$, for $q=1$. (b) The revised type, where $x^{}_{\text{QCP}}<x_{\text{OP}}$, for $q=0.2$. The other parameters are $\alpha_{s}(x)=10(x-0.3)$, $\alpha_{d}(x)=27(x-0.22)$, $\beta=2$, and $g=1.2$ used in Ref.~\onlinecite{wu2005} for cuprates. Lower panels are our fits to the experimental data (various symbols) on Ba-122 iron-pnictides \cite{nandi2010,ni2008,fernandes2010} using (c) Eq.~(\ref{T2}) with $\alpha_{s}(x)=10(x-0.13)$, $\alpha_{d}(x)=50(x-0.068)$, $q$=$0.23$, $\beta$=$2$, $g$=$1.1$, and (d) Eq.~(\ref{T}) with $\alpha_{s}(x)=10(x-0.125)$, $\alpha_{d}(x)=26(x-0.079)$, $q$=$0.4$, $p$=$0.3$, $\beta$=$2$, $g$=$1.4$.} \label{F1} \end{figure} \section{Ginzburg-Landau theory} To evaluate the competition between SC and a CO, we start with the standard free energy \cite{chakravarty2004,wu2005}: \begin{equation} F=\alpha _{s}\left( x,T\right) \left\vert \psi \right\vert ^{2}+\frac{\beta _{s}}{2}\left\vert \psi \right\vert ^{4}+\alpha _{d}\left( x,T\right) \phi ^{2}+\frac{\beta _{d}}{2}\phi ^{4}+g\left\vert \psi \right\vert ^{2}\phi ^{2}, \label{E1} \end{equation} where $\psi$ and $\phi$ are the order parameter for SC and the CO, respectively; $g$ is the interaction constant between them. Here we use the critical temperature $T_d$ for the CO to approximate $T^*$ for the pseudogap. For simplicity, we set $\beta_s=\beta_d=\beta$ and assume that $\alpha_{s,d}(x,T)$ are the only parameters that bear the $x$ and $T$ dependence, taking the form \begin{equation} \alpha_{s,d}(x,T)=\alpha_{s,d}(x)+\gamma^{(1)}_{s,d}T+\gamma^{(2)}_{s,d}T^{2}. \end{equation} In particular, the pure quadratic $T$ dependence introduced by Wu \textsl{et al.} \cite{wu2005} to reproduce the desired form of $\alpha_{s}(x,T)\simeq 2\beta T_{c}\left( T-T_{c}\right)$ near $T_c$ reads \begin{eqnarray} \alpha_{s}(x,T)&=&\alpha_{s}(x)+ \beta T^2, \nonumber \\ \alpha_{d}(x,T)&=&\alpha_{d}(x)+ q \beta T^2. \label{T2} \end{eqnarray} When the two orders are decoupled, $T_c=\sqrt{-\alpha_s(x)/\beta}$ and $T_d=\sqrt{-\alpha_d(x)/q\beta}$. Here the $q$ factor describes the CO's relative tolerance to thermal suppression: The smaller $q$, the more tolerant the CO than SC\cite{wu2005}. It is shown that decreasing $q$ can change the phase diagram from the original type realized for $q > g/\beta$ [Fig.~1(a)] to the revised type realized for $q < g/\beta < 1$ [Fig.~1(b)]. \begin{figure}[tbp] \center \includegraphics[width=\columnwidth]{Fig2-overallphase_bb.eps} \caption{ Phase diagrams of the competing SC (yellow), CO (cyan), and coexisting (pink) states in Ginzburg-Landau theory using Eq.~(\ref{T2}) for fixed $q=0.4$. (a) The original type, where $x^{}_{\text{QCP}}>x_{\text{OP}}$, for $g=0.6$. (b) The revised type, where $x^{}_{\text{QCP}}<x_{\text{OP}}$, for $g=1.2$. (c) Complete phase separation for $g>2$. The other parameters are $\alpha_{s}(x)=10(x-0.13)$, $\alpha_{d}(x)=65(x-0.069)$, $\beta=2$. (d) Phase diagram in terms of interaction $\alpha_{d}(x,T)/\alpha_{s}(x,T)$ versus $g/\beta$. The light gray, and heavy gray arrows demonstrate phase transition, which occurs in the underdoping (overdoping), and in the intermediate doping region of revised phase diagram, respectively.} \label{F2} \end{figure} The phase diagram also depends sensitively on $g$, the interaction strength, as it is equally fair to read that increasing $g$ can change the phase diagram from the original type realized for $g < q\beta$ [Fig.~1(a)] to the revised type realized for $q\beta < g < \beta$ [Fig.~1(b)], providing $q<1$ and Eq.~(\ref{T2}). This is further shown in Fig.~\ref{F2} for fixed $q=0.4$. For strong enough competition ($g\geq\beta$), the two phases cannot coexist [Fig.~\ref{F2}(c)]. Therefore, the original and revised types of phase diagrams can also be generated by the weak and moderate competition between SC and other COs, respectively. To understand the relationship between $q$ and $g$, we examine the phase diagram in terms of $\alpha_{d}(x,T)/\alpha_{s}(x,T)$ versus $g/\beta$ using Eq.~(\ref{T2}) [see Fig.~\ref{F2}(d)]. For negative $g$, the coexistence of SC and CO is the only solution, which means that the attractive interaction can generate neither the original nor the revised type of the phase diagrams found in high-$T_{c}$ superconductors. On the other hand, for strong competing interaction $g>\beta$, the two orders cannot coexist and the phase boundary is determined by $\alpha_{d}(x,T)/\alpha_{s}(x,T)=1$. For $0<g<\beta$, there are two phase boundaries in Fig.~\ref{F2}(d): The first one between the coexisting (pink) and CO (cyan) phases is set by $\alpha_{d}(x,T)/\alpha_{s}(x,T)=\beta/g>1$, and the second one between the SC (yellow) and coexisting (pink) phases is set by $\alpha_{d}(x,T)/\alpha_{s}(x,T)=g/\beta<1$. When $q=1$, the value of $\alpha_{d}(x,T)/\alpha_{s}(x,T)$ will increase as $T$ goes up if $\alpha_{d}(x,0)/\alpha_{s}(x,0)>1$, inducing the transition across the first phase boundary, as indicated by the upper gray arrow in Fig.~\ref{F2}(d). This corresponds to the underdoping scenario in the original phase diagram. Likewise when $q=1$, the value of $\alpha_{d}(x,T)/\alpha_{s}(x,T)$ will decrease as $T$ goes up if $\alpha_{d}(x,0)/\alpha_{s}(x,0)<1$, inducing the transition across the second phase boundary, as indicated by the lower gray arrow in Fig.~\ref{F2}(d). This corresponds to the overdoping scenario in the original phase diagram. To produce the revised phase diagram where the phase undergoes pure SC, coexisting, and pseudogap state as $T$ goes up, it requires that $\alpha_{d}(x,T)/\alpha_{s}(x,T)$ increases from smaller than $g/\beta$ to larger than $\beta/g$, as indicated by the black arrow in Fig.~\ref{F2}(d). Such behavior can be produced only by $q<g/\beta<1$. We also fit the phase diagram in Ba-122 iron-pnictide though many properties of iron-based compounds differ from cuprates. However, the observed phase diagram of Ba-122 iron-pnictides \cite{nandi2010} suggests a linear $T$ dependence of $\alpha_d(x,T)$. Indeed, Eq.~(\ref{T2}) does not fit quite well [Fig.~1(c)] and a better fit [Fig.~1(d)] results from using \begin{eqnarray} \alpha_{s}(x,T)&=&\alpha_{s}(x)+ \frac{1-p}{\sqrt{1+p}}\sqrt{-2\alpha _{s}(x)\beta } T+\frac{2p}{1+p}\beta T^2, \nonumber \\ \alpha_{d}(x,T)&=&\alpha_{d}(x)+ q \beta T, \label{T} \end{eqnarray} by which $\alpha_{s}(x,T)\simeq 2\beta T_{c}\left( T-T_{c}\right)$ near $T_c$ is still satisfied for $0\leq p < 1$. Here, $T_{c}=\sqrt{(1+p)/2}\sqrt{-\alpha _{s}(x)/\beta}$ in case of decoupling, similar to the form with the quadric $T$ dependence. This revised phase diagram also resembles the recently discovered phase diagram in Bi-2212 cuprates \cite{vishik2012,hashimoto2015}, suggesting a possible linear $T$ dependence of pseudogap in cuprate superconductors. \section{Microscopic description in the extended $t$-$J$-$V$ model} \begin{figure}[t] \includegraphics[width=0.4\columnwidth]{Fig3-ddw.eps} \caption{Schematic of the DDW order. Solid, and hollow circles are for the A, and B sublattice, respectively. Signs of the DDW orders are denoted by the arrows as described in the Appendix.} \label{A1} \end{figure} We proceed to study how the revised phase diagram can emerge in a microscopic theory. We focus on the $t$-$J$-type model, which was widely used to describe the low-energy physics of the cuprates \cite{Lee2006}. In particular, we examine the competition between SC and DDW/SDW. The commensurate DDW state (see Fig.~\ref{A1}) or incommensurate DDW state were shown to be the leading possible charge instability in some theories for the extended $t$-$J$-$V$ model, where $V$ is the nearest-neighbor Coulomb interaction \cite{chakravarty2001,ubbens1992,yang2006,greco2009,cappelluti1999,bejas2012,Laughlin2014a,Laughlin2014b}. $V$ is known to stabilize the DDW state with respect to phase separation \cite{cappelluti1999}. Following the knowledge gained from the above Ginzburg-Landau theory, we also include the $V$ term to tune the robustness of the COs and the interaction strength between different orders. $V$ is chosen to reproduce the qualitative phase diagram in cuprates and its magnitude is in the same order as reported in first-principle studies of cuprates \cite{yin09}. Considerable $V$ can originate from three sources, which will be discussed later in Section VI. The extended $t$-$J$-$V$ model reads \begin{eqnarray} \mathcal{H}=&-&\sum_{i,j,\sigma} t_{ij}c_{i\sigma}^\dagger c_{j\sigma}+J\sum_{\langle i,j \rangle}\Big(\vec{S}_i \cdot \vec{S}_j-\frac{1}{4}n_in_j\Big)-\mu\sum_i n_i \nonumber\\ &+&V\sum_{\langle i,j \rangle}n_{i}n_{j}, \label{E2} \end{eqnarray} where $c_{i\sigma}^{\dagger}$ and $c_{i\sigma}$ are electron creation and annihilation operators, respectively, at the $i$th lattice site with the constraint of single occupation. $t_{ij}$ is the hopping integral between the $i$th and $j$th sites. $J$ is the antiferromagnetic superexchange coupling constant between nearest-neighbor spins. We also consider the \emph{1}st, \emph{2}nd, and \emph{3}rd nearest-neighbor hopping integrals ($t$, $t^{\prime}$, and $t^{\prime\prime}$, respectively) for $t_{ij}$ to tune the shape of the Fermi surface, which is a fundamental microscopic factor underlying the phase competition. \begin{figure}[btp] \center \includegraphics[width=\columnwidth]{Fig4-MI-phase.eps} \caption{Phase diagram of the extended $t$-$J$-$V$ model in the color codes of yellow (SC), cyan (DDW), pink (coexisting). (a) Results in the slave-boson approximation for $t^{\prime}=-0.25$, $t^{\prime\prime}=0.1$, $J=0.35$, and $V=0.12$; (b) Results in the renormalized mean-field theory approximation for $t^{\prime}=-0.2$, $t^{\prime\prime}=0.1$, $J=0.3$, and $V=0.095$. Besides the conventional underdoping (UD) and overdoping (OD) region, an intermediate doping (ID) region where the back-bending of $T_d$ occurs is marked out.} \label{F3} \end{figure} We introduce the mean-field order parameters as $\langle c_{i}^\dagger c_{j}\rangle=\chi\pm iD$ and $\frac{1}{2}\langle c_{i\uparrow} c_{j\downarrow}-c_{i\downarrow} c_{j\uparrow}\rangle=\pm \Delta$ with $\chi$, $D$, and $\Delta$ are the uniform bond, DDW, and \emph{d}-wave SC order, respectively (see Appendix A for details). For simplicity, we adopt the slave-boson method \cite{ubbens1992}, which directly projects the original Hamiltonian into the single-occupation space via reducing the hopping terms by a factor of $x$. The order parameters can be self-consistently determined by minimizing the free energy \begin{eqnarray} F&=&-\frac{2T}{N}\sum_{k,\eta =\pm }^{\prime }\ln (2\cosh \frac{\beta E_{k}^{\eta }}{2})-\mu(1-x)\nonumber\\ &+&(4V_{d}\chi ^{2}+4V_{d}D^{2}+4V_{c}\Delta ^{2}) \end{eqnarray} with \begin{eqnarray} \label{V} V_{d}&=&\frac{1}{2}J+V,\nonumber\\ V_{c}&=&J-V. \end{eqnarray} Here $E_{k}^{\pm}=\sqrt{\xi_{k}^{\pm 2}+\Delta_{k}^{2}}$ is the Bogliubov quasiparticle dispersion in momentum space, and \begin{eqnarray} \label{OP} \Delta_{k}&=&2V_{c}\Delta (\cos k_{x}-\cos k_{y}),\nonumber \\ D_{k}&=&2V_{d}D (\cos k_{x}-\cos k_{y}). \end{eqnarray} $t$ has been set as the energy unit. Here we use $D_k$ to stand for the pseudogap and the DDW critical temperature $T_d$ for $T^*$. Similar to the above macroscopic study, a revised phase diagram in hole-doped cuprates is well established within the present microscopic model. We define an intermediate doping region ranging from $x^{}_{\text{QCP}}$ to $x^{}_{\text{OP}}$ [$0.135<x<0.165$ in Fig~\ref{F3}(a)], where the back-bending of $T_d$ under the $T_{c}$ dome is found. The ground state is a pure SC state. As $T$ increases, the coexistence of the SC and DDW states emerges when the SC order parameter is sufficiently suppressed at $T_d$, which is below the $T_{c}$ dome. The magnitudes of the DDW and SC gaps are comparable in this special region. Our theoretical phase diagram qualitatively agrees with the recent laser-ARPES measurements on Bi-2212 and may also explain the discrepancy of $x^{}_{\text{QCP}}$ extrapolated by various measurements \cite{vishik2012,hashimoto2015}. \begin{figure*}[tbp] \centering \includegraphics[width=1.4\columnwidth]{Fig5-VandT1_bb.eps} \caption{Model parameter dependence of the phase diagram in the color codes of yellow (SC), cyan (DDW), pink (coexisting). Top panels: The $V$ dependence for $t^{\prime}=-0.25$. Bottom panels: The $t^{\prime}$ dependence for $V=0.12$. $t^{\prime\prime}=0.1$ and $J=0.35$ for all the figures.} \label{F4} \end{figure*} The $T_d$ back-bending suggests that the role of SC in the intermediate doping region has been underestimated for decades. In Fig.~\ref{F3}(b), we show the phase diagram in the renormalized mean-field approximation, which takes into account the feedback effect of SC for the renormalization of the model parameters \cite{ogata2003,wang2010} (see Appendix B). A similar back-bending phenomenon and revised diagram are obtained, indicating that the revised phase diagram is quite robust against the theoretical approximation we chose. Moreover, the DDW enters the $T_{c}$ dome now at slightly overdoping, in better agreement with experiments on Bi-2212 cuprates \cite{vishik2012,hashimoto2015}. This suggests that the feedback effect of SC be necessary to quantitative explanation of the experimental data. Fig.~\ref{F4} shows that the presence of the $T_d$ back-bending is qualitatively robust against the variations in the model parameters, viz. $t$, $t^{\prime}$, $t^{\prime\prime}$, $J$, and $V$. According to Eq.~(\ref{V}), $V$ directly enhances the DDW order parameter and weakens SC; DDW emerges at low doping for $V>J/4$. Indeed, the calculated maximum $T_c$ decreases as $V$ increases [see the four top panels of Fig.~\ref{F4}]. $x_\mathrm{OP}-x_\mathrm{QCP}$ remains nearly unchanged for small $V$ up to 0.135 (where the maximum $T_c$ drops by half); then, it decreases as $V$ increases. This behavior is different from the $g$ or $q$ effect shown in Ginzburg-Landau theory and is attributed to the direct tuning of $\alpha_{s,d}(x,T)$ by $V$. Fig.~\ref{F4}(bottom panels) shows that the back-bending weakens as $t^{\prime}$ increases from a negative value (which means hole doping) to a positive one (which means electron doping), while the maximum $T_c$ remains nearly unchanged. Thus, the revised phase diagram could also appear in the electron-doped cuprates but it is more difficult to be detected. \begin{figure}[!tbp] \center \includegraphics[width=\columnwidth]{Fig6-SB.eps} \caption{The effects of $t^{\prime}$ on the pre-back-bending of $T_d$ in the extended $t$-$J$-$V$ model. The DDW and SC orders are decoupled for (a) $t^{\prime}=0$ and (b) $t^{\prime}=-0.35$. They are coupled for (c) $t^{\prime}=0$ and (d) $t^{\prime}=-0.35$. T$_{d}^{\prime}$ is the characteristic temperature for the incommensurate DDW as discussed in main text. $t^{\prime\prime}=0$, $J=0.3$, and $V=0.15$ for all.} \label{F45} \end{figure} A mean-field-type theory of the $t$-$J$-$V$ model with $t^{\prime}=0$ \cite{cappelluti1999,bejas2012} predicted a ``pre-back-bending'' of $T_d$ in the absence of SC. This behavior is reproduced in our calculations for $t^{\prime}=0$, as shown in Fig.~\ref{F45}(a) for the decoupled SC and DDW orders. We further found that the coupling of the SC and DDW orders suppresses the back-bending for $t^{\prime}=0$, as shown in Fig.~\ref{F45}(c). The pre-back-bending is almost entirely removed by inclusion of $t^{\prime}=-0.35$ [Fig.~\ref{F45}(b)]. In this case, the coupling of the SC and DDW orders drives the back-bending of $T_d$ [Fig.~\ref{F45}(d)]. \begin{figure}[tbp] \center \includegraphics[width=\columnwidth]{Fig7-SB-ours.eps} \caption{The effects of $t^{\prime}$ on the pre-back-bending of $T_d$ in the extended $t$-$J$-$V$ model. The DDW and SC orders are decoupled for (a) $t^{\prime}=0$ and (b) $t^{\prime}=-0.25$. They are coupled for (c) $t^{\prime}=0$ and (d) $t^{\prime}=-0.25$. T$_{d}^{\prime}$ is the characteristic temperature for the incommensurate DDW as discussed in main text. $t^{\prime\prime}=0.1$. $J=0.35$, and $V=0.12$ for all.} \label{F46} \end{figure} Whether the back-bending occurs above the $T_c$ dome for $t^{\prime}=0$ \cite{cappelluti1999}, as shown in Fig.~\ref{F45}(c), depends on the model parameters. For a smaller $V$, the back-bending starts right at $T_c$ for $t^{\prime}=0$ [see Fig.~\ref{F46}(c)], while the other features of Fig.~\ref{F45} remain unchanged in Fig.~\ref{F46}. \emph{Incommensurate DDW}---It is previously reported that for $t=0$, the pre-back-bending of $T_{d}$ in the absence of SC vanishes upon inclusion of the incommensurate DDW, yielding a continuous decreasing of $T_{d}$ upon doping\cite{bejas2012}. We also check whether the back-bending is suppressed by the incommensurate DDW. To determine the phase boundary of the incommensurate DDW state, we study the charge instability under the random phase approximation (RPA) (see Appendix A for details). The pre-back-bending in the normal state is removed when the incommensurate DDW is further considered as shown in Fig.~\ref{F45}(a) where only the nearest-neighbor hopping is considered, consisting with the previous results obtained by large-$N$ expansion method \cite{bejas2012}. Such an incommensurate DDW state remains for weak SC (Fig.~\ref{F45}(c)). However, the incommensurate DDW is strongly suppressed by the next nearest-neighbor hopping $t^{\prime}$ as shown in Fig.~\ref{F45}(b). Furthermore, the incommensurate DDW state is also suppressed by strong SC (Fig.~\ref{F45}(d) and Fig.~\ref{F46}(c)). Especially, the incommensurate DDW states is fully suppressed for the realistic parameters (Fig.~\ref{F46}(b) and (d)). Therefore, the back-bending of $T_{d}$ under $T_{c}$ dome presented here is driven by the interplay of SC and commensurate DDW. However, the back-bending phenomenology is parameter dependent, which may be the reason why its manifestation is found only in limited cuprates. \section{Anomalous thermal evolution of electronic spectral features} To explore whether and how the revised phase diagram is related to the observed anomalous temperature dependence of the antinodal gap and Raman response, we calculate these quantities in the microscopic theory. \subsection{The quasiparticle spectral functions} \begin{figure}[tbp] \center \includegraphics[width=\columnwidth]{Fig8-ARPES-SLB_bb.eps} \caption{Thermal evolution of the SC and DDW order parameters and measured antinodal gap for three distinct doping levels: (a) underdoping $x=0.11$, (b) overdoping $x=0.18$, and (c) intermediate doping $x=0.135$. The legends of SC and DDW indicate the SC- and DDW-dominated regions, respectively. Solid lines are for the SC (black) and DDW (green) order parameters at the Fermi surface along the antinodal line. The open circles are for the peak energies extracted from the spectral functions; HEP and LEP stand for the high- and low-energy peaks, respectively. The size of the circles scale with the peak intensity. (d) Temperature evolution of the spectral functions at the intermediate doping $x=0.135$. The peak positions are marked by triangles with red for HEP and blue for LEP. The model parameters are $t^{\prime}=-0.25$, $t^{\prime\prime}=0.1$, $J=0.35$, and $V=0.12$. The Fermi energy is fixed at $0$.} \label{F5} \end{figure} First, we focus on the SC and DDW order parameters $\Delta_k$ and $D_k$ [see Eq.~(\ref{OP})] and the quasiparticle spectral functions, which are the observable in ARPES measurements. Fig.~\ref{F5} shows the results at $\mathbf{k}=(k_f,0)$, the normal-state Fermi-surface momentum along the antinodal line, for three typical doping levels. For underdoping $x<0.13$ [Fig.~\ref{F5}(a)], the magnitude of the ``pseudogap'' $D_k$ is much larger than that of the SC gap $\Delta_k$. $\Delta_k$ decreases but $D_{k}$ increases as temperature increases for $T<T_{c}$. On the other hand, the gaps evaluated from the spectral functions (see Appendix) differ from the two order parameters. There exist two peaks with different weight factors below the Fermi level [c.f. Fig.~\ref{F5}(d)]; the one with substantially stronger intensity used to represent the measured gap. In the underdoped region, the high-energy peak (HEP) has much stronger intensity than the low-energy peak (LEP) and remains nearly unchanged below $T_{c}$. This reflects the fact that pseudogap dominates the underdoping region. In the overdoping region, the temperature dependence of gap follows the traditional BCS behavior since the pseudogap is absent [Fig.~\ref{F5}(b)]. These findings agree with our common knowledge and various ARPES measurements \cite{kaminski2015}. On the contrary, in the intermediate doping range [Fig.~\ref{F5}(c)], the ``pseudogap'' $D_k$ does not emerge unless the SC gap $\Delta_k$ is suppressed sufficiently at $T_d$, similar to the previous theoretical suggestions \cite{das2008,sau2014,gabovich2014}. On the other hand, the measured gap exhibits a pronounced two-step evolution. It evolves from the SC dominating at low temperature to the DDW dominating at high temperature [Figs.~\ref{F5}(c) and \ref{F5}(d)]. The most important feature is that the measured gap exhibits clear enhancement as temperature increases above $T_d$ (under the $T_c$ dome), especially for slight underdoping. Therefore, we find a special temperature region in the intermediate doping region where the measured gap shows anomalous temperature dependence, in good agreement with ARPES measurements on various families of cuprates \cite{kondo2011,kaminski2015,kondo2007,terashima2007}. The present explanation also differs from the previous illustrations that attribute the anomalous temperature dependence of the measured antinodal gap to either the Fermi function \cite{kordyuk2015} or the weakened SC gap \cite{yildirim2011}. Our results show that the SC gap near the borderline between the SC- and DDW-dominated regions [dotted line in Fig.~\ref{F5}(c)] only slightly weakens, in agreement with the ARPES measurements on near optimally doped Bi-2212 \cite{hashimoto2015}. We noted that the measured gap remains increasing even above $T_{c}$ as revealed by ARPES data \cite{kaminski2015}. This may be due to the pre-pairing of superconductivity. Although the superconducting gap and pseudogap come from different origin, the electrons may have been paired above $T_{c}$ as indicated by the ARPES \cite{kondo2011} and other experimental measurements \cite{wang2001,li2010,tallon2011}. Therefore, the back-bending phenomenon, and the region of intermediate doping is expected to be more pronounced due to strong superconducting gap magnitude. \subsection{The Raman response} Furthermore, we study the relationship between the revised phase diagram and the anomalous temperature dependence of ERS in the cuprates. The Raman response was calculated from using the density-density correlation function (see Appendix A). The B$_{1g}$ and B$_{2g}$ channels are contributed mainly from the Fermi surface around the antinodal and nodal regions, respectively \cite{guyard2008-1,guyard2008}. The peak energy corresponding to the B$_{2g}$ response was found to track the temperature evolution of the $d$-wave SC order due to the absence of pseudogap near the nodal region. \begin{figure}[tbp] \center \includegraphics[width=\columnwidth]{Fig9-Raman-SLB_bb.eps} \caption{Thermal evolution of the Raman response in the B$_{1g}$ channel at intermediate doping $x=0.135$. (a) The results for the broadened resolution of $\eta=0.04$. The peak positions are indicated by the triangles. (b)-(d) is Raman response at three typical temperature with high resolution $\eta=0.003$. $T=0.3T_{c}$ for (b), $T=0.7T_{c}$ for (c), and $T=0.9T_{c}$ for (d). The intra-band, and inter-band components $R^{tra}$, and $R^{ter}$ is denoted by blue, and red dashed line, respectively. $R$ is the sum of $R^{tra}$ and $R^{ter}$ denoted by solid black line. (e) Temperature dependence of the energy of B$_{1g}$ Raman response peak. The circles track the peak energy shown b)-d) with high resolution, the intensity is marked by size. The solid line is the peak energy with broadened resolution extracted from (a). SC and DDW denote the SC- and DDW-dominated regions, respectively, as described in text. (f) Theoretical results under broadened resolution at different doping, together with the experimental Raman data in cuprate Hg-1201 \cite{guyard2008-1,guyard2008} and near optimally doped iron-pnictide Ba-122 \cite{chauviere2010}. $t^{\prime}=-0.25$, $t^{\prime\prime}=0.1$, $J=0.35$, and $V=0.12$.} \label{F6} \end{figure} On the other hand, the Raman response in the B$_{1g}$ channel is much more complicated. In the underdoped region, the peak energy in the Raman response remains nearly unchanged with increasing temperature. It decreases monotonically with temperature and goes to zero at $T_{c}$ in the overdoping region, following a simple BCS-like temperature evolution. On the contrary, the peak energy of the Raman response in the intermediate doping region [Fig.~\ref{F6}(a)] clearly enhances upon increasing temperature toward $T_{c}$. These behaviors are qualitatively consistent with our calculated temperature dependence of the measured quasiparticle gap and the ERS measurements\cite{guyard2008-1,guyard2008,blanc2010}, where a slight upward shift of the antinodal gap component was detected in the slightly underdoped Hg1201 and Bi2212 as $T_{c}$ is approached. The discrepancy in the temperature evolution of the B$_{1g}$ and B$_{2g}$ ERS would favor the two-gap scenario. The above single peak was obtained from using the broadened resolution of $\eta=0.04$. It is resolved into multi-peaks with $\eta=0.003$ owing to the intra-band (blue) and inter-band (red) contributions [Figs.~\ref{F6}(b)-(d)]. At low temperature ($T\ll T_{c}$) where SC dominates [Fig.~\ref{F6}(b)], the Raman response comes from the intra-band scattering due to the near degeneracy of the lower and upper bands. Two peaks can be found: The high-energy one originates from Van Hove singularity \cite{lu2007} and the low-energy one from the SC gap opening along the Fermi surface. At intermediate temperature [Fig.~\ref{F6}(c)], both SC and DDW orders play significant roles. Apart from the intra-band contribution, the inter-band contribution, which is dominated by DDW, develops gradually. At high enough temperature where DDW dominates [Fig.~\ref{F6}(d)], the inter-band contribution takes over and the intra-band contribution is invisible. In Fig.~\ref{F6}(e), we combine the information about the peak positions and the peak intensities as a function of temperature. It is clear that the temperature evolution of Raman response exhibits a two-step pattern with an anomalous enhancement near the transition from the SC-dominated region to the DDW-dominated region. To complete, in the heavily overdoped region the Raman peak energy follows the BCS prediction and decreases to zero as $T$ approaches $T_c$. The above results qualitatively agree with the experimental data on HgBa$_2$CuO$_{4+\delta}$ (Hg-1201) \cite{guyard2008-1,guyard2008,blanc2010}, as summarized in Fig.~\ref{F6}(f). Most importantly, we found that the anomalous temperature enhancement of the peak energy in the B$_{1g}$ Raman response as $T \to T_c$ near $x^{}_{\text{QCP}}$ is intimately related to the back-bending of $T_d$ below the $T_{c}$ dome. It is nearly invisible for weak back-bending of $T_d$ and disappears in the original phase diagram. This may suggest the possible existence of the revised phase diagram in Hg-1201 where the anomalous temperature dependence of ESR peak energy is detected. \section{Spin-density wave as a competing order} We have presented the results for the CO being DDW, which has the $d$-wave symmetry. We also considered the competition between the SC and an $s$-wave-like order such as SDW. Unlike DDW, the SDW order can be stabilized at low doping for $V=0$. Increasing $V$ will once again suppress the SC dome according to Eq.~\ref{V}, as shown in Fig.~\ref{SDW-V}. \begin{figure}[tbp] \center \includegraphics[width=0.9\columnwidth,clip=true,angle=0]{Fig10-SDW-V_bb.eps} \caption{The $V$ dependence of the phase diagram in the color codes of yellow (SC), cyan (SDW), pink (coexisting) for $t^{\prime}=-0.25$, $t^{\prime\prime}=0.1$ and $J=0.35$.} \label{SDW-V} \end{figure} Fig.~\ref{F7}(a) presents a revised phase diagram that looks similar to the case of DDW as a CO. However, the SDW case exhibits considerably weakened $T_d$ back-bending under the $T_{c}$ dome in the intermediate doping range. The back-bending even disappears for certain parameters, giving rise to an original phase diagram. Meanwhile, the anomalous thermal evolution in the measured antinodal gap and in B$_{1g}$ Raman channel is also suppressed (Fig.~\ref{F7}(b)), consisting with the results found in DDW case. This may be understood as the case that DDW competes with SC more fiercely than SDW in the antinodal region. Hence, the pseudogap in the hole-doped cuprates is more likely to be a manifestation of DDW than SDW based on the mean-field theory, although it should be attested by rigorous numerical techniques. \begin{figure}[tbp] \center \includegraphics[width=\columnwidth,clip=true,angle=0]{Fig11-RM-SDW_bb.eps} \caption{(a) Phase diagram and (b) Raman response in the extended $t$-$J$-$V$ model with an $s$-wave-like pseudogap SDW instead of the $d$-wave-like DDW. Symbols in (b) are experimental data extracted from cuprates Hg1201\cite{guyard2008-1,guyard2008}. $t^{\prime}=-0.25$, $t^{\prime\prime}=0.1$, $J=0.25$, and $V=0$.} \label{F7} \end{figure} \section{Discussion} In Landau theory, the revised and original phase diagrams in high-$T_{c}$ superconductors can be established with the moderate and weak competitions, respectively. Thus, the question turns out to be whether the revised phase diagram does take place in real materials. In the basic $t$-$J$ model for cuprate superconductors, the pairing gap increases as the doping level decreases, promoting the notions of the pseudogap as a manifestation of preformed pairs and the $T_c$ dome as a manifestation of superconducting phase decoherence at low doping \cite{Anderson1987,zhang1988,Kotliar1988,Emery1995}. Inclusion of the nearest-neighbor Coulomb interaction $V$ favors DDW as the pseudogap state against SC in the underdoped region, leading to the formation of the $T_c$ dome structure in the phase diagram \cite{chakravarty2001,ubbens1992,yang2006,greco2009,cappelluti1999,bejas2012}. There are three possible sources for considerable $V$: (i) Strongly correlated metals are generally bad metals with large resistivity of the order of m$\Omega\cdot$cm and small optical Drude peak. Therefore, the electrostatic screening does not work well in those systems \cite{emery96,Varma1987,lawler10,frandsen14,yin16:FeTe}. (ii) In mean-field theory, the local constraint of no-double occupancy at each site is reinforced only globally. As a result, the expectation value of $\langle n_in_j \rangle $ is substantially greater than one for the undoped case. In this sense, $V$ acts to minimize this side effect of mean-field theory. (iii) More interestingly, upon mapping multiorbital real materials into a one-band effective low-energy Hamiltonian, a vacuum-fluctuation-induced effective interaction in the exactly same form as $V$ appears together with $J$ \cite{yin09,yin10:volja}. Like the superexchange $J$ term, the new `super-repulsion' $V$ term comes from virtual electron-hopping processes, which can hardly be screened electrostatically. The strength of super-repulsion $V$ is strongly material dependent, since the apical atoms are involved in the intermediate state of the vacuum charge fluctuation: $V/t$ was estimated to be $0.28$, $0.12$, and $0.08$ for apical oxygen (in La$_2$CuO$_4$), chlorine (in Sr$_2$CuO$_2$Cl$_2$), and fluorine (in Sr$_2$CuO$_2$F$_2$), respectively \cite{yin09}. Our present calculations using this range of $V$ yield a revised phase diagram and electronic spectra consistent with ARPES and ERS measurements, indeed. Moreover, the realistic value of $t^{\prime}\sim -0.3$ is found to remove the pre-back-bending of $T_d$. Thus, it is necessary to include $V$ and $t^{\prime}$ in addressing the phase diagram of the real cuprate materials. The strong material dependence of $V$ renders the stability of DDW to be a material specific issue. Following the above argument, $V$ in terms of effective low-energy Hamiltonian should be considerably strong in correlated electron systems in general. Like in the cuprates, $V$ may promote charge instabilities in the iron-based superconductors \cite{yin16:FeTe} in competition with SC. We notice that similar anomalous temperature dependence of ERS in the B$_{2g}$ channel was discovered in slightly underdoped Ba-122 iron-based superconductor \cite{chauviere2010} [open circles in Fig.~\ref{F6}(f)]. Together with the similar phase diagrams [Fig.~\ref{F1}(c)-(d)], this suggests the existence of strong competition between superconductivity and competing orders in iron-pnictide high-$T_{c}$ superconductors. Although the cuprates and iron pnictides appear very different from each other, e.g., in the properties of their parent materials, Fermi surface topology, forms of interactions, etc., they both exhibit strong phase competition. In fact, the active orbital physics in iron pnictides make the C$_{2}$ and C$_{4}$ competition more apparent in K-doped BaFe$_{2}$AS$_{2}$ or Na-doped SrFe$_{2}$AS$_{2}$ \cite{dai2012,taddei2016,allred2016,bohmer2015,avci2014}. It is noteworthy that the present work has focused on the competition between SC and DDW/SDW. DDW was shown to be the leading possible charge instability in the one-band $t$-$t^{\prime}$-$J$-$V$ model \cite{bejas2012}. The recent Hall effect measurements on YBa$_2$Cu$_3$O$_y$ conducted at strong magnetic fields up to 88 tesla to suppress SC suggest that the pseudogap phase is disconnected from the charge-density wave (CDW) observed in the underdoped regime but linked to the antiferromagnetic Mott insulator \cite{Badoux2016}. This is not inconsistent with the DDW scenario, as DDW is not an ordinary CDW state whose order parameter is proportional to $\langle c^\dagger_i c_i \rangle$ or real $\langle c^\dagger_i c_j \rangle $ driven by Fermi surface instability, but a flux or bond-charge-phase order in terms of complex $\langle c^\dagger_i c_j \rangle $ due to the Mottness. For some other well-known COs such as loop-current order \cite{Varma1997} and intra-unit-cell nematic orders \cite{Fischer2011}, the three-band Emery model is an appropriate starting point. And it is yet to be seen whether the competition between SC and any other CO can produce a revised phase diagram and electronic spectra consistent with ARPES and ERS measurements in a realistic microscopic model. \section{Summary} We have shown in Ginzburg-Landau theory that the revised and original phase diagrams in high-$T_{c}$ superconductors can be established with the moderate and weak phase competitions, respectively. We further show that the revised phase diagram can result from the competition between DDW and SC or between SDW and SC in mean-field theory of the realistic $t$-$t^{\prime}$-$t^{\prime\prime}$-$J$-$V$ model. Inclusion of the much neglected feedback effect of SC on pseudogap can push the back-bending point from optimal doping to the overdoped regime. The calculated ARPES and ERS spectral functions reveal that the back-bending of $T^*$ can give a simple explanation of the observed anomalous temperature dependence of the antinodal gap via a two-step evolution where the SC and DDW dominate low- and high-temperature regions, respectively. Our results imply that it is likely to realize the revised phase diagram in cuprate superconductors. \section{Acknowledgments} We thank Peter D. Johnson, J.-X. Li, and Z.-X. Shen for helpful discussions and suggestions. This work was supported by the National Nature Science Foundation of China under Contract No. 11274276, the Ministry of Science and Technology of China 2016YFA0300401, and the U.S. Department of Energy (DOE), Office of Basic Energy Science, under Contract No. DE-SC0012704. Y. Zhou acknowledges the financial support of CSC and visiting scholarship of Brookhaven National Laboratory. H.Q. Lin acknowledges support from NSAF U1530401 and computational resource from the Beijing Computational Science Research Center. \section*{Appendix: Solving the extended $t$-$J$-$V$ model} The extended $t$-$J$-$V$ model is solved in mean-field-type theories with the order parameters defined as follows: (i) The $d$-wave SC order $\frac{1}{2}\langle c_{i\uparrow} c_{j\downarrow}-c_{i\downarrow} c_{j\uparrow}\rangle=\pm \Delta$ with $+$ for the $x$-direction and $-$ for the $y$ direction, (ii) the uniform bond order and the DDW order $\langle c_{i}^\dagger c_{j}\rangle=\chi\pm iD$ with $+$ for the $x$ direction of the $A$ sublattice and the $y$-direction of the $B$ sublattice, and $-$ otherwise (see Fig.~\ref{A1}), and (iii) the SDW order $\frac{1}{2}\langle c_{i\uparrow}^\dagger c_{i\uparrow}-c_{i\downarrow}^\dagger c_{i\downarrow}\rangle=(-1)^{i} m$. The interacting terms $H_{JV}=J\sum_{\langle i,j\rangle}\Big(\vec{S}_i \cdot \vec{S}_j-\frac{1}{4}n_in_j\Big)+V\sum_{\langle i,j\rangle}n_{i} n_{j}$ are decoupled into the particle-particle and particle-hole channels \cite{ubbens1992}: \begin{eqnarray} H_{JV}&=&-V_{c}\sum_{\langle i,j\rangle}[\Delta(c_{i\downarrow}^{\dagger}c_{j\uparrow}^{\dagger}-c_{j\downarrow}^{\dagger} c_{i\uparrow}^{\dagger})+h.c.]\nonumber\\ &-&V_{d}\sum_{\langle i,j\rangle}[(\chi\pm iD)(c_{j\uparrow}^{\dagger}c_{i\uparrow}+c_{j\downarrow}^{\dagger}c_{i\downarrow})+h.c.]\nonumber\\ &+&2Jm\sum_{i}{(-1)^{i}(c_{i\uparrow}^{\dagger}c_{i\uparrow}-c_{i\downarrow}^{\dagger}c_{i\downarrow})}\text{,} \end{eqnarray} where $V_{c}=J-V$ and $V_{d}=J/2+V$. \subsection{Slave-boson approximation} In the slave-boson approximation, the physical electron operators $c_{i\sigma}=b_{i}^{\dagger}f_{i\sigma}$ are represented by slave bosons $b_{i}$ carrying the charge and fermions $f_{i\sigma}$ representing the spin $\sigma$ with the constraint $\sum_{\sigma}f_{i\sigma}^{\dagger}f_{i\sigma}+b_{i}^{\dagger}b_{i}=1$\cite{Brinckmann1999}. In mean-field theory, bosons condense $b_{i} \rightarrow \langle b_{i} \rangle=\sqrt{x} $ with $x$ the hole concentration. The mean-field Hamiltonian is then expressed in momentum space as \begin{eqnarray} H=\sum_{k}\psi _{k}^{\dagger }\left( \begin{array}{cccc} \varepsilon _{k} & -iD_{k} & \Delta _{k} & 0 \\ iD_{k} & \varepsilon _{k+Q} & 0 & -\Delta _{k} \\ \Delta _{k} & 0 & -\varepsilon _{k} & -iD_{k} \\ 0 & -\Delta _{k} & iD_{k} & -\varepsilon _{k+Q \end{array \right) \psi _{k}\text{,} \label{SE4} \end{eqnarray} where $\psi _{k}=\left( f_{k\uparrow }\text{ }f_{k+Q\uparrow }\text{ f_{-k\downarrow }^{\dagger }\text{ }f_{-k-Q\downarrow }^{\dagger }\right) ^{T}$ with $Q=\left( \pi \text{, }\pi \right) $ being the antiferromagnetic wave vector. $\varepsilon _{k}=-2\left( xt+V_{d}\chi \right) \left( \cos k_{x}+\cos k_{y}\right) -4xt^{\prime }\cos k_{x}\cos k_{y}-2xt\left( \cos 2k_{x}+\cos 2k_{y}\right) -\mu $ with $t$, $t^{\prime }$, and $t^{\prime \prime }$ being the nearest-, next-nearest-, and third-nearest-neighbor hopping constants, respectively. $D_{k}=2V_{d}D \cos k_{x}-\cos k_{y})$, and $\Delta _{k}=2V_{c}\Delta (\cos k_{x}-\cos k_{y})$. The summation is restricted in the magnetic Brillouin zone. The order parameters can be self-consistently determined by minimizing the free energy \begin{eqnarray} F&=&-\frac{2T}{N}\sum_{k,\eta =\pm }^{\prime }\ln (2\cosh \frac{\beta E_{k}^{\eta }}{2})-\mu(1-x) \nonumber\\ &+&(4V_{d}\chi ^{2}+4V_{d}D^{2}+4V_{c}\Delta ^{2})\text{.} \end{eqnarray} Here $E_{k}^{\eta }=\sqrt{\left( \xi _{k}^{\eta }\right) ^{2}+\Delta _{k}^{2}}$ with $\xi _{k}^{\eta }=\left( \frac \varepsilon _{k}+\varepsilon _{k+Q}}{2}\right) +\eta \sqrt{\left( \frac \varepsilon _{k}-\varepsilon _{k+Q}}{2}\right) ^{2}+|D_{k}|^{2}}$ ($\eta =1$ and $-1$ for upper and lower band, respectively) is obtained by unitary transformation with the $4 \times 4$ matrix $U_{k}$ \cite{yuan2006}. When the incommensurate DDW order is included, the phase boundary is determined by the charge order instability under the random phase approximation (RPA). The RPA charge susceptibility for DDW is \begin{equation} \chi_{RPA}(i\nu,q)=\frac{\chi_{0}(i\nu,q)}{1-(\frac{J}{4}+\frac{V}{2})\chi_{0}(i\nu,q)}. \end{equation} Here, the bare charge susceptibility for DDW is $\chi_{0}(\tau,q)=\langle T \rho_{q}(\tau)\rho_{q}^{\dagger}(0) \rangle_{0}$ with $\rho_{q}(\tau)=\sum_{k\sigma}i(\sin(k_{x}-\frac{q_{x}}{2})-\sin(k_{y}-\frac{q_{y}}{2}))f_{k+q\sigma}^{\dagger}(\tau)f_{k\sigma}(\tau)$. The charge instability is therefore judged from the divergency of the RPA charge susceptibility at zero frequency, yielding the simple criterion of $\mathcal{D}(q)=1-(\frac{J}{4}+\frac{V}{2})\chi_{0}(0,q)=0$ with $\mathcal{D}(q)$ the denominator at zero frequency. Here, $q=(\pi,\pi-\delta q)$ with $\delta q=0$, and $\delta q\ne 0$ for the commensurate, and incommensurate DDW, respectively. \begin{figure}[tbp] \center \includegraphics[width=\columnwidth,clip=true,angle=0]{Fig12-incom.eps} \caption{(a) The denominator of RPA DDW charge susceptibility $\mathcal{D}(q)$ with different parameters. (a) $t^{\prime}=0$, $t^{\prime\prime}=0$, $J=0.3$ and $V=0.15$; (b) $t^{\prime}=-0.35$, $t^{\prime\prime}=0$, $J=0.3$ and $V=0.15$; and (c) $t^{\prime}=-0.25$, $t^{\prime\prime}=0.1$, $J=0.3$ and $V=0.12$. The temperature is fixed at $1\times 10^{-4}$.} \label{SF} \end{figure} Fig.~\ref{SF} shows some relevant results at low enough temperature. The data containing only the nearest neighbor hopping is shown in Fig.~\ref{SF}(a). The instability of the commensurate DDW order occurs at doping density about $x=0.123$ where $\mathcal{D}(q)=0$ with $dq=0$. In comparison, the incommensurate DDW instability occurs at about $x=0.135$ with $dq\sim0.1\pi$ (also see Fig.~\ref{F45}(c) in main text). This is well consistent with the previous results obtained by large-N expansion in absence of superconductivity\cite{bejas2012}, manifesting the existence of the incommensurate DDW order. It had been shown that the incommensurate DDW order is strongly weakened by introducing the next-nearest neighbor hopping\cite{bejas2012} (Fig.~\ref{F45}(b) in main text). Furthermore, the incommensurate DDW order may be further suppressed by SC as shown in Fig.~\ref{SF}(b) (Also Fig.~\ref{F45}(d)), no instability of the incommensurate DDW state is found when the superconductivity is included. The DDW instability in the SC state with the parameters presented in the main text is shown in Fig.~\ref{SF}(c), only the commensurate DDW instability occurs at about $x=0.135$. The spectral function $A(k,\omega ) =-\frac{1}{\pi }\Im G^{11}(k,i\omega _{l}\rightarrow \omega +i\Gamma )$ is calculated with the Matsubara Green function \begin{equation} G^{nm}(k,i\omega _{l})=\sum_{j=1}^{4}\left( U_{k}\right) _{nj}\frac{1} i\omega _{l}-E_{k}^{j}}\left( U_{k}^{\dagger }\right) _{jm} \end{equation} The Raman response is described by the following Matsubara correlation function \cite{lu2007} \begin{equation} R_{\gamma }(q,\tau )=-\left\langle \mathrm{T}\rho _{\gamma _{k}}(q,\tau )\rho _{\gamma _{k}}(-q,0)\right\rangle\text{,} \end{equation where $\rho _{\gamma }(q,\tau )=\sum_{k}f_{k+q/2}^{\dagger }(\tau )\gamma _{k}f_{k-q/2}(\tau )$ with the vertex $\gamma _{k}=\frac{1}{2}(\frac{\partial ^{2}\varepsilon _{k}}{k_{x}^{2}}-\frac{\partial ^{2}\varepsilon _{k}} \partial k_{y}^{2}})$ for the B$_{1g}$ channel and $\gamma _{k}=\frac{\partial ^{2}\varepsilon _{k}}{\partial k_{x}\partial k_{y}}$ for the B$_{2g}$ channel. At the zero-momentum transfer $R_{\gamma }(0,i\omega _{l})$ corresponds to what ERS experiments measure \begin{equation} R_{\gamma }(0,i\omega _{l})=\sum_{k,n,m}\frac{f(E_{k}^{n})-f(E_{k}^{m})} i\omega _{l}+E_{k}^{m}-E_{k}^{n}}\vert(\text{\textrm{U}}_{k}^{\dagger \boldsymbol{\gamma }_{k}\mathrm{U}_{k})_{nm}\vert^{2} \end{equation} with $f(E_{k}^{n})$ the Fermi-Dirac function. \subsection{Renormalized mean-field theory} The renormalized mean-field theory (RMFT) projects the Hamiltonian by Gutzwiller factors. The expectation value of the projected Hamiltonian is \begin{eqnarray} \langle H \rangle&=&-\sum_{ij\sigma}g^{t}t_{ij} \langle \chi +iD\rangle -\mu\sum_{i\sigma}\langle n_{\sigma}\rangle\nonumber\\ &-&2[(\frac{1}{2}g^{xy}+\frac{1}{4}g^{z})J-V]\sum_{\langle i,j\rangle}\langle \Delta\rangle\langle \Delta\rangle^{*}\nonumber\\ &-&2[(\frac{1}{2}g^{xy}+\frac{1}{4}g^{z})J+V]\sum_{\langle i,j\rangle}(\chi+iD)^{*}(\chi+iD)\nonumber\\ &+&g^{z}J\sum_{\langle i,j\rangle}\langle m_{i}\rangle \langle m_{j}\rangle\text{,} \end{eqnarray} where $\chi$, $D$, $\Delta$ and $m$ are variational parameters (their sign rules are the same as those specified in the last subsection). $g^{t}$, $g^{xy}$, $g^{z}$ are the Gutzwiller factors for hopping, transverse and longitudinal spin-exchange terms, respectively. The expectation value of an operator $O$ in the projected state is $g^{O}\langle O \rangle$ with $\langle O \rangle$ is the expectation value in the unprojected state and $g^{O}$ is the Gutzwiller factor for operator $O$. Here, $g^{\Delta}=(g^{t})^{2}$, $g^{m}=\sqrt{g^{z}}$, $g^{\chi,D}=g^{t}$. In fact, the simplest Gutzwiller approximation \cite{zhang1988} does not reproduce the results obtained by variational Monter Carlo method. For example, the resulting antiferromagnetic state extends to high doping density. It can be improved by taking the feedback effect of the order parameters into account \cite{ogata2003,yang2009}. The modified Gutzwiller factors are \begin{eqnarray} &g^{t}(i,j)=\frac{2x}{1+x}\nonumber\\ &g^{xy}=g^{z}=\left( \frac{2}{1+x} \right)^{2}a^{-7}\text{,} \end{eqnarray} where $a=1+\frac{4X}{(1-x^{2})^{2}}$ with $X=2x^{2}(\Delta^{2}-|\chi+iD|^{2})+2(|\chi+iD|^{2}+\Delta^{2})^{2}$. At finite temperature, one should minimize the free energy $F=\langle H \rangle -TS$ instead. $\langle H \rangle$ is straightforward by using finite temperature Wicks theorem. $S=S_{0}+\delta S$ with $S_{0}=-\sum_{n}[f(E_{n})\ln f(E_{n})+(1-f(E_{n}))\ln (1-f(E_{n}))]$ is the entropy in the mean-field trial state, $f$ is the Fermi-Dirac distribution function, and $\delta S$ is the entropy which losses under projection as \cite{wang2010} \begin{equation} \delta S=-N\left( x\ln \frac{4x}{(1+x)^{2}+4m}+(1-x)\ln\frac{2(1-x)}{1-x^{2}+4m} \right). \end{equation} For the nonmagnetic case, $\delta S$ is temperature independent and thus can be ignored.
\section{Introduction} \begin{figure}[hbtp!] \centering \includegraphics[width=0.48\textwidth]{mm2.pdf} \caption{Bright Man's stage from \textit{Mega Man 2}. \textit{Mappy} handles rooms and arrangements of arbitrary size.} \label{fig:MM2} \end{figure} The production of game maps---both of local, scrolling rooms and the global structure that links those rooms together---is of interest to the general game-playing audience and has applications to general videogame AI and to data-driven procedural content generation. Human players need, create, and make use of maps to improve their play. Players track locations in their heads, draw informal maps, and in some cases capture screenshots and meticulously compose them into game world atlases. Many games, including action-adventure games like \emph{Metroid} or \emph{The Legend of Zelda}, essentially compose together two distinct games: an action game of dodging and attacking played at sixty frames per second, and an adventure puzzle game in which the game map forms a graph search problem. In this latter game, players engage in activities such as retrieving items from one room to open another room's exit, returning to suspicious locations to see what new opportunities have opened up, and collecting supplies before proceeding to a boss monster. AI game-playing agents that do not remember both high-level map structures and sufficient low-level details of each room cannot hope to formulate plans like these on their own. Clean, complete maps of game worlds (including the ways in which they might change due to player actions) are also integral to research in automatically learning game rules~\cite{summerville2017what} and to data-driven procedural content generation~\cite{DBLP:journals/corr/SummervilleSGHH17}. In this paper we describe \emph{Mappy}, a partial solution for automatically mapping certain classes of Nintendo Entertainment System (NES) games (see Fig.~\ref{fig:MM2} for an example of a map made by \emph{Mappy}). We choose to work with the NES because it is extremely well-known, it has a large and diverse set of supported games, there are well-annotated corpora of recorded input sequences including speed-runs, efficient emulators are readily available, and the NES hardware exposes several useful high-level features which facilitate automatic mapping. The techniques we detail here could readily be extended to other tile-based rendering systems including the Super NES. To apply our approach to other game platforms, software renderers would need to expose information about the tilemap being drawn for the lower-level feature extraction and the data representation to be applicable. We also consider only games without modal menus or other non-spatial uses of tiles. Specifically, we assume that a (given) sub-rectangle of the screen is \emph{scrolling} and all other regions of the screen can be safely ignored. \section{Related Work} \subsection{Manual Mapping} While there are several online communities at work producing full maps of games, this process is laborious and largely manual. Ian Albert says of his process for extracting \emph{Super Mario Bros.} maps: \begin{quotation} ...these maps were created using FCEU, a free Nintendo emulator for Windows. I used the ROM image for the \emph{Mario/Duck Hunt} version of the game. Screen captures were tediously pieced together in Photoshop. Some text was reproduced using the \emph{Press Start} font by codeman38, which emulates the same font used in \emph{SMB}. Some Game Genie codes were used to make mapping easier... the maps should not be any different due to the use of these codes.~\cite{ian_albert_smb} \end{quotation} This workflow requires that a human play through the game, fully test the level (discovering any hidden objects), and periodically take screenshots. This is only the beginning of the tedious effort involved: at this point, the screenshots must be checked for accuracy (if the level can be changed by player activity they might fall out of sync with each other), and failures here could force the mapper to re-do sections of play. Next, the screenshots must be stitched together in an external piece of software and any dynamic objects like game characters must be removed. Finally, all of this must be annotated with semantic information including how the rooms are connected via discrete links! Every step of this process is time-consuming and error-prone. Furthermore, due to the ``cheats'' being used, there is no guarantee that the map is truly faithful to the original. They seem safe for this example, but that does not mean that a different game with different (but similar) cheats might not subtly alter the map (leading to an inaccurate map). While the map produced by this work supports human interpretation, it requires further human intervention before a machine can effectively process it. This is due to the image-based format, which requires manual annotation of mechanical properties using an \emph{ad hoc} visual language requiring an understanding of game-specific rules. For example, Albert uses a visual shorthand of putting a mushroom icon above a block tile to denote that the block in question contains a mushroom. The actual visual depiction is something that would never be seen in the game (if the mushroom had appeared, the block would not still be a question mark or brick tile), but is read easily by humans. Similarly, links between maps (between, say, Level 1-1 and the hidden room found by entering the fourth pipe) are depicted with writing on the image. In both cases, these annotations would have to be written in a machine-readable form to be processed by a computer, or the computer would have to be ``taught'' how to read the image so as to disambiguate mechanical properties from the spatial map. Although many games have been mapped, quality and standards vary significantly from mapper to mapper. Some mappers produce just the tile backgrounds, while others include the position of all game characters, while others still show hidden mechanical properties. For some games, there are multiple maps where each describes one such component, but no single map holds all of the relevant information (e.g.\ the \emph{Link's Awakening} maps available at the website Zelda Elements~\cite{linksAwakeningZeldaElements} do not show the contents of treasure chests but do show all characters, while those at VGAtlas~\cite{linksAwakeningVGAtlas} show the full treasure chests but no characters). \subsection{Map Extraction} The shortcomings of manually-produced maps make them unsuitable for some applications---for example, unpopular or hard-to-find games are not likely to have high-quality manually-created maps, and these maps' purely visual representation can make them difficult for automated systems to process. Extracting maps automatically could circumvent such issues; this is an area of interest for game fan communities as well. Enthusiasts who want to \emph{modify} a game's maps and other internal data must first be able to identify and extract the game's built-in maps. This requires detailed, game-specific information about how the map data are stored and encoded. For games that are routinely modified in such a way, the map formats become a kind of common knowledge; these communities even produce polished software tools to automate the process of viewing and editing maps. The main games addressed in the present work (\emph{Super Mario Bros.}, \emph{The Legend of Zelda}, and \emph{Metroid}) all have well-understood map formats reverse-engineered from examining source code and memory locations at runtime. Some games---for example, \emph{Doom} and its successors---define their levels in standalone data files (sometimes wrapped up in larger archives, as in \emph{Doom's} WAD format). \emph{Doom's} active fan community developed tools to extract these maps and, later, re-pack them to replace the original game's levels. On the other hand, \emph{Metroid} and \emph{Super Metroid's} levels are only partially defined by bytes of data; the remainder are produced at runtime by an algorithm which is somewhere between decompression and procedural content generation~\cite{metroidLevelFormat}, and these levels can only really be seen accurately by dynamic analysis: watching the game being played over time (or, equivalently, simulating its code to produce the output levels). This obviously complicates the automatic extraction of maps, but it can still be done on a game-by-game basis with extensive effort. Static analysis can produce superior maps for those sets of map features where the program's use of the data is well-understood, and once it works for a given game it can work for all games that use the same internal data formats (including modifications of the game). It can also support games that generate their levels procedurally, since the generation algorithm can be reverse-engineered and fed with different seeds to enumerate possible maps. Unfortunately, this requires a lot of deep knowledge both of the game's platform and each individual game's machine code. Some of these limitations can be overcome if the game's runtime memory format is well-understood. Extant map extraction schemes for \emph{Dwarf Fortress} based on the \emph{dfhack} tool analyze the game's memory structures to pull out complete maps; this hybridizes static and dynamic analysis. Conversely, dynamic map analysis can be done just from video as in work by Guzdial~\cite{guzdial2016game}, but it is hard to learn linking structure without control information (see Sec.~\ref{sec:links}). Guzdial's work associates video frames together into ``chunks'', but it is difficult to know exactly the relationship between these chunks and the levels that they are derived from, as their work finds approximately 47 chunks per level. Their work also relies upon human annotated spritesheets with game-specific prior knowledge to correctly identify tiles and sprites. Many approaches to automatic game playing result in the construction of internal maps based on the agent's sensory data. Rog-o-matic~\cite{rogomatic} constructed three separate maps (an object map, a terrain map, and a room-cycle loop map) which it reasoned over while playing \emph{Rogue}. Golovin~\cite{golovin} is an interactive fiction playing agent that constructs a map of the world as it travels. While their game world is depicted as text instead of a graphical representation, it shares some of the same challenges we encounter---namely that a location's depiction might change over time and that multiple locations might share the same depiction. We note that for these and other game playing agents, map-building is merely an intermediate by-product and not the system's intended output. Furthermore, these (often special-purpose) approaches typically only require a map to be good enough to guide play, not to be a definitive artifact usable for other purposes. To summarize the above concerns: automatic map extraction from game data files requires laborious case-by-case reverse engineering. Doing the same for games that use procedural content generation additionally requires understanding either or both of the game's code and its runtime memory storage formats. \emph{Mappy} does not require any of this reverse engineering effort, at the same time avoiding the problems of purely video-based techniques by having some knowledge about game \emph{platforms} (in this case the NES), as opposed to specific games. \subsection{VGLC} Because gathering game level data has so many complexities, Summerville \emph{et al.}\ assembled the \emph{Video Game Level Corpus} (VGLC)~\cite{summerville2016vglc}. The VGLC, as of publication time, archives and adapts levels from 12 games into three different map formats. Some of the highest-quality maps in the corpus were assembled from static analysis (the WAD files for \emph{Doom} and \emph{Doom 2}). Unfortunately, this approach cannot extend the VGLC very quickly because static level extraction tools are game-specific and difficult to produce. Half of the games in the overall corpus were added completely by hand-annotation. The remaining four games' maps were obtained by a mixture of human and computer annotation. Specifically, Summerville \emph{et al.}\ used template matching to combine a picture of a game map (assembled manually as above) with a human-annotated set of tile types to derive a complete semantic tilemap. The VGLC proposed three file formats for standardization, of which \emph{Mappy} could be used to generatexs the tile- and graph-based formats. The tile-based format represents levels as a $W \times H$ matrix, where $W$ is the width and $H$ is the height of the level. Each element of the matrix is represented as an UTF-8 character. Along with each level file, there is a \texttt{legend} JSON file that denotes the semantic meaning of each character (e.g.\ \texttt{-} is empty and \texttt{X} is solid). The graph based format adapts the DOT graph description language to represent rooms (nodes) and doors (edges) between them. \emph{Mappy} targets the tile-based format for individual rooms and tracks the linkages between rooms using the graph-based format. \section{Mappy} \emph{Mappy} is designed to work on games where an \emph{avatar} moves around a large \emph{world} broken up into smaller \emph{rooms}. This covers significant aspects of a broad class of games including platformers, action-adventure games, and role-playing games. We based this view of the world on these games' usual composition of four \emph{operational logics}~\cite{wardrip-fruin2005playable,osborn2017refining}: \emph{collision logics}, which describe spaces made up of distinct objects which can touch each other and possibly block each other's movement; \emph{linking logics}, which define larger conceptual spaces including connected rooms and the transit between them; \emph{camera logics}, which account for the fact that the visible part of the world is a window onto a larger contiguous world; and \emph{control logics}, which map e.g.\ button inputs to in-game actions. Operational logics combine abstract processes (collision detection and restitution, the movement of the player between discrete spaces, the selective drawing of a sub-region of the whole level, or conditional control of the player character) with strategies for communicating these processes to players (tiles and sprites, scrolling or screen-fading to change rooms, continuous smooth scrolling, and ignoring input during cutscene-like segments such as switching rooms). We find that operational logics provide useful inspiration for knowledge representation and inductive bias; they help structure intuitive observations about how games function in a way that is amenable to automation. The following sections expand on the leverage we get from operational logics as a knowledge representation. In its current form, \emph{Mappy} takes as input a playthrough of a game and the game program, then runs an NES emulator on that program and observes the system's state over time. \emph{Mappy} watches a portion of the screen for changes; this screen rectangle is currently given in advance, but it could be determined automatically in the future. At each timestep, \emph{Mappy} determines what tiles are visible on the screen, whether the screen is scrolling and if so by how much, and whether the player currently has control over the game (through speculative execution of inputs). \emph{Mappy} accumulates a map of the current room as the game is played: when \emph{Mappy} sees a new part of a room, it adds those tiles to that room's map. If a tile in a room changes, \emph{Mappy} also notes that the tile has changed, storing a history of each coordinate's contents over time. This is important for capturing e.g.\ breakable blocks in \emph{Super Mario Bros.}\ or collapsing bridges. \emph{Mappy} also watches for cases when the player might be moving between rooms and starts on a new map when the move is complete. Finally, \emph{Mappy} analyzes the rooms it has seen and suggests cases where two witnessed rooms might actually be the same room so that a human may choose whether to merge them together. \subsection{NES Pragmatics} \emph{Mappy} works on NES games because that platform's hardware explicitly defines and supports the rendering of grid-aligned tiled maps (drawn at an offset by hardware scrolling features) and pixel-positioned sprites. The NES implements this with a separate graphics processor (the \emph{Picture Processing Unit} or PPU) that has its own dedicated memory defining tilemaps, sprite positions (and other data), color palettes, and the \(8 \times 8\) patterns which are eventually rasterized on-screen. During emulation, \emph{Mappy} can directly read the PPU memory to access all these different types of data; we briefly describe the technical details below (referring the interested reader to~\cite{nesdev}). Although the PPU has the memory space to track 64 hardware sprites at once, there are two important limitations that games had to contend with: first, each sprite is \(8 \times 8\) pixels whereas game objects are often larger; and second, the PPU cannot draw more than eight hardware sprites on the same \emph{scanline} (screen Y position). This means that sprites are generally used only on objects that \emph{must} be positioned at arbitrary locations on the screen. Static geometry, including background and foreground tiles, are not built of sprites but are instead defined in the \emph{nametables}, four rectangular \(32 \times 30\) grids of tile indices; these four nametables are themselves conceptually laid out in a square. Since the PPU only has enough RAM for two nametables, individual games define ways to mirror the two real nametables onto the four virtual nametables (some even provide extra RAM to populate all four nametables with distinct tiles). On each frame, one nametable is selected as a reference point; when a tile to be drawn is outside of this nametable (due to scrolling) the addressing wraps around to the appropriate adjacent nametable. Note that many game levels are much wider than 64 tiles---the game map as a whole never exists in its player-visible form in memory, but is decompressed on the fly and loaded in slices into the off-screen parts of the nametables as the player moves around the stage. \emph{Mappy} remembers all the tiles that are drawn on the visible part of the screen, filling out a larger map with the observed tiles and updating that map as the tiles change. A \emph{Mappy} map at this stage is a dictionary whose keys are a tuple of spatial coordinates (with the origin initially placed at the top-left of the first screen of the level) and the time points at which those coordinates were observed, and whose values are \emph{tile keys}. A tile key combines the internal index used by the game to reference the tile with the specific palette and other data necessary to render it properly (from the attribute table and other regions of NES memory). After \emph{Mappy} has determined that the player has left the room (see Sec.~\ref{sec:links}), the map is offset so that the top-left corner of its bounding rectangle is the origin and all coordinates within the map are positive; this is rasterized and output as an image. We thereby construct the level as it is seen from the perspective of (tile-based) collision logics: the (mostly) static geometry and its (semantically significant) visual appearance over time. We learn the full history of every tile, rather than committing to its initial or final appearance, for four main reasons. First, during scrolling, stale tiles are regularly replaced with fresh ones, and in some games this can even happen at the edges of the screen causing visible glitching. Second, we often fade into or out of rooms (or perform some other animation), and just taking the first- or last- seen tile could lead to unusable maps. Third, many tiles animate during play (for example, ocean background tiles or glittering treasures). Finally, the player can interact with many tiles: switches can be flipped, blocks can be broken, walls can be bombed, and so on. So we must store all the versions of a tile to admit applications like learning tile animations or interactions. For rasterization and visualization, we generally pick the tile's appearance $25\%$ of the way into its observed lifespan, but this is an arbitrary choice and the generated maps are mainly for human viewing. A more principled choice might be to take the most common form the tile took during its lifespan. While in general the nametables are used for terrain and the hardware sprites are used for game characters, there are some exceptions. Large enemies that do not animate much are often built from background tiles (as in some \emph{Mega Man} bosses and \emph{Dragon Quest} enemies); moving platforms act as terrain but generally must be implemented as sprites. Objects like movable blocks in \emph{Zelda} or breakable bricks in \emph{Super Mario Bros.}\ are tiles most of the time, but temporarily turn into sprites when interacted with so that they can animate smoothly off of the tile grid. \emph{Mappy} does not account for these special cases yet. Because some important level objects are sprites and not tiles, we also hope to learn the initial placements of dynamic game objects in the larger map. \emph{Mappy} identifies abstract game objects by observing hardware sprites over time using the sprite tracker described in~\cite{summerville2017mechanics}. This system uses information-theoretic measures to merge adjacent hardware sprites into larger game objects and maintains object identity across time using maximum-weight matchings of bipartite graphs (object identity and positioning in 2D space are natural conclusions to draw from collision logics). For \emph{Mappy}, we take the first-witnessed position of each object, register those coordinates relative to level scrolling (explained in the next section), and render its constituent sprites into our level maps to capture, for example, that a mushroom pops out of a particular question-mark block. \subsection{Scrolling} Although the PPU features hardware scrolling, and (some) of this information persists in the PPU's hardware registers, capturing screen scrolling information is surprisingly subtle. Games can alter the hardware scrolling registers essentially at any time during rendering, to achieve for example split screens or static menus over scrolling levels (the NES does not support layered rendering, unlike the Super NES). \emph{Super Mario Bros.}\ and its sequels draw the top part of the screen containing status and score information without scrolling, and then turn scrolling on for subsequent scanlines. \emph{Super Mario Bros.\ 3} puts status information on the \emph{bottom} of the screen as well, so only a small window of the larger screen scrolls. These are concrete examples of camera logics, where a portion of the screen is dedicated to a viewport backed by the illusion of a moving camera. As mentioned above, we register the visible part of the level in a larger tilemap, under the assumption that a rectangular viewport will view a rectangular region of a potentially larger space. \begin{figure} \includegraphics[width=0.22\textwidth]{screen.png} \includegraphics[width=0.22\textwidth]{ntram.png} \caption{Visible screen registered with PPU nametables. Note vertical mirroring and horizontal wrapping.} \label{fig:ntas} \end{figure} We could have obtained pixel-precise scrolling information by instrumenting the emulator to trace when hardware scrolling state changes, but we wanted to see how far we could get without such interventions to remain as general as possible. We deploy two techniques, each with their own strengths and weaknesses: a perceptual algorithm based on registering each frame's visual output with the previous frame's and a hybrid approach which registers only the current frame's visual output (converted to grayscale) with the PPU's four nametables to determine which rectangular sub-region of the larger tilemap is being shown (see Fig.~\ref{fig:ntas}). The former technique can break down with animated backgrounds (for example, waterfalls), while the latter will fail if the perceived scrolling is done mainly by sprites rather than background tiles, as in certain boss fights in \emph{Mega Man 2}---this would also be an issue if we tracked hardware scrolling with the instrumentation described above. In either case, once \emph{Mappy} has precise scrolling information it can convert coordinate spaces from the subset of tiles drawn on the screen into the frame of reference of the larger map it is assembling. \subsection{Linked Rooms} \label{sec:links} \begin{figure} \centering \includegraphics[width=0.48\textwidth]{Metroid.pdf} \caption{The first four rooms from \emph{Metroid}. Note that we only observed a small portion of room $1$, which is actually another tall vertical corridor.} \label{fig:metroid} \end{figure} In this work we want to learn not only one large tilemap, but the graph structure by which smaller rooms are linked together (game worlds are not in general planar or even Euclidean). To do this, we need to determine when the player leaves one contiguous space for another. We consider two main ways in which linking logics communicate room changes to players: \begin{itemize} \item Smoothly scrolling between connected rooms \item Teleporting between rooms \end{itemize} The first type of transition is the most common type in \emph{The Legend of Zelda} and \emph{Metroid} (see Fig.~\ref{fig:metroid}). In these games, when traversing between most rooms the player loses control for a period of time while the screen rapidly but smoothly scrolls completely into the new room. After the player regains control, they are in a new room. To test for this type of transition we must know for each frame whether the screen is scrolling and whether the player has control; we already know about scrolling, so we use the savestate features of the emulator to determine whether the player has control. The central question of player control is: ``Would the world have been different if the player had done something else?'' Because we know the full input sequence we can look a few moves ahead to see how the world will evolve according to the playthrough; we automatically take a screenshot of that state for reference. Next, we simulate seven possible futures (one for each button besides ``start'') three frames ahead and compare a screenshot taken in each of those eventualities against the reference state. If these actions produce different outcomes than the reference, then the player must have control at the initial frame. In many games, some animations enacted by the player implicitly remove player control for some period of time (e.g.\ the fixed length jumps in \emph{Castlevania}), so we have a configurable parameter for how long control must be taken away before counting as a complete loss of control. Since most room transitions take at least one or two seconds, and most in-game animations remove control for less time than that, this allows for a clean separation of the two causes for losing control. Of course, it is conceivable that the player does not have control but is not entering a new room, so we stipulate that the screen must also be scrolling while control is lost (and, indeed, that it must have scrolled by at least half the scroll window width/height). This accounts for freeze frame animations such as when Mario acquires a mushroom and grows or the fanfare that plays when Samus acquires a new item, which show a loss of control but the screen stays stationary. The second category of spatial transition above places the player in a new room that has little or no visual relation to the previous room, perhaps from descending a staircase or going down a pipe. We treat these by looking at the overall appearance of the game screen, and if it changes too drastically within a short timeframe we assume that the player has probably teleported to a new room. This is complicated by game levels that incorporate drastic sudden changes to the visible portion of the tilemap (such as the ``dark storm'' level in \emph{Ninja Gaiden} or Bright Man's stage in \emph{MegaMan 4}), which yield false positives where \emph{Mappy} thinks that it has gone to a different room. Given the optional room merging discussed below (and the possibility of stronger heuristics which we leave for future work), we do not believe that this is a fatal flaw. \section{Cleaning Up} \begin{figure} \centering \includegraphics[width=0.48\textwidth]{zelda_merge.pdf} \caption{Example room linkage detection and room merging step. Red numbers represent the order of traversal. Rooms that are believed to be identical are grouped together in blue boxes. It is up to the user to choose which rooms should or should not actually be merged.} \label{fig:room_merge} \end{figure} At this point, \emph{Mappy} has detected individual rooms and linkages between them, but it assumes that every link leads to a brand new room. In most games, at least some links are two-way or converge on the same destinations---most game worlds form a graph and not just a tree. We could simply merge rooms that look identical to each other, but there are numerous cases where this might fail. For instance, there are rooms in \emph{The Legend of Zelda} that have identical tilemaps but are in fact different rooms. There are also instances with more complex mechanics at play: in \emph{Zelda's} ``Lost Woods'', the player moves through a sequence of identical-looking rooms and must use the correct door in each of those rooms or return to the first room in the sequence. We do not expect to be able to automatically cover all such cases since in the end room connections are defined in opaque game programs and we cannot hope to address every possibility. We therefore leave it up to a human analyst to select which rooms should or should not be merged. \emph{Mappy} provides suggestions based on overall similarity; in Fig.~\ref{fig:room_merge}, \emph{Mappy} is largely correct (though it misses the fact that $1$, $2$, and $3$ are the same room) and the final map should consist of the merged rooms $(0, 4, 8), (1, 2, 3), (5), (7, 9), (6, 10), (11), (12), \text{ and } (13)$. \begin{figure} \centering \includegraphics[width=0.48\textwidth]{mario.pdf} \caption{The first 4 levels extracted from \emph{Super Mario Bros.}; Level 1-1 is comprised of rooms 1, 2, and 3.} \label{fig:mario} \end{figure} Note that there are important candidate merges \emph{Mappy} does not detect. For instance, we currently have no method to detect returning to a different part of the same room. Fig.~\ref{fig:mario} shows an example where the player takes a warp pipe (from room $1$) to a bonus room (room $2$) and then emerges later in the level (room $3$). The correct map would show that the first room and the third are actually two parts of one larger room; but even a human player must explore multiple paths through the level to determine this. In the future we intend to use computer vision techniques (e.g.~\cite{mann1993compositing,ward2006hiding}) to merge the results of multiple play traces, so as to be able to fully map segments of a game that are mutually exclusive or are not likely to both appear in the same traversal. \begin{figure*} \centering \includegraphics[width=0.96\textwidth]{zelda_dungeon.pdf} \caption{\emph{Zelda} through the completion of Dungeon 1. The player (one of the authors) made numerous mistakes resulting in deaths (the cluster of black screens in the middle) which teleport the player to the beginning of the dungeon.} \label{fig:zelda_d1} \end{figure*} \begin{figure*} \centering \includegraphics[width=0.96\textwidth]{zelda_tas.pdf} \caption{\emph{Zelda} up to Dungeon 3, showing a map which is \emph{true} but not \emph{reasonable}.} \label{fig:zelda_tas} \end{figure*} We do not yet have a pleasant user interface for this manual merging process, but we imagine a possible UI closely tied to the visualizations provided in this paper. A human analyst confronted with a map like Fig.~\ref{fig:zelda_d1} might begin by merging obviously identical rooms according to \emph{Mappy's} suggestions. Selecting a cluster (e.g.\ $(0,4,5)$) by clicking on it and then hitting return (or double-clicking on the border of the cluster) would collapse these rooms into one, merging the links in and out at the same time. Next, the two clusters in the top-left corner are actually the same room---but the use of background tiles to render text (combined, perhaps, with loss of control when obtaining the sword) has confused \emph{Mappy}. Our hypothetical analyst could shift-click to select both those clusters and hit return to merge them into one, and then double-click the blue border of that cluster to combine it into a single room. Finally, the treasure rooms of most dungeons in the \textit{Legend of Zelda} look nearly identical. A user could split apart a candidate suggestion by shift-selecting individual rooms of one or more clusters and then hitting return to pull them into their own combined clusters (multiple clusters could simultaneously be combined in the same way, or a combination of clusters and rooms). In this way, individual treasure rooms or other similar-looking rooms could be kept separate. The images shown in this paper visualize the first appearance of every game object (with the sprite image it appeared as at that time), but we are really only interested in game objects that are arranged as part of the level. In \emph{Super Mario Bros.}, we do not want the \texttt{100}-point indicators; in \emph{Metroid} we do not want Samus's shots or the powerups dropped by defeated enemies. Because figuring out which game objects appear because of the evolution of game rules and which sprites appear as part of the level is not a well-defined problem (consider the mushrooms or stars coming out of question-mark blocks), we leave it to human intuition; However, we intend to resolve this in future work, perhaps leveraging techniques for learning game rules~\cite{guzdial2017ijcai} or interactions~\cite{summerville2017what}. We do not yet provide a graphical user interface for indicating game objects to exclude from the map; currently we remove unwanted game objects by examining their appearance and then eliminating the corresponding tracked game objects from future processing. \section{Discussion} \emph{Mappy} makes several structuring assumptions about games and play, and it is informative to explore where and how these break down. We have already discussed limitations in scrolling detection and room merging, but there is another important assumption which has not been addressed yet: \emph{Mappy} implicitly assumes it is observing \emph{natural} play where a human explores the game in the way intended by designers and programmers. Here it is useful to distinguish \emph{true} maps from \emph{reasonable} ones. We call maps that accurately reflect game code \emph{true}, even if they are inconsistent with players' expectations of the game's design. A \emph{reasonable} map is one that matches these expectations but might be unfaithful to the source code (e.g.\ the maps from Zelda Elements mentioned above). Comparing Figs.~\ref{fig:zelda_d1} and~\ref{fig:zelda_tas} showcases this distinction. The former is a natural play of the game; but in the latter, a tool-assisted speedrunner utilizes multiple glitches to take an optimal (not at all natural) path. The first is the so-called ``Up+A'' trick, which causes a soft reset of the game when the player enters the eponymous command on the second controller. This covers the transitions from $2$ (picking up the sword) to $3$ (the soft-reset screen) to $4$ (the player's initial location at game start). The second trick is ``Screen Scrolling'', which lets the player leave a screen and re-enter that same screen from the other side. This is how the player warps over the river in $6$ and (due to collision detection failing when inside an object) passes back through the same wall to room $7$. All this is allowed by the code of the game, and the \emph{true} map we collected captures the full behavior of that code; of course, this would be inappropriate for many of the use-cases we suggested in the introduction. A human or AI player would probably want a map that characterizes their understanding of the game world. A user feeding this map to a machine learning algorithm for design knowledge extraction would likewise want a map that conveys the intended (if not actual) progressions in the game. It is also interesting to consider that an optimal AI will find such ``secret passages'' while an AI that does semantic hierarchical planning (e.g.\ planning sequences of platforms or rooms to traverse) will probably not. That said, \emph{true} maps can be valuable to a game creator---particularly for highlighting areas where it differs from a \emph{reasonable} map e.g.\ for detecting bugs or sequence breaks. As for learning map data proper, one important aspect of links which we currently ignore is that links are embedded \emph{in space}. In other words, the player usually travels between rooms because the character stepped on a staircase or crossed between rooms. Right now we do not learn the embedding of the network of links into the tilemaps, but this is important future work. Notably, the same doorway might take the player to multiple different rooms (if, for example, certain game progress flags have been set) or the same room might be entered on the same side from multiple doorways (as in the Lost Woods). We see natural future work in extending the set of games which \emph{Mappy} can address both on the NES and on other platforms (including black-box games without the hints from dedicated graphics hardware). Many of our techniques will transfer readily, but some of the low-level feature extraction must be adapted to work with additional context or on different hardware, perhaps incorporating more techniques from computer vision. The NES has been productive for our uses, but we do occasionally run into quirks of the hardware that would be avoided with pure computer vision approaches---for example, different games can include custom wiring or even additional memory that our internal tile renderer must handle properly. We also want to extend \emph{Mappy} to find the scrolling sub-region of the screen automatically. This might be done by observing which portion of the screen seems to move around smoothly with respect to the whole viewport as the playthrough goes on; at any rate it is extremely important for games like \emph{The Legend of Zelda 2: The Adventures of Link}, where the top-down overworld screen has no status bar while the side-scrolling screens do. It is especially important to handle game \emph{modes}, including game-over and stage-start screens, battle versus field modes versus menus in role-playing games, and so on. This is complicated even in \emph{The Legend of Zelda} where the menu activates by smoothly scrolling down and effectively pauses the action on the part of the screen \emph{Mappy} should pay attention to. As mentioned earlier, \emph{Mappy} ought to analyze several play-throughs of a game to get more complete maps. We could even borrow techniques from undirected or curiosity-driven search~\cite{stanton2016curiosity,pathak2017curiosity} to reduce the need for human-provided play traces; this could take the form of automatic exploration off of the main branches given by provided traces or even fully automatic search. As an un-optimized prototype, \emph{Mappy's} runtime performance is acceptable but not great. Mapping out a minute of play (3600 frames) takes between five and six minutes, mainly due to the expensive scrolling detection and game object tracking. Obviously this is an area for improvement and we are actively exploring ways both to parallelize \emph{Mappy} and to bring down its constant factors. One easy way to increase the mapped frames per second (at the cost of missing short-lived tile changes) would be to only make map-related observations every few frames. Initial experiments here suggest that looking at every second frame is a good compromise that almost doubles the exploration speed without sacrificing too much accuracy; looking at every fifth frame roughly doubles the speed again but the results require postprocessing and cleanup to be made usable. This time skipping could also be made adaptive, taking longer steps when the visual appearance is not seen to change rapidly. Finally, we hope to track the \emph{provenance} of \emph{Mappy's} conclusions about maps. In other words, we would like to identify for a given link, map, game object position, or other observation what game state (or sequence of game states) witnessed that fact. This could help improve the quality of our conclusions---in some cases we may want to interpret a screen transition as indicating either a change in room \emph{or} merely a menu popping up, and tracking why we believe one or the other conclusion seems useful for optimally resolving the ambiguity. Provenance also could improve the experience of merging rooms: being able to click and load up a pair of similar rooms in an emulator could help an analyst decide if they are indeed the same room. Moreover, this magnifies the utility of search and retrieval over concepts like level fragments, linking structures, or which sprites appear in which rooms. We believe a database that admits querying for e.g.\ infinitely-looping hallways or Lost Woods-style trick dungeons could be useful for scholars of digital games as well as for data-driven PCG, and \emph{Mappy} points the way to building tools like that at the same time it helps improve the coverage of the VGLC. \bibliographystyle{ACM-Reference-Format}
\section{Introduction} In recent times, modelling techniques have shifted from a purely acceptance-based reasoning to one that takes various notions of weight and quantities into consideration. The theory of weighted automata gives rise to a flexible framework, where acceptance behaviour can be quantified in numerous ways. Probabilities are commonly used to express the likelihood of making a given transition, whereas the tropical semiring is often used to denote the cost of making a transition. Due to the great variety of semirings the theory of weighted automata can be applied to a multitude of different fields of interest, such as natural language processing, biology or performance modelling (see e.g. \cite{hwaDKV}). Typical questions regarding weighted automata concern their language (or traces), for instance language equivalence. Due to the generality of the notion of weighted automata, they are a versatile means for modelling purposes, though decidability results are not as strong as for non-deterministic automata. In particular, it is well-known that language equivalence is an undecidable problem for weighted automata over the tropical semiring \cite{Krob94theequality}. This, however, is not a damning result for language equivalence, since it is also well-known that language equivalence is decidable for many other semirings such as the two-valued Boolean algebra (for which weighted automata are just nondeterministic finite automata) or fields (where decision procedures run in polynomial time \cite{kmoww:language-equ-prob,b:weighted-bisimulation}). \textsc{Paws}\xspace \footnote{The tool can be downloaded from \texttt{www.ti.inf.uni-due.de/research/tools/paws/}} is a tool that offers algorithms to decide language equivalence and the threshold or universality problem for weighted automata. Based on our previous work in \cite{KK16} and \cite{bkk:up-to-weighted}, the tool \textsc{Paws}\xspace implements two different approaches to language equivalence checks for weighted automata. One approach employs a backwards search assuming at first that all states are language equivalent and exploring words from the end to the beginning to determine non-equivalent pairs of states, similar to partition refinement. Different from usual partition refinement algorithms, this algorithm does not necessarily terminate at the moment when the partitions cannot be further refined in one step, because refinements can happen at a later point of time. The termination condition has to be chosen differently here, and as expected, the algorithm does not necessarily terminate for all semirings (see the undecidability result by Krob \cite{Krob94theequality}). However, for many semirings it does and in either case it is always a suitable semi-decision procedure for the absence of language equivalence. This approach is closely related to the line of work started by Sch\"utzenberger, \cite{DBLP:journals/iandc/Schutzenberger61b} and later generalised in \cite{bls:conjugacy}, using the notion of conjugacy. Additionally, \textsc{Paws}\xspace offers a second approach to decide language equivalence \cite{bkk:up-to-weighted}, which stands in the tradition of Bonchi's and Pous' seminal work on equivalence checks for NFAs using up-to techniques \cite{bp:checking-nfa-equiv}. Here, a language equivalence relation on vectors is built, starting from the initial pair of vectors suspected to be language equivalent. As the algorithm progresses, it builds a relation on vectors similar to a bisimulation relation and stops at the moment when a suitable relation proving language equivalence is found, or a witness to the contrary appears. The algorithm works up-to congruence and therefore prunes the relation on-the-fly, dropping redundant vector pairs. The flexibility of this optimised variant of the algorithm is reduced when compared to the partition refinement algorithm, but it can still be used for a variety of user-generated semirings, such as rings and $l$-monoids, and can lead to an exponential speed up in some cases. Based on a similar approach, \textsc{Paws}\xspace also offers a decision procedure for the universality problem for weighted automata over the tropical semiring of the natural numbers, which is potentially exponentially faster than a naive approach due to Kupferman et al. \cite{abk:decidable-weighted-automata}. The universality problem checks whether from a given initial vector, all words have a weight smaller than or equal to a given threshold. Finally, \textsc{Paws}\xspace also considers conditional transition systems, which, rather than adding weights to transitions, extend traditional transition systems by means of conditions, or product versions to enable flexible modelling of software product lines, while taking possible upgrades between different products of a software product line into account \cite{DBLP:conf/icse/CordyCPSHL12}. For these kinds of systems, bisimulation rather than language equivalence is considered, because the user experience for different products is in the focus. The bisimulation check can be performed on any finite distributive lattice defined via its set of join irreducible elements. Alternatively, a BDD-based implementation of (certain) lattices is offered and allows for a significantly faster bisimulation check as presented in \cite{bkks:cts-upgrades}. Again, the bisimulation check is parametrised over the lattice used and can accept any lattice, either defined directly via its irreducible elements, or using the BDD-based approach, as input. A key feature of \textsc{Paws}\xspace is its extensibility. The algorithms are parametrised over the semiring and it is therefore possible to use the algorithms \textsc{Paws}\xspace offers, not only for the semirings that come pre-implemented, but also for newly generated semirings. For that purpose, \textsc{Paws}\xspace offers ways of adding new semirings and executing algorithms for these semirings. All algorithms are implemented generically and can be used for various semirings or $l$-monoids, provided all necessary operations such as addition, multiplication, and solving linear equations are specified. Therefore, \textsc{Paws}\xspace is equipped with a semiring generator that allows to generate new semirings that are not pre-implemented and to define weighted automata or conditional transition systems over these. Specifically, we have built several layers of automatisation, so that whenever one, e.g., defines a complete distributive lattice, it suffices to give a partial order, from which the lattice of downward-closed sets is generated \cite{dp:lattices-order} and all operations are provided automatically. Building semirings from other semirings using crossproducts is almost completely automatised and modulo rings are automatised using Hensel liftings \cite{Hensel:lifting} for solving linear equation systems. In addition, it is possible to add arbitrary semirings by providing code for the operations mentioned before. \section{Preliminaries: System Types and Decision Problems} \label{sec:preliminaries} Here we give a short overview over the systems that \textsc{Paws}\xspace can analyse, i.e. weighted automata and conditional transition systems. For that purpose we require the notions of semirings and distributive lattices. \begin{itemize} \item A \emph{semiring} is a tuple $\mathbb S=(S,+, \cdot, 0, 1)$ where $(S,+,0)$ is a commutative monoid, $(S,\cdot,1)$ is a monoid, \emph{$0$ annihilates $\cdot$} (i.e., $0\cdot s_1=0 = s_1\cdot 0$) and \emph{$\cdot$ distributes over $+$} (i.e., $(s_1+ s_2)\cdot s_3=s_1\cdot s_3+ s_2\cdot s_3$ and $s_3\cdot (s_1+ s_2)=s_3\cdot s_1+ s_3\cdot s_2$, for all $s_1,s_2,s_3\in S$). \item A \emph{complete distributive lattice} is a partially ordered set $(L,\sqsubseteq)$ where for all subsets $L'\subseteq L$ of $L$ the infimum $\bigsqcap L'$ and the supremum $\bigsqcup L'$ w.r.t. the order $\sqsubseteq$ exists and infimum distributes over finite suprema: $(\ell_1\sqcup \ell_2)\sqcap \ell_3=(\ell_1\sqcap \ell_3)\sqcup (\ell_2\sqcap \ell_3)$ for all $\ell_1,\ell_2,\ell_3\in L$. Together with $\top=\bigsqcup L$ and $\bot=\bigsqcap L$, a complete distributive lattice forms a semiring $\mathbb L=(L,\sqcup,\sqcap,\bot,\top)$. \item An $l$-monoid is a lattice $(L,\sqcup,\sqcap,\bot,\top)$ together with a monoid $(L,\cdot,1)$ such that $\cdot$ distributes over $\sqcup$. If $\bot$ annihilates $\cdot$, i.e. $\bot\cdot\ell=\bot$ for all $\ell\in L$, then the $l$-monoid can be regarded as a semiring $(L,\sqcup,\cdot,\bot,1)$. \end{itemize} \subsection{Weighted Automata} A weighted automaton (WA) can be understood as a non-deterministic automaton that additionally carries weights from a given semiring $\mathbb S$ on each transition, as well as a termination weight for each state. Since the automata will be represented as matrices with semiring entries in \textsc{Paws}\xspace, we will use a matrix notation throughout the paper. For us, a matrix is a mapping of the form $\alpha\colon X\times Y\to \mathbb{S}$, where $X$, $Y$ are index sets indicating rows respectively columns. The set $X$ is typically the set of states and in many cases we will simply choose $X = \{1,\dots,n\}$. \begin{defi} Let $A$ be a finite set of alphabet symbols and $X$ be a set of states. Then a \emph{weighted automaton} is an $X\times(A\times X+\{\bullet\})$-matrix $\alpha$ with entries from a semiring $\mathbb{S}$. We write $x\xrightarrow{a,s}x'$ if $\alpha(x,(a,x'))=s$. \end{defi} For a weighted automaton $\alpha$, $\alpha(x,\bullet)$ denotes the final weight of state $x\in X$ and $\alpha(x,(a,y))$ denotes the weight of the $a$-transition from $x$ to $y$. Rather than accepting or rejecting a word $w$, a state $x$ in a weighted automaton associates it with a value from $\mathbb S$. This value can be obtained as follows: Take the sum of the weight of all $w$-labelled paths $p$ starting in $x$. The weight of a path $p$ is the product of all transition weights along $p$, including the termination weight. Consider for instance the following simple weighted automaton over the field $\mathbb R$: \begin{center} \begin{tikzpicture}[x=2.5cm,y=1.5cm,double distance=2pt] \node[state] (a) at (1,2) {$A$} ; \node[state] (d) at (0,1) {$B$} ; \node[state] (e) at (2,1) {$C$} ; \node (terma) at (0.5,2) {} ; \node (termd) at (-0.5,1) {} ; \node (terme) at (2.5,1) {} ; \begin{scope}[->] \path[shorten <=1pt] (a) edge node[above] {$a,2$} (d) edge node[above] {$a,3$} (e) edge node[above] {$1$} (terma); \path (d) edge[loop below] node {$b,2$} (d) edge node[above] {$2$} (termd); \path (e) edge[loop below] node {$b,2$} (e) edge node[above] {$1$} (terme); \end{scope} \end{tikzpicture} \end{center} The weight of the word $ab$ in state $A$ can be computed as follows: there are two paths to consider, $(A,a,B,b,B)$ and $(A,a,C,b,C)$. The first path has the weight $2\cdot 2\cdot 2=8$ and the second path has the weight $3\cdot 2\cdot 1=6$, so overall, the weight of the word $ab$ in $A$ is $8+6=14$. Formally, the language of a weighted automaton can be defined as follows: \begin{defi}[Language of a Weighted Automaton \cite{hwaDKV}] Let $\alpha\colon X\times (A\times X+\{\bullet\})\rightarrow\mathbb S$ be a weighted automaton. The language $L_\alpha:A^*\rightarrow (X\to \mathbb{S})$ of $\alpha$ is recursively defined as \begin{itemize} \item $L_\alpha(\epsilon)(x) = \alpha(x,\bullet)$ where $\epsilon$ is the empty word \item $L_\alpha(aw)(x) = \sum_{x'\in X} \alpha(x,(a,x'))\cdot L_\alpha(w)(x') $ for $a\in A$, $w\in A^*$ \end{itemize} We will call $L_\alpha(w)(x)$ the weight that state $x$ assigns to the word $w$. Two states $x,y\in X$ are language equivalent if $L_\alpha(w)(x) = L_\alpha(w)(y)$ for all $w\in A^*$. \end{defi} For weighted automata, \textsc{Paws}\xspace offers two algorithms to decide which pairs of states are language equivalent, i.e. assign the same weight to all words. In general, this problem is undecidable, but for many specific semirings (e.g. the reals) it is decidable. The more generally applicable algorithm, called \fonta{Language Equ.(Complete)} in the tool, can be applied to any semiring and yields, if it terminates, a complete characterisation of language equivalence in the automaton. This algorithm is a generalised partition refinement algorithm, based on the final chain construction in coalgebra \cite{KK14}. The idea is to enumerate the weights that each state assigns to all words, starting from the empty word $\epsilon$. Whenever a word is found whose corresponding weight vector is a linear combination of previously explored words, the vector can be dropped and no words extending this word need to be explored. As soon as all branches terminate, the algorithm terminates. Then, the language equivalent states are exactly those which assign the same weight to all words that were explored. It is worth noting that, in contrast to traditional partition refinement algorithms, this algorithm may require additional steps after the final partition of the state set is already established. This is to be expected though, because of the undecidability of language equivalence in general. For complete and completely distributive lattices, and more generally, completely distributive $l$-monoids, an optimisation up to congruence is available (\fonta{Language Equ.(Up-To)}). This algorithm checks whether two initial vectors are language equivalent by building a language equivalence relation on the fly on vectors over the semiring and pruning the relation by congruence closure, i.e. pairs of vectors that are already in the congruence closure of previously found pairs of vectors, are discarded \cite{bkk:up-to-weighted}. When compared to \fonta{Language Equ.(Complete)}, additional optimisation occurs in the form of pruning additionally vector pairs that are redundant because of symmetry or transitivity. Moreover, the algorithm may perform much better than \fonta{Language Equ.(Complete)} because only one pair of vectors is being compared, instead of all pairs of states, so in particular, a counterexample to language equivalence may be quickly identified. One semiring, where language equivalence is undecidable is the tropical semiring over the natural numbers $(\mathbb N_0\cup\{\infty\}, \mathsf{min}, +, \infty,0)$, as shown by Krob \cite{Krob94theequality}. However, the universality problem is decidable in this case. The universality problem asks, for any given threshold $T\in\mathbb N_0$, whether the weight of all words from a given initial vector is bounded by $T$. Note that all algorithms for these problems require a method for solving linear equations over the semiring. \subsection{Conditional Transition Systems} \textsc{Paws}\xspace also analyses a second type of systems: conditional transition systems (CTS) \cite{bkks:cts-upgrades,ABHKMS12}. These systems are related to featured transition systems \cite{Classen:2013:FTS,DBLP:conf/icse/CordyCPSHL12} which can be used for modelling software product lines. Different products are modelled by a single transition system where transitions are annotated with the products for which they are enabled. In addition CTS also have the possibility to upgrade the product, thus enabling new transitions, during runtime, i.e., they are adaptive. More concretely, CTS are defined over a finite partial order of conditions. Each transition is assigned to a downwards-closed set of conditions under which the transition may be taken. Before execution, one condition is fixed and all transitions that carry the respective condition remain active and all other transitions remain inactive. Afterwards, the CTS evolves just like a traditional labelled transition system. At any point though, a change of conditions can occur by going down in the order. If the condition is changed, so do the active transitions and additional transitions may become available. Note that due to the requirement that all transitions carry a downwards-closed set of conditions, only additional transitions can appear, no transition can be deactivated by performing a change in conditions. Conditions can intuitively be considered as different versions of a program, where a smaller condition signifies an improved product to which a user may upgrade at any point. Using this interpretation, CTS can be used to model and analyse such classes of systems in particular for their behaviour when upgrades occur. Also note the strong relation of partial orders to complete distributive lattices via the Birkhoff duality \cite{dp:lattices-order}: Every finite partial order gives rise to a lattice by considering all downwards-closed sets of elements ordered by inclusion. And vice versa, every finite distributive lattice can be represented in this way. We will use this duality to obtain compact representations of CTS. \begin{defi} \label{CTS} Let $(\Phi,\leq)$ be a finite partially ordered set. We call the elements of $\Phi$ conditions. A \emph{conditional transition system} (CTS) is a triple $(X,A,f)$ consisting of a set of states $X$, a finite set $A$ called the label alphabet and a function $f: X \times A \rightarrow (\Phi\rightarrow \mathcal{P}(X))$ mapping every ordered pair in $X \times A$ to a monotone function of type $(\Phi,\leq) \rightarrow (\mathcal{P}(X),\supseteq)$. As usual, we write $x\xrightarrow{a,\phi} y$ whenever $y\in f(x,a)(\phi)$. \end{defi} As indicated above, there is a dual representation, where a CTS $(X,A,f)$ is represented as a matrix $\beta\colon X\times (A\times X)\to \mathcal{O}(\Phi)$, where $\mathcal{O}(\Phi)$ is the set of all downward-closed subsets of $\Phi$ (wrt.\ $\le$). We define $\beta(x,(a,y)) = \{\phi\in \Phi\mid y\in f(x,a)(\phi)$, which is -- due to monotonicity -- always a downward-closed set. Furthermore $\mathcal{O}(\Phi)$ is a lattice, ordered by inclusion, with operations union and intersection, hence a semiring. However, here we are interested in bisimilarity rather than language equivalence. Furthermore the lattice elements will play the role of guards rather than weights. \medskip Now consider the following CTS defined over the set of conditions $\{\phi,\phi'\}$, where $\phi'\leq\phi$. \begin{center} \begin{tikzpicture}[x=2.5cm,y=1.5cm,double distance=2pt] \node[state] (a) at (1,2) {$A$} ; \node[state] (d) at (0,1) {$B$} ; \node[state] (e) at (2,1) {$C$} ; \begin{scope}[->] \path[shorten <=1pt] (a) edge node[left] {$a,\{\phi'\}$} (d) edge node[right] {$a,\{\phi,\phi'\}$} (e); \path (d) edge[loop below] node {$b,\{\phi,\phi'\}$} (d); \path (e) edge[loop below] node {$b,\{\phi'\}$} (e); \end{scope} \end{tikzpicture} \end{center} Assume that we are starting in state $A$ under the initial condition $\phi$. Then only the transitions from $B$ to $B$ and from $A$ to $C$ are available. If we choose to make a step from $A$ to $C$ via the $a$-labelled edge, we cannot do any further steps, unless we first perform an upgrade to $\phi'$, which allows us to use the $b$-loop in state $C$. Alternatively, starting in $A$, we could also perform an upgrade right away and gain the option to take an $a$ transition to $B$ instead of transitioning to $C$. For CTS we are interested in conditional bisimulation. Two states are conditionally bisimilar, if there exists a conditional bisimulation relating the states. A conditional bisimulation is a family of traditional bisimulations $R_\phi$, one for each condition $\phi$, on the respective underlying transition systems. For two conditions $\phi'\leq\phi$ it must hold that $R_{\phi'}\supseteq R_\phi$, which intuitively means that if two states are bisimilar under $\phi$, they must also be bisimilar under every smaller condition $\phi'$. Furthermore, the standard transfer property for bisimulations must be satisfied. In \cite{bkks:cts-upgrades} we have shown how to model a small adaptive routing protocol as CTS. Bisimulation for CTS is computed with a modified partition refinement algorithm akin to the partition refinement algorithm to compute bisimilarity for labelled transition systems. This algorithm uses the duality between finite partially ordered sets and finite distributive lattices to compute and propagate in parallel the partition refinement for all conditions at once. The BDD based-implementation uses the same basic algorithm, but represents lattice elements via BDDs, which can often lead to a very compact representation, which in turn makes the algorithm viable for significantly larger sets of conditions. \smallskip Summarizing, the problems \textsc{Paws}\xspace solves and the corresponding algorithms and semirings are displayed in the following table: \begin{center}\scalebox{1}{ \begin{tabular}{|c|c|c|c|}\hline Problem & Algorithm & Semiring & Model \\ \hline Language equivalence (all pairs) & \fonta{Language Equ.(Complete)} & any semiring & WA \\ Language equivalence (initial vectors) & \fonta{Language Equ.(Up-To)} & $l$-monoids, lattices & WA \\ Universality Problem & \fonta{Universality} & tropical Semiring & WA \\ Conditional bisimilarity & \fonta{CTS Bisimilarity} & finite lattice & CTS \\ \hline \end{tabular}} \end{center} \section{Design and Usage} In this section, we give an overview of some design decisions and the usage of the tool. First, we explain the basic structure and then discuss some of the problems and math-related features of the tool. Furthermore we explain how to work with \textsc{Paws}\xspace. \subsection{Design} \textsc{Paws}\xspace is a Windows tool offering a complete graphical interface, developed in Microsoft's Visual Studio using C\#. The program is divided into two autonomous components: \begin{figure}[h] \centering \includegraphics[width=0.6\textwidth]{fig/overview2_paws.png} \label{fig_overview} \end{figure} Both components are designed according to the MVC (Model View Controller) pattern. In the sequel, we will discern these two program parts, as their interaction is rather limited, allowing them to be considered as separate concerns. \subsubsection{The Semiring Generator} The development of the semiring generator started in a master's thesis \cite{m:gen-werkzeug-sprachaequ}. It supports five different generation processes, which, for clarity, are equipped with five separate input forms. The semiring generator supports three fully automated cases: \begin{itemize} \item Direct products \item Fields of fractions \item Field extensions for $\mathbb{Q}$ \end{itemize} Furthermore, there are two options to generate code based on user implementations: \begin{itemize} \item $l$-monoids \item Arbitrary semirings \end{itemize} Note that generation of finite lattices and modulo rings is less involved and is done directly within the analysis component. For the generation of source code we use \textsl{CodeDOM} of the \textsl{.NET} Framework, which enables code generation based on object graphs. The five processes are implemented via one superclass and three derived classes. The superclass contains all methods for creating if-statements, for-loops or useful combinations of these, based on predefined patterns. Except for the direct product generator, every class uses the constructor generating methods of the superclass. Most of the differences between the classes are reflected in the methods for generating the binary operators. Concerning methods for solving linear equations we are offering two templates: a straightforward implementation of the Gaussian algorithm and one method for $l$-monoids, based on the residuum operator \cite{opac-b1085541}. With code generation, one always has to face the question of how to give the program, specifically the analysis component of \textsc{Paws}\xspace, access to the newly generated classes. We decided to use the \textsl{Microsoft.Build.Execution} namespace for updating the analysis tool. This decision avoids creating multiple DLL files, which would be the case with a pure reflection-based solution to the problem. However, reflection is used to solve another difficulty. Due to the combination of different semirings or data types as elements of a new semiring, a dynamic approach is required to enable the automated generation of constructors with a string parameter, specifying the semiring value. \textsc{Paws}\xspace also manages the names of the semiring classes in individual text files. First, this prevents a user from overwriting an already fixed class name. Another advantage is that by using \textsl{System.Activator}, an instance can be created dynamically during runtime without knowing the class name at the level of program design. Hence, both components use consistent config files, which is ensured by updating the corresponding config file if one of the program parts creates or deletes a semiring. But when deleting a semiring that has already been used to create and store an automaton or transition system, conflicts may occur with the serialised objects and thus with the user's storage files. Therefore, deletion of semirings must be dealt with separately. A semiring can only be deleted or modified if it has not been used in the previous session within an automaton. \subsubsection{The Analysis Tool} As already mentioned, for both program parts MVC is used to implement the user interface. The main focus of \textsc{Paws}\xspace is to give the user the tools to define an automaton in order to be able to subsequently analyse it with the supported algorithms. In order to implement this as dynamically as possible, we have opted for a generic implementation. Therefore, the class $\mathit{Matrix}\langle T\rangle$ (where $T$ is the generic type of the semiring), which implements automata in a matrix representation, is the core of the tool's architecture. \begin{figure}[h] \centering \includegraphics[width=0.4\textwidth]{fig/lec_overview.png} \label{fig_aws} \end{figure} The main argument for the generic approach is that the algorithms for the analysis of an automaton are based on the basic operators of a semiring. A further method is needed to solve systems of linear equations, which is also defined for each semiring within \textsc{Paws}\xspace. It is therefore recommended to use a generic class that includes all the methods of analysis, which in turn dynamically call the corresponding operators or methods of the currently used semiring. This dynamic approach is thus combined with reflection. Consequently, the management of automata created by the user requires a generic implementation as well. The model for the matrices is therefore also generic and thus it makes sense to manage several semiring models by the controller. Because of the generic approach, automatically checking the correctness of the user input proves to be problematic when the user has generated his or her own semiring and has implemented a string constructor to read semiring elements from input strings without input verification. In this case \textsc{Paws}\xspace can not check whether the input is well-formed, this has to be taken care of in the user-implemented method. Such semirings can not be further used to generate other semirings. A further design decision is that one can create finite semirings directly within the analysis component of \textsc{Paws}\xspace. The reason why we chose to not move this option to the generator is that for finite lattices and modulo rings over the integers no new classes have to be generated nor is there any need for new source code at all. In this case, it is sufficient to configure template classes for the corresponding semirings via static variables that contain the required information about the semiring. The operators are designed to behave according to the configuration of the class. In such cases, the analysis program must also access the configuration files in order to make the extensions known to the semiring generator. As an additional feature, we have also integrated GraphViz\footnote{\texttt{www.graphviz.org}} into the tool, as it allows visualization of weighted automata, if desired by the user. \subsection{Usage} We will discuss the usage of the tool separately for the two individual components of \textsc{Paws}\xspace, hence this section contains subsections giving details about the following two components. \begin{itemize} \item The \emph{semiring generator} to build and provide the required semirings over which automata can be defined. This generator is used to generate semirings that cannot be obtained in a fully automated way and supports some form of automatic generation. \item The \emph{analysis tool} that allows the user to choose a previously generated semiring, one of the semirings that come built-in with \textsc{Paws}\xspace or to build a lattice or modulo ring, and then to define automata in a matrix representation over the chosen semiring. Matrices are then interpreted as weighted automata (WA) or conditional transition systems (CTS) and can be used to compute language equivalence for weighted automata with two different approaches, decide the threshold problem for weighted automata over the tropical semiring of natural numbers or to compute the greatest bisimilarity of a CTS. \end{itemize} \subsubsection{The Semiring Generator} The semiring generator is used to generate the semirings under consideration. In order for a semiring to be usable within the context of \textsc{Paws}\xspace, the structure needs to define the following components: \begin{itemize} \item A universe which contains all elements of the semiring. All predefined datatypes from C\#, as well as combinations of them can serve as universes. \item An addition operator $+$ of the semiring. \item A multiplication operator $\cdot$ of the semiring. \item One() and Zero() methods, which return the units of addition and multiplication. \item A method for solving linear equations over the semiring. \end{itemize} \begin{figure}[h] \centering \includegraphics[width=0.9\textwidth]{fig/PAWS_SG.jpg} \label{PAWS_02} \end{figure} While the first four components are necessary to define a semiring in a mathematical context either way, the procedure to solve linear equations is an additional requirement -- one that \textsc{Paws}\xspace aims at reducing as much as possible -- but in order to provide the greatest amount of flexibility possible, the tool offers the option to define a procedure to solve linear equations from scratch. \subsubsection{The Analysis Tool} The analysis component is designed to offer generic algorithms applicable to numerous predefined or user-defined semirings. Some of the algorithms can however only be used with specific (types of) semirings. The most general algorithm is the language equivalence check, for which all semirings are eligible. Conditional transition systems are only defined over lattices, therefore, the bisimulation check is limited to lattice structures. However, the user still has the choice between two different ways of dealing with lattices: representing elements of the lattice as downwards-closed sets of irreducibles via the Birkhoff duality \cite{dp:lattices-order}, applicable to all finite distributive lattices, or representing them using binary decision diagrams (BDDs). The BDD variant is more restrictive and mainly designed for the application to CTS. Here, the irreducibles are required to be full conjunctions of features from a base set of features, ordered by the presence of distinct upgrade features. Lastly, the threshold check can only be performed over a single semiring, the tropical semiring over natural numbers. \begin{figure}[h] \centering \includegraphics[width=0.9\textwidth]{fig/PAWS_Analysis.jpg} \label{PAWS_01} \end{figure} \medskip The general workflow of the analysis tool is as follows: \begin{itemize} \item[$\triangleright$] Choose a semiring \item[$\triangleright$] Generate a matrix over this semiring, representing a weighted automaton or a conditional transition system \emph{Alternatively:} Choose the matrix from a list of matrices that have been generated previously \item[$\triangleright$] Start the algorithm and provide -- if necessary -- additional input \end{itemize} Additional input comes in two forms: initial vectors and the threshold to be checked against in case of the threshold algorithm. Depending on the semiring of choice, questions regarding language equivalence might not be decidable, leading to non-termination of the corresponding procedure in \textsc{Paws}\xspace. In order to deal with this problem and to allow abortion of an overlong computation, the actual computation is delegated to a separate thread that can at any time be aborted. In that case all intermediate results are discarded. Note that only the two language equivalence-based algorithms can run into non-termination issues. For the CTS bisimulation check, as well as the threshold problem on the tropical semiring of natural numbers, termination is always guaranteed. However, the runtime of CTS bisimulation check can be doubly exponential in the number of features under consideration -- because the lattice is the set of all possible configurations, which in turn are all possible conjunctions over the features. Using the BDD-based implementation of lattices -- which is particularly suited to the needs of CTS modelling -- this explosion is mitigated in many cases, but it can not be ruled out completely. On the other hand, the BDD-based modelling only allows for special lattices to be modelled, i.e. those that arise as the lattices constructed from a set of features and upgrade features, whereas the variant called \textsl{FiniteLattice} allows for arbitrary (finite, distributive) lattices to be represented. In this case, lattices are represented via the partial order of irreducible elements, using Birkhoff's representation theorem \cite{dp:lattices-order}. \section{GUI Overview of \textsc{Paws}\xspace} In this section, we give a short overview of the GUI. First, we will present the semiring generator and how to start a semiring generation process. We then illustrate the various possibilities to use the analysis component of \textsc{Paws}\xspace in a short overview. \subsection{The Semiring Generator} First, the user hast to choose one of the offered generation templates, for example the direct product input mask (Figure~\ref{fig_dp_01} and~\ref{fig_dp_02}). Then, in Figure~\ref{fig_dp_03} the console informs the user that the generated source code is compilable. In case the user specifies some code on his or her own, the console will display suitable compilation error messages. \begin{figure}[h] \begin{minipage}[t]{0.475\textwidth} \centering \includegraphics[height=45mm]{fig/dp_grafik_01.png} \caption{Lower ellipse: Choose an input mask. Top ellipse: Specify the name of the new semiring class.} \label{fig_dp_01} \end{minipage} \hfill \begin{minipage}[t]{0.475\textwidth} \centering \includegraphics[height=45mm]{fig/dp_grafik_02.png} \caption{Specify a direct product, add semirings as member fields to the class.} \label{fig_dp_02} \end{minipage} \end{figure} \begin{figure}[!h] \centering \includegraphics[width=0.7\textwidth]{fig/dp_grafik_03.png} \caption{Pressing the circled button will generate the code visible in the right-hand text-box. The console at the bottom informs the user, whether the source code was compiled and successfully added to the analysis component of \textsc{Paws}\xspace.} \label{fig_dp_03} \end{figure} \subsection{The Analysis Tool} In this section the use of the \textsc{Paws}\xspace analysis component is presented in a brief overview. The illustrations serve to explain our intuition behind the design and the use of \textsc{Paws}\xspace. In Figures~\ref{fig_aw_01} and~\ref{fig_aw_02} the first steps for creating a weighted automaton are illustrated. After generating a matrix, the user can choose one of the available algorithms and wait until the result of the computation is displayed inside the text area (Figure \ref{fig_aw_05}). \begin{figure}[h] \begin{minipage}[t]{0.475\textwidth} \centering \includegraphics[height=45mm]{fig/aw_grafik_01.png} \caption{Top ellipse: First determine the name of the automaton. Bottom ellipse: Type in the number of states.} \label{fig_aw_01} \end{minipage} \hfill \begin{minipage}[t]{0.475\textwidth} \centering \includegraphics[height=45mm]{fig/aw_grafik_02.png} \caption{Choose the semiring.} \label{fig_aw_02} \end{minipage} \end{figure} With the \textsc{Paws}\xspace analysis component, besides automata, also finite semirings can be generated and stored for further semiring generation as well as for the analysis. \begin{figure}[h] \centering \includegraphics[height=40mm]{fig/aw_grafik_05.png} \caption{After starting one of the supported algorithms for a transition system, the analysis result will be displayed in the bottom text area.} \label{fig_aw_05} \end{figure} \subsection{Evaluation} Here we describe several case studies and list runtime results. Before we discuss the results, let us first consider the theoretical complexity results, listed in Table~\ref{fig:overview problems}, where we consider various semirings (in the left column) and various problems (in the top row). \begin{table}[h] \centering \begin{tabular}{l|ccc} & equivalence & inclusion & threshold \\ \hline \\ real & $\mathsf{P}$ & undecidable & undecidable \\ numbers & {\footnotesize \cite{t:polynomial-equ-prob-automata}} & \multicolumn{2}{c}{\footnotesize \!\!\!\!\!\cite{p:prob-automata}} \\ \\ tropical & undecidable & undecidable & $\textsf{PSPACE}$-cmpl. \\ semiring & \multicolumn{2}{c}{\footnotesize \cite{Krob94theequality}} & \hspace{-1cm}{\footnotesize \cite{abk:decidable-weighted-automata}} \\ \\ distr. & $\textsf{PSPACE}$-cmpl. & $\textsf{PSPACE}$-cmpl. & $\textsf{PSPACE}$-cmpl. \\ lattices & \multicolumn{3}{c}{\footnotesize \cite{doi:10.1142/S0129054110007192}} \\ \end{tabular} \caption{Overview of the corresponding complexity classes for considered weighted automata problems.} \label{fig:overview problems} \end{table} The main focus of \textsc{Paws}\xspace\ is on weighted automata and language equivalence, hence we will conduct our experiments for this problem. For extensive experiments concerning the universality problem see \cite{bkk:up-to-weighted}. Experiments on conditional transition systems were conducted in \cite{bkks:cts-upgrades}. We will consider the decidable cases, namely the reals, as well as another (finite) ring, and a distributive lattice. More concretely, we will evaluate the algorithm \fonta{Language Equ.(Complete)} on three different semirings: the reals $(\mathbb{R},+,\cdot,0,1)$, the finite ring $(\mathbb{Z}_{100},+_{100},\cdot_{100},0,1)$ (where addition and multiplication is modulo $100$), and $\mathit{LatticeZ}$, the lattice $(\mathbb{Z},\min,\max,\infty,-\infty)$ restricted to the interval $[-1000,1000]$. Note that \fonta{Language Equ.(Complete)} determines for all pairs of states whether they are equivalent. \textsc{Paws}\xspace was executed on an Intel Core 2 Quad CPU Q9550 at 2.83 GHz with 4 GB RAM, running Windows 10. Our test cases were constructed as follows: we considered different numbers of states ($|X|$) and also varied the probability of the existence of a transition between a pair of states ($p_\mathit{Tr}$). Usually we set $p_\mathit{Tr} = 0.5$, but we will also compare to other values. Weights are set randomly and the default alphabet size was~$2$. For each semiring and each chosen combination of parameters we randomly generated 1000 weighted automata and observed the runtime behaviour. We considered various percentiles, for instance the $50\%$ and $90\%$ percentiles: the $50\%$ percentile is the median and the $90\%$ percentile means that $90\%$ of the runs were faster and $10\%$ slower than the time given in the respective field. Analogously for the other percentiles. As expected, the runtimes are heavily dependent on the semiring. This is due to two reasons: first, the algorithms \fonta{Language Equ.(Complete)} internally uses procedures for solving linear equations and the complexity of those procedures, which depend on the semiring, plays a major role in the runtime. Second, as explained in Section~\ref{sec:preliminaries}, the algorithm lists words of increasing length and associates them with weight vectors. A vector need not be considered if it is a linear combination of existing vectors. Hence, if the corresponding semimodule has few generators -- as it is for instance the case for a vector space of limited dimension over a field -- the search space can be cut off quickly. We first consider the two rings: the reals and $\mathbb{Z}_{100}$ (see Table~\ref{fig:experiments}). For the reals, the Gaussian algorithm has a polynomial runtime $\mathcal O(|X|^3)$ in the number of states. Due to the fact that the search can be cut off after at most $|X|$ vectors, there are only minor variations in the runtime over the various percentiles. Furthermore the alphabet size and the probability $p_\mathit{Tr}$ have little impact on the runtime. Instead the times are mainly dependent on the number of states. \begin{table}[h] \centering {\footnotesize \begin{tabular}{|r|r|r|r|r|} \hline $(|X|,p_\mathit{Tr})$&Semiring&$50\%$&$90\%$&$95\%$\\ \hline (10,0.5)&$\mathbb{R} $&28&29&30\\&$\mathbb{Z}_{100}$&42&73&2307\\\hline (15,0.5)&$\mathbb{R} $&98&100&101\\&$\mathbb{Z}_{100}$&252&263&267\\\hline (20,0.5)&$\mathbb{R} $&359&361&362\\&$\mathbb{Z}_{100}$&518&523&528\\\hline (25,0.5)&$\mathbb{R} $&712&717&719\\&$\mathbb{Z}_{100}$&1034&1058&1081\\\hline (30,0.5)&$\mathbb{R} $&1327&1333&1336\\&$\mathbb{Z}_{100}$&1983&3509&3548\\\hline (35,0.5)&$\mathbb{R} $&3648&3660&3664\\&$\mathbb{Z}_{100}$&5242&5290&5304\\\hline (40,0.5)&$\mathbb{R} $&5183&5197&5202\\&$\mathbb{Z}_{100}$&7654&7924&7960\\\hline (45,0.5)&$\mathbb{R} $&7400&7419&7425\\&$\mathbb{Z}_{100}$&11492&11538&11551\\\hline (50,0.5)&$\mathbb{R} $&10471&10509&10720\\&$\mathbb{Z}_{100}$&15673&15720&15738\\\hline \end{tabular} }\caption{Runtime results in milliseconds on randomly generated automata over two different semirings} \label{fig:experiments} \end{table} There are different effects for the ring $\mathbb{Z}_{100}$, which also uses the Gauss method, but the runtime is particularly influenced by the subsequent application of the Hensel lifting, which depends on the one hand on the prime factor decomposition $q = \prod_{i=0}^{k} p_i^{e_i}$, where $k$ is the number of prime factors (here: $q=100$), and second on the number of zero lines that occur in computation of the row echelon form. It is not previously known which combination of the free variables leads to a solution \cite{Hensel:lifting,m:gen-werkzeug-sprachaequ}. The cases in which all those possibilities have to be enumerated are very rare, however, these cases do occur and they may cause a timeout after 5~hours. In order to see this effect, consider the $99.9\%$ percentiles in Table~\ref{fig:hensel_worstcase}. An additional, very interesting, observation, which we have made while testing the implementation, is that the worst case is less frequent in practice with an increasing number of states (see Table~\ref{fig:hensel_worstcase}). A possible explanation for this could be the decreasing probability for the occurrence of zero lines with an increase in the number of states. The algorithm is much less efficient in the case of the lattice of integers $\mathit{LatticeZ}$ (see Table~\ref{fig:lattice}), although the procedure for solving a single solving equation system, based on the residuum operation \cite{opac-b1085541}, has linear runtime. However, this does not help, since we can not guarantee to find a small set of generators in the semimodule and hence there is no limit on the number of vectors which are enumerated. Already for $|X| = 15$ states it is infeasible to obtain results. The situation becomes worse when the alphabet size increases, since the number of vectors will also grow. This is different for the case of the reals and $\mathbb{Z}_{100}$, since there the number of states limits the number of columns. \begin{table}[h] \centering \begin{tabular}{|r|r|r|r|r|r|r|r|} \hline $(|X|,p_\mathit{Tr})$&Semiring&$50\%$&$85\%$&$90\%$&$95\%$&$99\%$&$99.9\%$\\ \hline (10,0.5)&$\mathbb{Z}_{100}$&42&68&73&2307&7041&time-out\\\hline (15,0.5)&$\mathbb{Z}_{100}$&252&258&263&267&897&1787758\\\hline (20,0.5)&$\mathbb{Z}_{100}$&518&521&523&528&532&time-out\\\hline (25,0.5)&$\mathbb{Z}_{100}$&1034&1044&1058&1081&1821&time-out\\\hline (30,0.5)&$\mathbb{Z}_{100}$&1983&3493&3509&3548&3745&3881\\\hline (35,0.5)&$\mathbb{Z}_{100}$&5242&5283&5290&5304&5422&5501\\\hline \end{tabular} \caption{Runtimes in milliseconds of \fonta{Language Equ.(Complete)} on randomly generated automata over $\mathbb{Z}_{100}$ .} \label{fig:hensel_worstcase} \end{table} \begin{table}[h] \centering \begin{tabular}{|r|r|r|r|r|r|r|} \hline $(|X|,p_\mathit{Tr})$&Semiring&$50\%$&$85\%$&$90\%$&$95\%$&$99\%$\\ \hline (5,0.5)&$LatticeZ$&41&242&347&758&3186\\\hline (10,0.5)&$LatticeZ$&18808&287920&564525&1975251&16321319\\\hline \end{tabular} \caption{Runtimes in milliseconds of \fonta{Language Equ.(Complete)} on randomly generated automata over $\mathit{LatticeZ}$.} \label{fig:lattice} \end{table} Note, that while the performance of algorithm \fonta{Language Equ.(Complete)} is bad in the case of $\mathit{LatticeZ}$, the on-the-fly up-to technique \fonta{Language Equ.(Up-To)} performs much better. At first sight, such a comparison seems unfair, since \fonta{Language Equ.(Up-To)} tests language equivalence only for a single pair of states, whereas the other method considers all pairs of states at once. However, the advantage is significant enough that the up-to technique can be expected to be more performant even when it is applied to all pairs of states, one after the other. In fact, in the case of randomly generated automata with ten states, there are 90 pairs of states to consider and the running time we have recorded for \fonta{Language Equ.(Up-To)} is lower than 38 milliseconds in 99\% of all cases. Thus, even if we take the value of the 99\% percentile for all pairs of states, we end up with $90\cdot 38$ milliseconds, which is significantly lower than the median runtime for \fonta{Language Equ.(Complete)}. For randomly generated automata, it is rare to find two language-equivalent states, in fact, only very few steps are typically required to find a word that separates randomly generated automata. While \fonta{Language Equ.(Up-To)} may stop its computation after finding a single word separating the initial pair of states, it is not sufficient for termination of \fonta{Language Equ.(Complete)} to find witnesses of absence of language equivalence. The intermediate results of \fonta{Language Equ.(Complete)} also need to span the same semimodule for termination of the algorithm, which may take numerous extra steps after all non-equivalent states have been separated. \section{Conclusion, Future Work and Related Work} We have seen that \textsc{Paws}\xspace is a flexible tool to analyse the behaviour of weighted automata and conditional transition systems. The generic approach allows for adding new semirings with a varying degree of support by the tool itself. Concerning related approaches, we are not aware of analysis tools for language equivalence and the threshold problem for weighted automata. For the problem of generating semirings dynamically, there exists previous work for solving fixpoint equations over semirings by Esparza, Luttenberger and Schlund \cite{Esparza2014}. They introduce \textsc{FPsolve}, a $\verb!C++!$ template based tool for solving fixpoint equations over semirings. That is, the tool has a different application scenario than ours. However, the tools share similarities since in \textsc{FPsolve} the user also has the possibility to generate new semirings. For this, only the addition, multiplication and Kleene star must be implemented. However, a string constructor must also be specified without automatic support and the main method must be adjusted with the corresponding command-line. \textsc{Paws}\xspace is designed to enable the generation of new semirings for solving linear equations using a graphical user interface and does not change already existing code, which is not part of a semiring class. In contrast to this, work has already been done on an analysis tool for featured transition systems -- which are basically CTS without a notion of upgrades -- to analyse software product lines wrt. simulation. In their work \cite{DBLP:conf/icse/CordyCPSHL12}, Cordy et al.\ have implemented their model using BDDs as well, yielding a similar speed up as our own approach. The significant differences here lie in the notion of behaviour, since Cordy et al. have focused on simulation relations, whereas we are concerned with bisimulations. Furthermore we capture a notion of upgrade and thus support partial orders of products instead of just abritrary sets of products. We intend to develop \textsc{Paws}\xspace further in several ways. We are looking for new classes of semirings where solutions of linear equations can be effectively computed, in order to equip those semirings with an improved support from \textsc{Paws}\xspace. Furthermore, we are interested in analysing more extensive case studies, where we will use \textsc{Paws}\xspace to conduct all required analyses. \bibliographystyle{eptcs}
\section{Introduction} \label{sec:introduction} \IEEEPARstart{I}n \emph{"Lie to me"}, an American crime television drama, Dr. Cal Lightman, a genius scientist, is assisting investigators in the police departments to solve cases through his knowledge of applied psychology. This is mainly done through interpreting subtle facial expressions of emotion (FEE) and body language of alleged offenders in order to evaluate their authentic motivation or emotional experience.\\ \begin{figure} \centering \includegraphics[width=0.7\linewidth]{images/julia_roberts} \caption{People may have difficulties in expressing emotions that look genuine when these do not correspond to the emotional state they are experiencing. In the case of smiling, differences can be observed in the contraction of the \emph{orbicularis oculi} muscle around the eyes. \textit{Left}: The lack of orbicularis oculi contraction has often been considered a marker of unfelt or even deceitful expressions. \textit{Right}: A strong orbicularis oculi contraction, with very visible "crows feet" around the corners of the eyes, has often been considered a marker of genuine expressions.} \label{fig:duchenne_smile} \end{figure} However in real life, humans are very skilled in concealing their true affective states from others and displaying emotional expressions that are appropriate for a given social situation. Untrained observers tend to perform barely above chance level when asked to detect whether observed behaviours genuinely reflect underlying emotions \cite{hartwig2011lie,ten2015physically}. This is a particularly difficult judgement when relying on visual cues only \cite{bond2006accuracy}. Even for professional psychologists it is difficult to recognise deceit in emotional displays as there are numerous factors that need to be considered \cite{porter2008reading,ochs2005intelligent}. \\ Many potential applications would benefit from the ability of automatically discriminating between subtle facial expressions such as displays of genuine and unfelt emotional states. Improved human-computer interaction, improved human-robot interaction for assistive robotics \cite{bruce2002role,shibata1997artificial,lee2006can,anderson06}, treatment of chronic disorders \cite{littlewort2007faces} and assisting investigation conducted by police forces \cite{aremu2009path,vrij2001killed,o2009police} would be just a few. \\ An emotional display is considered unfelt (or masked) when it does not match a corresponding emotional state. There are three major ways in which emotional facial expressions are intentionally manipulated \cite{ekman1975unmasking}: an expression is \emph{simulated} when it is not accompanied by any genuine emotion, \emph{masked} when the expression corresponding to the felt emotion is replaced by a falsified expression that corresponds to a different emotion, or \emph{neutralized} when the expression of a true emotion is inhibited while the face remains neutral. All along this work, the term genuine FEE is used to denote FEEs congruent with the affective state, while the term unfelt FEE is used for denoting FEEs incongruent with the emotional state (aka masked) .\\ It has been argued that liers, deceivers and displayers of unfelt emotions would be betrayed by the leakage of their genuine emotional states through their nonverbal behaviour \cite{frank1997ability,abe2009neurobiology,porter2008reading}. This is supposed to happen through subtle facial expressions of short duration, as well as changes in pitch, posture and body movement. \\ Studies on the unfelt display of emotion mostly originated based on Duchenne de Boulogne's work, a nineteenth century French scientist. He is considered the first to have differentiated facial actions observed in displays of felt and unfelt emotions \cite{duchenne1862mechanism,spence2001behavioural}. Part of his legacy concerns what is considered the typical genuine smile -- often called a Duchenne smile. Duchenne smiles involve the contraction of the orbicularis oculi muscle (causing lifting of the cheeks and crow's feet around the eyes) together with the zygomaticus major muscle (pulling of lip corners upwards) \cite{bernstein2008adaptive,ekman1990duchenne,brown2002smile,frank1993not,ekman1988smiles,gunnery2013deliberate,krumhuber2009can,mehu2012reliable} (see Fig. \ref{fig:duchenne_smile}). In contrast, a masking smile (aka a non-Duchenne smile) can be used to conceal the experience of negative emotions \cite{frank2002smiles,ekman1988smiles,darwin1872expression,gosselin2010voluntary,mehu2012reliable}. \\ Although it has been argued that the orbicularis oculi activation is absent from masked facial expressions of enjoyment, empirical evidence is not conclusive. For example, in a database presenting 105 posed smiles 67\% of them were accompanied by the orbicularis oculi activation \cite{kanade2000comprehensive}. Another study showed that over 70\% of untrained participants were able to activate the majority of eye region action units, although not one action at a time, as they managed to perform them through the reliance and co-activation of other action units. The poorest performance was for the deliberate activation of the \emph{nasolabial furrow deepener}, which is often observed in sadness and which was performed successfully only by 20\% while the orbiculari oculi by 60\% of participants.\\ Although a variety of studies have focused on the evaluation of how genuine some FEEs might be while relying on the analysis of still, i.e. static, images, not much attention has been paid to dynamics as evaluated in a sequence of frames \cite{boraston2008brief,manera2011individual,uusberg2013unintentionality,perron2013analysis,chartrand2005judgement,vrij2010pitfalls,qu2017cas}. In a naturalistic setting, FEEs are always perceived as dynamic facial displays, and it is easier for humans to recognize facial behaviour in video sequences rather than in still images \cite{sato2004enhanced,krumhuber2013effects,jack2015human}. \\ It has been asserted that while trying to simulate the expression of an unfelt emotion, cues of the actual felt emotion appeared along cues related to the masked expression, which made the overall pattern difficult to analyse \cite{iwasaki2016hiding}. Leakages of a genuine emotion have been observed more frequently in the upper part of the face, while cues the lower half of the face was more often manipulated in order to express an unfelt emotion \cite{ross2013decoding,porter2012secrets,lusi2017joint,loob2017dominant}.\\ In this work, we propose a new data corpus containing genuine and unfelt FEE. While numerous studies involving the analysis of genuine or truthful behaviours rely on video recordings of directed interviews, such as the work in \cite{ten2015physically}, studies that analysed nonverbal behaviour while controlling for the emotional state of subjects are rare \cite{porter2012secrets}.\\ When designing experiments that require facial emotion displays as independent variables, posed facial expressions of subjects being instructed to act out a particular emotion are often used. This is thought to provide greater control over the stimuli than a spontaneous emotion display might, in the sense that other variables such as context and the physical appearance of subjects (even hair style or make-up) are much less variable and will not bias the observers in an uncontrolled way.\\ To record FEEs, participants are usually asked to practice the display of specific emotions. In order to achieve a display close to a genuine emotional expression, the process can be facilitated through the presentation of FEEs \cite{ekman2002facs,ekman1993facial}, or other pictures \cite{porter2012secrets} or videos inducing emotions in line with the ones to be expressed \cite{zhang2013high}, or mental imagery and related theatre techniques \cite{banziger2012introducing}. Such paradigms have been frequently used for recording and creating emotional expression databases \cite{gaebel1992facial,de2009rapid,calder2000configural,ekman1993facial,sandbach2012static,mavadati2013disfa, banziger2012introducing}.\\ In addition to the published dataset, we propose a complete methodology that has the capacity to recognise unfelt FEEs and generalises to standard public emotion recognition datasets. We first train a Convolutional Neural Network (CNN) to learn a static representation from still images and then pull features from this representation space along facial landmark trajectories. From these landmark trajectories we build final features from sequences of varying length using a Fisher Vector encoding which we use to train a SVM for final classification. State-of-the-art results are presented on CK+ and Oulu-Casia, two datasets containing posed FEEs. Moreover, close to state-of-the-art results are shown on a more difficult problem of recognising spontaneous facial Action Units on BP4D-Spontaneous. We finally provide benchmarking and outperform the methods from the recent ChaLearn Challenge \cite{wan2017results} on the proposed SASE-FE dataset.\\ The rest of the paper is organised as follows: in Section \ref{sec:related_work} we describe related work in FEEs recognition, in Section \ref{sec:dataset} we introduce the new SASE-FE dataset, in Section \ref{sec:method} we detail the proposed methodology, and Section \ref{sec:results} concludes the paper. \section{Related Work} \label{sec:related_work} This section first reviews main works on recognition of FEE, and then recognition of genuine and unleft FEE. \subsection{Recognizing Facial Expressions of Emotion} Automatic facial expression recognition (AFER) has been an active field of research for a long time. In general, a facial expression recognition system consists of four main steps. First the face is localised and extracted from the background. Then, facial geometry is estimated. Based on it, alignment methods can be used to reduce variance of local and global descriptors to rigid and non-rigid variations. Finally, representations of the face are computed either globally, where global features extract information from the whole facial region, or locally, and models are trained for classification or regression problems.\\ Features can be split into static and dynamic, with static features describing a single frame or image and dynamic ones including temporal information. Predesigned features can also be divided into appearance and geometrical. Appearance features use the intensity information of the image, while geometrical ones measure distances, deformations, curvatures and other geometric properties. This is not the case for learned features, for which the nature of the extracted information is usually unknown.\\ Geometric features describe faces through distances and shapes. These can be distances between fiducial points \cite{pantic2006dynamics} or deformation parameters of a mesh model \cite{sebe07, kotsia07}. In the dynamic case the goal is to describe how the face geometry changes over time. Facial motions are estimated from color or intensity information, usually through Optical flow \cite{wollmer2013lstm}. Other descriptors such as Motion History Images (MHI) and Free-Form Deformations (FFDs) are also used \cite{koelstra10}. Although geometrical features are effective for describing facial expressions, they fail to detect subtler characteristics like wrinkles, furrows or skin texture changes. Appearance features are more stable to noise, allowing for the detection of a more complete set of facial expressions, being particularly important for detecting micro-expressions.\\ Global appearance features are based on standard feature descriptors extracted on the whole facial region. Usually these descriptors are applied either over the whole facial patch or at each cell of a grid. Some examples include Gabor filters \cite{littlewort2011computer}, Local Binary Pattern (LBP) \cite{savran2014temporal,anbarjafari2013face}, Pyramids of Histograms of Gradients (PHOG) \cite{dhall2011emotion} and Multi-Scale Dense SIFT (MSDF) \cite{sun2014combining}. Learned features are usually trained through a joint feature learning and classification pipeline. The resulting features usually cannot be classified as local or global. For instance, in the case of Convolutional Neural Networks (CNN), multiple convolution and pooling layers may lead to higher-level features comprising the whole face, or to a pool of local features. This may happen implicitly, due to the complexity of the problem, or by design, due to the topology of the network. In other cases, this locality may be hand-crafted by restricting the input data. \\ Expression recognition methods can also be grouped into static and dynamic. Static models evaluate each frame independently, using classification techniques such as Bayesian Network Classifiers (BNC) \cite{sebe07, cohen03learning}, Neural Networks (NN) \cite{tian01}, Support Vector Machines (SVM) \cite{kotsia07} and Random Forests (RF) \cite{dapogny2015dynamic}. More recently, deep learning architectures have been used to jointly perform feature extraction and recognition. These approaches often use pre-training \cite{hinton06}, an unsupervised layer-wise training step that allows for much larger, unlabelled datasets to be used. CNNs are by far the dominant approach \cite{rifai12,liu2014learning,song2014deep}. It is a common approach to make use of domain knowledge for building specific CNN architectures for facial expression recognition. For example, in AU-aware Deep Networks \cite{LiuAURF}, a common convolutional plus pooling step extracts an over-complete representation of expression features, from which receptive fields map the relevant features for each expression. Each receptive field is fed to a DBN to obtain a non-linear feature representation, using an SVM to detect each expression independently. In \cite{LiuDBN} a two-step iterative process is used to train Boosted DBN (BDBN) where each DBN learns a non-linear feature from a face patch, jointly performing feature learning, selection and classifier training.\\ Dynamic models take into account features extracted independently from each frame to model the evolution of the expression over time. Probabilistic Graphical Models, such as Hidden Markov Models (HMM) \cite{koelstra10,le11,wu2015multi}, are common. Other techniques use Recurrent Neural Network (RNN) architectures, such as Long Short Term Memory (LSTM) networks \cite{wollmer2013lstm}. Some approaches classify each frame independently (e.g. with SVM classifiers \cite{geetha2009facial}), using the prediction averages to determine the final facial expression. Intermediate approaches are also proposed where motion features between contiguous frames are extracted from interest regions, afterwards using static classification techniques \cite{sebe07}. For example, statistical information can be encoded at the frame-level into Riemannian manifolds \cite{liu2014combining}.\\ \subsection{Recognizing Genuine and Unfelt Facial Expressions of Emotion} Emotion perception by humans or machines stands for the interpretation of particular representations of personal feelings and affects expressed by individuals, which may take different forms based on the circumstances governing their behaviour at the time-stamp at which they are evaluated \cite{diener2003personality,lucey2011automatically}.\\ Amongst audiovisual sources of information bearing clues to the emotions being expressed, the ones extracted from single or multiple samples of facial configurations, i.e. facial expressions, provide the most reliable basis for devising the set of criteria to be incorporated into the foregoing analysis \cite{iwasaki2016hiding,zhang2007real} and are, therefore, the most popular alternatives utilised in numerous contexts, such as forensic investigation and security. These settings often rely on the assessment of the correspondence of the displayed expression to the actual one. \section{SASE-FE Dataset} \label{sec:dataset} A number of affective portrayal databases exist; however, none meets the required criteria for our analysis of controlled genuine and unfelt emotional displays presented in high resolution at an increased frame rate. To answer those needs, the SASE-FE database was created.\\ The SASE-FE database consists of 643 different videos which had been recorded with a high resolution GoPro-Hero camera. From the inital 648 recordings, 5 were eliminated post-hoc as the participants did not completely meet the defined protocol criteria. As indicated in Table \ref{SASE-FE}, 54 participants of ages 19-36 were recorded. The reasoning behind the choice of such a young sample is that older adults have different, more positive responses than young adults about feelings and they are quicker to regulate negative emotional states than younger adults \cite{ready2016judgment,isaacowitz2012mood}. \\ Participants signed a written informed consent form after the experimental and recording procedures were explained. All participants agreed for their data to be released for research purposes and all data can be accessed by contacting the authors. The data collection and its use are based by the ethical rules stated by University of Tartu, Estonia.\\ For each recording, participants were asked to act two FEEs in a sequence, a genuine and an unfelt one. The participants displayed six universal expressions: Happiness, Sadness, Anger, Disgust, Contempt and Surprise. The subjects were asked if they felt the emotion and the large majority confirmed, but no recording of their answer was made. To increase the chances of distinguishing between the two FEEs presented in a sequence, two emotions were chosen based on their visual and conceptual differences as observed on the two dimensions of valence and arousal \cite{plutchik1970emotions,jaimes2007multimodal,noroozi2017audio,larsen2011further}. Thus a visual contrast was created by asking participants to act Happy after being Sad, Surprised after being Sad, Disgusted after being Happy, Sad after being Happy, Angry after being Happy, and Contemptuous after being Happy \cite{whitesell1989children,mathieu2005annotation}. For eliciting emotion, subjects were shown videos in line with the target emotion. Emotion elicitation through videos is a well established process in emotion science research \cite{gross1995emotion}. Videos were short scenes from YouTube selected by psychologists . Fig. \ref{vidEm} shows captures from videos that have been used for inducing specific emotions in the participants.\\ \begin{figure}[htp] \centering \subfigure[Anger] { \includegraphics[width=0.21\textwidth]{images/ang} } \subfigure[Happiness] { \includegraphics[width=0.21\textwidth]{images/hap} } \subfigure[Disgust] { \includegraphics[width=0.21\textwidth]{images/disg} } \subfigure[Sadness] { \includegraphics[width=0.21\textwidth]{images/sd} } \subfigure[Surprise] { \includegraphics[width=0.21\textwidth]{images/surp} } \subfigure[Contempt] { \includegraphics[width=0.21\textwidth]{images/cont} } \caption{A screenshot of some of the videos that have been used to induce a specific basic emotion in participants. } \label{vidEm} \end{figure} Throughout the entire setup, participants were asked to start their portrayals from the neutral face. The length of facial expression was about 3-4 seconds. After each genuine FEE, participants were asked to display a neutral state again and then the expression of a second emotion, which was the opposite of the former.\\ None of the participants were aware of the fact that they would be asked to display a second facial expression. The participant's first two seconds of behavior when performing a facial expression, and more exactly the opposite to the felt emotion, were recorded with the same device and the same configuration. As a result, for each participant we have collected 12 different videos of which 6 are genuine FEE and other 6 are unfelt FEE. The length of captured FEE is not fixed. The process has been closely supervised by experimental psychologists so that the setup would result in realistic recordings of genuine and unfelt FEE. The summary of the SASE-FE dataset is provided in Table \ref{SASE-FE}.\\% and samples of frames are shown in Fig. \ref{fig:SASE-FE}.\\ It is important to note that while preparing the SASE-FE database, introduced and used in this work, external factors such as personality or mood of the participants have been ignored, due to the fact that in order to eliminate such external factors several repetitions of the experiment would be necessary, but as a result the participant could start to learn to simulate the facial expressions better. Hence we have decided to ignore such external factors. \begin{table} \centering \caption{Summary of SASE-FE database.} \begin{tabular}{|c|c|c|} \hline \multirow{4}{*}{\textbf{Subjects}} & \# of persons & 54 \\ \cline{2-3} & gender distribution & female 41\%, male 59\% \\ \cline{2-3} & age distribution & 19 - 36 years \\ \cline{2-3} & race distribution & \parbox[t]{3.5cm}{Caucasian 77.8\%, Asian 14.8\%, African 7.4\%} \\ \hline \hline \multirow{4}{*}{\textbf{Videos}} & \# of videos & 643 \\ \cline{2-3} & video length & 3-4 sec \\ \cline{2-3} & resolution & 1280 $\times$ 960 \\ \cline{2-3} & \#frames (acted/unfelt) & 120,216/118,712 \\ \hline \end{tabular} \label{SASE-FE} \end{table} \begin{figure}[htp] \centering \subfigure[Anger] { \includegraphics[width=0.40\textwidth]{images/SASE-FE/angry} \label{fig:anger} }\quad \subfigure[Happiness] { \includegraphics[width=0.40\textwidth]{images/SASE-FE/happy} \label{fig:happiness} }\quad \iffalse \subfigure[Disgust] { \includegraphics[width=0.40\textwidth]{images/SASE-FE/disgust} \label{fig:disgust} }\quad \fi \iffalse \subfigure[Sadness] { \includegraphics[width=0.40\textwidth]{images/SASE-FE/sad} \label{fig:sad} }\quad \fi \subfigure[Surprise] { \includegraphics[width=0.40\textwidth]{images/SASE-FE/surprised} \label{fig:surprised} }\quad \iffalse \subfigure[Contempt] { \includegraphics[width=0.45\textwidth]{images/SASE-FE/contempt} \label{fig:contempt} }\fi \caption{Selected examples of pairs of sequences showing genuine (top) and unfelt (below) FEEs of Anger, Happiness and Suprise from the SASE-FE dataset.} \label{fig:SASE-FE} \end{figure} \section{The Proposed Method} \label{sec:method} In this section, we present the methodology used for recognising unfelt FEEs from video sequences. As showed in the literature (see Sec. \ref{sec:introduction} and Sec. \ref{sec:related_work}) most discriminative information is to be found in the dynamics of such FEEs. Following this assumption, we consider learning a discriminative spatio-temporal representation to be central for this problem. We first train a Convolutional Neural Network (CNN) to learn a static representation from still images and then pull features from this representation space along facial landmark trajectories. From these landmark trajectories and inspired by previous work in action recognition \cite{wang2015action}, a well studied sequence modelling problem, we build final features from sequences of varying length using a Fisher Vector encoding which we use to train a SVM for final classification.\\ Additionally, the amount of video data available is limited, which requires usage of advanced techniques when training high capacity models with millions of parameters such as CNNs. Fine-tuning existing deep architectures can alleviate this problem to a certain extent but these models might carry redundant information from the pre-trained application domain. In this paper, we use a recently proposed method \cite{ding2017facenet2expnet} which proposes a regularisation function which helps using the face information to train the expression classification net.\\ We follow this section by first discussing the technique we have used to train a CNN on still images with a limited amount of data in Sec. \ref{sec:knowledge_transfer}. Then we show how we build a spatio-temporal representation from static features computed by the CNN in Sec. \ref{sec:spatio_temporal}. The reader can refer to Fig. \ref{fig:method} for an overview of the proposed method. Specific implementation details will be presented in Sec. \ref{sec:implementation}. \begin{figure*} \centering \includegraphics[width=0.8\linewidth, height=0.47\textwidth]{images/method} \caption{Overview of the proposed method.} \label{fig:method} \end{figure*} \iffalse \begin{figure*}[h] \centering \subfigure[The Proposed Method] { \includegraphics[width=0.9\linewidth, height=0.6\textwidth]{images/method} \label{fig:sm} }\quad \subfigure[Facial Geometry] { \includegraphics[width=0.48\textwidth, height=0.15\textwidth]{images/geometry} \label{fig:geom} }\quad \subfigure[CNN Activation Map (Convolution layer 2)] { \includegraphics[width=0.48\textwidth, height=0.15\textwidth]{images/cnn_map} \label{fig:cnn_map} }\quad \caption{\textcolor{red}{Most probably will have to changed.} Overview of the propose method. (a) Diagram of the proposed automatic recognition of unfelt facial expressions of emotion method. Feature maps are computed with a VGG-Face CNN and accumulated along facial geometries. Clustering and encoding in the form of Fisher Vectors are used to produce a compact feature vector per sequence. (b) An example of detected facial geometries. (c) Example of activation maps of the CNN.} \label{fig:method} \end{figure*} \fi \subsection{Using efficient knowledge transfer for training a CNN for facial expression recognition} \label{sec:knowledge_transfer} Our proposed training procedure of the CNN for learning static spatial representation: first, we fine tune the VGG-Face network for the facial expression recognition task \cite{Parkhi15}. We then use this fine tuned network to guide the learning of a so called emotion network (EMNet) \cite{ding2017facenet2expnet}. Following \cite{ding2017facenet2expnet} the EMNet is denoted as: \begin{equation} O = h_{\theta_2}(g_{\theta_1}(I))\:, \end{equation} where $h$ represents the fully connected layers and $g$ represents the convolution layers, $\theta_2$ and $\theta_1$ are the corresponding parameters of the to be estimated of the fully connected layers and the convolution layers respectively, $I$ is the input image and $O$ is the output before the softmax.\\ We follow the two step training proposed in \cite{ding2017facenet2expnet}. The basic motivation behind this training procedure is that the fine tuned VGG-Face network already gives a competitive performance on the emotion recognition task. We use the ouyput of the VGG-Face to guide the training of the EMNet. In the first step, we estimate the parameters of the only of the convolution layers of the EMNet. In this step, the output of the VGG-Face acts as a regularisation for the emotion net. This step is achieved by maximising the following loss function: \begin{equation} L_1 = \max_{\theta_1} {\lVert g_{\theta_1(I)} - G(I) \rVert}^2_2\:, \end{equation} where, $G(I)$ is the output of the \textit{pool5} layer of the fine tuned VGG-Face network. In the second step we learn the parameters of the fully connected layer, $\theta_2$ of the EMNet by training together the convolution layers, estimated in the previous step, and the fully connected layers. This step is achieved by minimizing the cross entropy loss: \begin{equation} L_2 = -\sum_{i=1}^{N} \sum_{j=1}^{M} l_{i,j} log \hat{l}_{i,j}\:, \end{equation} where, $l_{i,j}$ is the ground truth label and $\hat{l}_{i,j}$ is the predicted label. \subsection{Learning a spatio-temporal representation} \label{sec:spatio_temporal} For learning a spatio-temporal representation of the facial video sequences we aggregate features computed by the EMNet along trajectories generated by facial geometries (we will name it TPF-FGT from Trajectory Pooled Features from Facial Geometry Trajectories). First we detect facial geometries in a form of a fixed set of fiducial points in the whole video sequence in a per-frame fashion. To compute the fiducial points we first frontalize all the cropped face with \cite{hassner2015effective}. Then on this cropped frontalized faces we estimate the facial geometry with the with the facial alignment method \cite{kazemi2014one}. This will output $68$ fiducial landmark points on each image. The detected fiducial points are tracked across the sequence to form trajectories corresponding to specific locations on the face (e.g corners of the eyes, mouth, see Fig. \ref{fig:method} for an example). We pool features along these trajectories from the EMNet feature space. Such a pooling is advantageous because it captures the temporal relations between the frames. After reducing the dimensionality of the pooled features we learn a set of clusters over the distribution of the features using Gaussian Mixture Models (GMMs). Once the clusters are learned we use Fisher Vector (FV) \cite{sanchez2013image} encoding to produce a compact feature vector for each sequence. The final vectors are used to train a linear classifier. In the rest of section we detail the main steps of the proposed method. \subsubsection{Trajectory pooled features} Given a sequence of images we can compute all corresponding facial geometries with the method previously presented. As each geometry is described by a fixed set of ordered points we can track these points along all the sequence to form trajectories. Along these trajectories we pool features from a feature space of choice. In our case, we use features computed at different layers of an EMNet. \subsubsection{Fisher Vectors} The next step is to get a single vector representation of each emotion video. On this vector an SVM classifier is trained. We choose the Fisher Vector representation for this encoding \cite{FisherJaakkola}. Each TPF is an observation vector corresponding to each landmark trajectories. We denote all the observed TPFs in the training set as $\textbf{X}$. We assume the trajectory pooled features (TPF) are drawn from a Gaussian Mixture Model (GMM). A $K$ component GMM is computed over the training set of TPF . Assuming that the observations in $\textbf{X}$ are statistically independent the log-likelihood of $\textbf{X}$ given $\vv{\theta}$ is: \begin{equation} \log P(\textbf{X}\vert\vv{\theta})=\sum_{m=1}^{M} \log \sum_{k=1}^{K} w_{k} \mathcal{N}(\vv{x}_m;\vv{\mu}_{k},(\vv{\sigma}_{k})^{2})\:, \end{equation} where $\sum_{k=1}^{K} w_{k}=1$ and $\vv{\theta}=\{ w_{k},\vv{\mu}_{k},(\vv{\sigma}_{k})^{2}\}$. We assume diagonal covariance matrices. The parameters of the per-class GMMs are estimated with the Expectation maximization (EM) algorithm to optimize the maximum likelihood (ML) criterion. To keep the magnitude of the Fisher vector independent of the number of observations in $\textbf{X}$ we normalize it by $M$. Now we can write the closed form formulas for the gradients of the log-likelihood $P(\textbf{X} \vert \vv{\theta})$ w.r.t to the individual parameters of the GMM as: \begin{equation} \vv{\mathcal{J}}^{\textbf{X}}_{w_{k}}=\frac{1}{M\sqrt{w_{k}}}\sum_{m=1}^{M}\gamma_{k}(m)-w_{k} \end{equation} \begin{equation} \vv{\mathcal{J}}^{\textbf{X}}_{\vv{\mu}_{k}}=\frac{1}{M \sqrt{w_{k}}}\sum_{m=1}^{M}\gamma_{k}(m)\Bigg(\frac{\vv{x}_m-\vv{\mu}_{k}}{(\vv{\sigma}_{k})^{2}}\Bigg) \end{equation} \begin{equation} \vv{\mathcal{J}}^\textbf{{X}}_{(\vv{\sigma}_{k})^{2}}=\frac{1}{M\sqrt{2w_{k}}}\sum_{m=1}^{M}\gamma_{k}(m)\Bigg[\frac{(\vv{x}_m-\vv{\mu}_{k})^{2}}{(\vv{\sigma}_{k})^{2}} -1\Bigg]\:, \end{equation} where $\gamma_{k}(m)$ is the posterior probability or the responsibility of assigning the observation $\vv{x}_m$ to component $k$.\\ Now the FV for each video is constructed by stacking together the derivatives computed w.r.t to the components of the GMM in a single vector. The details of all the close formed formulas can be found in the following paper \cite{JakobFisher}. \section{Experimental Results and Discussions} \label{sec:results} The experimental results have been conducted on the introduced \emph{SASE-FE} dataset. For comparison, we have replicated experiments on the \emph{Extended Cohn Kanade} (CK+) \cite{lucey2010extended} dataset and the Oulu-CASIA dataset \cite{zhao2011facial} and for spontaneous expression recognition we provide results of the BP4D-Spontaneous dataset \cite{ZHANGBP4D}. \\ Due to its relatively small size and simplicity, the CK+ is one of the most popular benchmarking datasets in the field of facial expression analysis. It contains 327 sequences capturing frontal poses of 118 different subjects while performing facial expressions in a controlled environment. The facial expressions are acted. Subjects' ages range between 18 and 50 years old, consisting of 69\% females and having relative ethnic diversity. Labels of presence of universal facial expressions and the Facial Action Units are provided. \\ The Oulu-CASIA dataset provides facial expressions of primary emotions in three different illumination scenarios. It includes 80 subjects between 23 to 58 years old from whom 73.8\% are males. Following other works \cite{ding2017facenet2expnet}, we only use the strong illumination partition of the data which consists of 480 video sequences (6 videos per subject). It has higher variation and constitutes a good complement to the CK+ for cross validating our method. We also test our method on the $12$ action unit recognition problem of in the BP4D-Spontaneous dataset. In this dataset, there are $41$ adults with $8$ videos each giving a total of $328$ videos. Each frame is annotated with $12$ facial AUs. In contrast with all previous set-ups, recognizing AUs is a multi-label classification problem. In the following sections we first discuss the implementation details of each step of the proposed methodology followed by discussion of the experimental results. \subsection{Implementation Details} \label{sec:implementation} The proposed methodology consists of the following steps: first, given a video sequence we extract faces from background, frontalize them and localize facial landmarks (see Fig. \ref{fig:alignment}). Second, we fine-tune a pretrained VGG-Face deep network \cite{Parkhi15} for recognising facial expressions. Third, we use this network for guiding the training of a so called EMNet following work proposed in \cite{ding2017facenet2expnet} (see also Sec. \ref{sec:knowledge_transfer}). This second network is used to compute static representations from still images. Fourth, we pool features from the previously computed static representation space along trajectories determined by the facial landmarks. Fifth, we compute fixed length descriptors for each video sequence using the Fisher Vector encoding. These final descriptors are then classified with a linear SVM. We use a leave-one-actor-out validation framework for all our experiments. For the theoretical framework of the spatio-temporal representation and the knowledge transfer training approach of the EMNet, please refer to Sec. \ref{sec:method}. For a visual overview of the method see Fig. \ref{fig:method}. \textbf{Preprocessing}. We first extract faces from the video sequences. After faces are extracted we perform a frontalization which registers faces to a reference frontal face by using the method of Hassner et al. \cite{hassner2015effective}. This removes variance in the data caused by rotations and scaling. This frontalization method estimates a projection matrix between a set of detected points on the input face and a reference face. This is then used to back-project input intensities to the reference coordinate system. Self-occluded regions are completed in an aesthetically pleasant way by using color information of the neighbouring visible regions and symmetry. Finally in all synthesised frontal faces we estimated the facial geometry, using a classical, robust facial alignment method \cite{kazemi2014one} trained to find 68 points on the image (an example of the frontalization process is showed in Fig. \ref{fig:alignment}). \begin{figure} \centering \includegraphics[width=0.9\linewidth, height=0.20\textwidth]{images/alignment.jpg} \caption{Illustration of the pre-processing we perform on the data. Detected faces are first extracted and frontalized and facial landmarks localised for each image in the input sequences.} \label{fig:alignment} \end{figure} \textbf{Fine-Tuning the VGG-Face}. For all experiments, including fine tuning of the VGG-FACE are done in a 10-fold cross validation for the CK+ and Oulu-CASIA datasets to keep the experiments consistent with \cite{ding2017facenet2expnet}. We define a train set of $40$ actors, validation set of $5$ actors and a test set of $5$ actors for the SASE-FE dataset. This set is exactly similar to the partitions defined in \cite{wan2017results}. Here we estimate the parameters of our proposed method on the validation set and final results are reported on the unseen test set. Here we also perform an additional experiment, since the training data is limited, we augment the training set of the SASE-FE dataset with additional training data from the Oulu-CASIA \cite{zhao2011facial} and CK+ datasets. These experiments are denoted as \textit{Data Augmentation}. The training is done for 200 epochs with a learning rate of $0.001$. It is decreased every 50 epochs. The fully connected layers are randomly initialised with the Gaussian distribution. The min-batch size is $32$ and the momentum is $0.9$. The dropout is set to $0.5$. From each frame the face is cropped and scaled to $224\times224$. The bottom two convolution layers are left unchanged. In the testing phase, if the CNN is able to recognise more than $50\%$ of the frames in the video correctly then the video is deemed to be correctly classified. For the $6$ genuine class and the $6$ unfelt class experiment the network is trained for the $12$ class problem, and the final fully connected layer is retrained with the appropriate number of classes. \textbf{Training the EMNet}. The architecture of EMNet is the same as the one proposed in \cite{ding2017facenet2expnet}. It consists of $5$ convolutional layers each followed by a ReLU activation and a max pooling layer. The filter size of the convolutions layers is $3\times3$ and that of the pooling layer is $3\times3$ with a stride of $2$. The output of each layer is $64,128,256,512,512$. Furthermore, we need to add another $1\times1$ convolutional layer to match the dimensionality of the output of the EMNet to the $pool5$ layer of the fine tuned VGG-Face net for the regularisation in the first step. We append a single fully connected layer of size $256$. We just use one layer to prevent overfitting. We use this size of $256$ for distinguishing between all multi-class experiments of classifying all emotions in the dataset. The size of the fully connected layer is further reduced to $128$ for the binary classification experiment of distinguishing between genuine and unfelt FEEs. This is because the training data available for binary classification is much less than the training data for classifying all emotion. \textbf{Trajectory pooled features (TPF)}. The TPFs from the facial geometry trajectories (TPF-FGT) are aggregated in a rectangular region of pixel size $64\times64$ which we have experimentally set. This size is scaled by a ratio of the size of the input image and the feature map from the corresponding layer of the neural network. For our experiments we use the TPF descriptors extracted from the conv5 of the EMNet. In order to train the Fisher vector for encoding we perform PCA to decorrelate the dimensions. We experimentally set the number of first principal components to $32$. \textbf{Fisher Vectors encoding and classification}. For encoding the TPFs into lower dimensional representations we used the Fisher Vector encoding. Its efficacy for video analysis has been proven for action recognition \cite{OneataFisher}. In order to train GMMs, we first decorrelate the dimensions of the TPFs with PCA and reduce its dimension to $d$. Then, we train a GMM with $k=16$ mixtures. We can use a low value for $k$ as compared to other papers in the literature because the trajectory computed on the landmarks is already discriminative as compared to the dense trajectory features. This enables us to construct a compact feature representation with FV which is also discriminative. Moreover, we square-root normalise followed by the $L2$ norm of each vector. The video is represented with a $2kd$ dimensional vector. We use the Fisher Vectors to train a linear SVM for classification. The value of the regularisation parameter is set to $C=100$. The parameters $K$ and $C$ were set using the validation set and then tested on the unknown test set of the SASE-FE dataset. \iffalse \begin{figure*} \subfigure[] { \includegraphics[width=0.96\textwidth]{images/act_Angry} \label{fig:act_angry} } \subfigure[] { \includegraphics[width=0.96\textwidth]{images/act_Surprised} \label{fig:act_Surprised} } \subfigure[] { \includegraphics[width=0.96\textwidth]{images/fake_Happy} \label{fig:fake_Happy} } \caption{Activation maps obtained from the \emph{conv4} layer of the CNN. As we can observe, most of the feature maps are activated near the eyes, nose or lips. The landmark points are superimposed on the feature maps.} \label{fig:act_maps} \end{figure*} \fi \begin{table} \centering \caption{Our method shows state-of-the-art results when compared with best performing setups on the CK+ dataset. This proves generalisation capacity of this approach.} \begin{tabular}{|c|c|} \hline \textbf{Method} & \textbf{Accuracy(\%)} \\ [0.5ex] \hline\hline AURF \cite{LiuAURF} & 92.22 \\ \hline AUDN\cite{LiuAUDN} & 93.70 \\ \hline STM-Explet\cite{STM-Expletliu2014learning} & 94.2 \\\hline LOmo \cite{Lomosikka}& 95.1 \\\hline IDT+FV \cite{idtEmotionsAfshar} & 95.80\\ \hline Deep Belief Network \cite{LiuDBN} & 96.70 \\ \hline Zero-Bias-CNN \cite{Zero-bias-CNN} & 98.4 \\\hline Ours-Final & \textbf{98.7} \\\hline \end{tabular} \label{tab:perf_ck} \end{table} \begin{table} \centering \caption{Our method shows state-of-the-art results when compared with best performing setups on the Oulu-CASIA dataset. This proves the generalization capacity of such an approach.} \begin{tabular}{|c|c|} \hline \textbf{Method} & \textbf{Accuracy (\%)} \\ [0.5ex] \hline DTAGN \cite{DTAGN} & 81.46 \\\hline LOmo \cite{Lomosikka}& 82.10 \\\hline PPDN \cite{zhao2016peak} & 84.59\\ \hline FN2EN \cite{ding2017facenet2expnet}& 87.71 \\\hline Ours-Final & \textbf{89.60} \\\hline \end{tabular} \label{tab:sota_Oulu} \end{table} \subsection{Discussion} In this section, we discuss the experimental results obtained by our proposed method. For brevity, we have denoted both in the text and figures the genuine FEE labels by adding a \emph{G} in front of the labels (e.g GSad) and the corresponding unfelt FEE by adding an \emph{U} in the same fashion (e.g UAnger). We start by discussing results on the \emph{Cohn-Kanade}, the Oulu-CASIA and BP4D-Spontaneous datasets and then we discuss the results on the proposed SASE-FE dataset. \subsubsection{CK+} The performance of several state-of-the-art methods and the performance of our final method is given in Table \ref{tab:perf_ck}. We are able to come very close to the state of the art performance on this dataset.\\ In terms of methodology, \cite{idtEmotionsAfshar} is the closest method to our proposed method. The authors of this paper implement the improved dense trajectories framework proposed for action recognition \cite{wang2013dense} for emotion recognition. We are able to improve their results by aggregating the feature maps along the fiducial points and computing the TPF-FGT features. \\ We observe that our method is better than methods which use a per frame feature representation rather than per-video as in our case \cite{Lomosikka,STM-Expletliu2014learning}. In \cite{Lomosikka}, this per-frame feature is the concatenation of SIFT features computed around landmark points, head pose and local binary patterns (LBP). They propose a weakly supervised classifier which learns the events which define the emotion as hidden variables. The classifier is a support vector machine which was estimated using the multiple-kernel learning method. From the table we can observe that when landmarks are used along with the CNN feature maps we are able to top their performance. The rest of the methods listed in the table use deep learning techniques to classify emotions \cite{LiuDBN,LiuAURF,Zero-bias-CNN}. They design networks able to specifically learn facial AUs. We can observe that we out perform the best performing method \cite{Zero-bias-CNN} on the CK+ dataset. \subsubsection{Oulu-CASIA} We also , show the efficacy of our method on a more difficult dataset like the Oulu-CASIA dataset. In Table \ref{tab:sota_Oulu} we can observe that our method outperforms the previous best performance of \cite{ding2017facenet2expnet} by $1.9\%$. In Table \ref{tab:emotionwise} we show the emotion-wise comparison between our proposed method and \cite{ding2017facenet2expnet}. The two main differences between \cite{ding2017facenet2expnet} and our method are that we align the faces and then add the TPFs for classification. In our experiments we observed that aligning the faces on the Oulu-CASIA dataset gave only very marginal improvement while once we add the TPFs for classification then we can get significant improvements. The improvements are especially observed in three emotions Anger, Disgust and Sadness. These emotions are typically confused between each other. This experiment shows that the temporal information is important for emotion recognition. \begin{table} \centering \caption{Emotion-wise comparison between our proposed method and \cite{ding2017facenet2expnet} on the Oulu-CASIA dataset.} \begin{tabular}{|c|c|c|} \hline \textbf{Emotion} & \textbf{Accuracy} \cite{ding2017facenet2expnet} (\%) & \textbf{Accuracy} \textbf{[Ours-Final]} (\%)\\[0.5ex] \hline Anger & 75.2 & 80.1 \\ \hline Disgust & 87.3 & 88.0 \\ \hline Fear & 94.9 & 95.1 \\ \hline Happiness & 90.8& 89.7 \\\hline Sadness & 88.4 & 91.3 \\\hline Surprise & 92.0 & 92.7 \\\hline\hline Average & 87.7 & 89.6 \\ \hline \end{tabular} \label{tab:emotionwise} \end{table} \subsubsection{BP4D-Spontaneous} Considerably more challenging is the recognition of spontaneous expression of emotion. For this purpose we show results on the BP4D dataset. The evaluation is done in the 3-fold cross validation framework. The evaluation metrics is F1-segment score which is the harmonic mean of the precision and recall. We do the following steps to achieve the final results. First, we finetune the VGG-FACE network on the 12 action units. We sample 100 frames as positive and 200 frames as negative examples per sequence as done in \cite{DRML}. Then we train the EMnet from VGG-FACE network to do AU recognition. From the EMnet we compute the TPF and then finally the SVM for classification of AUs. We compute a F1-segment score as opposed to F1-frame score as done in \cite{DRML} because the trajectories on the landmark-points are computed over a $16$ frame symmetric window around each frame. For each video in the dataset the first and the last $8$ frames were discarded. We found that this window size was a good choice. If a large window was used then the Fisher vectors which are constructed for the segments are not discriminative. The results of comparison of our framework with the state of the art are presented in Table \ref{BP4D}. As we can see the method trained to recognise a single emotion label does not perform competitively as compared to the state-of-the-art. This is because the methods which are designed to do AU recognition are trained via local patches as opposed to the trajectories from all the face landmarks. Since we know the location of the action units we automatically selected the trajectories to train the final SVM. For example if the AU is a lip corner depressor we choose the trajectories from the patch where the action unit is most likely to occur. We know this location because of the landmark points. This result is represented as $Ours-Final+SF$ in table \ref{BP4D}. Additionally AUs can co-occur. Therefore, we weight the final recognition scores of the SVM with the co-occurrence probability of the AU. We estimate this probability matrix from the training data. This result is shown as \textit{Proposed+ SF+ CO} in table \ref{BP4D}. This way we can show that our method is competitive for dynamic spontaneous AU recognition. If one explicitly estimates the spatial representation temporal modelling and AU correlation then this method can achieve a higher accuracy. This is done with a CNN and LSTM in \cite{CNNLSTMAU}. \begin{table}[t] \centering \caption{This table presents the comparison of our method with the state-of-the-art on the BP4D dataset.} \label{BP4D} \begin{tabular}{|l|c|} \hline \textbf{Method} & \multicolumn{1}{c|}{\begin{tabular}[c]{@{}c@{}} \textbf{Average} \\ \textbf{F1-score} \end{tabular}} \\\hline LSVM-HOG \cite{DRML} & 32.5 \\\hline JPML \cite{JPML}& 45.9 \\\hline AlexNet \cite{DRML} & 38.4 \\\hline Ours-Final & 43.6 \\\hline Ours-Final + SF & 46.8 \\\hline Ours-Final + SF + CO & 48.1 \\\hline DRML \cite{DRML}& 48.3 \\\hline CNN + LSTM \cite{CNNLSTMAU} & \textbf{53.9} \\\hline \end{tabular} \end{table} \subsubsection{SASE-FE} The set of experiments we present in this section has been designed with the purpose of exploring spatial and temporal representation for the proposed problem. We will show how results improve by increased use of domain knowledge for encoding temporal information and by using specially learned representations. Furthermore, we can see more improvement in the recognition results from learning a EMNet from a finetuned VGG-Facenet. For example, in the first conducted experiment we globally extract a handcrafted descriptor (SIFT) and we disregard any temporal information. On the proposed dataset, this produces results slightly above chance. By computing local descriptors around Improved Dense Trajectories (IDT), a proven technique in the action recognition literature, we obtain a small improvement. While the tracked trajectories follow salient points, there is no guarantee that these points are fiducial points on the face. Because fiducial points are semantically representative on the facial geometry, they are usually best for capturing local variations due to changes of expression. This assumption is confirmed by extracting local descriptors around landmark trajectories produced by the facial geometry detector. In the final setup, the best performance is obtained by extracting the representation from a feature space produced by the EMNet CNN. In Table \ref{tab:perf_sasefe} we compare the performance between the TPF-FGT obtained from the last convolution layer of both the VGG-Face and EMNet. Since the EMNet is trained only for the emotion recognition domain the performance of the EMNet is higher than that of the VGG-Face.\\ In terms of the use of temporal information several comments can be made. In line with the literature, temporal information is essential in improving recognition of subtle facial expressions. What we are presenting is by no chance an exhaustive study. While a state-of-the-art method in producing compact representations of videos, Fisher Vectors encoding disregards some of the temporal information for compactness. Other, more powerful sequential learning methods, like Recurrent Neural Networks, might be employed with better results.\\ In Fig. \ref{fig:confmat_6} we present confusion matrices for a six class classification problem on the proposed dataset. We split the classification problem in two, training on the 6 genuine and the 6 unfelt emotions respectively. On the SASE-FE, several observations can be made. Both in the case of genuine and unfelt FEE classifications, the expressions that are easier to discriminate are Happiness and Surprise. This due to their particularly distinctive morphological patterns. The most difficult expression to distinguish is contempt, which is in alignment with the literature and with the result on the CK+, the benchmark dataset as previously explained. On average, the proposed method gets better results when trying to discriminate between the genuine emotions than when discriminating between the unfelt ones. This is to be expected, taking into account that when faking the expressions, the subjects are trying to hide a different emotional state. This will introduce particular morphological and dynamical changes that makes the problem more difficult. Particularly interesting is the difficulty the classifier has in recognizing unfelt sadness. The high level of confusion with unfelt anger should be noticed along with the fact that this is not the case for genuine emotions.\\% \textcolor{red}{Any explanation?}.\\ \begin{figure}[h] \centering \iffalse \subfigure[] { \includegraphics[width=0.8\linewidth]{images/Confusion_ck_emup} \label{fig:confmat_ck} }\quad \fi \subfigure[] { \includegraphics[width=0.8\linewidth]{images/confusion6Fakeclass_finalresub_up.eps} \label{fig:confmat_6fake} }\\ \subfigure[] { \includegraphics[width=0.8\linewidth]{images/confusion6Trueclass_finalresub_up.eps} \label{fig:confmat_6true} } \caption{Confusion matrices for 6 classes classification. (a) 6 class classification on the unfelt subset of SASE-FE. (b) 6 class classification on the genuine subset of SASE-FE. Genuine FEEs are labelled with an initial 'G' and unfelt FEEs with an 'U'.} \label{fig:confmat_6} \end{figure} \begin{figure} \includegraphics[width=0.8\linewidth]{images/confusion12class_finalresub_up} \caption{Confusion matrix for 12 class classification on the SASE-FE dataset. Genuine FEE are labelled with an initial 'G' and unfelt FEE with an 'U' .} \label{fig:confmat_12} \end{figure} In Fig. \ref{fig:confmat_12} we present the confusion matrix for the problem of classifying between all 12 classes (genuine and unfelt jointly). This can be interpreted together with results in Table \ref{tab:perf_sasefe} where we present classification accuracies for each pair (genuine/unfelt). When trained with all classes, the best results are obtained for genuine sadness and the worst for genuine contempt and genuine contempt. In Table \ref{t4}, overall accuracies of especially the unfelt ones remain low, which underlines again the difficulty of the problem and suggests more powerful sequential learning tools should be employed. Interestingly, it is easiest to discriminate between genuine and unfelt expressions of anger which is due to the fact that anger is recognised a lot by the activation of muscles in the eye region. Also the results show that the recognition rate of the unfelt expressed contempt is by chance, i.e. contempt is easier to unfelt, hence more difficult to detect, and this is due to the fact that the main facial features expressing this emotion are mainly around the mouth region which can be quickly and easily moved, whereas muscles around the eyes (which are important in expressing other emotions) are not instantly deformable by signals from brain.\\ Table \ref{iccv_tab} shows the comparison of the average recognition rate for a 12-class classification between recently proposed techniques reported in \cite{wan2017results} and the proposed method. These results correspond to the winning methods from the ChaLearn international competition we organize at ICCV 2017. We outperform these winning methods. In this table, we can also observe that our proposed method outperforms the LSTM based approaches \cite{tani2004self}. This is because in the temporal stage we used a hand tuned approach which requires fewer parameters to be tuned as compared to a LSTM. This advantage would be negated on a very large datasets but nevertheless it demonstrates the efficiency of our method. \begin{table}[h] \centering \caption{Genuine vs unfelt FEE classification performance on the SASE-FE dataset.} \begin{tabular}{|c|c|c|} \hline \textbf{Emotion Pair} & \textbf{Accuracy Genuine (\%)} & \textbf{Accuracy Unfelt (\%)} \\ \hline Anger & 72.5 & 66.3 \\ \hline Happiness & 76.7 & 65.4 \\ \hline Sadness & 71.5 & 61.3 \\\hline Disgust & 66.4 & 59.7 \\\hline Contempt & 63.4 & 58.3 \\\hline Surprise & 71.3 & 63.4 \\\hline \end{tabular} \label{t4} \end{table} \begin{table}[h] \centering \caption{The average recognition rate for 12 class classification between several state-of-the-art methods \cite{wan2017results} and the proposed method; DA=Data augmentation.} \label{iccv_tab} \begin{tabular}{|c|c|} \hline \textbf{Method} & \multicolumn{1}{c|}{\begin{tabular}[c]{@{}c@{}}Accuracy \end{tabular}} \\\hline \hline Rank-SVM \cite{joachims2002optimizing} & 66.67 \\\hline LSTM-PB \cite{tani2004self} & 66.67 \\\hline CBP-SVM \cite{gao2016compact} & 65.00 \\\hline HOG-LSTM \cite{pei2017temporal} & 61.70 \\\hline CNN \cite{mallya2016learning} & 51.70 \\\hline Ours-Final & 68.7 \\\hline Ours-Final + DA & \textbf{70.2} \\\hline \end{tabular} \end{table} \begin{table}[h] \centering \caption{Performance on the SASE-FE dataset. IDT = Improved dense Trajectories, FGT= Facial Geometry Trajectories, TPF-IDT = Trajectory Pooled Features along IDT, TPF-FGT = Trajectory Pooled Features along FGT, DA = Data Augmentation, $^1$ Fine-tune, no data augment, $^2$ Fine-tune, data augment.} \resizebox{0.5\textwidth}{!}{ \begin{tabular}{|c|c|c|} \hline & {Method} & {Accuracy(\%)} \\ [0.5ex] \hline \multirow{8}{*}{{12 classes}} & SIFT+FV & 12.2 \\\cline{2-3} & TPF-FGT(SIFT)+TPF-IDT(MBH)+FV & 21.3 \\\cline{2-3} & VGG-Face$^1$ & 39.5\\\cline{2-3} & VGG-Face$^2$ & 49.8\\\cline{2-3} & TPF-FGT(VGG-Face)+FV & 50.2\\\cline{2-3} & TPF-FGT(VGG-Face)+FV+Aligned Faces & 54.3 \\\cline{2-3} & TPF-FGT(VGG-Face)+FV+Aligned Faces+DA & 60.3\\\cline{2-3} & TPF-FGT(EMNet)+FV & 65.7\\\cline{2-3} & TPF-FGT(EMNet)+FV Aligned Faces & 68.7\\\cline{2-3} & {TPF-FGT(EMNet)+FV Aligned Faces+DA} & {70.2}\\\hline \hline \multirow{7}{*}{{6 classes (genuine)}} & VGG$^1$ & 65.2\\\cline{2-3} & VGG $^2$ & 71.7\\\cline{2-3} & TPF-FGT(VGG-Face)+FV & 73.7\\\cline{2-3} & TPF-FGT(VGG-Face)+FV Aligned Faces & 74.2 \\\cline{2-3} & TPF-FGT(VGG-Face) +FV Aligned Faces+ DA & 76.5\\\cline{2-3} & TPF-FGT(EMNet) +FV & 77.2\\\cline{2-3} & TPF-FGT(EMNet) +FV Aligned Faces & 78.7\\\cline{2-3} & {TPF-FGT(EMNet) +FV Aligned Faces+ DA} & {80.3}\\\hline \hline \multirow{7}{*}{{6 classes (unfelt)}} & VGG$^1$ & 42.7\\\cline{2-3} & VGG$^2$ & 59.2\\\cline{2-3} & TPF-FGT(VGG-Face) + FV & 62.3\\\cline{2-3} & TPF-FGT(VGG-Face) + FV + Aligned Faces & 64.2 \\\cline{2-3} & TPF-FGT(VGG-Face) + FV + Aligned Faces + DA & 67.5\\\cline{2-3} & TPF-FGT(EMNet) + FV & 70.3\\\cline{2-3} & TPF-FGT(EMNet) + FV + Aligned Faces & 72.2\\\cline{2-3} & {TPF-FGT(EMNet)+FV Aligned Faces+DA (Ours-Final)} & {73.6}\\\hline \end{tabular} } \label{tab:perf_sasefe} \end{table} \iffalse \begin{figure*}[htb] \centering \begin{tabular}{@{}cccc@{}} \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/ck_vis/ck_ori9.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/ck_vis/ck_ori10.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/ck_vis/ck_ori11.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/ck_vis/ck_ori12.png}\\ \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/ck_vis/ck_map9.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/ck_vis/ck_map10.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/ck_vis/ck_map11.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/ck_vis/ck_map12.png} \\ \end{tabular} \caption{Example of activation maps obtained from the \emph{conv5} layer of the EMNet CNN for surprise facial expression of the CK+ dataset. As we can observe these feature maps activate around the lips as the emotion goes from neutral to the peak frame. The landmark points are superimposed on the feature maps. These temporal variations are captured with FGT-TPF descriptors. Best seen in colour.} \label{fig:act_map1} \end{figure*} \fi \iffalse \begin{figure*}[htb] \centering \begin{tabular}{@{}cccc@{}} \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/fake_maps/fake_ori1.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/fake_maps/fake_ori221.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/fake_maps/fake_ori241.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/fake_maps/fake_ori301.png} \\ \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/fake_maps/fake_map1.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/fake_maps/fake_map221.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/fake_maps/fake_map241.png} & \includegraphics[width=.23\textwidth, height=.23\textwidth]{images/fake_maps/fake_map301.png} \\ \end{tabular} \caption{Activation maps obtained from the \emph{conv5} layer of the EMNet CNN for Happy facial expression of the SASE-FE dataset. The landmark points are superimposed on the feature maps in green. These temporal variations are captured with FGT-TPF descriptors as the feature map changes through time. Best seen in color.} \label{fig:act_map2} \end{figure*} \fi \section{Conclusion} \label{sec:conclusion} Previous research from psychology suggests that discriminating the genuineness of feelings or intentions hidden behind facial expressions is not a well mastered skill. For this reason, we provide for the first time a dataset capturing humans while expressing genuine and unfelt facial expressions of emotion at high resolution and a high frame rate.\\ In this paper, we also propose a method inspired from action recognition and extend it to perform facial expression of emotion recognition. We combine the feature maps computed from the EMNet CNN with a facial landmark detector to compute spatio-temporal TPF descriptors. We encode these descriptors with Fisher vectors to get a single vector representation per video. The feature vector per video is used to train a linear SVM classifier. We outperform the state of the art performance on the the publicly available CK+ and Oulu-CASIA both containing posed FEEs, and show competitive results on the BP4D dataset for facial action unit recognition. Furthermore, we provide several baselines on our SASE-FE dataset. We also improve the results of the winning solutions of the recent ChaLearn competition about our dataset. We show that even though we obtain good results on the $6$ class genuine and unfelt problem, the $12$ class and the binary emotion pair classification problem still remains a challenge. This is because the distinguishing factors between the unfelt and genuine expressions occur in a very short part of the whole emotion and are a challenge to model. \\ This preliminary analysis opens several future lines of research. Our experiments showed two most important problems of current state of the art methods. Firstly, current state of the art CNNs, such as VGG-Face, do not work at the required spatial resolution to detect minute changes in facial muscle movements, which are required to differentiate and distinguish between unfelt FEEs. Secondly, alternative temporal analysis strategies could be considered to analyse SASE-FE at high fps, which may include variants of Recurrent Neural Nets or 3D-CNNs approaches. \ifCLASSOPTIONcompsoc \section*{Acknowledgments} \else \section*{Acknowledgment} \fi This work is supported Estonian Research Council Grant (PUT638), the Estonian Centre of Excellence in IT (EXCITE) funded by the European Regional Development Fund, the Spanish Project TIN2016-74946-P (MINECO/FEDER, UE) and CERCA Programme / Generalitat de Catalunya. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement Nº 665919. We gratefully acknowledge the support of NVIDIA Corporation with the donation of the Titan Xp GPU used for this research. \ifCLASSOPTIONcaptionsoff \newpage \fi \bibliographystyle{IEEEtran}
\section{Introduction} \label{sec:intro} Entanglement is one of the most remarkable aspects of quantum physics. A pure state is not separable, or entangled, if it cannot be written as a tensor product of single-party states, and a mixed entangled state is a state that cannot be written as a mixture of pure separable states. While the case of bipartite systems is well understood, the multipartite case is much more involved, as there are many ways in which a state can be entangled. A pure multipartite state may be fully separable, that is, a tensor product of pure states of each party. In such a case, there are no correlations between subsystems. A pure multipartite state may also be biseparable, if it can be written as the tensor product of two pure states under a certain bipartition of the system. The strongest form of entanglement in a multipartite state occurs when the state is not biseparable whatever the bipartition. This leads to the following definition: a genuinely $N$-partite entangled pure state is a state which is entangled (not biseparable) along any bipartition. Similar hierarchies exist for mixed states. In particular, a genuinely $N$-partite entangled mixed state is a state such that in any of its pure state decompositions, there exists at least one pure state which is genuinely $N$-partite entangled \cite{Wer89}. Or, as put by Bennett {\it et al.} \cite{Ben11}, by mixing pure states which do not have genuine $N$-partite entanglement one cannot obtain mixed states with genuine $N$-partite entanglement. In quantum physics, correlations between subsystems are central in the question of entanglement. They can lead to correlations between measurement results violating Bell inequalities, thereby discarding the possibilities of local hidden variable theories. In the case of mixed states, the distinction between classical and quantum correlations is a subtle one (see e.g.~\cite{Oll01,Hen01,Ben11}). While for pure states, correlations imply entanglement and vice versa, this is not true anymore for mixed states. It is possible to construct separable mixed states which possess quantum correlations~\cite{Oll01}. Conversely, there exist genuinely entangled $N$-qubit states with vanishing $N$-partite correlation functions~\cite{Kas08}. In \cite{Wie09,Sch15}, genuinely entangled multiphoton states with vanishing $N$-partite correlation functions were created experimentally: qubits were encoded in the polarization of photons. Entanglement in these states cannot be detected by usual multipartite Bell inequalities involving only $N$-partite correlations, which led to the construction of suitable Bell inequalities able to detect $N$-partite entanglement but involving only $(N-1)$-partite correlations~\cite{Wie12}. In \cite{Sch15}, a continuous family of genuinely entangled three-qubit states without three-partite correlations was constructed. Families of examples were obtained for any odd number of qubits in \cite{Tra17}, and an analytical construction of genuinely entangled rank-4 $N$-qubit states without $N$-partite correlations for any even number $N\geq 4$ of qubits was presented. In this paper, we investigate the case of $N$-qubit symmetric states and present a general procedure to construct families of genuinely entangled states with no $N$-partite correlations. To this end, we use the recently introduced tensor representation of spin states~\cite{Gir15} that we briefly review in Sec.~\ref{sec:tensor}. The consequences of the absence of $N$-partite correlations is expressed in terms of these tensors in Sec.~\ref{sec:symchar}. Using entanglement criteria devised in Sec.~\ref{sec:entcrit}, we fully identify the set of genuinely entangled symmetric three-qubit states with no correlations in Sec.~\ref{sec:threequbits}, and present a general construction procedure for arbitrary number of qubits in Sec.~\ref{sec:families}. \section{Mixed symmetric states in the tensor representation}\label{sec:tensor} Symmetric states of $N$ qubits are pure states which are invariant under permutation of the qubits, or mixtures of such pure states. Symmetric states can be expanded in the basis of Dicke states $\{\ket{D_N^{(k)}}:0\leq k \leq N\}$ defined by \begin{equation} \label{DickeStates} {\ket{D_N^{(k)}}=\frac{1}{\sqrt{\binom{N}{k}}}\sum_\pi \ket{\underbrace{0 \dots 0}_{N-k} \underbrace{1\dots 1}_{k}}}, \end{equation} where the sum runs over all permutations of the qubits. It is convenient to introduce the projector \begin{equation} \label{projps} P_{\mathcal{S}}=\sum_k\ketbra{D_N^{(k)}} \end{equation} onto the symmetric subspace $\mathcal{S}$ spanned by Dicke states \eqref{DickeStates}. The density matrix associated with a symmetric state can be expressed in the Dicke basis as an $(N+1)\times (N+1)$ positive semidefinite matrix of unit trace. A convenient representation for symmetric states was introduced in \cite{Gir15}. In this representation, any density matrix $\rho$ can be expressed as \begin{equation} \label{projrho} \rho=\frac{1}{2^N} x_{\mu_1\mu_2\ldots\mu_N} S_{\mu_1\mu_2\ldots\mu_N}, \end{equation} with implicit summation over indices $\mu_i$ ($1\leq i \leq N$), $0\leq\mu_i\leq 3$. Here $S_{\mu_1\mu_2\ldots\mu_N}$ are $(N+1)\times (N+1)$ Hermitian matrices defined, for $0\leqslant k,k'\leqslant N$, by their entries \begin{equation} \label{matrixS} \left(S_{\mu_1\mu_2\ldots\mu_N}\right)_{kk'}=\bra{D_N^{(k)}}\sigma_{\mu_1} \otimes \cdots \otimes \sigma_{\mu_N} \ket{D_N^{(k')}}, \end{equation} where $\sigma_{1},\sigma_2,\sigma_3$ are the three Pauli matrices (with $\sigma_0$ the $2\times 2$ identity matrix). The coordinates $x_{\mu_1\mu_2\ldots\mu_N}$ are real numbers invariant under permutation of the indices and such that \begin{equation} \label{Tensorrep} x_{\mu_1\mu_2\ldots\mu_N}=\mathrm{tr}(\rho S_{\mu_1\mu_2\ldots\mu_N}). \end{equation} Note that, since $\rho$ is a symmetric state, we denote by the same symbol its $2^N\times 2^N$ representing matrix in the computational basis and its $(N+1)\times (N+1)$ representing matrix in the Dicke basis. In particular we have $\rho=P_{\mathcal{S}}\rho P_{\mathcal{S}}$, with $P_{\mathcal{S}}$ the projector \eqref{projps}. As a consequence, using \eqref{matrixS} and \eqref{Tensorrep}, we have $\mathrm{tr}(\rho \sigma_{\mu_1} \otimes \cdots \otimes \sigma_{\mu_N})=\mathrm{tr}(\rho P_{\mathcal{S}} \sigma_{\mu_1} \otimes \cdots \otimes \sigma_{\mu_N}P_{\mathcal{S}})=\mathrm{tr}(\rho S_{\mu_1\mu_2\ldots\mu_N})=x_{\mu_1\mu_2\ldots\mu_N}$. Therefore, these coordinates have a physical interpretation in terms of correlators, as \begin{equation} \label{correl} x_{\mu_1\mu_2\ldots\mu_N}=\big\langle \sigma_{\mu_1} \otimes \cdots \otimes \sigma_{\mu_N}\big\rangle_\rho. \end{equation} Since $S_{0\ldots0}$ is the identity matrix, we have in particular $x_{0\ldots0}=\mathrm{tr}\rho=1$. Properties of the Pauli matrices imply moreover that for any $\mu_i$ \begin{equation} \label{traceless} \sum_{a=1}^3 x_{\mu_1\ldots\mu_{N-2}aa}=x_{\mu_1\ldots\mu_{N-2}00}. \end{equation} This is due to the fact that for $N=2$, we have the identity $\sum_{a=1}^3 P_{\mathcal{S}}\sigma_{a} \otimes\sigma_{a}P_{\mathcal{S}}=P_{\mathcal{S}}\sigma_{0} \otimes\sigma_{0}P_{\mathcal{S}}$. Since the $ x_{\mu_1\mu_2\ldots\mu_N}$ are invariant under permutation of indices, the position of the two indices $a$ in \eqref{traceless} does not matter. As has been shown in~\cite{Gir15}, this representation allows easily to express the $k$-qubit reduced density matrix $\rho_k$ obtained by tracing out $N-k$ qubits just by replacing the last $N-k$ indices of $x_{\mu_1\mu_2\ldots\mu_N}$ by zero. The expansion (\ref{projrho}) for $\rho_k$ thus reads \begin{equation} \label{projrhok} \rho_k=\frac{1}{2^k} x_{\mu_1\mu_2\ldots \mu_k 0\ldots 0} S_{\mu_1\mu_2\ldots\mu_k}. \end{equation} Note that, because of symmetry of $\rho$, the choice of qubits traced out does not matter. For instance for five qubits, tracing out qubits 2 and 4 gives $x_{\mu_1 0 \mu_2 0 \mu_3}=x_{\mu_1\mu_2\mu_300}$, and the coordinates of the reduced density matrix would be given by $x_{\mu_1 \mu_2 \mu_3}$, whichever pair of qubits is traced out. For single qubit states, $S_\mu=\sigma_\mu$, and the representation (\ref{projrho}) reduces to the usual Bloch representation. In the Bloch representation, a single qubit state $\rho$ can be expressed (with implicit summation over $\mu=0,\ldots,3$) as \begin{equation} \label{projrho12} \rho=\frac{1}{2} n_\mu \sigma_\mu, \end{equation} where $n$ is the 4-vector given by $n=(n_0,n_1,n_2,n_3)$ with $n_0=1$. The Bloch vector associated with the state is ${\bf n}=(n_1,n_2,n_3)=\mathrm{tr} (\rho \boldsymbol{\sigma})$, where $\boldsymbol{\sigma}=(\sigma_1,\sigma_2,\sigma_3)$. In the case of pure states, the Bloch vector ${\bf n}=(\sin\theta\cos\varphi,\sin\theta\sin\varphi,\cos\theta)$ is of unit length and we denote by $\ket{{\mathbf n}}$ the corresponding qubit state. A fully separable pure symmetric state $\ket{n}\equiv\ket{{\mathbf n}}^{\otimes N}$ is the tensor product of $N$ copies of a pure qubit state $\ket{{\mathbf n}}$. It can be expanded in the Dicke basis as \begin{equation} \label{symsep} \ket{n}=\sum_{k=0}^{N}\sqrt{\binom{N}{k}}\left[\sin\!\frac{\theta}{2}\right]^{k}\left[\cos\!\frac{\theta}{2}\,e^{-i\varphi}\right]^{N-k}\ket{D_N^{(k)}}, \end{equation} and in the representation \eqref{projrho} it can be written as~\cite{Gir15} \begin{equation} \label{projrhocoh} \ketbra{n}=\frac{1}{2^N} n_{\mu_1}n_{\mu_2}\ldots n_{\mu_N} S_{\mu_1\mu_2\ldots\mu_N}. \end{equation} Fully separable states are central in the context of entanglement of symmetric states. Indeed, let $\rho$ be an $N$-qubit symmetric state that is separable along some bipartition of the qubits. Then $\rho$ is a convex combination of pure symmetric states separable along the same bipartition (see e.g.~\cite{Boh16}, Section C). But any pure symmetric state separable along some bipartition is separable along any bipartition and thus fully separable \cite{Ich08}. Therefore, in the subspace of symmetric states, separable states coincide with the convex hull of the projectors $\ketbra{n}$. In other words, symmetric states are either genuinely entangled or fully separable. \section{Symmetric states with no $N$-partite correlations} \label{sec:symchar} \subsection{Characterization in terms of tensor coefficients} Symmetric states with no $N$-partite correlations are defined in \cite{Sch15} as states $\rho$ such that $\langle \sigma_{a_1}\otimes\cdots\otimes\sigma_{a_N}\rangle_\rho=0$ for any $a_i$ with $1\leq a_i\leq 3$ (in the present paper latin indices range from 1 to 3 while greek indices range from 0 to 3). Because of \eqref{correl}, this condition can be expressed in terms of coordinates $x_{\mu_1\mu_2\ldots\mu_N}$ as \begin{equation} \label{nocorr} x_{a_1a_2\ldots a_N}=0\qquad\forall a_i=1,2,3. \end{equation} For symmetric states, because of the relation \eqref{traceless}, the absence of $N$-partite correlations has the immediate consequence that all $(N-2k)$-partite correlations, $k=0,\ldots,\lfloor N/2 \rfloor$, vanish. If $N$ is odd, it can be expressed as the hierarchy of conditions \begin{equation} \label{nocorrsym} \begin{array}{rclrcl} x_{a_1a_2a_3\ldots a_N}&=&0&\qquad\forall a_i&=&1,2,3,\quad 1\leq i\leq N\\ x_{a_1a_2\ldots a_{N-2}00}&=&0&\qquad\forall a_i&=&1,2,3,\quad 1\leq i\leq N-2\\ &\vdots& & &\vdots& \\ x_{a_1 0 0\ldots 0}&=&0&\qquad\forall a_1&=&1,2,3. \end{array} \end{equation} If $N$ is even, it leads to $x_{0\ldots 0}=0$, which contradicts the fact that $x_{0\ldots 0}=\mathrm{tr}\rho=1$. Thus no symmetric states with no $N$-partite correlations can exist for an even number of qubits. Similarly, if $N$ is odd, no symmetric states with no $(N-1)$-partite correlations can exist. This generalises to all symmetric states the results found in~\cite{Las12} that all correlations between an odd number of subsystems vanish (and thus admit a local hidden-variable model) in an even mixture of Dicke states for any odd number of qubits. Note that because of Eq.~(\ref{projrhok}), the hierarchy of conditions \eqref{nocorrsym} implies that all $k$-qubit reduced states obtained from $\rho$ by tracing out an even number of qubits are also states with no $N$-partite correlations. Moreover, the last condition in \eqref{nocorrsym} can be rephrased as $\langle \boldsymbol{\sigma}\rangle_{\rho_1} =0$. Such states with vanishing expectation value of the spin have been called $1$-anticoherent states, by contrast with coherent states which maximize this expectation value. They are characterized by the fact that their one-qubit reduced density matrix is always the maximally mixed state~\cite{Bag14,Gir15}. Thus, all symmetric states with no $N$-partite correlations are $1$-anticoherent. As we mentioned, only symmetric states with an odd number $N=2M+1$ of qubits can be such that their $N$-partite correlations are zero. In what follows, we will restrict ourselves to this odd case, and we denote by $\mathcal{SNC}_N$ the set of symmetric $N$-qubit states with no $N$-partite correlations. \subsection{Antistates} \label{antistates} Antistates were defined in \cite{Sch15} to construct examples of genuinely entangled states with no $N$-partite correlations. In this subsection we introduce these states, and we will use them in the next subsection to characterize elements of $\mathcal{SNC}_N$. Let $\mathfrak{N}=\sigma_3\sigma_1K$ be the one-qubit universal-not operator, with $K$ the complex conjugation operator. This operator is antilinear and antiunitary, and it also satisfies $\mathfrak{N}^2=-\mathbb{1}$. For any pure state $\ket{\psi}$, its antistate $\ket{\bar{\psi}}$ is defined by applying the universal-not operator on each qubit, namely $\ket{\bar{\psi}}=\mathfrak{N}^{\otimes N}\ket{\psi}$. The antistate $\ket{\bar{\psi}}$ is orthogonal to $\ket{\psi}$. This can be checked with the explicit form of $\ket{\bar{\psi}}$ provided in \cite{Sch15}; here we give a neat proof for symmetric states, using the symmetric formalism previously introduced in Sec.~\ref{sec:tensor}. Let $\ket{\psi}$ be a symmetric $N$-qubit state. Using representation \eqref{projrho}, it can be written as $\ketbra{\psi}=2^{-N} x_{\mu_1\mu_2\ldots\mu_N}^{\psi} S_{\mu_1\mu_2\ldots\mu_N}$. Then we have \begin{equation} \langle \psi \ket{\bar{\psi}}=\mathrm{tr} \left(\ketbra{\psi}\mathfrak{N}^{\otimes N}\right) =\frac{1}{2^N} x_{\mu_1\mu_2\ldots\mu_N}^{\psi} \prod_{i=1}^N \mathrm{tr} \left(\mathfrak{N} \sigma_{\mu_i} \right). \end{equation} The second equality is obtained using Eq.~\eqref{matrixS} and the fact that the symmetric operator $\mathfrak{N}^{\otimes N}$ commutes with the projector (\ref{projps}) onto the symmetric subspace $\mathcal{S}$. Since $\mathrm{tr}({\mathfrak{N}})=0$ and $\mathfrak{N}\sigma_j+\sigma_j\mathfrak{N}=0$ for all $j$, we have that $\mathrm{tr} \left(\mathfrak{N} \sigma_{\mu} \right)=0$ for all $\mu$, which completes the proof. The antistates introduced previously exhibit an elegant geometric interpretation in the Majorana representation. This representation allows to visualize a pure symmetric state of $N$ qubits as a set of $N$ points on the unit sphere. For one qubit, this coincides with the usual Bloch representation. For several qubits, each qubit is associated to its Bloch point and symmetry allows to put all of them on the same sphere. In this picture, fully separable symmetric states correspond to $N$ degenerate points. The points of the Majorana representation of the antistate $\ket{\bar{\psi}}$ are diametrically opposite to those of the initial state $\ket{\psi}$. This is the generalization of the one-qubit case discussed in~\cite{Buz99}. \subsection{Spectral properties of $\rho\in\mathcal{SNC}_N$ \label{secspec} Let $\rho\in\mathcal{SNC}_N$ and let $\ket{\psi}$ be a normalized eigenstate of $\rho$ with eigenvalue $\lambda$. The operator $\mathfrak{N}$ has the remarkable property that its $N$-fold tensor product commutes with $\rho$. Indeed, thanks to the anticommutation property $\mathfrak{N}\sigma_j+\sigma_j\mathfrak{N}=0$ for all $j$, we have \begin{equation}\label{Nsr} \mathfrak{N}^{\otimes N}S_{\mu_1\mu_2\ldots\mu_N}=(-1)^{c(\mu_1,\ldots,\mu_N)}S_{\mu_1\mu_2\ldots\mu_N} \mathfrak{N}^{\otimes N}, \end{equation} where $c(\mu_1,\ldots,\mu_N)$ is the number of nonzero indices $\mu_i$. Using Eq.~(\ref{matrixS}) together with the fact that $\mathfrak{N}^{\otimes N}$ commutes with $P_{\mathcal{S}}$ and expressing $\rho$ in the representation \eqref{projrho} as $\rho=2^{-N} x_{\mu_1\mu_2\ldots\mu_N} S_{\mu_1\mu_2\ldots\mu_N}$, only coefficients with an even number of nonzero indices appear in the expansion because of the property \eqref{nocorrsym}. Using (\ref{Nsr}), we get $\mathfrak{N}^{\otimes N}\rho=\rho \mathfrak{N}^{\otimes N}$. As a consequence, $\rho \ket{\bar{\psi}} = \rho\mathfrak{N}^{\otimes N}\ket{\psi} = \mathfrak{N}^{\otimes N} \rho \ket{\psi}=\lambda^* \mathfrak{N}^{\otimes N} \ket{\psi}=\lambda \ket{\bar{\psi}}$. Thus $\ket{\bar{\psi}}$ is also an eigenstate of $\rho$ with eigenvalue $\lambda$ which is orthogonal to $\ket{\psi}$. If $\rho$ has an other eigenstate $\ket{\phi}$ with same eigenvalue $\lambda$ ($\ket{\phi}$ can be taken normalized and orthogonal to $\ket{\psi}$ and $\ket{\bar{\psi}}$ without loss of generality), the antistate $\ket{\bar{\phi}}$ will also be orthogonal to $\ket{\psi}$ and $\ket{\bar{\psi}}$ because $\mathfrak{N}$ is antiunitary. Repeating this procedure, we can find an orthonormal basis of the eigenspace of $\rho$ for the eigenvalue $\lambda$ containing pairs of states and antistates. Using this construction on all its eigenspaces, $\rho$ can be written as \begin{equation} \label{decomprho} \rho=\sum_{i=0}^M\lambda_i\left(\ket{\psi_i}\bra{\psi_i}+\ket{\bar{\psi}_i}\bra{\bar{\psi}_i}\right), \end{equation} where $\ket{\psi_i}$ and $\ket{\bar{\psi}_i}$ are eigenstates of $\rho$ with eigenvalue $\lambda_i$, and $\sum_i\lambda_i=1/2$. Equation~(\ref{decomprho}) implies that the eigenvalues of a state $\rho\in\mathcal{SNC}_N$ have an even degeneracy. As a consequence, the purity of $\rho$ has a lower upper bound than the usual bound $\mathrm{tr}\rho^2\leq 1$, specifically \begin{equation} \label{ineqpurity} \mathrm{tr}\rho^2\leq\frac{1}{2}. \end{equation} Indeed, the largest purity is reached when all $\lambda_i$ but one are zero. The double degeneracy and the normalization of the state imply that there are two nonzero eigenvalues, which are both equal to $1/2$, leading to a maximal purity $\mathrm{tr}\rho^2=1/2$. Since any state of the form (\ref{decomprho}) is a state with no $N$-partite correlations (as was already shown in \cite{Sch15}), this form provides a characterization of elements of $\mathcal{SNC}_N$. \section{Entanglement criteria} \label{sec:entcrit} \subsection{A sufficient entanglement criterion} A sufficient criterion for genuine entanglement was obtained in \cite{Bad08}. Following this approach we now derive a sufficient criterion for genuine entanglement of symmetric states. Let $S^2$ denote the unit sphere in $\mathbb{R}^3$, and $\ket{n}$ be the fully separable state (\ref{symsep}) associated with ${\bf n}\in S^2$. If $\rho$ is a symmetric state such that \begin{equation} \label{genuine} \forall \: {\bf n}\in S^2,\quad \bra{n}\rho\ket{n}<\mathrm{tr} \rho^2, \end{equation} then $\rho$ is genuinely entangled. Indeed, suppose $\rho$ is not genuinely entangled. Then it is fully separable and therefore can be written as a mixture of fully separable pure states $\ket{n^{(i)}}$, namely \begin{equation} \rho=\sum_ip_i\ketbra{n^{(i)}}, \end{equation} with $0<p_i\leq 1$ and $\sum_i p_i=1$. With these notations, we have \begin{equation} \begin{aligned} \label{trrho2} \mathrm{tr}\rho^2&=\sum_i p_i\bra{n^{(i)}}\rho\ket{n^{(i)}}\\ &\leqslant\max_i\;\bra{n^{(i)}}\rho\ket{n^{(i)}}, \end{aligned} \end{equation} since $p_i$ are positive and sum up to 1. The state $\ket{n^{(i)}}$ achieving the maximum in \eqref{trrho2} violates Eq.~\eqref{genuine}, hence the result. In the case where $\rho$ is of rank 2, this condition is in fact necessary and sufficient, as will be shown in Section \ref{rank2sec}. \subsection{A necessary and sufficient criterion in the three-qubit case}\label{subsec:3qubit} As we ruled out even values of $N$, the simplest nontrivial case is $N=3$. As we show below, the set of three-qubit genuinely entangled symmetric states with no three-partite correlations can be fully characterized. For $\rho\in\mathcal{SNC}_3$, Eq.~(\ref{projrho}) reduces to \begin{equation}\label{rho3} \rho=\frac{1}{8}\mathbb{1}_4+\frac{3}{8}\sum_{a,b=1}^3 A_{ab} S_{ab0}, \end{equation} with $\mathbb{1}_4$ the $4\times 4$ identity matrix, $S_{ab0}$ the matrices defined in Eq.~(\ref{matrixS}) and explicitly given by \begin{equation}\label{eq:Sab} S_{ab0}=\frac{J_a J_b + J_b J_a}{3} - \frac{\delta_{ab}}{2}\mathbb{1}_4, \end{equation} with $J_a$ the $4\times 4$ angular momentum matrices, and $A$ the $3\times3$ real symmetric matrix $(x_{ab0})_{1\leq a ,b\leq 3}$. Equation (\ref{traceless}) implies $\mathrm{tr} A=1$. The possible values of $A_{ab}$ are further constrained by the fact that $\rho$ has to be a positive semidefinite matrix. The characteristic polynomial of $\rho$ can be put under the form \begin{equation} \det(z\mathbb{1}-\rho)=\left(z^2-\frac12 z+\frac{3b}{16}\right)^2, \end{equation} with $b=(1-\mathrm{tr} A^2)/2$. This readily implies that the eigenvalues of $\rho$ are nonnegative if and only if $b\geq 0$, that is, $\mathrm{tr} A^2\leq 1$. For a state $\rho$ acting on a Hilbert space $\mathcal{H}_1\otimes\mathcal{H}_2$ with $\mathcal{H}_1$ isomorphic to $\mathbb{C}^2$ and $\mathcal{H}_2$ isomorphic to $\mathbb{C}^3$, a necessary and sufficient condition of separability is the celebrated Peres-Horodecki criterion~\cite{Hor96}. This criterion states that the partial transpose of $\rho$ is positive semidefinite if and only if $\rho$ is separable. Since any fully symmetric three-qubit state can be expressed in the canonical basis of $\mathbb{C}^{2}\otimes \mathbb{C}^{3}$, we can apply this criterion to $\rho\in\mathcal{SNC}_3$~(see e.g.~\cite{Aug12}). Here, we will denote by $\rho^{\mathrm{PT}}$ the partial transpose performed on the first qubit (since we are dealing with symmetric states, the qubit on which the partial transpose is performed does not matter). In~\cite{Boh16}, it was shown that $\rho^{\mathrm{PT}}$ is positive semidefinite if and only if an Hermitian $8\times 8$ matrix $T$ given in terms of $x_{\mu_1\mu_2\mu_3}$ is positive semidefinite (the explicit expression for $T$ can be found at Eq.~(44) of Ref.~\cite{Boh16}). From this explicit form and using the relations (\ref{nocorrsym}), it can be checked that the characteristic polynomial of $T$ can be expressed as $\det(z\mathbb{1}_8-T)= z^2 q(z)^2$ with \begin{equation}\label{charpolT} \begin{aligned} q(z)={}&z^3-2z^2+3\frac{(\mathrm{tr} A)^2-\mathrm{tr} A^2}{2}z\\ & -2\frac{(\mathrm{tr} A)^3-3(\mathrm{tr} A)^2\mathrm{tr} A^2+2\mathrm{tr} A^3}{3}. \end{aligned} \end{equation} The matrix $T$ is positive semidefinite if and only if all roots of $q(z)$ are nonnegative. Moreover, the characteristic polynomial of $A$ is $\det(z\mathbb{1}_3-A)$ and reads \begin{equation}\label{charpolA} \begin{aligned} &z^3-z^2+\frac{(\mathrm{tr} A)^2-\mathrm{tr} A^2}{2}z\\ &-\frac{(\mathrm{tr} A)^3-3(\mathrm{tr} A)^2\mathrm{tr} A^2+2\mathrm{tr} A^3}{6}. \end{aligned} \end{equation} From Eqs.~(\ref{charpolT}) and (\ref{charpolA}), it appears that the roots of $q(z)$ are all nonnegative if and only if the roots of $A$ are all nonnegative (this follows from Descartes' rule of signs). Thus, $\rho^{\mathrm{PT}}$ is positive semidefinite if and only if $A$ is positive semidefinite. This provides a necessary and sufficient separability criterion in terms of the matrix $A$, namely $A\geq 0$. Using \eqref{correl}, we can see $A$ as the two-partite correlation matrix $A=(\langle \sigma_{ab}\rangle)_{1\leq a,b\leq 3}$, with $\sigma_{ab}=\sigma_a\otimes\sigma_b\otimes \mathbb{1}_2$ and $\langle \sigma_{ab}\rangle_\rho=\mathrm{tr} (\rho\,\sigma_{ab})$. The necessary and sufficient separability criterion can then be reformulated, for any $\rho\in\mathcal{SNC}_3$, as \begin{equation}\label{rhosepApos3} \rho~\mathrm{separable}\;\Leftrightarrow\; \begin{pmatrix} \langle \sigma_{11}\rangle_\rho & \langle \sigma_{12}\rangle_\rho & \langle \sigma_{13}\rangle_\rho \\ \langle \sigma_{21}\rangle_\rho & \langle \sigma_{22}\rangle_\rho & \langle \sigma_{23}\rangle_\rho \\ \langle \sigma_{31}\rangle_\rho & \langle \sigma_{32}\rangle_\rho & \langle \sigma_{33}\rangle_\rho \end{pmatrix} \geq 0. \end{equation} Let us now consider the two-qubit reduced density matrix $\rho_{2}$ of $\rho\in\mathcal{SNC}_3$. According to Eq.~(\ref{projrhok}), the tensor coordinates of $\rho_{2}$ are the $x_{\mu_1\mu_20}$. From Ref.~\cite{Boh16}, the partial transpose $\rho_2^{\mathrm{PT}}$ is positive semidefinite if and only if the $4\times 4$ matrix $(x_{\mu_1\mu_20})_{0\leq\mu_1,\mu_2\leq 3}$ is positive semidefinite. This latter matrix is block-diagonal, with upper left $1\times1$ block being the identity and the bottom right $3\times3$ block given by matrix $A$. Therefore positivity of $(x_{\mu_1\mu_20})_{0\leq\mu_1,\mu_2\leq 3}$ is equivalent to positivity of $A$. These equivalences together with the result \eqref{rhosepApos3} show that for any $\rho\in\mathcal{SNC}_3$, \begin{equation} \rho~\mathrm{separable}\;\Leftrightarrow\;\rho_2~\mathrm{separable}. \end{equation} In physical terms, this means that one cannot end up in a separable state by tracing out one qubit from an entangled three-qubit symmetric state with no three-partite correlations. Therefore, the entanglement in such states has some robustness. \subsection{Other sufficient entanglement criteria} The above criterion for three-qubit states also provides us with a sufficient entanglement criterion in the general $N$-qubit case. Indeed, if $\rho\in\mathcal{SNC}_N$ is separable, then its three-qubit reduced density matrix $\rho_3$ is separable. Using (\ref{rhosepApos3}) and (\ref{projrhok}), we get a sufficient entanglement condition for $\rho$: if the $3\times 3$ matrix $A=(\langle \sigma_{ab}\rangle_\rho)_{1\leq a,b\leq 3}$, with $\sigma_{ab}=\sigma_a\otimes\sigma_b\otimes \mathbb{1}_2\otimes \cdots\otimes\mathbb{1}_2$, is not positive semidefinite, then $\rho$ is genuinely entangled. This is reminiscent of the entanglement criteria obtained for pure states in \cite{Mar13} based on two-point correlations. It is in fact possible to obtain many more sufficient entanglement criteria from the PPT criteria applied to $\rho$ or to its $k$-qubit reduced density matrices. As shown in~\cite{Boh16}, the partial transpose matrices, and their positivity, can be expressed in terms of the $x_{\mu_1\ldots\mu_N}$ in a simple way. As we saw above, the partial transpose $\rho_2^{\mathrm{PT}}$ can be related with the $4\times 4$ matrix $(x_{\mu_1\mu_20})_{0\leq\mu_1,\mu_2\leq 3}$ and positivity of $\rho_2^{\mathrm{PT}}$ is equivalent to the right-hand side of (\ref{rhosepApos3}). Similarly, positivity of the partial transpose $\rho_4^{\mathrm{PT}}$ is equivalent to positivity of the $16\times 16$ matrix indexed by the 16 pairs $(\mu_1,\mu_2)$ and $(\mu_3,\mu_4)$ and whose entries are the $x_{\mu_1\mu_2 \mu_3 \mu_4 0}$. All criteria that can be obtained in the same way lead to sufficient conditions of genuine entanglement in terms of correlators. However, these criteria lead to conditions that involve polynomials of high degree in $x_{\mu_1\ldots\mu_N}$ (the simple criterion $A\geq 0$ yields a polynomial of degree 3 in the $x_{ab0}$). In contrast, the criterion (\ref{genuine}) is of degree 2, and thus easier to deal with. In Sec.~\ref{sec:families}, our construction will be based on criterion (\ref{genuine}). \section{Application to three-qubit states} \label{sec:threequbits} Although we obtained a necessary and sufficient condition for three qubits in Sec.~\ref{sec:entcrit}, it is instructive to apply our general approach based on criterion (\ref{genuine}) to this simple case. Condition \eqref{nocorrsym} implies that for a state $\rho$ in the representation \eqref{projrho} one has $x_{abc}=0$ and $x_{a00}=0$ for $a,b,c=1,2,3$. The only nonzero coordinates $x_{\mu_1\mu_2\mu_3}$ are the $x_{ab0}$ for $1\leq a,b\leq 3$, and $x_{000}=1$, leading to the representation (\ref{rho3}). We label by $\alpha_i$ the eigenvalues of $A$. One easily calculates $\bra{n}\rho\ket{n}=(1+3\,{\bf n}^TA{\bf n})/8$ and $\mathrm{tr}\rho^2=(1+3\,\mathrm{tr} A^2)/8$, so that condition \eqref{genuine} becomes \begin{equation} \forall \: {\bf n}\in S^2,\qquad {\bf n}^TA{\bf n}<\mathrm{tr} A^2. \end{equation} In terms of the eigenvalues of $A$, this condition can be reexpressed as \begin{equation} \label{condN3} \max_i\alpha_i<\sum_i\alpha_i^2. \end{equation} As discussed above, since $\rho$ has to be a semidefinite positive matrix, $A$ must be such that $\mathrm{tr} A^2\leq 1$. Taking into account the fact that $\mathrm{tr} A=1$, the $\alpha_i$ must fulfill the two additional constraints \begin{equation} \label{addconstr} \sum_i\alpha_i^2\leq 1\quad \textrm{and}\quad\sum_i\alpha_i=1. \end{equation} Among the set of triplets $(\alpha_1,\alpha_2,\alpha_3)\in\mathbb{R}^3$ fulfilling the conditions \eqref{addconstr}, one can easily find those verifying condition \eqref{condN3}. They are depicted in Fig.~\ref{fig1}. Equation (\ref{addconstr}) imposes that they are restricted to the plane $\sum_i\alpha_i=1$ and to the interior of the sphere $\sum_i\alpha_i^2\leq 1$ (see Fig.~\ref{fig1}). The equality $\alpha_1=\sum_i\alpha_i^2$ is the equation of a sphere of radius $1/2$ and center $(1/2,0,0)$, whose intersection with the plane is a circle. A similar analysis for $\alpha_2$ and $\alpha_3$ implies that the solutions to \eqref{condN3} lie strictly outside the three solid red circles of Fig.~\ref{fig1}. Finally, the triplets of solutions of \eqref{condN3} and \eqref{addconstr} lie in the region between the dashed blue circle and the solid red trilobe in Fig.~\ref{fig1}. These points correspond to the genuinely entangled states detected by the sufficient criterion (\ref{genuine}).\\ For $\rho\in\mathcal{SNC}_3$, the criterion \eqref{rhosepApos3} gives us a necessary and sufficient entanglement criterion in terms of the matrix $A$ defined above. Thus $\rho$ is separable if and and only if all $\alpha_i$ are nonnegative. In Fig.~\ref{fig1}, the corresponding region is the green triangle up and its interior. Hence $\rho$ is genuinely entangled if and only if its associated point lies outside the triangle but inside the dashed blue circle. Points outside the triangle but inside the trilobe are associated with genuinely entangled states not detected by criterion (\ref{genuine}). \begin{figure} \centering \includegraphics*[width=0.8\linewidth]{fig1.eps} \caption{Three-qubit symmetric states in the space of eigenvalues $\alpha_i$ of $A$. The orange plane (triangle down) corresponds to the condition $\mathrm{tr} A=\sum_i\alpha_i=1$. Points inside the dashed blue circle defined by $\mathrm{tr} A^2=\sum_i\alpha_i^2=1$ correspond to physical states $\rho\geq 0$. Points inside the green triangle up, defined by $\alpha_i\geq 0$, correspond to separable states. Points outside the green triangle up and inside the dashed blue circle correspond to genuinely entangled states. Points lying between the dashed circle and the solid red trilobe defined by $\max_i\alpha_i=\sum_i\alpha_i^2$ correspond to genuinely entangled states detected by the sufficient criterion (\ref{genuine}).} \label{fig1} \end{figure} \section{Construction of families} \label{sec:families} \subsection{Rank-2 density matrices}\label{rank2sec} \subsubsection{A necessary and sufficient entanglement criterion} \label{rank2abs} Let $\rho\in\mathcal{SNC}_N$ be of rank 2; it has two nonzero eigenvalues, which have to be equal according to the results of section \ref{antistates}. Since $\mathrm{tr}\rho=1$, both eigenvalues are equal to $1/2$, so that there exists a pure state $\ket{\psi}$ such that \begin{equation} \label{rhorank2} \rho=\frac12\ketbra{\psi}+\frac12\ketbra{\bar{\psi}}. \end{equation} Any fully separable pure symmetric state $\ket{n}$ can be decomposed as \begin{equation} \ket{n}=\langle \psi|n\rangle \ket{\psi}+\langle\bar{\psi}|n\rangle \ket{\bar{\psi}}+\ket{\phi}, \end{equation} where $\ket{\phi}$ is orthogonal to both $\ket{\psi}$ and $\ket{\bar{\psi}}$ (we recall that the latter two states are orthogonal). The overlap $\bra{n}\rho\ket{n}$ then reads \begin{equation} \label{nrhon} \bra{n}\rho\ket{n}=\frac12|\langle \psi|n\rangle|^2+\frac12|\langle\bar{\psi}|n\rangle |^2=\frac12\left(1-\langle \phi|\phi\rangle\right). \end{equation} Since for the state $\rho$ given by Eq.~(\ref{rhorank2}), one has $\mathrm{tr}\rho^2=1/2$, Eq.~(\ref{nrhon}) yields \begin{equation}\label{rank2cond} \bra{n}\rho\ket{n}\leq \frac{1}{2}=\mathrm{tr}\rho^2. \end{equation} Thus, inequality or equality is always achieved in \eqref{genuine}. In fact, Eq.~(\ref{genuine}) is a necessary and sufficient condition for genuine entanglement in the case of rank-2 density matrices. Indeed, suppose Eq.~(\ref{genuine}) is violated for some $\ket{n}$. Then, from Eq.~(\ref{rank2cond}) one must have $\bra{n}\rho\ket{n} = \mathrm{tr}\rho^2=1/2$ which using \eqref{nrhon} implies that $\ket{\phi}=0$, so that $\ket{n}$ lies in the subspace spanned by $\ket{\psi}$ and $\ket{\bar{\psi}}$, which is the eigenspace of $\rho$ associated with eigenvalue $1/2$. In particular one must have the decomposition \begin{equation} \label{rhorank2beta} \rho=\frac12\ketbra{n}+\frac12\ketbra{\bar{n}}. \end{equation} Therefore, $\rho$ is a mixture of two fully separable states, thus $\rho$ is separable. Hence, if $\rho$ is genuinely entangled, then Eq.~(\ref{genuine}) must hold. Thus, a rank-2 state $\rho\in\mathcal{SNC}_N$ is genuinely entangled if and only if \begin{equation} \label{genuinerank2} \forall\: {\bf n}\in S^2,\quad \bra{n}\rho\ket{n}<\frac{1}{2}. \end{equation} It is separable if and only if there exists $\ket{n}$ such that $\bra{n}\rho\ket{n} = \mathrm{tr}\rho^2=1/2$, which is equivalent to \eqref{rhorank2beta}. \subsubsection{A necessary separability criterion} Let $\rho$ be a rank-2 symmetric state of the form \eqref{rhorank2}, thus with no $N$-partite correlations. Expressing \eqref{rhorank2} in terms of the coordinates $x^\rho_{\mu_1\mu_2\ldots\mu_N}$ of $\rho$ and the coordinates $x^\psi_{\mu_1\mu_2\ldots\mu_N}$ of $\ketbra{\psi}$ in the expansion (\ref{projrho}), we get \begin{equation} x^\rho_{\mu_1\mu_2\ldots\mu_N}=\frac{1+(-1)^{c(\mu_1,\ldots,\mu_N)}}{2}x^\psi_{\mu_1\mu_2\ldots\mu_N}, \end{equation} where $c(\mu_1,\ldots,\mu_N)$ is the number of nonzero indices $\mu_i$. According to the previous subsection, it is separable if and only if it can be written as in~\eqref{rhorank2beta}. In terms of tensor coordinates, it is equivalent to \begin{equation} x^\rho_{\mu_1\mu_2\ldots\mu_N}=\frac{1+(-1)^{c(\mu_1,\ldots,\mu_N)}}{2}n_{\mu_1}\ldots n_{\mu_N}. \end{equation} This implies that for an even number of nonzero indices, we have $x_{\mu_1\ldots\mu_n}^{\rho}=n_{\mu_1}\ldots n_{\mu_N}=x^\psi_{\mu_1\mu_2\ldots\mu_N}$. In particular, if all but two indices are zero, we have $x^\rho_{ab 0\ldots 0}=n_an_b$, so that the matrix $A=(x^\rho_{ab 0\ldots 0})_{1\leq a,b\leq 3}=(x^\psi_{ab 0\ldots 0})_{1\leq a,b\leq 3}=(\langle \sigma_{ab}\rangle_\rho)_{1\leq a,b\leq 3}$ is of rank one, where $\sigma_{ab}=\sigma_a\otimes\sigma_b\otimes \mathbb{1}_2\otimes \cdots\otimes\mathbb{1}_2$. We therefore get the following necessary condition for separability of rank-2 states, \begin{equation}\label{sepcrit} \rho~\mathrm{separable}\quad\Rightarrow\quad \mathrm{rank}A=1. \end{equation} \subsubsection{Explicit examples} The above considerations allow us to construct families of genuinely entangled states of $\mathcal{SNC}_N$. Indeed, for any state $\ket{\psi}$, the mixed state $\rho=(\ket{\psi}\bra{\psi}+\ket{\bar{\psi}}\bra{\bar{\psi}})/2$ has no $N$-partite correlations. Choosing $\ket{\psi}$ in such a way that $A=(x^\psi_{ab 0\ldots 0})_{1\leq a,b\leq 3}$ is not of rank one warrants that $\rho$ is also genuinely entangled. This construction can be achieved for instance for $\ket{\psi}=(\ket{D_{N}^{(r)}}+\ket{D_{N}^{(N-r)}})/\sqrt{2}$, which is a superposition of two Dicke states defined in \eqref{DickeStates}. Such states have already been studied in \cite{Tra17}. Here they provide a simple illustration of the rank-2 entanglement criterion derived in Section \ref{rank2abs}. The coefficients of the matrix $A^{\psi}$ are $x_{ab0\ldots0}^{\psi}=\bra{\psi}\sigma_{ab}\ket{\psi}$, so that \begin{equation} \begin{aligned} x_{ab0\ldots0}^{\psi}=\frac{1}{2} & \left(\bra{D_{N}^{(r)}}\sigma_{ab}\ket{D_{N}^{(r)}}\right.+\bra{D_{N}^{(N-r)}}\sigma_{ab}\ket{D_{N}^{(N-r)}}\\[0.2cm] &+\bra{D_{N}^{(r)}}\sigma_{ab}\ket{D_{N}^{(N-r)}}\left.+\bra{D_{N}^{(N-r)}}\sigma_{ab}\ket{D_{N}^{(r)}}\right). \end{aligned} \label{xabrk2} \end{equation} The last two terms of Eq.~(\ref{xabrk2}) can be shown to vanish for odd $N$ through an argument on the parity of the number of excitations \cite{Tra17}. In order to apply $\sigma_{ab}$ on the Dicke states, we decompose them as \begin{multline} \ket{D_{N}^{(r)}}= \sqrt{\frac{\binom{N-2}{r}}{\binom{N}{r}}}\ket{00}\ket{D_{N-2}^{(r)}} +\sqrt{\frac{\binom{N-2}{r-2}}{\binom{N}{r}}}\ket{11}\ket{D_{N-2}^{(r-2)}}\\ +\sqrt{\frac{\binom{N-2}{r-1}}{\binom{N}{r}}}(\ket{01}+\ket{10})\ket{D_{N-2}^{(r-1)}}. \end{multline} Equation \eqref{xabrk2} then reduces to \begin{multline}\label{xab} x_{ab0\ldots0}^{\psi}=\frac{2r(N-r)}{N(N-1)}(\delta_{a,1}\delta_{b,1}+\delta_{a,2}\delta_{b,2})\\+\frac{(N-2r)^2-N}{N(N-1)}\delta_{a,3}\delta_{b,3}. \end{multline} The rank of $A^{\psi}$ is then equal to one if $r=0$ or $N$, to two if $r=(N-\sqrt{N})/2$, and to three otherwise. Thus, any mixed state defined by \eqref{rhorank2} with $\ket{\psi}=(\ket{D_{N}^{(r)}}+\ket{D_{N}^{(N-r)}})/\sqrt{2}$ and $1\leq r\leq N-1$ is a genuinely entangled state of $\mathcal{SNC}_N$. \subsection{Arbitrary rank} \subsubsection{General construction} The above construction can be generalized to any even rank (as shown in Sec.~\ref{secspec}, any genuinely entangled $N$-qubit state with no $N$-partite correlation has its eigenvalues always twice degenerate, so that no odd-rank example can exist). From the decomposition \eqref{decomprho} of any state in $\mathcal{SNC}_N$, the sufficient genuine entanglement criterion \eqref{genuine} can be expressed as \begin{equation} \forall \:{\bf n}\in S^2,\quad \sum_{i=0}^{M}\lambda_i\left(\left|\bra{\psi_i}n\rangle\right|^2+\left|\bra{\bar{\psi}_i}n\rangle\right|^2\right) < 2\sum_{i=0}^M\lambda_i^2, \end{equation} with $\ket{n}$ a pure symmetric fully separable state. This criterion can be rewritten as \begin{equation}\label{sphere} \forall {\bf n}\in S^2,\quad \sum_{i=0}^{M}(\lambda_i-c_i({\mathbf n}))^2>\sum_{i=0}^Mc_i({\mathbf n})^2, \end{equation} where $c_i({\mathbf n})=(|\bra{\psi_i}n\rangle|^2+|\bra{\bar{\psi}_i}n\rangle|^2)/4$. Thus, if for all ${\mathbf n}$, the vector $(\lambda_0,\ldots,\lambda_M)$ is outside the sphere $S({\mathbf n})$ centered at $C({\mathbf n})=(c_0({\mathbf n}),\ldots,c_M({\mathbf n}))$ and going through the origin, then the state \eqref{decomprho} is genuinely entangled. Let us explain how to construct arbitrary-rank examples. It suffices that one of the $\ket{\psi_i}$ in \eqref{decomprho}, for example $\ket{\psi_{i_0}}$, be such that $A=(x^{\psi_{i_0}}_{ab 0\ldots 0})_{1\leq a,b\leq 3}$ is of rank two or three, so that $\rho_{i_0}=\left(\ket{\psi_{i_0}}\bra{\psi_{i_0}}+\ket{\bar{\psi}_{i_0}}\bra{\bar{\psi}_{i_0}}\right)/2$ is genuinely entangled according to Eq.~\eqref{sepcrit}. Then, the vector $E=(0,\ldots,0,1/2,0,\ldots,0)\in \mathbb{R}^M$, where the nonzero component is the ${i_0}$th, is outside all spheres $S({\mathbf n})$ since Eq.~(\ref{sphere}) reduces in this case to $c_{i_0}({\mathbf n})<1/4$, which according to Eq.~(\ref{genuinerank2}) is equivalent to the fact that $\rho_{i_0}$ is genuinely entangled. Thus, for any fixed ${\mathbf n}$, the distance $d(E,S({\mathbf n}))$ between $E$ and the sphere $S({\mathbf n})$ is such that $d(E,S({\mathbf n}))>0$. Since ${\mathbf n}$ is parametrized by spherical angles $\theta$ and $\varphi$ which vary in the compact set $[0,\pi]\times[0,2\pi]$, the minimum of $d(E,S({\mathbf n}))$ over all ${\mathbf n}$ is reached for some ${\mathbf n}_0$, so that $\inf_{\mathbf n} d(E,S({\mathbf n}))=d(E,S({\mathbf n}_0))>0$. Therefore, there are vectors $(\lambda_0,\ldots,\lambda_M)$ in the vicinity of $E$ such that $\lambda_i\geq0$, $\sum_{i=0}^M\lambda_i=1/2$ and the genuine entanglement criterion \eqref{sphere} is fulfilled. This shows that once $\ket{\psi_{i_0}}$ has been chosen as explained above, any choice of $\ket{\psi_i}$ with $i\ne {i_0}$ allows to construct a state of arbitrary rank of the form \eqref{decomprho} which for some values of the weights $\lambda_i$ is guaranteed to be a genuinely entangled state of $\mathcal{SNC}_N$. \subsubsection{Explicit examples} As an illustration, we consider the case where $\ket{\psi_i}$ in (\ref{decomprho}) are chosen as \begin{equation}\label{psiDicke} \ket{\psi_i}=\frac{1}{\sqrt{2}}(\ket{D_{N}^{(i)}}+\ket{D_{N}^{(N-i)}}),\quad 0\leq i\leq M. \end{equation} According to Eq.~(\ref{xab}), any choice $i_0\ne 0$ yields a rank-2 state $\rho_{i_0}=\left(\ket{\psi_{i_0}}\bra{\psi_{i_0}}+\ket{\bar{\psi}_{i_0}}\bra{\bar{\psi}_{i_0}}\right)/2$ which is genuinely entangled. In the vicinity of each $E=(0,\ldots,0,1/2,0,\ldots,0)\in \mathbb{R}^M$, there exist values of $\lambda_i$ giving arbitrary rank genuinely entangled states. \begin{figure*} \centering \begin{tabular}{cc@{\hspace{2cm}}c} (a) && (b) \\[4pt] \raisebox{-.5\height}{\includegraphics*[width=0.325\linewidth]{fig2a.eps}} && \raisebox{-.5\height}{\includegraphics*[width=0.35\linewidth]{fig2b.eps}} \end{tabular} \caption{Three-qubit (a) and five-qubit (b) symmetric states in the space of eigenvalues of $\rho$. The orange line $\lambda_0+\lambda_1=1/2$ for $N=3$, and the large orange triangle down for $N=5$ correspond to the condition $\mathrm{tr} \rho=2\sum_i\lambda_i=1$. Points where all $\lambda_i\geq 0$ correspond to physical states $\rho\geq 0$ and are depicted by the thick green line $0\leq\lambda_0\leq 1/2$ for $N=3$, the green triangle up for $N=5$. In (a) and (b), the equality in (\ref{eqn:sphere}) is the dashed blue curve and the numerically solved criterion (\ref{genuine}) is the solid red curve. In (a), the dotted straight line is the analytical result $\lambda_1=3\lambda_0$. In (b), only the intersection with the normalization plane is depicted.} \label{fig2} \end{figure*} In order to give an explicit region in parameter space where the constructed states are genuinely entangled, we use the explicit form of the $\ket{\psi_i}$. Since the antistate of a Dicke state is $\ket{\bar{D}_N^{(k)}}=(-1)^{N-k}\ket{D_N^{(N-k)}}$, it comes that $\ket{\psi_i}\bra{\psi_i}+\ket{\bar{\psi}_i}\bra{\bar{\psi}_i}=\ket{D_N^{(i)}}\bra{D_N^{(i)}}+\ket{D_N^{(N-i)}}\bra{D_N^{(N-i)}}$, which yields \begin{equation} \bra{n}\rho\ket{n}=\sum_{i=0}^{M}\lambda_i\left(\big|\bra{D_N^{(i)}}n\rangle\big|^2+\big|\bra{D_N^{(N-i)}}n\rangle\big|^2\right). \end{equation} Using the expansion (\ref{symsep}), we get \begin{equation}\label{trig} \bra{n}\rho\ket{n}=\sum_{i=0}^{M}\lambda_i u_i(\theta), \end{equation} with $u_i(\theta)$ defined as \begin{equation} \binom{N}{i}\left[\frac{\sin\theta}{2}\right]^{2i}\frac{\left(1-\cos\theta\right)^{N-2i}+\left(1+\cos\theta\right)^{N-2i}}{2^{N-2i}}. \end{equation} One therefore has the upper bound \begin{equation}\label{trigN} \bra{n}\rho\ket{n}\leq \sum_{i=0}^{M}\lambda_i \,\max_{\theta}u_i(\theta). \end{equation} Taking $\lambda_i$ such that $\sum_i\lambda_i \,\max_{\theta}u_i(\theta)<2\sum_i\lambda_i^2$ ensures that the state $\rho$ is genuinely entangled. This inequality gives a constraint on the weight of $\rho_{i_0}$ in the mixture $\rho$ given by Eq.~(\ref{decomprho}), which cannot be too small. For arbitrary $N$, one can find a less stringent analytical bound. Since the function $f_k(x)=[(1-\cos x)^k+(1+\cos x)^k]/2^k$ takes values between 0 and 1, we have $u_i(\theta)\leq \binom{N}{i}2^{-2i}$ so that any state with $\lambda_i$ such that \begin{equation} \sum_{i=0}^{M}\binom{N}{i}\frac{\lambda_i}{2^{2i}}<2\sum_{i=0}^{M}\lambda_i^2, \label{eqn:sphere} \end{equation} $\lambda_i\geq 0$ and $\sum_{i=0}^{M}\lambda_i=1/2$ is genuinely entangled. As previously, if the vector $(\lambda_0,\ldots,\lambda_M)$ is outside the sphere $S$ centered at $C=(c_0,\ldots,c_M)$ with $c_i=\binom{N}{i}2^{-(2i+1)}$ and going through the origin, then the state \eqref{decomprho} with $\ket{\psi_i}$ given by \eqref{psiDicke} is genuinely entangled. The intersection of the outside of the sphere with the region $\lambda_i\geq 0$ and the plane $\sum_{i=0}^{M}\lambda_i=1/2$ is nonempty. Indeed, the point $E=(0,\ldots,0,1/2)\in \mathbb{R}^M$ lies strictly outside the sphere if and only if $c_{M}<1/4$, which is the case since $\binom{2M+1}{M}<4^M$ for all $M\geq1$. The distance $d$ from $E$ to the sphere constrained by the condition $\sum_{i=0}^{M}\lambda_i=1/2$ can be obtained by introducing Lagrange multipliers. All $\lambda_i$ with $\lambda_i\geq 0$, $\sum_{i=0}^{M}\lambda_i=1/2$ and at a distance less than $d$ from $E$ give genuinely entangled states. For $N=3$, the point on the sphere $S$ and the plane $\lambda_0+\lambda_1=1/2$ which is closest to $E=(0,1/2)$ is $(\lambda_0,\lambda_1)=(1/16,7/16)$. Thus all states with $\lambda_1>7/16$ are genuinely entangled. In fact, in this case, we have the necessary and sufficient condition of Sec.~\ref{subsec:3qubit} which reads $A\geq 0$. Using Eq.~(\ref{xab}), this is equivalent to $\lambda_0\geq \lambda_1/3\geq 0$. Thus the state is genuinely entangled if and only if $\lambda_1>3/8$. In Fig.~\ref{fig2} (a), the region outside the red solid curve corresponds to genuinely entangled states detected by the criterion (\ref{genuine}), while states outside the blue dashed circle correspond to those detected by the analytical bound (\ref{eqn:sphere}). The red solid curve intersects the line $\lambda_0+\lambda_1=1/2$ at $\lambda_1=3/8$, which coincides with our necessary and sufficient condition. For higher $N$, the bound (\ref{eqn:sphere}) allows us to obtain closed analytical expressions for a region of admissible values of $\lambda_i$. A visualization of the case $N=5$ can be found in Fig.~\ref{fig2} (b), where states outside the red curve are obtained numerically from the criterion (\ref{genuine}), and states outside the blue dashed circle correspond to the analytical bound (\ref{eqn:sphere}). \section{Conclusions} In this paper, we have investigated genuinely entangled states in the set $\mathcal{SNC}_N$ of $N$-qubit symmetric states with no $N$-partite correlations. The tensor representation~\cite{Gir15} has allowed us to give a simple characterization of these states. From this characterization, it easily follows that no such states exist for an even number of qubits. We have shown that for any $\rho\in\mathcal{SNC}_N$ with $N$ odd, all eigenspaces of $\rho$ are even-dimensional, and that the general form of the state is given by (\ref{decomprho}). This form generalizes the mixture of a state with its antistate investigated in~\cite{Sch15}. The parametrization (\ref{rho3}) has allowed us to find a simple necessary separability condition for $\rho\in\mathcal{SNC}_N$, namely $A\geq 0$ with $A=(\langle \sigma_{ab}\rangle_\rho)_{1\leq a,b\leq 3}$ and $\sigma_{ab}=\sigma_a\otimes\sigma_b\otimes \mathbb{1}_2\otimes \cdots\otimes \mathbb{1}_2$. In the case of three qubits, we have shown that $A\geq 0$ is in fact a necessary and sufficient condition for a state in $\mathcal{SNC}_3$ to be separable. Interestingly, this leads to the equivalence between separability of $\rho\in\mathcal{SNC}_3$ and separability of its two-qubit reduced density matrix. This implies that the entanglement in states $\rho\in\mathcal{SNC}_3$ cannot be entirely destroyed upon the loss of one qubit. In the case of rank-2 states $\rho\in\mathcal{SNC}_N$, we have obtained a necessary and sufficient condition for separability in terms of the same matrix $A$ as $\mathrm{rank}A=1$. This condition has allowed us to generalize the construction to families of arbitrary rank, by considering mixtures in the vicinity of rank-2 genuinely entangled $\rho\in\mathcal{SNC}_N$. \section*{Acknowledgments} O.G. thanks the University of Li\`ege for hospitality.
\section{Introduction} The steady state radio sky is considerably well studied and modeled (e.g. \citet{Be95, Co98}) but dynamic radio sky is not studied in detail due to one or more reasons including lack of telescopes with large field of view, observational constraints, band width and poor time resolution etc. There are various types of sources which show variability at different time scales. For example, brown dwarfs, flaring stars, masers, pulsars, micro-quasars, supernovae, gamma-ray bursts and active galactic nuclei show high levels of variability (e.g. \citet{Co04} for a review). Until recently there are only few radio surveys which searched for variable and transient radio sources efficiently (e.g., see, \citep{Gr86, Ma09}). So, most of the radio transients have been found through follow-up observations of known or suspected transient emitters. Recent programs to search for radio transients from direct and archival observations revealed some potential radio transients which are consistent with the expectation that previous limitations on the detection of radio transients were instrumental and not astrophysical. For example, A giant burst was detected from a young stellar object \citep{Bo03}. Many 1--3 Jy radio bursts were found at high and low Galactic latitudes \citep{Ni07, Ma07, Ki08}. A periodic, coherent and circularly polarized burst was found in an ultra-cool dwarf \citep{Ha07}. A few tens of Fast Radio Bursts (FRBs) have been detected so far which lasted only for a few milliseconds (e.g. \citet{Lo07, Ra16}). The origin of FRBs is still unclear but due to relatively high dispersion measures, some believe these sources have extra-galactic origin (e.g. \citet{Lo07}). Huge improvements in field of view, especially at low radio frequencies, helps to study transient and variable radio sources more effectively (e.g. \citet{Ma14}). However, no detection of any transient sources from recent $12000$ deg$^2$ systemic transient search comprising of 2800 pointings using with the Jansky Very Large Array Low-band Ionosphere and Transient Experiment (VLITE) \citep{Po16} and detection of only one transient source from monitoring of region close to the North Celestial Pole \citep{St16} covering 1925 deg$^2$ using LOFAR and no detection of transient source from 1430 deg$^2$ search using Murchison Wide-field Array (MWA) (\cite{Be14}; also see the MWA study by \citet{Ro16}) show that detections of transient radio sources are currently not very common, especially at low radio frequencies. Future deep, wide-field searches may potentially be far more fruitful (e.g. recent transient rate calculations in \citet{Me15, Mo16}). Large archival data from various telescopes are important resource to look for transient and variable radio sources. Earlier, \citet{Ba11} reported 15 transient sources from the study of 22 yr archival data of the Molonglo Observatory Synthesis Telescope covering 2776 deg$^2$ survey area. Recently, \citet{Mu17} found a candidate transient source at low frequency from comparison of TIFR GMRT Sky Survey Alternative Data Release 1 (TGSS ADR1, see \citet{In17}) and the GaLactic and Extragalactic All-sky Murchison Widefield Array (GLEAM, see \citet{Hu17}) survey catalogues. Many variable and transient radio sources were reported from archival data search of the NRAO VLA Sky Survey (NVSS) \citep{Co98} and FIRST survey \citep{Le02, Th11}. Ten milli Jansky level transients were detected from 22 years of archival the Karl G. Jansky Very Large Array (JVLA) observations of a single field-of-view at 5 and 8.4 GHz \citep{Bo07}. Though it was shown later that more than half of the transient sources reported in \citet{Bo07} were due to data artifacts and rest of the sources had low signal-to-noise ratio $(S/N)$ than \citet{Bo07} to conclusively find transient nature of these sources \citep{Fr12}. Earlier detection of two transient radio sources GCRT J1745--3009 \citep{Hy05,Hy07,Ro10} and GCRT J1742--3001 \citep{Hy09} were made from systematic search near Galactic Center region using The Karl G. Jansky Very Large Array (JVLA) and Giant Meterwave Radio Telescope (GMRT). GCRT J1745--3009 is a unique source which was detected only three times in 2002 \citep{Hy05}, 2003 and 2004 \citep{Hy07}. In 2002, this source exhibited $\sim$10 minute long, $\sim$1 Jy peaked bursts with a $\sim$77 minute period. The emission from the source was coherent \citep{Hy05} with extremely steep spectral index ($\alpha=-13.5\pm3.0$) and high circular polarization \citep{Ro10}. All the three detections of the source were in 330 MHz. The characteristics of GCRT J1742--3001 did not match with any known mechanisms of emission in transient compact sources. As a result, the source seems to represent a member of a new class of coherently emitting objects. GCRT J1742--3001 was active for a few months with $\sim$150 mJy flux density at the peak and showed no periodicity in emission \citep{Hy09}. The source was detected in 235 MHz and exhibited steep spectral index ($\alpha<-2$). For both of these sources, no counterpart was discovered in high energy, making them impossible to be detected by conventional follow-up radio observations from high energy observations. In this paper, we look for new variable/transient sources from a single well observed field centered at micro-quasar Cygnus X-1. Though we could not detect a new source, we discovered hitherto un-reported transient behavior of one NVSS source, namely, NVSS J195754+353513. This source is located approximately $23.8$ arcminutes far from the micro-quasar Cygnus X-1 at J2000 co-ordinates 19h57m54.3s ($\pm$ 0.7s) +35$^{\circ}$34$^{\prime}$59.6$^{\prime \prime}$ ($\pm$0.6$^{\prime \prime}$). In Section 2, we summarize observational details and data analysis procedure. In Section 3, we summarize various results on the source. We discuss significance of various findings in Section 4. Finally, we make concluding remarks in Section 5. \begin{figure*} \vbox{ \centerline{ \psfig{figure=B_07-11-1999-VS2.PS,height=7cm,width=7cm,angle=0} \psfig{figure=B_11-02-2000-VS2.PS,height=7cm,width=7cm,angle=0}}} \vbox{ \centerline{ \psfig{figure=A_04-03-90-VS2.PS,height=7cm,width=7cm,angle=0} \psfig{figure=C-06-05-84-VS2.PS,height=7cm,width=7cm,angle=0}}} \vbox{ \centerline{ \psfig{figure=D_18-03-91-1-EDITED.PS,height=7cm,width=7cm,angle=0} \psfig{figure=C_N_31-08-97-VS2.eps,height=7cm,width=7cm,angle=0}}} \caption{Images of J195754+353513 in different configurations of JVLA at 1490 MHz. In the upper left and right panels, we have shown images of the source in B configuration on 7th November 1999 and 11th February 2000 with flux density 56.5 mJy and 26.0 mJy respectively. In the middle left, middle right and lower left panels, we have shown examples of detection of the source in A, C and D configurations of JVLA. In the lower right panel, we have shown an example of no detection when JVLA was in C configuration. We have included the synthesized beam at the left-bottom corner of each panel. The location of the NVSS position is shown by a cross in all the images where size of the cross is error in NVSS location multiplied by 10 for easy visualization. For details, see text and Table 1.} \label{transient-image} \end{figure*} \section{Observation and Data analysis with The Karl G. Jansky Very Large Array} A blind search for new variable radio sources was conducted using archival JVLA data\footnote{https://science.nrao.edu/facilities/vla/archive/index} at the L-band frequency of 1400 MHz. L band is good for this kind of search with JVLA as it provides right balance between field of view and sensitivity. Though the field of view in 74 and 325 MHz band with JVLA will be higher, these bands have relatively poor sensitivity. Availability of archival data is also less in frequencies less than 1400 MHz. Also, for some sub-classes, the transient detection rate is higher at 1400 MHz, as discussed in Section 1. JVLA comprises of twenty seven fully steerable antennas each with 25-meter diameter in a Y-shaped array. It is located around eighty km west of Socorro, New Mexico. Antennas are periodically moved in different configuration to achieve different scientific goals where the most expanded antenna configuration is known as A configuration and the most compact one is D configuration. B and C configurations are intermediate between A and D. Occasionally antennas are placed in a hybrid configurations, like AB or BC when some of the antennas are in one configuration and some of them in other. The maximum size of the baselines \(B_{max}\) in A, B, C and D configurations are 36.4, 11.1, 3.4 and 1.03 km respectively which corresponds to synthesized beam-width \((\theta_{HPBW})\) 1.4, 4.6, 15 and 49 arcsec respectively at 1400 MHz. The data used for the present work was taken from different configurations of the JVLA between 12 October 1983 (MJD 45619) and 4 June 2003 (MJD 52794). In total, we have used 262 different epochs of observations with various intervals ranging from days to years between successive observations. The antennas were in configuration A, AB, AD, B, BC, C, CD, and D for 53, 16, 5, 46, 15, 45, 26, and 56 days, respectively. \begin{table*} \caption{\bf Details of observations corresponding to Figure \ref{transient-image}} \centering \begin{tabular}{l c c c c c c c} \hline Image &Date & Date & Configuration & Flux Density & RMS &Synthesized beam&On source time\\ Location&(UT) & (MJD) & & (mJy) & (mJy beam$^{-1}$) & & (sec) \\ \hline Upper Left &07/11/1999&51489& B &56.5&0.7&4.60$^{\prime \prime}\times$ 4.22$^{\prime \prime}$&170 \\ Upper Right &11/02/2000&51585& B &26.0&0.4&4.44$^{\prime \prime}\times$ 4.14$^{\prime \prime}$&120\\ Middle Left &04/03/1990&47954& A &56.2&0.3&1.28$^{\prime \prime}\times$ 1.17$^{\prime \prime}$&13820\\ Middle Right &06/05/1984&45826& C &53.0&1.6&15.56$^{\prime \prime}\times$ 12.48$^{\prime \prime}$&390\\ Lower Left &18/03/1991&48333& D &80.7&2.0&19.72$^{\prime \prime}\times$ 19.72$^{\prime \prime}$&1140\\ Lower Right &31/08/1997&50691& C &--- &5.5&14.70$^{\prime \prime}\times$ 14.48$^{\prime \prime}$&100\\ \hline \end{tabular} \end{table*} We studied a field centered on Cygnus X-1, a radio emitting X-ray binary \citep{Bo65, Gi72} with co-ordinates 19h58m21.676s +35$^{\circ}$12$^{'}$05.78$^{''}$ (J2000). This area of the sky was chosen because the field of Cygnus X-1 is one of the best studied Galactic black hole binaries using JVLA due to the fact that it is the first system widely accepted to contain a black hole \citep{Mu71, Ta72, Gi86}. This make the field ideal for looking variable/transient sources. There are big data gap between April 1986 to April 1988, May 1991 to October 1996 as well as February 2001 to June 2003. The `on source' observation time in each epoch was between 2 to 15 minutes. Observing bandwidth for most of the days was 50 MHz. Analysis and imaging of the data was carried out with Astronomical Image Processing System (AIPS)\footnote{http://www.aips.nrao.edu}. Bad data were flagged. \citet{Pe13} flux density scale was used. For eighteen epoch of observations, the quality of data was not good and we could not make reasonably good images. We did not use data for these days. While using data for CD and D configuration, we used lower {\it uv} cut-off to avoid strong background extended radiation from the Galactic plane. We have made correction for the primary beam using {\tt AIPS} task {\tt PBCOR}. Amplitude calibration was conducted in reference to 3C 286 and phase calibration was based on observations of the nearby source J2007+404 or J2015+371. We have not performed self calibration due to lack of any strong point source in the field. The integration time used for solving amplitude and phase during calibration was 10 sec. The images of different days have variable noise levels. Since the source is bit far from the field centre, the noise level near the source position is high. Also small on-source time for individual observation resulted relatively high noise level. The noise level near the source position varied between 0.08 mJy beam$^{-1}$ and 18.7 mJy beam$^{-1}$. The median value of noise was 1.8 mJy beam$^{-1}$. \begin{figure*} \vbox{ \centerline{ \psfig{figure=light-curve-1-vs3.ps,width=8.5cm} \psfig{figure=light-curve-2-vs3.ps,width=8.5cm}}} \caption{Light curves of J195754+353513 at 1490 MHz. In left panel the observations between 1983 and 1991 are plotted and in the right panel the observations between 1996 and 2003 are plotted. The observations are done by The JVLA. Here the triangles show days of non-detection with $3\sigma$ upper limits.} \label{light-curve} \end{figure*} Two models with Intermediate Frequencies (IFs) 1.3851 GHz (model 1) and 1.4649 GHz (model 2) were created combing data of 94 and 18 days respectively. Model with similar frequency configuration was subtracted with individual single epoch observations using the {\tt AIPS} task {\tt UVSUB} to look for variable sources. Apart from Cygnus X-1, we found that only one source J195754+353513 is present in many of the subtracted images with significantly fluctuating flux. The subtracted flux density for J195754+353513 was up to $\sim$120 mJy. The noise levels close to the location of J195754+353513 in model 1 and model 2 were 0.19 mJy beam$^{-1}$ and 0.46 mJy beam$^{-1}$ respectively. To be sure that the variation of J195754+353513 is not due to any kind of systematic effects or error in amplitude calibration, we measured flux density of another source NVSS J195823+345728 present in our field. The recorded flux density of the source in NVSS catalog is 52.3 $\pm$ 1.6 mJy \citep{Co98}. We found that during our study, the mean and median flux density of the source were 50.8 and 51.7 mJy respectively. The standard deviation in measurements of flux-densities of the source was 5.2 mJy which means the percentage of deviation was 9.9\%. This shows error in amplitude calibration play little role in large variation of J195754+353513, which will be discussed in more detail in coming sections. \section{Results} \subsection{Radio light curve of J195754+353513} We have detected a transient radio source with co-ordinate 19h57m54.3s ($\pm$ 0.7s) +35$^{\circ}$34$^{\prime}$59.6$^{\prime \prime}$ ($\pm$ 0.6$^{\prime \prime})$ (J2000). This position is the average of result from fitting an elliptical Gaussian around the peak of the source, along with a background level to the source and the error is $1\sigma$ uncertainty in the fitting. The corresponding Galactic co-ordinates are $l=71.61^{\circ}$, $b=3.34^{\circ}$. After cross-correlation with NVSS sources, we found the transient source detected by us is NVSS J195754+353513. In the Figure \ref{transient-image}, examples of images of J195754+353513 are shown during observations in different JVLA configurations and time. The image of the source in B configuration on 7th November 1999 and 11th February 2000 with respective flux density 56.5 mJy and 26.0 mJy is shown in the upper left and upper right panels of the Figure. In the middle left, middle right and lower left panels, we have shown examples of detection of the source in A, C and D configurations of JVLA. In the lower right panel, an example of no detection is shown when JVLA was in C configuration. We have included the synthesized beam at the left-bottom corner of each panel. The observation details and different image parameters corresponding to Figure \ref{transient-image} is summarized in Table 2. The location of NVSS J195754+353513 is shown in all images of Figure \ref{transient-image}. The source is within extended emission region of J195754+353513. NVSS survey is carried out using D configuration of JVLA and the source is unresolved in NVSS with flux density 50.8 $\pm$ 1.6 mJy at 1400 MHz \citep{Co98}. It was not resolved during our study also when it was observed in D configuration. The elongation of the source visible in the Figure \ref{transient-image} in north-south direction is most probably not due to intrinsic source structure but an effect of bandwidth smearing due to high channel width of 50 MHz. The direction of elongation of the source, as visible in Figure \ref{transient-image}, is towards the pointing center which is a signature of bandwidth smearing. In all the images, the source is consistently elongated in same direction, when detected. Light curves displaying variation of the source's flux densities between 1983 to 2003 is shown in Figure \ref{light-curve}. The flux density is calculated using {\tt AIPS} task {\tt JMFIT} using the results of fitting a Gaussian, along with a background level. The non-detections are reflected by the triangular points, which correspond to the $3\sigma$ upper limits. The error bars represent the rms noise levels of the images near the location of J195754+353513 and a 10\% uncertainty in the absolute calibration of each data set added in quadrature. There are only nineteen observations of the field between MJD 46612 (July, 1986) and MJD 50326 (August, 1996). The source was detected in 161 occasion and not detected in 83 occasions. The data was not good enough to make reasonably good images for 18 days. So, the source was successfully detected for 66.0\% days amongst the all observations with good data of the field. The source showed multiple short bursts and high variation. It varied from less than 0.3 mJy to 201 mJy. The median value of flux density was 38.9 mJy. On 25th January 2002 (MJD 52299) J195754+353513 reached maximum value within the observational period reported in this paper with 201 mJy flux density. The source showed signature of various flares and the peaks reached more than 150 mJy on 23rd July 1998 (186 mJy), 24th March 1999 (175 mJy) and 16th June 2000 (160 mJy). \begin{figure*} \vbox{ \centerline{ \psfig{figure=light-curve-zoom-vs3.ps,width=9cm,angle=0} \psfig{figure=intraday-exp-fit-vs3.ps,width=9cm,angle=0}}} \caption{Left (Inter-day variation): Example of two flares of J195754+353513 observed at L band. These flares were observed in March and April-May 1991. Antennas were in D configuration during these time. Right (Intra-day variation): An example of intra-day variation of J195754+353513 within a scan. The observation took place on 3rd February 2000. Antennas were in B configuration during this observation. Exponential fitting over the points in rising phase is also shown in the figure.} \label{light-curve-zoom} \end{figure*} Due to gaps in the observations, we can study a complete flare only in a few cases. In Figure \ref{light-curve-zoom} we have shown two such flares in March and April-May of 1991 when the peak reached $\sim$85 mJy and $\sim$75 mJy respectively. Antennas were in D configuration during these times. Though there were not enough data points to precisely determine life-span and rise/decay rate of these flares, the approximate life span of these flares were in the range of 10--18 days. Both of these flares show sharp rise and relatively slow decay. In Figure \ref{image} we have shown the field of J195754+353513 combining 9 days of observations. All observations used in this Figure was made in 1991 when antennas were in D configuration. The RMS noise of the image was 0.17 mJy beam$^{-1}$ and the resolution of the image was 43.23$^{\prime \prime}\times$41.71$^{\prime \prime}$. We can clearly see J195754+353513 with 60 mJy flux density along with Cygnus X-1 and many other background sources. We looked for possible periodicity in J195754+353513 as was found in some other radio transients. The light-curve data was systematically folded with different period to search for signature of any periodicity in the emission. No periodicity was found in the source light curve. There are no available JVLA archival data of the source in any other band except L band. Thus a study of the spectral index of the source was not possible using JVLA data. There is a source in 325 MHz WENSS (Westerbork Northern Sky Survey; \citet{Re97}) catalog which is 5.11 arcsec far from the NVSS position of the source. Since the positional uncertainty in WENSS for faint sources are $\sim$ 5 arcsec, this is most probably the same source. The source has a flat spectral index of $\alpha=-0.19$ (assuming $S_\nu \propto \nu^{\alpha}$) between NVSS and WENSS measurements \citep{Ma14b}. Since the source is highly variable and there is gap between measurements between NVSS and WENSS (observations of WENSS took place between 1991--1993 and observations of NVSS took place between 1993--1996), the flat spectral index measured between NVSS and WENSS is misleading. \subsection{Intra-day flux density variation} \begin{table*} \caption{\bf Intra-day Flux Density variation of J195754+353513} \centering \begin{tabular}{c c c c c c} \hline Date & 1st Scan & 1st Scan & 2nd Scan & 2nd Scan &Time gap\\ (UT) & Time Span & Flux Density & Time Span & Flux Density& between scans \\ & (min) & (mJy) & (min) & (mJy) & (min)\\ \hline 03/07/84 & 6.5 & 50.9 $\pm$ 8.4 & 6.5 & 216 $\pm$ 7.9 & 52.5\\ 04/03/90 & 29.16&194 $\pm$ 0.7 & 29 & 31.4 $\pm$ 0.7&204.5\\ 16/03/91 & 19.0 & 68.1 $\pm$ 2.4 & 13.5& 55.4 $\pm$ 2.1&5.5\\ 25/03/91 & 15.5& 88.1 $\pm$ 3.6 & 14.5& 37.9 $\pm$ 2.6&5.5\\ 16/03/97 & 0.92& 89.8 $\pm$ 1.2 & 0.92& 127 $\pm$ 2.8 &0$^{b}$\\ 25/01/99 & 1.33& 111 $\pm$ 5.0 & 1.33& 48.4 $\pm$ 3.7 &0$^{b}$\\ 24/10/02 & 2.83& 37.6 $\pm$ 2.6 & 3.17& 76.7 $\pm$ 2.8&57.5\\ \hline \multicolumn{6}{l}{$^{b}$Note: Zero difference between two time-spans mean we are looking for intra-scan variations.} \end{tabular} \end{table*} Based on previous studies of the bursting transient GCRT J1745--3009 \citep{Hy05, Hy07, Ro10} and GCRT J1742--3001 \citep{Hy09}, we searched for flux density variations of J195754+353513 between different scans of the observations of same day. We also imaged each minute separately, when the source is detected, to look for minute-scale variation of J195754+353513. Since the flux density of the source was not adequate to image it all the time with smaller time scale, we could make a study of the intra-day variation only for limited amount of time. Significant scan to scan and intra-scan flux density variation is detected when it was possible to image separate scans. In the right panel of Figure \ref{light-curve-zoom} we have plotted an example of intra-day variation of J195754+353513 within a scan. The observation took place on 3rd February 2000 (MJD 51577). Antennas were in B configuration during this observation. The source rose from 20 to 180 mJy within 700 seconds and then came back to $\sim$20 mJy level within $\sim$100 seconds. The rise time constant, resulting from the exponential fit over the points in rising phase, is $\tau=342.8 \pm 89.0$ seconds. A power-law fit ($S_\nu \propto t^\beta$) over points in rising phase of the flare yields $\beta = 1.5 \pm 0.8$. In Table 2, we have summarized intra-day flux density variations for different days. The error in flux density mentioned in the table is RMS noise near the location of the source. For five different days we found more than 20\% difference in flux densities between two successive scans of observations with time difference 5.5 minute to 204.5 minute. On 4th March 1990 (MJD 47954), the flux decayed from 194 mJy to 31.4 mJy with just 204.5 minute separation and on 3rd July 1984 (MJD 45884), the flux density rose from 50.9 mJy to 216 mJy when the gap between two successive scans were just 5.5 minutes. For two days, we found significant variation within a scan. The inter and intra scan variation, often more than twice in flux density, suggests the radio emission from J195754+353513 consists of many small bursts. \subsection{Circularly polarized emission} We looked for the presence of circularly polarized emission from J195754+353513 as was found for the case of GCRT J1745--3009 \citep{Ro10}. The measurement of Stokes $V$ polarization on 19th March 1991 (MJD 48334) was 12.6 mJy with RMS noise of 1.19 mJy beam$^{-1}$ and the measurement of Stokes $V$ polarization on 2nd May 1991 (MJD 48378) was 11.5 mJy with RMS noise of 1.36 mJy beam$^{-1}$. The corresponding value of $V/I$ on 19th March and 2nd May 1991 were $0.25$ and $0.24$ respectively with 3\% uncertainty in error. Relatively weak Stokes $V$ detection was done on 1st December 1999 (MJD 51513) with flux density 8.3 mJy and RMS noise 0.6 mJy beam$^{-1}$. The corresponding $V/I$ was $0.15$. More than $5\sigma$ Stokes $V$ was not detected from data of any other days. \subsection{Optical/IR and X-ray counterpart of the source} No known sources are reported to emit X-ray emission from the nearby position of J195754+353513 making it impossible to detect radio emission from follow-up observation of X-ray emission at the time of flare. We have searched for optical/infra-red counterpart of J195754+353513. There are two sources within 10 arcsec from the source location of J195754+353513 in the Two Micron All-Sky Survey (2MASS) point source catalog \citep{Cu03, Sk06}. The nearest source in 2MASS catalog is J19575420+3535152 whose location is 1.82 arcsec away from J195754+353513 and may be the near infra-red counterpart of J195754+353513. The other source in 2MASS catalog within 10 arcsec from J195754+353513 is J19575378+3535221 whose position is 9.37 arcsec away from J195754+353513. The brightnesses of J19575420+3535152 in {\it J}, {\it H} and {\it K} bands are 15.45, 14.90 and 14.55 mags respectively. \section{Discussion} \subsection{The nature of the source J195754+353513} We have searched the environment of J195754+353513 for associated discrete sources or extended structures. The source is not close to any known supernova remnant. We did not find trace of any extended structure close to the source, either. We have found one 2MASS source within 1$\sigma$ positional error of J195754+353513 and it is possible that the radio emission of J195754+353513 arises from activities in a foreground flaring star. Many flaring stars are known to exhibit activity in both radio and X-ray wavelengths such as the giant outburst from a young stellar object reported by \citet{Bo03}, but the detection of radio flares having no apparent associated X-ray emission is not uncommon. For example, radio flares from UV Ceti stars with seconds to minutes time-scale were detected at low frequencies by \citet{Sp74} and \citet{Ka77} with YZ Canis Minoris where no corresponding X-ray emission was found. At higher frequencies (4.9 and 8.4 GHz), \citet{Os05} reported short duration radio flares from the dMe flare star EV Lacertae which was not clearly related to the star's X-ray flares. The radio flares reported in these stars range from a few milli Jansky to a few tens of milli Jansky, with rise and decay times of $\sim1$ min and $\sim1$ hr respectively. We have also found small flares from J195754+353513 of $\sim700$ s duration as featured in Figure \ref{light-curve-zoom}. \citet{Ri03} presented results on five years of continuous monitoring of radio flares of Algol-type and RS CVn systems; many of the flares reached hundreds of milli Jansky with a few days to a month duration. Numerous short bursts within each flare were also visible. Strong periodic activities are also found in these systems where the shortest periodicity was found in $\beta$ Per with 48.9$\pm$1.7 days. Though we could not detect any periodicity in emission from J195754+353513, the source could be RS CVn system due to similarity in time scale of flaring episodes. Pulsars can produce highly circularly polarized emission in single pulse (eg. \citet{Ka91}). There are some pulsars which show non-periodic flaring events like Crab pulsar (e.g. \citet{Bu12}). No known radio pulsar is reported from the nearby location of J195754+353513. Also we have not seen any sign of nearby supernova remnant or nebula. Though majority of pulsars are associated with supernova remnants \citep{Fr94}, some belief that this association are by chance and actually false \citep{Ga95a, Ga95b, Ga95c}. One should look for possible pulsar emission in the location of J195754+353513. Variations in the light curve of J195754+353513 could also be due to some kind of extreme scattering of the incident radiation in the interstellar medium of our Galaxy (e.g. \citet{Ri90, De02}). Variation up to few day time-scale can occur due to interstellar scintillation in GHz frequencies \citep{Pe00}. Since J195754+353513 showed variation of different time-scales, from minutes to months, even if interstellar scattering play some role, it is unlikely that all this variations are due to scattering effect. For the most of black-hole X-ray binaries, a universal correlation between radio and X-ray luminosities has been reported \citep{Co03, Ga03}. Assuming the relation given in \citet{Ga03}, the $\sim 200$ mJy peak should have corresponding X-ray flux of $\sim 0.25$ Crab in its hard state. Such a strong flare in X-ray would not go un-noticed by all sky X-ray monitors, given that the source is in flaring stage quite regularly. Though some of the exceptions are found for X-ray binaries which do not follow this universal correlation, all the examples have lower radio luminosity than the universal value but none of them have significant lower X-ray luminosity. So, it is unlikely that the system is a black-hole X-ray binary system. On the other hand, if we consider a two component accretion flow (TCAF, \citet{Ch95}) where the Keplerian disk is flanked by a transonic flow in hard states when jets are stronger, it is well known that the Keplerian disk does not have to penetrate distances close to the black hole and the X-ray could be faint. We postulate that the disk with very low accretion rate could be located at a large distance with inner edge $\sim 20000$ Schwarzschild radii or more so that the source is presently having a quiescence stage, as far as X-rays is concerned. If this is the case, occasional outbursts every few to few tens of years is possible and one could look for them. It is also possible that the disk is shrouded by copious winds from the companion, much like SS 433 \citep{Ma84, Cl84}, where disk X-ray is completely blocked. In fact, the circularly polarized emission is an indication of aligned magnetic fields. If there is an outflow with a small inclination angle with the line of sight, a polarization fraction similar to those reported in Section 3.3 can be produced from its radio emission. However, in that case, a profusely mass-losing star star would be expected in the vicinity. As discussed in Section 3.4, it is possible that 2MASS J19575420+3535152 is the IR counterpart. The time-scale of rising and fading for every micro-flare would be expected to be of much shorter duration for a compact binary. \begin{figure} \vbox{ \centerline{ \psfig{figure=TRANSIENT-VS2.eps,height=9cm,width=9cm}}} \caption{1490 MHz JVLA image of the field of J195754+353513 combining 9 days of observations. All observations used in this image were conducted in 1991 when antennas were in D configuration. The RMS noise of the image is 0.17 mJy beam$^{-1}$. Cygnus X-1 and J195754+353513 are indicated by the arrow. The synthesized beam of the image is 43.24$^{\prime \prime}$ $\times$ 41.71$^{\prime \prime}$.} \label{image} \end{figure} \subsection{Comparison with Galactic Center Transients} There are many similarities between the temporal evolution of J195754+353513 to that of GCRT J1742--3001 and a transient radio source detected close to Galactic Center region (GCT). While GCRT J1742--3001 was detected as part of transient search program near Galactic centre region in March 2006 to May 2007 at 235 MHz \citep{Hy09}, GCT was detected in monitoring observations of Sgr A* from December 1990 to September 1991 at different radio wavelengths from 1.3 to 22 cm \citep{Zh92}. There are also some similarity with another transient GCRT J1745--3009 \citep{Hy05, Hy07, Ro10} located close to Galactic centre at 330 MHz. The flare of both GCRT J1742--3001 and GCT took about a month to rise while it decayed in about three months. For J195754+353513 we could not catch total rising and fading profile of many flares due to inadequate sampling rate and data gap, typical rising time of flares were $\sim$5 days and typical fading time was $\sim$10 days. Though the active time of individual flares of J195754+353513 were less than GCRT J1742--3001 and GCT, J195754+353513 exhibited higher frequency of such flares unlike other two sources mentioned above. GCRT J1742--3001 also showed fewer small bursts before the main flare and the GCT showed the presence of a significantly intense secondary burst in the 18--22 cm observations about six months after the primary burst. Though GCRT J1745--3009 was detected only three times, it showed intra-day variability with time-scale of hundreds of second as J195754+353513. GCRT J1742--3001 peak flux density was $\sim$100 mJy in 235 MHz and peak flux density of GCT was $\sim$1 Jy in the wavelength range 18--22 cm ($\sim$1.5 GHz). The peak flux density of individual flares of J195754+353513 varied between 30 to 200 mJy. Since GCRT J1742--3001 had a very steep spectrum ($\alpha \lesssim -2$, $S_\nu \propto \nu^\alpha$), its peak flux density should be fainter than J195754+353513 in 1400 MHz. Assuming $\alpha=-2$, we calculate peak flux density of GCRT J1742--3001 at 1400 MHz to be $\lesssim$21 mJy. The peak flux-densities for three detections of GCRT J1745--3009 were $\sim1$ Jy, $\sim0.5$ Jy and $\sim0.06$ Jy. The peak intensity may indicate strength of magnetic fields. J195754+353513 showed presence of variable circular polarization as GCRT J1745--3009 \citep{Ro10}. Circular polarization was not reported for the case of GCRT J1742--3001 and GCT. No X-ray counter-parts were confirmed for the case of GCT, GCRT J1742--3001 and GCRT J1745--3009. J195754+353513 also has no known X-ray counter part. There is some suggestion that GCT may be associated with X-ray binary \citep{Zh92}, which is yet to be established. \section{Conclusions} We found transient nature of a radio source J195754+353513, approximately 24 arcminutes far from Galactic micro-quasar Cygnus X-1. The source showed high variability with different time-scales. J195754+353513 showed evidence of variable circular polarized emission. The source has no known X-ray counter part of the system. 2MASS J19575420+3535152 may be an NIR counterpart of the source. The nature of the source is still unknown. It is not unlikely that the system is a black-hole X-ray binary with the disk covered by significant amount of matter from the companion. On the other hand, it is also possible that the emission is coming from a foreground flare star. Clearly more multi-frequency monitoring is required to come to a definite conclusion. \section*{Acknowledgments} We acknowledge the anonymous referee whose detail and productive suggestions helped to improve the manuscript significantly. DP and SP acknowledge support of MOES fund to carry out this project. We have used data from JVLA which is run by The National Radio Astronomy Observatory (NRAO). NRAO is a facility of the National Science Foundation operated under cooperative agreement by Associated Universities, Inc.
\section{Introduction} It was a pleasure to participate in the Excited QCD 2017 workshop at Sintra (Portugal) and to attend short seminars on so many different approaches towards understanding the complicated relation between strong interactions and quantum chromodynamics (QCD). In particular, we were pleased to witness presentations on the study of hadron scattering, mass distributions, cross sections, and resonances. Nevertheless, although it did not seem to disturb most theoreticians, the lack of progress in measuring high-statistics multi-hadron data was very disappointing. Experiment does not yet provide the necessary conditions to confront model results with measured multi-hadron mass distributions. Several decades of accelerators and sensitive detectors have, unfortunately, still not resulted in sufficient data to allow for narrow binning and high statistics. From Fig.~1 in Ref.~\cite{ARXIV12041984} one could even conclude that it will take quite a while before ATLAS statistics \cite{PRL108p152001} competes with 25 years older data of the ARGUS Collaboration \cite{PLB160p331}. During the workshop some criticism arose on the compilation of data by the Particle Data Group Collaboration (PDG) \cite{CNPC40p100001}. However, it would actually be more in place to direct such criticism towards researchers who use section headings to fit the results of their models. Sure, the PDG reports on each significant enhancement observed in multi-hadron mass distributions as well as on its weighted central mass and width, and furthermore its quantum numbers based on available experimental data analyses. Subsequently it introduces a new section in its Review of Particle Physics when suspected to be different from already reported enhancements. However, the PDG also supplies its readers with a list of published work related to each one of the enhancements. Serious researchers are thus free to go through the published mass distributions and draw their own conclusions on the nature of a certain enhancement or, even better, compare the full multi-hadron mass distribution with the results of their models. \section{Dimeson channels} Decades ago pions or kaons were scattered from the proton's meson cloud (see e.g.\ Refs.~\cite{NPB133p490,NPB296p493}) in order to produce pion-meson or kaon-meson cross sections, respectively. However, a more elegant production of dimesons stems from $e^{-}e^{+}$ scattering (see e.g.\ Refs.~\cite{PRD79p092001,PRL98p092001}), since via vector dominance one is then pretty sure about the dimeson's quantum numbers. Consequently, the resulting $J^{PC}=1^{--}$ mass distributions could be considered backbones of mesonic spectra and thus should have been given the highest priority in the past. Nevertheless, experiments for the vector charmonium spectrum only came up with binnings of 20~MeV \cite{PRL98p092001} (see Fig.~1 in Ref.~\cite{ARXIV10053490}) or 25~MeV \cite{PRD79p092001} (see Fig.~3 in Ref.~\cite{CNPC35p319}), and extremely low statistics, whereas light-dimeson spectra are not in a better shape (see e.g.\ Ref.~\cite{PRD78p072006}). Previously we presented amplitudes for multi-resonance scattering (see Eq.~2 in Ref.~\cite{APPS9p583}) and production (see Eq.~3 in Ref.~\cite{APPS9p583}), which were based \cite{PRD21p772} on general scattering theory \cite{Taylor}, applied to multi-channel dispersion in the presence of a tower of bound states and resonances, the so-called Resonance Spectrum Expansion (RSE) \cite{IJTPGTNO11p179,AP323p1215,AP324p1620}. The RSE amplitude in Ref.~\cite{APPS9p583} is restricted to single-channel scattering. However, a multi-channel generalisation is straightforward. For dimeson channels, the input spectrum can be determined by the use of a bound-state model for quark-antiquark states. The amplitudes can be then converted into mass distributions and cross sections. Furthermore, one can extract the complex scattering singularities (poles in the total invariant mass $\sqrt{s}$) from the amplitudes and study their behaviour under variation of the model's parameters. Quantum states of the RSE respect total angular momentum $J$, parity $P$, total flavour and isospin, moreover, when applicable, also charge conjugation $C$. However, they do not have well-defined orbital quantum numbers, relative angular momentum $\ell$, and radial excitation $n$, but are rather mixtures of all possible orbital quantum numbers. In particular, vector $S$ and $D$ states mix. The latter phenomenon has interesting consequences, as dominantly $D$-wave resonances are found near the input spectrum and with small widths (a few MeV), whereas dominantly $S$-wave states have central resonance masses some 150~MeV or more below the masses of the input spectrum and with relatively large widths (tens of MeV's). Coupled channels do not exhibit enhancements at the same place. A pole is determined by the full scattering matrix, but enhancements also depend on the kinematics of a specific channel. This can be nicely observed from Figs.~3 and 4 in Ref.~\cite{CNPC35p319}, where mass distributions are depicted for $D^{\ast}\bar{D}^{\ast}$ \cite{PRD79p092001} and $\Lambda^{+}_{c}\Lambda^{-}_{c}$ \cite{PRL101p172001}, respectively. Each of the two figures shows the $\Lambda^{+}_{c}\Lambda^{-}_{c}$ threshold enhancement and the $5S$, $4D$ charmonium resonances, but masses are different. Part of the discrepancy may stem from incompatibilities between the mass normalisations of the BABAR and BELLE Collaborations, but the larger part is due to differences in kinematics. Moreover, in some channels no enhancement appears at all near the pole. In Ref.~\cite{AIPCP814p143} we compared to experiment \cite{NPB133p490,NPB296p493} our predicted cross sections for $S$-wave isodoublet dispersion of $K\pi$ (see Fig.~2), $K\eta$ (see Fig.~6) and $K\eta '$ (see Fig.~7). For $K\pi$ we showed results for three different values of the overall coupling constant $\lambda$. For very small values of $\lambda$, one observes the scalar $n\bar{s}$ input spectrum. When $\lambda$ takes about half its model value, one notices some more structure for low invariant masses. At the model's standard value of $\lambda$, this structure is dominant and well in agreement with the experimental data \cite{NPB133p490,NPB296p493}. The behaviour of the poles under variation of $\lambda$ for the two lowest-lying $K\pi$ resonances was also studied in Ref.~\cite{AIPCP814p143} (see Fig.~3). The scattering pole for $K^{\ast}_{0}(1430)$ can directly be connected to the $n\bar{s}$ input spectrum. However, the scattering pole for $K^{\ast}_{0}(800)$ does not stem from the input spectrum, but is dynamically generated \cite{ZPC30p615}. Under variation of $\lambda$, poles can also move below the lowest threshold, thus representing bound states. The passage through threshold is different for $S$ waves and higher waves. This issue was studied in Ref.~\cite{LNP211p331} (see Figs.~4.1 and 4.2). The resonance pole for $P$- or higher-wave dispersion moves smoothly towards threshold under variation of $\lambda$ (see Fig.~6 in Ref.~\cite{AIPCP688p88}). Below threshold it behaves as expected for a bound-state pole. In contrast, a complex $S$-wave resonance pole can have a real part smaller than the threshold value of $\sqrt{s}$, and only end up on the real axis well below threshold, thus representing a virtual bound state. Thereafter, under variation of $\lambda$, the pole moves back towards threshold along the real $\sqrt{s}$ axis, and only after touching threshold it turns into a true bound state (see Fig.~5 in Ref.~\cite{AIPCP688p88}, or Fig.~1 in Ref.~\cite{EPJA31p468}). Moreover, one can also continuously vary quark masses and the corresponding threshold values. Resonance poles then move smoothly from one established resonance to another (see Fig.~1 in Ref.~\cite{PRD74p037501}). Any model that claims to describe resonances of multi-hadron scattering or production should exhibit the above properties for the corresponding resonance poles. Such poles for perturbative scattering amplitudes usually do not satisfy this behaviour at threshold, as was studied in Ref.~\cite{PTP125p581} (see Fig.~5). \section{Resonances} In the harmonic-oscillator aproximation of the RSE (HORSE), one can predict mass distributions for dimeson channels. It was observed that the harmonic-oscillator frequency can be taken the same (0.19 GeV) for all flavours. The results for $K\pi$ \cite{ZPC30p615}, $K\eta$, and $K\eta^{\prime}$ \cite{AIPCP814p143} were already discussed above. In Table~2 in Ref.~\cite{AIPCP814p143} we showed the five lowest-lying resonance poles that we found in the scattering matrix for isodoublet $S$-wave channels. We thus expect to find 10 plus 5 corresponding poles in the isosinglet and isotriplet $S$-wave channels, respectively, many more than observed in experiment \cite{CNPC40p100001}. For vector states we also found many resonances that have not yet been confirmed in experiment. Our assignments for $D^{\ast}_{s}$ resonances are collected in Fig.~1 and Table~3 in Ref.~\cite{ARXIV10112360}. The 20-MeV binning of the data \cite{PRD80p092003} does not allow for firm conclusions. Higher dominantly $S$- and dominantly $D$-wave charmonium resonances from HORSE have been reported by us at various occasions, as e.g.\ in Fig.~5 in Ref.~\cite{CNPC35p319}, where one may observe that 25~MeV bins and low statistics \cite{PRD79p092001} do not allow for any definite conclusions. Nevertheless, $R_{b}$ data of the BABAR Collaboration \cite{PRL102p012001} can be compared to the HORSE predictions for bottomonium (see Fig.~1 in Ref.~\cite{ARXIV09100967}). However, in Ref.~\cite{CNPC40p100001} the non-resonant $B\bar{B}$ threshold enhancement is classified as the $\Upsilon (4S)$ resonance, whereas HORSE predicts the central mass of that resonance to be some 150~MeV heavier. Threshold enhancements can easily be observed for $B\bar{B}$, $B^{\ast}\bar{B}$, and $B^{\ast}\bar{B}^{\ast}$ (see Fig.~3 in Ref.~\cite{ARXIV09100967}). Moreover, non-resonant threshold enhancements for production amplitudes were predicted in Ref.~\cite{AP323p1215}. In Fig.~6 in Ref.~\cite{ARXIV09100967} one observes how the $\Upsilon (4S)$ resonance interferes with the $B_{s}\bar{B}_{s}$ threshold enhancement. In Figs.~6 and 7 in Ref.~\cite{ARXIV10094097} we extracted the $\Upsilon\left(2^{\; 3\!}D_{1}\right)$ state from data published by the BABAR Collaboration \cite{PRD78p112002}. Finally, the discovery of a very light hadronic particle, the $E(38)$, with a mass of about 38~MeV, was not completely unexpected. A flavour-independent HORSE parameter, the average $q\bar{q}$/meson-meson interaction distance, was observed to be related to such a small mass. But it was not before 25 years later that we became aware of an interference effect that might be associated with the existence of a 38-MeV quantum \cite{ARXIV10095191}. Further evidence \cite{ARXIV11021863} resulted from leptonic bottomonium decays published by the BABAR Collaboration \cite{PRD78p112002}. High-statistics data (see Fig.~8 in Ref.~\cite{ARXIV12021739}) published by the COMPASS Collaboration \cite{ARXIV11086191} exhibits a very clear diphoton signal, but the collaboration changed {\it a posteriori} \/its electronically published article, claiming that the enhancement is an artifact of their experimental setup. However, that claim is not substantiated by the their own Monte-Carlo simulation (see Fig.~8 in Ref.~\cite{ARXIV12043287}), which moreover refers to data with much lower statistics, published in Ref.~\cite{ARXIV11090272}. We wish to thank the organizers for the very pleasant workshop. The present work received partial financial support from FCT Portugal, with reference no.\ UID/FIS/04564/2016. \newcommand{\pubprt}[4]{#1 {\bf #2}, #3 (#4)} \newcommand{\ertbid}[4]{[Erratum-ibid.~#1 {\bf #2}, #3 (#4)]} \def{\it AIP Conf.\ Proc.}{{\it AIP Conf.\ Proc.}} \def{\it Ann.\ Phys.}{{\it Ann.\ Phys.}} \def{\it Acta Phys.\ Polon.\ Supp.}{{\it Acta Phys.\ Polon.\ Supp.}} \def{\it Chin.\ Phys.\ C}{{\it Chin.\ Phys.\ C}} \def{\it Eur.\ Phys.\ J.\ A}{{\it Eur.\ Phys.\ J.\ A}} \def{\it Int.\ J.\ Theor.\ Phys.\ Group Theor.\ Nonlin.\ Opt.}{{\it Int.\ J.\ Theor.\ Phys.\ Group Theor.\ Nonlin.\ Opt.}} \def{\it Lect.\ Notes Phys.}{{\it Lect.\ Notes Phys.}} \def{\it Nucl.\ Phys.\ B}{{\it Nucl.\ Phys.\ B}} \def{\it Phys.\ Lett.\ B}{{\it Phys.\ Lett.\ B}} \def{\it Phys.\ Rev.\ D}{{\it Phys.\ Rev.\ D}} \def{\it Phys.\ Rev.\ Lett.}{{\it Phys.\ Rev.\ Lett.}} \def{\it Prog.\ Theor.\ Phys.}{{\it Prog.\ Theor.\ Phys.}} \def{\it Z.\ Phys.\ C}{{\it Z.\ Phys.\ C}}
\section*{Acknowledgment} The authors are thankful to D. J. Sellmyer, W.-Y. Zhang, H.-W. Kwon, and K.-M. Ho for discussing several aspects of the present paper. This work was supported by the U.S. Department of Energy (DOE) EERE-VT-EDT program under the DREaM project at the Ames Laboratory, which is operated for the U.S. DOE by Iowa State University under Contract No. DE-AC02-07CH11358.
\section{Introduction} It is known that the usual parton distribution functions (PDFs) and electromagnetic form factors (FFs) shed light on the ``one-dimensional" structure of hadrons~\cite{Marukyan2015}. Moreover, generalized parton distributions (GPDs) naturally embody the information of both PDFs and FFs, and therefore they display the unique properties to present a ``(3D)" description for the transverse and longitudinal partonic degrees of freedom inside the system, and they contain promising potential which gives arise to ideals of ``quark/gluon imaging" of hadrons~\cite{Marukyan2015}. Many theoretical investigations have been carried out on the general properties of GPDs for a hadronic system~\cite{Diehl2003}. It is believed that the studies of GPDs are closely related to the processes of deeply virtual Compton scattering and the deeply virtual meson electroproduction~\cite{Ji2006,Kumericki2016,Goeke2001}. By comparing with experimental measurements, one can obtain possible constrains on the GPDs of a hadron~\cite{Aidala2013,Airapetian2017}. With the help of sum rules, the unpolarized GPDs are directly connected to the electromagnetic FFs of the system. There are some empirical parametrizations for GPDs. For the nucleon case, those parameterizations can be obtained by fitting the experimental data to the Dirac, Pauli, and axial FFs ~\cite{Kirchner2003,Guidal2004nd,Diehl2013Feb19,Selyugin2015Oct12,Sharma2016}. In the forward limit, GPDs reproduce the usual PDFs, and thus a description of GPDs can also be built with the help of the experimental data of PDFs~\cite{Selyugin2015Oct12}. In addition, the moments of GPDs can provide other new information as well, such as the neutron asymmetry ~\cite{Zhang2015} and the quark orbital angular momentum~\cite{Hoodbhoy1998,Ji2016Dec7}.\\ Many endeavors have been made to study the GPDs of simple hadrons in the literature, like the studies of a pion~\cite{Broniowski2011,Choi2001,Fanelli:2016aqc,Mezrag2016,Kumericki2016}; of a proton and neutron~\cite{Kroll2017,Pire2009,Diehl2013Feb19,Selyugin2015Oct12,Sharma2016,Rinaldi2017}, and of the light nuclei, ${}^3$He~\cite{Rinaldi2013,Zhang2015} or deuteron~\cite{Berger2001,Kirchner2003,Cano2004,Dong2013,Mondal2017}. In those works, different approaches have been employed. They include the chiral quark models employing the Nambu-Jona-Lasinio model, the spectral quark model~\cite{Broniowski2003,Broniowski200878,Broniowski2011}, the covariant constituent quark models (CCQMs)~\cite{Choi2001,Frederico2009,Fanelli:2016aqc}, the Dyson-Schwinger equation approach~\cite{Mezrag2016}, the AdS/QCD inspired light-front wave functions~\cite{Rinaldi2017}, and some empirical parametrizations as already mentioned above. Among those phenomenological approaches, the light-cone constituent quark model (LCCQM), one of the CCQMs, is a quite suitable and successful approach to be applied for the studies of the quark-hadron vertex and of the hadron properties, as has been pointed out by Refs.~\cite{Brodsky1998,Fanelli:2016aqc}. Besides the various model-dependent studies, some lattice QCD calculations have been also performed~\cite{Dalley2003Jul21,Hagler2010}. It is believed that those lattice simulations, together with the experimental data, can be employed to check and make a judgement for the different phenomenological models. \\ Apart from the pion (spin-0) and nucleon (spin-1/2) targets, the deuteron (spin-1) target is also common experimentally. The GPDs of a deuteron have been already defined through the matrix operators on the light front~\cite{Berger2001}, and the partonic structures and FFs of the deuteron have been formally explored through different approaches as well~\cite{Cano2004,Dong2013,Mondal2017,Cosyn:2017ekf,Dong:2008mt,Liang:2015zba}. We know that the deuteron is a weakly bound system of a proton and a neutron and approximately satisfies the isospin symmetry. Therefore, by considering the GPDs of the proton and neutron, one may obtain the information of the deuteron GPDs~\cite{Kirchner2003,Cano2004, Airapetian2010}.\\ The $\rho$ meson, which is a spin-1 particle as well, is usually regarded as a $q\bar{q}$ bound state in CCQMs. Some lattice results~\cite{Glozman2011} have already shown that the $\rho$ meson is approximately a pure ${}^3S_1$ state with only $\sim~1\%$ admixture of the ${}^3D_1$ wave, and, consequently, in the rest frame, the valence quarks carry out almost completely the spin of the $\rho$ meson. This conclusion provides a solid support to employ the constituent quark model to explore the $\rho$ meson structure as a pure $q\bar{q}$ system. It should be stressed that the most previous studies of the $\rho$ meson focus on its FFs~\cite{Melo1997,Cardarelli1995,Aliev2004,Choi2004,Biernat2014,Melo2016,Krutov:2016uhy,He:2004ba}. The only one lattice QCD calculation for the moments of the unpolarized $\rho$ meson PDFs appeared two decades ago~\cite{Best1997}, which was performed at the scale $Q= 2.4~\mathrm{GeV}$. With a quenched approximation, Ref.~\cite{Best1997} obtained the $n$th moments of its structure functions which, is meaningful only when comparing with the nonsinglet valence quark distributions. Later on, the result of QCD sum rules for the $\rho$ meson structure functions in Ref.~\cite{Oganesian2001} matches the lattice calculation well. As for the $\rho$ GPDs, there are some possible indirect approaches to access them, such as through the connection with generalized distribution amplitudes, via the double distributions~\cite{Diehl:1998dk,Diehl2003,Anikin:2005ur} or the Radon transformation~\cite{Teryaev:2001qm}. Thus, it is of a great interest to see what the GPDs of the $\rho$ meson look like with the help of the LCCQM model. This study may be even useful to understand the processes involving the $\rho$ meson lepton production such as $e+N\rightarrow e+\rho^0+N $~\cite{Mankiewicz1998,Cano2004,Morrow2009,Airapetian2017} or the process of $\gamma\gamma*\rightarrow\rho\rho$~\cite{Anikin:2003fr} and the future Electron-Ion Collider(EIC) experiments~\cite{Boer:2011fh,Accardi:2011mz}.\\ In analogy to the deuteron case, we introduce the GPDs of the $\rho$ meson and apply the LCCQM for the study of its unpolarized GPDs. Particularly, the GPDs with different skewness $\xi$ will be discussed in detail. It should be mentioned that in the LCCQM, the separation of the valence (Dokshitzer- Gribov-Lipatov-Altarelli-Parisi, DGLAP) and nonvalence (Efremov-Radyushkin-Brodsky-Lepage, ERBL) regimes is transparent after the integration over the poles in the Dirac propagators of $k^-=k^0-k^3$, i.e. the minus component of the loop momentum. Consequently, we can further study the contributions to the properties of the $\rho$ meson, like its FFs and GPDs, from the valence and nonvalence regimes at different values of $\xi$. \\ This paper is organized as follows. Section~\ref{sec:GPDs_for_hadrons_with_Spin_1} gives a brief introduction to the general decomposition of GPDs for the spin-1 $\rho$ meson. Section~\ref{sec:The_model} shows a description of the LCCQM. Moreover, in Sec.~\ref{sec:Results}, we display the main numerical results for the $\rho$ meson FFs and its unpolarized GPDs with the LCCQM. In addition, in Sec.~\ref{sec:evolution}, we discuss the QCD evolution of the moments of the $\rho$ meson PDFs and make a comparison to the lattice calculation. Finally, Sec.~\ref{sec:summary} is devoted to a short summary. \section{GPDs for hadrons with Spin 1} \label{sec:GPDs_for_hadrons_with_Spin_1} The notations in this work are~\cite{Frederico2009} \begin{eqnarray} t &=&\Delta^2=(p'-p)^2 \ , \nonumber \\ \xi &=&-\frac{\Delta\cdot n}{2P\cdot n}= -\frac{\Delta^+}{2P^+} \ , \ \ \abs{\xi}=\frac{\Delta^+}{2P^+} \ , \ \ \ \ \ (\,|\xi\,|\le1) \nonumber \\ x &=&\frac{k\cdot n}{P\cdot n}=\frac{k^+}{P^+} \ , \ \ \ \ \ \ (-1\le x\le1) \ , \end{eqnarray} where $p$ and $p'$ are the 4-momenta of the incoming and outgoing $\rho$ mesons, $P=({p'+p})/{2}$, $\Delta=p'-p $, $n$ is a lightlike 4-vector with $n^2=0$, and $k$ is the 4-momentum in the loop which will be specified in next section. The skewness variable $\xi$ plays a similar role as the Bjorken variable~\cite{Ji1997,Airapetian2010}. \\ The helicity counting rules restrict that there are totally nine helicity conserving GPDs of the spin-1 particle for each quark flavor and the gluons. Five of them are unpolarized (averaged over helicities), and the other four are polarized (sensitive to helicities). The helicity-averaged GPDs are defined through the two-parton correlation function for quarks as \cite{Berger2001} \begin{eqnarray} \label{eq:GPDs} V_{\lambda'\lambda}&=&\frac{1}{2} \int \frac{d \omega}{2\pi}\, e^{ix (P z)} \langle p', \lambda' |\, \bar{q}(- {\textstyle\frac{1}{2}} z)\, \slash{n} \, q( {\textstyle\frac{1}{2}} z)\, \,| p, \lambda \rangle \Big|_{z = \omega n} \nonumber \\[0.2em] &=& \sum_{i} \epsilon'^{*\nu} V_{\nu\mu}^{(i)} \epsilon^\mu H_i^q(x,\xi,t) \end{eqnarray} where $\epsilon=\epsilon(p,\lambda)$ [or $\epsilon'=\epsilon'(p',\lambda')$] and $\lambda$ ($\rm{or}~\lambda')=0,~\pm1$ are the initial (or final) polarization vector and its helicity, respectively. The explicit expressions of $\epsilon$ and the helicity amplitudes of the matrix elements were introduced in Ref.~\cite{Berger2001}. The helicity amplitudes give the connection between GPDs and the Deep Inelastic Scattering(DIS) structure functions by taking the forward limit. It is argued that there are five independent tensor structures that the tensor $V_{\nu\mu}^{(i)}$ in Eq.~({\ref{eq:GPDs}}) would explicit depend on, \begin{eqnarray} \label{5tensors} \{ g_{\nu\mu}, P_\nu n_\mu , n_\nu P_\mu , P_\nu P_\mu , n_\nu n_\mu \} \ . \end{eqnarray} Consequently, the GPDs of the $\rho$ meson are defined as \begin{eqnarray} \label{eq:5GPDs} V_{\lambda'\lambda}&=& -(\epsilon'^*\cdot\epsilon)H_1^q +\frac{(\epsilon\cdot n)(\epsilon'^*\cdot P)+(\epsilon'^*\cdot n)(\epsilon\cdot P)}{P\cdot n}H_2^q -\frac{2(\epsilon\cdot P)(\epsilon'^*\cdot P)}{M^2}H_3^q \nonumber \\ && +\frac{(\epsilon\cdot n)(\epsilon'^*\cdot P)-(\epsilon'^*\cdot n)(\epsilon\cdot P)}{P\cdot n}H_4^q +\left\{ M^2\frac{(\epsilon\cdot n)(\epsilon'^*\cdot n)}{(P\cdot n)^2} + \frac{1}{3}(\epsilon'^*\epsilon) \right\} H_5^q \ , \end{eqnarray} where $M$ is the $\rho$ meson mass. The five unpolarized GPDs $H_{i}^q$($i=1\sim 5$) are the functions of $x$, $\xi$, and $t$. The explicit dependence of $H_i^q$ on the three variables is omitted for simplicity.\\ {\it Sum rules.}-The conventional form factor decomposition of the vector current for a spin-1 particle is \begin{eqnarray}\label{eq:Imm} I_{\lambda'\lambda}^\mu &=& \langle p', {\lambda'} |\, \bar{q}(0)\, \gamma^\mu \, q(0)\,| p, \lambda \rangle \nonumber \\ &=& \epsilon'^{*\beta} \epsilon^\alpha \bigg[ -\Big( G_1^q(t) g_{\beta\alpha} + G_3^q(t) \frac{ P_\beta P_\alpha}{2M^2} \Big) P^\mu + G_2^q(t) \left( g_\alpha^\mu P_\beta + g_\beta^\mu P_\alpha \right) \bigg] \ . \end{eqnarray} The conventional FFs $G_{1,2,3}$ are obtained from $G_{1,2,3}^q$ by weighting with electromagnetic charges and then summing over flavors: $G_{i}=e_u G_{i}^u + e_{\bar{d}} G_{i}^{\bar{d}}$ for $i=1, 2, 3$. It is equivalent to using the isospin combination, which will be shown later in Eq.~(\ref{eq:Gi}). Comparing with Eq.~(\ref{eq:5GPDs}), one can obtain the sum rules, \begin{eqnarray}\label{eq:sumrule} \int_{-1}^{1} dx H_i^q (x,\xi,t) &=& G_i^q(t) \quad (i=1,2,3) \ , \nonumber \\ \int_{-1}^{1} dx H_i^q (x,\xi,t) &=& 0 \quad (i=4,5) \ . \end{eqnarray} The integrals of $H_4^q$ and $H_5^q$ vanish due to the constraints of time reversal and Lorentz invariance, respectively~\cite{Berger2001}.\\ The FFs $G_{C,M,Q}$ can be expressed in terms of $G_{1,2,3}$ as~\cite{Choi2004} \begin{eqnarray} G_C(t)&=&G_1(t) + \frac{2}{3}{\eta} G_Q(t) \ , \ \nonumber \\ G_M(t)&=&G_2(t) \ , \ \nonumber \\ G_Q(t)&=&G_1(t) - G_2(t) + (1+\eta)G_3(t)\ , \ \label{eq:Gcmq} \end{eqnarray} where $\eta=-t/4M^2$. Together with Eq.~(\ref{eq:sumrule}), one can obtain $G_{C,M,Q}$ directly from GPDs $H_{1,2,3}$. Note that in many previous studies, the calculation of $G_{C,M,Q}$ from the matrix elements of $I_{\lambda'\lambda}^+$ is faced with the well-known ambiguity of the angular condition~\cite{Melo1997}. Some different prescriptions are proposed to avoid the ``worst" matrix elements. The present work bypasses this ambiguity. The normalizations take \begin{eqnarray} G_C(0)=1 \ ,~~~ G_M(0)=2M \mu \ , ~~~G_Q(0)=M^2 Q_\rho \ , \end{eqnarray} where $\mu$ and $Q_\rho$ are the $\rho$ magnetic dipole and quadrupole moments. The mean square charge radius $<r^2>$ is given by \begin{eqnarray} <r^2>=\lim_{t\rightarrow 0}\frac{6\left[ G_C(t)-1 \right]}{t} \ . \end{eqnarray} {\it Forward limit.}---For $x > 0$, the helicity amplitudes in the forward limit ($\Delta=0$) give the relations between GPDs and the unpolarized (quark-spin-averaged) parton distributions $q^\lambda(x)$~\cite{Best1997,Berger2001}, with $\lambda$ being the polarization of the $\rho$ meson, as \begin{eqnarray} H_1^q(x,0,0) &=& \frac{q^1(x)+q^{-1}(x)+q^0(x)}{3} = q(x) \ , \nonumber \\ H_5^q(x,0,0) &=& q^0(x) - \frac{q^1(x)+q^{-1}(x)}{2} \ . \end{eqnarray} For $x < 0$, the above equations with an overall sign change give the antiquark distributions at $-x$. Here, the unpolarized quark density is defined as $q^\lambda=q^\lambda_{\uparrow}+q^\lambda_{\downarrow}$, where $\uparrow$ ($\downarrow$) stands for up (down) spin projection along the direction of the motion when the $\rho$ meson moves with infinite momentum. In the constituent quark model, the sum rules, corresponding to the flavor number and momentum conservation, are \begin{eqnarray} \label{eq:sumrule_q0}\int dx u(x) = \int dx \bar{d}(x) &=& 1 \ , \\ \label{eq:sumrule_q1}\int dx [ x \left( u(x)+\bar{d}(x) \right) ] &=& 1 \end{eqnarray} for the $\rho^+$ meson.\\ At leading twist or leading order, the single flavor DIS structure function $F_1^q (x)$ is one-half of the probability to find a quark with momentum fraction $x$ and obeys the Callan-Gross relation~\cite{Berger2001,Best1997} \begin{eqnarray} \label{eq:F1q} F_1^q (x) = \frac{1}{3} \left[ q^1_\uparrow(x) +q^1_\downarrow(x) + q^0_\uparrow(x) \right] = \frac{1}{2} H_1^q(x,0,0) \ . \end{eqnarray} The single flavor structure function $b_1^q(x)$, which measures the difference in the spin projection of the $\rho$ meson, only depends on the quark-spin-averaged distribution $q^\lambda(x)$, \begin{eqnarray} b_1^q(x) &=& q^0(x) - \frac{q^1(x)+q^{-1}(x)}{2} = H_5^q(x,0,0) \ . \end{eqnarray} From parity, one has $q^\lambda_{\uparrow}=q^{-\lambda}_{\downarrow}$, and therefore the conventional structure functions, related to $q^\lambda(x)$, are \begin{eqnarray} F_1(x) = \sum_{q} e_q^2 F_1^q (x) \ , \quad b_1(x) = \frac{1}{2} \sum_{q} e_q^2 b_1^q(x) \ . \end{eqnarray} In the following, we will focus on the single flavor structure functions. In the meson case, the structure functions are identical for both flavors. It should be mentioned that the spin-1 particle, different from the spin-1/2 one, has the tensor structure function $b_1$. It triggers great interest~\cite{Close:1990zw,Cosyn:2017fbo,Dong:2014eya, Kumano:2010vz,Khan:1991qk}. The sum rule of this structure function is $\int dx b_1(x)=0$~\cite{Close:1990zw}.\\ In addition, the $n$th Mellin moment of a function $f(x)$ is defined as \begin{eqnarray} M_n(f)=\int_0^1 x^{n-1}f(x)dx \ . \end{eqnarray} For the $\rho$ meson case, to the leading order (twist 2), one finds \begin{eqnarray} 2M_n(F_1^q)=C_n^{(1)}a_n \ , \quad 2M_n(b_1^q)=C_n^{(1)}d_n \ , \end{eqnarray} where $C_n^{(k)}=1+O(\alpha)$ are the Wilson coefficients of the operator product expansion and $a_n$ and $d_n$ are the reduced matrix elements~\cite{Best1997}. With the quenched approximation, Ref.~\cite{Best1997} found that these relations hold for both even and odd $n$th orders.\\ {\it Isospin combination.}---In Eq.~(\ref{eq:5GPDs}), GPDs are defined flavor by flavor. Similar to Refs.~\cite{Broniowski2008,Broniowski200878}, the corresponding isospin projection of the isovector ($I=1$, nonsinglet) equals \begin{eqnarray} \lefteqn{ \frac{1}{2} \int \frac{d \omega}{2\pi}\, e^{ix (P z)} \langle \rho^b (p',\lambda')|\, \bar{q}(- {\textstyle\frac{1}{2}} z)\, \slash{n} \, \tau_3 q( {\textstyle\frac{1}{2}} z)\, \,|\rho^a (p,\lambda) \rangle \Big|_{z = \omega n}} \nonumber \\[0.2em] && = \imath \epsilon_{3ab} \Bigg\{ - (\epsilon'^* \epsilon)\, H_{1}^{I=1} + \frac{(\epsilon n) (\epsilon'^* P)+ (\epsilon'^* n) (\epsilon P)}{P n}\, H_{2}^{I=1} - \frac{2 (\epsilon P)(\epsilon'^* P)}{M^2}\, H_{3}^{I=1} \nonumber \\[0.2em] && \quad + \frac{(\epsilon n) (\epsilon'^* P) - (\epsilon'^* n) (\epsilon P)}{P n}\, H_{4}^{I=1} + \Bigg[ M^2\, \frac{(\epsilon n)(\epsilon'^* n)}{(P n)^2} +\frac{1}{3} (\epsilon'^* \epsilon) \Bigg] H_{5}^{I=1} \; \Bigg\} \nonumber \\[0.2em] && {}= \imath \epsilon_{3ab} \Bigg\{ - (\epsilon'^* \epsilon)\, \left( H_{1}^{u}- H_{1}^{d} \right) + \frac{(\epsilon n) (\epsilon'^* P) + (\epsilon'^* n) (\epsilon P)}{P n}\, \left( H_{2}^{u}- H_{2}^{d} \right) - \frac{2 (\epsilon P)(\epsilon'^* P)}{M^2}\, \left( H_{3}^{u}- H_{3}^{d} \right) \nonumber \\[0.2em] && {}\quad + \frac{(\epsilon n) (\epsilon'^* P) - (\epsilon'^* n) (\epsilon P)}{P n}\, \left( H_{4}^{u}- H_{4}^{d} \right) + \Bigg[ M^2\, \frac{(\epsilon n)(\epsilon'^* n)}{(P n)^2} +\frac{1}{3} (\epsilon'^* \epsilon) \Bigg] \left( H_{5}^{u}- H_{5}^{d} \right) \; \Bigg\}. \label{eq:isovectorH} \end{eqnarray} where $a,b$=0,1,2, and $\rho^\pm=\rho^1\mp\imath\rho^2$. For the isoscalar case ($I=0$, singlet), one needs the exchange $\slash{n} \, \tau_3 \leftrightarrow \slash{n}$, and therefore $H_{i}^{u}- H_{i}^{d} \leftrightarrow H_{i}^{u}+ H_{i}^{d}$. In the following work, we will only deal with a positive-charged $\rho$ and omit the subscript $+$ whenever no ambiguity arises.\\ \section{Our approach} \label{sec:The_model} In analogy to the chiral interaction Lagrangian for the $\pi\rightarrow q\bar{q}$ vertex~\cite{Frederico1992}, the effective Lagrangian for the $\rho\rightarrow\bar{q}q$ is taken as \begin{eqnarray}\label{key} \mathcal{L}_I &\sim & -\imath \frac{M}{f_\rho} \bar{q} \gamma^\mu \mathbf{\tau} q \cdot \mathbf{\rho}_\mu \nonumber \\ && = -\imath \frac{M}{f_\rho} \Big[ \bar{u} \gamma^\mu u \rho^0_\mu + \sqrt{2} \bar{u} \gamma^\mu d \rho^+_\mu + \sqrt{2} \bar{d} \gamma^\mu u \rho^-_\mu + \bar{d} \gamma^\mu d \rho^0_\mu \Big] \ , \end{eqnarray} where $f_\rho$ is the $\rho$ decay constant. In the lowest Fock state, the two-parton correlation function, the lhs of Eq.~(\ref{eq:isovectorH}), corresponds to a triangle loop~\cite{Ji2006}. The loop integral, corresponding to the active $u$ quark [see Fig.~\ref{fig:loopsud:u} and \ref{fig:nonval}], is specified as \begin{eqnarray}\label{eq:u_quark} V^{u}_{} (x, \xi, t) &=& N_{\mu\nu} \int \frac{d^4 k }{ (2\pi)^4 } \, \delta \left[ n \cdot ( x P - k ) \right] (-) Tr \Bigg[ \frac{\imath ( \slash{k}-\slash{P}+m ) }{ (k-P)^2-m^2 + \imath \epsilon} \gamma^\nu \frac{\imath ( \slash{k}+\frac{\slash{\Delta}}{2} +m ) }{ (k+\frac{\Delta}{2})^2 -m^2 + \imath \epsilon} \slash{n} \nonumber \\ && \times \frac{\imath ( \slash{k}-\frac{\slash{\Delta}}{2} +m ) }{ (k-\frac{\Delta}{2})^2 -m^2 + \imath \epsilon} \gamma^\mu \Bigg] \Lambda(k-P,p')~ \Lambda(k-P,p), \end{eqnarray} where $m$ is the constituent quark mass and \begin{eqnarray} N_{\mu\nu} &=& \frac{M^2}{f_\rho^2} \frac{ \epsilon'^*_\nu(p', \lambda') \epsilon_\mu(p, \lambda) }{ 2(2\pi)^3 \sqrt{\omega_{p'}\omega_{p} } } \ , \end{eqnarray} and the scalar function \begin{eqnarray} \label{eq:lambda} \Lambda(k-P,p) &=& \frac{c }{ [ (k-P)^2-m^2_R+ \imath \epsilon] [ ({k}-\frac{\Delta}{2})^2-m^2_R+ \imath \epsilon] } \end{eqnarray} is following Ref.~\cite{Frederico2009}, with $m_R$ and $c$ being the regulator mass and the normalization factor, respectively. The loop of the struck $d$ quark can be obtained from the crossed Feynman diagram of Fig.~\ref{fig:loopsud:d}. Here, the scalar product function $\Lambda(k-P,p)$ is symmetric under the exchange of the momentums of the two constituents. This scalar function is employed to describe the momentum dependent between $q$ and $\bar{q}$ inside the $\rho$ meson. Actually, it plays a role of the momentum cutoff similar to the Pauli-Villars regularization~\cite{Frederico2009}. It may also stand for a property of the Bethe-Salpeter amplitude~\cite{Melo2002} and contain the information of the nonperturbative effect. Conceptually, by taking $\Lambda(k-P,p)$ as a part of the quark-antiquark-meson vertex, one gets the smeared quark-antiquark-meson vertex, $\gamma^\mu\Lambda(k-P,p)$~\cite{Choi2004}. As will be seen later, the symmetric momenta convention, shown in Figs.~\ref{fig:loopsud} and \ref{fig:nonval}, enables the vertex to fulfill the constraint from the isospin symmetry.\\ \begin{figure} \centering {\hskip -1.5cm} \subfigure[The struck $u$ quark in the valence regime]{\label{fig:loopsud:u} \begin{minipage}[b]{0.4\textwidth} \includegraphics[width=1\textwidth]{loops0403_2.pdf} \end{minipage} } {\hskip 1cm} \subfigure[The struck $d$ quark in the valence regime]{\label{fig:loopsud:d} \begin{minipage}[b]{0.3\textwidth} \includegraphics[width=1\textwidth]{loops0403.pdf} \end{minipage} } \caption{\label{fig:loopsud}{\small Direct $(a)$ and crossed $(b)$ Feynman diagrams contributing to the GPDs of quark $q$ and antiquark $\bar{q}$ of $\rho$ meson. The gray blobs represent the normal Light Front(LF) wave vertexes. The plus component of the momentum carried by red lines have positive sign in the valence regime. } \end{figure} \begin{figure}[t \centerline{\includegraphics[width=8.6cm]{loops0515-1.pdf}} \caption{\label{fig:nonval} \small The struck $u$ quark in the nonvalence regime, yielded by the off-diagonal terms in the Fock space. The black blob represents the non-wave-function vertex. The red line has the negative sign in this regime. } \end{figure} Note that the elastic FFs can be calculated in different reference frames, such as the Drell-Yan frame~\cite{Brodsky1998}, where $\Delta^+=0$ and $\xi=0$, and the Breit frame, where $\Delta^+=-\Delta^-$ (see Ref.\cite{Frederico2009} and \cite{lev1998} for discussions on the motivation of adopting this frame). In this work, the above loop integral is performed in the Breit frame, and then the $\xi$ dependence of GPDs can be obtained as well. In this special reference frame, the momentum transfer and initial and finial momenta are \begin{eqnarray} \Delta &=& (\Delta^+,\Delta^-,\bm\Delta_\perp)=(q_z,-q_z,q_x,q_y) \ , \nonumber \\ p &=& (p^0- \frac{q_z}{2},p^0+\frac{q_z}{2},-\frac{\bm\Delta_\perp}{2}) \ , \nonumber \\ p' &=& (p^0+\frac{q_z}{2},p^0-\frac{q_z}{2},\frac{\bm\Delta_\perp}{2}) \ , \end{eqnarray} where $\bm\Delta_\perp=(q_x,q_y)$ and $p^0=M\sqrt{1-\Delta^2/4M^2}$. Since $\bm\Delta_\perp^2\geqslant 0$, one gets the constraint $\abs{\xi}\leqslant 1/\sqrt{1-4M^2/t}$. \\ The physics in the nonvalence regime, shown in Fig.~\ref{fig:nonval}, is remarkably different from the one in the valence regime. According to Ref.~\cite{Burkardt2000}, the $q\bar{q}$ pair, created by the virtual photon, could interact with itself and form a virtual meson, before merging with the meson state. From another point of view, the higher Fock component contributions should be taken into account in both two regimes for completeness. Instead of finding all higher Fock component contributions as Refs.~\cite{Brodsky2001,Diehl2001}, we handle the nonvalence contribution by replacing the simple $\gamma^\mu$ with a phenomenological meson vertex $\Gamma^\mu$ as shown in Ref.~\cite{Choi2004}. This is an analogy to the covariant form~\cite{Jaus2003}, which has been applied for the deuteron case in our previous work~\cite{Sun2016}. Thus the smeared quark-antiquark-meson vertex becomes $\Gamma^\mu\Lambda(k-P,p)$.\\ For the $u$ quark contribution shown in Fig.~\ref{fig:loopsud:u}, the spectator constituent momentum is $k_s=k_{\bar{d}}=k-P$. The phenomenological vertices under this loop momentum assignment read \begin{eqnarray} \label{eq:vertex} \Gamma^{\mu}_{i} = \gamma^{\mu} - \frac{(2k-P-\frac{\Delta}{2})^{\mu}}{D_{i}} \ , \quad \Gamma^{\nu}_{f} = \gamma^{\nu} - \frac{(2k-P+\frac{\Delta}{2})^{\nu}}{D_{f}} \ , \end{eqnarray} where $D_{i,f} = M_{i,f} + 2m $, and the kinematic invariant masses $M_{i,f}$ are~\cite{Choi2004} \begin{eqnarray} \label{eq:vertexM:v} M_{i}^2 = \frac{\kappa^2_\perp + m^2}{1-x'} + \frac{\kappa^2_\perp + m^2}{x'} \ , \\%\nonumber \\ M_{f}^2 = \frac{\kappa'^2_\perp + m^2}{1-x''} + \frac{\kappa'^2_\perp + m^2}{x''} \ , \end{eqnarray} with the LF momentum fractions $x'= - k_s^+/p^+ =(1-x)/(1-\abs{\xi})$, $x''=x' p^+/p'^+ = (1-x)/(1+\abs{\xi}) $, and \begin{eqnarray} \kappa_\perp &=& k_{s\perp} - \frac{k_s^+}{p^+} p_{i\perp} \, = (k-P)_\perp- \frac{x'}{2} {\Delta}_{\perp} \ , \nonumber \\ \kappa'_\perp &=& (k-P)_\perp+ \frac{x''}{2} {\Delta}_{\perp} \ . \end{eqnarray} In the nonvalence regime, shown in Fig.~\ref{fig:nonval}, the relation of $-\abs{\xi}<x<\abs{\xi}$ leads to $x' > 1$, and the initial vertex becomes the non-wave-function vertex. To keep the mass square positive [see $M_i$ in Eq.~(\ref{eq:vertexM:v})], Ref.~\cite{Choi2004} proposes to directly replace $1-x'$ with $x'-1$ in Eq.~(\ref{eq:vertexM:v}) and gets \begin{eqnarray} \label{eq:vertexM:nv} M_{i(NV)}^2 = \frac{\kappa^2_\perp + m^2}{x'-1} + \frac{\kappa^2_\perp + m^2}{x'}. \end{eqnarray} Hereafter, we use the subscripts $V$ and $NV$ to stand for the valence and nonvalence regimes, respectively. Note that, when both the struck and spectator constituents are on mass shells, namely, $(k-\frac{\Delta}{2})^2=(k-P)^2=m^2$, one gets $M_{i}^2=M_{f}^2=M^2$. Due to the exchange $1-x'\leftrightarrow x'-1$, the relation of $M_{i(NV)}^2=M^2$ no longer holds for the nonvalence case. However, $M_{i}^2$ and $M_{i(NV)}^2$ have the same limiting value as $x\rightarrow\abs\xi$, and thus the continuity of GPDs is guaranteed. The physics in the parton-number-changing nonvalence Fock state contributions is much more complicated than that in the valence one, since the creation of the $q\bar{q}$ pair involves an infinite sum of the meson contribution. Due to the lack of the information about the nonvalence regime~\cite{Burkardt2000}, in some model calculations, the discontinuity may arise at $x=\xi$ (or $\abs\xi$) where the valence and nonvalence regimes divide, like in Ref.~\cite{Choi2001} for the $\pi$ meson GPDs.\\ With the above preparations, the integral of Eq.~(\ref{eq:u_quark}) in the light-front frame reads \begin{eqnarray}\label{Vlf} V^u_{} (x, \xi, t) &=& N_{\mu\nu} \int \frac{dk^+dk^- d{\bm k}_\perp}{ 4 (2\pi)^4} \delta\left[ x P^+ -k^+ \right] \frac{ (-) Tr[{\cal O}^{\mu\nu+}] }{ (k^+ - P^+) (k^+ +\frac{\Delta^+}{2}) (k^+ -\frac{\Delta^+}{2})} \nonumber \\ && ~\times \frac{1 }{ \left[ k^- -P^- -(k-P)^-_{on}+i\frac{\epsilon}{ k^+ - P^+} \right ]} \frac{1 }{ \left[ k^- +\frac{\Delta^-}{2} -(k +\frac{\Delta}{2})^-_{on}+i \frac{\epsilon}{k^+ +\frac{\Delta^+}{2}} \right ]} \nonumber \\ && ~\times \frac{1 }{ \left[ k^- -\frac{\Delta^-}{2} -(k -\frac{\Delta}{2})^-_{on}+i \frac{\epsilon}{k^+ -\frac{\Delta^+}{2}} \right ]} \nonumber \\ && ~\times \Lambda(k-P,p')~ \Lambda(k-P,p) , \end{eqnarray} where \begin{eqnarray} {\cal O}^{\mu\nu+} &=& \imath^3 ( \slash{k}-\slash{P}+m ) \Gamma^\nu_{i} ( \slash{k}+\frac{\slash{\Delta}}{2} +m ) \gamma^+ ( \slash{k}-\frac{\slash{\Delta}}{2} +m ) \Gamma^\mu_{f} \ , \\ \label{eq:kon} (k-P)^-_{on} &=& \frac{(k-P)_\perp + m_{}^2}{k^+ - P^+} \quad \ , \text{etc.} \ , \end{eqnarray} and the $\Lambda$ functions, Eq.~(\ref{eq:lambda}), are chosen without changing the distribution of the poles with respect to the three denominators of the propagators. There are six poles with respect to $k^-$ for the integral, the same as in the pion case~\cite{Frederico2009}. They are \begin{eqnarray} k^-_{1(2)} &=& P^- + (k-P)^-_{on(R)} - i\frac{\epsilon}{ k^+ - P^+} \ , \nonumber \\ k^-_{3(4)} &=& \frac{\Delta^-}{2} + (k -\frac{\Delta}{2})^-_{on(R)} - i \frac{\epsilon}{k^+ -\frac{\Delta^+}{2}} \ , \nonumber \\ k^-_{5(6)} &=& -\frac{\Delta^-}{2} + (k +\frac{\Delta}{2})^-_{on(R)} - i \frac{\epsilon}{k^+ +\frac{\Delta^+}{2}} \ , \end{eqnarray} where $(k-P)^-_{R}$ and $(k \pm \frac{\Delta}{2})^-_{R}$ are obtained by replacing $m$ with $m_R$ in Eq.~(\ref{eq:kon}), respectively. Since $p'^+ > p^+ > 0$, after integrating over $k^-$, there are only two regions in $k^+$ that contribute to the integral, the valence regime $k^+ \in \left[ {\Delta^+}/{2}, P^+ \right]$ and the nonvalence one $k^+ \in \left[ - {\Delta^+}/{2}, {\Delta^+}/{2} \right]$. In the case $p'^+ = p^+$($\xi=0$), there is only one regime (valence), and the detail calculation can be found in Refs.~\cite{Frederico1992,Miller2009}. The first two poles $k^-=k^-_{1(2)}$ contribute to the valence part, and last two poles $k^-=k^-_{5(6)}$ contribute to the nonvalence one (see Fig. 2). The residue of the pole $k^-=k^-_{1}$ reads \begin{eqnarray}\label{Vlfv1} \lefteqn{ V^u_{1(V)} (x, \xi, t) = \frac{-N_{\mu\nu} }{ 4 (2\pi)^4} \int_{\frac{\Delta^+}{2}}^{P^+} dk^+ \int d{\bm k}_\perp \delta\left[ x P^+ -k^+\right] } \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \nonumber \\ && ~\times \frac{ Tr[{\cal O}^{\mu\nu+}] }{ (k^+ - P^+) (k^+ +\frac{\Delta^+}{2}) (k^+ -\frac{\Delta^+}{2})} \frac{1 }{ \left[ k^- +\frac{\Delta^-}{2} -(k +\frac{\Delta}{2})^-_{on}+i \frac{\epsilon}{k^+ +\frac{\Delta^+}{2}} \right ]} \nonumber \\ && ~\times \frac{1 }{ \left[ k^- -\frac{\Delta^-}{2} -(k -\frac{\Delta}{2})^-_{on}+i \frac{\epsilon}{k^+ -\frac{\Delta^+}{2}} \right ]} \nonumber \\ && ~\times \Lambda(k-P,p')~ \Lambda(k-P,p) \Big|_{k^- = k^-_{1}} \ , \end{eqnarray} and for the rest of the poles $k^-=k^-_{i}$, $V^u_{i(V/NV)} (x, \xi, t)$ ($i$ labels different poles) can be obtained similarly. Then, the valence contributions read \begin{eqnarray} V^u_{(V)} = V^u_{1(V)} + V^u_{2(V)} \ , \end{eqnarray} where the $\xi$-independent (also frame-independent) full result for the $u$ quark GPDs is \begin{eqnarray} V^u_{} = V^u_{(V)} + V^u_{(NV)} \ . \end{eqnarray} It is easy to verify that, under the assignment of loop momenta in Fig.~\ref{fig:loopsud}, the trace part of the loop integral for the $d$ quark is related to that of the $u$ quark as \begin{eqnarray} Tr\left[ {\cal O}^{\mu\nu+}_{(d)} (x,-k) \right] = - Tr\left[ {\cal O}^{\mu\nu+}_{} (-x,k) \right] \ . \end{eqnarray} Therefore, the relation $ V^d_{} ( x, \xi, t) = - V^u_{} ( -x, \xi, t)$ is preserved, as required by the isospin and crossing symmetries~\cite{Frederico2009}. Here, the symmetric momenta convention are essential for the present model to fulfill this constraint. We, thus, get \begin{eqnarray} \int_{-1}^1 dx H_i^d (x,\xi,t) = -\int_{-1}^{1} dx \; H_i^u (x,\xi,t) \ , \end{eqnarray} with $i=1\sim5$. Finally, the isovector GPDs satisfy \begin{eqnarray} H_i^{I=1} (x,\xi,t) &=& H_i^{I=1} (-x,\xi,t). \end{eqnarray} In addition, from Eq.~(\ref{eq:sumrule}), the sum rules of the conventional FFs, it is easy to see the equivalent~\cite{Berger2001,Broniowski200878} \begin{eqnarray} \label{eq:Gi} G_i &=& e_u \int_{-1}^1 dx \; H_i^{u} (x,\xi,t) + e_d \int_{-1}^1 dx \; H_i^d (x,\xi,t) \nonumber \\ &=& \int_{-1}^1 dx \; H_i^{I=1} (x,\xi,t) \ . \end{eqnarray} In our work, the strategy to extract the five GPDs $H_i$, is to construct five independent equations by replacing $\epsilon'^{*\nu} \epsilon^\mu$ in $V^u$ with the tensors listed in (\ref{5tensors}) separately, and finally to solve them jointly. See the Appendix for more details. \section{Results}\label{sec:Results} In this work, we take the constituent mass $m=0.403~\mathrm{GeV}$ and regulator mass $m_R=1.61~\mathrm{GeV}$. The requirement of stability of the bound states, $m > M/2$ and $m+m_R > M$, is maintained.\\ The calculated $\rho$ meson FFs and low-energy observables are shown in Fig.~\ref{FFs} and Table~\ref{loweo}. The nonvalence contributions to FFs $G_{1,2,3}$ at $\xi$=$-0.2$, $-0.4$, and $-0.6$ are shown in Fig.~\ref{fig:XiTGV}. Due to the constraint $\abs{\xi}\leqslant 1/\sqrt{1-4M^2/t}$, the corresponding ${\abs t}_{min}$ are $0.10,~0.45$, and $1.33~\mathrm{GeV}^2$, respectively. Figures~\ref{fig:h1:3d}-\ref{fig:h3:3d} show the 3D plots of the unpolarized $\rho$ meson GPDs $H_{1,2,3}$ as the functions of variables $x$ and $t$ at the two different skewnesses $\xi=0$ and $-0.4$. The values are normalized to the corresponding FFs $G_i(t)$ for a convenience of the comparison. Figures~\ref{fig:h1}-\ref{fig:h3} show $H_{1,2,3}$ at specific momentum transfers $t$ ($-0.5$ and $-10~\mathrm{GeV}^2$) and different skewnesses $\xi$ ($0$, $-0.2$, $-0.4$, and $-0.6$). Due to the symmetry, only the $0~<~x~<~1$ regime is plotted in Figs.~\ref{fig:h1}-\ref{fig:h3}. Moreover, the two obtained structure functions, $F_1^u(x)$ and $b_1^u(x)$, are plotted in Figs.~\ref{F1} and \ref{b1}, respectively.\\ For the charge form factor $G_C$ in Fig.~\ref{FFs}, we found it has a crossing point near $t=-3.8~\mathrm{GeV}^2$. Moreover, the tendencies of $t$ dependence of all three obtained FFs agree with the previous results, such as Refs.~\cite{Cardarelli1995,Choi2004,Biernat2014}. In Table~\ref{loweo}, other results of the LCCQMs, of the point form, of the lattice QCD, and of the experiment measurement are also listed for a comparison. Although the LCCQM proposed in the present work is inspired by former ones~\cite{Jaus2003,Choi2004} (for the meson vertex) and Ref.~\cite{Frederico2009}, etc. (for the cutoff function), different values of the model parameters, $m$ and $m_R$, are adopted here. Thus, the calculated results are different from theirs. Our calculated value of the magnetic dipole moment, $\mu=2.06$, is very close to the nonrelativistic value ($\mu=2$)~\cite{Jaus2003} and to the experimental data. In addition, the estimated mean square radius $<r^2>$ and quadrupole moment $Q_{\rho}$ in our calculation are also compatible with other calculations. It is expected that the future measurements for the $\rho$ meson radius and quadrupole moment may provide a test for different model calculations.\\ The Lorentz invariance requires that the FFs $G_i$ in Eq~(\ref{eq:Imm}) are frame independent, since the integration over $x$ removes the influence of different light-cone direction $n$ and therefore the integral remains $\xi$ independent. However, it is still interesting to investigate the nonvalence contribution (at $\xi\ne 0$) to $G_i$. As one can see from Fig.~\ref{fig:XiTGV}, for all three FFs, the valence contributions are dominant in small skewness $\abs\xi$, and the percentage of the nonvalence contributions increases as $\abs\xi$ does, which is same as the pion case~\cite{Choi2001}. As $\abs t$ increases, the nonvalence contribution in $G_1$ increases, while those in $G_2$ and $G_3$ go oppositely. Especially for $G_2$, the decrease is very distinct. It is clearly illustrated in Fig.~\ref{fig:h2:t10} for the GPD $H_2$ at $t=-10~\mathrm{GeV}^2$. In contrast, in the pion case~\cite{Choi2001}, the nonvalence contribution to the pion form factor is especially large in the large $\abs\xi$ and small $\abs t$ region. In all three $\rho$ FFs $G_i$, we find that the sum of the numerical result of the valence and nonvalence contributions only has negligible variation over $\xi$. Thus, the frame independence of our model calculation is well satisfied. \\ \begin{figure}[t \centerline{\includegraphics[width=8.6cm]{form-factors.pdf}} \caption{\label{FFs} The $\rho$ FFs, $G_C$ (solid black line), $G_M$ (dashed red line) and $G_Q$ (dot-dashed blue line). } \end{figure} \begin{table* \caption{\label{loweo} The $\rho$ meson low-energy observables of the mean square charge radius ($<r^2>$), the magnetic dipole ($\mu$) and the quadrupole ($Q_\rho$) moments in the units of fm${}^2$, $1/2M$, and $1/M^2$, respectively. The results of other LCCQMs~\cite{Melo1997,Cardarelli1995,Jaus2003,Choi2004,Mello2015}, of the point-form formalism~\cite{Biernat2014}, of the lattice QCD~\cite{Owen2015}, and of the experiment measurement~\cite{Gudino2014} are also displayed for a comparison. } \begin{center} \begin{tabular}{c|cccccccccc} \hline \hline &\cite{Melo1997} &\cite{Cardarelli1995} &\cite{Choi2004} &\cite{Jaus2003} &\cite{Mello2015} &\cite{Biernat2014} &\cite{Owen2015} &\cite{Gudino2014} &this work \\\hline $<r^2> $ &0.37 &0.35 &-- &-- &0.268 &-- &0.670(68) &-- &0.52 \\\hline $\mu$ &2.14 &2.26 &1.92 &1.83 &2.21 &2.2 &2.613(97) &2.1(5) &2.06 \\\hline $Q_\rho$ &$-0.79$ &$-0.37$ &$-0.43$ &$-0.33$ &$-0.882$ &$-0.47$ &$-0.733(99)$ &-- &$-0.323$ \\\hline \hline \end{tabular} \end{center} \end{table*} \begin{figure}[!t] \centering \subfigure[]{\label{fig:XiTGV:0} \begin{minipage}[b]{0.4\textwidth} \includegraphics[width=1\textwidth]{discontenuity-XiTGnv1.pdf} \end{minipage} } \subfigure[]{\label{fig:XiTGV:1} \begin{minipage}[b]{0.4\textwidth} \includegraphics[width=1\textwidth]{discontenuity-XiTGnv2.pdf} \end{minipage} } \subfigure[]{\label{fig:XiTGV:2} \begin{minipage}[b]{0.4\textwidth} \includegraphics[width=1\textwidth]{discontenuity-XiTGnv3.pdf} \end{minipage} } \caption{\label{fig:XiTGV}{The nonvalence contributions to FFs $G_1$, $G_2$ and $G_3$ at $\xi$=$-0.2$ \text{(dotted red line)},$-0.4$ \text{(dashed blue line)},$-0.6$ \text{(dot-dashed purple line)}, respectively.}} \end{figure} \begin{figure*}[!ht] \centering \subfigure[$ \xi=0 $]{\label{fig:h1:3d:xi0}\includegraphics[width=7.0cm]{GPDsH1xi0.pdf}} \subfigure[$ \xi=-0.4 $]{\label{fig:h1:3d:xi04}\includegraphics[width=7.0cm]{GPDsH1xi04.pdf}} \caption{ The 3D $\rho^+$ GPD $H_1$ at $\xi=0~\text{(a)}$ and $-0.4~\text{(b)}$. } \label{fig:h1:3d} \end{figure*} \begin{figure* \centering \subfigure[$ \xi=0 $]{\label{fig:h2:3d:xi0}\includegraphics[width=7.0cm]{GPDsH2xi0.pdf}} \subfigure[$ \xi=-0.4 $]{\label{fig:h2:3d:xi04}\includegraphics[width=7.0cm]{GPDsH2xi04.pdf}} \caption{$\rho^+$ GPD $H_2$. The same line code is used in Fig.~\ref{fig:h1:3d}. } \label{fig:h2:3d} \end{figure*} \begin{figure* \centering \subfigure[$ \xi=0 $]{\label{fig:h3:3d:xi0}\includegraphics[width=7.0cm]{GPDsH3xi0.pdf}} \subfigure[$ \xi=-0.4 $]{\label{fig:h3:3d:xi04}\includegraphics[width=7.0cm]{GPDsH3xi04.pdf}} \caption{$\rho^+$ GPD $H_3$. The same line code is used in Fig.~\ref{fig:h1:3d}.} \label{fig:h3:3d} \end{figure*} \begin{figure*}[!ht] \centering \subfigure[$t=-0.5~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4$] {\label{fig:h1:t05}\includegraphics[width=7.0cm]{discontenuity-T05XiH1.pdf}} \subfigure[$t=-10~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4,\;-0.6$] {\label{fig:h1:t10}\includegraphics[width=7.0cm]{discontenuity-T10XiH1.pdf}} \caption{$\rho^+$ GPD $H_1(x,\xi, t)$ at (a) $t=-0.5~\rm{GeV}^2$ and (b) $-10~\rm{GeV}^2$. The solid black, dotted red and dashed blue curves stand for the $H_1$ with $\xi=0, -0.2$, and $-0.4$, respectively. The dotted-dashed purple curve in (b) is for $\xi=-0.6$. The vertical dashed lines on the x axis represent $x=\mid\xi\mid$. } \label{fig:h1} \end{figure*} \begin{figure* \centering \subfigure[$t=-0.5~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4$] {\label{fig:h2:t05}\includegraphics[width=7.0cm]{discontenuity-T05XiH2.pdf}} \subfigure[$t=-10~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4,\;-0.6$] {\label{fig:h2:t10}\includegraphics[width=7.0cm]{discontenuity-T10XiH2.pdf}} \caption{$\rho^+$ GPD $H_2$. The same line code is used in Fig.~\ref{fig:h1}. } \label{fig:h2} \end{figure*} \begin{figure* \centering \subfigure[$t=-0.5~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4$]{\label{fig:h3:t05} \includegraphics[width=7.0cm]{discontenuity-T05XiH3.pdf}} \subfigure[$t=-10~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4,\;-0.6$]{\label{fig:h3:t10} \includegraphics[width=7.0cm]{discontenuity-T10XiH3.pdf}} \caption{$\rho^+$ GPD $H_3$. The same line code is used in Fig.~\ref{fig:h1}.} \label{fig:h3} \end{figure*} It should be stressed that our results, shown in Figs.~\ref{fig:h1:3d}-\ref{fig:h3}, are continuous at $x=\xi$ (or $\abs\xi$) as discussed earlier. The $\xi$ trajectory limits that $-0.42~\le~\xi~\le~0$ for $t=-0.5~\mathrm{GeV}^2$, and $-0.90~\le~\xi~\le~0$ for $t=-10~\mathrm{GeV}^2$. As one can see from Figs.~\ref{fig:h1:t05} and \ref{fig:h2:t05}, in small $\abs t$ region, the transition from the valence to novalence regimes in $H_{1}$ and $H_{2}$ is quite smooth. However, in the large $\abs t$ region, as shown in Figs.~\ref{fig:h1:t10} and \ref{fig:h2:t10}, both $H_{1}$ and $H_{2}$ become sensitive to the transition in the nonzero skewness case, while Figs.~\ref{fig:h3} and \ref{fig:h3:3d} show that $H_{3}$ is very sensitive when $x\rightarrow\xi$ (or $\abs\xi$) as $\xi~\ne~0$, in both the small and large $\abs t$ regions. \\ We know that, in the forward limit ($t\rightarrow0$) and in the deep inelastic region, $H_{1}^q(x,0,0)/2$ corresponds to the single flavor structure function $F_1^q(x)$ and $H_{5}^q(x,0,0)$ corresponds to the structure function $b_1^q(x)$. The two obtained functions $F_1^u$ and $b_1^u$ are plotted in Figs.~\ref{F1} and \ref{b1}, respectively. Our result for $F_1^u$ has a crossing near $x=0$, which is beyond the expectation, since as $x\rightarrow0$, $F_1^u$ should decrease to zero smoothly. This may be due to the fact that the contribution of the gluon GPDs becomes more important in the small-$x$ regime~\cite{Diehl2003}, which is beyond the scope of the present calculation. As for $b_1^u(x)$ or more general $H_{5}^u(x,\xi,t)$, the sum rules Eq.~(\ref{eq:sumrule}) requires the integral over $x$ vanishes for any $\xi$ and $t$. Our numerical result holds the sum rule for $H_4^u$ quiet well, but for $H_5^u$, the integral deviates from zero by, at most, $\sim~6.5~\%$ [with repect to $G_C(0)=1$] when $-7~\mathrm{GeV}^2\le t \le 0$. The violation of sum rules of $H_4$ and $H_5$ is also encountered in the deuteron case, such as the numerical model in Ref.~\cite{Cano2004}. In addition, the symmetry around $x\sim1/2$ preserves approximately for both $F_1^u(x)$ and $b_1^u(x)$ in our phenomenological model calculation. This symmetry conforms to the isospin and crossing symmetries, which reduces $u_{\rho^+}{(x)}={\bar{d}}_{\rho^+}{(1-x)}$.\\ \begin{figure}[!t \centerline{\includegraphics[width=8.6cm]{struture-function-F1.pdf}} \caption{\label{F1} The DIS structure function $F_1$.} \end{figure} \begin{figure}[h \centerline{\includegraphics[width=8.6cm]{struture-function-b1.pdf}} \caption{\label{b1} The DIS structure function $b_1$.} \end{figure} \section{QCD evolution}\label{sec:evolution} It is known that the low-energy chiral quark model provides the initial conditions for the QCD evolution. The present work assumes that the valence quarks carry all the momentum at a factorization scale $Q_0$. To compare our result with the lattice calculation, the evolution is needed. As far as we know, Ref.~\cite{Best1997} is the only one lattice QCD calculation for the moments of the unpolarized $\rho$ meson, which is at the scale $Q= 2.4~\mathrm{GeV}$ with quenched approximation. Its results are supported by the latter QCD sum rule calculation in Ref.~\cite{Oganesian2001}. The leading order(LO) DGLAP evolution for the moments of the single flavor structure function $F_1^u(x)$ reads \begin{eqnarray} \label{eq:dglap} \frac{V_n^u(Q)}{V_n^u(Q_0)} = \left( \frac{\alpha(Q)}{\alpha(Q_0)} \right)^{\gamma_n^{(0)}/(2\beta_0)} \end{eqnarray} where the valence-quark momentum fractions $V_n^u=M_{n+1}\left[H_{1}^u(x,0,0)\right]=2M_{n+1}\left[F_1^u(x)\right]\sim a_{n+1}$ and the running coupling constant is \begin{eqnarray} \alpha(Q) &=& \frac{4\pi}{\beta_0 \text{log}(Q^2/\Lambda^2_{QCD})} \ , \end{eqnarray} where $\beta_0 = {11N_c}/{3} - {2N_f}/{3} $ with $N_c=N_f=3$ and \begin{eqnarray} \Lambda_{QCD} = 0.226~GeV \end{eqnarray} being employed~\cite{Broniowski2008,Broniowski200878}. The percentage of the $\rho$ total momentum carried by the valence quarks is $V_1=V_1^u +V_1^{\bar{d}}$. In Ref.~\cite{Best1997}, it was found that $V_1^q(Q=2.4~\mathrm{GeV})=0.33(2)$ and therefore $V_1$ is about $70\%$. At the quark model point $Q_0$, i.e. the model factorization scale, $V_1(Q_0)$ turns out to be \begin{eqnarray} V_1(Q_0)=1 , \quad G_1(Q_0)+S_1(Q_0)=0 , \end{eqnarray} from the downward LO DGLAP evolution. In the above equation, $G_1(Q)$ and $S_1(Q)$ are the gluon and sea momentum fractions, respectively. Thus, quark model point $Q_0$ is \begin{eqnarray} \label{eq:scaleQ0} Q_0 = 528_{-62}^{+77} \; \text{MeV} \ . \end{eqnarray} The error bars come from the uncertainty in lattice result for $V_1^q$. This is a rather low scale, however, the typical expansion parameter $\alpha(Q_0)/(2\pi)=0.131_{-0.023}^{+0.018}$ makes the perturbation theory meaningful. It should be mentioned that our numerical result for $V_1$ is $1.02$, which diverges from unity by 2\%. At the scale $Q=2.4~\mathrm{GeV}$, the results for $V_{1,2,3}$ (or $a_{2,3,4}$) and $d_{2,3,4}$ of Ref.~\cite{Best1997} are \begin{eqnarray} V_1^u=0.33(2)\ , \quad V_2^u=0.17(5)\ , \quad V_3^u=0.06(4)\ , \\ d_2=0.29_{-23}^{+22}\ , \quad d_3=-0.001(15)\ , \quad d_4=-0.01(6) \ . \end{eqnarray} After the LO DGLAP evolution to the lattice scale, our model predicts \begin{eqnarray} V_1^u=0.34(2)\ , \quad V_2^u=0.15(1)\ , \quad V_3^u=0.08(1)\ , \\ d_2=0.044(3)\ , \quad d_3=0.048(5)\ , \quad d_4=0.039(5)\ , \end{eqnarray} where the error bars came from the uncertainty of the predicted scale $Q_0$ in Eq.~(\ref{eq:scaleQ0}). As one can see, except for $d_2$, the lowest moments of $b_1^q(x)$, our results agree well with the lattice calculations. However, it should be emphasized that Ref.~\cite{Best1997} concluded their $d_2$ value being ``surprisingly" large at the scale of $Q=2.4~\mathrm{GeV}$, since $b_1^q(x)$ should vanish if the $\rho$ meson is in a pure ${}^3S_1$ state. We believe that our estimated smaller value for $d_2$ is more reasonable since only the ${}^3S_1$-wave coupling is taken into account in the present calculation and the ${}^3D_1$ admixture is thought to be small ($\sim 1\%$) as mentioned earlier. \section{Summary and conclusions} \label{sec:summary} In the present work, we perform a calculation for the $\rho$ meson unpolarized GPDs by employing a light-cone constituent quark model and using the isospin combination~\cite{Broniowski2008,Broniowski200878}. The smeared $\rho-q\bar{q}$ meson vertex, which represents the nonperturbative QCD effect, is adopted following Ref.~\cite{Choi2004} but using the symmetric loop momentum convention in order to satisfy the isospin symmetry. The three $\rho$ meson FFs and some other low-energy observables are calculated. Our results are compatible with the previous calculations. By considering the sum rules of GPDs, the unpolarized DIS structure functions have also been estimated, and the symmetric distribution is basically maintained in our numerical calculation. This feature reflects the isospin and crossing symmetries. At $x=\xi$ (or $\abs\xi$) where the DGLAP and ERBL regimes meet, GPDs in our calculation are continuous, as required by the consistency of factorization at leading twist~\cite{Diehl2003}. After the QCD evolution, the model predictions for the moments of structure functions are compared with the lattice calculation. The obtained factorization scale $Q_0$ is a rather low one in this work. However, the corresponding typical expansion parameter is still small enough to make the perturbative calculation meaningful. It is encouraging that all the first three-order moments in our calculation are compatible with the lattice calculation at the same scale ratio. The present model can be also applied for the polarized GPDs of the $\rho$ meson, and such a calculation is in a progress. Moreover, a calculation for the deuteron GPDs is also expected in the future.\\ \section*{Acknowledgements} We would like to thank Yu Jia, Wei Sun, Yu Lu, and B. Pire for their useful and constructive discussions. This work is supported by the National Natural Sciences Foundations of China under Grant No. 11475192 and No. 11521505, and by the fund provided to the Sino-German CRC 110 "Symmetries and the Emergence of Structure in QCD" project by NSFC under Grant No. 11621131001. \section*{APPENDIX: Extracting the unpolarized GPDs.} \label{sec:appendix} The following is the method to extract the unpolarized GPDs $H_i$. First, the loop integral, Eq.~(\ref{Vlf}), after excluding the two polarization vectors $\epsilon_{\mu}$ and $\epsilon'^*_{\nu}$, is \begin{eqnarray} V^{u\, ; \mu\nu}_{ } (x, \xi, t) % &=& \frac{M^2}{f_\rho^2} \frac{ 1 }{ 2(2\pi)^3 \sqrt{\omega_{p'}\omega_{p} } } \int \frac{d^4 k }{ (2\pi)^4 } \, \delta \left[ x P^+ -k^+ \right] \nonumber \\ && \times (-) Tr \Bigg\{ \frac{\imath ( \slash{k}-\slash{P}+m ) }{ (k-P)^2-m^2 + \imath \epsilon} \gamma^\nu \frac{\imath ( \slash{k}+\frac{\slash{\Delta}}{2} +m ) }{ (k+\frac{\Delta}{2})^2 -m^2 + \imath \epsilon} \slash{n} \frac{\imath ( \slash{k}-\frac{\slash{\Delta}}{2} +m ) }{ (k-\frac{\Delta}{2})^2 -m^2 + \imath \epsilon} \gamma^\mu \Bigg\} \nonumber \\ && \times \frac{c }{ [ (k-P)^2-m^2_R+ \imath \epsilon] [ ({k}+\frac{\Delta}{2})^2-m^2_R+ \imath \epsilon] } \times \frac{c }{ [ (k-P)^2-m^2_R+ \imath \epsilon] [ ({k}-\frac{\Delta}{2})^2-m^2_R+ \imath \epsilon] } \nonumber \\ [1.3em] &=& -g^{\mu \nu} H^u_{1} + \frac{n^\mu P^\nu + P^\mu n^\nu }{n \cdot P } H^u_{2} - \frac{ 2 P^\mu P^\nu}{ M^2}H^u_{3} + \frac{n^\mu P^\nu - P^\mu n^\nu }{n \cdot P } H^u_{4} + \bigg\{ \frac{ M^2 n^\mu n^\nu}{(n \cdot P )^2} + \frac{1}{3} g^{\mu \nu} \bigg\} H^u_{5} \ , \label{eq:VectorGPDs} \end{eqnarray} Then, by contracting with the five tensors, one gets five independent equations as \begin{eqnarray} \left( \begin{array}{c} g_{\mu v} \\ n_\mu n_\nu \\ n_\mu P_\nu \\ n_\nu P_\mu \\ P_\mu P_\nu \end{array} \right) \cdot V^{u\, ; \mu\nu}= \left( \begin{array}{ccccc} -4 & 2 & -\frac{2 P^2}{M^2} & 0 & \frac{4}{3} \\ 0 & 0 & -\frac{2 ( n \cdot P )^2}{M^2} & 0 & 0 \\ -(n \cdot P) & n \cdot P & -\frac{2 (n \cdot P) P^2}{M^2} & -(n \cdot P) & \frac{n \cdot P}{3} \\ -(n \cdot P) & n \cdot P & -\frac{2 (n \cdot P) P^2}{M^2} & n \cdot P & \frac{n \cdot P}{3} \\ -P^2 & 2 P^2 & -\frac{2 P^4}{M^2} & 0 & M^2+\frac{P^2}{3} \\ \end{array} \right) \cdot \left( \begin{array}{c} H^u_1 \\ H^u_2 \\ H^u_3 \\ H^u_4 \\ H^u_5 \\ \end{array} \right). \end{eqnarray} Finally, the explicit expressions for GPDs are obtained: \begin{eqnarray} \left( \begin{array}{c} H^u_1 \\ H^u_2 \\ H^u_3 \\ H^u_4 \\ H^u_5 \\ \end{array} \right) = \left( \begin{array}{ccccc} \frac{1}{6} \left(\frac{{P}^2}{M^2}-3\right) & \frac{{P}^2 \left({P}^2-M^2\right)}{2 M^2 \left( {n} \cdot {P} \right)^2} & \frac{M^2-{P}^2}{2 M^2 \left({n} \cdot {P}\right)} & \frac{M^2-{P}^2}{2 M^2 \left({n} \cdot {P}\right)} & \frac{1}{3 M^2} \\ -\frac{1}{2} & -\frac{3 {P}^2}{2 \left( {n} \cdot {P} \right)^2} & \frac{1}{{n} \cdot {P}} & \frac{1}{{n} \cdot {P}} & 0 \\ 0 & -\frac{M^2}{2 \left( {n} \cdot {P} \right)^2} & 0 & 0 & 0 \\ 0 & 0 & -\frac{1}{2 \left({n} \cdot {P}\right)} & \frac{1}{2 \left({n} \cdot {P}\right)} & 0 \\ \frac{{P}^2}{2 M^2} & \frac{3 {P}^4}{2 M^2 \left( {n} \cdot {P} \right)^2} & -\frac{3 {P}^2}{2 M^2 \left({n} \cdot {P}\right)} & -\frac{3 {P}^2}{2 M^2 \left({n} \cdot {P}\right)} & \frac{1}{M^2} \\ \end{array} \right) \cdot \left( \begin{array}{c} g_{\mu v} \\ n_\mu n_\nu \\ n_\mu P_\nu \\ n_\nu P_\mu \\ P_\mu P_\nu \end{array} \right) \cdot V^{u\, ; \mu\nu} \end{eqnarray} \section{Introduction} It is known that the usual parton distribution functions (PDFs) and electromagnetic form factors (FFs) shed light on the ``one-dimensional" structure of hadrons~\cite{Marukyan2015}. Moreover, generalized parton distributions (GPDs) naturally embody the information of both PDFs and FFs, and therefore they display the unique properties to present a ``(3D)" description for the transverse and longitudinal partonic degrees of freedom inside the system, and they contain promising potential which gives arise to ideals of ``quark/gluon imaging" of hadrons~\cite{Marukyan2015}. Many theoretical investigations have been carried out on the general properties of GPDs for a hadronic system~\cite{Diehl2003}. It is believed that the studies of GPDs are closely related to the processes of deeply virtual Compton scattering and the deeply virtual meson electroproduction~\cite{Ji2006,Kumericki2016,Goeke2001}. By comparing with experimental measurements, one can obtain possible constrains on the GPDs of a hadron~\cite{Aidala2013,Airapetian2017}. With the help of sum rules, the unpolarized GPDs are directly connected to the electromagnetic FFs of the system. There are some empirical parametrizations for GPDs. For the nucleon case, those parameterizations can be obtained by fitting the experimental data to the Dirac, Pauli, and axial FFs ~\cite{Kirchner2003,Guidal2004nd,Diehl2013Feb19,Selyugin2015Oct12,Sharma2016}. In the forward limit, GPDs reproduce the usual PDFs, and thus a description of GPDs can also be built with the help of the experimental data of PDFs~\cite{Selyugin2015Oct12}. In addition, the moments of GPDs can provide other new information as well, such as the neutron asymmetry ~\cite{Zhang2015} and the quark orbital angular momentum~\cite{Hoodbhoy1998,Ji2016Dec7}.\\ Many endeavors have been made to study the GPDs of simple hadrons in the literature, like the studies of a pion~\cite{Broniowski2011,Choi2001,Fanelli:2016aqc,Mezrag2016,Kumericki2016}; of a proton and neutron~\cite{Kroll2017,Pire2009,Diehl2013Feb19,Selyugin2015Oct12,Sharma2016,Rinaldi2017}, and of the light nuclei, ${}^3$He~\cite{Rinaldi2013,Zhang2015} or deuteron~\cite{Berger2001,Kirchner2003,Cano2004,Dong2013,Mondal2017}. In those works, different approaches have been employed. They include the chiral quark models employing the Nambu-Jona-Lasinio model, the spectral quark model~\cite{Broniowski2003,Broniowski200878,Broniowski2011}, the covariant constituent quark models (CCQMs)~\cite{Choi2001,Frederico2009,Fanelli:2016aqc}, the Dyson-Schwinger equation approach~\cite{Mezrag2016}, the AdS/QCD inspired light-front wave functions~\cite{Rinaldi2017}, and some empirical parametrizations as already mentioned above. Among those phenomenological approaches, the light-cone constituent quark model (LCCQM), one of the CCQMs, is a quite suitable and successful approach to be applied for the studies of the quark-hadron vertex and of the hadron properties, as has been pointed out by Refs.~\cite{Brodsky1998,Fanelli:2016aqc}. Besides the various model-dependent studies, some lattice QCD calculations have been also performed~\cite{Dalley2003Jul21,Hagler2010}. It is believed that those lattice simulations, together with the experimental data, can be employed to check and make a judgement for the different phenomenological models. \\ Apart from the pion (spin-0) and nucleon (spin-1/2) targets, the deuteron (spin-1) target is also common experimentally. The GPDs of a deuteron have been already defined through the matrix operators on the light front~\cite{Berger2001}, and the partonic structures and FFs of the deuteron have been formally explored through different approaches as well~\cite{Cano2004,Dong2013,Mondal2017,Cosyn:2017ekf,Dong:2008mt,Liang:2015zba}. We know that the deuteron is a weakly bound system of a proton and a neutron and approximately satisfies the isospin symmetry. Therefore, by considering the GPDs of the proton and neutron, one may obtain the information of the deuteron GPDs~\cite{Kirchner2003,Cano2004, Airapetian2010}.\\ The $\rho$ meson, which is a spin-1 particle as well, is usually regarded as a $q\bar{q}$ bound state in CCQMs. Some lattice results~\cite{Glozman2011} have already shown that the $\rho$ meson is approximately a pure ${}^3S_1$ state with only $\sim~1\%$ admixture of the ${}^3D_1$ wave, and, consequently, in the rest frame, the valence quarks carry out almost completely the spin of the $\rho$ meson. This conclusion provides a solid support to employ the constituent quark model to explore the $\rho$ meson structure as a pure $q\bar{q}$ system. It should be stressed that the most previous studies of the $\rho$ meson focus on its FFs~\cite{Melo1997,Cardarelli1995,Aliev2004,Choi2004,Biernat2014,Melo2016,Krutov:2016uhy,He:2004ba}. The only one lattice QCD calculation for the moments of the unpolarized $\rho$ meson PDFs appeared two decades ago~\cite{Best1997}, which was performed at the scale $Q= 2.4~\mathrm{GeV}$. With a quenched approximation, Ref.~\cite{Best1997} obtained the $n$th moments of its structure functions which, is meaningful only when comparing with the nonsinglet valence quark distributions. Later on, the result of QCD sum rules for the $\rho$ meson structure functions in Ref.~\cite{Oganesian2001} matches the lattice calculation well. As for the $\rho$ GPDs, there are some possible indirect approaches to access them, such as through the connection with generalized distribution amplitudes, via the double distributions~\cite{Diehl:1998dk,Diehl2003,Anikin:2005ur} or the Radon transformation~\cite{Teryaev:2001qm}. Thus, it is of a great interest to see what the GPDs of the $\rho$ meson look like with the help of the LCCQM model. This study may be even useful to understand the processes involving the $\rho$ meson lepton production such as $e+N\rightarrow e+\rho^0+N $~\cite{Mankiewicz1998,Cano2004,Morrow2009,Airapetian2017} or the process of $\gamma\gamma*\rightarrow\rho\rho$~\cite{Anikin:2003fr} and the future Electron-Ion Collider(EIC) experiments~\cite{Boer:2011fh,Accardi:2011mz}.\\ In analogy to the deuteron case, we introduce the GPDs of the $\rho$ meson and apply the LCCQM for the study of its unpolarized GPDs. Particularly, the GPDs with different skewness $\xi$ will be discussed in detail. It should be mentioned that in the LCCQM, the separation of the valence (Dokshitzer- Gribov-Lipatov-Altarelli-Parisi, DGLAP) and nonvalence (Efremov-Radyushkin-Brodsky-Lepage, ERBL) regimes is transparent after the integration over the poles in the Dirac propagators of $k^-=k^0-k^3$, i.e. the minus component of the loop momentum. Consequently, we can further study the contributions to the properties of the $\rho$ meson, like its FFs and GPDs, from the valence and nonvalence regimes at different values of $\xi$. \\ This paper is organized as follows. Section~\ref{sec:GPDs_for_hadrons_with_Spin_1} gives a brief introduction to the general decomposition of GPDs for the spin-1 $\rho$ meson. Section~\ref{sec:The_model} shows a description of the LCCQM. Moreover, in Sec.~\ref{sec:Results}, we display the main numerical results for the $\rho$ meson FFs and its unpolarized GPDs with the LCCQM. In addition, in Sec.~\ref{sec:evolution}, we discuss the QCD evolution of the moments of the $\rho$ meson PDFs and make a comparison to the lattice calculation. Finally, Sec.~\ref{sec:summary} is devoted to a short summary. \section{GPDs for hadrons with Spin 1} \label{sec:GPDs_for_hadrons_with_Spin_1} The notations in this work are~\cite{Frederico2009} \begin{eqnarray} t &=&\Delta^2=(p'-p)^2 \ , \nonumber \\ \xi &=&-\frac{\Delta\cdot n}{2P\cdot n}= -\frac{\Delta^+}{2P^+} \ , \ \ \abs{\xi}=\frac{\Delta^+}{2P^+} \ , \ \ \ \ \ (\,|\xi\,|\le1) \nonumber \\ x &=&\frac{k\cdot n}{P\cdot n}=\frac{k^+}{P^+} \ , \ \ \ \ \ \ (-1\le x\le1) \ , \end{eqnarray} where $p$ and $p'$ are the 4-momenta of the incoming and outgoing $\rho$ mesons, $P=({p'+p})/{2}$, $\Delta=p'-p $, $n$ is a lightlike 4-vector with $n^2=0$, and $k$ is the 4-momentum in the loop which will be specified in next section. The skewness variable $\xi$ plays a similar role as the Bjorken variable~\cite{Ji1997,Airapetian2010}. \\ The helicity counting rules restrict that there are totally nine helicity conserving GPDs of the spin-1 particle for each quark flavor and the gluons. Five of them are unpolarized (averaged over helicities), and the other four are polarized (sensitive to helicities). The helicity-averaged GPDs are defined through the two-parton correlation function for quarks as \cite{Berger2001} \begin{eqnarray} \label{eq:GPDs} V_{\lambda'\lambda}&=&\frac{1}{2} \int \frac{d \omega}{2\pi}\, e^{ix (P z)} \langle p', \lambda' |\, \bar{q}(- {\textstyle\frac{1}{2}} z)\, \slash{n} \, q( {\textstyle\frac{1}{2}} z)\, \,| p, \lambda \rangle \Big|_{z = \omega n} \nonumber \\[0.2em] &=& \sum_{i} \epsilon'^{*\nu} V_{\nu\mu}^{(i)} \epsilon^\mu H_i^q(x,\xi,t) \end{eqnarray} where $\epsilon=\epsilon(p,\lambda)$ [or $\epsilon'=\epsilon'(p',\lambda')$] and $\lambda$ ($\rm{or}~\lambda')=0,~\pm1$ are the initial (or final) polarization vector and its helicity, respectively. The explicit expressions of $\epsilon$ and the helicity amplitudes of the matrix elements were introduced in Ref.~\cite{Berger2001}. The helicity amplitudes give the connection between GPDs and the Deep Inelastic Scattering(DIS) structure functions by taking the forward limit. It is argued that there are five independent tensor structures that the tensor $V_{\nu\mu}^{(i)}$ in Eq.~({\ref{eq:GPDs}}) would explicit depend on, \begin{eqnarray} \label{5tensors} \{ g_{\nu\mu}, P_\nu n_\mu , n_\nu P_\mu , P_\nu P_\mu , n_\nu n_\mu \} \ . \end{eqnarray} Consequently, the GPDs of the $\rho$ meson are defined as \begin{eqnarray} \label{eq:5GPDs} V_{\lambda'\lambda}&=& -(\epsilon'^*\cdot\epsilon)H_1^q +\frac{(\epsilon\cdot n)(\epsilon'^*\cdot P)+(\epsilon'^*\cdot n)(\epsilon\cdot P)}{P\cdot n}H_2^q -\frac{2(\epsilon\cdot P)(\epsilon'^*\cdot P)}{M^2}H_3^q \nonumber \\ && +\frac{(\epsilon\cdot n)(\epsilon'^*\cdot P)-(\epsilon'^*\cdot n)(\epsilon\cdot P)}{P\cdot n}H_4^q +\left\{ M^2\frac{(\epsilon\cdot n)(\epsilon'^*\cdot n)}{(P\cdot n)^2} + \frac{1}{3}(\epsilon'^*\epsilon) \right\} H_5^q \ , \end{eqnarray} where $M$ is the $\rho$ meson mass. The five unpolarized GPDs $H_{i}^q$($i=1\sim 5$) are the functions of $x$, $\xi$, and $t$. The explicit dependence of $H_i^q$ on the three variables is omitted for simplicity.\\ {\it Sum rules.}-The conventional form factor decomposition of the vector current for a spin-1 particle is \begin{eqnarray}\label{eq:Imm} I_{\lambda'\lambda}^\mu &=& \langle p', {\lambda'} |\, \bar{q}(0)\, \gamma^\mu \, q(0)\,| p, \lambda \rangle \nonumber \\ &=& \epsilon'^{*\beta} \epsilon^\alpha \bigg[ -\Big( G_1^q(t) g_{\beta\alpha} + G_3^q(t) \frac{ P_\beta P_\alpha}{2M^2} \Big) P^\mu + G_2^q(t) \left( g_\alpha^\mu P_\beta + g_\beta^\mu P_\alpha \right) \bigg] \ . \end{eqnarray} The conventional FFs $G_{1,2,3}$ are obtained from $G_{1,2,3}^q$ by weighting with electromagnetic charges and then summing over flavors: $G_{i}=e_u G_{i}^u + e_{\bar{d}} G_{i}^{\bar{d}}$ for $i=1, 2, 3$. It is equivalent to using the isospin combination, which will be shown later in Eq.~(\ref{eq:Gi}). Comparing with Eq.~(\ref{eq:5GPDs}), one can obtain the sum rules, \begin{eqnarray}\label{eq:sumrule} \int_{-1}^{1} dx H_i^q (x,\xi,t) &=& G_i^q(t) \quad (i=1,2,3) \ , \nonumber \\ \int_{-1}^{1} dx H_i^q (x,\xi,t) &=& 0 \quad (i=4,5) \ . \end{eqnarray} The integrals of $H_4^q$ and $H_5^q$ vanish due to the constraints of time reversal and Lorentz invariance, respectively~\cite{Berger2001}.\\ The FFs $G_{C,M,Q}$ can be expressed in terms of $G_{1,2,3}$ as~\cite{Choi2004} \begin{eqnarray} G_C(t)&=&G_1(t) + \frac{2}{3}{\eta} G_Q(t) \ , \ \nonumber \\ G_M(t)&=&G_2(t) \ , \ \nonumber \\ G_Q(t)&=&G_1(t) - G_2(t) + (1+\eta)G_3(t)\ , \ \label{eq:Gcmq} \end{eqnarray} where $\eta=-t/4M^2$. Together with Eq.~(\ref{eq:sumrule}), one can obtain $G_{C,M,Q}$ directly from GPDs $H_{1,2,3}$. Note that in many previous studies, the calculation of $G_{C,M,Q}$ from the matrix elements of $I_{\lambda'\lambda}^+$ is faced with the well-known ambiguity of the angular condition~\cite{Melo1997}. Some different prescriptions are proposed to avoid the ``worst" matrix elements. The present work bypasses this ambiguity. The normalizations take \begin{eqnarray} G_C(0)=1 \ ,~~~ G_M(0)=2M \mu \ , ~~~G_Q(0)=M^2 Q_\rho \ , \end{eqnarray} where $\mu$ and $Q_\rho$ are the $\rho$ magnetic dipole and quadrupole moments. The mean square charge radius $<r^2>$ is given by \begin{eqnarray} <r^2>=\lim_{t\rightarrow 0}\frac{6\left[ G_C(t)-1 \right]}{t} \ . \end{eqnarray} {\it Forward limit.}---For $x > 0$, the helicity amplitudes in the forward limit ($\Delta=0$) give the relations between GPDs and the unpolarized (quark-spin-averaged) parton distributions $q^\lambda(x)$~\cite{Best1997,Berger2001}, with $\lambda$ being the polarization of the $\rho$ meson, as \begin{eqnarray} H_1^q(x,0,0) &=& \frac{q^1(x)+q^{-1}(x)+q^0(x)}{3} = q(x) \ , \nonumber \\ H_5^q(x,0,0) &=& q^0(x) - \frac{q^1(x)+q^{-1}(x)}{2} \ . \end{eqnarray} For $x < 0$, the above equations with an overall sign change give the antiquark distributions at $-x$. Here, the unpolarized quark density is defined as $q^\lambda=q^\lambda_{\uparrow}+q^\lambda_{\downarrow}$, where $\uparrow$ ($\downarrow$) stands for up (down) spin projection along the direction of the motion when the $\rho$ meson moves with infinite momentum. In the constituent quark model, the sum rules, corresponding to the flavor number and momentum conservation, are \begin{eqnarray} \label{eq:sumrule_q0}\int dx u(x) = \int dx \bar{d}(x) &=& 1 \ , \\ \label{eq:sumrule_q1}\int dx [ x \left( u(x)+\bar{d}(x) \right) ] &=& 1 \end{eqnarray} for the $\rho^+$ meson.\\ At leading twist or leading order, the single flavor DIS structure function $F_1^q (x)$ is one-half of the probability to find a quark with momentum fraction $x$ and obeys the Callan-Gross relation~\cite{Berger2001,Best1997} \begin{eqnarray} \label{eq:F1q} F_1^q (x) = \frac{1}{3} \left[ q^1_\uparrow(x) +q^1_\downarrow(x) + q^0_\uparrow(x) \right] = \frac{1}{2} H_1^q(x,0,0) \ . \end{eqnarray} The single flavor structure function $b_1^q(x)$, which measures the difference in the spin projection of the $\rho$ meson, only depends on the quark-spin-averaged distribution $q^\lambda(x)$, \begin{eqnarray} b_1^q(x) &=& q^0(x) - \frac{q^1(x)+q^{-1}(x)}{2} = H_5^q(x,0,0) \ . \end{eqnarray} From parity, one has $q^\lambda_{\uparrow}=q^{-\lambda}_{\downarrow}$, and therefore the conventional structure functions, related to $q^\lambda(x)$, are \begin{eqnarray} F_1(x) = \sum_{q} e_q^2 F_1^q (x) \ , \quad b_1(x) = \frac{1}{2} \sum_{q} e_q^2 b_1^q(x) \ . \end{eqnarray} In the following, we will focus on the single flavor structure functions. In the meson case, the structure functions are identical for both flavors. It should be mentioned that the spin-1 particle, different from the spin-1/2 one, has the tensor structure function $b_1$. It triggers great interest~\cite{Close:1990zw,Cosyn:2017fbo,Dong:2014eya, Kumano:2010vz,Khan:1991qk}. The sum rule of this structure function is $\int dx b_1(x)=0$~\cite{Close:1990zw}.\\ In addition, the $n$th Mellin moment of a function $f(x)$ is defined as \begin{eqnarray} M_n(f)=\int_0^1 x^{n-1}f(x)dx \ . \end{eqnarray} For the $\rho$ meson case, to the leading order (twist 2), one finds \begin{eqnarray} 2M_n(F_1^q)=C_n^{(1)}a_n \ , \quad 2M_n(b_1^q)=C_n^{(1)}d_n \ , \end{eqnarray} where $C_n^{(k)}=1+O(\alpha)$ are the Wilson coefficients of the operator product expansion and $a_n$ and $d_n$ are the reduced matrix elements~\cite{Best1997}. With the quenched approximation, Ref.~\cite{Best1997} found that these relations hold for both even and odd $n$th orders.\\ {\it Isospin combination.}---In Eq.~(\ref{eq:5GPDs}), GPDs are defined flavor by flavor. Similar to Refs.~\cite{Broniowski2008,Broniowski200878}, the corresponding isospin projection of the isovector ($I=1$, nonsinglet) equals \begin{eqnarray} \lefteqn{ \frac{1}{2} \int \frac{d \omega}{2\pi}\, e^{ix (P z)} \langle \rho^b (p',\lambda')|\, \bar{q}(- {\textstyle\frac{1}{2}} z)\, \slash{n} \, \tau_3 q( {\textstyle\frac{1}{2}} z)\, \,|\rho^a (p,\lambda) \rangle \Big|_{z = \omega n}} \nonumber \\[0.2em] && = \imath \epsilon_{3ab} \Bigg\{ - (\epsilon'^* \epsilon)\, H_{1}^{I=1} + \frac{(\epsilon n) (\epsilon'^* P)+ (\epsilon'^* n) (\epsilon P)}{P n}\, H_{2}^{I=1} - \frac{2 (\epsilon P)(\epsilon'^* P)}{M^2}\, H_{3}^{I=1} \nonumber \\[0.2em] && \quad + \frac{(\epsilon n) (\epsilon'^* P) - (\epsilon'^* n) (\epsilon P)}{P n}\, H_{4}^{I=1} + \Bigg[ M^2\, \frac{(\epsilon n)(\epsilon'^* n)}{(P n)^2} +\frac{1}{3} (\epsilon'^* \epsilon) \Bigg] H_{5}^{I=1} \; \Bigg\} \nonumber \\[0.2em] && {}= \imath \epsilon_{3ab} \Bigg\{ - (\epsilon'^* \epsilon)\, \left( H_{1}^{u}- H_{1}^{d} \right) + \frac{(\epsilon n) (\epsilon'^* P) + (\epsilon'^* n) (\epsilon P)}{P n}\, \left( H_{2}^{u}- H_{2}^{d} \right) - \frac{2 (\epsilon P)(\epsilon'^* P)}{M^2}\, \left( H_{3}^{u}- H_{3}^{d} \right) \nonumber \\[0.2em] && {}\quad + \frac{(\epsilon n) (\epsilon'^* P) - (\epsilon'^* n) (\epsilon P)}{P n}\, \left( H_{4}^{u}- H_{4}^{d} \right) + \Bigg[ M^2\, \frac{(\epsilon n)(\epsilon'^* n)}{(P n)^2} +\frac{1}{3} (\epsilon'^* \epsilon) \Bigg] \left( H_{5}^{u}- H_{5}^{d} \right) \; \Bigg\}. \label{eq:isovectorH} \end{eqnarray} where $a,b$=0,1,2, and $\rho^\pm=\rho^1\mp\imath\rho^2$. For the isoscalar case ($I=0$, singlet), one needs the exchange $\slash{n} \, \tau_3 \leftrightarrow \slash{n}$, and therefore $H_{i}^{u}- H_{i}^{d} \leftrightarrow H_{i}^{u}+ H_{i}^{d}$. In the following work, we will only deal with a positive-charged $\rho$ and omit the subscript $+$ whenever no ambiguity arises.\\ \section{Our approach} \label{sec:The_model} In analogy to the chiral interaction Lagrangian for the $\pi\rightarrow q\bar{q}$ vertex~\cite{Frederico1992}, the effective Lagrangian for the $\rho\rightarrow\bar{q}q$ is taken as \begin{eqnarray}\label{key} \mathcal{L}_I &\sim & -\imath \frac{M}{f_\rho} \bar{q} \gamma^\mu \mathbf{\tau} q \cdot \mathbf{\rho}_\mu \nonumber \\ && = -\imath \frac{M}{f_\rho} \Big[ \bar{u} \gamma^\mu u \rho^0_\mu + \sqrt{2} \bar{u} \gamma^\mu d \rho^+_\mu + \sqrt{2} \bar{d} \gamma^\mu u \rho^-_\mu + \bar{d} \gamma^\mu d \rho^0_\mu \Big] \ , \end{eqnarray} where $f_\rho$ is the $\rho$ decay constant. In the lowest Fock state, the two-parton correlation function, the lhs of Eq.~(\ref{eq:isovectorH}), corresponds to a triangle loop~\cite{Ji2006}. The loop integral, corresponding to the active $u$ quark [see Fig.~\ref{fig:loopsud:u} and \ref{fig:nonval}], is specified as \begin{eqnarray}\label{eq:u_quark} V^{u}_{} (x, \xi, t) &=& N_{\mu\nu} \int \frac{d^4 k }{ (2\pi)^4 } \, \delta \left[ n \cdot ( x P - k ) \right] (-) Tr \Bigg[ \frac{\imath ( \slash{k}-\slash{P}+m ) }{ (k-P)^2-m^2 + \imath \epsilon} \gamma^\nu \frac{\imath ( \slash{k}+\frac{\slash{\Delta}}{2} +m ) }{ (k+\frac{\Delta}{2})^2 -m^2 + \imath \epsilon} \slash{n} \nonumber \\ && \times \frac{\imath ( \slash{k}-\frac{\slash{\Delta}}{2} +m ) }{ (k-\frac{\Delta}{2})^2 -m^2 + \imath \epsilon} \gamma^\mu \Bigg] \Lambda(k-P,p')~ \Lambda(k-P,p), \end{eqnarray} where $m$ is the constituent quark mass and \begin{eqnarray} N_{\mu\nu} &=& \frac{M^2}{f_\rho^2} \frac{ \epsilon'^*_\nu(p', \lambda') \epsilon_\mu(p, \lambda) }{ 2(2\pi)^3 \sqrt{\omega_{p'}\omega_{p} } } \ , \end{eqnarray} and the scalar function \begin{eqnarray} \label{eq:lambda} \Lambda(k-P,p) &=& \frac{c }{ [ (k-P)^2-m^2_R+ \imath \epsilon] [ ({k}-\frac{\Delta}{2})^2-m^2_R+ \imath \epsilon] } \end{eqnarray} is following Ref.~\cite{Frederico2009}, with $m_R$ and $c$ being the regulator mass and the normalization factor, respectively. The loop of the struck $d$ quark can be obtained from the crossed Feynman diagram of Fig.~\ref{fig:loopsud:d}. Here, the scalar product function $\Lambda(k-P,p)$ is symmetric under the exchange of the momentums of the two constituents. This scalar function is employed to describe the momentum dependent between $q$ and $\bar{q}$ inside the $\rho$ meson. Actually, it plays a role of the momentum cutoff similar to the Pauli-Villars regularization~\cite{Frederico2009}. It may also stand for a property of the Bethe-Salpeter amplitude~\cite{Melo2002} and contain the information of the nonperturbative effect. Conceptually, by taking $\Lambda(k-P,p)$ as a part of the quark-antiquark-meson vertex, one gets the smeared quark-antiquark-meson vertex, $\gamma^\mu\Lambda(k-P,p)$~\cite{Choi2004}. As will be seen later, the symmetric momenta convention, shown in Figs.~\ref{fig:loopsud} and \ref{fig:nonval}, enables the vertex to fulfill the constraint from the isospin symmetry.\\ \begin{figure} \centering {\hskip -1.5cm} \subfigure[The struck $u$ quark in the valence regime]{\label{fig:loopsud:u} \begin{minipage}[b]{0.4\textwidth} \includegraphics[width=1\textwidth]{loops0403_2.pdf} \end{minipage} } {\hskip 1cm} \subfigure[The struck $d$ quark in the valence regime]{\label{fig:loopsud:d} \begin{minipage}[b]{0.3\textwidth} \includegraphics[width=1\textwidth]{loops0403.pdf} \end{minipage} } \caption{\label{fig:loopsud}{\small Direct $(a)$ and crossed $(b)$ Feynman diagrams contributing to the GPDs of quark $q$ and antiquark $\bar{q}$ of $\rho$ meson. The gray blobs represent the normal Light Front(LF) wave vertexes. The plus component of the momentum carried by red lines have positive sign in the valence regime. } \end{figure} \begin{figure}[t \centerline{\includegraphics[width=8.6cm]{loops0515-1.pdf}} \caption{\label{fig:nonval} \small The struck $u$ quark in the nonvalence regime, yielded by the off-diagonal terms in the Fock space. The black blob represents the non-wave-function vertex. The red line has the negative sign in this regime. } \end{figure} Note that the elastic FFs can be calculated in different reference frames, such as the Drell-Yan frame~\cite{Brodsky1998}, where $\Delta^+=0$ and $\xi=0$, and the Breit frame, where $\Delta^+=-\Delta^-$ (see Ref.\cite{Frederico2009} and \cite{lev1998} for discussions on the motivation of adopting this frame). In this work, the above loop integral is performed in the Breit frame, and then the $\xi$ dependence of GPDs can be obtained as well. In this special reference frame, the momentum transfer and initial and finial momenta are \begin{eqnarray} \Delta &=& (\Delta^+,\Delta^-,\bm\Delta_\perp)=(q_z,-q_z,q_x,q_y) \ , \nonumber \\ p &=& (p^0- \frac{q_z}{2},p^0+\frac{q_z}{2},-\frac{\bm\Delta_\perp}{2}) \ , \nonumber \\ p' &=& (p^0+\frac{q_z}{2},p^0-\frac{q_z}{2},\frac{\bm\Delta_\perp}{2}) \ , \end{eqnarray} where $\bm\Delta_\perp=(q_x,q_y)$ and $p^0=M\sqrt{1-\Delta^2/4M^2}$. Since $\bm\Delta_\perp^2\geqslant 0$, one gets the constraint $\abs{\xi}\leqslant 1/\sqrt{1-4M^2/t}$. \\ The physics in the nonvalence regime, shown in Fig.~\ref{fig:nonval}, is remarkably different from the one in the valence regime. According to Ref.~\cite{Burkardt2000}, the $q\bar{q}$ pair, created by the virtual photon, could interact with itself and form a virtual meson, before merging with the meson state. From another point of view, the higher Fock component contributions should be taken into account in both two regimes for completeness. Instead of finding all higher Fock component contributions as Refs.~\cite{Brodsky2001,Diehl2001}, we handle the nonvalence contribution by replacing the simple $\gamma^\mu$ with a phenomenological meson vertex $\Gamma^\mu$ as shown in Ref.~\cite{Choi2004}. This is an analogy to the covariant form~\cite{Jaus2003}, which has been applied for the deuteron case in our previous work~\cite{Sun2016}. Thus the smeared quark-antiquark-meson vertex becomes $\Gamma^\mu\Lambda(k-P,p)$.\\ For the $u$ quark contribution shown in Fig.~\ref{fig:loopsud:u}, the spectator constituent momentum is $k_s=k_{\bar{d}}=k-P$. The phenomenological vertices under this loop momentum assignment read \begin{eqnarray} \label{eq:vertex} \Gamma^{\mu}_{i} = \gamma^{\mu} - \frac{(2k-P-\frac{\Delta}{2})^{\mu}}{D_{i}} \ , \quad \Gamma^{\nu}_{f} = \gamma^{\nu} - \frac{(2k-P+\frac{\Delta}{2})^{\nu}}{D_{f}} \ , \end{eqnarray} where $D_{i,f} = M_{i,f} + 2m $, and the kinematic invariant masses $M_{i,f}$ are~\cite{Choi2004} \begin{eqnarray} \label{eq:vertexM:v} M_{i}^2 = \frac{\kappa^2_\perp + m^2}{1-x'} + \frac{\kappa^2_\perp + m^2}{x'} \ , \\%\nonumber \\ M_{f}^2 = \frac{\kappa'^2_\perp + m^2}{1-x''} + \frac{\kappa'^2_\perp + m^2}{x''} \ , \end{eqnarray} with the LF momentum fractions $x'= - k_s^+/p^+ =(1-x)/(1-\abs{\xi})$, $x''=x' p^+/p'^+ = (1-x)/(1+\abs{\xi}) $, and \begin{eqnarray} \kappa_\perp &=& k_{s\perp} - \frac{k_s^+}{p^+} p_{i\perp} \, = (k-P)_\perp- \frac{x'}{2} {\Delta}_{\perp} \ , \nonumber \\ \kappa'_\perp &=& (k-P)_\perp+ \frac{x''}{2} {\Delta}_{\perp} \ . \end{eqnarray} In the nonvalence regime, shown in Fig.~\ref{fig:nonval}, the relation of $-\abs{\xi}<x<\abs{\xi}$ leads to $x' > 1$, and the initial vertex becomes the non-wave-function vertex. To keep the mass square positive [see $M_i$ in Eq.~(\ref{eq:vertexM:v})], Ref.~\cite{Choi2004} proposes to directly replace $1-x'$ with $x'-1$ in Eq.~(\ref{eq:vertexM:v}) and gets \begin{eqnarray} \label{eq:vertexM:nv} M_{i(NV)}^2 = \frac{\kappa^2_\perp + m^2}{x'-1} + \frac{\kappa^2_\perp + m^2}{x'}. \end{eqnarray} Hereafter, we use the subscripts $V$ and $NV$ to stand for the valence and nonvalence regimes, respectively. Note that, when both the struck and spectator constituents are on mass shells, namely, $(k-\frac{\Delta}{2})^2=(k-P)^2=m^2$, one gets $M_{i}^2=M_{f}^2=M^2$. Due to the exchange $1-x'\leftrightarrow x'-1$, the relation of $M_{i(NV)}^2=M^2$ no longer holds for the nonvalence case. However, $M_{i}^2$ and $M_{i(NV)}^2$ have the same limiting value as $x\rightarrow\abs\xi$, and thus the continuity of GPDs is guaranteed. The physics in the parton-number-changing nonvalence Fock state contributions is much more complicated than that in the valence one, since the creation of the $q\bar{q}$ pair involves an infinite sum of the meson contribution. Due to the lack of the information about the nonvalence regime~\cite{Burkardt2000}, in some model calculations, the discontinuity may arise at $x=\xi$ (or $\abs\xi$) where the valence and nonvalence regimes divide, like in Ref.~\cite{Choi2001} for the $\pi$ meson GPDs.\\ With the above preparations, the integral of Eq.~(\ref{eq:u_quark}) in the light-front frame reads \begin{eqnarray}\label{Vlf} V^u_{} (x, \xi, t) &=& N_{\mu\nu} \int \frac{dk^+dk^- d{\bm k}_\perp}{ 4 (2\pi)^4} \delta\left[ x P^+ -k^+ \right] \frac{ (-) Tr[{\cal O}^{\mu\nu+}] }{ (k^+ - P^+) (k^+ +\frac{\Delta^+}{2}) (k^+ -\frac{\Delta^+}{2})} \nonumber \\ && ~\times \frac{1 }{ \left[ k^- -P^- -(k-P)^-_{on}+i\frac{\epsilon}{ k^+ - P^+} \right ]} \frac{1 }{ \left[ k^- +\frac{\Delta^-}{2} -(k +\frac{\Delta}{2})^-_{on}+i \frac{\epsilon}{k^+ +\frac{\Delta^+}{2}} \right ]} \nonumber \\ && ~\times \frac{1 }{ \left[ k^- -\frac{\Delta^-}{2} -(k -\frac{\Delta}{2})^-_{on}+i \frac{\epsilon}{k^+ -\frac{\Delta^+}{2}} \right ]} \nonumber \\ && ~\times \Lambda(k-P,p')~ \Lambda(k-P,p) , \end{eqnarray} where \begin{eqnarray} {\cal O}^{\mu\nu+} &=& \imath^3 ( \slash{k}-\slash{P}+m ) \Gamma^\nu_{i} ( \slash{k}+\frac{\slash{\Delta}}{2} +m ) \gamma^+ ( \slash{k}-\frac{\slash{\Delta}}{2} +m ) \Gamma^\mu_{f} \ , \\ \label{eq:kon} (k-P)^-_{on} &=& \frac{(k-P)_\perp + m_{}^2}{k^+ - P^+} \quad \ , \text{etc.} \ , \end{eqnarray} and the $\Lambda$ functions, Eq.~(\ref{eq:lambda}), are chosen without changing the distribution of the poles with respect to the three denominators of the propagators. There are six poles with respect to $k^-$ for the integral, the same as in the pion case~\cite{Frederico2009}. They are \begin{eqnarray} k^-_{1(2)} &=& P^- + (k-P)^-_{on(R)} - i\frac{\epsilon}{ k^+ - P^+} \ , \nonumber \\ k^-_{3(4)} &=& \frac{\Delta^-}{2} + (k -\frac{\Delta}{2})^-_{on(R)} - i \frac{\epsilon}{k^+ -\frac{\Delta^+}{2}} \ , \nonumber \\ k^-_{5(6)} &=& -\frac{\Delta^-}{2} + (k +\frac{\Delta}{2})^-_{on(R)} - i \frac{\epsilon}{k^+ +\frac{\Delta^+}{2}} \ , \end{eqnarray} where $(k-P)^-_{R}$ and $(k \pm \frac{\Delta}{2})^-_{R}$ are obtained by replacing $m$ with $m_R$ in Eq.~(\ref{eq:kon}), respectively. Since $p'^+ > p^+ > 0$, after integrating over $k^-$, there are only two regions in $k^+$ that contribute to the integral, the valence regime $k^+ \in \left[ {\Delta^+}/{2}, P^+ \right]$ and the nonvalence one $k^+ \in \left[ - {\Delta^+}/{2}, {\Delta^+}/{2} \right]$. In the case $p'^+ = p^+$($\xi=0$), there is only one regime (valence), and the detail calculation can be found in Refs.~\cite{Frederico1992,Miller2009}. The first two poles $k^-=k^-_{1(2)}$ contribute to the valence part, and last two poles $k^-=k^-_{5(6)}$ contribute to the nonvalence one (see Fig. 2). The residue of the pole $k^-=k^-_{1}$ reads \begin{eqnarray}\label{Vlfv1} \lefteqn{ V^u_{1(V)} (x, \xi, t) = \frac{-N_{\mu\nu} }{ 4 (2\pi)^4} \int_{\frac{\Delta^+}{2}}^{P^+} dk^+ \int d{\bm k}_\perp \delta\left[ x P^+ -k^+\right] } \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \nonumber \\ && ~\times \frac{ Tr[{\cal O}^{\mu\nu+}] }{ (k^+ - P^+) (k^+ +\frac{\Delta^+}{2}) (k^+ -\frac{\Delta^+}{2})} \frac{1 }{ \left[ k^- +\frac{\Delta^-}{2} -(k +\frac{\Delta}{2})^-_{on}+i \frac{\epsilon}{k^+ +\frac{\Delta^+}{2}} \right ]} \nonumber \\ && ~\times \frac{1 }{ \left[ k^- -\frac{\Delta^-}{2} -(k -\frac{\Delta}{2})^-_{on}+i \frac{\epsilon}{k^+ -\frac{\Delta^+}{2}} \right ]} \nonumber \\ && ~\times \Lambda(k-P,p')~ \Lambda(k-P,p) \Big|_{k^- = k^-_{1}} \ , \end{eqnarray} and for the rest of the poles $k^-=k^-_{i}$, $V^u_{i(V/NV)} (x, \xi, t)$ ($i$ labels different poles) can be obtained similarly. Then, the valence contributions read \begin{eqnarray} V^u_{(V)} = V^u_{1(V)} + V^u_{2(V)} \ , \end{eqnarray} where the $\xi$-independent (also frame-independent) full result for the $u$ quark GPDs is \begin{eqnarray} V^u_{} = V^u_{(V)} + V^u_{(NV)} \ . \end{eqnarray} It is easy to verify that, under the assignment of loop momenta in Fig.~\ref{fig:loopsud}, the trace part of the loop integral for the $d$ quark is related to that of the $u$ quark as \begin{eqnarray} Tr\left[ {\cal O}^{\mu\nu+}_{(d)} (x,-k) \right] = - Tr\left[ {\cal O}^{\mu\nu+}_{} (-x,k) \right] \ . \end{eqnarray} Therefore, the relation $ V^d_{} ( x, \xi, t) = - V^u_{} ( -x, \xi, t)$ is preserved, as required by the isospin and crossing symmetries~\cite{Frederico2009}. Here, the symmetric momenta convention are essential for the present model to fulfill this constraint. We, thus, get \begin{eqnarray} \int_{-1}^1 dx H_i^d (x,\xi,t) = -\int_{-1}^{1} dx \; H_i^u (x,\xi,t) \ , \end{eqnarray} with $i=1\sim5$. Finally, the isovector GPDs satisfy \begin{eqnarray} H_i^{I=1} (x,\xi,t) &=& H_i^{I=1} (-x,\xi,t). \end{eqnarray} In addition, from Eq.~(\ref{eq:sumrule}), the sum rules of the conventional FFs, it is easy to see the equivalent~\cite{Berger2001,Broniowski200878} \begin{eqnarray} \label{eq:Gi} G_i &=& e_u \int_{-1}^1 dx \; H_i^{u} (x,\xi,t) + e_d \int_{-1}^1 dx \; H_i^d (x,\xi,t) \nonumber \\ &=& \int_{-1}^1 dx \; H_i^{I=1} (x,\xi,t) \ . \end{eqnarray} In our work, the strategy to extract the five GPDs $H_i$, is to construct five independent equations by replacing $\epsilon'^{*\nu} \epsilon^\mu$ in $V^u$ with the tensors listed in (\ref{5tensors}) separately, and finally to solve them jointly. See the Appendix for more details. \section{Results}\label{sec:Results} In this work, we take the constituent mass $m=0.403~\mathrm{GeV}$ and regulator mass $m_R=1.61~\mathrm{GeV}$. The requirement of stability of the bound states, $m > M/2$ and $m+m_R > M$, is maintained.\\ The calculated $\rho$ meson FFs and low-energy observables are shown in Fig.~\ref{FFs} and Table~\ref{loweo}. The nonvalence contributions to FFs $G_{1,2,3}$ at $\xi$=$-0.2$, $-0.4$, and $-0.6$ are shown in Fig.~\ref{fig:XiTGV}. Due to the constraint $\abs{\xi}\leqslant 1/\sqrt{1-4M^2/t}$, the corresponding ${\abs t}_{min}$ are $0.10,~0.45$, and $1.33~\mathrm{GeV}^2$, respectively. Figures~\ref{fig:h1:3d}-\ref{fig:h3:3d} show the 3D plots of the unpolarized $\rho$ meson GPDs $H_{1,2,3}$ as the functions of variables $x$ and $t$ at the two different skewnesses $\xi=0$ and $-0.4$. The values are normalized to the corresponding FFs $G_i(t)$ for a convenience of the comparison. Figures~\ref{fig:h1}-\ref{fig:h3} show $H_{1,2,3}$ at specific momentum transfers $t$ ($-0.5$ and $-10~\mathrm{GeV}^2$) and different skewnesses $\xi$ ($0$, $-0.2$, $-0.4$, and $-0.6$). Due to the symmetry, only the $0~<~x~<~1$ regime is plotted in Figs.~\ref{fig:h1}-\ref{fig:h3}. Moreover, the two obtained structure functions, $F_1^u(x)$ and $b_1^u(x)$, are plotted in Figs.~\ref{F1} and \ref{b1}, respectively.\\ For the charge form factor $G_C$ in Fig.~\ref{FFs}, we found it has a crossing point near $t=-3.8~\mathrm{GeV}^2$. Moreover, the tendencies of $t$ dependence of all three obtained FFs agree with the previous results, such as Refs.~\cite{Cardarelli1995,Choi2004,Biernat2014}. In Table~\ref{loweo}, other results of the LCCQMs, of the point form, of the lattice QCD, and of the experiment measurement are also listed for a comparison. Although the LCCQM proposed in the present work is inspired by former ones~\cite{Jaus2003,Choi2004} (for the meson vertex) and Ref.~\cite{Frederico2009}, etc. (for the cutoff function), different values of the model parameters, $m$ and $m_R$, are adopted here. Thus, the calculated results are different from theirs. Our calculated value of the magnetic dipole moment, $\mu=2.06$, is very close to the nonrelativistic value ($\mu=2$)~\cite{Jaus2003} and to the experimental data. In addition, the estimated mean square radius $<r^2>$ and quadrupole moment $Q_{\rho}$ in our calculation are also compatible with other calculations. It is expected that the future measurements for the $\rho$ meson radius and quadrupole moment may provide a test for different model calculations.\\ The Lorentz invariance requires that the FFs $G_i$ in Eq~(\ref{eq:Imm}) are frame independent, since the integration over $x$ removes the influence of different light-cone direction $n$ and therefore the integral remains $\xi$ independent. However, it is still interesting to investigate the nonvalence contribution (at $\xi\ne 0$) to $G_i$. As one can see from Fig.~\ref{fig:XiTGV}, for all three FFs, the valence contributions are dominant in small skewness $\abs\xi$, and the percentage of the nonvalence contributions increases as $\abs\xi$ does, which is same as the pion case~\cite{Choi2001}. As $\abs t$ increases, the nonvalence contribution in $G_1$ increases, while those in $G_2$ and $G_3$ go oppositely. Especially for $G_2$, the decrease is very distinct. It is clearly illustrated in Fig.~\ref{fig:h2:t10} for the GPD $H_2$ at $t=-10~\mathrm{GeV}^2$. In contrast, in the pion case~\cite{Choi2001}, the nonvalence contribution to the pion form factor is especially large in the large $\abs\xi$ and small $\abs t$ region. In all three $\rho$ FFs $G_i$, we find that the sum of the numerical result of the valence and nonvalence contributions only has negligible variation over $\xi$. Thus, the frame independence of our model calculation is well satisfied. \\ \begin{figure}[t \centerline{\includegraphics[width=8.6cm]{form-factors.pdf}} \caption{\label{FFs} The $\rho$ FFs, $G_C$ (solid black line), $G_M$ (dashed red line) and $G_Q$ (dot-dashed blue line). } \end{figure} \begin{table* \caption{\label{loweo} The $\rho$ meson low-energy observables of the mean square charge radius ($<r^2>$), the magnetic dipole ($\mu$) and the quadrupole ($Q_\rho$) moments in the units of fm${}^2$, $1/2M$, and $1/M^2$, respectively. The results of other LCCQMs~\cite{Melo1997,Cardarelli1995,Jaus2003,Choi2004,Mello2015}, of the point-form formalism~\cite{Biernat2014}, of the lattice QCD~\cite{Owen2015}, and of the experiment measurement~\cite{Gudino2014} are also displayed for a comparison. } \begin{center} \begin{tabular}{c|cccccccccc} \hline \hline &\cite{Melo1997} &\cite{Cardarelli1995} &\cite{Choi2004} &\cite{Jaus2003} &\cite{Mello2015} &\cite{Biernat2014} &\cite{Owen2015} &\cite{Gudino2014} &this work \\\hline $<r^2> $ &0.37 &0.35 &-- &-- &0.268 &-- &0.670(68) &-- &0.52 \\\hline $\mu$ &2.14 &2.26 &1.92 &1.83 &2.21 &2.2 &2.613(97) &2.1(5) &2.06 \\\hline $Q_\rho$ &$-0.79$ &$-0.37$ &$-0.43$ &$-0.33$ &$-0.882$ &$-0.47$ &$-0.733(99)$ &-- &$-0.323$ \\\hline \hline \end{tabular} \end{center} \end{table*} \begin{figure}[!t] \centering \subfigure[]{\label{fig:XiTGV:0} \begin{minipage}[b]{0.4\textwidth} \includegraphics[width=1\textwidth]{discontenuity-XiTGnv1.pdf} \end{minipage} } \subfigure[]{\label{fig:XiTGV:1} \begin{minipage}[b]{0.4\textwidth} \includegraphics[width=1\textwidth]{discontenuity-XiTGnv2.pdf} \end{minipage} } \subfigure[]{\label{fig:XiTGV:2} \begin{minipage}[b]{0.4\textwidth} \includegraphics[width=1\textwidth]{discontenuity-XiTGnv3.pdf} \end{minipage} } \caption{\label{fig:XiTGV}{The nonvalence contributions to FFs $G_1$, $G_2$ and $G_3$ at $\xi$=$-0.2$ \text{(dotted red line)},$-0.4$ \text{(dashed blue line)},$-0.6$ \text{(dot-dashed purple line)}, respectively.}} \end{figure} \begin{figure*}[!ht] \centering \subfigure[$ \xi=0 $]{\label{fig:h1:3d:xi0}\includegraphics[width=7.0cm]{GPDsH1xi0.pdf}} \subfigure[$ \xi=-0.4 $]{\label{fig:h1:3d:xi04}\includegraphics[width=7.0cm]{GPDsH1xi04.pdf}} \caption{ The 3D $\rho^+$ GPD $H_1$ at $\xi=0~\text{(a)}$ and $-0.4~\text{(b)}$. } \label{fig:h1:3d} \end{figure*} \begin{figure* \centering \subfigure[$ \xi=0 $]{\label{fig:h2:3d:xi0}\includegraphics[width=7.0cm]{GPDsH2xi0.pdf}} \subfigure[$ \xi=-0.4 $]{\label{fig:h2:3d:xi04}\includegraphics[width=7.0cm]{GPDsH2xi04.pdf}} \caption{$\rho^+$ GPD $H_2$. The same line code is used in Fig.~\ref{fig:h1:3d}. } \label{fig:h2:3d} \end{figure*} \begin{figure* \centering \subfigure[$ \xi=0 $]{\label{fig:h3:3d:xi0}\includegraphics[width=7.0cm]{GPDsH3xi0.pdf}} \subfigure[$ \xi=-0.4 $]{\label{fig:h3:3d:xi04}\includegraphics[width=7.0cm]{GPDsH3xi04.pdf}} \caption{$\rho^+$ GPD $H_3$. The same line code is used in Fig.~\ref{fig:h1:3d}.} \label{fig:h3:3d} \end{figure*} \begin{figure*}[!ht] \centering \subfigure[$t=-0.5~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4$] {\label{fig:h1:t05}\includegraphics[width=7.0cm]{discontenuity-T05XiH1.pdf}} \subfigure[$t=-10~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4,\;-0.6$] {\label{fig:h1:t10}\includegraphics[width=7.0cm]{discontenuity-T10XiH1.pdf}} \caption{$\rho^+$ GPD $H_1(x,\xi, t)$ at (a) $t=-0.5~\rm{GeV}^2$ and (b) $-10~\rm{GeV}^2$. The solid black, dotted red and dashed blue curves stand for the $H_1$ with $\xi=0, -0.2$, and $-0.4$, respectively. The dotted-dashed purple curve in (b) is for $\xi=-0.6$. The vertical dashed lines on the x axis represent $x=\mid\xi\mid$. } \label{fig:h1} \end{figure*} \begin{figure* \centering \subfigure[$t=-0.5~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4$] {\label{fig:h2:t05}\includegraphics[width=7.0cm]{discontenuity-T05XiH2.pdf}} \subfigure[$t=-10~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4,\;-0.6$] {\label{fig:h2:t10}\includegraphics[width=7.0cm]{discontenuity-T10XiH2.pdf}} \caption{$\rho^+$ GPD $H_2$. The same line code is used in Fig.~\ref{fig:h1}. } \label{fig:h2} \end{figure*} \begin{figure* \centering \subfigure[$t=-0.5~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4$]{\label{fig:h3:t05} \includegraphics[width=7.0cm]{discontenuity-T05XiH3.pdf}} \subfigure[$t=-10~\mathrm{GeV}^2,\;\xi=0,\;-0.2,\;-0.4,\;-0.6$]{\label{fig:h3:t10} \includegraphics[width=7.0cm]{discontenuity-T10XiH3.pdf}} \caption{$\rho^+$ GPD $H_3$. The same line code is used in Fig.~\ref{fig:h1}.} \label{fig:h3} \end{figure*} It should be stressed that our results, shown in Figs.~\ref{fig:h1:3d}-\ref{fig:h3}, are continuous at $x=\xi$ (or $\abs\xi$) as discussed earlier. The $\xi$ trajectory limits that $-0.42~\le~\xi~\le~0$ for $t=-0.5~\mathrm{GeV}^2$, and $-0.90~\le~\xi~\le~0$ for $t=-10~\mathrm{GeV}^2$. As one can see from Figs.~\ref{fig:h1:t05} and \ref{fig:h2:t05}, in small $\abs t$ region, the transition from the valence to novalence regimes in $H_{1}$ and $H_{2}$ is quite smooth. However, in the large $\abs t$ region, as shown in Figs.~\ref{fig:h1:t10} and \ref{fig:h2:t10}, both $H_{1}$ and $H_{2}$ become sensitive to the transition in the nonzero skewness case, while Figs.~\ref{fig:h3} and \ref{fig:h3:3d} show that $H_{3}$ is very sensitive when $x\rightarrow\xi$ (or $\abs\xi$) as $\xi~\ne~0$, in both the small and large $\abs t$ regions. \\ We know that, in the forward limit ($t\rightarrow0$) and in the deep inelastic region, $H_{1}^q(x,0,0)/2$ corresponds to the single flavor structure function $F_1^q(x)$ and $H_{5}^q(x,0,0)$ corresponds to the structure function $b_1^q(x)$. The two obtained functions $F_1^u$ and $b_1^u$ are plotted in Figs.~\ref{F1} and \ref{b1}, respectively. Our result for $F_1^u$ has a crossing near $x=0$, which is beyond the expectation, since as $x\rightarrow0$, $F_1^u$ should decrease to zero smoothly. This may be due to the fact that the contribution of the gluon GPDs becomes more important in the small-$x$ regime~\cite{Diehl2003}, which is beyond the scope of the present calculation. As for $b_1^u(x)$ or more general $H_{5}^u(x,\xi,t)$, the sum rules Eq.~(\ref{eq:sumrule}) requires the integral over $x$ vanishes for any $\xi$ and $t$. Our numerical result holds the sum rule for $H_4^u$ quiet well, but for $H_5^u$, the integral deviates from zero by, at most, $\sim~6.5~\%$ [with repect to $G_C(0)=1$] when $-7~\mathrm{GeV}^2\le t \le 0$. The violation of sum rules of $H_4$ and $H_5$ is also encountered in the deuteron case, such as the numerical model in Ref.~\cite{Cano2004}. In addition, the symmetry around $x\sim1/2$ preserves approximately for both $F_1^u(x)$ and $b_1^u(x)$ in our phenomenological model calculation. This symmetry conforms to the isospin and crossing symmetries, which reduces $u_{\rho^+}{(x)}={\bar{d}}_{\rho^+}{(1-x)}$.\\ \begin{figure}[!t \centerline{\includegraphics[width=8.6cm]{struture-function-F1.pdf}} \caption{\label{F1} The DIS structure function $F_1$.} \end{figure} \begin{figure}[h \centerline{\includegraphics[width=8.6cm]{struture-function-b1.pdf}} \caption{\label{b1} The DIS structure function $b_1$.} \end{figure} \section{QCD evolution}\label{sec:evolution} It is known that the low-energy chiral quark model provides the initial conditions for the QCD evolution. The present work assumes that the valence quarks carry all the momentum at a factorization scale $Q_0$. To compare our result with the lattice calculation, the evolution is needed. As far as we know, Ref.~\cite{Best1997} is the only one lattice QCD calculation for the moments of the unpolarized $\rho$ meson, which is at the scale $Q= 2.4~\mathrm{GeV}$ with quenched approximation. Its results are supported by the latter QCD sum rule calculation in Ref.~\cite{Oganesian2001}. The leading order(LO) DGLAP evolution for the moments of the single flavor structure function $F_1^u(x)$ reads \begin{eqnarray} \label{eq:dglap} \frac{V_n^u(Q)}{V_n^u(Q_0)} = \left( \frac{\alpha(Q)}{\alpha(Q_0)} \right)^{\gamma_n^{(0)}/(2\beta_0)} \end{eqnarray} where the valence-quark momentum fractions $V_n^u=M_{n+1}\left[H_{1}^u(x,0,0)\right]=2M_{n+1}\left[F_1^u(x)\right]\sim a_{n+1}$ and the running coupling constant is \begin{eqnarray} \alpha(Q) &=& \frac{4\pi}{\beta_0 \text{log}(Q^2/\Lambda^2_{QCD})} \ , \end{eqnarray} where $\beta_0 = {11N_c}/{3} - {2N_f}/{3} $ with $N_c=N_f=3$ and \begin{eqnarray} \Lambda_{QCD} = 0.226~GeV \end{eqnarray} being employed~\cite{Broniowski2008,Broniowski200878}. The percentage of the $\rho$ total momentum carried by the valence quarks is $V_1=V_1^u +V_1^{\bar{d}}$. In Ref.~\cite{Best1997}, it was found that $V_1^q(Q=2.4~\mathrm{GeV})=0.33(2)$ and therefore $V_1$ is about $70\%$. At the quark model point $Q_0$, i.e. the model factorization scale, $V_1(Q_0)$ turns out to be \begin{eqnarray} V_1(Q_0)=1 , \quad G_1(Q_0)+S_1(Q_0)=0 , \end{eqnarray} from the downward LO DGLAP evolution. In the above equation, $G_1(Q)$ and $S_1(Q)$ are the gluon and sea momentum fractions, respectively. Thus, quark model point $Q_0$ is \begin{eqnarray} \label{eq:scaleQ0} Q_0 = 528_{-62}^{+77} \; \text{MeV} \ . \end{eqnarray} The error bars come from the uncertainty in lattice result for $V_1^q$. This is a rather low scale, however, the typical expansion parameter $\alpha(Q_0)/(2\pi)=0.131_{-0.023}^{+0.018}$ makes the perturbation theory meaningful. It should be mentioned that our numerical result for $V_1$ is $1.02$, which diverges from unity by 2\%. At the scale $Q=2.4~\mathrm{GeV}$, the results for $V_{1,2,3}$ (or $a_{2,3,4}$) and $d_{2,3,4}$ of Ref.~\cite{Best1997} are \begin{eqnarray} V_1^u=0.33(2)\ , \quad V_2^u=0.17(5)\ , \quad V_3^u=0.06(4)\ , \\ d_2=0.29_{-23}^{+22}\ , \quad d_3=-0.001(15)\ , \quad d_4=-0.01(6) \ . \end{eqnarray} After the LO DGLAP evolution to the lattice scale, our model predicts \begin{eqnarray} V_1^u=0.34(2)\ , \quad V_2^u=0.15(1)\ , \quad V_3^u=0.08(1)\ , \\ d_2=0.044(3)\ , \quad d_3=0.048(5)\ , \quad d_4=0.039(5)\ , \end{eqnarray} where the error bars came from the uncertainty of the predicted scale $Q_0$ in Eq.~(\ref{eq:scaleQ0}). As one can see, except for $d_2$, the lowest moments of $b_1^q(x)$, our results agree well with the lattice calculations. However, it should be emphasized that Ref.~\cite{Best1997} concluded their $d_2$ value being ``surprisingly" large at the scale of $Q=2.4~\mathrm{GeV}$, since $b_1^q(x)$ should vanish if the $\rho$ meson is in a pure ${}^3S_1$ state. We believe that our estimated smaller value for $d_2$ is more reasonable since only the ${}^3S_1$-wave coupling is taken into account in the present calculation and the ${}^3D_1$ admixture is thought to be small ($\sim 1\%$) as mentioned earlier. \section{Summary and conclusions} \label{sec:summary} In the present work, we perform a calculation for the $\rho$ meson unpolarized GPDs by employing a light-cone constituent quark model and using the isospin combination~\cite{Broniowski2008,Broniowski200878}. The smeared $\rho-q\bar{q}$ meson vertex, which represents the nonperturbative QCD effect, is adopted following Ref.~\cite{Choi2004} but using the symmetric loop momentum convention in order to satisfy the isospin symmetry. The three $\rho$ meson FFs and some other low-energy observables are calculated. Our results are compatible with the previous calculations. By considering the sum rules of GPDs, the unpolarized DIS structure functions have also been estimated, and the symmetric distribution is basically maintained in our numerical calculation. This feature reflects the isospin and crossing symmetries. At $x=\xi$ (or $\abs\xi$) where the DGLAP and ERBL regimes meet, GPDs in our calculation are continuous, as required by the consistency of factorization at leading twist~\cite{Diehl2003}. After the QCD evolution, the model predictions for the moments of structure functions are compared with the lattice calculation. The obtained factorization scale $Q_0$ is a rather low one in this work. However, the corresponding typical expansion parameter is still small enough to make the perturbative calculation meaningful. It is encouraging that all the first three-order moments in our calculation are compatible with the lattice calculation at the same scale ratio. The present model can be also applied for the polarized GPDs of the $\rho$ meson, and such a calculation is in a progress. Moreover, a calculation for the deuteron GPDs is also expected in the future.\\ \section*{Acknowledgements} We would like to thank Yu Jia, Wei Sun, Yu Lu, and B. Pire for their useful and constructive discussions. This work is supported by the National Natural Sciences Foundations of China under Grant No. 11475192 and No. 11521505, and by the fund provided to the Sino-German CRC 110 "Symmetries and the Emergence of Structure in QCD" project by NSFC under Grant No. 11621131001. \section*{APPENDIX: Extracting the unpolarized GPDs.} \label{sec:appendix} The following is the method to extract the unpolarized GPDs $H_i$. First, the loop integral, Eq.~(\ref{Vlf}), after excluding the two polarization vectors $\epsilon_{\mu}$ and $\epsilon'^*_{\nu}$, is \begin{eqnarray} V^{u\, ; \mu\nu}_{ } (x, \xi, t) % &=& \frac{M^2}{f_\rho^2} \frac{ 1 }{ 2(2\pi)^3 \sqrt{\omega_{p'}\omega_{p} } } \int \frac{d^4 k }{ (2\pi)^4 } \, \delta \left[ x P^+ -k^+ \right] \nonumber \\ && \times (-) Tr \Bigg\{ \frac{\imath ( \slash{k}-\slash{P}+m ) }{ (k-P)^2-m^2 + \imath \epsilon} \gamma^\nu \frac{\imath ( \slash{k}+\frac{\slash{\Delta}}{2} +m ) }{ (k+\frac{\Delta}{2})^2 -m^2 + \imath \epsilon} \slash{n} \frac{\imath ( \slash{k}-\frac{\slash{\Delta}}{2} +m ) }{ (k-\frac{\Delta}{2})^2 -m^2 + \imath \epsilon} \gamma^\mu \Bigg\} \nonumber \\ && \times \frac{c }{ [ (k-P)^2-m^2_R+ \imath \epsilon] [ ({k}+\frac{\Delta}{2})^2-m^2_R+ \imath \epsilon] } \times \frac{c }{ [ (k-P)^2-m^2_R+ \imath \epsilon] [ ({k}-\frac{\Delta}{2})^2-m^2_R+ \imath \epsilon] } \nonumber \\ [1.3em] &=& -g^{\mu \nu} H^u_{1} + \frac{n^\mu P^\nu + P^\mu n^\nu }{n \cdot P } H^u_{2} - \frac{ 2 P^\mu P^\nu}{ M^2}H^u_{3} + \frac{n^\mu P^\nu - P^\mu n^\nu }{n \cdot P } H^u_{4} + \bigg\{ \frac{ M^2 n^\mu n^\nu}{(n \cdot P )^2} + \frac{1}{3} g^{\mu \nu} \bigg\} H^u_{5} \ , \label{eq:VectorGPDs} \end{eqnarray} Then, by contracting with the five tensors, one gets five independent equations as \begin{eqnarray} \left( \begin{array}{c} g_{\mu v} \\ n_\mu n_\nu \\ n_\mu P_\nu \\ n_\nu P_\mu \\ P_\mu P_\nu \end{array} \right) \cdot V^{u\, ; \mu\nu}= \left( \begin{array}{ccccc} -4 & 2 & -\frac{2 P^2}{M^2} & 0 & \frac{4}{3} \\ 0 & 0 & -\frac{2 ( n \cdot P )^2}{M^2} & 0 & 0 \\ -(n \cdot P) & n \cdot P & -\frac{2 (n \cdot P) P^2}{M^2} & -(n \cdot P) & \frac{n \cdot P}{3} \\ -(n \cdot P) & n \cdot P & -\frac{2 (n \cdot P) P^2}{M^2} & n \cdot P & \frac{n \cdot P}{3} \\ -P^2 & 2 P^2 & -\frac{2 P^4}{M^2} & 0 & M^2+\frac{P^2}{3} \\ \end{array} \right) \cdot \left( \begin{array}{c} H^u_1 \\ H^u_2 \\ H^u_3 \\ H^u_4 \\ H^u_5 \\ \end{array} \right). \end{eqnarray} Finally, the explicit expressions for GPDs are obtained: \begin{eqnarray} \left( \begin{array}{c} H^u_1 \\ H^u_2 \\ H^u_3 \\ H^u_4 \\ H^u_5 \\ \end{array} \right) = \left( \begin{array}{ccccc} \frac{1}{6} \left(\frac{{P}^2}{M^2}-3\right) & \frac{{P}^2 \left({P}^2-M^2\right)}{2 M^2 \left( {n} \cdot {P} \right)^2} & \frac{M^2-{P}^2}{2 M^2 \left({n} \cdot {P}\right)} & \frac{M^2-{P}^2}{2 M^2 \left({n} \cdot {P}\right)} & \frac{1}{3 M^2} \\ -\frac{1}{2} & -\frac{3 {P}^2}{2 \left( {n} \cdot {P} \right)^2} & \frac{1}{{n} \cdot {P}} & \frac{1}{{n} \cdot {P}} & 0 \\ 0 & -\frac{M^2}{2 \left( {n} \cdot {P} \right)^2} & 0 & 0 & 0 \\ 0 & 0 & -\frac{1}{2 \left({n} \cdot {P}\right)} & \frac{1}{2 \left({n} \cdot {P}\right)} & 0 \\ \frac{{P}^2}{2 M^2} & \frac{3 {P}^4}{2 M^2 \left( {n} \cdot {P} \right)^2} & -\frac{3 {P}^2}{2 M^2 \left({n} \cdot {P}\right)} & -\frac{3 {P}^2}{2 M^2 \left({n} \cdot {P}\right)} & \frac{1}{M^2} \\ \end{array} \right) \cdot \left( \begin{array}{c} g_{\mu v} \\ n_\mu n_\nu \\ n_\mu P_\nu \\ n_\nu P_\mu \\ P_\mu P_\nu \end{array} \right) \cdot V^{u\, ; \mu\nu} \end{eqnarray}
\section*{Acknowledgment} The authors would like to thank Florent Krzakala, Christophe Schülke and Rüdiger Urbanke for helpful discussions and Erdem Bıyık for numerical implementation of the GAMP algorithm. The work of Jean Barbier and Mohamad Dia is supported by the Swiss national Foundation Grant no 200021-156672. \appendices \input{sections/appendixA_GAMP.tex} \input{sections/appendixB_StateEvolution.tex} \input{sections/appendixC_Bound.tex} \input{sections/appendixD_ReplicaCalculation.tex} \ifCLASSOPTIONcaptionsoff \newpage \fi \bibliographystyle{IEEEtran} \section{Conclusion and open challenges} \label{sec:openChallenges} In this work, we argue that spatially coupled SS codes universally achieve capacity over any memoryless channel under GAMP decoding. In particular, we prove that spatial coupling allows the algorithmic GAMP performance to saturate the potential threshold of the underlying code ensemble. Moreover, we show by analytical calculation that the potential threshold tends to capacity and the error floor vanishes in the proper limit. The approach taken in this work relies on the SE analysis and the application of the potential method. We end up pointing out some open problems. In order to have a fully rigorous capacity achieving scheme over any memoryless channel, using spatially coupled SS codes and GAMP decoding, it must be shown that SE tracks the asymptotic performance of GAMP for the $B$-dimensional prior. We conjecture that this is indeed the case. The proof is beyond the scope of this work and would follow by extending the analysis of \cite{BayatiMontanari10,Montanari-Javanmard} to the SS codes setting as done in \cite{rush2015capacity} for AMP. Moreover, a rigorous proof of the asymptotic alphabet size analysis of Section \ref{sec:larg_B} is also needed. It is also desirable to consider practical coding schemes using Hadamard-based operators or, more generally, row-orthogonal matrices. Another important point is to estimate at what rate the error floor vanishes as $B$ increases (when it exists e.g., in the AWGN channel). Finally, finite size effects should be considered in order to assess the practical performance of these codes, a direction which was recently pursued for power allocated codes in \cite{Greig18}, \cite{Rush_ISIT16} and \cite{Rush_ISIT17}. \section{Threshold saturation}\label{sec:proofsketch} We now prove threshold saturation for spatially coupled SS codes using methods from \cite{6887298}. The main strategy is to assume a ``bad'' fixed point solution of the spatially coupled SE and to calculate the change in potential due to a small \emph{shift} in two different ways: $i)$ by second order Taylor expansion (Lemma \ref{lemma:Fdiff_quadraticForm} and Lemma \ref{lemma:quadFormBounded}), $ii)$ by direct evaluation (Lemma \ref{lemma:diffShited_directEval}). We then show by contradiction that as long as $R < R_{\rm pot}$ the SE converges to the ``good'' fixed point (Theorem \ref{th:mainTheorem}). Our threshold saturation proof follows the lines of \cite{6887298}. However, we consider a more general coupling construction. More specifically, we assume a general coupling strength which is not necessarily uniform or symmetric as in \cite{6887298}. This relaxation could significantly improve the performance in practice \cite{CaltagironeZ14}. Moreover, it is worth noting that carrying out step $i)$ presents some technical difficulties when bounding the second-order Taylor expansion of the coupled state evolution which do not appear in \cite{6887298}. This is due to the special form of the state evolution tracking the performance of the GAMP algorithm for SS codes over general channels. In Section \ref{sec:propCoupledSyst} we start by showing some essential properties of the spatially coupled SE operator. \subsection{Properties of the coupled system}\label{sec:propCoupledSyst} Monotonicity properties of the SE operators $T_{\text{un}}$ and $T_{\text{co}}$ are key elements in the analysis. \begin{lemma} The SE operator of the coupled system maintains degradation in space, i.e. if ${\tbf E} \succeq {\tbf G}$, then $T_{\txt{co}}({\tbf E}) \succeq T_{\txt{co}}({\tbf{G}})$. This property is verified for $T_{\txt{un}}$ for a scalar error as well. \label{lemma:spaceDegrad} \end{lemma} \begin{IEEEproof} Combining Lemma~\ref{lemma:SigmaIncreases} with the first equality in Definition \ref{def:sigmac} implies that if ${\tbf E} \succeq {\tbf G}$, then $\Sigma_c({\tbf E}) \geq \Sigma_c({\tbf G})\ \forall \ c$. Now, the SE operator of Definition \ref{def:SEc} can be interpreted as an average over the spatial dimension of local MMSE's. The local MMSE's for each position $c=1,\cdots,\Gamma$ are the ones of $B$-dimensional equivalent AWGN channels with noise ${\boldsymbol{\xi}} \sim \mathcal{N}(\mathbf{0}, \tbf{I}_B\,\Sigma_c^2/\log_2B)$. These are non-decreasing functions of $\Sigma_c^2$: this is intuitively clear but we provide a justification based on an explicit formula for the derivative below. Thus $[T_{\txt{co}}( {\tbf E})]_r \geq [T_{\txt{co}}( {\tbf G})]_r \ \forall \ r$, which means $T_{\txt{co}}({\tbf E}) \succeq T_{\txt{co}}({\tbf{G}})$. The derivative of the MMSE of the Gaussian channel with i.i.d noise $\mathcal{N}(\mathbf{0}, \tbf{I}_B\,\Sigma^2)$ can be computed as \begin{align} \frac{d \ \! {\rm mmse}(\Sigma)}{d(\Sigma^{-2})} = \frac{d}{d(\Sigma^{-2})} \mathbb{E}_{{\textbf {X}}, {\tbf Y}}\bigl[\|{\textbf {X}} - \mathbb{E}[{\textbf {X}}\vert {\tbf Y}]\|_2^2\bigl] = - 2 \mathbb{E}_{{\textbf {X}}, {\tbf Y}}\bigl[\|{\textbf {X}} - \mathbb{E}[{\textbf {X}}\vert {\tbf Y}]\|_2^2 {\rm Var}[{\textbf {X}}\vert {\tbf Y}]\bigl]. \end{align} This formula is valid for vector distributions $p_0({\textbf {x}})$, and in particular, for our $B$-dimensional sections. It confirms that $T_{\text{un}}$ (resp. $[T_{\txt{co}}]_r$) is a non-decreasing function of $\Sigma$ (resp. $\Sigma_c$). In particular the local MMSE's for each position $c = 1,\cdots, \Gamma$ in definition \ref{def:SEc} are non-decreasing. \end{IEEEproof} \begin{figure}[!t] \centering \includegraphics[draft=false,width=0.7\textwidth, height=90pt]{./figures/profile3.pdf} \caption{A non-symmetric error profile in a typical SE iteration. The solid line corresponds to the original spatially coupled system and the dashed line to the {\it modified} system. The error profile of the original system has a $0$ plateau for all $r \le 3w$ and it increases until $r_{\rm max}$ where it reaches its maximum value $E_{\rm max} \in [0,1]$. It flattens after $r_{\rm max}$ then it decreases to reach $0$ at $\Gamma-3w+1$ and remains null after. The non-symmetric shape of the double-sided wave in Fig.~\ref{fig:errorProfile} emphasises that we are considering the generic case of non-symmetric coupling strength when designing spatially coupled matrices (see Section \ref{sec:codeens}). The error profile of the modified system (dashed line) starts with a plateau at $\bar{E}_{\rm f}$ for all $r \le r_*$, where $r_*+1$ is the first position s.t the original profile is at least $\bar{E}_{\rm f}$, and then matches that of the original system for all $r\in\{r_*,\dots,r_{\rm max}\}$. It then saturates to $E_{{\rm max}}$ for all $r \ge r_{\rm max}$. Note that if ${\tbf E} \preceq \bar{{\tbf E}}_{\rm f}$ then $r_* = r_{\rm max}$. By construction, the error profile of the modified system is non-decreasing and degraded with respect to that of the original system. } \label{fig:errorProfile} \end{figure} \begin{corollary} \label{cor:timeDegrad} The SE operator of the coupled system maintains degradation in time, i.e. $T_{\txt{co}}({\tbf E}^{(t)}) \preceq {\tbf E}^{(t)}$ implies $T_{\txt{co}}({\tbf E}^{(t+1)}) \preceq {\tbf E}^{(t+1)}$. Similarly, $T_{\txt{co}}({\tbf E}^{(t)}) \succeq {\tbf E}^{(t)}$ implies $T_{\txt{co}}({\tbf E}^{(t+1)}) \succeq {\tbf E}^{(t+1)}$. Furthermore, if we take the initial conditions ${\bf E}^{(0)} = {\bf 1}$ (the all one-vector) or ${\bf E}^{(0)} = {\bf 0}$ (the all zero-vector) the \emph{limiting profile} \begin{equation} \lim_{t\rightarrow \infty} {\tbf E}^{(t)} \vcentcolon= T_{\txt{co}}^{(\infty)}({\tbf E}^{(0)}), \label{26} \end{equation} exists. Finally under Assumption \ref{continuity-assumption} the limiting profile is a fixed point of $T_{\txt{co}}$, i.e., \begin{equation} T_{\txt{co}} (T_{\txt{co}}^{(\infty)}({\tbf E}^{(0)})) = T_{\txt{co}}^{(\infty)}({\tbf E}^{(0)}). \label{27} \end{equation} These properties are verified by $T_{\txt{un}}$ for the underlying system as well. \end{corollary} \begin{IEEEproof} First we note $T_{\txt{co}}({\tbf E}^{(t)}) \preceq {\tbf E}^{(t)}$ means ${\tbf E}^{(t+1)} \preceq {\tbf E}^{(t)}$ and thus by Lemma~\ref{lemma:spaceDegrad} $T_{\txt{co}}({\tbf E}^{(t+1)}) \preceq T_{\txt{co}}({\tbf E}^{(t)})$ which means $T_{\txt{co}}({\tbf E}^{(t+1)}) \preceq {\tbf E}^{(t+1)}$. The same argument shows that $T_{\txt{co}}({\tbf E}^{(t)}) \succeq {\tbf E}^{(t)}$ implies $T_{\txt{co}}({\tbf E}^{(t+1)}) \succeq {\tbf E}^{(t+1)}$. Let us show the existence of the limit \eqref{26} when we start with the initial condition ${\tbf E}^{(0)}={\bf 1}$. This flat profile is maximal at every position thus after one iteration we necessarily have ${\tbf E}^{(1)}\preceq {\tbf E}^{(0)}$. Applying $t$ times the operator $T_{\txt{co}}$ we get ${\tbf E}^{(t+1)}\preceq {\tbf E}^{(t)}$ which means $E_r^{(t+1)}\leq E_r^{(t)}$. Thus for every position we have a non-increasing sequence which is non-negative. Thus the sequence converges and $\lim_{t\to \infty} {\tbf E}^{(t)} = T_{\txt{co}}^{(\infty)}({\bf 1})$ exists. The same argument applies if we start from the initial condition ${\tbf E}^{(0)}={\bf 0}$ (the limit may be different of course). To show the last statement \eqref{27} we argue that $T_{\txt{co}}$ is continuous with respect to ${\tbf E}$. We already noted after Definition \ref{def:SE} that the denoiser $[g_{{\rm in}}]_i$ is a continuous function of $\Sigma\geq 0$. Clearly, the denoiser satisfies $0 \le [g_{{\rm in}}]_i \le 1$ also, and so does the expression $([g_{{\rm in}}]_i - s_i)^2$. A look at the Definition \ref{def:SEc} of $[T_{\txt{co}}({\bf E})]_r$ thus shows, by Lebesgue's dominated convergence theorem, that $[T_{\txt{co}}({\bf E})]_r$ is jointly continuous in $\Sigma_c({\bf E})$, $c=1, \cdots, \Gamma$. Thanks to Definition \ref{def:sigmac} and the Assumption \ref{continuity-assumption} of continuity of $\Sigma(E)$, we conclude that $T_{\txt{co}}$ is a continuous function of ${\bf E}$. \end{IEEEproof} \begin{corollary}\label{rk:shape} Starting from the error profile $\tbf{E}^{(0)} = \tbf{1}$ and due to the pinning condition, as the SE progresses the perfect side information propagates inwards and the error profile adopts the shape of the {\it solid line} shown on Fig.~\ref{fig:errorProfile} for every iteration $t>1$: it is non-decreasing for $r \le r_{\rm max}$ and non-increasing for $r \ge r_{\rm max}$ for some value of $r_{\rm max}\in\{3w,\dots,\Gamma-3w+1\}$. \end{corollary} \begin{IEEEproof} For a large enough $\Gamma$, the pinning condition \eqref{eq:pinningConcition1} and the variance symmetry \eqref{eq:varianceSymmetry} ensure that in the first SE iteration $\Sigma^2_c(\tbf{E}^{(0)}={\bf 1})$ satisfies the following ordering along the positions: $i)$ it is non-decreasing for all $c\in\{1,\dots,4w+1\}$, $ii)$ it is non-increasing for all $c\in\{\Gamma- 4w,\dots,\Gamma\}$, $iii)$ it is constant elsewhere. Using the pinning condition again and the fact that the componentwise SE operator is non-decreasing in $\Sigma^2_c$ (see the proof of Lemma \ref{lemma:spaceDegrad}), one can show that after the first SE iteration the error profile $\tbf{E}^{(1)}$ must adopt the following ordering: $i)$ it is non-decreasing for all $r\in\{1,\dots,5w+1\}$, $ii)$ it is non-increasing for all $r\in\{\Gamma- 5w,\dots,\Gamma\}$, $iii)$ it is constant elsewhere. Repeating the same argument by recursion one deduces that a double-sided wave (solid line shown in Fig. \ref{fig:errorProfile}) propagates inwards as the SE progresses. \end{IEEEproof} Recall that state evolution is initialized with ${\tbf E}^{(0)}={\tbf 1}$. The iterations will eventually converge to a {\it fixed point profile} \begin{equation} {\tbf E}^{(\infty)} \vcentcolon= T_{\txt{co}}^{(\infty)}({\tbf 1}). \end{equation} The fixed point reached by SE may be the ``good'' MSE floor profile $\tbf{E}_{\rm f}$ or may be a ``bad'' profile which is strictly degraded with respect to $\tbf{E}_{\rm f}$. \subsection{Proof of threshold saturation} The goal of this section is to arrive at a proof of the two main results, namely Theorem \ref{th:mainTheorem} and Corollary \ref{cor:maincorollary}, both formulated at the end of the section. In this section we consider rates in the range $0< R < R_{\rm pot}$. Thus the gap given in Definition \ref{def:freeEnergyGap} is strictly positive and finite, i.e., $0< \Delta F_{\text{un}} < +\infty$. \begin{definition}[The pseudo error floor]\label{def:pseudo} We fix $0<\eta <1$ (the reader may as well think of $\eta =1/2$ in all subsequent arguments of this section). It can be shown that continuity of $\Sigma(E)$ (Assumption \ref{continuity-assumption}) implies that the potential function $F_{\text{un}}(E)$ is continuous for $E\in [0, 1]$. In particular it is continuous at the error floor $E_{\rm f}$. Therefore we can find $\delta(\eta, B, R) > 0$ such that $\vert F_{\text{un}}(E) - F_{\text{un}}(E_{\rm f})\vert \leq \eta \Delta F_{\text{un}}$ whenever $\vert E - E_{\rm f}\vert \leq \delta(\eta, B, R)$. Now we take {\it any} $0 <\epsilon <\delta(\eta, B, R)$ and set $\bar E_{\rm f} = E_{\rm f} +\epsilon$. We have in particular $\vert F_{\text{un}}(\bar E_{\rm f}) - F_{\text{un}}(E_{\rm f})\vert \leq \eta \Delta F_{\text{un}}$. This number $\bar E_{\rm f}$, will serve as a "pseudo error floor" in the analysis. \end{definition} \begin{definition}[The modified system]\label{def:modSystem} The modified system is a modification of the SE iterations defined by applying {\it two saturation constraints} to the error profile of the original system {\it at every iteration}. First recall that the error profile of the original system has a $0$ plateau for all $r \le 3w$ and increases until $r_{\rm max}$ where it reaches its maximum value $E_{\rm max} \in [0,1]$. It flattens after $r_{\rm max}$ then it decreases to reach $0$ at $\Gamma-3w+1$ and remains null after. Now take {\it any} $0< \epsilon < \delta(\eta, B, R)$ and set $\bar E_{\rm f} = E_{\rm f} + \epsilon$ where $E_{\rm f}$ is the true error floor. At each iteration the profile of the {\it modified system} is defined by applying the following two saturation constraints: (i) the profile is set to the pseudo error floor $\bar E_{\rm f}$ for all $r \le r_*$, where $r_*+1$ is the first position s.t the original profile is at least $\bar{E}_{\rm f}$; (ii) the profile is set to $E_{{\rm max}}$ for all $r \ge r_{\rm max}$. For $r\in\{r_*,\dots,r_{\rm max}\}$ the profiles of the modified and original systems are equal. \end{definition} Figure~\ref{fig:errorProfile} gives an illustration of this definition: the full line corresponds to the original system and the dashed one to the modified system. By construction, the error profile of the modified system is non-decreasing and degraded with respect to that of the original system. We note that when the error floor is non-vanishing (e.g. on the AWGN channel) we could take in the analysis $\bar E_{\rm f} = E_{\rm f} +\epsilon \to E_{\rm f}$ for fixed code parameters. However for zero error floor we need to have $\epsilon > 0$ in the analysis. For code parameters $w$ and $\Gamma$ large enough we can make $\epsilon$ arbitrarily small. The fixed point profile of the modified system is degraded with respect to ${\tbf E}^{(\infty)}$, thus the modified system serves as an upper bound in our proof. Note that the SE iterations of the modified system also satisfy the monotonicity properties of $T_{\text{co}}$ (see Section \ref{sec:propCoupledSyst}). Moreover, the modified system preserves the shape of the single-sided wave at all times. In the rest of this section we shall work with the modified system. We now choose a proper shift of the saturated profile in Definition \ref{def:shift}, and then evaluate the change in potential due to this shift in two different ways in Lemma \ref{lemma:quadFormBounded} and Lemma \ref{lemma:diffShited_directEval}. Theorem \ref{th:mainTheorem} and Corollary \ref{cor:maincorollary} will then be easy consequences. \begin{definition}[Shift operator]\label{def:shift} The \emph{shift operator} is defined pointwise as $[\text{S}({\tbf E})]_1 \vcentcolon= \bar E_{\rm f}, \ [\text{S}({\tbf E})]_r \vcentcolon= E_{r-1}$. \end{definition} \begin{lemma}\label{leminterp} Let ${\tbf E}$ be a fixed point profile of the modified system initialized with ${\tbf E}^{(0)}=\tbf{1}$. Then there exist $\hat{t}\in[0,1]$ such that \begin{align*} F_{\text{co}}(\text{S}({\tbf E})) &-F_{\text{co}}({\tbf E}) = \frac{1}{2} \sum_{r,r'=1}^{\Gamma} \Delta {E}_r \Delta {E}_{r'} \left[\frac{\partial^2 F_{\text{co}}}{\partial E_{r}\partial E_{r'}}\right]_{\hat {\tbf E}}. \end{align*} where $\Delta {E}_{r} \vcentcolon= {E}_{r} -{E}_{r-1}$ and $\hat {\tbf E} \vcentcolon= (1-\hat{t}) {\tbf E} + \hat{t}\text{S}({\tbf E})$. Note that $\hat{t}$ depends in a non-trivial fashion on ${\tbf E}$. \label{lemma:Fdiff_quadraticForm} \end{lemma} \begin{IEEEproof} Consider $F_{\text{co}}(t)\vcentcolon= F_{\text{co}}({\tbf E} + t(\text{S}({\tbf E}) - {\tbf E}))$ and note that $F_{\text{co}}(0) = F_{\text{co}}({\tbf E})$, $F_{\text{co}}(1) = F_{\text{co}}(\text{S}({\tbf E}))$. Since $[\text{S}({\tbf E})]_r = {E}_{r} + \Delta {\tbf E}_r$ the mean value theorem yields \begin{align} F_{\text{co}}(\text{S}({\tbf E})) - F_{\text{co}}({\tbf E}) = - \sum_{r=1}^{\Gamma} \Delta {E}_{r} \left[\frac{\partial F_{\text{co}}}{\partial E_r}\right]_{{\tbf E}} +\frac{1}{2}\sum_{r,r'=1}^{\Gamma} \Delta {E}_{r} \Delta {E}_{r'} \left[\frac{\partial^2 F_{\text{co}}}{\partial E_{r}\partial E_{r'}}\right]_{\hat {\tbf E}}, \label{eq:expFbsminusFb} \end{align} for some suitable $\hat t\in [0,1]$. By saturation of $\tbf E$, $\Delta E_r=0 \ \forall \ r \in\mathcal{B}\vcentcolon=\{1,\dots,r_*\}\cup \{r_{\rm max}+1,\dots,\Gamma\}$. Moreover for $r\notin\mathcal{B}$, $E_r=[T_{\text{co}}(\tbf E)]_r$, and thus by Lemma~\ref{lemma:fixedpointSE_extPot} the potential derivative cancels at these positions. Hence the first sum in the right hand side of (\ref{eq:expFbsminusFb}) cancels. \end{IEEEproof} \begin{lemma}\label{lemma:Evariesslowly} The fixed point profile of the modified system initialized with $\tbf{E}^{(0)}=\tbf{1}$ is \emph{smooth}, meaning that $\Delta {E}_{r} $ satisfies the following \begin{align*} |\Delta {E}_{r} | & \leq \frac{g_* + \bar g}{w\underline g} \exp({-c(B) \Sigma^{-2}(E_{r+w})}) \nonumber \\ & \leq \frac{g_* + \bar g}{w\underline g} , \end{align*} where $w$ is the coupling window and $c(B)>0$ is a constant depending only on $B$; whereas $g_*$, $\bar g$ and $\underline g$ correspond to the design function defined in Section \ref{subsec:SC_SS}. \end{lemma} \begin{IEEEproof} $\Delta E_r=0$ for all $r \in\mathcal{B}$. By construction of $\{J_{r,c}\}$ we have $$ J_{r,c} \leq \frac{g_w((r-c)/w)}{\underline g (2w+1)}. $$ Moreover from Definitions \ref{def:sigmac} and \ref{def:SEc} of the coupled state evolution operator, the fact that ${\rm mmse}$ is an increasing function of the noise and Lemma \ref{lemma:SigmaIncreases}, we have ${\rm mmse}(\Sigma_c({\tbf E})) \leq {\rm mmse}(\Sigma(E_{r+w}))$ for $c= r-w, \cdots, r+w$. Thus using Lipschitz continuity of $g_w$, we have for all $r \notin\mathcal{B}$ that \begin{align}\label{bad-bound} |\Delta {E}_{r}| = \Big|[T_{\text{co}}({\tbf E})]_r - [T_{\text{co}}({\tbf E})]_{r-1}\Big| & =\Big|\sum_{c=1}^{\Gamma} (J_{r,c} - J_{r-1,c}) {\rm mmse}(\Sigma_c({\tbf E})) \Big|\nonumber \\ & \le \frac{{\rm mmse}(\Sigma(E_{r+w}))}{(2w+1)\underline g}\sum_{c=1}^{\Gamma} \Big| g_{w}\big(\frac{r-c}{w}\big) - g_{w}\big(\frac{r-1-c}{w}\big)\Big|\nonumber \\ &\le \frac{{\rm mmse}(\Sigma(E_{r+w}))}{(2w+1)\underline g} \Big(\, 2w \frac{g_*}{w} + |g_{w}(1)| + |g_{w}(-1)|\, \Big)\nonumber\\ &< \frac{{\rm mmse}(\Sigma(E_{r+w}))}{2w\underline g} \Big(\, 2g_* + 2\bar g\, \Big)\nonumber\\ &\le \frac{g_* + \bar g}{w\underline g} \exp({-c(B) \Sigma^{-2}(E_{r+w})}). \end{align} The last inequality is obtained by knowing that for an equivalent AWGN channel of variance $\Sigma^2$ and under {\it discrete prior}, ${\rm mmse}(\Sigma) \leq \exp({-c\Sigma^{-2}})$ where $c$ is some positive number that depends on the prior (see e.g. Appendix D of \cite{BMDK_2017} for an explicit proof). Here the prior is uniform over sections so this number depends only on $B$. \end{IEEEproof} \begin{lemma} \label{lemma:quadFormBounded} Let ${\tbf E}$ be a fixed point profile of the modified system initialized with $\tbf{E}^{(0)}=\tbf{1}$. Then the coupled potential verifies \begin{align*} \frac{1}{2}\Big|\sum_{r,r'=1}^{\Gamma} \Delta {E}_{r} \Delta {E}_{r'}\left[\frac{\partial^2 F_{\text{co}}}{\partial E_{r}\partial E_{r'}}\right]_{\hat{\tbf E}}\Big| < \frac{K(B, \bar g, \underline g, g_*)}{(E_{\rm f} +\epsilon)^{2\beta} R w}. \end{align*} where $K(B, \bar g, \underline g, g_*)>0$. In particular, the RHS is $\mathcal{O}(w^{-1})$. \end{lemma} \begin{IEEEproof} First remark that a fixed point of the modified system satisfies ${\tbf E} \succeq {\tbf E}_{\rm f}$. For ${\tbf E} = {\tbf E}_{\rm f}$ the result is immediate since $\Delta {E}_{r}=0$. It remains to prove this lemma for ${\tbf E}$ a fixed point of the modified system such that ${\tbf E} \succ {\tbf E}_{\rm f}$. In Appendix \ref{sec:App_Bound} we prove that \begin{align} \Big[\frac{\partial^2 F_{\text{co}}}{\partial E_{r}\partial E_{r'}}\Big]_{\hat{\tbf E}} \leq \delta_{r, r'} \frac{K_1(B, \bar g, \underline g)}{(E_{\rm f} +\epsilon)R} + 1_{\vert r - r' \vert \leq 2w+1} \frac{K_2(B, \bar g, \underline g)}{(E_{\rm f} + \epsilon)^{2\beta}R(2w+1)} \label{proved-in-appendix} \end{align} for some finite positive $K_1(B, \bar g, \underline g)$ and $K_2(B, \bar g, \underline g)$ independent of $w$ and $\Gamma$. Since $\Delta E_r \geq 0$, using the triangle inequality we get \begin{align*} \frac{1}{2}\Big|\sum_{r,r'=1}^{\Gamma} \Delta {E}_{r} \Delta {E}_{r'}\left[\frac{\partial^2 F_{\text{co}}}{\partial E_{r}\partial E_{r'}}\right]_{\hat{\tbf E}}\Big| & \leq \frac{K_1(B, \bar g, \underline g)}{2(E_{\rm f} +\epsilon)R}\sum_{r=1}^{\Gamma} \Delta {E}_{r}^2 + \frac{K_2(B, \bar g, \underline g)}{2(E_{\rm f} + \epsilon)^{2\beta}R(2w+1)} \sum_{r=1}^\Gamma \Delta {E}_{r} \sum_{r'= r - w}^{r+w} \Delta {E}_{r'} \nonumber \\ & \leq \frac{K_1(B, \bar g, \underline g)}{2(E_{\rm f} +\epsilon)R}\max_{r'} \Delta E_{r'} \sum_{r=r_*+1}^{r_{\rm max}} \Delta {E}_{r} + \frac{K_2(B, \bar g, \underline g)}{2(E_{\rm f} + \epsilon)^{2\beta}R}\max_{r'} \Delta E_{r'} \sum_{r=r_*+1}^{r_{\rm max}} \Delta {E}_{r} \nonumber \\ & \leq \frac{K_1^{\prime}(B, \bar g, \underline g, g_*)}{2(E_{\rm f} +\epsilon)R w} + \frac{K_2^{\prime}(B, \bar g, \underline g, g_*)}{2(E_{\rm f} + \epsilon)^{2\beta}R w}. \end{align*} To get the last inequality we used Lemma \ref{lemma:Evariesslowly} and $\sum_{r=r_*+1}^{r_{\rm max}} \Delta {E}_{r} = E_{\rm max} - E_{r_*+1} < 1$. Finally, one can find $K(B, \bar g, \underline g, g_*) > 0$ such that the last estimate is smaller than $$ \frac{K(B, \bar g, \underline g, g_*)}{(E_{\rm f} +\epsilon)^{2\beta} R w} $$. \end{IEEEproof} The change in potential due to the shift can be also computed by direct evaluation as shown in the following lemmas. \begin{lemma} Let ${\tbf E}$ be a fixed point profile of the modified system initialized with $\tbf{E}^{(0)}=\tbf{1}$. If ${\tbf E}\succ \bar{{\tbf E}}_{\rm f}$, then $E_{\rm max}$ cannot be in the basin of attraction to the MSE floor, i.e., $E_{\rm max} \notin \mathcal{V}_0$. \label{lemma:outside_basin} \end{lemma} \begin{IEEEproof} Knowing that ${\tbf E} \succ \bar{{\tbf E}}_{\rm f}$ and also that ${\tbf E}$ is non-decreasing implies $\bar E_{\rm f} < E_{\rm max}$. Moreover, we have that \begin{equation} \label{eq:outside_basin} E_{\rm max} = [T_\text{co}({\tbf E})]_{r_{\rm max}} = \sum_{c=1}^{\Gamma} J_{r_{\rm max},c} \, {\rm mmse}(\Sigma_c({\tbf E})) \le \sum_{c=1}^{\Gamma} J_{r_{\rm max},c} \, {\rm mmse}(\Sigma(E_{\rm max})) \le T_\text{un}(E_{\rm max}), \end{equation} where the first inequality follows from the fact that $\Sigma_c({\tbf E}) \le \Sigma(E_{\rm max})$ due to the variance symmetry \eqref{eq:varianceSymmetry} at $r_{\rm max}$ and the fact that $\tbf E$ is non-decreasing. The second inequality follows from the variance normalization \eqref{eq:varianceNormalization}. Applying the monotonicity of $T_\text{un}$ on \eqref{eq:outside_basin} yields \begin{align} E_{\rm f} < \bar E_{\rm f} < E_{\rm max} \le T_{\text{un}}^{(\infty)}( E_{\rm max}), \end{align} which implies that $ E_{\rm max} \notin \mathcal {V}_0$. \end{IEEEproof} \begin{lemma} Let $0< \eta <1$ fixed and $\bar E_{\rm f} = E_{\rm f}+\epsilon$ with any $0<\epsilon<\delta(\eta, B, R)$ where $\delta(\eta, B, R)$ has been constructed in Definition \ref{def:pseudo}. Let ${\tbf E} \succ \bar{{\tbf E}}_{\rm f}$ be a fixed point profile of the modified system initialized with $\tbf{E}^{(0)}=\tbf{1}$. Then ${\tbf E}$ satisfies \begin{align*} F_{\text{co}}(\text{S}({\tbf E})) - F_{\text{co}}({\tbf E}) \leq - (1-\eta)\Delta F_{\text{un}}, \end{align*} where $\Delta F_{\text{un}}$ is the free energy gap of the underlying system given in Definition \ref{def:freeEnergyGap}. \label{lemma:diffShited_directEval} \end{lemma} \begin{IEEEproof} The contribution of the change in the ``energy'' term is a perfect telescoping sum: \begin{align} U_{\text{co}}(\text{S}({\tbf E})) - U_{\text{co}}({\tbf E}) = U_{\text{un}}(\bar E_{\rm f}) - U_{\text{un}}(E_{\rm max}). \label{eq:DeltaU} \end{align} We now deal with the contribution of the change in the ``entropy'' term. Using the properties of the construction of $J_{r, c}$ we notice that for all $c \in \{2w + 1,\dots,\Gamma-2w-1\}$ \begin{equation} \Sigma_{c+1}^{-2}({\text{S}(\tbf E})) = \sum_{r=c+1-w}^{c+1+w} \frac{J_{r,c+1}}{\Sigma^{2}(E_{r-1})} = \sum_{r=c-w}^{c+w} \frac{J_{r+1,c+1}}{\Sigma^{2}(E_{r})} = \sum_{r=c-w}^{c+w} \frac{J_{r,c}}{\Sigma^{2}(E_{r})} = \Sigma_{c}^{-2}({\tbf E}) \end{equation} which yields \begin{align} &S_{\text{co}}({\tbf E})-S_{\text{co}}(\text{S}({\tbf E}))= S_{\text{un}}( \Sigma_{\Gamma-2w}({\tbf E}))-S_{\text{un}}( \Sigma_{2w+1}(\text{S}{(\tbf E)})) - \sum_{c\in \mathcal{S}} [S_{\text{un}}( \Sigma_{c}(\text{S}{(\tbf E)})) - S_{\text{un}}( \Sigma_{c}({\tbf E}))], \label{eq:diffSB} \end{align} where $\mathcal{S}\vcentcolon=\{1,\dots,2w\}\cup\{\Gamma-2w+1,\dots,\Gamma\}$. By the saturation of the modified system, $\tbf E$ possesses the following property \begin{align} &[\text{S}( {\tbf E})]_r = [ {\tbf E}]_r \quad {\rm for~all} \quad r \in \{1,\dots,r_*\}\cup\{r_{\rm max}+1,\dots,\Gamma\}. \end{align} Hence, $\Sigma_c(\text{S}( {\tbf E})) = \Sigma_c( {\tbf E})$ for all $c \in \mathcal{S}$ and thus the sum in (\ref{eq:diffSB}) cancels. Furthermore, one can show, using the saturation of $\tbf E$ and the variance symmetry \eqref{eq:varianceSymmetry}, that $\Sigma_{2w+1}(\text{S}({\tbf E})) = \Sigma( \bar E_{\rm f})$. The same arguments and the fact that $r_{\rm max} \le \Gamma-3w$ for $\tbf E\succ \bar{\tbf{E}}_{\rm f}$ lead to $\Sigma_{\Gamma-2w}({\tbf E}) = \Sigma( E_{\rm max})$. Hence, (\ref{eq:diffSB}) yields \begin{align} S_{\text{co}}({\tbf E}) - S_{\text{co}}(\text{S}({\tbf E})) = S_{\text{un}}(\Sigma( E_{\rm max})) - S_{\text{un}}(\Sigma(\bar E_{\rm f})). \label{eq:DeltaS} \end{align} Combining (\ref{eq:DeltaU}) with (\ref{eq:DeltaS}) gives \begin{align*} F_{\text{co}}(\text{S}({\tbf E})) - F_{\text{co}}({\tbf E}) & = - (F_{\text{un}}( E_{\rm max}) - F_{\text{un}}( \bar E_{\rm f})) \nonumber \\ & = - (F_{\text{un}}( E_{\rm max}) - F_{\text{un}}(E_{\rm f})) + (F_{\text{un}}({\bar E_{\rm f}}) - F_{\text{un}}(E_{\rm f})). \end{align*} Using the definition of the free energy gap (Definition \ref{def:freeEnergyGap}), the fact that $E_{\rm max} \notin \mathcal{V}_0$ (Lemma~\ref{lemma:outside_basin}), and $F_{\text{un}}({\bar E_{\rm f}}) - F_{\text{un}}(E_{\rm f})\leq \eta \Delta F_{\text{un}}$ we find \begin{align*} F_{\text{co}}(\text{S}({\tbf E})) - F_{\text{co}}({\tbf E}) \leq - (1-\eta)\Delta F_{\text{un}}. \end{align*} \end{IEEEproof} Using Lemmas \ref{lemma:Fdiff_quadraticForm}, \ref{lemma:quadFormBounded}, \ref{lemma:diffShited_directEval} we now prove threshold saturation. \begin{thm}\label{th:mainTheorem} Let $0< \eta <1$ fixed and $\bar E_{\rm f} = E_{\rm f}+\epsilon$ with any $0<\epsilon<\delta(\eta, B, R)$ where $\delta(\eta, B, R)$ has been constructed in Definition \ref{def:pseudo}. Fix \begin{align}\label{condition-on-w} R < R_{\rm pot}\quad {\rm and} \quad w > \frac{K(B, \bar g, \underline g, g_*)}{(E_{\rm f} + \epsilon)^{2\beta} R (1-\eta)\Delta F_{\text{un}}} \end{align} Then the fixed point profile ${\tbf{E}^{(\infty)}}$ of the coupled SE must satisfy ${\tbf{E}}^{(\infty)} \preceq \bar{{\tbf{E}}}_{\rm f}$. \end{thm} \begin{IEEEproof} Assume that, under these hypotheses, the fixed point profile of the modified system initialized with ${\tbf E}^{(0)}={\tbf 1}$ is such that $\tbf E\succ \bar{{\tbf{E}}}_{\rm f}$. On one hand by Lemma~\ref{lemma:diffShited_directEval} we have for $R < R_{\rm pot}$ a positive $\Delta F_{\text{un}}$ and $$ |F_{\text{co}}({\tbf E}) - F_{\text{co}}(\text{S}({\tbf E}))| \ge (1-\eta)\Delta F_{\text{un}}. $$ On the other hand by Lemmas~\ref{lemma:Fdiff_quadraticForm} and \ref{lemma:quadFormBounded} $$ |F_{\text{co}}({\tbf E}) - F_{\text{co}}(\text{S}({\tbf E}))| \leq \frac{K(B, \bar g, \underline g, g_*)}{(E_{\rm f} + \epsilon)^{2\beta} R w}. $$ Thus we get $$ w \leq \frac{K(B, \bar g, \underline g, g_*)}{(E_{\rm f} + \epsilon)^{2\beta} R (1-\eta)\Delta F_{\text{un}}} $$ which is a contradiction. Hence, ${\tbf{E}} \preceq \bar{{\tbf{E}}}_{\rm f}$. Since $\tbf E \succeq {\tbf E}^{(\infty)}$ we have ${\tbf E}^{(\infty)} \preceq \bar{{\tbf{E}}}_{\rm f}$. \end{IEEEproof} The most important consequence of this theorem is a statement on the GAMP threshold, \begin{corollary}\label{cor:maincorollary} By first taking $\Gamma \to \infty$ and then $w\to\infty$, the GAMP threshold of the coupled ensemble satisfies $R_{\text{co}}\geq R_{\rm pot}$. \end{corollary} This result follows from Theorem~\ref{th:mainTheorem} and Definition~\ref{def:AMPcoupled}. Once the limit $w\to +\infty$ is taken we can send $\epsilon\to 0$ and the pseudo error floor tends to the true error floor $\bar E_{\rm f} \to E_{\rm f}$. \subsection{Discussion} Corollary \ref{cor:maincorollary} says that the GAMP threshold for the coupled codes saturates the potential threshold in the limit $w\to +\infty$. It is in fact not possible to have the strict inequality $R_{\text{co}} > R_{\rm pot}$, so in fact equality holds, but the proof would require a separate argument that we omit here because it is not so informative. Besides, this equality is not needed in order to argue that sparse superposition codes universally achieve capacity under GAMP decoding when $B\to +\infty$. Indeed we have necessarily $R_{\text{co}} < C$ and we show in Section~\ref{sec:larg_B}, using non-rigorous asymptotic computations, that $\lim_{B\to \infty}R_{\rm pot}=C$. Thus $\lim_{B\to \infty} R_{\text{co}} = C$. We emphasize that Theorem~\ref{th:mainTheorem} and Corollary~\ref{cor:maincorollary} hold for a large class of estimation problems with random linear mixing \cite{rangan2011generalized}. Both the SE and potential formulations of Section~\ref{sec:stateandpot} as well as the proof given in the present section are not restricted to SS codes. Indeed all the definitions and results are obtained for any memoryless channel $P_{\text{out}}$ and can be generalized for any factorizable (over $B$-dimensional sections) prior of the message (or signal) ${\textbf {s}}$. Theorem \ref{th:mainTheorem} states that for $w$ large enough the state evolution iterations will drive the MSE profile below some pseudo error floor $\bar E_{\rm f}=E_{\rm f}+\epsilon$. This is then enough information to deduce that the threshold saturation phenomenon happens in the limit where $w\to +\infty$ (and note we do not expect full threshold saturation, i.e., $R_{\rm co}\to R_{\rm pot}$ for finite $w$). However, it is worth pointing out that the condition \eqref{condition-on-w} in Theorem \ref{th:mainTheorem} on the size of the coupling window is most probably {\it not} optimal. We conjecture that a better bound should hold where $w > C/ \Delta F_{\rm un}$ for some $C>0$ which does {\it not} diverge when $E_{\rm f} +\epsilon \to 0$. The appearance of the error floor in the denominator can be traced back to inequality \eqref{proved-in-appendix} whose derivation is detailed in Appendix \ref{sec:App_Bound}. One possible way to cancel this divergence would be to obtain a better bound on $\Delta E_r$ than the one given by \eqref{bad-bound}. More precisely if $E_{r+w}$ can be replaced by $E_r$ then the proof of Lemma \ref{lemma:quadFormBounded} and Theorem \ref{th:mainTheorem} would give a more resonable lower bound for $w$. Carrying out this program presents technical difficulties in the analysis of coupled state evolution which we have not overcome in this work. The present difficulties do not appear in the analysis of spatially coupled LDPC codes \cite{PfisterMacrisBMS}. \section{State evolution and potential formulation}\label{sec:stateandpot} The asymptotic behavior of the AMP algorithm operating on dense graphs can be tracked by a simple recursion called state evolution (SE), similar to the density evolution (DE) for sparse graphs. The rigorous proof showing that SE tracks exactly the asymptotic performance of AMP and GAMP was given in \cite{BayatiMontanari10,Montanari-Javanmard}. Moreover, the extension of the SE equation of AMP to SS code settings, with $B$-dimensional structured prior distribution and power allocation, was proven to be exact in \cite{rush2015capacity}. We believe that the methods of \cite{rush2015capacity} and \cite{Montanari-Javanmard} can be extended to the present setting of spatially coupled SS codes and GAMP algorithm. This would prove that SE correctly tracks GAMP, a conjecture which is firmly supported by numerical simulations \cite{BBD_ISIT2017}. \subsection{State evolution of the underlying system} SE tracks the performance of GAMP by computing the average asymptotic mean-square error (MSE) of the GAMP estimate $\hat{{\textbf {s}}}^{(t)}$ at each iteration $t$ \begin{equation} \tilde E^{(t)} \vcentcolon= \lim_{L \rightarrow \infty} \frac{1}{L}\sum_{l=1}^L \|\hat{{\textbf {s}}}_l^{(t)} - {\textbf {s}}_l\|_2^2. \end{equation} It turns out that tracking the GAMP algorithm is equivalent to running a simple recursion that iteratively computes the MMSE of a single section sent through an \emph{equivalent AWGN channel}. This equivalent channel is induced by the code construction and has an \emph{effective} noise variance that depends solely on the physical channel $P_{\rm out}(y|x)$. In order to formalize this, we first need some definitions. \begin{definition}[Effective noise] \label{def:effNoise} The effective noise variance $\Sigma^{2}(E)$, parametrized by $E\in [0,1]$, is defined via the following relation \begin{align*} \Sigma^{-2}(E) \vcentcolon= \frac{\mathbb{E}_{p\vert E} [\mathcal{F}(p|E)]}{R}, \end{align*} where the expectation $\mathbb{E}_{p\vert E}$ is w.r.t $\mathcal{N}(p|0,1-E)$ and \begin{align*} \mathcal{F}(p|E) \vcentcolon= \int dy f(y|p,E) (\partial_p \ln f(y|p,E))^2 \end{align*} is the Fisher information of the parameter $p$ associated with the probability distribution of the random variable $Y$ with density \begin{align*} f(y|p,E) \vcentcolon= \int dx P_{\text{out} }(y|x) \mathcal{N}(x|p,E). \end{align*} See Appendix \ref{sec:App_GAMP} for explicit expressions for various communication channels. To get an intuition about this Fisher information, observe that in the AWGN channel, for example, the effective noise variance is directly related to the channel noise parameter with $\Sigma^2(E)=R(E+\rm{snr}^{-1})$, where $\rm{snr}$ is the signal-to-noise ratio. Intuitively speaking, the effective noise variance is tracking the denoising variance $\tau^r$ of the Algorithm \ref{alg:gamp}. \end{definition} We will need some regularity properties for the function $\Sigma(E)$ which boils down to mild assumptions on the channel transition probability $P_{\rm out}(y|x)$. \begin{assumption}[Continuity and boundedness of $\Sigma(E)$]\label{continuity-assumption} The channel transition probability $P_{\rm out}(y|x)$ is such that $\Sigma(E)$ is a continuous and twice differentiable function of $E\in [0,1]$. \end{assumption} \begin{assumption}[Scaling of $\Sigma^{-2}(E)$ as $E\to 0$]\label{scaling-assumption} The channel transition probability $P_{\rm out}(y|x)$ is such that $\Sigma^{-2}(E)$ and its first two derivatives are bounded by a polynomial in $E^{-1}$. Formally, for a given channel there exist two constants $C>0$ and $\beta >0$ such that \begin{align}\label{upper-scale} \max\Big(\Sigma^{-2}(E),\big|\frac{\partial \Sigma^{-2}(E)}{\partial E}\big|, \big|\frac{\partial^2 \Sigma^{-2}(E)}{\partial E^2}\big|\Big) \leq \frac{C}{RE^{\beta}} \equiv \lambda(E) \end{align} for all $E\in [0, 1]$. \end{assumption} \begin{figure}[!t] \centering \includegraphics[draft=false,width=0.38\textwidth, height=150pt, trim={0pt 0 1 0},clip]{./figures/invSigma_BSC.pdf} \centering \includegraphics[draft=false,width=0.38\textwidth, height=150pt, trim={0pt 0 1 0},clip]{./figures/invSigma_BEC.pdf} \caption{$\Sigma^{-2}(E)$ and its first two derivatives in a semi-log scale for the BSC (left) and the BEC (right) with flip and erasure probabilities $\epsilon = 0.1$ and $R=0.2$. Assumption \ref{scaling-assumption} is satisfied with exponents $\beta =1/2$ and $5/4$. Furthermore, the effective noise variance of both channels is bounded with $\Sigma^2(E)< 1/2$. Note that the mapping $\pi([{\textbf {F}}{\textbf {s}}]_\mu) = {\rm sign}([{\textbf {F}}{\textbf {s}}]_\mu)$ was used here.} \label{fig:Sigma_BSC} \end{figure} These assumptions will be needed in the proof of threshold saturation in Section \ref{sec:proofsketch}. In practice they can be checked on a case by case basis for each channel at hand. For the AWGN channel we have the analytic simple expression $\Sigma^2(E) = R(E+{\rm snr}^{-1})$ so the assumptions are obviously satisfied. One can also check them for the binary symmetric channel (BSC), binary erasure channel (BEC) and Z channel (ZC), using the tedious expressions for the Fisher information given in Table \ref{table:gout} in Appendix \ref{sec:App_GAMP}. Fig. \ref{fig:Sigma_BSC} illustrates $\Sigma^{-2}(E)$ and its derivatives for the BSC and BEC. The following lemma (which is independent from the assumptions) will also be needed. \begin{lemma} \label{lemma:SigmaIncreases} $\Sigma^{2}(E)$ is non-negative and increasing with $E$. In particular $\Sigma^2(E) \leq \Sigma^2(1) < +\infty$. \end{lemma} \begin{IEEEproof} Positivity of the Fisher information implies $\Sigma^{2}(E) \ge 0$. The proof that it is increasing is a straightforward application of the data processing inequality for Fisher information (e.g. Corollary 6 in \cite{fisherInfoProperties}). \end{IEEEproof} From now on, ${\textbf {S}}\sim p_0({\textbf {s}})$ and $\mathbf{Z}\sim \mathcal{N}(\mathbf{0},\tbf{I}_B)$ are $B$-dimensional random vectors with corresponding expectations denoted $\mathbb{E}_{{\textbf {S}},{\textbf {Z}}}$, and $Z\sim\mathcal{N}(0,1)$ with expectation denoted $\mathbb{E}_{Z}$. \begin{definition}[SE of the underlying system] \label{def:SE} The SE operator of the underlying system is the average MMSE of the equivalent channel \begin{align*} T_{\text{un}}(E) \vcentcolon= \text{mmse}\big(\Sigma(E)\big) =\mathbb{E}_{{\textbf {S}}, {\textbf {Z}}}\bigg[\sum_{i=1}^B \Big( \Big[g_{\text{in}}\Big({\textbf {S}} +\frac{\mathbf{Z} \Sigma(E)}{\sqrt{\log_2 B}},\frac{\tbf{I}_B\,\Sigma^{2}(E)}{\log_2 B}\Big)\Big]_{i} - S_i\Big)^2\bigg], \end{align*} where $g_{\text{in}}$ is the denoiser given in Definition \ref{def:gin} \begin{align}\label{denoiser-simplified} \Big[g_{\text{in}}\Big({\textbf {s}} +\frac{{\textbf {z}}\Sigma}{\sqrt{\log_2 B}},\frac{\tbf{I}_B\,\Sigma^{2}}{\log_2 B}\Big)\Big]_{i} = \Bigg[1+\sum_{k\neq i}^B e^{(s_k- s_i)\log_2 B/\Sigma^{2} + (z_k - z_i)\sqrt{\log_2 B}/\Sigma}\Bigg]^{-1}. \end{align} The SE iteration tracking the performance of the GAMP decoder for the underlying system can be expressed as \begin{align*} \tilde E^{(t+1)} = T_\text{un}(\tilde E^{(t)}), \qquad t\geq 0, \end{align*} with the initialization $\tilde E^{(0)}=1$. \end{definition} Note for further use that \eqref{denoiser-simplified} is a well defined continuous function of $\Sigma >0$ (all other arguments being fixed). At $\Sigma=0$ we define the function by its continuous extension which is obviously finite. Thus we will consider that $g_{\text{in}}$ is continuous for $\Sigma\geq 0$. After $t$ iterations of the GAMP algorithm, the MSE tracked by SE is denoted by $T_{\text{un}}^{(t)}(\tilde{E}^{(0)})$. The monotonicity properties and the continuity of the SE operator, discussed in Section~\ref{sec:propCoupledSyst}, ensure that eventually all initial conditions converge to a fixed point. More specifically, the following limit exists \begin{equation} \lim_{t \rightarrow \infty} T_{\text{un}}^{(t)}(\tilde{E}^{(0)}) \vcentcolon= T_{\text{un}}^{(\infty)}(\tilde{E}^{(0)}), \end{equation} for all $\tilde{E}^{(0)}\in [0,1]$ and satisfies \begin{equation} T_{\text{un}} (T_{\text{un}}^{(\infty)}(\tilde{E}^{(0)})) = T_{\text{un}}^{(\infty)}(\tilde{E}^{(0)}). \end{equation} Having introduced the SE iteration, the following definitions can be properly stated. \begin{definition}[MSE Floor]\label{def:MSEfloor} The MSE floor $E_{\rm f}$ is the fixed point reached from the initial condition of zero error, \begin{align*} E_{\rm f} = T_{\text{un}}^{(\infty)}(0). \end{align*} Note that for the channels where $E=0$ is {\it not} a trivial fixed point of the SE at a finite section size $B$, the MSE floor $E_{\rm f}$ is {\it strictly positive}. For example, this is the case for the AWGN channel \cite{barbier2014replica,BarbierK15}. However, one can show that for certain channels $W$ there exists a {\it trivial} fixed point $E=0$ of SE leading to {\it vanishing} MSE floor even at finite $B$. This is typically the case for binary input channels and has been proved explicitly for the BEC, BSC and Z channels \cite{BBD_ISIT2017}. For generality, we will always denote the MSE floor as $E_{\rm f}$ whether it is zero or not. \end{definition} \begin{definition}[Basin of attraction] For a fixed channel, the basin of attraction $\mathcal{V}_0$ to the MSE floor $E_{\rm f}$ is defined as \begin{align*} \mathcal{V}_0 \vcentcolon= \big\{ E \in [0,1] \ \! |\ \! T_{\text{un}}^{(\infty )}(E) = E_{\rm f} \big\}. \end{align*} Note that for a given channel, the basin of attraction is a function of the rate as the $T_{\text{un}}$ operator varies with the rate. \end{definition} \begin{definition} [Threshold of underlying ensemble] The GAMP threshold of the underlying ensemble is defined as \begin{align*} R_{\text{un}} \vcentcolon= {\rm sup}\{R>0\ \! |\ \! T_{\text{un}}^{(\infty)}(1) = E_{\rm f}\}. \end{align*} \end{definition} For the present system, one can show that the only two possible fixed points are $T_{\text{un}}^{(\infty)}(0)$ and $T_{\text{un}}^{(\infty)}(1)$. For $R<R_{\text{un}}$, there is only one fixed point, namely the ``good'' one $T_{\text{un}}^{(\infty)}(1)=E_{\rm f}$. Whenever $E_{\rm f}$ is non-zero, it will vanish as the section size $B$ increases (see Section \ref{sec:larg_B}). Instead if $R>R_{\text{un}}$, the GAMP decoder is blocked by the ``bad'' fixed point $T_{\text{un}}^{(\infty)}(1)> E_{\rm f}$. The ``bad'' fixed point does not vanish as B increases. The GAMP algorithm ``tries'' to minimize the MSE. Thus the natural quantity being tracked by SE is the MSE. But one can also assess the performance of GAMP by looking at the section error rate (SER) (which is more natural for coding problems) after applying a hard decision (HD) thresholding on the decoder's output. The analytical relationship between MSE and the SER has been discussed in \cite{barbier2014replica,BarbierK15} and one verifies that an MSE going to zero implies a SER going to zero. \subsection{State evolution of the coupled system} For a spatially coupled system, the performance of GAMP at each iteration $t$ is described by an average {\it MSE vector} $[\tilde E_c^{(t)} \, \ |\, \ c \in \{1,\dots, \Gamma\}]$ along the ``spatial dimension'' indexed by the blocks of the message with \begin{equation} \tilde E_c^{(t)} \vcentcolon= \lim_{L\rightarrow \infty}\frac{\Gamma}{L}\sum_{l\in c} \|\hat{\tbf s}_l^{(t)} - {\tbf s}_l\|_2^2,\quad c \in \{4w+1,\dots,\Gamma-4w\}, \end{equation} where the sum $l\in c$ is over the set of indices of the $L/\Gamma$ sections composing the $c$-th block of ${\textbf {s}}$. To reflect the seeding at the boundaries, we enforce the following \emph{pinning condition} for all $c\in\{1,\dots, 4w\}\cup\{\Gamma-4w+1,\dots,\Gamma\}$ \begin{equation}\label{eq:pinningConcition} \tilde E_c^{(t)}=0, \qquad t \ge 0, \end{equation} where the message at these positions is assumed to be known to the decoder at all times. It turns out that the following change of variables \begin{equation} E_r^{(t)} \vcentcolon= \sum_{c=1}^{\Gamma} J_{r,c} \tilde E_c^{(t)}, \end{equation} where ${\tbf E}= [E_r \ \! | \ \! r \in \{1,\dots,\Gamma\}]$ is called the \emph{profile}, makes the problem mathematically more tractable for spatially coupled codes. The pinning condition implies \begin{equation}\label{eq:pinningConcition1} E_r^{(t)}=0, \qquad t\ge 0, \end{equation} for all $r\in\mathcal{R}\vcentcolon=\{1,\dots,3w\}\cup\{\Gamma-3w+1,\dots, \Gamma\}$. An important concept is that of \emph{degradation} because it allows to compare different profiles. \begin{definition}[Degradation] \label{def:degradation} A profile ${\tbf{E}}$ is degraded (resp. strictly degraded) with respect to another one ${\tbf{G}}$, denoted as ${\tbf{E}} \succeq {\tbf{G}}$ (resp. ${\tbf{E}} \succ {\tbf{G}}$), if $E_r \ge G_r \ \forall \ r$ (resp. there exists some $r$ such that the inequality is strict). \end{definition} In order to define the SE of the spatially coupled system, we need first the following definition. \begin{definition}[Per-block effective noise]\label{def:sigmac} The per-block effective noise variance $\Sigma_{c}^{2}({\tbf E})$ is defined, for all $\,c \in\{1,\dots, \Gamma\}$, by \begin{align*} \Sigma_{c}^{-2}({\tbf E}) \vcentcolon= \sum_{r=1}^{\Gamma} \frac{J_{r,c}}{\Sigma^{2}(E_r)}=\sum_{r=1}^{\Gamma} \frac{J_{r,c}}{R} \mathbb{E}_{p\vert E_r} [\mathcal{F}(p|E_r)]. \end{align*} \end{definition} \begin{definition}[SE of the coupled system] \label{def:SEc} The vector valued coupled SE operator is defined componentwise for $t\ge0$ as \begin{equation*} E_r^{(t+1)} = [T_{\text{co}}({\tbf E}^{(t)})]_r = \begin{cases} \sum_{c=1}^{\Gamma} J_{r, c}\mathbb{E}_{{\textbf {S}}, {\textbf {Z}}}\Big[\sum_{i=1}^B \Big(g_{\text{in},i}\Big({\textbf {S}} +\frac{\mathbf{Z} \Sigma_{c}({\tbf E}^{(t)})}{\sqrt{\log_2 B}},\frac{\Sigma_{c}^2({\tbf E}^{(t)})}{\log_2 B}\Big) - S_i\Big)^2\Big] \qquad &r \notin \mathcal{R},\\ 0 \quad &r \in \mathcal{R}. \end{cases} \end{equation*} % Note that for $r\in \mathcal{R}$, the pinning condition $E_r^{(t)} =0$ is enforced at all times. SE is initialized with $E_r^{(0)}=1$ for $r\notin \mathcal{R}$. \end{definition} \begin{definition} [Threshold of coupled ensemble]\label{def:AMPcoupled} The GAMP threshold of the spatially coupled system is defined as \begin{align*} R_{\text{co}} \vcentcolon= {\liminf}_{w\to \infty}{\liminf}_{\Gamma\to \infty} {\rm sup}\{R>0\ \! |\ \! T_{\text{co}}^{(\infty)}(\boldsymbol{1}) \preceq \tbf E_{\rm f}\} \end{align*} where $\boldsymbol{1}$ is the all ones vector and ${\tbf E}_{\rm f} \vcentcolon= [E_r=E_{\rm f} \ \!|\ \! r \in \{1,\dots,\Gamma\}]$ is the \emph{MSE floor profile} (recall $E_{\rm f}$ in Definition \ref{def:MSEfloor}). The existence of the limit $T_{\text{co}}^{(\infty)}(\boldsymbol{1})$ is verified in Section \ref{sec:propCoupledSyst}. Note that the degradation $\preceq$ holds with equality for the cases where $E_{\rm f} =0$. \end{definition} For the noisy compressed sensing problem, the rigorous proof that SE tracks the performance of GAMP, on both the underlying and spatially coupled models, was already done in \cite{Montanari-Javanmard} by generalizing the work of \cite{BayatiMontanari10}. For the SS codes, we assume that the same results hold. \begin{assumption}[Accuracy of state evolution]\label{SE-assumption} We assume that, at least for the channels under Assumption \ref{continuity-assumption} and Assumption \ref{scaling-assumption}, the state evolution equation tracks the performance of GAMP on both the underlying and spatially coupled SS codes. \end{assumption} The proof of Assumption \ref{SE-assumption} is beyond the scope of this paper. It would follow from a generalization to any memoryless channel of the analysis done in \cite{rush2015capacity}, that accounts for the $B$-dimensional prior of the SS codes, or more generally from the analysis of the non-separable priors as recently done in \cite{Berthier2017,Fletcher2018}. Our assumption is, however, supported by numerical simulations \cite{BBD_ISIT2017} (see Fig. \ref{fig:SE_tracking}). \begin{figure}[!t] \centering \includegraphics[draft=false,width=0.45\textwidth, height=145pt, trim={0pt 2 1 0},clip]{./figures/se_track_bec.pdf} \centering \includegraphics[draft=false,width=0.45\textwidth, height=145pt, trim={0pt 2 1 0},clip]{./figures/phaseDiag_bec.pdf} \caption{The GAMP performance over the binary erasure channel (BEC) with erasure probability $\epsilon = 0.1$. Left: SE tracking the GAMP decoder (MSE performance) at each iteration for three different rates with $L=2^{11}$ and $B=4$. Right: The potential threshold (Definition \ref{def:potThresh}) as well as the GAMP thresholds of the underlying and coupled ensembles are shown as a function of $B$. $R_{\rm{co}}$ saturates $R_{\rm pot}$ as $L$, $\Gamma$ and $w$ go to infinity for all values of $B$. However, $R_{\text{un}}$ maintains a gap to $R_{\rm pot}$, and hence to channel capacity, for all values of $B$ when $L\rightarrow \infty$. See \cite{BBD_ISIT2017} for further numerical simulations on various channels.} \label{fig:SE_tracking} \end{figure} \subsection{Potential formulation}\label{subsec:potentials} The fixed point solutions of SE can be reformulated as stationary points of a {\it potential function}. This potential function can be obtained from the replica method \cite{barbier2014replica} as shown in Appendix \ref{sec:App_Bethe} or by directly integrating the SE fixed point equations with the correct ``integrating factor'' as done in \cite{6887298}. Our subsequent analysis does not depend on the means of obtaining the potential function which is here a mere mathematical tool. \begin{definition}[Potential function of underlying ensemble]\label{def:pot_underlying} The potential function of the underlying ensemble is given by \begin{align*} F_{\text{un}}( E) \vcentcolon= U_{\text{un}}(E) - S_{\text{un}}( \Sigma(E)), \end{align*} with \begin{align*} U_{\text{un}}(E) &\vcentcolon= -\frac{E}{2\ln(2)\Sigma^{2}(E)} - \frac{1}{R} \mathbb{E}_Z\Big[\int dy\, \phi(y|Z,E) \log_2 \phi(y|Z,E)\Big], \\ S_{\text{un}}( \Sigma( {E})) &\vcentcolon= \mathbb{E}_{{\textbf {S}},{\textbf {Z}}}\Big[\log_B\int d^B{{\textbf {x}}} \,p_0({\textbf {x}}) \theta({\textbf {x}},{\textbf {S}},\mathbf{Z},\Sigma(E))\Big], \end{align*} where \begin{align*} \phi(y|z,E) &\vcentcolon= \int dx P_{\text{out}}(y|x)\mathcal{N}(x|z \sqrt{1 - E}, E),\\ \theta({\textbf {x}},{\textbf {s}},{\textbf {z}},\Sigma(E)) &\vcentcolon= \exp\bigg(-\frac{\|{\textbf {x}} - ({\textbf {s}} +{\textbf {z}} \Sigma(E)/\sqrt{\log_2 B})\|_2^2}{2\Sigma^{2}(E)/\log_2 B} \bigg). \end{align*} Replacing the prior distribution of SS codes \eqref{eq:sectionPrior} in the definition of $S_{\text{un}}( \Sigma( {E}))$, one gets \begin{align*} S_{\text{un}}( \Sigma( {E})) \vcentcolon= \mathbb{E}_{\textbf{Z}}\Big[\log_B\Big(1+\sum_{i=2}^B e_{i}\big(\textbf{Z},\frac{\Sigma(E)}{\sqrt{\log_2 B}}\big)\Big)\Big], \end{align*} where \begin{align*} e_{i}(\textbf{z},a) \vcentcolon= \exp\big(\frac{z_i - z_1}{a} - \frac{1}{a^2} \big). \end{align*} \end{definition} \begin{definition}[Free energy gap] \label{def:freeEnergyGap} For a fixed channel, the free energy gap is \begin{align*} \Delta F_{\text{un}} \vcentcolon= {\rm inf} _{E \notin \mathcal{V}_0 } (F_{\text{un}}( E) - F_{\text{un}}(E_{\rm f})), \end{align*} with the convention that the infimum over the empty set is $\infty$ (i.e. when $R < R_{\text{un}}$). Note that for a given channel, the free energy gap is a function of the rate as both $F_{\text{un}}$ and $\mathcal{V}_0$ vary with the rate. \end{definition} \begin{definition}[Potential threshold] \label{def:potThresh} The potential threshold is defined as \begin{align*} R_{\rm pot} \vcentcolon= {\rm sup}\{R>0\ \! |\ \! \Delta F_{\text{un}} > 0\}. \end{align*} \end{definition} \begin{figure}[!t] \centering \includegraphics[draft=false,width=0.45\textwidth, height=152pt, trim={0pt 3 1 0},clip]{./figures/potential_bec1.pdf} \centering \includegraphics[draft=false,width=0.45\textwidth, height=152pt, trim={0pt 3 1 0},clip]{./figures/potential_awgnc1.pdf} \caption{The potential functions for the BEC with $\epsilon = 0.1$ (left) and the AWGN channel with $\rm{snr} = 100$ (right), in both cases with $B = 2$. The black dots correspond to the global minima while the red dots correspond to the local minima preventing GAMP to decode (e.g. yellow curves). For a given rate (yellow curves), the black arrows indicate the free energy gap $\Delta F_{\text{un}}$ for each channel. The x-axis is given in the log scale to differentiate between the BEC where there is no error floor and the AWGN channel with non-negligible error floor.} \label{fig:potential} \end{figure} We give examples of potential functions for the BEC and the AWGN channel in Fig. \ref{fig:potential} for $B=2$. Because of Lemma \ref{lemma:fixedpointSE_extPot} below, the minimum that is in the basin of attraction of $E=0$ corresponds to the error floor $E_{\rm f}$. We observe that there is a non-vanishing error floor for the AWGN channel but a vanishing one for the BEC. The latter situation is also the case for the BSC and Z channel. Similarly to the underlying ensemble, one can define the potential function of the spatially coupled ensemble that is applied on a vector indexed by the spatial dimension. \begin{definition}[Potential function of spatially coupled ensemble]\label{def:pot-coupled} The potential function of the spatially coupled ensemble is given by \begin{align*} F_{\text{co}}({\tbf E}) &\vcentcolon= U_{\text{co}}({\tbf E}) - S_{\text{co}}({\tbf E}) = \sum_{r=1}^{\Gamma} U_{\text{un}}(E_r) - \sum_{c=1}^{\Gamma} S_{\text{un}}( \Sigma_c({\tbf E})). \end{align*} \end{definition} The following lemma links the potential and SE formulations. \begin{lemma}\label{lemma:fixedpointSE_extPot} If $T_{\text{un}}(\mathring E) = \mathring E$, then $\frac{\partial F_{\text{un}}}{\partial E}|_{\mathring E} =0$. Similarly for the spatially coupled system, if $[T_{\text{co}}(\mathring{{\tbf E}})]_r = \mathring{E}_r$ $\forall \ r\in \mathcal{R}^{\text{c}} =\{3w+1,\dots, \Gamma-3w\}$ then $\frac{\partial F_{\text{co}}}{\partial E_r}|_{\mathring{{\tbf E}}} = 0 \ \forall \ r\in \mathcal{R}^{\text{c}}$. \end{lemma} \begin{IEEEproof} See Appendix \ref{sec:App_SE}. \end{IEEEproof} We end this section by pointing out that the terms composing the potentials have natural interpretations in terms of effective channels. The term $\mathbb{E}_Z[\int dy\, \phi \log_2(\phi)]$ in $U_{\text{un}}(E)$ is minus the conditional entropy $H(Y\vert Z)$ for the concatenation of the channels $\mathcal{N}(x\vert z\sqrt{1-E}, E)$ and $P_{\text{out}}(y|x)$ with a standardised input $Z \sim \mathcal{N}(0, 1)$. The term $S_{\text{un}}( \Sigma( {E}))$ is equal to minus the mutual information $I({\bf S};{\bf Y})/\log_{2}B$ for the Gaussian channel $\mathcal{N}(\mathbf{y}|\mathbf{s}, \tbf{I}_B\,\Sigma^2(E)/\log_2 B)$ and input distribution $p_0(\bf s)$, up to a constant factor $-(2\ln 2)^{-1}$. \section{Introduction} \IEEEPARstart{S}{parse} superposition (SS) codes, or sparse regression codes, were first introduced by Barron and Joseph \cite{barron2010sparse} for reliable communication over the additive white Gaussian noise (AWGN) channel. The SS codes were then proven to be capacity-achieving under adaptive successive decoding along with power allocation \cite{JosephB14,barron2012high}. Later on, the connection between SS codes and compressed sensing was made in \cite{barbier2014replica}. The decoding of SS codes can be interpreted as an estimation of a sparse signal, with structured prior distribution, based on a relatively small number of noisy observations. Hence, the approximate message-passing (AMP) algorithm, originally developed for compressed sensing, was adapted in \cite{barbier2014replica} to decode SS codes where it exhibited better finite-length performance than adaptive successive decoding. SS codes, with appropriate power allocation on the transmitted signal, were then proven to achieve capacity under AMP decoding \cite{rush2015capacity}. Furthermore, the extension of the state evolution (SE) equations, originally developed to track the performance of AMP for compressed sensing \cite{BayatiMontanari10}, was proven to be exact for SS codes in \cite{rush2015capacity}. The idea of \emph{spatial coupling} was originaly introduced for low-density parity-check (LDPC) codes under the name of LDPC convolutional codes \cite{FelstromZigangirov99,LentmaierZigangirov05}. Spatial coupling has been then successfully applied to various problems including error correcting codes \cite{KRU11}, code division multiple access (CDMA) \cite{TTK11,SchlegelTruhachev11}, satisfiability \cite{HamedHassani2013}, and compressed sensing \cite{KudekarPfister10,KMSSZ12,6283053}; where it has been shown to boost the performance under iterative algorithms. Recently, spatial coupling was applied to SS codes in \cite{barbierSchulkeKrzakala,BarbierK15}. The construction of coding matrices for SS codes with local coupling and a proper termination was shown to considerably improve the performance. Moreover, practical Hadamard-based operators were used in \cite{barbierSchulkeKrzakala} to encode SS codes, where they showed better finite-length performance than random operators under AMP decoding. The spatially coupled construction used in \cite{barbierSchulkeKrzakala,BarbierK15} has many similarities with that introduced in the context of compressed sensing \cite{KrzakalaMezard12,CaltagironeZ14,Montanari-Javanmard}. Empirical evidence shows that spatially coupled SS codes perform much better than power allocated ones and that they achieve capacity under AMP decoding without any need for power allocation. This motivated the initiation of their rigorous study \cite{barbierDiaMacris_isit2016} using the \emph{potential method}, originally developed for the spatially coupled Curie-Weiss model \cite{Hassani10,Hassani12} and LDPC codes \cite{YedlaJian12,PfisterMacrisBMS,6887298}. The phenomenon of \emph{threshold saturation} for AWGN channels was shown in \cite{barbierDiaMacris_isit2016}, i.e. the \emph{potential threshold} that characterizes the performance of SS codes under the Bayes optimal minimum mean-square error (MMSE) decoder can be reached using spatial coupling and AMP decoding. Moreover, the potential threshold itself was shown to achieve capacity in the large input alphabet size limit. Threshold saturation was first established in the context of spatially coupled LDPC codes for general binary input memoryless symmetric channels in \cite{PfisterMacrisBMS,Kudekar-Urbanke-Richardson-2013}, and is recognized as the mechanism underpinning the excellent performance of such codes \cite{Zigangirov-Costello-2010}. It is interesting that essentially the same phenomenon can be established for a coding system operating on a channel with {\it continuous inputs}. This result was a stepping-stone towards establishing that spatially coupled SS codes achieve capacity on the AWGN channel under AMP decoding \cite{barbierDiaMacris_isit2016}. Note that a similar (but different) potential to the one used in \cite{barbierDiaMacris_isit2016} has been introduced in the context of scalar compressed sensing \cite{BayatiMontanari10,6887298}. It is interesting that the potential method goes through for the present system involving a dense coding matrix and a fairly wide class of spatial couplings. Related results on the optimality of spatial coupling in compressed sensing \cite{6283053} and on the threshold saturation of systems characterized by a $1$-dimensional state evolution \cite{6887298,7115123} have been obtained by different approaches. In the classical noisy compressed sensing problem, the AMP algorithm and the SE recursion tracking the algorithmic performance were derived for the AWGN channel \cite{BayatiMontanari10,DMM09}. The extension of AMP to general memoryless (possibly non-linear) channels with arbitrary input and output distributions was introduced in \cite{rangan2011generalized} via the generalized approximate message-passing (GAMP) algorithm. Moreover, an extension of SE describing the exact behavior of GAMP was also provided in \cite{rangan2011generalized}. Later on, a full rigorous analysis proving the tractability of GAMP via SE was given in \cite{Montanari-Javanmard} (for the case of fully factorized prior). These encouraging results naturally led us to generalize the analysis of SS codes in \cite{barbierDiaMacris_isit2016} to a much broader setting that includes all memoryless channels and potentially any input signal model that factorizes over B-dimensional sections \cite{barbierDiaMacris_itw2016,BBD_ISIT2017}. Moreover, SS codes under GAMP decoding were recently proposed for an inverse source coding problem \cite{Dia_ISIT2018,DiaThesis}. In this work we prove that threshold saturation is a universal phenomenon for SS codes; i.e. we show that, for any memoryless channel, spatial coupling allows GAMP decoding to reach the potential threshold of the code ensemble (Section \ref{sec:proofsketch} Theorem \ref{th:mainTheorem} and Corollary \ref{cor:maincorollary}). Moreover, we argue, through non-rigorous analytical computations, that spatially coupled SS codes universally achieve capacity under GAMP decoding by showing that the error floor vanishes and the potential threshold tends to capacity as one of the code's parameters (the section size, or input alphabet size, $B$) goes to infinity. Note that a fully rigorous statement about the capacity achieving property of SS codes still requires the following: $i)$ a rigorous asymptotic analysis in the large section size limit $B\to\infty$ (see Section \ref{sec:larg_B}), $ii)$ the proof that state evolution tracks the performance of GAMP over general memoryless channels when the prior factorizes over $B$-dimensional sections (as opposed to the fully factorized case treated in \cite{Montanari-Javanmard}). Furthermore, we give a simple expression of the GAMP algorithmic threshold of the underlying code ensemble in terms of a Fisher information (Section \ref{sec:larg_B}). Although we focus on coding for the sake of coherence with our previous results, the framework and methods are very general and hold for a wide class of non-linear estimation problems with random linear mixing. Our proof strategy uses a potential function, which is inspired from the statistical physics replica method. However, we stress that the proof {\it does not} rely on the replica method (which is not rigorous). Recently, it has been shown that the replica prediction is exact for generalized random linear estimation problems including compressed sensing and SS codes on general channels \cite{BDMK_alerton2016,BMDK_2017,ReevesPfister_isit16,ReevesPfister_trans,pmlr-v75-barbier18a}. Hence, the potential threshold can be rigorously interpreted as the optimal threshold under MMSE decoding. The paper is organized as follows. The code construction of the underlying and coupled ensembles are described in Section \ref{sec:codeens}. Section \ref{sec:GAMP} reviews the GAMP algorithm, while Section \ref{sec:stateandpot} presents the SE equations and potential function adapted to the present context. The GAMP thresholds of the underlying and coupled ensembles as well as the potential threshold are then given precise definitions. The essential steps for the proof of threshold saturation are presented in Section \ref{sec:proofsketch}. The connection between the potential threshold at infinite input alphabet size $B\to\infty$ and Shannon's capacity, as well as the closed form expression of the algorithmic threshold in terms of a Fisher information, are given in Section \ref{sec:larg_B}. Four different channel models are used to illustrate the results. Section \ref{sec:openChallenges} is dedicated to conclusion and open challenges. \section{Potential function and replica calculation}\label{sec:App_Bethe} The potential functions of the uncoupled and coupled systems, used in this paper, can be viewed as a mathematical tool and we are not really concerned how they are found. However in practice it is important to have a more or less systematic method which allows to write down ``good'' potential functions. There are essentially two ways. One is to ``integrate'' the SE equations as done in \cite{6887298} by using an appropriate ``integrating factor''. With this method there is some amount of guess involved. For example in the present problem it is not entirely obvious that the correct integrating factor is directly related to the Fisher information (as equation \eqref{integrating-factor-relation} in Appendix \ref{sec:App_SE} shows). The other way is to perform a formal and brute force replica or cavity calculation of the free energy which is then given as a variational expression involving the potential function. The disadvantage of such a calculation is that it is painful and maybe also that it is formal, but the advantage is that it is quite systematic. For completeness we give the replica calculation. We stress that the results of the paper do {\it not} rest on this formal calculation and the reader can entirely skip it. We treat the prototypical case of a spatially coupled compressed-sensing like system where the signal has {\it scalar} components $x_i$, $i=1,\cdots, N$ iid distributed according to a general prior $p_0(x)$. The calculation is exactly the same for signals whose components are $B$-dimensional with arbitray priors and sparse superposition codes fall in this class. The integration symbol $\mathcal{D}v$ is used for $dv\, e^{-\frac{v^2}{2}}$. The spatially coupled matrix is made of $\Gamma \times \Gamma$ blocks, each with $N/\Gamma$ columns and $ \alpha N/\Gamma$ rows for the blocks part of the $r^{th}$ block-row. The entries inside the block $(r,c)$ are i.i.d. with distribution $\mathcal{N}(0,J_{r,c}\Gamma/N)$. Furthermore, we enforce the per block-row variance normalization $\sum_{c=1}^{\Gamma} J_{r,c} = 1 \ \forall \ r$. We use the notation ${\textbf {x}}^0$ for the signal and define $z_\mu^a \vcentcolon= \sum_{c=1}^\Gamma \sum_{i\in c}^{N/\Gamma} F_{\mu i}x_i^a$ where the matrix structure is made explicit. The posterior distribution is given by the Bayes rule $$ P({\textbf {x}}|{\textbf {y}}) = Z({\textbf {y}})^{-1}\prod_{i=1}^N p_0(x_i) \prod_{\mu=1}^M P_{\text{out}}(y_\mu|z_\mu) $$ where $Z({\textbf {y}})=P({\textbf {y}})$ is the observation dependent normalization, or partition function. The (coupled) free energy ${F}_{\text{co}}$ will be calculated using the replica trick in one of its many incarnations \begin{align} {F}_{\text{co}} \vcentcolon= - \lim_{N\to\infty}\lim_{n\to 0} \frac{\partial}{\partial n} \frac{\ln(\mathbb{E}[Z({\textbf {y}})^n])}{N}, \label{eq:replicatrick} \end{align} where $\mathbb{E}$ denotes expectation with respect to the observation ${\textbf {y}}({\textbf {F}})$ which depend on the measurement matrix realization (that will be always implicit). We thus need to compute the $n^{th}$ moment of the partition function. For the moment, we consider $n\in\mathbb{N}$ despite that we will let $n\to0$ at the end. $Z({\textbf {y}})^n$ can be interpreted as the partition function of $n$ i.i.d. systems, the replicas $a=1, \cdots, n$, each generated independently from the posterior $P({\textbf {x}}|{\textbf {y}})$ \begin{align} Z({\textbf {y}})^n &= \int \prod_{a=1}^n \left[ d{\textbf {x}}^a \prod_{i=1}^N p_0(x_i^a) \prod_{\mu=1}^M P_{\text{out}}(y_\mu|z_\mu^a)\right],\\ \mathbb{E}[Z({\textbf {y}})^n] &= \mathbb{E}_{{\textbf {F}}} \int d{\textbf {y}} Z({\textbf {y}})^n P({\textbf {y}}) = \mathbb{E}_{{\textbf {F}}} \int d{\textbf {y}} Z({\textbf {y}})^{n+1} = \mathbb{E}_{{\textbf {F}}} \int d{\textbf {y}}\prod_{a=0}^n \[ d{\textbf {x}}^a \prod_{i=1}^N p_0(x_i^a) \prod_{\mu=1}^M P_{\text{out}}(y_\mu|z_\mu^a)\], \label{eq:eval_Znp1} \end{align} where the last equality is implied by $P({\textbf {y}}) = Z({\textbf {y}})$. This last point is valid only in the Bayes optimal setting and is known to induce a remarkable set of consequences, among which the correctness of the replica symmetric predictions. The ${\textbf {F}}$ and ${\textbf {x}}^a$ r.v being i.i.d., we can treat $z_\mu^a$ as a Gaussian random variable by the central limit theorem. Let us compute their distribution. As ${\textbf {F}}$ has zero mean, $z_\mu^a$ has zero mean also. Its covariance matrix $\boldsymbol{\tilde{q}}_{r_\mu}$ depends on the block-row index $r_\mu \in \{1,\cdots,\Gamma\}$ to which the $\mu^{th}$ measurement index belongs. Similarly, $c_i \in \{1,\dots,\Gamma\}$ is the block-column index to which the $i^{th}$ column belongs. We have \begin{align}\label{qabrmu} \tilde q^{ab}_{r_\mu} = \mathbb{E}_{{\textbf {F}}}[z_\mu^a z_\mu^b] = \sum_{c,c'=1}^{\Gamma, \Gamma} \sum_{i\in c, j\in c'}^{N/\Gamma,N/\Gamma} \mathbb{E}_{{\textbf {F}}}[F_{\mu i}F_{\mu j}] x_i^a x_j^b = \sum_{c}^{\Gamma} \frac{J_{r_\mu,c}}{N} \sum_{i\in c}^{N/\Gamma} x_i^a x_i^b, \end{align} because $\mathbb{E}_{{\textbf {F}}}[F_{\mu i} F_{\mu j}] = \delta_{ij} J_{r_\mu,c_i}/N$ in the present spatial coupling construction. We introduce the macroscopic replica overlap matrix, that takes into account the block structure in the signal induced by the matrix structure. Let \begin{align} {q}^{ab}_c \vcentcolon= \frac{\Gamma}{N} \sum_{i\in c}^{N/\Gamma} x_i^a x_i^b \ \forall \ a, b \in \{0, \cdots,n\}. \label{eq:def_overlap} \end{align} Then \eqref{qabrmu} becomes $\tilde q^{ab}_r = \sum_{c=1}^{\Gamma} J_{r,c} {q}_c^{ab}$. We now introduce the replica symmetric ansatz. According to this ansatz, the overlap should not depend on the replica index $q^{ab}_c = q_c \ \forall \ a\neq b, \, q^{aa}_c = Q_c \ \forall \ a$. This implies \begin{align} \tilde q^{ab}_r = \tilde q_r =\sum_{c=1}^\Gamma J_{r,c} q_c \ \forall \ a\neq b, \, \tilde q^{aa}_r = \tilde Q_r = \sum_{c=1}^\Gamma J_{r,c} Q_c \ \forall \ a. \end{align} Using the variance normalization $Q_c = \tilde Q_r$. Then, one can show that in Bayes optimal inference we have furthermore $Q_c = \tilde Q_r = \mathbb{E}[S^2] \ \forall \ c, r \in \{1, \cdots,\Gamma\}$, where $\mathbb{E}[s^2] = \int ds p_0(s) s^2$. In the physics litterature this is often called a ``Nishimori identity''. Thus the self overlap $Q_c$ is fixed and the condition (\ref{eq:def_overlap}) for $a=b$ does not need to be enforced. On the other hand, the cross overlap for $a\neq b$ is unknown and so we must keep $\{q_c\}$ as variables. Define a distribution of replicated variables at fixed overlap matrices $\{{\boldsymbol{q}}_c, c\in\{1, \cdots,\Gamma\}\}$ \begin{align} P(\{{\textbf {x}}^a\}|\{{\boldsymbol{q}}_c\})\vcentcolon= \frac{1}{\Xi(\{{\boldsymbol{q}}_c\})} \prod_{a=0}^n\Bigg[\prod_{i=1}^N p_0(x_i^a) \prod_{c=1}^{\Gamma} \prod_{b< a}^n \delta\Bigg(\frac{1}{2i\pi}\Bigg[\frac{N}{\Gamma}{q}_c^{ab} - \sum_{i\in c}^{N/\Gamma}x_i^a x_i^b\Bigg]\Bigg)\Bigg], \label{eq:PxagivenQc} \end{align} where $\Xi(\{{\boldsymbol{q}}_c\})$ is the associated normalization. The role of the $2i\pi$ appearing in the delta function is purely formal and will become clear later on. Plugging this expression inside (\ref{eq:eval_Znp1}) we get \begin{align} \mathbb{E}[Z({\textbf {y}})^n] &= \mathbb{E}_{{\textbf {F}}} \int d{\textbf {y}} \prod_{c=1}^{\Gamma} d\boldsymbol{q}_c P(\{{\textbf {x}}^a\}|\{{\boldsymbol{q}}_c\}) \Xi(\{{\boldsymbol{q}}_c\}) \prod_{a=0}^n \Bigg[d{\textbf {x}}^a \prod_{r=1}^\Gamma \prod_{\mu\in r}^{\alpha N/\Gamma} P_{\text{out}}(y_\mu| z_\mu^a)\Bigg] \label{eq:before_distz}\\ &= \int \prod_{c=1}^{\Gamma} d\boldsymbol{q}_c \Xi(\{{\boldsymbol{q}}_c\}) \int d{\textbf {y}} P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\}) \prod_{a=0}^n \Bigg[d{\textbf {z}}^a \prod_{r=1}^\Gamma \prod_{\mu\in r}^{\alpha N/\Gamma} P_{\text{out}}(y_\mu| z_\mu^a)\Bigg]. \label{eq:F_averaged} \end{align} The second equality is obtained after noticing that the integrand in (\ref{eq:before_distz}) depends on $\{x_i^a\}$ only through $\{z_\mu^a\}$, this allows to replace the integration on $\{x_i^a\}$ by an integration on $\{z_\mu^a\}$. As already explained, by the central limit theorem \begin{align} P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\}) &= \prod_{\mu=1}^M \mathcal{N}({\textbf {z}}_\mu|0,\boldsymbol{\tilde{q}}_{r_\mu}) = \prod_{r=1}^{\Gamma} \prod_{\mu \in r}^{\alpha N/\Gamma} \mathcal{N}({\textbf {z}}_\mu|0,\boldsymbol{\tilde{q}}_{r}) \nonumber\\ &= \prod_{r=1}^{\Gamma} \left[(2\pi)^{n+1} {\rm det}(\boldsymbol{\tilde q}_r)\right]^{-\frac{\alpha N}{2\Gamma}} \prod_{\mu \in r}^{\alpha N/\Gamma} e^{-\frac{1}{2} \sum_{a,b=0}^{n,n} z_\mu^a [\boldsymbol{\tilde q}_r^{-1}]_{ab} z_\mu^b}. \end{align} This is a product of multivariate centered Gaussian distributions, where ${\textbf {z}}_\mu \vcentcolon= [z_\mu^a, a\in\{0,\dots,n\}]$, ${\textbf {z}}^a \vcentcolon= [z_\mu^a, \mu\in\{1,\dots,M\}]$. Recall $\boldsymbol{\tilde{q}}_{r}$ is a function of $\{\boldsymbol{{q}}_c\}$. Let \begin{align} \mathbb{E}[Z({\textbf {y}})^n] &= \int \prod_{c=1}^{\Gamma} d\boldsymbol{q}_c \exp\Big[N\Big(f(\{{\boldsymbol{q}}_c\}) + g(\{\boldsymbol{q}_c\})\Big)\Big], \label{eq:meanZn_beforesaddle}\\ f(\{{\boldsymbol{q}}_c\}) &\vcentcolon= \frac{1}{N}\ln\Big[\Xi(\{{\boldsymbol{q}}_c\})\Big], \\ g(\{\boldsymbol{q}_c\}) &\vcentcolon= \frac{1}{N}\ln\Bigg[\int d{\textbf {y}} P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\}) \prod_{a=0}^{n} \Bigg[d{\textbf {z}}^a \prod_{r=1}^\Gamma \prod_{\mu\in r}^{\alpha N/\Gamma} P_{\text{out}}(y_\mu| z_\mu^a)\Bigg]\Bigg]. \label{eq:g_def} \end{align} Now we perform a saddle point estimation. This requires to take the limit $N\to \infty$ limit before letting $n\to 0$, and we assume without justification that the final result does not depend on the order of limits $n$ and $N$. This gives for the free energy, using (\ref{eq:replicatrick}) \begin{align} {F}_{\text{co}} =-\lim_{n\to 0} \frac{\partial}{\partial n} \underset{\{q_c\}}{{\rm extr}} \Big(f(\{{\boldsymbol{q}}_c\}) + g(\{\boldsymbol{q}_c\})\Big) = -\underset{\{q_c\}}{{\rm extr}} \Bigg(\lim_{n\to 0}\frac{\partial f(\{{\boldsymbol{q}}_c\})}{\partial n} + \lim_{n\to 0}\frac{\partial g(\{\boldsymbol{q}_c\})}{\partial n}\Bigg). \label{eq:meanZn_aftersaddle} \end{align} Now the replica symmetric ansatz allows to simplify $g$ since $P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\})$ becomes \begin{align} P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\})=\prod_{r=1}^{\Gamma} \left[(2\pi)^{n+1} {\rm det}(\boldsymbol{\tilde q}_r)\right]^{-\frac{\alpha N}{2\Gamma}} \prod_{\mu \in r}^{\alpha N/\Gamma} e^{-\frac{C_{1,r}}{2} \sum_{a=0}^{n} (z_\mu^a)^2 -\frac{C_{2,r}}{2} \sum_{a=0, b\neq a}^{n,n} z_\mu^a z_\mu^b}, \label{eq:Pza_coupled} \end{align} where $C_{1,r}$ and $C_{2,r}$ depend on $\tilde q_r$ and $\mathbb{E}[s^2]$ as they are obtained from the matrix inversion $\boldsymbol{\tilde{q}}_r^{-1}$. Thanks to the simple structure of $\boldsymbol{\tilde{q}}_r$ under the replica symmetric ansatz, one can easily show that \begin{align} C_{1,r} &= \frac{\mathbb{E}[s^2]+(n-2)\tilde q_r}{\mathbb{E}[s^2](\mathbb{E}[s^2]+(n-2)\tilde q_r)+(1-n)\tilde{q}_r^2} \underset{n\to0}{\to} \frac{\mathbb{E}[s^2] - 2\tilde q_r}{(\mathbb{E}[s^2] - \tilde q_r)^2}, \label{eq:C1}\\ C_{2,r} &= -\frac{\tilde q_r}{\mathbb{E}[s^2](\mathbb{E}[s^2]+(n-2)\tilde q_r)+(1-n)\tilde{q}_r^2} \underset{n\to0}{\to} -\frac{\tilde q_r}{(\mathbb{E}[s^2] - \tilde q_r)^2}. \label{eq:C2} \end{align} The replicated variables $\{{\textbf {z}}^a\}$ are correlated through $P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\})$. In order to simplify $g$, we decorrelate them by linearizing the exponent of $P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\})$ using the Gaussian transformation formula for a given $K>0$ \begin{align} e^{\frac{K}{2} \sum_{a=0, b\neq a}^{n,n} z_\mu^a z_\mu^b} = \int \mathcal{D}\xi_\mu \, e^{\xi_\mu\sqrt{K} \sum_{a=0}^{n} z_\mu^a -\frac{K}{2} \sum_{a=0}^{n} (z_\mu^a)^2}, \label{eq:stroto} \end{align} i.e. the previously correlated $\{z_\mu^a, a\in\{0,\dots,n\}\}$ are now i.i.d. Gaussian variables, but that all interact with a common random Gaussian effective field $\xi_\mu$. Using this with $K=-C_{2,r}$ as we know that $C_{2,r}\le 0$, the integration in $g$ can now be performed starting from (\ref{eq:g_def}) \begin{align} g(\{\boldsymbol{q}_c\}) &= \frac{1}{N}\ln\Bigg[\prod_{r=1}^\Gamma \prod_{\mu\in r}^{\alpha N/\Gamma} \int \mathcal{D}\xi_\mu dy_\mu \Bigg(\int dz_\mu \mathcal{N}\Big(z_\mu\Big|m(\xi_\mu,\tilde q_r),V(\mathbb{E}[s^2], \tilde q_r)\Big) P_{\text{out}}(y_\mu| z_\mu)\Bigg)^{n+1}\Bigg] \\ &= \frac{1}{\Gamma}\sum_{r=1}^\Gamma \alpha \ln\Bigg[\int \mathcal{D}\xi dy \Bigg(\int dz \, \mathcal{N}\Big(z\Big|m(\xi,\tilde q_r),V(\mathbb{E}[s^2], \tilde q_r)\Big) P_{\text{out}}(y|z)\Bigg)^{n+1}\Bigg]\\ &= \frac{1}{\Gamma}\sum_{r=1}^\Gamma \alpha \ln\Bigg[\int \mathcal{D}\xi dy \Bigg(\int \mathcal{D}z \, P_{\text{out}}\Big(y\Big| m(\xi,\tilde q_r) + z\sqrt{V(\mathbb{E}[s^2], \tilde q_r)}\Big)\Bigg)^{n+1}\Bigg]. \end{align} As assumed, $g$ does no depend on $N$. Let us compute $m(\xi_\mu , \tilde q_r), V(\mathbb{E}[s^2], \tilde q_r)$. Combining (\ref{eq:Pza_coupled}) with (\ref{eq:stroto}), we get that for a $\mu \in r$ and up to a normalization, $z_\mu \sim \exp(-z_\mu^2 (C_{1,r} - C_{2,r})/2 + z_\mu \xi_\mu \sqrt{-C_{2,r}})$ which becomes using the $n\to 0$ limit of (\ref{eq:C1}), (\ref{eq:C2}) $z_\mu \sim \mathcal{N}(z_\mu|\xi_\mu \sqrt{\tilde q_r}, \mathbb{E}[s^2] - \tilde q_r) \exp(\xi_\mu ^2 \tilde q_r / [2(\mathbb{E}[s^2] - \tilde q_r)])$. Normalizing $P(z_\mu)$, the term $\exp(\xi_\mu ^2 \tilde q_r / [2(\mathbb{E}[s^2] - \tilde q_r)])$ disappears being independent of $z_\mu$ and thus $P(z_\mu) = \mathcal{N}(z_\mu|\xi_\mu \sqrt{\tilde q_r}, \mathbb{E}[s^2] - \tilde q_r)$. Thus $m(\xi_\mu, \tilde q_r) = \xi_\mu \sqrt{\tilde q_r}$, $V(\mathbb{E}[s^2], \tilde q_r) = \mathbb{E}[s^2] - \tilde q_r$. Now performing the $\lim_{n\to 0}\partial_n$ operation and using the identity \begin{align} \lim_{n\to 0} \frac{\partial}{\partial n} \ln\left[\int du X(u)^{n+1} \right] = \frac{\int du X(u)\ln(X(u))}{\int dv X(v)}, \label{eq:identity_logxnp1} \end{align} we directly obtain \begin{align} \lim_{n\to 0}\frac{\partial g(\{\boldsymbol{q}_c\})}{\partial n} = &\sum_{r=1}^\Gamma \frac{\alpha }{\Gamma} \int \mathcal{D}\xi dy \mathcal{D}\hat z \, P_{\text{out}}\Big(y\Big|\xi\sqrt{\tilde q_r} + \hat z \sqrt{\mathbb{E}[s^2]- \tilde q_r}\Big) \ln\left[ \int \mathcal{D}z \, P_{\text{out}}\Big(y\Big| \xi\sqrt{\tilde q_r} + z \sqrt{\mathbb{E}[s^2]- \tilde q_r}\Big) \right], \label{g_sipmlified} \end{align} where we used the normalization $\int dydu \, P_{\text{out}}(y|u) \mathcal{N}(u|a,b)=1$, such that the denominator in (\ref{eq:identity_logxnp1}) sums to one. Let us now deal with $f(\{{\boldsymbol{q}}_c\})$. We will use the following representation of the delta function $\delta(x)=\int_{\mathbb{R}} d\hat q \exp(2i\pi \hat q x) \Leftrightarrow \delta(x/(2i\pi))=\int_{\mathbb{R}} d\hat q \exp(\hat q x)$ where $\hat q$ can be interpreted as an auxiliary external field.\footnote{We now understand that the presence of the $2i\pi$ in (\ref{eq:PxagivenQc}) is thus just a trick to make the integral real.} We assume the replica symmetric ansatz for the auxillary fields similarly as for the overlap matrix $\hat q_c^{ab} = -\hat q_c \ \forall \ a, b\neq a$. The minus sign is just introduced for convenience. Using again the Gaussian transformation formula, we get \begin{align} f(\{{\boldsymbol{q}}_c\}) &= \frac{1}{N} \ln\Bigg[\prod_{c=1}^{\Gamma} \int d\hat q_c \prod_{a=0}^{n}\prod_{k\in c}^{N/\Gamma} \bigg[p_0(x_k^a) dx_k^a\bigg] e^{- \hat q_c \sum_{a=0,b<a}^{n,n} \big(\frac{N}{\Gamma}{q}_c-\sum_{k\in c}^{N/\Gamma}x_k^a x_k^b\big)} \Bigg] \nonumber\\ &=\frac{1}{N} \sum_{c=1}^\Gamma \ln\Bigg[\int d\hat q_c e^{-\frac{N(n+1)n}{2\Gamma}\hat q_c q_c} \Bigg(\int \prod_{a=0}^n \bigg[dx^a p_0(x^a)\bigg] e^{\frac{\hat q_c}{2} \sum_{a=0,b\neq a}^{n,n} x^a x^b} \Bigg)^{\frac{N}{\Gamma} } \Bigg]\nonumber\\ &=\frac{1}{N} \sum_{c=1}^\Gamma \ln\Bigg[\int d\hat q_c e^{-\frac{N(n+1)n}{2\Gamma}\hat q_c q_c} \Bigg( \int \mathcal{D}\xi \prod_{a=0}^n \bigg[dx^a p_0(x^a)\bigg] e^{-\frac{\hat q_c}{2}\sum_{a=0}^n (x^a)^2+ \xi \sqrt{\hat q_c} \sum_{a=0}^n x^a} \Bigg)^{\frac{N}{\Gamma} }\Bigg]\nonumber\\ &=\frac{1}{\Gamma} \sum_{c=1}^\Gamma \underset{\hat q_c}{{\rm extr}}\Bigg(-\frac{(n+1)n}{2}\hat q_c q_c + \ln\Bigg[\int \mathcal{D}\xi\Bigg( \int dx p_0(x) e^{-\frac{\hat q_c}{2} x^2+ \xi \sqrt{\hat q_c} x } \Bigg)^{n+1} \Bigg] \Bigg), \end{align} where we have assumed that we can treat $\hat q_c$ as a positive variable for the Gaussian transformation transform. This will be verified a posteriori at the end of the computation. The saddle point method employed for the estimation of the integral over the auxiliary fields is justified similarly as before, as the $N\to \infty$ as already been assumed. Finally, using again (\ref{eq:identity_logxnp1}), we obtain \begin{align} \lim_{n\to 0} \frac{\partial f(\{{\boldsymbol{q}}_c\})}{\partial n} = \frac{1}{\Gamma} \sum_{c=1}^\Gamma \underset{\hat q_c}{{\rm extr}}\Bigg(-\frac{\hat q_c q_c }{2} + \int \mathcal{D}\xi ds p_0(s) e^{-\frac{\hat q_c}{2} s^2+ \xi \sqrt{\hat q_c} s} \ln\Bigg[ \int dx p_0(x) e^{-\frac{\hat q_c}{2} x^2+ \xi \sqrt{\hat q_c} x } \Bigg] \Bigg). \label{eq:f_beforelastsimpl} \end{align} Using (\ref{eq:meanZn_aftersaddle}), (\ref{g_sipmlified}) and this last expression, we get a first version of the replica formula for the free energy \begin{align} \Gamma {F}_{\text{co}} = \underset{\{q_c, \hat q_c\}}{{\rm extr}} \Bigg\{&-\sum_{r=1}^\Gamma \alpha \int \mathcal{D}\xi dy \mathcal{D}\hat z \, P_{\text{out}}\Big(y\Big|\xi\sqrt{\tilde q_r} + \hat z \sqrt{\mathbb{E}[s^2]- \tilde q_r}\Big) \ln\Bigg[ \int \mathcal{D}z \, P_{\text{out}}\Big(y\Big| \xi\sqrt{\tilde q_r} + z \sqrt{\mathbb{E}[s^2]- \tilde q_r}\Big) \Bigg] \nonumber \\&+ \sum_{c=1}^\Gamma \Bigg(\frac{\hat q_c q_c }{2} - \int \mathcal{D}\xi ds p_0(s) e^{-\frac{\hat q_c}{2} s^2 + \xi \sqrt{\hat q_c} s} \ln\Bigg[ \int dx p_0(x) e^{-\frac{\hat q_c}{2} x^2+ \xi \sqrt{\hat q_c} x } \Bigg] \Bigg)\Bigg\}. \label{extrem} \end{align} Recall that in this expression $\tilde q_r =\sum_{c=1}^\Gamma J_{r,c} q_c$. To make contact with the potential function introduced in this paper we still have to partially solve the extremization problem and reduce \eqref{extrem} to a variational problem over one variable. Differentiating the function of $\{q_c, \hat q_c\}$ in \eqref{extrem} with respect to $q_c$ and setting the derivative to zero we find \begin{align}\label{eq:SE_derivation_1} \hat q_c = 2 \sum_{r=1}^\Gamma J_{r,c} \alpha \, \partial_{\tilde q_r} \Bigg( \int dy \mathcal{D}t f (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) \ln\left[ f(y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) \right]\Bigg), \end{align} where \begin{align}\label{eq:f_function} f (y|\mu,\sigma^2) \vcentcolon= \int dx \mathcal{N}(x|\mu,\sigma^2) P_{\text{out}} (y | x) = \int \mathcal{D}x P_{\text{out}} (y | x\sigma + \mu ). \end{align} One can show the following identity (this has already been shown and used in Appendix \ref{sec:App_SE}) \begin{align}\label{eq:f_functionIdentity} \partial_{\tilde q_r} f (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) = \frac{e^{\frac{t^2}{2}}}{2\tilde q_r} \, \partial_t \Bigg( e^{-\frac{t^2}{2}} \, \partial_t \Big(f (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r)\Big) \Bigg). \end{align} Hence, (\ref{eq:SE_derivation_1}) can be rewritten as \begin{align}\label{eq:SE_derivation_2} \hat q_c &= 2 \sum_{r=1}^\Gamma J_{r,c} \alpha \int dy \mathcal{D}t \Big(1+ \ln\left[ f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) \right]\Big) \, \partial_{\tilde q_r} f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) \nonumber \\ &= - \sum_{r=1}^\Gamma J_{r,c} \frac{\alpha}{\tilde q_r} \int dy dt \frac{1}{\sqrt{2\pi}} \Big(1+ \ln\left[ f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) \right]\Big) \, \partial_t \Bigg( e^{\frac{-t^2}{2}} \, \partial_t \Big(f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r)\Big) \Bigg) \nonumber \\ &= \sum_{r=1}^\Gamma J_{r,c} \frac{\alpha}{\tilde q_r} \int dy \mathcal{D}t \frac{\Big(\partial_t f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r)\Big)^2}{f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r)} \nonumber \\ & = \sum_{r=1}^\Gamma J_{r,c} \alpha \int dy dp dz \frac{\exp\big(-\frac{p^2}{2\tilde q_r}\big)}{\sqrt{2\pi\tilde q_r }} f (y|p,\mathbb{E}[s^2] - \tilde q_r) \big({\partial_p} \ln f (y|p,\mathbb{E}[s^2] - \tilde q_r)\big)^2 \nonumber\\ & = \sum_{r=1}^\Gamma J_{r,c} \alpha \mathbb{E}_{p\vert \tilde q_r} [\mathcal{F}\big(p|\mathbb{E}(s^2) - \tilde q_r\big)]. \end{align} The final step consists in replacing the stationarity condition \eqref{eq:SE_derivation_2} in \eqref{extrem}. First we remark \begin{align} \sum_{c=1}^\Gamma \frac{\hat q_c q_c }{2} & = \frac{1}{2}\sum_{r=1}^\Gamma \sum_{c=1}^\Gamma J_{r,c}q_c \alpha \mathbb{E}_{p\vert \tilde q_r} [\mathcal{F}\big(p|\mathbb{E}(s^2) - \tilde q_r\big)] \nonumber \\ & = \frac{1}{2}\sum_{r=1}^\Gamma \tilde q_r \alpha \mathbb{E}_{p\vert \tilde q_r} [\mathcal{F}\big(p|\mathbb{E}(s^2) - \tilde q_r\big)] \nonumber \\ & = \frac{1}{2}\sum_{r=1}^\Gamma \tilde q_r \Sigma^{-2}(\mathbb{E}(s^2) - \tilde q_r) \end{align} where in the last line we have set \begin{align} \Sigma^{-2}(\mathbb{E}(s^2) - \tilde q_r) = \alpha \mathbb{E}_{p\vert \tilde q_r} [\mathcal{F}\big(p|\mathbb{E}(s^2) - \tilde q_r\big)]. \end{align} We also set \begin{align} \Sigma_c^{-2}(\{\tilde q_r\}) = \sum_{r=1}^\Gamma J_{r,c} \alpha \mathbb{E}_{p\vert \tilde q_r} [\mathcal{F}\big(p|\mathbb{E}(s^2) - \tilde q_r\big)] \end{align} so that $\hat q_c = \Sigma_c^{-2}(\{\tilde q_r\})$. Then \eqref{extrem} becomes \begin{align} & \underset{\{\tilde{q}_r\}}{{\rm extr}} \Bigg\{-\sum_{r=1}^\Gamma \Bigg(\alpha \int \mathcal{D}\xi dy \mathcal{D}\hat z \, P_{\text{out}}\Big(y\Big|\xi\sqrt{\tilde q_r} + \hat z \sqrt{\mathbb{E}[s^2]- \tilde q_r}\Big) \ln\Bigg[ \int \mathcal{D}z \, P_{\text{out}}\Big(y\Big| \xi\sqrt{\tilde q_r} + z \sqrt{\mathbb{E}[s^2]- \tilde q_r}\Big) \Bigg] \nonumber \\& + \frac{1}{2}\tilde q_r\Sigma^{-2}(\tilde{q}_r)\Bigg) - \sum_{c=1}^\Gamma \Bigg( \int \mathcal{D}\xi ds p_0(s) e^{-\frac{\Sigma_c^{-2}(\{\tilde{q}_r\})}{2} s^2 + \xi \sqrt{\Sigma_c^{-2}(\{\tilde{q}_r\})} s} \ln\Bigg[ \int dx p_0(x) e^{-\frac{\hat q_c}{2} x^2+ \xi \sqrt{\Sigma_c^{-2}(\{\tilde{q}_r\})} x } \Bigg] \Bigg)\Bigg\}. \end{align} The (courageous) reader can now compare with Definitions \eqref{def:pot-coupled} and \eqref{def:pot_underlying}. The sum over $r$ yields an ``internal energy'' contribution $\sum_r U_{\text{un}}(E_r)$ and the sum over $c$ an ``entropic'' contribution $\sum_c S_{\text{un}}(\Sigma_c({\bf E}))$. To adapt the formula to sparse superposition codes one must replace all scalars by $B$-dimensional vectors, replace $E[s^2]\to 1$, $\alpha\to 1/R$ and set $\tilde q_r \to E[s^2] - E_r = 1-E_r$. \section{Large alphabet size analysis and connection with Shannon's capacity} \label{sec:larg_B} We now show, through non-rigorous analytical computations, that as the alphabet size $B$ increases, the potential threshold of SS codes approaches Shannon's capacity $R_{\rm pot}^{\infty}\vcentcolon=\lim_{B\to \infty} R_{\rm pot} = C$ (Fig. \ref{fig:potential_BEC}), and also that $\lim_{B\to \infty}E_{\rm f} = 0$. These are ``static'' or ``information theoretic'' properties of the code independent of the decoding algorithm. Nevertheless this result has an algorithmic consequence. The threshold saturation established in Corollary~\ref{cor:maincorollary} for spatially coupled SS codes suggests that optimal decoding can actually be performed using the GAMP decoder, i.e. $\lim_{B\to \infty} R_{\text{co}} = C$, because $R_{\rm pot} \le R_{\text{co}} \leq C$. \begin{figure}[!t] \centering \includegraphics[draft=false,width=0.38\textwidth, height=162pt, trim={0pt 2 3 0},clip]{./figures/B-vs-R_BEC_Eps01_1.pdf} \caption{The potential threshold v.s the alphabet size $B$ for the BEC with erasure probability $\epsilon = 0.1$.} \label{fig:potential_BEC} \end{figure} The potential of the underlying system contains all the information about $R_{\rm pot}$ and $R_{\text{un}}$. Hence, we proceed by computing the potential in the large $B$ regime, \begin{align} \label{eq:largeBpot_1} \varphi_{\text{un}}(E) \vcentcolon= \lim_{B\to\infty} F_{\text{un}}(E). \end{align} The limit (\ref{eq:largeBpot_1}) was heuristically computed in \cite{BarbierK15,phdBarbier} for the AWGN channel. Extending this computation to the present setting, one obtains \begin{align} \label{eq:largeBpot} \varphi_{\text{un}}(E) = U_{\text{un}}(E) - {\rm max}\Big(0,1 - \frac{1}{2\ln(2)\Sigma^{2}(E)}\Big). \end{align} The extension from the AWGN case is straightforward, the $U_{\text{un}}(E)$ term in $F_{\text{un}}(E)$ is independent of $B$ while the $S_{\text{un}}(\Sigma(E))$ term remains the same. The difference is only in the computation of the effective noise $\Sigma(E)$, which is independent of $B$. We note that \eqref{eq:largeBpot} is not a trivial asymptotic calculation because the ``entropy'' term $S_{\text{un}}(\Sigma(E))$ involves a $B$-dimensional integral (see Definition \ref{def:pot_underlying}). Since $B \rightarrow \infty$, this amounts to compute a ``partition function'' (or equivalently solve a non-linear estimation problem where the signal has one non-zero component). We have not attempted to make this asymptotic computation rigorous but we expect that such computation could be made rigorous using the recent work \cite{BDMK_alerton2016,BMDK_2017,ReevesPfister_isit16,ReevesPfister_trans,pmlr-v75-barbier18a} The analysis of (\ref{eq:largeBpot}) for $E\in[0,1]$ leads to the following \begin{claim}\label{claim:potential} For a fixed rate $R$ and $E\in[0,1]$, the only possible local minima of $\varphi_{\rm {un}}(E)$ are at $E=0$ and $E=1$. Furthermore, for $E^{\prime} \in \big\{ E\in[0,1] \mid 2\ln(2)\Sigma^{2}(E) <1 \big\}$ the minimum is at $E^{\prime} =0$ and for $E^{\prime} \in \big\{ E\in[0,1] \mid 2\ln(2)\Sigma^{2}(E) > 1 \big\}$ the minimum is at $E^{\prime} =1$. \end{claim} Note that this result was rigorously proven for the AWGN channel in \cite{BarbierK15} and then verified for several memoryless channels in \cite{barbierDiaMacris_itw2016}. A fully rigorous analysis of the function $\varphi_{\text{un}}(E)$ would be lengthy; we thus only claim the result here, which is confirmed by numerical analysis. The existence of a minimum at $E=0$ means that the error floor $E_{\rm f}$, if it exists, vanishes as $B$ increases (Fig. \ref{fig:largeB}). Moreover, if $\Sigma^{2}(E) < (2\ln(2))^{-1}\ \forall\ E\in[0,1]$, which corresponds to the region $R<(2\ln(2))^{-1}\mathbb{E}_{p|1} [\mathcal{F}(p|1)]$, then $\varphi_{\text{un}}(E)$ has a unique minimum at $E = 0$. Similarly if $\Sigma^2(E) > (2\ln 2)^{-1}\ \forall\ E\in[0,1]$, corresponding to $R>(2\ln(2))^{-1}\mathbb{E}_{p|0} [\mathcal{F}(p|0)]$, then $\varphi_{\text{un}}(E)$ has a unique minimum at $E=1$. For \emph{intermediate rates} both minima exist. Therefore, we identify the algorithmic GAMP threshold, when $B\to +\infty$, as the smallest rate such that a second minimum appears, \begin{align} R_{\text{un}}^{\infty}\vcentcolon= \lim_{B\to \infty} R_{\text{un}} = \frac{\mathbb{E}_{p|1} [\mathcal{F}(p|1)]}{2\ln(2)} = \frac{\mathcal{F}(0|1)}{2\ln(2)}. \label{Ru} \end{align} \begin{figure}[!t] \centering \includegraphics[draft=false,width=0.38\textwidth, height=165pt, trim={0pt 3 3 0},clip]{./figures/largeB_BSC2.pdf} \centering \includegraphics[draft=false,width=0.38\textwidth, height=163pt, trim={0pt 3 3 0},clip]{./figures/largeB_AWGN2.pdf} \caption{The large alphabet potential $\varphi_{\text{un}}(E)$ (\ref{eq:largeBpot}) as a function of the error parameter $E$ for the BSC (left) and AWGN (right) channels with $\epsilon=0.1$ and ${\rm snr}=10$ respectively. $\varphi_{\text{un}}(E)$ is scaled such that $\varphi_{\text{un}}(0)=0$. For $R$ below the ``asymptotic'' GAMP threshold $R_{\text{un}}^{\infty}$, there is a unique minimum at $E=0$ while just above $R_{\text{un}}^{\infty}$, this minimum coexists with a local one at $E=1$. At the optimal threshold of the code, that coincides with the Shannon capacity, the two minima are equal. Then, for $R>C$ the minimum at $E=1$ becomes the global one, and thus decoding is impossible.} \label{fig:largeB} \end{figure} Recall $R_{\rm pot}$ is defined by the point where $\Delta F_{\text{un}}$ switches sign (Definition \ref{def:potThresh}). Thus $R_{\rm pot}^{\infty}$ can be obtained by equating the two minima of $\varphi_{\text{un}}(E)$. The potential (\ref{eq:largeBpot}) takes the following values at the two minimizers \begin{align*} \varphi_{\text{un}}(0) &= - \frac{1}{R} \mathbb{E}_z\bigg[\int dy\, \phi(y|z,0) \log_2\big(\phi(y|z,0)\big)\bigg], \\ \varphi_{\text{un}}(1) &= - \frac{1}{R} \mathbb{E}_z\bigg[\int dy\, \phi(y|z,1) \log_2\big(\phi(y|z,1)\big)\bigg] -1, \end{align*} where $\phi(y|z,E)$ is given in Definition \ref{def:pot_underlying}. Then, setting $\varphi_{\text{un}}(1) = \varphi_{\text{un}}(0)$ yields \begin{align}\label{eq:large_B} R_{\rm pot}^{\infty}= &- \int \int dz dy \mathcal{N}(z\vert 0, 1) P_{\text{out}}(y|z) \log_2\Big( \int d\tilde{z} \mathcal{N}(\tilde{z}\vert 0, 1) P_{\text{out}}(y|\tilde z)\Big) \nonumber \\ &+ \int \int dz dy \mathcal{N}(z\vert 0, 1) P_{\text{out}}(y|z) \log_2\Big(P_{\text{out}}(y|z)\Big). \end{align} We will now recognize that this expression is the Shannon capacity of $W$ for a proper choice of the map $\pi$. Let $\mathcal{A}$ and $\mathcal{B}$ be the input and output alphabet of $W$ respectively, where $\mathcal{A}, \mathcal{B} \subseteq \mathbb{R}$ have discrete or continuous supports. Call $\mathcal{P}$ the capacity-achieving input distribution associated with $W$. Choose $\pi:\mathbb{R}\to\mathcal{A}$ such that $i)$ $P_{\text{out}}(y|z) = W(y|\pi(z))$ and $ii)$ if $Z\sim\mathcal{N}(0,1)$, then $\pi(Z) \sim \mathcal{P}$. This map converts a standard Gaussian random variable $Z$ onto a channel-input random variable $\pi(Z)=A$ with capacity-achieving distribution $\mathcal{P}(a)$. Recall that $\pi$ can be viewed equivalently as part of the code or of the channel. Now using the relation \begin{align*} \int dz \mathcal{N}(z\vert 0, 1) P_{\text{out}}(y|z) = \int dz \mathcal{N}(z\vert 0, 1) W(y|\pi(z)) = \int da \mathcal{P}(a) W(y|a), \end{align*} (\ref{eq:large_B}) can be expressed equivalently as \begin{align}\label{eq:large_B_symm} R_{\rm pot}^{\infty}= &- \int \int dy da \mathcal{P}(a) W(y|a) \log_2\Big( \int d\tilde a \mathcal{P}(\tilde a) W(y|\tilde a)\Big) \nonumber \\ &+ \int \int dy da \mathcal{P}(a) W(y|a) \log_2\Big(W(y|a)\Big). \end{align} The first term in (\ref{eq:large_B_symm}) is nothing but the Shannon entropy $H(Y)$ of the channel output-distribution. The second term eaquals minus the conditional entropy $H(Y|A)$ of the channel-output distribution given the input $A=\pi(Z)$ with capacity-achieving distribution. Thus, $R_{\rm pot}^{\infty}$ is the Shannon capacity of $W$. Combining this result with Corollary~\ref{cor:maincorollary}, we can argue that spatially coupled SS codes allow to communicate reliably up to Shannon's capacity over any memoryless channel under low complexity GAMP decoding. An essential question remains on how to find the proper map $\pi$ for a given memoryless channel. In the case of discrete input memoryless symmetric channels, Shannon's capacity can be attained by inducing a uniform input distribution $\mathcal{P} = \mathcal{U}_\mathcal{A}$. Let us call $q$ the cardinality of $\mathcal{A}=\{a_1,\dots,a_q\}$. In this case the mapping $\pi$ is simply $\pi(z) = a_i$ if $z\in \, ]z_{(i-1)/q}, z_{i/q}]$, where $z_{i/q}$ is the $i^{th}$ $q$-quantile\footnote{With $z_{i/q} = Q^{-1}(1- {i}/{q})$, where $Q^{-1}(\cdot)$ is the inverse of the Gaussian $Q$-function defined by $Q(x)=\int_{x}^{+\infty} dt\, \frac{e^{-\frac{t^2}{2}}}{\sqrt{2\pi}}$.} of the Gaussian distribution, with $z_{0} = -\infty, z_{1}=\infty$. For asymmetric channels, one can use some standard methods such as Gallager's mapping or more advanced ones \cite{MondelliUrbankeHassani_assymetricChannels} that introduce bias in the channel-input distribution in order to match the capacity-achieving one. We now illustrate these findings for various channels as depicted in Fig.~\ref{fig:capacities} and Fig.~\ref{fig:capacity_Z}. \subsection{AWGN channel} \label{sec:AWGN} We start showing that our results for the AWGN channel \cite{barbierDiaMacris_isit2016} are a special case of the present general framework. No map $\pi$ is required and the Shannon capacity is directly obtained from (\ref{eq:large_B}) because the capacity-achieving input distribution for the AWGN channel is Gaussian. Thus, by replacing $P_{\text{out}}(y|z)=\mathcal{N}(y|z,1/{\rm snr})$ in (\ref{eq:large_B}), one recovers the Shannon capacity $R_{\rm pot}^{\infty} = \frac{1}{2}\log_2(1+{\rm snr})$. Furthermore, from \eqref{Ru} one obtains the following algorithmic threshold as $B \rightarrow \infty$ \begin{equation}\label{eq:Ru_AWGN} R_{\text{un}}^{\infty}=\frac{1}{2\ln(2)(1+\rm {snr}^{-1})}. \end{equation} \subsection{Binary symmetric channel} \label{sec:BSC} The BSC with flip probability\footnote{With a slight abuse of notation, we use $\epsilon$ here as a channel parameter. Not to confuse with $\epsilon$ of Section \ref{sec:proofsketch} (Definition \ref{def:pseudo}).} $\epsilon$ has transition probability $W(y|a) = (1-\epsilon) \delta(y-a) + \epsilon \delta(y+a)$, where $\mathcal{A} = \mathcal{B} = \{-1,1\}$. The proper map is $\pi(z) = {\rm sign}(z)$. For $Z \sim \mathcal{N}(0,1)$, this map induces uniform input distribution $\mathcal{U}_{\mathcal{A}}=1/2$. So by replacing $W$ and $\mathcal{U}_{\mathcal{A}}$ in (\ref{eq:large_B_symm}), or equivalently $P_{\text{out}}(y|z) = (1-\epsilon) \delta(y-\pi(z)) + \epsilon \delta(y+\pi(z))$ into (\ref{eq:large_B}), one obtains the Shannon capacity of the BSC channel $R_{\rm pot}^{\infty} = 1-h_2(\epsilon)$ where $h_2$ is the binary entropy function. Using \eqref{Ru} this map also gives the algorithmic threshold \begin{equation}\label{eq:Ru_BSC} R_{\text{un}}^{\infty}=\frac{(1-2\epsilon)^{2}}{\pi\ln(2)}. \end{equation} \begin{figure}[!t] \centering \includegraphics[draft=false,width=0.38\textwidth, height=160pt, trim={0pt -1.3 3 0},clip]{./figures/BSC_capacity_legend1.pdf} \includegraphics[draft=false,width=0.38\textwidth, height=160pt, trim={0pt 0 1 0},clip]{./figures/AWGN_capacity_legend1.pdf} \caption{The capacities and GAMP thresholds in the infinite alphabet limits for the BSC (left) and AWGN (right) channels.} \label{fig:capacities} \end{figure} \subsection{Binary erasure channel} \label{sec:BEC} Note that the BEC is also symmetric. Therefore, the same mapping $\pi(z) = {\rm sign}(z)$ is used and leads to the Shannon capacity $R_{\rm pot}^{\infty} =1-\epsilon$, where $\epsilon$ is the erasure probability. Moreover, from \eqref{Ru} the algorithmic threshold for the BEC when $B \rightarrow \infty$ is \begin{equation}\label{eq:Ru_BEC} R_{\text{un}}^{\infty}=\frac{1-\epsilon}{\pi\ln(2)}. \end{equation} \subsection{Z channel} \label{sec:Z} The Z channel is the ``most asymmetric'' discrete channel. It has binary input and output $\mathcal{A} = \mathcal{B} = \{-1,1\}$ with transition probability $W(y|a) = \delta(a-1)\delta(y-a) + \delta(a+1)[(1-\epsilon) \delta(y-a) + \epsilon \delta(y+a)]$, where $\epsilon$ is the flip probability of the $-1$ input. The map $\pi(z)={\rm sign}(z)$ leads to the \emph{symmetric capacity} of the Z channel \begin{equation} R_{\rm pot}^{\infty} \big(\frac{1}{2}\big) = C\big(\frac{1}{2}\big) = h_2((1-\epsilon)/2) - h_2(\epsilon)/2, \end{equation} where $C(\frac{1}{2})$ denotes the symmetric capacity, in other words the input-output mutual information when the input is uniformly distributed with $\mathcal{U}_{\mathcal{A}}=1/2$. Under the same map $\pi(z)$, one obtains the following algorithmic threshold in the limit $B\to +\infty$ \begin{equation}\label{eq:Ru_Z_1} R_{\text{un}}^{\infty}\big(\frac{1}{2}\big)=\frac{1-\epsilon}{\pi\ln(2)(1+\epsilon)}. \end{equation} Note that the expression of $R_{\rm pot}^{\infty}(\frac{1}{2})$ differs from Shannon's capacity. However, one can introduce bias in the input distribution and hence match the capacity-achieving one. To do so, the proper map defined in terms of the $Q$-function\footnote{Here $Q(x)=\int_{x}^{+\infty} dt\, \frac{e^{-\frac{t^2}{2}}}{\sqrt{2\pi}}$.} is $\pi(z) = {\rm sign}(z - Q^{-1}(p_1))$, where $p_1$ is the induced input probability of the bit $1$. By optimizing over $p_1$, one can obtain Shannon's capacity of the Z channel \begin{equation} R_{\rm pot}^{\infty} (p_1^{*}) = C(p_1^{*})= h_2((1-p_1^{*})(1-\epsilon)) - (1-p_1^{*})h_2(\epsilon), \end{equation} with \begin{equation} p_1^{*} = 1 - [(1-\epsilon)(1+2^{h_2(\epsilon)/(1-\epsilon)})]^{-1}. \end{equation} Using this optimal map, one obtains the following algorithmic threshold as depicted in Fig. \ref{fig:capacity_Z} \begin{equation}\label{eq:Ru_Z_2} R_{\text{un}}^{\infty} (p_1^{*}) = \frac{(1-\epsilon)\big(e^{-[Q^{-1}(p_1^{*})]^2/2}\big)^{2}}{4 \pi \ln (2)(1-p_1^{*})((1-p_1^{*})\epsilon+p_1^{*})}. \end{equation} \begin{figure}[!t] \centering \includegraphics[draft=false,width=0.38\textwidth, height=160pt, trim={0pt 2 3 0},clip]{./figures/Z_capacity_legend1.pdf} \caption{Capacity and GAMP threshold of the Z channel in the infinite alphabet limits. $C(p_1^{*})$ and $R_{\text{un}}^{\infty}(p_1^{*})$ are the values under capacity-achieving input distribution, whereas $C(\frac{1}{2})$ and $R_{\text{un}}^{\infty}(\frac{1}{2})$ are the values under uniform distribution.} \label{fig:capacity_Z} \end{figure} \section{Bethe free energy of spatially coupled system}\label{sec:App_Bethe} In this appendix, we derive the potential function, or Bethe free energy, of the spatially coupled scalar ($B=1$) system thanks to the heuristic replica method of statistical physics. The spatially coupled matrix is made of $\Gamma \times \Gamma$ blocks, each with $N/\Gamma$ columns and $\alpha_rN/\Gamma$ rows for the blocks part of the $r^{th}$ block-row. The entries inside the block $(r,c)$ are i.i.d. with distribution $\mathcal{N}(0,J_{r,c}/N)$. Furthermore, we enforce the per block-row variance normalization $\sum_{c=1}^{\Gamma} J_{r,c}/\Gamma = 1 \ \forall \ r$. We use the notation ${\textbf {x}}^0$ for the signal and define $z_\mu^a \vcentcolon= \sum_{c=1}^\Gamma \sum_{i\in c}^{N/\Gamma} F_{\mu i}x_i^a$ where the matrix structure is made explicit. We assume the Nishimori condition, i.e. $P_0(x)$ and $P_{\text{out}}(y|z)$ are known and thus used as the assumed model for the signal and the noisy channel, i.e. the assumed generative model $P({\textbf {y}})\propto P_0({\textbf {x}})P_{\text{out}}({\textbf {y}}|{\textbf {x}})$ of the observation ${\textbf {y}}$ is the correct one. Under this condition, many simplifications occur in the replica calculation. \subsection{Replica calculation}\label{sec:App_replica} Under the above conditions, the posterior distribution of a signal ${\textbf {x}}$ is given by the Bayes rule $P({\textbf {x}}|{\textbf {y}}) = Z({\textbf {y}})^{-1}\prod_{i=1}^N P_0(x_i) \prod_{\mu=1}^M P_{\text{out}}(y_\mu|z_\mu)$, where $Z({\textbf {y}})=P({\textbf {y}})$ is the observation dependent normalization, or partition function. The (coupled) Bethe free energy $F_{\text{c}}$ is given, using the replica trick written in three equivalent forms, by \begin{align} -F_{\text{c}} \vcentcolon= \lim_{N\to\infty}\frac{\mathbb{E}[\log(Z({\textbf {y}}))]}{N}= \lim_{N\to\infty}\lim_{n\to 0} \frac{\mathbb{E}[Z({\textbf {y}})^n] -1}{nN} = \lim_{N\to\infty}\lim_{n\to 0} \frac{\partial}{\partial n}\frac{\mathbb{E}[Z({\textbf {y}})^n]}{N} = \lim_{N\to\infty}\lim_{n\to 0} \frac{\partial}{\partial n} \frac{\log(\mathbb{E}[Z({\textbf {y}})^n])}{N}, \label{eq:replicatrick} \end{align} where $\mathbb{E}$ denotes the disorder average, i.e. with respect to the observation ${\textbf {y}}({\textbf {F}})$ that depends on the measurement matrix realization (that will be always implicit). The last identity is the more convenient in the present derivation. We thus need to compute the $n^{th}$ moment of the partition function. For the moment, we consider $n\in\mathbb{N}$ despite that we will let $n\to0$ at the end. We introduce $a$, the index associated with the replicas: indeed $Z({\textbf {y}})^n$ can be interpreted as the partition function of $n$ i.i.d. systems, the replicas, each generated independently from the posterior $P({\textbf {x}}|{\textbf {y}})$ \begin{align} Z({\textbf {y}})^n &= \int \prod_{a=1}^n \left[ d{\textbf {x}}^a \prod_{i=1}^N P_0(x_i^a) \prod_{\mu=1}^M P_{\text{out}}(y_\mu|z_\mu^a)\right],\\ \mathbb{E}[Z({\textbf {y}})^n] &= \mathbb{E}_{{\textbf {F}}} \int d{\textbf {y}} Z({\textbf {y}})^n P({\textbf {y}}) = \mathbb{E}_{{\textbf {F}}} \int d{\textbf {y}} Z({\textbf {y}})^{n+1} = \mathbb{E}_{{\textbf {F}}} \int d{\textbf {y}}\prod_{a=0}^n \[ d{\textbf {x}}^a \prod_{i=1}^N P_0(x_i^a) \prod_{\mu=1}^M P_{\text{out}}(y_\mu|z_\mu^a)\], \label{eq:eval_Znp1} \end{align} where the last equality is implied by the Nishimori condition $P({\textbf {y}}) = Z({\textbf {y}})$. The ${\textbf {F}}$ and ${\textbf {x}}^a$ elements being i.i.d., we can treat $z_\mu^a$ as a Gaussian random variable by the central limit theorem. Let us compute its distribution. As ${\textbf {F}}$ has zero mean, $z_\mu^a$ as well. We now compute its covariance matrix $\boldsymbol{\tilde{q}}_{r_\mu}$ that depends on the block-row index $r_\mu \in \{1:\Gamma\}$ to which the $\mu^{th}$ measurement index belongs. Similarly, $c_i \in \{1,\dots,\Gamma\}$ is the block-column index to which the $i^{th}$ column belongs. Define \begin{align} \tilde q^{ab}_{r_\mu} = \mathbb{E}_{{\textbf {F}}}[z_\mu^a z_\mu^b] = \sum_{c,c'=1}^{\Gamma, \Gamma} \sum_{i\in c, j\in c'}^{N/\Gamma,N/\Gamma} \mathbb{E}_{{\textbf {F}}}[F_{\mu i}F_{\mu j}] x_i^a x_j^b = \sum_{c}^{\Gamma} \frac{J_{r_\mu,c}}{N} \sum_{i\in c}^{N/\Gamma} x_i^a x_i^b, \end{align} where $\mathbb{E}_{{\textbf {F}}}[F_{\mu i} F_{\mu j}] = \delta_{ij} J_{r_\mu,c_i}/N$ in the present spatial coupling construction. We introduce the macroscopic replica overlap matrix, that takes into account the block structure in the signal induced by the matrix structure. The Nishimori condition allows to work with a single overlap matrix with elements \begin{align} {q}^{ab}_c \vcentcolon= \frac{\Gamma}{N} \sum_{i\in c}^{N/\Gamma} x_i^a x_i^b \ \forall \ a, b \in \{0:n\}. \label{eq:def_overlap} \end{align} It allows to identify $\tilde q^{ab}_r = \frac{1}{\Gamma} \sum_{c=1}^{\Gamma} J_{r,c} {q}_c^{ab}$ as a smoothed overlap. We now introduce the replica symmetric ansatz that assumes that the posterior used for the replicas generation has a "simple" structure in the sense that it does not break into different Gibbs states. More formally, in full generality the posterior could be written as a linear combination of Gibbs measures $P({\textbf {x}}|{\textbf {y}}) = \sum_{u} \lambda_u P_u({\textbf {x}}|{\textbf {y}})$ with $\sum_{u}\lambda_u = 1$, such that typical (large) samples generated from different Gibbs measures $P_{u}({\textbf {x}}|{\textbf {y}})$ have an overlap $q_1$, whereas samples generated from the same Gibbs measure have an overlap $q_0$ (i.e. the overlap distribution is non trivial). The replica symmetry says that there actually exists a single $\lambda_u =1$, i.e. a single Gibbs state. It is actually possible to show that in an inference problem which factor graph is locally tree-like or dense and under the Nishimori condition, the replica symmetry is a valid assumption (the replica symmetry breaking phenomenon cannot occur). However, if the Nishimori condition is not verified (i.e. the generative model of the signal does not match the assumed prior and/or the noise channel statistics is unkown), then replica symmetry can happen which complicates a lot the analysis. Under this ansatz, the overlap should not depend on the replica index \begin{align} &q^{ab}_c = q_c \ \forall \ a\neq b, \, q^{aa}_c = Q_c \ \forall \ a \\ \Rightarrow \, &\tilde q^{ab}_r = \tilde q_r =\frac{1}{\Gamma}\sum_{c=1}^\Gamma J_{r,c} q_c \ \forall \ a\neq b, \, \tilde q^{aa}_c = \tilde Q_r = \frac{1}{\Gamma}\sum_{c=1}^\Gamma J_{r,c} Q_c \ \forall \ a. \end{align} The Nishimori condition allows to write that for $N$ large \begin{align} Q_c = \tilde Q_r = \mathbb{E}[s^2] \ \forall \ c, r \in \{1:\Gamma\}, \end{align} where $\mathbb{E}[s^2] = \int ds P_0(s) s^2$ and we used the variance normalization for the first equality. Thus the self overlap $Q_c$ is fixed and the condition (\ref{eq:def_overlap}) for $a=b$ does not need to be enforced as it is verified anyway under the Nishimori condition. In opposite, the cross overlap for $a\neq b$ is unknown and so we must keep $\{q_c\}$ as variables. Let us pause for an instant and give an interpretation of (\ref{eq:eval_Znp1}). The signal ${\textbf {x}}^0$ has been generated from $P_0({\textbf {x}}^0)$ whereas the other replicas are independently drawn from the posterior distribution $P({\textbf {x}}|{\textbf {y}})$ but due to the Nishimori condition, all replicas play an identical role from the computational point of view. The distribution of the replicated variables at fixed overlap matrices $\{{\boldsymbol{q}}_c, c\in\{1:\Gamma\}\}$ are \begin{align} P(\{{\textbf {x}}^a\}|\{{\boldsymbol{q}}_c\})\vcentcolon= \frac{1}{\Xi(\{{\boldsymbol{q}}_c\})} \prod_{a=0}^n\Bigg[\prod_{i=1}^N P_0(x_i^a) \prod_{c=1}^{\Gamma} \prod_{b< a}^n \delta\Bigg(\frac{1}{2i\pi}\Bigg[\frac{N}{\Gamma}{q}_c^{ab} - \sum_{i\in c}^{N/\Gamma}x_i^a x_i^b\Bigg]\Bigg)\Bigg], \label{eq:PxagivenQc} \end{align} where $\Xi(\{{\boldsymbol{q}}_c\})$ is the associated normalization. The role of the $2i\pi$ appearing in the delta function is purely formal and will become clear later on. We plug this expression inside (\ref{eq:eval_Znp1}) to get \begin{align} \mathbb{E}[Z({\textbf {y}})^n] &= \mathbb{E}_{{\textbf {F}}} \int d{\textbf {y}} \prod_{c=1}^{\Gamma} d\boldsymbol{q}_c P(\{{\textbf {x}}^a\}|\{{\boldsymbol{q}}_c\}) \Xi(\{{\boldsymbol{q}}_c\}) \prod_{a=0}^n \Bigg[d{\textbf {x}}^a \prod_{r=1}^\Gamma \prod_{\mu\in r}^{\alpha_rN/\Gamma} P_{\text{out}}(y_\mu| z_\mu^a)\Bigg] \label{eq:before_distz}\\ &= \int \prod_{c=1}^{\Gamma} d\boldsymbol{q}_c \Xi(\{{\boldsymbol{q}}_c\}) \int d{\textbf {y}} P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\}) \prod_{a=0}^n \Bigg[d{\textbf {z}}^a \prod_{r=1}^\Gamma \prod_{\mu\in r}^{\alpha_rN/\Gamma} P_{\text{out}}(y_\mu| z_\mu^a)\Bigg]. \label{eq:F_averaged} \end{align} The second equality is obtained after noticing that the integrand in (\ref{eq:before_distz}) depends on $\{x_i^a\}$ only through $\{z_\mu^a\}$, this allows to replace the measure of the $\{x_i^a\}$ for the measure of the $\{z_\mu^a\}$. As already explained, by the central limit theorem \begin{align} P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\}) &= \prod_{\mu=1}^M \mathcal{N}({\textbf {z}}_\mu|0,\boldsymbol{\tilde{q}}_{r_\mu}) = \prod_{r=1}^{\Gamma} \prod_{\mu \in r}^{\alpha_rN/\Gamma} \mathcal{N}({\textbf {z}}_\mu|0,\boldsymbol{\tilde{q}}_{r}) \nonumber\\ &= \prod_{r=1}^{\Gamma} \left[(2\pi)^{n+1} {\rm det}(\boldsymbol{\tilde q}_r)\right]^{-\frac{\alpha_r N}{2\Gamma}} \prod_{\mu \in r}^{\alpha_rN/\Gamma} e^{-\frac{1}{2} \sum_{a,b=0}^{n,n} z_\mu^a [\boldsymbol{\tilde q}_r^{-1}]_{ab} z_\mu^b}. \end{align} This is a product of multivariate centered Gaussian distributions, where ${\textbf {z}}_\mu \vcentcolon= [z_\mu^a, a\in\{0,\dots,n\}]$, ${\textbf {z}}^a \vcentcolon= [z_\mu^a, \mu\in\{1,\dots,M\}]$. Recall $\boldsymbol{\tilde{q}}_{r}$ is a function of $\{\boldsymbol{{q}}_c\}$. Let us now make appear the disorder-dependent free entropy, a thermodynamic quantity. As such, it is assumed to be self averaging, i.e. to concentrate around its mean which is the one maximizing the partition function. Let \begin{align} \mathbb{E}[Z({\textbf {y}})^n] &= \int \prod_{c=1}^{\Gamma} d\boldsymbol{q}_c \exp\Big[N\Big(f(\{{\boldsymbol{q}}_c\}) + g(\{\boldsymbol{q}_c\})\Big)\Big], \label{eq:meanZn_beforesaddle}\\ f(\{{\boldsymbol{q}}_c\}) &\vcentcolon= \frac{1}{N}\log\Big[\Xi(\{{\boldsymbol{q}}_c\})\Big], \\ g(\{\boldsymbol{q}_c\}) &\vcentcolon= \frac{1}{N}\log\Bigg[\int d{\textbf {y}} P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\}) \prod_{a=0}^{n} \Bigg[d{\textbf {z}}^a \prod_{r=1}^\Gamma \prod_{\mu\in r}^{\alpha_rN/\Gamma} P_{\text{out}}(y_\mu| z_\mu^a)\Bigg]\Bigg]. \label{eq:g_def} \end{align} Now we use the saddle point estimation of (\ref{eq:meanZn_beforesaddle}) to obtain the integral up to sub-exponential corrections, which are assumed to be irrelevant in the thermodynamic limit $N\to\infty$ by the concentration property of thermodynamic quantites. Here it is assumed that $f$ and $g$ are both intensive quantities. The saddle point estimation can only be justified if we assume that we can take the $N\to \infty$ limit before letting $n\to 0$. As such, we assume without jusification that the final result does not depend on the $n$ and $N$ limits order. This gives for the Bethe free energy, using (\ref{eq:replicatrick}) \begin{align} F_{\text{c}} =-\lim_{n\to 0} \frac{\partial}{\partial n} \underset{\{q_c\}}{{\rm extr}} \Big(f(\{{\boldsymbol{q}}_c\}) + g(\{\boldsymbol{q}_c\})\Big) = -\underset{\{q_c\}}{{\rm extr}} \Bigg(\lim_{n\to 0}\frac{\partial f(\{{\boldsymbol{q}}_c\})}{\partial n} + \lim_{n\to 0}\frac{\partial g(\{\boldsymbol{q}_c\})}{\partial n}\Bigg). \label{eq:meanZn_aftersaddle} \end{align} The $N\to\infty$ limit has disappeared performing the saddle point estimation, and one should verify a posteriori that indeed $f,g$ do not depend on $N$. As we will see, the dependence of $f$ and $g$ in the number of replicas will be of the form $h(X(q)^{n+1})$ for some $X(q), h$ with $h$ linear. As we have the useful identity $\lim_{n\to 0} \partial_n h(X^{n+1}) = h(X \log(X) )$ for a linear function $h$ (that will be used for integrations in the next), the $\lim_{n\to 0} \partial_n$ operation commute with the extremization with respect to $q$. Indeed, $\lim_{n\to 0} \partial_n {\rm extr}[h(X(q)^{n+1})] = \lim_{n\to 0} \partial_n h(X(q_*)^{n+1})= h(X(q_*)\log[X(q_*)]) = {\rm extr} [h(X(q) \log[X(q)])]$ $= {\rm extr}[\lim_{n\to 0} \partial_n h(X(q)^{n+1}) ] \ \forall \ n$, where $q_*$ is defined by $\partial_q h(X(q))|_{q_*} = 0 \Leftrightarrow \partial_q X(q)|_{q_*}=0$ and we have used that $\partial_q X(q)|_{q_*}=0 \Rightarrow \partial_q [X(q)\log[X(q)]]|_{q_*}=0$. All this justifies the second equality in (\ref{eq:meanZn_aftersaddle}). Now the replica symmetric ansatz allows to simplify $g$ since $P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\})$ becomes \begin{align} P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\})=\prod_{r=1}^{\Gamma} \left[(2\pi)^{n+1} {\rm det}(\boldsymbol{\tilde q}_r)\right]^{-\frac{\alpha_r N}{2\Gamma}} \prod_{\mu \in r}^{\alpha_rN/\Gamma} e^{-\frac{C_{1,r}}{2} \sum_{a=0}^{n} (z_\mu^a)^2 -\frac{C_{2,r}}{2} \sum_{a=0, b\neq a}^{n,n} z_\mu^a z_\mu^b}, \label{eq:Pza_coupled} \end{align} where $C_{1,r}$ and $C_{2,r}$ depend on $\tilde q_r$ and $\mathbb{E}[s^2]$ as they are obtained from the matrix inversion $\boldsymbol{\tilde{q}}_r^{-1}$. Thanks to the simple structure of $\boldsymbol{\tilde{q}}_r$ under the replica symmetric ansatz, one can easily show that \begin{align} C_{1,r} &= \frac{\mathbb{E}[s^2]+(n-2)\tilde q_r}{\mathbb{E}[s^2](\mathbb{E}[s^2]+(n-2)\tilde q_r)+(1-n)\tilde{q}_r^2} \underset{n\to0}{\to} \frac{\mathbb{E}[s^2] - 2\tilde q_r}{(\mathbb{E}[s^2] - \tilde q_r)^2}, \label{eq:C1}\\ C_{2,r} &= -\frac{\tilde q_r}{\mathbb{E}[s^2](\mathbb{E}[s^2]+(n-2)\tilde q_r)+(1-n)\tilde{q}_r^2} \underset{n\to0}{\to} -\frac{\tilde q_r}{(\mathbb{E}[s^2] - \tilde q_r)^2}. \label{eq:C2} \end{align} We now prove the important property $C_{2,r}\le 0 \ \forall \ n\ge 0$, and this is true whatever the sign of $\tilde q_r$ is. This will be fundamental in the next step. We start assuming that $\tilde q_r\ge 0$ which is actually very natural. Indeed, as we are considering an inference problem (i.e. that is planted), the replicas should positively correlate in the direction of the planted signal at sufficiently low noise level, or be totally uncorrelated at high noise in which case the overlap should asymptotically vanish. Now in order to have $C_{2,r}\le 0$ we need $\mathbb{E}[s^2](\mathbb{E}[s^2]+(n-2)\tilde q_r)+(1-n)\tilde{q}_r^2 \ge 0 \Leftrightarrow n \ge -(\mathbb{E}[s^2]- \tilde q_r)^2/(\tilde q_r \mathbb{E}[s^2] - \tilde q_r^2) \ \forall \ n\ge 0$. This is verified as long as $\tilde q_r \mathbb{E}[s^2] - \tilde q_r^2 \ge 0 \Leftrightarrow \mathbb{E}[s^2] \ge \tilde q_r$ as by assumption $\tilde q_r\ge 0$. This is actually verified by definition of the overlaps: $\mathbb{E}[s^2] \ge q_c$ (that implies $\mathbb{E}[s^2] \ge \tilde q_r$) follows from the fact that a replica cannot be more correlated with another one than with itself or more formally, if $x,y$ are i.i.d. random variables with variance $\Delta$, then $|{\rm Cov}(x,y)| \le \Delta$ (recall the replicas are i.i.d.). The statement under the hypothesis that $\tilde q_r\le 0$ is shown exactly in the same manner, but we end up with the aditionnal condition that $n$ is upper bounded. This makes sense from the previous discussion. The replicas should be asymptotically positively correlated, but they can be negatively correlated by some fluctuation if they are not too many. The replicated variables $\{{\textbf {z}}^a\}$ are correlated through $P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\})$. In order to simplify $g$, we decorrelate them by linearizing the exponent of $P(\{{\textbf {z}}^a\}|\{{\boldsymbol{q}}_c\})$ using the Hubbard-Stratonovich formula for a given $K>0$ \begin{align} e^{\frac{K}{2} \sum_{a=0, b\neq a}^{n,n} z_\mu^a z_\mu^b} = \int \mathcal{D}\xi_\mu \, e^{\xi_\mu\sqrt{K} \sum_{a=0}^{n} z_\mu^a -\frac{K}{2} \sum_{a=0}^{n} (z_\mu^a)^2}, \label{eq:stroto} \end{align} i.e. the previously correlated $\{z_\mu^a, a\in\{0,\dots,n\}\}$ are now i.i.d. Gaussian variables, but that all interact with a common random Gaussian effective field $\xi_\mu$. Using this with $K=-C_{2,r}$ as we know that $C_{2,r}\le 0$, the integration in $g$ can now be performed starting from (\ref{eq:g_def}) \begin{align} g(\{\boldsymbol{q}_c\}) &= \frac{1}{N}\log\Bigg[\prod_{r=1}^\Gamma \prod_{\mu\in r}^{\alpha_rN/\Gamma} \int \mathcal{D}\xi_\mu dy_\mu \Bigg(\int dz_\mu \mathcal{N}\Big(z_\mu\Big|m(\xi_\mu,\tilde q_r),V(\mathbb{E}[s^2], \tilde q_r)\Big) P_{\text{out}}(y_\mu| z_\mu)\Bigg)^{n+1}\Bigg] \\ &= \frac{1}{\Gamma}\sum_{r=1}^\Gamma \alpha_r \log\Bigg[\int \mathcal{D}\xi dy \Bigg(\int dz \, \mathcal{N}\Big(z\Big|m(\xi,\tilde q_r),V(\mathbb{E}[s^2], \tilde q_r)\Big) P_{\text{out}}(y|z)\Bigg)^{n+1}\Bigg]\\ &= \frac{1}{\Gamma}\sum_{r=1}^\Gamma \alpha_r \log\Bigg[\int \mathcal{D}\xi dy \Bigg(\int \mathcal{D}z \, P_{\text{out}}\Big(y\Big| m(\xi,\tilde q_r) + z\sqrt{V(\mathbb{E}[s^2], \tilde q_r)}\Big)\Bigg)^{n+1}\Bigg]. \end{align} As assumed, $g$ does no depend on $N$ (i.e. is intensive). Let us compute $m(\xi_\mu , \tilde q_r), V(\mathbb{E}[s^2], \tilde q_r)$. Combining (\ref{eq:Pza_coupled}) with (\ref{eq:stroto}), we get that for a $\mu \in r$ and up to a normalization, $z_\mu \sim \exp(-z_\mu^2 (C_{1,r} - C_{2,r})/2 + z_\mu \xi_\mu \sqrt{-C_{2,r}})$ which becomes using the $n\to 0$ limit of (\ref{eq:C1}), (\ref{eq:C2}) $z_\mu \sim \mathcal{N}(z_\mu|\xi_\mu \sqrt{\tilde q_r}, \mathbb{E}[s^2] - \tilde q_r) \exp(\xi_\mu ^2 \tilde q_r / [2(\mathbb{E}[s^2] - \tilde q_r)])$. Normalizing $P(z_\mu)$, the term $\exp(\xi_\mu ^2 \tilde q_r / [2(\mathbb{E}[s^2] - \tilde q_r)])$ disappears being independent of $z_\mu$ and thus $P(z_\mu) = \mathcal{N}(z_\mu|\xi_\mu \sqrt{\tilde q_r}, \mathbb{E}[s^2] - \tilde q_r)$ (recall $\mathbb{E}[s^2] \ge \tilde q_r$). Thus $m(\xi_\mu, \tilde q_r) = \xi_\mu \sqrt{\tilde q_r}$, $V(\mathbb{E}[s^2], \tilde q_r) = \mathbb{E}[s^2] - \tilde q_r$. Now performing the $\lim_{n\to 0}\partial_n$ operation and using the identity \begin{align} \lim_{n\to 0} \frac{\partial}{\partial n} \log\left[\int du X(u)^{n+1} \right] = \frac{\int du X(u)\log(X(u))}{\int dv X(v)}, \label{eq:identity_logxnp1} \end{align} we directly obtain \begin{align} \lim_{n\to 0}\frac{\partial g(\{\boldsymbol{q}_c\})}{\partial n} = &\sum_{r=1}^\Gamma \frac{\alpha_r}{\Gamma} \int \mathcal{D}\xi dy \mathcal{D}\hat z \, P_{\text{out}}\Big(y\Big|\xi\sqrt{\tilde q_r} + \hat z \sqrt{\mathbb{E}[s^2]- \tilde q_r}\Big) \log\left[ \int \mathcal{D}z \, P_{\text{out}}\Big(y\Big| \xi\sqrt{\tilde q_r} + z \sqrt{\mathbb{E}[s^2]- \tilde q_r}\Big) \right], \label{g_sipmlified} \end{align} where we used the normalization $\int dydu \, P_{\text{out}}(y|u) \mathcal{N}(u|a,b)=1$, such that the denominator in (\ref{eq:identity_logxnp1}) sums to one. Let us now deal with $f(\{{\boldsymbol{q}}_c\})$. We will use the following representation of the delta function $\delta(x)=\int_{\mathbb{R}} d\hat q \exp(2i\pi \hat q x) \Leftrightarrow \delta(x/(2i\pi))=\int_{\mathbb{R}} d\hat q \exp(\hat q x)$ where $\hat q$ can be interpreted as an auxiliary external field, or a temperature in physical terms. We now understand that the precense of the $2i\pi$ in (\ref{eq:PxagivenQc}) is thus just a trick to make the integral real. We assume the replica symmetric ansatz for the auxillary fields similarly as for the overlap matrix \begin{align} \hat q_c^{ab} = -\hat q_c \ \forall \ a, b\neq a. \end{align} The minus sign is just introduced for convenience. Using again the Hubbard-Stratonovich formula, we get \begin{align} f(\{{\boldsymbol{q}}_c\}) &= \frac{1}{N} \log\Bigg[\prod_{c=1}^{\Gamma} \int d\hat q_c \prod_{a=0}^{n}\prod_{k\in c}^{N/\Gamma} \bigg[P_0(x_k^a) dx_k^a\bigg] e^{- \hat q_c \sum_{a=0,b<a}^{n,n} \big(\frac{N}{\Gamma}{q}_c-\sum_{k\in c}^{N/\Gamma}x_k^a x_k^b\big)} \Bigg] \nonumber\\ &=\frac{1}{N} \sum_{c=1}^\Gamma \log\Bigg[\int d\hat q_c e^{-\frac{N(n+1)n}{2\Gamma}\hat q_c q_c} \Bigg(\int \prod_{a=0}^n \bigg[dx^a P_0(x^a)\bigg] e^{\frac{\hat q_c}{2} \sum_{a=0,b\neq a}^{n,n} x^a x^b} \Bigg)^{\frac{N}{\Gamma} } \Bigg]\nonumber\\ &=\frac{1}{N} \sum_{c=1}^\Gamma \log\Bigg[\int d\hat q_c e^{-\frac{N(n+1)n}{2\Gamma}\hat q_c q_c} \Bigg( \int \mathcal{D}\xi \prod_{a=0}^n \bigg[dx^a P_0(x^a)\bigg] e^{-\frac{\hat q_c}{2}\sum_{a=0}^n (x^a)^2+ \xi \sqrt{\hat q_c} \sum_{a=0}^n x^a} \Bigg)^{\frac{N}{\Gamma} }\Bigg]\nonumber\\ &=\frac{1}{\Gamma} \sum_{c=1}^\Gamma \underset{\hat q_c}{{\rm extr}}\Bigg(-\frac{(n+1)n}{2}\hat q_c q_c + \log\Bigg[\int \mathcal{D}\xi\Bigg( \int dx P_0(x) e^{-\frac{\hat q_c}{2} x^2+ \xi \sqrt{\hat q_c} x } \Bigg)^{n+1} \Bigg] \Bigg), \end{align} where we have assumed that we can treat $\hat q_c$ as a positive variable for the Hubbard-Stratonovich transform. This will be verified a posteriori at the end of the computation. We observe again that this quantity is intensive as it should. The saddle point method employed for the estimation of the integral over the auxiliary fields is justified similarly as before, as the $N\to \infty$ as already been assumed. Finally, using again (\ref{eq:identity_logxnp1}), we obtain \begin{align} \lim_{n\to 0} \frac{\partial f(\{{\boldsymbol{q}}_c\})}{\partial n} = \frac{1}{\Gamma} \sum_{c=1}^\Gamma \underset{\hat q_c}{{\rm extr}}\Bigg(-\frac{\hat q_c q_c }{2} + \int \mathcal{D}\xi ds P_0(s) e^{-\frac{\hat q_c}{2} s^2+ \xi \sqrt{\hat q_c} s} \log\Bigg[ \int dx P_0(x) e^{-\frac{\hat q_c}{2} x^2+ \xi \sqrt{\hat q_c} x } \Bigg] \Bigg). \label{eq:f_beforelastsimpl} \end{align} Using (\ref{eq:meanZn_aftersaddle}), (\ref{g_sipmlified}) and this last expression, we get the coupled Bethe free energy under the Nishimori condition \begin{align} \Gamma F_{\text{c}} = \underset{\{q_c, \hat q_c\}}{{\rm extr}} \Bigg(&-\sum_{r=1}^\Gamma \alpha_r \int \mathcal{D}\xi dy \mathcal{D}\hat z \, P_{\text{out}}\Big(y\Big|\xi\sqrt{\tilde q_r} + \hat z \sqrt{\mathbb{E}[s^2]- \tilde q_r}\Big) \log\Bigg[ \int \mathcal{D}z \, P_{\text{out}}\Big(y\Big| \xi\sqrt{\tilde q_r} + z \sqrt{\mathbb{E}[s^2]- \tilde q_r}\Big) \Bigg] \nonumber \\&+ \sum_{c=1}^\Gamma \Bigg(\frac{\hat q_c q_c }{2} - \int \mathcal{D}\xi ds P_0(s) e^{-\frac{\hat q_c}{2} s^2+ \xi \sqrt{\hat q_c} s} \log\Bigg[ \int dx P_0(x) e^{-\frac{\hat q_c}{2} x^2+ \xi \sqrt{\hat q_c} x } \Bigg] \Bigg)\Bigg). \end{align} \subsection{Fixed point of the state evolution}\label{sec:App_SE} The extremization with respect to the auxiliary fields $q_c$ and $\hat q_c$ yields \begin{align}\label{eq:fields_SE} \begin{cases} q_c &= \mathbb{E}_{s,z}[g_{\rm in}(s,\frac{1}{ \hat q_c})]\\ \tilde q_r &= \sum_{c=1}^{\Gamma} \frac{J_{r,c}}{\Gamma} q_c\\ \hat q_c &= \sum_{r=1}^\Gamma \frac{J_{r,c}}{\Gamma} \alpha_r \mathbb{E}_{p\vert \tilde q_r} [\mathcal{F}\big(p|\mathbb{E}(s^2) - \tilde q_r\big)] \end{cases} \end{align} where $g_{\rm in}$ is the scalar version of the denoiser given in Definition \ref{def:gin}, $z$ is the standard Gaussian, $\mathcal{F}\big(p|\mathbb{E}(s^2) - \tilde q_r\big)$ is the fisher information given in Definition \ref{def:effNoise} and $\mathbb{E}_{p\vert \tilde q_r}$ is w.r.t $\mathcal{N}(p|0,\tilde q_r)$. The solution of $q_c$ given in (\ref{eq:fields_SE}) can be obtained directly by setting $\partial_{\hat q_c }F_{\text{c}}=0$, $\tilde q_r$ is then deduced from $q_c$ by definition. The solution of $\hat q_c$ is a bit more involved, we provide the detailed derivation in the following. Setting $\partial_{\tilde q_r}F_{\text{c}}=0$ yields \begin{align}\label{eq:SE_derivation_1} \hat q_c = 2 \sum_{r=1}^\Gamma \frac{J_{r,c}}{\Gamma} \alpha_r \, \partial_{\tilde q_r} \Bigg( \int dy \mathcal{D}t f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) \log\left[ f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) \right]\Bigg), \end{align} where we used the shorthand notation \begin{align}\label{eq:f_function} f_{\text{out}} (y|\mu,\sigma^2) \vcentcolon= \int dx \mathcal{N}(x|\mu,\sigma^2) P_{\text{out}} (y | x) = \int \mathcal{D}x P_{\text{out}} (y | x\sigma + \mu ). \end{align} One can show the following identity\footnote{We acknowledge Christophe Schülke for pointing this identity out.} \begin{align}\label{eq:f_functionIdentity} \partial_{\tilde q_r} f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) = - \frac{e^{\frac{t^2}{2}}}{2\tilde q_r} \, \partial_t \Bigg( e^{-\frac{t^2}{2}} \, \partial_t \Big(f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r)\Big) \Bigg). \end{align} Hence, (\ref{eq:SE_derivation_1}) can be rewritten as \begin{align}\label{eq:SE_derivation_2} \hat q_c &= 2 \sum_{r=1}^\Gamma \frac{J_{r,c}}{\Gamma} \alpha_r \int dy \mathcal{D}t \Big(1+ \log\left[ f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) \right]\Big) \, \partial_{\tilde q_r} f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) \nonumber \\ &= - \sum_{r=1}^\Gamma \frac{J_{r,c}}{\Gamma} \frac{\alpha_r}{\tilde q_r} \int dy dt \frac{1}{\sqrt{2\pi}} \Big(1+ \log\left[ f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r) \right]\Big) \, \partial_t \Bigg( e^{\frac{-t^2}{2}} \, \partial_t \Big(f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r)\Big) \Bigg) \nonumber \\ &= \sum_{r=1}^\Gamma \frac{J_{r,c}}{\Gamma} \frac{\alpha_r}{\tilde q_r} \int dy \mathcal{D}t \frac{\Big(\partial_t f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r)\Big)^2}{f_{\text{out}} (y|t\sqrt{\tilde q_r},\mathbb{E}[s^2] - \tilde q_r)} \end{align} where a Gaussian integration by part is used in the last equality. Using the change of variable $ p=t \sqrt{\tilde q_r}$, (\ref{eq:SE_derivation_2}) simplifies to \begin{align}\label{eq:SE_derivation_3} \hat q_c &= \sum_{r=1}^\Gamma \frac{J_{r,c}}{\Gamma} \frac{\alpha_r}{\tilde q_r} \int dy \mathcal{D}t \frac{\Big( \int dz \frac{\exp\big(-\frac{(z-t\sqrt{\tilde q_r})^2}{2(\mathbb{E}[s^2] - \tilde q_r)}\big)}{\sqrt{2\pi(\mathbb{E}[s^2] - \tilde q_r)}} \frac{(z-t\sqrt{\tilde q_r})\sqrt{\tilde q_r}}{\mathbb{E}[s^2] - \tilde q_r} P_{\text{out}} (y|z)\Big)^2}{ \int dx \frac{\exp\big(-\frac{(x-t\sqrt{\tilde q_r})^2}{2(\mathbb{E}[s^2] - \tilde q_r)}\big)}{\sqrt{2\pi(\mathbb{E}[s^2] - \tilde q_r)}} P_{\text{out}} (y|x)} \nonumber\\ &= \sum_{r=1}^\Gamma \frac{J_{r,c}}{\Gamma} \alpha_r \int dy dp dz \frac{\exp\big(-\frac{p^2}{2\tilde q_r}\big)}{\sqrt{2\pi\tilde q_r }} \frac{z-p}{\mathbb{E}[s^2] - \tilde q_r} f (y|p,\mathbb{E}[s^2] - \tilde q_r) \partial_p \ln f (y|p,\mathbb{E}[s^2] - \tilde q_r) , \end{align} where the function $f (y|p,\mathbb{E}[s^2] - \tilde q_r)$ is given in Definition \ref{def:effNoise}. Using integration by part and the fact that the expected score function of $p$ is null, equation (\ref{eq:SE_derivation_3}) yields \begin{align} \hat q_c &= - \sum_{r=1}^\Gamma \frac{J_{r,c}}{\Gamma} \alpha_r \int dy dp dz \frac{\exp\big(-\frac{p^2}{2\tilde q_r}\big)}{\sqrt{2\pi\tilde q_r }} f (y|p,\mathbb{E}[s^2] - \tilde q_r) \frac{\partial^2}{\partial_p^2} \ln f (y|p,\mathbb{E}[s^2] - \tilde q_r)\nonumber\\ &= \sum_{r=1}^\Gamma \frac{J_{r,c}}{\Gamma} \alpha_r \int dy dp dz \frac{\exp\big(-\frac{p^2}{2\tilde q_r}\big)}{\sqrt{2\pi\tilde q_r }} f (y|p,\mathbb{E}[s^2] - \tilde q_r) \big({\partial_p} \ln f (y|p,\mathbb{E}[s^2] - \tilde q_r)\big)^2 \nonumber\\ &= \sum_{r=1}^\Gamma \frac{J_{r,c}}{\Gamma} \alpha_r \mathbb{E}_{p\vert \tilde q_r} [\mathcal{F}\big(p|\mathbb{E}(s^2) - \tilde q_r\big)]. \end{align} Note that the average MSE, $E_r$, that appears in the SE (Definition \ref{def:SEc}) is related to $\tilde q_r$ by \begin{equation} E_r = \mathbb{E}(s^2) - \tilde q_r. \end{equation} Hence, the equations in (\ref{eq:fields_SE}) correspond to the SE fixed point solution of the coupled system, which proves Lemma \ref{lemma:fixedpointSE_extPot} in the scalar case. \section{Bounds on the second derivative of the potential function}\label{sec:App_Bound} In this appendix, we provide an upper bound on the second derivative \begin{align} \Big[\frac{\partial^2 F_{\text{co}}}{\partial E_{r}\partial E_{r'}}\Big]_{\hat{\tbf E}} & = \Big[\frac{\partial^2 }{\partial E_{r}\partial E_{r'}}\sum_{r=1}^\Gamma U_{\text{un}}(E_r)\Big]_{\hat{\tbf E}} - \frac{\partial^2 }{\partial E_{r}\partial E_{r'}}\Big[\sum_{c=1}^\Gamma S_{\text{un}}(\Sigma_c({\tbf E}))\Big]_{\hat{\tbf E}} \nonumber \\ & = \delta_{r, r'}\Big[\frac{\partial^2 U_{\text{un}}(E_r)}{\partial E_r^2}\Big]_{\hat{\tbf E}} - \sum_{c=1}^\Gamma \Big[\frac{\partial^2 S_{\text{un}}(\Sigma_c({\tbf E}))}{\partial E_r \partial E_{r^\prime}}\Big]_{\hat{\tbf E}} \label{the-crucial-term-to-bound} \end{align} of the potential function needed in the proof of Lemma \ref{lemma:quadFormBounded}. We first perform the analysis for general memoryless channels satisfying our two Assumptions \ref{continuity-assumption}, \ref{scaling-assumption}. We then briefly show how to improve the estimate in the special case of the AWGN because of the non vanishing error floor. \subsection{General channel}\label{sec:App_Bound_general} \subsubsection*{Energy term} Using relation \eqref{Legendre-relation} of Appendix \ref{sec:App_SE} one obtains for the first derivative of the energy term \begin{align*} \frac{\partial U_{\text{un}}(E_r)}{\partial E_{r}} = -\frac{E_r}{2 \ln 2} \frac{\partial \Sigma^{-2}}{\partial E_r}. \end{align*} Differentiating once more \begin{align*} \frac{\partial^2 U_{\text{un}}(E_r)}{\partial E_{r}^2} = - \frac{1}{2 \ln 2} \frac{\partial \Sigma^{-2}}{\partial E_r} - \frac{E_r}{2 \ln 2} \frac{\partial^2 \Sigma^{-2}}{\partial E_r^2} . \end{align*} Using Assumption \ref{scaling-assumption} we immediately get \begin{align*} \frac{\partial^2 U_{\text{un}}(E_r)}{\partial E_{r}^2} \leq \frac{C}{2 (\ln 2)R E_r^\beta} + \frac{C E_r}{2 (\ln 2) R E_r^\beta}. \end{align*} Now recall that in the proof of Lemma \ref{lemma:quadFormBounded} we have $\hat{E}_r > \bar E_{\rm f} = E_{\rm f} + \epsilon$ where $E_{\rm f}$ is the (true) error floor and $\epsilon > 0$. Therefore \begin{align} \Big[\frac{\partial^2 U_{\text{un}}}{\partial E_{r}^2}\Big]_{\hat{\tbf E}} & \leq \frac{C}{2 (\ln 2)R (E_{\rm f} +\epsilon)^\beta} + \frac{C (E_{\rm f} +\epsilon)}{2 (\ln 2) R (E_{\rm f} + \epsilon)^\beta} \nonumber \\ & \leq \frac{C(2 +\epsilon)}{2 (\ln 2)R (E_{\rm f} +\epsilon)^\beta}. \label{one-piece-of-bound} \end{align} Of course this is the worse possible bound and is valid all the way up to the left boundary of the {\it modified} system. As one moves towards the right of the spatially coupled system one could use bigger values for $E_r$ and tigthen the bound. This however is not needed to prove Lemma \ref{lemma:quadFormBounded} as long as $\epsilon >0$. \subsubsection*{Entropy term} For the second derivative of the ``entropy'' term we first apply the chain rule \begin{align*} \frac{\partial^2 S_{\text{un}}(\Sigma_c({\tbf E}))}{\partial E_{r}\partial E_{r'}} & = \frac{\partial}{\partial E_{r'}} \Big( \frac{\partial S_{\text{un}} }{\partial \Sigma_c^{-2}} \frac{\partial \Sigma_c^{-2}}{\partial E_r} \Big) \nonumber \\ & = \frac{\partial^2 S_{\text{un}} }{\partial (\Sigma_c^{-2})^2} \frac{\partial \Sigma_c^{-2}}{\partial E_r} \frac{\partial \Sigma_c^{-2}}{\partial E_{r'}} + \frac{\partial S_{\text{un}} }{\partial \Sigma_c^{-2}} \frac{\partial^2 \Sigma_c^{-2}}{\partial E_r \partial E_{r'}} \nonumber \\ & = J_{r,c} J_{r',c} \frac{\partial^2 S_{\text{un}} }{\partial (\Sigma_c^{-2})^2} \frac{\partial \Sigma^{-2}}{\partial E_{r}} \frac{\partial \Sigma^{-2}}{\partial E_{r'}} + \delta_{r r^\prime}J_{r,c} \frac{\partial S_{\text{un}} }{\partial \Sigma_c^{-2}} \frac{\partial^2 \Sigma^{-2}}{\partial E_r^2}, \end{align*} where to get the last line we used \begin{align*} \frac{\partial \Sigma_c^{-2}}{\partial E_r} = J_{r,c} \frac{\partial \Sigma^{-2}}{\partial E_r} 1_{c-w\leq r \leq c+w}, \qquad \frac{\partial^2 \Sigma_c^{-2}}{\partial E_r\partial E_{r^\prime}} = \delta_{r r^\prime}J_{r,c} \frac{\partial^2 \Sigma^{-2}}{\partial E_r^2} 1_{c-w \leq r \leq c+w} \end{align*} which follow directly from the definition of $\Sigma_c^{-2}({\bf E})$. Recall that by construction $J_{r,c}/\Gamma \leq ({\bar g}/{\underline g})(2w+1)^{-1}$. Recall also Assumption \ref{scaling-assumption}. We thus have \begin{align} \Big|\frac{\partial^2 S_{\text{un}}(\Sigma_c({\tbf E}))}{\partial E_{r}\partial E_{r'}}\Big| & \leq \frac{\bar g^2}{\underline{g}^2 (2w+1)^2} \Big|\frac{\partial^2 S_{\text{un}} }{\partial (\Sigma_c^{-2})^2} \Big| \Big|\frac{\partial \Sigma^{-2}}{\partial E_{r}}\Big| \Big|\frac{\partial \Sigma^{-2}}{\partial E_{r'}}\Big| 1_{c-w \leq r \leq c+w} 1_{c-w \leq r' \leq c+w} \nonumber \\ & + \frac{\delta_{r r^\prime} \bar g}{\underline{g} (2w+1)} \Big|\frac{\partial S_{\text{un}} }{\partial \Sigma_c^{-2}}\Big| \Big|\frac{\partial^2 \Sigma^{-2}}{\partial E_r^2}\Big| 1_{c-w \leq r \leq c+w} \nonumber \\ & \leq \frac{\bar g^2 C^2}{\underline{g}^2 (2w+1)^2R^2 E_r^\beta E_{r'}^\beta} \Big|\frac{\partial^2 S_{\text{un}} }{\partial (\Sigma_c^{-2})^2} \Big| 1_{c-w \leq r \leq c+w} 1_{c-w \leq r' \leq c+w} \nonumber \\ & + \frac{\delta_{r r^\prime} \bar g C}{\underline{g} (2w+1)R E^\beta} \Big|\frac{\partial S_{\text{un}} }{\partial \Sigma_c^{-2}}\Big| 1_{c-w \leq r \leq c+w} \label{second-derivative} \end{align} The next step is to compute and estimate the partial derivatives of $S_{\text{un}}$ in this expression. Using Definition \ref{def:pot_underlying} we find (this involves differentiating under integral signs which can be justified by the ensuing bounds) \begin{align} \frac{\partial S_{\text{un}} }{\partial \Sigma_c^{-2}} = \sum_{i=2}^B \mathbb{E}_{\textbf{Z}}\Big[ \Big( \frac{(Z_i -Z_1)\Sigma_c}{2\sqrt{\ln 2 \ln B}} -\frac{1}{\ln 2} \Big) \frac{e_{i} }{1+\sum_{j=2}^B e_{j}} \Big] \label{s1} \end{align} \begin{align} \frac{\partial^2 S_{\text{un}} }{\partial (\Sigma_c^{-2})^2} = & (\ln B) \sum_{i=2}^B \mathbb{E}_{\textbf{Z}}\Big[ \Big(\Big( \frac{(Z_i -Z_1)\Sigma_c}{2\sqrt{\ln 2 \ln B}} -\frac{1}{\ln 2} \Big)^2 - \frac{(Z_i -Z_1)\Sigma_c^{3}}{2\sqrt{\ln 2 \ln B}}\Big)\frac{e_{i}}{1+\sum_{j=2}^B e_{j}} \nonumber \\ & - (\ln B)\sum_{i, j=2}^B \Big( \frac{(Z_i -Z_1)\Sigma_c}{2\sqrt{\ln 2 \ln B}} -\frac{1}{\ln 2} \Big) \Big( \frac{(Z_j -Z_1)\Sigma_c}{2\sqrt{\ln 2 \ln B}} -\frac{1}{\ln 2} \Big) \frac{e_{i}e_{j} }{(1+\sum_{j=2}^B e_{j})^2} \Big] \label{s2}, \end{align} Since $e_i\geq 0$ we have for $2\leq i \leq n$ $$ \frac{e_{i}}{1+\sum_{j=2}^B e_{j}} \leq 1 $$ which easily implies the following bounds for \eqref{s1} and \eqref{s2} \begin{align} \Big| \frac{\partial S_{\text{un}} }{\partial \Sigma_c^{-2}} \Big| & \le (B-1) \Big(\frac{\Sigma_c}{\sqrt{\pi \ln 2 \ln B}} + \frac{1}{\ln 2}\Big) \nonumber \\ & \leq C_1(B)+ C_2(B)\Sigma_c \label{cc} \end{align} \begin{align} \Big|\frac{\partial S_{\text{un}} }{\partial \Sigma_c^{-2}}\Big| & \leq (\ln B) (B-1) \Big( \frac{\Sigma^2_{c}}{2 \ln 2 \ln B} + \frac{1}{(\ln 2)^2} + \frac{2 \Sigma_c}{\ln 2 \sqrt{\pi \ln 2 \ln B}} \Big) + (B-1) \frac{\Sigma^3_{c}}{\sqrt{\pi \ln 2 \ln B}} \nonumber \\ & + (\ln B) (B-1)^2 \Big( \frac{(\frac{2\sqrt{3}}{\pi} + \frac{1}{3})\Sigma^2_{c}}{4 \ln 2 \ln B} + \frac{1}{(\ln 2)^2} + \frac{2 \Sigma_c}{\ln 2 \sqrt{\pi \ln 2 \ln B}} \Big) \nonumber \\ & \leq C_3(B) + C_4(B)\Sigma_c + C_5(B)\Sigma_c^2 + C_6(B)\Sigma_c^3. \label{ccc} \end{align} where $C_i(B)$, $i=1, \cdots, 6$ are constants that depend only on $B$. Furthermore from the definition of $\Sigma_c({\bf E})$ and Assumption \ref{continuity-assumption} we remark that $\Sigma_c({\bf E}) \leq \sup_{E\in [0,1]}\Sigma(E)= \Sigma(1)$ so in the bounds \eqref{cc}, \eqref{ccc} we can replace $\Sigma_c$ by $\Sigma(1)$. Then using these two bounds the estimate \eqref{second-derivative} becomes \begin{align*} \Big|\frac{\partial^2 S_{\text{un}}(\Sigma_c({\tbf E}))}{\partial E_{r}\partial E_{r'}}\Big| \leq & \frac{\bar g^2 C^2}{\underline{g}^2 (2w+1)^2R^2 E_r^\beta E_{r'}^\beta} \Big(C_3(B) + C_4(B)\Sigma(1) + C_5(B)\Sigma^2(1) + C_6(B)\Sigma^3(1)\Big) \nonumber \\ & \times 1_{c-w \leq r \leq c+w} 1_{c-w \leq r' \leq c+w} \nonumber \\ & + \frac{\delta_{r r^\prime} \bar g C}{\underline{g} (2w+1)R E_r^\beta} \Big(C_1(B) + C_2(B)\Sigma(1)\Big) 1_{c-w \leq r \leq c+w} \end{align*} Since $$ 1_{c-w \leq r \leq c+w} 1_{c-w \leq r' \leq c+w} \leq 1_{r-w \leq c \leq r+w} 1_{\vert r - r'\vert \leq 2w+1} \quad \text{and}\quad 1_{c-w \leq r \leq c+w} = 1_{r-w \leq c \leq r+w} $$ when we sum over $c$ we get \begin{align*} \sum_{c=1}^\Gamma \frac{\partial^2 S_{\text{un}}(\Sigma_c({\tbf E}))}{\partial E_{r}\partial E_{r'}} \leq & \frac{\bar g^2 C^2}{\underline{g}^2R^2 (2w+1) E_r^\beta E_{r'}^\beta} \Big(C_3(B) + C_4(B)\Sigma(1) + C_5(B)\Sigma^2(1) + C_6(B)\Sigma^3(1)\Big) 1_{\vert r - r' \vert \leq 2w+1} \nonumber \\ & + \frac{\delta_{r r^\prime} \bar g C}{\underline{g}R E_r^\beta} \Big(C_1(B) + C_2(B)\Sigma(1)\Big) \end{align*} Finally using again $\hat E_r \geq \bar E_{\rm f} = E_{\rm f} +\epsilon$ we obtain \begin{align} \Big[\sum_{c=1}^\Gamma \frac{\partial^2 S_{\text{un}}(\Sigma_c({\tbf E}))}{\partial E_{r}\partial E_{r'}}\Big]_{\hat{\tbf E}} \leq & \frac{\bar g^2 C^2}{\underline{g}^2R^2 (2w+1) (E_{\rm f} +\epsilon)^{2\beta}} \nonumber \\ & \times \Big(C_3(B) + C_4(B)\Sigma(1) + C_5(B)\Sigma^2(1) + C_6(B)\Sigma^3(1)\Big) 1_{\vert r - r' \vert \leq 2w+1} \nonumber \\ & + \frac{\delta_{r r^\prime} \bar g C}{\underline{g}R (E_{\rm f} +\epsilon)^\beta} \Big(C_1(B) + C_2(B)\Sigma(1)\Big) \label{second-crucial} \end{align} \subsubsection*{Final bound} Putting \eqref{the-crucial-term-to-bound}, \eqref{one-piece-of-bound} and \eqref{second-crucial} together the triangle inequality implies the important result \begin{align} \Big[\frac{\partial^2 F_{\text{co}}}{\partial E_{r}\partial E_{r'}}\Big]_{\hat{\tbf E}} \leq \delta_{r, r'} \frac{K_1(B, \bar g, \underline g)}{(E_{\rm f} +\epsilon)R} + 1_{\vert r - r' \vert \leq 2w+1} \frac{K_2(B, \bar g, \underline g)}{(E_{\rm f} + \epsilon)^{2\beta}R(2w+1)} \end{align} for some finite positive $K_1(B, \bar g, \underline g)$ and $K_2(B, \bar g, \underline g)$ independent of $w$ and $\Gamma$. \subsection{AWGN Channel} For the AWGN channel we have an explicit expression for the effective noise, $\Sigma(E)^2 = ({\rm snr}^{-1} +E)R$ which implies \begin{align}\label{eq:bound_Sigma} \begin{cases} \Sigma^{2}(E_r) &\le \quad R({\rm snr}^{-1} + 1) \\ \frac{\partial \Sigma^{-2}}{\partial E_r} &\le \quad \frac{\rm{snr}^2}{R} \\ \frac{\partial^2 \Sigma^{-2}}{\partial E_r^{2}} &\le \quad \frac{\rm{snr}^3}{R}. \end{cases} \end{align} Then using these bounds at the appropriate places in the previous analysis we get \begin{align} \Big[\frac{\partial^2 F_{\text{co}}}{\partial E_{r}\partial E_{r'}}\Big]_{\hat{\tbf E}} \leq \delta_{r, r'} K_1^\prime(B, \bar g, \underline g){\rm snr}^2 + 1_{\vert r - r' \vert \leq 2w+1} \frac{K_2^\prime(B, \bar g, \underline g){\rm snr}^4}{2w+1} \end{align} for new constants $K_1^\prime(B, \bar g, \underline g)$, $K_2^\prime(B, \bar g, \underline g)$ (independent of $w$, $\Gamma$). We can see that the qualitative behaviour of the bound when ${\rm snr}\to +\infty$ is the same than in the case of vanishing error floor $E_{\rm f}=0$ and $\epsilon\to 0$. \section{Generalized approximate message-passing algorithm}\label{sec:GAMP} The posterior distribution describing the statistical relationships in the decoding task is given by (in the following discussion ${\textbf {F}}$ denotes a generic coding matrix) \begin{equation}\label{eq:posteriorDistribution} P({\textbf {s}}|{\textbf {y}},{\textbf {F}}) = \frac{\prod_{l = 1}^L p_0({\textbf {s}}_l) \prod_{\mu = 1}^M P_{\text{out}}(y_\mu|[{\textbf {F}}{\textbf {s}}]_\mu)}{\int d{\textbf {s}}\prod_{l = 1}^L p_0({\textbf {s}}_l) \prod_{\mu = 1}^M P_{\text{out}}(y_\mu|[{\textbf {F}}{\textbf {s}}]_\mu)}. \end{equation} In the SS codes setting, the sections of the information word are uniformly distributed over all the possible $B$-dimensional vectors with a single non-zero component equal to 1. Hence, the prior of each section reads \begin{equation} \label{eq:sectionPrior} p_0({\textbf {s}}_l)=\frac{1}{B}\sum_{i=1}^B \delta_{s_{li},1}\prod_{j\neq i}^{B-1} \delta_{s_{lj}, 0}, \end{equation} where $s_{li}$ is the $i^{th}$ component of the $l^{th}$ section (here $i \in \{1,\dots,B\}$ and $l\in \{1,\dots,L\}$). The posterior distribution \eqref{eq:posteriorDistribution} can be represented via a graphical model as shown in the l.h.s of Fig.~\ref{fig:factorGraph}. Therefore, it is natural to consider an iterative message-passing algorithm to perform the decoding. For a dense graphical model Belief Propagation (BP) is computationally prohibitive but can be simplified down to the AMP algorithm which has been successfully used in many applications, mainly in compressed sensing \cite{BayatiMontanari10,DMM09}. The AMP algorithm uses efficient Gaussian (or quadratic) approximations of BP that ``decouple'' the vector-valued estimation problem into a sequence of scalar estimation problems under an \emph{effective Gaussian noise} (r.h.s of Fig.~\ref{fig:factorGraph}). The sum-product version of AMP (originally used to perform MMSE estimation in compressed sensing with AWGN channel) was adapted in \cite{barbier2014replica,BarbierK15} to SS codes by incorporating the structured $B$-dimensional prior distribution (\ref{eq:sectionPrior}). The GAMP algorithm extends the approximations made in AMP to any memoryless channel \cite{rangan2011generalized}. Interestingly, the same Gaussian approximations on a dense graph remain valid under GAMP, even for a non-Gaussian channel, and the only difference appears in the computation of the effective Gaussian noise levels. \begin{figure}[!t] \centering \includegraphics[draft=false,width=.95\textwidth, height = 140pt,trim={5pt 160 5 160},clip]{./figures/FactorGraphBW.pdf} \caption{Left: Factor graph of the underlying ensemble showing the statistical relationships between the $B$-dimensional sections (circles) of the information word ${\textbf {s}}$ given the known prior $p_0({\textbf {s}})$ (plain squares), the coding matrix ${\textbf {F}}$ and the channel observation ${\textbf {y}}$ (colored squares). The BP algorithm estimates ${\textbf {s}}$ via iterative exchange of messages, along edges, between circle-nodes and square-nodes. Right: The GAMP algorithm simplifies the BP operations to a sequence of estimation problems from Gaussian noise. At the $l^{th}$ section, $\hat{\bf r}_l$ is the output of an effective Gaussian channel of zero mean and covariance matrix $\text{diag}(\boldsymbol{\tau}^r_l)$.} \label{fig:factorGraph} \end{figure} The GAMP algorithm was originally introduced to estimate signals with i.i.d components \cite{rangan2011generalized}. In the present context the message components are correlated through $p_0({\textbf {s}}_l)$, therefore we adapt GAMP to cover this vectorial setting. The steps of GAMP are shown in Algorithm \ref{alg:gamp} below. The ``${\circ2}$'' and ``${\circ-1}$'' symbols mean that the square and inverse operations are taken componentwise: $({\bf F}^{\circ2})_{\mu i} = F_{\mu i}^2$ and $({\bf F}^{\circ-1})_{\mu i} = F_{\mu i}^{-1}$. All the derivatives in Algorithm \ref{alg:gamp} are also taken componentwise. The sum-product GAMP algorithm produces a sequence of the estimated posterior mean $\hat{{\textbf {s}}}^{(t)}$ and the corresponding estimated posterior variance ${\boldsymbol{\tau}^s}^{(t)}$. The dimensions of the various estimated vectors $\hat{{\textbf {s}}}, \hat{{\textbf {r}}}, \dots$ and their corresponding variances $\boldsymbol{\tau}^s, \boldsymbol{\tau}^r, \dots$ are given in Algorithm 1. In this generalization to the vectorial setting of SS codes, only steps $12$ and $13$ of Algorithm \ref{alg:gamp} differ from the canonical GAMP algorithm in \cite{rangan2011generalized}. The function $g_\text{in}$ depends on the input prior distibution and it is adapted from \cite{rangan2011generalized} to act on $B$-dimensional vectors. Due to the code construction, $g_{\text{in}}(\hat{{\textbf {r}}}_l,\text{diag}(\boldsymbol{\tau}^r_l))$ can be interpreted as the MMSE estimator, or \emph{denoiser}, of a given $B$-dimensional section ${\textbf {s}}_l$ sent through an effective Gaussian channel of zero mean and covariance matrix $\text{diag}(\boldsymbol{\tau}^r_l)$ where \begin{align} \label{eq:gaussianObs} \hat{{\textbf {r}}}_l = {\textbf {s}}_l + {\boldsymbol{\xi}}, \quad {\boldsymbol{\xi}} \sim \mathcal{N}(\mathbf{0}, \text{diag}(\boldsymbol{\tau}^r_l)). \end{align} \begin{definition}[Denoiser] \label{def:gin} Formally, we define the denoiser acting \emph{sectionwise} on each $B$-dimensional section of the message as follows \begin{align} g_{\text{in}}(\hat{{\textbf {r}}}_l,\text{diag}(\boldsymbol{\tau}^r_l)) \vcentcolon= \mathbb{E}[{\textbf {S}}_l \mid \hat{{\textbf {R}}}_l = \hat{{\textbf {r}}}_l] = \frac{\int d{{\textbf {s}}_l}\, p_0({\textbf {s}}_l) \mathcal{N}(\hat{{\textbf {r}}}_l\vert{\textbf {s}}_l, \text{diag}(\boldsymbol{\tau}^r_l)) {\textbf {s}}_l}{ \int d{{\textbf {s}}_l} \,p_0({\textbf {s}}_l) \mathcal{N}(\hat{{\textbf {r}}}_l\vert{\textbf {s}}_l, \text{diag}(\boldsymbol{\tau}^r_l)) }, \end{align} where ${\textbf {S}}_l \sim p_0({{\textbf {s}}_l})$. Plugging \eqref{eq:sectionPrior} yields the componentwise expression of the denoiser used in the GAMP algorithm for SS codes \begin{align*} [g_{\text{in}}(\hat{{\textbf {r}}}_l,\text{diag}(\boldsymbol{\tau}^r_l))]_i & = \frac{\exp((2\hat{r}_{li}-1)/(2 \tau^r_{li}))}{\sum_{j=1}^{B}\exp((2\hat{r}_{lj}-1)/(2 \tau^r_{lj}))} \nonumber \\ & = \Big[ 1+ \sum_{j\neq i}^B \exp\Big((2\hat{r}_{lj}-1)/(2 \tau^r_{lj}) - (2\hat{r}_{li}-1)/(2 \tau^r_{li}) \Big)\Big]^{-1}, \end{align*} where $i \in \{1,\dots,B\}$. \end{definition} Moreover, the componentwise product $\boldsymbol{\tau}^r_l \circ \frac{\partial}{\partial \hat{\textbf{r}}_l} g_\text{in}$ is the estimate of the posterior variance, which quantifies how "confident" GAMP is in its current iteration, and is given by \begin{align}\label{eq:dgin_gamp} \boldsymbol{\tau}^r_l \circ \frac{\partial}{\partial \hat{\textbf{r}}_l} g_\text{in}(\hat{\textbf{r}}_l, \text{diag}(\boldsymbol{\tau}^r_l)) & \vcentcolon= \text{var}({\textbf {S}}_l \mid \hat{{\textbf {R}}}_l = \hat{{\textbf {r}}}_l) \nonumber \\ & = \mathbb{E}[{\textbf {S}}_l^{\circ2} \mid \hat{{\textbf {R}}}_l = \hat{{\textbf {r}}}_l] - (\mathbb{E}[{\textbf {S}}_l \mid \hat{{\textbf {R}}}_l = \hat{{\textbf {r}}}_l])^{\circ2}, \end{align} where the expectation and the variance are induced from \eqref{eq:gaussianObs}. As the message ${\textbf {s}}$ in SS codes consists of only $0$'s and $1$'s, we have that $\mathbb{E}[{\textbf {S}}_l^{\circ2} \mid \hat{{\textbf {R}}}_l = \hat{{\textbf {r}}}_l] = \mathbb{E}[{\textbf {S}}_l \mid \hat{{\textbf {R}}}_l = \hat{{\textbf {r}}}_l]$. Hence, the calculation of $\text{var}({\textbf {S}}_l \mid \hat{{\textbf {R}}}_l = \hat{{\textbf {r}}}_l)$ is immediate using \eqref{eq:sectionPrior} which yields the following componentwise expression \begin{align*} [\boldsymbol{\tau}^r_l \circ \frac{\partial}{\partial \hat{\textbf{r}}_l} g_\text{in}(\hat{\textbf{r}}_l, \text{diag}(\boldsymbol{\tau}^r_l))]_i =[g_{\text{in}}(\hat{{\textbf {r}}}_l,\text{diag}(\boldsymbol{\tau}^r_l))]_i - ( [g_{\text{in}}(\hat{{\textbf {r}}}_l,\text{diag}(\boldsymbol{\tau}^r_l))]_i)^2. \end{align*} The function $g_\text{out}$ of GAMP (see Algorithm \ref{alg:gamp}) is acting componentwise and depends solely on the physical channel $P_\text{out}$. The general expression of $g_\text{out}$ is given in Appendix \ref{sec:App_GAMP} as well as examples for different communication channels. The function $g_\text{out}$ can be interpreted as a \emph{score function} of the parameter $\hat{p}$ in the distribution of the random variable $Y \sim P_{\text{out}}(y\mid z)$ with $Z \sim \mathcal{N}(\hat{p},\tau^p)$. Note that the functions $g_\text{in}$ and $g_\text{out}$ can be seen heuristically as Gaussian (or quadratic) approximations of the sum-product loopy BP updates used in the MMSE estimation. The detailed interpretation of these functions, as well as that of the various parameters of the GAMP algorithm, is given in \cite{rangan2011generalized}, which we omit here since it is lengthy and beyond the scope of this work. The computational complexity of GAMP is dominated by the $\mathcal{O}(MN) = \mathcal{O}(L^2B\ln(B))$ matrix-vector multiplication. It can be reduced, for practical implementations, by using structured operators such as Fourier and Hadamard matrices \cite{barbierSchulkeKrzakala,BBD_ISIT2017}. Fast Hadamard-based operators constructed as in \cite{barbierSchulkeKrzakala}, with random sub-sampled modes of the full Hadamard operator, allow to achieve a lower $\mathcal{O}(L\ln(B) \ln(BL))$ decoding complexity and strongly reduce the memory need \cite{BarbierK15,condo_practical}. Besides practical advantages, using structured operators can lead to a more robust finite-length performance \cite{barbierSchulkeKrzakala}. However, random operators are mathematically more tractable and easier to analyse. Hence, we restrict ourselves in this work to random operators. \begin{algorithm}[H] \caption{GAMP (${\textbf {y}},{\textbf {F}},B,\rm nIter$)}\label{alg:gamp} \begin{algorithmic}[1] \State $\hat{{\textbf {s}}}^{(0)} \quad \gets \, \, \mathbf{0}_{N,1} \State ${\boldsymbol{\tau}^s}^{(0)} \, \,\gets \, \, (1/B) \mathbf{1}_{N,1}$ \State $\hat{{\textbf {z}}}^{(-1)} \, \,\gets \, \, \mathbf{0}_{M,1}$ \State $t \, \qquad \gets \, \, 0 \While{$t<\rm nIter$} \State ${\boldsymbol{\tau}^p}^{(t)} \quad \, \,\gets \, \, \textbf{F}^{\circ2}{\boldsymbol{\tau}^s}^{(t)} \qquad \in \mathbb{R}^{M} \State ${\hat{\textbf{p}}}^{(t)} \qquad \gets \, \, \textbf{F}\hat{{\textbf {s}}}^{(t)} - {\boldsymbol{\tau}^p}^{(t)} \circ \hat{{\textbf {z}}}^{(t-1)}\qquad \in \mathbb{R}^{M}$ \State $\hat{{\textbf {z}}}^{(t)} \qquad \gets \, \, g_\text{out}(\hat{\textbf{p}}^{(t)}, {\textbf {y}}, {\boldsymbol{\tau}^p}^{(t)}) \qquad \in \mathbb{R}^{M} \State ${\boldsymbol{\tau}^z}^{(t)} \quad \, \,\gets \, \, -\frac{\partial}{\partial \hat{\textbf{p}}^{(t)}} g_\text{out}(\hat{\textbf{p}}^{(t)}, {\textbf {y}}, {\boldsymbol{\tau}^p}^{(t)}) \qquad \in \mathbb{R}^{M}$ \State ${\boldsymbol{\tau}^r}^{(t)} \quad \, \,\gets \, \, {((( {\boldsymbol{\tau}^z}^{(t)})^{\intercal}\textbf{F}^{\circ2})^{\intercal})}^{\circ-1} \qquad \in \mathbb{R}^{N} \State $\hat{\textbf{r}}^{(t)} \qquad \gets \, \, \hat{{\textbf {s}}}^{(t)} + {\boldsymbol{\tau}^r}^{(t)} \circ ((\hat{{\textbf {z}}}^{(t)})^{\intercal}\textbf{F})^{\intercal} \qquad \in \mathbb{R}^{N}$ \State $\hat{{\textbf {s}}}^{(t+1)}\quad \gets \, \, g_\text{in}(\hat{\textbf{r}}^{(t)}, \text{diag}({\boldsymbol{\tau}^r}^{(t)})) \qquad \in \mathbb{R}^{N} \State ${\boldsymbol{\tau}^s}^{(t+1)} \, \,\gets \, \, {\boldsymbol{\tau}^r}^{(t)} \circ \frac{\partial}{\partial \hat{\textbf{r}}^{(t)}} g_\text{in}(\hat{\textbf{r}}^{(t)}, \text{diag}({\boldsymbol{\tau}^r}^{(t)})) \qquad \in \mathbb{R}^{N}$ \State $t \qquad \quad \gets \, \, t+1$ \EndWhile\label{gampwhile} \end{algorithmic} \end{algorithm} Decoding SS codes using iterative message-passing algorithm, such as GAMP, leads asymptotically in $L$ to a sharp \emph{phase transition} below Shannon's capacity. The decoder is therefore blocked at a certain threshold separating the ``decodable'' and ``non-decodable'' regions. Moreover, SS codes under message-passing decoding may exhibit, asymptotically in $L$ and for any fixed alphabet size $B$, a non-negligible \emph{error floor}\footnote{In fact, the existence of an error floor depends on the communication channel being used. For example there is no error floor for the BEC and BSC (or any binary input channel) when $L\to\infty$ and any fixed $B$ (see \cite{BBD_ISIT2017} for a proof in the BEC case) but there is one for the AWGN channel as long as $B$ remains finite.} in the decodable region (similarly to low-density generator-matrix codes \cite{PfisterMacrisBMS}). Whenever the error floor exists, it can be made arbitrarily small by increasing $B$ \cite{barbierSchulkeKrzakala,BarbierK15}. \section{The output function in the GAMP Algorithm}\label{sec:App_GAMP} The GAMP algorithm was introduced for general estimation with random linear mixing in \cite{rangan2011generalized}. The extension to the present context of SS codes with $B$-dimensional prior was given in Section \ref{sec:GAMP} of this paper. On a dense graphical model, an important notion of equivalent AWGN channel is used to simplify the BP messages. This notion is due to the linear mixing and it is independent of the physical channel. The physical channel $P_{\rm out}$ is reflected in the computation of the equivalent AWGN channel's parameter through the function $g_{\rm out}(\textbf{{p}}, \textbf{y}, \boldsymbol{\tau})$. This function is acting componentwise and can be interpreted as a \emph{score function} of the parameter ${p}_i$ associated with the distribution of $Y_i$. The general expression is \begin{align} [g_{\rm out}(\textbf{{p}}, \textbf{y}, \boldsymbol{\tau})]_i & = (\mathbb{E}[{z}_i | {p}_i,{y}_i, {\tau}_i] - {p}_i)/{\tau}_i \nonumber \\ & = \frac{\int dz_i P_{\rm out}(y_i|z_i) \mathcal{N}(z_i| p_i, \tau_i) (z_i- p_i)/\tau_i}{\int dz_i P_{\rm out}(y_i|z_i) \mathcal{N}(z_i| p_i, \tau_i)}, \label{explicitgout} \end{align} where $Z_i\sim\mathcal{N}(p_i,\tau_i)$. This expression is also equal to $\partial_{ p_i} \ln f(y_i| p_i, \tau_i)$ where $f$ is the function occurring in Definition \ref{def:effNoise} of the Fisher information. In Table \ref{table:gout}\footnote{Based on a joint work with Erdem Bıyık \cite{BBD_ISIT2017}.} we give the explicit expressions for various channels as well as their derivatives used in the GAMP algorithm of Section \ref{sec:GAMP} (where $\textrm{snr}$ is the signal-to-noise ratio of the AWGN channel, $\epsilon$ the erasure or flip probability of the BSC, BEC and ZC). The expressions of the Fisher information used in SE of Section \ref{sec:stateandpot} are given as well. These involve the Gaussian error function ${\rm erf}(x) = \frac{\sqrt 2}{\pi}\int_0^x dt\,e^{-t^2}$ and its complement ${\rm erfc}(x)= 1- {\rm erf}(x)$. Note that, for the sake of simplicity, all the expressions for the binary input channels of Table \ref{table:gout} (BSC, BEC and ZC) are given using the map $\pi(z)={\rm sign}(z)$. This map leads to a sub-optimal performance for the asymetric Z channel. The optimal map would require a bias in the input distribution as explained in Section \ref{sec:Z}. \begin{table*}[t] \caption{The expressions for $g_{\rm out}$, $-\frac{\partial}{\partial \textbf{{p}}}g_{\rm out}$ and $\mathcal{F}$.}\label{table:gout} \centering { \vspace*{-5pt} \begin{tabular}{|M{0.95cm}|M{4.2cm}|M{7.95cm}|M{2.60cm}|N} \hline & $[g_{\rm out}(\textbf{{p}},\textbf{y},\boldsymbol{\tau})]_i$ & $[\!-\frac{\partial}{\partial \textbf{{p}}}\!g_{\rm out}(\textbf{{p}}, \textbf{y}, \boldsymbol{\tau})]_i$ & $\mathcal{F}(p|E)$ &\\[5pt] \hline \textbf{General} & $(\mathbb{E}[Z_i | p_i,y_i, \tau_i] \!-\! {p}_i)\!/\!{\tau}_i$ $Y_i\sim P_{\rm out}(\cdot|z_i), Z_i\sim \mathcal{N}(p_i,\tau_i)$ & $({{\tau}_i\!-\! \textrm{Var}[Z_i|p_i,y_i,\tau_i]})\!/\!{\tau}_i^2$ $Y_i\sim P_{\rm out}(\cdot|z_i), Z_i\sim \mathcal{N}(p_i,\tau_i)$ & See Definition \ref{def:effNoise} & \\[8pt] \hline \textbf{AWGNC} & $\frac{{y}_i\!-\!p_i}{{\tau}_i\!+\!1\!/\!\textrm{snr}}$ & $\frac1{{\tau}_i\!+\!1\!/\!\textrm{snr}}$ & $\frac1{1\!/\!\textrm{snr}\!+\!E}$ &\\[8pt] \hline \textbf{BSC} & $\frac{(p_i\!-\!k_i)v^+_i\!+\!(p_i\!+\!k_i)v^-_i}{{\cal Z}_{\textrm{BSC}}\tau_i}\!-\!\frac{p_i}{\tau_i}$ & $\frac1{{\tau}_i}\!-\!\frac{(p_i^2\!+\!{\tau}_i\!-\!k'_i)v^+_i\!+\!(p_i^2\!+\!{\tau}_i\!+\!k'_i)v^-_i}{{\cal Z}_{\textrm{BSC}}{{\tau}_i}^2}\!+\!\big(\![g_{\rm out}\!(\!\textbf{{p}},\!\textbf{y},\!\boldsymbol{\tau}\!)]_i\!+\!\frac{p_i}{{\tau}_i}\!\big)\!^2$ & $\frac{Q'^2(1\!-\!2\epsilon)^2}{(Q\!+\!\epsilon\!-\!2\epsilon Q)(1\!-\!Q\!-\!\epsilon\!+\!2\epsilon Q)}$ &\\[8pt] \hline \textbf{BEC} & $\frac{(p_i\!-\!k_i)h^+_i\!+\!(p_i\!+\!k_i)h^-_i\!+\!2\epsilon\delta({y}_i)p_i}{{\cal Z}_{\textrm{BEC}}\tau_i}\!-\!\frac{p_i}{\tau_i}$ & $\frac1{{\tau}_i}\!-\!\frac{(p_i^2\!+\!{\tau}_i\!-\!k'_i)h^+_i\!+\!(p_i^2\!+\!{\tau}_i\!+\!k'_i)h^-_i\!+\!2\epsilon\delta({y}_i)({\tau}_i\!+\!p_i^2)}{{\cal Z}_{\textrm{BEC}}{{\tau}_i}^2}\!+\!\big(\![g_{\rm out}\!(\!\textbf{{p}},\!\textbf{y},\!\boldsymbol{\tau}\!)]_i\!+\!\frac{p_i}{{\tau}_i}\!\big)\!^2$ & $\frac{Q'^2(1\!-\!\epsilon)}{Q(1\!-\!Q)}$ &\\[8pt] \hline \textbf{ZC} & $\frac{(p_i\!-\!k_i)v^+_i\!+\!(p_i\!+\!k_i)\delta({y}_i\!-\!1)}{{\cal Z}_{\textrm{ZC}}\tau_i}\!-\!\frac{p_i}{\tau_i}$ & $\frac1{{\tau}_i}\!-\!\frac{(p_i^2\!+\!{\tau}_i\!-\!k'_i)v^+_i\!+\!(p_i^2\!+\!{\tau}_i\!+\!k'_i)\delta({y}_i\!-\!1)}{{\cal Z}_{\textrm{ZC}}{{\tau}_i}^2}\!+\!\big(\![g_{\rm out}\!(\!\textbf{{p}},\!\textbf{y},\!\boldsymbol{\tau}\!)]_i\!+\!\frac{p_i}{{\tau}_i}\!\big)\!^2$ & $\frac{Q'^2(1\!-\!\epsilon)^2}{Q\!+\!\epsilon(1\!-\!Q)}\!+\!\frac{Q'^2(1\!-\!\epsilon)}{1\!-\!Q}$ &\\[8pt] \hline \multicolumn{4}{|c|}{$h^+_i\!=\!(1\!\!-\!\!\epsilon)\delta({y}_i\!\!+\!\!1)$,\quad $h^-_i\!=\!(1\!\!-\!\!\epsilon)\delta({y}_i\!\!-\!\!1)$,\quad $v^+_i\!=\!(1\!\!-\!\!\epsilon)\delta({y}_i\!\!+\!\!1)\!\!+\!\!\epsilon\delta({y}_i\!\!-\!\!1)$,\quad $v^-_i\!=\!(1\!\!-\!\!\epsilon)\delta({y}_i\!\!-\!\!1)\!\!+\!\!\epsilon\delta({y}_i\!\!+\!\!1)$,} &\\[8pt] \multicolumn{4}{|c|}{ ${k}_i\!=\!\textrm{exp}\big(\frac{-p_i^2}{2\tau_i}\big)\sqrt{2{{\tau}_i}/\pi}\!\!+\!\!\textrm{erf}\big(\frac{p_i}{\sqrt{2{{\tau}_i}}}\big)p_i$,\quad $k'_i\!=\!{k}_i p_i\!\!+\!\!\textrm{erf}\big(\frac{p_i}{\sqrt{2{{\tau}_i}}}\big){\tau}_i$,\quad $Q \!=\! \frac12 \textrm{erfc}(\frac{\!-\!p}{\sqrt{2E}})$, \quad $Q'\!=\!\textrm{exp}\big(\frac{-p^2}{2E}\big)\big/{\sqrt{2\pi E}}$} &\\[8pt] \multicolumn{4}{|c|}{${\cal Z}_{\textrm{BEC}}\!=\! {\textrm{erfc}\big(\frac{p_i}{\sqrt{2{\tau}_i}}\big)h^+_i\!\!+\!\!\big(1\!\!+\!\!\textrm{erf}\big(\frac{p_i}{\sqrt{2{\tau}_i}}\big)\big)h^-_i\!\!+\!\!2\epsilon\delta({y}_i)}$, ${\cal Z}_{\textrm{ZC}}\!=\!\textrm{erfc}\big(\frac{p_i}{\sqrt{2{\tau}_i}}\big)v^+_i\!\!+\!\!\big(1\!\!+\!\!\textrm{erf}\big(\frac{p_i}{\sqrt{2{\tau}_i}}\big)\big)\delta({y}_i\!\!-\!\!1)$, ${\cal Z}_{\textrm{BSC}}\!=\!\textrm{erfc}\big(\frac{p_i}{\sqrt{2{\tau}_i}}\big)v^+_i\!\!+\!\!\big(1\!\!+\!\!\textrm{erf}\big(\frac{p_i}{\sqrt{2{\tau}_i}}\big)\big)v^-_i$} &\\[8pt] \hline \end{tabular}} \vspace{-10px} \end{table*} \section{Code ensembles}\label{sec:codeens} We first define the underlying and spatially coupled ensembles of SS codes for transmission over a generic memoryless channel. In the rest of the paper a subscript ``$\text{un}$'' indicates a quantity related to the underlying ensemble and a subscript ``$\text{co}$'' a quantity related to the spatially coupled ensemble. The probability law of a Gaussian random variable $X$ with mean $m$ and variance $\sigma^2$ is denoted $X \sim \mathcal{N}(m, \sigma^2)$ and the corresponding probability density function as $\mathcal{N}(x\vert m, \sigma^2)$. \subsection{The underlying ensemble} \label{sec:underlyingEns} In the framework of SS codes, the \emph{information word} or \emph{message} is a vector made of $L$ \emph{sections}, ${\textbf {s}} = [{\textbf {s}}_1, \dots, {\textbf {s}}_L]$. Each section ${\textbf {s}}_l$, $l\in\{1, \dots, L\}$, is a $B$-dimensional vector with a single component equal to $1$ and $B-1$ components equal to $0$. The non-zero component of each section can be set differently especially when schemes with power allocation are considered \cite{JosephB14,barron2012high}. However, we will restrict ourselves to the binary case in this work where spatial coupling is used to achieve capacity instead of power allocation. We call $B$ the \emph{section size} (or alphabet size usually chosen to be a power of 2) and set $N=LB$. The message ${\textbf {s}}$ can be seen as a one-to-one mapping from an original message $\tbf{u} \in \{0,1\}^{L\log_2(B)}$, where the position of the non-zero component in ${\textbf {s}}_l$ is specified by the binary representation of $\tbf{u}_l$ (i.e. ${\textbf {s}}$ is obtained from $\tbf{u}$ using a simple position modulation (PM) scheme). For example if $B=4$ and $L=5$, a valid message is $\tbf s = [0001,0010,1000,0100,0010]$ which corresponds to $\tbf u = [00,01,11,10,01]$ . One can think of the information words as being defined for a $B$-ary alphabet with a constant power allocation for each symbol. We consider random codes generated by a fixed \emph{coding matrix} ${\textbf {F}}\in \mathbb{R}^{M \times N}$ drawn from the ensemble of random matrices with i.i.d real Gaussian entries distributed as $\mathcal{N}(0, 1/L)$. The variance of the coding matrix entries is such that the \emph{codeword} ${\textbf {F}}{\textbf {s}}\in \mathbb{R}^{M}$ has a normalized average power $\mathbb{E}[||{\textbf {F}} {\textbf {s}}||_{2}^{2}]/M = 1$. Note that the cardinality of this code is $B^L$ and the length of the codeword is $M$. Hence, the (design) rate is defined as \begin{equation} \label{eq:designRate} R = \frac{L\log_2 B}{M} = \frac{N\log_2 B}{M B}. \end{equation} The code is thus specified by $(M, R, B)$ where $R$ is the code rate, $M$ the block length, $B$ the section size. \begin{figure}[!t] \centering \includegraphics[draft=false,width=.7\textwidth, height = 175pt]{./figures/blockDiag_encoder_decoder1.pdf} \caption{The encoder/decoder block diagram of the SS codes under GAMP decoding over any memoryless channel $W$. The map $\pi$ is needed when the capacity achieving input distribution of $W$ is not Gaussian. The GAMP algorithm provides soft valued estimate $\hat{{\textbf {s}}}$ of ${\textbf {s}}$ in the MMSE sense. A simple hard decision (HD) mechanism is used to provide the binary decoded message $\bar{{\textbf {s}}}$ by setting the most biased component in each section of $\hat{{\textbf {s}}}$ to $1$ and the others to $0$. The original message $\tbf u$ and its decoded version $\bar{\tbf{u}}$ can be easily recovered from ${\textbf {s}}$ and $\bar{{\textbf {s}}}$ respectively using PM modulator and demodulator as illustrated in Section~\ref{sec:underlyingEns}.} \label{fig:blockDiag} \end{figure} Codewords are transmitted through a known memoryless channel $W$. This requires to map the codeword components $[{\textbf {F}}{\textbf {s}}]_\mu\in \mathbb{R}$, $\mu \in \{1, \dots, M\}$, onto the input alphabet of $W$. We call $\pi$ this map and refer to Section~\ref{sec:larg_B} for various examples. The concatenation of $\pi$ and $W$ can be seen as an \emph{effective memoryless channel} $P_{\text{out}}$, such that \begin{equation} P_{\text{out}}({\textbf {y}}|{\textbf {F}}{\textbf {s}}) = \prod_{\mu = 1}^M P_{\text{out}}(y_\mu|[{\textbf {F}}{\textbf {s}}]_\mu) \vcentcolon= \prod_{\mu = 1}^M W(y_\mu|\pi([{\textbf {F}}{\textbf {s}}]_\mu)). \end{equation} Note that one can look equivalently at $\pi$ as a part of the channel model or as a part of the encoder. In the present framework, it is more convenient to work with the effective memoryless channel from which the receiver obtains the noisy channel observation ${\textbf {y}}$. However in the analysis of Section~\ref{sec:larg_B}, the capacity of $W$ is considered. The decoding task is to recover ${\textbf {s}}$ from channel observations ${\textbf {y}}$ as depicted in Fig.~\ref{fig:blockDiag}. This can be interpreted as a compressed sensing problem with structured sparsity, due to the sectionwise structure of ${\textbf {s}}$, where ${\textbf {y}}$ would be the compressed measurements. The rate $R$ can be linked to the ``measurement rate'' $\alpha$, used in the compressed sensing literature, by \begin{equation} \label{eq:measurementRate} \alpha = \frac{M}{N} = \frac{\log_2 B}{BR}. \end{equation} Thus, the same algorithms and analysis used in compressed sensing theory like the GAMP algorithm and SE can be used in the present context. See \cite{BarbierK15} for more details on this interconnection. \subsection{The spatially coupled ensemble}\label{subsec:SC_SS} \begin{figure}[!t] \centering \includegraphics[draft=false,width=.6\textwidth, height = 140pt]{./figures/seededMat} \caption{A spatially coupled coding matrix ${\textbf {F}}^{\text{co}} \in\mathbb{R}^{M\times N}$ made of $\Gamma\times \Gamma$ blocks indexed by $(r,c)$, each with $N/\Gamma$ columns and $M/\Gamma =\alpha N/\Gamma$ rows where $\alpha= (\log_2B)/BR$. The i.i.d elements in block $(r,c)$ are distributed as $\mathcal{N}(0,J_{r,c}\Gamma/L)$. Away from the boundaries, in addition to the diagonal (in red), there are $w$ forward and $w$ backward coupling blocks. In this example, the design function $g_w$ enforces a stronger backward coupling where the non-uniform variance across blocks is illustrated by the level of shading. Blocks are darker at the boundaries because the variances are larger so as to enforce the \emph{variance normalization} $\sum_{c=1}^\Gamma J_{r,c} = 1 \ \forall \ r$. The yellow shape emphasizes \emph{variance symmetry}.} \label{fig:opSpCoupling} \end{figure} We consider spatially coupled codes based on coding matrices ${\textbf {F}}^{\text{co}} \in \mathbb{R}^{M\times N}$ as depicted in Fig.~\ref{fig:opSpCoupling}. A spatially coupled coding matrix ${\textbf {F}}^{\text{co}}$ is made of $\Gamma\times \Gamma$ \emph{blocks} indexed by $(r,c)$, each with $N/\Gamma$ columns and $M/\Gamma =\alpha N/\Gamma$ rows. The structure of ${\textbf {F}}^{\text{co}}$ induces a natural decomposition of the message into $\Gamma$ blocks, ${\textbf {s}} = [{\textbf {s}}_1, \dots, {\textbf {s}}_\Gamma]$, where each block is made of $L/\Gamma$ sections.\footnote{Of course $N, M, L, \Gamma$ can always be chosen s.t $N/\Gamma, M/\Gamma, L/\Gamma$ are integers.} ${\textbf {F}}^{\text{co}}$ is constructed such that each block is coupled (except at the boundaries) with $w$ forward blocks and $w$ backward blocks, where $w$ is the \emph{coupling window}. The strength of the coupling is specified by the variance $J_{r,c}$ of each block $(r,c)$. The entries inside each block $(r,c)$ of ${\textbf {F}}^{\text{co}}$ are i.i.d. distributed as $\mathcal{N}(0,J_{r,c}\Gamma/L)$.\footnote{In the uncoupled construction the variance scales as the inverse number of sections. In the coupled construction the variances within a block scales as the inverse number of sections within a block.} In order to impose homogeneous power over all the components of ${\textbf {F}}^{\text{co}} {\textbf {s}}$, we tune the (unscaled) block \emph{variances} $J_{r,c}$ such that the following \emph{variance normalization} condition holds for all $r \in \{1, \dots,\Gamma\}$ \begin{equation}\label{eq:varianceNormalization} \sum_{c=1}^{\Gamma}J_{r,c}= 1. \end{equation} This normalization induces homogeneous average power over all codeword components, i.e. $M^{-1}||{\textbf {F}}^{\text{co}} {\textbf {s}}||_{2}^{2} = 1$. There are various ways to construct the variance matrix $J$ of the spatially coupled matrix such that \eqref{eq:varianceNormalization} holds. For instance, one can pick $J_{r,c}$'s such that the coupling strength is uniform over the window. However, we will consider a more general construction in this work by using a \emph{design function} $g_w$. The design function satisfies \begin{equation} \label{eq:designFunction} \begin{cases} g_w(x) = 0 \quad \, \, &\text{if} \quad \,\, |x|>1, \\ \underline{g} \leq g_w(x)\leq \bar{g} \quad &\text{if} \quad\,\, |x| \le 1, \end{cases} \end{equation} where $\bar{g}$, $\underline{g}$ are strictly positive constants independent of $w$. Moreover, $g_w$ is assumed to be Lipschitz continuous on $|x|<1$ with Lipschitz constant $g_*$ independent of $w$. In particular \begin{equation}\label{eq:Lipschitz_g} \big\vert g_w\big(\frac{k}{w}\big) - g_w\big(\frac{k^{\prime}}{w}\big)\big\vert \le \frac{g_*}{w} \vert k - k^{\prime}\vert, \end{equation} for $k, k^{\prime} \in \{-w,\dots,w\}$. Furtheremore, we impose the following normalization \begin{equation} \label{eq:normalization_g} \frac{1}{2w+1}\sum_{k=-w}^{w} g_w(\frac{k}{w}) = 1. \end{equation} The design function is then used to construct the variances such that \eqref{eq:varianceNormalization} and \eqref{eq:normalization_g} are satisfied. Hence, we choose \begin{equation} \label{eq:blockVariance} J_{r,c} = \gamma_r \frac{g_w((c-r)/w)}{2w+1} = \frac{g_w((c-r)/w)/(2w+1)}{\sum_{c=1}^\Gamma g_w((c-r)/w)/(2w+1)}, \end{equation} where $\gamma_r$ is tuned to enforce \eqref{eq:varianceNormalization}. Note that, away from the boundaries, $\gamma_r$ is a trivial term equal to $1$. However, $\gamma_r$ changes at the boundaries to compensate for the lower number of blocks being coupled (see Fig.~\ref{fig:opSpCoupling} where darker colors were used at the boundaries to stress on this point). The following remarks will be used in the analysis. We always have $1\leq \gamma_r \leq \underline{g}^{-1}$ and \begin{equation}\label{useful-small-bound} J_{r,c} \leq ({\bar g}/{\underline g})(2w+1)^{-1}. \end{equation} In the bulk (i.e. away from the boundaries), the following \emph{variance symmetry} property holds for $k\in \{2w+1, \dots,\Gamma-2w\}$ \begin{equation} \label{eq:varianceSymmetry} \sum_{r=1}^\Gamma J_{r,k}=\sum_{c=1}^\Gamma J_{k,c}=1. \end{equation} The ensemble of spatially coupled matrices is then parametrized by $(M,R,B,\Gamma,w,g_w)$. Note that the coupling induced by $g_w$ is not necessarily symmetric, hence the present construction generalizes the ones in \cite{YedlaJian12,6887298,7115123} which all require $g_w(-x)=g_w(x)$, while we do not. This relaxation may strongly improve the perfomances in practice \cite{CaltagironeZ14}. One key element of spatially coupled codes is the \emph{seed} introduced at the boundaries. We assume the sections in the first $4w$ and last $4w$ blocks of the message ${\tbf s}$ to be known by the decoder (the choice of $4w$ blocks is convenient for the proofs and will become clear in Section \ref{sec:proofsketch}). This boundary condition can be interpreted as perfect side information that propagates inwards and boosts the performance. Note that one could also impose the seed differently by constructing a coding matrix with lower communication rate (higher measurement rate) at the boundaries \cite{barbierSchulkeKrzakala,BarbierK15,KrzakalaMezard12,CaltagironeZ14,Montanari-Javanmard}. The seed induces a rate loss in the \emph{effective rate} of the code \begin{equation} \label{eq:effectiverate} R_{\text{eff}} = R \Big(1-\frac{8w}{\Gamma}\Big). \end{equation} However, this loss vanishes as $L \rightarrow \infty$ and then $\Gamma \rightarrow \infty$ for any fixed $R$. As already mentioned, in addition to lower decoding error, the main advantage of coupled SS codes w.r.t power allocated ones is that they allow communication at high rate with a small section size $B$, while power allocated codes require a much larger $B$, which prevents communication of messages of practically relevant sizes \cite{BarbierK15}. Recently, the power allocated SS codes have been optimized in order to achieve better finite size performance \cite{Greig18}. \section{State evolution and potential function}\label{sec:App_SE} In this appendix we prove Lemma \ref{lemma:fixedpointSE_extPot}. Namely, we show that the stationarity condition $\partial F_{\text{un}}/\partial E =0$ for the potential function in Definition \ref{def:pot_underlying} implies the state evolution equation in Definition \ref{def:SE}. We present a detailed derivation for the underlying uncoupled system. The proof of Lemma \ref{lemma:fixedpointSE_extPot} for the coupled system follows exactly the same steps. The calculation is best done by looking at $F_{\text{un}}$ as a function of $E$ and $\Sigma(E)^{-2}$, so that \begin{align} \frac{d F_{\text{un}}}{d E} = & - \frac{1}{2\ln(2) \Sigma(E)^2 } - \frac{1}{R} \frac{\partial}{\partial E} \mathbb{E}_Z\Big[\int dy\, \phi(y|Z,E) \log_2 \phi(y|Z,E)\Big] \nonumber \\ & - \Big\{\frac{E}{2\ln(2)} + \frac{\partial}{\partial \Sigma(E)^{-2}} \mathbb{E}_{{\textbf {S}},{\textbf {Z}}}\Big[\log_B\int d^B{{\textbf {x}}} \,p_0({\textbf {x}}) \theta({\textbf {x}},{\textbf {S}},\mathbf{Z},\Sigma(E))\Big] \Big\} \frac{d}{dE}\Sigma(E)^{-2}. \label{derivativeF} \end{align} We first look at the derivative of the bracket $\{\cdots\}$ with respect to $\Sigma^{-2}$. In the next few lines the following notation is used for the ``Gibbs'' average \begin{align*} \langle A({\textbf {x}})\rangle_{\rm den} = \frac{ \int d^B{{\textbf {x}}} \,A({\textbf {x}}) p_0({\textbf {x}}) \theta({\textbf {x}},{\textbf {S}},\mathbf{Z},\Sigma(E)) }{\int d^B{{\textbf {x}}} \,p_0({\textbf {x}}) \theta({\textbf {x}},{\textbf {S}},\mathbf{Z},\Sigma(E)) }. \end{align*} Using the explicit expression of $\theta({\textbf {x}},{\textbf {S}},\mathbf{Z},\Sigma(E))$ we have \begin{align*} \frac{\partial}{\partial \Sigma(E)^{-2}} & \mathbb{E}_{{\textbf {S}},{\textbf {Z}}}\Big[\log_B\int d^B{{\textbf {x}}} \,p_0({\textbf {x}}) \theta({\textbf {x}},{\textbf {S}},\mathbf{Z},\Sigma(E))\Big] \nonumber \\ & = \frac{\partial}{\partial \Sigma(E)^{-2}} \mathbb{E}_{{\textbf {S}},{\textbf {Z}}}\Big[\log_B\int d^B{{\textbf {x}}} \,p_0({\textbf {x}}) e^{-\frac{1}{2}\big(\Vert{\textbf {x}} - {\textbf {S}}\Vert^2\Sigma(E)^{-2}\frac{\ln B}{\ln 2} - 2 {\textbf {Z}}\cdot({\textbf {x}} -{\textbf {S}})\Sigma(E)^{-1}\sqrt{\frac{\ln B}{\ln 2}} + \Vert Z\Vert^2\big)} \Big] \nonumber \\ & = - \frac{1}{2\ln 2} \mathbb{E}_{{\textbf {S}},{\textbf {Z}}}\Big[\langle \Vert{\textbf {x}} - {\textbf {S}}\Vert^2\rangle_{\text{den}}\Big] + \frac{1}{2}\mathbb{E}_{{\textbf {S}}, {\textbf {Z}}} \Big[{\textbf {z}} \cdot \langle {\textbf {x}} - {\textbf {S}}\rangle_{\text{den}}\Big] \frac{\Sigma(E)}{\sqrt{(\ln B)(\ln 2)} } \nonumber \\ & = - \frac{1}{2\ln 2} \mathbb{E}_{{\textbf {S}},{\textbf {Z}}}\Big[\langle \Vert{\textbf {x}} - {\textbf {S}}\Vert^2\rangle_{\text{den}}\Big] + \frac{1}{2}\mathbb{E}_{{\textbf {S}}, {\textbf {Z}}} \Big[\nabla_{{\textbf {Z}}} \cdot \langle {\textbf {x}} - {\textbf {S}}\rangle_{\text{den}}\Big] \frac{\Sigma(E)}{\sqrt{(\ln B)(\ln 2)} } \nonumber \\ & = - \frac{1}{2\ln 2} \mathbb{E}_{{\textbf {S}},{\textbf {Z}}}\Big[\langle \Vert{\textbf {x}} - {\textbf {S}}\Vert^2\rangle_{\text{den}}\Big] + \frac{1}{2\ln 2}\mathbb{E}_{{\textbf {S}}, {\textbf {Z}}} \Big[\langle \Vert{\textbf {x}} - {\textbf {S}}\Vert^2\rangle_{\text{den}}\Big] - \frac{1}{2\ln 2}\mathbb{E}_{{\textbf {S}}, {\textbf {Z}}} \Big[\Vert\langle {\textbf {x}} - {\textbf {S}}\rangle_{\text{den}}\Vert^2\Big] \nonumber \\ & = - \frac{1}{2\ln 2}\mathbb{E}_{{\textbf {S}}, {\textbf {Z}}} \Big[\Vert\langle {\textbf {x}}\rangle_{\text{den}} - {\textbf {S}} \Vert^2\Big] \nonumber \\ & = - \frac{1}{2\ln 2}\text{mmse}(\Sigma(E)). \end{align*} We show below that \begin{align}\label{Legendre-relation} \frac{1}{\Sigma(E)^2 } = - \frac{2}{R} \frac{\partial}{\partial E} \mathbb{E}_Z\Big[\int dy\, \phi(y|Z,E) \ln \phi(y|Z,E)\Big] \end{align} so that \eqref{derivativeF} becomes \begin{align}\label{integrating-factor-relation} \frac{d F_{\text{un}}}{d E} = \Big\{\text{mmse}(\Sigma(E)) - E\Big\} \frac{1}{2\ln 2}\frac{d}{dE}\Sigma(E)^{-2} \end{align} which obviously shows that $d F_{\text{un}}/d E=0$ implies the SE equation $E=T_{\text{un}}(E)$. We point out as a side remark that this is the correct ``integrating factor'' which allows to recover the potential function from the SE equation. It remains to derive \eqref{Legendre-relation}. We will start from the derivative with respect to $E$ in \eqref{Legendre-relation} and show that this relation can be transformed into Definition \ref{def:effNoise}, namely \begin{align}\label{defSigma} \frac{1}{\Sigma(E)^2} = \frac{1}{R}\int dp\, \frac{e^{-\frac{p^2}{2(1-E)}}}{\sqrt{2\pi (1-E)}}\int dy f(y|p,E) (\partial_p \ln f(y|p,E))^2 \end{align} where \begin{align}\label{def-f} f(y|p, E) = \int dx P_{\text{out} }(y|x) \frac{e^{-\frac{(x-p)^2}{2E}}}{\sqrt{2\pi E}}. \end{align} We first note that $\phi(y|z, E) = f(y|z\sqrt{1-E}, E)$ so the derivative w.r.t $E$ on the right hand side of \eqref{Legendre-relation} becomes \begin{align} \frac{\partial}{\partial E} \mathbb{E}_Z\Big[\int dy\, \phi(y|Z,E) \ln \phi(y|Z,E)\Big] & = \frac{\partial}{\partial E} \int dz\, \frac{e^{-\frac{z^2}{2}}}{\sqrt{2\pi}} \int dy\, f(y|z\sqrt{1-E}, E) \ln f(y|z\sqrt{1-E}, E) \nonumber \\ & = \int dz\, \frac{e^{-\frac{z^2}{2}}}{\sqrt{2\pi}}\int dy\, (1+ \ln f(y|z\sqrt{1-E}, E)) \partial_E f(y|z\sqrt{1-E}, E). \label{previousstep} \end{align} An exercise in differentiation of Gaussians shows\footnote{We thank Christophe Sch\"ulke for pointing out this trick.} \begin{align*} \partial_E\Big\{\frac{e^{-\frac{(x- z\sqrt{1-E})^2}{2E}}}{\sqrt{2\pi E}} \Big\}= \frac{e^{\frac{z^2}{2}}}{2(1-E)} \partial_z\Big\{e^{-\frac{z^2}{2}}\partial_z \Big\{\frac{e^{-\frac{(x- z\sqrt{1-E})^2}{2E}}}{\sqrt{2\pi E}} \Big\} \Big\}. \end{align*} Thus from \eqref{def-f} \begin{align*} \partial_E f(y|z\sqrt{1-E}, E) = \frac{e^{\frac{z^2}{2}}}{2(1-E)} \partial_z\Big\{e^{-\frac{z^2}{2}}\partial_z f(y|z\sqrt{1-E}, E) \Big\} \end{align*} and \eqref{previousstep} becomes \begin{align*} \frac{\partial}{\partial E} \mathbb{E}_Z\Big[\int dy\, \phi(y|Z,E) \ln \phi(y|Z,E)\Big] & = \frac{1}{2(1-E)} \int dz\, \int dy\, (1+ \ln f(y|z\sqrt{1-E}, E)) \nonumber \\ & \times \partial_z\Big\{\frac{e^{-\frac{z^2}{2}}}{\sqrt{2\pi}}\partial_z f(y|z\sqrt{1-E}, E) \Big\} \nonumber \\ & = - \frac{1}{2(1-E)} \int dz\, \frac{e^{-\frac{z^2}{2}}}{\sqrt{2\pi}}\int dy\, \frac{ \big(\partial_z f(y|z\sqrt{1-E}, E) \big)^2}{f(y|z\sqrt{1-E}, E)} \nonumber \\ & = - \frac{1}{2} \int dz\, \frac{e^{-\frac{z^2}{2(1-E)}}}{\sqrt{2\pi(1-E)}}\int dy\, \frac{ \big(\partial_z f(y|z, E) \big)^2}{f(y|z, E)} \nonumber \\ & = - \frac{1}{2} \int dz\, \frac{e^{-\frac{z^2}{2(1-E)}}}{\sqrt{2\pi(1-E)}}\int dy\, f(y|z, E) \big(\partial_z \ln f(y|z, E) \big)^2. \end{align*} This result explicitly shows that \eqref{Legendre-relation} and \eqref{defSigma} are equivalent as announced.
\section{Acknowledgement} We acknowledge support of the the Serbian Ministry of education, science and technological development, contract ON171017.
\section{Introduction\label{sec:Intro}} \IEEEPARstart{N}{owadays}, the efficient operation of critical networked infrastructures, such as the Internet, power grids, transportation networks and communication networks, has become vital for maintaining all essential activities of society~\cite{Wang2003}. Because of the ever-increasing demand of networked resources, many networked infrastructures would exhibit a phase transition point where the network transits from a free-flow state to a congestion state~\cite{Sreenivasan2007}. It is universally acknowledged that the random graph model proposed by Erd\"os and R\' enyi~\cite{Erdos1959} in the late 1950s opened up the systematic study of complex network structure in mathematics. Since the discovery of small world~\cite{Watts1998} and scale-free~\cite{Barabasi1999} topological features at the end of the last century, there have been a great deal of studies on understanding the interplay between network structure and dynamics from the perspective of complex networks~\cite{Xia2008,Zhang2014,Liu2015}. Although the problem of traffic congestion has been extensively studied, the focus of most previous work has been on isolated networks. However, many infrastructure networks in the real world are actually coupled together or interacting with each other. In order to model the interactions between real-world networks, several coupled network models have been developed~\cite{Xia2016,Sole-Ribalta2016,Chen2017}. In these network models, events taking place in one system are likely to have impacts on others. For example, a theoretical model of interdependent networks was proposed in~\cite{Buldyrev2010} to model the interdependency between two networks. In this work, interdependency links between two random graphs were used to represent the logical interdependency between two networks. As another kind of coupling model, the interconnected networks contains coupling links that are physical links between networks and provide paths for traffic transmission~\cite{interconnected,Xia2016}. Inspired by previous studies of traffic congestion in isolated complex networks and the newly developed concepts of interconnected networks, in this paper, we explore the optimal coupling pattern to minimize traffic congestion in interconnected complex networks based on a data-packet transport model. Previous studies~\cite{Wu2013,Wu2015} have demonstrated that, to alleviate traffic congestion and improve the overall network performance, the traffic loads should be uniformly distributed in the network and the average data transmission distance should be short. Based on this criterion, we employ the simulated annealing algorithm to find the near-optimal way to place the coupling links subject to the maximal network transmission capacity. \section{Network Model\label{sec:model}} In this paper, we consider packets being sent in discrete time steps. At each time step, $\lambda N$ new packets are generated with randomly sources and destinations, where $\lambda$ is the packet generation rate of each node and $N$ is the number of nodes in the network. At the same time, each node receives packets from its adjacent nodes. Each node has a buffer queue that stores the packets waiting to be processed and all the incremental packets will be pushed into the buffer queue according to the First-In-First-Out principle. Each packet with a particular pair of source and destination is always transmitted along a pre-calculated shortest routing path. Denoting the transmission capacity of each node as $R$, at each time step, the first $R$ packets of each node are transmitted by one step to their destinations according to their routing paths. Packets that have already reached their destinations are removed from the network. It has been demonstrated that~\cite{Sreenivasan2007}, as the traffic intensity increases, a phase transition occurs, taking the network from a free-flow state to a congestion state. We define the \textit{critical generation rate} $\lambda_c$ as an indicator of the network transmission capacity, which equals the average number of the newly generated packets per node per time step when the phase transition occurs in the network. A larger $\lambda_c$ implies that the network can handle higher traffic intensity without congestion.\par In our previous work~\cite{Wu2013}, we have given a theoretical estimation of the critical generation rate $\lambda_c$ in a single network, which can be expressed as \begin{equation} \lambda_c=\frac{R}{\tilde{D}U(i)_{\textrm{max}}N}, \label{eqn:lambda_c} \end{equation} where $R$ is node transmission capacity, $\tilde{D}$ is the average transmission distance of each packet, and $U(i)$ is the node usage probability of node $i$, which is defined as \begin{equation} U(i)=\frac{\sum\limits_{u,w\in{V},\atop u\neq{w}\neq{i}}\sigma_{uw}(i) }{\sum\limits_{j\in{V}}\sum\limits_{u,w\in{V},\atop u\neq{w}\neq{j}}\sigma_{uw}(j)}, \label{eqn:usagepro} \end{equation} where $V$ is the set of all nodes in the network, $\sigma_{uw}(i)$ is defined as 1 if node $i$ lies on the routing path between node $u$ and $w$, and as 0 otherwise. The total number of paths that pass through node $i$, denoted by $C(i)$, can be expressed as \begin{equation} C(i)=\sum\limits_{u,w\in{V},\atop u\neq{w}\neq{i}}\sigma_{uw}(i), \label{eqn:ci} \end{equation} And the average transmission distance $\tilde{D}$ can be approximated as \begin{equation} \tilde{D}\approx\frac{\sum\limits_{j\in{V}}C(j)}{N(N-1)},\label{eqn:avrdist} \end{equation} where $N$ is the total number of nodes in the network. From (\ref{eqn:usagepro}), (\ref{eqn:ci}) and \ref{eqn:avrdist}), we have \begin{equation} U(i)\tilde{D}\approx\frac{C(i)}{N(N-1)},\label{eqn:multiply} \end{equation} Substituting it into (\ref{eqn:lambda_c}), we have \begin{equation} \lambda_c\propto\frac{1}{C_{\textrm{max}}},\label{eqn:cmax} \end{equation} where $C_{\textrm{max}}$ is the maximum value of $C(i)$ in the network.\par Therefore, a larger $C_{\textrm{max}}$, which is defined as the maximum value of $C(i)$, implies a larger $\tilde{D}B_{\textrm{max}}$ and a smaller $\lambda_c$. \section{Coupling Patterns \label{sec:prefer}} Without loss of generality, here we consider two networks, labelled $A$ and $B$. Note that both networks are packet transmission networks which work under the operation model described in Section~\ref{sec:model}. For simplicity and clarity of the results, we assume that these two networks are of the same size $N = N_A= N_B$ and the same average degree $\langle k \rangle$ = $\langle k_A \rangle$ = $\langle k_B \rangle$. The coupling probability $P$ is defined as the ratio between the number of interconnected links and the network size. Besides the density of interconnected links, it has been widely demonstrated~\cite{Tan2014,Du2015dynamic} that coupling patterns, i.e., the ways interconnected links are added, also have significant influence on the dynamical processes of interconnected networks. In much previous work, three kinds of coupling patterns based on the heterogeneity of traffic loads have been considered~\cite{Tan2013}. \begin{enumerate} \item {Assortative coupling (AS)}. We sort nodes in networks $A$ and $B$, both in descending order of node usage probability. We connect the first node in network $A$ with the first node in network $B$, and then connect the second node in network $A$ with the second node in network $B$, and so on. Repeat this process until all coupling links are built. \item {Disassortative coupling (DIS).} We sort nodes in network $A$ ($B$) in descending (ascending) order of node usage probability. We connect the first node in network $A$ with the first node in network $B$, and then connect the second node in network $A$ with the second node in network $B$, and so on. Repeat this process until all coupling links are built. \item {Random coupling (RD).} Randomly choose a node in network $A$ and a node in network $B$. If neither has a coupling link, then connect them. Otherwise randomly choose another two coupling links and check whether repeated links exist. Repeat this process until all coupling links are built. \end{enumerate}\par As demonstrated in the previous section, a smaller $C_{\textrm{max}}$ corresponds to a larger $\lambda_c$. This analytical result remains universal for interconnected networks because the interconnected links provide routing paths for traffic transmission between two networks. Therefore, to mitigate traffic congestion and achieve maximum transmission capacity, we adopt a nature-inspired optimization method, namely, simulated annealing (SA)~\cite{Kirkpatrick1983}, to find the optimal coupling pattern to make $C_{\textrm{max}}$ of the interconnected networks as small as possible. The procedure of the algorithm is as follows: \begin{enumerate} \item Adopt the above-mentioned random coupling to add coupling links between the two networks. Calculate $C_{\textrm{max}}^0$ of the initial networks and set $C_{\textrm{max}}^{\textrm{best}}=C_{\textrm{max}}^0$. Set the time $t=0$ and the epoch count $g=0$. \item Randomly select a coupling link $e_{ij}$, which connects node $i$ from network $A $ with node $j$ from network $B$, and remove it. Then randomly select a node $x$ from network $A$ and a node $y$ from network $B$. Connect node $x$ with node $y$ if there is no existing link between them, otherwise randomly choose another pair of nodes to connect. Note that the \textit{temperature} \textit{T} does not change in this step. \item Recalculate $C_{\textrm{max}}$ after rewiring and denote it as $C_{\textrm{max}}^{\textrm{new}}$. If $C_{\textrm{max}}^{\textrm{new}}<C_{\textrm{max}}^{\textrm{best}}$, accept the new coupling link. If $C_{\textrm{max}}^{\textrm{new}}\geq C_{\textrm{max}}^{\textrm{best}}$, accept the link rewiring with the probability $e^{-{\Delta}/{T}}$, where \textit{T} is a control parameter called \textit{temperature} and $\Delta=C_{\textrm{max}}^{\textrm{new}}-C_{\textrm{max}}^{\textrm{best}}$. If the rewiring is accepted, set $C_{\textrm{max}}^{\textrm{best}}=C_{\textrm{max}}^{\textrm{max}}$, $t=0$ and $g=g+1$; otherwise, set $t=t+1$ and keep $g$ unchanged. \item Change the temperature $T$ to $\alpha T$ every 20 epoch counts, where $\alpha \left(0 < \alpha < 1 \right)$ is a parameter called the cooling ratio. \item Iteratively execute steps 2 to 4 until time $t$ is smaller than 10000, which implies that $C_{\textrm{max}}^{\textrm{best}}$ is unchanged in the latest 10000. \end{enumerate}\par In the initial stage, the temperature parameter $T$ should be large enough and the cooling ratio $\alpha$ should be as close to 1 as possible to allow the search of solutions to escape from local optima. In our simulations, we set the initial temperature $T_0=1500$ and $\alpha = 0.999$. \iffalse \begin{figure} \centering \includegraphics[width=0.48\textwidth,height=2.9in]{SAstep-iteration2} \hfil \caption{$C_{\textrm{max}}$ versus number of Monte Carlo steps in the optimization process of the SA algorithm for interconnected BA scale-free networks with network size $N_A=N_B=500$ and coupling probability $P=0.5$. $C_{\textrm{max}}$ fluctuates in the initial stage and approaches a steady value after 50000 steps.} \label{Fig.1} \end{figure} \fi \section{Network Performance\label{sec:result}} In this section, to evaluate the effects of coupling patterns on traffic congestion in interconnected networks, we explore two types of network models, namely coupled Barab\'asi-Albert scale-free networks (BA-BA) and coupled Erd\"os-R\'enyi networks (ER-ER). For each scenario, we perform simulations on two networks of equal size $N_A$ = $N_B$ = 500 and average degree $k_A$ = $k_B\approx$ 5.976. In our simulations, each node has the same transmission capacity per time step $R = 1000$, and the coupling probability $P$ varies from 0.1 to 1.0. \subsection{Performance Indicators} In this paper, we consider three performance indicators, namely, critical generation rate $\lambda_c$, average transmission distance $\tilde{D}$, and closeness of interconnected networks $C$. As mentioned in Section~\ref{sec:model}, the critical generation rate $\lambda_c$ characterizes the phase transition point between the congestion state and the free-flow state, which can be viewed as an indicator of the network transmission capacity. The average transmission distance $\tilde{D}$ is defined as the average number of hops between each pair of nodes and can be used to characterize the transmission efficiency. Moreover, to indicate how closely the two networks are interconnected, we propose to use the closeness of coupled networks $C$, which is defined as \begin{equation} C=\sum\limits_{i\in{V_A}}\sum\limits_{u,w\in{V_B},\atop u\neq{w}}R_{\rm uw}(i)+\sum\limits_{j\in{V_B}}\sum\limits_{m,n\in{V_A},\atop u\neq{w}}R_{\rm mn}(j), \label{eqn:closeness} \end{equation} where $V_A$ and $V_B$ are the sets of the nodes in networks $A$ and $B$, respectively, $R_{\rm uw}(i)$ is defined as 1 if node $i$ from network $A$ lies on the routing path between nodes $u$ and $w$ from network $B$, and as 0 otherwise. According to the definition given in Eq.~(7), we can see that $C$ quantifies the number of paths between any two nodes of one network passing a node of the other network. A large value of $C$ indicates that the internal transmission of one network is affected by the other network to a greater extent, and thus these two networks can be regarded as more intimately connected. \subsection{Simulation Results} \begin{figure}[t] \centering \includegraphics[width=0.24\textwidth,height=1.6in, trim=0 0 0 30]{BA-BA-lambda_c} \vspace{-0.3cm} \includegraphics[width=0.24\textwidth,height=1.6in, trim=0 0 0 30]{ER-ER-lambda_c} \caption{Critical generation rate $\lambda_c$ versus coupling probability $P$ under AS, DIS, RD and SA couplings, for BA-BA(a) and ER-ER(b) interconnected networks with network size $N_A=N_B=500$. Each point is averaged over 50 independent runs.} \label{Fig.2} \end{figure} Fig.~\ref{Fig.2} exhibits how the traffic capacity $\lambda_c$ evolves with different coupling patterns and probabilities, for BA-BA and ER-ER interconnected networks. We can observe that, for all cases, the SA algorithm performs much better than the other three couplings. Besides, $\lambda_c$ of the DIS coupling is larger than that of the AS coupling in general. The reason is that AS coupling which connected the high degree nodes from each side together will lead to more severe traffic concentration on hub nodes, especially when the coupling probability $P$ is relatively low. Contrarily, when the networks are DIS coupled, the nodes with low node degree (usually carry low traffic loads) can release part of traffic loads of the high-degree nodes and effectively balance the distribution of traffic loads. \begin{figure}[t] \centering \includegraphics[width=0.24\textwidth,height=1.6in, trim=0 0 0 30]{BA-BA-D} \vspace{-0.3cm} \includegraphics[width=0.24\textwidth,height=1.6in, trim=0 0 0 30]{ER-ER-D} \caption{Average transmission distance $\tilde{D}$ versus coupling probability $P$ under AS, DIS, RD and SA couplings, for BA-BA(a) and ER-ER(b) interconnected networks with network size $N_A=N_B=500$. Each point is averaged over 50 independent runs.} \label{Fig.3} \end{figure} \begin{figure}[b] \centering \includegraphics[width=0.24\textwidth,height=1.5in, trim=0 0 0 60]{BA-BA-C} \vspace{-0.3cm} \includegraphics[width=0.24\textwidth,height=1.5in, trim=0 0 0 60]{ER-ER-C} \caption{Closeness of interconnected networks $C$ versus usage probability $P$ under AS, DIS, RD and SA couplings, for BA-BA(a) and ER-ER(b) interconnected networks with network size $N_A=N_B=500$. Each point is averaged over 50 independent runs. } \label{Fig.4} \end{figure} As shown in Figs.~\ref{Fig.3} and \ref{Fig.4}, the average transmission distance $\tilde{D}$ declines and the closeness of coupled networks $C$ rises with the increase of the coupling probability $P$. In other words, more coupling links between two originally isolated networks can make them more closely connected. Moreover, we can observe that for each type of interconnected networks, AS coupling performs best in terms of the average transmission distance $\tilde{D}$ and worst in terms of the closeness $C$. If we adopt the SA algorithm to add the coupling links, the two networks are most closely connected with a largest value of $C$. Next, we make comparisons between different network types. From Figs.~\ref{Fig.2},~\ref{Fig.3} and~\ref{Fig.4}, one can see that, with the same coupling pattern and probability, ER-ER networks outperforms BA-BA networks in terms of $\lambda_c$ and $C$, but perform worse in terms of $\tilde{D}$. That is to say, when the networks being connected are more homogeneous, it would be easier to achieve a large transmission capacity and make the networks more closely connected at the expense of a slightly longer transmission time. To put our work in a more practical context, we also implement simulations on interconnected Internet Autonomous-System(AS)-level networks of South Korea (SK) and Japan (JP). We acquire the topological data from an on-line dataset provided by the Cooperative Association for Internet Data Analysis~(CAIDA)~\cite{Tan2014}~\cite{CAIDA}. Networks SK and JP are with network sizes $N_{SK}$ = 677 and $N_{JP}$ = 509. These two networks have rather different average internal degrees ($k_{SK}\approx$ 3.65 and $k_{JP}\approx$ 4.40), and they are sparsely interconnected by just 14 external coupling links. Table~\ref{table_1} compares the simulation results under AS, DIS, RD and SA couplings, as well as the realistic coupling information named CAIDA here. We can observe that, similar to the results for coupled BA scale-free networks when $P$ is closed to 0, AS coupling leads to the shortest $\tilde{D}$, DIS coupling gets the largest $C$, and SA performs best in terms of $\lambda_c$. Therefore, we can conclude that there exists a trade-off: if we want to shorten the value of $\tilde{D}$, the coupling links should be added between high-degree nodes from both sides; on the contrary, if we aim to suppress traffic congestion and make the interconnected networks more integrated as a whole, we can adopt the DIS coupling or the SA algorithm to add coupling links between the networks. \begin{table}[h] \renewcommand{\arraystretch}{1.5} \caption{Critical generation rate $\lambda_c$, average transmission distance $\tilde{D}$, and closeness $C$ under different coupling patterns for interconnected Internet AS-level networks of South Korea and Japan.} \label{table_1} \centering \begin{tabular}{c|c c c c c } \hline &AS &DIS &RD &CAIDA &SA \\ \hline \hline $\lambda_c$ & 2.4627 & 2.6480 & 2.2013 & 2.3087 & 3.2847 \\ \hline $\tilde{D} $ & 4.0860 & 4.6537 & 4.7386 & 4.3859 & 4.8606 \\ \hline $C$ & 0 & 122 & 10 & 114 & 68 \\ \hline \end{tabular} \end{table} \section{Heuristic Methods\label{sec:SP}} As shown in the previous section, the proposed SA coupling algorithm can effectively enhance the traffic capacity. However, the convergence time of the SA algorithm increases with the network sizes and the number of coupling links, and thus this strategy is quite time consuming for large-scale networks due to its high complexity. Therefore, in this section, we examine the optimal configurations of the SA-selected coupling links and develop a faster method to select the coupling links. Fig.~\ref{Fig.6}(a) shows the degree distribution of the coupling nodes in a BA scale-free network. For the BA scale-free networks, most coupling links are added between the nodes with relatively low degrees. We plot the degree distribution in a log-log scale, and its shape is similar with a power-law distribution, i.e., \begin{equation} P(k)_{\rm BA} = \frac{k^{-\gamma}}{\zeta(\gamma)}. \label{eqn:bamarginal} \end{equation} where $\gamma$ is a constant known as the power-law exponent and $\zeta(\gamma)$ is the Riemann Zeta function of $\gamma$ which can be given as $\zeta(\gamma)=\sum_k k^{-\gamma}$. Here we use the expression derived in \cite{Clauset2009} to estimate the power-law exponent $\gamma$ as \begin{equation} \gamma = 1+\tilde{N} \left[ \sum\limits_{i}^{\tilde{N}} \ln \frac{k_i}{k_{\rm min}-0.5}\right]^{-1}, \end{equation} where $\tilde{N}=NP$ is the number of coupling links and $k_{\rm min}$ is the minimum degree of the coupling nodes. In addition, we test the goodness-of-fit under different coupling probability $P$ using the Kolmogorov-Smirnov Test, and the p-values are all larger than 0.05, implying that the fitting functions fit the data well. \iffalse \begin{figure}[htbp!] \centering \includegraphics[width=0.45\textwidth,height=2.5in]{BA-BA-SAinner} \vspace{0.4cm} \includegraphics[width=0.5\textwidth,height=2.5in]{ER-ER-SAinner} \caption{2D-degree-density plots of the SA-selected coupling links in BA-BA(a) and ER-ER(b) successively with network size $N_A$ = $N_B$ = 500 and coupling probability $P$ = 0.5. For BA-BA interconnected networks, the majority of the chosen coupling nodes have a low degree, while the coupling nodes in ER-ER interconnected networks have degrees around the median range.} \label{Fig.5} \end{figure} \fi \begin{figure}[t] \centering \includegraphics[width=0.24\textwidth,height=1.6in, trim=0 0 0 30]{BA-fitness-lm} \vspace{-0.3cm} \includegraphics[width=0.24\textwidth,height=1.6in, trim=0 0 0 30]{ER-fitness} \caption{Fitting of the degree distribution of the nodes with coupling links for BA-BA(a) and ER-ER(b) interconnected networks with network size $N_A$ = $N_B$ = 500 and coupling probability $P$ = 0.5 on a log-log scale.} \label{Fig.6} \end{figure} \iffalse \begin{figure}[hbp!] \centering \includegraphics[width=0.45\textwidth,height=2.7in]{ER-fitness} \caption{Fitting of the degree distribution of the nodes with coupling links for ER-ER interconnected networks with network size $N_A$ = $N_B$ = 500 and coupling probability $P$ = 0.5} \label{Fig.7} \end{figure} \fi \begin{figure}[t] \centering \includegraphics[width=0.24\textwidth,height=1.6in, trim=0 0 0 30]{heuristic_BA} \vspace{-0.3cm} \includegraphics[width=0.24\textwidth,height=1.6in, trim=0 0 0 30]{heuristic_ER} \caption{Critical generation rate $\lambda_c$ versus coupling probability $P$ for BA-BA(a) and ER-ER(b) interconnected networks with network size $N_A$ = $N_B$ = 500. Each point is averaged over 50 independent runs. The heuristic method outperforms the random coupling but falls behind the SA optimization algorithm in terms of $\lambda_c$.} \label{Fig.8} \end{figure} As shown in Fig.~\ref{Fig.6}(b), the degree distribution of the coupling nodes in an ER random graph looks like a Poisson distribution. Here we adopt the Nonlinear Least Square Regression method to obtain the parameter $\lambda$ of the Poisson distribution for best-fitting. Our simulation results show that under different coupling probabilities $P$, the value of $\lambda$ is always approximately equal to the average node degree of the ER random graph with very low residual standard errors. Thus the degree distribution of coupling nodes in ER random graphs can be approximated as: \begin{equation} P(k)_{\rm ER} = \frac{{\langle k \rangle}_{\rm ER}^{k}}{k!}e^{-{\langle k \rangle}_{\rm ER}} \label{eqn:ermarginal} \end{equation} where ${\langle k \rangle}_{\rm ER}$ is the average node degree of the ER random graph. Based on the above-mentioned statistical features in terms of node degree, we design the following heuristic method (HM) to add coupling links between two interconnected networks: \begin{enumerate} \item Sort nodes from networks $A$ and $B$, both in ascending order of node degree. Then, we record all degree values for both networks, i.e., $\left\{ D_1,D_2,...,D_{t_A} \right\}$ and $\left\{ D_1,D_2,...,D_{t_B} \right\}$ ($t_A \leq N_A$, $t_B \leq N_B$, and the degrees are not necessarily continuous) for networks $A$ and $B$, respectively. \item Calculate the probability of coupling selections for each degree in BA scale-free and ER random networks using Eqs.~(\ref{eqn:bamarginal}) and (\ref{eqn:ermarginal}), respectively, and then obtain the cumulative distribution probabilities $CDP(k)$ of degree $k$, for both networks A and B, i.e., \begin{align*} &CDP(D_1)=P(D_1),\\ &CDP(D_i)=CDP(D_{i-1})+P(D_i) \end{align*} where $2\leq i\leq t_A$ for network $A$, and $2\leq i\leq t_B$ for network $B$. \item Generate a random number $r \in (0,CDP(D_{t}))$, where $D_{t}$ is the maximum degree for a network. If $r < CDP(D_1)$, randomly select a node with degree $D_1$; if $CDP(D_{i-1}) < r < CDP(D_i)$, randomly select a node with degree $D_i$. Repeat this process for network $A$ or $B$ until $NP$ nodes are determined in each side. \item Connect the coupling nodes from both sides under a particular coupling pattern. \end{enumerate} As one can see from Fig.~\ref{Fig.6}(a), for the case of interconnected BA scale-free networks, majority of the coupling links determined by the SA algorithm are distributed in the upper-left part of the plot, while hardly any links are located in the lower-right part of the plot. Based on this observation, we design the dual-assortative (Dual-AS) coupling pattern as follows to add coupling links in step 4. In the dual-assortative (Dual-DIS) coupling, we sort the selected nodes for coupling from each network in ascending order of node degree. The other procedures of this coupling pattern is the same as the assortative coupling introduced in Section~\ref{sec:prefer}. Additionally, we consider the random and disassortative coupling patterns in step 4 of the HM algorithm for comparison. Therefore, as shown in Fig.~\ref{Fig.8}, by using different coupling patterns, we design three kinds of methods, namely, HM+RD, HM+DIS and HM+Dual-AS, to add the coupling links and compare them with the RD and SA algorithms discussed in Sec.~\ref{sec:prefer}. We can learn from Fig.~\ref{Fig.8} that the heuristic methods outperforms the random coupling but fall behind the SA optimization algorithm in terms of $\lambda_c$. As shown in Fig.~\ref{Fig.8}(a), for interconnected BA scale-free networks, the heuristic method performs best when the coupling nodes are connected using the Dual-AS coupling pattern. As for the interconnected ER random graphs, it would be better to connect the coupling nodes in a disassortative way. Moreover, with an increased coupling probability $P$, the heuristic method performs better because of a larger sample size and greater statistical significance. \section{Conclusion\label{conclusion}} In this paper, we considered the problem of mitigating traffic congestion in interconnected complex networks. In such networks, the way in which the coupling links are connected between the networks have significant influence on the traffic dynamics of the interconnected system. We employed a simulated annealing algorithm to find the optimal configuration of coupling links to mitigate traffic congestion. Our simulation results showed that the proposed algorithm can effectively enhance the network transmission capacity and make the networks more closely connected for both artificial interconnected networks and real-world interconnected Internet AS-level graphs, compared with assortative, disassortative and random couplings. Additionally, we explored the statistical features of the optimal configuration given by the SA and put forward a faster heuristic method to determine the coupling links. As a preliminary attempt, here we only considered the degree-related characteristics of the optimal patterns. \balance
\section{Introduction} In this paper we study, respectively, the properties of separation and regularity for minimal discrete and for continuous Riesz energy. For a measure $\mu$ supported on a compact set $A$ in Euclidean space and $s>0$, its {\it Riesz $s$-potential} and {\it Riesz $s$-energy} are defined by \begin{equation}\label{potendefin} U_s^\mu(x):=\int_A \frac{\textup{d}\mu(y)}{|x-y|^s}, \;\;\;\; I_s[\mu]:=\int_A U_s^\mu(x)\textup{d}\mu(x), \end{equation} and its {\it Riesz $\log$-potential} and {\it Riesz $\log$-energy} by $$ U_{\log}^\mu(x):=\int_A \log\frac{1}{|x-y|}\textup{d}\mu(y), \;\;\;\; I_{\log}[\mu]:=\int_A U_{\log}^\mu(x)\textup{d}\mu(x). $$ The constant $W_s(A):=\inf I_s[\mu]$, where the infimum is taken over all probability measures $\mu$ supported on $A$, is called the {\it $s$-Wiener constant} of the set $A$, and the {\it $s$-capacity} of $A$ is given by $$ \text{cap}_s(A):=\frac{1}{W_s(A)}, \;\; s>0, \qquad \text{cap}_{\log}(A):=\exp(-W_{\log}(A)). $$ If $W_s(A)<\infty$, it is known that there exists a unique probability measure $\mu_s$ that attains $W_s(A)$ and we call $\mu_s$ the {\it $s$-equilibrium measure for $A$} (see \cite{Landkof1972}). The problem of minimizing $I_s[\mu]$ has a discrete analog. Namely, for an integer $N\geqslant 2$ we set $$ \mathcal{E}_s(A, N):=\min_{\omega_N\subset A} E_s(\omega_N), $$ where the infimum is taken over all $N$-point configurations $\omega_N=\{x_1, \ldots, x_N\}\subset A$ and $$ E_s(\omega_N):=\sli_{i\not = j} \frac{1}{|x_i - x_j|^s}. $$ By $\omega_N^*=\omega_{N, s}^*=\{x_1^*, \ldots, x_N^*\}$ we denote any {\it optimal $N$-point $s$-energy configuration}; i.e., a configuration that attains $\mathcal{E}_s(A, N)$. It is known that if $W_s(A)<\infty$, then $$ \frac{1}{N}\sli_{j=1}^N \delta_{x^*_j}\stackrel{*}{\to} \mu_s, $$ where $\delta_x$ denotes the unit point mass at $x$, and the convergence is in the weak$^*$ topology. Thus, for sets of positive $s$-capacity, by solving the discrete minimization problem, we ``discretize'' the measure $\mu_s$ that solves the continuous problem. We shall study properties of $\omega^*_N$, especially its {\it separation distance} given by \begin{equation} \delta(\omega^*_N):=\min_{i\not = j} |x^*_i-x^*_j|. \end{equation} In the theory of approximation and interpolation, the separation distance is often associated with some measure of stability of the approximation. In \cite{Dahlberg1978} Dahlberg proved that for a $C^{1+\epsilon}$-smooth $d$-dimensional manifold $A\subset \R^{d+1}$ without boundary and $s=d-1$ (the harmonic case), there exists a constant $c>0$ such that \begin{equation}\label{eqintro1} \delta(\omega^*_N)\geqslant cN^{-1/d}, \;\;\; \forall \; N\geqslant 2. \end{equation} For such a set $A$, the order $N^{-1/d}$ for separation of $N$-point configurations is best possible\footnote[3]{More generally, this is true for any set $A$ that is lower $d$-regular with respect to some finite measure $\mu$ (see Definition \ref{defregular}).}. For the special case $A=\mathbb{S}^d:=\{x\in \R^{d+1}\colon |x|=1\}$, Kuijlaars, Saff and Sun \cite{Kuijlaars2007} extended Dahlberg's result by proving \eqref{eqintro1} for $s\in [d-1, d)$ and in \cite{Brauchart2014}, Brauchart, Dragnev and Saff extended the range of $s$ to $s\in (d-2, d)$ with explicit values for the constant $c$. Our first goal is to extend the results from \cite{Dahlberg1978} and \cite{Kuijlaars2007} to all $C^\infty$-smooth $d$-dimensional manifolds for $s\in [d-1, d)$ and to interior points of $d$-dimensional bodies for $s\in (d-2, d)$. More generally, we show that \eqref{eqintro1} holds whenever the $s$-equilibrium measure of the manifold is upper regular (see Theorem \ref{corenergysepar}). Since the problem of determining the minimum $\mathcal{E}_s(A, N)$ requires solving an extremal problem in $N$ variables, it is natural to consider a somewhat simpler discretization method, namely, the computation of {\it greedy $s$-energy points} defined below which involves minimization in only a single variable. For the logarithmic kernel on $A\times A$ where $A\subset\mathbb{C}$, such points were introduced by Edrei \cite{edrei1939} and extensively explored by Leja \cite{leja1957} and his students. For general kernels they were investigated by L\'opez and Saff \cite{Lopezgreedy}. \begin{defin}\label{defgreedy} A sequence $\omega^*_\infty=\{a^*_j\}_{j=1}^\infty\subset A$ is called a {\it sequence of greedy $s$-energy points} if $a^*_1\in A$ and for every $N>1$ we have $$ \sli_{j=1}^{N-1}\frac{1}{|a^*_N-a^*_j|^s} = \inf_{y\in A}\sli_{j=1}^{N-1}\frac{1}{|y-a^*_j|^s}. $$ \end{defin} Notice that if $\omega_{N-1}:=\{a^*_1, \ldots, a^*_{N-1}\}$ is already determined, then $a^*_N$ is chosen to minimize $E_s(\omega_{N-1}\cup \{y\})$ over all $y\in A$. It is known \cite{Lopezgreedy} that if $W_s(A)<\infty$ and $\omega_\infty^*=\{a_j^*\}_{j=1}^\infty$ is a sequence of greedy $s$-energy points, then $$ \frac{1}{N}\sli_{j=1}^N \delta_{a^*_j}\stackrel{*}{\to} \mu_s. $$ Some computational aspects of using the greedy $s$-energy points for numerical integration can be found in \cite{elefante}. Our second goal, which is achieved in Theorem \ref{corgreedy111} and Corollary \ref{cornonint2}, is to prove that for a smooth $d$-dimensional manifold $A$ and $s\in (d-1, d)$ or $s>d$, there exists a constant $c>0$ such that, for every $i<j$, we have $$ |a^*_i-a^*_j|\geqslant cj^{-1/d}. $$ In particular, this implies that $\delta(\{a_1^*, \ldots, a_N^*\})\geqslant cN^{-1/d}$. Moreover, when $s>d$ we also prove that for some constant $C>0$ the {\it covering radius} $\eta$ for such point satisfies $$ \eta(\{a_1^*, \ldots, a_N^*\}, A):=\max_{y\in A} \min_{j=1,\ldots, N} |y-a^*_j|\leqslant CN^{-1/d}. $$ For configurations that attain the minimal discrete energy $\mathcal{E}_s(A, N)$, this was done in \cite{Hardin2012} for $s>d$ and in \cite{Dahlberg1978} for $s=d-1$. Since the method of proof for the above results utilizes the regularity properties of the measure $\mu_s$ (see Definition \ref{defregular}), our third goal is to obtain sufficient conditions for this regularity. As we show in Theorem \ref{thequil}, compact $C^\infty$-smooth $d$-dimensional manifolds $A\subset \R^{d+1}$ without boundary satisfy our conditions (we anticipate, however, that the same result holds for $C^2$-smooth manifolds). In the case $s=d-1$, such a result is proved in \cite{sjogren1972}. Another result of this type was proved in \cite{Wallin1966} under an assumption that the potential $U_s^\mu$ of the measure $\mu$ satisfies an appropriate H\"older condition in the whole space $\R^{d+1}$. We derive our result, Theorem \ref{thequil}, using only smoothness of the manifold $A$ by applying the theory of pseudo-differential operators. The paper is organized as follows. The main results in the integrable case, which include separation properties of minimal energy and greedy energy points, are stated in Section \ref{secmainintegr} and proved in Sections \ref{sectionproofs1} and \ref{sectionproofs2}. In Section \ref{secmainnonint} we state the separation and covering properties of greedy energy points in the non-integrable case, which are proved in Subsections \ref{proofnonint1} and \ref{proofnonint2}. In Section \ref{factspotential} we cite some known results from potential theory that we need to prove our main results, and in Section \ref{factspseudo} we give a short introduction to the theory of pseudo-differential operators, which we need for the proof of Theorem \ref{thequil} in Section \ref{sectionproofs2}. \section{Main results in the integrable case}\label{secmainintegr} In this section we state and discuss our main results for integrable Riesz kernels. Their proofs are given in Sections \ref{sectionproofs1} and \ref{sectionproofs2}. We shall work primarily with a class of $\ell$-regular sets, which are defined as follows. \begin{defin}\label{defregular} A compact set $A$ is called {\it $\ell$-regular}, $\ell>0$, if for some measure $\lambda$ supported on $A$ there exists a positive constant $C$ such that for any $x\in A$ and $r<\diam(A)$ we have $$ C^{-1}r^\ell \leqslant \lambda(B(x,r)) \leqslant Cr^\ell, $$ where $B(x,r)$ denotes the open ball $B(x,r):=\{y\in \R^p\colon |y-x|<r\}$. The set $A$ is called {\it $\ell$-regular at $x\in A$} if for some positive number $r_1$, the set $A\cap B(x, r_1)$ is $\ell$-regular. Further, we call a measure $\mu$ {\it upper $d$-regular at $x$} if for some constant $c(x)$ and any $r>0$ we have \begin{equation}\label{defupperregular} \mu(B(x,r))\leqslant c(x)r^d. \end{equation} \end{defin} As the next example shows, a set $A$ can be $\ell$-regular with $\ell\in \mathbb{N}$, but its $s$-equilibrium measure $\mu_s$ can be $d$-regular with $d<\ell$. \begin{example}\label{exampleee} For the closed unit ball $\mathbb{B}^\ell:=\{x\in \R^\ell\colon |x|\leqslant 1\}$, which is $\ell$-regular, and $s\in (\ell-2, \ell)$ the $s$-equilibrium measure is given by (see, e.g., \cite{Landkof1972} or \cite{Borodachov2016}) $$ \textup{d}\mu_s=M(1-|x|^2)^{(s-\ell)/2}\textup{d}x, \;\;\;\;\; M=\frac{\Gamma(1+s/2)}{\pi^{\ell/2}\Gamma(1+(s-\ell)/2)}. $$ We notice that $\mu_s$ is $\ell$-regular at every interior point of $\mathbb{B}^\ell$. However, for $x$ on the boundary $\partial \mathbb{B}^\ell=\mathbb{S}^{\ell-1}$, the measure $\mu_s$ satisfies $$ C^{-1}r^{(\ell+s)/2}\leqslant \mu_s(B(x, r))\leqslant Cr^{(\ell+s)/2}, $$ so that $\mu_s$ is not $\ell$-regular at $x\in \partial \mathbb{B}^\ell$. \end{example} We now present our main results which include the possibility of different regularities for the set $A$ and the measure $\mu_s$. Although stated only for $s>0$, they remain valid for $\ell=1$ and $s=\log$. \begin{theorem}\label{corenergysepar} Let $A\subset \R^p$ be a compact set of positive $s$-capacity, $0\leqslant p-2<s<d\leqslant \ell\leqslant p$, and $\mu_s$ be the $s$-equilibrium measure on $A$. Assume $A$ is $\ell$-regular at every $x\in A'\subset A$ and $\mu_s$ is upper $d$-regular at every $x\in A'$ with $\sup_{x\in A'}c(x)\leqslant c$ for some $c>0$. Then there exists a positive constant $C$ such that for any optimal $N$-point $s$-energy configuration $\omega^*_N=\{x^*_1, \ldots, x^*_N\}$, any $x^*_j \in A'$ and any $x^*_k\in A$ with $k\not=j$ we have \begin{equation}\label{zlatovlaska} |x^*_j-x^*_k|>CN^{-1/d}. \end{equation} \end{theorem} In particular, \eqref{zlatovlaska} holds in the following cases (see Corollaries \ref{thequilbodies} and \ref{corsupersmooth} and Example \ref{exampleee}): \begin{itemize} \item $A\subset \R^{\ell+1}$ is a compact $\ell$-regular $C^\infty$-smooth manifold without boundary, $s\in [\ell-1, \ell)$, and $A'=A$ with $d=\ell$; \item $A\subset \R^\ell$ is compact, $s\in (\ell-2, \ell)$, and $A'=\{x\in A\colon \dist(x, \partial A)\geqslant \ep\}$ with $\ep>0$ and $d=\ell$; \item $A=\mathbb{B}^{\ell}$, $s\in (\ell-2, \ell)$, and $A'=\{x\in \R^{\ell}\colon |x|\leqslant 1-\ep\}$ with $\ep\in(0,1)$ and $d=\ell$; \item $A=\mathbb{B}^\ell$, $s\in (\ell-2, \ell)$, and $A'=\partial \mathbb{B}^\ell$ with $d=(s+\ell)/2$. \end{itemize} \begin{rem*} In the case $\ell=1$ and $s=\log$, our results imply the sharp estimate that when $x^*_j = \pm 1$ and $x^*_k\not=x_j^*$, \begin{equation}\label{sharp12345} |x^*_k - x^*_j|\geqslant cN^{-2}. \end{equation} Indeed, in this case the optimal $\log$-energy configurations $\omega_N^*$ consist of {\it Fekete points}; i.e., the roots of $(1-x^2)P'_{N-1}(x)$, where $P_{N}$ is the $N$th degree Legendre polynomial (see, e.g., \cite{szego}), for which it is known that \eqref{sharp12345} cannot be improved for $x_k^*$ near $\pm 1$. \end{rem*} The next theorem concerns greedy energy points defined in Definition \ref{defgreedy}. \begin{theorem}\label{corgreedy111} Let $A\subset \R^{\ell+1}$ be a compact $C^\infty$-smooth $\ell$-dimensional manifold without boundary, $\ell-1\leqslant s<\ell$. If $\omega^*_\infty = \{a^*_j\}_{j=1}^\infty$ is a sequence of greedy $s$-energy points on $A$, then there exists a positive constant $c(A, s)$ such that, for any $i<j$, $$ |a^*_i - a^*_j|\geqslant c(A, s)j^{-1/\ell}. $$ \end{theorem} Theorems \ref{corenergysepar} and \ref{corgreedy111} are immediate consequences of Theorem \ref{dregularimpliessepar} stated below and the following trivial observation: if $\omega^*_N=\{x^*_1, \ldots, x^*_N\}$ is an optimal $N$-point $s$-energy configuration, then for any $k=1,\ldots, N$ we have $$ \sum_{j\not = k} \frac{1}{|x^*_k-x^*_j|^s} = \inf_{y\in A}\sum_{j\not = k} \frac{1}{|y-x^*_j|^s}. $$ \begin{theorem}\label{dregularimpliessepar} Let $A\subset \R^p$ be a compact set of positive $s$-capacity and $\mu_s$ be the $s$-equilibrium measure on $A$. Let $\omega_N=\{x_1, \ldots, x_N\}$ be any $N$-point configuration in $A$, and $y^*\in A$ satisfy\footnote[2]{The right-hand side of \eqref{suddenlypolar} is called the {\it $s$-polarization} (see, e.g., \cite{borodachov2016optimall}) of $\omega_N$.} \begin{equation}\label{suddenlypolar} \sum_{j=1}^N \frac{1}{|y^*-x_j|^s} = \inf_{y\in A}\sum_{j=1}^N \frac{1}{|y-x_j|^s}. \end{equation} If \,$0\leqslant p-2<s<d\leqslant \ell\leqslant p$, $A$ is $\ell$-regular at $y^*$ and $\mu_s$ is upper $d$-regular at $y^*$, then for every $j=1, \ldots, N$ \begin{equation}\label{antoshka} |y^*-x_j|\geqslant (c_1 c(y^*)+1)^{-1/s}\cdot N^{-1/d}, \end{equation} where the constant $c(y^*)$ is from \eqref{defupperregular} and the positive constant $c_1$ depends only on $A$ and $s$. \end{theorem} Our next goal is to present a sufficient condition for Theorem \ref{dregularimpliessepar} to hold. We begin with the following definition. \begin{defin} Let $A\subset \R^p$ be a compact set $d$-regular at a point $x_0\in A$. We say that $A$ is {\it $(d, C^\infty)$-smooth at $x_0$} if there exists a positive number $r_0$ and a $C^\infty$-smooth invertible function $\varphi\colon B(x_0, r_0)\cap A \to \R^d$ such that $\vf(B(x_0, r_0)\cap A)$ is open in $\R^d$ and $\varphi^{-1}$ is also $C^\infty$-smooth. \end{defin} Our next theorem is a local result showing that if a manifold is $C^\infty$-smooth at a point, then the $s$-equilibrium measure is upper $d$-regular at this point. \begin{theorem}\label{thequil} Let $A\subset \R^{p}$ be a compact set of positive $s$-capacity, where $p\in \{d, d+1\}$ and $s\in [p-2, d)$, and $\mu_s$ be the $s$-equilibrium measure on $A$. If $A$ is $(d, C^\infty)$-smooth at a point $x_0\in A$, then $\mu_s$ is upper $d$-regular at $x_0$; i.e., inequality \eqref{defupperregular} holds for any $r>0$. \end{theorem} Example \ref{exampleee} illustrates the sharpness of this theorem. We note that if $y^*$ is as in \eqref{suddenlypolar} and the assumptions of Theorem \ref{thequil} hold with $x_0$ replaced by $y^*$, then the conclusion of Theorem \ref{dregularimpliessepar} follows. The next corollary follows from Theorem \ref{thequil} and the fact that, if $p=d$, then $A$ is $(p, C^\infty)$-smooth at $x_0\in A$ if and only if $x_0$ is an interior point of $A$. \begin{corollary}\label{thequilbodies} Let $A\subset \R^d$ be compact, $s\in [d-2, d)$ and $x_0$ be an interior point of $A$. If $\mu_s$ is the $s$-equilibrium measure on $A$, then $\mu_s$ is upper $d$-regular at $x_0$. \end{corollary} Obviously, a $C^\infty$-smooth manifold without boundary satisfies the conditions of Theorem \ref{thequil}; therefore, we have the following consequence. \begin{corollary}\label{corsupersmooth} Let $A\subset \R^{d+1}$ be a compact $C^\infty$-smooth $d$-dimensional manifold without boundary, $d-1\leqslant s<d$ and $\mu_s$ be the $s$-equilibrium measure on $A$. Then $\mu_s$ is uniformly upper $d$-regular on $A$. \end{corollary} \section{Main results in the non-integrable case}\label{secmainnonint} In this section we state an analog of Theorem \ref{dregularimpliessepar} for the case $s>d$ under very weak assumptions on the set $A$. As a consequence, we deduce separation and covering properties of greedy energy points in this case. These properties are proved in Section \ref{sectionproofs1}. Below $\mathcal{H}_d$ denotes the {\it $d$-dimensional Hausdorff measure} normalized by $\mathcal{H}_d([0,1]^d)=1$. By $\overline{\mathcal{M}}_d$ we denote the {\it upper $d$-dimensional Minkowskii content}; i.e., for a compact set $A\subset \R^p$, set \begin{equation}\label{defincontent} \overline{\mathcal{M}}_d(A):=\limsup_{\ep\to 0^+} \frac{\mathcal{L}_p\left( \{x\in \R^p\colon \dist(x, A)<\ep\}\right)}{\beta_{p-d}\ep^{p-d}}, \end{equation} where $\mathcal{L}_p$ is the Lebesgue measure on $\R^p$ and $\beta_{p-d}$ is the volume of a $(p-d)$-dimensional unit ball (for $p=d$, we set $\beta_0$:=1). \begin{prop}\label{thnonint1} If $A\subset \R^p$ is a compact set with $\mathcal{H}_d(A)>0$ ($d\leqslant p$) and $s>d$, then there exists a constant $c>0$ such that for any $N$-point configuration $\omega_N=\{x_1, \ldots, x_N\}\subset A$ and $y^*\in A$ satisfying $$ \sum_{j=1}^N \frac{1}{|y^*-x_j|^s} = \inf_{y\in A}\sum_{j=1}^N \frac{1}{|y-x_j|^s}, $$ we have, for every $j=1,\ldots, N$, \begin{equation}\label{antoshka111} |y^*-x_j|\geqslant c\cdot N^{-1/d}. \end{equation} \end{prop} \begin{corollary}\label{cornonint2} With the assumptions of Theorem \ref{thnonint1}, there exists a constant $c>0$ such that for any sequence $\omega^*_\infty=\{a^*_j\}_{j=1}^\infty$ of greedy energy points and any $i<j$, we have \begin{equation}\label{eqnonintgreedysepar} |a^*_i-a^*_j|\geqslant cj^{-1/d}. \end{equation} If, in addition, $A\subset \tilde{A}$ for a $d$-regular set $\tilde{A}$ and $\overline{\mathcal{M}}_d(A)<\infty$, then for some $c>0$ and every $N\geqslant 2$, the covering radius of $\omega^*_N:=\{a^*_1, \ldots, a^*_N\}\subset \omega^*_\infty$ satisfies \begin{equation}\label{eqnonintgreedycover} \eta(\omega^*_N, A)=\max_{y\in A}\min_{j=1,\ldots, N} |y-a_j^*|\leqslant cN^{-1/d}. \end{equation} \end{corollary} \section{Some facts from Potential theory}\label{factspotential} For the convenience of the reader we state several known results from potential theory that will be used in the proofs of the above formulated theorems. The following theorem can be found, for example, in \cite[p. 136]{Landkof1972} or \cite[Theorems 4.2.15 and 4.5.11]{Borodachov2016}. \begin{theorem}\label{landkofblabla} If $A\subset \R^p$ is a compact set of positive $s$-capacity, then the $s$-equilib\-ri\-um measure $\mu_s$ is unique. Moreover, the inequality $U_s^{\mu_s}(x)\leqslant W_s(A)$ holds $\mu_s$-a.e. and the inequality $U_s^{\mu_s}(x)\geqslant W_s(A)$ holds $s$-quasi-everywhere; i.e., if $F\subset\{x\in A \colon U_s^\mu(x) < W_s(A)\}$ is compact, then $W_s(F)=\infty$. Furthermore, if $s\in [p-2, p)$, then $U_s^{\mu_s}(x)\leqslant W_s(A)$ for every $x\in \R^p$. \end{theorem} The following theorem is a special case of \cite[Theorem 2.5]{reznikov2016minimum}. \begin{theorem}\label{coralwaysequal} Let $s<d$ and $\mu$ be a measure supported on $A\subset \R^p$, where $A$ is $d$-regular. If for some constant $M$ the inequality $U_s^\mu(x)\geqslant M$ holds $s$-quasi-everywhere on $A$, then it holds everywhere on $A$. \end{theorem} We conclude this section with two results from the theory of non-integrable Riesz potentials. The first result can be found in \cite[Theorem 2.4]{Erdelyi2013} and \cite[Proposition 2.5]{Borodachov2007}, while the second is a consequence of the proof of \cite[Theorem 3]{Hardin2012}. \begin{theorem}\label{therdel} Assume $A\subset \R^p$, $\mathcal{H}_d(A)>0$ and $s>d$. Then there exists two positive constants $c_1(s)$ and $c_2(s)$ such that for any $N$-point configuration $\omega_N=\{x_1, \ldots, x_N\} \subset A$ we have $$ \inf_{y\in A}\sli_{j=1}^N \frac{1}{|y-x_j|^s} \leqslant c_1(s)N^{s/d} $$ and $$ E_s(\omega_N) = \sli_{i\not = j} \frac{1}{|x_i-x_j|^s} \geqslant c_2(s) \overline{\mathcal{M}}_d(A)^{-s/d} N^{1+s/d}. $$ \end{theorem} \begin{theorem}\label{thpotentiallast} Suppose the compact set $A\subset \R^p$ with $\mathcal{H}_d(A)>0$ is contained in some $d$-regular compact set $\tilde{A}$ and $s>d$. If $\omega_N=\{x_1, \ldots, x_N\}\subset A$ is an $N$-point configuration with separation distance $\delta(\omega_N)\geqslant \tau N^{-1/d}$ for some $\tau>0$, then for some constant $R(s, \tau, p_s)$, \begin{equation} \eta(\omega_N, A):=\max_{y\in A}\min_{j=1,\ldots, N} |y-x_j|\leqslant R(s, \tau, p_s) N^{-1/d}, \end{equation} where $p_s$ is any positive constant such that \begin{equation}\label{pspsps} \inf_{y\in A} \sli_{j=1}^N \frac{1}{|y-x_j|^s} \geqslant p_s N^{s/d}. \end{equation} \end{theorem} \section{Proofs of Theorem \ref{dregularimpliessepar} and Theorem \ref{thnonint1}}\label{sectionproofs1} For $x=(x(1), \ldots, x(p))\in A$, set $x_r:=(x(1), \ldots, x(p), r)\in \R^{p+1}$ and consider $A$ as a subset of $\R^{p+1}$ with $x=x_0$; i.e., $x(p+1)=0$. The next lemma is related to results of Carleson \cite{Carleson1963} for $s\in [d-1, d)$ and Wallin \cite{Wallin1966}. \begin{lemma}\label{potentialsecondterm} Assume the measure $\mu$ on $A$ is upper $d$-regular at $x\in A$. If $d-2<s<d$, then there exists a constant $c_1$ that depends only on $s$ and $d$ such that $$ U_s^\mu(x_r)\geqslant U_s^\mu(x)-c_1 \cdot c(x)\cdot r^{d-s}. $$ \end{lemma} \begin{proof} We first notice that for $x,y\in A$ we have $|y-x_r|^2 = |y-x|^2+r^2$. Therefore, \begin{multline}\label{eqqq} U_s^\mu(x)-U_s^\mu(x_r) = \int_A \frac{(|y-x|^2+r^2)^{s/2} - |y-x|^s}{(|y-x|^2+r^2)^{s/2} \cdot |y-x|^s} \text{d}\mu(y) \\ =\ili_{|y-x|\leqslant 2r}\frac{(|y-x|^2+r^2)^{s/2} - |y-x|^s}{(|y-x|^2+r^2)^{s/2} \cdot |y-x|^s} \text{d}\mu(y) \\ + \ili_{|y-x|>2r}\frac{(|y-x|^2+r^2)^{s/2} - |y-x|^s}{(|y-x|^2+r^2)^{s/2} \cdot |y-x|^s} \text{d}\mu(y) =: I_1 + I_2. \end{multline} We have \begin{multline}\label{estint1} I_1\leqslant \ili_{|y-x|\leqslant 2r} \frac{\textup{d}\mu(y)}{|y-x|^s} = \int_{0}^\infty \mu\{y\colon |y-x|\leqslant 2r, \; |y-x|^{-s}>t\}\text{d}t \\ = \int_{0}^{(2r)^{-s}} \mu\{y\colon |y-x|\leqslant 2r\} \text{d}t + \int_{(2r)^{-s}}^\infty \mu\{y\colon |y-x|<t^{-1/s}\}\text{d}t \\ \leqslant c(x) (2r)^{d-s} + c(x) \frac{s}{d-s} (2r)^{d-s} = 2^{d-s}\cdot \frac{d}{d-s} \cdot c(x) \cdot r^{d-s} = c_2 \cdot c(x) \cdot r^{d-s}, \end{multline} where the constant $c_1$ depends only on $s$ and $d$. To estimate $I_2$ we need the following inequality. For every positive $t$ there exists a constant $c$, such that for every $\ep<1/4$ we have $$ (1+\ep)^t \leqslant 1+c\ep. $$ This estimate is trivial since the function $\ep \mapsto ((1+\ep)^t -1)/\ep$ is continuous on the closed interval $[0, 1/4]$. Therefore, \begin{multline}\label{estint2} I_2 = \ili_{|y-x|>2r}\frac{(|y-x|^2+r^2)^{s/2} - |y-x|^s}{(|y-x|^2+r^2)^{s/2} \cdot |y-x|^s} \text{d}\mu(y) \\ \leqslant cr^2 \ili_{|y-x|>2r} \frac{\text{d}\mu(y)}{|y-x|^{s+2}} \leqslant cr^2 \ili_{0}^{(2r)^{-s-2}} \mu\{y\colon |y-x|<t^{-1/(s+2)}\}\text{d}t \\ \leqslant c_3\cdot c(x) \cdot r^2 \ili_{0}^{(2r)^{-s-2}} t^{-d/(s+2)}\text{d}t = c_4 \cdot c(x) \cdot r^{d-s}. \end{multline} Equality \eqref{eqqq} combined with estimates \eqref{estint1} and \eqref{estint2} imply the lemma. \end{proof} \subsection{Proof of Theorem \ref{dregularimpliessepar}} Set $$ \gamma_N:=\sum_{j=1}^N \frac{1}{|y^*-x_j|^s} = \inf_{y\in A}\sum_{j=1}^N \frac{1}{|y-x_j|^s}. $$ Since by Theorem \ref{landkofblabla} we have $U_s^{\mu_s}(x)\leqslant W_s(A)$ for every $x\in \R^p$, we deduce that \begin{equation}\label{erdest} \gamma_N \leqslant W_s(A) N . \end{equation} Setting $\nu(\omega_N):=\frac{1}{N}\sum_{j=1}^N \delta_{x_j}$, we obtain for $y\in A$ that $$ U_s^{\nu(\omega_N)}(y)\geqslant \frac{1}{N}\frac{\gamma_N}{W_s(A)} W_s(A) \geqslant \frac{1}{N}\frac{\gamma_N}{W_s(A)} U_s^{\mu_s}(y), $$ which by the domination principle for potentials (see \cite{ito64}) and Lemma \ref{potentialsecondterm} implies for $r:=N^{-1/d}$ that \begin{equation}\label{etomine} U_s^{\nu(\omega_N)}(y_r^*)\geqslant \frac{1}{N} \frac{\gamma_N}{W_s(A)} U_s^{\mu_s}(y^*_r) \geqslant \frac{1}{N} \frac{\gamma_N}{W_s(A)} \left(U_s^{\mu_s}(y^*) - c_1\cdot c(y^*) N^{-1+s/d}\right). \end{equation} By Theorem \ref{coralwaysequal} and the $\ell$-regularity of $A$ at $y^*$, $U_s^{\mu_s}(y^*)\geqslant W_s(A)$; thus, it follows from \eqref{erdest} and \eqref{etomine} that $$ U_s^{\nu(\omega_N)}(y_r^*) \geqslant \frac{\gamma_N}{N} - c_1 \cdot c(y^*) N^{-1+s/d}, $$ or $$ \sli_{j=1}^N \frac{1}{|y_r^*-x_j|^s} \geqslant \gamma_N - c_1 \cdot c(y^*) N^{s/d}. $$ Without loss of generality, we prove \eqref{antoshka} for $j=1$. Since $|y_r^*-x_1|\geqslant r=N^{-1/d}$ and $|y_r^*-x|\geqslant |y-x|$ for every $x\in A$, we have \begin{multline} \gamma_N - c_1 \cdot c(y^*) N^{s/d} \leqslant \sli_{j=1}^N \frac{1}{|y_r^*-x_j|^s} = \sli_{j=2}^N \frac{1}{|y_r^*-x_j|^s} + \frac{1}{|y_r^*-x_1|^s} \\ \leqslant \sli_{j=2}^N \frac1{|y^*-x_j|^s} + N^{s/d} = \sli_{j=1}^N \frac1{|y^*-x_j|^s} - \frac{1}{|y^*-x_1|^s} + N^{s/d} = \gamma_N -\frac{1}{|y^*-x_1|^s} + N^{s/d}. \end{multline} Therefore, $$ |y^*-x_1| \geqslant (c_1 c(y^*) + 1)^{-1/s} \cdot N^{-1/d}. $$ \hfill \qed \subsection{Proof of Proposition \ref{thnonint1}}\label{proofnonint1} The proof is immediate. We merely observe that, by Theorem \ref{therdel} we have for every $j=1,\ldots,N$, $$ c_1(s)N^{s/d}\geqslant \sli_{j=1}^N \frac{1}{|y^*-x_j|^s} \geqslant |y^*-x_j|^{-s}; $$ therefore, $$ |y^*-x_j|\geqslant c_1(s)^{-1/s}N^{-1/d}. $$ \hfill \qed \subsection{Proof of Corollary \ref{cornonint2}}\label{proofnonint2} We notice that the estimate \eqref{eqnonintgreedysepar} follows from Proposition \ref{thnonint1} and the fact that for every $j$ we have $$ \sli_{i=1}^{j-1}\frac{1}{|a^*_j-a^*_i|^{s}} = \inf_{y\in A}\sli_{i=1}^{j-1}\frac{1}{|y-a^*_i|^{s}}. $$ In view of inequality \eqref{pspsps} in Theorem \ref{thpotentiallast}, to deduce \eqref{eqnonintgreedycover} it is enough to show that the inequality \begin{equation}\label{pspsps222} \inf_{y\in A} \sli_{j=1}^N \frac{1}{|y-a^*_j|^s} \geqslant p_s N^{s/d} \end{equation} holds for some positive constant $p_s$ independent of $N$. For this purpose, observe that Theorem \ref{therdel} implies that for some positive $c$ that does not depend on $N$ we have, for $\omega_N=\{a_1^*, \ldots, a_N^*\}$, \begin{equation}\label{nezadavali} E_s(\omega_N)\geqslant c N^{1+s/d}. \end{equation} Hence, for every $j=1,\ldots, N$, $$ \sli_{i=1}^{j-1}\frac{1}{|a^*_j-a^*_i|^s}=\inf_{y\in A}\sli_{i=1}^{j-1}\frac{1}{|y-a^*_i|^s} \leqslant \sli_{i=1}^{j-1}\frac{1}{|a^*_N-a^*_i|^s}\leqslant \sli_{i=1}^{N-1}\frac{1}{|a^*_N-a^*_i|^s}, $$ and so $$ E_s(\omega_N) = 2\sli_{j=2}^N \sli_{i=1}^{j-1} \frac{1}{|a^*_j-a^*_i|^s} \leqslant 2N \sli_{i=1}^{N-1}\frac{1}{|a^*_N-a^*_i|^s} = 2N \inf_{y\in A}\sli_{i=1}^{N-1}\frac{1}{|y-a^*_i|^s}. $$ In view of \eqref{nezadavali}, we get $$ \inf_{y\in A}\sli_{i=1}^{N-1}\frac{1}{|y-a^*_i|^s} \geqslant c_2 N^{s/d}. $$ Applying this estimate for $N$ instead of $N-1$, inequality \eqref{pspsps222} follows with $p_s=c_2$. \hfill \qed \section{Some facts from the theory of pseudo-differential operators}\label{factspseudo} In order to prove Theorem \ref{thequil} we need some facts from the theory of pseudo-differential operators that we will need. We give a brief introduction to the results we need in this section. Let $\mathscr{S}(\R^d)$ be the class of Schwartz functions on $\R^d$ and $\mathscr{S}'(\R^d)$ be the set of tempered distributions. For an open set $\Omega$, we denote by $\mathscr{E}'(\Omega)$ the class of tempered distributions with compact support in $\Omega$. The Fourier transform is denoted by $\mathscr{F}$ and defined on $\mathscr{S}(\R^d)$ by the formula $$ \mathscr{F}(f)(\xi):=\ili_{\R^d} f(x) e^{-2\pi i x \xi}dx, \;\; f\in \mathscr{S}(\R^d). $$ We next introduce a class of functions (or {\it symbols}) that define standard pseudo-differential operators. \begin{defin} For a number $m\in \R$, we say that a function $p(x, \xi)\colon \Omega \times \R^d \to \R$ belongs to the class $S^m(\Omega)$ if $p\in C^\infty(\Omega \times \R^d)$ and for every compact set $K\subset \Omega$ and multi-indices $\alpha, \beta$ there exists a constant $C(K, \alpha, \beta)$ such that \begin{equation} |D^\alpha_\xi D^\beta_x p(x, \xi)| \leqslant C(K, \alpha, \beta) |\xi|^{m-|\alpha|}, \; \; x\in \Omega, \;\; |\xi|>1, \end{equation} where we use the notation $$ D^\alpha_\xi p(x,\xi) := \frac{\partial^{|\alpha|}}{\partial \xi^\alpha} p(x, \xi), \;\; D^\beta_x p(x,\xi) := \frac{\partial^{|\beta|}}{\partial x^\beta} p(x, \xi). $$ \end{defin} The Paley--Schwartz--Wiener theorem implies that if $f\in \mathscr{E}'(\R^d)$, then its Fourier transform $\mathscr{F}(f)$ is a function with $$ |\mathscr{F}(f)(\xi)|\leqslant C(1 + |\xi|)^N, \; \; \xi \in \R^d $$ for some positive constants $C$ and $N$. If $p$ belongs to $S^m(\Omega)$ and $f\in \mathscr{E}'(\Omega)$, then, for a fixed $x$, we can view $p(x, \xi)\mathscr{F}(f)(\xi)$ as a tempered distribution. We define an operator $P$ on $\mathscr{E}'(\Omega)$ by \begin{equation}\label{defofpseudodiff} P(f)(x):=\mathscr{F}^{-1}(p(x, \cdot)\mathscr{F}(f)(\cdot))(x), \; \; x\in \Omega. \end{equation} We further set $$ \Psi^m(\Omega):=\{P\colon p\in S^m(\Omega)\}, \;\;\; \Psi^{-\infty}(\Omega):=\bigcap_{m\in \R}\Psi^m(\Omega). $$ We continue with the definition of Sobolev spaces. For every $s\in \R$ and $p\in (1,\infty)$ set $$ W^{s,p}_0(\Omega):=\{f\in \mathscr{E}'(\Omega)\colon \mathscr{F}^{-1}\left[(1+|\xi|^2)^{s/2}\cdot \mathscr{F}(f)(\xi)\right]\in L^p(\R^d)\} $$ and $$ W^{s, p}_{loc}=\{f\in \mathscr{S}'(\R^d)\colon \varphi f\in W^{s, p}_0(\R^d) \; \; \text{for any}\;\; \varphi\in C_0^\infty(\R^d)\}. $$ As with the usual Sobolev spaces (i.e., with integer $s$), the following embedding property holds (see, e.g., \cite{Demengel} or \cite{DiNiezza}). \begin{theorem}\label{sobolevembeddind} Assume $\Omega$ is an open set in $\R^d$ with smooth boundary. If $sp>d$ and $f\in W^{s,p}_0(\Omega)$, then $f\in L^\infty(\Omega)$. \end{theorem} The following theorem about the action of pseudo-differential operators on Sobolev spaces can be found in \cite[Theorem 2.1]{Treves} or \cite[Theorem 2.1D]{Taylor1991}. \begin{theorem}\label{Treves21} If $P\in \Psi^m(\Omega)$ and $f\in W^{s,p}_0(\Omega)$, then $P(f)\in W^{s-m, p}_{loc}(\Omega)$. Moreover, if $P\in \Psi^{-\infty}(\Omega)$ and $f\in \mathscr{E}'(\Omega)$, then $P(f)\in C^\infty(\Omega)$. \end{theorem} We further discuss regularity properties of solutions of the equation $Pu=f$. We say that the function $p\colon \Omega\times \R^d\to \R$ is {\it elliptic of order $m$} if $p\in S^m(\Omega)$ and for every $x\in \Omega$ there are two positive constants $c(x)$ and $r(x)$, such that $$ |p(x, \xi)|\geqslant c(x)|\xi|^m, \; \; \mbox{for every $\xi$ with $|\xi|>r(x)$}. $$ The following theorem can be found in \cite[Corollary 4.3]{Treves}. \begin{theorem}\label{thparametrix} Let $p$ be an elliptic function of order $m$ and $P\in \Psi^m(\Omega)$ be the corresponding operator defined as in \eqref{defofpseudodiff}. Then there exist $Q\in \Psi^{-m}(\Omega)$ and $R\in \Psi^{-\infty}(\Omega)$ such that $$ QP = I+R, $$ where $I$ is the identity operator. \end{theorem} \section{Proof of Theorem \ref{thequil}}\label{sectionproofs2} The case $s=d-1$ is done in \cite{sjogren1972}, thus we focus on the case $s<d-1$. Since $A\subset \R^{d+1}$ is $d$-regular at $x_0$ and $s\in (d-1, d)$, we obtain from Theorem \ref{coralwaysequal} that $U_s^\mu(x) = W_s(A)$ for any $x\in A\cap B(x_0, r_1)$ for some $r_1>0$. Since $A$ is $C^\infty$-smooth at $x_0$, there exists a $C^\infty$-smooth map $\psi\colon \tilde{B}\to B(x_0, r_0)$ such that $\tilde{B}\subset \R^d$ is open. Without loss of generality, we assume $r_0<r_1/2$. Set \begin{equation}\label{temp321} \textup{d}\mu^1:=\mathbbm{1}_{B(x_0, r_0)} \textup{d}\mu_s, \;\;\;\;\; \mu^2:=\mu_s-\mu^1, \end{equation} and $$ \nu:=\mu^1 \circ \psi. $$ We notice that for $\tilde{x}\in \psi^{-1}(B(x_0, r_0/2))$ we have $$ U^{\mu^1}_s(\psi(\t x)) = W_s(A)-U_s^{\mu^2}(\psi(\t x)) $$ and the right-hand side is a smooth function. Therefore, $U^{\mu^1}(\psi(\t x))\in C^\infty(\psi^{-1}(B(x_0, r_0/2)))$. We further write \begin{equation}\label{glupiykorol} U_s^{\mu^1}(\psi(\t x)) = \ili_{B(x_0, r_0)} \frac{\textup{d}\mu^1(y)}{|y-\psi(\t x)|^s} = \ili_{\t B} \frac{\textup{d}\nu(\t y)}{|\psi(\t y)-\psi(\t x)|^s}. \end{equation} Our next goal is to write the Taylor formula for $|\psi(\t y)-\psi(\t x)|^{-s}$ when $\t y$ is in the neighborhood of $\t x$. Since $\psi\in C^\infty$, there exists a $C^\infty$ matrix $a(\t x)$ and a $C^\infty$ vector-valued function $w_1(\t x, \t y)$ such that $$ \psi(\t y)-\psi(\t x)=a(\t x)\cdot (\t y-\t x)+w_1(\t x, \t y) $$ and for some constant $C$ and any component $$ |w_1(\t x, \t y)|\leqslant C|\t x - \t y|^2, \;\; \|\nabla_{\t x}\; w_1(\t x, \t y)\|_\infty \leqslant C|\t x - \t y|, $$ where $\nabla_{\t x} w_1(\t x, \t y)$ is the matrix of gradients of $w_1$ in the first variable, and $\|\cdot \|_{\infty}$ is the $\ell^\infty$ matrix norm. Therefore, $$ |\psi(\t y)-\psi(\t x)|^2 = |a(\t x)\cdot (\t y - \t x)|^2 + w_2(\t x, \t y), $$ where $w_2$ is a real-valued $C^\infty$ function with $$ |w_2(\t x, \t y)|\leqslant C|\t x - \t y|^3, \; \; |\nabla_{\t x}\;w_2(\t x, \t y)|\leqslant C|\t x - \t y|^2. $$ If $r_0$ is small enough and $\t y, \t x\in B(x_0, r_0/2)$, then $$ \left| \frac{w_2(\t x, \t y)}{|a(\t x)\cdot (\t y - \t x)|^2}\right| \leqslant 1/2. $$ Consequently, \begin{equation}\label{trubadur} |\psi(\t y)-\psi(\t x)|^{-s}=|a(\t x)\cdot (\t y - \t x)|^{-s}\cdot \left(1+ \frac{w_2(\t x, \t y)}{|a(\t x)\cdot (\t y - \t x)|^2} \right)^{-s/2}. \end{equation} We notice that $$ w_3(\t x, \t y):=\frac{w_2(\t x, \t y)}{|a(\t x)\cdot (\t y - \t x)|^2} \in C^1 $$ with $|\nabla_{\t x}\; w_3(\t x, \t y)|$ bounded. Therefore, \eqref{trubadur} implies $$ |\psi(\t y)-\psi(\t x)|^{-s} = |a(\t x)\cdot (\t y - \t x)|^{-s} + w_4(\t x, \t y), $$ where $$ |w_4(\t x, \t y)|\leqslant C_1 |\t y - \t x|^{-s+1}, \; \; \; \; |\nabla_{\t x}\; w_4(\t x, \t y)|\leqslant C_2|\t y - \t x|^{-s}. $$ We plug this into \eqref{glupiykorol} to get $$ U_s^{\mu_1}(\psi(\t x)) = \ili_{\t B}\frac{\textup{d}\nu(\t y)}{|a(\t x)\cdot (\t y - \t x)|^{s}} + \ili_{\t B}w_4(\t x, \t y) \textup{d}\nu(\t y). $$ Since $$ \ili_{\t B}|\nabla_{\t x} w_4(\t x, \t y)|\textup{d}\nu(\t y) \leqslant C_2 \ili_{\t B} \frac{\textup{d}\nu(\t y)}{|\t y - \t x|^s} \leqslant C_3 \ili_{B(x_0, r_0)}\frac{\textup{d}\mu(y)}{|y - x|^s} \leqslant C_3 W_s(A), $$ we see that the function $\t x \mapsto \ili_{\t B}w_4(\t x, \t y) \textup{d}\nu(\t y)$ belongs to $W^{1, \infty}(\psi^{-1}(B(x_0, r_0/4)))$. Let $u$ be a Schwartz function equal to $1$ in $\psi^{-1}(B(x_0, r_0/4))$ and to $0$ outside of $\psi^{-1}(B(x_0, r_0/2))$. Then \begin{equation}\label{buratino} u(\t x) \ili_{\t B}\frac{\textup{d}\nu(\t y)}{|a(\t x)\cdot (\t y - \t x)|^{s}} = u(\t x)U_s^{\mu_1}(\psi(\t x))-u(\t x) \ili_{\t B}w_4(\t x, \t y) \textup{d}\nu(\t y) =: w(\t x) \in W_0^{1, \infty}(\R^d). \end{equation} We next show that the operator \begin{equation}\label{karabas} P\colon \nu \mapsto u(\t x) \ili_{\t B}\frac{\textup{d}\nu(\t y)}{|a(\t x)\cdot (\t y - \t x)|^{s}} \end{equation} is pseudo-differential. Namely, we use the Plancherel identity to obtain \begin{equation}\label{duremar} \ili_{\t B}\frac{\textup{d}\nu(\t y)}{|a(\t x)\cdot (\t y - \t x)|^{s}} = \ili_{\R^d} \mathscr{F}(\nu)(\xi) \overline{\mathscr{F}_{\t y}(|a(\t x)\cdot (\t y - \t x)|^{-s})(\xi)} \textup{d}\xi. \end{equation} By definition of the Fourier Transform, we have $$ \mathscr{F}_{\t y}(|a(\t x)\cdot (\t y - \t x)|^{-s})(\xi) = \ili_{\R^d} |a(\t x)\cdot (\t y - \t x)|^{-s} e^{-2\pi i \t y \xi}\textup{d}\t y. $$ Since the matrix $a(\t x)$ is a $d\times (d+1)$ matrix of rank $d$, we observe that the set $\{a(\t x)\cdot \t y\colon \t y \in \R^d\}$ is a $d$-dimensional linear subspace of $\R^{d+1}$. Take a rotation $R$ that maps this set to $\{y=(y(1), \ldots, y(d+1))\in \R^{d+1}\colon y(d+1)=0\}$ and an operator $T$ that maps the latter space to $\R^d$ by erasing the $(d+1)$'st coordinate. We make a change of variables $$ \t z=T\cdot R \cdot a(\t x)\cdot (\t y - \t x). $$ By definition of $T$ and $R$, we have $$ |\t z| = |T\cdot R \cdot a(\t x)\cdot (\t y - \t x)| = |a(\t x)(\t y - \t x)|, $$ and therefore, setting $b(\t x):=(T\cdot R\cdot a(\t x))^{-1}$, we get \begin{multline}\label{chichi} \mathscr{F}_{\t y}(|a(\t x)\cdot (\t y - \t x)|^{-s})(\xi) = \ili_{\R^d} |a(\t x)\cdot (\t y - \t x)|^{-s} e^{-2\pi i \t y \xi}\textup{d}\t y \\ = e^{-2\pi i \t x \xi}\ili_{\R^d} |\t z|^{-s} e^{-2 \pi i (b(\t x)\t z) \xi}|\det(b(\t x))|\textup{d}\t z = |\det(b(\t x))|e^{-2\pi i \t x \xi} \mathscr{F}(|\t z|^{-s})((b^t(\t x)) \xi)\\ =|\det(b(\t x))|e^{-2\pi i \t x \xi} |b^t(\t x) \xi|^{s-d}. \end{multline} We plug \eqref{chichi} into \eqref{duremar}: \begin{multline} \ili_{\t B}\frac{\textup{d}\nu(\t y)}{|a(\t x)\cdot (\t y - \t x)|^{s}} = \ili_{\R^d} \mathscr{F}(\nu)(\xi)|\det(b(\t x))|\cdot |b^t(\t x) \xi|^{s-d} e^{2\pi i \t x \xi} \textup{d}\xi\\ = \mathscr{F}^{-1}\Big(\mathscr{F}(\nu)(\xi)|\det(b(\t x))|\cdot |b^t(\t x) \xi|^{s-d}\Big)(\t x). \end{multline} Setting $$ p(\t x, \xi):=u(\t x)|\det(b(\t x))|\cdot |b^t(\t x) \xi|^{s-d}, $$ we obtain that the operator $P$ defined in \eqref{karabas} is an elliptic pseudo-differential with symbol $p\in S^{s-d}(\tilde{B})$. We apply Theorem \ref{thparametrix} to equation \eqref{buratino}. Since $P\nu = w$, we get \begin{equation}\label{temptemp} \nu + R\nu = Qw, \; \; \; \; R\nu \in C^\infty(\tilde{B}). \end{equation} Further, since $w\in W^{1, \infty}_0(\tilde B)$, we get from Theorem \ref{Treves21} that $Qw\in W^{1+s-d, p}_{loc}(\tilde {B})$ for any $p>1$. By Theorem \ref{sobolevembeddind}, we obtain that $Qw \in L^\infty\Big(\psi^{-1}(B(x_0, r_0/4))\Big)$, and from \eqref{temptemp} we get $\nu\in L^\infty\Big(\psi^{-1}(B(x_0, r_0/4))\Big)$. Since the measure $\mu_1$ defined in \eqref{temp321} is an image of $\nu$ under a smooth map $\psi^{-1}$, we deduce that for $r<r_0/4$ $$ \mu(B(x_0, r))= \nu(\psi^{-1}(B(x_0, r))) \leqslant C_1 \mathcal{H}_d(\psi^{-1}(B(x_0, r))) \leqslant C_2 r^d. $$ \hfill \qed
\section{Introduction} Galactic winds, driven by star formation or active galactic nuclei (AGN), are arguably the most important feedback processes in galaxy formation and evolution \citep{veilleux05}. Without incorporating outflows, galaxy formation models predict galaxy star formation rates (SFRs) much higher than those observed; large-scale outflows remove gas content and therefore suppress the SFRs of galaxies (e.g. \citealt{cole00,springel03,keres09} and references therein). Outflows from galaxies also drive metal-enriched gas out into the surrounding medium and are therefore thought to be responsible for the heavy elements present in the circumgalactic medium \citep{tumlinson11,werk13}. Galactic winds are ubiquitous in local galaxies with a high SFR surface density ($>0.1$M$_\odot$ yr$^{-1}$ kpc$^{-2}$), with outflow velocities seemingly correlated with specific SFR ($\dot{\text{M}}/\text{M}_*$; \citealt{heckman90,grimes09}) or circular velocity (e.g. \citealt{heckman15}). The discovery of powerful winds in high-redshift galaxies (e.g. \citealt{pettini00,steidel10,genzel11,newman12, genzel14}) further implicates wind-related feedback processes as key to the chemical and thermal evolution of galaxies and the intergalactic medium (IGM). The galactic fountain model of \cite{shapiro76} describes how outflows with velocities less than the escape velocity will eventually fall back onto the galactic disk, resulting in the circulation of matter through disk-halo interactions. Disk-halo interactions include outflows from star forming regions \citep{normandeau96}, and cool clouds falling back into the disk from the halo \citep{pietz96}. The chimney model of \cite{norman89} suggests more localised outflows than the fountain model. Neutral hydrogen super-shells are driven by stellar winds and supernova activity and leave relative `holes' where the stars were. If the super-shells are sufficiently energetic, they can break through the gas layers of the disk, resulting in a chimney shaped structure. Such chimneys would provide an unobstructed route for photons to escape the disk and ionize gas at large scale heights. Magnetic fields would also follow these chimneys or filaments, allowing cosmic rays (CRs) to be more easily advected into the halo. CRs provide an important additional pressure on the gas, thereby helping to drive gas into the halo. Recent simulation papers such as \cite{uhlig12}, \cite{booth13}, \cite{salem14}, \cite{girichidis16}, \cite{simpson16}, \cite{ruszkowski16} and \cite{weiner16} explore the importance of CRs in driving winds in star-forming galaxies. CR-driven winds are able to explain outflows with a low velocity ($\sim$20 km s$^{-1}$) and correspondingly low SFR surface densities (below 0.1 M$_\odot$yr$^{-1}$kpc$^{-2}$). CR energy is not dissipated as fast as thermal energy. CR pressure is able to act over larger distances than thermal pressure, thus helping to drive winds where a thermal wind alone would fail \citep{everett08}. On the other hand, CR pressure is relatively inefficient at driving winds from the galactic mid-plane compared to gas pressure when the wind is sub-Alfv\'{e}nic \citep{everett08}. Thus, a mixture of thermal pressure, to efficiently launch the wind and CR pressure, to efficiently drive the wind to large radii, would be desirable for expelling gas from a galaxy. Edge-on galaxies provide the best view of extraplanar gas at the interface between a galaxy disk and halo. Observations of nearby edge-on galaxies show that gas, dust and CRs exist above and below the disk \citep{beuermann85, madsen05, irwin06, popescu04}. H$\alpha$ narrow band imaging has revealed strong starburst-driven winds in galaxies such as M82 \citep{axon78,bland88} and NGC 253 \citep{westmoquette11}, which have bipolar structures centred on a central starburst and extending several kiloparsecs in disk height. Studies have also revealed that extended diffuse emission and filamentary structures are common in nearby galaxies: More than $50$\% of galaxies have extraplanar diffuse emissions from 1-2 kpc to even 4 kpc above the disk \citep{rossa00,rossa03, miller03}. However, halos are intrinsically faint (low surface brightness) emitters, rendering them hard to detect (e.g. \citealt{hummel91}). Radio continuum emission that extends along the minor axis of edge-on spiral galaxies to form a ``thick disk'' has been detected in nearby galaxies such as NGC 4565, NGC 5909 \citep{hummel83}, NGC 5775 \citep{duric98}, NGC 3044 \citep{sorathia94} and NGC 3556 \citep{bloemen93}. \cite{krause11} measured the vertical scale heights of the radio emission at 6 cm for five edge-on galaxies and found they all had similar vertical scale heights for the thin and thick disks, with a mean thick-disk scale height of 1.8$\pm0.2$ kpc. X-shaped magnetic fields in the thick disk/halo were also detected for 8 edge-on galaxies spanning a range of Hubble types and SFRs 0.6$\leq SFR \leq$7.3 M$_\odot$ yr$^{-1}$ \citep{krause11}. The strength of the X-shaped fields can be explained by models including a galactic wind \citep{krause11}. Biconical outflows were also predicted by the CR-driven models of \cite{salem14}. At optical wavelengths, high resolution spectroscopy can be used to identify shocks from galactic winds in galaxies \citep{veilleux05}. Emission-line ratios typical of shock excitation (e.g. [N{\small II}] /H$\alpha>1$) indicate winds in the absence of AGN activity. Studies of local galaxies show that outflows are usually associated with interstellar shocks that excite optical line emission, enhancing line ratios such as [N{\small II}] /H$\alpha$, [S{\small II}] /H$\alpha$ and [O{\small I}] /H$\alpha$ \citep{rich10,rich11,soto12,sotomartin12}. For inclined galaxies, one can use the excitation contrast in the shock-excited wind material and the star-forming disk to search for and detect galactic winds (e.g. \citealt{veilleux02}). Samples of a few tens of galactic wind galaxies have been studied using slit spectroscopy and narrow-band imaging (e.g., \citealt{heckman90,veilleux03,veilleux05}). Integral field spectroscopy (IFS) is an ideal tool for investigating galactic winds, allowing spatially resolved kinematic and excitation information to be obtained simultaneously. The use of optical diagnostic diagrams with spatially resolved data can allow the separation of winds driven by starbursts from those driven by AGN \citep{sharp10}. Therefore, IFS of highly-inclined galaxies is an excellent method for identifying wind signatures in star-forming galaxies and studying disk-halo interactions in more detail. We draw optical IFS data from an on-going multiplexed integral field unit (IFU) survey: the Sydney-AAO Multi-object Integral-field spectrograph (SAMI) Galaxy Survey \citep{croom12,bryant15}. The ability of SAMI to detect galactic winds in star-forming galaxies has already been demonstrated by \cite{fogarty12} and \cite{ho14}. The high spectral resolution of SAMI (R$\approx$4500 in the red arm) allowed \cite{ho14} to decompose the spectral lines from a moderately inclined disk galaxy (i=43$^\circ$) into three separate kinematic components having different velocities, velocity dispersions and line ratios; one of the components traced a bipolar outflow. A sample of 40 star-forming edge-on galaxies in the SAMI survey was studied by \cite{ho16}. \cite{ho16} found large-scale winds preferentially in galaxies with high star formation rate (SFR) surface densities and recent bursts of star formation. Low frequency (1.4 GHz) radio observations are sensitive to the synchrotron emission resulting from CR electrons in the presence of a magnetic field. Using radio images from the Faint Images of the Radio Sky at Twenty-centimetres (FIRST) survey, we can test which conditions enable CRs to escape to the largest disk heights. Following the work of \cite{ho16}, we discuss six edge-on star-forming galaxies in the SAMI Galaxy Survey that show evidence for low velocity outflows and have strong radio continuum emission. The paper is structured as follows. In Section \ref{sample} we discuss our sample selection, detail our observations, data reduction, and spectral analysis. We analyse emission line ratio maps, velocity and velocity dispersion maps in Section \ref{analysis}. We also employ the gas kinematic classification developed in \cite{ho16} to identify wind-dominated galaxies. In Section 4 we present the FIRST maps of the galaxies and discuss the extent of the radio emission and the location of our sample with respect to the radio-far-infrared relation. We discuss our results in the context of disk-halo interactions in Section \ref{discussion}. Finally, we give our conclusions in Section 6. Throughout this paper we assume a (h,$\Omega_m, \Omega_\Lambda$) = (0.7,0.3,0.7) Cosmology and a Salpeter initial mass function. \section{Sample}\label{sample} \subsection{SAMI Galaxy Survey data} To investigate disk-halo interactions in star-forming galaxies, we identify edge-on galaxies observed by the SAMI Galaxy Survey that have measured radio continuum emission. The SAMI Galaxy Survey covers a broad range in stellar mass and environment. Full details of the target selection can be found in \cite{bryant15}. Briefly, the SAMI Galaxy Survey includes four volume-limited samples based on pseudo-stellar mass cuts all selected from the Galaxy and Mass Assembly (GAMA) project \citep{driver11}. To extend the survey sample to high density environments, 8 clusters with virial masses $>10^{14}$ M$_\odot$ are also targeted by the survey \citep{owers17}. SAMI-GAMA targets cover 0.004 $<$ z $<$ 0.095, Petrosian r-band magnitudes $<$ 19.8, and a stellar mass range of $10^7-10^{12}$ M$_\odot$. The GAMA regions were selected because of the deep spectroscopy down to r$<$ 19.8 mag of $\sim$300 000 galaxies, and the vast array of ancillary data available, including $ugrizYJHK$ images through to radio bands. IFS observations were performed using SAMI \citep{croom12} and are described in Table \ref{observations}. SAMI is mounted at the prime focus on the Anglo-Australian Telescope that provides a 1 degree diameter field of view. SAMI uses 13 fused fibre bundles (hexabundles, \citealt{bryant14,blandhawthorn11,bryant11}) with a high (75\%) filling factor. Each bundle contains 61 fibres of 1.6 arcsec diameter resulting in each IFU having a diameter of 15 arcsec. The IFUs, as well as 26 sky fibres, are plugged into pre-drilled plates using magnetic connectors. SAMI fibres are fed to the double-beam AAOmega spectrograph \citep{sharp06}. The SAMI Galaxy Survey uses the 570V grating at 3700-5700\AA~ giving a resolution of R=1730 ($\sigma$=74 km s$^{-1}$), and the 1000R grating from 6250-7350\AA~ giving a resolution of R=4500 ($\sigma$=29 km s$^{-1}$). The data were reduced using the SAMI data reduction pipeline described in \cite{sharp15}, \cite{allen15}, and Green et al. (in prep). Final SAMI data products are sampled to a grid with square pixels 0.5 arcsec wide. The seeing conditions of our observations are measured from reduced data cubes of a calibration star observed simultaneously with the science targets. As described in \cite{allen15}, the spatial point spread function (PSF) of the SAMI data cubes is primarily determined by the atmospheric conditions at the AAT. A 2D Moffat distribution was fit to the red cube of the calibration stars to provide an estimate of the seeing disk. We note that the PSF profile is a function of wavelength, with larger seeing disks on average towards the blue. We report the FWHM of the resulting fits in Table \ref{observations}. \subsection{FIRST radio data} To investigate the relationship between CR electrons and their host galaxies, we select SAMI targets that have strong 1.4 GHz radio continuum emission. Synchrotron emission from the CR electrons in a galaxy will dominate the radio emission of star forming galaxies at frequencies lower than $\sim$30 GHz \citep{condon92}. The non-thermal synchrotron component comprises $\sim90\%$ of the radio emission at 1.4 GHz for star forming galaxies \citep{condon92}. Cosmic rays can travel 1 to 3 kpc during their lifetime in a galaxy disk or filament respectively \citep{collins00}. Detecting CRs at heights $>3$ kpc above a galaxy disk could be an indication of a galactic wind or chimney.\footnote{The presence of a radio-jet can also result in radio emission $>3$ kpc away from a galaxy disk. Jets and galactic winds can be differentiated via their radio morphology.} We draw radio continuum data from the Faint Images of the Radio Sky at Twenty-centimetres (FIRST; \citealt{becker95}) survey, a 1.4 GHz continuum survey carried out by the National Radio Astronomy Observatory (NRAO) with the Very Large Array (VLA). The FIRST survey was conducted in the B-configuration of the VLA, and thus has a resolution of $\sim$5.4 arcsec. At the 1 mJy source detection threshold, the survey is 80\% complete and has $\sim$90 sources per square degree, $\sim$35\% of which have resolved structure on scales from 2-30 arcsec. A publicly available source catalogue\footnote{ http://sundog.stsci.edu/first/catalogs.html} includes peak and integrated flux densities and sizes derived from fitting a two-dimensional Gaussian profile to each source. The astrometric uncertainty of the sources is 1 arcsec. \subsection{Cross-matched sample} We positionally cross-matched potential SAMI targets with radio surveys FIRST and NVSS (NRAO VLA Sky Survey; \citealt{condon98}). Radio contours were overlaid on optical images to visually confirm matches. We find that $\sim$4\% of the 5546 potential SAMI targets in the GAMA regions have associated radio sources in either survey, with approximately two thirds of these being optically classified as star forming using the \cite{kewley01} classification and GAMA single fibre spectroscopy \citep{hopkins13}. Due to sensitivity limits, FIRST primarily detects luminous galaxies with radio-SFRs $\gtrsim$ 1 M$_\odot$ yr$^{-1}$, that corresponds to galaxies more massive than 10$^{9.5}$M$_\odot$. The FIRST catalogue only contains galaxies with a high surface brightness, likely biasing our radio-selected sample towards a larger fraction of wind-dominated galaxies, because wind activity is thought to correlate with SFR surface density \citep{ho16,heckman90}. \subsection{Selection criteria} Galaxies dominated by AGN were removed from the sample using the GAMA spectra \citep{liske15} or central SAMI spectra which probes the central 2 arcsec of the galaxies and the \cite{kewley06} classification scheme. However, some radio-AGN do not show strong optical AGN signatures \citep{sadler02,ivezic02}, so the removal of optically-luminous AGN does not necessarily mean that our sample is free of radio AGN. Thirty star forming galaxies, observed with SAMI as of June 2016, remain after removing AGN-host galaxies. For our analysis of disk-halo interactions, we make cuts on galaxy size and inclination. Effective radii (r$_e$) and ellipticity were measured from S\'{e}rsic profile fits to reprocessed SDSS (Sloan Digital Sky Survey; \citealt{york00,stoughton02}) $r$ band images by the GAMA team \citep{kelvin12}. To observe gas excitation above and below the disk, we require the galaxy effective radius to be less than the size of the SAMI IFUs, 15 arcsec (this excludes one galaxy, GAMA 204799). Galaxy inclination is determined using the galaxy minor-to-major axis ratio, $b/a$. We apply a cut to only include edge-on galaxies using the criteria $\frac{b}{a} \leq 0.35$. This corresponds to an inclination angle $i$ = 73$^\circ$ calculated using the \cite{hubble26} formula $$\cos^2(i)=\frac{(\frac{b}{a})^2-q_0^2}{1-q_0^2},$$ where $q_0=0.2$ is related to the intrinsic flattening of the distribution of light of galacic spheroids. Additionally, GAMA 504713 was excluded from the analysis due to the poor fit of a single-S\'{e}rsic profile to the $r$-band photometry ($\chi^2\approx 2$). \subsection{The Sample} Our selection resulted in a sample of six edge-on, star-forming, radio continuum detected galaxies for which CR pressure could play an important role in driving disk-halo interactions. The six nearby edge-on galaxies in our sample, with GAMA catalogue identifications 551202, 417678, 593680, 600030, 376293, and 227607 (which we will refer to hereafter as Galaxies 1 to 6 respectively) are shown in Figure \ref{maps}. Row A contains SDSS \textit{gri} composite images with the SAMI hexabundle field of view (15 arcsec in diameter) overlaid. The dust lanes and stellar bulges of Galaxies 1, 3, 4, 5, and 6 can be seen in the optical images. \begin{table*} \caption{Information from the GAMA second public data release and on the SAMI observations of the six galaxies in our sample.}\label{observations} \begin{tabular}{|cc|ccccc|cc|cc|} \hline ID & GAMA ID & RA & Dec & z & $r_e^{(1)}$ & $i^{(2)}$ &log($\frac{M_*}{M_\odot}$)$^{(3)}$&SFR$^{(4)}$& Date Obs $^{(5)}$ &FWHM$^{(6)}$\\ & & & & &arcsec& $^o$ & & M$_\odot$ yr$^{-1}$ & & arcsec\\ \hline 1& 551202 & 09:17:28.99 & -00:37:14.1 & 0.0165 & 12.69&78.5 &9.967 & 4.59 & 04 Apr 2014 & 1.85\\ 2&417678 & 08:50:57.17 & +02:20:46.2 & 0.0405 & 4.33 &90.0 &10.11 & 10.13 & 06 Apr 2014 & 2.29 \\ 3&593680 & 14:29:46.05 & -00:09:08.6 & 0.0300 & 11.53&90.0 &10.411& 1.90 & 14 \& 16 Apr 2013& 2.18\\ 4& 600030 & 08:53:58.68 & +00:21:00.1 & 0.0292 & 8.27&73.0 &10.237 & 5.10 & 13 Mar 2013&1.60 \\ 5& 376293 & 08:51:11.41 & +01:30:06.1 & 0.0605 & 6.96 &82.2 &10.65 & 2.25 & 25 Jan 2015 & 2.72\\ 6&227607 & 14:17:17.86 & +01:09:22.4 & 0.0545 & 10.69&76.0 &10.75 & 2.30 & 23 May 2015 &1.61\\ \hline \end{tabular} $^{(1)}$Effective radii and $^{(2)}$inclination angle from the $r$ band photometry \citep{kelvin12}. $^{(3)}$ GAMA stellar masses (M$_*$/M$_\odot$) \citep{taylor11}. $^{(4)}$ GAMA H$\alpha$ Star-formation rates \citep{hopkins13}. $^{(5)}$ The date(s) the target was observed with SAMI. $^{(6)}$The effective seeing of the SAMI observation. \end{table*} \subsection{Spectral analysis}\label{specanal} We use the spectral fitting pipeline \textsc{lzifu} \citep{ho16b} to extract the emission line fluxes and kinematic information from the SAMI data cubes for each galaxy. On a spaxel-by-spaxel basis, the continuum is modelled and subtracted and the emission lines are fit to the resulting spectrum. \textsc{lzifu} uses the penalized-pixel fitting routine (\textsc{ppxf}; \citealt{cappellari04}) to model the continuum spectrum using spectral synthesis models. We use templates from \cite{gonzalezdelgado05} made with Padova stellar evolutionary tracks, three metallicities, Z=0.004, 0.008 and 0.019 (solar), and 24 ages ranging from 0.004 to 11.220 Gyr. Once the continuum is subtracted, we fit 11 strong optical lines simultaneously: [O{\footnotesize II}] 3726,29, H$\beta$, [O{\small III}]~4959,5007, [OI]6300, [N{\small II}]~6548,84, H$\alpha$ and [S{\small II}]~6716,31. Emission lines are fit with a single Gaussian component at each spaxel using the \textsc{mpfit} package, which performs a least-squares analysis using the Levenberg-Marquardt algorithm \citep{markwardt09}. The ability of \textsc{lzifu} to fit multiple Gaussian components to the emission line spectra is most useful where any outflowing component would be superimposed along our line of sight with the disk, such as for a face-on galaxy. For our edge-on sample, a one-component fit was preferred to a two component Gaussian fit based on the F-test and confirmed through visual inspection in the extraplanar regions. We thus use \textsc{lzifu} to only fit a single Gaussian per emission line. Spaxels located outside of 1 effective radius have mean reduced $\chi^2$ $\leq 1$ for all six galaxies ( reduced $\chi^2 =$ 0.919, 1.11, 0.905, 0.935, 0.965, 0.963 for galaxies 1 to 6 respectively). By fitting all lines simultaneously, every line is constrained to share the same velocity and velocity dispersion. The H$\alpha$ flux maps of all six galaxies are shown in row B of Figure \ref{maps}. The H$\alpha$ emission traces the recent ($<$10 Myr) star formation activity (but it also suffers from dust extinction). \section{Optical signatures of disk-halo interactions}\label{analysis} In this section, we present our analysis of the emission line and gas kinematic properties of our galaxies. \subsection{Emission line ratio maps} We examine maps of the [S{\small II}]$\lambda$6716,31 doublet (hereafter [S{\small II}] ) to H$\alpha$ flux ratio in row C of Figure \ref{maps} as a first step towards understanding the processes at work in the galaxies. The [S{\small II}] /H$\alpha$ ratio is sensitive to metallicity and ionization parameter \citep{kewley02,denicolo02,pettini04,kewley08} and has the advantage of not requiring reddening corrections. The [S{\small II}] /H$\alpha$ ratio can be excited by interstellar shocks (e.g. \citealt{shull79,farage10,rich10}). All six galaxies show the same trend: above and below the disk, the [S{\small II}] /H$\alpha$ ratio increases Higher ratios in the outer regions usually correspond to shocked regions, as seen by \citealt{veilleux02}, \citealt{rich10}, \citealt{monrealibero06}, \citealt{sharp10}, \citealt{rich11}, and \citealt{fogarty12}. The [N{\small II}] /H$\alpha$ line ratios, and [O{\small I}] /H$\alpha$ line ratio (see Figures \ref{lvdisp} and \ref{BPTs}) also follow the same trend as the [S{\small II}] /H$\alpha$ maps, with line ratios increasing with distance from the disk for all six galaxies. Spiral galaxies with a layer of vertically extended diffuse ionised gas (eDIG) also show a rise in [N{\small II}] /H$\alpha$ and [S{\small II}] /H$\alpha$. Diffuse ionized gas is a warm (10$^4$K), low density (10$^{-1}$cm$^{-3}$), ionized medium, known in our own galaxy as the Reynolds layer \citep{reynolds93}. There is a lack of consensus in the literature on how to explain the emission properties of eDIG \citep{domgorgen94,veilleux95, blandhawthorn97, rand98, otte99, tullmann00}. The ionization state of eDIG is generally compatible with the ionising flux from stellar sources (O and B stars), hardened by photoelectric absorption \citep{hoopes03, rossa03,oey07,haffner09,blanc09}. However, some observations could be more consistent with shocks \citep{shull79}, turbulent mixing layers \citep{slavin93}, or cosmic ray heating \citep{ hartquist86, parker92}. Increased [S{\small II}] /H$\alpha$ and [N{\small II}] /H$\alpha$ ratios could be explained by increasing the ionization parameter in pure photoionization models. However, the [S{\small II}] /[N{\small II}]~ ratio is sensitive to the ionization parameter, and consequently would be required to decrease with disk height \citep{rand98,domgorgen94, blandhawthorn97}. We show the [S{\small II}] /[N{\small II}]~ line ratios for our six galaxies in row G of Figure \ref{maps}. Only spaxels with signal-to-noise ratio (S/N) $>$5 in both lines have been included. In the case of Galaxies 4, 5, and 6, the signal-to-noise cut removes most of the extraplanar emission. However, the [S{\small II}] /[N{\small II}]~ ratio is not seen to decrease with disk height, which would be required if a change in ionization parameter was causing the increased [S{\small II}] /H$\alpha$ and [N{\small II}] /H$\alpha$ observed. In the centre of Galaxy 3 there is a decrease in [S{\small II}] /[N{\small II}]~ ratio which corresponds to an increase in ionization parameter. This region is biconical in shape and could be due to shocked outflowing gas. A similar, although less pronounced, decrease in the central line ratios for Galaxy 6 and Galaxy 2 is also seen. There is an unusual partially resolved region in Galaxy 4 with low [S{\small II}] /[N{\small II}]~ ratio (high ionization parameter), spatially coincident with an HII region (as traced by H$\alpha$). This region could correspond to recent star formation and supernovae activity. The varying [S{\small II}] /[N{\small II}]~ ratio in the galaxies in our sample suggests that the enhanced extraplanar emission line ratios are not caused by photoionization alone. \begin{figure*} \centering \includegraphics[width=\linewidth]{figure1a.pdf} \includegraphics[width=\linewidth]{figure1.pdf} \caption{Each column represents the properties of one galaxy. Row A shows 1$'\times$1$'$ Sloan Digital Sky Survey \textit{g r i} composite images with the SAMI hexabundle field of view (15 arcsec in diameter) overlaid. Row B shows the log of the total H$\alpha$ flux (in units of 10$^{-16}$erg s$^{-1}$cm$^{-2}$). Row C shows maps of log([S{\small II}] /H$\alpha$). In all six galaxies, the line ratios increase with distance from the disk. Row D shows maps of log([S{\small II}]/[N{\small II}]). Row E shows maps of velocity dispersion, $\sigma$ (in km s$^{-1}$). Row F shows velocity maps (in km s$^{-1}$). All galaxies show clear signs of rotation. Row G shows velocity residual maps, obtained by reflecting the velocity field about the major axes and subtracting the reflected map from the original map shown in row F. Black ellipses represent 1 effective radius padded by 1 arcsecond, $\tilde{r_e}$). In all panels, only spaxels with $S/N \geq 5$ in relevant properties are shown. White bars at the bottom of the maps of SAMI data indicate 5 kpc in projection at the redshift of each galaxy. The effective seeing disk of each observation is represented by a white circle at the bottom right of the maps. }\label{maps} \end{figure*} \subsection{Optical diagnostic diagrams} Line ratios such as [N{\small II}] /H$\alpha$, [S{\small II}] /H$\alpha$, [O{\small I}] /H$\alpha$ and [O{\small III}] /H$\beta$ are sensitive to the hardness of the ionizing radiation field and therefore provide key diagnostics of the ionizing power sources in a galaxy. Diagnostic diagrams using these ratios were first employed by \cite{baldwin81} and \cite{veilleux87} to classify the dominant energy source of a galaxy. These standard optical diagnostic diagrams for the six galaxies in our sample are shown in Figure \ref{BPTs}. We include emission line fluxes with S/N$>$5 in all relevant lines. In all three diagnostic diagrams, emission due to photoionization by H\textsc{II} regions results in line ratios which lie on the lower-left hand side of the diagrams. The observed dashed curve in the [N{\small II}]~ diagnostic separates purely star forming objects (below the curve) from composite objects containing both star formation and Seyfert 2/LINER-like activity and was derived by \cite{kauffmann03} using the SDSS sample. The dashed line on the [S{\small II}] /H$\alpha$ and [O{\small I}] /H$\alpha$ diagnostics represents an empirically derived boundary between Seyfert 2s and LINERs \citep{kewley06}. Shock excitation can cause enhanced line ratios, moving the diagnostic towards the LINER region \citep{rich10,rich11}. Insets in Figure \ref{BPTs} show maps of the classification regions, made using the same colour coding as the data in the diagrams. All six galaxies have spaxels lying near the purely star forming region, as well as spaxels branching into the composite region. Galaxy 1 shows data consistent with an abundance sequence following the curve from high [O{\small III}] /H$\beta$ and low [N{\small II}] /H$\alpha$, corresponding to low abundances, to regions of lower [O{\small III}] /H$\beta$ and higher [N{\small II}] /H$\alpha$ consistent with higher abundances. The galaxy also shows evidence for a second branch where both [O{\small III}] /H$\beta$ and [N{\small II}] /H$\alpha$ increase together, and also with the disk height as shown in the inset. This second trend can be interpreted as a shock mixing sequence, with shock excitation having an increasing contribution to the emission with increasing line ratios. Galaxy 4 also shows evidence for both star forming and shock mixing sequences, particularly in the [S{\small II}]~ diagnostic, as does Galaxy 6. Galaxies 2 and 3 show evidence for a single sequence of shock-mixing. Extended LINER-like emission line ratios can be explained by shock models \citep{allen08, rich10,rich11}, however, they could also be due to other mechanisms such as hot evolved post-AGB stars (see \citealt{Belfiore2016} and references therein). Based on the stacking analysis of \cite{ho16b} (see their figures 12-14), we believe the increase in emission line ratios with galaxy disk height is a true behaviour in galaxies 1-3, not an artefact of our S/N cut. The composite and LINER-like emission ratios in the galactic winds in galaxies 1-3 results can be explained by wind activity causing shock excitation. A limiting factor in the optical diagnostic diagrams is the low S/N of the [O{\small III}]/H$\beta$ ratio. In Figure \ref{lvdisp}, we compare the [N{\small II}]/H$\alpha$, [S{\small II}]/H$\alpha$, and [O{\small I}]/H$\alpha$ line ratios to their corresponding velocity dispersions. Compared to Figure \ref{BPTs}, more data are shown because we are no longer discarding spaxels with weak H$\beta$ emission that do not meet our S/N criterion. \begin{figure*} \includegraphics[width=0.7\linewidth]{bpt.pdf} \caption{Emission line ratio diagnostic diagrams of each spaxel in each galaxy. Black solid curves form an upper limit for star-forming galaxies as derived by Kewley et al. (2001). The dashed line on the [N{\small II}]~ diagram is the empirical Kauffmann et al. (2003) boundary below which galaxies are classified as star-forming. The dashed lines on the [S{\small II}]~ and [O{\small I}]~ diagrams were derived by Kewley et al. (2006) to empirically separate Seyfert 2 galaxies and LINERs. In the leftmost panel, NLAGN represents narrow emission-line AGN (Seyfert 2 plus LINERs); Comp represents starburst-AGN composites. We apply a minimum S/N cut of 5 in every diagnostic line. The spaxels in each diagram reflect a mix of ionization sources, with spaxels branching from the star-forming regions to the LINER/shocked regions on the diagrams. The insets map the location of the spaxels included in each diagnostic diagram with the same colour coding as their respective diagram. Ellipses show $r_e$ as determined from the r-band photometry. }\label{BPTs} \end{figure*} \subsection{Gas kinematic properties}\label{kinematic} Gas kinematics were derived at each spaxel using a single Gaussian fit to all emission lines simultaneously with \textsc{lzifu}. Figure \ref{maps} rows E and F show the fitted emission line velocity dispersion and velocity. The velocity dispersion maps show that emission lines tend to broaden away from the disk. This broadening could be due to expanding shock fronts that are too small to spatially resolve or due to two distinct velocity components that we are unable to resolve in our spectra. The extraplanar gas is still rotating in the same sense as the disk. \cite{ho16} empirically determined criteria to differentiate edge-on galaxies dominated by large-scale winds from galaxies whose extraplanar emission is dominated by other processes such as diffuse ionized gas or satellite accretion. The criteria involve the asymmetry of the velocity field and the velocity dispersion of the extraplanar gas. Strong disk-halo interactions driven by winds do not have a perfectly symmetric velocity field (e.g. \citealt{shopbell98,sharp10,westmoquette11}). The asymmetry of the velocity field is calculated from the velocity map by reflecting the map over the galaxy major axis. A difference map is constructed by subtracting the reflected velocity from the original velocity map. We show this difference map in row G of Figure \ref{maps}. The standard deviation of the difference maps, weighted by the error on the velocities, gives an estimate of the asymmetry between the two sides of the disk. We only use the difference maps at locations greater than 1 effective radius (shown as a dotted ellipse), where gas entrained in a wind is expected to be an important kinematic component. Following \cite{ho16}, we increase the $r_e$ used by 1 arcsec (denoted as $\tilde{r_e}$) to reduce the effect of beam smearing. The asymmetry parameter is denoted $\xi$, and is defined in Equations 1 and 2 of \cite{ho16}, repeated here: \begin{equation} \xi = \frac{\xi_+ +\xi_- }{2} \end{equation} where, \begin{equation} \xi_{+/-} = \underset{r_{+/-} > \tilde{r_{e} }}{\text{std}} \left( \frac{v_{gas} - v_{gas, flipped}}{\sqrt{\text{Err}(v_{gas})^2 + \text{Err}(v_{gas,flipped})^2}}\right) \end{equation} The ratio of gas velocity dispersion to rotation is the second parameter used to identify wind galaxies in \cite{ho16}. We utilise the parameter $\eta_{50}$, the ratio of the median velocity dispersion of all spaxels outside 1 $\tilde{r_e}$ with S/N of H$\alpha >5$ to the rotational velocity of the galaxy, $v_{rot}$. Because our SAMI observations do not have sufficient spatial coverage to probe the maximum rotational velocity, we have used the stellar mass Tully-Fisher relation of \cite{bell01} to estimate $v_{rot}$ as in \cite{ho16}. Values for the two empirical parameters $\xi$ and $\eta_{50}$ are given in Table \ref{params} for our edge-on galaxy sample. \cite{ho16} empirically classified galaxies as being wind-dominated when $\eta_{50}>0.3$ and $\xi>1.8$. Using these constraints, we indicate whether or not our galaxies are wind-dominated in Table \ref{params}. We were unable to classify Galaxy 6 due to the high uncertainties on the velocity dispersions at distances $>1 r_e$, resulting in only two spaxels for analysis ($N_{pix}>$100 is recommended for a robust parameter measurement). Three out of the remaining five galaxies were classified as wind dominated according to the \cite{ho16} criteria. Galaxies 4 and 5 were not classified as wind-dominated, but they lie close to the classification boundary. Disk warps and flares are not expected to significantly contribute to the $\eta_{50}$ and $\xi$ parameters in these galaxies \citep{ho16}. Galaxy 2 has the largest asymmetry parameter $\xi =4.6$ which could be enhanced by a possible interaction with a nearby galaxy to the south. We note that the values of $\eta_{50}$ and $\xi$ were conservatively chosen by \cite{ho16}, based on a sample of 40 galaxies, in order to have a convenient separation into ``wind-dominated'' and ``not wind-dominated'' galaxies. The distribution of galaxy $\eta_{50}$ and $\xi$ values is not bimodal, and the wind classification is not absolute (see Tescari et al (submitted)). Therefore a galaxy with an $\eta_{50}<0.3$ and/or $\xi<1.8$ may still host a weaker wind. \begin{table} \caption[Classifying winds with velocity asymmetry and dispersion parameters.]{Classifying winds with velocity asymmetry ($\xi$) and dispersion parameters ($\eta_{50}$) following \cite{ho16}. Galaxies are classified as ``wind-dominated'' according to \cite{ho16} if $\eta_{50}>0.3$ and $\xi>1.8$. The number of spaxels at radii greater than r$_e$ that meet our S/N criterion is shown in column 2. Unfortunately, there is insufficient data for Galaxy 6 to perform this classification. }\label{params} \begin{tabular}{|cc|c|c|c|c|} \hline & GAMA ID & N$_{pix}$ &$\eta_{50}$ & $\xi$ & Wind \\ \hline 1 &551202 & 168 & 0.371 & 3.556& Yes \\ 2& 417678 & 356 & 0.707 & 4.602 &Yes \\ 3&593680 & 283 & 0.415 & 2.182 & Yes \\ 4&600030 & 134 & 0.513 & 1.647 &No \\ 5&376293 & 221 & 0.455 & 1.43 & No \\ 6&227607 & 2 & - & - & ? \\ \hline \end{tabular} \end{table} \subsection{Summary of optical diagnostic maps} Correlations between between the line ratios [N{\small II}]/H$\alpha$, [S{\small II}]/H$\alpha$, and [O{\small I}]/H$\alpha$ and velocity dispersion have been observed in systems with galactic-wide shock activities \citep{rich11,ho14}. A positive correlation exists between the line ratios and velocity dispersions of the extraplanar gas for half of our sample. Figure \ref{lvdisp} shows the relation between emission-line gas $\sigma$, line ratios [N{\small II}]/H$\alpha$, [S{\small II}]/H$\alpha$, and [O{\small I}]/H$\alpha$, and disk-height. The spaxels bifurcate, with the disk and extraplanar regions having different $\sigma$-line ratio distributions. We expect shocked gas to have higher emission line ratios and higher velocity dispersion than gas purely excited by star formation. Emission broadened by beam smearing alone should not have higher [N{\small II}] /H$\alpha$ ratios, because the excitation is still from star formation. Furthermore, beam smearing causes increased velocity dispersions in the centre of a galaxy where the velocity gradient is steepest \citep{green14}. To focus on the extra-planar gas, we mask out the central r$_e$ (padded by 1 arcsecond) and measure the correspondence between $\sigma$ and the line ratios [N{\small II}]/H$\alpha$ and [S{\small II}]/H$\alpha$ using Kendall's tau correlation coefficients ($\rho$) and their significance values (in the range 0 to 1, with smaller numbers indicating higher significance). The scipy.stats package was used for spaxels which have [N{\small II}] (or [S{\small II}]), H$\alpha$, and $\sigma$ S/N$>$5 and the values of $\rho$ and significance are included in the bottom right corners of the corresponding panels of Figure \ref{lvdisp}. Extraplanar gas in Galaxies 1, 2, and 3, show significant, although weak, positive correlation between the [N{\small II}]/H$\alpha$ (and [S{\small II}]/H$\alpha$) line ratio and $\sigma$ ($>5\sigma$), likely due to shock mixing. \begin{figure*} \includegraphics[width=0.7\linewidth]{lrvdisp.pdf} \caption{Relationship between log([N{\small II}] /H$\alpha$), log([S{\small II}] /H$\alpha$) and log([O{\small I}] /H$\alpha$) and velocity dispersion for the six galaxies. All spaxels with signal-to-noise ratio greater than five in relevant properties H$\alpha$, velocity dispersion and either [N{\small II}]~, [S{\small II}]~, or [O{\small I}]~ are considered here. Spaxels greater than 1 $\tilde{r_e}$ are colour coded by disk height (as mapped in the inset), which is calculated using the exponential fits to the r-band images by the GAMA team. Spaxels with distances $<\tilde{r_e}$ are considered to belong to the galaxy disk and are coloured dark grey. Kendall's tau correlation coefficient and significance values were calculated to assess the correspondence between line ratio and velocity dispersion for spaxels outside 1 $\tilde{r_e}$ and they written in the bottom right corner of the [N{\small II}] /H$\alpha$ and [S{\small II}] /H$\alpha$ panels. For galaxies 1 to 3, there is a significant positive correlation between line ratio and velocity dispersion in the extra-planar gas. We suggest this is due to shocks, which cause higher line ratios and velocity dispersions in the emission line gas than star formation alone. }\label{lvdisp} \end{figure*} Gas excited by star formation in the disks of galaxies is not expected to show a correlation between emission line ratios and velocity dispersion \footnote{However, the [N{\small II}] /H$\alpha$ ratio may show a correlation in the absence of shocks because it is most sensitive to metallicity and therefore is often peaked in the centre of a galaxy. Because the velocity dispersion is often also peaked at the centre of our galaxies, mostly due to beam smearing, a correlation of [N{\small II}] /H$\alpha$ and $\sigma$ in the disk may be expected.}. For all galaxies except Galaxy 3 the disk (grey points) does not show a changing line ratio with changing velocity dispersion (i.e. line ratios and $\sigma$ are not correlated). Where there is detectable extraplanar gas, these spaxels tend to show a positive correlation between line ratio, velocity dispersion, and disk height. \subsection{Star forming properties determined from optical data.} It has long been known that galaxies with higher SFR surface densities are more likely to host winds \citep{heckman90,heckman15,ho16}. However, it is difficult to conduct inter-sample studies because SFR surface densities are sensitive to the assumptions regarding the SFR tracer and the area under consideration. SFRs from H$\alpha$ were derived from SAMI data as follows. We have measured the spectrum of each galaxy in our sample within an elliptical aperture mask of 1 $\tilde{r_e}$. The spectra from the original data cubes were binned (taking spatial covariance into account) and fit with \textsc{lzifu}, as described in Section \ref{specanal}. \textsc{Lzifu} removes the contribution of stellar absorption from the emission lines. The H$\alpha$ emission line flux was corrected for extinction using the Balmer decrement, H$\alpha$/H$\beta$, assuming the expected ratio of 2.86 for Case B recombination and a temperature of T=10$^4$K using the \cite{cardelli89} extinction curve. Extinction-corrected H$\alpha$ fluxes were converted to SFRs using the \cite{kennicutt98} calibration. The \cite{ho16} sample consists of 40 galaxies, 15 of which were classified as wind-dominated using the kinematic criteria presented in Section \ref{kinematic}. Using the same area definition as this work, \cite{ho16} found that edge-on wind-dominated galaxies in the SAMI Galaxy Survey have a broad range of $\Sigma_{SFR}$ $\sim$ [0.001, 0.03) M$_\odot$ yr$^{-1}$ kpc$^{-2}$. Our sample spans $\Sigma_{SFR}$ of 0.007 to 0.05 M$_\odot$ yr$^{-1}$ kpc$^{-2}$, with galaxies kinematically classified as wind-dominated having the highest star formation rate surface densities of our sample ($\Sigma_{SFR} >$0.015 M$_\odot$ yr$^{-1}$ kpc$^{-2}$). Galaxy 4 also has a $\Sigma_{SFR}$ consistent with the wind-dominated galaxies (0.044 M$_\odot$ yr$^{-1}$ kpc$^{-2}$) in our sample, even though its ionized gas kinematics do not show clear signs of winds. We note that our Galaxies 2, 3, and 5 are also in the full sample of \cite{ho16}. Galaxies 1, 4, and 6 were not included in the analysis of \cite{ho16} because they did not meet their stricter inclination criterion. Star formation history could play an important role in the detection of winds. Authors such as \cite{ho16}, \cite{sato09}, and \cite{sharp10} find that bursty star formation is preferred over continuous star formation for the driving of winds. Using the spectra extracted from an elliptical aperture covering the central $\tilde{r_e}$, we also measured the D$_n$(4000) and EW(H$\delta_A$) indices, which are probes of star formation history \citep{balogh99,kauffmann03}. D$_n$(4000) is a measurement of the amplitude of the discontinuity at 4000\AA. D$_n$(4000) reflects the mean temperature of stars responsible for the continuum and increases as a function of age. We use the definition of \cite{bruzual83}, with the narrower passbands (hence the subscript $n$) proposed by \cite{balogh99} to measure D$_n$(4000) values from our spectra. For any stellar type, the value of D$_n$(4000) is also sensitive to stellar metal abundance, being lower for stars of lower metallicity. As a result, the D$_n$(4000) amplitude will be affected by radial abundance gradients of galaxies. By using spectra from within one effective radius to calculate the D$_n$(4000) values for each galaxy, we should mitigate this problem because local disk galaxies have similar metallicity gradients when calculated in terms of effective radii \citep{roig15}. We use the method of \cite{worthey97} to measure the equivalent width of the H$\delta_A$ absorption in our 1 $\tilde{r_e}$ spectra. The subscript ``A'' indicates a wide ($\sim 40$\AA) central passband is used. To account for contribution from nebular emission, we include the H$\delta$ emission line in our \textsc{lzifu} fit and subtract the emission-line flux when the line is significant (S/N$>$3). For Galaxy 6 the equivalent width was calculated by hand due to its complex line profile dominated by emission. A strong H$\delta$ absorption feature is usually interpreted as evidence that a burst of star formation occurred in the last Gyr \citep{couch87}. Combining the D$_n$(4000) and H$\delta _A$ indices has been employed in a simple diagnostic to distinguish between continuous and burst star formation histories \citep{kauffmann03}. \cite{ho16} fit a polynomial to the median relation of the star forming galaxies in SDSS DR 7 on the D$_n$(4000)-H$\delta_A$ plane. Galaxies above the median D$_n$(4000)-H$\delta_A$ relation are more likely to have had a bursty rather than a continuous star formation history. This relation is shown in Figure \ref{d4000} along with our radio-selected sample and the two groups of galaxies in \cite{ho16} with $\Sigma_{SFR}$ matched to our sample ($\Sigma_{SFR} >-2.4$). The FIRST catalogue only contains galaxies with a high surface brightness, biasing our radio-selected sample towards a larger fraction of wind-dominated galaxies. For a fair comparison, we have selected galaxies from \cite{ho16} with $\log(\Sigma_{SFR}) > -2.4$ to compare with our radio-selected sample. This matching results in a sample of 11 wind-dominated galaxies and 9 non-wind dominated galaxies from the original \cite{ho16} sample. \cite{ho16} found that the wind-dominated galaxies lie on average above the median D$_n$(4000)-H$\delta_A$ relation of the SDSS galaxies, whereas the non-wind-dominated galaxies are distributed both above and below the median. Galaxies with high EW(H$\delta$) for a given D$_n$(4000) value must have been observed a few hundred million years after a burst of star formation - once the emission from the A-star population begins to dominate over the O and B stars (where the Balmer absorption is not as strong). In our sample, Galaxies 1, 2, 3, and 4, with the highest $\Sigma_{SFR}$ all fall above the median relation. This follows the finding of \cite{ho16} that wind-dominated galaxies tend to have a bursty star formation history. \begin{figure} \centering \includegraphics[width=\linewidth]{D4000HDELTA_small.pdf} \caption[Star formation history traced by D$_n$(4000) and H$\delta_A$ of our galaxies.]{Star formation history traced by D$_n$(4000) and H$\delta_A$ of our galaxies (orange diamonds). Comparison galaxies with $\log(\Sigma_{SFR})>-2.4$ from \cite{ho16} are also included. The wind-dominated galaxies from \cite{ho16} are shown as green squares and the rest of the comparison sample as purple circles. The dashed curve indicates the median SDSS relation. Galaxies above this dashed line have `bursty' SFHs.}\label{d4000} \end{figure} \section{Radio emission} We compare the radio continuum emission measured by the FIRST survey with the optical emission line gas ratios (specifically [N{\small II}] /H$\alpha$) of our galaxies in Figure \ref{overlay}. The synthesized beam size of the radio images is represented by the blue ellipses at the bottom right of the images. The typical beam size is 5.4$\times$6.4 . Contours have been drawn at 3, 5, 7, 10 and 15 times the rms of the FIRST images (typically 0.15 mJy; values for individual galaxies are tabulated in Table \ref{sfrs}). In Table \ref{sfrs}, we include the extent of the radio emission of the three galaxies with resolved radio emission, estimated as the maximum extent of the detected radio emission above or below the disk. The radio emission of Galaxies 1, 2, and 3 is extended along the minor axes of the galaxies at signal-to-noise levels of 2-3. These are also the three galaxies classified as ``wind-dominated'' from their kinematic properties. The three wind-dominated galaxies are detected at higher signal-to-noise (by a factor of $\sim$ 3) in the radio images than Galaxies 4, 5, and 6. The minor axis radio emission is unresolved in the three galaxies not kinematically classified as wind-dominated (Galaxies 4, 5, and 6). The observed size of the minor axis (from the FIRST catalogue) is given in Table \ref{sfrs} as an upper-limit to the vertical extent of the radio emission. Because this measurement is convolved with the radio PSF, the actual size of the radio minor axis could be much smaller than the number given. The three galaxies for which we do not report resolved extended minor axis 1.4 GHz emission are at a higher redshift than those in which we do, meaning that they subtend a smaller angle on the sky. The reason that extended radio emission is not detected in these three galaxies could therefore be because the galaxies are not well resolved by the FIRST beam and hence we are unable to resolve any extended emission. In fact, if Galaxy 1 was at the redshift of Galaxies 5 or 6, we would not be able to resolve the extended emission because the beam size is $>5$ kpc, whereas the extended emission only reaches to $\sim$4 kpc above the disk. Notes describing the emission of individual objects can be found in the Appendix. \begin{figure*} \centering \includegraphics[width=\linewidth]{figure2.pdf} \includegraphics[width=\linewidth]{figure3.pdf} \caption{Top: Radio contours (blue) overlaid on the [N{\small II}] /H$\alpha$ map of each galaxy. Solid contours are drawn at 3, 5, 7, 10 and 15 times the rms of the FIRST images (typically 0.15 mJy). Dashed contours are drawn at 1 and 2 times the rms. A white ellipse shows the size of the optical seeing disk and the synthesized beam of the radio observations is indicated by a blue ellipse. The optical images provide data of superior angular resolution. Galaxies 1-3 have wind-dominated kinematics. Bottom: The extent of each blob fitted with the \textsc{blobcat} algorithm of \citet{hales12} is outlined in cyan. Blobs encompass regions with S/N$>2$. Each panel is 30 arcsec on the side. The background grey-scale map is the SDSS-r band image. A black bar in the bottom left of the panels indicates 5 kpc at the redshift of each galaxy. The SAMI hexabundle field of view is indicated by a red circle. }\label{overlay} \end{figure*} \subsection{Extended radio emission in galaxies with wind signatures} The galaxies with resolved extended radio emission (Galaxy 1, 2, and 3) are the galaxies kinematically classified as wind-dominated. These galaxies have the largest D$_n$(4000) values, implying their stellar populations are the oldest. The three galaxies also have radio 1.4 GHz SFRs greater than H$\alpha$ SFRs (Table \ref{sfrs}). Radio emission traces star formation on timescales $>$10 Myr, whereas H$\alpha$ emission traces star formation on timescales $<$10 Myr. An older stellar population rather than a young ($<10$ Myr) population is more likely to be detected and extended in the radio because it takes time for the radio emission to be produced in SNe and for the CRs to be transported to the large scale heights. Larger radio than H$\alpha$ SFRs in Galaxies 1, 2, an 3 are therefore consistent with a bursty star formation history. To further investigate the extended radio emission in our sample we use the \textsc{blobcat} software \citep{hales12}, which uses the flood fill algorithm to detect and catalogue ``blobs'' that represent sources in a 2D astronomical image. In particular, \textsc{blobcat} has been designed to analyse the Stokes I intensity and linear polarization of radio-wavelength images. \textsc{Blobcat} was used to analyse 30 by 30 arcsec cut-out FIRST images of each of our six objects. We required a detection S/N (signal per pixel / rms noise in the FIRST map) of at least three\footnote{\textsc{Blobcat} is optimised for S/N$>$5 detection threshold. However, to detect Galaxy 4, 5, and 6, a S/N detection threshold of 3 was required.} and blobs include connecting pixels down to 2 sigma flux levels. The rms values were taken from the FIRST catalogue, which gives local rms values computed by combining the measured noise from all grid pointing images contributing to the co-added map position. We set the CLEAN bias correction to 0.25 mJy as suggested by \cite{becker95}. The \textsc{blobcat} region of each source is shown overlaid on SDSS $r$ band images in the bottom row of Figure \ref{overlay}. \textsc{Blobcat} returns a parameter R$_{EST}$ that can be used to identify sources with non-Gaussian complex morphologies. R$_{EST}$ is the ratio of the area of the detected blob to the area covered by an unresolved Gaussian blob with the same peak surface brightness (with local bandwidth smearing taken into account). This method assumes an elliptical Gaussian point spread function, whose parameters are given in the header of the FIRST image. The further the value from 1, the more non-Gaussian the object is and the more extended. We list the values of R$_{EST}$ obtained from \textsc{blobcat} in Table \ref{sfrs}. R$_{EST}$ is largest for the three galaxies classified as wind-dominated, suggesting that R$_{EST}$ could be used to identify galaxies with a potential wind in radio images. However, Galaxy 2 has an R$_{EST}$ (1.59) similar to the non-wind dominated Galaxies 4-6 (mean 1.16). \subsection{Infrared-Radio Correlation} We calculate the total infrared luminosities (TIR; 8-1000 $\mu$m) of our sample using the calibration of \cite{galametz13} involving 24, 100 and 160 $\mu$m data, but drawing on the WISE 22$\mu$m emission in place of the unavailable 24 $\mu$m Spitzer data. The 100 and 160$\mu$m data are from the Herschel-ATLAS first data release \citep{bourne16,valiante16}. The TIR-radio correlation is parametrized by $q$, \begin{equation} q = \log\left(\frac{L_{TIR}}{3.75\times 10^{12} \text{W}}\right) - \log\left(\frac{L_{1.4GHz}}{\text{W Hz}^{-1}}\right). \label{q} \end{equation} \cite{bell03} found for a sample of local galaxies an average $q = 2.64\pm 0.26$. The $q$ values of our sample are included in Table \ref{sfrs}. We find that the three galaxies classified as wind-dominated from their kinematics have the lowest $q$ values (mean value 2.54$\pm$0.16 compared to a mean of 2.73$\pm$0.04 for Galaxies 4-6). Although the $q$ values are consistent with star-forming galaxies, a lower $q$-value means that the non-thermal radio synchrotron emission is dominant over the thermal infrared emission. \begin{table*} \caption{Derived properties of the six galaxies in our sample. Radio SFRs are measured using global 1.4 GHz fluxes from FIRST following \citep{mauch07}. The star formation rate surface densities, SFR$_{r_e}/(\pi r_e^2)$, is measured using H$\alpha$ emission-line flux from within 1 effective radius once corrected for extinction using the Balmer decrement. D$_n$(4000) and H$\delta_A$ are calculated from the SAMI spectra within 1 $r_e$. q$_{TIR}$ is the ratio of infrared to radio luminosity defined in Equation \ref{q}. The second last column shows the `radio extent'; this is the scale height at which we detect resolved minor axis radio emission in the FIRST images. For galaxies without resolved minor axis emission, we give an upper limit. Sizes are converted to kpc based on the redshift of each galaxy. R$_{EST}$ is the ratio of the area covered by each source to the area of an unresolved Gaussian source. } \label{sfrs} \begin{tabular}{|cc|ccc|ccccc|c|c|c|} \hline &GAMA ID & FIRST flux & FIRST rms & SFR$_{1.4GHz}$ & log($\Sigma_{SFR,H\alpha}$) & D$_n$(4000) & H$\delta_A$ & $q_{TIR}$ & Radio extent |z| & R$_{EST}$\\ && mJy & mJy/beam & M$_\odot$yr$^{-1}$ & log(M$_\odot$yr$^{-1}$kpc$^{-2}$)& & \AA & & kpc & \\ \hline 1&551202 & 7.096 & 0.1558 &7.1 & -1.52 & 1.26 & 5.5 & 2.56$\pm$0.03 & $\sim$4 & 8.93 \\ 2&417678 & 2.87 & 0.1480 & 2.9& -1.29 & 1.32 & 5.7 & 2.64$\pm$0.04 & $\sim$8 & 1.59\\ 3&593680 & 5.676 & 0.1453 &5.7 & -1.81 & 1.34 & 4.4 & 2.63$\pm$0.03 & $\sim$ 5 & 2.42\\ 4&600030 & 1.982 & 0.1422 &2.0 & -1.35 & 1.25 & 5.6& 2.69$\pm$0.06 & $<$3.6 & 1.21\\ 5&376293 & 1.260 & 0.1540 &1.3 & -2.03 & 1.21 & 4.2 & 2.77$\pm$0.09 & $<$5.2 & 0.91\\ 6&227607 & 2.106 & 0.1535 & 2.1& -2.17 & 1.19 & 2.0 & 2.72$\pm$0.04 & $<$5.6 & 1.36\\ \hline \end{tabular} \end{table*} \section{Discussion}\label{discussion} We have considered different indicators for wind activity in our galaxies from optical gas emission and kinematic diagnostics to radio morphology. Table \ref{evidence} summarises the evidence for and against dominant wind activity in each galaxy. Emission at 1.4 GHz is produced by both thermal emission and synchrotron processes. 1.4 GHz emission is expected in both thermal and CR driven winds. Supernovae both heat the gas and accelerate the CRs. In this section we discuss how galactic winds potentially driven by a combination of CR pressure and SNe activity can explain our observations. We then discuss future observations that could further constrain our interpretations. Galaxies with a starburst driven wind have ionisation properties consistent with shock processes. \cite{dopita96} found that $\sim$50\% of mechanical energy from the wind is converted into energy capable of ionizing gas. If the SAMI data are tracking material that has been entrained by a wind, then the emission lines with high line ratios are likely to be excited by shocks. A correlation between the FWHM of emission lines and shock velocity can occur when radiative shocks move into denser clouds that have a fractal distribution \citep{dopita12}. Further, a one-to-one correlation can be explained by the observation of two shocks moving in opposite directions \citep{dopita12}. Our data are unable to resolve individual shock fronts, so shocks could be propagating in any direction within an individual spaxel. As a result, one might expect the velocity dispersions would be related to the wind velocities in our sample. The maximum velocity dispersions measured ($\sim 150$ km s$^{-1}$) for the six galaxies in our sample are smaller than the velocity dispersions measured for galactic scale starburst-driven super-winds. However, the velocity dispersions of the six galaxies are consistent with velocity dispersions measured in the wind-dominated galaxies of \cite{ho16}. Cosmic ray-driven winds, as described in \cite{booth13}, result in lower wind velocities than thermal feedback models alone. For example, simulations by \cite{booth13} predict an outflow velocity for a Milky Way-like galaxy of $\sim$200 km s$^{-1}$ rather than the $\sim$1000 km s$^{-1}$ predicted by thermal feedback models. \cite{girichidis16} also found that thermally driven-winds are hot, mostly made of ionized hydrogen and have low densities ($\sim$10$^{-27}$ g cm$^{-3}$), whereas CR-driven winds are one to two orders of magnitude denser ($\sim$10$^{-26}$- 10$^{-25}$ g cm$^{-3}$), are warm (10$^4$K) and are composed of a mixture of atomic and molecular hydrogen. The gentle acceleration of the ISM that occurs in CR-driven outflow simulations results in multiphase winds, which include a cool component generally not present in thermally-driven winds \citep{girichidis16}. Modelling the wind geometry to obtain a wind velocity and comparing observations of molecular and atomic hydrogen gas with the predictions of \cite{girichidis16} and \cite{simpson16} will help understand the relative importance of CRs as a wind-driving mechanism. In localised regions of active star formation, superbubbles can locally inject a substantial amount of energy into the surroundings, allowing hot gas to reach considerable heights \citep{deavillez04}. When considering the effect of CRs, which help to push the plasma against the gravitational pull of the galaxy, even a late-type spiral can achieve a steady large-scale wind with a global mass loss rate of $\sim$0.3M$_\odot$ yr$^{-1}$ and a low velocity of $\sim$10 km s$^{-1}$ \citep{breitschwerdt93}. If stellar winds and supernovae are responsible for the large amounts of extraplanar gas, with chimneys being the main mode of CR and gas transport, then one might expect to see a correlation of multiple ISM tracers as they follow individual filaments. \cite{dettmar92} found such a correlation between filaments of H$\alpha$ and radio continuum emission features in NGC 5775. Future sensitive high resolution radio and optical imaging will help constrain any spatial correlation on a larger sample. We observe a correlation between SFR surface density and the extent of the minor axis radio emission. Such a correlation could imply that a large amount of star formation activity is required to blow a hole in the disk. Synchrotron protrusions from edge-on disks \citep{reuter91,seaquist91} and ordered halo magnetic fields \citep{hummel90, hummel91} can also be indicative of winds. The radio emission that extends slightly in the direction of the minor axes of Galaxy 1 and 3 appear similar to the polarized intensity of galaxies such as NGC 5775, which trace the magnetic field and a possible bi-conical outflow \citep{tullmann00,duric88,soida11} Some synchrotron protrusions in Galaxy 1, 2, and 3 are observed. Although these protrusions hint that CRs are playing an important role in the disk-halo interaction, we do not have radio data of sufficient resolution or sensitivity to answer questions about the nature of the CRs and what is driving the winds. Electrons lose energy as they propagate through synchrotron radiation and interactions with ambient photons via the inverse Compton process \citep{collins00} changing the spectral index of the non-thermal emission. As such, spectral ageing (e.g. \citealt{heesen09}) could constrain the mode of cosmic ray transport \citep{uhlig12}. Higher resolution radio imaging of the disk at multiple frequencies will help to separate the synchrotron from thermal emission and determine the origin of the cosmic ray emission. \begin{table} \caption{Evidence for wind activity}\label{evidence} \begin{tabular}{cc|cccc} \hline &GAMA ID & Line ratios & Kinematics & SFH & Radio size\\ \hline 1&551202 & \checkmark & \checkmark & \checkmark & \checkmark \\ 2&417678 & \checkmark & \checkmark & \checkmark & \checkmark \\ 3&593680 & \checkmark & \checkmark & \checkmark & \checkmark \\ 4&600030 & $\times$ & $\times$ & \checkmark & $\times$ \\ 5&376293 & $\times$ & $\times$ & $\times$ & $\times$ \\ 6&227607 & $\times$ & - & $\times$ & $\times$ \\ \hline \end{tabular} \end{table} \section{Conclusion} We have studied six edge-on star-forming galaxies in the SAMI Galaxy Survey that are detected in the 1.4 GHz VLA FIRST survey. These six galaxies are candidates for studying cosmic ray-driven outflows in star-forming galaxies. Shock-like emission line ratios are found in all six objects. Significant positive correlation between velocity dispersion, [N{\small II}]/H$\alpha$ ratio, and disk height indicative of shocks is found for three out of six galaxies. Galaxies 1, 2, and 3 are classified as wind-dominated using the gas kinematic criteria of \cite{ho16}. The extraplanar gas, interpreted as the outflowing component, is observed to be rotating in the same sense as the disk. This co-rotation is not surprising as the outflowing material is expected to entrain part of the rotating disk-material. We discuss the details of each object and speculate on likely explanations for our observations in the Appendix. Galaxies in our sample with extended radio emission have wind-like signatures. The three galaxies in our sample with extended radio emission have bursty star formation histories, high specific star formation rates and high star formation rate surface densities compared to the galaxies without detectable protrusions. Because these properties are indicative of starburst-driven winds, our observations imply that star formation, cosmic ray emission, and outflows are intimately related. Work is still required to understand winds in star-forming galaxies both theoretically and observationally. CRs could help explain the presence of winds and high mass-loading factors in some galaxies. However, the relative importance of CR processes is still unconstrained because extraplanar gas is diffuse and difficult to observe. The comparison of IFU data to future deep radio observations with high angular resolution and covering a range of frequencies will allow us to observationally determine how common CR-driven winds are in the Universe and their relative importance in transporting material into galaxy halos. \section*{Acknowledgements} This research was conducted by the Australian Research Council Centre of Excellence for All-sky Astrophysics (CAASTRO), through project number CE110001020. The SAMI Galaxy Survey is based on observations made at the Anglo-Australian Telescope. The Sydney-AAO Multi-object Integral field spectrograph (SAMI) was developed jointly by the University of Sydney and the Australian Astronomical Observatory. The SAMI input catalogue is based on data taken from the Sloan Digital Sky Survey, the GAMA Survey and the VST ATLAS Survey. The SAMI Galaxy Survey is funded CAASTRO and other participating institutions. The SAMI Galaxy Survey website is http://sami-survey.org/. GAMA is a joint European-Australasian project based around a spectroscopic campaign using the Anglo-Australian Telescope. The GAMA input catalogue is based on data taken from the Sloan Digital Sky Survey and the UKIRT Infrared Deep Sky Survey. Complementary imaging of the GAMA regions is being obtained by a number of independent survey programs including GALEX MIS, VST KiDS, VISTA VIKING, WISE, Herschel-ATLAS, GMRT and ASKAP providing UV to radio coverage. GAMA is funded by the STFC (UK), the ARC (Australia), the AAO, and the participating institutions. The GAMA website is http://www.gama-survey.org/ . Support for AMM is provided by NASA through Hubble Fellowship grant \#HST-HF2-51377 awarded by the Space Telescope Science Institute, which is operated by the Association of Universities for Research in Astronomy, Inc., for NASA, under contract NAS5-26555. JTA acknowledges the award of a SIEF John Stocker Fellowship. MSO. acknowledges the funding support from the Australian Research Council through a Future Fellowship Fellowship (FT140100255). SB acknowledges the funding support from the Australian Research Council through a Future Fellowship (FT140101166). \bibliographystyle{mnras}
\section{Preface} Some of the work presented here was developed in 2004 to support a spectroscopy demonstration with three entangled ions \cite{leibfried04}, where a special case of the key relation Eq.(\ref{Eq:UniTra}) below was stated without proof and without discussing further implications. This publication appeared before supplemental materials became common and the proof was too long to include in a letter-style publication at the time. Thirteen years later, we have picked up the thread again and generalize the special case stated in \cite{leibfried04} to relate more general spin-spin interactions to arbitrary Pauli product operators.\\ \\ It may be rare that experimental physicists resort to the principle of mathematical induction, as we have done below. However, our contribution seems to be in tune with a particularly important lesson that Danny's life can teach us: You should not be afraid to do things in your own way, no matter how far off the beaten path this might take you. \section{Generalized spin-spin interactions and Pauli products} We consider $N$ two-level systems with logical basis of the $l$-th qubit ($l ~\epsilon~ \{1,...,N\}$) defined by the eigenstates $\{| \downarrow \rangle, | \uparrow \rangle\}$ of the $z$-component of a spin-1/2 angular momentum operator $S_{l,k}$ with $k=\{x,y,z\}$. We write $\sigma_{l,i}$ for the $2\times2$ identity matrix in the state space of the $l$-th qubit and $\sigma_{l,k}$ for the Pauli-matrices for $k=\{x,y,z\}$. When setting $\hbar=1$ for simplicity, the eigenvalues in the measurement basis are \begin{equation} S_{l,z} | \uparrow \rangle={\textstyle \frac{1}{2}} \sigma_{l,z} | \uparrow \rangle = {\textstyle \frac{1}{2}}| \uparrow \rangle, S_{l,z}| \downarrow \rangle={\textstyle \frac{1}{2}} \sigma_{l,z} | \downarrow \rangle = -{\textstyle \frac{1}{2}}| \downarrow \rangle. \end{equation} Our previous work relied on the collective angular momentum operator in the $N$-spin Bloch vector representation \begin{equation}\label{Eq:DikRep} \vec{J} = \sum_{l=1}^N \vec{S}_l=1/2 \sum_{l=1}^N \vec{\sigma}_l. \end{equation} This notation allows, for example, for a compact representation of the collective rotation operator $R^{(N)}_k \equiv \exp[-i {\textstyle \frac{\pi}{2}} J_k]$ ($k=\{x,y,z\}$), often called a ``$\pi/2$"-pulse, applied to all $N$ qubits uniformly.\\ \\ M{\o}lmer and S{\o}rensen \cite{molmer99,sorensen00} (for $k=\phi$ and $\sigma_{l,\phi}=\cos(\phi) \sigma_{l,x}-\sin(\phi) \sigma_{l,y}$) and Milburn \cite{milburn00} (for $k=z$) showed how the interaction \begin{equation}\label{Eq:SquOpe} U_k = \exp[-i\chi J_k^2], \end{equation} that acts uniformly on all qubits with a suitable coupling parameter $\chi$ can be implemented in trapped ion systems (see also \cite{solano99}). The approach in ion traps can be generalized to any system of qubits that couples uniformly to one harmonic oscillator. The theoretical work set off a flurry of experiments in which entangled states of two to 14 ion qubits were eventually produced based on such $J^2$-interactions. For example, work described in \cite{leibfried04,sackett00,meyer01,leibfried03,leibfried05,benhelm08,friedenauer08,kim10,monz11} produced entangled states by using lasers to couple the qubits to a harmonic normal-mode motion of the ions and in \cite{ospelkaus11,khromova12,weidt16,harty16} this was accomplished with microwaves. These and other similar experiments encompassed an wide range of contexts, including precision spectroscopy, quantum information processing, and quantum simulation.\\ \\ Here we generalize $U_k$, in which interactions are uniformly along direction $k$ over all qubits, to allow for interactions along different directions on different qubits. In particular, for every product of Pauli matrices and the identity over $N$ qubits ($k_l=\{i,x,y,z\}$), \begin{equation}\label{Eq:StaProd} P_N = \prod_{l=1}^N \sigma_{l,k_l}, \end{equation} we define an associated operator $D_N$ \begin{equation}\label{Eq:StaSum} D_N = 1/2 \sum_{l=1}^N \sigma_{l,k_l}, \end{equation} that can be used as the generator of a generalized spin-spin $D_N^2$-operation according to $G_N=\exp[-i \alpha D_N^2]$. The connection between $P_N$ and $D_N$ will be discussed in section \ref{Sec:ConBet}. Products of Pauli-matrices like $P_N$ are essential as so called stabilizers in a certain class of quantum-error correction codes \cite{nielsen10} (see section \ref{Sec:AppErr}). In the special cases $k_l=k$ for all $l$, the operator $D_N$ is equivalent to $J_k$, therefore all relations that hold for $D_N$ will also be true for any $J_k$ of dimension $N$. \section{Connection between generalized spin-spin interactions and Pauli product operators}\label{Sec:ConBet} With the above definitions, we now state our main result: Depending on whether $N$ is odd or even, the corresponding $D_N$ and $P_N$ fulfill \begin{eqnarray}\label{Eq:UniTra} U_N=\left\{ \begin{array}{ll} \exp[-i \textstyle{\frac{\pi}{2}} D_N^2]&;\ N\ {\rm even}\\ \exp[-i \textstyle{\frac{\pi}{2}} D_N] \exp[-i \textstyle{\frac{\pi}{2}} D_N^2]&;\ N\ {\rm odd} \end{array} \right. \nonumber \\ = \frac{\exp(-i \textstyle{\frac{\pi}{4 E}} )}{\sqrt{2}}\left(1+ i^{N+E} P_N \right) \end{eqnarray} with $E=1$ for $N$ even and $E=2$ for $N$ odd. Eq. (\ref{Eq:UniTra}) was stated without proof for the uniform cases where $k_l=k$ as Eq. (2) in \cite{leibfried04}. In the special case of $k_l=k=x$ and applying $U_N$ to the initial state $|\downarrow, N\rangle \equiv |\downarrow, \downarrow,...,\downarrow \rangle$, relation (\ref{Eq:UniTra}) was also given by S\o rensen and M\o lmer \cite{molmer99}. The fact that Eq. (\ref{Eq:UniTra}) applies to arbitrary input states is crucial for the efficient algorithms we present in section \ref{Sec:AppErr}, including a constant depth algorithm for finding the parity of a state. It should also be mentioned that since Ref. \cite{leibfried04} appeared, another related constant depth algorithm for finding the parity was published \cite{zeng05}. That work did not contain a proof of Eq. ({\ref{Eq:UniTra}}) and relies on two $J^2$-operations instead of one.\\ \\ For all $l$, all operators $\sigma_{l,k_l}$ commute with each other and $\sigma_{l,k_l}^2=1$ holds for each of them. To simplify the notation during the proof, we abbreviate the $\sigma_{l,k_l}\equiv \sigma_l$. As a first step in the proof we can rewrite the exponential in $G_N$ as a product and use $\exp(-i \textstyle{\frac{\alpha}{2}} \sigma_k \sigma_l)=\cos(\alpha/2)-i \sin(\alpha/2) \sigma_k \sigma_l$ to arrive at \begin{equation}\label{Eq:ExpExp} \exp(-i \alpha D_N^2)=\exp(-i \textstyle{\frac{\alpha}{4}} N)\prod_{l=2}^{N} \prod_{k=1}^{l-1} \left( \cos(\alpha/2)- i \sin(\alpha/2) \sigma_k \sigma_l \right). \end{equation} For $\alpha=\textstyle{\frac{\pi}{2}}$ we obtain \begin{equation}\label{SpeExp} \exp(-i \textstyle{\frac{\pi}{2}} D_N^2)=\exp(-i \textstyle{\frac{\pi}{8}} N)\prod_{l=2}^{N} \prod_{k=1}^{l-1} \frac{1}{\sqrt{2}}\left(1 - i \sigma_k \sigma_l \right). \end{equation} All operations in the product on the right-hand side commute and can be decomposed into $\pi/2$-single qubit rotations and CNOT operations, which generate the Clifford group. Their action can therefore in principle be determined by using the techniques described in \cite{gottesman98}. Here we use a more elementary direct proof to get from Eq. (\ref{Eq:ExpExp}) to Eq. (\ref{Eq:UniTra}). We will use induction and treat $N$ even or odd separately. \subsection{Even $N$} Eq. (\ref{Eq:UniTra}) and Eq. (\ref{SpeExp}) are obviously equivalent for $N=2$. To show equivalence of equations (\ref{Eq:UniTra}) and (\ref{SpeExp}) for $N'= N+2$ we re-express $U_{N+2}$ using Eq. (\ref{SpeExp}) as a product of $U_N$ times additional factors, and substitute the right hand side of Eq. (\ref{SpeExp}) for $U_N$. \begin{eqnarray}\label{RewExp} U_{N+2}&=&\exp(-i \textstyle{\frac{\pi}{8}} (N+2))\prod_{l=2}^{N+2} \prod_{k=1}^{l-1} \frac{1}{\sqrt{2}}\left(1 - i \sigma_k \sigma_l \right) \nonumber\\ &=&\frac{\exp(-i \pi/2)}{2}(1+i^{N+1} \sigma_1...\sigma_N -i \sigma_{N+1} \sigma_{N+2}+i^{N} \sigma_1...\sigma_{N+2})\nonumber\\ &\times&\prod_{k=1}^N \textstyle{\frac{1}{2}}(1- i \sigma_k \sigma_{N+1})(1- i \sigma_k \sigma_{N+2}). \end{eqnarray} We can also verify that \begin{eqnarray}\label{OthHan} \textstyle{\frac{1}{2}}(1+i^{N+1} \sigma_1...\sigma_N -i \sigma_{N+1} \sigma_{N+2}+i^{N} \sigma_1...\sigma_{N+2}) \nonumber\\ \times \textstyle{\frac{1}{2}}(1+i^N \sigma_1...\sigma_N- \sigma_{N+1}\sigma_{N+2}+i^N \sigma_1... \sigma_{N+2})\nonumber\\ =\frac{\exp(i \pi/4)}{\sqrt{2}}\left(1+i^{N+3} \sigma_1...\sigma_{N+2}\right). \end{eqnarray} Therefore Eq. (\ref{Eq:UniTra}) is true for $N+2$ ($N$ even) if we can show that \begin{equation}\label{AbRel} \prod_{k=1}^{N} \textstyle{\frac{1}{2}}\left(1 - i \sigma_k a \right) \left(1 - i \sigma_k b \right)=\textstyle{\frac{1}{2}} \left(1+i^N \sigma_1...\sigma_N- a b+ i^N \sigma_1... \sigma_{N} a b\right), \end{equation} when $a^2=b^2=1$. This can be shown by another inductive proof. Again for $N=2$, relation (\ref{AbRel}) is easily verified. For $N$ replaced by $N+2$ we get \begin{eqnarray}\label{AbRel2} \prod_{k=1}^{N+2} \textstyle{\frac{1}{2}}\left(1 - i \sigma_k a \right) \left(1 - i \sigma_k b \right)\nonumber\\ =\left[ \prod_{k=1}^{N} \textstyle{\frac{1}{2}}\left(1 - i \sigma_k a \right) \left(1 - i \sigma_k b \right)\right] \textstyle{\frac{1}{4}}\left(1-i\sigma_{N+1}(a+b)-a b \right) \left(1-i\sigma_{N+2}(a+b)-a b \right)\nonumber\\ =\textstyle{\frac{1}{4}}\left(1+i^N \sigma_1 ...\sigma_N -a b +i^N \sigma_1 ...\sigma_N a b \right)\left(1-\sigma_{N+1}\sigma_{N+2}-a b-\sigma_{N+1}\sigma_{N+2} ab \right)\nonumber\\ =\textstyle{\frac{1}{2}} \left(1- a b+ (1+ a b) i^{N+2} \sigma_1... \sigma_{N}\right), \end{eqnarray} which completes the argument for $N$ even. \subsection{Odd $N$} For $N$ odd and $N\geq3$ the relation for $U_N$ corresponding to Eq. (\ref{SpeExp}) is \begin{eqnarray}\label{OddExp} U_N=\exp(-i \textstyle{\frac{\pi}{2}} D_N) \exp(-i \textstyle{\frac{\pi}{2}} D_N^2)\nonumber\\ =\exp(-i \textstyle{\frac{\pi}{8}} N)\left\{\prod_{l=2}^{N} \prod_{k=1}^{l-1} \frac{1}{\sqrt{2}}\left(1 - i \sigma_k \sigma_l \right)\right\} \prod_{m=1}^{N} \frac{1}{\sqrt{2}}\left(1 - i \sigma_m \right). \end{eqnarray} For $N=3$ the equivalence of Eq. (\ref{Eq:UniTra}) and Eq. (\ref{OddExp}) can be shown by explicit calculation. For $N'=N+2$ the proof proceeds similarly to the even case. We can first show that \begin{eqnarray}\label{RewOdd} \exp(-i \textstyle{\frac{\pi}{2}} D_{N+2}) \exp(-i \textstyle{\frac{\pi}{2}} D_{N+2}^2)\nonumber\\ =\frac{e^{-i \textstyle{\frac{\pi}{8}} }}{\sqrt{2}}\left(1-i^N \sigma_1...\sigma_N \right) \frac{1}{2}\left(1 - \sigma_{N+1}-\sigma_{N+2}- \sigma_{N+1} \sigma_{N+2} \right) \times \nonumber\\ \times \prod_{k=1}^{N} \frac{1}{2}(1 - i \sigma_k \sigma_{N+1})(1-i \sigma_k \sigma_{N+2}). \end{eqnarray} Analogously to the even case, we can then prove by induction that for $a^2=b^2=1$ \begin{equation}\label{AbOdd} (1-a-b-a b)\prod_{k=1}^{N} \textstyle{\frac{1}{2}}\left(1 - i \sigma_k (a + b)- a b \right)= \left(1- a b + (1+ a b) i^N \sigma_1...\sigma_N\right). \end{equation} Since \begin{eqnarray}\label{OddOth} \frac{e^{-i \textstyle{\frac{\pi}{8}} }}{\sqrt{2}}\left(1-i^N \sigma_1...\sigma_N \right) \frac{1}{2}\left(1 + i^N \sigma_1...\sigma_{N+2}+ i^N \sigma_1...\sigma_{N}- \sigma_{N+1} \sigma_{N+2} \right)= \nonumber\\ \frac{e^{-i \textstyle{\frac{\pi}{8}}}}{\sqrt{2}}\left(1 - i^{N+2} \sigma_1... \sigma_{N+2}\right), \end{eqnarray} the proof is complete. \section{Efficient stabilizer-code syndrome measurement} \label{Sec:AppErr} Stabilizer codes are a powerful tool for quantum error-correction and extensively discussed in the literature. An introduction to this subject and many of the early original references can be found in \cite{nielsen10}. Here we only need a few basic facts, namely that errors are detected by determining the eigenvalues $p~\epsilon ~\{-1,1\}$ of Pauli operator products that are designed to detect the absence or presence of a certain error. The Pauli product $P_N$ is then called a stabilizer and can be applied to a state. For a state $|p\rangle$ inside the code space, the eigenvalue, also called the syndrome is $P_N |p\rangle =+1 |p\rangle$, while measuring $P_N |p\rangle =-1 |p\rangle$ indicates that the code state has been compromised by a specific error that the stabilizer code is constructed to detect. By taking advantage of interference, we can determine the syndrome of the stabilizer $P_N$ acting on a string of $N$ qubits based on the generalized spin-spin interactions mediated by the associated operators $D_N$. Implementations require a constant number of multi-qubit operations and possibly a number of single qubit rotations that is linear in $N$, depending on details of the implementation and the stabilizers in the code (see section \ref{Sec:Imp}). The read-out requires only one ancilla and does not disturb the code state $|p\rangle$ which can therefore remain encoded for further steps.\\ \\ We assume that $N$ qubits are in an eigenstate $|p \rangle$ of a certain stabilizer $P_N$, $P_{N}|p \rangle = p |p \rangle$, with $p~\epsilon ~\{-1,1\}$. For the algorithm we add one ancilla qubit that we prepare in $| \uparrow \rangle$. In the following we assume that $N+1$ and $\textstyle{\frac{N+1}{2}}$ are even. Implementation of cases with $N+1$ odd will require additional single-qubit rotations and if $\textstyle{\frac{N+1}{2}}$ is not even, this will produce a different sign between the identity operator and the parity operator in Eq. (\ref{Eq:UnpPar}), which can be taken into account by changing the axis of the final rotation on the ancilla in Eq. (\ref{Eq:FinPul}) below. For our particular choice of $N+1$ even, $U_{N+1}$ simplifies to \begin{equation}\label{Eq:UnpPar} U_{N+1}=\frac{e^{-i \textstyle{\frac{\pi}{4}}}}{\sqrt2} \left( 1+i^{N+2} \sigma_1...\sigma_{N+1} \right)=\frac{e^{-i \textstyle{\frac{\pi}{4}}}}{\sqrt2} \left( 1+ i P_{N}\sigma_{N+1}\right). \end{equation} We assume the ancilla at position $N+1$ was prepared in state $|\uparrow \rangle$ and first apply a $\pi/2$-rotation $R^{(1)}_y$ to the ancilla only and then $U_{N+1}$ as it appears on the right-hand side of Eq. (\ref{Eq:UnpPar}) to all $N+1$ qubits, including the ancilla, for which we choose $\sigma_{N+1}=\sigma_z$. This results in \begin{eqnarray}\label{Eq:RotUn} U_{N+1} \left[|p \rangle (R^{(1)}_y | \downarrow \rangle)\right] &=&\frac{\exp[- i \pi/4]}{\sqrt{2}} \left(1+ i P_N \sigma_z \right)|p \rangle (| \uparrow \rangle+| \downarrow\rangle)\nonumber\\ &=&|p \rangle \frac{\exp[-i \pi/4]}{\sqrt{2}}\left( \frac{1+ i p}{\sqrt{2}} | \uparrow\rangle + \frac{1- i p}{\sqrt{2}} |\downarrow\rangle \right). \end{eqnarray} A final rotation $(R^{(1)}_x)^\dag$ of the ancilla qubit around the $x$-direction will produce the state \begin{equation}\label{Eq:FinPul} (R^{(1)}_x)^\dag U_{N+1} \left[|p \rangle (R^{(1)}_y | \downarrow \rangle)\right] = |p \rangle\left(\frac{1+p}{2}| \uparrow \rangle+ \frac{1-p}{2}| \downarrow\rangle \right). \end{equation} The syndrome of $|p \rangle$, is now encoded in the state of the ancilla which will be $|\uparrow\rangle$ for $p=1$ or $|\downarrow\rangle$ for $p=-1$ and can be read out without disturbing the code state $|p \rangle$.\\ \\ If the input state to this pulse sequence is not an eigenstate of the stabilizer $P_N$, finding the ancilla in the state corresponding to $p$ will project the initial state into a superposition of eigenstates $|S_p\rangle$ with eigenvalue $p$. If $p=1$, $|S_1\rangle$ contains at least one code state of the stabilizer code. Otherwise, we can take note that $p=-1$, which means that $|S_{-1}\rangle$ contains at least one state of the code rotated by one of the errors that yield $p=-1$ when $P_N$ is applied. After applying all error operators and learning their syndromes, the resulting state can be recovered into the code space by applying the correction operation compatible with all the syndrome results we have found. To exploit this for code-state preparation, we can initialize the $N$ qubits in an equal superposition of all states by applying a collective $\pi/2$-rotation $R^{(N)}_y$ and then successively measure all stabilizers $P_N$ that are error operators of the code. We keep track of all instances of measuring $p=-1$ and eventually apply the correction operation corresponding to the set of syndromes we have found. After this correction, the resulting state $|S^{(f)}_1\rangle$ must be a superposition of code states and can be projected into a certain encoded qubit state by, for example, finally measuring the eigenvalue of the {\it encoded} operator $\bar{\sigma}_z$ which is implemented by another stabilizer $P_{\bar{\sigma}_z}$. In this way, an encoded qubit state can be efficiently produced in $N$ steps. In principle this scheme can be executed several times to increase the probability of obtaining a code state, even if not all operations and measurements are perfect.\\ \\ In the special case of measuring the parity operator $P_N$, by using the uniform interaction $D_N=J_z$, the parity can be determined with three ($N$ even) or four operations ($N$ odd) and revealed by one measurement on the ancilla qubit, independent of the size of $N$. This constant depth parity-finding algorithm is in contrast with parity determination algorithms on conventional computers which require polynomial sized circuit families of close to $\log{N}$ depth for computing parity \cite{heydon90}. The quantum version therefore provides a genuine advantage even for relatively small $N$ and falls into a family of constant depth parity circuits discussed in \cite{hoyer05}. \section{Implementations in ion trap systems}\label{Sec:Imp} In many codes, for example Calderbank-Shore-Steane (CSS) codes \cite{nielsen10}, stabilizers are products of only one Pauli-operator, either $\sigma_{l,x}$ or $\sigma_{l,y}$, and the identity $\sigma_{l,i}$. For such codes, stabilizer measurements with just M{\o}lmer and S{\o}rensen type interactions with either $\phi=0$ for $\sigma_{l,\phi}=\sigma_{l,x}$ or $\phi=-\pi/2$ for $\sigma_\phi=\sigma_{l,y}$ can be used. The third Pauli operator is not required because a $\sigma_{l,z}$ (phase-flip) error can be thought of as sequentially occurring $\sigma_{l,x}$ and $\sigma_{l,y}$ (bit-flip) errors.\\ \\ The conceptually simplest way to realize identities could be to momnetarily physically remove all qubits that are acted on by $\sigma_{l,i}$ within $D_N$ (so no physical operation on that qubit is required), for example by transporting them to a location away from where interactions are applied in a multi-zone architecture \cite{wineland98,kielpinski02}. This effectively reduces the original stabilizer to $P_{N'}$ with $N' < N$ and all elements in the stabilizer $P_{N'}$ are Pauli-matrices. We can then either apply M{\o}lmer and S{\o}rensen type interactions with two different phases, or, for non-CSS codes that may require more complicated Pauli products, rotate each remaining qubit individually by $r_l$ such that $\sigma_{l,k_l} =r^\dag_l \sigma_{l,z} r_l$. If we denote the operator that applies such individual rotations to all remaining qubits as $R_{k,N'}=\prod_{l=1}^{N'} r_l$ we have $D_{N'}=R^\dag_{k,N'} J_z R_{k,N'}$ and can rewrite any integer power $m$ of $D_{N'}$ as \begin{equation} (D_{N'})^m= R^\dag_{k,N'} J_z (R_{k,N'} R^\dag_{k,N'}) J_z (R_{k,N'} R^\dag_{k,N'})... J_z R_{k,N'} =R^\dag_{k,N'} (J_z)^m R_{k,N'}. \end{equation} Because this reasoning can be applied to every term in the sum defining the operator-exponential function, we can initially apply $R_{k,N'}$, then $U_z$ and then undo the initial rotation with $R^\dag_{k,N'}$, which implies $G_{N'}=R^\dag_{k,N'} U_z R_{k,N'}$. After this we can recombine all $N$ qubits and have effectively implemented $G_N$ up to a global phase, because $G_N=\exp[i \alpha (N-N')]G_{N'}$. Any other uniform $J^2$ interaction $U_\phi$ can also be used for the uniform coupling of all $N'$ qubits, after modifying the initial and final rotations to match the direction specified by $\phi$.\\ \\ Separation of qubits is not required in an architecture as described in \cite{nebendahl09}, where, in a minimal construction, M{\o}lmer and S{\o}rensen $J_x^2$ or $J_y^2$ type interactions that act globally on all $N$ qubits can be supplemented by individually addressed $\sigma_{l,z}$ rotations, applied to only the qubits that are supposed to not partake in the $J^2$-interaction. The individual rotations are realized by AC-Stark shifts and refocus each of the addressed qubits in such a way that their state is unchanged by the total operation. Depending on the particular structure of the error-correction code, a more optimal sequence in the sense defined in \cite{nebendahl09} may also exist, but will be hard to find using the numerical optimization methods described in this work as the state space of the code increases in size. In any case, this type of implementation should be particularly efficient if all stabilizers contain the same Pauli-matrix apart from the individually refocused group of qubits, as in CSS codes.\\ \\ Alternatively, we can use an array of tightly focused laser beams that address ions individually \cite{linke17} and allow for precise definition of individual operations $\sigma_{l,k_l}$ on each ion (with $\sigma_{l,i}$ corresponding to not turning the individual beam on for the $l$-th ion). With such a setup, any $D^2_N$ interaction can be implemented directly and executed in a constant number of parallel operations (constant depth). \section*{Acknowledgements} This work was mostly developed in the environment of the NIST Ion Storage Group, which therefore owns a great deal of the credit. We would like to thank Jim Bergquist, John Bollinger, James Chou, David Hume, Wayne Itano, David Leibrandt and Andrew Wilson as well as all the post-docs, grad and summer students and the administrative and technical staff of the Time and Frequency Division at NIST. In addition, we gratefully acknowledge numerous discussions and useful advice from Manny Knill and the members of his group.\\ \\ This work was supported by funding from the Office of the Director of National Intelligence (ODNI), the Intelligence Advanced Research Projects Activity (IARPA) and the NIST Quantum Information Program.\\ \\ This paper is a contribution of NIST and is not subject to US copyright.%
\section{Introduction} One of deep results of complex algebraic geometry is the degeneration of Hodge to de Rham spectral sequence. Indeed, it implies several important results such as the Hodge decomposition and the Kodaira vanishing theorem. Unfortunately Kodaira vanishing is known to fail in positive characteristic \cite{Ray78}. On the other hand, one of positive-characteristic counterparts of the Hodge decomposition is the slope decomposition of the Crystalline cohomologies by the de Rham--Witt complex \cite{Ill79}. Thus it is natural to seek a positive-characteristic analogue of the Kodaira vanishing theorem in terms of de Rham--Witt complex. One of the purposes of this paper is to propose candidates as follows. \begin{thm}[cf. Theorem \ref{t-DRW-KV}, Theorem \ref{t-KVV-minus}]\label{intro-main1} Let $k$ be a perfect field of characteristic $p>0$ and let $X$ be an $N$-dimensional smooth projective connected scheme over $k$. Let $A$ be an ample invertible sheaf on $X$ and let $\underline{A}$ be the Teichm\"{u}ller lift of $A$ (cf. Definition \ref{d-teich-lift}). Then \begin{enumerate} \item $H^i(X, W\Omega_X^N \otimes_{W\MO_X} \underline{A})=0$ for any positive integer $i$, and \item $H^j(X, \underline{A}^{-1}) \otimes_{\Z} \Q=0$ for any integer $j$ satisfying $j<N$. \end{enumerate} \end{thm} \begin{rem} We actually need to take the tensor product with $\Q$ in the statement (2) of Theorem \ref{intro-main1}, as $H^j(X, \underline{A}^{-1})$ does not vanish in general (cf. Proposition \ref{p-cex-torsion}). \end{rem} Since we have established an analogue of the Kodaira vanishing theorem, it is tempting to find analogous results related to the Kodaira vanishing theorem. In this direction, we shall give a generalisation of Theorem \ref{intro-main1} that can be considered as a vanishing theorem of Kawamata--Viehweg type. \begin{thm}[cf. Theorem \ref{t-KVV}, Theorem \ref{t-KVV-minus}]\label{intro-main2} Let $k$ be a perfect field of characteristic $p>0$. Let $f:X \to Y$ be a projective $k$-morphism from an $N$-dimensional connected scheme $X$ smooth over $k$ to a scheme $Y$ of finite type over $k$. Let $A$ be an $f$-ample $\R$-divisor on $X$ such that $\Supp\,\{A\}$ is simple normal crossing. Let $W\MO_X(-A)$ be the Witt divisorial sheaf associated to $-A$ (cf. Definition \ref{d-div-def}). Then \begin{enumerate} \item $R^if_*(\mathcal Hom_{W\MO_X}(W\MO_X(-A), W\Omega_X^N)) \otimes_{\Z} \Q=0$ for any positive integer $i$, and \item if the induced morphism $Y \to \Spec\,k$ is an isomorphism, then $$H^j(X, W\MO_X(-A)) \otimes_{\Z} \Q=0$$ for any integer $j$ satisfying $j<N$. \end{enumerate} \end{thm} \begin{rem} The author does not know whether (1) of Theorem \ref{intro-main2} holds without taking the tensor product with $\Q$. \end{rem} It is worth mentioning that the cohomologies of the Teichm\"{u}ller lifts of invertible sheaves can be infinite dimensional over $W(k) \otimes_{\Z} \Q$. More specifically, we shall prove the following statement. \begin{thm}[cf. Theorem \ref{t-ample-dim}, Theorem \ref{t-highest-infinite}]\label{intro-main3} Let $k$ be a perfect field of characteristic $p>0$ and set $Q:=W(k) \otimes_{\Z} \Q$. Let $X$ be a projective scheme over $k$ such that $\dim X>0$. Let $A$ be an ample invertible sheaf on $X$ and let $\underline{A}$ be the Teichm\"{u}ller lift of $A$ (cf. Definition \ref{d-teich-lift}). Then the following hold. \begin{enumerate} \item $H^i(X, \underline{A}) \otimes_{\Z} \Q=0$ for any $i>0$. \item $\dim_Q (H^0(X, \underline{A}) \otimes_{\Z} \Q)=\infty$. \item If $X$ is smooth over $k$, then $\dim_Q (H^{\dim X}(X, \underline{A}^{-1}) \otimes_{\Z} \Q)=\infty$. \end{enumerate} \end{thm} \subsection{Description of proof} Let us overview some of the ideas of the proof of (1) of Theorem \ref{intro-main1}. The argument consists of three steps. The first step is to twist the finite levels $W_n(\bullet)$ by Frobenius in order to achieve the vanishing, i.e. we can find a positive integer $t$ such that $$H^i(X, W_n\Omega_X^N \otimes_{W\MO_X} (F_X^t)^*\underline{A}) \simeq H^i(X, W_n\Omega_X^N \otimes_{W\MO_X} \underline{A}^{p^t})=0$$ for any $i>0$ and $n>0$ (cf. Theorem \ref{t-KVV}(1)), where $F_X:X \to X$ is the absolute Frobenius morphism. The second step is to go to the infinite level $W(\bullet)$ from the finite levels $W_n(\bullet)$, i.e. we take the projective limit (cf. Theorem \ref{t-KVV}(3)): $$H^i(X, W\Omega_X^N \otimes_{W\MO_X} (F_X^t)^*\underline{A}) \simeq \varprojlim_n H^i(X, W_n\Omega_X^N \otimes_{W\MO_X} (F_X^t)^*\underline{A})=0.$$ The final step is to untwist the infinite level $W(\bullet)$ by Frobenius, i.e. \begin{eqnarray*} H^i(X, W\Omega_X^N \otimes_{W\MO_X} \underline{A}) &\simeq & H^i(X, (F^t_X)_*(W\Omega_X^N) \otimes_{W\MO_X} \underline{A})\\ &\simeq & H^i(X, (F^t_X)_*(W\Omega_X^N \otimes_{W\MO_X} (F^t_X)^*\underline{A}))\\ &\simeq & H^i(X, W\Omega_X^N \otimes_{W\MO_X} (F^t_X)^*\underline{A})\\ &=&0. \end{eqnarray*} We can apply such an untwisting argument, thanks to the $W\MO_X$-linear isomorphism $W\Omega_X^N \simeq (F^t_X)_*(W\Omega_X^N)$ \cite[Ch. I, Corollaire 3.5 and Proposition 3.7(b)]{Ill79}. Theorem \ref{intro-main2} is proved basically by the same line as above after modifying some details. One of technical novelties is to show that $W_n\MO_X(D)$ is a Cohen-Macaulay $W_n\MO_X$-module for any $\R$-divisor $D$ such that $\Supp\,\{D\}$ is simple normal crossing (Theorem \ref{t-div-CM}). Another fundamental tool we shall frequently use is Ekedahl's result which asserts that $W_n\Omega_X^N$ is isomorphic to the dualising sheaf of the structure morphism $W_nX \to \Spec\,W_n(k)$ \cite[Theorem 4.1]{Eke84}. Indeed, combining with Grothendieck duality, this result enables us to compute some cohomologies (cf. Proposition \ref{p-div-CM}). \medskip \textbf{Acknowledgements:} The author would like to thank Piotr Achinger, Yoshinori Gongyo, Yujiro Kawamata and Yukiyoshi Nakkajima for useful comments. The author was funded by EPSRC. \section{Preliminaries} \subsection{Notation}\label{ss-notation} In this subsection, we summarise notation used in this paper. \begin{enumerate} \item Throughout the paper, $p$ denotes a prime number. \item We shall freely use the notation and terminology in \cite{Har77} and \cite{Ill79}. \item Let $N$ be a non-negative integer. A noetherian scheme $X$ is {\em pure} $N$-{\em dimensional} if $\dim Y=N$ for any irreducible component $Y$ of $X$. \item For an $\F_p$-scheme $X$, we denote by $F_X:X \to X$ the {\em absolute Frobenius morphism}, i.e. the homeomorphic affine morphism such that the induced ring homomorphism can be written by $$\Gamma(U, \MO_X) \to \Gamma(U, \MO_X), \quad a \mapsto a^p$$ for any open subset $U$ of $X$. An $\F_p$-scheme $X$ is $F$-{\em finite} if $F_X:X \to X$ is a finite morphism. \item For an integral scheme $X$, we define the {\em function field} $K(X)$ of $X$ as the stalk $\MO_{X, \xi}$ at the generic point $\xi$ of $X$. \item For a field $k$, $X$ is a {\em variety over} $k$ or a $k$-{\em variety} if $X$ is an integral scheme that is separated and of finite type over $k$. $X$ is a {\em curve} over $k$ or a $k$-{\em curve} (resp. a {\em surface} over $k$ or a $k$-{\em surface}) if $X$ is a $k$-variety of dimension one (resp. two). \item Let $X$ be a regular noetherian scheme. A closed subset $Z$ of $X$ is {\em simple normal crossing} if for the irreducible decomposition $Z=\bigcup_{i \in I} Z_i$ of $Z$ and any subset $J$ of $I$, the scheme-theoretic intersection $\bigcap_{j \in J}Z_j$ is a regular scheme, where each $Z_i$ is equipped with the reduced scheme structure. \item A morphism $f:X \to S$ of noetherian schemes is {\em projective} if there exists a closed immersion $X \hookrightarrow \mathbb P^n_S$ over $S$ for some non-negative integer $n$. We adopt the definition of projective morphisms by \cite{Har77} (cf. \cite[Section 5.5.1]{FGAex}). \item\label{ss-notation-9} For an integral normal noetherian scheme $X$ and a subring $\mathbb K$ of $\mathbb R$, an $\mathbb K$-{\em divisor} $D$ on $X$ is an $\mathbb K$-linear combination $\sum_{i \in I} a_i D_i$, i.e. $I$ is a finite set, $a_i \in \mathbb K$ and $D_i$ is a prime divisor for any $i \in I$. A $\mathbb K$-divisor $D$ is $\mathbb K$-{\em Cartier} if there is an equation $D=\sum_{j=1}^s \alpha_j E_j$ for some $\alpha_1, \cdots, \alpha_s \in \mathbb K$ and Cartier divisors $E_1, \cdots, E_s$. Given a morphism $f:Y \to X$ of integral normal noetherian schemes and a $\mathbb K$-Cartier $\mathbb K$-divisor $D$ with the equation $D=\sum_{j=1}^s \alpha_j E_j$ as above, we define the {\em pullback} $f^*D$ of $D$ as $\sum_{j=1}^s \alpha_j f^*E_j$. We can check that this does not depends on the choice of expression $D=\sum_{j=1}^s \alpha_j E_j$. \item For $r \in \R$, we define $\llcorner r\lrcorner$ (resp. $\ulcorner r\urcorner$) as the integer such that $\llcorner r \lrcorner \leq r <\llcorner r \lrcorner+1$ (resp. $\ulcorner r\urcorner-1< r\leq \ulcorner r\urcorner$). For an $\R$-divisor $D$ on an integral normal noetherian scheme $X$ and its irreducible decomposition $D=\sum_{i \in I} r_i D_i$, we set $\llcorner D\lrcorner:=\sum_{i \in I} \llcorner r_i \lrcorner D_i$, $\ulcorner D\urcorner:=\sum_{i \in I} \ulcorner r_i \urcorner D_i$ and $\{D\}:=D-\llcorner D\lrcorner$. \item Let $f:X \to S$ be a projective morphism of noetherian schemes. An invertible sheaf $L$ on $X$ is $f$-{\em ample} if there exists a non-negative integer $n$, a closed immersion $j:X \hookrightarrow \mathbb P^n_S$ over $S$ and a positive integer $m$ such that $L^{\otimes m} \simeq j^*\MO_{\mathbb P^n_S}(1)$. A Cartier divisor $D$ is $f$-{\em ample} if the invertible sheaf $\MO_X(D)$ is $f$-ample. Assume that $X$ is an integral normal scheme. An $\R$-Cartier $\R$-divisor $E$ on $X$ is $f$-{\em ample} if we can write $E=\sum_{j \in J} a_j D_j$ for some non-empty finite set $J$, $a_j \in \R_{>0}$ and $f$-ample Cartier divisor $D_j$. An $\R$-Cartier $\R$-divisor $D$ is {\em ample} if $D$ is $g$-ample for some projective morphism $g:X \to T$ to a noetherian affine scheme $T$. \item For an $\F_p$-scheme $X$, we denote the ringed space $(X, W_n\MO_X)$ by $W_nX$. It is well-known that $W_nX$ is a scheme. If $X$ is an $F$-finite noetherian scheme, then $W_nX$ is a noetherian scheme \cite[Ch. 0, Proposiiton 1.5.6(ii)]{Ill79}. \item For an abelian group $H$, we set $H_{\Q}:=H \otimes_{\Z} \Q$. For a sheaf $F$ of abelian groups on a topological space, $F_{\Q}$ is the presheaf defined by $\Gamma(U, F)_{\Q}$ for any open subset $U$ of $X$. If $X$ is a noetherian space, it is known that $F_{\Q}$ is automatically a sheaf. \item\label{ss-notation-14} A ring homomorphism $\varphi:A \to B$ is {\em essentially smooth} if there is a factorisation $\varphi:A \xrightarrow{\varphi_1} C \xrightarrow{\varphi_2} B$ such that $\varphi_1$ is a smooth ring homomorphism, $B \simeq S^{-1}C$ for some multiplicative subset $S$ of $C$, and $\varphi_2$ is the ring homomorphism induced by $S$. A morphism $f:X \to Y$ of affine schemes is {\em essentially smooth} if the induced ring homomorphism $\Gamma(Y, \MO_Y) \to \Gamma(X, \MO_X)$ is essentially smooth. \end{enumerate} \subsection{Iterated Cartier operators} In this subsection, we recall definition of $B_n\Omega_X^r$ and $Z_n\Omega_X^r$. Our definition slightly differs from the one of \cite[Ch. 0, Section 2.2]{Ill79} (Remark \ref{r-BZ}). Let $k$ be a perfect field of characteristic $p>0$ and let $X$ be a smooth scheme over $k$. It is easy to check that the Frobenius push-forward of the de Rham complex: $$0 \to (F_X)_*\MO_X \xrightarrow{d_0} (F_X)_*\Omega^1_X \xrightarrow{d_1} (F_X)_*\Omega^2_X \xrightarrow{d_2} \cdots$$ is a complex of $\MO_X$-module homomorphisms, where $\Omega^r_X:=\bigwedge^r \Omega^1_{X/\Z}$. Since $k$ is a perfect field, it holds that $\bigwedge^r \Omega^1_{X/\Z} \simeq \bigwedge^r \Omega^1_{X/k}$. For any $r \in \Z_{\geq 0}$, we set $$B_1\Omega^r_X:={\rm Im}\,(d_{r-1}), \quad Z_1\Omega^r_X:=\Ker\,(d_r).$$ In particular, both $B_1\Omega^r_X$ and $Z_1\Omega^r_X$ are coherent $\MO_X$-submodules of $(F_X)_*\Omega_X^r$. It is well-known that there is an exact sequence of $\MO_X$-module homomorphisms: $$0 \to B_1\Omega^r_X \to Z_1\Omega^r_X \xrightarrow{C} \Omega_X^r \to 0.$$ Fix $n \in \Z_{>0}$ and assume that we have already defined $B_n\Omega^r_X$ and $Z_n\Omega^r_X$ as coherent $\MO_X$-submodules of $(F_X^n)_*\Omega_X^r$. We have $$0 \to (F^n_X)_*B_1\Omega^r_X \to (F^n_X)_*Z_1\Omega^r_X \xrightarrow{C_n} (F^n_X)_*\Omega_X^r \to 0,$$ where $C_n:=(F^n_X)_*C$. We set $$B_{n+1}\Omega_X^r:=(C_n)^{-1}(B_n\Omega_X^r), \quad Z_{n+1}\Omega_X^r:=(C_n)^{-1}(Z_n\Omega_X^r).$$ In particular, both $B_{n+1}\Omega_X^r$ and $Z_{n+1}\Omega^r_X$ are coherent $\MO_X$-submodules of $(F_X^{n+1})_*\Omega^r_X$. For convenience, we set $$B_0\Omega_X^r:=0, \quad Z_0\Omega_X^r:=\Omega_X^r.$$ \begin{rem}\label{r-BZ} We define $B_n\Omega_X^r$ and $Z_n\Omega_X^r$ in a slightly different way from the one of \cite[Ch. 0, Section 2.2]{Ill79}. Two definitions are the same up to the base change induced by the absolute Frobenius morphism of the base field $F_k^n:\Spec\,k \to \Spec\,k$. \end{rem} \begin{prop}\label{p-BZ} Let $k$ be a perfect field of characteristic $p>0$ and let $X$ be a smooth scheme over $k$. Then the following hold. \begin{enumerate} \item For any $n \in \Z_{\geq 0}$ and $r \in \Z_{\geq 0}$, the sheaves $B_n\Omega_X^r$ and $Z_n\Omega_X^r$ are coherent locally free $\MO_X$-modules. \item For any $n \in \Z_{\geq 0}$ and $r \in \Z_{\geq 0}$, there are exact sequences of $\MO_X$-modules: $$0 \to (F^n_X)_*B_1\Omega_X^r \to B_{n+1}\Omega_X^r \to B_n\Omega_X^r \to 0,$$ $$0 \to (F^n_X)_*B_1\Omega_X^r \to Z_{n+1}\Omega_X^r \to Z_n\Omega_X^r \to 0.$$ \end{enumerate} \end{prop} \begin{proof} The assertion (1) holds by \cite[Ch. 0, Proposition 2.2.8(a)]{Ill79} (cf. Remark \ref{r-BZ}). The assertion (2) follows from the construction. \end{proof} \subsection{Witt vectors} For definition and basic properties of Witt vectors, we refer to \cite[Ch. 0, Section 1]{Ill79}, \cite[Ch. II, \S 6]{Ser79}. The purpose of this subsection is to prove Lemma \ref{l-sum-homog}, which might be well-known for experts. To this end, let us begin by recalling basic properties on addition of Witt vectors. \begin{lem}\label{l-sum-def} There uniquely exist polynomials $$S_0(x_0, y_0), S_1(x_0, y_0, x_1, y_1), \cdots \in \Z[x_0, y_0, x_1, y_1, \cdots]$$ that satisfy the following properties. \begin{enumerate} \item For any $n \in \Z_{\geq 0}$, it holds that {\small $$w_n(S_0(x_0, y_0)), \cdots, S_n(x_0, y_0, \cdots, x_n, y_n))=w_n(x_0, \cdots, x_n)+w_n(y_0, \cdots, y_n),$$ } where \begin{equation}\label{e-sum-def} w_n(x_0, \cdots, x_n):=\sum_{i=0}^n p^ix_i^{p^{n-i}}= x_0^{p^n}+px_1^{p^{n-1}}+\cdots+p^nx_n. \end{equation} \item For any ring $A$ and any elements $\alpha:=(a_0, a_1, \cdots), \beta:=(b_0, b_1, \cdots) \in W(A)$, it holds that $$\alpha+\beta=(S_0(a_0, b_0), S_1(a_0, b_0, a_1, b_1), \cdots).$$ \end{enumerate} \end{lem} \begin{proof} For a proof, see \cite[Ch. II, \S 6, disscussion after Theorem 6]{Ser79}. \end{proof} \begin{lem}\label{l-sum-homog} We use the same notation as in Lemma \ref{l-sum-def}. We equip $\Z[x_0, y_0, x_1, y_1, \cdots]$ with the graded $\Z$-algebra structure such that \begin{enumerate} \item any element $n$ of $\Z$ is an homogeneous element of degree zero, and \item all $x_0, y_0, x_1, y_1, \cdots$ are homogeneous elements with $\deg x_n=\deg y_n=p^n$. \end{enumerate} Then, for any non-negative integer $n$, $S_n(x_0, y_0, \cdots, x_n, y_n)$ is a homogeneous element of $\Z[x_0, y_0, x_1, y_1, \cdots]$ whose degree is equal to $p^n$. \end{lem} \begin{proof} To relax notation, we set $S_n:=S_n(x_0, y_0, \cdots, x_n, y_n)$. We show the assertion by induction on $n$. As $S_0=x_0+y_0$ (cf. \cite[Ch. II, \S 6, Example after Theorem 7]{Ser79}), the assertion holds if $n=0$. Thus assume that $n>0$ and that $S_m$ is a homogeneous element with $\deg S_m=p^m$ if $m<n$. Recall that (\ref{e-sum-def}) and Lemma \ref{l-sum-def}(1) induce the following equations (i) and (ii) respectively. \begin{enumerate} \item[(i)] $w_{\ell}(z_0, \cdots, z_{\ell})=\sum_{i=0}^{\ell} p^iz_i^{p^{\ell-i}}= z_0^{p^{\ell}}+pz_1^{p^{\ell-1}}+\cdots+p^{\ell}z_{\ell}$. \item[(ii)] $w_n(S_0, \cdots, S_n)=w_n(x_0, \cdots, x_n)+w_n(y_0, \cdots, y_n).$ \end{enumerate} It follows from (i) that both $w_n(x_0, \cdots, x_n)$ and $w_n(y_0, \cdots, y_n)$ are homogeneous elements of degree $p^n$. Hence, it holds by (ii) that $w_n(S_0, \cdots, S_n)$ is a homogeneous element with \begin{equation}\label{e-sum-homog1} \deg w_n(S_0, \cdots, S_n)=p^n. \end{equation} By (i), we see that \begin{equation}\label{e-sum-homog2} w_n(S_0, \cdots, S_n)=w_{n-1}(S_0^p, \cdots, S_{n-1}^p)+p^nS_n. \end{equation} Since $S_m$ is a homogeneous element of degree $p^m$ for $m<n$, it follows again from (i) that $w_{n-1}(S_0^p, \cdots, S_{n-1}^p)$ is a homogeneous element with \begin{equation}\label{e-sum-homog3} \deg w_{n-1}(S_0^p, \cdots, S_{n-1}^p)=p^n. \end{equation} Thanks to (\ref{e-sum-homog1}), (\ref{e-sum-homog2}) and (\ref{e-sum-homog3}), we have that $S_n$ is a homogeneous element of degree $p^n$, as desired. \end{proof} \subsection{De Rham--Witt complex} In this subsection, we summarise some of results established by \cite{Ill79}. Let $k$ be a perfect field of characteristic $p>0$ and let $X$ be a scheme of finite type over $k$. We have de Rham-Witt sheaves $W_n\Omega_X^r$ on $X$, which are $W_n\MO_X$-modules. De Rham-Witt sheaves are equipped with $W\MO_X$-module homomorphisms (cf. \cite[Ch. I, D\'efinition 1.1(V2'), Th\'eor\`eme 1.3, Th\'eor\`eme 2.17]{Ill79}): $$F:W_{n+1}\Omega_X^r \to (F_X)_*(W_n\Omega_X^r),$$ $$V:(F_X)_*(W_n\Omega_X^r) \to W_{n+1}\Omega_X^r,$$ $$R:W_{n+1}\Omega_X^r \to W_n\Omega_X^r.$$ Then we set $W\Omega_X^r:=\varprojlim_n W_n\Omega_X^r$, where we consider $\{W_n\Omega_X^r\}_{n \in \Z_{>0}}$ as a projective system via $R$. \begin{lem}\label{l-DRW-coherent} Let $k$ be a perfect field of characteristic $p>0$ and let $X$ be a scheme of finite type over $k$. Then $W_n\Omega_X^r$ is a coherent $W_n\MO_X$-module for any $n \in \Z_{>0}$ and any $r \in \Z_{\geq 0}$. \end{lem} \begin{proof} Thanks to \cite[Ch. I, Proposition 1.13.1]{Ill79}, each $W_n\Omega_X^r$ is a quasi-coherent $W_n\MO_X$-module. Assuming $X=\Spec\,A$, it suffices to show that $W_n\Omega_A^r=\Gamma(X, W_n\Omega_X^r)$ is a finitely generated $W_n(A)$-module. By \cite[Th\'eor\`eme 1.3]{Ill79}, there is a surjecitve $W_n(A)$-module homomorphism $$\Omega_{W_n(A)/\Z}^r \to W_n\Omega^r_A.$$ Hence, it is enough to prove that $\Omega_{W_n(A)/\Z}^1$ is a finitely generated $W_n(A)$-module. Thanks to \cite[Theorem 25.1]{Mat89}, we have an exact sequence: $$\Omega^1_{W_n(k)/\Z}\otimes_{W_n(k)} W_n(A) \to \Omega^1_{W_n(A)/\Z} \to \Omega^1_{W_n(A)/W_n(k)} \to 0.$$ Since $\Omega^1_{W_n(k)/\Z}=0$ (cf. \cite[Ch. I, Lemma 1.7]{Ill79}), we get an isomorphism: $$\Omega^1_{W_n(A)/\Z} \xrightarrow{\simeq} \Omega^1_{W_n(A)/W_n(k)}.$$ Since $W_n(A)$ is a finitely generated $W_n(k)$-algebra (\cite[Corollaire 1.5.7]{Ill79}), $\Omega^1_{W_n(A)/W_n(k)}$ is a finitely generated $W_n(A)$-module, hence so is $\Omega^1_{W_n(A)/\Z}$. \end{proof} \begin{prop}\label{p-DRW-proj-system} Let $k$ be a perfect field of characteristic $p>0$ and let $X$ be an $N$-dimensional smooth variety over $k$. Then, for any $n \in \Z_{>0}$ and any $r \in \Z_{\geq 0}$, there exist exact sequences $$0 \to {\rm gr}^n W\Omega_X^r \to W_{n+1}\Omega_X^r \xrightarrow{R} W_n\Omega_X^r \to 0,$$ $$0 \to (F_X^n)_*\Omega_X^r/B_n\Omega_X^r \to {\rm gr}^n W\Omega_X^r \to (F_X^n)_*\Omega_X^{r-1}/Z_n\Omega_X^{r-1} \to 0,$$ where ${\rm gr}^n W\Omega_X^r$ is a coherent locally free $\MO_X$-module. \end{prop} \begin{proof} By definition of ${\rm gr}^n W\Omega_X^r$, the first sequence is exact (cf. \cite[Ch. I, (3.1.1) and (3.1.5)]{Ill79}). The exactness of the second sequence holds by the horizontal exact sequence in \cite[Ch. I, Corollaire 3.9]{Ill79}. Note that there are two typographic errors on $F^{n+1}_*$ in \cite[Ch. I, Corollaire 3.9]{Ill79}. Both of them should be $F^n_*$. \end{proof} \begin{lem}\label{l-DRW-inje} Let $k$ be a perfect field of characteristic $p>0$ and let $X$ be an $N$-dimensional smooth variety over $k$. Then, for any $n \in \Z_{>0}$, any $r \in \Z_{\geq 0}$ and any non-empty open subset $U$ of $X$, the induced map $$\Gamma(U, W_n\Omega_X^r) \to (W_n\Omega_X^r)_{\xi}$$ is injective, where $(W_n\Omega_X^r)_{\xi}$ denotes the stalk of $W_n\Omega_X^r$ at the generic point $\xi$ of $X$. \end{lem} \begin{proof} We may assume that $U$ is an affine open subset of $X$. By Proposition \ref{p-DRW-proj-system}, we have an exact sequence $$0 \to {\rm gr}^n W\Omega_X^r \to W_{n+1}\Omega_X^r \to W_n\Omega_X^r \to 0,$$ where ${\rm gr}^n W\Omega_X^r$ is a coherent locally free $\MO_X$-module. Thus, the assertion follows from the snake lemma and induction on $n$. \end{proof} \begin{thm}\label{t-descent} Let $k$ be a perfect field of characteristic $p>0$ and let $X$ be an $N$-dimensional smooth variety over $k$. Then, for any positive integer $e$, the Frobenius homomorphism $$F^e:W\Omega_X^N \to (F_X^e)_*(W\Omega_X^N)$$ is a $W\MO_X$-module isomorphism. \end{thm} \begin{proof} The injectivity follows from \cite[Ch. I, Corollaire 3.5]{Ill79}. The surjectivity holds by \cite[Ch. I, Proposition 3.7(b)]{Ill79}. \end{proof} \section{Witt divisorial sheaves} \subsection{Basic properties} In this subsection, we introduce Witt divisorial sheaves: $W\MO_X(D)$ and $W_n\MO_X(D)$ (Definition \ref{d-div-def}). We also establish some fundamental properties such as coherence of $W_n\MO_X(D)$ (Proposition \ref{p-div-coherent}) and invariance under linear equivalence (Lemma \ref{l-linear-eq}). \begin{dfn}\label{d-div-def} Let $X$ be an integral normal noetherian $\F_p$-scheme. Let $D$ be an $\R$-divisor on $X$. Then we define the subpresheaf $W\MO_X(D)$ of the constant sheaf $W(K(X))$ on $X$ by {\small $$\Gamma(U, W\MO_X(D)):=\{(\varphi_0, \varphi_1, \cdots) \in W(K(X))\,|\, \left({\rm div}(\varphi_n)+p^nD\right)|_U \geq 0\}$$ } for any open subset $U$ of $X$, where ${\rm div}(\varphi_n)$ denotes the principal divisor associated to $\varphi_n$. By definition, $W\MO_X(D)$ is a subsheaf of $W(K(X))$ (cf. Remark \ref{r-div-def}). We call $W\MO_X(D)$ the {\em Witt divisorial sheaf associated to} $D$. We define the subsheaf $W_n\MO_X(D)$ of the constant sheaf $W_n(K(X))$ in the same way. \end{dfn} \begin{rem}\label{r-div-def} We use notation as in Definition \ref{d-div-def}. If we identify $W(K(X))$ with the infinite direct product $\prod_{n=0}^{\infty}K(X)$ as sets, then it follows by definition that as subsets of $W(K(X))=\prod_{n=0}^{\infty}K(X)$, we obtain equations $$\Gamma(U, W\MO_X(D))=\prod_{n=0}^{\infty} \Gamma(U, \MO_X(p^nD)).$$ \end{rem} \begin{rem}\label{r-perturb} We use notation as in Definition \ref{d-div-def}. Fix a positive integer $n$. Thanks to Remark \ref{r-div-def}, we obtain equations of subsets of $W_n(K(X))=\prod_{m=0}^{n-1}K(X)$: $$\Gamma(U, W_n\MO_X(D))=\prod_{m=0}^{n-1} \Gamma(U, \MO_X(p^mD)) =\prod_{m=0}^{n-1} \Gamma(U, \MO_X(\llcorner p^mD\lrcorner)).$$ Thus, if $E$ is an effective $\R$-divisor on $X$, then there exists a positive real number $\epsilon$ such that the equation $$W_n\MO_X(D)=W_n\MO_X(D')$$ holds as subsheaves of the constant sheaf $W(K(X))$ for any $\R$-divisor $D'$ satisfying $D \leq D' \leq D+\epsilon E$. \end{rem} \begin{lem}\label{l-div-sub} Let $X$ be an integral normal noetherian $\F_p$-scheme. Let $D$ be an $\R$-divisor on $X$. Then the following hold. \begin{enumerate} \item $W\MO_X(D)$ is a sheaf of $W\MO_X$-submodules of $W(K(X))$, i.e. for any open subset $U$ of $X$, $\Gamma(U, W\MO_X(D))$ is a $W\MO_X(U)$-submodule of $W(K(X))$. \item For any positive integer $n$, $W_n\MO_X(D)$ is a sheaf of $W_n\MO_X$-submodules of $W_n(K(X))$, i.e. for any open subset $U$ of $X$, $\Gamma(U, W_n\MO_X(D))$ is a $W_n\MO_X(U)$-submodule of $W_n(K(X))$. Furthermore, $W_n\MO_X(D)$ is a quasi-coherent $W_n\MO_X$-module. \end{enumerate} \end{lem} \begin{proof} Let us show (1). We may assume that $X=U$ and $X$ is affine, say $X=U=\Spec\,A$. Fix $\varphi, \psi \in \Gamma(X, W\MO_X(D))$. Let us prove $\varphi+\psi \in \Gamma(X, W\MO_X(D))$. We can write $$\varphi=(\varphi_0, \varphi_1, \cdots), \quad \psi=(\psi_0, \psi_1, \cdots)$$ for some $\varphi_n, \psi_n \in \Gamma(X, \MO_X(p^nD))$. By Lemma \ref{l-sum-def}, we have that $$\varphi+\psi=(S_0(\varphi_0, \psi_0), S_1(\varphi_0, \psi_0, \varphi_1, \psi_1), \cdots)$$ for some polynomials $$S_n(x_0, y_0, \cdots, x_n, y_n) \in \Z[x_0, y_0, \cdots, x_n, y_n]$$ satisfying the properties listed in Lemma \ref{l-sum-def}. We equip the polynomial ring $\Z[x_0, y_0, x_1, y_1, \cdots]$ with the structure of graded $\Z$-algebra defined in the statement of Lemma \ref{l-sum-homog}, i.e. we consider $\Z[x_0, y_0, x_1, y_1, \cdots]$ as a wighted polynomial ring such that $\deg x_i=\deg y_i=p^i$. Pick a monomial $x_0^{a_0}y_0^{b_0} \cdots x_n^{a_n}y_n^{b_n}$ appearing in the monomial decomposition of $S_n(x_0, y_0, \cdots, x_n, y_n)$. Since $S_n$ is homogeneous of degree $p^n$ (Lemma \ref{l-sum-homog}), it holds that $$\sum_{i=0}^n p^i(a_i+b_i)=p^n.$$ Thanks to $${\rm div} (\varphi_i) \geq -p^iD\qquad {\rm and}\quad \quad {\rm div} (\psi_i) \geq -p^iD,$$ we have that \begin{eqnarray*} {\rm div} (\varphi_0^{a_0}\psi_0^{b_0} \cdots \varphi_n^{a_n}\psi_n^{b_n}) &=&\sum_{i=0}^n (a_i{\rm div} (\varphi_i)+b_i{\rm div} (\psi_i))\\ &\geq &-\sum_{i=0}^n p^i(a_i+b_i)D\\ &=& -p^nD. \end{eqnarray*} In other words, we obtain $\varphi_0^{a_0}\psi_0^{b_0} \cdots \varphi_n^{a_n}\psi_n^{b_n} \in \Gamma(X, \MO_X(p^nD))$. Therefore, it holds that $\varphi+\psi \in \Gamma(X, W\MO_X(D))$. Fix $a=(a_0, a_1, \cdots) \in W(A)$ and $\varphi=(\varphi_0, \varphi_1, \cdots) \in \Gamma(X, W\MO_X(D))$. Let us show $a\varphi \in \Gamma(X, W\MO_X(D))$. We can write $$a\varphi=\left(\sum_{m=0}^{\infty} V^m({\underline{a_m}})\right) \cdot (\varphi_0, \varphi_1, \cdots).$$ Thus, for any $b \in A$ and any $m \in \Z_{\geq 0}$, it suffices to prove that $$(V^m(\underline{b})) \cdot (\varphi_0, \varphi_1, \cdots) \in \Gamma(X, W\MO_X(D)).$$ We have that \begin{eqnarray*} (V^m(\underline{b})) \cdot (\varphi_0, \varphi_1, \cdots) &=&V^m(\underline{b} \cdot (\varphi_0^{p^m}, \varphi_1^{p^m}, \cdots))\\ &=&V^m(b\varphi_0^{p^m}, b^p\varphi_1^{p^m}, \cdots)\\ &=:&(\psi_0, \psi_1, \cdots). \end{eqnarray*} Since ${\rm div}(\varphi_{\ell}) \geq -p^{\ell}D$ for any $\ell$, it holds that $\psi_0=\cdots=\psi_{m-1}=0$ and that if $n \geq m$, then $${\rm div}(\psi_n) = {\rm div}(b^{p^{n-m}}\varphi_{n-m}^{p^m}) \geq {\rm div}(\varphi_{n-m}^{p^m})$$ $$=p^m {\rm div}(\varphi_{n-m}) \geq p^m\cdot (-p^{n-m}D)=-p^nD.$$ Therefore, we get $a\varphi \in \Gamma(X, W\MO_X(D))$. Thus, (1) holds. Let us show (2). By the same argument as in (1), we have that $W_n\MO_X(D)$ is a sheaf of $W_n\MO_X$-submodules of $W_n(K(X))$. What is remaining is to prove that $W_n\MO_X(D)$ is a quasi-coherent $W_n\MO_X$-module. We may assume that $X=\Spec\,A$. Take $f \in A \setminus \{0\}$. It suffices to show that the natural $W_n(A)_{\underline{f}}$-module homomorphism $$\theta:\Gamma(X, W_n\MO_X(D))_{\underline{f}} \to \Gamma(D(f), W_n\MO_X(D))$$ is bijective. Since $\theta$ is compatible with the inclusions to $W_n(K(X))$, it holds that $\theta$ is injective. Let us prove that $\theta$ is surjective. Take $$\varphi=(\varphi_0, \cdots, \varphi_{n-1}) \in \Gamma(D(f), W_n\MO_X(D)),$$ where $({\rm div}(\varphi_i)+p^iD)|_{D(f)} \geq 0$. We can find $N \in \Z_{>0}$ such that $${\rm div}(f^N\varphi_i)+p^iD \geq 0$$ for any $i \in \{0, \cdots, n-1\}$. In particular, $$\underline{f}^N\varphi=(f^N\varphi_0, \cdots, f^{Np^{n-1}}\varphi_{n-1}) \in \Gamma(X, W_n\MO_X(D)).$$ Thus, $\theta$ is surjective. Hence, (2) holds. \end{proof} \begin{rem}\label{r-div-codim2} We use notation as in Definition \ref{d-div-def}. Take an open subset $X'$ of $X$ such that $X'$ contains all the points of codimension one in $X$. Let $j:X' \to X$ be the induced open immersion. Then it holds that both $W\MO_X(D) \to j_*(W\MO_X(D)|_{X'})$ and $W_n\MO_X(D) \to j_*(W_n\MO_X(D)|_{X'})$ are isomorphisms for any $n \in \Z_{>0}$ (cf. Remark \ref{r-div-def}). \end{rem} \begin{prop}\label{p-div-induction} Let $X$ be an integral normal noetherian $\F_p$-scheme and let $D$ be an $\R$-divisor on $X$. Then there are exact sequences of $W\MO_X$-module homomorphisms: \begin{equation}\label{e-div-induction1} 0 \to (F_X^n)_*(W\MO_X(p^nD)) \xrightarrow{V^n} W\MO_X(D) \to W_n\MO_X(D) \to 0 \end{equation} {\small \begin{equation}\label{e-div-induction2} 0 \to (F_X^n)_*(W_m\MO_X(p^nD)) \xrightarrow{V^n} W_{n+m}\MO_X(D) \to W_n\MO_X(D) \to 0 \end{equation} } for any positive integers $n$ and $m$. \end{prop} \begin{proof} Let us prove that the first sequence (\ref{e-div-induction1}) is exact. This is a subcomplex of the exact sequence $$0 \to (F_X^n)_*W(K(X)) \xrightarrow{V^n} W(K(X)) \to W_n(K(X)) \to 0.$$ In particular, $V^n:(F_X^n)_*(W\MO_X(p^nD)) \to W\MO_X(D)$ is injective. By construction, the latter homomorphism $W\MO_X(D) \to W_n\MO_X(D)$ is surjective. Let us prove the exactness on the middle term $W\MO_X(D)$. Take an element $$\varphi =(\varphi_0, \varphi_1, \cdots) \in \Gamma(X, W\MO_X(D))$$ whose image to $W_n\MO_X(D)$ is zero, i.e. $\varphi_0=\cdots=\varphi_{n-1}=0$. We can check directly from Definition \ref{d-div-def} that $$(\varphi_n, \varphi_{n+1}, \cdots) \in \Gamma(X, W_n\MO_X(p^nD)),$$ hence the sequence (\ref{e-div-induction1}) is exact. It holds by the same argument that also (\ref{e-div-induction2}) is exact. \end{proof} \begin{prop}\label{p-div-coherent} Let $X$ be an integral normal $F$-finite noetherian $\F_p$-schemes. Let $D$ be an $\R$-divisor on $X$. Then, for any positive integer $n$, $W_n\MO_X(D)$ is a coherent $W_n\MO_X$-module. \end{prop} \begin{proof} Thanks to Lemma \ref{l-div-sub}(2), $W_n\MO_X(D)$ is a quasi-coherent $W_n\MO_X$-module. Since $X$ is $F$-finite, $(F^n_X)_*(M)$ is a coherent $W_n\MO_X$-module for any coherent $W_n\MO_X$-module $M$. Thus the assertion follows from induction on $n$ and the exact sequence (\ref{e-div-induction2}) of Lemma \ref{p-div-induction}. \end{proof} \begin{lem}\label{l-linear-eq} Let $X$ be an integral normal noetherian $\F_p$-scheme. Assume that $\R$-divisors $D_1$ and $D_2$ on $X$ are $\Z$-linearly equivalent i.e. $D_2=D_1+{\rm div}(\varphi)$ for some $\varphi \in K(X)^{\times}$. Then $W\MO_X(D_1)$ and $W\MO_X(D_2)$ are isomorphic as $W\MO_X$-modules, and $W_n\MO_X(D_1)$ and $W_n\MO_X(D_2)$ are isomorphic as $W_n\MO_X$-modules for any $n \in \Z_{>0}$. \end{lem} \begin{proof} We have an $\MO_X$-module isomorphism: $$\times \varphi^{p^n}: \MO_X(p^nD_1) \xrightarrow{\simeq} \MO_X(p^nD_2), \quad f \mapsto \varphi^{p^n} f.$$ Therefore, the $W\MO_X$-module homomorphism $$\times \underline{\varphi}: W(K(X)) \to W(K(X))$$ induces a $W\MO_X$-module isomorphism $W\MO_X(D_1) \simeq W\MO_X(D_2)$. The same argument implies $W_n\MO_X(D_1) \simeq W_n\MO_X(D_2)$ for any $n \in \Z_{>0}$. \end{proof} \begin{lem}\label{l-hom-torsion} Let $X$ be an integral normal noetherian $\F_p$-scheme. Let $D$ be an $\R$-divisor on $X$ and let $F$ be a quasi-coherent $W_n\MO_X$-module such that the induced map $F(U) \to F_{\xi}$ is injective for any non-empty open subset $U$ of $X$, where $F_{\xi}$ denotes the stalk at the generic point $\xi$ of $X$. Then the natural $W\MO_X$-module homomorphism $$\theta:\mathcal Hom_{W_n\MO_X}(W_n\MO_X(D), F) \to \mathcal Hom_{W\MO_X}(W\MO_X(D), F)$$ is an isomorphism. \end{lem} \begin{proof} Let us recall that $\theta$ is obtained as follows. Applying the contravariant functor $\mathcal Hom_{W\MO_X}(-, F)$ to the natural $W\MO_X$-module homomorphism $$\rho:W\MO_X(D) \to W_n\MO_X(D),$$ we obtain a $W\MO_X$-module homomorphism $$\theta':\mathcal Hom_{W\MO_X}(W_n\MO_X(D), F) \to \mathcal Hom_{W\MO_X}(W\MO_X(D), F).$$ Since both $W_n\MO_X(D)$ and $F$ are $W_n\MO_X$-modules, we have a natural isomorphism $$\tau:\mathcal Hom_{W_n\MO_X}(W_n\MO_X(D), F) \xrightarrow{\simeq} \mathcal Hom_{W\MO_X}(W_n\MO_X(D), F).$$ Then we set $\theta:=\theta' \circ \tau$. Since $\rho$ is surjective and $\mathcal Hom_{W\MO_X}(-, F)$ is left exact, it holds that $\theta$ is injective. Thus it suffices to prove that $\theta$ is surjective. Assume that $X$ is affine and fix a $W\MO_X$-module homomorphism $$f:W\MO_X(D) \to F.$$ It is enough to construct a $W_n\MO_X$-module homomorphism $$g:W_n\MO_X(D) \to F$$ such that $\theta(g)=f$. If we consider $W_n(K(X))$, $(W_n\MO_X)_{\xi}$ and $F_{\xi}$ as the corresponding constant sheaves on $X$, we have isomorphisms \begin{equation}\label{e1-hom-torsion} W\MO_X(D) \otimes_{W\MO_X} W_n(K(X)) \simeq W_n(K(X)), \end{equation} \begin{equation}\label{e2-hom-torsion} F \otimes_{W_n\MO_X} W_n(K(X)) \simeq F \otimes_{W_n\MO_X} (W_n\MO_X)_{\xi} \simeq F_{\xi}, \end{equation} where the isomorphism (\ref{e1-hom-torsion}) can be checked directly, the first isomorphism of (\ref{e2-hom-torsion}) holds by \cite[Ch. 0, (1.5.2)]{Ill79} and the second isomorphism of (\ref{e2-hom-torsion}) follows from the assumption that $F$ is quasi-coherent. Then we obtain a commutative diagram: $$\begin{CD} W_n(K(X)) @> f''>> F_{\xi}\\ @AA\varphi A @AA\psi A\\ W\MO_X(D) \otimes_{W\MO_X} W_n\MO_X @>f'>> F, \end{CD}$$ where $f'$ is induced by $f$ and $f''$ is defined as $f' \otimes_{W_n\MO_X} W_n(K(X))$ via (\ref{e1-hom-torsion}) and (\ref{e2-hom-torsion}). It follows from direct computation that $${\rm Im}(\varphi)=W_n\MO_X(D).$$ Therefore, we get a $W_n\MO_X$-module homomorphism $$g: W_n\MO_X(D) \to {\rm Im}(f'' \circ \varphi) ={\rm Im}(\psi \circ f') \hookrightarrow {\rm Im}(\psi) \simeq F, $$ where the last isomorphism holds by the assumption that $F(U) \to F_{\xi}$ is injective. By construction, we can check that $\theta(g)=f$. \end{proof} \subsection{Teichm\"{u}ller lifts of invertible sheaves} In this subsection, we introduce Teichm\"uller lifts of invertible sheaves (Definition \ref{d-teich-lift}). This notion will turn out to be a special case of Witt divisorial sheaves for normal varieties (Proposition \ref{p-div-Teich}). \begin{dfn}\label{d-teich-lift} Let $X$ be an $\F_p$-scheme and let $L$ be an invertible $\MO_X$-module. Then $L$ can be represented by $\{(U_i, f_{ij})\}_{i \in I}$ satisfying the following properties: \begin{itemize} \item $U_i$ is an open affine subset of $X$ for any $i \in I$. \item $X=\bigcup_{i \in I} U_i$. \item $f_{ij} \in \Gamma(U_{ij}, f_{ij})^{\times}$ for any $i, j \in I$, where $U_{ij} := U_i \cap U_j$. \item The equation $(f_{ij}|_{U_{ijk}})(f_{jk}|_{U_{ijk}})(f_{ki}|_{U_{ijk}})=1$ holds in $\Gamma(U_{ijk}, f_{ij})^{\times}$, where $U_{ijk} := U_i \cap U_j \cap U_k$. \end{itemize} We define the {\em Teichm\"uller lift of} $L$, denoted by $\underline{L}$, as the invertible $W\MO_X$-module defined by $\{(U_i, \underline{f_{ij}})\}_{i \in I}$. Note that $\underline L$ coincides with the invertible $W\MO_X$-module corresponding to the image of $L$ by the group homomorphism $$\check{H}^1(X, \MO_X^{\times}) \to \check{H}^1(X, W\MO_X^{\times})$$ that is induced by the Teichm\"{u}ller lift $\MO_X^{\times} \to W\MO_X^{\times},\,\, f \mapsto \underline f$. In particular, the isomorphism class of $\underline L$ does not depend on the choice of representation $\{(U_i, f_{ij})\}_{i \in I}$. For any positive integer $n$, we define the invertible $W_n\MO_X$-module $\underline{L}_{\leq n}$ in the same way. \end{dfn} \begin{rem}\label{r-teich-lift} By definition, we obtain $\underline{L} \otimes_{W\MO_X} W_n\MO_X \simeq \underline{L}_{\leq n}$ and $\underline{L}_{\leq 1} =L$. \end{rem} \begin{prop}\label{p-div-Teich} Let $X$ be an integral normal noetherian $\F_p$-scheme. Let $D$ be a Cartier divisor on $X$. Then the following hold. \begin{enumerate} \item The Witt divisorial sheaf $W\MO_X(D)$ is isomorphic to the Teichm\"uller lift $\underline{\MO_X(D)}$ of $\MO_X(D)$ as $W\MO_X$-modules. \item The Witt divisorial sheaf $W_n\MO_X(D)$ is isomorphic to the Teichm\"uller lift $\underline{\MO_X(D)}_{\leq n}$ of $\MO_X(D)$ as $W_n\MO_X$-modules. \end{enumerate} \end{prop} \begin{proof} Let us show (1). By definition of Cartier divisors, $D$ is represented by $\{(U_i, f_i)\}$, where $X=\bigcup_{i \in I} U_i$ is an affine open cover of $X$, $f_i \in K(X)^{\times}$ and $f_i/f_j \in \Gamma(U_i \cap U_j, \MO_X^{\times})$. Then, for any open subset $V$ of $X$, we have that $$\Gamma(V, W\MO_X(D))= \bigcap_{i \in I}\{(\varphi_0, \varphi_1, \cdots) \in W(K(X))\,|\, {\rm div}(f_i^{-p^n} \varphi)|_{V \cap U_i} \geq 0\}.$$ Therefore, we get an equation $$W\MO_X(D)|_{U_i}=\underline{f_i^{-1}}W\MO_{U_i}$$ as subsheaves of the constant sheaf $W(K(X))$, where the right hand side is isomorphic to $W\MO_{U_i}$. In particular, $W\MO_X(D)$ is the invertible $W\MO_X$-module represented by $\{(U_i, \underline{f_i^{-1}f_j})\}$, which is isomorphic to the Teichm\"uller lift $\underline{\MO_X(D)}$. Thus (1) holds. We omit the proof of (2), as we can apply the same argument as in (1). \end{proof} \subsection{Pullback of divisors} In this subsection, we observe relation between Witt divisorial sheaves and the behaviour of pullbacks of divisors (Lemma \ref{l-finite-trace}, Lemma \ref{l-div-etale}). First let us recall definition of pullbacks of $\R$-divisors. \begin{nothing}[Definition of pullback]\label{d-pullback} Let $f:X \to Y$ be a dominant morphism of integral normal excellent $\F_p$-schemes. Let $D$ be an $\R$-divisor on $Y$. Since $f$ is dominant, we have a field extension $\varphi:K(Y) \hookrightarrow K(X)$, which induces an injective ring homomorphism \begin{equation*} W(\varphi):W(K(Y)) \hookrightarrow W(K(X)). \end{equation*} In the following, we shall define $f^*D$ and a $W\MO_Y$-module homomorphism $$W\MO_Y(D) \to f_*W\MO_X(f^*D)$$ compatible with $W(\varphi)$, under the assumption that \begin{enumerate} \item $D$ is $\R$-Cartier, or \item $f$ is separated and quasi-finite. \end{enumerate} (1) First we assume that $D$ is $\R$-Cartier. Then $f^*D$ is defined as in Subsection \ref{ss-notation}(\ref{ss-notation-9}), hence we have $$\varphi':\MO_Y(p^mD) \to \MO_X(p^mf^*D)$$ that is compatible with $\varphi$. Thus, $W(\varphi)$ induces $W\MO_Y$-module homomorphism: $$\alpha: W\MO_Y(D) \to W\MO_X(f^*D).$$ (2)' As a special case of (2), we treat the case when $f$ is a finite morphism. Let $X_0$ and $Y_0$ be the regular locus of $X$ and $Y$ respectively. Note that $X_0$ and $Y_0$ are open subsets of $X$ and $Y$ respectively, because $X$ and $Y$ are assumed to be excellent schemes. We set $$Y_1:=Y_0 \cap (Y \setminus f(X \setminus X_0)), \quad X_1:=f^{-1}(Y_1)$$ and let $f_1:X_1 \to Y_1$ be the induced morphism. We define $f^*D$ as the closure of the $\R$-divisor $f_1^*D|_{Y_1}$ on $X_1$. By (1), we have an $W\MO_{Y_1}$-module homomorphism $$\alpha: W\MO_Y(D)|_{Y_1} \to (f_1)_*(W\MO_X(f^*D)|_{X_1})=(f_*W\MO_X(f^*D))|_{Y_1}$$ compatible with $W(\varphi)$. Thanks to Remark \ref{r-div-codim2}, we get a $W\MO_Y$-module homomorphism $$\beta:=j_*\alpha: W\MO_Y(D) \to W\MO_X(f^*D)$$ compatible with $W(\varphi)$, where $j:Y_1 \hookrightarrow Y$ is the induced open immersion. (2) Finally we treat the case when $f$ is a separated quasi-finite morphism. By \cite[Theorem 1.10.13]{Fu11}, there is a factorisation $$f:X \xrightarrow{i} Z \xrightarrow{g} Y$$ where $Z$ is an integral normal excellent $\F_p$-scheme, $i$ is an open immersion and $g$ is a finite morphism. We define $f^*D:=(g^*D)|_X$, where $g^*D$ is defined in (2)'. By (2)', we have an $W\MO_Y$-module homomorphism $$\beta: W\MO_Y(D) \to g_*W\MO_Z(g^*D),$$ which induces $W\MO_Y$-module homomorphisms $$\gamma: W\MO_Y(D) \xrightarrow{\beta} g_*W\MO_Z(g^*D) \xrightarrow{\delta} g_*i_*W\MO_X(g^*D|_X)=f_*W\MO_X(f^*D),$$ where $\delta$ is the restriction map. By the same argument as above, if one of (1) and (2) holds, then we obtain a $W_n\MO_Y$-module homomorphism $W_n\MO_Y(D) \to f_*W_n\MO_X(f^*D)$. \end{nothing} \begin{lem}\label{l-finite-trace} Let $f:X \to Y$ be a finite surjective morphism of integral normal excellent $\F_p$-schemes. Assume that the induced field extension $K(Y) \subset K(X)$ is Galois and that the cardinality of its Galois group $G$ is not divisible by $p$. Let $D$ be an $\R$-divisor on $Y$. Then the following hold. \begin{enumerate} \item The induced $W_n\MO_Y$-module homomorphism $$W_n\MO_Y(D) \to f_*(W_n\MO_X(f^*D))$$ that is defined in (\ref{d-pullback}) splits for any $n \in \Z_{\geq 1}$. \item The induced $W\MO_Y$-module homomorphism (\ref{d-pullback}) $$W\MO_Y(D) \to f_*(W\MO_X(f^*D))$$ that is defined in (\ref{d-pullback}) splits. \end{enumerate} \end{lem} \begin{proof} We omit the proof of (1), as it is the same as the one of (2). Let us prove (2). Removing closed subsets of $X$ and $Y$ whose codimensions are at least two, we are reduced to the case when \begin{itemize} \item both $X$ and $Y$ are regular, and \item if $D_1$ and $D_2$ are distinct prime divisors contained in $\Supp\,D$, then $D_1 \cap D_2=\emptyset$. \end{itemize} For any $\sigma \in G$, the $K(Y)$-algebra automorphism $\sigma:K(X) \to K(X)$ induces an $\MO_Y$-module automorphism $$\sigma:f_*(\MO_X(p^nf^*D)) \to f_*\sigma_*(\MO_X(p^n\sigma^*f^*D)) =f_*(\MO_Y(p^nf^*D)).$$ Hence, the $W(K(Y))$-algebra automorphism $W(\sigma):W(K(X)) \to W(K(X))$ induces a $W\MO_Y$-module automorphism $$W(\sigma):f_*(W\MO_X(f^*D)) \to f_*(W\MO_X(f^*D)).$$ We denote by $(f_*W\MO_X(f^*D))^G$ the $G$-invariant $W\MO_X$-submodule of $f_*(W\MO_X(f^*D))$, i.e. for any open subset $V$ of $Y$, we set $$\Gamma(V, f_*(W\MO_X(f^*D))^G):=\bigcap_{\sigma \in G} \{\beta \in \Gamma(V, f_*(W\MO_X(f^*D)))\,|\, W(\sigma)(\beta)=\beta\}.$$ In particular, we obtain $W\MO_Y$-module homomorphisms: $$W\MO_Y(D) \xrightarrow{\rho'} (f_*W\MO_X(f^*D))^G \hookrightarrow f_*W\MO_X(f^*D).$$ \setcounter{step}{0} \begin{step}\label{s1-finite-trace} The induced ring homomorphism $$\theta:W(K(Y)) \to W(K(X))^G$$ is bijective. \end{step} \begin{proof}[Proof of Step \ref{s1-finite-trace}] Since $\theta$ is automatically injective, it suffices to prove that $\theta$ is surjective. Take $$b=(b_0, b_1, \cdots) \in W(K(X))^G,$$ i.e. $b \in W(K(X))$, $b_i \in K(X)$, and $W(\sigma)(b)=b$ for any $\sigma \in G$. Then we have that $$(b_0, b_1, \cdots)=W(\sigma)(b)=(\sigma(b_0), \sigma(b_1), \cdots),$$ hence $\sigma(b_i)=b_i$ for any $i\geq 0$ and $\sigma \in G$. Therefore, $b_i \in K(Y)$ for any $i \geq 0$. This completes the proof of Step \ref{s1-finite-trace}. \end{proof} \begin{step}\label{s2-finite-trace} The induced $\MO_Y$-module homomorphism $$\rho:\MO_Y(D) \to (f_*\MO_X(f^*D))^G$$ is an isomorphism. \end{step} \begin{proof}[Proof of Step \ref{s2-finite-trace}] Replacing $D$ by a slightly larger $\Q$-divisor, we may assume that $D$ is a $\Q$-divisor (cf. Remark \ref{r-perturb}). It is obvious that $\rho$ is injective, hence let us prove that $\rho$ is surjective. Since the problem is local on $Y$, we may assume that $$D=q {\rm div}(\psi)$$ for some $q \in \Q \setminus \{0\}$ and $\psi \in K(Y)^{\times}$. Take $$\varphi \in \Gamma(X, f^*D)^G=\Gamma(X, f^*D) \cap K(Y).$$ We have that $$f^*({\rm div}(\varphi)+q{\rm div}(\psi)) \geq 0.$$ Let $m \in \Z_{>0}$ such that $mq \in \Z$. It holds that $$\varphi^m\psi^{mq} \in \Gamma(X, \MO_X) \cap K(Y)=\Gamma(Y, \MO_Y).$$ This implies that $${\rm div}(\varphi)+q{\rm div}(\psi) \geq 0,$$ which is equivalent to $$\varphi \in \Gamma(X, D).$$ Thus, $\rho$ is surjective. This completes the proof of Step \ref{s2-finite-trace}. \end{proof} \begin{step}\label{s3-finite-trace} The induced $W\MO_Y$-module homomorphism: $$\rho':W\MO_Y(D) \to (f_*W\MO_X(f^*D))^G$$ is an isomorphism. \end{step} \begin{proof}[Proof of Step \ref{s3-finite-trace}] It is clear that $\rho'$ is injective, hence let us prove that $\rho'$ is surjective. Take $\beta \in \Gamma(Y, (f_*W\MO_X(f^*D))^G)$. We have that $$\beta=(b_0, b_1, \cdots) \in W(K(X))^G=W(K(Y)).$$ Then, for any $n \in \Z_{\geq 0}$, it holds that $$b_n \in K(Y) \cap \Gamma(X, \MO_X(p^nf^*(D)))=\Gamma(Y, \MO_X(p^n D)),$$ where the last equation follows from Step \ref{s2-finite-trace}. Therefore, $\rho'$ is surjective. This completes the proof of Step \ref{s3-finite-trace}. \end{proof} \begin{step}\label{s4-finite-trace} The assertion (2) holds. \end{step} \begin{proof}[Proof of Step \ref{s4-finite-trace}] We have an $W\MO_Y$-module homomorphism: \begin{eqnarray*} T:f_*(W\MO_X(f^*D)) &\to & W\MO_Y(D), \\ \beta &\mapsto& \frac{1}{|G|} \sum_{\sigma \in G} \sigma(\beta). \end{eqnarray*} Then $T$ gives the splitting of the natural $W\MO_X$-module homomorphism $W\MO_Y(D) \to f_*(W\MO_X(f^*D))$. Thus (2) holds, which completes the proof of Step \ref{s4-finite-trace}. \end{proof} Step \ref{s4-finite-trace} completes the proof of Lemma \ref{l-finite-trace}. \end{proof} \begin{rem} With notation as in the statement of Lemma \ref{l-finite-trace}, the $W\MO_{Y, \Q}$-module homomorphism $$\gamma:W\MO_Y(D)_{\Q} \to f_*(W\MO_X(f^*(D)))_{\Q}$$ splits. Furthermore, this splitting holds even if we drop the assumption that $f$ is Galois. Although we do not use this fact in the paper, let us give a sketch of a proof. If $f$ is purely inseparable, then $\gamma$ is an isomorphism automatically. If $f$ is Galois, then the same proof as above works even for the case when $|G|$ is divisible by $p$. If $f$ is separable, then the problem can be reduced, by taking a splitting field, to the case when $f$ is Galois. \end{rem} \begin{lem}\label{l-div-etale} Let $f:X \to Y$ be an \'etale morphism of regular excellent $\F_p$-schemes. Let $D$ be an $\R$-divisor on $Y$. Then the $W_n\MO_X$-module homomorphism $$(W_nf)^*(W_n\MO_Y(D)) \to W_n\MO_X(f^*D)$$ induced by (\ref{d-pullback}) is an isomorphism, where $W_nf$ denotes the induced morphism $W_nX \to W_nY$ of schemes. \end{lem} \begin{proof} Recall that the $W_n\MO_X$-module homomorphism $$W_n\MO_Y(D) \to f_*W_n\MO_X(f^*D)=(W_nf)_*(W_n\MO_X(f^*D))$$ defined in (\ref{d-pullback}) induces, by adjoint, a $W_n\MO_Y$-module homomorphism $$\alpha_n:(W_nf)^*(W_n\MO_Y(D)) \to W_n\MO_X(f^*D).$$ It follows from \cite[Ch. 0, Proposition 1.5.8]{Ill79} that $$(F_X)_*(W_nf)^*(W_n\MO_Y(D))\simeq (W_nf)^*((F_Y)_*W_n\MO_Y(D)).$$ Thus we get a commutative diagram: {\tiny $$\begin{CD} 0 @>>> (F_X)_*(W_nf)^*(W_n\MO_Y(D)) @>>> (W_{n+1}f)^*(W_{n+1}\MO_Y(D)) @>>> f^*(\MO_Y(D)) @>>> 0\\ @. @VV(F_X)_*\alpha_nV @VV\alpha_{n+1}V @VV\alpha_1 V\\ 0 @>>> (F_X)_*W_n\MO_X(D)) @>>> W_{n+1}\MO_X(D) @>>> \MO_X(D) @>>> 0,\\ \end{CD}$$ } where both the horizontal sequences are exact (cf. Proposition \ref{p-div-induction}). By the snake lemma and induction on $n$, it suffices to prove that $$\alpha_1:f^*\MO_Y(D) \to \MO_X(f^*D).$$ is an isomorphism. Since $f$ is \'etale, $f^*S$ is a reduced divisor for any prime divisor $S$ of $Y$. Thus we have that $$\MO_Y(D)=\MO_Y(\llcorner D \lrcorner) \quad {\rm and} \quad \MO_X(f^*D)=\MO_X(\llcorner f^*D\lrcorner)=\MO_X(f^*(\llcorner D\lrcorner)).$$ Replacing $D$ by $\llcorner D \lrcorner$, we may assume that $D$ is a Cartier divisor. In this case, we can check directly that $\alpha_1$ is an isomorphism. \end{proof} \subsection{CM-ness of $W_n\MO_X(D)$} In this subsection, we prove that $W_n\MO_X(D)$ is Cohen-Macaulay under suitable conditions (Theorem \ref{t-div-CM}). As an application, we obtain some vanishing of Ext sheaves (Proposition \ref{p-div-CM}). \begin{thm}\label{t-div-CM} Let $k$ be a perfect field of characteristic $p>0$ and let $X$ be an affine integral scheme essentially smooth over $k$ (cf. Subsection \ref{ss-notation}(\ref{ss-notation-14})). Let $D$ be an $\R$-divisor on $X$ such that $\Supp\,\{D\}$ is simple normal crossing. Then, for any positive integer $n$, $W_n\MO_X(D)$ is a Cohen-Macaulay $W_n\MO_X$-module. \end{thm} \begin{proof} Set $A:=\Gamma(X, \MO_X)$. We divide the proof into two steps. \setcounter{step}{0} \begin{step}\label{s1-div-CM} Theorem \ref{t-div-CM} holds if \begin{enumerate} \item $\ell D$ is a $\Z$-divisor for some prime number $\ell$ such that $p \neq \ell$, and \item there exists an element $\zeta \in A$ such that $\zeta^{\ell}=1$ and $\zeta \neq 1$. \end{enumerate} \end{step} \begin{proof}[Proof of Step \ref{s1-div-CM}] Since the problem is local, we may assume that $A$ is a local ring. By (1), there are integers $e_1, \cdots, e_N$ and a regular system of parameter $x_1, \cdots, x_N$ of $A$ such that $$\ell D={\rm div} (x_1^{e_1}\cdots x_N^{e_N}).$$ We set $$B:=A[y_1, \cdots, y_N]/(y_1^{\ell}-x_1, \cdots, y_N^{\ell}-x_N).$$ Let $\overline{y}_i$ be the image of $y_i$ in $B$. \begin{claim}\label{c-div-CM} $B$ is a regular local ring whose maximal ideal $\n$ satisfies $$\n=B\overline{y}_1+\cdots+B\overline{y}_N.$$ \end{claim} \begin{proof}[Proof of Claim \ref{c-div-CM}] The ideal $$\n':=B\overline{y}_1+\cdots+B\overline{y}_N$$ of $B$ is a maximal ideal of $B$, because of isomorphisms \begin{eqnarray*} B/\n' &\simeq & A[y_1, \cdots, y_N]/(y_1^{\ell}-x_1, \cdots, y_N^{\ell}-x_N, y_1, \cdots, y_N)\\ & \simeq & A[y_1, \cdots, y_N]/(x_1, \cdots, x_N, y_1, \cdots, y_N)\\ & \simeq & A/(x_1, \cdots, x_N). \end{eqnarray*} Thus it is enough to prove that any maximal ideal $\n''$ of $B$ contains $\n'$. Since $A \to B$ is a finite injective ring homomorphism, it holds that $\n'' \cap A$ is equal to the maximal ideal of $A$, hence $x_1, \cdots, x_n \in \n''$. As $$\overline{y}_i^{\ell}=x_i \in \n'',$$ it holds that $\overline{y}_i \in \n''$. Therefore, we get $\n'' \supset \n'$, as desired. This completes the proof of Claim \ref{c-div-CM}. \end{proof} Let us go back to the proof of Step \ref{s1-div-CM}. For $Y:=\Spec\,B$, $f:Y \to X$ is a finite surjective morphism of excellent regular affine schemes such that $K(X) \subset K(Y)$ is a Galois extension whose degree is not divisible by $p$. In particular, the induced $W_n\MO_X$-module $$W_n\MO_X(D) \to f_*(W_n\MO_Y(f^*D))$$ splits (Lemma \ref{l-finite-trace}). Since $$f^*D=\frac{1}{\ell}f^*{\rm div} (x_1^{e_1}\cdots x_N^{e_N}) =\frac{1}{\ell}{\rm div} (\overline y_1^{\ell e_1}\cdots \overline y_N^{\ell e_N})= {\rm div} (\overline y_1^{e_1}\cdots \overline y_N^{e_N}),$$ it holds that $f^*D$ is a Cartier divisor on $Y$. In particular, $W_n\MO_Y(f^*D)$ is an invertible $W_n\MO_Y$-module (Proposition \ref{p-div-Teich}(2)). Since the scheme $W_nY$ is Cohen--Macaulay (\cite[Theorem 4.1]{Eke84}), $W_n\MO_Y(f^*D)$ is a Cohen--Macaulay $W_n\MO_Y$-module. Thus, $f_*W_n\MO_Y(f^*D)$ is a Cohen--Macaulay $W_n\MO_X$-module. Hence, also a direct summand $W_n\MO_X(D)$ of it is a Cohen--Macaulay $W_n\MO_X$-module (cf. \cite[Theorem 3.5.7]{BH93}). This completes the proof of Step \ref{s1-div-CM}. \end{proof} \begin{step}\label{s2-div-CM} Theorem \ref{t-div-CM} holds without any additional assumption. \end{step} \begin{proof}[Proof of Step \ref{s2-div-CM}] By Remark \ref{r-perturb}, we may assume that there exists a prime number $\ell$ such that $\ell \neq p$ and $\ell D$ is a $\Z$-divisor. If $A$ contains a primitive $\ell$-th root of unity, then we are done by Step \ref{s1-div-CM}. Thus we may assume that $A$ does not contain any primitive $\ell$-th roots of unity. Then it holds that $$\varphi:A \to A[z]/(z^{\ell-1}+z^{\ell-2}+\cdots+1)=:C$$ is a finite \'etale ring homomorphism to an integral domain $C$. Set $Z:=\Spec\,C$ and let $$g:Z=\Spec\,C \to \Spec\,A=X$$ be the induced morphism. Then $Z$ an affine integral scheme that is essentially smooth over $k$. Since $D_Z:=g^*D$ is a $\Q$-divisor such that $\Supp \{D_Z\}$ is simple normal crossing and $\ell D_Z$ is a $\Z$-divisor, it follows from Step \ref{s1-div-CM} that $W_n\MO_Z(D_Z)$ is a Cohen--Macaulay $W_n\MO_Z$-module. By Lemma \ref{l-div-etale}, we have an isomorphism: $$(W_ng)^*(W_n\MO_X(D)) \simeq W_n\MO_Z(D_Z).$$ Since $W_ng:W_nZ \to W_nX$ is a finite \'etale morphism (cf. \cite[Ch. 0, Proposition 1.5.8]{Ill79}), it follows from \cite[Theorem 23.3]{Mat89} that $W_n\MO_X(D)$ is a Cohen--Macaulay $W_n\MO_X$-module. This completes the proof of Step \ref{s2-div-CM}. \end{proof} Step \ref{s2-div-CM} completes the proof of Theorem \ref{t-div-CM}. \end{proof} \begin{prop}\label{p-div-CM} Let $k$ be a perfect field of characteristic $p>0$ and let $X$ be an $N$-dimensional smooth variety over $k$. Let $D$ be an $\R$-divisor on $X$ such that $\Supp\,\{D\}$ is simple normal crossing. Then, for any non-negative integer $e$ and positive integers $n$ and $m$ satisfying $n \geq m$, the isomorphism $$R\mathcal Hom_{W_n\MO_X}((F_{W_nX}^e)_*j_*W_m\MO_X(D), W_n\Omega_X^N)$$ $$\simeq (F_{W_nX}^e)_*j_*\mathcal Hom_{W_m\MO_X}(W_m\MO_X(D), W_m\Omega_X^N),$$ holds in the derived category of $W_n\MO_X$-modules, where $j:W_mX \to W_nX$ is the induced closed immersion. \end{prop} \begin{proof} The assertion follows from isomorphisms: \begin{eqnarray*} &&R\mathcal Hom_{W_n\MO_X}((F_{W_nX}^e)_*j_*W_m\MO_X(D), W_n\Omega_X^N)\\ & \simeq & (F_{W_nX}^e)_*j_* R\mathcal Hom_{W_m\MO_X}(W_m\MO_X(D), (F_{W_nX}^e \circ j)^!W_n\Omega_X^N)\\ & \simeq & (F_{W_nX}^e)_*j_* R\mathcal Hom_{W_m\MO_X}(W_m\MO_X(D), W_m\Omega_X^N)\\ & \simeq & (F_{W_nX}^e)_*j_* \mathcal Hom_{W_m\MO_X}(W_m\MO_X(D), W_m\Omega_X^N), \end{eqnarray*} where the first isomorphism holds by Grothendieck duality, the second isomorphism follows from \cite[Theorem 4.1]{Eke84} and we obtain the third isomorphism by Theorem \ref{t-div-CM} and \cite[Theorem 3.5.8]{BH93}. \end{proof} \section{Vanishing theorems} The purpose of this section is to prove the main theorems of this paper (Theorem \ref{t-KVV}, Theorem \ref{t-DRW-KV}, Theorem \ref{t-KVV-minus}). We start with auxiliary results: Lemma \ref{l-Fujita} and Lemma \ref{l-KV-BZ}. \begin{lem}\label{l-Fujita} Let $f:X \to Y$ be a projective $k$-morphism of noetherian schemes from a regular scheme $X$. Let $A$ be an $f$-ample $\R$-divisor and let $M$ be a coherent sheaf on $X$. Then there exists a positive integer $s_0$ such that $$R^if_*(M \otimes_{\MO_X} \MO_X(t \ulcorner sA \urcorner))=0$$ for any $i \in \Z_{>0}$, $s \in \R_{\geq s_0}$ and $t \in \Z_{>0}$. \end{lem} \begin{proof} We may assume that $Y$ is affine, say $Y=\Spec\,R$. We can write $$A=A_1+A_2$$ for some $f$-ample $\Q$-divisor $A_1$ and $f$-ample $\R$-divisor $A_2$. Thanks to \cite[Theorem 1.5]{Kee03}, there exists a positive integer $s_1$ such that $s_1A_1$ is a $\Z$-divisor and the equation \begin{equation}\label{e-Fujita} R^if_*(M \otimes_{\MO_X} \MO_X(s_1A_1+N))=0 \end{equation} holds for any $i>0$ and $f$-ample $\Z$-divisor $N$ on $X$. There exists a positive integer $s_2$ such that $\ulcorner sA \urcorner$ and $\ulcorner (s-s_1) A_1+sA_2\urcorner$ are $f$-ample for any $s \in \R_{\geq s_2}$. Set $s_0:=\max\{s_1, s_2\}$. It holds by (\ref{e-Fujita}) that $$R^if_*(M \otimes_{\MO_X} \MO_X(t \ulcorner sA \urcorner))=0$$ for any $i \in \Z_{>0}$, $s \in \R_{\geq s_0}$ and $t \in \Z_{>0}$, since the following $\Z$-divisor $N$ is $f$-ample: \begin{eqnarray*} N &:=&t \ulcorner sA \urcorner-s_1A_1\\ &=&\ulcorner sA \urcorner-s_1A_1+(t-1)\ulcorner sA \urcorner\\ &=&\ulcorner (s-s_1)A_1+sA_2\urcorner+(t-1)\ulcorner sA \urcorner.\\ \end{eqnarray*} \end{proof} \begin{lem}\label{l-KV-BZ} Let $k$ be a perfect field of characteristic $p>0$. Let $f:X \to Y$ be a projective $k$-morphism from a smooth $k$-scheme $X$ to a scheme $Y$ of finite type over $k$. Let $A$ be an $f$-ample $\R$-divisor. Then there exists a positive integer $s_0$ such that \begin{equation}\label{e1-KV-BZ} R^if_*\mathcal Hom_{\MO_X}(\MO_X(-sA), (F^e_X)_*B_n\Omega_X^r)=0, \end{equation} \begin{equation}\label{e2-KV-BZ} R^if_*\mathcal Hom_{\MO_X}(\MO_X(-sA), (F^e_X)_*Z_n\Omega_X^r)=0 \end{equation} for any $i\in \Z_{>0}$, $n \in \Z_{\geq 0}$, $r \in \Z_{\geq 0}$, $e \in \Z_{\geq 0}$ and $s \in \R_{\geq s_0}$. \end{lem} \begin{proof} For any $i\in \Z_{>0}$ and coherent $\MO_X$-module $M$, it holds that \begin{eqnarray*} &&R^if_* \mathcal Hom_{\MO_X}(\MO_X(-sA), (F^e_X)_*M)\\ &\simeq & R^if_*\mathcal Hom_{\MO_X}(\MO_X(\llcorner -s \lrcorner), (F^e_X)_*M)\\ &\simeq & R^if_*((F^e_X)_*M \otimes_{\MO_X} \MO_X(\ulcorner s \urcorner)) \\ &\simeq & R^if_*(F^e_X)_*(M \otimes_{\MO_X} \MO_X(p^e\ulcorner s \urcorner)) \\ &\simeq & (F^e_Y)_*R^if_*(M \otimes_{\MO_X} \MO_X(p^e\ulcorner s \urcorner)). \end{eqnarray*} Thus, Lemma \ref{l-Fujita} enables us to find a positive integer $s_0$ such that the equations (\ref{e1-KV-BZ}) and (\ref{e2-KV-BZ}) hold for any $i\in \Z_{>0}$, $n \in \{0, 1\}$, $r \in \Z_{\geq 0}$, $e \in \Z_{\geq 0}$ and $s \in \R_{\geq s_0}$. Since the functors $(F^e_X)_*$ and $\mathcal Hom_{\MO_X}(\MO_X(-sA), -)$ are exact, the assertion follows from Proposition \ref{p-BZ} and induction on $n$. \end{proof} \begin{thm}\label{t-KVV} Let $k$ be a perfect field of characteristic $p>0$. Let $f:X \to Y$ be a projective $k$-morphism from an $N$-dimensional smooth $k$-variety $X$ to a scheme $Y$ of finite type over $k$. Let $A$ be an $f$-ample $\R$-divisor on $X$ such that $\Supp\,\{A\}$ is simple normal crossing. Then the following hold. \begin{enumerate} \item There exists a positive integer $s_1$ such that $$R^if_*(\mathcal Hom_{W\MO_X}(W\MO_X(-sA), W_n\Omega_X^N))=0$$ for any $i \in \Z_{>0}$, $n \in \Z_{>0}$ and $s \in \R_{\geq s_1}$. \item There exists a positive integer $s_2$ such that $$R^q\varprojlim_n f_*(\mathcal Hom_{W\MO_X}(W\MO_X(-sA), W_n\Omega_X^N)) =0$$ for any $q \in \Z_{>0}$ and $s \in \R_{\geq s_2}$. \item There exists a positive integer $s_3$ such that $$R^if_*(\mathcal Hom_{W\MO_X}(W\MO_X(-sA), W\Omega_X^N))=0$$ for any $i \in \Z_{>0}$ and $s \in \R_{\geq s_3}$. \item It holds that $$R^if_*(\mathcal Hom_{W\MO_X}(W\MO_X(-A), W\Omega_X^N))_{\Q}=0$$ for any $i \in \Z_{>0}$. \end{enumerate} \end{thm} \begin{proof} Let us show (1). For any $s \in \R$, we have an exact sequence (Proposition \ref{p-div-induction}): $$ 0 \to (F_X)_*(W_n\MO_X(-psA)) \xrightarrow{V} W_{n+1}\MO_X(-sA) \to \MO_X(-sA) \to 0.$$ It follows from Proposition \ref{p-div-CM} that we have an exact sequence \begin{eqnarray*} 0 &\to& \mathcal Hom_{\MO_X}(\MO_X(-sA), \Omega_X^N) \\ &\to& \mathcal Hom_{W_{n+1}\MO_X}(W_{n+1}\MO_X(-sA), W_{n+1}\Omega_X^N) \\ &\to& (F_X)_*\mathcal Hom_{W_n\MO_X}(W_n\MO_X(-psA), W_n\Omega_X^N) \to 0. \end{eqnarray*} Thus we obtain a long exact sequence \begin{eqnarray*} \cdots &\to& R^if_*(\mathcal Hom_{\MO_X}(\MO_X(-sA), \Omega_X^N)) \\ &\to& R^if_*(\mathcal Hom_{W_{n+1}\MO_X}(W_{n+1}\MO_X(-sA), W_{n+1}\Omega_X^N)) \\ &\to& R^if_*(\mathcal Hom_{W_n\MO_X}(W_n\MO_X(-psA), W_n\Omega_X^N)) \to \cdots. \end{eqnarray*} By Lemma \ref{l-KV-BZ} and induction on $n$, we can find $s_1$ such that $$R^if_*(\mathcal Hom_{W_n\MO_X}(W_n\MO_X(-sA), W_n\Omega_X^N))=0$$ for any $n \in \Z_{\geq 1}$ and any $s \in \R_{\geq s_1}$. By Lemma \ref{l-DRW-inje} and Lemma \ref{l-hom-torsion}, we have that {\Small \begin{equation}\label{e1-(1)-KVV} \mathcal Hom_{W_n\MO_X}(W_n\MO_X(-sA), W_n\Omega_X^N) \simeq \mathcal Hom_{W\MO_X}(W\MO_X(-sA), W_n\Omega_X^N). \end{equation} } for any $n \in \Z_{\geq 1}$. Hence, (1) holds. Let us show (2). Set $$E_n:=f_*\mathcal Hom_{W\MO_X}(W\MO_X(-sA), W_n\Omega_X^N).$$ Assume that $Y$ is affine. Thanks to \cite[Lemma 1.5.1]{CR12}, it suffices to prove that \begin{enumerate} \item[(a)] $H^i(Y, E_n)=0$ for any $i \in \Z_{>0}$ and $n \in \Z_{>0}$. \item[(b)] The induced homomorphism $E_{n+1} \to E_n$ is surjective. \end{enumerate} By (\ref{e1-(1)-KVV}) and Proposition \ref{p-div-coherent}, $E_n$ can be considered as a coherent $W_n\MO_X$-module. Thus, (a) holds. Let us prove (b). By Lemma \ref{l-KV-BZ}, there exists a positive integer $s_2$ such that $$R^if_*(\mathcal Hom_{\MO_X}(\MO_X(-sA), (F^n_X)_*\Omega_X^N))=0$$ $$R^if_*(\mathcal Hom_{\MO_X}(\MO_X(-sA), B_n\Omega_X^N))=0$$ $$R^if_*(\mathcal Hom_{\MO_X}(\MO_X(-sA), Z_n\Omega_X^N))=0$$ for any $i \in \Z_{>0}$, $n \in \Z_{\geq 0}$ and $s \in \R_{\geq s_2}$. Thus, we get $$R^if_*(\mathcal Hom_{\MO_X}(\MO_X(-sA), (F_X^n)_*\Omega_X^r/B_n\Omega_X^N)=0,$$ $$R^if_*(\mathcal Hom_{\MO_X}(\MO_X(-sA), (F_X^n)_*\Omega_X^r/Z_n\Omega_X^N)=0.$$ Thanks to Proposition \ref{p-DRW-proj-system} and Lemma \ref{l-hom-torsion}, it holds that \begin{eqnarray*} &&R^if_*(\mathcal Hom_{W\MO_X}(W\MO_X(-sA), {\rm gr}^n W\Omega_X^N))\\ &\simeq & R^if_*(\mathcal Hom_{\MO_X}(\MO_X(-sA), {\rm gr}^n W\Omega_X^N))\\ &=& 0. \end{eqnarray*} for any $i \in \Z_{>0}$, $n \in \Z_{\geq 0}$ and $s \in \R_{\geq s_2}$. Again by Proposition \ref{p-DRW-proj-system}, we see that (b) holds. This completes the proof of (2). Let us show (3). We set $s_3:=\max\{s_1, s_2\}$. For any $s \in \R_{\geq s_3}$, we obtain isomorphisms in the derived category of $W\MO_X$-modules: \begin{eqnarray*} &&Rf_* \mathcal Hom_{W\MO_X}(W\MO_X(-sA), W\Omega_X^N))\\ &\simeq &Rf_* \mathcal Hom_{W\MO_X}(W\MO_X(-sA), \varprojlim_n W_n\Omega_X^N))\\ &\simeq &Rf_* \varprojlim_n \mathcal Hom_{W\MO_X}(W\MO_X(-sA), W_n\Omega_X^N))\\ &\simeq &Rf_* R\varprojlim_n \mathcal Hom_{W\MO_X}(W\MO_X(-sA), W_n\Omega_X^N))\\ &\simeq &R\varprojlim_n Rf_* \mathcal Hom_{W\MO_X}(W\MO_X(-sA), W_n\Omega_X^N))\\ &\simeq &R\varprojlim_n f_*\mathcal Hom_{W\MO_X}(W\MO_X(-sA), W_n\Omega_X^N))\\ &\simeq &\varprojlim_n f_*\mathcal Hom_{W\MO_X}(W\MO_X(-sA), W_n\Omega_X^N)), \end{eqnarray*} where the third and last isomorphisms hold by (2) and the fifth one follows from (1). Thus (3) holds. Let us show (4). In the following argument, we denote by $$ F_X:(X, W\MO_{X, \Q}) \xrightarrow{\simeq} (X, W\MO_{X, \Q}), $$ $$ F_Y:(Y, W\MO_{Y, \Q}) \xrightarrow{\simeq} (Y, W\MO_{Y, \Q}) $$ the isomorphisms of ringed spaces induced by Frobenius. In particular, we have that \begin{equation}\label{e1-(4)-KVV} (F_X)_* \circ (F_X)^*=(F_X)^* \circ (F_X)_*={\rm id}. \end{equation} Fix a positive integer $t$ such that $p^t \geq s_3$. Then we obtain isomorphisms of the derived category of $W\MO_{X, \Q}$-modules: \begin{eqnarray*} && Rf_*\mathcal Hom_{W\MO_{X, \Q}}(W\MO_X(-A)_{\Q}, W\Omega^N_{X, \Q})\\ &\simeq & Rf_*(F_X^t)_*(F_X^{t})^*\mathcal Hom_{W\MO_{X, \Q}}(W\MO_X(-A)_{\Q}, W\Omega^N_{X, \Q})\\ &\simeq & (F_Y^t)_*Rf_*\mathcal Hom_{W\MO_{X, \Q}}((F_X^{t})^*W\MO_X(-A)_{\Q}, (F_X^{t})^*W\Omega^N_{X, \Q})\\ &\simeq & (F_Y^t)_*Rf_*\mathcal Hom_{W\MO_{X, \Q}}(W\MO_X(-p^t A)_{\Q}, (F_X^{t})^*(F_X^t)_*W\Omega^N_{X, \Q})\\ &\simeq & (F_Y^t)_*Rf_*\mathcal Hom_{W\MO_{X, \Q}}(W\MO_X(-p^t A)_{\Q}, W\Omega^N_{X, \Q})\\ &\simeq &(F_Y^t)_*f_*\mathcal Hom_{W\MO_{X, \Q}}(W\MO_X(-p^t A)_{\Q}, W\Omega^N_{X, \Q}), \end{eqnarray*} where the first and fourth isomorphisms hold by (\ref{e1-(4)-KVV}), the second one by the fact that $(F_X^t)_*$ and $(F_Y^t)_*$ are exact functors the third one by Theorem \ref{t-descent}, and the last one by (3). Thus (4) holds. \end{proof} \begin{thm}\label{t-DRW-KV} Let $k$ be a perfect field of characteristic $p>0$. Let $f:X \to Y$ be a projective $k$-morphism from an $N$-dimensional smooth $k$-variety $X$ to a scheme $Y$ of finite type over $k$. Let $A$ be an $f$-ample invertible sheaf on $X$. Then the equation $$R^if_*(W\Omega_X^N \otimes_{W\MO_X} \underline{A})=0$$ holds for any $i \in \Z_{>0}$. \end{thm} \begin{proof} Thanks to Theorem \ref{t-KVV}(3), there exists a positive integer $t$ such that \begin{equation}\label{e-DRW-KV} R^if_*(W\Omega_X^N \otimes_{W\MO_X} (F_X^t)^*\underline{A}) \simeq R^if_*(W\Omega_X^N \otimes_{W\MO_X} \underline{A}^{\otimes p^t})=0 \end{equation} for any $i>0$. Then the assertion holds by the following calculation: \begin{eqnarray*} R^if_*(W\Omega_X^N \otimes_{W\MO_X} \underline{A}) &\simeq & R^if_*((F_X^t)_*(W\Omega_X^N) \otimes_{W\MO_X} \underline{A})\\ &\simeq & R^if_*((F_X^t)_*(W\Omega_X^N \otimes_{W\MO_X} (F_X^t)^*\underline{A}))\\ &\simeq & (F_Y^t)_*R^if_*(W\Omega_X^N \otimes_{W\MO_X} (F_X^t)^*\underline{A})\\ &=& 0, \end{eqnarray*} where the first isomorphism follows from Theorem \ref{t-descent}, the second one holds by the projection formula (\cite[Ch. 0, (5.4.10)]{Gro64}), the third one follows from the fact that $(F_X^t)_*$ and $(F_Y^t)_*$ are exact functors, and the last equation holds by (\ref{e-DRW-KV}). \end{proof} \begin{thm}\label{t-KVV-minus} Let $k$ be a perfect field of characteristic $p>0$ and let $X$ be an $N$-dimensional smooth projective variety over $k$. Let $A$ be an ample $\R$-divisor on $X$. Then the following hold. \begin{enumerate} \item There exists a positive integer $s_0$ such that $$H^j(X, W_n\MO_X(-sA))=0$$ for any $n \in \Z_{>0}$, $j \in \Z_{<N}$ and $s \in \R_{\geq s_0}$. \item There exists a positive integer $s_0$ such that $$H^j(X, W\MO_X(-sA))=0$$ for any $j \in \Z_{<N}$ and $s \in \R_{\geq s_0}$. \item It holds that $H^j(X, W\MO_X(-A))_{\Q}=0$ for any $j \in \Z_{<N}$. \end{enumerate} \end{thm} \begin{proof} For any $\R$-divisor $D$ on $X$, Proposition \ref{p-div-induction} induces an exact sequence of $W\MO_X$-homomorphisms: $$0 \to (F_X)_*(W_n\MO_X(-psD)) \xrightarrow{V} W_{n+1}\MO_X(-sD) \to \MO_X(-sD) \to 0.$$ Thus, by \cite[Ch. III, Theorem 7.6]{Har77}, there exists a positive integer $s_0$ such that $$H^j(X, W_n\MO_X(-sA))=0$$ for any $n \in \Z_{>0}$, $j \in \Z_{<N}$ and $s \in \R_{\geq s_0}$. Thus (1) holds. Therefore, we have that $$H^j(X, W\MO_X(-sA)) \simeq \varprojlim_n H^j(X, W_n\MO_X(-sA))=0$$ for any $j<N$ and $s \in \R_{\geq s_0}$, where the isomorphism follows from the fact that the induced projective system $\{ H^j(X, W_n\MO_X(-sA))\}_{n \in \Z_{>0}}$ satisfies the Mittag--Leffler condition (cf. \cite[Lemma 1.5.1]{CR12}). Hence (2) holds. Fix $t \in \Z_{>0}$ such that $p^t \geq s_0$. Then we get \begin{eqnarray*} H^j(X, W\MO_X(-A)_{\Q}) &\simeq & H^j(X, (F_X^t)_*(W\MO_X(-p^tA)_{\Q}))\\ &\simeq & H^j(X, W\MO_X(-p^tA)_{\Q})\\ &=&0 \end{eqnarray*} for $j<N$, where the first isomorphism follows from the $W\MO_{X, \Q}$-module isomorphism $$F^t:W\MO_X(-A)_{\Q} \xrightarrow{\simeq} (F_X^t)_*(W\MO_X(-p^tA)_{\Q})$$ and the second one holds by the fact that the functor $(F^t_X)_*$ is exact. Hence, (3) holds. \end{proof} \section{Examples} \subsection{Ample divisors} In this subsection, we compute some cohomologies for Teichm\"uller lifts of ample invertible sheaves. First we give a Witt analogue of the Serre vanishing theorem (Theorem \ref{t-Witt-Serre}). Second we compute dimension of cohomologies for Teichm\"uller lifts of ample invertible sheaves (Theorem \ref{t-ample-dim}). \begin{thm}\label{t-Witt-Serre} Let $f:X \to Y$ be a projective morphism of $F$-finite noetherian $\F_p$-schemes. Let $A$ be an $f$-ample invertible sheaf on $X$ and let $I$ be a coherent ideal sheaf on $X$. Then the equation $$R^if_*(WI \otimes_{W\MO_X} \underline{A})_{\Q}=0$$ holds for any positive integer $i>0$. \end{thm} \begin{proof} We can find a positive integer $s_1$ such that \begin{equation}\label{e-Witt-Serre1} R^if_*(I \otimes_{\MO_X} A^{\otimes s})=0 \end{equation} for any $i \in \Z_{>0}$ and any $s \in \Z_{\geq s_1}$. We have an exact sequence of $W\MO_X$-modules: \begin{equation}\label{e-Witt-Serre2} 0 \to (F_X)_*(W_nI) \xrightarrow{V} W_{n+1}I \to I \to 0. \end{equation} Thanks to (\ref{e-Witt-Serre1}) and (\ref{e-Witt-Serre2}), we get \begin{equation}\label{e-Witt-Serre3} R^if_*(W_nI \otimes_{W\MO_X} {\underline{A}}^{\otimes s})=0 \end{equation} for any $i \in \Z_{>0}$, $s \in \Z_{\geq s_1}$ and $n\in \Z_{>0}$. Fix $t \in \Z_{>0}$ such that $p^t \geq s_1$. For $$M:=WI \otimes_{W\MO_X} {\underline{A}}^{\otimes p^t} \quad {\rm and} \quad M_n:=W_nI \otimes_{W\MO_X} {\underline{A}}^{\otimes p^t},$$ it holds that $$R\varprojlim_n M_n \simeq \left(R\varprojlim_n W_nI\right) \otimes_{W\MO_X} {\underline{A}}^{\otimes p^t} \simeq \left(\varprojlim_n W_nI\right) \otimes_{W\MO_X} {\underline{A}}^{\otimes p^t} \simeq M,$$ where the first isomorphism follows from the exactness of the functor $(-) \otimes_{W\MO_X} {\underline{A}}^{\otimes p^t}$ and the second isomorphism holds by \cite[Lemma 1.5.1]{CR12}. Then we obtain isomorphisms {\small $$Rf_*M \simeq \left(Rf_* \circ R\varprojlim_n\right) M_n \simeq \left(R\varprojlim_n \circ Rf_*\right) M_n \simeq R\varprojlim_n (f_*M_n) \simeq \varprojlim_n (f_*M_n),$$ } where the third isomorphism follows from (\ref{e-Witt-Serre3}) and the fourth isomorphism holds by \cite[Lemma 1.5.1]{CR12} and the fact that an exact sequence $$0 \to (F_X^n)_*I \to W_{n+1}I \xrightarrow{R} W_nI \to 0$$ implies that the projective system $\{f_*M_n\}_{n \in \Z_{>0}}$ consists of surjective homomorphisms $f_*(R \otimes_{W\MO_X} \underline{A}^{\otimes p^t})$. Therefore, we have that \begin{equation}\label{e-Witt-Serre4} R^if_*(WI \otimes_{W\MO_X} {\underline{A}}^{\otimes p^t}) = R^if_*M=0 \end{equation} for any $i>0$. Then it holds that \begin{eqnarray*} R^if_*(WI \otimes_{W\MO_X} \underline{A})_{\Q} &\simeq& R^if_*((F^t_X)_*(WI) \otimes_{W\MO_X} \underline{A})_{\Q}\\ &\simeq& R^if_*((F^t_X)_*(WI \otimes_{W\MO_X} \underline{A}^{p^t}))_{\Q}\\ &\simeq &(F^t_Y)_*R^if_*(WI \otimes_{W\MO_X} \underline{A}^{p^t})_{\Q}\\ &=&0, \end{eqnarray*} where the second isomorphism follows from the projection formula, the third one holds by the fact that the functors $(F^t_X)_*$ and $(F^t_Y)_*$ are exact, and the last equation follows from (\ref{e-Witt-Serre4}). \end{proof} \begin{thm}\label{t-ample-dim} Let $k$ be a perfect field of characteristic $p>0$ and set $Q:=W(k)_{\Q}$. Let $X$ be a projective scheme over $k$ such that $\dim X>0$. Let $A$ be an ample invertible sheaf on $X$. Then the following hold. \begin{enumerate} \item $H^i(X, \underline{A})_{\Q}=0$ for $i>0$. \item $\dim_Q H^0(X, \underline{A})_{\Q}=\infty$. \end{enumerate} \end{thm} \begin{proof} Since (1) follows directly from Theorem \ref{t-Witt-Serre}, let us prove (2). Fix an arbitrary positive integer $m$. Thanks to $\dim X>0$, we can find distinct closed points $P_1, \cdots, P_m$ of $X$. Let $Y$ be the reduced closed subscheme of $X$ that is set-theoretically equal to $\{P_1, \cdots, P_m\}$. Thanks to the exact sequence $$0 \to WI_Y \otimes_{W\MO_X} \underline{A} \to \underline{A} \to \underline{A}|_Y \to 0,$$ Theorem \ref{t-Witt-Serre} implies that the induced map $$H^0(X, \underline{A})_{\Q} \to H^0(Y, \underline{A}|_Y)_{\Q}$$ is surjective. Hence, it holds that $$\dim_Q H^0(X, \underline{A})_{\Q} \geq \dim_Q H^0(Y, \underline{A}|_Y)_{\Q}= \dim_Q H^0(Y, W\MO_Y)_{\Q} \geq m.$$ Since $m$ was chosen to be an arbitrary positive integer, the assertion (2) holds. \end{proof} \subsection{Anti-ample divisors} \subsubsection{The highest cohomology} The purpose of this subsection is to prove Theorem \ref{t-highest-infinite}, which can be considered as a dual of Theorem \ref{t-ample-dim}(2). \begin{thm}\label{t-highest-infinite} Let $k$ be a perfect field of characteristic $p>0$ and set $Q:=W(k)_{\Q}$. Let $X$ be an $N$-dimensional smooth projective scheme over $k$ such that $N>0$. Let $A$ be an ample invertible sheaf on $X$. Then $\dim_Q H^N(X, \underline{A}^{-1})_{\Q}=\infty$. \end{thm} \begin{proof} Replacing $X$ by an $N$-dimensional irreducible component, we may assume that $X$ is connected. \setcounter{step}{0} \begin{step}\label{s1-highest-infinite} There exists a positive integer $s_1$ such that the map $$F:H^N(X, A^{-s}) \to H^N(X, (F_X)_*(A^{-sp}))$$ induced by Frobenius $\MO_X \to (F_X)_*\MO_X$ is injective for any $s \in \Z_{\geq s_1}$. \end{step} \begin{proof}[Proof of Step \ref{s1-highest-infinite}] We have an exact sequence $$0 \to \MO_X \to (F_X)_*\MO_X \to B \to 0$$ for a coherent locally free sheaf $B$ (Proposition \ref{p-BZ}). By \cite[Ch. III, Theorem 7.6(b)]{Har77}, we have that $$H^{N-1}(X, B \otimes_{\MO_X} A^{-s})=0$$ for $s \gg 0$. This completes the proof of Step \ref{s1-highest-infinite}. \end{proof} \begin{step}\label{s2-highest-infinite} There exists a positive integer $s_2 \in \Z_{>0}$ such that the map $$F:H^N(X, \underline{A}_{\leq n}^{-s}) \to H^N(X, (F_X)_*(\underline{A}_{\leq n}^{-sp}))$$ induced by Frobenius $W_n\MO_X \to (F_X)_*(W_n\MO_X)$ is injective for any $s \in \Z_{\geq s_2}$ and $n \in \Z_{>0}$. \end{step} \begin{proof}[Proof of Step \ref{s2-highest-infinite}] For any invertible sheaf $L$ on $X$, we have a commutative diagram of $W\MO_X$-homomorphisms: $$\begin{CD} 0 @>>> (F_X)_*(\underline{L}^p_{\leq n}) @>V >> \underline{L}_{\leq n+1} @>>> L @>>> 0\\ @. @VV(F_X)_*F V @VVFV @VVFV\\ 0 @>>> (F^2_X)_*(\underline{L}_{\leq n}^{p^2}) @>V >> (F_X)_*(\underline{L}_{\leq n+1}^p) @>>> (F_X)_*(L^{p}) @>>> 0\\ \end{CD}$$ where both the horizontal sequences are exact (Proposition \ref{p-div-induction}). For any $s \gg 0$, it holds that $H^{N-1}(X, A^{-s})=0$, hence we get a commutative diagram: {\tiny $$\begin{CD} 0 @>>> H^N((F_X)_*(\underline{A}^{-sp}_{\leq n})) @>>> H^N(\underline{A}^{-s}_{\leq n+1}) @>>> H^N(A^{-s}) @>>> 0\\ @. @VV(F_X)_*F V @VVF V @VVF V\\ 0 @>>> H^N((F^2_X)_*(\underline{A}^{-sp^2}_{\leq n})) @>>> H^N((F_X)_*(\underline{A}^{-sp}_{\leq n+1})) @>>> H^N((F_X)_*(A^{-sp})) @>>> 0,\\ \end{CD}$$ } where both the horizontal sequences are exact. By the snake lemma and induction on $n$, Step \ref{s1-highest-infinite} implies Step \ref{s2-highest-infinite}. \end{proof} \begin{step}\label{s3-highest-infinite} There exists a positive integer $e_3 \in \Z_{>0}$ such that the map $$F:H^N(X, \underline{A}^{-s}) \to H^N(X, (F_X)_*(\underline{A}^{-sp}))$$ induced by Frobenius $W\MO_X \to (F_X)_*(W\MO_X)$ is injective for any $s \in \Z_{\geq s_3}$. \end{step} \begin{proof}[Proof of Step \ref{s3-highest-infinite}] Set $s_3:=s_2$. Since the projective system $$\{H^i(X, (F_X^e)_*\underline{L}_{\leq n})\}_{n \in \Z_{>0}}$$ satisfies the Mittag--Leffler condition for any $i \in \Z_{\geq 0}$, $e \in \Z_{\geq 0}$ and invertible sheaf $L$, \cite[Lemma 1.5.1]{CR12} implies that $$H^i(X, (F_X^e)_*\underline{L}) \simeq \varprojlim_n H^i(X, (F_X^e)_*\underline{L}_{\leq n}).$$ Thus Step \ref{s3-highest-infinite} follows from Step \ref{s2-highest-infinite}. \end{proof} \begin{step}\label{s4-highest-infinite} There exists a positive integer $s_4 \in \Z_{>0}$ such that the map $$V:H^N(X, (F_X)_*(\underline{A}^{-sp})) \to H^N(X, \underline{A}^{-s})$$ induced by Verschiebung $V:(F_X)_*(W\MO_X) \to W\MO_X$ is injective for any $s \in \Z_{\geq s_4}$. \end{step} \begin{proof}[Proof of Step \ref{s4-highest-infinite}] The assertion follows from the exact sequence (Proposition \ref{p-div-induction}): $$0 \to (F_X)_*(\underline{A}^{-sp}) \xrightarrow{V} \underline{A}^{-s} \to A^{-s} \to 0$$ and $H^{N-1}(X, A^{-s})=0$ for any $s \gg 0$. \end{proof} \begin{step}\label{s5-highest-infinite} There exists a positive integer $s_5 \in \Z_{>0}$ such that $H^N(X, \underline{A}^{-s})$ is a $p$-torsion free $W(k)$-module for any $s \in \Z_{\geq s_5}$. \end{step} \begin{proof}[Proof of Step \ref{s5-highest-infinite}] Set $s_5:=\max\{s_3, s_4\}$. Since $p=FV=VF$, the assertion follows from Step \ref{s3-highest-infinite} and Step \ref{s4-highest-infinite}. \end{proof} \begin{step}\label{s6-highest-infinite} Let $\nu_0$ be a positive integer. Then there exists a positive integer $s_0 \in \Z_{>0}$ such that for any $s \in \Z_{\geq s_0}$, $H^N(X, \underline{A}^{-s})$ is a $p$-torsion free $W(k)$-module whose rank is larger than $\nu_0$. \end{step} \begin{proof}[Proof of Step \ref{s6-highest-infinite}] By Serre duality, we can find a positive integer $s'_0$ such that $$\dim_k H^N(X, A^{-s}) \geq \nu_0+1$$ for any $s \in \Z_{\geq s'_0}$. Set $s_0:=\max\{s'_0, s_5\}$. Fix $s \in \Z_{\geq s_0}$. By Step \ref{s5-highest-infinite}, we have that $H^N(X, \underline{A}^{-s})$ is a $p$-torsion free $W(k)$-module. Since the map $$R':H^N(X, \underline{A}^{-s}) \to H^N(X, A^{-s})$$ induced by $R:W\MO_X \to \MO_X$ is surjective, there exist elements $\zeta_0, \cdots, \zeta_{\nu_0} \in H^N(X, \underline{A}^{-s})$ such that $$R'(\zeta_0), \cdots, R'(\zeta_{\nu_0})$$ are linearly independent over $k$. It suffices to prove that $\zeta_0, \cdots, \zeta_{\nu_0}$ is linearly independent over $W(k)$. Assume that $\sum_{i=0}^{\nu_0}a_i\zeta_i=0$ for some $a_0, \cdots, a_{\nu_0} \in W(k)$. Then we have that $\sum_{i=0}^{\nu_0}\overline{a}_i R'(\zeta_i)=0$, where $\overline{a}_i :=a_i \mod pW(k)$. Since $R'(\zeta_0), \cdots, R'(\zeta_{\nu_0})$ are linearly independent over $k$, it holds that $\overline{a}_0=\cdots=\overline{a}_{\nu_0}=0$. Thus, we can write $a_i=pb_i$ for some $b_i \in W(k)$. Since $H^N(X, \underline{A}^{-s})$ is $p$-torsion free, we have that $\sum_{i=0}^{\nu_0}b_i\zeta_i=0$. Applying this argument again, we can find $c_0, \cdots, c_{\nu_0} \in W(k)$ such that $b_i=pc_i$ for any $i \in \{0, \cdots, \nu_0\}$. Hence, we see that $a_i \in p^2W(k)$ for any $i \in \{0, \cdots, \nu_0\}$. Repeating this procedure, we have that $$\{a_0. \cdots, a_{\nu_0}\} \subset \bigcap_{e=1}^{\infty} p^eW(k)=0.$$ Therefore, $\zeta_0, \cdots, \zeta_{\nu_0}$ is linearly independent over $W(k)$. This completes the proof of Step \ref{s6-highest-infinite}. \end{proof} The assertion of Theorem \ref{t-highest-infinite} follows from Step \ref{s6-highest-infinite} and the isomorphisms of $Q$-vector spaces: $$H^N(X, \underline{A}^{-1})_{\Q} \xrightarrow{F^t, \,\, \simeq} H^N(X, (F_X^t)_*\underline{A}^{-p^t})_{\Q} \simeq H^N(X, \underline{A}^{-p^t})_{\Q}.$$ \end{proof} \subsubsection{Cohomologies with torsion elements} The following proposition shows that we actually need to take the tensor product with $\Q$ in the statement (2) of Theorem \ref{intro-main1}. \begin{prop}\label{p-cex-torsion} Let $k$ be an algebraically closed field of characteristic $p>0$ and let $n$ be an integer satisfying $n \geq 2$. Then there exist an $n$-dimensional smooth projective variety $X$ over $k$ and an ample invertible sheaf $A$ on $X$ such that $H^1(X, \underline{A}^{-1})\neq 0$ or $H^2(X, \underline{A}^{-1})\neq 0$. \end{prop} \begin{proof} By \cite[Theorem 2]{Muk13}, there exist an $n$-dimensional smooth projective variety $X$ and an ample invertible sheaf $L$ on $X$ such that $H^1(X, L^{-1}) \neq 0$. Thanks to an exact sequence (Proposition \ref{p-div-induction}): $$0 \to (F_X)_*(\underline{L}^{-p}) \xrightarrow{V} \underline{L}^{-1} \to L^{-1} \to 0,$$ we obtain $$H^1(X, \underline{L}^{-1}) \neq 0 \quad {\rm or} \quad H^2(X, \underline{L}^{-p}) \neq 0.$$ Setting $A:=L$ or $A:=L^p$, we are done. \end{proof}
\section*{Introduction} \enlargethispage{1mm} An important idea coming from conformal field theory is that modular categories lead to projective representations of mapping class groups of surfaces (see \cite{BK}, \cite{G}, \cite{T} and the references cited therein). At least for certain aspects of this construction, it is not necessary that the category under consideration is semisimple. For a particularly simple surface, the torus, the mapping class group is the homogeneous modular group of two-times-two matrices with integer entries and determinant one. By applying these ideas in the case of the representation category of a factorizable ribbon Hopf algebra, which is not required to be semisimple, we obtain a projective representation of the homogeneous modular group on the center of this Hopf algebra (see for example \cite{CW1}, \cite{CW2}, \cite{Ke}, \cite{KL}, \cite{LM} and~\cite{T}). As the center is the zeroth Hochschild cohomology group of the Hopf algebra, it is natural to ask whether there is a corresponding action on the higher cohomology groups. In this article, we answer this question affirmatively by showing that the modular group acts, projectively and up to homotopy, even on the entire Hochschild cochain complex. The article is organized as follows: In the first section, we briefly review the Hochschild cohomology of an algebra~$A$ with coefficients in an $A$-bimodule~$M$, as found for example in~\cite{W}. We then construct in Proposition~\ref{LeftRight} a particular homotopy between two cochain maps that will be important later for the verification of the defining relations of the modular group. In the second section, we turn to the case where the algebra~$A$ is a Hopf algebra and introduce a way to modify the bimodule structure of~$M$ while leaving the Hochschild cohomology groups essentially unchanged. In the third section, we turn to the case where~$A$ is a factorizable ribbon Hopf algebra and recall the action of the modular group on its center. In particular, we introduce the Radford and the Drinfel'd map. Our treatment here follows largely the exposition in~\cite{SZ}, to which the reader is referred for references to the original work. In the fourth section, we take advantage of our modification of the bimodule structure introduced in the second section to generalize the Radford and the Drinfel'd map to the Hochschild cochain complex. In the fifth and final section, we use these maps to generalize the action of the modular group on the center to an action on all Hochschild cohomology groups of our factorizable ribbon Hopf algebra. We will always work over a base field that is denoted by~$K$, and all unadorned tensor products are taken over~$K$. The dual of a vector space~$V$ is denoted by $V^*:=\Hom_K(V,K)$. The authors would like to thank Sarah Witherspoon for pointing out References~\cite{FS}, \cite{GK}, \cite{PW} and~\cite{SS} as well as for further helpful discussions. During the work on this article, the first and the third author were partially supported by SFB~676 and RTG~1670. \section{Hochschild Cohomology} \label{Sec:HochCohom} We begin by briefly recalling the approach to Hochschild cohomology via the standard resolution. Further details can be found for example in~\cite[Chap.~IX]{CE} or~\cite[Chap.~9]{W}. We consider an associative algebra~$A$ over our base field~$K$ and an $A$-bimodule~$M$. As in~\cite[Chap.~IX, \S~3, p.~167]{CE}, we assume that the left and the right action of~$A$ on~$M$ become equal when restricted to~$K$, so that an $A$-bimodule is the same as a module over~$A \otimes A^{\op}$. Here~$A^{\op}$ denotes the opposite algebra, in which the product is modified by interchanging the factors. \begin{Definition} For an integer~$n>0$, we call $C^n(A,M):=\Hom_K(A^{\otimes n},M)$ the space of cochains, and extend this definition to all integers by setting $C^0(A,M):=M$ and $C^n(A,M):=0$ for~$n<0$. For $n > 0$ and $i= 0,\dots,n$, we define the coface maps \mbox{$\partial^{n-1}_i\colon C^{n-1}(A,M) \to C^n(A,M)$} as \[\partial^{n-1}_i(f)(a_1 \otimes \dots \otimes a_n) := \begin{cases} a_1.f(a_2\otimes\dots\otimes a_n) &\text{if } i=0, \\ f(a_1\otimes\dots\otimes a_{i}a_{i+1}\otimes\dots\otimes a_n) &\text{if } 0<i<n, \\ f(a_1 \otimes \dots \otimes a_{n-1}).a_n &\text{if } i=n. \end{cases}\] Using these maps, we define the coboundary operator $d^{n-1} \colon C^{n-1}(A,M)\to C^n(A,M)$, which is also called the differential, as $d^{n-1} := \sum_{i=0}^n(-1)^i \partial^{n-1}_i$, and extend this definition to negative numbers by setting~$d^n=0$ for~$n<0$. We then get a cochain complex \begin{equation*} \cdots \xlongrightarrow{d^{-2}} 0 \xlongrightarrow{d^{-1}} M \xlongrightarrow{d^0} \Hom_K(A,M)\xlongrightarrow{d^1} \Hom_K(A\otimes A,M) \xlongrightarrow{d^2} \cdots \end{equation*} that we briefly denote by~$C(A,M)$. The $n$-th Hochschild cohomology group of the algebra~$A$ with coefficients in the bimodule~$M$ is defined as the $n$-th cohomology group of this cochain complex, i.e., \[HH^n(A,M):=H^n(C(A,M),d).\] \end{Definition} We note that for finite-dimensional separable algebras, and therefore in particular for finite-dimensional semisimple algebras over fields of characteristic zero, the higher Hoch\-schild cohomology groups~$HH^n(A,M)$ for~$n \ge 1$ vanish, as shown for example in~\cite[Chap.~IX, Thm.~7.10, p.~179]{CE}. The following special cases will be particularly important in the sequel: \begin{Example} \label{Zero} For the zeroth Hochschild cohomology group, we find \begin{align*} HH^0(A,M)&=\ker(d^0 \colon C^0(A,M)\to C^1(A,M))\\ &=\ker(\partial^0_0-\partial^0_1 \colon C^0(A,M)\to C^1(A,M), m\mapsto (a\mapsto a.m-m.a))\\ &=\{m\in M\mid a.m=m.a \text{ for all } a\in A\}, \end{align*} a set that is often called the space of invariants of~$M$, for example in~\cite[Chap.~IX, \S~4, p.~170]{CE} or~\cite[Sec.~1.1, p.~2]{Ka}. For $M=A$, where the bimodule structure is given by multiplication, we get in particular that \[HH^0(A,A)=Z(A),\] the center of the algebra~$A$. For any bimodule~$M$, the dual space $M^*=\Hom_K(M,K)$ is again a bimodule with respect to the action $(a.\varphi.b)(m)=\varphi(b.m.a)$. According to the preceding computation, we then have \begin{align*} HH^0(A,M^*) &= \{\varphi\in M^*\mid \varphi(m.a)=\varphi(a.m) \text{ for all } a\in A \text{ and all } m\in M\}. \end{align*} \end{Example} By composition on the left, any bimodule homomorphism~$g \colon M \rightarrow N$ induces a homomorphism \[g_*: C^n(A,M) \rightarrow C^n(A,N),~f \mapsto g \circ f\] between the cochain groups, where in general we use a lower star for the map induced by composition on the left and an upper star for the map induced by composition on the right. Because these homomorphisms~$g_*$ commute with the coboundary operators, they can be combined to a cochain map. An element $c \in Z(A)$ in the center of~$A$ gives rise to two natural choices for~$g$ on every bimodule~$M$, namely the left and right actions \[l_c^M \colon M \rightarrow M,~m \mapsto c.m \qquad \text{and} \qquad r_c^M \colon M \rightarrow M,~m \mapsto m.c.\] The induced maps on the Hochschild cochain complex are related as follows: \begin{Proposition} \label{LeftRight} The cochain maps $(l_c^M)_*$ and $(r_c^M)_*$ are homotopic. \end{Proposition} \begin{proof} For $n \geq 0$, we define $h^{n+1} \colon C^{n+1}(A,M) \to C^{n}(A,M)$ as \begin{align*} &h^{n+1}(f)(a_1 \otimes \dots \otimes a_n) := \sum_{j=0}^{n}(-1)^jf(a_1 \otimes \dots \otimes a_j \otimes c \otimes a_{j+1} \otimes \dots \otimes a_n) \\ &\qquad = f(c\otimes a_1 \otimes \dots \otimes a_n) + \sum_{j=1}^{n-1} (-1)^j f(a_1 \otimes \dots \otimes a_j \otimes c \otimes a_{j+1} \otimes \dots \otimes a_n) \\ &\mspace{213mu} + (-1)^n f(a_1 \otimes \dots \otimes a_n \otimes c). \end{align*} In particular, we have $h^1(f):=f(c)$. For $n \le 0$, we define $h^n:=0$, and claim that $h=(h^n)_{n \in \Z}$ is a homotopy between $(l_c^M)_*$ and $(r_c^M)_*$. To prove this, we have to show that \[(d^{n-1} \circ h^n + h^{n+1} \circ d^n)(f)(a_1\otimes\dots\otimes a_n)=c.f(a_1\otimes\dots\otimes a_n)-f(a_1\otimes\dots\otimes a_n).c\] for all $f \in C^n(A,M) = \Hom_K(A^{\otimes n},M)$ and $a_1, \dots, a_n \in A$. We first show this for the cases involving~$h^1$. For $n=0$, we have as in Example~\ref{Zero} above that \begin{align*} (h^1 \circ d^0)(m) = d^0(m)(c) = c.m-m.c \end{align*} for all $m \in M$. For~$n=1$, we need to consider $f \in \Hom_K(A,M)$ and have \begin{align*} &(d^0 \circ h^1 + h^2 \circ d^1)(f)(a) = a.h^1(f) - h^1(f).a + d^1(f)(c \otimes a) - d^1(f)(a \otimes c) \\ &= a.f(c) - f(c).a + c.f(a) - f(ca) + f(c).a - a.f(c) + f(ac) - f(a).c = c.f(a)-f(a).c \end{align*} for all $a \in A$, because~$c$ is central. We now turn to the general case, where $n\geq 2$. For \mbox{$f \in C^n(A,M)$} and \mbox{$a_1,\dots,a_n\in A$}, we have that $d^{n-1}(h^n(f))(a_1\otimes\dots\otimes a_n)$ is given by the sum \begin{align*} &d^{n-1}(h^n(f))(a_1\otimes\dots\otimes a_n) = a_1.h^n(f)(a_2 \otimes \dots \otimes a_n) \\ &\qquad \quad + \sum_{i=1}^{n-1} (-1)^i h^n(f)(a_1 \otimes \dots \otimes a_i a_{i+1} \otimes \dots \otimes a_n) + (-1)^n h^n(f)(a_1\otimes\dots\otimes a_{n-1}).a_n \\ &\qquad =\sum_{j=1}^{n} (-1)^{j-1} a_1.f(a_2 \otimes \dots \otimes a_j \otimes c \otimes a_{j+1} \otimes \dots \otimes a_n)\\ &\qquad \quad + t_1 + t_2 +(-1)^n \sum_{j=0}^{n-1} (-1)^j f(a_1 \otimes \dots \otimes a_j \otimes c \otimes a_{j+1}\otimes \dots\otimes a_{n-1}).a_n, \end{align*} where for the second equality we have broken the middle sum into two terms, namely the term \begin{align*} t_1 := & \sum_{0 \le j < i \le n-1} (-1)^{i+j} f(a_1 \otimes \dots \otimes a_j \otimes c \otimes a_{j+1} \otimes \dots \otimes a_i a_{i+1} \otimes \dots \otimes a_n) \\ = & \sum_{0 \le j < i \le n-1} (-1)^{i+j} \partial^n_{i+1}(f) (a_1 \otimes \dots \otimes a_j \otimes c \otimes a_{j+1} \otimes \dots \otimes a_n) \\ \intertext{and the term} t_2 := & \sum_{1 \le i \le j \le n-1} (-1)^{i+j} f(a_1\otimes\dots\otimes a_ia_{i+1} \otimes \dots \otimes a_{j+1} \otimes c \otimes a_{j+2} \otimes \dots \otimes a_n) \\ = & \sum_{1 \le i \le j \le n-1} (-1)^{i+j} \partial^n_{i}(f) (a_1 \otimes \dots \otimes a_{j+1} \otimes c \otimes a_{j+2} \otimes \dots \otimes a_n) \\ = & \sum_{1 \le i < j \le n} (-1)^{i+j-1} \partial^n_{i}(f) (a_1 \otimes \dots \otimes a_{j} \otimes c \otimes a_{j+1} \otimes \dots \otimes a_n). \end{align*} On the other hand, $h^{n+1}(d^n(f))(a_1\otimes\dots\otimes a_n)$ is given by the sum \begin{align*} h^{n+1}(d^n(f))(a_1\otimes\dots\otimes a_n) &= \sum_{j=0}^{n} (-1)^j d^n(f)(a_1 \otimes \dots \otimes a_j \otimes c \otimes a_{j+1} \otimes \dots \otimes a_n)\\ &= \sum_{j=0}^{n} \sum_{i=0}^{n+1} (-1)^{i+j} \partial^n_i(f) (a_1 \otimes \dots \otimes a_j \otimes c \otimes a_{j+1} \otimes \dots \otimes a_n). \end{align*} In the preceding sum, the term for~$i=0$ can be written in the form \begin{align*} &\sum_{j=0}^{n} (-1)^j \partial^n_0(f) (a_1 \otimes \dots \otimes a_j \otimes c \otimes a_{j+1} \otimes \dots \otimes a_n) \\ &\qquad = c.f(a_1\otimes\dots\otimes a_n) - a_1.h^n(f)(a_2\otimes\dots\otimes a_n). \end{align*} Looking at the term for~$i=n+1$, we get similarly that \begin{align*} &\sum_{j=0}^{n} (-1)^j (-1)^{n+1} \partial^n_{n+1}(f) (a_1 \otimes \dots \otimes a_j \otimes c \otimes a_{j+1} \otimes \dots \otimes a_n) \\ &\qquad = (-1)^{n+1} h^n(f)(a_1\otimes\dots\otimes a_{n-1}).a_n - f(a_1\otimes\dots\otimes a_n).c. \end{align*} In the remaining terms, we have~$1 \le i \le n$. The sum of the terms with $1 \le i < j \le n$ is equal to $- t_2$. The sum of the terms with $i=j$ is \begin{align*} &\sum_{i=1}^{n} f(a_1 \otimes \dots \otimes a_{i-1} \otimes a_i c \otimes a_{i+1} \otimes \dots \otimes a_n), \intertext{while the sum of the terms with $i=j+1$ is} - &\sum_{j=0}^{n-1} f(a_1 \otimes \dots \otimes a_j \otimes c a_{j+1} \otimes a_{j+2} \otimes \dots \otimes a_n). \end{align*} Because~$c$ is central, these two sums cancel each other. Finally, there is the sum of the terms with $0 < j+1 < i \le n$, which is equal to~$-t_1$. Combining all these terms, we find that \begin{align*} &h^{n+1}(d^n(f))(a_1\otimes\dots\otimes a_n) = c.f(a_1 \otimes \dots \otimes a_n) - a_1.h^n(f)(a_2 \otimes \dots \otimes a_n) \\ &\qquad \quad+ (-1)^{n+1} h^n(f)(a_1 \otimes \dots \otimes a_{n-1}).a_n - f(a_1\otimes\dots\otimes a_n).c - t_2 - t_1 \\ &\qquad = c.f(a_1\otimes\dots\otimes a_n) - d^{n-1}(h^n(f))(a_1\otimes\dots\otimes a_n) - f(a_1\otimes\dots\otimes a_n).c, \end{align*} which implies our assertion. \end{proof} We note that a similar homotopy for Hochschild homology is described in~\cite[Par.~1.1.5, p.~10; Exerc.~1.1.2, p.~15]{L}. We also note that the preceding proposition can be understood from a more abstract and less computational point of view: In our definition above, we have realized the Hochschild cohomology groups~$HH^n(A,M)$ as the groups $\Ext^n_{A\otimes A^{\op}}(A,M)$ by using a special resolution of~$A$ as an $A$-bimodule, or equivalently as an $A\otimes A^{\op}$-module, a resolution that is called the standard resolution in~\cite[Chap.~IX, \S~6, p.~174f]{CE} and the bar resolution in~\cite[Par.~1.1.12, p.~12]{L}. But in fact we can work with a general projective resolution \[A \xleftarrow{\xi} P_0 \xleftarrow{d_1} P_1 \xleftarrow{d_2} P_2 \xleftarrow{d_3} \cdots\] of~$A$ as an $A$-bimodule, which we briefly denote by~$P$. As already pointed out above, the fact that~$c$ is central implies that the maps~$l_c^{P_n}$ and $r_c^{P_n}$ are bimodule homomorphisms. Because~$\xi$ and the boundary operators~$d_n$ are bimodule homomorphisms, the maps $l_c^{P_n}$ commute with them, and therefore lift the left multiplication of~$c$ on~$A$ to the entire resolution: \begin{center} \begin{tikzcd} {} A \arrow{d}{l_c^A} & P_0 \arrow{l}[swap]{\xi}\arrow{d}{l_c^{P_0}} & P_1 \arrow{l}[swap]{d_1} \arrow{d}{l_c^{P_1}} & \cdots\arrow{l}[swap]{d_2}\\ A & P_0\arrow{l}[swap]{\xi} & P_1 \arrow{l}[swap]{d_1} & \cdots \arrow{l}[swap]{d_2} \end{tikzcd} \end{center} Analogously, we can lift the right multiplication of~$c$ on~$A$ to the entire resolution: \begin{center} \begin{tikzcd} {} A\arrow{d}{r_c^A} & P_0 \arrow{l}[swap]{\xi}\arrow{d}{r_c^{P_0}} & P_1 \arrow{l}[swap]{d_1} \arrow{d}{r_c^{P_1}} & \cdots \arrow{l}[swap]{d_2} \\ A & P_0\arrow{l}[swap]{\xi} & P_1\arrow{l}[swap]{d_1} & \cdots\arrow{l}[swap]{d_2} \end{tikzcd} \end{center} Because~$c$ is central, we have~$r_c^A=l_c^A$. Therefore, the comparison theorem found in \cite[Chap.~III, Thm.~6.1, p.~87]{ML} or \cite[Thm.~2.2.6, p.~35]{W} yields that the chain maps~$l_c^{P}=(l_c^{P_n})$ and~$r_c^{P}=(r_c^{P_n})$ are chain homotopic. The contravariant functor~$\Hom_{A\otimes A^{\op}}(-,M)$ coming from our bimodule~$M$ turns this homotopy of chain maps into a homotopy of cochain maps, so that we get that the cochain maps~$(l_c^{P})^*$ and~$(r_c^{P})^*$ are cochain homotopic. But we have~$(l_c^{P})^* = (l_c^M)_*$: For $f\in\Hom_{A\otimes A^{\op}}(P_n,M)$ and $p\in P_n$, we have \[((l_c^M)_*(f))(p)=l_c^M(f(p)) = c.f(p) = f(c.p) = f(l_c^{P_n}(p)) = ((l_c^{P_n})^*(f))(p) \] A similar computation shows that $(r_c^{P})^* = (r_c^M)_*$, which completes our second, resolution-independent proof of the proposition. We note that generalizations of this proposition can be found in the literature, for example in~\cite[Cor.~1.3, p.~709]{SS}. However, we will only need the above form of the proposition in the sequel. \section{Hochschild Cohomology of Hopf Algebras} \label{Sec:HochschHopf} We now turn to the case where the algebra~$A$ is a Hopf algebra. We will denote the coproduct of~$A$ by~$\Delta$, its counit by~$\varepsilon$, and its antipode by~$S$. For the coproduct of $a \in A$, we will use Heyneman-Sweedler notation in the form $\Delta(a) = a_{(1)} \otimes a_{(2)}$. Because~$A$ is a Hopf algebra, every $A$-bimodule~$M$ can be considered as a right $A$-module via the right adjoint action \[\ad \colon M \otimes A \rightarrow M,~m \otimes a \mapsto \ad(m \otimes a),\] which is defined as $\ad(m \otimes a) := S(a_{(1)}).m.a_{(2)}$. We denote~$M$ by~$M_{\ad}$ if it is considered as a right $A$-module in this way. In general, a right $A$-module~$N$ becomes an $A$-bimodule with respect to the trivial left action, i.e., the action defined as~$a.n := \varepsilon(a) n$. We denote~$N$ by~$\prescript{}{\varepsilon}N$ if it is considered as a bimodule in this way. By combining the two operations, we can associate with an \mbox{$A$-bimodule~$M$} the $A$-bimodule~$\prescript{}{\varepsilon}M_{\ad}:=\prescript{}{\varepsilon}(M_{\ad})$. As it turns out, the Hochschild cochain complexes determined by these two bimodules are isomorphic: \begin{Proposition} \label{IsoCompl} The maps $\Omega^n \colon C^n(A, \prescript{}{\varepsilon}M_{\ad}) \to C^n(A,M)$ defined via the formula \[\Omega^n(f)(a_1\otimes\dots\otimes a_n) = a_{1{(1)}} \dots a_{n{(1)}}.f(a_{1{(2)}} \otimes \dots \otimes a_{n{(2)}})\] give rise to an isomorphism~$\Omega = (\Omega^n)$ between the Hochschild cochain complex of~$\prescript{}{\varepsilon}M_{\ad}$ and the Hochschild cochain complex of~$M$. \end{Proposition} \begin{proof} We first note that $\Omega^n$ is bijective with inverse \[(\Omega^n)^{-1}(f)(a_1\otimes \dots \otimes a_n) := S(a_{n{(1)}}) \dots S(a_{1{(1)}}).f(a_{1{(2)}} \otimes \dots \otimes a_{n{(2)}}),\] because for $f \in C^n(A, \prescript{}{\varepsilon}M_{\ad}) = \Hom_K(A^{\otimes n}, \prescript{}{\varepsilon}M_{\ad})$, we have \begin{align*} &(\Omega^n)^{-1}(\Omega^n(f))(a_1 \otimes \dots \otimes a_n) = S(a_{n(1)}) \dots S(a_{1(1)}).\Omega^n(f)(a_{1(2)}\otimes\dots\otimes a_{n(2)}) \\ &\qquad = S(a_{n(1)}) \dots S(a_{1(1)}) a_{1(2)} \dots a_{n(2)}.f(a_{1(3)} \otimes \dots \otimes a_{n(3)}) =f(a_1\otimes\dots\otimes a_n), \end{align*} and the relation $\Omega^n \circ (\Omega^n)^{-1} = \id_{C^n(A,M)}$ follows analogously. For $f \in C^{n-1}(A, \prescript{}{\varepsilon}M_{\ad})$ and~$a_1,\dots,a_n\in A$, we have on the one hand \begin{align*} &d^{n-1}(\Omega^{n-1}(f))(a_1 \otimes \dots \otimes a_n) = a_1.\Omega^{n-1}(f)(a_2 \otimes \dots \otimes a_n) \\ &\qquad \quad + \sum_{i=1}^{n-1}(-1)^i\Omega^{n-1}(f)(a_1 \otimes \dots \otimes a_i a_{i+1} \otimes \dots \otimes a_n)\\ &\qquad \quad + (-1)^n (\Omega^{n-1}(f)(a_1 \otimes \dots \otimes a_{n-1})).a_n\\ &\qquad = a_1 a_{2{(1)}} \dots a_{n{(1)}}.f(a_{2{(2)}} \otimes \dots \otimes a_{n{(2)}}) \\ &\qquad \quad + \sum_{i=1}^{n-1}(-1)^i a_{1(1)} \dots (a_{i} a_{i+1})_{(1)} \dots a_{n(1)}. f(a_{1(2)} \otimes \dots \otimes (a_{i} a_{i+1})_{(2)} \otimes \dots \otimes a_{n(2)})\\ &\qquad \quad + (-1)^n a_{1(1)} \dots a_{n-1(1)}.f(a_{1(2)} \otimes \dots \otimes a_{n-1(2)}).a_n \end{align*} and on the other hand \begin{align*} &\Omega^n(d^{n-1}(f))(a_1 \otimes \dots \otimes a_n) = a_{1{(1)}} \dots a_{n{(1)}}.d^{n-1}(f)(a_{1{(2)}} \otimes \dots \otimes a_{n{(2)}})\\ &\qquad = a_{1{(1)}} \dots a_{n{(1)}}.\varepsilon(a_{1{(2)}}) f(a_{2{(2)}} \otimes \dots \otimes a_{n{(2)}})\\ &\qquad \quad + \sum_{i=1}^{n-1} (-1)^i a_{1(1)} \dots a_{n(1)}.f(a_{1(2)} \otimes \dots \otimes a_{i(2)} a_{i+1(2)} \otimes \dots \otimes a_{n(2)})\\ &\qquad \quad + (-1)^n a_{1{(1)}} \dots a_{n{(1)}}. \left(S(a_{n(2)}).f(a_{1(2)} \otimes \dots \otimes a_{n-1(2)}).a_{n(3)} \right), \end{align*} where we have used for the last summand that \begin{align*} \ad(f(a_{1} \otimes \dots \otimes a_{n-1}) \otimes a_{n}) = S(a_{n(1)}).f(a_{1} \otimes \dots \otimes a_{n-1}).a_{n(2)} \end{align*} according to the definition of the right adjoint action. Because both expressions agree, $\Omega$~is a cochain map, which establishes our assertion. \end{proof} If the antipode of~$A$ is bijective, the coopposite Hopf algebra~$A^{\cop}$, in which the product remains unaltered, but the coproduct is modified by interchanging the tensor factors, is a Hopf algebra, and its antipode is the inverse of the antipode of~$A$. For an $A$-bimodule~$M$, we denote the right adjoint action that arises from this Hopf algebra structure by~$\cad$; in terms of the original structure elements, this action is given by the formula \[\cad(m \otimes a) := S^{-1}(a_{(2)}).m.a_{(1)}.\] If we apply the preceding proposition to this situation, we obtain the following corollary: \begin{Cor} \label{IsoComplCor} If the antipode of~$A$ is bijective, the maps $\Omega'^n \colon C^n(A, \prescript{}{\varepsilon}M_{\cad}) \to C^n(A,M)$ defined via the formula \[\Omega'^n(f)(a_1\otimes\dots\otimes a_n) = a_{1{(2)}} \dots a_{n{(2)}}.f(a_{1{(1)}} \otimes \dots \otimes a_{n{(1)}})\] give rise to an isomorphism~$\Omega' = (\Omega'^n)$ between the Hochschild cochain complex of~$\prescript{}{\varepsilon}M_{\cad}$ and the Hochschild cochain complex of~$M$. \end{Cor} We record that $\Omega'^n$ is bijective with inverse \[(\Omega'^n)^{-1}(f)(a_1\otimes \dots \otimes a_n) := S^{-1}(a_{n{(2)}}) \dots S^{-1}(a_{1{(2)}}).f(a_{1{(1)}} \otimes \dots \otimes a_{n{(1)}}),\] as we had seen in the proof of our proposition. Proposition~\ref{IsoCompl} generalizes a result found in \cite[Sec.~1, p.~2862f]{FS}. We note that further results related to this proposition can be found in the literature: In the case where the Hopf algebra is a group ring, the argument is contained in~\cite[\S~5, p.~60f]{EM}, one of the foundational articles for group cohomology. A homology version of the proposition can be found in~\cite[Prop.~(2.4), p.~488]{FT}, at least in the case where the bimodule is the underlying algebra. Similar statements for cohomology appear in~\cite[Par.~5.5, p.~197]{GK} and~\cite[Lem.~12, p.~591]{PW}. These last two references, however, rather state a combination of Proposition~\ref{IsoCompl} with the following lemma: \begin{Lemma} For a right $A$-module~$N$, we have $HH^n(A, \prescript{}{\varepsilon}N) \cong \Ext_A^n(K, N)$, where the base field~$K$ is given the trivial right $A$-module structure via the counit~$\varepsilon$. \end{Lemma} \begin{proof} If $P=(P_n)$ is a projective resolution of~$A$ as a left $A \otimes A^{\op}$-module, we know from \cite[Chap.~X, Thm.~2.1, p.~185]{CE} that $K \otimes_A P := (K \otimes_A P_n)$ is a projective resolution of~$K$ as a right $A$-module. Therefore $\Ext_A^n(K, N)$ is the $n$-th cohomology group of the cochain complex formed by the cochain groups $\Hom_A(K \otimes_A P_n, N)$. But the cochain map \[\Hom_{A \otimes A^{\op}}(P_n, \prescript{}{\varepsilon}N) \to \Hom_A(K \otimes_A P_n, N),~f \mapsto (\lambda \otimes p \mapsto \lambda f(p)) \] with inverse \[\Hom_A(K \otimes_A P_n, N) \to \Hom_{A \otimes A^{\op}}(P_n, \prescript{}{\varepsilon}N),~g \mapsto (p \mapsto g(1_K \otimes p)) \] shows that this complex is isomorphic to the cochain complex of the cochain groups $\Hom_{A \otimes A^{\op}}(P_n, \prescript{}{\varepsilon}N)$, whose cohomology groups are $\Ext^n_{A \otimes A^{\op}}(A, \prescript{}{\varepsilon}N) = HH^n(A, \prescript{}{\varepsilon}N)$. \end{proof} \section{The Action on the Center} \label{Sec:ActCent} We now turn to the case of a factorizable ribbon Hopf algebra~$A$ with R-matrix~$R$ and ribbon element~$v$. Even though the R-matrix is in general not a pure tensor, we use the notation $R = R_1 \otimes R_2$. If $\tau$ denotes the flip map, we therefore have $\tau(R) = R_2 \otimes R_1$. This element in turn can be used to introduce the monodromy matrix $Q := \tau(R) R$, and as for the R-matrix, we write $Q=Q_1\otimes Q_2$. An important role will be played by the Drinfel'd and Radford map, which are defined as follows: \begin{Definition} \label{DrinfRadfMap} We call the map \[\bar{\Phi}\colon A^*\to A,\ \varphi\mapsto\varphi(Q_1)Q_2\] the Drinfel'd map, and define the subalgebra \[\bar{C}(A) := \{\varphi\in A^*\mid \varphi(bS^{-2}(a)) = \varphi(ab) \text{ for all } a,b\in A\},\] whose elements we call generalized class functions. With the help of a nonzero right integral $\rho\in A^*$, we introduce the Radford map \[\iota\colon A\to A^*,\ a\mapsto\rho_{(1)}(a)\rho_{(2)}.\] \end{Definition} By definition, $A$~is factorizable if and only if~$\bar{\Phi}$ is bijective, which implies in particular that~$A$ is finite-dimensional. The basic properties of the Drinfel'd map can be found in~\cite[Par.~3.2, p.~26]{SZ}, and the basic properties of the Radford map can also be found there, namely in~\cite[Par.~4.1, p.~35]{SZ}. In particular, the Drinfel'd map restricts to an algebra isomorphism from~$\bar{C}(A)$ to~$Z(A)$, the center of~$A$, while the Radford map restricts to a $K$-linear isomorphism from~$Z(A)$ to~$\bar{C}(A)$. A consequence of this last fact is that~\mbox{$\rho = \iota(1_A) \in \bar{C}(A)$}, which is a special case of a general result found in~\cite[Thm.~10.5.4, p.~307]{R} that arises when combined with~\cite[Prop.~12.4.2, p.~405]{R}. Following~\cite[Par.~4.1, p.~35]{SZ}, we introduce the endomorphism~$\mathfrak S:=S\circ\bar{\Phi}\circ\iota$ of~$A$, where as before~$S$ denotes the antipode of~$A$. For $a\in A$, we have explicitly \begin{align*} \mathfrak S(a) &= S(\bar{\Phi}(\rho_{(1)}(a)\rho_{(2)})) = S(\rho_{(1)}(a)\rho_{(2)}(Q_1)Q_2) = \rho(aQ_1) \, S(Q_2), \end{align*} or $\mathfrak S(a) = \rho(a R_2 R'_1) \, S(R_1 R'_2)$ if we insert the definition of the monodromy matrix by using a second copy~$R'$ of the R-matrix. As in~\cite[Par.~4.3, p.~37]{SZ}, we introduce a second such map, namely the multiplication \[\mathfrak T\colon A\to A, \ a \mapsto va\] with the ribbon element~$v \in A$. The endomorphisms~$\mathfrak S$ and~$\mathfrak T$ will be used to encode the action of the two generators of the modular group described below. We will need a third endomorphism of~$A$, namely the antipode of the transmutation of~$A$. The transmutation of a quasitriangular Hopf algebra was described by S.~Majid in several articles, among them~\cite{M1}, and is discussed in his monograph~\cite{M2}. It has the same underlying vector space as~$A$, in fact even the same algebra structure. In the version that we are using, the antipode $\underline{S}$ of the transmutation is given by \[\underline{S}(a) = S(S(R_{1(1)}) a R_{1(2)}) R_2.\] This variant arises from the one given in~\cite[Ex.~9.4.9, p.~504]{M2} by replacing~$A$ with~$A^{\op\cop}$. If $u:=S(R_2)R_1$ is the Drinfel'd element of $A$, then the element $S(u) = R_1 S(R_2)$ is the Drinfel'd element of $A^{\op\cop}$. Therefore, the alternative form of~$\underline{S}$ given in~\cite[Eq.~(9.42), p.~507]{M2} becomes in our case \[\underline{S}(a) = R_1 S(a) S(R_2) S(u^{-1}).\] These three endomorphisms are related as follows: \begin{Proposition} \label{ModRel} The maps $\mathfrak S$ and $\mathfrak T$ satisfy the relations \[\mathfrak S \circ \mathfrak T \circ \mathfrak S = \rho(v) \; \mathfrak T^{-1} \circ \mathfrak S \circ \mathfrak T^{-1} \quad \text{and} \quad \mathfrak S^2 = (\rho\otimes\rho)(Q) \; \underline{S}^{-1}.\] \end{Proposition} \begin{proof} A proof of the first relation can be found in~\cite[Prop.~4.3, p.~37]{SZ}. To prove the second relation, we use four copies $R,R',R''$ and~$R'''$ of the R-matrix. Because $\rho\in\bar{C}(A)$, the map~$\mathfrak S$ is alternatively given by \[\mathfrak S(a) = \rho(a R_2 R'_1) \, S(R'_2) S(R_1) = \rho(a R_2 S^{-1}(R'_1)) \, R'_2 S(R_1) = \rho(S(R'_1) a R_2) \, R'_2 S(R_1), \] where we have used the fact $(S \otimes S)(R)=R$ proved in \cite[Prop.~10.1.8, p.~180]{M}. From~\cite[Prop.~4.1, p.~35]{SZ}, we know that~$\mathfrak S$ is $A$-linear with respect to the right adjoint action. Therefore, we have \[\underline{S}(\mathfrak S(a)) = S(\mathfrak S(S(R''_{1(1)}) a R''_{1(2)})) R''_2 = \rho(S(R'_1) S(R''_{1(1)}) a R''_{1(2)} R_2) \, S(R'_2 S(R_1)) R''_2.\] If we use one of the axioms for the R-matrix, namely~\cite[Eq.~10.1.6, p.~180]{M}, and the fact that the antipode is antimultiplicative, this equation can be rewritten in the form \begin{align*} \underline{S}(\mathfrak S(a)) &= \rho(S(R'_1) S(R'''_1) a R''_1 R_2) \, S^2(R_1) S(R'_2) R'''_2 R''_2 \\ &= \rho(R'_1 S(R'''_1) a R''_1 R_2) \, S^2(R_1) R'_2 R'''_2 R''_2. \end{align*} Another fact proved in \cite[Prop.~10.1.8, p.~180]{M} is that $(S \otimes \id)(R)=R^{-1}$, so that this equation reduces to \[\underline{S}(\mathfrak S(a)) = \rho(a R''_1 R_2) \, S^2(R_1) R''_2 =(\rho\otimes\rho)(Q) \, \mathfrak S^{-1}(a),\] where the last step follows from~\cite[Prop.~4.2, p.~36]{SZ}. Our claim is a minor rearrangement of this equation. \end{proof} We would like to emphasize that this proposition is not new; rather, it is a variant of~\cite[Thm.~4.4, p.~523]{LM}. We also note that it follows directly from another elementary property of R-matrices also proved in~\cite[Prop.~10.1.8, p.~180]{M} that~$\underline{S}$ agrees with the ordinary antipode~$S$ on the center of~$A$, and because the square of the antipode is given by conjugation with the Drinfel'd element~$u$, as shown in~\cite[Prop.~10.1.4, p.~179]{M}, we have $S=S^{-1}$ on the center. Therefore, the second relation in the previous proposition generalizes \cite[Cor.~4.2, p.~37]{SZ}. The fact that the square of~$\underline{S}$ restricts to the identity on the center can also be seen from the fact that, in general, it is given by the right adjoint action of our ribbon element: \begin{Lemma} \label{SqRib} For all $a \in A$, we have $\underline{S}^2(a) = \ad(a \otimes v)$. \end{Lemma} \begin{proof} With the help of the alternative form of~$\underline{S}$, we get \begin{align*} \underline{S}^2(a) &= \underline{S}(R_1 S(a) S(R_2) S(u^{-1})) = R'_1 S(R_1 S(a) S(R_2) S(u^{-1})) S(R'_2) S(u^{-1})\\ &= R'_1 S^2(u^{-1}) S^2(R_2) S^2(a)S(R_1) S(R'_2) S(u^{-1}) = R'_1 u^{-1} S^2(R_2a) S(u^{-1} R'_2 R_1). \end{align*} Using the definition of the monodromy matrix~$Q$, the basic properties of ribbon elements found in~\cite[Par.~4.3, p.~37]{SZ} and the above-mentioned fact that the square of the antipode is given by conjugation with the Drinfel'd element~$u$, this becomes \begin{align*} \underline{S}^2(a) &= Q_2au^{-1}S(u^{-1}Q_1) = S^2(Q_2)au^{-1}S(u^{-1}S^2(Q_1)) = S^2(Q_2)au^{-1}S(Q_1u^{-1})\\ &= S^2(Q_2)au^{-1}S(u^{-1})S(Q_1) = S^2(Q_2)av^2S(Q_1) = S(Q_1)av^2Q_2=S(v_{(1)})av_{(2)} \end{align*} as asserted. \end{proof} We note that this equation is stated in \cite[Eq.~(2.60), p.~370]{Ke}, at least in the case of Drinfel'd doubles. A version in the framework of coends can be found in \cite[Cor.~3.10, p.~306]{Ly}. The proposition above implies that the (homogeneous) modular group \[\SL(2,\Z)=\{M\in\GL(2,\Z)\mid\det(M)=1\}\] acts projectively on the center of~$A$. The modular group is generated by the two elements $\mathfrak s:=\big(\begin{smallmatrix} 0 &-1\\ 1 & 0 \end{smallmatrix}\big)$ and $\t:=\big(\begin{smallmatrix} 1 & 1\\ 0 & 1 \end{smallmatrix}\big)$, which satisfy the relations \[\mathfrak s^4=1 \quad\text{and}\quad \mathfrak s \t \mathfrak s = \t^{-1} \mathfrak s \t^{-1} ,\] and these relations are defining, as shown for example in~\cite[Thm.~3.2.3.2, p.~97]{FR}, \cite[Thm.~A.2, p.~312]{KT} or~\cite[Sec.~II.1, Thm.~8, p.~53]{Ma}. If we denote the projective space associated to~$Z(A)$ by~$P(Z(A))$ and the automorphisms of this projective space arising from~$\mathfrak S$ and~$\mathfrak T$ by~$P(\mathfrak S)$ and~$P(\mathfrak T)$, the above proposition implies immediately the following fact: \begin{Cor} \label{ProjRepCent} There is a unique homomorphism from $\SL(2,\Z)$ to $\PGL(Z(A))$ that maps~$\mathfrak s$ to~$P(\mathfrak S)$ and~$\t$ to~$P(\mathfrak T)$. \end{Cor} This result holds for any ribbon element~$v \in A$ and any nonzero right integral $\rho \in A^*$. As shown in~\cite[Cor.~12.4.4, p.~407]{R}, we have~$\rho(v) \neq 0$; this is obviously also a consequence of the proposition above. Because right integrals are only unique up to scalar multiples, we can choose a right integral that satisfies~$\rho(v)=1$; following \cite[Def.~4.4, p.~39]{SZ}, we call such a right integral ribbon-normalized with respect to~$v$. If we use a ribbon-normalized right integral, the proposition above shows that the action of the modular group on the center is linear, and not only projective, if and only if $(\rho\otimes\rho)(Q) = \pm 1$. By \cite[Lem.~4.4, p.~39]{SZ}, this condition is equivalent to the condition~$\rho(v^{-1}) = \pm 1$. \section{The Radford and the Drinfel'd Map for Complexes} \label{Sec:RadfDrinf} We remain in the situation described in Section~\ref{Sec:ActCent} and consider a factorizable ribbon Hopf algebra~$A$ with R-matrix~$R$ and ribbon element~$v$. Our first goal is to generalize the Radford map, the Drinfel'd map and the antipode to cochain maps of Hochschild cochain complexes. We begin with the Radford map, for which this is particularly easy. By~$A_{S^{-2}}$, we denote~$A$ considered as an $A$-bimodule with the left action given by multiplication, but the right action modified via the square of the inverse antipode, so that the right action is given by $b.a := bS^{-2}(a)$ for $a,b\in A$. As explained in Example~\ref{Zero}, we then have \begin{align*} HH^0(A,(A_{S^{-2}})^*)&= \{\varphi\in A^*\mid \varphi(bS^{-2}(a))=\varphi(ab) \text{ for all } a,b\in A\} = \bar{C}(A), \end{align*} the algebra of generalized class functions introduced in Definition~\ref{DrinfRadfMap}. The bimodule~$A_{S^{-2}}$ is related to the Radford map in the following way: \begin{Proposition} \label{RadfBimod} The Radford map~$\iota$ is a bimodule isomorphism from~$A$ to~$(A_{S^{-2}})^*$. \end{Proposition} \begin{proof} By \cite[Thm.~2.1.3, p.~18]{M}, $A$~is a Frobenius algebra with Frobenius homomorphism~$\rho$, so that $\iota$ is bijective. It is a bimodule homomorphism because \begin{align*} \iota(a_1 a a_2)(b) = \rho(a_1 a a_2 b) = \rho(a a_2 b S^{-2}(a_1)) = \iota(a)(a_2 b S^{-2}(a_1)) = (a_1.\iota(a).a_2)(b) \end{align*} for all $a, a_1, a_2, b\in A$, where the second equality holds because $\rho \in \bar{C}(A)$, a fact already pointed out in Section~\ref{Sec:ActCent}. \end{proof} Because bimodule isomorphisms induce isomorphisms between the corresponding Hoch\-schild cochain complexes, this proposition enables us to generalize the Radford map to a cochain map as follows: \begin{Definition} \label{iota1} We define the Radford map for Hochschild cochain complexes as the cochain map from~$C(A,A)$ to~$C(A,(A_{S^{-2}})^*)$ with components \[\iota^n \colon C^n(A,A) \to C^n(A,(A_{S^{-2}})^*),~f \mapsto \iota \circ f.\] In other words, we set $\iota^n := \iota_*$, the composition with~$\iota$ on the left. \end{Definition} In order to compare this definition with the treatment of the Drinfel'd map and the antipode below, it will be important to relate this cochain map to another one defined between different cochain complexes. From Proposition~\ref{IsoCompl}, we get a cochain map $\Omega = (\Omega^n)$ from the cochain complex $C^n(A, \prescript{}{\varepsilon}A_{\ad})$ to the cochain complex~$C^n(A,A)$, but also a cochain map from the cochain complex~$C^n(A, \prescript{}{\varepsilon}((A_{S^{-2}})^*)_{\ad})$ to the cochain complex~$ C^n(A,(A_{S^{-2}})^*)$, which we denote by $\Omega'' = (\Omega''^n)$. The bimodule $\prescript{}{\varepsilon}((A_{S^{-2}})^*)_{\ad}$ admits a slightly simpler description: For $\varphi \in (A_{S^{-2}})^*$, $a\in A$ and $b \in A_{S^{-2}}$, we have \begin{align*} \ad(\varphi \otimes a)(b) &= (S(a_{(1)}).\varphi.a_{(2)})(b) = \varphi(a_{(2)}.b.S(a_{(1)})) \\ &= \varphi(a_{(2)} b S^{-1}(a_{(1)})) = \varphi_{(1)}(a_{(2)}) \varphi_{(2)}(b) \varphi_{(3)}(S^{-1}(a_{(1)})), \end{align*} which shows that the right adjoint action in~$\prescript{}{\varepsilon}((A_{S^{-2}})^*)_{\ad}$ coincides with the right coadjoint action of the coopposite Hopf algebra~$A^{\cop}$, which we denote by \[\coad \colon A^* \otimes A \to A^*,~\varphi \otimes a \mapsto \varphi_{(1)}(a_{(2)}) \varphi_{(3)}(S^{-1}(a_{(1)})) \, \varphi_{(2)}.\] In other words, we have $\prescript{}{\varepsilon}((A_{S^{-2}})^*)_{\ad} = \prescript{}{\varepsilon}(A^*)_{\coad}$. The Radford map now relates the two isomorphisms~$\Omega$ and~$\Omega''$ as follows: \begin{Lemma} \label{iota2} The diagram \begin{center} \begin{tikzcd} {} C^n(A, \prescript{}{\varepsilon}(A^*)_{\coad}) \arrow{r}{\Omega''^n} & C^n(A,(A_{S^{-2}})^*)\\ C^n(A,\prescript{}{\varepsilon}{A}_{\ad}) \arrow{u}{\iota_*} \arrow{r}{\Omega^n} & C^n(A,A) \arrow{u}{\iota_*} \end{tikzcd} \end{center} commutes. \end{Lemma} \begin{proof} We first note that it follows from Proposition~\ref{RadfBimod} above that the Radford map~$\iota$ is also a bimodule isomorphism from~$\prescript{}{\varepsilon}{A}_{\ad}$ to~$\prescript{}{\varepsilon}((A_{S^{-2}})^*)_{\ad} = \prescript{}{\varepsilon}(A^*)_{\coad}$, so that the map on the left is well-defined. For $f\in C^n(A,\prescript{}{\varepsilon}{A}_{\ad}) = \Hom_K(A^{\otimes n},\prescript{}{\varepsilon}{A}_{\ad})$ and $a_1,\dots,a_n,b\in A$, we now have on the one hand \begin{align*} \iota(\Omega^n(f)(a_1 \otimes \dots \otimes a_n))(b) &= \iota(a_{1(1)} \dots a_{n(1)} f(a_{1(2)} \otimes \dots \otimes a_{n(2)}))(b)\\ &= \rho(a_{1(1)} \dots a_{n(1)} f(a_{1(2)} \otimes \dots \otimes a_{n(2)}) b). \end{align*} On the other hand, we have \begin{align*} ((\Omega''^n\circ\iota_*)(f)(a_1\otimes\dots\otimes a_n))(b) &= (a_{1(1)} \dots a_{n(1)}.\iota_*(f)(a_{1(2)} \otimes \dots \otimes a_{n(2)}))(b) \\ &= \iota_*(f)(a_{1(2)} \otimes \dots \otimes a_{n(2)})(b.a_{1(1)} \dots a_{n(1)}) \\ &= \iota(f(a_{1(2)} \otimes \dots \otimes a_{n(2)}))(bS^{-2}(a_{1(1)} \dots a_{n(1)})) \\ &= \rho(f(a_{1(2)} \otimes \dots \otimes a_{n(2)}) b S^{-2}(a_{1(1)} \dots a_{n(1)})). \end{align*} Since $\rho \in \bar{C}(A)$, these expressions are equal. \end{proof} To generalize the Drinfel'd map to a cochain map between Hochschild cochain complexes, we first recall from \cite[Par.~3.2, p.~26]{SZ} that the Drinfel'd map $\bar{\Phi}$ is a bimodule isomorphism between $\prescript{}{\varepsilon}{(A^*)}_{\coad}$ and $\prescript{}{\varepsilon}A_{\cad}$, so that we obtain an isomorphism of cochain complexes \[\bar{\Phi}_*\colon C^n(A,\prescript{}{\varepsilon}{(A^*)}_{\coad}) \to C^n(A,\prescript{}{\varepsilon}{A}_{\cad}),~f \mapsto \bar{\Phi} \circ f\] by composing with~$\bar{\Phi}$ on the left. Now the isomorphism $\Omega'$ from Corollary~\ref{IsoComplCor} enables us to obtain a cochain map between the original cochain complexes: \begin{Definition} We define the Drinfel'd map for Hochschild cochain complexes as the cochain map from~$C(A,(A_{S^{-2}})^*)$ to~$C(A,A)$ with components $\bar{\Phi}^n := \Omega'^n \circ \bar{\Phi}_* \circ (\Omega''^n)^{-1}$. In other words, it is the unique cochain map whose components make the diagram \begin{center} \begin{tikzcd}\label{GenDrinf} {} C^n(A,\prescript{}{\varepsilon}{(A^*)}_{\coad}) \arrow{d}{\bar{\Phi}_*} \arrow{r}{\Omega''^n} & C^n(A,(A_{S^{-2}})^*) \arrow{d}{\bar{\Phi}^n} \\ C^n(A,\prescript{}{\varepsilon}{A}_{\cad}) \arrow{r}{\Omega'^n} & C^n(A,A) \end{tikzcd} \end{center} commutative. \end{Definition} With the help of the monodromy matrix~$Q$, the map $\bar{\Phi}^n$ can be calculated explicitly: For $f \in C^n(A,(A_{S^{-2}})^*) = \Hom_K(A^{\otimes n},(A_{S^{-2}})^*)$ and $a_1, \dots, a_n \in A$, we have \begin{align*} \bar{\Phi}^n(f)(a_1\otimes\dots\otimes a_n) &= (\Omega'^n \circ \bar{\Phi}_* \circ (\Omega''^n)^{-1})(f)(a_1 \otimes \dots \otimes a_n) \\ &= a_{1(2)} \dots a_{n(2)} \bar{\Phi}((\Omega''^n)^{-1}(f)(a_{1(1)} \otimes \dots \otimes a_{n(1)}))\\ &= a_{1(3)} \dots a_{n(3)} \bar{\Phi}(S(a_{n(1)}) \dots S(a_{1(1)}).f(a_{1(2)} \otimes \dots \otimes a_{n(2)})) \\ &= a_{1(3)} \dots a_{n(3)} (S(a_{n(1)}) \dots S(a_{1(1)}).f(a_{1(2)} \otimes \dots \otimes a_{n(2)}))(Q_1)Q_2 \\ &= a_{1(3)} \dots a_{n(3)} f(a_{1(2)} \otimes \dots \otimes a_{n(2)}) (Q_1.(S(a_{n(1)}) \dots S(a_{1(1)}))) Q_2 \\ &= f(a_{1(2)}\otimes\dots\otimes a_{n(2)})(Q_1S^{-1}(a_{n(1)})\dots S^{-1}(a_{1(1)})) \, a_{1(3)} \dots a_{n(3)} Q_2. \end{align*} In a similar way, we can generalize the antipode~$S$ to a cochain map between Hochschild cochain complexes: Since we have \[S(\cad(b \otimes a)) = S(S^{-1}(a_{(2)})ba_{(1)}) = S(a_{(1)})S(b)a_{(2)} = \ad(S(b) \otimes a),\] the antipode is a bimodule isomorphism from $\prescript{}{\varepsilon}{A}_{\cad}$ to $\prescript{}{\varepsilon}{A}_{\ad}$. Composition with~$S$ therefore yields an isomorphism \[S_*\colon C^n(A,\prescript{}{\varepsilon}{A}_{\cad}) \to C^n(A,\prescript{}{\varepsilon}{A}_{\ad}),~f \mapsto S \circ f\] of cochain complexes. Now the isomorphisms~$\Omega$ and~$\Omega'$ from Section~\ref{Sec:HochschHopf} enable us to obtain a cochain map between the original cochain complexes: \begin{Definition} \label{GenAntip} We define the antipode map for Hochschild cochain complexes as the cochain map from $C(A, A)$ to itself with components $S^n := \Omega^n \circ S_* \circ (\Omega'^n)^{-1}$. In other words, it is the unique cochain map whose components make the diagram \begin{center} \begin{tikzcd} {} C^n(A, \prescript{}{\varepsilon}{A}_{\cad}) \arrow{d}{S_*} \arrow{r}{\Omega'^n} & C^n(A, A) \arrow{d}{S^n} \\ C^n(A, \prescript{}{\varepsilon}{A}_{\ad}) \arrow{r}{\Omega^n} & C^n(A, A) \end{tikzcd} \end{center} commutative. \end{Definition} As in the case of the Drinfel'd map, there is an explicit expression for the antipode map for cochain complexes: For $f\in C^n(A, A) = \Hom_K(A^{\otimes n}, A)$ and $a_1, \dots, a_n \in A$, we have \begin{align*} S^n(f)(a_1 \otimes \dots \otimes a_n) &= (\Omega^n \circ S_* \circ (\Omega'^n)^{-1})(f)(a_1 \otimes \dots \otimes a_n) \\ &= a_{1(1)} \dots a_{n(1)}S((\Omega'^n)^{-1}(f)(a_{1(2)}\otimes\dots\otimes a_{n(2)}))\\ &= a_{1(1)}\dots a_{n(1)}S(S^{-1}(a_{n(3)})\dots S^{-1}(a_{1(3)})f(a_{1(2)}\otimes\dots\otimes a_{n(2)}))\\ &= a_{1(1)}\dots a_{n(1)}S(f(a_{1(2)}\otimes\dots\otimes a_{n(2)}))a_{1(3)}\dots a_{n(3)}. \end{align*} \section{The Action on the Hochschild Cochain Complex} \label{Sec:ActHoch} We still remain in the situation described in Section~\ref{Sec:ActCent} and Section~\ref{Sec:RadfDrinf}. Our goal is to use the Radford map, the Drinfel'd map and the antipode map for Hochschild cochain complexes introduced in Section~\ref{Sec:RadfDrinf} in order to construct a projective action of the modular group~$\SL(2,\Z)$ on each Hochschild cohomology group~$HH^n(A,A)$ in such a way that the action on the zeroth Hochschild cohomology group, which is, as we saw in Example~\ref{Zero}, equal to the center~$Z(A)$, coincides with the action described in Section~\ref{Sec:ActCent}. Up to homotopy, we will in fact construct a projective action of the modular group on the entire Hochschild cochain complex. To define a projective representation of the modular group, we have to specify the images of the generators~$\mathfrak s$ and~$\t$ introduced in Section~\ref{Sec:ActCent} and prove that they satisfy the defining relations stated there. For the first generator~$\mathfrak s$, we use the same approach as in Section~\ref{Sec:ActCent} and map it to the composition of the Radford map, the Drinfel'd map and the antipode: \begin{Definition} We define $\mathfrak S^n \colon C^n(A, A) \to C^n(A, A)$ as $\mathfrak S^n := S^n \circ \bar{\Phi}^n \circ \iota^n$. \end{Definition} Because the cochain complex versions of the Radford map, the Drinfel'd map and the antipode are cochain isomorphisms by construction, the maps $\mathfrak S^n$ are the components of a cochain automorphism of the Hochschild cochain complex. Its basic property is the following: \begin{Lemma} \label{LgS} The diagram \begin{center} \begin{tikzcd} {} C^n(A,\prescript{}{\varepsilon}{A}_{\ad}) \arrow{d}{\mathfrak S_*} \arrow{r}{\Omega^n} & C^n(A, A) \arrow{d}{\mathfrak S^n} \\ C^n(A,\prescript{}{\varepsilon}{A}_{\ad}) \arrow{r}{\Omega^n} & C^n(A, A) \end{tikzcd} \end{center} commutes. \end{Lemma} \begin{proof} This is immediate from Lemma~\ref{iota2}, Definition~\ref{GenDrinf} and Definition~\ref{GenAntip}: We have \begin{align*} \mathfrak S^n \circ \Omega^n &= S^n \circ \bar{\Phi}^n \circ \iota^n \circ \Omega^n = S^n \circ \bar{\Phi}^n \circ \Omega''^n \circ \iota_* \\ &= S^n \circ \Omega'^n \circ \bar{\Phi}_* \circ \iota_* = \Omega^n \circ S_* \circ \bar{\Phi}_* \circ \iota_* = \Omega^n \circ (S \circ \bar{\Phi} \circ \iota)_* = \Omega^n \circ \mathfrak S_* \end{align*} since successive composition with~$\iota$, $\bar{\Phi}$ and~$S$ is the same as composition with~$\mathfrak S$. It may be noted that~$\mathfrak S$, as the composition of the bimodule isomorphisms~$\iota$, $\bar{\Phi}$ and~$S$, is a bimodule automorphism of~$\prescript{}{\varepsilon}{A}_{\ad}$, so that the map~$\mathfrak S_*$ on the left is indeed the component of a cochain map. \end{proof} It is not difficult to compute~$\mathfrak S^n$ explicitly in terms of the monodromy matrix~$Q$: \begin{Cor} \label{CgS} For $f \in C^n(A, A) = \Hom_K(A^{\otimes n}, A)$ and $a_1, \dots, a_n \in A$, we have \begin{align*} &\mathfrak S^n(f)(a_1 \otimes \dots \otimes a_n) = \rho \left(S(a_{n(2)}) \dots S(a_{1(2)}) f(a_{1(3)} \otimes \dots \otimes a_{n(3)}) Q_1 \right) \mspace{1mu} a_{1(1)} \dots a_{n(1)} S(Q_2). \end{align*} \end{Cor} \begin{proof} We have seen in Section~\ref{Sec:ActCent} that $\mathfrak S(a) = \rho(aQ_1) S(Q_2)$, so that we get \begin{align*} \mathfrak S^n(f)(a_1 \otimes \dots \otimes a_n) &= (\Omega^n \circ \mathfrak S_* \circ (\Omega^n)^{-1})(f)(a_1 \otimes \dots \otimes a_n) \\ &= a_{1(1)} \dots a_{n(1)} \mathfrak S((\Omega^n)^{-1}(f)(a_{1(2)} \otimes \dots \otimes a_{n(2)})) \\ &= a_{1(1)} \dots a_{n(1)} \mathfrak S(S(a_{n(2)}) \dots S(a_{1(2)}) f(a_{1(3)}\otimes\dots\otimes a_{n(3)})) \\ &= \rho \left(S(a_{n(2)}) \dots S(a_{1(2)}) f(a_{1(3)} \otimes \dots \otimes a_{n(3)}) Q_1\right) \mspace{1mu} a_{1(1)} \dots a_{n(1)} S(Q_2) \end{align*} from the preceding lemma. \end{proof} For the second generator~$\t$ of the modular group, we also proceed as in Section~\ref{Sec:ActCent} and let it act on the cochain groups by multiplication with the ribbon element~$v$: \begin{Definition} We define $\mathfrak T^n \colon C^n(A, A) \to C^n(A, A)$ as \[\mathfrak T^n(f)(a_1 \otimes \dots \otimes a_n) := v f(a_1 \otimes \dots \otimes a_n)\] for $f \in C^n(A, A) = \Hom_K(A^{\otimes n}, A)$. In other words, using the map~$\mathfrak T$ introduced in Section~\ref{Sec:ActCent}, we set $\mathfrak T^n:=\mathfrak T_*$, the composition with~$\mathfrak T$ on the left. \end{Definition} Because~$v$ is central, the maps~$\mathfrak T^n$ commute with the differentials~$d^n$ and therefore constitute the components of a cochain map. The centrality of~$v$ also implies that the diagram \begin{center} \begin{tikzcd} {} C^n(A,\prescript{}{\varepsilon}{A}_{\ad}) \arrow{d}{\mathfrak T_*} \arrow{r}{\Omega^n} & C^n(A, A) \arrow{d}{\mathfrak T^n} \\ C^n(A,\prescript{}{\varepsilon}{A}_{\ad}) \arrow{r}{\Omega^n} & C^n(A, A) \end{tikzcd} \end{center} is commutative. Here, it is understood that~$\mathfrak T_*$ is also given on~$C^n(A,\prescript{}{\varepsilon}A_{\ad})$ by multiplication with~$v$, and not via the left or right action of~$v$ on~$\prescript{}{\varepsilon}A_{\ad}$. The key result that relates these maps to the modular group is the following theorem: \begin{Theorem} \label{sts}~ \begin{thmlist} \item We have $\mathfrak S^n \circ \mathfrak T^n \circ \mathfrak S^n = \rho(v) \; (\mathfrak T^n)^{-1} \circ \mathfrak S^n \circ (\mathfrak T^n)^{-1}$. \item The cochain maps with components $(\mathfrak S^n)^4$ and $((\rho \otimes \rho)(Q))^2 \, \id_{C^n(A,A)}$ are homotopic. \end{thmlist} \end{Theorem} \smallskip \begin{proof} As recalled in Proposition~\ref{ModRel}, we have $\mathfrak S \circ \mathfrak T \circ \mathfrak S = \rho(v) \; \mathfrak T^{-1} \circ \mathfrak S \circ \mathfrak T^{-1}$. Combining the commutativity of the preceding diagram with Lemma~\ref{LgS}, we therefore get \begin{align*} \mathfrak S^n \circ \mathfrak T^n \circ \mathfrak S^n \circ \Omega^n &= \Omega^n \circ \mathfrak S_* \circ \mathfrak T_* \circ \mathfrak S_* = \Omega^n \circ (\mathfrak S \circ \mathfrak T \circ \mathfrak S)_* \\ &= \rho(v) \, \Omega^n \circ (\mathfrak T^{-1} \circ \mathfrak S \circ \mathfrak T^{-1})_* = \rho(v) \, \Omega^n \circ \mathfrak T^{-1}_* \circ \mathfrak S_* \circ \mathfrak T^{-1}_*\\ &=\rho(v) \, (\mathfrak T^n)^{-1}\circ\mathfrak S^n\circ(\mathfrak T^n)^{-1} \circ \Omega^n. \end{align*} Because~$\Omega^n$ is bijective, this proves our first assertion. To prove the second assertion, it suffices to show that the cochain maps with components $(\Omega^n)^{-1} \circ (\mathfrak S^n)^4 \circ \Omega^n$ and $((\rho \otimes \rho)(Q))^2 \, \id_{C^n(A,\prescript{}{\varepsilon}A_{\ad})}$ are homotopic, because~$(\Omega^n)$ is an isomorphism of cochain complexes. By Lemma~\ref{LgS}, we have $(\Omega^n)^{-1} \circ (\mathfrak S^n)^4 \circ \Omega^n = (\mathfrak S^4)_*$, and we also have $\mathfrak S^2 = (\rho \otimes \rho)(Q) \, \underline{S}^{-1}$ by Proposition~\ref{ModRel}. Therefore our second assertion will hold if we can show that the cochain map $(\underline{S}^{-2})_*$ is homotopic to the identity on the cochain complex~$C(A,\prescript{}{\varepsilon}A_{\ad})$, or equivalently that the cochain map $(\underline{S}^2)_*$ is homotopic to the identity. We know from Lemma~\ref{SqRib} that~$\underline{S}^2(a) = \ad(a \otimes v)$ for all~$a \in A$. Because by definition the right action on the bimodule $M := \prescript{}{\varepsilon}A_{\ad}$ is given by the right adjoint action, this means in the notation of Proposition~\ref{LeftRight} that $(\underline{S}^2)_* = (r_v^M)_*$. Now Proposition~\ref{LeftRight} states that~$(r_v^M)_*$ is homotopic to~$(l_v^M)_*$. But~$(l_v^M)_*$ is the identity: For $f \in C^n(A,M) = \Hom_K(A^{\otimes n},\prescript{}{\varepsilon}A_{\ad})$ and $a_1, \dots, a_n \in A$, we have \begin{align*} (l_v^M)_*(f)(a_1 \otimes \dots \otimes a_n) &= v.f(a_1\otimes\dots\otimes a_n) = \varepsilon(v) f(a_1 \otimes \dots \otimes a_n) = f(a_1 \otimes \dots \otimes a_n) \end{align*} because $\varepsilon(v) = 1$. \end{proof} As a consequence, we can generalize the projective action of the modular group on the center~$Z(A)$ obtained in Corollary~\ref{ProjRepCent}, which is by Example~\ref{Zero} equal to~$HH^0(A, A)$, to an arbitrary Hochschild cohomology group~$HH^n(A, A)$. For this, we denote the automorphisms of~$HH^n(A, A)$ induced by the cochain maps~$(\mathfrak S^n)$ and~$(\mathfrak T^n)$ by~$\overline{\mathfrak S^n}$ and~$\overline{\mathfrak T^n}$, respectively, and by~$P(\overline{\mathfrak S^n})$ and~$P(\overline{\mathfrak T^n})$ we denote the corresponding automorphisms of the projective space~$P(HH^n(A, A))$. We then have the following generalization of Corollary~\ref{ProjRepCent}: \begin{Cor} \label{ActHochCohom} There is a unique homomorphism from $\SL(2,\Z)$ to $\PGL(HH^n(A, A))$ that maps~$\mathfrak s$ to~$P(\overline{\mathfrak S^n})$ and~$\t$ to~$P(\overline{\mathfrak T^n})$. \end{Cor} Exactly as in the analogous discussion at the end of Section~\ref{Sec:ActCent}, this representation of the modular group is linear, and not only projective, if the unique ribbon-normalized right integral~$\rho$ satisfies~$\rho(v^{-1}) = \pm 1$, or equivalently $(\rho \otimes \rho)(Q) = \pm 1$.
\section{Introduction} Many domains are constrained by data availability. This includes domains, such as YouTube recommendations, which ostensibly have a large amount of data, but which have a long tail of instances that each have only a handful of data points. This also includes domains for which humans require several orders of magnitude less training data than state-of-the-art approaches, such as motor manipulation, playing Atari, and understanding low-frequency words. The {\em No Free Lunch Theorem} \cite{wolpert1997no} suggests that a domain prior is needed to offset sample complexity for these cases. For domains such as images and audio, {\em convolutions} are commonly used as one such prior. In our view, convolutions allow for {\em in-domain} transfer by sharing weights among otherwise weakly-connected areas of the domain, effectively multiplying the number of samples. For example, if a convolutional layer takes a 28 by 28 MNIST image and uses filters of size 5x5 with stride 2, this gives 144 5x5 windows per image, which means that for every image, we have 144 training points for the filter, which effectively decreases our sample complexity by 144 times for this filter. The convolutions allow us to internally transfer information from the top-left 5x5 window to the bottom-right 5x5 window (and to the other 142 windows). However, there are domains where the structure might not be known beforehand, such as robot joint angle trajectories or car traffic speed sensor data. The question we address in this paper is {\em for domains where we aren't given the structure a priori, is there a weaker prior that will both allow a system to learn a structure and leverage the learned structure to still have a net decrease in sample complexity over a baseline without the prior?} We present a simple probability density estimation problem and examine how three priors affect sample complexity. We show, at least for one simple domain, the structure can be recovered merely given the prior that there {\em is} a repeated structure, with the number of filters and size of windows. Using this prior, we show how a system may automatically transfer from parts of the domain where samples are relatively plentiful to parts where samples are more rare. \section{The Four Urns Problem} To help illustrate how a simple prior might help reduce sample complexity, consider the setup where we are given four urns $U_1, U_2, U_3, U_4$, each filled with balls of eight different colors $c_1 \cdots c_8$. We are given samples drawn from the urns with replacement, and we assume that the urns are independent of each other. In this setup, we are given samples from the urns one at a time. We do not get to choose which urn we sample, but we are told which urn was sampled. For example, we might get a sequence $\l<\l(U_1, c_5\r), \l(U_2, c_3\r), \l(U_1, c_7\r)\r>$. Our samples aren't uniform among the four urns: we sample $U_1$ with probability .025, while $U_2, U_3,$ and $U_4$ are each sampled with probability .325. Our goal is to model the urns' distributions, minimizing the KL divergence $D_{KL}\l(P||Q\r)$ from the estimated distribution $Q_i = Q\l(c_j|U_i\r)$ to the unseen true distribution $P_i = P\l(c_j|U_i\r)$. If we assume a uniform prior for each urn's distribution, we can't do better than tallying the outcomes and taking the the expected values from a Dirichlet distribution. In this case, it takes thousands of samples to get a strong estimate for the distribution of Urn 1 because it's sampled so infrequently, as shown in Figure ~\ref{fig:foururnsSplit}. If we are given prior knowledge that there are actually only two distributions instead of four, then our sample complexity can be cut significantly. That is, while draws from each of the four urns are still independent of the other urns, we are told that each urn was filled will balls sampled from one of two much larger urns, though we aren't told the distributions of the balls in the larger urns, nor with which of the larger urns each of the four urns is filled. Formally, we assume larger urns $a$ and $b$ such that $\forall_{i \in \l\{1,2,3,4\r\}} P_i \in \l\{P_a, P_b\r\}$. In this case, we use EM to alternatively update our estimates of the classification of the distributions, then use these classification probabilities to update the estimates of the underlying distributions. Specifically, we estimate the probability that each distribution is drawn from $a$ or $b$, $\forall_{i \in \l\{1,2,3,4\r\}, j \in \l\{a, b\r\}} P\l(P_i = P_j | D, Q_a, Q_b\r)$, where $D$ is the data seen thus far, then use these estimates to compute new estimates for $Q_a$ and $Q_b$. We then use these values for $Q_a, Q_b$ to update the classification probabilities $P\l(P_i = P_j | D, Q_a, Q_b\r)$, and so on until convergence. We show the results of this process in Figures ~\ref{fig:dag}, plotting $D_{KL}\l(P||Q\r)$ as a function of number of samples for estimates $Q$ for a single run. In Figure ~\ref{fig:foururns1}, we see a significantly faster convergence for the case where we make use of our priors over the ``raw'' or uniform prior. We break this down into the error for the estimates for the four urns in Figure ~\ref{fig:foururnsSplit}, where we see two sources for this difference in the estimates. The first source is that the model quickly concludes (correctly) that Urns 4 and 2 have identical distributions. Thus, it uses samples from Urn 4 to inform the probability distribution of Urn 2 and vice versa. In effect, it doubles its samples for these urns, halving the number of samples needed to create its probability estimates for them. The other source of difference is the model's estimate for the probabilities of the rarely seen Urn 1. Of the first 1000 samples, only 16 are from Urn 1. With 8 different ball colors, the uninformed estimate is nowhere near convergence, having seen an average of only two samples per color. Conversely, after only two samples, our system correctly concludes that Urns 1 and 3 are drawn from the same distribution and ``transfers'' its knowledge about Urn 3 to Urn 1. Note that the ``knowledge transfer'' goes both ways: our green line for Urn 3 dips slightly below the red line. This is because once our system concludes that Urns 1 and 3 have identical distributions, it adds the paltry samples from Urn 1 to the tallies for the distribution shared by both urns. Another interpretation is that the system is primarily creating its model of the probability distribution with samples from Urn 3, whereas it uses the few samples from Urn 1 to {\em classify} Urn 1 as the same type as Urn 3. An analogy might be made to the scenario where knowing that ``Donald is a duck'' tells us much about Donald, but it also informs us a little of what it means to be a duck. Finally, note that the averaged error for ``Ours'' in Figure ~\ref{fig:foururns1} briefly increases before decreasing. Some insight might be gained to explain this by looking at the breakdowns in Figure ~\ref{fig:foururnsSplit}. We suspect that our model initially erroneously assigns Urn 3 to be the same distribution as Urns 2 and 4, thus negatively transferring their tallies to Urn 3 for about 30 samples. \begin{figure*}[ht] \centering{ \subfigure{(a) \includegraphics[width=65mm]{xfer01-1000-crop.pdf} \label{fig:foururns1}} \hspace{10mm} \subfigure{(b) \includegraphics[width=65mm]{xfer02-1000-crop.png} \label{fig:foururnsSplit}}} \caption{Error vs samples seen. \subref{fig:foururns1} The total error for estimates of the four urns for a single run (solid lines) and averaged over 1000 runs (light-colored lines). \subref{fig:foururnsSplit} The breakdown of the KL-error over the estimates for the four urns using just the raw tallies and using the prior that there are only two types of distributions. Individual samples for Urn 1 are shown by markers at each sample.} \label{fig:dag} \end{figure*} \section{Weaker Priors} In this section, we give a simple example of how we might generalize these priors to domains in which we must simultaneously learn the structure and the probability distributions. We present a vastly simplified version of searching for convolutional structure in images. Conceptually, we would like to discover ``convolutions'' in images without prior knowledge of which pixels (or vector indices) are next to which, or even that we're dealing with 2D grid, but just given the prior knowledge that there is repeated structure. In real images, we might be given real-valued vectors of size 3,072. We grossly simplify this to bit-vectors of size 12 to see if we can discover the repeated structure for this case. We are given one bit-vector at a time, and we can no longer assume independence among the elements of the bit vectors. As in the previous task, our task is to model the 12-way joint distribution. If we assume a uniform distribution for each outcome, then without other priors, the best we can do is model the outcomes as a Dirichlet distribution, with one bin for each of the $2^{12}$ possible outcomes. We consider the reduction in sample complexity given by the following priors: \begin{enumerate}[noitemsep,topsep=-\parskip] \item That the 12 variables form 4 independent distributions, each of 3 variables (though we are not told what the groups are). \item That the 4 distributions are of only 2 types. (This is the same as the prior in the previous section, with the exception that we are no longer given the groupings of the variables beforehand.) \item We are given which of the 12 variables form the 4 groups, and the variables' order within the group. This is equivalent to being told which of the 8 colors a ball is, and from which urn. With this knowledge, a vector of length 12 is equivalent to a sample from each of the four urns. For example, if each sample consists of Boolean variables $\l\{V_1, \cdots, V_{12}\r\}$, this prior will break these into 4 ordered triples such as $\l(V_5, V_1, V_{11}\r)$, $\l(V_2, V_8, V_{11}\r)$, $\l(V_4, V_7, V_{3}\r)$, $\l(V_{10}, V_6, V_9\r)$. So if $V_5=1$, $V_1=1$, and $V_{11}=0$, this is equivalent to Urn 1 being color 6 or (1, 1, 0). \end{enumerate} \vspace{\parskip} With these priors, we have the following cases, the plots of which are shown in Figure \ref{fig:weaker}: \begin{description}[noitemsep,topsep=-\parskip] \item[Case 0] We assume (incorrectly) that the 12 elements of the bit-vector are independent of each other. Here, we model each variable using a beta distribution with a uniform prior. This model converges quickly, and plateaus after about 100 vectors, but is not expressive enough to represent the true distribution. \item[Case 0'] We assume a uniform prior over each of the $2^{12}$ outcomes. This model will eventually converge to the correct distribution, but takes many more than 200 samples to do so. \item[Case 1,3] We assume priors 1 and 3 (we know that there are four distributions and we are told which variables comprise each distribution). This is equivalent to the ``Raw tallies'' plot in Figure \ref{fig:foururns1}, except that we sample all four urns at every timestep. \item[Case 1,2,3] We assume all three priors. This is equivalent to ``ours'' in Figure \ref{fig:foururns1} except that we sample all four urns at every timestep. \item[Case 1] We assume prior 1, that there are 4 independent distributions of 3 variables, but we don't know which variables comprise each distribution. \item[Case 1,2] This is is the most interesting case for our purposes. We assume that there are four distributions (each of 3 variables), and that these four distributions are really only of two distinct types, though we're not told which variables are grouped together. \end{description} \vspace{\parskip} For Case 1,2 and Case 1, we do an exhaustive search over the possible groupings of the variables and compute the most likely ordering, using similar techniques to the previous section. For example, one grouping of the 12 indices might be $(V_1, V_3, V_2)$, $(V_5, V_{12}, V_4)$, $(V_7, V_{11}, V_6)$, and $(V_{10}, V_9, V_8)$. Given a grouping, the problem is equivalent to The Four Urns problem. E.g., using the grouping above, if $(1, 1, 0)$ is color 6, and $V_{10}, V_9,$, and $V_8$ are 1, 1, and 0, respectively, this would be equivalent to drawing a ball of color 6 from Urn 4. Given a grouping, we can explore the different assignments. Since there are only 2 latent variables $a$ and $b$, each of the 4 distribution gets assigned to exactly one of the latent variables (a or b). E.g., we may say that ``Urn'' $(V_{10}, V_9, V_8)$ is assigned as coming from either distribution $a$ or $b$. This technique of searching all possible groupings is clearly intractable, taking exponential time in the length of the vectors, but is feasible for our tiny vectors. More explicitly, given data $D_{1, \cdots, t}$, where $D_i \in \l\{0,1\r\}^{12}$, we search over each permutation $perm$ of the ordered set $(1,\cdots, 12)$, and each possible group assignment function $A(x) \rightarrow \l\{a,b\r\}$ to maximize $P\l(A, perm|D\r)$ using equations \ref{eqn:eq1} and \ref{eqn:eq2}. (Taking into account symmetries, we can reduce the number of permutation and assignment pairs from $2^4 \cdot 12!$ to $\frac}\def\l{\left}\def\r{\right{2^4 \cdot 12!}{2 \cdot 3!3!} = 106,444,800$.) Let $D_i^p$ be the result of applying the permutation $perm$ to $D_i$, and for $j \in \l\{1,2,3,4\r\}$ let $D^{p,j}_i$ be the $3j$ to $3\l(j+1\r)$ elements of $D^{p,j}_i$. If we assume an even prior of all permutations and assignments, we get: \begin{equation} \begin{split} & P\l(perm, A|D\r) \propto P\l(D|perm, A\r) = P\l(D^p| A\r) = \\ & \prod_{i, j} P\l(D^{p,j}_i| A_j\r) \approx \prod_{i, j} Q\l(D^{p,j}_i| A_j\r) = \prod_{i, j} Q_{A_j}\l(D^{p,j}_i\r) \end{split} \label{eqn:eq1} \end{equation} Here we compute the estimated probability $Q_{A_j}$ using a Dirichlet distribution with $2^3$ outcomes with tallies from our observations. Since there are only two actual distributions, we sum our tallies for instances that have the same assignment (where $\delta\l(x,y\r) = 1$ if $x = y$ else 0). \begin{equation} \label{eqn:eq2} Q_{A_j}\l(D^{p,j}_i\r) = \frac}\def\l{\left}\def\r{\right{1 + \sum_{k,l} \delta\l(D^{p,l}_k, D^{p,j}_i\r)\delta\l(A_l, A_i\r)}{2^3 + 4\l|D\r|} \end{equation} \begin{figure}[ht] \centering{ \subfigure{(a) \includegraphics[width=65mm]{weaker.png} \label{fig:weaker}} \hspace{10mm} \subfigure{(b) \includegraphics[width=65mm]{weakerSmooth.png} \label{fig:weaker2}}} \caption{Error vs.\ sample complexity for different priors. \subref{fig:weaker} A single run showing that Cases 1, and 1,2 converge to Case 1,3 and 1,2,3, respectively. \subref{fig:weaker2} The average over 100 runs for all but Case 1,2, which takes a week on 40 cores for a single run!} \label{fig:dagyo2} \end{figure} As indicated in Figure \ref{fig:weaker}, this search takes about 125 vector samples to converge on the correct grouping, and then follows the same patterns as the curves in Figure \ref{fig:foururns1}. This shows that, at least in this case, sample complexity can be reduced using only the first two priors. Figure \ref{fig:weaker2} shows averages over 100 runs. \section{Related Work} The Four Urns Problem can be framed as a constrained instance of latent Dirichlet allocation (LDA) \cite{blei2003latent}, where there are two latent classes and each ``document'' or urn is a ``mixture'' of exactly one latent class. To our knowledge, this special case isn't directly addressed in the topic analysis literature, because the latent classes are not allowed to mix. It is more difficult to phrase the 12-bit vector problem as an instance of topic analysis, because we are not given the documents/urns, but only parts of documents and we must deduce how to put them together. There is also some overlap between our setup and contextual bandits \cite{dudik2011efficient, zhou2016latent} in that both systems are motivated to make estimates of the processes true distributions efficiently in terms of number of samples. Our system differs in that its utility is directly tied to the accuracy of its estimate (instead of the payoffs of bandits) and in that it has no choice about which observation it will see next. The main motivation for this work came from transfer learning \cite{pan2010survey, taylor2016lifelong, rusu2016progressive}, continual learning \cite{ring:1994, pickett2016growing, kirkpatrick2017overcoming}, lifelong learning \cite{ruvolo2013ella, ammar2015autonomous}, learning to learn \cite{thrun2012learning, andrychowicz2016learning}, and multitask learning \cite{luong2015multi}, which all share the idea that knowledge learned from one area can be leveraged to learn from another area with fewer samples. This paper contributes to these areas by investigating a simple case and offering the insight that {\em a system can transfer knowledge between areas if it has some estimate of its respective certainty about those areas}. \section{Conclusions and Future Work} We have shown an example where a few assumptions will allow a decrease in sample complexity. This can be thought of as a simple example of in-domain transfer (e.g., transferring knowledge between Urns 1 and 3). We hypothesize that to transfer knowledge, one needs to have some measure of certainty of our parameters, something that Bayesian approaches handle naturally. This measure can also be more implicit, such as by freezing weights that have been trained until convergence \cite{rusu2016progressive}. This work is a preliminary exploration that this can be done. There are two main directions we'd like to explore in future research. The first is generalizing Priors 1 and 2. We conjecture that both of these can be wrapped into a description length prior, where it is cheaper to inherit from existing models of distributions than to create a new distribution from scratch. This would allow our model to search over both the number of distributions and distribution {\em types}. The second direction is to find heuristics to make the search for structure tractable. \clearpage \bibliographystyle{icml2017} \section{Electronic Submission} \label{submission} Submission to ICML 2017 will be entirely electronic, via a web site (not email). Information about the submission process and \LaTeX\ templates are available on the conference web site at: \begin{center} \textbf{\texttt{http://icml.cc/2017/}} \end{center} Send questions about submission and electronic templates to \texttt{<EMAIL>}. The guidelines below will be enforced for initial submissions and camera-ready copies. Here is a brief summary: \begin{itemize} \item Submissions must be in PDF. \item The maximum paper length is \textbf{8 pages excluding references and acknowledgements, and 10 pages including references and acknowledgements} (pages 9 and 10 must contain only references and acknowledgements). \item Do \textbf{not include author information or acknowledgements} in your initial submission. \item Your paper should be in \textbf{10 point Times font}. \item Make sure your PDF file only uses Type-1 fonts. \item Place figure captions {\em under} the figure (and omit titles from inside the graphic file itself). Place table captions {\em over} the table. \item References must include page numbers whenever possible and be as complete as possible. Place multiple citations in chronological order. \item Do not alter the style template; in particular, do not compress the paper format by reducing the vertical spaces. \item Keep your abstract brief and self-contained, one paragraph and roughly 4--6 sentences. Gross violations will require correction at the camera-ready phase. Title should have content words capitalized. \end{itemize} \subsection{Submitting Papers} {\bf Paper Deadline:} The deadline for paper submission to ICML 2017 is at \textbf{23:59 Universal Time (3:59 p.m.\ Pacific Standard Time) on February 24, 2017}. If your full submission does not reach us by this time, it will not be considered for publication. There is no separate abstract submission. {\bf Anonymous Submission:} To facilitate blind review, no identifying author information should appear on the title page or in the paper itself. Section~\ref{author info} will explain the details of how to format this. {\bf Simultaneous Submission:} ICML will not accept any paper which, at the time of submission, is under review for another conference or has already been published. This policy also applies to papers that overlap substantially in technical content with conference papers under review or previously published. ICML submissions must not be submitted to other conferences during ICML's review period. Authors may submit to ICML substantially different versions of journal papers that are currently under review by the journal, but not yet accepted at the time of submission. Informal publications, such as technical reports or papers in workshop proceedings which do not appear in print, do not fall under these restrictions. \medskip To ensure our ability to print submissions, authors must provide their manuscripts in \textbf{PDF} format. Furthermore, please make sure that files contain only Type-1 fonts (e.g.,~using the program {\tt pdffonts} in linux or using File/DocumentProperties/Fonts in Acrobat). Other fonts (like Type-3) might come from graphics files imported into the document. Authors using \textbf{Word} must convert their document to PDF. Most of the latest versions of Word have the facility to do this automatically. Submissions will not be accepted in Word format or any format other than PDF. Really. We're not joking. Don't send Word. Those who use \textbf{\LaTeX} to format their accepted papers need to pay close attention to the typefaces used. Specifically, when producing the PDF by first converting the dvi output of \LaTeX\ to Postscript the default behavior is to use non-scalable Type-3 PostScript bitmap fonts to represent the standard \LaTeX\ fonts. The resulting document is difficult to read in electronic form; the type appears fuzzy. To avoid this problem, dvips must be instructed to use an alternative font map. This can be achieved with the following two commands: {\footnotesize \begin{verbatim} dvips -Ppdf -tletter -G0 -o paper.ps paper.dvi ps2pdf paper.ps \end{verbatim}} Note that it is a zero following the ``-G''. This tells dvips to use the config.pdf file (and this file refers to a better font mapping). A better alternative is to use the \textbf{pdflatex} program instead of straight \LaTeX. This program avoids the Type-3 font problem, however you must ensure that all of the fonts are embedded (use {\tt pdffonts}). If they are not, you need to configure pdflatex to use a font map file that specifies that the fonts be embedded. Also you should ensure that images are not downsampled or otherwise compressed in a lossy way. Note that the 2017 style files use the {\tt hyperref} package to make clickable links in documents. If this causes problems for you, add {\tt nohyperref} as one of the options to the {\tt icml2017} usepackage statement. \subsection{Reacting to Reviews} We will continue the ICML tradition in which the authors are given the option of providing a short reaction to the initial reviews. These reactions will be taken into account in the discussion among the reviewers and area chairs. \subsection{Submitting Final Camera-Ready Copy} The final versions of papers accepted for publication should follow the same format and naming convention as initial submissions, except of course that the normal author information (names and affiliations) should be given. See Section~\ref{final author} for details of how to format this. The footnote, ``Preliminary work. Under review by the International Conference on Machine Learning (ICML). Do not distribute.'' must be modified to ``\textit{Proceedings of the $\mathit{34}^{th}$ International Conference on Machine Learning}, Sydney, Australia, PMLR 70, 2017. Copyright 2017 by the author(s).'' For those using the \textbf{\LaTeX} style file, this change (and others) is handled automatically by simply changing $\mathtt{\backslash usepackage\{icml2017\}}$ to $$\mathtt{\backslash usepackage[accepted]\{icml2017\}}$$ Authors using \textbf{Word} must edit the footnote on the first page of the document themselves. Camera-ready copies should have the title of the paper as running head on each page except the first one. The running title consists of a single line centered above a horizontal rule which is $1$ point thick. The running head should be centered, bold and in $9$ point type. The rule should be $10$ points above the main text. For those using the \textbf{\LaTeX} style file, the original title is automatically set as running head using the {\tt fancyhdr} package which is included in the ICML 2017 style file package. In case that the original title exceeds the size restrictions, a shorter form can be supplied by using \verb|\icmltitlerunning{...}| just before $\mathtt{\backslash begin\{document\}}$. Authors using \textbf{Word} must edit the header of the document themselves. \section{Format of the Paper} All submissions must follow the same format to ensure the printer can reproduce them without problems and to let readers more easily find the information that they desire. \subsection{Length and Dimensions} Papers must not exceed eight (8) pages, including all figures, tables, and appendices, but excluding references and acknowledgements. When references and acknowledgements are included, the paper must not exceed ten (10) pages. Acknowledgements should be limited to grants and people who contributed to the paper. Any submission that exceeds this page limit or that diverges significantly from the format specified herein will be rejected without review. The text of the paper should be formatted in two columns, with an overall width of 6.75 inches, height of 9.0 inches, and 0.25 inches between the columns. The left margin should be 0.75 inches and the top margin 1.0 inch (2.54~cm). The right and bottom margins will depend on whether you print on US letter or A4 paper, but all final versions must be produced for US letter size. The paper body should be set in 10~point type with a vertical spacing of 11~points. Please use Times typeface throughout the text. \subsection{Title} The paper title should be set in 14~point bold type and centered between two horizontal rules that are 1~point thick, with 1.0~inch between the top rule and the top edge of the page. Capitalize the first letter of content words and put the rest of the title in lower case. \subsection{Author Information for Submission} \label{author info} To facilitate blind review, author information must not appear. If you are using \LaTeX\/ and the \texttt{icml2017.sty} file, you may use \verb+\icmlauthor{...}+ to specify authors and \verb+\icmlaffiliation{...}+ to specify affiliations. (Read the TeX code used to produce this document for an example usage.) The author information will not be printed unless {\tt accepted} is passed as an argument to the style file. (Again, see the TeX code used to produce this PDF.) Submissions that include the author information will not be reviewed. \subsubsection{Self-Citations} If your are citing published papers for which you are an author, refer to yourself in the third person. In particular, do not use phrases that reveal your identity (e.g., ``in previous work \cite{langley00}, we have shown \ldots''). Do not anonymize citations in the reference section by removing or blacking out author names. The only exception are manuscripts that are not yet published (e.g. under submission). If you choose to refer to such unpublished manuscripts \cite{anonymous}, anonymized copies have to be submitted as Supplementary Material via CMT. However, keep in mind that an ICML paper should be self contained and should contain sufficient detail for the reviewers to evaluate the work. In particular, reviewers are not required to look a the Supplementary Material when writing their review. \subsubsection{Camera-Ready Author Information} \label{final author} If a paper is accepted, a final camera-ready copy must be prepared. For camera-ready papers, author information should start 0.3~inches below the bottom rule surrounding the title. The authors' names should appear in 10~point bold type, in a row, separated by white space, and centered. Author names should not be broken across lines. Unbolded superscripted numbers, starting 1, should be used to refer to affiliations. Affiliations should be numbered in the order of appearance. A single footnote block of text should be used to list all the affiliations. (Academic affiliations should list Department, University, City, State/Region, Country. Similarly for industrial affiliations.) Each distinct affiliations should be listed once. If an author has multiple affiliations, multiple superscripts should be placed after the name, separated by thin spaces. If the authors would like to highlight equal contribution by multiple first authors, those authors should have an asterisk placed after their name in superscript, and the term ``\textsuperscript{*}Equal contribution" should be placed in the footnote block ahead of the list of affiliations. A list of corresponding authors and their emails (in the format Full Name \textless{}[email protected]\textgreater{}) can follow the list of affiliations. Ideally only one or two names should be listed. A sample file (in PDF) with author names is included in the ICML2017 style file package. Turn on the \texttt{[accepted]} option to the ICML stylefile to see the names rendered. All of the guidelines above are automatically met by the \LaTeX\ style file. \subsection{Abstract} The paper abstract should begin in the left column, 0.4~inches below the final address. The heading `Abstract' should be centered, bold, and in 11~point type. The abstract body should use 10~point type, with a vertical spacing of 11~points, and should be indented 0.25~inches more than normal on left-hand and right-hand margins. Insert 0.4~inches of blank space after the body. Keep your abstract brief and self-contained, limiting it to one paragraph and roughly 4--6 sentences. Gross violations will require correction at the camera-ready phase. \subsection{Partitioning the Text} You should organize your paper into sections and paragraphs to help readers place a structure on the material and understand its contributions. \subsubsection{Sections and Subsections} Section headings should be numbered, flush left, and set in 11~pt bold type with the content words capitalized. Leave 0.25~inches of space before the heading and 0.15~inches after the heading. Similarly, subsection headings should be numbered, flush left, and set in 10~pt bold type with the content words capitalized. Leave 0.2~inches of space before the heading and 0.13~inches afterward. Finally, subsubsection headings should be numbered, flush left, and set in 10~pt small caps with the content words capitalized. Leave 0.18~inches of space before the heading and 0.1~inches after the heading. Please use no more than three levels of headings. \subsubsection{Paragraphs and Footnotes} Within each section or subsection, you should further partition the paper into paragraphs. Do not indent the first line of a given paragraph, but insert a blank line between succeeding ones. You can use footnotes\footnote{For the sake of readability, footnotes should be complete sentences.} to provide readers with additional information about a topic without interrupting the flow of the paper. Indicate footnotes with a number in the text where the point is most relevant. Place the footnote in 9~point type at the bottom of the column in which it appears. Precede the first footnote in a column with a horizontal rule of 0.8~inches.\footnote{Multiple footnotes can appear in each column, in the same order as they appear in the text, but spread them across columns and pages if possible.} \begin{figure}[ht] \vskip 0.2in \begin{center} \centerline{\includegraphics[width=\columnwidth]{icml_numpapers}} \caption{Historical locations and number of accepted papers for International Machine Learning Conferences (ICML 1993 -- ICML 2008) and International Workshops on Machine Learning (ML 1988 -- ML 1992). At the time this figure was produced, the number of accepted papers for ICML 2008 was unknown and instead estimated.} \label{icml-historical} \end{center} \vskip -0.2in \end{figure} \subsection{Figures} You may want to include figures in the paper to help readers visualize your approach and your results. Such artwork should be centered, legible, and separated from the text. Lines should be dark and at least 0.5~points thick for purposes of reproduction, and text should not appear on a gray background. Label all distinct components of each figure. If the figure takes the form of a graph, then give a name for each axis and include a legend that briefly describes each curve. Do not include a title inside the figure; instead, the caption should serve this function. Number figures sequentially, placing the figure number and caption {\it after\/} the graphics, with at least 0.1~inches of space before the caption and 0.1~inches after it, as in Figure~\ref{icml-historical}. The figure caption should be set in 9~point type and centered unless it runs two or more lines, in which case it should be flush left. You may float figures to the top or bottom of a column, and you may set wide figures across both columns (use the environment {\tt figure*} in \LaTeX), but always place two-column figures at the top or bottom of the page. \subsection{Algorithms} If you are using \LaTeX, please use the ``algorithm'' and ``algorithmic'' environments to format pseudocode. These require the corresponding stylefiles, algorithm.sty and algorithmic.sty, which are supplied with this package. Algorithm~\ref{alg:example} shows an example. \begin{algorithm}[tb] \caption{Bubble Sort} \label{alg:example} \begin{algorithmic} \STATE {\bfseries Input:} data $x_i$, size $m$ \REPEAT \STATE Initialize $noChange = true$. \FOR{$i=1$ {\bfseries to} $m-1$} \IF{$x_i > x_{i+1}$} \STATE Swap $x_i$ and $x_{i+1}$ \STATE $noChange = false$ \ENDIF \ENDFOR \UNTIL{$noChange$ is $true$} \end{algorithmic} \end{algorithm} \subsection{Tables} You may also want to include tables that summarize material. Like figures, these should be centered, legible, and numbered consecutively. However, place the title {\it above\/} the table with at least 0.1~inches of space before the title and the same after it, as in Table~\ref{sample-table}. The table title should be set in 9~point type and centered unless it runs two or more lines, in which case it should be flush left. \begin{table}[t] \caption{Classification accuracies for naive Bayes and flexible Bayes on various data sets.} \label{sample-table} \vskip 0.15in \begin{center} \begin{small} \begin{sc} \begin{tabular}{lcccr} \hline \abovespace\belowspace Data set & Naive & Flexible & Better? \\ \hline \abovespace Breast & 95.9$\pm$ 0.2& 96.7$\pm$ 0.2& $\surd$ \\ Cleveland & 83.3$\pm$ 0.6& 80.0$\pm$ 0.6& $\times$\\ Glass2 & 61.9$\pm$ 1.4& 83.8$\pm$ 0.7& $\surd$ \\ Credit & 74.8$\pm$ 0.5& 78.3$\pm$ 0.6& \\ Horse & 73.3$\pm$ 0.9& 69.7$\pm$ 1.0& $\times$\\ Meta & 67.1$\pm$ 0.6& 76.5$\pm$ 0.5& $\surd$ \\ Pima & 75.1$\pm$ 0.6& 73.9$\pm$ 0.5& \\ \belowspace Vehicle & 44.9$\pm$ 0.6& 61.5$\pm$ 0.4& $\surd$ \\ \hline \end{tabular} \end{sc} \end{small} \end{center} \vskip -0.1in \end{table} Tables contain textual material that can be typeset, as contrasted with figures, which contain graphical material that must be drawn. Specify the contents of each row and column in the table's topmost row. Again, you may float tables to a column's top or bottom, and set wide tables across both columns, but place two-column tables at the top or bottom of the page. \subsection{Citations and References} Please use APA reference format regardless of your formatter or word processor. If you rely on the \LaTeX\/ bibliographic facility, use {\tt natbib.sty} and {\tt icml2017.bst} included in the style-file package to obtain this format. Citations within the text should include the authors' last names and year. If the authors' names are included in the sentence, place only the year in parentheses, for example when referencing Arthur Samuel's pioneering work \yrcite{Samuel59}. Otherwise place the entire reference in parentheses with the authors and year separated by a comma \cite{Samuel59}. List multiple references separated by semicolons \cite{kearns89,Samuel59,mitchell80}. Use the `et~al.' construct only for citations with three or more authors or after listing all authors to a publication in an earlier reference \cite{MachineLearningI}. Authors should cite their own work in the third person in the initial version of their paper submitted for blind review. Please refer to Section~\ref{author info} for detailed instructions on how to cite your own papers. Use an unnumbered first-level section heading for the references, and use a hanging indent style, with the first line of the reference flush against the left margin and subsequent lines indented by 10 points. The references at the end of this document give examples for journal articles \cite{Samuel59}, conference publications \cite{langley00}, book chapters \cite{Newell81}, books \cite{DudaHart2nd}, edited volumes \cite{MachineLearningI}, technical reports \cite{mitchell80}, and dissertations \cite{kearns89}. Alphabetize references by the surnames of the first authors, with single author entries preceding multiple author entries. Order references for the same authors by year of publication, with the earliest first. Make sure that each reference includes all relevant information (e.g., page numbers). \subsection{Software and Data} We strongly encourage the publication of software and data with the camera-ready version of the paper whenever appropriate. This can be done by including a URL in the camera-ready copy. However, do not include URLs that reveal your institution or identity in your submission for review. Instead, provide an anonymous URL or upload the material as ``Supplementary Material'' into the CMT reviewing system. Note that reviewers are not required to look a this material when writing their review. \section*{Acknowledgements} \textbf{Do not} include acknowledgements in the initial version of the paper submitted for blind review. If a paper is accepted, the final camera-ready version can (and probably should) include acknowledgements. In this case, please place such acknowledgements in an unnumbered section at the end of the paper. Typically, this will include thanks to reviewers who gave useful comments, to colleagues who contributed to the ideas, and to funding agencies and corporate sponsors that provided financial support. \nocite{langley00}
\section{Introduction} Let $Y \subset \P^3_\mathbb{Q}$ be the quadric surface defined by the equation \begin{equation}\label{eq:Y} X_0^2 + 47 X_1^2 = 103 X_2^2 + (17 \times 47 \times 103) X_3^2. \end{equation} One can easily check that $Y$ is everywhere locally soluble, and so has rational points. Being a quadric surface, $Y$ satisfies weak approximation. In particular, if we fix a prime $p$, then any smooth point on the reduction of $Y$ at $p$ lifts to a rational point of $Y$. Given that a point on the reduction of $Y$ is given by $(\tilde{x}_0, \tilde{x}_1, \tilde{x}_2, \tilde{x}_3) \in \mathbb{F}_p^4$ satisfying~\eqref{eq:Y}, and a point of $Y(\mathbb{Q})$ can be given by coprime integers $(x_0,x_1,x_2,x_3) \in \mathbb{Z}^4$ satisfying~\eqref{eq:Y}, one might be tempted to think that every $\mathbb{F}_p$-solution $(\tilde{x}_0, \tilde{x}_1, \tilde{x}_2, \tilde{x}_3)$ can be lifted to a coprime integer solution $(x_0,x_1,x_2,x_3)$. However, at the end of the article~\cite{Bright:vanishing}, it was remarked that $Y$ has the following interesting feature: if $(\tilde{x}_0, \tilde{x}_1, \tilde{x}_2, \tilde{x}_3)$ is a solution to~\eqref{eq:Y} over $\mathbb{F}_{17}$, then at most half of the non-zero scalar multiples of $(\tilde{x}_0,\tilde{x}_1,\tilde{x}_2,\tilde{x}_3) \in \mathbb{F}_{17}^4$ can be lifted to coprime 4-tuples $(x_0,x_1,x_2,x_3) \in \mathbb{Z}^4$ defining a point of $Y$. That observation was a by-product of the calculation of the Brauer--Manin obstruction to rational points on a diagonal quartic surface related to $Y$. In this note we will interpret the observation as a failure of strong approximation on the punctured affine cone over $Y$, and will show that this failure is itself due to a Brauer--Manin obstruction. The same phenomenon has been observed by Lindqvist~\cite{Lindqvist} in the case of the quadric surface $X_0^2 - pqX_1^2 - X_2X_3$, for $p,q$ odd primes congruent to $1$ modulo $8$. We expect that example also to be explained by a Brauer--Manin obstruction. Following Colliot-Th\'el\`ene and Xu~\cite{CTX:AA-2013}, for a variety $X$ over $\mathbb{Q}$, we define $X(\mathbf{A}_\mathbb{Q})$ to be the set of adelic points of $X$, that is, the restricted product of $X(\mathbb{Q}_v)$ for all places $v$, with respect to the subsets $X(\mathbb{Z}_v)$. (One needs to choose a model of $X$ to make sense of the notation $X(\mathbb{Z}_v)$, but since any two models agree outside a finite set of primes the resulting definition of $X(\mathbf{A}_\mathbb{Q}^\infty)$ does not depend on the choice of model.) Similarly, define $X(\mathbf{A}_\mathbb{Q}^\infty)$ to be the set of adelic points of $X$ away from $\infty$, that is, the restricted product of $X(\mathbb{Q}_v)$ for $v \neq \infty$ with respect to the subsets $X(\mathbb{Z}_v)$. Assuming that $X$ has points over every completion of $\mathbb{Q}$, we say that $X$ satisfies \emph{strong approximation away from $\infty$} if the image of the diagonal map $X(\mathbb{Q}) \to X(\mathbf{A}_\mathbb{Q}^\infty)$ is dense. If a variety $X$ does not satisfy strong approximation, this can sometimes be explained by a \emph{Brauer--Manin obstruction}. Define \[ X(\mathbf{A}_\mathbb{Q})^{\Br} = \{ (P_v) \in X(\mathbf{A}_\mathbb{Q}) \mid \sum_v \inv_v A(P_v)=0 \text{ for all } A \in \Br X \}, \] and define $X(\mathbf{A}_\mathbb{Q}^\infty)^{\Br}$ to be the image of $X(\mathbf{A}_\mathbb{Q})^{\Br}$ under the natural projection map $X(\mathbf{A}_\mathbb{Q}) \to X(\mathbf{A}_\mathbb{Q}^\infty)$. Then $X(\mathbf{A}_\mathbb{Q}^\infty)^{\Br}$ is a closed subset of $X(\mathbf{A}_\mathbb{Q}^\infty)$ that contains the image of $X(\mathbb{Q})$. If $X(\mathbf{A}_\mathbb{Q}^\infty)^{\Br} \neq X(\mathbf{A}_\mathbb{Q}^\infty)$, we say that there is a Brauer--Manin obstruction to strong approximation away from $\infty$ on $X$. We now return to the variety $Y$ defined above. Let $X \subset \mathbb{A}^4_\mathbb{Q}$ be the punctured affine cone over $Y$: that is, $X$ is the complement of the point $O = (0,0,0,0)$ in the affine variety defined by the equation~\eqref{eq:Y}. There is a natural morphism $\pi \colon X \to Y$ given by restricting the usual quotient map $\mathbb{A}^4 \setminus \{O\} \to \P^3$, so that $X$ is realised as a $\mathbf{G}_{\mathrm{m}}$-torsor over $Y$. To talk about integral points, we must choose a model: let $\mathcal{X} \subset \mathbb{A}^4_\mathbb{Z}$ be the complement of the section $(0,0,0,0)$ in the scheme defined by the equation~\eqref{eq:Y} over $\mathbb{Z}$. If we let $f \in \mathbb{Z}[X_0,X_1,X_2,X_3]$ be the polynomial defining $Y$, then the integral points of $\mathcal{X}$ are given by \[ \mathcal{X}(\mathbb{Z}) = \{ (x_0,x_1,x_2,x_3) \in \mathbb{Z}^4 \mid x_0,x_1,x_2,x_3 \text{ coprime, }f(x_0,x_1,x_2,x_3)=0 \}. \] \begin{theorem} The group $\Br X / \Br \mathbb{Q}$ has order $2$; a generator is given by the quaternion algebra $(17,g)$, where $g \in \mathbb{Z}[X_0,X_1,X_2,X_3]$ is a homogeneous linear form defining the tangent hyperplane to $X$ at a rational point $P \in X(\mathbb{Q})$. There is a Brauer--Manin obstruction to strong approximation on $X$ away from $\infty$. Specifically, for any smooth point $\tilde{Q} \in \mathcal{X}(\mathbb{F}_{17})$, at most half of the scalar multiples of $\tilde{Q}$ lift to integer points of $\mathcal{X}$. \end{theorem} It is interesting to compare this result with the ``easy fibration method'' of~\cite[Proposition~3.1]{CTX:AA-2013}. We have a fibration $\pi \colon X \to Y$, and the base $Y$ satisfies strong approximation. However, the fibres are isomorphic to $\mathbf{G}_{\mathrm{m}}$, which drastically fails to satisfy strong approximation, so we cannot use that method to conclude anything about strong approximation on $X$. \section{Quadric surfaces} In this section we gather some basic facts about quadric surfaces. Any non-singular quadric surface $Y \subset \P^3$ over a field $k$ of characteristic different from $2$ may be defined by an equation of the form $\mathbf{x}^T \mathbf{M} \mathbf{x} = 0$, where $\mathbf{M}$ is an invertible $4\times 4$ matrix with entries in $k$. We define $\Delta_Y \in k^\times / (k^\times)^2$ to be the class of the determinant of $\mathbf{M}$, which is easily seen to be invariant under linear changes of coordinates. If $\bar{k}$ is an algebraic closure of $k$ and $\bar{Y}$ is the base change of $Y$ to $\bar{k}$, then $\Pic\bar{Y}$ is isomorphic to $\mathbb{Z}^2$, generated by the classes of the two families of lines on $\bar{Y}$ \cite[Example~II.6.6.1]{Hartshorne:AG}. \begin{lemma}\label{lem:quad} Let $k$ be a field of characteristic not equal to $2$, and let $Y \subset \P^3_k$ be a non-singular quadric surface. Then the two families of lines on $\bar{Y}$ are defined over the field $k(\sqrt{\Delta_Y})$, and are conjugate to each other. \end{lemma} \begin{proof} We may assume that the matrix $\mathbf{M}$ defining $Y$ is diagonal, with entries $p,q,r,s$. Following~\cite[Section~IV.3.2]{EH:GS}, we explicitly compute an open subvariety of the Fano scheme of lines on $Y$ by calculating the conditions for the line through $(1:0:a:b)$ and $(0:1:c:d)$ to lie in $Y$. The resulting affine piece of the Fano scheme is given by \[ \{ p + ra^2 + sb^2 = 0, rac+ sbd = 0, q + rc^2 + sd^2 = 0 \} \subset \mathbb{A}^4_k = \Spec k[a,b,c,d]. \] This is easily verified to consist of two geometric components, each a plane conic, one contained in the plane $qra=-\sqrt{\Delta_Y} d, qsb = \sqrt{\Delta_Y} c$ and the other in the conjugate plane. \end{proof} \begin{lemma}\label{lem:weil} Let $Y$ be a non-singular quadric surface over the finite field $\mathbb{F}_q$, with $q$ odd. Then \[ \# Y(\mathbb{F}_q) = \begin{cases} q^2+2q+1 & \text{if $\Delta_Y \in (\mathbb{F}_q^\times)^2$;} \\ q^2+1 & \text{otherwise.} \end{cases} \] \end{lemma} \begin{proof} This can be computed directly, but we recall how to obtain it from the Lefschetz trace formula for \'etale cohomology. Let $\ell$ be a prime not equal to $p$. Let $\bar{\mathbb{F}}_q$ be an algebraic closure of $\mathbb{F}_q$, let $\bar{Y}$ be the base change of $Y$ to $\bar{\mathbb{F}}_q$, and let $F \colon \bar{Y} \to \bar{Y}$ be the Frobenius morphism. The Lefschetz trace formula states that $\# Y(\mathbb{F}_q)$ can be calculated as \[ \# Y(\mathbb{F}_q) = \sum_{i = 0}^4 (-1)^i \Tr(F^* | \H^i(\bar{Y}, \mathbb{Q}_\ell)). \] Because $Y$ is smooth and projective, there are isomorphisms of Galois modules $\H^0(\bar{Y},\mathbb{Q}_\ell) \cong \mathbb{Q}_\ell$ and $\H^4(\bar{Y},\mathbb{Q}_\ell) \cong \mathbb{Q}_\ell(-2)$ (see~\cite[VI.11.1]{Milne:EC}). We have $\bar{Y} \cong \P^1 \times \P^1$. The standard calculation of the cohomology groups of projective space~\cite[VI.5.6]{Milne:EC}, and the K\"unneth formula~\cite[Corollary~VI.8.13]{Milne:EC}, give $\H^i(\bar{Y},\mathbb{Q}_\ell)=0$ for $i$ odd, and show that $\H^2(\bar{Y},\mathbb{Q}_\ell)$ has dimension $2$. This reduces the formula to \[ \# Y(\mathbb{F}_q) = q^2 + 1 + \Tr(F^* | \H^2(\bar{Y},\mathbb{Q}_\ell)). \] Moreover, the cycle class map (arising from the Kummer sequence) gives a Galois-equivariant injective homomorphism \[ \Pic \bar{Y} \otimes_\mathbb{Z} \mathbb{Q}_\ell \to \H^2(\bar{Y},\mathbb{Q}_\ell(1)), \] which by counting dimensions must be an isomorphism. If $\Delta_Y$ is a square in $\mathbb{F}_q$, then the Galois action is trivial and we obtain (after twisting) $\Tr(F^* | \H^2(\bar{Y},\mathbb{Q}_\ell)) = 2q$. If $\Delta_Y$ is not a square in $\mathbb{F}_q$, then $F^*$ acts on $\Pic \bar{Y} \cong \mathbb{Z}^2$ by switching the two factors, so with trace zero. In either case we obtain the claimed number of points. (Note that, in the first case, $Y$ is isomorphic to $\P^1 \times \P^1$, so we should not be surprised that it has $(q+1)^2$ points.) \end{proof} \section{Proof of the theorem} Firstly, we calculate the Brauer group of $X$; it is convenient to do so in more generality. \begin{lemma}\label{lem:br} Let $k$ be a field of characteristic zero, let $Y \subset \P^3_k$ be a smooth quadric surface, and let $X \subset \mathbb{A}^4_k$ be the punctured affine cone over $Y$. If $\Delta_Y \in (k^\times)^2$, then we have $\Br X = \Br k$. Otherwise, suppose that $X$ has a $k$-rational point $P$, and let $g$ be a homogeneous linear form defining the tangent hyperplane to $X$ at $P$. Then $\Br X / \Br k$ has order $2$, and is generated by the class of the quaternion algebra $(\Delta_Y, g)$. This class does not depend on the choice of $P$. \end{lemma} \begin{proof} Let $\bar{k}$ be an algebraic closure of $k$, and let $\bar{X}$ and $\bar{Y}$ denote the base changes to $\bar{k}$ of $X$ and $Y$, respectively. By~\cite[Theorem~2.2]{Ford:JPAM-2001}, we have $\Br(\bar{X}) \cong \Br(\bar{Y})$; but $\bar{Y}$ is a rational variety, so its Brauer group is trivial. So it remains to compute the algebraic Brauer group of $X$. We claim that there are no non-constant invertible regular functions on $X$. Indeed, let $C \subset \mathbb{A}^4_k$ be the (non-punctured) affine cone over $Y$. Because $C$ is Cohen--Macaulay and $(0,0,0,0)$ is of codimension $\ge 2$ in $C$, we have \[ k[X] = k[C] = k[X_0,X_1,X_2,X_3] / (f) \] where $f$ is the homogeneous polynomial defining $Y$. This is a graded ring and its invertible elements must all have degree $0$, so are constant. The Hochschild--Serre spectral sequence gives an injection $\Br X / \Br k \to \H^1(k, \Pic \bar{X})$. (Here we use $k[X]^\times = k^\times$ and $\Br \bar{X}=0$.) By~\cite[Exercise~II.6.3]{Hartshorne:AG}, there is an exact sequence \[ 0 \to \mathbb{Z} \to \Pic \bar{Y} \xrightarrow{\pi^*} \Pic \bar{X} \to 0, \] where $\pi \colon X \to Y$ is the natural projection and the first map sends $1$ to the class of a hyperplane section of $\bar{Y}$. Using Lemma~\ref{lem:quad} shows that $\Pic \bar{X}$ is isomorphic to $\mathbb{Z}$, with $G=\Gal(k(\sqrt{\Delta_Y})/k)$ acting by $-1$. The inflation-restriction sequence shows $\H^1(k,\Pic \bar{X}) \cong \H^1(G,\Pic \bar{X})$. If $\Delta_Y$ is a square, then this group is trivial, and we conclude that $\Br X / \Br k$ is also trivial. Otherwise $G=\{1,\sigma\}$ has order $2$, and we have \[ \H^1(G,\Pic\bar{X}) \cong \hat{\H}^{-1}(G,\Pic\bar{X}) = \frac{\ker(1+\sigma)}{\im(1-\sigma)} = \frac{\mathbb{Z}}{2\mathbb{Z}}. \] To conclude, it is sufficient to show that the algebra $(\Delta_Y,g)$ is non-trivial in $\Br X / \Br k$. Because the polynomial $g$ also defines the tangent plane to $Y$ at $\pi(P)$, the divisor $(g)$ is equal to $\pi^*(L+L')$, where $L$ is a line passing through $\pi(P)$ and $L'$ is its conjugate. By~\cite[Proposition~4.17]{Bright:thesis}, this shows that $(\Delta_Y,g)$ is a non-trivial element of order $2$ in $\Br X / \Br k$. (The reference works with a smooth projective variety, but the proof generalises easily to any smooth $X$ with $k[X]^\times = k^\times$.) \end{proof} We now return to the specific case where $X$ is the punctured affine cone over the quadric surface defined by the equation~\eqref{eq:Y}. We will need to be more careful about constant algebras than we have been up to this point. Recall that $\mathcal{X}(\mathbb{Z})$ consists of points $P=(x_0,x_1,x_2,x_3)$ where $x_0,x_1,x_2,x_3$ are coprime integers satisfying the equation~\eqref{eq:Y}. Given such a $P$, we define the linear form \[ \ell_P = x_0 X_0 + 47 x_1 X_1 - 103 x_2 X_2 - (17 \times 47 \times 103) x_3 X_3 \in \mathbb{Z}[X_0,X_1,X_2,X_3] \] and the quaternion algebra $A_P = (17,\ell_P) \in \Br X$. Note that the linear form $\ell_P$ does indeed define the tangent plane to $X$ at $P$, so Lemma~\ref{lem:br} shows that $A_P$ represents the unique non-trivial class in $\Br X / \Br \mathbb{Q}$. We will now evaluate the Brauer--Manin obstruction associated to $A_P$. \begin{lemma}\label{lem:easy} Fix $P \in \mathcal{X}(\mathbb{Z})$. Then, for any place $v$ of $\mathbb{Q}$ for which $17$ is a square in $\mathbb{Q}_v$, we have $\inv_v A_P(Q)=0$ for all $Q \in X(\mathbb{Q}_v)$. \end{lemma} \begin{proof} The homomorphism $\Br X \to \Br \mathbb{Q}_v$ given by evaluation at $Q$ factors through $\Br(X \times_\mathbb{Q} \mathbb{Q}_v)$, but the image of $A_P$ in this group is zero. \end{proof} Note that Lemma~\ref{lem:easy} applies in particular to $v=\infty$, $v=2$, $v=47$ and $v=103$. For the following lemma, let $\mathcal{Y}$ be the model for $Y$ over $\mathbb{Z}$ defined by the equation~\eqref{eq:Y}, and extend $\pi$ to the natural projection $\mathcal{X} \to \mathcal{Y}$. \begin{lemma}\label{lem:good} Fix $P \in \mathcal{X}(\mathbb{Z})$. Let $p \neq 17$ be a prime such that $17$ is not a square in $\mathbb{Q}_p$, and let $Q \in \mathcal{X}(\mathbb{Z}_p)$ be such that $\pi(Q) \not\equiv \pi(P) \pmod{p}$. Then $\inv_p A_P(Q)=0$. \end{lemma} \begin{proof} If $\ell_P(Q)$ is not divisible by $p$, then $\ell_P(Q)$ is a norm from the unramified extension $\mathbb{Q}_p(\sqrt{17})/\mathbb{Q}_p$ and therefore we have $\inv_p A_P(Q)=0$. Now suppose that $\ell_P(Q)$ is divisible by $p$. Denote by $\tilde{Y}$ the base change of $\mathcal{Y}$ to $\mathbb{F}_p$. Let $\tilde{P},\tilde{Q} \in \tilde{Y}(\mathbb{F}_p)$ be the reductions modulo $p$ of $\pi(P),\pi(Q)$ respectively. The variety $\tilde{Y}$ is a smooth quadric over $\mathbb{F}_p$, and the tangent space $T_{\tilde{P}} \tilde{Y}$ is cut out by the reduction modulo $p$ of the linear form $\ell_P$. By Lemma~\ref{lem:quad}, the scheme $\tilde{Y} \cap \{ \ell_P = 0 \}$ consists of two lines that are conjugate over $\mathbb{F}_p(\sqrt{17})$. Therefore the only point of $\tilde{Y}(\mathbb{F}_p)$ at which $\ell_P$ vanishes is $\tilde{P}$. It follows that $\ell_P(Q)$ can only be divisible by $p$ if $\tilde{Q}$ coincides with $\tilde{P}$. \end{proof} \begin{lemma}\label{lem:same} Let $P,P' \in \mathcal{X}(\mathbb{Z})$ be two points. Then $A_P$ and $A_{P'}$ lie in the same class in $\Br X$. \end{lemma} \begin{proof} By Lemma~\ref{lem:br}, we already know that the difference $A = A_P - A_{P'}$ lies in $\Br \mathbb{Q}$. It will be enough to show that $\inv_v A = 0$ for $v \neq 17$, for then the product formula shows $\inv_{17} A = 0$ also, and therefore $A=0$. For $v$ for which $17$ is a square in $\mathbb{Q}_v$, take $Q$ to be any point of $X(\mathbb{Q}_v)$; then Lemma~\ref{lem:easy} shows $\inv_v A_P(Q) = \inv_v A_{P'}(Q) = 0$ and therefore $\inv_v A = 0$. For $p \neq 17$ such that $17$ is not a square in $\mathbb{Q}_p$, Lemma~\ref{lem:weil} shows that $\tilde{Y} = \mathcal{Y} \times_\mathbb{Z} \mathbb{F}_p$ contains a point $\tilde{Q}$ that is equal neither to $\pi(P)$ nor to $\pi(P')$ modulo $p$. Hensel's Lemma shows that $\tilde{Q}$ lifts to a point $Q \in \mathcal{X}(\mathbb{Z}_p)$. Lemma~\ref{lem:good} shows $\inv_p A_P(Q) = \inv_p A_{P'}(Q) = 0$, so again we have $\inv_p A = 0$, completing the proof. \end{proof} \begin{lemma} Fix $P \in \mathcal{X}(\mathbb{Z})$. For $p \neq 17$, we have $\inv_v A_P(Q)=0$ for all $Q \in \mathcal{X}(\mathbb{Z}_p)$. \end{lemma} \begin{proof} If $17$ is a square in $\mathbb{Q}_p$, then this follows from Lemma~\ref{lem:easy}. Otherwise, Lemma~\ref{lem:weil} shows that $\tilde{Y} = \mathcal{Y} \times_\mathbb{Z} \mathbb{F}_p$ contains at least two points. Weak approximation on $Y$ then gives a point $P' \in \mathcal{X}(\mathbb{Z})$ such that $\pi(P)$ and $\pi(P')$ are different modulo $p$. By Lemma~\ref{lem:same}, the algebras $A_P$ and $A_{P'}$ lie in the same class in $\Br X$, so it does not matter which we use to evaluate the invariant. Lemma~\ref{lem:good} then gives the result. \end{proof} It remains to evaluate the invariant at $17$. In the following lemma, if $Q = (y_0,y_1,y_2,y_3)$ is a point of $\mathcal{X}$, then $\lambda Q$ denotes the point $(\lambda y_0, \lambda y_1, \lambda y_2, \lambda y_3)$. \begin{lemma} Fix $P \in \mathcal{X}(\mathbb{Z})$ and $Q \in \mathcal{X}(\mathbb{Z}_{17})$. For any $\lambda \in \mathbb{Z}_{17}^\times$, having reduction $\tilde{\lambda} \in \mathbb{F}_{17}^\times$, we have \[ \inv_{17} A_P(\lambda Q) = \begin{cases} \inv_{17} A_P(Q) & \text{if $\tilde{\lambda} \in (\mathbb{F}_{17}^\times)^2$} \\ \inv_{17} A_P(Q) + \frac{1}{2} & \text{otherwise.} \end{cases} \] \end{lemma} \begin{proof} Suppose that $\ell_P(Q)$ is non-zero. Because $\ell_P$ is homogeneous of degree $1$, we have \[ \inv_{17} A_P(\lambda Q) = \inv_{17} (17, \lambda \ell_P(Q)) = \inv_{17} A_P(Q) + \inv_{17} (17, \lambda). \] But $\inv_{17}(17, \lambda)$ is zero if and only if $\tilde{\lambda}$ is a square in $\mathbb{F}_{17}^\times$. If $\ell_P(Q)$ is zero, then Lemma~\ref{lem:quad} shows that we have $\pi(P) = \pi(Q)$. Using weak approximation on $Y$, we can find a point $P' \in \mathcal{X}(\mathbb{Z})$ with $\pi(P') \neq \pi(Q)$, and Lemma~\ref{lem:same} shows that replacing $A_P$ by $A_P'$ gives the same invariant. \end{proof} Note that the only singular points of $\mathcal{X} \times_\mathbb{Z} \mathbb{F}_{17}$ are those of the form $(0,0,0,a)$, and these do not lift to points of $\mathcal{X}(\mathbb{Z}_{17})$. So the smooth points of $\mathcal{X}(\mathbb{F}_{17})$ are precisely those that lift to $\mathcal{X}(\mathbb{Z}_{17})$. Putting all these calculations together proves the following. Let $U \subset X(\mathbf{A}_\mathbb{Q}^\infty)$ be the open subset defined as \[ U = \prod_{p \neq 17} \mathcal{X}(\mathbb{Z}_p) \times \{ Q \in \mathcal{X}(\mathbb{Z}_{17}) \mid \inv_{17} A_P(Q) = \frac{1}{2} \}. \] Then $U$ is a non-empty open subset that does not meet $X(\mathbf{A}_\mathbb{Q}^\infty)^{\Br}$, showing that there is a Brauer--Manin obstruction to strong approximation away from $\infty$ on $X$. More specifically, for any smooth point $\tilde{Q} \in \mathcal{X}(\mathbb{F}_{17})$, half of the scalar multiples of $\tilde{Q}$ lie in the image of $U$, showing that they do not lift to integer points of $\mathcal{X}$. \bibliographystyle{abbrv}
\section{Introduction}\label{sec:int} \subsection{Motivation and literature review} \IEEEPARstart{T}{he} fifth generation of cellular networks are not only envisioned to enhance the mobile broadband services, but also to support massive number of connections within the Internet-of-Things (IoT) paradigm as well as to provide ultra-reliable low-latency communications for some services\cite{yang2017rapro,gao2015enhanced}. Such new requirements impose unprecedented challenges that cannot be fulfilled via the conventional orthogonal multiple-access (OMA) with centralized base station controlled communications. Instead, the 3GPP considers more aggressive spectral utilization schemes such as device-to-device (D2D) communication~\cite{tehrani2014device,asadi2014survey} and non-orthogonal multiple access (NOMA)~\cite{dai2015non,ding2015application} to support such massive number of connections. Despite the increased interference level imposed by D2D communications, it has been shown that D2D can significantly improve the overall network spatial spectral utilization~\cite{lin_D2D,elsawy1,model2016ali,afshang2015fundamentals}. Thanks to the low-power short range direct proximity transmissions enabled by D2D communication. The NOMA further improves the spectrum utilization by simultaneous transmission from the same source to multiple devices on the same time-frequency resources~\cite{islam2016power,dai2015non}. Specifically, NOMA leverages superposition coding (SC) along with successive interference cancellation (SIC) and multi-user diversity to efficiently enhance spectrum utilization. By allocating more transmission power to the user with poorer channel condition, NOMA can achieve a balanced tradeoff between system throughput and user fairness~\cite{cui2016novel,islam2016power,yang2016general,timotheou2015fairness}. The foreseen gains of NOMA transmission have triggered several research efforts to optimize its operation. For instance, different power allocation strategies for NOMA transmission are developed in~\cite{cui2016novel, yang2016general, islam2016power}. The work in \cite{ding2016impact} investigates the effect of user pairing on the NOMA sum rate performance. Sub-optimal joint power allocation and user pairing strategy is advocated in~\cite{hina2}. For MIMO networks, the authors in \cite{hanif2016minorization} develop an optimized downlink procedure to maximize NOMA sum rate under per-user rate constraint. The fairness of NOMA transmission is investigated in~\cite{timotheou2015fairness}. Improving NOMA transmission reliability via cooperation is studied in \cite{ding2015cooperative} and via hybrid automatic repeat request (HARQ) is studied~\cite{choi2016harq, li2015investigation}. The potential gains from integrating NOMA with D2D communication has been investigated in \cite{zhang2016full}. However, none of \cite{ding2015cooperative, hina2, hanif2016minorization, cui2016novel, yang2016general, islam2016power, ding2016impact, timotheou2015fairness, choi2016harq, li2015investigation, zhang2016full} account for the network aggregate interference, which is significant in current cellular networks specially with D2D communication. Note that such co-channel interference affects the power allocation and rate adaptation, which are very crucial for NOMA transmission. The operation of NOMA under aggregate network interference in uplink cellular networks is studied in \cite{hina1}. However, the model in \cite{hina1} neither accounts for HARQ nor for cooperation, which are fundamentals for reliable NOMA communication. \subsection{Contribution } To the best of the authors' knowledge, this paper is the first to study cooperative HARQ-assisted NOMA in large-scale D2D networks. Using stochastic geometry~\cite{haenggi2012stochastic, tut_h}, we develop a novel mathematical paradigm for cooperative HARQ-assisted NOMA that accounts for the spatial interference correlations among the NOMA receivers as well as the temporal interference correlation across the HARQ transmissions\footnote{Considering the spatial and temporal interference correlations highly complicate the analysis and lead to involved performance expressions. However, it is mandatory to reveal the true network performance and alleviate misleading design insights as shown in \cite{Haenggi_corr1, Haenggi_corr2, Haenggi_corr3, Sawy_corr1, Sawy_corr2, Haenggi_corr4, Haenggi_corr5, corr3, crismani2015cooperative, tanbourgi2014effect} and will be shown in this paper.}. Specifically, we consider a single source two users NOMA scheme and model the interfering D2D devices via a Poisson point process (PPP) (cf. Fig.~\ref{fig:sys_mod}), which is widely accepted for modeling D2D devices~\cite{tut_h,lin_D2D,elsawy1,model2016ali,afshang2015fundamentals}. Exact expressions for the outage probability and long term average throughput (LTAT) are calculated for the two users. Furthermore, simplified approximation for LTAT are proposed and validated via simulations. The approximate expressions are utilized to develop an interference aware rate selection and power allocation for cooperative HARQ-assisted NOMA that maximize different network objectives such as LTAT and area spectral efficiency (ASE). The results show the significance of interference spatial and temporal correlation on the NOMA performance. Further, the gains of NOMA over conventional orthogonal multiple access as well as the gains due to cooperation and HARQ are quantified. The contributions of the paper can be summaried in the following points: \begin{itemize} \item The paper develops a novel mathematical model based on stochastic geometry for HARQ assisted cooperative NOMA transmission. The developed mathematical model involves exact as well as accurate approximate expressions for the LTAT and outage probability under spatial and temporal interference correlation. The approximations are advocated to alleviate the computational complexity of the exact expressions and enable optimal network design. \item The developed mathematical model captures the interwoven decoding performance among the two NOMA receivers due to the spatial interference correlation. \item The developed mathematical model captures the temporal diversity loss in the HARQ retransmissions due to temporal interference correlation. \item The numerical results quantify the gain of HARQ as well as the gain of cooperation on the NOMA performance in terms of outage probability and LTAT. The effect of the number of HARQ retransmission is also discussed. \item The developed mathematical model is utilized to formulate an interference aware design that maximizes different network objectives, such as LTAT and ASE, under outage probability constraints. \item The results show that an interference-oblivious or a correlation-oblivious design is unable to provide satisfied requirement of outage probabilities. \item The results show the superiority of the proposed HARQ assisted cooperative NOMA over the conventional OMA scheme. \end{itemize} \subsection{Notation and organization} Throughout the paper, $\mathbb P[X]$ denotes the probability of an event $X$, $\mathbb E$ refers to the expectation operator, $X \cup Y$ and $X \cap Y$ denote the union and the intersection of events $X$ and $Y$, respectively, $[\cdot]^+$ denotes the projection onto the nonnegative orthant, $\left\| \cdot \right\|$ stands for Euclidean norm operation, $\Omega$ denotes the sample space and $\emptyset$ denotes the empty set. The remainder of this paper is organized as follows. Section \ref{sec:sys_mod} presents the considered cooperative HARQ assisted NOMA scheme for D2D networks along with the underlying assumption. Section \ref{sec:per_ana} then analyzes the performance of the proposed scheme, particularly the LTAT and outage probability. Numerical results are presented for verification and discussion in Section \ref{sec:num}. Finally, Section \ref{sec:cond} concludes this paper. \section{System Model}\label{sec:sys_mod} This paper considers a D2D communication network modeled as a homogeneous PPP $\Phi \in \mathbb{R}^2$ with intensity $\lambda$. All D2D devices have backlogged buffers and are always transmitting over a shared frequency channel, which is dedicated to D2D communication. Without loss of generality, we focus on a typical source D2D device that is serving two nearby users, as shown in Fig. \ref{fig:sys_mod}, via cooperative HARQ assisted NOMA scheme shown in Fig. \ref{fig:TX_mod}. Let $z$ be the location of the source device, then the distance between the source device and user $i$ (the user at $o_i$) is denoted by $d_i = \left\| z - o_i \right\|$, where $i \in \{1,2\}$. Exploiting the stationarity of the PPP, we assume that one of the users is located at $o_1=(0,0)$ and the other user is located at $o_2=(D,0)$. Since NOMA protocol takes advantage of the difference between fading channels compared to time division multiple access (TDMA)\cite{ding2015cooperative}, we stipulate that user 1 is closer to the source device than user 2, that is, $d_1 < d_2$, without loss of generality. \begin{figure} \centering \includegraphics[width=2.7in]{./sys_mod} \caption{A NOMA-based D2D network model.}\label{fig:sys_mod} \end{figure} As shown in Fig.~\ref{fig:TX_mod}, the cooperative HARQ assisted NOMA transmission is divided into two phases, namely Phase I and Phase II. In Phase I, the source utilizes superposition coding with power domain multiplexing to encode the two signals ${\bf s}_1$ and ${\bf s}_2$ that are intended to the two users 1 and 2, respectively. The nearer user at $o_1$ first decodes ${\bf s}_2$, which is then subtracted via SIC to decode its intended signal ${\bf s}_1$. The farther user 2 directly decodes ${\bf s}_2$ while treating the interfering signal ${\bf s}_1$ as noise, which is denoted hereafter as NOMA interference. The transmission of the superposition messages is repeated until either user 1 or 2 acknowledges successful reception or the maximum number of retransmission $K$ is reached. If either of the two devices acknowledges successful reception, Phase II starts in which the source node only transmits the remaining (i.e., not acknowledged) signal. Furthermore, if user 1 was the acknowledging receiver, it cooperates with the source and relays ${\bf s}_2$ to user 2. When both users 1 and 2 acknowledge successful reception, the next two signals in the source queue are transmitted via the same aforementioned operation. If the maximum number of transmission $K$ is reached without decoding the intended signals, the signals are dropped from the queue and outage event is declared. For simplicity, we assume that the feedback channel is error-free and delay-free, which can be justified by the low transmission rate and the short length of acknowledgement message. In this paper, we assume a block Rayleigh fading channel (i.e., channel coefficient remains constant during each HARQ transmission) with known statistical CSI at the source device. However, the channel gain randomly and independently changes from one transmission to another. However, it is important to note that the locations of the interfering devices do not change dramatically over the short HARQ time interval, especially for interferers with low-to-medium mobility. Thus it is reasonable to assume that the interferer locations are fixed during HARQ transmissions, i.e., follow stationary interferer model (SIM) \cite{crismani2015cooperative}, which is valid because of the limited maximal allowable number of transmissions for HARQ in practice, e.g., the maximal number of transmissions is usually chosen up to $5$ and each HARQ round consumes around $8$ms \cite{erceg2001ieee}. The received signal at each of the devices in each transmission phase can be represented as follows \begin{figure} \centering \includegraphics[width=5.5in]{./TX_scheme3} \caption{Cooperative HARQ assisted NOMA transmission model for each superposition encoded signal of ${\bf s}_1$ and ${\bf s}_2$, where black color denotes Phase I modes, red color denotes Phase II modes, dotted arrows denote logical state transitions, and solid arrows denote physical transmissions.}\label{fig:TX_mod} \end{figure} \subsubsection{Phase I} The signal received by user $i$ in the $k$-th HARQ round is written as \begin{align}\label{eqn:signal_received1} {{\bf{y}}_{i,k}} &= \sqrt {\ell \left( {{d_i}} \right)P} {h_{z{o_i},k}}\left( {{\beta}{{\bf{s}}_1} + \sqrt {1 - {\beta}^2} {{\bf{s}}_2}} \right) + {\sum \nolimits_{x \in \Phi \backslash \left\{ z \right\}}}\sqrt {\ell \left( {\left\| {x - {o_i}} \right\|} \right)P} {h_{x{o_i},k}}{{\bf{s}}_{x,k}} + {{\bf{n}}_{i,k}}, \end{align} where $P$ denotes the transmit power and $\beta$ represents the power allocation coefficient. ${\bf s}_i$ is a Gaussian signal with unit variance to user $i$. Each signal of ${{\bf{s}}_1}$ and ${{\bf{s}}_2}$ is encoded independently at the source device and is transmitted with an initial transmission rate $R_i$ for user $i$. ${{\bf{s}}_{x,k}}$ denotes a Gaussian signal with unit variance and delivered by an interfering device located at $x$ in the $k$-th HARQ round. $\ell(d) = d^{-\alpha}$ captures the path loss effect with path loss exponent $\alpha > 2$. The notation ${\Phi }\backslash\left\{ z \right\}$ denotes the set of all devices excluding the source device $z$. ${{\bf{n}}_{i,k}}$ denotes a complex additive white Gaussian noise (AWGN) with zero mean and variance of $\sigma^2$, i.e., ${{\bf{n}}_{i,k}} \sim {\cal CN}(0,\sigma^2)$. ${h_{xo_i,k}}$ denotes the channel coefficient from the interfering device $x$ to user $i$ in the $k$-th HARQ round, and ${h_{zo_i,k}}$ and ${h_{xo_i,k}}$ are complex Gaussian distributed with zero mean and unit variance, i.e., ${h_{zo_i,k}},{h_{xo_i,k}} \sim {\cal CN}(0,1)$. Following the NOMA protocol, after receiving the signal, the message intended for user 2 is decoded first with SINR \begin{equation}\label{eqn:sinr_1_2} {\gamma _{o_i,k,2}^{(I)}} = \frac{{\left( {1 - {\beta}^2} \right)P{{\left| {{h_{z{o_i},k}}} \right|}^2}\ell \left( {{d_i}} \right)}}{{{\beta}^2P{{\left| {{h_{z{o_i},k}}} \right|}^2}\ell \left( {{d_i}} \right) + {I_{i,k}} + {\sigma ^2}}}, \end{equation} where ${I_{i,k}} $ denotes the total interference at user $i$ from interfering devices $x \in \Phi$ excluding $z$, i.e., $\Phi \backslash \left\{ z \right\}$. More precisely, it follows from (\ref{eqn:signal_received1}) that \begin{equation}\label{eqn:inter_fer_1} {I_{i,k}} = P\sum\nolimits_{x \in \Phi \backslash \left\{ z \right\}} {\ell \left( {\left\| {x - {o_i}} \right\|} \right){{\left| {{h_{xo_i,k}}} \right|}^2}}. \end{equation} If user 1 successfully decodes the message of user 2, SIC will be carried out to recover its own message ${\bf s}_{1}$ through subtracting the decoded signal ${\bf s}_{2}$ with SINR \begin{equation}\label{eqn:sinr_1_1} {\gamma _{o_1,k,1}^{(I)}} = \frac{{{\beta}^2P{{\left| {{h_{z{o_1},k}}} \right|}^2}\ell \left( {{d_1}} \right)}}{{{I_{1,k}} + {\sigma ^2}}}. \end{equation} \subsubsection{Phase II} As shown in Fig.~\ref{fig:TX_mod}, if $s_2$ is successfully decoded prior to the $k$-th HARQ round, the received signal at $o_1$ in the $k$-th HARQ round is therefore given by \begin{align}\label{eqn:y1_second_phase} {{\bf y}_{1,k}} &= \sqrt {\ell \left( {{d_1}} \right)P} {h_{z{o_1},k}}{{\bf{s}}_1} + {\sum \nolimits_{x \in \Phi \backslash \left\{ z \right\}}}\sqrt {\ell \left( {\left\| {x - {o_i}} \right\|} \right)P} {h_{x{o_1},k}}{{\bf{s}}_{x,k}} + {{\bf{n}}_{1,k}}. \end{align} Correspondingly, the received SINR can thus be expressed as \begin{equation}\label{eqn:sinr_phase2_o1} \gamma _{{o_1},k,1}^{\left( \Rmnum{2} \right)} = \frac{{P{{\left| {{h_{z{o_1},k}}} \right|}^2}\ell \left( {{d_1}} \right)}}{{{I_{1,k}} + {\sigma ^2}}}. \end{equation} \noindent Conversely, if $s_1$ is successfully decoded prior to the $k$-th HARQ round, the received signal at user 2 with cooperation from user 1 in the $k$-th HARQ round is therefore given by \begin{equation}\label{eqn:phaseII_o2} {{\bf y}_{2,k}} = \sqrt {\ell \left( D \right)P} {h_{{o_1}{o_2},k}}{{\bf{s}}_2} +\sqrt {\ell \left( {{d_2}} \right)P} {h_{z{o_2},k}}{{\bf{s}}_2} + {\sum \nolimits_{x \in \Phi \backslash \left\{ z \right\}}}\sqrt {\ell \left( {\left\| {x - {o_2}} \right\|} \right)P} {h_{x{o_2},k}}{{\bf{s}}_{x,k}} + {{\bf{n}}_{2,k}}, \end{equation} where ${h_{{o_1}{o_2},k}}$ denotes the channel coefficient between two users in the $k$-th transmission. Similar to (\ref{eqn:sinr_phase2_o1}), the received SINR of user 2 can be written as \begin{align}\label{eqn:SINR_second_phase} \gamma _{{o_2},k,2}^{\left( \Rmnum{2} \right)} =\frac{{P{{\left| {\sqrt {\ell \left( D \right)} {h_{{o_1}{o_2},k}} + \sqrt {\ell \left( {{d_2}} \right)} {h_{z{o_2},k}}} \right|}^2}}}{{{I_{2,k}} + {\sigma ^2}} =\frac{{P{{\left| {{h_{eq,k}}} \right|}^2}\left( {\ell \left( D \right) + \ell \left( {{d_2}} \right)} \right)}}{{{I_{2,k}} + {\sigma ^2}}}, \end{align} where ${h_{eq,k}} \triangleq \sqrt {\frac{{\ell \left( D \right)}}{{\ell \left( D \right) + \ell \left( {{d_2}} \right)}}} {h_{{o_1}{o_2},k}} + \sqrt {\frac{{\ell \left( {{d_2}} \right)}}{{\ell \left( D \right) + \ell \left( {{d_2}} \right)}}} {h_{z{o_2},k}}$ denotes the equivalent channel coefficient in the $k$-th transmission, and follows a complex Gaussian distribution with zero mean and unit variance, i.e., ${h_{eq,k}} \sim {\cal CN}(0,1)$, and ${\ell \left( D \right) + \ell \left( {{d_2}} \right)}$ is the equivalent path loss. It is important to note that the signals, and hence the SINRs, are spatially and temporally correlated. For instance, in Phase I, the spatial correlation exists between \eqref{eqn:signal_received1} for $i=1$ and $i=2$ and the temporal correlation exists in \eqref{eqn:signal_received1} across different $k$. In Phase II, only temporal correlations across different $k$ in the signals \eqref{eqn:y1_second_phase} and \eqref{eqn:phaseII_o2} exist since either user $1$ or $2$ is receiving. Similar notion applies to the SINRs given in \eqref{eqn:sinr_1_2}, \eqref{eqn:sinr_phase2_o1}, and \eqref{eqn:SINR_second_phase}. The spatial and temporal correlations stem from the fact that the two users see common interfering sources across the HARQ rounds. Consequently, the decoding performed at the two users is interwoven due to the spatial correlations as well as the NOMA protocol and cooperative communications. As will be shown in the next section, such interdependence between the performance of the two users makes the analysis significantly involved. \section{Analyses of throughput and Outage Probability}\label{sec:per_ana} LTAT is a widely adopted performance metric to characterize the performance of HARQ system. Here we adopt the model developed in \cite{caire2001throughput} to calculate the LTAT of the NOMA transmission with HARQ in the limit for large subcodeword length $L$. For notational convenience, let $t$ denote the number of slots and $b_{o_i}(t)$ be the number of information bits, which are intended for user $i$ and successfully decoded by user $i$, up to slot $t$. The total LTAT $\eta$ measured in bps/Hz is defined as \begin{equation}\label{eqn:throughput_def} \eta = \mathop {\lim }\limits_{t \to \infty } \frac{{{b_{{o_1}}}\left( t \right) + {b_{{o_2}}}\left( t \right)}}{{tL}} = \mathop {\lim }\limits_{t \to \infty } \frac{{{R_{{o_1}}}\left( t \right) + {R_{{o_2}}}\left( t \right)}}{t}, \end{equation} where $R_{o_i}(t) \triangleq b_{o_i}(t)/L$ denotes the corresponding information bits per second per hertz successfully decoded by user $i$. The event that user $i$ stops the transmission of the current message is treated as a recurrent event \cite{zorzi1996use}. The recurrent event occurs with two random rewards $\mathcal R_{o_1}$ and $\mathcal R_{o_2}$ gained by the two users at $o_1$ and $o_2$, respectively. Thus by using renewal-reward theorem, the LTAT of the cooperative HARQ assisted NOMA system is given by \begin{equation}\label{eqn:thr_rew} \eta = \frac{{\mathbb E\left( \mathcal R_{o_1} \right)+\mathbb E\left( \mathcal R_{o_2} \right)}}{{\mathbb E\left( \mathcal T \right)}}, \quad \rm with~ probability~ 1, \end{equation} where $\mathcal T$ is the random number of transmissions between two consecutive occurrences of the recurrent event (inter-renewal time). Note that $\mathcal R_{o_i}=R_i$ bps/Hz if user $i$ successfully recovers its own message, otherwise $\mathcal R_{o_i}=0$ bps/Hz, we have \begin{align}\label{eqn:average_reward} \mathbb E\left( {{{\cal R}_{{o_i}}}} \right) &=R_{i}(1-{\mathcal{O}_{K,o_i}}), \end{align} where ${{\mathcal{O}_{K,o_i}}}$ denotes the outage probability of user $i$ after $K$ HARQ rounds. Moreover, $\mathcal T$ is a discrete random variable with the sample space $\{1,2,\cdots,K\}$ and obeys the probability distribution as \begin{align}\label{eqn:rand_T_dis} \mathbb{P} \left[ {\mathcal T = \kappa } \right] = \left\{ {\begin{array}{*{20}{l}}\begin{array}{l} \mathcal{O}_{\kappa-1,o_1|o_2} - \mathcal{O}_{\kappa,o_1|o_2}, \end{array}&{\kappa < K}\\ {\mathcal{O}_{K-1,o_1|o_2},}&{\kappa = K} \end{array}} \right., \end{align} where $\mathcal{O}_{\kappa,o_1|o_2}$ denotes the outage event occurring at either user 1 or user 2 after $\kappa$ transmissions. By using inclusion-exclusion identity, it follows that \begin{equation}\label{eqn:out_or_inexid} \mathcal{O}_{\kappa,o_1|o_2} = { {{\mathcal{O}_{\kappa ,{o_1}}} + {\mathcal{O}_{\kappa ,{o_2}}} - {\mathcal{O}_{\kappa ,{o_1},{o_2}}}} }, \end{equation} where ${{\mathcal{O}_{\kappa,o_1,o_2}}}$ represents the probability that both two users fail to decode their own messages after $\kappa$ HARQ rounds. As such, the average number of transmissions $\mathbb E(\mathcal T)$ is obtained by using (\ref{eqn:rand_T_dis}) and (\ref{eqn:out_or_inexid}) as \begin{equation}\label{eqn:average_transmissions} \mathbb E\left( \mathcal T \right) = \sum\limits_{\kappa = 1}^K {\kappa \mathbb{P} \left[ {\mathcal T = \kappa } \right]} = 1 + \sum\limits_{\kappa = 1}^{K-1} { \left( {{\mathcal{O}_{\kappa ,{o_1}}} + {\mathcal{O}_{\kappa ,{o_2}}} - {\mathcal{O}_{\kappa ,{o_1},{o_2}}}} \right)}, \end{equation} Accordingly, substituting (\ref{eqn:average_reward}) and (\ref{eqn:average_transmissions}) into (\ref{eqn:thr_rew}) leads to \begin{equation}\label{eqn:noma_harq_throughput} \eta = \frac{{{R_1}\left( {1 - {\mathcal{O}_{K,o_1}}} \right) + {R_2}\left( {1 - {\mathcal{O}_{K,o_2}}} \right)}}{{1+\sum\nolimits_{\kappa = 1}^{K - 1} {\left( {{\mathcal{O}_{\kappa,o_1}} + {\mathcal{O}_{\kappa,o_2}} - {\mathcal{O}_{\kappa,o_1,o_2}}} \right)} }}. \end{equation} Thus the LTAT is expressed as a function of outage probabilities, which are the fundamental performance metrics. It is worth noting that (\ref{eqn:noma_harq_throughput}) is a general expression to evaluate the LTAT of HARQ assisted NOMA system, which is applicable to both cooperative and non-cooperative cases. Following the same analytical approach, it can be readily extended to derive the LTAT of HARQ assisted NOMA system with two more users. To avoid tedious mathematical derivations, we skip the detailed discussion. To proceed with our analysis, the outage probabilities ${{\mathcal{O}_{K,o_1}}}$, ${{\mathcal{O}_{K,o_2}}}$ and ${{\mathcal{O}_{K,o_1,o_2}}}$ are individually derived as follows. \subsection{The outage event ${{\mathcal{O}_{K,o_1}}}$} According to the system model in Section \ref{sec:sys_mod}, the decoding performance of ${\bf s}_1$ depends on the number of HARQ rounds consumed by user 1 to successfully decode and subtract ${\bf s}_2$ as well as the number of HARQ rounds consumed by user 2 to decode ${\bf s}_2$. This is because the source transmission power is totally allocated to ${\bf s}_1$ after user 2 acknowledges successful decoding. To facilitate our analysis, we define the following events. \begin{description} \item[${{\Theta _{{o_1},i,l}}}$]: The event that user 1 successfully decodes the signal ${\bf s}_i$ after $l$ HARQ rounds; \item[$ {{\bar \Theta _{{o_1},i}}}$]: The complement of the union ${\bigcup\limits_{l = 1}^K {{\Theta _{{o_1},i,l}} } }$, that is, user 1 fails to decode the signal ${\bf s}_i$ after $K$ HARQ rounds; \item[${\Theta _{{o_2,k}}}$]: The event that user 2 succeeds in decoding its own message after $k$ HARQ rounds; \item[${\bar \Theta _{{o_2}}}$]: The complement of the union ${\bigcup\limits_{k = 1}^K {{\Theta _{{o_2},k}} } }$, that is, user 2 fails to recover its own message after $K$ HARQ rounds. \end{description} With the above definitions, the outage probability of user 1, i.e., ${\mathcal{O}_{K,{o_1}}}$, can be obtained by using law of total probability as \begin{align}\label{eqn:p_K_o1_tot} {\mathcal{O}_{K,{o_1}}} &= \mathbb P\left[ {{{\bar \Theta }_{{o_1},1}}} \right] = \mathbb P\left[ {{{\bar \Theta }_{{o_1},1}}},\Omega,\Omega \right] \notag \\ &= \mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},\left( {\bigcup\limits_{l = 1}^K {{\Theta _{{o_1},2,l}} } } \right)\bigcup {{{\bar \Theta }_{{o_1},2}}} ,\left( {\bigcup\limits_{k = 1}^K {{\Theta _{{o_2},k}} } } \right)\bigcup {{{\bar \Theta }_{{o_2}}}} } \right]. \end{align} Notice that ${{\Theta _{{o_1},2,1}},\cdots,{\Theta _{{o_1},2,K}}}$ and ${{{\bar \Theta }_{{o_1},2}}}$ are mutually exclusive events. That is, the intersection of any sequence of these events is empty. Similarly, ${{\Theta _{{o_2},1}} ,\cdots,{\Theta _{{o_2},K}}}$ and ${{{\bar \Theta }_{{o_2}}}}$ are also mutually exclusive. In addition, ${\Theta _{{o_1},2,l}}$ and ${\Theta _{{o_2,k}}} $ are mutually exclusive if $l > k$, since the source only sends ${\bf s}_1$ after the acknowledgement of user 2, and hence, SIC in not required. Therefore, (\ref{eqn:p_K_o1_tot}) can be simplified as \begin{align}\label{eqn:out_K_o1} {\mathcal{O}_{K,{o_1}}} &= \sum\limits_{k = 1}^K {\sum\limits_{l = 1}^k {\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}},{\Theta _{{o_2},k}}} \right]} } + \sum\limits_{k = 1}^K {\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{\Theta _{{o_2},k}} } \right]} \notag\\ &\quad + \sum\limits_{l = 1}^K {\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]} + \mathbb P \left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{{\bar \Theta }_{{o_2}}}} \right]. \end{align} The terms at the right hand side of (\ref{eqn:out_K_o1}) will be derived one by one as follows. \subsubsection{${\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{\Theta _{{o_2},k}}} \right]}$} From information-theoretical perspective, an outage event happens when the mutual information is less than the transmission rate. Herein, ${\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{\Theta _{{o_2},k}}} \right]}$ represents the outage probability of user 1 after SIC given that decoding ${\bf s}_2$ by user 1 consumed $l$ HARQ rounds and decoding ${\bf s}_2$ by user 2 consumed $k$ HARQ rounds. Note that $l \le k$ should be satisfied in this case. With the signal model in Section \ref{sec:sys_mod}, ${\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{\Theta _{{o_2},k}}} \right]}$ can be obtained as \begin{equation}\label{eqn:outage_o1_1} {\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{\Theta _{{o_2},k}}} \right]} = \mathbb P\left[ {\begin{array}{*{20}{c}} {\bigcap\limits_{j = l}^k {\mathcal I\left( {\gamma _{{o_1},j,1}^{(I)}} \right) < {R_1}} ,\bigcap\limits_{j = k + 1}^K {\mathcal I\left( {\gamma _{{o_1},j,1}^{\left( {II} \right)}} \right) < {R_1}} ,\bigcap\limits_{j = 1}^{l - 1} {\mathcal I\left( {\gamma _{{o_1},j,2}^{(I)}} \right) < {R_2}} ,}\\ {\mathcal I\left( {\gamma _{{o_1},l,2}^{(I)}} \right) \ge {R_2},\bigcap\limits_{j = 1}^{k - 1} {\mathcal I\left( {\gamma _{{o_2},j,2}^{(I)}} \right) < {R_2}}, \mathcal I\left( {\gamma _{{o_2},k,2}^{(I)}} \right) \ge {R_2}} \end{array}} \right], \end{equation} where $\mathcal I(\gamma) = {\log _2}\left( {1 + \gamma } \right)$ denotes the mutual information given SINR $\gamma$. It is challenging to derive (\ref{eqn:outage_o1_1}) because of the correlated SINRs, i.e., ${\gamma _{{o_1},j,1}^{(I)}}, {\gamma _{{o_1},j,1}^{\left( {II} \right)}}, {\gamma _{{o_1},j,2}^{(I)}}$ and ${\gamma _{{o_2},j,2}^{(I)}}$, whose correlations stem from the temporally and spatially correlated interference, as pointed out in Section \ref{sec:sys_mod}. Thanks to the tractability provided by stochastic geometry, (\ref{eqn:outage_o1_1}) can be derived in closed-form in Appendix \ref{app:outage_o1_1_f} as \begin{multline}\label{eqn:out_in_ex_manifin} {\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{\Theta _{{o_2},k}}} \right]} =\\ {\left[ \begin{array}{l} \sum\limits_{{\tau _1} = 0}^{l - 1} {\sum\limits_{{\tau _2} = 0}^{k - l} {\sum\limits_{{\tau _3} = 0}^{K - k} {\sum\limits_{{\tau _4} = 0}^{k - 1} {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^4 {{\tau _j}} }}C_{l - 1}^{{\tau _1}}C_{k - l}^{{\tau _2}}C_{K - k}^{{\tau _3}}C_{k - 1}^{{\tau _4}}} } } } \times\\ {\left(\Psi \left( {{{\bf{U}}_a},{\boldsymbol \tau _a};{\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_2}} \right)}}},{\tau _4} + 1} \right) - \Psi \left( {{{\bf{U}}_a},{\boldsymbol \tau _b};{\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_2}} \right)}}},{\tau _4} + 1} \right)\right)} \end{array} \right]^ + }, \end{multline} where ${\boldsymbol{\tau }}_a = \left( {{\tau _1}+1,{\tau _2},{\tau _3}} \right)$, ${{\boldsymbol{\tau }}_b} = \left( {{\tau _1},{\tau _2}{\rm{ + }}1,{\tau _3}} \right)$ and $ {\bf{U}}_a = \left( {\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_1}} \right)}},\frac{{{2^{{R_1}}} - 1}}{{{\beta ^2}\ell \left( {{d_1}} \right)}},\frac{{{2^{{R_1}}} - 1}}{{\ell \left( {{d_1}} \right)}}} \right)$. Herein, it should be mentioned that ${1 - {2^{{R_2}}}{\beta ^2}} > 0$, otherwise user 1 is unable to mitigate the NOMA interference ${\bf s}_2$. In addition, the function of $\Psi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat {\boldsymbol \tau} )$ is defined as \begin{equation}\label{eqn:genr_decoding_scu1} \Psi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat {\boldsymbol \tau} ) = e^{{ - \frac{{{\sigma ^2}}}{P}\left( {{{\bf{U}}\boldsymbol \tau}^{\rm{T}} + {{\hat {\bf{U}}}}\hat{\boldsymbol \tau}^{\rm{T}} } \right) - \lambda \varphi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat{\boldsymbol \tau} )} , \end{equation} where ${\bf U} = (U_1,\cdots,U_N)$, ${\boldsymbol \tau} = (\tau_1,\cdots,\tau_N)$, $\hat{\bf U} = (\hat U_1,\cdots,\hat U_M)$, $\hat{\boldsymbol \tau} = (\hat \tau_1,\cdots,\hat \tau_M)$, and \begin{equation}\label{eqn:varphi_given} \varphi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat{\boldsymbol \tau} ) = \int\nolimits_{{\mathbb R^2}} {\left( \begin{array}{l} 1 - \prod\limits_{n = 1}^N {\frac{1}{{{{\left( {1 + {U_n}\ell \left( {\left\| u \right\|} \right)} \right)}^{{\tau _n}}}}}} \prod\limits_{n = 1}^M {\frac{1}{{{{\left( {1 + {{\hat U}_n}\ell \left( {\left\| {u + {o_1} - {o_2}} \right\|} \right)} \right)}^{{{\hat \tau }_n}}}}}} \end{array} \right)du}. \end{equation} \subsubsection{${\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{\Theta _{{o_2},k}}} \right]}$} Once user 2 succeeds in decoding ${\bf s}_2$ after $k$ HARQ rounds, the source device will deliver only ${\bf s}_1$ in subsequent retransmissions, which will be straightforward decoded at user 1 without the use of SIC. Accordingly, ${\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{\Theta _{{o_2},k}}} \right]}$ can be written as \begin{equation}\label{eqn:outage_o1_2} {\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{\Theta _{{o_2},k}}} \right]} = \mathbb P\left[ {\begin{array}{*{20}{c}} {\bigcap\limits_{j = k + 1}^K {\mathcal I\left( {\gamma _{{o_1},j,1}^{(\Rmnum{2})}} \right) < {R_1}} ,} {\bigcap\limits_{j = 1}^k {\mathcal I\left( {\gamma _{{o_1},j,2}^{(I)}} \right) < {R_2}} ,}\\ {\bigcap\limits_{j = 1}^{k - 1} {\mathcal I\left( {\gamma _{{o_2},j,2}^{(I)}} \right) < {R_2}} ,\mathcal I\left( {\gamma _{{o_2},k,2}^{(I)}} \right) \ge {R_2},} \end{array}} \right]. \end{equation} With the same approach in Appendix \ref{app:outage_o1_1_f}, (\ref{eqn:outage_o1_2}) can be derived as \begin{multline}\label{eqnp112out1fin} {\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{\Theta _{{o_2},k}}} \right]} = \sum\limits_{{\tau _1} = 0}^{K - k} {\sum\limits_{{\tau _2} = 0}^k {\sum\limits_{{\tau _3} = 0}^{k - 1} {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^3 {{\tau _j}} }}C_{K - k}^{{\tau _1}}C_k^{{\tau _2}}C_{k - 1}^{{\tau _3}}}\times } } \\ \quad \Psi \left( {\left( {\frac{{{2^{{R_1}}} - 1}}{{\ell \left( {{d_1}} \right)}},\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_1}} \right)}}} \right),\left( {{\tau _1},{\tau _2}} \right);\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_2}} \right)}},{\tau _3} + 1} \right). \end{multline} \subsubsection{${\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{{\bar \Theta }_{{o_2}}}} \right]}$}\label{subsec:p3} When user 1 successfully decodes ${\bf s}_2$ after $l$ HARQ rounds, it means that user 1 can fully eliminate the NOMA interference in the current and subsequent HARQ rounds utilized to decode ${\bf s}_1$, which improves the outage probability. Therefore, ${\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2, l}} ,{{\bar \Theta }_{{o_2}}}} \right]}$ can be expressed as \begin{equation}\label{eqn:outage_o1_3} {\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{{\bar \Theta }_{{o_2}}}} \right]} = \mathbb P\left[ {\begin{array}{*{20}{c}} {\bigcap\limits_{j = l}^K {\mathcal I\left( {\gamma _{{o_1},j,1}^{(I)}} \right) < {R_1}} ,} \bigcap\limits_{j = 1}^{l - 1} {\mathcal I\left( {\gamma _{{o_1},j,2}^{(I)}} \right) < {R_2}} ,\\\mathcal I\left( {\gamma _{{o_1},l,2}^{(I)}} \right) \ge {R_2}, {\bigcap\limits_{j = 1}^K {\mathcal I\left( {\gamma _{{o_2},j,2}^{(I)}} \right) < {R_2}} } \end{array}} \right]. \end{equation} Likewise, (\ref{eqn:outage_o1_3}) can be derived as \begin{align}\label{eqn:out_o1_3_fin} &{\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{{\bar \Theta }_{{o_2}}}} \right]} = \notag \\ & \quad \quad \quad {\left[ {\begin{array}{*{20}{l}} {\sum\limits_{{\tau _1} = 0}^{l - 1} {\sum\limits_{{\tau _2} = 0}^{K - l} {\sum\limits_{{\tau _3} = 0}^K {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^3 {{\tau _j}} }}C_{l - 1}^{{\tau _1}}C_{K - l}^{{\tau _2}}C_K^{{\tau _3}}} } } \times }\\ {\left( \Psi \left( {{{\bf{U}}_b},{\boldsymbol \tau _c};\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_2}} \right)}},{\tau _3}} \right) - \Psi \left( {{{\bf{U}}_b},{\boldsymbol \tau _d};\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_2}} \right)}},{\tau _3}} \right) \right)} \end{array}} \right]^ + }, \end{align} where ${\boldsymbol \tau _c} = \left( {{\tau _1}+1,{\tau _2}} \right)$, ${\boldsymbol \tau _d} = \left( {{\tau _1},{\tau _2} + 1} \right)$ and ${{\bf{U}}_b} = \left( {\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_1}} \right)}},\frac{{{2^{{R_1}}} - 1}}{{{\beta ^2}\ell \left( {{d_1}} \right)}}} \right)$. \subsubsection{$\mathbb P \left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{{\bar \Theta }_{{o_2}}}} \right]$}\label{subsec:p4} If user 1 fails to mitigate the NOMA interference and user 2 fails to decode its own message after $K$ transmissions, it is impossible for user 1 to decode ${\bf s}_1$. Thus $\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{{\bar \Theta }_{{o_2}}}} \right]$ is expressed as \begin{equation}\label{eqn:outage_o1_4} \mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{{\bar \Theta }_{{o_2}}}} \right] = \mathbb P\left[ {\begin{array}{*{20}{c}} {\bigcap\limits_{j = 1}^K {\mathcal I\left( {\gamma _{{o_1},j,2}^{(I)}} \right) < {R_2}} }, {\bigcap\limits_{j = 1}^K {\mathcal I\left( {\gamma _{{o_2},j,2}^{(I)}} \right) < {R_2}} } \end{array}} \right]. \end{equation} Similarly, (\ref{eqn:outage_o1_4}) can finally be derived as \begin{equation}\label{eqn:out_o1_4_fin} \mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{{\bar \Theta }_{{o_2}}}} \right] =\sum\limits_{{\tau _1} = 0}^K {\sum\limits_{{\tau _2} = 0}^K {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^2 {{\tau _j}} }}C_K^{{\tau _1}}C_K^{{\tau _2}}} } \Psi \left( {\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_1}} \right)}},{\tau _1};\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_2}} \right)}},{\tau _2}} \right). \end{equation} \subsection{The outage event ${{ \mathcal{O}_{K,o_2}}}$} Similar to (\ref{eqn:out_K_o1}), the probability of outage event at user 2, i.e., ${\mathcal{O}_{K,{o_2}}}$, can be obtained by using law of total probability as \begin{multline}\label{eqn:pout_o2} {\mathcal{O}_{K,{o_2}}} = \mathbb P[\bar \Theta_{o_2}] =\mathbb P \left[ {\left( {\bigcup\limits_{k = 1}^K {{\Theta _{{o_1},1,k}}} } \right)\bigcup {{{\bar \Theta }_{{o_1},1}}} ,\left( {\bigcup\limits_{l = 1}^K {{\Theta _{{o_1},2,l}}} } \right)\bigcup {{{\bar \Theta }_{{o_1},2}}} ,{{\bar \Theta }_{{o_2}}}} \right] \\ =\sum\limits_{l = 1}^K {\sum\limits_{k = l}^K {\mathbb P\left[ {{\Theta _{{o_1},1,k}} ,{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]} } + \sum\limits_{l = 1}^K {\mathbb P\left[ {{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}} \right]} + \mathbb P\left[ {{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{{{\bar \Theta }_{{o_2}}}} \right], \end{multline} where the last step holds because of ${\Theta _{{o_1},1,k}}\bigcap {{\Theta _{{o_1},2,l}}} = \emptyset$ if $k < l$ and ${\Theta _{{o_1},1,k}}\bigcap {{{\bar \Theta }_{{o_1},2}}} \bigcap {{{\bar \Theta }_{{o_2}}}} =\emptyset$. Noting that ${\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{{\bar \Theta }_{{o_2}}}} \right]}$ and $\mathbb P \left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{{\bar \Theta }_{{o_2}}}} \right]$ have been derived in Sections \ref{subsec:p3} and \ref{subsec:p4}, respectively. Hence, the remaining term is ${\mathbb P\left[ {{ \Theta }_{{o_1},1,k}},{\Theta _{{o_1},2,l}} ,{{\bar \Theta }_{{o_2}}} \right]}$, which is derived in the sequel. Suppose that user 1 successfully decodes ${\bf s}_2$ after $l$ HARQ rounds and ${\bf s}_1$ in the $k$-th HARQ round with SIC, where $k \ge l$. Thereupon, user 1 and the source device cooperate to deliver the message to user 2 in the subsequent transmissions. In this case, the outage probability of user 2 after $K$ HARQ rounds, i.e., ${\mathbb P\left[ {{\Theta _{{o_1},1,k}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]}$, is obtained explicitly by considering the two cases of whether $k=l$ or not. Firstly, if $k=l$, it means that user 1 successfully subtracts NOMA interference and decodes ${\bf s}_1$ at the same HARQ round, ${\mathbb P\left[{{\Theta _{{o_1},1,l}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]}$ can thus be derived as \begin{equation}\label{eqn:out_o2_1_case1} {\mathbb P\left[{{\Theta _{{o_1},1,l}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]} = \mathbb P\left[ {\begin{array}{*{20}{c}} {\bigcap\limits_{j = 1}^l {{\cal I}\left( {\gamma _{{o_2},j,2}^{(I)}} \right) < {R_2}} ,\bigcap\limits_{j = l + 1}^K {{\cal I}\left( {\gamma _{{o_2},j,2}^{\left( {II} \right)}} \right) < {R_2}} ,}\\ {\bigcap\limits_{j = 1}^{l - 1} {{\cal I}\left( {\gamma _{{o_1},j,2}^{(I)}} \right) < {R_2}} ,{\cal I}\left( {\gamma _{{o_1},l,2}^{(I)}} \right) \ge {R_2},} {{\cal I}\left( {\gamma _{{o_1},l,1}^{(I)}} \right) \ge {R_1}} \end{array}} \right]. \end{equation} By applying the method introduced in Appendix \ref{app:outage_o1_1_f}, we have \begin{multline}\label{eqn:out_o1_3fin} {\mathbb P\left[ {{\Theta _{{o_1},1,l}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]} = \sum\limits_{{\tau _1} = 0}^{l - 1} {\sum\limits_{{\tau _2} = 0}^l {\sum\limits_{{\tau _3} = 0}^{K - l} {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^3 {{\tau _j}} }}C_{l - 1}^{{\tau _1}}C_l^{{\tau _2}}C_{K - l}^{{\tau _3}}} \times} } \\ \Psi \left( \begin{array}{l} \left( {\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_1}} \right)}},\max \left\{ {\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_1}} \right)}},\frac{{{2^{{R_1}}} - 1}}{{{\beta ^2}\ell \left( {{d_1}} \right)}}} \right\}} \right),\left( {{\tau _1},1} \right);\\ \left( {\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_2}} \right)}},\frac{{{2^{{R_2}}} - 1}}{{\ell \left( D \right){ + \ell \left( {{d_2}} \right)}}}} \right),\left( {{\tau _2},{\tau _3}} \right) \end{array} \right), \end{multline} On the other hand, if $k>l$, that is, the events of the successful message decoding and NOMA interference cancellation at user 1 occur in two different HARQ rounds, ${\mathbb P\left[{{\Theta _{{o_1},1,k}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]}$ can be expressed as \begin{equation}\label{eqn:out_o2_1_case2} {\mathbb P\left[{{\Theta _{{o_1},1,k}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]} = \mathbb P\left[ {\begin{array}{*{20}{c}} {\bigcap\limits_{j = 1}^k {\mathcal I\left( {\gamma _{{o_2},j,2}^{(I)}} \right) < {R_2}} ,\bigcap\limits_{j = k + 1}^K {\mathcal I\left( {\gamma _{{o_2},j,2}^{(\Rmnum{2})}} \right) < {R_2}} , \bigcap\limits_{j = 1}^{l - 1} {\mathcal I\left( {\gamma _{{o_1},j,2}^{(I)}} \right) < {R_2}} ,}\\ {\mathcal I\left( {\gamma _{{o_1},l,2}^{(I)}} \right) \ge {R_2},} {\bigcap\limits_{j = l}^{k - 1} {\mathcal I\left( {\gamma _{{o_1},j,1}^{(I)}} \right) < {R_1}} ,\mathcal I\left( {\gamma _{{o_1},k,1}^{(I)}} \right) \ge {R_1}} \end{array}} \right]. \end{equation} Similarly, ${\mathbb P\left[{{\Theta _{{o_1},1,k}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]}$ can be eventually derived as \begin{equation}\label{eqn:out_o1_3finkll} {\mathbb P\left[{{\Theta _{{o_1},1,k}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]} =\\ \left[\begin{array}{l} \sum\limits_{{\tau _1} = 0}^{l - 1} {\sum\limits_{{\tau _2} = 0}^{k - l - 1} {\sum\limits_{{\tau _3} = 0}^k {\sum\limits_{{\tau _4} = 0}^{K - k} {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^4 {{\tau _j}} }}C_{l - 1}^{{\tau _1}}C_{k - l - 1}^{{\tau _2}}C_k^{{\tau _3}}C_{K - k}^{{\tau _4}}} } } }\\ \quad \times \left( {\Psi \left( {{{\bf{U}}_d},{\boldsymbol \tau _f};{{\bf{U}}_c},{\boldsymbol \tau _e}} \right) - \Psi \left( {{{\bf{U}}_d},{\boldsymbol \tau _g};{{\bf{U}}_c},{\boldsymbol \tau _e}} \right)} \right) \end{array}\right]^+, \\ k > l, \end{equation} where ${{\boldsymbol{\tau }}_e} = \left( {{\tau _3},{\tau _4}} \right)$, ${{\boldsymbol{\tau }}_f} = \left( {{\tau _1}+1,{\tau _2} + 1} \right)$ and ${{\boldsymbol{\tau }}_g} = \left( {{\tau _1},{\tau _2} + 2} \right)$, ${{\bf{U}}_c} = \left( {\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_2}} \right)}},\frac{{{2^{{R_2}}} - 1}}{{\ell \left( D \right){ + \ell \left( {{d_2}} \right)}}}} \right)$ and ${{\bf{U}}_d} = \left( {\frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_1}} \right)}},\frac{{{2^{{R_1}}} - 1}}{{{\beta ^2}\ell \left( {{d_1}} \right)}}} \right)$. \subsection{The outage event ${{\mathcal{O}_{K,o_1,o_2}}}$} Analogous to (\ref{eqn:out_K_o1}) and (\ref{eqn:pout_o2}), it follows by using law of total probability that \begin{align}\label{eqn:out_o1_o2_rew} {\mathbb \mathcal{O}_{K,{o_1},{o_2}}} &= \mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_2}}}} \right] = \mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\left( {\bigcup\limits_{l = 1}^K {{\Theta _{{o_1},2,l}}} } \right)\bigcup {{{\bar \Theta }_{{o_1},2}}} },{{\bar \Theta }_{{o_2}}}} \right]\notag\\ &= \sum\limits_{l = 1}^K {\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]} + \mathbb P\left[ {{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{{{\bar \Theta }_{{o_2}}}} \right], \end{align} where ${\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}},{{\bar \Theta }_{{o_2}}}} \right]}$ and $\mathbb P\left[ {{\bar \Theta }_{{o_1},1}},{{\bar \Theta }_{{o_1},2}},{{{\bar \Theta }_{{o_2}}}} \right]$ have been given by (\ref{eqn:out_o1_3_fin}) and (\ref{eqn:out_o1_4_fin}), respectively. Accordingly, the outage probabilities ${{\mathcal{O}_{K,o_1}}}$, ${{\mathcal{O}_{K,o_2}}}$ and ${{\mathcal{O}_{K,o_1,o_2}}}$ can be calculated by using (\ref{eqn:out_K_o1}), (\ref{eqn:pout_o2}) and (\ref{eqn:out_o1_o2_rew}), respectively. Substituting them into (\ref{eqn:noma_harq_throughput}) yields the LTAT of the proposed scheme. In order to evaluate the outage probabilities, it essentially resorts to the calculation of the double integral of $\varphi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat{\boldsymbol \tau} )$ in (\ref{eqn:varphi_given}). Unfortunately, the double integral representation of (\ref{eqn:varphi_given}) entails a high computational complexity on the performance evaluation. Alternatively, we propose an accurate approximation approach to compute (\ref{eqn:varphi_given}) effectively. Since it is usually expected that NOMA users are not far away from each other due to the exploitation of cooperative communications, i.e., small $D$, we have the following theorem to obtain an accurate approximation of $\varphi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat{\boldsymbol \tau} )$. \begin{theorem}\label{the:app} For small $D$, $\varphi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat{\boldsymbol \tau} )$ in (\ref{eqn:varphi_given}) can be written as \begin{multline}\label{eqn:varphi_0} \varphi ({\bf{U}},{\boldsymbol \tau} ;{\bf{\hat U}},\hat {\boldsymbol \tau} ) \approx \varphi (\tilde{\bf{U}},\tilde{\boldsymbol \tau};{\bf{0}},{\bf{0}} ) = \pi{\rm{B}}\left( {1 - \frac{2}{\alpha },\sum\limits_{\iota = 1}^{N+M} {{\tilde \tau _\iota }} + 1} \right)\sum\limits_{\kappa = 1}^{N+M} {{{{\tilde \tau _\kappa }{\tilde U_\kappa }{\tilde U_\mu }^{\frac{2}{\alpha } - 1}}} }\times \\ F_D^{\left( {{N+M} - 1} \right)}\left( {1 - \frac{2}{\alpha },\left( {{\tilde \tau _\iota } + {\delta _{\iota - \kappa }}} \right)_{\iota = 1,\iota \ne \mu }^{N+M};\sum\limits_{\iota = 1}^{N+M} {{\tilde \tau _\iota }} + 1;\left( {1 - \frac{{{\tilde U_\iota }}}{{{\tilde U_\mu }}}} \right)_{\iota = 1,\iota \ne \mu }^{N+M}} \right), \end{multline} wherein $\tilde{\bf U} = ({\bf U},\hat{\bf U})=(\tilde U_1,\cdots,\tilde U_{N+M})$ and $\tilde{\boldsymbol \tau} = ({\boldsymbol \tau},\hat{\boldsymbol \tau})=(\tilde \tau_1,\cdots,\tilde \tau_{N+M})$, ${{\delta }_s}$ denotes Dirac function, $F_D^{({N})}(\cdot)$ denotes the fourth kind of Lauricella function \cite[Eq. A.52]{mathai2009h} and ${\rm B}(a,b) = \frac{\Gamma(a)\Gamma(b)}{\Gamma(a+b)}$ represents Beta function. \end{theorem} \begin{proof} Please see Appendix \ref{app:proof_o1eqo2}. \end{proof} It is worth noting that the simple and closed-form expression of $\varphi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat{\boldsymbol \tau} )$ can significantly facilitate later optimal system design. \section{Numerical Results and Discussions}\label{sec:num} This section first validates the developed mathematical model via independent system level simulations. Numerical results are also presented to demonstrate the effect of interference on NOMA performance as well as to quantify the gains offered by the proposed NOMA scheme. The proposed interference-aware design for the cooperative HARQ-assisted NOMA scheme is then presented. Note that the approximation approach of (\ref{eqn:varphi_0}) in Theorem \ref{the:app} is utilized to optimize system performance, including the maximization of LTAT and the maximization of ASE. Unless otherwise specified, the network parameters are selected as follows: $d_1=5$m, $d_2 = 10$m, $R_1 = 4R_2 = 2$ bps/Hz, $D=10$m, $\beta^2=0.3$ and $\lambda=5*10^{-5}{{\rm m}^{-2}}$. \subsection{Verification} In Fig. \ref{fig:ver_ltat}, the LTAT is plotted against the transmit signal-to-noise $\frac{P}{\sigma^2}$ (SNR, the ratio of transmit power to AWGN power) for different $K$, where Monte Carlo simulations are conducted to confirm the analysis. With regard to the approximation approach for $K=1$, it is readily found from (\ref{eqn:varphi_11}) that the approximation in (\ref{eqn:varphi_0}) becomes an equality, and hence, the exact results for $K=1$ can be obtained with (\ref{eqn:varphi_0}). Clearly, Fig. \ref{fig:ver_ltat} shows an excellent agreement between the simulation results and the exact results, and justifies the accuracy of the approximation results as well. Not surprisingly, the LTAT can be improved through increasing the transmit SNR, while it saturates in high SNR regime at a value lower than the sum of transmission rates, i.e., $R_1 + R_2 = 2.5 $bps/Hz, due to the interference incurred by other active D2D transmitters. Additionally, as shown in Fig. \ref{fig:ver_ltat}, we should pay attention to the fact that the increase of the maximal number of transmissions $K$ may yield the deterioration of the LTAT because of the intricate relationship between $\eta$ and $K$. This is essentially due to (\ref{eqn:thr_rew}) that shows that increasing the maximal number of transmissions allows more information bits to be successfully delivered, nevertheless, the average number of transmissions ${{\mathbb E\left( \mathcal T \right)}}$ increases. The contradictory effects of increasing $K$ thus result in different tendencies of $\eta$ with respect to $K$ under low SNR and under high SNR. More specifically, the increase of $K$ is favorable for $\eta$ below a certain SNR threshold, whereas continuing to increase SNR would become counterproductive for $\eta$. \begin{figure*}[t!] \centering \begin{subfigure}[t]{0.45\textwidth} \centerline{\includegraphics[width= 3 in]{./verifi_LTAT}} \caption{\, LTAT $\eta$.} \label{fig:ver_ltat} \end{subfigure} ~ \begin{subfigure}[t]{0.45\textwidth} \centerline{\includegraphics[width= 3.1 in]{./verifi_out1}}\caption{\, Outage probability $\mathcal{O}_{K,o_i}$.} \label{fig:ver_out} \end{subfigure} \caption{The effect of transmit SNR $\frac{P}{\sigma^2}$.} \label{start_fig} \end{figure*} Fig. \ref{fig:ver_out} illustrates the outage probabilities of the two NOMA users versus the transmit SNR. The figure further verifies the accuracy of the exact and approximation results. It is easily seen that the outage probabilities of both two users decrease with the transmit SNR but would converge to certain outage floors in high SNR regime due to the co-channel interference, as elucidated in Fig. \ref{fig:ver_ltat}. Moreover, unlike Fig. \ref{fig:ver_ltat}, the outage probabilities can be significantly reduced through increasing the maximal number of transmissions, which manifests the improved reliability offered by HARQ. \subsection{Effect of Spatially and Temporally Correlated Interference} Considering temporal and spatial correlation among interferences across all HARQ rounds is important to reveal the true system performance. To illustrate the adverse impact of spatially and temporally correlated interference, Figs. \ref{fig:sptepcorr_ltat} and \ref{fig:sptepcorr_out} compare, respectively, the LTAT $\eta$ and outage probability $\mathcal{O}_{K,o_i}$ of the considered correlated interference model with those of two other simpler interference models that i) ignore the effect of co-channel interferences (labeled as ``No Inter.'' in figures), and ii) ignore the spatial and temporal correlation in co-channel interferences (labeled as ``No Corr.'' in figures). As shown in the two figures, the two simpler interference models provide an unrealistic overestimate of the NOMA performance compared to actual performance especially in high SNR regime. For instance, Fig. \ref{fig:sptepcorr_ltat} shows that the models ignoring interference correlation and assuming no interference overestimate the true performance of LTAT by up to 2\% and 10\%, respectively. Fig. \ref{fig:sptepcorr_out} shows that the actual outage probability is considerably higher than the two simpler interference models by roughly $10^3$\texttildelow$10^4$ times for a fixed value of transmit SNR $\frac{P}{\sigma^2}=40$dB. This is because the temporal and spatial correlation in interferences captures the diversity losses due to the fixed interferers locations~\cite{tanbourgi2014effect}. Therefore, accounting for the spatial and temporal correlation is mandatory to reveal the true system performance. \begin{figure*}[t!] \centering \begin{subfigure}[t]{0.45\textwidth} \centerline{\includegraphics[width= 3 in]{./sptemp_corr_imp_ltat2}} \caption{\, LTAT $\eta$.} \label{fig:sptepcorr_ltat} \end{subfigure} ~ \begin{subfigure}[t]{0.45\textwidth} \centerline{\includegraphics[width= 3 in]{./sptemp_corr_imp_out2}}\caption{\, Outage probability $\mathcal{O}_{K,o_i}$.} \label{fig:sptepcorr_out} \end{subfigure} \caption{Effect of spatial and temporal interference correlation.} \end{figure*} \subsection{Comparison with non-cooperative HARQ assisted NOMA} In order to quantify the value of cooperation, the performance of the proposed scheme is compared with that of non-cooperative HARQ assisted NOMA scheme in this subsection by assuming $\frac{P}{\sigma^2} = 30$dB. It is worth noticing that the throughput and outage analyses in Section \ref{sec:per_ana} are also applicable to the non-cooperative HARQ assisted NOMA scheme by setting the transmit power at the relay (i.e., user 1) in phase II to zero. Figs. \ref{fig:comp_coopltat} and \ref{fig:comp_coopout} show the comparison between the two schemes in terms of the LTAT and the outage probability, respectively. It is readily seen in both figures that the proposed cooperative scheme outperforms the non-cooperative HARQ assisted NOMA scheme. For instance, the proposed scheme can reduce the outage probability by up to 32\% given $K=4$, compared with the non-cooperative HARQ assisted NOMA scheme. In addition, the LTAT and the outage probability $\mathcal{O}_{K,o_2}$ of the non-cooperative HARQ assisted NOMA scheme remain constant when the inter-device separation distance $D$ varies, because the link between two NOMA users is not utilized to retransmit the message of user 2. Whereas the increase of $D$ will degrade the performance of the proposed scheme because of the rising path loss in relaying phase. It is worth noting that the outage probability of user 1 is independent of $D$ because user 2 does not decode nor relay user 1 message. Furthermore, Figs. \ref{fig:comp_coopltat} and \ref{fig:comp_coopout} also justify the accuracy of the approximate expressions in Theorem \ref{the:app}. \begin{figure*}[t!] \centering \begin{subfigure}[t]{0.45\textwidth} \centerline{\includegraphics[width= 3 in]{./top_coop_ltat}} \caption{\, LTAT $\eta$.} \label{fig:comp_coopltat} \end{subfigure} ~ \begin{subfigure}[t]{0.45\textwidth} \centerline{\includegraphics[width= 3.05 in]{./top_coop_out3}}\caption{\, Outage probability $\mathcal{O}_{K,o_i}$.} \label{fig:comp_coopout} \end{subfigure} \caption{Effect of inter-user distance $D$.} \label{end_fig} \end{figure*} \subsection{Maximization of LTAT} Figs. \ref{start_fig} - \ref{end_fig} confirm the high accuracy of the approximation approach of (\ref{eqn:varphi_0}). The simple and closed-form expression of (\ref{eqn:varphi_0}) enables the effective evaluation of outage probabilities compared with the double integral representation of (\ref{eqn:varphi_given}). Thus we apply the approximation approach to facilitate the optimal NOMA design in the sequel. As seen in Fig. \ref{fig:ver_ltat}, the increase of the maximal number of HARQ transmissions may decrease the LTAT. In order to combat the negative impact of co-channel interference and fully exploit the benefit of cooperative HARQ, an interference aware optimal design is proposed herein. Particularly the LTAT is maximized through properly choosing system parameters while maintaining the quality of service. By taking the optimal rate selection as an example, the LTAT is maximized by optimally selecting transmission rates given the predetermined power allocation coefficient $\beta^2$, while guaranteeing outage constraints and the implementation of NOMA protocol. Mathematically, the optimization problem can be formulated as \begin{equation}\label{eqn:opt_prob_simp} \begin{array}{*{20}{cl}} {\mathop {\rm maximize}\limits_{R_1, R_2} }&{\eta}\\ {{\rm{subject}}\,{\rm{to}}}&{\mathcal{O}_{K,o_i} \le \varepsilon_i},\, i= 1,2\\ {}&{0 \le \beta^2 < 2^{-R_2}},\\ \end{array} \end{equation} where $\varepsilon_i$ denotes the maximal allowable outage probability for user $i$. For comparison, the HARQ assisted orthogonal multiple access (OMA) scheme is also implemented, where OMA scheme could be TDMA and Orthogonal frequency-division multiple access (OFDMA) \cite{saito2013non} etc. Unlike the proposed scheme, the HARQ assisted OMA transmission does not require the near user to decode the message of the far user first. Therefore, the near user can not help the source device deliver the message to exploit extra spatial diversity from cooperative communications. The LTAT of the HARQ assisted OMA scheme is derived in Appendix \ref{app:ltat_tdma}. For the fairness of the comparison, the same coefficient $\beta^2$ is introduced to allocate the orthogonal resources (bandwidth/time) in the OMA scheme. Moreover, we assume the same outage constraints for two users, i.e., $\varepsilon_1=\varepsilon_2=\varepsilon$. Fig. \ref{fig:ver_rate_comp} manifests the superiority of the optimal LTAT achieved by the proposed scheme over that of the OMA scheme under optimal rate selection. For instance, the proposed scheme yields an approximately $47$\% throughput gain when $\frac{P}{\sigma^2}=60$dB and $K=4$, compared with the OMA scheme. In addition, increasing the maximal number of transmissions is in favor of the optimal LTAT no matter under the proposed scheme or under the OMA scheme. It is important to note that the designs based on the `No Inter.' and `No Corr.' violate the outage probability constraints, and hence, the corresponding LTATs are not plotted in Fig. \ref{fig:ver_rate_comp}. Particularly, the outage probabilities $\mathcal O_{K,o_1}$ corresponding to $K=4$ for `No Inter.' and `No Corr.', respectively, are $0.2$ and $0.05$, which greatly exceed the outage constraint $\varepsilon=0.01$. Hence, totally ignoring the interference or just ignoring the interference correlation lead to an infeasible network design by violating the network operational constraints. To summarize, Fig. \ref{fig:ver_rate_comp} reveals the superior performance of the proposed interference aware design under the assumption of statistical CSI available at transmitter. It is worth noting that the same conclusion holds true if perfect CSI is known at transmitter \cite{ding2015cooperative}. \begin{figure} \centering \includegraphics[width=3in,height=2.4in]{./rate_sele_comp} \caption{The maximal LTAT via the optimal rate selection with $\beta^2=0.3$ and $\varepsilon=0.01$.}\label{fig:ver_rate_comp} \end{figure} Furthermore, power allocation coefficient $\beta^2$ can also be optimally selected to maximize the LTAT given the desired transmission rates. However, it should be noticed that the joint optimal rate and power allocation for LTAT maximization may result in less or no information (or power) delivered (or allocated) to the far user with poor channel condition. Indeed, this is not beyond our expectation when user fairness (e.g., target transmission rate for each user) is not considered. Without fairness constraint, the joint optimization of the power and rate would aggressively allocate most of power to the user with better channel condition, which behaves like waterfilling algorithm regardless of user fairness \cite{ji2015power} and violates the intention of NOMA protocol \cite{timotheou2015fairness,cui2016novel,yang2016general,islam2016power}. This interesting phenomenon can be observed in Table \ref{tab:joint_power_rate} for the proposed scheme, where the notation ``$-$'' denotes no feasible solution. Without any exceptions, the conclusion is also applicable to the OMA scheme. For further illustration, the joint power and rate optimization of the OMA system with $K=1$ is examined as an example in the following remark. \begin{remark}\label{rem:joint_power} For joint power and rate optimization of the OMA scheme to maximize the throughput with $K=1$ and $\varepsilon_1=\varepsilon_2=\varepsilon$, it is proved in Appendix \ref{app:joint_power} that no power would be allocated to convey information to the far user with worse channel condition, and the optimal transmission rate for the far user is zero, i.e., ${\beta^*}^2=1$ and ${R_2}^*=0$bps/Hz. \end{remark} \begin{table}[h!] \centering \caption{The optimal ${\beta}^2$ under joint power and rate optimization for $K=2$.} \begin{tabular}{c||ccc} &\multicolumn{3}{c}{Transmit SNR $\frac{P}{\sigma^2}$}\\ \hline Outage Tolerance $ \varepsilon$&0{dB} &30{dB} & 60{dB}\\ \hline $0.1$&-&1.0000 &0.9999\\ $0.01$&-&1.0000 &1.0000\\ \end{tabular} \label{tab:joint_power_rate} \end{table} \subsection{Maximization of ASE} Aside from the LTAT, the ASE is another useful metric to characterize the performance of the whole D2D network \cite{andrews2010primer}. Specifically, the ASE of the D2D network is given by \begin{equation}\label{eqn:network_througput} \Delta = \lambda \eta . \end{equation} Inspired by (\ref{eqn:opt_prob_simp}), the intensity of D2D transmitters can also be jointly designed to maximize the ASE, such that \begin{equation}\label{eqn:network_throghput_simp} \begin{array}{*{20}{cl}} {\mathop {\rm maximize}\limits_{R_1, R_2,\lambda} }&{\Delta}\\ {{\rm{subject}}\,{\rm{to}}}&{\mathcal{O}_{K,o_i} \le \varepsilon_i},\, i= 1,2\\ {}&{0 \le \beta^2 < 2^{-R_2}}.\\ \end{array} \end{equation} In Fig. \ref{fig:net_rate_comp}, the optimal ASE is plotted against the transmit SNR via optimal design of transmission rates and intensity. It is observed in Fig. \ref{fig:net_rate_comp} that increasing $K$ and relaxing $\varepsilon$ could significantly improve the optimal ASE. Moreover, it is intuitive that increasing the transmit SNR will enhance the optimal ASE. However, the gain turns out to be negligible in high SNR regime. This is because increasing the transmit SNR not only improves the received SNR but also boosts the interference, and consequently SINR does not vary. Similar to the LTAT scenario, ASE maximization based on `No Corr.' model would violate the outage probability constraints, and hence, lead to an infeasible solution. \begin{figure} \centering \includegraphics[width=3in,height=2.4in]{./net_ltat_rate_sele} \caption{The maximal ASE via optimizing the transmission rates and the intensity.}\label{fig:net_rate_comp} \end{figure} \section{Conclusion}\label{sec:cond} This paper has utilized stochastic geometry to develop an interference-aware mathematical model for cooperative HARQ assisted NOMA in D2D networks. Particularly, by modeling the spatial locations of the interfering devices using a PPP, tractable exact expressions for the long term average throughput (LTAT) and outage probability of a two user NOMA scenario have been derived. The developed model accounts for the spatial and temporal correlation of the interference at the two NOMA users and across the HARQ rounds. It has been shown that the decoding performance at the two receivers are interwoven and that the temporal and spatial correlation negatively influences the NOMA performance. To this end, an accurate analytical approximation for the LTAT has been proposed to enable interference aware optimal network design. Numerical results have shown that the proposed cooperative NOMA scheme decreases the outage probability by up to $32$\% compared to the non-cooperative case. Additionally, the optimized LTAT of proposed scheme outperforms that of the OMA scheme by $47$\%. It has also been shown that interference-oblivious rate selection results in violating the network outage constraints. Finally, optimal ASE has been presented to maximize the overall network performance. \appendices \section{Proof of (\ref{eqn:out_in_ex_manifin})}\label{app:outage_o1_1_f} Putting (\ref{eqn:sinr_1_2}), (\ref{eqn:sinr_1_1}) and (\ref{eqn:sinr_phase2_o1}) into (\ref{eqn:outage_o1_1}), and then rearranging it yields \begin{align}\label{eqn:out_o11p_simp} &\mathbb P\left[{{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}},{\Theta _{{o_2},k}}} \right] = \mathbb P \left[ {\begin{array}{*{20}{c}} \begin{array}{l} \bigcap\limits_{j = 1}^{l - 1} \frac{{P{{\left| {{h_{z{o_1},j}}} \right|}^2}}}{{{I_{1,j}} + {\sigma ^2}}} < {U_{{o_1},2}}, {U_{{o_1},2}} \le \frac{{P{{\left| {{h_{z{o_1},l}}} \right|}^2}}}{{{I_{1,l}} + {\sigma ^2}}} < {U_{{o_1},1,I}} ,\\ \bigcap\limits_{j = l + 1}^k {\frac{{P{{\left| {{h_{z{o_1},j}}} \right|}^2}}}{{{I_{1,j}} + {\sigma ^2}}} < {U_{{o_1},1,I}}} , \bigcap\limits_{j = k + 1}^K {\frac{{P{{\left| {{h_{z{o_1},j}}} \right|}^2}}}{{{I_{1,j}} + {\sigma ^2}}} < {U_{{o_1},II}}}, \end{array}\\ { \bigcap\limits_{j = 1}^{k - 1} {\frac{{P{{\left| {{h_{z{o_2},j}}} \right|}^2}}}{{{I_{2,j}} + {\sigma ^2}}} < {U_{{o_2},I}}} ,\frac{{P{{\left| {{h_{z{o_2},k}}} \right|}^2}}}{{{I_{2,k}} + {\sigma ^2}}} \ge {U_{{o_2},I}}} \end{array}} \right], \end{align} where ${U_{{o_1},1,I}} = \frac{{{2^{{R_1}}} - 1}}{{{\beta ^2}\ell \left( {{d_1}} \right)}}$, ${U_{{o_1},2}} = \frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_1}} \right)}}$, ${U_{{o_2},I}} = \frac{{{2^{{R_2}}} - 1}}{{\left( {1 - {2^{{R_2}}}{\beta ^2}} \right)\ell \left( {{d_2}} \right)}}$ and ${U_{{o_1},II}} = \frac{{{2^{{R_1}}} - 1}}{{\ell \left( {{d_1}} \right)}}$. Herein, it should be mentioned that ${1 - {2^{{R_2}}}{\beta ^2}} > 0$, otherwise user 1 is unable to mitigate the NOMA interference ${\bf s}_2$. For simplicity, we define the following successful decoding events ${A_{1,j}} \triangleq \left\{ {\frac{{P{{\left| {{h_{z{o_1},j}}} \right|}^2}}}{{{I_{1,j}} + {\sigma ^2}}} \ge {U_{{o_1},2}}} \right\}$, $ j \in [1,l]$; ${A_{2,j}} \triangleq \left\{ {\frac{{P{{\left| {{h_{z{o_1},j}}} \right|}^2}}}{{{I_{1,j}} + {\sigma ^2}}} \ge {U_{{o_1},1,I}}} \right\}$, $j \in [l,k]$; ${A_{3,j}} \triangleq \left\{ {\frac{{P{{\left| {{h_{z{o_1},j}}} \right|}^2}}}{{{I_{1,j}} + {\sigma ^2}}} \ge {U_{{o_1},II}}} \right\}$, $j \in [k+1,K]$; ${B_{1,j}} \triangleq \left\{ {\frac{{P{{\left| {{h_{z{o_2},j}}} \right|}^2}}}{{{I_{2,j}} + {\sigma ^2}}} \ge {U_{{o_2},I}}} \right\}$, $j \in [1,k]$. Then (\ref{eqn:out_o11p_simp}) can be simplified as \begin{align}\label{eqn:outo11p_rew} &\mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{\Theta _{{o_2},k}}} \right] = \mathbb P\left[ \begin{array}{l} \bigcap\limits_{j = 1}^{l - 1} {\left( {\Omega - {A_{1,j}}} \right)} ,{A_{1,l}} - {A_{2,l}},\bigcap\limits_{j = l + 1}^k {\left( {\Omega - {A_{2,j}}} \right)} ,\\ \bigcap\limits_{j = k + 1}^K {\left( {\Omega - {A_{3,j}}} \right)} ,\bigcap\limits_{j = 1}^{k - 1} {\left( {\Omega - {B_{1,j}}} \right)} ,{B_{1,k}} \end{array} \right]. \end{align} By applying inclusion-exclusion principle into the first term in the square bracket, (\ref{eqn:outo11p_rew}) can be rewritten as \begin{equation}\label{eqn:out11_inc_exp00} \mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{\Theta _{{o_2},k}}} \right] =\sum\limits_{{\tau _1} = 0}^{l - 1} {\sum\limits_{{\nu _1} \in {{\cal M}_{{\tau _1}}}} {{{\left( { - 1} \right)}^{{\tau _1}}}} } \mathbb P\left[ {\begin{array}{*{20}{l}} {\bigcap\limits_{v \in {\nu _1}} {{A_{1,v}}} ,{A_{1,l}} - {A_{2,l}},\bigcap\limits_{j = l + 1}^k {\left( {\Omega - {A_{2,j}}} \right)} ,}\\ {\bigcap\limits_{j = k + 1}^K {\left( {\Omega - {A_{3,j}}} \right)} ,\bigcap\limits_{j = 1}^{k - 1} {\left( {\Omega - {B_{1,j}}} \right)} ,{B_{1,k}}} \end{array}} \right ], \end{equation} where $\mathcal M_{\tau_1}$ refers to the union of all the $\tau_1$-element subsets of the natural number set $\{1,2,\cdots,l-1\}$. Similarly, repeatedly using the same approach as (\ref{eqn:out11_inc_exp00}) leads to \begin{multline}\label{eqn:out11_inc_exp0} \mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{\Theta _{{o_2},k}}} \right] = \sum\limits_{{\tau _1} = 0}^{l - 1} {\sum\limits_{{\tau _2} = 0}^{k - l} {\sum\limits_{{\tau _3} = 0}^{K - k} {\sum\limits_{{\tau _4} = 0}^{k - 1} {\sum\limits_{{\nu _1} \in {{\cal M}_{{\tau _1}}}} {\sum\limits_{{\nu _2} \in {{\cal M}_{{\tau _2}}}} {\sum\limits_{{\nu _3} \in {{\cal M}_{{\tau _3}}}} {\sum\limits_{{\nu _4} \in {{\cal M}_{{\tau _4}}}} {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^4 {{\tau _j}} }}} \times} } } } } } } \\ \mathbb P\left[ {\bigcap\limits_{v \in {\nu _1}} {{A_{1,v}}} ,{A_{1,l}} - {A_{2,l}},\bigcap\limits_{v \in {\nu _2}} {{A_{2,v}}} ,\bigcap\limits_{v \in {\nu _3}} {{A_{3,v}}} ,\bigcap\limits_{v \in {\nu _4}} {{B_{1,v}}} ,{B_{1,k}}} \right], \end{multline} where $\mathcal M_{\tau_2}$, $\mathcal M_{\tau_3}$, $\mathcal M_{\tau_4}$ denote unions of all the subsets of natural number sets $\{l+1,\cdots,k\}$, $\{k+1,\cdots,K\}$ and $\{1,\cdots,k-1\}$ with cardinalities ${\tau_2}$, ${\tau_3}$ and ${\tau_4}$, respectively. Noticing that ${{A_{2,l}}} \subset {A_{1,l}}$ if $U_{o_1,1,I} > U_{o_1,2}$, otherwise ${{A_{1,l}}} - {A_{2,l}} = \emptyset$. Thereafter, (\ref{eqn:out11_inc_exp0}) can be derived a \begin{multline}\label{eqn:out_in_ex_mani0} \mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{\Theta _{{o_2},k}}} \right] = \sum\limits_{{\tau _1} = 0}^{l - 1} {\sum\limits_{{\tau _2} = 0}^{k - l} {\sum\limits_{{\tau _3} = 0}^{K - k} {\sum\limits_{{\tau _4} = 0}^{k - 1} {\sum\limits_{{\nu _1} \in {\mathcal M_{{\tau _1}}}} {\sum\limits_{{\nu _2} \in {\mathcal M_{{\tau _2}}}} {\sum\limits_{{\nu _3} \in {\mathcal M_{{\tau _3}}}} {\sum\limits_{{\nu _4} \in {\mathcal M_{{\tau _4}}}} {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^4 {{\tau _j}} }}} \times} } } } } } } \\ {\left[ \begin{array}{l} \mathbb P\left[{\bigcap\limits_{v \in {\nu _1}} {{A_{1,v}}} ,{A_{1,l}},\bigcap\limits_{v \in {\nu _2}} {{A_{2,v}}} ,\bigcap\limits_{v \in {\nu _3}} {{A_{3,v}}} ,\bigcap\limits_{v \in {\nu _4}} {{B_{1,v}}} ,{B_{1,k}}} \right]\\ - \mathbb P\left[ {\bigcap\limits_{v \in {\nu _1}} {{A_{1,v}}} ,{A_{2,l}},\bigcap\limits_{v \in {\nu _2}} {{A_{2,v}}} ,\bigcap\limits_{v \in {\nu _3}} {{A_{3,v}}} ,\bigcap\limits_{v \in {\nu _4}} {{B_{1,v}}} ,{B_{1,k}}} \right] \end{array} \right]^ + }. \end{multline} It follows from (\ref{eqn:out_in_ex_mani0}) that all the terms in square brackets have the same sign no matter $U_{o_1,1,I} > U_{o_1,2}$ or not. Hence, (\ref{eqn:out_in_ex_mani0}) can be rewritten a \begin{equation}\label{eqn:out_in_ex_mani} \mathbb P\left[ {{{\bar \Theta }_{{o_1},1}},{\Theta _{{o_1},2,l}} ,{\Theta _{{o_2},k}}} \right] = {\left[ \begin{array}{l} \sum\limits_{{\tau _1} = 0}^{l - 1} {\sum\limits_{{\tau _2} = 0}^{k - l} {\sum\limits_{{\tau _3} = 0}^{K - k} {\sum\limits_{{\tau _4} = 0}^{k - 1} {\sum\limits_{{\nu _1} \in {{\cal M}_{{\tau _1}}}} {\sum\limits_{{\nu _2} \in {{\cal M}_{{\tau _2}}}} {\sum\limits_{{\nu _3} \in {{\cal M}_{{\tau _3}}}} {\sum\limits_{{\nu _4} \in {{\cal M}_{{\tau _4}}}} {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^4 {{\tau _j}} }}} \times } } } } } } } \\ \left( {\begin{array}{*{20}{l}} \mathbb P{\left[ {\bigcap\limits_{v \in {\nu _1}} {{A_{1,v}}} ,{A_{1,l}},\bigcap\limits_{v \in {\nu _2}} {{A_{2,v}}} ,\bigcap\limits_{v \in {\nu _3}} {{A_{3,v}}} ,\bigcap\limits_{v \in {\nu _4}} {{B_{1,v}}} ,{B_{1,k}}} \right]}\\ { - \mathbb P\left[ {\bigcap\limits_{v \in {\nu _1}} {{A_{1,v}}} ,{A_{2,l}},\bigcap\limits_{v \in {\nu _2}} {{A_{2,v}}} ,\bigcap\limits_{v \in {\nu _3}} {{A_{3,v}}} ,\bigcap\limits_{v \in {\nu _4}} {{B_{1,v}}} ,{B_{1,k}}} \right]} \end{array}} \right) \end{array} \right]^ + }, \end{equation} Noticing the inner probability terms $\mathbb P(\cdot)$ are independent of $\nu_1$, $\nu_2$, $\nu_3$ and $\nu_4$, the cardinalities of set $\mathcal M_{\tau_1}, \mathcal M_{\tau_2}, \mathcal M_{\tau_3}$ and $\mathcal M_{\tau_4}$ are given by $C_{l - 1}^{{\tau _1}}$, $C_{k-l}^{{\tau _2}}$, $C_{K - k}^{{\tau _3}}$ and $C_{k - 1}^{{\tau _4}}$, respectively. Accordingly, (\ref{eqn:out_in_ex_mani}) can be simplified as (\ref{eqn:out_in_ex_manifin}), wherein $\Psi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat {\boldsymbol \tau} )$ is defined for notational convenience as \begin{equation}\label{eqn:genr_decoding_scu} \Psi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat {\boldsymbol \tau} ) \triangleq \mathbb P\left[ {\bigcap\limits_{n = 1}^N {\bigcap\limits_{k = 1}^{\tau_n } {{\mathcal A_{n,k}}} } ,\bigcap\limits_{n = 1}^M {\bigcap\limits_{k = 1}^{\hat \tau _n } {{\mathcal B_{n,k}}} } } \right], \end{equation} where ${\bf U} = (U_1,\cdots,U_N)$, ${\boldsymbol \tau} = (\tau_1,\cdots,\tau_N)$, $\hat{\bf U} = (\hat U_1,\cdots,\hat U_M)$, $\hat{\boldsymbol \tau} = (\hat \tau_1,\cdots,\hat \tau_M)$, ${\mathcal A_{n,k}} \triangleq \left\{ \frac{{P{{\left| {{h_{k_n}}} \right|}^2}}}{{{I'_{1,{k_n}}} + {\sigma ^2}}} \ge {U_n}\right\} $, ${\mathcal B_{n,k}} \triangleq \left\{ \frac{{P{{\left| {{{\hat h}_{k_n}}} \right|}^2}}}{{{I'_{2,{k_n}}} + {\sigma ^2}}} \ge {{\hat U}_n}\right\} $, ${I'_{i,k_n}} = P\sum\nolimits_{x \in \Phi \backslash \left\{ z \right\}} {\ell \left( {\left\| {x - {o_i}} \right\|} \right){{\left| {{h'_{xo_i,k_n}}} \right|}^2}}$ and ${k_n} = \sum\nolimits_{\iota = 1}^{n - 1} {{\tau _\iota }} + k$, the channel amplitudes $\left\{\left|h_k\right|,\, k=[1,\cdots,{\sum\limits_{\iota = 1}^N \tau_\iota}]\right\}$, $\left\{\left|\hat h_k\right|,\, k=[1,\cdots,{\sum\limits_{\iota = 1}^M \hat \tau_\iota}]\right\}$, $\left\{\left|{h'_{xo_1,k}}\right|,\, k=[1,\cdots,{\sum\limits_{\iota = 1}^N \tau_\iota}]\right\}$ and $\left\{\left|{h'_{xo_2,k}}\right|,\, k=[1,\cdots,{\sum\limits_{\iota = 1}^M \hat \tau_\iota}]\right\}$ follow independent Rayleigh distributions with unit average power. Since fading channels follow independent Rayleigh distribution given the interferences $I'_{i,k}$, $\Psi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat {\boldsymbol \tau} )$ can be derived as \begin{align}\label{eqn:Psi_de} \Psi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat {\boldsymbol \tau} )& ={\mathbb E_{{I'_{i,k}}}} \left(\mathbb P\left[ {\bigcap\limits_{n = 1}^N {\bigcap\limits_{k = 1}^{{\tau _n }} {{{\left| {{h_{k_n}}} \right|}^2} \ge \frac{{{U_n}\left( {{I'_{1,k_n}} + {\sigma ^2}} \right)}}{P}} } ,\bigcap\limits_{n = 1}^M {\bigcap\limits_{k = 1}^{{{\hat \tau _n }} } {{{\left| {{{\hat h}_{k_n}}} \right|}^2} \ge \frac{{{{\hat U}_n}\left( {{I'_{2,k_n}} + {\sigma ^2}} \right)}}{P}} } } \right]\right)\notag\\ & = {e^{ - \frac{{{\sigma ^2}}}{P} \left({\bf U}^{\rm T}{\boldsymbol \tau} + {{\hat {\bf U}}^{\rm T}{\hat {\boldsymbol \tau} }}\right) }}{\mathbb E_{{I'_{i,k_n}}}}\left( {\prod\limits_{n = 1}^N {\prod\limits_{k = 1}^{{{\tau _n }} } {{e^{ - \frac{{{U_n}{I'_{1,k_n}}}}{P}}}} } \prod\limits_{n = 1}^M {\prod\limits_{k = 1}^{ {{\hat \tau _n }} } {{e^{ - \frac{{{{\hat U}_n}{I'_{2,k_n}}}}{P}}}} } } \right). \end{align} Then plugging (\ref{eqn:inter_fer_1}) into (\ref{eqn:Psi_de}) leads to \begin{align}\label{eqn:psi_de_sub} &\Psi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat {\boldsymbol \tau} ) = {e^{ - \frac{{{\sigma ^2}}}{P}\left( {{{\bf{U}}^{\rm{T}}}\boldsymbol \tau + {{\hat {\bf{U}}}^{\rm{T}}}\hat {\boldsymbol\tau} } \right)}}{\mathbb E_{{I'_{i,k}}}}\left( \begin{array}{l} \prod\limits_{n = 1}^N {\prod\limits_{k = 1}^{{\tau _n}} {{e^{ - {U_n}{\sum _{x \in \Phi \backslash \left\{ z \right\}}}\ell \left( {\left\| {x - {o_1}} \right\|} \right){{\left| {{h'_{x{o_1},{k_n}}}} \right|}^2}}}} } \\ \times\prod\limits_{n = 1}^M {\prod\limits_{k = 1}^{{{\hat \tau }_n}} {{e^{ - {{\hat U}_n}{\sum _{x \in \Phi \backslash \left\{ z \right\}}}\ell \left( {\left\| {x - {o_2}} \right\|} \right){{\left| {{h'_{x{o_2},{k_n}}}} \right|}^2}}}} } \end{array}\right). \end{align} Given the PPP $\Phi$ and noticing the independence of fading channels, (\ref{eqn:psi_de_sub}) can be further written as \begin{equation}\label{eqn:psi_de_sub_split} \Psi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat {\boldsymbol \tau} ) = {e^{ - \frac{{{\sigma ^2}}}{P}\left( {{{\bf{U}}^{\rm{T}}}\boldsymbol \tau + {{\hat {\bf{U}}}^{\rm{T}}}\hat {\boldsymbol\tau} } \right)}} \mathbb E_z^!\left( \prod\limits_{x \in \Phi \backslash \left\{ z \right\}} {{ {{\left( \begin{array}{l} \prod\limits_{n = 1}^N {\prod\limits_{k = 1}^{{{\tau _n }} } {{\mathbb E_{\left| {{h'_{x{o_1},k_n}}} \right|}}\left( {{e^{ - {U_n}\ell \left( {\left\| {x - {o_1}} \right\|} \right){{\left| {{h'_{x{o_1},k_n}}} \right|}^2}}}} \right)} } \\ \prod\limits_{n = 1}^M {\prod\limits_{k = 1}^{ {{\hat \tau _n }} } {{\mathbb E_{\left| {{h'_{x{o_2},k_n}}} \right|}}\left( {{e^{ - {{\hat U}_n}\ell \left( {\left\| {x - {o_2}} \right\|} \right){{\left| {{h'_{x{o_2},k_n}}} \right|}^2}}}} \right)} } \end{array} \right)}} }} \right). \end{equation} where $\mathbb E_z^!$ denotes the expectation taken against the reduced Palm distribution of the PPP $\Phi$. Averaging over channel coefficients of Rayleigh distribution yields \begin{equation}\label{eqn:psi_de_sub_splitavg} \Psi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat {\boldsymbol \tau} ) = {e^{ - \frac{{{\sigma ^2}}}{P}\left( {{{\bf{U}}^{\rm{T}}}\boldsymbol \tau + {{\hat {\bf{U}}}^{\rm{T}}}\hat {\boldsymbol\tau} } \right)}} \mathbb E_z^!\left( {\begin{array}{l} {\prod \limits_{x \in \Phi \backslash \left\{ z \right\}}}\prod\limits_{n = 1}^N {\frac{1}{{{{\left( {1 + {U_n}\ell \left( {\left\| {x - {o_1}} \right\|} \right)} \right)}^{{\tau _n}}}}}} \prod\limits_{n = 1}^M {\frac{1}{{{{\left( {1 + {{\hat U}_n}\ell \left( {\left\| {x - {o_2}} \right\|} \right)} \right)}^{{{\hat \tau }_n}}}}}} \end{array}} \right). \end{equation} It follows by using Slivnyak theorem and the Laplace functional of PPPs that \cite{haenggi2012stochastic} \begin{equation}\label{eqn:psi_de_sub_splitavgsl} \Psi ({\bf{U}},\boldsymbol \tau ;\hat {\bf{U}},\hat {\boldsymbol \tau} ) = {e^{ - \frac{{{\sigma ^2}}}{P}\left( {{{\bf{U}}^{\rm{T}}}\boldsymbol \tau + {{\hat {\bf{U}}}^{\rm{T}}}\hat {\boldsymbol\tau} } \right)}} {{e^{ - \int\limits_{{\mathbb R^2}} {\left( {1 - \prod\limits_{n = 1}^N {\frac{1}{{{{\left( {1 + {U_n}\ell \left( {\left\| {x - {o_1}} \right\|} \right)} \right)}^{{\tau _n}}}}}} \prod\limits_{n = 1}^M {\frac{1}{{{{\left( {1 + {{\hat U}_n}\ell \left( {\left\| {x - {o_2}} \right\|} \right)} \right)}^{{{\hat \tau }_n}}}}}} } \right)\mathbb P_z^!\left[ {dx} \right]} }}}, \end{equation} where $\mathbb P_z^!$ denotes the reduced Palm distribution of the PPP $\Phi$ with intensity $\lambda$. By making the change of variables and after some algebraic manipulations, (\ref{eqn:psi_de_sub_splitavgsl}) can be derived as (\ref{eqn:genr_decoding_scu1}). \section{Proof of (\ref{eqn:varphi_0})}\label{app:proof_o1eqo2} For small $D$, $\varphi ({\bf{U}},{\boldsymbol \tau} ;{\bf{\hat U}},\hat {\boldsymbol \tau} )$ in (\ref{eqn:varphi_given}) can be approximated by setting $o_1=o_2$ as \begin{align}\label{eqn:varphi_11} \varphi ({\bf{U}},{\boldsymbol \tau} ;{\bf{\hat U}},\hat {\boldsymbol \tau} ) \approx \varphi (\tilde{\bf{U}},\tilde{\boldsymbol \tau};{\bf{0}},{\bf{0}} ), \end{align} where $\tilde{\bf U} = ({\bf U},\hat{\bf U})=(\tilde U_1,\cdots,\tilde U_{N+M})$ and $\tilde{\boldsymbol \tau} = ({\boldsymbol \tau},\hat{\boldsymbol \tau})=(\tilde \tau_1,\cdots,\tilde \tau_{N+M})$. By applying polar coordinates together with (\ref{eqn:varphi_given}), $\varphi (\tilde{\bf{U}},\tilde{\boldsymbol \tau};{\bf{0}},{\bf{0}} )$ can be rewritten as \begin{equation}\label{eqn:varphi_1} \varphi (\tilde{\bf{U}},\tilde{\boldsymbol \tau};{\bf{0}},{\bf{0}} ) = \int\limits_0^\infty {\int\limits_0^{2\pi } {\left( {1 - \prod\limits_{\iota = 1}^{N+M} {{{\left( {1 + \frac{{{\tilde U_\iota }}}{{{r^\alpha }}}} \right)}^{ - {\tilde \tau _\iota }}}} } \right)rd\theta dr} } = 2\pi \int\limits_0^\infty {\left( {1 - \prod\limits_{\iota = 1}^{N+M} {{{\left( {1 + \frac{{{\tilde U_\iota }}}{{{r^\alpha }}}} \right)}^{ - {\tilde \tau _\iota }}}} } \right)rdr}. \end{equation} By using integration by parts, (\ref{eqn:varphi_1}) can then be derived as \begin{multline}\label{eqn:integral_p_intbyparts} \varphi (\tilde{\bf{U}},\tilde{\boldsymbol \tau};{\bf{0}},{\bf{0}} ) = \pi \int\limits_0^\infty {\left( {1 - \prod\limits_{\iota = 1}^{N+M} {{{\left( {1 + \frac{{{\tilde U_\iota }}}{{{r^\alpha }}}} \right)}^{ - {\tilde \tau_\iota }}}} } \right)d{r^2}} \\ =\pi\sum\limits_{\kappa = 1}^{N+M} {{{{\tilde \tau _\kappa }\alpha {\tilde U_\kappa }}} } \int\limits_0^\infty {{r^{1 - \alpha }}{{\left( {1 + \frac{{{\tilde U_\kappa }}}{{{r^\alpha }}}} \right)}^{ - {\tilde \tau _\kappa } - 1}}\prod\limits_{\scriptstyle\iota = 1\hfill\atop \scriptstyle\iota \ne \kappa \hfill}^{N+M} {{{\left( {1 + \frac{{{\tilde U_\iota }}}{{{r^\alpha }}}} \right)}^{ - {\tilde \tau _\iota }}}} dr}\\ =\pi \sum\limits_{\kappa = 1}^{N+M} {{{{\tilde \tau _\kappa }\alpha {\tilde U_\kappa }}}\int\limits_0^\infty {{r^{1 - \alpha }}\prod\limits_{\iota = 1}^{N+M} {{{\left( {1 + \frac{{{\tilde U_\iota }}}{{{r^\alpha }}}} \right)}^{ - {\tilde \tau _\iota } - {\delta _{\iota - \kappa }}}}} dr} }, \end{multline} where ${{\delta }_s}$ denotes Dirac function. By making a change of variable $s=r^\alpha$, we have \begin{equation}\label{eqn:integral_change_r2s} \varphi (\tilde{\bf{U}},\tilde{\boldsymbol \tau};{\bf{0}},{\bf{0}} ) =\pi\sum\limits_{\kappa = 1}^{N+M} {{{{\tilde \tau _\kappa }{\tilde U_\kappa }}}} \int\limits_0^\infty {{s^{\sum\limits_{\iota = 1}^{N+M} {{\tilde \tau _\iota }} + \frac{2}{\alpha } - 1}}\prod\limits_{\iota = 1}^{N+M} {{{\left( {s + {\tilde U_\iota }} \right)}^{ - {\tilde \tau _\iota } - {\delta _{\iota - \kappa }}}}} ds}. \end{equation} Assuming that ${\tilde U_\mu } = \max \left\{ {{\tilde U_1}, \cdots ,{\tilde U_{N+M}}} \right\}$ and by the change of variable $z = \frac{{{\tilde U_\mu }}}{{s + {\tilde U_\mu }}}$, (\ref{eqn:integral_change_r2s}) can be rewritten as \begin{equation}\label{eqn:integral_changeofvari_hy} \varphi (\tilde{\bf{U}},\tilde{\boldsymbol \tau};{\bf{0}},{\bf{0}} ) = \pi\sum\limits_{\kappa = 1}^{N+M} {{{{\tilde \tau _\kappa }{\tilde U_\kappa }{\tilde U_\mu }^{\frac{2}{\alpha } - 1}}} }\int\limits_0^1 {{z^{ - \frac{2}{\alpha }}}{{\left( {1 - z} \right)}^{\sum\limits_{\iota = 1}^{N+M} {{\tilde \tau _\iota }} + \frac{2}{\alpha } - 1}}}\prod\limits_{\scriptstyle\iota = 1\hfill\atop \scriptstyle\iota \ne \mu \hfill}^{N+M} {{{\left( {1 - \left( {1 - \frac{{{\tilde U_\iota }}}{{{\tilde U_\mu }}}} \right)z} \right)}^{ - {\tilde \tau _\iota } - {\delta _{\iota - \kappa }}}}} dz. \end{equation} With the definition of the fourth kind of Lauricella function $F_D^{(N)}(\cdot)$ in \cite[Eq. A.52]{mathai2009h}, (\ref{eqn:integral_changeofvari_hy}) can finally be expressed in terms of Lauricella function as (\ref{eqn:varphi_0}). \section{LTAT of HARQ assisted OMA Scheme}\label{app:ltat_tdma} With (\ref{eqn:noma_harq_throughput}), the LTAT of HARQ assisted OMA scheme is expressed as \begin{equation}\label{eqn:throughput_tdma} \eta_{\rm{OMA}} = \frac{{{R_1}\left( {1 - {\mathcal O_{{\rm{OMA}},K,{o_1}}}} \right) + {R_2}\left( {1 - {\mathcal O_{{\rm{OMA}},K,{o_2}}}} \right)}}{1+{\sum\nolimits_{\kappa = 1}^{K - 1} {\left( {{\mathcal O_{{\rm{OMA}},\kappa ,{o_1}}} + {\mathcal O_{{\rm{OMA}},\kappa ,{o_2}}} - {\mathcal O_{{\rm{OMA}},\kappa ,{o_1},{o_2}}}} \right)} }}, \end{equation} where ${\mathcal O_{{\rm{OMA}},K,{o_1}}}$, ${\mathcal O_{{\rm{OMA}},K,{o_2}}}$ and ${\mathcal O_{{\rm OMA},K,{o_1},{o_2}}}$ are respectively given by \begin{align}\label{eqn:outage_1_tdma} {\mathcal O_{{\rm{OMA}},K,{o_1}}} &= \mathbb P\left[ {{{\bar \Xi }_{{o_1}}}} \right] = \mathbb P\left[ {{{\bar \Xi }_{{o_1}}},\left( {\bigcup\limits_{k = 1}^K {{\Xi _{{o_2},k}}} } \right)\bigcup {{{\bar \Xi }_{{o_2}}}} } \right]= \sum\limits_{k = 1}^K {\mathbb P\left[ {{{\bar \Xi }_{{o_1}}},{\Xi _{{o_2},k}}} \right]} + \mathbb P\left[ {{{\bar \Xi }_{{o_1}}},{{\bar \Xi }_{{o_2}}}} \right], \end{align} \begin{align}\label{eqn:outage_2_tdma} {\mathcal O_{{\rm{OMA}},K,{o_2}}} &= \mathbb P[{{\bar \Xi }_{{o_2}}}] = \mathbb P\left[ {\left( {\bigcup\limits_{l = 1}^K {{\Xi _{{o_1},l}}} } \right)\bigcup {{{\bar \Xi }_{{o_1}}}} ,{{\bar \Xi }_{{o_2}}}} \right] = \sum\limits_{l = 1}^K {\mathbb P\left[{{\Xi _{{o_1},l}} ,{{\bar \Xi }_{{o_2}}}} \right]} + \mathbb P\left[ {{{\bar \Xi }_{{o_1}}},{{\bar \Xi }_{{o_2}}}} \right], \end{align} \begin{equation}\label{eqn:out12_tdma} {\mathcal O_{{\rm OMA},K,{o_1},{o_2}}} = \mathbb P\left[ {{{\bar \Xi }_{{o_1}}},{{\bar \Xi }_{{o_2}}}} \right]. \end{equation} Herein, ${{\bar \Xi }_{{o_i}}} $ denotes the outage event at user $i$ after $K$ HARQ rounds and ${\Xi _{{o_i},k}}$ represents the successful decoding event at user $i$ after $k$ HARQ rounds. To proceed, $\mathbb P\left[ {{{\bar \Xi }_{{o_1}}},{\Xi _{{o_2},k}}} \right]$, $\mathbb P\left[ {{\Xi _{{o_1},l}},{{\bar \Xi }_{{o_2}}}} \right]$ and $ \mathbb P\left[ {{{\bar \Xi }_{{o_1}}},{{\bar \Xi }_{{o_2}}}} \right]$ will be derived one by one. From information-theoretical perspective, $\mathbb P\left[ {{{\bar \Xi }_{{o_1}}},{\Xi _{{o_2},k}}} \right]$ is given by \begin{equation}\label{eqn:tdma_out11} \mathbb P\left[ {{{\bar \Xi }_{{o_1}}},{\Xi _{{o_2},k}}} \right] = \mathbb P\left[ \begin{array}{l} \bigcap\limits_{j = 1}^k {{\beta ^2}\mathcal I\left( {\frac{{P{{\left| {{h_{z{o_1},j}}} \right|}^2}\ell \left( {{d_1}} \right)}}{{{I_{1,j}} + {\sigma ^2}}}} \right) < {R_1}} ,\bigcap\limits_{j = k + 1}^K {\mathcal I\left( {\frac{{P{{\left| {{h_{z{o_1},j}}} \right|}^2}\ell \left( {{d_1}} \right)}}{{{I_{1,j}} + {\sigma ^2}}}} \right) < {R_1},} \\ \bigcap\limits_{j = 1}^{k - 1} {\left( {1 - {\beta ^2}} \right)\mathcal I\left( {\frac{{P{{\left| {{h_{z{o_2},j}}} \right|}^2}\ell \left( {{d_2}} \right)}}{{{I_{2,j}} + {\sigma ^2}}}} \right) < {R_2}} ,\left( {1 - {\beta ^2}} \right)\mathcal I\left( {\frac{{P{{\left| {{h_{z{o_2},k}}} \right|}^2}\ell \left( {{d_2}} \right)}}{{{I_{2,k}} + {\sigma ^2}}}} \right) \ge {R_2} \end{array} \right]. \end{equation} Similar to Appendix \ref{app:outage_o1_1_f}, $\mathbb P\left( {{{\bar \Xi }_{{o_1}}},{\Xi _{{o_2},k}}} \right)$ can be derived as \begin{align}\label{eqn:tdma_out11_fin} &\mathbb P\left[ {{{\bar \Xi }_{{o_1}}},{\Xi _{{o_2},k}} } \right] =\sum\limits_{{\tau _1} = 0}^k {\sum\limits_{{\tau _2} = 0}^{K - k} {\sum\limits_{{\tau _3} = 0}^{k - 1} {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^3 {{\tau _j}} }}C_k^{{\tau _1}}C_{K - k}^{{\tau _2}}C_{k - 1}^{{\tau _3}}} \times} } \notag\\ & \Psi \left( {\left( {\frac{{{2^{\frac{{{R_1}}}{{{\beta ^2}}}}} - 1}}{{\ell \left( {{d_1}} \right)}},\frac{{{2^{{R_1}}} - 1}}{{\ell \left( {{d_1}} \right)}}} \right),\left( {{\tau _1},{\tau _2}} \right);\frac{{{2^{\frac{{{R_2}}}{{1 - {\beta ^2}}}}} - 1}}{{\ell \left( {{d_2}} \right)}},{\tau _3} + 1} \right). \end{align} With the same approach, we can prove \begin{align}\label{eqn:tdma_outlo2} &\mathbb P\left[ {{\Xi _{{o_1},l}},{{\bar \Xi }_{{o_2}}}} \right] = \sum\limits_{{\tau _1} = 0}^{l - 1} {\sum\limits_{{\tau _2} = 0}^l {\sum\limits_{{\tau _3} = 0}^{K - l} {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^3 {{\tau _j}} }}C_{l - 1}^{{\tau _1}}C_l^{{\tau _2}}C_{K - l}^{{\tau _3}}} \times} } \notag\\ & \Psi \left( {\frac{{{2^{\frac{{{R_1}}}{{{\beta ^2}}}}} - 1}}{{\ell \left( {{d_1}} \right)}},{\tau _1} + 1;\left( {\frac{{{2^{\frac{{{R_2}}}{{1 - {\beta ^2}}}}} - 1}}{{\ell \left( {{d_2}} \right)}},\frac{{{2^{{R_2}}} - 1}}{{\ell \left( {{d_2}} \right)}}} \right),\left( {{\tau _2},{\tau _3}} \right)} \right). \end{align} Analogously, $\mathbb P\left( {{{\bar \Xi }_{{o_1}}},{{\bar \Xi }_{{o_2}}}} \right)$ follows as \begin{equation}\label{eqn:tdma_out12_def} \mathbb P\left[ {{{\bar \Xi }_{{o_1}}},{{\bar \Xi }_{{o_2}}}} \right] = \mathbb P\left[\begin{array}{l} \bigcap\limits_{j = 1}^K {\left( {{\beta ^2}\mathcal I\left( {\frac{{P{{\left| {{h_{z{o_1},j}}} \right|}^2}\ell \left( {{d_1}} \right)}}{{{I_{1,j}} + {\sigma ^2}}}} \right) < {R_1}} \right)} , \bigcap\limits_{j = 1}^K {\left( {\left( {1 - {\beta ^2}} \right)\mathcal I\left( {\frac{{P{{\left| {{h_{z{o_2},j}}} \right|}^2}\ell \left( {{d_2}} \right)}}{{{I_{2,j}} + {\sigma ^2}}}} \right) < {R_2}} \right)} \end{array} \right]. \end{equation} After some algebraic manipulations, it follows that \begin{equation}\label{eqn:tdma_out12_deffina} \mathbb P\left[ {{{\bar \Xi }_{{o_1}}},{{\bar \Xi }_{{o_2}}}} \right] = \sum\limits_{{\tau _1} = 0}^K {\sum\limits_{{\tau _2} = 0}^K {{{\left( { - 1} \right)}^{\sum\limits_{j = 1}^2 {{\tau _j}} }}C_K^{{\tau _1}}C_K^{{\tau _2}} } } \Psi \left( {\frac{{{2^{\frac{{{R_1}}}{{{\beta ^2}}}}} - 1}}{{\ell \left( {{d_1}} \right)}},{\tau _1};\frac{{{2^{\frac{{{R_2}}}{{1 - {\beta ^2}}}}} - 1}}{{\ell \left( {{d_2}} \right)}},{\tau _2}} \right). \end{equation} \section{Proof of Remark \ref{rem:joint_power}}\label{app:joint_power} Similar to (\ref{eqn:opt_prob_simp}), the problem of joint rate and power optimization for the HARQ assisted OMA scheme can be formulated as \begin{equation}\label{eqn:opt_prob_simptdma} \begin{array}{*{20}{cl}} {\mathop {\rm maximize}\limits_{R_1, R_2,\beta^2} }&{\eta_{\rm{OMA}}}\\ {{\rm{subject}}\,{\rm{to}}}&{\mathcal O_{{\rm{OMA}},K,o_i} \le \varepsilon_i},\, i= 1,2\\ \end{array} \end{equation} Herein, we consider the case of $K=1$ and $\varepsilon_1=\varepsilon_2=\varepsilon$. According to (\ref{eqn:throughput_tdma}), (\ref{eqn:outage_1_tdma}) and (\ref{eqn:outage_2_tdma}), the LTAT and outage probabilities of the OMA scheme with $K=1$ are \begin{align}\label{eqn:ltat_oma_k1} \eta _{{\rm{OMA}}}^{K = 1} &= {R_1}{e^{ - \frac{{{\sigma ^2}}}{P}\frac{{{2^{\frac{{{R_1}}}{{{\beta ^2}}}}} - 1}}{{\ell \left( {{d_1}} \right)}} - \pi \lambda {{\left( {\frac{{{2^{\frac{{{R_1}}}{{{\beta ^2}}}}} - 1}}{{\ell \left( {{d_1}} \right)}}} \right)}^{\frac{2}{\alpha }}}{\rm{B}}\left( { - \frac{2}{\alpha } + 1,\frac{2}{\alpha } + 1} \right)}}+ {R_2}{e^{ - \frac{{{\sigma ^2}}}{P}\frac{{{2^{\frac{{{R_2}}}{{1 - {\beta ^2}}}}} - 1}}{{\ell \left( {{d_2}} \right)}} - \pi \lambda {{\left( {\frac{{{2^{\frac{{{R_2}}}{{1 - {\beta ^2}}}}} - 1}}{{\ell \left( {{d_2}} \right)}}} \right)}^{\frac{2}{\alpha }}}{\rm{B}}\left( { - \frac{2}{\alpha } + 1,\frac{2}{\alpha } + 1} \right)}}\notag\\ &= {\beta ^2}{\phi _1}\left( {\frac{{{R_1}}}{{{\beta ^2}}}} \right) + \left( {1 - {\beta ^2}} \right){\phi _2}\left( {\frac{{{R_2}}}{{1 - {\beta ^2}}}} \right), \end{align} \begin{equation}\label{eqn:out_tdma_k11} {\mathcal O_{{\rm{OMA}},K,o_1}^{K=1}} = 1-{\vartheta _1}\left( \frac{R_1}{\beta^2} \right), \end{equation} \begin{equation}\label{eqn:out_tdma_k12} {\mathcal O_{{\rm{OMA}},K,o_2}^{K=1}} = 1-{\vartheta _2}\left( \frac{R_2}{1-\beta^2} \right), \end{equation} where ${\phi _i}\left( x \right) = x{e^{ - \frac{{{\sigma ^2}}}{P}\frac{{{2^x} - 1}}{{\ell \left( {{d_i}} \right)}}{ - \pi \lambda {{\left( {\frac{{{2^x} - 1}}{{\ell \left( {{d_i}} \right)}}} \right)}^{\frac{2}{\alpha }}}{\rm{B}}\left( { - \frac{2}{\alpha } + 1,\frac{2}{\alpha } + 1} \right)}}}$ and ${\vartheta _i}\left( x \right) = {e^{ - \frac{{{\sigma ^2}}}{P}\frac{{{2^x} - 1}}{{\ell \left( {{d_i}} \right)}}{ - \pi \lambda {{\left( {\frac{{{2^x} - 1}}{{\ell \left( {{d_i}} \right)}}} \right)}^{\frac{2}{\alpha }}}{\rm{B}}\left( { - \frac{2}{\alpha } + 1,\frac{2}{\alpha } + 1} \right)}}}$. Instead of jointly optimizing $R_1$, $R_2$ and ${\beta}^2$, we introduce $z_1 = {\frac{{{R_1}}}{{{\beta ^2}}}}$, $z_2 = {\frac{{{R_2}}}{{1 - {\beta ^2}}}}$, and the optimization problem (\ref{eqn:opt_prob_simptdma}) can be reformulated by using (\ref{eqn:ltat_oma_k1}), (\ref{eqn:out_tdma_k11}) and (\ref{eqn:out_tdma_k12}) as \begin{equation}\label{eqn:opt_prob_simp0} \begin{array}{*{20}{cl}} {\mathop {\rm maximize}\limits_{z_1, z_2, \beta^2} }&{{\beta ^2}{\phi _1}\left( {{z_1}} \right) + \left( {1 - {\beta ^2}} \right){\phi _2}\left( {{z_2}} \right)}\\ {{\rm{subject}}\,{\rm{to}}}&{{\vartheta _i}\left( z_i \right) \ge 1 - \varepsilon },\, i= 1,2, \end{array} \end{equation} With decomposition theory \cite{palomar2006tutorial}, the optimization with respect to $z_1$ and $z_2$ can be decoupled as \begin{equation}\label{eqn:opt_prob_simp1} \begin{array}{*{20}{cl}} {\mathop {\rm maximize}\limits_{z_i} }&{{\phi _i}\left( {{z_i}} \right) }\\ {{\rm{subject}}\,{\rm{to}}}&{{\vartheta _i}\left( z_i \right) \ge 1 - \varepsilon }, \end{array} \end{equation} Noticing that $d_1 < d_2$, it follows that ${\phi _1}({z_1}^*) > {\phi _2}({z_2}^*)$. After obtaining the optimal ${z_1}^*$ and ${z_2}^*$, it is not hard to prove that the optimal LTAT is an increasing function of $\beta^2$, i.e., ${\beta ^2}\left( {{\phi _1}\left( {{z_1}^*} \right) - {\phi _2}\left( {{z_2}^*} \right)} \right) + {\phi _2}\left( {{z_2}^*} \right)$. The maximal LTAT is achieved if and only if ${\beta^*}^2=1$. Hence, we have ${R_2} = \left( {1 - {\beta ^2}} \right){z_2}^* = 0$bps/Hz. The proof is then completed. \bibliographystyle{ieeetran}
\section{Introduction} Silicon (Si) quantum dots (QDs) are strong contenders for the realization of spin qubits \cite{Loss1998, Zwanenburg2013}. Silicon germanium heterostructure (Si/SiGe) platforms with integrated micromagnets \cite{Pioro-Ladriere2007} have produced the highest performance qubits \cite{Wu2014,Takeda2016,Kawakami2016}, with fidelities over 99.9\%\cite{Yoneda2018}, while metal-oxide-semiconductor (MOS) platforms have also achieved fault tolerant fidelities \cite{Veldhorst2014}. Most of the high performance systems mentioned above are enhancement mode devices comprising at least two layers of control gates. The overlapping gates ensure strong confinement and the highest electrostatic control over regions surrounding the QDs. These current multi-stack devices have therefore achieved excellent tunability, thanks in part to an independant control of reservoirs, dots and tunnel barriers through respectively dedicated gates. On the other hand, single-layer enhancement mode devices are being explored for ease of fabrication and potentially higher yield, in both Si/SiGe and MOS systems \cite{Lu2016, Studenikin2018, Jock2018, HarveyCollard2018, HarveyCollard2017}. In particular, all-silicon MOS single-layer devices are expected to avoid thermal mismatch and additional dielectric charge noise from overlayers \cite{Thorbeck2015,Zimmerman2014}. These single-layer devices generally use a single gate to form a source-dot-drain channel, relying on constrictions and lateral depletion gates to shape the confinement potential \cite{Lu2016, Tracy2013}. Reservoir filling, dot charge occupation and tunnel rates are therefore controlled differently than in multi-gate stack architectures. Various architectures and methods of tunnel barrier control impact tunability differently, and understanding those differences will influence choices of multi-QDs initialization, manipulation and readout schemes, including automatic tuning procedures \cite{Baart2016,vanDiepen2018}, as well as reproducibility, versatility and scalability of devices \cite{Frees2018}. Here we explore a single gate stack structure featuring a split gate for dot and reservoir formation. The tunnel barrier is simply formed by the gap between the dot and reservoir gates. We investigate, in all-silicon MOS devices based on this elementary structure, how tunnel barrier control can be achieved by modulation of the reservoir gate voltage. The operation principle is studied in two variations of the layout, emphasizing some intrinsic effects brought by the use of a reservoir gate for tunnel control, in contrast with the more frequent method of control using a dedicated barrier gate directly on top of the barrier. We also define a control orthogonality metric with significance for tunability and versatility of quantum dot devices and use it to compare a split gate QD device to a multi-stack device from the literature. Finally, we conclude by examining single-electron regime characteristics and valley splitting tuning in the split gate devices. \begin{figure} \includegraphics*[width = 0.8\columnwidth]{Fig1_v19.pdf} \caption{(a) Schematic transverse cut of the split enhancement gate tunnel barrier devices. AR is the reservoir enhancement gate, and AD is the dot enhancement gate. (b) False-color scanning electron micrograph (SEM) of single-lead split-enhancement gate device A1. C1, C2, C3, and C4 are confinement gates. The gate TSET forms the SET channel, and U and L help define its source and drain barriers. A mirror structure, on the left side of the dotted red line, not shown for clarity, includes gates AD$'$, AR$'$, C2$'$, C3$'$, TSET$'$, U$'$, and L$'$.(c) Simulated electron density, representing approximately 20 electrons in the dot. (d) Simulated conduction band edge profile (smoothed traces) along the green arrow A-B from (a), (b), (c) and (d), for $\rm{V_{AR}}$ varying from 3 to 4 V with 0.25 V increments, with other parameters kept constant. Small amplitude modulations in the potential result from the mesh resolution used for those particular simulations and the associated sub-optimal interpolation routine. \label{Fig1}} \end{figure} The elementary single-gate stack structure we explore consists of a quantum dot enhancement gate, AD, and a reservoir enhancement gate, AR, separated by a gap, as shown in Fig.~\ref{Fig1}(a). We refer to this base unit of design as the \textit{split enhancement gate} structure. Devices are fabricated using the Sandia National Laboratories MOS quantum dot process \cite{Tracy2009,Singh2016}, which is described in detail in the Supplementary Material. The gate stack consists of a 10 000 $\Omega$-cm n-type silicon float zone substrate, a 35 nm $\rm{SiO_2}$ gate oxide and a degenerately As-doped 100 nm thick polysilicon gate (shown in Fig.~\ref{Fig1}(a)). The polysilicon nanostructure is defined by a single electron-beam lithography and dry etching step. The gate oxide properties have been characterized in Hall bars fabricated on the same starting gate stack as the nanostructures. Peak mobility, percolation density \cite{Tracy2009,Borselli2011b}, scattering charge density \cite{DasSarma2013,Tracy2009}, interface roughness and interface correlation length \cite{Mazzoni1999} were extracted for the wafers used for each of the devices and are described in the Supplementary Material. In this study, we look at two different layouts of split enhancement gate devices. We examine a single-lead layout (devices A1 and A2), where a single reservoir is connected to a dot, and a double-lead layout (device B), where the dot is connected in series to reservoirs to enable transport measurements, in addition to charge sensing. Devices A1 and A2 present the same layout, with only differences in scale and spacing (see Table I in the Supplementary Material). For all devices, measurements are performed using a proximal SET as a charge sensor with standard lock-in or RF reflectometry techniques\cite{Muller2012}. Details on the measurements and a list of all voltages employed are given in the Supplementary Material. To illustrate the split enhancement gate tunnel barrier structure and its operation, we have performed Thomas-Fermi numerical simulations \cite{Gao2013} of device A1, as shown in Fig.~\ref{Fig1}(b), using the corresponding MOS structure and operating gate voltages as input parameters. Figure~\ref{Fig1}(c) shows the simulated electron density at the Si/$\rm{SiO_2}$ interface when the device is experimentally set in a $\sim$20 electrons regime. As expected, a reservoir is formed under gate AR, and a quantum dot under the tip of gate AD, separated by the tunnel barrier region. Some form of tunnel barrier control using the reservoir gate voltage, $\rm{V_{AR}}$, is suggested by variations of the potential along the dot-reservoir axis (Fig.~\ref{Fig1}(d)). Indeed, as a function of $\rm{V_{AR}}$, the tunnel barrier potential height and width are modified, while the QD conduction band edge stays fairly constant relative to the Fermi level of the reservoir, indicating some form of \textit{tuning orthogonality} between charge occupation of the QD and tunnel rate to the reservoir (similar quantities are evoqued in Ref. \cite{Frees2018}). A sufficient tuning orthogonality would allow simultaneously for a wide range of tunnel rates $\Gamma$ and the ability to regularly tune these devices to the single electron regime. We therefore investigate this characteristic for a QD based on a split enhancement gate structure employing the reservoir gate as a knob \cite{Shirkhorshidian2017}. \begin{figure} \includegraphics*[width = 1.0\columnwidth]{Fig2_v19.pdf} \caption{ (a) Stability diagram of AD vs AR in the few-electron regime for the single-lead device A2. The data was processed through a $\rm{5^{th}}$ order Butterworth digital filter and a Hilbert transform to extract the phase $\phi \rm{(SET)}$ of the signal and minimize the appearance of the background's SET's Coulomb oscillations (darker, more horizontal features). Charge occupation $N$ in the dot is indicated for each region between the transitions (thin white and more vertical features). Bottom left inset: capacitance ratio $\rm{C_{AR\text{-}dot}/C_{AD\text{-}dot}}$ as a function of $\rm{V_{AR}}$ extracted from the $N=2\rightarrow3$ charge transition's slope. (b) Reservoir-dot tunnel rate as a function of $\rm{V_{AR}}$ for the $N=0\rightarrow1$ transition in device A1. The green (diamonds) data points are obtained via full counting statistics of single-shot traces \cite{Gustavsson2009} while the orange (circles) data points are extracted from pulse spectroscopy \cite{Elzerman2004}. Hollow orange circles are the orange filled circle data points translated by $\approx 1.5$ decades. The dotted line is an exponential fit to green and hollow orange data points, yielding a slope $\Delta\Gamma$. Top left inset: zoom on the region of the stability diagram corresponding to the orange data points, with the left dot accumulation gate AD$^{\prime}$ at 512.7 mV. Bottom right inset: Zoom on the region of the stability diagram corresponding to the green data points, with $\rm{V_{AD}}'=980$ mV. \label{Fig2}} \end{figure} Figure~\ref{Fig2}(a) shows how the QD occupancy can be tuned down to the single electron regime in device A2 (similar to device A1 except for scale, see Supplementary Material). The single electron occupation was confirmed with spin filling from magnetospectroscopy, and yields an 8 meV charging energy for the last electron. The effect of $\rm{V_{AR}}$ on the tunnel rate is qualitatively visible from the charge transitions, which go from a ``smooth'' appearance at high $\rm{V_{AR}}$, when $\Gamma$ is high compared to the measurement rate, to a speckled appearance at low $\rm{V_{AR}}$, when $\Gamma$ is of the order of the measurement rate or lower \cite{Thalakulam2010}. We observe a gradual decrease of the AR gate capacitance to the dot, $\rm{C_{AR\text{-}dot}}$, as the reservoir fills up with electrons, as shown in the inset of Fig.~\ref{Fig2}(a) (assuming $\rm{C_{AD\text{-}dot}}$, the capacitance of the AD gate to the dot, stays constant) . The capacitance ratio $\rm{C_{AR\text{-}dot}/C_{AD\text{-}dot}}$$=-1/m$ is extracted from the slope $m$ of the transition $N=2\rightarrow3$ in the stability diagram \cite{Grabert1993}. A similar dependence of the capacitance ratio is also observed in numerical simulations, but the agreement is only qualitative, due in part to the limitations of the semi-classical simulation. We attribute this visible curvature in the dot transitions to a screening effect of the reservoir gate potential, induced by the accumulated charges in the reservoir. This specific effect therefore seems to be caused by the use of an enhancement gate connected to a ohmic contact as a tuning knob. Device A1 also exhibits a comparable behavior as a function of the AR and AD gate voltages (see Supplementary Material). We measured the dot-reservoir tunnel rate as a function of the voltage on gate AR for device A1, along the $N=0\rightarrow1$ charge transition, as $\rm{V_{AR}}$ was compensated with $\rm{V_{AD}}$ to preserve the charge state, as shown in Fig.~\ref{Fig2}(b). Two data sets (diamond and filled circles) were taken at different voltages on a surrounding gate, $\rm{V_{{AD}^\prime}}$. The 467 mV difference results in a 1.5 decades global offset in tunnel rates. We subtract this offset (hollow circles) to extract a single exponential dependence of $\Gamma$ with $\rm{V_{AR}}$ \cite{Borselli2015,Maclean2007}. From the slope of the exponential fit, we extract a gate response of $\Delta\Gamma = 5.9\pm 0.7$ decades/$\rm{V_{AR}}$, defined as the variation in dot-reservoir tunnel rate induced by a change of 1 V on gate AR, when compensated by gate AD to keep the dot chemical potential fixed. More useful for comparison between devices is when we remove the device geometry specific capacitance by converting to change in chemical potential, $\Delta\mu_{dot}$. We define the following metric: \begin{equation} \beta_{AR,AD}=\Delta \Gamma_{AR,AD}/\Delta \mu_{dot}, \end{equation} where $\Delta \Gamma_{AR,AD}$ is the change in tunnel rate induced by the change in voltage on AR (and compensated by AD), $\Delta \mu_{dot}$ is the change in chemical potential caused by gate AR (equal to the chemical potential compensated by gate AD), and we call $\beta_{AR,AD}$ the \textit{tuning orthogonality}. For device A1, the above analysis leads to $\beta_{AR,AD}=0.9 \pm 0.3$ decade/meV, using the gate lever arm $\alpha_{AR}\sim0.007$ meV/mV (from $\alpha_{AD}\sim0.22$ meV/mV). We note that the chemical potential of the QD does not actually shift for a given tunnel rate variation here, since there is a second gate compensating the chemical potential shift from the first. Therefore, care must be taken in interpreting this ratio: it does not represent the effect of a single gate on the tunnel rate, but rather the interplay of two gates acting in opposite direction on the two quantities, with unequal contributions. Taken individually, more positive voltages on gates AD and AR would both tend to decrease the barrier height and width, as one would expect and as shown in the conduction band edge simulations of Fig.\ref{Fig1}(d). But if one wants to keep the dot occupation fixed, and shift from high to low tunnel rates, gates AD and AR have to be swept in opposite directions. Our measurements indicate that in this case the lever of gate AR on the tunnel barrier still overcomes the opposite effect of gate AD. Furthermore, we speculate that the screening effect from charges under AR contributes to this efficiency, as it reduces the lever of gate AR on the dot occupation, but on the tunnel barrier, such that less compensation on AD is necessary to maintain charge occupation than if no screening effect was present. The quantity $\beta_{1,2}$ can be estimated for other designs in the literature, for any pair of gates 1 and 2 used to tune the tunnel rate and compensate for changes in the dot occupation, respectively. For comparison, we estimate $\beta_{BG,AD}=1.4 \pm 0.5$ decades/meV for the case of a dedicated barrier gate BG compensated by the dot accumulation gate AD equivalent in a Si/SiGe device \cite{Zajac2015}. This indicates a tuning orthogonality that can reach the same order of magnitude as dedicated barrier gate devices in multi-stack architectures. The single-layer split enhancement gate layout could therefore provide a wide operation range \cite{Ciorga2000} for single-electron QD devices. Details on the calculations as well as assumptions leading to the metric $\beta$ and its limitations are provided in the Supplementary material. \begin{figure} \includegraphics*[width = 1.0\columnwidth]{Fig3_v18.pdf} \caption{ (a) SEM of a two-lead single quantum dot device, device B. C1, C2, C3 and C4 are confinement gates, AD is the dot accumulation gate, and $\rm{AR_1}$ and $\rm{AR_2}$ are the source and drain reservoir accumulation gates, respectively. A mirror structure above is operated as a SET for charge sensing.(b) Stability diagram in transport of AD vs $\rm{AR_1}$. (c) Stability diagram in charge sensing corresponding to the transport diagram in (b). (d) Coulomb diamond measurement corresponding to a stability diagram of AD vs $\rm{AR_1}$ and $\rm{AR_2}$. The small diamond after electron \#6 is due to a donor ionization \cite{Rudolph2016} (see fabrication details in the Supplementary Material). \label{Fig3}} \end{figure} The double-lead layout also supports transport down to the last electron and exhibits a typical split enhancement gate behavior. Figure~\ref{Fig3}(a) shows device B, where transport is through a QD under gate AD with source and drain reservoirs under gates $\rm{AR_1}$ and $\rm{AR_2}$. A mirrored structure can be operated as a SET charge sensor, correlating the transport transitions (Fig.~\ref{Fig3}(b)) with charge sensed measurements (Fig.~\ref{Fig3}(c)). In Fig.~\ref{Fig3}(b), the tunnel rate ranges from the life-time broadened regime at high $\rm{V_{AR}}$, corresponding to a $\sim$3 GHz tunnel rate \cite{Zajac2015,DeFranceschi2001} to slower than can be detected by the charge sensor, $\sim$8 Hz. The slight curvature in the dot and SET transitions of Fig.~\ref{Fig3}(d) is ascribed to a similar screening effect as in the single lead devices, although it is not as pronounced. This demonstrates that two neighboring barriers in series can be tuned relatively orthogonally (i.e., crosstalk is not a prohibitive issue), and that the split enhancement gate concept can be applied in several layouts. In Fig.\ref{Fig3}(d), $\rm{V_{AR_1}}$ and $\rm{V_{AR_2}}$ are adjusted simultaneously to symmetrize the tunnel barriers on the source and drain side of the QD, giving rise to Coulomb diamonds \cite{Kouwenhoven1997}. The notable difference in voltage ranges applied on $\rm{AR_1}$ and $\rm{AR_2}$ is attributed mainly to asymmetry in the voltages applied on the neighboring gates on the left and right side of the device, although small variations in width of the dot-reservoir gap could also contribute to the difference. The precise effect of the dot-reservoir gap width on the tuning orthogonality and general efficiency remains to be studied in detail. The addition energy of the last electron and the first orbital energy are extracted from the Coulomb diamonds of Fig.~\ref{Fig3}(d), yielding approximately $E_{add}=11$ meV and $\Delta E=3$ meV, respectively. A classical capacitance between the QD and the AD gate of 2.9 aF is estimated (e.g., $C_{AD}=e/\Delta\rm{V_{AD}}$ with $\Delta\rm{V_{AD}}=56$ meV the voltage applied on gate AD to go from the $N=0\rightarrow1$ charge transition to the $N=1\rightarrow2$ transition in Fig.~\ref{Fig3}(b)). The classical capacitance can be associated with a circular 2D QD below the gate and is used to estimate a QD radius of $\sim$30 nm, using $\epsilon_r= 3.9$ for the $\rm{SiO_2}$ and neglecting small errors due to the electron offset from the $\rm{SiO_2}$ interface and depletion of the polysilicon. The orbital energy also provides an estimate of QD size. Following Ref. \cite{Zajac2015}, we can extract an effective length of a confining 2D box ($\pi r^2 = L^2$) and using $\Delta E=\frac{3\hbar^2\pi^2}{2m^*L^2}=$3 meV, we obtain a similar dot size, $r\sim$25 nm, using $m^* = 0.19\ m_e$. These estimated dot sizes and energies are similar to the ones obtained in multi-stack accumulation mode quantum dot devices \cite{Zajac2015,Angus2007}. Finally, an investigation of the spin filling and singlet-triplet energy splitting in our silicon QDs using magnetospectroscopy \cite{Borselli2011a, Lim2011a, Zajac2015} indicates that the valley splitting is linearly tunable with the vertical electric field ($8.1\pm 0.6\ \mu$eVm/MV in the double-lead device) and is tunable over a range of $\sim 75\text{-}250\ \mu$eV (see the Supplementary Material for details). In conclusion, we explored a split enhancement gate architecture implemented in single-lead and double-lead layouts of polysilicon MOS QD devices. The single-electron regime was reliably achieved in three different devices. Using the reservoir enhancement gate to modulate the tunnel rate and compensating with the dot enhancement gate, we found a tuning orthogonality $\beta_{AR,AD}\approx 0.9$ decade/meV in one of the single-lead devices. We argue that the notable tuning orthogonality, which is comparable to what can be achieved in devices with a dedicated barrier gate in multi-stack architectures, is boosted by the screening effect arising from the use of an enhancement gate as a tuning knob. In addition, a strongly confined quantum dot with charging energies up to 11 meV and orbital energy of 3 meV was observed in the device with smallest features, corresponding to a $\sim 30$ nm radius QD. Linear tunability of the QD's valley splitting was also observed up to 250 $\mu$eV. \section*{Supplementary Material} Section I of the Supplementary Material provides details on the samples fabrication. Section II describes experimental details and devices characteristics. Section III presents a discussion on the tuning orthogonality metric, and Section IV is dedicated to the study of the valley splitting tuning in the split enhancement gate devices. \begin{acknowledgments} We gratefully recognize conversations with J. K. Gamble about early split gate designs, and J. Dominguez for supporting preparation of the devices. We acknowledge technical support from M. Lacerte, R. Labrecque, and M. Lapointe-Major, and helpful discussions with J. Camirand Lemyre, L. Schreiber and J. Klos. This work was supported by the Natural Sciences and Engineering Research Council of Canada (NSERC) and the Canada Foundation for Innovation (CFI). This research was undertaken thanks in part to funding from the Canada First Research Excellence Fund. This work was performed, in part, at the Center for Integrated Nanotechnologies, an Office of Science User Facility operated for the U.S. Department of Energy (DOE) Office of Science. Sandia National Laboratories is a multimission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA0003525. This paper describes objective technical results and analysis. Any subjective views or opinions that might be expressed in the paper do not necessarily represent the views of the U.S. Department of Energy or the United States Government. \end{acknowledgments} \section{Samples fabrication} The fabrication is composed of two phases. The first phase is run in a 0.35 micron CMOS silicon foundry, and the second phase is performed in another fabrication area that provides more flexibility in processing, particularly the e-beam lithography used for the nanofabrication. Three different devices are presented in this work. We describe the process flow for devices A1 and A2. Significant differences in the structure are noted for device B. \textit{Phase 1} (silicon foundry): The initial material stack is fabricated using a 0.35 micron silicon foundry process at Sandia National Laboratories. The starting material is a 150 mm diameter float zone <100> n-type silicon wafer with a room temperature resistivity of 10 000 $\Omega$-cm. Device B used a p-type float zone substrate with a 99.95\% $\rm{Si^{28}}$ enriched epitaxy layer instead. A 35 nm thermal silicon oxide is grown at 900$\degree$C with dichloroethene (DCE) followed by a 30 min, 900$\degree$C $\rm{N_2}$ anneal. The next layer deposited is a 100 nm amorphous silicon layer followed by a $5\times10^{15} \rm{cm^{-2}}$, 10 keV arsenic implant at 0$\degree$ tilt. Device B used a 200 nm layer and the implant energy was 35 keV with the same dose. The amorphous layers are crystallized later in the process flow to form a degenerately doped poly-silicon electrode. In the silicon foundry, the poly-Si is patterned and etched into large scale region, a ``construction zone'' around $100\ \mu\rm{m} \times100\ \mu\rm{m}$ in size, that will later be patterned using e-beam lithography to form the nanostructure. After etching, Ohmic implants are formed using optical lithography and implantation of As at $3\times10^{15} \rm{cm^{-2}}$ density at 100 keV. An oxidation anneal of 900$\degree$C for 13 min and an $\rm{N_2}$ soak at 900$\degree$C for 30 min follows the implant step and serves the multiple purposes of crystallizing, activating and uniformly diffusing the dopants in the poly-Si while also forming a $\rm{SiO_2}$ layer (10-25 nm) on the surface of the poly-Si. This $\rm{SiO_2}$ layer forms the first part of the hard mask layer used for the nanostructure etch in the construction zone. The second part of the hard mask is a 20 nm $\rm{Si_3N_4}$ layer (35 nm for device B). An 800 nm thick field oxide is subsequently deposited using low pressure chemical vapor deposition (CVD), tetraethoxysilane (TEOS) or high density plasma CVD for device B. The field oxide is planarized using chemical mechanical polishing (CMP) leaving approximately 500 nm over the silicon and 300 nm over the poly-Si. Vias are etched to the conducting poly-Si and $\rm{n^+}$ Ohmics at the silicon surface. The vias are filled with Ti/TiN/W/TiN. The tungsten is a high contrast alignment marker for subsequent e-beam lithography steps. Large, approximately $100\ \mu\rm{m} \times100\ \mu\rm{m}$ windows aligned to the construction zones are then etched in the field oxide to expose the underlying hardmask and poly-Si construction zone for nanostructure patterning. The last processing step for the devices in the silicon foundry is a 450$\degree$C forming gas anneal for 90 min. \textit{Phase 2} (separate nano-micro fabrication facility): The wafers are removed from the silicon foundry and subsequently diced into smaller parts, leading to 10 mm $\times$ 11 mm dies, each containing 4 complete QD devices. The nanostructure are patterned using electron beam lithography and a thinned ZEP resist. The pattern is transferred with a two-step etch process. First, the SiN and $\rm{SiO_2}$ hard mask layers are etched with a $\rm{CF_4}$ dry etch, followed by an $\rm{O_2}$ clean which strips the resist \textit{in-situ}. The second etch step is to form the poly-Si electrodes, which is done with an HBr dry etch in the same chamber. The poly-Si etch is monitored using end-point detection in a large scale etch feature away from the active regions of the device. Wet acetone and dry $\rm{O_2}$ cleans are used to strip the residual resist after the poly-silicon nanostructure formation. After the wet strips of the tungsten vias, a lift-off process is used for formation of aluminum bond pads to contact the Ohmics and poly-silicon electrodes. The last step is a 400$\degree$C, 30 minute forming gas anneal. For device B, after the polysilicon etch, a second e-beam lithography and implant step was done to place donors near the QD region. The device was sent out for implant, $4\times10^{11} \rm{cm^{-2}}$ Phosphorus at 45 keV. After the implant step, the photoresist was stripped with acetone and then the metal and residual organics were stripped from the surface using peroxide and RCA cleans. The device was subsequently metallized using an Al lift-off process similar to devices A1 and A2. \section{Devices and experimental parameters} This appendix provides supplementary information on the devices and experimental parameters presented in the main text. Experiments were performed in two distinct laboratories, Universit\'e de Sherbrooke (devices A1 and A2) and Sandia National Laboratories (device B), in dilution refrigerators sustaining electronic temperatures of 125 mK and 160 mK, respectively. In the limited testing of standard measurements, the samples were found to be robust to thermal cycles (i.e., little threshold shift) and no devices were visually altered by the long-distance shipping (e.g., damage from electrostatic discharge was not observed). The devices were also electrically stable, with the drift of the quantum dot chemical potential in device B characterized as approximately 5.3 $\pm$ 0.5 $\mu$eV standard deviation over a 150 hour period. Table~\ref{Table1} compares the characteristics of devices A1, A2, and B. Table~\ref{Table2} exposes the experimental parameters for all measurements shown or mentionned in the main text for devices A1 and A2 (single-lead devices), while Table~\ref{Table3} does the same for device B. \renewcommand{\arraystretch}{1.3} \begin{table* \caption{Characteristics of measured devices. Devices A1 and A2 present the same layout, differing only in the spacing between the gates and the width of the gates (A2 gates are more closely packed than A1 gates). For comparison, we label the devices by the distance between gates AD and C2, and the distance between AD and AR tips (see Fig 1(c) of the main text). \label{Table1}} \begin{tabular}{|L{0.3\textwidth}|C{0.2\textwidth}|C{0.2\textwidth}|C{0.2\textwidth}|} \hline \textbf{Device}&\textbf{A1}&\textbf{A2}&\textbf{B}\\ \hline Reservoirs&Single lead&Single lead&Double lead\\ \hline Device dimensions&AD-C2: 60 nm, \mbox{AD-AR: 100 nm}, \mbox{AD width: 100 nm}&AD-C2: 25 nm, \mbox{AD-AR: 30 nm}, \mbox{AD width: 75 nm}&AD-C2: 30 nm, \mbox{AD-AR: 20 nm}, \mbox{AD width: 50 nm}\\ \hline Mobility &4560 $\rm{cm^2/V/s}$&4560 $\rm{cm^2/V/s}$&11600 $\rm{cm^2/V/s}$\\ \hline Interface roughness&2.4 \AA&2.4 \AA&1.8 \AA\\ \hline Percolation density &$6.0 \times 10^{11}$$\rm{cm^{-2}}$&$6.0 \times 10^{11}$$\rm{cm^{-2}}$&$1.6 \times 10^{11}$$\rm{cm^{-2}}$\\ \hline Scattering charge density &$7.6 \times 10^{10}$$\rm{cm^{-2}}$&$7.6 \times 10^{10}$$\rm{cm^{-2}}$&$5.2 \times 10^{10}$$\rm{cm^{-2}}$\\ \hline Interface correlation length&26 \AA&26 \AA&22 \AA\\ \hline Wafer type&10 000 $\Omega$-cm, n&10 000 $\Omega$-cm, n&10 000 $\Omega$-cm, p*\\ \hline Polysilicon gate stack thickness&100 nm&100 nm&200 nm\\ \hline Silicon gate oxide thickness&35 nm&35 nm&35 nm\\ \hline \end{tabular} *Device B contains a 99.95\% Si$^{28}$ enriched epitaxy layer. \end{table*} \begin{table* \caption{Experimental parameters for various data sets of the main text, for devices A1 and A2. \label{Table2}} \begin{tabular}{|C{0.1\textwidth}|C{0.15\textwidth}|C{0.17\textwidth}|C{0.15\textwidth}|C{0.2\textwidth}|C{0.15\textwidth}|} \hline \textbf{Data}&\textbf{Fig 1d}&\textbf{Fig 2a}&\textbf{Fig 2b, top inset}&\textbf{Fig 2b, bottom inset}&\textbf{Fig 4b}\\ \hline Device&A1&A2&A1&A1&A2\\ \hline AD&1.75 V&1.25 to 1.65 V&0.840 to 0.870 V&0.790 to 0.820 V&1.25 to 1.40 V\\ \hline AR&3.0 to 6.0 V&3.0 to 6.0 V&4.4 to 4.9 V&4.2 to 4.5 V&6.5 V\\ \hline C1&-1.0 V&-3.0 V&-1.0 V&-1.0 V&-1.0 V\\ \hline C2&-3.0 V&-1.4 V&-3.0 V&-3.0 V&-3.0 V\\ \hline C3&-1.0 V&-1.4 V&-1.0 V&-1.0 V&-1.0 V\\ \hline C4&-1.0 V&-1.0 V&-1.0 V&-1.0 V&-1.0 V\\ \hline TSET&2.59 V&2.0 V&2.45V&2.59 V&2.0 V\\ \hline U&-1.32V &-1.4 V&-3.19 V&-2.32V&-1.4 V\\ \hline L&-2.06 V&-1.4 V&-1.75V&-2.06V&-1.4V\\ \hline AD'&0.980V&0V&0.5127 V&0.980 V&0V\\ \hline AR'&7.0 V&0 V&7.0 V&7.0 V&0V\\ \hline C2'&-3.0 V&0 V&-1.0 V&-1.0 V&0 V\\ \hline C3'&-1.0 V&0 V&-1.0 V&-1.0 V&0 V\\ \hline TSET'&0 V&0 V&0 V&0 V&0 V\\ \hline U'&0V&0 V&0 V&0 V&0 V\\ \hline L'&0 V&0 V&0 V&0 V&0 V\\ \hline Details &Thomas-Fermi numerical simulations. &Charge sensing, \mbox{$f_{\rm{LI}}=16.4$ Hz} (lock-in frequency), \mbox{$\rm{V_{SD}}=100\ \mu$V} (source-drain voltage). &Pulse spectroscopy, measured by charge sensing, \mbox{$f_{\rm{LI}}=19$ Hz}, \mbox{$\rm{V_{SD}}=100\ \mu$V}. &Single-shot measured by RF reflectometry, carrier wave \mbox{$f=180$ MHz}, bandwidth of \mbox{326 kHz}. &Charge sensing, \mbox{$f_{\rm{LI}}=16.4$ Hz}, \mbox{$\rm{V_{SD}}=100\ \mu$V}.\\ \hline \end{tabular} \end{table*} \begin{table* \caption{Experimental parameters for various data sets of the main text, for device B. All measurements are made with a Lock-In frequency of 492.6 Hz and a source drain bias of 50 $\mu$ V rms.\label{Table3}} \begin{tabular}{|C{0.1\textwidth}|C{0.30\textwidth}|C{0.15\textwidth}|C{0.15\textwidth}|C{0.15\textwidth}|} \hline \textbf{Data}&\textbf{Fig 3b and 3c}&\textbf{Fig 3d}&\textbf{Fig 4a}&\textbf{Fig 4b}\\ \hline Device&B&B&B&B\\ \hline AD&1.2 to 1.8 V&0.9 to 1.6 V&1.8 V&1.21 to 1.8 V\\ \hline AR1&3.0 to 7.0 V&5.15 to 8.0 V&5.0 V&5.0 V\\ \hline AR2&3.5 V&3.15 to 4.75 V&3.0 V&3 to 3.1 V\\ \hline C1&-2.7 V&-1.5 V&-6.7 to -5.3 V&-6.7 to -0.76 V\\ \hline C2&-4.0 V&-3.0 V&-3.0 V&-3.0 V\\ \hline C3&-0.26 V&0 V&-0.26 V&-0.26 V\\ \hline C4&-4.2 V&-4.2 V&-4.2 V&-4.2 V\\ \hline TSET&2.61 V&0 V&2.53 V&2.53 V\\ \hline SETR1&2.5 V&0 V&2.5 V&2.5 V\\ \hline SETR2&2.5 V&0 V&2.5 V&2.5 V\\ \hline U&-1.5 V&0 V&-4.8 V&-4.8 V\\ \hline L&-4.8V&0V&-0.92V&-0.92 to -1.26 V\\ \hline \end{tabular} \end{table*} A statement concerning device A1 is helpful for full comprehension. The full range AD vs AR stability diagram for device A1 is not shown in the main text for the sake of clarity. Indeed, features not related to the split enhancement gate operation principles, and attributed to an irregularly shaped confinement potential under gate AD, were present in the full-range stability diagrams of device A1 (see Fig.~\ref{Fig5}(b)). This effect could be mitigated, but only up to a certain point, by applying more negative voltages on gates C1 and C2. The stability diagram of device A2 however is much cleaner owing to its smaller features compared as to A1, but experimental setup constraints at that time prevented us from repeating the tunnel rate measurements on device A2, hence why we rely on qualitative analysis only for this device. We emphasize that with the appropriate confinement, both devices qualitatively exhibit the same tunnel rate modulation and bending of the charge transitions, which, as stated in the main text, we believe is intrinsic to the split enhancement gate tunnel barrier. Figure \ref{Fig5}(b) illustrates the effect of an insufficient and irregular confinement of the dot in device A1. Figures \ref{Fig5} (c)-(f) show how the smaller features of device A2, combined with an increasingly more negative voltage on gate C1, lead to more regular dot transitions and the clean diagram shown in Fig.~2(a) of the main text. This observation is in agreement with the clean and regular transitions witnessed for device B (Fig.~3(d) of the main text), which possesses even smaller features than device A2 (see Table \ref{Table1}). \begin{figure*} \includegraphics*[width = 1.6\columnwidth]{Fig_dot_size_tuning_filter_v2.pdf} \caption{(a) SEM of single-lead device A2. The device has a symmetry axis between the two quantum dots. Experiments on device A2 involved the formation of a single quantum dot, on the left side of the device only (under AD).(b) Wide range stability diagram for device A1 corresponding to bottom right inset of Fig. 2(b) in the main text. The pale charge transitions on the left-hand side are transitions in the left QD, which was activated for this measurement series. The large features of device A1 and the small negative voltage on C1 are responsible for the irregularities in the right dot transitions (right hand side). (c), (d), (e), (f) Stability diagrams for device A2, with all parameters kept the same except for C1 gate voltage. A more negative voltage on C1 leads to more regular quantum dots, as expected. \label{Fig5}} \end{figure*} \section{Tuning orthogonality} When designing a QD device, it is of interest to provide local control of important device properties, with the surface gate voltages often serving as the control knobs. One oft used parameter is gate lever arm $\alpha$, which describes the efficacy of a gate voltage on the QD chemical potential level $\mu$. The lever arm is defined as \begin{equation} \Delta\mu_i=\alpha_i\Delta V_i \end{equation} where there is a unique $\alpha_i$ for each gate $i$. In a similar spirit, a parameter describing the controllability of the QD-reservoir tunnel rate can be defined as \begin{equation} \Delta\Gamma_i=\beta_i'\Delta V_i \end{equation} While $\alpha$ is always positive by definition, $\beta'$ can be positive or negative, depending on if gate $i$ increases or decreases the reservoir-QD tunnel rate with a positive voltage change. For example, for a QD under gate AD, gate AR increases the tunnel rate with increasing voltage, while gate AD$'$ decreases the tunnel rate with increasing voltage (Fig. 2(b) of the main text). Geometric arguments can typically be made to estimate the sign of $\beta'$ by considering whether a positive voltage change on a gate is pulling the dot towards or away from the reservoir. Of particular interest for designing QDs is the ability to tune the tunnel rates to the QD while only imparting a minimal change in the QD chemical potential, which denotes a high degree of tuning orthogonality between the two properties. Good orthogonality facilitates emptying the QD (fewer gate compensations are required to obtain $N=1$) and tuning the reservoir coupling with minimal effect on the location of charge transitions in the stability diagram (quicker optimization of relaxation and coherence times). For a single gate, the orthogonality between the tunnel rate and the chemical potential tunability is optimized by maximizing the ratio $\frac{\Delta\Gamma_i}{\Delta\mu_i}=\frac{\beta_i'}{\alpha_i}\equiv\beta_i$. We rewrite this in an analogous form to the lever arm: \begin{equation} \Delta\Gamma_i=\beta_i\Delta\mu_i \end{equation} To obtain $\beta_i$, one must measure the change in both tunnel rate and chemical potential for a change on the gate voltage $\Delta V_i$. In practice, this is impossible because a change in a single voltage moves the QD level out of resonance with the Fermi level, and a change in tunnel rate cannot be determined. Thus, one must consider the effect of two gate voltages changing and compensating each other such that the QD chemical potential is always in resonance with the Fermi level. Continuing the analogy with the lever arm, we assume that the total change in tunnel rate is simply the sum of the contributions of each gate that has changed. For two gates 1 and 2, this results in \begin{equation} \Delta\Gamma_{1,2}=\Delta\Gamma_{1}+\Delta\Gamma_{2}=\beta_1\alpha_1\Delta V_1+\beta_2\alpha_2\Delta V_2 . \label{equ4} \end{equation} As the chemical potential has not changed, we have the additional constraint \begin{equation} \Delta\mu_{1,2}=\Delta\mu_{1}+\Delta\mu_{2}=\alpha_1\Delta V_1+\alpha_2\Delta V_2=0 . \label{equ5} \end{equation} Combining Eq.~\ref{equ4} and Eq.~\ref{equ5}, we can define the two-gate tunnel rate orthogonality parameter as \begin{equation} \beta_{1,2}\equiv\beta_{1}-\beta_{2}=\frac{\Delta\Gamma_{1,2}}{\Delta\mu_1}, \end{equation} which is directly attainable from the measurements in Figure 2 (b) of the main text. From the data, we extract a slope of $\frac{\Delta\Gamma_{AR,AD}}{\Delta V_{AR}}=5.9 \pm 0.7$ decades/$\rm{V_{AR}}$, describing the change in tunnel rate induced by a change in both $\rm{V_{AR}}$ and $\rm{V_{AD}}$. With a lever arm $\alpha_{AR}\sim0.007$ eV/V, we determine $\beta_{AR,AD}=0.9 \pm 0.3$ decades/meV. For comparison, we extract $\beta_{1,2}$ for a multilayer enhancement mode Si/SiGe device which uses a dedicated barrier gate located directly on top of the tunnel barrier, sandwiched between the reservoir and QD gates (Zajac \textit{et al.}\cite{Zajac2015}). Information on the tunnel rates is determined from the stability diagram of the tunnel barrier gate LB1 and the QD gate L1 (Fig. 2a of Zajac \textit{et al.}\cite{Zajac2015}). To more easily compare this data to our device, we relabel LB1$\rightarrow$BG and L1$\rightarrow$AD. The voltage ranges studied show transition rates ranging from the measurement sample rate (assumed to be at least 10 Hz) to the lifetime broadened regime ($\frac{k_BT_e}{h}=800$ MHz for a reported electron temperature of $T_e=40$ mK). This provides two coordinates $(\Gamma,\rm{V_{BG}})$ to estimate the tunnel rate orthogonality, for which we find $\Delta\Gamma_{BG,AD}=\frac{7.9 \rm{decades}}{0.4 \rm{V_{BG}}}=19.8\ \rm{decades/V_{BG}}$. From the reported lever arms and capacitance ratio for the QD and barrier gates, we determine $\alpha_{BG}=0.022$ eV/V, and thus $\beta_{BG,AD}=1.4 \pm 0.5$ decades/meV. The definition of $\beta_{1,2}$ lends itself to compare other devices and geometries as well, as $\beta_{1,2}$ is independent of geometry specific information like capacitances. The concept of $\beta_{1,2}$ can also be extended to optimize QD devices for other characteristics which may be useful for qubit operation. For example, one can similarly define a parameter that describes the orthogonality between a double-QD coupling and the double-QD detuning, or a double-QD coupling and the valley splitting. \section{Valley splitting tuning} In this section, we examine the spin filling and singlet-triplet energy splitting in our silicon QDs using magnetospectroscopy \cite{Borselli2011a, Lim2011a, Zajac2015}. The first 4 charge transitions from device B are shown as a function of transverse magnetic field, at $\rm{V_{AD}}$=1.8 V, in \ref{Fig4}(a). The first transition shows a shift in chemical potential consistent with a lowering of energy due to increasing Zeeman splitting. The inflection point at $B=B_{ST}$ in the $N=1\rightarrow 2$ charge transition indicates the magnetic field at which the singlet-triplet (ST) transition occurs in the quantum dot \cite{Yang2013,Culcer2010}. The magnetospectroscopy for the $N=2\rightarrow 3$ transition has an inflection at the same B-field as the $N=1\rightarrow 2$ transition. This is consistent with a simple model for which there are two valleys and the $\rm{2^{nd}}$ valley is loaded with a $\rm{3^{rd}}$ electron as spin down. The inflection point again marks the crossing of the spin up of the lower valley with the spin down of the upper valley. The $\rm{4^{th}}$ electron then loads always spin up, also suggesting that the next orbital energy is well offset from this lower manifold, which is indeed consistent with the order of 3 meV estimate from the Coulomb diamonds. This spin filling also indicates a relatively small Coulomb repulsion relative to orbital energy spacing \cite{Hada2003}. \begin{figure} \includegraphics*[width = 1.00\columnwidth]{Fig4_v15.pdf} \caption{ (a) In-plane magnetospectroscopy measurements for device B, for transitions $N=0\rightarrow$1, $1\rightarrow2$, $2\rightarrow3$, and $3\rightarrow4$, from a stability diagram similar to Fig. 3(c) of the main text, at $\rm{V_{AD}}$=1.8 V. A lever arm of $31\pm4\ \mu$ eV/mV is inferred assuming $\mbox{g=2}$, within 15\% of the lever arm extracted from Coulomb peak width temperature dependence \cite{Beenakker1991}. $B_{ST}$ indicates the magnetic field at which the singlet-triplet transition occurs. (b) Extracted valley splitting $E_{VS}$ as a function of the dot accumulation gate voltage $\rm{V_{AD}}$. The diamond (blue) data points are for device A2 (single-lead, Fig.~\ref{Fig5}), and the circle (red) data points are for device B (two-leads, Fig. 3(a) of the main manuscript). The dashed red line indicates the fit for the valley splitting tunability of device B, and the 95\% confidence range (CI) is indicated by the red filled region.\label{Fig4}} \end{figure} The magnetospectroscopy measurements were repeated for different $\rm{V_{AD}}$, compensating with the confinement gate C1 to maintain charge occupation. We estimated the single particle valley splitting from $E_{VS}=g\mu_B B_{ST}$, assuming $g=2$, for devices A2 and B (Fig.~\ref{Fig4}(b)). For device B, we extract a linear tunability of $E_{VS}$ with the accumulation gate voltage of $231\pm 15\ \mu$ eV/V, the error range corresponding to a 95\% confidence interval on the fit. Roughly approximating the vertical electric field as $\Delta F_Z=\Delta \rm{V_{AD}}$/$t_{ox}$, where $t_{ox}$ is the gate oxide thickness, 35 nm here, we convert this tunability to $8.1\pm0.6\ \mu$eV m/MV. The linear trend is qualitatively consistent with theory and recent observations in MOS QDs \cite{Gamble2016,Yang2013}. For device A2, although the measurements were too noisy to extract a convincing tunability fit, all data points are located within the confidence interval for device B's tunability. We note that differences in valley splittings between devices A2 and B would be expected from variations in electrostatic environments (e.g., gate layout and dimensions, distribution of voltages to reach single electron occupation and threshold voltages) and in interface roughness, approximately 20\% different between the two samples \cite{Gamble2016}.
\section{Introduction}\label{sec:one} \subsection{The Steinhaus problem} Let ${\mathcal D}\subset{\mathbb R}^d$ be a bounded convex set. For $\alpha\in{\mathbb R}^d$, define \begin{equation} S(\alpha,{\mathcal D})=\{m\cdot\alpha\bmod 1 \mid m\in {\mathbb Z}^d \cap {\mathcal D} \} \subset {\mathbb R}/{\mathbb Z}, \end{equation} and let $G(\alpha,{\mathcal D})$ be number of distinct gaps between the elements of $S(\alpha,{\mathcal D})$. In other words, the set $S(\alpha,{\mathcal D})$ partitions $\mathbb R/{\mathbb Z}$ into intervals of $G(\alpha,{\mathcal D})$ distinct lengths. In the classical case $d=1$, the three gap theorem (also referred to as {\em Steinhaus conjecture} or {\em three distance theorem}) asserts that for all $\alpha\in{\mathbb R}$ and any interval ${\mathcal D}$, we have $G(\alpha,{\mathcal D}) \leq 3$. The first proofs of this remarkable fact were published in 1957 by S\'{o}s \cite{Sos1957}, in 1958 by Sur\'{a}nyi \cite{Sura1958}, and in 1959 by \'{S}wierczkowski \cite{Swie1959}. The theorem has been rediscovered repeatedly, and many authors have considered generalizations to various settings \cite{BaloGranSoly2017,Chev2014,CobeGrozVajaZaha2002,FrieSos1992,HaynKoivSaduWalt2016,HaynKoivWalt2016,Lang1991,MarkStro2017,Rave1988,Slat1967,Vija2008}. In this paper we are firstly interested in a higher dimensional version of the Steinhaus problem, which was previously studied by Geelen and Simpson \cite{GeelSimp1993}, Fraenkel and Holzman \cite{FraeHolz1995}, Chevallier \cite{Chev2000}, Boshernitzan \cite{Bosh1991,Bosh1992}, Dyson \cite{Dyson}, and Bleher, Homma, Ji, Roeder, and Shen \cite{BlehHommJiRoedShen2012}. For this problem our goal is twofold: to demonstrate the close connection between the multi-dimensional Steinhaus problem and the Littlewood conjecture, and to show how well known results from ergodic theory on the space of unimodular lattices in $\mathbb R^d$ can be used to shed new light on a question of Erd{\mathfrak H}{o}s as stated by Geelen and Simpson \cite[Section 4]{GeelSimp1993}. Our first theorem describes the generic failure of the finite gap phenomenon in higher dimensions. Denote by $R{\mathcal D}=\{ R x \mid x\in{\mathcal D} \}$ the homothetic dilation of ${\mathcal D}$ by a factor of $R$. We say a sequence $0<R_1< R_2 < R_3 <\ldots$ is {\em subexponential} if \begin{equation}\lim_{i\to\infty} R_i = \infty,\qquad \lim_{i\to\infty} \frac{R_{i+1}}{R_i}=1 .\end{equation} \begin{thm}\label{thm:one} Let $d\geq 2$. There exists a set $P\subset{\mathbb R}^d$ of full Lebesgue measure, such that for every bounded convex ${\mathcal D}\subset{\mathbb R}^d$ with non-empty interior, every $\alpha\in P$, and every subexponential sequence $(R_i)_i$, we have \begin{equation} \label{diverge} \sup_i G(\alpha,R_i{\mathcal D})=\infty \end{equation} and \begin{equation} \label{bdd} \liminf_i G(\alpha,R_i{\mathcal D})<\infty . \end{equation} \end{thm} A previous result in this direction is due to Bleher, Homma, Ji, Roeder, and Shen \cite{BlehHommJiRoedShen2012}, who show in the case $d=2$, and for a certain set of $\alpha$, that \begin{equation}\label{eqn.InfNNGaps} \sup_{R\geq 1} G(\alpha,R{\mathcal D})=\infty, \end{equation} where ${\mathcal D}$ is the triangle in $\mathbb R^2$ with vertices at $(0,0),(0,1),$ and $(1/2,0)$. For purposes of comparison with Theorem \ref{thm:one}, a careful computation shows that the size of the set of $\alpha$ to which the proof in \cite{BlehHommJiRoedShen2012} applies, has Hausdorff dimension $3/2$. (For the details of this computation, the reader may consult Lemma 6.1 of \cite{HaynKoivSaduWalt2016} and the paragraphs immediately following its proof.) Theorem \ref{thm:one} on the other hand admits a set of $\alpha$ of full Hausdorff dimension $d$. In the case $d=2$, for ${\mathcal D} =[0,1)^2$ a square, a folklore problem of Erd{\mathfrak H}{o}s (see the discussion at the end of \cite{GeelSimp1993}) asks whether eq.~\eqref{eqn.InfNNGaps} holds whenever $1,\alpha_1,\alpha_2$ are $\mathbb Q$-linearly independent. The answer to this question is in fact, negative. As recorded in \cite{BlehHommJiRoedShen2012}, this appears to have first been noticed in a private correspondence between Freeman Dyson and Michael Boshernitzan \cite{Bosh1991,Bosh1992,Dyson}, who showed that \eqref{eqn.InfNNGaps} fails for badly approximable $\alpha$. We say that $\alpha\in{\mathbb R}^d$ is {\em badly approximable} if there is $c>0$ such that $\| m\cdot\alpha \|_{{\mathbb R}/{\mathbb Z}} > c \| m \|^{-d}$ for all non-zero $m\in{\mathbb Z}^d$. Here $\| x \|_{{\mathbb R}/{\mathbb Z}}=\min_{k\in{\mathbb Z}} \| x+k\|$ denotes the distance to the nearest integer. \begin{thm}[Boshernitzan and Dyson; Bleher, Homma, Ji, Roeder, and Shen]\label{thm:two} Let $d\geq 2$. For every bounded convex ${\mathcal D}\subset{\mathbb R}^d$ with non-empty interior, and every badly approximable $\alpha\in{\mathbb R}^d$, we have \begin{equation}\sup_{R\geq 1} G(\alpha,R{\mathcal D})<\infty.\end{equation} \end{thm} We will see below that this statement is an immediate consequence of our dynamical interpretation of $G(\alpha,R{\mathcal D})$ combined with Dani's correspondence between badly approximable numbers and bounded orbits in the space of lattices. Let us now turn to the connection between the Steinhaus problem and the Littlewood conjecture in multiplicative Diophantine approximation. The Littlewood conjecture states that for {\em every} $\alpha_1,\alpha_2\in\mathbb R$, \begin{equation}\label{eq:little00} \liminf_{n\to\infty} n \| n \alpha_1 \|_{{\mathbb R}/{\mathbb Z}} \| n \alpha_2\|_{{\mathbb R}/{\mathbb Z}} = 0. \end{equation} There is a higher dimensional version of this conjecture, that for any $d\geq 2$ and for {\em every} $\alpha\in{\mathbb R}^d$, \begin{equation}\label{eq:little0} \liminf_{n\to\infty} n \| n \alpha_1 \|_{{\mathbb R}/{\mathbb Z}} \cdots \| n \alpha_d\|_{{\mathbb R}/{\mathbb Z}} = 0. \end{equation} Resolving the conjecture for $d=2$ would imply the higher dimensional statement for all $d>2$, but at present the conjecture has not been proved in full for any value of $d$. However, it is known that \eqref{eq:little0} holds for a set of $\alpha$ whose complement has Hausdorff dimension zero \cite{EinsKatoLind2006}. Consider the (in general non-homogeneous) dilation ${\mathcal D}_T=\{ x T \mid x\in{\mathcal D} \}$ of ${\mathcal D}$, where $T=\operatorname{diag}(T_1,\ldots,T_d)$ is a diagonal matrix with expansion factors $T_i>0$. \begin{thm}\label{thm:three} Let $d\geq 2$. Assume ${\mathcal D}\subset{\mathbb R}^d$ is bounded convex and contains the cube $[0,\epsilon)^d$ for some $\epsilon>0$. If $\alpha=(\alpha_1,\ldots,\alpha_d)\in{\mathbb R}^d$ is such that \begin{equation}\label{eq:little2} \sup_{T_1,\ldots,T_d\geq 1} G(\alpha,{\mathcal D}_{T})=\infty,\end{equation} then \begin{equation}\label{eq:little} \liminf_{n\to\infty} n \| n \alpha_1 \|_{{\mathbb R}/{\mathbb Z}} \cdots \| n \alpha_d\|_{{\mathbb R}/{\mathbb Z}} = 0. \end{equation} \end{thm} Theorem \ref{thm:one} implies that eq.~\eqref{eq:little2} holds for a set of $\alpha$ of full Lebesgue measure. We expect that there is a more concise characterisation of the set of exceptions, in analogy to the case of the Littlewood conjecture. But, unlike the Littlewood conjecture, eq.~\eqref{eq:little2} is not true for all $\alpha$. This is obvious for $\alpha\in{\mathbb Q}^d$. The following theorem gives a less trivial class of examples. \begin{thm}\label{thm:five} Suppose $\alpha= r \beta + s$, with $r,s\in{\mathbb Q}^d$, $\beta\in{\mathbb R}$, and let ${\mathcal D}=[0,1)^d$ be the unit cube in $\mathbb R^d$. Then we have that \begin{equation}\label{eqn.SupFinite}\sup_{T_1,\ldots,T_d\geq 1} G(\alpha,{\mathcal D}_T)<\infty.\end{equation} \end{thm} It follows from \cite[Theorem 2]{Burg2000} that, for $d\ge 2$, if $\alpha$ satisfies the hypotheses of Theorem \ref{thm:five} then eq.~\eqref{eq:little} (and in fact a much stronger statement) holds for $\alpha$. Therefore this theorem highlights the difference between the exceptional sets for the Steinhaus problem and for the Littlewood conjecture. This will be reflected in our dynamical interpretation: while there is a one-to-one correspondence of $\alpha$ satisfying the Littlewood conjecture and unbounded orbits in the space of lattices \cite[Prop.~11.1]{EinsKatoLind2006}, infinite gaps in the Steinhaus problem require in addition a particular type of divergence in the space of lattices. \subsection{The Slater problem} In addition to our results for the higher dimensional Steinhaus problems, our methods allow us to easily deduce results for a dual collection of problems, which we now describe. For $\alpha\in{\mathbb R}^d$, consider the toral translation \begin{equation} {\mathbb T}^d \mapsto {\mathbb T}^d, \qquad q \mapsto q+\alpha , \end{equation} where ${\mathbb T}^d={\mathbb R}^d/{\mathbb Z}^d$. Let ${\mathcal D}\subset{\mathbb R}^d$ be a convex open set which is contained in a bounded fundamental domain of $\mathbb R^d/{\mathbb Z}^d$; e.g. ${\mathcal D}\subset (-\tfrac12,\tfrac12]^d$. For $q\in{\mathcal D}$, the first return time to ${\mathcal D}$ is given by \begin{equation} \tau(q,{\mathcal D}) = \min\{ n\in {\mathbb N}^* \mid q+ n\alpha \in{\mathcal D} + {\mathbb Z}^d \}, \end{equation} where ${\mathbb N}^*$ denotes the natural numbers without 0. We are interested in the number $L(\alpha,{\mathcal D})$ of distinct values $\tau(q,{\mathcal D})$ attains, as $q$ varies over ${\mathcal D}$, and whether that number remains finite as ${\mathcal D}$ contracts. The problem in dimension $d=1$ was studied by Slater in 1950 \cite{Slat1950,Slat1967} and is closely related to the three gap theorem. Indeed the answer is $L(\alpha,{\mathcal D})\leq 3$, for any $\alpha$ and interval ${\mathcal D}$. This fact was later rediscovered in the study of Thom's problem for the linear flow on a flat two-dimensional torus \cite{BlanKrik1993}, and a number of generalizations and extensions of the theorem are discussed in \cite{FraeHolz1995}. Following \cite{FraeHolz1995}, we refer to these types of problems as Slater problems. The analogues of Theorems \ref{thm:one}--\ref{thm:three} for the higher dimensional Slater problems are as follows. \begin{thm}\label{thm:oneB} Let $d\geq 2$, take $P$ to be the set from Theorem \ref{thm:one}, and assume (as we may, without loss of generality) that $P=-P$. Then, for every bounded convex ${\mathcal D}\subset{\mathbb R}^d$ with non-empty interior, for every $\alpha\in P$, and every subexponential sequence $(R_i)_i$, we have \begin{equation} \sup_i L(\alpha,R_i^{-1}{\mathcal D})=\infty \end{equation} and \begin{equation} \liminf_i L(\alpha,R_i^{-1}{\mathcal D})<\infty . \end{equation} \end{thm} \begin{thm}\label{thm:twoB} Let $d\geq 2$. For every bounded convex ${\mathcal D}\subset{\mathbb R}^d$ with non-empty interior, and every badly approximable $\alpha\in{\mathbb R}^d$, we have \begin{equation}\sup_{R\geq 1} L(\alpha,R^{-1}{\mathcal D})<\infty.\end{equation} \end{thm} \begin{thm}\label{thm:threeB} Let $d\geq 2$ and ${\mathcal D}\subset{\mathbb R}^d$ be bounded and convex with non-empty interior. If $\alpha=(\alpha_1,\ldots,\alpha_d)\in{\mathbb R}^d$ such that \begin{equation}\label{eq:little2B} \sup_{T_1,\ldots,T_d\geq 1} L(\alpha,{\mathcal D}_{T^{-1}})=\infty,\end{equation} then \begin{equation}\label{eq:littleB} \liminf_{n\to\infty} n \| n \alpha_1 \|_{{\mathbb R}/{\mathbb Z}} \cdots \| n \alpha_d\|_{{\mathbb R}/{\mathbb Z}} = 0. \end{equation} \end{thm} \subsection{Outline} The plan of this paper is as follows. Motivated by the approach of \cite{MarkStro2017} in the case $d=1$, we first provide an interpretation of $G(\alpha,{\mathcal D}_{T})$ as a certain function on the space of $(d+1)$-dimensional Euclidean lattices (Section \ref{sec:two}). This will allow us to derive Theorems \ref{thm:one}--\ref{thm:three} from dynamical properties of the diagonal action on the space of lattices (Section \ref{sec:three}). The proof of Theorem \ref{thm:five}, which is presented in Section \ref{sec:four}, involves a reduction to a theorem of Chevallier \cite[Theorem 1]{Chev2000}. Finally, the proofs of Theorems \ref{thm:oneB}-\ref{thm:threeB} will be given in Section \ref{sec:Slater}. \subsection{Acknowledgements} We would like to thank Nicolas Chevallier and an anonymous referee for a number of detailed comments which helped us to improve upon a preliminary version of this paper. \section{The Steinhaus problem in terms of the space of lattices} \label{sec:two} Given $\alpha\in{\mathbb R}^d$ and $k\in{\mathbb Z}^d$, denote by $\xi_k=k\cdot\alpha \bmod 1$ the fractional part of $k\cdot\alpha$. Assume in the following that ${\mathcal D}\subset{\mathbb R}^d$ is bounded and has non-empty interior. Set ${\mathcal D}_B=\{ x B \mid x\in{\mathcal D}\}$ with $B\in\operatorname{GL}(d,{\mathbb R})$, $\det B>0$. We now follow the strategy developed in \cite{MarkStro2017} for the case $d=1$. For $k\in{\mathcal D}_B\cap{\mathbb Z}^d$, the gap between $\xi_k$ and its next neighbor on ${\mathbb R}/{\mathbb Z}$ is given by \begin{equation}\label{g2nn} s_{k,B} = \min\{ (\ell-k)\cdot\alpha + n > 0 \mid (\ell,n)\in{\mathbb Z}^{d+1},\; \ell\in {\mathcal D}_B \} . \end{equation} The substitution $m=\ell-k$ yields \begin{equation}\label{0st} s_{k,B} = \min\{ m \cdot\alpha + n > 0 \mid (m,n)\in{\mathbb Z}^{d+1},\; m+k\in {\mathcal D}_B \} , \end{equation} which we rewrite as \begin{equation}\label{resca} s_{k,B} = \min\{ y > 0 \mid (x,y)\in{\mathbb Z}^{d+1} A_1 ,\; x+k\in {\mathcal D}_B \}, \end{equation} with the matrix \begin{equation}\label{lattice0} A_1=\begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} . \end{equation} Let $G=\operatorname{SL}(d+1,{\mathbb R})$ and $\Gamma=\operatorname{SL}(d+1,{\mathbb Z})$. Now take a general element $M\in G$ and $t\in {\mathcal D}$, and define the function $F$ by \begin{equation}\label{Fdef} F(M,t)=\min\big\{ y > 0 \;\big|\; (x,y)\in{\mathbb Z}^{d+1} M, \; x+t\in{\mathcal D} \big\} , \end{equation} whenever the minimum exists, and by $F(M,t)=\infty$ otherwise. (Proposition \ref{prop1} below establishes that the minimum exists for all $t\in{\mathcal D}^\circ$.) To see the connection of $F$ with the gap $s_{k,B}$, define \begin{equation}\label{lattice} A_B=\begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} \begin{pmatrix} B^{-1} & 0 \\ 0 & \det B \end{pmatrix} \in G, \end{equation} and note that, by rescaling the set in \eqref{resca}, we have \begin{equation} s_{k,B} = (\det B)^{-1} \min\big\{ y > 0 \;\big|\; (x,y)\in{\mathbb Z}^{d+1} A_B , \; x+k B^{-1}\in{\mathcal D} \big\}. \end{equation} Thus, \begin{equation}\label{key} s_{k,B}=(\det B)^{-1} F\big(A_B,k B^{-1}\big). \end{equation} \begin{prop}\label{prop1} $F$ is well-defined as a function $\Gamma\backslash G \times {\mathcal D}^\circ \to {\mathbb R}_{> 0}$. \end{prop} \begin{proof} Let us begin by showing that \begin{equation}\label{theset} \big\{ y > 0 \;\big|\; (x,y)\in{\mathbb Z}^{d+1} M,\; x+t\in{\mathcal D} \big\} \end{equation} is non-empty for every $M\in G$, $t\in{\mathcal D}^\circ$. Since ${\mathcal D}^\circ$ is open, for every given $t\in{\mathcal D}^\circ$ there is $\epsilon>0$ such that $x+t\in{\mathcal D}$ for all $\|x\|<\epsilon$. There are at most finitely many lattice points $(x,y)\in{\mathbb Z}^{d+1} M$ with $\|x\|<\epsilon$ and $y=0$. By decreasing $\epsilon$ further, we can ensure that $0$ is the only such point. It follows from Minkowski's theorem that the infinite cylinder $\{ (x,y)\in{\mathbb R}^d\times{\mathbb R}: \|x\|<\epsilon\}$ contains a non-zero lattice point in ${\mathbb Z}^{d+1}M$. Therefore, since the lattice is symmetric with respect to reflection at the origin, also the semi-infinite $\{ (x,y)\in{\mathbb R}^d\times{\mathbb R}_{\geq 0}: \|x\|<\epsilon\}$ contains a non-zero lattice point $(x,y)$ for every $\epsilon>0$. By construction, $y\neq 0$. This implies \eqref{theset} is non-empty. The minimum exists in view of the uniform discreteness of ${\mathbb Z}^{d+1} M$. Finally, we note that $F(\,\cdot\,,t)$ is well-defined as a function on $\Gamma\backslash G$ since $F(M,t)=F(\gamma M,t)$ for all $M\in G$, $\gamma\in\Gamma$. \end{proof} Denote by $\Delta{\mathcal D}$ the set of differences $\{s-t\mid s,t \in{\mathcal D} \}$, and set \begin{equation}\label{theset234} {\mathcal M}(M) = \big\{ y > 0 \;\big|\; (x,y)\in{\mathbb Z}^{d+1} M,\; x\in\Delta{\mathcal D} \big\} , \end{equation} which contains the set of values of $F(M,\,\cdot\,)$. Since $\Delta{\mathcal D}$ is bounded and ${\mathbb Z}^{d+1} M$ is uniformly discrete, ${\mathcal M}(M)$ is a locally finite subset of ${\mathbb R}_{> 0}$. In particular, for every fixed $M$, the function $t\mapsto F(M,t)$ is therefore piecewise constant. We furthermore have the following. \begin{prop}\label{prop:cont} Let ${\mathcal C}\subset\Gamma\backslash G\times{\mathcal D}^\circ$ be compact. Then (i) there exists a positive $\kappa({\mathcal C})$ such that $F(M,t) < \kappa({\mathcal C})$ if $(\Gamma M,t)\in {\mathcal C}$, and (ii) $F$ is continuous at $(\Gamma M,t) \in {\mathcal C}$ if \begin{equation}\label{exset} ({\mathbb Z}^{d+1} M\setminus\{0\}) \cap \partial(({\mathcal D} - t)\times [0,\kappa({\mathcal C})]) = \emptyset . \end{equation} \end{prop} \begin{proof} (i) We will use a quantitative variant of the proof of Proposition \ref{prop1}. Since ${\mathcal C}$ is compact, there is an $\epsilon>0$ such that $x+t\in{\mathcal D}$ for all $\|x\|<\epsilon$ and $(\Gamma M,t)\in{\mathcal C}$. Furthermore, by Mahler's compactness criterion there exists $\epsilon_0>0$ such that $\| (x,y) \| >\epsilon_0$ for every $(x,y)\in{\mathbb Z}^{d+1} M\setminus\{0\}$, uniformly over $(\Gamma M,t)\in{\mathcal C}$. By Minkowski's theorem, the cylinder \begin{equation} \{ (x,y)\in{\mathbb R}^{d+1} \mid \|x\|<\min(\epsilon_0,\epsilon),\; 0<y< \kappa({\mathcal C}) \} \end{equation} contains at least one lattice point in ${\mathbb Z}^{d+1} M\setminus\{0\}$, where $\kappa({\mathcal C})$ is any constant greater than $2^d V_d^{-1}\min(\epsilon_0,\epsilon)^{-d}$, and $V_d$ is the volume of the unit ball in ${\mathbb R}^d$. Hence $F(M,t)< \kappa({\mathcal C})$ if $(\Gamma M,t)\in{\mathcal C}$, as required. (ii) By Mahler's criterion, all points in ${\mathbb Z}^{d+1} M$ are at least distance $\epsilon_0$ apart (with the same $\epsilon_0>0$ as in part (i)), for all $(\Gamma M,t)\in{\mathcal C}$. Define the compact set ${\mathcal K}:=\operatorname{cl}(\Delta{\mathcal D})\times [0,\kappa({\mathcal C})]$ with $\kappa({\mathcal C})$ as in part (i). Suppose $(M_i,t_i)\to (M,t)$ for some sequence of $(M_i,t_i)\in G\times{\mathcal D}^\circ$. Because ${\mathcal K}$ is compact, $({\mathbb Z}^{d+1} M\setminus\{0\}) \cap {\mathcal K}$ is finite; hence $m M_i\to m M$ uniformly for all points $m M\in ({\mathbb Z}^{d+1} M\setminus\{0\}) \cap {\mathcal K}$. Therefore, given $\epsilon\in(0,\epsilon_0)$, there is $i_0$ such that for every $i\geq i_0$, we have that every open $\epsilon$-ball centered at a lattice point in $({\mathbb Z}^{d+1} M\setminus\{0\}) \cap {\mathcal K}$ contains precisely one point in ${\mathbb Z}^{d+1} M_i\setminus\{0\}$. By assumption \eqref{exset}, every lattice point in $({\mathbb Z}^{d+1} M\setminus\{0\}) \cap {\mathcal K}$ which lies in $({\mathcal D} - t) \times{\mathbb R}_{\geq 0}$, is contained in the open set $({\mathcal D}^\circ - t) \times{\mathbb R}_{> 0}$. Furthermore there is $\epsilon_1>0$ such that, for every lattice point in $({\mathbb Z}^{d+1} M\setminus\{0\}) \cap {\mathcal K}$ contained in the open set $({\mathcal D}^\circ - t) \times{\mathbb R}_{> 0}$, the open $\epsilon$-ball centered at this lattice point is also contained in $({\mathcal D}^\circ - t) \times{\mathbb R}_{> 0}$ for every $\epsilon<\epsilon_1$, and hence the open $\frac{\epsilon}{2}$-ball centered at that lattice point is contained in $({\mathcal D}^\circ - t_i) \times{\mathbb R}_{> 0}$ provided $i$ is sufficiently large so that $|t-t_i|<\frac{\epsilon}{2}$. Thus, given $0<\epsilon<\min(\epsilon_0,\epsilon_1)$, we have $|F(M_i,t_i)-F(M,t)|<\epsilon$ for all sufficiently large $i$. \end{proof} Given a bounded subset ${\mathcal A}\subset{\mathbb R}^{d+1}$ with non-empty interior, and $M\in G$, we define the {\em covering radius} (also called {\em inhomogeneous minimum}) \begin{equation} \rho(M,{\mathcal A})=\inf\{ \theta>0 \mid \theta{\mathcal A}+{\mathbb Z}^{d+1} M = {\mathbb R}^{d+1} \}. \end{equation} Because ${\mathcal A}$ has non-empty interior, $\rho(M,{\mathcal A})<\infty$. Assume now that ${\mathcal A}$ is convex. Then we have $\theta{\mathcal A}+{\mathbb Z}^{d+1} M = {\mathbb R}^{d+1}$ for every $\theta>\rho(M,{\mathcal A})$, and hence the set $\theta{\mathcal A} + x$ intersects ${\mathbb Z}^{d+1} M$ in at least one point, for every $x\in{\mathbb R}^{d+1}$. (To see this, assume the contrary: There is $x\in{\mathbb R}^{d+1}$ such that $(\theta{\mathcal A}+x) \cap {\mathbb Z}^{d+1} M = \emptyset$. So $(\theta{\mathcal A}+{\mathbb Z}^{d+1} M) \cap ({\mathbb Z}^{d+1} M-x) = \emptyset$, contradicting our assumption that $\theta{\mathcal A}+{\mathbb Z}^{d+1} M = {\mathbb R}^{d+1}$.) For a given set ${\mathcal C}\subset\Gamma\backslash G$, we define \begin{equation} \overline\rho({\mathcal C},{\mathcal A}) = \sup_{\Gamma M\in{\mathcal C}} \rho(M,{\mathcal A}). \end{equation} It is well known that $\overline\rho({\mathcal C},{\mathcal A})<\infty$ for every compact ${\mathcal C}\subset\Gamma\backslash G$. For $\theta>0$, set \begin{equation}\label{D-def} D(\theta) = \begin{pmatrix} \theta 1_d & \,^\mathrm{t}\! 0 \\ 0 & \theta^{-d} \end{pmatrix} \in G. \end{equation} \begin{prop}\label{prop:twoB} Let ${\mathcal D}$ be bounded and convex with non-empty interior. Assume ${\mathcal C}\subset\Gamma\backslash G$ is compact, and $\theta>\overline\rho({\mathcal C},{\mathcal D}\times(0,1])$. Then \begin{equation}\label{eqn.FUppBd} F(M,t) \leq \theta^{d+1} \end{equation} for $\Gamma M\in {\mathcal C} D(\theta)^{-1}$ and $t\in{\mathcal D}$. \end{prop} \begin{proof} Set ${\mathcal A}_{t,\theta}=({\mathcal D}-t)\times (0,\theta^{d+1}]$. The task is to show that ${\mathcal A}_{t,\theta}$ intersects ${\mathbb Z}^{d+1} M$ in at least one point, for every $\Gamma M\in{\mathcal C} D(\theta)^{-1}$ and every $t\in{\mathcal D}$. Now ${\mathcal A}_{t,\theta}\cap{\mathbb Z}^{d+1} M\neq \emptyset$ is equivalent to $\theta{\mathcal A}_{t,1}\cap{\mathbb Z}^{d+1} M D(\theta) \neq \emptyset$. The latter holds because the assumption that $\theta>\overline\rho({\mathcal C},{\mathcal D}\times (0,1])$ implies that $\theta{\mathcal A}_{t,1}\cap{\mathbb Z}^{d+1} M' \neq \emptyset$ for every $\Gamma M'\in{\mathcal C}$, and $\Gamma M'=\Gamma M D(\theta) \in{\mathcal C}$ by assumption. \end{proof} We denote by ${\mathcal G}(M)$ the number of distinct values the function $t\mapsto F(M,t)$ attains, as $t$ runs over ${\mathcal D}$. For $R>0$, let ${\mathcal G}_R(M)$ be the number of distinct values of $F(M,R^{-1} k)$ as $k\in{\mathbb Z}^d$ runs over $R{\mathcal D}$. We have of course ${\mathcal G}_R(M)\leq {\mathcal G}(M)$. \begin{prop}\label{prop:three} Let ${\mathcal D}$ be bounded and convex with non-empty interior. Assume ${\mathcal C}\subset\Gamma\backslash G$ is compact, and $\theta>\overline\rho({\mathcal C},{\mathcal D}\times(0,1])$. Then there is a constant $C_\theta<\infty$ such that \begin{equation} {\mathcal G}(M) \leq C_\theta \end{equation} for $\Gamma M\in{\mathcal C} D(\theta)^{-1}$. \end{prop} \begin{proof} Note that ${\mathcal G}(M)$ is bounded above by the number of lattice points ${\mathbb Z}^{d+1} M$ in the bounded set $\Delta{\mathcal D} \times [0,\theta^{d+1}]$, where $\theta^{d+1}$ is the uniform upper bound from Proposition \ref{prop:twoB}. In view of Mahler's criterion, the number of lattice points ${\mathbb Z}^{d+1} M$ in any fixed bounded set is bounded above uniformly for all $\Gamma M$ in a given compact subset of $\Gamma\backslash G$ (which here is ${\mathcal C} D(\theta)^{-1}$). This proves the claim. \end{proof} \begin{lem}\label{newlyn} Let ${\mathcal D}$ be bounded and convex with non-empty interior. There is a point $P\in\partial(\Delta{\mathcal D})$ such that, for every point $Q$ on the open line segment $\overline{0P}$, there exists a $t\in\partial{\mathcal D}$ such that $Q=\overline{0P}\cap (\partial{\mathcal D}-t)$. \end{lem} \begin{proof} First of all, let us establish that there is a unit vector $u\in{\mathbb R}^d$ with the property that, for all $R,S\in\partial{\mathcal D}$ with the open line segment $\overline{RS}$ parallel to $u$, we have that $\overline{RS}\subset{\mathcal D}^\circ$. To this end, observe that if $\overline{RS}\not\subset{\mathcal D}^\circ$ for some $R,S\in\partial{\mathcal D}$, then by convexity $\overline{RS}\subset\partial{\mathcal D}$. The set of unit vectors that are parallel to line segments in $\partial{\mathcal D}$ has finite $(d-2)$-dimensional Haussdorff measure \cite[Theorem 1]{Ewald70}. Any unit vector $u$ in the complement of that set will thus have the required property. Now take $u$ as above, and let $\lambda$ be the length of the longest line segment parallel to $u$, with endpoints in $\partial{\mathcal D}$. We claim that the conclusion of the lemma will then be satisfied by choosing $P\in\partial(\Delta{\mathcal D})$ so that $\overline{0P}$ is parallel to $u$ and has length $\lambda$. To see why this is true, suppose that $Q$ is on the open line segment $\overline{0P}$ and that the length of $\overline{0Q}$ is $\ell\in(0,\lambda]$ (see Figure 1). Then, by our choice of $u$, there are points $R,S\in\partial{\mathcal D}$ such that the line segment $\overline{RS}$ is parallel to $u$ and has length $\ell$. This follows from the facts that: (i) $|\overline{RS}|$ is a continuous function of $R\in\partial{\mathcal D}$, since $\overline{RS}\subset{\mathcal D}^\circ$, and (ii) by convexity, there is an $R_0\in\partial D$ so that $(R_0+u{\mathbb R}) \cap {\mathcal D}^\circ=\emptyset$ and hence $\lim_{R\to R_0}\ell(R)=0$. It is now clear that the conclusion of the lemma is satisfied by taking $t=R$. \end{proof} \begin{figure}[h] \centering \def0.8\columnwidth{0.8\columnwidth} \input{gapspaper1.pdf_tex} \caption{Pictorial description of proof of Lemma \ref{newlyn}} \end{figure} \begin{prop}\label{prop:unbddNEW} Let ${\mathcal D}$ be bounded and convex with non-empty interior. Then there exist $\lambda>0$, $\epsilon_0>0$, such that for every $\epsilon\in(0,\epsilon_0]$ there exist non-empty open sets ${\mathcal U}\subset\Gamma\backslash G$ and ${\mathcal V}_m\subset{\mathcal D}^\circ$, $m=1,\ldots,\lfloor \epsilon^{-1}\lambda\rfloor$, such that \begin{equation} F(M,t)=\epsilon\, (m + a_m(M)) \end{equation} for $\Gamma M\in{\mathcal U}$ and $t\in {\mathcal V}_m$, with $a_m(M)\in[-\frac{1}{100},\frac{1}{100}]$. \end{prop} \begin{proof} Let $u, \lambda,$ and $P$ (the end point of $\lambda u$) be as in the proof of Lemma \ref{newlyn}, choose $\epsilon>0$, and define vectors $v_0=(\epsilon u, -\epsilon)$ and $v_1=(\lambda u,0)$ in ${\mathbb R}^{d+1}$. Suppose that $u,u_2,\ldots,u_d$ is an orthonormal basis for ${\mathbb R}^d$ with respect to the standard Euclidean metric, and define the matrix \begin{equation} M_\epsilon= \begin{pmatrix} \epsilon u & -\epsilon \\ \lambda u & 0 \\ (\epsilon \lambda)^{-\frac{1}{d-1}} u_2 & 0\\ \vdots & \vdots \\ (\epsilon \lambda)^{-\frac{1}{d-1}} u_d & 0 \end{pmatrix} \in G. \end{equation} {\em Step 1.} Our first aim is to show that there is $\epsilon_0\in(0,\lambda]$, such that for every $\epsilon\in(0,\epsilon_0]$ and positive integer $m \leq\lfloor\epsilon^{-1}\lambda\rfloor$, there is $t_m\in{\mathcal D}^\circ$ such that $F(M_\epsilon,t_m)=m\epsilon$. Note that the row vectors $v_0,v_1,\ldots,v_d$ of $M_\epsilon$ form a basis of the unimodular lattice ${\mathbb Z}^{d+1}M_\epsilon$. A general vector in this lattice is of the form $v=a_0 v_0 +\ldots+a_d v_d$ with $a_i\in{\mathbb Z}$. If at least one of $a_2,\ldots,a_d$ is non-zero then, for sufficiently small $\epsilon_0>0$, we have $v\notin\Delta{\mathcal D}\times{\mathbb R}$, and hence the corresponding lattice vector $v$ will not contribute to $F(M_\epsilon,t)$, for any $t\in{\mathcal D}$. \begin{figure}[h] \centering \def0.8\columnwidth{0.6\columnwidth} \input{gapspaper2.pdf_tex} \caption{Positions of relevant points of ${\mathbb Z}^{d+1}M_\epsilon$} \end{figure} We can therefore restrict our attention to vectors $v$ with coefficients $a_2=\ldots=a_d=0$; that is $v=(a_0 \epsilon u + a_1 \lambda u, -a_0\epsilon)$. Only vectors whose last coordinate is positive contribute. Hence, with $n=-a_0$, we have for any $t\in{\mathcal D}$ \begin{equation}\label{Fdef001} F(M_\epsilon,t)=\epsilon \min\big\{ n\in{\mathbb N}^* \;\big|\; (a_1 \lambda -\epsilon n) u\in{\mathcal D}-t~\text{for some}~ a_1\in{\mathbb Z} \big\} . \end{equation} Given $Q\in\overline{0P}$, Lemma \ref{newlyn} guarantees the existence of $t'\in\partial{\mathcal D}$ such that $Q=\overline{0P}\cap (\partial{\mathcal D}-t')$. Take $Q=Q_m=(\lambda -\epsilon m +\tfrac12\epsilon) u$ and denote the corresponding $t'$ by $t_m'$. Note that $Q_m\in\overline{0P}$ since $1\leq m\leq \lfloor\epsilon^{-1}\lambda\rfloor$ implies $0<\lambda-\epsilon m+\tfrac12\epsilon< \lambda$. Thus $0,Q_m\in\partial{\mathcal D}-t_m'$. Define the interval ${\mathcal J}_m\subset[0,\lambda]$ by ${\mathcal J}_m u = ({\mathcal D}-t_m') \cap [0,\lambda] u$. By construction, the interval ${\mathcal J}_m$ is equal to $[0,\lambda-\epsilon m +\tfrac12\epsilon]$ or one of its open/half-open variants, depending on ${\mathcal D}$. Set $t_m=t_m'+\tfrac14\epsilon u$. This ensures $0\in{\mathcal D}^\circ-t_m$ and hence $t_m\in{\mathcal D}^\circ$. Then \begin{equation}\label{Fdef002} F(M_\epsilon,t_m)=\epsilon \min\big\{ n\in{\mathbb N}^* \;\big|\; a_1 \lambda -\epsilon n+\tfrac14\epsilon \in{\mathcal J}_m ~\text{for some}~ a_1\in{\mathbb Z} \big\} . \end{equation} In case ${\mathcal J}_m$ is closed, $a_1 \lambda -\epsilon n +\tfrac14\epsilon \in{\mathcal J}_m$ is equivalent to \begin{equation} 0\leq a_1 \lambda -\epsilon n +\tfrac14\epsilon \leq \lambda-\epsilon m +\tfrac12\epsilon. \end{equation} The first inequality yields $a_1 \lambda \geq \epsilon n-\tfrac14\epsilon$, which is positive, and hence $a_1\in{\mathbb N}^*$. The second inequality yields \begin{equation} n \geq (a_1-1) \epsilon^{-1} \lambda + m - \tfrac14 . \end{equation} The smallest $n\in{\mathbb N}^*$ satisfying this inequality for any $a_1\in{\mathbb N}^*$ is $n=m$ and occurs for $a_1=1$. This choice of $a_1$ is consistent with the first inequality as long as $m=n\leq \lfloor\epsilon^{-1} \lambda\rfloor$, as assumed. The same argument goes through, with the same result, in the remaining cases when ${\mathcal J}_m$ is open or half-open. We conclude that $F(M_\epsilon,t_m)=m\epsilon$ for $m=1,\ldots,\lfloor \epsilon^{-1}\lambda\rfloor$. Figures 2 and 3 provide visual explanations of these arguments. \vspace*{.1in} \begin{figure}[h] \centering \def0.8\columnwidth{0.8\columnwidth} \input{gapspaper3v2.pdf_tex} \caption{Choices of $t$ for which $F(M_\epsilon,t)$ takes different values} \end{figure} \vspace*{.1in} {\em Step 2.} The fact that the argument of Step 1 is independent of whether or not we have strict inequalities, also manifests itself in the continuity of $F$ at $(\Gamma M_\epsilon,t_m)$, which we will establish now. We assume $\epsilon,m$ are as in Step 1. In view of Proposition \ref{prop:cont} it is sufficient to check that \begin{equation}\label{exset01} ({\mathbb Z}^{d+1} M_\epsilon\setminus\{0\}) \cap \partial(({\mathcal D} - t_m)\times [0,\kappa_m]) = \emptyset , \end{equation} for a given choice of $\kappa_m>\epsilon m$; let us take $\kappa_m=\epsilon m+\tfrac15\epsilon$. For $\epsilon\leq \epsilon_0$ as in Step 1, this is equivalent to \begin{equation} \{ (a_1 \lambda-n \epsilon ) u, n\epsilon) \mid (n,a_1)\in{\mathbb Z}^2\setminus\{0\} \} \cap \partial(({\mathcal D} - t_m)\times [0,\kappa_m]) = \emptyset . \end{equation} This in turn is equivalent to the conditions that \begin{equation}\label{check001} \{ (a_1 \lambda -\epsilon n+\tfrac14\epsilon, n\epsilon) \in \operatorname{cl} {\mathcal J}_m\times \{0,\kappa_m\} \mid (n,a_1)\in{\mathbb Z}^2\setminus\{0\} \} =\emptyset \end{equation} and that \begin{equation}\label{check002} \{ (a_1 \lambda -\epsilon n+\tfrac14\epsilon, n\epsilon) \in \partial{\mathcal J}_m \times [0,\kappa_m] \mid (n,a_1)\in{\mathbb Z}^2\setminus\{0\} \} =\emptyset , \end{equation} where $\partial{\mathcal J}_m=\{0,\lambda-\epsilon m +\tfrac12\epsilon\}$. Condition \eqref{check001} is equivalent to the statement that \begin{equation} 0\leq a_1 \lambda +\tfrac14\epsilon \leq \lambda-\epsilon m +\tfrac12\epsilon \end{equation} has no solution for $a_1\in{\mathbb Z}\setminus\{0\}$. This is indeed the case: the first inequality rules out negative $a_1$, the second positive $a_1$ (since $m\geq 1$). Condition \eqref{check002} is equivalent to the conditions that \begin{equation}\label{check003} [ a_1 \epsilon^{-1} \lambda -n +\tfrac14 = 0 , \; 0\leq n\leq m+\tfrac15 ] \end{equation} has no solution for any $(n,a_1)\in{\mathbb Z}^2\setminus\{0\}$, and that \begin{equation}\label{check004} [ a_1 \epsilon^{-1}\lambda -n +\tfrac14 = \epsilon^{-1}\lambda- m +\tfrac12 , \; 0\leq n\leq m+\tfrac15 ] \end{equation} has no solution for any $(n,a_1)\in{\mathbb Z}^2\setminus\{0\}$. As to \eqref{check003}, $a_1\leq 0$ does not yield a solution since $n$ is a non-negative integer and $\epsilon^{-1} \lambda\geq 1$; $a_1\geq 1$ on the other hand cannot lead to a solution since $n\leq m\leq\lfloor\epsilon^{-1}\lambda\rfloor$. Finally, \eqref{check004} can be written as \begin{equation}\label{check004b} [ (a_1-1)\epsilon^{-1} \lambda + m-n = \tfrac14 , \; 0\leq n\leq m ]. \end{equation} Solutions with $a_1\geq 1$ are not possible since $m-n$ is a non-negative integer and $\epsilon^{-1} \lambda\geq 1$; and $a_1\leq 0$ can be ruled out since $m-n\leq m\leq\lfloor\epsilon^{-1}\lambda\rfloor$. This proves $F$ is continuous at $(\Gamma M_\epsilon,t_m)$. {\em Step 3.} We conclude by noting that continuity at $(\Gamma M_\epsilon,t_m)$ implies the proposition. The reason why $a_m(M)$ is independent of $t$ is that the function $t\mapsto F(M, t)$ is piecewise constant. \end{proof} The following is an immediate consequence of Proposition \ref{prop:unbddNEW}. \begin{cor}\label{cor:dense} Let ${\mathcal D}$ be bounded and convex with non-empty interior. Let $M_1,M_2,\ldots\in G$, and $R_1<R_2<\cdots \to\infty$. If $(\Gamma M_i)_{i\in{\mathbb N}^*}$ is dense in $\Gamma\backslash G$, then \begin{equation}\sup_{i\in{\mathbb N}^*} {\mathcal G}_{R_i}( M_i)=\infty. \end{equation} \end{cor} \begin{proof} Given any $\epsilon>0$ choose ${\mathcal U}\subset\Gamma\backslash G$ and ${\mathcal V}_m\subset{\mathcal D}^\circ$ as in Proposition \ref{prop:unbddNEW}. Since $(\Gamma M_i)_{i\in{\mathbb N}^*}$ is dense in $\Gamma\backslash G$, there exist $i\in{\mathbb N}^*$ and $k_m\in R_i{\mathcal D}\cap{\mathbb Z}^d$ such that (i) $\Gamma M_i\in{\mathcal U}$ and (ii) $R_i^{-1} k_m \in{\mathcal V}_m$ for all $m=1,\ldots,\lfloor \lambda \epsilon^{-1}\rfloor$. Thus ${\mathcal G}_{R_i}( M_i)\geq \lfloor \lambda \epsilon^{-1}\rfloor$. \end{proof} Corollary \ref{cor:dense} is a crucial ingredient in the proof of Theorem \ref{thm:one} below. \section{Dynamics of diagonal actions; proofs of Theorems \ref{thm:one}--\ref{thm:three}} \label{sec:three} Let \begin{equation}\label{phi-def} \Phi^s = \begin{pmatrix} \mathrm{e}^{-s} 1_d & \,^\mathrm{t}\! 0 \\ 0 & \mathrm{e}^{ds} \end{pmatrix} \in G. \end{equation} The right translation \begin{equation} \Gamma\backslash G \to \Gamma\backslash G, \qquad \Gamma M \mapsto \Gamma M \Phi^s \end{equation} generates a flow on $\Gamma\backslash G$ which is well-known to be ergodic with respect to the unique $G$-invariant probability measure $\mu$ on $\Gamma\backslash G$. A standard argument (see e.g.~\cite[Cor.~3.7]{Mark2000}) shows that there is a set of full Lebesgue measure $P\subset{\mathbb R}^d$ such that for $\alpha\in P$, the orbit \begin{equation}\label{orbit} \bigg\{ \Gamma \begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} \Phi^s \;\bigg|\; s\in{\mathbb R}_{\geq 0}\bigg\} \end{equation} is dense in $\Gamma\backslash G$. This in turn implies \cite[Cor.~3.8]{Mark2000} that \begin{equation}\label{friday} \bigg\{ \Gamma \begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} \Phi^{s_i} \;\bigg|\; i\in{\mathbb N}^* \bigg\} \end{equation} is dense in $\Gamma\backslash G$, provided $s_1<s_2<\ldots \to\infty$ such that $s_{i+1}-s_i\to 0$. In view of Corollary \ref{cor:dense}, this establishes the first claim \eqref{diverge} of Theorem \ref{thm:one} (take $s_i=\log R_i$). As to the second claim \eqref{bdd}: the denseness of the orbit \eqref{friday} implies that it returns to a compact set infinitely often. Hence \eqref{bdd} follows from Proposition \ref{prop:three}, and the proof of Theorem \ref{thm:one} is complete. Dani's correspondence \cite{Dani1985} states that the orbit \eqref{orbit} is bounded if and only if $\alpha$ is badly approximable. Thus there is a compact ${\mathcal C}\subset\Gamma\backslash G$ which contains \eqref{orbit}. This means that for all $s\geq\log \theta$ we have \begin{equation} \Gamma \begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} \Phi^s \in {\mathcal C} D(\theta)^{-1}. \end{equation} Proposition \ref{prop:three} then implies that \begin{equation} {\mathcal G}\bigg( \begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} \Phi^s \bigg)\leq C_\theta \end{equation} for all $s\geq\log \theta$. Thus $G(\alpha,R{\mathcal D}) \leq C_\theta$ for all $R\geq \theta$. Finally, $G(\alpha,R{\mathcal D})$ is trivially bounded by the number of points in ${\mathbb Z}^d\cap R{\mathcal D}$, which in turn is uniformly bounded for all $R\leq \theta$. This yields Theorem \ref{thm:two}. Our proof of Theorem \ref{thm:three} is similar, but slightly more complicated. The plan is to assume \begin{equation}\label{eq:littlex} \liminf_{n\to\infty} n \| n \alpha_1 \|_{{\mathbb R}/{\mathbb Z}} \cdots \| n \alpha_d\|_{{\mathbb R}/{\mathbb Z}} > 0 \end{equation} and show that this contradicts the hypothesis \eqref{eq:little2} of Theorem \ref{thm:three}. By the well known correspondence of the Littlewood conjecture and unbounded orbits (cf.~\cite[Prop.~11.1]{EinsKatoLind2006}), we have that \eqref{eq:littlex} implies that there is a compact set ${\mathcal C}'\subset\Gamma\backslash G$ such that for $T=\operatorname{diag}(T_1,\ldots,T_d)$ \begin{equation}\label{orbit001} \bigg\{ \Gamma \begin{pmatrix} 1_d & \,^\mathrm{t}\! 0 \\ -\alpha & 1 \end{pmatrix} \begin{pmatrix} T & \,^\mathrm{t}\! 0 \\ 0 & (\det T)^{-1} \end{pmatrix} \;\bigg|\; T_1,\ldots,T_d\geq 1 \bigg\} \subset{\mathcal C}'. \end{equation} Taking the transpose inverse, we infer that \begin{equation}\label{orbit002} \bigg\{ \Gamma \begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} \begin{pmatrix} T^{-1} & \,^\mathrm{t}\! 0 \\ 0 & \det T \end{pmatrix} \; \bigg|\; T_1,\ldots,T_d\geq 1 \bigg\} \subset{\mathcal C} , \end{equation} where ${\mathcal C}=\{\Gamma \,^\mathrm{t}\! M^{-1} \mid \Gamma M\in{\mathcal C}'\}\subset \Gamma\backslash G$ is compact. In view of Proposition \ref{prop:three}, we have \begin{equation}\label{eqn.GapsBdd1} {\mathcal G}\bigg( \begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} \begin{pmatrix} T^{-1} & \,^\mathrm{t}\! 0 \\ 0 & \det T \end{pmatrix} D(\theta)^{-1} \bigg) \leq C_\theta \end{equation} for all $T_1,\ldots,T_d\geq 1$ and for all $\theta>\max\{1,\overline\rho({\mathcal C},{\mathcal D}\times (0,1])\}$. In other words, \begin{equation}\label{three-eleven} G(\alpha,\mathcal{D}_T)\leq C_\theta \end{equation} for all $T_1,\ldots,T_d\geq \theta$. To establish a contradiction with hypothesis \eqref{eq:little2} of Theorem \ref{thm:three}, what needs to be shown is that \eqref{three-eleven} in fact holds for all $T_1,\ldots,T_d\geq 1$. The key point in achieving this is the following lemma. \begin{lem}\label{lem:last} Let ${\mathcal D}$ be as in Theorem \ref{thm:three}. If \eqref{eq:littlex} holds, then there is a constant $\Theta<\infty$ such that \begin{equation}\label{lastlemeq} \max_{k\in{\mathcal D}_T\cap {\mathbb Z}^d} F\bigg( \begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} \begin{pmatrix} T^{-1} & \,^\mathrm{t}\! 0 \\ 0 & \det T \end{pmatrix} , k T^{-1} \bigg)\leq \Theta \end{equation} for all $T_1,\ldots,T_d\geq 1$. \end{lem} For $T$ as above, denote by ${\mathcal G}_T(M)$ the number of distinct values of $F(M,k T^{-1})$ as $k\in{\mathbb Z}^d$ runs over ${\mathcal D} T$. Since the orbit \eqref{orbit002} is contained in a compact set, once Lemma \ref{lem:last} has been proved we may conclude (by the same argument as in the proof of Proposition \ref{prop:three}, with ${\mathcal G}$ replaced by ${\mathcal G}_T$) that there is $C_1<\infty$ such that \begin{equation}\label{eqn.GapsBdd1001} {\mathcal G}_T\bigg( \begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} \begin{pmatrix} T^{-1} & \,^\mathrm{t}\! 0 \\ 0 & \det T \end{pmatrix} \bigg) \leq C_1, \end{equation} for all $T_1,\ldots,T_d\geq 1$. Since the left hand side of \eqref{eqn.GapsBdd1001} is equal to $G(\alpha,\mathcal{D}_T)$, this completes the proof of Theorem \ref{thm:three}. \begin{proof}[Proof of Lemma \ref{lem:last}] It is sufficient to show that there is $\theta\geq 1$ such that, for every (possibly empty) subset $\mathcal{I}\subset\{1,\ldots ,d\}$, eq.~\eqref{lastlemeq} holds for all $T$ with $T_i\geq \theta$ ($i\in{\mathcal I}$) and $1\leq T_i<\theta$ ($i\notin{\mathcal I}$). We assume first ${\mathcal I}\neq\emptyset$. Let us highlight the dependence on ${\mathcal D}$ and dimension $d$ by writing $F_{\mathcal D}^{d}(M,t)=F(M,t)$. We denote by $\alpha_{\mathcal I}\in{\mathbb R}^{|{\mathcal I} |}$ and $t_{\mathcal I}\in{\mathbb R}^{|{\mathcal I} |}$ the orthogonal projections of $\alpha$ and $t$, respectively, onto the subspace corresponding the the coordinates indexed by ${\mathcal I}$, and denote by $T_{\mathcal I}$ the diagonal matrix with entries $T_i$ ($i\in{\mathcal I}$). Let $G_{\mathcal I}=\operatorname{SL}(|{\mathcal I} |+1,{\mathbb R})$ and $\Gamma_{\mathcal I}=\operatorname{SL}(|{\mathcal I} |+1,{\mathbb Z})$. Set ${\mathcal Q}=[0,\epsilon)$ and ${\mathcal Q}_T^d=[0,\epsilon T_1)\times\cdots\times[0,\epsilon T_d)$. Note that \begin{equation} S(\alpha_{\mathcal I},{\mathcal Q}_T^{|{\mathcal I} |}) = \bigg\{ \sum_{i\in{\mathcal I}} m_i \alpha_i \bmod 1\,\bigg|\, m_i\in{\mathbb Z} \cap [0,\epsilon T_i) \; (i\in{\mathcal I})\bigg\} , \end{equation} \begin{equation} S(\alpha,{\mathcal Q}_T^d) = \bigg\{ \sum_{i=1}^d m_i \alpha_i \bmod 1\,\bigg|\, m_i\in{\mathbb Z} \cap [0,\epsilon T_i) \; (i=1,\ldots,d) \bigg\} , \end{equation} and hence \begin{equation} \emptyset\neq S(\alpha,{\mathcal Q}^{|{\mathcal I} |}_T)\subset S(\alpha,{\mathcal Q}_T^d) \subset S(\alpha,{\mathcal D}_T) , \end{equation} since ${\mathcal Q}^d\subset{\mathcal D}$ by assumption. Since removing elements from a set does not decrease the size of gaps in the set, we have that the maximal gap in $S(\alpha,{\mathcal D}_T)$ is bounded above by the maximal gap in $S(\alpha,{\mathcal Q}^{|{\mathcal I} |}_T)$. Therefore, in view of \eqref{key} and $\prod_{\mathrm{i}\notin{\mathcal I}} T_i \leq \theta^{d-|{\mathcal I} |}$, we have \begin{multline} \max_{k\in{\mathcal D}_T \cap {\mathbb Z}^d} F_{{\mathcal D}}^d\bigg( \begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} \begin{pmatrix} T^{-1} & \,^\mathrm{t}\! 0 \\ 0 & \det T \end{pmatrix} , k T^{-1} \bigg) \\ \leq \theta^{d-|{\mathcal I} |} \max_{k\in{\mathcal Q}^{|{\mathcal I} |}_T\cap {\mathbb Z}^d} F_{{\mathcal Q}^{|{\mathcal I} |}}^{|{\mathcal I}|}\bigg( \begin{pmatrix} 1_{|{\mathcal I} |} & \,^\mathrm{t}\!\alpha_{\mathcal I} \\ 0 & 1 \end{pmatrix} \begin{pmatrix} T_{\mathcal I}^{-1} & \,^\mathrm{t}\! 0 \\ 0 & \det T_{\mathcal I} \end{pmatrix} , k T_{\mathcal I}^{-1} \bigg) , \end{multline} for all $T$ with $T_i\geq \theta$ ($i\in{\mathcal I}$) and $1\leq T_i<\theta$ ($i\notin{\mathcal I}$). Our assumption \eqref{eq:littlex} implies that \begin{equation} \liminf_{n\rightarrow\infty} n\prod_{i\in\mathcal{I}}\|n\alpha_i\|>0, \end{equation} and hence (by the same argument leading to \eqref{orbit002}) \begin{equation}\label{orbit002BB} \bigg\{ \Gamma_{\mathcal I} \begin{pmatrix} 1_{|{\mathcal I} |} & \,^\mathrm{t}\!\alpha_{\mathcal I} \\ 0 & 1 \end{pmatrix} \begin{pmatrix} T_{\mathcal I}^{-1} & \,^\mathrm{t}\! 0 \\ 0 & \det T_{\mathcal I} \end{pmatrix} \; \bigg|\; T_i \geq 1 \; (i\in{\mathcal I}) \bigg\} \subset {\mathcal C}_{\mathcal I} \end{equation} for some compact ${\mathcal C}_{\mathcal I}\subset\Gamma_{\mathcal I}\backslash G_{\mathcal I}$. Proposition \ref{prop:twoB} now tells us that, for any $\theta>\overline\rho({\mathcal C}_{\mathcal I},{\mathcal Q}^{|{\mathcal I} |})$, \begin{equation} \sup_{t_{\mathcal I}\in{\mathcal Q}^{|{\mathcal I} |}} F_{{\mathcal Q}^{|{\mathcal I} |}}^{|{\mathcal I}|}\bigg( \begin{pmatrix} 1_{|{\mathcal I} |} & \,^\mathrm{t}\!\alpha_{\mathcal I} \\ 0 & 1 \end{pmatrix} \begin{pmatrix} T_{\mathcal I}^{-1} & \,^\mathrm{t}\! 0 \\ 0 & \det T_{\mathcal I} \end{pmatrix} , t_{\mathcal I} \bigg) \leq \theta^{|{\mathcal I} |+1} \end{equation} for $T_i\geq \theta$ ($i\in{\mathcal I}$). Therefore, for all $\theta>\max_{{\mathcal I}\neq\emptyset} \overline\rho({\mathcal C}_{\mathcal I},{\mathcal Q}^{|{\mathcal I} |})$, we have \begin{equation}\label{lastlemeqBB} \max_{k\in{\mathcal D}_T \cap {\mathbb Z}^d} F\bigg( \begin{pmatrix} 1_d & \,^\mathrm{t}\!\alpha \\ 0 & 1 \end{pmatrix} \begin{pmatrix} T^{-1} & \,^\mathrm{t}\! 0 \\ 0 & \det T \end{pmatrix} , kT^{-1} \bigg)\leq \theta^{d+1} \end{equation} for all $T_i\geq 1$ with $\max\{T_1,\ldots,T_d\} \geq \theta$. The remaining case ${\mathcal I}=\emptyset$, where $1\leq T_1,\ldots,T_d < \theta$, is immediate via \eqref{key}, since the maximal gap is bounded by $1$, and the determinant is bounded above by $\theta^d$ for this collection of $T_i$'s. \end{proof} \section{Proof of Theorem \ref{thm:five}} \label{sec:four} For $d=1$ the statement of Theorem \ref{thm:five} is obviously implied by the three gap theorem, so assume without loss of generality that $d\ge 2$. Let $\mathcal{D}=[0,1)^d$ as in the statement of the theorem and note that, in order to prove \eqref{eqn.SupFinite}, it is enough to consider the case when $T_i=M_i\in{\mathbb N}^*$ for $1\le i\le d$. In our proof we are going to use a theorem due to Chevallier \cite[Theorem 1]{Chev2000}, which is a higher dimensional version of Geelen and Simpson's result from \cite{GeelSimp1993}. We can express Chevallier's result in our language as the statement that, for any $\alpha\in\mathbb R^d,$ and for any $N_1,\ldots ,N_d\in{\mathbb N}^*$, if $\mathcal{B}=[0,N_1)\times\cdots\times[0,N_d)\subset\mathbb R^d$ then \begin{equation}\label{eqn.Chev} G(\alpha, \mathcal{B})\le \prod_{i=1}^{d-1}N_i+3\prod_{i=1}^{d-2}N_i+1. \end{equation} Under the hypothesis of Theorem \ref{thm:five}, we can find integers $Q$ and $B_i,~1\le i\le d$, such that \begin{equation}\label{eqn.AlphBetaRelation} Q\alpha_i-B_i\beta\in{\mathbb Z}\quad\text{for}\quad 1\le i\le d. \end{equation} By replacing $\beta$ with an integer multiple of $\beta$, we may assume without loss of generality that $\mathrm{gcd}(B_1,\ldots B_d)=1$. Let us restrict our attention to the situation when $B_i>0$ for each $i$. If this is not the case then the proof follows by minor modifications of the argument we are about to give. Suppose that $T_i=M_i\in{\mathbb N}^*$ and for each $i$ let $A_i$ and $R_i$ be the unique integers for which $A_i\ge 0,~1\le R_i\le Q$, and \begin{equation} M_i=A_iQ+R_i. \end{equation} Then we have that \begin{align} S(\alpha,\mathcal{D}_T)=\bigcup_{\mathcal{I}\subset\{1,\ldots ,d\}}S_\mathcal{I}, \end{align} where $\mathcal{I}$ runs over all subsets of $\{1,\ldots ,d\}$ (including the empty set) and $S_\mathcal{I}$ is defined by \begin{align} S_\mathcal{I}&=\left\{\sum_{i\in\mathcal{I}}(A_iQ+r_i)\alpha_i+\sum_{i\notin\mathcal{I}}(a_iQ+r_i)\alpha_i~\mathrm{mod}~1~:~\substack{1\le r_i\le R_i,i\in\mathcal{I}\\ 0\le a_i< A_i,1\le r_i\le Q, i\notin\mathcal{I}}\right\} \\ &=\left\{\left(\sum_{i\in\mathcal{I}}A_iB_i+\sum_{i\notin\mathcal{I}}a_iB_i\right)\beta+\sum_{i=1}^dr_i\alpha_i~\mathrm{mod}~1~:~\substack{1\le r_i\le R_i,i\in\mathcal{I}\\ 0\le a_i< A_i,1\le r_i\le Q, i\notin\mathcal{I}}\right\}.\label{eqn.S_IDesc} \end{align} Now we will need the following elementary number theoretic lemma. \begin{lem}\label{lem.ElemNumThy} Suppose that $k\ge 2$ is an integer, that $q_1,\ldots ,q_k\in{\mathbb N}^*$, and that, for each $1\le i\le k$, $C_i$ and $D_i$ are integers satisfying \begin{equation} D_i-C_i\ge\max_{1\le j\le k}q_j. \end{equation} Let $r=\mathrm{gcd}(q_1,\ldots ,q_k)$ and \begin{equation} \mathcal{A}=\left\{\sum_{i=1}^ka_iq_i~:~C_i\le a_i\le D_i\right\}, \end{equation} and set \begin{equation} C=\sum_{i=1}^dC_iq_i\quad\text{and}\quad D=\sum_{i=1}^dD_iq_i. \end{equation} Then we have that \begin{equation}\label{eqn.LemInclusion1} \mathcal{A}\subset\left\{mr~:~\frac{C}{r}\le m\le\frac{D}{r}\right\}, \end{equation} and \begin{equation}\label{eqn.LemInclusion2} \left\{mr~:~\frac{C}{r}+\frac{1}{r^2}\sum_{i=1}^{k-1}q_iq_{i+1}\le m\le\frac{D}{r}-\frac{1}{r^2}\sum_{i=1}^{k-1}q_iq_{i+1}\right\}\subset\mathcal{A}. \end{equation} \end{lem} \begin{proof} The inclusion in equation \eqref{eqn.LemInclusion1} is quite obvious, so we will focus on proving \eqref{eqn.LemInclusion2}. Our proof is by induction on $k$, so first let us consider the case when $k=2$. In this case, if $n\in{\mathbb N}^*$ and if there is an integer solution $(a_1,a_2)$ to the equation \begin{equation} a_1q_1+a_2q_2=n, \end{equation} then it must be the case that $n=mr$ for some $m\in{\mathbb Z}$. Then we have that \begin{equation} a_2=m(q_2/r)^{-1}~\mathrm{mod}~(q_1/r)\quad\text{and}\quad a_1=\frac{n-a_2q_2}{q_1}. \end{equation} We are imposing the conditions that $C_i\le a_i\le D_i$, and the assumption that $D_2-C_2\ge q_1$ guarantees that there is at least one choice of $a_2$ satisfying the first equation here. The smallest admissible choice for such an integer $a_2$ is at least as small as $C_2+q_1/r$, and the largest admissible choice for such an $a_2$ is at least as large as $D_2-q_1/r$. As long as there is at least one admissible choice of $a_1$, as $a_2$ runs over this range, then we can guarantee that $n\in\mathcal{A}$. This will be the case if \begin{equation} \frac{n-(C_2+q_1/r)q_2}{q_1}\ge C_1\qquad\text{and}\qquad \frac{n-(D_2-q_1/r)q_2}{q_1}\le D_1, \end{equation} and these inequalities will both be satisfied if \begin{equation} \frac{C}{r}+\frac{q_1q_2}{r^2}\le m\le \frac{D}{r}-\frac{q_1q_2}{r^2}. \end{equation} This finishes the proof when $k=2$. Now suppose that $k>2$ and that the lemma is true, for all choices of parameters, with $k$ replaced by $k-1$. Let $r'=\mathrm{gcd}(q_1,\ldots ,q_{k-1})$, \begin{equation} C'=\sum_{i=1}^{k-1}C_iq_i,\qquad\text{and}\qquad D'=\sum_{i=1}^{k-1}D_iq_i, \end{equation} and set \begin{equation} \mathcal{A}'=\left\{\sum_{i=1}^{k-1}a_iq_i~:~C_i\le a_i\le D_i\right\}. \end{equation} Then it is clear that \begin{equation} \mathcal{A}=\left\{n+a_kq_k~:~n\in\mathcal{A}', C_k\le a_k\le D_k\right\} \end{equation} and, by our inductive hypothesis, we have that $\mathcal{A}$ contains the set \begin{equation}\label{eqn.LemGenkSet} \left\{mr'+a_kq_k~:~\frac{C'}{r'}+\frac{1}{{r'}^2}\sum_{i=1}^{k-2}q_iq_{i+1}\le m\le\frac{D'}{r'}-\frac{1}{{r'}^2}\sum_{i=1}^{k-2}q_iq_{i+1},~C_k\le a_k\le D_k\right\}. \end{equation} Now let $\tilde{q}_1=r',~\tilde{q}_2=q_k,$ \begin{align} \tilde{C}_1&=\frac{C'}{r'}+\frac{1}{{r'}^2}\sum_{i=1}^{k-2}q_iq_{i+1},\\ \tilde{D}_1&=\frac{D'}{r'}-\frac{1}{{r'}^2}\sum_{i=1}^{k-2}q_iq_{i+1}, \end{align} $\tilde{C}_2=C_k$, and $\tilde{D}_2=D_k$. Then $\mathrm{gcd}(\tilde{q}_1,\tilde{q}_2)=r$ and, by the same argument used above to settle the $k=2$ case, we find that the set \eqref{eqn.LemGenkSet} contains all integers of the form $mr$, with \begin{equation} \frac{\tilde{C}_1\tilde{q}_1+\tilde{C}_2\tilde{q}_2}{r}+\frac{\tilde{q}_1\tilde{q}_2}{r^2}\le m\le \frac{\tilde{D}_1\tilde{q}_1+\tilde{D}_2\tilde{q}_2}{r}-\frac{\tilde{q}_1\tilde{q}_2}{r^2}. \end{equation} Finally, we compute that \begin{align} \frac{\tilde{C}_1\tilde{q}_1+\tilde{C}_2\tilde{q}_2}{r}+\frac{\tilde{q}_1\tilde{q}_2}{r^2}&=\frac{1}{r}\sum_{i=1}^kC_iq_i+\frac{1}{rr'}\sum_{i=1}^{k-2}q_iq_{i+1}+\frac{r'q_k}{r^2}\\ &\le\frac{C}{r}+\frac{1}{r^2}\sum_{i=1}^{k-1}q_iq_{i+1}, \end{align} and that \begin{align} \frac{\tilde{D}_1\tilde{q}_1+\tilde{D}_2\tilde{q}_2}{r}-\frac{\tilde{q}_1\tilde{q}_2}{r^2}&=\frac{1}{r}\sum_{i=1}^kD_iq_i-\frac{1}{rr'}\sum_{i=1}^{k-2}q_iq_{i+1}-\frac{r'q_k}{r^2}\\ &\ge\frac{D}{r}-\frac{1}{r^2}\sum_{i=1}^{k-1}q_iq_{i+1}. \end{align} It is clear from this that \eqref{eqn.LemInclusion2} holds, and our inductive argument is complete. \end{proof} Now we return to the main line of proof. Let us first consider the case when \begin{equation}\label{eqn.AMinHyp} \min_{1\le i\le d}A_i~>~\max_{1\le j\le d}B_j. \end{equation} With a view towards applying Lemma \ref{lem.ElemNumThy} in order to understand the points of the sets $S_\mathcal{I}$, for $\mathcal{I}\subset\{1,\ldots ,d\}$, let \begin{equation} \mathcal{A}_\mathcal{I}=\left\{\sum_{i\in\mathcal{I}}A_iB_i+\sum_{i\notin\mathcal{I}}a_iB_i~:~0\le a_i< A_i,i\notin\mathcal{I}\right\}. \end{equation} Setting \begin{equation} D_\mathcal{I}=\sum_{i\in\mathcal{I}}A_iB_i+\sum_{i\notin\mathcal{I}}(A_i-1)B_i, \end{equation} we have by the lemma that \begin{equation}\label{eqn.S_phiInc} \left\{\sum_{i=1}^{d-1}B_iB_{i+1}\le m \le D_\emptyset-\sum_{i=1}^{d-1}B_iB_{i+1} \right\}\subset \mathcal{A}_\emptyset \end{equation} and, for any $\mathcal{I}$, that \begin{equation}\label{eqn.S_IInc} \mathcal{A}_\mathcal{I}\subset\left\{0\le m\le D_\mathcal{I}\right\}\subset\left\{0\le m\le D_\mathcal{\emptyset}+\sum_{i=1}^d B_i\right\}. \end{equation} Now, comparing the definitions of $\mathcal{A}_\mathcal{I}$ with the descriptions of the corresponding sets $S_\mathcal{I}$ from \eqref{eqn.S_IDesc}, we see that each set $S_\mathcal{I}$ consists of points of the form \begin{equation}\label{eqn.GenPtForm} m\beta+\sum_{i=1}^dr_i\alpha_i, \end{equation} with $m\in\mathcal{A}_\mathcal{I}$ and with each parameter $r_i$ taken either from the interval $[1,R_i]$ or from $[1,Q]$. From \eqref{eqn.S_phiInc} we see that $S_\emptyset$ contains all points of the set \begin{equation} S'=\left\{m\beta+\sum_{i=1}^dr_i\alpha_i~:~\sum_{i=1}^{d-1}B_iB_{i+1}\le m \le D_\emptyset-\sum_{i=1}^{d-1}B_iB_{i+1},~1\le r_i\le Q\right\}. \end{equation} Furthermore, by \eqref{eqn.S_IInc} we see that any other point of the form \eqref{eqn.GenPtForm}, which is included in one of the sets $S_\mathcal{I}$ but not in $S'$, must have \begin{equation} 0\le m<\sum_{i=1}^{d-1}B_iB_{i+1}\qquad\text{or}\qquad D_\emptyset-\sum_{i=1}^{d-1}B_iB_{i+1}<m\le D_\emptyset+\sum_{i=1}^dB_i \end{equation} and \begin{equation} 1\le r_i\le Q, \end{equation} for each $i$. The number of such points is bounded above by a constant which depends only on $B_1,\ldots ,B_d,$ and $Q$. At this point we have shown that the set $S(\alpha,\mathcal{D}_T)$ can be written as \begin{equation} S(\alpha,\mathcal{D}_T)=S'\cup S'', \end{equation} with $S'$ as above, and with the set $S''$ containing no more than $C=C(B_1,\ldots , B_d,Q)$ elements. Now using Chevallier's result \eqref{eqn.Chev} with $d$ replaced by $d+1,~N_1=\cdots=N_d=Q$, and \begin{equation} N_{d+1}=D_\emptyset-2\sum_{i=1}^{d-1}B_iB_{i+1}+1, \end{equation} we see that the number of distinct gaps between consecutive elements of $S'$ is at most \begin{equation} Q^d+3Q^{d-1}+1. \end{equation} Each element of $S''$ can divide at most one of these gaps, creating at most two new distinct gaps. Therefore we have proved that \begin{equation} G(\alpha,\mathcal{D}_T)\le Q^d+3Q^{d-1}+1+2C. \end{equation} This completes the proof in the case when \eqref{eqn.AMinHyp} holds. The remaining cases are no more difficult. If it happens that one or more of the quantities $A_i$ is chosen so that \begin{equation} A_i\le\max_{1\le j\le d}B_j, \end{equation} then the corresponding value of $M_i$ is also bounded by a constant which only depends on $B_1,\ldots ,B_d$ and $Q$. In this case we may ignore this index $i$ in our construction of the sets $S_\mathcal{I}$, until the end when we may apply the same argument as before. This therefore completes the proof. \section{Proofs of Theorems \ref{thm:oneB}-\ref{thm:threeB}}\label{sec:Slater} The proofs of our higher dimensional Slater theorems are simple adaptations of the machinery which we have developed. Using the notation from the Introduction, note that \begin{align} \tau(q,{\mathcal D}) & = \min\{ n>0 \mid q+ n\alpha +m \in{\mathcal D}, \; (m,n)\in{\mathbb Z}^{d+1} \} \\ & = \min\{ y > 0 \mid x + q \in{\mathcal D}, \; (x,y)\in{\mathbb Z}^{d+1} \tilde A_1 \} , \end{align} with \begin{equation} \tilde A_1 =\begin{pmatrix} 1_d & \,^\mathrm{t}\! 0 \\ \alpha & 1 \end{pmatrix} , \end{equation} and therefore \begin{equation} \tau(q,{\mathcal D}_B) = (\det B)^{-1} \min\{ y > 0 \mid x + q B^{-1} \in{\mathcal D}, \; (x,y)\in{\mathbb Z}^{d+1} \tilde A_B \} \end{equation} with \begin{equation} \tilde A_B =\begin{pmatrix} 1_d & \,^\mathrm{t}\! 0 \\ \alpha & 1 \end{pmatrix} \begin{pmatrix} B^{-1} & 0 \\ 0 & \det B \end{pmatrix} . \end{equation} This shows that \begin{equation} \tau(q,{\mathcal D}_B) = (\det B)^{-1} F(\tilde A_B, q B^{-1}). \end{equation} For Theorem \ref{thm:oneB} we choose $B=\operatorname{diag}(R_i,\ldots,R_i)^{-1}$. Taking transpose-inverses of the matrices defining the lattices in \eqref{friday}, and using the fact that $P=-P$, we see that if $\alpha\in P$ then, with $t_i=\log R_i$, the set \begin{equation}\label{fridayB} \bigg\{ \Gamma \begin{pmatrix} 1_d & \,^\mathrm{t}\! 0 \\ \alpha & 1 \end{pmatrix} \Phi^{-t_i} \;\bigg|\; i\in{\mathbb N}^* \bigg\} \end{equation} is dense in $\Gamma\backslash G$. Theorem \ref{thm:oneB} then follows from Corollary \ref{cor:dense} and Proposition \ref{prop:three} as before. Theorems \ref{thm:twoB} and \ref{thm:threeB} follow from the remaining arguments in Section \ref{sec:three}. We note, however, that the proof of Theorem \ref{thm:threeB} is actually simpler than the proof of the corresponding Theorem \ref{thm:three}. This is because, when we get to the equation analogous to \eqref{eqn.GapsBdd1}, we deduce that \begin{equation} {\mathcal G}\bigg( \begin{pmatrix} 1_d & 0 \\ -\alpha & 1 \end{pmatrix} \begin{pmatrix} T & \,^\mathrm{t}\! 0 \\ 0 & (\det T)^{-1} \end{pmatrix} D(\theta)^{-1} \bigg) \leq C_\theta \end{equation} for all $T_1,\ldots,T_d\geq 1$ and for all $\theta>\overline\rho({\mathcal C}',{\mathcal D}\times (0,1])$. This implies that \begin{equation} L(\alpha,\mathcal{D}_{T^{-1}})\le C_\theta, \end{equation} for all $T_1,\ldots ,T_d\ge \theta^{-1}$. Since it is clear that we may take $\theta\ge 1$, this is all that is needed to complete the proof of Theorem \ref{thm:threeB}.
\section{Introduction} \label{SecIntro} The standard model of cosmology, Lambda Cold Dark Matter ($\Lambda$CDM), makes clear predictions for the dark halo mass function once the cosmological parameters are specified \citep{Jenkins2001,Tinker2008,Angulo2012}. At the low mass end, this is much steeper than the faint end of the galaxy stellar mass function, an observation that precludes a simple, linear relation between galaxy and halo masses at the faint end. The difference can be resolved if galaxies fail to form in haloes below some `threshold' mass; this confines galaxies to relatively massive haloes, preventing the formation of large numbers of faint dwarfs and reconciling the faint-end slope of the galaxy luminosity function with the predictions of $\Lambda$CDM \citep[see, e.g.,][and references therein]{White1991,Benson2003}. This is not simply an ad-hoc solution. QSO studies have long indicated that the Universe reionized soon after the first stars and galaxies formed \citep[$z_{\rm reion}\lesssim 8$; see, e.g.,][]{Fan2006b}, an event that heated the intergalactic medium to the ionization energy of hydrogen, evaporating it away from low-mass haloes and proto-haloes, especially from those that had not yet been able to collapse. In slightly more massive haloes, where gas is able to collapse, vigorous winds powered by the energy of the first supernovae expel the remaining gas. These processes thus provide a natural explanation for the steeply declining galaxy formation efficiency with decreasing halo mass required to match the faint end of the galaxy stellar mass function. Cosmological galaxy formation simulations, such as those from the APOSTLE/EAGLE \citep{Schaye2015,Sawala2016b} or Illustris projects \citep{Vogelsberger2014} rely heavily on this mechanism to explain not only the faint-end of the luminosity function, but also the abundance of Galactic satellites, their stellar mass distribution, and their dark matter content \citep[see; e.g.,][]{Sawala2016a}. Simulations like APOSTLE\footnote{APOSTLE: A Project Of Simulating The Local Environment.} predict a tight correlation between galaxy mass and halo mass; given the stellar mass of a galaxy, $\Mstr$, its halo mass is constrained to better than $\sim~15$ per cent in the dwarf galaxy regime, defined hereafter as $\Mstr <10^9\, M_\odot$. Because of the steep mass dependence of the galaxy formation efficiency in this mass range the converse is not true: at a given halo mass galaxies scatter over decades in stellar mass, in agreement with the latest semi-analytic models of galaxy formation \citep{Moster2017}. This is especially true of `faint dwarfs', defined as those fainter than $\Mstr \sim 10^7\, M_\odot$ (about the mass of the Fornax dwarf spheroidal), which are all expected to form in haloes of similar mass, or, more specifically, haloes with maximum circular velocity in the range $20 \lesssim V_{\rm max}/{\rm km\, s}^{-1} \lesssim 30$ \citep[see; e.g.,][]{Okamoto2009,Sawala2016b,Oman2016}. This observation has a couple of important corollaries. One is that, since the dark mass profile of CDM haloes is well constrained \citep[][hereafter NFW]{Navarro1996,Navarro1997}, the dark matter content of faint dwarfs should depend tightly on their size: physically larger galaxies are expected to enclose more dark matter and have, consequently, higher velocity dispersions. A second corollary is that galaxies large enough to sample radii close to $r_{\rm max}$, where the halo circular velocity reaches its maximum value, $V_{\rm max}$, should all have similar characteristic circular velocities of order $20$--$30 \kms$ , reflecting the narrow range of their parent halo masses. For this velocity range, $r_{\rm max}$ is expected to be of order $\sim 3$--$6$~kpc, and faint dwarfs as large as $\sim 1$ kpc should have circular velocities well above $\sim~15 \kms$. At first glance, these corollaries seem inconsistent with the observational evidence. Indeed, there is little correlation between velocity dispersion and size in existing faint dwarf samples, and there are a number of dwarfs that, although large enough to sample radii close to $r_{\rm max}$, still have velocity dispersions well below $\sim 20 \kms$. A prime example is the recently discovered Crater 2 dwarf spheroidal \citep{Torrealba2016}, termed a `cold faint giant' for its large size (projected half-mass radius $r_{1/2}\sim 1$ kpc), low stellar mass ($\Mstr \sim 10^{5} \,M_\odot$) and small velocity dispersion \citep[$\sigma_{\rm los}\sim 3 \kms$,][]{Caldwell2017}. The basic disagreement between the relatively large velocities expected for dwarfs and the low values actually measured is at the root of a number of `challenges' to $\Lambda$CDM on small scales identified in recent years \citep[see, e.g., the recent reviews by][]{DelPopolo2017,Bullock2017}. Before rushing to conclude that these problems signal the need for a radical change in the cold dark matter paradigm, it is important to recall that the corollaries listed above rest on two important assumptions: one is that (i) the assembly of a dwarf does not change appreciably the dark matter density profile, and another is that (ii) dwarfs have evolved in isolation and have not been subject to the effects of external tides, which may in principle substantially alter their dark matter and stellar content. The first issue has been heavily debated in the literature, where, depending on the algorithmic choice made for star formation and feedback, simulations show that the baryonic assembly of the galaxy can in principle reduce the central density of dark matter haloes and create `cores' \citep{Navarro1996b,Read2005,Mashchenko2006,Governato2012,Pontzen2014,Onorbe2015}, or not \citep{Schaller2015b,Oman2015,Vogelsberger2014}. Consensus has yet to be reached on this issue but we shall use for our discussion simulations that support the more conservative view that faint dwarfs are unable to modify substantially their dark haloes. If baryon-induced cores are indeed present in this mass range (and are large enough to be relevant), they would only help to ease the difficulties that arise when contrasting theoretical $\Lambda$CDM expectations with observation. The second issue is also important, since much of what is known about the faintest galaxies in the Universe has been learned from samples collected in the Local Group (LG), and therefore include satellites of the Milky Way (MW) and Andromeda (M31), which may have been affected by the tidal field of their hosts. It is therefore important to consider in detail the potential effect of tidal stripping on the structural properties of satellites and their relation to isolated dwarfs. Tides have been long been argued to play a critical role in determining the mass and structure of satellites \citep[see, e.g.,][and references therein]{Mayer2001,Kravtsov2004b,DOnghia2009,Kazantzidis2011,Tomozeiu2016,Frings2017}. We address this issue here using a combination of direct cosmological hydrodynamical simulations complemented with the tidal stripping models of \citet[][hereafter PNM08]{Penarrubia2008b} and \citet[][E15]{Errani2015}, which parametrise the effect of tidal stripping in a particularly simple way directly applicable to observed dwarfs. We are thus able to track tidally-induced changes even for very faint dwarf satellites, where cosmological simulations are inevitably compromised by numerical limitations. This paper is organized as follows. Sec.~\ref{SecObs} describes the observational sample we use in this study, and the procedure we use to estimate their dark matter content from their half-light radii and velocity dispersions. The APOSTLE hydrodynamical simulations are introduced in Sec.~\ref{SecSims}, followed by a discussion of the galaxy mass-halo mass relation in Sec.~\ref{SecMstarVc}. The effects of tidal stripping are discussed in in Sec.~\ref{SecTidStrip}; their implications for the mass discrepancy-acceleration relation (MDAR) are discussed in Sec~\ref{SecMDAR}, and for Modified Newtonian Dynamics (MOND) in Sec~\ref{SecMOND}. We summarize our main conclusions in Sec.~\ref{SecConc}. \section{Observational data} \label{SecObs} \subsection{Dynamical masses} \label{Sec DynMass} The total mass within the half-light radius of velocity dispersion-supported stellar systems, such as dwarf spheroidals (dSphs), can be robustly estimated for systems that are close to equilibrium, reasonably spherical in shape, and with constant or slowly varying velocity dispersion profiles \citep[e.g.,][]{Walker2009d}. \citet{Wolf2010}, in particular, show that the enclosed mass within the 3D (deprojected) half-light radius ($r_{1/2}$) may be approximated by \begin{equation} M_{1/2}=3\,G^{-1}\,\sigma_{\rm los}^2\,r_{1/2}, \label{eqW10} \end{equation} where $\sigma_{\rm los}$ is the luminosity-weighted line-of-sight velocity dispersion of the stars and $r_{1/2}$ has been derived from the (projected) effective radius, $R_{\rm eff}$, using $r_{1/2}=(4/3)R_{\rm eff}$. We adopt Eq.~\ref{eqW10} to estimate $M_{1/2}$ for all dwarf galaxies in the LG with measured velocity dispersion and effective radius. As is customary, we use the circular velocity at $r_{1/2}$ as a measure of mass, instead of $M_{1/2}$: \begin{equation} V_{1/2}\equiv V_{\rm circ}(r_{1/2})=\left({GM_{1/2}\over r_{1/2}}\right)^{1/2}. \label{EqV1/2} \end{equation} Note that with this definition, $V_{1/2}$ is simply a rescaled measure of the velocity dispersion, $V_{1/2}=3^{1/2}\sigma_{\rm los}$. We note that some of the LG field galaxies and dwarf ellipticals of M31 show some signs of rotation in their stellar component \citep[e.g.,][]{Kirby2014,Geha2010,Leaman2012}. The implied corrections to $M_{1/2}$ are relatively small, however, and we neglect them here for simplicity. In addition, many of our conclusions apply primarily to dwarf spheroidals, which are dispersion-supported systems with no detectable rotation. \subsection{Galaxy sample} \label{SecGxSample} We use the current version of the Local Group data compilation of \citet{McConnachie2012} as the source of our observational dataset\footnote{More specifically, we use the October 2015 version from \url{http://www.astro.uvic.ca/~alan/Nearby\\% _Dwarf_Database.html}}, updated to include more recent measurements when available. Distance moduli, angular half-light radii, and stellar velocity dispersions are used for estimating $V_{1/2}$ at $r_{1/2}$. We also derive stellar masses for all dwarfs from their distance moduli and V-band magnitudes, using the stellar mass-to-light ratios of \citet{Woo2008}. For cases where stellar mass-to-light ratios are not available, we adopt $\Mstr/L_{\rm V}=1.6$ and $\Mstr/L_{\rm V}=0.7$ for dSphs and dwarf irregulars (dIrr), respectively. We list all of our adopted observational parameters for Local Group dwarfs, as well as the corresponding references, in Table~\ref{TabData1}. Uncertainties in $M_{1/2}$ (or $V_{1/2}$), $\Mstr$, and $r_{1/2}$ are derived by propagating the errors in the relevant observed quantities. Since \citet{Woo2008} do not report individual uncertainties on stellar mass-to-light ratios, we assume a constant 10 per cent uncertainty for all dwarfs. Our mass estimates neglect the effects of rotation but add in quadrature an additional $20$ per cent uncertainty to $M_{1/2}$ in order to account for the base uncertainty introduced by the modelling procedure \citep[for details, see][]{Campbell2016}. Following common practice, we shall group dwarf galaxies into various loose categories, according to their stellar mass. `Classical dSphs' is a shorthand for systems brighter than $M_{\rm V}=-8$; fainter galaxies will be loosely referred to as `ultra faint'. Further, we shall use the term `faint dwarfs' to refer to all systems with $\Mstr<10^7\, M_\odot$. The reason for this last category will become clear below. It will also be useful to distinguish four types of galaxies, according to where they are located in or around the Local Group: \begin{itemize} \item {\bf Milky Way satellites}. These are all galaxies within 300 kpc of the centre of the MW. Our dataset include all classical dSphs of the MW and all newly discovered ultra faint dwarfs for which relevant data are available. \item {\bf M31 satellites}: All galaxies within 300 kpc from the centre of M31. Velocity dispersion measurements are available for many M31 satellites, mainly from \citet{Collins2013} and \citet{Tollerud2012}. For satellites with more than one measurement of $\sigma_{\rm los}$, we adopt the estimate based on the larger number of member stars. Structural parameters of M31 satellites in the PAndAS footprint \citep{McConnachie2009} have been recently updated by \citet{Martin2016}, whose measurements we adopt here. \item {\bf LG field members}: These are dwarf galaxies located further than 300 kpc from either the MW or M31, but within 1.5 Mpc of the LG centre, defined as the point equidistant from the MW and M31. Velocity dispersion measurements are available for all of these systems, as reported by \citet{Kirby2014}. \item{\bf Nearby galaxies}: These are galaxies in the compilation of \citet{McConnachie2012} which are further than 1.5 Mpc from the LG centre. This dataset includes most galaxies with accurate distance estimates based on high precision methods, such as the tip of the red giant branch (TRGB). The furthest galaxies we consider are located about 3 Mpc away from the MW. Velocity dispersion measurements are not available for all of these galaxies, but estimates exist for their stellar masses, half-light radii, and metallicities. \end{itemize} \begin{figure*} \hspace{-0.2cm} \resizebox{17.5cm}{!}{\includegraphics{Figures_pdf/Mstar_Vmax.pdf}}\\% \caption{ {\it Top-left:} Stellar mass, $\Mstr$, versus maximum circular velocity, $V_{\rm max}$, of APOSTLE centrals. Crosses indicate all centrals $\Mstr>10^5\, M_\odot$ (resolved with more than $\sim 10$ particles in AP-L1 runs); dots indicate systems with $\Mstr<10^5\, M_\odot$ ($1$ to $10$ star particles). The dashed line is a fit of the form $M_{\rm str}/\Msun=m_0\,\nu^{\alpha}\exp(-\nu^{\gamma})$, where $\nu=V_{\rm max}/50 \kms$, and $(m_0,\alpha,\gamma)$ are $(3.0\times10^8, 3.36, -2.4)$. The same dashed line is repeated in every panel for reference. The thin grey line shows the extrapolation to faint objects of the abundance-matching relation of \citet{Guo2010}, also for reference. {\it Top-right:} Same as top left, but for APOSTLE {\it satellites} with $\Mstr>10^5\, M_\odot$. Each satellite is coloured by the reduction in $V_{\rm max}$ caused by tidal effects. {\it Bottom-left:} As top-left, but for the `peak' $\Mstr$ and $V_{\rm max}$, typically measured just before first accretion into the primary halo. {\it Bottom-right:} $\Mstr$ vs $V_{1/2}$ for LG dwarfs. Satellites of the MW and M31 are shown in black, `field' objects are shown in red. Gas-rich disc galaxies such as the Magellanic Clouds, M~33, or IC~10, are not considered in our analysis.} \label{FigMstarVcirc} \end{figure*} \section{The Simulations} \label{SecSims} The APOSTLE project consists of a suite of zoomed-in cosmological hydrodynamical simulations of $12$ volumes chosen to match the main dynamical characteristics of the LG. The full selection procedure is described in \citet{Fattahi2016} and a detailed discussion of the main simulation characteristics is given in \citet{Sawala2016b}. In brief, $12$ LG candidate volumes ware selected from the DOVE dark matter-only $\Lambda$CDM simulation of a periodic box $100 \Mpc$ on a side \citep{Jenkins2013}. Each volume contains a relatively isolated pair of haloes with virial\footnote{We define virial quantities as those contained within a sphere of mean overdensity $200\times$ the critical density for closure, $\rho_{\rm crit}=3H_0^2/8\pi G$, and identify them with a `200' subscript.} mass $M_{\rm 200}\sim10^{12} \Msun$, separated by $d=600$--$1000$ kpc, and approaching each other with relative radial velocity in the range $V_{\rm rad}=0$--$250 \kms$. The relative tangential velocity of the pair members was constrained to be less than $100 \kms$, and the Hubble flow was constrained to match the small deceleration observed for distant LG members. Each zoomed-in volume is uncontaminated by massive boundary particles out to $\sim 3$ Mpc from the barycentre of the MW-M31 pair. The candidate volumes were simulated at three different levels of resolution, labelled L1 (highest) to L3 (lowest resolution), using the code developed for the EAGLE project \citep{Schaye2015,Crain2015}. The code is a highly modified version of the Tree-PM/smoothed particle hydrodynamics code, P-Gadget3 \citep{Springel2005b}. The hydrodynamical forces are calculated using the pressure-entropy formalism of \citet{Hopkins2013}, and the subgrid physics model was calibrated to reproduce the stellar mass function of galaxies at $z=0.1$ in the stellar mass range of $\Mstr=10^8-10^{12} \Msun$, and to yield realistic galaxy sizes. The galaxy formation subgrid model includes metallicity-dependent star formation and cooling, metal enrichment, stellar and supernova feedback, homogeneous X-ray/UV background radiation (hydrogen reionization assumed at $z_{\rm reion}=11.5$), supermassive black-hole formation, and AGN activity. Details of the subgrid models can be found in \citet{Schaye2015,Crain2015,Schaller2015c}. The APOSTLE simulations adopt the parameters of the `ref' EAGLE model in the language of the aforementioned papers. Haloes and bound (sub)structures in the simulations are found using the FoF algorithm \citep{Davis1985} and SUBFIND \citep{Springel2001a}, respectively. First, FoF is run on the DM particles with linking length 0.2 times the mean inter particle separation to identify the haloes. Gas and star particles are then associated to their nearest DM particle. In a second step, SUBFIND searches iteratively for bound (sub)structures in any given FoF halo using {\it all} particle types associated to it. We shall refer to MW and M31 analogs as `primary' or `host' haloes, even though in some of the volumes they are found within the same FoF group. Galaxies formed in the most massive subhalo of each distinct FoF group will be referred to as `centrals' or `field' galaxies, hereafter. Throughout this paper we use the highest resolution APOSTLE runs, L1, with gas particle mass of $\sim 10^4 \Msun$ and maximum force softening length of $134$ pc. Four simulation volumes have so far been completed at resolution level L1, corresponding to AP-01, AP-04, AP-06, AP-11 in table~2 of \citet{Fattahi2016}. The simulations adopt cosmological parameters consistent with 7-year Wilkinson Microwave Anisotropy Probe \citep[WMAP-7,][]{Komatsu2011} measurements, as follows: $\Omega_{\rm M}=0.272$, $\Omega_{\Lambda}=0.728$, $h=0.704$, $\sigma_8=0.81$, $n_s=0.967$. \begin{figure*} \hspace{-0.2cm} \resizebox{17cm}{!}{\includegraphics{Figures_pdf/progenitors.pdf}}\\% \caption{{\it Top-left}: Circular velocity, $V_{1/2}$, at the stellar half-mass radius, $r_{1/2}$, of LG `faint dwarfs' ($\Mstr<10^7 \Msun$), as a function of $r_{1/2}$. The shaded area delineates the minimum velocities expected for such dwarfs, bracketed by two NFW profiles with $V_{\rm max}=20$ and $36 \kms$, respectively (see shaded region in the top-left panel of Fig.~\ref{FigMstarVcirc}; symbol types are as in the bottom-right panel of that figure). LG field dwarfs are shown in red, and are generally consistent with this expectation. Satellites with velocity dispersion below the shaded region are identified as having lost mass to tidal stripping, and are highlighted in cyan. {\it Bottom-left}: Same as top-left but for the progenitors of LG satellites, inferred as described in the text. The purple curves are three examples of `tidal stripping tracks' (PNM08). Each tick mark corresponds to successive mass losses of $90$ per cent. The progenitor parameters are set by assuming that they match $\Mstr$--$V_{\rm max}$ relation for isolated APOSTLE dwarfs, their $r_{1/2}$--$V_{1/2}$ follow CDM circular velocity profiles. (See Fig.~\ref{FigMethod} for a schematic description of the method.) {\it Top-right}: $\Mstr$ vs $r_{1/2}$ relation for our galaxy sample as well as for the late-type galaxies in the SPARC survey \citep[grey squares;][]{Lelli2016a}. The dashed magenta line roughly indicates the minimum effective surface brightness limit of current surveys. {\it Bottom-right}: Same as top-right, but for satellite progenitors. Note that the progenitors are in excellent agreement with other field galaxies, a result that provides independent support for our proposal that the low-velocity dispersion satellites identified as `stripped' in the top-left panel have indeed been heavily affected by tidal stripping.} \label{FigVcRM} \end{figure*} \section{Results} \label{SecResults} \subsection{Galaxy mass-halo mass relation in APOSTLE} \label{SecMstarVc} The top-left panel of Fig.~\ref{FigMstarVcirc} shows the $\Mstr$-$V_{\rm max}$ relation for all `central' galaxies in the four L1 APOSTLE volumes. Since we are mainly interested in dwarfs, we only show galaxies forming in haloes with $V_{\rm max}<100 \kms$ (or, roughly, $\Mstr<10^{10}\, M_\odot$). Galaxy stellar masses \footnote{Stellar masses computed this way agree in general very well with the `bound stellar mass' returned by SUBFIND. Choosing either definition does not alter any of our conclusions.} are measured within the `galactic radius', $r_{\rm gal}$, defined as $0.15\, r_{200}$. This panel shows the tight relation between galaxy and halo masses anticipated for isolated APOSTLE galaxies in Sec.~\ref{SecIntro}. Crosses indicate systems resolved with more than $10$ star particles, and small dots systems with $1$-$10$ star particles. It is clear that very few of the galaxies that succeed in forming stars in our AP-L1 simulations do so in haloes with $V_{\rm max}<20 \kms$. In addition, essentially {\it all} isolated `faint dwarfs' ($\Mstr<10^7\, M_\odot$) inhabit haloes spanning a narrow range of circular velocity, $18<V_{\rm max}/\kms<36$. The few that stray to lower velocities are actually former satellites that have been pushed out of the virial boundaries of their primary halo by many-body interactions \citep{Sales2007b,Ludlow2009,Knebe2011}. The top-right panel of Fig.~\ref{FigMstarVcirc} is analogous to the top-left, but for `satellite' galaxies\footnote{The virial radius of subhaloes is not well defined, so we use the average relation between $r_{\rm gal}$ and $\Vmax$ of centrals, $r_{\rm gal}/$kpc$=0.169\,(V_{\rm max}/\kms)^{1.01}$, to estimate the galactic radii, $r_{\rm gal}$, of satellites.} , defined as those within 300~kpc of either primary. The difference with isolated systems is obvious: at fixed $\Mstr$ the haloes of satellite galaxies can have substantially lower $V_{\rm max}$ than centrals \citep[see, also,][]{Sawala2016a}. The difference is almost entirely due to the effect of tides experienced by satellites as they orbit the potential of their hosts. This is clear from the bottom-left panel of Fig.~\ref{FigMstarVcirc}, which shows the same relation for satellites, but for their `peak' $\Mstr$ and $\Vmax$, which typically occur just before a satellite first crosses the virial boundary of its host. At that time, the satellite progenitors followed a $M_{\rm str}$-$V_{\rm max}$ relation quite similar to that of isolated dwarfs. Finally, the bottom-right panel of Fig.~\ref{FigMstarVcirc} shows the stellar mass-circular velocity relation for LG dwarfs, where the colours distinguish satellites (black) from field or isolated systems (shown in red)\footnote{The names of Andromeda dwarfs are shortened in all figure legends for clarity; for example, Andromeda~XXV, is written as And~XXV or AXXV.}. This panel differs from the others because the maximum circular velocity is not accessible to observation; therefore, we show instead $V_{1/2}$, the circular velocity at the half-mass radius (see Eq.~\ref{EqV1/2}). The results shown in Fig.~\ref{FigMstarVcirc} elicit a couple of comments. One is that all LG dwarfs lie to the left of the red dashed line that delineates the $\Mstr$-$\Vmax$ relation for field APOSTLE dwarfs. This is encouraging, since consistency with our model demands $V_{1/2}<V_{\rm max}$ for all dark matter-dominated dwarfs. (The only exception is M32, a compact elliptical galaxy whose internal dynamics are dictated largely by its stellar component.) Second, aside from a horizontal shift, the general mass-velocity trend of LG dwarfs is similar to that in the simulations: below a certain stellar mass, the characteristic velocities of LG dwarfs become essentially independent of mass, just as for their simulated counterparts. Finally, note that we do not show measurements of $V_{1/2}$ for APOSTLE galaxies in Fig.~\ref{FigMstarVcirc}. This is mainly because of the limited mass and spatial resolution of the simulations. The majority of the LG satellites have stellar masses below $10^6 \Msun$, which are resolved with fewer than $100$ stellar particles in even the best APOSTLE runs, thus compromising estimates of their half-mass radii and velocity dispersions. In addition, at very low masses, all APOSTLE galaxies have similar, resolution-dependent, half-mass radii, a clear artefact of limited resolution. Indeed, most AP-L1 dwarfs with $\Mstr<10^6\, M_\odot$ have $R_{\rm eff}\sim 400$ pc \citep{Campbell2016}. This is far in excess of the typical radii of LG dwarfs of comparable mass, compromising direct comparisons between the observed and simulated stellar velocity dispersions and radii of faint dwarfs. We shall therefore adopt an indirect, but more robust, approach, where we assume that the stellar mass-halo mass APOSTLE relation is reliable and use it, together with the known mass profile of CDM haloes, to interpret various observational trends in the structural parameters of Local Group dwarfs. Our analysis thus rests on two basic assumptions: (i) that the $\Mstr$-$V_{\rm max}$ relation of field dwarfs follows roughly that shown in the top-left panel of Fig.~\ref{FigMstarVcirc}; and (ii) that the baryonic assembly of the galaxy does not alter dramatically the inner dark mass distribution. The first assumption imposes a fairly sharp halo mass `threshold' for galaxy formation, as seen in the top-left panel of Fig.~\ref{FigMstarVcirc}. The existence of this threshold has been critically appraised by recent work, some of which argues that halos with masses well below the threshold may form luminous galaxies \citep{Wise2014,OShea2015}, some as massive as the Cra~2 or Draco dwarf spheroidals \citep[see, e.g.,][]{Ricotti2016}. We note, however, that those simulations are typically stopped at high redshift ($z\sim 8$) and rarely followed to $z=0$, so it is unclear whether the threshold they imply (if expressed in present-day masses) is inconsistent with the one we assume here. Indeed, the latest simulation work, which includes a more sophisticated treatment of cooling than ours and follows galaxies to $z=0$, reports a comparable `threshold' to the one we use here \citep{Fitts2017}. Regarding the second assumption, we emphasize that this is a conservative one, since baryon-induced cores would only help to reconcile CDM theoretical expectations with observations. \begin{figure} \hspace{-0.3cm} \resizebox{8.8cm}{!}{\includegraphics{Figures_pdf/apostle_stripping_v1.pdf}}\\% \caption{{\it Top}: Tidally-induced changes in the stellar half-mass radius ($r_{1/2}$) and stellar velocity dispersion ($\sigma$), as a function of the {\it total} mass that remains bound within the original stellar half-mass radius of the galaxy. The parameters are in units of their pre-stripping values. Thick dotted lines correspond to the models of \citet{Errani2015} for spheroidal galaxies embedded in cuspy CDM haloes. The thin solid lines indicate results for all APOSTLE satellites with $\Mstr>10^6 \Msun$ at present time. We also show, with dot-dashed lines, APOSTLE satellites with $z=0$ stellar masses in the range $10^5-10^6 \Msun$ who have lost more than 90 per cent of their stellar mass in the past. {\it Bottom}: Similar to the top panel but for changes in the stellar mass ($M_{\rm str}$) and gas mass ($M_{\rm gas}$), both given in units of the pre-stripping stellar mass.} \label{FigAPstripping} \end{figure} \begin{figure} \hspace{-0.3cm} \resizebox{8.8cm}{!}{\includegraphics{Figures_pdf/stripping_Tomozeiu.pdf}}\\% \caption{Tidally-induced changes in half-mass radius ($r_{1/2}$, top panel), and stellar velocity dispersion ($\sigma$, bottom panel), as a function of the remaining bound fraction of stellar mass. All parameters are in units of their pre-stripping values. Line types are as in Fig.~\ref{FigAPstripping}. Thick dotted curves are E15 tidal tracks; thin solid and dot-dashed lines are results for APOSTLE satellites, as in Fig.~\ref{FigAPstripping}. Solid circles coresspond to the six models of PNM08 at the end of their simulations. Thin solid lines of different colors show results for four disc dwarfs simulated by \citet{Tomozeiu2016}. See text for further discussion.} \label{FigTomStripping} \end{figure} \begin{figure*} \hspace{-0.3cm} \resizebox{12cm}{!}{\includegraphics{Figures_pdf/method.pdf}}\\% \caption{A schematic example to illustrate how we determine the properties of the progenitors of satellites deemed `stripped' (cyan symbols in the top-left panel of Fig.~\ref{FigVcRM}). The example applies to And~XV, whose present-day half-mass radius, circular velocity, and stellar mass are indicated by the solid circle. The E15 tidal tracks suggest a number of possible progenitors, shown by open circles. The actual And~XV progenitor (open square in the right-hand panel) is selected to match simultaneously the APOSTLE $\Mstr$-$V_{\rm max}$ relation for isolated dwarfs, and the circular velocity $V_{1/2}$ at $r_{1/2}$ expected for a CDM halo of that $V_{\rm max}$ (large open circle in left-hand panel).} \label{FigMethod} \end{figure*} \subsection{Tidal stripping effects on LG satellites} \label{SecTidStrip} \subsubsection{Size-velocity relation} \label{SecVR} One firm prediction of our simulations is that all dwarfs with $\Mstr<10^7\, M_\odot$ should form in haloes of similar mass. Because the inner circular velocity profile of CDM haloes increases with radius, we expect the dark matter content of dwarfs to increase with galaxy size, as larger galaxies should encompass larger amounts of dark matter. This implies that a `minimum' velocity can be predicted for a faint dwarf, based solely on the dark mass contained within its half-mass radius. This is indicated by the grey shaded region in the top-left panel of Fig.~\ref{FigVcRM}, which indicates the dark matter circular velocity profiles expected for haloes close to the 'threshold' (i.e., $18<V_{\rm max}/\kms <36$), modeled as NFW haloes with concentrations taken from \citet{Ludlow2016}. As is clear from this panel, a number of dwarfs are at odds with this prediction, and are highlighted in cyan. Note that all of these deviant systems are satellites (field dwarfs are shown in red). Within the constraints of our model the only way to explain the low velocity dispersion of these systems is to assume that they have been affected by tides. Extreme examples include Cra~2 and And~XIX; i.e., systems with large half-light radii and very low velocity dispersions that are otherwise difficult to explain in our model. \subsubsection{The progenitors of stripped satellites} \label{SecProg} The effects of tides on dark matter-dominated spheroidal systems deeply embedded in NFW haloes have been explored in detail by PNM08 and E15. One of the highlights of these studies is that structural changes in the {\it stellar} component depend solely on the {\it total} amount of mass lost from within the original stellar half-mass radius of a galaxy. The fraction of stellar mass that remains bound, the decline in its velocity dispersion, and the change in its half-mass radius are thus all linked by a single parameter, implying that a tidally-induced change in one of these parameters is accompanied by a predictable change in the others. In other words, tidally stripped galaxies trace prescribed tracks in the space of $\Mstr$, $V_{1/2}$, and $r_{1/2}$ variables. This restricts the parameter space that may be occupied by stripped galaxies once the mass-size-velocity scaling relations of the progenitors are specified. The PNM08, or E15, `tidal tracks' may be summarized by a simple empirical formula that describes parametrically the tidal evolution of any such structural parameter, referred generically as $h$, in units of the original value, for a spheroidal system deeply embedded in a cuspy (NFW) CDM halo: \begin{equation} h(x)={2^\alpha \, x^\beta \over (1+x)^\alpha}. \end{equation} Here the parameter $x$ is the {\it total} mass ($M_{\rm h}$) that remains bound within the initial stellar half-mass radius of the dwarf, in units of the pre-stripping value. The values of $\alpha$ and $\beta$ are taken from E15 and given, for each structural parameter, in Table~\ref{TabTracks}. \begin{table} \caption{Tidal evolutionary tracks according to \citet{Errani2015}} \begin{center} \setlength{\tabcolsep}{5pt} \begin {tabular*}{5.5cm}{{l} *{4}{c} } \hline & & $M_{\rm str}/M_{\rm str, 0}$ & $\sigma/ \sigma_0$ & $r_{1/2}/ r_{1/2, 0}$ \\ \hline $\alpha$ & & 3.57 & -0.68 & 1.22 \\ $\beta$ & & 2.06 & 0.26 & 0.33 \\ \hline \end{tabular*} \end{center} \label{TabTracks} \end{table} We show these tidal tracks in Fig.~\ref{FigAPstripping} as thick dotted lines, for the case of the half-mass radius and velocity dispersion (top panel) and stellar mass (bottom). The tracks indicate that a spheroidal galaxy that loses $\sim 90$ per cent of its original stellar mass is expected to experience a reduction of a factor of $\sim 2.5$ in its velocity dispersion. On the other hand, its half-mass radius would change by less than $20\%$. To first order, then, even if tides are able to reduce substantially $\Mstr$ and $\sigma$, they are expected to have little effect on the size of an NFW-embedded dwarf spheroidal. The thin lines in Fig.~\ref{FigAPstripping} show that the same tidal tracks describe rather well the the change in $r_{1/2}$, $M_{\rm str}$, and $\sigma$ of APOSTLE satellites since they first cross the virial radius of their host halo. The E15 or PNM08 models do not include star formation, so we only consider in the comparison star particles born before infall. We show all APOSTLE satellites with $z=0$ stellar masses exceeding $10^6 \Msun$ (these satellites are resolved with at least $1000$ star particles at $z=0$), as well as those with stellar masses in the range $10^5-10^6 \Msun$ who have lost 90 per cent of their stellar mass since infall. The agreement between the E15 models and APOSTLE satellites shown in Fig.~\ref{FigAPstripping} is remarkable, especially considering that most APOSTLE dwarfs are gas-rich at first infall, with gas-to-star mass ratios of order 10 to 30, and that the tidal tracks are only meant to decribe the evolution of the stellar component. Indeed, the gas component is lost quickly after infall as a result of tides and ram-pressure in the host halo \citep{Arraki2014,Frings2017}, as shown by the thin grey lines in the bottom panel of Fig.~\ref{FigAPstripping}. The gas mass loss, however, has little influence on the evolution of the stellar component, which remains close to the tidal tracks. This is because baryons never dominate the gravitational potential of APOSTLE dwarfs; the only parameter that determines the tidal evolution is the change in {\it total} mass, which is therefore mostly dark. The results we describe below, therefore, apply mainly to dark matter-dominated dwarf spheroidals, and might need revision when considering systems where baryons dominate, such as, e.g., M32, or systems where most stars are in a thin, rotationally-supported disc \citep[see, e.g.,][]{Tomozeiu2016}. Since the changes in stellar mass, velocity dispersion, and half-mass radius depend on a single parameter, this implies that they can be expressed as a function of each other. This is shown in Fig.~\ref{FigTomStripping}, which shows the same tracks as in Fig.~\ref{FigAPstripping}, but expressed as a function of the remaining fraction of bound stars. Here the E15 tidal tracks corresponding to spheroidals embedded in cuspy DM haloes (thick dotted lines) are compared with APOSTLE results (thin lines), as well as with those of PNM08 (filled circles), and with those of Gal A-D from \citet[][see legend]{Tomozeiu2016}. The latter authors embed a thin exponential disc of stars, rather than a spheroid, in a cuspy halo. The E15 tracks in general reproduce well the tidally-induced evolution of a dwarf, except perhaps for Gal A of \citet{Tomozeiu2016}, which deviates from the E15 radius track when the stellar mass loss is extreme (i.e., more than 90 per cent). We note, however, that the few APOSTLE dwarfs who suffer comparable stellar mass loss seem to agree with the E15 tracks quite well. The difference is likely due to the fact that the initial galaxies in \citet{Tomozeiu2016} are pure exponential discs rather than spheroids, but further simulations would be needed to confirm this. One important corollary of these results is that the E15 tidal tracks can be used to `undo' the effects of stripping once the structural properties of the progenitors are specified. We attempt this in the bottom-left panel of Fig.~\ref{FigVcRM}, where we show the $V_{1/2}$ vs $r_{1/2}$ relation for the progenitors of all LG satellites, assuming that they follow the APOSTLE scaling relations appropriate for isolated dwarfs (i.e., top-left panel of Fig.~\ref{FigMstarVcirc}). A detailed, schematic example of the procedure is presented in Fig.~\ref{FigMethod} for the case of And~XV: the properties of the progenitor are uniquely specified once it is constrained to match simultaneously the $\Mstr$--$V_{\rm max}$ relation expected of APOSTLE isolated dwarfs and the $r_{1/2}$--$V_{1/2}$ relation, assuming NFW mass profiles. `Progenitors' computed this way will be shown with open symbols in subsequent figures\footnote{We do not track baryon-dominated satellites, M32, NGC 205, NGC 147, and NGC 185, since our procedure applies only to dark matter-dominated systems. For the Sagittarius dSph we assume that the progenitor has a luminosity of $10^8 \Msun$, following \citet{Niederste-Ostholt2010}.}. The parameters of LG satellites and their assumed progenitors are listed in Tables~\ref{TabData2} and \ref{TabProg}. The tracks in the bottom-left panel of Fig.~\ref{FigVcRM} highlight three systems which, according to our procedure, have been very heavily stripped: Cra~2, And~XIX, and Boo~I. A tickmark along each track indicates successive factors of $10$ in stellar mass loss. For most satellites the procedure suggests modest mass losses, but for these three (rather extreme) examples our procedure suggests that each has lost roughly $99$ per cent of their original mass. \subsubsection{Mass-size relation} \label{SecMR} The discussion above suggests that tides have had non-negligible effects on many LG satellites. Is there any independent supporting evidence for this conclusion? One possibility is to examine how other scaling laws are affected by the changes in velocity and radius prescribed by our progenitor-finding procedure. We emphasize that this procedure is based on a {\it single} assumption (aside from assuming NFW mass profiles for the progenitors): that all satellites descend from progenitors that follow the $\Mstr$-$\Vmax$ relation for isolated dwarfs in APOSTLE. We begin by examining, in the top-right panel of Fig.~\ref{FigVcRM}, the stellar mass versus half-light radius relation for our whole galaxy sample, enlarged by the late-type galaxies from the SPARC sample\footnote{Following \citet{Lelli2016a}, we assume a stellar mass-to-light ratio of 0.5 in the 3.6 $\mu m$ band for SPARC galaxies.} of \citet{Lelli2016a}. Galaxy size and mass are clearly correlated ($M\propto r^{2/7}$; thick dotted line), so that the effective surface brightness increases roughly as $\Sigma \propto M^{3/7}$. There is also substantial scatter in radii at fixed stellar mass, and vice versa. An interesting feature of this plot is the clear separation between the satellites deemed `stripped' because of their low velocity dispersion (shown in cyan) and field LG dwarfs (shown in red). Although there is little overlap in stellar mass, satellites and field LG dwarfs do overlap in size. Satellites, however, appear to follow a different trend in the mass-radius plane than that of the general population (shown with a dashed line in the top-right panel of Fig.~\ref{FigVcRM}. In our interpretation, this {\it difference in mass at fixed radius} is a signature of tidal stripping, and should disappear when considering the properties of their progenitors. We show this in the bottom-right panel of Fig.~\ref{FigVcRM}, where we can see that the mass and size of the {\it progenitors} are in excellent agreement with the general population of field galaxies. In other words, the same correction in velocity dispersion required to restore agreement with APOSTLE predictions for isolated dwarfs also brings the population of `stripped' satellites into agreement with the general field population in terms of stellar mass and size. We emphasize that there is no extra freedom in this procedure. Once the change in velocity dispersion is specified, the change in radius and mass follows, as illustrated by the stripping tracks in Fig.~\ref{FigAPstripping}. This exercise offers a simple explanation for why satellites as faint and kinematically cold as Cra~2 and And~XIX are so large in size: they are the tidal descendants of once more massive systems, which were born physically large and have remained so even after being heavily stripped. Recall that, according to the stripping tracks of PNM08 and E15, the size of the stellar component of a dSph embedded in an NFW halo is affected little by stripping, even after losing $\sim 99$ per cent of its original stellar mass. Note as well that {\it not all satellites are strongly stripped}, and that those that have been stripped have been affected to varying degrees. This is not unexpected, since the effectiveness of stripping depends sensitively on the mass of the satellite; on how concentrated the stellar component is within its halo; on the pericentric distance of its orbit; and on the number of orbits it has completed. All of those parameters can vary widely from system to system, scrambling the original $r_{1/2}$-$V_{1/2}$ correlation (bottom-left panel of Fig.~\ref{FigVcRM}) and turning into the largely scatter plot we see in the top-left panel of the same figure. \begin{figure} \hspace{-0.25cm} \resizebox{8.8cm}{!}{\includegraphics{Figures_pdf/FeH_sigma.pdf}}\\% \caption{{\it Top}: [Fe/H] vs $V_{1/2}$ for dwarf galaxies in the LG. Symbol types and colours are as in Fig.~\ref{FigVcRM}. The stripped satellites (cyan symbols), contribute a population that flattens the relation at the low-velocity end. Satellites deemed `stripped' have lower velocity dispersions than field dwarfs (red symbols) of comparable metallicity. {\it Bottom}: As top panel, but for satellite progenitors, assuming that their metallicities are unaffected by tides (i.e., they shift only horizontally in this plot). The tidal stripping correction restores agreement between satellites and field galaxies, and result in a tighter, monotonic relation between metallicity and velocity for all dwarfs.} \label{FigFeV} \end{figure} \subsubsection{Metallicity-velocity dispersion relation} \label{SecFeSigma} Tidal stripping is expected to affect the least scaling laws involving the metallicity of a dwarf, which would only be modified in the case of a pronounced metallicity gradient in the progenitor. Assuming, for simplicity, that tidal losses leave the average metallicity of a satellite unchanged, we examine the effects of stripping on the relation between metallicity and velocity dispersion. We prefer to use velocity dispersion instead of stellar mass because, according to the tidal tracks of E15 or PNM08, changes in velocity are a more sensitive measure of tidal stripping than changes in stellar mass. This is shown in the top panel of Fig.~\ref{FigFeV} for all galaxies in our sample (Sec.~\ref{SecGxSample}) with published measurements of these two quantities. We use in this panel the latest observed metallicities, but caution that some are estimated spectroscopically from individual stars whereas others rely on photometric estimates based on the color of the red giant branch \citep[see ][and references therein]{McConnachie2012}. There is a reasonably well defined trend of increasing metallicity, [Fe/H], with increasing $V_{1/2}$, except at the low velocity end, where the trend falters and the relation turns flat. The flattening is largely a result of the low-velocity population that we have identified as `stripped' satellites (shown in blue in Fig.~\ref{FigFeV}). Interestingly, the trend between velocity and metallicity for progenitors is monotonic and tighter when considering their inferred progenitors (bottom panel of the same figure), lending further support to our assumption that the low-$V_{1/2}$ population originates from tides. \begin{figure} \hspace{-0.2cm} \resizebox{8.8cm}{!}{\includegraphics{Figures_pdf/MLratio.pdf}}\\% \caption{As Fig.~\ref{FigFeV}, but for the stellar mass vs dynamical mass-to-light ratio relation. The top panel shows the results for LG dwarfs; bottom panel for their inferred progenitors. Note that tidal stripping moves satellites along tracks parallel to the observed relation, so that stripped and unstripped systems follow the same relation. The thick dotted lines show $(M/L)_{\rm dyn} \propto M^{-0.4}$, motivated by the $V\propto r^{1/2}$ relation expected for the inner regions of an NFW halo, together with the $L\propto r^{7/2}$ scaling that holds for field galaxies (see top-right panel of Fig.~\ref{FigVcRM}). The blue dashed lines represent tidal tracks for a model in which the dark matter halo has a central core of size comparable to the size of the corresponding stellar component.} \label{FigMLratio} \end{figure} \subsubsection{Dynamical mass-to-light ratios} One firmly established dwarf galaxy scaling law links the dynamical mass-to-light ratio, $(M/L)_{\rm dyn}\equiv M_{1/2}/(L_V/2)$, with the total luminosity. As discussed in the early review by \citet{Mateo1998}, dSphs have mass-to-light ratios that increase markedly with decreasing luminosity, `consistent with the idea that each is embedded in a dark halo of fixed mass'. How is this relation modified by our proposal that tidal stripping may have altered the size, stellar mass, and velocity dispersion of many satellites? We examine this in Fig.~\ref{FigMLratio}, where the top panel shows the dynamical mass-to-light ratios of all LG galaxies in our sample, as a function of stellar mass. Interestingly, tidal stripping does not alter this overall scaling, as it mainly shifts galaxies along lines roughly parallel to the main trend. Indeed, the progenitors sample a very similar relation as the present-day satellites, as may be seen in the bottom panel of Fig.~\ref{FigMLratio}. As discussed by PNM08, this is a result of the particular tidal stripping tracks expected for stellar systems embedded in `cuspy' NFW haloes. If dark matter haloes had instead constant density cores comparable in size to the stellar component, then the change in mass-to-light ratio due to tidal stripping for a given change in stellar mass would be much more pronounced. This is shown by the blue dashed lines, which indicate the tidal tracks expected in such a case, as given by E15. Had some satellites lost a large fraction of their original mass to tides, they would have moved away from the $(M/L)_{\rm dyn}$-$\Mstr$ relation that holds for the progenitors. On the other hand, if haloes are `cuspy' then tidally-stripped galaxies just move along the observed relation: isolated dwarfs, progenitors, and tidal remnants are all expected to follow the same relation. \begin{figure} \hspace{-0.2cm} \resizebox{8.8cm}{!}{\includegraphics{Figures_pdf/Rdist.pdf}}\\% \caption{{\it Top}: Radial distribution of all APOSTLE satellites with $\Mstr>10^5\, M_\odot$ (black curves). Lower coloured histograms correspond to `stripped' systems, as estimated by the parameter $\mu_{\rm v}$, which measures the decline in $V_{\rm max}$ caused by tides (see text for details). {\it Bottom:} Same as top, but for the stripping parameter $\mu_{\rm L}$, which measures the loss in stellar mass caused by tides. Note that highy stripped systems are more centrally concentrated than the average satellite population. Crosses indicate the location of LG satellites, coloured by their inferred tidal mass loss, as described in Sec.~\ref{SecProg}, and summarized in Table~\ref{TabProg}. See text for further discussion.} \label{FigRdist} \end{figure} \subsubsection{Tidal stripping and satellite shapes} Our discussion above suggests that the observed dwarf galaxy scaling laws pose no fundamental problem to a scenario where tides have affected a number of satellites, even if in some cases, such as Cra~2 and And~XIX, the posited fraction of mass lost may approach $99$ per cent. Two oft-cited arguments against this scenario involve satellite shapes and their distances to the primary galaxy. Cra~2, for example, is rather round on the sky, and it is today situated at $\sim 115$ kpc from the Galactic Centre \citep{Torrealba2016}. Do such observations contradict our idea that Cra~2 has lost many of its original stars to tides? Not necessarily. First, we should recall that the idea that heavily stripped systems must be very aspherical only applies to systems near the pericentre of their orbits and thus `caught in the act' of being stripped, such as, for example, the Sagittarius dSph \citep{Ibata2001,Majewski2003}, and the globular cluster Pal~5 \citep{Odenkirchen2001,Odenkirchen2003}. These are clearly convincing examples of the effect of Galactic tides, but not typical. Indeed, we expect most satellites to be on rather eccentric orbits around the Galactic Centre, which means that tidal effects are best approximated as impulsive perturbations that operate at pericentre. As discussed by \citet{Penarrubia2009}, the signature of Galactic tides fades away from the bound remnant quickly (i.e., within one crossing time) after pericentric passage. This implies that the effect of tides is actually rather difficult to discern when the satellite is at apocentre, where it spends most of its orbital time and is therefore most likely to be found. In addition, tidal remnants are expected to be {\it much rounder} than their progenitors when equilibrium has been restored \citep[see; e.g.,][and references therein]{Barber2015}. Tides actually tend to reduce the original asphericity of a galaxy, implying that there is in principle no contradiction between round satellite shapes and the possibility of heavy tidal stripping. \subsubsection{Tidal stripping and satellite spatial distribution} \label{SecRdist} Satellites that have been extremely affected by tides are expected to be in orbits with small pericentric distances and should have completed at least a few orbits around the primary galaxy. The latter condition implies either a small apocentre or an early time of accretion into the primary halo, or both. One may therefore argue that the large distances from the Galactic Centre of some low velocity dispersion satellites are inconsistent with a tidal origin for their peculiar properties. We examine this in APOSTLE, where we can easily identify systems that have experienced substantial tidal mass loss, track their orbits, and compute their orbital parameters. We explore two alternative measures of tidal stripping for subhaloes that, at $z=0$, still host a luminous satellite: one is the reduction in $V_{\rm max}$ experienced since accretion; the other is the {\it stellar} mass loss since the peak of stellar mass. Neither measure is ideal. The first one suffers from the fact that $V_{\rm max}$ changes are sensitive mostly to the tidal loss of dark matter, which couples in a complex and indirect way to actual stellar mass losses. The second quantity measures directly stellar mass losses but is vulnerable to numerical artefact, since the mass loss is expected to depend sensitively on the stellar half-mass radii, which are poorly resolved in APOSTLE, especially at the faint end (see discussion in Sec.~\ref{SecMstarVc}). We therefore pursue both alternatives in our analysis, and show the results in Fig.~\ref{FigRdist}. Because of the caveats above, this is only meant to identify possible major inconsistencies in our argument, rather than to provide quantitative estimates that can be directly compared with observations. The top panel of Fig.~\ref{FigRdist} shows, in black, the radial distribution of all $\Mstr>10^{5}\, M_\odot$ satellites found, at $z=0$, within $300$ kpc from the centre of AP-L1 primaries. The luminous satellite radial distribution is also shown for several subsamples, drawn according to the tidally-induced reduction of the maximum circular velocity of each subhalo, measured by the ratio $\mu_{\rm v}=V_{\rm max}(z=0)/V_{\rm max}(z_{\rm pkV})$. Here $z_{\rm pkV}$ identifies the time when $V_{\rm max}$ peaked, which typically occurs just before being first accreted into the primary halo. The various distributions in the top panel of Fig.~\ref{FigRdist} (labelled by $\mu_{\rm v}$) show the radial segregation of satellites that have been heavily affected by tides. Clearly, the larger the effects of tides, the closer to the galaxy centre satellites lie, on average. Note that heavily stripped systems are not particularly rare: $18$ per cent of all subhaloes with satellites as massive as $\Mstr>10^{5}\, M_\odot$ have $\mu_{\rm v}<0.4$. This corresponds to a rather large ($>95$ per cent) loss of the original total bound mass (see PNM08's Fig.~8). Note that some of these very highly stripped objects may be found quite far from the centre of the primary, even as far out as $\sim250$~kpc. The bottom panel of Fig.~\ref{FigRdist} is analogous to that in the top, but adopting the ratio $\mu_{\rm L}=\Mstr (z=0)/\Mstr (z_{\rm pkL})$. Here $z_{\rm pkL}$ identifies the time when the {\it stellar} mass of a satellite peaked. The various distributions, labelled by the corresponding values of $\mu_{\rm L}$, show that heavily stripped systems are not particularly rare. Of all surviving luminous satellites in APOSTLE, more than $13$ per cent have lost $>70$ per cent of their stars (i.e., $\mu_{\rm L}<0.3$), but we caution again that this number is rather uncertain because of limited resolution. The sequence of histograms in the right panel of Fig.~\ref{FigRdist} again shows that highly stripped satellites tend to be more centrally concentrated than the average. We compare this with our stripping estimates for the LG satellite population by indicating with crosses the distance to the primary (MW or M31) of all satellites (in black) and of those deemed, according to our progenitor-finding procedure, to have lost various fractions of their original mass (in colour; each satellite is only plotted once, and the median of each population is shown with a small arrow). Focusing on the most highly-stripped population (i.e., $\mu_{\rm L}<0.3$) we note that most of them are well within $150$~kpc of the centre, both in the observations and in the simulations. We conclude that there is no obvious inconsistency between the spatial distribution of low-velocity dispersion satellites and our hypothesis that their peculiar properties have been caused by tidal stripping. \begin{figure*} \hspace{-0.2cm} \resizebox{17cm}{!}{\includegraphics{Figures_pdf/mdar.pdf}}\\% \caption{{\it Left}: The acceleration, $g_{\rm tot}=V_{1/2}^2/r_{1/2}$, at the stellar half-mass radius, as a function of the baryonic contribution at that radius, $g_{\rm bar}=G\Mstr/2\,r_{1/2}^2$, computed assuming spherical symmetry. The symbols show results for all LG dwarfs, using the same colours and types as in Fig.~\ref{FigVcRM}. The thick dotted line is the empirical MDAR fit of \citet{McGaugh2016}, as given by Eq.~\ref{EqGtotGbar}. The horizontal line highlights $a_{\rm min}$, the minimum acceleration expected for isolated dwarfs in $\Lambda$CDM \citep{Navarro2016}. Tidal stripping is expected to push some satellites below that minimum, as shown by the tidal tracks shown in magenta. Note the large scatter at the low-$g_{\rm bar}$ end. {\it Right:} As left panel but for the average of all APOSTLE central (`field') galaxies \citep[connected squares, as given by][]{Ludlow2017}. Coloured red lines illustrate the expected location of APOSTLE satellites in this panel. Since the stellar half-mass radii of faint simulated satellites is poorly constrained, we show for each subhalo a line segment that spans a wide range in radius, $0.5<r/{\rm kpc}<3$, covering the full observed range in $r_{1/2}$ at given $\Mstr$. Each subhalo is coloured by the tidal stripping measure $\mu_{\rm v}$ introduced in Sec.~\ref{SecRdist}, which measures the decline in $V_{\rm max}$ caused by stripping. Note that satellites are expected to `fan out' at low values of $g_{\rm bar}$, as observed in the left-hand panel.} \label{FigMDAR} \end{figure*} \begin{figure*} \hspace{-0.2cm} \resizebox{17cm}{!}{\includegraphics{Figures_pdf/sigma_MOND_1.pdf}}\\% \caption{{\it Left}: Stellar mass-velocity dispersion relation for all LG dwarfs. Symbols and and colours are as in Fig.~\ref{FigVcRM}. The thick dotted line is the MOND prediction for isolated systems, as in Eq.~\ref{EqSigmaiMond}. Note that many faint galaxies have velocity dispersions well in excess of what is predicted by MOND. {\it Right:} Stellar mass as a function of the ratio of `external' to `internal' accelerations, $g_{\rm ex}/g_{\rm in}$. This provides a measure of the importance of `external field effects' (EFE) on MOND predictions.} \label{FigMOND} \end{figure*} \subsection{Tidal stripping and the MDAR} \label{SecMDAR} One consequence of the effects of tidal stripping discussed in the previous subsection is that stripping is expected to scatter satellite galaxies away from the `mass discrepancy-acceleration relation' (MDAR) that holds for isolated galaxies. Various forms of this relation have been proposed in the past, but we adopt for our discussion here the latest results of \citet{McGaugh2016} and \citet{Lelli2016a}. These authors show a tight correlation between the gravitational acceleration estimated from the rotation curve of late-type galaxies, $g_{\rm tot}=V_{\rm rot}^2(r)/r$, and the acceleration expected from the luminous (baryonic) component of a galaxy, $g_{\rm bar}=V_{\rm bar}^2(r)/r$, where $V_{\rm bar}(r)$ is the contribution of the baryons to the circular velocity at radius $r$. The relation may be approximated by the fitting function, \begin{equation} g_{\rm tot}={g_{\rm bar} \over 1-e^{-\sqrt{g_{\rm bar}/g_\tau}}}\,, \label{EqGtotGbar} \end{equation} over the range $-11.7 < \log (g_{\rm bar}/{\rm m \, s}^{-2})<-9$, with relatively small residuals. At the (faint) low-$g_{\rm bar}$ end\footnote{Note that $g_{\rm bar}$ is roughly proportional to the surface brightness of a galaxy. Since surface brightness generally decreases with decreasing luminosity, faint dwarfs typically populate the low-$g_{\rm bar}$ end of the relation.}, the relation seems to flatten, with $g_{\rm tot}$ approaching an asymptotic minimum value of $a_{\rm min}\sim 10^{-11} {\rm m\, s}^{-2}$ \citep{Lelli2016}. This flattening has been called into question by the Cra~2 dSph, which seems to lie on the extrapolation of Eq.~\ref{EqGtotGbar} \citep{McGaugh2016b}, at $(g_{\rm bar},g_{\rm tot})=(1.0\times 10^{-14}, 5.6\times 10^{-13})$, with all accelerations measured in ${\rm m\, s}^{-2}$. This issue is of interest to our discussion, since $\Lambda$CDM dwarf galaxy formation models such as that of APOSTLE make a very specific prediction for this relation: the minimum halo mass threshold discussed in Sec.~\ref{SecMstarVc} to host a luminous dwarf translates into a well-defined minimum acceleration that all {\it isolated} dwarfs must satisfy. As discussed in detail by \citet{Navarro2016} and \citet{Ludlow2017}, this minimum acceleration is of order $a_{\rm min}\sim 10^{-11} {\rm \, m\, s}^{-2}$, which provides a natural and compelling explanation for the faint-end flattening of the relation reported by \citet{Lelli2016}. We illustrate the simulation predictions in the right-hand panel of Fig.~\ref{FigMDAR}, where the connected open squares indicate the median $g_{\rm bar}$-$g_{\rm tot}$ relation for all APOSTLE centrals. The thick dotted line follows Eq.~\ref{EqGtotGbar}, and it is clear from the comparison that {\it isolated} APOSTLE galaxies follow a very similar relation to the observed one, at least for $g_{\rm bar}>10^{-12} {\rm \, m\, s}^{-2}$. At lower $g_{\rm bar}$ the total accelerations of APOSTLE centrals approach $a_{\rm min}$. Tidal stripping is expected to modify this relation, reducing $g_{\rm bar}$ and shifting satellites to $g_{\rm tot}$ values well below $a_{\rm min}$. This is illustrated by the coloured lines in the right panel of Fig.~\ref{FigMDAR}, which indicate where faint dwarfs affected by tidal stripping would be expected to lie, depending on their half-mass radius. Satellites affected little by stripping (shown in red) are expected to continue the flattening trend, whereas heavily stripped satellites should fall below the $a_{\rm min}$ boundary, and approach, in extreme cases (shown in blue), the extrapolation of Eq.~\ref{EqGtotGbar} (dotted line). A simple and robust prediction from APOSTLE-like models is then that tidal stripping should scatter satellites below the mean $g_{\rm bar}$-$g_{\rm tot}$ trend that holds for isolated systems, leading to substantial spread in the value of $g_{\rm tot}$ at fixed $g_{\rm bar}$ at the faint end. This is, indeed, what is observed in the observational data for LG satellite and field dwarfs. We show this in the left-hand panel of Fig.~\ref{FigMDAR}, using for $g_{\rm tot}$ and $g_{\rm bar}$ the values estimated at the half-mass radius, assuming spherical symmetry for both the dark matter and baryonic components, or, more specifically, \begin{equation} g_{\rm tot}=V_{1/2}^2/r_{1/2}, \quad g_{\rm bar}=G\,\Mstr/2 \, r_{1/2}^2 \label{EqG} \end{equation} The data in this panel show that the tight MDAR reported by \citet{McGaugh2016} and \citet{Lelli2016} for brighter galaxies breaks down in the very faint, low-surface brightness regime ($g_{\rm bar}<10^{-12} {\rm m\, s}^{-2}$). The scatter in $g_{\rm tot}$ at given $g_{bar}$ spreads nearly two decades, seriously calling into question the idea that MDAR might encode a `natural law' that allows the total gravitational acceleration to be accurately estimated from the baryonic contribution alone. The observed data, on the other hand, are quite consistent with the APOSTLE predictions, once the effects of tidal stripping are taken into account. Interestingly, our models predict that the most heavily tidally stripped satellites should approach the extrapolation of Eq.~\ref{EqGtotGbar}. (Cra~2 is one example of several in that regard.) On the other hand, those largely unaffected by tides should hover just above the $g_{\rm tot}=a_{\rm min}$ line, as observed. More moderately stripped systems should bridge the gap between the two, just as observed in the left-hand panel of Fig.~\ref{FigMDAR}. We conclude that the overall behaviour of dwarf satellites galaxies in the $g_{\rm obs}$ vs $g_{\rm bar}$ plane can be understood in the $\Lambda$CDM framework as a simple consequence of tidal stripping. \subsection{MOND and the velocity dispersion of LG dwarfs} \label{SecMOND} The extremely low accelerations of faint dwarfs lie in the regime where the modified Newtonian gravity theory MOND \citep{Milgrom1983} makes definite and clear predictions---the `deep-MOND limit'. In this regime, the characteristic velocity of a non-rotating stellar spheroid is determined solely by its mass (equal to that of the stellar component in the case of a dSph) and by the MOND acceleration parameter, $a_0=1.2\times 10^{-10} {\rm m\, s}^{-2} =3.7 \times 10^3 {\rm \, km}^2 {\rm \, s}^{-2} {\rm \, kpc}^{-1}$ \citep{Milgrom2012a}. Following \citet{McGaugh2013}, the MOND velocity dispersion may be written as: \begin{equation} \sigma_{\rm iMOND} = (4G\Mstr \, a_{0}/81)^{1/4}, \label{EqSigmaiMond} \end{equation} where the `iMOND' subscript has been used to denote the fact that this calculation assumes that the system is {\it isolated} from more massive objects. MOND predictions for satellite galaxies are more uncertain, since they are also subject to the external acceleration of their host, $g_{\rm ex}=V_{\rm host}^2/D_{\rm host}$, where $V_{\rm host}$ is the circular velocity of the host and $D_{\rm host}$ is the distance from the satellite to the centre of the primary. The MOND prediction is modified by this `external field effect" (EFE), introducing a correction to Eq.~\ref{EqSigmaiMond} whose importance will depend on the ratio of `external' to `internal' acceleration for each dwarf. Approximating the internal acceleration by $g_{\rm in}=3\,\sigma_{\rm iMOND}^2/r_{1/2}$, it is possible to compute the MOND prediction in the regime where $g_{\rm ex}\gg g_{\rm in}$. In this case, the MOND velocity dispersion resembles our Eq.~\ref{EqV1/2}, but substituting the gravitational constant, $G$, by its `effective' value at the location of the satellite, $G_{\rm eff}\approx G\, a_0/g_{\rm ex}$. In other words, \begin{equation} \sigma_{\rm eMOND}=(G_{\rm eff} \, \Mstr / r_{1/2})^{1/2}, \quad {\rm if}\, g_{\rm in} \ll g_{\rm ex}. \label{EqSigmaEFE} \end{equation} Where `eMOND' refers to EFE dominance. We shall assume a constant value of $V_{\rm host}=220 \kms$ and $230 \kms$ for the Milky Way and M31 satellites, respectively. We compare the isolated MOND predictions with LG dwarf data in the left panel of Fig.~\ref{FigMOND}. Clearly, a number of dwarfs deviate systematically from the MOND prediction, especially at the very faint end, where the velocity dispersions of `ultra-faint' dwarfs exceed the MOND predictions by a large factor. Could this offset be caused by the `external field effect'? We explore this in the right-hand panel of Fig.~\ref{FigMOND}, where we plot $\Mstr$ as a function of the ratio, $g_{\rm ex}/g_{\rm in}$ \footnote{For field dwarf galaxies, $g_{\rm ex}$ is estimated by considering the distance and $V_{\rm host}$ of the closest primary. Assuming a flat rotation curve for the host out to large distances overestimates $g_{\rm ex}$; hence the left-pointed arrow for field dwarfs on this plot.}. We can see that many of the ultra-faint dwarfs where the iMOND prediction fails are indeed in a regime where EFEs are dominant. Although the theory does not specify precisely when the EFE formula (Eq.~\ref{EqSigmaEFE}) should replace the isolated MOND prediction (Eq.~\ref{EqSigmaiMond}), we can check at least whether EFE corrections are likely to help by comparing the data with a weighted mean of the two: \begin{equation} \sigma_{\rm MOND}={g_{\rm in} \, \sigma_{\rm iMOND}+g_{\rm ex}\, \sigma_{\rm eMOND} \over g_{\rm in}+g_{\rm ex}}. \label{EqSigmaMond} \end{equation} We show the comparison in Fig.~\ref{FigMOND2}, where we compare observed velocity dispersions with the predictions of Eq.~\ref{EqSigmaMond}. Filled symbols in this figure identify systems where $g_{\rm ex}<g_{\rm in}$; `dotted' symbols those in the EFE-dominated regime $g_{\rm ex}>5\, g_{\rm in}$, and open symbols those in the intermediate regime. As is clear from this figure, EFE corrections actually make matters worse, as it predicts even lower velocity dispersions than iMOND at the very faint end. We conclude that MOND fails to account for the observed velocity dispersions of LG dwarfs. It is unclear how this result may be reconciled with MOND, but it adds to a long list of observations where MOND encounters serious difficulties, such as, for example, the centres of galaxy clusters \citep{Gerbal1992,Sanders2003} and the properties of the Ly-$\alpha$ forest \citep{Aguirre2001}. What makes the result in Fig.~\ref{FigMOND2} particularly compelling is that most of the dwarfs in this graph are deep in the MOND regime, where the predictions of the theory should be particularly reliable. We conclude that the observed velocity dispersion of ultra-faint dwarfs pose a possibly insurmountable challenge to that theory. \begin{figure} \hspace{-0.2cm} \resizebox{8.5cm}{!}{\includegraphics{Figures_pdf/sigma_MOND_2.pdf}}\\% \caption{Velocity dispersion of LG dwarfs compared with MOND predictions and taking into account external field effects (Eq. \ref{EqSigmaMond}). Systems with $g_{\rm in}>g_{\rm ex}$ are shown with filled symbols; systems with $g_{\rm ex}>g_{\rm in}$ are shown with open symbols. Those in the `EFE-dominated' regime ($g_{\rm ex}/g_{\rm in}>5$) are highlighted with a dot. Note that MOND clearly fails to account for the observed velocity dispersions of many LG dwarfs, especially those at the extremely faint end.} \label{FigMOND2} \end{figure} \section{Summary and Conclusions} \label{SecConc} The low velocity dispersions of dwarf galaxies have long been difficult to reconcile with the $\Lambda$CDM standard model of structure formation. This is because dwarfs in $\Lambda$CDM are expected to form in haloes above a certain minimum circular velocity of order $20$-$30 \kms$, which is at odds with the very low velocity dispersions, $\sigma_{\rm los}\sim 3$--$5 \kms$, of a number of Local Group satellites. Previously proposed solutions include the possibility that baryons may have reduced the expected dark matter content of a dwarf by carving a constant density `core' in the dark mass profile \citep{DiCintio2014,Onorbe2015}, or, alternatively, that the stellar component of dwarfs samples only the very inner, rising part of the CDM circular velocity curve \citep{Benson2002,Stoehr2002}. The first possibility has been hinted at by recent simulation work, but it is unlikely to apply in the regime of extremely dark matter-dominated ultra-faint dwarfs, where there are simply not enough baryons to modify the dark matter profile. The second possibility has been contradicted by the discovery of `cold faint giants'; i.e., dwarfs that are exceptional because of their low luminosity, large size and cold kinematics. Examples include Cra~2 and And~XIX, dwarfs so large that their stellar kinematics should faithfully sample the maximum circular velocity of the halo, but whose stars are kinematically much colder than expected. We have examined here the possibility that these issues might be solved by considering the effects of tidal stripping. Our analysis uses the galaxy mass-halo mass relation from the APOSTLE cosmological simulations of the Local Group, as well as guidance from earlier N-body work about the changes induced by tidal stripping on the size, stellar mass, and velocity dispersion of spheroidal galaxies embedded in cuspy CDM haloes. Our main conclusions may be summarized as follows. \begin{itemize} \item The APOSTLE simulations predict that all faint isolated dwarfs (i.e., $\Mstr<10^7\, M_\odot$) should inhabit haloes that span a fairly narrow range of virial masses. Together with the self-similar nature of CDM haloes, this implies a strong correlation between dwarf size and characteristic velocity, as larger galaxies should encompass more dark mass. Systems that fail to follow this expected correlation have likely been affected by tidal stripping. \item Prior N-body work on the tidal evolution of dSphs in CDM haloes (PNM08 and E15) allows us to `undo' the effects of tides on the size, mass, and velocity dispersion of a satellite. The change in each of these parameters is linked to the others through `tidal tracks' that may be used to recover the original structural parameters of a satellite's progenitor. Importantly, these tracks suggest that the stellar half-mass radius of a satellite is the least affected by tides, even for cases of extreme mass loss. \item Satellite progenitors, when constrained to match the APOSTLE $\Mstr$ vs $V_{\rm max}$ relation, follow scaling laws linking the stellar mass, size, and velocity dispersion that are in excellent agreement with those of isolated field galaxies. This provides an attractive explanation for (i) why the [Fe/H]-$\sigma$ relation flattens at low $\sigma$; (ii) why some faint satellites are extremely large (they are the tidal remnants of once more massive, intrinsically large galaxies), and (iii) why satellites and field dwarfs follow a similar dynamical mass-to-light ratio vs luminosity relation, regardless of stripping. \item Tidally stripped satellites are closer than the average to the centre of their host, but even very highly tidally-stripped systems are found as out as $\sim 200$ kpc from the centre. We find no obvious inconsistency between the degree of tidal stripping predicted by our models and the measured spatial distribution of LG satellites. \item Tidal stripping is expected to result in large scatter at the faint, low-acceleration end of the mass discrepancy-acceleration relation (MDAR) that holds for brighter late-type galaxies. Satellites that have lost substantial amounts of dark matter to tides are pushed to accelerations well below the nominal minimum, $a_{\rm min}=10^{-11} {\rm m\, s}^{-2}$, expected for isolated dwarfs in $\Lambda$CDM. The expected scatter is consistent with LG dwarf observations, but inconsistent with the idea that a single MDAR relation holds for all galaxies. \item Finally, the low velocity dispersion population of satellites is plainly inconsistent with the predictions of Modified Newtonian Dynamics: MOND predicts, at the very faint end, much lower velocity dispersions than observed. Resorting to `external field effects' induced by the primaries does not help, and actually makes MOND predictions even more inconsistent with extant data. The velocity dispersions of the faintest galaxies known might prove an insurmountable difficulty for this theory. \end{itemize} Although appealing as a scenario, our proposal that tidal stripping might help to reconcile the peculiar properties of a number of satellites with the predictions of $\Lambda$CDM has a number of potential problems that need to be fully addressed in future work and that would also benefit from insight from other cosmological simulations of Local Group environments \citep[see; e.g.,][]{Wang2015a,Wetzel2016}. One potentially weak point concerns the relatively high frequency of highly stripped LG satellites required to match the LG dwarfs. Indeed, we find that about $\sim 11$ ($16$) per cent of MW and M31 satellites brighter than $M_V=-8$ ($-5.5$) have lost more than $90$ per cent of their original stellar mass. Unfortunately, current APOSTLE simulations do not have adequate numerical resolution to make accurate predictions that may be compared with these data. This is an issue, however, that should be revisited with simulations of higher resolution, as they become available. A further, related point is that a number of dwarfs are deemed to have undergone rather dramatic transformation because of tides. Cra~2, And XIX, And~XXI, And~XXV, and Bootes~1, for example, would all need to have shed roughly $99$ per cent of their original mass for their progenitors to be consistent with APOSTLE dwarfs, yet there is little evidence in the galaxies themselves or in their surroundings for this rather extreme mass loss. Simulations, however, make some fairly robust predictions for these heavily-stripped satellites that may be constrasted with observation. Because they have been so heavily shaken by tides, we expect them their remnants to be round and their surface brightness profiles to have large King concentration values. In addition, because they have been stripped of their surrounding halos, their maximum circular velocities must be very similar to that inferred within their stellar half-mass radius, a prediction that may in principle be tested with accurate dynamical modeling of kinematic data. Of course, identifying and quantifying debris from such events in the halo of the Milky Way that may be traced back to these satellites would also be an important step towards turning our proposal from informed conjecture into a compelling picture. We anticipate, however, that this task will be rather difficult, given the extremely low surface brightness expected for the stream (fainter than the bound remnants, some of which are already at the limit of detectability). Another possibility would be to look for loosely bound stars in the immediate vicinity of the tidally affected dwarf, which would flatten the satellite surface density profile outside a characteristic radius \citep{Penarrubia2009}. Detecting such stars would also be extremely challenging, since simulations indicate that their surface brightness, at apocentre, might be up to $\sim 10$ magnitudes fainter than the central surface density of the satellite \citep[see, e.g.,][]{Tomozeiu2016}. Proper motions of individual stars would be of immense help. These could be used to estimate pericentric distances and orbital times that may be used to check the consistency of our model with more detailed modelling of each individual system suspected to be a `tidal remnant'. We very much look forward to such data in order to inform our analysis further in future work. \section{Acknowledgements} We acknowledge useful discussions with Alan McConnachie and Joop Schaye. We are thankful to Marla Geha, Erik Tollerud, and Ryan Leaman for sharing data with us. The research was supported in part by the Science and Technology Facilities Council Consolidated Grant (ST/P000541/1), and the European Research Council under the European Union Seventh Framework Programme (FP7/2007-2013)/ERC Grant agreement 278594-GasAroundGalaxies. CSF acknowledges ERC Advanced Grant 267291 COSMIWAY; and JW the 973 program grant 2015CB857005 and NSFC grant No. 11373029, 11390372. This work used the DiRAC Data Centric system at Durham University, operated by the Institute for Computational Cosmology on behalf of the STFC DiRAC HPC Facility (www.dirac.ac.uk), and also resources provided by WestGrid (www.westgrid.ca) and Compute Canada (www.computecanada.ca). The DiRAC system was funded by BIS National E-infrastructure capital grant ST/K00042X/1, STFC capital grants ST/H008519/1 and ST/K00087X/1, STFC DiRAC Operations grant ST/K003267/1 and Durham University. DiRAC is part of the National E-Infrastructure. This research has made use of NASA's Astrophysics Data System. \bibliographystyle{mnras}
\section*{Introduction} In $2005$ Lim \cite{Lim} and Qi \cite{Qi} independently initiated the spectral theory of high order tensors. They introduced several generalizations of the classical concept of an eigenvector of a matrix. Our work concerns $l^2$-eigenvectors of Lim or $Z$-eigenvectors of Qi. Let $A= (a_{i_1\dots i_d})_{i_j=1}^{n},\, a_{i_1\dots i_d} \in \K{C}$ be an $n$-dimensional tensor of order $d$ ($n^d$-tensor). A non-zero vector $x\in \K{C}^{n}\setminus \{0\}$ is called an \emph{eigenvector} of $A$ if there exists $\lambda \in \K{C}$, the corresponding \emph{eigenvalue}, such that \begin{align*} Ax^{d-1} = \lambda x,\quad Ax^{d-1}:=\left(\sum\limits_{i_2,\dots,i_d = 1}^n a_{1i_2\dots i_d} x_{i_2}\cdots x_{i_d},\,\dots\,,\sum\limits_{i_2,\dots,i_d = 1}^n a_{ni_2\dots i_d} x_{i_2}\cdots x_{i_d}\right). \end{align*} For $d=2$ one recovers the definition of an eigenvector of an $n\times n$ matrix $A=(a_{i_1i_2})_{i_j=1}^n$. The point $[x] \in \K{C}P^{n-1}$ defined by an eigenvector $x \in \K{C}^n\setminus \{0\}$ is called an \emph{eigenpoint} and the set of all eigenpoints is called an \emph{eigenconfiguration}. An $n^d$-tensor $A = (a_{i_1\dots i_d})_{i_j=1}^n,\, a_{i_1,\dots,i_d}\in \K{C}$ is said to be \emph{symmetric} if $a_{i_{\sigma_1}\dots i_{\sigma_d}} = a_{i_1\dots i_d}$ for any permutation $\sigma \in S_d$. Cartwright and Sturmfels \cite{CarStu} proved that the number of eigenpoints of a generic (symmetric) $n^d$-tensor is equal to \begin{align*} m_{d,n} := \frac{(d-1)^n-1}{d-2} = (d-1)^{n-1}+\dots + (d-1) + 1 \end{align*} The same count holds for generic real (symmetric) tensors (i.e. tensors with real entries) but, except for the case of real symmetric matrices ($d=2$), not all eigenvectors of a general real symmetric tensor of order $d\geq 3$ are real. In fact, ``most''\footnote{As it often happens in real algebraic geometry problems the objects of ``maximal complexity'' are rare and ``numerically invisible''.} of real symmetric tensors have eigenpoints in $\K{C}P^{n-1}\setminus \K{R}P^{n-1}$. Abo, Seigal and Sturmfels conjectured \cite[Conjecture 6.5]{ASS} that for any $n\geq 2, d\geq 1$ there exists a generic real symmetric $n^d$-tensor having only real eigenvectors and proved it for $n=3, d\geq 1$ and for $n=d=4$. The cases $n=2, d\geq 1$ and $n\geq 2, d=2$ are elementary, the case of general $n,d$ was unknown (see for example \cite{Stu}). In the present work we cover the case of arbitrary $n$ and $d$, proving the following theorem. \begin{thm}\label{thm 1} For any $n\geq 2$ and $d\geq 1$ there exists a generic real symmetric $n^d$-tensor all of whose $m_{d,n}$ eigenpoints are real. Equivalently (see Section \ref{hp}), there exists a real homogeneous polynomial of degree $d$ in $n$ variables whose restriction to the sphere $S^{n-1} \subset \K{R}^n$ has the maximum possible finite number of critical points that is equal to $2m_{d,n}$. Moreover, such a symmetric tensor (homogeneous polynomial) exists among traceless tensors (harmonic polynomials). \end{thm} In \cite{Gichev} Gichev constructed for any $d\geq 1$ a homogeneous harmonic polynomial of degree $d$ in $3$ variables having $2m_{d,3} = 2(d^2-d+1)$ critical points on the sphere $S^2$. The idea of the proof of Theorem \ref{thm 1} is based on the construction of Gichev. \subsubsection*{Applications} Tensors and their eigenvectors arise in many areas of research in pure mathematics and the applied sciences. Below we discuss two problems to which our work is closely related. \emph{Low rank approximations} (\cite{Chen, FO}). The problem of approximating a general tensor by a tensor of lower rank appears, for example, in signal processing \cite{KR}; see \cite{GK} and references therein for some other applications. Eigenvectors and eigenvalues of a symmetric tensor can be used to find its best rank one approximation. A real symmetric $n^d$-tensor $A=(a_{i_1\dots i_d})_{i_j=1}^n$ is said to be of \emph{rank one} if $a_{i_1\dots i_d} =\lambda x_{i_1}\cdots x_{i_d}$ for some vector $x\in S^{n-1}$ and constant $\lambda\in \K{R}$. Consider the set \begin{align*} X_{d,n} : = \{ \lambda (x_{i_1}\cdots x_{i_d})_{i_j=1}^n : \lambda \in \K{R}, x\in S^{n-1}\} \end{align*} of real symmetric $n^d$-tensors of rank one and for a given real symmetric $n^d$-tensor $A=(a_{i_1\dots i_d})_{i_j=1}^n$ define the function: \begin{align*} \txt{dist}_A: X_{d,n} &\rightarrow \K{R}\\ \lambda (x_{i_1}\cdots x_{i_d})_{i_j=1}^n &\mapsto \sum\limits_{i_1,\dots, i_d=1}^n(a_{i_1\dots i_d} - \lambda x_{i_1}\cdots x_{i_d})^2 \end{align*} \noindent (this function measures the euclidean distance of a rank one tensor from $A$). A rank one tensor $\lambda(x_{i_1}\cdots x_{i_d})_{i_1,=1}^n\in X_{d,n}$ is a critical point of $\txt{dist}_A$ if and only if $x\in S^{n-1}$ is a unit eigenvector of $A$ and $\lambda\in \K{R}$ is the corresponding eigenvalue. In this context a \emph{best rank one approximation} to $A$, a tensor $\lambda(x_{i_1}\cdots x_{i_d})_{i_j=1}^n\in X_{d,n}$ which is a global minimizer of $\txt{dist}_A$, corresponds to the greatest (in absolute value) eigenvalue $|\lambda|$ \cite[Thm. 2.19]{QiLuo}. Our Theorem \ref{thm 1} is then equivalent to the existence for any $n\geq 2, d\geq 1$ of a real symmetric $n^d$-tensor $A$ such that the function $\txt{dist}_A: X_{d,n}\rightarrow\K{R}$ has the maximum possible number of critical points that is equal to $m_{d,n}$. \begin{remark} The problem of finding a best rank one approximation to a real symmetric $n^d$-tensor $A=(a_{i_1\dots i_d})_{i_j=1}^n$ is equivalent to the problem of maximizing the absolute value $|f_A(x)|$ of the homogeneous polynomial $f_A(x) = \sum_{i_j=1}^n a_{i_1\dots i_d}x_{i_1}\cdots x_{i_d}$ constrained on the sphere $S^{n-1}$. \end{remark} \emph{Complex dynamics} (\cite{FS, Rob}). Let $f: \K{C}P^{n-1} \rightarrow \K{C}P^{n-1}$ be a non constant holomorphic map. Then in homogeneous coordinates we can write $f=[f_1: \cdots : f_n ]$, where $$f_i(x)=\sum_{i_2,\dots,i_d=1}^n a_{i i_2\dots i_n} x_{i_2}\cdots x_{i_d},\ i=1,\dots,n$$ are complex homogeneous polynomials of certain degree $d-1$ having no common zeroes in $\K{C}P^{n-1}$. Moreover, the polynomials $f_1,\dots,f_n$ are determined uniquely up to a common constant multiple. It is straightforward to see that the fixed points $\{x\in \K{C}P^{n-1}: f(x) = x\}$ of ${f=[f_1:\cdots:f_n]}$ are precisely the eigenpoints $x\in \K{C}P^{n-1}$ of the tensor ${A=(a_{i_1\dots i_d})_{i_j=1}^n}$ and hence their number for a generic map $f$ is equal to $m_{d,n}$. When the polynomials $f_1,\dots,f_n$ are real, $f=[f_1:\cdots:f_n]$ preserves $\K{R}P^{n-1}\subset \K{C}P^{n-1}$ and the real fixed points of this map are precisely the real eigenpoints of $A$. Our results imply that for some generic real map $f$ all of its (a priori complex) fixed points are real. \section{Preliminaries} \subsection{Morse functions} Let $f$ be a smooth function on a smooth manifold $M$. A critical point $x\in M$ of $f$ is said to be \emph{non-degenerate} if the \emph{Hessian matrix} $\left( \frac{\partial^2 f}{\partial x_i\partial x_j}(x)\right)$ of $f$ at $x$ is non-singular. A smooth function $f: M\rightarrow \K{R}$ with only non-degenerate critical points is called \emph{Morse}. Non-degenerate critical points are isolated, hence on a compact manifold a Morse function can have only finitely many critical points. \subsection{From symmetric tensors to homogeneous polynomials}\label{hp} A generic symmetric $n\times n$ matrix has $n$ real simple eigenvalues and $n$ corresponding eigenpoints. Moreover, in the space of all symmetric $n\times n$ matrices those which have repeated eigenvalues form a real algebraic subvariety, that we call the \emph{discriminant}, and a generic matrix belongs to its complement. The codimension of the discriminant is two and this justifies the fact that the number of real eigenpoints is the same for all generic matrices. Let $A\hspace{-1pt}=\hspace{-2pt} (a_{i_1\dots i_d})_{i_j=1}^n,\, a_{i_1\dots i_d}\hspace{-3pt} \in\hspace{-3pt} \K{R}$ be an $n$-dimensional symmetric tensor of order $d$. Recall that a complex number $\lambda \in \K{C}$ is an \emph{eigenvalue} associated to an eigenvector $x\in \K{C}^n$ if $Ax^{d-1} = \lambda x$. In this case the pair $(x,\lambda)\in \K{C}^n\setminus\{0\}\times \K{C}$ is called an \emph{eigenpair} of $A$. Two eigenpairs $(x,\lambda)$ and $(x^{\prime},\lambda^{\prime})$ of $A$ are said to be equivalent if they define the same eigenpoint $[x]=[x^{\prime}] \in \K{C}P^{n-1}$. Theorem $1.2$ in \cite{CarStu} asserts that the number of eigenpoints (equivalence classes of eigenpairs) of a generic symmetric $n^d$-tensor is equal to $m_{d,n} = ((d-1)^n-1)/(d-2) = (d-1)^{n-1}+\dots+(d-1)+1$. \emph{Non-generic} tensors are cut out by an algebraic hypersurface, called the \emph{eigendiscriminant} \txt{\cite{ASS}}, and the number of eigenpoints of a non-generic tensor is not equal to the expected $m_{d,n}$. On each connected component of the complement of the eigendiscriminant the number of real eigenpoints (equivalence classes of real eigenpairs) is constant. There is a well-known one-to-one correspondence between the set $\mathcal{P}_{d,n}$ of real homogeneous polynomials of degree $d$ in $n$ variables and the set of real symmetric $n^d$-tensors: \begin{align}\label{corr} f_A = \sum\limits_{i_1,\dots,i_d=1}^n a_{i_1\dots i_d}x_{i_1}\dots x_{i_d} \quad \longleftrightarrow\quad A = (a_{i_1\dots i_d})_{i_j=1}^n \end{align} The critical points of the restriction $f_A|_{S^{n-1}}$ of a homogeneous polynomial $f_A$ to the unit sphere are precisely unit real eigenvectors of the corresponding symmetric tensor $A$. Indeed, by the method of Lagrange multipliers, if $x\in S^{n-1}$ then \begin{align*} \txt{d}_x f_A|_{S^{n-1}} = 0 \quad \Leftrightarrow \quad \txt{d}_x f_A = \lambda\, \txt{d}_x \left(\frac{\Vert x \Vert^2-1}{2}\right) \quad \Leftrightarrow \quad Ax^{d-1} = (\lambda/d) x \end{align*} Note that the Lagrange multiplier $\lambda$ corresponds to the eigenvalue $\lambda/d$ associated to the unit eigenvector $x$. In the terminology of Lim \cite{Lim} and Qi \cite{Qi} unit real eigenvectors are $l^2$-eigenvectors and $Z$-eigenvectors respectively. Theorem \cite[Thm.\,1.2.]{CarStu} thus gives an upper bound on the number of critical points of the restriction of a homogeneous polynomial to the sphere. \begin{lemma}\label{bound} If a polynomial $f\in \mathcal{P}_{d,n}$ defines a Morse function $f|_{S^{n-1}}$ on the sphere then the number of critical points of $f|_{S^{n-1}}$ is bounded by $2m_{d,n} = 2((d-1)^n-1)/(d-2)$. \end{lemma} \begin{proof} If $f_A|_{S^{n-1}}$ is a Morse function and the tensor $A$ is generic then $A$ has $m_{d,n}$ eigenpoints in $\K{C}P^{n-1}$ which implies that the number of unit real eigenvectors of $A$ (that is equal to the number of critical points of $f_A|_{S^{n-1}}$) is bounded by $2m_{d,n}$. Suppose now that $f_A|_{S^{n-1}}$ is a Morse function but the tensor $A$ is not generic. Since non-generic tensors form a hypersurface in the space of symmetric tensors any open neighbourhood of $A$ contains a generic tensor $\tilde{A}$. Moreover, if $\tilde A$ is sufficiently close to $A$ by \cite[Cor. 5.24]{BanHur} the function $f_{\tilde A}|_{S^{n-1}}$ is Morse and it has the same number of critical points as $f_{A}|_{S^{n-1}}$. \end{proof} \subsection{Spherical harmonics} Consider the space $$\mathcal{H}_{d,n} = \left\{f|_{S^{n-1}}: f \in \mathcal{P}_{d,n},\ \frac{\partial^2f}{\partial x_1^2}+\cdots+\frac{\partial^2f}{\partial x_n^2} = 0\right\}$$ of restrictions to the sphere $S^{n-1}$ of homogeneous harmonic poynomials of degree $d$. Note that a polynomial $f_A\in \mathcal{P}_{d,n}$ is harmonic if and only if the symmetric tensor $A$ is \emph{traceless}, i.e. $$\sum\limits_{i=1}^n a_{ii\, i_{3} \dots i_{d}} = 0\quad \forall\, i_3,\dots, i_d =1,\dots, n$$ It is well-known that $\mathcal{H}_{d,n}$ is the eigenspace of the spherical Laplace operator $\Delta_{S^{n-1}}$ corresponding to the eigenvalue $-d(d+n-2)$. Functions in $\mathcal{H}_{d,n}$ are called \emph{spherical harmonics} of degree $d$ and the dimension of $\mathcal{H}_{d,n}$ is equal to $$\txt{dim}\, \mathcal{H}_{d,n} = {n+d-1 \choose d} - {n+d-3 \choose d-2}\quad \txt{if} \quad d\geq 2\quad \txt{and} \quad \txt{dim}\, \mathcal{H}_{0,n} = 1,\quad \txt{dim}\,\mathcal{H}_{1,n} = n$$ For any point $y\in S^{n-1}$ and any $d$ there exists a spherical harmonic $Z^{y}_d \in \mathcal{H}_{d,n}$, called \textit{zonal}, which is invariant under rotations preserving $y$: $$Z_d^{y}(Rx) = Z_d^{y}(x),\quad R \in \txt{SO}(n),\ Ry=y$$ The function $Z_d^y(x)$ is determined uniquely up to a constant and is proportional to $G_{d,n}(\langle x,y\rangle)$ \cite[Thm. 2.14]{SteWei},\footnote{According to the usual definition \cite[page 143]{SteWei} a zonal harmonic $Z_d^y$ is determined uniquely by some normalization condition. Since a normalization is unimportant for our purposes we abuse the terminology and call zonal any spherical harmonic with the mentioned invariance property.} where $\langle x, y\rangle = x_1y_1+\dots +x_ny_n$ is the standard scalar product in $\K{R}^n$ and $G_{d,n}$ is the \emph{Gegenbauer polynomial of degree $d$ and parameter $\frac{n-2}{2}$}. The polynomials $\{G_{d,n}\}_{d\geq 0}$ can be defined by the recurrence relation \cite[22.4.2, 22.7.3]{AbrSte}: \begin{align*} G_{0,n}(x) &= 1,\\ G_{1,n}(x) &= (n-2)x,\\ G_{d,n}(x) &= \frac{1}{d}\left[2x(d+\frac{n}{2}-2)G_{d-1,n}(x) - (d+n-4) G_{d-2,n}(x) \right] \end{align*} and they form an orthogonal family on the interval $[-1,1]$ with respect to the measure $(1-z^2)^{\frac{n-3}{2}}\,dz$ \cite[22.2.3]{AbrSte}: $$\int\limits_{-1}^1 G_{d_1,n}(z)\, G_{d_2,n}(z)\, (1-z^2)^{\frac{n-3}{2}} dz = 0,\quad d_1 \neq d_2$$ Therefore by \cite[Prop. I.1.1]{Far} $G_{d,n}$ has $d$ simple real roots in $(-1,1)$ and hence its derivative $G^{\prime}_{d,n}$ has $d-1$ roots in $(-1,1)$ which we denote by $\alpha_{d,1},\dots,\alpha_{d,d-1}$. The following lemma characterizes the critical points of a zonal spherical harmonic. \begin{lemma}\label{zonal} The set of critical points of $Z_d^y$ consists of $y, -y$ and $d-1$ affine hyperplane sections of the sphere $\{x\in S^{n-1}: \langle x, y \rangle = \alpha_{d,i}\},\ i=1,\dots,d-1$. The critical points $y$ and $-y$ are non-degenerate. \end{lemma} \begin{proof} A point $x\in S^{n-1}$ is critical for $G_{d,n}(\langle x,y \rangle)$ if and only if $G^{\prime}_{d,n}(\langle x,y\rangle)y$ is proportional to $x$. This is possible either if $\langle x,y\rangle$ is a root of $G^{\prime}_{d,n}$ or $x=\pm y$. To prove the non-degeneracy of $x=\pm y$ we assume without loss of generality that $y=(0,\dots,0,1)\in S^{n-1}$ and then in local coordinates $$(x_1,\dots,x_{n-1}) \mapsto \left(x_1,\dots,x_{n-1},\pm \sqrt{1-x_1^2-\dots-x_{n-1}^2}\right) \in S^{n-1}$$ around $x=\pm y$ our function $G_{d,n}(\langle x,y\rangle)$ takes the form $G_{d,n}\left(\pm \sqrt{1-x_1^2-\dots-x_{n-1}^2}\right)$. One can easily verify that its Hessian matrix at $(x_1,\dots,x_{n-1})=(0,\dots,0)$ is non-singular. \end{proof} The inclusion map \begin{align*} i : \mathcal{P}_{d,n} &\hookrightarrow \mathcal{P}_{d,n+1}\\ f &\mapsto i(f)(x_1,\dots,x_n,x_{n+1}) = f(x_1,\dots,x_{n}) \end{align*} induces the linear inclusion \begin{align*} \mathlarger{\hat{}}\,: \mathcal{H}_{d,n} &\hookrightarrow \mathcal{H}_{d,n+1}\\ h = f|_{S^{n-1}} &\mapsto \hat{h} = i(f)|_{S^{n}} \end{align*} The critical points of $\hat{h}$ are described as follows. \begin{lemma}\label{sectoral} Assume that $d,n \geq 2$ and $h \in \mathcal{H}_{d,n}$. \begin{enumerate}[label=(\roman*)] \item If the zero locus $\{h=0\} \subset S^{n-1}$ is regular then the set of critical points of $\hat{h} \in \mathcal{H}_{d,n+1}$ consists of $\pm(0,\dots,0,1) \in S^{n}$ and the points $(x_1,\dots,x_n,0)$, where $(x_1,\dots,x_n) \in S^{n-1}$ is critical for $h$. Moreover, for $d\geq 3$ the points $\pm(0,\dots,0,1)\in S^n$ are always degenerate. \item If $\{h=0\}$ is singular then, additionally, for each singular point $(x_1,\dots,x_{n}) \in \{h=0\}$ the great circle $\{(tx_1,\dots,tx_n,\pm\sqrt{1-t^2}):\, 0\leq t \leq 1\} \subset S^n$ consists of critical points of $\hat{h}$. \end{enumerate} \end{lemma} \begin{proof} If $h = f|_{S^{n-1}}$ for some harmonic polynomial $f \in \mathcal{P}_{d,n}$ the critical points of $\hat{h}=i(f)|_{S^{n}}\in \mathcal{H}_{d,n+1}$ are characterized by \begin{align}\label{system for sectoral} \frac{\partial f}{\partial x_1} = \lambda x_1, \quad \dots \quad \frac{\partial f}{\partial x_n} = \lambda x_n, \quad \frac{\partial f}{\partial x_{n+1}} = 0 = \lambda x_{n+1} \end{align} Obviously $(x_1,\dots,x_n,0) \in S^n$ is a critical point of $\hat{h}$ if $(x_1,\dots,x_n)\in S^{n-1}$ is critical for $h$. Now if $\lambda=0$ and $\{h=0\}\subset S^{n-1}$ is regular then $x_1=\dots=x_n=0$ and $x_{n+1}=\pm 1$. If, instead, $\{h=0\}$ is singular and $(x_1,\dots,x_n) \in \{h=0\}$ is a solution of $\frac{\partial f}{\partial x_1} = \dots = \frac{\partial f}{\partial x_n} = 0$ then due to the homogeneity of $f$ any point $(tx_1,\dots,tx_n, \pm\sqrt{1-t^2}),\, 0\leq t \leq 1$ is a solution of the system \eqref{system for sectoral} with $\lambda=0$. \end{proof} \section{Proof of Theorem \ref{thm 1}} Denote by $Z_{d,n}$ a zonal spherical harmonic $Z_d^y(x) = G_{d,n}(\langle x, y\rangle) = G_{d,n}(x_n) \in \mathcal{H}_{d,n}$ corresponding to the point $y=(0,\dots,0,1) \in S^{n-1}$ and let $M_{d,n}\in \mathcal{H}_{d,n}$ be any Morse spherical harmonic with the maximum possible number of critical points. Note that by Lemma \ref{bound} this number is bounded by $2m_{d,n} = 2((d-1)^n-1)/(d-2)$. In dimension $n=2$ any $h \in \mathcal{H}_{d,2}$ is just a trigonometric polynomial $$h = a \cos (d\theta) + b \sin (d\theta),\quad a,b \in \K{R},\quad \theta \in [0,2\pi)$$ and hence it is a Morse function on $S^1$ with $2m_{d,2}=2d$ critical points. For $n, d\geq 3$ the number of critical points of a general spherical harmonic $h \in \mathcal{H}_{d,n}$ is not anymore a constant and depends significantly on the choice of $h$. In the proposition below we exhibit for any $n,d\geq 2$ a Morse spherical harmonic $M_{d,n}\in \mathcal{H}_{d,n}$ having $2m_{d,n}$ critical points. In fact, we construct $M_{d,n}$ by induction on $n$ starting from a trigonometric polynomial $M_{d,2}\in \mathcal{H}_{d,2}$. \begin{propo}\label{propo 1} For any $d, n\geq 2$ and a sufficiently small $\varepsilon>0$ the spherical harmonic $M_{d,n+1} := Z_{d,n+1} + \varepsilon\, \hat{M}_{d,n} \in \mathcal{H}_{d,n+1}$ is a Morse function on $S^{n}$ with $2m_{d,n+1}$ critical points. \end{propo} \begin{proof} As observed above one can take $M_{d,2} = a \cos(d \theta) + b \sin(d \theta)$. Suppose that for some $n\geq 2$, we have already constructed a Morse spherical harmonic $M_{d,n}\in \mathcal{H}_{d,n}$ with $2m_{d,n}$ critical points on $S^{n-1}$. By Lemmas \ref{zonal} and \ref{sectoral} we have that the points $\pm(0,\dots,0,1) \in S^n$ are critical for both $Z_{d,n+1}$ and $\hat{M}_{d,n}$ and hence also for the perturbation $Z_{d,n+1}+\varepsilon \hat{M}_{d,n}$. Since the points $\pm(0,\dots,0,1)$ are non-degenerate for $Z_{d,n+1}$ they remain non-degenerate for the perturbation for small enough $\varepsilon>0$. We prove that each of the $d-1$ critical circles $\{x\in S^{n}: \langle x, y \rangle = \alpha_{d,i}\},\ i=1,\dots,d-1$ of $Z_{d,n+1}$ breaks into $2m_{d,n}$ non-degenerate critical points when $Z_{d,n+1}$ is slightly perturbed by $\hat{M}_{d,n}$. The idea is shown on Figure \ref{fig:pert}, where the red/purple color represents positive/negative values of functions. In spherical coordinates \begin{align*} x_1 &= \sin \theta_n\cdot \tilde{x}_1 = \sin \theta_{n} \sin \theta_{n-1} \cdots \sin \theta_2 \sin \theta_1\\ x_2 &= \sin \theta_n \cdot \tilde{x}_2 = \sin \theta_{n} \sin \theta_{n-1} \cdots \sin \theta_2 \cos \theta_1\\ x_3 &= \sin \theta_n \cdot \tilde{x}_3 = \sin \theta_{n} \sin \theta_{n-1} \cdots \cos \theta_2\\ &\ \ \vdots\\ x_n &= \sin \theta_n \cdot \tilde{x}_n = \sin \theta_n \cos \theta_{n-1}\\ x_{n+1} &= \cos \theta_{n} \end{align*} on $S^n$, where $(\tilde{x}_1,\dots,\tilde{x}_n) \in S^{n-1}=\{x \in S^n: x_{n+1} =0\}$, we have \begin{align*} Z_{d,n+1}(x_1,\dots,x_{n+1}) &= G_{d,n+1}(x_{n+1}) = G_{d,n+1}(\cos \theta_n)\\ \hat{M}_{d,n}(x_1,\dots,x_{n+1}) &= \sin^d \theta_n\, M_{d,n}(\tilde{x}_1,\dots, \tilde{x}_n) \end{align*} \begin{figure}[!htb]\label{fig:pert} \minipage{0.27\textwidth} \includegraphics[width=\linewidth]{zonal.jpg} \endminipage\hfill \minipage{0.32\textwidth} \hbox{\hspace{-0.1cm} \includegraphics[width=1.3\textwidth]{sectoral.jpeg}} \endminipage\hfill \minipage{0.312\textwidth}% \vbox{\vspace{0.25cm} \includegraphics[width=\linewidth]{perturbation.jpeg}} \endminipage \vspace{-0.5cm} \caption{Plots of the absolute values on the sphere $S^2$ of a zonal harmonic $Z_{3,3}$ (left), a function $\hat{M}_{3,2}$ with $6$ critical points on the circle (middle) and a perturbation of $Z_{3,3}$ by $\hat{M}_{3,2}$ with $14=2+2\cdot 6$ non-degenerate critical points (right).} \end{figure} \noindent and hence the critical points of $Z_{d,n+1}+\varepsilon \hat{M}_{d,n}$ are described by the equations \begin{align} \varepsilon\, \sin^d \theta_n\, \frac{\partial}{\partial \theta_1} M_{d,n}(\tilde{x}_1,\dots,\tilde{x}_n) &= 0\nonumber \\ &\vdots\nonumber \\ \varepsilon\, \sin^d \theta_n\, \frac{\partial}{\partial \theta_{n-1}} M_{d,n}(\tilde{x}_1,\dots,\tilde{x}_n) &= 0\nonumber \\ \frac{\partial}{\partial \theta_n}\left[ G_{d,n+1}(\cos \theta_n) + \varepsilon\, \sin^{d} \theta_n \,M_{d,n}(\tilde{x}_1,\dots,\tilde{x}_n) \right]&= 0 \label{last eq} \end{align} Since the $d-1$ zeroes of $G^{\prime}_{d,n+1}$ are non-degenerate, then for a fixed $(\tilde{x}_1,\dots,\tilde{x}_n) \in S^{n-1}$ the equation \eqref{last eq} has $d-1$ non-degenerate solutions provided that $\varepsilon$ is small enough. It follows that each critical point $(\tilde{x}_1,\dots,\tilde{x}_n) \in S^{n-1}$ of $M_{d,n}$ gives rise to $d-1$ critical points of $Z_{d,n+1} + \varepsilon \hat{M}_{d,n}$. In spherical coordinates the Hessian matrix of $Z_{d,n+1} + \varepsilon \hat{M}_{d,n}$ computed at a critical point $\theta =(\theta_1,\dots,\theta_{n-1},\theta_n)$ has the block-diagonal form: \begin{align*} \begin{pmatrix} \varepsilon\, \sin^d \theta_n \frac{\partial^2 M_{d,n}}{\partial \theta_1^2}(\theta) & \dots & \varepsilon\, \sin^d \theta_n \frac{\partial^2 M_{d,n}}{\partial \theta_1\partial \theta_{n-1}}(\theta) & 0 \\ \vdots & \ddots & \vdots & \vdots \\ \varepsilon\, \sin^d \theta_n \frac{\partial^2 M_{d,n}}{\partial \theta_{n-1}\partial \theta_{1}}(\theta) & \dots & \varepsilon\, \sin^d \theta_n \frac{\partial^2 M_{d,n}}{\partial \theta^2_{n-1}}(\theta) & 0 \\ 0 & \dots & 0 & \frac{\partial^2}{\partial \theta_n^2} \left[ G_{d,n+1}(\cos \theta_n) + \right.\\ &&&\hspace{1cm} \left.\varepsilon\, \sin^{d} \theta_n \,M_{d,n}(\tilde{x}_1,\dots,\tilde{x}_n) \right] \end{pmatrix} \end{align*} It is non-singular since the function $M_{d,n}$ is, by assumption, Morse and for a small $\varepsilon$ the solutions of \eqref{last eq} are non-degenerate. Thus, the function $Z_{d,n+1}+\varepsilon \hat{M}_{d,n}$ has $2+(d-1)\cdot 2((d-1)^n-1)/(d-2) = 2((d-1)^{n+1}-1)/(d-2)=2m_{d,n+1}$ non-degenerate critical points. \end{proof} \noindent Theorem \ref{thm 1} follows from the proposition. \begin{remark} The described construction of homogeneous polynomials (spherical harmonics) with maximum finite number of critical points on the sphere can be generalized as follows. Instead of a spherical harmonic $M_{d,n}$ one can take any homogeneous polynomial $f=f(x_1,\dots,x_n)\in \mathcal{P}_{d,n}$ having $2m_{d,n}$ critical points on $S^{n-1}$ and instead of the Gegenbauer polynomial $G_{d,n+1}=G_{d,n+1}(x_{n+1})$ one can take any even (for even $d$) or odd (for odd $d$) univariate degree $d$ polynomial $p=p(x_{n+1})$ whose derivative $p^{\prime} = p^{\prime}(x_{n+1})$ has $d-1$ simple roots in $(-1,1)$. Then for a small $\varepsilon$ the function $p(x_{n+1})+\varepsilon f(x_1,\dots,x_n) \in \mathcal{P}_{d,n+1}|_{S^{n}}$ has $2m_{d,n+1}$ critical points on $S^{n}$. \end{remark} \section*{Acknowledgements} I am grateful to Andrei Agrachev and Antonio Lerario for fruitful discussions, to Bernd Sturmfels for useful comments and suggestions and to Shamil Asgarli for reading the manuscript and giving a feedback. \bibliographystyle{plain} \input{M-tensors.bbl} \bigskip{\footnotesize% \textsc{SISSA, via Bonomea 265, 34136 Trieste, Italy}\par \textit{E-mail address}: \texttt{<EMAIL>}} \end{document}
\section{Introduction} The problem of a particle trapped in a harmonic trap is one of the best known quantum systems. Going from a single particle to a system composed of $N$ interacting particles is, however, far more involved. Interestingly, recent advances in ultracold atomic gases have opened the possibility of studying systems of a few atoms, either fermions or bosons, trapped in potentials of different kind~\cite{Zurn,Bakr,Sherson,Islam}. For the bosonic case, there are important results in 1D where the fermionization of the bosonic gas was preconized by Tonks and Girardeau~\cite{Girardeau} for the case of infinitely repulsive bosons and later confirmed experimentally in ultracold atomic gases~\cite{Paredes,Kinoshita}. There are many works studying fermionization in 1D, for instance, in optical lattices \cite{Pupillo}, in few-atom mixtures \cite{Garcia-March4,Garcia-March,Pyzh}, for attractive interactions \cite{Tempfli} and for few dipolar bosons \cite{Deuretzbacher}. In other cases, the focus are quantum correlations \cite{Koscik,Barfknecht}, its effects in mixtures of distinguishable and identical particles \cite{Garcia-March3} and analytic ansatz to capture the physics in all interaction regimes \cite{Wilson}. The case of two particles with contact interactions was considered in one, two and three dimensions in Ref.~\cite{Busch}. There, they obtained semi-analytic results finding the energies and wave functions as solution of transcendental equations. More general cases of few-body systems have been studied mostly in 3D, see Ref.~\cite{Blume_Report} and references therein. In 2D, semi-analytical approximate solutions to the case of two bosons with finite range interactions have been presented in Ref.~\cite{Doganov}. Other 2D works include two and three-body exact solutions for fermions and bosons with contact interaction \cite{Liu}, fast-converging numerical methods for computing the energy spectrum for a few bosons \cite{Christensson}, the study of finite-range effects \cite{Imran,Imran2} and universality \cite{Kartavtsev,Shea}, condensation in trapped few-boson systems \cite{Daily}, and interacting few-fermions systems \cite{Stetcu,Liu2}. In this paper, we study the properties for $N=2$, $3$, and $4$ identical bosons interacting through a finite-range interaction confined in a 2D isotropic harmonic trap by means of direct diagonalization of the Hamiltonian. We analyze the properties of the system as we increase the strength of the interaction, going from the noninteracting regime to the strongly interacting one. In Sect.~\ref{secII}, we present the many-body Hamiltonian, including the two-body Gaussian-shaped interaction potential considered. We split the center-of-mass and relative parts of the Hamiltonian making use of Jacobi coordinates. In Sect.~\ref{secIII}, we consider first the noninteracting Hamiltonian and discuss in some details the degeneracies present in the many-body spectrum. In Sect.~\ref{secVI}, we focus on the effect of interactions on the many-body spectrum of the system. In Sect.~\ref{secVII}, we discuss the correlations which build in the ground state as the interaction is increased. Finally, the conclusions and summary are presented in Sect.~\ref{conclusions}. \section{The $N$-boson Hamiltonian} \label{secII} We consider a system of $N$ identical bosons of mass $m$ trapped by an isotropic harmonic potential. The many-body Hamiltonian in first quantized form reads \begin{equation} {\cal H}=\sum_{i=1}^N \left ( -\frac{\hbar^2 }{2m}\nabla^2_i+\frac{1}{2}m\omega^2 \vec{x}^{\,2}_i\right ) + g\, \sum_{i<j}^N V(\vec{x}_i-\vec{x}_j)\,. \end{equation} In usual ultracold atomic gases experiments, the atom-atom interactions are well approximated by a contact potential. In our case, we use a finite-size Gaussian potential, \begin{equation} \label{eqpot} V(\vec{x}_i-\vec{x}_j)= g \; \frac{1}{\pi s^2}e^{-\frac{(\vec{x}_i-\vec{x}_j)^2}{s^2}}\,, \end{equation} where $g$ and $s$ characterize the strength and range of the interaction, respectively. Both parameters are considered to be tuneable. For instance, $g$ can be varied by means of a suitable Feshbach resonance. In the limit of $s$ going to zero, we recover a contact interaction with strength $g$. Regardless of $N$, we can split the Hamiltonian in two parts, ${\cal H}={\cal H}_{\rm cm}+{\cal H}_{\rm r}$, using Jacobi coordinates, \begin{eqnarray} \label{centerofmass} \vec{R} &\equiv& \frac{1}{N}\sum_{i=1}^N \vec{x}_i \,, \\ \vec{r}_k&\equiv& \sqrt{\frac{2k}{k+1}} \left(\vec{x}_{k+1}-\frac{1}{k} \sum_{i=1}^k \vec{x}_i \right),\,\, k=1,\,...\,,N-1 \,. \nonumber \end{eqnarray} The center-of-mass part and relative part of the total Hamiltonian read \begin{equation} \label{eqcm} {\cal H}_{\rm cm}=-\frac{\hbar^2}{2M}\nabla^2_{\vec{R}}+\frac{1}{2}M\omega^2\vec{R}^{\,2}, \end{equation} \begin{equation} \label{eqrel} {\cal H}_{\rm r}=\sum_{k=1}^{N-1} \left(-\frac{\hbar^2}{2\mu}\nabla^2_{\vec{r}_k} +\frac{1}{2}\mu \omega^2\vec{r}^{\,2}_k\right)+g\tilde{V}(\vec{r}_1,...\, ,\vec{r}_{N-1}), \end{equation} with the definitions $M\equiv Nm$ and $\mu\equiv m/2$. The interaction only appears in the relative part and takes the form \begin{equation} \begin{gathered} \label{potentialN} \tilde{V}(\vec{r}_1,...\, ,\vec{r}_{N-1})\equiv \\ \sum_{i<j}^N V \left(\vec{x}_i(\vec{R},\vec{r}_k,...\, ,\vec{r}_{N-1}) -\vec{x}_j(\vec{R},\vec{r}_k,...\, ,\vec{r}_{N-1})\right)\,. \end{gathered} \end{equation} As a consequence, the change in the energy spectrum with increasing the interaction through $g$ or changing the range $s$ will come from a change in the energy associated to ${\cal H}_{\rm r}$. \subsection{Second-quantized $N$-boson Hamiltonian} \label{secIV} Our numerical method to study the excitation spectrum will consist in truncating the Hilbert space of the $N$-boson system such that the particles can populate only the first $M$ single-particle eigenstates. We label the single particle states, $\psi_{i}(x,y)$, and their corresponding eigenenergies, $\epsilon_{i} = n_x+n_y+1$, with an index $i=1,\,...\,,M$ running through the pair of quantum numbers $n_x$ and $n_y$. With this truncation, the second quantized Hamiltonian reads \begin{equation} \label{eqMB1} \hat{H}=\hat{H}_{0}+\hat{H}_{\rm int}\,. \end{equation} Where $\hat{H}_0$ and $\hat{H}_{\rm int}$ correspond to the single particle and interaction terms, \begin{eqnarray} \label{eqMB2} \hat{H}_{0}&=&\sum_{i=1}^M \hat{a}^{\dagger}_i \hat{a}_i \, \epsilon_i \,,\nonumber\\ \hat{H}_{\rm int}&=&\frac{g}{2} \sum_{i,j,k,l=1}^M \hat{a}^{\dagger}_i \hat{a}^{\dagger}_j \hat{a}_k \hat{a}_l \, V_{i,j,k,l} \,, \end{eqnarray} where \begin{eqnarray} \label{eqMB4} V_{i,j,k,l}&=&\frac{1}{\pi s^2}\int_{-\infty}^{\infty} dx \,dy\, dx'\, dy' \, \psi^{*}_{i}(x,y)\psi_{k}(x,y) \nonumber \\ &\times& \psi^{*}_{j}(x',y')\psi_{l}(x',y') \;e^{-\frac{(x-x')^2+(y-y')^2}{s^2}}. \end{eqnarray} The explicit analytical form of these integrals, $V_{i,j,k,l}$, is provided in Appendix~\ref{apintegrals}. The operator $\hat{a}^{\dagger}_i$($\hat{a}_i$) creates(destroys) a particle in the single particle mode $i$, \begin{eqnarray} \hat{a}^{\dagger}_i \ket{n_1,\, ... \, ,n_M}&=&\sqrt{n_i + 1}\ket{n_1,\, ... \, ,n_i+1,\, ... \, ,n_M} \,,\nonumber\\ \hat{a}_i \ket{n_1,\, ... \, ,n_M}&=&\sqrt{n_i}\ket{n_1,\, ... \, ,n_i-1,\, ... \, ,n_M}\,. \label{eqcrea} \end{eqnarray} They satisfy bosonic commutation relations, $[ {\hat{a}}_i ,{\hat{a}}^{\dagger}_j ]=\delta_{i,j}$. We introduce the Fock basis, \begin{equation} \label{Fockbasis} \ket{n_1,\, ... \, ,n_M}=\frac{(\hat{a}^{\dagger}_1)^{n_1} \dots (\hat{a}^{\dagger}_M)^{n_M}}{\sqrt{n_1 !\, ... \, n_M !}} \ket{\rm vac}, \end{equation} where $\ket{\rm vac}\equiv \ket{0,\,...\,,0}$ is the vacuum state and, as we consider a fixed number of particles $N$, the quantum numbers $n_i$ verify \begin{equation} N=\sum_{i=1}^M n_i \,. \label{eqNcons} \end{equation} The dimension of the Fock space is \begin{equation} D_N^M=\frac{(M+N-1)!}{(M-1)!N!}, \label{eqdimMB} \end{equation} which, for $N=2$, $3$, and $4$, gives, respectively, \begin{eqnarray} D_2^M&=&\frac{M(M+1)}{2} \,, \nonumber\\ D_3^M&=&\frac{M(M+1)(M+2)}{6} \,, \nonumber\\ D_4^M&=&\frac{M(M+1)(M+2)(M+3)}{24} \,. \end{eqnarray} \section{Degeneracies in the noninteracting limit} \label{secIII} In this section, we will discuss the degeneracies present in the system in absence of interactions. First, we consider the two-boson case, in which the analysis is simpler, and then we shall explain the main degeneracies for $N$ bosons. \subsection{The two-boson system} In the noninteracting case, $g=0$, for the two-boson system, we can write down the Hamiltonian in second quantization, splitting the center of mass and the relative motion. Using from now on harmonic oscillator units, $\hbar \omega$ for energy and $ \sqrt{\hbar/ (m\omega)}$ for length, we have, in polar coordinates, \begin{equation} \label{eqboson1} \hat{H}=\hat{H}_{\rm cm}+\hat{H}_{\rm r}= \hat{n}_{\rm cm} + \hat{n}_{r} + 2, \end{equation} where $\hat{H}_{\rm cm}=\hat{n}_{\rm cm} +1$, $\hat{H}_{r}=\hat{n}_{r} +1$. Therefore, we have a 2D harmonic oscillator for each part of the Hamiltonian. The corresponding eigenstates can be labelled as $\ket{n_{\rm cm},m_{\rm cm},n_{r},m_{r}}$, namely, \begin{eqnarray} \label{2deigenstates} \hat{n}_{\rm cm}\ket{n_{\rm cm},m_{\rm cm},n_{r},m_{r}} &=&n_{\rm cm}\ket{n_{\rm cm},m_{\rm cm},n_{r},m_{r}},\nonumber\\ \hat{n}_{r}\ket{n_{\rm cm},m_{\rm cm},n_{r},m_{r}}&=&n_{r}\ket{n_{\rm cm},m_{\rm cm},n_{r},m_{r}},\nonumber\\ \hat{L}_{z,\rm cm}\ket{n_{\rm cm},m_{\rm cm},n_{r},m_{r}}&=&m_{\rm cm}\ket{n_{\rm cm},m_{\rm cm},n_{r},m_{r}},\nonumber\\ \hat{L}_{z,r}\ket{n_{\rm cm},m_{\rm cm},n_{r},m_{r}}&=&m_{r}\ket{n_{\rm cm},m_{\rm cm},n_{r},m_{r}},\nonumber\\ \end{eqnarray} where $\hat{L}_{z,\rm cm}$ and $\hat{L}_{z,\rm r}$ are the third component of the center-of-mass orbital angular momentum and the relative orbital angular momentum, respectively, expressed in units of $\hbar$. However, those four quantum numbers have a restriction imposed by the symmetry of the wave function under the exchange of particles. The full wave function in polar coordinates for $\vec{R}$ and $\vec{r}$ reads \begin{equation} \label{eqboson2} \begin{gathered} \chi_{n_{\rm cm},m_{\rm cm},n_{r},m_{r}}\left(R,r,\varphi_R,\varphi_r\right)= \nonumber \\ \chi_{n_{\rm cm},m_{\rm cm}}\left(\sqrt{2},R,\varphi_R\right) \chi_{n_{r},m_{r}}\left(\frac{1}{\sqrt{2}},r,\varphi_r\right), \end{gathered} \end{equation} with \begin{equation} \begin{split} \label{eqpolarr} \chi_{n,m}\left(\alpha, r,\varphi\right)=N_{n,m}\left(\alpha\right) e^{im\varphi} \\ \times\, e^{-\frac{\left(\alpha r\right)^2}{2}} \left(\alpha r\right)^{|m|}L^{|m|}_{\frac{n-|m|}{2}}\left(\left(\alpha r\right)^2\right)\,. \end{split} \end{equation} The $L^k_n(x)$ are the associated Laguerre polynomials defined as \begin{equation} \label{eqpolarr2} L^k_n(x)\equiv\sum_{m=0}^n (-1)^m \begin{pmatrix} n+k \\ n-m \end{pmatrix} \frac{x^m}{m!} \end{equation} and $N_{n,m}\left(\alpha\right)$ is a normalization constant, \begin{equation} \label{eqpolarr3} N_{n,m}\left(\alpha\right)= \alpha\sqrt{\frac{\left(\frac{n-|m|}{2}\right)!}{\pi\left(\frac{n+|m|}{2}\right)!}}\,. \end{equation} \begin{table}[t] \begin{centering} \begin{tabular}{ |c|c|c|c|c|c|c|c| } \hline $n_{\rm cm}$ & $n_r$ & $m_{\rm cm}$ & $m_r$ & $E$ & $N_E$ & $d^b_{N_E}$ & $d^U_{N_E}$ \\[0.8ex] \hline 0 & 0 & 0 & 0 & 2 & 0 & 1 & 0 \\ \hline 1 & 0 & -1 & 0 & & & & \\ 1 & 0 & 1 & 0 & 3 & 1 & 2 & 0 \\ \hline 2 & 0 & -2 & 0 & & & & \\ 2 & 0 & 0 & 0 & & & & \\ 2 & 0 & 2 & 0 & & & & \\ 0 & 2 & 0 & -2 & 4 & 2 & 6 & 2 \\ 0 & 2 & 0 & 0 & & & & \\ 0 & 2 & 0 & 2 & & & & \\ \hline 3 & 0 & -3 & 0 & & & & \\ 3 & 0 & -1 & 0 & & & & \\ 3 & 0 & 1 & 0 & & & & \\ 3 & 0 & 3 & 0 & & & & \\ 1 & 2 & -1 & -2 & & & & \\ 1 & 2 & 1 & -2 & 5 & 3& 10 & 4 \\ 1 & 2 & -1 & 0 & & & & \\ 1 & 2 & 1 & 0 & & & & \\ 1 & 2 & -1 & 2 & & & & \\ 1 & 2 & 1 & 2 & & & & \\ \hline \end{tabular} \end{centering} \caption{Quantum numbers, energy, excitation energy number, degeneracy, and number of states with $m_r\neq0$ for the low-energy levels of a system of two noninteracting identical bosons trapped in a 2D isotropic harmonic potential. The energies are in units of $\hbar \omega$.} \label{table1} \end{table} The wave function corresponding to the center of mass is symmetric under the exchange of particles, because $R$ and $\varphi_R$ remain unchanged upon exchanging particles 1 and 2, since $\vec{R}=\frac{1}{2}\left(\vec{x}_1+\vec{x}_2\right)$. However, the relative wave function is symmetric or antisymmetric depending on the quantum number $m_{r}$. We have defined the relative coordinate as $\vec{r}=\vec{x}_1-\vec{x}_2$, therefore the angle $\varphi_r$ changes to $\varphi_r + \pi$ and, due to the form of the wave function, see Eq.~(\ref{eqpolarr}), a factor $(-1)^{m_{r}}$ appears. For this reason, only the states with $m_{r}=$ even can describe the two-boson system. This implies that $n_{r}$ must also be an even number. To sum up, the four quantum numbers are \begin{eqnarray} \label{eqboson3} \begin{cases} n_{\rm cm}=0,1,2,3,4, \dots \\ m_{\rm cm}=-n_{\rm cm},-n_{\rm cm}+2,\dots \, ,n_{\rm cm} \\ n_{r}=0,2,4,6,\dots \\ m_{r}=-n_{r},-n_{r}+2,\dots\, ,n_{r} \,. \end{cases} \end{eqnarray} With the previous possible quantum numbers, we can determine the degeneracy for each energy level. We define the excitation energy number as the excitation energy per energy unit, $N_E\equiv E-E_0$. Then, the degeneracy for a given value of $N_E$ (see Appendix~\ref{apdeg}) is \begin{eqnarray} \label{eqboson4} d^b_{N_E}&=&-\frac{1}{3}\left (\left \lfloor \frac{N_E}{2} \right \rfloor +1 \right)\\ &\times& \left[4{\left \lfloor \frac{N_E}{2} \right \rfloor}^2 +(2-3N_E)\left \lfloor \frac{N_E}{2} \right \rfloor -3 (N_E+1)\right] \,,\nonumber \end{eqnarray} where $\left \lfloor N_E/2 \right \rfloor$ indicates the floor function of $N_E/2$. The previous equation is valid for spinless bosons, which is the case considered in this work. However, for fermions and bosons with spin, the spatial antisymmetric states should be considered. The degeneracy for those states (see Appendix A) is \begin{eqnarray} \label{eqantisymmetric} d^f_{N_E}&=&-\frac{1}{3}\left (\left \lfloor \frac{N_E}{2} \right \rfloor +1 \right)\\ &\times& \left[4{\left \lfloor \frac{N_E}{2} \right \rfloor}^2 +(8-3N_E)\left \lfloor \frac{N_E}{2} \right \rfloor -6 N_E\right] \,.\nonumber \end{eqnarray} Notice that the total degeneracy is given by \cite{Nathan}, \begin{equation} d^{T}_{N_E}=d^b_{N_E}+d^f_{N_E}=\frac{(N_E+3)(N_E+2)(N_E+1)}{6}. \end{equation} \subsubsection{Unperturbed energy states} \label{unperturbedstates} We are also interested in knowing how many states have $m_{r}\neq0$ for each energy level, because these states are the ones that do not feel a zero-range interaction. For a finite but small range, these states are also expected to remain almost unperturbed for the considered range of interaction strengths. The number of states in each energy level such that their energy should not change significantly with a small Gaussian width (see Appendix~\ref{apdeg}) is \begin{equation} \label{eqboson5} d^U_{N_E}=\left(-\frac{4}{3}\left \lfloor \frac{N_E}{2} \right \rfloor +N_E+\frac{1}{3}\right)\left \lfloor \frac{N_E}{2} \right \rfloor \left(\left \lfloor \frac{N_E}{2} \right \rfloor+1 \right) \,. \end{equation} \subsection{$N$-boson system} \label{nbs} \begin{table}[t] \begin{centering} \begin{tabular}{|l|c|c|c|} \hline Eigenstates & $E$ & $N_E$ & $d_{N_E}$ \\[.8ex] \hline $\ket{N,0,...\, ,0}$ & N & 0 & 1 \\ \hline $\ket{N-1,1,0,...\, ,0}$ & & & \\ $\ket{N-1,0,1,0,...\, ,0}$ & N+1 & 1 & 2 \\ \hline $\ket{N-1,0,0,1,0,...\, ,0}$ & & & \\ $\ket{N-1,0,0,0,1,0,...\, ,0}$ & & & \\ $\ket{N-1,0,0,0,0,1,0,...\, ,0}$ & & & \\ $\ket{N-2,2,0,...\, ,0}$ & N+2 & 2 & 6 \\ $\ket{N-2,0,2,0,...\, ,0}$ & & & \\ $\ket{N-2,1,1,0,...\, ,0}$ & & & \\ \hline $\ket{N-1,0,0,0,0,0,1,0,...\, ,0}$ & & & \\ $\ket{N-1,0,0,0,0,0,0,1,0,...\,,0}$ & & & \\ $\ket{N-1,0,0,0,0,0,0,0,1,0...\,,0}$ & & & \\ $\ket{N-1,0,0,0,0,0,0,0,0,1,0,...\,,0}$ & & & \\ $\ket{N-2,1,0,1,0,...\, ,0}$ & & & \\ $\ket{N-2,0,1,1,0,...\, ,0}$ & & & \\ $\ket{N-2,1,0,0,1,0,...\, ,0}$ & & & \\ $\ket{N-2,0,1,0,1,0,...\, ,0}$ & N+3 & 3 & 14 \\ $\ket{N-2,1,0,0,0,1,0,...\, ,0}$ & & & \\ $\ket{N-2,0,1,0,0,1,0,...\, ,0}$ & & & \\ $\ket{N-3,1,2,0,...\, ,0}$ & & & \\ $\ket{N-3,2,1,0,...\, ,0}$ & & & \\ $\ket{N-3,3,0,...\, ,0}$ & & & \\ $\ket{N-3,0,3,0,...\, ,0}$ & & & \\ \hline \end{tabular} \end{centering} \caption{Eigenstates expressed using the Fock basis (Eq.~(\ref{Fockbasis})), energy, excitation energy number and degeneracy, for the low-energy levels of a system of $N\geq 3$ noninteracting identical bosons trapped in a 2D isotropic harmonic potential. The energies are in units of $\hbar \omega$.} \label{table2} \end{table} The procedure described above in order to compute the degeneracy is not valid for systems with more than two bosons. The reason is that we cannot label the symmetric (neither the antisymmetric) states under the exchange of a pair of particles using the previous quantum numbers. The symmetry of the relative Jacobi coordinates, defined in Eq.~(\ref{centerofmass}), under the exchange of two particles is not well defined. An alternative way for counting the degeneracy is by making use of the Fock basis introduced in the previous section, Eq.~(\ref{Fockbasis}). Those states are eigenstates of $\hat{H}_0$, i.e., \begin{eqnarray} \label{energyfockbasis} \hat{H}_0\ket{n_1,...\,,n_M}&=& \left(\sum_{i=1}^M n_i\epsilon_i \right)\ket{n_1,...\,,n_M}\nonumber\\ &=&E\ket{n_1,...\,,n_M} \,. \end{eqnarray} The ground state of a system of $N$ identical spinless bosons in a 2D isotropic harmonic potential is always non-degenerate. In particular, for the noninteracting case, it corresponds to a state with all the bosons populating the non-degenerate single-particle ground state, i.e., the state $\ket{N,0,...\,,0}$. For any higher energy level of this system, labelled with $N_E=E-E_0$, there is a maximum number of degenerate states, $d^{\text{max}}_{N_E}$, that is reached when $N \geq N_E$. \\ \\ {\bf Theorem.} $d_{N_E}=d^{\text{max}}_{N_E} \iff N \geq N_E$ \begin{proof} From left to right, if we have reached $d^{\text{max}}_{N_E}$, one of the degenerate states is the one with $N_E$ bosons in the single-particle states with excitation energy, $E^{\text{sp}}_{\text{exc}}=E^{\text{sp}}-E^{\text{sp}}_0=1$. Therefore, we have $N\geq N_E$ bosons. From right to left, if we have $N\geq N_E$ bosons, we have reached the maximum degeneracy because having less bosons would not allow us to have the previous discussed state, which is degenerate. Adding more bosons would not increase the number of degenerate states, since it is impossible to introduce new states with the same energy as the previous ones. This is due to the finite ways of decomposing $N_E$ as a sum of positive integers, without considering the order, that is, the number of partitions $p(N_E)$~\cite{Bruinier,Choliy}. \end{proof} Therefore, the degeneracy of the first $N_E+1$ energy levels is independent of the number of particles $N$ for any $N\geq N_E$. In Table~\ref{table2}, we give the low-energy states with their corresponding energies, excitation energy numbers and degeneracies for a system of $N$ bosons. In Table~\ref{table3}, we give $d^{\text{max}}_{N_E}$ for the first values of $N_E$. Computing the maximum degeneracy is analogous to computing the number of partitions of the integer $N_E$ where there are $n+1$ different kinds of part $n$ for $n = 1, 2, 3, ...$, \cite{oeis} and we can obtain it from its generating function, \begin{equation} \frac{1}{\prod_{k=1}^\infty(1-x^k)^{k+1}}=\sum_{N_E=0}^\infty d^{\text{max}}_{N_E} x^{N_E}, \end{equation} and also, \begin{equation} d^{\text{max}}_{N_E}=\sum_{k=0}^{N_E} p(N_E-k)PL(k), \end{equation} where $PL(k)$ are the planar partitions of $k$ \cite{oeis2}. Notice that the number of partitions is a lower bound of the maximum degeneracy, \begin{equation} d^{\text{max}}_{N_E} \geq p(N_E), \end{equation} and the equality would hold for non-degenerate single-particle states, e.g. for the 1D case. \begin{table}[t] \begin{centering} \begin{tabular}{|c|c|c|c|} \hline \,\,\,\,\,$E$\,\,\,\,\, & \,\,\,$N_E$\,\,\, & \,\,\,$p(N_E)$ \,\,\, & \,\,\, $d^{\text{max}}_{N_E}$ \,\,\, \\ [0.8ex] \hline N & 0 & 1 & 1 \\ \hline N+1 & 1 & 1 & 2 \\ \hline N+2 & 2 & 2 & 6 \\ \hline N+3 & 3 & 3 & 14 \\ \hline N+4 & 4 & 5 & 33 \\ \hline N+5 & 5 & 7 & 70 \\ \hline N+6 & 6 & 11 & 149 \\ \hline \end{tabular} \end{centering} \caption{Energy, excitation energy number, number of partitions of the excitation energy number and maximum degeneracy for the low-energy levels of a system of $N$ noninteracting identical bosons in a 2D isotropic harmonic potential. The maximum degeneracy, $d^{\text{max}}_{N_E}$, is equal to the degeneracy of the level $N_E$ if and only if $N \geq N_E$ (see the text for explanation).} \label{table3} \end{table} \section{Energy spectra} \label{secVI} Our numerical method consists in the direct diagonalization of the truncated second-quantized Hamiltonian, as described in Sec.~\ref{secIV}. We will consider systems with $N=2$, $3$, and $4$ bosons. Direct diagonalization provides the energy spectrum of the Hamiltonian in the truncated space. In particular, we have used the {\it ARPACK} implementation of the Lanczos algorithm to obtain the lower part of the many-body spectrum. \subsection{Two-boson energy spectrum} \begin{figure}[t!] \centering \includegraphics[width=\columnwidth]{spe2mescolor.eps} \caption{(a-c) Low-energy spectrum for $N=2$ interacting bosons trapped in a 2D isotropic harmonic potential depending on the interaction strength $g$ for different values of the width $s$ of the two-body Gaussian-shaped potential. (Solid red lines) Energy of the ground state and the corresponding center-of-mass excitations. (Long-dashed pointed cyan lines) Unperturbed states. (Short-dashed pointed green lines) First relative excitation and the corresponding center-of-mass excitations. (a-c) (Blue dotted lines) Energy of the ground state computed with the variational ansatz of Eq.~(\ref{varmontecarlo2}). (Black dashed lines) Analytic approximate energy levels using Eq.~(17) of Ref.~\cite{Doganov} shown only in panel (a). Numerical results with (a) $M=200$ and $D_{2}^{200}=20100$, (b) and (c) $M=150$ and $D_{2}^{150}=11325$.} \label{Fig:1} \end{figure} In Fig.~\ref{Fig:1}, we show the low-energy spectrum for the system of two interacting identical bosons in the harmonic trap. In the figure, we compare results obtained with three different values of $s=0.1$, $0.5$ and $1$. In all cases, the energy spectrum has a number of common features. First, in the spectrum, there are the states discussed in Sect.~\ref{unperturbedstates}, which are essentially insensitive to the interaction. In the zero range limit, these are basically states with non-zero relative angular momentum, which do not feel the contact interaction~\cite{Doganov}. With finite interactions but for a small range, $s=0.1$ and $0.5$, they remain mostly flat for $g$ up to $20$. For $s=1$, their energy increases slightly with $g$, deviating from the zero range prediction. Second, the ground state energy increases linearly with $g$ for small values of $g$. Up to first order perturbation theory, the energy is given by \begin{equation} \label{pertgroundN2} E_0\simeq 2 + \frac{g}{\pi\left(s^2+2\right)}. \end{equation} However, the ground state energy tends to saturate as $g$ is increased. For smaller values of $s$, this saturation takes place at smaller values of $g$. Third, there are the energies coming from the relative part of the Hamiltonian with the center of mass at the ground state, i.e. $n_{\rm cm}=0$. The ground state is one of these states and there is one state of this type in each energy level with an even $N_E$ in the noninteracting limit. Finally, the spectrum also contains center-of-mass excitations~\cite{Busch}, which are easily recognized as constant energy shifts independent of $g$ with respect to states with $n_{\rm cm}=0$. For comparison, we depict also the approximate values of~\cite{Doganov} in panel (a) of Fig.~\ref{Fig:1}. As reported in Ref.~\cite{Doganov}, their approximate solution -- which is not variational -- starts to deviate from the exact numerical results at values of $g\simeq 4$. The approximation gives, however, a fairly good overall picture of the low-lying two-particle spectrum. \subsection{Degeneracy for the interacting two-boson system} We can label the states with three quantum numbers. Two are the ones corresponding to the center of mass, $n_{\rm cm}$ and $m_{\rm cm}$, and the other is a new quantum number, $\nu_r$, that labels the nondegenerate eigenstates of the relative part of the Hamiltonian. We can write those states as \begin{equation} \label{statesinteracting} \Psi(R,\varphi_R,r)=\chi_{n_{\rm cm},m_{\rm cm}}(\sqrt{2},R,\varphi_R)f_{\nu_r}(r), \end{equation} where $\chi_{n_{\rm cm},m_{\rm cm}}(\sqrt{2},R,\varphi_R)$ is given in Sect.~\ref{secIII} and $f_{\nu_r}(r)$ is the relative wave function, that depends on $g$ and $s$. The other states that are in the spectrum are the unperturbed ones (almost unaffected by the interaction). Their degeneracy is given in Sec.~\ref{secIII}. The states of Eq.~(\ref{statesinteracting}), for a given $\nu_r$, are degenerate with degeneracy given by the 2D harmonic oscillator of the center-of-mass part, i.e., their degeneracy is $n_{\rm cm}+1$. From each noninteracting energy level with even $N_E$, a state with a new $\nu_r$ arises, and its center-of-mass excitations appear in higher energy levels with degeneracy $n_{\rm cm}+1$, too. To sum up, the ground state is nondegenerate. The first excited state is two-degenerate and the two states are the two possible center-of-mass excitations of the ground state. The third noninteracting energy manifold (6 states with $E(g=0)=4$) splits in three: 1) three center-of-mass excitations of the ground state, 2) two unperturbed states and, 3) the new relative state with quantum numbers $n_{\rm cm}=0$, $m_{\rm cm}=0$ and $\nu_r=1$ with $E(g=2)=4.21$. We give the degeneracy and the quantum numbers of the low-energy states in Table~\ref{table4}. \begin{table}[t] \begin{centering} \begin{tabular}{ |c|c|c|c|c|c|c|c| } \hline $n_{\rm cm}$ & $n_r$ & $m_{\rm cm}$ & $m_r$ & $\nu_r$ & $E(g=0)$ & $E(g=2)$ & $d_{int}(g=2)$ \\[0.8ex] \hline 0 & - & 0 & 0 & 1 & 2 & 2.23 & 1 \\ \hhline{|=|=|=|=|=|=|=|=|} 1 & - & -1 & 0 & 1 & 3 & 3.23 & \\ 1 & - & 1 & 0 & 1 & 3 & 3.23 & 2 \\ \hhline{|=|=|=|=|=|=|=|=|} 2 & - & -2 & 0 & 1 & 4 & 4.23 & \\ 2 & - & 0 & 0 & 1 & 4 & 4.23 & 3 \\ 2 & - & 2 & 0 & 1 & 4 & 4.23 & \\ \hline 0 & - & 0 & 0 & 2 & 4 & 4.21 & 1 \\ \hline 0 & 2 & 0 & -2 & - & 4 & 4.00 & \\ 0 & 2 & 0 & 2 & - & 4 & 4.00 & 2 \\ \hhline{|=|=|=|=|=|=|=|=|} 3 & - & -3 & 0 & 1 & 5 & 5.23 & \\ 3 & - & -1 & 0 & 1 & 5 & 5.23 & \\ 3 & - & 1 & 0 & 1 & 5 & 5.23 & 4 \\ 3 & - & 3 & 0 & 1 & 5 & 5.23 & \\ \hline 1 & - & -1 & 0 & 2 & 5 & 5.21 & \\ 1 & - & 1 & 0 & 2 & 5 & 5.21 & 2 \\ \hline 1 & 2 & -1 & -2 & - & 5 & 5.00 & \\ 1 & 2 & 1 & -2 & - & 5 & 5.00 & \\ 1 & 2 & -1 & 2 & - & 5 & 5.00 & 4 \\ 1 & 2 & 1 & 2 & - & 5 & 5.00 & \\ \hline \end{tabular} \end{centering} \caption{Quantum numbers, energy in the noninteracting limit, energy at $g=2$ and degeneracy, for the low-energy levels of a system of two interacting identical bosons trapped in a 2D isotropic harmonic potential. The energies are in units of $\hbar \omega$ and the ones with $g=2$ correspond to a vertical cut in Fig.~\ref{Fig:1} panel (b), $s=0.5$.} \label{table4} \end{table} \subsection{Three and four-boson energy spectra} \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{ground34mes.eps} \caption{Ground-state energy for (a) N=3 and (b) N=4 interacting bosons trapped in a 2D isotropic harmonic potential depending on the interaction strength $g$. (Red solid line) computed numerically with {\it ARPACK} and (a) $M=80$ and (b) $M=50$, (blue dotted line) computed with the variational many-body wave function of Eq.~(\ref{varmontecarlo2}), (black dashed line) computed with a Gaussian variational ansatz, Eq.~(\ref{varansatz}).} \label{Fig:2} \end{figure} \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{spe34color.eps} \caption{Low-energy spectrum for (a) $N=3$ and (b) $N=4$ interacting bosons trapped in a 2D isotropic harmonic potential depending on the interaction strength $g$. (Red solid lines) Energy of the ground state, (green dashed lines) the first, (blue dotted lines) the second, (cyan dashed-dotted lines) the third, (grey triple-dotted lines) the fourth and (black double-dotted lines) the fifth relative excitations and, respectively, their center-of-mass excitations in the same kind of line and color. The number of modes that we have used is (a) $M=80$ and (b) $M=50$, that corresponds to Hilbert spaces of dimension $D_3^{80}=88560$ and $D_4^{50}=292825$, respectively.} \label{Fig:3} \end{figure} Our exact diagonalization scheme allows us to obtain the lowest part of the many-body spectrum for systems of up to $4$ bosons with good accuracy, up to values of $g\simeq 20$. In Fig.~\ref{Fig:2} we report the ground state energy for $N=3$ and $N=4$ bosons compared with a simple mean-field variational ansatz using the following wave function, \begin{equation} \label{varansatz} \Psi(\vec{x}_1,\,...\,,\vec{x}_N) =\left(\frac{\alpha}{\pi}\right)^{\frac{N}{2}} \prod_{i=1}^N e^{-\frac{1}{2}\alpha \vec{x}^2_i}, \end{equation} and finding the optimum $\alpha^{*}$ that minimizes the energy \begin{eqnarray} E_0(\alpha)&=&\int_{-\infty}^{\infty}d\vec{x}_1 \, ... \, d\vec{x}_N \, \Psi^{*}(\vec{x}_1,\,...\,,\vec{x}_N)H\Psi(\vec{x}_1,\,...\,,\vec{x}_N) \nonumber \\ &=&N\left(\frac{\alpha}{2}+\frac{1}{2\alpha}\right)+\frac{gN(N-1)\alpha}{2\pi\left(\alpha s^2+2\right)}. \end{eqnarray} As expected, this mean-field ansatz captures well the behaviour of the ground state of the system for small values of $g$. For $g\simeq 2$, however, we already observe substantial deviations, with the meanfield prediction overstimating the ground state energy considerably. In particular, as we will see below, the system develops strong beyond-mean-field correlations as $g$ is increased. In addition, we introduce a two-body-correlated variational many-body ansatz of Jastrow type~\cite{Jastrow}, \begin{equation} \label{varmontecarlo2} \Psi(\vec{x}_1,\,...\,,\vec{x}_N)=\left(\frac{\alpha}{\pi}\right)^{\frac{N}{2}} \prod_{i=1}^N e^{-\frac{1}{2}\alpha \vec{x}^2_i}\prod_{j<i}^N\left(1-a e^{-b(\vec{x}_i -\vec{x}j)^2}\right), \end{equation} where $\alpha$, $a$ and $b$ are the variational parameters. We observe in Fig.~\ref{Fig:2} that the energies computed with this ansatz, using standard Monte-Carlo methods, are very close, and some times even below, the exact diagonalization ones. To improve the latter, one needs to enlarge the Hilbert space (larger $M$) to get a slightly lower upper bound. In principle, the exact diagonalization procedure for a given $M$ provides an upper bound for the ground state and each excited state. In the next section, we explain the physical interpretation of the variational parameters and discuss how well the ansatz captures the physics of the problem. The low-energy spectrum for $N=3$ and $N=4$ at smaller values of $g$ is fairly similar. This is not unexpected as the degenerate manifolds are the same irrespective of the number of particles, see Sect.~\ref{nbs}. The first excited state is a center-of-mass excitation, the Kohn mode, as seen clearly in the excitation spectra shown in Fig.~\ref{Fig:3}. Even for $g$ up to $16$, the low-energy spectra for $N=3$ and $N=4$ are quite similar. The overall picture is qualitatively the same for both cases, although for $N=4$ there are extra levels crossing. In Fig.~\ref{Fig:3} panel (b), there is a level that starts crossing the highest energy level depicted at $g\simeq 3$. This line in the spectrum comes from the fourth excited level in the noninteracting limit and is also expected to appear for systems with more particles, e.g. $N=5$. It arises from the existence of a degenerate kind of states that are found only for $N\geq4$, as it is explained in Sect.~\ref{secIII}. \subsection{Degeneracy for the interacting three and four-boson systems} One major difference for more than two particles, is that we do not find states not affected by the interaction. Moreover, the degeneracy of the eigenfunctions of the relative part of the Hamiltonian is not $1$. Therefore, the states cannot be uniquely characterized by $\nu_r$. However, we can identify the states that are center-of-mass excitations of lower energy states. In Fig.~\ref{Fig:3}, in both panels, for example, for $g=1$, we know the degeneracy of all the energy levels and we can identify them. The ground state is nondegenerate. As we have said before, the first excited state is a center-of-mass excitation, with degeneracy 2. The second excited state decomposes in three states corresponding to the next center-of-mass excitations of the ground state, there are two degenerate states corresponding to a relative excitation, and finally a different relative excitation. The third excited energy level in the noninteracting limit splits when $g$ is increased in the next center-of-mass excitations of the states of the previous level, i.e., four center-of-mass excitations of the ground state, four center-of-mass excitations of the previous two-degenerate relative excited states, and two more degenerate states corresponding to two center-of-mass excitations of the single-degenerate relative energy level that appeared in the second excited state when $g$ was increased. Moreover, there are two pairs of different relative excited states that split from the noninteracting third energy level. This behaviour is the same independently of $N$ for $g$ sufficiently small, for instance, for $N=4$ up to $g=3$, where there is the previous discussed crossing of levels. \subsection{$N$-boson energies up to first order in perturbation theory} Using the analytic expressions of the integrals of the interaction that are given in Appendix \ref{apintegrals}, we compute the energies of the first three energy levels in first order perturbation theory. For the ground state of the system, the energy is given by \begin{equation} \label{groundpert} E_0\simeq N+g\frac{N(N-1)}{2\pi\left(s^2+2\right)}. \end{equation} The next level has energy \begin{equation} \label{1pert} E_1\simeq N+1+g\frac{N(N-1)}{2\pi\left(s^2+2\right)}. \end{equation} The third energy level splits in three, in the way that is discussed in the previous section that is also valid for $N$ bosons, with energies \begin{equation} \label{2pert1} E_{2_1}\simeq N+2+g\frac{N(N-1)}{2\pi\left(s^2+2\right)}, \end{equation} \begin{equation} \label{2pert2} E_{2_2}\simeq N+2+g\frac{N\left(N(2+s^2)^2-s^2(8+s^2)-8\right)}{2\pi\left(s^2+2\right)^3}, \end{equation} \begin{equation} \label{2pert3} E_{2_3}\simeq N+2+g\frac{N\left(N(2+s^2)^2-s^2(8+s^2)-4\right)}{2\pi\left(s^2+2\right)^3}. \end{equation} The similarity in the energy difference, $E-E_0$, for the case of $N=3$ and $N=4$ plotted in Fig.~\ref{Fig:3} for a small $g$ can be understood using the previous expressions. The corresponding excitation energies are, in this approximation, \begin{equation} \label{dif1} E_1-E_0=1, \end{equation} \begin{equation} \label{dif21} E_{2_1}-E_0=2, \end{equation} \begin{equation} \label{dif22} E_{2_2}-E_0=2-g\frac{2N\left(1+s^2\right)}{\pi\left(s^2+2\right)^3}, \end{equation} \begin{equation} \label{dif23} E_{2_3}-E_0=2-g\frac{2Ns^2}{\pi\left(s^2+2\right)^3}. \end{equation} In the first two cases, Eq.~(\ref{dif1}) and Eq.~(\ref{dif21}), we recover the first and the second center-of-mass excitations that are red solid lines in Fig.~\ref{Fig:3}. The presence of the factor $N$ in the quantity $E_{2_2}-E_0$, see Eq.~(\ref{dif22}), explains why the slope of the green dashed lines is slightly bigger in absolute value for $N=4$, panel (b), than for $N=3$, panel (a), in Fig.~\ref{Fig:3} for $g\simeq0$. This effect would be notorious when comparing the spectrum for two very different numbers of particles. Finally, we also see that the second term in $E_{2_3}-E_0$ is proportional to $N$, but in that case, for $s$ small, the second term becomes negligible. Therefore, the blue dotted lines are very close to the red solid lines in the spectra for $g\simeq0$, as we have used $s=0.5$. In the zero-range limit, this approximation gives $E_{2_3}(s \rightarrow 0)=E_{2_1}(s \rightarrow 0)$. As the perturbative correction affects only the relative motion, the corrections to $E_0$, $E_1$ and $E_{2_1}$ are equal. \section{Interactions and quantum correlations} \label{secVII} \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{dens.eps} \caption{Density profile of the ground state for (a) $N=2$, (b) $N=3$ and (c) $N=4$ interacting bosons trapped in a 2D isotropic harmonic potential for different values of the interaction strength $g$ for a fixed range $s=0.5$. The number of modes that we have used is $M=50$, which corresponds to a Hilbert space with dimension (a) $D_2^{50}=1275$, (b) $D_3^{50}=22100$ and (c) $D_4^{50}=292825$.} \label{Fig:4} \end{figure} \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{denscomp.eps} \caption{Density profile for $N=2$, $3$, and $4$ interacting bosons trapped in a 2D isotropic harmonic potential computed with the ground state obtained using {\it ARPACK} with $M=50$ (lines) and obtained from the variational ansatz, Eq.~(\ref{varmontecarlo2}), (crosses, squares and dots) for $g=10$ and $s=0.5$.} \label{Fig:5} \end{figure} As seen in the previous section, the ground state energy of the system for $N=2, 3$ and 4 tends to saturate as we increase the strength of the atom-atom interactions. This saturation starts to occur for values $g$ for which the mean-field variational ansatz starts to deviate from the exact results. This reminds of a similar effect found in 1D systems, where the ground state evolves from mean-field to Tonks-Girardeau gas as the interaction strength is increased. In the Tonks-Girardeau limit, the atoms do avoid completely the atom-atom contact interaction by building strong correlations which in 1D are easily understood from the Bose-Fermi mapping theorem \cite{Girardeau2}. In 2D, no such mapping exist. However, we expect that the system should build suitable correlations to avoid the interaction, resulting in a saturation of the energy for increasing $g$. For the ground state, besides the exact diagonalization method, we have also made use of a correlated variational ansatz, Eq.~(\ref{varmontecarlo2}), to enlighten the discussion. The energies and properties associated to this variational ansatz are evaluated by means of Monte-Carlo methods (standard Metropolis algorithm). The physical meaning of the variational parameters is quite transparent. $\alpha$ directly affects the overall size of the cloud. The two-body Jastrow correlations are parameterized by $a$ and $b$. Two limiting cases are illustrative. If the system is fully condensed we will have $a=0$, while $a=1$ would correspond to building a zero of the wave function whenever two atoms are at the same position. $b$ affects the two-body correlation length. Thus, we expect the following behavior: for values of $g\simeq 0$ we should have $a=0$ ($b$ is thus irrelevant) and $\alpha$ close to $1$. For increasing $g$, $\alpha$ decreases to avoid the interaction by simply putting the atoms apart. As we increase $g$, two-body correlations build in, $a\neq 0$ and $\alpha$ should stop decreasing as the correlation is more efficient to separate the atoms. Let us first discuss the density profile of the clouds, see Appendix~\ref{appendixdenspair} for definitions. In Fig.~\ref{Fig:4} we show the density profile, normalized to unity, depending on the radial coordinate $X=\sqrt{x^2+y^2}$, computed with our exact diagonalization procedure. Due to the symmetry of the trap, the density profile of the ground state does not have angular dependence, see Appendix~\ref{appendixdenspair}, Eq.~(\ref{densityyy}). In panels (a), (b) and (c) we show results for $N=2$, $3$, and $4$. In all cases, with the same value of $s=0.5$. We compare densities obtained for different values of $g$. Irrespective of $N$ we observe a number of common features. For $g=0$, the system has a Gaussian density profile which, as $g$ is increased, evolves into a profile with a flat region for $X\leq 1$ at $g\simeq 16$. As $N$ is increased, the size of the inner plateau increases, thus tending towards an homogeneous density. The quality of our variational approach is seen in Fig.~\ref{Fig:5}. We compare density profiles obtained with the exact diagonalization procedure with those obtained variationally by means of Eq.~(\ref{varmontecarlo2}). As seen in the figure, the variational wave function provides a fairly accurate representation of the density profile for $N=2$, $3$, and $4$. In particular, it captures well the appearance of the plateau. The effect of increasing the interaction among the atoms is manifold. As we have seen above, the density profile is modified and the gas becomes close to homogeneous in the inner part of the trap. This change in the density is however accompanied by a change in the correlations present in the system. Actually, the gas goes from a fully condensed state to a largely fragmented one as we increase the interaction. In Fig.~(\ref{Fig:6}), we depict how the condensed fraction for $N=2$, $3$, and $4$ decreases when increasing the interaction strength. For the same value of $g$, the fragmentation in the system is larger for larger number of particles. \begin{figure}[t] \centering \includegraphics[width=\columnwidth]{condens.eps} \caption{Condensed fractions of the ground state for (black line) $N=2$, (red-dashed line) $N=3$ and (green spotted line) $N=4$ interacting bosons trapped in a 2D isotropic harmonic potential depending on the interaction strength $g$ for a fixed range $s=0.5$. The number of modes that we have used is $M=50$ and the rest of the eigenstates of the one-body density matrix are much more smaller than the biggest one.} \label{Fig:6} \end{figure} \begin{figure}[t!] \centering \includegraphics[width=\columnwidth]{wavecondens.eps} \caption{Single-particle eigenstate of the one-body density matrix in which the particles condense. We use Eq.~(\ref{eigenwavedens}) and the values of $C_0$ and $C_1$ computed numerically diagonalizing the one-body density matrix, Eq.~(\ref{eqonebody}), for different values of $g$. (a) $N=2$ bosons, (b) $N=3$ and (c) $N=4$. The fraction of condensed particles is plotted in Fig.~\ref{Fig:6}. The number of modes that we have used is $M=50$, which corresponds to a Hilbert space with dimension (a) $D_2^{50}=1275$, (b) $D_3^{50}=22100$ and (c) $D_4^{50}=292825$.} \label{Fig:7} \end{figure} \begin{figure}[t!] \centering \includegraphics[width=\columnwidth]{pairdivdensorigin.eps} \caption{Probability density, $\eta(X)/\rho(0)$, of finding a particle at position $X$ once we have found one particle at the origin, $X=0$, for (a) $N=2$, (b) $N=3$ and (c) $N=4$ interacting bosons trapped in a 2D isotropic harmonic potential for different values of the interaction strength $g$ for a fixed range $s=0.5$. The number of modes that we have used is $M=50$, which corresponds to a Hilbert space with dimension (a) $D_2^{50}=1275$, (b) $D_3^{50}=22100$ and (c) $D_4^{50}=292825$.} \label{Fig:8} \end{figure} The most populated eigenstate of the one-body density matrix (natural orbit), is found to have the approximate form, using the $\ket{n_x,n_y}$ basis, \begin{equation} \label{eigenvectordens} \ket{\phi_1}\simeq C_0\ket{0,0}+C_1\left(\ket{2,0}+\ket{0,2}\right), \end{equation} and its wave function reads \begin{equation} \label{eigenwavedens} \phi_1(X)\simeq \frac{1}{\sqrt{\pi}}e^{-\frac{X^2}{2}}\left(C_0-\sqrt{2}C_1\left(1-X^2\right)\right). \end{equation} This natural orbit is a superposition of the two first single-particle states of the 2D harmonic oscillator with zero angular momentum, $m=0$, the state $\ket{n=0,m=0}$ and the state $\ket{n=2,m=0}$, thus the wave function has no angular dependence. For the noninteracting case, $C_0=1$ and $C_1=0$, since the particles condense in the ground state of the harmonic oscillator. When the interaction is increased, $C_0$ becomes smaller and $C_1$ starts to increase. In Fig.~\ref{Fig:7}, we plot the wave function of Eq.~(\ref{eigenwavedens}) using the corresponding values of $C_0$ and $C_1$ computed for $N=2,3,4$ and different values of the interaction strength $g$. The advent of correlations beyond mean-field ones should also become apparent when computing two-particle correlations. In particular, we can evaluate the probability of finding two particles at given positions. For simplicity we consider one of them at the origin and the second one at a distance $X$. The probability density of finding a particle in the space once we have fixed a particle at the center is given by $\eta(X)/\rho(0)$ and is normalized to unity (see Appendix~\ref{appendixdenspair}). Without interactions, the pair correlation function is proportional to the density, since the probability density for finding a particle in a particular place is not correlated with the positions of the others, see Eq.~(\ref{pairnoint}). In Fig.~\ref{Fig:8}, we show how $\eta(X)/\rho(0)$ evolves with increasing the interaction for the systems with $N=2$, $3$, and $4$ bosons. In all cases, the central peak gets smaller when increasing the interaction, being fairly close to zero for $g\simeq 16$. This is in line with the fact that the atoms build correlations to avoid the interaction, e.g. as $g$ is increased the probability of finding two atoms at the same location decreases. In between, next to the center of the trap, the function is uniform. When the interaction is strong there is a minimum at the position of the first atom, the probability density $\eta(X)/\rho(0)$ develops a maximum corresponding to the preferred distance between particles. Increasing the number of bosons, this maximum shifts towards larger distances. \section{Summary and Conclusions} \label{conclusions} In this work, we have studied systems of a few number of bosons trapped in an isotropic 2D harmonic trap interacting by a finite-range Gaussian potential. First, we have explored in detail the noninteracting case, paying particular attention to the degeneracies of the excitation spectrum of the system. In particular, for the $N$-boson case, we have explained how to compute the degeneracy of the low-energy states which is independent of the number of particles. By means of a direct diagonalization of the Hamiltonian in a truncated space, we have studied the interacting system and we have computed the low-energy spectra for $N=2$, $3$, and $4$ bosons. We have also proposed a variational ansatz with two-body correlations which provides an accurate description of both the energy and the structure of the ground state in the full range of interaction considered. Center-of-mass and relative excitations are clearly identified in the spectrum. As the interaction is increased, we have shown how the ground state and all low lying states tend to saturate as a function of the interaction strength. The effect of increasing the interaction on the ground state is twofold. On one side, the density at the center of the trap decreases becoming almost flat in the bulk of the gas, with the cloud thus becoming larger. On the other side, the atoms develop strong two-body correlations to avoid the interaction. This is achieved by building holes in the many-body wave function whenever two atoms are at the same position, as is clearly seen in the computed pair correlations and also on the explicit zeros introduced in our variational wave function. This mechanism is similar to the one present in the Tonks-Girardeau gas in 1D and is also responsible for the observed saturation of the energies of the system as we increase the interaction strength. Finally, the onset of correlations in turn produces fragmentation on the one-body density matrix, which has been shown to increase with the number of particles. Thus, we have shown that our exact diagonalization method allows one to study interacting bosonic systems in 2D. We are presently implementing this method for spin-orbit coupled bosonic systems. \vspace*{0.5cm} \begin{acknowledgments} The authors thank Th. Busch for his comments on regularization and specially acknowledge B.-G. Englert for sending his notes on this topic. We also would like to show our gratitude to N. L. Harshman for discussions about degeneracy and a careful reading of the manuscript. The authors acknowledge financial support by grants 2014SGR-401 from Generalitat de Catalunya and FIS2014-54672-P from the MINECO (Spain). P.M. is supported by a FI grant from Generalitat de Catalunya and B.J.-D. is supported by the Ram\'{o}n y Cajal program. \end{acknowledgments}
\section{Introduction} Non-reciprocal devices, in which time reversal symmetry is broken for light propagation, provide critical functionalities for signal routing and source protection in photonic systems. The most commonly encountered non-reciprocal devices are isolators and circulators, which can be implemented using a variety of techniques encompassing magneto-optics~\cite{Huang:17,Ross:11}, parity-time symmetry breaking~\cite{Peng2014}, spin-polarized atom-photon interactions~\cite{Sayrin:15,Scheucher:16}, and optomechanical interactions~\cite{KangM.2011,Kim2016,Poulton2012,Shen2016,Fang:2017,Ruesink:2016,Dong2015}. On the other hand, recent developments reveal a much broader and compelling vision of using time-reversal symmetry breaking for imparting protection against defects, through analogues of the quantum Hall effect~\cite{Halperin:82} in both topological~\cite{Wang:09,Hafezi:13,Susstrunk:15} and non-topological systems~\cite{Kim2017}. The use of optomechanical coupling~\cite{RevModPhys.86.1391} for breaking time-reversal symmetry via momentum biasing~\cite{Kim2015,Dong2015} and synthetic magnetism~\cite{Fang:2017,Ruesink:2016} is particularly attractive since strong dispersive features can be readily produced, without needing materials with gain or magneto-optical activity. Additionally, the potential for complete isolation with ultralow loss~\cite{Kim2016} is a significant advantage over state-of-the-art in chip scale magneto-optics. All these systems feature dynamic reconfigurability through the pump laser fields and can potentially be implemented in foundries with minimal process modification. Unfortunately, all realizations of optomechanical non-reciprocal interactions to date only operate over kHz-MHz bandwidth. This fundamental constraint arises simply because the interaction is determined by the mechanical linewidth, which is traditionally 6-9 orders of magnitude lower than the optical system (potentially several THz). In this work we present a new approach for optomechanical non-reciprocity where the bandwidth of the effect is no longer determined by the mechanics, but is instead determined by the photonic modes. We achieve this by inverting the roles of the mechanical and optical modes in a common optomechanical configuration so that acoustic pumping, as opposed to optical pumping, is used to break time-reversal symmetry. The practical implications of this new pumping strategy are transformative; we no longer need any additional lasers to drive the system, and more importantly, the linearity of the non-reciprocal effect is no longer limited to small optical signals. For the first time, an integrated nanophotonic device is produced that exhibits broken time-reversal symmetry over GHz bandwidth using a phonon pump. \vspace{12pt} The specific device that we implement for this demonstration is a non-reciprocal nanophotonic modulator. Light entering the device from one direction is transferred to a different optical band through phonon-mediated momentum shift and energy shift, i.e. indirect interband scattering~\cite{Kuhn:71,Hwang:97,Yu2009}. Light entering from the opposite direction is simply resonantly dissipated. As such, the presented device operates as a frequency shifting optical isolator exhibiting 15 dB of contrast and up to 17\% mode conversion efficiency. Unlike sophisticated electro-optic implementation of this idea~\cite{lira2012}, acoustic phonons naturally provide large momentum shifts at practical driving frequencies. Thus, it is unnecessary to slow down the effective phase velocity of the pumping signal to achieve indirect interband scattering using a phononic pump. The acoustic method also circumvents free carrier absorption that otherwise generates large losses in electro-optic waveguides. To explain this approach qualitatively, we consider an optomechanically-active racetrack resonator ~\cite{Shin2013,Kitt2016} supporting quasi-TE$_{10}$ ($\omega_1, k_1$) and quasi-TE$_{00}$ ($\omega_2, k_2$) as visualized in Fig.~\ref{fig1:PM}. For convenience we drop the 'quasi-' prefix. Indirect intermodal scattering~\cite{Yu2009} can be enabled between the optical modes as a result of the photoelastic perturbations of the medium by the driven acoustic wave ($\Omega, q$) \cite{Hwang:97,Kuhn:71}. While this optically resonant structure sacrifices the bandwidth over which acousto-optical interactions can occur, it provides giant opto-acoustic gain that is necessary to obtain appreciable light-vibration coupling within a small form factor \cite{Dostart:16}. The requisite phase matching conditions are illustrated in $\omega-k$ space in Fig.~\ref{fig1:PM}c,d. Under normal conditions, the TE$_{00}$ momentum is higher than that of the TE$_{10}$ mode (i.e. $k_2 > k_1$). We first consider the case illustrated in Fig.~\ref{fig1:PM}c where the resonance frequency of the TE$_{00}$ racetrack mode is higher than that of the TE$_{10}$ mode ($\omega_2 > \omega_1$). Here, a carefully designed acoustic transducer that generates phonons ($\Omega, q$) between the modes can help satisfy the phase matching condition ($\Omega=\omega_2-\omega_1$, $q = k_2-k_1$) for acousto-optical scattering for forward propagating optical signals. For light propagating in the opposite direction, the momentum difference between the optical modes is now ($\Omega, -q$) which is not satisfied by the driven phonons. Thus the system exhibits broken time-reversal symmetry, i.e. intermodal scattering is permitted only for forward signals while the backward signals see no such effect. We can now also consider the case shown in Fig.~\ref{fig1:PM}d where the resonance frequency relation is opposite. In this case the phase-matching of scattering between the optical modes requires phonons having ($\Omega, -q$) in the forward direction and ($\Omega,q$) in the backward direction. Thus, forward propagating phonons can only phase-match backward propagating optical modes in this case. In addition to the above phase matching requirement, the acoustic wave must also assist with breaking orthogonality. When both optical modes are of TE polarization, the intermodal optomechanical coupling coefficient ($\beta$) is proportional to the cross-sectional overlap integral of the optical modes $E_1 \left( \textbf{r}_\perp \right)$, $ E_2 \left( \textbf{r}_\perp \right)$ and the acoustic mode displacement $u\left( \textbf{r}_\perp \right)$ given by~\cite{Agrawal2013}: \begin{align} \beta \propto \iint E_1 \left( \textbf{r}_\perp \right) E_2 \left( \textbf{r}_\perp \right) \left(\nabla\cdot u\left( \textbf{r}_\perp \right) \right) d^2\textbf{r}_\perp \end{align} As shown in Fig.~\ref{fig1:PM}b, the electric fields of TE$_{10}$ and TE$_{00}$ modes have odd and even shapes in the transverse direction, respectively. Therefore, the density variation associated with the acoustic wave must be asymmetric with respect to the center of the waveguide to ensure non-zero $\beta$. In the case where the node is located exactly at the center of the waveguide, we can maximize the intermodal coupling and simultaneously suppress intramodal scattering by balancing out compressive and tensile strain in the waveguide. The acousto-optic interaction in the forward phase matched case (Fig.~\ref{fig1:PM}c) can now be described using the coupled equations of motion for the optical fields (backward phase matched case in Supplement \S S3): \begin{align} \dfrac{\partial}{\partial t} \begin{pmatrix} a_1\\ a_2 \end{pmatrix} = -i \begin{pmatrix} \omega_1-i\kappa_1/2 & G_{ph}^*e^{i\Omega t}\\ G_{ph}e^{-i\Omega t}& \omega_2-i\kappa_2/2 \end{pmatrix} \begin{pmatrix} a_1\\ a_2 \end{pmatrix} + \begin{pmatrix} \sqrt{\kappa_{ex1}}\\ \sqrt{\kappa_{ex2}} \end{pmatrix} s_{in}e^{-i\omega_l t} \end{align} \noindent where $a_1$ ($a_2$) is the intracavity field, $\kappa_1$ ($\kappa_2$) is the loaded decay rate of the TE$_{10}$ (TE$_{00}$) mode, $G_{ph}=\beta u$ is the phonon-enhanced optomechanical coupling rate, and $u$ is displacement associated with the acoustic pump. Here we assume that an input field $s_{in}$ at carrier frequency $\omega_l$ is provided to the resonator via an evanescently coupled waveguide (Fig.~\ref{fig1:PM}a) with coupling rates $\kappa_{ex1}$ and $\kappa_{ex2}$ to the TE$_{10}$ and TE$_{00}$ optical racetrack modes respectively. In the case where we probe the $a_2$ mode, we can express the optical susceptibility as $\chi_{om}(\omega)=\left[\kappa_2/2+i(\omega_2-\omega)+\alpha(\omega)\right]^{-1}$ where $\omega$ is Fourier frequency and $\alpha(\omega)=\left| G_{ph} \right|^2/ \left[ \kappa_1/2 + i(\omega_1+\Omega-\omega) \right]$ is an additional optical loss rate induced by the acousto-optic interaction. In contrast, optically pumped optomechanical systems~\cite{KangM.2011,Poulton2012,Shen2016,Fang:2017,Ruesink:2016,Dong2015,Kim2017,RevModPhys.86.1391,Kim2015,Kim2016} have an interaction term of the form $\alpha(\omega)=\left| G \right|^2/ \left[ \Gamma/2 + i(\Omega_m+\omega_p-\omega) \right]$ where $G=\beta a_1$ is the photon-enhanced optomechanical coupling rate, $\Gamma$ is decay rate of the mechanical mode, $\Omega_m$ is the mechanical resonant frequency, and $\omega_p$ is the pump laser frequency~\cite{Kim2016}. We can immediately see that the interaction bandwidth in the acoustically pumped case is no longer defined by the linewidth $\Gamma$ of the mechanical mode, but instead by the linewidth $\kappa_1$ of the $a_1$ optical mode. This feature enables an orders-of-magnitude higher bandwidth non-reciprocal interaction. \vspace{12pt} \begin{figure}[!hp] \begin{adjustwidth}{-1in}{-1in} \makebox[\textwidth][c]{\includegraphics[width=1.3\textwidth]{figure1}} \centering \caption{ (a) Conceptual schematic of acoustically pumped non-reciprocal nanophotonic modulator. The device is composed of a racetrack resonator supporting two optical modes (TE$_{10}$ and TE$_{00}$). An electrically driven 2-dimensional acoustic wave (pump) simultaneously breaks orthogonality between the optical modes while also satisfying the phase matching condition. $s_{in}$ and $s_{out}$ represent input and output signals from the waveguide. (b) Illustration of the transverse mode profiles ($E_1 \left( \textbf{r}_\perp \right)$, $E_2 \left( \textbf{r}_\perp \right)$ are electric fields, $u\left( \textbf{r}_\perp \right)$ is material displacement) shows the odd acoustic pump profile needed to obtain non-zero overlap integral. (c) The required phase matching condition illustrated in frequency-momentum space. The acoustic pump is launched in the forward direction with frequency and momentum ($\Omega,q$). The lower momentum optical mode (TE$_{10}$) has frequency and momentum ($\omega_1,k_1$) and the higher momentum optical mode (TE$_{00}$) has frequency and momentum ($\omega_2,k_2$). When the resonance frequency of the TE$_{00}$ mode is higher than of the TE$_{10}$ mode, the phase matching condition can be satisfied in the forward direction. (d) Conversely, when the resonance frequency of the TE$_{10}$ mode is higher than the TE$_{00}$ mode, the phase matching condition is satisfied in the backward direction. } \label{fig1:PM} \end{adjustwidth} \end{figure} We fabricate the nonreciprocal modulator on an aluminum nitride (AlN) device layer on air platform, having an underlying a silicon handle wafer (Fig.~\ref{fig2:a}a,b). This selection of materials ensures CMOS compatibility~\cite{Xiong:12}. Here, the AlN supports the optical modes due to its high transparency in the telecom band~\cite{Xiong:121,Xiong:12} and additionally functions as an excellent acoustic material on which phonons can be piezoelectrically driven (Fig.~\ref{fig2:a}c,d) ~\cite{Tadesse2014,Li:15,piazza:06}. Details on the fabrication process are provided in Methods below. The device is composed of an AlN racetrack resonator that supports the required TE$_{00}$ and TE$_{10}$ modes around 1550 nm using a wrapped ridge waveguide (details provided in Supplement~\S S7). Other optical modes are suppressed by limiting the width (2.2 $\mu$m) and thickness (350 nm) of the racetrack waveguide. The optical modes of the racetrack are accessed through an adjacent linear single-mode waveguide with a width of 800~nm that is coupled evanescently to the resonator at a single point. Grating couplers at the ends of the linear waveguide are used to provide optical access to the system. The as-fabricated waveguide geometries were evaluated using electron microscopy, which permitted more accurate refinement and finite-element simulation of the optical modes in Comsol Multiphysics. This procedure also allows us to evaluate the material refractive index as $(n_{AlN}=2.07)$ by matching against experimental measurement of the free spectral range (FSR) of each optical mode family within the resonator. The frequency difference between pairs of optical resonances varies due to the distinct dispersion of the TE$_{00}$ and TE$_{10}$ mode families (Fig.~\ref{fig4:mea}c). The acoustic pump is provided to the resonator using an interdigitated transducer (IDT) that is fabricated on the same piezoelectric AlN substrate. The IDT pitch and angle are selected carefully in order to generate a 2-dimensional acoustic wave having the correct momentum in both propagating and transverse directions, as shown in Fig.~\ref{fig2:a}a. In order to satisfy momentum conservation in the propagating direction, an acoustic propagation constant of $q_{propagating} = 3.54 \times 10^5 m^{-1}$ is required. Since we simultaneously require a standing wave in the transverse direction, an acoustic free edge reflector is fabricated by cutting the AlN device layer through to the air below (Fig.~\ref{fig2:a}a,b). This free edge reflector is placed at $2\lambda$ away from the waveguide in order to situate an acoustic node at the center of the waveguide and obtain an odd transverse profile (Fig.~\ref{fig1:PM}b). Based on simulation, the cross-sectional overlap integral $\beta$ is maximized when the transverse acoustic wavelength and the width of the optical wave guide are matched, setting transverse propagation constant to $q_{transverse} = 2\pi / 2.2~\mu m^{-1} = 2.86 \times 10^6 m^{-1}$. Accounting for the transverse and propagating components of the acoustic wave, the total wave vector of the acoustic wave launched by the IDT is calculated as $q_{total} = \sqrt{ q_{propagating}^2 + q_{transverse}^2 } \approx 2.88 \times 10^6 m^{-1}$. The IDT angle is then set to $\theta=\tan^{-1}(q_{propagating}/q_{transverse}) = 7.06 ^{\circ} $ , and pitch to $\Lambda=\pi / 2 q_{total}$ = 546 nm. The required driving frequency of 4.82 GHz is calculated using finite element simulation of the S$_0$ Lamb surface acoustic wave dispersion for the selected propagation constant. Fig.~\ref{fig2:a}d presents a simulation of the 2-dimensional acoustic mode shape in the racetrack waveguide region. The intermodal modulation frequency and momentum can be tailored for different phononic and photonic modes by simply modifying the IDT parameters, without changing material phonon dispersion. Micrographs of the fabricated device are presented in Fig.~\ref{fig3:img}. \begin{figure}[t!] \begin{adjustwidth}{-1in}{-1in} \makebox[\textwidth][c]{\includegraphics[width=1.2\textwidth]{figure2}} \centering \caption{ (a) Schematic of the phonon-photon interaction region. A 2-dimensional acoustic wave is generated using an angled interdigitated transducer (IDT) that provides momentum in both transverse and propagating directions. The pitch of the IDT ($\Lambda$ = 546 nm) determines total momentum of driven phonons, while the angle of the IDT ($\theta$ = 7.06$^{\circ}$) determines the ratio between transverse and propagating phonon momenta. The free edge reflector is situated such that a standing acoustic wave is formed in the transverse direction and its node is placed in the middle of the nanophotonic waveguide. (b) Cross-section schematic of the phonon photon interaction region. (c) FEM simulated mode shapes of the TE$_{10}$ and TE$_{00}$ optical modes and the S$_0$ acoustic wave. (d) Isometric view of the 2-dimensional acoustic wave propagating along the optical waveguide. } \label{fig2:a} \end{adjustwidth} \end{figure} \begin{figure}[t!] \begin{adjustwidth}{-1in}{-1in} \makebox[\textwidth][c]{\includegraphics[width=1.2\textwidth]{figure3}} \centering \caption{(a) True color micrograph of the acoustically pumped non-reciprocal nanophotonic modulator. (b) Close up of the phonon-photon interaction region showing the interdigitated transducer (IDT) and the free edge acoustic reflector. (c) SEM image of the 2.2 $\mu$m width racetrack resonator and the 800 nm single mode waveguide in the evanescent coupling region.} \label{fig3:img} \end{adjustwidth} \end{figure} \vspace{12pt} We experimentally demonstrate non-reciprocal modulation within the system by measuring the optical sidebands for both forward and backward probe signals, using the measurement setup shown in Fig.~\ref{fig4:mea}a (see also Methods). The primary acoustic component of the system, i.e. the IDT, is first characterized using s-parameter measurement (Fig.~\ref{fig4:mea}b) using a calibrated RF probe by means of an electronic vector network analyzer. The measured reflection coefficient (s$_{11}$ parameter) shows a resonant dip corresponding to efficient conversion of the input electronic stimulus into the acoustic wave. We can directly measure this characteristic acoustic resonance at 4.82 GHz, corresponding to the S$_0$ Lamb surface acoustic wave on the AlN substrate. In Fig.\ref{fig4:mea}c we present the measured optical transmission spectrum from the perspective of the coupling waveguide, where the transmission dips corresponding to the modes of the racetrack resonator are clearly visible. The TE$_{00}$ mode is seen to have higher Q factor (Q$_{\textrm{TE}_{00}\textrm{,loaded}} \approx$ 170,000) than the TE$_{10}$ mode (Q$_{\textrm{TE}_{10}\textrm{,loaded}} \approx$ 102,000). The measured free spectral ranges (FSR) of TE$_{00}$ and TE$_{10}$ resonances are respectively 140.5 GHz and 136 GHz near 194.7 THz optical frequency. Therefore, the inter-modal frequency difference changes by approximately 4.5 GHz for each consecutive mode pair. On the other hand, the momentum difference of each mode pair is the same since the azimuthal mode order of the pairs is the same. \begin{figure}[!ht] \begin{adjustwidth}{-1in}{-1in} \makebox[\textwidth][c]{\includegraphics[width=1.3\textwidth]{figure4}} \centering \caption{(a) Measurement setup. Light from a tunable external cavity diode laser is split with a 50:50 coupler to prepare a device probing path and a reference path. An acousto-optic frequency shifter (AOFS) offsets the reference path by 100 MHz to enable heterodyne detection via a high speed photodetector (PD). An off-chip optical switch controls the directionality of the light entering the on-chip waveguide. The light coming out from the device is amplified using an erbium-doped fiber amplifier (EDFA) to compensate the loss from the grating coupler. A tunable band pass filter (BPF) is placed to filter out the extra noise produced by the EDFA. (b) Measured reflection coefficient (s$_{11}$ response) of the IDT using a vector network analyzer. (c) Measured optical transmission without acoustic drive. Triangles and circles represent optical modes of TE$_{00}$ and TE$_{10}$ families respectively. Mode pairs 1,2, and 3 are used for the intermodal scattering experiment (Fig.~5). } \label{fig4:mea} \end{adjustwidth} \end{figure} \vspace{12pt} Experimental measurements of the interband mode conversion are presented in Fig.~\ref{fig5:is}. We consider three cases corresponding to mode pairs 1, 2, 3 as marked in Fig.~\ref{fig4:mea}c -- which serve to illustrate both perfect and imperfect phase matching situations within the system. As mentioned above, these mode pairs all have identical separation in momentum-space. In this experiment, the RF frequency is fixed to 4.82 GHz where IDT can most efficiently actuate the acoustic wave. We sweep the optical probe across each pair of modes while measuring the power of transmitted carrier frequency component ($s_{out,0}$), down-converted Stokes sideband ($s_{out,-1}$), and up-converted anti-Stokes sideband ($s_{out,+1}$) (Fig.~\ref{fig5:is}i, ii, iii) simultaneously. The measured power is normalized against the input power to the waveguide ($s_{in}$). The RF drive power is set to 0 dBm so that the optical sidebands are small compared to the input light. We first examine sideband generation and reciprocity in the case where both phase matching and the frequency matching are well satisfied (Fig. 5a). Here, the optical resonance frequency of the TE$_{00}$ mode is lower than the resonance frequency of the TE$_{10}$ optical mode by 4.55 GHz, implying that the phase matching condition is satisfied in the backward direction for a forward directed phonon pump (as illustrated in Fig.~\ref{fig1:PM}d). Measurements show (Fig.~\ref{fig5:is}a,ii) that when each optical mode is probed in the backward direction, resonant sideband generation occurs with the assistance of the second optical mode. For laser detuning between 5-10 GHz (arbitrary reference) light from the waveguide primarily enters TE$_{00}$ mode resulting in a strong anti-Stokes sideband. Scattering to Stokes is strongly suppressed (45 dB smaller than the anti-Stokes) since there is no optical mode available in the resonator. Similarly, for laser detuning between 10-15 GHz, light from the waveguide primarily enters the TE$_{10}$ mode, and only the Stokes sideband is generated through resonant enhancement from the TE$_{00}$ optical mode. Based on the fitting of the experimental data, we obtained a -3 dB bandwidth (full width half maximum) of $\sim$1.14 GHz for this modulation effect, which is determined by the optical resonance linewidths. We can also quantify the intermodal optomechanical coupling coefficient as $\beta=0.209$ GHz/nm (details in Supplement \S S4). On the other hand, when light enters the system in the forward direction where the momentum matching condition is not satisfied, very small light scattering is observed (Fig.~\ref{fig5:is}a,iii). At the laser detuning where the maximum sideband amplitude is obtained in the backward direction, the sideband generated for forward probing is $\sim$15 dB smaller than that obtained for a backward laser probe. The measurement presented in Fig.~\ref{fig5:is}a,iii is magnified by 10x in order for the data trends to be observable. The residual scattering that is observed has the characteristic functional shape of conventional intramodal modulation occurring from optical path length change. While this effect should nominally be zero, there are practical constraints associated with non-zero overlap integral due to acoustic-optical misalignment and the curvature of the racetrack. \begin{figure}[!ht] \begin{adjustwidth}{-1in}{-1in} \makebox[\textwidth][c]{\includegraphics[width=1.15\textwidth]{figure5}} \centering \caption{ Experimental demonstration of non-reciprocal optomechanical modulation. Three cases corresponding to the optical mode pairs indicated in Fig.\ref{fig4:mea}c are presented. (a) Mode pair 1 corresponds to a near-perfect backward phase-matching condition. Here the optical modes are separated by $\omega_2 - \omega_1 = 4.55$ GHz (TE$_{00}$ mode is located at lower frequency) such that a 4.82 GHz acoustic mode has the correct momentum to enable phase matching. (b) Mode pair 2 corresponds to $\omega_2-\omega_1 = 8.01$ GHz corresponding to imperfect phase matching. (c) Mode pair 3 ($\omega_2-\omega_1 = -11.76$ GHz) has the TE$_{00}$ mode located at higher frequency; thus phase matching is satisfied in the forward direction. The top row (i) presents the transmitted signal at the optical carrier frequency component (Green), the second row (ii) presents measurements of Stokes (Red) and anti-Stokes (Blue) sidebands when the system is probed in the backward direction, and the third row (iii) presents sideband measurements for forward probing. Legends corresponding to all figures are presented in column (c). } \label{fig5:is} \end{adjustwidth} \end{figure} Next we examine the case of mode pair 2, where the optical modes have a larger (8.01 GHz) frequency separation but have identical momentum relationship (Fig.~\ref{fig5:is}b). Here, the modes are frequency-mismatched with respect to the acoustic pump frequency, resulting in much lower indirect intermodal scattering. For a backward optical probe entering this system, we observe two Lorentzian shapes in both Stokes and anti-Stokes sideband data, corresponding to some intermodal conversion even though the phonon stimulus is non-resonant. The larger Lorentzian signature appears due to scattering from the peak of the TE$_{00}$ resonance to off-resonance on the TE$_{10}$ mode. Conversely, the smaller Lorentzian signature corresponds to scattering from an off-resonance point on the TE$_{00}$ mode to the peak of the TE$_{10}$ mode. In the case of mode pair 3, opposite to mode pairs 1 and 2, the frequency of the TE$_{00}$ mode is lower than the TE$_{10}$ mode by 11.76 GHz. The phase matching in this case is thus only possible to satisfy in the opposite direction, i.e. for forward optical probing, corresponding to the situation shown in Fig.~\ref{fig1:PM}c. Measurements of light scattering for this mode pair (Fig.~\ref{fig5:is}c) clearly show greater intermodal conversion for forward input light, even though the frequency matching for the modes is poor. Backward optical probing exhibits much smaller sidebands due to the momentum mismatch. All the above measurements clearly showcase how the 2-dimensional acoustic pump can be used to satisfy frequency and momentum phase-matching in either forward or backward directions, while also producing the necessary transverse overlap integral. \vspace{12pt} In order to test the maximum mode conversion efficiency available with strong acoustic pumping, we perform an experiment using the phase-matched mode pair 1 (Fig.~\ref{fig5:is}a). The probe laser is applied in the backward, i.e. phase-matched, direction and is detuned from the TE$_{00}$ resonance at the offset where the maximum anti-Stokes sideband is generated. The RF power stimulus to the IDT is then swept from -2.8 dBm to 17.8 dBm while the anti-Stokes sideband strength is measured (Fig.~\ref{fig6:eff}). The solid line in Fig.~\ref{fig6:eff} is a theoretical curve produced using experimentally measured parameters (mode linewidths, coupling rates, optomechanical coupling coefficient) from fitting the data previously shown in Fig.~\ref{fig5:is}a. At low drive power, when the sideband amplitude is much smaller than the carrier intracavity field, the mode conversion efficiency linearly increases with the pump. In our experiment, we were able to achieve a maximum of 17\% sideband conversion efficiency on resonance when using 17.8~dBm RF input power. We calculate that the optomechanical coupling rate at this drive power is $G_{ph} = 0.609$ GHz. In a resonant structure, maximum sideband conversion is achievable at the equilibrium point where the amplitudes of the sideband and intracavity optical carrier field are matched (see Supplement \S S3) since the rate of up and down conversion are then equal. Pumping beyond this point, i.e. $\lvert G _{ph}\rvert^2 > \kappa_1\kappa_2 / 4$, pushes the system into the strong coupling regime where the coupled optical modes begin to split (discussion in Supplement \S S3). In this regime, for even stronger pumping, the sideband amplitude decreases while the optical carrier frequency component propagates nonreciprocally. In other words, the system begins to operate as a linear optical isolator. Unfortunately, due to IDT power limitations we were unable to reach the strong coupling regime in this experiment. However, partial verification of access to this regime is observable in Fig.~\ref{fig6:eff} since the experimental results follow precisely the curvature of the predicted relationship. We again emphasize that the solid line in Fig.~\ref{fig6:eff} is not a curve fit, but is a prediction of sideband field relative to the RF input. The conversion efficiency of this system could be improved tremendously by forming an acoustic waveguide (i.e. transverse acoustic resonator) by using free edge reflectors on both sides of the optical waveguide as demonstrated in~\cite{Shin2013}. \begin{figure}[!t] \begin{adjustwidth}{-1in}{-1in} \makebox[\textwidth][c]{\includegraphics[width=0.6\textwidth]{figure6}} \centering \caption{Modulation efficiency measured as a function of RF drive power for mode pair 1 (Fig.~5a). The probe laser is fixed on the resonance of TE$_{00}$ mode in the backward direction (phase matched direction). The theoretical curve (solid line) is calculated based on fitting the data from Fig. 5a, and predicts that the system enters the strong coupling regime when RF drive power goes beyond 21 dBm. Beyond this point the coupled optical modes exhibit splitting and sideband conversion reduces, essentially turning the device into a linear optical isolator} \label{fig6:eff} \end{adjustwidth} \end{figure} \vspace{12pt} The nanophotonic system that we have presented operates as a frequency shifting isolator in which light propagating in one direction experiences a fixed frequency offset, while in the opposite direction light is simply absorbed. This type of non-reciprocal device can play an important role in compact atomic timekeeping~\cite{Knappe:04,Esnault:13}, cold-atom inertial navigation~\cite{Gustavson1997}, and gravimetry~\cite{Peters:01} in which magnet-induced Zeeman shifts and light shifts ~\cite{Blanshan:05} are extremely undesirable. Moreover, the operational optical wavelength and pumping strategy of this system are entirely lithographically defined, which ensures rapid adaptability to other wavelength regimes. More broadly, this acoustic pumping technique and the level of performance achieved indicates a clear path towards foundry-compatible integration of linear isolators, circulators, and non-reciprocal phase shifters, that overcome the fundamental challenges currently plaguing state of the art non-magnetic non-reciprocal devices. This approach can also potentially introduce new non-reciprocal functionality to chip-scale photonics including frequency shifters \cite{Fan2016} and dynamic converters for mode division multiplexing \cite{Luo2014}. \vspace{24pt} \FloatBarrier \section*{Methods} \subsection*{Device fabrication} \noindent We directly deposited c-axis oriented 350 nm film of aluminum nitride (AlN) by RF sputtering onto a silicon wafer. The AlN layer quality was confirmed through X-ray rocking curve measurement and stress measurement. The measured full width at half maximum from the rocking curve was 1.78 degree. The average stress of the AlN film was measured as -3.8 MPa (in compression). The devices were patterned through three electron-beam lithography steps. First, the AlN waveguide and racetrack resonator were patterned using e-beam lithography (Raith E-line) on ZEP-520 resist (ZEON corporation), followed by etching of 200 nm AlN using Cl$_2$ based inductively coupled plasma reactive ion etching (ICP-RIE). Next, release holes and the acoustic edge reflector were patterned using e-beam lithography on double spin coated ZEP-520 resist, followed by complete etch back of the 350 nm AlN through ICP-RIE. Finally, the interdigitated transducers (IDTs) were patterned using e-beam lithography on PMMA photoresist after which 60 nm of Al was deposited using an e-beam evaporator. A subsequent lift-off process defines the aluminum IDTs. Finally, a gas-phase isotropic silicon etch was performed using XeF$_2$ to release the device. \subsection*{Mechanical transduction and electronic characterization} The IDT is used for exciting Lamb wave acoustic modes on the AlN piezoelectric substrate. RF signals are provided to the IDT via a ground-signal-ground (GSG) probe (Cascade Microtech model ACP 40). The transduction efficiency of the IDT was characterized using the standard approach using a vector network analyzer (Keysight model E5063A) through measurement of the reflection coefficient (s$_{11}$). Details on this measurement are provided in the Supplement \S S4. The vector network analyzer was calibrated using an on-chip impedance calibration standard to remove any effect of cables and the GSG probe. \subsection*{Optical measurements} For performing measurements of intermodal light scattering, the experimental setup shown in Fig.~\ref{fig4:mea}a was used. An optical switch (Thorlab model OSW22-1310E) was used to control the light propagation direction, either forward or backward through the optical waveguide. We used a 1520-1570 nm tunable external cavity diode laser (New Focus model TLB-6728-P, $<$50 kHz instantaneous linewidth) to generate the optical probe. The laser source is split 50:50 into a device path and a reference path for performing heterodyne detection of the scattered light spectrum (details in Supplement \S S2). Light in the device path was coupled to the on-chip waveguide through grating couplers. An erbium-doped fiber amplifier (EDFA) was used to amplify the light exiting the waveguide to facilitate detection. Light in the reference arm was provided a predetermined offset (100 MHz) using an in-fiber acousto-optic frequency shifter (AOFS, Brimrose model AMF-100-1550). The beat note between the reference light and the scattered light was measured by the high frequency photodetector (Newport model 1554 photoreceiver). \section*{Acknowledgements} This material is based on research sponsored by Air Force Research Laboratory (AFRL) under agreement number FA9453-16-1-0025. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of Air Force Research Laboratory (AFRL) and (DARPA) or the U.S. Government. \newpage \bibliographystyle{myIEEEtran} \section{Table of Symbols} \newpage \section{System Model } \subsection{Dynamics of Traveling Acousto-optical Interaction} Our system consists of two optical modes in a racetrack resonator (quasi-TE$_{10}$ ($\omega_1$, $k_1$) and quasi-TE$_{00}$ ($\omega_2$, $k_2$)) that are coupled by means of an acoustic pump ($\Omega$, $q$) (Fig. \ref{fig:s1}, \ref{fig:s2}). The directionality of the acoustic pump is pre-selected via the electromechanical driving stimulus. With respect to this pump, we define "forward" as the direction in which the light and the acoustic pump are co-propagating, and "backward" as the counter-propagating direction. The interaction Hamiltonian categorized to the forward and backward direction can be expressed as: \begin{align} H_{\text{int}} = \hbar (\beta_f \hat{a}_1 \hat{a}_2^{\dagger} \hat{b} + \beta^*_f \hat{a}_1^{\dagger} \hat{a}_2 \hat{b}^{\dagger}) + \hbar (\beta_b \hat{a}_1 \hat{a}_2^{\dagger} \hat{b}^{\dagger} + \beta^*_b \hat{a}_1^{\dagger} \hat{a}_2 \hat{b}) \end{align}\label{eq:s1} \noindent where $\beta_f=\beta\,\delta(k_1-k_2+q)$ and $\beta_b=\beta\,\delta(-k_1+k_2+q)$ are the optomechanical coupling coefficients including the phase matching conditions in the forward and backward directions respectively. Here, $\delta ()$ is the Kronecker delta function, $\hat{a}_1^{\dagger} (\hat{a}_1)$ and $\hat{a}_2^{\dagger}(\hat{a}_2)$ are the creation (annihilation) operators for the TE$_{10}$ and TE$_{00}$ modes respectively, and $\hat{b}^{\dagger}(\hat{b})$ is for the acoustic pump~\cite{Agrawal2013, bowen2015quantum}. In addition, we include the RF-electromechanically driven acoustic field ($s_{RF}$). The input acoustic field is defined as $|s_{RF}|^2 = \eta_{\text{a}} P_{RF}/ \hbar \Omega$ where $P_{RF}$ is the RF driving power, $\Omega$ is the RF driving frequency, $\eta_a$ is the electromechanical coupling, and $\Gamma$ is the mechanical loss rate. An externally provided laser (s$_{in}$) is coupled to the TE$_{10}$ and TE$_{00}$ modes through the external coupling rates $\kappa_{ex1}$ and $\kappa_{ex2}$. As above, the input optical field is defined as $|s_{in}|^2 = P_{in}/ \hbar \omega_l$ where $P_{in}$ is the input laser power and $\omega_l$ is the frequency of carrier laser. Therefore, the total effective Hamiltonian for the system can be written as~\cite{Bochmann2013}: \begin{align} H_{\text{eff}} & = \hbar \omega_1 \hat{a}_1^{\dagger}\hat{a}_1 + \hbar \omega_2 \hat{a}_2^{\dagger} \hat{a}_2 + \hbar \omega_m \hat{b}^{\dagger} \hat{b} \nonumber\\&+ \hbar\, (\beta_f \hat{a}_1 \hat{a}_2^{\dagger} \hat{b} + \beta^*_f \hat{a}_1^{\dagger} \hat{a}_2 \hat{b}^{\dagger}) + \hbar \,(\beta_b \hat{a}_1 \hat{a}_2^{\dagger} \hat{b}^{\dagger} + \beta^*_b \hat{a}_1^{\dagger} \hat{a}_2 \hat{b}) \nonumber \\ &+ i \hbar \sqrt{\kappa_{ex1}}\, (\hat{a}_1^{\dagger} s_{in} e^{-i\omega_l t } - \hat{a}_1 s_{in}^{*} e^{i\omega_l t } ) +i \hbar \sqrt{\kappa_{ex2}}\, (\hat{a}_2^{\dagger} s_{in} e^{-i\omega_l t } - \hat{a}_2 s_{in}^{*} e^{i\omega_l t } ) \nonumber\\ &+ i\hbar \sqrt{\Gamma} \,(\hat{b}^{\dagger}s_{RF} e^{-i\Omega t} - \hat{b} s_{RF}^* e^{i\Omega t}) \label{eq:s2} \end{align} Working in a frame rotating with the RF driving frequency ($\Omega$), we write the equations of motion for the mechanical and optical modes by means of Heisenberg-Langevin equation: \begin{subequations} \begin{align} \dot{\hat{b}} = &-i(\omega_m - \Omega) \hat{b} - \frac{\Gamma}{2} \hat{b} - i\beta_f^* \hat{a}_1^\dagger \hat{a}_2 e^{i \Omega t} - i\beta_b \hat{a}_1 \hat{a}_2^{\dagger} e^{i \Omega t}+\sqrt{\Gamma}\,s_{RF}\\ \dot{\hat{a}}_1 = & -i\omega_1\hat{a}_1 - \frac{\kappa_1}{2} \hat{a}_1 - i\beta_f^* \hat{a}_2 \hat{b}^\dagger e^{i \Omega t} - i\beta_b^* \hat{a}_2 \hat{b} e^{-i \Omega t} +\sqrt{\kappa_{ex1}}\,s_{in}e^{-i\omega_{l} t}\\ \dot{\hat{a}}_2 = & -i\omega_2\hat{a}_2 - \frac{\kappa_2}{2} \hat{a}_2 - i\beta_f \hat{a}_1 \hat{b} e^{- i \Omega t} - i\beta_b \hat{a}_1 \hat{b}^{\dagger} e^{i \Omega t} +\sqrt{\kappa_{ex2}}\,s_{in}e^{-i\omega_{l} t} \end{align}\label{eq:s3} \end{subequations} \noindent where $\kappa_1$ ($\kappa_2$) are the optical loss rates of the TE$_{10}$ (TE$_{00}$) modes. We will now distill the above general equations for the two specific cases in which light enters from the forward and backward directions. \subsection{Scattering Process in the Forward Direction (Co-propagating Direction)} \begin{figure}[t!] \makebox[\textwidth][c]{\includegraphics[width=0.6\textwidth]{s_figure1}} \centering \caption{(a) Intermodal scattering illustrated in frequency-momentum space. In the case where the carrier laser is presented to the TE$_{10}$ mode in the forward direction, the anti-Stokes sideband is resonantly enhanced by the TE$_{00}$ resonance mode. The Stokes sideband is suppressed since there is no optical mode available. (b) The intermodal scattering process illustrated in frequency domain. Due to the energy-momentum phase matching condition only the anti-Stokes sideband appears, which is located at the frequency $\omega_l+\Omega$.} \label{fig:s1} \end{figure} We treat the equations of motion in Eq.~(\ref{eq:s3}) classically by making substitutions as follows: $\hat{a}_1, (\hat{a}_2) \rightarrow a_1$ ($a_2$) and $ \hat{b} \rightarrow u$. Thus $a_1$ and $a_2$ are the amplitudes of the TE$_{10}$ and TE$_{00}$ intracavity fields respectively and $u$ is the steady state amplitude of the acoustic field under the non-depleted RF pump approximation. We consider the situation illustrated in Fig.~\ref{fig:s1}, where phase matching only occurs for forward propagating light ($k_1-k_2+q = 0$). Here, the non-phase matched terms can be neglected, i.e. the term with $\beta_b$ in Eq.~\ref{eq:s3}. We can also drop $\delta ()$ in the forward intermodal coupling coefficient and simply use $\beta$ as the optomechanical coupling rate. The TE$_{10}$ mode can only convert into the TE$_{00}$ mode through anti-Stokes scattering. Similarly, the TE$_{00}$ mode can only convert into the TE$_{10}$ mode through Stokes scattering. Thus, we can rewrite Eq.~\ref{eq:s3} as: \begin{subequations} \begin{align} \dot{a_1} = & -\frac{\kappa_1}{2} a_1 - i\omega_1 a_1 - i\beta^*u^* a_2 e^{i\Omega t}+\sqrt{\kappa_{ex1}}\,s_{in}e^{- i\omega_l t}\\ \dot{a_2} = & -\frac{\kappa_2}{2} a_2 - i\omega_2 a_2 - i\beta u a_1 e^{-i\Omega t}+\sqrt{\kappa_{ex2}}\,s_{in}e^{- i\omega_l t} \end{align} \label{eq:s4} \end{subequations} The mode amplitudes $a_1$ and $a_2$ can be now expressed through Fourier decomposition of the sidebands created by the intermodal scattering: \begin{subequations} \begin{align} a_1 = &\sum_{n=-\infty}^{\infty} a_{1,n} e^{- i(\omega_l + n\Omega)t} ~=~a_{1,-1}e^{ -i (\omega_l-\Omega)t} + a_{1,0}e^{ - i\omega_lt}\\ a_2 = &\sum_{n=-\infty}^{\infty} a_{2,n} e^{- i(\omega_l + n\Omega)t} ~=~a_{2,0} e^{ - i\omega_lt}+a_{2,+1}e^{ - i(\omega_l + \Omega)t} \end{align} \label{eq:5} \end{subequations} \noindent where n indicates the sideband order. Here, we adopted the following convention: $a_{i,0}$ is the intracavity field at the carrier frequency, while $a_{i,-1}$ ($a_{i,+1}$) are the intracavity fields at the Stokes (anti-Stokes) shifted frequency for the $i$th order mode. Thus, $a_{1,0}$ ($a_{2,0}$) are the intracavity field amplitude for TE$_{10}$ (TE$_{00}$) mode at the carrier frequency i.e. the frequency of the source laser. $a_{1,-1}$ is the Stokes sideband amplitude for the TE$_{10}$ mode. $a_{2,+1}$ is the anti-Stokes sideband amplitude for the TE$_{00}$ mode. The remaining sidebands are suppressed due to the phase matching condition, i.e. absence of suitable optical modes. The intracavity field amplitudes $a_{1,0}$, $a_{2,0}$, $a_{1,-1}$ and $a_{2,+1}$ are obtained by substituting Eq.~(\ref{eq:5}) to Eq.~(\ref{eq:s4}). \begin{align} a_{1,0} &=\frac{\sqrt{\kappa_{ex1}}\,s_{in}-i\beta^*u^*a_{2,+1}}{\kappa_1 /2 - i\Delta_1} &\qquad\text{and}\qquad& a_{2,0} = \frac{\sqrt{\kappa_{ex2}}\,s_{in}-i\beta u a_{1,-1}}{\kappa_2 /2 - i\Delta_2} \nonumber\\ a_{1,-1} &=\frac{-i\beta^* u^* a_{2,0}}{\kappa_1 /2 - i(\Delta_1-\Omega)} &\qquad\text{and}\qquad& a_{2,+1} = \frac{-i\beta u a_{1,0}}{\kappa_2 /2 - i(\Delta_2+\Omega)} \label{eq:6} \end{align} where the optical detunings are $\Delta_1 = \omega_l - \omega_1$ and $\Delta_2 = \omega_l - \omega_2$. In the solutions for the carrier frequency components ($a_{1,0}$ and $a_{2,0}$), the first term in the numerator is the input field coupled from the optical waveguide and the second term is the field scattered back from the corresponding sideband. The sideband intracavity fields can be finally expressed in terms of the input laser $(s_{in})$ as follows: \begin{subequations} \begin{align} a_{1,0} &= \frac{\sqrt{\kappa_{ex1}} \left( \kappa_2/2 - i(\Delta_2+\Omega) \right) }{\left(\kappa_2/2 - i(\Delta_2+\Omega)\right)\left(\kappa_1/2 - i\Delta_1\right)+\lvert \beta \rvert^2 \lvert u \rvert^2} s_{in}, \\ a_{2,0} &= \frac{\sqrt{\kappa_{ex2}}(\kappa_1 /2 - i(\Delta_1-\Omega))}{(\kappa_1/ 2 - i(\Delta_1-\Omega))(\kappa_2/2 - i\Delta_2)+\lvert \beta \rvert^2 \lvert u \rvert^2} s_{in}, \\ a_{1,-1} &=\frac{-i\beta^* u^*\sqrt{\kappa_{ex2}} }{(\kappa_1 /2 - i(\Delta_1-\Omega))(\kappa_2 /2 - i\Delta_2)+\lvert \beta \rvert^2 \lvert u \rvert^2} s_{in}, \\ a_{2,+1} &=\frac{-i\beta u\sqrt{\kappa_{ex1}}}{(\kappa_2 /2 - i(\Delta_2+\Omega))(\kappa_1 /2 - i\Delta_1)+\lvert \beta \rvert^2 \lvert u \rvert^2} s_{in}. \end{align} \label{eq:7} \end{subequations} When the optomechanical coupling rate is much smaller than the optical loss rate ($\lvert \beta \rvert \lvert u \rvert << \sqrt{\kappa_1\kappa_2}/2$), e.g. for small acoustic drive ($u$), Eq.~\ref{eq:6} can be simplified to: \begin{subequations} \begin{align} a_{1,0} & =\frac{\sqrt{\kappa_{ex1}}}{\kappa_1 /2 - i\Delta_1} s_{in}, \\ a_{2,0} & =\frac{\sqrt{\kappa_{ex2}}}{\kappa_2 /2 - i\Delta_2} s_{in}, \\ a_{1,-1} & =\frac{-i\beta^* u^*\sqrt{\kappa_{ex2}}}{(\kappa_1 /2 - i(\Delta_1-\Omega))(\kappa_2 /2 - i\Delta_2)} s_{in}, \\ a_{2,+1} & =\frac{-i\beta u\sqrt{\kappa_{ex1}}}{(\kappa_2 /2 - i(\Delta_2+\Omega))(\kappa_1 /2 -i\Delta_1)} s_{in} \end{align} \end{subequations} By means of input output theorem, we obtain the expression for the output spectrum ($s_{out}$) from the waveguide containing carrier ($s_{out,0}$), Stokes ($s_{out,-1}$), and anti-Stokes ($s_{out,+1}$) frequency components: \begin{align} s_{out}= s_{out,0}+ s_{out,+1}e^{-i\Omega t}+ s_{out,-1}e^{i\Omega t} \label{eq:9} \end{align} where \begin{subequations} \begin{align} s_{out,0} & =s_{in}-\sqrt{\kappa_{ex1}}\,a_{1,0}-\sqrt{\kappa_{ex2}}\,a_{2,0}\\ s_{out,-1} & =-\sqrt{\kappa_{ex1}}\,a_{1,-1} \label{eq:s10b}\\ s_{out,+1} & =-\sqrt{\kappa_{ex2}}\,a_{2,+1} \end{align} \end{subequations} These equations are used to plot the theoretical curves in Fig.~5 of the main manuscript. \subsection{Scattering Process in the Backward Direction (Counter-propagating Direction)} \begin{figure}[b!] \makebox[\textwidth][c]{\includegraphics[width=0.65\textwidth]{s_figure2}} \centering \caption{(a) Intermodal scattering illustrated in frequency-momentum space. In the case where the carrier laser is presented to the TE$_{10}$ mode in the backward direction, the Stokes sideband is resonantly enhanced by the TE$_{10}$ mode. The anti-Stokes sideband is suppressed since there is no optical mode that allows scattering. (b) The intermodal scattering illustrated in frequency domain. Due to the phase matching condition only the Stokes sideband appears, which is located at the frequency $\omega_l-\Omega$.} \label{fig:s2} \end{figure} Let us now consider the case shown in Fig.~\ref{fig:s2} where the light propagating direction is in the backward direction. Due to the backward phase matching condition ($-k_1+k_2+q = 0$), as opposed to the scattering in the forward direction, the TE$_{10}$ (TE$_{00}$) modes can only convert into the TE$_{00}$ (TE$_{10}$) modes through Stokes (anti-Stokes) scattering. When the resonance frequency of the TE$_{10}$ mode is higher than the TE$_{00}$ mode, the phase matching condition is satisfied in the backward direction. Thus, in this case, the equations of motion in Eq.~\ref{eq:s3} are simplified to: \begin{subequations} \begin{align} \dot{a_1} = & -\frac{\kappa_1}{2} a_1 - i\omega_1 a_1 - i\beta^*u a_2 e^{-i\Omega t}+\sqrt{\kappa_{ex1}}\,s_{in}e^{- i\omega_l t}\\ \dot{a_2} = & -\frac{\kappa_2}{2} a_2 - i\omega_2 a_2 - i\beta u^* a_1 e^{i\Omega t}+\sqrt{\kappa_{ex2}}\,s_{in}e^{- i\omega_l t} \end{align} \label{eq:4} \end{subequations} The composited amplitudes $a_1$ and $a_2$ can be written as: \begin{subequations} \begin{align} a_1 = &a_{1,0}e^{ -i \omega_l t} + a_{1,+1}e^{ - i(\omega_l+\Omega)t}\\ a_2 = &a_{2,-1} e^{ - i(\omega_l-\Omega)t}+a_{2,-1}e^{ - i\omega_l t} \end{align} \label{eq:13} \end{subequations} where $a_{1,+1}$ is the anti-Stokes sideband amplitude in the TE$_{10}$ mode, and $a_{2,-1}$ is the Stokes sideband amplitude in the TE$_{00}$ mode. \begin{align} a_{1,0} &=\frac{\sqrt{\kappa_{ex1}}\,s_{in}-i\beta^*ua_{2,-1}}{\kappa_1 /2 - i\Delta_1} &\qquad\text{and}\qquad& a_{2,0} = \frac{\sqrt{\kappa_{ex2}}\,s_{in}-i\beta u^* a_{1,+1}}{\kappa_2 /2 - i\Delta_2} \nonumber\\ a_{1,+1} &=\frac{-i\beta^* u a_{2,0}}{\kappa_1 /2 - i(\Delta_1+\Omega)} &\qquad\text{and}\qquad& a_{2,-1} = \frac{-i\beta u^* a_{1,0}}{\kappa_2 /2 - i(\Delta_2-\Omega)} \label{eq:s13} \end{align} The sideband intracavity fields can be expressed in terms of the input laser $(s_{in})$ as follows: \begin{subequations} \begin{align} a_{1,0} &= \frac{\sqrt{\kappa_{ex1}} \left( \kappa_2/2 - i(\Delta_2-\Omega) \right) }{\left(\kappa_2/2 - i(\Delta_2-\Omega)\right)\left(\kappa_1/2 - i\Delta_1\right)+\lvert \beta \rvert^2 \lvert u \rvert^2} s_{in}, \\ a_{2,0} &= \frac{\sqrt{\kappa_{ex2}}(\kappa_1 /2 - i(\Delta_1+\Omega))}{(\kappa_1/ 2 - i(\Delta_1+\Omega))(\kappa_2/2 - i\Delta_2)+\lvert \beta \rvert^2 \lvert u \rvert^2} s_{in}, \\ a_{1,+1} &=\frac{-i\beta^* u\sqrt{\kappa_{ex2}} }{(\kappa_1 /2 - i(\Delta_1+\Omega))(\kappa_2 /2 - i\Delta_2)+\lvert \beta \rvert^2 \lvert u \rvert^2} s_{in}, \\ a_{2,-1} &=\frac{-i\beta u^*\sqrt{\kappa_{ex1}}}{(\kappa_2 /2 - i(\Delta_2-\Omega))(\kappa_1 /2 - i\Delta_1)+\lvert \beta \rvert^2 \lvert u \rvert^2} s_{in}. \end{align} \end{subequations} When the optomechanical coupling rate is much smaller than the optical loss rate ($\lvert \beta \rvert \lvert u \rvert << \sqrt{\kappa_1\kappa_2}/2$), e.g. for small acoustic drive ($u$), Eq.~\ref{eq:s13} can be simplified to: \begin{subequations} \begin{align} a_{1,0} & =\frac{\sqrt{\kappa_{ex1}}}{\kappa_1 /2 - i\Delta_1} s_{in}, \\ a_{2,0} & =\frac{\sqrt{\kappa_{ex2}}}{\kappa_2 /2 - i\Delta_2} s_{in}, \\ a_{1,+1} & =\frac{-i\beta^* u\sqrt{\kappa_{ex2}}}{(\kappa_1 /2 - i(\Delta_1+\Omega))(\kappa_2 /2 - i\Delta_2)} s_{in}, \\ a_{2,-1} & =\frac{-i\beta u^*\sqrt{\kappa_{ex1}}}{(\kappa_2 /2 - i(\Delta_2-\Omega))(\kappa_1 /2 -i\Delta_1)} s_{in} \end{align} \label{eq:8} \end{subequations} Similar to the output from the previous section, the output spectrum ($s_{out}$) from the waveguide contains the carrier ($s_{out,0}$), Stokes ($s_{out,-1}$), and anti-Stokes ($s_{out,+1}$) frequency components: \begin{align} s_{out}= s_{out,0}+ s_{out,+1}\,e^{-i\Omega t}+ s_{out,-1}\,e^{i\Omega t} \label{eq:9} \end{align} where \begin{subequations} \begin{align} s_{out,0} & =s_{in}-\sqrt{\kappa_{ex1}}\,a_{1,0}-\sqrt{\kappa_{ex2}}\,a_{2,0}\\ s_{out,-1} & =-\sqrt{\kappa_{ex2}}\,a_{2,-1}\\ s_{out,+1} & =-\sqrt{\kappa_{ex1}}\,a_{1,+1} \label{eq:s17} \end{align} \end{subequations} Again, these equations are used to plot the theoretical curves in Fig. 5 of the main manuscript. \section{Measurement of Optical Spectra} \begin{figure}[t!] \makebox[\textwidth][c]{\includegraphics[width=0.9\textwidth]{s_figure3}} \centering \caption{Measurement setup utilizing optical heterodyne detection. The light from the optical source is split into the reference arm and the device arm. The frequency of the light in the reference arm is shifted by the AOFS by predetermined offset $\Omega_r$. The beat notes of the frequency shifted reference with the carrier, Stokes, and anti-Stokes from the device under test (DUT) are measured by the photodetector and have frequency components $\Omega_r$, $\Omega+\Omega_r$, and $\Omega-\Omega_r$ respectively. } \label{fig:meas} \end{figure} In order to measure the amplitude of the Stokes and anti-Stokes sidebands separately, we utilize optical heterodyne detection with assistance of an acousto-optic frequency shifter (AOFS). The detailed experimental setup is shown in Fig.\ref{fig:meas}. Considering the frequency up-shifted reference signal ($s_r e^{-i\Omega_r t}$) generated from the AOFS in the reference arm, the optical output spectrum at the photodector can be expressed as: \begin{align} s_{out}= s_{out,0}+ s_{out,+1}\, e^{-i\Omega t}+ s_{out,-1}\,e^{i\Omega t} + s_r \, e^{-i\Omega_r t} \label{eq:10} \end{align} The resulting electronic signals from the photodetector are beat notes of the optical reference signal with the carrier, Stokes, and anti-Stokes signals, and occur at $\Omega_r$, $\Omega+\Omega_r$, and $\Omega-\Omega_r$ respectively. The powers of each frequency component can be independently measured using an electronic spectrum analyzer. Solving Eq.~(\ref{eq:10}) for each frequency component while considering the photodetector gain, the RF outputs are expressed as: \begin{equation} \begin{split} P_{C,\Omega_r}&=g_{pd}\lvert s_r \rvert^2 \lvert s_{out,0} \rvert^2\\ P_{S,\Omega+\Omega_r}&=g_{pd}\lvert s_r \rvert^2 \lvert s_{out,-1} \rvert^2\\ P_{AS,\Omega-\Omega_r}&=g_{pd}\lvert s_r \rvert^2 \lvert s_{out,+1} \rvert^2 \end{split} \label{eq:11} \end{equation} \noindent where $P_{C,\Omega_r}$, $P_{S,\Omega+\Omega_r}$, and $P_{AS,\Omega-\Omega_r}$ are the carrier, Stokes, and anti-Stokes RF power outputs from the photodetector, respectively. Here, $g_{pd}$ is the lumped proportionality constant including photodetector gain. Since the acousto-optic scattering process is linearly proportional to the input light power, the optical power from the output waveguide should normalize to the input light power: \begin{align*} P_{in}=g_{pd}\lvert s_r \rvert^2 \lvert s_{in} \rvert^2 \end{align*} Dividing the measured power by the input power, the normalized power coefficients are given by: \begin{equation} \begin{split} \bar{P}_{C,\Omega_r}&=\left| \frac{s_{out,0}}{s_{in}} \right|^2\\ \bar{P}_{S,\Omega+\Omega_r}&=\left| \frac{s_{out,-1}}{s_{in}} \right|^2\\ \bar{P}_{AS,\Omega-\Omega_r}&=\left| \frac{s_{out,+1}}{s_{in}} \right|^2 \end{split} \label{eq:12} \end{equation} We use these coefficients to quantify the performance of this mode converting modulator. \section{Theoretical Limit of Sideband Amplitude} We now wish to theoretically quantify the maximum sideband amplitude achievable in this system. Let us recall the intracavity Stokes sideband field amplitude (Eq.~\ref{eq:s10b}) for the TE$_{10}$ mode. Here, we introduce the phonon enhanced optomechanical coupling rate $G_{ph}=\beta u$. The Stokes sideband from the waveguide $s_{out,-1}$ is: \begin{align} s_{out,-1}&=\sqrt{\kappa_{ex1}}\,\left( \frac{-iG_{ph}^*\sqrt{\kappa_{ex2}} }{(\kappa_1 /2 - i(\Delta_1-\Omega))(\kappa_2 /2 - i\Delta_2)+ \lvert G_{ph} \rvert^2}\right) s_{in} \end{align} \noindent From the above equation, we can see that the sideband amplitude is maximized when the frequency matching between the modes is perfect ($\omega_1-\omega_2+\Omega = 0$) and the carrier is located on the resonance of the TE$_{00}$ mode. As a result, the imaginary parts in the denominator vanish and the equation can be simplified to: \begin{align} s_{out,-1}= \frac{-iG_{ph}^*\sqrt{\kappa_{ex1}\kappa_{ex2}} }{\kappa_1\kappa_2 /4+ \lvert G_{ph} \rvert^2} s_{in} \label{eq:s18} \end{align} To investigate the thoeretical limit of sideband amplitude with respect to phonon-enhanced optomechanical coupling $G_{ph}$, we calculate the maximum point where $G_{ph}$ satisfies $\frac{\partial s_{out,-1}}{\partial G} = 0$, which is: \begin{align} G_{ph} = \frac{\sqrt{\kappa_1\kappa_2}}{2} \label{eq:s19} \end{align} \noindent At this pump level, the calculated maximum sideband field amplitude becomes: \begin{equation} s_{out,-1}\rvert_{max}=\sqrt{\frac{\kappa_{ex1}\kappa_{ex2}}{\kappa_1\kappa_2}} \, s_{in} \label{eq:s20} \end{equation} This is the point where the photon energy exchange between the two optical modes $a_1$ and $a_2$ is in equilibrium. From the equation, we can see that if there is no intrinsic photon loss in the resonator, which means that the external couplings are only photon loss mechanism ($\kappa_{ex1}=\kappa_1, \kappa_{ex2}=\kappa_2$), 100\% of light can be transfered to the sideband. In case where both optical modes are critically coupled to the waveguide ($\kappa_{ex1}=\kappa_1/2, \kappa_{ex2}=\kappa_2/2$), the maximum sideband amplitude is 25\% of carrier power (50\% of carrier field). The rest of power is dissipated in the resonator. If the acoustic pump increases beyond this point, the optical modes split, i.e the system enters the strong coupling regime (see Supplement \S S5). \section{Optomechanical Coupling Coefficient} \begin{figure}[b!] \makebox[\textwidth][c]{\includegraphics[width=0.5\textwidth]{s_figure4}} \centering \caption{Reflection (s$_{11}$) measurement at IDT using a calibrated vector network analyzer (VNA). The S$_{0}$ Lamb acoustic wave is efficiently actuated at 4.82 GHz leading to a reduction in the $s_{11}$ parameter (reflection). $\eta_a$ is the efficiency of conversion of electrical power to acoustic power. $\eta_r$ is the power loss at the IDT through parasitic capacitance. } \label{fig:WG1} \end{figure} In order to quantify the intermodal optomechanical coupling coefficient ($\beta$) from the experimental data, we employ the model used in \cite{Li:15}. From the fitting of experimental data shown in Fig.5a (main manuscript), we obtain $G_{ph}=\lvert\beta\rvert \lvert u\rvert$ = 0.0589 GHz when 0 dBm of RF input power is supplied. Since, $\lvert\beta\rvert$ and $\lvert u\rvert$ cannot be independently determined from our fitting model, the displacement $u$ associated with the acoustic wave is estimated with the assistance of finite element simulation (COMSOL). The displacement associated with the acoustic pump for a given RF power is calculated using: \begin{align} u=\sqrt{\frac{2\pi \eta_aP_{RF}}{\gamma W \Omega}} \label{eq:15} \end{align} \noindent where W is the IDT aperture, and $\gamma$ is the proportionality factor relating $u^2$ and acoustic energy $\gamma=\frac{1}{Wu^2} \int_{x,y,z=0}^{x,y,z=\Lambda,W,\infty} U(x,y,z)dxdydz$, $\Lambda$ is the wavelength of acoustic pump, and $U$ is the total mechanical energy density of mechanical mode. The RF power transferred to the acoustic pump power is calculated using the $s_{11}$ parameter measurement with an electronic VNA. As shown in Fig.~\ref{eq:s4}, $\eta_a=~3.9\%$, implying that 3.9\% of the RF power is transferred to the acoustic power. $\gamma$ of the S$_0$ acoustic mode generated by the IDTs is calculated using FEM simulation (=$2.55\times 10^{11} J/m^3 $). From the fitting of Fig.~5a, the calculated $\beta$ is found to be 0.204 GHz/nm. The calculated optomechanical coupling coefficient $\beta$ quantifies how efficiently the acoustic wave can couple the two optical modes. Note that the estimated displacement $u$ in the above model is the acoustic response of the IDT, which is not the actual amplitude of the acoustic pump traveling in the waveguide. This is a limitation since there exist multiple sources of loss such as intrinsic acoustic loss of the material or reflections from the waveguide ridge, that do not permit a better estimate. \section{Producing an Optical Isolator} \begin{figure}[b!] \makebox[\textwidth][c]{\includegraphics[width=0.9\textwidth]{s_figure6}} \centering \caption{Conceptual schematic of optical isolator and 3D plot of light transmission spectrum respect to optomechanical coupling rate ($G_{ph}$) and TE$_{10}$ detuning ($\Delta_1$). (a) In the forward direction (phase matched direction), the optical mode is split and the transmission approaches 100 \% on resonance ($\Delta_1 = 0$) for large optomechanical coupling. (b) In the backward direction (non-phase matched direction) the optical mode shape remains the same so that light is absorbed by the resonator.} \label{fig:s6} \end{figure} An optical isolator that blocks light in one direction but allows light transmission in the other direction is a canonical example of a non-reciprocal device (Fig.~\ref{fig:s6}). Here, we propose a theoretical model to build a magnetless optical isolator by simply changing few design parameters of our device. Let us examine at the transmission spectrum of the TE$_{10}$ mode in the forward phase matched case (Eq.~\ref{eq:9}). We assume that the mechanical driving frequency and the frequency separation between the two optical modes are the same ($\omega_2 - \omega_1 = \Omega$) so that the intermodal scattering can most efficiently take place. We also assume that the sideband is in the fully resolved regime ($\Omega>>\kappa_1/2~\text{and}~\kappa_2/2 $ ). The power transmission from the waveguide in the forward direction can be now expressed as: \begin{align} \lvert s_{out} \rvert^2 = \lvert s_{in} - \sqrt{\kappa_{ex1}} a_{1,0} +\sqrt{\kappa_{ex2}} a_{2,+1} e^{-i\Omega t} \rvert^2 \end{align} We note that $a_{2,0}$ and $a_{1,-1}$ terms approach zero when $\Delta_1 << \omega_2 - \omega_1$. Here, we make the TE$_{10}$ mode critically coupled to the waveguide ($\kappa_{ex1} = \kappa_1/2 =$ 1 GHz) so that there is no transmission through the waveguide. We also assume that the optical loss rate of TE$_{00}$ ($\kappa_2$) is 1 GHz. Using this equation, we plot the forward and backward transmission spectrum (Fig.~\ref{fig:s6}) with respect to the optical detuning of the laser from the TE$_{10}$ mode ($\Delta_1$). Without optomechanical coupling ($G_{ph}$ = 0), the backward and forward transmissions exhibit identical Lorentzian shape transmission absorbing all the light on the resonance of the TE$_{10}$ mode ($\Delta_1=0$) as shown in Fig.~\ref{fig:s6}. When the optomechanical coupling enters the strong coupling regime ($ G_{ph}\,>\,\sqrt{\kappa_1\kappa_2}/2$), the TE$_{10}$ resonance mode begins to split (Fig.~\ref{fig:s6}a). With sufficient acoustic power, the system becomes completely transparent at zero detuning only in the forward direction. In the backward direction, where the phase matching condition is not satisfied, the TE$_{10}$ resonance mode remains the same (Fig.~\ref{fig:s6}b) so that all the light is absorbed by the resonator. \section{Producing Acousto-optic Frequency Shifter (AOFS)} \begin{figure}[t!] \makebox[\textwidth][c]{\includegraphics[width=0.45\textwidth]{s_figure5}} \centering \caption{(a) Conceptual schematic of AOFS. (b) Example AOFS simulated based on the non-reciprocal modulator model. The carrier transmission is suppressed on resonance. 50\% of power is converted into the anti-Stokes sideband.} \label{fig:AOFS} \end{figure} For an ideal AOFS, we desire carrier transmission to be attenuated so that the output of the device is only the frequency shifted light (Fig.~\ref{fig:AOFS}a). In this section, we theoretically provide an example of a chip-scale acousto-optic frequency shifter (AOFS) using our device. Let us consider the transmission spectrum of TE$_{10}$ mode ($\Delta_1 << \omega_2 - \omega_1$) in the forward phase matched case. We assume that the two optical modes are fully resolved ($\omega_2-\omega_1 > \kappa_1/2 ~ \text{and} ~ \kappa_1/2$). The output from the waveguide can be expressed as: \begin{align} \lvert s_{out} \rvert^2 = \lvert s_{in} - \sqrt{\kappa_{ex1}} \, a_{1,0} +\sqrt{\kappa_{ex2}} \,a_{2,+1} e^{-i\Omega t} \rvert^2 \end{align} From Eq.~\ref{eq:7}a, we find that the transmission of the carrier laser vanishes ($s_{in}-\sqrt{\kappa_{ex1}}\,a_{1,0}~=~0$), when the following equation is satisfied. \begin{equation} \lvert G_{ph} \rvert^2 = \frac{\kappa_2}{2}\left(\kappa_{ex1}-\frac{\kappa_1}{2}\right) \label{eq:17} \end{equation} Therefore, the output from the waveguide is only an anti-Stokes sideband, which can be represented as: \begin{equation} \lvert s_{out} \rvert^2 =\left| \frac{-iG_{ph}\sqrt{\kappa_{ex1}\kappa_{ex2}}}{(\kappa_2 /2 - i(\Delta_2+\Omega))(\kappa_1 /2 - i\Delta_1)+\lvert G_{ph} \rvert^2} s_{in}e^{-i\Omega t} \right|^2 \label{eq:18} \end{equation} \noindent From Eq.~\ref{eq:17}, we see that the carrier transmission can be fully suppressed for certain optomechanical coupling coefficient ($G_{ph}$) such that the resonator is over-coupled to the waveguide ($\kappa_{ex1}>\kappa_1/2$). In other words, when the combined photon loss rate induced by the scattering process and the intrinsic loss is the same as the external coupling rate, the optical mode is critically coupled to the waveguide. Based on the above equations, we calculate output spectrum of the TE$_{10}$ mode from the waveguide (Fig.~\ref{fig:AOFS}b). In this simulation, we assume that $\kappa_{ex1} = \kappa_{ex2} = 1.5~\text{GHz}$ and $\kappa_{1} =\kappa_2 = 2~\text{GHz}$. As shown in Figure~\ref{fig:s7}, when the acoustic power satisfying Eq.~\ref{eq:17} is applied to the system, the carrier is fully absorbed by the resonator and only the anti-Stokes light comes out from the waveguide. \section{Racetrack Resonator Dimensions} \begin{figure}[h!] \makebox[\textwidth][c]{\includegraphics[width=0.6\textwidth]{s_figure7}} \centering \caption{Dimensions of the racetrack optical resonator produced in this work that supports the required two optical modes.} \label{fig:s7} \end{figure} Specific geometry of our racetrack device is shown in Fig.~\ref{fig:s7}. The resonator is composed of a 2.2 $\mu$m width waveguide, having 170 $\mu$m linear regions and 100 $\mu$m radius curved regions. Thus, the total circumference of the racetrack resonator is 968 $\mu$m. The resonator is fabricated on 350 nm of AlN on silicon substrate, which is undercut to confine light and the S$_{0}$ Lamb acoustic wave in AlN only. The ridge for the racetrack is defined by 200 nm deep etches on either side. This leaves behind 150 nm of AlN such that the racetrack is mechanically supported by the rest of the substrate and is acoustically linked to it. \newpage \bibliographystyle{myIEEEtran}
\subsection{Type-1 static analysis} \label{sec:fLCMt1} The data-flow problems of the KRS algorithm use expressions as domain. The mapping between expressions of \texttt{diffPCM} and indexes are listed in Figure \ref{fig:exLCMProb} (bottom) together with the values of $DEE$, $UEE$ and $KILL$ for each block (top right). The classical KRS algorithm conclude that both calls must be evaluated in B4 (bottom light gray box, ``Delete'' matrix, Column 4 and 5). For the fuzzy data-flow analyses we use the Type-1 Min-Max fuzzy logic. The corresponding fuzzy sets of $DEE$, $UEE$ and $KILL$ are given in Figure \ref{fig:exLCMProb} (top dark gray box). Step (1) of the fuzzy KRS-LCM is hence the fixed-point to below system of equations: { \small \begin{tabular}{ll} $\begin{array}{l} \textbf{Available expression} \\ \textbf{analysis system} \end{array}$ & $\begin{cases} AvOut(B0) = 0.0 \\ AvOut(B1) = DEE(B1) \vee \left(\textcolor{red}{\left[\frac{1}{N}AvOut(B0) + \frac{N-1}{N}AvOut(B4)\right]} \wedge \lnot Kill(B1)\right) \\ AvOut(B2) = DEE(B2) \vee \left(\textcolor{red}{AvOut(B1)} \wedge \lnot Kill(B2)\right) \\ AvOut(B3) = DEE(B3) \vee \left(\textcolor{red}{AvOut(B2)} \wedge \lnot Kill(B3)\right) \\ AvOut(B4) = DEE(B4) \vee \left(\textcolor{red}{\left[pAvOut(B2) + (1-p)AvOut(B3)\right]} \wedge \lnot Kill(B4)\right) \\ AvOut(B5) = DEE(B5) \vee \left(\textcolor{red}{AvOut(B1)} \wedge \lnot Kill(B4)\right) \\ \end{cases}$ \\ \\ $\begin{array}{l} \textbf{Very busy expression} \\ \textbf{analysis system} \end{array}$ & $\begin{cases} AnOut(B0) = UEE(B0) \vee \left(\textcolor{red}{AnOut(B1)} \wedge \lnot Kill(B1)\right) \\ AnOut(B1) = UEE(B1) \vee \left(\textcolor{red}{\left[\frac{N-1}{N}AnOut(B2) + \frac{1}{N}AnOut(B5)\right]} \wedge \lnot Kill(B1)\right) \\ AnOut(B2) = UEE(B2) \vee \left(\textcolor{red}{\left[pAnOut(B4) + (1-p)AnOut(B3)\right]} \wedge \lnot Kill(B2)\right) \\ AnOut(B3) = UEE(B3) \vee \left(\textcolor{red}{AnOut(B4)} \wedge \lnot Kill(B3)\right) \\ AnOut(B4) = UEE(B4) \vee \left(\textcolor{red}{AnOut(B1)} \wedge \lnot Kill(B4)\right)\\ AnOut(B5) = 0.0 \\ \end{cases}$ \end{tabular} } Steps (2) and (4) introduce (constant) predicates and are performed outside the analysis framework. Step (3) is done similarly to step (1). Figure \ref{fig:exLCMProb} (bottom dark gray box) shows the result from step (4). In contrast to the classical LCM the result implies that it is \textit{very plausible} (0.998) that we can delete the invocation of \texttt{Transform} (``Delete'' matrix, Column 5) from block B4 and instead add it at the end of B0 and B3 (or start of B1 and B4). However, result for the invocation of \texttt{IncRate} remains. This is because the invocation depends on the value of $i$ which is updated at the end of B4. \subsection{Type-2 static analysis} To increase data-flow analysis precision a function call is sometimes inlined at the call site. The improvement can however be reduced if the control-flow analysis is inaccurate and multiple targets are considered for a particular call site. We show how the uncertainty in control-flow and data-flow can be quantified in two different dimensions using type-2 interval fuzzy sets. As per Section \ref{sec:prelim} we can lift an arbitrary fuzzy predicate to intervals. Here we assume no knowledge about the relative number of calls to each target and treat the different calls non-deterministically. \begin{figure}[!ht] { \linespread{0.9}\fontfamily{ptm} \begin{minipage}{0.5\textwidth} \begin{tikzpicture} \node[block, fill=gray!10] (f4) {\begin{tabular}{l}B = Transform(b);\\ ... = IncRate(i);\\ \\ \\ \\ \\ \\ \\ A = ...\\ out[i] = A*B\\ i = i + 1\end{tabular}}; \node[block, fill=white, xshift=-2cm] (fIncRateA) {% \begin{lstlisting}[language=C,mathescape,basicstyle=\tiny,tabsize=3] int IncRate_1(int i) { return 2*i; } \end{lstlisting}}; \node[block, fill=white, xshift=2cm] (fIncRateB) {% \begin{lstlisting}[language=C,mathescape,basicstyle=\tiny,tabsize=3] int IncRate_2(int i) { return 1; } \end{lstlisting}}; \draw[->] ($(f4)+(-0.15,1.0)$) -- (fIncRateA); \draw[->] ($(f4)+(-0.15,1.0)$) -- (fIncRateB); \draw[->] (fIncRateA) -- ($(f4)+(-0.15,-1.0)$); \draw[->] (fIncRateB) -- ($(f4)+(-0.05,-1.0)$); \end{tikzpicture} \end{minipage \begin{minipage}{0.45\textwidth} \scriptsize \begin{tabular}{|l|lll|} \hline \textbf{Block} & \textbf{Kill} & \textbf{DEE} & \textbf{UEE} \\ \hline 6 & $\left[1.0, 1.0\right]$ & $\left[0.0, 0.0\right]$ & $\left[0.0, 0.0\right]$ \\ 5 & $\left[0.0, 0.0\right]$ & $\left[1.0, 1.0\right]$ & $\left[1.0, 1.0\right]$ \\ 4 & $\left[1.0, 1.0\right]$ & $\left[0.0, 1.0\right]$ & $\left[1.0, 1.0\right]$ \\ 3 & $\left[1.0, 1.0\right]$ & $\left[1.0, 1.0\right]$ & $\left[0.0, 0.0\right]$ \\ 2 & $\left[1.0, 1.0\right]$ & $\left[0.0, 0.0\right]$ & $\left[1.0, 1.0\right]$ \\ 1 & $\left[1.0, 1.0\right]$ & $\left[0.0, 0.0\right]$ & $\left[0.0, 0.0\right]$ \\ 0 & $\left[1.0, 1.0\right]$ & $\left[0.0, 0.0\right]$ & $\left[0.0, 0.0\right]$ \\ \hline \end{tabular}\\ \begin{tabular}{|l|l||l|l|} \hline \textbf{Edge} & \textbf{Insert} & \textbf{Block} & \textbf{Delete} \\ \hline B0$\rightarrow$B1 & $\left[0.001, 0.999\right]$ & % B0 & $\left[0.000, 0.000\right]$ \\ B1$\rightarrow$B5 & $\left[0.001, 0.999\right]$ & % B1 & $\left[0.000, 0.000\right]$ \\ B1$\rightarrow$B3 & $\left[0.001, 0.999\right]$ & % B2 & $\left[0.000, 0.000\right]$ \\ B2$\rightarrow$B3 & $\left[0.001, 0.999\right]$ & % B3 & $\left[0.000, 0.000\right]$ \\ B2$\rightarrow$B4 & $\left[0.001, 0.999\right]$ & % B4 & $\left[0.002, 0.999\right]$ \\ B3$\rightarrow$B4 & $\left[0.001, 0.999\right]$ & % B5 & $\left[0.000, 0.000\right]$ \\ B4$\rightarrow$B1 & $\left[0.000, 0.999\right]$ & & \\ \hline \end{tabular} \end{minipage} \caption{Implementations of \texttt{IncRate} inlined in block B4 (left); DEE, UEE and Kill vectors of block B4 and \textit{Delete} \textit{Insert} analysis result for expression \texttt{IncRate(i)} (right)} \label{fig:interproc} } \end{figure} We assume two different \texttt{IncRate} functions, as in Figure \ref{fig:interproc} (left), have been determined as targets. Their respective $UEE$ and $Kill$ entries are the same but since $i$ is updated at the end of block B4 their $DEE$ entry will differ. The result of \texttt{IncRate\_1} depends on the variable $i$ and therefore $DEE(B4_1) = \mathbf{0101000}$, in contrast the entry for \texttt{IncRate\_2} is $DEE(B4_2) = \mathbf{0111000}$, where $\mathbf{0} = [0,0]$ and $\mathbf{1} = [1,1]$. The new entry for block B4 is given by $DEE(B4) = DEE(B4_1) \fuzzyvee DEE(B4_2) = \left<\mathbf{0},\mathbf{1},[0,1],\mathbf{1},\mathbf{0},\mathbf{0},\mathbf{0}\right>$. The new $Kill$, $DEE$ and $UEE$ sets are given in Figure \ref{fig:interproc} (right). Applying the fuzzy KRS-LCM, but with Type-1 min-max fuzzy logic lifted to Interval type-2 min-max fuzzy logic gives the values of \textit{Delete} and \textit{Insert} for expression \texttt{IncRate(i)} in Figure \ref{fig:interproc} (right). The result for invoking \texttt{IncRate} prior to the loop is $[0.001, 0.999]$ as opposed to 0.001 from the Type-1 analysis in Section \ref{sec:fLCMt1}. The added dimension in the result of the type-2 fuzzy analysis allows us to differentiate uncertain results from pessimistic results. In the given example we showed that the result of Section \ref{sec:fLCMt1} is a pessimistic over-generalization and that the two paths need to be considered seperately to increase precision. \subsection{Hybrid analysis} \label{sec:hybridanalysis} The result from a fuzzy data-flow analysis is a set of fuzzy membership degrees. This section shows how the result can automatically be improved following the static analysis using a fuzzy regulator/classifier, if more specific information is provided at a later point. The classifier, a Takagi-Sugeno Adaptive-Network-based fuzzy inference system (TS-ANFIS)~\cite{jang93,jang96} shown in Figure \ref{fig:tsanfis}, is composed of five layers: \begin{enumerate}[noitemsep,topsep=0pt,parsep=0pt,partopsep=0pt] \item Lookup fuzzy membership degree of the input value. \item Compute the \textit{firing strength of a rule}, i.e. conjunction of all membership degrees from each rule. \item Normalize the firing strengths, i.e., $\bar{w_i} = w_i/\sum_j w_j$. \item Weight the normalized firing strength to the consequent output of the rule $f_i(x)$. \item Combine all rule classifiers, i.e. $f=\sum_i \bar{w_i}f_i$ . \end{enumerate} \begin{figure} \begin{minipage}{0.55\linewidth} \linespread{0.9}\fontfamily{ptm}\selectfont\small \textbf{IF} $x_0$ is $A_0$ \textbf{and} $x_1$ is $B_0$ \textbf{THEN} $f = c_{(1,0)} + c_{(1,1)}x_0 + c_{(1,2)}x_1$\newline \textbf{IF} $x_0$ is $A_1$ \textbf{and} $x_1$ is $B_1$ \textbf{THEN} $f = c_{(2,0)} + c_{(2,1)}x_0 + c_{(2,2)}x_1$\newline \newline \newline \tikzset{>=latex} \begin{tikzpicture} \node (x0) {$x_0$}; \node[below of=x0, yshift=-1cm] (x1) {$x_1$}; \node[block, above right of=x0, xshift=0.25cm, yshift=-0.20cm] (A0) {$A_0$}; \node[block, below of=A0] (A1) {$A_1$}; \node[block, below of=A1] (B0) {$B_0$}; \node[block, below of=B0] (B1) {$B_1$}; \node[block, right of=A1, xshift=0.25cm] (P0) {$\mathlarger{\prod}$}; \node[block, below of=P0] (P1) {$\mathlarger{\prod}$}; \node[block, right of=P0, xshift=0.25cm] (N0) {$N$}; \node[block, below of=N0] (N1) {$N$}; \node[block, right of=N0, xshift=0.25cm] (F0) {}; \node[above of=F0, yshift=-0.15cm, xshift=-0.16cm] (F0x0) {$x_0$}; \node[above of=F0, yshift=-0.15cm, xshift=0.16cm] (F0x1) {$x_1$}; \draw[->] (F0x0.south) -- ([xshift=-4]F0.north); \draw[->] (F0x1.south) -- ([xshift=4]F0.north); \node[block, below of=F0] (F1) {}; \node[below of=F1, yshift=0.15cm,xshift=-0.16cm] (F1x0) {$x_0$}; \node[below of=F1, yshift=0.15cm,xshift=0.16cm] (F1x1) {$x_1$}; \draw[->] (F1x0.north) -- ([xshift=-4]F1.south); \draw[->] (F1x1.north) -- ([xshift=4]F1.south); \node[block, below right of=F0, yshift=0.2cm,xshift=0.5cm] (AVG) {$\mathlarger{\sum}$}; \node[right of=AVG] (O) {$f$}; \draw[->] (x0.east) -- (A0.west); \draw[->] (x0.east) -- (A1.west); \draw[->] (x1.east) -- (B0.west); \draw[->] (x1.east) -- (B1.west); \draw[->] (A0.east) -- (P0.west); \draw[->] (B0.east) -- (P0.west); \draw[->] (A1.east) -- (P1.west); \draw[->] (B1.east) -- (P1.west); \draw[->] (P0.east) node[right,yshift=0.1cm,xshift=0.1cm]{\scriptsize $w_1$} -- (N0.west); \draw[->] (P0.east) -- (N1.west); \draw[->] (P1.east) node[right,yshift=-0.2cm, xshift=0.1cm]{\scriptsize $w_2$} -- (N1.west); \draw[->] (P1.east) -- (N0.west); \draw[->] (N0.east) node[right,yshift=0.1cm, xshift=0.1cm]{\scriptsize $\bar{w_1}$} -- (F0.west); \draw[->] (N1.east) node[right,yshift=-0.2cm, xshift=0.1cm]{\scriptsize $\bar{w_2}$} -- (F1.west); \draw[->] (F0.east) node[right,yshift=0.1cm,xshift=0.1cm]{\scriptsize $\bar{w_1}f_1$} -- (AVG.west); \draw[->] (F1.east) node[right,yshift=-0.1cm,xshift=0.1cm]{\scriptsize $\bar{w_2}f_2$} -- (AVG.west); \draw[->] (AVG.east) -- (O.west); \end{tikzpicture} \end{minipage}% \vrule\hspace*{0.1cm} \begin{minipage}{0.4\linewidth} \begin{tikzpicture}[domain=0:1] \draw[->] (0,0) -- (2,0); \draw[->] (0,0) -- (0,2) node[left] {$\mu_{A_0}$}; \draw[color=red,scale=2,smooth,variable=\x] plot[id=Rule1A0] function{(x <= 0.35 ? 0 : (x <= 0.5 ? (x-0.35)/(0.5-0.35) : (x <= 0.75 ? (0.75-x)/(0.75-0.5) : 0)))} (0,0); \draw[->] (2.5,0) -- (4.5,0); \draw[->] (2.5,0) -- (2.5,2) node[left] {$\mu_{B_0}$}; \draw[color=red,scale=2,smooth,xshift=1.25cm,variable=\x] plot[id=Rule1B0] function{(x <= 0.05 ? 0 : (x <= 0.15 ? (x-0.05)/(0.15-0.05) : (x <= 0.25 ? (0.25-x)/(0.25-0.15) : 0)))}; \draw[->] (0,-2.5) -- (2,-2.5); \draw[->] (0,-2.5) -- (0,-0.5) node[left] {$\mu_{A_1}$}; \draw[color=red,scale=2,smooth,yshift=-1.25cm,variable=\x] plot[id=Rule2A1] function{(x <= 0.5 ? 0 : (x <= 0.85 ? (x-0.5)/(0.85-0.5) : (x <= 0.9 ? (0.9-x)/(0.9-0.85) : 0)))}; \draw[->] (2.5,-2.5) -- (4.5,-2.5); \draw[->] (2.5,-2.5) -- (2.5,-0.5) node[left] {$\mu_{B_1}$}; \draw[color=red,scale=2,smooth,xshift=1.25cm,yshift=-1.25cm,variable=\x] plot[id=Rule2B1] function{(x <= 0.15 ? 0 : (x <= 0.65 ? (x-0.15)/(0.65-0.15) : (x <= 0.8 ? (0.8-x)/(0.8-0.65) : 0)))}; \draw[densely dotted] (1.2,-2.5) -- (1.2,2); \draw[densely dotted] (1.2,1.2) -- (1.5,1.2); \node (x0A0) at (1.75,1.2) {\smaller 0.6}; \draw[densely dotted] (2.9,-2.5) -- (2.9,2); \draw[densely dotted] (2.9,1) -- (3.15,1); \node (x1B0) at (3.4,1) {\smaller 0.5}; \node (x0A1) at (1.2,-2.75) {$x_0 = 0.6$}; \draw[densely dotted] (1.2,-1.928571429) -- (0.95,-1.928571429); \node (x0A1) at (0.5,-1.928571429) {\smaller 0.286}; \node (x1B1) at (3.5,-2.75) {$x_1 = 0.2$}; \draw[densely dotted] (2.9,-2.3) -- (3.1,-2.3); \node (x1B1) at (3.35,-2.3) {\smaller 0.1}; \end{tikzpicture} \end{minipage} \caption{First-order Takagi-Sugeno ANFIS with two rules and two variables (left) and four example fuzzy sets (right)} \label{fig:tsanfis} \end{figure} \noindent This classifier uses a polynomial (i.e., the consequent part of the adaptive IF-THEN rules) to decide the output membership. The order of the TS-ANFIS is the order of the polynomial. The classification accuracy of the TS-ANFIS can be improved online/offline by fitting the polynomial to the input data. For a first-order TS-ANFIS this can be implemented as follows: \begin{itemize} \item (\textit{Offline}) (Affine) Least square (LS) optimization \cite{jang93} is a convex optimization problem that finds an affine function (i.e., $y = a_0 + \sum_{i = 1}^n a_ix_i$) which minimizes $||A[1; X] - Y||^2_2$ where $X$ and $Y$ are the input and output vectors of the training set. \item (\textit{Online}) Least mean square (LMS) \cite{jang93} is an adaptive filter that gradually (in steps of a given constant $\mu$) minimizes $\mathbb{E}\left[|y - f(x)|^2\right]$, where $\left<x,y\right>$ is an input/output sample. \end{itemize} To exemplify the functionality of the TS-ANFIS we consider the classification of $\vec{x} = \left<0.6,0.2\right>$ using the two rule TS-ANFIS from Figure \ref{fig:tsanfis} (left). Let $f_1(\vec{x}) = 0.2x_0 - 0.43x_1$, $f_2(\vec{x}) = 0.1x_1 + 0.5$ and membership functions be given as in Figure \ref{fig:tsanfis} (right). The membership degrees are marked in the figure as $\mu_{A0}(x0) = 0.6$, $\mu_{B0}(x1) = 0.5$ for the first rule and $\mu_{A1}(x0) = 0.286$, $\mu_{B1}(x0) = 0.1$ for the second rule. Hence the weight of the first rule (i.e., $w_1$) is $0.6 \wedge 0.5 = 0.5$ and the second rule (i.e., $w_2$) is $0.286 \wedge 0.1 = 0.1$. The normalized weights are then $\bar{w_1} = 0.833$ and $\bar{w_1} = 0.167$. As the consequence functions output $f_1(\vec{x}) = 0.034$ and $f_2(\vec{x}) = 0.52$ we produce the prediction $0.833f_1(\vec{x}) + 0.167f_2(\vec{x}) = 0.115$. We return to the \texttt{diffPCM} function and again consider if we can invoke \texttt{Transform(b)} prior to entering the loop. We saw in Section \ref{sec:fLCMt1} that the fuzzy membership degree was 0.998. To improve classification accuracy we let the TS-ANFIS also use the $i$ variable and the first input value (i.e., $in[0]$). These variables were not part of the analysis and so we conservatively assume the fuzzy membership degree to be the same for any value of these variables (in our experiments: $1.0$). As shown in Figure \ref{fig:diffPCM} (right), we inserted calls to compute the ANFIS decision of updating and keeping the variable $b$ constant in the \texttt{diffPCM} function. If the incorrect decision was made the error was noted and an error rate computed after handling all input samples. We consider invoking the \texttt{diffPCM} function on four different input sets. Each input set defined as 10 periods with 25 input values in each period. The input sets (i.e., \texttt{in[...]}) is given in Figure \ref{fig:anfis} (left). We use the LMS algorithm\footnote{The constant $\mu$ for the four different runs was set to 0.001, 0.05, 0.15 and 0.1 respectively.} after each incorrect classification and the LS algorithm if the error rate of a period was larger than or equal to $80\%$. Note that the values of a period is not always perfectly representable by a linear classifier and sometimes varies between different periods, although periods are ``\textit{similar}''. Hence we do not expect the classifier to be monotonically improving with increasing period. As shown in the result in Figure \ref{fig:anfis} (right) the classification error decreases fast with both period and input sample. In two cases a small residual error remains after the final period. This show that the TS-ANFIS can improve the analysis result dynamically and hence increase the accuracy of when \texttt{Transform} can be invoked prior to entering the loop. \begin{figure} \centering \begin{subfigure}[t]{0.4\textwidth} \centering \hspace*{-1.5cm} \includegraphics[height=2in]{AnfisData/1In} \end{subfigure ~ \begin{subfigure}[t]{0.4\textwidth} \centering \includegraphics[height=2in]{AnfisData/1Res} \end{subfigure} \begin{subfigure}[t]{0.4\textwidth} \centering \hspace*{-1.5cm} \includegraphics[height=2in]{AnfisData/3In} \end{subfigure ~ \begin{subfigure}[t]{0.4\textwidth} \centering \includegraphics[height=2in]{AnfisData/3Res} \end{subfigure} \begin{subfigure}[t]{0.4\textwidth} \centering \hspace*{-1.5cm} \includegraphics[height=2in]{AnfisData/4In} \end{subfigure ~ \begin{subfigure}[t]{0.4\textwidth} \centering \includegraphics[height=2in]{AnfisData/4Res} \end{subfigure} \begin{subfigure}[t]{0.4\textwidth} \centering \hspace*{-1.5cm} \includegraphics[height=2in]{AnfisData/5In} \end{subfigure}% ~ \begin{subfigure}[t]{0.4\textwidth} \centering \includegraphics[height=2in]{AnfisData/5Res} \end{subfigure} \caption{$10\times 25$ input values (left) and the corresponding classification error rate (right)} \label{fig:anfis} \end{figure} \subsection{Fuzzy set} Elements of a crisp set\footnote{In the context of fuzzy logic, crisp or Boolean set refer to a classical set to avoid confusion with fuzzy sets.} are either members or non-members w.r.t to a universe of discourse. A fuzzy set (FS) instead allow partial membership denoted by a number from the unit interval $[0,1]$. The membership degree typically denotes vagueness. The process to convert crisp membership to fuzzy grades is called \textit{fuzzification} and the inverse is called \textit{defuzzification}. Following Dubois et al.~\cite{dubois2000fundamentals,DuboisPrade80} let $S$ be a crisp set and $\mu: S \mapsto [0,1]$ a \textit{membership function} (MF) then $\left<S, \mu\right>$ is a fuzzy set. As a convention, if $S$ is understood from context we sometimes refer to $\mu$ as a fuzzy set. The membership function formalizes the fuzzification. Fuzzy sets are ordered point-wise, i.e. $(S,\mu_A) \leq (S,\mu_B) \Leftrightarrow \forall s \in S\colon \mu_A(s) \leq \mu_B(s)$. We can accommodate some notion about uncertainty of vagueness by considering a type-2 fuzzy set where the membership degree itself is a fuzzy set. Type-2 FS (T2FS) membership functions are composed of a primary ($J_s$) and secondary ($\mu$) membership $\{\left<(s,u), \mu(s,u)\right> \mid s \in S, u \in J_s \subseteq [0,1]\}$. Here uncertainty is represented by the secondary membership that define the possibility of the primary membership. When for each $x$ and $u$, it holds $\mu(x,u) = 1$ the T2FS is called an \textit{interval} T2FS. Gehrke et al.~\cite{Gehrke96} showed that this can equivalently be described as an interval valued fuzzy sets (IVFS) where $\mu\colon S \rightarrow \{[l,u]\left| \bot \leq l \leq u \leq \top\right.\}$. IVFS are a special case of lattice valued fuzzy sets ($L$-fuzzy sets) where the membership domain forms a lattice over $[0,1]$. Defuzzification of T2FS often proceeds in two phases. The first phase applies \textit{type reduction} to transform the T2FS to a type-1 FS (T1FS). The second phase then applies a type-1 defuzzification. \subsection{Fuzzy logic} Fuzzy logic defines many-valued formal systems to reason about truth in the presence of vagueness. Contrary to classical logic the law of excluded middle ($p \vee \lnot p = \top$) and the law of non-contradiction ($p \wedge \lnot p = \bot$) does not, in general, hold for these systems. Fuzzy logic uses T-, S- and C- norms to generalize the logical operators $\wedge$, $\vee$ and $\neg$. We compactly represent a fuzzy logic by $\left<\fuzzywedge, \fuzzyvee, \fuzzyneg\right>$\footnote{Although one would expect the definition of a fuzzy logic to include a ``fuzzy implication'' operator in this work we do not consider it.} which is sometimes called a \textit{De Morgan system} \cite{dubois2000fundamentals} because it satisfies a generalization of De Morgans laws: $\fuzzyneg(P \fuzzywedge Q) \Leftrightarrow \fuzzyneg P \fuzzyvee \fuzzyneg Q$ and $\fuzzyneg(P \fuzzyvee Q) \Leftrightarrow \fuzzyneg P \fuzzywedge \fuzzyneg Q$. \begin{definition} Let $U$ be a binary function $[0,1]^2 \to [0,1]$ that is commutative, associative and increasing and has an identity element $e \in [0,1]$. If $e = 1$ then $U$ is a \textbf{Triangular norm (T-norm)} and if $e = 0$ then $U$ is a \textbf{Triangular conorm (S-norm)}\footnote{The general concept, allowing any $e \in [0,1]$, is called a \textit{uninorm} \cite{dubois2000fundamentals} and is either orlike (i.e., $U(0,1) = U(1,0) = 1$) or andlike (i.e., $U(0,1) = U(1,0) = 0$). Our work does not require the full generality.}. \end{definition} \begin{definition} A \textbf{C-norm} is a unary function $n\colon [0,1] \to [0,1]$ that is decreasing, involutory (i.e., $n(n(x)) = x$) with boundary conditions (i.e, $n(0) = 1, n(1) = 0$). \end{definition} \noindent Standard examples of fuzzy logics are shown in Table \ref{tbl:fl} \cite{dubois2000fundamentals,DuboisPrade80}. Examples 1-3 are special cases (and limits) of the Frank family of fuzzy logics that are central to our work and formally defined in Definition \ref{defFrankFamily}. \begin{table} \center \begin{tabular}{l|l|l|l|l} & \textbf{Fuzzy logic} & \textbf{T-norm} & \textbf{S-norm} & \textbf{C-norm} \\ \hline \textbf{1} & \textit{Min-Max} & $\min(x,y)$ & $\max(x,y)$ & $1-x$ \\ \textbf{2} & \textit{Algebraic Sum-product} & $xy$ & $x+y-xy$ & $1-x$ \\ \textbf{3} & \textit{Lukasiewicz} & $max(x+y-1, 0)$ & $min(x+y, 1)$ & $1-x$ \\ \textbf{4} & \textit{Nilpotent} & $\begin{cases} min(x,y) & x+y > 1 \\ 0 & \text{otherwise}\end{cases}$ & $\begin{cases} max(x,y) & x+y < 1 \\ 1 & \text{otherwise}\end{cases}$ & $1-x$ \\ \hline \end{tabular} \caption{Common instantiations of fuzzy logics} \label{tbl:fl} \vspace*{-0.75cm} \end{table} \begin{definition}\label{defFrankFamily} Let $s \in [0,1] \cup \{\infty\}$ then the \textbf{Frank family} of T-norms is defined by: $T^s(x,y) = \begin{cases} \min(x,y) & s = 0 \\ xy & s = 1 \\ \max(x+y-1,0) & s = \infty \\ log_s\left(1 + \frac{\left(s^x - 1\right)\left(s^y - 1\right)}{s-1}\right) & \text{otherwise}\end{cases}$ \end{definition} \noindent The set of intervals in $[0,1]$ forms a bounded partial order $\left<\mathbb{I}, \sqsubseteq, \top, \bot\right>$\footnote{This should not be confused with the partial order used in the interval abstraction.} where $[l_x, u_x] \leq [l_y, u_y] \Leftrightarrow \left(l_x \leq l_y\right) \\ \wedge \left(u_x \leq u_y\right), \top = [1, 1]$ and $\bot = [0,0]$. As per Gehrke et al.~\cite{Gehrke96} we can point-wise lift a T1FS fuzzy logic $\left<\fuzzywedge, \fuzzyvee, \fuzzyneg\right>$ to a IVFS fuzzy logic, i.e., $[l_x, u_x] \odot [l_y, u_y] = [l_x \odot l_y, u_x \odot u_y], \hat{\odot} \in \{\fuzzywedge, \fuzzyvee\}$ and $\fuzzyneg [l, u] = [\fuzzyneg u, \fuzzyneg l]$. \section{Introduction} \input{intro} \section{Preliminaries} \label{sec:prelim} \input{prelim} \section{Fuzzy data-flow analysis} \label{sec:fdfa} \input{fdfa} \section{Lazy code motion} \label{sec:lcm} \input{caseLcm} \section{Related work} \label{sec:related} \input{related} \section{Conclusion} \input{conclusion} \nocite{*} \bibliographystyle{eptcs}
\section{Method}\label{meth} \subsection{Effective diffusivity} Thermodynamic properties in numerical ocean models are commonly formulated in terms of $\theta$ and $S$, whose evolution equations can in general be expressed as: \begin{equation} \frac{D_{\rm res}\theta}{Dt} = \nabla \cdot ({\bf K} \nabla \theta) , \qquad \frac{D_{\rm res}S}{Dt} = \nabla \cdot ({\bf K} \nabla S), \end{equation} where ${\bf K} = K_i ({\bf I} - {\bf d} {\bf d}^T) + K_d {\bf d} {\bf d}^T$ is the neutral rotated diffusion tensor, with $K_i$ and $K_d$ being the isoneutral and dianeutral turbulent mixing coefficients respectively, ${\bf d}={\bf N}/|{\bf N}|$ the locally-defined normalised neutral vector, and $D_{\rm res}/Dt = \partial/\partial t + ({\bf v}+{\bf v}_{gm})\cdot \nabla$ the advection by the residual velocity (the sum of the resolved Eulerian velocity plus the meso-scale eddy induced velocity). As a result, the evolution equation of any material density variable $\gamma(S,\theta)$ must be given \begin{equation} \frac{D_{res}\gamma}{Dt} = \nabla \cdot ( {\bf K}\nabla \gamma ) - \underbrace{\left ( \gamma_{\theta \theta} \nabla \theta^T {\bf K} \nabla \theta + 2 \gamma_{S\theta} \nabla S^T {\bf K} \nabla \theta + \gamma_{SS} \nabla S^T {\bf K} \nabla S \right )}_{NL} . \label{gamma_equation} \end{equation} Unless $\gamma(S,\theta)$ is a linear function of $S$ and $\theta$, its evolution equation will in general contain non vanishing nonlinear terms (denoted NL in Eq. (\ref{gamma_equation})) related to cabelling and thermobaricity, e.g., \citet{McDougall:1987mb,Klocker:2010qm, urakawa2013available}. In several previous studies, it has been common to include the nonlinear terms NL as part of the definition of effective diffusivity, e.g., \cite{lee2002spurious}. In this paper, however, we exclude the nonlinear terms from our definition of effective diffusivity, and hence define the diffusive flux of $\gamma$ as: \begin{equation}\label{Kvec} F_{\rm diff}^{\gamma} =-{\bf{K}}\nabla \gamma=-\left( K_i (\nabla \gamma-(\nabla \gamma\cdot {\bf{ d}}){\bf{d}})+K_d(\nabla \gamma\cdot {\bf{d}}){\bf{d}}\right) \end{equation} We define the \emph{effective diffusive flux} of $\gamma$ as the integral of the diffusive flux across the isopycnal surface $\gamma({\bf x},t) = {\rm constant}$, viz., \begin{equation}\label{eff} F_{\rm eff}=-\int_{\gamma=\rm const} {\bf K} \nabla \gamma \cdot {\bf n} \,{\rm d}S \end{equation} where $\bf{n}=\frac{\nabla \gamma}{|\nabla \gamma|}$ is the unit local normal vector to the $\gamma$ surface. Now, it is easily established after some straightforward algebra that \begin{equation}\label{kii} \begin{array}{c @{=} l} K\nabla \gamma\cdot \bf{n} &\left[K_i (\nabla \gamma-(\nabla \gamma\cdot {\bf d}){\bf d})+K_d(\nabla \gamma\cdot {\bf d}){\bf d}\right]\cdot\frac{\nabla \gamma}{|\nabla \gamma|}\\ &\left[K_i\left(|\nabla\gamma|^2-(\nabla \gamma \cdot {\bf d})^2\right)+K_d(\nabla \gamma \cdot {\bf d})^2\right]/|\nabla\gamma| \\ &|\nabla\gamma|\left[K_i\sin^2(\nabla \gamma ,{\bf d})+K_d\cos^2(\nabla \gamma ,{\bf d})\right] . \end{array} \end{equation} Eq. (\ref{kii}) establishes that the locally defined effective diapycnal diffusivity experienced by the density variable $\gamma$ is affected by both isoneutral and dianeutral mixing, the contribution from isoneutral mixing being akin to a Veronis-like effect, as discussed in \cite{tailleuxdir}. Because we are primarily interested in the latter effect, we shall discard the effect of dianeutral mixing on the effective diapycnal diffusivity of $\gamma$ and hence assume $K_d=0$ in the rest of the paper. As a result, the expression for the effective diffusive flux of $\gamma$ becomes: \begin{equation}\label{eff2} F_{\rm eff}=-\int_{\gamma=\rm const} |\nabla\gamma|K_i\sin^2(\nabla \gamma ,{\bf d}) {\rm d}S . \end{equation} Note that the integrand of (\ref{eff2}) is mathematically equivalent to what \cite{mcdougall2005assessment} refer to as ``fictitious diapycnal mixing". However, here the integrand is integrated on $\gamma$ surfaces and then used to calculate an effective diffusivity coefficient which is easier to interpret than a collection of local values of the $(\nabla \gamma ,{\bf d})$ angle. \subsection{Reference Profile} In order to construct an effective turbulent diffusivity $K_{\rm eff}$ associated with the effective diffusivity flux $F_{\rm eff}$, we need to define an appropriate mean gradient for the density variable $\gamma$. This is done by constructing a reference profile for $\gamma$, as explained in the next paragraph.\\ Let $z_r(\gamma,t)$ be the reference profile for the particular material density $\gamma(S,\theta)$ (which can always be written as a function of space ${\bf x}$ and time $t$ as $\gamma^*({\bf x},t)=\gamma(S,\theta)$), constructed to be the implicit solution of the following problem: \begin{equation} \label{reference_zr} \int_{V(z_r)} {\rm d}V = \int_{V(\gamma,t)} dV=\int_{z_r(\gamma,t)}^0 A(z) dz , \end{equation} where $A(z)$ is the depth-dependent area of the ocean at depth $z$, and $V(\gamma,t)$ the volume of water for all parcels with density $\gamma_0$ such that $\gamma_{min}\leq\gamma_0\leq\gamma $, where $\gamma_{min}$ is the minimum value of $\gamma$ encountered in the ocean. The knowledge of the reference profile allows one to regard the volume $V(\gamma,t)$ of water masses with density lower than $\gamma$ either as a function of $z_r$ only as $V(z_r)$ so that $V(\gamma,t) = V(z_r(\gamma,t))$. Physically, Eq. (\ref{reference_zr}) defines the reference depth $z_r(\gamma,t)$ so that the volume of water with density lower than $\gamma$ is equal to the volume of water comprised between the ocean surface and $z_r$; this definition is equivalent to that used by \citet{winters1996diascalar} or \citet{Saenz:2015vo} to construct Lorenz reference state, but generalised here to the case of an arbitrary materially conserved density variable $\gamma(S,\theta)$. Once $z_r(\gamma,t)$ is constructed, it can be inverted to define in turn the reference profile $\gamma_r(z_r,t)$. Indeed, by definition $\gamma_r(z_r({\bf x},t),t)=\gamma^*({\bf x},t)$. As a result, we can always write a relation such as: \begin{equation}\label{zzr} \nabla \gamma=\frac{\partial \gamma_r}{\partial z_r} \nabla z_r \end{equation} A major difference with \citet{winters1996diascalar} or \citet{griffies2000spurious} is that our definition of reference depth and density is not restricted to Lorenz reference state, for it can be applied to any arbitrary $\gamma(S,\theta)$. However, the choice of $\gamma(\theta,S)$ influences the local projection of the iso-dianeutral diffusion on the $\gamma$ gradient and thus the effective diapycnal coefficient. We now define the effective diffusivity $K_{\rm eff}$. Using (\ref{zzr}) in (\ref{eff2}), we get: \begin{equation}\label{eff3} F_{\rm eff}=-\int_{\gamma=\rm const} |\nabla\gamma|K_i\sin^2(\nabla \gamma ,{\bf d}) dS=\frac{\partial \gamma_r}{\partial z_r} \int_{z_r=\rm const} |\nabla z_r|K_i\sin^2(\nabla z_r ,{\bf d}) {\rm d}S= A(z_r) K_{\rm eff} \frac{\partial \gamma_r}{\partial z_r} , \end{equation} where we have used $|\nabla \gamma|=-\frac{\partial \gamma_r}{\partial z_r} |\nabla z_r|$ (because $\frac{\partial \gamma_r}{\partial z_r}<0$) and where $K_{\rm eff}$ is defined by the following relation: \begin{equation}\label{keffs1} K_{\rm eff}(z_r)=\frac{\int_{z_r=\rm const}K_i|\nabla z_r|\sin^2(\nabla z_r ,{\bf d}){\rm d} S}{A(z_r)} , \end{equation} and is independent of the gradient of $\gamma_r$ in the reference space. $K_{\rm eff}$ is not the surface average of the local mixing coefficient across $\gamma=\text{const.}$ surfaces but rather the mixing coefficient linked to the time variation of $\gamma_r$ as can be seen from the following equation (a proof is shown in the appendix): \begin{equation}\label{eqgammar} \frac{\partial\gamma_r}{\partial t}=\frac{1}{A(z_r)}\frac{\partial }{\partial z_r}\left(A(z_r)K_{\rm eff}(z_r)\frac{\partial \gamma_r}{\partial z_r}\right)+\text{NL}+\text{F} \end{equation} where NL is a term due to the non linearity of $\gamma(S,\theta)$ and $F$ is a term due to the heat and haline fluxes at the ocean surface. Note that in \citet{Speer:1997am} and in \citet{lumpkin2007global}, the effective diffusivity is defined as the integral of the local diapycnal flux on a $\gamma$ surface over the integral of the local gradient of $\gamma$ on the same $\gamma$ surface i.e.: \begin{equation}\label{speerK} K_{\rm eff}^{\rm speer}=\frac{\int_{z_r=\rm const}K\nabla \gamma\cdot \mathbf n dS}{\int_{z_r=\rm const}\nabla \gamma \cdot \mathbf n dS} \end{equation} is different from our formulation because of the different mean gradient formulation. The relationship between the $K_{\rm eff}$ described in this article (a generalization of \citet{winters1996diascalar}'s formulation) and $K_{\rm eff}^{\rm speer}$ is, from formula (\ref{keffs1}) and (\ref{speerK}): \begin{equation}\label{KeffspeerK} K_{\rm eff}=K_{\rm eff}^{\rm speer}\left(\frac{\int_{z_r=\rm const}|\nabla z_r|dS}{A(z_r)}\right). \end{equation} We have checked that for all the density variables under consideration here the quantity between brakets in (\ref{KeffspeerK}) is smaller than 1 so that $K_{\rm eff}$ can be seen as a lower bound of $K_{\rm eff}^{\rm speer}$. In \citet{lee2002spurious}, the effective diapycnal coefficient formulation is similar to \citet{Speer:1997am}'s except that the mean gradient is approximated by an average of the vertical gradient of $\gamma$ on a $\gamma$ surface which is valid as long as the $\gamma$ slope is small. \section{Isoneutrally-controlled effective diapycnal diffusivities for $\sigma_0$, $\sigma_2$, $\sigma_4$, $\gamma^n$ and $\rho_{ref}$} In this section we seek to estimate the effective diffusivity (\ref{keffs1}) derived in the previous section for five different density variables: $\sigma_0$, $\sigma_2$, $\sigma_4$, the \citet{Jackett:1997ff}'s $\gamma^n$ and the Lorentz reference density $\rho_{ref}$ obtained with \citet{Saenz:2015vo} method. All the calculation of this section are performed with annual mean potential temperature and salinity data from the World Ocean Circulation Experiment \citep{gouretski2004woce}. Since $\gamma^n$ is not well defined North of 60$^{\circ}$ N, the latter region was excluded from our analysis for all five density variables. Since eddies mix the fluid horizontally in the mixed layer rather than perpendicular to the neutral vector, we also restrict our calculation to the ocean below the mixed layer. The depth of the mixed layer is given by the de Boyer Mont\'egut database \citep{de2004mixed}. The reference density for each of the five variables is shown on figure \ref{f1}. \begin{figure}[t] \begin{center} \noindent\includegraphics[width=29pc,angle=0]{rhoeff_comp.pdf}\\ \caption{Reference density for $\rho_{ref}$ (black) $\gamma^n$ (red), $\sigma_0$ (blue), $\sigma_2$ (yellow) and $\sigma_4$ (green) as a function of the reference depth.}\label{f1} \end{center} \end{figure} As expected, the range of values taken by the reference density of the three potential density variables increases with the reference pressure. $\gamma^n$ has a reference density similar to that of $\sigma_0$ with a slightly smaller gradient in the reference space. $\rho_{ref}$ has a gradient much smaller than all other density variables. It crosses $\sigma_0$ at the surface, $\sigma_2$ around $-2000$ meters and $\sigma_4$ around $-4000$ meters. This is due to the fact that the volume above the surface $\sigma_p(\theta,S)=\sigma_{p}^{r}(Z)$ is by definition the same as the volume above $\rho(\theta,S,p)=\rho_{ref}(Z)$ where $p=-Z\rho_0 g$ is the reference pressure linked to the reference depth $Z$, $\sigma_{p}^{r}$ is the reference density linked to $\sigma_p$. \\ Figure \ref{f2} shows the histogram of the decimal logarithm of the squared sinus of the angle between $\nabla \gamma$ and ${\bf d}$ ( calculated using formula \ref{app}) shown in appendix A): $\log_{10}[\sin^2\left(\nabla \gamma,{\bf d}\right)]$ and weighted by the volume associated with each point. This plot is similar to that discussed by \cite{mcdougall2005assessment} in their discussion of fictitious diapycnal mixing. \begin{figure}[t] \begin{center} \noindent\includegraphics[width=29pc,angle=0]{sinus_comp_weight.pdf}\\ \caption{histogram of the decimal logarithm of the squared sinus between the gradient of $\gamma$ and the neutral vector ${\bf d}$ weighted by the volume of each point. $\log_{10}\left(\sin^2\left(\nabla\gamma,{\bf d}\right)\right)$ for $\rho_{ref}$ (black), $\gamma^n$ (red), $\sigma_0$ (blue), $\sigma_2$ (yellow) and $\sigma_4$ (green) }\label{f2} \end{center} \end{figure} $\rho_{ref}$, $\sigma_2$ and $\sigma_4$ give similar angles with most of their values slightly larger than $10^{-5}$. $\gamma^n$ gives the smallest angles among the variables under consideration here with most of its values smaller than $10^{-5}$ while $\sigma_0$ gives the largest with a large number of points with values larger than $10^{-4}$. All together, these observations could suggest that the effective diffusivity of $\gamma^n$ should be the smallest overall, that the effective diffusivity of $\rho_{ref}$ should be of the same order as that for $\sigma_2$ and $\sigma_4$, and that the effective diffusivity for $\sigma_0$ should be the largest of all. It is however hard to predict the values of the effective diffusivity coefficient for each density variable from figure \ref{f2} only since the small amount of point with very large angle values (hardly visible on figure \ref{f2}) could overcome the large amount of points with small angles and since the spatial variability of the isoneutral mixing coefficient could correlates with the spatial variability of the angle. We thus calculate the effective diffusivity coefficient using these angles values for each density variable.\\ Figure \ref{f4} shows the decimal logarithm of the effective diffusivity $K_{\rm eff}$ for the five variables as a function of the reference depth under two possible choices of $K_i$:\\ \begin{figure}[t] \begin{center} \noindent\includegraphics[width=29pc,angle=0]{Keff_all.pdf}\\ \caption{$\log_{10}$ of the effective diapycnal diffusivity coefficient $K_{\rm eff}$ as a function of the reference depth (meters) (and as defined by equation (\ref{keffs1})) for $\rho_{ref}$ (black), $\gamma^n$ (red), $\sigma_0$ (blue), $\sigma_2$ (yellow) and $\sigma_4$ (green). Each panel correponds to a $K_{\rm eff}$ calculated with different isoneutral diffusivity coefficient. A: $K_{iso}=1000$ $\text{m}^2/\text{s}$, B: variable isoneutral diffusivity coefficient given by \citet{forget2015observability}. Bottom same as B but without 5\% of the largest angles (C) }\label{f4} \end{center} \end{figure} The first case (A, figure \ref{f4}) assumes a constant isoneutral coefficient: $K_{i}=1000$ $\text{m}^2/\text{s}$. Under this assumption, $K_{\rm eff}$ for every density variables increases on average with the reference depth from values between $10^{-12}$ and $10^{-8}$ $\text{m}^2/\text{s}$ close to surface reference depth to values between $10^{-6}$ and $0$ $\text{m}^2/\text{s}$ at the deepest reference depths. This increase can be attributed to the fact that the largest discrepancy between the neutral vector and the gradients of the 5 density variables is generally located in the ACC (Antarctic Circumpolar Current) (as will be shown later) where the highest densities, and thus deepest reference depths, outcrop. \\ $K_{\rm eff}$ for $\gamma^n$ and $\sigma_0$ are similar between 0 and 800 m depth with values ranging from $10^{-8}$ $\text{m}^2/\text{s}$ at the surface to $10^{-6}$ $\text{m}^2/\text{s}$ at -800 meters. $\sigma_2$, $\sigma_4$ and $\rho_{ref}$ give values up to 100 larger on the same depth range. Between 800 and 4000 m depth, $\gamma^n$ gives the smallest $K_{\rm eff}$ which is slowly increasing from $10^{-6}$ to $10^{-5}$ $\text{m}^2/\text{s}$ as the depth decreases. On the same depths, $\rho_{ref}$, $\sigma_0$, $\sigma_2$ and $\sigma_4$ gives values at least 10 times larger (up to 1000 times larger for $\sigma_0$ below -2000 m). Below 4000 m depth, all density variables gives $K_{\rm eff}$ larger than $10^{-4}$ $\text{m}^2/\text{s}$. At the deepest levels, under -5000 meters, $\sigma_0$ and $\rho_{ref}$ give smaller $K_{\rm eff}$ than $\gamma^n$.\\ The second case (B, figure \ref{f4}) assumes a spatially variable isoneutral coefficient given by the inverse calculation of \citet{forget2015observability}, which gives a three dimensional distribution of $K_i$ at about 1$^{\circ}$ resolution for the global ocean. This database contains values ranging from 9000 $\text{m}^2/\text{s}$ (in the Atlantic deep water formation zone at the surface, in western boundary currents and ACC) to values close to 0 (in the deep pelagic ocean). The estimated $K_{\rm eff}$ for this choice are very close to those obtained under the previous assumption of constant diffusivity for all variables, showing the small sensitivity of our results to spatial variations of isoneutral diffusion. The following calculations are based on the use of a spatially varying $K_i$. To investigate the importance of the localised large departure from neutrality in the construction of $K_{\rm eff}$, we removed 5\% of the largest non-neutral values of the angle for each reference surface (figure \ref{f4}, case C). Without 5\% of the largest values, $K_{\rm eff}$ is much smaller than the previous one for every density variables with values everywhere smaller than $10^{-4}$ $\text{m}^2/\text{s}$. As before, the effective diffusivity increases rapidly close to the surface and then more slowly below -1000 meters (except at a few depth for $\sigma_2$, $\sigma_4$ and at deep reference depth for $\rho_{ref}$ and $\sigma_0$) with the reference depth for all density variables. $\gamma^n$ gives the smallest values for almost all reference depths, with values from $10^{-10}$ $\text{m}^2/\text{s}$ close to the surface of the reference space to $10^{-6}$ $\text{m}^2/\text{s}$ at the deepest levels. $\sigma_2$ gives the second smallest values for reference depths smaller than -1500 meters but is overtaken by $\sigma_0$ and $\rho_{ref}$ at larger depths. $\rho_{ref}$,$\sigma_0$, $\sigma_2$ and $\sigma_4$ all give effective diffusivities of the order or larger than $10^{-5}$ $\text{m}^2/\text{s}$ at some depth below -2000 meters.\\ This calculation shows that the isoneutral contribution to effective diapycnal mixing is very localised spatially with 5\% of each surface accounting for most of the effective diffusivity for all the density variables under consideration here. However, even without this top 5\%, $K_{\rm eff}$ remains close or above $10^{-5}$ $\text{m}^2/\text{s}$ for all variables except $\gamma^n$.\\ Figure \ref{f3} shows a meridional section of the decimal logarithm of the sinus in the Atlantic for $\rho_{ref}$, $\gamma^n$ and $\sigma_0$. \begin{figure}[t] \begin{center} \noindent\includegraphics[width=29pc,angle=0]{SINUS_atl.pdf}\\ \caption{Decimal logarithm of the sinus between the neutral vector and the gradient of $\rho_{ref}$ (top), $\gamma^n$ (middle) and $\sigma_0$ (bottom) as a function of latitude and depth at 330 of longitude (in the Atlantic).}\label{f3} \end{center} \end{figure} The regions where the angle between the neutral vector and the gradient of the density variable is large are found mostly in the ACC at all depth for $\rho_{ref}$ and $\gamma^n$ and everywhere at depth for $\sigma_0$, suggesting that, in this region, all the density variables studied above introduce significant biases in the estimation of diapycnal mixing.\\ \conclusions In this paper, we have presented a new framework for assessing the contribution of isoneutral diffusion to the effective diapycnal mixing coefficient $K_{\rm eff}$ for five different density variables, chosen for their widespread use in the oceanographic community, namely $\gamma^n$,$\rho_{ref}$, $\sigma_0$, $\sigma_2$, $\sigma_4$. Our results reveal that, due to the projection of the isoneutral mixing on the diapycnal direction, the actual diapycnal mixing experienced by each density variable can reach values as high as $10^{-4}$ $\text{m}^2/\text{s}$ and up to 1 $\text{m}^2/\text{s}$ for reference depths deeper than -2000 meters. As expected, $\gamma^n$, constructed to be as neutral as practically feasible, is the least affected by isoneutral diffusion among all density variables considered. Nevertheless, it still appears to experience values larger than $10^{-4}$ $\text{m}^2/\text{s}$ for reference depths below -4000 meters. An added difficulty pertaining to the use of $\gamma^n$, not discussed in this paper, stems from its non-material character. As a result, the validity of defining an effective diapycnal diffusivity for $\gamma^n$ using the present approach depends on such non-material effects to be small, or at least much smaller than the contribution from isopycnal diffusion discussed here, which is difficult to evaluate. \\ Our results thus suggest that the potential contamination due to isoneutral mixing should always be assessed for any inference of diapycnal mixing based on the use of any density variable $\gamma(S,\theta)$ in Walin-like water mass analysis for instance. In agreement with previous studies such as \citet{mcdougall2005assessment}, the regions of large discrepancy between the neutral vector and the gradient of each surface are very localised in space. However, while representing a very small amount of volume of the ocean, these discrepancies are important in setting the effective diffusivity values. Indeed, only 5\% of the largest values on each reference surface explain of the estimated effective diffusivity coefficients. Without these 5\%, none of the variables gives a coefficient larger than $10^{-4}$ $\text{m}^2/\text{s}$. The concentration of discrepancies is even stronger for $\gamma^n$ since the effective diffusivity coefficient after the removal of the 5\% of the largest values decreases below $10^{-6}$ $\text{m}^2/\text{s}$. Similarly, our results show that the evaluation of effective diapycnal mixing using a sorting algorithm of density (e.g. \citet{griffies2000spurious,ilicak2012spurious}), which amounts to diagnosing the diapycnal flux through $\rho_{ref}$, is likely to be significantly contaminated by isoneutral diffusion owing to the large departures from neutrality of $\rho_{ref}$ in the polar regions if a nonlinear equation of state is used. Note that this is a distinct effect from the density sinks and sources due to the non-linear equation of state influencing the time variation of the reference density (see equation (\ref{eqgammar})) which are also a source of contamination of the diapycnal flux from the isoneutral diffusion when using sorting algorithm. It follows that diagnosing the spurious diapycnal mixing resulting from numerical advection schemes for a nonlinear equation of state remains an outstanding challenge, and that progress on this topic must take into account the theoretical considerations developed here. \\ This work advocates for the construction of a density function $\gamma(\theta,S)$ that would minimizes the isoneutral influence on the effective diapycnal diffusivity coefficient. So far, the best material density variable is a function of Lorenz reference density, as showed by Tailleux (2016a), but as discussed by \cite{tailleuxdir}, it appears theoretically possible to construct an even more neutral one. Whether \cite{klocker2009new} can be used for global inversions is unclear, because its improved neutrality might be achieved at the expenses of materiality, which remains to be quantified.\\ In theories of the Atlantic Meridional Overturning Circulation (AMOC) (e.g. \citet{Vallis:2000li,Wolfe:2010hs,Nikurashin:2011ec,Nikurashin:2012lh}) the diapycnal diffusion coefficient is generally assumed to be given by the dianeutral coefficient and to be of the order of $10^{-5}$ $\text{m}^2/\text{s}$. However, our results suggest that even when isopycnals are given by a density variable close to the neutral vector (e.g. with $\gamma^n$), the effective diapycnal coefficient can be much larger than the dianeutral coefficient because of the isoneutral diffusion. The issue of the amount of diapycnal mixing is an important one, as illustrated for instance by \citet{Nikurashin:2012lh} who showed that low and large diapycnal coefficient give two different regimes of the AMOC and thus possibly two different evolution under climate change. Obviously this effect appears only when the equation of state for density is a non-linear function of both temperature and salinity we thus argue that future work should consider such non-linear equation of state for density.
\section{\@startsection {section}{1}{\z@}{1.0ex plus 1ex minus .2ex}{.2ex plus .2ex}{\large\bf}} \def\subsection{\@startsection {subsection}{2}{\z@}{.2ex plus 1ex} {.2ex plus .2ex}{\@setsize\subsize{12pt}\xipt\@xipt\bf}} \makeatother \iffalse \newcommand{\Section}[1]{\vspace{-8pt}\section{\hskip -1em.~~#1}\vspace{-3pt}} \newcommand{\SubSection}[1]{\vspace{-3pt}\subsection{\hskip -1em.~~#1} \vspace{-3pt}} \fi \newcommand{\Section}[1]{\section{\hskip -1em.~~#1}} \newcommand{\SubSection}[1]{\subsection{\hskip -1em.~~#1}} \def\@listI{% \leftmargin\leftmargini \partopsep 0pt \parsep 0pt \topsep 0pt \itemsep pt \relax } \long\def\@makecaption#1#2{ \vskip -5pt \setbox\@tempboxa\hbox{\small{#1\,:\,#2}} \ifdim \wd\@tempboxa >\hsize \unhbox\@tempboxa\par \else \hbox to\hsize{\hfil\box\@tempboxa\hfil} \fi \vskip -0.2cm} \jot=0pt \abovedisplayskip=3pt \belowdisplayskip=3pt \abovedisplayshortskip=0pt \belowdisplayshortskip=0pt \title{Unsupervised Body Part Regression via Spatially Self-ordering Convolutional Neural Networks} \name{Ke Yan ~~~~~~Le Lu ~~~~~~Ronald M. Summers} \address{Imaging Biomarkers and Computer-Aided Diagnosis Lab, Clinical Image Processing Service \\ Radiology and Imaging Sciences, National Institutes of Health Clinical Center} \begin{document} \maketitle \begin{abstract} Automatic body part recognition for CT slices can benefit various medical image applications. Recent deep learning methods demonstrate promising performance, with the requirement of large amounts of labeled images for training. The intrinsic structural or superior-inferior slice ordering information in CT volumes is not fully exploited. In this paper, we propose a convolutional neural network (CNN) based Unsupervised Body part Regression (UBR) algorithm to address this problem. A novel unsupervised learning method and two inter-sample CNN loss functions are presented. Distinct from previous work, UBR builds a coordinate system for the human body and outputs a continuous score for each axial slice, representing the normalized position of the body part in the slice. The training process of UBR resembles a self-organization process: slice scores are learned from inter-slice relationships. The training samples are unlabeled CT volumes that are abundant, thus no extra annotation effort is needed. UBR is simple, fast, and accurate. Quantitative and qualitative experiments validate its effectiveness. In addition, we show two applications of UBR in network initialization and anomaly detection. \end{abstract} \begin{keywords} Body Part Recognition, Unsupervised Learning, Convolutional Neural Network, Slice Ordering \end{keywords} \section{Introduction} \label{sec:intro} Body part recognition is ubiquitously useful in medical image applications, such as automatic scan range planning and providing body spatial priors to initialize computer aided detection (CADe) and diagnosis (CADx) systems, and so on \cite{yan2016multi}. Traditional methods normally use hand-crafted image classification features \cite{yan2016multi}. Lately, deep learning approaches \cite{yan2016multi, roth2015anatomy, Zhang2017SelfSup} have been adopted with promising results where Convolutional neural networks (CNN) are employed to learn deep image features. However, large amounts of manually labeled training image data are required \cite{yan2016multi, roth2015anatomy, Zhang2017SelfSup}. Recently, Zhang et al.\ \cite{Zhang2017SelfSup} propose a self-supervised method that permits pre-training a CNN model in an unsupervised manner. Nevertheless, it still needs fine-grained labeled CT slices to supervisedly fine-tune the network, before predicting labels of anatomical body parts. In this paper, we present an Unsupervised Body part Regression or Regressor (UBR) that entirely learns from unlabeled CT volumes. The training volumes can have any scan range (chest, abdomen, pelvis, etc.), hence are abundant in every hospital's picture archiving and communication system (PACS). The superior-inferior slice ordering information is leveraged to train UBR. This intuition somewhat resembles the unsupervised pre-training scheme \cite{Zhang2017SelfSup} but our training procedure, network structure, and loss function are all different. UBR is also more efficient, accurate from our empirical evaluation and requires no labeled CT images completely. By minimizing an order loss and a distance loss, UBR learns the body part knowledge from inter-slice relationships in a self-organization process (defined as ``some overall order arises from local interactions between parts of an initially disordered system'' \cite{wikiSO}). Most previous work splits the whole body into several discrete anatomical parts \cite{yan2016multi, roth2015anatomy}, which may be hard to be precisely defined (problematic at transition regions \cite{roth2015anatomy}) and have limitations or constraints on different applications. More importantly, they cannot discriminate slices inside a part. In contrast, UBR is a continuous-valued regressor. It builds an axial coordinate system for the body and outputs a continuous score for each slice, which represents the normalized position of the body part in the slice. Thus, it is fine-grained and useful for identifying different parts of the body. Experimental results show that it outperforms \cite{Zhang2017SelfSup} where 88 extra labeled CT volumes are required to fine-tune. Besides body part recognition, we demonstrate two other applications of UBR: CNN weight transfer learning in a CADe task; and detection of significant anomalies in CT volumes (e.g., scan artifacts or large lesions). \section{Method} \label{sec:method} {\bf Motivation:} Volumetric medical images are intrinsically structured where the position and appearance of organs are relatively aligned. Our idea is to predict a continuous score for each axial CT slice as the normalized body coordinate value. As the image slice index in a volume increases (in the superior-inferior order), the predicted body coordinate scores should become larger accordingly. Note that the image volumes extracted from PACS often have different scan ranges (e.g., start, end, and inter-slice intervals), hence the slice indices cannot be directly used as slice scores or as labels to learn the scores. In this paper, we enforce the deeply learned regressor to obey the spatial superior-inferior ordering as a hard constraint. In addition, any numeric difference of the UBR predicted slice scores should be approximately proportional to the spatial distance between slice indices. Following this intuition, we propose the unsupervised body part regressor (UBR), see \Fig{framework}. \begin{figure}[htb] \begin{minipage}[b]{1.0\linewidth} \centering \centerline{\includegraphics[width=8.5cm,trim=120 90 230 120,clip]{framework.pdf}} \end{minipage} \caption{Framework of the proposed unsupervised body part regression (UBR).} \label{fig:framework} \end{figure} {\bf Selection of Training Samples:} In each training iteration, we randomly select $ g $ volumes, then randomly pick $ m $ equidistant slices from each selected volume. A starting slice $ j $ and a slice interval $ k $ are also randomly determined (\Fig{framework}). {\bf Network Architecture:} The first few layers of the network include convolution, rectified linear unit (ReLU), and max pooling. The parameters can be directly adopted from ImageNet pre-trained CNN models, e.g., the conv1--conv5 in AlexNet \cite{Krizhevsky2012AlexNet} or VGG-16 \cite{Simonyan2015Vgg}. After these layers, we add a new convolutional layer, Conv6, with 512~1$ \times $1 filters and stride 1, followed by a ReLU layer. Conv1--Conv6 are used to learn discriminative deep image features for body part recognition. Then a global average pooling layer is attached to summarize each of the 512 activation maps to one value, leading to a 512D feature vector. It makes the network structure robust to the position of the body in the slice. At last, a fully connected layer (Fc7) projects the feature vector to the slice score. {\bf Loss Function:} The loss function is critical for the proposed unsupervised deep learning method. We learn the ordering relationship between slice scores as a surrogate which can be obtained for free, so annotated anatomical labels \cite{roth2015anatomy,yan2016multi} are not required. A similar idea is to use the Siamese network \cite{bromley1994siamese}, but we have extended it by using more than two samples as a group and adopting two inter-subject loss terms. Experimental results in Section \ref{sec:exp} will demonstrate the superiority of our proposed strategies. The first loss term is the order loss $ L_{\rm order} $, which requires slices with larger indices to have larger scores. As expressed in \Eq{orderLoss}, $ L_{\rm order} $ is a logistic loss. $ g $ is the number of CT volumes in a mini-batch; $ m $ is the number of image slices in each volume; $ S(i,j) $ is the slice score of slice $ j $ in volume $ i $; $ h $ is the sigmoid activation function. \begin{equation} \label{eq:orderLoss} L_{\rm order}=-\sum_{i=1}^g{\sum_{j=1}^{m-1}{\log h\left(S(i,j+1)-S(i,j)\right)}}. \end{equation} Besides keeping the qualitative order of the regressed slice scores, we also constrain them to increase linearly. The numeric difference between two slice scores should be proportional to the physical distance between the two images. Because we intentionally pick the sets of equidistant slices (e.g., slices $ j, j+k, j+2k, \ldots $), the slice scores should be equidistant as well. The distance loss is thus defined as: \begin{equation}\label{eq:distLoss} \begin{aligned} L_{\rm dist} =& \sum_{i=1}^g{\sum_{j=1}^{m-2}{f(\Delta_{i,j+2}-\Delta_{i,j+1})}}, \\ \Delta_{i,j} =&\, S(i,j)-S(i,j-1), \end{aligned} \end{equation} where $ f $ is the smooth L1 loss \cite{Ren2015Faster}. The final loss is \begin{equation}\label{eq:finalLoss} L = L_{\rm order} + L_{\rm dist}. \end{equation} In the training process, the order loss and distance loss terms collaborate to ``push'' each slice score towards the correct direction relative to other slices. If the order loss does not exist, a trivial solution may be obtained where all slice scores are constant. If the distance loss is absent, the slice scores will be nonlinear and less accurate. \section{Experiments} \label{sec:exp} {\bf Datasets and Implementation Details:} We collect 800 random unlabeled CT volumes of 420 subjects from our hospital PACS as our UBR training dataset. Volumes are in the range of 30$\sim$700 slices each. Most volumes are chest-abdomen-pelvis scans and the exact body scan ranges are not used during training. The testing set includes 18,195 CT slices randomly sampled from 260 CT volumes of 140 new subjects. To assess the UBR's quantitative performance, each testing slice is manually labeled as one of the 3 common classes: chest (5903 slices), abdomen (6744), or pelvis (5548). The abdomen class starts from the upper border of the liver and ends at the upper border of the ilium. The proposed method can be easily extended to recognize other parts of the body. The data have various pixel spacings (0.6--1.0 mm), reconstruction kernels, and pathological conditions. As shown in \Fig{framework}, the layers Conv1--Conv5 of UBR are the same as those in VGG-16 \cite{Simonyan2015Vgg}, initialized using the ImageNet \cite{Feifei09ImageNet} pre-trained model. Conv6 and Fc7 are trained from scratch where the number of volumes per mini-batch is set $g=12$ and the number of sampled slices per volume $m=8$. The UBR network is trained using stochastic gradient descent with the initial learning rate 0.002 and converged in 1.5K iterations, taking only 12 min on a Titan X Pascal GPU. The inference time per slice is 4 ms. \subsection{Qualitative and Quantitative Results} \label{ssec:res_detail} Under our defined loss function (\Eq{finalLoss}), the UBR output scores mostly range between -15 and 15. \Fig{query_res} illustrates some qualitative results. It can be observed that the deeply learned regression scores and human anatomical body parts correspond well (-10: upper chest, -5: liver dome, 0: lower abdomen, 5: lower pelvis). UBR is also robust to the varying position, size and pathological conditions (e.g., row 1 column 1, atypical presentation of bowel in the chest) of the human body. \begin{figure}[] \begin{minipage}[b]{1.0\linewidth} \centering \centerline{\includegraphics[width=8.2cm]{query_res.png}} \end{minipage} \caption{Sampled slices with slice scores close to -10, -5, 0, and 5, respectively. Images in the same row show similar scores and body parts (randomly picked from the testing set). The numbers above each slice are UBR regressed scores.} \label{fig:query_res} \end{figure} To evaluate the quantitative performance of UBR, we classify the testing slices into three classes only based on the UBR regressed slice scores. Two extra validation CT volumes are used to determine two thresholds to separate three body zones. We also implement two methods for baseline comparison: supervisedly training a 3-class classifier using the labeled slices, similar to \cite{roth2015anatomy}; and the self-supervised method in \cite{Zhang2017SelfSup}. It first pre-trains the network with unlabeled slice pairs, then fine-tunes the network with fine-grained labeled volumes to learn slice scores. In the pre-training stage, \cite{Zhang2017SelfSup} concatenates the Fc6 features of two slices to predict the order relationship between the slices. It cannot use the multi-slice order loss or distance loss. We calibrate two thresholds for it like UBR. Note that both \cite{roth2015anatomy} and \cite{Zhang2017SelfSup} require labeled samples in training, so we further manually annotated 88 volumes from 88 new subjects to facilitate \cite{roth2015anatomy,Zhang2017SelfSup}. The performance comparison results are displayed in Table \ref{tbl:acc}. \begin{table} \centering \setlength{\tabcolsep}{5pt} \renewcommand{\arraystretch}{1.2} \begin{tabular}{ll} \hline Method & Acc. (\%) \\ \hline Supervised \cite{roth2015anatomy} with 88 labeled volumes & 98.84 \\ Self-supervised \cite{Zhang2017SelfSup} with 88 labeled volumes & 95.28 \\ Self-supervised \cite{Zhang2017SelfSup} with 2 labeled volumes & 72.05 \\ UBR with 2 labeled volumes & 95.99 \\ UBR (AlexNet) with 2 labeled volumes & 95.61 \\ UBR, pool6 features with 88 labeled volumes & 98.41 \\ \hline \end{tabular} \caption{Accuracy comparison for body part classification.} \label{tbl:acc} \end{table} The supervised classification similar to the method of \cite{roth2015anatomy} achieves the highest accuracy of 98.84\%. However, this method needs extra 88 labeled volumes for training. In addition, it is dedicated to classification, which is arguably an easier task than the fine-grained regression in \cite{Zhang2017SelfSup} and UBR. Using only 2 labeled volumes to calibrate thresholds on the regression score, UBR outperforms the self-supervised approach \cite{Zhang2017SelfSup} which are fine-tuned with 88 labeled volumes (95.99\% versus 95.28\%). The classification accuracy of fine-tuning the network of \cite{Zhang2017SelfSup} with only two extra labeled volumes (as the same condition of UBR) is noticeably inferior (only at 72.05\%). Finally, we explore using the 512D feature vector from pool6 of UBR to train a logistic regressor on the 88 labeled volumes. An improved accuracy is obtained of 98.41\%. The pool6 features contain information related to body parts, and can be used to train a more complex classifier when labeled samples are presented. To analyze the classification errors when using UBR scores, we draw the histogram of slice scores in each class in \Fig{results} (a). It can be found that most classification errors appear at transition regions because of their intrinsic ambiguity. This will not be a problem in practice since UBR predicts continuous body coordinate scores. The scores for certain body parts may become inaccurate if there are too few slice samples of these parts existing in our UBR (unlabeled) training dataset. \begin{figure*}[t] \centerline{ \begin{tabular}{ccc} \includegraphics[width=0.30\linewidth]{score_hist.pdf} & \includegraphics[width=0.30\linewidth]{param1.pdf} & \includegraphics[width=0.30\linewidth]{deeplesion.pdf} \\ (a) & (b) & (c)\\ \end{tabular} } \caption{(a) Histogram of slice scores in each class in the test set; (b) Accuracy of body part classification of UBR with different parameters; (c) Detection accuracy with different initialization methods on the validation set of the DeepLesion dataset \cite{Yan2017DeepLesion}. } \label{fig:results} \end{figure*} Choosing a proper $ m $ can improve the body part recognition accuracy, as indicated by \Fig{results} (b). When increasing $ m $, we also decrease $ g $ to keep $ m\times g=96 $. If $ m=2 $, the distance loss cannot be applied and the order loss is the same with \cite{Zhang2017SelfSup}. Its result is inferior than those with $ m>2 $, proving the effectiveness of the proposed multi-slice strategy. With more CT slices per group, the inter-slice relationship can be better regulated, especially when the distance loss is absent. Incorporating the distance loss (\Eq{finalLoss}) can also increase the accuracy, especially with $m \leq 12$. When there are too many slices per group ($m \geq 16$) to maintain the distance loss, this constraint may become overly strict to be more effective. \subsection{Applications} \label{ssec:app_init} {\bf Transfer learning} is very critical for deep learning based medical image problems. Medical datasets are often at small scales versus the huge numbers of parameters in deep neural network models so that training a CNN from scratch can be challenging. \cite{greens2016overview, Shin2016TMI} have found that initializing the network weights adopted from ImageNet \cite{Feifei09ImageNet} pre-trained CNN models is an effective strategy. In this section, we explore the feasibility of using the trained UBR network on the initialization of CNNs for a new CAD task, using DeepLesion dataset \cite{Yan2017DeepLesion}. It contains 32120 CT slices of size 512$ \times $512 from 10594 studies of 4459 unique patients where bounding-boxes are annotated by radiologists on each slice, marking a variety of lesions or tumors (e.g., lung nodules, lymph nodes, liver/kidney lesions and so on). We adopt the Faster RCNN \cite{Ren2015Faster} method (built upon VGG-16 network) for lesion detection as a binary problem (lesion vs.\ non-lesion). Four initialization strategies are exploited for DeepLesion: Random (training a Faster RCNN from scratch), UBR (using a UBR model trained from scratch to initialize Faster RCNN), ImageNet (using a VGG-16 model trained on ImageNet to initialize Faster RCNN), and ImageNet+UBR (first using an ImageNet model to initialize UBR, then using the fine-tuned UBR to initialize Faster RCNN). The learning rates start from 0.002 and are reduced by a factor of 10 in every 20K, 20K, 15K and 15K iterations, respectively. The detection accuracy on DeepLesion is described in \Fig{results} (c). The accuracy is the average recall of top-5 detections on each slice. A predicted box is treated as correct if the intersection-over-union measurement between itself and a ground-truth box is larger than 0.5. The performance of {\bf DeepLesion-UBR} is significantly better than {\bf DeepLesion-Random}. However {\bf DeepLesion-ImageNet} still outperforms {\bf DeepLesion-UBR}, probably because ImageNet \cite{Feifei09ImageNet} is a much extensive and labeled image dataset. The ImageNet pre-trained CNN model has learned very comprehensive sets of filters, especially those representing fine image texture features that are effective for detecting small lesions in CT images. Last, the doubly fine-tuned {\bf DeepLesion-ImageNet+UBR} scheme achieves higher initial accuracies (at 2.5K and 5K iterations) and a slightly improved final accuracy (74.82\% vs.\ 73.84\%), compared to {\bf DeepLesion-ImageNet}. The probable reason is that UBR can further familiarize {\bf DeepLesion-ImageNet} model with the statistics of CT images \cite{Yan2017DeepLesion}, and keep mostly the convolutional filters learned from ImageNet \cite{Feifei09ImageNet}. {\bf Anomaly Detection:} UBR is able to mine images with significant abnormal appearance (rare in the training set), such as scanning artifacts and large lesions. A simple method is to calculate and plot the body coordinate scores per slice in any CT scan (as $ y $-axis) against the slice indices (as $ x $-axis), to obtain a curve or trajectory. From the curve, we identify several volumes with abnormal non-smooth ``turns''. For the normal volumes (\Fig{anomaly} (a)), their plots are roughly linear with small noise variations indicating inter-subject variances. The initial and final ends of each curve represent the anatomical scan range and the slopes correlate with the slice intervals. We compute the correlation coefficient ($ r $) between the slice indices and slice scores. \Fig{anomaly} (b) is an exemplary abnormal volume with $ r < 0.99$. By manual examination, we find that this nonlinearity is caused by the ascitic fluid appeared in chest and abdomen (\Fig{anomaly} (c)). Besides, 15 volumes in the test set were found to have atypical scan directions (not monotonically from chest to pelvis). \begin{figure}[] \begin{minipage}[b]{1.0\linewidth} \centering \centerline{\includegraphics[width=8.5cm,trim=30 0 40 0,clip]{anomaly3.pdf}} \end{minipage} \caption{Examples of anomaly detection using UBR. (a). Slice score curves in 10 normal volumes. (b)--(c). Slice score curve and sample slice in an abnormal CT volume.} \label{fig:anomaly} \end{figure} \section{Conclusion} \label{sec:conclusion} In this paper, we present an Unsupervised Body part Regressor (UBR) that learns a normalized body coordinate system representing anatomical body parts from unlabeled CT scans. Our method is simple and effective, with zero manual annotation effort needed. Quantitative experimental results and two different applications or extensions have demonstrated its promising performance and good utilities. \bibliographystyle{IEEEbib}
\section{Introduction} \label{intro} The popularity of online coding tutorials such as Codecademy, Kahn Academy, and Code.org has risen dramatically in past years, reaching millions of people eager to learn to code. However, because these resources are discretionary and frequently lack the social and instructional support that classroom environments provide, learners often abandon them at high rates \cite{kizilcec_attrition_2015,lee_-game_2013}. There are many ways to encourage learners to continue learning in these tutorials. Prior work has investigated improving error message feedback \cite{lee_personifying_2011}, incorporating assessments to validate learners' understanding \cite{lee_-game_2013}, and tuning material difficulty \cite{gutl_attrition_2014}. These efforts have proven effective at increasing how far a learner gets through online materials before quitting. Unfortunately, some of the most effective strategies for increasing engagement are still limited to classroom environments. For example, one of the simplest and most powerful strategies is encouragement: when a learner is stuck, a few supportive words can promote further engagement, causing increases in self-efficacy and intrinsic motivation, especially to students who start with low self-efficacy for a skill \cite{hitz_praise_1988,stake_critical_2006,tuckman_effect_1991}. Encouragement can have positive effects on learning and engagement even when coming from software \cite{brown_positive_2014}, suggesting that it is the content and context of encouragement, and not who it comes from, that is important. Offering encouragement in coding tutorials poses many challenges. If encouragement is not timed well, it may interrupt learners' thoughts, causing them to lose their places in a difficult coding problem or exercise. Moreover, learners who are already engaged and successfully learning may perceive encouragement as annoying, condescending, or as a lack of confidence in their abilities, making them question whether they really are succeeding. This leaves designers of online coding tutorials between two extremes: if they always provide encouragement, they may annoy the majority of learners who are engaged; if they never provide encouragement, they fail to help learners who are likely to abandon the tutorial. Naive probabilistic models also have flaws: for a coding tutorial with a 10\% abandonment rate on each lesson, we could randomly predict that 1 in 10 learners would quit, but this would only correctly identify 1\% of learners about to leave. This would also unnecessarily encourage many learners. In this paper, we explore the feasibility of predicting which learners are likely to complete the next lesson of a tutorial, identify features of learner behavior that best inform this prediction, and examine whether these features show consistent positive or negative associations with abandonment. While these feasibility assessments do not yet directly explore the applications to encouragement in online tutorials, they provide a foundation for future efforts. \IEEEpubidadjcol \section{Related Work} \label{sec:related} \subsection{Dropout in Introductory Programming Courses} It is well established that introductory programming (CS1) courses in higher education have high dropout rates \cite{guzdial_teaching_2002,kinnunen_why_2006}. A worldwide survey on pass rates reported that, on average, only 67\% of students complete their CS1 course \cite{bennedsen_failure_2007}. Watson \& Li expanded on this study, finding that the mean pass rate of CS1 courses is 67.7\% and that pass rates have not improved over time \cite{watson_failure_2014}. Several studies have investigated the reasons for these pass rates. Kinnunen \& Malmi conducted interviews with 18 dropouts from a CS1 course at Helsinki University of Technology \cite{kinnunen_why_2006}, which showed that a lack of time and a lack of motivation were the key reasons for dropping out. These two factors are affected by perceived difficulty of the course and difficulties with time management. Other factors that influence dropout included gender, prior programming experience, students' attributions of success, learning style, mental model of programming, and self-efficacy \cite{ramalingam_self-efficacy_2004}. Some studies have attempted to predict dropout rates in CS1 courses based on these factors. Wilson \& Shrock examined twelve factors of success in a CS1 course \cite{wilson_contributing_2001}. They surveyed 105 students at a Midwestern university and found that ``comfort level,'' math knowledge, and attribution to luck were the most predictive of success. Similarly, Ventura Jr. found that a math background, prior programming experience, and gender have negligible predictive power in the success of a CS1 course, whereas student effort and comfort were the strongest predictors of success \cite{jr_identifying_2005}. Although researchers and educators have investigated student attrition in CS1 courses extensively, there is little consensus on which factors are most significant in predicting dropout. Moreover, many factors that appear to have significance in classroom contexts are more difficult to observe in online contexts, since they require measuring learners' social context, identity, and prior experience. \subsection{Dropout in MOOCs} Massive open online courses (MOOCs) have increased in popularity over the last few years, particularly those teaching computing. Of the many challenges that MOOCs face, one is the low user retention rates. Studies have shown that approximately 5\% to 15\% of students registered for a course complete it~\cite{ramesh_modeling_2013,taylor_likely_2014}. Studies of MOOC retention have many parallels to CS1 attrition rates. A survey of 134 MOOC users who dropped out showed that a majority of them reported changes in job, lack of time, content difficulty, and also a lack of difficulty as the reasons for leaving \cite{gutl_attrition_2014}. Kizilcec \& Halawa surveyed 550 respondents who were identified by a prediction model to be disengaged from a MOOC course. The results indicated non-behavioral characteristics such as gender, age, and geographical location were related to retention \cite{kizilcec_attrition_2015}. Statistical models of MOOC dropout have also demonstrated some reasons why learners quit a course. Factors include student demographic characteristics, self-reported commitments, features of forum discussion activities, course performance, and students' usage patterns \cite{balakrishnan_predicting_2013,ramesh_modeling_2013}. Adamopoulos \cite{adamopoulos_what_2013} applied logistic regression to model course completion with data from 842 students enrolled in 133 courses offered by 30 universities. His results showed that student perceptions of the instructor, assignments, and course material were the most significant predictors of retention. Hermans \& Aivaloglou also applied logistic regression to predict completion of a MOOC course that teaches young children programming and software engineering concepts. The prediction results showed that factors related to course performance had positive influence on completion, whereas parental involvement and being late joining the class had negative influence on completion \cite{hermans2017teaching}. However, these two studies treated dropout as a single categorical variable, rather than examining the likelihood of dropout at different points over time. Using survival analysis to model retention in a Coursera discussion forum over the entire course period on a weekly basis, Yang et al. found that social interactions among students in a MOOC affected dropout throughout the duration of the course \cite{yang_turn_2013}. Instead of focusing on factors captured during the course, Greene et al. used survival analysis to predict dropout based on self-reported features gathered prior to the course, finding that age, prior experience, and self-reported commitment had significant predictive power \cite{greene_predictors_2015}. A number of studies have used machine learning to predict MOOC dropout. Xing et al. used ensemble learning based on General Bayesian Network and Decision Tree algorithms with features generated from a MOOC discussion forum, achieving accurate identification of at-risk students; it did not examine which features best predicted abandonment \cite{xing_temporal_2016}. Halawa et al. designed a prediction model using behavioral data with MOOC materials, finding that students' lack of interest and lack of ability accounted for 60\% of high-risk students two weeks before dropout \cite{halawa_dropout_2014}. Taylor et al. carried out a study of 70 gigabytes of student usage logs including click-streams, forum posts, wiki revisions, and learner state information from a MOOC course \cite{taylor_likely_2014}. They extracted 25 predictive features using crowd-sourcing methods, and derived over 10 thousand models with various machine learning techniques on a per student and per week basis. Their model achieved a notably high AUC (area-under-the-curve of the receiver operating characteristic, a metric to evaluate a binary classifier system) of 0.95. Features related to homework submission, social interactions, and lab grades were the most predictive. \subsection{Abandonment in Coding Tutorials} There has been less work investigating dropout in online coding tutorials. Abandonment of tutorials is a slightly different problem, as learners who use tutorials are not necessarily making the same commitment as when enrolling in a course. Therefore, rather than using the word ``dropout,'' we prefer using the word ``abandon,'' which does not assume that someone using a tutorial has committed to learn. One of the most recent works on engagement in online coding tutorials is that by Lee et al. on the Gidget programming game \cite{lee_comparing_2015-1}. Lee investigated several strategies for preventing abandonment, including more personal errors \cite{lee_personifying_2011} and the inclusion of in-game assessments \cite{lee_-game_2013} -- both significantly increase engagement. Repenning et al. used their \textit{Retention of Flow} framework to analyze Hour of Code activity data collected from 5,512 student projects during CSEdWeek 2014, where students viewed a tutorial and built a Frogger game using an online programming environment. Their analysis showed that the loss of retention might result from cognitive, technical, and practical challenges \cite{repenning2016retention}. Outside programming, researchers have built predictive models of learners' motivational states in similar interactive learning environments \cite{cocea_eliciting_2007,qu_detecting_2005}, finding features related to help-seeking with manuals and tool-tips to have strong predictive power. These and other efforts from prior work have several implications for coding tutorial abandonment prediction. First, many of the most predictive features in prior work have concerned social, instructional, and motivational factors, all of which are difficult to detect in coding tutorials, especially if used anonymously. Moreover, the majority of studies have considered dropout at the \textit{end} of a course in learning, leaving open the possibility that early detection of dropout is not feasible. That said, prior work suggests that some behavioral features, such as different types of learners' actions, may be strong indicators of either engagement or disengagement. In this paper, we will assess the feasibility of predicting abandonment in an online coding tutorial, investigate which features, if any, are most predictive of abandonment, and how they influence a learner's decision to abandon the tutorial. \section{Method} In this section, we detail the online tutorial for which we predicted abandonment, introduce the dataset, and describe our classification approach. \begin{figure} \centering \includegraphics[width=0.45\textwidth]{gidget-interface.png} \caption{Gidget's Level 5, showing the code editor, level goals, objects in the world container, mission text, and runtime state. Gidget logs all interactions with all components.}\label{fig:gidget-interface} \end{figure} \begin{figure}[b] \centering \includegraphics[width=0.45\textwidth]{stay-rate2.png} \caption{Percent of learners remaining after each level (N = 5,038).}\label{fig:stay-rate} \end{figure} \subsection{The Gidget Programming Game} \begin{figure}[b] \centering \includegraphics[width=0.45\textwidth]{abandon-rate2.png} \caption{Learners' abandonment rate on each level, ranging from 0-34.3\%.}\label{fig:abandon-rate} \end{figure} \begin{table*} \caption{Features extracted for abandonment prediction.} \label{tab:features} \centering \begin{tabular}{@{}p{2.2cm}lp{7.8cm}l@{}} \toprule & FEATURE & DEFINITION & RATIONALE \\ \midrule \multirow{11}{*}{\begin{tabular}[c]{@{}p{2.2cm}@{}}\textbf{CUMULATIVE FEATURES}\\ Based on activities in the current and prior levels.\end{tabular}} & cml\_total\_dur & \begin{tabular}[c]{@{}p{8cm}@{}}Cumulative total non-idle time spent on all activities\end{tabular} & Indicates effort \\ & cml\_idle\_time & \begin{tabular}[c]{@{}p{7.8cm}@{}}Cumulative total idle-time lacking mouse and keyboard events\end{tabular} & Suggests disengagement \\ & cml\_code\_time & \begin{tabular}[c]{@{}p{7.8cm}@{}}Cumulative total time code editor had keyboard focus\end{tabular} & Suggests persistence \\ & cml\_test\_time & \begin{tabular}[c]{@{}p{7.8cm}@{}}Cumulative total time spent in program execution mode\end{tabular} & Suggests desire to succeed \\ & cml\_help\_time & \begin{tabular}[c]{@{}p{7.8cm}@{}}Cumulative total time focused on tutorial and reference guide\end{tabular} & Suggests desire to learn \\ & cml\_mission\_time & \begin{tabular}[c]{@{}p{7.8cm}@{}}Cumulative total time spent on reading mission texts\end{tabular} & Suggests engagement \\ & \begin{tabular}[c]{@{}l@{}}cml\_world\_time\end{tabular} & \begin{tabular}[c]{@{}p{7.5cm}@{}}Cumulative total time spent on world container\end{tabular} & Suggests engagement \\ & cml\_n\_restart & \begin{tabular}[c]{@{}p{7.5cm}@{}}Cumulative sum of \# of stop button and retry button clicks\end{tabular} & Indicates difficulty \\ & cml\_n\_step & \begin{tabular}[c]{@{}p{7.5cm}@{}}Cumulative \# of one-step execution button clicks\end{tabular} & Indicates difficulty \\ & cml\_n\_line & \begin{tabular}[c]{@{}p{7.5cm}@{}}Cumulative \# of one-line execution button clicks\end{tabular} & Indicates difficulty \\ & cml\_n\_play & Cumulative \# of ``run to end'' button clicks & Indicates evaluation activities \\ \midrule \multirow{4}{*}{\begin{tabular}[c]{@{}p{2.2cm}@{}}\textbf{LEARNER} \\ \textbf{FEATURES}\\ Gathered upon registration.\end{tabular}} & activated & \begin{tabular}[c]{@{}p{7.8cm}@{}}Player registered an account (1), or did not (0)\end{tabular} & Indicates commitment to learn \\ & \st{experience} & Prior experience programming (1), or none (0) & Predictive in {\cite{greene_predictors_2015,kizilcec_attrition_2015}} \\ & \st{age} & Age in years & Predictive in {\cite{greene_predictors_2015,kizilcec_attrition_2015}} \\ & \st{gender} & Male or female & Predictive in {\cite{greene_predictors_2015,kizilcec_attrition_2015}} \\ \bottomrule \end{tabular} \end{table*} We selected the Gidget programming game (shown in Figure \ref{fig:gidget-interface} and available at \textit{www.helpgidget.org}) as our tutorial for investigation, as the game was heavily instrumented to record learner activity. Gidget teaches CS1 programming concepts such as variables, conditionals, loops, and functions to novice learners, along with concepts of testing and debugging. The game is structured as a sequence of levels, each presenting a defective program for the learner to fix. Each level focuses on a specific programming language concept, providing instruction by encouraging learners to step through the program's execution (as when using an interactive debugger), while Gidget the Robot explains the execution of each step in the program. The game also includes assessments between units of the curriculum to test and reinforce understanding of the concepts taught in the unit \cite{lee_-game_2013}. As with most coding tutorials, the goal of Gidget is to provide a basic understanding of a programming language. However, because it is a game, it does differ from other tutorials in a few notable ways. First, the level of detail given about program execution is much higher than in most interactive tutorials, which tend to provide basic error feedback but do not provide granular feedback. Unlike most tutorials, the game also provides a story, which aims to motivate learners to continue through the game \cite{6344507}. The environment also offers a syntax guide, abundant example code, and contextual hints, as described in prior work \cite{lee2014principles ,jernigan_principled_2015,jernigan2017general}. Despite these engagement-oriented features, learners who find the game online still abandon it at high rates. Figure~2 shows the percent of learners remaining after each level of the game, showing that only a few percent of learners complete the entire game. Figure 3 shows the per-level abandonment rate, ranging from 0\% to 34.3\%, with a mean rate of 13.4\% per level. Levels that introduce new programming concepts generally have higher abandonment rates. Levels with lower abandonment rates include Gidget's assessment levels, which present multiple choice and open-ended questions along with answers that attempt to correct learners' misconceptions with the concepts presented earlier \cite{lee_-game_2013}. Due to the minimum requirements required by our analyses and low number of data points for later levels, this paper focuses on predicting learner abandonment between Levels 1 through 5, which have the most learner activity. In these levels, the game taught commands for moving Gidget the Robot around the world and commands for picking up and dropping objects (which were necessary for achieving game goals like those shown in the bottom-left portion of Figure 1, requiring objects to be moved and placed on other objects). Level 6 assessed learners' knowledge of the prior levels, asking them to predict output of a program that used commands introduced in the first five levels. Subsequent levels introduced more advanced concepts, including conditionals, variables, loops, functions, and objects. \subsection{Data Collection} The Gidget game records learner activity, including discrete information for each learner, for each level, including data such as the total time spent on a level, the total number of times specific buttons were clicked, the total time help was used, the total time spent on different interface elements, all code edits, whether or not a level was completed, and so on. Creating an account is optional, but ensures the player can return to his or her game at a later time. When creating an account, learners indicate their e-mail address, age, gender, and whether or not they have prior programming experience. Those who choose not to create an account can still play through the entirety of the game, but would lose access to their progress after their web session expires, or their web browsers' cache is cleared. We obtained a database snapshot of 5,038 unique learners' activity logs spanning 23,647 level plays, representing 20 months of activities of all learners. We extracted most of our features from these logs. Gidget's developers primarily relied on word-of-mouth to recruit learners. Internet Protocol (IP) address logs and Google Analytics data indicate that learners accessed the game from a total of 103 countries, with the large majority of visitors coming from the USA (65.2\%) and Russia (16.4\%). Aggregate Google Analytics data indicates that Gidget users consisted of 55.7\% males and 44.3\% females, which is consistent with previously reported user demographics \cite{lee2015teaching}. Google Analytics only collects data for users who are at least 18 years old, and reported that 22.7\% of Gidget's users were 18-24 years old, 38.6\% were 25-24 years old, 21.2\% were 35-55 years old, 10.2\% were 45-54 years old, and 7.1\% were 55+ years old. We exclude further demographic data in this study because most users did not provide it, preventing us from tying particular demographic attributes to individual users. \subsection{Prediction Problem Definition} We define abandonment as a binary outcome for each level: either a learner completed a level or they did not, as specified by the game's level completion rules (which consisted of one or more test case assertions about program state, as shown in the left portion of Figure \ref{fig:gidget-interface}). For example, learners who abandoned at Level 1 means they did not satisfy Level 1's tests, and learners who abandoned at Level 2 means that they finished Level 1 and began playing Level 2, but did not satisfy Level 2's tests. Learners had the option to replay previously completed levels, but we always use their highest level played when defining abandonment. Our prediction problem was as follows: for a given completed Level \textit{n} (where \textit{n} $\geq$ 1), predict whether a learner who has completed that level will complete Level \textit{n}+1 based on features of the learner and the learner's activities in Levels 1 through \textit{n}. This prediction would allow the game to provide encouragement just after the completion of a Level \textit{n}, or at the beginning of Level \textit{n}+1. \subsection{Feature Extraction} To determine features for predicting abandonment, we considered five sources: 1) factors that appeared related to engagement from previous work on Gidget \cite{lee_personifying_2011,6344507,lee_-game_2013,lee_comparing_2015-1}; 2) factors from studies of MOOCs and in-person CS1 courses; 3) features that we brainstormed based on the available data in the Gidget activity logs; 4) features proven to be significant in existing work on MOOC dropout prediction; and 5) features that are straightforward to interpret and informative to game designers. Table \ref{tab:features} lists the 12 features from this brainstorming process. Features with strikethroughs were excluded because they had too many missing values. For each of these features, we computed the cumulative values from activity logs for each level (excluding the \textit{activated} feature, which only had one value per learner). The cumulative features were the sum of per-level features in completed levels. For example, \textit{cml\_total\_dur} in Level 3 was the sum of \textit{total\_dur} in Level 1, Level 2, and Level 3. The 12 features largely reflect factors reported in the prior discussed in Section \ref{sec:related}. For example, \textit{cml\_n\_step} is the cumulative number of time executing the program step-by-step, which measures a testing behavior. A large value of \textit{cml\_n\_step} might be a sign of difficulty. However, some of the features have ambiguous indications. For instance, \textit{cml\_test\_time}, which measures the total time a player spent on code execution, can either suggest difficulty or desire to succeed. We therefore lack an understanding of how important the features selected are in a learner's decision to stay and if they possess consistent signals of abandonment (either abandon or not) across levels. We answer this question by assessing feature importance and feature impact in Sections \ref{sec:importance} and \ref{sec:impacts}. \subsection{Data Preprocessing} Our data cleaning focused on excluding invalid values. We found that because most learners did not register an account, most learner features had large amounts of missing data: \textit{age} was missing 76.0\%, \textit{experience} was missing 86.7\%, and \textit{gender} was missing 77.4\%. We removed these features as there was no way to estimate their missing values. Then, we computed cumulative features from corresponding per level features. Next, for each level, we extracted features for only the set of learners who had completed the level, ensuring that predictions were only based on learners that were active on that level. This resulted in a smaller set of labeled data for each level, mirroring abandonment. Defects in logging had also caused some missing values in \textit{total\_dur}, \textit{n\_play},\textit{ n\_line}, \textit{n\_step}, \textit{n\_restart} and their corresponding cumulative features, but we retained them because they were missing less than 5\% of their values in each level. Since we did not have a large dataset, we wanted to retain as much of the useful signal in the data without weakening the classifier performance or inducing bias. Therefore, we used K nearest neighbor (KNN) imputation, which has proven to be a simple but robust way of offering accurate missing value estimation \cite{troyanskaya_missing_2001}. We implemented KNN imputation with the R package ``VIM'' for each level's feature data. Lastly, we normalized the imputed datasets as z-scores, giving all features a zero-mean and unit standard deviation. Normalization rescales features that have a wide range of values, preparing them for use by many machine learning algorithms that assume features with consistent scales. After preprocessing, we had 3,292 users for level 1 predictions, and 2,841, 2,256, 1,702, and 1,298 users for levels 2, 3, 4 and 5, respectively. \subsection{Classifier Building and Evaluation} \label{sec:classifier} After feature extraction, we built classifiers for Levels 1 to 5 using three classifiers: Logistic Regression with L1 regularization (LR), Random Forest (RF) from the Python Sklearn Library \cite{pedregosa_scikit-learn:_2011}, and Gradient Boosting Decision Tree (GBDT) algorithm implemented in the XGBoost system \cite{chen_xgboost:_2016,friedman_greedy_2001}. These classifiers are widely utilized machine learning techniques across numerous disciplines including education research, and have been used effectively for dropout prediction in many previous works \cite{liang_machine_2016,taylor_likely_2014,thammasiri_critical_2014,huang_telco_2015}. Moreover, XGBoost has dominated the winning solutions in recent machine learning and data science challenges such as in the KDDCup and Kaggle challenges. Logistic Regression is a log-linear model for binary classification based on a set of features. L1 regularization is a technique to avoid over-fitting and increase model generalizability. Random Forests~\cite{ho_random_1995} is an ensemble learning method for classification and regression based on decision trees. A decision tree can model a binary decision making process and can learn a higher order of interactions between features than Logistic Regression. Random Forests are constructed with decision trees by randomly sampling with replacements from training data (see Section \ref{sec:importance} for further explanation). Gradient Boosting Decision Tree is similar to Random Forest in that they are both a set of decision trees. While each tree in Random Forests is trained independently, GBDT adds one tree at a time aimed to minimize the errors from the already-trained set of trees. Each classifier predicted whether a learner would abandon the next level of the game based on cumulative features from prior levels plus learner features. For each level, we randomly split the dataset into a training set (80\%) and a test set (20\%). For the training set of each level, we applied 10-fold cross-validation, where 90\% of the data were used for training and 10\% reserved for evaluation in each of the ten total trials. We compared our classifiers with three baseline classifiers. One classifier (baseline 1) randomly predicted abandonment by respecting the label distribution of learners in training data at each level, a second classifier (baseline 2) always predicted abandonment, and a third classifier (baseline 3) never predicted abandonment. These baseline classifiers mirror the currently available alternatives to designers of online coding tutorials wanting to predict abandonment. In evaluating the classifiers, we defined success as balancing both precision and recall (true positives, TP), weighing equally the encouragement of learners likely to abandon, while avoiding unnecessarily encouraging learners who were likely to complete the next level. Therefore, we computed a number of evaluation metrics, including precision, recall, and F1 (the harmonic mean of precision and recall) on a test dataset for each level. For all of these metrics, we treated a learner abandoning a level as ``positive'' and learner completing a level as ``negative.'' We also computed AUC to measure the robustness of the classifiers across different baseline rates of per-level abandonment. AUC curves represent the trade-off between the true positives and false positives and are independent of abandonment rate, therefore providing a single scalar metric to model comparison. \begin{table*} \caption{GBDT performance metrics on Levels 1 through 5 predictions.} \label{tab:performance1} \centering \begin{tabular}{@{}p{0.58cm}C{0.68cm}C{0.37cm}C{0.37cm}C{0.37cm}C{0.68cm}C{0.37cm}C{0.37cm}C{0.37cm}C{0.68cm}C{0.37cm}C{0.37cm}C{0.37cm}C{0.68cm}C{0.37cm}C{0.37cm}C{0.37cm}C{0.68cm}C{0.37cm}C{0.37cm}l@{}} \toprule & \multicolumn{4}{c}{Level 1} & \multicolumn{4}{c}{Level 2} & \multicolumn{4}{c}{Level 3}& \multicolumn{4}{c}{Level 4}& \multicolumn{4}{c}{Level 5} \\ \midrule & \textbf{GBDT} & bl1 & bl2 & bl3 & \textbf{GBDT} & bl1 & bl2 & bl3 & \textbf{GBDT} & bl1 & bl2 & bl3& \textbf{GBDT} & bl1 & bl2 & bl3 & \textbf{GBDT} & bl1 & bl2 & bl3 \\ \midrule AUC & \textbf{0.64} & 0.51 & 0.50 & 0.50 & \textbf{0.68} & 0.51 & 0.50 & 0.50 & \textbf{0.70} & 0.50 & 0.50 & 0.50 & \textbf{0.61} & 0.47 & 0.50 & 0.50 & \textbf{0.77} & 0.53 & 0.50 & 0.50 \\ Prec &\textbf{0.19} & 0.16 & 0.14 & / & \textbf{0.29} & 0.22 & 0.21 & / & \textbf{0.42} & 0.29 & 0.29 & /& \textbf{0.37} & 0.21 & 0.26 & / & \textbf{0.37} & 0.23 & 0.18 & / \\ Recall & \textbf{0.75} & 0.17 & 1.00 & 0.00 & \textbf{0.76} & 0.21 & 1.00 & 0.00 & \textbf{0.65} & 0.23 & 1.00 & 0.00 & \textbf{0.61} & 0.18 & 1.00 & 0.00 & \textbf{0.72} & 0.21 & 1.00 & 0.00 \\ \begin{tabular}[c]{@{}l@{}}F1\end{tabular} & \textbf{0.30} & 0.16 & 0.25 & / & \textbf{0.42} & 0.22 & 0.34 & / & \textbf{0.51} & 0.25 & 0.45 & / & \textbf{0.46} & 0.20 & 0.42 & / & \textbf{0.50} & 0.22 & 0.31 & / \\ \bottomrule \end{tabular} \end{table*} \subsection{Feature Importance} \label{sec:method-importance} We evaluated feature importance by examining the contribution of a feature in constructing gradient boosted trees in GBDT. In a single decision tree, the feature importance is concerned with the improvement in accuracy brought by adding a feature as a split. GBDT are constructed by adding one new tree at a time based on what the classifier already learned with existing trees, and then the relative rank of a feature in GBDT can be assessed by summing accuracy reduction for this feature over all trees \cite{he_practical_2014}. The tree structure can reveal complex interactions among features because every splitting node should respect the condition made by its parent node and a feature can appear multiple times in a tree. However, the ranking only provides a rough picture of feature importance as there are several correlated features in our choice of input. Specifically, there is up to 68.8\% pair-wise correlation among \textit{cml\_n\_line}, \textit{cml\_n\_restart}, \textit{cml\_n\_play}, and \textit{cml\_n\_step} within all five levels. We did not discard any of these features because we did not know which would be more predictive than the others. Although the performance of GBDT is robust to correlated features, when it comes to ranking feature importance, it will try to attach a higher score to only one of them and lower scores to the other correlated ones\footnote{Understand your dataset with XGBoost (XGBoost 0.6 documentation): $http://xgboost.readthedocs.io/en/latest/R-package/discoverYourData.html\#feature-importance$}. \subsection{Feature Impact} \label{sec:method-impacts} We also examined the direction of these relationships with abandonment: on some levels, they may have been positive and on some they may have been negative. To get a sense of how a feature impacted abandonment prediction, we ran Logistic Regression on training data of every level. We then used Odds Ratios (OR) of each feature to assess the direction of its impact \cite{szumilas_explaining_2010}. The goal of using Logistic Regression here is different from Logistic Regression in Section \ref{sec:classifier}, the former is to interpret features, while the latter is to achieve good performance in classification tasks. \section{Results} In this section, we evaluate the classifiers, discuss the relative importance of their features in prediction, and assess how these features were associated with abandonment. \subsection{Classifier Performance} We report here in detail our best results from GBDT using cumulative features and learner features (12 features in total). Table~\ref{tab:performance1} shows the results for the five per-level classifiers, along with the results for the three baseline classifiers, indicated as ``bl1,'' ``bl2,'' and ``bl3'' for each level. The AUC scores (Table \ref{tab:performance1}, row 1) across the Level 1 to 5 classifiers ranged from 0.61 to 0.77 with a mean of 0.68. A random binary predictor has an AUC of 0.5, which is usually used as a baseline for prediction evaluation. Therefore, our classifiers did better than chance at predicting abandonment. That said, maximum AUC is not always the optimal choice for a problem~\cite{lobo_auc:_2008}. Our precision results (Table \ref{tab:performance1}, row 2) represent the percent of all learners our classifiers predicted would abandon the next level that actually did. From an encouragement perspective, precision represents the proportion of learners that would receive encouragement that actually needed it. Our classifiers' precisions ranged from 0.19 to 0.42. The low precision for Level 1 is not surprising since there was very little on which to predict abandonment and the data was skewed with very high abandonment to non-abandonment ratios (1:6 for Level 2). This low precision means that the game might unnecessarily encourage many learners. Similarly, false positive (FP) rates indicate the percent of learners that completed the next level that we incorrectly predicted would abandon. This would be the percent of learners receiving encouragement that did not need it. We attained an average FP of 0.37 across all 5 levels of prediction, suggesting that we might unnecessarily encourage 37\% of learners. Table \ref{tab:performance1} (row 3) shows the recall of our classifiers. In the context of abandonment prediction, recall was the percent of all learners that abandoned a level that our classifiers successfully identified. From an encouragement perspective, this would be the percent of learners who needed encouragement that our classifiers successfully encouraged. Over all levels, the recall of our classifiers was above 0.6 with an average of 0.70, showing that the classifiers could identify on average about 70\% of learners likely to abandon. However, within the classifiers' limited prediction capability, there is always a tradeoff between TP and FP, meaning the higher percent of learners we successfully encouraged, the higher percent of learners we unnecessarily encouraged, and vice versa. \begin{table}[b] \caption{Performance on Levels 1--5 predictions of Logistic Regression and Random Forests.} \label{tab:performance-mix} \centering \begin{tabular}{@{}p{0.45cm}C{0.39cm}C{0.39cm}C{0.39cm}C{0.39cm}C{0.39cm}C{0.39cm}C{0.39cm}C{0.39cm}C{0.39cm}l@{}} \toprule & \multicolumn{2}{c}{Level 1} & \multicolumn{2}{c}{Level 2} & \multicolumn{2}{c}{Level 3} & \multicolumn{2}{c}{Level 4} & \multicolumn{2}{c}{Level 5} \\ \midrule & LR & RF & LR & RF & LR & RF & LR & RF & LR & RF \\ \midrule AUC & 0.61 & 0.62 & 0.64 & 0.64 & 0.65 & 0.64 & 0.60 & 0.61 & 0.65 & 0.66 \\ F1 & 0.30 & 0.32 & 0.42 & 0.42 & 0.53 & 0.52 & 0.45 & 0.46 & 0.40 & 0.43 \\ \bottomrule \end{tabular} \end{table} The F1 scores reported in row four of Table \ref{tab:performance1} measure the balance between precision and recall, or, the balance between necessary and unnecessary encouragement. Our classifiers produced varied F1 scores ranging from 0.30 to 0.51, with our lowest performing classifiers again on Level 1 and 2 because of the low precision on early levels. This suggests that while achieving a balance between these goals is possible on many levels of the game, the classifiers did not perform well until they had enough data from prior levels to have a strong signal of engagement. While these classifier results are far from optimal, they are consistently better than the three baseline classifiers according to AUC scores and F1 scores. Table \ref{tab:performance-mix} shows the results from Logistic Regression with L1 penalty and Random Forests for each of the five levels. Although inferior to GBDT, these classifiers outperformed the three baselines, demonstrating the set of features chosen influence prediction. Additionally, we ran GBDT with a set of 23 features consisting of 11 cumulative features, 11 per-level features, and 1 learner feature across Levels 1 through 5. The extra per-level features did not lead to a noticeable increase or decrease in the classifiers' performance. \subsection{Feature Importance} \label{sec:importance} \begin{figure} \centering \includegraphics[width=0.4\textwidth]{tree-short.png} \caption{A decision tree in GBDT for Level 5 prediction.}\label{fig:tree} \end{figure} Having demonstrated the feasibility of predicting abandonment, we now turn to the underlying features that were most predictive of abandonment. First, we illustrate with an example how GBDT works in classification and determining feature importance. Figure \ref{fig:tree} shows one of the many decision trees with depth = 2 built by GBDT for a Level 5 prediction. Each leaf node is associated with a score used for classification. Negative scores will be classified as ``stay'' and positive ones as ``abandon.'' The larger the absolute value of a score, the more likely its resulting class label. Since all continuous features were z-score normalized before classification, the actual input to classifiers are different than the values in the tree splits shown in Figure \ref{fig:tree}. The topmost splitting node corresponds to the best predictor in this tree. In this case, \textit{cml\_total\_dur} (appearing in the top row) bears more importance than \textit{cml\_idle\_time} and \textit{activated} (appearing in the middle row). To reveal a larger picture of feature importance assessed by all trees in a GBDT classifier, we repeated the process described in Section \ref{sec:method-importance} for each classifier and for each level, again obtaining relative importance measures. Figure \ref{fig:importance} shows the relative importance scores of Level 5, resulting in the following top five features: \textit{cml\_total\_dur} (0.327), \textit{cml\_idle\_time} (0.125), \textit{cml\_n\_restart} (0.104), \textit{activated} (0.100), and \textit{cml\_help\_time} (0.096). Based on these results, we know that these features are important in predicting abandonment (or staying) for this level, but it is difficult to interpret these results without knowing if these are positively or negatively related to abandonment. To address this issue, we examine these relationships below, in Section \ref{sec:impacts}. Finally, examining the feature ranking across all five levels reveals there are two features with high relative importance across all levels: whether a learner had created an account (\textit{activated}) and cumulative non-idle time spent playing through the levels (\textit{cml\_total\_dur}). This suggests that the effort to fill out the registration form (which required an email address and a few demographic details) was a strong indicator of engagement and commitment. \textit{cml\_total\_dur} was also of high importance, suggesting that overall time actively interacting with the game was related to engagement. These results in the context of an online coding tutorial are consistent with findings from existing literature showing that indicators of commitment and/or effort have high predictive power in MOOCs or in-person scenarios \cite{greene_predictors_2015,jr_identifying_2005}. \begin{figure} \centering \includegraphics[width=0.45\textwidth]{importance2.png} \caption{Level 5 classifier's relative importance of 12 features.}\label{fig:importance} \end{figure} \begin{table}[b] \caption{Odds ratio of each feature in each level.} \label{tab:OR} \centering \begin{tabular}{@{}llllll@{}} \toprule Feature & Lvl. 1 & Lvl. 2 & Lvl. 3 & Lvl. 4 & Lvl. 5 \\ \midrule \rowcolor[HTML]{D3D3D3} cml\_help\_time & 0.77(--) & 0.91(--) & 0.90(--) & 0.92(--) & 0.95(--) \\ \rowcolor[HTML]{D3D3D3} activated & 0.02(--) & 0.06(--) & 0.07(--) & 0.11(--) & 0.09(--) \\ \rowcolor[HTML]{A9A9A9} cml\_total\_dur & 1.07(+) & 1.11(+) & 1.06(+) & 1.24(+) & 1.51(+) \\ \rowcolor[HTML]{A9A9A9} cml\_n\_step & 1.18(+) & 1.03(+) & 1.25(+) & 1.10(+) & 1.44(+) \\ \rowcolor[HTML]{A9A9A9} cml\_idle\_time & 1.21(+) & 1.38(+) & 1.33(+) & 1.11(+) & 1.30(+) \\ \rowcolor[HTML]{A9A9A9} cml\_n\_restart & 1.05(+) & 1.28(+) & 1.11(+) & 1.14(+) & 1.27(+) \\ cml\_mission\_time & 0.94(--) & 1.06(+) & 1.08(+) & 0.99(--) & 1.35(+) \\ cml\_test\_time & 1.10(+) & 1.03(+) & 1.00(+) & 0.94(--) & 0.90(--) \\ cml\_code\_time & 0.89(--) & 0.99(--) & 1.03(+) & 0.92(--) & 0.74(--) \\ cml\_world\_time & 0.96(--) & 0.99(--) & 0.87(--) & 1.07(+) & 0.95(--) \\ cml\_n\_line & 0.98(--) & 0.93(--) & 0.98(--) & 0.99(--) & 1.12(+) \\ cml\_n\_play & 0.94(--) & 0.91(--) & 1.08(+) & 0.98(--) & 1.10(+) \\ \bottomrule \end{tabular} \end{table} \subsection{Feature Impact} \label{sec:impacts} To examine the direction of impact each feature has on abandonment, we ran a logistic regression for each level. Table \ref{tab:OR} shows the odds ratios (OR) of each feature in each level of logistic regression. OR $>$ 1 suggests that there is a positive association between the feature and abandonment, OR $<$ 1 suggests a negative association, and OR = 1 means the feature did not have an impact on abandonment. The further the absolute value of OR away from 1, the stronger the association. Features that consistently had a positive association with abandonment were \textit{cml\_total\_dur}, \textit{cml\_n\_step}, \textit{cml\_idle\_time}, and \textit{cml\_n\_restart}, as highlighted in dark gray. Conversely, features that consistently had a negative association with abandonment were \textit{cml\_help\_time} and \textit{activated}, as highlighted in light gray. \section{Discussion} This study is the first to examine factors that predict abandonment in an online coding tutorial using machine learned classifiers. Overall, our results suggest several things. First, classifiers using the features in Table ~\ref{tab:features} can do a much better job than baseline classifiers in identifying learners likely to abandon. Even with a small dataset of a few thousand learners, we can effectively separate the ones that are likely to abandon from the others. Second, these features do not provide as much predictive power as some of the social, identity, and motivational features more easily obtained in classroom settings, nor do they compete with dropout prediction models in MOOC settings, which have a wider set of features and interactions data with other users and instructors. Although our classifiers would likely to achieve better performance with more complex features through proper feature engineering, we have demonstrated that even simple features have measurable predictive value. These discoveries have several implications for the design of online coding tutorials. First and foremost, designers can begin exploring how to use targeted abandonment prediction to encourage and engage learners online. Tutorials could provide encouraging messages at the beginning of a lesson; they could use avatars to convey encouraging words when learners at risk of abandoning encounter difficulty; they could even provide more targeted, context-relevant encouragement in response to learners' progress. Designers could also use abandonment prediction to predict the likelihood of success on the next level or lesson, adapting future levels to reduce difficulty, review challenging concepts, or present additional instruction before the learner proceeds to the next level. Of course, we have little evidence about whether such interventions would be effective; our feasibility assessment presented in this paper enables researchers to evaluate such interventions. Our results also suggest several improvements to the classifiers we explored in this paper. For example, future work could explore the use of real-time predictions, using data not only from prior lessons in a tutorial, but more granular data about the current lesson a learner is engaged in. For example, real-time features might consider code testing, inactivity, and help seeking features, looking for signs of frustration, disengagement, and confusion. Real-time predictions would pose new interface design challenges as well, as intervening at arbitrary points in a lesson might pose some of the same challenges presented by intelligent assistants like ``Clippy,'' who seemed to interrupt at just the wrong times. Future work could also explore automatic hint generation based on the current progress presented by the a learner. There are several limitations in this work. First, because Gidget is an interactive game, we had access to features of engagement that many less interactive coding tutorials do not have. Other tutorials may need to enhance their interactivity to instrument the features that we utilized. Second, some of the features we used were dependent on each other, undermining our ability to assess feature importance. Additionally, we could not predict beyond Gidget's Level 6 due to a lack of sufficient data. There may be other interesting and different predictive possibilities for learners that persist to more advanced parts of coding tutorials, but we could not analyze these. We hope to do so in future work. \section{Conclusion} In this paper, we predicted abandonment of an online coding tutorial using machine learning classifiers, examined the importance of features that informed this prediction, and explored how these features associated with abandonment. Our results show that even with a small dataset and a few features related to engagement, classifiers can target encouragement to an average of 70\% of learners likely to abandon the next level, with the tradeoff of unnecessarily encouraging about 37\% of learners who will complete the next level. We found that these models gain their predictive power primarily from features related to \textit{commitment} (e.g., account activation) and \textit{effort} (non-idle time spent on all activities). For example, features that were consistently and positively associated with abandonment---\textit{cml\_total\_dur}, \textit{cml\_n\_step}, \textit{cml\_idle\_time}, and \textit{cml\_n\_restart}---likely characterized learners that spent a lot of time on the game, clicked the single execution button many times, had long periods of inactivity, and restarted/retried the level many times. Features that were consistent negatively associated with abandonment---\textit{cml\_help\_time} and \textit{activated}---likely characterized learners who were motivated enough to save their progress and seek further instruction from the game's help features. Ultimately, prediction efforts such as ours aim to provide some surrogate for the type of personalized, meaningful encouragement that teachers provide to their students. We are unlikely to ever have enough teachers online to provide encouragement to the tens of millions of people trying to learn to code from interactive tutorials. If we can provide even a fraction of this encouragement through automation, however, we might just nudge millions of people to the next lesson, further democratizing computing education. \section*{Acknowledgment} This work was supported in part by the National Science Foundation (NSF) under grants IIS-1657160, CNS-1240786, CNS-1240957, CNS-1339131, CCF-0952733, CCF-1339131, IIS-1314399, and IIS-1314384. Any opinions, findings, conclusions or recommendations are those of the authors and do not necessarily reflect the views of NSF. \bibliographystyle{IEEEtran}
\section{Introduction} \label{sec:introduction} Face grouping is an actively researched computer vision problem due to its enormous potential in commercial applications. It not only allows users to organize and tag photos based on faces but also retrieve and revisit huge quantity of relevant images effortlessly. \begin{figure}[t] \begin{center} \includegraphics[width=0.95\linewidth]{profileSimilarity.pdf} \end{center} \vskip -0.45cm \caption{\textbf{Cosine angle in a deep feature space.} We measure the cosine angle between the deep feature vector of two faces. It is noted that even for two men with significantly different appearances, the angle between their profiles and noise faces (gray dash lines with 0.39$\sim$0.44) is much larger than one's frontal and his own profile (0.17 and 0.22).} \label{fig:profileSimilairty} \end{figure} The performance of face grouping significantly benefits from the recent emergence of deep learning approaches~\cite{chen2016unconstrained,parkhi2015deep,schroff2015facenet,sun2014deep,taigman2014deepface,wen2016discriminative}. Nevertheless, we still observe some challenges when we apply existing methods on real-world photo albums. In particular, we found that deeply learned representation can still perform poorly given \textit{profile faces and false detections}. In addition, there is no obvious mechanism to disambiguate \textit{large quantity of non-interested faces}\footnote{Non-interested faces refer to faces that we do not want to group (\eg~faces in the background). This is the term popularized by the earlier work in face clustering~\cite{zhu2011rank}.} that are captured under the same condition with the person of interests. We provide an illustrative example in Fig.~\ref{fig:profileSimilairty}, of which results were obtained from the Inception-v3 model~\cite{szegedy2015rethinking} fine-tuned with MS-Celeb-1M~\cite{guo2016msceleb} images with face identity. Despite the model achieves an accuracy of 99.27\% on LFW~\cite{huang2007labeled}, which is on par with the accuracy reported by a state-of-the-art method~\cite{wen2016discriminative}, its performance on the open-world face grouping task is unsatisfactory. We attempted to adapt the deep model with open-world albums~\cite{zhang2016joint} but with limited success. We show experimental results in Sec.~\ref{sec:experiments}. Learning such an open-world model is still far from being solved due to highly imbalanced data (much more frontal faces compared to profile instances in existing datasets) and a large negative space to cover. Thinking about humans, we tend to execute a visual grouping task in sequence with intermediate decision to govern our next step, like playing a jigsaw puzzle~\cite{xie2008tangibles} with pieces of varying visual complexity. First we will link pieces with strong correlation and high confidence, then gain insights and accumulate visual evidence from these stable clusters. Consequently, a larger group can be formed through merging ambiguous positives and discarding uninteresting outliers. In the process, we may exploit contextual cues and global picture considering other samples. The above intuition motivates a novel face grouping framework. Our goal is not to design a better deep representation, but learning to make better merging/not-merging decision from expert?s demonstration using existing representation. In particular, we wish to introduce intermediate sequential decision between the clustering steps, \ie, when to merge two samples or groups given the dynamic context. Towards this goal, we assume different clustering states, where the states differ in their current partitions of data. At each time step, an agent will choose from two possible actions, \ie, to merge or not to merge a pair of face groups. The process responds at the next time step by moving to a new state and provides a reward to the agent. A sequence of good actions would lead to higher accumulative reward than suboptimal decisions. Learning a decision strategy in our problem is non-trivial. In particular, the decision process is adversely affected by uninteresting faces and noisy detections. Defining a reward function for face grouping is thus not straightforward, which needs to consider the similarity of faces, group consistency, and quality of images. In addition, we also need to consider the operation cost involved, \ie, the manual human effort spent on adding or removing a photo from a group. It is hard to determine the relative weights of these terms a-priori. This is in contrast to (first person) imitation learning setting of which the reward is usually assumed known and fixed, \eg, using the change of game score~\cite{mnih2015human}. \noindent \textbf{Contributions:} We make the following contributions to overcome the aforementioned challenges: \noindent 1) We formulate a novel face grouping framework based on imitation learning (IL) via inverse reinforcement learning~\cite{ng2000algorithms,ross2011reduction}. To our knowledge, this is the first attempt to address visual clustering via inverse reinforcement learning. Once learned, the policy can be transferred to unseen photo albums with good generalization performance. \noindent 2) We assume the reward as an unknown to be ascertained through learning by watching an expert's behavior. We formulate the learning such that both short- and long-terms rewards are considered. The formal considers similarity, consistency and quality of local candidate clusters; whereas the latter measures the operation cost to get from an arbitrary photos partition to the final ground-truth partition. The new reward system effectively handles the challenges of profile, noisy, and uninteresting faces, and works well with conventional face similarity under an open-world context. \noindent 3) We introduce a large-scale dataset called Grouping Faces in the Wild (GFW) to facilitate the research of real-world photo grouping. The new dataset contains $78,000$ faces of $3,132$ identities collected from a social network. This dataset is realistic, providing a large number of uninteresting faces and noisy detections. Extensive experiments are conducted on three datasets, namely, LFW simulated albums, ACCIO dataset (Harry Potter movie)~\cite{esam2015accio}, and the GFW introduced by us. We show that the proposed method can be adapted to a variety of clustering algorithms, from the conventional k-means and hierarchical clustering to the more elaborated graph degree linkage (GDL) approach~\cite{zhang2012graph}. We show that it outperforms a number of unsupervised and supervised baselines. \section{Related Work} \label{sec:related_work} \vspace{-0.1cm} \noindent \textbf{Face Grouping:} Traditional face clustering methods~\cite{cao2015diversity,li2004bayesian,otto2015efficient,zhu2011rank} are usually purely data-driven and unsupervised. They mainly focus on finding good distance metric between faces or effective subspaces for face representation. For instance, Zhu \etal~\cite{zhu2011rank} propose a rank-order distance that measures the similarity between two faces using their neighboring information. Fitzgibbon and Zisserman~\cite{fitzgibbon2003joint} further develop a joint manifold distance (JMD) that measures the distance between two subspaces, each of which invariant to a desired group of transformations. Zhang~\etal~\cite{zhang2012graph} propose agglomerative clustering on a directed graph to better capture global manifold structures of face data. There exist techniques that employ user interactions~\cite{tian2007face}, extra information on the web~\cite{berg2004names} and prior knowledge of family photo albums~\cite{xia2014face}. Deep representation is recently found effective for face clustering~\cite{schroff2015facenet}, and large-scale face clustering has been attempted~\cite{otto2016clustering}. Beyond image-based clustering, most existing video-based approaches employ pairwise constraints derived from face tracklets~\cite{cinbis2011unsupervised,wu2013constrained,xiao2014weighted,zhang2016joint} or other auxiliary information~\cite{el2010face,tang2015face,zhou2015multi} to facilitate face clustering in video. The state-of-the-art method by Zhang~\etal~\cite{zhang2016joint} adapts DeepID2+ model~\cite{sun2015deeply} to a target domain with joint face representation adaptation and clustering. In this study, we focus on image-based face grouping without temporal information. Our method differs significantly to existing methods~\cite{zhang2016joint} that cluster instances by deep representation alone. Instead, our method learns from experts to make sequential decision on grouping considering both short- and long-term rewards. It is thus capable of coping with uninteresting faces and noisy detections effectively. \vspace{0.1cm} \noindent \textbf{Clustering with Reinforcement Learning:} There exist some pioneering studies that explored clustering with RL. Likas~\cite{likas1999reinforcement} models the decision process of assigning a sample from a data stream to a prototype, \eg, cluster centers produced by on-line K-means. Barbakh and Fyfe~\cite{barbakh2007clustering} employ RL to select a better initialization for K-means. Our work differs to the aforementioned studies: (1) \cite{barbakh2007clustering,likas1999reinforcement} are unsupervised, \eg, their loss is related to the distance from data to a cluster prototype. In contrast, our framework guides an agent with a teacher's behavior. (2) We consider a decision that extends more flexibly to merge arbitrary instances or groups. We also investigate a novel reward function and new mechanisms to deal with noises. \vspace{0.1cm} \noindent \textbf{Imitation Learning:} Ng and Russel~\cite{ng2000algorithms} introduced the concept of \textit{inverse reinforcement learning} (IRL), which is also known as \textit{imitation learning} or apprenticeship learning~\cite{abbeel2004apprenticeship}. The goal of IRL is to find a reward function to explain observed behavior of an expert who acts according to an unknown policy. Inverse reinforcement learning is useful when a reward function is multivariate, \ie, consists of several reward terms of which the relative weights of these terms are unknown a-priori. Imitation learning was shown effective when the supervision of a dynamic process is obtainable, \eg, in robotic navigation \cite{abbeel2004apprenticeship}, activity understanding and forecasting~\cite{kitani2012activity} and visual tracking~\cite{xiang2015learning}. \section{Overview} \label{sec:overview} \if 0 \subsection{Preliminaries} \label{subsec:preliminaries} \textit{Markov decision process} (MDP) has been extensively employed for modeling dynamic environments where an agent needs to perform sequential decisions and executing actions. The applications of MDP can be found on different computer vision tasks, \eg, tracking~\cite{xiang2015learning}, feature selection~\cite{lucas2005Qlearning,Karayev2014anytime}, human activity forecasting~\cite{kitani2012activity}, and interactive data annotation~\cite{russakovsky2015best}. Formally, MDP is represented as a tuple $(S, A, T, R)$, where $S$ is a finite set of states and $A$ is a set of actions (decisions). $T$ is a set of state transition probabilities upon taking action $a$ in state $s$. A reward function is denoted as $R: S \times A \rightarrow \mathbb{R}$, which rewards the agent after it executes action $a$ in state $s$. \textit{Reinforcement learning} (RL)~\cite{sutton2011reinforcement} aims at finding a policy $\pi:S \rightarrow A$ in MDP, which maps from states to probability distributions over actions, so as to maximize the numerical reward signal. A value function $V$ evaluates the value of a state as the total amount of reward an agent can expect to accumulate over the future, starting from that state, $s_1$. \begin{equation} \label{eqn:valuefunction} V(s_1 | \pi ) = \mathrm{E} \left[ \sum\nolimits_{i = 1}^\infty \gamma^{i-1} R(s_i, a_i | \pi ) \right], \end{equation} where $\gamma$ is a discount factor. RL also defines an action-value function $Q$ to judge the value of actions, according to \begin{equation} \label{eqn:Qfunction} Q( s, a | \pi ) = R(s,a) + \gamma \mathrm{E}_{s' \sim T(s,a)} V(s' |\pi). \end{equation} The optimal value function is $V^\ast(s) = \sup_\pi V^\pi(s)$ and the optimal $Q$-function is $Q^\ast(s,a) = \sup_\pi Q^\pi(s,a)$. The goal of RL is to find a policy $\pi$ that maximizes $Q^\pi(s,a)$. Ng and Russel~\cite{ng2000algorithms} introduced the concept of \textit{inverse reinforcement learning} (IRL), of which the goal is to find a reward function\footnote{Ng and Russel~\cite{ng2000algorithms} suggest the learning of reward function rather than the policy since a reward function provides a more parsimonious description of behavior.} to explain observed behavior, \ie, sequences of states traversed. IRL is useful when a reward function is unknown a-priori. Behavior can be observed from another expert who acts according to an unknown policy. In this case, the task of inverse reinforcement learning can be regarded as \textit{imitation learning} or apprenticeship learning~\cite{abbeel2004apprenticeship}. \fi An illustration of the proposed framework is given in Fig.~\ref{fig:decisionIllustration}. We treat grouping as a sequential process. In each step during test time, two candidate groups $C_i$ and $C_j$ are chosen. Without loss of generality, a group can be formed by just a single instance. Given the two groups, we extract meaningful features to characterize their similarity, group consistency, and image quality. Based on the features, an agent will then perform an action, which can be either i) merging the two groups, or ii) not merging the two groups. Once the action is executed accordingly, the grouping proceeds to select the next pair of groups. The merging stops when there are no further candidate groups can be chosen, \eg, the similarity between any groups is higher than a pre-defined threshold. Next, we define some key terminologies. \begin{figure}[t] \begin{center} \includegraphics[width=\linewidth]{decisionIllustrationTall.pdf} \end{center} \vskip -0.45cm \caption{Face grouping by the proposed framework.} \label{fig:decisionIllustration} \end{figure} \vspace{0.1cm} \noindent \textbf{Recommender}: At each time step we pick and consider the merging of two face groups. The action space is large with a complexity of $O(N^2)$, where $N$ is the number of groups. This adds hurdles to both learning and test stages. To makes our approach scalable, we employ a recommender, $M$, which recommends two candidates cluster $C_i$ and $C_j$ at each time step. This reduces the $O(N^2)$ action space to a binary problem, \ie, to merge or not to merge a pair of face groups. A recommender $M$ can be derived from many classic clustering algorithms especially agglomerative-based algorithm like hierarchical clustering (HC), ranked-ordered clustering~\cite{zhu2011rank} and GDL approach~\cite{zhang2012graph}. For instance, hierarchical clustering-based $M$ always suggest two clusters that are nearest by some distance metric. In Sec.~\ref{sec:experiments}, we perform rigorous evaluations on plausible choices of a recommender. \vspace{0.1cm} \noindent \textbf{State:} Each state $s_t = (h_t, H_t )\in \mathcal{S}$, contains the current grouping partition $h_t$ and recommender history $H_t$, at time step $t$. In each discrete state, the recommender $M$ will recommend a pair of cluster $(C_i, C_j) = M( s )$ based on the current state. \vspace{0.1cm} \noindent \textbf{Action:} An action is denoted as $a$. An agent can execute two possible actions, \ie, merge two groups or not. That is the action set is defined as $\mathcal{A} = \left\{\mathrm{merge}, \mathrm{not}\text{\_}\mathrm{merge}\right\}$, and $a\in \mathcal{A}$. \vspace{0.1cm} \noindent \textbf{Transition:} If a merging action is executed, candidate groups $C_i$ and $C_j$ will be merged. The corresponding partition is updated as $h_{t+1} \leftarrow \{ h_t \backslash \{C_i, C_j\} \} \cup \{ C_i \cup C_j \} $. Otherwise, the partition remains unchanged, $h_{t+1} \leftarrow h_t $. The candidate information will be appended to the history $H_{t+1}$ so that the same pair would not be recommended by $M$. The transition is thus represented as $s_{t+1} = T(s_t,a)$, where $T(\cdot)$ denotes the transition function, and $s_{t+1} = (h_{t+1}, H_{t+1})$ and $s_t = (h_t, H_t)$. \section{Learning Face Grouping by Imitation} \label{sec:learning_face_grouping} The previous section explains the face grouping process at test time. An agent is used to determine the right action at each step, \ie, merging or not merging a pair of groups. To learn an agent with the desired behavior, we assume access to demonstrations by some expert. In our study, we obtain these demonstrations from a set training photo albums of which the ground-truth partition of the photos is known. Consequently, given any two candidate groups, $C_i$ and $C_j$, we know if merging them is a correct action or not. These ground-truth actions $\left\{a_\mathrm{GT}\right\}$ represent the pseudo expert's behavior. Towards the goal of learning an agent from the expert's behavior, we perform the learning in two stages: (1) we find a reward function to explain the behavior via inverse reinforcement learning~\cite{ng2000algorithms}, (2) with the learned reward function we find a policy that maximizes the cumulative rewards. Formally, let $R: \mathcal{S} \times \mathcal{A} \rightarrow \mathbb{R}$ denotes the reward function, which rewards the agent after it executes action $a$ in state $s$. And $\mathcal{T}$ is a set of state transition probabilities upon taking action $a$ in state $s$. For any policy $\pi$, a value function $V^\pi$ evaluates the value of a state as the total amount of reward an agent can expect to accumulate over the future, starting from that state, $s_1$, \begin{equation} \label{eqn:valuefunction} V^\pi(s_1 ) = \mathrm{E} \left[ \sum\nolimits_{t = 0}^\infty \gamma^{t-1} R(s_t, a_t | \pi ) \right], \end{equation} where $\gamma$ is a discount factor. An action-value function $Q^\pi$ is used to judge the value of actions, according to \begin{equation} \label{eqn:Qfunction} Q^\pi( s, a ) = R(s,a) + \gamma V^\pi (s' | s' = T(s, a ) ), \end{equation} where the notation $s' = T(s,a)$ represents the transition to state $s'$ after taking an action $a$ at state $s$. Our goal is to first uncover the reward function $R$ from expert's behavior, and find a policy $\pi$ that maximizes $Q^\pi(s,a)$. \vspace{0.1cm} \noindent \textbf{Rewards:} In our study, the reward function that we wish to learn consists of two terms, denoted as \begin{equation} \label{eqn:reward} R = R_{\mathrm{short}} + \beta R_{\mathrm{long}}. \end{equation} The first and second term corresponds to short- and long-term rewards, respectively. The parameter $\beta$ helps balance the scale of the two terms. The short-term reward is multivariate. It considers how strong two instances/groups should be merged locally based on face similarity, group consistency, and face quality. A long-term reward captures more far-sighted clustering strategy through measuring the operation cost to get from an arbitrary photos partition to the final ground-truth partition. Note that during the test time, the long-term reward function is absorbed in our learned action-value function for a policy $\pi$, thus no ground-truth is needed during testing. We provide explanations on the short- and long-term rewards as follows. \subsection{Short-Term Reward} \label{subsec:short_term} Before a human user decides a merge between any two face groups, he/she will determine how close the two groups are in terms of face similarity. In addition, he/she may consider the quality and consistency of images in each group to prevent any accidental merging of uninteresting faces and noisy detections. We wish to capture such a behavior through learning a reward function. The reward is considered short-term since it only examines the current groups' partition. Specifically, we compute the similarity between two groups, the quality for each group and photos consistency in each group as a feature vector $\phi(s)$, and we project this feature into a scalar reward, \begin{equation} \label{eqn:rewardShort} R_{\mathrm{short}}(s, a ) = y(a) \left( \mathbf{w}^\mathsf{T} \phi(s) + b \right), \end{equation} where $y(a)=1$ if action $a = \mathrm{merge}$, and $y(a)=-1$ if $a = \mathrm{not}\text{\_}\mathrm{merge}$. Note that we assume the actual reward function is unknown and $(\mathbf{w},b)$ should be learned through IRL. We observe that through IRL, a powerful reward function can be learned. An agent can achieve a competitive result even by myopically deciding based on one step's reward function rather than multiple steps. We will show that optimizing $(\mathbf{w},b)$ is equivalent to learning a hyperplane in support vector machine (SVM) (Sec.~\ref{subsec:learning}). Next, we describe how we design the feature vector $\phi(s)$, which determines the characteristics an agent should examine before making a group merging decision. A feature vector is extracted considering the candidate groups, all faces' representation $\mathbf{X}$ in the groups, and current partition $h$, that is $\phi(s) = \psi \left( C_i, C_j, \mathbf{X}, h \right)$. The proposed feature vector contains three kinds of features, so as to capture face similarity, group consistency, and image quality. All face representation are extracted from Inception-v3 model~\cite{szegedy2015rethinking} fine-tuned with MS-Celeb-1M~\cite{guo2016msceleb}. More elaborated features can be considered given the flexibility of the framework. \noindent \textbf{Face Similarity:} We compute a multi-dimensional similarity vector to describe the relationship between two face groups $C_i$ and $C_j$. Specifically, we first define the distance between the representation of two arbitrary faces $\mathbf{x}^u_i \in C_i$, and $\mathbf{x}^v_j \in C_j$ as $d(\mathbf{x}^u_i,\mathbf{x}^v_j)$. The subscript on $\mathbf{x}$ indicates its group. In this study, we define the distance function as angular distance. We then start from $C_i$: for a face $\mathbf{x}^u_i$ in $C_i$, we compute its distance to all the faces in $C_j$ and select a median from the resulting distances. That is \begin{equation} d_\mathrm{med}(\mathbf{x}^u_i, C_j) = \mathrm{median} \left\{ d(\mathbf{x}^u_i , \mathbf{x}^1_j), \dots, d(\mathbf{x}^u_i , \mathbf{x}^{n_j}_j) \right\}, \end{equation} where $n_j = |C_j|$. We select $\eta$ number of instances with the shortest distances from $\left\{ d_\mathrm{med}(\mathbf{x}^u_i, C_j), \forall u \right\}$ to define the distance from $C_i$ to $C_j$. Note that the distance is not symmetric. Hence, we repeat the above process to obtain another $\eta$ shortest distances from $\left\{ d_\mathrm{med}(C_i,\mathbf{x}^v_j), \forall v \right\}$ to define the distance from $C_i$ to $C_j$. Lastly, these $2\eta$ distances are concatenated to form a $2\eta$-dimensional feature vector. \noindent \textbf{Group Consistency:} Group consistency measures how close the samples in a group to each other. Even two groups have high similarity in between their respective members, we may not want to merge them if one of the group is not consistent, which may happen when there are a number of non-interesting faces inside the group. We define the consistency of a group as the median of pairwise distances between faces in the group itself. Given a group $C_i$: \begin{equation} consistency(C_i)\!=\!\mathrm{median} \left\{ d(\mathbf{x}^u_i , \mathbf{x}^v_i), u\! \neq\!v, \forall (u,v)\!\in \!C_i \right\}. \end{equation} Consistency is computed for the two candidate groups, contribute a two-dimensional feature vector to $\phi(s)$. \noindent \textbf{Face Quality:} As depicted in Fig.~\ref{fig:profileSimilairty}, profile faces and noises could easily confuse a state-of-the-art face recognition model. To make our reward function more informed on the quality of the images, we train a linear classifier by using annotated profile and falsely detected faces as negative samples, and clear frontal faces as positive samples. A total of 100k face images extracted from movies is used for training. The output of the classifier serves as the quality measure. Here, we concatenate the quality values of the top $\eta$ faces in each of the two groups to form another $2\eta$-dimensional features to $\phi(s)$. \subsection{Long-Term Reward} \label{subsec:long_term} While the short-term reward $R_\mathrm{short}$ captures how likely two groups should be merged given the current partition, the long-term reward $R_\mathrm{long}$ needs to encapsulate a more far-sighted clustering strategy. To facilitate the learning of this reward, we introduce the term `\textit{operation cost}', which measures the efforts needed to manipulate the images in the current partition to approach to ground-truth partition. Formally, given a partition $h \in \mathcal{V}$ and ground-truth partition $g \in \mathcal{V}$. A sequence of operations $o_i \in \mathcal{O}:\mathcal{V} \rightarrow \mathcal{V}$ can be executed to gradually modify the partition $h$ to $g$. The cost function $c : \mathcal{O} \rightarrow \mathbb{R}_{>0}$ maps each type of operations into a positive time cost. then we define $Op(h,g)$ as the minimal cost for this change: \begin{equation} \begin{aligned} \label{eqn:operation_cost} Op(h,g) = \min_{\Gamma, o_1 \ldots o_\Gamma} & \sum\nolimits_{t=1}^\Gamma c\left( o_t \right), \\ \mathrm{s.t.~} g & = o_\Gamma \cdot \ldots \cdot o_2 \cdot o_1 \cdot h \\ o_t & \in \mathcal{O} \end{aligned} \end{equation} where $\Gamma$ is the number of steps needed to get from $h$ to $g$. The cost function $c(\cdot)$ can be obtained from a user study. In particular, we requested 30 volunteers and show them a number of randomly shuffled images as an album. Their task is to reorganize the photos into a desired groups' partition. We recorded the time needed for three types of operations: (1) adding a photo into a group, (2) removing a photo from a group, and (3) merging two groups. The key results are shown in Fig.~\ref{fig:operationCost}. It can be observed that the `removing' operation takes roughly 6$\times$ longer than the `adding' operation. The `merging' operation is almost similar to `adding'. Consequently, we set the cost for these three operations as 1, 6, 1, respectively. The validity is further confirmed by the plot in Fig.~\ref{fig:operationCost} that shows a high-correlation between the time consumed and the computed operation cost. \begin{figure}[t] \begin{center} \includegraphics[width=0.95\linewidth]{operatorNumberTall.pdf} \end{center} \vskip -0.3cm \caption{A user study on operation cost.} \label{fig:operationCost} \end{figure} Given Eqn.~\eqref{eqn:operation_cost}, we define the long-term reward as: \begin{equation} \label{eqn:rewardLong} R_\mathrm{long} = - \Delta Op^{(K)} = -(Op( h_{t-K} , g )-Op( h_t, g)), \end{equation} which encodes the operation cost changes in $K$ steps. The key benefit brought by $R_\mathrm{long}$ is that it provides a long-term reward that guides an agent to thinking about the global picture of the grouping process. For any action that can hardly be decided (\eg, merging two noisy groups or merging a clean group with a noisy group), this term provides a strong evidence to the action-value function. \subsection{Finding the Reward and Policy} \label{subsec:learning} As discussed in Sec.~\ref{sec:learning_face_grouping}, we assume the availability of a set training photo albums of which the ground-truth partition of the photos is known. Let $\Omega = \{\omega^{(i)}\}$ denotes a set of albums in a training set. The ground-truth partition for albums $\omega^{(i)}$ is given as $g^{(i)}$, from which we can derive the ground-truth actions $\left\{a_\mathrm{GT}\right\}$ as an expert's behavior. Our goal is to find a reward function based on this behavior. We perform the learning in two steps to ease the convergence of our method: (1) Firstly, we employ IRL~\cite{ng2000algorithms} to find the reward function with a myopic or short-sighted policy. (2) We then use the classic $\epsilon$-greedy algorithm~\cite{watkins1989learning} to find the optimal policy. \begin{algorithm}[t] \footnotesize{ \caption{Reward function learning via IRL.} \label{alg:irl} \SetAlgoLined \SetKwInOut{Input}{input}\SetKwInOut{Output}{output} \SetKwRepeat{Repeat}{repeat}{until} \Input{Training albums $\Omega = \{\omega^{(i)}\}$, ground-truth partition $\{g^{(i)}\}$} \Output{Binary classifier $(\mathbf{w},b)$ for $R_\mathrm{short}$ } Initialization $\mathbf{w} \leftarrow \mathbf{w}_0$, $b \leftarrow b_0$, $\mathcal{L} \leftarrow \emptyset$\; \Repeat{all albums are successfully partitioned}{ \For{ $\omega^{(i)} \in \Omega$ }{ $t = 0$\; Initialize partition $h_t$ with each photo as a single group\; Initialize history $H_t \leftarrow \emptyset$\; \Repeat{end of grouping}{ $M$ recommends candidate groups $(C_j,C_k)$\; Compute action $a = \argmax_a R_\mathrm{short}(s,a)$\; Obtain ground-truth action $a_\mathrm{GT}$ based on $g^{(i)}$\; \If{$a \neq a_\mathrm{GT}$}{Add $(\phi(s), a_\mathrm{GT})$ into $\mathcal{L}$} \If{$a = a_\mathrm{GT}$}{$h_{t+1} \leftarrow \left\{ h_t \backslash \{C_j, C_k\} \right\} \cup \{ C_j \cup C_k \} $} Append $(C_j,C_k,a)$ into $H_{t+1}$\; $t=t+1$\; } Retrain $(\mathbf{w},b)$ on $\mathcal{L}$\; } } } \end{algorithm} \vspace{0.1cm} \noindent \textbf{Step 1}: Algorithm~\ref{alg:irl} summarizes the first step. Specifically, we set $\gamma=0$ in Eqn.~\eqref{eqn:Qfunction} and $\beta=0$ in Eqn.~\eqref{eqn:reward}. This leads to a myopic policy $Q^\pi( s, a | \pi ) $$= R_\mathrm{short}(s,a)$ that considers the current maximal short-term reward. This assumption greatly simplifies our optimization as $(\mathbf{w},b)$ of $R_{\mathrm{short}}$ (Eqn.~\eqref{eqn:rewardShort}) are the only parameters to be learned. We solve this using a binary RBF-kernel SVM with actions as the classes. We start the learning process with an SVM of random weights and an empty training set $\mathcal{L}=$$\emptyset$. We execute the myopic policy repeatedly on albums. Once the agent chooses the wrong action w.r.t. the ground-truth, the representations of the involved groups and the associated ground-truth will be added to the SVM training set. Different albums constitute different games in which SVM will be continually optimized using the instances that it does not perform well. Note that the set $\mathcal{L}$ is accumulated, hence each time we use samples collected from over time for retraining $(\mathbf{w},b)$. The learning stops when all albums are correctly partitioned. \vspace{0.1cm} \noindent \textbf{Step 2}: Once the reward function is learned, finding the best policy $\pi$ becomes a classic RL problem. Here we apply the $\epsilon$-greedy algorithm~\cite{watkins1989learning}. $\epsilon$-greedy policy is a way of selecting random actions with uniform distribution from a set of available actions. Using this policy either we can select random action with $\epsilon$ probability and we can select an action with $1-\epsilon$ probability that gives maximum reward in a given state. Specifically, we set $\gamma=0.9$ in Eqn.~\eqref{eqn:Qfunction} and $\beta=0.8$ in Eqn.~\eqref{eqn:reward}. We first approximate the action-value function $Q^\pi$ in Eqn.~\eqref{eqn:Qfunction} by a random forest regressor $Q(\phi(s),a)$~\cite{pyeatt2001decision}. The input to the regressor is $(\phi(s),a)$ and the output is the associated $Q^\pi$ value. The parameters of the regressor are initialized by $\phi(s)$, $a$, and $Q^\pi$ value, which are obtained in the first step (Algorithm~\ref{alg:irl}). After the initialization, the agent selects and executes an action according to $Q$, \ie, $a = \argmax_a Q(\phi(s),a)$, but with a probability $\epsilon$ the agent will act randomly so as to discover a state that it has never visited before. At the same time the parameters of $Q$ will be updated directly from the samples of experience drawn from the algorithm's past games. At the end of learning, the value of $\epsilon$ is decayed to 0, and $Q$ is used as our action-value function for policy $\pi$. \section{Experiments} \label{sec:experiments} \noindent \textbf{Training Data:} Our algorithm needs to learn a grouping policy from a training set. The learned policy can be applied to other datasets for face grouping. Here we employ $2,000$ albums simulated from MS-Celeb-1M~\cite{guo2016msceleb} of 80k identities as our training source. We will release the training data. \noindent \textbf{Test Data:} To show the generalizability of the learned policy, we evaluate the proposed approach on three datasets of different scenarios exclusive from the training source. Example images are provided in Fig.~\ref{fig:datasetOverview}. \noindent \textit{1) LFW-Album}: We construct a challenging simulated albums from LFW~\cite{huang2007labeled}, MS-Celeb-1M~\cite{guo2016msceleb}, and PFW~\cite{Sengupta2016frontal}, with a good mix of frontal, profile, and non-interested faces. We prepare 20 albums and with exclusive identities. Note that the MS-Celeb-1M samples used here are exclusive from the training data. \noindent \textit{2) ACCIO Dataset}: This dataset~\cite{esam2015accio} is commonly used in the studies of video face clustering. It contains face tracklets extracted from series of Harry Potter movie. Following~\cite{zhang2016joint}, we conduct experiments on the first instalment of the series, which contains 3243 tracklets from 36 known identities. For a fair comparison, we do not consider uninterested faces in this dataset following~\cite{zhang2016joint}. We discard the temporal information and used only the frames in our experiments. \noindent \textit{3) Grouping Face in the Wild (GFW)}: To better evaluate our algorithm for real-world application, we collect 60 real users' albums with permission from a Chinese social network portal. The size of an album varies from 120 to 3600 faces, with a maximum number of identities of 321. In total, the dataset contains 84,200 images with 78,000 faces of 3,132 different identities. All faces are automatically detected using Faster-RCNN~\cite{ren2015faster}. False detections are observed. We annotate all detections with identity/noise labels. The images are unconstrained, taken in various indoor/outdoor scenes. Faces are naturally distributed with different poses with spontaneous expression. In addition, faces can be severely occluded, blurred with motion, and differently illuminated under different scenes. We will release the data and annotations. To our knowledge, this is the largest real-world face clustering dataset. \begin{figure}[t] \begin{center} \includegraphics[width=0.98\linewidth]{datasetOverview.pdf} \end{center} \vskip -0.5cm \caption{Overview of test datasets.} \label{fig:datasetOverview} \end{figure} Given the limited space, we exclude results on traditional grouping datasets like Yale-B~\cite{georghiades2001few, lee2005acquiring}, MSRA-A~\cite{zhu2011rank}, MSRA-B~\cite{zhu2011rank} and Easyalbum~\cite{cui2007easyalbum}. Yale-B were captured in controlled condition with very few profile faces and noises. The number of albums is limited in the other three datasets. \begin{table*}[t] \footnotesize \begin{center} \caption{Face grouping results on LFW-Album, ACCIO-1, and GFW.} \begin{tabular}{l|ccc|c||ccc|c||ccc|c} Dataset & \multicolumn{4}{|c||}{LFW-Album} & \multicolumn{4}{|c||}{ACCIO-1} & \multicolumn{4}{|c}{GFW} \\ \hline Metric & P(\%) & R(\%) & $F_1$(\%) & $\overline{Op}$ & P(\%) & R(\%) & $F_1$(\%) & $\overline{Op}$ & P(\%) & R(\%) & $F_1$(\%) & $\overline{Op}$ \\ \hline \hline K-means & 73.6& 86.6& 79.3& 1.12 & 72.2& 34.4& 46.6& 0.65 & 66.6& 35.7& 41.1& 1.47 \\ GDL~\cite{zhang2012graph} & 66.5& \textbf{92.2}& 76.4& 1.21 & 18.1& 91.1& 30.2& 3.51 & 67.4& 59.4& 55.9& 1.30 \\ HC & 74.2& 80.8& 76.6& 0.35 & 17.1& \textbf{91.9}& 28.9& 3.28 & 77.5& 22.3& 15.0& 0.81 \\ AP~\cite{brendan2007clustering} & 76.7& 71.1& 73.7& 1.07 & 82.2& 9.6& 17.1& 0.59 & 69.7& 25.3& 32.7& 0.86 \\ Deep Adaptation~\cite{zhang2016joint} & - & - & - & - & 71.1& 35.2& 47.1& - & - & - & - & - \\ \hline \hline IL-Kmeans & 76.7& 87.8& 81.6& 0.95 & 82.8& 34.1& 48.3& 0.54 & 53.4& 43.6& 43.3& 1.17 \\ IL-GDL & 79.9& 90.1& 84.5& 0.54 & 88.6& 46.3& 60.8& 0.78 & 78.4& \textbf{76.2}& \textbf{74.5} & 0.68 \\ IL-HC & \textbf{97.8} & 85.3& \textbf{91.1}& \textbf{0.14} & \textbf{90.8}& 78.6& \textbf{84.3}& \textbf{0.52} & \textbf{96.6} & 53.7& 67.3& \textbf{0.17} \\ \hline \hline SVM $+$ Deep Features & 82.7 & 87.4 & 85.0 & 0.45& 89.0 & 61.3 & 72.6 & 0.74 & 84.3 & 46.4 & 56.3 & 0.33 \\ Siamese Network $+$ Deep Features & 87.1 & 87.6 & 87.3 & 0.44 & 59.7 & 88.1 & 71.2 & 0.79 & 49.9 & 92.3 & 62.8 & 0.33 \\\hline \end{tabular} \label{tab:mainExperiment} \end{center} \vskip -0.6cm \end{table*} \noindent \textbf{Implementation Details:} All face representation are extracted from Inception-v3 model~\cite{szegedy2015rethinking} fine-tuned with MS-Celeb-1M~\cite{guo2016msceleb}. We suggest some parameter settings as follows. We set $\beta=0.8$ in Eqn.~\eqref{eqn:reward} to balance the scales of short- and long-term rewards. We fixed the number of faces $\eta=5$ to form the similarity and quality features (Sec.~\ref{subsec:short_term}). The five shortest distances is a good trade-off between performance and feature complexity. If a group has fewer than five faces (to the extreme only one face exists), we pad the distance vector with the farthest distance. \noindent \textbf{Evaluation Metrics:} We employ multiple metrics to evaluate the face grouping performance, including the B-cubed precision, recall, and $F_1$ score suggested by ~\cite{zhang2013unified} and~\cite{zhang2016joint}. Specifically, B-cubed recall measures the average fraction of face pairs belonging to the ground truth identity assigned to the same cluster. And B-cubed precision is the fraction of face pairs assigned to a cluster with matching identity labels. The $F_1$ score measures the harmonic means of these two metrics. We also use \textsl{operation cost} introduced in Sec.~\ref{subsec:long_term}. To facilitate comparisons across datasets of different sizes, we compute the operation cost normalized by the number of photos as our metric, \ie, $\overline{Op} = Op/ N$. We believe that this metric is more important than the others since it directly reflects how much effort per image a user needs to spend to organize a photo album. \subsection{Comparison with Unsupervised Methods} \label{subsec:comparison_exp} We compare our method with classic and popular clustering approaches: 1) K-means, 2) Graph Degree Linkage (GDL)~\cite{zhang2012graph}, 3) Hierarchical Clustering (HC), and 4) Affinity Propagation (AP)~\cite{brendan2007clustering}. Note that we also compare with~\cite{zhang2016joint}. Since the code is not publicly available, we only compare with its reported precision, recall, and $F_1$ scores on the ACCIO-1 dataset. Note that these baselines use the same features as our approach, as discussed in Sec.~\ref{subsec:short_term}. To verify if the proposed imitation learning (IL) framework helps existing clustering methods, we adapt K-means, GDL and HC into IL-K-means\footnote{For IL-K-means algorithm, the action space $A$ is no longer binary due to the nature of K-means. Here we adapt the framework to have an action space of $K+1$, for determining the merging of a sample into one of the $K$ clusters. And we replace the SVM with a RankSVM~\cite{Joachims2002optimizing} to compute the rewards for each cluster.}, IL-GDL and IL-HC to equip them with the sequential decision capability. This is achieved by using the respective algorithm as the recommender (see Sec.~\ref{sec:overview}). Table~\ref{tab:mainExperiment} summarizes the results on three datasets. We observed that: (1) imitation learning consistently improves the different clustering baselines. For instance, on LFW-Album, the $F_1$ score and $\overline{Op}$ of HC improves from 76.6\% and 0.35 to 91.1\% to 0.14. Notably, IL-HC outperforms other variants based on the proposed IL, although our framework is not specifically developed to work only with hierarchical clustering. (2) The operation cost is lower with a high-precision algorithm. This result matches with our user study since a user is good at adding similar photos into a group but poor at removing noisy faces that can be hard to distinguish. We compare grouping results of IL-HC and HC qualitatively in Fig.~\ref{fig:example_grouping}. IL-HC yields more coherent face groupings with exceptional robustness to outliers. \begin{figure}[t] \begin{center} \includegraphics[width=1\linewidth]{figure5.pdf} \caption{\textbf{Visualization of grouping result} (best viewed in color). The figure shows a typical album of GFW. Each node in the circle indicates a face, and each color denotes a person of specific identity. The result of hierarchical clustering (HC) contains more negative edges (black arcs), representing wrongly merged groups. Imitation learning based HC (IL-HC) prevents negative edges as produced by HC.} \label{fig:example_grouping} \end{center} \vskip -0.4cm \end{figure} \subsection{Comparison with Supervised Methods} \label{subsec:comparison_supervised} We compare our framework with two supervised baselines, namely a SVM classifier and a three-layer Siamese network. The three layers of the Siamese network have 256, 64, 64 hidden neurons, respectively. A contrastive loss is used for training. To train the baselines, each time we sample two subsets of identities from MS-Celeb-1M as the training data. SVM and the Siamese Network are used to predict if two groups should be merged or not. Features are extracted following the method presented in Sec.~\ref{subsec:short_term}. These supervised baselines are thus strong since their input features are identical to those we use in our IL framework. The features include face similarity vector that is derived from Inception-v3 face recognition model fine-tuned with MS-Celeb-1M dataset. The deep representation achieves 99.27\% on LFW, which is better than~\cite{sun2014deep} and on-par with~\cite{wen2016discriminative}. The results of the baseline are presented in Table~\ref{tab:mainExperiment}. It is observed that the IL-based approach outperforms the supervised baselines by a considerable margin. \subsection{Ablation Study} \label{subsec:ablation} \noindent \textbf{Further Analysis on Recommender}: In Sec.~\ref{subsec:comparison_exp}, we tested three different recommenders based on different clustering methods, namely K-means, GDL, and HC. In this experiment, we further analyze the use of a random recommender that randomly chooses a pair to recommend. Figure~\ref{fig:randomRecommender} shows the $F_1$ score comparisons between a Hierarchical Clustering (HC) recommender and a random recommender. In comparison to the recommender based on HC, which always recommends the nearest groups, the random recommender exhibits a slower convergence and poorer results. It is worth pointing out that the random recommender still achieves a $F_1$ score of 61.9\% on GFW, which outperforms the unsupervised baseline, which only achieves 15\%. The results suggest the usefulness of deploying a recommender. We also evaluate an extreme approach that does not employ a recommender but selects a group pair to merge based on the values produced by the learned action-value function. Specifically, in each step, we compute the $Q(\phi(s),a)$ exhaustively for all possible pairs of group, and select the pair with the highest value to merge. This approach achieves $82.7\%$ $F_1$ on GFW. It is not surprising that the result is better than our IL-HC as this approach performs exhaustive search for pairs. This method has a runtime complexity of $\BigO(N^3)$, much higher than the IL-HC. The results suggest the effectiveness of the clustering-based recommender in our framework. \begin{figure}[t] \begin{center} \includegraphics[width=1.0\linewidth]{F1Iter.pdf} \end{center} \vskip -0.50cm \caption{The $F_1$ score on using different recommenders along with different training iterations. The red curve is obtained by using Hierarchical Clustering (HC) as the recommender, while the blue curve is obtained by using the random recommender.} \label{fig:randomRecommender} \vskip -0.2cm \end{figure} \noindent \textbf{Discard the Face Quality Feature}: If we remove the face quality feature from the feature vector $\phi(s)$, the $F_1$ score achieved by IL-HC of LFW-Album, ACCIO-1, and GFW will drop from 91.1\%, 84.3\%, and 67.3\%, to 89.5\%, 65.0\%, and 48.4\%, respectively. The results suggest that the importance of quality measure depends on the dataset. Face quality feature is essential on the GFW dataset but less so on others, since GFW consists more poor-quality images. \noindent \textbf{Reward Function Settings}: We evaluate the effect of two reward terms in the reward function defined in Eqn.~\eqref{eqn:reward}. \noindent 1) $R_{\mathrm{short}}$ \& $R_{long}$: The full reward setting with $\beta \neq 0$. \noindent 2) w/o $R_\mathrm{long}$: Without the long-term reward based on operation cost, \ie, $\beta = 0$. \noindent 3) w/o $R_\mathrm{short}$: In this setting, we discarded $R_{\mathrm{short}}$ learned by IRL, and redefined it to take a na\"{i}ve $\pm 1$ loss, \ie, $R_{\mathrm{short}} = \mathbbm{1}(a = a_\mathrm{GT} )$, where $\mathbbm{1}(\cdot)$ is an indicator function that outputs 1 if the condition is true, and -1 if it is false. The results reported in Table~\ref{tab:valueExperiment} shows that both short- and long-term rewards are indispensable to achieve good results. Comparing the baselines ``w/o $R_\mathrm{short}$'' against the full reward, we observed that IL learned a more powerful short-term reward function than the na\"{i}ve $\pm 1$ loss. Comparing the baselines ``w/o $R_\mathrm{long}$'' against the full reward, albeit removing $R_\mathrm{long}$ only reduces the $F_1$ score slightly, the number of false positive and false negative merges actually increase for noisy and hard cases. Figure~\ref{fig:qualitative} shows some representative groups that were mistakenly handled by IL-HC w/o $R_\mathrm{long}$. It is worth pointing out that by adjusting the cost distributions of $R_\mathrm{long}$, \eg, changing the cost of `add, remove, merge' from (1,6,1) to (1,1,1), one could alter the algorithm's bias on precision and recall to suit for different application scenarios. A chart of B-cubed PR-curves is depicted in Fig.~\ref{fig:PRcurve} to show the influence of cost distribution. Hierarchical clustering with imitation learning (IL-HC) outperforms the baselines HC and AP no matter which settings we use. We recommend a high precision setting in order to achieve a low normalized operation cost $\overline{Op}$, as suggested by experiments in Sec.~\ref{subsec:comparison_exp}. \begin{table}[t] \footnotesize \begin{center} \caption{Different settings of reward function. We use IL-HC in this experiment.} \begin{tabular}{l|cc|cc} Dataset & \multicolumn{2}{|c|}{LFW-Album} & \multicolumn{2}{|c}{GFW} \\ \hline Metric & $F_1$(\%) & $\overline{Op}$ & $F_1$(\%) & $\overline{Op}$ \\ \hline \hline $R_{\mathrm{short}}$ \& $R_\mathrm{long}$ & 91.1 & 0.14 & 67.3 & 0.17 \\ w/o $R_{long}$ & 90.7 & 0.14 & 62.6 & 0.17 \\ w/o $R_\mathrm{short}$ & 73.0 & 0.54 & 17.1 & 0.65 \\ \hline \end{tabular} \label{tab:valueExperiment} \end{center} \end{table} \begin{figure}[t] \begin{center} \includegraphics[width=0.95\linewidth]{qualitativeResult.pdf} \end{center} \vskip -0.4cm \caption{Example of merging decisions made by different algorithms. Each image represents a group they belong to. It is observed that IL-HC w/o $R_{long}$ tends to produce false negative (FN) and false positive (FP) mistakes in comparison to IL-HC with full reward.} \label{fig:qualitative} \end{figure} \begin{figure}[t] \begin{center} \includegraphics[width=0.95\linewidth]{PRcurve.pdf} \end{center} \vskip -0.4cm \caption{B-cubed precision and recall curve on GFW dataset with adjustment to the cost distribution of `add, remove, merge' operations in $R_\mathrm{long}$.} \label{fig:PRcurve} \end{figure} \if 0 \subsection{Generalization of Learned Policy (this section will be removed)} The policy learned by the proposed approach can be transferred to other datasets with a good generalization performance. Here we conduct two experiments: \noindent \textbf{Cross-Dataset Evaluation}: Our algorithms needs to learn a grouping policy from a training set. To show that the learned policy can be transferred to an unseen distribution, we deliberately train IL-HC on LFW and apply the policy to GFW with an entirely different data distribution. We then repeat the experiment by swapping the training and test sets. We also evaluated the generalization of policies from LFW and GFW on Accio. Table~\ref{tab:crossExperiment} suggests that IL-HC's policies can generalize well. In all cases, the cross-dataset performances are still better than the baselines reported. \begin{table}[t] \footnotesize \begin{center} \caption{Cross-dataset evaluations using IL-HC.} \vskip -0.2cm \begin{tabular}{l|cc|cc} Test $\backslash$ Train & \multicolumn{2}{|c|}{LFW} & \multicolumn{2}{|c}{GFW} \\ \hline Metric & $F_1$(\%) & $\overline{Op}$ & $F_1$(\%) & $\overline{Op}$ \\ \hline \hline LFW & 91.1 & 0.142 & 90.4 & 0.156 \\ GFW & 46.8 & 0.268 & 67.3 & 0.174 \\ ACCIO & 77.7 & 0.549 & 73.6 & 0.642 \\ \hline \end{tabular} \label{tab:crossExperiment} \end{center} \vskip -0.2cm \end{table} \begin{table}[t] \footnotesize \begin{center} \caption{Testing with additional noises.} \vskip -0.2cm \begin{tabular}{l|cc|cc} & \multicolumn{2}{|c|}{LFW-Album (original)} & \multicolumn{2}{|c}{LFW-Album ($+$50\% noises)} \\ \hline Metric & $F_1$(\%) & $\overline{Op}$ & $F_1$(\%) & $\overline{Op}$ \\ \hline \hline IL-HC & 91.1 & 0.14 & 88.2 & 0.21 \\ HC & 76.6 & 0.35 & 58.7 & 0.59 \\ \hline \end{tabular} \label{tab:noiseExperiment} \end{center} \vskip -0.2cm \end{table} \noindent \textbf{Testing with Additional Noises:} The original LFW-Album dataset contains 10-30\% of noises, including uninterested faces and false detections. To evaluate the robustness of IL-HC to noise, we increased the number of uninterested faces and false detections in LFW-Album. Table~\ref{tab:noiseExperiment} shows that the performance of the proposed algorithm is still competitive even on a more challenging dataset, while the baseline clustering method suffers a more rapid degradation of performance. \fi \section{Conclusion} We have proposed a novel face grouping framework that makes sequential merging decision based on short- and long-term rewards. With inverse reinforcement learning, we learn powerful reward function to cope with real-world grouping tasks with unconstrained face poses, illumination, occlusion, and abundant of uninteresting faces and false detections. We have demonstrated that the framework benefits many existing agglomerative-based clustering algorithms. {\small \bibliographystyle{ieee}
\section{Introduction, motivation and goals}\label{sec:intro} The interaction between a quantum mechanical system and a large number of environmental degrees of freedom typically leads to dissipative dynamics of the system's degrees of freedom along with decoherence. The quantum system plus environment form a closed dynamical system described by a density matrix that evolves with unitary time evolution. Tracing out the environmental degrees of freedom lead to the description of the system's dynamics as an \emph{open quantum system}\cite{breuer,weiss,gardiner,ines,daley}. The theory of open quantum systems plays a fundamental role in quantum information and quantum computing since the quantum mechanical degrees of freedom exploited to implement quantum computing protocols are unavoidably coupled to environmental degrees of freedom. Experimental progress in quantum optics, cavity electrodynamics\cite{braun,girvin} and optomechanics\cite{opto1,opto2,opto3,opto4,kipp} provide novel platforms and architectures for quantum information and computing. The possibility to engineer the properties of the environmental bath\cite{bathengi,ver,paavo,brum,brunner,xu,poya} opens a new, experimentally accessible window into the fundamental aspects of open quantum systems. A recent experiment\cite{groex} has probed the spectral properties of the environmental bath with an opto-mechanical resonator, and experimental studies\cite{exp1,exp2,exp3} have demonstrated the feasibility of coupling various quantum systems to non-equilibrium baths. The experimental possibility to engineer the couplings and the environmental degrees of freedom provides a pathway to controlling the dissipative and decoherence properties of the bath paving the way for experimental control of entanglement of the system's degrees of freedom and could lead to novel cooling techniques of optomechanical systems\cite{xu}. Theoretical and experimental developments in quantum open systems are also fuelling the emerging field of quantum thermodynamics\cite{quthermo1,quthermo2,quthermo3,paz,buttner1,kosloff,deffner}. An important, paradigmatic model of quantum open systems is that of quantum brownian motion\cite{feyver,leggett,grabert,ford1,hu1,hu2osc,flehu,breuer,weiss,carlesso,marzo,feria} that considers the system to be an harmonic oscillator with linear coupling to a bath of a large number of harmonic oscillators with a continuum density of states. The properties of this bath are determined by its spectral density. This simple model has yielded a deep understanding of the role of an environmental bath on decoherence and dissipation of quantum mechanical degrees of freedom. Not only does this model provide a window into the fundamental questions of decoherence and dissipation, but has also been of fundamental experimental relevance in the design of nanomechanical resonators that work at the quantum limit\cite{haye,blen}. A powerful tool to study the non-equilibrium dynamics in quantum open systems is the quantum master equation\cite{gardiner,breuer,ines}. Typically for generic quantum open systems the derivation of the quantum master equation relies on various approximations. Chief among them are: i) the Born approximation, which assumes a \emph{factorization} between the time dependent reduced density matrix and the time independent density matrix of the environment, usually taken to be in thermal equilibrium, and ii) the Markov approximation which neglects the memory of the time evolution and yields a time-local master equation. Often further approximations, such as the secular or rotating wave approximation are invoked to yield a Lindblad quantum master equation\cite{breuer,gardiner,ines}. The model of quantum Brownian motion provides a case in which the \emph{exact} quantum master equation is available, obtained via path integral techniques\cite{leggett,hu1,ford2,karr,unruh,kumar}, as well as a similar equation for its Wigner transform\cite{yu}. The exact quantum master equation for quantum Brownian motion is found to be time-local, but is given in terms of time dependent coefficient functions that must be obtained from complicated differential equations with memory kernels\cite{hu1,ford2}. Besides the model of quantum Brownian motion, there are a few other instances in which an exact quantum master equation is available: the case of a (fermionic or bosonic) system of N-independent single particle energy levels linearly coupled to a reservoir of harmonic bosonic modes\cite{nori}, a two level-system (qubit) coupled to a bosonic (harmonic) reservoir\cite{vacchini} (this latter model is exactly solvable because of the total excitation number is conserved). However, more generally such exact solution is not available and the Born-quantum master equation is the tool of choice for studying the non-equilibrium dynamics of quantum open systems. The Born-Markov approximation to the quantum master equation often has shortcomings, for example violations of positivity of the density matrix\cite{breuer,sch}, and further approximations leading to a Lindblad form are often invoked to overcome this problem. More recently a Lindblad model of quantum Brownian motion has been proposed\cite{maciej,kumar} that introduces a time-local Lindblad form for the quantum master equation for quantum Brownian motion that bypasses the complicated time dependent form of the exact master equation and overcomes the shortcomings of the Born-Markov approximations. \vspace{2mm} \textbf{Motivation.} The quantum master equation in the Born approximation, often in Lindblad form\cite{breuer,ines,gardiner}, is widely used in theoretical or experimental studies of non-equilibrium dynamics of open quantum systems. The Born approximation assumes a factorization between the (reduced) density matrix of the system and that of the bath, which is assumed to retain its initial value. This approximation neglects the build up of correlations between the system and the bath and is typically justified for weak coupling, which under most circumstances implies that the relaxation or damping rate(s) are much smaller than the typical frequency of the system's degrees of freedom. However, for a given model of the environmental degrees of freedom there are generally several other parameters that characterize the spectral density of the bath, for example the bandwidth (cutoff). The precise manner in which these features of the spectral density determine the regime of reliability of the Born and Markov approximations is seldom discussed either theoretically or experimentally. Motivated by the timely importance of quantum master equations to study the dynamics of quantum open systems and by its relevance to the interpretation of experimental results, in this article we focus on establishing a \emph{direct} comparison between the results for correlation functions obtained with the quantum master equation in the Born approximation with the \emph{exact} results for the case of quantum Brownian motion. To the best of our knowledge there has not yet been a comparison between the exact dynamics and the predictions of the Born quantum master equation (with or without the Markov approximation) for systems with continuous variables. \vspace{2mm} \textbf{Goals:} Our main goal is to understand the regime of validity of the quantum master equation in the Born approximation by directly comparing its predictions with exact results available in the case of quantum Brownian motion. Whereas the exact quantum master equation for this case has been derived previously and discussed extensively\cite{leggett,hu1,ford2,karr,kumar,yu}, obtaining correlation functions requires the exact solution of this equation. This is in general a daunting task because the time-dependent coefficients of the quantum master equations must be obtained from the solutions of differential equations non-local in time. Furthermore, even when this quantum master equations is solved, correlation functions at different times involve the implementation of the quantum regression theorem\cite{breuer,gardiner}. We proceed instead in a very different manner: we obtain the exact solution of the Heisenberg-Langevin equations which allow us to \emph{directly} obtain any correlation function \emph{exactly} at different times and at all temperatures in terms of the spectral density of the bath. We then focus on the case of an Ohmic bath with a Drude spectral density\cite{breuer,weiss} which offers the distinct advantage of an exact analytic solution. Such exact analytic treatment allows us to explicitly obtain the dependence of the correlation functions on the various parameters: the bandwidth (cutoff) of the bath $\Lambda$, the system's relaxation rate $\gamma$ and the \emph{unrenormalized} system's natural frequency $\Omega$. A direct comparison with the correlation functions obtained from the quantum master equation in the Born approximation, with or without the Markov approximation, leads to establishing unambiguosly the regime of validity of both approximations. Furthermore, we study the system-bath correlations to assess the correlations missed by the Born approximation. As a \emph{proxy} for these correlations we study the interaction energy between the system and the bath, which is also interpreted as the correlation between the system degrees of freedom and the collective bath variable to which the system couples directly. \section{The model and the Heisenberg-Langevin equation of motion. }\label{sec:model} We consider an oscillator of unit mass coupled to a bath of oscillators in equilibrium at temperature $T$. The total Hamiltonian is \be H= H_S+ H_B+ H_{SB} \label{totalH}\ee \be H_S = \frac{p^2}{2}+ \frac{\Omega^2}{2}~q^2 \,, \label{Hsis}\ee \be H_B = \sum_{k} \frac{1}{2} \Big[ {P^2_{k}} + {W^2_{k}} \, Q^2_{k} \Big]\,. \label{Hbath}\ee with $H_B$ describing a bath of harmonic oscillators to be taken in thermal equilibrium at temperature $T$. The system-bath coupling is taken to be \be H_{SB} = -q \, \sum_{k} C_k \,Q_{k} \,,\label{SBcoup} \ee and the equations of motion are \bea && \ddot{q} + \Omega^2 q = \,\sum_{k} C_k \,Q_{k} \label{EOMq} \\ && \ddot{Q}_{k} + W^2_{k} Q_{k} = C_k\, q(t) \,. \label{EQMB} \eea We will solve the dynamics as an initial condition problem, setting up initial conditions at time $t=0$. This allows us to understand the transient evolution of correlation functions and the approach to an asymptotic stationary state. We proceed by solving the equations of motion for the bath variables and inserting the solution into the equations of motion for the system coordinate, namely \bea Q_{k}(t) & = & Q^{(0)}_{k}(t) + C_k \int_0^t \frac{\sin\big[W_{k}(t-t') \big]}{W_{k}} \,q(t') \,dt' \,,\label{solB} \eea where \be Q^{(0)}_{k}(t) = \frac{1}{\sqrt{2\,W_{k}}}\,\Big[a_k\,e^{-iW_{k}t}+a^\dagger_k\,e^{ iW_{k}t}\Big] \label{zeroQB} \ee is the operator solution of the homogeneous equation in terms of independent annihilation ($a_k$) and creation ($a^\dagger_k$) bath operators. The bath is assumed to be in thermal equilibrium at temperatures $T$ , with statistical average (hereafter we set $\hbar=1~~;~~k_B=1$) \be \langle \langle a^\dagger_k a_k \rangle \rangle = \frac{1}{e^{ W_{k}/T}-1} \,,\label{thermal}\ee where $\langle \langle(\cdots) \rangle \rangle$ define the statistical averages over the bath variables. Inserting the solutions (\ref{solB}) into (\ref{EOMq}) we find a Heisenberg-Langevin equation of motion for the system coordinate, \be \ddot{q}(t) + \Omega^2 q(t) \, +\int_0^t \Sigma(t-t')\,q(t') dt' = \xi(t) \,,\label{HLq} \ee where the self-energy kernel is given by \be \Sigma(t-t') = -\sum_k \frac{C^2_k}{W_k}\,\sin[W_k(t-t')] \equiv \frac{i}{\pi}\,\int_{-\infty}^{\infty} \sigma(\omega') \,e^{i\omega'(t-t')}\,d\omega' \, \label{sigma}\ee and the spectral density of the bath is \be \sigma(\omega') = \sum_k \frac{\pi\,C^2_k}{2\,W_{k}}\,\Big[\delta(\omega'-W_{k})-\delta(\omega'+W_{k}) \Big]\,, \label{spec} \ee Note also that $\sigma(\omega) = -\sigma(-\omega)$, and that the noise term is \be \xi(t) = \sum_k C_k \, Q^{(0)}_{k}(t) \,.\label{noise} \ee A homogeneous version of the Heisenbeg-Langevin equation (\ref{HLq}) (without the noise term and with the lower limit in the non-local integral taken to $-\infty$) has been considered in refs.\cite{ris,ull} to study dynamical susceptibilities. The Heisenberg-Langevin equation of motion (\ref{HLq}) is solved by Laplace transform, for which one introduces \be \tilde{q}(s) = \int_0^\infty e^{-st}\,q(t)\,dt~~;~~ \widetilde{\Sigma}(s) =\int_0^\infty e^{-st}\,{\Sigma}(t)\,dt ~~;~~\tilde{\xi}(s) = \int_0^\infty e^{-st}\,{\xi}(t)\,dt \,. \label{laplavars} \ee From the spectral representation of the self-energy (\ref{sigma}) we find \be \widetilde{\Sigma} (s) = - \frac{1}{\pi}\int_{-\infty}^{\infty} \, \frac{\sigma(\omega')}{\omega'+ i\,s}\, {d\omega'} \,, \label{sigmaofs} \ee and the solution in Laplace is \be \tilde{q}(s) = g(s)\Big[ \dot{q}(0) + s\,q(0) +\tilde{\xi}(s) \Big]\,, \label{sollapla} \ee where \be g(s) = \frac{1}{\big[s^2+ \Omega^2 +\widetilde{\Sigma}(s)\big] }\,. \label{gofs}\ee The solution of Eq. (\ref{HLq}) can be written \be q(t) = G(t)\,\dot{q}(0) + \dot{G}(t)\,q(0) + \int_0^t G(t-t') \xi(t')\,dt' \,,\label{qoft}\ee where \be G(t) = \int_{\mathcal{C}} \frac{ds}{2\pi i}\, g(s)\, e^{st} \label{goft} \ee is the solution of (\ref{HLq}) for $\xi(t) =0$ with initial conditions $G(0)=0, \dot{G}(0) =1$, and $\mathcal{C}$ stands for the Bromwich contour, parallel to the imaginary axis and to the right of all the singularities of the function $g(s)$ in the complex $s$-plane. We write the exact solution (\ref{qoft}) as \be q(t) = q_0(t) + q_\xi(t) ~~;~~ q_0(t) = G(t)\,\dot{q}(0) + \dot{G}(t)\,q(0) ~~;~~ q_\xi(t) = \int_0^t G(t-t') \xi(t')\,dt' \label{qsplit} \ee to highlight the two different contributions: from the initial value ($q_0(t)$) and the noise term ($q_\xi(t)$). In the Heisenberg picture the operators depend on time but states do not. Correlation functions of operators are obtained by taking expectation values of the time evolved, Heisenberg operators in the \emph{initial total density matrix} $\rho_{SB}(0)$. For example, the total average \be \langle q(t) q(t') \rangle \equiv \mathrm{Tr}_{SB}~ q(t) q(t') \rho_{SB}(0) \,.\label{qtqtp}\ee The exact solution to the Heisenberg-Langevin equation allows to obtain the correlation functions for any \emph{arbitrary initial state}. However, our goal is to compare to the correlations obtained from the quantum master equation which is usually obtained under the assumption of an initially factorized state. Therefore we take the \emph{initial} density matrix for system plus bath to be of the factorized form \be \rho_{SB}(0) = \rho_S(0)\otimes \rho_B(0) ~~;~~ \rho_B(0) = \frac{e^{-{H_B}/{T}}}{\mathrm{Tr}_B~e^{-{H_B}/{T}} } \,. \label{rhototini}\ee This is the usual choice for the initial density matrix in the quantum master equation approach\cite{breuer,gardiner}, furthermore, in the Born approximation, such factorization is assumed to hold \emph{at all times}. While, as discussed in ref.\cite{anglin} such factorization may not yield a correct description of decoherence, we emphasize that our main goal is to compare the exact results from the Heisenberg-Langevin approach to those obtained from the quantum master equation obtained under the usual assumption of factorization. Therefore, correlation functions of the system's Heisenberg operators require \emph{two} different averages: \textbf{(i)} { Average over the initial conditions, denoted by $\langle q(t) q(t') \cdots \rangle_S$, correspond to averaging with the initial density matrix of the system $\rho_S(0)$. We define averages with $\rho_S(0)$ as \be \langle \, \mathcal{O} \, \rangle_S \equiv \mathrm{Tr} \rho_S(0) \,\mathcal{O} \,.\label{traceS0def}\ee } \textbf{(ii)} { Averages over the noise terms $\xi $ correspond to averaging over the bath variables with the statistical distribution of the bath and we define \be \langle \langle \,(\cdots) \, \rangle \rangle \equiv \mathrm{Tr}\rho_B(0) (\cdots)\,. \label{traceBdef}\ee With $\xi(t)$ given by eqn. (\ref{noise}) and using (\ref{zeroQB},\ref{thermal}) and the fact that the spectral density satisfies $\sigma(\omega) = -\sigma(-\omega)$, we find \be \langle \langle \xi(t) \rangle \rangle = 0 \label{xiexp}\ee and noise correlator \be \langle \langle \xi(t_1) \xi(t_2) \rangle \rangle = \frac{1}{\pi} \int^\infty_{-\infty} d\omega ~\sigma(\omega)~n(\omega) ~e^{i\omega(t_1-t_2)} ~~;~~ n(\omega) = \frac{1}{e^{\omega/T}-1} \,. \label{noiseave}\ee } Because the theory is Gaussian, only the one and two- point correlation functions must be obtained; higher order correlation functions can be obtained from Wick's theorem. These definitions and (\ref{xiexp}) yield \bea \langle q(t) q(t') \rangle &= & G(t) G(t') \langle p^2(0) \rangle_S + \dot{G}(t)\dot{G}(t') \langle q^2(0)\rangle_S + G(t) \dot{G}(t') \langle p(0) q(0) \rangle_S + G(t')\dot{G}(t) \langle q(0) p(0) \rangle_S \nonumber \\ &+& \int^t_0 dt_1 \int^{t'}_0 dt_2 G(t-t_1)\, G(t'-t_2) \,\langle \langle \xi(t_1) \xi(t_2) \rangle \rangle\,, \label{qtqtp2} \eea where where $p(0) = \dot{q}(0)$. Other correlation functions are obtained in a similar manner. These results are \emph{exact and general}; it remains to specify the spectral density of the bath. We consider an Ohmic bath with a Drude spectral density, namely, \be \sigma(\omega) = \gamma \omega \,\frac{\Lambda^2}{\Lambda^2+\omega^2} ~~;~~ \gamma >0 \,, \label{ohm} \ee where $\Lambda$ determines the bandwidth of the bath (cutoff). We will consider $\Lambda \gg \Omega, \gamma$ without condition on the ratio $\Lambda/T$ in order to study the cases $\Lambda \gg T,\Lambda \ll T$ in detail. For this spectral density, the symmetrized noise correlation function is given by (\ref{symecor}) in Appendix \ref{app:integrals} and the self-energy (\ref{sigma}) becomes \be \Sigma(\tau) = -\gamma \Lambda^2\,e^{-\Lambda |\tau|}\,\mathrm{sign}(\tau)\,. \label{selfie}\ee We note that \be \Sigma(\tau)~ {}_{\overrightarrow{\Lambda \rightarrow \infty}}~\gamma \frac{d}{d\tau}\,\delta(\tau)\,, \label{limi}\ee and its Laplace transform is given by \be \widetilde{\Sigma}(s) = -\frac{\gamma \Lambda^2}{\Lambda + s}\,. \label{laplasigma}\ee Taking the large $\Lambda$ limit $g(s)$ in (\ref{gofs}) simplifies to \be g(s) = \frac{1}{s^2+ \Omega^2_R + \gamma s} \,, \label{gslarLam}\ee where the renormalized frequency is \be \Omega^2_R = \Omega^2 - \gamma\Lambda \,.\label{Oren}\ee In this limit we find \be G(t) = e^{-\gamma t/2}\,\frac{\sin{Wt}}{W} ~~;~~ W = \sqrt{\Omega^2_R-\frac{\gamma^2}{4}} \,. \label{goftlarLam}\ee In Appendix \ref{app:GF} we analyze $g(s)$ and $G(t)$ including the full expression (\ref{laplasigma}) for $\widetilde{\Sigma}(s)$ and confirm the validity of (\ref{goftlarLam}) for $ W/\Lambda \ll 1,\gamma/\Lambda \ll 1$. At this point we note that the renormalization condition (\ref{Oren}) restricts the possible values of $\gamma \Lambda$. Since $\Omega^2 > 0$, (as physically expected from an uncoupled oscillator), \emph{if} $\gamma \Lambda > \Omega^2$ it follows that $\Omega^2_R <0$, implying an \emph{instability} due to the fact that in this case $W$ is purely imaginary, leading to one growing and one decaying mode after coupling to the bath. The existence of a growing solution precludes an asymptotic stationary regime; this can be seen clearly in the correlation function (\ref{qtqtp2}) which would grow without bound as a function of time if $\Omega^2_R <0$. Therefore, an asymptotically well defined equilibrium or stationary state requires that $\Omega^2_R > 0$, leading to the \emph{stability condition} \be \frac{\gamma \Lambda}{\Omega^2} <1 \,. \label{const}\ee For $t, t' \gg 1/\gamma$ only the last term of (\ref{qtqtp2}) survives, and a straightforward calculation in this limit yields \be \langle q(t) q(t') \rangle = \frac{1}{\pi} \int^\infty_{-\infty} d\omega ~\frac{\sigma(\omega)~n(\omega)}{\Big[(\omega^2-\Omega^2_R)^2+(\omega\gamma)^2\Big]} ~e^{i\omega(t-t')}\,. \label{asyqtqtp}\ee This correlation function indicates the emergence of a stationary limit for $t,t' \gg 1/\gamma$. With $p(t) = dq(t)/dt$, it is straightforward to obtain in this long time limit \be \langle p(t) p(t') \rangle = \frac{1}{\pi} \int^\infty_{-\infty} d\omega ~\frac{\omega^2\,\sigma(\omega)~n(\omega)}{\Big[(\omega^2-\Omega^2_R)^2+(\omega\gamma)^2\Big]} ~e^{i\omega(t-t')}\,, \label{asyptptp}\ee and \be \langle (p(t)q(t)+q(t)p(t)) \rangle = \Big[ \frac{d}{dt} + \frac{d}{dt'} \Big]\,\langle q(t) q(t') \rangle\Big|_{t=t'} = 0 \,. \label{asypqpqexa}\ee We now focus on the coincidence limit $t=t' \gg 1/\gamma$ to compare to the equal time correlation functions obtained with the quantum master equation in the next section. Because $\sigma(\omega)=-\sigma(-\omega)$, it follows that for $t=t'\gg 1/\gamma$ \bea \langle \, q^2(t) \, \rangle & = & \frac{1}{2\pi} \int^\infty_{-\infty} d\omega ~\frac{\sigma(\omega)~\coth[\frac{\omega}{2T}]}{\Big[(\omega^2-\Omega^2_R)^2+(\omega\gamma)^2\Big]} \label{asyqtqtpnew}\\ \langle \, p^2(t) \, \rangle & = & \frac{1}{2\pi} \int^\infty_{-\infty} d\omega ~\frac{\omega^2\,\sigma(\omega)~\coth[\frac{\omega}{2T}]}{\Big[(\omega^2-\Omega^2_R)^2+(\omega\gamma)^2\Big]} \,. \label{asyptptpnew} \eea Similar exact expressions have been obtained in ref. \cite{grabert2}. With the Drude spectral density (\ref{ohm}) the integrals can be performed by contour integration, and taking the limits $\Lambda \gg \Omega_R, \gamma$ yields (see appendix (\ref{app:integrals}) for details) \be \langle \, q^2 \, \rangle = \frac{1}{4W} \Bigg\{\coth\Big[ \frac{W+i \gamma/2}{2T}\Big] +\coth\Big[ \frac{W-i \gamma/2}{2T}\Big] \Bigg\} + \frac{\gamma}{2\Lambda^2} ~ i\coth[\frac{i\Lambda}{2T}] + \frac{\gamma}{T^2}F[\Lambda/T, \Omega_R/T,\gamma/T]\,. \label{q2fini}\ee The first term (in brackets) is the contribution from the resonant complex poles at $\omega = i\gamma/2 \pm W$ in the limit $\Lambda \gg W, \gamma$. The second term arises from the pole at $\omega = i\Lambda$ and can be safely neglected for $\Lambda \gg \gamma$. The third contribution arises from the Matsubara poles (from $\coth[\omega/2T]$) at $\omega = 2\pi i l T~~;~~ l=1,2,\cdots$ (see (\ref{integ})); the function F remains finite at all temperatures and $\Lambda$ and is given by eqn. (\ref{FunFu}) in appendix (B). In the weak coupling limit, $\Omega_R \gg \gamma$, the first term in (\ref{q2fini}) yields the result for an harmonic oscillator in thermal equilibrium (quantum equipartition). In particular, in the high temperature limit $T \gg \Omega_R, \gamma$ and $\Lambda \gg \Omega_R, \gamma$ we obtain \be \langle \, q^2 \, \rangle = \frac{T}{\Omega^2_R} + \cdots \,, \label{classq2fini}\ee where the dots stand for terms that are subleading for $T \gg \Omega_R$ and $\Lambda \gg \Omega_R, \gamma$. Implementing the same method we find \be \langle \, p^2 \, \rangle = \frac{W}{4} \Bigg\{\big(1+i \gamma/2W\big)^2~\coth\Big[ \frac{W+i \gamma/2}{2T}\Big] +\big(1-i \gamma/2W\big)^2~\coth\Big[ \frac{W-i \gamma/2}{2T}\Big] \Bigg\} + \gamma \,I(\Lambda/T, \Omega_R/T, \gamma/T)\,, \label{p2fini} \ee where the function $I(\Lambda/T, \Omega_R/T, \gamma/T)$ is given by eqn. (\ref{FunIu}) in appendix B. As a consequence of the extra term $\omega^2$ in the integrand in (\ref{asyptptpnew}), for $\Lambda \gg T,\Omega_R,\gamma$ the dimensionless function $I$ features a logarithmic dependence with the bandwidth; in this limit we find\cite{ours} \be \gamma\,I[\Lambda/T, \Omega_R/T, \gamma/T] = \frac{\gamma}{\pi} \ln\big[ \frac{\Lambda}{2\pi T} \big] + \cdots \label{loga} \ee where the dots stand for terms that remain finite in the limit $\Lambda \rightarrow \infty$\cite{ours}. In the opposite limit $T \gg \Lambda, \Omega_R, \gamma$ this function remains small of the order of the respective ratios displayed in the argument. In the high temperature limit with $T \gg \Lambda,\Omega_R,\gamma$ (\ref{p2fini}) yields \be \langle \, p^2 \, \rangle = T + \cdots \,, \label{p2classfini}\ee while for $\Lambda \gg T\gg \Omega_R, \gamma$ we find \be \langle \, p^2 \, \rangle = T\,\Big(1 + \frac{\gamma}{\pi T} \ln\big[ \frac{\Lambda}{2\pi T} \big]\Big) + \cdots \label{p2classloga}\ee The logarithmic dependence on the bandwidth survives in the zero temperature limit, where it yields a correction to $\langle ~ p^2 ~\rangle$ of the form $\gamma/\pi ~ \ln[\Lambda/W]$\cite{ours}. The results obtained above are \emph{exact} under the main assumptions $\Lambda \gg \Omega, \gamma$, with the constraint $\Omega^2 > \gamma \Lambda$ which is necessary to ensure that $\Omega^2_R >0$. This latter constraint implies that the Green's function $G(t)$ (\ref{goftlarLam}) is damped, which leads to an asymptotic stationary state. The results presented above are \emph{general} for a Drude-Ohmic model without restrictions on the ratio $\gamma/\Omega$. The contributions that are proportional to $\Lambda$ (frequency renormalization) and $\ln[\Lambda]$ for $\Lambda \gg T$, are \emph{not} a consequence of the Drude form of the Ohmic spectral density, but a direct consequence of the large separation of scales when $\Lambda \gg \Omega, \gamma$ (the logarithmic correction emerging for $\Lambda \gg T$). For example, it is straightforward to find that an exponential cutoff \be \sigma(\omega) = \gamma \omega \, e^{-|\omega|/\Lambda}\,, \label{expocut}\ee instead of the Drude form (\ref{ohm}) yields a similar frequency renormalization ($\propto \gamma \Lambda$) and logarithmic contribution to $\langle p^2 \rangle$ for $\Lambda \gg T,\Omega_R,\gamma$ although the finite temperature integrals are more cumbersome. We emphasize that the above results depend on $\Omega_R$ and not directly on the unrenormalized (bare) frequency $\Omega$. This aspect will become an important distinction with the results from the quantum master equation studied below. The logarithmic divergence with $\Lambda$ of $\langle p^2 \rangle$ merits discussion. To understand its origin let us consider the correlation function (\ref{asyptptp}) for $t-t' = \tau > 0$ with $W\tau \ll 1~,~ \gamma \tau \ll 1$ and $\Lambda \gg T \gg \Omega_R, \gamma$. The frequency integral can be done by residues by closing the contour in the upper half $\omega$-plane. The contribution from (complex) zeroes in the denominator in (\ref{asyptptp}) yield the first term (in brackets) in (\ref{p2fini}). The contribution from the poles at $\omega = i \Lambda$ arising from $\sigma(\omega)$ lead to \[-i\frac{\gamma}{2}\coth\Big[\frac{i\Lambda}{2T}\Big]~~e^{-\Lambda \tau}\,,\] which is finite and vanishes rapidly for $\Lambda \tau \gg 1$. The most important contribution arises from the poles corresponding to the Matsubara frequencies $\omega_l = i 2\pi T l $ with $l = 0,1,2\cdots$. These yield the contribution \[ \frac{\gamma}{\pi} \sum_{l=1}^\infty \, \frac{1}{l}\,\Big[\frac{(\Lambda/2\pi T)^2}{(\Lambda/2\pi T)^2 - l^2}\Big] \, e^{-2\pi l T \tau}\,. \] For $T \gg \Lambda$ this contribution is $\propto \gamma (\Lambda / T)^2$ and negligible. However, for $\Lambda \gg T$ it can be very well approximated for $\tau \gtrsim 1/\Lambda$ by \be \frac{\gamma}{\pi} \sum_{l=1}^\infty \, \frac{1}{l}\, \, e^{-2\pi l T \tau} = -\frac{\gamma}{\pi}\ln\Big[ 1- e^{-2\pi T \tau}\Big]~~ {}_{\overrightarrow{\tau \rightarrow 0}} ~~-\frac{\gamma}{\pi}\ln\Big[2\pi T\tau\Big] \,.\label{applogterm}\ee Taking the shortest time scale to be that of the bath $\tau \simeq 1/\Lambda$ yields the logarithmic divergence (\ref{loga}) for $T \ll \Lambda$. Therefore, it is clear that the divergence is a consequence of measuring correlations with a time difference shorter than the typical time scale of the bath, which is determined by the bandwidth $\Lambda$. For $\tau \lesssim 1/\Lambda$ the correlation function probes frequencies of the order of the bandwidth of the bath. Measuring the correlation on time differences $\tau \gtrsim 1/\Lambda$ cuts-off the divergence with the bandwidth. A similar conclusion was reached in Ref.\cite{ours} within a different context and for a strictly Ohmic bath. This analysis suggests that the bandwidth dependence of correlation functions will be stronger for super-ohmic spectral densities when $T/\Lambda \ll 1$ (see discussion in section (\ref{sec:nonohm})). \section{Quantum master equation}\label{sec:qme} In this section we study the dynamics within the framework of the quantum master equation. For the model of quantum Brownian motion under consideration there is a body of work on the \emph{exact} quantum master equation\cite{leggett,hu1,ford2,karr,kumar,yu}. This exact form is obtained from the path integral representation of the time evolution of the total density matrix after tracing over the bath degrees of freedom, which yields an ``influence action''\cite{feyver} for the system's degrees of freedom. The exact master equation so derived is local in time, but involves complicated functions of time that are obtained from the solution of differential equations with memory. Obviously the \emph{exact} master equation yields the same information as the \emph{exact} solution of the Heisenberg-Langevin equation. While obtaining correlation functions at different times from the solution of the Heisenberg-Langevin equation is fairly straightforward, as shown in the previous section, in the master equation approach obtaining correlation functions at non-equal times requires implementing the quantum regression theorem\cite{breuer,gardiner}. Our focus here is to compare the exact results obtained above from the solution to the Heisenberg-Langevin equation to the quantum master equation often used for open quantum systems that relies on the Born-Markov approximation valid for \emph{weak coupling}. Within the context of the model studied here, the weak coupling condition is equivalent to the condition \be \gamma/ \Omega_R \ll 1 \label{wccond}\,,\ee namely, the damping rate is much smaller than the (renormalized) oscillation frequency. As a result of eqn. (\ref{goftlarLam}) this condition is equivalent to $W \gg \gamma$. Furthermore, consistently with the previous section, we also assume $\Lambda \gg \Omega_R, \gamma$. We obtain the quantum master equation in the interaction picture, wherein the full density matrix $\rho_I(t)$ obeys \be \dot{\rho}_I(t) = -i\Big[H_I(t),\rho_I(t)\Big] \label{rhoIdot}\ee with $H_I(t) = H_{SB}(t)$ and $H_{SB}$ is given by Eq. (\ref{SBcoup}). The time evolution is in the interaction picture of $H_S+H_B$, namely $q(t)$ and $Q_k(t)$ evolve in time with the free Hamiltonian. Therefore \be H_{SB}(t) = -q(t)\, \xi(t) \label{HSBint}\,,\ee where \be q(t) = q(0)\,\cos(\Omega t) + \frac{p(0)}{\Omega} \, \sin(\Omega t)~~;~~p(0) = \dot{q}(0)\,, \label{qip}\ee and $\xi(t)$ is given by eqn. (\ref{noise}) with $Q^{(0)}_k(t)$, the free bath coordinates, given by (\ref{zeroQB}). The formal solution is \be \rho_I(t) = \rho_{SB}(0) - i\int_0^t dt_1 \Big[H_I(t_1),\rho_I(t_1)\Big] \label{rhoIsol}\ee where $\rho_{SB}(0)$ is given by eqn. (\ref{rhototini}). Inserting this solution back into (\ref{rhoIdot}) yields \be \dot{\rho}_I(t) = -i\Big[H_I(t),\rho_{SB}(0)\Big] - \int^t_0 dt_1 \Big[H_I(t),\Big[H_I(t_1),\rho_I(t_1)\Big]\Big]\,. \label{rhodotiter}\ee The reduced density matrix for the system variables is obtained by tracing over the bath variables, namely \be \rho_r(t) = \mathrm{Tr}_{B}~ \rho_I(t)\,, \label{rhored}\ee and since $\langle \langle \xi(t) \rangle\rangle =0$, the first term in (\ref{rhodotiter}) does not contribute to the quantum master equation for the reduced density matrix. Therefore \be \dot{\rho}_r(t) = -\mathrm{Tr}_B \int_0^t dt_1 \Big[H_I(t),\Big[H_I(t_1),\rho_I(t_1)\Big]\Big]\,. \label{rhodotred}\ee In order to obtain the time evolution of expectation values of operators associated with the system's variables in the interaction picture, one would need to solve equation (\ref{rhodotred}) exactly, usually a very difficult task. Instead one obtains evolution equations for the expectation values, \be \frac{d}{dt} \langle \, \mathcal{O} \,\rangle (t) = \langle \,\dot{\mathcal{O}} \,\rangle (t) + \mathrm{Tr}\mathcal{O}(t) \dot{\rho}_r(t)\,, \label{dotexp}\ee where \be \langle \, \mathcal{O} \,\rangle (t) \equiv \mathrm{Tr}_S\, \mathcal{O}(t) \,\rho_r(t) \,, \label{expdef}\ee and $\mathcal{O}(t)$ is an operator associated with the system's variables in the interaction picture. Correlation functions at different times may be obtained from the quantum regression theorem\cite{breuer,gardiner}. Although eqn. (\ref{rhodotred}) is exact but difficult to solve, several approximations are usually invoked: \vspace{2mm} \textbf{1:) Born (factorization)} A factorization \be \rho_I(t) = \rho_r(t)\otimes \rho_B(0) \,,\label{factor}\ee is employed; under this approximation the trace over the bath degrees of freedom can be carried out and yields \bea \dot{\rho}_r(t) & = & -\int^t_0\,dt_1\Bigg\{g^>(t-t_1)\Big[ q(t)q(t_1)\rho_r(t_1)-q(t_1)\rho_r(t_1)q(t)\Big] \nonumber \\ & + & g^<(t-t_1)\Big[\rho_r(t_1)q(t_1)q(t)-q(t)\rho_r(t_1)q(t_1)\Big]\Bigg\} \,,\label{rhodotfact}\eea where $q(t)$ is given by (\ref{qip}). Furthermore, in terms of the noise variable, $\xi(t)$, we find (see eqn. (\ref{noiseave})) \be g^>(t-t_1) = \mathrm{Tr}_{B}\, \xi(t)\, \xi(t_1)\rho_B(0) = \frac{1}{\pi} \int^\infty_{-\infty} d\omega \sigma(\omega) n(\omega) e^{i\omega(t-t_1)} ~~;~~ n(\omega) = \frac{1}{e^{\omega/T}-1}\,,\label{ggreat} \ee \be g^<(t-t_1) = \mathrm{Tr}_{B}\, \xi(t_1)\, \xi(t)\,\rho_B(0) = \frac{1}{\pi} \int^\infty_{-\infty} d\omega \,\sigma(\omega)\, (1+n(\omega))\, e^{i\omega(t-t_1)} \,.\label{gless} \ee We note the following identities \be g^>(t-t_1) = \frac{1}{2\pi} \int^\infty_{-\infty} d\omega \,\sigma(\omega) \, \coth\big[\frac{\omega}{2T}\Big]\, e^{i\omega(t-t_1)} + \frac{i}{2} \Sigma(t-t_1)\,, \label{gpluside}\ee \be g^<(t-t_1) = \frac{1}{2\pi} \int^\infty_{-\infty} d\omega \,\sigma(\omega) \, \coth\big[\frac{\omega}{2T}\Big]\, e^{i\omega(t-t_1)} - \frac{i}{2} \Sigma(t-t_1)\,, \label{gminide}\ee where $\Sigma(t-t')$ is the self-energy given by Eq. (\ref{sigma}) and (\ref{selfie}) for the Drude-Ohmic case. The symmetrized noise correlation function is given by $[g^>(t-t_1)+g^<(t-t_1)]$; its explicit form for the Drude-Ohmic case is given by (\ref{symecor}) in Appendix (\ref{app:integrals}). \textbf{2:) Born-Markov approximation} In this approximation $\rho_r(t_1) \rightarrow \rho_r(t)$ in (\ref{rhodotfact}), and the upper limit of the integral is taken to $t\rightarrow \infty$. We will consider the Born-Markov approximation while keeping the upper limit at finite time $t$. Usually the rotating wave (or secular) approximation is invoked to yield the quantum master equation in Lindblad form\cite{breuer}, but we will not pursue this further approximation here. With (\ref{dotexp}) and (\ref{expdef}) we find \bea \frac{d}{dt} \langle \, q \, \rangle (t) & = & \langle \, p \rangle (t) \label{qdot}\\ \frac{d}{dt} \langle \, p \, \rangle (t) & = & -\Omega^2 \, \langle \, q \, \rangle (t) + \mathrm{Tr}_S \, p(t) \,\dot{\rho}_r(t) \,, \label{pdot} \eea where \be \mathrm{Tr}_S \, p(t) \, \dot{\rho}_r(t) = i \int^t_0 \Big[g^>(t-t_1)-g^<(t-t_1)\Big]\mathrm{Tr}_S \,q(t_1) \,\rho_r(t) \,.\label{traza} \ee In the trace in the last expression we need to write the interaction picture operator $q(t_1)$ in terms of operators at time $t$ to identify the last term as an expectation value at time $t$. This is achieved by inverting the relation (\ref{qip}) for $q(0),p(0)$ to obtain\footnote{Using the identity (\ref{qt1}) the quantum master equation in the Born-Markov approximation can be written in a manifestly time-local form. However, the non-local form is more compact to calculate correlators.} \bea q(t_1) & = & q(t) \cos[\Omega(t-t_1)] - \frac{p(t)}{\Omega} \sin[\Omega(t-t_1)] \label{qt1}\\ p(t_1) & = & p(t) \cos[\Omega(t-t_1)] + \Omega ~ q(t) \sin[\Omega(t-t_1)] \label{pt1}\eea leading to \be \mathrm{Tr}_S \, p(t) \, \dot{\rho}_r(t) = \langle \, q \, \rangle (t)\, \alpha(t) - \langle \, p \, \rangle (t) \, \beta(t) \,, \label{trdotp}\ee with the functions $\alpha(t),\beta(t)$ given by (see appendix (\ref{app:integrals})) \be \alpha(t) = \gamma \Lambda^2 \mathrm{Re} \Bigg\{\frac{1-e^{-\Lambda t}\,e^{i\Omega t}}{\Lambda - i\Omega} \Bigg\} \,,\label{alfat} \ee \be \beta(t) = \frac{\gamma \Lambda^2}{\Omega } \mathrm{Im} \Bigg\{\frac{1-e^{-\Lambda t}\,e^{i\Omega t}}{\Lambda - i\Omega} \Bigg\} \,.\label{betat} \ee Taking another time derivative of (\ref{qdot}), using (\ref{pdot}) along with the above results, we obtain \be \frac{d^2}{dt^2} \langle \, q \, \rangle (t) + (\Omega^2 -\alpha(t)) \langle \, q \, \rangle (t) + \beta(t) \, \frac{d}{dt} \langle \, q \, \rangle (t) = 0 \,. \label{eomqoft}\ee Although this differential equation is difficult to solve for all times, for $\Lambda t \gg 1$ and $\Lambda \gg \Omega$ it follows from (\ref{alfat}, \ref{betat}) that \bea \alpha(t) & & {}_{\overrightarrow{\Lambda t \gg 1}} ~~ \gamma \Lambda \,\frac{\Lambda^2}{\Lambda^2 + \Omega^2} ~~ {}_{\overrightarrow{\Lambda \gg \Omega}} ~~ \gamma \Lambda \label{alfatasy}\\ \beta(t) & & {}_{\overrightarrow{\Lambda t \gg 1}} ~~ \gamma \,\frac{\Lambda^2}{\Lambda^2 + \Omega^2} ~~ {}_{\overrightarrow{\Lambda \gg \Omega}} ~~\gamma \,. \label{betatasy} \eea Therefore in this limit the equation of motion (\ref{eomqoft}) becomes \be \frac{d^2}{dt^2}\, \langle \, q \, \rangle (t) + \Omega^2_R \, \langle \, q \, \rangle (t) + \gamma \, \frac{d}{dt} \, \langle \, q \, \rangle (t) = 0 \,. \label{eomqoftasy}\ee It is straightforward to confirm that the solution of this equation for $\Lambda t \gg 1$ is the expectation value of eqn. (\ref{qoft}) with the Green's function (\ref{goftlarLam}) and vanishing noise expectation value. In the quantum master equation approach one must find the solution of the quantum master equation for $\rho_r(t)$ from which the correlation functions are obtained by taking the appropriate averages, and the quantum regression theorem yields correlation functions at different times. Instead we obtain differential equations for \emph{equal time} correlation functions, which will be compared to the equal time limit ($t \rightarrow t'$ ) of the \emph{exact} correlation functions (\ref{asyqtqtpnew},\ref{asyptptpnew}) in the asymptotic long time limit $t \gg 1/\gamma$. We find \be \frac{d }{dt} \langle \, q^2 \,\rangle(t) = \langle \, (pq+qp)\,\rangle(t) \,, \label{q2ave}\ee \be \frac{d}{dt}\big[ \langle \, (pq+qp)\,\rangle(t) \big] = 2 \langle \, p^2\,\rangle(t) -2 (\Omega^2 - \alpha(t)) \langle \, q^2\,\rangle(t) -\beta(t) \langle \, (pq+qp)\,\rangle(t) + f(t) \,, \label{pqqp} \ee \be \frac{d }{dt} \langle \, p^2 \,\rangle(t) = - (\Omega^2 - \alpha(t))\langle \, (pq+qp)\,\rangle(t) -2 \beta(t) \langle \, p^2 \,\rangle(t) + h(t) \,, \label{p2ave}\ee where $\alpha(t),\beta(t)$ are given by (\ref{alfat},\ref{betat}), respectively, and \bea f(t) & = & \int^t_0 d\tau \Big[g^>(\tau)+g^<(\tau) \Big]\frac{\sin(\Omega \tau)}{\Omega} \label{foft} \\ h(t) & = & \int^t_0 d\tau \Big[g^>(\tau)+g^<(\tau) \Big]{\cos(\Omega \tau)} \,. \label{hoft} \eea The explicit form of the integrals for $f(t),h(t)$ are given in Appendix \ref{app:integrals}. Solving the set of coupled differential equations (\ref{q2ave}-\ref{p2ave}) is a very difficult task, however we can extract the asymptotic long time limit under the assumption that such limit describes a stationary state. In this limit the left hand side of these equations can be set to vanish and using the asymptotic limits (\ref{alfatasy},\ref{betatasy}) and the results of Appendix \ref{app:integrals} (see equations \ref{finfty},\ref{hinfty} ), we find \be \langle \, p^2 \,\rangle(\infty) = \frac{h(\infty)}{2\beta(\infty)} = \frac{\Omega}{2}\,\coth[\frac{\Omega}{2T}] \, \label{pinfty} \ee and \be \langle \, q^2 \,\rangle(\infty) = \frac{\Omega}{2\Omega^2_R} \,\coth[\frac{\Omega}{2T}]+ \frac{f(\infty)}{2\Omega^2_R} = \frac{\Omega}{2\Omega^2_R} \,\coth[\frac{\Omega}{2T}]+ \frac{\gamma}{\Omega^2_R}~\Big\{-\frac{T}{\Lambda} - \frac{1}{\pi}\mathrm{Re}\Big[\Psi\Big(\frac{\Lambda}{2\pi T} \Big)-\Psi\Big(\frac{i\Omega}{2\pi T} \Big) \Big] \Big\} \,.\label{qinfty} \ee The di-Gamma ($\Psi$) function has the following limits \be {\Psi(z)}_{ ~~\overrightarrow{z\rightarrow 0}}~~ -\frac{1}{z} + \mathcal{O}(1) ~~;~~ {\Psi(z)}_{ ~~ \overrightarrow{z\rightarrow \infty}} ~~ \ln(z)+ \mathcal{O}(1/z) \,,\label{digama}\ee therefore, in the high temperature classical limit $T \gg \Lambda \gg \Omega, \gamma$ we find \bea \langle \, p^2 \,\rangle(\infty) & = & T +\cdots \label{p2class} \\ \langle \, q^2 \,\rangle(\infty) & = & \frac{T}{ \Omega^2_R} \Big(1+ \frac{\gamma}{\Lambda}\Big) + \cdots \label{q2class}\eea where the dots stand for subleading contributions. Hence, we find that for $\Lambda \gg \gamma$ we recover classical equipartition in the high temperature limit when $T \gg \Lambda \gg \Omega, \gamma$. However, in the limit $\Lambda \gg T \gg \Omega, \gamma$ we find \bea \langle \, p^2 \,\rangle(\infty) & = & T +\cdots \label{p2class2} \\ \langle \, q^2 \,\rangle(\infty) & = & \frac{T}{\Omega^2_R} \Big(1 - \frac{\gamma}{\pi T} \ln\Big[\frac{\Lambda}{2\pi T}\Big] \Big ) +\cdots \label{q2class2}\eea Compare these results to the exact ones (\ref{classq2fini},\ref{p2classloga}). The difference is striking: In the results (\ref{p2class2}, \ref{q2class2}) the logarithmic dependence on $\Lambda$ appears in $\langle \, q^2 \,\rangle(\infty)$ instead of $\langle \, p^2 \,\rangle(\infty)$ as in the exact results. Although the discrepancy is perturbatively small $\propto \gamma / T$, it is enhanced by the large logarithm of the bandwidth. We find that in the Born-Markov approximation, although the differences from the exact results are suppressed by the perturbative ratio $\gamma/T$, these are \emph{enhanced} by $\ln[\Lambda/T]$, which could be a substantial enhancement for large bandwidth and low temperature. The logarithmic enhancement appears in $\langle \, q^2 \,\rangle(\infty)$ whereas the exact solution features this enhancement in $\langle \, p^2 \,\rangle(\infty)$ \emph{only}. Another important difference emerges when writing the asymptotic correlation functions in terms of the \emph{renormalized} frequency in order to compare to the exact results (\ref{asyqtqtpnew},\ref{asyptptpnew}) in the equal time limit. For example, compare (\ref{pinfty}) and the first term in (\ref{qinfty}) with the exact expressions (\ref{q2fini},\ref{p2fini}) (neglecting the term proportional to $\gamma$ in both cases); even neglecting terms of order $\gamma^2/\Omega^2_R$ in the arguments of the $\coth[(\cdots)]$ in (\ref{q2fini}), the two expressions differ in the frequency dependence, the exact solution depending \emph{solely} on the renormalized frequency $\Omega_R$ whereas the solution in the Born-Markov approximation depends both on the bare and renormalized frequencies. In weak coupling, the Born-Markov approximation coincides with the exact result \emph{only} in the classical limit $T \gg \Omega, \Omega_R , \gamma$. \vspace{2mm} \textbf{3:) Non-Markovian evolution: keeping the memory} The quantum master equation after the Born (factorization) approximation but \emph{without} the Markov approximation is given by Eq. (\ref{rhodotfact}). We now consider this equation keeping the memory, namely with $\rho_r(t_1)$ in the integral. Using Eq. (\ref{dotexp}) we find \be \frac{d}{dt} \langle q \rangle (t) = \langle p \rangle (t) \, \label{dqdtnmk}\ee and \be \frac{d}{dt} \langle p \rangle (t) = -\Omega^2 \,\langle q \rangle (t) + i\int^t_0 \Big[ g^>(t-t_1) - g^<(t-t_1)\Big] \, \langle q \rangle (t_1) \, dt_1 \,. \label{dpdtnmk} \ee Taking another time derivative of (\ref{dqdtnmk}), using equation (\ref{dpdtnmk}) and the definitions (\ref{ggreat}-\ref{gminide}) we find \be \frac{d^2}{dt^2}\, \langle q \rangle (t) + \Omega^2 \langle q \rangle (t) + \int^t_0 \Sigma(t-t_1)\,\langle q \rangle (t_1) dt_1 =0 \,.\label{diffeqnmk}\ee This is \emph{precisely} the expectation value of the Heisenberg-Langevin equation (\ref{HLq}), because the expectation value of the noise term vanishes. In the non-Markovian master equation (\ref{rhodotfact}) the reduced density matrix appears evaluated at time $t_1$ the expectation values of operators as defined by Eq. (\ref{expdef}) require the operators in the interaction picture to be evaluated at the (integrated) time $t_1$. To obtain the equations of motion for the equal time correlation functions we need the following identities for interaction picture operators \bea q(t) & = & q(t_1) \cos[\Omega(t-t_1)] + p(t_1) \frac{\sin[\Omega(t-t_1)]}{\Omega} \label{qiuti}\\p(t) & = & p(t_1) \cos[\Omega(t-t_1)] - q(t_1) \Omega \sin[\Omega(t-t_1)] \,. \label{piti} \eea Using these identities it is straightforward to obtain the following hierarchy of coupled equations, \be \frac{d}{dt} \Big[ \langle q \rangle (t) \Big] = \langle (pq+qp) \rangle (t) \,, \label{dq2dtnmk}\ee \be \frac{d}{dt} \Big[ \langle (pq+qp) \rangle (t) \Big] = 2 \langle p^2 \rangle (t) - 2 \Omega^2\,\langle q^2 \rangle (t) + \int^t_0 \Big[2 C(t-t_1)\, \langle q^2 \rangle (t_1) + S(t-t_1)\, \langle (pq+qp) \rangle (t_1) \Big] dt_1 + f(t)\,, \label{dpqdtnmk}\ee \be \frac{d}{dt} \Big[ \langle p^2 \rangle (t) \Big] = - \Omega^2 \langle (pq+qp) \rangle (t) +\int_0^t \Big[C(t-t_1)\, \langle (pq+qp) \rangle (t_1) -2 \Omega^2\,S(t-t_1)\,\langle q^2 \rangle (t_1) \Big] dt_1 + h(t) \,,\label{dp2dtnmk}\ee where \bea C(t-t_1) & = & i\Big[ g^>(t-t_1)- g^<(t-t_1)\Big]\,\cos[\Omega(t-t_1)] \,,\label{Ctt1}\\ S(t-t_1) & = & i\Big[ g^>(t-t_1)- g^<(t-t_1)\Big]\,\frac{\sin[\Omega(t-t_1)]}{\Omega} \,,\label{Stt1} \eea with $f(t)$ and $h(t)$ given by Eqns. (\ref{foft}),\ref{hoft}) respectively. The set of integro-differential coupled equations, (\ref{dq2dtnmk},\ref{dpqdtnmk},\ref{dp2dtnmk}) can be turned into an algebraic system of three inhomogeneous coupled equations with three unknowns by Laplace transform. The time evolution of the individual expectation values is then obtained by performing the inverse transform. If a stationary state emerges asymptotically, the equal time correlation functions become independent of time, therefore in the asymptotic long time limit the inverse Laplace transform of the equal time correlation functions is dominated by an isolated pole at $s=0$\footnote{If a singularity at $s=0$ is not isolated but is the end-point of a branch cut, the correlations will vanish asymptoticaly with long-time tails. The exact solution of section (\ref{sec:model}) shows the emergence of an asymptotic stationary state exponentially.} (Laplace variable). Obtaining the Laplace transforms and solving the resulting inhomogeneous algebraic system is straightforward. However, finding the poles, and in particular the isolated pole at $s=0$ that yields the asymptotic long time behavior is not. Instead, we propose a method that systematically yields a derivative expansion and, as argued below, under the assumption that asymptotically there emerges a stationary state, it gives the \emph{exact} asymptotic behavior of the equal time correlators. Consider the following generic term in the memory integrals in the above expressions, \be I(t) = \int^t_0 K_0(t;t_1) \langle \,\mathcal{O}\,\rangle (t_1) dt_1 \, , \label{Ioft} \ee and write \be K_0(t;t_1) = \frac{d}{dt_1}\,K_1(t;t_1) ~~;~~ K_1(t;t_1) \equiv \int^{t_1}_0 K_0(t;t_2) \, dt_2 ~~;~~ K_1(t;0) =0 \,.\label{Kone} \ee Then \be I(t) = K_1(t;t) \,\langle \, \mathcal{O} \, \rangle (t) - \int^t_0 K_1(t;t_1) \frac{d}{dt_1} \Big[ \langle \,\mathcal{O}\,\rangle (t_1) \Big] \,dt_1 \,. \label{I1oft}\ee Repeating the procedure and writing \be K_1(t;t_1) = \frac{d}{dt_1} \, K_2(t;t_1) ~~;~~ K_2(t;t_1) \equiv \int^{t_1}_0 K_1(t;t_2) \, dt_2 ~~;~~ K_2(t;0) =0 \,,\label{Ktwo} \ee the integral in (\ref{I1oft}) is again performed by integration by parts with the result \be I(t) = K_1(t;t) \, \langle \,\mathcal{O}\,\rangle (t) - K_2(t;t)\, \frac{d}{dt}\Big[\langle \,\mathcal{O}\,\rangle (t) \Big] + \int^t_0 K_2(t;t_1) \frac{d^2}{dt^2_1}\,\Big[ \langle \,\mathcal{O}\,\rangle (t_1) \Big] dt_1 \,.\label{I3oft} \ee Iterating this procedure one finds \be I(t) = K_1(t;t) \,\langle \, \mathcal{O} \, \rangle (t) - K_2(t;t) \frac{d}{dt} \Big[ \langle \,\mathcal{O}\,\rangle (t) \Big] + K_3(t;t) \frac{d^2}{dt^2} \Big[ \langle \,\mathcal{O}\,\rangle (t) \Big] + \cdots\,, \label{Ifinoft}\ee with \bea K_1(t;t) & = & \int^t_0 K_0(t;t_1) \,dt_1 \label{K1fin} \\ K_2(t;t) & = & \int^t_0 dt_1 \int^{t_1}_0 K_0(t;t_2) \,dt_2 \label{K2fin}\\ K_3(t;t) & = & \int^t_0 dt_1 \int^{t_1}_0 dt_2 \int^{t_2}_0 K_0(t;t_3) \,dt_3 \,. \label{K3fin}\\ \vdots & = & \vdots \eea In order to understand the physical nature of this expansion, consider the kernel \be K_0(t;t_1) = i \Big[g^>(t-t_1)-g^<(t-t_1)\Big]\,e^{i\Omega(t-t_1)} \, \label{Kexpo}\ee whose real and imaginary parts yield $C(t-t_1)$ and $S(t-t_1)$ in equations (\ref{Ctt1},\ref{Stt1}) respectively, which enter in the hierarchy of equations (\ref{dpqdtnmk},\ref{dp2dtnmk}). With the result (\ref{ggmingl}) in Appendix (\ref{app:integrals}) we find \be K_1(t;t) = \frac{\gamma \,\Lambda^2}{(\Lambda-i\Omega)}\,\Big[1-e^{-\Lambda t}\,e^{i\Omega t} \Big] \,, \label{K1expo}\ee \be K_2(t;t) = \frac{\gamma \,\Lambda^2}{2(\Lambda-i\Omega)^2 }\,\Bigg[1-e^{-\Lambda t}\,e^{i\Omega t}\,\Big(1+ (\Lambda -i\Omega)t\Big)\Bigg] \,.\label{K2expo}\ee Therefore, it is clear that for $t \gg 1/\Lambda$, the kernels $K_2(t;t), K_3(t;t) \cdots$ that multiply the derivatives involve higher powers of $1/\Lambda$, namely the time scale of relaxation of the bath degrees of freedom. Using these results for $C(t-t_1)$ and $ S(t-t_1)$, we now write (\ref{dpqdtnmk},\ref{dp2dtnmk}) in the derivative expansion \bea \frac{d}{dt} \Big[ \langle (pq+qp) \rangle (t) \Big] & = & 2 \langle p^2 \rangle (t) - 2 (\Omega^2- C_1(t;t)) \,\langle q^2 \rangle (t) + S_1(t;t) \, \langle (pq+qp) \rangle (t) + f(t) \nonumber \\ & + & 2\,C_2(t;t)\,\frac{d}{dt} \Big[\langle q^2 \rangle (t)\Big] + S_2(t;t) \, \frac{d}{dt} \Big[ \langle (pq+qp) \rangle (t) \Big]+\cdots \,, \label{dpqdtnmkder}\eea \bea \frac{d}{dt} \Big[ \langle p^2 \rangle (t) \Big] & = & - (\Omega^2-C_1(t;t)) \langle (pq+qp) \rangle (t) -2 \Omega^2\,S_1(t;t)\,\langle q^2 \rangle (t) + h(t)\nonumber \\ & + & C_2(t;t)\, \frac{d}{dt} \Big[ \langle (pq+qp) \rangle (t) \Big]- 2\Omega^2\, S_2(t;t) \,\frac{d}{dt} \Big[\langle q^2 \rangle (t)\Big]+ \cdots \,,\label{dp2dtnmkder} \\ C_1(t;t) & = & \alpha(t) ~~;~~ S_1(t;t) = \beta(t) \,,\label{C1S1}\eea where $\alpha(t)$ and $\beta(t)$ are given by (\ref{alfat},\ref{betat}) respectively. For $\Lambda t \gg 1; \Lambda \gg \Omega$ we find \be C_1(t;t){}_{\overrightarrow{ \Lambda t \gg 1,\Lambda \gg \Omega}} ~~ \gamma \Lambda ~~;~~ C_2(t;t) ~~ {}_{\overrightarrow{\Lambda t \gg 1,\Lambda \gg \Omega}}~~\gamma ~~;~~ S_1(t;t) ~~ {}_{\overrightarrow{\Lambda t \gg 1,\Lambda \gg \Omega}}~~ {\gamma} ~~;~~ S_2(t;t) ~~ {}_{\overrightarrow{\Lambda t \gg 1,\Lambda \gg \Omega}}~~\frac{\gamma}{\Lambda} \,, \label{2coefs}\ee and the dots stand for (higher) derivative terms. Under the assumption that at asymptotically long times the reduced density matrix describes a \emph{stationary state} with equal time correlation functions independent of time, all derivative terms in the above equations \emph{vanish} asymptotically, and the derivative expansion yields the \emph{exact relation between the asymptotic values beyond the Markov approximation} with the Born approximation \emph{only}, namely factorization. Therefore, any discrepancies with the exact results must be identified as being a consequence of the Born approximation. The equal time correlation functions in the asymptotic stationary state are obtained by setting to zero all derivatives in (\ref{dq2dtnmk},\ref{dpqdtnmkder},\ref{dp2dtnmkder}) leading to \be \langle (pq+qp) \rangle (\infty) = 0 \,,\label{asypqcorr}\ee \be \langle q^2 \rangle (\infty) = \frac{h(\infty)}{2\beta(\infty)\Omega^2} = \frac{1}{2\Omega} \, \coth\Big[ \frac{\Omega}{2T} \Big]\,, \label{asyq2}\ee \be \langle p^2 \rangle (\infty) = \Omega^2_R \,\langle q^2 \rangle (\infty)- \frac{f(\infty)}{2} ~ = ~ \frac{\Omega^2_R}{2\Omega} \, \coth\Big[ \frac{\Omega}{2T} \Big]+ \gamma\,\Bigg\{\frac{T}{\Lambda} + \frac{1}{\pi}\,\mathrm{Re} \Bigg[\Psi\big( \frac{\Lambda}{2\pi T}\big)- \Psi\big( \frac{i\Omega}{2\pi T}\big) \Bigg] \Bigg\}\,. \label{asyp2} \ee In the high temperature classical limit $T \gg \Lambda \gg \Omega_R, \gamma$, we find \bea \langle \, p^2 \,\rangle(\infty) & = & T\,\Big[1 - \frac{\gamma \Lambda}{\Omega^2} +\cdots \Big] \,,\label{p2classnmk} \\ \langle \, q^2 \,\rangle(\infty) & = & \frac{T}{ \Omega^2}\Big[1 +\cdots \Big] = \frac{T}{ \Omega^2_R}\Big[1 - \frac{\gamma \Lambda}{\Omega^2} +\cdots \Big]\,, \label{q2classnmk}\eea where the relation (\ref{Oren}) has been used. In the limit $\Lambda \gg T \gg \Omega, \gamma$ the result (\ref{asyp2}) becomes \be \langle p^2 \rangle (\infty) = T\,\Big[1 - \frac{\gamma \Lambda}{\Omega^2}\, + \frac{\gamma}{\pi T} \ln\Big[\frac{\Lambda}{2\pi T} \Big] +\cdots \Big]\,, \label{asylam2}\ee where the dots stand for subleading contributions, and we have used the relation (\ref{Oren}) between the renormalized and bare frequencies. We emphasize that we are considering the full non-Markovian evolution of the reduced density matrix; the \emph{only} approximation is the Born (or factorization) approximation, but the evolution keeps the memory in the quantum master equation. Comparison of the above results to the exact ones in the high temperature limit, (\ref{classq2fini},\ref{p2classfini}) reveals important differences. We first note that in agreement with the exact result (\ref{p2classfini}), now the logarithimic enhancement is in $\langle p^2 \rangle$; the main discrepancies in the high temperature limit can be seen comparing (\ref{classq2fini}) with (\ref{q2classnmk}) in the high temperature limit and the first two terms in the bracket in (\ref{asylam2}) compared to those in Eq. (\ref{p2classloga}). It is clear that the results obtained with the exact Heisenberg-Langevin equations agree with those obtained with the Born-non-Markov quantum master equation when $\gamma/\Omega_R \ll 1$ \emph{and} $\gamma \Lambda/\Omega^2 \ll 1$. We note also that whereas the exact result (\ref{q2fini}) depends \emph{solely} on the renormalized frequency, the Born-non-Markov result (\ref{asyq2}) depends on the \emph{bare} frequency. The differences between the exact results and those obtained with the \emph{Born-non-Markov} quantum master equation can only originate in the system-bath correlations that are missed by the Born approximation (factorization). The analysis above shows that these correlations yield corrections of order $\gamma \Lambda /\Omega^2$. These can be substantial when $\Lambda/\Omega \gg 1$ even in the weak coupling limit $\gamma /\Omega \ll 1$. \vspace{2mm} \textbf{Comparison: Exact vs. Born-Markov, vs. Born-Non-Markov} We now summarize the comparison between the exact solution and those obtained from the quantum master equation with the Born approximation with and \emph{without} the Markov approximation. \textbf{Equation of motion.} The equation of motion for the expectation value $\langle q \rangle (t)$ obtained in the Born-Non-Markov case (\ref{diffeqnmk}) coincides with the expectation value in the initial density matrix of the \emph{exact} solution of the Heisenberg-Langevin equation (\ref{HLq}) because the average of the noise term vanishes. For the Markovian case the equation of motion (\ref{eomqoft}) differs from the exact and non-Markovian versions at early time, but its solution for $\Lambda t \gg 1$ coincides with that of the exact and non-Markovian cases. \textbf{Equal time correlation functions:} Comparing the equal time correlation functions obtained from the quantum master equation in the Born approximation in the asymptotic stationary state we find remarkable differences between the Markov and non-Markov approximation that originate in the \emph{memory} in the non-Markov case. Consider $\langle q^2 \rangle (\infty)$ and $\langle p^2 \rangle (\infty)$ : The results with the Markov approximation are given by (\ref{qinfty},\ref{pinfty}) respectively, whereas the results obtained by keeping the memory (non-Markovian) are given by (\ref{asyq2},\ref{asyp2}) respectively. The difference between the Markovian (M) and the non-Markovian (NM) asymptotic results yield a quantitative measure of the \emph{memory effects}. In the high temperature regime for $T \gg \Lambda \gg \Omega,\gamma$ we find \bea \langle p^2 \rangle_{NM}(\infty)-\langle p^2 \rangle_{M}(\infty) & = & -T\Big[\frac{\gamma \Lambda}{\Omega^2} + \cdots \Big] \label{p2diff1}\\ \langle q^2 \rangle_{NM}(\infty)-\langle q^2 \rangle_{M}(\infty) & = & -\frac{T}{\Omega^2_R}\Big[\frac{\gamma \Lambda}{\Omega^2} + \cdots \Big]\,, \label{q2diff1} \eea while for $\Lambda \gg T \gg \Omega,\gamma$ we find \bea \langle p^2 \rangle_{NM}(\infty)-\langle p^2 \rangle_{M}(\infty) & = & -T ~\Big(\frac{\gamma \Lambda}{\Omega^2} \Big)\, \Big[1-\frac{\Omega^2}{\pi T\,\Lambda}\,\ln\Big[\frac{\Lambda}{2\pi T} \Big] + \cdots \Big] \label{p2diff2}\\ \langle q^2 \rangle_{NM}(\infty)-\langle q^2 \rangle_{M}(\infty) & = & -\frac{T}{\Omega^2_R}~\Big(\frac{\gamma \Lambda}{\Omega^2} \Big)\Big[1-\frac{\Omega^2}{\pi T\,\Lambda}\,\ln\Big[\frac{\Lambda}{2\pi T} \Big] + \cdots \Big]\,. \label{q2diff2} \eea In the expressions above the dots stand for terms $\mathcal{O}(\gamma^2)$. The coefficients of the logarithmic terms are very small in the range considered. We conclude that in the high temperature limit the main discrepancies in the correlation functions between the non-Markovian and Markovian cases arising from memory effects are: \textbf{i:)} frequency renormalization since $\gamma \Lambda/\Omega^2 = 1 -\Omega^2_R/\Omega^2 $, \textbf{ii):} the logarithmic term $\propto \ln[\Lambda/2\pi T]$, although this term is subleading because it is suppressed by $\gamma/T \ll 1$ compared to the first term. The origin of the discrepancies between the Markov (M) and non-Markov (NM) results in the asymptotic long time limit within the Born approximation can be traced to the difference between Eq. (\ref{p2ave}) and the first line in Eq. (\ref{dp2dtnmkder}). In the Markov approximation the density matrix $\rho_r$ is evaluated at time $t$ and the averages are defined with this time argument. Therefore the relations (\ref{qt1},\ref{pt1}) must be used to express the interaction picture operators with argument $t_1$ in terms of those with arguments at time $t$. In the non-Markov case $\rho_r$ is at time $t_1$, therefore the operators at time $t$ must be related to those at time $t_1$ by the relations (\ref{qiuti},\ref{piti}). This is tantamount to exchanging $q$ and $p$ in the time integrals and also explains the change in sign in the term proportional to $\langle (pq+qp) \rangle$ in Eqs.(\ref{pqqp},\ref{dpqdtnmkder}). We have argued above that within the Born approximation in the non-Markov case, the equal time correlation functions in the asymptotic stationary state are \emph{exact}. Therefore any differences with the exact results obtained from the solution of the Heisenberg-Langevin equation are a consequence of the Born approximation. Comparing the results of the non-Markov (NM) case (\ref{asyq2},\ref{asyp2}) with the exact (E) results in the high temperature limit (\ref{classq2fini},\ref{p2classfini},\ref{p2classloga}) also shows important discrepancies, in both cases $T \gg \Lambda \gg \Omega, \gamma$ and $\Lambda \gg T \gg \Omega, \gamma$ \bea \langle p^2 \rangle_{E}(\infty) - \langle p^2 \rangle_{NM}(\infty) & = & T \Big[\frac{\gamma \Lambda}{\Omega^2} +\cdots \Big] \label{pdiffENM1} \\ \langle q^2 \rangle_{E}(\infty) - \langle q^2 \rangle_{NM}(\infty) & = & \frac{T}{\Omega^2_R} \Big[\frac{\gamma \Lambda}{\Omega^2} +\cdots \Big]\,, \label{qdiffENM1} \eea \noindent Therefore the reliability of the Born approximation in the high temperature limit requires the following \emph{two} conditions \be \frac{\gamma}{\Omega} \ll 1 ~~~ \textit{and}~~~\frac{\gamma \Lambda}{\Omega^2} \ll 1\,. \label{bornconds}\ee The first is the usual weak coupling condition, the second is a new condition, it is equivalent to $|\Omega^2_R-\Omega^2| \ll \Omega^2$ and is much more restrictive since a ``coarse grained'' effective description of the system requires a wide separation of scales, with $\Lambda / \Omega \gg 1$. This analysis shows that the discrepancies between the exact correlations and those obtained in the Born approximation are $\propto \gamma \Lambda/\Omega^2$ and $(\gamma/T)\,\ln\big[\Lambda/2\pi T\big]$, leading to the central conclusion that the system-bath correlations that are missed in the Born approximation contain these $\Lambda$ dependent terms. \begin{figure}[!h] \begin{center} \includegraphics[height=3.5in,width=3.5in,keepaspectratio=true]{qratiomark001.eps} \includegraphics[height=3.5in,width=3.5in,keepaspectratio=true]{pratiomark001.eps} \includegraphics[height=3.5in,width=3.5in,keepaspectratio=true]{qratiomark005.eps} \includegraphics[height=3.5in,width=3.5in,keepaspectratio=true]{pratiomark005.eps} \caption{ Markovian case: the ratios $\frac{\langle q^2(\infty)\rangle_{M}}{\langle q^2(\infty)\rangle_E} \equiv Qm/Qe$, and $\frac{\langle p^2(\infty)\rangle_M}{\langle p^2(\infty)\rangle_E} \equiv Pm/Pe$, for $\gamma = 0.001~,~0.005$ vs. $\Lambda$ for various temperatures. $\gamma, \Omega, T,\Lambda$ are in units of $\Omega_R$. At high temperatures the ratios approach $1$. } \label{fig:markovratios} \end{center} \end{figure} \begin{figure}[!h] \begin{center} \includegraphics[height=3.5in,width=3.5in,keepaspectratio=true]{qrationonmark001.eps} \includegraphics[height=3.5in,width=3.5in,keepaspectratio=true]{prationonmark001.eps} \includegraphics[height=3.5in,width=3.5in,keepaspectratio=true]{qrationonmark005.eps} \includegraphics[height=3.5in,width=3.5in,keepaspectratio=true]{prationonmark005.eps} \caption{ Non-Markovian case: the ratios $\frac{\langle q^2(\infty)\rangle_{NM}}{\langle q^2(\infty)\rangle_E} \equiv Qnm/Qe$, and $\frac{\langle p^2(\infty)\rangle_{NM}}{\langle p^2(\infty)\rangle_E} \equiv Pnm/Pe$, for $\gamma = 0.001~,~0.005$ vs. $\Lambda$ for various temperatures. $\gamma, \Omega, T,\Lambda$ are in units of $\Omega_R$. } \label{fig:nonmarkovratios} \end{center} \end{figure} \noindent This analysis is confirmed by a numerical study of the Markovian and non-Markovian correlations displayed in figs. (\ref{fig:markovratios},\ref{fig:nonmarkovratios}) respectively. These figures display the ratios of the correlations to the exact results in the stationary limit as a function of the bandwidth for various values of temperature, both in units of $\Omega_R$, for $\gamma/ \Omega_R= 0.001; 0.005$ as representatives of the weak coupling regime. For example, in ref.\cite{groex} the Q-factor is $Q \equiv \Omega_R/\gamma \approx 215$. Weaker couplings yield smaller corrections both in the Markovian and non-Markovian cases. We confirm numerically that the largest contribution to the discrepancies with the exact results arise from the frequency renormalization (\ref{Oren}) whereas the logarithmic corrections are subleading for weak couplings in the range of bandwidths and temperatures that are physically relevant for the experimental settings with large $Q$ factors. The explicit comparison between the ratios in the Markovian and non-Markovian cases confirms the results (\ref{p2diff1}-\ref{q2diff2}) which, for weak couplings are dominated by the first terms in the brackets, namely frequency renormalization. \vspace{2mm} \textbf{Counterterms?:} Within a renormalized perturbative approach the term $\Omega^2 \, q^2/2 $ in the system's Hamiltonian (\ref{Hsis}) is written as $\Omega^2_R \, q^2/2 + \delta \Omega^2 \, q^2/2$ where $\delta \Omega^2 = \Omega^2 -\Omega^2_R$ is a \emph{counterterm} included in the interaction Hamiltonian and is required to cancel the $\Lambda$ dependence of the self-energy systematically in perturbation theory. In this approach, in the interaction picture the system's degrees of freedom evolve in time with $\Omega_R$. Obviously this is not necessary in the \emph{exact} treatment with the Heisenberg equations of motion, where the full self-energy combines with the bare frequency to yield the exact solution solely in terms of the renormalized frequency. In the quantum master equation approach, the interaction Hamiltonian in the interaction picture is now \be H_I(t) = \frac{1}{2}\,\delta \Omega^2\,q^2(t) - q(t) \,\xi(t)\,, \label{HIcounter}\ee instead of (\ref{HSBint}), and $q(t)$ is given by (\ref{qip}) with $\Omega \rightarrow \Omega_R$. The relation (\ref{Oren}) indicates that $\delta \Omega^2 = \gamma \Lambda$ is of \emph{second order} in the system-bath coupling. Following the steps leading to Eq. (\ref{rhodotiter}) we immediately see that including the counterterm into the interaction Hamiltonian does \emph{not} resolve the discrepancy: taking the trace over the bath degrees of freedom, the first term in Eq. (\ref{rhodotiter}) no longer vanishes and yields a contribution that depends on the initial value, as it manifestly depends on $\rho_{SB}(0)$. Secondly, in perturbation theory the quadratic term in $H_I$ in (\ref{rhodotiter}) would yield a term proportional to $(\delta \Omega^2)^2 \propto \gamma^2$ whereas the system-bath interaction yields a term $\propto \gamma$. A term that is \emph{linear} in $\delta \Omega^2$ must vanish because it originates in a cross term linear in $\xi$ which vanishes upon tracing over the bath degrees of freedom. In conclusion, treating the difference between the renormalized and bare frequencies in terms of a counterterm Hamiltonian does not lead to a resolution of the discrepancies between the exact results from the Heisenberg-Langevin solution and those from the quantum master equation in the Born approximation with or without the additional Markovian assumption. Furthermore, such counterterm does not address the issue of the system-bath correlations neglected in the Born approximation. As discussed above, the Born-non-Markov quantum master equation is exact within the factorization approximation and discrepancies with the exact result must originate in the factorization approximation. This is discussed in detail below. \section{System-bath correlations.}\label{sec:SBcorrs} The Born-non-Markov quantum master equation with memory only invokes the Born factorization, and, as shown above, within the factorization approximation \emph{only} the asymptotic long time limit yields the \emph{exact} equal time correlation functions under the assumption of a stationary state. Therefore, any discrepancy between the results of the Born-non-Markov quantum master equation and the exact solution of the Heisenberg-Langevin equations of motion for the asymptotic equal time correlation functions must originate in the factorization approximation. The approximation (\ref{factor}) neglects correlations between the system and the bath, which is justified when the system-bath interaction is weak, namely $\gamma/\Omega_R \ll 1$. Therefore discrepancies between the exact Heisenberg-Langevin and Born-non-Markov results are expected to be of $\mathcal{O}(\gamma/\Omega_R)$. However, the analysis above reveals that the corrections are indeed of this order but enhanced by a large factors $\Lambda/\Omega$ and $\ln[\Lambda/T]$ for $\Lambda \gg T \gg \Omega_R,\gamma$. These large enhancements suggest that the factorization implied by the Born approximation is missing important and large correlations between the system and the bath degrees of freedom. Although it is difficult to identify systematically the terms that are being neglected in the factorization (\ref{factor}), the exact solution of the Heisenberg-Langevin equation (\ref{HLq}) allows us to quantify the reliability of the factorization by studying the \emph{correlation} between the system and bath variables. The system's coordinate couples to the \emph{collective} degree of freedom of the bath $B = \sum_k C_k Q_k$, the correlation between the system's coordinate and this collective bath variable is precisely the interaction energy (\ref{SBcoup}). Therefore, we study the system-bath correlation by focusing on \be \langle ~H_{SB}(t) ~\rangle = -\langle \, q(t) B(t) \,\rangle ~~;~~ B(t) = \sum_k C_k Q_k(t) \,, \label{corre} \ee where $q(t)$ and $Q_k(t)$ are the \emph{exact} Heisenberg operators which are the solutions of eqns. (\ref{EOMq},\ref{EQMB}), namely (\ref{qoft}) and \be B(t) = \xi(t) - \int^t_0 \Sigma(t-t') q(t') dt' \,.\label{Boft} \ee To obtain (\ref{Boft}) we used equations (\ref{solB},\ref{noise}) and (\ref{sigma}) and the fact that the average in (\ref{corre}) is in the initial density matrix (\ref{rhototini}). Since $q(t)$ is given by (\ref{qoft}), we write \be q(t) = q_\xi(t) + q_0(t) ~~;~~ B(t)= B_{\xi}(t) + B_0(t)\,, \label{Bsplit} \ee with \be q_{\xi}(t) = \int^t_0 G(t-t') \xi(t') \,dt' \,,\label{qchi} \ee \be q_0(t) = \dot{G}(t) q(0)+G(t) p(0) \,, \label{q0}\ee \be B_{\xi}(t) = \xi(t)- \int^t_0 \Sigma(t-t') \int_0^{t'} G(t'-t'')\xi(t'') dt'dt'' \,, \label{bchi}\ee and \be B_0(t) = -\int_0^t \Sigma(t-t')\Big[\dot{G}(t')q(0) + G(t') p(0) \Big]\,dt' \,. \label{Bo}\ee Because $\langle \langle \,\xi \rangle \rangle =0$, the cross terms in the correlation function vanish, and we find \be \langle \, q(t) B(t) \,\rangle = \langle \, q_0(t) B_0(t) \,\rangle + \langle \langle \, q_\xi(t) B_{\xi}(t) \, \rangle \rangle \,. \label{corr2}\ee Since $\langle \langle \xi \xi \rangle \rangle \propto \gamma$ and $\Sigma \propto \gamma$ clearly this correlation function --the interaction energy-- is proportional to $\gamma$. We are interested in the asymptotic limit $t \gg 1/\gamma$; in this limit the first term in Eq. (\ref{corr2}) vanishes since $G(t) \propto e^{-\gamma t/2}$, and only the second term survives. Therefore asymptotically, \be \langle \, q(t) B(t) \,\rangle = \int^t_0 dt'\, G(t-t') \Big[ \langle \langle \,\xi(t') \xi(t) \,\rangle \rangle - \int^t_0 \Sigma(t-t_1)\,\int^{t_1}_0 G(t_1-t_2) \langle \langle \,\xi(t') \xi(t_2) \,\rangle \rangle dt_1 \, dt_2\Big] \,. \label{qgcorrasy} \ee The evaluation of this expression is lengthy, but because we want to understand the origin of the enhancement, we are only focused on extracting the leading terms in the limit $\Lambda \gg T \gg \Omega_R, \gamma$ . We find that the leading contributions for $\Lambda \gg T, \Omega_R,\gamma$ in the asymptotic limit yield \be \langle \, H_{SB}(\infty) \,\rangle = - {\langle \, q(t) B(t) \,\rangle}_{~~\overrightarrow{t\rightarrow \infty}} ~~ - \gamma ~\Bigg\{ \frac{\Lambda}{2W} \, \Bigg[ \coth\Big[\frac{W+i\gamma/2}{2T}\Big]+\coth\Big[\frac{W-i\gamma/2}{2T} \Big]\Bigg] -\frac{1}{\pi} \ln\Big[ \frac{\Lambda}{2\pi T}\Big] \Bigg\} +\cdots \,, \label{qbasylam}\ee where the dots refer to terms that are subdominant for $\Lambda \gg T, \Omega_R,\gamma$. For $T \gg \Lambda \gg \Omega_R,\gamma$ the term $\ln(\Lambda/2\pi T)$ is replaced by $\ln(\Lambda/W)$. Again we note that the \emph{exact} expectation value of the asymptotic interaction energy does not depend directly on the bare frequency $\Omega$ but only on $\Omega_R$. The expectation value of the interaction energy is proportional to $\gamma$ as expected but with proportionality factors that become very large in the limit $\Lambda \gg \Omega_R,\gamma$. The leading and next to leading order terms in the high temperature and weak coupling limits $T \gg \Omega_R \gg \gamma$ yield \be \langle \, H_{SB}(\infty)\,\rangle = - 2T \, \Big(\frac{\gamma}{\Omega_R} \Big)\,\Big[\,\frac{ \Lambda}{\Omega_R} \, \Big]\,\Bigg\{ 1 - \frac{\Omega^2_R}{2\pi \, T\,\Lambda}\, \, \ln\Big[ \frac{\Lambda}{2\pi T}\Big] \,\cdots \Bigg\} \label{HiTHSB}\ee where we highlighted the dependence on the \emph{two} dimensionless ratios: $\gamma/\Omega_R$ that determines the weak coupling regime, \emph{and} $\gamma \Lambda/\Omega^2_R$ along with the enhancement from the terms $\Lambda/\Omega_R$ and $\ln[\Lambda/T]$. Although we cannot establish a direct link between the interaction energy and the corrections to the Born approximation (factorization) in the time evolution of the density matrix, the $\Lambda$ dependence of the interaction energy suggests that these correlations are responsible for the discrepancy between the exact result for the equal time correlation functions from the Heisenberg-Langevin equations and those from the Born Markov and non-Markov quantum master equations. \vspace{2mm} \subsection{Energy flow}\label{sub:eflow} The exact solution also allows us to study how energy is transferred between the bath and the system upon time evolution; the system plus bath form a closed composite system, and energy is conserved. For the expectation value of the Hamiltonian in the initial state (\ref{rhototini}), consider the case $\rho_S(0) = (|0\rangle\langle 0|)_S$ so that \be \langle \, H \, \rangle = \frac{\Omega}{2} + \sum_{k} \frac{W_k}{2}\, \coth\Big[\frac{W_k}{2T}\Big] ~~;~~ \langle \, H_{SB} \, \rangle =0 \,.\label{totene}\ee This expectation value is time independent therefore the total change in the expectation value of $H_S(t)$ and $H_{SB}(t)$ compensate for the total change in the bath internal energy. Asymptotically, we find for changes in the system and interaction energies \be \Delta E_S = \langle\, H_S(\infty) \,\rangle -\langle\, H_S(0) \,\rangle = \frac{1}{2} \langle p^2 \rangle + \frac{1}{2} (\Omega^2_R+\gamma \Lambda)\,\langle q^2 \rangle -\frac{1}{2}(\Omega^2_R+\gamma \Lambda)^{1/2} \,,\label{deltaEs}\ee \be \Delta E_{SB} = \langle \, H_{SB}(\infty) \,\rangle \,,\label{deltaEI}\ee where $\langle p^2 \rangle, \langle q^2 \rangle, \langle\, H_S(\infty) \,\rangle$ are given by (\ref{p2fini},\ref{q2fini},\ref{qbasylam}) respectively, and we have written the system's energy in terms of $\Omega_R$ since the exact solution of the Heisenberg-Langevin equation depends solely on the renormalized frequency. We note that the contribution from $\langle p^2 \rangle$ (Eq. (\ref{p2fini}) includes the contribution $\propto \, \gamma\, \ln[\Lambda/T]$ and the term $\gamma \Lambda \, \langle q^2 \rangle$ includes a term $\propto \,\gamma \Lambda/W\, \coth[(\cdots)]$ from (\ref{q2fini}), these are precisely the terms shown in (\ref{qbasylam}). Energy conservation entails that the change in the internal energy of the bath is $\Delta E_B = -(\Delta E_S+\Delta E_{SB})$. The condition that the bath remains in thermal equilibrium at a fixed temperature implies that its internal energy $E_B \gg \Delta E_B$, although a specific calculation requires a definite dispersion relation for $W_k$. Consider the classical limit with equipartition and $E_B = \mathcal{N} T$, with $\mathcal{N}$ being the number of degrees of freedom of the bath. The condition for $|\Delta E_B| / E_B \ll 1$ then requires that $\mathcal{N} \gg \gamma \Lambda /\Omega^2_R$. On physical grounds it is expected that $\Lambda \propto \mathcal{N}$ hence for sufficiently weak coupling $\gamma/\Omega_R \ll 1$ this condition is likely to be always fulfilled and the bath remains in thermal equilibrium. A firmer assessment requires a model for the $W_k$ of the bath oscillators. \subsection{Experimental settings}\label{sub:exp} In experimental settings the strength of the coupling is measured by the mechanical quality factor $Q = \Omega/\gamma$, with a weak coupling regime corresponding to $Q \gg 1$. The stability condition (\ref{const}) implies that \be \frac{\Lambda}{\Omega} < Q \,,\label{stable} \ee whereas the conditions for the validity of the Born approximation (\ref{bornconds}) imply \emph{both} $Q \gg 1$ and \be \frac{\Lambda}{\Omega} \ll Q \,. \label{lQcondi} \ee On the other hand, after renormalization an effective description of the dynamics of the system's degrees of freedom should be insensitive on the dynamics of the high frequency components of the bath when $\Lambda \gg \Omega$. Therefore a ``coarse grained'' description of the dynamical evolution of the system's degrees of freedom consistent with the Born approximation requires that \be 1 \ll \frac{\Lambda}{\Omega} \ll Q \,. \label{winlam}\ee Ref.\cite{groex} studies the amplitude response of a mechanical resonator to thermal driving. The response is determined by the spectrum of the cavity output Eq. (4) in this reference, which is identified with the frequency dependent integrand in Eq. (\ref{asyqtqtpnew}) in the high temperature limit with $\coth[\omega/2T]\simeq 2T/\omega$. The experimental settings in the study of micromechanical Brownian motion reported in Ref.\cite{groex} correspond to $\Omega = 2\pi \times 914 \,\mathrm{kHz}$ and $Q \simeq 215$ which implies a weak coupling to the environment. Fig. (2) in this reference shows the response spectrum vs. frequency and prominently displays a resonance. Identifying the position of this resonance with $\Omega_R$ ($\Omega(\infty)$ in Ref.\cite{groex}) in the weak coupling limit (see Eq. (4) in \cite{groex}), inspection of the numerical value of the position of the resonance suggests that in this experiment \be |\Omega^2-\Omega^2_R|/\Omega^2 \ll 1 \,. \label{rata}\ee \emph{If} the Drude-Ohmic model described this experiment, the result (\ref{rata}) would immediately yield $\gamma \Lambda /\Omega^2 \ll 1$. However, the main conclusion of this reference is that the spectrum of the bath $\sigma(\omega)$ fit within a broad window around the resonance yields $\sigma(\omega) \propto \omega^{-2.30 \pm 1.05}$. With the caveat that the measured spectrum is not of the Drude-Ohmic form, at least within this broad region of frequencies, it seems that the experimental values of the parameters in this experiment would justify using a Born (and Markov) approximation, although in Ref.\cite{groex} non-Markovianity is associated with a non-Ohmic (in this case sub-Ohmic) spectral density \emph{near the resonance}. In Ref.\cite{teufel} a micromechanical oscillator is coupled to a microwave cavity to resolve the quantum vacuum fluctuations of the oscillator degrees of freedom. In this setting $\Omega = 2\pi\times 15.9 \,\mathrm{MHz}$ and the mechanical Q-factor is $Q = 10^5$. This is a very weakly coupled system, and although Ref.\cite{teufel} does not include an experimental value for $\Lambda$, or the difference between the bare and renormalized mechanical frequencies, the constraint $\Lambda/\Omega \ll 10^5$ yields $\Lambda \ll 10^{7}\,\mathrm{MHz}$ leaving ample room to satisfy the conditions of validity for the Born approximation. Hence, the conditions for the validity of the the quantum master equation (either Markovian or non-Markovian) are likely fulfilled, and the Born quantum master equation may be well suited to study the dynamics in this case. Recently Ref.\cite{norte} reported on novel designs for on-chip mechanical resonators for quantum optomechanical architectures with mechanical quality factors $Q \simeq 10^8$ which are sufficiently large to enter the quantum optomechanical regime at room temperature. This setting corresponds to the micromechanical resonators being very weakly coupled to the environment, with $\Omega \simeq 1\,\mathrm{MHz}$, again allowing a large range with $\Lambda/\Omega \ll Q$ for the validity of the Born approximation. \section{ Non-Ohmic baths}\label{sec:nonohm} Although we have focused on an Ohmic bath with a Drude spectral density, which allows an exact analytic solution of the Heisenberg-Langevin equations, the analysis presented above allows us to extrapolate some of the results to more general cases and draw more general conclusions. Following Ref.\cite{weiss} let us consider the general case \be \sigma(\omega) = \gamma \omega \,\big| \frac{\omega}{\omega_0}\big|^{k-1}\,f(|\omega|/\Lambda)\,, \label{genspec}\ee where $\omega_0$ is a reference frequency taken to be different from the cutoff scale $\Lambda$ (in Ref.\cite{weiss} this latter scale is identified with a typical phonon frequency), and the dimensionless cutoff function $f(x)$ fulfills \be f(x) \simeq 1 ~\mathrm{for}~ x \lesssim 1 ~~;~~ f(x) \rightarrow 0 ~\mathrm{for}~ x \gg 1 \,. \label{cutf}\ee The cases $k< 1,k=1, k> 1$ correspond to sub-Ohmic, Ohmic and super-Ohmic respectively, and we assume that $\Lambda \gg \Omega_R, \gamma$. The cases with $k\leq -1$ yield an infrared divergent $\tilde{\Sigma}(s)$ and $\langle q^2 \rangle$ so we will focus on $k > -1$\footnote{The numerical fit to the data in ref.\cite{groex} was evidently performed within a range of frequencies near the position of the resonance; it does not include the region with $\omega \simeq 0$.}. From the expression for the Green's function (in Laplace variable) given by (\ref{gofs}) the renormalization condition, which yields a (\emph{complex}) pole in weak coupling is \be \Omega^2_R = \Omega^2 + \widetilde{\Sigma} (s=i\Omega_R) \,,\ee where $\widetilde{\Sigma} (s) $ is given by the spectral representation (\ref{sigmaofs}). Therefore we find that \be (\Omega^2_R - \Omega^2)/\Omega^2 \simeq -\frac{\gamma \Lambda}{\Omega^2} \, \Big( \frac{\Lambda}{\omega_0}\Big)^{k-1} \,. \label{ratk}\ee The contribution to $\langle p^2 \rangle$ that diverges with $\Lambda$ is found to be \be \langle p^2 \rangle \propto \frac{\gamma }{k-1}\, \Big( \frac{\Lambda}{\omega_0}\Big)^{k-1} \label{divp2gen}\ee (with a logarithmic divergence as $k \rightarrow 1$). Hence for \emph{super-ohmic} spectral densities the sensitivity to the cutoff scale is much stronger. This entails more stringent conditions for the validity of the Born-Markov approximation beyond the usual weak coupling assumption $\gamma/\Omega \ll 1$; for example the condition (\ref{bornconds}) now becomes \be \frac{\gamma \Lambda}{\Omega^2} \, \Big( \frac{\Lambda}{\omega_0}\Big)^{k-1} \ll 1 \,, \label{newcond}\ee which for $\Lambda \gg \omega_0$ requires a much weaker coupling and correspondingly larger $Q$. \section{Conclusions} The quantum master equation plays a fundamental role in theoretical and experimental studies of quantum open systems. Its derivation often invokes the Born and Markov approximations, the first corresponding to a factorization of the (reduced) density matrix of the system and that of the bath, which is assumed to always remain at the initial value. The second neglects memory effects. Both approximations are usually justified for weak system-environment couplings. Motivated by the theoretical and experimental relevance of the quantum master equation, in this article we have studied the reliability of these approximations within the framework of quantum Brownian motion described by one mechanical oscillator (the system) linearly coupled to a bath of harmonic oscillators in thermal equilibrium. This is an important model for quantum open systems with definite experimental realizations in cavity optomechanics and nano or micro-mechanical resonators. We solved exactly the Heisenberg-Langevin equations of motion for the degrees of freedom of the system and obtained the corresponding correlation functions. We considered a Drude-Ohmic spectral density for the thermal bath which allows us to analytically obtain the \emph{exact} correlation functions in the asymptotic stationary state as functions of temperature $T$, the mechanical relaxation rate $\gamma$, bare $\Omega$ and renormalized $\Omega_R$ oscillator frequencies, and $\Lambda$ the bandwidth (cutoff) of the bath, assumed to satisfy $\Lambda \gg \Omega,\gamma$. The correlation functions depend on $\Omega_R$ but not directly on $\Omega$. Within the Drude-Ohmic model, stability and the existence of an asymptotic steady state requires the condition \be \Omega^2_R >0 \Rightarrow \Omega^2 > \gamma \Lambda \,,\nonumber \ee and an effective long time description of the system's dynamics requires a separation between the time scale of the bath and that of the system, namely $\Lambda \gg \Omega_R$. In the high temperature limit $T \gg \Omega_R,\gamma$ we recognize two different regimes: \textbf{i)} $T \gg \Lambda \gg \Omega_R, \gamma$, which is the classical regime where $\langle q^2 \rangle$ and $\langle p^2 \rangle$ obey classical equipartition (in terms of $\Omega_R$), and \textbf{ii)} $\Lambda \gg T \gg \Omega_R, \gamma$, in this regime there emerge corrections to $\langle p^2 \rangle \propto \gamma \ln\big[\Lambda/2\pi T\big]$, which, while perturbatively small for $\gamma/\Omega_R \ll 1$, are enhanced by the logarithmic dependence on the bandwidth of the bath. We then obtain the quantum master equation in the Born approximation and derive the equations of motion for expectation values and correlation functions both in the Markovian and non-Markovian case. In the latter case we introduce a systematic derivative expansion which yields the \emph{exact} correlation functions in the asymptotic stationary state within the Born approximation. Comparing the correlation functions obtained with the exact solutions of the Heisenberg-Langevin equation and those obtained in the Born approximation with and without the Markov approximation, we infer the conditions under which the Born approximation is reliable. We find that at least for the Drude-Ohmic case there are \emph{two} conditions $$ \frac{\gamma}{\Omega} \ll 1 ~~;~~ \frac{\gamma \Lambda}{\Omega^2} \ll 1 \,. $$ The first is recognized as the usual weak coupling condition, but the second is a more stringent condition because for an effective description to emerge there must be wide separation between the time scale of the bath degrees of freedom $\propto 1/\Lambda$ and that of the system $\propto 1/\Omega$, namely $\Lambda \gg \Omega$. We have argued that differences in the asymptotic correlation functions between the exact results from the Heisenberg-Langevin solution, and those obtained with the Born-non-Markov (keeping the memory) quantum master equation must be a consequence of system-bath correlations being missed by the Born approximation. We studied the interaction energy as a \emph{proxy} for the system-bath correlations and found that the contributions that diverge as the cutoff $\Lambda \rightarrow \infty$ are \emph{precisely} the $\Lambda$ dependent terms in the difference between the correlation functions. We have analyzed the above constraints as they apply to recent experimental settings and found that in these cases, the experimental values of parameters are consistent with both conditions being fulfilled, suggesting that the Born quantum master equation describes accurately the non-equilibrium dynamics in these experiments. The study of the Drude-Ohmic model allows us to draw more general conclusions for the cases of super-Ohmic, Ohmic and sub-Ohmic spectral densities. In particular, we find that the second constraint, involving the bandwidth of the bath becomes much more stringent in the super-Ohmic case, suggesting that non-Markovianity and system-bath correlations will play very important roles in these cases, even for weak coupling. Our results indicate that the conditions for the validity of the Born approximation with or without the Markov approximation, are more stringent than the usual condition on the quality factor of the mechanical oscillators $Q = \Omega/\gamma \gg 1$, which is equivalent to weak coupling. The reliability of the Born quantum master equation as a tool to analyze experimental results hinges crucially on the second condition $ \gamma \Lambda /\Omega^2 \ll 1$ or, alternatively, $\Lambda/\Omega \ll Q$. The fulfillment of this condition requires a detailed assessment of the experimental setting in each case. Understanding the dynamics of decoherence is one of the main motivations in quantum open systems, the Heisenberg-Langevin approach being an exact method to study correlations should yield insight into the validity of Born-Markov quantum master equations usually implemented to extract decoherence rates. We expect to report on such study in a future article. \acknowledgements The authors thank X.-L. Wu and A. Daley for fruitful discussions. D. B. gratefully acknowledges support from NSF through grant PHY-1506912. D.J. gratefully acknowledges the continued support of the Dietrich School of Arts and Sciences of the University of Pittsburgh.
\section*{Appendix: Basic Definitions of MTE} \begin{df} Let $\Xi$ be a finite set of elements called elementary events. Any subset of $\Xi$ be a composite event. $\Xi$ be called also the frame of discernment.\\ A basic probability assignment function m:$2^\Xi \rightarrow [0,1]$ such that $$ \sum_{A \in 2^\Xi } |m(A)|=1 $$ $$ m(\emptyset)=0 $$ $$\forall_{A \in 2^\Xi} \quad 0 \leq \sum_{A \subseteq B} m(B)$$ ($|.|$ - absolute value.\\ A belief function be defined as Bel:$2^\Xi \rightarrow [0,1]$ so that $$Bel(A) = \sum_{B \subseteq A} m(B)$$ A plausibility function be Pl:$2^\Xi \rightarrow [ 0,1]$ with $$\forall_{A \in 2^\Xi} \ Pl(A) = 1-Bel(\Xi-A )$$ A commonalty function be Q:$2^\Xi \rightarrow [0,1]$ with $$\forall_{A \in 2^\Xi} \quad Q(A) = \sum_{A \subseteq B} m(B)$$ \end{df} For a belief function, any set A such that m(A) differs from zero, is called {\em focal point}. A belief function where every focal point is a set with cardinality 1 (singleton) is called {\em bayesian belief function}.\\ Furthermore, a Rule of Combination of two Independent Belief Functions $Bel_1$, $Bel_2$ Over the Same Frame of Discernment (the so-called Dempster-Rule), denoted $$Bel_{E_1,E_2}=Bel_{E_1} \oplus Bel_{E_2}$$ is defined as follows: : $$m_{E_1,E_2}(A)=c \cdot \sum_{B,C; A= B \cap C} m_{E_1}(B) \cdot m_{E_2}(C)$$ (c - constant normalizing the sum of $|m|$ to 1 Furthermore, let the frame of discernment $\Xi$ be structured in that it is identical to cross product of domains $\Xi_1$, $\Xi_2$, \dots $\Xi_n$ of n discrete variables $X_1, X_2, \dots X_n$, which span the space $\Xi$. Let $(x_1, x_2, \dots x_n)$ be a vector in the space spanned by the variables $X_1, , X_2, \dots X_n$. Its projection onto the subspace spanned by variables $X_{j_1}, X_{j_2}, \dots X_{j_k}$ ($j_1, j_2,\dots j_k$ distinct indices from the set 1,2,\dots,n) is then the vector $(x_{j_1}, x_{j_2}, \dots x_{j_k})$. $(x_1, x_2, \dots x_n)$ is also called an extension of $(x_{j_1}, x_{j_2}, \dots x_{j_k})$. A projection of a set $A$ of such vectors is the set $A ^{\downarrow X_{j_1}, X_{j_2}, \dots X_{j_k}}$ of projections of all individual vectors from A onto $X_{j_1}, X_{j_2}, \dots X_{j_k}$. A is also called an extension of $A ^{\downarrow X_{j_1}, X_{j_2}, \dots X_{j_k}}$. A is called the vacuous extension of $A ^{\downarrow X_{j_1}, X_{j_2}, \dots X_{j_k}}$ iff A contains all possible extensions of each individual vector in $A ^{\downarrow X_{j_1}, X_{j_2}, \dots X_{j_k}}$ . The fact, that A is a vacuous extension of B onto space $X_1,X_2,\dots\, X_n$ is denoted by $A=B ^{\uparrow X_1,X_2,\dots\,X_n}$ \begin{df} Let m be a basic probability assignment function on the space of discernment spanned by variables $X_1,X_2,\dots\,X_n$. $m ^{\downarrow X_{j_1}, X_{j_2}, \dots X_{j_k}}$ is called the projection of m onto subspace spanned by $X_{j_1}, X_{j_2}, \dots X_{j_k}$ iff $$m ^{\downarrow X_{j_1}, X_{j_2}, \dots X_{j_k}}(B)= c \cdot \sum_{A; B=A ^{\downarrow X_{j_1}, X_{j_2}, \dots X_{j_k}} } m(A)$$ (c - normalizing factor) \end{df \begin{df} Let m be a basic probability assignment function on the space of discernment spanned by variables $ X_{j_1}, X_{j_2}, \dots X_{j_k} $. $m ^{\uparrow X_1,X_2,\dots\,X_n}$ is called the vacuous extension of m onto superspace spanned by $X_1,X_2,\dots\,X_n$ iff $$m ^{\uparrow X_1, X_2, \dots X_n}(B ^{\uparrow X_1,X_2,\dots\,X_n})=m(B)$$ and $m ^{\uparrow X_1, X_2, \dots X_n}(A)=0$ for any other A. \\ We say that a belief function is vacuous iff $m(\Xi)=1$ and $m(A)=0$ for any A different from $\Xi$ \end{df Projections and vacuous extensions of Bel, Pl and Q functions are defined with respect to operations on m function. Notice that by convention if we want to combine by Dempster rule two belief functions not sharing the frame of discernment, we look for the closest common vacuous extension of their frames of discernment without explicitly notifying it \begin{df} (See \cite{Shafer:90b}) Let B be a subset of $\Xi$, called evidence, $m_B$ be a basic probability assignment such that $m_B(B)=1$ and $m_B(A)=0$ for any A different from B. Then the conditional belief function $Bel(.||B)$ representing the belief function $Bel$ conditioned on evidence B is defined as: $Bel(.||B)=Bel \oplus Bel_B$. \end{df} Notice: Vacuous extension is also called cylindric extension. In Smets' interpretation of Dempster-Shafer theory names bel, pl and q are used instead of Bel, Pl and Q. The justification is that Smets allows for $\emptyset$ to be a focal point (open world assumption). In this paper, the notion of pseudo-belief functions is also used (last section before discussion). A pseudo-belief function differs from proper belief function in that m is allowed to take also negative values, but only in such a way as to ensure that Q remains non-negative. However, Bel and Pl may get negative for pseudo-belief functions. \section{Introduction} The Dempster-Shafer Theory or the Mathematical Theory of Evidence (MTE) \cite{Shafer:76}, \cite{Dempster:67} shows one of possible ways of application of mathematical probability for subjective evaluation and is intended to be a generalization of bayesian theory of subjective probability \cite{Shafer:90ijar}. Belief functions are deemed to generalize (finite discrete) probability functions in that belief functions assign basic belief mass to (non-empty) subsets of set of elementary events, whereas probability functions assign basic belief mass only to elementary events. It is frequently claimed that, though they comprise something more than just probabilistic uncertainty, MTE belief function behavior reduces to behavior of probability if probabilities are available \cite{Smets:93}. That is if a belief function assigns non-zero basic belief mass only to subsets of cardinality 1 of the set of elementary events, then it is called bayesian belief function and considered as equivalent to probability function. A known method of representation of joint probability distribution in (many) discrete variables are so-called bayesian networks (as described e.g. in \cite{Pearl:88}, \cite{Geiger:90}). The joint probability distribution $Pr(x_1,...,x_n)$ in variables $X_1, X_2, ..., X_n$, where for a node $X_i$ only variables with indices from the set $\pi(i)$ directly influence the value of $X_i$, is expressed as: $$Pr(x_1,...,x_n) = \prod_{i=1}^{n} Pr(x_i | x_{\pi (i)})$ \noindent It is assumed that if we form a directed graph with nodes representing variables and directed edges are (all and only) of the form $(X_k->X_i)$ with $k\in\pi(i)$ then this graph is acyclic As a direct representation of a joint probability distribution in 15 discrete variables, with a domain with cardinality four each, would require more than 1~000~000~000 storage cells, bayesian network representation will immensely contribute to reduction of storage requirement if every variable is directly influenced by only a few other. Beside this, however, they are known to represent qualitatively many (conditional) independences among variables as well as to capture (a part of) causal relations among variables Structuring is much more urgently needed for belief functions. If we have a MTE belief distribution in 3 discrete variables, each with a domain of cardinality 4, then the joint belief distribution will be non-zero for possibly $2^{4^3}-1>10~000~000~000~000~000~000$ points ! A much more elaborated handling of structure of a joint belief distribution may be needed, but let us restrict ourselves to the modest requirement to structure at least as good as bayesian networks do for probability Several concepts of structuring belief functions have been proposed. Shenoy and Shafer \cite{Shenoy:90} have proposed factorizations of belief functions along hypergraphs. Smets \cite{Smets:93} and Cano at al. \cite{Cano:93} proposed factorization of belief function along directed acyclic graphs (Both proposals are radically different, nonetheless). Zhu and Lee \cite{Zhu:93} proposed amendment of a logical network connectives with specialized belief functions. Still another type of belief network, based on directed acyclic graphs, has been proposed in \cite{Klopotek:93f} Within this paper, let us look at these proposals from the point of view of the benchmark established by bayesian networks. Especially we will ask whether or not these proposals cover structuring of probability distributions into a bayesian network and whether they are capable of expressing dependence independence relations among variables, especially for special case of probability distribution. Basic definitions from the MTE are given in Appendix. \section{Logical Networks of Zhu and Lee Zhu and Lee \cite{Zhu:93} propose representation of a knowledge base (thus the joint belief) as a set of rules (and facts) amended by MTE-styled truth probability intervals. Though a name "logical network" is never used in their paper, it is clearly an intention of the authors to have one as they consider forward and backward propagation for each type of basic logical connector (negation, and, or, material implication). For a rule $r:A \rightarrow B$ its probability interval would be $[r_L, r_U]$. This implies immediately $m(\overline{A}\lor B)=r_L$, $m(A\land \overline{B} )=1-r_U$, $m(X)=r_U-r_L$, where X=\{true,false\} is the logical universe considered in the paper. The authors claim the necessity of permanent search for common frame of discernment for combined rules and facts to be major disadvantage of general MTE framework. Therefore they seek a way around by restricting themselves to logical values of rules and facts. They derive formulas for forward and backward propagation of uncertainty as well as for combination of evidence On page 347 they propose e.g. the following "Modus Ponens":\\ \begin{tabular}{ll} $A\rightarrow B:$: & $[r_L,r_U]$\\ $A:$ & $[a_L,a_U]$\\ \hline $B:$: & $[b_L,b_U]$\\ \end{tabular} with \\ $$b_L = \min\{1,\max\{0,(r_L+a_U-1)/a_U\}\}$ $$b_U = \min\{1,\max\{0,[r_U+a_U-a_L(r_L+a_U-1)/a_U-1]/(a_U-a_L)\}\}$ One could feel impressed by the simplicity of this and other formulas if not the way they are derived. On page 345 we find the table for joint belief distribution of A and B (Table II, proposed conjunction procedure for $A\land B$)):\\ \begin{tabular}{rllll} \hline && \multicolumn{3}{c}{B}\\ \cline{3-5} & \multicolumn{1}{c}{A} &\{t\},$b_L$ & \{f\},$1-b_U$ & \{t,f\},$b_U-b_L$ \\ \hline &\{t\},$a_L$ & \{t\},$m_{11}$& \{f\},$m_{12}$& \{t\},$m_{13}$\\ A & \{f\},$1-a_U$ & \{f\},$m_{21}$& \{f\},$m_{22}$& \{f\},$m_{23}$\\ & \{t,f\},$a_U-a_L$ & \{t\},$m_{31}$& \{f\},$m_{32}$& \{t,f\},$m_{33}$\\ \hline \end{tabular} Out of this table the basic belief assignment for implication is (presumably) derived as follows: $$m_{A\rightarrow B}(\{true\})=r_L=m_{11}+m_{21}+m_{22}+m_{23}+m_{31}$$ $$m_{A\rightarrow B}(\{false\})=1-r_U=m_{12}+m_{13}+m_{32}$$ $$m_{A\rightarrow B}(\{true, false\})=r_U-r_L=m_{33}$$ Up to this point one can little complain (beside e.g. typing error in \{f\}column header of B). But subsequently authors assume independence(!) of A and B, just: $m_{11}=a_Lb_L$, $m_{12}=a_L(1-b_U)$, $m_{13}=a_L(b_U-b_L)$, $m_{21}=(1-a_U)b_L$, $m_{22}=(1-a_U)(1-b_U)$, $m_{23}=(1-a_U)(b_U-b_L)$, $m_{31}=(a_U-a_L)b_L$, $m_{32}=(a_U-a_L)(1-b_U)$, $m_{33}=(a_U-a_L)(b_U-b_L)$, \\ Hence $$m_{A\rightarrow B}(\{true\})= a_Lb_L+ (1-a_U)b_L+(1-a_U)(1-b_U)+(1-a_U)(b_U-b_L)+ (a_U-a_L)b_L=$$ $$= a_Lb_L+ a_L(b_U-b_L)+ (1-a_U)+ (a_U-a_L)b_L= $$ $$= a_Lb_L+ 1-a_U+ a_Ub_L-a_Lb_L= $$ $$= a_Lb_L+ 1-a_U+ a_Ub_L-a_Lb_L= $$ $$= 1-a_U+ a_Ub_L=r_L $$ In a similar way we obtain an expression for $$m_{A\rightarrow B}(\{true, false\})=(a_U-a_L)\cdot(b_U-b_L)=$$ $$= a_U\cdot b_U-a_U\cdot b_L- a_L\cdot b_U+a_L\cdot b_L=$$ $$=r_U-r_L$$ Hence $$r_U=a_U b_U-a_U b_L- a_L b_U+a_L b_L + 1-a_U+ a_Ub_L=$$ $$=a_U b_U- a_L b_U+a_L b_L + 1-a_U$$ These are the formulas for $[r_L,r_U$ interval of a rule R as presented on page 346. Equations for $r_L, r_U$ are solved to obtain $b_L$ and $b_U$ as given at the beginning of this section. Let us assume that logical formulas A and B have the following joint distribution of probability of truth: \begin{tabular}{rllll} \hline && \multicolumn{3}{c}{B}\\ \cline{3-5} & \multicolumn{1}{c}{A} &\{t\},$b_L=0.3$ & \{f\},$1-b_U=0.7$ & \{t,f\},$b_U-b_L=0$ \\ \hline &\{t\},$a_L=0.4$ & 0.1 & 0.3 & 0\\ A & \{f\},$1-a_U=0.6$ & 0.2 & 0.4 & 0\\ & \{t,f\},$a_U-a_L=0$ & 0 & 0 & 0\\ \hline \end{tabular} Hence $a_L=a_U=0.4$ and $b_L=b_U=0.3$. So $r_L= 1-0.4+0.3\cdot 0.4=0.48$ and $r_U=0.4\cdot 0.3- 0.4\cdot 0.3+ 0.4\cdot 0.3 + 1-0.4=0.48$. Let us assume we know from somewhere that A is true nearly for sure that is that probability of truth of A is $a_L=0.999, a_U=1$. Then from Zhu and Lee formulas follows: $$b_L = \min\{1,\max\{0,(0.48+1-1)/1\}\}=0.48$ $$b_U = \min\{1,\max\{0, [0.48+1-0.999(0.48+1-1)/1-1]/(1-0.999)\}\}=$ $$= \min\{1,\max\{0, [0.48+0.999\cdot 0.48]/(1-0.999)\}\}=0.48$ But if we look at the data then is is clear that the probability of truth of B given truth of A is 0.25 and given the narrow uncertainty bound on truth of A the conditional (obtained by Jeffrey's rule) will not exceed 0.26 This example demonstrates in a clear way that the interpretation of DST proposed in \cite{Zhu:93} in no way supports the generally expressed claim that DST can capture bayesian reasoning as a special case. Also the source of the bug is obvious. If one assumes a priori the independence of facts and hypotheses (both in bayesian and DST sense) then one shall not wonder that the rule of inference tells nothing meaningful about the relationship between variables considered \section{Directed Acyclic Graphs of Smets} In his paper \cite{Smets:93} Smets attempts to generalize the bayesian theorem (being foundation of probability propagation in bayesian networks, e.g. \cite{Pearl:88}) in such a way as to enable propagation of beliefs in a directed networks. For this purpose he introduces a special notion of conditional beliefs (page 6) $$bel(B \smcond A)=bel(B \cup \overline{A})-bel(\overline{A}) \quad \forall B\subseteq \Omega$$ $\Omega$ - set of all elementary events. On page 5 he states that $bel(\emptyset)=0$. Let x be a subset of the set X, $\theta$ a subset of the set $\Theta$. Then on page 8 he states that $pl_X(x\smcond \theta)=pl_{X\times\Theta}(cyl(x)\smcond cyl(\theta))$. On page 9 he writes that $pl(A)=bel(\Omega)-bel(\overline{A})$. Though not explicitly stated, we expect that also $pl_X(A\smcond \theta)=bel_X(X \smcond \theta)-bel_X(\overline{x\smcond\theta})$ should hold. So $$bel(\overline{B} \smcond A) =bel(\overline{B} \cup \overline{A})-bel(\overline{A})$$ $$bel(\Omega \smcond A)=bel(\Omega \cup \overline{A})-bel(\overline{A})$$ Hence $$bel(\Omega \smcond A)-bel(\overline{B} \smcond A)= bel(\Omega \cup \overline{A})-bel(\overline{A}) -bel(\overline{B} \cup \overline{A})+bel(\overline{A})=$$ $$= bel(\Omega )-bel(\overline{B} \cup \overline{A})=$$ $$= pl(\overline{\overline{B} \cup \overline{A}})=pl(B\cap A)=pl(B\smcond A) $$ Hence $$pl_X(x\smcond \theta)=pl_{X\times\Theta}(cyl(x)\smcond cyl(\theta)) = bel_{X\times\Theta}(cyl(X)\smcond cyl(\theta))- bel_{X\times\Theta}(\overline{cyl(x)}\smcond cyl(\theta))$$ But then we easily derive that $bel_X(x\smcond \theta)=bel_{X\times\Theta}(cyl(x)\smcond cyl(\theta))$. He gives also the formula that given two belief distributions $bel_1, bel_2$ and $bel_{12}=bel_1\oand bel_2$ ($\oand$ is a version of $\oplus$ which is not normalized) we have $$m_{12}(A)=\sum_{B\subseteq\Omega} m_1(A\smcond B)m_2(B)$$ On page 12 he defines that two variables X and Y are said to be independent iff $$bel_X(A\smcond y)=bel_X(A\smcond y'), \forall A\subseteq X, \forall y, y' \in Y, y\ne y'$$ and $$bel_Y(B\smcond x)=bel_Y(B\smcond x'), \forall B\subseteq Y, \forall x, x'\in X, x\ne x'$$ Furthermore, for the set (of contexts) $\Theta=\{\theta_i, i=1,\dots,n\}$ he defines that when two observations are independent whatever the context $\theta_i$, then they are called conditionally independent.\\ Then on page 16 he requires that there is a $bel_\Theta(.\smcond x,y)$ such that $$bel_\Theta(.\smcond x,y)= bel_\Theta(.\smcond x) \oand bel_\Theta(.\smcond y)$$\\ Let us consider the consequences. Let X, and Y be sets $\{x_p,x_q\}$ and $\{y_p,y_q\}$ resp. Let $bel_{X\times Y}$ be a bayesian belief distribution, that is $m_{X\times Y}(A)$ greater than zero for some $A \subseteq X \times Y$ with card(A)=1 (singletons) and elsewhere equal zero. \Bem{ Furthermore let us assume that m's sum up to 1 and let us "statistical independence" of X and Y, that is masses are distributed as follows (#p_x+q_x=p_y+q_y=1) \begin{tabular}{rlll} \hline && \multicolumn{2}{c}{Y}\\ \cline{3-4} & \multicolumn{1}{c}{X} &\{$y_p$\} & \{$y_q$\}\\ \hline X &\{$x_p$\} & $p_x\cdot p_y$ & $p_x\cdot q_y$ \\ &\{$x_q$\} & $q_x\cdot p_y$ & $q_x\cdot q_y$ & \\ \hline \end{tabular} Under which conditions are X and Y "cognitively independent" ? Smets requires that $bel_X(x_p\smcond y_p)=bel_X(x_p\smcond y_q)$, $bel_X(x_q\smcond y_p)=bel_X(x_q\smcond y_q)$, $bel_Y(y_p\smcond x_p)=bel_Y(y_p\smcond x_q)$, $bel_Y(y_q\smcond x_p)=bel_Y(y_q\smcond x_q)$, Now $bel_X(x_p\smcond y_p) =bel_{X\times\Theta}(cyl(x_p)\smcond cyl(y_p)) =bel_{X\times\Theta}(cyl(x_p) \cup \overline{cyl(y_p)}) - bel_{X\times\Theta}(\overline{cyl(y_p)}) = (p_x\cdot p_y+p_x\cdot q_y+q_x\cdot q_y)-(p_x\cdot q_y+q_x\cdot q_y) = p_x\cdot p_y$, and $bel_X(x_p\smcond y_q) = p_x\cdot q_y$, $bel_X(x_q\smcond y_p) = q_x\cdot p_y$, $bel_X(x_q\smcond y_q) = q_x\cdot q_y$, $bel_Y(y_p\smcond x_p) = p_x\cdot p_y$, $bel_Y(y_p\smcond x_q) = q_x\cdot p_y$, $bel_Y(y_q\smcond x_p) = p_x\cdot q_y$, $bel_Y(y_q\smcond x_q) = q_x\cdot q_y$. But $bel_X(x_p\smcond y_p)=bel_X(x_p\smcond y_q)$ implies $p_y=q_y$, $bel_Y(y_p\smcond x_p)=bel_Y(y_p\smcond x_q)$ implies $p_x=q_x$. Hence if variables X and Y are statistically independent, they are cognitively independent if $p_x=q_x=p_y=q_y=0.5$ } Let be given the following distribution - basic belief assignment \begin{tabular}{rlll} \hline && \multicolumn{2}{c}{Y}\\ \cline{3-4} & \multicolumn{1}{c}{X} &\{$y_p$\} & \{$y_q$\}\\ \hline X &\{$x_p$\} & $m_{pp}$ & $m_{pq}$ \\ &\{$x_q$\} & $m_{qp}$ & $m_{qq}$ \\ \hline \end{tabular} Under which conditions are X and Y "cognitively independent" ? Smets requires that $bel_X(x_p\smcond y_p)=bel_X(x_p\smcond y_q)$, $bel_X(x_q\smcond y_p)=bel_X(x_q\smcond y_q)$, $bel_Y(y_p\smcond x_p)=bel_Y(y_p\smcond x_q)$, $bel_Y(y_q\smcond x_p)=bel_Y(y_q\smcond x_q)$, Following Smets' notation cyl(x) shall denote cylindric (vacuous) extension of set x. Now $$bel_X(x_p\smcond y_p) =bel_{X\times\Theta}(cyl(x_p)\smcond cyl(y_p))=$$ $$ =bel_{X\times\Theta}(cyl(x_p) \cup \overline{cyl(y_p)}) - bel_{X\times\Theta}(\overline{cyl(y_p)})=$$ $$ = (m_{pp}+m_{pq}+m_{qq}) - (m_{pq}+m_{qq}) = m_{pp}$$, $bel_X(x_p\smcond y_q) = m_{pq}$, $bel_X(x_q\smcond y_p) = m_{qp}$, $bel_X(x_q\smcond y_q) = m_{qq}$, $bel_Y(y_p\smcond x_p) = m_{pp}$, $bel_Y(y_p\smcond x_q) = m_{qp}$, $bel_Y(y_q\smcond x_p) = m_{pq}$, $bel_Y(y_q\smcond x_q) = m_{qq}$. But $bel_X(x_p\smcond y_p)=bel_X(x_p\smcond y_q)$ implies $m_{pp}=m_{pq}$. $bel_X(x_q\smcond y_p)=bel_X(x_q\smcond y_q)$ implies $m_{qp}=m_{qq}$, $bel_Y(y_p\smcond x_p)=bel_Y(y_p\smcond x_q)$ implies $m_{pp}=m_{qp}$. Hence both are independent only if \begin{tabular}{rlll} \hline && \multicolumn{2}{c}{Y}\\ \cline{3-4} & \multicolumn{1}{c}{X} &\{$y_p$\} & \{$y_q$\}\\ \hline X &\{$x_p$\} & $m$ & $m$ \\ &\{$x_q$\} & $m$ & $m$ \\ \hline \end{tabular} (m - a constant equal 1/4). That is cognitive independence of Smets does not cover statistical independence for bayesian belief functions, but rather is a very special case of it (for uniform distributions). Let us consider now three variables $X,Y,\Theta$ for conditional independence of X,Y on $\Theta$. Let X,Y have domains as above, let $\Theta=\{\theta_p, \theta_q\}$. Let the joint belief distribution basic belief assignment be as follows: \\ \noindent for $\theta_p$ \begin{tabular}{rlll} \hline && \multicolumn{2}{c}{Y}\\ \cline{3-4} & \multicolumn{1}{c}{X} &\{$y_p$\} & \{$y_q$\}\\ \hline X &\{$x_p$\} & $m_{ppp}$ & $m_{pqp}$ \\ &\{$x_q$\} & $m_{qpp}$ & $m_{qqp}$ \\ \hline \end{tabular} for $\theta_q$ \begin{tabular}{rlll} \hline && \multicolumn{2}{c}{Y}\\ \cline{3-4} & \multicolumn{1}{c}{X} &\{$y_p$\} & \{$y_q$\}\\ \hline X &\{$x_p$\} & $m_{ppq}$ & $m_{pqq}$ \\ &\{$x_q$\} & $m_{qpq}$ & $m_{qqq}$ \\ \hline \end{tabular} When may X and Y be conditionally independent given $\Theta$ ? Smets requires that among others $$m_\Theta(\theta_p\smcond x_p,y_p)= m_\Theta(\theta_p\smcond x_p) \cdot m_\Theta(\theta_p\smcond y_p)$ $$m_\Theta(\theta_p\smcond x_p,y_q)= m_\Theta(\theta_p\smcond x_p) \cdot m_\Theta(\theta_p\smcond y_p)$ $$m_\Theta(\theta_p\smcond x_q,y_p)= m_\Theta(\theta_p\smcond x_q) \cdot m_\Theta(\theta_p\smcond y_p)$ $$m_\Theta(\theta_p\smcond x_q,y_q)= m_\Theta(\theta_p\smcond x_q) \cdot m_\Theta(\theta_p\smcond y_q)$ $$m_\Theta(\theta_q\smcond x_p,y_p)= m_\Theta(\theta_q\smcond x_p) \cdot m_\Theta(\theta_q\smcond y_p)$ $$m_\Theta(\theta_q\smcond x_p,y_q)= m_\Theta(\theta_q\smcond x_p) \cdot m_\Theta(\theta_q\smcond y_q)$ $$m_\Theta(\theta_q\smcond x_p,y_p)= m_\Theta(\theta_q\smcond x_q) \cdot m_\Theta(\theta_q\smcond y_p)$ $$m_\Theta(\theta_q\smcond x_p,y_q)= m_\Theta(\theta_q\smcond x_q) \cdot m_\Theta(\theta_q\smcond y_q)$ One can easily check that for bayesian belief functions $bel(B \cup \overline{A})=bel(B \cap A) + bel(\overline{A})$. Then $bel(B \smcond A) = bel(B \cap A)$. But $bel(B \cap A)$ is the sum of m-function values for all singleton subsets of $B \cap A$. This actually means that: \\ $$m_{\Theta\times X \times Y}(\theta_p,x_p,y_p)= (m_{\Theta\times X \times Y}(\theta_p,x_p,y_p)+ m_{\Theta\times X \times Y}(\theta_p,x_p,y_q)) \cdot$$ $$ \cdot (m_{\Theta\times X \times Y}(\theta_p,x_p,y_p)+ m_{\Theta\times X \times Y}(\theta_p,x_q,y_p))$$ etc. Hence $$m_{\Theta\times X \times Y}(\theta_p,x_p,y_p)= m_{\Theta\times X \times Y}(\theta_p,x_p,y_p)^2+ m_{\Theta\times X \times Y}(\theta_p,x_p,y_q) \cdot m_{\Theta\times X \times Y}(\theta_p,x_p,y_p)+ $$ $$+ m_{\Theta\times X \times Y}(\theta_p,x_p,y_p)+ \cdot m_{\Theta\times X \times Y}(\theta_p,x_q,y_p) $$ etc. Hence $$m_{\Theta\times X \times Y}(\theta_p,x_p,y_p) + m_{\Theta\times X \times Y}(\theta_p,x_p,y_q) + m_{\Theta\times X \times Y}(\theta_p,x_q,y_p) + m_{\Theta\times X \times Y}(\theta_p,x_q,y_q) =$$ $$ = m_{\Theta\times X \times Y}(\theta_p,x_p,y_p)^2+ m_{\Theta\times X \times Y}(\theta_p,x_p,y_p) \cdot m_{\Theta\times X \times Y}(\theta_p,x_p,y_q)+$$ $$+ m_{\Theta\times X \times Y}(\theta_p,x_p,y_p)+ \cdot m_{\Theta\times X \times Y}(\theta_p,x_q,y_p) +$$ $$+ m_{\Theta\times X \times Y}(\theta_p,x_p,y_q)^2+ m_{\Theta\times X \times Y}(\theta_p,x_p,y_q) \cdot m_{\Theta\times X \times Y}(\theta_p,x_p,y_p)+$$ $$+ m_{\Theta\times X \times Y}(\theta_p,x_p,y_q)+ \cdot m_{\Theta\times X \times Y}(\theta_p,x_q,y_q) +$$ $$+ m_{\Theta\times X \times Y}(\theta_p,x_q,y_p)^2+ m_{\Theta\times X \times Y}(\theta_p,x_q,y_p) \cdot m_{\Theta\times X \times Y}(\theta_p,x_p,y_q)+$$ $$+ m_{\Theta\times X \times Y}(\theta_p,x_q,y_p)+ \cdot m_{\Theta\times X \times Y}(\theta_p,x_p,y_p) +$$ $$+ m_{\Theta\times X \times Y}(\theta_p,x_q,y_q)^2+ m_{\Theta\times X \times Y}(\theta_p,x_q,y_q) \cdot m_{\Theta\times X \times Y}(\theta_p,x_p,y_p)+$$ $$+ m_{\Theta\times X \times Y}(\theta_p,x_q,y_q)+ \cdot m_{\Theta\times X \times Y}(\theta_p,x_p,y_q) $$ Hence $$m_{\Theta\times X \times Y}(\theta_p,x_p,y_p) + m_{\Theta\times X \times Y}(\theta_p,x_p,y_q) +$$ $$ + m_{\Theta\times X \times Y}(\theta_p,x_q,y_p) + m_{\Theta\times X \times Y}(\theta_p,x_q,y_q) =$$ $$ = (m_{\Theta\times X \times Y}(\theta_p,x_p,y_p) + m_{\Theta\times X \times Y}(\theta_p,x_p,y_q) +$$ $$ + m_{\Theta\times X \times Y}(\theta_p,x_q,y_p) + m_{\Theta\times X \times Y}(\theta_p,x_q,y_q) )^2 $$ That is $bel_{\Theta\times X \times Y}(\theta_p)= bel_{\Theta\times X \times Y}(\theta_p)^2$. Shall we take seriously the assumption from page that $\sum_{A\subseteq\Omega}m(A)=1$, then either $bel_{\Theta\times X \times Y}(\theta_p)=1$ and $bel_{\Theta\times X \times Y}(\theta_q)=0$ or $bel_{\Theta\times X \times Y}(\theta_p)=0$ and $bel_{\Theta\times X \times Y}(\theta_q)=1$. But this actually means that variable $\Theta$ does not influence the joint distribution of X,Y at all. Just the notion of conditional independence for bayesian belief networks of Smets is devoid of any meaning. \section{Hypergraphs of Shenoy and Shafer} In \cite{Shenoy:90}, Shenoy and Shafer proposed a general framework for uncertainty propagation if uncertainty is structured along a hypergraph. Their framework covers both probability and belief functions. {\em Hypergraphs}: A nonempty set H of nonempty subsets of a finite set S be called a hypergraph on S. The elements of H be called hyperedges. Elements of S be called vertices. H and H' be both hypergraphs on S, then we call a hypergraph H' a {\em reduced hypergraph} of the hypergraph H, iff for every $h'\in H'$ also $h'\in H$ holds, and for every $h \in H$ there exists such a $h' \in H'$ that $h \subseteq h'$ A hypergraph H {\em covers} a hypergraph H' iff for every $h'\in H'$ there exists such a $h\in H$ that $h'\subseteq h$ {\em Hypertrees}: t and b be distinct hyperedges in a hypergraph H, $t \cap b\neq \emptyset$, and b contains every vertex of t that is contained in a hyperedge of H other than t; if $X\in t$ and $X\in h$, where $h\in H$ and $h\neq t$, then $X\in b$. Then we call t a twig of H, and we call b a branch for t. A twig may have more than one branch. We call a hypergraph a hypertree if there is an ordering of its hyperedges, say $h_1,h_2,...,h_n$ such that $h_k$ is a twig in the hypergraph $\{h_1,_h2,...,h_k\}$ whenever $2 \leq k \leq n$. We call any such ordering of hyperedges a hypertree construction sequence for the hypertree. The first hyperedge in the hypertree construction sequence be called the root of the hypertree construction sequence. Please refer to the paper of Shenoy and Shafer \cite{Shenoy:90} on notions of Markov trees, variables ({\bf V}), valuations (VV), valuations on a set of variables h ($VV_h$), and proper valuations, combination operator $\oplus: VV \times VV \rightarrow VV$, marginalization operator $\downarrow h: \bigcup \{ VV_g| g \subseteq h\} \rightarrow VV_h$, the axiomatic framework and the local computation method of Shenoy and Shafer. We recall here only the definitions of: {\em Factorization}: Suppose A is a valuation on a finite set of variables \V, and suppose HV is a hypergraph on \V. If A is equal to the combination of valuations of all hyperedges h of HV then we say that A factors on HV. The valuation for MTE is simply the belief function. For MTE the fact that a belief function Bel defined for the set of variables \V factors over a hypergraph HV means that it may be represented as $$Bel = \bigoplus_{h;h \in HV} Bel ^{h}$$ where $Bel ^{h}$ is a (different) belief function defined over the set of variables h. {\em Conditioning}: Suppose $Bel$ is a belief distribution, and $Bel_E$ is an indicator potential capturing the evidence E (that is $Bel_E$ is such a belief function that $M_E(E)=1$ and for any A different from E m(A)=0). Then conditional belief function conditioned on E, $Bel(.||E)$, is defined as $Bel(.||E)=Bel \oplus Bel_E$ Actually the propagation of belief in the hypergraph via Shenoy/Shafer propagation of uncertainty means for a given hypothesis variable $V_i$ calculation of $Bel(.||E) ^{\downarrow V_i}$ ($\downarrow V_i$ means projection of belief function onto the subspace of the single variable $V_i$) for the given belief function Bel, the factorization of which along a hypergraph is known, and for the evidence E in such a way as to avoid the calculation of the complete function $Bel$ and $Bell(.||E)$ as a in-between result - because both functions may consume too much memory. To manage it, the underlying hypergraph is first transformed to a hypertree and thereafter the computations are quick. \\ Shenoy and Shafer consider it unimportant whether or not the factors $Bel ^{h}$ factorization of $Bel$ should refer to any notion of conditionality. In fact, one may easily construct a belief function factorization in which no proper subset of factors can tell anything about marginal distribution of any variable belonging to the factors of this subset. \\ The hypergraph makes the impression of apparent grater generality than bayesian networks of Pearl \cite{Pearl:88} because in case of bayesian belief functions simpler factorization is possible (less factors, fewer variables) than that along a bayesian network. However, in \cite{Klopotek:93f} it has been shown that this is only a superficial effect because the real propagation is run on hypertrees, and not in general type hypergraphs, and then the generality of Shenoy \& Shafer factorization gives nothing beyond that of bayesian network factorization (see also below) \section{Cano's et al. A Priori Conditionals in Directed Acyclic Graphs} Cano et al. in \cite{Cano:93} proposed a generalization of Pearl's bayesian networks to capture DS belief distributions instead of Shenoy/Shafer hypergraphs. They argue: "graphical structures used to represent relationships among variables in our work are Pearl's causal networks \cite{Pearl:88}, not Shenoy/Shafer's hypergraphs, because the former are more appropriate to represent independence relationships among variables in a direct way." (p.257). On page 262 (Definition 2) they define a belief function $Bel$ (a priori) conditional belief function conditioned on variable set $h$ by requiring $Bel ^{\downarrow h}$ to be a vacuous belief function. It is easily checked that this notion of conditional belief functions allows to represent statistically conditionally independent variables of a bayesian belief network as a priori conditionally independent variables in Cano's et al. sense. However, it cannot handle other belief functions which could be expressed in terms of a Dempster Rule of Combination. As an example please verify, that the belief function $Bel_{12}$ $$Bel_{12}=Bel_1\oplus Bel_2$$ \noindent with focal points for $Bel_1$, $Bel_2$ ($Bel_1$ defined for variables X,Y, $Bel_2$ for variables X,Z, domains of variables: X: \{$x_1,x_2$\}, Y: \{$y_1,y_2$\}, Z: \{$z_1,z_2$\}) \begin{tabular}{ll} set & $m_1(set)$\\ \hline \{$(x_1,y_1), (x_1,y_2),$\\ $ (x_2,y_1), (x_2,y_2)$\} & 0.1\\ \{$(x_1,y_1)$\} & 0.2\\ \{$(x_1,y_2)$\} & 0.25\\ \{$(x_2,y_1)$\} & 0.3\\ \{$(x_2,y_2)$\} & 0.15\\ \hline \quad\\ \end{tabular} \begin{tabular}{ll} set & $m_2(set)$\\ \hline \{$(x_1,z_1), (x_1,z_2),$\\$ (x_2,z_1), (x_2,z_2)$\} & 0.2\\ \{$(x_1,z_1)$\} & 0.2\\ \{$(x_1,z_2)$\} & 0.3 \\ \{$(x_2,z_1)$\} & 0.25\\ \{$(x_2,z_2)$\} & 0.05\\ \hline \quad\\ \end{tabular} \noindent cannot be represented in a structured manner as a product of a normal and conditional belief function in sense of Cano et al. In this sense it is immediately visible, that Shenoy-Shafer hypergraphs allow for more efficient structuring of belief functions than Cano's et al. directed acyclic graph representation. \section{Generalized belief networks} The axiomatization system of Shenoy/Shafer refers to the notion of factorization along a hypergraph. However, the actual propagation algorithm operates on hypertrees. We investigate below implications of this disagreement \begin{df} \cite{Klopotek:93f} We define a mapping $\ominus: VV \times VV \rightarrow VV$ called decombination such that: if $Bel_{12}=Bel_1 \ominus Bel_2$ then $Bel_1=Bel_2 \oplus Bel_{12}$ \end{df In case of probabilities, decombination means memberwise division: $Pr_{12}(A)=Pr_1(A)/Pr_2(A)$. In case of DS pseudo-belief functions it means the operator $\ominus$ yielding a DS pseudo-belief function such that: whenever $Bel_{12}=Bel_1 \ominus Bel_2$ then $Q_{12}(A)=c \cdot Q_1/Q_2$. Both for probabilities and for DS belief functions decombination may be not uniquely determined. Moreover, for DS belief functions not always a decombined DS belief function will exist. Hence we extend the domain to DS pseudo-belief functions which is closed under this operator. We claim here without a proof (which is simple) that DS pseudo-belief functions fit the axiomatic framework of Shenoy/Shafer. Moreover, we claim that if an (ordinary) DS belief function is represented by a factorization in DS pseudo-belief functions, then any propagation of uncertainty yields the very same results as when it would have been factored into ordinary DS belief functions. \begin{df} \cite{Klopotek:93f} By anti-conditioning $|$ of a belief function $Bel$ on a set of variables $h$ we understand the transformation: $Bel ^{|h}= Bel \ominus Bel ^{\downarrow h}$. \end{df Notably, anti-conditioning means in case of probability functions proper conditioning. Notice that due to the fact that $\ominus$ does not provide with a unique result, so also anti-conditioning may yield many pseudo-belief functions none of which is particularly distinguished. Let us define now the general notion of belief networks. \begin{df} \cite{Klopotek:93f} A belief network is a pair (D,Bel) where D is a DAG (directed acyclic graph) and Bel is a belief distribution called the {\em underlying distribution}. Each node i in D corresponds to a variable $X_i$ in Bel, a set of nodes I corresponds to a set of variables $X_I$ and $x_i, x_I$ denote values drawn from the domain of $X_i$ and from the (cross product) domain of $X_I$ respectively. Each node in the network is regarded as a storage cell for any distribution $Bel ^{\downarrow \{X_i\} \cup X_{\pi (i)} | X_{\pi (i)} }$ where $X_{\pi (i)}$ is a set of nodes corresponding to the parent nodes $\pi(i)$ of i. The underlying distribution represented by a belief network is computed via $$Bel = \bigoplus_{i=1}^{n}Bel ^{\downarrow \{X_i\} \cup X_{\pi (i)} | X_{\pi (i)} } $ \end{df} Please notice the local character of valuation of a node: to valuate the node $i$ corresponding to variable $X_i$ only the marginal $Bel ^{\downarrow \{X_i\} \cup X_{\pi (i)}}$ needs to be known (e.g. from data) and not the entire belief distribution There exists a straight forward transformation of a belief network structure into a hypergraph, and hence of a belief network into a hypergraph: for every node i of the underlying DAG define a hyperedge as the set $\{X_i\} \cup X_{\pi(i)}$; then the valuation of this hyperedge define as $Bel ^{\downarrow \{X_i\} \cup X_{\pi(i)} | X_{\pi(i)}}$. We say that the hypergraph obtained in this way is {\em induced} by the belief network \AbbEins Let us consider now the inverse operation: transformation of a valuated hypergraph into a belief network. As the first stage we consider structures of a hypergraph and of a belief network (the underlying DAG). we say that a belief network is {\em compatible} with a hypergraph iff the reduced set of hyperedges induced by the belief network is identical with the reduced hypergraph. \begin{Bsp} Let us consider the following hypergraph (see Fig.\ref{abbeins}.a)): \{\{A,B,C\}, \{C,D\}, \{D,E\}, \{A, E\}\}. the following belief network structures are compatible with this hypergraph: \{$A,C\rightarrow B$, $C\rightarrow D$, $D\rightarrow E$, $E\rightarrow A$\} (see Fig.\ref{abbzwei}.a)), \{$A,C\rightarrow B$, $D\rightarrow C$, $D\rightarrow E$, $E\rightarrow A$\}, (see Fig.\ref{abbzwei}.b)), \{$A,C\rightarrow B$, $D\rightarrow C$, $E\rightarrow D$, $E\rightarrow A$\}, (see Fig.\ref{abbzwei}.c)), \{$A,C\rightarrow B$, $D\rightarrow C$, $E\rightarrow D$, $A\rightarrow E$\}. (see Fig.\ref{abbzwei}.d)), \end{Bsp} \AbbZwei \begin{Bsp} Let us consider the following hypergraph (see Fig.\ref{abbeins}.b)): \{\{A,B,C\}, \{C,D\}, \{D,E\}, \{A, E\}, \{B,F\}, \{F,D\}\}. No belief network structure is compatible with it. \end{Bsp} The missing compatibility is connected with the fact that a hypergraph may represent a cyclic graph. Even if a compatible belief network has been found we may have troubles with valuations. In Example 1 an unfriendly valuation of hyperedge \{A,C,B\} may require an edge AC in a belief network representing the same distribution, but it will make the hypergraph incompatible (as e.g. hyperedge \{A,C,E\} would be induced). This may be demonstrated as follows \begin{df} \cite{Klopotek:93f} If $X_J,X_K,X_L$ are three disjoint sets of variables of a distribution Bel, then $X_J,X_K$ are said to be conditionally independent given $X_L$ (denoted $I(X_J,X_K |X_L)_{Bel}$) iff $$Bel ^{\downarrow X_J \cup X_K \cup X_L | X_L} \oplus Bel ^{\downarrow X_L } = Bel ^{\downarrow X_J \cup X_L | X_L} \oplus Bel ^{\downarrow X_K \cup X_L | X_L} \oplus Bel ^{\downarrow X_L } $$ $I(X_J,X_K |X_L)_{Bel}$ is called a {\em conditional independence statement \end{df} Let $I(J,K|L)_D$ denote d-separation in a graph \cite{Geiger:90}.: \begin{th} \label{IDIBel} \cite{Klopotek:93f} Let $Bel_D=\{Bel|$(D,Bel) be a belief network\}. Then:\\ $I(J,K|L)_D$ iff $I(X_J,X_K |X_L)_{Bel}$ for all $Bel \in Bel_D$ \end{th} Now we see in the above example that nodes D and E d-separate nodes A and C. Hence within any belief network based on one of the three DAGs mentioned A will be conditionally independent from C given D and E. But one can easily check that with general type of hypergraph valuation nodes A and C may be rendered dependent. The sad result is, that \begin{th} \cite{Klopotek:93f} Hypergraphs considered by Shenoy/Shafer \cite{Shenoy:90} may for a given joint belief distribution have simpler structure than (be properly covered by) the closest hypergraph induced by a belief network. \end{th} \AbbDrei Notably, though the axiomatic system of Shenoy/Shafer refers to hypergraph factorization of a joint belief distribution, the actual propagation is run on a hypertree (or more precisely, on one construction sequence of a hypertree, that is on Markov tree) covering that hypergraph. \Bem{ Covering a hypergraph with a hypertree is a trivial task, yet finding the optimal one (with as small number of variables in each hyperedge of the hypertree as possible) may be very difficult \cite{Shenoy:90}. Let us look closer at the outcome of the process of covering with a reduced hypertree factorization, or more precisely, at the relationship of a hypertree construction sequence and a belief network constructed out of it in the following way If $h_k$ is a twig in the sequence $\{h_1,...,h_k\}$ and $h_{i_k}$ its branch with $i_k<k$, then let us span the following directed edges in a belief network: First make a complete directed acyclic graph out of nodes $h_k-h_{i_k}$. Then add edges $Y_l \rightarrow X_j$ for every $Y_l \in h_k \cap h_{i_k}$ and every $X_j \in h_k-h_{i_k}$. (see Fig.\ref{abbdrei}). Repeat this for every k=2,..,n. \Bem{(Note: no connection is introduced between nodes contained in $h_1$). } For k=1 proceed as if $h_1$ were a twig with an empty set as a branch for it. \AbbVier It is easily checked that the hypergraph induced by a belief network structure obtained in this way is in fact a hypertree (if reduced, then exactly the original reduced hypertree). Let us turn now to valuations (Fig.\ref{abbvier}.a). Let $Bel_i$ be the valuation originally attached to the hyperedge $h_i$. then $Bel = Bel_1 \oplus ...\oplus Bel_n$. What conditional belief is to be attached to $h_n$ ? First marginalize: $Bel'_n = Bel_1^{\downarrow h_1 \cap h_n} \oplus \dots \oplus Bel_{n-1}^{\downarrow h_{n-1} \cap h_n} \oplus Bel_n$. ( (Fig.\ref{abbvier}.b,.c)) Now calculate: $Bel"_n={Bel'}_n ^{|h_n \cap h_{i_n}}$, and $Bel"'_n={Bel'}_n ^{\downarrow h_n \cap h_{i_n}}$. Let $Bel_{*k}= Bel_k\ominus Bel_k ^{\downarrow h_1 \cap h_n}$ for k=1,...,$i_n$-1,$i_n$+1,...,(n-1), (Fig.\ref{abbvier}.d) and let $Bel_{*i_n}= (Bel_{i_n}\ominus Bel_{i_n} ^{\downarrow h_1 \cap h_n}) \oplus Bel"'_n$ . Obviously, $Bel=Bel_{*1} \oplus \dots \oplus Bel_{*(n-1)} \oplus Bel"_n$ (Fig.\ref{abbvier}.e). Now let us consider a new hypertree only with hyperedges $h_1,\dots h_{n-1}$, and with valuations equal to those marked with asterisk (*), and repeat the process until only one hyperedge is left, the now valuation of which is considered as $Bel"_1$. In the process, a new factorization is obtained: $Bel=Bel"_1 \oplus \dots \oplus Bel"_n$. \\ If now for a hyperedge $h_k$ $card(h_k-h_{i_k})=1$, then we assign $Bel"_k$ to the node of the belief network corresponding to $h_k-h_{i_k}$. If for a hyperedge $h_k$ $card(h_k-h_{i_k})>1$, then we split $Bel"_k$ as follows: Let $h_k-h_{i_k}=\{X_{k1},X_{k2},....,X_{km}\}$ and the indices shall correspond to the order in the belief network induced by the above construction procedure. Then $$Bel"_k=Bel ^{\downarrow h_k|h_k \cap h_{i_k}}= \bigoplus_{j=1}^{m} Bel ^{\downarrow (h_k \cap h_{i_k}) \cup \{X_{k1},...,X_{kj}\} | (h_k \cap h_{i_k}) \cup \{X_{k1},...,X_{kj}\}-\{X_{kj}\}}$ and we assign valuation $Bel ^{\downarrow (h_k \cap h_{i_k}) \cup \{X_{k1},...,X_{kj}\} | (h_k \cap h_{i_k}) \cup \{X_{k1},...,X_{kj}\}-\{X_{kj}\}}$ to the node corresponding to $X_{kj}$ in the network structure. It is easily checked that \begin{th} \label{xxxx} \cite{Klopotek:93f} (i) The network obtained by the above construction of its structure and valuation from hypertree factorization is a belief network.\\ (ii) This belief network represents exactly the joint belief distribution of the hypertree\\ (iii) This belief network induces exactly the original reduced hypertree structur \end{th The above theorem implies that any hypergraph suitable for propagation must have a compatible belief network. Hence seeking for belief network decompositions of joint belief distributions is sufficient for finding any factorization suitable for Shenoy/Shafer propagation of uncertainty. \section{Discussion} We presented here selected concepts of structuring of DS belief functions with a special emphasis on their capability to capture independence from the point of view of the claim that belief functions generalize bayes notion of probability.\\ It is demonstrated that Zhu and Lee's \cite{Zhu:93} logical networks and Smets' \cite{Smets:93} directed acyclic graphs are unable to capture statistical dependence/independence of bayesian networks \cite{Pearl:88} Zhu and Lee's \cite{Zhu:93} just assume conditional independence of premise and conclusion of an implication and hence assume that the dominant value of premise implies the dominant value of conclusion. This is wrong from the logical point of view because the implication may be inverse in the data, but the presence of cases for which the rule is not applicable will distort the conclusions of expert system based on rules like those proposed by Zhu and Lee's \cite{Zhu:93}. Smets \cite{Smets:93} goes to other extreme and assumes that all variables but in very restricted cases are dependent. His definition of cognitive independence applies to bayesian belief functions only in those rare cases of uniform joint probability distribution. Smets' notion of conditional independence for bayesian belief functions means that the conditioning variable is degenerate from statostical point of view: it takes only one value and hence is usually ommitted from any statistical analysis. So conditional independence again reduces to uniform distribution of conditioned variables. \\ On the other hand, though Shenoy and Shafer's hypergraphs can explicitly represent bayesian network factorization of bayesian belief functions, they disclaim any need for representation of independence of variables in belief functions. Cano et al. \cite{Cano:93} reject the hypergraph representation of Shenoy and Shafer just on grounds of missing representation of variable independence, but in their frameworks some belief functions factorizable in Shenoy/Shafer framework cannot be factored. The approach in \cite{Klopotek:93f} on the other hand combines the merits of both Cano et al. and of Shenoy/Shafer approach in that for Shenoy/Shafer approach no simpler factorization than that in \cite{Klopotek:93f} approach exists and on the other hand all independences among variables captured in Cano et al. framework and many more are captured in \cite{Klopotek:93f} approach Two new operators for MTE have been introduced in connection with the approach of \cite{Klopotek:93f}: decombination $\ominus$ and anti-conditioning $|$. We shall stress that operators in this sense have been also introduced previously by Shenoy in \cite{Shenoy:91} in connection with his valuation networks. We shall emphasize however one important difference making our approach more general. Shenoy insists that belief functions suitable for anti-conditioning should have unique unity item which means that the belief function shall have a focal point equal to the universe. This excludes bayesian belief functions so that Shenoy's framework could not represent many of independences explicated within our framework. Inversion of Shafer's conditioning $Bel(.||B)$ was also considered by Cano et al. \cite{Cano:93}, Smets \cite{Smets:93} and Shafer \cite{Shafer:76}. The 'a priori conditioning' of Cano et al. \cite{Cano:93} is a special case of our anti-conditioning in that it requires marginalization on conditioning variables to yield a vacuous belief function. On the other hand deconditioning of Smets \cite{Smets:93} and conditional embedding of Shafer \cite{Shafer:76} are entirely different in nature. Our approach starts with joint absolute belief distribution and tries to remove the impact of absolute distribution of anti-conditioning variables from the picture of relation between the anti-conditioning and the anti-conditioned variable. Deconditioning and conditional embedding start with selected conditional beliefs try to establish a joint absolute belief distribution of conditioned and conditioning variables. Hence the concept of anti-conditioning is orthogonal to that of conditional embedding and deconditioning \section{Conclusions} For many approaches to structuring of belief functions the claim of generalization of bayesian probabilities by Dempster-Shafer belief functions is actually illusive. Especially \begin{itemize} \item Zhu and Lee's \cite{Zhu:93} logical networks and Smets' \cite{Smets:93} directed acyclic graphs are unable to capture statistical dependence/independence of bayesian networks \item Though Shenoy and Shafer's hypergraphs can explicitly represent bayesian network factorization of bayesian belief functions, they disclaim any need for representation of independence of variables in belief functions. \item In Cano et al. \cite{Cano:93} frameworks some belief functions factorizable in Shenoy/Shafer framework cannot be factored. \item The approach in \cite{Klopotek:93f} on the other hand combines the merits of both Cano et al. (representation of independences) and of Shenoy/Shafer approach (Shenoy/Shafer approach yields no simpler factorization than that in \cite{Klopotek:93f} approach \end{itemize} \input{am1bib.tex} \end{document} 
\section{Introduction} An instance of the $s$-$t$-path TSP consists of a finite metric space $(V,c)$ and $s,t\in V$. The goal is to compute a path $(V,H)$ with endpoints $s$ and $t$ (or a circuit if $s=t$) that contains all elements of $V$. Christofides \cite{Chr76} and Hoogeveen \cite{Hoo91} proposed to compute a cheapest spanning tree $(V,S)$, let $T:=\{v\in V:|S\cap \delta(v)| \text{ odd}\}\triangle\{s\}\triangle\{t\}$ be the set of vertices with wrong parity, compute a cheapest $T$-join $J$ and an Eulerian trail from $s$ to $t$ in $(V,S\stackrel{.}{\cup} J)$, and shortcut whenever a vertex is visited more than once. This algorithm has approximation ratio $\frac{3}{2}$ for $s=t$ \cite{Chr76}, but only $\frac{5}{3}$ for $s\not=t$ \cite{Hoo91}. Let us briefly explain our notation. As usual, $\triangle$ and $\stackrel{.}{\cup}$ denote symmetric difference and disjoint union. Let $n:=|V|$ and $E={V\choose 2}$; so $(V,E)$ is the complete graph on $V$. For a vertex set $U\subseteq V$ let $E[U]$ denote the set of edges with both endpoints in $U$, $\delta(U)$ the set of edges with exactly one endpoint in $U$, and $\delta(v):=\delta(\{v\})$ for $v\in V$. For $x\in\mathbb{R}^E$ and $H\subseteq E$ we write $x(H):=\sum_{e\in H} x_e$, $c(x):=\sum_{e=\{v,w\}\in E}c(v,w) x_e$, and $c(H):=\sum_{e=\{v,w\}\in H}c(v,w)$. By $[m]$ we denote the index set $[m]:=\{1,2, \dots, m\}$. An $A$-$B$-cut is an edge set $\delta(U)$ for some vertex set $U$ with $A\subseteq U\subseteq V\setminus B$. An \emph{$s$-$t$-tour} is an edge set $H$ such that $(V,H)$ is an $s$-$t$-path (or a circuit if $s=t$), i.e. $H$ is the edge set of a path with endpoints $s$ and $t$ that spans all vertices. As all previous works, we use a classical idea of Wolsey \cite{Wol80} for analyzing Christofides' algorithm. The following LP is obviously a relaxation of the $s$-$t$-path TSP (incidence vectors of $s$-$t$-tours are feasible solutions): \begin{equation} \label{eq:subtour_lp_with_degree} \begin{aligned} & \min c(x) \hspace{-2mm} \\ &s.t. & x(\delta(U)) &\geq 2 & & \text{for } \emptyset \subset U \subseteq V\setminus\{s,t\},\\ & & x(\delta(U)) &\geq 1 & & \text{for } \{s\} \subseteq U \subseteq V\setminus\{t\}, \\ & & x(\delta(v)) &= 2 & & \text{for } v\in V\setminus(\{s\}\triangle\{t\}), \\ & & x(\delta(v)) &= 1 & & \text{for } v\in \{s\}\triangle\{t\}, \\ & & x(e) &\geq 0 & & \text{for } e\in E. \end{aligned}\hspace{-4mm} \end{equation} Held and Karp \cite{HelK70} observed that every feasible solution to this LP is a convex combination of incidence vectors of spanning trees (plus one edge if $s=t$) of $(V,E)$. Hence $c(S)\le c(x^*)$ for an optimum LP solution $x^*$. Our recursive dynamic programming algorithm will not need the degree constraints and work with the following relaxation: \begin{equation} \label{eq:subtour_lp} \begin{aligned} & \min c(x) \hspace{-2mm} \\ &s.t. & x(\delta(U)) &\geq 2 & & \text{for } \emptyset \subset U \subseteq V\setminus\{s,t\},\\ & & x(\delta(U)) &\geq 1 & & \text{for } \{s\} \subseteq U \subseteq V\setminus\{t\}, \\ & & x(e) &\geq 0 & & \text{for } e\in E. \end{aligned}\hspace{-4mm} \end{equation} Although we do not need this fact, we remark that both LPs have the same value.\footnote{This can be shown with Lovász’ \cite{Lov76} splitting lemma, as was observed (in a similar context) by Cunningham \cite{MonMP90}, Goemans and Bertsimas \cite{GoeB93}.} Let $x$ be a feasible solution to the LP \eqref{eq:subtour_lp}. Call a cut $\delta(U)$ (for $\emptyset\not=U\subset V$) \emph{narrow} if $x(\delta(U))<2$. For the special case $s=t$ there are no narrow cuts, and thus the vector $\frac{1}{2}x$ is in the $T$-join polyhedron \cite{EdmJ73} \begin{equation}\label{eq:Tjoinpolyhedron} \bigl\{y\in\mathbb{R}^E_{\ge 0} : y(\delta(U))\ge 1 \text{ for $ U\subset V \text{ with } |U\cap T|$ odd} \bigr\}. \end{equation} \renewcommand{\arraystretch}{1.2} \begin{table} \begin{center} \begin{tabular}{|l|l|} \hline \textbf{reference} & \textbf{ratio} \\ \hline Hoogeveen \cite{Hoo91} & 1.667\\ \hline An, Kleinberg, and Shmoys \cite{AnKS15} & 1.618\\ \hline Seb\H{o} \cite{Seb13} & 1.6\\ \hline Vygen \cite{Vyg16} & 1.599\\ \hline Gottschalk and Vygen \cite{GotV16} & 1.566\\ \hline Seb\H{o} and van Zuylen \cite{SebvZ16} & 1.529\\ \hline \end{tabular} \caption{Previous approximation guarantees (rounded).\label{table:apxratios}} \end{center} \end{table} Hence $c(J) = \min\{c(y): y\ge 0,\, y(\delta(U))\ge 1 \text{ for $ U\subset V \text{ with } |U\cap T|$ odd} \} \le \frac{1}{2} c(x^*)$. This shows an upper bound of $\frac{3}{2}$ on the integrality ratio and on the approximation ratio of Christofides' algorithm \cite{Chr76}. This is Wolsey's analysis \cite{Wol80}. From now on we will assume $s\ne t$. Then Wolsey's argument fails because of the narrow cuts. An, Kleinberg, and Shmoys \cite{AnKS15} observed that the narrow cuts form a chain (they considered \eqref{eq:subtour_lp_with_degree}, but the degree constraints are not needed): \begin{proposition}\label{prop:narrow_cuts} Let $x\in\mathbb{R}_{\ge 0}^E$ be a feasible solution to the linear program \eqref{eq:subtour_lp}. Then there are $m\ge 0$ sets $X_1,\ldots,X_m$ with $\{s\}\subseteq X_1\subset X_2\subset \cdots \subset X_m \subseteq V\setminus\{t\}$ such that $$\{\delta(X_i) : i\in[m]\} = \{ \delta(U) : \emptyset\not=U\subset V,\, x(\delta(U))<2 \}.$$ Moreover, all of these sets can be computed by $n^2$ minimum cut computations in the graph $(V,E)$ and thus in polynomial time. \end{proposition} \noindent \hbox{\textbf{Proof:}}\quad Let $X,Y \subseteq V$ such that $x(\delta(X)) < 2$, $x(\delta(Y)) < 2$ and $s\in X\cap Y$. By the LP constraints we have $t\not \in X$ and $t\not \in Y$. Suppose neither $X\subseteq Y$ nor $Y\subseteq X$. Then, $X\setminus Y$ and $Y\setminus X$ are both nonempty and contain none of the vertices $s$ and $t$. Thus, \begin{align*} 4&> x(\delta(X)) + x(\delta(Y)) \ge x(\delta(X\setminus Y)) + x(\delta(Y\setminus X)) \ge 4, \end{align*} a contradiction. To prove that the narrow cuts can be computed efficiently, we observe that for each narrow cut $C\in \mathcal{N}$ a pair $\{v,w\}$ of vertices exists such that $C$ is the only narrow cut separating $v$ and $w$. Thus, by computing a minimum capacity $v$-$w$-cut (with respect to capacities $x$) for all pairs $\{v,w\}$ of vertices we will find all narrow cuts. \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em Narrow cuts were the focus of \cite{AnKS15} and all subsequent approximation algorithms (cf.\ Table \ref{table:apxratios}). They all also proved upper bounds on the integrality ratio. Our recursive dynamic programming approach (Section~\ref{sec:32}) is completely different. It yields the approximation ratio $\frac{3}{2}+\epsilon$ for any $\epsilon>0$, but it does not yield an upper bound on the integrality ratio. \section{Approximation ratio \boldmath $\frac{3}{2} + \epsilon$ by recursive dynamic programming \label{sec:32}} In this section, we present a polynomial-time algorithm with approximation ratio arbitrarily close to $\frac{3}{2}$. We start with a high-level overview, sketching the key idea. \subsection{Outline of our algorithm} We will compute a spanning tree $(V,S)$ and a parity correction vector in the $T$-join polyhedron \eqref{eq:Tjoinpolyhedron} for $T:=\{v\in V:|S\cap \delta(v)| \text{ odd}\}\triangle\{s\}\triangle\{t\}$. The parity correction vector will be a nonnegative combination of LP solutions. If $x^*_1$ is an optimum solution to the LP \eqref{eq:subtour_lp}, $\frac{1}{2}x^*_1$ would be good, but it is insufficient for narrow cuts $C$ with $|C\cap S|$ even. Note that $s$-$t$-cuts $C=\delta(U)$ with $|C\cap S|$ odd are irrelevant because for these sets $|\{v\in U:|S\cap \delta(v)| \text{ odd}\}|$ is odd and thus $|U\cap T|= |\{v\in U:|S\cap \delta(v)| \text{ odd}\}\triangle( U \cap \{s,t\})|$ is even. Let $\mathcal{N}_1$ be the set of narrow cuts of the LP solution $x^*_1$ and let $H$ be a fixed optimum $s$-$t$-tour. As all narrow cuts are $s$-$t$-cuts, we have for each narrow cut $C$ that $|C\cap H|$ is odd. Suppose we know the partition $\mathcal{N}_1=\mathcal{L}\stackrel{.}{\cup}\mathcal{B}$ of the narrow cuts into \emph{lonely} cuts (cuts $C\in\mathcal{N}_1$ with $|C\cap H|=1$) and \emph{busy} cuts (cuts $C\in\mathcal{N}_1$ with $|C\cap H|\ge 3$). Then we can compute a cheapest spanning tree $(V,S)$ with $|S\cap C|=1$ for all lonely cuts $C\in\mathcal{L}$. However, $\frac{1}{2}x^*_1$ is still insufficient for busy cuts. \renewcommand{\arraystretch}{1.3} \begin{table}\label{table:fractions} \begin{center} \begin{tabular}{|c|c|c|c|c|c|} \hline level & fraction of $x^*_l$ & \multicolumn{4}{c|}{lower bound on LP value} \\ $l$ & in parity & \multicolumn{4}{c|}{$x^*_l(C)$ of busy cuts $C$ for} \\ & correction vector & $C\in\mathcal{N}_1$ & $C\in\mathcal{N}_2$ & $C\in\mathcal{N}_3$ & $C\in\mathcal{N}_4$ \\ \hline 1 & $\frac{8}{29}$ & 1 & 2 & 2 & 2 \\ 2 & $\frac{4}{29}$ & 3 & 1 & 2 & 2 \\ 3 & $\frac{2}{29}$ & 3 & 3 & 1 & 2 \\ 4 & $\frac{1}{29}$ & 3 & 3 & 3 & 1 \\ \hline \end{tabular} \caption{Let $x^*_l$ be the LP solution on level $l$, and $\mathcal{N}_l$ its narrow cuts. If we enforce $x(C)\ge 3$ for all busy cuts $C\in\mathcal{N}_i$ on all levels $l>i$, a nonnegative combination of the LP solutions $x^*_l$ with the coefficients in the second column is a cheap parity correction vector for any tree $(V,S)$ with $|S\cap C|=1$ for every lonely cut $C$.} \end{center} \end{table} Knowing the busy cuts, we can add the constraint $x(C)\ge 3$ for all $C\in\mathcal{B}$ to the LP and obtain a second solution $x^*_2$. Since $x^*_2(C)$ is big where $x^*_1(C)$ was insufficient, we can combine the two vectors; for example, $\frac{2}{3}x^*_1+\frac{1}{3}x^*_2$ is an LP solution with value at least $\frac{5}{3}$ at every cut $C\notin\mathcal{L}$ (while $x^*_1$ could only guarantee $\ge 1$). The second LP solution $x^*_2$ has new narrow cuts, which again can be lonely or busy. Adding additional constraints $x(C)\ge 3$ for the new busy cuts, we get a third LP solution $x^*_3$, and so on. Table \ref{table:fractions} shows how these LP solutions can be combined to a cheap parity correction vector. \begin{figure*} \begin{center} \begin{tikzpicture}[xscale=1.6, yscale=1.2] \foreach \x in { 3, 6, 9} { \draw [dashed, thick, Gray] (\x +0.5,0.6) --(\x + 0.5,4); } \foreach \x in {4, 5} { \draw [dashed, thick, Red] (\x +0.5,0.6) --(\x + 0.5,4); } \foreach \x in {2, 7, 8, 10} { \draw [dashed, thick, darkgreen] (\x +0.5,0.6) --(\x + 0.5,4); } \foreach \x in { 2, 7, 8, 10} { \draw [black] (\x +0.55,0.2) --(\x + 0.55,0.4); \draw [black] (\x +0.45,0.2) --(\x + 0.45,0.4); } \draw [black] (1.55,0.2) --(1.55,0.4); \draw [black] (11.45,0.2) --(11.45,0.4); \foreach \x/\y in { 1/2, 2/7, 7/8, 8/10, 10/11} { \draw[black] (\x + 0.55,0.3) --(\y + 0.45,0.3); } \begin{scope}[shift = {(0,0.5)}] \foreach \x\y [count=\i] in {4/2, 2/3, 3/1, 4/3, 6/1, 6/3, 7/2, 8/1, 9/3, 10/1, 11/3, 5/1.5, 10/2} { \node[circle, fill=none, draw=black, thick, inner sep = 1.2, outer sep = 1.5] (v\i) at (\x,\y) {}; } \foreach \i in {2,4,5,8,9,10,11} { \node[circle, fill=black, draw=black, inner sep = 1, outer sep = 1] (v) at (v\i) {}; } \draw[very thick, gray] (v4) -- (v6) -- (v1) -- (v3) -- (v12) -- (v7) -- (v5); \draw[very thick, gray] (v10) -- (v13) -- (v9); \begin{scope}[darkgreen, very thick] \draw (v2) -- (v4); \draw (v5) -- (v8) -- (v10); \draw (v9) -- (v11); \end{scope} \end{scope} \node[left=2pt] at (v2) {$s$}; \node[right =2pt] at (v11) {$t$}; \end{tikzpicture} \caption{The dashed vertical lines show the narrow cuts. The solid lines show an optimum $s$-$t$-tour. The green edges and the green cuts are lonely. The intervals at the bottom indicate the sub-instances of the next recursion level, where the filled vertices serve as $s'$ and/or $t'$. All other narrow cuts are busy, but only the red busy cuts will be passed to the next level because they have $s'$ on the left and $t'$ on the right. The gray busy cuts will automatically have value at least 3 as the proof will reveal. \label{fig:outline}} \end{center} \end{figure*} If we knew not only the lonely cuts but also the \emph{lonely edges}, i.e. the edge $e\in C\cap H$ for every $C\in\mathcal{L}$, then we could partition the original instance at the lonely cuts, solve separate LPs for the sub-instances, and combine the solutions. See Figure \ref{fig:outline}. Of course, the main difficulty is that we do not know which cuts are lonely and which are busy, and we do not know the lonely edges. However, for each possibility of two subsequent lonely cuts $\delta(U_1)$ and $\delta(U_2)$ with $\{s\}\subseteq U_1\subset U_2 \subseteq V\setminus\{t\}$ and lonely edges $\{v_1,w_1\}$ and $\{v_2,w_2\}$ with $v_1\in U_1$, $w_1,v_2\in U_2\setminus U_1$ and $w_2\in V\setminus U_2$, we can consider the instance with vertex set $U_2\setminus U_1$ and $s'=w_1$ and $t'=v_2$. See Figure \ref{fig:edge_cost}. There are $O(n^4)$ such instances (due to Proposition \ref{prop:narrow_cuts}). For each such instance we compute a spanning tree and an LP solution (recursively), and we combine these by dynamic programming. The output of the dynamic program is a spanning tree $(V,S)$ and an LP solution $y$. We set $T:= \{ v\in V \mid |\delta(v)\cap S| \text{ odd}\} \triangle \{s\} \triangle\{t\}$, compute a cheapest $T$-join $J$, find an Eulerian trail from $s$ to $t$ in $(V, S \stackrel{.}{\cup} J)$, and shortcut. To bound the cost of $J$ we will show that $(\frac{1}{2}+O(2^{-k}))y$ is a parity correction vector, where $k$ denotes the number of levels in our recursive dynamic program. Before we get into the details, let us mention one more subtle point. The busy cuts of previous levels can intersect several sub-instances. For a sub-instance on $U_2\setminus U_1$ with $s'=w_1$ and $t'=v_2$, we will only pass a busy cut $C=\delta(U)$ to this sub-instance if $U_1\cup\{s'\}\subseteq U \subseteq U_2\setminus\{t'\}$. For the other busy cuts $C$ (gray in Figure \ref{fig:outline}), the inequality $x(C)\ge 3$ will follow automatically from combining the LP solutions returned by the sub-instances. \begin{figure} \begin{center} \resizebox{0.3\textwidth}{3.5cm}{ \begin{tikzpicture}[xscale= 1.6, yscale=1] \foreach \x in {2.3, 4.2} { \draw[thick, dashed, gray] (\x,1) -- (\x,3) ; } \foreach \x/\n [count=\i from 1] in {2.0/{$v_1$}, 2.6/{$w_1$}, 3.9/{$v_2$}, 4.5/{$w_2$}} { \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v\i) at (\x,2) {}; \node [below = 3pt] (w) at (v\i) {\small \n}; } \draw[darkgreen, very thick] (v1) -- (v2); \draw[darkgreen, very thick] (v3) -- (v4); \draw[thick, decoration={brace,mirror,raise=1pt, amplitude=6pt},decorate] (1.5,1) -- node[below=8pt] {$U_1$} (2.3,1); \draw[thick, decoration={brace,mirror,raise=1pt, amplitude=6pt},decorate] (1.5,0.3) -- node[below=8pt] {$U_2$} (4.2,0.3); \end{tikzpicture} } \caption{A possible sub-instance with vertex set $U_2\setminus U_1$, $s'=w_1$, and $t'=v_2$. This sub-instance will be represented by the arc $\left((U_1,v_1,w_1), (U_2, v_2, w_2)\right)$ in the digraph $D$. Note that the vertices $w_1$ and $v_2$ might be identical. \label{fig:edge_cost}} \end{center} \end{figure} \subsection{The recursive dynamic program}\label{section:dynamic_program} \noindent In this section we describe the dynamic programming algorithm in detail. We call the algorithm recursively with a fixed recursion depth $k$. Moreover, we have fixed coefficients $\lambda_1 > \lambda_2 > \dots > \lambda_k > 0$. We explain the choice of these constants depending on $\epsilon$ in Section~\ref{section:analysis_dp}. The input to the dynamic program (see Figure \ref{fig:input_dp}) consists of \begin{itemize} \item sets $W_s,W_t \subseteq V$ with $W_s \cap W_t = \emptyset$; \item vertices $s',t'\in W:=V\setminus (W_s \cup W_t)$; note that $s'=t'$ is possible; \item a collection $\mathcal{B}$ of busy $(W_s \cup \{s'\})$-$(W_t\cup \{t'\})$-cuts; and \item a level $l\in[k]$. \end{itemize} The output of the dynamic program is \begin{itemize} \item a tree $(W,S)$; \item a vector $y\in \mathbb{R}^E_{\ge 0}$, which will contribute to the parity correction vector; and \item a chain $\mathcal{L}$ of $(W_s \cup \{s'\})$-$(W_t\cup \{t'\})$-cuts with $|S\cap C|=1$ for all $C\in \mathcal{L}$. \end{itemize} We remark that for computing an $s$-$t$-tour it is sufficient to return the tree $(W,S)$ and the cost of the vector $y$. The chain $\mathcal{L}$ and the explicit vector $y$ are added only for the purpose of analysis. \begin{figure} \begin{center} \resizebox{0.45\textwidth}{3.5cm}{ \begin{tikzpicture}[xscale=0.8, yscale=1.3] \node[circle, fill = black, inner sep = 1, outer sep = 1] (s') at (3,1) {}; \node[circle, fill = black, inner sep =1, outer sep = 1] (t') at (6,1) {}; \node [below] (v) at (s') {$s'$}; \node [below] (v) at (t') {$t'$}; \draw[thick, gray, dashed] (2,0) -- (2,2); \draw[thick, gray, dashed] (7,0) -- (7,2); \draw[thick,Red] (3,0) -- (5,2); \draw[thick,Red] (4,0) -- (3.5,2); \draw[thick,Red] (6,0) -- (4.5,2); \draw[thick,Red] (5,0) -- (5.5,2); \draw[thick, decoration={brace,mirror,raise=1pt, amplitude=6pt},decorate] (0,0) -- node[below=8pt] {$W_s$} (1.9,0); \draw[thick, decoration={brace,mirror,raise=1pt, amplitude=6pt},decorate] (2.1,0) -- node[below=8pt] {$W$} (6.9,0); \draw[thick, decoration={brace,mirror,raise=1pt, amplitude=6pt},decorate] (7.1,0) -- node[below=8pt] {$W_t$} (9,0); \end{tikzpicture} } \end{center} \caption{The input to the dynamic program. The dashed lines are the cuts $\delta(W_s)$, and $\delta(W_t)$. The red lines are possible busy cuts, i.e. elements of $\mathcal{B}$. \label{fig:input_dp}} \end{figure} The dynamic programming algorithm first computes an optimum solution $x^*$ to the following linear program. \begin{equation} \label{eq:dynamic_program_LP} \begin{aligned} & \min c(x) \hspace{-2mm} \\ & s.t. & x(\delta(U)) &\geq 2 & & \text{for }\emptyset \not =U\subseteq W\setminus\{s',t'\} \\ & & x(\delta(U)) &\geq 1 & & \text{for } \{s'\}\subseteq U \subseteq W\setminus\{t'\} \\ & & x(C) &\ge 3 \ \ & & \text{for } C\in \mathcal{B} \\ & & x(e) &\geq 0 & & \text{for } e\in E[W] \\ & & x(e) &= 0 & & \text{for } e\in E\setminus E[W]. \end{aligned}\hspace{-6mm} \end{equation} The vector $x^*$ restricted to edges $e\in E[W]$ is a feasible solution of linear program \eqref{eq:subtour_lp} for the instance of the metric $s$-$t$-path TSP with vertex set $W$ and $s=s'$ and $t=t'$. By Proposition \ref{prop:narrow_cuts} the set of \emph{narrow cuts} \begin{align*} \mathcal{N}:= \big\{ \delta(U) \mid\ & x^*(\delta(U))< 2, W_s \cup \{s'\} \subseteq U \subseteq V\setminus \left(W_t \cup \{t'\}\right)\big\}, \end{align*} forms a chain, i.e. there exist sets \[ W_s \cup \{ s'\} \subseteq X_1 \subset X_2 \subset \dots \subset X_m \subseteq V \setminus \left(W_t \cup \{t'\}\right)\] such that $\mathcal{N} = \{ \delta (X_i) \mid i \in [m]\}$. If we have $l=k$, i.e. we are on the final level $k$, we return the vector $y:= x^*$ and a minimum cost tree $(W,S)$. Moreover, we return $\mathcal{L} = \emptyset$. Otherwise, i.e. if $l<k$, we construct a directed auxiliary graph $D$ with vertices \begin{align*} V(D) := \big\{& (U,v,w) \mid \delta(U) \in \mathcal{N}, s'\in U, v\in U\cap W, w\in W\setminus U \big\} \stackrel{.}{\cup} \big\{ (W_s, \emptyset, s'), (V\setminus W_t, t', \emptyset) \big\} \\ \intertext{and arcs } E(D) := &\bigl\{\left((U_1,v_1,w_1), (U_2, v_2, w_2)\right) \mid U_1 \subset U_2, w_1,v_2\in U_2 \setminus U_1 \bigr\}. \end{align*} Figure \ref{fig:edge_cost} illustrates the sets and vertices defining an arc $a\in E(D)$. \begin{figure*} \begin{center} \begin{tikzpicture}[xscale= 1.8, yscale=1.1] \foreach \x/\i in {1.5/0, 2.8/1, 4.2/2, 5.95/{m-1}, 7.2/{m}, 8.75/{m+1}} { \draw[thick, dashed, gray] (\x,0) -- (\x,3) ; \node[left] (v\i) at (\x,2.5) {\small $V_{\i}$}; } \node[circle, fill = black, inner sep = 1, outer sep = 1] (s') at (1.9,1) {}; \node[circle, fill = black, inner sep =1, outer sep = 1] (t') at (8.3,1) {}; \node [below] (v) at (s') {\small$s'\!=\!v_0$}; \node [below] (v) at (t') {\small$t'\!=\!v_{m+1}$}; \node () at (5,1) {$\dots$}; \draw[very thick, darkgreen] (2.5,1)-- (3.1,1); \draw[very thick, darkgreen] (3.9,1)-- (4.5,1); \draw[very thick, darkgreen] (5.6,1)-- (6.3,1); \draw[very thick, darkgreen] (6.9,1)-- (7.5,1); \node[darkgreen, left] (v) at (2.8,1.3){$f_1$}; \node[darkgreen, left] (v) at (4.2,1.3){$f_2$}; \node[darkgreen, left] (v) at (6.0,1.3){$f_{m\!-\!1}$}; \node[darkgreen, left] (v) at (7.2,1.3){$f_m$}; \foreach \x/\n in {2.5/{$v_1$}, 3.1/{$w_1$}, 3.9/{$v_2$}, 4.5/{$w_2$}, 5.6/{$v_{m\!-\!1}$}, 6.3/{$w_{m\!-\!1}$}, 6.9/{$v_m$}, 7.5/{$w_m$}} { \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v) at (\x,1) {}; \node [below = 3pt] (w) at (v) {\small \n}; } \draw[thick, decoration={brace,mirror,raise=1pt, amplitude=6pt},decorate] (0.65,0) -- node[below=8pt] {$W_s$} (1.45,0); \draw[thick, decoration={brace,mirror,raise=1pt, amplitude=6pt},decorate] (1.55,0) -- node[below=8pt] {$W$} (8.7,0); \draw[thick, decoration={brace,mirror,raise=1pt, amplitude=6pt},decorate] (8.8,0) -- node[below=8pt] {$W_t$} (9.6,0); \end{tikzpicture} \caption{The dashed lines show the cuts $\delta(V_j)$ for $j=0,1,\dots,m+1$, where the sets $V_j$ are the sets left of the dashed lines. The partition of the vertex set into $W_s$, $W_t$ and $W$ is shown at the bottom of the picture. The edges $f_j$ are drawn in green. We remark that the vertices $w_j$ and $v_{j+1}$ might be identical for $j=0, 1, \dots , m$. \label{fig:definition_V_j_f_j}} \end{center} \end{figure*} The next step of the algorithm is to compute weights for the arcs of the digraph $D$. For an arc \[a=\left((U_1,v_1,w_1), (U_2, v_2,w_2)\right) \in E(D)\] we define \[ \mathcal{B}^{a} := \left\{\phantom{\bigm.}\delta(U)\in \mathcal{N} \cup \mathcal{B} \mid U_1\cup\{w_1\} \subseteq U \subseteq U_2\setminus\{v_2\} \phantom{\bigm.}\right\}.\] We call the dynamic program with \begin{itemize} \item $W_s = U_1$ and $W_t= V\setminus U_2$, \item $s' =w_1$ and $t' =v_2$, \item $\mathcal{B}$ = $\mathcal{B}^{a}$, and \item the level $l+1$. \end{itemize} Let the output of this application of the dynamic program be the tree $(U_2\setminus U_1, S^a)$, the vector $y^a \in \mathbb{R}_{\ge 0}^E$, and the chain $\mathcal{L}^a $ of cuts $C$. Then we define the cost of the arc $a\in E(D)$ to be \begin{equation} \label{eq:def_edge_cost} d(a):= \begin{cases} c\left(S^a\right) + \lambda_{l+1} \cdot c\left(y^a\right) +\left(1+\lambda_{l+1} \right)\cdot c(v_2,w_2),& \text{if }w_2 \not = \emptyset\\[2mm] c\left(S^a\right) + \lambda_{l+1} \cdot c\left(y^a\right),& \text{if } w_2 = \emptyset. \end{cases} \end{equation} Now we compute a shortest $(W_s,\emptyset,s')$-$(V\setminus W_t,t',\emptyset)$-path $P$ in the auxiliary digraph $D$ with respect to the arc costs $d$. We then define \begin{align*} S:= &\left\{ e\in S^a \mid a\in E(P) \right\} \cup \left\{ \{v,w\} \mid (U,v,w)\in V(P), v\not = \emptyset, w\not=\emptyset \right\}. \end{align*} Let $(W_s, \emptyset,s')=(V_0, v_0,w_0)$, $(V_1, v_1,w_1)$, $(V_2,v_2,w_2)$, $\dots$, $(V_m, v_m,w_m)$, $(V_{m+1}, v_{m+1},w_{m+1}) = (V\setminus W_t,t',\emptyset)$ be the vertices of the path $P$ visited in exactly this order. We define $a_j\in E(P)$ to be \[ a_j:=((V_j,v_j,w_j), (V_{j+1}, v_{j+1},w_{j+1}))\ (j=0,\ldots,m).\] Moreover, for every $j\in[m]$ let $f_j:=\{v_j,w_j\}$ (see Figure~\ref{fig:definition_V_j_f_j}). We then set the vector $y'$ to be \begin{equation*} y':= \sum_{a\in E(P)} y^a + \sum_{j = 1}^m \chi^{f_j}, \end{equation*} where $\chi^{f_j}$ is the incidence vector of $f_j$ (i.e., $\chi^{f_j}_{f_j}=1$ and $\chi^{f_j}_e = 0$ for $e\in E\setminus\{f_j\}$). Define $y$ to be the following convex combination of $x^*$ and $y'$: \begin{equation*} y:= \frac{\lambda_l - \lambda_{l+1}}{\lambda_l} \cdot x^* + \frac{\lambda_{l+1}}{\lambda_l} \cdot y'. \end{equation*} We set \begin{align*} \mathcal{L} :=\{ C \mid C \in \mathcal{L}^a \text{ for some }a\in E(P) \} \cup \{\delta(V_j) \mid j\in[m]\} \end{align*} and return the edge set $S$, the vector $y$ and the set $\mathcal{L} $. \subsection{Properties of the dynamic program}\label{section:analysis_dp} In this section we show several important properties of the output of the dynamic program. We show all these properties by induction on $k-l$, i.e. to prove them we assume that they hold for all levels $l'$ with $l<l'\le k$. \begin{lemma}\label{lemma:Lscr_chain} $\mathcal{L}$ is a chain of $(W_s \cup \{s'\})$-$(W_t \cup \{t'\})$-cuts. \end{lemma} \noindent \hbox{\textbf{Proof:}}\quad If $l=k$, we have $\mathcal{L} = \emptyset$. So we may assume $l<k$. If a cut $C$ belongs to $\mathcal{L}$, it is a cut $\delta(V_j)$ for some $j\in[m]$ or is contained in $\mathcal{L}^a$ for some $a\in E(P)$. Recall that \[ W_s = V_0 \subset V_1 \subset V_2 \subset \dots \subset V_m \subset V_{m+1} = V \setminus W_t. \] Moreover, all cuts $\delta(V_j)$ for $j\in [m]$ are narrow cuts, i.e. $\delta(V_j) \in \mathcal{N}$, which implies \[W_s \cup \{s' \} \subseteq V_j \subseteq V\setminus \left(W_t \cup \{t'\}\right).\] Now consider the cuts $\mathcal{L}^{a_j}$ for $j\in\{0,1,\dots,m\}$. By induction on $k-l$, the cuts in $\mathcal{L}^{a_j}$ are a chain of cuts of the form $\delta(U)$ for a set $U$ with $V_j \cup \{s'\} \subset U \subset V_{j+1} \setminus \{t'\}$. Thus, $\{\delta(V_j) \mid j\in[m] \} \subseteq \mathcal{N}$ remains a chain when adding the sets $\mathcal{L}^a$ for all $a\in E(P)$. \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em \begin{lemma}\label{lemma:f_j_not_in_Lscr_a} For $l<k$, an edge $f_j$ with $j\in [m]$ is not contained in any cut $C\in \mathcal{L}^a$ for $a\in E(P)$. \end{lemma} \noindent \hbox{\textbf{Proof:}}\quad Assume an edge $f_j$ for $j\in[m]$ is contained in a cut $C\in\mathcal{L}^a$ for some $a\in E(P)$. As the edge $f_j$ is contained in neither $\delta(V_{j-1})$ nor $\delta(V_{j+1})$, one endpoint is in $V_j \setminus V_{j-1}$ and the other endpoint is in $V_{j+1} \setminus V_j$. Using Lemma \ref{lemma:Lscr_chain}, this implies $a=a_{j-1}$ or $a=a_j$. If $a=a_{j-1}$, the endpoint $v_j$ of $f_j$ is contained in $V_j$ and plays the role of $t'$ in the dynamic program computing the tree $S^a$. This implies by Lemma \ref{lemma:Lscr_chain} that for a cut $C\in \mathcal{L}^a$ we have $C=\delta(U)$ for some $U$ with $V_{j-1} \subseteq U \subseteq V_j \setminus \{v_j\}$, and hence $f_j \not \in C=\delta(U)$. For the case $a=a_j$ a symmetric argument shows $f_j \not \in C$ for $C\in \mathcal{L}^{a_j}$. \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em \begin{lemma}\label{lemma:T_cuts} The graph $(W,S)$ is a tree. For every cut $C\in \mathcal{L}$ we have $|S\cap C| = 1$. \end{lemma} \noindent \hbox{\textbf{Proof:}}\quad For level $l=k$ the chain $\mathcal{L}$ is empty, and hence the statement is trivial. So assume $l < k$. By the construction of the digraph $D$ we have $W_s = V_0 \subset V_1 \subset V_2 \subset \dots \subset V_m \subset V_{m+1} = V \setminus W_t$. We have $f_j \in \delta(V_j)$ and $f_j \not\in \delta(V_h)$ for $h\not = j$. By induction, $(V_{j+1} \setminus V_j, S^{a_j})$ is a tree for every $j \in \{0,1,\dots,m\}$. The edges $f_j$ (for $j\in [m]$) connect these trees to a tree spanning $W$. We observe that $S\cap \delta(V_j) = \{ f_j \}$ for every $V_j $ with $j\in [m]$. By induction we have $|S^a \cap C|=1$ for all $a\in E(P)$ and $C\in \mathcal{L}^a$. Moreover, note that edges of $S^a$ are not contained in any cut $C\in \mathcal{L} \setminus \mathcal{L}^a$. As observed above, the tree $(W,S)$ is constructed such that $S\cap \delta(V_j) = \{ f_j \}$ for every $j\in [m]$. Thus, it only remains to show that an edge $f_j$ for $j\in[m]$ can not be contained in a cut $C\in\mathcal{L}^a$ for any $a\in E(P)$ which is precisely the statement of Lemma \ref{lemma:f_j_not_in_Lscr_a}. \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em \begin{lemma}\label{lemma:path_length_equals_cost} For levels $l<k$ the cost $d(P)$ of the path $P$ equals the cost $c(S) + \lambda_{l+1} \cdot c(y')$ of the tree $S$ and the vector $\lambda_{l+1} \cdot y'$. \end{lemma} \noindent \hbox{\textbf{Proof:}}\quad We have \begin{align*} c(S) &= \sum_{a\in E(P)} c(S^a) + \sum_{j=1}^m c(f_j), \intertext{and} \lambda_{l+1} \cdot c(y') &= \lambda_{l+1} \cdot\sum_{a\in E(P)} c\left(y^a\right) + \lambda_{l+1} \cdot \sum_{j=1}^m c(f_j). \end{align*} Together with the definition \eqref{eq:def_edge_cost} of the arc cost in $D$ this shows $d(P) = c(S) + \lambda_{l+1} \cdot c(y')$. \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em We fix an optimum $s$-$t$-tour $H$. We say an input $W_s, W_t, s', t', \mathcal{B}$ to the dynamic program is \emph{consistent} with the tour $H$ if $H$ (traversed from $s$ to $t$) visits $s'$ before $t'$ and the $s'$-$t'$-path in $H$ contains exactly the vertices in $V\setminus(W_s\cup W_t)$ and $|H\cap C| \not = 1$ for every cut $C\in \mathcal{B}$. We say that a path $\bar P$ in the auxiliary digraph $D$ is \emph{consistent} with the tour $H$ if \begin{itemize} \item $\delta(U) \cap H = \{\{v,w\}\}$ for every $(U,v,w)\in V_{\text{in}}(\bar P)$, and \item for every cut $C\in \mathcal{N} \setminus \{\delta(U) \mid (U,v,w) \in V_{\text{in}}(\bar P)\}$ we have $|H\cap C| \not = 1$, \end{itemize} where $V_{\text{in}}(\bar P)$ denotes the set of inner vertices of the path $\bar P$. Note that for parity reasons $|H\cap C| \not = 1$ implies $|H\cap C| \ge 3$ for every $s$-$t$-cut $C$. We denote by $H_{[s',t']}$ the edge set of the unique path from $s'$ to $t'$ that is contained in the path $(V,H)$. \bigskip \begin{lemma}\label{lemma:bound_on_cost} If the input to the dynamic program is consistent with the tour $H$, we have \[ c(S) + \lambda_l \cdot c(y) \le (1+\lambda_l) \cdot c\left(H_{[s',t']}\right). \] \end{lemma} \noindent \hbox{\textbf{Proof:}}\quad If the input of the dynamic program is consistent with the tour $H$, the incidence vector of $H_{[s',t']}$ is a feasible solution to the linear program \eqref{eq:dynamic_program_LP} and thus \begin{equation}\label{eq:x*_bounded_by_opt} c(x^*) \le c\left(H_{[s',t']} \right). \end{equation} For $l=k$ we therefore have $c(y) =c(x^*) \le c(H_{[s',t']})$; moreover $(W,H_{[s',t']})$ is a tree and therefore we have $c(S)\le c(H_{[s',t']})$. Now assume $l<k$. Let $\bar P$ be the unique $(W_s,\emptyset,s')$-$(V\setminus W_t,t',\emptyset)$-path in $D$ whose set of inner vertices is exactly the set of vertices $(U,v,w)\in V(D)$ with $\{\{v,w\}\}= H\cap \delta(U)$. Then $\bar P$ is consistent with the tour $H$. For $a=((U_1,v_1,w_1),(U_2,v_2,w_2))\in E(\bar P)$ let $s^a:=w_1$ and $t^a:=v_2$. The tour $H$ is the disjoint union of the $H_{[s^a, t^a]}$ for $a\in E(\bar P)$ and the edges $\{v,w\}$ for $(U,v,w)\in V_{\text{in}}(\bar P)$. By induction on $k-l$, we have \begin{equation*} c\left(S^{a}\right) + \lambda_{l+1} \cdot c\left(y^{a}\right) \le \left(1+\lambda_{l+1}\right) \cdot c\left(H_{[s^a, w^a]} \right). \end{equation*} Hence, \begin{equation*} \begin{aligned} d(\bar P) =\ &\sum_{a\in E(\bar P)} c\left(S^{a}\right) + \lambda_{l+1} \sum_{a\in E(\bar P)} c\left(y^{a}\right) + (1+ \lambda_{l+1}) \sum_{(U,v,w)\in V_{\text{in}}(\bar P)} c(v,w) \\[2mm] \le\ &\sum_{a\in E(\bar P)} \left(1+\lambda_{l+1}\right) \cdot c\left(H_{[s^a, t^a]} \right) + \sum_{(U,v,w)\in V_{\text{in}}(\bar P)} \left(1 + \lambda_{l+1}\right) \cdot c(v,w) \\[2mm] =\ &\left(1 + \lambda_{l+1}\right) \cdot c\left(H_{[s',t']}\right). \end{aligned} \end{equation*} Using Lemma \ref{lemma:path_length_equals_cost} and the fact that $P$ is no longer than $\bar P$ we get \begin{align*} c(S)+\lambda_{l+1} \cdot c(y') &= d(P) \le d(\bar P) \le \left(1 + \lambda_{l+1}\right) \cdot c\left(H_{[s',t']}\right). \end{align*} Using also \eqref{eq:x*_bounded_by_opt} and \[ \lambda_l \cdot y = \lambda_{l+1} \cdot y' + \left(\lambda_l - \lambda_{l+1}\right) \cdot x^* \] we get \begin{align*} c(S) + \lambda_l \cdot c(y) =\ & c(S) + \lambda_{l+1} \cdot c(y') + \left(\lambda_l - \lambda_{l+1}\right) \cdot c(x^*) \\[2mm] \le\ & \left(1 + \lambda_{l+1}\right) \cdot c\left(H_{[s',t']}\right) + \left(\lambda_l - \lambda_{l+1}\right) \cdot c\left(H_{[s',t']} \right) \\[2mm] =\ & (1+\lambda_l) \cdot c\left(H_{[s',t']}\right).\\[-10mm] \end{align*} \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em \begin{lemma}\label{lemma:y_1_for_V_j_cuts} If $l<k$, the support of the vector $y'$ is a subset of $E[W]$ and we have $y'(\delta(V_j)) =1$ for every cut $\delta(V_j)$ with $j\in [m]$. \end{lemma} \noindent \hbox{\textbf{Proof:}}\quad The vector $y'$ is defined as the sum of vectors with support contained in $E[W]$. Thus, also the support of $y'$ is a subset of $E[W]$. Next, we prove $y'(\delta(V_j)) = 1$ for every cut $\delta(V_j)$ with $j\in [m]$. We have $E(P) =\{a_j \mid j\in \{0,1,\dots,m\}\}$ and for every edge $a_j$ the support of $y^{a_j}$ is contained in $E[V_{j+1}\setminus V_j]$. Thus, for every pair of indices $j,r \in \{0,1,\dots,m\}$ we have $y^{a_j}(\delta(V_r)) = 0$. As an edge $f_r$ is contained in $\delta(V_r)$, but not in any other cut $\delta(V_j)$ with $j\not = r$, we have $y'(\delta(V_j)) = y'(f_j) = 1$. \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em \begin{lemma}\label{lemma:y_lp_solution} The vector $y'$ (for $l<k$) and the vector $y$ are feasible solutions to the following linear program: \begin{equation}\label{eq:lp_from_lemma_dp} \begin{aligned} & \min c(x) \hspace{-2mm} \\ & s.t. & x(\delta(U)) &\geq 2 & & \text{for }\emptyset \not =U\subseteq W\setminus\{s',t'\} \\ & & x(\delta(U)) &\geq 1 & & \text{for } \{s'\}\subseteq U \subseteq W\setminus\{t'\} \\ & & x(e) &\geq 0 & & \text{for } e\in E[W] \\ & & x(e) &= 0 & & \text{for } e\in E\setminus E[W]. \end{aligned}\hspace{-4mm} \end{equation} \end{lemma} \noindent \hbox{\textbf{Proof:}}\quad The vector $x^*$ is a feasible solution to the linear program \eqref{eq:dynamic_program_LP}, and hence, also a solution to \eqref{eq:lp_from_lemma_dp}. If $l=k$, we have $y=x^*$, completing the proof for this case. We now assume $l<k$ and show, that also $y'$ is a solution to \eqref{eq:lp_from_lemma_dp}. As $y$ is a convex combination of $x^*$ and $y'$, this implies the statement of the Lemma. The vector $y'$ is defined as the sum of nonnegative vectors with support contained in $E[W]$, so $y'\ge 0$ and $y'(e)=0$ for $e\in E\setminus E[W]$. It remains to check the cut constraints. \begin{figure} \begin{center} \begin{tikzpicture}[yscale=0.7, xscale=0.65] \begin{scope} \clip (1.5,0) rectangle (4,4); \fill[SkyBlue, opacity=0.4] (6.5,2) ellipse ({4.3} and {1.5}); \end{scope} \begin{scope} \clip (9,0) rectangle (11.5,4); \fill[SkyBlue, opacity=0.4] (6.5,2) ellipse ({4.3} and {1.5}); \end{scope} \foreach \x/\j in { 1.5/{j_{\min}}, 4/{j_{\min}+1}, 9/{j_{\max}}, 11.5/{j_{\max}+1} } { \draw[thick, dashed, gray] (\x,0) -- (\x,4) ; \node[below] at (\x, -0.1) {\scriptsize$\delta(V_{\j})$}; } \draw[Blue, thick] (6.5,2) ellipse ({4.3} and {1.5}); \node[Blue] at (5,2.7) {$U$}; \end{tikzpicture} \caption{The picture illustrates the definition of $j_{\min}$ and $j_{\max}$. The dashed lines show the cuts written below. The indices $j_{\min}$ and $j_{\max}$ are chosen such that the two light blue sets are both nonempty. \label{fig:definition_j_min_max}} \end{center} \end{figure} First consider $\delta(U)$ with $\{s'\}\subseteq U\subseteq W\setminus\{t'\}$. If there exists an index $j\in \{0,1,\dots,m\}$ such that $(V_{j+1}\setminus V_j) \cap U$ and $(V_{j+1}\setminus V_j) \setminus U$ are both not empty, we have $y'(\delta(U)) \ge y^{a_j}(\delta(U)) \ge 1$ by induction. Otherwise, there exists an index $j\in[m]$ such that $\delta(U)$ separates the sets $V_{j+1}\setminus V_j$ and $V_{j}\setminus V_{j-1}$. Then, the edge $f_j$ is contained in $\delta(U)$, implying $y'(\delta(U)) \ge \chi^{f_j}(C) \ge 1$. Now consider $\delta(U)$ with $\emptyset\not= U\subseteq W\setminus\{s',t'\}$. Let $j_{\min} \in \{0,1,\dots m\}$ be the minimal index such that $(V_{j_{\min}+1}\setminus V_{j_{\min}}) \cap U$ is nonempty and $j_{\max} \in \{0,1,\dots m\}$ the maximal index such that $(V_{j_{\max}+1}\setminus V_{j_{\max}}) \cap U$ is nonempty (see Figure \ref{fig:definition_j_min_max}). \begin{figure*} \begin{center} \begin{tikzpicture}[scale=0.9] \foreach \s/\c/\q in {10/9.7/11.5, 14.8/14.6/16.4, 6/4.4/6.1, 1/-0.8/1.0} { \begin{scope} \clip (\c,0) rectangle (\q,4); \fill[SkyBlue, opacity=0.4] (\s - 0.1,2) ellipse ({1.2} and {0.9}); \end{scope} } \foreach \s in {10,14.8,6,1} { \draw[Blue, thick] (\s - 0.1,2) ellipse ({1.2} and {0.9}); \node[Blue] at (1.1+\s,1.1) {\small$U$}; } \foreach \s/\l in {0/a,4.8/b,9.7/c,14.6/d} { \node[black] at (\s-1.5,3.2) {(\l)}; } \node[darkgreen] at (3.8,1.7) {\scriptsize$f_{j_{\min}}$}; \node[darkgreen] at (12.2,1.7) {\scriptsize$f_{j_{\max}+1}$}; \foreach \x/\j in {9.7/{j_{\max}}, 11.5/{j_{\max}+1}, 14.6/{j_{\max}}, 16.4/{j_{\max}+1}, 4.4/{j_{\min}}, 6.1/{j_{\min}+1}, -0.8/{j_{\min}}, 1.0/{j_{\min}+1}} { \draw[thick, dashed, gray] (\x,0.5) -- (\x,3.5) ; \node[below] at (\x, 0.4) {\scriptsize$\delta(V_{\j})$}; } \draw[very thick, darkgreen] (10.4,2.2)-- (11.9,2.2); \draw[very thick, darkgreen] (4.0,2.2)-- (5.5,2.2); \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v) at (10.4,2.2) {}; \node [below = 3pt] at (v) {\scriptsize $v_{j_{\max}+1}$}; \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v) at (15.7,2.8) {}; \node [above = 2pt] at (v) {\scriptsize $v_{j_{\max}+1}$}; \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v) at (5.5,2.2) {}; \node [below = 3pt] at (v) {\scriptsize $w_{j_{\min}}$}; \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v) at (-0.2,2.8) {}; \node [above = 2pt] at (v) {\scriptsize $w_{j_{\min}}$}; \foreach \x in {11.9,4.0} { \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v) at (\x,2.2) {}; } \end{tikzpicture} \caption{Different cases occurring in the proof of Lemma \ref{lemma:y_lp_solution}. The dashed vertical lines indicate the cuts written below. The set $U$ is shown in blue. The light blue set is nonempty. \label{fig:cases}} \end{center} \end{figure*} If $w_{j_{\min}}$ is not contained in $U$ (Figure \ref{fig:cases}~(a)), the set $(V_{j_{\min}+1}\setminus V_{j_{\min}}) \setminus U$ is nonempty, and thus, we have $y^{a_{j_{\min}}}(\delta(U)) \ge 1$. This shows \begin{equation}\label{eq:lower_bound_j_min} y^{a_{j_{\min}}}(\delta(U)) + \left|\left\{ w_{j_{\min}} \right\} \cap U \right| \ge 1. \end{equation} Similarly, if $v_{j_{\max}+1}$ is not contained in $U$ (Figure \ref{fig:cases}~(d)), we have $y^{a_{j_{\max}}}(\delta(U)) \ge 1$. This shows \begin{equation}\label{eq:lower_bound_j_max} y^{a_{j_{\max}}}(\delta(U)) + \left|\left\{ v_{j_{\max}+1} \right\} \cap U \right| \ge 1. \end{equation} If $\left|\left\{ w_{j_{\min}} \right\} \cap U \right| =1$, we have $j_{\min} \not = 0$ and $\chi^{f_{j_{\min}}}(\delta(U))=1$ (Figure \ref{fig:cases}~(b)). If $\left|\left\{ v_{j_{\max}+1} \right\} \cap U \right|=1$, we have $j_{\max} < m$ and $\chi^{f_{j_{\max}+1}}(\delta(U))=1$ (Figure \ref{fig:cases}~(c)). As we have $j_{\min} \le j_{\max} < j_{\max} + 1$ the edges $f_{j_{\min}}$ (for $j_{\min} >0$) and $f_{j_{\max}+1}$ (for $j_{\max} < m$) are distinct edges. Thus, unless $j_{\max} = j_{\min}$ and \[\left|\left\{ w_{j_{\min}} \right\} \cap U \right| = \left|\left\{ v_{j_{\max}+1} \right\} \cap U \right| =0,\] the inequalities \eqref{eq:lower_bound_j_min} and \eqref{eq:lower_bound_j_max} imply $y'(\delta(U)) \ge 2$. So it remains to consider the case when $U$ is a subset of $V_{j_{\max}+1}\setminus V_{j_{\max}} = V_{j_{\min}+1}\setminus V_{j_{\min}}$ and contains neither $w_{j_{\min}}$ nor $v_{j_{\max}+1}$. But then \[y'(\delta(U)) \ge y^{a_{j_{\max}}}(\delta(U)) \ge 2.\] \vspace{-8mm} \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em \newpage \begin{lemma}\label{lemma:y_lower_bound} For every cut $C\in \mathcal{B}$ we have \begin{align}\label{eq:busycuts} y(C) &\ge 3. \end{align} For every $U$ with $W_s \subset U \subset V\setminus W_t$ with $s'\notin U$ or $t'\in U$ we have \begin{align}\label{eq:othercuts} y(\delta(U)) + |\{s'\}\setminus U| + |\{t'\}\cap U| &\ge 3. \end{align} \end{lemma} \noindent \hbox{\textbf{Proof:}}\quad We first show \eqref{eq:othercuts}. For $W_s \subset U \subset V\setminus W_t$ we have by Lemma \ref{lemma:y_lp_solution} that $y(\delta(U))\ge 1$, and if $s',t'\in U$ or $s',t'\notin U$ we have $y(\delta(U))\ge 2$. To prove \eqref{eq:busycuts} we again use induction on $k-l$. For $k=l$ we have $y=x^*$ and the claimed inequality follows from the LP constraints \eqref{eq:dynamic_program_LP}. Let now $l<k$. We fix a busy cut $C=\delta(U)\in\mathcal{B}$ with $W_s \subset U \subset V\setminus W_t$. Note that $s'\in U$ and $t'\notin U$, because busy cuts are $(W_s\cup\{s'\})$-$(W_t\cup\{t'\})$-cuts. We will show \begin{align}\label{eq:atleastthree} y'(\delta(U)) &\ge 3. \end{align} As we have $x^*(C) \ge 3$ by the LP constraints \eqref{eq:dynamic_program_LP} and $y$ is a convex combination of $y'$ and $x^*$, this will complete the proof. To show \eqref{eq:atleastthree}, we consider two cases. \begin{figure} \begin{center} \begin{tikzpicture}[scale=0.83] \foreach \s/\x in {9.9/10.5, 5.0/5.65} { \draw[Blue, thick] (\x,0.5) -- (\x,3.5) ; \draw[Blue, thick, decoration={brace,mirror,raise=1pt, amplitude=6pt},decorate] (\s-1.5,0.4) -- node[below=6pt] {\scriptsize$U$} (\x,0.4); } \foreach \s/\l in {4.9/a, 9.8/b} { \node[black] at (\s-1.5,3.9) {\small (\l)}; } \node[darkgreen] at (3.8,1.3) {\small$f_{j}$}; \node[darkgreen] at (12.4,1.3) {\small$f_{j + 1}$}; \foreach \x/\j in {9.2/$\delta(V_{j})$, 11.8/$\delta(V_{j+1})$, 4.5/$\delta(V_{j})$, 6.7/$\delta(V_{j+1})$ } { \draw[thick, dashed, gray] (\x,0.5) -- (\x,3.0) ; \node[above] at (\x, 2.8) {\scriptsize \j}; } \draw[very thick, darkgreen] (9.8,1.8)-- (12.1,1.8); \draw[very thick, darkgreen] (4.1,1.8)-- (6.1,1.8); \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v) at (9.8,1.8) {}; \node [below = 3pt] at (v) {\scriptsize $v_{j+1}$}; \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v) at (6.1,1.8) {}; \node [below = 3pt] at (v) {\scriptsize $w_{j}$}; \foreach \x in {12.1,4.0} { \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v) at (\x,1.8) {}; } \end{tikzpicture} \caption{Different situations occurring in Case 1 of the proof of Lemma \ref{lemma:y_lower_bound}. The picture (a) shows the situation where $w_j \not \in U$. Then $j\not = 0$ and $f_j \in \delta(U)$. The picture (b) shows the situation where $v_{j+1} \in U$. Then $j\not = m $ and $f_{j+1} \in \delta(U)$. \label{fig:U_btw_V_j}} \end{center} \end{figure} \textbf{Case 1:} $V_j \subset U \subset V_{j+1}$ for some $j\in\{0,\dots,m\}$\\[2mm] We pass $C$ as a busy cut to the next level, i.e. we have $C\in \mathcal{B}^{a_j}$, or we have $w_j\not \in U$ or $v_{j+1}\in U$. If $C\in \mathcal{B}^{a_j}$, we apply the induction hypothesis \eqref{eq:busycuts} to the sub-instance corresponding to $a_j$, which implies \eqref{eq:atleastthree} by the definition of $y'$. Otherwise we use \eqref{eq:othercuts} and get \[ y^{a_j}(C) + |\{w_j\}\setminus U| + |\{v_{j+1}\}\cap U| \ge 3.\] Recall that we have $w_0 = s \in U$ and $v_{m+1} = t \notin U$. If $|\{w_j\}\setminus U|=1$, then $j\not=0$ and $\chi^{f_j}(C)=1$. If $|\{v_{j+1}\}\cap U|=1$, then $j\not=m$ and $\chi^{f_{j+1}}(C)=1$. See Figure \ref{fig:U_btw_V_j}. This implies \eqref{eq:atleastthree} by the definition of $y'$. \textbf{Case 2:} $V_j \subset U \subset V_{j+1}$ holds for no $j\in\{0,\dots,m\}$.\\[2mm] Then the cut $C$ must cross some cut $\delta(V_j)$ with $j\in[m]$, i.e. $U\setminus V_j$ and $V_j\setminus U$ are nonempty (see Figure \ref{fig:case_c_crooses_U}). Recall that $s'\in V_j \cap U$ and $t' \not \in V_j \cup U$. \begin{figure} \begin{center} \begin{tikzpicture}[scale=1.0] \begin{scope} \clip (-0.5,0.1) rectangle (2,4); \draw [fill=SkyBlue, draw = none, opacity=0.4] (-0.5,0) -- (4,3) -- (4,0) -- cycle; \end{scope} \begin{scope} \clip (2,0) rectangle (4,2.9); \draw [fill=SkyBlue, draw = none, opacity=0.4] (4,3) -- (-0.5,0) -- (0,3) -- cycle; \end{scope} \draw[ultra thick, dashed, gray] (2,0) -- (2,3) ; \draw[ultra thick, Blue] (-0.5,0) -- (4,3); \node [Blue] (U) at (0.9,1.2) {\small $U$}; \node [Blue, above] (U) at (4.2,3) {\small $C=\delta(U)$}; \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v) at (0.4,2.2) {}; \node [left = 1pt] at (v) {\small $s'$}; \node[circle, fill = black, inner sep = 1.2, outer sep = 1] (v) at (3.3, 1.1) {}; \node [right = 1pt] at (v) {\small $t'$}; \draw[thick, decoration={brace,mirror,raise=3pt, amplitude=6pt},decorate] (-1,0) -- node[below=8pt] {\small $V_j$} (2,0); \end{tikzpicture} \caption{Case 2 of the proof of Lemma \ref{lemma:y_lower_bound}, where the busy cut $C$ is crossing the cut $\delta(V_j)$, i.e. the two light blue sets $U\setminus V_j$ and $V_j \setminus U$ are nonempty. \label{fig:case_c_crooses_U}} \end{center} \end{figure} Since neither $s'$ nor $t'$ is contained in $V_j\setminus U$, we have by Lemma \ref{lemma:y_lp_solution} $$y'(\delta(V_j\setminus U)) \ge 2.$$ Similarly neither $s'$ nor $t'$ is contained $U\setminus V_j$ and we have by Lemma \ref{lemma:y_lp_solution} that $$y'(\delta(U\setminus V_j)) \ge 2.$$ Now by Lemma \ref{lemma:y_1_for_V_j_cuts}, we have $y'(\delta(V_j))=1$. Hence, \begin{align*} y'(\delta(U)) + 1 &= y'(\delta(U))+ y'(\delta(V_j)) \ge y'(\delta(V_j\setminus U)) + y'(\delta(U\setminus V_j)) \ge 4. \end{align*} This shows \eqref{eq:atleastthree}. \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em We now fix the constants $\lambda_1, \dots,\lambda_k$. We set the scaling constant $\Lambda$ to be $\Lambda := 2^{k+1} -3$. For $l\in[k]$ we set \[ \lambda_l:= \frac{2^{k-l+1}-1}{\Lambda}. \] Let $0<\epsilon \le \frac{1}{2}$. We choose the recursion depth $k$ to be \[ k:= \left\lceil \log_2\left(1/\epsilon\right) \right\rceil. \] Then we have $k \ge \log_2\left(\frac{3}{2}+\frac{1}{4\epsilon}\right)$ and thus, \begin{align*} \lambda_1 =\ &\frac{2^k -1}{\Lambda} = \frac{2^k -1}{2^{k+1} -3} = \frac{1}{2} + \frac{1/2}{2^{k+1} -3} \le\ \frac{1}{2} + \frac{1}{4 \cdot \left(\frac{3}{2}+\frac{1}{4\epsilon}\right) -6} = \frac{1}{2} + \epsilon. \end{align*} \begin{lemma}\label{lemma:small_cuts_are_in_Lscr} If $y(C) < 2 - \frac{1}{\Lambda\cdot \lambda_l}$ for some $(W_s\cup\{s'\})$-$(W_t\cup\{t'\})$-cut, then $C \in \mathcal{L}$. \end{lemma} \noindent \hbox{\textbf{Proof:}}\quad If $l=k$, we have $y(C)\ge 1=2-\frac{1}{\Lambda\cdot\lambda_k}$ by Lemma \ref{lemma:y_lp_solution}. Let now $l<k$. Let $W_s\cup\{s'\} \subseteq U \subseteq V\setminus(W_t\cup\{t'\})$ such that $y(\delta(U)) < 2- \frac{1}{\Lambda\cdot\lambda_l}$. By Lemma \ref{lemma:y_lp_solution}, the vector $y$ is a feasible solution to the linear program \eqref{eq:lp_from_lemma_dp}. Hence, the set \begin{align*} \mathcal{N}_y := \big\{ \delta(U') \mid\ & y(\delta(U')) < 2, W_s \cup \{s'\} \subseteq U' \subseteq V\setminus (W_t\cup\{t'\}) \big\} \end{align*} of narrow cuts is a chain (by Proposition \ref{prop:narrow_cuts}). By definition of the sets $V_j$, all cuts $\delta(V_j)$ (for $j\in [m]$) are contained in the set $\mathcal{N}$ of narrow cuts of the vector $x^*$. In particular, we have $x^*(\delta(V_j)) < 2$. By Lemma \ref{lemma:y_1_for_V_j_cuts}, we have $y'(\delta(V_j)) =1$. As $y$ is a convex combination of $x^*$ and $y'$, this shows $y(\delta(V_j)) < 2$, and thus, $\delta(V_j)\in \mathcal{N}_y$ for all $j\in[m]$. From this we can conclude that either $\delta(U) = \delta(V_j)$ for some $j\in [m]$, or $V_j \subset U \subset V_{j+1}$ for some $j\in\{0,1,\dots, m\}$. If $\delta(U) = \delta(V_j)$ for some $j\in [m]$, we have $\delta(U) \in \mathcal{L}$ by construction of $\mathcal{L}$. Otherwise, we have $V_j \subset U \subset V_{j+1}$ for some $j\in\{0,1,\dots, m\}$. We distinguish two cases. \textbf{Case 1:} $C\notin\mathcal{N}$ and $w_j\in U$ and $v_{j+1}\notin U$ \\[2mm] If $C\in \mathcal{L}^{a_j}$, we have $C\in \mathcal{L}$. Otherwise we have $y^{a_j}(C)\ge 2-\frac{1}{\Lambda \cdot \lambda_{l+1}}$ by induction. Moreover, $x^*(C) \ge 2$. As \[ y = \frac{\lambda_l - \lambda_{l+1}}{\lambda_l} \cdot x^* + \frac{\lambda_{l+1}}{\lambda_l} \cdot y', \] this implies \begin{align*} y(C) & \ge\ \frac{\lambda_l - \lambda_{l+1}}{\lambda_l} \cdot 2 + \frac{\lambda_{l+1}}{\lambda_l} \cdot \left( 2-\frac{1}{\Lambda \cdot \lambda_{l+1}} \right) \ =\ 2 \ - \frac{1}{\Lambda \cdot \lambda_l}. \end{align*} \textbf{Case 2:} $C \in \mathcal{N}$ or $w_j\notin U$ or $v_{j+1}\in U$ \\[2mm] Then $C\in \mathcal{B}^{a_j}$ or $w_j\notin U$ or $v_{j+1}\in U$. By Lemma \ref{lemma:y_lower_bound} applied to this call of the dynamic program, we have \[y^{a_j}(C) + |\{w_j\}\setminus U| + |\{v_{j+1}\}\cap U| \ge 3.\] If $|\{w_j\}\setminus U|=1$, then $j\not=0$ and $\chi^{f_j}(C)=1$. If $|\{v_{j+1}\}\cap U|=1$, then $j\not=m$ and $\chi^{f_{j+1}}(C)=1$. Thus, \[ y'(C) \ge 3.\] By the LP constraints \eqref{eq:dynamic_program_LP}, we have $x^*(C) \ge 1$, and hence, \begin{align*} y(C)\ \ge\ & \frac{\lambda_l - \lambda_{l+1}}{\lambda_l} \cdot x^*(C) + \frac{\lambda_{l+1}}{\lambda_l} \cdot y'(C)\\[1mm] \ge\ & \frac{\lambda_l - \lambda_{l+1}}{\lambda_l} + 3\cdot \frac{\lambda_{l+1}}{\lambda_l} \\[1mm] =\ & 2 + \frac{2 \cdot \lambda_{l+1} - \lambda_l}{\lambda_l}\\[1mm] =\ & 2 + \frac{2\cdot\left( 2^{k-l} -1 \right) -\left( 2^{k-l+1} -1 \right)}{\Lambda \cdot \lambda_l} \\[1mm] =\ & 2 - \frac{1}{\Lambda \cdot \lambda_l}. \end{align*} \vspace{-9mm} \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em \subsection{The approximation ratio \boldmath $\frac{3}{2} + \epsilon$}\label{section:approx_ratio} \noindent In this section we prove the approximation ratio of $\frac{3}{2} + \epsilon$ for any fixed $\epsilon > 0$. Let $S^*$ be the spanning tree, $y^*\in \mathbb{R}^E$ the parity correction vector, and $\mathcal{L}^*$ the chain of cuts returned by the dynamic program with input $W_s =W_t = \emptyset$, $s'=s$, $t'=t$, $\mathcal{B} = \emptyset$, and level $l=1$. \begin{lemma}\label{lemma:bound_cost_S_y} If OPT denotes the cost of an optimum $s$-$t$-tour, we have \[ c(S^*) + \lambda_1 \cdot c(y^*) \le \left(\frac{3}{2}+\epsilon \right) \cdot \text{OPT}. \] \end{lemma} \noindent \hbox{\textbf{Proof:}}\quad The input of the dynamic program computing $S^*$ and $y^*$ is consistent with any $s$-$t$ tour. Thus, we get from Lemma \ref{lemma:bound_on_cost} that \[ c(S^*) + \lambda_1 \cdot c(y^*) \le \left(1 + \lambda_1 \right) \cdot c(H) \] for every $s$-$t$ tour $H$. By the choice of $k$ we have \[ 1 + \lambda_1 \le 1 + \frac{1}{2} + \epsilon = \frac{3}{2}+\epsilon, \] implying \[ c(S^*) + \lambda_1 \cdot c(y^*) \le \left(\frac{3}{2}+\epsilon \right) \cdot \text{OPT}. \] \vspace*{-10mm} \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em \begin{lemma}\label{lemma:y_in_T_join_polytope} For \[T=\{ v\in V \mid |\delta(v)\cap S^*| \text{ odd}\} \triangle \{s\}\triangle\{t\}\] the vector $\lambda_1 \cdot y^*$ is contained in the $T$-join polyhedron \[ \{ x \in \mathbb{R}^E_{\ge 0} \mid x(\delta(U)) \ge 1 \text { for } |U\cap T|\text{ odd, }\emptyset \not = U \subset V\}.\] \end{lemma} \noindent \hbox{\textbf{Proof:}}\quad From Lemma \ref{lemma:T_cuts} we get that $|S^* \cap C| = 1$ for every cut $C\in \mathcal{L}^*$. Moreover, we have that all cuts $C\in \mathcal{L}^*$ are $s$-$t$-cuts. Thus, none of the cuts in $\mathcal{L}^*$ is a $T$-cut, i.e. we have $|U\cap T|$ even for every cut $\delta(U) \in \mathcal{L}^*$. Hence, it suffices to show $y^*(C) \ge 1$ for all cuts $C\not \in \mathcal{L}^*$. Consider such a cut $C$. By Lemma \ref{lemma:small_cuts_are_in_Lscr}, we have $y^*(C) \ge 2 - \frac{1}{\Lambda \cdot \lambda_1}$. Thus, \[ \lambda_1 \cdot y^*(C) \ge 2 \cdot \lambda_1 - \frac{1}{\Lambda} = 2\cdot \frac{2^k -1}{\Lambda}- \frac{1}{\Lambda} = \frac{2^{k+1} -3}{\Lambda} =1. \] \vspace{-10mm} \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em \begin{theorem} Let $0<\epsilon \le \frac{1}{2}$. Denote by $p(n,k)$ an upper bound on the time needed to solve a linear program \eqref{eq:dynamic_program_LP} with $|V|= n$ and $|\mathcal{B}| \le k \cdot n$. Then there exists a $\left(\frac{3}{2} + \epsilon\right)$-approximation algorithm with runtime $O\left( n^{6\lceil\log_2(1/\epsilon)\rceil}\cdot p\left(n,\lceil\log_2(1/\epsilon)\rceil\right)\right)$. \end{theorem} \noindent \hbox{\textbf{Proof:}}\quad We call the dynamic programming algorithm with level $l=1$, $W_s = \emptyset$, $W_t = \emptyset$, $s'=s$, $t'=t$, and $\mathcal{B} = \emptyset$. Let $(V,S^*)$ be the returned spanning tree and $y^*$ the returned parity correction vector. We set $T:= \{ v\in V \mid |\delta(v)\cap S^*| \text{ odd}\} \triangle \{s\} \triangle\{t\}$, compute a cheapest $T$-join $J$ and an Eulerian trail in $(V,S^* \stackrel{.}{\cup} J)$, and shortcut. By Lemma \ref{lemma:y_in_T_join_polytope} the cost $c(S^*)+c(J)$ is at most $c(S^*) + c(y^*)$. By Lemma \ref{lemma:bound_cost_S_y} this is at most $\left(\frac{3}{2} + \epsilon \right) \cdot$ OPT, where OPT denotes the cost of an optimum $s$-$t$-tour. Calling the dynamic program with level $l=k$ requires solving the linear program \eqref{eq:dynamic_program_LP} once. For $l<k$, the digraph $D$ has at most $n^6$ edges. Thus, calling the dynamic program with level $l<k$ requires solving the linear program \eqref{eq:dynamic_program_LP} once, computing the narrow cuts (cf.\ Proposition \ref{prop:narrow_cuts}), and calling at most $n^6$ times the dynamic program with level $l+1$. In every recursion step we add only (a subset of the) narrow cuts of the computed LP solution to the set $\mathcal{B}$. As the narrow cuts form a chain, these are at most $n$ cuts. Thus, for the recursion depth $k=\left\lceil \log_2\left(1/\epsilon\right) \right\rceil$ we have $|\mathcal{B}|\le\left\lceil \log_2\left(1/\epsilon\right)\right\rceil\cdot n$. By induction on the level $l$, we obtain an overall runtime of $O\left( n^{6(k-l)}\cdot p\left(n,\lceil\log_2(1/\epsilon)\rceil\right)\right)$. \hspace*{\fill} {\boldmath $\Box$} \par \vskip0.5em One can improve the $n^{6\lceil\log_2(1/\epsilon)\rceil}$ bound to $n^{4\lceil\log_2(1/\epsilon)\rceil}$ by observing that there are at most $n^4$ subinstances of any instance. Note that $p(n,k)$ can be chosen as a polynomial because the busy cut constraints can be checked explicitly, and the separation problem for the other cut constraints reduces to $O(n)$ minimum cut computations. Hence, we have a polynomial-time algorithm for any fixed $\epsilon>0$. We remark that we do not need the explicit LP solutions for our algorithm. The only properties we use from the LP solutions are the LP value and the set of narrow cuts.
\section{Introduction} The study of motion of particles in fluids has wide-ranging applications. Of interest here are problems that involve calculations of the resistance encountered by a rigid body translating in a viscous incompressible fluid. If the motion of the body is sufficiently slow, it is often possible to approximate the flow of the fluid by steady Stokes flow. \longshort{The problem of determination of the drag on a sphere in a fluid in the presence of other boundaries has been long studied in the context of steady Stokes flow. \citep[For a selection of such results, see][]{lorentz1907stokeslet,faxen1921thesis,happel1965,alam1980,maul1996image}}{} In the recent years, a new regime of viscous flow has gained substantial interest, wherein the Reynolds numbers are small, but the timescales of interest are comparable to or shorter than the timescale of vorticity diffusion over the boundary. This is the regime of unsteady Stokes flow ~\citep[see e.g.][\S 1.1]{pozrikidis1992}. One application of this regime is in the study of short time-scale Brownian motion, the exploration of which opens doors to the experimental study of statistical mechanics~\citep[see e.g.][]{mo2015opex,kheifets2014science,franosch2011resonances},\longshort{}{ and} aids in the calibration of precision instrumentation such as optical tweezers~\citep{bergsorensen2004powerspectrum,grimm2012PhysRevE.86.021912}\longshort{, and may provide a tool to measure the viscoelastic properties of complex fluids~\citep{felderhof2009viscoelasticity} and to probe boundary conditions on surfaces~\citep{lauga2005wettability,mo2017wettability}. Other applications include atomic force microscopy and microelectromechanical systems~\citep{clarke2006microcantilever}}{}. As the system can be approximated by linear equations in this regime, it is typical to study the problem of a particle performing small oscillations about a point. Despite the linearity, however, these equations can be significantly harder to solve than the corresponding steady Stokes problems, particularly in situations with reduced symmetry. For example, while the problem of a sphere translating near a plane wall may be solved by means of separable eigenfunction expansions in the case of steady Stokes flow~\citep{oneill1964bispherical}, this is not true with unsteady Stokes flow\longshort{: the choice of coordinates that is apt for the symmetry of the problem is the bi-spherical coordinate system, and the Helmholtz equation obtained by considering harmonic oscillations is not separable in this coordinate system, although the Laplace equation is~\citep{morse1953methods}}{}. Thus, approximation techniques are inevitable. ~\citet{felderhof2005JPhysChemB,felderhof2006twowalls,felderhof2009cylinder,felderhof2012PhysRevE} has applied a point-particle approximation to determine the dynamics of a sufficiently small spherical particle performing small oscillations in a number of confined geometries\footnote{Although Felderhof's work includes generalisations to compressible fluids, we restrict ourselves to incompressible fluids in this analysis}. In essence, his method involves approximating the spherical particle by a point force for purposes of calculating the correction to the flow induced by the confining boundary. This results in a significant simplification of the original problem to what is, in essence, a Green's function problem. However, it appears that Felderhof's result for a sphere near a plane wall does not reproduce the effective mass obtained from potential flow calculations (see section~\ref{sec:potential_flow} for details). It also leads to a drag coefficient that depends on the density of the particle, which is inconsistent with the fact that one may calculate the drag coefficient without any reference to the particle's density (\S\ref{sec:basic_setup}). Moreover, it is not obvious that the point-particle approximation generalises to the case of unsteady Stokes flow. This is because of the existence of an additional length scale in the unsteady Stokes problem, namely the frequency-dependent skin-depth of the vorticity shed by the particle. In an analysis of Brownian motion, there are fluctuations of all frequency scales, and therefore, this skin-depth cannot always be assumed to be much larger than the particle size. The first issue is related to determining the strength of the point force that reproduces the flow field of the sphere in the far field. In the case of steady Stokes flow, as described by \citet[][\S 7]{lorentz1907stokeslet}, this is simply equal to $6\upi\:\! \eta \vec{v}_s$, where $\vec{v}_s$ is the velocity with which the sphere translates. In the unsteady case, Felderhof uses the external force $\vec{F}^\mathrm{ext}_\omega$ acting on the sphere as the point-force acting on the fluid. However, this produces a result that does not agree in the far field, and as we stated earlier, results in a spurious dependence of the drag coefficient on the density of the particle. In this paper, we show that the point force that reproduces the flow from a sphere in the far field is the induced force $\vec{F}^\mathrm{ind}_\omega$ described by \citet{mazur1974faxen}. Making this change in Felderhof's theory results in correct values for the effective mass, and removes the spurious dependence of the drag coefficient on particle density. As for the second issue of the existence of two length scales, we show by a systematic analysis of the approximation that there is a non-trivial reason why the approximation works in practice, as has been seen through its agreement with experiments~\citep{jeney2008boundary,mo2015pre}. To further enhance understanding of the approximation, we consider the simple case of a no-slip sphere of radius $a$ located at a distance $h$ from a full-slip plane wall, and compare the results with an alternate calculation performed using the method of reflections. This alternate calculation results in a drag coefficient that differs in the factors multiplying an exponential term. However, in the regime where this exponential term is important, the particle size is indeed small in comparison with both length scales, viz. the distance from the wall and the skin depth of vorticity, whereby both methods produce similar results to leading order at all frequencies. This paper is organised as follows. In section~\ref{sec:point_particle_approximation}, we review some well-known results and present our modifications to Felderhof's point-particle approximation. In section~\ref{sec:validity}, we set up a general formalism from which we recover our modified version of Felderhof's framework through a series of systematic approximations. In section~\ref{sec:reflection_method}, we present the alternate calculation using the method of reflections for the simple case of a no-slip sphere near a full-slip plane wall. In section~\ref{sec:comparison_of_results}, we compare the results from the two methods, first by examining various limits, and then by numerical evaluation. Thereafter, in section~\ref{sec:brownian_motion}, we apply the results to the hydrodynamic theory of Brownian motion. We conclude with a discussion in section~\ref{sec:discussion}. \section{The point-particle approximation} \label{sec:point_particle_approximation} \subsection{Computation of unsteady drag coefficients} \label{sec:basic_setup} We consider here the problem of a small rigid body $S$ of generic shape performing small translational oscillations in an arbitrary direction at arbitrary\footnote{It is assumed however that the frequency is not high enough that the compressibility of the fluid becomes important} frequency $\omega$ in an incompressible fluid of dynamic viscosity $\eta$ and density $\rho_f$\footnote{In these problems, it is assumed for simplicity that the boundary of the particle itself does not change position, but the velocity boundary condition on that boundary changes. This results in a linear problem, and one would expect it to be good so long as the amplitude of oscillations is small and gets smaller as the frequency grows~\citep[see e.g.][]{zwanzig1970hydrodynamicVACF,mazur1974faxen}}. The fluid is bounded by various additional stationary surfaces (walls) $W_i$ (which could have arbitrary shapes). The intention at a later stage will be to specialise $S$ to a sphere, and then consider a single plane wall $W$. In many practical situations, one is interested in determining the net force (which we shall colloquially refer to as the ``drag force'') exerted by the fluid on the body. In order to do so, we wish to solve the unsteady incompressible Stokes equations, \begin{equation} \label{eq:UnsteadyStokes} \begin{aligned} \rho_f \frac{\partial \vec{v}}{\partial t} &= - \bnabla P + \eta \Delta \vec{v}, \\ \bnabla \bcdot \vec{v} &= 0, \end{aligned} \end{equation} subject to some combination of no-slip or full-slip boundary conditions\footnote{We restrict ourselves to these special cases in this work.} on $\partial S$ and $W_i$. Here $\vec{v}(\vec{r},t)$ is the fluid velocity field, and $P(\vec{r}, t)$ is the pressure field. We may Fourier transform the equations~\eqref{eq:UnsteadyStokes} in time to obtain \begin{equation} \label{eq:UnsteadyStokesFourier} \begin{aligned} \Delta \vec{v}_\omega-\alpha^2 \vec{v}_\omega &= \frac{\bnabla P_\omega}{\eta}, \\ \bnabla \bcdot \vec{v}_\omega &= 0, \end{aligned} \end{equation} where we have introduced the notation \begin{equation} \alpha := \sqrt{\frac{-\mathrm{i\:\!} \omega \rho_f}{\eta}}\qquad\Real[\alpha] > 0, \end{equation} for the complex inverse skin-depth of vorticity\footnote{That this is an interpretation for $\alpha$ can be seen by taking the curl of the first equation in~\eqref{eq:UnsteadyStokesFourier}}, and $\vec{v}_\omega(\vec{r})$ and $P_\omega(\vec{r})$ are the Fourier transforms of $\vec{v}(\vec{r}, t)$ and $P(\vec{r}, t)$ respectively.\footnote{We use the convention $f_\omega = \int_{-\infty}^\infty \mathrm{d}t \; f(t) \; \mathrm{e}^{\mathrm{i\:\!} \omega t}$ for Fourier transforms throughout this work.} Once the solutions for $\vec{v}_\omega$ and $P_\omega$ have been computed, one may compute the drag force on the body as \begin{equation} \label{eq:DragForceSurfaceIntegral} \vec{F}^\mathrm{drag}_\omega = \oint_{\partial S} \mathrm{d}^2x\;\,\pmb{\sigma} \bcdot \hat{n}, \end{equation} where $\pmb{\sigma}$ is the stress tensor having components $\sigma_{ij}(\vec{r}; \omega) = P_\omega \delta_{ij} + \eta(\partial_i v_{\omega j} + \partial_j v_{\omega i})$ and $\hat{n}$ is the outward unit normal to the surface $\partial S$. Since the system is linear in the low Reynolds number regime, the drag force $\vec{F}^\mathrm{drag}_\omega$ is a linear response to the velocity $\vec{u}_\omega$ of the body, whereby it should be possible to write \begin{equation} \label{eq:DragCoefficientTensorDefinition} \vec{F}^\mathrm{drag}_\omega = - \pmb{\gamma}(\vec{r}_0; \omega) \bcdot \vec{u}_\omega, \end{equation} where $\pmb{\gamma}(\vec{r}_0; \omega)$ is a tensor of drag coefficients. Here, we have explicitly indicated that the drag coefficients are dependent on the position $\vec{r}_0$ of the body, although we will drop this in the future to simplify notation. We remark that the setup of this problem to compute the drag coefficient made no reference to the density of the body itself, and the effects of the body on the fluid were captured through the boundary conditions at $\partial S$. In general, analytically solving these equations in situations where the configuration of $S$ and $W_i$ does not possess sufficient symmetry poses difficulties as separable eigenfunction expansions may not exist. \longshort{As mentioned earlier, e}{E}ven for the simple case of a sphere for $S$ and a single plane wall $W$, the Helmholtz equation (with complex wavenumber) in~\eqref{eq:UnsteadyStokesFourier} is not separable in a coordinate system that is suitable for the symmetry of the boundaries. Thus, it is natural to consider approximation techniques. The point-particle approximation~\citep{felderhof2005JPhysChemB}, matched asymptotic expansions~\citep{oneill1967matchedasymptotic}, and the method of reflections~\citep[see e.g.][]{happel1965} are some approximation techniques to resort to. \subsection{An overview of the point-particle framework of Felderhof} \label{sec:felderhof_framework} In this subsection, we review Felderhof's framework for computing particle dynamics using the point-particle approximation in general terms. Felderhof has applied the point-particle approximation to a number of situations~\citep[see e.g.][]{felderhof2005JPhysChemB,felderhof2006twowalls,felderhof2009cylinder,felderhof2012PhysRevE}, especially in the context of the hydrodynamic theory of Brownian motion. In this approximation, the body $S$ is replaced by a point force. This is in the spirit of a multipole expansion~\citep[see e.g.][]{kim2013microhydrodynamics}, the idea being that in the far-field, the stokeslet part of the expansion dominates. Thus, for purposes of calculating the effects of the walls $W_i$, it suffices to truncate the multipole expansion at the stokeslet level. Linearity allows us to superpose the effects of the wall and the effects local to the body, a step that will later be effected using a generalised Fax\'{e}n theorem. We begin by computing the vector-valued Green's function for the pressure field $\vec{P}$ (with components $P_j$) and tensor-valued Green's function for the velocity field $\tens{G}$ (with components $G_{ij}$), arising from a general point force of unit strength at a generic location $\vec{r}'$. The Green's functions satisfy the equations \begin{eqnarray} \label{eq:StokesletProblemMomentum} \Delta G_{ij}(\vec{r}|\vec{r}';\omega) -\alpha^2 G_{ij}(\vec{r}|\vec{r}';\omega) - \frac{1}{\eta}\partial_i P_j(\vec{r}|\vec{r}';\omega) &=& \delta_{ij} \delta(\vec{r}-\vec{r}'), \\ \label{eq:StokesletProblemConstraint} \partial_i G_{ij}(\vec{r}|\vec{r}';\omega) &=& 0, \end{eqnarray} and also obey the required boundary conditions on the walls $W_i$. In principle, they may be computed by using the incompressibility condition in the first equation to get the Poisson equation for the pressure $P_j$, \begin{equation} -\frac{1}{\eta} \Delta P_j(\vec{r}|\vec{r}';\omega) = \partial_j \delta(\vec{r}-\vec{r}'), \end{equation} and then substituting the solution of the above as a source into equation~\eqref{eq:StokesletProblemMomentum}. The resulting Helmholtz equations with complex wavenumber are then solved to determine $G_{ij}$. In practice, the equations are generally solved using eigenfunction expansions and then applying boundary conditions to determine the coefficients~\citep{jones2004,felderhof2005JPhysChemB}. The effect of the boundary conditions on the surface of the body $\partial S$ could in general be modelled by a force distribution (see section~\ref{sec:faxen_theorem}), which could then be integrated against the above Green's function to obtain the velocity field. However, this is a non-trivial task in the complicated geometries of interest. In the point-particle approximation, the effect of the body $S$ is instead modelled by a single point force $\vec{F}^\mathrm{ind}_\omega$ at the location of the body\footnote{The problem of choosing this location is akin to finding a good choice for the origin in any multipole expansion} $\vec{r}_0$, which reproduces the flow from the actual body at sufficiently large distances from the body. The change in the flow caused by the presence of the walls, may then be written as \begin{equation} \label{eq:ReflectedFlowField} \vec{v}_W(\vec{r}|\vec{r}_0;\omega) = \left [ \tens{G}(\vec{r}|\vec{r}_0;\omega) - \tens{G}^0(\vec{r} - \vec{r}_0;\omega) \right ] \bcdot \vec{F}^\mathrm{ind}_\omega, \end{equation} where $\tens{G}^0$ is the free-space velocity Green's function ~\citep[i.e. the unsteady Oseen tensor; see e.g.][\S 6.2]{kim2013microhydrodynamics}. One may obtain $\tens{G}^0$ by the same method described to compute $G_{ij}$ except with the boundary condition being that the flow decay at infinity. The result may be written as~\citep{mazur1974faxen,felderhof2012PhysRevE} \begin{equation} \label{eq:UnsteadyOseenTensor} \tens{G}^0(\vec{q}; \omega) = -\frac{1}{\eta} \Big ( G(\vec{q}; \omega) \mathds{1} + \alpha^{-2} \bnabla\bnabla \left [ G(\vec{q}; 0) - G(\vec{q}; \omega) \right ] \Big ) \end{equation} Here, $G({\vec{q}}; \omega) = -\frac{\mathrm{e}^{-\alpha |{\vec{q}}|}}{4 \upi\:\! |{\vec{q}}|}$ is the fundamental solution of the Helmholtz equation with complex $\alpha$ and $G({\vec{q}}; 0)$ is that of the Laplace equation. We are yet to specify what $\vec{F}^\mathrm{ind}_\omega$ must be to reproduce the flow generated by the body sufficiently far from it, and we shall do so in section~\ref{sec:induced_force}. Once the effect of the wall $\vec{v}_W$ is known, a generalised Fax\'{e}n theorem (section~\ref{sec:faxen_theorem}) may be used to compute the drag coefficient. When using the generalised Fax\'{e}n theorem in the point-particle approximation, it suffices to evaluate $\vec{v}_W$ at the location of the particle. This suggests that it is useful to define the quantity~\citep{felderhof2005JPhysChemB}, \begin{equation} \label{eq:ReactionFieldTensor} \tens{R}(\vec{r}_0;\omega) := \lim_{\vec{r} \to \vec{r}_0} \left [ \tens{G}(\vec{r}|\vec{r}_0;\omega) - \tens{G}^0(\vec{r} - \vec{r}_0;\omega) \right ], \end{equation} which Felderhof aptly calls the \emph{reaction field tensor}. \subsection{The generalised Fax\'{e}n theorem of Mazur and Bedeaux} \label{sec:faxen_theorem} Felderhof's point-particle framework approaches the problem of determining the drag on a body in the presence of walls by using the formalism of section~\ref{sec:felderhof_framework} to calculate the flow generated by a point force in the geometry, and later supposing that this flow be a background flow in which the body is immersed. In order to determine the drag experienced by a spherical body suspended in a pre-existing flow, one needs to first calculate the change in the flow produced by the presence of the body by applying the appropriate boundary conditions on the body, and then calculate the drag force experienced by the body. Generalised Fax\'{e}n theorems provide a simple way to achieve this. The formula for the drag on a stationary rigid sphere suspended in a pre-existing steady background flow $\vec{v}_0(\vec{r})$ was first derived by~\citet{faxen1921thesis}. The drag force is given by a very simple formula -- for no-slip boundary conditions on the sphere, $\vec{F}^\mathrm{drag} = \gamma_s \vec{\bar{v}}_0^S$, where $\vec{\bar{v}}_0^S$ is the average of the background flow field over the surface of the sphere, and $\gamma_s = 6 \upi\:\! \eta a$ is the well-known steady Stokes drag coefficient. The~\citet{faxen1921thesis} theorem has been generalised to obtain the drag force on a sphere with a no-slip boundary in incompressible~\citep{mazur1974faxen} and compressible~\citep{bedeaux1974generalization} unsteady Stokes flow.~\citet{albano1975faxen} have generalised the incompressible version to the case of partial slip boundary conditions on the sphere, and generalisation to the force density induced on the sphere has been effected by~\citet{felderhof1976faxen}. We review here, the incompressible case for translational oscillations of a no-slip sphere derived by~\citet{mazur1974faxen}. Consider an arbitrary background fluid flow described by $\{\vec{v}_0(\vec{r}; \omega)$, $P_0(\vec{r}; \omega)\}$ extant in $\mathbb{R}^3$, which solves the unsteady incompressible Stokes equations with a body force distribution $\vec{S}_0(\vec{r}; \omega)$ consistent with the background flow, i.e. \begin{equation} \label{eq:UnsteadyStokesFourierWithSource} \begin{aligned} \Delta \vec{v}_0 -\alpha^2 \vec{v}_0 &= \frac{\bnabla P_0 - \vec{S}_0}{\eta}, \\ \bnabla \bcdot \vec{v}_0 &= 0. \end{aligned} \end{equation} Suppose that we now place a no-slip sphere of radius $a$, which executes small translational oscillations with velocity $\vec{u}_\omega$ in the fluid under the influence of some external force. The fluid flow is altered by the boundary conditions imposed by the sphere. Since the system is linear, we could think of this as being due to an additional flow $\{\vec{v}'(\vec{r}; \omega)$, $P'(\vec{r}; \omega)\}$. Once again due to linearity, we expect that this flow depends linearly on both the boundary condition $\vec{u}_\omega$ and the background flow $\vec{v}_0$, $P_0$. This relationship is expressed readily if we convert the boundary condition into a source, as is often done in electrodynamics and fluid mechanics. Introducing an induced force\footnote{The notion of induced forces, as described by~\citet{mazur1974faxen}, is analogous to the notion of bound charges in electrostatics.} density $\vec{S}_\mathrm{ind}(\vec{r}; \omega)$ that has support only in the region occupied by the sphere (which we shall assume in this section to be $|\vec{r}| \leq a$), we obtain the equations \begin{equation} \label{eq:UnsteadyStokesForSpherePerturbation} \begin{aligned} \Delta \vec{v}' -\alpha^2 \vec{v}' &= \frac{\bnabla P' - \vec{S}_{\mathrm{ind}}}{\eta}, \\ \bnabla \bcdot \vec{v}' &= 0. \end{aligned} \end{equation} In the above, we assume that there is no longer a boundary, but fluid filling the region $|\vec{r}| \leq a$. A key requirement is that $\vec{S}_{\mathrm{ind}}$ be chosen so the momentum flux through the boundary in this problem matches that through the sphere oscillating with velocity $\vec{u}_\omega$. We shall additionally require that the total flow $\vec{v} = \vec{v}_0 + \vec{v}'$ be equal to $\vec{u}_\omega$ in the entire $|\vec{r}| \leq a$ region. We may write the formal solution of~\eqref{eq:UnsteadyStokesForSpherePerturbation} as\footnote{Equation~\eqref{eq:FormalSolutionForFullFlow} can be seen to be identical to equation (3.15) of~\citet{mazur1974faxen} upon employing~\eqref{eq:UnsteadyOseenTensor}.} \begin{equation} \label{eq:FormalSolutionForFullFlow} \vec{v}(\vec{r}; \omega) = \vec{v}_0(\vec{r}; \omega) + \int_{|\vec{r'}| \leq a} \mathrm{d}^3r' \; \tens{G}^0(\vec{r} - \vec{r}'; \omega) \bcdot \vec{S}_\mathrm{ind}(\vec{r}'; \omega) \end{equation} To find $\vec{S}_\mathrm{ind}$, it appears that one would need to solve the above integral equation, where the left hand side is known to be $\vec{u}_\omega$ inside the spherical region. However, it turns out its explicit value is not required for our purposes -- to compute the drag force $\vec{F}^\mathrm{drag}_\omega$ on the sphere, it suffices to compute the integrated value of $\vec{S}_\mathrm{ind}$ over the volume of the sphere, for \begin{equation} \begin{aligned} \label{eq:InducedForceAndDrag} \vec{F}^\mathrm{drag}_\omega &= \oint_{|\vec{r}| = a} \mathrm{d}^2r \; \pmb{\sigma} \bcdot \hat{n} = \int_{|\vec{r}| \leq a} \mathrm{d}^3r \; \bnabla \bcdot \pmb{\sigma}\\ &= - \left [ \mathrm{i\:\!} \omega m_f \vec{u}_\omega + \int_{|\vec{r}| \leq a} \mathrm{d}^3 r \; \vec{S}_\mathrm{ind}(\vec{r}; \omega) \right ] \end{aligned} \end{equation} as required for the induced force to mimic the presence of the sphere, with $m_f = \frac{4}{3} \upi\:\! a^3 \rho_f$ being the mass of fluid displaced by the sphere. The last step was effected by writing \begin{equation} \bnabla \bcdot \pmb{\sigma} = -\bnabla P + \eta \Delta \vec{v} = \eta \alpha^2 \vec{v} - \vec{S}_{\mathrm{ind}} - \vec{S}_0, \end{equation} and noting that $\vec{S}_0$ may be set without loss of generality to 0 in the region $r \leq a$ (by lumping whatever value it had into $\vec{S}_\mathrm{ind}$), as well as that $\vec{v}$ has the constant value $\vec{u}_\omega$ in the region $r \leq a$ whereby the integral of $\vec{v}$ over that region is simply $\vec{u}_\omega$ times the volume of the sphere. By various manipulations, it can be shown that averages of the equation~\eqref{eq:FormalSolutionForFullFlow} suffice to determine $\int_{|\vec{r}| \leq a} \mathrm{d}^3 r \; \vec{S}_\mathrm{ind}$, whereby setting $\vec{v}(\vec{r}; \omega) = \vec{u}_\omega$ for $|\vec{r}| \leq a$ and averaging~\eqref{eq:FormalSolutionForFullFlow} over the surface and the volume of the sphere, the desired result for the drag force is obtained to be \begin{equation} \label{eq:Faxen} \vec{F}^\mathrm{drag}_\omega = -\gamma_0(\omega) \vec{u}_\omega + \gamma_s \left [ (1 + \alpha a) \vec{\bar{v}}_0^S(\omega) + \frac{1}{3} \alpha^2 a^2 \vec{\bar{v}}_0^V(\omega) \right ], \end{equation} where \begin{equation} \label{eq:StokesBoussinesq} \gamma_0(\omega) := \gamma_s \left ( 1 + \alpha a + \frac{1}{9}\alpha^2 a^2 \right ) \end{equation} is the unsteady Stokes-Boussinesq drag coefficient for a sphere, and $\vec{\bar{v}}_0^S$ and $\vec{\bar{v}}_0^V$ denote the averages of $\vec{v}_0$ over the surface and volume of the sphere respectively. The above result is the generalisation of Fax\'{e}n's theorem by~\citet{mazur1974faxen}. In the point-particle framework of Felderhof, the flow $\vec{v}_W$ calculated using~\eqref{eq:ReflectedFlowField} is considered to be the background flow $\vec{v}_0$. In addition, the surface and volume averages of $\vec{v}_0$ are approximated by evaluating $\vec{v}_W$ at the centre of the sphere. Thus, using the definition~\eqref{eq:ReactionFieldTensor} of the reaction field tensor, we obtain in the point-particle limit, \begin{equation} \label{eq:FaxenPointParticle} \vec{F}^\mathrm{drag}_\omega = -\gamma_0(\omega) \vec{u}_\omega + \gamma_s \left (1 + \delta + \frac{\delta^2}{3} \right ) \tens{R} \bcdot \vec{F}^\mathrm{ind}_\omega, \end{equation} where we have introduced the notation $\delta := \alpha a$. We must note that in the adaptation of the generalised Fax\'{e}n theorem to Felderhof's framework, the net flow $\vec{v} = \vec{v}_W + \vec{v}'$ does not necessarily satisfy boundary conditions on the walls, and this is part of the approximation. \subsection{The appropriate choice of the point force $\vec{F}^\mathrm{ind}_\omega$} \label{sec:induced_force} We now wish to address the following question: what must the point force $\vec{F}^\mathrm{ind}_\omega$ of section~\ref{sec:felderhof_framework} be, to capture the effects on the fluid due to the presence of the body $S$?~\citet[][eq. (2.8)]{felderhof2005JPhysChemB} uses the external force $\vec{F}^\mathrm{ext}_\omega$ that acts on the body by means of some external agent to keep it oscillating with velocity $\vec{u}_\omega$. However, as some of the momentum delivered by the force $\vec{F}^\mathrm{ext}_\omega$ goes into accelerating the body $S$, it is unlikely that this is equal to the force applied on the fluid. It seems reasonable that the force must reproduce the momentum transport through the boundary $\partial S$ of the small body, when the body's volume is replaced by fluid. This is the notion of induced force of~\citet{mazur1974faxen}, which as we described in section~\ref{sec:faxen_theorem}, can be used to replace boundary conditions by sources. In the previous section, we stated in equation~\eqref{eq:InducedForceAndDrag} an expression for the total induced force that replaces a spherical boundary oscillating at $\vec{u}_\omega$. Based on that, we propose that the value of the point force must be given by the same net force concentrated at a point, \begin{equation} \label{eq:InducedForce} \vec{F}^\mathrm{ind}_\omega = -\vec{F}^\mathrm{drag}_\omega - \mathrm{i\:\!} \omega m_f \vec{u}_\omega, \end{equation} possibly also for bodies of generic shape. In this equation, we note that no reference has been made to the properties of the body or the external force acting on it. These aspects, however, do affect the velocity $\vec{u}_\omega$ through the equation of motion of the body, \begin{equation} \label{eq:EquationOfMotionBody} \vec{F}^\mathrm{ext}_\omega = -\vec{F}^\mathrm{drag}_\omega - \mathrm{i\:\!} \omega m_p \vec{u}_\omega, \end{equation} which leads to the alternate expression for the net induced force $\vec{F}^\mathrm{ind}_\omega$, \begin{equation} \vec{F}^\mathrm{ind}_\omega = \vec{F}^\mathrm{ext}_\omega + \mathrm{i\:\!} \omega (m_p - m_f) \vec{u}_\omega. \end{equation} as used by~\citet{felderhof2005JPhysChemB}. We would recover Felderhof's proposal of using $\vec{F}^\mathrm{ext}_\omega$ as the force that represents the body if the body had the same density as the fluid. To establish our proposal for $\vec{F}^\mathrm{ind}_\omega$, we observe that we may write the velocity field $\vec{v}$ produced by the oscillating body at an arbitrary point $\vec{r}$ using the Green's function of equation~\eqref{eq:StokesletProblemMomentum} as \begin{equation} \vec{v}(\vec{r}; \omega) = \int_{S} \mathrm{d}^3 r' \; \tens{G}(\vec{r}|\vec{r}';\omega) \bcdot \vec{S}_{\mathrm{ind}}(\vec{r}'; \omega), \end{equation} where we have replaced the body $S$ by an appropriate induced force density. As is typical of multipole expansions, we may expand $\tens{G}$ in the source point in the far-field limit (i.e. $|\vec{r}| \gg 1/|\alpha|,\: L$ where $L$ denotes the size of the body) to obtain \begin{equation} \vec{v}(\vec{r}; \omega) = \int_{S} \mathrm{d}^3 r' \; \left [ \tens{G}(\vec{r}|\vec{r}_0;\omega) + (\vec{r} - \vec{r}_0) \bcdot \bnabla \tens{G}(\vec{r}|\vec{r}_0;\omega) + \ldots \right ] \bcdot \vec{S}_{\mathrm{ind}}(\vec{r}'; \omega), \end{equation} where $\vec{r}_0$ is some notion of the centre of the body. Truncating the expansion to the first term gives the expression for the velocity due to a point force at $\vec{r}_0$, whose strength is indeed given by \begin{equation} \vec{F}^\mathrm{ind}_\omega = \int_{S} \mathrm{d}^3 r' \; \vec{S}_{\mathrm{ind}}(\vec{r}'; \omega). \end{equation} We further ratify our result for $\vec{F}^\mathrm{ind}_\omega$ by checking it for the case of unbounded spherical bodies in the following manner: we take the far-field limit (i.e. $|\vec{r}| \gg 1/|\alpha|,\: a$) of the solution for the flow $\vec{v}_{\omega}^{\mathrm{S}}(r,\theta)$ produced by a sphere of radius $a$ at the origin oscillating with velocity $\vec{u}_\omega$ \citep[see e.g.][\S 24]{landaulifshitz1987fluid}, and compare it against the flow $\vec{v}^{\mathrm{PF}}_{\omega}$ generated by a point force $\vec{F}_\omega$ at the origin \citep[see e.g.][\S 6.2]{kim2013microhydrodynamics}. For conciseness, we compare only the radial component. Using spherical polar coordinates with the polar axis along $\vec{u}_\omega$, and introducing the notation $\varepsilon := a/r$, we find that the radial component of the velocity field for a sphere is given by \begin{equation} \hat{e}_r \bcdot \vec{v}^{\mathrm{S}}_{\omega}(r,\theta) = -u_\omega \frac{2f'(r)}{r} \cos \theta, \end{equation} where~\citep[as given by][\S 24, Prob. 5]{landaulifshitz1987fluid} \begin{equation} \label{eq:FPrimeOverRFarFieldForm} \frac{f'(r)}{r} = \frac{3 \varepsilon^3}{2 \delta^2} \left [ \mathrm{e}^{\delta(1-1/\varepsilon)}\left ( 1 + \frac{\delta}{\varepsilon} \right) - \left ( 1 + \delta + \frac{\delta^2}{3} \right ) \right ]. \end{equation} On the other hand, for an unsteady stokeslet of strength $\vec{F}_\omega = F_\omega \hat{e}_z$, where $\hat{e}_z$ is the unit vector along the polar axis, we have \begin{equation} \hat{e}_r \bcdot \vec{v}^{\mathrm{PF}}_{\omega} = \frac{2 \alpha \varepsilon^3}{\delta^3} \left [ 1 - \left ( 1 + \frac{\delta}{\varepsilon} \right ) \mathrm{e}^{-\delta/\varepsilon} \right ] \frac{F_\omega}{4\upi\:\! \eta} \cos \theta. \end{equation} In the far-field limit ($\varepsilon \to 0^+$ with $\delta$ fixed and finite), we may drop the subdominant exponential terms of the form $\mathrm{e}^{-\delta / \varepsilon}$ and obtain \begin{equation} \begin{aligned} \frac{f'(r)}{r} &\sim -\frac{3\varepsilon^3}{2\delta^2} \left ( 1 + \delta + \frac{\delta^2}{3} \right ), \\ \hat{e}_r\bcdot \vec{v}_{\omega}^{\mathrm{S}} &\sim u_\omega \cos \theta \; \frac{3 \varepsilon^3}{\delta^2} \left ( 1 + \delta + \frac{\delta^2}{3} \right ), \\ \hat{e}_r\bcdot \vec{v}_{\omega}^{\mathrm{PF}} &\sim \frac{4\alpha\varepsilon^3}{\delta^3}\frac{F_\omega}{8\upi\:\!\eta} \cos \theta. \\ \end{aligned} \end{equation} By setting the latter two expressions equal to each other, we find that, \begin{equation} \begin{aligned} F_\omega &= \gamma_s u_\omega \left(1 + \delta + \frac{\delta^2}{3} \right) \\ &= \gamma_s u_\omega \left (1 + \delta + \frac{\delta^2}{9} \right) - \mathrm{i\:\!} \omega m_f u_\omega. \end{aligned} \end{equation} We now identify the first term to be $-F^\mathrm{drag}_\omega = \gamma_0(\omega) u_\omega$, whereby we find that $\vec{F}_\omega$ is indeed equal to the induced force $\vec{F}^\mathrm{ind}_\omega$. We are hence led to conclude that an unsteady stokeslet of strength $\vec{F}^\mathrm{ind}_\omega$ as defined by equation~\eqref{eq:InducedForce} reproduces the far-field behaviour of a sphere, which would not be the case for Felderhof's choice of the external force $\vec{F}^\mathrm{ext}_\omega$. It is not unreasonable to expect from the physical and mathematical arguments presented earlier, that~\eqref{eq:InducedForce} also holds for bodies of generic shape. \subsection{From the reaction field tensor to the dynamics of a sphere} \label{sec:consequences_correction} We will now follow Felderhof's approach, except with the modified point force $\vec{F}^\mathrm{ind}_\omega$ given by~\eqref{eq:InducedForce}, to arrive at expressions for the drag coefficient and other relevant quantities characterising the dynamics of a \emph{sphere} oscillating in a fluid, in terms of the reaction field tensor $\tens{R}$. We start by using equations~\eqref{eq:FaxenPointParticle} and~\eqref{eq:InducedForce} to obtain \begin{equation} \label{eq:SelfReferentialInducedForce} \vec{F}^\mathrm{ind}_\omega = \gamma_s \left ( 1 + \delta + \frac{\delta^2}{3} \right ) \left [ \vec{u}_\omega - \tens{R} \bcdot \vec{F}^\mathrm{ind}_\omega \right ], \end{equation} where we have used $-\mathrm{i\:\!} \omega m_f = (2/9) \gamma_s \delta^2$ to simplify the expression. The difference between this expression and that of~\citet[eq. 2.11]{felderhof2005JPhysChemB} is the use of $\vec{F}^\mathrm{ind}_\omega$ instead of $\vec{F}^\mathrm{ext}_\omega$. We may use this to solve for $\vec{F}^\mathrm{ind}_\omega$ as, \begin{equation} \label{eq:InducedForceFromReactionFieldTensor} \vec{F}^\mathrm{ind}_\omega = \tilde{\gamma}_0(\omega) \left [ \mathds{1} + \tilde{\gamma}_0(\omega) \tens{R} \right ]^{-1} \bcdot \vec{u}_\omega, \end{equation} where we have defined for convenience, \begin{equation} \label{eq:FreeSpaceGammaTildeDefinition} \tilde{\gamma}_0(\omega) := \gamma_s \left ( 1 + \delta + \frac{\delta^2}{3} \right ) = \gamma_0(\omega) - \mathrm{i\:\!} \omega m_f. \end{equation} Thereafter, using the definition~\eqref{eq:DragCoefficientTensorDefinition} and plugging~\eqref{eq:InducedForceFromReactionFieldTensor} into~\eqref{eq:InducedForce}, we obtain the drag coefficient tensor, \begin{equation} \label{eq:DragCoefficientTensorFromReactionFieldTensor} \dragtensornoarg(\omega) = \mathrm{i\:\!} \omega m_f \mathds{1} + \tilde{\gamma}_0(\omega) \left [ \mathds{1} + \tilde{\gamma}_0(\omega) \tens{R} \right ]^{-1}. \end{equation} Observe that if we define $\tens{\boldsymbol{\tilde{\gamma}}(\omega)} := \dragtensornoarg(\omega) - \mathrm{i\:\!} \omega m_f \mathds{1}$ as before (so that $\vec{F}^\mathrm{ind}_\omega = \tens{\boldsymbol{\tilde{\gamma}}}(\omega) \bcdot \vec{u}_\omega$), the correction of $\tilde{\gamma}_0$ to $\tens{\boldsymbol{\tilde{\gamma}}}$ through $\tens{R}$ has the natural form of a Pad\'{e} approximant. The mechanical admittance tensor $\tens{Y}_\omega$, characterising the linear response of the velocity $\vec{u}_\omega$ of the sphere to the external force $\vec{F}^\mathrm{ext}_\omega$ acting on it, is defined through \begin{equation} \vec{u}_\omega = \tens{Y}_\omega \bcdot \vec{F}^\mathrm{ext}_\omega. \end{equation} It can be related to the drag coefficient through the equation of motion of the sphere~\eqref{eq:EquationOfMotionBody}, to obtain \begin{equation} \begin{aligned} \label{eq:AdmittanceWithoutTrap} \tens{Y}_\omega &= \left [ -\mathrm{i\:\!} \omega m_p \mathds{1} + \dragtensornoarg(\omega) \right ]^{-1} \\ &= \left [ \tilde{\gamma}_0 \left (\mathds{1} + \tilde{\gamma}_0 \tens{R} \right )^{-1} - \mathrm{i\:\!} \omega (m_p - m_f) \mathds{1} \right ]^{-1}. \end{aligned} \end{equation} It is practically useful to include the effects of a harmonic restoring force $- \tens{K} \bcdot ( \vec{u}_\omega / (-\mathrm{i\:\!}\omega ) ) $ in the equation of motion~\citep{franosch2009persistent} (see also \S \ref{sec:brownian_motion}). The admittance then takes the form, \begin{equation} \label{eq:AdmittanceWithTrap} \tens{Y}_\omega = \left [ -\mathrm{i\:\!} \omega m_p \mathds{1} + \dragtensornoarg(\omega) + \frac{\tens{K}}{-\mathrm{i\:\!} \omega} \right ]^{-1}. \end{equation} \section{The validity of the point-particle approximation} \label{sec:validity} \subsection{Is the point-particle approximation valid?} As we have stated earlier, there are two length scales in the problem in addition to the particle size -- the scale of the dimensions of the confining geometry $h$, and the scale of the skin-depth of vorticity $1/|\alpha|$. The point-particle approximation neglects the size of the particle $a$ in comparison to both these length scales insofar as the computation of the effect of the wall is concerned, and when computing the surface and volume averages of the flow that enter the generalised Fax\'{e}n theorem. It must be noted that no approximations\footnote{excepting for the previously stated assumption that the boundary conditions may be applied on the equilibrium boundary of the sphere~\citep{mazur1974faxen}} are made in the generalised Fax\'{e}n theorem~\eqref{eq:Faxen} itself when the body is a sphere. However, for sufficiently large frequency $\omega$ of oscillations, $1/|\alpha|$ can become comparable to $a$. This brings up the question of whether the point-particle approximation works at high frequencies. However, the agreement with experiment~\citep{mo2015pre} at frequencies $\omega \sim \eta / (\rho_f a^2)$ is very good. We explain this intuitively as follows: at these frequencies, the vorticity shed by the boundaries has a very small skin-depth $1/|\alpha| \ll h$ and hence the vorticity from the wall is suppressed exponentially, and the reflected flow field is well approximated by potential flow. Since the potential satisfies Laplace's equation, the multipole expansion and therefore the point-particle approximation works well. At low frequencies $\omega \ll \eta / (\rho_f a^2)$, $1/|\alpha|$ is indeed large compared to $a$ and the approximation works as expected. In order to harden the above argument, we shall set up a general formalism (section~\ref{sec:formal_framework}) for analysing the problem in terms of boundary integral equations, and then systematically delineate the approximations made in order to recover Felderhof's framework in section~\ref{sec:formalization}. The question then boils down to the validity of a far-field expansion of the unsteady Oseen tensor over a wide-range of frequencies, which we provide an argument for in section~\ref{sec:greens_function}. In section~\ref{sec:all_orders} we shall extend the perturbative calculation to higher orders and recover the Pad\'{e}-like form for the drag coefficient~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor}. \subsection{General formalism of boundary integral equations} \label{sec:formal_framework} In this sub-section, we cast our problem in the general formalism of boundary integral equations~\citep[see e.g.][]{pozrikidis1992}. In this and the following sub-sections, we drop explicit reference to $\omega$, the frequency, for notational simplicity. As before, the linearity and time-translation invariance ensure that the individual frequency components may be treated separately. The walls will be assumed to be larger in size than the distance from the particle to any of them. We also assume no-slip boundary conditions on all interfaces for the purposes of this discussion. \newcommand{\vec{r}}{\vec{r}} \newcommand{\mathrm{d}^3r}{\mathrm{d}^3r} \newcommand{\mathrm{d}^2r}{\mathrm{d}^2r} \newcommand{\GO}[2]{\tens{G}^0({#1} - {#2})} \newcommand{\GW}[2]{\tens{G}({#1} | {#2})} \newcommand{\wallterm}[2]{\int_W \mathrm{d}^2r'_W \; \GO{{#2}}{\vec{r}'_W} \bcdot \vec{S}_W^{({#1})}(\vec{r}'_W)} \newcommand{\bodyterm}[2]{\int_S \mathrm{d}^3r'_S \; \GO{{#2}}{\vec{r}'_S} \bcdot \vec{S}_S^{({#1})}(\vec{r}'_S)} \newcommand{\formalexpansion}[2]{{{#1}_{#2}} = {{#1}^{(0)}_{#2}} + \lambda {{#1}^{(1)}_{#2}} + \lambda^2 {{#1}^{(2)}_{#2}} + \ldots} \newcommand{\qquad \qquad}{\qquad \qquad} The problem at hand may be restated as follows: Find the drag force \begin{equation} \vec{F}_\mathrm{drag} = - \left [ \mathrm{i\:\!} \omega m_f \vec{u} + \int_{S} \mathrm{d}^3r'_S \; \vec{S}_S(\vec{r}'_S) \right ] \end{equation} exerted on the surface of the particle $S$ oscillating with velocity $\vec{u}$, by the velocity field \begin{equation} \label{eq:FullVelocityEquation} \vec{v}(\vec{r}) = \int_S \mathrm{d}^3r'_S \; \GO{\vec{r}}{\vec{r}'_S} \bcdot \vec{S}_S(\vec{r}'_S) + \int_W \mathrm{d}^2r'_W \; \GO{\vec{r}}{\vec{r}'_W} \bcdot \vec{S}_W(\vec{r}'_W) \end{equation} which is assumed to be generated from two induced force distributions\footnote{We assume that the surfaces involved satisfy the requirements outlined by~\citet[\S 4.1, 4.2]{pozrikidis1992} for representation of the flow by a single-layer potential, i.e. the surfaces are Lyapunov surfaces. While the integral condition $\int_D \vec{v}(\vec{r}') \bcdot \hat{n}(\vec{r}') \; \mathrm{d}^2r' = 0$ is satisfied for compact $D$ by virtue of non-penetration, it can be shown to hold for each non-zero frequency component of the unsteady Stokes flow for an infinite wall too -- the flow generated from any finite force distribution decays sufficiently fast so that the flux through an infinitely large hemispherical surface is zero. In particular, one may explicitly solve for the Green's function satisfying no-slip conditions on a plane wall by means of a single-layer potential in the place of the wall.} -- a volume force density $\vec{S}_S$ supported in the volume (inclusive of the surface) of the body $S$, and a surface force density\footnote{While it would be possible to use a volume force density instead here as well, it does not make a difference for our purposes.} $\vec{S}_W$ supported on the surfaces of the walls $W = \bigcup_{i} W_i$ -- which are to be determined from the no-slip boundary conditions. Thus $\vec{S}_S$ and $\vec{S}_W$ satisfy the Fredholm integral equations of the first kind, \begin{equation} \label{eq:FullBodyIntegralEquation} \vec{u} = \int_S \mathrm{d}^3r'_S \; \GO{\vec{r}_S}{\vec{r}'_S} \bcdot \vec{S}_S(\vec{r}'_S) + \int_W \mathrm{d}^2r'_W \; \GO{\vec{r}_S}{\vec{r}'_W} \bcdot \vec{S}_W(\vec{r}'_W) \qquad \forall \vec{r}_S \in S, \end{equation} \begin{equation} \begin{aligned}[b] \label{eq:FullWallIntegralEquation} 0 = \int_S \mathrm{d}^3r'_S \; \GO{\vec{r}_W}{\vec{r}'_S} &\bcdot \vec{S}_S(\vec{r}'_S)\\ &+ \int_W \mathrm{d}^2r'_W \; \GO{\vec{r}_W}{\vec{r}'_W} \bcdot \vec{S}_W(\vec{r}'_W) \qquad \forall \vec{r}_W \in W. \end{aligned} \end{equation} We remark that if the Green's function $\tens{G}$ that satisfies the boundary conditions on the walls were known, it would be possible to rewrite the problem purely in terms of $S_S$ as \begin{equation} \begin{aligned} \vec{v}(\vec{r}) &= \int_S \mathrm{d}^3r'_S \; \GW{\vec{r}}{\vec{r}'_S} \bcdot \vec{S}_S(\vec{r}'_S),\\ \vec{u} &= \int_S \mathrm{d}^3r'_S \; \GW{\vec{r}_S}{\vec{r}'_S} \bcdot \vec{S}_S(\vec{r}'_S) \qquad \forall \vec{r}_S \in S. \end{aligned} \end{equation} We now proceed to introduce a formal perturbative expansion in a parameter $\lambda$, which represents the ratio of the body size ($\sim a$) to the distance to the walls ($\sim h$). We begin by introducing expansions for the force distributions, \begin{equation} \begin{gathered} \label{eq:SourceExpansions} \formalexpansion{\vec{S}}{S},\\ \formalexpansion{\vec{S}}{W}. \end{gathered} \end{equation} These expansions induce expansions for the other quantities in the problem, \begin{equation} \begin{gathered} \label{eq:OtherExpansions} \formalexpansion{\vec{v}}{},\\ \formalexpansion{\vec{F}}{\mathrm{drag}}. \end{gathered} \end{equation} In analogy with examples from electrostatics, we expect that the effect of the induced force $\vec{S}_W$ on the walls is diminished in the region occupied by the body. We shall further investigate this assumption, restated formally in~\eqref{eq:ExpansionAssumption}, at the end of this section. To emphasise this, we rewrite~\eqref{eq:FullBodyIntegralEquation} as \begin{equation} \begin{aligned}[b] \label{eq:FullBodyIntegralEquationWithFormalParameter} \vec{u} =& \int_S \mathrm{d}^3r'_S \; \GO{\vec{r}_S}{\vec{r}'_S} \bcdot \vec{S}_S(\vec{r}'_S)\\ &\qquad \qquad + \lambda \int_W \mathrm{d}^2r'_W \; \frac{\GO{\vec{r}_S}{\vec{r}'_W} \bcdot \vec{S}_W(\vec{r}'_W)}{\lambda} \qquad \forall \vec{r}_S \in S. \end{aligned} \end{equation} We would like a scheme where the velocity field from any $O(\lambda^k)$ truncation of the problem is faithful both near the walls and the body. The above convention makes this manifest. We may now plug in the expansions and rewrite the problem~\{\eqref{eq:FullVelocityEquation},~\eqref{eq:FullWallIntegralEquation},~\eqref{eq:FullBodyIntegralEquationWithFormalParameter}\} order-by-order as \begin{equation} \label{eq:VelocityFromSource} \vec{v}^{(n)}(\vec{r}) = \bodyterm{n}{\vec{r}} + \wallterm{n}{\vec{r}}, \end{equation} with the boundary condition on the body $S$ \begin{equation} \begin{aligned}[c] \label{eq:BodyIntegralEquation} \vec{u} = &\bodyterm{0}{\vec{r}_S} \qquad \forall \vec{r}_S \in S,\\ 0 = &\bodyterm{n+1}{\vec{r}_S}\\ &\qquad \qquad + \frac{1}{\lambda} \wallterm{n}{\vec{r}_S} \qquad \forall n \geq 0,\;\forall \vec{r}_S \in S, \end{aligned} \end{equation} and the boundary condition on the walls \begin{equation} \begin{aligned} \label{eq:WallIntegralEquation} 0 = &\bodyterm{n}{\vec{r}_W}\\ &\qquad \qquad + \wallterm{n}{\vec{r}_W} \qquad \forall n \geq 0,\;\forall \vec{r}_W \in W. \end{aligned} \end{equation} We now proceed to investigate the assumption that \begin{equation} \label{eq:ExpansionAssumption} \frac{1}{u} \int_W \mathrm{d}^2r'_W \; \GO{\vec{r}_S}{\vec{r}'_W} \bcdot \left [ \lambda^{k} \vec{S}_W^{(k)}(\vec{r}'_W) \right ] \in O(\lambda^{k+1}). \end{equation} First, we note that $\vec{S}_W^{(k)}$ is obtained by solving~\eqref{eq:WallIntegralEquation} with the knowledge of $\vec{S}_S^{(k)}$. In the spirit of multipole expansions, since the free-space Green's function $\GO{\vec{r}_W}{\vec{r}'_S}$ in the first integral of~\eqref{eq:WallIntegralEquation} is evaluated at a far separation, we may expand it in the vicinity of the location of the body $\vec{r}_0$, \begin{equation} \begin{aligned} \label{eq:QuestionableGreensFunctionExpansion} \GO{\vec{r}_W}{\vec{r}'_S} &= \GO{\vec{r}_W}{\vec{r}_0} + (\vec{r}'_S - \vec{r}_0) \bcdot \bnabla \GO{\vec{r}_W}{\vec{r}_0} + \ldots\\ &= \GO{\vec{r}_W}{\vec{r}_0} + o(\lambda), \qquad \vec{r}'_S \in S. \end{aligned} \end{equation} The issue of the validity of such an expansion is subtle and will be addressed in detail in section~\ref{sec:greens_function}. Using this expansion in~\eqref{eq:WallIntegralEquation}, we have \begin{equation} \label{eq:WallIntegralEquationWithFarFieldExpansion} \wallterm{k}{\vec{r}_W} = -\GO{\vec{r}_W}{\vec{r}_0} \bcdot \int_S \mathrm{d}^3r'_S \; \vec{S}_S^{(k)}(\vec{r}'_S) + o(\lambda). \end{equation} We now state a useful result: if $\vec{\tilde{S}}_W$ satisfies the integral equation \begin{equation} \label{eq:WallGreensFunctionProblem} \int_W \mathrm{d}^2r'_W \; \GO{\vec{r}_W}{\vec{r}'_W} \bcdot \vec{\tilde{S}}_W(\vec{r}'_W) = - \GO{\vec{r}_W}{\vec{r}_0} \bcdot \vec{\tilde{F}} \quad \forall \vec{r}_W \in W \end{equation} for arbitrary point $\vec{r}_0$ and force $\vec{\tilde{F}}$, then for general $\vec{r}$ in the domain, \begin{equation} \label{eq:WallGreensFunctionSolution} \int_W \mathrm{d}^2r'_W \GO{\vec{r}}{\vec{r}'_W} \bcdot \vec{\tilde{S}}_W(\vec{r}'_W) = \left [ \tens{G}(\vec{r}|\vec{r}_0) - \GO{\vec{r}}{\vec{r}_0} \right ] \bcdot \vec{\tilde{F}}, \end{equation} where $\tens{G}(\vec{r}|\vec{r}_0)$ is the Green's function that satisfies no-slip boundary conditions on the walls. This is easily seen if we set up the problem for the no-slip Green's function for the walls by imposing the boundary condition through a surface force distribution $\vec{\tilde{S}}_W$ on the walls. If we choose for $\vec{\tilde{F}}$ the force \begin{equation} \int_S \mathrm{d}^3r'_S \; \vec{S}^{(k)}_S(\vec{r}'_S), \end{equation} we find by comparing~\eqref{eq:WallIntegralEquationWithFarFieldExpansion} and~\eqref{eq:WallGreensFunctionProblem} that \begin{equation} \begin{aligned} \label{eq:WallIntegralEquationSolution} &\wallterm{k}{\vec{r}}\\ &\qquad \qquad = \left [ \tens{G}(\vec{r}|\vec{r}_0) - \GO{\vec{r}}{\vec{r}_0} \right ] \bcdot \int_S \mathrm{d}^3r'_S \; \vec{S}^{(k)}_S(\vec{r}'_S) + o(\lambda) \end{aligned} \end{equation} for any point $\vec{r}$ in the domain. Finally, we observe that we may approximate the expression in question as \begin{equation} \begin{aligned} \label{eq:ExpansionCheck} &\frac{\lambda^k}{u} \wallterm{k}{\vec{r}_S}\\ &\qquad \qquad = \frac{\lambda^k}{u} \wallterm{k}{\vec{r}_0} + o(\lambda^{k+1})\\ &\qquad \qquad = \frac{\lambda^k}{u} \lim_{\vec{r}_S \to \vec{r}_0} \left [ \tens{G}(\vec{r}_S|\vec{r}_0) - \GO{\vec{r}_S}{\vec{r}_0} \right ] \bcdot \int_S \mathrm{d}^3r'_S \; \vec{S}^{(k)}_S(\vec{r}'_S) + o(\lambda^{k+1})\\ &\qquad \qquad = \frac{\lambda^k}{u} \tens{R}(\vec{r}_0) \bcdot \int_S \mathrm{d}^3r'_S \; \vec{S}^{(k)}_S(\vec{r}'_S) + o(\lambda^{k+1}). \end{aligned} \end{equation} Thus, if \begin{equation} \label{eq:ConditionOnReactionFieldTensor} \frac{1}{u} \tens{R}(\vec{r}_0) \bcdot \int_S \mathrm{d}^3r'_S \; \vec{S}^{(k)}_S(\vec{r}'_S) \in O(\lambda), \end{equation} then the assumption~\eqref{eq:ExpansionAssumption} holds. Intuitively, one may expect the above condition to hold on the grounds that the reaction field tensor is the reflected flow evaluated at the location of the particle, and this reflected flow must be suppressed at least as $1/h$, $h$ being the distance to the wall, whereas one would expect the remaining terms to produce a factor of $a$. \subsection{Formalisation of the point-particle approximation} \label{sec:formalization} In this sub-section and the next, we seek to formalise the point-particle framework by explicitly performing all the approximations involved in a systematic manner, using the formalism developed in the previous sub-section. We shall eventually specialise $S$ to be a sphere while still keeping $W$ arbitrary. To solve the problem at order $n = 0$, we begin by noting that the solution to the first of~\eqref{eq:BodyIntegralEquation} is the induced force on the body oscillating with velocity $\vec{u}$ in unbounded fluid, whereby \begin{equation} \label{eq:VelocityUnboundedBody} \vec{v}^S(\vec{r}) \equiv \bodyterm{0}{\vec{r}} \end{equation} where we have used $\vec{v}^S(\vec{r})$ to denote the velocity field generated by the body $S$ oscillating in unbounded fluid. We must now find $\vec{S}^{(0)}_W$ using~\eqref{eq:WallIntegralEquation}, which is not analytically tractable without approximation. Therefore, we make the same approximations that lead to~\eqref{eq:WallIntegralEquationWithFarFieldExpansion}. As we will see shortly, to compute the drag force to first order, we do not need to know $\vec{S}^{(0)}_W$, but only need to be able to compute the effect of this distribution in the vicinity of the body. Proceeding as we did in section~\ref{sec:formal_framework}, we may therefore write~\eqref{eq:WallIntegralEquationSolution} for $k = 0$ as \begin{equation} \label{eq:IntegralRepForReflectedFlow} \wallterm{0}{\vec{r}} = \left [ \tens{G}(\vec{r}|\vec{r}_0) - \GO{\vec{r}}{\vec{r}_0} \right ] \bcdot \vec{F}^{(0)} + o(\lambda), \end{equation} where we have defined \begin{equation} \vec{F}^{(k)} := \int_S \mathrm{d}^3r'_S \; \vec{S}^{(k)}_S(\vec{r}'_S). \end{equation} We may now write~\eqref{eq:BodyIntegralEquation} for $n = 1$ as \begin{equation} \begin{aligned} \label{eq:FaxenProblemDisguised} 0 = &\bodyterm{1}{\vec{r}_S}\\ &\qquad \qquad+ \frac{1}{\lambda} \left [ \tens{G}(\vec{r}_S|\vec{r}_0) - \GO{\vec{r}_S}{\vec{r}_0} \right ] \bcdot \vec{F}^{(0)} \quad \forall \vec{r}_S \in S. \end{aligned} \end{equation} Our aim is to determine the correction to the drag $\vec{F}_\mathrm{drag}^{(1)}$ resulting from the field $\vec{v}^{(1)}$. To determine the drag force, we only need the velocity in the near field of the body, whereby in~\eqref{eq:VelocityFromSource} at any order $n$, we may discard the contribution from $\vec{S}^{(n)}_W$, as the unsteady Oseen tensor multiplying it contributes an extra $O(\lambda)$ when compared to the contribution from the first term when the point of evaluation $\vec{r}$ is close to the body. As a result, we obtain \begin{equation} \label{eq:NearFieldVelocityAtOrderN} \vec{v}^{(n)}(\vec{r}_S) = \bodyterm{n}{\vec{r}_S} + O(\lambda) \qquad \forall \vec{r}_S \in S. \end{equation} Thus, we observe that at order 0, we may use $\vec{v}^S$ of~\eqref{eq:VelocityUnboundedBody} to compute $\vec{F}_\mathrm{drag}^{(0)}$, which is simply equal to the drag force on the body oscillating in unbounded fluid; and at order 1, knowledge of $\vec{S}^{(1)}_W$ is not required for the computation of $\vec{F}_\mathrm{drag}^{(1)}$. We now specialise to $S$ being a sphere of radius $a$ and proceed to determine $\vec{F}_\mathrm{drag}^{(1)}$ for this case. If we set $\vec{v}_0(\vec{r}) := \left [ \tens{G}(\vec{r}|\vec{r}_0) - \GO{\vec{r}}{\vec{r}_0} \right ] \bcdot \vec{F}^{(0)}$ and $\vec{v}(|\vec{r}| \leq a) = 0$ in equation~\eqref{eq:FormalSolutionForFullFlow}, we see that~\eqref{eq:FaxenProblemDisguised} is identical to~\eqref{eq:FormalSolutionForFullFlow}. Therefore, $\vec{F}_\mathrm{drag}^{(1)}$ is given by the generalised Fax\'{e}n theorem of equation~\eqref{eq:Faxen}, whereby we may write \begin{equation} \label{eq:FaxenRecoveredFormally} \lambda \vec{F}_\mathrm{drag}^{(1)} = \gamma_s \left [ (1 + \alpha a) \left < \vec{v}^{(1)}_W \right >_S + \frac{1}{3} \alpha^2 a^2 \left < \vec{v}^{(1)}_W \right >_V \right ] \end{equation} with \begin{equation} \label{eq:FirstOrderReactionField} \lambda \vec{v}^{(1)}_W := \left [ \tens{G}(\vec{r}|\vec{r}_0) - \GO{\vec{r}}{\vec{r}_0} \right ] \bcdot \vec{F}^{(0)}, \end{equation} and $\left < \; \right >_S$ and $\left < \; \right >_V$ denoting surface and volume averages over the sphere respectively. We wish to note that the analysis shows that the reaction field tensor is already $O(\lambda)$, which may be verified with Felderhof's expressions for the case of a flat wall. So the total drag force may be written by adding $\vec{F}_\mathrm{drag}^{(0)} = -\gamma_0(\omega) \vec{u}$ and $\lambda \vec{F}_\mathrm{drag}^{(1)}$ recovering~\eqref{eq:Faxen} for the drag up to first order, with $\vec{v}_0 = \lambda \vec{v}^{(1)}_W$. We now make the approximation of truncating the infinite series to first order, excluding $o(\lambda)$ terms. As a side effect, we observe that \begin{equation} \lambda \vec{v}^{(1)}_W = \left [ \tens{G}(\vec{r}|\vec{r}_0) - \GO{\vec{r}}{\vec{r}_0} \right ] \bcdot \left ( \vec{F}^{(0)} + \lambda \vec{F}^{(1)} \right ) + o(\lambda). \end{equation} Identifying the parentheses in the above equation with the total induced force to first order, \begin{equation} \vec{F}^\mathrm{ind}_\omega = \vec{F}^{(0)} + \lambda \vec{F}^{(1)}, \end{equation} we have shown that $\lambda \vec{v}^{(1)}_W$ is identical with $\vec{v}_W$ of equation~\eqref{eq:ReflectedFlowField} to lowest order. We now investigate the possibility of replacing the surface and volume averages of $\lambda \vec{v}^{(1)}_W$ by evaluation of~\eqref{eq:FirstOrderReactionField} at $\vec{r} \to \vec{r}_0$. Applying the expansion of~\eqref{eq:QuestionableGreensFunctionExpansion} to~\eqref{eq:IntegralRepForReflectedFlow} evaluated for $\vec{r} \in S$ (as done in~\eqref{eq:ExpansionCheck}), we see that $\lambda \vec{v}^{(1)}_W$ may indeed be assumed to have $o(\lambda)$ variation over the region occupied by the sphere. This justifies replacing the averages in~\eqref{eq:FaxenRecoveredFormally} with $\lambda \vec{v}^{(1)}_W$ evaluated as $\vec{r} \to \vec{r}_0$, subject to the validity of the expansion of~\eqref{eq:QuestionableGreensFunctionExpansion}. Finally, we remark that it can be verified by plotting the explicit formulae given by~\citet{felderhof2005JPhysChemB} (also see erratum~\citet{felderhof2005erratum}) over a wide range of frequencies, that the components of the reaction field tensor for the no-slip sphere-plane-wall configuration, non-dimensionalized by multiplication with $\gamma_s$, do not significantly exceed $1 (a/h)$. Thus, the reaction field tensor for this particular case satisfies~\eqref{eq:ConditionOnReactionFieldTensor} and therefore validates the assumption of~\eqref{eq:ExpansionAssumption} by the arguments made in section~\ref{sec:formal_framework}. \subsection{Far-field expansion of the unsteady Oseen tensor} \label{sec:greens_function} In this section, we will address the validity of an expansion of the unsteady\footnote{In this work, we will frequently drop the adjective unsteady to simplify our language. Since our work primarily concerns unsteady flow, this should not cause confusion. We will explicitly specify so when we refer to the steady Oseen tensor.} Oseen tensor, of the kind described in~\eqref{eq:QuestionableGreensFunctionExpansion}. It is natural to our original problem to non-dimensionalize the Oseen tensor by $\gamma_s = 6\upi\:\! \eta a$, given that our notion of forces is best normalised by $\gamma_s u$ -- this results in $\vec{F}_\mathrm{drag}^{(0)}$ being $O(1)$ in our book-keeping. However, the Oseen tensor $\tens{G}^0(\vec{q})$ is naturally a function of $\alpha \vec{q}$, whereby for this analysis, it will be convenient to normalise it by $1 / \alpha$ and write \begin{equation} \begin{aligned} 4 \upi\:\! \tens{\bar{G}}^0(\alpha \vec{q}) := 4 \upi\:\! \eta \tens{G}^{0}(\vec{q}) / \alpha &= \hat{e}_q \hat{e}_q \frac{2}{(\alpha q)^3} \left [ 1 - (1 + \alpha q) \mathrm{e}^{-\alpha q} \right ]\\ &+ \left ( \mathds{1} - \hat{e}_q\hat{e}_q \right ) \frac{1}{(\alpha q)^3} \left [ (1 + \alpha q + \alpha^2 q^2) \mathrm{e}^{-\alpha q} - 1 \right ], \end{aligned} \end{equation} where $\hat{e}_q$ denotes the unit vector along $\vec{q}$. In expansions of the form of~\eqref{eq:QuestionableGreensFunctionExpansion}, we write $\vec{q} = \vec{q}_L + \vec{q}_S$ where $\vec{q}_L$ denotes a large displacement of $O(h)$ and $\vec{q}_S$ denotes a small displacement of $O(a)$. Typically, $\vec{q}_L$ is $\vec{r}_0 - \vec{r}_W'$ where $\vec{r}_W'$ is some point on the wall and $\vec{q}_S$ is $\vec{r}_S - \vec{r}_0$ where $\vec{r}_S$ is some point in the body S. We write \begin{equation} \tens{\bar{G}}^0(\alpha \vec{q}) = \tens{\bar{G}}^0(\alpha \vec{q}_L) + \alpha \vec{q}_S \bcdot \bnabla_{\alpha \vec{q}_S} \tens{\bar{G}}^0(\alpha \vec{q}_L) + o(\alpha \vec{q}_S), \end{equation} where $\bnabla_{\alpha \vec{q}_S}$ denotes a gradient with respect to the quantity $\alpha \vec{q}_S$. Such an expansion may be expected to be valid whenever the function is sufficiently slowly varying for small changes in $\vec{q}_S$ (i.e. changes over the scale of the size of the body). However, for sufficiently high wavenumbers $\alpha$, it appears that oscillating terms of the nature $\mathrm{e}^{\mathrm{i\:\!} \,\Imag(\alpha) \,\vec{q}_S}$ would vary very rapidly -- whereby care must be taken to analyse such an expansion. Specifically, for the Helmholtz Green's function $-\mathrm{e}^{\mathrm{i\:\!} k q} / (4 \upi\:\! \mathrm{i\:\!} k q)$, such an expansion is strictly valid only if $|\vec{q}_S| \ll 1/k \text{ and } |\vec{q}_S| \ll |\vec{q}_L|$, as is often noted when considering multipole expansions for electromagnetic radiation~\citep[see e.g.][\S 9.1]{jackson1999electrodynamics}. However, in the Oseen tensor, the complex wavenumber $\alpha = i k$ has a positive real part which causes significant suppression of the exponentials at large values of $\alpha$, in comparison to the terms originating from the fundamental solution of the Laplace equation $G(\vec{q}; 0)$. Essentially, for large $\alpha$, the contribution from $G(\vec{q}; \omega)$ becomes subdominant, which results in the expansion once again being valid for large $\alpha$. However, it must be noted that the expansion may not work if the subdominant behaviour is of primary interest, as could be the case. We may verify the above intuitive remarks about the expansion by considering the ratio of the first order term in the Taylor expansion to the zeroth order term. To get an order of magnitude estimate, we will treat the longitudinal and transverse components of $\tens{\bar{G}}^0$ separately, and specifically set $q_L = h$ and $q_S = a$. Then, the desired ratios have the form \begin{equation} \frac{a}{h} \frac{\mathrm{e}^{-\nu}( 3 + 3\nu + \nu^2)-3}{\mathrm{e}^{-\nu}(1 + \nu) - 1}, \end{equation} and \begin{equation} \frac{a}{h} \frac{\mathrm{e}^{-\nu}( 3 + 3\nu + 2\nu^2 + \nu^3 ) - 3}{\mathrm{e}^{-\nu}(1 + \nu + \nu^2) - 1}, \end{equation} respectively, where we have used the shorthand $\nu := \alpha h$. While $a / h$ is assumed to be small from the geometry of the problem, no assumptions can be made about $\alpha$. So we must check that the parts of the ratios that contain only $\nu$ remain $\lesssim$ 1. Noting that $\nu$ has the form $\frac{1 - \mathrm{i\:\!}}{\sqrt{2}} |\nu|$ and plotting these parts against a large range of values of $|\nu|$ (or alternately, by analysis), we find that the real and imaginary parts of the above ratios are bounded and do not significantly exceed 1 throughout the range. This indicates that the approximation can be expected to work well for all values of $\alpha$ so long as $a/h$ is small. Intuitively speaking, this seems to suggest that at high frequencies, the primary contribution to the correction of the drag on the particle due to the presence of walls comes from the pressure, rather than from vorticity diffusion. The skin-depth of the vorticity is then too small for the effects of vorticity diffusion from the wall to be significant at the location of the particle and vice versa. The effects of vorticity local to the particle and the wall themselves are however, important, and they are accounted for correctly in the framework. Thus, we have shown that Felderhof's point-particle framework, with our modified point force $\vec{F}^\mathrm{ind}_\omega$, may be expected to work well at all frequencies\footnote{It must still be the case however, as stated earlier, that the frequencies be small enough that the fluid may be considered to be incompressible. For micron-sized particles in water, the regime where compressibility matters is usually of the order of GHz.} so long as $a/h \ll 1$. \subsection{Computing the perturbative expansion to all orders} \label{sec:all_orders} We begin by rewriting the result of the generalised Fax\'{e}n theorem (section~\ref{sec:faxen_theorem}) in a form that is readily usable in this section. In equation~\eqref{eq:FormalSolutionForFullFlow}, we set $\vec{v} = 0$ within the region of the sphere, and we correspondingly set $\vec{u}_\omega = 0$ in~\eqref{eq:Faxen} and use~\eqref{eq:InducedForceAndDrag} to obtain the following result: If the force distribution $\vec{\tilde{S}}$ on a sphere of radius $a$ obeys the integral equation \begin{equation} \label{eq:FaxenReformulationProblem} \int_{\left | \vec{r}_S' \right | \leq a} \GO{\vec{r}_S}{\vec{r}_S'} \bcdot \vec{\tilde{S}}(\vec{r}_S') \; \mathrm{d}^3r'_S = -\vec{v}_0(\vec{r}_S), \qquad \forall | \vec{r}_S | \leq a, \end{equation} for some vector field $\vec{v}_0(\vec{r}_S)$ having support in the region of the sphere, then we may write the net induced force in the region of the sphere as \begin{equation} \label{eq:FaxenReformulationSolution} \int_{\left | \vec{r}_S' \right | \leq a} \vec{\tilde{S}}(\vec{r}_S') \; \mathrm{d}^3r'_S = - \gamma_s \left [ (1 + \alpha a) \vec{\bar{v}}_0^S(\omega) + \frac{1}{3} \alpha^2 a^2 \vec{\bar{v}}_0^V(\omega) \right ]. \end{equation} We now consider the extension of the calculation performed in section~\ref{sec:formalization} to higher orders for the case where $S$ is a sphere of radius $a$. By using the result~\eqref{eq:ExpansionCheck} in the boundary condition on the body~\eqref{eq:BodyIntegralEquation}, we may write \begin{equation} \begin{aligned} 0 &= \bodyterm{n+1}{\vec{r}_S}\\ &\qquad \qquad + \frac{1}{\lambda} \tens{R}(\vec{r}_0) \bcdot \int_S \mathrm{d}^3r'_S \; \vec{S}^{(n)}_S(\vec{r}'_S) \qquad \forall n \geq 0,\;\forall \vec{r}_S \in S. \end{aligned} \end{equation} We note that the second term is independent of $\vec{r}_S$ to the lowest order. By comparing the above equation with equation~\eqref{eq:FaxenReformulationProblem}, we see that~\eqref{eq:FaxenReformulationSolution} gives us \begin{equation} \int_S \mathrm{d}^3r'_S \; \vec{S}^{(n+1)}_S(\vec{r}'_S) = \left [ \frac{-\tilde{\gamma}_0 \tens{R}(\vec{r}_0)}{\lambda} \right ]^{n + 1} \bcdot \int_S \mathrm{d}^3r'_S \; \vec{S}^{(0)}_S(\vec{r}'_S), \end{equation} which yields a geometric series. This indicates that we may write the net induced force on the sphere as \begin{equation} \begin{aligned} \vec{F}^\mathrm{ind}_\omega = \int_S \mathrm{d}^3r'_S \; \vec{S}_S(\vec{r}'_S) &= \sum_{k = 0}^\infty \int_S \mathrm{d}^3r'_S \; \lambda^k \vec{S}^{(k)}_S(\vec{r}'_S)\\ &= \left ( \sum_{k = 0}^\infty \left [ -\tilde{\gamma}_0 \tens{R}(\vec{r}_0) \right ]^k \right ) \bcdot \int_S \mathrm{d}^3r'_S \; \vec{S}^{(0)}_S(\vec{r}'_S)\\ &= \left [ \mathds{1} + \tilde{\gamma}_0 \tens{R}(\vec{r}_0) \right ]^{-1} \bcdot \int_S \mathrm{d}^3r'_S \; \vec{S}^{(0)}_S(\vec{r}'_S), \end{aligned} \end{equation} provided the geometric series converges. By comparing the first of~\eqref{eq:BodyIntegralEquation} with~\eqref{eq:FaxenReformulationProblem}, we find from~\eqref{eq:FaxenReformulationSolution} that \begin{equation*} \int_S \mathrm{d}^3r'_S \; \vec{S}^{(0)}_S(\vec{r}'_S) = \tilde{\gamma}_0 \vec{u}. \end{equation*} Thereafter, using~\eqref{eq:InducedForceAndDrag} we find that the drag force to all orders in $a/h$ is given by \begin{equation} \vec{F}^\mathrm{drag}_\omega = - \mathrm{i\:\!} \omega m_f - \tilde{\gamma}_0 \left [ \mathds{1} + \tilde{\gamma}_0 \tens{R}(\vec{r}_0) \right ]^{-1} \bcdot \vec{u}, \end{equation} whereby we recover the result~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor}. Thus, it appears that in the region of convergence of the geometric series, the results of the point-particle framework are correct to all orders of perturbation theory. However, this does not mean that it is exact irrespective of how large $a/h$ is, since the perturbative process does not necessarily capture the corrections that lie beyond all orders faithfully, which become significant as $a/h \to 1$. In fact, in the next section, we will compare the first order results from the point-particle approximation against the method of reflections for the simpler case of full-slip boundary conditions on the wall, and discover that the subdominant terms do differ. \section{Method of Reflections -- a no-slip sphere near a full-slip plane wall} \label{sec:reflection_method} The method of reflections has been heavily used as an approximation method in the context of steady Stokes flow~\citep[see e.g.][]{happel1965,kim2013microhydrodynamics}. A proof of the convergence of the iterative process for steady Stokes flows under certain restrictions exists~\citep{luke1989convergence}, although this has not been extended to unsteady Stokes flows (to the best of our knowledge)\footnote{A formalism of the sort developed in~\ref{sec:formal_framework} could serve as a starting point for a proof.}. The method of reflections has been used in the context of unsteady Stokes flows for the case of two spheres with no-slip boundary conditions by~\citet{ardekani2006Reflections}, but their procedure involves evaluation of the reflected field at the centre of the sphere at each iteration. Although the procedure converges and produces consistent results, for our comparative study, we would prefer to investigate a procedure that would avoid any further approximation beyond truncation of the iterative process, so that we can be confident that the approximation works at all frequencies of oscillation. We remark however, that the analysis of~\citet{ardekani2006Reflections} seems to be similar in content to that of section~\ref{sec:all_orders}, whereby we may expect their result to differ only in corrections that lie beyond all orders. Here, we consider the same geometry of a small sphere performing small oscillations near a flat wall, but with the simpler case of free-slip boundary conditions on the wall. As before, we assume no-slip boundary conditions on the sphere. We shall truncate the iterative procedure after one reflection from the wall, but without further approximation, yielding results that are expected to be correct to lowest order in $a/h$ for arbitrary frequency of oscillation $\omega$. The choice of full-slip boundary conditions on the wall\footnote{Full-slip boundary conditions at solid-liquid interfaces are of increasing practical importance~\citep{vinogradova1999,neto2005}, and can be approximately realised on super-hydrophobic surfaces created by means of nano-fabricated structures~\citep[see e.g.][]{choi2006slip} or by increasing the surface roughness~\citep[see e.g.][]{shibuichi1996}. Further examples may be found in e.g.~\citet{mo2017wettability}}, as opposed to the more common no-slip / partial-slip boundary conditions, makes the problem particularly simple as we may employ the method of images, and place an image sphere behind the wall in order to satisfy boundary conditions on the wall. This simplicity enables exact evaluation of the surface and volume average integrals that enter the generalised Fax\'{e}n theorem (section~\ref{sec:faxen_theorem}) in closed form. We break up the problem into two sub-problems: one with the sphere oscillating perpendicular to the wall, and the other with the sphere oscillating parallel to the wall along any particular direction. In each case, we compute the drag force along the direction of oscillation. In anisotropic geometries, in addition to the drag, the sphere may also experience a force in the directions normal to its motion, which would correspond to off-diagonal terms in $\dragtensornoarg(\omega)$. We show that within the approximations used in this work, these forces are zero. In the steady case, such effects have been shown to exist when the advective term of the Navier-Stokes equations is retained in the Oseen approximation~\citep[see e.g.][]{faxen1921thesis,shinohara1979lateral} \subsection{Flow around a sphere oscillating in an unbounded fluid} First, we review the well-known problem of a sphere oscillating in an unbounded fluid. The problem was first solved by~\citet{stokes1851pendulum}. However, we shall follow the presentation of~\citet[\S 24, Prob. 5]{landaulifshitz1987fluid} as it is more convenient for our purposes\footnote{However, we shall use notation that is consistent with the rest of this work. This involves the changes $R \to a$, $a \to A$, $b \to B$, $-\mathrm{i\:\!} k R \to \delta$ from the notation used in Landau-Lifshitz to our notation.}. We had already used some of these results in section~\ref{sec:induced_force}, but the level of detail and notation here is adapted to the calculation that follows. Using the ansatz $\vec{v}_\omega(\vec{r}) = \bnabla \times \bnabla \times (f(r) \vec{u}_\omega)$ for the velocity field $\vec{v}_\omega(\vec{r})$ generated by the sphere oscillating with velocity $\vec{u}_\omega$, the unsteady incompressible Stokes equations~\eqref{eq:UnsteadyStokesFourier} reduce to \begin{equation} \Delta^2 f = \alpha^2 \Delta f, \end{equation} whose solution subject to the no-slip boundary conditions $\vec{v}_\omega|_{\partial S} = \vec{u}_\omega$ on the surface of the sphere and decay condition at infinity is $f(r)$ such that, \begin{equation} \label{eq:FDimensionful} \frac{f'(r)}{r} = \frac{1}{r^3} \left [ A \mathrm{e}^{-\alpha r} \left (r + \frac{1}{\alpha} \right) + B \right ], \end{equation} with the constants, \begin{equation} \begin{aligned} A &= \frac{3a^2}{2\delta} \mathrm{e}^{\delta}, \\ B &= -\frac{3 a^3}{2 \delta^2} \left ( 1 + \delta + \frac{\delta^2}{3} \right ). \end{aligned} \end{equation} Here, the origin of the spherical coordinate system $(r,\theta,\varphi)$ is at the centre of the sphere, and the polar axis is along $\vec{u}_\omega$. It must be noted that the combination $f'(r)/r$ is dimensionless. This is the same function $f'(r)/r$ from equation~\eqref{eq:FPrimeOverRFarFieldForm} written out using different notation. From the above, the components of the velocity in the same coordinate system may be calculated as, \begin{equation} \begin{aligned} \label{eq:UnboundedSphereVelocity} \hat{e}_r \bcdot \vec{v}_{\omega} &= - 2 u_\omega \frac{f'(r)}{r} \cos \theta, \\ \hat{e}_\theta \bcdot \vec{v}_{\omega} &= u_\omega \sin \theta \left [ -\frac{A \alpha}{r} \mathrm{e}^{-\alpha r} - \frac{f'(r)}{r} \right ]. \end{aligned} \end{equation} It must be noted that the problem possesses axial symmetry, by which $\hat{e}_\varphi \bcdot \vec{v}_{\omega} = 0$ and there is no $\varphi$ dependence for most quantities. \subsection{Image system for a full-slip plane wall: Perpendicular oscillations} \begin{figure} \label{fig:Setup} \centering \includegraphics[width=0.75\textwidth]{Combined_Setup.eps} \caption{Image systems for oscillations perpendicular and parallel to the wall, and coordinate systems adapted to the geometry. For conciseness, we have shown both systems in a single figure. The blue horizontal arrows on the spheres, pointing in opposing directions, indicate the direction of velocities for the perpendicular case. The red vertical arrows, pointing in the same direction, indicate the same for the parallel case. The angles $\Theta$ and $\Phi$ marked in red are relevant only to the parallel case.} \end{figure} Let the fluid fill the half-space $\mathbb{R}^+ \times \mathbb{R}^2$ indexed by cylindrical coordinates $\rho > 0,\;z > -h,\;0 \leq \varphi < 2\upi\:\!$ ($h>0$). Let the sphere $S$ of radius $a$ lie at the point $\rho = 0,\; z = 0$. The plane wall $W$ is located at the plane $z = -h$. For convenience, we introduce additional coordinate systems: a spherical coordinate system $(r,\,\theta,\,\varphi)$ with origin at $z = 0$ and polar axis along the positive $z$-axis; and a spherical coordinate system $(r',\,\theta',\,\varphi)$ with origin at $z = -2h$ and polar axis along the positive $z$-axis. Let the sphere oscillate with velocity $\vec{u}_\omega = +1 \hat{e}_z$, where $\hat{e}_z$ is the unit vector along the positive $z$-direction. The situation is visualised in figure~\ref{fig:Setup}, where the blue horizontal arrows represent the directions of velocities. The red vertical arrows and the angles $\Theta$, $\Phi$ are irrelevant to this section. The velocity field~\eqref{eq:UnboundedSphereVelocity} of the sphere does not satisfy the full-slip boundary conditions on the wall $W$, \begin{equation*} \begin{aligned} \hat{e}_z \bcdot \vec{v}_{\omega} |_{W} &= 0, \\ \hat{e}_z \bcdot \bnabla \vec{v}_{\omega,\perp}|_{W} &= \vec{0}, \end{aligned} \end{equation*} where $\vec{v}_{\omega,\perp} = \vec{v}_\omega - (\hat{e}_z \bcdot \vec{v}_{\omega}) \hat{e}_z$, although it satisfies the no-slip boundary conditions on the sphere $S$. Thus, we introduce an additional field\footnote{While there are indeed pressure fields associated with each of these velocity fields, it turns out that they are not directly relevant to our calculations.} $\vec{v}^{(1)}_\omega$ such that $\vec{v}_\omega + \vec{v}^{(1)}_\omega$ satisfies full-slip boundary conditions at wall $W$. The field $\vec{v}^{(1)}_\omega$ could be regarded as the flow reflected from the wall. We could consider $\vec{v}^{(1)}_\omega$ to be produced by an \emph{image} sphere $S'$ centred at $z = -2h$ and having velocity $\vec{u'}_\omega = -1 \hat{e}_z$. By symmetry, the boundary conditions at $W$ are then satisfied. However, the combined field $\vec{v}_\omega + \vec{v}^{(1)}_\omega$ will not satisfy the no-slip boundary conditions on $\partial S$. Instead of computing the next reflected field $\vec{v}^{(2)}_\omega$ that corrects for the boundary conditions on the sphere, we shall simply employ $\vec{v}^{(1)}_\omega$ as the background field in the generalised Fax\'{e}n theorem~\eqref{eq:Faxen} to calculate the drag coefficient. The iterative procedure of reflections shall be truncated at this point. Thus, it suffices to calculate the image field $\vec{v}_\omega^{(1)}$. The image field is simply given by using~\eqref{eq:UnboundedSphereVelocity} with the replacements $u_\omega \to -1,\;\theta \to \theta',\;r \to r'$. However, in order to employ the generalised Fax\'{e}n theorem, we would need to average this field over $\partial S$ and $S$. To do so, the following co-ordinate conversion formulas are handy, \begin{equation} \begin{aligned} \label{eq:CoordConversionPerp} \rho &= r' \sin \theta' = r \sin \theta, \\ z &= r \cos \theta = r' \cos \theta' - 2h, \\ r'^2 &= 4 h^2 + r^2 + 4 r h \cos \theta, \\ r^2 &= \rho^2 + z^2, \\ r'^2 &= \rho^2 + (2h + z)^2. \end{aligned} \end{equation} It is also convenient to introduce the non-dimensionalized variables, $\xi := r'/(2h)$, $\delta = \alpha a$, $\epsilon = a/h$. Then we may write the dimensionless function $F_0(\xi) := f'(r')/r'$ , i.e. the function of equation~\eqref{eq:FDimensionful} evaluated instead at $r'$, as \begin{equation} F_0(\xi) = \frac{1}{\xi^3} \left [ p \, \mathrm{e}^{-2 \delta \xi/\epsilon} \left( 1 + \frac{2\delta \xi}{\epsilon} \right) - q \right ], \end{equation} where the constants $p := 3 \epsilon^3 \mathrm{e}^\delta / (16 \delta^2)$ and $q := 3 \epsilon^3 (1 + \delta + \delta^2 / 3) / (16 \delta^2)$. \subsection{Drag coefficient for perpendicular oscillations} With these preparations, we are ready to calculate the drag force on the sphere for oscillations perpendicular to the wall. To do so, we need to compute the averages of the first reflected field $\vec{v}^{(1)}_\omega = -\bnabla \times \bnabla \left [ f(r') \hat{e}_z \right ]$ on $\partial S$ and $S$. For this purpose, it is convenient to leave $\vec{v}^{(1)}_\omega$ in this form rather than expand it out as in equation~\eqref{eq:UnboundedSphereVelocity}. By symmetry, we observe that the only non-vanishing contribution comes from the $z$-component \begin{equation} V := \hat{e}_z \bcdot \vec{v}^{(1)}_{\omega} = - \hat{e}_z \bcdot \bnabla \left ( \hat{e}_z \bcdot \bnabla f(r') \right ) + \Delta f(r'). \end{equation} We begin by computing the average over the surface of a sphere of radius $r = a \zeta$ centred about $z = 0$, given by, \begin{equation} \bar{V}^S(\zeta) = \frac{1}{4 \upi\:\!} \int_{0}^{\upi\:\!} 2 \upi\:\! \sin \theta \,\mathrm{d}\theta \; V, \end{equation} where we have already performed the trivial $\mathrm{d}\varphi$ integral. Writing $\bnabla$ in the cylindrical coordinate system\footnote{We will frequently ignore the $\varphi$ derivatives in these expressions as they are zero due to axial symmetry.} as \begin{equation*} \bnabla = \vec{\hat{e}}_z \left ( \frac{\partial}{\partial z} \right )_\rho + \vec{\hat{e}}_\rho \left ( \frac{\partial}{\partial \rho} \right )_z, \end{equation*} we find from~\eqref{eq:CoordConversionPerp} that $\left ( {\partial r'}/{\partial z} \right )_\rho = (z + 2h)/r'$, and use this in the expression for $V$ to obtain, \begin{equation} \begin{aligned} V &= - \vec{\hat{e}}_z \bcdot \bnabla \left [ \frac{z + 2h}{r'} f'(r') \right ] + f''(r') + 2\frac{f'(r')}{r'} \\ &= - \frac{(z + 2h)^2}{r'}\der{r'}\left [ \frac{f'(r')}{r'} \right ] + f''(r') + \frac{f'(r')}{r'} \\ & = -\frac{(z + 2h)^2}{r'}\der{r'}\left[ \frac{f'(r')}{r'} \right ] + \frac{1}{r'}\der{r'}\left[ r' f'(r') \right]. \end{aligned} \end{equation} We now observe from~\eqref{eq:CoordConversionPerp} that since we are integrating on a surface of constant $r$, $\frac{1}{2} \sin \theta \, \mathrm{d}\theta = - (2 r)^{-1}\, \mathrm{d}z = - (\epsilon \zeta)^{-1} \xi\,\mathrm{d}\xi$, whereby the integral may be rewritten in terms of the non-dimensionalized variables as, \begin{equation} \begin{aligned} \bar{V}^S(\zeta) &= \frac{1}{\epsilon \zeta} \int_{1 - \frac{1}{2}\epsilon \zeta}^{1 + \frac{1}{2}\epsilon\zeta} \xi\, \mathrm{d}\xi\; V \\ &= \frac{1}{\epsilon \zeta} \int_{1 - \frac{1}{2}\epsilon\zeta}^{1 + \frac{1}{2}\epsilon\zeta} \mathrm{d}\xi \, \left \{ -\frac{1}{4} \left ( \xi^2 - \frac{\epsilon^2 \zeta^2}{4} + 1 \right )^2\der{\xi}\,[F_0(\xi)] + \der{\xi}\left[ \xi^2 F_0(\xi) \right] \right \}. \end{aligned} \end{equation} The advantage of this form is that the integral may be conveniently evaluated using integration by parts, and with the definitions, \begin{equation} \begin{aligned} F_1(\xi) &:= \int \xi F_0(\xi)\,\mathrm{d}\xi = -\frac{1}{\xi} \left [ p\, \mathrm{e}^{-2 \delta \xi / \epsilon} - q \right ], \\ F_2(\xi) &:= \int \xi F_1(\xi)\,\mathrm{d}\xi = \left [ p \frac{\epsilon}{2\delta}\mathrm{e}^{-2 \delta \xi / \epsilon} + q \xi \right ], \end{aligned} \end{equation} we have, \begin{equation} \begin{aligned} \bar{V}^S(\zeta) &= -\frac{2}{\epsilon \zeta} \left [ F_2(\xi) - \xi F_1(\xi) \right ]^{1 + \frac{1}{2}\epsilon\zeta}_{1 - \frac{1}{2}\epsilon\zeta} \\ &= \frac{2}{\epsilon\zeta} \left [ 2 p \, \mathrm{e}^{-2\delta/\epsilon}\sinh ( \delta \zeta ) \left ( 1 + \frac{\epsilon}{2\delta} \right ) - q \epsilon \zeta \right ]. \end{aligned} \end{equation} The average $\bar{V}^S$ on the surface of the sphere $\partial S$ is just obtained by evaluating the above at $\zeta = 1$. We define the volume average of V, \begin{equation} \begin{aligned} \bar{V}^V &:= \frac{1}{\frac{4}{3} \upi\:\! a^3} \int_0^a 4 \upi\:\! r^2 \,\mathrm{d}r\: \bar{V}^S(r/a) \\ &= \int_0^1 3 \zeta^2\,\mathrm{d}\zeta \: \bar{V}^S(\zeta), \end{aligned} \end{equation} which may be evaluated to obtain, \begin{equation} \bar{V}^V = \frac{12 p}{\epsilon \delta^2} \left ( 1 + \frac{\epsilon}{2\delta} \right ) \mathrm{e}^{-2\delta / \epsilon} \left (\delta \cosh \delta - \sinh \delta \right ) - 2 q. \end{equation} We now rewrite the generalised Fax\'{e}n theorem~\eqref{eq:Faxen} as, \begin{equation} \label{eq:FaxenForDragCoefficient} \frac{\gamma_{\perp}^{R}}{\gamma_s} = \frac{\gamma_0}{\gamma_s} - \left [ (1 + \delta) \bar{V}^S + \frac{\delta^2}{3} \bar{V}^V \right ], \end{equation} where we have introduced the superscript $R$ to distinguish the results from the method of reflections from the other methods considered in this work. We then use the above to obtain the drag coefficient $\gamma^R_\perp$ as, \begin{equation} \label{eq:GammaPerpendicularReflections} \frac{\gamma_\perp^R}{\gamma_s} = \left ( 1 + \delta + \frac{\delta^2}{9} \right ) + \frac{3 \epsilon}{8 \delta^2} \left [ \epsilon^2 \left ( 1 + \delta + \frac{\delta^2}{3} \right )^2 - \mathrm{e}^{2\delta ( 1 - 1/\epsilon)} ( 2 \epsilon \delta + \epsilon^2 ) \right ]. \end{equation} \subsection{Image system for a full-slip plane wall: Parallel oscillations} As before, we consider the fluid to fill the half-space $\mathbb{R}^+ \times \mathbb{R}^2$. We will instead prefer to use a Cartesian coordinate system $(x,\,y,\,z)$ where the half-space occupied by the fluid corresponds to $z > -h$ ($h > 0$). Let the sphere $S$ of radius $a$ lie at the origin of the Cartesian coordinate system. The plane wall $W$ is located at $z = -h$. For convenience, as before, we introduce additional coordinate systems: a spherical coordinate system $(r,\,\theta,\,\varphi)$ with origin at $z = 0$ and polar axis along the positive $z$-axis; a spherical coordinate system $(r',\,\theta',\,\varphi)$ with origin at $z = -2h$ and polar axis along the positive $z$-axis; and another spherical coordinate system $(R := r',\,\Theta,\,\Phi)$ with origin at $z = -2h$ and polar axis along the positive $x$-axis. Let the sphere oscillate with velocity $\vec{u}_\omega = +1 \vec{\hat{e}}_x$, where $\hat{e}_x$ is the unit vector along the $x$-direction. The situation is visualised in figure~\ref{fig:Setup}, where the red vertical arrows represent the directions of velocities. The blue horizontal arrows are irrelevant to this section. As before, we introduce an image sphere $S'$ centred at $z = -2h$, but to satisfy the boundary conditions on $z = -h$, the image sphere must have the same velocity as the actual sphere, i.e. $\vec{u'}_\omega = +1 \vec{\hat{e}}_x$. We list the relevant coordinate conversion formulas involving the $(x,\,y,\,z)$ and the $(R,\,\Theta,\,\Phi)$ systems below: \begin{equation} \begin{aligned} \label{eq:ParallelCoordConversionPerp} R &= r' \\ x &= r' \sin \theta' \sin \varphi. \end{aligned} \end{equation} \subsection{Drag coefficient for parallel oscillations} We now proceed to calculate the drag force on the sphere for oscillations parallel to the wall. The first reflected field is now given by, \begin{equation} \vec{v}^{(1)}_\omega = +\bnabla \times \bnabla \left [ f(R) \vec{\hat{e}}_x \right ]. \end{equation} The relevant component is the $x$-component, \begin{equation} V := \hat{e}_x \bcdot \vec{v}^{(1)}_{\omega} = + \vec{\hat{e}}_x \bcdot \bnabla \left ( \vec{\hat{e}}_x \bcdot \bnabla f(R) \right ) - \Delta f(R). \end{equation} While there is no immediate reason to preclude the drag force from having a $z$-component, we will later show that there is none in the first-reflection approximation that we compute here. The average over the surface of a sphere of radius $r = a \zeta$ centred about $z = 0$ is given by, \begin{equation} \label{eq:VSDefineParallel} \bar{V}^S(\zeta) = \frac{1}{4 \upi\:\!} \int_{\theta = 0}^{\upi\:\!} \int_{\varphi = 0}^{2\upi\:\!} \sin \theta \,\mathrm{d}\theta \; \mathrm{d}\varphi \; V, \end{equation} as we do not have azimuthal symmetry in this case. Writing $\bnabla$ in the Cartesian coordinate system as \begin{equation*} \bnabla = \vec{\hat{e}}_x \left ( \frac{\partial}{\partial x} \right )_{y,\,z} + \vec{\hat{e}}_x \left ( \frac{\partial}{\partial y} \right )_{x,\,z} + \vec{\hat{e}}_z \left ( \frac{\partial}{\partial z} \right )_{x,\,y}, \end{equation*} we find from the coordinate conversion formulas~\eqref{eq:CoordConversionPerp} that $( {\partial r'}/{\partial x} )_{y,z} = {x}/{r'}$, and use this in the expression for $V$ to obtain, \begin{equation} \begin{aligned} \label{eq:VParallel} V &= \vec{\hat{e}}_x \bcdot \bnabla \left [ \frac{x}{r'} f'(r') \right ] - f''(r') - \frac{2 f'(r')}{r'} \\ &= \frac{x^2}{r'} \der{r'} \left [ \frac{f'(r')}{r'} \right ] - f''(r') - \frac{f'(r')}{r'} \\ &= \frac{x^2}{r'} \der{r'} \left [ \frac{f'(r')}{r'} \right ] - \frac{1}{r'} \der{r'} \left [ r' f'(r') \right ]. \end{aligned} \end{equation} We now write $x = r \sin \theta \cos \varphi$ in the expression for V and observe that $\int_0^{2\upi\:\!} \mathrm{d}\varphi \; \cos^2 \varphi = \upi\:\!$, whereby we may reduce \eqref{eq:VSDefineParallel} to, \begin{equation} \bar{V}^S(\zeta) = \frac{r^2}{4} \int_{0}^{\upi\:\!} \mathrm{d}\theta \; \sin^3\theta \; \frac{1}{r'} \der{r'} \left [ \frac{f'(r')}{r'} \right ] - \frac{1}{\epsilon \zeta} \int_{1-\epsilon \zeta/2}^{1+\epsilon \zeta/2} \mathrm{d}\xi \; \der{\xi} \left [\xi^2 F_0(\xi) \right ], \end{equation} where we have treated the second term in equation~\eqref{eq:VParallel} as we did in the case of perpendicular oscillations. For the first integral in the above equation, we note that since $r$ is constant, we may write $r^2 \sin^3 \theta \, \mathrm{d}\theta = (r \sin \theta \, \mathrm{d}\theta) r (1 - \cos^2 \theta) = - \mathrm{d}z \, (r^2 - z^2)/r$ and substitute for $z$ in terms of $r'$ to obtain, \begin{equation} \begin{aligned} \frac{r^2}{4} \int_{0}^{\upi\:\!} \mathrm{d}\theta \; \sin^3 \theta \; \frac{1}{r'} \der{r'} \left [ \frac{f'(r')}{r'} \right ] &= \frac{1}{4r} \int_{1-\epsilon \zeta/2}^{1+\epsilon \zeta/2} \frac{\mathrm{d}r'}{2h}\, r'^2 \der{r'} \left [ \frac{f'(r')}{r'} \right ] \\ &+ \frac{1}{2} \left [ - \frac{1}{2r} \int_{-r}^{r} \frac{\mathrm{d}z}{r'} (2h + z)^2 \der{r'} \left [ \frac{f'(r')}{r'} \right ] \right ]. \end{aligned} \end{equation} The second integral in the above expression was previously evaluated for the perpendicular case, so we may simply use the result. In non-dimensionalized variables, the first integral has the form \begin{equation} \frac{1}{2\epsilon \zeta} \int_{1-\epsilon\zeta/2}^{1+\epsilon\zeta/2} \mathrm{d}\xi \, \xi^2 \der{\xi} F_0(\xi), \end{equation} which may be easily integrated by parts and expressed in terms of $F_1(\xi)$. Thus, we have \begin{equation} \bar{V}^S(\zeta) = \frac{1}{\epsilon \zeta} \left [ (\xi - 1) F_1(\xi) - F_2(\xi) - \xi^2 F_0(\xi) \right ]_{1-\epsilon\zeta/2}^{1+\epsilon\zeta/2}, \end{equation} which simplifies to, \begin{equation} \bar{V}^S(\zeta) = 2 p \, \mathrm{e}^{-2\delta/\epsilon} \frac{\sinh (\delta \zeta )}{\epsilon \zeta} \left ( 1 + \frac{2 \delta}{\epsilon} + \frac{\epsilon}{2\delta} \right ) - q. \end{equation} The average $\bar{V}^S$ on the surface of the sphere $\partial S$ is just obtained by evaluating the above at $\zeta = 1$. As before, the volume average of V may be obtained, \begin{equation} \bar{V}^V = \frac{6 p}{\epsilon \delta^2} \left ( 1 + \frac{2 \delta}{\epsilon} + \frac{\epsilon}{2\delta} \right ) \mathrm{e}^{-2\delta/\epsilon} \left [ \delta \cosh \delta - \sinh \delta \right ] - q. \end{equation} We now adapt the generalised Fax\'{e}n theorem~\eqref{eq:Faxen} as we did in equation~\eqref{eq:FaxenForDragCoefficient} to obtain the drag coefficient $\gamma_{\|}^R$ as, \begin{equation} \label{eq:GammaParallelReflections} \frac{\gamma_{\|}^R}{\gamma_s} = \left (1 + \delta + \frac{\delta^2}{9} \right ) + \frac{3 \epsilon}{ 16 \delta^2} \left [ \epsilon^2 \left (1 + \delta + \frac{\delta^2}{3} \right )^2 - \mathrm{e}^{2 \delta (1 - 1/\epsilon)} (4 \delta^2 + 2 \epsilon \delta + \epsilon^2 ) \right ]. \end{equation} We will now show that there is no force along the $z$-direction to first order. The $z$-component of the first reflected field due to parallel oscillations of the sphere is given by, \begin{equation} \begin{aligned} v^{(1)}_{xz,\,\omega} &= \vec{\hat{e}}_z \bcdot \bnabla \left ( \vec{\hat{e}}_x \bcdot \bnabla f(r') \right ) - \vec{\hat{e}}_x \bcdot \vec{\hat{e}}_z \Delta f(r') \\ &= \vec{\hat{e}}_z \bcdot \bnabla \left ( \frac{x}{r'} f'(r') \right ) - 0 \\ &= \frac{(z+2h)x}{r'} \der{r'} \left[ \frac{f'(r')}{r'} \right ]. w\end{aligned} \end{equation} Substituting $x = r\sin \theta \cos \varphi$ as before, we see that the surface average $\bar{V}^S$ contains the integral $\int_0^{2\upi\:\!} \mathrm{d}\varphi \, \cos \varphi = 0$. Thus, the surface average vanishes on any spherical surface centred about $z = 0$, and consequently, the volume integral over the sphere $S$ also vanishes. \begin{figure} \centering \includegraphics[width=\textwidth]{CropFigure1.pdf} \caption{\label{fig:GammaReflections}Logarithmic plots of the normalised drag coefficient for a no-slip sphere (radius $a$) in a viscous fluid near a full-slip plane wall (distance $h$), for various values of $\epsilon = a/h$, obtained using the method of reflections (\S \ref{sec:reflection_method}) in the perpendicular direction~\eqref{eq:GammaPerpendicularReflections} (a) real part and (b) negative imaginary part, and in the parallel direction~\eqref{eq:GammaParallelReflections} (c) real part and (d) negative imaginary part. The drag coefficient is normalised to the steady free-space Stokes drag coefficient $\gamma_s$. The horizontal axis is the non-dimensionalized frequency of oscillation of the sphere $\omega \tau_f$, where $\tau_f = a^2 \rho_f / \eta$ is the timescale for vorticity diffusion over the size of the sphere.} \end{figure} The results from equations~\eqref{eq:GammaPerpendicularReflections} and~\eqref{eq:GammaParallelReflections} are plotted in figure~\ref{fig:GammaReflections} as a function of the non-dimensionalized frequency $\omega \tau_f = \mathrm{i\:\!} \delta^2$, where $\tau_f := a^2 \rho_f / \eta$ is the time-scale over which vorticity diffuses over the size of the sphere~\citep{franosch2011resonances}. \section{Comparison of the point-particle approximation and the method of reflections} \label{sec:comparison_of_results} In this section, we compare results for the drag coefficient for a sphere near a full-slip plane wall obtained by the two methods considered earlier, viz. the point-particle approximation (\S\ref{sec:point_particle_approximation}) and the method of reflections (\S\ref{sec:reflection_method}). Where relevant, we will also compare our modified point-particle approximation with the point-particle approximation as used by~\citet{felderhof2012PhysRevE}. While we may directly use the expressions for the reaction field tensor from~\citet{felderhof2012PhysRevE} in equation~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor} to compute the drag coefficients in the parallel and perpendicular directions, it is however useful for purposes of comparison to first put the expression for the drag coefficient in a form similar to those obtained using the method of reflections in equations~\eqref{eq:GammaPerpendicularReflections} and~\eqref{eq:GammaParallelReflections}. To effect this, we first assume that $\gamma_s \tens{R}$ is small (which we would expect to be true on physical grounds in the regime of validity of the point-particle approximation), whereby we may expand~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor} to first order in $\gamma_s \tens{R}$ to obtain\footnote{We remark that this form is likely inferior for numerical computations, since the original expression was in the form of a Pad\'{e} approximant, which has been observed in many cases to perform better (see section~\ref{sec:numerical_comparison}).}, \begin{equation} \begin{aligned} \label{eq:DragCoefficientTensorFromReactionFieldTensorApproximate} \pmb{\gamma} &= \gamma_0(\omega) \left [ \mathds{1} - ( 1 + \delta + \delta^2 / 3 ) \gamma_s \tens{R} \right ] - \frac{2}{9} \gamma_s \delta^2 (1 + \delta + \delta^2 / 3 ) \gamma_s \tens{R} + o[\gamma_s \tens{R}]\\ &= \gamma_0(\omega) \mathds{1} - \gamma_s ( 1 + \delta + \delta^2/3 )^2 (\gamma_s \tens{R}) + o[\gamma_s \tens{R}]. \end{aligned} \end{equation} Plugging in the expressions from~\citet[eq. (3.5) and (3.16)]{felderhof2012PhysRevE}, \begin{equation} \label{eq:FelderhofReactionField} \begin{aligned} \gamma_s R_{zz} &= \frac{3 \epsilon}{2} \left \{ -\frac{1}{4\nu^2} \left [ 1 - (1 + 2\nu) \mathrm{e}^{-2\nu} \right ] \right \}, \\ \gamma_s R_{xx} &= \frac{3 \epsilon}{2} \left \{ -\frac{1}{8\nu^2} \left [ 1 - (1 + 2\nu + 4\nu^2) \mathrm{e}^{-2\nu} \right ] \right \}, \end{aligned} \end{equation} for the components $R_{zz} := \hat{e}_z \bcdot \tens{R} \bcdot \hat{e}_z$ and $R_{xx} := \hat{e}_x \bcdot \tens{R} \bcdot \hat{e}_x$ of $\tens{R}$, where $\nu := \alpha h = \delta / \epsilon$, into the above expression, we obtain the expressions \begin{equation} \begin{aligned} \label{eq:PointParticleDragTensorApproximated} \frac{\gamma_{\perp}^P}{\gamma_s} &\approx \left ( 1 + \delta + \frac{\delta^2}{9} \right ) + \frac{3 \epsilon}{8 \delta^2} \left ( 1 + \delta + \frac{\delta^2}{3} \right )^2\; \left [ \epsilon^2 - \mathrm{e}^{-2\delta/\epsilon} \left ( 2 \epsilon \delta + \epsilon^2 \right ) \right ] \\ \frac{\gamma_\|^P}{\gamma_s} &\approx \left ( 1 + \delta + \frac{\delta^2}{9} \right ) + \frac{3 \epsilon}{16 \delta^2} \left ( 1 + \delta + \frac{\delta^2}{3} \right )^2\; \left [ \epsilon^2 - \mathrm{e}^{-2\delta/\epsilon} \left ( 4 \delta^2 + 2 \epsilon \delta + \epsilon^2 \right ) \right ]. \end{aligned} \end{equation} We now compare these against equations~\eqref{eq:GammaPerpendicularReflections} and~\eqref{eq:GammaParallelReflections} to find that the expressions from the two methods indeed differ, but in the factor in front of the subdominant (as $\epsilon \to 0^+$, $\delta$ fixed) exponential term $\mathrm{e}^{-2\delta/\epsilon}$. We shall show in the following sub-sections that in the regimes where the exponential terms actually matter, the two results agree to first order in $\epsilon$. Thus, unless the physics under investigation expressly relies on the subdominant terms, the results from the two methods agree to first order. \subsection{Asymptotic comparison} \label{sec:asymptotic_comparison} Since there are two length scales, there are four asymptotic regimes that we may consider, depending on how $\alpha$ compares with $a$ and $h$. Of particular interest here are two regimes -- the regime of low frequencies where $\alpha h \sim 1$, and that of high frequencies where $\alpha a \gg 1$. The former regime is of interest owing to our discussion about the subdominant exponential terms (sections~\ref{sec:all_orders} and~\ref{sec:comparison_of_results}). The latter regime is of interest owing to the discrepancy in effective mass mentioned in the introduction. It can be easily verified that the results from the method of reflections as well as the modified point-particle approximation agree in the regime of intermediate frequencies $\alpha a \sim 1$. \suppress{ \subsubsection{Steady drag coefficient} We now take the $\omega \to 0$ limit of the drag coefficients computed through either method, and check that they agree with results from previous calculations in the regime of steady Stokes flow. This also corresponds to the regime where $\alpha^{-1} \gg h \gg a$, i.e. the skin-depth of the vorticity is larger than the other length scales in the problem. In the point-particle calculation, this is achieved by taking the $\omega \to 0$ limit of~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor} and using the zero-frequency asymptotics of $R_{xx}$ and $R_{zz}$ as given by~\citet[equations (4.7) and (3.5)]{felderhof2012PhysRevE}. We obtain, \begin{equation} \frac{\tens{\pmb{\gamma}}^P}{\gamma_s} \sim (\mathds{1} + \gamma_s \tens{R})^{-1} \qquad (\omega \to 0), \end{equation} whereby, \begin{equation} \begin{aligned} \frac{\gamma_\perp^P}{\gamma_s} &\sim \frac{1}{1 - \frac{3}{4} \frac{a}{h}} = 1 + \frac{3}{4} \left ( \frac{a}{h} \right ) + o(a/h), \\ \frac{\gamma_\|^P}{\gamma_s} &\sim \frac{1}{1 + \frac{3}{8} \frac{a}{h}} = 1 - \frac{3}{8} \left ( \frac{a}{h} \right ) + o(a/h). \end{aligned} \qquad (\omega \to 0) \end{equation} In the results from the method of reflections, this is achieved by taking $\delta \to 0$ with $\epsilon$ fixed in equations~\eqref{eq:GammaPerpendicularReflections} and~\eqref{eq:GammaParallelReflections}. We thus obtain, \begin{equation} \begin{aligned} \frac{\gamma_\perp^R}{\gamma_s} &\sim 1 + \frac{5}{8} \epsilon^3 - \frac{3\epsilon^3}{8} \left ( -\frac{2}{\epsilon^2} + 2 \right ) = 1 + \frac{3}{4}\epsilon + o(\epsilon), \\ \frac{\gamma_\|^R}{\gamma_s} &\sim 1 - \frac{3}{8} \epsilon - \frac{1}{16} \epsilon^3 = 1 - \frac{3}{8} \epsilon + o(\epsilon). \end{aligned} \qquad (\omega \to 0) \end{equation} Thus, the two methods agree with results obtained through image systems for steady Stokes flows~\citep{frydel2006latticeboltzmann}. The steady-state drag coefficient for motion parallel to a full-slip flat wall is indeed smaller than the bulk drag coefficient, which has been verified by experiment~\citep{wang2009diffusion}. } \subsubsection{Low frequencies} We now consider non-zero, but low frequencies, where $\nu := \alpha h \sim 1$ but $\delta = \alpha a \ll 1$, i.e. the skin-depth of vorticity is comparable to the sphere-wall separation, and is much larger than the size of the sphere. In the point-particle calculation, no approximation can be made in the expressions for the reaction field tensor~\citep[equations (3.5) and (3.16)]{felderhof2012PhysRevE} in this regime. However, we substitute $\delta = \epsilon \nu$ in~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor} and keep terms to first order in $\epsilon$ while noting that $\gamma_s \tens{R}$ is first order in $\epsilon$ to obtain, \begin{equation} \tens{\pmb{\gamma}} \sim \gamma_s \left [ \mathds{1}( 1 + \epsilon \nu) - \gamma_s \tens{R} \right ], \end{equation} which, upon substitution for the components of $\tens{R}$ yields \begin{equation} \begin{aligned} \frac{\gamma_\perp^P}{\gamma_s} &\sim 1 + \epsilon \nu + \frac{3 \epsilon}{8\nu^2} \left [ 1 - \left ( 1 + 2\nu \right ) \mathrm{e}^{-2\nu} \right ] + o(\epsilon), \\ \frac{\gamma_\|^P}{\gamma_s} &\sim 1 + \epsilon \nu + \frac{3 \epsilon}{16 \nu^2} \left [ 1 - \left ( 1 + 2\nu + 4\nu^2 \right ) \mathrm{e}^{-2\nu} \right ] + o(\epsilon). \end{aligned} \end{equation} For the results from the method of reflections, we once again substitute $\delta = \epsilon \nu$ in equations~\eqref{eq:GammaPerpendicularReflections} and~\eqref{eq:GammaParallelReflections} and keep terms to first order in $\epsilon$, and obtain the same results as above for $\gamma_\perp^R$ and $\gamma_\|^R$. Thus, even where the subdominant exponential terms are important, the two results agree to lowest order in $\epsilon$. We may also take the $\alpha \to 0$ limit in the above and as expected, we recover expressions that agree with results obtained through image systems for steady Stokes flows~\citep{frydel2006latticeboltzmann}. \suppress{ \subsubsection{Intermediate frequencies} We now consider the range of frequencies where $\nu = \alpha h \gg 1$, but $\delta = \alpha a \sim 1$, i.e. the skin-depth of vorticity is much smaller than the sphere-wall distance, but is comparable to the size of the sphere. In the point-particle calculation, we substitute $\nu = \delta / \epsilon$ in the asymptotic forms as $\nu \to +\infty$ of the expressions for the reaction field tensor~\citep[equations (3.5) and (3.16)]{felderhof2012PhysRevE} to obtain, \begin{equation} \label{eq:ReactionFieldTensorAsymptoticForms} \begin{aligned} \gamma_s R_{zz} &\sim -\frac{3 \epsilon^3}{8 \delta^2}, \\ \gamma_s R_{xx} &\sim -\frac{3 \epsilon^3}{16 \delta^2}. \end{aligned} \qquad (\nu \to +\infty, \delta \sim 1) \end{equation} Given that the components of $\tens{R}$ are of order $\epsilon^3$, we may use~\eqref{eq:DragCoefficientTensorFromReactionFieldTensorApproximate} to obtain \begin{equation} \begin{aligned} \frac{\gamma_\perp^P}{\gamma_s} &\sim \left (1 + \delta + \frac{\delta^2}{9} \right ) + \frac{3 \epsilon^3}{8 \delta^2} \left ( 1 + \delta + \frac{\delta^2}{3} \right )^2 + o(\epsilon^3), \\ \frac{\gamma_\|^P}{\gamma_s} &\sim \left (1 + \delta + \frac{\delta^2}{9} \right ) + \frac{3 \epsilon^3}{16 \delta^2} \left ( 1 + \delta + \frac{\delta^2}{3} \right )^2 + o(\epsilon^3). \end{aligned} \qquad (\delta / \epsilon \to +\infty) \end{equation} For the results from the method of reflections, we simply drop the terms containing subdominant exponential factors of the form $\mathrm{e}^{-\delta / \epsilon}$ in equations~\eqref{eq:GammaPerpendicularReflections} and~\eqref{eq:GammaParallelReflections}, and it is seen by inspection that we obtain the same results as above for $\gamma_\perp^R$ and $\gamma_\|^R$. } \subsubsection{High frequencies} \label{sec:potential_flow} We finally consider the range of frequencies $\omega \gg \eta / (\rho_f a^2)$, where $1/|\alpha| \ll a \ll h$. In this regime, we expect that the viscous contributions to the drag coefficient are negligible compared to the inertial contributions, i.e. the added mass term. For instance, in the case of a spherical particle in an unbounded fluid medium, the drag coefficient in this regime $\gamma_0(\omega) \sim \gamma_s \delta^2 / 9 = - \mathrm{i\:\!} \omega m_f / 2$, which is the added mass contribution from the fluid. The added mass of a particle executing small oscillations in a fluid is usually obtained by means of potential flow~\citep[see e.g.][]{landaulifshitz1987fluid,brennen1982review}. In particular, the added mass of a spherical particle near a plane wall is a well-studied problem~\citep{lamb1932hydrodynamics,milne1968theoretical,yang2010addedmass}, and the expressions for the effective masses in this case, \begin{equation} \begin{aligned} \label{eq:EffectiveMassPlaneWall} m^\ast_\perp &= m_p + \frac{m_f}{2} \left [ 1 + \frac{3}{8} \left (\frac{a}{h} \right )^3 \right ], \\ m^\ast_{\|} &= m_p + \frac{m_f}{2} \left [ 1 + \frac{3}{16} \left (\frac{a}{h} \right )^3 \right ], \end{aligned} \end{equation} are well-known. It must be noted that owing to the absence of $\Delta \vec{v}_\omega$, the differential equation is of lower order, whereby fewer boundary conditions are needed for the potential flow calculation, and thus the added mass obtained from potential flow does not distinguish between full-slip and no-slip boundary conditions. It has been pointed out~\citep{mo2015pre} that Felderhof's expressions do not agree with these results. As pointed out by~\citet{zwanzig1975}, the velocity auto-correlation function for a Brownian particle in an incompressible fluid asymptotes to $k_B T / m^\ast$ as $t \to 0$, where $m^\ast$ is the effective mass of the particle in the fluid.\footnote{The apparent contradiction with the energy equipartition theorem, which reports a $k_B T / m$ asymptote, is resolved by including the effects of compressibility.} This has been verified in unbounded fluid by experiments~\citep{kheifets2014science,mo2015opex}. However, the results from~\citet[eq. (4.5)]{felderhof2005JPhysChemB} (see also erratum~\citet{felderhof2005erratum}) suggest values for the added masses as $(m_f/2)( 1 + a^3/(8h^3) + o(a^3/h^3) )$ and $(m_f/2) ( 1 + a^3/(16h^3) + o(a^3/h^3))$. As we will presently demonstrate, this discrepancy is resolved by our modification of the point-particle framework described in sections~\ref{sec:induced_force} and~\ref{sec:consequences_correction}. In our modified point-particle framework, we take the asymptotics of the components of the reaction field tensor as $\nu \to \infty$ to obtain \begin{equation} \begin{aligned} \gamma_s R_{zz} &\sim -\frac{3 \epsilon}{8 \nu^2}, \\ \gamma_s R_{xx} &\sim -\frac{3 \epsilon}{16 \nu^2}. \end{aligned} \qquad (\nu \to +\infty) \end{equation} We then replace $\delta = \epsilon \nu$ in~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor}, substitute the above asymptotic forms for the components of $\tens{R}$, and expand to lowest order in $\epsilon$ to obtain, \begin{equation} \begin{aligned} \frac{\gamma_\perp^P}{\gamma_s} &\sim \frac{1}{9} \epsilon^2 \nu^2 \left ( 1 + \frac{3}{8} \epsilon^3 \right ) + o(\epsilon^5),\\ \frac{\gamma_\|^P}{\gamma_s} &\sim \frac{1}{9} \epsilon^2 \nu^2 \left ( 1 + \frac{3}{16} \epsilon^3 \right ) + o(\epsilon^5). \end{aligned} \qquad (\nu \to +\infty) \end{equation} Thereafter, identifying $\epsilon^2 \nu^2 / 9 = -\mathrm{i\:\!} \omega m_f / 2$, we obtain added masses consistent with the effective masses given in~\eqref{eq:EffectiveMassPlaneWall}. For the results from the method of reflections, we take the asymptotic as $\delta \to \infty$ with fixed $\epsilon$ in equations~\eqref{eq:GammaPerpendicularReflections} and~\eqref{eq:GammaParallelReflections}. The subdominant exponential terms drop and we are left with \begin{equation} \begin{aligned} \frac{\gamma_\perp^R}{\gamma_s} &\sim \frac{1}{9} \delta^2 \left ( 1 + \frac{3}{8} \epsilon^3 \right ), \\ \frac{\gamma_\|^R}{\gamma_s} &\sim \frac{1}{9} \delta^2 \left ( 1 + \frac{3}{16} \epsilon^3 \right ), \end{aligned} \qquad (\delta \to +\infty) \end{equation} which are once again consistent with the results from the modified point-particle approximation and with calculations from potential flow~\citep{lamb1932hydrodynamics,milne1968theoretical,brennen1982review}. \subsection{Numerical comparison} \label{sec:numerical_comparison} In this section, we present numerical comparisons of predictions for the drag coefficients from three methods -- the point-particle approximation proposed by~\citet{felderhof2012PhysRevE}, the modified point-particle approximation presented in this work (\S~\ref{sec:point_particle_approximation}), and the method of reflections (\S~\ref{sec:reflection_method}). Generally speaking, for purposes of numerical evaluation, it is likely that keeping the expression for $\dragtensornoarg(\omega)$ in the form of a Pad\'{e} approximant as in equation \eqref{eq:DragCoefficientTensorFromReactionFieldTensor} gives better results. In the context of the method of reflections for the steady Stokes equations,~\citet[][chap. 7]{happel1965} suggest the use of a geometric series extrapolation to account for higher order reflections in the absence of any further information, which essentially amounts to turning the result from the method of reflections into a Pad\'{e} approximant. We also noted this when we computed the perturbative result to all orders in section~\ref{sec:all_orders}. Several experiments have employed the Pad\'{e} form of the steady drag~\citep[][Fig. 2]{schaffer2007surface,mo2015pre} with good results. However, in order to appropriately compare and highlight the differences between the theories, it is necessary that we compare results expressed in similar forms. In the plots that follow, when comparing the method of reflections against the modified point-particle approximation (figure~\ref{fig:ReflectionsVsPPA} \suppress{and figure~\ref{fig:ReflectionsVsPPAError}}), we use the form of~\eqref{eq:PointParticleDragTensorApproximated} for the point-particle approximation. When comparing the modified point-particle approximation against that of~\cite{felderhof2012PhysRevE} (figures~\ref{fig:PPAVsFelderhof} and~\ref{fig:PPAVsFelderhofError}), we shall use the original forms from equations~\eqref{eq:DragCoefficientTensorFromAdmittanceUnmodified} and~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor}. We obtain the drag coefficients from Felderhof's point-particle framework by setting the expression for the admittance from~\citet[][equation (2.9)]{felderhof2012PhysRevE} equal to~\eqref{eq:AdmittanceWithoutTrap}: \begin{equation} \label{eq:DragCoefficientTensorFromAdmittanceUnmodified} \tens{\pmb{\gamma}}^F(\omega) = \mathrm{i\:\!} \omega m_p \mathds{1} + \left ( -\mathrm{i\:\!} \omega m_p + \gamma_0 \right ) \left [ \mathds{1} + \left (1 + \delta + \frac{\delta^2}{3} \right ) \gamma_s \tens{R} \right ]^{-1}. \end{equation} We observe that unlike with the other results, the drag coefficient depends on the mass of the particle $m_p$, which does not cancel out even if we expand to first order in $\gamma_s \tens{R}$. The drag coefficients from the modified point-particle framework are calculated from~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor} using the expressions for the reaction field tensor from~\citet[equations (3.5) and (3.16)]{felderhof2012PhysRevE}, which we have reproduced in equation~\eqref{eq:FelderhofReactionField}. Figure~\ref{fig:ReflectionsVsPPA} compares the real and imaginary parts of drag coefficients for a no-slip sphere near a full-slip wall obtained from the method of reflections, and from the modified point-particle approximation for the case of $\epsilon = a/h = 0.5$. The free-space drag coefficient $\gamma_0(\omega)$ has been subtracted in order to clearly show the difference between the methods. The inset in sub-figure (c) shows a log-log plot of $\Real (\gamma_\| / \gamma_s)$, i.e. without subtraction of the free-space drag coefficient, exemplifying the excellent agreement between the two methods even for the large value of $\epsilon$. \suppress{The relative discrepancy between these two methods, calculated as $|\gamma^R - \gamma^P|/|\gamma^P|$ and expressed as a percentage, is plotted in figure~\ref{fig:ReflectionsVsPPAError} for different values of $\epsilon$. As expected, the discrepancy becomes larger as the value of the small parameter $\epsilon$ increases, i.e. as the particle is moved closer to the wall, but is still quite small even for $\epsilon = 0.5$ when the particle's centre is one diameter away from the wall.} Figure~\ref{fig:PPAVsFelderhof} compares the real and imaginary parts of drag coefficients for a no-slip sphere near a full-slip wall obtained from Felderhof's point-particle approximation, and from the modified point-particle framework, for the case of $\epsilon = 0.5$ and $\rho_p = 19 \rho_f$. If the liquid is water, this density corresponds roughly to that of gold particles. As before, the free-space drag coefficient $\gamma_0(\omega)$ has been subtracted in order to clearly highlight the disagreement between the methods at high frequencies. The inset in sub-figure (c) shows a log-log plot of $\Real (\gamma_\| / \gamma_s)$, i.e. without subtraction of the free-space drag coefficient, showing that there is still visible disagreement between the two methods for large $\rho_p / \rho_f$. The relative error between these two approximations, calculated as $|\gamma^F - \gamma^P|/|\gamma^P|$ and expressed as a percentage, is plotted in figure~\ref{fig:PPAVsFelderhofError} for different values\footnote{If the liquid is water, the values 2, 4 and 19 for $\rho_p/\rho_f$ roughly correspond to particles made of silica glass, Barium Titanate glass, and gold respectively. These are common choices in optical tweezers experiments.} of $\rho_p$. The error is zero when $\rho_p = \rho_f$, and the errors become larger as $\rho_p$ deviates from $\rho_f$. Figure~\ref{fig:AddedMassCheck} shows the high-frequency behaviour of the imaginary components of the drag coefficients from Felderhof's version, and from the modified version of the point-particle approximation on a log-log scale. A line corresponding to the added mass contribution predicted from potential flow~\citep{milne1968theoretical} is shown. The plots show the agreement of the modified point-particle approximation with the potential flow results at high frequencies. \begin{figure} \centering \includegraphics[width=\textwidth]{CropFigure2.pdf} \caption{\label{fig:ReflectionsVsPPA}Semi-logarithmic plots comparing the results for the drag coefficient of a no-slip sphere near a full-slip plane wall ($\epsilon = 0.5$) from the method of reflections (\S \ref{sec:reflection_method}) and the modified point-particle approximation (``Modified PPA'') (\S \ref{sec:point_particle_approximation}) in the perpendicular direction (a) real part and (b) imaginary part, and in the parallel direction (c) real part and (d) imaginary part. In each case, the free-space drag coefficient $\gamma_0(\omega)$ has been subtracted in order to clearly highlight the small differences, and the coefficients have been normalised by $\gamma_s$. The inset in (c) shows a log-log plot of the real parts of the normalised drag coefficients in the parallel direction without subtraction of $\gamma_0$.} \end{figure} \suppress{ \begin{figure} \centering \includegraphics[width=\textwidth]{CropFigure3.pdf} \caption{\label{fig:ReflectionsVsPPAError}Semi-logarithmic plots of the percentage discrepancy between the drag coefficients obtained through the two approximation methods plotted in figure~\ref{fig:ReflectionsVsPPA}, calculated using $100\% \left | \gamma^R - \gamma^P \right | / \left | \gamma^P \right |$ for various values of $\epsilon$ (a) in the perpendicular direction, (b) in the parallel direction to the wall. As expected, the discrepancy becomes very small at small $\epsilon$, i.e. when the particle is further from the wall.} \end{figure} } \begin{figure} \centering \includegraphics[width=\textwidth]{CropFigure4.pdf} \caption{\label{fig:PPAVsFelderhof}Semi-logarithmic plots comparing the results for the drag coefficient of a no-slip sphere near a full-slip plane wall ($\epsilon = 0.5$) from the point-particle approximation of~\citet{felderhof2012PhysRevE} (``Felderhof's PPA'') and the modified version of the point-particle approximation described in \S \ref{sec:point_particle_approximation} (``Modified PPA'') in the perpendicular direction (a) real part and (b) imaginary part, and in the parallel direction (c) real part and (d) imaginary part. In each case, the free-space drag coefficient $\gamma_0(\omega)$ has been subtracted in order to clearly highlight the differences, and the coefficients have been normalised by $\gamma_s$. Since the drag coefficient~\eqref{eq:DragCoefficientTensorFromAdmittanceUnmodified} from Felderhof's PPA depends on the density of the particle $\rho_p$, we set $\rho_p = 19 \rho_f$ (which is approximately the case for gold particles in water) to highlight the differences. The inset in (c) shows a log-log plot of the real parts of the normalised drag coefficients in the parallel direction without subtraction of $\gamma_0$.} \end{figure} \begin{figure} \centering \includegraphics[width=\textwidth]{CropFigure5.pdf} \caption{\label{fig:PPAVsFelderhofError}Semi-logarithmic plots of the percentage error between the drag coefficients for a no-slip sphere near a full-slip plane wall obtained from Felderhof's PPA and the Modified PPA and calculated as $100\% \left | \gamma^F - \gamma^P \right | / \left | \gamma^P \right |$, for various values of particle density $\rho_p$ ($\epsilon = 0.5$) (a) in the perpendicular direction, (b) in the parallel direction to the wall.} \end{figure} \begin{figure} \centering \includegraphics[width=\textwidth]{CropFigure6.pdf} \caption{\label{fig:AddedMassCheck}Logarithmic plots of $-\Imag(\gamma - \gamma_0)/\gamma_s$ for a no-slip sphere near a full-slip plane wall obtained from the modified (solid orange) and from Felderhof's original (dashed blue line) point-particle approximation against non-dimensionalized frequency $\omega \tau_f$. The region of slope $1$ of these lines represents the regime where the term corresponding to the increase in added mass due to the boundary is dominant. The dotted orange line plots the added mass correction from potential flow calculations. Values $\epsilon = 0.5$ and $\rho_p = 19 \rho_f$ are chosen to highlight the difference. It is observed that the modified point-particle approximation reproduces the results from potential flow at high frequencies.} \end{figure} \section{Application to Brownian Motion} \label{sec:brownian_motion} As discussed earlier, the short time-scale aspects of Brownian motion are relevant to fundamental science, microrheology, and to the calibration of instruments such as optical tweezers, as thermal fluctuations play a significant role in these applications. In this section, we discuss the application of these drag coefficient results to the problem of equilibrium Brownian motion of a spherical particle near a full-slip flat wall. We will also present the results for a no-slip wall from the modified point-particle approximation, owing to its practical importance, and the discussion in~\citet[][\S II]{mo2015pre}. In both cases, we will analyse only the translational motion, and ignore the rotational motion of the particle. This section includes a self-contained review of the theory, and a numerical analysis. More detailed expositions of a general nature may be found in~\citet{li2013annalen} for example. The long time-scale aspects of Brownian motion in a gas are well-modelled by employing the steady Stokes drag as a dissipation model. However, in a dense fluid, Brownian motion is heavily influenced by the inertia of the fluid. Since the Reynolds number in many practical applications is very low ($\sim 10^{-4}$), it suffices for many purposes to retain only the $\partial \vec{v} / \partial t$ and drop the advective term. Thus, unsteady Stokes friction provides a good model for the dissipation~\citep{zwanzig1970hydrodynamicVACF,clercx1992brownian}. Of particular importance are the long-time power law tails of the velocity auto-correlation function, which may be explained using the unsteady Stokes friction. We note that to the approximation that $\dragtensornoarg(\omega)$ is diagonal, the equation of motion of the Brownian particle decouples into its Cartesian components, so we may treat the motion perpendicular to and that parallel to a wall separately. This also holds true of the resulting predictions for statistical properties of the particle, such as power spectra and auto-correlation functions. We also note that in our calculation of $\dragtensornoarg(\omega)$, we used the generalised Fax\'{e}n theorem of~\citet{mazur1974faxen}, which assumes that the particle's boundary does not execute significant motion, whereby boundary conditions are applied on a stationary surface. This assumption would be valid if the particle were confined by a tight potential~\citep{clercx1992brownian,franosch2009persistent}, which is fortunately indeed the case in many of the aforementioned practical applications. Therefore, adding a harmonic restoring force to the equation of motion of the body bestows our model with theoretical consistency as well as enhances its practical application. For simplicity, we shall assume that the tensor $\tens{K}$ of restoring force coefficients is diagonal in the basis suggested by the geometry of the sphere and wall. Once the admittance~\eqref{eq:AdmittanceWithTrap} is known, the velocity auto-correlation function (VACF) $\tens{C}_v(t)$ of the Brownian particle may be calculated by inverting a Green-Kubo relation to obtain~\citep[][eq. 19]{franosch2009persistent} \begin{equation} \label{eq:GreenKubo} \tens{C}_v(t) = \frac{2 k_B T}{\upi\:\!} \int_0^\infty \mathrm{d}\omega\,\cos(\omega t)\,\Real[\tens{Y}_\omega]. \end{equation} The position auto-correlation function $\tens{C}_x(t)$ may be computed in a similar manner by using the mechanical susceptibility $\tens{Y}_\omega / (-\mathrm{i\:\!} \omega)$ in place of the admittance in~\eqref{eq:GreenKubo}. Whereas the cosine transform in~\eqref{eq:GreenKubo} may be computed analytically for the case of a sphere in an unbounded medium, one has to resort to numerical evaluation in most other cases\footnote{An algorithm for quadrature of oscillatory integrals such as a Filon-Trapezoid rule~\citep{tuck1967filon,franosch2009persistent} may be used.}. The (two-sided) power spectral density of position ($\tens{S}_x$) and velocity ($\tens{S}_v$) fluctuations may also be computed through~\citep{franosch2009persistent,mo2015pre}, \begin{equation} \begin{aligned} \tens{S}_x(\omega) &= \frac{2 k_B T}{\omega^2} \Real[ \tens{Y}_\omega ],\\ \tens{S}_v(\omega) &= 2 k_B T\, \Real[ \tens{Y}_\omega ]. \end{aligned} \end{equation} Assuming $\dragtensornoarg(\omega)$ and $\tens{K}$ are diagonal, the mean-squared displacement (MSD) of the Brownian particle may be defined as \begin{equation} \langle \Delta x_i^2(t) \rangle := \left < [ x_i(\tau + t) - x_i(\tau) ]^2 \right > \end{equation} for each component $x_i$ of the position $\vec{x}(t)$ of the particle. $\left < \; \right >$ denotes averaging over the ensemble of possible Brownian trajectories. The mean-squared displacement may be related to the position auto-correlation function through \begin{equation} \langle \Delta x_i^2(t) \rangle = 2 \left [ k_B T / K_{ii} - C_{x,ii}(t) \right ], \end{equation} where $K_{ii}$ and $C_{x,ii}$ denote the $i, i$ components of the diagonal tensors $\tens{K}$ and $\tens{C}_x$ respectively. An alternative way to describe the Brownian motion of the particle is to use a stochastic equation of motion (often called a Generalised Langevin Equation) for the particle \begin{equation} \left[ -\mathrm{i\:\!} \omega m_p \mathds{1} + \dragtensornoarg(\omega) - \tens{K} / (\mathrm{i\:\!} \omega) \right ] \vec{u}_\omega = \vec{F}^\mathrm{th}_\omega, \end{equation} which we have written above in frequency domain. The Langevin force $\vec{F}^{\mathrm{th}}_\omega$ represents the effects of thermal fluctuations in the fluid, and is typically modelled by a stationary stochastic process. In the Einstein-Ornstein-Uhlenbeck model of Brownian motion, which uses the steady Stokes drag, this stochastic process is assumed to be white Gaussian noise. However, this choice is inconsistent with the fluctuation-dissipation theorem when the damping in the equation is frequency-dependent. The theorem instead demands a coloured noise with a (two-sided) spectrum given by~\citep{balakrishnan1979fluctuation,franosch2011resonances}, \begin{equation} \tens{S}_F(\omega) = 2 k_B T\, \Real[ \dragtensornoarg(\omega) ]. \end{equation} It has been experimentally observed~\citep{mo2015pre} that the point-particle approximation using expression~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor} performs surprisingly well for large values of $\epsilon \approx 0.5$, i.e. when the particle is one diameter away from the wall. Motivated by this, when comparing predictions for Brownian motion from the various theories (\S \ref{sec:brownian_motion}), we cast the expressions from the method of reflections in the (Pad\'{e}-like) form suggested by equation~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor} (see also \S\ref{sec:numerical_comparison}), \begin{equation} \label{eq:GammaReflectionsPade} \frac{\gamma^R_{\perp,\|}}{\gamma_s} = \frac{\mathrm{i\:\!} \omega m_f}{\gamma_s} + \frac{\left ( \tilde{\gamma}_0 / \gamma_s \right )^2}{\tilde{\gamma}_0 / \gamma_s - \Xi_{\perp,\|}(\epsilon, \delta)} + o[\Xi_{\perp,\|}], \end{equation} where the correction terms for the full-slip wall are given by, \begin{equation} \begin{aligned} \Xi_{\perp}(\epsilon, \delta) &= \frac{3 \epsilon}{8 \delta^2} \left [ \epsilon^2 \left ( 1 + \delta + \frac{\delta^2}{3} \right )^2 - \mathrm{e}^{2\delta(1-1/\epsilon)} \left ( 2 \epsilon \delta + \epsilon^2 \right ) \right ], \\ \Xi_{\|}(\epsilon, \delta) &= \frac{3 \epsilon}{16 \delta^2} \left [ \epsilon^2 \left ( 1 + \delta + \frac{\delta^2}{3} \right )^2 - \mathrm{e}^{2\delta(1-1/\epsilon)} \left ( 4\delta^2 + 2 \epsilon \delta + \epsilon^2 \right ) \right ]. \end{aligned} \end{equation} We may now use the expressions for the admittance and the drag coefficients from the three theories and compare the predictions for the Brownian motion of a no-slip spherical particle near a full-slip flat wall. We denote the components of the various diagonal tensors by $\perp$ and $\|$ just as we have done for the drag coefficient tensor. To make connection with experiment, we will use exemplary parameters that are typical of optical tweezers experiments~\citep[see][]{jeney2008boundary,mo2015pre,mo2015opex}. The same methods of numerical computation of the theoretical predictions described in~\S IV of~\citet{mo2015pre} are employed here. It must be noted that it is not clear which of the two methods -- the modified point-particle approximation, or the method of reflections -- performs better in practice, without higher order calculations or evidence from sophisticated experiments. \begin{figure} \centering \includegraphics[width=\textwidth]{Perpendicular.png} \caption{\label{fig:PerpendicularBM}Logarithmic plots of predictions for the statistical properties of the Brownian motion of a silica glass sphere of $2a = 3$ $\mu$m diameter confined by a harmonic trap of stiffness $K = 100$ pN/$\mu$m at a distance of $h = 3$ $\mu$m from a full-slip plane wall in water, in the direction perpendicular to the wall. The solid red line shows the predictions using Felderhof's point-particle approximation without modification~\citep{felderhof2012PhysRevE}. The long-dashed green line shows predictions from the point-particle approximation with our modifications (\S~\ref{sec:point_particle_approximation}). The short-dashed blue line shows predictions from the method of reflections (\S~\ref{sec:reflection_method}). The black line of varying dash length shows the predictions for a similar particle in unbounded fluid, i.e. in the absence of a wall. Sub-figure (a) shows the mean-squared displacement (MSD) $\left <\Delta x_\perp^2(t) \right >$ as a function of time, (b) shows the one-sided power spectral density of velocity fluctuations $2 S^\perp_v$, (c) shows the absolute value of the velocity auto-correlation function $C^\perp_{v}(t)$, normalised by $C^\perp_{v}(0) = k_BT/m^\ast_\perp$, and (d) shows the one-sided power spectral density of the Langevin force $2 S^\perp_F$. The cusps in sub-figure (c) correspond to zero crossings, and are a result of the presence of the harmonic trap. The method of reflections and point-particle approximation agree very well for these parameters, despite the large value of $\epsilon = 0.5$.} \end{figure} Figure~\ref{fig:PerpendicularBM} compares predictions for the statistical properties of Brownian motion (temperature $T = 295$ K) of a harmonically confined (trap stiffness $K = 100$ pN/$\mu$m) spherical Silica glass (density $\rho_p = 2.0 \rho_f$) particle (diameter $2a = 3$ $\mu$m) near ($\epsilon = a/h = 0.5$) a full-slip wall in water (density $\rho_f = 1000$ kg/m$^3$, viscosity $\eta = 10^{-3}$ $\mathrm{Pa} \cdot \mathrm{s}$) in the perpendicular direction to the wall from three theories for the drag coefficient -- Felderhof's point-particle approximation, the modified point-particle approximation, and the method of reflections. Also shown for comparison are the predictions using the free-space drag coefficient $\gamma_0(\omega)$. Sub-figure (a) shows the mean-square displacement (MSD), (b) shows the (one-sided) power spectral density of velocity fluctuations $2 S^\perp_v$, (c) shows the velocity auto-correlation function $C^\perp_v(t) = \langle u_\perp(\tau) u_\perp(t + \tau) \rangle$, and (d) shows the (one-sided) power spectrum of the Langevin force $2 S^\perp_F$. \begin{figure} \centering \includegraphics[width=\textwidth]{Parallel.png} \caption{\label{fig:ParallelBM}Logarithmic plots of predictions for the statistical properties of the Brownian motion of a silica glass sphere of $2a = 3$ $\mu$m diameter confined by a harmonic trap of stiffness $K = 100$ pN/$\mu$m at a distance of $h = 3$ $\mu$m from a full-slip plane wall in water, in the direction parallel to the wall. The solid red line shows the predictions using Felderhof's point-particle approximation without modification~\citep{felderhof2012PhysRevE}. The long-dashed green line shows predictions from the point-particle approximation with our modifications (\S~\ref{sec:point_particle_approximation}). The short-dashed blue line shows predictions from the method of reflections (\S~\ref{sec:reflection_method}). The black line of varying dash length shows the predictions for a similar particle in unbounded fluid, i.e. in the absence of a wall. Sub-figure (a) shows the mean-squared displacement (MSD) $\left <\Delta x_\|^2(t) \right >$ as a function of time, (b) shows the one-sided power spectral density of velocity fluctuations $2 S^\|_v$, (c) shows the absolute value of the velocity auto-correlation function $C^{\|}_{v}(t)$, normalised by $C^\|_{v}(0) = k_BT/m^\ast_\|$, and (d) shows the one-sided power spectral density of the Langevin force $2 S^\|_F$. The cusps in sub-figure (c) correspond to zero crossings, and are a result of the presence of the harmonic trap. The method of reflections and point-particle approximation agree very well for these parameters, despite the large value of $\epsilon = 0.5$.} \end{figure} Figure~\ref{fig:ParallelBM} compares predictions for the same statistical properties of Brownian motion for the same system, in the parallel direction to the full-slip wall from the same three theories. As before, (a) shows the MSD, (b) shows the velocity PSD, (c) shows the VACF, and (d) shows the PSD of the Langevin force. While it seems a formidable task to implement the method of reflections without approximation in the case of a no-slip wall, the calculation using the point-particle approximation is tractable and has been accomplished by~\citet{felderhof2005JPhysChemB} (also see errata~\citet{felderhof2005erratum}). Felderhof's results for the reaction field tensor may be employed in~\eqref{eq:DragCoefficientTensorFromReactionFieldTensor} to obtain predictions for the case of a no-slip wall that retain the benefits of our modification~\citep[see][]{mo2015pre}. \begin{figure} \centering \includegraphics[width=\textwidth]{VACFDiscrepancy.png} \caption{\label{fig:VACFDiscrepancy}Semi-logarithmic plots of the predictions for the velocity auto-correlation function (VACF) of a $3$ $\mu$m diameter gold ($\rho_p = 19.3 \times 10^3$ kg/m$^3$) sphere in acetone ($\rho_f = 790$ $\mathrm{kg}/\mathrm{m}^3$), harmonically confined ($K = 200$ pN/$\mu$m) at a distance of $h = 3$ $\mu$m from a flat wall at a temperature $T = 295$ K. The solid red line shows the predictions using Felderhof's point-particle approximation without modification~\cite{felderhof2012PhysRevE,felderhof2005JPhysChemB,felderhof2005erratum}. The long-dashed green line shows predictions from the modified point-particle approximation (\S~\ref{sec:point_particle_approximation}). The short-dashed blue line in sub-figures (a) and (b) shows predictions from the method of reflections (\S~\ref{sec:reflection_method}). The black line of varying dash length shows the predictions for a similar particle in bulk fluid, i.e. in the absence of a wall. Sub-figures (a) and (b) show the results for a full-slip wall in the perpendicular and parallel directions respectively, and (c) and (d) show the same for a no-slip wall. The discrepancy between Felderhof's version of the point-particle approximation and our modified version indicates that our modifications would be important to systems of metallic particles in liquids.} \end{figure} Figure~\ref{fig:VACFDiscrepancy} shows the predictions for the VACF from the same three theories for the same temperature and geometry, but for gold ($\rho_p \approx 19.3 \times 10^{3}$ $\mathrm{kg}/\mathrm{m}^3$) particles in acetone ($\rho_f \approx 790$ $\mathrm{kg}/\mathrm{m}^3$) confined with a trap stiffness of $K = 200$ pN/$\mu$m. The large ratio $\rho_p / \rho_f = 24.4$ is chosen to emphasise the dependence of the predictions from the theory of~\citet{felderhof2005JPhysChemB,felderhof2005erratum,felderhof2012PhysRevE} on the particle density (the other two theories do not involve $\rho_p$). Sub-figures (a) and (b) show the results for a full-slip wall in the perpendicular and parallel directions respectively. Sub-figures (c) and (d) show the results for a no-slip wall (the method of reflections is omitted in this case). It may thus be seen that in the regime of typical ($\rho_p \approx 2 \rho_f$) experiments using optical tweezers, it is difficult to distinguish between the theories, explaining the agreement of previous experiments~\citep{jeney2008boundary} with theory of~\citet{felderhof2005JPhysChemB}. The experiment of~\citet{mo2015pre} uses the modified point-particle approximation, but once again, does not constitute an experimental validation of any theory owing to the experimental uncertainty being larger than the discrepancy between the theories. In the context of such systems, the modification would be of importance to high-precision measurements at sufficiently high frequencies, possibly including lock-in measurements and precision measurements of statistical quantities with significant averaging. Systems of gold and other metallic micro/nano-particles in liquids are common in experiments, not only in those involving optical tweezers~\citep[see e.g.][]{svoboda1994,hajizadeh2010}, but also in other fields, given the wide array of applications of gold nano-particles~\citep{sardar2009}. Based on the results presented in figure~\ref{fig:VACFDiscrepancy} for gold microspheres in acetone, we believe that our modification of the point-particle approximation would be very significant to such systems. \section{Discussion} \label{sec:discussion} In summary, our analysis shows that the modifications we introduced in \S \ref{sec:point_particle_approximation} are necessary to have theoretical consistency in the predictions of Felderhof's point-particle approximation for the unsteady dynamics of a spherical particle in a liquid medium. As shown in \S \ref{sec:brownian_motion}, the differences due to these modifications are too small to have been detected by previous experiments involving glass particles, but would be significant to experiments involving metallic micro/nano-particles suspended in liquids. Due to the presence of three length scales in the problem, the validity of the point-particle approximation in the context of unsteady Stokes flows needed further scrutiny. Our formalisation of the point-particle approximation in \S \ref{sec:validity} shows that it is perturbatively consistent, and the comparison with the method of reflections in \S \ref{sec:comparison_of_results} suggests that it may not capture all non-perturbative corrections. However, we have shown that these non-perturbative corrections are small over the entire range of frequencies, explaining the excellent agreement with experiment. Further work would use the point-particle approximation, with renewed confidence, in different geometries, potentially explaining the correction due to the curvature of a cylindrical boundary observed in~\citet{mo2015pre}. Other avenues include developing similar frameworks to address rotational motion. The authors wish to thank Prof. Mark G. Raizen for his extensive support, and Prof. Jean-Luc Thiffeault for many helpful discussions. A. S. acknowledges the hospitality of the Geophysical Fluid Dynamics program, and support from a University of Texas at Austin Graduate Continuing Fellowship. J. M. acknowledges the support from the Sid W. Richardson Foundation and the R. A. Welch Foundation Grant No. F-1258. P. J. M. acknowledges support from DOE Office of Fusion Energy Sciences under DE-FG02-04ER-54742, and from a Forschungspreis from the Alexander von Humboldt Foundation. P. J. M. and A. S. would like to warmly acknowledge the hospitality of the Numerical Plasma Physics Division of the Max Planck IPP, Garching, Germany. \bibliographystyle{jfm}
\section{Skolem sequences} Skolem sequences originates from the work by Thoralf Skolem in 1957~\cite{Skol} on the construction of Steiner triple systems. Skolem proved that the set $\{1,2,\dots, 2n\}$ can be partitioned in $n$ pairs $(s_i,t_i)$ such that $t_i - s_i = i$ for $i=1,2,\dots,n$, if and only if $n \equiv 0,1 \pmod{4}$. This result can be reformulated as: There is a sequence with two copies of every element $k$ in $A=\{1,2,\dots,n\}$ such that the two copies of $k$ are placed $k$ places apart in the sequence, if and only if $n \equiv 0,1 \pmod{4}$. For example, the set $\{1,2,3,4\}$ can be used to form the sequence $42324311$, but the set $\{1,2,3\}$ cannot be used to form such a sequence. For more information on Skolem sequences and generalizations thereof, see the survey~\cite{HCD}. A natural generalization is when the set of differences $A$ is any set or multiset of positive integers. If $A$ is a multiset, the sequences are called multi Skolem sequences, and the corresponding existence question is that of deciding for which multisets $A=\{a_1,\dots,a_n\}$ there is a partition of $\{1,\dots,2n\}$ into the differences in $A$. A set $A$ such that there is a partition of $\{1,\dots,2n\}$ into the differences in $A$ is called a multi Skolem set. In my MSc thesis~\cite{EXJ}, I identified (rather obvious) parity and density conditions that are necessary for $A$ to be a multi Skolem set. These conditions were far from sufficient (unsurprisingly as the existence question for multi Skolem sets turns out to be NP-complete~\cite{Nordh09}). But, surprisingly, I discovered that when $A$ is an ordinary set (i.e., not a multiset), then these simple necessary conditions seem to be sufficient. \begin{conj}[\cite{EXJ}] A set $A = \{a_1,a_2,\dots,a_n\}$ with $a_1 < a_2 < \dots < a_n$ is a Skolem set if and only if the number of even $a_i$'s is even, and $\sum^n_{i=m} a_i \leq n^2-(m-1)^2$ for each $1 \leq m \leq n$. \label{perfconj} \end{conj} A particularly interesting special case of Conjecture~\ref{perfconj} emerge when the set of differences $A = \{a_1,a_2,\dots,a_n\}$ is as sparse as possible (in the sense that adding $1$ to any element in $A$ force $A$ to violate the density condition), i.e., $\sum^n_{i=1} a_i = n^2$. Such sets (multisets) $A = \{a_1,a_2,\dots,a_n\}$ satisfying $\sum^n_{i=1} a_i = n^2$ are called extremal. \begin{conj}[\cite{Nordh08}] A set $A = \{a_1,a_2,\dots,a_n\}$ with $a_1 < a_2 < \dots < a_n$ and $\sum^n_{i=1} a_i = n^2$ is an extremal Skolem set if and only if $\sum^n_{i=m} a_i \leq n^2-(m-1)^2$ for each $1 \leq m \leq n$. \label{extconj} \end{conj} Note that the parity condition in Conjecture~\ref{perfconj} is implied by $\sum^n_{i=1} a_i = n^2$, and that the conjecture is invalid for extremal multisets. A minimal counterexample is $A = \{4,4,4,8,8,8\}$. \section{X-rays of permutations} The properties of X-rays of permutations of interest in this note are primarily investigated by Bebeacua et al.~\cite{Postnikov}, and Brualdi and Fritscher~\cite{BF14}, from where we borrow most of the notation. Let $S_n$ denote the symmetric group of all permutations of $\{1,2,\dots,n\}$ and let $[P_{\pi}]$ denote the permutation matrix of $\pi \in S_n$. The diagonal X-ray of $\pi$ (called the Toeplitz X-ray in~\cite{BF14}) is denoted $d(\pi) = (d_1,d_2,\dots,d_{2n-1})$ and defined by $$d_k = \sum_{i-j = n-k} [P_{\pi}]_{i,j} \;\;\;\; (k=1,2,\dots,2n-1).$$ The antidiagonal X-ray of $\pi$ (called Hankel X-ray in~\cite{BF14}) is denoted $d'(\pi) = (d'_1,d'_2,\dots,d'_{2n-1})$ and defined by $$d'_k = \sum_{i+j = k+1} [P_{\pi}]_{i,j} \;\;\;\; (k=1,2,\dots,2n-1).$$ Hence, the diagonal (antidiagonal) X-ray of $\pi$ is the number of non-empty cells in each of the $2n-1$ upper left to lower right (upper right to lower left) diagonals of the permutation matrix $[P_{\pi}]$. The Toeplitz characteristic of $\pi$ is denoted $$l_t(\pi) = (l_1,\dots,l_n) \;\;\;\; (1 \leq l_1 \leq \dots \leq l_n \leq 2n-1)$$ and defined to be the indices of the non-zero entries in $d(\pi)=(d_1,d_2,\dots,d_{2n-1})$ arranged in non-decreasing order, where an index $i$ is repeated $k$ times if its value $d_i$ is $k$. The Hankel characteristic of $\pi$ is denoted $$l_h(\pi) = (l'_1,\dots,l'_n) \;\;\;\; (1 \leq l'_1 \leq \dots \leq l'_n \leq 2n-1)$$ and defined to be the indices of the non-zero entries in $d'(\pi)=(d'_1,d'_2,\dots,d'_{2n-1})$ arranged in non-decreasing order, where an index $i$ is repeated $k$ times if its value $d'_i$ is $k$. X-rays that are $(0,1)$-vectors are called binary X-rays. A tournament is a loopless digraph such that for every two distinct vertices $i$ and $j$ either $(i,j)$ or $(j,i)$ is an arc. The score vector of a tournament on $n$ vertices is the vector of length $n$ whose entries are the out-degrees of the vertices of the tournament arranged in non-decreasing order. Bebeacua et al.~\cite{Postnikov} state the following conjecture\footnote{Despite considerable meditation on the subject, I find no clear connection between binary diagonal X-rays of permutations and score vectors of tournaments, except that they seem to be equinumerous. Perhaps the following equivalent (see~\cite{BF14}) reformulation of Conjecture~\ref{conj:post} is more informative: $(a_1, a_2, \dots, a_{n})$ with $0 < a_1 < a_2 < \dots < a_n < 2n$ is the Toeplitz characteristic $l_t(\pi)$ of a $\pi \in S_n$, if and only if $\sum^k_{i=1} a_i \geq k^2$ for each $1 \leq k \leq n$, with equality holding for $k=n$.}. \begin{conj}[\cite{Postnikov}] \label{conj:post} The number of binary diagonal X-rays of $n \times n$ permutation matrices equals the number of score vectors of tournaments of order $n$. \end{conj} \section{A problem of Brualdi and Fritscher} Brualdi and Fritscher~\cite{BF14} posed the following problem: \enquote{Determine a bijection between perfect extremal Skolem sets of size $n$ and binary Hankel X-rays of $n \times n$ permutation matrices.} In a footnote they state: \enquote{In~\cite{Postnikov,Nordh08} it is stated that the two conjectures are equivalent but we fail to see any relation between the two except that both involve $n$ positive integers satisfying the same conditions.} The two conjectures referred to in the above quote are Conjectures~\ref{extconj} and~\ref{conj:post} in this note. In fact, a bijection between extremal Skolem sets and binary X-rays, that Brualdi and Fritscher asks for, is implicit in~\cite{Nordh08}. We proceed to give this bijection explicitly, along with some further observations. First notice that what is called a perfect extremal Skolem set in~\cite{BF14,Nordh08} is what is called a Skolem set in this note. Moreover, the bijection is stated for diagonal (Toeplitz) X-rays instead of antidiagonal (Hankel) X-rays. As there is an obvious bijection between diagonal and antidiagonal X-rays of permutations (by reversing all rows of the permutation matrix), this is equivalent. \begin{prop}\label{prop:bij} There is a bijection between extremal Skolem sets of size $n$ and binary diagonal (Toeplitz) X-rays of $n \times n$ permutation matrices. More explicitly, $A = \{a_1, a_2, \dots, a_{n}\}$ is an extremal Skolem set if and only if there is a $\pi \in S_n$ such that the non-zero components of $d(\pi) = (d_1,d_2,\dots,d_{2n-1})$ are $\{d_{a_1},d_{a_2},\dots,d_{a_n}\}$. \end{prop} \begin{proof} $A = \{a_1, a_2, \dots, a_{n}\}$ is an extremal Skolem set if and only if the set $\{1,2,\dots, 2n\}$ can be partitioned into the differences in $A$. Since $A$ is extremal, this partition $a_i = t_i - s_i$, ($i = 1,2,\dots,n$) has the property that $s_i \in \{1,2,\dots,n\}$ and $t_i \in \{n+1,n+2,\dots,2n\}$, ($i = 1,2,\dots,n$). Hence, the permutation $\pi$ on $\{1,2,\dots,n\}$ defined as $\pi(s_i) = t_i - n$, ($i = 1,2,\dots,n$) has binary diagonal X-ray $d(\pi) = (d_1,d_2,\dots,d_{2n-1})$, with $d_i = 1$ if and only if $i \in \{t_1 - s_1, t_2 - s_2, \dots, t_n - s_n\} = \{a_1, a_2, \dots, a_{n}\}$. \end{proof} \begin{ex} Consider the permutation $\pi \in S_4$ given by $\pi(1) = 3, \pi(2) = 2, \pi(3) = 4, \pi(4) = 1$ represented by the $4 x 4$ upper right submatrix of the matrix below. The diagonal X-ray $d(\pi) = (d_1,d_2,d_3,d_4,d_5,d_6,d_7) = (1,0,0,1,1,1,0)$ with $d_i = 1$ if and only if $i \in \{1,4,5,6\}$. The permutation $\pi$ defines a partition of $\{1,2,3,4,5,6,7,8\}$ into pairs $(t_i,s_i)$ by $\pi(s_i) = t_i - n$, with corresponding set of differences $A = \{t_i - s_i\}$ ($i = 1,2,3,4$) (in this example $s_1=4, s_2 = 2, s_3 = 3, s_4 = 1$, and hence, the differences are $A=\{\pi(4) + 4 - 4,\pi(2) + 4 - 2, \pi(3) + 4 - 3, \pi(1) + 4 - 1\} = \{1,4,5,6\}$ with corresponding Skolem sequence (6,4,5,1,1,4,6,5)). $$\left[ \begin{array}{cccc|cccc} s_4 & 0 & 0 & 0 & 0 & 0 & t_4 & 0\\ 0 & s_2 & 0 & 0 & 0 & t_2 & 0 & 0\\ 0 & 0 & s_3 & 0 & 0 & 0 & 0 & t_3\\ 0 & 0 & 0 & s_1 & t_1 & 0 & 0 & 0\\ \hline 6 & 4 & 5 & 1 & 1 & 4 & 6 & 5\end{array} \right]$$ \end{ex} Note that the statement in Proposition~\ref{prop:bij} that the non-zero components of the diagonal X-ray $d(\pi) = (d_1,d_2,\dots,d_{2n-1})$ are $\{d_{a_1},d_{a_2},\dots,d_{a_n}\}$ is equivalent to the statement $l_t(\pi) = (a_1,\dots,a_n)$ where $l_t(\pi)$ is the Toeplitz characteristic of $\pi$. Thus, the result in Proposition~\ref{prop:bij} can be stated as: \begin{cor} $A = \{a_1, a_2, \dots, a_{n}\}$ is an extremal Skolem set if and only if there is a $\pi \in S_n$ with Toeplitz characteristic $l_t(\pi) = (a_1, a_2, \dots, a_{n})$. \end{cor} Also note that the proof of Proposition~\ref{prop:bij} hold with minor modifications for extremal multi Skolem sets and non-binary Toeplitz X-rays (for the details, see~\cite{Nordh08}). \begin{cor} $A = \{a_1, a_2, \dots, a_{n}\}$ is an extremal multi Skolem set if and only if there is a $\pi \in S_n$ with Toeplitz characteristic $l_t(\pi) = (a_1, a_2, \dots, a_{n})$. \end{cor} The proof of Proposition~\ref{prop:bij} also give an obvious bijection between extremal (multi) Skolem sequences and permutations for each pair of corresponding extremal (multi) Skolem sets and Toeplitz characteristics. \begin{cor} The number of extremal (multi) Skolem sequences that can be generated from $A = \{a_1, a_2, \dots, a_{n}\}$ equals $|\{\pi \in S_n \mid l_t(\pi) = (a_1, a_2, \dots, a_{n})\}|$. \end{cor} Recall that a fixed-point-free involution $\pi \in S_{2n}$ is a permutation such that $[P_{\pi}]$ is symmetric and have $0$ trace (i.e., empty main diagonal). The following bijection between (not necessarily extremal) Skolem sets and binary Toeplitz X-rays of fixed-point-free involutions also appear implicitly in~\cite{Nordh08}. \begin{prop}\label{prop:nonext} There is a bijection between Skolem sets of size $n$ and binary diagonal (Toeplitz) X-rays of fixed-point-free involutions in $S_{2n}$. More explicitly, $A = \{a_1,\dots,a_n\}$ is a Skolem set if and only if there is a fixed-point-free involution $\pi \in S_{2n}$ with Toeplitz characteristic $l_t(\pi) = (2n-a_n,2n-a_{n-1},\dots,2n-a_1,2n+a_1,2n+a_2,\dots,2n+a_n)$. \end{prop} \begin{proof} $A = \{a_1, a_2, \dots, a_{n}\}$ is a Skolem set if and only if the set $\{1,2,\dots, 2n\}$ can be partitioned into the differences in $A$, i.e., $a_i = t_i - s_i$, ($i = 1,2,\dots,n$), if and only if there is a fixed-point-free involution $\pi \in S_{2n}$ defined as $\pi(s_i) = t_i$ and $\pi(t_i) = s_i$, with Toeplitz characteristic $l_t(\pi) = (2n-a_n,2n-a_{n-1},\dots,2n-a_1,2n+a_1,2n+a_2,\dots,2n+a_n)$. \end{proof} \begin{ex} Consider the fixed-point-free involution $\pi \in S_6$ given by $\pi(1) = 5, \pi(2) = 3, \pi(3) = 2, \pi(4) = 6, \pi(5) = 1, \pi(6) = 4$. The Toeplitz characterstic of $\pi$ is $l_t(\pi) = (2,4,5,7,8,10) = (6-4,6-2,6-1,6+1,6+2,6+4)$. The fixed-point-free involution $\pi$ defines a partition of $\{1,2,3,4,5,6\}$ into pairs $(t_i,s_i)$ by $\pi(s_i) = t_i$ and $\pi(t_i) = s_i$, with corresponding set of differences $A = \{t_i - s_i\}$ ($i = 1,2,3$) (in this example $s_1=2, s_2 = 4, s_3 = 1$, and hence, the differences are $A=\{\pi(2) - 2,\pi(4) - 4, \pi(1) - 1\} = \{1,2,4\}$ with corresponding Skolem sequence (4,1,1,2,4,2)). $$\left[ \begin{array}{cccccc} 0 & 0 & 0 & 0 & t_3 & 0 \\ 0 & 0 & t_1 & 0 & 0 & 0\\ 0 & s_1 & 0 & 0 & 0 & 0\\ 0 & 0 & 0 & 0 & 0 & t_2 \\ s_3 & 0 & 0 & 0 & 0 & 0\\0 & 0 & 0 & s_2 & 0 & 0\\ \hline 4 & 1 & 1 & 2 & 4 & 2\end{array} \right]$$ \end{ex} By Proposition~\ref{prop:nonext}, the following conjecture about binary Toeplitz X-rays of fixed-point-free involutions is equivalent to the main conjecture regarding Skolem sets (i.e., Conjecture~\ref{perfconj}). \begin{conj} A sequence of $2n$ positive integers $(a_1, a_2, \dots, a_{2n})$ with $a_1 < a_2 < \dots < a_{2n}$ and $a_{2n+1-i}-a_i = 2a_i$ ($i = 1,\dots,n$) is the Toeplitz characteristic $l_t(\pi)$ of a fixed-point-free involution $\pi \in S_{2n}$ if and only if $\sum^k_{i=1} a_i \geq k^2$ for each $1 \leq k \leq n$, and the number of even elements in $\{a_1,a_2,\dots,a_n\}$ is even. \end{conj} Note that the proof of Proposition~\ref{prop:nonext} hold without modifications for multi Skolem sets and non-binary Toeplitz X-rays. \begin{cor} $A = \{a_1, a_2, \dots, a_{n}\}$ is a multi Skolem set if and only if there is a fixed-point-free involution $\pi \in S_{2n}$ with Toeplitz characteristic $l_t(\pi) = (2n-a_n,2n-a_{n-1},\dots,2n-a_1,2n+a_1,2n+a_2,\dots,2n+a_n)$. \end{cor} As in the extremal case, the proof of Proposition~\ref{prop:nonext} give a bijection between (multi) Skolem sequences and fixed-point-free involutions for each pair of corresponding (multi) Skolem sets and Toeplitz characteristics. \begin{cor} The number of (multi) Skolem sequences that can be generated from $A = \{a_1, a_2, \dots, a_{n}\}$ equals the number of fixed-point-free involutions $\pi \in S_{2n}$ with Toeplitz characteristic $l_t(\pi) = (2n-a_n,2n-a_{n-1},\dots,2n-a_1,2n+a_1,2n+a_2,\dots,2n+a_n)$. \end{cor} We conclude this section with the following problem, which is a modest step towards a proof of Conjecture~\ref{conj:post}. \begin{prob} Give a polynomial-time algorithm recognizing binary vectors that are Toeplitz X-rays of permutations. \end{prob} Note that the corresponding problem for non-binary vectors is NP-complete. If Conjecture~\ref{conj:post} holds, then such a polynomial algorithm for binary vectors follows directly. \section{X-rays of doubly stochastic matrices} A doubly stochastic (abbreviated DS) matrix $D$ is a square matrix, all of which elements are nonnegative real numbers, and the elements in each column and row sum to $1$. In particular, any permutation matrix is a DS matrix. Diagonal X-rays of DS matrices are defined analogously to the definitions of diagonal X-rays of permutation matrices. Observe that the existence question for DS matrices having diagonal X-ray $(d_1,d_2,\dots,d_{2n-1})$ is in P, since the problem can be expressed as a LP (feasibility) problem. This is in sharp contrast with the corresponding problem for permutation matrices which is NP-complete~\cite{Nordh09}. We refrain from discussing non-binary diagonal X-rays of DS matrices and diagonal X-rays of symmetric DS matrices, and focus on the existence question for binary diagonal X-rays of DS matrices. Conjecture~\ref{extconj} regarding extremal Skolem sets and the equivalent Conjecture~\ref{conj:post} regarding binary diagonal X-rays of permutation matrices, corresponds to the following conjecture about binary diagonal X-rays of DS matrices. \begin{conj} There is a DS matrix $D$ with binary diagonal X-ray $d(D) = (d_1,d_2,\dots,d_{2n-1})$ and corresponding Toeplitz characterstic $l_t(D) = (a_1,a_2,\dots,a_n)$ if and only if $\sum^k_{i=1} a_i \geq k^2$ for each $1 \leq k \leq n$ with equality holding for $k=n$. \label{conj:stoc} \end{conj} To see that the density conditions in Conjecture~\ref{conj:stoc} are necessary, recall the following theorem due to Birkhoff~\cite{Birkhoff46}. \begin{thm}[\cite{Birkhoff46}] A nonnegative real matrix $D$ is doubly stochastic if and only if there exists permutation matrices $P_1,\dots,P_m$ and positive real numbers $c_1,\dots,c_m$ summing to $1$ such that $D = c_1P_1 + \cdots + c_mP_m$. \end{thm} The necessity of the density conditions in Conjecture~\ref{conj:stoc} hence follows\footnote{By Birkhoff's theorem, $D = c_1P_1 + \cdots + c_mP_m$ where $P_1,\dots,P_m$ are permutation matrices and $c_1 + \cdots + c_m = 1$. By the necessary density conditions for diagonal X-rays of permutations (see~\cite{Postnikov,BF14,Nordh08}), $\sum^k_{i=1} a^j_i \geq k^2$ for each $1 \leq k \leq n$ with equality holding for $k=n$, where $l_t(P_j) = (a^j_1,\dots, a^j_n)$ for each permutation $P_j$ ($1 \leq j \leq m)$. Observe that $\sum^k_{i=1} a_i = \sum_{j=1}^m (c_j \sum^k_{i=1} a^j_i)$ for all $1 \leq k \leq n$, where $l_t(D) = (a_1,\dots,a_n)$ is the Toeplitz characteristic of $D$. Note that $\sum_{j=1}^m (c_j \sum^k_{i=1} a^j_i) \geq k^2$ for all $1 \leq k \leq n$, since $\sum^k_{i=1} a^j_i \geq k^2$ for all $1 \leq k \leq n$ and the $c_j$'s add to $1$. The fact that $\sum^n_{i=1} a_i = n^2$ follows from the fact that $\sum^n_{i=1} a^j_i = n^2$ for each of the $m$ permutation matrices.} from the necessity of the density conditions for the Toeplitz characteristic $l_t(\pi) = (a_1,a_2,\dots,a_n)$ of $\pi \in S_n$. We conjecture that if there is a DS matrix with binary diagonal X-ray $(d_1,d_2,\dots,d_{2n-1})$ then there is a permutation matrix with the same diagonal X-ray. \begin{conj} There is a DS matrix $D$ of order $n$ with binary diagonal X-ray $d(D) = (d_1,d_2,\dots,d_{2n-1})$ if and only if there is a permutation $\pi \in S_n$ with binary diagonal X-ray $d(\pi) = (d_1,d_2,\dots,d_{2n-1})$. \label{conj:stoctoperm} \end{conj} Note that the two conjectures above (Conjectures~\ref{conj:stoc} and \ref{conj:stoctoperm}) together imply Conjecture~\ref{conj:post} (and the equivalent Conjecture~\ref{extconj}). \bibliographystyle{plain}
\section{\label{sec:intro}Introduction} A fascinating effect in quantum field theory is the Schwinger effect \cite{Gelis:2015kya}: the creation of pairs out of the vacuum in the presence of a background electromagnetic field. While it was Sauter \cite{Sauter:1931zz}, Heisenberg, and student Euler \cite{Heisenberg:1935qt} who investigated first this effect, the history has remembered Schwinger who revisited their works some 20 years later \cite{Schwinger:1951nm}. Despite being a very useful tool for the theoretical understanding of quantum field theory and for the development of powerful calculation techniques in strong field background, the Schwinger effect has so far not been detected in laboratories experiments. The production of electron-positron pairs, however, was realized in an experiment, in which high energy gammas scatter with a Coulomb potential \cite{Burke:1997ew}. The main reason is that the Schwinger effect is exponentially suppressed unless the electric field reaches close enough a threshold electric field $E_{\mathrm{threshold}}\simeq 1.3\times 10^{18}$ V/m \cite{DiPiazza:2011tq}. Aiming at detecting this effect a new idea is developing in the past years: changing the system under study and considering Schwinger effect in astrophysical and cosmological contexts where huge background fields could naturally be present \cite{Ruffini:2009hg}. We will investigate in this paper the Schwinger effect in the $\text{dS}_{4}$ under the influence of both a constant electric field and a magnetic field background. \par The Schwinger effect in dS has recently become an active field of research. The seminal papers studied this effect in the two-dimensional de~Sitter spacetime ($\text{dS}_{2}$) \cite{Frob:2014zka} and in $\text{dS}_{4}$ \cite{Kobayashi:2014zza}. The one-loop vacuum polarization and Schwinger effect in a two-dimensional (anti-)de~Sitter spacetime was explicitly found and a thermal interpretation was proposed for the Schwinger effect in Ref.~\cite{Cai:2014qba}. The initial motivation of \cite{Frob:2014zka} was to use this framework to investigate bubble nucleation in the context of the multiverse proposal. However, this toy model for pair creation turns out to have a wide range of applications, from constraining magnetogenesis scenarios \cite{Kobayashi:2014zza}, investigating the ER=EPR conjecture via holographic setups \cite{Fischler:2014ama} to pair creation around charged black holes \cite{Chen:2012zn,Kim:2016dmm,Chen:2016caa} and baryogenesis \cite{Stahl:2016qjs}. \par These physical motivations lead to a series of papers in which the Schwinger mechanism has been investigated for various types of particles and spacetime dimensions. It was investigated whether the known equivalence between bosonic and fermionic particles with respect to the Schwinger effect holds in $\text{dS}_{2}$ \cite{Stahl:2015gaa}. Particles differentiate themselves only if one goes beyond the semiclassical limit and computes the current which, in turn, is a more physically relevant quantity to describe the Schwinger mechanism in curved spacetimes. These results were generalized to $\text{dS}_{4}$ in \cite{Hayashinaka:2016qqn}. For bosons in $\text{dS}_{4}$, the results of \cite{Kobayashi:2014zza} were reinforced by \cite{Hayashinaka:2016dnt} which considered an alternative renormalization scheme and found the same results. In \cite{Geng:2017zad}, an alternative method was employed: the uniform asymptotic method was used to derive new results for the Schwinger effect in $\text{dS}_{4}$; see also \cite{Sharma:2017ivh}. In \cite{Bavarsad:2016cxh}, the Schwinger mechanism in three dimensions was explored as an example of odd dimension field theory in dS. In all these works the gravitational field and electric field were assumed to be background fields whose variations due to backreactions are negligible during the typical time scale of pair creation. This approximation can be shown to hold for some range of the parameters. However, taking a constant background field can only be seen as a toy model to understand some physical implications of pair creation, and in realistic models of inflation requiring quasi-dS, the backreaction effects both on the dS metric and on the background electric field should be taken into account. In \cite{Bavarsad:2016cxh} and \cite{Stahl:2016geq}, it was shown that both the gravitational and electromagnetic field would be suppressed by the Schwinger effect. In Refs.~\cite{Xue:2014kna,Xue:2015tmw}, it was pointed out that the quantum-gravity originated cosmological constant term $\Lambda g^{\mu\nu}$ results in the creation of particle-antiparticle pairs and their fields whose energy-momentum tensor $T^{\mu\nu}_{\mathrm{M}}$ in turn backreacts on $\Lambda g^{\mu\nu}$, and that these are important to understand the inflationary process in the early Universe and the dark-energy-matter interaction for $\Omega_{\Lambda}\sim\Omega_{\mathrm{M}}\sim\mathcal{O}(1)$ in the present Universe. Recently it was argued that the dS was unstable due to quantum effects \cite{Markkanen:2016aes,Markkanen:2016jhg,Markkanen:2017abw}. The idea is that a non-trivial Bogoliubov transformation leads, after decoherence, to a breaking of the dS invariance and therefore to a decrease of the cosmological constant. \par In this article, we propose to take one step further and add a constant magnetic field to a dS and an already present electric background. This is a common generalization of a flat spacetime in which the analytic results have been known for long \cite{Schwinger:1951nm}, but the Schwinger effect has never been properly investigated in dS. One motivation to consider a constant magnetic field in dS is the recent result that a constant magnetic field is a stable configuration of dS in modified gravity theories \cite{Mukohyama:2016npi}. The effect of a constant magnetic field exhibits diversity of the Schwinger mechanism compared to a pure electric field in dS. And another possible reason of considering an electromagnetic field in the early Universe would come from the observation of blazars leading to a lower bound for the magnetic field in the intergalactic medium: $B>6\times 10^{-18}$ G \cite{Vovk:2011aa}. The origin of these magnetic fields is now an open question in cosmology but two main scenarios are emerging: their origin is either after recombination or primordial; see reviews \cite{Widrow:2002ud,Kandus:2010nw,Durrer:2013pga,Subramanian:2015lua}. In the case of a primordial origin, just as for a scalar field, the vacuum fluctuations of the gauge field are amplified to larger scales. Once inflation comes to an end, the Universe becomes conductive, leading the electric field to vanish and the magnetic field to reside and evolve until the present epoch by the flux conservation. If the primordial origin of the currently observed magnetic field is adopted, it is necessary for inflation model builders to investigate physical effects due to the presence of an electromagnetic field, i.e, the Schwinger effect, which is the main topic of this paper. \par The effect of a magnetic field background on the scalar pair creation probability \cite{Moradi:2009zz} and the number density \cite{Haouat:2012dr} in the spatially flat Friedmann-Lemaitre-Robertson-Walker (FLRW) universes have been investigated. In \cite{Moradi:2009zz}, the author showed that in the presence of a pure magnetic field background, i.e., in the absence of an electric field background, the gravitational pair creation does not change in dS, whereas in a radiation dominated universe, a pure magnetic field background minimizes the gravitational pair creation \cite{Haouat:2012dr}. In holographic setups, the inclusion of a magnetic field on the Schwinger effect was investigated in \cite{Ghodrati:2015rta}. It is, however, difficult to compare that result directly with the case of dS under consideration in this paper. Adopting the perturbative QED approach in dS, the first order amplitude for the fermion production in a magnetic field has been analyzed in \cite{Crucean:2016eiq}; see also \cite{Nicolaevici:2016uzy,Crucean:2017pfg}. The authors found that the fermion production is significant only at large expansion condition. This paper aims at investigating the magnetic field influence on the Schwinger pair creation of charged scalars in $\text{dS}_{4}$, specifically, by computing the semiclassical decay rate and analysing the quantum vacuum expectation value of the current operator, which is equivalent to the exact one-loop approach including all one-loop diagrams. \par The organization of this paper is as follows. In Sec.~\ref{sec:KG}, we recall the main equations for charged scalars in a magnetic field as well as an electric field for the pair creation setup. In Sec.~\ref{sec:Schwinger}, we compute the pair creation rate using a semiclassical approach to the exact one-loop. In Sec.~\ref{sec:current}, we present an expression for the induced current and discuss several relevant limiting cases of different field intensities. We draw some conclusions and future lines of research in Sec.~\ref{sec:concl}. Appendix~\ref{app:zeta} contains some mathematical aspects of this work: some useful properties of the Riemann and Hurwitz zeta functions. Eventually, in Appendix~\ref{app:reg}, the computation and regularization of the current have been reviewed. \section{\label{sec:KG}Klein-Gordon Equation} To study the Schwinger effect in $\text{dS}_{4}$, we consider the action of a complex scalar field coupled to a $U(1)$ gauge field as \begin{equation} S=\int d^{4}x\sqrt{-g}\Bigl[g^{\mu\nu}\bigl(\partial_{\nu}-ie A_{\nu}\bigr)\varphi^{\ast}\bigl(\partial_{\mu}+ie A_{\mu}\bigr)\varphi -\bigl(m^{2}+\xi R\bigr)\varphi\varphi^{\ast}-\frac{1}{4}F_{\mu \nu}F^{\mu \nu}\Bigr], \label{action} \end{equation} where $e$ is the gauge coupling: the charge of the particle, $m$ is the mass of the scalar field, and $\xi$ is a dimensionless nonminimal coupling. We assume that the complex scalar field is a test field probing two background fields: the gravitational field and the electromagnetic field. The gravitational field is described by the $\text{dS}_{4}$ metric which reads in the conformal coordinates as \begin{align} ds^{2} & =\Omega^{2}(\tau)\Bigl(d\tau^{2}-dx^2-dy^2-dz^2\Bigr), & \tau & \in(-\infty,0), & \mathbf{x} & =(x,y,z)\in\mathbb{R}^{3}, \label{metric} \end{align} where the scale factor $\Omega(\tau)$ and the Hubble constant $H$ are given by \begin{align} \Omega(\tau) & =-\frac{1}{H \tau}, & H & =\Omega^{-2}(\tau)\frac{d\Omega(\tau)}{d\tau}. \label{hubble} \end{align} A $\text{dS}_{4}$ has a scalar curvature $R=12H^2$, therefore the inclusion of a nonminimal coupling term like $\xi R\varphi\varphi^{*}$ would just modify the mass term from $m^{2}$ to $m^{2}+12\xi H^{2}$. For simplicity, we will not consider this in this paper and further set $\xi=0$. For the electromagnetic field, we consider that it is composed of a constant electric and a constant magnetic part. The vector potential describing the constant electric and the magnetic field parallel to each other in the conformal metric~(\ref{metric}) is given by \begin{equation} A_{\mu}(x)=-\frac{E}{H^{2}\tau}\delta_{\mu}^{3}+By\delta_{\mu}^{1}, \label{potential} \end{equation} where $E$ and $B$ are constants. The Klein-Gordon equation then reads from the action~(\ref{action}), \begin{equation} \biggl[\partial_{0}^{2}+2H\Omega(\tau)\partial_{0}-\bigl(\partial_{1}+ieBy\bigr)^{2}-\partial_{2}^{2} -\Bigl(\partial_{3}+\frac{ieE}{H}\Omega(\tau)\Bigr)^{2}+m^{2}\Omega^{2}(\tau)\biggr]\varphi(x)=0. \label{kgeq} \end{equation} The solution of the spatial part of Eq.~(\ref{kgeq}) is a bit more involved than a simple Fourier transformation because of the explicit $y$-dependence. Substituting \begin{equation} \varphi(x)=\Omega^{-1}(\tau)\tilde{\varphi}(x), \label{tilde} \end{equation} into Eq.~(\ref{kgeq}) yields \begin{equation} \biggl[\partial_{0}^{2}-\bigl(\partial_{1}+ieBy\bigr)^{2}-\partial_{2}^{2}-\Bigl(\partial_{3}+\frac{ieE}{H}\Omega(\tau)\Bigr)^{2} +m^{2}\Omega^{2}(\tau)-2H^{2}\Omega^{2}(\tau)\biggr]\tilde{\varphi}(x)=0. \label{tildeq} \end{equation} Using the ansatz \begin{equation} \tilde{\varphi}(x)=e^{\pm i\mathbf{x}\cdot\mathbf{k}_{y\!\!\!\!\diagup}}h^{\pm}(y)f^{\pm}(\tau), \label{ansatz} \end{equation} where we have defined \begin{equation} \mathbf{k}_{y\!\!\!\!\diagup}:=(k_{x},0,k_{z}), \label{ky} \end{equation} and $\pm$ denotes the positive and negative frequency solutions of Eq.~(\ref{tildeq}), respectively, we decouple the spatial and time dependent parts of Eq.~(\ref{tildeq}) as \begin{eqnarray} \frac{d^{2}h^{\pm}(y)}{dy^{2}}-\Bigl(eBy\pm k_{x}\Bigr)^{2}h^{\pm}(y)=-sh^{\pm}(y), \label{ypart} \\ \frac{d^{2}f^{\pm}(\tau)}{d\tau^{2}}+\biggl[\Bigl(\frac{eE}{H^{2}\tau}\mp k_{z}\Bigr)^{2}+\frac{m^{2}}{H^{2}\tau^{2}} -\frac{2}{\tau^{2}}\biggr]f^{\pm}(\tau)=-sf^{\pm}(\tau). \label{tpart} \end{eqnarray} The harmonic wave function $h^{\pm}(y)$ is a Landau state given by \begin{align} h_{n}(y_{\pm}) & =\sqrt{\frac{\sqrt{eB}}{\sqrt{\pi}2^{n} n!}}\exp \Bigl(-\frac{y_{\pm}^{2}}{2}\Bigr)H_{n}(y_{\pm} ), & y_{\pm} & :=\sqrt{eB}y\pm \frac{k_x}{\sqrt{eB}}, \label{hermite} \end{align} where $H_{n}$ with $n\in \mathbb{N}$ is the Hermite polynomial and $s$ is the Landau energy \begin{equation} s=(2n+1)eB. \label{s} \end{equation} The normalized wave functions~(\ref{hermite}) satisfy the orthonormality relation \begin{equation} \int_{-\infty}^{+\infty}dy h_{n}(y_{\pm})h_{n'}(y_{\pm})=\delta_{n,n'}, \label{h:orthonor} \end{equation} and the completeness relation \begin{equation} \sum_{n=0}^{\infty}h_{n}(y_{\pm}) h_{n}(y_{\pm}')=\delta(y-y'), \label{h:completn} \end{equation} where $y_{\pm}'$ is given by replacing $y$ by $y'$ in the definition~(\ref{hermite}) of $y_{\pm}$. We note that the standard prescription in a flat spacetime applies also to our results; when one adds a magnetic field, the pair creation in the general case can be deduced from the pure electric field case $(B=0)$ by replacing the transverse momentum squared $\bf{k}_{\perp}^{2}$ by the Landau levels $(2n+1)eB$. Following Refs.~\cite{Bavarsad:2016cxh,Kim:2016dmm}, we find the positive and negative frequency solutions with desired asymptotic forms at early times ($\tau\rightarrow -\infty$), i.e., the in-vacuum mode functions are given by the Hadamard states \begin{eqnarray} U_{\mathrm{in}}\bigl(x;\mathbf{k}_{y\!\!\!\!\diagup},n\bigr) &=& \frac{e^{\frac{i\pi\kappa}{2}}}{\sqrt{2k}}\Omega^{-1}(\tau)e^{+i\mathbf{x}\cdot\mathbf{k}_{y\!\!\!\!\diagup}}h_{n}(y_{+}) W_{\kappa,\gamma}\bigl(e^{\frac{-i\pi}{2}}2p\bigr), \label{uin} \\ V_{\mathrm{in}}\bigl(x;\mathbf{k}_{y\!\!\!\!\diagup},n\bigr) &=& \frac{e^{-\frac{i\pi\kappa}{2}}}{\sqrt{2k}}\Omega^{-1}(\tau)e^{-i\mathbf{x}\cdot\mathbf{k}_{y\!\!\!\!\diagup}}h_{n}(y_{-}) W_{\kappa,-\gamma}\bigl(e^{\frac{+i\pi}{2}}2p\bigr). \label{vin} \end{eqnarray} Similarly, the positive and negative frequency solutions with desired asymptotic forms at late times ($\tau\rightarrow 0$), i.e., the out-vacuum mode functions are given by \begin{eqnarray} U_{\mathrm{out}}\bigl(x;\mathbf{k}_{y\!\!\!\!\diagup},n\bigr) &=& \frac{e^{\frac{i\pi\gamma}{2}}}{\sqrt{4|\gamma|k}}\Omega^{-1}(\tau)e^{+i\mathbf{x}\cdot\mathbf{k}_{y\!\!\!\!\diagup}}h_{n}(y_{+}) M_{\kappa,\gamma}\bigl(e^{\frac{-i\pi}{2}}2p\bigr), \label{uout} \\ V_{\mathrm{out}}\bigl(x;\mathbf{k}_{y\!\!\!\!\diagup},n\bigr) &=& \frac{e^{\frac{i\pi\gamma}{2}}}{\sqrt{4|\gamma|k}}\Omega^{-1}(\tau)e^{-i\mathbf{x}\cdot\mathbf{k}_{y\!\!\!\!\diagup}}h_{n}(y_{-}) M_{\kappa,-\gamma}\bigl(e^{\frac{+i\pi}{2}}2p\bigr). \label{vout} \end{eqnarray} Here, $W_{\kappa,\gamma}$ and $M_{\kappa,\gamma}$ are some hypergeometrical functions known as the Whittaker functions \cite{Book:Nist} and the parameters have been defined as \begin{align} k & =\sqrt{k_{z}^{2}+(2n+1)eB}, & r & =\frac{k_{z}}{k}, & p & =-\tau k, \nonumber \\ \mathbf{p}_{y\!\!\!\!\diagup} & =-\tau\mathbf{k}_{y\!\!\!\!\diagup}, & \ell & =eB\tau^{2}, & \mu & =\frac{m}{H}, \nonumber \\ \lambda & =\frac{eE}{H^{2}}, & \kappa & =i\lambda r, & \gamma & =\sqrt{\frac{9}{4}-\lambda^{2}-\mu^{2}}. \label{parameters} \end{align} In Secs.~\ref{sec:KG} and~\ref{sec:Schwinger} of this paper, we assume the \textit{semiclassical condition}, \begin{equation} \lambda^{2}+\mu^{2}\gg 1, \label{semi} \end{equation} hence the parameter $\gamma$ is purely imaginary. We adopt the sign convention $\gamma=+i|\gamma|$. \par The orthonormality relations \begin{eqnarray} \Bigl(U_{\mathrm{in}(\mathrm{out})}(x;\mathbf{k}_{y\!\!\!\!\diagup},n),U_{{\mathrm{in}(\mathrm{out})}}(x;\mathbf{k}_{y\!\!\!\!\diagup}',n')\Bigr) &=& - \Bigl(V_{\mathrm{in}(\mathrm{out})}(x;\mathbf{k}_{y\!\!\!\!\diagup},n),V_{{\mathrm{in}(\mathrm{out})}}(x;\mathbf{k}_{y\!\!\!\!\diagup}',n')\Bigr) \nonumber \\ &=& (2\pi)^{2}\delta^{2}(\mathbf{k}_{y\!\!\!\!\diagup}-\mathbf{k}_{y\!\!\!\!\diagup}')\delta_{n,n'}, \nonumber \\ \Bigl(U_{\mathrm{in}(\mathrm{out})}(x;\mathbf{k}_{y\!\!\!\!\diagup}, n),V_{{\mathrm{in}(\mathrm{out})}}(x;\mathbf{k}_{y\!\!\!\!\diagup}',n')\Bigr) &=& 0, \label{orthonor} \end{eqnarray} can be shown to hold. Using two complete sets of orthonormal mode functions, we expand the scalar field operator. In terms of the in-mode functions we can express the field operator as \begin{equation} \varphi(x)=\sum_{n=0}^{\infty}\int\frac{d^{2}k_{y\!\!\!\!\diagup}}{(2\pi)^{2}}\Bigl[U_{\mathrm{in}}\bigl(x;\mathbf{k}_{y\!\!\!\!\diagup},n\bigr)a_{\mathrm{in}}(\mathbf{k}_{y\!\!\!\!\diagup},n) +V_{\mathrm{in}}\bigl(x;\mathbf{k}_{y\!\!\!\!\diagup},n\bigr)b_{\mathrm{in}}^{\dag}(\mathbf{k}_{y\!\!\!\!\diagup},n)\Bigr], \label{phiin} \end{equation} where the operator $a_{\mathrm{in}}$ annihilates a particle and the operator $b_{\mathrm{in}}^{\dag}$ creates an antiparticle in the state with the momentum $\mathbf{k}_{y\!\!\!\!\diagup}$ and the Landau level $n$. The quantization is implemented by imposing the commutation relations \begin{equation} \Bigl[a_{\mathrm{in}}(\mathbf{k}_{y\!\!\!\!\diagup},n),a_{\mathrm{in}}^{\dag}(\mathbf{k}_{y\!\!\!\!\diagup}',n')\Bigr] = \Bigl[b_{\mathrm{in}}(\mathbf{k}_{y\!\!\!\!\diagup},n),b_{\mathrm{in}}^{\dag}(\mathbf{k}_{y\!\!\!\!\diagup}',n')\Bigr] =(2\pi)^{2}\delta^{2}(\mathbf{k}_{y\!\!\!\!\diagup}-\mathbf{k}_{y\!\!\!\!\diagup}') \delta_{n,n'}, \label{commin} \end{equation} and the in-vacuum state is defined as \begin{align} a_{\mathrm{in}}(\mathbf{k}_{y\!\!\!\!\diagup},n)\big|\mathrm{in}\big\rangle & =0, & \forall \mathbf{k}_{y\!\!\!\!\diagup}, n. \label{vacin} \end{align} We can expand the scalar field operator in terms of the out-mode functions and we similarly define the out-annihilation $a_{\mathrm{out}}$ and creation $b_{\mathrm{out}}^{\dag}$ operators as \begin{equation} \varphi(x)=\sum_{n=0}^{\infty}\int\frac{d^{2}k_{y\!\!\!\!\diagup}}{(2\pi)^{2}}\Bigl[U_{\mathrm{out}}\bigl(x;\mathbf{k}_{y\!\!\!\!\diagup},n\bigr)a_{\mathrm{out}}(\mathbf{k}_{y\!\!\!\!\diagup},n)+V_{\mathrm{out}} \bigl(x;\mathbf{k}_{y\!\!\!\!\diagup},n\bigr)b_{\mathrm{out}}^{\dag}(\mathbf{k}_{y\!\!\!\!\diagup},n)\Bigr], \label{phiout} \end{equation} where the quantization commutation relations are given by \begin{equation} \Bigl[a_{\mathrm{out}}(\mathbf{k}_{y\!\!\!\!\diagup},n),a_{\mathrm{out}}^{\dag}(\mathbf{k}_{y\!\!\!\!\diagup}',n')\Bigr] = \Bigl[b_{\mathrm{out}}(\mathbf{k}_{y\!\!\!\!\diagup},n),b_{\mathrm{out}}^{\dag}(\mathbf{k}_{y\!\!\!\!\diagup}',n')\Bigr] =(2\pi)^{2}\delta^{2}(\mathbf{k}_{y\!\!\!\!\diagup}-\mathbf{k}_{y\!\!\!\!\diagup}')\delta_{n,n'}, \label{commout} \end{equation} and the out-vacuum state is defined as \begin{align} a_{\mathrm{out}}(\mathbf{k}_{y\!\!\!\!\diagup},n)\big|\mathrm{out}\big\rangle &=0, & \forall \mathbf{k}_{y\!\!\!\!\diagup}, n. \label{vacout} \end{align} The canonical momentum $\pi(x)$ conjugated to the scalar field $\varphi(x)$ is defined through the Lagrangian. It reads from Eq.~(\ref{action}), \begin{equation} \pi(x)=\frac{\partial\mathcal{L}}{\partial(\partial_{0}\varphi)}=\Omega^{2}(\tau)\partial_{0}\varphi^{\ast}. \label{momentum} \end{equation} Then, using the explicit form of the scalar field operator $\varphi(x)$ and the canonical momentum $\pi(x)$ in terms of the mode functions, one can verify that the canonical equal-time commutation relation correctly holds \begin{equation} \Bigl[\varphi(\tau,\mathbf{x}),\pi(\tau,\mathbf{x}')\Bigr]=i\delta^{3}(\mathbf{x}-\mathbf{x}'). \label{canonic} \end{equation} \section{\label{sec:Schwinger}Schwinger Effect} The usual quantity describing the Schwinger effect is the pair creation or decay rate which is derived from the Bogoliubov coefficients \cite{Book:Parker,Book:Birrell}, \begin{eqnarray} \mathcal{A}\bigl(\mathbf{k}_{y\!\!\!\!\diagup},n;\mathbf{k}_{y\!\!\!\!\diagup}',n'\bigr) &=& \Bigl(U_{\mathrm{out}}\big(x;\mathbf{k}_{y\!\!\!\!\diagup},n\big),U_{\mathrm{in}}\big(x;\mathbf{k}_{y\!\!\!\!\diagup}',n'\big)\Bigr), \label{def:alpha} \\ \mathcal{B}\bigl(\mathbf{k}_{y\!\!\!\!\diagup},n;\mathbf{k}_{y\!\!\!\!\diagup}',n'\bigr) &=& -\Bigl(U_{\mathrm{out}}\big(x;\mathbf{k}_{y\!\!\!\!\diagup},n\big),V_{\mathrm{in}}\big(x;\mathbf{k}_{y\!\!\!\!\diagup}',n'\big)\Bigr). \label{def:beta} \end{eqnarray} Substituting the explicit form of the mode functions~(\ref{uin})-(\ref{vout}) into Eqs.~(\ref{def:alpha}) and~(\ref{def:beta}) leads to \begin{align} \mathcal{A}\bigl(\mathbf{k}_{y\!\!\!\!\diagup} n;\mathbf{k}_{y\!\!\!\!\diagup}' n'\bigr) & = (2\pi)^{2}\delta^{2}(\mathbf{k}_{y\!\!\!\!\diagup}-\mathbf{k}_{y\!\!\!\!\diagup}')\delta_{n,n'} \alpha, & \alpha & = \frac{(2|\gamma|)^{\frac{1}{2}}\Gamma\bigl(2\gamma\bigr)}{\Gamma\bigl(\frac{1}{2}+\kappa+\gamma\bigr)} e^{\frac{i\pi}{2}(\kappa-\gamma)}, \label{alpha} \\ \mathcal{B}\bigl(\mathbf{k}_{y\!\!\!\!\diagup} n;\mathbf{k}_{y\!\!\!\!\diagup}' n'\bigr) &= (2\pi)^{2}\delta^{2}(\mathbf{k}_{y\!\!\!\!\diagup}+\mathbf{k}_{y\!\!\!\!\diagup}')\delta_{n,n'} \beta, & \beta &=-i\frac{(2|\gamma|)^{\frac{1}{2}}\Gamma\bigl(-2\gamma\bigr)}{\Gamma\bigl(\frac{1}{2}+\kappa-\gamma\bigr)} e^{\frac{i\pi}{2}(\kappa+\gamma)}, \label{beta} \end{align} where the coefficients satisfy the bosonic relation $|\alpha|^{2}-|\beta|^{2}=1$. A Bogoliubov transformation relates the out-operator $a_{\mathrm{out}}$ to the in-operator $a_{\mathrm{in}}$ as \begin{eqnarray} a_{\mathrm{out}}(\mathbf{k}_{y\!\!\!\!\diagup},n) = \sum_{n'=0}^{\infty}\int\frac{d^{2}k_{y\!\!\!\!\diagup}'}{(2\pi)^{2}}\Bigl[\mathcal{A}^{\ast}\bigl(\mathbf{k}_{y\!\!\!\!\diagup},n;\mathbf{k}_{y\!\!\!\!\diagup}',n'\bigr)a_{\mathrm{in}}(\mathbf{k}_{y\!\!\!\!\diagup}',n') - \mathcal{B}^{\ast}\bigl(\mathbf{k}_{y\!\!\!\!\diagup},n;\mathbf{k}_{y\!\!\!\!\diagup}',n'\bigr)b_{\mathrm{in}}^{\dag}(\mathbf{k}_{y\!\!\!\!\diagup}',n')\Bigr]. \label{transform} \end{eqnarray} Using the out-operator $a_{\mathrm{out}}(\mathbf{k}_{y\!\!\!\!\diagup},n)$, we can calculate the expected number of the created pairs with the comoving momentum $\mathbf{k}_{y\!\!\!\!\diagup}$ and the Landau level $n$ carried by the in-vacuum state \begin{equation} \frac{1}{L_{x}L_{z}}\Big\langle \mathrm{in}\Bigl| a_{\mathrm{out}}^{\dag}(\mathbf{k}_{y\!\!\!\!\diagup},n)a_{\mathrm{out}}(\mathbf{k}_{y\!\!\!\!\diagup},n)\Bigr|\mathrm{in} \Big\rangle =\bigl|\beta\bigl(k_{z},n\bigr)\bigr|^{2}, \label{number} \end{equation} where we have used Eqs.~(\ref{beta}),~(\ref{transform}) and, for convenience, the three-volume of the $\text{dS}_{4}$ is normalized into a box with dimensions $V=L_{x}L_{y}L_{z}$. Then the decay rate $\Gamma$, i.e., the number of created pairs $N$ per unit of the physical four-volume of the $\text{dS}_{4}$ is given by \begin{equation} \Gamma:=\frac{N}{\sqrt{|g|}TV}=\frac{1}{\Omega^{4}(\tau)TL_{y}}\sum_{n=0}^{\infty}\int\frac{dk_{z}}{(2\pi)}\frac{dk_{x}}{(2\pi)} \bigl|\beta\bigl(k_{z},n\bigr)\bigr|^{2}, \label{rate} \end{equation} where $T$ is the time interval of the pair creation. The Bogoliubov coefficient $\beta$ is independent of the momentum component $k_{x}$ which determines the position of the center of the Gaussian wave packet on $y$ axis by the relation $y=k_{x}/(eB)$. Consequently, the integral gives \cite{Kuznetsov:2004tb} \begin{equation} \int\frac{dk_{x}}{(2\pi)}=\frac{eBL_{y}}{(2\pi)}. \label{kx} \end{equation} To perform the $k_{z}$-integral on the right hand side of Eq.~(\ref{rate}), we adopt the semiclassical method used in Refs.~\cite{Frob:2014zka,Kobayashi:2014zza}: most of the particles are created around the time \begin{equation} \tau \sim -\frac{|\gamma|}{k_{z}}. \label{relation} \end{equation} Imposing the relation~(\ref{relation}) and transforming the $k_{z}$-integral into a $\tau$-integral, we then obtain \begin{equation} \Gamma=\frac{H^{4}\ell|\gamma|}{4\pi^{2}}\sum_{n=0}^{\infty} \frac{e^{2\pi|\kappa|}+e^{-2\pi|\gamma|}}{e^{2\pi|\gamma|}-e^{-2\pi|\gamma|}}, \label{rate:1} \end{equation} where \begin{equation} |\kappa|=\frac{\lambda|\gamma|}{\sqrt{|\gamma|^{2}+(2n+1)\ell}}. \label{kappa} \end{equation} A physical magnetic field in a spatially flat FLRW universe with a cosmological scale factor $\Omega(\tau)$ dilutes as $B\Omega^{-2}(\tau)$ where $B$ behaves as a magnetic field in the comoving spacetime \cite{Tsagas:2007ik,Giovannini:2003yn}. This preserves the flux conservation for the physical magnetic field. Recalling that $\ell=eB\tau^{2}$, consequently, the decay rate $\Gamma$ depends on the time $\tau$ due to the dilution of the physical magnetic field. We may write Eq.~(\ref{rate:1}) in another form \begin{equation} \Gamma=\Bigl(\frac{eB\Omega^{-2}}{2\pi}\Bigr)\Bigl(\frac{H^{2}|\gamma|}{2\pi}\Bigr) \sum_{n=0}^{\infty}\biggl[\frac{e^{2\pi|\kappa|}-1}{e^{2\pi|\gamma|}-e^{-2\pi|\gamma|}} +\frac{1}{e^{2\pi|\gamma|}-1}\biggr]. \label{rate:2} \end{equation} The first term in the square bracket in Eq.~(\ref{rate:2}) is the pair creation rate from the electromagnetic field while the second term is the dS radiation with a new temperature $T=m/(2\pi|\gamma|)$ weighted by the density of states for the electromagnetic field. \par A few comments are in order. First, there is a term independent of the Landau levels, whose sum apparently gives a diverging factor. We tackle this issue by using the Riemann zeta function prescription as in Ref.~\cite{Elizalde:1994gf}. We also use the $n=0$ term which gives a constant factor \begin{equation} \sum_{n=0}^{\infty}=1+\zeta(0)=\frac{1}{2}, \label{zeta} \end{equation} where Eq.~(\ref{special}) has been used. Thus, the pair production from the zeta regularization technique leads to a finite result \begin{equation} \Gamma=\Bigl(\frac{eB\Omega^{-2}}{2\pi}\Bigr)\Bigl(\frac{H^{2}|\gamma|}{2\pi}\Bigr)\Bigl(\frac{1}{e^{4\pi|\gamma|}-1}\Bigr) \biggl[\frac{1}{2}+\sum_{n=0}^{\infty}e^{2\pi(|\kappa|+|\gamma|)}\biggr]. \label{rate:3} \end{equation} Second, in the regime of the weak magnetic field: $\ell\ll\min(1,\mu,\lambda)$ and the strong electric field: $\lambda\gg\max(1,\mu,\ell)$, Eq.~(\ref{rate:3}) leads to \begin{equation} \Gamma=\frac{1}{2}\Bigl(\frac{eB\Omega^{-2}}{2\pi}\Bigr)\Bigl(\frac{eE}{2\pi}\Bigr)e^{\frac{-\pi m^{2}}{|eE|}}. \label{rate:4} \end{equation} Third, in the limit of zero electric field $E=0$, the first term in the square bracket of Eq.~(\ref{rate:2}) vanishes and the second term is the dS radiation with the Gibbons-Hawking temperature \cite{Gibbons:1977mu} \begin{equation} \Gamma=\frac{1}{2}\Bigl(\frac{eB\Omega^{-2}}{2\pi}\Bigr)\Bigl(\frac{H^{2}|\gamma|}{2\pi}\Bigr)\frac{1}{e^{2\pi|\gamma|}-1}. \label{rate:5} \end{equation} The factor $1/2$ comes from the spin multiplicity for spinless bosons while it is $1$ for spin $1/2$ fermions. The radiation in the pure $\text{dS}_{4}$ without electromagnetic fields consists of massive particles $m\geq 3H/2$ and the leading term of $H^2|\gamma|$ is $Hm$ for the density of states \cite{Kim:2010cb}. Thus, the presence of a cosmic magnetic field enhances the dS radiation through the density of states by a factor of $eB\Omega^{-2}$. The density of states $eB$ becomes $H^{2}$ when there is no magnetic field. Finally, in the Minkowski spacetime limit $H=0$, Eq.~(\ref{rate:1}) gives the Schwinger formula in scalar QED \cite{Schwinger:1951nm} \begin{equation} \Gamma=\frac{1}{2}\Bigl(\frac{eB}{2\pi}\Bigr)\Bigl(\frac{eE}{2\pi}\Bigr)\frac{e^{\frac{-\pi m^{2}}{|eE|}}}{\sinh\Bigl(\frac{\pi B}{E}\Bigr)}. \label{rate:6} \end{equation} \section{\label{sec:current}Induced Current} Semiclassically, the conductive current $J_{\mathrm{sem}}$ of the newly created Schwinger pairs having a charge $e$, a number density $\mathcal{N}$, and a velocity $v$ due to the background electric field is defined as $J_{\mathrm{sem}}=2e\mathcal{N}v$. The number density of the semiclassical Schwinger pairs at the time $\tau$ reads \begin{equation} \mathcal{N}(\tau)=\Omega^{-2}(\tau)\int_{0}^{\tau}\Omega^{4}(\tau')\Gamma(\tau') d\tau' \sim \frac{\Gamma(\tau)}{H}, \label{mathN} \end{equation} where $\Gamma$ is given by Eq.~(\ref{rate:1}). The current $J_{\mathrm{sem}}$ is valid under the semiclassical condition, which is given by Eq.~(\ref{semi}). In this section we investigate the in-vacuum expectation value of the current operator which is referred to as the induced current, without assuming the constraint~(\ref{semi}) on the parameters. Hence, $\gamma$ can be real or purely imaginary depending on the value of involved parameters, $\lambda$ and $\mu$. \par The current operator is defined by \begin{equation} j^{\mu}(x)=\frac{ie}{2}g^{\mu\nu}\Bigl(\bigl\{\bigl(\partial_{\nu}+ieA_{\nu}\bigr)\varphi,\varphi^{*}\bigr\} -\bigl\{\bigl(\partial_{\nu}-ieA_{\nu}\bigr)\varphi^{*},\varphi\bigr\}\Bigr), \label{current} \end{equation} and can be shown to be conserved $\nabla_{\mu}j^{\mu}=0$ \cite{Book:Parker}. In order to compute the expectation value of the current operator, we will use the in-vacuum state since it is a Hadamard state \cite{Frob:2014zka,Garriga:1994bm}. Substituting the scalar field operator~(\ref{phiin}) into the current expression~(\ref{current}) and using Eqs.~(\ref{commin}) and~(\ref{vacin}), we find that the only nonvanishing component of the current is the one parallel to the electric field which is given by \begin{eqnarray} \bigl\langle\mathrm{in}\big|j^{3}(x)\big|\mathrm{in}\bigr\rangle &=& \frac{eH^{2}}{4\pi^{2}}\Omega^{-2}(\tau)\sum_{n=0}^{\infty} \int_{-\infty}^{+\infty}\frac{dp_{z}}{p}\big(rp+\lambda\big)e^{-\pi\lambda r}\big|W_{i\lambda r,\gamma}(-2ip)\big|^{2} \nonumber \\ &\times & \int_{-\infty}^{+\infty}dp_{x}h_{n}^{2}(y_{+}). \label{jz} \end{eqnarray} Using the orthonormality relation~(\ref{h:orthonor}) the $p_{x}$-integral is performed \begin{equation} \int_{-\infty}^{+\infty}dp_{x}h_{n}^{2}(y_{+})=-eB\tau. \label{intpx} \end{equation} If we parameterize the induced current as \begin{equation} J=\Omega(\tau)\bigl\langle\mathrm{in}\big|j^{3}(x)\big|\mathrm{in}\bigr\rangle, \label{par} \end{equation} then Eq.~(\ref{jz}) is simplified to \begin{equation} J=\frac{eH^{3}\ell}{4\pi^{2}}\sum_{n=0}^{\infty}\int_{-\infty}^{+\infty}\frac{dp_{z}}{p}\big(rp+\lambda\big)e^{-\pi\lambda r} \big|W_{i\lambda r,\gamma}(-2ip)\big|^{2}. \label{j} \end{equation} The remaining integral in the induced current expression~(\ref{j}) deals with the Whittaker functions. In the absence of the magnetic field background, the translational symmetry helps performing the integral using the Mellin-Barnes representation of the Whittaker functions; see \cite{Frob:2014zka,Kobayashi:2014zza}. However, even in this case the exact expression for the induced current is very complicated and one has to look at limiting regimes to better grasp the physics of the results. In the regime of $\lambda\gg 1$ the semiclassical condition~(\ref{semi}) is satisfied, and the induced current~(\ref{j}) is comparable to the semiclassical current $J_{\mathrm{sem}}=2e\mathcal{N}v$. Considering the ultrarelativistic particles with velocity $v\sim 1$, Fig.~\ref{fig:1} shows that the induced current $J$ approaches the semiclassical current $J_{\mathrm{sem}}$ for the strong electric field regime $\lambda\gg\max(1,\mu,\ell)$. In Figs.~\ref{fig:2} and~\ref{fig:3} we plot the induced current expression~(\ref{j}) as a function of the electric and magnetic fields, respectively. The figures illustrate that the induced current of a massive scalar field responds to the strong electromagnetic field as $J\varpropto B\cdot E$; for additional numerical investigations see \cite{Proceeding}. As a matter of consistency, we will now analytically investigate the limiting behavior of the induced current~(\ref{j}) to show that it agrees with the numerical investigations. \begin{figure}[t] \centering \includegraphics[scale=0.7]{Fig1.eps} \caption{The normalized induced current $J/eH^{3}$ (upper surface) and semiclassical current $J_{\mathrm{sem}}/eH^{3}$ (lower surface) are plotted as functions of $\lambda$ and $\ell$, in the lowest Landau state $n=0$ with $\mu=1$.} \label{fig:1} \end{figure} \subsection{\label{sec:weak}Weak magnetic field regime} In the weak magnetic field regime the relation $\ell\ll\min(1,\mu,\lambda)$ is satisfied. Taking the limit $\ell\rightarrow 0$ in the momentum $p$ gives $p\sim|p_{z}|$; see definition of $p$ in Eq.~(\ref{parameters}). Then the induced current expression~(\ref{j}) is simplified to \begin{equation} J\simeq\frac{eH^{3}\ell}{4\pi^{2}}\sum_{n=0}^{\infty}\sum_{r=\pm 1}\int_{0}^{\infty}\frac{dp_{z}}{p_{z}}\big(rp_{z}+\lambda\big)e^{-\pi\lambda r} \big|W_{i\lambda r,\gamma} \big(-2ip_{z}\big)\big|^{2}. \label{jweak} \end{equation} The integrand in the right hand side of Eq.~(\ref{jweak}) is independent of the Landau states. Hence, similarly to the prescription used in Sec.~\ref{sec:Schwinger}, using the zeta function representation~(\ref{zeta}), the current expression~(\ref{jweak}) is regularized to \begin{equation} J\simeq\frac{eH^{3}\ell}{8\pi^{2}}\sum_{r=\pm 1}\int_{0}^{\infty}\frac{dp_{z}}{p_{z}}\big(rp_{z}+\lambda\big)e^{-\pi\lambda r} \big|W_{i\lambda r,\gamma} \big(-2ip_{z}\big)\big|^{2}. \label{jreg} \end{equation} The computation and adiabatic regularization of the current~(\ref{jreg}) have been reviewed in Appendix~\ref{app:reg} and the final result can be read from Eq.~(\ref{scheme}). We then obtain \begin{equation} J_{\mathrm{reg}}=\Bigl(\frac{eH^{3}}{4\pi^{2}}\Bigr)\frac{\ell\gamma\sinh\big(2\pi\lambda\big)}{\sin\big(2\pi\gamma\big)}. \label{jregweak} \end{equation} We comment here that our result is unlike the case of a pure electric field in $\text{dS}_{4}$ \cite{Kobayashi:2014zza}, where in order to renormalize the current an adiabatic expansion up to order two has been performed to remove the quadratic divergence, here the adiabatic order zero is enough as in the $\text{dS}_{2}$ case \cite{Frob:2014zka}. The reason is that we deal here with an effective integration in 1+1 dimensions, and the integration over momentum in the directions orthogonal to the magnetic field is replaced by a discrete sum over quantized Landau levels, which is regularized and renormalized by using the Riemann zeta function technique; see Appendix~\ref{app:zeta}. \begin{figure}[t] \centering \includegraphics[scale=0.7]{Fig2.eps} \caption{For different values of $\ell$, the normalized induced current $J/eH^{3}$ is plotted as a function of $\lambda$, in the lowest Landau state $n=0$ with $\mu=1$.} \label{fig:2} \end{figure} \subsubsection{\label{sec:large}Strong electric field regime} In the strong electric field regime the relation $\lambda\gg\max(1,\mu,\ell)$ is satisfied. Taking the limit $\lambda\rightarrow\infty$ in the regularized induced current~(\ref{jregweak}) with $\mu$ and $\ell$ fixed, to the leading order term, gives rise to \begin{equation} J_{\mathrm{reg}}\simeq\frac{e}{H}\Bigl(\frac{eB\Omega^{-2}}{2\pi}\Bigr)\Bigl(\frac{eE}{2\pi}\Bigr)e^{\frac{-\pi m^{2}}{|eE|}}. \label{stronge} \end{equation} In this regime the decay rate is given by Eq.~(\ref{rate:4}) and does the semiclassical current follow from Eq.~(\ref{mathN}). Then, one can verify that the induced current~(\ref{stronge}) agrees with the semiclassical current for particles with the velocity $v\sim 1$. \subsubsection{\label{sec:heavy}Weak electric field and heavy scalar field regime} \begin{figure}[t] \centering \includegraphics[scale=0.7]{Fig3.eps} \caption{For different values of $\lambda$, the normalized induced current $J/eH^{3}$ is plotted as a function of $\ell$, in the lowest Landau state $n=0$ with $\mu=1$.} \label{fig:3} \end{figure} In this regime the relations $\lambda\ll 1$ and $\mu\gg 1$ are satisfied. Taking the limits $\lambda\rightarrow 0$ and $\mu\rightarrow\infty$ in the regularized induced current expression~(\ref{jregweak}) with $\ell$ fixed, to the leading order, gives rise to \begin{equation} J_{\mathrm{reg}}\simeq\frac{4\pi em}{H^{2}}\Bigl(\frac{eB\Omega^{-2}}{2\pi}\Bigr)\Bigl(\frac{eE}{2\pi}\Bigr)e^{\frac{-2\pi m}{H}}. \label{weake} \end{equation} In this regime the decay rate reads from Eq.~(\ref{rate:5}) and the induced current~(\ref{weake}) agrees with the semiclassical current $J_{\mathrm{sem}}$ for particles with the velocity $v\sim (4\pi eE)/H^{2}$. \subsubsection{\label{sec:irhc}Infrared regime} In this regime the relations $\ell\ll\mu\ll\lambda\ll 1$ are satisfied. Hence the semiclassical current cannot be compared to the induced current in this regime. Taking the limits $\lambda\rightarrow 0$ and $\mu\rightarrow 0$ in the induced current expression~(\ref{jregweak}), we then find \begin{equation} J_{\mathrm{reg}}\simeq\frac{9eH^{3}}{8\pi^{2}}\Bigl(\frac{\ell\lambda}{\lambda^{2}+\mu^{2}}\Bigr), \label{irhc:1} \end{equation} or in terms of dimensionful variables \begin{equation} J_{\mathrm{reg}}\simeq\frac{9eH^{3}}{2}\Bigl(\frac{eB\Omega^{-2}}{2\pi}\Big)\Bigl(\frac{eE}{2\pi}\Big) \biggl(\frac{1}{\bigl(eE\bigr)^{2}+\bigl(mH\bigr)^{2}}\biggr). \label{irhc:2} \end{equation} In this regime for an interval of $\mu\lesssim\lambda\lesssim 1$ a decreasing electric field gives rise to an increasing current and consequently hyperconductivity. This infrared phenomenon was first discovered in \cite{Frob:2014zka} and dubbed as the infrared hyperconductivity (IRHC) for the case of a scalar field coupled to a constant, purely electric field background in $\text{dS}_{2}$. In Ref.~\cite{Kobayashi:2014zza}, using an alternative approach in Ref.~\cite{Geng:2017zad}, the authors have computed the current due to a pure electric field in $\text{dS}_{4}$ and found the IRHC. In \cite{Kobayashi:2014zza}, the second order adiabatic expansion leads to a term of the form $\log(m/H)$ in the regularized induced current expression. Therefore, it was not possible to discuses IRHC for the case of a massless minimally coupled scalar field. However, we note here that the inclusion of the magnetic field and the change of the renormalization prescription allow to explore IRHC in the massless limit. We find indeed that the induced current responds as $J\sim B/E$ and increases unboundedly in the case of a massless minimally coupled scalar field. For a massive scalar field, an upper bound on the induced current occurs at $\lambda=\mu$ and is given by \begin{equation} J_{\mathrm{reg}}\simeq\frac{9eH^{2}}{8\pi m}\Bigl(\frac{eB\Omega^{-2}}{2\pi}\Big). \label{bound} \end{equation} The exact nature of IRHC remains a mystery but has been reported in various works in the previous years. It is unexpected as for a decreasing cause: the electric field background, the consequence: the induced current due to the creation of Schwinger pairs increases. It might be a signal for the need for backreaction and the breaking of the working assumptions of the toy model used to derive it or could have a deeper physical meaning that is to be understood. In any case, if it is confirmed within the next years, it has to be taken into account and will give constraints on inflation scenarios. \subsection{\label{sec:strong}Strong magnetic field regime} In the strong magnetic field regime the relation $\ell\gg\max(1,\mu,\lambda)$ is satisfied. In this regime, in order to examine the limiting behaviour of the induced current, it is convenient to rewrite Eq.~(\ref{j}) in the form of \begin{equation} J=\frac{eH^{3}\ell}{4\pi^{2}}\sum_{n=0}^{\infty}\int_{-1}^{+1}\frac{dr}{(1-r^{2})} \bigl(rp(r)+\lambda\bigr)e^{-\pi\lambda r}\Bigl|W_{i\lambda r,\gamma}\bigl(-2ip(r)\bigr)\Bigr|^{2}, \label{jr} \end{equation} where the momentum $p$ as a function of $r$ is given by \begin{equation} p(r)=\sqrt{\frac{(1+2n)\ell}{1-r^{2}}}. \label{pr} \end{equation} In the limit of $\ell\rightarrow\infty$ and as a consequence $p(r)\rightarrow\infty$, the Whittaker function approximates \begin{equation} \Bigl|W_{i\lambda r,\gamma}\bigl(-2ip(r)\bigr)\Bigr|^{2} \sim e^{\pi\lambda r}. \label{form} \end{equation} Substituting the asymptotic form~(\ref{form}) into Eq.~(\ref{jr}) and using the prescription~(\ref{zeta}), we obtain \begin{equation} J \simeq \frac{eH^{3}\ell\lambda}{8\pi^{2}}\int_{-1}^{+1}\frac{dr}{(1-r^{2})}. \label{jstrong} \end{equation} In order to regularize the integral in Eq.~(\ref{jstrong}), we use following prescription \begin{equation} \int_{-1}^{+1} \frac{dr}{(1-r^{2})} = \sum_{n=0}^{\infty}\int_{-1}^{+1}drr^{2n} = \sum_{n=0}^{\infty}\frac{1}{n+\frac{1}{2}}, \label{intr} \end{equation} and using the definition of the Hurwitz zeta function given by Eq.~(\ref{def:Hurwitz}), we represent the summation as \begin{equation} \sum_{n=0}^{\infty} \frac{1}{n+\frac{1}{2}} = -\frac{\partial^{2}}{\partial a\partial s}\zeta\Bigl(s=0,a=\frac{1}{2}\Bigr). \label{sum} \end{equation} Finally, with Eqs.~(\ref{jstrong})-(\ref{sum}) and~(\ref{formula}), we obtain the regularized induced current in the strong magnetic field regime \begin{eqnarray} J_{\mathrm{reg}} \simeq \Big(\gamma_{\mathrm{Euler}}+\log(4)\Big)\frac{eH^{3}\ell\lambda}{8\pi^{2}} \sim \frac{e}{H}\Big(\frac{eB\Omega^{-2}}{2\pi}\Big)\Big(\frac{eE}{2\pi}\Big), \label{strong} \end{eqnarray} where $\gamma_{\mathrm{Euler}}=0.577\cdots$ is the Euler's constant. This result shows the new contribution of the magnetic field in the strong magnetic field regime. As for the strong electric field regimes, the induced current presents a linear behavior in the magnetic field. As expected, it is the pair production due to the electromagnetic field which dominates its gravitational counterpart, in this regime. \section{\label{sec:concl}Conclusion} We have investigated for the first time the effect of a uniform magnetic field on the Schwinger pair production and the induced current due to a uniform electric field in $\text{dS}_{4}$. On the one hand, in Minkowski spacetime, a strong constant electric field can create pairs of charged particles from the vacuum at the cost of electrostatic energy. This is known as the Schwinger effect. A pure magnetic field does not produce any pair of charged particles since the virtual pair from the vacuum immediately annihilates each other. On the other hand, dS can emit radiation of all species of particles. This is known as the Gibbons-Hawking radiation. Considering those two effects together has been done in the past years. In this case, two important results are that the Gibbons-Hawking radiation enhances the pair production \cite{Cai:2014qba} and the super-horizon behavior of the field leads to a phenomenon of infrared hyperconductivity for the induced current \cite{Frob:2014zka,Kobayashi:2014zza,Bavarsad:2016cxh,Geng:2017zad}. \par In this paper, we add one more ingredient to this setup: we include a uniform magnetic field parallel to the electric field in $\text{dS}_{4}$. The results of this paper recover the Schwinger effect and the induced current in the absence of a magnetic field, which has been systematically investigated in Ref.~\cite{Kobayashi:2014zza}. The consequence of a constant magnetic field on the Schwinger effect and the induced current with or without an electric field in $\text{dS}_{4}$ has been extensively studied. \par First, the Schwinger effect is enhanced due to the density of states proportional to the magnetic field. Even in the absence of the electric field, the pair production rate is a product of the Gibbons-Hawking radiation and the magnetic field. This means that a strong magnetic field indeed assists the pair production in dS; see the result in Eq.~(\ref{rate:5}). This is in contrast to the Schwinger effect due to parallel electric and magnetic fields in the Minkowski spacetime, in which the density of states is proportional to both the electric field and the magnetic field and vanishes when the electric field is absent because a pure magnetic field is stable against spontaneous pair production. \par Second, the infrared hyperconductivity has been observed in the regime $\mu\ll\lambda\ll 1$, for weak magnetic fields; see the result in Eq.~(\ref{irhc:2}). This indicates that in the $\mathrm{dS}$: (i) $\mu=m/H\ll 1$, i.e., the Compton wavelength $m^{-1}$ of the charge is much bigger than the Hubble radius $H^{-1}$; (ii) $\lambda=eE/H^{2}\ll1$, i.e., the electric field $E$ is much smaller than the scalar curvature $R=12H^2$; (iii) $\mu\ll\lambda$ or $eE/H \gg m$, i.e., the electric potential energy across the Hubble radius $H^{-1}$ is much larger than the mass of charge. This is in contrast to the regime $eE/m\gg m$ for the Schwinger effect for a pure electric field in flat spacetime, i.e., the electric potential energy across one Compton wavelength of the charge is much larger than the mass of charge. The upper bound for the induced current in the magnetic field and electric field is given by $eB\Omega^{-2}H^{2}/m$ modulo a constant of order one, while in the pure electric field, the induced current has an upper bound given by $eH^{4}/m$, independently of the electric field. \par Finally, in the limit of a magnetic field stronger than the mass of charges, the electric field and scalar curvature of the $\mathrm{dS}$, the induced current is proportional to the pseudo-scalar of the Maxwell theory, [see the result in Eq.~(\ref{strong})] which corresponds to the chiral magnetic effect for spin-$1/2$ fermions \cite{Fukushima:2008xe}. The chiral magnetic effect for fermions in the $\mathrm{dS}$, which is likely to hold for spinor QED considering the analogy with scalar QED, would be physically interesting but is beyond the scope of this paper and will be addressed in a future study. \par Going further, an extension of the setups already known to investigate the Schwinger effect in dS would be to consider anisotropic inflationary spacetime where a constant electric field could be naturally sustained. Links to axion inflation and possibly a mechanism of baryogenesis with the help of the Schwinger effect could also be exhibited. \acknowledgments S.~P.~K. would like to thank Remo Ruffini at ICRANet, where this work was initiated and also W-Y.~Pauchy Hwang for the warm hospitality at National Taiwan University. The work of S.~P.~K. was supported by IBS (Institute for Basic Science) under IBS-R012-D1 and also by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2015R1D1A1A01060626). E.~B. and S.-S.~X. would like to thank S.~P.~K. for the warm hospitality at Kunsan National University. E.~B. is supported by the University of Kashan.
\section{Conclusion} We present a metropolitan-scale visual analytics study over a new urban movement data collection in China. Compared with previous works, our data set is immensely huge, records user's comprehensive movement pattern, and preserve a clear user context for study. To efficiently process, visualize and analyze such big urban movement data, we have proposed: 1) a scalable, grid-based data analytics pipeline to extract and represent user mobility data; 2) a suite of information-theory based metrics to effectively characterize user-level mobility patterns; 3) an integrated visual analytics system, namely UrbanFACET, to support interactive analysis on the multifaceted mobility metrics and their correlation with urban structure and POI distributions, as well as to compare across urban regions and among heavily populated cities. In future, we plan to extend UrbanFACET in three directions. First, besides the macro-level city profiling, it is also important to model fine-grained regions and conduct analysis on local residents. Second, beyond the spatial feature based entropy metrics, we are interested to define time-based user mobility metrics given the non-uniform temporal distribution of user's movement records. Third, visual storytelling with multifaceted urban movement data poses a demanding challenge to extend the user base of UrbanFACET beyond domain experts. \section{Related Work} In urban studies, exploring patterns and trends of intra-urban human mobility advances the understanding of urban dynamics and reveals socioeconomic driving forces \cite{Chowell03,Sang11,LiuKGXT12}. Location-aware devices are widely applied in urban studies \cite{Pavithra14,Phithakkitnukoon10,Ratti06,Shoval08}. Location data from cell phones is used in urban analysis in Milan \cite{Ratti06} and Rome \cite{Sevtsuk10}, Italy. The increasing availability of GPS data has greatly facilitated the study of street networks \cite{Jiang09,JiangLiu09,WangHB12}. The floating car technique has been used by intelligent transportation systems to obtain its positional information \cite{DaiFR03,TongMC09}. Hence, taxis often serve as floating cars to obtain human mobility data and examine real-time traffic status and individual behaviors \cite{Jiang09,LiuAR10,LiZW11,QiLLPWZ11}. In the field of data mining, trajectories of human and vehicle motions are used to discover knowledge from large-scale datasets \cite{Zheng:2014:UrbanComputing}. Vehicle trajectory data has been used in traffic monitoring and prediction \cite{Pan:2013:CST}, urban planning \cite{Zheng:2011:UCT}, driving routing \cite{Yuan:2010:TDD,Yuan:2013:TED}, extracting geographical borders \cite{GeoBorder12}, service improvement \cite{Yuan:2013:TRS}, energy consumption analysis \cite{Zhang:2013:SPU}, and dynamic travel time estimation \cite{Pfoser:2008:DTT}. Large-scale mobile phone data with GIS information is used to uncover hidden patterns in urban road usage \cite{WangNature12}, find privacy bounds of human mobility \cite{privacymobility13}, estimate travel time \cite{Thiagarajan:2009:VAE} and infer land use \cite{Toole:2012:ILU}. Public transit trajectories are used in bus arrival time predictions \cite{Zimmerman:2011:FTT}, user's transportation mode inference \cite{Zimmerman:2011:FTT}, and travelers' spending optimization \cite{Lathia:2011:MMD}. A large number of approaches have been proposed to visually explore movement data (see \cite{andrienko2012visual} for a recent survey). Many of them are focused on the origins and destinations of the trajectories, such as flow maps \cite{phan2005flow}, Flowstrates \cite{boyandin2011flowstrates}, origin-destination (OD) maps \cite{wood2010visualisation}, and visual queries for origin and destination data \cite{Ferreira:2013:VEB}. Other work visualizes trajectories using various visual metaphors and interactions, such as GeoTime \cite{Kapler:2005:GTI}, TripVista \cite{Guo:2011:TTP}, FromDaDy \cite{Hurter:2009:FSA}, vessel movement \cite{Willems:2009:VVM}, route diversity \cite{liu2011diverse}, Kohonen map \cite{schreck2009visual} and more. Many visual analytics approaches have also been developed to analyze human mobility behaviors. Bicycle hire patterns are discovered by flow maps and OD maps \cite{Wood11}. They were also studied by aggregating individual OD data according to trip directions and distance \cite{MassAbstraction17}. Bluetooth based OD data is also used to find the dynamics of vehicles to characterize urban networks \cite{Laharotte15}. Smart-card data records human behaviors which is used for extracting passenger routes \cite{Hurk15} and analyzing subway routes and reachable regions \cite{zeng2014visualizing}. Social media data with geo-tags \cite{GeoTweet13,GeoPhoto10} can also find places and events related to urban human movement. However, none of the existing work has been utilizing the massive mobile device recorded data as in this paper, which includes tens of millions of real users in several big cities. The geographical context of cellular towers and an alternative modularity function is used to interpret the patterns in the phone call interactions and the mobile phone users’ movement \cite{Gao13}. The cellular data network records are also used to compute a finer granularity of location and movement \cite{Zhang14}. MViewer system \cite{Pu2014} is designed to visualize and analyze the population mobility patterns from millions of phone call records. It includes visual analysis of user groups in a base station, the mobility patterns on different user groups in certain base stations, and handoff phone call records. Cell phone location records are used for studying urban human flow across a city with flow volumes, links, and user communities \cite{MobileViewer16}. These approaches do not provide entropy-based metrics for human mobility analysis as we do here. Entropy metric has been used by Song et al. \cite{Science10} to study the mobility patterns of anonymized mobile phone users. They used 50,000 individuals anonymous mobile phone users in a 3-month-long record. Their major goal was to find to what degree human behavior is predictable, which was completely different from ours. By measuring the entropy of each individual’s trajectory, they found a 93\% potential predictability in user mobility. This work showed that population mobility patterns might be discovered through analyzing mobile users data, which partially justifies our approach in this work. Recently, Kang et al. \cite{Wuhan17} used mobile records to uncover frequently visited locations of a city's massive mobile users where an approximate entropy is used. This entropy definition was different from our metrics and they did not provide visual systems of several big cities. \section{#1} \label{sec:#2} } \newcommand {\rsec}[1]{Section \ref{sec:#1}} \newcommand {\rcha}[1]{Chapter #1} \newcommand {\bsubsec}[2]{\mymarginpar{sec:#2} \subsection{#1} \label{sec:#2} } \newcommand {\rsubsec}[1]{Section \ref{sec:#1}} \newcommand {\rsuba}[1]{Appendix \ref{sec:#1}} \newcommand {\bsubsubsec}[2]{\mymarginpar{sec:#2} \subsubsection{#1} \label{sec:#2} } \newcommand {\rsubsubsec}[1]{Section \ref{sec:#1}} \newcommand {\heading}[1]{\vspace{.4in} \noindent \addcontentsline{toc}{subsection} {\hspace{.5in} {\em #1}} {\bf #1} \vspace{.15in}} \newcommand {\headingtwo}[1]{\vspace{.4in} \noindent \addcontentsline{toc}{subsection} {\hspace{1in} {\em #1}} {\bf #1} \vspace{.15in}} \newcommand {\beq}[1]{ \begin{equation} \label{eq:#1} } \newcommand {\beqno}[1]{\begin{eqnarray} \nonumber} \newcommand {\eeq}{\end{equation}} \newcommand {\eeqno}{ && \end{eqnarray}} \newcommand {\req}[1]{Eq.~(\ref{eq:#1})} \newcommand {\bear}[1]{ \begin{eqnarray} \label{eq:#1} } \newcommand {\bearno}[1]{ \begin{eqnarray} \nonumber} \newcommand {\eear}{\end{eqnarray}} \newcommand {\eearno}{\end{eqnarray}} \newcommand {\rear}[1]{(\ref{eq:#1})} \newcommand {\btab}[1]{ \begin{table} \centering \begin{tabular}{#1}} \newcommand {\etab}[3] { \end{tabular} \caption[#3]{#2} \label{tab:#1} \end{table} \vspace{.1in}} \newcommand {\rtab}[1]{Table \ref{tab:#1}} \newcommand {\btabular}[1]{\begin{center} \begin{tabular}{#1}} \newcommand {\etabular}{\end{tabular} \end{center}} \newcommand {\bdefin}[1]{\begin{definition}\label{def:#1}} \newcommand {\edefin} {\end{definition}} \newcommand {\rdef}[1]{Definition \ref{def:#1}} \newcommand {\bpro}[1]{\begin{property} \label{pro:#1} } \newcommand {\epro} {\end{property}} \newcommand {\rpro}[1]{Property \ref{pro:#1}} \newcommand {\bprop}[1]{\begin{proposition} \label{prop:#1} } \newcommand {\eprop} {\end{proposition}} \newcommand {\rprop}[1]{Proposition \ref{prop:#1}} \newcommand {\blem}[1]{\begin{lemma} \label{lem:#1}} \newcommand {\elem} {\end{lemma}} \newcommand {\rlem}[1]{Lemma \ref{lem:#1}} \newcommand {\bthe}[1]{\begin{theorem} \label{the:#1} } \newcommand {\ethe} {\end{theorem}} \newcommand {\rthe}[1]{Theorem \ref{the:#1}} \newcommand {\bproof}{\noindent {\bf Proof.} \ } \newcommand {\eproof} {\hfill \squares \\ \vspace{.3cm}} \newcommand {\bcor}[1]{\begin{corollary} \label{cor:#1} } \newcommand {\ecor} {\end{corollary}} \newcommand {\rcor}[1]{Corollary \ref{cor:#1}} \newcommand {\ralg}[1]{Algorithm \ref{alg:#1}} \newcommand{\hide}[1]{} \newcommand {\shil}[1]{{\color{red}[From Lei: #1]}} \newcommand {\rednote}[1]{{\color{red}#1}} \newcommand{\mkclean}{ \renewcommand{\shil}[1]{} } \vgtcinsertpkg \title{UrbanFACET: Visually Profiling Cities from Mobile Device Recorded Movement Data of Millions of City Residents} \iffalse \author{Roy G. Biv\thanks{e-mail: <EMAIL>}\\ % \scriptsize Starbucks Research % \and Ed Grimley\thanks{e-mail:<EMAIL>}\\ % \scriptsize Grimley Widgets, Inc. % \and Martha Stewart\thanks{e-mail:<EMAIL>}\\ % \parbox{1.4in}{\scriptsize \centering Martha Stewart Enterprises \\ Microsoft Research}} \fi \author{Lei Shi, Tao Jiang, Ye Zhao, Xiatian Zhang and Yao Lu} \authorfooter{ \item Lei Shi and Tao Jiang are with the State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences. Email: \{shil,jiangt\}@ios.ac.cn. \item Ye Zhao is with Department of Computer Science, Kent State University. Email: <EMAIL>. \item Xiatian Zhang and Yao Lu are with Beijing Tendcloud Tianxia Technology Co., Ltd. Email: \{xiatian.zhang,yao.lu\}@tendcloud.com. } \teaser{ \centering \includegraphics[width=6 in]{pic/UrbanFACETOverview.pdf} \vspace{-0.1 in} \caption{The visualization interface of UrbanFACET: (a) the selection on city and time; (b) the selection of mobility metrics displayed on the map, and the visualization options; (c) detailed information on the selected region (the whole city by default if nothing is selected); (d) probability density function of the displayed mobility metric; (e) average probability distribution on POI/DIV classes to compute the mobility metric; (f) the spatial visualization of mobility metrics (vibrancy in this case); (g) legend and controller of the map.} \label{fig:UrbanFACETOverview} } \abstract{Cities are living systems where urban infrastructures and their functions are defined and evolved due to population behaviors. Profiling the cities and functional regions has been an important topic in urban design and planning. This paper studies a unique big data set which includes daily movement data of tens of millions of city residents, and develop a visual analytics system, namely UrbanFACET, to discover and visualize the dynamical profiles of multiple cities and their residents. This big user movement data set, acquired from mobile users' agnostic check-ins at thousands of phone APPs, is well utilized in an integrative study and visualization together with urban structure (e.g., road network) and POI (Point of Interest) distributions. In particular, we novelly develop a set of information-theory based metrics to characterize the mobility patterns of city areas and groups of residents. These multifaceted metrics including Fluidity, vibrAncy, Commutation, divErsity, and densiTy (FACET) which categorize and manifest hidden urban functions and behaviors. UrbanFACET system further allows users to visually analyze and compare the metrics over different areas and cities in metropolitan scales. The system is evaluated through both case studies on several big and heavily populated cities, and user studies involving real-world users.} \iffalse \CCScatlist{ \CCScat{K.6.1}{Management of Computing and Information Systems}% {Project and People Management}{Life Cycle}; \CCScat{K.7.m}{The Computing Profession}{Miscellaneous}{Ethics} } \fi \CCScatlist{ A, B, C } \begin{document} \maketitle \input{intro} \input{relatedwork} \input{data} \input{analysis} \input{visualization} \input{evaluation} \input{conclusion} \iffalse \acknowledgments{ The authors wish to thank A, B, C. This work was supported in part by a grant from XYZ.} \fi \bibliographystyle{abbrv-doi}
\section{Introduction}\label{sec-intro} Scalar-tensor theories \cite{maeda-book, faraoni-book}, among which the Brans-Dicke (BD) theory \cite{bd-theory} is the prototype, have a long and hesitating history \cite{brans}. Despite that until very recently no fundamental scalar particle was found in nature, these theories have found a variety of applications both in gravitational and in cosmological contexts. In the list of famous scalar fields (this includes the prototype BD scalar field) we encounter the Higgs particle of the standard model of particles \cite{smp-book}, the dilaton -- and other moduli fields -- of the effective (low-energy) string theory \cite{wands-rev}, the inflaton that accounts for the early inflationary stage of the cosmic evolution \cite{linde, inflaton} and the quintessence field that embodies the so called dark energy that inflates the Universe at late times \cite{quintessence}, among others. Starting in 2013 year things changed and it seems that the first fundamental scalar particle has been finally discovered \cite{higgs-discovery}. This entails that scalars and, consequently, scalar-tensor theories have to be taken seriously as feasible scenarios for physical phenomena. The BD theory \cite{bd-theory}, as well as the more general scalar-tensor theories \cite{maeda-book, faraoni-book}, are classical theories of the gravitational field and as such these are not intended to describe quantum gravitational phenomena. However, there are indications that including higher order terms into the gravitational action makes the given theory of gravity more compatible with quantum (renormalizable) variants \cite{stelle-prd} whose predictions can be trusted back enough into the past. One example is the addition of four-order terms like $R_{\mu\nu\tau\rho}R^{\mu\nu\tau\rho}$, $R_{\mu\nu}R^{\mu\nu}$ and $R^2$ into the Einstein-Hilbert action that gives a class of multimass models of gravity \cite{stelle-grg} where, in addition to the usual massless excitations of the fields, there are massive scalar and spin-2 excitations with a total of 8 degrees of freedom.\footnote{The unwanted (yet tractable) property of this theory is that the massive spin-2 mode is ghost-like \cite{ovrut-prd}.} In this vein it is interesting to complement the action of standard scalar-tensor theories with higher-order terms in order to have a theory more compatible with a would be quantum version. This modification would include not only terms quadratic in the curvature invariants but, also, higher-derivative terms like: $c_1R\der_\mu\phi\der^\mu\phi,$ $c_2R_{\mu\nu}\der^\mu\phi\der^\nu\phi,$ $c_3R_{\mu\nu}\phi\nabla^\mu\nabla^\nu\phi,$ $c_4\nabla_\mu R\phi\der^\mu\phi,$ $c_5R\phi\nabla^2\phi,$ $c_6\nabla^2R\phi^2,$ where $\nabla^2\equiv\nabla_\mu\nabla^\mu$ and $c_1,...,c_6$ are coupling constants with the dimensions of length-squared. The problem with the undiscriminated addition of higher-derivative terms is that the resulting equations of motion contain derivatives higher than second-order and this, in turn, leads to the appearance of awful and catastrophic Ostrogradsky ghosts in the theory, that makes it strongly unstable and untenable as an adequate model of gravitational phenomena. The most general possible scalar-tensor theories that contain higher order derivatives and derivative couplings in the Lagrangian and that, at the same time, lead to second-order motion equations -- so that these are free of the Ostrogradsky instability -- are called as ``Horndeski'' theories \cite{horndeski, nicolis, deffayet, tsujikawa} (see \cite{beyond-horndeski} for a class of theories generalizing the Horndeski ones). These theories have been applied with success to describe the cosmological evolution of our Universe in different contexts \cite{kazuya, japan, chow, also}. An interesting subset of the Horndeski theories is composed of the so called scalar-tensor theories with a non-minimal derivative (kinetic) coupling, in particular those where the kinetic coupling is to the Einstein's tensor \cite{sushkov, saridakis-sushkov, matsumoto, granda, gao, germani, germani-1}: $\propto G^{\mu\nu}\der_\mu\phi\der_\nu\phi$. The latter theory is characterized by its relative mathematical simplicity when compared with other Horndeski theories and also by its ability to account for the early (transient) inflationary stage, since it is able to explain in a unique manner both a quasi-de Sitter phase and an exit from it without any fine-tuned potential \cite{sushkov}. The action for the typical theory with non-minimal derivative coupling of the scalar with the Einstein's tensor: $G_{\mu\nu}\equiv R_{\mu\nu}-g_{\mu\nu}R/2$, is given by: \bea &&S=\int d^4x\frac{\sqrt{|g|}}{2}\left[R-\left(\epsilon g^{\mu\nu}-\alpha G^{\mu\nu}\right)\der_\mu\phi\der_\nu\phi-2V(\phi)\right]+S_m,\label{action}\eea where we set $8\pi G_N=c=h=1$, and the coupling constant $\alpha$ is a real number. The parameter $\epsilon$ can take the following values: $\epsilon=+1$ (quintessence), $\epsilon=-1$ (phantom cosmology), and $\epsilon=0$ (pure derivative coupling).\footnote{In this paper we refer to 'pure derivative coupling' -- independent of the presence or absence of the self-interacting potential -- to the models based in the action principle \eqref{action} without the standard kinetic term ($\epsilon=0$), i. e., there is only kinetic coupling to the Einstein's tensor.} In the above equation $S_m$ is the action of the matter degrees of freedom other than the scalar field. Theories of the type \eqref{action} have been studied in different contexts. For instance, in \cite{rinaldi} static, spherically symmetric solutions to the gravitational field equations derived from \eqref{action} were explored and black hole solutions with a single regular horizon were found, and their thermodynamical properties were examined. Related work regarding asymptotically locally AdS and flat black holes can be found in \cite{anabalon}, while in \cite{cisterna} the authors constructed the first neutron stars based in \eqref{action}. The obtained construction may -- in principle -- constrain in a phenomenological way the free parameters of the model. Cosmological scenarios based in theories with kinetic coupling with the Einstein's tensor have been studied in \cite{saridakis-sushkov} in order to examine quintessence (and phantom) models of dark energy with zero and constant self-interaction potentials. It has been shown that, in general, the universe transits from one de Sitter solution to another, depending on the coupling parameter. A variety of behaviors -- including Big Bang and Big Crunch solutions, and also cosmological bounce -- reveals the capabilities of the corresponding cosmological model. A dynamical systems analysis of the derivative coupling model with the Higgs-like potential can be found in \cite{matsumoto}, while a similar study for the exponential potential has been performed in \cite{huang}. It was found that, for the quintessence case, the stable fixed points are the same with and without the non-minimal derivative coupling, while for the pure derivative coupling (no standard canonical kinetic term) only the de Sitter attractor exists and the dark matter solution is unstable. Cosmology based in \eqref{action} has been also investigated in \cite{jinno}. The latter paper points out the existence of the Laplacian instability in the theory with kinetic coupling of the scalar field with the Einstein's tensor in the context of reheating after inflation. Particle production after inflation in the model \eqref{action} tensor has also been studied in the reference \cite{jinno-others} by the same authors. A very interesting -- and to our opinion, central -- aspect of the theory \eqref{action} was investigated in \cite{gao}. In that reference it was found that in the cosmological model based in \eqref{action} with pure derivative coupling to the Einstein's tensor ($\epsilon=0$) and with vanishing potential $V=0$ -- in the absence of other matter sources ($S_m=0$) -- the scalar behaves as pressureless matter with vanishing sound speed, so that it could be a candidate of cold dark matter. By also considering the scalar potential ($V\neq 0$), it was found that the scalar field may play the role of both dark matter and dark energy. In this case, the effective equation of state (EOS) of the scalar field $\omega_\text{eff}$ can cross the phantom divide \cite{caldwell, crossing-odintsov, crossing-observ, crossing-nesseris, mohseni}: $\omega_\Lambda=-1$ (this is properly the EOS parameter of the cosmological constant), but this can lead to the sound speed becoming superluminal as it crosses the divide, and so is physically forbidden.\footnote{It is well known that Horndeski theories all possess some configurations with a superluminal propagation.} The possibility of the phantom divide crossing in the model is in itself a very interesting finding, however two results we find particularly interesting in this study: i) that the crossing of the phantom divide may be linked with superluminal sound speed, and ii) that the physical limits on the sound speed are used as a basic criterion for rejection of a given cosmological model. The fact that the physical bounds on the speed of propagation of the perturbations of the field is to be taken carefully and seriously when Horndeski-type theories are under investigation, was understood also by the authors of \cite{sup-lum-gal-1}. In that reference it was shown that, when the Dirac-Born-Infeld (DBI) galileon is considered as a local modification to gravity, such as in the Solar system, the existing stable solutions always exhibit superluminality, casting doubt on the existence of a standard Lorentz invariant UV completion of that theory.\footnote{There exist alternative points of view on this issue. For instance, in \cite{vikman, sup-lum-gal-2} it is shown that k-essence and galileon theories, respectively, satisfy an analogue of Hawking's chronology protection conjecture, an argument that can be extended to include Hordenski theories in general. However, there are strong arguments that contradict such kinds of non-orthodox points of view on causality (for more on this issue see Ref. \cite{sup-lum-other}). In this regard we recommend the clear and pedagogical discussion on this issue given in \cite{ellis-roy}.} In view of the importance of the above issue, and given that there does not exist in the bibliography a thorough discussion on the implications for cosmology of the physical bounds on the speed of sound in the theory with the kinetic coupling to the Einstein's tensor,\footnote{In \cite{gao} the subject was only partially investigated -- only connection of the phantom barrier crossing with superluminality of the scalar perturbations was established -- besides only the pure derivative coupling case $\epsilon=0$ was considered in that reference. The issue was also stated but not investigated in \cite{dent}. In this latter reference (see last paragraph of page 8) the authors state that the investigation of the instabilities and superluminality in the model with the kinetic coupling to the Einstein's tensor lies beyond the scope of their paper. A similar statement can be found in \cite{matsumoto} (see the top paragraph of page 3).} in the pres paper we shall be concentrating in the ``$\omega_\Lambda=-1$'' barrier crossing issue in the model \eqref{action} by paying special attention to the physical bounds on the speed of sound squared $c_s^2$. These bounds are imposed by stability and causality, two fundamental principles of classical physical theories: The squared sound speed should be non-negative $c^2_s\geq 0$ since otherwise, the cosmological model will be classically unstable against small perturbations of the background energy density, usually called as Laplacian -- also gradient -- instability. Besides, causality arguments impose that the mentioned small perturbations of the background should propagate at most at the local speed of light $c^2_s\leq 1$. In order to implement the numeric investigation we shall explore two specific potentials: the frequently encountered in cosmological applications exponential potential \cite{huang, exp-pot-ferreira, exp-pot-wands}: $V=V_0\exp(\lambda\phi)$ and, also, the power-law potential $V=V_0\phi^{2n}$ \cite{pwl-pot-peebles}. The exponential potential \bea V=V_0\,e^{\lambda\phi}\;\Rightarrow\;V'=\lambda V,\label{exp-pot}\eea where $V_0$ and $\lambda$ are real constants ($V_0\geq 0$), can be found as well in higher-order or higher-dimensional gravity theories \cite{exp-pot-origin-1}, and in string or Kaluza-Klein type models, where the moduli fields may have effective exponential potentials \cite{exp-pot-origin-2}. Exponential potentials can also arise due to nonperturbative effects such as gaugino condensation \cite{exp-pot-origin-3}. In the present model the exponential potential has been investigated in \cite{huang}, where a dynamical systems analysis was performed. The conclusion of the authors was that the derivative coupling to the Einstein's tensor does not modify the phase space dynamics of the quintessence \cite{exp-pot-wands}. The power-law potential \bea V=V_0\phi^{2n}\;\Rightarrow\;V'=2n\,V_0^{1/2n}V^{1-1/2n},\label{pow-law-pot}\eea where $V_0$ is a non-negative constant and $n$ is a real parameter, is also frequently found in the cosmological applications \cite{pwl-pot-peebles}. In the quintessence case the inverse-power law potential exhibits the tracker behavior, a very desirable property for the quintessence if one wants to avoid the cosmic coincidence problem \cite{pwl-pot-other}. The origin of this potential might be associated with supersymmetry considerations \cite{pwl-pot-origin}. \begin{figure*} \includegraphics[width=5cm]{fig11} \includegraphics[width=6cm]{fig12} \includegraphics[width=6cm]{fig13}\vspace{0.7cm} \caption{The $c^2_s$-embedding schematically represented. The phase portrait of the dynamical system \eqref{ode-xu} and the plot of the surface $c^2_s=c^2_s(x,u)$ -- with contours -- in the extended (three-dimensional) phase space that is spanned by the coordinates $x$, $u$ and $c^2_s$, are shown in the left-hand and in the middle figures, respectively. In the right-hand figure the $c^2_s$-embedding diagram is drawn: the orbits (red curves) appearing in the phase portrait (left) have been embedded into the surface $c^2_s=c^2_s(x,u)$. The computations correspond to the cosmological model \eqref{action} with positive coupling ($\alpha>0$) and for the growing exponential potential ($\lambda=5$). The contours drawn in the right-hand figure mark the region where $c^2_s<0$, i. e., where the Laplacian instability develops. The different embedded orbits correspond to whole cosmic evolutionary pathways that are associated with different sets of initial conditions. From the embedding diagram it is seen that independent on the initial conditions chosen the corresponding cosmological histories inevitably go through a stage where $c^2_s<0$, so that the classical gradient instability destroys any chance for the Universe to evolve into its present state.}\label{fig2}\end{figure*} As a qualitative support to the present discussion, a geometric procedure of analysis based on the properties of the dynamical system is developed. It provides a clear illustration of the failure of causality and/or of the development of Laplacian instability -- as well as of the crossing of the phantom divide -- along given phase space orbits. The mentioned procedure relies on the mapping of phase space orbits into the extended phase space, that is: the phase plane complemented with an additional dimension represented by the physical parameter of interest (the effective EOS or the squared sound speed, for instance). This is why we call the procedure as $P$-embedding, where $P$ refers to the given physical parameter. Although the numeric computations are performed for the exponential and for the power-law potentials only, the constant and vanishing potential cases are implicitly included as their particular cases. The embedding procedure is schematically represented in FIG. \ref{fig2}, where the $c^2_s$-embedding is illustrated for the cosmological model of interest, for the positive coupling case ($\alpha>0$) and for the monotonically growing exponential potential \eqref{exp-pot} with $\lambda=5$. The numeric investigation is preceded by -- and complimented with -- a throughout analytic study. In this regard we shall go as far as we can before specifying the form of the self-interaction potential, so that our discussion be as independent as it can of the specific choice of the potential. Our results show that the cosmological models based in the scalar-tensor theory with non-minimal derivative coupling to the Einstein's tensor \eqref{action} develop severe causality problems related with superluminal propagation of the perturbations of the scalar field. These problems are critical whenever the crossing of the phantom divide happens, however, these may arise even in the absence of the crossing. More problematic than the violations of causality in the model is the finding that it is plagued by the classical (catastrophic) Laplacian instability, despite that the theory \eqref{action} in which it is based is free of the Ostrogradsky instability. Our results just confirm the inappropriateness of the models based on the kinetic coupling theories of the kind \eqref{action}, as it has been discussed just recently in \cite{new}, on the light of the tight constraint on the difference in speed of photons and gravitons $(c^2_T-c^2)/c^2\leq 6\times 10^{-15}$ ($c_T$ is the speed of the gravitational waves) implied by the announced detection of gravitational waves from the neutron star-neutron star merger GW170817 and the simultaneous measurement of the gamma-ray burst GRB170817A \cite{ligo}. Before we go further, in order to unify the terminology and to be able to compare our results with other results in the bibliography, we want to make a comment on the sign of the coupling constant $\alpha$. This constant was named as $\kappa$ in \cite{sushkov, saridakis-sushkov}, $\alpha$ in \cite{gao}, $\zeta$ in \cite{dent} and $\omega^2$ in \cite{huang}. If compare the action in \cite{sushkov} (equation (8) of that reference) -- the same action as in \cite{saridakis-sushkov} but in this case the self-interacting potential for the scalar field is considered -- we see that their $\kappa$ corresponds to $-\alpha$ of the present paper, so that, when the authors of \cite{sushkov, saridakis-sushkov} refer to negative coupling $\kappa<0$ this means positive coupling in terms of our $\alpha$ ($\alpha>0$) and vice versa. We recall that in \cite{sushkov, saridakis-sushkov} both cases: $\kappa>0$ ($\alpha<0$) and $\kappa<0$ ($\alpha>0$), were considered. In \cite{gao} it seems that there is a problem with the sign of the Lagrangian density in (1.5) of their work. While a straightforward comparison of the action (2.4) of \cite{gao} -- with the substitution of the Lagrangian density (1.5) -- with our equation \eqref{action} yields the correspondence $\alpha\rightarrow-\alpha$ between the coupling constant in their work and in the present paper, respectively, a comparison of our cosmological field equations \eqref{feqs} with the corresponding equations (2.12) in \cite{gao} yields to a direct correspondence $\alpha\rightarrow\alpha$. Here we give preference to the cosmological field equations so that we shall assume that the sign of the coupling constant in \cite{gao} and in our paper coincides. In a similar way the sign of the coupling constant $\zeta$ in \cite{dent} and $\omega^2$ in \cite{huang} is the same as for our $\alpha$. The only difference is that in \cite{huang} the coupling constant $\omega^2$ is assumed to take positive values exclusively, while in the remaining works (including ours) both signs are considered. We have organized the paper in the following way. In section \ref{sec-basic} we state the main assumptions on which the present work relies and we write down the basic expressions that will be useful in the subsequent study. Appropriate (dimensionless) variables of the phase space are introduced in order to study in a unified way both the positive and the negative coupling cases. A quite general discussion on the phantom barrier crossing in the model \eqref{action} is given in section \ref{sec-cross}. In section \ref{sec-cs2} we discuss on the behavior of the sound speed squared $c^2_s$ -- the one that accounts for the speed of propagation of the perturbations of the energy density -- in the present model. Especial emphasis is made in the possible violations of the physical bounds $0\leq c^2_s\leq 1$. Section \ref{sec-ds} is dedicated to briefly expose the main properties of the dynamical system corresponding to the present cosmological model in connection with the bounds on the squared sound speed. While in sections \ref{sec-cross} and \ref{sec-cs2} we focus mainly in the quintessence case ($\epsilon=1$), in section \ref{sec-e0} the pure derivative coupling case ($\epsilon=0$) is separately investigated. A thorough discussion of the results obtained in this paper is presented in section \ref{sec-disc}. In particular, the case with the constant potential that can be developed in a fully analytical way, is discussed as a simple illustration of the resultsanal. Finally, brief conclusions are given in section \ref{sec-concl}. For completeness we have included an appendix section \ref{app}. In the appendix an elementary discussion on the so called Laplacian instability is included. Throughout the paper we use the units system with $8\pi G_N=c^2=1$, where $G_N$ is the Newton's constant and $c$ is the speed of light in vacuum. \section{Basic equations and set up}\label{sec-basic} The main hypothesis of this paper is that the physical bounds on the speed of sound (squared) are viable criteria to reject physical theories like the one being investigated here. Other assumptions considered in this paper are the following: \begin{itemize} \item For simplicity of the discussion we shall focus in the vacuum case, i. e., in \eqref{action} we set $S_m=0$. \item For definiteness only expanding cosmologies ($H\geq 0$) will be considered and, besides, the scalar field $\phi$ is assumed to be a monotone non-decreasing function of the cosmic time: $\dot\phi\geq 0.$ \item We consider non-negative self-interacting potential $V\geq 0$ (non-negative energy density). \item Only the cases with $\epsilon=1$ (quintessence) and $\epsilon=0$ (pure derivative coupling) will be of interest. \end{itemize} As a model for the background spacetime here we assume the Friedmann-Robertson-Walker (FRW) metric with flat spatial sections, whose line element is given by: \bea ds^2=-dt^2+a^2(t)\delta_{ik}dx^idx^k.\label{frw}\eea The cosmological field equations that can be derived from the action \eqref{action} read: \bea &&\;\;3H^2=\rho_\text{eff},\;-2\dot H=\rho_\text{eff}+p_\text{eff},\nonumber\\ &&\ddot\phi+3H\dot\phi=\frac{-6\alpha H\dot H\dot\phi-V_\phi}{\epsilon+3\alpha H^2},\label{feqs}\eea where $V_\phi\equiv dV/d\phi$. The effective energy density and pressure of the scalar field are given by \bea &&\rho_\text{eff}=\frac{\epsilon+9\alpha H^2}{2}\dot\phi^2+V(\phi),\label{rho}\\ &&p_\text{eff}=\frac{\epsilon-3\alpha H^2}{2}\dot\phi^2-V(\phi)-\alpha\dot\phi^2\dot H-2\alpha H\dot\phi\ddot\phi,\label{p}\eea respectively. From the above equations one obtains that: \bea &&\rho_\text{eff}+p_\text{eff}=\left(\epsilon+9\alpha H^2\right)\dot\phi^2-\alpha\dot\phi^2\dot H-2\alpha H\dot\phi(\ddot\phi+3H\dot\phi).\label{rho+p}\eea An interesting property of the effective energy density $\rho_\text{eff}$ in \eqref{rho} and of the effective pressure $p_\text{eff}$ in \eqref{p}, is that these quantities depend not only on the scalar field matter degree of freedom $\phi$ and its derivatives $\dot\phi$ and $\ddot\phi$, but also on the curvature through $H^2$ and $\dot H$. In particular, the effective kinetic energy density of the scalar field in the right-hand-side (RHS) of the Friedmann equation above: $(\epsilon+9\alpha H^2)\dot\phi^2/2$, is contributed not only by $\dot\phi$ but also by the curvature through the squared Hubble rate.\footnote{Notice that when in the above equations the non-minimal derivative coupling vanishes: $\alpha=0$, we recover the standard result of general relativity with minimally coupled scalar field matter.} With the help of the first equation in \eqref{feqs} and of \eqref{rho} one can rewrite the Friedmann equation and, correspondingly, the effective energy density, in the following way: \bea 3H^2=\gamma^2\rho_\phi=\rho_\text{eff},\;\gamma=\frac{1}{\sqrt{1-3\alpha\dot\phi^2/2}},\label{3h2}\eea where $\gamma=\gamma(\dot\phi)$ is the 'boost' function and $$\rho_\phi=\epsilon\frac{\dot\phi^2}{2}+V(\phi),$$ is the standard energy density of the scalar field. Written in the latter form $\rho_\text{eff}$ is a function only of the scalar field degree of freedom $\phi$, and of its derivative $\dot\phi$ since the curvature effects are hidden in the non-canonical form of the effective energy density, i. e., in the boost function. We point out that for negative coupling ($\alpha<0$), the boost function is bounded from below and also from above: $0<\gamma\leq 1$, while for positive coupling ($\alpha>0$): $1\leq\gamma<\infty$, i. e., it is bounded from below only. \subsection{Non-negative coupling and upper bound on $|\dot\phi|$} If we consider non-negative $\alpha\geq 0$, from \eqref{3h2} -- given that we consider non-negative effective energy density exclusively -- it follows that $1-3\alpha\dot\phi^2/2\geq 0$, i. e. \bea 0\leq\dot\phi^2\leq\frac{2}{3\alpha}\;\Leftrightarrow\;-\frac{1}{3\alpha}\leq X\leq 0,\label{bounds-dphi}\eea where $X=\der_\mu\phi\der^\mu\phi/2=-\dot\phi^2/2$. We want to point out here the non-conventional nature of the ``effective'' kinetic energy of the scalar field \eqref{rho} under the derivative coupling when $\alpha>0$. Actually, as just seen, the standard kinetic energy $\propto\dot\phi^2$ is bounded from above, a strange feature not arising in standard scalar tensor theories without self-couplings. Notwithstanding, the effective kinetic energy in \eqref{rho}: $\propto(\epsilon+9\alpha H^2)\dot\phi^2,$ is not bounded due the curvature effects encoded in $H^2$. In reference \cite{sushkov}, since in that presentation the coupling $\kappa$ is of opposite sign as compared with our $\alpha$: $\kappa=-\alpha$, the case where the standard kinetic term is bounded from above corresponds to the condition expressed by Eq. (27) in the mentioned reference (see also equations (19) and (21) of the same reference, recalling that in this paper we have chosen the units where $8\pi G_N=1$, while in \cite{sushkov}: $G_N=1$.) \subsection{New variables} In spite of the commonly used variable $X$, in order to study both positive and negative coupling cases in a unified way, in this paper we prefer to use the new variable: \bea x:=\alpha\dot\phi^2/2,\label{x-var}\eea i. e. the new variable is properly the standard kinetic energy of the scalar field multiplied by the coupling constant. Hence, positive coupling entails that $x\geq 0$, while negative coupling means that $x\leq 0$. Vanishing $x=0$ means that, either the scalar field is a constant $\phi=\phi_0$, or there is not derivative coupling: $\alpha=0$. In the same way, in connection with the self-interaction potential term, it will be very useful to introduce the following variable: \bea y:=\alpha V,\label{y-var}\eea where, for positive $\alpha$ this variable takes non-negative values: $0\leq y<\infty$, while for negative coupling ($\alpha<0$) the variable takes non-positive values instead $-\infty<y\leq 0$. We want to underline that for positive coupling ($\alpha>0$), given that $H^2$: \bea 3\alpha H^2=\frac{\epsilon x+y}{1-3x},\label{3h2-xy-eq}\eea should be a non-negative quantity ($H^2\geq 0$), the non-negative variable $x$ should take values in the physically meaningful interval: $0\leq x\leq 1/3$. Meanwhile, for negative coupling ($\alpha<0$) the variable $x$ is non-positive: $-\infty<x\leq 0$. The above variables will allow us to write the equations in a more compact manner and to make our computations independent of the specific value of the coupling constant. \begin{figure*} \includegraphics[width=4.2cm]{fig_cross_1} \includegraphics[width=4.2cm]{fig_cross_2} \includegraphics[width=4.2cm]{fig_cross_3} \includegraphics[width=4.2cm]{fig_cross_4}\vspace{0.7cm} \caption{Geometric representation of the bound $\omega_\text{eff}+1\geq 0$ in the $xu$-plane for positive coupling ($\alpha>0$). For illustrative purposes we have chosen two negative-slope potentials: the decaying exponential potential $V=V_0\exp{(\lambda\phi)}$ with $\lambda<0$ (left hand panels) and the inverse power-law potential $V=V_0\phi^{2n}$ with $n<0$ (right hand panels), for different values of the parameters $\lambda$ and $n$ respectively. In the left hand panels, from left to the right: $\lambda=-5$ and $\lambda=-2$, while in the right-hand panels: $n=-2$ and $n=-1$, respectively. Here we use the bounded variable $u=y/y+1$ ($0\leq u\leq 1$) instead of $y=\alpha V$ (the variable $x=\alpha\dot\phi^2/2$ is already bounded: $0\leq x\leq 1/3$), so that the whole phase plane $xu$ fits into a finite size box. The red-colored regions correspond to the phantom domain where $\omega_\text{eff}+1<0$. For monotonically growing potentials ($\lambda>0|n>0$) the phantom domain is not found so that the crossing is not possible.}\label{fig01}\end{figure*} \section{Phantom barrier crossing: General analysis}\label{sec-cross} As mentioned in the introduction, one issue of interest when one explores cosmological models of dark energy is the possibility of crossing the so called ``phantom divide'' barrier $\omega_\Lambda=-1$ \cite{caldwell, crossing-odintsov, crossing-observ, crossing-nesseris}. Hence, it will be useful to look for the possibility of the crossing in the theory with non-minimal derivative (kinetic) coupling to the Einstein's tensor \cite{mohseni}. If under the assumptions exposed in the section \ref{sec-basic} we combine the second and third equations in \eqref{feqs}, we obtain: \bea -2\alpha\dot H=R_1+R_2,\label{doth}\eea with (recall that $y_\phi=\alpha V_\phi=\alpha dV/d\phi$): \bea R_1=\frac{2x\left[\epsilon(1-2x)+y\right](\epsilon+3y)}{(1-3x)F_\epsilon},\;R_2=\frac{2\sqrt{2x(1-3x)(\epsilon x+y)}\,y_\phi}{\sqrt{3}F_\epsilon},\label{r1-r2-def}\eea where, for compactness of writing, we have introduced the following definition: \bea F_\epsilon\equiv F_\epsilon(x,y):=\epsilon(1-3x+6x^2)+(1+3x)y.\label{f-eps}\eea The effective EOS parameter of the scalar field is given by: \bea \omega_\text{eff}=\frac{p_\text{eff}}{\rho_\text{eff}}=-1-\frac{2\dot H}{3H^2}=-1+\frac{R_1+R_2}{3\alpha H^2},\label{weff-def}\eea where $R_1$ and $R_2$ are given by \eqref{r1-r2-def} and, in terms of the variables $x$, $y$, the denominator $3\alpha H^2$ is given by \eqref{3h2-xy-eq}. Hence, for the effective EOS in the general case -- unspecified $\epsilon$ -- we get: \begin{widetext}\bea \omega_\text{eff}=-1+\frac{2x(\epsilon+3y)\left[\epsilon(1-2x)+y\right]}{(\epsilon x+y)F_\epsilon}+\frac{2}{F_\epsilon}\sqrt\frac{2x(1-3x)^3}{3(\epsilon x+y)}\;y_\phi.\label{eos-master-eq}\eea\end{widetext} As it can be seen from \eqref{weff-def}, the crossing of the phantom barrier is achieved only if $-2\dot H$ may change sign during the cosmic evolution. In general $-2\dot H$ is a non-negative quantity. This is specially true for the standard quintessence where in equations \eqref{feqs}, \eqref{rho} and \eqref{p} we set $\alpha=0$ and $\epsilon=1$. In this case $-2\dot H=\dot\phi^2\geq 0$, while the EOS parameter in \eqref{weff-def} can be written as \bea \omega_\text{eff}=-1+\frac{\dot\phi^2}{3H^2},\label{quint-cross}\eea so that, given that $\dot\phi^2/3H^2$ is always non-negative, then $\omega_\text{eff}\geq -1$. In this case the phantom barrier crossing is not possible unless additional complications are considered such as, for instance: i) non-gravitational interaction of the dark energy and dark matter components \cite{n-m-int}, ii) multiple dark energy fields like in quintom models \cite{quintom-mod, quintom-rev} or iii) extra-dimensional effects \cite{roy-isra}. Here we shall investigate the issue within the frame of the theory \eqref{action} where the derivatives of the scalar field are non-minimally coupled to the Einstein's tensor. \subsection{Positive coupling ($\alpha>0$)} For non-negative $x$-s, i. e., for positive coupling ($\alpha>0$), the denominators of $R_1$ and of $R_2$ in \eqref{r1-r2-def} are always positive-valued. So is the numerator of the term $R_1$ which means that this term is always non-negative. Meanwhile, the sign of the numerator of the term $R_2$ is determined by the slope of the self-interaction potential: $y_\phi=\alpha V_\phi=\alpha dV/d\phi$. Consequently, for non-negative $0\leq x\leq 1/3$, the term $R_2$ in \eqref{doth} is the only one that may allow for the crossing of the phantom barrier. In this case ($0\leq x\leq 1/3$) two clear conclusions can be done: i) the crossing is due to the derivative coupling with strength $\alpha$, and ii) the crossing is allowed only if $\dot\phi V'=\dot V<0$, i. e., if the self-interaction potential decays with the cosmic expansion. Assuming that this is indeed the case, the competition between the positive term $R_1$ and the negative one $R_2$ during the course of the cosmic evolution is what makes possible the flip of sign of $-2\dot H=R_1+R_2$, and hence the crossing of the phantom barrier. Notice that for the constant potential $V_\phi=0$, as well as for the monotonically growing potentials the crossing is not possible. This is true, in particular, for the growing exponential potential: $V\propto\exp(\lambda\phi)$ with $\lambda>0$ for $\dot\phi>0$ or $\lambda<0$ for $\dot\phi<0$, and for the power-law $V\propto\phi^n$ with $n\geq 0$. The above results are illustrated in FIG. \ref{fig01} where a geometric representation of the quantity $\omega_\text{eff}+1$ in the $xu$-plane is shown. Here we used the new (bounded) variable: \bea u=\frac{y}{y+1},\;0\leq u\leq 1.\label{u-var}\eea This choice makes possible to fit the whole (semi-infinite) phase plane $xy$ into a finite size box: $\{(x,u):0\leq x\leq 1/3,0\leq u\leq 1\}$. The red-colored regions are the ones where $\omega_\text{eff}+1<0$, i. e., where the scalar field behaves like phantom matter. It is appreciated that, for negative-slope potentials (the decaying exponential and the inverse power-law in the figure), both the phantom region with $\omega_\text{eff}+1<0$ and the region where $\omega_\text{eff}+1>0$ (gray color) coexist, so that the crossing of the phantom divide is possible. \begin{figure*} \includegraphics[width=4.2cm]{fig_cross_10} \includegraphics[width=4.2cm]{fig_cross_20} \includegraphics[width=4.2cm]{fig_cross_30} \includegraphics[width=4.2cm]{fig_cross_40} \includegraphics[width=4.2cm]{fig_cross_50} \includegraphics[width=4.2cm]{fig_cross_60} \includegraphics[width=4.2cm]{fig_cross_70} \includegraphics[width=4.2cm]{fig_cross_80}\vspace{0.7cm} \caption{Region in the $vw$-plane where the scalar field behaves like phantom matter, i. e., where $\omega_\text{eff}<-1$ (red-colored regions) for the negative coupling case ($\alpha<0$). Here, in order to fit the whole phase plane into a finite size box -- recall that for the negative coupling both variables $x<0$ and $y<0$ are unbounded from below -- we have chosen the bounded variables $v=x/x-1$ ($0\leq v\leq 1$) and $w=y/y-1$ ($0\leq w\leq 1$). Under this choice, the phase plane $vw$ is the unit square. In the figure the exponential potential -- top panels -- and the power-law potential -- bottom panels -- are chosen for different values of the parameters $\lambda$ and $n$ respectively. In the top panels, from left to the right: $\lambda=-5$, $\lambda=-2$, $\lambda=2$ and $\lambda=5$, while in the bottom panels: $n=-2$, $n=-1$, $n=1$ and $n=2$, respectively. The zigzagging (slanted) curves in the top-left corners in the figures represent asymptotic separatrices in the $vw$-plane. This means that the domains lying at each side of the slanted zigzagging curves are disconnected (no continuous curve can join them). It is seen that in the right-hand figures (growing potentials) the regions where $\omega_\text{eff}+1\geq 0$ (gray color) and where the scalar field behaves like phantom matter: $\omega_\text{eff}+1<0$ (red color), are disconnected in the $vw$-plane, so that the crossing is not possible. Meanwhile, in the left-hand figures there exists a third region where $\omega_\text{eff}\geq-1$ (gray-colored region in the bottom of the figures) that can be joined to the phantom domain by continuous curves in the $vw$-plane, so that the crossing may eventually happen.}\label{fig02}\end{figure*} \subsection{Negative coupling ($\alpha<0$)} For negative coupling, i. e., for $-\infty<x\leq 0$, $-\infty<y\leq 0$, the situation is a bit more complex. In this case it is more appropriate to go to a bounded set of variables: \bea v=\frac{x}{x-1},\;w=\frac{y}{y-1},\label{vw-var}\eea where $0\leq v\leq 1$, $0\leq w\leq 1$. In terms of the latter variables the whole plane $xy$ fits into the unit square $\{(v,w):0\leq v\leq 1,0\leq w\leq 1\}$. We have that\footnote{For definiteness here we set $\epsilon=1$. The pure derivative coupling case $\epsilon=0$ will be discussed separately in section \ref{sec-e0}.} \bea \omega_\text{eff}=-1+\frac{2v(4w-1)(1+v-2w)}{(1-v)(1-w)(v+w-2vw)F_1}+\frac{2}{F_1}\sqrt\frac{2v(1+2v)^3(1-w)}{3(1-v)^3(v+w-2vw)}\,y_\phi,\label{weff-vw}\eea where $y_\phi=-w_\phi/(1-w)^2$, and \bea F_1\equiv F_{\epsilon=1}=\frac{1+v+4v^2-2(1-2v+4v^2)w}{(1-v)^2(1-w)}.\label{fe-vw}\eea This latter quantity, as well as the second and the third terms in the RHS of \eqref{weff-vw}, in general have not definite sign. As a consequence, there can be curves $w_c=w_c(v)$ where $F_1$ vanishes, meaning that the surface $\omega_\text{eff}=\omega_\text{eff}(v,w)$ tends to asymptotic large values, so that the surface literally ''breaks off'' (slanted zigzagging curves in the top left hand corners in the figures in FIG. \ref{fig02}). The curves $w_c=w_c(v)$ that annihilate the function $F_1$: $F_1(w_c(v),v)=0$, are in fact asymptotic separatrices in the $vw$-plane (the unit square). This means that any other curve in the unit square can only asymptotically approach to -- or leave off -- the curve $w_c$. The competition between the second and the third terms in the RHS of \eqref{weff-vw} does not depend only on the slope of the potential $y_\phi$ (or $-w_\phi$), but also on whether the given $vw$-region is located in respect to the asymptote at $w_c=w_c(v)$ where $F_1=0$. From the plots in FIG. \ref{fig02} it is seen that, the only continuous regions in the $vw$-plane where the crossing of the phantom divide is possible, are those located below and to the right of the separatrices (the slanted zigzagging curves in the top-left corner) for the monotonically decreasing potentials: the decaying exponential and the inverse power-law in the left-hand panels. In these regions there can be curves in the $vw$-plane that continuously joint the domains where $\omega_\text{eff}>-1$ (gray color region at the bottom of the figures) with those where $\omega_\text{eff}<-1$ (red color). Hence, these curves can continuously cross the phantom divide: $\omega_\text{eff}+1=0$. One may conclude that, independent of the sign of the coupling constant $\alpha$, the crossing of the phantom divide can happen only for negative-slope potentials: $y_\phi<0$ ($V_\phi<0$). \begin{figure*} \includegraphics[width=4.2cm]{fig_ineq_1} \includegraphics[width=4.2cm]{fig_ineq_2} \includegraphics[width=4.2cm]{fig_ineq_3} \includegraphics[width=4.2cm]{fig_ineq_4} \includegraphics[width=4.2cm]{fig_ineq_10} \includegraphics[width=4.2cm]{fig_ineq_20} \includegraphics[width=4.2cm]{fig_ineq_30} \includegraphics[width=4.2cm]{fig_ineq_40}\vspace{0.7cm} \caption{Geometric representation of the bound $c^2_s\geq 0$ in the $xu$-plane for positive coupling $\alpha>0$. For illustrative purposes we consider the exponential potential $V=V_0\exp{(\lambda\phi)}$ -- top panels -- and the power-law potential $V=V_0\phi^{2n}$ -- bottom panels -- for different values of the parameters $\lambda$ and $n$ respectively. As in FIG. \ref{fig01}, here we use the bounded variables $x=\alpha\dot\phi^2/2$ ($0\leq x\leq 1/3$) and $u=y/y+1$ ($0\leq u\leq 1$) where $y=\alpha V$, so that the whole phase plane $xu$ fits into a finite size box. In the top panels, from left to the right: $\lambda=-5$, $\lambda=-2$, $\lambda=2$ and $\lambda=5$, while in the bottom panels: $n=-2$, $n=-1$, $n=1$ and $n=2$, respectively. The red-colored regions are the ones where the squared sound speed is negative ($c^2_s<0$), i. e., where the Laplacian instability eventually develops. It is seen that, although the bound $c^2_s<0$ is always met in some -- even small -- region in the $xu$-plane, for monotonically growing potentials ($\lambda>0|n>0$), i. e. for potentials that do not allow the crossing of the phantom divide, the region of the phase plane where the Laplacian instability arises is appreciably larger.}\label{fig1}\end{figure*} \begin{figure*} \includegraphics[width=5cm]{fig_pp_lneg_cpos} \includegraphics[width=6cm]{fig_weff_lneg_cpos} \includegraphics[width=6cm]{fig_c2_lneg_cpos} \includegraphics[width=5cm]{fig_pp_nneg_cpos} \includegraphics[width=6cm]{fig_weff_nneg_cpos} \includegraphics[width=6cm]{fig_c2_nneg_cpos}\vspace{0.7cm} \caption{Phase portraits (left) of the dynamical system \eqref{ode-xu}, EOS-embedding diagrams (middle) and $c^2_s$-embedding diagrams (right) corresponding to the cosmological model \eqref{action} with positive coupling ($\alpha>0$). In the top panels the decaying exponential potential \eqref{exp-pot} ($\lambda=-5$) has been chosen, while in the bottom panels the inverse power-law potential \eqref{pow-law-pot} ($n=-1$) is considered. In the EOS-embedding diagrams the contours -- thick horizontal curves -- are drawn for $\omega_\text{eff}=-1/3$ (upper contour) and for $\omega_\text{eff}=-1$ (lower contour), while in the $c^2_s$-embeddings the drawn (quite irregular) contours are for $c^2_s=1$ (upper contour) and for $c^2_s=0$ (lower contour). It is seen that the red-colored orbits do the crossing of the phantom divide (middle panels) since these cross through the $\omega_\text{eff}=-1$ contour, and also violate causality since in the right-hand panels these orbits come from domains on the surface $c^2_s=c^2_s(x,u)$ that lie above the contour $c^2_s=1$, representing the local speed of light.}\label{fig3}\end{figure*} \section{Squared Sound Speed}\label{sec-cs2} In \cite{cartier} the authors derived the evolution equations for the most general cosmological scalar, vector and tensor perturbations in a class of non-singular cosmologies derived from higher-order corrections to the low-energy bosonic string action: \bea {\cal L}=\frac{1}{2}f(\phi,R)-\frac{1}{2}\omega(\phi)\nabla^\mu\phi\nabla_\mu\phi-V(\phi)+{\cal L}_q,\label{cartier-lag}\eea where $f(\phi,R)$ is an algebraic function of the scalar field $\phi$ and of the curvature scalar $R$, while $\omega(\phi)$ and $V(\phi)$ are functions of the scalar field. For our purposes it is enough to consider $f(\phi,R)=R$ and $\omega(\phi)=1$. Through ${\cal L}_q$ the inclusion of higher order derivative terms is allowed: \bea {\cal L}_q=-\frac{\lambda}{2}\xi\left[c_1R^2_\text{GB}+c_2 G^{\mu\nu}\der_\mu\phi\der_\nu\phi+c_3\nabla^2\phi\der^\mu\phi\der_\mu\phi+c_4\left(\der^\mu\phi\der_\mu\phi\right)^2\right],\label{lag-q}\eea where $\xi=\xi(\phi)$ is a function of the scalar field, $R^2_\text{GB}\equiv R_{\mu\nu\tau\lambda}R^{\mu\nu\tau\lambda}-4R_{\mu\nu}R^{\mu\nu}+R^2$ is the Gauss-Bonnet combination, $\lambda$, $c_1,\ldots,c_4$ are constants and we have chosen the units where $\alpha'=1$. In this paper, without loss of generality we set $\xi=1$. Our action \eqref{action} is a particular case of \eqref{cartier-lag}, so that the results of \cite{cartier} are easily applicable to the present model (see, for instance, \cite{gao}). The Einstein's field equations that are derived from the Lagrangian \eqref{cartier-lag} read: \bea G_{\mu\nu}=T^\text{eff}_{\mu\nu}=T^{(\phi)}_{\mu\nu}+T^{(q)}_{\mu\nu},\;\nabla^2\phi-T^{(q)}=V',\nonumber\eea where the comma stands for derivative with respect to $\phi$, $$T^{(\phi)}_{\mu\nu}=\der_\mu\phi\der_\nu\phi-\frac{1}{2}g_{\mu\nu}\left(\der^\tau\phi\der_\tau\phi\right)-g_{\mu\nu}V,$$ is the standard stress-energy tensor of a scalar field, while $$T^{(q)}_{\mu\nu}=-2\frac{\der{\cal L}_q}{\der g^{\mu\nu}}-g_{\mu\nu}{\cal L}_q,$$ and $T^{(q)}$ represent the contributions derived from the next to leading order corrections given by ${\cal L}_q$ in equation \eqref{lag-q} (equation (2) of \cite{cartier}). These contribute towards the effective stresses and energy. The perturbed line-element reads \cite{cartier, hwang}: \bea ds^2=-a^2(1+2\psi)d\eta^2-2a^2\left(\beta_{,i}+B_i\right)d\eta dx^i+a^2\left[g_{ij}(1+2\vphi)+2\gamma_{,i|j}+2C_{(i|j)}+2C_{ij}\right]dx^idx^j,\label{ds-pert}\eea where $d\eta=dt/a$. Latin letters denote space indices while $\psi=\psi(t,{\bf x})$, $\beta=\beta(t,{\bf x})$, $\vphi=\vphi(t,{\bf x})$ and $\gamma=\gamma(t,{\bf x})$ characterize the scalar-type perturbations. The traceless modes $B_i$ and $C_i$ ($B^i_{|i}=C^i_{|i}=0$) represent the vector-type perturbations, meanwhile, $C_{ij}=C_{ij}(t,{\bf x})$ are trace free and transverse: $C^j_{i|j}=C^i_i=0$, and correspond to the tensor-type perturbations. The vertical bar denotes covariant derivative defined in terms of the space metric $g_{ij}$. Following \cite{hwang} in \cite{cartier} the uniform-field gauge ($\delta\phi=0$) is chosen since this gauge admits the simplest analysis. In this case each variable is replaced by its corresponding gauge-invariant combination with $\delta\phi$, for instance, for the scalar perturbation the gauge-invariant combination $$\vphi_{\delta\phi}\equiv\vphi-H\frac{\delta\phi}{\dot\phi},$$ is considered (in the uniform-field gauge $\vphi_{\delta\phi}$ is identified with $\vphi$ since $\delta\phi=0$). The second-order differential (wave) equation for the scalar-metric perturbation $\vphi_{\delta\phi}$ in closed form reads \cite{cartier}: \bea \frac{1}{a^3Q_s}\frac{\der}{\der t}\left(a^3Q_s\frac{\der}{\der t}\,\vphi_{\delta\phi}\right)-c^2_s\frac{\nabla^2}{a^2}\,\vphi_{\delta\phi}=0,\label{s-waveq}\eea where $$Q_s=\frac{\dot\phi^2+\frac{3Q_a^2}{2+Q_b}+Q_c}{\left(H+\frac{Q_a}{2+Q_b}\right)^2},$$ and the squared speed of propagation of the scalar perturbation is given by \bea c^2_s=1+\frac{(2+Q_b)Q_d+Q_aQ_e+\frac{Q_a^2Q_f}{2+Q_b}}{(2+Q_b)(\dot\phi^2+Q_c)+3Q_a^2},\label{c2s-eff}\eea with \bea &&Q_a=\lambda\dot\phi^2\left(2c_2H+c_3\dot\phi\right),\;Q_b=\lambda c_2\dot\phi^2,\;Q_c=-3\lambda\dot\phi^2\left(c_2 H^2+2c_3H\dot\phi+2c_4\dot\phi^2\right),\nonumber\\ &&Q_d=-2\lambda\dot\phi^2\left[c_2\dot H+c_3\left(\ddot\phi-H\dot\phi\right)\right],\;Q_e=4\lambda\dot\phi\left[c_2\left(\ddot\phi-H\dot\phi\right)-c_3\dot\phi^2\right],\;Q_f=2\lambda c_2\dot\phi^2=2Q_b.\label{Q-s}\eea For the linearized tensor-type perturbations we obtain the following second order equation of motion \cite{cartier}: \bea \frac{1}{a^3Q_T}\frac{\der}{\der t}\left(a^3Q_T\frac{\der}{\der t}C^i_{\;\;j}\right)-c^2_T\frac{\nabla^2}{a^2}C^i_{\;\;j}=\frac{1}{Q_T}\delta T^i_{\;\;j},\label{t-waveq}\eea where $\delta T^i_{\;\;j}$ includes contributions to the tensor-type energy-momentum tensor, $$Q_T=1+\frac{\lambda}{2}\,c_2\dot\phi^2,$$ and \bea c^2_T=\frac{2-\lambda c_2\dot\phi^2}{2+\lambda c_2\dot\phi^2},\label{c2t}\eea is the squared speed of propagation of the gravitational waves perturbation. Notice that for $c^2_s>0$ and $c^2_T>0$ the wave equations \eqref{s-waveq} and \eqref{t-waveq}, respectively, are hyperbolic differential equations -- the Cauchy problem is well posed -- meanwhile for negative $c^2_s<0$ and $c^2_T<0$, these equations are elliptic so there is not propagating mode (the Cauchy problem is not well posed). In this later case a Laplacian instability develops (see the appendix). In the present cosmological model based in \eqref{action} the Lagrangian \eqref{lag-q} can be written in the following way: $${\cal L}_q=\frac{3\alpha}{2}\dot\phi^2H^2,$$ where we have set $\xi=1$, $\lambda c_2=-\alpha$ (the remaining constants in \eqref{lag-q} vanish). Hence, we obtain that \bea Q_a=-2\alpha H\dot\phi^2,\;Q_b=-\alpha\dot\phi^2,\;Q_c=3\alpha H^2\dot\phi^2,\;Q_d=2\alpha\dot H\dot\phi^2,\;Q_e=-4\alpha\dot\phi(\ddot\phi-H\dot\phi).\label{qs}\eea For the squared speed of propagation of the gravitational waves perturbation \eqref{c2t} it is found that, for the present cosmological model: \bea c^2_T=\frac{1+\alpha\dot\phi^2/2}{1-\alpha\dot\phi^2/2},\label{c2t'}\eea where it is appreciated that, for the positive coupling $\alpha>0$, the tensor perturbations propagate superluminally. A similar result has been formerly reported in \cite{germani-1} for the same model but under the slow-roll approximation, i. e., valid for primordial inflation. For negative coupling $\alpha<0$, provided that $\dot\phi^2>2/|\alpha|$ the squared sound speed of the tensor perturbations becomes negative, signaling to the eventual occurrence of a Laplacian instability. For a detailed derivation of \eqref{c2s-eff} and of \eqref{c2t} within the perturbative approach we recommend the reference \cite{cartier}. Equation \eqref{c2s-eff} with the substitution of the quantities \eqref{qs} will be our master equation for determining the (squared) speed of propagation of the scalar perturbations of the energy density. In terms of the field variables $x=\alpha\dot\phi^2/2$ and $y=\alpha V(\phi)$ we have that: \bea c^2_s=1+\frac{4x[\epsilon(3-11x+6x^2)+(1-3x)y]}{3(1-x)F_\epsilon}-\frac{3(1-x)(\epsilon x+y)(\omega_\text{eff}+1)}{F_\epsilon},\label{c2s-master-eq}\eea where $\omega_\text{eff}$ is given by \eqref{eos-master-eq} and the funciton $F_\epsilon$ has been defined in \eqref{f-eps}. \subsection{Positive coupling} In this case we have that $0\leq x\leq 1/3$ and $0\leq y<\infty$. This means that $F_\epsilon$ is always a positive function. Besides, both the numerator and the denominator in the second term in the right-hand side (RHS) of equation \eqref{c2s-master-eq} are positive quantities. The same is true for the factor $(1-x)(\epsilon x+y)/F_\epsilon$ in the third term in the RHS of the mentioned equation. Hence, while the second term always contributes towards superluminality of propagation of the scalar perturbations, the contribution of the third term depends on the sign of $\omega_\text{eff}+1$. For $\omega_\text{eff}>-1$ the superluminal contribution of the second term in the RHS of \eqref{c2s-master-eq} may be compensated by the third term. However, when $\omega_\text{eff}<-1$, both terms in the RHS of \eqref{c2s-master-eq} contribute towards superluminality of the propagation of the scalar perturbations of the energy density. This means that, whenever the crossing of the phantom divide is allowed, then $\omega_\text{eff}+1$ becomes necessarily negative during a given stage of the cosmic evolution and, consequently, causality violations are inevitable. This result is independent on the specific functional form of the self-interaction potential. In general, from \eqref{c2s-master-eq} it follows that whenever the condition \bea \frac{4x[\epsilon(3-11x+6x^2)+(1-3x)y]}{9(1-x)^2(\epsilon x+y)}>\omega_\text{eff}+1,\label{cond}\eea is fulfilled, the squared sound speed is superluminal ($c^2_s>1$). The latter condition may be satisfied only if $\omega_\text{eff}+1<0$, i. e., if $\omega_\text{eff}<-1$. For positive $\omega_\text{eff}+1>0$, the inequality \eqref{cond} is never satisfied. We want to point out that, although the condition $\omega_\text{eff}<-1$ boosts further superluminality of the propagation of the scalar perturbations, in general the $\omega=-1$ crossing is not required for the superluminality to arise in the present model. Actually, as seen from \eqref{c2s-master-eq}, given that the second term in the RHS of \eqref{c2s-master-eq} is always a postive quantity, superluminality arises even if $\omega_\text{eff}+1=0$. The potential situation where $\omega_\text{eff}+1>0$, i. e., where $\omega_\text{eff}>-1$, leads to another interesting and disturbing possibility, namely that \bea \omega_\text{eff}+1>\frac{(1-x)F_\epsilon}{3(1-x)^2(\epsilon x+y)}+\frac{4x[\epsilon(3-11x+6x^2)+(1-3x)y]}{9(1-x)^2(\epsilon x+y)},\label{laplac-instab}\eea that is, that $c^2_s<0$. Fulfillment of this latter bound leads to the development of the Laplacian/gradient instability. This is a classical instability associated with the uncontrolled growth of the amplitude of the scalar perturbations of the background density (see the appendix \ref{app}). In the FIG. \ref{fig1} we have geometrically represented the bound $c^2_s\geq 0$ for the exponential \eqref{exp-pot} and for the power-law \eqref{pow-law-pot} potentials, for different values of the free parameters $\lambda$ and $n$, respectively.\footnote{In this section we focus in the quintessence case $\epsilon=1$ exclusively.} Meanwhile, in FIG. \ref{fig2} we have drawn the surfaces $\omega_\text{eff}=\omega_\text{eff}(x,u)$ and $c^2_s=c^2_s(x,u)$ for the growing exponential potential with $\lambda=5$. In these figures we have used the bounded coordinate in \eqref{u-var}: $$u=\frac{y}{y+1},\;0\leq u\leq 1,$$ instead of $y$ ($0\leq y<\infty$), in order to comprise the whole phase plane into a finite-size region. In the right-hand panel of FIG. \ref{fig2} different orbits of the dynamical system corresponding to the present cosmological model, have been mapped into the surface $c^2_s=c^2_s(x,u)$ in order to show geometrically, that the choice of free parameters that is not compatible with the crossing of the phantom divide -- in this case the growing exponential (positive slope) -- leads eventually to the development of the Laplacian instability. As already shown, the potentials that allow for the crossing of the phantom divide -- potentials with the negative slope -- can lead also to causality problems. This finding is geometrically illustrated in the figure FIG. \ref{fig3}, where the EOS-embedding and $c^2_s$-embedding diagrams are shown for potentials with the negative slope: (i) decaying exponential potential \eqref{exp-pot} with $\lambda=-5$ (top panels) and (ii) inverse power-law potential \eqref{pow-law-pot} with $n=-1$ (bottom panels), respectively. \subsection{Negative coupling} For $\alpha<0$ we have that $-\infty<x\leq 0$, $-\infty<y\leq 0$, so that it is recommended to use the bounded variables $v$, $w$ in \eqref{vw-var}. Under the latter choice the whole of $xy$-plane is comprised within the unit square: $\{(v,w):0\leq v\leq 1,0\leq w\leq 1\}$. In this case the analysis of the bounds on the squared sound speed: $0\leq c^2_s\leq 1$, is a very complicated task and one has to heavily rely in the numeric investigation. In the figures in FIG. \ref{fig4} the red-colored regions in the unit square are the ones where $c^2_s<0$, i. e., where the Laplacian instability develops. We concentrate in the first and second figures from left to the right -- the plots corresponding to the decaying exponential (top) and to the inverse power-law (bottom) potentials, respectively -- since only for these choices the crossing of the phantom divide may happen. It is obvious from the $c^2_s$-embedding diagrams in FIG. \ref{fig5}, that independent of the choice of the self-interaction potential (either the decaying exponential or the inverse power-law) and of the initial conditions, the development of a gradient instability is inevitable since, as the orbits in the unit (phase) square $\{(v,w):0\leq v\leq 1,0\leq w\leq 1\}$ approach to the global attractor, these necessarily enter the region where $c^2_s<0$. Besides, at the global attractor itself the squared sound speed is negative. We shall come back to this issue again in the next section where the basic properties of the corresponding dynamical system are discussed in connection with the bounds on the squared sound speed. \begin{figure*} \includegraphics[width=4.2cm]{fig_ineq_negc_1} \includegraphics[width=4.2cm]{fig_ineq_negc_2} \includegraphics[width=4.2cm]{fig_ineq_negc_3} \includegraphics[width=4.2cm]{fig_ineq_negc_4} \includegraphics[width=4.2cm]{fig_ineq_negc_10} \includegraphics[width=4.2cm]{fig_ineq_negc_20} \includegraphics[width=4.2cm]{fig_ineq_negc_30} \includegraphics[width=4.2cm]{fig_ineq_negc_40}\vspace{0.7cm} \caption{Region in the $vw$-plane where the squared sound speed is negative (red-colored regions) i. e. where the Laplacian instability eventually develops, for the negative coupling case ($\alpha<0$). As in FIG. \ref{fig02}, in order to fit the whole phase plane into a finite-size box, we have chosen the bounded variables $v=x/x-1$ ($0\leq v\leq 1$) and $w=y/y-1$ ($0\leq w\leq 1$), so that the phase plane $vw$ is the unit square. In the figure the exponential potential (top panels) and the power-law potential (bottom panels) are chosen for different values of the parameters $\lambda$ and $n$ respectively. In the top panels, from left to the right: $\lambda=-5$, $\lambda=-2$, $\lambda=2$ and $\lambda=5$, while in the bottom panels: $n=-2$, $n=-1$, $n=1$ and $n=2$, respectively. The slanted irregular (cell-shaped) regions in the top-left corner of the right-hand figures, represent asymptotic regions so that the red colored cells in these regions should not be related to the Laplacian instability.}\label{fig4}\end{figure*} \begin{figure*} \includegraphics[width=5cm]{fig_pp_lneg_cneg} \includegraphics[width=6cm]{fig_weff_lneg_cneg} \includegraphics[width=6cm]{fig_c2_lneg_cneg} \includegraphics[width=5cm]{fig_pp_nneg_cneg} \includegraphics[width=6cm]{fig_weff_nneg_cneg} \includegraphics[width=6cm]{fig_c2_nneg_cneg}\vspace{0.7cm} \caption{Phase portraits (left) of the dynamical system \eqref{ode-vw}, EOS-embedding diagrams (middle) and $c^2_s$-embedding diagrams (right) corresponding to the cosmological model \eqref{action} with the negative coupling ($\alpha<0$). In the top panels the decaying exponential potential \eqref{exp-pot} ($\lambda=-5$) has been chosen, while in the bottom panels the inverse power-law potential \eqref{pow-law-pot} ($n=-1$) is considered. As in FIG. \ref{fig3}, in the EOS-embedding diagrams the thick contours are drawn for $\omega_\text{eff}=-1/3$ (upper contour) and for $\omega_\text{eff}=-1$ (lower contour), while in the $c^2_s$-embeddings the drawn thick contours are for $c^2_s=1$ (upper contour) and for $c^2_s=0$ (lower contour). It is evident from the $c^2_s$-embedding diagrams that as the orbits approach to the global attractor ${\cal P}_A:(1,0)$, these enter a domain on the surface $c^2_s=c^2_s(v,w)$ where the squared sound speed becomes negative, signaling the eventual development of a Laplacian instability.}\label{fig5}\end{figure*} \section{Squared Sound Speed and the Dynamical System}\label{sec-ds} Given that in order to illustrate the main results of the present investigation we heavily rely on the properties of the dynamical system corresponding to the cosmological model of interest, here we give a compact exposition of the most elementary of these properties in connection with the bounds on the squared sound speed. We want to underline that here we do not care about a detailed study of the critical points of the dynamical system and their stability. A detailed dynamical systems study of the present model can be found in \cite{huang}. Different orbits in the given phase space will correspond to possible patterns of cosmological evolution that are sustained by the dynamical system and, consequently, by the cosmological equations \eqref{feqs}. Moreover, every possible orbit that can be generated by every possible choice of the initial conditions, represents a potential cosmic history for our universe. The critical points of the dynamical system correspond to ``outstanding'' or generic cosmological solutions of \eqref{feqs}. \subsection{Positive coupling $\alpha>0$} Let us investigate the asymptotic properties of the dynamical system corresponding to the cosmological equations \eqref{feqs} in the phase plane $$\psi=\{(x,y):0\leq x\leq 1/3,y\geq 0\}.$$ It can be demonstrated that the second order cosmological field equations \eqref{feqs} can be traded by the following system of 2 ordinary differential equations on the variables $x$, $y$: \bea &&x'=\frac{x[\epsilon(1-2x)+y]}{1-3x}-\frac{(1-x)(\epsilon x+y)(\omega_\text{eff}+1)}{2(1-3x)},\nonumber\\ &&y'=y_\phi\sqrt\frac{2x(\epsilon x+y)}{3(1-3x)},\label{ode-xy}\eea where the comma means derivative with respect to the time variable $d\tau=\alpha Hdt$. The problem with \eqref{ode-xy} is that the phase plane is unbounded ($0\leq y<\infty$) so that it may happen that one or several critical points of the dynamical system at infinity are unseen in a finite region of the phase plane. This is why in \eqref{u-var} we introduced the bounded variable $u=y/y+1$ ($0\leq u\leq 1$). After this choice the whole phase plane is shrunk into the phase rectangle: \bea \psi_{\alpha>0}=\{(x,u):0\leq x\leq 1/3,0\leq u\leq 1\},\label{bound-rect}\eea and the ODE system \eqref{ode-xy} is rewritten as: \bea &&x'=\frac{x[\epsilon(1-2x)(1-u)+u]}{(1-3x)(1-u)}-\frac{x(1-x)[\epsilon(1-u)+3u][\epsilon(1-2x)(1-u)+u]}{(1-3x)(1-u)^2F_\epsilon}\nonumber\\ &&\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;-\sqrt\frac{2x(1-x)^2(1-3x)[\epsilon x(1-u)+u]}{3(1-u)}\frac{u_\phi}{(1-u)^2F_\epsilon},\nonumber\\ &&u'=u_\phi\sqrt\frac{2x[\epsilon x(1-u)+u]}{3(1-3x)(1-u)},\label{ode-xu}\eea where $$F_\epsilon=\frac{\epsilon(1-3x+6x^2)(1-u)+(1+3x)u}{1-u}.$$ In the left-hand figures in FIG. \ref{fig3} the phase portraits of the dynamical system \eqref{ode-xu} are drawn for the decaying exponential with $\lambda=-5$ (top) and for the inverse power-law with $n=-1$ (bottom), for a set of 9 and 8 different initial conditions respectively. A crude inspection of \eqref{ode-xu} reveals that, independent of the specific functional form of the self-interaction potential, among the equilibrium configurations of the dynamical system in the phase rectangle \eqref{bound-rect}, there is a critical manifold: ${\cal M}_0=\{(0,u):0\leq u\leq 1\}.$ Equilibrium points in this manifold have different stability properties. The origin ${\cal P}_0:(0,0)$ is a stable critical point. Moreover, it is the global future attractor. The remaining points ${\cal P}_i\in{\cal M}_0$ represent unstable equilibrium configurations and can be only local sources. In the phase portraits (left-hand figures) in FIG. \ref{fig3} the red-color orbits start at local sources in ${\cal M}_0$ and end up at the global attractor ${\cal P}_0$. For points ${\cal P}_\delta:(\delta,u)$ in the neighborhood of ${\cal M}_0$, where $\delta\ll 1$ is a small parameter, we have that: $$c^2_s\approx 1-6\sqrt{2}\,\delta^{1/2}\sqrt\frac{u}{1-u}\,u_\phi,$$ where the terms $\propto\delta$ and of higher orders in the small parameter have been omitted. Hence, if we assume that $u\neq 0$ -- i. e., if exclude the global attractor at the origin -- assuming potentials with the negative slope: $$V_\phi<0\Rightarrow y_\phi<0\Rightarrow u_\phi<0,$$ for points in the neighborhood of the critical manifold ${\cal M}_0$, the speed of sound becomes superluminal $c^2_s>1$. This behavior is illustrated in the $c2_s$-embedding diagrams in FIG. \ref{fig3}, where it is appreciated that as the red-colored orbits leave the source points the speed of sound becomes superluminal.\footnote{At the source points, as well as at the global attractor at the origin, where $\delta=0$, we have that $c^2_s=1$.} For orbits that start at points to the right of the phase rectangle ($x=1/3-\delta$), it is found that there are regions in the phase plane where the squared sound speed becomes negative, signaling the development of Laplacian instability. This is illustrated in the first and second figures (from left to the right) in FIG. \ref{fig1} where the small red-colored regions in the $xu$-plane represent the domains in the phase rectangle where $c^2_s<0$. In the $c^2_s$-embedding diagrams in FIG. \ref{fig3} it is appreciated that several of the mentioned orbits (continuous black curves) indeed meet the gradient instability regions. \subsection{Negative coupling $\alpha<0$} In terms of the variables $v$, $w$ in \eqref{vw-var} the autonomous system of ODE \eqref{ode-xy} can be written in the following way: \bea &&v'=\left(\frac{1-v}{1-w}\right)\left(\frac{1+v-2w}{1+2v}\right)-\frac{(1-v)(v+w-2vw)(\omega_\text{eff}+1)}{2(1+2v)(1-w)},\nonumber\\ &&w'=w_\phi\sqrt\frac{2v(v+w-2vw)}{3(1-v)(1-w)(1+2v)},\label{ode-vw}\eea where $\omega_\text{eff}$ is given by \eqref{weff-vw}. The phase portraits of the dynamical system \eqref{ode-vw} are shown in the left-hand figures in FIG. \ref{fig5} for the decaying exponential with $\lambda=-5$ (top) and for the inverse power-law potential with $n=-1$ (bottom).\footnote{Recall that we are interested in potentials that allow for the crossing of the phantom divide exclusively.} The global (future) attractor at ${\cal P}_A:(1,0)$ is sharply appreciated. If we make the replacement of $x\rightarrow v/v-1$ and of $y\rightarrow w/w-1$ in \eqref{c2s-master-eq}, and then we evaluate the squared sound speed at the attractor, we get: $$\lim_{(v,w)\rightarrow(1,0)}c^2_s(v,w)=-\frac{1}{3}.$$ This means that, at least at the attractor $c^2_s<0$, so that a Laplacian instability eventually develops. In the $c^2_s$-embedding diagrams in FIG. \ref{fig5} it is seen that, as a matter of fact, to a large extent the embedded phase space orbits lie in domains on the surface $c^2_s=c^2_s(v,w)$ that are below the contour corresponding to $c^2_s=0$. Moreover, there are orbits that entirely lie in domains below the mentioned contour in the extended phase space, which means that the corresponding whole cosmic histories are classically unstable under scalar perturbations of the cosmic background. \section{Pure derivative coupling ($\epsilon=0$)}\label{sec-e0} The interest in the case where the kinetic coupling is exclusive to the Einstein's tensor, i. e., where the term $g_{\mu\nu}\der^\mu\phi\der^\nu\phi$ is removed from \eqref{action}, is due to the significant simplification of the equations of the resulting cosmological model that allows one to discuss in a fully analytical way on the phantom crossing and the bounds on the squared sound speed. Actually, in this particular case where $\epsilon=0$, the expressions for the effective EOS parameter and for the squared sound speed become \bea \omega_\text{eff}+1=\frac{6x}{1+3x}+\frac{\sqrt{8x(1-3x)^3}}{3(1+3x)^2y^3}\;y_\phi,\label{weff-e0}\eea and \bea c_s^2=1-\frac{2x(45x^2-54x+29)}{3(1-x)(1+3x)^2}-\frac{6(1-x)}{(1+3x)^2}\sqrt\frac{2x(1-3x)^3}{3y^3}\,y_\phi,\label{c2s-e0}\eea respectively. The analysis of the behavior of the above quantities is straightforward. \subsection{Positive coupling} From equation \eqref{weff-e0} it is seen that at the upper boundary: $x=1/3$, the effective (background) fluid behaves like pressureless dust. It is seen also that, provided the slope of the potential is negative: $y_\phi<0$, the second term in the RHS of \eqref{weff-e0} may compensate the contribution of the first-one. For the exponential potential $y_\phi=\lambda y$, for instance, for $$y<\frac{2\lambda^2(1-3x)^3}{27x},$$ the crossing of the phantom divide may happen since $\omega_\text{eff}+1$ becomes negative. For monotonically growing potentials the crossing is not possible. Causality violations and the development of Laplacian instability in this case are apparent. Even for the constant potential $y_\phi=0$ (this includes the vanishing potential case $V=0$) the instability issue is apparent. Actually, in this case \eqref{c2s-e0} simplifies even more: \bea c_s^2=1-\frac{2x(45x^2-54x+29)}{3(1-x)(1+3x)^2}.\label{pot-0}\eea It is straightforward to show that the squared sound speed above is a monotone decreasing function of $x$, and that it vanishes at $x=0.0897$. In the interval $0.0897<x\leq 1/3$, $c^2_s$ is negative. In particular at $x=1/3$ the squared sound speed $c^2_s=-1/3$. The violation of causality in connection with superluminal propagation of the scalar perturbations may happen only for potentials with the negative slope $y_\phi<0$. Only in this case the third term in the RHS of \eqref{c2s-e0} may compensate the contribution from the second one, and may contribute towards superluminality ($c^2_s>1$). \subsection{Negative coupling} In this case $-\infty<x\leq 0$, $-\infty<y\leq 0$, so that both variables are unbounded. In terms of the bounded variables $v$, $w$ in \eqref{vw-var}, for the simplest case when the potential is a constant ($y_\phi=0$), the squared sound speed \eqref{pot-0} can be written as: \bea c^2_s=1+\frac{2v(29+54v-9v^2)}{3(1-4v)^2},\label{pot-0'}\eea while the corresponding autonomous ODE is \bea v'=-\frac{2y_0\,v(1-v)^2}{1-4v},\label{ode-pot-0}\eea where $y_0=\alpha V_0$ is a constant. The squared sound speed blows up at the asymptote $v\rightarrow 1/4$, so that a coarse violation of causality eventually occurs. In the phase line $0\leq v\leq 1$ the asymptote $v=1/4$ represents a separatrix, since the orbits of \eqref{ode-pot-0} can not cross from the left to the right of $v=1/4$ and vice versa. \section{Discussion}\label{sec-disc} Our results in the previous sections are clear and convincing. These show that in general terms, without specifying the functional form of the self-interacting potential, the cosmological models based in the theory \eqref{action} -- where the scalar field is kinetically coupled to the curvature -- are unsatisfactory due to the occurrence of causality violations and -- what is more problematic -- of classical Laplacian instabilities, for a non-empty set of initial conditions. These results do not depend on the sign of the coupling constant $\alpha$ in \eqref{action}. We have shown this analytically and also numerically by specifying the form of the potential; we have done this for the exponential and for the power-law potentials. There is, however, a particular class of such models without the potential ($V=0$) and with the constant potential ($V=V_0$) that deserve separate comments since these can be treated in a fully analytical way (see below). In general terms theories with the kinetic coupling of the scalar field to the Einstein's tensor -- this is true also for more general Horndeski theories -- all possess some configurations with a superluminal propagation. Besides, these theories have also the speed of propagation of the gravity waves different from the speed of light. In particular, the speed of sound for the scalar perturbations can be subluminal while, simultaneously, the speed of propagation for the gravity waves can be superluminal \cite{germani-1}. In the later reference this has been shown for the theory \eqref{action} with the positive coupling, for the quartic potential during inflation. In \eqref{c2t} the squared speed of propagation of the gravity waves perturbations is given independent of the self-interaction potential: \bea c^2_T=\frac{1+x}{1-x}.\label{c2t-x}\eea This confirms that the speed of the gravitational waves is always superluminal if assume the positive coupling $\alpha>0$. For the negative coupling, in terms of the bounded variable $v$ ($0\leq v\leq 1$) we have that: \bea c^2_T=1-2v.\label{c2t-v}\eea This means that for $0\leq v\leq 1/2$ the speed of propagation of the gravitational waves meets the bounds: $0\leq c^2_T\leq 1$, meanwhile, for $v>1/2$, the squared sound speed of the tensor perturbations is a negative quantity that leads eventually to the development of a Laplacian instability. \begin{figure} \includegraphics[width=6cm]{figfin1} \includegraphics[width=6cm]{figfin2}\vspace{0.7cm} \caption{Plot of $c^2_s$ vs $x$ (top) and of $c^2_s$ vs $v$ (bottom) for the model \eqref{action} with the constant potential ($y_0=\alpha V_0$). The top figure is for the positive coupling case $\alpha>0$ ($0\leq x\leq 1/3$), while the bottom figure is for the negative coupling case $\alpha<0$ ($0\leq v\leq 1$). In the top we have arbitrarily set $y_0=10$, while in the bottom $y_0=-0.01$. The dash-dot horizontal line marks the lower bound $c^2=0$ on the squared speed of sound. It is appreciated that, independent of the sign of the coupling, there always exist an interval in the $x$/$v$-coordinate where $c^2_s<0$, meaning that a Laplacian instability may eventually arise.}\label{figfin}\end{figure} In order to further illustrate our results, let us to discuss in detail the constant potential case: $$V=V_0\Rightarrow y=y_0=\alpha V_0,$$ with the vanishing potential as the particular case when $y_0=0$, that can be studied analytically. We have that (for definiteness we consider $\epsilon=1$): \bea 3\alpha H^2=\frac{x+y_0}{1-3x}.\label{3h2-y0}\eea Since for the positive coupling $0\leq x\leq 1/3$, from \eqref{3h2-y0} it follows that for $\alpha>0$ the Hubble rate is unbounded from above and bounded from below: $\sqrt{y_0/3\alpha}\leq H<\infty$. For the negative coupling $\alpha<0$ ($-\infty<x\leq 0$) the Hubble rate is bounded (in this case the constant $y_0$ should be a negative quantity as well): \bea &&\frac{1}{3\sqrt{-\alpha}}\leq H\leq\sqrt\frac{y_0}{3\alpha}=\sqrt\frac{V_0}{3}\;(V_0>1/|3\alpha|),\nonumber\\ &&\sqrt{V_0/3}\leq H\leq 1/3\sqrt{-\alpha},\;(V_0<1/|3\alpha|).\label{h-bound}\eea For the constant potential the dynamical system \eqref{ode-xy} reduces to a single ordinary differential equation (ODE): \bea x'=-\frac{2x(1-2x+y_0)}{1-3x}\left[\frac{y_0+(1-3y_0)x-3x^2}{1+y_0+3(y_0-1)x+6x^2}\right].\label{ode-apos}\eea For the positive coupling ($0\leq x<1/3$), one of the critical points of the ODE \eqref{ode-apos} is at the origin $x=0$. This is a stable equilibrium point since linear perturbations $\delta$ around it ($x\rightarrow 0+\delta$) exponentially decay with the time $\tau=\alpha\ln a$: $\delta(\tau)\propto\exp(-2y_0\tau),$ or in terms of the scale factor of the Universe: $$\delta(a)\propto a^{-2\alpha y_0},$$ the perturbations decay as an inverse power-law. The above means that the cosmic dynamics ends up at the de Sitter attractor $x=0$, where $H=H_0=\sqrt{V_0/3}$. Consistently with the fact that, for the positive coupling, the late time dynamics is not modified by the kinetic coupling \cite{sushkov}, the above is the standard late time behavior expected in any scalar field model with a constant potential. For the vanishing potential the asymptotic late time dynamics corresponds to the empty static universe $H=0$, since for this particular case the origin ($x=0$) is the attractor equilibrium configuration as well: The small linear perturbations around the origin decay like $$\delta(\tau)\propto\tau^{-1}\Rightarrow\delta(a)\propto\frac{1}{\alpha\ln a}.$$ This model is plagued by the Laplacian instability as it can be seen from the top figure in FIG. \ref{figfin}, where the squared sound speed is plotted against $x$. For the negative coupling ($-\infty<x\leq 0$) it is better to use the bounded variable $v=x/x-1$ ($0\leq v\leq 1$). In this case the autonomous ODE \eqref{ode-apos} transforms into: \bea v'=-\frac{2v(1-v)[1+y_0+(1-y_0)v]}{1+2v}\left[\frac{y_0-(1-y_0)v-2(1+y_0)v^2}{1+y_0+(1-5y_0)v+4(1+y_0)v^2}\right].\label{ode-aneg}\eea Two of the critical points of the ODE \eqref{ode-aneg} are at the origin ($v=0$ $\Leftrightarrow x=0$), and at $v=1$ ($x\rightarrow\infty$). The dynamical equations for linear perturbations $\delta$ around these points read: $\delta'=-2y_0\delta$ and $\delta'=-\delta/3$, respectively. After integration, for perturbations around the origin $v=0$, we get that $\delta(a)\propto a^{-2\alpha y_0}$, i. e., given that both $\alpha$ and $y_0$ are negative for this case, then the perturbations decay with the cosmic expansion. Meanwhile, for perturbations around $v=1$ we get that $\delta(a)\propto a^{-\alpha/3}$ and, since $\alpha$ is negative, then the corresponding perturbation grows with the expansion of the Universe. Hence the point $v=1$ is unstable while the origin $v=0$ is the attractor. Since in this case: $$3\alpha H^2=\frac{y_0-(1+y_0)v}{1+2v},$$ in models with the constant potential (for the negative coupling) the Universe starts a the unstable de Sitter solution with $H=1/3\sqrt{-\alpha}$ and ends up its history at the late-time de Sitter solution with $$3\alpha H^2=y_0\Rightarrow H=H_0=\sqrt{V_0/3}.$$ The asymptotic de Sitter state at $v=1$: $H=1/3\sqrt{-\alpha}$, is to be associated with the primordial inflation \cite{sushkov} and the fact that it is a unstable equilibrium state warrants the natural (required) exit from the early times inflationary stage.\footnote{Transient quasi-de Sitter phases of the cosmic evolution can be found also for other potentials than the constant one.} Notice that for the above picture to make physical sense, in \eqref{h-bound} we have to choose the bottom-line bound, i. e., $V_0<1/|3\alpha|$. Otherwise the attractor would be at higher curvature than the starting point of the cosmic expansion, which is a non-sense from the point of view of the inflationary history of our Universe. In spite of the claims that this picture represents an appropriate description of the primordial inflation, according to \eqref{c2t-v} in the neighborhood of the inflationary equilibrium point: $v=1\mp\delta$ ($\delta\ll 1$), for the squared speed of propagation of tensor perturbations we have that: $c^2_T\approx -1\pm 2\delta$, so that the development of a Laplacian instability forbids the -- otherwise unphysical -- inflationary stage in the model. The estimated value of the coupling constant in \cite{sushkov-a} is of about: \bea |\alpha|\sim 10^{-74}\text{sec}^2\approx 10^{-24}\text{GeV}^{-2},\label{a-bound}\eea where the authors chose the time at which inflation is assumed to start $t\approx 10^{-36}$sec. We may as well choose the time at which inflation is assumed to have ended: $t\approx 10^{-33}$sec. The estimated value for the coupling in this case is about 4 orders of magnitude larger: \bea |\alpha|\sim 10^{-70}\text{sec}^2\approx 10^{-20}\text{GeV}^{-2}.\label{a-bound'}\eea If combine the above estimates with the tight constraint on the difference in speed of photons and gravitons $|c^2_T-1|\leq 10^{-15}$ (in this paper we have chosen the units where $c^2=1$) implied by the announced detection of gravitational waves from the neutron star-neutron star merger GW170817 and the simultaneous measurement of the gamma-ray burst GRB170817A \cite{ligo}, since according to \eqref{c2t-x}: $$c^2_T-1=\frac{2x}{1-x}\Rightarrow 2x\leq 10^{-15},$$ we get that $\dot\phi^2\leq 10^5-10^9$GeV$^2$, i. e., $\dot\phi^2\leq 10^{-33}-10^{-29}M_\text{pl}$, where $M_\text{pl}\approx 10^{19}$GeV is the Planck mass. These estimates leave not much freedom for the scalar field to behave different from an effective cosmological constant. The above exposed -- quite simple -- picture is overshadowed by the stability problems associated with the scalar and tensor modes of the perturbations whose energy density grows without bound due to fact that, for these modes it may happen that $c^2_s<0$ ($c^2_T<0$). In the bottom figure in FIG. \ref{figfin} the plot of $c^2_s$ vs $v$ is drawn for $y_0=-0.01$. The conditions for the development of the Laplacian instability ($c^2_s<0$) are evident in the figure, in particular for points in the neighborhood of (including) the source equilibrium configuration that can be associated with the primordial inflation. Besides, in the neighborhood of this point we have also that $c^2_T<0$, so that the tensor modes are classical unstable as well. \section{Conclusion}\label{sec-concl} In this paper we have investigated several problems: i) phantom barrier crossing, ii) causality and iii) classical Laplacian instability, and their potential interconnection in the model \eqref{action} where the scalar field has non-minimal derivative (kinetic) coupling to the Einstein's tensor. As far as we know this is the first time when the present model is checked in all detail against the physical bounds on the squared sound speed (see footnote 5 in the introductory section of this paper). We have also developed an illustrative procedure that allows to show geometrically the evolution of given physical parameters (the effective EOS and the squared sound speed in the present work) along given phase space orbits. The resulting procedure -- called here as ''embedding diagram'' -- geometrically illustrates the way these parameters of physical interest evolve along potential cosmic histories. The power of the procedure relies, precisely, on the fact that each phase space orbit entails a potential cosmic history that is sustained by the dynamical system corresponding to the cosmological field equations of the model \eqref{feqs}. We have shown, both analytically and numerically, that violations of causality and -- what is more disturbing -- the occurrence of Laplacian instability during the propagation of the scalar and of the tensor perturbations, are distinctive features of the cosmological models based in the action \eqref{action} no matter what the sign of the coupling constant is.\footnote{For the tensor perturbations the violation of causality may happen only for the positive coupling case, while the Laplacian instability develops only for the negative coupling.} Moreover, even if the scalar perturbations can propagate subluminally, during inflation the gravitational waves travel with superluminal velocity (this is true for the positive coupling exclusively) as shown in \cite{germani-1} for the model \eqref{action} with the quartic potential $V\propto\phi^4$. In the general case -- see \eqref{c2t}, \eqref{c2t-x} or \eqref{c2t-v} -- the situation can not be more hopeless: Independent of the self-interaction potential, for the positive coupling the tensor perturbations propagate superluminally, while for the negative coupling a Laplacian instability arises. This latter instability invalidates the possibility for the model to describe the primordial inflation. It has been shown also that, in the positive coupling case ($0\leq x\leq 1/3$), a sufficient (but not necessary) condition for superluminality to happen is that $\omega_\text{eff}+1<0$, since in this case the third term in the RHS of \eqref{c2s-master-eq} also adds to the unity. Since the crossing of the phantom barrier warrants that for some $x$-interval $\omega_\text{eff}+1<0$, then it also warrants that superluminality will happen. However, as mentioned before, it is not necessary that the crossing occurs in order to have superluminal propagation of the perturbations of the background. One trivial example can be the situation when $\omega_\text{eff}+1<0$ for all times. In this case violations of causality arise even when the crossing does not occur. For the quintessence model with the kinetic coupling to the Einstein's tensor, in the particular case when the potential is a constant $V=V_0$, eventual violations of the physical bounds of the squared sound speed are evident as well: No matter whether the coupling is positive or negative, the asymptotic dynamics at early times develops a (classical) Laplacian instability that makes impossible the formation of cosmic structure. This makes very improbable that the primordial inflationary stage can be described by this cosmological model as suggested, for instance, in \cite{sushkov, matsumoto}. Although we lack a demonstration, we suspect that the violation of the bounds $0\leq c^2_s\leq 1$ on the squared sound speed are a feature of galileon models in general. In particular the cubic galileon model of \cite{q-gal, rob-q-gal} seems to suffer from the same problems. A demonstration of the latter assumption will be the subject of forthcoming work. \section*{ACKNOWLEDGMENTS} Very interesting and useful comments by A. Vikman are sincerely acknowledged. The authors are grateful to SNI-CONACyT for continuous support of their research activity. The work of RG-S was partially supported by SIP20172234, SIP20160512, COFAA-IPN, and EDI-IPN grants. IQ, TG and FAH-R thank CONACyT of M\'exico for support of this research. UN also acknowledges PRODEP and CIC-UMSNH. \section{Appendix: Classical instability due to imaginary sound speed}\label{app} Even if the theory \eqref{action} is free of the Ostrogradsky instability (the equations of motion are second order in the derivatives), it may contain other kinds of instability since it is based in a non-standard Lagrangian. Here we shall discuss on one such kind of instability that may arise in the theory with non-minimal derivative coupling with the Einstein's tensor due to ``imaginary'' sound speed. Let $\rho_B$ and $p_B$ be the energy density and barotropic pressure of the FRW cosmological background. If consider small perturbations of the background energy density: $\rho_B(t)+\delta\rho_B({\bf x},t)$, the conservation of energy and stresses $\nabla^\mu T_{\mu\nu}=0$, leads to the wave equation \cite{peebles-rmp}: \bea \left(-\frac{\der^2}{\der t^2}+c^2_s\nabla^2\right)\delta\rho_B=0,\label{gen-waveq}\eea where $\nabla^2=\der^2/\der{\bf x}^2$ and $c^2_s=dp_B/d\rho_B$ is the speed of sound squared. The solution of the wave equation \eqref{gen-waveq} is given by $\delta\rho_B=\delta\rho_{B0}\exp(-i\omega t+i{\bf k}{\bf x})$, so that the standard dispersion relation is found: \bea \omega^2-c^2_sk^2=0.\label{dispersion-r}\eea For positive $c^2_s>0$ the solution is a free wave propagating with speed $c_s$, while for negative $c^2_s<0\Rightarrow c_s=i\bar c_s$, the frequency $\omega=\pm kc_s=\pm ik\bar c_s$ is imaginary, so that the solution of \eqref{gen-waveq} is not a propagating free wave but an exponentially growing spatial perturbation: \bea \delta\rho_B=\delta\rho^+_{B0}\,e^{2\pi\bar c_s t/\lambda}\exp(i{\bf k}{\bf x})+\delta\rho^-_{B0}\,e^{-2\pi\bar c_s t/\lambda}\exp(i{\bf k}{\bf x}),\label{s-pert}\eea where we have taken into account that $k=2\pi/\lambda$ is the wave number of the perturbation ($a/k$ is the physical wavelength of the perturbation). Since the negative frequency part of the perturbation decreases with the time, eventually the energy density of the perturbations uncontrollably grows resulting in a classical instability of the cosmological model. As seen the increment of instability is inversely proportional to the wavelength of the perturbations and the models where $c^2_s<0$ are violently unstable so that these should be rejected \cite{chinos}. The situation is a bit more complex for a scalar field \cite{ellis-roy, mukhanov} (see also \cite{noh}), which is the case considered in this paper. As an illustration, let us consider a general action of the form: \bea S=\frac{1}{2}\int d^4x\sqrt{|g|}\,R+\int d^4x\sqrt{|g|}p_\phi(X,\phi),\label{action-mukhnov}\eea where $X\equiv(\der\phi)^2/2$, $p_\phi={\cal L}_\phi$ is the parametric pressure of the scalar field and $\rho_\phi=2X{\cal L}_{\phi,X}-{\cal L}_\phi$ is its energy density, with $Z_{,X}$ denoting the partial derivative with respect to $X$. Varying the scalar field Lagrangian ${\cal L}_\phi$ with respect to the metric one gets the stress-energy tensor for the scalar field: $$T^{(\phi)}_{\mu\nu}=\left(\rho_\phi+p_\phi\right)u_\mu u_\nu+p_\phi g_{\mu\nu},$$ where $u_\mu=\der_\mu\phi/\sqrt{2X}$. As stated in \cite{mukhanov}, the Lagrangian ${\cal L}_\phi$ can be used to draw a useful analogy with hydrodynamics. Indeed, if $p_\phi$ depends only on $X$, then $\rho_\phi=\rho_\phi(X)$. In many cases the equation $\rho_\phi=2X p_{\phi,X}-p$ can be solved giving the equation of state $p_\phi=p_\phi(\rho_\phi)$ for an ''isentropic'' fluid. In the general case, when $p_\phi=p_\phi(X,\phi)$, the pressure cannot be expressed only in terms of $\rho_\phi$. However, even in this case the hydrodynamical analogy is still useful. If consider small perturbations of the scalar field: $\phi(t,x)=\phi_0(t)+\delta\phi(t,x)$, and recalling that $\delta T^i_k\propto \delta^i_k$, one can write the perturbed FRW metric in the longitudinal gauge: $$ds^2=-(1+2\Phi)dt^2+(1-2\Phi)a^2(t)g_{ik}dx^idx^k,$$ where $\Phi$ is the Newtonian gravitational potential. It is demonstrated in \cite{mukhanov} that the wave equation for the fluctuations of the scalar field in a spatially flat FRW background can be written as: \bea v''-c^2_s\nabla^2v-\frac{z''}{z}\,v=0,\label{wave-eq}\eea where $$v=z\left(\Phi+H\frac{\delta\phi}{\dot\phi}\right),$$ is the canonical quantization variable and \bea z\equiv\frac{a\sqrt{\rho_\phi+p_\phi}}{c_s H}.\label{z}\eea Besides, in \eqref{wave-eq} the comma denotes derivative with respect to the variable $\tau=\int dt/a$, while the quantity $$c^2_s=\frac{p_{\phi,X}}{\rho_{\phi,X}},$$ plays the role of the effective speed of sound (squared) for the perturbations of the scalar field. For negative $c^2_s<0$ the above equation \eqref{wave-eq} ceases to be a wave equation since it turns from hyperbolic $c^2_s>0$ (the Cauchy problem is well posed) into Elliptic. The imaginary effective sound speed ($c^2_s<0$) of the fluctuations of the scalar field is associated with the so called gradient instability. Notice that if set $v\propto v_k(\tau)\exp{(i{\bf k}{\bf x})}$ ($\nabla^2v=-k^2v$), the wave equation \eqref{wave-eq} can be written as \bea v''_k+\left(c^2_sk^2-\frac{z''}{z}\right)v_k=0.\label{waveq}\eea During slow-roll inflation the Hubble rate $H$, $c_s$ and $\rho_\phi+p_\phi$ change much slower than the scale factor $a$, so that, under the reasonable assumption that $(\rho_\phi+p_\phi)/\rho_\phi\ll 1$, from \eqref{z} it follows that $$\frac{z''}{z}\approx\frac{a''}{a}\approx 2(aH)^2.$$ For a given wave number $k$ the term $z''/z$ in \eqref{waveq} can be neglected at early times when the physical wavelength of the perturbations $a/k$ is much smaller than the sound horizon $c_s/H$. Hence, $c_sk\gg aH$ and \eqref{waveq} can be written as: $v''_k+c^2_sk^2v_k=0$, which is similar to \eqref{dispersion-r} if set $v_k(\tau)\propto\exp{(-i\omega\tau)}$.
\section*{Method} When breaking up large query molecules, e.g.~through cascades of bond separating reactions,~\cite{Pople1970bondseparation} increasingly smaller and more common molecular fragments are obtained, whose summed up energy will increasingly deviate from query. To control the errors resulting from our {\em Ansatz}, we perform the reverse procedure: Starting very small, increasingly larger amons (representing fragments) are being included in training, resulting in increasingly more accurate ML models. The training set size is minimized by selecting only the most relevant amons, i.e.~those small fragments which retain the same local chemical environment as encoded through the coordinates of the query molecule, obtained through preceding DFT relaxation. Note that query coordinates resulting from less expensive force-field methods, such as ~\cite{MMFF94s}, could have been used just as well~\cite{DeltaPaper2015}. Figure~\ref{fig:Selection} illustrates the amon ML (AML) approach for predicting the total potential energy of the organic molecule 2-(furanyl-2-yl)propanol (C$_7$H$_{10}$O$_2$): The AML prediction improves systematically as more and larger amons are being included in the training, being selected through the subgraph matching algorithm, and reaching $\sim$1.5 kcal/mol prediction error with no more than 31 amons with at most 6 heavy atoms each. To exceed chemical accuracy ($\sim$1 kcal/mol prediction error) the training set requires inclusion of 7 additional amons with 7 heavy atoms each. By comparison, tens of thousands of training molecules are needed to reach similar prediction errors using conventional ML models trained on randomly selected molecules~\cite{CM,googlePaper2017}. Inspection of the selected amons reveals that all ``local chemistries", present in the molecule, have been dialled in. For example, alcohols with respectively $sp^3$- and $sp^2$-hybridized carbon atoms in vicinal and geminal position to the hydroxy group are present among all amons with more than three heavy atoms. While the prediction error in Figure~\ref{fig:Selection}D decreases systematically with amon and training set size, the sign indicates that the query energy is underestimated by AML for smaller amons with up to 3 heavy atoms (lack of stabilization through electronic delocalization), and overestimated for larger amons with more than 4 heavy atoms (overly stabilized due to unconstrained conjugated double bonds). Note that due to the oscillatory nature of the convergent prediction error, it is possible to prematurely reach spuriously low errors for unreasonably small amons by mere coincidence. For example, for 2-(furanyl-2-yl)propanol an error of only $\sim$10 kcal/mol can be found using only 9 amons with no more than 3 heavy atoms. It is therefore important to systematically converge AML prediction errors. Figure~\ref{fig:Selection}D also illustrates that AML models of other size-extensive properties can trivially be generated using the exact same kernels as for energies: The prediction error for the isotropic static molecular polarizability is shown as well, and it reaches $\sim$0.4 Bohr$^3$, on par with hybrid DFT accuracy~\cite{ChemistsGuidetoDFT}. Note that in comparison to more conventional homodesmotic construction approaches~\cite{wheeler2012homodesmotic,fragModel_cr2015} (see also references therein) our AML model differs by (a) the amon selection algorithm which automatically solves the problem of how to partition the system into its constituting fragments, (b) the specific linear combination of energy contributions, appropriately weighted through use of kernel ridge regression, (c) the averaging out of combinatorially many fragmentation schemes which represent the buffer regions linking different amons, and (d) the broader applicability to non-covalent binding and condensed phase. To make use of an efficient AML implementation, we developed a two and three-body interatomic potential based representation of atoms in molecules. Due to its popularity we have used hybrid DFT (B3LYP) for training and validation throughout. We note that the choice of reference is irrelevant for AML, any other level of theory could have been used just as well. To corroborate this fact, we have calculated Hartree-Fock, MP2, and CCSD(T) reference based AML learning curves for water clusters. More specifics and computational details are given below and in Supplementary Materials. The prediction of total energies for two dozen large and important biomolecules, including cholesterol, cocaine, taxol, or NADH can be considered to illustrate the scalability and usefulness of AML in the most compelling fashion. True versus predicted energies are shown in Figure~3 for various AML models trained on sets of amons containing $N_\mathrm{I} =$1, 2, 3, 5, and 7 heavy atoms. Systematic improvement of predictive accuracy is found reaching mean absolute errors typically associated with bond-counting, density functional theory, or experimental thermochemistry for amons with 3, 5, or 7 heavy atoms, respectively. For smaller query molecules with rigid and strain-less structure and homogeneous chemical environments of the constituting atoms, e.g., vitamin B3 with only 9 heavy atoms, the prediction error decreases faster with amon size than for more complex molecules, reaching chemical accuracy with less than one hundred amons in total (see supplementary materials for detail). Not surprisingly, large and complex molecules with diverse atomic chemical environments, such as NADH, require substantially more amons to reach the same level of accuracy. On the scale of atomization energies, the results also reflect basic chemistry: Predicted energies decrease towards the reference as the amons account for contributions corresponding to composition ($N_I = 1$), bonds ($N_I = 2$), and hybridization ($N_I = 3$). When exploring chemical space one invariably faces the problem of severe selection bias due to the unfathomably large scale resulting from all the possible combinations of atom types and coordinates. In order to rule out the possibility of above results being coincidental, we have investigated the AML performance for eleven thousand diverse organic query molecules made up of nine heavy atoms. All query molecules were drawn at random from the QM9 dataset~\cite{gdb17,gdb9_data} consisting of coordinates and electronic properties of 134k organic molecules calculated at the hybrid DFT level of theory. While QM9 certainly constitutes by no means a comprehensive subset of chemical space~\cite{CCS,anatole-ijqc2013}, it is representative for substantial branches of chemistry. Furthermore, conclusions regarding AML are drawn without loss of generality: Any other molecular data set could have been chosen just as well. After amon selection and subsequent training, out-of-sample prediction errors of atomization energies decrease systematically with number and size of amons (See Figure~\ref{fig:gdb9}A), and reach 1.6 kcal/mol for amons with up to seven heavy atoms. Corresponding standard deviations tend to be independent of training set size. Note that such training set sizes are two to three orders of magnitude smaller than for conventional neural network or kernel ridge regression models which rely on random sampling and which do not scale~\cite{DTNN2017,googlePaper2017}. Examining molecules one by one, we find that largest deviations correspond to molecules containing highly strained fragments, example shown in Figure~\ref{fig:gdb9}A. In order to properly account for strained query molecules, the training set would require inclusion of amons with similarly strained local motifs. Application of the amon selection algorithm to the 110k organic molecules in QM9 with nine heavy atoms results in a grand total of only $\sim$21k amons with up to seven heavy atoms (all specified in the Supplementary Material). While distinct, these $\sim$21k amons are indistinguishable in the sense that they do not depend on any possible query molecule, but can rather be combined to model arbitrarily many new and different query molecules with an expected MAE in atomization energy of $\sim$1.6 kcal/mol. The exponentially decaying normalized frequency distribution of amons with number of atoms is shown in Figure~\ref{fig:gdb9}B, along with the exponentially growing number of possible molecules in QM9. As one would expect, the smaller the amon the more frequently it will be selected, and for any given amon size high carbon content is more frequent than high oxygen or nitrogen content. A list and a movie, displaying the one thousand most frequent amons are provided in the supplementary materials. Conversely, the larger the amon the less likely that it will be needed for predicting properties of a random query molecule. It is hence consistent that the ten least frequent amons, not shared by any pair of query molecules, represent rather pronounced chemical specificity (shown in Figure~\ref{fig:gdb9}B). These results amount to numerical evidence that the fundamental idea of using amon based building blocks within ML models is meaningful for chemistry: The larger the query molecule and the weaker the accuracy requirements, the more query molecules will share the same amons. As such, the AML model effectively exploits the lower dimensionality of fragments in the very high dimensional chemical space, known to scale exponentially with number of atoms~\cite{gdb17,anatole-ijqc2013}. The use of AML can deepen our understanding of chemistry. E.~g.~consider the number and nature of amons shared among different query molecules. They can serve as an intuitive measure of chemical similarity, as exemplified for three organic query molecules in Figure~\ref{fig:gdb9}C. The smallest amons are shared by all molecules, and the more similar a pair of query molecules the larger the ``genetic'' overlap: Molecules I and II are more similar than I and III, which are more similar than II and III. Shared amons imply that AML predictions of other compounds will require fewer additional reference data. Another valuable insight obtained from AML is the transferability of regressed atomic energies: Local atoms possessing similar environments will contribute to similar degrees to the total energy, which also underpins the atoms-in-molecules theory~\cite{AIM}. To illustrate this, atomic contributions to the AML estimated atomization energies are also printed for the three example molecules in Figure~\ref{fig:gdb9}C (see Supplementary Material for more detail). Note that their relative values are consistent with chemical intuition about covalent bonding. For example, there are three types of local oxygen environments (carbonyl, alcohol, and furane) which contribute to covalent binding ($\sim$94, 94, and 100 kcal/mol, respectively) in an order which one would expect for an atom sharing one double bond to carbon, two single bonds (carbon, hydrogen), and being in a conjugated environment (furane). Also, $sp^3$-hybridized, aromatic, and $sp^2$-hybridized (in carbonyl) carbon atoms contribute with $\sim$164, $\sim$162, and 157 kcal/mol, respectively, also reflecting the fact that four single bonds contribute more bonding energy than two single and one double bond, and that aromaticity provides additional stabilization. It is also consistent that hydrogen atoms have a relatively small variance in their contribution (64 to 66 kcal/mol), they can only have single bonds. For comparison, we have also calculated corresponding energies using reparameterized Morse potentials~\cite{baml}. Overall fair agreement with corresponding Morse numbers is found, suggesting the capability of AML to provide qualitative and quantitative insight to a degree previously only accessible through physically motivated approximations. Note that, obviously, Morse potential based estimates of atomization energies of such molecules are dramatically worse than AML due to their averaged parameters, rigid functional form, and inherent neglect of interatomic many-body effects. After showcasing AML results for thousands of organic molecules we now focus on the question of scalability. While some of the biomolecules in Figure~\ref{fig:bio1} are already substantially larger than the amons employed with no more than seven heavy atoms, we have investigated the applicability of AML to very large systems in a more systematic fashion. Four different classes of systems, somewhat representative for the chemical space spanned by early main group elements, have been examined; and we have found that regardless of size and chemical nature, all prediction errors decrease systematically and reach rapidly chemical accuracy as number and size of selected amons grows: (i) We have trained AML models to predict total potential energies of five common polymers with increasing size and chemical complexity (polyethylene ($N_{I} =$ 26), polyacetylene ($N_{I} =$ 30), alanine peptide ($N_{I} =$ 50), polylactic acid ($N_{I} =$ 50) and the backbone of quaternary ammonium polysulphone ($N_{I} =$ 96)). The latter being essential for alkaline polymer electrolyte fuel cells)~\cite{QAPS_PNAS}. Resulting learning curves in Figure~\ref{fig:sca}A exhibit a simple trend: The more chemically complex the system, the more amons are selected and required in order to achieve predictive power. The chemically most complex polymer polysulphone requires nearly ten times more amons ($\sim$200) to reach chemical accuracy ($\sim$1 kcal/mol), than polyethylene, the chemically simplest polymer in our set ($\sim$20). (ii) Potential energies of water clusters consisting of eleven, thirteen, fifteen, seventeen, nineteen and twentyone~\cite{h2oN_TIP5P} molecules have been predicted (see Figure~\ref{fig:sca}B). Also in this case, prediction errors decay rapidly and systematically for all clusters and reach chemical accuracy with at most seven amons and no more than ten water molecules/amons. This demonstrates the applicability of AML to non-covalent hydrogen-bonding. (iii) We have examined periodic 2D materials, namely hexagonal BN sheets doped with carbon and gold (C-$h$BN; Au-$h$BN; C,Au-$h$BN), previously reported to have very high efficiency towards CO oxidation reaction~\cite{Au_hBN} (see Figure~\ref{fig:sca}C). Due to substantial redundancy caused by underlying symmetries, AML prediction errors of total energies converge to chemical accuracy within at most twelve amons for the most complex C,Au-$h$BN doped variant. (iv) Symmetry plays an even more important role in crystalline bulk: To accurately predict the cohesive energy of silicon only five amons with no more than eighteen atoms are required (see Figure~\ref{fig:sca}D). Interestingly, a AML lattice scan produces even a reasonable minimum---despite the lack of distorted amons for training. We believe that this is due to the aforementioned fact that the AML model approaches the energy from above. It is a hallmark of machine learning models that in the limit of large training set size $N$ they systematically improve with $N$. Logarithmized prediction errors of kernel ridge regression models decay linearly with logarithmized training set size~\cite{Muller1996}, as long as training data and molecular representations are noise-free and unique, respectively~\cite{baml}. All AML learning curves obtained so far confirm that off-set and slope improve dramatically in comparison to learning curves of conventional ML models which do not scale and rely on random sampling of training molecules~\cite{CM,baml,googlePaper2017}. We believe that the AML's advantageous performance results from (i) a scalable building block approach, physically motivated by the observation that effective atoms can be transferable in molecules~\cite{AIM}, ultimately reducing the formal dimensionality of the potential energy hyper surface in chemical space~\cite{anatole-ijqc2013}. Dimensionality reductions are known to lead to steeper learning curves~\cite{LC2011}. (ii) a compact and minimalistic representation (SLATM), based on interatomic many-body terms, which meets crucial criteria identified in Ref.~\cite{baml}, and which also lowers the learning curve off-sets (see Supplementary Materials for more details). (iii) elimination of counterproductive or redundant training species through subgraph matching, which amounts to an optimization of training set composition, already shown to lead to substantial reduction in learning-curve off-set after application of genetic algorithms~\cite{geneticAlgorithm_trainingSet}. Note that in the limit of small training set $N$, prediction errors do not necessarily decay in a monotonic fashion with $N$. However, our selection procedure focusses on the most relevant training instances, and thereby filters out those cases which could potentially deteriorate the prediction. Consequently, steeper slopes of AML learning curves with improved monotonicity are found, even for small $N$. Finally and out of curiosity, we have investigated the ``DNA'' of DNA, i.e.~the amons of DNA. More specifically, we have considered the Watson-Crick Cytosine-Guanine (GC) base pair (see Figure~\ref{fig:CG}E). While amons with no more than seven heavy atoms suffice to converge the energies for individual base pairs, amons corresponding to truncated motifs of hydrogen bonds with up to ten heavy atoms are necessary to reach chemical accuracy. Similar performance has been observed for the Watson-Crick bonded Adenine-Thymine base pair (See supplementary materials). It is not surprising that non-covalent bonding patterns, such as Watson-Crick bonding, require larger amons, as they extend over larger spatial domains. Furthermore, they also exhibit strong non-local effects through their conjugated moieties, implying the need for amons with multiple hydrogen bonds. Interestingly, to reach chemical accuracy it is not necessary to include amons which simultaneously contain aromatic fragments and hydrogen bonds, justifying previously made system choices for the study of nuclear quantum effects in DNA~\cite{anatole-jacs2010}. We have combined the idea of building blocks in chemistry (amons) with machine learning to rapidly and systematically infer quantum properties of large and arbitrary query molecules. Seen the strong transferability and versatility of AML, predicting a query molecule's properties based on its constituting amons, there is a strong analogy to DNA sequences which also encode the functionality of genes. Another analogy can be drawn with respect to linguistics. The list of possible amons could represent a ``dictionary'' of chemistry, and molecules and their properties would correspond to sentences and their meaning. Zipf's law, however, does not appear to be applicable in the case of amons. More rigorously, we think of amons as an additional dimension in the periodic table (Fig.~\ref{fig:amons}) which accounts for chemical environment. Due to well defined similarity measures, any amon can thereby uniquely located. AML is a Bayesian approach which infers the energy of {\em any} query compound, no matter its size or composition, based on a linear combination of properly weighted quantum chemistry results for its constituting building blocks. The electronic locality assumption (``nearsightedness'')~\cite{KohnNearsightedness} underpinning the AML approach, is exploited to systematically converge the effective energy contributions coming from the various fragments in a molecule. AML enables instantaneous energy predictions with unprecedented predictive power, on par with experimental uncertainties: We have demonstrated the versatility and robustness of AML for numerical error convergence results for predicted energies of two dozen large biomolecules with up to 96 heavy atoms, eleven thousand organic molecules with nine heavy atoms, non-covalently bound systems consisting of water clusters and Watson-Crick DNA base pairs, as well as doped hexagonal BN sheets and bulk silicon. Using amons with at most seven heavy atoms, chemical accuracy ($\sim$1 kcal/mol) is reached for most covalently bound systems. Since identical amons are common to diverse chemistries of arbitrary query molecules, our results suggest that an amon training set of very finite size and consisting of small to medium sized molecules will suffice to generate accurate and efficient AML models applicable to a practically infinite number of chemical systems. Therefore, we think it evident that high-level reference energies, such as post-Hartree-Fock or Quantum Monte Carlo methods, are no longer prohibitive for future AML models, effectively promising to finally sidestep the various issues which plague many of the common DFT approximations~\cite{Perdew2017Science}. Future work will deal with developments of more sophisticated amon selection procedures to also account for distorted or reactive structures, predictions of other extensive properties, and extensions of the amon pool to include further chemical elements, as well as open-shell, charged and electronically excited species. \begin{figure*} \centering \includegraphics[scale=0.6]{FIG1.png} \caption{\label{fig:amons} {\bf Illustration of the ``amons'' of chemistry} as a compositional extension of the periodic table (for clarity only shown for main-group elements C, H, O, N, and F) in terms of SMILES strings arranged in increasing number of surrounding elements, and covering typical chemical environments. Within our amon machine learning approach, the energy of a query compound $E_q$ (exemplary guanine nucleotide on display) is expanded in $N_a$ amons, the double summation being weighted by kernel ridge regression coefficients $\{\alpha_a\}$, and quantifying the similarity $k$ between all respective $N_J$ and $N_I$ atoms in query and amon molecule ${\bf M}_q$ and ${\bf M}_a$. } \end{figure*} \begin{figure*} \centering \includegraphics[scale=0.8]{FIG2.png} \caption{\label{fig:Selection} {\bf Amon selection}: (A) Illustration of algorithm, exemplified for prediction of 2-(furan-2-yl)propan-2-ol; (B) Flow-chart for graph-based selection of amons; (C) Selected amons for query molecule; (D) Signed error E of predicted total energy (black) and isotropic static polarizability (red) as a function of number of amons in training set ($N_a$) or number of heavy atoms per amon ($N_I$, not counting hydrogens), respectively. } \end{figure*} \begin{figure*} \centering \includegraphics[scale=0.7]{FIG3.png} \caption{\label{fig:bio1} {\bf Applicability of AML}, demonstrated by systematic improvement of predicted atomization energies ($E$) for two dozen important biomolecules using increasingly larger amons. The inset specifies the maximal number of heavy atoms ($N_I$, not counting hydrogens) per amon, as well as resulting MAE. Chemical, DFT, and bond-counting accuracy is roughly reached for amons with 7, 5 and 3 heavy atoms, respectively. All amons used are specified in supplementary materials. } \end{figure*} \begin{figure*} \centering \includegraphics[scale=0.4]{FIG4.png} \caption{\label{fig:gdb9} {\bf The amons of organic chemistry}: (A) Mean absolute prediction error (circles) of total potential energy of eleven thousand organic molecules (with $N_{I} = 9$ from QM9~\cite{gdb9_data}) as a function of number of heavy atoms per amon ($N_I$, not counting hydrogens) or amons ($N_a$) in training set. Standard deviations with respect to error and $N_a$ are also shown. The inset shows a typical outlier with high strain. (B) Left axis: Frequency of amons ($f =$ number of occurrence/number of query molecules) in descending order; right axis: Number of query molecules $N$, both as a function of $N_{I}$ of amons. Insets specify the most and least frequent amons. (C) amons for 2-phenylacetaldehyde ($\rom{1}$), 2-(furan-2-yl)propan-2-ol ($\rom{2}$) and 2-(pyridin-4-yl)acetaldehyde ($\rom{3}$). Overlapping regions correspond to shared amons. Numbers indicate atomic energy contributions to atomization energy, regressed by AML and by Morse-potential (in brackets) for those atoms where meaningful.} \end{figure*} \begin{figure*} \centering \includegraphics[scale=0.4]{FIG5.png} \caption{\label{fig:sca} {\bf Scalability of the AML model}, illustrated by learning curves for (A) 6 polymers, including polyethylene (PE, with 28 monomers), polyacetylene (PA, with 15 monomers), alanine peptide ((ala)$_{10}$), polylactic acid (PLA, with 10 monomers) and the backbone of quaternary ammonium polysulphone (bQAPS, with 3 monomers); (B) 6 water clusters with number of water molecules being 11, 13, 15, 17, 19, and 21; (C) 2-D hexagonal BN sheets with one B atom replaced by gold (Au-$h$BN), or carbon (C-$h$BN), or two B atoms replaced by gold and carbon (Au,C-$h$BN). Absolute errors are shown for per unit cell; (D) bulk silicon, for which also shown in the figure are predicted and DFT cohesive energies versus lattice constants (middle panel, where the black solid dot and vertical line represent experimental values~\cite{Sibulk_a0,Sibulk_Ecoh} and uncertainty of $E_{\rm coh}$, respectively), as well as the amons (bottom panel, i.e., Si clusters saturated by hydrogens). Numbers of heavy atoms in amons ($N_{I}$) employed are specified in all learning curves. All amons not shown here are specified in supplementary material. } \end{figure*} \begin{figure*} \centering \includegraphics[scale=0.6]{FIG6.png} \caption{\label{fig:CG} {\bf The amons of DNA}, illustrated for Watson-Crick base-pair GC (E). (A) amons of DNA base Guanine; (B) amons shared by Cytosine and Guanine; (C) amons of Cytosine; (D) amons of Watson-Crick bonding pattern, all containing H-bonds. Trained on these amons, AML underestimates the DFT energy by 0.17 kcal/mol. } \end{figure*} \clearpage \section*{methods} For each atom $J$ in query molecule $q$ the model sums over amons with chemically similar atomic environments. More specifically, we rely on a kernel ridge regression model which approximates the energy difference between the truth and a baseline energy consisting of the sum of dressed atom energies ($\varepsilon_0^J$) which vary only among different elements and are obtained through fitting to the amons. For finite training set $N_a$, \begin{eqnarray} E_q^{\rm true} & \approx & \sum_J \varepsilon_0^J + E_q^{\mathrm{AML}} \nonumber \end{eqnarray} where $E_q^{\mathrm{AML}}$ is the ML model specified in Figure~\ref{fig:amons}, $\mathbf{M}_{Ia}$ and $\mathbf{M}_{Jq}$ are the respective representations of atoms $I$ and $J$ in molecules $a$ and $q$. The selection of $N_a$ fragments is done independently for each query, and from scratch, following the algorithm shown in Figure~\ref{fig:Selection}B and in the Supplementary Materials. Regression weights $\{\alpha_a\}$ are generated ``on-the-fly'' through inversion of the covariance matrix $K_{ha} = \sum_{JL} k(|\mathbf{M}_{Jh}-\mathbf{M}_{La}|)$ between all training amons $a$ and $h$. We use the Euclidean norm in Gaussian kernels with heuristically determined amon-dependent widths. The atomic environment of atom $I$ is represented by the atomic SLATM (spectrum of London (two-body) and Axilrod-Teller-Muto (three-body) potentials). We refer to the supplementary materials for more details. Selection of conformational amons for any query molecule is carried out according to the flowchart in Figure 2. A molecule is a graph ($G$) defined by a set of vertices and edges $\{V, E\}$ with different weights for $V$ and $E$ (which represent different atom/bond types). From this set we select a subset $\{V_1, E_1\}$ (note that the 3D coordinates of each vertex is kept the same as the corresponding part in parent molecule, i.e., the query molecule) and proceed only if the new set is monomorphic. The monomorphic fragments are relaxed after saturation with hydrogens. The amon is expelled if the geometry relaxation leads to major atomic rearrangements which does not retain the chemical environment of the parent graph. This procedure is repeated until all subgraphs in $G$ have been exhausted. \section*{supplementary material} More technical details as well as coordinates and energies are provided in the supplementary materials. \section*{Author Contributions} All authors contributed extensively to the work presented in this paper. \section*{acknowledgements} \begin{acknowledgements} D.~Bakowies is acknowledged for helpful discussions. M.~Caillard is acknowledged for the VR video of the 1k most frequent amons in QM9. O.A.v.L. acknowledges funding from the Swiss National Science foundation (No.~PP00P2\_138932 and 407540\_167186 NFP 75 Big Data). This research was partly supported by the NCCR MARVEL, funded by the Swiss National Science Foundation. Calculations were performed at sciCORE (http://scicore.unibas.ch/) scientific computing core facility at University of Basel. \end{acknowledgements} \section*{Author Information} Reprints and permissions information is available at www.nature.com/reprints. The authors declare no competing financial interests. Readers are welcome to comment on the online version of the paper. Correspondence should be addressed to O.A.v.L. (<EMAIL>). Requests for materials should be addressed to B.H. (<EMAIL>).
\section{Introduction}\label{sec-intro} RR Lyrae stars are well established standard candles and tracers of old stellar populations throughout the Local Group. They are also extremely good standard colors. As first demonstrated by \citet{Sturch66}, the colors of fundamental mode RR Lyrae stars near the minimum light phase of their pulsation cycle are predictable with accuracies of a few percent. As such, they broadcast both their distance as well as their line of sight reddening, and hence extinction. This property makes RR Lyrae stars specially good probes in regions of high interstellar extinction such as the Galactic center and inner Bulge, where they exist in large numbers. There is a rich history of attempts to study aspects of the inner Galaxy using RR~Lyrae stars \citep[][among others]{baade46,plaut68,plaut70,plaut73,blanco84,blanco92,alcock98,kunder08,gran16}. The most recent and extensive photometric catalogs have come from the OGLE project \citep[e.g.,][]{Udalski15}. Their RR Lyrae survey and results are described in \citet{Pietr15}. Relative to these past investigations, the Dark Energy Camera \citep[DECam,][]{flaugher15} on the Blanco 4m telescope offers a more extensive chromatic coverage, allowing us to measure colors over a wide spectral range. This enables us to not only measure reddening to the RR Lyrae stars accurately, but also to examine alleged variations in the reddening law towards the Galactic center. In addition to simply acquiring a more accurate map of the RR Lyrae stars' spatial distribution (and by extension that of the `ancient' stellar population), the relatively high density of RR~Lyrae stars in these regions offers a chance to make an accurate map of the line of sight extinction through the foreground disk that depends only upon our knowledge of RR Lyrae star colors. This should be an improvement over prior methods such as using colors of red clump stars, which are much more sensitive to stellar population parameters such as metallicity. If the goal is to examine the stellar populations in the bulge and bar using color-magnitude and Hess diagrams, it is desirable to correct for reddening using a probe like RR Lyrae star minimum light colors, which as we discuss later, is known to be insensitive to metallicity. To exploit this opportunity, we must first determine empirically the intrinsic colors of the RR~Lyrae stars at minimum light in the photometric system of the DECam passbands. As the globular cluster M5 (NGC 5904) is a well studied cluster rich in RR Lyrae stars \citep[][and references therein]{clement01} and is located towards the Southern Galactic cap with minimal line of sight reddening, its RR Lyrae stars are ideal for establishing baseline colors and absolute magnitudes that can be used to interpret photometry of reddened RR Lyrae stars towards the Galactic center and along or near the plane of the Galaxy. The characteristics of M5, including distance and reddening, are summarized in \citet{harris96}\footnote{Updated information is maintained on a web-page: \url{http://physwww.physics.mcmaster.ca/~harris/mwgc.dat}}. In this paper, we present results from DECam photometry of M5 RR Lyrae stars to establish their colors at minimum light and absolute magnitudes in the DECam passbands, which are needed to determine the extinction toward the stars and their distances. In upcoming papers we will use these results as established base-line properties of RR Lyrae stars to study the Galactic Bulge. We note that \citet{ngeow17} recently presented an analysis of the Sloan Digital Sky Survey (SDSS) colors of RR Lyrae stars at maximum and minimum light based on Stripe 82 data. The advantage of our study is that since we have RR Lyrae stars residing in the same cluster, we are able to probe absolute magnitudes and colors at a fixed distance, greatly minimizing distance uncertainties from the equation. The paper is laid out as follows. The imaging data, processing and photometry are described in \S\ref{sec-data}. A description of the periodic variable stars identified in this work, namely 66 RR Lyrae stars and 1 SX Phe star, are shown in section \S\ref{sec-RRLS}, and the location of these stars in the Color-Magnitude diagram (CMD) of M5 is discussed in Section \S\ref{sec-CMD}. Section \S\ref{sec-color} presents the average colors at minimum light of both the fundamental mode (RR{\sl ab}) and first overtone (RR{\sl c}) RR Lyrae stars in different filters, as well as discussing dependence with period and metallicity. Section \S\ref{sec-M} provides Period-Luminosity (P-L) relationships for the RR Lyrae stars in M5 in the DECam $ugriz$ system. Conclusions are provided in \S\ref{sec-conclu}. \section{Data \& Photometry}\label{sec-data} Observations were obtained during 2013 and 2014 with the DECam imager on the 4m Blanco Telescope at Cerro Tololo Inter-American Observatory (CTIO), Chile. Repeated DECam images of a field centered on M5 (RA=15:18:33.2, DEC=+02:04:51.7, J2000.0) were obtained using the $u,g,r,i$, and $z$ filters. The large field of view (FOV) of DECam ($2\fdg 2$) easily covers the whole globular cluster with only the central CCDs of the camera (Figure~\ref{fig-M5sky}). The journal of observations (date (evening) and number of observations per filter) are recorded in Table~\ref{tab-observations}. M5 is a nearby globular cluster located at only 7.5 kpc from the Sun, whose RR Lyrae stars are henceforth expected to be bright, at V magnitudes of $\sim 15.1$ \citep{harris96}. Exposure times were therefore short in our images with 30s in the $u$ band and just 10s in all the other filters. On photometric nights, observations were also made of photometric standards recently established by \citet{Narayan16}. For RR Lyrae stars, it is best when the targets can be observed several times throughout the night, because periods are less than a day. The observations of M5 were made, however, on assigned nights when fields near the Galactic center were the primary targets. As a result of the large difference in right ascension between M5 and the Galactic bulge fields, M5 could only be observed for part of the night. In addition, many of the observations reported in Table~\ref{tab-observations} were taken continuously with separations of only minutes. As periods of RR Lyrae stars range from 0.2 to 0.9 days, that small separation in time does not enable proper sampling of the light curves. This non-optimal cadence has some adverse effects for sampling the light curves, which we discuss later in the paper. Nevertheless, the observations allow for light curves that trace the pulsation of the star well (see Figure~\ref{fig-lightcurve}). \begin{figure}[htb!] \plotone{f1.eps} \caption{Density map of the 60,335 objects detected in the field of view of DECam centered on M5 in the $gri$ filters. For reference, the black circle marks $10 \, r_h$ of the cluster, with $r_h=1\farcm 77$ \citep{harris96}. Colored diamonds show the location of the periodic variable stars identified in this work. All the red diamonds matched with known stars in the catalog of variable stars of M5 \citep{clement01}. The blue diamonds did not have an entry in that catalog. Because of their distance from the center of the cluster and their faint magnitudes, they should be distant halo stars. The diamonds encircled in blue are two new discoveries.} \label{fig-M5sky} \end{figure} \begin{deluxetable}{lccccc} \tablecolumns{6} \tablewidth{0pc} \tablecaption{Number of DECam observations of M5 \label{tab-observations}} \tablehead{ Date & $N_u$ & $N_g$ & $N_r$ & $N_i$ & $N_z$ \\ } \startdata 2013 Jun 7 & 2 & 2 & 3 & 2 & 2 \\ 2013 Jun 8 & 8 & 8 & 13 & 8 & 8 \\ 2013 Jun 9 & 11 & 12 & 17 & 13 & 14 \\ 2013 Jun 21 & 1 & 3 & 6 & 3 & 4 \\ 2014 Mar 7 & 8 & 8 & 8 & 8 & 8 \\ 2014 Mar 8 & 6 & 6 & 6 & 6 & 6 \\ 2014 Mar 9 & 12 & 12 & 12 & 12 & 12 \\ \hline TOTAL & 50 & 53 & 68 & 54 & 56 \\ \enddata \end{deluxetable} The data were processed through the Community Pipeline \citep{Valdes14} for bias subtraction, flat-fielding, bad pixel mask generation, and WCS refinement. Reduced images are publicly available through the NOAO Science Archive\footnote{\url{https://archive.noao.edu}}. Point-Spread function (PSF) fitting photometry was performed on the reduced images using a variant of DoPHOT \citep{Schechter93}. DoPHOT was embedded inside an integrated IDL driven procedure described in \S3.2 of \citet{Saha10} for the MOSAIC imager, so that the final product is a list of objects with aperture corrected instrumental magnitudes. The only differences in the procedure for DECam are that: \begin{enumerate} \item Instead of laying the CCD by CCD sections onto a common gnomonic projection, creating one single image for the whole field, the photometry was performed separately on each CCD of the DECam images, keeping memory utilization manageable, and \item Aperture corrections were calculated independently for each CCD. Unlike for MOSAIC, as a result of the excellent optico-mechanical layout of DECam, and the use of the hexapod for focus and alignment, no variation in aperture corrections as a function of position in the field can be seen within the area covered by an individual CCD. As the aperture corrections are calculated independently for each CCD, any PSF variations over large changes in field position are effectively accommodated on a CCD-to-CCD granularity. \end{enumerate} The instrumental magnitudes were calibrated to the system defined by \citet{Narayan16} using observations of two of the standard stars from that paper that were observed on photometric nights contemporaneously with the observations presented here. As described in that paper, these magnitudes are defined using spectrophotometric fluxes for the standards, convolved through DECam passbands and typical atmospheric extinction at CTIO, and are therefore native to the DECam instrument, analogous, but {\emph not} identical to the SDSS system. Absolute photometry was checked by comparing with the SDSS photometry of M5 provided by \citet{an08}. For this comparison we transformed our catalog to the SDSS system using equations derived by the Dark Energy Survey Collaboration (D. Tucker, private communication). The offsets between the two sets are 0.05, 0.02, 0.003, 0.03 and 0.02 mag in $ugriz$, respectively. A total of $16.2 \times 10^6$ individual measurements were processed and stored in a MySQL database. The photometry was cleaned by eliminating measurements if: (1) they were within 50 pixels from the borders of the CCDs, (2) there were two or more cosmic rays detected near the object within a radius of the FWHM of the major axis of the fitted PSF, (3) other objects were found within a radius of the FWHM of the major axis of the fitted PSF the object and their contribution relative to the object's flux is $>0.3$ magnitudes, (4) the fitted sky value for an object is $<$ SKYLOW or $> 3\times$SKYHI, where SKYLOW and SKYHI are the 2nd and 90th percentile, respectively, of the distribution of fitted sky values of all objects in the CCD in which the object is found, (5) the DoPHOT reported photometric error is higher than twice the average reported error of all stars for that image that share the same half magnitude bin, and (6) the photometric error of a measurement is significantly higher that the average of the errors of all measurements for the same star. Specifically, we eliminated measurements if the error was $>\langle \rm error \rangle + 3.5\, \sigma_{\rm error}$, where $\langle \rm error \rangle$ is the average of the photometric error of all measurements for that star and $\sigma_{\rm error}$ is the standard deviation of the error distribution. Cosmic rays are identified, and affect pixels masked, by the DoPHOT program as part of the photometry measuring process. The elimination of stars with more than 2 cosmic rays in its immediate neighborhood from further analysis affects less than 2.4\% of the detected stars. We also required that there were at least 5 good measurements per object in each filter. The final number of objects in our catalogs ranged from 43,792 in the $u$ band to 176,704 objects in the $r$ band. \section{RR Lyrae stars in M5}\label{sec-RRLS} \begin{figure} \includegraphics[width=0.5\textwidth]{f2_1.eps} \caption{Phased light curve in 5 bands for star 59529. The red star shows the magnitude at minimum light ($m_{\rm ref}$) which, for {RR{\sl ab} } stars like the one above, was measured at phase $\phi = 0.65$. The blue line is the template, from the library of \citet{sesar10}, that best fitted the data in each band. The complete figure set for all the periodic variable stars (67 figures) is available in the online journal.} \label{fig-lightcurve} \end{figure} RR Lyrae stars were identified in the data by using the procedure described in detail in Saha 2017 (in preparation). Here, we summarize the most important details. Variable stars were flagged using a bootstrap $\chi^2$ using DoPHOT reported photometric errors. A visual tool that blinks between the brightest and faintest image for each star enabled confirmation or rejections of the variability flag assignment. More than 90\% of the flagged cases were visually confirmed. Then, periodic stars were searched using the Psearch algorithm \edit1{\citep{saha17}} that combines Fourier transforms and the classical Lafler \& Kinman method \citep[a string-length method,][]{Lafler65} in the 5 photometric bands simultaneously, which results in a powerful tool for sparse data. The resulting periodogram for each star was visually inspected interactively, allowing exploration of the different peaks in the diagram. Periodic variable stars were then selected based on the shape of their light curve, period, and amplitude. A total of 66 RR Lyrae stars and 1 SX Phe were recognized in the field of M5. The individual measurements for the periodic variable stars are provided in Table~\ref{tab-lcdata} as an electronic table. The table contains ID, MJD, filter, magnitude, and its error. Lightcurves for all the stars are provided as online only material. Figure~\ref{fig-lightcurve} shows an example for one of the stars. \begin{deluxetable}{lcccc} \tablecolumns{5} \tablewidth{0pc} \tablecaption{Individual measurements in $ugriz$ of the periodic variables in the field of M5 \label{tab-lcdata}} \tablehead{ ID & MJD & Filter & Mag & Error \\ } \startdata 16339 & 56451.722332 & u & 18.552 & 0.027 \\ 16339 & 56451.723139 & u & 18.590 & 0.024 \\ 16339 & 56452.499995 & u & 18.703 & 0.028 \\ 16339 & 56452.500658 & u & 18.661 & 0.030 \\ 16339 & 56452.613786 & u & 18.287 & 0.022 \\ \enddata \tablecomments{Table~\ref{tab-lcdata} is published in its entirety in the electronic edition of The Astronomical Journal. A portion is shown here for guidance regarding its form and content.} \end{deluxetable} The non-optimal cadence of our observations prevented determination of the correct period for some of the RR Lyrae stars. We took advantage of the fact that the variable stars in M5 have been extensively studied before and adopted in several cases the published periods in the catalog of \citet{clement01}, which in the case of M5 had an update\footnote{\url{http://www.astro.utoronto.ca/~cclement/read.html}} in June 2015. A recent revision of variable stars in M5 is also provided by \citet{arellano16}. Each light curve was fitted with a template from the library of \cite{sesar10} that was created from SDSS $ugriz$ observations of RR Lyrae stars in Stripe 82. To find the optimal fit, we allowed small variations on the period and on the observed amplitude, maximum magnitude, and initial phase, in the range of $\pm 0.001$ d, $\pm 0.2$ mag, $\pm 0.2$ mag, and 0.2 units of phase, respectively. These fitted templates turned out to be very useful to determine the magnitude at minimum phase, as explained in \S~\ref{sec-color}. \floattable \begin{deluxetable}{lccccccccccccccl} \tabletypesize{\small} \rotate \tablecolumns{16} \tablewidth{0pc} \tablecaption{Periodic variable stars identified in the M5 field \label{tab-RRLS}} \tablehead{ ID & RA & DEC & Period & Type & $\langle u \rangle$ & $\langle g \rangle$ & $\langle r \rangle$ & $\langle i \rangle$ & $\langle z \rangle$ & $u_{\rm ref}$ & $g_{\rm ref}$ & $r_{\rm ref}$ & $i_{\rm ref}$ & $z_{\rm ref}$ & Other Identification \\ & (J2000.0) & (J2000.0) & (d) & & & & & & & & & & & & \\ } \startdata 113495 & 15:15:34.11 & +01:49:30.5 & 0.63013 & ab & 18.43 & 17.82 & 17.57 & 17.51 & 17.46 & 18.66 & 18.04 & 17.69 & 17.61 & 17.56 & NEW \\ 114707 & 15:16:49.73 & +02:48:42.9 & 0.65687 & ab & 18.72 & 18.09 & 17.84 & 17.78 & 17.74 & 19.03 & 18.33 & 18.01 & 17.90 & 17.86 & CRTS\_J151649.7+024841 \\ 72475 & 15:17:24.23 & +02:04:24.1 & 0.34908 & c & 15.19 & 14.74 & 14.65 & 14.69 & 14.67 & 15.58 & 15.11 & 14.88 & 14.89 & 14.83 & V67 \\ 139277 & 15:18:06.77 & +01:18:10.5 & 0.53037 & ab & 19.93 & 19.35 & 19.21 & 19.21 & 19.16 & 20.51 & 19.73 & 19.45 & 19.39 & 19.35 & NEW \\ 74636 & 15:18:08.04 & +02:03:45.8 & 0.45141 & ab & 15.73 & 15.12 & 15.05 & 15.11 & 15.09 & 16.11 & 15.54 & 15.33 & 15.32 & 15.27 & V29 \\ \enddata \tablecomments{Table~\ref{tab-RRLS} is published in its entirety in the electronic edition of The Astronomical Journal. A portion is shown here for guidance regarding its form and content.} \end{deluxetable} Out of the 129 RR Lyrae stars registered in M5 in the catalog of \citet{clement01}, we recovered 62 (red diamonds in Figure~\ref{fig-M5sky}). The remaining 68 stars that we did not recover were located mostly toward the center of M5, which lies in a gap among the CCDs in our DECam images. There are 5 stars in our catalog that were not present in the M5 catalog of variable stars of \citet{clement01} that are shown as blue diamonds in Figure~\ref{fig-M5sky}. None of them is expected to be a member of the cluster because they are outside a radius of $10 \, r_h$ and they have mean $g$ magnitudes between 17.8 and 19.3, which locate them much farther away than M5. Thus, most likely they are distant halo stars lying along the line of sight. Three of those halo stars appear in the Catalina Real-Time Transient Survey \citep[CRTS][]{drake13a,drake13b,drake14} and were classified as RR Lyrae stars, but the other two, namely 113495 and 139277, have not been cataloged before and should be considered new discoveries. In Table~\ref{tab-RRLS} we present the list of periodic variable stars. It contains ID, Right Ascension (RA), Declination (DEC), period in days, type of pulsating star, mean magnitudes in $ugriz$, and magnitudes at minimum light ($m_{\rm ref}$) in $ugriz$ that were measured as explained in section \S\ref{sec-color}. The last column provides the cross-identification with the V* identification in \citet{clement01} or the ID in the CRTS. The two new stars are denoted as ``NEW.'' The reported mean magnitudes in Table~\ref{tab-RRLS} are not plain averages but were obtained by integrating the best fitted template of the light curve in intensity units, and transforming back to magnitudes. This method of calculating the mean magnitudes avoids the biases toward minimum magnitudes (because the RR Lyrae stars spend most of their pulsation cycle time at minimum light) as well as those biases that may appear as a result of unevenly sampled lightcurves. We estimated the photometric errors in each band by determining the standard deviation of all of the individual magnitudes for each star in each CCD. As most of the stars in the field are non-variable, the standard deviation provides a good estimate of the real photometric errors. In the CCDs containing the bulk of the M5 stars, which are representative of the crowded environment of our observations, these errors average 0.013, 0.011, 0.011, 0.012 and 0.012 magnitudes at the level of the horizontal branch (HB) in the $u$, $g$, $r$, $i$ and $z$ bands, respectively. \section{Color-Magnitude Diagrams} \label{sec-CMD} Color-magnitude diagrams (CMD) of stars within $10\,r_h$ \citep[$r_h=1\farcm 77$,][]{harris96} are shown in Figure~\ref{fig-M5CMD} using different filter combinations. These CMDs were built with the average magnitudes for each star in the catalog. The large area covered by DECam results in very sharp features of the cluster because of the high number of stars included in these diagrams. Notice however that, due to the gap between CCDs and our constraint in photometry near the border of the CCDs, there is a strip of $1\farcm 38$ centered on the cluster that is not covered in our catalogs (see Figure~\ref{fig-M5sky}). The catalog associated with these diagrams can be obtained from Table~\ref{tab-M5catalog}. The $\sigma_\lambda$ in this table refers to the standard deviation of the mean of all the measurements for a star in each filter. \floattable \begin{deluxetable}{lcccccccccccc} \tabletypesize{\small} \tablecolumns{13} \tablewidth{0pc} \tablecaption{Photometry within a radius of $17\farcm 7$ from the center of M5 \label{tab-M5catalog}} \tablehead{ ID & RA (deg) & DEC (deg) & u & $\sigma_u$ & g & $\sigma_g$ & r & $\sigma_r$ & i & $\sigma_i$ & z & $\sigma_z$ \\ } \startdata 18709 & 229.46147 & 2.29986 & 16.438 & 0.006 & 15.264 & 0.005 & 14.692 & 0.005 & 14.532 & 0.006 & 14.452 & 0.003 \\ 18711 & 229.48143 & 2.28796 & 16.792 & 0.005 & 15.478 & 0.006 & 14.781 & 0.005 & 14.552 & 0.007 & 14.425 & 0.003 \\ 18712 & 229.48684 & 2.30266 & 16.082 & 0.005 & 14.999 & 0.004 & 14.531 & 0.005 & 14.431 & 0.008 & 14.395 & 0.004 \\ 18713 & 229.49202 & 2.28002 & 15.141 & 0.007 & 13.882 & 0.004 & 13.334 & 0.007 & 13.204 & 0.012 & 13.139 & 0.003 \\ 18714 & 229.60225 & 2.33137 & 16.374 & 0.011 & 15.347 & 0.015 & 14.874 & 0.011 & 14.768 & 0.006 & 14.732 & 0.010 \\ \enddata \tablecomments{Table~\ref{tab-M5catalog} is published in its entirety in the electronic edition of The Astronomical Journal. A portion is shown here for guidance regarding its form and content.} \end{deluxetable} The HB is quite horizontal in the $g$ band (Figure~\ref{fig-M5CMD}, left panel), while it has a significant slope in redder bands like the $z$ band shown in the right panel. As expected, all RR Lyrae stars within the radius of $10\,r_h$ lie on top of the HB of the cluster. The obvious outlier below the HB (at $g\sim 16.2$) is a SX Phe star with a period of only 0.0898d. Neither the SX Phe star nor the RR Lyrae stars outside that radius (Figure~\ref{fig-M5sky}) will be used in the following analysis. \begin{figure*}[ht] \centering \includegraphics[width=0.49\textwidth]{f3a.eps} \includegraphics[width=0.49\textwidth]{f3b.eps} \caption{Color-Magnitude diagrams ($g$ vs $(g-i)$, left; $z$ vs $(r-z)$, right) of stars inside a radius of $17\farcm 7$ ($10 \times r_h$) from the center of M5 (54,701 stars). Periodic variable stars are indicated with colored symbols.} \label{fig-M5CMD} \end{figure*} \section{Minimum Light Colors of RR Lyrae Stars in M5}\label{sec-color} In order to obtain the color at minimum light, we chose to measure the magnitude of the template fitted to each RR Lyrae star at phase $\phi=0.65$, as shown in Figure~\ref{fig-lightcurve}. Because not all of the light curves in our data are well sampled, the use of the template is particularly useful for cases where the lightcurve is lacking observations near minimum light and near maximum light, which is needed to define the initial phase ($\phi=0$). Each star was measured in all available bands and the magnitudes at this phase are recorded in Table~\ref{tab-RRLS} as $m_{\rm ref}$. In the original work by \cite{Sturch66}, the minimum color is defined as the mean color between phases 0.5 and 0.80. We experimented with this definition as well but found no significant difference with our values and decided to keep the single-phase definition. A similar conclusion was also reached by \citet{kunder10}. We computed mean observed colors at minimum light of the 47 M5 {RR{\sl ab} } in the DECam passband system and recorded the results in Table~\ref{tab-colors}. For comparison we also provide in Table ~\ref{tab-colors} the mean colors (the colors calculated with the mean magnitude in each band) and their standard deviations. The dispersion observed in the colors at minimum light are always lower than the ones from the mean colors, confirming that the former is the one suitable to be used as a color standard. As expected from the early works of \citet{Sturch66} in the $UBV$ bands and later works by \citet{mateo95,guldenschuh05} and \citet{kunder10} in $VRI$, the colors at minimum light of the fundamental mode RR Lyrae stars have only a very small dispersion. The dispersion is particularly low in the infrared colors as they are freer of line blanketing. In particular, the $(r-i)_{\rm min}$ and $(i-z)_{\rm min}$ colors have dispersions of $\lesssim 0.02$ magnitudes, which are about the same size as the observed photometric errors in the colors at the level of the HB of M5. Assuming a reddening of $E(B-V) = 0.035 \pm 0.005$ for M5 \citep{carretta00}, a standard reddening law of $R_V=3.1$ and the following extinction to reddening ($A_\lambda/E(B-V)$) values\footnote{These coefficients slightly differ from those in \citet{schlafly11} since they are calculated using updated values for the effective DECam throughput (E. Schlafly, private communication)} for $ugriz$: 3.995, 3.214, 2.165, 1.592, 1.211 \citep{schlafly11}, we transformed those mean observed colors at minimum light to dereddened values (see Table~\ref{tab-colors}). The errors quoted in the dereddened colors at minimum light include both the observational errors at the level of the HB in each band and the error in the assumed extinction toward the cluster. \floattable \begin{deluxetable}{cccccc} \tablecolumns{6} \tablewidth{0pc} \tablecaption{Mean and Minimum-Light colors of Fundamental-Mode RR Lyrae Stars in M5 \label{tab-colors}} \tablehead{ Color & $(\langle X \rangle - \langle Y \rangle)$\tablenotemark{1} & Std Dev\tablenotemark{2} & $(X-Y)_{\rm min}$\tablenotemark{3} & Std Dev\tablenotemark{4} & $(X_0 - Y_0)_{\rm min}$\tablenotemark{5} \\ } \startdata $u-g$ & 0.575 & 0.059 & 0.644 & 0.034 & $0.616 \pm 0.031$ \\ $g-r$ & 0.157 & 0.055 & 0.288 & 0.035 & $0.251 \pm 0.025$ \\ $g-i$ & 0.147 & 0.076 & 0.331 & 0.041 & $0.274 \pm 0.024$ \\ $r-i$ & -0.010 & 0.023 & 0.043 & 0.017 & $0.022 \pm 0.021$ \\ $r-z$ & 0.016 & 0.029 & 0.082 & 0.023 & $0.049 \pm 0.020$ \\ $i-z$ & 0.026 & 0.011 & 0.039 & 0.016 & $0.026 \pm 0.020$ \\ \enddata \tablenotetext{1}{Average of the observed mean colors} \tablenotetext{2}{Standard deviation of the distribution of the observed mean colors} \tablenotetext{3}{Average of the observed colors at minimum light} \tablenotetext{4}{Standard deviation of the distribution of observed colors at minimum light} \tablenotetext{5}{Average of the reddening-corrected colors at minimum light and its error} \end{deluxetable} \subsection{Dependence of colors at minimum light with periods} A dependence on period may be the responsible for part of the dispersion observed in some of the colors at minimum light discussed above. We checked for such dependence and present the results in Figure~\ref{fig-periods}, including this time the {RR{\sl c} } as well. Similar behavior as the one observed in Figure~\ref{fig-periods} is seen in the analysis of SDSS colors by \citet{ngeow17}. Although for the colors from redder filters the dependence on periods seems to be small, for $(u-g)_{\rm min}, (g-r)_{\rm min}$, and $(g-i)_{\rm min}$, it is large enough that appropriate corrections are needed to obtain the true color at minimum light for an RR Lyrae star of a given period. We fit parabolic functions to the {RR{\sl ab} } data in each color $(X-Y)_{\rm min}$ as a function of the logarithm of the period (P) of the form: \begin{equation} (X-Y)_{\rm min} = a + b\, (\log P)^2 \end{equation} The coefficients of such fits and their rms are shown in Table~\ref{tab-coefficients_ab}, and plotted as solid red lines in Figure~\ref{fig-periods}. The standard deviation values and the rms of the fits in Tables~\ref{tab-colors} and \ref{tab-coefficients_ab} suggests that better results can be obtained when using colors from redder DECam filters to estimate interstellar extinction toward RR Lyrae stars as the rms of the fitted functions are the smallest in these bands. When taking into account the period, the use of period-corrected minimum colors may lead to errors in the true color of $\lesssim 0.016$ mags in $(r-i)_{\rm min}$, $(r-z)_{\rm min}$, and $(i-z)_{\rm min}$. The coefficients in Table~\ref{tab-coefficients_ab} can then be used to obtain the intrinsic colors of {RR{\sl ab} } of a given period and, thus, to determine accurate line of sight reddening toward those stars. Two {RR{\sl ab} } were left out from these fits because they showed discrepant behaviors (see Fig~\ref{fig-periods}): 74799 and 74542. Our data for the former is consistent with a sinusoidal light curve and small amplitude. The colors for this star are too red to be a RR{\sl c}. \citet{arellano16} flagged this star (V85 in their nomenclature) as a Blazhko star, but their lightcurve looks clearly like an RR{\sl ab}. Thus, it may be a case of extreme Blazhko effect or mode changing. On the other hand, star 74542 has very few points in the $g$ and $r$ lightcurves ($<10$) and that may have produced discrepant colors. In the past, \citet{kanbur05} and \citet{kunder08} reached the conclusion that no strong dependence on period existed for RR Lyrae stars measured in the ($V-R$) color. This is still almost true (very small dependence) in colors combining the $riz$ DECam filters, but the dependence is important in colors that include the $u$ or $g$ filters. We note that our photometry is more precise than the MACHO photometry used in \citet{kanbur05}, and our sample size is larger (more than twice as large) as that in \citet{kunder08}, which likely contributes to the reason we are able to see this small trend. \begin{figure*}[htb!] \plotone{f4.eps} \caption{Dependence of the colors at minimum light of the RR Lyrae stars in M5 with the logarithm of the fundamentalized period $P_f$. Red symbols correspond to {RR{\sl ab} } while blue symbols are the RR{\sl c} . The red solid line is a fit of the {RR{\sl ab} } data, while the blue dashed line is a linear fit to the {RR{\sl c} } stars.} \label{fig-periods} \end{figure*} \begin{deluxetable}{ccccc} \tablecolumns{5} \tablewidth{0pc} \tablecaption{Coefficients and rms of the parabolic fits to the Log (P) - Color at Minimum Light relationship for RR{\sl ab} \label{tab-coefficients_ab}} \tablehead{ Color & a & b & rms & E(X-Y)\tablenotemark{1} \\ } \startdata $u-g$ & 0.692 & -0.669 & 0.029 & 0.027 \\ $g-r$ & 0.343 & -0.753 & 0.022 & 0.037 \\ $g-i$ & 0.404 & -0.973 & 0.026 & 0.057 \\ $r-i$ & 0.060 & -0.220 & 0.012 & 0.020 \\ $i-z$ & 0.047 & -0.102 & 0.016 & 0.033 \\ $r-z$ & 0.108 & -0.322 & 0.016 & 0.013 \\ \enddata \tablenotetext{1}{Excess color corresponding to $E(B-V)=0.035$ \citep{carretta00} using the extinction to reddening coefficients given in \S\ref{sec-color}} \end{deluxetable} We also explored the behavior of the color at minimum light of {RR{\sl c} } in M5, measured at the phase corresponding to the lowest point of their light curves. For these stars we used the fundamentalized period, $P_f$, as defined in \citet{catelan09}: \begin{equation} \log P_f = \log P + 0.128 \label{eq-pf} \end{equation} The {RR{\sl c} } are plotted with blue symbols in Figure~\ref{fig-periods}. Given the observed behavior of these stars in the plots and because there are only 14 {RR{\sl c} } in our data, we decided to fit only linear relationships. In the figure it can be seen that there are some discrepant points in most of the panels that were left out from the fit. They corresponded to stars 74561, 72475, and 74395. {RR{\sl c} } stars are hard to separate unambiguously from contact binaries and contamination by those stars may be causing some of the observed discrepancies. The results of the linear fits are shown as blue dashed lines in Figure~\ref{fig-periods} and the slope, intercept, and rms are reported in Table~\ref{tab-coefficients_c}. From Figure~\ref{fig-periods} it is clear that {RR{\sl c} } do not follow well the trend observed for the RR{\sl ab}. A small offset in the colors is observed between the two types of RR Lyrae stars and, thus, it is more convenient to use separate relationships for each type. As in the case of RR{\sl ab}, the smallest dispersions in the Color-$\log P_f$ relationships for {RR{\sl c} } were also obtained when using colors constructed with the redder filters $r$, $i$, and $z$. Notice that the coefficients given in Table~\ref{tab-coefficients_ab} and ~\ref{tab-coefficients_c} provide the colors at minimum light of the RR Lyrae stars in M5. If they are to be used for stars in any other part of the sky, they should be corrected for reddening first. For convenience, we provide, in the last column of Table~\ref{tab-coefficients_ab}, the excess colors for the different DECam colors assuming an $E(B-V) =0.035$ for M5 \citep{carretta00} and the reddening law and coefficients given above. \begin{deluxetable}{cccccc} \tablecolumns{4} \tablewidth{0pc} \tablecaption{Coefficients and rms of the Linear Fits to the $\log (P_f)$ - Color at Minimum Light relationship for RR{\sl c} \label{tab-coefficients_c}} \tablehead{ Color & Intercept & Slope & rms \\ } \startdata $u-g$ & 0.730 & 0.453 & 0.026 \\ $g-r$ & 0.589 & 1.165 & 0.023 \\ $g-i$ & 0.654 & 1.381 & 0.023 \\ $r-i$ & 0.069 & 0.226 & 0.017 \\ $i-z$ & 0.126 & 0.306 & 0.014 \\ $r-z$ & 0.131 & 0.376 & 0.015 \\ \enddata \end{deluxetable} \subsection{Dependence on Metallicity} We need also to understand the dependence of the color at minimum light on metallicity. \citet{Sturch66} reported a non-negligible dependence of $B-V$ with metallicity, with $U-B$ showing a much larger dependence. He was thus able to mitigate the effect on $B-V$ by referring to $U-B$. This suggests that the metallicity dependence arises either wholly, or in most part, due to line blanketing. If so, by using redder colors, where the line blanketing is much smaller, we expect to further mitigate the effect. To get a quantitative estimate, compare Table~8 in \citet{jones87a} with Table~4 in \citet{jones87b}. In the former, synthetic colors are calculated for various temperatures and gravities for [Fe/H]$= -2.2$ and in the latter, the same for [Fe/H]$= -0.75$. We see that while the predicted $B-V$ colors at the same temperature and gravity differ by as much as 0.06 mag for temperatures in the range 5500K and 6500K, while corresponding $V-K$ colors differ by only 0.02 mag. Further, Figure~2 in \cite{blanco92b} (where he re-examines the systematics and accuracy of Sturch's original relations) indicates that the metallicity corrections for $B-V$ are independent of the temperature, in the range 5500K to 6500K. With this preface, to explore the metallicity dependence of colors from DECam at minimum light, we used the flux from a Kurucz model\footnote{as presented in ftp://ftp.stsci.edu/cdbs/grid/k93models} with $T_{\rm eff} = 6250$ K, $\log g = 2.0$, and three different metallicities: [Fe/H]$=-1.0, -2.0, +0.5$. We convolved these spectra with the DECam filter throughput curves\footnote{\url{http://www.ctio.noao.edu/noao/content/Dark-Energy-Camera-DECam}} and calculated the color of the synthetic RR Lyrae star at each metallicity (Figure~\ref{fig-metallicity}). The chosen temperature and gravity are representative of a fundamental RR Lyrae star near minimum light (in unpublished work, A. Saha has ascertained that this choice is consistent with both the SED \emph{including the Balmer jump}, as well as the Balmer line profiles for 6 bright RR Lyrae stars spanning 2 dex in metallicity: U~Lep, RX~Eri, ST~Oph, U~Pic, SV~Eri and HH~Pup while in their low-light phases). In any case, as Figure~2 in \citet{blanco92} indicates, the exact choice of temperature should not significantly alter the derived dependencies. The results of these calculations indicate that the colors $(r-i)$, $(r-z)$, and $(i-z)$ may have maximum variations of 0.027, 0.042 and 0.015 mags, respectively, in the full metallicity range explored. These differences are even smaller in the range of metallicity from $-2 < {\rm [Fe/H]} < -1$, where the differences in color amount to only 0.006, 0.010 and 0.004 in $(r-i)$, $(r-z)$, and $(i-z)$, respectively. The variations of the $(u-g)$ color with metallicity are large enough to make it not suitable for use as a standard color measurement if the metallicity of the RR Lyrae star is not known. These large variations have been observed before, in the $UBV$ system by \citet{Sturch66} and others. This is expected, because metallicity expresses itself through line-blanketing and opacity effects in the blue ($u$ and $g$) and ultra-violet, but much less so as one goes progressively to the red. Colors involving the $g$ filter ($g-r$ and $g-i$) have variations of colors in the range of metallicity studied as large as 0.1 magnitudes. \begin{figure}[htb!] \plotone{f5.eps} \caption{Dependence of different DECam colors for a synthetic star ($T_{\rm eff} = 6250$ K, $\log g = 2.0$) with metallicity.} \label{fig-metallicity} \end{figure} \section{Absolute Magnitudes of M5 RR Lyrae Stars in DECam filters}\label{sec-M} Calibration of the absolute magnitudes of RR Lyrae stars in the DECam filters does not exist to date. For SDSS passbands, Period-Luminosity (P-L) relationships have been provided by \citet{caceres08} that are based on theoretical models. Here we determine the empirical values of the absolute magnitudes of the RR Lyrae stars in M5 in the DECam natural filter system in which our data have been calibrated. In Figure~\ref{fig-absmag} we show the observed mean magnitude of the RR Lyrae stars as a function of the logarithm of their pulsation period. As before, the period for the {RR{\sl c} } stars has been "fundamentalized" using Equation~\ref{eq-pf}. For all the filters, the {RR{\sl c} } stars seem to be slightly brighter and thus we fit P-L relationships separately for each type. The best linear fits are given in Table~\ref{tab-PL}. The dependence of absolute magnitude with period in $r, i,$ and $z$ is strong but very well constrained, as implied by the low rms values of the linear fits. In the $u$ and $g$ bands the correlation between mean magnitude and period is less obvious and the resulting fit has larger residuals. In any case, the slopes of the relationships in these filters seem to be small, which is a consequence of the HB being mostly horizontal in these bands (see for example the CMD in Figure~\ref{fig-M5CMD}). The {RR{\sl ab} } stars have tighter relationships than the {RR{\sl c} } stars. \begin{deluxetable}{ccccccc} \tablecolumns{7} \tablewidth{0pc} \tablecaption{Coefficients and rms of the Linear Fits to the mean magnitude - $\log (P_f)$ relationship for RR Lyrae stars in M5 \label{tab-PL}} \tablehead{ Band & \multicolumn{3}{c}{RR{\sl ab}} & \multicolumn{3}{c}{RR{\sl c}} \\ & Intercept & Slope & rms & Intercept & Slope & rms \\ } \startdata u & 15.68 & -0.10 & 0.07 & 15.46 & -0.39 & 0.13\\ g & 14.98 & -0.57 & 0.04 & 14.82 & -0.72 & 0.12 \\ r & 14.64 & -1.28 & 0.03 & 14.53 & -1.35 & 0.08 \\ i & 14.57 & -1.59 & 0.02 & 14.49 & -1.61 & 0.06 \\ z & 14.52 & -1.68 & 0.02 & 14.44 & -1.73 & 0.05 \\ \enddata \end{deluxetable} \begin{figure*}[htb!] \plotone{f6.eps} \caption{Dependence of the mean magnitude in each DECam band as a function of period for the {RR{\sl ab} } (red symbols) and {RR{\sl c} } (blue symbols) in M5. The solid red line is a least square fit for the {RR{\sl ab} } stars while the dashed blue line is the best fit for the {RR{\sl c} } stars.} \label{fig-absmag} \end{figure*} \citet{layden05} determined the true distance modulus of M5 using main-sequence fitting and obtained $(m - M)_0 = 14.45 \pm 0.11$ mag, a value that is consistent with $14.44 \pm 0.02$ given by \citet{coppola10} based on IR observations of RR Lyrae stars. Assuming the latter and an excess color $E(B-V) =0.035\pm0.005$ \citep{carretta00}, we scaled the intercept parameters in Table~\ref{tab-PL} to obtain the following absolute P-L relationships. The error in the distance modulus and interstellar extinction have been added in quadrature to the intercept term. \begin{eqnarray} M_u \; (ab) &= (-0.10 \pm 0.24) \, \log P + (1.10 \pm 0.13) \nonumber \\ M_u \; (c) &= (-0.38 \pm 0.36) \, \log P_f + (0.88 \pm 0.18) \nonumber \\ M_g \; (ab) &= (-0.57 \pm 0.17) \, \log P + (0.43 \pm 0.12) \nonumber \\ M_g \; (c) &= (-0.72 \pm 0.32) \, \log P_f + (0.27 \pm 0.16) \nonumber \\ M_r \; (ab) &= (-1.28 \pm 0.11) \, \log P + (0.12 \pm 0.11) \\ M_r \; (c) &= (-1.35 \pm 0.21) \, \log P_f + (0.01 \pm 0.13) \nonumber \\ M_i \; (ab) &= (-1.59 \pm 0.09) \, \log P + (0.07 \pm 0.11) \nonumber \\ M_i \; (c) &= (-1.61 \pm 0.16) \, \log P_f + (0.00 \pm 0.12) \nonumber \\ M_z \; (ab) &= (-1.68 \pm 0.08) \, \log P + (0.03 \pm 0.11) \nonumber \\ M_z \; (c) &= (-1.73 \pm 0.14) \, \log P_f - (0.04 \pm 0.12) \nonumber \end{eqnarray} Notice that although it is expected that absolute magnitudes also have a dependence on the metallicity, we are dealing here with RR Lyrae stars within a single globular cluster with a very small metallicity dispersion. The metallicity of M5 is [Fe/H]$=-1.25\pm0.05$ \citep{dias16}. For comparison, we calculated the predicted values of the absolute magnitude in $i$ and $z$ for a RR Lyrae star with $P=0.5$d, using the relationships given for the SDSS system by \citet{caceres08} that are based on synthetic spectra of RR Lyrae stars. To do this, we assumed [Fe/H]$=-1.25$ and [$\alpha$/Fe]$=0.24$ \citep{dias16}. Once the resulting values are transformed to the DECam system, the discrepancy between empirical absolute magnitudes and the ones derived from the equations in \citet{caceres08} are only 0.02 and 0.03 mag in $i$ and $z$ respectively. We notice that \citet{caceres08} were unable to produce relationships for $M_u$, $M_g$, and $M_r$ because they were not tight enough. \section{Conclusions}\label{sec-conclu} In this paper we provide colors at minimum light and absolute magnitudes of RR Lyrae stars (both {RR{\sl ab} } and {RR{\sl c} }) in the $ugriz$ DECam system based on observations of the Galactic globular cluster M5. The colors at minimum light of RR Lyrae stars constitute an important tool to determine the reddening along the line of sight up to the distance of the star. This is our main motivation for the present study because these calibrations will be applied to a large scale survey of RR Lyrae stars in the Bulge in forthcoming papers. We studied the behavior of different DECam colors at minimum light with period and conclude that the reddest colors, $(r-i)_{\rm min}$, $(r-z)_{\rm min}$, and $(i-z)_{\rm min}$, are the best options to be used as color standards. The dependence of color at minimum light with period is well behaved and we were able to fit functions to both {RR{\sl ab} } and {RR{\sl c} } stars with resulting rms values $<0.02$ magnitudes. A caveat of this work however is the use of a single cluster with a fixed metallicity ([Fe/H]$=-1.25$). We tested to some extent the possible dependence on metallicity by analyzing synthetic spectra in the range $-2.0 <$ [Fe/H] $<+0.5$ and conclude that the color variations are at most 0.02, 0.03, and 0.01 magnitudes in that range of metallicity for $(r-i)_{\rm min}$, $(r-z)_{\rm min}$, and $(i-z)_{\rm min}$, respectively. Also, from previous works based on $VRI$ magnitudes \citep{guldenschuh05,kunder10} we do not expect a strong dependence of colors at minimum light with metallicity. It will be desirable, however, to study other globular clusters with a range of metal content in order to confirm this statement. On the other hand, our main motivation for this work is to apply these calibrations to RR Lyrae stars in the Galactic Bulge, which is in a metallicity regime not very different to that of M5 \citep[for example,][]{walker90}. We also provide an empirical calibration of the absolute magnitude of the M5 RR Lyrae stars in the DECam system. Again, the reddest filters, $riz$ are the best options for obtaining a good absolute magnitude (and hence, distance) since they produce tight P-L relationships for the {RR{\sl ab} } stars, with dispersion amounting to 0.03, 0.02, and 0.02 magnitudes in $r$, $i$, and $z$, respectively. The dispersions obtained for the {RR{\sl c} } in those bands are also small, $<0.1$ magnitudes. With its large FOV, DECam is an excellent instrument to study RR Lyrae stars over large extensions in the sky. We anticipate the calibrations provided in this paper will be useful for different projects that use this type of variables as standards for distance and color. \begin{acknowledgments} Based on observations at Cerro Tololo Inter-American Observatory, National Optical Astronomy Observatory (NOAO Prop. ID: 2013A-0719; PI: Saha), which is operated by the Association of Universities for Research in Astronomy (AURA) under a cooperative agreement with the National Science Foundation. This project used data obtained with the Dark Energy Camera (DECam), which was constructed by the Dark Energy Survey (DES) collaboration. Funding for the DES Projects has been provided by the U.S. Department of Energy, the U.S. National Science Foundation, the Ministry of Science and Education of Spain, the Science and Technology Facilities Council of the United Kingdom, the Higher Education Funding Council for England, the National Center for Supercomputing Applications at the University of Illinois at Urbana-Champaign, the Kavli Institute of Cosmological Physics at the University of Chicago, the Center for Cosmology and Astro-Particle Physics at the Ohio State University, the Mitchell Institute for Fundamental Physics and Astronomy at Texas A\&M University, Financiadora de Estudos e Projetos, Funda{\c c}{\~a}o Carlos Chagas Filho de Amparo {\`a} Pesquisa do Estado do Rio de Janeiro, Conselho Nacional de Desenvolvimento Cient{\'i}fico e Tecnol{\'o}gico and the Minist{\'e}rio da Ci{\^e}ncia, Tecnologia e Inovac{\~a}o, the Deutsche Forschungsgemeinschaft, and the Collaborating Institutions in the Dark Energy Survey. The Collaborating Institutions are Argonne National Laboratory, the University of California at Santa Cruz, the University of Cambridge, Centro de Investigaciones En{\'e}rgeticas, Medioambientales y Tecnol{\'o}gicas-Madrid, the University of Chicago, University College London, the DES-Brazil Consortium, the University of Edinburgh, the Eidgen{\"o}ssische Technische Hoch\-schule (ETH) Z{\"u}rich, Fermi National Accelerator Laboratory, the University of Illinois at Urbana-Champaign, the Institut de Ci{\`e}ncies de l'Espai (IEEC/CSIC), the Institut de F{\'i}sica d'Altes Energies, Lawrence Berkeley National Laboratory, the Ludwig-Maximilians Universit{\"a}t M{\"u}nchen and the associated Excellence Cluster Universe, the University of Michigan, {the} National Optical Astronomy Observatory, the University of Nottingham, the Ohio State University, the University of Pennsylvania, the University of Portsmouth, SLAC National Accelerator Laboratory, Stanford University, the University of Sussex, and Texas A\&M University. EO was partially supported by the NSF through grant AST-1313006. \software{Community Pipeline \citep{Valdes14}, DoPHOT \citep{Schechter93}, Psearch \citep{saha17}, ATLAS (Kurucz 1993), TOPCAT, IDL, MySQL} \facility{Blanco (DECam)} \end{acknowledgments}
\section{Introduction} \vspace*{-\baselineskip} The three largest citation databases; Google Scholar, Web of Science (WoS) and Scopus all give prominence to citation counts. However, it has been long established that treating all citations with equal weight is counterintuitive. Garfield, the original proponent of the JIF \cite{garfield1972citation}, proposed a range of 15 different reasons a paper may be cited. In this paper, we address the problem of identifying influential citations based on publications' full text. The rest of the paper is organised as follows. In Section \ref{rel_work}, we introduce key studies on which our work is based. We then discuss the approach for detecting influential citation, providing a critical analysis of features previously applied in this task in Section \ref{methodology}, selecting a set of three key features for further analysis. We present a comparative study of the identified features in Section \ref{results}, together with the challenges inherent in this task. \section{Related Work} \vspace*{-\baselineskip} \label{rel_work} There have been several different methodologies applied to this task, Hou et al. (2011) \cite{hou2011counting} first suggest the idea of using an internal citation count based on the full text of a research paper rather than just the bibliography to determine influence. They demonstrate a positive correlation between the number of times a citation occurs and its overall influence on the citing paper. Zhu et al. \cite{zhu2015} suggests a range of 40 classification features including both semantic and metric features to determine influence. Most recently, Valenzuela et al. (2015) \cite{valenzuela2015identifying} made significant efforts to construct a reference set which was publicly released and which this study relies heavily on. They suggest a range of 12 features, many of which show similarity with those of \cite{zhu2015}. All of the studies under consideration use a range of different features and test them on different datasets. Consequently, getting a deeper understanding of which of the previously suggested features are most effective at this task is needed. \section{Methodology} \label{methodology} \vspace*{-\baselineskip} The typical workflow for classifying citation types involves extracting the full text of the manuscript, parsing the text to detect document structure and then applying a classifier trained using machine learning approaches. In the rest of this section, we describe this workflow concentrating on the selection of features used in the citation type classification task. \subsection{Classification features used by prior studies} One of the overriding aims of this work is to establish which of the previously identified classification features perform most strongly as predictors of citation importance and to use this as a baseline from which to build future work. We consider the features presented in the two most recent studies. In \cite{zhu2015} we first see an expansion of the features into a rich range that move beyond simple counting of in-text citations; We analysed the 40 features used by \cite{zhu2015} and 12 features used in the study of \cite{valenzuela2015identifying}. Of the 40 features suggested by \cite{zhu2015}, a combination of just 4 features resulted in the best performance of the model. Adding features beyond this actually lowered the performance. Out of the 12 features of \cite{valenzuela2015identifying}, we found three features irreproducible (F3, F5\footnote{We attempted to reproduce this feature, but failed due to Valenzuela's dictionary of cue words not being available.}, F12), we were unable to reliably replicate two features due to PDF extraction issues (F2, F6) and we elected not to use two features as they rely on external and potentially changing evidence (F10, F11). Two features we tested (F7, F8) did not produce any significant correlation with the gold standard. Of the three remaining features of \cite{valenzuela2015identifying}, we found a complete overlap of two features between \cite{valenzuela2015identifying} and \cite{zhu2015} (F1-countsInPaperWhole, F4-aux\_SelfCite) and a close match on the third (F9-simTitleCore). These three selected features correspond to the best (F1-countsInPaperWhole) feature of Zhu, the worst feature of Valenzuela (F9-simTitleCore) and a third where the opinion regarding the usefulness of this feature was divided between the two studies (F4-aux\_SelfCite). \subsection{Classification} Using the identified features, we perform a binary incidental / influential classification. WEKA 3 \cite{witten2016data} was selected as the machine learning toolset in our study. \section{Results} \label{results} \vspace*{-\baselineskip} \subsection{Dataset} The dataset released by \cite{valenzuela2015identifying} contains incidental/influential human judgments on 465 citing-cited paper pairs for articles drawn from the 2013 ACL anthology, the full texts of which are publicly available. The judgment for each citation was determined by two expert human annotators and each citation was assigned a label. Using the author’s binary classification, 396 citation pairs were ranked as incidental citations and 69 (14.3\%) were ranked as influential (important) citations. \subsection{Analysis and comparison of selected features.} Our experiments tested a range of features and their efficacy as predictors of citation influence. We achieved the best results using the Random Forests Classifier. We tested the model using bagging with 100 iterations and a base learner, using a 10-fold cross-validation methodology. The WEKA toolset was used to generate P/R curves for each of the individual features as well as the combination of all the features (Table \ref{all_features}). \begin{table}[!h] \centering \begin{tabular}{| l | c | c | c | c | c | c |} \hline Feature & P@R=0.05 & P@R=0.1 & P@R=0.3 & P@R=0.5 & P@R=0.7 & P@R=0.9 \\ \hline F1 & 0.4 & 0.34 & 0.33 & 0.3 & 0.26 & 0.21 \\ \hline F4 & 0.27 & 0.35 & 0.14 & 0.15 & 0.14 & 0.14 \\ \hline F9 & 0.46 & 0.49 & 0.21 & 0.2 & 0.18 & 0.16 \\ \hline All & 0.5 & 0.38 & 0.37 & 0.37 & 0.29 & 0.23 \\ \hline \end{tabular} \caption{Interpolated precision at different recall levels for all features for the random forest classifier.} \label{all_features} \vspace*{-\baselineskip} \end{table} We also measured the correlation between each of the individual features and the classification given by the human annotators. Valenzuela et al. \cite{valenzuela2015identifying} present their results in terms of P/R values for each feature whereas \cite{zhu2015} shows the Pearson correlation with their gold standard. We therefore present the results of our experiments in both formats to allow for accurate comparison. \begin{table}[!h] \centering \caption{Comparison of results by feature} \label{Table6} \begin{tabular}{| l | c | c | c | c |} \hline & \multicolumn{2}{| c |}{Precision@Recall=0.9} & \multicolumn{2}{|c|}{Pearson $r$} \\ \hline Feature & \, Valenzuela et al. \cite{valenzuela2015identifying} \, & \, Our results \, & \, Zhu et al. \cite{zhu2015} \, & \, Our results \, \\ \hline Direct Citations & \textbf{0.30} & \textbf{0.21 }& \textbf{0.330} & 0.281 \\ \hline Abstract Similarity & 0.14 & 0.14 & N/A & \textbf{0.373} \\ \hline Author Overlap & 0.22 & 0.16 & 0.020 & 0.132 \\ \hline \end{tabular} \vspace*{-\baselineskip} \end{table} Our work confirms the earlier findings reported in \cite{zhu2015} and \cite{valenzuela2015identifying} that the number of direct instances of a citation within a paper is a clear indicator of citation influence. We also find that author overlap, or self-citation, does have value as a classification feature. Contrary to the work of \cite{valenzuela2015identifying} we find that the similarity between abstracts is more predictive of citation influence than previously shown. The correlation of this feature with the reference set ($r$=0.373, $p<0.01$, 2-tailed) was the highest of all the features we tested. It is our contention that testing all features using $P/R$ values, at $R0.90$ masks some of the predictive value of those features when the dataset contains only a small number of instances of the influential class. Table 3 shows the precision of the random forests classifier at various recall levels. It can been seen from these results that the classifier initially performs quite well and identifies many of the influential cases, however it has difficulty identifying the last few instances which substantially decreases the classifier's performance at \textit{R}0.90. Using Mean Average Precision (MAP) or a similar metric that provides a single-figure measure of quality across recall levels would be a better choice in this case. \subsubsection{Results for Individual Features} \subsubsection{F1 - Number of Direct Citations :} \vspace*{-\baselineskip} This feature is rated as the highest value in terms of predictive ability by \cite{zhu2015} and the second highest by \cite{valenzuela2015identifying}. The latter shows P0.30 at R0.90, however our results demonstrate a slightly lower P value, P0.21 at R0.90. \cite{zhu2015} lists the equivalent 'countsinPaper\_Whole' as the most significant feature of their classifier, with a Pearson correlation coefficient of P0.35. We find a Pearson correlation of P0.28 (significant at the 0.01 level, 2-tailed) for this feature with our dataset. The small difference in this result is likely caused by the differences in the two datasets. Our results therefore confirm that the number of times a citation appears is a strong indicator of that citation's influence. \vspace*{-\baselineskip} \subsubsection{F4 - Author Overlap:} The results from the two earlier studies for this feature vary considerably. In the results for \cite{valenzuela2015identifying} this is the third ranked 'most significant feature’ with P0.22 for R0.90. We find slightly less precision than \cite{valenzuela2015identifying} for this feature; P0.16 at R0.90. \cite{zhu2015}'s results show little correlation with their gold standard for the similar feature aux\_selfCite (Pearson 0.02). Interestingly, despite the low correlation, this feature was the fourth one selected by their model and did indeed improve the performance of the classifier, albeit only slightly. The experiments with our dataset show a far stronger positive correlation, P0.132 (significant at the 0.01 level, 2-tailed), than that found by \cite{zhu2015}. \vspace*{-\baselineskip} \subsubsection{F9 - Abstract Similarity} Whilst \cite{zhu2015} generated many similarity-based features, they did not compare citing abstract and cited abstract. This is somewhat surprising as we consider it to be an interesting feature and one that also seems innately logical. The abstract similarity is calculated as the cosine similarity of the tf-idf scores of the two abstracts. By ensuring that the dataset only contains valid data, i.e. the abstract is available for both citing and cited paper, a direct comparison can be made for this feature with \cite{valenzuela2015identifying} who rank this as the lowest of their twelve features, P0.14 at R0.90. Here our results are the same as \cite{valenzuela2015identifying},with P0.14 at R0.90. However, the Pearson correlation with the gold standard dataset for this feature is the highest of the three features tested in our experiments. We find a Pearson correlation of 0.373 (significant at the 0.01 level, 2-tailed). This feature was not tested by any of the other earlier studies covered in this work. Our results demonstrate that abstract similarity between citing and cited paper is more predictive of citation influence that previously shown. \vspace*{-\baselineskip} \subsection{The value of complex features.} Many of the complex features tested by previous studies have been shown to have little predictive ability in regards to classifying citation function or importance. Some of the most basic features have been shown to offer the strongest potential in identifying important or influential citations. Our research confirms that one of the most simplistic features, i.e. the number of times a citation appears in a paper, is highly predictive of influence. Replicating complex features is a non-trivial task unless exact details of how the values for these features were calculated or source code are provided by the original study. We believe that it is essential that the types and values of all features should be provided as part of the research dataset (as opposed to providing just source prior to feature extraction) to serve as a roadmap in replicating them. \vspace*{-\baselineskip} \section{Discussion} One of the major limitations of this and previous studies is the size of the publicly available, annotated, datasets. The study by \cite{valenzuela2015identifying} uses 465 citing / cited paper pairs. The study by \cite{zhu2015} uses just 100 papers by 40 authors. Due to the unbalanced split between the incidental and influential classes, our complete dataset contained only 61 examples of the positive (influential) class. We argue that due to the relative sparsity of influential citations a much larger reference set is required. This is equally true for negative citations, which have been shown to be even rarer. Training a classifier when the dataset contains so few instances of the non-neutral classes is problematic and we will address this in future work. The construction of a gold standard dataset containing many thousands of annotated citations, rather than a few hundred, is a significant undertaking but we believe this is a vital step in improving the abilities of the classification models. There is a noticeable difference between the datasets used by \cite{zhu2015} and \cite{valenzuela2015identifying} which warrants further study. The \cite{valenzuela2015identifying} dataset annotation was undertaken by two independent annotators and finds significant value in using author overlap as a classification feature. However, the \cite{zhu2015} reference set is annotated by the authors themselves and this study ranks author overlap / self-citation as being of very low importance. It may be that is demonstrates shyness or reticence on behalf of authors to regard their own, earlier, work as being a significant influence. Finally we argue that if a citation is considered influential, this original influence remains regardless of external factors or the environment. Therefore, classification features which rely on external and potentially fluid information should be used somewhat cautiously. In future work we will address this issue in greater detail. \section{Conclusions} \vspace*{-\baselineskip} Of the features we tested, we find the feature \textit{Abstract Similarity} shows the strongest positive correlation for predicting citation influence. We find \textit{Number of Direct Citations} to also be highly predictive and we find \textit{Author Overlap / Self-Citation} to be less predictive but still valuable as a classification feature. It is important to note that many of the features suggested by earlier studies have been shown to have little predictive ability. There is scope for further work surrounding the efficacy and in particular the reproducibility of some of the previously tested classification features. Many of the earlier studies in this domain present results based on sometimes complex and irreproducible features. We contest that this is detrimental to this area of study as a whole and, whilst earlier studies have identified several effective features, having the ability to reproduce them is fundamental to further development in the area of citation classification. Whilst it may be a relatively easy task for a human being to identify important or influential citations, building a model to automatically classify these citations with any degree of accuracy is a non-trivial task. A larger scale reference set than those used in this and previous studies is essential, particularly due to the inevitably skewed nature of any dataset of citations annotated according to influence or importance. \vspace*{-\baselineskip} \section{Acknowledgements} \vspace*{-\baselineskip} This work has been funded by Jisc and has also received support from the scholarly communications use case of the EU OpenMinTeD project under the H2020-EINFRA-2014-2 call, Project ID: 654021. \vspace*{-\baselineskip} \bibliographystyle{splncs}
\section{Conclusion} \label{sec:conclusion} In this paper, we presented our solution to YouTube-8M Challenge. We found hierarchical GRU model with MoE has the best single model performance, and Multi-scale GRU performs slightly worse. Motion information is missed but we would like to evaluate how much the motion information contributes to the performance on the untrimmed noisy data in the future. Another future work is to evaluate the aggregation methods on the large-scale dataset through an ablation study. \section{Experiments} \label{sec:expr} Two features are provided for each frame sampled at 1FPS. We did not investigate late fusion and the two features were concatenated as inputs to all the models. We trained the models with the following settings unless otherwise stated. We optimized the models with ADAM optimizer and the learning rate decays 0.9 every 4,000,000 examples. The initial learning rate for MoE models is 0.01, and we use learning rate 5e-4 when training RNNs. GAP is the evaluation metric and we report both the GAP and the mAP scores on the validation set. The metrics are reported using single checkpoint for each model. \subsection{Video-level Classification} We show the results of the MoE models in Table~\ref{table:video_cls_moe}. The performance increases when the number of mixtures increases. For 2, 4, 8, 50, 100 mixtures, we used a single MoE layer and we trained on CPU if OOM occurred on GPU. For the 200-mixture model, we divided the vocabulary in order with window size 500, while the labels are randomly selected in ``200random''. We can see the performance difference between ``200'' and ``200random'' is small. For the 1000-mixture model, we only trained on the first 1,000 labels. We averaged the prediction of 200-mixture and 1000-mixture which achieves GAP 0.8141 on the validation set. \subsection{Frame-level classification} We first show the results of our stacked RNN variants on Table~\ref{table:frame_cls_stackrnn}. By default, we used 2 stacked layers and 2-mixture MoE for classification. From the result, we can see that LSTM performs worse than GRU and bidirectional RNN performs slightly worse than the basic RNN. Besides, increasing the number of mixtures did not boost the performance. In ``GRU+fc'', we added an output projection on the GRU states. In Table~\ref{table:frame_cls_otherrnn}, we show the result of other RNNs. ``HGRU'' is the hierarchical GRU with the default window size 15. We used 2-mixture MoE and dropout keep ratio is set to 0.5. ``LN HGRU'' is the HGRU where the activations are layer normalized~\cite{ba2016layer}, which does not have improvements. We observed over-fitting in these models and thus shuffled the order of input frames (``HGRU (random order)''), but it leads to worse performance. ``Multi-scale GRU'' has similar performance to ``HGRU''. A slightly improvement can be obtained by changing the windows size from 15 to 20 (``HGRU@20''). The results of 1D ResNet and our modified end-to-end VLAD are shown in Table~\ref{table:frame_cls_others}. Note that in these two models, the inputs are the original frame-level features rather than outputs of RNNs. The initial learning rate is set to 0.1 for 1D ResNet and it decays 0.1 every 10 million examples. In our preliminary experiments, we can obtain accuracy 82.28\% (rgb only) on UCF-101 split 1 using our version of VLAD, where the average pooling result is 78.57\%. Notably, only 10 center is used in UCF-101 and the dimension of the feature vector is 2,560. We used 10 centers on YouTube-8M and did not try other settings. Further investigation would be made in the future. \input{table_moe.tex} \input{table_rnn.tex} \subsection{Fusion} In our final submission, we fused all the above models to obtain the prediction. Some models were not used in the final submission, and we did not report their results. The results on validation and test (private) can be seen in Table~\ref{table:frame_cls_hrnn}. $\ell_3$-norm fusion obtained the highest results on validation set and this submission got GAP 0.84081 on the test set (private). \begin{table} \begin{center}\begin{tabular}{|c|c|c|} \hline Model & GAP (val) & GAP (private) \\ \hline\hline Average Fusion & 0.840819 & - \\ \hline $\ell_1$ APs & 0.841035 & - \\ \hline $\ell_2$ APs & 0.841142 & -\\ \hline $\ell_3$ APs & \textbf{0.841169} & \textbf{0.84081} \\ \hline \end{tabular}\end{center} \caption{The fusion results. By simply averaging all prediction, we can obtain GAP 0.840819. Slight improvement can be achieved with our fusion method.} \label{table:frame_cls_hrnn} \end{table} \subsection{Fusion} \label{subsec:Fusion} In our submission, for each class, we fuse the predictions weighted by the Average Precision (AP) score on the validation set. We normalize the per-class APs of all models as the class-level fusion weights. Given $M$ predictions, and the APs on the validation set for $i$th prediction are ${\text{ap}_{i,0}, \text{ap}_{i,1}, \dots, \text{ap}_{i,4715}}$, % we can calculate the weights for class $c$ over all models by \begin{equation} W_c = \text{norm}(\text{ap}_{0,c}, \text{ap}_{1,c}, \dots, \text{ap}_{M-1,c}). \end{equation} The normalization function can be $\ell_1$-norm, $\ell_2$-norm or other norms. \section{Introduction} The basic methodology towards untrimmed video classification can be 1) frame-level/clip-level feature generation; 2) leveraging video context information; 3) temporal aggregation. In the YouTube-8M dataset, two frame-level features are provided, which are static image features extracted by the Inception network~\cite{szegedy2016rethinking} pre-trained on ImageNet and audio features extracted by a VGG-inspired acoustic model~\cite{hershey2016cnn} trained on the first version of YouTube-8M. The original testing videos were not available during the competition, and new features could not be extracted. We thus focus on 2) and 3) in the paper. First, each frame is conditioned on the previous frames and the orders of the frames need to be leveraged. We then utilize aggregation methods which eliminate order information but abstract discriminative representations for classification. We first present our approach in Section~\ref{sec:approach} and the results are shown in Section~\ref{sec:expr}. The conclusion is drawn in Section~\ref{sec:conclusion}. \section{Our Approach} \label{sec:approach} We first show our initial analysis of the dataset. We then present our approach using video-level and frame-level features. \subsection{Dataset Analysis} Videos have \textbf{multiple labels}. To calculate the loss, a simple method is to replace the softmax function with the sigmoid function. Second, we can use the softmax function but the labels need to be smoothed. Third, regarding the video tag assignment problem in a sequence to sequence scenario, label prediction can be generated at each decoding step with a softmax function. There is no order relation between the labels but we manually sort the labels in the vocabulary order. From our preliminary results, the sigmoid function always performs best. The YouTube-8M dataset is \textbf{imbalance} that some categories (excluding top-level categories) have over 50k positive examples, \eg, ``Minecraft'', while some categories have only 100 positive examples, \eg, ``Mammal''~(Figure~\ref{fig:label_distribution}). We tried to keep the label balanced in a minibatch during training,~\ie, the number of positive examples are similar for the categories in a minibatch. However, it results in worse performance. We also tried to normalize the label weight with its frequency,~\ie, higher frequency labels have lower weights, but it does not help either. Our explanation is that the videos are imbalanced in the training, validation and testing set, and the loss calculated by random sampling estimates the ``true'' distribution better. In Figure~\ref{fig:co_occur}, we show the label co-occurrence matrix on the training and validation set, which have very similar distribution. The YouTube-8M dataset is also \textbf{noisy}. Abu-El-Haija~\etal~\cite{abu2016youtube} reported that the precision and recall of labels are about 78.8\% and 14.5\%, respectively. Missing and noisy data are common in this dataset. To tackle this issue, we attempted to remove some noisy labels or complete the missing labels for each class in a certain amount, \eg, 5\%. Both methods have no influence on the performance. We plan to investigate this in the future. We did not deal with label noise or use positive negative sampling in the following models. \begin{figure*}[t] \centering \includegraphics[width=0.98\linewidth]{./images/labels_analysis} \caption{The vocabulary is basically ordered with regards to the number of positive instances in the class, \ie, smaller label indices have more positive instances. We can observe that most videos (97\%) are in label range [0, 1000). In label range [0, 50), there are 80\% of the videos, while less than 1\% videos are in [3000, 4716). } \label{fig:label_distribution} \end{figure*} \begin{figure}[t] \centering \includegraphics[width=1.0\linewidth]{./images/labels_cooccur} \caption{Label co-occurrence matrix of top 50 labels on the training set (left) and the validation set (right).} \label{fig:co_occur} \end{figure} \subsection{Video-level Classification} In video-level classification, one feature vector is provided for each video. \subsubsection{Mixture of Experts (MoE)} Given input $x$, the mixture of experts layer is directly applied on the input, which is calculated by, \begin{equation}\begin{aligned} f_{moe}(x) = \sum_{i=1}^{k}{G(x)_iE_i(x)}, \end{aligned}\end{equation} where $G(x)_i$ is the gating weight for expert $i$, and $E_i(x)$ is the prediction of the $i$th expert. We adopted the MoE layer used in~\cite{abu2016youtube}, where sigmoid activation is used on the expert output and the gating weights are soft assigned with a softmax function. \subsubsection{Parallel MoE (PMoE)} In our preliminary experiments, we found that increasing the number of mixtures from 2, 4 to 8 will increase the classification performance. We aim to train MoE with hundreds of mixtures. \cite{shazeer2017outrageously} used a sparsely-gated MoE with thousands of mixtures where only a small number of mixtures are updated in the training. Another way is to use hierarchical MoE~\cite{shazeer2017outrageously}. In the multi-label classification setting, we can simply use model parallelism that the vocabulary is divided into small label groups, where one MoE layer only predicts a subset of the whole vocabulary. There are different ways to divide the vocabulary. One way is to divide the labels in vocabulary order. For example, in the 200-mixture setting, we can divide the labels into ranges \{[0, 500), [500, 1000),~\ldots, [4500, 4716)\}. We can also randomly sample non-overlap labels from the vocabulary. \subsection{Frame-level Classification} In frame-level classification, the inputs are in variable lengths, which are zero-padded to sequence length 300. We use RNNs to model temporal transitions, while attention or VLAD are for aggregation. 1D ResNet is also used. \begin{figure*}[t] \centering \includegraphics[width=0.8\linewidth]{./images/rnn_variants} \caption{RNNs variants used in our submission. (a) Stacked RNN; (b) Stacked RNN with context injection; (c) HRNN; (d) Multi-scale RNN.} \label{fig:rnn_variants} \end{figure*} \subsubsection{Recurrent Neural Networks} RNNs have been successfully applied to video classification~\cite{ng2015beyond,icml2015_srivastava}, where Long Short-Term Memory (LSTM)~\cite{lstm} and Gated Recurrent Unit (GRU)~\cite{Cho_GRU} are commonly used. We use the following variants in our submission (Figure~\ref{fig:rnn_variants}): a) \textbf{Two-layer stacked RNN}. We stack two layer RNNs and evaluate the performance of different RNN architectures,~\eg, GRU and LSTM, on this setting. A MoE layer is added on the RNN output for classification. b) \textbf{Stacked RNN with context injection}. Following~\cite{zhu2016bidirectional}, we use a seq2seq model to reconstruct video contexts, where an encoder encodes a clip to reconstruct its previous and next clips. The encoder thus encodes information beyond the seen clip. We design the stacked RNN model which takes $x$ and the outputs of the context encoder as inputs, which is \begin{equation}\begin{aligned} x = \text{stop\_gradient}(\text{ContextRNN}(x)) + x. \end{aligned}\end{equation} Note that we do not backpropagate the gradient through the context encoder. c) \textbf{Hierarchical RNN with hidden MoE layer}. One problem with the stacked RNN is that it is computation expensive and the gradient may still vanish when the sequence length grows. Following~\cite{pan2015hierarchical}, we use a hierarchical RNN where the first RNN encodes video segments information and the second RNN further aggregates each segment. We plug a MoE layer between the layers but no activation funcion is used on the expert outputs. d) \textbf{Multi-scale RNN}. In this variants, we divide the inputs into several groups with different intervals. The original frames are sampled at 1FPS, we further subsample the frames with lower frame rate. States of different rates are then concatenated for classification. \subsubsection{\textbf{Vector of Locally Aggregated Descriptors}} \begin{figure}[t] \centering \includegraphics[width=0.98\linewidth]{./images/vlad_attns} \caption{Two schemes to calculate the kernel $a$. The difference is that in (a), softmax is calculated over centers while in (b) it is calculated over the inputs.} \label{fig:vlad_attns} \end{figure} Instead of using the final state/output for classification, we can also use a weighted sum over the outputs of all steps. Linear annealing weights~\cite{ng2015beyond} and attention with multiple hops can be used. We modified the attention mechanism as follows, \begin{equation}\begin{aligned} output = flatten(softmax(\mathbf{W}_atanh(\mathbf{W_i}\mathbf{X}^T))\mathbf{X}), \end{aligned}\end{equation} where $\mathbf{X}$ is the input with shape [$\text{seq\_length}$, $\text{input\_size}$], $\mathbf{W_i}$ is the projection matrix with shape [\text{proj\_size}, \text{input\_size}], $\mathbf{W_a}$ is the attention matrix with shape [\text{num\_hops}, \text{proj\_size}]. Vector of Locally Aggregated Descriptors (VLAD) can aggregate frame-level ConvNets activations for video classification~\cite{xu2015discriminative}. The length of the feature vector is usually over 60,000 which is also very sparse. Thus training classifiers,~\eg, logistic regression, on VLAD can easily lead to overfitting. Training VLAD end-to-end has been first attempted in~\cite{arandjelovic2016netvlad} and later Girdhar~\etal~\cite{girdhar2017actionvlad} applied NetVLAD to action recognition. The original VLAD is calculated by, \begin{equation}\begin{aligned} \label{eq:vlad} O(j) = \sum_{i=1}^{N}{a(x_i, C_j)(x_i - C_j)}, \end{aligned}\end{equation} where $x_i$ is the $i$th input, $C_j$ is the $j$th center, $a(x_i, C_j)$ denotes the membership of the input $x_i$ to center $C_j$, \ie, $a(x_i, C_j)=1$ if center $C_j$ is closest to input $x_i$ and 0 otherwise. Instead of hard assignment,~\cite{arandjelovic2016netvlad,girdhar2017actionvlad} used a soft assigment with \begin{equation}\begin{aligned} a(x_i, C_j) = \frac{\exp\{-\alpha||x_i-C_j||^2\}}{\sum_{k'}{\exp\{-\alpha||x_i-C_{k'}||^2\}}}, \end{aligned}\end{equation} which is further decoupled into, \begin{equation}\begin{aligned} a'(x_i, C_j) = \frac{\exp\{w_j^Tx_i+b_j\}}{\sum_{k'}{\exp\{w_{k'}^Tx_i+b_{k'}\}}}. \end{aligned}\end{equation} We use another kernel $a(x_i, C_j)$ that is commonly used in attention, \begin{equation}\begin{aligned} a''(x_i, C_j) = \frac{\exp\{W_atanh(W_cC_j+W_ix_i+b)\}}{\sum_{k'}{\exp\{W_atanh(W_cC_{k'}+W_ix_i+b)\}}}. \end{aligned}\end{equation} Another constraint is added to minimize $\sum_{i=1}^{N}{a(x_i, C_j)||x_i - C_j||^2}$. Equation~\ref{eq:vlad} is very similar to the attention machnism with two differences. First, Equation~\ref{eq:vlad} has an additional residual connection. Second, the weighted sum is applied on the memory in attention, while in the VLAD case, the weighted residuals are concatenated. We would investage more in the future. We show two different schemes to calculate the kernel $a$ in Figure~\ref{fig:vlad_attns}. \subsubsection{1D Convolution} By replacing the 2D kernel with 1D kernel and keeping other setups unchanged, we train a 1D ResNet-50~\cite{he2016deep} on the features provided. The input ``1D image'' has shape [300, 1]. As the length of the input channel is 1,536, we increase the first convolutional channel to 512, and the following channels are 512, 1,024, 2,048, 4,096. Global average pooling is applied and softmax activation is replaced by a sigmoid activation. \input{fusion.tex}
\section{Introduction} \label{intro} It is evident that most of the hydrogen in the universe was reionized during an Epoch of Reionization (EOR) somewhere between 13.4 and 12.7 Gyr ago, corresponding to redshifts 12 $> z >$ 6 \citep{Fan:2006, Bouwens:2015}, when primordial gas clouds began to collapse into proto-galaxies to form the first stars and black holes. Whether the overall increase in ionizing radiation that precipitated the EOR was produced by the first stars or black holes is a major unanswered cosmological question. The total budget for ionizing radiation escaping from these objects remains uncertain \citep{Madau:2015}, but its history plays a crucial role in regulating the subsequent emergence and evolution of structure in the universe \citep[c.f.][]{Madau:1999, Ricotti:2002, Benson:2013, Robertson:2015}. Lyman continuum (LyC) photons, emitted below the rest frame \ion{H}{1} ionization edge at 911.8 \AA, escape the highly ionized confines of quasars and active galactic nuclei (AGNs) with relative ease \citep{Bahcall:1967, Smith:1981, Bechtold:1987, Scott:2004}, but the potential contribution from the vastly more numerous star-forming galaxies is harder to quantify; this is due to the difficulty of observing this intrinsically weak emission coupled with our poor understanding of the physical conditions that allow ionizing radiation to escape into the intergalactic medium (IGM). Empirical estimates of the average escape fraction required to sustain an ionized IGM by $z$ = 6, range from 5 $ < f^e_{LyC} < $ 40\% \citep[][and references therein]{Bouwens:2015, Finkelstein:2015}. These estimates depend on the evolution of the steepness of the galaxy luminosity function, the mean production of LyC emission per unit star-formation rate (SFR), and assumptions regarding the ratio of the escape fraction to the ionized hydrogen clumping factor \citep{Madau:1999}. The conclusion that the EOR is driven solely by star-forming galaxies rests on these assumptions, and on an extrapolation of the faint-end cutoff of the galaxy luminosity function from -17 $ < M_{uv} < $ -13. Moreover, there are no constraints as to how the escape fraction is distributed as a function of galactic mass, luminosity, and environment. Cosmological hydrodynamical simulations aiming to determine the escape fraction as a function of luminosity and halo mass have produced mixed results \citep[c.f.][]{Gnedin:2008, Razoumov:2010, Yajima:2011, Wise:2014, Yajima:2014}. In recent work, \citet{Sharma:2016} found that the brighter galaxies have higher escape fractions. In contrast, \citet{Xu:2016} find that galaxies with smaller halo masses have the highest escape fractions, however, they also found that star formation in low-mass galaxies is easily suppressed as reionization progresses, leaving higher-mass galaxies, which are less susceptible to photo-evaporation, to complete the process. One of the key projects for the James Webb Space Telescope ({\em JWST}\/) is to search for those sources responsible for reionizing the universe; however, it will likely only be able to do so indirectly. The monotonic increase with redshift in the density of Lyman limit systems (LLS) -- those discrete clouds in the IGM having $\log(N_{HI}(cm^{-2})) > $ 17.2 -- steadily decreases the probability of directly detecting LyC emission from star-forming galaxies on an unattenuated line of sight \citep[c.f.][]{Madau:1995, Inoue:2008, Inoue:2014, Worseck:2014, Crighton:2015}. At redshifts of $z$ = [3, 4, 5, 6] the mean transmission of the IGM is estimated to be $\approx$ [0.5, 0.3 0.08, 0.01] \citep[][their Figure 4]{Inoue:2014}, albeit with an large variation about the mean. The {\em JWST}\/\ short wavelength cutoff is $\approx$ 0.6 $\mu$m, so the LyC region is accessible only for redshifts $z \ga$ 6 where the IGM is essentially completely opaque. Direct measurements of LyC will be a challenge for {\em JWST}\/, to say the least The far-UV and near-UV bandpasses provide the most direct path to spatially resolved detection of ionizing radiation, and to the characterization of those environments that favor LyC escape. Spatial resolution is an especially important diagnostic, as models indicate that LyC photons escaping from any particular galaxy will exhibit gross variations that depend on the line of sight of a star-forming source with respect to intervening neutral and ionized material in disks, superbubbles, and surrounding circumgalactic streams \cite{Dove:1994, Bland-Hawthorn:1999, Dove:2000, Shull:2015}. Recent successes in detecting LyC emission from what are apparently star-forming galaxies \citep{Leitet:2013, Borthakur:2014, Izotov:2016b, Leitherer:2016, Naidu:2016, Shapley:2016} have emboldened the design of instrumentation and observing strategies capable of quantifying, on an industrial scale, the relative contributions of star-forming galaxies, quasars, and AGN to the creation and sustenance of the metagalactic ionizing background (MIB) across cosmic time. The need for understanding those physical processes that enable $f^e_{LyC}$ at low redshift has grown in importance as of late. Recent determinations of the number density of Ly$\alpha$\ forest lines found at low redshift by \citet{Danforth:2016} appear to require a MIB $\sim$ 5$\times$ larger than theoretical estimates to explain the low density of the lines \citep{Kollmeier:2014}; \citep[see][for contrasting conclusions]{Shull:2015, Gaikwad:2017}. These studies are inconclusive as to whether, on average, $f^e_{LyC}$ from star-forming galaxies and quasars is considerably higher than the handful of detections to date indicate, thus underlining the importance of quantifying $f^e_{LyC}$ at both low and high redshift. Our main goal is to establish effective area requirements for future observatories that will transform what has previously been described as an impossible task \citep{Fernandez-Soto:2003}, into a statistically significant determination of LyC luminosity function evolution across cosmic time envisioned by \citet{Deharveng:1997} and \citet{Shull:2015}, providing a full accounting of the LyC escape budget from star-forming galaxies of all types. Here we use 1500 \AA\ luminosity functions to guide estimates of the rest frame EUV flux (the LyC) emitted by characteristic galaxies, attenuated by a uniform foreground screen of circumgalactic media (CGM) with representative ratios of \ion{H}{1}, \ion{He}{1}, and \ion{He}{2} column densities. We also include the progressive increase in mean attenuation effected by the increasing \ion{H}{1} distribution of IGM column densities as a function of redshift. A general result is that the LyC escape fraction measured in a narrow range just shortward of the ionization edge is a poor representation of the total fraction of ionizing photons that escape. These calculations were developed to support science and technology flowdown exercises for the Large Ultra-Violet Optical InfraRed (LUVOIR) and Habitable Exoplanet (HabEx) survey mission studies commissioned by NASA in preparation for the Astrophysics Decadal Survey for 2020, and to assess the capability of proposed probe and explorer class missions. A cosmology of $H_0 = $ 70 km s$^{-1}$ Mpc$^{-1}$, $\Omega_m =$ 0.3, $\Omega_{\Lambda} =$ 0.7 is assumed. \subsection{Review of Escape Fraction Terminology} The term ``escape fraction'' is often used loosely and somewhat conflictingly. The literature defines a number of slightly different ratios to describe the escape of ionizing radiation from galactic environments, which for the sake of completeness we review briefly. A useful observable, termed the relative escape fraction ($f_{rel}$) by \citet{Reddy:2016, Shapley:2006}, and \citet{Steidel:2001}, is defined as the ratio of the observed flux in a bandpass just shortward of the Lyman edge ($F^o_{900}$) to that observed at some fiducial UV continuum wavelength ($F^o_{\lambda}$); \begin{equation} f_{rel} = F^o_{900}/F^o_{\lambda}. \end{equation} \noindent The observed flux is then relatable to the intrinsic flux ($F^i_{\lambda}$) by appeal to a stellar population spectral synthesis model, after accounting for the transmission of flux, $T_{\lambda}$, as attenuated by line of sight neutral gas and dust, such that $F^o_{\lambda} =T_{\lambda} F^i_{\lambda}$. Just over the edge we have $F^o_{900} =f^e_{900} F^i_{900}$, which \citet{Reddy:2016} called $f^e_{900}$ the absolute escape fraction (in their notation $f(LyC)_{abs}$). Solving for $f^e_{900}$ in terms of the relative escape fraction, the attenuation at the fiducial wavelength and the intrinsic flux ratio, \begin{equation} f^e_{900} = T_{\lambda} f_{rel} F^i_{\lambda}/F^i_{900}. \end{equation} \noindent It explicitly includes hydrogen and dust attenuation at the edge. \citet{Borthakur:2014} made a further distinction between what they called a relative escape fraction at 912$^{-}$, where $T_{\lambda}$ =1, and an absolute escape fraction at 912$^{-}$ where they corrected for dust using the ratio of the integrated LyC luminosity, with respect to the bolometric luminosity. Implicit in these definitions is the assumption that the observed flux $F^o_{\lambda}$ is averaged over some relatively narrow bandpass. However, $f^e_{900}$ does not fully account for all the ionizing photons that escape from the CGM and contribute to the MIB. To do so requires an integration of the attenuated (``observable'') photon number flux ($F^o_{\lambda}/E_{\lambda}$; where $\lambda <$ 911.8 \AA\ and $E_{\lambda}$ is the photon energy) over the full extent of the spectral energy distribution (SED) shortward of the Lyman edge. The integrated escape fraction is normalized by the intrinsic SED integrated over the same wavelength interval, \begin{equation} f^e_{LyC}= \frac{\int_{0}^{912}F^o_{\lambda}/E_{\lambda} d\lambda}{\int_{0}^{912}F^i_{\lambda}/E_{\lambda} d\lambda}. \end{equation} \noindent In practice, $F^o_{\lambda}$ is not observable in its entirety; however, we can estimate it by the integration of a transmission function, multiplied by the intrinsic flux, $T_{\lambda}F^i_{\lambda}$, over the wavelength interval shortward of the Lyman edge. In \S~\ref{lumfun} we provide estimates of $F^o_{(1+z)900}$ in terms of the characteristic apparent ab-magnitude (abmag) $m_{(1+z)900}$, as a function of $f^e_{900}$, scaled from compilations of UV luminosity functions taken from the literature for rest frame wavelengths $\approx$ 1500 \AA. In \S~\ref{dropins} we will give estimates of the integrated fraction of escaping ionizing photons, $f^e_{LyC}$, by modeling the optical depth in neutral hydrogen, neutral helium, and once-ionized helium column in the CGM in the foreground of a spectral synthesis model. In \S~\ref{igmatten} we include the IGM attenuation in estimating the LyC flux of redshifted models scaled to the magnitudes of characteristic galaxies at (1+$z$)1500 \AA, and discuss detection requirements and observing strategies. \begin{deluxetable}{cccccc} \tablecaption{\bf Schechter parameters for UV Luminosity Functions \label{t1} } \tablecolumns{6} \tablewidth{0pt} \tablehead{\colhead{$z$} & \colhead{$\Delta z$} &\colhead{$\alpha$} & \colhead{$M^*_{15}$} & \colhead{$\phi^{*}$\tablenotemark{a} } & \colhead{$m^*_{(1+z)1500}$} } \startdata 0.1& 0 - 0.2 & -1.21 & -18.05 & 4.07 & 20.17\\ 0.3& 0.2 - 0.4 & -1.19 & -18.38 & 6.15 & 22.30\\ 0.5& 0.4 - 0.6 & -1.55 & -19.49 & 1.69 & 22.37\\ 0.7& 0.5 - 0.8 & -1.60 & -19.84 & 1.67 & 22.73\\ 1.0& 0.8 - 1.2 & -1.63 & -20.11 & 1.14 & 23.24\\ 2.0& 1.75 - 2.25 & -1.49 & -20.33 & 2.65 & 24.43\\ 2.9& 2.4 - 3.4 & -1.47 & -21.08 & 1.62 & 24.38\\ \enddata \tablenotetext{a}{(10$^{-3}$ Mpc$^{-3}$ \added{mag$^{-1}$} )} \end{deluxetable} \section{Far-UV Luminosity Functions}\label{lumfun} We use far-UV luminosity functions listed by \citet{Arnouts:2005} to estimate areal density of candidates and their corresponding LyC flux as functions of assumed escape fraction and redshift. In Table~\ref{t1} we list the \citet{Schechter:1976} function parameters. \added{The luminosity function in units of absolute magnitude is expressed as} \begin{equation} \label{eq0} \phi(M_{15})=\frac{\ln{10}}{2.5}\phi^*10^{-\frac{(M_{15}-M^{*}_{15})(\alpha+1)}{2.5}}e^{-\frac{(M_{15}-M^*_{15})}{2.5}}, \end{equation} \explain{The equation has changed. The $^*$ was dropped on the left side to create the proper independent variable $M_{15}$ and the $M$ in the exponential function on the right was changed to $M_{15}$ to agree with the formula as expressed in Yoshida et al. (2006).} \begin{figure} \includegraphics[width=.5\textwidth]{f1_UVLumFunAreal_Arnouts.eps} \caption{Star-forming galaxy surface density as a function of redshift derived from the luminosity functions listed in Table~\ref{t1}. \label{fig1}} \end{figure} \noindent \added{where $M^*_{15}$ is the characteristic absolute magnitude of the Schechter function at 1500 \AA, $\alpha$ is the faint-end power-law slope, $\phi^*$ is the normalization factor (in Mpc$^{-3}$ mag$^{-1}$), and $M_{15}$ is the independent variable for the absolute magnitude at restframe 1500 \AA.} We convert \added{this function} from the number per comoving volume to the number per square degree by multiplying by the comoving volume per solid angle, calculated at \replaced{for}{about} the mid-point in each redshift interval. \added{The characteristic absolute magnitude in the 1500 \AA\ rest frame was shifted to a characteristic apparent magnitude in the observer's frame using the formula \citep{Yoshida:2006} } \begin{equation} \label{eq5} m^{*}_{(1+z)1500}=M^*_{15}+2.5log{\left[\frac{(d_l(z)*10^5)^2}{(1.+z)}\right]}. \end{equation} Here $d_l(z)$ is the luminosity distance in Mpc, and $z$ is the redshift. In Figure~\ref{fig1} we show the \added{ultraviolet} luminosity functions listed in Table~\ref{t1} recast into \added{a differential areal density, graphed logarithmically as} the number of galaxies per unit magnitude per square degree. Each curve has an $*$ to indicate the location of the characteristic magnitude $m^*_{(1+z)1500}$ where the Schechter function makes the transition from the exponential cutoff in galaxy counts at the bright end of the luminosity function to the power law extension of the faint end. The interval for the abscissa of each curve spans 5 mag (a factor of 100 in flux) centered on $m^*_{(1+z)1500}$. The figure is useful for estimating the number of targets within a given patch of sky down to an instrument's brightness limit. \added{The estimate for the apparent characteristic magnitude at $(1+z)900$ \AA\ in the observer's frame, $m^*_{(1+z)900}$, is scaled from $m^{*}_{(1+z)1500}$ using} \begin{equation} \label{eq2} m^*_{(1+z)900} = m^{*}_{(1+z)1500} + \delta m^{1500}_{900} + \delta m_{esc}. \end{equation} where \added{the escape fraction just over the ionization edge is} $\delta m_{esc} = 2.5 \log{f^e_{900}}$, \added{and the ratio of the intrinsic rest frame flux at 1500 \AA\ to that at 900 \AA, } \deleted{We convert the estimates for the 1500 \AA\ rest frame magnitude to LyC magnitudes, using the scale factors} $\delta m^{1500}_{900} = 2.5\log{F^i_{1500}/F^{i}_{900}}$, \added{was} determined from the STARBURST99 \citep[hereafter SB99]{Leitherer:1999, Leitherer:2014} intrinsic SED \replaced{discussed}{described} in \S~\ref{intrinsicspec}. Conveniently, in the rotating stellar evolution model \added{that we have adopted}, $ F^i_{1500}/F^i_{900} \approx$ 1. \replaced{For constant star-formation this ratio is relatively insensitive to age.}{This ratio is relatively insensitive to age in constant star-formation models.} In the older, non-rotating SB99 models the range is 1.5 $ \lesssim F^{i}_{1500}/F^{i}_{900} \lesssim$ 3 for ages 10 -- 900 Gyr. A factor of 2 in the flux ratio amounts to $\delta m^{1500}_{900} = 2.5\log{F^i_{1500}/F^{i}_{900}} \approx 0.75$. \begin{figure} \includegraphics[bb= .75in 4.75in 8in 10.5in, clip=false, width=.5\textwidth]{f2_LyCestimatesApJnew.eps} \caption{Estimate of each luminosity function's characteristic magnitude, $m^*_{(1+z)900}$, as a function of redshift and assumed $f^e_{900}$ escape fraction just shortward of the edge Lyman edge. These estimates do not include IGM attenuation. \label{fig2}} \end{figure} The estimates for $m^*_{(1+z)900}$, shown as magenta lines in Figure~\ref{fig2}, are based on the rotating evolutionary models. \replaced{The estimates can}{They may} be adjusted to adhere to the older models by shifting the ordinate by the preferred $\delta m^{1500}_{900}$ (= 0 for the rotational models). Likewise, offsets to account for differences in dust attenuation between 1500 and 900 \AA\ may also be applied. We have neglected here the stochastic attenuation expected from intervening neutral hydrogen absorption systems associated with the IGM. We will quantify the effects of this additional attenuation in \S~\ref{igmatten}. The estimate for $m^*_{(1+z)900}$ at a given $f^e_{900}$ is intended to provide guidance for detecting LyC emission at the most \replaced{difficult}{attenuated} wavelength, just over the Lyman edge. The green dashed contours in Figure~\ref{fig2} indicate the flux levels $F_{(1+z)900}$ in units of femto erg flux units (1 FEFU = 10$^{-15}$ erg cm$^{-2}$ s$^{-1}$ \AA$^{-1}$ ), which was roughly the background limit for the {\it Far Ultraviolet Spectroscopic Explorer (FUSE)}. Current space-based UV background limits are $\sim$ 1 - 1000 times lower and will be discussed in \S~\ref{future}. It should be kept in mind that $f^e_{900}$ is not a measure of the ratio of the total number of ionizing photos that escape to the total number that are emitted. In the following section we show that while the LyC flux in the relatively narrow wavelength range just shortward of the Lyman edge can be essentially zero, the fraction of escaping continuum photons integrated over the entire LyC emitting region, from the edge into the extreme UV (EUV), is significantly greater than zero. \section{Lyman Drop-ins}\label{dropins} The abrupt drop-out in flux shortward of the LyC is a useful diagnostic for the photometric identification of star-forming galaxies \citep{Steidel:1995}. The wavelength of the band where the flux drops out provides a constraint on the redshift. The technique was originally developed using ground-based surveys, which can efficiently identify objects at redshifts $z \approx$ 3 -- 4. Lyman drop-outs at these redshifts are commonly referred to as Lyman Break Galaxies (LBGs). \citet{Cooke:2014} have emphasized that the standard LBG technique is biased toward star-forming galaxies with zero detectable flux in the LyC, i.e. when line of sight column densities of $N_{HI} >> 1 \times $10$^{18}$ cm$^{-2}$. For $N_{HI} \sim 1 \times $10$^{18}$ cm$^{-2}$ the drop-out does not extend completely throughout the EUV range, so we expect to find a class of star-forming galaxies that we call Lyman ``drop-ins'' as described below. \subsection{\ion{H}{1}, \ion{He}{1}, \ion{He}{2} CGM transmission model \label{LyCTrans} } In principal, the shape of the continuum emission shortward of the Lyman edge contains a great deal of information regarding the distribution of ionization states for hydrogen and helium, and the distribution of dust along those unresolved line of sight(s) through an individual galaxy's CGM favoring the escape of LyC radiation. The attenuation at each photoionization edge increases sharply followed by a relatively gentle recovery, varying approximately as $\propto (\frac{\lambda}{\lambda_e})^3$, where the $\lambda_e$ for \ion{H}{1}, \ion{He}{1}, and \ion{He}{2} are 911.75, 504.26, and 227.84 \AA, respectively. In general, the transmission below the Lyman edge is a exponential function of the sum of dust, neutral hydrogen, neutral helium, and singly ionized helium optical depths, \begin{equation} T_{CGM}(\lambda) = \exp[{-\tau_d(\lambda)-\tau_{HI}(\lambda)-\tau_{HeI}(\lambda)-\tau_{HeII}(\lambda)}], \end{equation} \noindent where the various optical depths are \deleted{a} products of the column densities and cross-sections for each species, $\tau_x(\lambda) = N_x\sigma(\lambda)$. For the hydrogen and helium photoionization cross-sections we use the analytic fits from \citet{Verner:1996}, which differ slightly from the $\lambda^3$ relation. For the \ion{H}{1}, \ion{He}{1}, and \ion{He}{2} resonance line cross-sections calculations we use the wavelengths and oscillator strengths for the 1 $< n <$ 79 lines of each species found in the online repository complied by Kurucz in CD-ROM 23.\footnote{\url{http://www.cfa.harvard.edu/amp/ampdata/kurucz23/sekur.html}} We calculated the total optical depth template for each species, following a procedure used by \citet{McCandliss:2003}, wherein Voigt profiles were generated for individual\deleted{s} lines with fine enough sampling and range to resolve the doppler core and return the optical depth in the damping wing to near 0. Individual line profile optical depths were interpolated onto an common grid spanning the entire wavelength range of interest, for summation with all other lines and photoionization cross-sections. The doppler velocity was set to $b$ = 35 km s$^{-1}$, as is commonly assumed \citep{Madau:1995, Inoue:2008, Inoue:2014} and is sufficient for our flux estimation exercise; however, it should be kept in mind that observations of the differential distribution of $b$ have been matched to $\frac{dN}{db} = \frac{4b^4_{\sigma}}{b^5}\exp(-(\frac{b_{\sigma}}{b})^4)$ with $b_{\sigma} \approx$ 26 km s$^{-1}$ \citep{Hui:1999}. How $\frac{dN}{db}$ varies with redshift is an open question. The relative contributions of the three species are linked through the cosmic abundance of helium by number and imposed assumptions for the neutral fractions with respect to the total for the element (molecular hydrogen is neglected); i.e., $N^{tot}_{H} = N_{HI}+N_{HII}$, $N^{tot}_{He} = N_{HeI}+N_{HeII}+N_{HeIII}$ and $N^{tot}_{He}$ = 0.08 $N^{tot}_{H}$. The independent variables are the column of \ion{H}{1}, its neutral fraction, $\chi_{HI} \equiv \frac{N_{HI}}{N^{tot}_{H}}$, and the helium neutral fraction, $\chi_{HeI} \equiv \frac{N_{HeI}}{N^{tot}_{He}}$. \begin{figure} \includegraphics[angle=90,width=.5\textwidth]{f3_controt1.000hi0.900heiheii.eps} \includegraphics[angle=90,width=.5\textwidth]{f3_controt0.100hi0.900heiheii.eps} \caption{LyC transmission functions for $\log{N_{HI}(cm^{-2})}$ = 16.00, 17.00, 17.25, 17.50, 17.75, 18.00, 18.25, 18.50 that span the transition from optically thin to thick at the Lyman edge. Top -- $\chi_{HI}$ =1, $\chi_{HeI}$ = 0.9. Bottom -- $\chi_{HI}$ =0.1, $\chi_{HeI}$ = 0.9.\label{fig3}}. \end{figure} In Figure~\ref{fig3} we show two sets of transmission models, having ($\chi_{HI}$, $\chi_{HeI}$) = (1.0, 0.9), and (0.1, 0.9), top and bottom, respectively. The overall blackness of $f^e_{900}$ is set by the $N_{HI}$ column density, but total fraction of escaping LyC photons is set by the ionization state \added{of} hydrogen relative to that of helium. The strength of the neutral and ionized helium edges becomes enhanced for $\chi_{HI} <$ 1. The nature of dust attenuation in a highly ionized density bounded medium below the hydrogen Lyman edge is highly uncertain, so we have neglected it here. This should not be too serious, as the extinction near the Lyman edge in the canonical Milky Way model of \citet[][their Figure 14]{Weingartner:2001} is $N_{HI}/A(912) \approx$ 2.4 $\times$ 10$^{20}$ cm$^{-2}$ mag$^{-1}$. For $N_{HI}$ = 10$^{18}$ cm$^{-2}$ this yields $A(912)$ =0.0042, so with $\tau_d(912)= A(912)/1.086$, we estimate a miniscule effect on transmission at the edge of $\exp{(-\tau_d(912))}$ = 0.996. However, if the dust abundance follows the total hydrogen instead of just \ion{H}{1}, then $\tau_d$ will be higher. In principal, a proper accounting of the neutral and ionized gases could lead to important observational insights into the temperature of the CGM along with the survivability and attenuation properties of dust grains with respect to the total gas content in LyC-leaking environments. \subsection{Intrinsic SB99 Star Formation Model \label{intrinsicspec} } We employ here an SB99 spectral synthesis model, forming stars at a continuous rate of 1 $M_{\odot} $yr$^{-1}$ \citep{Leitherer:1999, Leitherer:2014} for the intrinsic SED. We specified a Kroupa initial mass function, which has double power law exponents of -1.3, over the mass interval from 0.1 $< M_{\odot} <$ 0.5, and -2.3 for 0.5 $< M_{\odot} <$ 100. We also chose the Geneva evolutionary tracks with rotation at 40\%\ of the break-up velocity (v0.4 models) and solar metallicity were also selected. After about 10 Myr the number of ionizing photons emitted by this model below the Lyman edge saturates at a rate of $\log{[Q_{0}(s^{-1})]} \sim$ 53.4 \citep{Leitherer:1999}. The mass at this point is 10$^{7} M_{\odot}$. \subsection{SB99 models with CGM attenuation \label{cgmatten} } \begin{figure} \includegraphics[angle=90,width=0.5\textwidth]{f4_fe_lyc_shift20controt1.000hi0.900hei.eps} \includegraphics[angle=90,width=0.5\textwidth]{f4_fe_lyc_shift20controt0.100hi0.900hei.eps} \caption{LyC drop-ins with ($\chi_{HI}$, $\chi_{HeI}$) as in Figure~\ref{fig3}. SB99 v0.4 evolution model\deleted{s} \added{(10 Myr, continuous star formation, 10$^{7} M_{\odot}$),} attenuated with the transmission functions in Figure~\ref{fig3}. \added{The inset table columns are: $\log{N_{HI}(cm^{-2})}$, the neutral hydrogen column; $\log{[Q(s^{-1})]}$, the rate of escaping ionizing radiation; $f^e_{LyC}$ = $Q/Q_0$, the integrated escape fraction; and $f^e_{900}$, the escape fraction just shortward of the ionization edge, which is defined as the ratio of the attenuated flux to the intrinsic flux in the $\Delta \lambda$ = 20 \AA\ wide hatched region in the figures.} For $\log{N_{HI}(cm^{-2})} > $18 the escape fraction measured at 900 \AA\ $f^e_{900} << $1\%, yet the integrated fraction of ionizing photons that escape, $f^e_{LyC}$, is significantly greater than $f^e_{900}$. The top panel shows a relatively smooth Lyman drop-in at $\log{N_{HI}(cm^{-2})} = $18. The bottom panel shows a double drop-in. \label{fig4}} \end{figure} \begin{figure} \includegraphics[angle=90,width=0.47\textwidth]{f5_fetrue_lyc_shift20controt1.000hi0.900hei.eps} \includegraphics[angle=90,width=0.47\textwidth]{f5_fetrue_lyc_shift20controt0.100hi0.900hei.eps} \caption{Integrated fraction of escaping LyC photons, $f^e_{LyC}$ on ordinate, escape fraction at 900 $f^e_{900}$on abscissa. Top--bottom order for ($\chi_{HI}$, $\chi_{HeI}$) as in Figure~\ref{fig3}. Left linear--linear. Right log--log. The relationship is decidedly non-linear. Top to bottom shows varying degrees of significant escape even when $f^e_{900}$ has become black. \label{fig5}} \end{figure} In Figure~\ref{fig4} we show the effect of attenuating the SB99 model with the transmission functions depicted in Figure~\ref{fig3}. The shape of the continuum emitted below the Lyman edge, and hence the number of ionizing photons that ultimately escape from a star-forming region, is linked to the ionization state of hydrogen and helium in the surrounding column of gas. There is very little intrinsic stellar flux emitted below the \ion{He}{2} edge at 228 \AA, so the inclusion of \ion{He}{2} has little effect on the overall total escape fraction. However, it would become important for the harder SEDs typical of quasars and AGN. The top panel has ($\chi_{HI}$, $\chi_{HeI}$) = (1.0, 0.9), where we have assumed that helium is slightly ionized for the purpose of showing the location of the \ion{He}{2} Lyman series. This model shows signs of a slight break shortward of the \ion{He}{1} ionization edge at 504 \AA, but overall it exhibits a relatively smooth Lyman drop-in with decreasing wavelength. In the bottom panel ($\chi_{HI}$, $\chi_{HeI}$) = (0.1, 0.9), so the break shortward of 504 \AA\ is strengthened by the lower \ion{H}{1} abundance with respect to \ion{He}{1}, causing a Lyman "double drop-in" to appear in the EUV region. The strength of the \ion{He}{1} break with respect to the \ion{H}{1} break becomes more enhanced as $\chi_{HI}$ decreases. In each figure we have tabulated logarithms of the \ion{H}{1} column density, the rate of ionizing photon production, the escape fraction integrated over the entire EUV band, $f^e_{LyC}$, and the escape fraction of ionizing photons in the narrow 20 \AA\ wide region shortward of the Lyman edge, $f^e_{900}$. The table entries are color-coded to the spectra. In Figure~\ref{fig5} we show that the relationship between $f^e_{LyC}$ and $f^e_{900}$, (logarithmic scales left and liner scales right) is decidedly nonlinear. We have overplotted an interpolation formula of the form \begin{equation} f^e_{LyC} =\frac{(f^e_{900})^{\zeta_1} + (f^e_{900})^{\zeta_2} + \epsilon}{(2+\epsilon)}, \label{eq8} \end{equation} \noindent where ($\zeta_1, \zeta_2$, and $\epsilon$) = (0.25, 0.75, 0.018) and (0.37, 0.95, 0.0011), for ($\chi_{HI}$, $\chi_{HeI}$) = (1.0, 0.9) and ($\chi_{HI}$, $\chi_{HeI}$) = (0.1, 0.9), respectively. In all cases a column density $\log{N_{HI}(cm^{-2})}$ = 18 produces essentially zero flux at the edge, yielding an edge escape fraction of $f^e_{900}$= 0.003, yet the integrated escape fraction is 13 and 6\%, for the two cases, respectively. Using the interpolation formulae, we find that for the Lyman edge escape fractions used in Figure~\ref{fig2}, where $f^e_{900}$ = (0.01, 0.02, 0.04, 0.08, 0.16, 0.32, 1.00), the corresponding integrated escape fraction is $f^e_{LyC}$ = (0.18, 0.22, 0.27, 0.35, 0.45, 0.59, 1.00) and (0.10, 0.13, 0.18, 0.24, 0.34, 0.50, 1.00) for the two cases, respectively. We conclude that measurements of the Lyman edge escape fraction, $f^e_{900}$, only provide, at best, lower limits to the the true integrated fraction of escaping ionizing photons, and generally offer poor representations of the total number of ionizing photons that escape. The tables in Figures~\ref{fig4} show that LBGs may emit significant amounts of LyC radiation, at the level of 5 to 1\%, even if the optical depth at the edge is $\approx$ 10 ( $\log{N_{HI}(cm^{-2})}$ = 18.25). By way of example, we note that \citet{Izotov:2016a} found an edge escape fraction $f^e_{900}$ = 0.08. Using Eq.~\ref{eq8}, we derived an integrated escape fraction of $f^e_{LyC}$ = 0.35 or 0.25 for our two cases, respectively. This suggests that the ``f-escape'' problem might not be as bad as it seems. The only definitive way to rule this out is through deep UV observations in the redshifted rest frame of the EUV in an attempt to observe the LyC drop-in. In the next section we address the observability of of the Lyman drop-ins in the face of the steadily increasing mean optical depth of the IGM with increasing redshift. \section{Redshifted models, including mean IGM transmission } \label{igmatten} \begin{figure} \includegraphics[width=0.5\textwidth]{f6_MeanTransNsum.eps} \caption{Mean IGM transmission functions for redshifts $z$ = (0.1, 0.3, 0.5, 0.7, 1.0, 2.0, 2.9). Computed from the ($\chi_{HI}$, $\chi_{HeI}$) = (1.0, 0.9) model. The vertical bar indicates the level of expected variation at the edge as found in Monte Carlo study of IGM absorbers distributed over a range of column densities from LAF to DLA with a piecewise break at the LL transition \citet{Inoue:2008}. \label{fig6}} \end{figure} \begin{figure*} \includegraphics*[width=\textwidth,clip=false]{f7_IGMSB99magzcorr_attencontrot1.000hi0.900hei.eps} \caption{Redshifted ($\chi_{HI}$, $\chi_{HeI}$) = (1.0, 0.9) model with logarithmic scaling, showing LyC drop-in towards shorter wavelengths. Contours of constant abmag appear as dashed lines. Column density colors as in Figure~\ref{fig4}. The edge escape fractions are $f^e_{900}$ (\added{0.000,} 0.000, 0.003, 0.041, 0.166, 0.364, 0.566, 0.945) for (\added{olive,} red, orange, light green, green, blue, violet, and grey) respectively. \added{The $z$ = 0.1 panel, top-right, shows the $f^e_{900}$ escape fractions and associated column densities.} \label{fig7}} \end{figure*} \begin{figure*} \includegraphics*[width=\textwidth,clip=false]{f8_IGMSB99magzcorr_attencontrot0.100hi0.900hei.eps} \caption{Redshifted ($\chi_{HI}$, $\chi_{HeI}$) = (0.1, 0.9) model with logarithmic scaling. The $z$ = \replaced{1}{2.0} and \replaced{2}{2.9} models show the pronounced double drop-in structure is severely depressed, but the structure survives albeit at a difficult to detect level. Colors and edge escape fractions as in Figure~\ref{fig7}. \label{fig8}} \end{figure*} We have thus far not included attenuation of the escaping LyC due to resonant scattering and photoelectric absorption (photoionization) from discrete collections of intervening clouds in the IGM. Here we use the rest frame LyC transmission models described in \S~\ref{LyCTrans} to compute the mean transmission of the IGM as a function of the fiducial redshifts in Table~\ref{t1}. \begin{figure*} \includegraphics*[angle=90,width=\textwidth]{f9_IGMallSB99magzcorr_attencontrot1.000hi0.900hei.eps} \includegraphics*[angle=90,width=\textwidth]{f9_IGMallSB99magzcorr_attencontrot0.100hi0.900hei.eps} \caption{\added{Attenuated SB99 models overplotted for the fiducial redshifts ($z$ = 0, 0.1, 0.3, 0.5, 0.7, 1.0, 2.0, 2.9). The z = 0 models extend to 91 \AA; all others cut off at 911.8 \AA. } Column density colors as in Figure~\ref{fig4}, but the lowest column 18.5 is omitted. Asterisks mark (1+$z$)1500 \AA . Contours of constant abmag appear as dashed lines. Top -- ($\chi_{HI}$, $\chi_{HeI}$) = (1.0, 0.9) model with logarithmic scaling. Bottom -- ($\chi_{HI}$, $\chi_{HeI}$) = (1.0, 0.9). \label{fig9}} \end{figure*} The mean transmission function is derived from a mean optical depth \citep{Paresce:1980, Madau:1995, Inoue:2014}, expressed here as a numeric integral \begin{equation} <\tau(\lambda)> = \sum_{i=0}^{L}\sum_{j=0}^{M} \left(\frac{\partial^{2}n}{\partial{N_{HI}}\partial{z}}\right)_{i,j} (1-e^{-\tau(\lambda_{o})} )\Delta z_i \Delta N_j . \end{equation} \noindent Here the observed wavelength is related to the rest frame wavelength by $\lambda_{o} = \lambda_{r}(1+z_i)$. The optical depth is $\tau(\lambda_{o}) = \tau_{HI}(\lambda_{o}) +\tau_{HeI}(\lambda_{o}) +\tau_{HeII}(\lambda_{o})$. The redshift range from 0 $ \le z_i \le z_{L}$ is in fixed increments of $\Delta z_{i}$ =0.0005. The logarithm of the column densities range from 12.3 $ \le \log({N_j}) \le$ 22 in variable increments of $\Delta N_{j} = N_{j+1/2} - N_{j-1/2}$ with 0 $ \le j \le M$ . The differential distribution of the number of discrete absorbers with respect to \ion{H}{1} column density and redshift, $\frac{\partial^{2}n}{\partial{N_{HI}}\partial{z}}$, is typically characterized by a piecewise continuous function in redshift and column density \citep[c.f.][]{Madau:1995, Inoue:2014}. There are three basic \ion{H}{1} absorption regimes: the Ly$\alpha$\ forest regime (LAF), $ \log{N_{HI}(cm^{-2})} \lesssim $ 17; the Lyman limit (LL) regime, 17 $\lesssim \log{N_{HI}(cm^{-2})} \lesssim$ 20, and the damped Ly$\alpha$\ (DLA) regime, $ 20 \lesssim \log{N_{HI}(cm^{-2})} $. We employ the $\frac{\partial^{2}n}{\partial{N_{HI}}\partial{z}}$ described by \citet{Inoue:2014}, which uses a "Schechter-like" distribution function for the column density multiplied by a piecewise-continuous multiple power law distribution to describe the evolution in redshift. The distribution function is broken down into the sum of two different products, which in combination reasonably agrees with the evolution of \ion{H}{1} absorption systems from the LLA to DLA regimes as detailed in the literature \citep{Weymann:1998, Prochaska:2005, Prochaska:2010, Ribaudo:2011, Noterdaeme:2012, Fumagalli:2013, Kim:2013, O'Meara:2013, Prochaska:2014}. We note that the \citet{Inoue:2014} distribution function produces a mean transmission that is generally less aggressive than that produced by the distribution function used by \citet{Madau:1995}, even though it does not include a contribution from DLAs. The mean IGM transmission functions in the observers frame, $T_{IGM}(\lambda_o) = \exp{<-\tau(\lambda)>}$, are plotted in Figure~\ref{fig6} for $z$ = (0.1, 0.3, 0.5, 0.7, 1.0, 2.0, 2.9). These transmission functions were computed from the ($\chi_{HI}$, $\chi_{HeI}$) = (1.0, 0.9) model. We emphasize that they are just mean relationships. Significant stochastic deviations are expected along any given line of sight. We give an indication of the level of such variations at the Lyman edge by overplotting the 68\% deviations found by \citet[][their Figure 8]{Inoue:2008} in a Monte Carlo simulation of IGM absorbers distributed over a range of column densities from LAF to DLA with a piecewise break at the LL transition. The appearance, or absence, of an LL system in the Monte Carlo simulation drives much of the expected transmission stochasticity. We see that while the mean attenuation is significant at $z$ =2.9, reaching a lower trough of $\approx$ 15\% at 2000 \AA, it is by no means complete. The transmission at the Lyman edge for each redshift is $T(z)$ = (0.98, 0.97, 0.95, 0.94, 0.92, 0.80, 0.57), which translates to a decrease in abmag at the respective edges of $\delta m^*_{(1+z)900}$ = (0.02, 0.03, 0.05, 0.07, 0.09, 0.24, 0.61). In Figures~\ref{fig7}, \ref{fig8} and \ref{fig9} we show the result of applying $T_{IGM}(\lambda_o)$ to the ($\chi_{HI}$, $\chi_{HeI}$) = (1.0, 0.9) and ($\chi_{HI}$, $\chi_{HeI}$) = (0.1, 0.9) luminosity density models respectively. \added{Following \citet{Oke:1983},} using abmag = -2.5$\log{F_{\nu}}$-48.6 and substituting $F_{\nu} = \frac{\lambda^2}{c}F_{\lambda}$, we determined the flux, $F_{(1+z)1500}$ in the observer's frame from \deleted{the characteristic abmag} $m^*_{(1+z)1500}$ \deleted{of Eq.~\ref{eq5}} in Table~\ref{t1}, such that \begin{equation} \log(F_{(1+z)1500}) = \frac{m^*_{(1+z)1500} + 5\log{[(1+z)1500]} +2.408}{-2.5}, \end{equation} \explain{This formula has been corrected. Originally there was a 4 in front of the log when it should have been a 5. The zero point has been changed from 2.406 to 2.408 = 48.6 - log c, where c is the speed of light expressed in \AA\ s$^{-1}$.} \noindent and found a scale factor, $M_7$, matching the redshifted SB99 luminosity density at luminosity distance $d_{l}(z)$ to the observed SED $F_{(1+z)1500}$ such that \begin{equation} F_{\lambda_o} = M_7\left(\frac{L_{(1+z)\lambda_r} }{4 \pi d_{l}^{2}(z) (1+z)}\right). \end{equation} \noindent Here the luminosity distance $d_{l}(z)$ is in cm \added{and $M_7$ = $\frac{M^{\star}_g}{(10^7 M_{\odot})}$, where $M^{\star}_g$ is the galaxy stellar mass and $10^7 M_{\odot}$ is the mass of the SB99 model with its SFR of 1 $M_{\odot}$ yr$^{-1}$ and age of 10$^7$ years. We find} $M_7 = $ [0.8, 1.1, 3.2, 4.4, 5.6, 6.9, 13.7] for the fiducial redshifts in Table~\ref{t1}. The $z = 0 $ model is fixed to $m_{1500}$ = 18.0, with $M_7 =1 $ at a distance of $d_{l}$ = 177 Mpc. The mean \added{IGM} transmission function was applied as a uniform screen \replaced{after redshifting and scaling}{to $F_{\lambda_o}$. The CGM transmission is applied to $L_{\lambda_r}$ in the rest frame prior to redshifting.} Lines of constant abmag are overplotted on the figures. \subsection{LyC Detection Requirements \label{detreq}} The results of the previous section show that detection and quantification of the fraction of LyC flux escaping from star-forming galaxies out to $z \sim$ 3 will be a formidable, but not insurmountable, challenge for future space observatories. Moreover, they are consistent with the paucity of detections to date. \subsubsection{Current Capabilities} Examining the $z =$ 0.1 models, we see that very little of the LyC region peeks out below $\sim$ 1000 \AA. The Cosmic Origins Spectrograph (COS) on the {\it Hubble Space Telescope} ({\em HST}\/) has limited sensitivity in this bandpass ($A_{eff} \sim$ 10 cm$^{-2}$), with a background equivalent flux (BEF) of $\sim$ 10$^{-15}$ erg cm$^{-2}$ s$^{-1}$ \AA$^{-1}$ \ $\sim$ 20 abmag \citep{McCandliss:2010, Redwine:2016}. Galaxies brighter than this are in the region of the exponential falloff in the luminosity function, so they become increasingly rare with increasing luminosity. Characteristic galaxies with edge escape fractions $f^e_{900} < 0.4$, will have an attenuated edge flux more than an order of magnitude lower than the COS BEF. Consequently, they will be background limited, requiring extraordinarily long integration times to detect with confidence. We can expect to detect only a handful of such objects over the lifetime of COS. The three detections by \citet{Leitherer:2016} at $z \approx$ 0.04 had edge fluxes $\sim$ 1 to 2 $\times$ 10$^{-15}$ erg cm$^{-2}$ s$^{-1}$ \AA$^{-1}$ . The situation is somewhat more favorable at $z$ = 0.3, 0.5, and 0.7, where the $m^*_{(1+z)1500}$ are quite similar ($m^*_{1950}$, $m^*_{2250}$, $m^*_{2550}$ = 22.3, 22.4, 22.7) and the LyC region extends shortward of $\sim$ 1200, 1350, and 1550 \AA, respectively, into a wavelength region where the COS effective area $A_{eff} >$ 1000 cm$^{-2}$. Although the $m^*_{(1+z)1500}$ for galaxies at these redshifts are nearly an order of magnitude fainter than at $z$ = 0.1, the COS BEF is much lower than at $z =$ 0.1 ($\sim$ 10$^{-17}$ to 10$^{-18}$ erg cm$^{-2}$ s$^{-1}$ \AA$^{-1}$ \ $\sim$ 25 to 27.5 abmag -- depending on orbital attitude and solar activity), thus allowing for more efficient observing programs to be constructed. Still, the background limit is reached for characteristic galaxies at $f^e_{900} \approx$ 0.04 to 0.16. The depth of such observations will be limited and robust statistical samples difficult to come by, especially for $z$ = 0.5 and 0.7, where the number density is nearly 4 times lower. Nevertheless, the spectral baseline is relatively longer, which along with the higher effective area favors the detection of LyC drop-ins toward these higher redshifts. For galaxies at $z \approx$ 1 the detection of escaping LyC with COS becomes even more difficult, as the unattenuated LyC region is of order the BEF. This was also the case for LyC leak photometric searches conducted \replaced{by}{using} {\em GALEX}\/. The FUV ($\lambda_{eff}$ = 1528 \AA, $\Delta\lambda$ =1344 - 1786) and NUV ($\lambda_{eff}$ = 2271 \AA, $\Delta\lambda$ =1771 - 2831 channels on {\em GALEX}\/\ straddle the break for objects at a redshift of $z \approx$ 1.1. The {\em GALEX}\/\ 5$\sigma$ flux limit was $\sim$25 to 24 abmag for 30 ks integration in the FUV and NUV, respectively \citep{Morrissey:2005}. In the NUV a $z$ = 1 characteristic galaxy is $\sim$23 abmag, while the unattenuated FUV SED ($f^e_{900}$ =1) has $\sim$25 abmag at 1530 \AA; this is too faint for robust detections at near unity escape fraction. These limits are consistent with the \citet{Cowie:2009} analysis of deep {\em GALEX}\/\ exposures of the GOODS-N field with spectroscopic redshifts, where they found no objects with FUV $<$ 25 for redshifts of $z > 0.6$. We conclude that the limiting flux of {\em GALEX}\/\ was not low enough to adequately survey LyC\ leakage at a redshift of $z \ga$ 1. Observations by \citet{Siana:2007} using the Space Telescope Imaging Spectrograph (STIS) and Advanced Camera for Surveys Solar Blind Channel (ACS/SBC) found no detections in deep far-UV observations around 1600 \AA\ of 21 HUDF objects with known spectroscopic redshifts 1.1 $< z < $ 1.5. The $3\sigma$ limits in the ACS/SBC F150LP channel were estimated to be $\approx$28 abmag. Their median abmag at 1500(1+1.3) = 3450 \AA\ was 24.5, which is about 1 mag fainter than our characteristic magnitude at $z$ = 1. The non-detection to a 28 abmag limit at observer frame 1600 \AA\ implies a $\log{N_{HI}(cm^{-2})} \ga$ 17.75, yielding a $f^e_{900}$ $\sim$ 0.04 (an integrated 0.17 $< f^e_{LyC} <$ 0.26). These values compare fairly well to their stacked limit of $f_{esc,rel} <$ 0.08 evaluated at 700 \AA\ in the rest frame. \added{\citet{Naidu:2016} analyzed} Hubble Deep UV (HDUV) imaging of the GOODS-north and -south fields, using the Wide-Field Camera 3 (WFC3) filters F275W and F336W and redshifts supplied by 3D-{\em HST}\/\ Grism, \deleted{were used} to explore the redshift range $z \sim$ 2--3. The 5$\sigma$ detection limit was $\sim$ 28 abmag. The candidate leakers were estimated to have $f_{esc} >$ 0.6. This result is consistent with our $z $ = 2 and 2.9 calculations, showing that a characteristic galaxy at these redshifts with an abmag of 28 in the LyC will have $f^e _{900}>$ 0.4 at $z$ = 2 and $f^e _{900} >$ 0.6 at $z$ = 3. \begin{figure} \includegraphics[width=.5\textwidth]{f10_ADTDL.eps} \caption{ The product of effective area $A_{eff}(\lambda)$, observing time $\Delta T$, and bandwidth $\Delta \lambda$ required to detect flux from a characteristic galaxy, attenuated by a $\log{N_{HI}(cm^{-2})}$ = [18.25, 18.00, 17.75, 17.50, 17.25, 17.00, 16.00], in the wavelength region just over the Lyman edge, with a signal to noise of 5. The corresponding edge escape fractions are $f^e_{900}$ = [0.000, 0.003, 0.041, 0.166, 0.364, 0.566, 0.945] in color code of [red, orange, light green, green, blue, violet, grey]. The example given in the text (Eq.~\ref{eq12}) is marked with black horizontal and vertical lines. \label{fig10}} \end{figure} \subsubsection{Future Capability Requirements \label{future}} It is clear from Figure~\ref{fig2} that if we are to achieve the goal of statistically significant determination of LyC luminosity function evolution wherein we probe down to $f^e_{900} \approx$ 0.01 out to a redshift of 3, then we need to reach an abmag from 25 to 30 for the characteristic objects in the redshift range from 0.1 $< z < $ 2.9 . This corresponds to a flux range of $F_{(1+z)900} \sim$ 10$^{-17}$ to 10$^{-20}$ erg cm$^{-2}$ s$^{-1}$ \AA$^{-1}$ . The luminosity function spans a range of $\approx \pm$ 2.5 mag about the characteristic value, so the flux range will need to be another factor of 10 lower to obtain adequate numbers of low-luminosity objects. By way of example, \replaced{let us}{if we} assume a limiting flux requirement of $F^{lim}_{1800}$ =2 $\times$ 10$^{-20}$ erg cm$^{-2}$ s$^{-1}$ \AA$^{-1}$ \ at a 1800 \AA\ as a representative goal for $\sigma$ = 5 of edge detection with a $f^e_{900} \ga$ 0.003 for faint-end objects at $z \approx$ 1, then we arrive at the following criteria for the product of effective area ($A^{eff}_{1800}$, observing time $\Delta T$, and $\Delta \lambda$ spectral bandwidth, assuming negligible background): \begin{equation} A^{eff}_{1800}~\Delta T~\Delta \lambda = \frac{\sigma^2}{F_{1800}/E_{1800}} = 1.3 \times 10^{10} \ifmmode {\rm cm^2\;s\;\AA} \fi, \label{eq12} \end{equation} \noindent where $E_{1800}$ is the photon energy at 1800 \AA. This formula assumes that there is negligible background. It may be used for estimating effective area, observing time, and bandwidth requirements for photometric and spectroscopic applications. In Figure~\ref{fig10} we show the area-time-bandwidth product Lyman edge detection requirement for $\log{N_{HI}(cm^{-2})}$ = [18.25, 18.00, 17.75, 17.50, 17.25, 17.00, 16.00] as a function of redshift. \subsubsection{Target Sample Goals } \added{Figure~\ref{fig1} shows that} there are $\sim$ 300 objects per unit magnitude per square degree at $z =$ 0.1 at the faint-end. By 0.3 $z =$ 0.3 the faint end areal density are $\sim$ 3000 objects per unit magnitude per square degree, being flat out to $z =$ 1. For $z =$ 2 the areal density at the faint end rises to $\sim$ 50,000 objects per unit magnitude per square degree. The construction of high-fidelity luminosity functions places a requirement on sample size, where 25 objects per luminosity bin per redshift interval will yield an approximate rms deviation of $\sim$ 20\% for each point. Luminosity range should be ~ 2 - 3 orders of magnitude with $\sim$ 20 to 40 bins covering 10 redshift intervals. Redshifts are required for each object. This suggests an observing program with 500--1000 objects per redshift interval, yielding 5000--10,000 objects in total. The development of a wide-field multi-object spectroscopic (MOS) capability and complementary photometric observations will be essential to providing these samples. Angular coverage requirements will be driven by low-redshift objects, which have lower areal number densities than higher-redshift objects, while observing time requirements will be driven by the faintest objects. \subsection{Observing Strategies} Spectroscopy and photometry provide complementary approaches to this problem. Spectroscopy offers an opportunity to examine in detail the variation of the flux escaping at wavelengths below the Lyman edge along with the compositional properties of the objects. Photometry can go deeper and offer higher spatial resolution at the expense of spectral information. Spectroscopy provides an avenue for training photometry. A comprehensive program will incorporate photometry into the search for candidates and the deep probe of the faint end of the LyC luminosity function, while low-resolution precision spectroscopy will be used to characterize the shape of the LyC in a search for drop-ins, offering clues for the total ionizing photon budget and potentially dust attenuation in a completely unexplored bandpass. Spectral multiplexing over several square arcminutes will be of great importance for acquiring statistically significant samples in a reasonable amount of observing time. These observations should be complemented by medium- to high-resolution ($R \sim$ 10,000 - 50,000) spectroscopy longward of the Lyman edge, providing a baseline assessment of intervening \ion{H}{1} and metallic absorption systems associated with the CGM and IGM. Such observations, supported by spatially resolved imaging at the scale of 10 to 100 pc, can be used to account for the partial covering of emission regions, wherein the uniform screen assumption assumed here could be relaxed in favor of the informed modeling of foreground sources using measured superpositions of \ion{H}{1} columns and metallic absorption distributions. This is especially important for determining the randomly distributed IGM attenuation prior to quantifying the actual escape from the CGM for the higher-$z$ objects. Success at high $z$ is likely to rely on the identification of ``lucky sight-lines'' aided by gravitational lens and/or a several $\sigma$-low deviation from the average number of obscuring line of sight IGM absorption systems. \\ \section{Conclusion} \label{sumcon} Measurements of $f^e_{LyC}$ at $z \la$ 3 across all types of star-forming galaxies are crucial to informing our understanding of how the universe came to be ionized. UV observations, far and near, provide the most direct path to the spatially resolved detection of ionizing radiation, and the opportunity to characterize the physical state of galactic environments that favor LyC escape. The primary purpose of this work is to provide estimates of the flux in the LyC from star-forming galaxies, as functions of escape fraction and redshift. \deleted{, for the purpose of} \added{These estimates are useful for} quantifying science return, \replaced{developing}{defining} technical requirements, and \added{developing} observing strategies for future large, medium, and small scale missions to be considered by the Astrophysics Decadal for 2020. A model has been developed based on a uniform foreground screen of \ion{H}{1}, \ion{He}{1}, and \ion{He}{2}, attenuating a young continuous star-forming object \replaced{, having}{with} fluxes at (1+z)1500 \AA\ \replaced{set to }{scaled to reproduce} the characteristic apparent magnitudes of the \citet{Arnouts:2005} luminosity functions. The uniform screen model has as free parameters the ionization fractions of H and He ($\chi_{HI}$, $\chi_{HeI}$), wherein the ratio of H to He is set to the cosmic abundance. We also account for the mean attenuation by power law distributions of Ly$\alpha$\ forest, LL, and DLA systems associated with the IGM as a function of increasing redshift. \added{The paucity of current detections to date are broadly consistent with the characteristic flux levels found here. Sensitivity to an abmag $\approx$ 30 is required to detect an attenuated edge from a characteristic galaxy with $f^e_{900} \approx 0.003$, ($\log{N_{HI}(cm^{-2})} = 18.0$) out to $z \la$ 1. For redshifts 1 $\la z \la$ 2.9, an abmag of 31 $\la m_{(1+z)900} \la$ 33 is required.} We \replaced{find}{caution} that the escape fraction measured just below the Lyman edge ($f^e_{900}$) at 911.8 \AA\ provides only a lower limit to the fraction of LyC photons that escape as integrated over the entire EUV region ($f^e_{LyC}$). For 18.5 $ > \log{N_{HI}(cm^{-2})} > $17.9, the Lyman edge can appear black (essentially zero) yet the integrated escape fraction can range from 1 to 20\%, depending on the choice of ionization fractions ($\chi_{HI}$, $\chi_{HeI}$). More accurate assessments of the integrated escape fraction could be made from spectroscopic observations that resolve the recovery of flux $\propto (\frac{\lambda}{\lambda_e})^3$; a phenomena that we have dubbed Lyman ``drop-ins''. Observations of the LyC spectral shape could provide, in principle, the following: enhanced fidelity to the determination of the contribution of star-forming galaxies to the MIB; important observational insights into the temperature of the CGM and IGM; and constraints on the survivability and attenuation properties of dust grains with respect to the total gas content in LyC-leaking environments. The uniform screen model adopted here is considerably simpler than the more realistic case of an undulating, highly discontinuous and chaotic ``unity \ion{H}{1} optical depth'' surface of the CGM surrounding a star-forming galaxy, which must have a $\tau$ low enough for LyC radiation to escape. The model should be thought of as a kind of ensemble average of the galaxy's partially covered star-forming regions, wherein much of the total star-formation may be buried by a more heavily attenuating ISM. We suggest a strategy of high spectral and spatial resolution observations in the region longward of the Lyman edge, to guide assessment of the line of sight geometry in coordination with a spectroscopic determination of the degree of partial covering, along with the identification of specific Ly$\alpha$\ forest, LL, and DLA systems that may contribute to the attenuation of objects toward higher redshift. Such information will allow a relaxing of the simple uniform screen model in favor of more realistic radiative transfer models. \deleted{The paucity of current detections to date are broadly consistent with the characteristic flux levels found here. An abmag $\approx$ 30 is required to detect an attenuated edge from a characteristic galaxy with $f^e_{900} \approx 0.003$ out to $z \la$ 1. At 1 $\la z \la$ 2 an abmag $\approx$ 32 is required.} Achieving the goal of a statistically significant characterization of LyC luminosity function evolution out to $z \la$ 3 can be carried out most efficiently with a wide-field multi-object spectroscopic survey supported by photometric observations. An instrument with an effective area, observing time, and spectral bandwidth product of 1.3 $\times$ 10$^{10}$ cm$^{2}$~s~\AA\ at 1800 \AA\ would be sufficient to carry out such a program to a redshift of $z =$ 1. \acknowledgments We acknowledge useful conversations with Brian Fleming, Kevin France, Keith Redwine, Jason Tumlinson, and Harry Ferguson. We thank the anonymous referee for keen suggestions that improved the readability and utility of this article. Support for this work was provided by NASA to the Johns Hopkins University through APRA grants NNX08AM68G, NNX11AG54G, and NNX17AC26G.
\section{Introduction} The fundamental theorem of curves state that curves are determined by curvatures \cite{krey}. Thus, curvature functions provide us with some special and important information about curves. For example, a circular helix is a geometric curve with curvature $\kappa\equiv\textit{cons.}\neq0$, torsion $\tau\equiv\textit{cons.}\neq0$ \cite{mcc}. Straight lines and circles are curves that $\kappa\equiv 0$ and $\kappa\equiv cons.$, $\tau\equiv0$, respectively. Also, These curves are degenerate helices. Helices appear in many different branch of science such as engineering, biology, chemistry, CAD, etc. In addition, curvature functions gives us information about not only curves but also surfaces on which curves lie. The curvatures $\kappa_g \,\, \textit{geodesic curvature}, \kappa_n \,\, \textit{normal curvature}$ and $\tau_g $ \textit{geodesic torsion} charactarize geodesic, asymptotic curve, and line of curvature, respectively. The curves emerges from the solution of some important physical problems. They are also important in the theory of curves and surfaces. For example, geodesics arise from the problem of finding 'shortest curves' joining two points of a surface $M$. It was first considered by Johann Bernoulli (1697). Obviously this is a typically problem of calculus of variations. Also, a curve $C$ on a surface $M$ is called a \textit{geodesic curve} or \textit{geodesic} if its geodesic curvature $\kappa_g$ vanishes identically \cite{krey}. In what follows, we state three different definition lines in planes. We want to emphasize that geodesics can be seen as extension of this idea to curves in surfaces. A "line" on a surfaces can be seen as extension of the familiar properties of lines in the plane: For example, lines are (1) The curves of shortest length joining two points (Archimedes). (2) The curves of plane curvature identically zero (Huygens, Leibniz, Newton). (3) The curves whose tangent and its derivative are linearly dependent \cite{mcc}. As stated in \cite{aligal}, the problem of the determination of the position vector of a space curve with respect to the Frenet frame is still open in the Euclidean space. Generally, it is hard to solve this problem. However, it is solved for some special curves such as plane curves, helix and slant helix \cite{alimin,alieuc,izu}. On the other hand, in the Galilean space $G^3$, the foregoing problem is solved for all curves \cite{aligal}. The main aim of this study is to solve the above problem for all curves on a surface in $G^3$ with respect to the Darboux Frame. Firstly, we determine the position vector of a curve on a surface in $G^3$ in terms of geodesic, normal curvature and geodesic torsion with respect to the Darboux and standard frame. Secondly, we shall give position vectors of some special curves such as geodesic, asymptotic curve, line of curvature on a surface in $G^3$. Also, we will relate foregoing curves with helix, Salkowski curve and anti-Salkowski curve (see (\ref{helsal}) ). That is, we shall give special cases of these curves such as: geodesics that are circular helix, genaralized helix or Salkowski, etc. Furthermore, we provide graphs of some special curves. Last but not least, we want to emphasize that the results of this study can be extended to families of surfaces that have common geodesic curve. \section{Preliminaries} As it is well known, Galilean geometry is associated with the Galilean principle of relativity. The Galilean space $G^{3}$ is one of the Cayley-Klein spaces equipped with the projective metric of signature $\left( 0,0,+,+\right) $ \cite{mol}. The absolute figure of the Galilean space is the ordered triple $\{w,f,I\}$, where $w$ is an ideal (absolute) plane, $f$ is a line (absolute line) in $w$, and $I$ is a fixed eliptic involution of points of $f$. In non-homogeneous coordinates the group of motion of $G^3$ (i.e. the group of isometries of $G^{3}$) has the form define :% \begin{eqnarray} \overline{x} &=&a_1+x, \notag \\ \overline{y} &=&a_2+a_3x+y\cos \varphi +z\sin \varphi , \\ \overline{z} &=&a_4+a_5x-y\sin \varphi +z\cos \varphi, \notag \end{eqnarray}% where $a_1, a_2, a_3, a_4, a_5$, and $\varphi$ are real numbers \cite{pav}. If the first component of a vector is not zero, then the vector is called as non-isotropic, otherwise it is called isotropic vector \cite{pav}. The scalar product of two vectors $\mathbf{v}=(v_{1},v_{2},v_{3})$ and $\mathbf{w}=(w_{1},w_{2},w_{3})$ in $G^{3}$ is defined by $$\mathbf{v}\cdot _{G}\mathbf{w} = \left\{ \begin{array}{lr} v_{1}w_{1} , & \text{if } v_{1}\neq 0 \text{ or } w_{1}\neq 0\, \ \ \ \\ v_{2}w_{2}+v_{3}w_{3} ,& \text{if } v_{1}=0 \text{ and } w_{1}=0\,. \end{array}\right.$$ If $\mathbf{v}\cdot _{G}\mathbf{w}=0$, then $\mathbf{v}$ and $\mathbf{w}$ are perpendicular. In particular, every isotropic vector is perpendicular to every non-isotropic vector. The norm of $\mathbf{v}$ is defined by $$\Vert \mathbf{v}\Vert_{G}=\sqrt{\vert\mathbf{v}\cdot_{G}\mathbf{v}\vert}.$$ Let $I\subset \mathbb R$ and let $\alpha :I\rightarrow G^{3}$ be a curve parameterized by arc length (we abbreviate as p.b.a.l) with curvature $\kappa>0$ and torsion $\tau$. If $\alpha$ is a curve p.b.a.l. that is, \begin{equation*} \alpha \left( x\right) =\left( x,y\left( x\right) ,z\left( x\right) \right) , \end{equation*}% then the Frenet frame fields are given by \begin{eqnarray} T\left(x\right) &=&\alpha ^{\prime }\left( x\right), \notag \\ N\left( x\right) &=& \frac{\alpha''(x)}{\Vert \alpha''(x)\Vert_{G}} \\ B\left( x\right) &=&T(x)\times _{G}B(x) \\&=&\frac{1}{\kappa \left( x\right) }\left( 0, -z^{\prime \prime }\left( x\right) , y^{\prime \prime }\left( x\right) \right) , \notag \end{eqnarray}% where $\kappa \left( x\right) $ and $\tau \left( x\right) $ are defined by% \begin{equation} \kappa \left( x\right) ={\Vert \alpha''(x) \Vert }_{G}, { \ \ }\tau \left( x\right) =\frac{\det \left( \alpha ^{\prime }\left( x\right) ,\alpha ^{\prime \prime }\left( x\right) ,\alpha ^{\prime \prime \prime }\left( x\right) \right) }{\kappa ^{2}\left( x\right) }\,. \end{equation}% Also, where $\times _{G}$ is the pseudo-Galilean cross product defined by \begin{equation} \mathbf v\times _{G}\mathbf w=% \begin{vmatrix} 0 & \mathbf e_{2} &\mathbf {e_{3}} \\ v_{1} & v_{2} & v_{3} \\ w_{1} & w_{2} & w_{3}% \end{vmatrix}% \end{equation}% \newline for $\mathbf{v=}\left( v_{1},v_{2},v_{3}\right) $ and $\mathbf{w=}\left( w_{1},w_{2},w_{3}\right) $ \cite{pav1}. The vectors $T, N $ and $B$ are called the vectors of the tangent, the principal normal and the binormal vector field, respectively \cite{pav1}. Therefore, the Frenet-Serret formulae can be written as \begin{equation} \begin{bmatrix} T \\ N \\ B% \end{bmatrix}% ^{\prime }=% \begin{bmatrix} 0 & \kappa & 0 \\ 0 & 0 & \tau \\ 0 &- \tau & 0% \end{bmatrix}% \begin{bmatrix} T \\ N \\ B% \end{bmatrix}\,. \end{equation}% Frame fields constitute a very useful tool for studying curves and surfaces. However, the Frenet frame ${T, N, B}$ of $\alpha$ is not useful to describe the geometry of surface $M$. Since $N$ and $B$ in general will be neither tangent nor perpendicular to M. Therefore, we require another frame of $\alpha$ for study the relation between the geometry of $\alpha$ and $M$. There is such a frame field that is called Darboux frame field of $\alpha$ with respect to $M$. The Darboux frame field consists of the triple of vector fields ${T, Q, n}$. The first and last vector fields of this frame $T$ and $n$ are a unit tangent vector field of $\alpha$ and unit normal vector field of $M$ at the point $\alpha(x)$ of $\alpha$. Let $Q=n\times_{G}T$ be the tangential-normal. \begin{thm}Let $\alpha :I\subset \mathbb{R}\rightarrow M\subset G^{3}$ be a unit-speed curve, and let {T, Q, n} be the Darboux frame field of $\alpha$ with respect to M. Then \begin{equation}\label{Darboux} \begin{bmatrix} T \\ Q \\ n \end{bmatrix} ^{\prime }= \begin{bmatrix} 0 & \kappa_g & \kappa_n \\ 0 & 0 & \tau_g \\ 0 & -\tau_g & 0 \end{bmatrix} \begin{bmatrix} T \\ Q \\ n \end{bmatrix}\,. \end{equation} where $\kappa_g$ and $\kappa_n$ give the tangential and normal component of the curvature vector, and these functions are called the geodesic and the normal curvature, respectively \cite{sahin}. \end{thm} \begin{proof} We have \begin{equation}\label{c} \begin{split} T'&= (T'\cdot_{G}Q)Q+(T'\cdot_{G}n)n \\&= (\alpha''\cdot_{G}Q)Q+(\alpha''\cdot_{G}n)n \\&=\kappa_g Q + \kappa_n n. \end{split} \end{equation} The other formulae are proved in a similar fashion. \end{proof} Also, (2.7) implies the important relations \begin{equation}\label{kt} \kappa^2(x)=\kappa^2_g(x)+\kappa^2_n(x), \hskip .5cm \tau(x)=-\tau_g(x)+\frac{\kappa'_g(x)\kappa_n(x)-\kappa_g(x)\kappa'_n(x)}{\kappa^2_g(x)+\kappa^2_n(x)} \end{equation} where $\kappa^2(x)$ and $\tau(x)$ are the square curvature and the torsion of $\alpha$, respectively. We refer to \cite{pav, pav1, ros, yag} for detailed treatment of Galilean and pseudo-Galilean geometry. \section{Position vectors of a curve in Galilean space} In this section, we will get an arbitrary curve on a surface in $G^3$. We will analyze position vector of the curve with respect to the Darboux and standard frame in $G^3$. \begin{thm}\label{teo1} The position vector $\beta(x)$ of an arbitrary curve on a surface with respect to the Darboux frame in the Galilean space $G^3$ is given by: \begin{equation}\label{eq00} \begin{split} \beta(x)=(x+c_1)\mathbf{T}&+\Bigg\{-\frac{(x+c_1)\kappa_n(x)}{\tau_g(x)}+\bigg(c_2-\int{f(x)\tau_g(x)\sin{[t(x)]}}\,dx\bigg)\sin{[t(x)]}\\&-\bigg(c_3+\int{f(x)\tau_g(x)\cos{[t(x)]}}\,dx\bigg)\cos{[t(x)]}\Bigg\}\mathbf{Q}\\&+\Bigg\{\bigg(c_2-\int{f(x)\tau_g(x)\sin{[t(x)]}}\,dx\bigg)\cos{[t(x)]}\\&+\bigg(c_3+\int{f(x)\tau_g(x)\cos{[t(x)]}}\,dx\bigg)\sin{[t(x)]}\Bigg\}\mathbf{n} \end{split} \end{equation} where $f(x)=\frac{\lambda_1(x)\kappa_g(x)}{\tau_g(x)}-\bigg(\frac{\lambda_1(x)\kappa_n(x)}{\tau_g(x)}\bigg)'\frac{1}{\tau_g(x)}$ and $t(x)=\int{\tau_g(x)}\,dx$. \end{thm} \begin{proof}Let $\beta(x)$ be an arbitrary curve on a surface in the $G^3$, then, we may express its position vectors with respect to the Darboux frame as follows: \begin{equation}\label{eq0} \beta(x)=\lambda_1(x)\mathbf{T}+\lambda_2(x)\mathbf{Q}+\lambda_3(x)\mathbf{n} \end{equation} where $\lambda_1(x), \lambda_2(x)$ and $\lambda_3(x)$ are differentiable functions of $x\in{I}\subset{\mathbb{R}}$. By differentiating (\ref{eq0}) and using (\ref{Darboux}), we get \begin{equation}\label{eq1} \begin{array}{rl} \lambda'_1(x)-1 &=0 \\ \lambda_1(x)\kappa_g(x)+\lambda'_2(x)-\lambda_3(x)\tau_g(x) & =0\\ \lambda_1(x)\kappa_n(x)+\lambda_2(x)\tau_g(x)+\lambda'_3(x) &=0 \end{array}. \end{equation} The first equation of (\ref{eq1}) leads to \begin{equation}\label{eq1.k} \lambda_1(x)=x+c_1 \end{equation} where $c_1$ is an arbitrary real constant. To solve (\ref{eq1}) for $\lambda_i$, we use the following change of variable $t =\int{\tau_g(x)dx}$ so that \begin{equation}\label{eq2.k} \begin{array}{rl} \lambda_1(t) &= (\lambda_1 \circ x)(t),\\ \tau_g(t) &= (\tau_g \circ x)(t),\\ \\ \lambda_2(t)&=-\frac{\lambda_1(t)\kappa_n(t)}{\tau_g(t)}-\dot{\lambda_3}(t). \end{array} \end{equation} Here, "\,$\dot{}$\," stands for derivative with respect to $t$. Substituting (\ref{eq2.k}) into (\ref{eq1}) we get the following equation \begin{equation} \ddot{\lambda_3}(t)+\lambda_3(t)=\frac{\lambda_1(t)\kappa_g(t)}{\tau_g(t)}-\bigg(\frac{\lambda_1(t)\kappa_n(t)}{\tau_g(t)}\dot{\bigg)}. \end{equation} The general solution becomes \begin{equation}\label{eq3.k} \lambda_3(t)= \bigg[c_2-\int{f(t)\sin{t}}dt\bigg]\cos{t}+\bigg[c_3+\int{f(t)\cos{t}}dt\bigg]\sin{t} \end{equation} where $c_2, c_3$ are arbitrary real constants and $f(t)=\frac{\lambda_1(t)\kappa_g(t)}{\tau_g(t)}-\bigg(\frac{\lambda_1(t)\kappa_n(t)}{\tau_g(t)}\dot{\bigg)}.$ By differentiating (\ref{eq3.k}) and plug the resulting equation into (\ref{eq2.k}), we obtain \begin{equation}\label{eq4} \lambda_2(t)=-\frac{\lambda_1(t)\kappa_n(t)}{\tau_g(t)}+\bigg[c_2-\int{f(t)\sin{t}}dt\bigg]\sin{t}-\bigg[c_3+\int{f(t)\cos{t}}dt\bigg]\cos{t}. \end{equation} As a result the equations (\ref{eq3.k}) and (\ref{eq4}) becomes \begin{equation}\label{eq4*} \begin{split} \lambda_2(x)=-\frac{(x+c_1)\kappa_n(x)}{\tau_g(x)}&+\bigg(c_2-\int{f(x)\tau_g(x)\sin{[t(x)]}}\,dx\bigg)\sin{[t(x)]}\\&-\bigg(c_3+\int{f(x)\tau_g(x)\cos{[t(x)]}}\,dx\bigg)\cos{[t(x)]}. \end{split} \end{equation} and \begin{equation}\label{eq3*} \begin{split} \lambda_3(x)&= \bigg(c_2-\int{f(x)\tau_g(x)\sin{[t(x)]}}\,dx\bigg)\cos{[t(x)]}\\&+\bigg(c_3+\int{f(x)\tau_g(x)\cos{[t(x)]}}\,dx\bigg)\sin{[t(x)]} \end{split} \end{equation} where $f(x)=\frac{\lambda_1(x)\kappa_g(x)}{\tau_g(x)}-\bigg(\frac{\lambda_1(x)\kappa_n(x)}{\tau_g(x)}\bigg)'\frac{1}{\tau_g(x)}$ and $t(x)=\int{\tau_g(x)}\,dx$. Substituting equations (\ref{eq1.k}), (\ref{eq4*}) and (\ref{eq3*}) to (\ref{eq0}) we obtain (\ref{eq00}). This completes the proof. \end{proof} \begin{thm}\label{teo2} The position vector $\beta(x)$ of an arbitrary curve on a surface with respect to the standard frame in the Galilean space $G^3$ is computed from the natural representation form: \begin{equation}\label{eq11} \begin{split} \beta(x)=\Bigg(x,& \int\bigg[\int\Big(\kappa_g(x)S_{\tau_g}-\kappa_n(x)\int{\tau_g(x)S_{\tau_g}\, dx}\Big)\, dx\bigg]\, dx,\\& \int\bigg[\int\Big(\kappa_g(x)C_{\tau_g}-\kappa_n(x)\int{\tau_g(x)C_{\tau_g}\, dx} \Big)\, dx\bigg]\, dx\Bigg) \end{split} \end{equation} where $C_{\tau_g}=\cos\big[\int{\tau_g(x)}\,dx\big]$ and $S_{\tau_g}=\sin\big[\int{\tau_g(x)}\,dx\big]$. \end{thm} \begin{proof}If $\beta(x)$ is a curve on a surface in Galilean space $G^3$, then the Frenet equations (\ref{Darboux}) are hold. It is easy to see that the following differential equation is obtained by using (\ref{Darboux}). $$\bigg(\frac{1}{\tau_g(x)}\mathbf{Q'(x)}\bigg)'=-\tau_g(x)\mathbf{Q(x)}$$ The above equation can be written in the form \begin{equation}\label{eqQ} \frac{d^2\mathbf{Q}}{dt^2}+\mathbf{Q}=0, \end{equation} where $t$ is the new variable that equals to $t =\int\tau_g(x)\,dx$. Thus, we can write $\mathbf{Q}$ as follows: \begin{equation}\label{eqQ1} \mathbf{Q}=\big(0, \sin[\theta(t)], \cos[\theta(t)]\big) \end{equation} If we substitute (\ref{eqQ1}) into (\ref{eqQ}), and solve componentwise, we get the following two equations $$\dot{\theta}(t)=\pm1, \hskip1cm \ddot{\theta}(t)=0$$ which lead to $\theta(t) = \pm t = \pm \int \tau_g(x)\,dx$. Without loss of generality, we can assume that $\theta(t)$ has a positive sign. Then we get \begin{equation}\label{eqQx} \mathbf{Q}(x)=\bigg(0, \sin[\int \tau_g(x)\, dx], \cos[\int \tau_g(x)\, dx]\bigg). \end{equation} From (\ref{Darboux}), we obtain \begin{equation*} \begin{split} \mathbf{n}(x)&=-\int \tau_g(x)\mathbf{Q}(x)\, dx\\ &=-\int \tau_g(x) \bigg(0, \sin[\int \tau_g(x)\, dx], \cos[\int \tau_g(x)\, dx]\bigg)\, dx + \mathbf{c} \end{split} \end{equation*} where $\mathbf{c}$ is a constant vector. Since the first component of normal vector is zero, then we can take $\mathbf{c} = (0, 0, 0)$, and then \begin{equation}\label{eqNx} \mathbf{n}(x)=\Bigg(0, \cos\bigg(\int \tau_g(x)\, dx\bigg), -\sin\bigg(\int \tau_g(x)\, dx\bigg)\Bigg) \end{equation} From (\ref{eqQx}) and (\ref{Darboux}), we have \begin{equation} \begin{split} \mathbf{T'}(x)&=\kappa_g(x)\mathbf{Q}(x)+\kappa_n(x)\mathbf{n}(x)\\ &=\kappa_g(x)\bigg(0, \sin[\int \tau_g(x)\, dx], \cos[\int \tau_g(x)\, dx]\bigg)\\ &+\kappa_n(x)\bigg(0, -\int \tau_g(x)\sin[\int \tau_g(x)\, dx]\, dx, -\int \tau_g(x)\cos[\int \tau_g(x)\, dx]\, dx\bigg)\\ &=\bigg(0, \kappa_g(x) \sin[\int \tau_g(x)\, dx]- \kappa_n(x)\int \tau_g(x)\sin[\int \tau_g(x)\, dx]\, dx\\ &\hskip1cm, \kappa_g(x) \cos[\int \tau_g(x)\, dx]-\kappa_n(x)\int \tau_g(x)\cos[\int \tau_g(x)\, dx]\, dx\bigg). \end{split} \end{equation} If we let $C_{\tau_g}=\cos[\int \tau_g(x)\, dx]$ and $S_{\tau_g}=\sin[\int \tau_g(x)\, dx]$, then we have \begin{equation}\label{T'(x)} \mathbf{T'}(x)=\bigg(0, \kappa_g(x) S_{\tau_g}- \kappa_n(x)\int \tau_g(x)S_{\tau_g}\, dx, \kappa_g(x) C_{\tau_g}-\kappa_n(x)\int \tau_g(x)C_{\tau_g}\, dx\bigg). \end{equation} Taking the integral of (\ref{T'(x)}) with respect to, we get \begin{equation} \mathbf{T}(x)=\bigg(0, \int\Big(\kappa_g(x) S_{\tau_g}- \kappa_n(x)\int \tau_g(x)S_{\tau_g}\, dx\Big)\,dx, \int\Big(\kappa_g(x) C_{\tau_g}-\kappa_n(x)\int \tau_g(x)C_{\tau_g}\, dx\Big)\,dx\bigg)+\mathbf{d} \end{equation} where $\mathbf{d}$ is a constant vector. Since the first component of tangent vector is one, we can take $\mathbf{d} = (1, 0, 0)$, and then \begin{equation}\label{T(x)} \mathbf{T}(x)=\bigg(1, \int\Big(\kappa_g(x) S_{\tau_g}- \kappa_n(x)\int \tau_g(x)S_{\tau_g}\, dx\Big)\,dx, \int\Big(\kappa_g(x) C_{\tau_g}-\kappa_n(x)\int \tau_g(x)C_{\tau_g}\, dx\Big)\,dx\bigg). \end{equation} Integrating (\ref{T(x)}) with respect to $x$, we have \begin{equation} \begin{split} \beta(x)=\Bigg(x,& \int\bigg[\int\Big(\kappa_g(x)S_{\tau_g}-\kappa_n(x)\int{\tau_g(x)S_{\tau_g}\, dx}\Big)\, dx\bigg]\, dx,\\& \int\bigg[\int\Big(\kappa_g(x)C_{\tau_g}-\kappa_n(x)\int{\tau_g(x)C_{\tau_g}\, dx} \Big)\, dx\bigg]\, dx\Bigg) \end{split} \end{equation} where $C_{\tau_g}=\cos\big[\int{\tau_g(x)}\,dx\big]$ and $S_{\tau_g}=\sin\big[\int{\tau_g(x)}\,dx\big]$ which leads to the equation (\ref{eq11}) and the proof is complete. \end{proof} \section{Applications} We begin a study of important special curves lying on surfaces. For example, geodesic, asymtotic and curvature (or principal) line. Let $\beta$ be regular curve on the oriented surface in $G^3$ with the curvature $\kappa$, the torsion $\tau$, the geodesic curvature $\kappa_g$, the normal curvature $\kappa_n$ and the geodesic torsion $\tau_g$. \begin{defn}\label{defgap} We can say that $\beta$ is \begin{equation*} \begin{split} geodesic \, curve &\Longleftrightarrow \kappa_g\equiv 0, \\asymptotic \, curve & \Longleftrightarrow \kappa_n\equiv 0, \\line \, of \, curvature & \Longleftrightarrow \tau_g\equiv 0. \end{split} \end{equation*} Also, We can say that $\beta$ is called: \begin{equation}\label{helsal} \begin{array}{ccc} \kappa, \tau & \hskip 1cm& \beta\\ \hline \kappa\equiv0 &\Longrightarrow &\textbf{a straight line.}\\ \tau\equiv0 &\Longrightarrow &\textbf{a plane curve.}\\ \kappa\equiv\textit{cons.$>$0},\tau\equiv\textit{cons.$>$0} &\Longrightarrow &\textbf{a circular helix or W-curve.}\\ \frac{\tau}{\kappa}\equiv\textit{cons.} &\Longrightarrow &\textbf{a generalized helix.}\\ \kappa\equiv\textit{cons.}, \tau\nequiv\textit{cons.} &\Longrightarrow &\textbf{Salkowski curve \cite{mon,sal}.}\\ \kappa\nequiv\textit{cons.}, \tau\equiv\textit{cons.} &\Longrightarrow &\textbf{anti-Salkowski curve \cite{sal}.}\\ \end{array} \end{equation} \end{defn} \subsection{The position vector of a family of geodesic line in the Galilean space $G^3$} \begin{thm}\label{geo} The position vector $\beta_g(x)$ of a family of geodesic line in Galilean space $G^3$ is given by \begin{equation} \mathbf{\beta_g}(x)=\Bigg(x, -\int\int\kappa_n(x)\int\tau_g(x)S_{\tau_g}\,dx\,dx\,dx, \\ -\int\int\kappa_n(x)\int\tau_g(x)C_{\tau_g}\,dx\,dx\,dx\Bigg). \end{equation} \end{thm} \begin{proof} By using $\kappa_g(x)\equiv0$ in the equation (\ref{eq11}), we obtain the above equation. \end{proof} \begin{cor} The position vector of a geodesic that is a circular helix is defined by the equation $$\mathbf{\beta_{g_{ch}}(x)}=\Bigg(x,-\frac{e}{c^2}\cos(cx+c_1)+e_1x^2+e_2x+e_3, \frac{e}{c^2}\sin(cx+c_1)+f_1x^2+f_2x+f_3\Bigg)$$ where $c,c_1, e, e_1, e_2, e_3, f_1, f_2$ and $f_3$ are constants. \end{cor} \begin{proof} By using the definition (\ref{defgap}) and the equations (\ref{kt}) in (\ref{geo}), we get the above equation. \end{proof} \begin{cor} The position vector of a geodesic that is a generalized helix is defined by the equation $$\mathbf{\beta_{g_{gh}}(x)}=\Bigg(x,\int\int\kappa_n(x)\Big[\cos\Big(d\int\kappa_n(x)dx\Big)+d_1\Big]dxdx, -\int\int\kappa_n(x)\Big[\sin\Big(d\int\kappa_n(x)dx\Big)+d_2\Big]dxdx\Bigg)$$ where $d, d_1$ and $d_2$ are constants. \end{cor} \begin{proof} By using the definition (\ref{defgap}) and the equations (\ref{kt}), we obtain $\tau_g(x)=d\kappa_n(x)$. By using this equation in (\ref{geo}), we get the above equation. \end{proof} \begin{cor} The position vector of a geodesic that is a Salkowski curve is defined by the equation $$\mathbf{\beta_{g_{s}}(x)}=\Bigg(x,m\int\int\bigg( \cos\Big(\int\tau_g(x)dx\Big)+m_1\bigg)dxdx, -m\int\int\bigg( \sin\Big(\int\tau_g(x)dx\Big)+m_2\bigg)dxdx\Bigg)$$ where $m, m_1$ and $m_2$ are constants. \end{cor} \begin{proof} By using the definition (\ref{defgap}) and the equations (\ref{kt}), we obtain $\kappa_n(x)\equiv d(const.)$ and $\tau_g(x)\nequiv const.$. By using this equation in (\ref{geo}), we get the above equation. \end{proof} \begin{cor} The position vector of a geodesic that is a anti-Salkowski curve is defined by the equation $$\mathbf{\beta_{g_{as}}(x)}=\Bigg(x,\int\int\Big(\kappa_n(x) \Big[\cos(bx+b_1)+b_2\Big]\Big)dxdx, -\int\int\Big(\kappa_n(x) \Big[\sin(bx+b_1)+b_3\Big]\Big)dxdx\Bigg)$$ where $b, b_1, b_2$ and $b_3$ are constants. \end{cor} \begin{proof} By using the definition (\ref{defgap}) and the equations (\ref{kt}), we obtain $\tau_g(x)\equiv b(const.)$ and $\kappa_n(x)\nequiv const.$. By using this equation in (\ref{geo}), we get the above equation. \end{proof} \subsection{The position vector of a family of asymptotic line in the Galilean space $G^3$} \begin{thm}\label{asym} The position vector $\beta_a(x)$ of a family of asymptotic line in Galilean space $G^3$ is given by \begin{equation}\label{asymeq} \mathbf{\beta_a}(x)=\Bigg(x, \int\int\kappa_g(x) \sin\bigg(\int{\tau_g(x)}\,dx\bigg)\,dx\,dx, \int\int\kappa_g(x) \cos\bigg(\int{\tau_g(x)}\,dx\bigg)\,dx\,dx\Bigg) \end{equation} \end{thm} \begin{proof} By using $\kappa_n(x)\equiv0$ in the equation (\ref{eq11}), we obtain the above equation. \end{proof} \begin{cor} The position vector of a asymptotic that is a circular helix is defined by the equation $$\mathbf{\beta_{a_{ch}}(x)}=\Bigg(x,-\frac{e}{c^2}\sin(cx+c_1)+c_2x+c_3, -\frac{e}{c^2}\cos(cx+c_1)+c_4x+c_5\Bigg)$$ where $c,c_1,c_2, c_3, c_4, c_5$ and $e$ are constants. \end{cor} \begin{proof} By using the definition (\ref{defgap}) and the equations (\ref{kt}) in (\ref{asymeq}), we obtain $\kappa_g(x)\equiv e, \tau_g(x)\equiv c$ where $e$ and $c$ are constants. By using this relation in (\ref{asymeq}), we get the above equation. \end{proof} \begin{cor} The position vector of a asymptotic that is a generalized helix is defined by the equation $$\mathbf{\beta_{a_{gh}}(x)}=\Bigg(x,-\frac{1}{k}\int \cos\Big(k\int\kappa_g(x)dx\Big)dx+k_1x+k_2, \frac{1}{k}\int \sin\Big(k\int\kappa_g(x)dx\Big)dx+k_3x+k_4\Bigg)$$ where $k, k_1,k_2,k_3$ and $k_4$ are constants. \end{cor} \begin{proof} By using the definition (\ref{defgap}) and the equations (\ref{kt}), we obtain $\tau_g(x)=k\kappa_g(x)$ where $k$ is a constant. By using this relation in (\ref{asymeq}), we get the above equation. \end{proof} \begin{cor} The position vector of a asymptotic that is a Salkowski curve is defined by the equation $$\mathbf{\beta_{a_{s}}(x)}=\Bigg(x,\int\int\bigg(e \sin\Big(\int\tau_g(x)dx\Big)\bigg)dxdx, \int\int\bigg(e \cos\Big(\int\tau_g(x)dx\Big)\bigg)dxdx\Bigg)$$ where $e$ is a constant. \end{cor} \begin{proof} By using the definition (\ref{defgap}) and the equations (\ref{kt}), we obtain $\kappa_g(x)\equiv e(const.)$ and $\tau_g(x)\nequiv const.$. By using this equation in (\ref{asymeq}), we get the above equation. \end{proof} \begin{cor} The position vector of a asymptotic that is a anti-Salkowski curve is defined by the equation $$\mathbf{\beta_{a_{as}}(x)}=\Bigg(x,\int\int\Big(\kappa_g(x) \sin(dx+d_1)\Big)dxdx, \int\int\Big(\kappa_g(x) \cos(dx+d_1)\Big)dxdx\Bigg)$$ where $d$ and $d_1$ are constants. \end{cor} \begin{proof} By using the definition (\ref{defgap}) and the equations (\ref{kt}), we obtain $\tau_g(x)\equiv d(const.)$ and $\kappa_g(x)\nequiv const.$. By using this equation in (\ref{asymeq}), we get the above equation. \end{proof} \subsection{The position vector of a family of line of curvature in the Galilean space $G^3$} \begin{thm}\label{cur} The position vector $\beta_c(x)$ of a family of line of curvature in Galilean space $G^3$ is given by \begin{equation} \mathbf{\beta_p}(x)=\Bigg(x, \int\int\Big(c_1\kappa_g(x)- c_2\kappa_n(x)\Big)\,dx\,dx, \int\int\Big(c_3\kappa_g(x)-c_4\kappa_n(x)\Big)\,dx\,dx\Bigg) \end{equation} where $c_1, c_2, c_3$ and $c_4$ are constants. \end{thm} \begin{proof} By using $\tau_g(x)\equiv0$ in the equation (\ref{Darboux}), we obtain the above equation. \end{proof} \begin{cor} The position vector of a line of curvature is a circular helix if and only if the below system of differential equations is satisfied. \begin{equation}\label{pcheq} \begin{split} \kappa_g(x)\kappa'_g(x)+\kappa_n(x)\kappa'_n(x) &=0,\\ \kappa_n(x)\kappa''_g(x)-\kappa_g(x)\kappa''_n(x) &=0. \end{split} \end{equation} \end{cor} \begin{proof} By using the definition (\ref{helsal}) and the equations (\ref{kt}), we get the above equation. \end{proof} \textit{Special Case:} If $\kappa_g(x)$ and $\kappa_n(x)$ are constant functions, then the equation (\ref{pcheq}) is satisfied. Therefore, the line of curvature with $\kappa_g(x)\equiv const.$ and $\kappa_n(x)\equiv const.$ is a circular helix, and its position vector is defined by \begin{equation} \mathbf{\beta_{p_{ch}}}(x)=\Big(x, a_1x^2+a_2x+a_3, b_1x^2+b_2x+b_3\Big) \end{equation} where $a_1, a_2, a_3$ and $b_1,b_2, b_3$ are constants. \begin{cor} The position vector of a line of curvature is a generalized helix if and only if the below differential equation is satisfied. \begin{equation}\label{pgheq} \kappa''_g\kappa_n^3+\kappa''_g\kappa_n\kappa_g^2-\kappa_n^2\kappa_g\kappa''_n-3\kappa_n^2\kappa'_g\kappa'_n-3\kappa_n\kappa_g{\kappa'_g}^{2} +3\kappa_n\kappa_g{\kappa'_n}^{2}-\kappa_g^3\kappa''_n+3\kappa_g^2\kappa'_g\kappa'_n=0 \end{equation} \end{cor} \begin{proof} By using the definition (\ref{helsal}) and the equations (\ref{kt}), we get the above equation. \end{proof} \begin{cor}\label{pseq} The position vector of a line of curvature is a Salkowski curve if and only if the following equation is satisfied: \begin{equation*} \kappa_g\kappa'_g+\kappa_n\kappa'_n=0 \end{equation*} \end{cor} \begin{proof} By using the definition (\ref{helsal}) and the equations (\ref{kt}), we get the above equation. \end{proof} \begin{cor} The position vector of a line of curvature is a anti-Salkowski curve if and only if the following equation is satisfied: \begin{equation}\label{paseq} \kappa''_g\kappa_g^2\kappa_n+\kappa''_g\kappa_n^3-\kappa''_n\kappa_g^3-\kappa''_n\kappa_g\kappa_n^2-2{\kappa'_g}^2\kappa_g\kappa_n+2\kappa'_g\kappa'_n\kappa_g^2-2\kappa'_g\kappa'_n\kappa_n^2+2{\kappa'_n}^2\kappa_g\kappa_n=0 \end{equation} \end{cor} \begin{proof} By using the definition (\ref{helsal}) and the equations (\ref{kt}), we get the above equation. \end{proof} We now consider an example for geodesic curve on surface along with their graphs. \begin{example} In \eqref{geo}, if we let $\kappa(x)=\sin x$ and $\tau(x)\equiv1$, we obtain $$\displaystyle \alpha(x) = \Bigg(x, \frac{x-\sin(x)\cos(x)}{4}, \frac{\sin(x)^2-x^2}{4}\Bigg)$$. A surface on which this curve lies can be taken as follows: $$\phi(u,v)=\Bigg(u+v, \frac{u-\sin(u+v)\cos(u+v)}{4}, \frac{\sin(u+v)^2-u^2}{4}\Bigg)$$ \end{example} \begin{figure} \centering \includegraphics[width=0.4\textwidth]{buketsekil2.png} \caption{The geodesic curve}\label{fig1:} \end{figure} \begin{figure} \centering \includegraphics[width=0.8\textwidth]{buketsekil1.png} \caption{The surface}\label{fig1:} \end{figure} \section{Conclusions} This study is obtained the position vectors of all curves on a surface in $G^3$ with respect to the Darboux Frame. Firstly, the position vector of a curve on a surface in $G^3$ in terms of geodesic, normal curvature and geodesic torsion with respect to the Darboux and standard frame is investigated. As result of these, position vectors of some special curves such as geodesic, asymptotic curve, line of curvature on a surface is obtained in $G^3$. Consequently, relations of foregoing curves with helix, Salkowski curve and anti-Salkowski curve are given(see (\ref{helsal}) ). That is, special cases of these curves such as: geodesics that are circular helix, genaralized helix or Salkowski, etc is given. Furthermore, the graphs of some special curves is drawn . In the light of these results, we will study special smarandache curves with respect to Darboux frame in $G^3$ using these paper (arXiv 1707.03935v1). Also, we want to emphasize that the results of this study can be extended to families of surfaces that have common geodesic, asymptotic curve and line of curvature. \ack This study was supported financially by the Research Centre of Amasya University (Project No: FMB-BAP16-0213).
\section{Introduction} \label{section:introduction} \input{texfiles/introduction} \section{Knowledge Base} \label{section:knowledgebase} \input{texfiles/knowledgebase} \section{System Overview} \label{section:systemarch} \input{texfiles/framework} \section{Comparison with existing NLP systems} \label{section:relatedwork} \input{texfiles/relatedwork} \section{Conclusion and Future Work} \label{section:conclusion} \input{texfiles/conclusion} \section*{Acknowledgements} \label{section:acknowledgements} \input{texfiles/acknowledgements} \bibliographystyle{emnlp_natbib} \subsection{First pass \label{firstpass}} The first pass of the algorithm iterates over all mentions in the document text and disambiguates mentions that have: \begin{itemize}[noitemsep,nolistsep] \item Only one candidate entity: In this case, the algorithm disambiguates the mention to the lone candidate entity. \item Two candidate entities with one being \textbf{NIL}/\textbf{MISC}: In this case, the algorithm disambiguates the mention to the candidate entity with high \emph{Mention-Entity-Cooccurr} prior probability (above $\lambda_{1}$ - Easy Mention Disambiguation threshold with \textbf{NIL}). \item Three or more candidate entities with one entity mapping with very high prior: In this case, the algorithm disambiguates the mention to the candidate entity with high \emph{Mention-Entity-Cooccurr} prior probability (above $\lambda_{2}$ - Easy Mention Disambiguation threshold). \end{itemize} Mentions disambiguated in the first pass constitute the set $\mathbb{M}_{easy}$ and their corresponding disambiguated entities constitute the set $\mathbb{E}_{easy}$. The remaining ambiguous mentions constitute the set $\mathbb{M}_{hard}$ and are disambiguated in the second pass. \subsection{Second pass} The second pass of the algorithm uses several context-independent and context-dependent features as well as supervised classifiers to label and score the candidate entities for each hard mention and finally disambiguate it. \subsubsection{\textbf{Features}} \label{sec:features} We use several language agnostic features to classify each candidate entity for each hard mention as `True' or `False'. These include both context-independent (useful for disambiguating and linking entities in short and sparse texts such as tweets) as well as context-dependent features (useful for disambiguating and linking entities in long and rich text). Each feature produces a real value in [0.0,1.0]. The context independent features are: \begin{itemize}[noitemsep,nolistsep] \item \textbf{Mention-Entity Cooccurrence} (\emph{Mention-Entity-Cooccurr}) - This feature value is equal to the \emph{Mention-Entity-Cooccurr} prior probability. \item \textbf{Mention-Entity Jaccard Similarity} (\emph{Mention-Entity-Jaccard}) - This reflects the similarity between the mention $M_{i}$ and the representative name of a candidate entity $E_{j}$. The mention and the entity display names are first tokenized and the Jaccard similarity is then computed between the token sets as \small $$ {{Tokens(M_{i}) \cap Tokens(E_{j})} \over {Tokens(M_{i}) \cup Tokens(E_{j})}} $$ \normalsize For instance, the mention \emph{Marvel} could refer to the entities \emph{Marvel Comics} or \emph{Marvel Entertainment}, both of which have a Jaccard Similarity of 0.5 with the mention. \item \textbf{Entity Importance} (\emph{Entity-Importance}) - This reflects the importance or the relevance of the candidate entity as determined by an entity scoring and ranking algorithm \cite{Bhattacharyya-importance} which ranks the top 1 million entities occurring in our KB. For instance, the entity \emph{Apple Inc.} has an importance of 0.66 while \emph{Apple (fruit)} has an importance of 0.64 as ranked by the Entity Scoring algorithm. \end{itemize} \begin{figure}[t] \centering \includegraphics[width=75mm ,height=35mm]{figures/TopicOntologySemanticDistance.pdf} \vspace{-0.1in} \caption{Semantic distance between topics in Klout Topic Ontology Space} \label{fig:topicsimdist} \vspace{-0.1in} \end{figure} For the following context dependent features, we assume that for a candidate entity $E_{i}$, we maintain an entity context C'($E_{i}$) which contains a window $\mathbb{E}'_{i}$ of \emph{W} disambiguated easy entities immediately surrounding $E_{i}$. \begin{itemize}[noitemsep,nolistsep] \item \textbf{Entity Entity Cooccurrence} (\emph{Entity-Entity-Cooccurr}) - This feature value is equal to the averaged co-occurrence of a candidate entity with the disambiguated easy entities in $\mathbb{E}'_{i}$ and is computed as: \small $$ {\sum_{j=1}^{W} Co-occurrence-count (E_{i}, E_{j}) \over {W}} \forall E_{j} \in \mathbb{E}'_{i} $$ \normalsize \item \textbf{Entity Entity Topic Semantic Similarity} (\emph{Entity-Entity-Topic-Sim}) - As mentioned in Section \ref{subsection:OfflineDictionary}, each entity in our KB is associated with a finite number of topics in our topic ontology. For instance, entity \emph{Apple Inc.} maps to the topic `Apple' and \emph{Google Inc.} maps to the topic `Google' while `\emph{Apple (fruit)}' will map to the topic `Food'. Figure \ref{fig:topicsimdist} shows a partial view of the ontology for the above mentioned topics. For each candidate entity $E_{i}$ of a hard mention $M_{i}$, we compute the minimum \emph{semantic distance} of its topics with topics of each entity in $\mathbb{E}'_{i}$ over all possible paths in our topic ontology space. The similarity is the inverse of the distance. For instance, consider the hard mention \emph{Apple}, having two candidate entities - \emph{Apple Inc.} and \emph{Apple (fruit)} for it, and $\mathbb{E}'_{i}$ containing the entity \emph{Google Inc.} which has been disambiguated. As shown in Figure \ref{fig:topicsimdist}, the semantic distance between the topics for \emph{Apple Inc.} and \emph{Google Inc.} is 4 while the semantic distance between the topics for \emph{Apple (fruit)} and \emph{Google Inc.} is 5. As a result, it is more likely that \emph{Apple} disambiguates to \emph{Apple Inc}. Thus, we first determine the set of topics $\mathbb{T}_{i}$ that the candidate entity $E_{i}$ is associated with. For each entity $E_{j}$ in $\mathbb{E}'_{i}$, we generate the set of topics $\mathbb{T}_{j}$. The feature value is computed as \small $$ \max {1 \over distance (t_{i}, t_{j})} \forall t_{i} \in \mathbb{T}_{i}, t_{j} \in \mathbb{T}_{j} $$ \normalsize \end{itemize} \begin{figure*}[t] \centering \includegraphics[width=\textwidth,height=80mm]{figures/RunningExample.pdf} \vspace{-0.3in} \caption{Disambiguation of a sample sentence (best viewed in color)} \label{fig:sample} \vspace{-0.1in} \end{figure*} \subsubsection{\textbf{Classification and Scoring}} As a penultimate step in the second pass, the computed features are combined into a feature vector for a candidate entity and the Decision Tree classifier labels the feature vector as `True' or `False'. In addition, for each candidate entity, we also generate final scores using weights generated by the Logistic Regression classifier that we trained in Section \ref{subsubsec:class}. We use an ensemble of the two classifiers in the final disambiguation step as it helps overcome the individual bias of each classifier. \subsubsection{\textbf{Final Disambiguation}} The final disambiguation step needs to select one of the labeled candidate entities as the disambiguated entity for the mention. However, multiple cases arise at the time of disambiguation: \begin{itemize}[noitemsep,nolistsep] \item Only one candidate entity is labeled as `True'- Here, the algorithm selects that entity as the disambiguated entity for the given mention. \item Multiple candidate entities labeled as `True' - Here, the algorithm selects the highest scoring entity (from among those labeled `True') as the disambiguated entity except when this entity is \textbf{NIL}/\textbf{MISC}. In that case, the algorithm checks the \emph{margin of gain} or the score difference between the \textbf{NIL}/\textbf{MISC} entity and the next highest scoring entity that is labeled `True'. If the margin of gain is less than a threshold (less than \textbf{NIL} margin of gain threshold, $\lambda_{3}$) then the next highest scoring entity (from among those labeled `True') is selected. \item All candidate entities labeled as `False' - Here, the algorithm selects the highest scoring entity as the disambiguated entity except when this entity is \textbf{NIL}/\textbf{MISC}. In that case, the algorithm checks the margin of gain for this entity over the next highest scoring entity. If the margin of gain is less than a threshold (less than \textbf{NIL} margin of gain threshold, $\lambda_{3}$) then the next highest scoring entity is selected. \end{itemize} \subsection{Demonstrative Example}\label{sec:demoex} To demonstrate the efficacy of our algorithm, let's disambiguate the sample text: \emph{``Google CEO Eric Schmidt said that the competition between Apple and Google and iOS vs. Android is `the defining fight of the tech industry.' ".} Figure \ref{fig:sample} walks through the disambiguation of the sample text. The Text Preprocessing stages extract the mentions (highlighted in bold) and generate the candidate entities and the prior cooccurrence scores for each mention\@ifstar\footnote@star\footnote@nostar{Though our algorithm utilizes the Freebase machine id for each candidate entity, we only show the entity name for clarity.}. As shown, the extracted mentions and their candidate entities are: \begin{itemize}[noitemsep,nolistsep] \item \emph{Google} - \textbf{NIL} and \emph{Google Inc.} \item \emph{CEO} - \textbf{NIL} and \emph{Chief Executive} \item \emph{Eric Schmidt} - \textbf{NIL} and \emph{Eric Schmidt} \item \emph{Apple} - \textbf{NIL}, \emph{Apple (fruit)}, \emph{Apple Inc.} and \emph{Apple Records} \item \emph{iOS} - \textbf{NIL} and \emph{iOS} \item \emph{Android} - \textbf{NIL}, \emph{Android (OS)} and \emph{Android(robot)} \item \emph{tech industry} - \emph{Technology} \end{itemize} In the first pass, the algorithm disambiguates the easy mentions. Based on their high prior scores and number of candidate entities, it disambiguates \emph{Eric Schmidt}, \emph{iOS} and \emph{tech industry} (highlighted in color) to their correct entities. In the second pass, it uses the easy mention window and computes several context dependent and independent features to score and classify the candidate entities of the hard mentions. Note that for the purpose of clarity and simplicity, we are not walking through the feature and final score computation. As shown, for the remaining hard entities, it has classified the candidate entities as `True' or `False'. In the final disambiguation step, it selects one of the labeled entities as the correct disambiguated entity. In the sample sentence, for all the mentions, only one of the candidate entities is labeled as `True', and hence the algorithm selects that entity as the disambiguated entity for each mention. \subsection{Test datasets} Using the process described in Section \ref{data_set}, we generated a ground truth test set of 20 English Wikipedia pages which had a total of 18,773 mentions. \subsection{Metrics} We use standard performance metrics like precision, recall, f-score and accuracy to evaluate our NLP system components on the test sets. Precision, recall, f-score and accuracy are calculated as: $ \textnormal{P} = {{\textnormal{$t_{p}$}} \over {\textnormal{$t_{p} $+ $f_{p}$}}} $, $ \textnormal{R}= {{\textnormal{$t_{p}$}} \over {\textnormal{$t_{p}$ + $f_{n}$}}} $, $ \textnormal{F1}= {{2 \times \textnormal{P} \times \textnormal{R}} \over {\textnormal{P + R}}} $ and $ \textnormal{Accuracy} = {{\textnormal{$t_{p}$ + $t_{n} $}} \over {\textnormal{$t_{p}$ + $t_{n}$ + $f_{p}$ + $f_{n}$}}} $ \subsection{Results}\label{sec:results} \subsection{Runtime Performance} The Lithium NLP system has been built to run in a bulk manner as well as a REST API service. The two major challenges that we faced while developing the system were the volume of new data that we process in bulk daily and limited computational capacity. These challenges had a significant influence on our system design and algorithmic approach. As a demonstrative example, the most consuming task in our MapReduce cluster processes around 910 million documents, with an average document size of 169 bytes, taking about 2.2ms per document. Our MapReduce cluster has around 150 Nodes each having a 2.5 GHz Xeon processor. The processing is distributed across 400 reducers. The Reduce step takes about 2.5 hrs. Each reducer task runs as a single thread with an upper bound of 7GB on memory where the processing pipeline and models utilize 3.7GB. A more detailed breakdown of the computational performance of our system as a function of document length is shown in Figure \ref{fig:processing_times}. The overall performance of the system is a linear function of text length. We also analyze this performance for different languages as well as for different stages of the Lithium NLP pipeline. \subsection{Offline Resource Generation \label{subsection:resourcegeneration}} In this phase, we generate several dictionaries that capture language models, probabilities and relations across entities and topics, by leveraging various multi-lingual data sources. Some of these dictionaries are derived using our DAWT\@ifstar\footnote@star\footnote@nostar{\url{https://github.com/klout/opendata/tree/master/wiki_annotation}} data set \cite{Spasojevic:dawt} that consists of densely annotated wikipedia pages across multiple languages. It is 4.8 times denser than Wikipedia and is designed to be exhaustive across several domains. The dictionaries generated from the DAWT dataset are: \begin{itemize \item \textbf{Mention-Entity Co-occurrence} - This dictionary captures the prior probability that a mention $M_{i}$ refers to an entity $E_{j}$ (including \textbf{NIL} and \textbf{MISC}) within the DAWT dataset and is equivalent to the cooccurrence probability of the mention and the entity: \small $${{count (M_{i} \rightarrow E_{j})} \over {count (M_{i})}}$$ \normalsize For instance, mention \emph{Michael Jordan} can link to \textbf{Michael Jordan (Professor)} or \textbf{Michael Jordan (Basketball player)} with different prior probabilities. Moreover, we generate a separate dictionary for each language. \item \textbf{Entity-Entity Co-occurrence} - This dictionary captures co-occurrence frequencies among entities by counting all the entities that simultaneously appear within a sliding window of 50 tokens. Moreover, this data is accumulated across all languages and is language independent in order to capture better relations and create a smaller memory footprint when supporting additional languages. Also, for each entity, we consider only the top 30 co-occurring entities which have at least 10 or more co-occurrences across all supported languages. For instance, entity \textbf{Michael Jordan (Basketball player)} co-occurs with entities \textbf{Basketball}, \textbf{NBA} etc. while entity \textbf{Michael Jordan (Professor)} co-occurs with entities \textbf{Machine Learning}, \textbf{Artificial Intelligence}, \textbf{UC Berkeley} etc. \end{itemize} We also generate additional dictionaries: \begin{itemize \item \textbf{Entity Importance} - The entity importance score \cite{Bhattacharyya-importance} is derived as a global score identifying how important an extracted entity is for a casual observer. This score is calculated using linear regression with features capturing popularity within Wikipedia links, and importance of the entity within Freebase. We used signals such as Wiki page rank, Wiki and Freebase incoming and outgoing links, and type descriptors within our KB etc. \item \textbf{Topic Parents} - This dictionary contains the parent topics for each topic in the Klout Topic Ontology \@ifstar\footnote@star\footnote@nostar{\url{https://github.com/klout/opendata/tree/master/klout_topic_ontology}} (KTO) - a manually curated ontology built to capture social media users' interests and expertise scores, in different topics, across multiple social networks. As of April 2017, it consists of roughly 8,030 topic nodes and 13,441 edges encoding hierarchical relationships among them. \item \textbf{Topic Hashtags} - This dictionary contains hashtags recommended for topics in KTO. We determine the hashtags via co-occurrence counts of topics and hashtags, importance, recency and popularity of hashtags as well popularity of topics. \end{itemize} \subsection{Text Processing} In the Lithium NLP system, an input text document is stored as a Protocol Buffers\@ifstar\footnote@star\footnote@nostar{\url{https://developers.google.com/protocol-buffers/}} message. The Text Processing phase of the system processes the input text document through several stages and the information (entities, topics etc.) extracted at every stage is added as a semantic annotation to the text. Not all annotations are added to a document, the Lithium NLP API (explained in Section \ref{subsection:api}) allows a client application to select specific annotations. However, certain annotations such as language and tokens are prerequisites for later stages. The Text Processing pipeline stages are: \begin{itemize \item \textbf{Language Detection} - This stage detects the language of the input document using an open source language detector\@ifstar\footnote@star\footnote@nostar{\url{https://github.com/shuyo/language-detection}}. This detector employs a naive Bayesian filter which uses character, spellings and script as features to classify language and estimate its probability. It has a precision of $~99\%$ for 49 languages. \item \textbf{Text Normalization} - This stage normalizes the text by escaping unescaped characters and replacing special characters (e.g. diacritical marks) based on the detected language. It replaces non-ASCII punctuations and hyphens with spaces, multiple spaces with single space, converts accents to regular characters etc. \item \textbf{Sentence Breaking} - This stage breaks the normalized text into sentences using Java Text API\@ifstar\footnote@star\footnote@nostar{\url{https://docs.oracle.com/javase/7/docs/api/java/text/BreakIterator.html}}. It can distinguish sentence breakers from other marks, such as periods within numbers and abbreviations, according to the detected language. \item \textbf{Tokenization} - This stage converts each sentence into a sequence of tokens via the Lucene Standard Tokenizer\@ifstar\footnote@star\footnote@nostar{\url{http://lucene.apache.org/core/4_5_0/analyzers-common/org/apache/lucene/analysis/standard/StandardTokenizer.html}} for all languages and the Lucene Smart Chinese Analyzer\@ifstar\footnote@star\footnote@nostar{\url{https://lucene.apache.org/core/4_5_0/analyzers-smartcn/org/apache/lucene/analysis/cn/smart/SmartChineseAnalyzer.html}} for Chinese. \item \textbf{Entity Extraction} - This stage extracts mentions in each sentence using the Mention Entity Co-occurrence dictionary generated offline (Section \ref{subsection:resourcegeneration}). A mention may contain a single token or several consecutive tokens, but a token can belong to at most one mention. To make this task computationally efficient, we apply a simple greedy strategy that analyzes windows of \emph{n}-grams (n $\in$ [1,6]) and extracts the longest mention found in each window. For each extracted mention, we generate multiple candidate entities. For instance, mention \emph{Android} can link to candidate entities \textbf{Android (OS)} or \textbf{Android (Robot)}. \item \textbf{Entity Disambiguation and Linking (EDL)} - This stage disambiguates and links an entity mention to the correct candidate entity in our KB \cite{Bhargava:edl}. It uses several features obtained from the dictionaries generated offline (Section \ref{subsection:resourcegeneration}). These include context-independent features, such as mention-entity co-occurrence, mention-entity Jaccard similarity and entity importance, and context-dependent features such as entity entity co-occurrence and entity topic semantic similarity. It employs machine learning models, such as decision trees and logistic regression, generated using these features to correctly disambiguate a mention and link to the corresponding entity. This stage has a precision of 63\%, recall of 87\% and an F-score of 73\% when tested on an in-house dataset. \item \textbf{Topic Projection} - In this stage, we associate each entity in our KB to upto 10 most relevant topics in KTO. For instance, entity \textbf{Android (OS)} will be associated with the topics such as \emph{Smartphones}, \emph{Software} etc. We use a weighted ensemble of several semi-supervised models that employ entity co-occurrences, GloVe \cite{glove2014} word vectors, Freebase hierarchical relationships and Wikipedia in order to propagate topic labels. A complete description of this algorithm is beyond the scope of this paper. \item \textbf{Hashtag Recommendation} - In this stage, we annotate the text with hashtags recommended based on the topics associated with the text in Topic Projection. This uses the Topic Hashtags dictionary generated offline (Section \ref{subsection:resourcegeneration}) \item \textbf{Sentiment Analysis} - In this stage, we determine the sentiment of the text (positive, negative or neutral) via lexicons and term counting with negation handling \cite{Spasojevic:actionability}. For this, we used several lexicons of positive and negative words (including SentiWordNet \cite{baccianella2010sentiwordnet, esuli2007sentiwordnet} and AFINN \cite{nielsen2011new}) as well as emoticons. We compute the sentiment score as \small $$ {{W_{Pos} - W_{Neg}} \over {\textrm{Log(Total \# of words in text) }+ \epsilon}} $$ \normalsize where $W_{Pos}$ is the weighted strength of positive words and emoticons, $W_{Neg}$ is the weighted strength of negative words and emoticons in the text and $\epsilon$ is a smoothing constant. If the score is positive and above a certain threshold, the text is classified as `Positive'. If it is below a certain threshold, the text is classified as `Negative'. If it lies within the boundary between `Positive' and `Negative' classes, the text is classified as `Neutral'. To handle negations, we use a \emph{lookback window}. Every time, we encounter a word from our sentiment lexicons, we look back at a window of size 3 to see if any negation words precede it and negate the weight of the sentiment word. Overall, this stage has a precision of 47\%, recall of 48\% and an F-score of 46\% when tested on an in-house dataset. \item \textbf{Entity Metadata Decoration} - In this stage, we add the entity metadata such as its type (Person, Organization, Location, Film, Event, Book) and Location (Population, Time Zone, Latitude/Longitude). \end{itemize} Figure \ref{fig:papyrusdemo} demonstrates how the Lithium NLP pipeline processes a sample text ``\emph{Google CEO Eric Schmidt said that the competition between Apple and Google and iOS vs. Android is `the defining fight of the tech industry'.}" and adds the annotations at every stage. \subsection{REST API}\label{subsection:api} The Lithium NLP system provides a REST API via which client applications can send a text document as request and receive the annotated text as JSON response. A snippet of an annotated response (which is in our text proto format\@ifstar\footnote@star\footnote@nostar{\url{https://github.com/klout/opendata/blob/master/wiki_annotation/Text.proto}}) received through the API is shown in Listing \ref{jsonresponse}. Note that the disambiguated entities are also linked to their Freebase ids and Wikipedia links. \\ \\ \begin{lstlisting}[language=json,basicstyle=\scriptsize,firstnumber=1,breaklines=true,caption=JSON of annotated text summary,label=jsonresponse] { "text": "Vlade Divac Serbian NBA player used to play for LA Lakers.", "language": "en", "annotation_summary": [{ "type": "ENTITY", "annotation_identifier": [{ "id_str": "01vpr3", "id_url": "https://en.wikipedia.org/wiki/Vlade_Divac", "score": 0.9456, "type": "PERSON" }, { "id_str": "05jvx", "id_url": "https://en.wikipedia.org/wiki/NBA", "score": 0.8496, "type": "ORGANIZATION" }, ... }] }, { "type": "KLOUT_TOPIC", "annotation_identifier": [{ "id_str": "6467710261455026125", "id_readable": "nba", "score": 0.7582 }, { "id_str": "8311852403596174326", "id_readable": "los-angeles-lakers", "score": 0.66974 }, { "id_str": "8582816108322807207", "id_readable": "basketball", "score": 0.5445 }, ...] }, { "type": "HASHTAG", "annotation_identifier": [{ "id_str": "NBA", "score": 54285.7515 }, { "id_str": "NBAPlayoffs", "score": 28685.6006 }, ...] }], "sentiment": 0.0 } \end{lstlisting} \subsection{Performance}\label{subsection:performance} \begin{figure}[t] \centering \includegraphics[width=0.47\textwidth,height=70mm]{figure/papyrus_performance_per_language_per_stage/eps/en_performance_all_stages.pdf} \caption{Lithium NLP performance per processing stage (best viewed in color)} \label{fig:stage_performance} \vspace{-0.1in} \end{figure} Figure \ref{fig:stage_performance} shows the computational performance per processing stage of the Lithium NLP system. The overall processing speed is about 22ms per 1kb of text. As shown, the time taken by the system is a linear function of text size. The EDL stage takes about $80\%$ of the processing time. \subsection{Comparison on runtime and entity density} We compare the runtime of Lithium NLP and AIDA across various text sizes. As shown in Figure \ref{fig:aida_vs_lithium}, Lithium NLP is on an average 40,000 times faster than AIDA whose slow runtime can be attributed mainly to Stanford NER. In addition to speed, we also compare the number of entities extracted per kb of text. As shown, Lithium NLP extracts about $2.8$ times more entities than AIDA. \subsection{Comparison on information extracted} Table \ref{table:CapabilitiesComparison} compares the types of information extracted by Lithium NLP system with existing systems. In this comparison, we explicitly differentiate between named entities (Person, Location etc.) and other entity types (Sports, Activities) as well as fine-grained topics (Basketball) and coarse-grained topics (Sports) to demonstrate the rich set of information extracted by Lithium NLP. As evident, most other systems do not provide the rich set of semantic annotations that Lithium NLP provides. A majority of the systems focus on recognizing named entities and types with only a few focusing on sentiment and coarse-grained topics as well. In contrast, Lithium NLP extracts, disambiguates and links named and other entities, extracts subject matter topics, recommends hashtags and also infers the sentiment of the text. \subsection{Comparison on languages} Table \ref{table:LanguagesComparison} compares the languages supported by the Lithium NLP system with existing systems. As evident, Lithium supports 6 different languages which is at par and in some cases, more than existing systems. \section{Introduction} \label{section:introduction} \input{texfiles/introduction} \section{Knowledge Base} \label{section:knowledgebase} \input{texfiles/knowledgebase} \section{System Overview} \label{section:systemarch} \input{texfiles/framework} \section{Comparison with existing NLP systems} \label{section:relatedwork} \input{texfiles/relatedwork} \section{Conclusion and Future Work} \label{section:conclusion} \input{texfiles/conclusion} \section*{Acknowledgements} \label{section:acknowledgements} \input{texfiles/acknowledgements} \bibliographystyle{emnlp_natbib} \subsection{First pass \label{firstpass}} The first pass of the algorithm iterates over all mentions in the document text and disambiguates mentions that have: \begin{itemize}[noitemsep,nolistsep] \item Only one candidate entity: In this case, the algorithm disambiguates the mention to the lone candidate entity. \item Two candidate entities with one being \textbf{NIL}/\textbf{MISC}: In this case, the algorithm disambiguates the mention to the candidate entity with high \emph{Mention-Entity-Cooccurr} prior probability (above $\lambda_{1}$ - Easy Mention Disambiguation threshold with \textbf{NIL}). \item Three or more candidate entities with one entity mapping with very high prior: In this case, the algorithm disambiguates the mention to the candidate entity with high \emph{Mention-Entity-Cooccurr} prior probability (above $\lambda_{2}$ - Easy Mention Disambiguation threshold). \end{itemize} Mentions disambiguated in the first pass constitute the set $\mathbb{M}_{easy}$ and their corresponding disambiguated entities constitute the set $\mathbb{E}_{easy}$. The remaining ambiguous mentions constitute the set $\mathbb{M}_{hard}$ and are disambiguated in the second pass. \subsection{Second pass} The second pass of the algorithm uses several context-independent and context-dependent features as well as supervised classifiers to label and score the candidate entities for each hard mention and finally disambiguate it. \subsubsection{\textbf{Features}} \label{sec:features} We use several language agnostic features to classify each candidate entity for each hard mention as `True' or `False'. These include both context-independent (useful for disambiguating and linking entities in short and sparse texts such as tweets) as well as context-dependent features (useful for disambiguating and linking entities in long and rich text). Each feature produces a real value in [0.0,1.0]. The context independent features are: \begin{itemize}[noitemsep,nolistsep] \item \textbf{Mention-Entity Cooccurrence} (\emph{Mention-Entity-Cooccurr}) - This feature value is equal to the \emph{Mention-Entity-Cooccurr} prior probability. \item \textbf{Mention-Entity Jaccard Similarity} (\emph{Mention-Entity-Jaccard}) - This reflects the similarity between the mention $M_{i}$ and the representative name of a candidate entity $E_{j}$. The mention and the entity display names are first tokenized and the Jaccard similarity is then computed between the token sets as \small $$ {{Tokens(M_{i}) \cap Tokens(E_{j})} \over {Tokens(M_{i}) \cup Tokens(E_{j})}} $$ \normalsize For instance, the mention \emph{Marvel} could refer to the entities \emph{Marvel Comics} or \emph{Marvel Entertainment}, both of which have a Jaccard Similarity of 0.5 with the mention. \item \textbf{Entity Importance} (\emph{Entity-Importance}) - This reflects the importance or the relevance of the candidate entity as determined by an entity scoring and ranking algorithm \cite{Bhattacharyya-importance} which ranks the top 1 million entities occurring in our KB. For instance, the entity \emph{Apple Inc.} has an importance of 0.66 while \emph{Apple (fruit)} has an importance of 0.64 as ranked by the Entity Scoring algorithm. \end{itemize} \begin{figure}[t] \centering \includegraphics[width=75mm ,height=35mm]{figures/TopicOntologySemanticDistance.pdf} \vspace{-0.1in} \caption{Semantic distance between topics in Klout Topic Ontology Space} \label{fig:topicsimdist} \vspace{-0.1in} \end{figure} For the following context dependent features, we assume that for a candidate entity $E_{i}$, we maintain an entity context C'($E_{i}$) which contains a window $\mathbb{E}'_{i}$ of \emph{W} disambiguated easy entities immediately surrounding $E_{i}$. \begin{itemize}[noitemsep,nolistsep] \item \textbf{Entity Entity Cooccurrence} (\emph{Entity-Entity-Cooccurr}) - This feature value is equal to the averaged co-occurrence of a candidate entity with the disambiguated easy entities in $\mathbb{E}'_{i}$ and is computed as: \small $$ {\sum_{j=1}^{W} Co-occurrence-count (E_{i}, E_{j}) \over {W}} \forall E_{j} \in \mathbb{E}'_{i} $$ \normalsize \item \textbf{Entity Entity Topic Semantic Similarity} (\emph{Entity-Entity-Topic-Sim}) - As mentioned in Section \ref{subsection:OfflineDictionary}, each entity in our KB is associated with a finite number of topics in our topic ontology. For instance, entity \emph{Apple Inc.} maps to the topic `Apple' and \emph{Google Inc.} maps to the topic `Google' while `\emph{Apple (fruit)}' will map to the topic `Food'. Figure \ref{fig:topicsimdist} shows a partial view of the ontology for the above mentioned topics. For each candidate entity $E_{i}$ of a hard mention $M_{i}$, we compute the minimum \emph{semantic distance} of its topics with topics of each entity in $\mathbb{E}'_{i}$ over all possible paths in our topic ontology space. The similarity is the inverse of the distance. For instance, consider the hard mention \emph{Apple}, having two candidate entities - \emph{Apple Inc.} and \emph{Apple (fruit)} for it, and $\mathbb{E}'_{i}$ containing the entity \emph{Google Inc.} which has been disambiguated. As shown in Figure \ref{fig:topicsimdist}, the semantic distance between the topics for \emph{Apple Inc.} and \emph{Google Inc.} is 4 while the semantic distance between the topics for \emph{Apple (fruit)} and \emph{Google Inc.} is 5. As a result, it is more likely that \emph{Apple} disambiguates to \emph{Apple Inc}. Thus, we first determine the set of topics $\mathbb{T}_{i}$ that the candidate entity $E_{i}$ is associated with. For each entity $E_{j}$ in $\mathbb{E}'_{i}$, we generate the set of topics $\mathbb{T}_{j}$. The feature value is computed as \small $$ \max {1 \over distance (t_{i}, t_{j})} \forall t_{i} \in \mathbb{T}_{i}, t_{j} \in \mathbb{T}_{j} $$ \normalsize \end{itemize} \begin{figure*}[t] \centering \includegraphics[width=\textwidth,height=80mm]{figures/RunningExample.pdf} \vspace{-0.3in} \caption{Disambiguation of a sample sentence (best viewed in color)} \label{fig:sample} \vspace{-0.1in} \end{figure*} \subsubsection{\textbf{Classification and Scoring}} As a penultimate step in the second pass, the computed features are combined into a feature vector for a candidate entity and the Decision Tree classifier labels the feature vector as `True' or `False'. In addition, for each candidate entity, we also generate final scores using weights generated by the Logistic Regression classifier that we trained in Section \ref{subsubsec:class}. We use an ensemble of the two classifiers in the final disambiguation step as it helps overcome the individual bias of each classifier. \subsubsection{\textbf{Final Disambiguation}} The final disambiguation step needs to select one of the labeled candidate entities as the disambiguated entity for the mention. However, multiple cases arise at the time of disambiguation: \begin{itemize}[noitemsep,nolistsep] \item Only one candidate entity is labeled as `True'- Here, the algorithm selects that entity as the disambiguated entity for the given mention. \item Multiple candidate entities labeled as `True' - Here, the algorithm selects the highest scoring entity (from among those labeled `True') as the disambiguated entity except when this entity is \textbf{NIL}/\textbf{MISC}. In that case, the algorithm checks the \emph{margin of gain} or the score difference between the \textbf{NIL}/\textbf{MISC} entity and the next highest scoring entity that is labeled `True'. If the margin of gain is less than a threshold (less than \textbf{NIL} margin of gain threshold, $\lambda_{3}$) then the next highest scoring entity (from among those labeled `True') is selected. \item All candidate entities labeled as `False' - Here, the algorithm selects the highest scoring entity as the disambiguated entity except when this entity is \textbf{NIL}/\textbf{MISC}. In that case, the algorithm checks the margin of gain for this entity over the next highest scoring entity. If the margin of gain is less than a threshold (less than \textbf{NIL} margin of gain threshold, $\lambda_{3}$) then the next highest scoring entity is selected. \end{itemize} \subsection{Demonstrative Example}\label{sec:demoex} To demonstrate the efficacy of our algorithm, let's disambiguate the sample text: \emph{``Google CEO Eric Schmidt said that the competition between Apple and Google and iOS vs. Android is `the defining fight of the tech industry.' ".} Figure \ref{fig:sample} walks through the disambiguation of the sample text. The Text Preprocessing stages extract the mentions (highlighted in bold) and generate the candidate entities and the prior cooccurrence scores for each mention\@ifstar\footnote@star\footnote@nostar{Though our algorithm utilizes the Freebase machine id for each candidate entity, we only show the entity name for clarity.}. As shown, the extracted mentions and their candidate entities are: \begin{itemize}[noitemsep,nolistsep] \item \emph{Google} - \textbf{NIL} and \emph{Google Inc.} \item \emph{CEO} - \textbf{NIL} and \emph{Chief Executive} \item \emph{Eric Schmidt} - \textbf{NIL} and \emph{Eric Schmidt} \item \emph{Apple} - \textbf{NIL}, \emph{Apple (fruit)}, \emph{Apple Inc.} and \emph{Apple Records} \item \emph{iOS} - \textbf{NIL} and \emph{iOS} \item \emph{Android} - \textbf{NIL}, \emph{Android (OS)} and \emph{Android(robot)} \item \emph{tech industry} - \emph{Technology} \end{itemize} In the first pass, the algorithm disambiguates the easy mentions. Based on their high prior scores and number of candidate entities, it disambiguates \emph{Eric Schmidt}, \emph{iOS} and \emph{tech industry} (highlighted in color) to their correct entities. In the second pass, it uses the easy mention window and computes several context dependent and independent features to score and classify the candidate entities of the hard mentions. Note that for the purpose of clarity and simplicity, we are not walking through the feature and final score computation. As shown, for the remaining hard entities, it has classified the candidate entities as `True' or `False'. In the final disambiguation step, it selects one of the labeled entities as the correct disambiguated entity. In the sample sentence, for all the mentions, only one of the candidate entities is labeled as `True', and hence the algorithm selects that entity as the disambiguated entity for each mention. \subsection{Test datasets} Using the process described in Section \ref{data_set}, we generated a ground truth test set of 20 English Wikipedia pages which had a total of 18,773 mentions. \subsection{Metrics} We use standard performance metrics like precision, recall, f-score and accuracy to evaluate our NLP system components on the test sets. Precision, recall, f-score and accuracy are calculated as: $ \textnormal{P} = {{\textnormal{$t_{p}$}} \over {\textnormal{$t_{p} $+ $f_{p}$}}} $, $ \textnormal{R}= {{\textnormal{$t_{p}$}} \over {\textnormal{$t_{p}$ + $f_{n}$}}} $, $ \textnormal{F1}= {{2 \times \textnormal{P} \times \textnormal{R}} \over {\textnormal{P + R}}} $ and $ \textnormal{Accuracy} = {{\textnormal{$t_{p}$ + $t_{n} $}} \over {\textnormal{$t_{p}$ + $t_{n}$ + $f_{p}$ + $f_{n}$}}} $ \subsection{Results}\label{sec:results} \subsection{Runtime Performance} The Lithium NLP system has been built to run in a bulk manner as well as a REST API service. The two major challenges that we faced while developing the system were the volume of new data that we process in bulk daily and limited computational capacity. These challenges had a significant influence on our system design and algorithmic approach. As a demonstrative example, the most consuming task in our MapReduce cluster processes around 910 million documents, with an average document size of 169 bytes, taking about 2.2ms per document. Our MapReduce cluster has around 150 Nodes each having a 2.5 GHz Xeon processor. The processing is distributed across 400 reducers. The Reduce step takes about 2.5 hrs. Each reducer task runs as a single thread with an upper bound of 7GB on memory where the processing pipeline and models utilize 3.7GB. A more detailed breakdown of the computational performance of our system as a function of document length is shown in Figure \ref{fig:processing_times}. The overall performance of the system is a linear function of text length. We also analyze this performance for different languages as well as for different stages of the Lithium NLP pipeline. \subsection{Offline Resource Generation \label{subsection:resourcegeneration}} In this phase, we generate several dictionaries that capture language models, probabilities and relations across entities and topics, by leveraging various multi-lingual data sources. Some of these dictionaries are derived using our DAWT\@ifstar\footnote@star\footnote@nostar{\url{https://github.com/klout/opendata/tree/master/wiki_annotation}} data set \cite{Spasojevic:dawt} that consists of densely annotated wikipedia pages across multiple languages. It is 4.8 times denser than Wikipedia and is designed to be exhaustive across several domains. The dictionaries generated from the DAWT dataset are: \begin{itemize \item \textbf{Mention-Entity Co-occurrence} - This dictionary captures the prior probability that a mention $M_{i}$ refers to an entity $E_{j}$ (including \textbf{NIL} and \textbf{MISC}) within the DAWT dataset and is equivalent to the cooccurrence probability of the mention and the entity: \small $${{count (M_{i} \rightarrow E_{j})} \over {count (M_{i})}}$$ \normalsize For instance, mention \emph{Michael Jordan} can link to \textbf{Michael Jordan (Professor)} or \textbf{Michael Jordan (Basketball player)} with different prior probabilities. Moreover, we generate a separate dictionary for each language. \item \textbf{Entity-Entity Co-occurrence} - This dictionary captures co-occurrence frequencies among entities by counting all the entities that simultaneously appear within a sliding window of 50 tokens. Moreover, this data is accumulated across all languages and is language independent in order to capture better relations and create a smaller memory footprint when supporting additional languages. Also, for each entity, we consider only the top 30 co-occurring entities which have at least 10 or more co-occurrences across all supported languages. For instance, entity \textbf{Michael Jordan (Basketball player)} co-occurs with entities \textbf{Basketball}, \textbf{NBA} etc. while entity \textbf{Michael Jordan (Professor)} co-occurs with entities \textbf{Machine Learning}, \textbf{Artificial Intelligence}, \textbf{UC Berkeley} etc. \end{itemize} We also generate additional dictionaries: \begin{itemize \item \textbf{Entity Importance} - The entity importance score \cite{Bhattacharyya-importance} is derived as a global score identifying how important an extracted entity is for a casual observer. This score is calculated using linear regression with features capturing popularity within Wikipedia links, and importance of the entity within Freebase. We used signals such as Wiki page rank, Wiki and Freebase incoming and outgoing links, and type descriptors within our KB etc. \item \textbf{Topic Parents} - This dictionary contains the parent topics for each topic in the Klout Topic Ontology \@ifstar\footnote@star\footnote@nostar{\url{https://github.com/klout/opendata/tree/master/klout_topic_ontology}} (KTO) - a manually curated ontology built to capture social media users' interests and expertise scores, in different topics, across multiple social networks. As of April 2017, it consists of roughly 8,030 topic nodes and 13,441 edges encoding hierarchical relationships among them. \item \textbf{Topic Hashtags} - This dictionary contains hashtags recommended for topics in KTO. We determine the hashtags via co-occurrence counts of topics and hashtags, importance, recency and popularity of hashtags as well popularity of topics. \end{itemize} \subsection{Text Processing} In the Lithium NLP system, an input text document is stored as a Protocol Buffers\@ifstar\footnote@star\footnote@nostar{\url{https://developers.google.com/protocol-buffers/}} message. The Text Processing phase of the system processes the input text document through several stages and the information (entities, topics etc.) extracted at every stage is added as a semantic annotation to the text. Not all annotations are added to a document, the Lithium NLP API (explained in Section \ref{subsection:api}) allows a client application to select specific annotations. However, certain annotations such as language and tokens are prerequisites for later stages. The Text Processing pipeline stages are: \begin{itemize \item \textbf{Language Detection} - This stage detects the language of the input document using an open source language detector\@ifstar\footnote@star\footnote@nostar{\url{https://github.com/shuyo/language-detection}}. This detector employs a naive Bayesian filter which uses character, spellings and script as features to classify language and estimate its probability. It has a precision of $~99\%$ for 49 languages. \item \textbf{Text Normalization} - This stage normalizes the text by escaping unescaped characters and replacing special characters (e.g. diacritical marks) based on the detected language. It replaces non-ASCII punctuations and hyphens with spaces, multiple spaces with single space, converts accents to regular characters etc. \item \textbf{Sentence Breaking} - This stage breaks the normalized text into sentences using Java Text API\@ifstar\footnote@star\footnote@nostar{\url{https://docs.oracle.com/javase/7/docs/api/java/text/BreakIterator.html}}. It can distinguish sentence breakers from other marks, such as periods within numbers and abbreviations, according to the detected language. \item \textbf{Tokenization} - This stage converts each sentence into a sequence of tokens via the Lucene Standard Tokenizer\@ifstar\footnote@star\footnote@nostar{\url{http://lucene.apache.org/core/4_5_0/analyzers-common/org/apache/lucene/analysis/standard/StandardTokenizer.html}} for all languages and the Lucene Smart Chinese Analyzer\@ifstar\footnote@star\footnote@nostar{\url{https://lucene.apache.org/core/4_5_0/analyzers-smartcn/org/apache/lucene/analysis/cn/smart/SmartChineseAnalyzer.html}} for Chinese. \item \textbf{Entity Extraction} - This stage extracts mentions in each sentence using the Mention Entity Co-occurrence dictionary generated offline (Section \ref{subsection:resourcegeneration}). A mention may contain a single token or several consecutive tokens, but a token can belong to at most one mention. To make this task computationally efficient, we apply a simple greedy strategy that analyzes windows of \emph{n}-grams (n $\in$ [1,6]) and extracts the longest mention found in each window. For each extracted mention, we generate multiple candidate entities. For instance, mention \emph{Android} can link to candidate entities \textbf{Android (OS)} or \textbf{Android (Robot)}. \item \textbf{Entity Disambiguation and Linking (EDL)} - This stage disambiguates and links an entity mention to the correct candidate entity in our KB \cite{Bhargava:edl}. It uses several features obtained from the dictionaries generated offline (Section \ref{subsection:resourcegeneration}). These include context-independent features, such as mention-entity co-occurrence, mention-entity Jaccard similarity and entity importance, and context-dependent features such as entity entity co-occurrence and entity topic semantic similarity. It employs machine learning models, such as decision trees and logistic regression, generated using these features to correctly disambiguate a mention and link to the corresponding entity. This stage has a precision of 63\%, recall of 87\% and an F-score of 73\% when tested on an in-house dataset. \item \textbf{Topic Projection} - In this stage, we associate each entity in our KB to upto 10 most relevant topics in KTO. For instance, entity \textbf{Android (OS)} will be associated with the topics such as \emph{Smartphones}, \emph{Software} etc. We use a weighted ensemble of several semi-supervised models that employ entity co-occurrences, GloVe \cite{glove2014} word vectors, Freebase hierarchical relationships and Wikipedia in order to propagate topic labels. A complete description of this algorithm is beyond the scope of this paper. \item \textbf{Hashtag Recommendation} - In this stage, we annotate the text with hashtags recommended based on the topics associated with the text in Topic Projection. This uses the Topic Hashtags dictionary generated offline (Section \ref{subsection:resourcegeneration}) \item \textbf{Sentiment Analysis} - In this stage, we determine the sentiment of the text (positive, negative or neutral) via lexicons and term counting with negation handling \cite{Spasojevic:actionability}. For this, we used several lexicons of positive and negative words (including SentiWordNet \cite{baccianella2010sentiwordnet, esuli2007sentiwordnet} and AFINN \cite{nielsen2011new}) as well as emoticons. We compute the sentiment score as \small $$ {{W_{Pos} - W_{Neg}} \over {\textrm{Log(Total \# of words in text) }+ \epsilon}} $$ \normalsize where $W_{Pos}$ is the weighted strength of positive words and emoticons, $W_{Neg}$ is the weighted strength of negative words and emoticons in the text and $\epsilon$ is a smoothing constant. If the score is positive and above a certain threshold, the text is classified as `Positive'. If it is below a certain threshold, the text is classified as `Negative'. If it lies within the boundary between `Positive' and `Negative' classes, the text is classified as `Neutral'. To handle negations, we use a \emph{lookback window}. Every time, we encounter a word from our sentiment lexicons, we look back at a window of size 3 to see if any negation words precede it and negate the weight of the sentiment word. Overall, this stage has a precision of 47\%, recall of 48\% and an F-score of 46\% when tested on an in-house dataset. \item \textbf{Entity Metadata Decoration} - In this stage, we add the entity metadata such as its type (Person, Organization, Location, Film, Event, Book) and Location (Population, Time Zone, Latitude/Longitude). \end{itemize} Figure \ref{fig:papyrusdemo} demonstrates how the Lithium NLP pipeline processes a sample text ``\emph{Google CEO Eric Schmidt said that the competition between Apple and Google and iOS vs. Android is `the defining fight of the tech industry'.}" and adds the annotations at every stage. \subsection{REST API}\label{subsection:api} The Lithium NLP system provides a REST API via which client applications can send a text document as request and receive the annotated text as JSON response. A snippet of an annotated response (which is in our text proto format\@ifstar\footnote@star\footnote@nostar{\url{https://github.com/klout/opendata/blob/master/wiki_annotation/Text.proto}}) received through the API is shown in Listing \ref{jsonresponse}. Note that the disambiguated entities are also linked to their Freebase ids and Wikipedia links. \\ \\ \begin{lstlisting}[language=json,basicstyle=\scriptsize,firstnumber=1,breaklines=true,caption=JSON of annotated text summary,label=jsonresponse] { "text": "Vlade Divac Serbian NBA player used to play for LA Lakers.", "language": "en", "annotation_summary": [{ "type": "ENTITY", "annotation_identifier": [{ "id_str": "01vpr3", "id_url": "https://en.wikipedia.org/wiki/Vlade_Divac", "score": 0.9456, "type": "PERSON" }, { "id_str": "05jvx", "id_url": "https://en.wikipedia.org/wiki/NBA", "score": 0.8496, "type": "ORGANIZATION" }, ... }] }, { "type": "KLOUT_TOPIC", "annotation_identifier": [{ "id_str": "6467710261455026125", "id_readable": "nba", "score": 0.7582 }, { "id_str": "8311852403596174326", "id_readable": "los-angeles-lakers", "score": 0.66974 }, { "id_str": "8582816108322807207", "id_readable": "basketball", "score": 0.5445 }, ...] }, { "type": "HASHTAG", "annotation_identifier": [{ "id_str": "NBA", "score": 54285.7515 }, { "id_str": "NBAPlayoffs", "score": 28685.6006 }, ...] }], "sentiment": 0.0 } \end{lstlisting} \subsection{Performance}\label{subsection:performance} \begin{figure}[t] \centering \includegraphics[width=0.47\textwidth,height=70mm]{figure/papyrus_performance_per_language_per_stage/eps/en_performance_all_stages.pdf} \caption{Lithium NLP performance per processing stage (best viewed in color)} \label{fig:stage_performance} \vspace{-0.1in} \end{figure} Figure \ref{fig:stage_performance} shows the computational performance per processing stage of the Lithium NLP system. The overall processing speed is about 22ms per 1kb of text. As shown, the time taken by the system is a linear function of text size. The EDL stage takes about $80\%$ of the processing time. \subsection{Comparison on runtime and entity density} We compare the runtime of Lithium NLP and AIDA across various text sizes. As shown in Figure \ref{fig:aida_vs_lithium}, Lithium NLP is on an average 40,000 times faster than AIDA whose slow runtime can be attributed mainly to Stanford NER. In addition to speed, we also compare the number of entities extracted per kb of text. As shown, Lithium NLP extracts about $2.8$ times more entities than AIDA. \subsection{Comparison on information extracted} Table \ref{table:CapabilitiesComparison} compares the types of information extracted by Lithium NLP system with existing systems. In this comparison, we explicitly differentiate between named entities (Person, Location etc.) and other entity types (Sports, Activities) as well as fine-grained topics (Basketball) and coarse-grained topics (Sports) to demonstrate the rich set of information extracted by Lithium NLP. As evident, most other systems do not provide the rich set of semantic annotations that Lithium NLP provides. A majority of the systems focus on recognizing named entities and types with only a few focusing on sentiment and coarse-grained topics as well. In contrast, Lithium NLP extracts, disambiguates and links named and other entities, extracts subject matter topics, recommends hashtags and also infers the sentiment of the text. \subsection{Comparison on languages} Table \ref{table:LanguagesComparison} compares the languages supported by the Lithium NLP system with existing systems. As evident, Lithium supports 6 different languages which is at par and in some cases, more than existing systems.
\section{Introduction} Hypoelliptic diffusion processes appear naturally in a variety of applications, but most parameter estimation procedures are ill conditioned, especially when only partial observations are available. Hypoellipticity means that the diffusion matrix of the stochastic differential equation (SDE) defining the multidimensional diffusion process is not of full rank, but its solutions admit a smooth density. In this paper we consider parametric estimation for hypoelliptic diffusions defined as solutions to an SDE of the following form: \begin{equation}\label{GeneralModel1}\left\{ \begin{array}{lcl} dV_t&=&a(V_t,U_t) dt\\ dU_t&=&A(V_t,U_t)dt+\Gamma(V_t,U_t)dB_t \end{array} \right. \end{equation} where $ V_t\in\mathbb{R}$ and $U_t\in \mathbb{R}^p$, from discrete observations of the full system $(V_t,U_t^T)^T$, or from discrete observations of $V_t$ only (partial observations), the latter being the most realistic in applications. Here, $^T$ denotes transposition. {The components of $U_t$ are {\em rough}, since the noise acts directly on $U_t$, whereas $V_t$ is only indirectly affected by the noise. The noise is propagated through $a(\cdot)$, which has to depend on $U_t$ for the model to be hypoelliptic, and thus, $V_t$ is the {\em smooth} component. } A prominent example is the large class of stochastic damping Hamiltonian systems, also called Langevin equations, describing the motion of a particle subject to potential, dissipative and random forces \citep{Wu2001,Cattiaux2014,Cattiaux2014a, Cattiaux2015,Comte2017}. In this case $a(\cdot) = U_t$ and $A(\cdot) = -c(V_t,U_t)U_t - \nabla P(V_t)$, for some function $c(\cdot)$ and where $P(\cdot)$ is the potential. They typically arise from a second order differential equation, which develops into a higher dimensional system with some coordinates representing positions, and some coordinates representing velocities. The noise is degenerate because it acts directly on the coordinates of the momentum only, and not on the positions. These models have many applications, such as molecular dynamics \citep[eqs. (6.30)-(6.31)]{LeimkuhlerMatthewsBook2015}, stochastic volatility models, paleoclimate research \citep{Ditlevsen2002}, neural mass models \citep{Hinterleitner2017}, random mechanics or classical physics. Specific examples are the harmonic oscillator (HO), where $A(\cdot) = -DV_t -\gamma U_t$, which will be our first example, the van der Pol oscillator where $A(\cdot) = \mu (1-V_t^2)U_t -V_t$ and the Duffing oscillator where $A(\cdot) = -\delta U_t -\beta V_t - \alpha V_t^3+\gamma \cos \omega t$. In this setting, parametric estimation has been considered before, taking advantage of the special structure of $a(V_t,U_t)=U_t$. \citet{Samson2012} propose contrast estimators based on the fully observed system, by approximating the unobserved coordinate $U_t$ by the {increments} of the observed coordinate $V_t$. \citet{Pokern2009} propose a Gibbs algorithm in a Bayesian framework, still relying on the simple form of $a$. The particular case of integrated diffusions, where the dynamics of $U_t$ do not depend on $V_t$, has been investigated by \citet{genon-catalot2000,Ditlevsen2004,Gloter2006}. However, many applications need to allow for a more flexible formulation of {the} function $a(\cdot)$. For example, it can be convenient to model parts of a large deterministic system exhibiting multiple time scales by a low dimensional stochastic model, leading to a hypoelliptic structure on the reduced model \citep{PavliotisStuartBook}. An important field of application is neuronal models of membrane potential evolution, where the noise only acts on the input, or on the ion channel dynamics, leading to hypoelliptic SDEs. Examples are the FitzHugh-Nagumo (FHN) model \citep{DeVille2005,LeonSamson2017}, which is our second example, the Hodgkin-Huxley model \citep{GoldwynSheaBrown2011,TuckwellDitlevsen2016}, or conductance based models with stochastic channel dynamics \citep{DitlevsenGreenwood2013}. Also neural field models are often hypoelliptic \citep{CoombesByrne2017,DitlevsenLocherbach2017}. It is therefore important to develop reliable estimation methods for this class of models. A particular sub-class are hypoelliptic homogeneous Gaussian diffusions, where the drift is linear and the diffusion is constant, which were considered by \citet{A1985}, and where the transition density is explicitly known. A simple example is the HO mentioned above. Ergodicity of these models has been studied, based on the hypoellipticity of the system \citep{Mattingly2002}. But even if the model is ergodic, the degenerate noise structure complicates the statistical analysis and many standard tools break down. The main difficulty with hypoelliptic models compared to the elliptic case is the transition density for time $\Delta$, which converges {pointwise} towards a point measure when $\Delta \rightarrow 0$ at a faster rate {(with a 1-norm)}, $1/\Delta^2$ \citep{Cattiaux2014a,Comte2017}, compared to the elliptic case of $1/\Delta$. In general, the transition density is unknown, and the estimation fails if { the likelihood is approximated} by the Euler-Maruyama scheme, since the scheme can fail to be ergodic for any choice of time step, even if the underlying SDE is \citep{Mattingly2002}. Intuitively, the problem arises because the diffusion matrix is not of full rank, and lower order schemes will have a degenerate variance matrix, even if the underlying model does not, {due} to the hypoellipticity. As a simple example consider an integrated Brownian motion $dV_t = U_t dt; dU_t = \sigma dB_t$. The exact transition density is normal, \begin{eqnarray*} \left ( \begin{array}{c} V_{\Delta} \\ U_{\Delta} \\ \end{array} \right ) \sim N \left (\left ( \begin{array}{c} V_0 + U_0 {\Delta} \\ U_0 \\ \end{array} \right ),\sigma^2\left ( \begin{array}{cc} \frac{{\Delta}^3}{3} & \frac{{\Delta}^2}{2} \\ \frac{{\Delta}^2}{2} & \Delta \\ \end{array} \right ) \right ), \end{eqnarray*} {with} a non-degenerate covariance matrix. However, if the transition density is approximated by the Euler-Maruyama scheme, the approximated transition density becomes \begin{eqnarray*} \left ( \begin{array}{c} V_{\Delta} \\ U_{\Delta} \\ \end{array} \right ) \sim N \left (\left ( \begin{array}{c} V_0 + U_0 {\Delta} \\ U_0 \\ \end{array} \right ),\sigma^2\left ( \begin{array}{cc} 0 & 0 \\ 0 & \Delta \\ \end{array} \right ) \right ), \end{eqnarray*} which has a non-invertible covariance matrix, so the likelihood function is not well defined. \citet{Pokern2009} suggest to circumvent this problem by adding the first non-zero noise terms arising in the smooth components of the It{\^o}-Taylor expansion of the process { corresponding to a weak order 1.5 scheme. The covariance matrix then becomes the exact covariance matrix for the integrated Brownian motion above, which is also used as an approximation of the covariance matrix in more complicated models. Then they combine it with an Euler scheme for the inference of the drift in a Gibbs loop. They also show that using the weak order 1.5 scheme for inference of the drift parameters leads to a biased drift estimate}. Instead we suggest to approximate the unknown transition density with a higher order scheme, namely the strong order 1.5 Taylor scheme \citep{KloedenPlatenBook}, which leads to the same approximation of the variance up to leading order as in \citet{Pokern2009}, but also approximates the mean {up to sufficiently high order}. We propose a contrast based on this scheme, and prove consistency under the standard asymptotics of $\Delta \rightarrow 0$ and $n \Delta \rightarrow \infty$. The proof relies on the higher order approximation of the mean, and thus, provides an explanation of why the consistency failed for the {weak order 1.5} estimator {of the drift parameters} proposed by \citet{Pokern2009}. To our surprise, we also obtain asymptotic normality, but with faster convergence rates of parameters of the smooth components than the usual rates of the rough components. When only partial observations are available, i.e., only some coordinates are observed, the statistical difficulties increase. {The problem belongs to the class of state-space or hidden Markov models \cite[see for example][]{cappe05, Kantas2015}, but in a degenerate way. The degeneracy arises for two reasons.} One problem is that the system is coupled, such that the unobserved coordinates are not autonomous, and the hidden Markov model is {the vector $(V_t, U_t)$, such that the distribution of the observations conditionally on the Markov process is being reduced to a (non-smooth and degenerate) Dirac density. Second, the variance of the discrete hidden Markov process is itself degenerate if the discretization is applied with a naive scheme.} We therefore embed the approximation into a filtering algorithm for the unobserved path and a Stochastic Approximation Expectation Maximization (SAEM) algorithm, as suggested in \citet{Ditlevsen2014} for the elliptic case. This framework furthermore extends the class we can handle considerably by allowing for general drift functions also for the smooth components, as well as for state dependent diffusion matrices. The running examples throughout the paper are the HO model, where we compare with the estimators proposed in \citet{Pokern2009} and \citet{Samson2012}, the FHN model, where we allow for a general $a(\cdot)$ in the drift of the smooth component, and the Synaptic Inhibition and Excitation (SIE) model, where $p>1$ and the diffusion matrix is state dependent. In Section \ref{sec:models} we introduce the general model, the likelihood and notation, we discuss conditions for hypoellipticity, give formulas for moments and introduce the three example models. In Section \ref{sec:discretization} we give the discretization scheme and present some theoretical results of the scheme needed to show consistency of the estimators. In Section \ref{sec:bothobserved} we present contrast estimators for the completely observed case, which will serve as a basis for the partially observed case, where the unobserved components have to be imputed before employing the contrast estimator. In Section \ref{sec:unobserved} we introduce the particle filter to impute the hidden path and the SAEM algorithm to estimate by alternating between imputation and estimation from the fully observed system, and we give indications of how to choose the initial parameter values for the algorithm. In Section \ref{sec:simulation} we conduct a simulation study on the three example models, and we compare with other estimators. {Proofs are gathered in the Supplementary material}. \section{Models} \label{sec:models} In this paper we consider parametric estimation for hypoelliptic diffusions defined as solutions to an It\^{o} SDE of the following form: \begin{equation}\label{GeneralModel}\left\{ \begin{array}{lcl} dV_t&=&a(V_t,U_t; \psi) dt\\ dU_t&=&A(V_t,U_t;\varphi)dt+\Gamma(V_t,U_t; \sigma)dB_t \end{array}, \right. \end{equation} where $ V_t\in \mathcal{X}_V \subset\mathbb{R}$, $U_t\in \mathcal{X}_U \subset\mathbb{R}^p$ with $p\geq 1$ and $B_t$ is a {$p$}-dimensional Brownian motion. Denote the full state space by $(V_t,U_t^T)^T \in \mathcal{X} \subset\mathbb{R}^{p+1} $. {The} functions $a: \mathcal{X} \mapsto \mathbb{R}$ and $A : \mathcal{X} \mapsto \mathbb{R}^p$ are drift functions depending on an unknown parameter vector $\beta=(\psi, \varphi)$. Denote the full drift vector by $b=(a,A^T)^T$. Furthermore, $\Gamma :\mathcal{X} \mapsto \mathbb{R}^{p\times {p}}$ is a partial diffusion coefficient matrix depending on an unknown parameter vector $\sigma $, the full diffusion matrix being \begin{equation}\label{DifMatrix} {C} (v,u;\sigma)=\left [ \begin{array}{c} \mathbf{0}_{{ p}} \\ \Gamma (v,u;\sigma) \\ \end{array} \right ], \end{equation} where $\mathbf{0}_{{ p}}$ is the {$p$}-dimensional row vector of zeros. Equation \eqref{GeneralModel} is assumed to have a weak solution, and the coefficient functions $a, A$ and $\Gamma$ are assumed to be smooth enough to ensure the uniqueness in law of the solution, for every $\beta$ and $\sigma$. {Furthermore, the solution is assumed to be ergodic.} Most importantly, the process is assumed to be hypoelliptic, meaning that it admits a smooth density with respect to the Lebesgue measure, see Section \ref{sec:hypo}. {We assume diagonal noise, such that} \begin{equation}\label{GeneralGamma} \Gamma (v,u;\sigma)=\left [ \begin{array}{ccc} \sigma_1 (v,u;\sigma)& 0 & 0\\ 0 & \ddots & 0 \\ 0&0 & \sigma_p (v,u;\sigma)\\ \end{array} \right ], \end{equation} where $\sigma_j (v,u;\sigma)>0$ for $(v,u^T)^T\in \mathcal{X}$ and $j=1, \ldots , p$. In the applications below $p=1$ or 2. \subsection{Likelihood and objectives} In model (\ref{GeneralModel}), the parameters $\psi, \varphi$ and $\sigma$ are unknown. The objective of this paper is to estimate these from observations of the first coordinate $V_t$ at discrete times $t_0, t_1, \ldots, t_n$, with equidistant time steps $\Delta=t_{j+1}-t_j$. The ideal would be to maximize the likelihood $p(V_{0:n}; \beta, \sigma)$ of the data $V_{0:n}=(V_{0}, \ldots, V_{n})$, where we write $V_j := V_{t_j}$ for $j=0,1,\ldots , n$. However, the likelihood is intractable, not only because the transition density of model \eqref{GeneralModel} is generally unknown, but also because $V_{0:n}$ is not Markovian, only $(V_t, U_t)$ is Markovian. Even if there is no noise on the first coordinate, the hypoellipticity condition implies that the transition density of model \eqref{GeneralModel} exists. Denote the unknown transition density by $p(V_{t+\Delta}, U_{t+\Delta}|V_t,U_t;\beta, \sigma)$, then the complete likelihood, assuming all coordinates {are} observed and using the Markov property of $(V_t, U_t)$, is given by \begin{equation}\label{eq:completeLikelihood} p(V_{0:n},U_{0:n}; \beta, \sigma) = \prod_{i=0}^{n-1} p(V_{i+1}, U_{i+1}|V_{i}, U_{i};\beta, \sigma). \end{equation} The marginal likelihood of $V_{0:n}$, when only the first coordinate is observed, is a high-dimensional integral, \begin{equation}\label{eq:Likelihood} p(V_{0:n}; \beta, \sigma) = \int \prod_{i=0}^{n-1} p(V_{i+1}, U_{i+1}|V_{i}, U_{i};\beta, \sigma)dU_{0:n}, \end{equation} which is difficult to handle. A standard approximation to the unknown transition density is given by the Euler-Maruyama scheme, where the {true} transition density is {approximated by the Euler} normal {density} with mean and variance given by the drift and diffusion coefficients multiplied by $\Delta$. However, since the diffusion coefficient on the first coordinate is zero, the normal distribution of the scheme is singular, and the estimation breaks down. The same happens for the Milstein scheme{, which has strong order 1, compared to the Euler-Maruyama scheme, which has strong order $1/2$}. We suggest instead to approximate with a higher order scheme with strong order 1.5, where, as we shall see, a stochastic term of order $\Delta^{3/2}$ appears in the first coordinate, which is a {smoothed} version of the stochasticity from the other coordinates. This stochasticity is enough to ensure that the estimation procedure works, as long as drift terms of the same order {in $\Delta$ are} maintained in the approximation. Denote by \begin{equation}\label{eq:deltap} p_{\Delta}(V_{i+1}, U_{i+1}|V_{i}, U_{i};\beta, \sigma) \end{equation} the approximated transition density from this scheme. In Section \ref{sec:bothobserved}, we assume all coordinates $(V_t, U_t^T)^T$ {are} observed at discrete time points, and explain how we can estimate the parameters in that case. In Section \ref{sec:unobserved} we assume only $V_t$ observed, and suggest to impute the hidden coordinates $U_t$ and discuss how to maximize the likelihood $p_{\Delta}(V_{0:n}; \beta, \sigma)$. Before detailing the estimation approaches, we give further details on hypoellipticity and some moment properties of the process. Section \ref{sec:discretization} is devoted to the discretization scheme of order 1.5. \subsection{Notation} Let $\bar \Gamma (v,u)= (\sigma_1 (v,u), \ldots , \sigma_p (v,u))$ denote the vector of entries in the diagonal of matrix \eqref{GeneralGamma}. Let $\partial_{u} a (V_{i},U_{i})$ denote the row vector of partial derivatives evaluated at time $t_i$, $(\partial_{u_1} a (v,u), \ldots , \partial_{u_p} a (v,u))|_{(v,u)= (V_{i},U_{i})}$, and likewise for the Jacobian matrix of $A$ and {$\bar \Gamma$}. Let $\bigtriangledown^2_{\bar \Gamma} (\cdot )=\sum_{j=1}^p \sigma_j^2(v,u)\frac{\partial^2}{\partial u_j^2}(\cdot)$ denote a weighted Laplace type operator. It is applied componentwise to vectors. Let $\partial_x f^i$ denote the $n$-dimensional row vector of partial derivatives of the $i$th component of a generic function $f: \mathcal{X} \to \mathbb{R}^{n}$ with respect to the elements of $x$, or {write} $\partial_x f$ if $n=1$. We will sometimes use notation $b$ for the drift, and sometimes $a, A$, depending on what is most notational{ly} convenient. Note that $b_1=a$ and $b_{j+1}=A_j$ for $j=1, \ldots , p$. We sometimes write $X_t=(V_t, U_t^T)^T$ for the process, but use $V_t$ and $U_t$ when we need to distinguish between the smooth and the rough parts of the process. Let $I_p$ denote the identity matrix of dimension $p$ and $\mathbf{1}_p$ the $p$-column vector of ones. \subsection{Hypoellipticity} \label{sec:hypo} An SDE is hypoelliptic if the {squared} diffusion matrix {$C C^T$} is not of full rank, but its solutions admit a smooth {transition} density with respect to the Lebesgue measure. H{\"o}rmander's theorem asserts that this is the case if the SDE in its Stratonovich form satisfies the weak H{\"o}rmander condition {\citep{NualartBook}}. We write $\sigma^j: \mathbb{R}^{p{+1}} \to \mathbb{R}^{p} $ for the ${p}$ column vectors of the diffusion matrix $\Gamma$, and $\tilde \sigma^j: \mathbb{R}^{p+1} \to \mathbb{R}^{p+1} $ for the ${p}$ column vectors of the diffusion matrix \eqref{DifMatrix}, such that $\tilde \sigma^j = (0, (\sigma^j)^T)^T$. For smooth vector fields $f(x)$ and $ g( x) : \mathbb{R}^n \to \mathbb{R}^n , $ the $i$th component of the Lie bracket $ [f, g ] $ is defined by $ [f, g ]^i = (\partial_x g^i) f - (\partial_x f^i) g \; , \; i = 1, \ldots , n ${, where $(\partial_x g^i) f$ is the scalar product between the row vector $\partial_x g^i$ and the column vector $f$, and likewise for the second term}. Define the set ${\cal L}$ of vector fields by the initial members $\tilde \sigma^j \in {\cal L}, j=1, \ldots , {p}$ and recursively by \begin{equation}\label{eq:iteration} L\in {\cal L} \;\Longrightarrow \; [ b,L] , [ \tilde\sigma^1 , L], \ldots, [\tilde\sigma^{{p}} , L ] \in {\cal L} \;. \end{equation} The weak H\"ormander condition is fulfilled if the vectors of ${\cal L}$ span $\mathbb{R}^{p+1}$ {for each $x \in \mathbb{R}^{p+1}$}. {The initial members span {$\{(0,v)\in R^{p+1} : v \in R^p \}$, a subspace of dimension $p$}, since $\Gamma (v,u)$ is given by \eqref{GeneralGamma}}. Therefore, we only need to check if there exists some $L\in {\cal L}$ which has the first element different from zero. The first iteration of \eqref{eq:iteration} for system \eqref{GeneralModel} yields \begin{align*} \label{Liebrackets} [b,\tilde\sigma^j]^1 &= -\partial_{u} a(v,u) \sigma^j (v,u) \\ [\tilde\sigma^i,\tilde\sigma^j ]^1 &= 0 \end{align*} for $i,j = 1, \ldots , p$. {If the first of these is 0, all subsequent iterations will be 0.} This leads us to the following sufficient and necessary condition for system \eqref{GeneralModel} to be hypoelliptic. \begin{itemize} \item[{\bf (C1)}] $\forall (v,u^T)^T \in \mathcal{X} , \, \partial_{u} a(v,u) \sigma^j (v,u) \neq 0$ for at least one $j=1, \ldots , p$. \end{itemize} This is a natural assumption; the noise on some of the components of $u$ should be propagated to the first coordinate, which can only happen if $a(v,u)$ depends on at least one component of $u$. Note that the system has to be in its Stratonovich form, whereas we assume model \eqref{GeneralModel} in its It\^{o} form. However, the condition still holds, since it only involves the drift of the first component. If $\Gamma (v,u)$ in \eqref{GeneralGamma} does not depend on $(v,u^T)^T$, the It\^{o} and the Stratonovich forms coincide. If it is state dependent, a conversion from It\^{o} to Stratonovich form will change the drift functions of the $U_t$ coordinates, but not of $V_t$. \subsection{Moments} The distribution of $X_t=(V_t,U_t^T)^T$ in eq. \eqref{GeneralModel} is in general unknown, but moments can be approximated when $X_t$ is ergodic. For sufficiently smooth and integrable functions $f :\mathcal{X} \mapsto \mathbb{R}$ {(with respect to the invariant measure of $X$, see the Appendix \ref{App:assumptionsmoment} for the specific conditions)}, then \begin{eqnarray} \label{eq:generator} \mathbb{E}(f( X_{t+\Delta})|X_t=x) &=& \sum_{i=0}^k \frac{\Delta^i}{i!} L^if(x) + \mathcal{O}(\Delta^{k+1}) \end{eqnarray} where $L$ is the generator of model \eqref{GeneralModel}-\eqref{GeneralGamma}, \begin{eqnarray*} Lf(x)&=& (\partial_x f (x)) b(x) +\frac12 \bigtriangledown^2_{\bar \Gamma} f(x), \end{eqnarray*} and $L^i f$ means $i$ times iterated application of the generator {\citep[p. 18, Lemma 1.10]{Mangabook}. In particular, it holds for $f=x$ or $x^2$ for the three models in Section \ref{sec:examples}.} This yields the first conditional moment of the $j$'th component of $X_t$, \begin{eqnarray} \label{eq:EXj} \mathbb{E}( X_{t+\Delta}^{(j)}|X_t=x) &=& x^{(j)} + \Delta b_j(x) + \frac{\Delta^2}{2} Lb_j(x) +\mathcal{O} (\Delta^3). \end{eqnarray} In particular, for model \eqref{GeneralModel} we have \begin{eqnarray} \label{eq:VX} \mathbb{E}( V_{t+\Delta}|X_t=x) &=& v + \Delta a(x) + \frac{\Delta^2}{2} \partial_{x} a(x) \, b(x) +\frac{\Delta^2}{4} \bigtriangledown^2_{\bar \Gamma} a(x) +\mathcal{O} (\Delta^3),\\ \label{eq:UX} \mathbb{E}( U_{t+\Delta}|X_t=x) &=& u + \Delta A (x)+ \frac{\Delta^2}{2} \partial_{x} A(x) \, b(x) +\frac{\Delta^2}{4} \bigtriangledown^2_{\bar \Gamma} A(x) +\mathcal{O} (\Delta^3). \end{eqnarray} Furthermore, \begin{align} \mbox{Var} ( V_{t+\Delta}|&X_t=x) = \frac{\Delta^3}{3} \partial_u a \Gamma \Gamma^T (\partial_u a)^T + \mathcal{O} (\Delta^4) \\ \mbox{Var} ( U_{t+\Delta}^j|&X_t=x) =\Delta \sigma^2_j (x) + \label{eq:varU} \\ & \frac{\Delta^2}{2} \left ( A_{j} \partial_{u_j} \sigma_j^2 (x) + 2\sigma^2_j (x) \partial_{u_j} A_j(x) + \frac 12 \sigma_j^2 (x) \partial_{u_j^2}^2 \sigma_j^2 (x) \right ) +\mathcal{O} (\Delta^3) \nonumber \end{align} Note how the order of the variance of the first coordinate is $\Delta^3$, whereas the mean is of order $\Delta$. This is the cause of the statistical difficulties of estimating the parameters. \subsection{Three examples} \label{sec:examples} \subsubsection{Harmonic Oscillator}\label{sec:HO} Harmonic oscillators are common in nature, and the model is central in classical mechanics. Consider the damped harmonic oscillator driven by a white noise forcing \citep{Pokern2009}, \begin{equation}\label{eq:HO}\left\{ \begin{array}{lcl} dV_t&=&U_t dt\\ dU_t&=&(-D V_t - \gamma U_t)dt + \sigma dB_t \end{array} \right. \end{equation} with $\gamma, D, \sigma>0$. Here, $p=1$. {The drift function $a$ does not depend on an unknown parameter}, which makes parameter estimation much easier, and thus $\beta =\varphi = (D, \gamma$). For this linear model we know the true distribution. The process is an ergodic Ornstein-Uhlenbeck process, i.e., a Gaussian process. Define $$X_t = \left ( \begin{array}{c} V_t \\ U_t \\ \end{array} \right ) \ ; \quad M = \left ( \begin{array}{cc} 0&1 \\ -D&-\gamma \\ \end{array} \right ) \ ; \quad {C} = \left ( \begin{array}{c} 0 \\ \sigma \\ \end{array} \right ). $$ Then $$dX_t = M X_t dt + {C} dB_t$$ and the conditional distribution is \begin{equation} \label{eq:HOdistribution1} (X_{t+\Delta} | X_t=x) \sim \mathcal{N} \left (e^{ \Delta M } x \, , \, \int_0^\Delta e^{ s M }{C C}^T e^{ s M^T }ds \right ). \end{equation} Let $d= \frac 12 \sqrt{\gamma^2-4D}$, then \begin{equation} \label{eq:HOdistribution2} \mathbb{E} (X_{t+\Delta} | X_t=x)= e^{-\frac{1}{2}\gamma \Delta} \left ( \begin{array}{c} \left (\cosh \left (d\Delta \right )+ \frac{\gamma}{2d} \sinh \left (d\Delta \right ) \right ) x_1+\left ( \frac{1}{d} \sinh \left (d\Delta \right ) \right ) x_2\\ \left ( -\frac{D}{d} \sinh \left (d\Delta \right ) \right ) x_1 + \left (\cosh \left (d\Delta \right )- \frac{\gamma}{2d} \sinh \left (d\Delta \right ) \right ) x_2 \end{array} \right ), \end{equation} {where we formally define $\sinh (0)/0 = 0$. Note that $d$ has to be complex for the solution to oscillate, i.e., for negative determinant, which is the case we consider.} \begin{figure}[tb!] \includegraphics[width = 0.99\textwidth]{traces2.pdf} \caption{\label{fig:traces} Simulated paths of the three example models. Left: Harmonic Oscillator. Middle: FitzHugh-Nagumo model. Right: Synaptic Inhibition and Excitation model. Upper plots: The smooth coordinate $V$. Lower plots: The rough coordinates $U$. {The rough paths of the SIE model are excitatory (red) and inhibitory (green) conductances.} Parameter values are given in Section \ref{sec:simulation}. } \end{figure} To compare with the analysis of the other models, we make a Taylor expansion in $\Delta$ up to order 2 obtaining \begin{equation} \mathbb{E} (X_{t+\Delta} | X_t=x)= x + \Delta B_{\mbox{HO}}(x) +\mathcal{O} (\Delta^3) \end{equation} where \begin{equation} \label{eq:BHO} \Delta B_{\mbox{HO}}(x)= \Delta \left ( \begin{array}{c} x_2-(Dx_1+\gamma x_2) \frac{\Delta}{2} \\ -(Dx_1+\gamma x_2) + (\gamma(D x_1+\gamma x_2)-Dx_2) \frac{\Delta}{2}\end{array} \right ). \end{equation} Furthermore, \begin{align} \label{eq:HOdistribution3} \mbox{Var} (X_{t+\Delta}& | X_t=x)= \frac{\sigma^2}{2\gamma D}\left [ \begin{array}{cc} 1&0\\0 &D\\ \end{array} \right ]+ \\ &\frac{\sigma^2 e^{-\gamma \Delta}}{4d^2}\left [ \begin{array}{cc} \frac{2}{\gamma} \! - \! \frac{d}{D}\sinh\left (2d \Delta \right ) \! -\! \frac{\gamma}{2D} \cosh\left (2d \Delta \right ) &\cosh\left (2d\Delta \right ) -1\\ \cosh\left (2d\Delta \right ) -1 &\frac{2D}{\gamma} \! +\! d\sinh\left (2d \Delta \right ) \! -\! \frac{\gamma}{2} \cosh\left (2d \Delta \right )\\ \end{array} \right ] \nonumber \end{align} with Taylor expansion up to order 3 in $\Delta$ \begin{align} \mbox{Var} (X_{t+\Delta}& | X_t=x)= \sigma^2\left [ \begin{array}{cc} \frac13\Delta^3&\frac12\Delta^2-\frac12\Delta^3\gamma \\\frac12\Delta^2-\frac12\Delta^3\gamma &\Delta -\gamma \Delta^2+\frac13\Delta^3(2\gamma^2-D) \\ \end{array} \right ] +\mathcal{O}(\Delta^4) \end{align} where we need a higher order for the variance for later convergence results, since otherwise the variance of the first coordinate is zero. The invariant distribution is Gaussian, $$X_{\infty} \sim \mathcal{N} \left ( 0 , \frac{\sigma^2}{2\gamma D}\left [ \begin{array}{cc} 1&0\\0 &D\\ \end{array} \right ] \right ).$$ The solution of this system has thus moments of any order. An example path can be found in Figure \ref{fig:traces}. \subsubsection{FitzHugh-Nagumo} A prototype of a model of a spiking neuron is the FitzHugh-Nagumo model, which is a minimal representation of more realistic neuron models, such as the Hodgkin-Huxley model, modelling the neuronal firing mechanisms \citep{FitzHugh1961,Nagumo1962,HodgkinHuxley1952}. Consider the stochastic hypoelliptic FitzHugh-Nagumo model, defined as the solution to the system \begin{equation}\label{eq:FHN} \left\{ \begin{array}{ccl} dV_t &=& \frac1\varepsilon (V_t -V_t^3-U_t+s)dt,\\ dU_t&=& \left(\gamma V_t-U_t+{\alpha} \right)dt + \sigma dB_t, \end{array} \right. \end{equation} where the variable $V_t$ represents the membrane potential of a neuron at time $t$, $U_t$ is a recovery variable, which could represent channel kinetics{, and} $p=1$. Parameter $s$ is the magnitude of the stimulus current. When only $V_t$ is observed, $s$ is not identifiable \citep{Jensen2012}. Often $s$ represents injected current and is thus controlled in a given experiment, and it is therefore reasonable to assume it known, so that $\psi=\varepsilon$. Thus, parameters to be estimated are $\sigma, \psi=(\varepsilon)$ and $\varphi=(\gamma, {\alpha})$. The distribution of $X_t=(V_t,U_t)^T$ is unknown, but moments can be approximated by using \eqref{eq:generator}, where the generator of model \eqref{eq:FHN} is \begin{eqnarray*} Lf(x)&=& \frac{1}{\varepsilon}(x_1 -x_1^3-x_2+s) \frac{\partial f}{dx_1} + (\gamma x_1-x_2+{\alpha}) \frac{\partial f}{dx_2} +\frac12 \sigma^2 \frac{\partial^2 f}{dx_2^2}. \end{eqnarray*} We obtain \begin{eqnarray*} \mathbb{E} (X_{t+\Delta} | X_t=x)= x + \Delta B_{\mbox{FHN}}(x) +\mathcal{O} (\Delta^3) \end{eqnarray*} where \begin{align} \label{eq:BFHN} \Delta &B_{\mbox{FHN}}(x)= \\ &\Delta \left(\begin{array}{c} \frac1\varepsilon(x_1 - x_1^3 - x_2 + s) + \displaystyle{\frac{\Delta}{2}}\frac1{\varepsilon}\left (\frac1{\varepsilon}(1 - 3x_1^2)(x_1 - x_1^3 - x_2 + s) - (\gamma x_1 - x_2 - {\alpha}) \right )\\ (\gamma x_1 - x_2 + {\alpha}) +\displaystyle{\frac{\Delta}{2}}\left (\frac\gamma\varepsilon(x_1 - x_1^3 - x_2 + s)-(\gamma x_1 - x_2 + {\alpha})\right ) \end{array}\! \! \right) \nonumber \end{align} and \begin{align} \mbox{Var} (X_{t+\Delta}& | X_t=x)= \sigma^2\left [ \begin{array}{cc} \frac13\Delta^3\frac1{\varepsilon^2}{+\mathcal{O}(\Delta^4)}&-\frac12\Delta^2 \frac{1}{\varepsilon}{+\mathcal{O}(\Delta^3)}\vspace{2mm} \\ -\frac12\Delta^2 \frac{1}{\varepsilon}{+\mathcal{O}(\Delta^3)} \hspace{2mm} &\Delta -\Delta^2 {+\mathcal{O}(\Delta^3)} \\ \end{array} \right ]. \end{align} An example path can be found in Figure \ref{fig:traces}. \subsubsection{Synaptic-conductance model} A neuron, which reliably can be characterized as a single electrical compartment, and which receives excitatory and inhibitory synaptic bombardment, has a voltage dynamics across the membrane that can be described by this conductance-based model with diffusion synaptic input \citep{DayanAbbottBook,BergDitlevsen2013} \begin{equation}\label{eq:Conduc} \left\{ \begin{array}{ccl} CdV_t &=& (-G_L (V_t-V_L) - G_{E,t} (V_t-V_E) - G_{I,t} (V_t-V_I) + I_{inj} )dt\\[1mm] dG_{E,t} &=& -\frac{1}{\tau_E}(G_{E,t}-\bar g_E)dt + \sigma_E\sqrt{G_{E,t}}dB_{E,t}\\[1mm] dG_{I,t} &=& -\frac{1}{\tau_I}(G_{I,t}-\bar g_I)dt + \sigma_I \sqrt{G_{I,t}}dB_{I,t} \end{array} \right. \end{equation} where $C$ is the total capacitance, $G_L$, $G_E$ and $G_I$ are the leak, excitation, and inhibition conductances, $V_L$, $V_E$ and $V_I$ are their respective reversal potentials, and $I_{inj}$ is the injected current. The conductances $G_{{E},t}$ and $G_{{I},t}$ are assumed to be stochastic functions of time, where $(B_{E,t})$ and $(B_{I,t})$ are two independent Brownian motions. The square roots in the diffusion coefficient ensures that the conductances stay positive. Parameters $\tau_E, \tau_I$ are time constants, $\bar g_E, \bar g_I$ the mean conductances, and $\sigma_E, \sigma_I$ the diffusion coefficients, scaling the variability of these two processes. Here, $U_t=(G_{{E},t}, G_{{I},t})^T$ and $p=2$. We assume the capacitance and the reversal potentials {known}, which are easily determined in independent experiments \citep{BergDitlevsen2013}, as well as $I_{inj}$, which is controlled by the experimenter. Thus, {the drift function $a$ does not depend on an unknown parameter}, $\varphi=(\bar g_E, \bar g_I, \tau_E, \tau_I)$, and $\sigma=(\sigma_E, \sigma_I)$. {The distribution of $V_t$ is also unknown for this model, whereas $U_t$ are independent square root processes (also called CIR processes), which have transition densities following non-central chi-square distributions. However, for illustration of the methodology, we will approximate moments} by using the generator of model \eqref{eq:Conduc}, \begin{eqnarray*} Lf(x)&=& \frac{1}{C}(-G_L (x_1-V_L) - x_2 (x_1-V_E) - x_3 (x_1-V_I) + I_{inj} ) \frac{\partial f}{dx_1} \\ &&-\frac{1}{\tau_E}(x_2-\bar g_E) \frac{\partial f}{dx_2} -\frac{1}{\tau_I}(x_3-\bar g_I) \frac{\partial f}{dx_3 } +\frac12 \sigma_E^2 x_2\frac{\partial^2 f}{dx_2^2} +\frac12 \sigma_I^2 x_3\frac{\partial^2 f}{dx_3^2} \end{eqnarray*} and equation \eqref{eq:generator}. We obtain \begin{align} \mathbb{E} &(X_{t+\Delta})|X_t=x)= x+ \Delta B_{\mbox{SIE}}(x) +\mathcal{O} (\Delta^3) \end{align} where \begin{equation} \label{eq:BSIE} \Delta B_{\mbox{SIE}}(x)\! =\! \Delta \! \left(\begin{array}{c} \! \! \! b_1(x) \displaystyle{-\frac{\Delta}{2C}} \! \left ( b_1(x) (G_L\! +\! x_2 \! + \! x_3) \! + \! b_2(x) (x_1\! -\! V_E) + b_3(x) (x_1 \! -\! V_I) \right )\\ b_2(x)-\displaystyle{\frac{\Delta}{2}}\left ( b_2(x) \frac{1}{\tau_E} \right )\\ b_3(x) -\displaystyle{\frac{\Delta}{2}}\left ( b_3(x) \frac{1}{\tau_I} \right ) \end{array}\! \! \right) \! \end{equation} and {\begin{align} &\mbox{Var} (X_{t+\Delta} | X_t=x)=\\ & \left [ \begin{array}{ccc} \frac{\Delta^3}{3C^2}((x_1\! -\! V_E)^2\sigma_E^2x_2\! +\! (x_1\! -\! V_I)^2\sigma_I^2x_3) {+\mathcal{O}(\Delta^4)} & -\frac{\Delta^2}{2C} \sigma_E^2x_2( x_1-V_E) {+\mathcal{O}(\Delta^3)}& -\frac{\Delta^2}{2C} \sigma_I^2x_3( x_1-V_I) {+\mathcal{O}(\Delta^3)}\vspace{2mm} \\ -\frac{\Delta^2}{2C} \sigma_E^2x_2( x_1-V_E) {+\mathcal{O}(\Delta^3)} & \Delta\sigma_E^2 x_2 {+\mathcal{O}(\Delta^2)} &0 \vspace{2mm} \\ -\frac{\Delta^2}{2C} \sigma_I^2x_3( x_1-V_I) {+\mathcal{O}(\Delta^3)}&0& \Delta\sigma_I^2 x_3 {+\mathcal{O}(\Delta^2)} \end{array} \right ]. \nonumber \end{align}} An example path can be found in Figure \ref{fig:traces}. The red path is the excitatory conductance, the green path is the inhibitory conductance. \section{Discretization scheme} \label{sec:discretization} The transition density for model \eqref{GeneralModel} is generally unknown, and a possible approximation to the likelihood function is the likelihood for some approximating scheme of the discretized process $X_{0:n}$. We will write $\tilde X_i$ for the approximated process, or $\tilde V_i$ and $ \tilde U_i$ where relevant. The most commonly applied scheme to approximate the likelihood in SDEs, especially for high-frequency data, is the Euler-Maruyama approximation of model (\ref{GeneralModel}), which leads to a discretized model defined as follows \begin{eqnarray}\label{eq:discretize_ML_2} \tilde V_{i+1} &=& \tilde V_{i}+\Delta a(\tilde V_{i},\tilde U_{i}),\\ \tilde U_{i+1}&=&\tilde U_{i} + \Delta A(\tilde V_{i},\tilde U_{i}) + \Gamma(\tilde V_{i},\tilde U_{i})\eta_i,\nonumber \end{eqnarray} where $(\eta_i)$ are centered Gaussian vectors with variance $\Delta I_p$. Thus, the transition density of the approximate discretized scheme is a degenerate Gaussian distribution, since there is no stochastic term on the first coordinate. The same happens for the Milstein-scheme with strong order of convergence equal to 1. \subsection{Discretization with 1.5 scheme} We propose to use a higher order scheme, namely the 1.5 strong order scheme \citep{KloedenPlatenBook}, using the hypoellipticity of (\ref{GeneralModel}) to propagate the noise into the first coordinate. For a diagonal diffusion matrix as in \eqref{GeneralGamma} the scheme is as follows, where for readability we have suppressed the dependence on $(V_{i},U_{i})$, \begin{eqnarray}\label{eq:discretize_strong} \tilde V_{i+1} &=& \tilde V_{i}+\Delta a + \frac{\Delta^2}{2} \partial_{x} a \, b +\frac{\Delta^2}{4} \bigtriangledown^2_{\bar \Gamma} a + \partial_{u} a \, \Gamma \xi_i \label{eq:discretize_strongV}\\ \tilde U_{i+1} &=&\tilde U_{i} + \Delta A + \frac{\Delta^2}{2} \partial_{x} A \, b+\frac{\Delta^2}{4} \bigtriangledown^2_{\bar \Gamma} A + \Gamma \eta_i +\partial_{u} A \, \Gamma \xi_i \nonumber \\ && \label{eq:discretize_strongU} +\frac12 \partial_{u} \bar \Gamma \, \Gamma (\eta_i^{*2} -{\Delta}\mathbf{1}_p)+\partial_{u} \bar \Gamma \, A (\Delta \eta_i -\xi_i) + \frac12 \bigtriangledown^2_{\bar \Gamma } \bar \Gamma (\Delta \eta_i -\xi_i) \nonumber \\ &&+ \frac12 {\left ( \left ( \partial_{u} \bar \Gamma \right )^2 \Gamma + \bigtriangledown^2_{\bar \Gamma } \bar \Gamma\right )} (\frac13 \eta_i \eta_i^T - \Delta I_p)\eta_i \end{eqnarray} where $(\eta_i)$ are centered Gaussian vectors with variance $\Delta I_p$, $(\xi_i)$ are centered Gaussian vectors with variance $\Delta^3/3 I_p$, Cov$(\eta_i,\xi_i)= \Delta^2/2 I_p$ and Cov$(\eta_i,\xi_j)= 0$ for $i \neq j$. Furthermore, $\eta_i^{*2}$ denotes the vector with the squared entries of $\eta_i$. Notice how noise of order $\Delta^{3/2}$ is now propagated into the first equation, since the last term on the right hand side of \eqref{eq:discretize_strong} is non-zero if condition {\bf (C1)} is fulfilled. If $\Gamma$ is independent of the process (additive noise) then the last two lines in \eqref{eq:discretize_strongU} are zero. To simplify the notation later on, we rewrite equations (\ref{eq:discretize_strongV})-(\ref{eq:discretize_strongU}) as \begin{equation}\label{eq:discretize_strongSimple} \left(\begin{array}{c} \tilde V_{i+1}\\\tilde U_{i+1}\end{array}\right) = \left(\begin{array}{c}\tilde V_{i}\\\tilde U_{i}\end{array}\right) + \Delta B(\tilde V_{i}, \tilde U_{i}) + \varepsilon_i, \quad \varepsilon_i\sim \mathcal{N}_{p+1}(0, \Sigma (\tilde V_{i}, \tilde U_{i})) \end{equation} where $\Delta B(v,u)_j = \Delta b_j + \frac{\Delta^2}{2} \partial_{x} b_j \, b +\frac{\Delta^2}{4} \bigtriangledown^2_{\bar \Gamma} b_j $ is the scheme for the drift and $\Sigma (v,u)$ is the variance matrix of the scheme. Up to leading order, the variance matrix is given by \begin{equation} \label{Sigma} \Sigma (v,u) = \left(\begin{array}{cc} \partial_{u} a \, \Gamma \Gamma^T (\partial_{u} a)^T \frac{\Delta^3}{3}& \partial_{u} a \, \Gamma \Gamma^T \frac{\Delta^2}{2}\\ \Gamma \Gamma^T (\partial_{u} a)^T \frac{\Delta^2}{2}& \Gamma \Gamma^T \Delta\\ \end{array}\right) . \end{equation} Since the mean term coincides with the true mean up to order $\Delta^2$, see eqs. \eqref{eq:VX} and \eqref{eq:UX}, the functions ${\Delta}B(v,u)$ for models \eqref{eq:HO}, \eqref{eq:FHN}, and \eqref{eq:Conduc} are given in \eqref{eq:BHO}, \eqref{eq:BFHN} and \eqref{eq:BSIE}, respectively. The variance matrix $\Sigma (\tilde V_{i},\tilde U_{i})$ of the above scheme for the three models \eqref{eq:HO}, \eqref{eq:FHN}, and \eqref{eq:Conduc} are \begin{align} \label{eq:sigmaHO} &\, \Sigma_{\mbox{HO}} \, \, = \sigma^2\left(\begin{array}{cc} \frac13 \Delta^3&\frac12 \Delta^2-\frac13 \Delta^3 \gamma\\ \frac12 \Delta^2-\frac13 \Delta^3 \gamma&\Delta-\Delta^2 \gamma+\frac13 \Delta^3 \gamma^2\\ \end{array}\right),\\ &\Sigma_{\mbox{FHN}} = \sigma^2\left(\begin{array}{cc} \frac13 \Delta^3 \varepsilon^{-2}&\left ( -\frac12 \Delta^2+\frac13 \Delta^3 \right ) \varepsilon^{-1}\\ \left ( -\frac12 \Delta^2+\frac13 \Delta^3 \right ) \varepsilon^{-1} &\Delta-\Delta^2 +\frac13 \Delta^3 \\ \end{array}\! \! \right),\\ &\, \Sigma_{\mbox{SIE}} (\tilde V_i, \tilde U_i)\, \, = \\ &\left( \begin{array}{ccc} \! \! \! \! \frac{\Delta^3}{3}\! \left ( {(\tildeV_{i} \! -\!V_E)^2}\sigma^2_E \tilde G_{E,i} \! + \! { (\tildeV_{i} \! -\!V_I)^2}\sigma^2_I \tilde G_{I,i} \right )& - \sigma^2_E { (\tildeV_{i} \! -\! V_E)} \tilde G_{E,i} \! \left ( \frac{\Delta^2}{2} \! \! +\! \frac{\Delta^3}{6\tau_E}\right )& - \sigma^2_I { (\tildeV_{i} \! -\!V_I)} \tilde G_{I,i} \! \left ( \frac{\Delta^2}{2} \! \! +\! \frac{\Delta^3}{6\tau_I}\right )\\ - \sigma^2_E { (\tildeV_{i}-V_E)} \tilde G_{E,i} \! \left ( \frac{\Delta^2}{2} \! \! +\! \frac{\Delta^3}{6\tau_E}\right ) & \sigma^2_E \tilde G_{E,i} \left ( \Delta-\frac{\Delta^2}{2\tau_E}+\frac{\Delta^3}{12\tau_E^2}\right )&0\\ - \sigma^2_I { (\tildeV_{i}-V_I)} \tilde G_{I,i} \! \left ( \frac{\Delta^2}{2} \! \! +\! \frac{\Delta^3}{6\tau_I}\right )&0&\sigma^2_I \tilde G_{I,i} \left ( \Delta \! - \! \frac{\Delta^2}{2\tau_I}\! + \! \frac{\Delta^3}{12\tau_I^2}\right )\\ \end{array}\right). \nonumber \end{align} For comparison, we recall the variance matrix for the HO model suggested by \cite{Pokern2009}, \begin{align} &\, \Sigma_{\mbox{HO, Pokern}} \, \, = \sigma^2\left(\begin{array}{cc} \frac13 \Delta^3&\frac12 \Delta^2\\ \frac12 \Delta^2&\Delta\\ \end{array}\right), \end{align} which coincides with \eqref{eq:sigmaHO} up to lowest order at each matrix entry. Furthermore, it coincides with \eqref{Sigma} when $p=1, a(v,u)=u$ and $ \Gamma (v,u) = \sigma$. \subsection{{Remarks on the convergence of the scheme}} The scheme \eqref{eq:discretize_strong}--\eqref{eq:discretize_strongU} has a strong order 1.5 and a weak order 2 convergence \citep{KloedenPlatenBook}. The following bounds follow by comparing eqs. \eqref{eq:generator}--\eqref{eq:varU} with eqs. \eqref{eq:discretize_strong}--\eqref{eq:discretize_strongU}. These bounds are needed later to prove consistency. \begin{prop}\label{prop:order_scheme}[{Moment bounds}] \begin{align*} \mathbb{E} (V_{i+1}-V_i -\Delta B(X_i)_1 | X_i { =x}) &= \mathcal{O} (\Delta^3) \\ \mathbb{E} (U_{i+1}-U_i -\Delta B(X_i)_{(-1)} | X_i { =x}) &= \mathcal{O} (\Delta^3) \\ \mathbb{E} ((V_{i+1}-V_i -\Delta B(X_i)_1 )^2| X_i { =x}) &= \frac{\Delta^3}{3} \partial_u a \Gamma \Gamma^T (\partial_u a)^T + \mathcal{O} (\Delta^4) \\ \mathbb{E} ((U_{i+1}\! -\! U_i \! -\! \Delta B(X_i)_{(-1)} ) (U_{i+1}\! -\! U_i \! -\! \Delta B(X_i)_{(-1)} )^T| X_i { =x}) &= \Delta \Gamma \Gamma^T +\mathcal{O} (\Delta^2) \\ \mathbb{E} ((V_{i+1} - V_i -\Delta B(X_i)_1 )^4| X_i { =x}) &= \mathcal{O} (\Delta^4) \\ \mathbb{E} (((U_{i+1} \! -\! U_i \! -\! \Delta B(X_i)_{(-1)} ) (U_{i+1}\! -\! U_i \! -\! \Delta B(X_i)_{(-1)} )^T)^2| X_i { =x}) &= \mathcal{O} (\Delta^2) \\ \end{align*} {where $B(X_i)_{(-1)}$ denotes the vector $B(X_i)$ with the first coordinate omitted. } \end{prop} {Note that the expected value of the difference between the true drift and the approximating drift $\Delta B$ is of order $\Delta^3$, because of the higher order scheme. This is necessary for the later convergence results in Propositions \ref{prop:consistency2} and \ref{prop:consistency1}, in particular, the technical lemmas of Section \ref{sec:technicallemmas}.} {Another useful convergence result is the convergence of the transition density of the scheme to the exact transition density, as proved in the elliptic case by \cite{Bally1996} under smooth conditions on the drift functions and diffusion coefficients. Unfortunately, this result is much more difficult to obtain for a hypoelliptic SDE such as system (\ref{GeneralModel}). This is beyond the scope of this paper.} \section{Complete observations}\label{sec:bothobserved} In this Section we investigate parameter estimation when all coordinates are discretely observed. Later, we extend to the situation where only the first coordinate is observed. \subsection{Contrast estimator} The goal is to estimate the parameter $\theta=(\psi, \varphi, \sigma)$ by maximum likelihood of the approximate model, with complete likelihood \begin{equation}\label{eq:completeLikelihood_approx} p_\Delta(V_{0:n},U_{0:n};\theta) = p(V_0,U_0;\theta)\prod_{i=1}^n p_\Delta(V_{i}, U_{i}|V_{i-1}, U_{i-1};\theta), \end{equation} {where $p(V_0,U_0;\theta)$ is the density of the initial value of the process. The contribution from this single data point is negligible for relevant sample sizes, and we will simply assume it degenerate in the observed value $(V_0,U_0)$. } {This likelihood} corresponds to a pseudo-likelihood for the exact diffusion, with exact complete likelihood given in \eqref{eq:completeLikelihood}. The estimator is then the minimizer of minus 2 times the log complete likelihood: \begin{align}\label{eq:pseudoLike} \arg\min_{\theta}& \sum_{i=0}^{n-1}\left( (X_{i+1}\! -\! X_i-\Delta B(X_i; \theta))^T \, \Sigma_i^{-1}(X_{i+1}\! -\! X_{i}-\Delta B(X_i; \theta)) + \log \det (\Sigma_i)\right) \end{align} This {criterion} is ill behaved because the system is hypoelliptic, so the order of the variance for $V$ is $\Delta^3$ and {for $U$ it is $\Delta$}. Therefore, we propose to separate the estimation of parameter $\psi$ of the first coordinate from parameters $(\phi, \sigma)$ of the second coordinate. We thus introduce two new contrasts and their corresponding estimators. \begin{definition} The estimator of the parameters of the first coordinate is given by \begin{eqnarray}\label{eq:hatpsi} \hat \psi_n &= & \arg\min_{\psi} \left( \frac{3}{\Delta^3} \sum_{i=0}^{n-1} \frac{(V_{i+1}-V_i - \Delta B(X_i; \theta)_1)^2}{(\partial_u a(X_i;\psi)) \Gamma\Gamma^T(X_i; \sigma)(\partial_u a(X_i;\psi))^T} \right.\\ &&\left. + \sum_{i=0}^{n-1} \log ((\partial_u a(X_i;\psi)) \Gamma\Gamma^T(X_i; \sigma)(\partial_u a(X_i;\psi))^T)\right) \nonumber \end{eqnarray} where the parameters $\varphi$ and $\sigma$ are {fixed}. The estimator of the parameters of the second coordinate is given by \begin{eqnarray} (\hat \varphi_n, \hat \sigma_n^2 ) &= &\arg\min_{\varphi, \sigma^2} \left( \sum_{i=0}^{n-1} \log (\det(\Gamma\Gamma^T(X_i; \sigma))\right.\label{eq:hatphi} \\ &+&\left. \sum_{i=0}^{n-1} (U_{i+1}\! -\! U_i \! - \Delta B(X_i; \theta)_{(-1)})^T \left(\Delta \Gamma\Gamma^T\! (X_i; \sigma)\right)^{-1} \! (U_{i+1}\! -\! U_i \! -\Delta B(X_i; \theta)_{(-1)})\right) \nonumber \end{eqnarray} where the parameter $\psi$ is {fixed}. \end{definition} The first contrast corresponds to the pseudo-likelihood of the marginal distribution of the first coordinate. The second contrast is a simplification of the pseudo-likelihood of the marginal of the coordinates with direct noise: the variance appearing in the pseudo-likelihood is $\Delta \Gamma\Gamma^T(X_i, \sigma)(1+ o(\Delta))$ and is simplified to $\Delta \Gamma\Gamma^T(X_i, \sigma)$ in the contrast (\ref{eq:hatphi}), since the variance is dominated by the lowest order term. The contrasts (\ref{eq:hatpsi}) and (\ref{eq:hatphi}) require the other parameters to be fixed. {To estimate the complete parameter vector, the parameters are initialized and then the optimization procedure iterates between the two estimators (\ref{eq:hatpsi}) and (\ref{eq:hatphi}).} The numerical optimization of the criteria is not sensitive to those fixed values {since} they appear in higher order term{s}. \subsection{Theoretical properties of the contrast estimators} We start by proving the consistency of the contrast estimators. The asymptotics are in number of observations $n$ and length of time step between observations $\Delta_n$, where we have introduced an index $n$ to clarify the relevant asymptotics. \begin{prop} \label{prop:consistency2} {Assume the drift function $a$ can be decomposed as either: $a(x;\psi) = a_v(v, \psi) + a_{u}(u)$ or $a(x;\psi) = a_v(v) + \psi a_u(x)$.} Denote by $\psi_0$ the true value of the parameter, and assume $(\varphi, \sigma^2)$ known. If $\Delta_n \rightarrow 0$ and $n\Delta_n\rightarrow \infty$ then $$\hat \psi_n \stackrel {P}{\rightarrow} \psi_0 .$$ \end{prop} \begin{prop} \label{prop:consistency1} Denote by $(\varphi_0, \sigma^2_0)$ the true values of the parameters, and assume $\psi$ known. If $\Delta_n \rightarrow 0$ and $n\Delta_n\rightarrow \infty$ then $$(\hat \varphi_n , \hat \sigma^2_n) \stackrel {P}{\rightarrow} (\varphi_0, \sigma^2_0). $$ \end{prop} The proofs are given in {Supplementary Material, Section \ref{append_consistency}. In the numerical examples, the parameters are estimated and not fixed to their true values.} The convergence conditions are standard: the length of the observation interval has to increase for consistency of drift parameters. For consistency of the variance parameter, it can be proven that only $\Delta_n \rightarrow 0$ and $n\rightarrow \infty$ are needed, but we will not pursue that here. The estimators are asymptotically normal. We prove the result for $(\hat \varphi_n, \hat \sigma^2_n)$ and give some partial proofs for $\hat \psi_n$. \begin{theorem} \label{prop:normality} Let $\nu(\cdot)$ denote the stationary density of model \eqref{GeneralModel}. If $\Delta_n \rightarrow 0$, $n\Delta_n\rightarrow \infty$ and $n\Delta_n^2\rightarrow 0$, then \begin{eqnarray*} \sqrt{n\Delta_n} (\hat \varphi_n - \varphi_0)&\stackrel {\mathcal{D}}{\rightarrow} & \mathcal{N}\left(0, \left(\nu\left( (\partial_\varphi A(\cdot, \varphi_0))^T(\Gamma\Gamma^T(\cdot, \sigma_0))^{-1}(\partial_\varphi A(\cdot, \varphi_0))\right)\right)^{-1}\right)\\ \sqrt{n} (\hat \sigma_n - \sigma_0)&\stackrel {\mathcal{D}}{\rightarrow} & \mathcal{N}\left(0, 2\left(\nu\left( (\partial_\sigma \Gamma\Gamma^T(\cdot, \varphi_0))^T(\Gamma\Gamma^T(\cdot, \sigma_0))^{-1}(\partial_\sigma \Gamma\Gamma^T(\cdot, \varphi_0))\right)\right)^{2}\right) \end{eqnarray*} {where $\nu(f(\cdot))=\int f(x) d \nu(x)$.} \end{theorem} {For the estimator of the parameters of the smooth coordinate, the rate of convergence is faster.} \begin{theorem} \label{prop:normality2} Let $\nu(\cdot)$ denote the stationary density of model \eqref{GeneralModel}. Assume the drift function $a$ can be decomposed as either: $a(x;\psi) = a_v(v, \psi) + a_{u}(u)$ or $a(x;\psi) = a_v(v) + \psi a_u(x)$. If $\Delta_n \rightarrow 0$, $n\Delta_n\rightarrow \infty$ and $n\Delta_n^2\rightarrow 0$, then \begin{eqnarray*} \sqrt{\frac{n}{\Delta_n}} (\hat \psi_n - \psi_0)&\stackrel {\mathcal{D}}{\rightarrow} & \mathcal{N}\left(0, \frac13 \left(\nu\left( (\partial_\psi a(\cdot, \psi_0))^T(\partial_ua(\cdot,\psi_0)\Gamma\Gamma^T(\cdot, \sigma_0) (\partial_ua(\cdot,\psi_0))^T)^{-1}(\partial_\psi a(\cdot, {\psi_0}))\right)\right)^{-1}\right) \end{eqnarray*} \end{theorem} The proofs are given in {Supplementary Material, Section \ref{append_consistency}}. \section{Partial observations}\label{sec:unobserved} In this Section we assume that we do not observe the coordinates $U_t$, which is the most relevant case for applications. The likelihood to maximize is therefore not the complete approximate likelihood, but the approximate likelihood $p_\Delta(V_{0:n}; \theta)$ defined as the integral of the complete approximate likelihood (\ref{eq:completeLikelihood_approx}) with respect to the hidden components. \begin{equation}\label{eq:likelihood_approx} p_\Delta(V_{0:n};\theta) = \int \prod_{i=1}^n p_\Delta(X_i|X_{i-1};\theta) dU_{0:n}. \end{equation} It corresponds to a discretization of the exact likelihood (\ref{eq:Likelihood}). The multiple integrals of equation (\ref{eq:likelihood_approx}) are difficult to handle and it is not possible to maximize the pseudo-likelihood directly. As explained in Section \ref{sec:bothobserved}, it is easier to maximize the complete approximate likelihood, after imputing the hidden coordinates. For models where $a(v,u)=a_v(v) + a_u(v)u$ for some functions {$a_v$ and $a_u$} that do not depend on the parameter, such as in the HO model, the imputation is intuitive: the unobserved coordinate $U_t$ can be approximated by the differences of the observed coordinate $V_t$, $U_{i} \approx( (V_{i+1}-V_i)/\Delta-a_v(V_i))/a_u(V_i)$. However, this induces a bias in the estimation of $\sigma$ \citep[see][for more details]{Samson2012}, and is moreover only applicable for drift functions of the observed coordinate such that $u$ can be isolated. We will take advantage of that when initializing the estimation algorithm in Section \ref{sec:initialization}. In this paper we propose to use a particle filter, also known as Sequential Monte Carlo (SMC), to impute the hidden coordinates. Then, this imputed path is plugged into a stochastic SAEM algorithm \citep{Delyon1999}, as done in \cite{Ditlevsen2014} for the elliptic case. The SMC proposed by \cite{Ditlevsen2014} allows to filter a hidden coordinate that is not autonomous in the sense that the equation for $U_t$ depends on the first coordinate $V_t$. Here, we extend the algorithm to the case of $p$ hidden coordinates, to deal with a $p+1$-dimensional SDE. More precisely, the observable vector $V_{0:n}$ is then part of a so-called complete vector $(V_{0:n}, U_{0:n})$, where $U_{0:n}$ has to be imputed. At each iteration of the SAEM algorithm, the unobserved data are filtered under the smoothing distribution $p_\Delta (U_{0:n}\;|V_{0:n}; \theta)$ with an SMC. Then the parameters are updated using the pseudo-likelihood proposed in Section \ref{sec:bothobserved}. Details on the filtering are given in Section \ref{sec:filtering}, and the SAEM algorithm is presented in Section \ref{sec:SAEM}. \subsection{Particle filter}\label{sec:filtering} The SMC proposed in \cite{Ditlevsen2014} is designed for a $p=1$-dimensional hidden coordinate. Here we extend to the general case. For notational simplicity, $\theta$ is omitted in the rest of this Section. The SMC algorithm provides $K$ particles $(U^{(k)}_{0:n})_{k=1, \dots, K}$ and weights $(W^{(k)}_{0:n})_{k=1, \dots, K}$ such that the empirical measure $\Psi^K_{n} = \sum_{k=1}^K W_n(U_{0:n}^{(k)}) \mathbf{1}_{U_{0:n}^{(k)}} $ approximates the conditional smoothing distribution $p_\Delta(U_{0:n}|V_{0:n})$ \citep[]{Doucet2001}. The SMC method relies on proposal distributions $q(U_{i} | V_{i},V_{i-1}, U_{i-1})$ to sample the particles from these distributions. We write $V_{0:i} = (V_0, \ldots , V_{i})$ and likewise for $U_{0:i}$. \bigskip \begin{algo}[\textbf{SMC algorithm}] \label{SMCalgo} $\;$ \begin{itemize} \item \emph{At time $i=0$: } $\forall\, k = 1,\ldots, K$ \begin{enumerate} \item sample $U_0^{(k)}$ from $p(U_0|V_0)$ \item compute and normalize the weights:\\ $w_0\left(U^{(k)}_0\right) = {1}$, $\quad W_0 \left(U^{(k)}_0\right) = \frac{w_0 \left(U^{(k)}_0\right) }{\sum_{k=1}^{K} w_0 \left(U^{(k)}_0\right) } $ \end{enumerate} \item \emph{At time $i=1,\ldots, n$: } $\forall\, k = 1,\ldots, K$ \begin{enumerate} \item sample indices $A_{i-1}^{(k)}\sim r(\cdot | W_{i-1}(U_{0:i-1}^{(1)}), \ldots, W_{i-1}(U_{0:i-1}^{(K)}) )$ {where $r(\cdot)$ denotes the multinomial distribution} and set \\ $U_{0:i-1}^{'(k)} = U_{0:i-1}^{(A_{i-1}^{(k)})}$ \item sample $U^{(k)}_{i} \sim q \left(\cdot | V_{i-1:i}, U^{'(k)}_{i-1} \right)$ and set $U^{(k)}_{0:i} = (U_{0:i-1}^{'(k)}, U^{(k)}_{i})$ \item compute and normalize the weights $W_i(U^{(k)}_{0:i}) = \frac{w_i \left(U^{(k)}_{0:i}\right) }{\sum_{k=1}^{K} w_i \left(U^{(k)}_{0:i}\right)}$ with \\ { $w_i\left(U^{(k)}_{0:i} \right) = \frac{p_\Delta \left(V_{0:i}, U^{(k)}_{0:i}\right)}{p_\Delta\left(V_{0:i-1},U_{0:i-1}^{'(k)} \right)q\left(U^{(k)}_{i} | V_{i-1:i},U_{0:i-1}^{'(k)}\right)} $} \end{enumerate} \end{itemize} \end{algo} Natural choices for the proposal $q$ are either the transition density $q(U_{i} | V_{i-1:i},U_{i-1}) = p_\Delta(U_{i}| V_{i-1},U_{i-1})$ or the conditional distribution $q(U_{i}|V_{i-1:i},U_{i-1}) = p_\Delta(U_{i}| V_{i-1:i},U_{i-1})$, following \cite{Ditlevsen2014}. The two choices are not equivalent in the hypoelliptic case because the covariance matrix of the approximate scheme is not diagonal. The conditional distribution gives better results in practice and is used in the simulations. This is due to the extra information provided by also conditioning on $V_i$. In the following, we present some asymptotic convergence results on the SMC algorithm. The assumptions can be found in {Supplementary Material, Section \ref{App:assumptions}}. For a bounded Borel function $f$, denote $\Psi_{n}^K {(f)} = \sum_{k=1}^K f(U_n^{(k)}) W_{n}(U_{0:n}^{(k)})$, the conditional expectation of $f$ under the empirical measure $\Psi_{n}^K$. We also denote $\pi_{n,\Delta} {(f)} = \mathbb{E}_\Delta\left(f(U_n)|V_{0:n}\right)$ the conditional expectation under the smoothing distribution $p_\Delta(U_{0:n}|V_{0:n})$ of the approximate model. \begin{prop}\label{lemma} Under assumption (SMC3), for any $\varepsilon>0$, and for any bounded Borel function $f$ on $\mathbb{R}$, there exist constants {$C_{1,\Delta}$ and $C_{2,\Delta} $ that do not depend on $K$}, such that \begin{eqnarray} \label{lemma1} \mathbb{P}\left(\left|\Psi_{n}^K {(f)} - \pi_{n,\Delta} {(f)}\right|\geq \varepsilon\right)&\leq& C_{1,\Delta} \exp\left(-K \frac{\varepsilon^2}{C_{2,\Delta} \|f\|^2}\right) \end{eqnarray} where $\| f\|$ is the sup-norm of $f$ and $C_{1,\Delta}$, $C_{2,\Delta}$ are constants detailed in \cite{Ditlevsen2014}. \end{prop} The proof is the same as in \cite{Ditlevsen2014}. The hypoellipticity of the process is not a problem as the filter is applied on the discretized process where the noise has been propagated to the first coordinate{, such that the ratio in Algorithm 1, step (c) will be well-defined when calculating the weights, since then $p_{\Delta}$ and $q$ are non-degenerate normal densities different from 0}. \subsection{SAEM}\label{sec:SAEM} The estimation method is based on a stochastic version of the EM algorithm \citep{Dempster1977}, namely the SAEM algorithm \citep{Delyon1999} coupled to the SMC algorithm, as already proposed by \cite{Ditlevsen2014} in the elliptic case. To fulfill convergence conditions of the algorithm, we consider the particular case of a distribution from an exponential family. {Note that it is the discrete pseudo-likelihood \eqref{eq:completeLikelihood_approx} using the strong order 1.5 scheme that needs to fulfill the conditions.} More precisely, we assume: \begin{itemize} \item[\textbf{(M1)}] The parameter space $\Theta$ is an open subset of $\mathbb{R}^p$. The complete {pseudo-}likelihood belongs to a curved exponential family, i.e., $\log p_\Delta(V_{0:n},U_{0:n};\theta)= - \psi(\theta) + \left\langle S(V_{0:n},U_{0:n}),\nu(\theta)\right\rangle$, where $\psi$ and $\nu$ are two functions of $\theta$, $S(V_{0:n},U_{0:n})$ is known as the minimal sufficient statistic of the complete model, taking its value in a subset ${\mathcal{S}}$ of $\mathbb{R}^d$, and $ \left\langle\cdot, \cdot\right\rangle$ is the scalar product on $\mathbb{R}^d$. \end{itemize} The three models considered in this paper satisfy this assumption. Details of the sufficient statistic $S$ for the HO model are given in {the Supplementary Material,} Appendix \ref{sec:suff_stat_HO}. Under assumption (M1), introducing a sequence of positive numbers $(a_m)_{m\in \mathbb{N}}$ decreasing to zero, the SAEM-SMC algorithm is defined as follows. \newpage \begin{algo}[SAEM-SMC algorithm] $\;$ \vspace{-0.5em} \begin{itemize} \item \emph{Iteration $0$:} initialization of $\; \widehat{\theta}_{0}$ and set $s_{0}=0$. \item \emph{Iteration $m\geq 1$:} \begin{itemize} \item[\emph{S-Step:}] simulation of the non-observed data $(U_{0:n}^{(m)})$ with SMC targeting the {smoothing } distribution $p_\Delta(U_{0:n}|V_{0:n}; \widehat{\theta}_{m-1})$. \item[\emph{SA-Step:}] update $s_{m-1}$ using the stochastic approximation: \begin{equation}\label{stoch_approx} s_{m} =s_{m-1}+ a_{m-1} \left[S(V_{0:n},U_{0:n}^{(m)})-s_{m-1}\right] \end{equation} \item[\emph{M-Step:}] update of $\widehat{\theta}_{m}$ by $\widehat{\theta}_{m}=\underset{\theta \in \Theta}{\arg \max} \left(-\psi(\theta)+\langle s_{m},\nu(\theta)\rangle \right).$ \end{itemize} \end{itemize} \end{algo} {Simulation under the smoothing distribution can be performed using a {\em naive forward} approach, which amounts to carry forward trajectories in the particle filter. We also implemented a backward SMC smoother, with variance $O(n)$ instead of $O(n^2)$ for the naive smoother. However, in practice, the stochastic averaging of the SA step reduces the variance by averaging over all the previous iterations using the step size $a_m$. } Following \cite{Ditlevsen2014}, we can prove the convergence of the SAEM-SMC algorithm, under standard assumptions that are recalled in the {Supplementary Material, Section \ref{App:assumptions}}. \begin{theorem}\label{thcvSAEM} Assume that (M1)-(M5), (SAEM1)-(SAEM3), and (SMC1)-(SMC3) hold. Then, with probability 1, $\lim_{m\rightarrow \infty}$ $ d( \widehat{\theta}_{m}, \mathcal{L}) = 0 $ where $\mathcal{L}=\{ \theta \in \Theta, \partial_\theta \ell_\Delta (\theta)=0\}$ is the set of stationary points of the log-likelihood $\ell_\Delta(\theta) = \log p_\Delta(V_{0:n};\theta)$. Moreover, under assumptions (LOC1)-(LOC3) given in \cite{Delyon1999} on the regularity of the log-likelihood, the sequence $\widehat{\theta}_{m}$ converges with probability 1 to a (local) maximum of the likelihood $p_\Delta(V_{0:n};\theta)$. \end{theorem} The classical assumptions (M1)-(M5) are usually satisfied. Assumption (SAEM1) is easily satisfied by choosing properly the sequence $(a_m)$. Assumptions (SAEM2) and (SAEM3) depend on the regularity of the model. They are satisfied for the 3 approximate models. \subsection{Initializing the algorithm}\label{sec:initialization} The SAEM algorithm requires initial values of $\theta$ to start. We detail our strategy to find initial values for the two first models. The SIE model is arbitrarily initialized with unknown parameters fixed {at values of the correct order of magnitude}. For the HO model, we run the two-dimensional contrast based on complete observations of the two coordinates. As the $U$ coordinate is not observed, we replace it by the increments of $V$: $\tilde U_i = (V_{i+1}-V_i)/\Delta$. Then the two-dimensional criterion is minimized and initial values $\hat D_0, \hat \gamma_0, \tilde \sigma_0$ are obtained. The value $\tilde \sigma_0$ is biased due to the approximation of $U_i$, as shown by \cite{Samson2012}. Therefore, we apply the bias correction suggested by \cite{Samson2012} and use $\hat \sigma_0= \sqrt{\frac32} \tilde \sigma_0$ as initial value. For the FHN model, the problem is more difficult because the unknown parameter $\varepsilon$ appears in the equation of the observed coordinate. We fix an arbitrary value for $\hat \varepsilon_0$. Then we replace the hidden coordinate $U_i$ by $\tilde U_i = V_{i}-V_i^3+s-\hat \varepsilon_0 \frac{V_{i+1}-V_i}{\Delta}$. Using $(V_i, \tilde U_i)$, we minimize the two-dimensional contrast to obtain initial values $\hat \gamma_0, {\hat \alpha _0}, \hat \varepsilon_0$. \section{Simulation study} \label{sec:simulation} \subsection{Harmonic Oscillator} Parameter values of the Harmonic Oscillator used in the simulations are the same as those of \cite{Pokern2009, Samson2012}. The values are: $D=4$, $\gamma=0.5$, $\sigma=0.5$. Trajectories are simulated with the exact distribution eqs. \eqref{eq:HOdistribution1}--\eqref{eq:HOdistribution2}--\eqref{eq:HOdistribution3} with time step $\Delta=0.02$ and $n=1 000$ points. Then $\theta$ is estimated on each simulated trajectory. A hundred repetitions are used to evaluate the performance of the estimators. The Particle filter aims at filtering the hidden process $(U_t)$ from the observed process $(V_t)$. We illustrate its performance on a simulated trajectory, with $\theta$ fixed at its true value. The SMC Particle filter algorithm is implemented with $K=100$ particles and the conditional transition density as proposal. The performance of the SAEM-SMC algorithm is illustrated on 100 simulated trajectories. The SAEM algorithm is implemented with $m=80$ iterations and a sequence ($a_m$) equal to 1 during the 30 first iterations and equal to $a_m = 1/(m-30)^{0.9}$ for $m> 30$. The SMC algorithm is implemented with $K(m)=100$ particles at each iteration of the SAEM algorithm. The SAEM algorithm is initialized automatically by maximizing the log likelihood of the complete data, replacing the hidden $(U_{i\Delta})$ by the differences $((V_{(i+1)\Delta}-V_{i\Delta})/\Delta)$. Several estimators are compared. The complete observation case is illustrated with the new contrast estimator (numerical optimisation of contrast (\ref{eq:hatphi})) and the Euler contrast from \cite{Samson2012} (explicit estimators). The partial observation case is illustrated with the SAEM estimator and the Euler contrast from \cite{Samson2012}. Bayesian results from {the weak order 1.5 scheme} presented in \cite{Pokern2009} are also recalled, even if they are obtained with a different sampling ($n=10 000$ and $\Delta=0.01$). This estimator is known from \cite{Pokern2009} to be biased. Results are given in Table \ref{tab:simuHO}. \begin{table} \caption{\label{tab:simuHO} Harmonic Oscillator, mean and standard deviation (in parentheses) of estimators calculated from 100 trajectories with $\Delta=0.02$ and $n=1 \, 000$. Five estimation methods. Complete observations: new contrast estimator given in eq. \eqref{eq:hatphi} and Euler contrast from \cite{Samson2012}. Partial observations: SAEM, Euler contrast from \cite{Samson2012} and weak order 1.5 estimator from \cite{Pokern2009} obtained with $n=10 \, 000$ and $\Delta=0.01$ (only the mean values for $D$ and $\gamma$ are given in their paper). } \begin{tabular}{cc|rr|rrr} \hline && \multicolumn{4}{c}{ Observations}\\ & & \multicolumn{2}{c|}{Complete} & \multicolumn{3}{c}{Partial}\\ \hline &True&New Contrast& Euler Contrast& SAEM & Euler Contrast & {weak order 1.5}\\ \hline $D$& 4.0 & 3.712 (0.634) & 3.969 (0.540) &4.081 (0.503) & 3.969 (0.540) & 1.099 (--)\\ $\gamma$ & 0.5& 0.701 (0.287) & 0.716 (0.273) &0.663 (0.273) & 0.754 (0.278) & 0.139 (--)\\ $\sigma$ &0.5 & 0.496 (0.014)& 0.496 (0.011) & 0.509 (0.012) & 0.503 (0.011) & -- (--)\\ \hline \end{tabular} \end{table} \medskip The first four estimators give overall acceptable results, while the weak order 1.5 estimator of \cite{Pokern2009} is seriously biased. The best results are obtained with the SAEM. It might seem surprising that the SAEM performs even better than the estimators based on complete observations. This is due to the sensitivity of the numerical optimisation of the contrast (\ref{eq:hatphi}) to the initial conditions {for the iterative procedure}, that were set to ${(\hat \gamma_0, \hat D_0, \hat \sigma_0)= } (3,1,1)$. The stochasticity of the SAEM algorithm helps to avoid local optimization points, while the numerical optimizer might get stuck in some local minimum. The optimization of the Euler contrast is explicit for the HO model, and there is thus no dependence on initial conditions. It therefore outperforms the new contrast for $D$. Comparing the SAEM and the Euler contrast for the partial observation case, they give results of the same order, even if slightly better for the SAEM. However, the SAEM is much more time consuming. Note also that the SAEM algorithm provides confidence intervals easily, which is not possible with the contrast estimators. \subsection{FitzHugh-Nagumo model} Parameter values of the FitzHugh-Nagumo model used in the simulations are : $\varepsilon=0.1$, $s=0$, $\gamma=1.5$, ${\alpha}=0.8$, $\sigma=0.3$. Trajectories are simulated with time step $\delta=0.002$ and $n=1 000$ points are subsampled with observation time step $\Delta=10 \delta$. Then $\theta$ is estimated on each simulated trajectory. A hundred repetitions are used to evaluate the performance of the estimators. \begin{figure}[b!] \centering \includegraphics[width = 0.8\textwidth]{FHNestimatesdensity1.pdf} \caption{\label{fig:FHNdensity} FHN estimation results for partial observations. Densities of estimated parameters over 100 repetitions for the new contrast method assuming $\varepsilon$ known (red), SAEM assuming $\varepsilon$ known (blue), SAEM estimating $\varepsilon$ (green). The blue vertical lines are the true values. } \end{figure} Several estimators are compared. First note that $\varepsilon$ is difficult to estimate because it appears in the first coordinate. Therefore, we first fix it at its true value. This allows to transform the system into a Langevin equation with $dV_t=Z_tdt$, and to apply the Euler contrast proposed by \cite{Samson2012}. With $\varepsilon$ fixed, we compare in the complete observation case the contrast estimator (numerical optimisation of contrast (\ref{eq:hatphi})) and the Euler contrast from \cite{Samson2012} (explicit estimators). We also include the estimation of the full parameter vector by the new contrast given in eqs. \eqref{eq:hatpsi} and \eqref{eq:hatphi}. In the partial observation case we compare the SAEM estimator, the new contrast and the Euler contrast from \cite{Samson2012}. We also run the SAEM algorithm where $\varepsilon$ is not fixed but estimated. The SAEM algorithm is implemented with $m=350$ iterations and a sequence ($a_m$) equal to 1 during the 250 first iterations and equal to $a_m = 1/(m-250)^{0.9}$ for $m> 250$. The SMC algorithm is implemented with $K=100$ particles at each SAEM iteration. The SAEM algorithm is initialized automatically by maximizing the log likelihood of the complete data, replacing the hidden $(U_{i\Delta})$ by the differences $(V_{i\Delta}-V_{i\Delta}^3 s - \varepsilon(V_{(i+1)\Delta}-V_{i\Delta}))/\Delta$, $\varepsilon$ being initialized at ${\hat \varepsilon_0=}0.12$. Results are given in Table \ref{tab:simuFHN}, and densities of estimates in the partially observed case are presented in Figure \ref{fig:FHNdensity}. \begin{table} \caption{\label{tab:simuFHN} FitzHugh-Nagumo model. Mean and standard deviation (in parentheses) of estimators calculated from 100 trajectories with $\Delta=0.02$ and $n=1 \, 000$. Seven estimation methods. Complete observations, $\varepsilon$ fixed: new contrast estimator and Euler contrast from \cite{Samson2012}. Complete observations, $\varepsilon$ estimated: new contrast estimator. Partial observations, $\varepsilon$ fixed: SAEM, new contrast and Euler contrast from \cite{Samson2012} $\varepsilon$ fixed. Partial observations, $\varepsilon$ estimated. SAEM. } \begin{tabular}{lc|cccc} \hline & & \multicolumn{3}{c}{Complete observations} \\ & &$\varepsilon$ fixed&$\varepsilon$ fixed&$\varepsilon$ estimated\\ &True&New Contrast& Euler Contrast& New Contrast \\ \hline $\varepsilon$& 0.1& -- & --& 0.101 (0.0005) \\ $\gamma$ &1.5&1.412 (0.221) &1.363 (0.201) & 1.516 (0.149) \\ ${\alpha}$ &0.8& 0.826 (0.146) &0.756 (0.131) & 0.822 (0.131)\\ $\sigma$ &0.3& 0.303 (0.014) & 0.338 (0.024) & 0.299 (0.007) \\ \hline & & \multicolumn{3}{c}{Partial observations}\\ & &$\varepsilon$ fixed &$\varepsilon$ fixed&$\varepsilon$ fixed& $\varepsilon$ estimated\\ &True&SAEM & New Contrast & Euler Contrast & SAEM\\ \hline $\varepsilon$& 0.1& --& --& -- &0.105 (0.006) \\ $\gamma$ &1.5& 1.523 (0.130) &1.512 (0.129) &1.500 (0.130) &1.592 (0.165) \\ ${\alpha}$ &0.8& 0.822 (0.110) &0.815 (0.110) &0.807 (0.109) & 0.865 (0.129)\\ $\sigma$ &0.3& 0.293 (0.008) & 0.300 (0.023) &0.285 (0.008) &0.306 (0.021) \\ \hline \end{tabular} \end{table} The results are acceptable overall. In the complete observation case, the new contrast gives better results than the Euler {contrast}. This is expected because the new constrast has a higher order of convergence. For the partial observation case, when $\varepsilon$ is fixed, the performance of the SAEM and the contrast are close. The Euler contrast gives better results with partial observations than complete observations (except for $\sigma$). This might be due to the sensitivity of the numerical optimization used to minimize the criteria. Finally, the SAEM gives good results when $\varepsilon$ is estimated, and this is the only method that can estimate it. \subsection{Synaptic-conductance model} Parameter values of the SIE model used in the simulations are : $G_L=50$, $V_L=-70$, $V_E=0$, $V_I=-80$, $I_{{inj}}=-60$, $\tau_E=0.5$, $\tau_I=1$, $\bar g_E=17.8$, $\bar g_I=9.4$, $\sigma_E=0.1$, $\sigma_I=0.1$. Initial conditions of the system are $V_0=-60$, $G_{e,0}=10$, $G_{i,0}=1$. Trajectories are simulated with time step $\delta=0.002$ and $n=1 000$ points are subsampled with observation time step $\Delta=10 \delta$. Then $\theta=(\tau_E, \tau_I, \bar g_E, \bar g_I, \sigma_E, \sigma_I)$ is estimated on each simulated trajectory. A hundred repetitions are used to evaluate the performance of the estimators. The SAEM algorithm is implemented with $m={80}$ iterations and a sequence ($a_m$) equal to 1 during the {30} first iterations and equal to $a_m = 1/(m-{30})^{0.9}$ for $m> {30}$. The SMC algorithm is implemented with $K(m)=100$ particles at each iteration of the SAEM algorithm. The SAEM algorithm is initialized with {unknown parameters fixed at the correct order of magnitude: time parameters are fixed to 1, unknown mean parameters are fixed to 10 and unknown standard deviation parameters are fixed to 0.1.} Results are given in Table \ref{tab:simuSIE}. { Parameters $(\tau_E, \tau_I)$ are best estimated. Variances are larger for estimates of the inhibitory parameters.} Inhibitory conductances are generally more difficult to estimate, as also observed in \cite{BergDitlevsen2013}, where analytic expressions for approximations of the variance of the estimators of the conductances in a similar model were derived from the Fisher Information matrix. This is because the dynamics of $V_t$ are close to the inhibitory reversal potential $V_I$, whereas it is far from the excitatory reversal potential $V_E$, and thus, the synaptic drive is higher for excitation. \begin{table} \caption{\label{tab:simuSIE} Synaptic conductance hypoelliptic model, estimation results obtained from 100 repeated trajectories with SAEM, from partial observations {(means and standard deviations over the 100 repeated trajectories)}.} \begin{tabular}{llrrrrrr} \hline &&\multicolumn{6}{c}{Parameters}\\ && $\tau_E$ & $\tau_I$ &$\bar g_E$&$\bar g_I$ & $\sigma_E$& $\sigma_I$\\ \hline true && 0.500& 1.000& 17.800& 9.400& 0.100& 0.100\\ \hline mean && { 0.486} & { 0.990}& { 17.381} & { 8.414}& { 0.076}& { 0.098} \\ {SD}&&{ 0.031}& { 0.180}& { 0.110}& { 0.250}& { 0.003}& { 0.014}\\ \hline \end{tabular} \end{table} \section*{Acknowledgements} \noindent Adeline Samson has been supported by the LabEx PERSYVAL-Lab (ANR-11-LABX-0025-01). The work is part of the Dynamical Systems Interdisciplinary Network, University of Copenhagen. Villum Visiting Professor Programme funded a longer stay of A. Samson at University of Copenhagen.
\subsection{Identifiability} \label{appendix:identifiability} When the sampling is node-centered, we denote $V_i = 1$ if node $i$ is observed and $V_i = 0$ otherwise. \begin{proof}[Proof of Proposition~\ref{thm:ident_mcarParam}] Let $\rho,\rho^{\prime}>0$ be such that $p_\rho(R)=p_{\rho^{\prime}}(R)$ (resp. $p_\rho(V)=p_{\rho^{\prime}}(V)$). Since $R$ (resp.$V$) does not depend on $\MA$, then $\mathbb{P}_\rho(R_{ij}=1)=\rho=\rho^{\prime}=\mathbb{P}_{\rho^{\prime}}(R_{ij}=1)$ (resp. $\mathbb{P}_{\rho}(V_{i}=1)=\rho=\rho^{\prime}=\mathbb{P}_{\rho^{\prime}}(V_{i}=1)$). \end{proof} \begin{proof}[Proof of Theorem~\ref{thm.identifiabilityMAR}] Let $P_{[n]}^o$ denote the probability distribution function of $\Xn^o$. We show that there exists a unique $(\alpha,\pi)$ corresponding to $P_{[n]}^o$. Define $s_q=\mathbb{P}(\MA_{ij}R_{ij}=1|Z_{iq}=1)=\rho (\pi \ \alpha )_q$ (resp. $s_q=\mathbb{P}(\MA_{ij}=1 |Z_{iq}=1)=(\pi \ \alpha )_q$ for star sampling). Up to reordering, $ s_1 < s_2 < \ldots < s_Q $ are the coordinates of the vector $s$ in the increasing order. Let $S$ denote the Vandermonde matrix defined by $S_{i,q}=s_q^i$, for $0\leq i<Q$ and $1\leq q \leq Q$. $S$ is invertible since the coordinates of $s$ are all different. For $i\geq1$, $S_{i,q} =\mathbb{P}(\MA_{12}R_{12}=1, \ldots, \MA_{1 i+1}R_{1 i+1}=1 | Z_{1q}=1)$ for random-dyad sampling (resp. $S_{i,q} =\mathbb{P}(\MA_{12}=1, \ldots, \MA_{1 i+1}=1 | Z_{1q}=1)$ for star degree sampling). Let us also define \begin{equation*} u_i=\sum_{1\leq k\leq Q} \alpha_k s_k^i \quad (\text{resp. $u_i=\sum_{1\leq k\leq Q} \rho \alpha_k s_k^i$}),\quad i=0,\ldots,2Q-1\enspace. \end{equation*} For $i \geq 1$, $u_i=\mathbb{P}(\MA_{12}R_{12}=1, \ldots, \MA_{1 i+1}R_{1 i+1}=1)$ (resp. $u_i =\mathbb{P}(\MA_{12}=1, \ldots, \MA_{1 i+1}=1, V_1=1)$). Note that $n\geq 2Q$ is a necessary requirement on $n$ since $\MA_{i,i}=0$ by assumption. Hence, given $P_{[n]}^o$ and $\rho$, $u_0=1$ and $u_1,\ldots,u_{2Q-1}$ are known. Furthermore, set $M$ the $(Q+1) \times Q$ matrix given by $M_{i,j}=u_{i+j}$ for every $0\leq i\leq Q$ and $0\leq j<Q$, and let $M_i$ denote the square matrix obtained by removing the row $i$ from $M$. The coefficients of $M_Q$, for $0 \leq i,j < Q$, are \begin{equation*} M_{i,j}=\sum_{1\leq k \leq Q } s_k^i \alpha_k s_k^j \quad (\text{resp. $M_{i,j}=\sum_{1\leq k \leq Q } \rho s_k^i \alpha_k s_k^j$}) \enspace,\ \mathrm{with} \ 0 \leq i,j < Q\enspace. \end{equation*} Defining the diagonal matrix $A=\mathrm{Diag}(\alpha)$, it comes that $M_Q=SAS^{\,t}$ (resp. $M_Q=\rho SAS^{\,t}$), where $S$ and $A$ are invertible, but unknown at this stage, and $\rho>0$. With $D_k=\det(M_k)$ and the polynomial $B(x)=\sum_{k=0}^Q (-1)^{k+Q} D_k\, x^k$, it yields $D_Q=\det(M_Q)\neq0$ and the degree of $B$ is equal to $Q$. Set $C_i=(1,s_i,\ldots,s_i^Q)^t$ and let us notice that $B(s_i)$ is the determinant of the square matrix produced when appending $C_i$ as the last column to $M$. The $Q+1$ columns of this matrix are linearly dependent, since they are all linear combinations of the $Q$ vectors $C_1$, $C_2$, $\ldots$, $C_Q$. Hence $B(s_i)=0$ and $s_i$ is a root of $B$ for every $1\leq i\leq Q$. This proves that $B=D_Q\prod_{i=1}^Q(x-s_i)$. Then, one knows that $s=(s_1,\ldots,s_Q)$ (as the roots of $B$ defined from $M$) and $S$. It results that $A= S^{-1} M_Q (S^{\,t})^{-1}$, which yields a unique $(\alpha_1,\ldots,\alpha_Q)$ (resp. $A= \rho^{-1} S^{-1} M_Q (S^{\,t})^{-1}$). It only remains to determine $\pi$. For $0 \leq i,j <Q $, let us introduce $U_{i,j}$ the probability that the first row of $\MA^o$ begins with $i+1$ occurrences of 1, and the second row of $\MA^o$ ends up with $j$ occurrences of 1 ($i+1+j\leq n-1$ implies $n\geq 2Q$). Then, $U_{i,j}=\sum_{k,l} S_{i,k} \alpha_k \pi_{k,l} \alpha_l S_{j,l}$ (resp. $U_{i,j}=\sum_{k,l} \rho^2 S_{i,k} \alpha_k \pi_{k,l} \alpha_l S_{j,l}$), for $0\leq i,j < Q$, and the $Q \times Q$ matrix $U = S A\pi A S^{\,t}$. The conclusion results from $\pi = A^{-1}S^{-1}U {(S^{\,t})}^{-1}A^{-1}$ (resp. $\pi =\rho^{-2} A^{-1}S^{-1}U {(S^{\,t})}^{-1}A^{-1}$). \end{proof} \begin{proof}[Proof of Theorem~\ref{thm.identifiabilityClass}] Let $P_{[n]}$ denote the probability distribution function of $(\Xn^o,R)$. We show that there exists a unique $(\alpha,\pi,\rho)$ corresponding to $P_{[n]}$. \paragraph{Identifiability of $\alpha$.} Up to reordering, let $ t_1 < t_2 < \ldots < t_Q $ denote the coordinates of the vector $t$ in the increasing order, we have : $t_q=\mathbb{P}(\MA_{ij}=1, V_j=1|Z_{iq}=1)$. Let $T$ denote the Vandermonde matrix defined by $T_{i,q}=t_q^i$, for $0\leq i<Q$ and $1\leq q \leq Q$. $T$ is invertible since the coordinates of $t$ are all different. For $i\geq1$, $T_{i,q} =\mathbb{P}(\MA_{12}=1, \ldots, \MA_{1 i+1}=1, V_2=1, \ldots, V_{i+1}=1| Z_{1q}=1)$. Let us also define \begin{equation*} v_i=\sum_{1\leq k\leq Q} \alpha_k t_k^i,\quad i=0,\ldots,2Q-1\enspace. \end{equation*} For $i \geq 1$, $v_i=\mathbb{P}(\MA_{12}=1, \ldots, \MA_{1 i+1}=1, V_2=1, \ldots, V_{i+1}=1)$. Hence given $P_{[n]}$, $v_0=1$ and $v_1,\ldots,v_{2Q-1}$ are known. Furthermore, set $N$ the $(Q+1) \times Q$ matrix given by $N_{i,j}=v_{i+j}$ for $0\leq i\leq j\leq Q$, and let $N_i$ denote the square matrix obtained by removing the row $i$ from $N$. The coefficients of $N_Q$ are \begin{equation*} N_{i,j}=v_{i+j}=\sum_{1\leq k \leq Q } t_k^i \alpha_k t_k^j\enspace,\quad \mathrm{with}\quad 0 \leq i,j < Q\enspace. \end{equation*} Defining the diagonal matrix $A=\mathrm{Diag}(\alpha)$, it comes that $N_Q=TAT^{\,t}$, where $T$ and $A$ are invertible. With $D_k=\det(N_k)$ and the polynomial $B(x)=\sum_{k=0}^Q (-1)^{k+Q} D_k\, x^k$, it yields $D_Q=\det(N_Q)\neq0$ and the degree of $B$ is equal to $Q$. Set $C_i=(1,t_i,\ldots,t_i^Q)^t$ and let us notice that $B(t_i)$ is the determinant of the square matrix produced when appending $C_i$ as last column to $N$. The $Q+1$ columns of this matrix are linearly dependent, since they are all linear combinations of the $Q$ vectors $C_1$, $C_2$, $\ldots$, $C_Q$. Hence $B(t_i)=0$ and $t_i$ is a root of $B$ for every $1\leq i\leq Q$. This proves that $B=D_Q\prod_{i=1}^Q(x-t_i)$. Then, one knows that $t=(t_1,\ldots,t_Q)$ (as the roots of $B$ defined from $N$) and $T$. It results that $A= T^{-1} N_Q (T^{\,t})^{-1}$, which yields a unique $(\alpha_1,\ldots,\alpha_Q)$. \paragraph{Identifiability of $\rho$.} Up to reordering, let $ o_1 < o_2 < \ldots < o_Q $ denote the coordinates of the vector $o$ in the increasing order, then $s_q=\mathbb{P}(\MA_{ij}=1, V_i=1|Z_{iq}=1)=\rho_q o_q$. Let $O$ denote the Vandermonde matrix defined by $O_{i,q}=o_q^i$, for $0\leq i<Q$ and $1\leq q \leq Q$. $O$ is invertible since the coordinates of $o$ are all different. For $i\geq1$, $O_{i,q} =\mathbb{P}(\MA_{12}=1, \ldots, \MA_{1 i+1}=1| Z_{1q}=1)$. Let us also define \begin{equation*} u_i=\sum_{1\leq k\leq Q} \rho_k \alpha_k o_k^i,\quad i=0,\ldots,2Q-1\enspace. \end{equation*} For $i \geq 1$, $u_i=\mathbb{P}(\MA_{12}=1, \ldots, \MA_{1 i+1}=1, V_1=1)$. Hence given $P_{[n]}$, $u_0=1$ and $u_1,\ldots,u_{2Q-1}$ are known. Furthermore, set $M$ the $(Q+1) \times Q$ matrix given by $M_{i,j}=u_{i+j}$ for every $0\leq i\leq Q$ and $0\leq j<Q$, and let $M_i$ denote the square matrix obtained by removing the row $i$ from $M$. The coefficients of $M_Q$ are \begin{equation*} M_{i,j}=u_{i+j}=\sum_{1\leq k \leq Q } o_k^i \alpha_k \rho_k o_k^j\enspace,\quad \mathrm{with}\quad 0 \leq i,j < Q\enspace. \end{equation*} Defining the diagonal matrix $B=\mathrm{Diag}(\rho)$, it comes that $M_Q=OABO^{\,t}$, where $O$, $B$ and $A$ are invertible. Using the same algebraic argument than for the identifiability of $\alpha$, it results that $B= A^{-1}O^{-1} M_Q (O^{\,t})^{-1}$, which yields, because of the identifiability of $\alpha$, a unique $(\rho_1,\ldots,\rho_Q)$. \paragraph{Identifiability of $\pi$.} For $0 \leq i,j <Q $, let us introduce $U_{i,j}$ the probability that the first row of $\MA^o$ begins with $i+1$ occurrences of 1, and the second row of $\MA^o$ ends up with $j$ occurrences of 1. \begin{multline*} U_{i,j}=\mathbb{P}\Big(\left\{ \MA_{12}=1, \ldots, \MA_{1 i+2}=1, V_2=1, \ldots, V_{i+2}=1 \right\}\bigcap \\ \left\{ \MA_{2 n-j}=1, \ldots, \MA_{2 n}=1, V_{n-j}=1, \ldots, V_{n}=1 \right\} \Big), \end{multline*} Then, $U_{i,j}=\sum_{k,l} T_{i,k} \alpha_k \pi_{k,l} \rho_k \alpha_l T_{j,l}$, for $0\leq i,j < Q$, and the $Q \times Q$ matrix $U = TA\pi A B T^{\,t}$. The conclusion results from $\pi = A^{-1}T^{-1}U {(T^{\,t})}^{-1}B^{-1}A^{-1}$. \end{proof} \subsection{Additional results for the ER Protein-Protein Interaction network} \label{sec:moreER} In this appendix, we provide more details on the NMAR clustering of the ER network discussed in Section \ref{sec:er1}. We represent the estimated connectivity matrix $\hat{\pi}$ in Figure~\ref{fig:graph_esr1_nmar} for NMAR, which exhibits a network-structure with 13 blocks (or sets of proteins) the sizes of which can be sketched from Figure~\ref{fig:alluvial_esr1}. In Figure~\ref{fig:graph_all_esr1_nmar}, we represent on the same matrix the network with the original missing data and the imputed missing dyads with the variational parameters $\nu$. Interestingly, many of the imputed values are close to $1$, which might help validating some relationships which were still uncertain in the biological literature. Figure~\ref{fig:alluvial_esr1} shows that the MAR clustering leads to a large cluster (block 3) which is mainly split into 4 blocks in the NMAR clustering (blocks 3, 4, 6 and 13). \begin{figure}[htbp!] \centering \begin{subfigure}[b]{.45\textwidth} \centering \begin{tabular}{ccc} \rotatebox{90}{\hspace{1.7cm} \small MAR estimated clusters} & \includegraphics[width=.8\textwidth]{figures/alluvial_esr1} & \rotatebox{90}{\hspace{1.7cm} \small NMAR estimated clusters} \end{tabular} \caption{Clustering comparison between MAR and NMAR (11 vs 13 blocks).} \label{fig:alluvial_esr1} \end{subfigure}\hfill \begin{subfigure}[b]{.5\textwidth} \centering \includegraphics[width=.85\textwidth]{figures/ESR1_pi_NMAR} \caption{Matrix of connectivity $\hat{\pi}$ for NMAR inference (double standard) ; intensity of the color is proportional to the probability of connection between blocks.} \label{fig:graph_esr1_nmar} \end{subfigure} \begin{subfigure}[c]{\textwidth} \centering \includegraphics[width=\textwidth]{figures/net_esr1_NA_nu_both.jpg} \caption{ER PPI network reordered by blocks inferred with SBM with NMAR modeling. Left panel: original data with \texttt{NA} entries colored in gray (upper triangle) and data imputed with $\nu_{ij}$ (lower triangle); right panel: zoom of blocks (1,2,3).} \label{fig:graph_all_esr1_nmar} \end{subfigure} \caption{ER PPI network analysis with SBM under missing data conditions} \end{figure} \subsection{Proof of Proposition \ref{prop:ICL_NMAR}} If the sampling design is node-centered (respectively dyad-centered), the first term in \eqref{eq:complete_loglik_nmar} consists in $n$ Bernoulli random variables (respectively $n(n-1)/2$ Bernoulli random variables). The term $\log p_{\psi}(R | \MAO,\MAM, Z, Q)$ can be derived using a BIC approximation: \begingroup \setlength\abovedisplayskip{0pt} \begin{gather*}\nonumber \log p_{\psi}(R | \MA, Z, Q) \simeq {\argmax_{\psi} } \log p(R | \MA, Z, \psi, Q) - \frac12 \mathrm{pen}_\mathrm{BIC}, \\ \mathrm{ where } \quad \mathrm{pen}_{\mathrm{BIC}} = \left\{ \begin{array}{ll} K \times \log (n) & \text{if the sampling design is node-centered,} \\[.2pt] K \times \log \left(\frac{n(n-1)}{2}\right) & \text{otherwise.}\\ \end{array} \right. \end{gather*} \endgroup \subsection{Proof of Proposition $\ref{prop:mar}.ii)$} \label{app:propii} Recall the following result from graphical model theory \citep[see][Formula 7.1]{giraud2014}. \begin{lemma*} Let $X, Y, W$ and $Z$ be random variables, then for all $h$ measurable, \begin{equation} \nonumber X \ \indep \ (Y,W) \ | \ Z \Rightarrow \ X \ \indep \ Y \ | \ (h(W), Z). \end{equation} \end{lemma*} Applying this lemma with $h$ the identity, function, we get $R\ \indep \ (\MAM,Z) \ | \ \MAO \Rightarrow \ R \ \indep \ Z \ | \ (\MAO,\MAM)\,$, and then $R \ \indep \ Z \ | \ (\MAO,\MAM)$ implies $R \ \indep \ Z \ | \ Y$. \subsection{Simulations for star degree ans star samplings} \label{appendix:simu-nmar} With node-centered samplings such as star-degree and class samplings, it is more difficult to find configurations different from MAR sampling designs: with dyad-centred double-standard design, the sampling parameters were directly related to the probability of an edge conditionally on the observation of the corresponding dyad, which is no longer the case for the node-centered designs. The sampling designs being hardly different from a MAR design, the NMAR inference does not show much improvement compared to the MAR inference. Still, we exhibit some interesting situations where star degree and class samplings deserve an appropriate treatment, presented herein. We simulate networks with $n=100$ nodes under an affiliation topology with intra-community probability (resp. inter community probability) equal to $0.5$ (resp. $0.05$) and $\alpha = (0.25, 0.5, 0.25)$. Sampling parameters are chosen such that $\psi=(a,b) = (-3.6, 0.1)$ for star degree sampling, which makes nodes with highest degrees preferably selected. In class sampling, these parameters are set to $\psi=(\rho_1, \rho_2, \rho_3) = (0.75, 0.5, 0.05)$, which makes nodes from the largest block and from a small block preferably selected while the other small block is under-sampled. In Figure \ref{fig:simu_other_nmar}, the estimation errors and the ARI are pictured for both cases. The sampling rates (i.e. rates of observed dyads over total number of dyads) lie in the intervals $[0.558,0.844]$ for class sampling and $[0.162,0.622]$ for star degree sampling. These two intervals arise from the values of the parameter $\psi$ explored for these two designs. We compare the performances of Algorithm \ref{algo:vem:nmar} to an oracle (when inference is conducted via a classical VEM algorithm on a fully observed network) and with Algorithm \ref{algo:vem:mar}. When facing NMAR condition, Algorithm \ref{algo:vem:nmar} shows a slight improvement over Algorithm \ref{algo:vem:mar} even if it remains far from the oracle. \begin{figure}[htbp!] \centering \begin{tabular}{c@{\hspace{.03mm}}c@{\hspace{.03mm}}c@{\hspace{.03mm}}c@{\hspace{.03mm}}c@{\hspace{.03mm}}c@{\hspace{.03mm}}c} & {\small $\|\hat{ \pi} - \pi \|_F / \| \pi\|_F$} & \hspace{0.5cm} & \small \textbf{ARI}$(Z, \hat{Z})$ & \\ \rotatebox{90}{\hspace{1.5cm} \small class} & \includegraphics[width=.35\textwidth]{figures/simu_nmar_class_sampling_errorPI} & \rotatebox{90}{} & \includegraphics[width=.35\textwidth]{figures/simu_nmar_class_sampling_ARI} & \multirow{2}{*}{\quad \includegraphics[width=.08\textwidth]{figures/legend_nmar}} \\ \rotatebox{90}{\hspace{1.5cm} \small star degree} & \includegraphics[width=.35\textwidth]{figures/simu_nmar_degree_sampling_errorPI} & \hspace{0.5cm} & \includegraphics[width=.35\textwidth]{figures/simu_nmar_degree_sampling_ARI} & \\ & \multicolumn{3}{c}{Proportion intervals of observed dyads} & \\ \end{tabular} \caption{Estimation error of $\pi$ and ARI averaged over 500 simulations in star degree and class settings. The topology is affiliation with $\epsilon = 0.05$.} \label{fig:simu_other_nmar} \end{figure} \subsection{Derivation of second lower bound in star degree sampling} \label{appendix:variational} \begin{equation*} \begin{aligned} J_{\tau,\nu,\zeta,\theta,\psi} & = C_{miss} + \sum_{i=1}^n \Ebb_{\tilde{p}}\left[ \text{logistic}(\zeta_i) + \frac{(a+bD_i)-\zeta_i}{2} + h(\zeta_i)((a+bD_i)^2 - \zeta_i^2) \right], \\ & = C_{miss} + \sum_{i=1}^n \left[ \text{logistic}(\zeta_i) + \frac{(a+b\tilde{D}_i)-\zeta_i}{2} + h(\zeta_i)(a^2 + 2ab\tilde{D}_i + b^{2}\hat{D}_i - \zeta_i^2) \right], \end{aligned} \end{equation*} where ${C}_{miss} = \sum_{i \in \nodeM} \left( a+b\tilde{D}_i \right)$ and $\hat{D}_i =\Ebb_{\tilde{p}}\left[ {D_i}^2 \right] = \mathbb{V}_{\tilde{p}}\left( D_i \right) + {\mathbb{E}_{\tilde{p}}\left[ {D_i} \right]}^2 = \sum_{j \in \nodeM} \nu_{ij}(1-\nu_{ij}) + \left( \sum_{j \in \nodeM} \nu_{ij} + \sum_{j \in \nodeO} \MA_{ij} \right)^2$. \section{Conclusion} This paper shows how to deal with missing data on dyads in the SBM. We study MAR and NMAR sampling designs motivated by network data and propose variational approaches to perform inference under this series of designs, accompanied with model selection criteria. Relevance of the method is illustrated on numerical experiments both on simulated and real-world networks. An \texttt{R}-package is available at \ifblinded \url{URL_blinded} \else \url{https://github.com/jchiquet/missSBM}. \fi. This work focuses on undirected binary networks. However, it can be adapted to other SBMs, in particular those developed in \cite{mariadassou2010} for (un)directed valued networks with a distribution of weights belonging to the exponential family. It could also be adapted to the degree-corrected SBM \citep{Karrer2011}, where the sampling design would depend on the degree correction parameters. This should lead to a design close to the star degree sampling. In future works, we plan to investigate the consistency of the variational estimators of SBM under missing data conditions, looking for similar results as the ones obtained in \cite{bickel2013asymptotic} for fully observed networks. Another path of research is to consider missing data where we cannot distinguish between a missing dyad and the absence of an edge like in \citet{Priebe2015,Balachandran2017}. \section{Statistical framework} \subsection{Stochastic Block Model} \label{sec:SBM} In an SBM, nodes from a set $\node \triangleq \{1,\dots,n\}$ are distributed among a set $\block \triangleq \{1, \dots, Q\}$ of hidden blocks that model the latent structure of the graph. The blocks are described by the latent random vectors $\big(Z_{i\sbullet}=(Z_{i1},\ldots,Z_{iQ}) \big)_{i\in\node}$ with multinomial distribution $\mathcal{M}(1,\alpha = ( \alpha_{1}, \dots, \alpha_{Q}))$. The probability of an edge between any dyad in $\dyad \triangleq \node \times \node$ only depends on the blocks the two nodes belong to. Hence, the presence of an edge between $i$ and $j$, indicated by the binary variable $Y_{ij}$, is independent on the other edges conditionally on the latent blocks: \begin{equation} \nonumber \MA_{ij} \ | \ Z_{iq} = 1, Z_{j\ell} = 1 \sim^{\text{ind}} \mathcal{B}(\pi_{q\ell}), \qquad \forall (i,j) \in\dyad, \quad \forall (q,\ell) \in\block\times\block, \end{equation} where $\mathcal{B}$ stands for the Bernoulli distribution. In the following, $\pi = \left(\pi_{q\ell}\right)_{(q,\ell) \in\block\times\block}$ is the $Q \times Q$ matrix of connectivity probabilities, $Y=(Y_{ij})_{(i,j)\in\dyad}$ is the $n\times n$ adjacency matrix of the random graph, $Z = (Z_{iq})_{i\in\node,q\in\block}$ is the $n \times Q$ matrix of the latent blocks and $\theta=(\alpha, \pi)$ are the unknown parameters. In the undirected binary case, $Y_{ij} = Y_{ji}$ for all $(i,j) \in \dyad$ and $Y_{ii} = 0$ for all $i\in\node$. Similarly, $\pi_{q\ell}=\pi_{\ell q}$ for all $(q,\ell)\in\mathcal{Q}\times \mathcal{Q}$. \subsection{Sampled data in the SBM framework} \label{subsec:missingdata} The sampled data is an $n\times n$ matrix with entries in $\{0, 1, \texttt{NA}\}$. It corresponds to the adjacency matrix $Y$ where unobserved dyads have been replaced by \texttt{NA}'s. More formally, let $R$ be the $n\times n$ sampling matrix recording the data sampled during this process, such that $R_{ij} = 1$ if $Y_{ij}$ is observed and $0$ otherwise; also define $\mathcal{D}^o = \{(i,j) : R_{ij}=1\}$, $\mathcal{D}^m = \{(i,j) : R_{ij}=0\}$, $\MAO = \{\MA_{ij} : (i,j) \in \mathcal{D}^o\}$ and $\MAM=\{\MA_{ij} : (i,j) \in \mathcal{D}^m \}$ to denote the sets of variables respectively associated with the \textit{observed} and \textit{missing} data. The number of nodes $n$ is assumed to be known. The \textit{sampling design} is the description of the stochastic process that generates $R$. It is assumed that the network exists before the sampling design acts upon it. Moreover, the sampling design is fully characterized by the conditional distribution $p_\psi(R|\MA)$, the parameters of which are such that $\psi$ and $\theta$ live in a product space $\Theta \times \Psi$. Hence the joint probability density function of the observed data satisfies \begin{equation} p_{\theta, \psi}(\MAO,R)=\int \int p_{\theta}(\MAO,\MAM,Z)p_\psi(R|\MAO,\MAM,Z)d\MAM dZ. \label{eq:likelihood} \end{equation} Simplifications may occur in \eqref{eq:likelihood} depending on the sampling design, leading to the three usual types of missingness (MCAR, MAR and NMAR). This typology depends on the relations between the adjacency matrix $Y$, the latent structure $Z$ and the sampling $R$, so that the missingness is characterized by four directed acyclic graphs displayed in Figure~\ref{fig:DAGs}. \begin{figure}[htbp!] \centering \begin{tabular}{@{}c@{\hspace{5em}}c@{}} \begin{tikzpicture} \tikzstyle{every edge}=[-,>=stealth',shorten >=1pt,auto,thin,draw] \tikzstyle{every state}=[draw=none,text=white, font=\normalsize, transform shape] \tikzstyle{every node}=[fill=white!50!black] \node[state] (Z) at (0,0) {Z}; \node[state] (\MA) at (2,0) {\MA}; \node[state] (R) at (4,0) {R}; \draw[->,>=latex] (Z) -- (\MA); \end{tikzpicture} & \begin{tikzpicture} \tikzstyle{every edge}=[-,>=stealth',shorten >=1pt,auto,thin,draw] \tikzstyle{every state}=[draw=none,text=white, font=\normalsize, transform shape] \tikzstyle{every node}=[fill=white!50!black] \node[state] (Z) at (0,0) {Z}; \node[state] (\MA) at (2,0) {\MA}; \node[state] (R) at (4,0) {R}; \draw[->,>=latex] (Z) -- (\MA); \draw[->,>=latex] (\MA) -- (R); \end{tikzpicture} \\ \scriptsize (a) & \scriptsize (b) \\[3ex] \begin{tikzpicture} \tikzstyle{every edge}=[-,>=stealth',shorten >=1pt,auto,thin,draw] \tikzstyle{every state}=[draw=none,text=white, font=\normalsize, transform shape] \tikzstyle{every node}=[fill=white!50!black] \node[state] (Z) at (0,0) {Z}; \node[state] (\MA) at (2,0) {\MA}; \node[state] (R) at (4,0) {R}; \draw[->,>=latex] (Z) -- (\MA); \draw[->,>=latex] (\MA) -- (R); \draw[->,>=latex] (Z) to[bend left] (R); \end{tikzpicture} & \begin{tikzpicture} \tikzstyle{every edge}=[-,>=stealth',shorten >=1pt,auto,thin,draw] \tikzstyle{every state}=[draw=none,text=white, font=\normalsize, transform shape] \tikzstyle{every node}=[fill=white!50!black] \node[state] (Z) at (0,0) {Z}; \node[state] (\MA) at (-2,0) {\MA}; \node[state] (R) at (2,0) {R}; \draw[->,>=latex] (Z) -- (\MA); \draw[->,>=latex] (Z) -- (R); \end{tikzpicture} \\ \scriptsize (c) & \scriptsize (d) \\ \end{tabular} \caption{DAGs of relationships between $Y,Z$ and $R$ in the framework of missing data for SBM. DAG where $R$ is a parent node are not reviewed since the network exists before the sampling design acts upon it. The systematic edge between $Z$ and $Y$ is due to the definition of the SBM. Note that the DAG $(b)$ may correspond to MAR or NMAR samplings.} \label{fig:DAGs} \end{figure} On the basis of these DAGs, the sampling design is MCAR if $R \ \indep \ (\MAM, Z, \MAO)$, MAR if $R \ \indep \ (\MAM,Z) \ | \ \MAO$, and NMAR otherwise. We derive Proposition~\ref{prop:mar} from these definitions. \begin{proposition}\label{prop:mar} If the sampling is MCAR or MAR then $i)$ $\argmax_\theta p_{\theta, \psi}(\MAO,R) = \argmax_\theta p_{\theta}(\MAO)$ for any $\psi$ such that $p_{\theta, \psi}(\MAO,R)\not=0$ and $ii)$ the sampling design necessary satisfies DAG $(a)$ or $(b)$. \label{MAR} \end{proposition} \begin{proof} To prove $i)$, if $R$ satisfies MAR conditions, then $p_\psi(R|\MAO,\MAM,Z)=p_\psi(R|\MAO)$. Moreover, $\theta$ and $\psi$ lie in a product space so that \eqref{eq:likelihood} factorizes into $p_{\theta, \psi}(\MAO,R)=p_{\theta}(\MAO)p_\psi(R|\MAO).$ This corresponds to the ignorability condition of \citet{Rubin1976,Handcock2010}. The proof of $ii)$ is postponed to the supplementary materials. \end{proof} \subsection{Sampling design examples} \label{sec:sampling-definition} \subsubsection{MAR examples} \begin{definition}[Random-dyad sampling] Each dyad $(i,j) \in\dyad$ has the same probability $\Pbb(R_{ij}=1)=\rho$ to be observed independently of the others. \end{definition} This design is trivially MCAR because each dyad is sampled with the same probability $\rho$ which does not depend on $Y$. \begin{definition}[Star and snowball sampling] The star sampling consists in selecting uniformly a set of nodes, then observing corresponding rows of matrix $\MA$. Snowball sampling is initialized by a star sampling which gives a first "wave" of nodes. The second wave is composed by the neighbors of the first. Successive waves can then be obtained. The final set of observed dyads corresponds to all dyads involving at least one of these nodes. \end{definition} These two designs are node-centered and MAR. Indeed, selecting nodes independently in star sampling or in the first wave of snowball sampling corresponds to MCAR sampling. Successive waves are then MAR since they are built on the basis of the previously observed part of $\MA$. Expressions of the corresponding distributions $p_\psi(R|\MAO)$ are given in \citet{Handcock2010}. \paragraph*{Identifiability of random-dyad and star sampling designs.} Since random-dyad and star samplings are MCAR, the identifiability is assessed in two steps by proving the identifiability of, first, the sampling parameter $\psi = \rho$ and second, the SBM parameters $\theta=(\alpha,\pi)$ given $\rho$. Our proofs, postponed to the supplementary materials, follow \citet{celisse2012consistency} who established the identifiability of the SBM without missing data. \begin{proposition} \label{thm:ident_mcarParam} The sampling parameter $\rho > 0$ of random-dyad (resp. star) sampling is identifiable w.r.t. the sampling distribution. \end{proposition} \begin{thm}\label{thm.identifiabilityMAR} Let $n\geq 2Q$ and assume that for any $1\leq q \leq Q$, $\rho>0$, $\alpha_q >0$ and that the coordinates of $\pi \alpha$ are pairwise distinct. Then, under random-dyad (resp. star) sampling, SBM parameters are identifiable w.r.t. the distribution of the observed part of the SBM up to label switching. \end{thm} \subsubsection{NMAR examples} \label{sec:nmar_designs} \begin{definition}[Double standard sampling] Let $\rho_{1}, \rho_{0} \in [0,1]$. Double standard sampling consists in observing dyads with probabilities \begin{equation} \Pbb(R_{ij}=1|Y_{ij}=1) = \rho_{1}, \qquad \Pbb(R_{ij}=1|Y_{ij}=0) = \rho_{0}. \end{equation} \end{definition} Denote $S^\text{\rm o} = \sum_{(i,j)\in \dyadO} Y_{ij}, \ \bar{S}^\text{\rm o} = \sum_{(i,j)\in \dyadO} (1-Y_{ij})$ and similarly for $S^m, \bar{S}^m$. In this dyad-centered sampling design satisfying DAG $(b)$, the log-likelihood is \begin{equation} \log p_\psi(R|\MA)= S^\text{\rm o} \log \rho_1 + \bar{S}^\text{\rm o} \log \rho_0 + S^\text{\rm m} \log (1-\rho_1) + \bar{S}^\text{\rm m} \log (1-\rho_0), \quad \text{with } \psi = (\rho_0, \rho_1). \label{eq:logLik_2stand} \end{equation} \begin{definition}[Star sampling based on degrees -- Star degree sampling] \label{def:star_sampling} Star degree sampling consists in observing all dyads corresponding to nodes selected with probabilities $\{ \rho_1, \dots, \rho_n \}$ such that $\rho_{i}={\rm logistic} (a+b D_i)$ for all $i\in\node$ where $(a,b) \in \mathbb{R}^2$, $D_i = \sum_j Y_{ij}$ and ${\rm logistic}(x) = (1+ e^{-x})^{-1}$. \end{definition} In this node-centered sampling design satisfying DAG $(b)$, the log-likelihood is \begin{equation} \log p_\psi(R|\MA) = \sum_{i\in \nodeO} \log \rho_i + \sum_{i\in \nodeM} \log(1-\rho_i), \qquad \text{with } \psi = (a,b). \label{eq:logLik_degree} \end{equation} \begin{definition}[Class sampling] \label{def:class_sampling} Class sampling consists in observing all dyads corresponding to nodes selected with probabilities $\{ \rho_1, \dots, \rho_Q \}$ such that $\rho_q = \Pbb(i\in \nodeO \ | \ Z_{iq}=1)$ for all $(i,q) \in \node \times \block $. \end{definition} In this node-centered sampling design satisfying DAG $(d)$, the log-likelihood is \begin{equation} \log p_\psi(R|Z) = \sum_{i\in \nodeO} \sum_{q \in \mathcal{Q}}Z_{iq} \log \rho_{q} + \sum_{i\in \nodeM} \sum_{q \in \mathcal{Q}}Z_{iq} \log(1-\rho_{q}), \qquad \text{with } \psi = (\rho_1,\dots,\rho_Q). \label{eq:logLik_classes} \end{equation} \paragraph*{Identifiability of class sampling.} Theorem \ref{thm.identifiabilityClass} establishes the identifiability of the SBM sampled under NMAR class sampling design (see the supplementary materials for the proof). Note that the identifiability of the sampling parameters $\psi = (\rho_1,\dots,\rho_Q)$ and of the SBM parameters must be proved jointly because of the dependence between the network and the sampling. It is worth mentioning that both $\alpha_q$ and $\rho_q$ are identifiable and not only their product. Although somewhat counter-intuitive, this fact is supported by the inference algorithm for class sampling in Section~\ref{subsec:nmar_inference}, which weights the recovery of the latent clusters by taking the unbalanced sampling into account. \begin{thm}\label{thm.identifiabilityClass} Let $n\geq 2Q$ and assume that for any $1\leq q \leq Q$, $\rho_q>0$, $\alpha_q>0$, and that the coordinates of $o=\pi \alpha$ and $t=(\sum_{k=1}^Q\pi_{1k}\rho_k\alpha_k,\ldots,\sum_{k=1}^Q\pi_{Qk}\rho_k\alpha_k)$ are pairwise distinct. Then, under class sampling, SBM and class sampling parameters are identifiable w.r.t. the distributions of the SBM and the sampling up to label switching. \end{thm} \section{Importance of accouting for missing values in real networks} \subsection{Seed exchange network in the region of Mount Kenya} \label{sec:kenya} In a context of subsistence farming, studies which investigate the relationships between crop genetic diversity and human cultural diversity patterns have shown that seed exchanges are embedded in farmers' social organization. Data on seed exchanges of sorghum in the region of Mount Kenya were collected and analyzed in \cite{labeyrie:2016,labeyrie2014influence}. The sampling is node-centered since the exchanges are documented by interviewing farmers who are asked to declare to whom they gave seeds and from whom they receive seeds. Since an interview is time consuming, the sampling is not exhaustive. A limited space area was defined where all the farmers were interviewed. The network is thus collected with missing dyads since information on the potential links between two farmers who were cited but not interviewed is missing. With the courtesy of Vanesse Labeyrie, we analyzed the Mount Kenya seed exchange network involving $568$ farmers among which $155$ were interviewed. Although other farmers in this region might be connected to non-interviewed farmers, we focus on this closed network of $568$ nodes. Since we only know that the sampling is node-centered, we fit SBM under the three node-centered sampling designs presented in Section \ref{subsec:missingdata} (star (MAR), class and star degree sampling). The ICL criterion is minimal for $10$ blocks under the star degree sampling and for $11$ blocks under the class degree sampling. The clusterings between the SBMs obtained with either class or star degree sampling remain close from each other (ARI: $0.6$) and both unravel a strong community structure. The model selected by ICL for MAR sampling is composed by $11$ blocks. The ARIs between MAR clustering and the two other clusterings are lower (around $0.4$). Finally, note that interviewed and non-interviewed farmers are mixed up in the blocks of the three selected models. The ICL criteria computed for the three sampling designs are a slightly in favor of the MAR sampling. On top of network data, categorical variables are available for discriminating the farmers such as the ntora\footnote{The ntora is a small village or a group of neighborhoods} they belong to ($10$ main ntoras plus $1$ grouping all the others) and the dialect they speak ($4$ dialects). In Figure \ref{fig:aristoradialect}, we compute ARIs between the ntoras (left panel), the dialects (right panel) and the clusterings obtained with the SBM under the three node-centered sampling designs for a varying number of blocks. Even though the ARIs remain low, the clusterings from class or star degree sampling seem to catch a non negligible fraction of the social organization, larger than the one caught by the clustering from the MAR sampling. These two categorical variables, reflecting some aspects of the social organization, could partially explain the structure of the exchange network. \begin{figure}[htbp!] \centering \begin{tabular}{ccc} \rotatebox{90}{\hspace{1.7cm} \small ARI} & \includegraphics[width=.45\textwidth]{figures/simu_Vanesse_ntora} & \includegraphics[width=.45\textwidth]{figures//dialec} \\ \multicolumn{3}{c}{number of blocks} \\ \multicolumn{3}{c}{\includegraphics[width=.4\textwidth]{figures/legend_Vanesse}} \\ \end{tabular} \caption{ARIs computed between the clusterings given by an SBM under class, star degree and MAR samplings with a varying number of blocks $Q$ and ntora of farmers (left-hand-side) or dialect spoken by farmers (right-hand-side)} \label{fig:aristoradialect} \end{figure} \subsection{ER (ESR1) Protein-Protein Interaction network in breast cancer} \label{sec:er1} Estrogen receptor 1 (ESR1) is a gene that encodes an estrogen receptor protein (ER), a central actor in breast cancer. Uncovering its relations with other proteins is essential for a better understanding of the disease. To this end, various bioinformatics tools are available to centralize knowledge about possible relations between proteins into networks known as \textit{Protein-Protein Interaction} (PPI) networks. The platform \texttt{string} \citep{string:2015} accessible via \url{http://www.string-db.org} is one of the most popular tools for this task. Given a set of one (or several) initial protein(s) provided by the user, it is possible to recover a valued network between all proteins connected to the initial set. The value of an edge in this network corresponds to a score obtained by aggregating different types of knowledge (wet-lab experiments, textmining, co-expression data, etc\dots), reflecting a level of confidence. Thus, it is possible for a given protein -- we choose ER here -- to recover the PPI network between all proteins involved. Our ambition is to rely on a SBM with missing data to finely analyze such networks: we rather describe a dyad as missing (thus not choosing between 0 or 1) if its level of confidence is too low. The PPI network in the neighborhood of ER is composed by 741 proteins connected by edges with values in $(0,1]$. We remove ER from this set of proteins, as well as the zinc finger protein 44. Indeed, they were both connected to most of the other proteins and would thus only blur the underlying clustering structure. We denote $\omega_{ij}$ the weight associated with dyad $(i,j)$. By means of a tuning parameter $\gamma$ reflecting the level of confidence, the adjacency matrix is defined as follows: \begin{equation} \label{eq:adjacency_string} \mathbf{A}^\gamma = \left(A^\gamma\right)_{ij} = \left\{ \begin{array}{ll} 1 & \text{if } \omega_{ij} > 1-\gamma, \\ \texttt{NA} & \text{if } \gamma \leq \omega_{ij} \leq 1-\gamma, \\ 0 & \text{if } \omega_{ij} < \gamma. \\ \end{array} \right. \end{equation} In order to analyze the ER-centered network, Algorithm~\ref{algo:vem:mar} (random-dyad MAR sampling) and Algorithm~\ref{algo:vem:nmar} (double-standard NMAR sampling) were applied on $\mathbf{A}^{\gamma}$ for $\gamma$ varying in $\{.15, .25, .35\}$, hence taking the uncertainties on the missing dyads into account with various thresholds. The ICL criterion in Figure~\ref{fig:graph_ICL_er} systematically chooses the NMAR modeling against the MAR modeling, whatever the value of $\gamma$. \begin{figure}[htbp!] \begin{tabular}{@{}l@{\hspace{.1ex}}c@{}c@{}c@{}} & \small $\gamma = .15$ & \small $\gamma = .25$ & \small $\gamma = .35$ \\ \rotatebox{90}{\hspace{2.5cm} \small ICL} & \includegraphics[width=.325\textwidth]{figures/ICL_ER_left} & \includegraphics[width=.325\textwidth]{figures/ICL_ER_mid} & \includegraphics[width=.325\textwidth]{figures/ICL_ER_right} \\ & & number of blocks & \\ \end{tabular} \caption{ICL criteria for SBMs with random-dyad MAR sampling and double-standard NMAR sampling in the thresholded ER network.} \label{fig:graph_ICL_er} \end{figure} We study the best MAR and NMAR models associated with $\gamma = 0.35$, which value exhibits a clearer choice of the ICL than for $\gamma = \{.15, .25\}$ for both MAR and NMAR modelings. The two corresponding SBMs have 11 clusters for MAR sampling and 13 clusters for NMAR sampling. The ARI between the two clusterings is around $0.39$: this is mainly due to a large block in the random-dyad MAR clustering which contains much more nodes than any of the blocks in the NMAR clustering. The latter dispatches many of these nodes in four blocks (see the supplementary materials for a more detailed exposition of results). To prove that this finest clustering of the nodes is more relevant from the biological point of view, we propose a validation based on external biological knowledge. To this end, we rely on the Gene Ontology (GO) annotation \citep{ashburner2000gene} which provides a DAG of ontologies to which genes are annotated if the proteins encoded by these genes are involved in a known biological process. Here, we use GO to perform enrichment analysis (that is to say identifying classes of genes that are over-represented in a large set of genes, via a simple hypergeometric test) on genes corresponding to the proteins present in the large block for MAR, and the corresponding four blocks for NMAR. Interestingly, at a significance level of $1\%$, we find a single significant biological process for MAR modeling while 13 are found significant in the NMAR case. We check that it is not due to a simple threshold effect by looking at the ranks of the $p$-values of the 13 NMAR significant processes in the 100 first most significant terms found in the MAR model: only 5 of the NMAR processes are found, with high ranks (24, 33, 39, 56 and 77) far from the smallest MAR $p$-values. \section{Variational Inference} \label{sec:inference} Derivations of the practical variational algorithms considerably change depending on the missing data condition at play. We start by MAR to gently introduce the variational principle for SBM, then develop algorithms in a series of NMAR conditions \subsection{MAR inference} \label{sec:MARinference} By Proposition~\ref{prop:mar} part $(i)$, inference in the MAR case is conducted on $\MAO$. The EM algorithm is unfeasible since it requires the evaluation of the conditional mean of the complete log-likelihood $\Ebb_{Z|\MAO}\left[\log p_{\theta}(\MAO,Z)\right]$ which is intractable when $\MA$ comes from an SBM. The variational approach circumvents this limitation by maximizing a lower bound of the log-likelihood based on an approximation $\tilde p_\tau$ of the true conditional distribution $p_{\theta}(Z|\MAO)$, \begin{equation} \label{eq:lowerBound} \begin{aligned} \log p_{\theta}(\MAO) \geq J_{\tau,\theta}(\MAO) & \triangleq \log (p_{\theta}(\MAO))-\text{KL}[\tilde p_\tau(Z)||p_{\theta}(Z|\MAO)], \\ & = \mathbb{E}_{\tilde p_\tau} \left[\log(p_{\theta}(\MAO, Z)) \right] -\mathbb{E}_{\tilde p_\tau}[\log \tilde p_\tau(Z)], \end{aligned} \end{equation} where $\tau$ are some variational parameters and $\text{KL}$ is the Kullback-Leibler divergence. The approximated distribution is chosen so that the integration over the latent variables simplifies by factorization. Recall from Section~\ref{sec:SBM} that the latent vectors $\big(Z_{i\sbullet}=(Z_{i1},\ldots, Z_{iQ})\big)_{i\in\node}$ are independent with a multinomial prior distribution. Thus, in order to factorize the likelihood in a convenient way, a natural variational counterpart to $p_\theta (Z|\MAO)$ is $\tilde p_\tau({Z})= \prod_{i\in\node} m(Z_{i\sbullet};\tau_i)$, where $\tau_i=(\tau_{i1},\ldots, \tau_{iQ})$, and $m(\cdot;\tau_{i})$ is the multinomial probability density function with parameters $\tau_i$. The VEM sketched in Algorithm \ref{algo:vem:mar} consists in alternatively maximizing $J$ w.r.t. $\tau = \{\tau_1,\dots,\tau_n\}$ (the variational E-step) and w.r.t. $\theta$ (the M-step). The two maximization problems are solved straightforwardly following \citet{daudin2008mixture}: \begin{enumerate} \item The parameters $\theta=(\alpha, \pi)$ maximizing $J_\theta(\MAO)$ when $\tau$ is held fixed are \begin{equation}\nonumber \hat{\alpha}_q=\frac{\sum_{i\in \nodeO}\hat{\tau}_{iq}}{\card{\nodeO}}, \qquad \hat{\pi}_{q\ell}=\frac{\sum_{(i,j)\in \dyadO}\hat{\tau}_{iq}\hat{\tau}_{j\ell}\MA_{ij}}{\sum_{(i,j)\in \dyadO }\hat{\tau}_{iq}\hat{\tau}_{j\ell}}. \end{equation} \item The variational parameters $\tau$ maximizing $J_\tau(\MAO)$ when $\theta$ is held fixed are obtained with the following fixed point relation: \begin{equation}\nonumber \hat{\tau}_{iq}\propto \alpha_{q} \left( \prod_{(i,j)\in\dyadO} \prod_{\ell\in\block} b(\MA_{ij}; \pi_{q\ell})^{\hat{\tau}_{j\ell}}\right), \end{equation} where $b(x,\pi)=\pi^{x}(1-\pi)^{1-x}$ the Bernoulli probability density function. \end{enumerate} \begin{algorithm}[H] \SetSideCommentLeft \DontPrintSemicolon \KwSty{Initialization:} Set up $\tau^{(0)}$ with some clustering algorithm\; \Repeat{$\left\|\theta^{(h+1)} - \theta^{(h)}\right\| < \varepsilon$}{ \begin{equation}\nonumber \begin{array}{lcl@{\hspace{1cm}}r} \theta^{(h+1)} & = & \displaystyle\argmax_{\theta}J\left(\MAO; \tau^{(h)},\theta \right) & \textbf{M-step}\\ \tau^{(h+1)} & = & \displaystyle\argmax_\tau J\left(\MAO; \tau,\theta^{(h+1)} \right) & \textbf{variational E-step} \\ \end{array} \end{equation} } \caption{Variational EM for MAR inference in SBM} \label{algo:vem:mar} \end{algorithm} Algorithm~\ref{algo:vem:mar} generates a sequence $\{ \tau^{(h)},\theta^{(h)}; h\geqslant 0\}$ with increasing $J(\MAO; \tau^{(h)}, \theta^{(h)})$. Since there is no guarantee for convergence to the global maximum, we run the algorithm from several different initializations to finally retain the best solution. \paragraph*{Model selection of the number of blocks.} The Integrated Classification Likelihood (ICL) criterion of \citet{Biernacki2000} is relevant for latent variable models where the likelihood -- and thus BIC -- is intractable. \citet{daudin2008mixture} derive a variational ICL for the SBM which we adapt to missing data conditions: if $\hat{\theta}=\argmax \log p_{\theta}(\MAO,Z)$ then \begin{equation}\nonumber \mathrm{ICL}(Q) = -2 \mathbb{E}_{\tilde p_\tau}\left[\log p_{\hat\theta}(\MAO, Z ; Q)\right] + \frac{Q(Q+1)}{2}\log \card{\dyadO} + (Q-1)\log \card{\nodeO}. \end{equation} Note that each dyad is only counted once since we work with symmetric networks. \subsection{NMAR inference: the general case} \label{sec:NMARinference} In contrast to the MAR case, conducting inference on the observed dyads only may bias the estimates in the NMAR case. In fact, all observed data (including the sampling matrix $R$ in addition to $\MAO$) must be taken into account. The likelihood of the observed data is thus $\log p_{\theta,\psi}(\MAO,R)$ and the corresponding completed likelihood has the following decomposition: \begin{equation} \log p_{\theta, \psi}(\MAO,R,\MAM,Z) = \log p_\psi(R|\MAO,\MAM,Z) + \log p_\theta(\MAO,\MAM,Z), \label{eq:complete_loglik_nmar} \end{equation} where an explicit form of $p_\psi(R|\MAO,\MAM,Z)$ requires further specification of the sampling. The joint distribution $p_\theta(\MAO,\MAM,Z)$ has a form similar to the MAR case. Now, the approximation is required both on latent blocks $Z$ and missing dyads $\MAM$ to approximate $p_{\theta}(Z,\MAM|\MAO)$. We suggest a variational distribution where complete independence is forced on $Z$ and $\MAM$, using a multinomial (resp. Bernoulli ) distribution for $Z$ (resp. for $\MAM$): \begin{equation} \label{eq:approx_nmar} \tilde p_{\tau,\nu} (Z,\MAM)= \tilde p_{\tau} (Z) \ \tilde p_{\nu} (\MAM) = \prod_{i\in\node} m(Z_{i\cdot};\tau_{i}) \prod_{(i,j) \in \dyadM} b(Y_{ij};\nu_{ij}), \end{equation} where $\tau$ and $\nu = \{\nu_{ij}, (i,j)\in\dyadM\}$ are two sets of variational parameters respectively associated with $Z$ and $\MAM$. This leads to the following lower bound for $\log p_{\theta,\psi}(\MAO,R)$: \begin{equation} \nonumber J_{\tau,\nu,\theta,\psi}(\MAO,R) = \Ebb_{\tilde p_{\tau,\nu}} \left[\log p_{\theta,\psi}(\MAO,R,\MAM,Z)\right] -\Ebb_{\tilde p_{\tau,\nu}}\left[ \log \tilde p_{\tau,\nu}(Z,\MAM)\right]. \end{equation} By means of Decomposition \eqref{eq:complete_loglik_nmar} of the completed log-likelihood, variational approximation~\eqref{eq:approx_nmar} and entropies of multinomial and Bernoulli distributions, one has \begingroup \setlength\abovedisplayskip{0pt} \begin{multline} J_{\tau,\nu,\theta,\psi}(\MAO,R) = \Ebb_{\tilde p_{\tau,\nu}} \left[\log p_\psi(R | \MAO,\MAM,Z)\right] \\ +\sum_{(i,j)\in\dyadO}\sum_{(q,\ell)\in\block^2}\tau_{iq}\tau_{j\ell}\log b(\MA_{ij},\pi_{q\ell}) +\sum_{(i,j)\in\dyadM}\sum_{(q,\ell)\in\block^2}\tau_{iq}\tau_{j\ell}\log b(\nu_{ij},\pi_{q\ell}) \\ + \sum_{i\in\node}\sum_{q\in\block}\tau_{iq} \log (\alpha_{q}/\tau_{iq}) -\sum_{(i,j)\in \dyadM} \nu_{ij}\log (\nu_{ij}) + (1-\nu_{ij}) \log (1-\nu_{ij}). \label{eq:var:approx:nmar} \end{multline} \endgroup In \eqref{eq:var:approx:nmar}, $\Ebb_{\tilde p_{\tau,\nu}} \left[\log p_\psi(R | \MAO,\MAM,Z)\right]$ can be integrated over the variational distribution $\tilde p_{\tau,\nu}(Z,\MAM)$, as expected. The practical computations depend on the sampling design. The general VEM algorithm used to maximize \eqref{eq:var:approx:nmar} is sketched in its main lines in Algorithm~\ref{algo:vem:nmar}. Both the E-step and the M-step split into two parts: the maximization must be performed on the SBM parameters $\theta$ and the sampling design parameters $\psi$ respectively. The variational E-step is performed on the parameters $\tau$ of the latent block $Z$ and on the parameters $\nu$ of the missing data $\MAM$ . \begin{algorithm}[H] \SetSideCommentLeft \DontPrintSemicolon \KwSty{Initialisation:} set up $\tau^{(0)}$, $\bnu^{(0)}$ and $\psi^{(0)}$\; \Repeat{$\left\|\theta^{(h+1)} - \theta^{(h)}\right\| < \varepsilon$}{ \begin{equation}\nonumber \begin{array}{lclr} \theta^{(h+1)}&=&\argmax_{\theta} J\left(\MAO,R; \ \tau^{(h)},\nu^{(h)},\psi^{(h)},\theta \right) & \text{\textbf{M-step a)}}\\ \psi^{(h+1)}&=&\argmax_{\psi} J\left(\MAO,R; \ \tau^{(h)},\nu^{(h)},\psi,\theta^{(h+1)} \right) & \text{\textbf{M-step b)}}\\ \tau^{(h+1)}&=&\argmax_{\tau} J\left(\MAO,R; \ \tau,\nu^{(h)},\psi^{(h+1)}, \theta^{(h+1)} \right) & \text{\textbf{VE-step a)}}\\ \nu^{(h+1)}&=&\argmax_{\nu} J\left(\MAO,R; \tau^{(h+1)},\nu,\psi^{(h+1)},\theta^{(h+1)} \right) & \text{\textbf{VE-step b)}} \end{array} \end{equation} } \caption{Variational EM for NMAR inference in SBM} \label{algo:vem:nmar} \end{algorithm} Interestingly, resolution of the two steps concerned with the optimization of the parameters related with the SBM -- that is to say, $\theta$ and $\tau$ -- can be stated almost independently of any further specification of the sampling design. \begin{proposition}\label{prop:nmar_common} Consider the lower bound $J_{\tau, \nu, \theta, \psi}(\MAO,R)$ given by \eqref{eq:var:approx:nmar}. \begin{enumerate} \item The parameters $\theta=(\alpha, \pi)$ maximizing \eqref{eq:var:approx:nmar} when all others are held fixed are \begin{equation}\nonumber \hat{\alpha}_q=\frac{1}{n}\sum_{i\in\node} \hat{\tau}_{iq}, \qquad \hat{\pi}_{q\ell}=\frac{\sum_{(i,j)\in \dyadO}\hat{\tau}_{iq}\hat{\tau}_{j\ell}\MA_{ij} + \sum_{(i,j)\in \dyadM}\hat{\tau}_{iq}\hat{\tau}_{j\ell}\hat{\nu}_{ij}}{\sum_{(i,j)\in\dyad}\hat{\tau}_{iq}\hat{\tau}_{j\ell}}. \end{equation} \item The optimal $\tau$ in \eqref{eq:var:approx:nmar} when all other parameters are held fixed verifies \begin{equation}\nonumber \hat{\tau}_{iq}\propto \lambda_{iq} \alpha_{q} \left( \prod_{(i,j)\in \dyadO} \prod_{\ell\in\block} b(\MA_{ij}; \pi_{q\ell})^{\hat{\tau}_{j\ell}}\right) \left( \prod_{(i,j)\in \dyadM} \prod_{\ell\in\block} b(\nu_{ij}; \pi_{q\ell})^{\hat{\tau}_{j\ell}}\right) \end{equation} with $\lambda_{iq}$ a simple constant depending on the sampling design. \end{enumerate} \end{proposition} \begin{proof} These results are simply obtained by differentiation of \eqref{eq:var:approx:nmar}. \end{proof} The two steps concerned with $\psi$ and $\nu$ are specific to the sampling designs used to describe $R$. Further details are provided below for the designs presented in Section~\ref{sec:nmar_designs}. \subsection{NMAR: specificities related to the choice of the sampling} \label{subsec:nmar_inference} In light of Figure~\ref{fig:DAGs}, NMAR conditions specified by DAGs $(b), (c)$ or $(d)$ induce different simplifications for the conditional distribution of the sampling design $R$: \begin{description} \item[DAG (b)] $p_{\psi}(R| \MAO,\MAM, Z)=p_{\psi}(R| \MAO,\MAM)$, \item[DAG (c)] $p_{\psi}(R| \MAO,\MAM, Z)=p_{\psi}(R| \MAO,\MAM,Z)$, \item[DAG (d)] $p_{\psi}(R| \MAO,\MAM, Z)=p_{\psi}(R| Z)$. \end{description} This induces different evaluations of $\Ebb_{\tilde p_{\tau,\nu}} \left[\log p_{\theta,\psi}(\MAO,R,\MAM,Z)\right]$ in the lower bound~\eqref{eq:var:approx:nmar} for double standard sampling, star degree sampling and class sampling. We obtain below explicit formulas of $\psi$ and $\nu$ by differentiation of the corresponding variational lower bounds. The computations are tedious but straightforward and thus eluded in the following. \paragraph*{\bf Double-standard sampling.} Let $s^\text{\rm m} = \sum_{(i,j)\in \dyadM} \nu_{ij}, \ \bar{s}^\text{\rm m} = \sum_{(i,j)\in \dyadM} (1-\nu_{ij})$ be the variational counterparts of $S^\text{\rm m}$ and $\bar{S}^\text{\rm m}$. From \eqref{eq:logLik_2stand} we have \begin{equation}\nonumber \mathbb{E}_{\tilde p} \log p_{\psi}(R|\MA) = S^\text{\rm o} \log \rho_1 + \bar{S}^\text{\rm o} \log \rho_0 + s^\text{\rm m} \log (1-\rho_1) + \bar{s}^\text{\rm m} \log (1-\rho_0). \end{equation} \begin{proposition}[double standard sampling]\label{prop:nmar_doublestand}~\\[-2ex] \begin{enumerate} \item The parameters $\psi = (\rho_0,\rho_1)$ maximizing \eqref{eq:var:approx:nmar} when all others are held fixed are \begin{equation} \label{eq:rho_01} \hat{\rho}_0 = \frac{\bar{S}^\text{\rm o}}{\bar{S}^\text{\rm o} + \bar{s}^\text{\rm m}}, \qquad \hat{\rho}_1 = \frac{S^\text{\rm o}}{S^\text{\rm o} + s^\text{\rm m}}. \end{equation} \item The optimal $\nu$ in \eqref{eq:var:approx:nmar} when all other parameters are held fixed are \begin{equation}\nonumber \hat{\nu}_{ij} = \mathrm{logistic} \left( \log \left( \frac{1-\rho_1}{1-\rho_0} \right) + \sum_{(q,\ell)\in\block^2} \tau_{iq}\tau_{j\ell} \log\left(\frac{\pi_{q\ell}}{1-\pi_{q\ell}}\right) \right). \end{equation} \end{enumerate} Moreover, $\lambda_{iq} = 1 \ \forall (i,q) \in \node\times\block$ for optimization of $\tau$ in Proposition~\ref{prop:nmar_common}.b). \end{proposition} \paragraph*{\bf Class sampling.} According to \eqref{eq:logLik_classes} we have \begin{equation}\nonumber \mathbb{E}_{\tilde{p}} \log p_\psi(R|\MA) = \sum_{i\in \nodeO} \sum_{q\in\block} \tau_{iq} \log(\rho_q) + \sum_{i\in \nodeM}\sum_{q\in\block} \tau_{iq}\log(1-\rho_q). \end{equation} \begin{proposition}[class sampling]\label{prop:nmar_class}~\\[-2ex] \begin{enumerate} \item The parameters $\psi = (\rho_1...\rho_Q)$ maximizing \eqref{eq:var:approx:nmar} when all others are held fixed are \begin{equation} \label{eq:rho_q} \hat{\rho}_q = \frac{\sum_{i\in\nodeO}\tau_{iq}}{\sum_{i\in\node}\tau_{iq}}. \end{equation} \item The optimal $\nu$ in \eqref{eq:var:approx:nmar} when all other parameters are held fixed verify \begin{equation}\nonumber \hat{\nu}_{ij} = \mathrm{logistic} \left( \sum_{(q,\ell)\in\block^2} \tau_{iq}\tau_{j\ell} \log\left(\frac{\pi_{q\ell}}{1-\pi_{q\ell}}\right) \right). \end{equation} \end{enumerate} Moreover $\lambda_{iq} = \rho_q^{\1_{\{i\in\nodeO\}}}(1-\rho_q)^{^{\1_{\{i\in\nodeM\}}}}$ for optimization of $\tau$ in Proposition~\ref{prop:nmar_common}.b). \end{proposition} \paragraph*{\bf Star degree sampling.} From Expression~\eqref{eq:logLik_degree} of the likelihood, one has \begin{equation}\nonumber \mathbb{E}_{\tilde{p}} \log p_{\psi}(R|\MA) = -\sum_{i\in\nodeM} \left(a+b\tilde{D}_i \right) + \sum_{i\in\node} \Ebb_{\tilde{p}}\left[ -\log(1+e^{-(a+bD_i)}) \right], \end{equation} where $\tilde{D}_i = \mathbb{E}_{\tilde{p}}\left[D_i \right] = \sum_{i \in\nodeM} \nu_{ij} + \sum_{i \in\nodeO} \MA_{ij}$ is the approximation of the degrees. Because $\mathbb{E}_{\tilde{p}}\left[ -\log(1+e^{-(a+bD_i)}) \right]$ has no explicit form, an additional variational approximation is needed \citep{jordan1998introduction}. This technique was recently used in random graph framework \citep{LatoucheRobinOuadah2017}. It relies on the following approximation of the logistic function: \begin{equation} \label{eq:taylor_expansion} g(x) \geq g(\zeta) + \frac{x-\zeta}{2} + h(\zeta)(x^2 - \zeta^2), \quad h(\zeta) = \frac{-1}{2\zeta}\left[ \text{logistic}(\zeta) - \frac{1}{2} \right] \end{equation} for all $(x,\zeta) \in \mathbb{R}\times\mathbb{R}^{+}$. This leads to a lower bound of the initial lower bound: \begin{equation} \label{eq:lower_bound_degree} \log p_{\theta,\psi}(\MAO,R) \geq J_{\tau,\nu,\theta,\psi}(\MAO,R) \geq J_{\tau,\nu,\zeta,\theta,\psi}(\MAO,R), \end{equation} with $\zeta = \left( \zeta_i, i\in\node\right)$ such that $\zeta_i>0$ is an additional set of variational parameters used to approximate $-\log(1+e^{-x})$. The second lower bound $J_{\tau,\nu,\zeta,\theta,\psi}$ is derived from Equation~\eqref{eq:taylor_expansion} and given in the supplementary materials for completeness . At the end of the day, we have an additional set of variational parameters to optimize, and a corresponding additional step in Algorithm~\ref{algo:vem:nmar}. Expression of all the parameters specific to star degree sampling by differentiating $J_{\tau,\nu,\zeta,\theta,\psi}$. \begin{proposition}[star degree sampling]\label{prop:nmar_degree} Let $\widetilde{D^2_i} =\Ebb_{\tilde{p}}\left[ {D_i}^2 \right]$ and $\tilde{D}_{k}^{-\ell} = \tilde{D}_k - \nu_{k\ell}$. \begin{enumerate} \item The parameters $\psi = (a,b)$ maximizing $J_{\tau,\nu,\zeta,\theta,\psi}(\MAO,R)$ when others are held fixed are \begingroup \setlength\abovedisplayskip{0pt} \begin{align*} \hat{b} &= \frac{ 2\left(\frac{n}{2}-\card{\nodeM} \right)\sum_{i\in\node} (h(\zeta_i) \tilde{D}_i) - \left(\frac{1}{2}\sum_{i\in\node} \tilde{D}_i-\sum_{i\in\nodeM} \tilde{D}_i \right) \times \sum_{i\in\node} h(\zeta_i)}{ 2\sum_{i\in\node}( h(\zeta_i) \widetilde{D_i^2}) \times \sum_{i\in\node} h(\zeta_i) - {\left( 2\sum_{i\in\node} h(\zeta_i) \tilde{D}_i \right)}^2 }, \\ \hat{a} &= -\frac{ \hat{b} \sum_{i\in\node} \left(h(\zeta_i)\tilde{D}_i \right) + \frac{n}{2}- \card{\nodeM}}{ \sum_{i\in\node} h(\zeta_i) }. \end{align*} \endgroup \item The parameters $\zeta$ maximizing $J_{\tau,\nu,\zeta,\theta,\psi}(\MAO,R)$ when others are held fixed are \begin{equation}\nonumber \hat{\zeta}_{i} = \sqrt{a^2 + b^2\widetilde{D_i^2} + 2ab\tilde{D}_i}, \ \forall i \in \mathcal{N}. \end{equation} \item The optimal $\nu$ in $J_{\tau,\nu,\zeta,\theta,\psi}(\MAO,R)$ when all other parameters are held fixed verify \begingroup \setlength\abovedisplayskip{0pt} \begin{multline} \hat{\nu}_{ij} = \mathrm{logistic} \Bigg( \sum_{(q,\ell)\in\block^2} \tau_{iq}\tau_{j\ell} \log\left(\frac{\pi_{q\ell}}{1-\pi_{q\ell}}\right) - b \\ + 2h(\zeta_i)\left( ab + b^2(1+\tilde{D}_{i}^{-j}) \right) + 2h(\zeta_j)\left( ab + b^2(1+\tilde{D}_{j}^{-i}) \right) \Bigg). \end{multline} \endgroup \end{enumerate} Moreover, $\lambda_{iq} = 1 \ \forall (i,q) \in \node\times\block$ for optimization of $\tau$ in Proposition~\ref{prop:nmar_common}.b). \end{proposition} \paragraph*{Model selection.} In NMAR cases, ICL can be useful not only to select the appropriate number of blocks but also for selecting the most appropriate sampling design when it is unknown. Contrary to the MAR case, ICL is no longer a straightforward generalization of \citet{daudin2008mixture}. Indeed, the complete likelihood and thus the penalization needs to take into account the sampling design. Let us consider a model with $Q$ blocks and a sampling design with $K$ parameters (\textit{i.e.} the dimension of $\psi$). The ICL criterion is a Laplace approximation of the complete likelihood $p(\MAO, \MAM, R, Z| Q, K)$ with $p(\theta,\psi|Q,K)$ the prior distributions on the parameters such that \begin{equation}\nonumber p(\MAO, \MAM, R, Z| Q,K) = \int_{\Theta \times \Psi} p_{\theta, \psi}(\MAO, \MAM, R, Z|Q, K) p(\theta, \psi|Q,K)d\theta d\psi. \end{equation} \begin{proposition} \label{prop:ICL_NMAR} For a model with $Q$ blocks, a sampling design with a vector of parameters $\psi\in\mathbb{R}^K$ and $(\hat{\theta},\hat{\psi})=\argmax_{(\theta, \psi)}\log p_{\theta, \psi}(\MAO,\MAM, R, Z)$, then \begingroup \setlength\abovedisplayskip{0pt} \begin{gather*} \mathrm{ICL}(Q) = -2\mathbb{E}_{\tilde p_{\tau,\nu}; \hat{\theta},\hat{\psi}}\left[\log p_{\hat{\theta},\hat{\psi}}(\MAO,\MAM, R, Z | Q, K)\right] + \mathrm{pen}_{\text{ICL}}(Q),\\[2ex] \mathrm{pen}_{\text{ICL}} = \left\{ \begin{array}{ll} \left(K + \frac{Q(Q+1)}{2}\right)\log \left(\frac{n(n-1)}{2}\right) + (Q-1)\log (n) & \text{for dyad-centered sampling} \\ \frac{Q(Q+1)}{2}\log\left( \frac{n(n-1)}{2} \right)+ (K + Q-1)\log (n) & \text{for node-centered sampling}\\ \end{array} \right. \end{gather*} \endgroup \end{proposition} Note that an ICL criterion for MAR sampling designs can be constructed in the same fashion for the purpose of comparison with NMAR sampling designs. \section{Introduction} Networks arise in many fields of application for providing an intuitive way to represent interactions between entities. In this paper, a network is composed by a fixed set of nodes, and an interaction between a pair of nodes (dyad) is called an edge. We consider undirected binary networks with no loop, which can be represented by symmetric adjacency matrices filled with zeros and ones. Various statistical models exist for depicting the probability distribution of the adjacency matrix \citep[see, e.g.][for a survey]{goldenberg2010survey,snijders2011statistical}. A highly desirable feature is their capability to describe the heterogeneity of real-world networks. In this perspective, the family of models endowed with a latent structure \citep[reviewed in][]{matias2014modeling} offers a natural way to introduce heterogeneity. Within this family the Stochastic Block Model \citep[in short SBM, see][]{frank1982cluster,holland1983stochastic} describes a broad variety of network topologies by positing a latent structure (or a clustering) on the nodes, then making the probability distribution of the adjacency matrix dependent on this latent structure. In order to estimate SBMs, Bayesian approaches were first developed \citep{snijders1997estimation,Nowicki2001} prior to variational approaches \citep{daudin2008mixture,latouche2012variational}. On the theoretical side, \citet{celisse2012consistency} study the conditions for identifiability and the consistency of the variational estimators; \cite{bickel2013asymptotic} prove their asymptotic normality. Several generalizations are possible such as weighted or directed variants \citep{mariadassou2010}, mixed-membership and overlapping SBM \citep{airoldi2008mixed,latouche2011overlapping}, degree-corrected SBM \citep{Karrer2011}, dynamic SBM \citep{matias2016statistical}, or multiplex SBM \citep{Barbillon2015}. This paper deals with inference in the SBM when the network is not fully observed. We consider cases where all the nodes are observed but information regarding the presence/absence of an edge is missing for some dyads. In other words the adjacency matrix contains missing values, a situation often met with real-world networks. For instance in social sciences, network data consists in interactions between individuals: the set of individuals is fixed, possibly known from a census. Information about the presence/absence of an edge is only available when at least one of the two individuals is available for an interview, otherwise it is missing. See \cite{thompson2000model}, \cite{thompsonseber}, \cite{Kolaczyk2009,Handcock2010} for a review of network sampling techniques. Even though some papers deal with SBM inference under missing data condition \citep{Aicher2014,Vinayak2014}, the sampling mechanism responsible for the missing values is overlooked in the inference, contrary to the approach developed in our paper. \paragraph*{Our contributions.} A typology of sampling designs is introduced in Section~\ref{subsec:missingdata}. We adapt the theory developed in \cite{Rubin1976,little2014statistical} to the SBM by splitting the sampling designs into the three usual classes of missing data: \begin{enumerate}[i)] \item \textit{Missing Completely At Random} (MCAR), where the sampling does not depend on the data, neither on the observed nor on the unobserved part of the network. \item \textit{Missing At Random} (MAR), where the probability of being sampled is independent on the value of the missing data. For network data, the sampling does not depend on the presence/absence of an edge of an unobserved (or missing) dyad. MCAR is a particular case of MAR. \item \textit{Not Missing At Random} (NMAR), where the sampling scheme is guided by unobserved dyads in some way. \end{enumerate} Section~\ref{sec:sampling-definition} introduces several examples of sampling designs (MAR and NMAR) for which we derive conditions for identifiability of the SBM parameters. Estimation of the SBM in the MAR cases can be handled with the Variational EM (VEM) of \cite{daudin2008mixture} by conducting the inference only on the observed part of the network (Section~\ref{sec:MARinference}). NMAR is more difficult to deal with as the sampling design must be taken into account in the inference. We introduce in Section~\ref{sec:NMARinference} a general variational algorithm \citep{jordan1998introduction} to deal with NMAR cases when the sampling design relies on a probability distribution which is explicitly known\footnote{More complex sampling schemes -- for instance adversarial strategies -- are thus not handled}. Our variational approach is based on a double mean-field approximation applied to the latent distribution of the clustering and to the distribution of the missing dyads. We implement VEM algorithms that produce unbiased estimators for three natural NMAR sampling designs: a dyad-centered strategy, a node-centered strategy, and a block-centered strategy. We also derive an Integrated Classification Likelihood criterion \citep[ICL,][]{Biernacki2000} for selecting the number of blocks. Although it is not possible to distinguish whether the sampling is MAR or NMAR \citep{Molenberghs2008}, the ICL can also be used to select which sampling design is the best fit for the data. In Section~\ref{sec:NMARsimulations} we show the good performance of our VEM algorithms on simulations for both MAR (Section~\ref{sec:MARsimulations}) and NMAR conditions. Finally we investigate two very different real-world networks with missing values, namely a Kenyan seed exchange network (Section~\ref{sec:kenya}), and a protein-protein interaction (PPI) network (Section~\ref{sec:er1}). \paragraph*{Related works.} In the few papers dealing with missing data for networks, the sampling design is rarely discussed. Even if not explicitly stated they all assume MAR conditions. \citet{Aicher2014} propose a weighted SBM modeling simultaneously the presence/absence of an edge and its weight. Missing data are handled by dropping the corresponding terms in the likelihood and the inference is conducted by a variational algorithm. In \citet{VincentKyleandThompson2015} a Bayesian augmentation procedure is introduced to estimate simultaneously the size of the population and the clustering when the sampling design is a one-wave snowball. Apart from the SBM, the exponential random graph model has been studied in the MAR setting in \citet{Handcock2010}. The matrix completion literature brings additional insights since SBM inference can be seen as a low-rank matrix estimation. \citet{Vinayak2014} introduce a convex program for the matrix completion problem where the underlying matrix has a simple affiliation structure defined via an SBM. The entries are sampled independently with the same probability, corresponding to a MAR case. In \citet{Davenport2014} the case of noisy 1-bit observations is studied and a likelihood-based strategy is developed with theoretical justifications ensuring good matrix completion. \citet{Chatterjee2015} proves strong results for large matrices with noisy entries estimation, by means of a universal singular value thresholding. Another related question is when the status of some dyads (absence/presence) is not clear in errorfully observed graph. Such uncertainties can be taken into account \citep{Priebe2015,Balachandran2017}. The latter reference studies the error propagation made by using estimators computed on observed sub-graphs, in order to estimate the number of existing edges in the real underlying graph. \section{Simulation study} \label{sec:simulations} In this section, we illustrate the relevance of our approaches on network data simulated under the SBM and sampled under MAR and NMAR conditions. The quality of the inference is assessed by computing the distance between the estimated and the true connectivity matrices $\pi$ in terms of Frobenius norm. The quality of the clustering recovery is measured with the adjusted Rand index \citep[ARI,][]{rand1971} between the true classification and the clustering obtained by maximum posterior probabilities for each $\tau_i$. \subsection{MAR condition} \label{sec:MARsimulations} Algorithm~\ref{algo:vem:mar} for MAR samplings is tested on affiliation networks with $3$ blocks. The number of blocks is assumed to be known. For this topology the probability of connection within a block is $\eta$ and is ten times stronger than the probability of connections between nodes from different blocks. We generate networks with $n = 200$ nodes and marginal probabilities of belonging to blocks $\alpha = (1/3, 1/3, 1/3)$. The sampling design is chosen as a random-dyad sampling with a varying $\rho$. The difficulty is controlled by two parameters: the sampling effort $\rho$ and the overall connectivity in matrix $\pi$, defined by $c=\sum_{q\ell} \alpha_{q}\alpha_{\ell} \pi_{q\ell}$, which is directly related to the choice of $\eta$: the lower the $\eta$, the sparser the network and the harder the inference. The simulation is repeated 500 times for each configuration $(c,\rho)$. Figure \ref{fig:MAR_plot} displays the results in terms of estimation of $\pi$ and of classification recovery, for varying connectivity $c$ and sampling effort $\rho$. Our method achieves good performances even with a low sampling effort provided that the connectivity is not too low. \begin{figure}[htbp!] \centering \begin{tabular}{@{}c@{}c@{}r} $\|\hat{\pi} - \pi \|_F / \|\pi\|_F$ & Adjusted Rand Index & \\ \includegraphics[width=.45\textwidth]{figures/mar_errorPI.jpeg} & \includegraphics[width=.45\textwidth]{figures/mar_ARI.jpeg} & \raisebox{3.5\height}{\includegraphics[width=.12\textwidth]{figures/mar_legend.pdf}} \\ \multicolumn{2}{c}{proportion of observed dyads} & \\ \end{tabular} \caption{Estimation error of $\pi$ and Adjusted Rand Index averaged over 500 simulations in the MAR setting. The adjacency matrix $\MA$ is generated under random-dyad sampling strategy for various connectivity $c = \sum_{q\ell} \alpha_{q}\alpha_{\ell} \pi_{q\ell}$. } \label{fig:MAR_plot} \end{figure} \subsection{NMAR condition} \label{sec:NMARsimulations} Under NMAR conditions we conduct an extensive simulation study by considering various network topologies (namely affiliation, star and bipartite), the connectivity matrix of which are given in Figure~\ref{fig:Topologies}. We use a common tuning parameter $\epsilon$ to control the connectivity of the networks in each topology: the lower the $\epsilon$, the more contrasted the topology. \begin{figure}[htbp!] \centering \begin{small} \begin{subfigure}[b]{.25\textwidth} \centering $\begin{pmatrix} 1-\epsilon&\epsilon&\epsilon\\ \epsilon&1-\epsilon&\epsilon\\ \epsilon&\epsilon&1-\epsilon\\ \end{pmatrix}$ \caption{affiliation} \end{subfigure} \hspace{2ex} \begin{subfigure}[b]{.32\textwidth} \centering $\begin{pmatrix} 1-\epsilon&1-\epsilon&0&0\\ 1-\epsilon&0&\epsilon&0\\ 0&\epsilon&1-\epsilon&1-\epsilon\\ 0&0&1-\epsilon&0\\ \end{pmatrix}$ \caption{star} \end{subfigure} \hspace{2ex} \begin{subfigure}[b]{.32\textwidth} \centering $\begin{pmatrix} \epsilon&1-\epsilon&\epsilon&\epsilon\\ 1-\epsilon&\epsilon&\epsilon&\epsilon\\ \epsilon&\epsilon&\epsilon&1-\epsilon\\ \epsilon&\epsilon&1-\epsilon&\epsilon\\ \end{pmatrix}$ \caption{bipartite} \end{subfigure} \end{small} \caption{Matrix $\pi$ in different topologies with inter/intra block probabilities.} \label{fig:Topologies} \end{figure} Among the three schemes developed in Section~\ref{sec:nmar_designs}, we investigate thoroughly the double standard sampling, for which we exhibit a large panel of situations where the gap is large between the performances of the algorithms designed for MAR or NMAR cases. Other sampling designs are explored in the supplementary materials. Simulated networks have $n=100$ nodes, with $\epsilon$ varying in $\{0.05, 0.15, 0.25\}$. Prior probabilities $\alpha$ are chosen specifically for affiliation, star and bipartite topologies, respectively $(1/3,1/3,1/3)$, $(1/6, 1/3, 1/6, 1/3)$ and $(1/4,1/4,1/4,1/4)$. The exploration of the sampling parameters $\psi=(\rho_0,\rho_1)$ is done on a grid $[0.1,0.9] \times [0.1,0.9]$ discretized by steps of $0.1$. Algorithm~\ref{algo:vem:nmar} is initialized with several random initializations and spectral clustering. In Figure \ref{fig:simu_twoStd}, the estimation error is represented as a function of the difference between the sampling design parameters $(\rho_0,\rho_1)$: the closer this difference to zero, the closer to the MAR case. As expected, Algorithm \ref{algo:vem:mar} designed for MAR only performs well when $\rho_1-\rho_0\approx 0$. Algorithm \ref{algo:vem:nmar} designed for NMAR double-standard sampling shows relatively flat curves which means that its performances are roughly constant no matter the sampling condition. \begin{figure}[htbp!] \centering \begin{tabular}{@{}c@{}c@{\hspace{.03mm}}c@{\hspace{1ex}}c@{}} & {\small $\|\hat{ \pi} - \pi \|_F / \| \pi\|_F$} & \small \textbf{ARI}$(Z, \hat{Z})$ & \\ \rotatebox{90}{\hspace{1.5cm} \small affiliation} & \includegraphics[width=.45\textwidth]{figures/simu_twoStd_diff_affiliation_errorPI2}& \includegraphics[width=.45\textwidth]{figures/simu_twoStd_diff_affiliation_ARI2}& \\ \rotatebox{90}{\hspace{1.5cm} \small bipartite} & \includegraphics[width=.45\textwidth]{figures/simu_twoStd_diff_bipartite_errorPI2}& \includegraphics[width=.45\textwidth]{figures/simu_twoStd_diff_bipartite_ARI2} & \includegraphics[width=.08\textwidth]{figures/legend_twoStd}\\ \rotatebox{90}{\hspace{1.5cm} \small star}& \includegraphics[width=.45\textwidth]{figures/simu_twoStd_diff_star_errorPI2}& \includegraphics[width=.45\textwidth]{figures/simu_twoStd_diff_star_ARI2} & \\ & \multicolumn{2}{c}{$\rho_1 - \rho_0$} & \\ \end{tabular} \caption{Double standard setting: estimation error of $\pi$ and adjusted Rand index averaged over 500 simulations for affiliation, bipartite and star topologies.} \label{fig:simu_twoStd} \end{figure} \begin{figure}[htbp!] \centering \begin{tabular}{@{}cc@{}} $|\hat{\rho}_{0} - \rho_{0} | / | \rho_{0} |$ & $|\hat{\rho}_{1} - \rho_{1} | / | \rho_{1} |$\\ \includegraphics[width=.45\textwidth]{figures/simu_twoStd_diff_errorRho0} & \includegraphics[width=.45\textwidth]{figures/simu_twoStd_diff_errorRho1} \\ \multicolumn{2}{c}{$\rho_1 - \rho_0$} \\ \\ \multicolumn{2}{c}{\includegraphics[width=.6\textwidth]{figures/legend_errorRho}} \\ \end{tabular} \caption{Double standard setting: estimation error of $\rho_0$ and $\rho_1$ averaged over 500 simulations for affiliation, bipartite and star topologies.} \label{fig:simu_errorRho} \end{figure} Figure \ref{fig:simu_errorRho} reports estimation accuracy for the sampling parameters $\rho_0$ and $\rho_1$. Results show a good ability of the VEM to estimate these parameters. As expected, performances deteriorate for uncontrasted topologies with low sampling rate. \paragraph{Model selection.} Simulations are also conducted to study the performances of ICL. We compare results for the different topologies described in Figure \ref{fig:Topologies} for $\epsilon = 0.05$. Rates of correct answers for selecting the number of blocks $Q$ under a double standard sampling with different sampling rates are displayed in Table~\ref{tab:Q_select}. The ARI is also provided. The ICL shows a satisfactory ability to select the true $Q$ even if the selection task obviously needs a larger sampling effort than the estimation task. It is worth mentioning that a whole block may not be sampled, which leads the ICL to select a lower number of blocks. In such a case the ARI is a meaningful additional information to demonstrate that the clustering remains coherent with the true one. \begin{table}[htbp!] \centering \begin{tabular}{l|ccc} sampling rate & affiliation & bipartite & star \\ \hline (0.154, 0.405] & 0.58/0.96 & 0.46/0.84 & 0.45/0.84 \\ (0.405, 0.656] & 0.95/0.99 & 0.87/0.98 & 0.90/0.98 \\ (0.656, 0.908] & 1/1 & 0.99/1 & 0.99/1 \\ \hline \end{tabular} \caption{Performance of the ICL criterion: rates of correct answers when choosing the number of blocks and Adjusted Rand Indexes. Tested configurations are different sampling rates and three topologies (affiliation, bipartite and star) under a double standard sampling. Each configuration is simulated 500 times.} \label{tab:Q_select} \end{table} In Table~\ref{tab:samp_select}, results concern the rates of correct selections of the sampling design when the two designs in competition are the random-dyad and the double standard samplings. As expected, the rate of correct answers increases with the sampling rate. \begin{table}[htbp!] \centering \begin{tabular}{cc|cccc} sampling rate & sampling & affiliation & bipartite & star \\ \hline (0.096, 0.367] & MAR & 0.73 & 0.67 & 0.63 \\ & NMAR & 0.72 & 0.75 & 0.75 \\ \hline (0.367, 0.638] & MAR & 1 & 1 & 1 \\ & NMAR & 0.91 & 0.78 & 0.82 \\\hline (0.638, 0.909] & MAR & 1 & 1 & 1 \\ & NMAR & 0.91 & 0.8 & 0.95 \\\hline \end{tabular} \caption{Rates of correct answers of the ICL criterion when choosing between Random-dyad sampling (MAR) and double standard sampling (NMAR) in each of the 18 configurations. A configuration is the combination of a topology (affiliation, bipartite and star), a sampling rate and a sampling design. Each configuration is simulated 500 times.} \label{tab:samp_select} \end{table} \section{Appendices} \end{document}
\section{Introduction} A $k$-uniform hypergraph $H$ ($k$-graph for short) with vertex set $V$ is a collection of $k$-element subsets of $V$. We write $K^{(k)}_n$ for the complete $k$-graph on an $n$-element vertex set. The \emph{Ramsey number} $r_k(s,n)$ is the minimum $N$ such that every red-blue coloring of the edges of $K^{(k)}_N$ contains a monochromatic red copy of $K_s^{(k)}$ or a monochromatic blue copy of $K^{(k)}_n$. The existence of $r_k(s,n)$ follows from the celebrated theorem of Frank Ramsey from 1930 \cite{Ram}. However, the asymptotic behavior of $r_k(s,n)$ is still not well understood. In this survey we focus on open problems and results related to generalizations and extensions of $r_k(s,n)$ in the {\em hypergraph} case, i.e., when $k \ge 3$ (we refer the reader to \cite{CFSsurvey} for a survey of Graph Ramsey theory). Our emphasis is on recent results and although we believe we have touched on most important developments in this area, this survey is not an exhaustive compendium of all work in hypergraph Ramsey theory. \section{General notation} The full statement of Ramsey's theorem extends to multiple colors and to general hypergraphs as follows. Given an integer $q\geq 2$ and $k$-uniform hyergraphs $H_1,\ldots, H_q$, there is a minimum $r_k(H_1,\ldots, H_q) = N$, such that every $q$-coloring of the edges of $K^{(k)}_N$ contains a copy of $H_i$ in the $i$th color. In the special case that $H = H_1 = \cdots = H_q$, we simply write $$r_k(H; q) = r_k(\underbrace{H,\ldots, H}_{q\textnormal{ times}}).$$ If $H_i = K^{(k)}_{n_i}$, we use the simpler notation $r_k(n_1,\ldots, n_q)$ and $r_k(n;q) = r_k(\underbrace{n,\ldots, n}_{q\textnormal{ times}}).$ \section{Diagonal Ramsey numbers} \emph{Diagonal Ramsey numbers} refer to the special case when $s = n$, i.e. $r_k(n,n)$, and have been studied extensively over the past 80 years. Classic results of Erd\H os and Szekeres \cite{ES35} and Erd\H os \cite{E47} imply that $2^{n/2} < r_2(n,n) \leq 2^{2n}$ for every integer $n > 2$. While small improvements have been made in both the upper and lower bounds for $r_2(n,n)$ (see \cite{S75,C09}), the constant factors in the exponents have not changed over the last 70 years. Unfortunately for 3-graphs, our understanding of $r_3(n,n)$ is much less than in the graph case. A result of Erd\H os, Hajnal, and Rado \cite{EHR} gives the best known lower and upper bounds for $r_3(n,n)$, $$2^{c_1n^2}<r_3(n,n)<2^{2^{c_2n}},$$ where $c_1$ and $c_2$ are absolute constants. Another proof of the lower bound above was given by Conlon, Fox, and Sudakov in \cite{CFS}, which will be discussed in more detail in Section \ref{offdiagsec}. For $k \geq 4$, there is also a difference of one exponential between the known lower and upper bounds for $r_k(n,n)$, that is, \begin{equation}\label{diag}\mbox{\rm twr}_{k-1}(c_1n^2) \leq r_k(n,n) \leq \mbox{\rm twr}_k(c_2n),\end{equation} \noindent where the \emph{tower function} $\mbox{\rm twr}_k(x)$ is defined by $\mbox{\rm twr}_1(x) = x$ and $\mbox{\rm twr}_{i + 1}(x) = 2^{\mbox{\rm twr}_i(x)}$ (see \cite{ES35,ER,EH72}). A notoriously difficult conjecture of Erd\H os, Hajnal, and Rado states that the upper bound in (\ref{diag}) is essentially the truth, that is, there are constructions which demonstrate that $r_k(n,n) > \mbox{\rm twr}_k(cn)$, where $c = c(k)$. The crucial case is when $k = 3$, since a double exponential lower bound for $r_3(n,n)$ would verify the conjecture for all $k\geq 4$ by using the well-known stepping-up lemma of Erd\H os and Hajnal (see \cite{GRS}). \begin{conjecture}[Erd\H os]\label{3conj} For $n\geq 4$ we have $r_3(n,n) > 2^{2^{cn}}$, where $c$ is an absolute constant. \end{conjecture} It is worth mentioning that Erd\H os offered a \$500 reward for a proof of this conjecture (see~\cite{Chung}), and his conjecture is supported by the fact that a double exponential lower bound is known if one allows four colors. More precisely, Erd\H os and Hajnal (see \cite{GRS}) showed that $r_3(n;4) > 2^{2^{cn}}$, and for three colors, the best known lower bound for $r_3(n; 3)$ is due to Conlon, Fox, and Sudakov \cite{CFS} who showed that $r_3(n; 3) > 2^{n^{c\log n}}$. There is some evidence that perhaps Conjecture \ref{3conj} is false, and we refer the interested reader to \cite{almostmono,CFR} for two results in this direction. \section{Off-Diagonal Ramsey numbers}\label{offdiagsec} \emph{Off-diagonal Ramsey numbers}, $r_k(s,n)$, refer to the special case when $k,s$ are fixed and $n$ tends to infinity. It is known \cite{AKS,Kim,B,BK} that $r_2(3,n) =\Theta(n^2/\log n)$, and more generally for fixed $s > 3$, $r_2(s,n) = n^{\Theta(1)}$. For 3-graphs, Conlon, Fox and Sudakov~\cite{CFS} proved that there are absolute constants $c, c'>0$ such that for all $4 \le s \le n$, $$2^{csn\log \left(\frac{n}{s} + 1\right)} < r_3(s,n) <2^{ (c'n/s)^{s-2} \log (n/s)}.$$ For $s = n$, this gives another proof that $r_3(n,n) > 2^{cn^2}$. For $k$-graphs, where $s > k\geq 4$, it is known that $r_k(s,n) \leq \mbox{\rm twr}_{k-1}(n^{c}),$ where $c = c(s)$ \cite{ER}. Erd\H os and Hajnal proved that \begin{equation}\label{off}r_k(s,n)> \mbox{\rm twr}_{k-1}(c'n),\end{equation} for $k\geq 4$ and $s \geq 2^{k-1} - k + 3$, where $c' = c'(s)$. They conjectured that a similar bound should hold for smaller $s$ as follows. \begin{conjecture}[Erd\H os-Hajnal~\cite{EH72}] \label{ehoffconj} Fix $4\le k<s$. There are constants $c$ and $c'$ such that $$\mbox{\rm twr}_{k-1}(cn) < r_k(s,n)< \mbox{\rm twr}_{k-1}(c'n).$$ \end{conjecture} Actually, this was part of a more general conjecture that they posed in that paper which will be discussed in Section 4. Erd\H os and Hajnal (see \cite{GRS}) showed that $r_4(7,n) > 2^{2^{cn}}$, and the authors \cite{MS15} and Conlon, Fox, and Sudakov \cite{CFS15} independently verified the conjecture for $k\geq 4$ and $s \geq k + 3$ (using different constructions). However, showing that $r_4(5,n)$ and $r_4(6,n)$ grows double exponentially in a power of $n$ seemed to be much more difficult. Just as for diagonal Ramsey numbers, a double exponential in $n^c$ lower bound for $r_4(5,n)$ and $r_4(6,n)$ would imply $r_k(k + 1,n) > \mbox{\rm twr}_{k-1}(n^{c'})$ and $r_k(k + 2,n) > \mbox{\rm twr}_{k-1}(n^{c'})$ respectively, for all fixed $k\geq 5$, by a variant of the Erd\H os-Hajnal stepping up lemma. In \cite{MSr5r6}, the authors established the following lower bounds for $r_4(5,n)$ and $r_4(6,n)$, which represents the current best bounds: for all $n\geq 6$, $$r_4(5,n)> 2^{n^{c\log n}} \hspace{1cm}\textnormal{and}\hspace{1cm}r_4(6,n)> 2^{2^{cn^{1/5}}},$$ where $c > 0$ is an absolute constant. More generally, for $n > k \geq 5$, there is a $c = c(k) > 0$ such that $$r_k(k+1,n)> \mbox{\rm twr}_{k-2}(n^{c\log n}) \hspace{1cm}\textnormal{and}\hspace{1cm}r_k(k+2,n)> \mbox{\rm twr}_{k-1}(cn^{1/5}).$$ A standard argument in Ramsey theory together with results in~\cite{CFS} for 3-graphs yields $$r_k(k+2, n) < \mbox{\rm twr}_{k-1}(c'n^3\log n),$$ so we now know the tower growth rate of $r_k(k+2, n)$. It remains an open problem to prove that $r_4(5,n)$ is double exponential in a power of $n$. \begin{conjecture}\label{offconj} For $n\geq 5$, there is an absolute constant $c> 0$ such that $r_4(5,n) > 2^{2^{n^c}}$. \end{conjecture} In \cite{MS15}, the authors established a connection between diagonal and off-diagonal Ramsey numbers, by showing that a solution to Conjecture \ref{3conj} implies a solution to Conjecture~\ref{offconj} (see Section~\ref{ordsect} for more details). \section{The Erd\H os-Hajnal Problem} As mentioned in previous sections, it is a major open problem to determine if $r_3(n,n)$ and $r_4(5,n)$ grow double exponentially in a power of $n$. In order to shed more light on these questions, Erd\H os and Hajnal~\cite{EH72} in 1972 considered the following more general parameter. \begin{definition} For integers $2\le k < s <n$ and $2 \le t \le {s \choose k}$, let $r_k(s,t;n)$ be the minimum $N$ such that every red/blue coloring of the edges of $K^{(k)}_N$ results in a monochromatic blue copy of $K_n^{(k)}$ or has a set of $s$ vertices which contains at least $t$ red edges. \end{definition} The function $r_k(s, t; n)$ encompasses several fundamental problems which have been studied for a while. Clearly $r_k(s,n) = r_k(s, {s \choose k}; n)$ so $r_k(s,t;n)$ includes classical Ramsey numbers. In addition to off-diagonal and diagonal Ramsey numbers already mentioned, the function $r_k(k +1, k + 1; k + 1)$ has been studied in the context of the Erd\H os-Szekeres theorem and Ramsey numbers of ordered tight-paths by several researchers~\cite{DLR, EM, FPSS, MS, MSW}, the more general function $r_k(k+1, k+1; n)$ is related to high dimensional tournaments~\cite{LM}, and even the very special case $r_3(4,3;n)$ has tight connections to quasirandom hypergraph constructions~\cite{BR, KNRS, LM1, LM2}. The main conjecture of Erd\H os and Hajnal \cite{EH72} for $r_k(s,t;n)$ is that, as $t$ grows from $1$ to ${s\choose k}$, there is a well-defined value $t_1=h_1^{(k)}(s)$ at which $r_k(s,t_1-1;n)$ is polynomial in $n$ while $r_k(s,t_1;n)$ is exponential in a power of $n$, another well-defined value $t_2=h_2^{(k)}(s)$ at which it changes from exponential to double exponential in a power of $n$ and so on, and finally a well-defined value $t_{k-2}=h_{k-2}^{(k)}(s)<{s \choose k}$ at which it changes from $\mbox{\rm twr}_{k-2}$ to $\mbox{\rm twr}_{k-1}$ in a power of $n$. They were not able to offer a conjecture as to what $h_i^{(k)}(s)$ is in general, except when $i=1$ and when $s=k+1$. $\bullet$ When $i=1$, they conjectured that $t_1=h_1^{(k)}(s)$ is one more than the number of edges in the $k$-graph obtained by taking a complete $k$-partite $k$-graph on $s$ vertices with almost equal part sizes, and repeating this construction recursively within each part. Erd\H os offered \$500 for a proof of this (see \cite{Chung}). $\bullet$ When $s=k+1$, they conjectured that $h_i^{(k)}(k+1)=i+2$, that is, $r_k(k + 1, 2;n)$ is polynomial in $n$, $r_k(k +1,3;n)$ is exponential in a power of $n$, $r_k(k +1,4;n)$ is double exponential in a power of $n$, and etc.~such that at the end, both $r_k(k+1,k;n)$ and $r_k(k+1,k+1;n)$ are $\mbox{\rm twr}_{k-1}$ in a power of $n$. They proved this for $i=1$ via the following: \begin{theorem} [Erdos-Hajnal~\cite{EH72}] \label{eh} For $k \ge 3$, there are positive $c= c(k)$ and $c'=c'(k)$ such that $$r_k(k+1, 2; n) < cn^{k-1} \qquad \hbox{ and } \qquad r_k(k+1, 3; n) > 2^{c'n}.$$ \end{theorem} Results of R\"odl-\v Sinajov\'a \cite{RS} on partial Steiner systems, and of Kostochka-Mubayi-Verstra\"ete~\cite{KMV} on independent sets in hypergraphs, determine the order of magnitude of the function $r_k(k+1,2;n)$ as follows. For each $k \ge 3$ there exist positive $c=c_k$ and $c'=c'(k)$ such that $$ c' n^{k-1}/\log n < r_k(k+1,2;n) < c \, n^{k-1}/\log n.$$ For the $t = 3$ case, the authors in \cite{MS16} showed that for $k\geq 3$, there are positive $c = c(k)$ and $c' = c'(k)$ such that \begin{equation}\label{ehk12} 2^{cn^{k-2}} \leq r_k(k + 1,3;n) \leq 2^{c'n^{k-2}\log n }. \end{equation} For general $t$, the methods of Erd\H os and Rado \cite{ER} show that there exists $c=c(k,t)>0$ such that \begin{equation}\label{ehre}r_k(k+1, t; n) \leq \mbox{\rm twr}_{t-1}(n^c),\end{equation} for $3 \leq t\leq k$. Erd\H os and Hajnal conjectured that this upper bound is the correct tower growth rate for $ r_k(k+1, t; n)$. \begin{conjecture} [Erdos-Hajnal~\cite{EH72}] \label{ehconj} For $k\geq 3$ and $2 \le t \le k$, there exists $c=c(k,t)>0$ such that $$r_k(k+1, t; n) \geq \mbox{\rm twr}_{t-1}(c \, n).$$ \end{conjecture} Note that when $t = k+1$, the results from the previous section states that $r_k(k+1,k+1;n) = r_k(k+1,n) \leq \mbox{\rm twr}_{k-1}(n^{c'})$ where $c' = c'(k,t)$. Hence for 3-graphs, $r_3(4,t;n)$ is fairly well understood. We know that $r_3(4,2;n)$ is polynomial in $n$, and both $r_3(4,3;n)$ and $r_3(4,4;n)$ are exponential in $n^{1 + o(1)}$. See \cite{CFS} for more results on $h_1^{(3)}(s)$ for $s > 4$. Unfortunately for 4-graphs, we do not have a good understanding of $r_4(5,t;n)$ when $4 \leq t\leq 5$. The best known upper and lower bounds for $r_4(5,4;n)$ are obtained by (\ref{ehk12}) and (\ref{ehre}), which give $2^{cn^2} < r_4(5,4;n) < 2^{2^{n^{c}}}.$ Notice that Conjecture~\ref{ehconj} states that $r_4(5,4;n)$ grows double exponential in a power of $n$, but we don't even know if $r_4(5,5;n) = r_4(5,n)$ is double exponential in a power of $n$. Likewise, for 5-graphs, not much is known about $r_5(6,4;n)$ and $r_5(6,5;n)$. Combining (\ref{ehk12}) and (\ref{ehre}) gives \begin{equation}\label{r52} 2^{c'n^3} < r_5(6,4;n) < 2^{2^{n^{c}}} \hspace{1cm}\textnormal{and}\hspace{1cm} 2^{c'n^3} < r_5(6,5;n) < 2^{2^{2^{n^{c}}}}. \end{equation} \begin{problem} Determine the tower growth rate of $r_4(5,4;n)$, $r_5(6,4;n)$, and $r_5(6,5;n)$. \end{problem} However for $k$-graphs, when $k\geq 6$, the authors in \cite{MS16} settled Conjecture \ref{ehconj} in almost all cases in a strong form, by determining the correct tower growth rate, and in half of the cases also determining the correct power of $n$ within the tower. \begin{theorem}[Mubayi-Suk \cite{MS16}]\label{MSEH} For $k\geq 6$ and $4 \le t \le k-2$, there are positive $c =c(k,t)$ and $c'=c'(k,t)$ such that $$\mbox{\rm twr}_{t-1}(c' n^{k-t + 1}\log n) \, \ge \, r_k(k+1,t; \, n) \, \ge \, \begin{cases} \mbox{\rm twr}_{t-1}(c \, n^{k-t + 1}) \qquad \hbox{ if $k-t$ is even}\\ \mbox{\rm twr}_{t-1}(c \, n^{(k-t + 1)/2}) \hskip8pt \hbox{ if $k-t$ is odd.} \end{cases} $$ \end{theorem} When $k\geq 6$ and $t \in \{k-1, k\}$, Conjecture \ref{ehconj} remains open. We note that the upper bound in Theorem~\ref{MSEH} also holds when $k-1 \leq t \leq k$. The best known upper and lower bounds for $r_k(k+1,k-1;n)$ and $r_k(k+1,k;n)$, also due to the authors \cite{MS16}, are $$\mbox{\rm twr}_{k-3}(c \, n^3) \le r_k(k+1, k-1;\, n) \le \mbox{\rm twr}_{k-2}(c' \, n^2),$$ and $$\mbox{\rm twr}_{k-3}(c \, n^3) \le r_k(k+1, k;\, n) \le \mbox{\rm twr}_{k-1}(c' \, n).$$ In fact, by using the stepping-up lemma established in \cite{MS16}, any improvement in the lower bound for $r_5(6,4;n)$ and $r_5(6,5;n)$ in (\ref{r52}) would imply a better lower bound for $ r_k(k+1, k-1;\, n)$ and $r_k(k+1, k;\, n)$ respectively. \medskip \section{The Erd\H os-Rogers Problem} An $s$-independent set in a $k$-graph $H$ is a vertex subset that contains no copy of $K_s^{(k)}$. So if $s=k$, then it is just an independent set. Let $\alpha_s(H)$ denote the size of the largest $s$-independent set in $H$. \begin{definition} For $k \le s < t < N$, the Erd\H os-Rogers function $f^k_{s,t}(N)$ is the minimum of $\alpha_s(H)$ taken over all $K_t^{(k)}$-free $k$-graphs $H$ of order $N$. \end{definition} To prove the lower bound $f_{s,t}^{k}(N)\ge n$, one must show that every $K_{t}^{(k)}$-free $k$-graph on $N$ vertices contains an $s$-independent set with $n$ vertices. On the other hand, to prove the upper bound $f_{s,t}^{(k)}(N) < n$, one must construct a $K_{t}^{(k)}$-free $k$-graph $H$ of order $N$ with $\alpha_s(H) < n$. The problem of determining $f_{s,t}^{k}(n)$ extends that of finding Ramsey numbers. Formally, $$ r_k(s,n) = \min \{ N : f_{k,s}^{k}(N) \ge n\}. $$ For $k=2$, the above function was first considered by Erd{\H o}s and Rogers~\cite{ERog} only for $t=s+1$, which is perhaps the most interesting case. So in this case we wish to construct a $K_{s+1}$-free graph on $N$ vertices such that the $s$-independence number is as small as possible. Since then the function has been studied by several researchers culminating in the work of Wolfowitz~\cite{Wo} and Dudek, Retter and R\"odl~\cite{DRR} who proved the upper bound that follows (the lower bound is due to Dudek and the first author~\cite{DM}): for every $s\ge 3$ there are positive constants $c_1$ and $c_2=c_2(s)$ such that \begin{equation} \label{fs} c_1\left(\frac{ N \log N }{\log\log N}\right)^{1/2}< f^2_{s,s+1}(N)< c_2 (\log N)^{4s^2}N^{1/2}.\end{equation} The problem of estimating the Erd\H os-Rogers function for $k>2$ appears to be much harder. Let us denote $$g(k,N)=f^k_{k+1, k+2}(N).$$ In other words, $g(k,N)$ is the minimum $n$ such that every $K_{k+2}^{(k)}$-free $k$-graph on $N$ vertices has the property that every $n$-set of vertices has a copy of $K_{k+1}^{(k)}$. With this notation, the bounds in (\ref{fs}) for $s=3$ imply that $g(2,N)=N^{1/2+o(1)}$. Dudek and the first author \cite{DM} proved that $(\log N)^{1/4+o(1)} < g(3,N) < O(\log N)$, and more generally, that there are positive $c_1=c_1(k)$ and $c_2=c_2(k)$ with \begin{equation} \label{1} c_1( \log_{(k-2)}N)^{1/4} < g(k,N) < c_2(\log N)^{1/(k-2)},\end{equation} where $\log_{(i)}$ is the log function iterated $i$ times. The exponent 1/4 in (\ref{1}) was improved to 1/3 by Conlon, Fox and Sudakov \cite{CFS14}. Both sets of authors asked whether the upper bound could be improved (presumably to an iterated log function). This was achieved by the current authors~\cite{MS15c} who proved that for $k \ge 14$, $$g(k,N) = O( \log_{(k-13)} N ).$$ It remains an open problem to determine the correct number of iterations (which may well be $k-2$). We pose this as a conjecture. \begin{conjecture} For all $k \ge 3$, there are $c_1, c_2>0$ such that $$c_1 \log_{(k-2)} N < g(k,N) < c_2 \log_{(k-2)} N .$$ \end{conjecture} \section{The Erd\H os-Gy\'arf\'as-Shelah Problem} A $(p,q)$-coloring of $K_N^{(k)}$ is an edge-coloring of $K_N^{(k)}$ that gives every copy of $K_p^{(k)}$ at least $q$ colors. Let $f_k(N,p,q)$ be the minimum number of colors in a $(p,q)$-coloring of $K_N^k$. The problem of determining $f_k(N,p,q)$ for fixed $k,p,q$ has a long history, beginning with its introduction by Erd\H os and Shelah~\cite{E1, E2}, and subsequent investigation (for graphs) by Erd\H os and Gy\'arf\'as~\cite{EG}. Since $$f_k(N,p,2)=t \qquad \Longleftrightarrow \qquad r_k(p; t)\ge N+1 \quad \hbox{ and }\quad r_k(p; t-1)\le N,$$ most of the effort on determining $f_k(N, p,q)$ has been for $q>2$. As mentioned above, Erd\H os and Gy\'arf\'as~\cite{EG} initiated a systematic study of this parameter for graphs and posed many open problems. One main question was to determine the minimum $q$ such that $f_2(N, p,q)= N^{o(1)}$ and $f_2(N, p,q+1)> N^{c_p}$ for some $c_p>0$. For $p=3$ this value is clearly $q=2$ as $f_2(N, 3, 2)= O(\log N)$ due to the easy bound $r_2(3; t)>2^t$, while $f_2(N, 3, 3) =\chi'(K_N) \ge N-1$. Erd\H os and Gy\'arf\'as proved that $f_2(N, p, p)>N^{c_p}$ and asked whether $f_2(N, p, p-1)= N^{o(1)}$. The first open case was $f_2(N,4,3)$, which was shown to be $N^{o(1)}$ by the first author~\cite{M} and later $\Omega(\log N)$ (see~\cite{FS, KM}). The same upper bound was shown for $f(N,5,4)$ in~\cite{EMub}. Conlon, Fox, Lee and Sudakov~\cite{CFLS2} recently extended this construction considerably by proving that $f_2(N,p,p-1)=N^{o(1)}$ for all fixed $p \ge 4$. Their result is sharp in the sense that $f_2(N,p,p)=\Omega(N^{1/(p-2)})$. The exponent $1/(p-2)$ was shown to be sharp for $p=4$ by the first author~\cite{M2} and recently also for $p=5$ by Cameron and Heath~\cite{CH} via explicit constructions. The first nontrivial hypergraph case is $f_3(N,4,3)$ and this function has tight connections to Shelah's breakthrough proof~\cite{S} of primitive recursive bounds for the Hales-Jewett numbers. Answering a question of Graham, Rothschild and Spencer~\cite{GRS}, Conlon, Fox, Lee and Sudakov showed that $$f_3(N,4,3)= N^{o(1)}.$$ They also posed a variety of basic questions about $f_k(N,p,q)$ and related parameters including the following generalization of the Erd\H os-Gy\'arf\'as problem for hypergraphs. Using a variant of the pigeonhole argument for hypergraph Ramsey numbers due to Erd\H os and Rado,~\cite{CFLS} proved that $$f_k\left(N, p, {p-i \choose k-i} +1\right) = \Omega(\log_{(i-1)}N^{c_{p,k,i}})$$ where $\log_{(0)}(x)=x$ and, as usual, $\log_{(i+1)}x=\log \log_{(i)}x$ for $i \ge 0$. \begin{problem} [Conlon-Fox-Lee-Sudakov~\cite{CFLS}] \label{cflsprob} For $p>k \ge 3$ and $0<i<k$ prove that $f_k(N, p, {p-i \choose k-i})$ is substantially smaller than $f_k(N, p, {p-i \choose k-i}+1)$, in particular, prove that $f_k(N, p, {p-i \choose k-i})$ is much smaller than $\log_{(i-1)}N$. \end{problem} One natural way to interpret this problem is that it asks whether $$f_k\left(N, p, {p-i \choose k-i}\right)=(\log_{(i-1)}N)^{o(1)}?$$ The case $k=2$ is precisely the Erd\H os-Gy\'arf\'as problem and the case $k=3, p=4, i=1$ is to prove that $f_3(N,4,3)= N^{o(1)}$ which was established in~\cite{CFLS}. The next open case is $k=3, p=5, i=2$, which asks whether $f_3(N,5,3) = (\log N)^{o(1)}$. This was solved with a better bound by the first author~\cite{Mlocal}, who showed that $$f_3(N,5,3)= e^{O(\sqrt{\log\log N})}= (\log N)^{O(1/\sqrt{\log\log N})}.$$ No other nontrivial cases of Problem~\ref{cflsprob} have been solved. We refer the reader to~\cite{CFLS} for related problems and results. \section{More off-diagonal problems} In this section we consider $k$-graph Ramsey numbers of the form $r_k(H, n):= r_k(H, K_n^{(k)})$ where $H$ is a (fixed) $k$-graph and $n$ grows. \subsection{$K_4^{(3)}$ minus an edge and a generalization} Let $K_4^{(3)}\setminus e$ denote the 3-graph on four vertices, obtained by removing one edge from $K_4^{(3)}$. A simple argument of Erd\H os and Hajnal \cite{EH72} implies $r(K_4^{(3)}\setminus e,K_n^{(3)}) < (n!)^2$. This was generalized in~\cite{MS15c} as follows. A \emph{$k$-half-graph}, denote by $B=B^{(k)}$, is a $k$-graph on $2k-2$ vertices, whose vertex set is of the form $S\cup T$, where $|S| = |T| = k-1$, and whose edges are all $k$-subsets that contain $S$, and one $k$-subset that contains $T$. So $B^{(3)}=K_4^{(3)}\setminus e$. Write $r_k(B, n)=r(B^{(k)}, K_n^{(k)})$. It was shown in \cite{MS15c} that for each $k\geq 4$ there exists $c=c_k$ such that $$2^{cn} < r_k(B,n) < (n!)^{k-1}.$$ A problem that goes back to the 1972 paper of Erd\H os and Hajnal (for $k=3$) is to improve the lower bound above. Indeed, $r_3(B, n)=r_3(4, 3; n)$ and this is therefore a very special case of the Erd\H os-Hajnal problem discussed earlier. \begin{problem} Show that for each $k\geq 3$ there exists $c=c_k$ such that $r_k(B, n) > 2^{c n \log n}$. \end{problem} \subsection{Independent neighborhoods} \begin{definition} A $k$-uniform triangle $T^{(k)}$ is a set of $k+1$ edges $b_1, \ldots, b_k, a$ with $b_i \cap b_j=R$ for all $i<j$ where $|R|=k-1$ and $a = \cup_i (b_i-R)$. In other words, $k$ of the edges share a common $(k-1)$-set of vertices, and the last edge contains the remaining point in all these previous edges. \end{definition} When $k=2$, then $T^{(2)}=K_3$, so in this sense $T^{(k)}$ is a generalization of a graph triangle. We may view a $T^{(k)}$-free $k$-graph as one in which all neighborhoods are independent sets, where the neighborhood of an $R \in {V(H)\choose k-1}$ is $\{x: R \cup \{x\} \in H\}$. As usual, write $r_k(T, n)$ for $r(T^{(k)}, K_n^{(k)})$. Bohman, Frieze and Mubayi~\cite{BFM} proved that for fixed $k \ge 2$, there are positive constants $c_1$ and $c_2$ with $$c_1\frac{n^k}{(\log n)^{k/(k-1)}}<r_k(T, n)< c_2 n^k.$$ They conjectured that the upper bound could be improved to $o(n^k)$ and believed that the log factor in the lower bound could also be improved. Results of Kostochka-Mubayi-Verstra\"ete~\cite{KMV} proved this and then Bohman-Mubayi-Picollelli~\cite{BMP} achieved a matching lower bound by analyzing the hypergraph independent neighborhood process. This may be viewed as a hypergraph generalization of the results of Ajtai-Koml\'os-Szemer\'edi~\cite{AKS} for graphs. \begin{theorem} [Kostochka-Mubayi-Verstra\"ete~\cite{KMV}, Bohman-Mubayi-Picollelli~\cite{BMP}] For fixed $k \ge 3$ there are positive constants $c_1$ and $c_2$ with $$c_1\frac{n^k}{\log n}<r_k(T, n)< c_2 \frac{n^k}{\log n}.$$ \end{theorem} \subsubsection{Unordered tight-paths versus cliques} An (unordered) 3-uniform tight-path $TP^{(3)}_s = TP_s$ is the $3$-graph with vertex set $\{v_1,\ldots, v_s\}$ and edge set $\{\{v_i, v_{i+1}, v_{i+2}\}: i \in \{1,\ldots, s-2\}\}$. Note that the vertex set $\{v_1,\ldots, v_s\}$ is not ordered. Results of Phelps and R\"odl~\cite{phelpsrodl} imply that there are $c_1$ and $c_2$ such that \[ c_1 n^2/\log n < r_3(TP_4, n) < c_2 n^2/\log n. \] It is easy to prove that for all $s \ge 5$, there is $c=c_s$ such that $r_3(TP_s, n) < c\, n^2$. A matching lower bound for $s\geq 6$ was provided by Cooper and Mubayi \cite{CMsparse} with the following construction. Let $H$ be a 3-graph where $V(H) = [n]\times [n]$, and $E(H) = \{\{ab,ac,db\} \in [n]\times [n]: c > b, d > a\}$. It is easy to see that $H$ is $TP_6$-free and $\alpha(H) < 2n$. Thus, For $s \ge 6$ there exists $c=c_s$ such that $r_3(TP_s, n) > c n^2.$ The construction above has many copies of $TP_5$ so this leaves open the case $s=5$. Using the trivial lower bound $r_3(TP_4, n)$ we thus have $c_1 n^2/\log n < r_3(TP_5, n) < c_2 n^2.$ \begin{problem} [\cite{CMsparse}] Determine the order of magnitude of $r_3(TP_5, n)$. \end{problem} The corresponding problems for $k$-graphs when $k>3$ are wide open. \subsection{Cycles versus cliques} For fixed $s \ge 3$ the graph Ramsey number $r(C_s, n)=r(C_s, K_n)$ has been extensively studied. The case $s=3$ is one of the oldest questions in Ramsey theory and it is known that $r(C_3,K_n)=\Theta(n^2/\log n)$ (see~\cite{AKS, Kim} and \cite{BK2, FGM} for recent improvements). The next case $r(C_4, K_n)$ seems substantially more difficult. An old open problem of Erd\H os~\cite{E84} asks whether there is a positive $\epsilon$ for which $r(C_4, K_n) = O(n^{2-\epsilon})$. The current best upper bound $r(C_4,K_n) = O(n^2/\log^2 n)$ is an unpublished result of Szemer\'edi which was reproved in~\cite{ram-caro00} and the current best lower bound is $\Omega(n^{3/2}/\log n)$ from~\cite{BK}. For longer cycles, the best known bounds can be found in~\cite{BK, SU}, and the order of magnitude of $r(C_s, K_n)$ is not known for any fixed $s \ge 4$. There are several natural ways to define a cycle in hypergraphs. The two that have been investigated the most are tight cycles and loose cycles. \subsubsection{Loose cycles versus cliques} For $s \ge 3$, the loose cycle $LC_s^{(k)}$ is the $k$-graph with vertex set ${\mathbb Z}_{(k-1)s}$ and edge set $\{e_1, e_2, \ldots, e_s\}$ where $e_i=\{i(k-1)-k+2, \ldots, i(k-1)+1\}$. In other words, consecutive edges intersect in exactly one vertex and nonconsecutive edges are pairwise disjoint. As usual, write $r_k(LC_s, n)$ for $r(LC_s^{(k)}, K_n^{(k)})$. Since loose cycles are $k$-partite, it is easy to see that $r_k(LC_s, n)$ has polynomial growth rate for fixed $k,s$ so the question here is to determine the correct power of $n$. \begin{theorem} [Kostochka-Mubayi-Verstra\"ete~\cite{kmvr}]\label{main} There exists $c_1,c_2> 0$ such that for all $n \geq 1$, $$\frac{c_1 n^{3/2}}{(\log n)^{3/4}} \leq r_3(LC_3,n) \leq c_2 n^{3/2}.$$ For $k \ge 3$, we also have $r_k(LC_3,n)=n^{3/2+o(1)}$. \end{theorem} Analogous to the basic result $r(3, n)= O(n^2/\log n)$ due to Ajtai, Koml\'{o}s and Szemer\'{e}di~\cite{AKS}, the authors conjectured something similar for hypergraphs. \begin{conjecture}[\cite{kmvr}]\label{conjl6} For all fixed $k \ge 3$, we have $r_k(LC_3,n) = o(n^{3/2})$. \end{conjecture} Define the 3-graph $F=\{abc, abd, cde\}$. Cooper and Mubayi~\cite{CM} proved the following weaker version of Conjecture~\ref{conjl6} in the case $k=3$: \begin{equation} \label{cm}r_3(\{LC_3, F, K_4^{(3)}-e\}, n) = O\left( \frac{n^{3/2}} {(\log n)^{1/2}}\right).\end{equation} Notice that the three forbidden 3-graphs in (\ref{cm}) are all types of triangles, comprising three edges that cyclically share a vertex. Conjecture \ref{conjl6} asks that we forbid only one of these three triangles, the loose triangle. For longer cycles, the following general lower bounds were proved in~\cite{kmvr} which improve the bounds given by the standard probabilistic deletion method: $$r_k(LC_s, n) > n^{1+1/(3s-1)+o(1)}.$$ Furthermore, there exists $c=c_k$ such that $$r_k(LC_5, n)> c\left(\frac{n}{\log n}\right)^{5/4}.$$ \begin{conjecture} [\cite{kmvr}] For each $k \ge 3$, there exists $c=c_k$ such that $r_k(LC_5, n)< c \, n^{5/4}$. \end{conjecture} M\'eroueh~\cite{Me} recently proved that $r_3(LC_5, n ) < c n^{4/3}$ and more generally that $$r_3(LC_s, n) < c_s n^{1+\frac{1}{\lfloor (s+1)/2 \rfloor}}.$$ He also proved that for odd $s\ge 5$ and $k \ge 4$, $r_k(LC_s, n) < c_{k,s} n^{1+1/\lfloor s/2 \rfloor}$ which slightly improved the exponent $1+1/(\lfloor s/2 \rfloor-1)$ proved by Collier-Cartaino, Graber and Jiang~\cite{CGJ} for all $k \ge 3$ and $s \ge 4$. \subsubsection{Tight cycles versus cliques} For $k\ge 2$ and $s > 3$, the {\it tight cycle} $TC_s^{(k)}$ is the $k$-graph with vertex set ${\mathbb Z}_s$ (integers modulo $s$) and edge set $$\{\{i, i+1, \ldots, i+k-1\}: i \in {\mathbb Z}_s\}.$$ We can view the vertex set of $TC_s^{(k)}$ as $s$ points on a circle and the edge set as the $s$ subintervals each containing $k$ consecutive vertices. When $s \equiv 0$ (mod 3) the tight cycle $TC_s^{(3)}$ is 3-partite, and in this case it is trivial to observe that $r_3(TC_s, n):= r(TC_s^{(3)}, K_n^{(3)})$ grows polynomially in $n$. The growth rate of this polynomial is not known for any $s>3$. When $s \not\equiv 0$ (mod 3) the Ramsey number is exponential in $n$. \begin{theorem}[Mubayi-R\"odl~\cite{MR,Mtc}] Fix $s \ge 5$ and $s \not\equiv 0$ (mod 3). There are positive constants $c_1$ and $c_2$ such that $$ 2^{c_1n}<r_3(TC_s, n)<2^{c_2n^2\log n}. $$ If $s \not\equiv 0$ (mod 3) and $s\ge 16$ or $s \in \{8,11,14\}$, there is a positive constant $c_s$ such that $$r_3(TC_s, n) < 2^{c_s n \log n}.$$ \end{theorem} Note that when $s=4$, the cycle $TC_4^{(3)}$ is $K_4^{(3)}$ and in this case the lower bound was proved much earlier by Erd\H os and Hajnal~\cite{EH72}, and in fact has been improved to $2^{c_1 n \log n}$ more recently by Conlon, Fox and Sudakov~\cite{CFS}. \begin{problem} Prove similar bounds for $s\in\{ 4,5,7,10,13\}$ and determine whether the $\log$ factor in the exponent is necessary. \end{problem} The problem of determining $r_k(TC_s, n):=r_k(TC_s^{(k)}, K_t^{(k)})$ for fixed $s>k>3$ seems harder as $k$ grows. It was shown in~\cite{MR} that we have a lower bound $$r_k(TC_s, n) > 2^{c_{k, s} n^{k-2}}$$ The best upper bound that is known (for fixed $s>k$ and all $n$) is the trivial one $r_k(s, n)$. Consequently, we have $$2^{c_{k,s} n^{k-2}} < r_k(TC_s, n) <r_k(s, n)< \mbox{\rm twr}_{k-1}(n^{d_{s,k}}).$$ Closing the gap above seems to be a very interesting open problem. For the case $s=k+1$, one has a substantially better lower bound as $$ r_k(TC_{k+1}, n) = r_k(k+1, n) > \mbox{\rm twr}_{k-2}(bn^{\log n})$$ where $b=b_k$. \begin{problem} For fixed $s>k+1>4$ (in particular for $s=k+2$), determine whether $r_k(TC_s, n)$ is at least a tower function in a power of $n$ where the tower height grows with $k$. \end{problem} \section{Bounded degree hypergraphs} Given a bounded degree graph $G$, the Ramsey number $r_2(G,G)$ has been studied extensively. A famous result due to Chv\'atal, R\"odl, Szemer\'edi, and Trotter \cite{CRSTbd} says that if $G$ is a graph on $n$ vertices with maximum degree $\Delta$, then $r_2(G, G) \leq c_{\Delta}n$ where $c_{\Delta}$ depends only on $\Delta$. This was later extended to 3-graphs by Cooly, Fountoulakis, K\"uhn, Osthus \cite{CFK}, Nagle, Olsen, R\"odl, Schacht \cite{NOR}, and Ishigami \cite{Ish} independently, where the degree of a vertex $v$ in a hypergraph $H$ is the number of edges which contain $v$. Using different methods, Cooly, Fountoulakis, K\"uhn, Osthus \cite{CFK2} and Conlon, Fox, Sudakov \cite{CFSbdk} extended this to general $k$-graphs. \begin{theorem}[Cooly et al.~\cite{CFK2}, Conlon-Fox-Sudakov~\cite{CFSbdk}] For all $\Delta, k \geq 1$, there is a $c(\Delta,k)$ such that for any $k$-graph $H$ on $n$ vertices with maximum degree $\Delta$, we have $$r_k(H,H) \leq c(\Delta, k) n.$$ \end{theorem} In the special case that $H = LC^{(3)}_n$ or $TC_n^{(3)}$, the asymptotics for both $r_3(LC_n, LC_n)$ and $r_3(TC_n, TC_n)$ were determined in \cite{HLPRRSS} and \cite{HLPRRS} respectively. \begin{theorem}[Haxell et al. \cite{HLPRRSS}] $r_3(LC_n, LC_n) = \frac{5n}{2}(1 + o(1)).$ \end{theorem} \begin{theorem}[Haxell et al. \cite{HLPRRS}] For $n$ divisible by 3, we have $r_3(TC_n,TC_n) = \frac{4n}{3}(1 + o(1))$. Otherwise, if $n$ is not divisible by 3, we have $r_3(TC_n,TC_n) = 2n(1 +o(1))$. \end{theorem} For $q$-colors, Gy\'arf\'as and Raeisi~\cite{GR} proved that $$q+5 \le r_3(LC_3; q) \le 3q+1.$$ It seems to be an interesting open problem to determine which bound above is closer to the truth. The lower bound appears more likely to be the answer. There has been some work on determining $r_3(P; q)$ where $P=\{123, 345, 567\}$ is the 3-uniform loose path of length three. In particular, the lower bound $r_3(P; q)\ge q+6$ for all $q \ge 3$ is sharp for all $q \le 9$ (see~\cite{GR, PR}). The general upper bound which comes from the Tur\'an number of $P$ is again $3q+1$. This upper bound was improved by Luczak and Polcyn~\cite{LP} first to $(2+o(1))q$ and more recently to $\lambda q + O(\sqrt q)$ where the constant $\lambda=1.97466..$ is the solution to a particular cubic equation. \section{Ordered Hypergraph Ramsey Problems}\label{ordsect} In this section, we discuss several Ramsey-type results for ordered hypergraphs. An \emph{ordered} $N$-vertex $k$-graph $H$ is a hypergraph whose vertex set is $[N] = \{1,\ldots, N\}$. Given two ordered $k$-graphs $G$ and $H$ with vertex set $[n]$ and $[N]$ respectively, we say that $H$ \emph{contains} $G$ if there is a function $\phi:[n]\rightarrow [N]$ such that $\phi(i) < \phi(j)$ for all $1\leq i < j \leq n$, and $(v_1,\ldots, v_k) \in E(G)$ implies that $(\phi(v_1),\ldots, \phi(v_k)) \in E(H)$. Given $q$ ordered $k$-graphs $H_1,\ldots, H_q$, the \emph{ordered Ramsey number} $\overline{r}_k(H_1,\ldots, H_n)$ is the minimum integer $N$, such that every $q$-coloring of the edges of the complete $k$-graph with vertex set $[N]$, contains a copy of $H_i$ in the $i$th color. \subsection{Tight-paths and cliques in hypergraphs} An \emph{ordered tight path} $P_s^{(k)}$ is an ordered $k$-graph with vertex set $[s]$, whose edges are of the form $(i , i + 1,\ldots, i + k - 1)$, for $1 \leq i \leq s - k + 1$. The \emph{length} of an ordered tight path $P_s^{(k)}$ is the number of edges it contains, that is, $s-k + 1$. In order to avoid the excessive use of superscripts, we write $P_s = P_s^{(k)}$ when the uniformity is already implied. Two famous theorems of Erd\H os and Szekeres in \cite{ES35}, known as the monotone subsequence theorem and the cups-caps theorem, imply that $\overline{r}_2(P_s , P_n) = (n - 1)(s - 1) + 1$ and $\overline{r}_3(P_s,P_n) = {n+s - 4 \choose s-2} + 1.$ In \cite{FPSS}, Fox, Pach, Sudakov, and Suk extended their results to $k$-graphs and determined the correct tower growth rate for $\overline{r}_k(P_s,P_s)$. Their results gave a geometric application related to the Happy Ending Theorem.\footnote{The main result in \cite{ES35}, known as the Happy Ending Theorem, states that for any positive integer $n$, any sufficiently large set of points in the plane in general position has a subset of $n$ members that form the vertices of a convex polygon.} A few years later, Moshkovitz and Shapira~\cite{MS} sharpened the bounds for $\overline{r}_k(P_s,P_s)$ by determining an exact formula for $\overline{r}_3(P_{s},\ldots, P_{s})= \overline{r}_3(P_{s} ;q)$ with $q$ colors. \begin{theorem}[Moshkovitz-Shapira~\cite{MS}] Let $P_{q-1}(s)$ denote the number of $s\times \cdots \times s$ $(q-1)$-dimensional partitions with entries $\{0,1,\ldots, s\}$. Then $$\overline{r}_3(P_s;q) = P_{q-1}(s) + 1.$$ \end{theorem} Soon after, Milans-Stolee-West~\cite{MSW} obtained an exact formula for $\overline{r}_k(P_{s_1}, \ldots, P_{s_q})$ for all $k, q \ge 2$, and $s_i \ge k$ (see~\cite{CS,DLR} for some related results). \begin{theorem} [Milans-Stolee-West~\cite{MSW}] Let $k, q \ge 2$, and $s_i > k$ for all $i \in [q]$. Let $J_1$ be the poset comprising disjoint chains $C_1, \ldots, C_q$, with $|C_i|=s_i-k$ for $i \in [q]$ and for $i\ge 1$, let $J_{i+1}$ be the poset whose elements are the ideals (down sets) of $J_i$ with order defined by containment. Then $$\overline{r}_k(P_{s_1}, \ldots, P_{s_q})=|J_k|+1.$$ \end{theorem} Just as before, we will use the simpler notation $\overline{r}_k(P_s,n) = \overline{r}_k(P^{(k)}_s,K^{(k)}_n)$, and note that there is only one ordered complete hypergraph $K^{(k)}_n$ up to isomorphism. Interestingly, the proof of the Erd\H os-Szekeres monotone subsequence theorem \cite{ES35} (see also Dilworth's Theorem \cite{D50}) actually implies that $\overline{r}_2(P_s , n) = (n - 1)(s - 1) + 1.$ For $k\geq 3$, estimating $\overline{r}_k(P_s, n)$ appears to be more difficult. Clearly we have \begin{equation} \label{easy} \overline{r}_k(P_s, n) \leq r_k(s,n) \leq \mbox{\rm twr}_{k - 1}(O(n^{s - 2}\log n)).\end{equation} In \cite{MS15}, the authors established the following connection between the ordered Ramsey number $\overline{r}_k(P_s,n)$ and the classical multi-color Ramsey number $r_k(n;q)$ \begin{theorem}[Mubayi-Suk \cite{MS15}]\label{mainx} Let $k\geq 2$ and $s \geq k + 1$. Then for $q = s - k + 1$, we have $$r_{k -1}(\lfloor n/q\rfloor ;q) \le \overline{r}_k(P_s, n) \le r_{k -1}(n;q) .$$ \end{theorem} The upper bound in Theorem \ref{mainx} follows from the following argument. Let $q = s - k +1$, $N = r_{k-1}(n;q)$, and suppose $\chi$ is a red/blue coloring on the $k$-tuples of $[N]$. We can assume $\chi$ does not produce a red tight-path of length $q$, since otherwise we would have a red $P_s$ and be done. We define the coloring $\phi:{[N]\choose k-1} \rightarrow \{0,1,\ldots, q-1\}$ on the $(k-1)$-tuples of $[N]$, where $\phi(i_1,\ldots, i_{k-1}) = j$ if the longest red tight-path ending in vertices $(i_1,\ldots, i_{k-1})$ has length $j$. Since $N = r_{k-1}(n;q)$, by Ramsey's theorem, we have a monochromatic clique of size $n$ in color $j$ for some $j \in \{0,1,\ldots, q-1\}$. However, this clique would correspond to a blue clique with respect to $\chi$. For the lower bound, set $N = r_{k -1}(\lfloor n/q\rfloor ;q) - 1$, and let $\chi$ be a $q$ coloring on the $(k-1)$-tuples of $[N]$ with colors $\{1,2,\ldots, q\}$, such that $\chi$ does not produce a monochromatic clique of size $\lfloor n/q\rfloor$. Then let $\phi:{[N] \choose k}\rightarrow \{\textnormal{red,blue}\}$ such that for $i_1 < \cdots < i_k$, $\phi(i_1,\ldots, i_k)$ is red if and only if $\chi(i_1,\ldots, i_{k-1}) < \chi(i_2,\ldots, i_k)$. It is easy to see that $\phi$ does not produce a red tight-path $P_s$. With a slightly more complicated argument, one can show by contradiction that $\phi$ also does not produce a monochromatic blue clique of size $n$. The arguments above can be easily extended to obtain the following result for multiple colors \cite{MS15}. Let $k\geq 2$ and $s_1,\ldots, s_t \geq k + 1$. Then for $q = (s_1 - k + 1)\cdots (s_t - k + 1)$, we have $$r_{k -1}(\lfloor n/q\rfloor ;q) \le \overline{r}_k(P_{s_1}, \ldots, P_{s_t}, n) \le r_{k -1}(n;q) .$$ Together with known bounds for $r_{k-1}(n;q)$, Theorem \ref{mainx} has several consequences. First, we can considerably improve the upper bound for $\overline{r}_k(P_s, n)$ in (\ref{easy}) to $\overline{r}_k(P_s, n) \leq \mbox{\rm twr}_{k-1}(O(sn\log s)).$ In the other direction, the authors in \cite{MS15} showed that $\overline{r}_3(P_4,n) > 2^{cn}$, and Theorem \ref{mainx} implies that for $k \geq 4$ and $n>3k$, \begin{enumerate} \item $\overline{r}_k(P_{k + 3}, n) \geq \mbox{\rm twr}_{k-1}(cn),$ \item $\overline{r}_k(P_{k + 2}, n) \geq \mbox{\rm twr}_{k - 1}(c\log^2 n),$ \item $\overline{r}_k(P_{k + 1}, n) \geq \mbox{\rm twr}_{k - 2}(cn^2).$ \end{enumerate} We conjecture the following strengthening of the Erd\H os-Hajnal conjecture. \begin{conjecture}\label{conj3} For $k\geq 4$ fixed, $\overline{r}_k(P_{k + 1}, n) \ge \mbox{\rm twr}_{k-1}(\Omega(n)).$ \end{conjecture} For $s = k + 1$ in Theorem \ref{mainx}, we have $r_{k-1}(\lfloor n/2\rfloor, \lfloor n/2\rfloor) \leq \overline{r}_k(P_{k + 1},n) \leq r_{k-1}(n,n)$. Hence, we obtain the following corollary which relates $\overline{r}_4(P_{5}, n)$ to the diagonal Ramsey number $r_3(n,n)$. \begin{corollary}[\cite{MS15}]\label{equiv} Conjecture \ref{3conj} holds if and only if there is a constant $c>0$ such that $$\overline{r}_4(P_5, n) \ge 2^{2^{cn}}.$$ \end{corollary} For the case when the size of $P_s$ tends to infinity and the size of $K_n$ is fixed, the first author in \cite{Mes} showed that $\overline{r}_3(P_s,4)< s^{21}$, and more generally for each $k \ge 3$, there exists $c>0$ such that for $s$ large, $$\mbox{\rm twr}_{k-2}(s^{c}) < \overline{r}_{k}(P_s,k+1) < \mbox{\rm twr}_{k-2}(s^{62}).$$ Unfortunately much less is known about $\overline{r}_k(P_s,k+2)$. The main open problem here is to prove that $\overline{r}_3(P_s, 5)$ has polynomial growth rate, and more generally, that $\overline{r}_3(P_s, n)$ has polynomial growth rate for all fixed $n > 4$. The corresponding results for higher uniformity follow easily from the case $k=3$. We next consider a version of the Erd\H os-Hajnal hypergraph Ramsey problem with respect to tight-paths. \begin{definition} For integers $2\le k < s <n$ and $2 \le t \le {s \choose k}$, let $\overline{r}_k(s,t;P_n)$ be the minimum $N$ such that every red/blue coloring of the $k$-sets of $[N]$ results in a monochromatic blue copy of $P_n$ or has a set of $s$ vertices which induces at least $t$ red edges. \end{definition} Of course, $\overline{r}_k(s, {s \choose k}; P_n)= \overline{r}_k(s, P_n)$. We will focus our attention on the smallest case $s=k+1$. The following conjecture which parallels the Erd\H os-Hajnal conjecture for cliques was posed in~\cite{Mes}. \begin{conjecture} [\cite{Mes}] \label{EHpaths} For $3 \le t \le k$, there are positive $c =c(k,t)$ and $c'=c'(k,t)$ such that $$\mbox{\rm twr}_{t-2}(n^c) < \overline{r}_k(k+1, t; P_n) < \mbox{\rm twr}_{t-2}(n^{c'}).$$ \end{conjecture} This conjecture seems more difficult than the original problem of Erd\H os and Hajnal. The current best lower bound is only an exponential function; unfortunately the constructions used for Theorem~\ref{MSEH} fail. Standard arguments yield an upper bound of the form $\mbox{\rm twr}_{t-1}(n^{c})$ for Conjecture~\ref{EHpaths}. This upper bound was improved in~\cite{Mes} to $\mbox{\rm twr}_{t-2}(n^{c})$. Some further minor progress towards Conjecture~\ref{EHpaths} was made in~\cite{Mes} for the cases $t=3$ and $(k,t)=(4,4)$. \subsection{Ordered $\ell$-power paths in graphs} As mentioned above, The proof of Dilworth's theorem shows that $\overline{r}_2(P_s,n) = \overline{r}(P_s, P_n)=(s-1)(n-1)+1$. On the other hand, we know that the classical Ramsey number $r_2(n,n)$ grows exponentially in $\Theta(n)$. One can consider the case of ordered graphs that are denser than paths but sparser than cliques. \begin{definition} Given $\ell \ge 1$, the $\ell$th power $P_s^{\ell}$ of a path $P_s$ has ordered vertex set $v_1<\cdots < v_s$ and edge set $\{v_iv_j: |i-j|\le \ell\}$. In particular, $P_s^1=P_s$. The ordered Ramsey number $r(P_s^{\ell}, P_n^{\ell})$ is the minimum $N$ such that every red/blue coloring of ${[N] \choose 2}$ results in a red copy of $P_s^{\ell}$ or a blue copy of $P_n^{\ell}$. \end{definition} In~\cite{Mes} it was shown that the problem of determining $\overline{r}(P_n^{\ell}, P_n^{\ell})$ is closely related to the hypergraph ordered Ramsey function $\overline{r}_3(s, P_n)$. Conlon-Fox-Lee-Sudakov~\cite{CFLSord} asked whether $\overline{r}(P_n^{\ell}, P_n^{\ell})$ is polynomial in $n$ for every fixed $\ell\ge 1$. Actually, the problem in~\cite{CFLSord} is about the Ramsey number of ordered graphs with bandwidth at most $\ell$ but $P^{\ell}_n$ contains all such graphs so an upper bound for $P^{\ell}_n$ provides an upper bound for the bandwidth problem. This question was answered by Balko-Cibulka-Kr\'al-Kyn\v cl~\cite{BCKK}. Later a better bound was proved in \cite{Mes} for $\ell=2$. \begin{theorem}[Balko-Cibulka-Kr\'al-Kyn\v cl~\cite{BCKK} ($\ell\ge 3$), Mubayi~\cite{Mes} ($\ell=2$)] \label{main} There is an absolute constant $c>0$ and for every $\ell>0$ there exists $c=c_{\ell}$ such that \begin{align} \overline{r}(P_n^{\ell}, P_n^{\ell}) < \begin{cases} c\, n^{19.487} & \hbox{for } \ell=2 \\ c_{\ell} \, n^{128 \ell} & \hbox{for } \ell\ge 3. \end{cases} \end{align} \end{theorem} The main open problem here is to improve the exponents above. To our knowledge, there are no nontrivial lower bounds published for this problem. \begin{problem} [Balko-Cibulka-Kr\'al-Kyn\v cl~\cite{BCKK}] Determine the growth rate of $\overline{r}(P_n^{\ell}, P_n^{\ell})$ for every fixed $\ell \ge 2$. \end{problem} \section{A bipartite hypergraph Ramsey problem of Erd\H os} We end with an old problem of Erd\H os that was perhaps posed to gain a better understanding of the growth rate of the diagonal Ramsey numbers. \begin{definition} Let $S_{a,b} = (U,V,E)$ be the 3-graph with vertex set $U\cup V$, where $|U|=a$ and $|V| = b$, such that $E(S_{a,b}) = \{(x,y,z): x \in U \textnormal{ and } y,z \in V\}$. Write $S_n:=S_{n,n}$. \end{definition} An old result due to Erd\H os (see \cite{E90}) says that $r_3(S_n,S_n) = 2^{O(n^2)}$, which is tight up to a constant factor in the exponent by the standard probabilistic method. We were not able to find a published proof of this result and we therefore present a proof below (of a stronger result). \begin{theorem} For every $c>0$ and sufficiently large $n$, $$r_3(S_n, S_n) < r_3(S_{2^{cn}, n}, S_{2^{cn}, n})<2^{3 n^2}.$$ \end{theorem} \proof We begin with the simple observation that $r_3(S_{1,n}, S_{1,n}) < 1+r_2(n,n) < 4^n$. Indeed, if $r=1+r_2(n,n)$ and ${[r] \choose 3}$ is 2-colored by $\chi$ then we have an induced 2-coloring $\chi'$ of ${[r-1] \choose 2}$ where $\chi'(ij)=\chi(ijr)$. Because $r-1 = r_2(n,n)$ we have a monochromatic $n$-set under $\chi'$ and this yields a monochromatic $S_{1,n}$ under $\chi$ with $U=\{r\}$. Now we use a simple supersaturation trick to prove the result. Suppose that $N=2^{c' n^2}$ and $\chi$ is a 2-coloring of ${[N] \choose 3}$. For every $r$-set of $[N]$, where $r=4^n$, there is a monochromatic copy of $S_{1,n}$ in $\chi$. Hence the number of monochromatic copies of $S_{1,n}$ in $\chi$ is at least $$\frac{{N \choose r}}{{N-n-1 \choose r-n-1}} = \frac{(N)_{n+1}}{(r)_{n+1}}.$$ At least half of these monochromatic copies of $S_{1,n}$ have the same color, say blue. Now, to each of these blue copies of $S_{1,n}$ with parts $|U|=1$ and $|V|=n$, we associate the $n$-set $V$. A short calculation and the fact that $n$ is large shows that $$\frac{(N)_{n+1}}{(r)_{n+1}} > \left( \frac{ 2^c N e }{n} \right)^n > 2^{cn} {N \choose n}.$$ Consequently, by the pigeonhole principle, there are at least $2^{cn}$ blue copies of $S_{1,n}$ associated to the same $n$-set $V$. These blue copies together form a blue copy of $S_n$ as desired. \qed Erd\H os stated that an important and difficult problem is to decide if his result can be strengthened to imply all triples that meet both $U$ and $V$. \begin{definition} Let $B_n = (U,V,E)$ be the 3-graph with vertex set $U\cup V$, where $|U| = |V| = n$, such that $E(B_n) = \{(x,y,z): x,y \in U, z\in V \textnormal{ or } x,y \in V, z\in U\}$. \end{definition} Clearly we have $$2^{cn^2} < r_3(B_n,B_n) \leq r_3(n,n) \leq 2^{2^{c' n}}$$ where the lower bound follows from the probabilistic method. \begin{problem}[Erd\H os \cite{E90}] Improve the upper or lower bounds for $r_3(B_n, B_n)$. \end{problem}
\section{Introduction} One of the most stunning aspects of the natural world is the diversity of species present in most ecosystems. The community structure of ecosystems are shaped through a complex interplay of the externally supplied resources available in an ecosystem, competition for these resources, as well as stochasticity \cite{chesson2000mechanisms, tilman1982resource, vellend_conceptual_2010, hubbell_unified_2001}. A fundamental problem in community ecology is to understand how these processes give rise to observed pattern of species abundances. A rich theoretical framework has been developed to address this problem. Niche-based theories have emphasized the role of competition for resources \cite{hardin_competitive_1960, macarthur1967limiting,macarthur1970species, chesson_macarthurs_1990, tilman1982resource, chase_ecological_2003, letten2017linking}, while neutral theory has highlighted the role of stochastic effects \cite{hubbell_unified_2001, volkov_neutral_2003, rosindell_unified_2011, rosindell_case_2012}, and several works have investigated the interplay between stochasticity and competition \cite{chisholm2011theory, fisher2014transition, jeraldo2012quantification, tilman_niche_2004, gravel_reconciling_2006}. Many of these theoretical insights have been synthesized in what is commonly referred to as contemporary niche theory. Contemporary niche theory highlights the role played by equalizing mechanisms, processes that decrease fitness differences between organisms, and stabilizing mechanisms, processes that decrease competition for resources. These basic organizational schema have been successfully applied to understand community structure in a wide range of settings \cite{chesson2000mechanisms, tilman1982resource, vellend_conceptual_2010}. One of the simplest and most influential mathematical models for niche theory is MacArthur's consumer resource model (MCRM) \cite{macarthur1970species, chesson_macarthurs_1990, tilman1982resource, letten2017linking}. Most analysis of MCRM -- including those that inform contemporary niche theory and modern coexistence theory -- have focused on small ecosystems with a few species and and few resources \cite{macarthur1970species, chesson_macarthurs_1990, tilman1982resource, letten2017linking}. However, it is unclear to what extent the theoretical insights derived from ecosystems with just a few species can be scaled up to diverse, natural ecosystems. One of the defining features of large complex systems is that they often display new ``emergent behaviors'' that cannot be understood or deduced from analyzing small systems with just a few parts \cite{anderson1972more, levin1992problem, levins1966strategy, levins1985dialectical}. For this reason, it is essential to directly analyze large ecosystems with many resources and species and ask how they differ from the few-species ecosystems that have been analyzed previously. Recently, several works suggest that large ecosystems can exhibit unexpected behaviors such as phase transitions, emergent community-level cohesion, and the analogues of critical points \cite{fisher2014transition, dickens2016analytically, tikhonov2017collective, kessler2015generalized, tikhonov2016community, bunin2016interaction}. This highlights the need for new theoretical frameworks for directly analyzing large, heterogeneous ecosystems. Perhaps the most successful and ubiquitous approaches for analyzing large systems in statistical physics is mean field theory. We emphasize that what is meant by a mean field theories in statistical physics is distinct from the way it is commonly understood in ecology \cite{kadanoff_statistical_2000, violle2012return}. Unlike most usages in ecology, mean field theories in physics account for not only the means of various quantities but also fluctuations around the mean. In this paper, whenever we use the term mean field theory, we will mean it in this broader statistical physics definition rather than the narrow usage common in ecology. Mean field models have long history in statistical physics and have played a central role in the study of phase transitions and collective emergent behaviors in physical systems \cite{kadanoff2000statistical, landau1980statistical}. Most mean field theories in physics focus on homogenous systems with identical components and couplings. However, more sophisticated variants such as the cavity method can be used to analyze heterogeneous ``disordered systems'' \cite{opper2001advanced}. Here, we develop a statistical physics inspired mean field theory, based on a generalization of the cavity method, and use it to analyze diverse ecosystems. In this paper, we will refer to this as the cavity theory (CT). Our methods are inspired by and build upon recent work showing the connection between community ecology the physics of disordered systems \cite{diederich1989replicators, eissfeller1992new,rieger1989solvable,tokita2004species, fisher2014transition, dickens2016analytically, tikhonov2017collective, bunin2016interaction,barbier2017generic, yoshino2007statistical}. It is also closely related to the statistical mechanics of interacting socio-economic agents \cite{de2006statistical}. However, unlike these previous works our analysis explicitly incorporates resource dynamics, including resource heterogeneity and depletion. This allows us to naturally connect our results to contemporary niche theory and modern coexistence theory. One of the most striking aspects of our analysis is that we find that environmental engineering is a generic feature of all diverse ecosystems \cite{erwin2008macroevolution}. In diverse ecosystems, organisms can and do significantly reshape their environments by changing resource abundances and, importantly, depleting resources. Moreover, we show that many of the central theoretical quantities in our novel CT have natural ecological interpretations that generalize many classical quantities and results of niche theory to large ecosystems and quantify the role of environmental engineering in shaping community structure. \begin{figure}[t] \includegraphics[width=1.0\columnwidth]{cavity-schematic.pdf} \caption{{\bf Analyzing MacArthur Consumer's Resource Model for large, diverse ecosystems.} (Top) The growth rate for a species $i$ is a sum of terms resulting from consuming $M \gg 1$ resources. For this reason, from the central limit theorem, it can be well modeled by a (truncated) normally distributed variable. (Bottom) Each resource $\alpha$ is consumed by $S \gg 1$ consumers. From the central limit theorem, the effective carrying capacity of the resource (i.e. the resource abundance at steady-state) can also be modeled using a (truncated) normal distribution. The truncation is due to the fact that neither species nor resource abundances can become negative. To derive our analytic cavity equations, we require self-consistency for the means and variance of these distributions. } \end{figure} \section{MacArthur consumer resource model} In this work, we will analyze one of the canonical and most influential models in community ecology: MacArthur's Consumer Resource Model (MCRM) \cite{macarthur1970species, chesson_macarthurs_1990}. MCRM consists of $S$ species or consumers with abundances $N_i$ ($i=1 \ldots S$) that can consume one of $M$ substitutable resources with abundances $R_\alpha$ ($\alpha=1 \ldots M$). The consumer preferences of species $i$ for resource $\alpha$ are encoded by a $S \times M$ matrix, $c_{i \alpha}$. In the MCRM, the growth rate $g_i(\mathbf{R})$ of a species depends of the concentration of all the resources. To model the growth rate, following MacArthur, we assume that a species $i$ have some minimum maintenance cost, $m_i$, that they must meet. The growth rate, $g_i(\mathbf{R})$, is proportional to amount of resources consumed, weighted by a quality factor $w_\alpha$, minus this maintenance cost \begin{equation} g_i(\mathbf{R})= \sum_\alpha c_{i \alpha} w_\alpha R_\alpha -m_i. \label{Eq:growth_rate} \end{equation} If $g_i>0$, then this is also the growth rate of species $i$. The resources have their own internal dynamics which, following MacArthur, we assume can be modeled using logistic growth. Furthermore, when a resource is consumed, it's abundance is reduced. This ecological dynamics is captured by the following coupled, nonlinear differential equations \bea {dN_i \over dt} &=& N_i g_i(\mathbf{R}) \nonumber \\ {dR_{\alpha} \over dt}&=& F_\alpha (R_\alpha) - \sum_i N_i c_{i \alpha} R_\alpha, \label{Eq:MCRM-original} \eea where $F_\alpha(R_\alpha)=R_\alpha(K_\alpha -R_\alpha) $ describes the resource dynamics in the absences of consumption and $K_\alpha$ is the carrying capacity of each resource $\alpha$. In our model, both the species and resource abundances $N_i$ and $R_\alpha$ must be strictly positive. For our analysis, it will be useful to define an ``effective resource capacity'' \begin{equation} K_\alpha^{eff} (\mathbf{N}) =K_\alpha - \sum_i N_i c_{i \alpha} \label{Eq:Keff} \end{equation} that accounts for depletion of resources by consumers \cite{dickens2016analytically}. The MCRM can be rewritten in terms of $K_\alpha^{eff} (\mathbf{N})$ as \bea {dN_i \over dt} &=& N_i g_i(\mathbf{R}) \nonumber \\ {dR_{\alpha} \over dt}&=& R_\alpha(K_{\alpha}^{eff}(\mathbf{N}) -R_\alpha) \label{Eq:MCRM} \eea A crucial property of these equations is that resources can be completely depleted from the environment. This will play an important role in what follows. Finally, we emphasize that these equations are identical those analyzed by MacArthur, Chesson, and others in deriving modern niche theory. \section{ Statistical mechanics approach to MacArthur's Consumer Resource Model} \begin{figure}[t!] \includegraphics[width=1.0\columnwidth]{Figure2-combined-p.pdf} \caption{{\bf Comparison of numerical simulations with theory}. Ecosystems were simulated with the consumption coefficients $c_{i \alpha}=0,1$ drawn from a Bernoulli distribution with probability $p$ (black lines) or a Gaussian distribution with same mean and variance as the binomial distribution (red line). Here $S = M = 30$, $K=1$, $\sigma_K=1$, $m=1$, $\sigma_m=.1$, and 250 trials were used in these simulations: the error bars denote $\pm 2 $ standard deviations. The $K_a$ and $m_i$ were drawn iid from a gamma distribution in the binomial plot to ensure non-negativity of the parameters, and a Gaussian distribution in the Gaussian approximation plot. The numerical results were compared to theoretical predictions from the self-consistent cavity equations for ecologically stable steady-states (green circles). (A) Fraction of species that survive $\phi_N$, (B) fraction of resources that are not depleted $\phi_R$, (C) average abundance of all species $\< N\>$, (D) average abundance of all resources $\<R\>$ as a function of the probability $p$. (E) Mean-abundance of surviving species $\< N\>/\phi_N$ and (F) mean-abundance of surviving resources $\<R\>/\phi_R$.} \label{CT-numeric1} \end{figure} Previous approaches to analyzing the MCRM have largely been confined to small ecosystems with a few species and resources. Here, we consider the opposite limit of large, diverse ecosystems where both the number of species and number of resources is large, $S, M \gg 1$. In this limit, the number of parameters needed to define the ecosystem dynamics becomes extremely large. To overcome this problem, we follow a long tradition in theoretical ecology pioneered by Robert May of looking at the case where the parameters are drawn from a random distribution \cite{may_will_1972}. This allows us to ask questions about the behavior of a generic, diverse ecosystem. We consider the case where all the consumption coefficients $c_{i\alpha}$, resource carrying capacities $K_\alpha$, and maintenance costs $m_i$ are drawn from a random distribution. Our analytic calculations depend only on the mean and variances of the probability distributions. Denoting the expectation value of a parameters $x$ over a distribution by $\<x\>$, then we denote the mean and variances of our parameters by: $\< c_{i \alpha}\> = \mu_c /S$ , $\< (c_{i \alpha} -\<c_{i \alpha}\>)^2\> = \sigma_c^2 /S$, $\<m_i\>=m$, $\<( m_i -\<m\>)^2\>=\sigma_m^2$, $\<K_\alpha \>=K$, and $\<(K_\alpha-\<K_\alpha\>)^2\>=\sigma_K^2$. We can also define a parameter $\gamma=M/S$ that measures the ratio of resources to species. \subsection{Invasion, ecological stability, and self-consistency} One of the cornerstones of community ecology is the idea of invasion \cite{macarthur1967limiting,shea2002community, tilman_resource_1982}. In our analysis, we will ask under what circumstances a new species can invade an ecosystem. Denote the growth rate of species $i$ when it tries to invade the ecosystem $g_i^{inv}$. We will call this the invasion growth rate. Since we are interested in statistical properties, we will be primarily concerned with the mean and variances of the invasion growth rate averaged over all species $i$ in the regional species pool: $\< g_i^{inv}\>=g$ and $\<(g_i^{inv})^2\>-\<g_i^{inv}\>^2=\sigma_g^2$. The key idea that we will exploit in our analysis is the observation that as $S$ and $M$ get large, both the invasion growth rates, $g_i^{inv}$, and the effective carrying capacities, $K_{\alpha}^{eff}$ are the sum of a large number of small terms. Each individual resource makes only a small contribution (of order $1/M$) to the growth of any consumer, and every consumer makes an order $1/S$ contribution to the effective resource capacity. Thus, from the central limit theorem, the distribution of growth rates $g_i^{inv}$ and the distribution of effective resources $K_{\alpha}^{eff}$ in the ecosystem can be well-approximated by a normal distribution. In the language of the cavity method of statistical physics, this corresponds to the replica symmetric solution. For future reference, denote the means and variance of the effective carrying capacity by $\<K_{\alpha}^{eff}\>=K^{eff}$ and $\<(K_{\alpha}^{eff})^2\>-\<K_{\alpha}^{eff}\>^2= \sigma_{K^{eff}}^2$ (see Figure 1). This suggests the following intuition for thinking about our ecosystem. Each species, $i$, has a invasion growth rate drawn from a normal distribution. In other words, we can think of $g_i^{inv} \approx g + \sigma_g z_i$, where $z_i$ is a standard normal variable. Similarly, each resource has an effective carrying capacity that is also drawn from a normal distribution, with $K_\alpha^{eff}\approx K^{eff} + \sigma_K \tilde{z}_\alpha$, with $\tilde{z}_\alpha$ a standard, normal variable. In general, the means and variances ($g, K^{eff}, \sigma_g^2, \sigma_{K^{eff}}^2$) depend on the abundances of all other species and resources. Our statistical mechanics inspired mean field approach exploits this observation to self-consistently solve for the means and variances of the invasion growth rate and effective resource carrying capacity. In the physics literature, these is known as cavity theory (CT). In general, this is a very subtle calculation but can be done using a generalized cavity equation (see below and in appendix). In order to derive the CT self-consistency equations, we consider a system with $S$ species and $M$ resources and ask what happens when we add an additional species and resource to the system. We denote the abundances of the additional species and resource by $N_0$ and $R_0$ respectively. This two-step cavity where both a resource and species is removed is similar to the procedure employed to analyze the Hopfield model and compressed sensing \cite{shamir2000thouless, ramezanali2015critical} and is necessary to correctly capture subtle correlations between resource and species dynamics due to environmental engineering. This approach is intimately related to classic works by MacArthur and Levins that analyzed ecological dynamics by asking if a new species could invade an ecosystem \cite{macarthur1967limiting}. Whereas their analysis was applicable to small ecosystems with a few species, our analysis is valid for large, diverse ecosystems. Since the number of species and resources in the original ecosystem is large ($S,M \gg 1$), the addition of the new resource and consumer represent a small perturbation of the original system. For this reason, it is useful to define two susceptibilities, $\chi$ and $\nu$ that measure the sensitivity of an ecosystem to small perturbations. The resource susceptibility, $\chi$, measures the average change in the mean resource abundance at steady-state if we slightly increase the supply of all the externally supplied resources. Denoting the steady-state value of a quantity $X$ by $\bar{X}$, we can mathematically define $\chi$, as \begin{equation} \chi = {1 \over M} \sum_\alpha {\partial \bar{R}_\alpha \over \partial K_\alpha}. \end{equation} The average species-cost susceptibility, $\nu$, measures the change in mean species abundances if we slightly decrease the minimum fitness cost (or equivalently increase the growth rate), \begin{equation} \nu={1 \over S} \sum_i {\partial \bar{N}_i \over \partial g_i} = -{1 \over S} \sum_i {\partial \bar{N}_i \over \partial m_i}. \end{equation} These susceptibilities characterize the sensitivity of an ecosystem to perturbations and can be directly measured in experiments. In terms of these quantities, one can derive a simple expression for the steady-state abundances of newly added consumer and resource (see Appendix): \bea \bar{N}_0 &=& { \max \left[ 0, {g + \sigma_g {z}_0 }\right] \over \gamma \sigma_c^2 \chi}, \nonumber \\ \bar{R}_0 &=& { \max \left[0, K^{eff}+ \sigma_{K^{eff}}^2 \tilde{z}_0\right ] \over 1-\sigma_c^2 \nu}, \label{EqNRmain} \eea where as above $z_0$ and $\tilde{z}_0$ are independent, unit normal variables. These equations have a beautiful and straightforward interpretation. A new species added to the system will have an invasion growth rate $g_0^{inv}=g + \sigma_g {z}_0 $, which is normally distributed. If the growth rate is negative, it will not be able to invade the system and go extinct. If its growth rate is positive when introduced in the ecosystem, then it survives with an abundance proportional to its invasion growth rate. We emphasize that this proportionality constant can differ significantly from what would be expected in a single-species ecosystem and depends on all the other resources and species present in the ecosystem through the susceptibility $\chi$ and the variance of the consumption coefficients $\sigma_c^2$. For this reason, the invasion growth rate of a species when it invades an ecosystem is positively correlated with its abundance. Similarly, the new resource is depleted if its effective carrying capacity is negative. Otherwise the steady-state abundance of the new resource is proportional to its effective carrying capacity. These equations are similar to the arguments of MacArthur and Levins on the necessary conditions for invasibility to large ecosystems \cite{macarthur1967limiting}. They also generalize results for species abundances derived in \cite{bunin2016interaction} using the Lotka-Volterra equation and the results in \cite{ de2006statistical, yoshino2007statistical, tikhonov2017collective} which ignored resource depletion and resource fluctuations. \subsection{Comparison with numerics} Unlike small ecosystems, we cannot analytically solve for the all the resource and species abundances. However, we can take a statistical approach that allows us to calculate statistical properties of species and resource abundances at steady-state. We also restrict our analysis to uninvadable steady-states, defined as a steady-state which cannot be invaded by any species. This, both simplifies the mathematics, and allows us to more directly relate our calculations to ecology. Using (\ref{EqNRmain}) is it possible to derive self-consistency equations for the fraction of species in the regional species pool that survive, $\phi_N$, the mean abundance of the species $\<N\>=1/S \sum_i N_i$, and variance and second moment of surviving species abundances, $\<(\delta N)^2\>$ and $q_N= \<(\delta N)^2\>+ \<N\>^2= 1/S \sum_i N_i^2 $ respectively. We can also calculate the analogous equations for resources: the fraction of resources with non-zero abundance, $\phi_R$, the mean abundance of resources $\<R\> = 1/M \sum_\alpha R_\alpha$, and variance and second moment of the resource abundances, $\<(\delta R)^2\>$ and $q_R= \<(\delta R)^2\>+ \<R\>^2 = 1/M \sum_{\alpha} R_\alpha^2$. The equations are derived in Appendix \ref{sec:self-con} and can be solved numerically. To check the accuracy of our CT, we compared our analytic predictions to numerical simulations (see Figure \ref{CT-numeric1}). We simulated (\ref{Eq:MCRM-original}) for two different choices of distributions for the $c_{i \alpha}$. In the first set of simulation, the $c_{i \alpha}$ were binary random variables with $c_{i \alpha}=1$ with probability $p$ and $c_{i \alpha}=0$ with probability $1-p$. The probability $p$ can be viewed as the level of generalism in the regional species pool. As $p \rightarrow 0$, all organisms in the community are specialist and consume a handful of resources. When $p \rightarrow1$, the community consists of generalists who can consume almost all resources. In the second set of simulations, we drew the consumption coefficients from a Gaussian distribution with the same mean and variance as the corresponding Bernoulli distribution with probability $p$. As shown in Fig. \ref{CT-numeric1}, our analytic results agree remarkably well with numerical simulations. The agreement between theory and numerics is nearly exact when $c_{i \alpha}$ are drawn from a Gaussian and shows qualitative agreement even when the consumption coefficients $c_{i \alpha}$ are binary random variables. This is a result of the Gaussianity assumptions used to derive the cavity equations (see Appendix). The discrepancy between the binary case and Gaussian case stems from the fact that the for large $S$ and $M$ the $c_{i \alpha}$ are strictly positive for the binary case but generically contain some negative elements for Gaussian distributions. A negative $c_{i \alpha}$ implies that species $i$ produces resource $\alpha$ at a fitness cost to itself. Thus, all simulations with Gaussian include a small fraction of public good producers that are accounted for in our theoretical calculations but are absent in the simulations with binary variables. Despite these differences, for both choice of distributions the fraction of surviving species declines with increasing $p$. This is consistent with the basic idea of niche-theory that as $p$ increases, there is increased competition resulting in greater competitive exclusion. In contrast, the mean abundances of surviving species and resources shows a non-monotonic behavior as a function of $p$ in both numerical simulations and analytics (see appendix and Fig. \ref{fig:app_gauss_crm} for additional simulation results). \begin{figure}[t!] \includegraphics[width=1.0\columnwidth]{heatmap_final.pdf} \caption{{\bf Co-existence and diversity.} Here we use the same parameters as in the previous plot, apart from allowing $\sigma_m$ to vary, and show the cavity prediction of the fraction of surviving species $\phi_N$ as a function of $p$ and the standard deviation over mean $\sigma_m/m$ of the maintenance costs $m_i$ of species. In this regime increasing $p$ leads to more similar species by increasing the niche overlap $\rho$ as defined in \eqref{Eq:nicheoverlap} from $\rho \approx .77$ to $\rho \approx .99$ in the range shown above. As predicted by niche theories, increasing $\rho$ leads to increased competition and a smaller $\phi_N$ while decreasing $\sigma_m/m_i$ leads to larger fraction of species surviving at a fixed $p$. } \label{niche-phasediagram} \end{figure} \section{Generalizing niche theory to large ecosystems} The MacArthur consumer resource model has played a central role in the development of niche-based theories of community assembly \cite{macarthur1970species, chesson_macarthurs_1990, tilman1982resource, chase_ecological_2003, letten2017linking}. However, most of these analyses have focused on small ecosystems with just a few species and resources. Here, we discuss the ecological implications of our analysis for understanding community assembly in large ecosystems with many species and resources. \subsection{Relating MCRM parameters to ecology} We begin by relating the parameters of the MCRM to more ecologically meaningful quantities such as the niche overlap, fitness, zero net- growth isoclines (ZNGI), and impact vectors. In ecology, the niche overlap, $\rho$, measures how much two species compete for the same resources. The larger the niche overlap, the more species compete. For small ecosystems, the niche overlap is bounded between $0$ and $1$, with a niche overlap of zero meaning the species do not compete for resources and a niche overlap of one indicating the species have identical consumption profiles. In the context of the two species MacArthur resource model, the niche-overlap between species can be thought of as the percentage of variance explained if one performs a regression of the first consumer's consumption vector against the consumption vector of the second species\cite{macarthur1970species, chesson_macarthurs_1990, chesson2000mechanisms}. Using this observation, we can naturally extend the idea of niche overlap to entire ecosystems by defining an ecosystem-level niche overlap $\rho$ in terms of the mean and variances of the consumption coefficients $c_{i \alpha}$: \begin{equation} \rho = { \mu_c ^2 \over {\mu_c^2 +\sigma_c^2}}. \label{Eq:nicheoverlap} \end{equation} One useful way of thinking about $\rho$ is that it measures the niche-overlap between two species randomly drawn from the regional species pool. It is easy to see that when $\sigma_c^2 \ll \mu_c$, all species have nearly identical consumption preferences and $\rho \rightarrow 1$. In contrast when $\sigma_c^2 \gg \mu_c$, species will have very distinct consumer preferences and $\rho \rightarrow 0$. Another fundamental quantity in contemporary niche theory is the ecological fitness of an organism, $f_i= \sum_{\alpha} c_{i \alpha} K_\alpha -m_i$ \cite{chesson_macarthurs_1990, chesson2000mechanisms}. This fitness is the initial growth rate of organism $i$ in the \emph{absence} of other species. In general, the actual growth rate of a species will differ significantly from the fitness if the resource abundances differ significantly from the resource carrying capacities $K_\alpha$. For this reason, we will refer to this as the ``naive'' fitness. We show in the appendix that it is also possible to relate our parameters directly to ZGNIs and generalized impact vectors. \subsection{ Niche overlap and coexistence} One of the fundamental results of niche-based theories is that as the niche-overlap between species increases, co-existence become more and more difficult \cite{chesson2000mechanisms}. The underlying reason for this is species that have similar consumer preference are more likely to compete with each other, resulting in competitive exclusion. Thus, increasing the niche-overlap in the community should decrease the fraction of species $\phi_N$ that can co-exist in a community. On the other hand, stabilizing mechanisms that decrease the fitness differences between species should increase coexistence. We can parameterize the fitness differences in the community by the dimensionless quantity $\sigma_m/m$ equal to the standard deviation over the mean of the maintenance costs $m_i$ over all species in the regional species pool. This choice of parameterization is in line with contemporary niche theory where fitness differences are defined as the difference in growth rates when species have identical consumption preferences \cite{chesson2000mechanisms}. Figure \ref{niche-phasediagram} shows $\phi_N$ as a function of the niche overlap $\rho$ and $\sigma_m^2/m$. This choice of niche-overlap corresponds to varying the probability $p$ for having a non-zero $c_{i \alpha}$ from $0.1$ to $0.9$ (see Fig. \ref{CT-numeric1}). As predicted by niche theories, increasing $\rho$ leads to increased competition and a smaller $\phi_N$. In constrast decreasing $\sigma_m/m_i$ at a fixed $\rho$, leads to a larger fraction of species surviving. Thus, in this regard large ecosystems behave quite similarly to predictions made by analyzing smaller models. \begin{figure} \includegraphics[width=1.0\linewidth]{N_vs_f_R_vs_K_combined_fcorrected2.pdf} \caption{{\bf Measuring the effect of environmental engineering} (A) Steady-state abundance $\bar{N}_i$ versus the fitness $f_i=\sum_{\alpha}c_{i \alpha}\max\{K_\alpha,0\} -m_i$ for each species $i$ . Fitness is defined as the initial growth rate of species $i$ in the environment in the absence of all other species. Points colored black are species with positive fitness that go extinct in the community ($f_i>0$, $\bar{N}_i=0$). (B) Comparison of the steady state resource levels $\bar{R}_\alpha$ with their capacity $K_\alpha$. The filled circles are generated from simulations with M = S = 30 resources and species, the data is generated from 50 separate trials. Parameters for simulations as in Figure \ref{CT-numeric1} with $p=0.1$ and $\sigma_m/m=0.1$.. Black points indicate resources which have a positive capacity but go extinct in the community. The difference between plots for (A,B) and (C,D) is that in the former $K_\alpha$ and $m_i$ are always positive because they are drawn from a gamma distribution and Bernoulli distribution respectively. In (C,D), each of these parameters is drawn from a Gaussian distribution with the same mean and variance as in (A,B). This means that a small fraction of the $K_\alpha, m_i$, and $c_{i\alpha}$ are negative. Negative $c_{i \alpha}$ corresponds to production of resource $\alpha$ by species $i$ at a fitness cost to itself (i.e. public good production). In (C,D), red points indicate species with negative fitness that can stably exist in the community ($f_i <0$, $\bar{N}_i>0$) or resources with negative $K_\alpha$ that are produced by the ecosystem. Contours show theoretical predictions of our CT for correlation between $\bar{N}_i$ and $f_i$ as well as $\bar{R}_\alpha$ and $K_\alpha$ (see Appendix \ref{sec:f_N_thy} for details). Each contour represents half a standard deviation of our theory.} \label{fig:Nversusf} \end{figure} \subsection{Resource depletion and environmental engineering} One ubiquitous feature of our analysis that is often absent in smaller ecosystems is the large scale depletion of resources. As shown in Fig. \ref{CT-numeric1}, species can significantly change the resource profile and deplete a large fraction of resources initially present in the environment. This environmental engineering can change which species survive and thrive in an environment. One way to measure the effect of environmental engineering and the reshaping of the resource profile is to measure the correlation between the naive fitness of an organism, $f_i= \sum_{\alpha} c_{i \alpha} \max \{K_\alpha, 0\} -m_i$, and its steady-state abundance in the ecosystem $\overline{N}_i$. The fitness $f_i$ measures the growth rate of organism $i$ if it is introduced into an environment in the absence of other species. For this reason, we expect $f_i$ to be highly predictive of $\overline{N}_i$ when resource abundance profiles are not significantly perturbed by consumption. On the other hand, in the presence of significant environmental engineering, we expect the correlation between $f_i$ and $\overline{N}_i$ to decrease significantly. Fig. \ref{fig:Nversusf} shows $f_i$ versus $\bar{N}_i$ for numerical simulations where the $c_{i \alpha}$ drawn from a binomial distribution with $p=0.1$ and $\sigma_m/m=0.1$, as well as the case where parameters are Gaussian random variables with mean an variance matching the binomial setting. From the figure, it is clear there is a significant correlation between $f_i$ and $\bar{N}_i$. Organisms with higher fitness disproportionately survive in the ecosystem. However, a significant number of organisms that have a high naive fitness $f_i$ can still go extinct in the ecosystem (black points). The difference between plots (A,B) and (C,D) is that in the former $K_\alpha$ and $m_i$ are kept positive by ensuring they are drawn from a gamma distribution and the consumer preferences $c_{i \alpha}$ are always positive since they are binary ($1$ with probability $p$ or $0$ otherwise). In (C,D), each of these parameters is drawn from a Gaussian distribution, but with the same mean and variance as in (A,B). This allows $K_\alpha$, $m_i$, and $c_{i \alpha}$ to be negative. A negative $c_{i \alpha}$ means that species $i$ produces resource $\alpha$ at fitness expense to itself (i.e. public good production). As expected, this results in much more environmental engineering than the case where the $c_{i \alpha}$ are strictly positive. In C, red points indicate species with negative fitness that can stably exist in the community by utilizing public goods ($f_i <0$, $\bar{N}_i>0$). In D, red points correspond to resources with a negative capacity which end up in the environment due to public good production by high abundance species. Conversely, species that cannot survive in the environment in the absence of other species can fixate due to environmental engineering (red points). Importantly, this emergent environmental engineering is a collective property of the whole ecosystem and results from a complex interplay between organisms and environment. These simulations demonstrate how environmental engineering can dramatically modify community structure. Additionally, Fig. \ref{fig:Nversusf} shows predictions from our CT for the correlation between $f_i$ and $\overline{N}_i$. Within our replica-symmetric ansatz, these correlations are described by normal distributions whose variances and covariances can be calculated using our self-consistent equations. The contour lines represent half a standard deviation spread of our normal distribution. Our theory qualitatively captures the shape of the correlation between $f_i$ and $\overline{N}_i$. We give explicit expression for these correlations as well as the mutual information between species abundances and naive fitness in Appendix \ref{sec:f_N_thy}. \section{Discussion} Niche-based theories have played a fundamental role in shaping our understanding of community assembly and community ecology. In this work, we use ideas and methods from statistical physics to analyze a canonical model in community ecology, MacArthur's Consumer Resource Model (MCRM). Unlike previous works, our statistical physics inspired approach allows us to analyze large ecosystems with many species and resources. Our results suggest that organisms can significantly perturb their environments. The abundance of resources can be significantly altered and resource can even be completely depleted. We find that such niche-construction and environmental engineering is a generic feature of MCRM. This suggests that in complex ecosystems, organisms actively construct their environment. To quote Levins and Lewontin, ``they are not the passive objects of external forces, but creators and modulators of these forces" \cite{levins1985dialectical}. The effects of environmental engineering are even more dramatic when consumers can produce public goods at a fitness cost to themselves. In this case, species and resources that could not survive in isolation can fixate in the ecosystem. To carry out our analysis, we developed a sophisticated theory based on the cavity method. One of the most striking things about our analysis is that many physical quantities that appear in the ``cavity equations'' have natural ecological interpretations in terms of invasion growth rates and effective carrying capacities. The underlying reason for this is that the cavity methods is based on asking how ecosystems are perturbed when a new species and a new resource are introduced into the ecosystem. Conceptually, this is very similar in spirit to many classical arguments in community ecology pioneered by Levins and MacArthur that ask whether a new species can invade \cite{macarthur1967limiting, tilman1982resource}. This naturally allows us to generalize many of the results from niche-based theories to large, diverse ecosystems. However, the price we pay for using our cavity approach is that we are limited to making statistical predictions. An important question for future investigation is to ask how our results change if we make the model more realistic. In the MCRM, all species are assumed to have a linear, Type I functional response. It will be interesting to generalize our model to non-linear functional responses. We have also neglected the effects of environmental and demographic stochasticity. Stochasticity can induce phases transitions in ecosystems from a niche-like phase where competitive effects dominate community assembly to an ecologically neutral-like phase where stochasticity is the primary determinant of community structure \cite{fisher2014transition,dickens2016analytically}. It will be interesting to see if the techniques developed here can be generalized to this more complicated setting. Finally, we have assumed that our population can be modeled as a well-mixed community. However, spatial effects can qualitatively change the behavior of cellular populations \cite{korolev2010genetic,loreau1998biodiversity} and are likely to play an important role in community assembly. \section{Acknowledgements} We would like to thank Josh Goldford, Kirill Korolev, Seppe Kuehn, Alvaro Sanchez, Daniel Segr\`{e}, Cui Wenping for many useful discussions. PM was supported by NIH NIGMS grant 1R35GM119461, a Simons Investigator award in the Mathematical Modeling of Living Systems (MMLS), and a Scialog grant from the Simons Foundation and Research Corporation. MA was supported by the Swartz Program in Theoretical Neuroscience at Harvard.
\section{The PyBE\xspace Algorithm} \label{sec:algorithm} \vspace{-0.5em} This section describes our algorithm for predicting policy decisions, and the active learning approach. As stated previously, distance between policy examples is the distance between their scenarios, and policy decisions are the labels for the scenarios. Our policy scenarios are Boolean functions over $n$ variables (i.e., tags), denoted by ${\cal B}_n$. However, we restrict our attention to functions that are conjunctions of variables (e.g. $x_1 \wedge x_3 \wedge x_5$). Such a function $f$ can be represented as a set $I(f) \subseteq \{ 1,2,\cdots,n \}$ (e.g., if $f = x_1 \wedge x_3 \wedge x_5$, then $I(f) = \{ 1,3,5 \}$). Our policy scenarios belong to this restricted class (denoted by ${\cal P}_n$). We had two requirements for the learning-algorithm to infer policy decisions: {\sf (I):} non-parametric (does not rely on models with a fixed set of parameters). {\sf (II):} easy explanation (easy to present to the user how the policy was inferred). For this reason we chose a variant of the {\it $k$ nearest neighbor (kNN)} classifier~\cite{mur12}. A kNN algorithm simply ``looks at'' the $k$ points in the training set that are nearest to the test input $x$, counts how many members of each class are in the set, and returns that empirical fraction as the estimate. Recall that our goal is to label a policy scenario $p \in {\cal P}_n$ with the decision $1$ (i.e., {\sf allow}) or $0$ (i.e., {\sf deny}). We are also given a set of policy scenarios along with known labels (i.e., policy decisions). Our algorithm is inspired by the kNN algorithm and works as follows: given a new policy scenario $p \in {\cal P}_n$ with an unknown label, we find the set of $k$ policy scenarios $N(p) \; = \; \{ p_1,\cdots,p_k \}$ {\em closest} to $p$ according to the metric $\mu$ (described in the next subsection) and then associate the label to $p$ that corresponds to the majority labels of the policy scenarios in $N(p)$. Our variant of kNN only considers scenarios at the closest distance for inclusion in $N(p)$. We describe how to address situations with no majority in Section~\ref{sec:no-majority}. We use active learning to assist the user in correcting potential labeling errors in the user's policy examples. When we find that certain conditions are not true (e.g., the label of a policy scenario $q \in {\cal P}_n$ is different from the majority label among its neighbors $N(q)$), we recommend a change in the label~(e.g.,~change {\sf allow} to {\sf deny}). We now describe our metric $\mu$, its weighted form $\mu_w$, and the active learning phase. We design a new metric as integrating weights into existing metrics (e.g., jaccard distance) may incur significant re-engineering. \vspace{-1em} \subsection{The Metric} \label{sec:metric} \vspace{-0.5em} Let $f$ and $g$ be two Boolean functions over $n$ variables $x_1,x_2,\cdots,x_n$. A metric between $f$ and $g$ (denoted by $\mu(f,g)$) can be defined as follows:\\ \vspace{-1em} \[ 1 - \frac{\sharp ( f \oplus g )}{2^n} \vspace{-0.5em} \] Where $\oplus$ represents exclusive-or and $\sharp (h)$ is the number of satisfying assignments of the Boolean function $h$. Recall that computing the number of satisfying assignments of a Boolean function is a hard problem ($\sharp$-P complete~\cite{ab09}). However, for our special case where scenarios are conjunctions of variables, this metric is easy to compute. Next, we describe the metric for the functions in the set ${\cal P}_n$. Consider two functions $f_1$ and $f_2$. Let $[n] = \{1,2,\cdots,n\}$. Consider three sets of indices $I_{1,2}$ (variables neither in $f_1$ nor $f_2$), $I^1_2$ (variables in $f_1$ but not in $f_2$) and $I^2_1$ (variables in $f_2$ but not in $f_1$); i.e., $I_{1,2} = [n] \setminus (I(f_1) \cup I(f_2))$, $I^1_2 = I(f_1) \setminus I(f_2)$, and $I^2_1 = I(f_2) \setminus I(f_1)$. An assignment $\sigma$ is a Boolean vector of size $n$ of the form $\langle b_1,b_2,\cdots,b_n \rangle$ and $f(\sigma)$ denotes the value of the function $f$ for assignment $\sigma$. Consider an assignment $\sigma \; = \; \langle b_1,b_2,\cdots,b_n \rangle$ such that $f_1(\sigma) = 1$ and $f_2 (\sigma) = 0$. Then for all $i \in I(f_1)$, $b_i = 1$, and there should be at least one $i \in I^2_1$ such that $b_i = 0$. For $i \in I_{1,2}$, $b_i$ can assume any value. Consider all the indices in $I^2_1$. There should be at least one $j \in I^2_1$, such that $b_j = 0$ (we want $f_2 (\sigma) = 0$). Therefore, the number of satisfying assignments $\sigma$, such that $f_1(\sigma) = 1$ and $f_2 (\sigma) = 0$ is \vspace{-1em} \[ 2^{k_{1,2}} (2^{k_2} - 1) \vspace{-0.5em} \] where $k_{1,2} = |I_{1,2}|$ and $k_2 = |I^2_1|$. Explanation for the formula is as follows: all variables with indices in the set $I_{1,2}$ can be given any value (resulting in the term $2^{k_{1,2}}$). All the variables with indices in $I^2_1$ can be given any values as long as one of them is $0$, so an assignment where all variables with indices in $I^2_1$ is assigned $1$ is excluded (this results in the term $2^{k_2}-1$). A symmetric argument shows that the number of satisfying assignments $\sigma$ such that $f_1 (\sigma)=0$ and $f_2 (\sigma)=1$ is \vspace{-1em} \[ 2^{k_{1,2}} (2^{k_1} - 1) \vspace{-0.5em} \] where $k_{1,2} = |I_{1,2}|$ and $k_1 = |I^1_2|$. Adding the two terms, we have that $\sharp (f_1 \oplus f_2)$ is $2^{k_{1,2}} (2^{k_1}+2^{k_2}-2)$. Therefore, the metric $\mu (f_1,f_2)$ in this case is: \[ 1 - \frac{2^{k_{1,2}} (2^{k_1}+2^{k_2}-2)}{2^n} \vspace{-0.5em} \] where $k_{1,2} = |I_{1,2}|$, $k_1 = |I^1_2|$, and $k_2 = |I^2_1|$. Intuitively, $k_1$ is the number of variables that appear in $f_1$ but not in $f_2$, $k_2$ is the number of variables that appear in $f_2$ but not in $f_1$, and $k_{1,2}$ is the number of variables that appear in neither $f_1$ or $f_2$. Let $k = n - k_{1,2}$, which is the number of variables that appear in $f_1$ and $f_2$ (i.e., $k = |I(f_1) \cup I(f_2)|$). The metric $\mu (f_1,f_2)$ can be simplified as follows: \vspace{-0.5em} \[ \mu (f_1,f_2) = 1 - \frac{2^{k_1}+2^{k_2}-2}{2^k} \vspace{-0.5em} \] Note that higher values of $\mu$ indicate closeness. \begin{comment} Further, recall Bob's example from Section~\ref{sec:overview}. In the unweighted case, the distance metric (i.e., $\mu$) score between \{{\tt Home,Document}\} and \{{\tt Document}\}, as well as between \{{\tt Home,Document}\} and \{{\tt Home,Photo}\} is $0.75$. \end{comment} \vspace{-1em} \subsection{The Weighted Metric} \label{sec:weighted-metric} \vspace{-0.5em} For security policies, some variables are more important than others; e.g., recall the {\tt Home} tag from Bob's policy in Section~\ref{sec:overview}. To incorporate the importance of variables we introduce a weighted version of our metric. As before, we will consider a Boolean function over $n$ variables $x_1,x_2,\cdots,x_n$. However, in this case we have two weights $w_i^0$ and $w_i^1$ associated with each index $1 \leq i \leq n$. The weight associated with an assignment $\sigma=\langle b_1,\cdots,b_n \rangle$ (denoted as $w(\sigma)$) is \vspace{-0.5em} \[ \sum_{i=1}^n w_i^0 (1-b_i) + w_i^1 b_i \;. \vspace{-0.5em} \] Given a set of Boolean assignments $S$, define $w(S)$ as $\sum_{\alpha \in S} w(\alpha)$ -- the sum of weights of all assignments in $S$. Given a Boolean function $f$, $w(f)$ is the weight of the set of satisfying assignments of $f$. Using a simple recursive argument, the weight of all $2^n$ assignments $\{ 0,1 \}^n$ is: \vspace{-0.5em} \[ \prod_{i=1}^n (w_i^0+w_i^1) \vspace{-0.5em} \] Given $n$ pair of weights $(w_1^0,w_1^1),\cdots,(w_n^0,w_n^1)$, a weighted metric between two Boolean functions $f$ and $g$ (denoted as $\mu_w(f,g)$) is defined as follows: \vspace{-0.5em} \[ 1-\frac{w(f \oplus g)}{\prod_{i=1}^n (w_i^0+w_i^1)} \vspace{-0.5em} \] Note that if for all $i$ we have $w_i^0=w_i^1=1$, we get the previous metric (i.e., the unweighted case). As before, consider two Boolean functions $f_1$ and $f_2$ with index sets $I(f_1)$ and $I(f_2)$. Let the index sets $I_2^1$ and $I_1^2$ be as defined before. Define the following three quantities: \vspace{-0.5em} \begin{eqnarray*} z_1 & = & \prod_{i \in I_2^1} (w_i^0+w_i^1) \; - \; \prod_{i \in I_2^1} w_i^0 \\ z_2 & = & \prod_{i \in I_1^2} (w_i^0+w_i^1) \; - \; \prod_{i \in I_1^2} w_i^0 \\ z & = & \prod_{i \in I(f_1) \cup I(f_2) } (w_i^0+w_i^1) \end{eqnarray*} The metric $\mu_w (f_1,f_2)$ can be defined as: \vspace{-1em} \[ \mu_w (f_1,f_2) = 1-\frac{z_1+z_2}{z} \vspace{-0.5em} \] The argument is exactly same as before. The reader can check that for the unweighted case (i.e. for all $i$ we have $w_i^0=w_i^1=1$) we get the previous metric back. \begin{comment} Again, recall Bob's example from Section~\ref{sec:overview}, but for the weighted case. That is, assume {\tt Home} has a weight $2$, whereas the other tags all have the weight $1$. In the weighted case, the distance metric (i.e., $\mu_w$) score between \{{\tt Home,Document}\} and \{{\tt Document}\} is $0.67$, whereas that between \{{\tt Home,Document}\} and \{{\tt Home,Photo}\} is $0.83$, i.e., the examples containing the important tag {\tt Home} are nearer to each other. \end{comment} \myparagraph{Setting weights} Next we describe an algorithm to set weights. Given a set of variables $V \; = \; \{x_1,\cdots,x_n\}$, suppose we are given a partial order $\preceq$ on $V$ (e.g., $x_i \preceq x_j$ means that $x_j$ is more ``important'' than $x_i$). Next we construct a function $L: V \rightarrow [ n ]$ that assigns integers between $1$ and $n$ to each variable in $V$ and has the property that $x_i \preceq x_j$ and $j \not= i$ implies that $L(x_i) > L(x_j)$.\footnote{ Such a function can be constructed by topologically sorting a directed graph whose nodes are $V$ and there is an edge from $x_j$ to $x_i$ ($j \not= i$) iff $x_i \preceq x_j$.} We can assign higher weights $w_i^1$ to variables that have a lower value according to the function $L$ and set all the weights $w_i^0$ to $1$. Note that it is not necessary to precisely define a mechanism for assigning weights, as long as the ordering imposed by $L$ is preserved. \vspace{-1em} \subsection{Active Learning} \label{sec:active-learning} \vspace{-0.5em} Ideally, users would provide accurate examples to PyBE\xspace. However, as even expert users are not always accurate~\cite{yho+14,irc15}, we expect a small margin of error in the policy decisions provided by the user; e.g., a typo resulting in 1 being accidentally marked as 0. We use active learning to find and correct potentially incorrect policy decisions, by asking users to relabel certain chosen scenarios. Relabeling samples to remove errors has been shown to be effective even with non-experts by prior work~\cite{spi08}. In our approach, the scenarios and their nearest neighbors are arranged as a graph, which allows us to relabel existing scenarios in a systematic manner if certain invariants on the graph are not true. In other words, the graph we are about to describe gives us a systematic way to evaluate the conditions that may indicate user error. Let $G = (V,E,L_V,L_E)$ be a $4$-tuple where $V \subseteq {\cal P}_n$ is the set of labeled policy scenarios, $E\subseteq V \times V$ is the set of edges, $L_V$ maps each vertex $v \in V$ with a label $1$ (signifying {\sf allow}) and $0$ (signifying {\sf deny}), and $L_E$ labels each edge $e \in E$ with a non-negative real value (i.e., $L_E (v,v')$ is $\mu (v,v')$, which is the distance between the scenarios $v$ and $v'$). The set of neighbors $N(v)$ of a vertex $v \in V$ is the set $\{ v' \; | \; (v,v') \in E \}$ and intuitively represents all the nearest-neighbors of the policy scenario $v$. \noindent {\bf (Inv-1): Majority label exists.} This invariant states that for all $v \in V$, its set of neighbors $N(v)$ have a majority label (i.e,. more than $\frac{|N(v)|}{2}$ vertices in $N(v)$ have the same label $L_V (v)$). \noindent {\bf (Inv-2): Agreement with the majority label.} This invariant states that if invariant Inv-1 is true, then for every $v \in V$ its label $L_V (v)$ agrees with the majority label of its neighbors $N(v)$. Intuitively we want the graph $G$ corresponding to our policies to satisfy invariants Inv-1 and Inv-2. If the graph $G$ violates either of the invariants, then we recommend relabeling of the policy scenarios to the user. Figure~\ref{fig:invariants} shows instances of the graph for some vertex $p$ that violate the invariants. In Figure~\ref{fig:invariant1}, there is no majority label among $p's$ neighbors, which can be resolved by relabeling either $q$ or $r$. Further, in Figure~\ref{fig:invariant2}, the label on $p$ disagrees with the majority, which can be resolved by relabeling $p$. \begin{figure}[t] \centering \captionsetup[subfigure]{font=small,labelfont={bf,sf},width=1.1in} \subfloat[][$p$ violates Inv-1, i.e., no majority label]{\includegraphics[width=0.6in]{figs/invariant1}\label{fig:invariant1}}\qquad\qquad\qquad \subfloat[][$p$ violates Inv-2, i.e., disagrees with majority label]{\includegraphics[width=0.6in]{figs/invariant2}\label{fig:invariant2}} \vspace{-0.5em} \caption{NN graph for vertex $p$, consisting of neighbors $q$ and $r$ at the closest distance $d$, violates Inv-1 and Inv-2.} \label{fig:invariants} \vspace{-1.5em} \end{figure} We use a simple greedy approach to recommend changes: Consider a function ${\cal V}(G)$ that counts the total violations of both Inv-1 and Inv-2 in graph $G$. Further, consider a function ${\cal C}(v,G)$ that measures the impact of a potential label change on violations, i.e., returns the decrease in ${\cal V}(G)$ after a temporary change in the label of $v$ (i.e., $L_V (v)$). The label change that causes the maximum decrease in ${\cal V}(G)$ is optimal. Therefore, at each iteration, we find the optimal vertex, $v_{opt}$, by maximizing ${\cal C}(v,G)$ over all $v\in~V\setminus V_{visited}$, where $V_{visited}$ is the set of all vertices that have been recommended to the user previously. We add $v_{opt}$ to $V_{visited}$, and recommend the user to change $L_V (v_{opt})$. If the user accepts, we change $L_V (v_{opt})$. We reiterate until all the vertices are visited or until there are no more violations. \begin{comment} Alternately, invariants may also be satisfied by generating additional examples. As our current approach satisfies the objective of using noise for finding potentially incorrect policy decisions, we did not explore this alternative any further. \end{comment} \vspace{-1em} \subsection{Prediction with No Majority} \vspace{-0.5em} \label{sec:no-majority} As described previously, we predict the label (i.e., policy decision) for a new policy scenario $p$ as the majority label of its nearest neighbors $N(p)$. If there is no majority label, we use the following method for prediction: We eliminate the first neighbor that is not a {\em mutual} neighbor, i.e., if there is a labeled policy scenario $q$ such that $q \in N(p)$ but $p \notin N(q)$, we remove $q$ from $N(p)$, thereby converging on a majority. In case such elimination is not possible, i.e., if all neighbors in $N(p)$ are mutual neighbors, we deny by default. Our method considers the value of the distance between neighbors to resolve a tie, instead of randomly discarding one scenario (i.e., by considering only an odd number of scenarios in $N(p)$). In Section~\ref{sec:results}, we demonstrate that PyBE\xspace performs better than a baseline of random guessing, and that such cases were rare, i.e., less than 6\% test scenarios had no majority, and less than 3\% were denied by default. \section{Analysis of Results} \label{sec:analysis_of_results} \vspace{-0.5em} PyBE\xspace is the first step towards our vision of a policy assistant, and one of our objectives is to learn lessons for future work. With this motivation, we performed an in-depth study of our results to identify the general causes of incorrect predictions. We manually analyzed each of the 141 incorrectly predicted test examples, using the following information collected during our study: {\sf (1)} the justifications provided by the participants for their decisions, {\sf (2)} the nearest neighbors of the test example, {\sf (3)} the weights of the tags involved, and {\sf (4)} all examples from the specification dataset that contain tags in common with the test example. The rest of this section describes the four causes of incorrect predictions that we identified. A detailed breakdown of the causes across participants and policies is provided in Table~\ref{tbl:incorrect} in Appendix~\ref{app:analysis}. \myparagraphs{1. Misconfigured Weights} We found that a majority of our incorrect predictions (79 out of 141, or over 56\%) were caused because the weights set by the participants contradicted their actual security preferences. We confirmed our findings using justifications from participants that clearly indicated the tag or security preference that influenced their policy decision for a test example. \begin{table}[t] \scriptsize \centering \caption{A subset of policy examples specified by \user{1}, which includes only those examples that contain {\tt Work}} \vspace{-1em} \label{tbl:weight_cause} \begin{tabular}{r|l|c} \Xhline{2\arrayrulewidth} {\bf No.} & {\bf Scenario} & {\bf Policy Decision}\\ \Xhline{2\arrayrulewidth} 1 & \{Work, ScannedDocument\} & deny \\ 2 & \{WhiteboardSnapshot, Work\} & deny\\ 3 & \{Work, BusinessCard\} & deny\\ 4 & \{Work, Audio\} & deny\\ 5 & \{Work, Postit\} & deny\\ 6 & \{Work\} & deny\\ 7 & \{Work, CalendarLink\} & deny\\ 8 & \{Work, Receipts\} & deny\\ 9 & \{Photos, Work\} & allow\\ \Xhline{2\arrayrulewidth} \end{tabular} \vspace{-2em} \end{table} For instance, consider an incorrect prediction for \user{1}'s {\em PersonalCloud} policy, where PyBE\xspace predicted the policy decision {\sf allow} for the test example \{{\footnotesize \tt WhiteboardSnapshot,Work,ScannedDocument}\}. The user provided the ground-truth decision of {\sf deny}, and justified with the quote ``{\em no work data to personal cloud}''. That is, the tag {\tt Work} was confidential and hence important to \user{1} with respect to the {\em PersonalCloud} policy target. This preference of {\tt Work} being important is also consistent for all but one of \user{1}'s examples containing {\tt Work}, as shown in Table~\ref{tbl:weight_cause}. However, this importance was not reflected in the weights, i.e., \user{1} mistakenly assigned {\tt Work} data a lower weight (i.e., weight 2) by ordering it lower than personal data (i.e., weight 4). This resulted in the test example being matched with personal examples (e.g., \{{\tt MedicalFacility,ScannedDocument}\}) that allowed export for PersonalCloud. \begin{comment} Table~\ref{tbl:weight_cause} shows a subset of the initial examples provided by \user{1}. Observe that all of \user{1}'s examples that contain {\tt Work} (except one) deny export to the {\em PersonalCloud}. This leads us to conclude that \user{1} has consistently thought of {\tt Work} as important with respect to the {\em PersonalCloud}. However, this importance was not reflected in the weights, i.e., \user{1} mistakenly assigned {\tt Work} data a lower weight by ordering it lower than personal data, as we saw previously in Figure~\ref{fig:p1_order}. \end{comment} \begin{comment} We investigated further by calculating numerical weights for each tag involved in this incorrect prediction, using \user{1}'s weight orders with the method described in Section~\ref{sec:weighted-metric}. The tag {\tt Work} had a low weight (i.e., 2), compared to other personal tags (e.g., {\tt MedicalFacility}, weight 4). Therefore, rather than being correctly identified as close to the work-related scanned document scenario specified by \user{1} (i.e., {\tt Work, ScannedDocument}), the test example was incorrectly identified as being close to the personal policy examples \{{\tt MedicalFacility,ScannedDocument}\} and \{{\tt WhiteboardSnapshot,MedicalFacility}\}, both of which allowed export to the {\em PersonalCloud}. Hence, the decision was incorrectly predicted as {\sf allow}. \end{comment} On raising the weight of {\tt Work} to 5 (i.e., above personal tags), the test example was correctly found closer to \{{\tt Work,ScannedDocument}\}, resulting in a correct prediction of {\sf deny}. Note that this increase in weight is not arbitrary, but guided by evidence of the user's security preferences. On correcting all misconfigured weights, we manually confirmed that our overall accuracy rose to 89\%. This includes most predictions for \user{2} and \user{5} for whom PyBE\xspace had the lowest accuracy. Since misconfigured weights caused the maximum incorrect predictions (79 out of 141, or 56\%), we investigated further, and made two interesting observations: \emparagraph{Observation 1: Inaccurate predictions resulted from participants only considering privacy preferences when setting weights.} Recall that our participants were provided with the option of setting different weight-group orders for different policy targets in Section~\ref{sec:user_study}. All participants (except \user{8}) set only a general order for all 5 policy targets, which only accounted for the their privacy preferences. As a result, higher-weighted personal tags (e.g., {\tt MedicalFacility}, {\tt Home}) had more influence on the policy decision, irrespective of the actual policy target. However, participants labeled examples based on their policy target-specific security preferences (e.g., no work to {\em PersonlCloud}. This resulted in incorrect predictions, as seen in \user{1}'s example previously. Note that this phenomenon occurs only because our tags are semantically related to the policy targets (e.g., {\tt Work} to {\em WorkCloud}). We confirmed that at least 26 incorrect predictions (out of 79 due to weights) were false negatives in predicting the {\em PersonalCloud} and {\em PersonalEmailApp} targets, because participants considers privacy for weights, and security for labeling. \begin{comment} Recall that our participants were provided with the option of setting different weight-group orders for different policy targets in Section~\ref{sec:user_study}. However, all participants (except \user{8}) set only a general order for all 5 policy targets, which only accounted for the their privacy preferences. As a result, higher-weighted personal tags (e.g., {\tt MedicalFacility}, {\tt Home}) had more influence on the policy decision, irrespective of the actual policy target. This phenomenon caused false negatives for personal policy targets such as {\em PersonalCloud} and {\em PersonalEmailApp}, since PyBE\xspace was forced to identify work-related test examples as closer to personal examples, and hence predicted {\sf allow} instead of {\sf deny} (e.g., as seen in \user{1}'s case previously). Note that the number of false positives for the {\em WorkCloud} and {\em WorkEmailApp} policies was lower, as participants generally denied export for random examples. We confirmed that at least 26 incorrect predictions (out of 79 due to weights) were false negatives in predicting the {\em PersonalCloud} and {\em PersonalEmailApp} targets, which were directly caused by the participant considering privacy preferences while setting weights, but security preference (for work data) while labeling examples. \end{comment} \emparagraph{Observation 2: ``Important'' may not just mean confidential.} In at least 14 of the test-examples incorrectly predicted due to weights, participants wanted to set a high weight for a non-confidential tag, i.e., to declassify data if a certain tag were present in the scenario. This was in complete contrast with the initial understanding of the participants while setting weights, i.e., that confidential tags would have high weights. \begin{comment} This was in complete contrast with the initial understanding of the participants while setting weights, i.e., that confidential tags would have high weights. Thus, applying PyBE\xspace may require careful consideration of what is ``important'', depending on the security goals of the policy. We discuss the lesson learned from this observation in Section~\ref{sec:lessons}. \end{comment} \myparagraphs{2. Policy Change} A significant minority (30 out of 141, or over 21\%) of our incorrect predictions resulted from a change in the participants' policies, i.e., when participants explicitly disagreed with an earlier assumption. For example, \user{8}'s policy changed for the tag {\tt School}. During the initial specification, \user{8} assumed {\tt School} and {\tt Work} to be different due to off-campus employment. However, before testing, \user{8} started working at the school, which resulted in similar decisions for {\tt School} and {\tt Work}. \user{8} admitted to this change during the post-testing interview. All cases in this category were similarly confirmed. \myparagraphs{3. Unconfirmed Policy Change} For a small number of incorrect predictions (15 out of 141, or about 11\%), we observed a clear contradiction between the participant's examples during specification and testing, but could not get a confirmation from the participant. For example, for \user{8}'s test example \{{\tt SavedToDevice,Audio}\}, the ground truth label allows export for the {\em WorkCloud} policy, but all except one of \user{8}'s initially specified examples containing {\tt SavedToDevice} or {\tt Audio} deny export to the {\em WorkCloud}. Without additional information, we classify such contradictions as unconfirmed policy changes. \myparagraphs{4. Tag Confusion} The least number of errors (i.e., 12 out of 141, or about 8.5\%) were caused due to the ambiguity of some tags. The location or time-based tags (e.g., Home and Afterhours) were intended to indicate the location or time of creation of data. However, as we did not place strict constraints, our participants also created scenarios where such tags could be used by themselves (e.g., the scenario \{{\tt Home}\} could mean data created at home). Justifications indicated that while participants could comprehend the scenarios they had created, a few random test scenarios (in case of 3 participants) caused confusion. For example, \{{\tt Afterhours,Audio,Document}\} could mean Audio created after hours, and added to a document whose origin is unknown, or a document created after hours, and added to an audio recording. Finally, we exclude five incorrect predictions from \user{8}'s test dataset from our categorization, i.e., 3 for {\em PersonalEmailApp} and 2 for {\em WorkEmailApp}, as the participant was unable to decide unless they knew the identity of the email receiver, which gave us no information. We did not face this situation with any other user or example. \begin{comment} In case of \user{5}, PyBE\xspace performs slightly worse in predicting the {\em WorkCloud} and {\em WorkEmailApp} policies. This inverse trend is mainly because many of the incorrectly predicted examples result due to misconfigured weights of tags that can be classified as personal data, but are generally considered to be extremely sensitive, and must have higher weights than other personal tags (e.g.,data collected at a Medical Facility). \end{comment} \section{Detailed split of causes of errors} \label{app:analysis} A detailed split of the causes of error, across users and policies, can be seen in Table~\ref{tbl:incorrect}. \input{incorrect_tbl} \section{Tags used in the User Study} \label{app:tags} Figure~\ref{fig:tags} shows the tags used in this study. We provided 9 tags, while the rest were created by users. \begin{figure*}[t] \centering \includegraphics[width=6.5in]{figs/tags} \caption{Tags used in the user study, and the number of users (out of 8) that use each tag.} \label{fig:tags} \end{figure*} \input{scripts} \input{datasets_appendix} \input{appendix_analysis} \section{Applications} \label{sec:applications} Discuss the applications of our approach for solving the policy specification problem in different domains (and for different kinds of policies). Does it make sense to have this section upfront after we describe our overview? \section{Background - Nearest Neighbor Classification} \label{sec:background} A nearest neighbor (NN) search is the task of finding the {\em closest} or most similar data point to a particular query point $q$, from a set of points~\cite{mur12}. If used for classification, a 1NN classifier predicts the class for a query point $q$ as the class of the closest point in a set of already classified points $S$. A variant, kNN, may instead consider the classes of k closest neighbors. Note that NN is an unsupervised learning approach, i.e., the algorithm does not learn a model, instead directly predicting based on the data points in the training data. As a result, NN does not make any assumptions about the probability distribution of data, making it workable even with small datasets. The most important aspect of learning with a kNN classifier is determining the distance metric. The distance metric $\mu$ is a function that computes the distance or similarity between two input data points. Thus, the distance metric is the most crucial aspect for this approach. In some scenarios, the metric may be obvious (e.g., computing the distance among points in Euclidean space). For other scenarios, such as when dealing with categorical data, a distance metric with desired properties may need to be defined, as we do in Section~\ref{sec:algorithm}. \begin{comment} \subsubsection{Breaking ties} Even when using 1-NN, a tie-breaking strategy may be required for searches that result in more than one data points at the closest distance, if the said points have different classes. A naive strategy would be to pick one random data point from the set of nearest neighbors. A more widely used strategy is to predict the class of the majority data points. Such approaches often limit the set size to an odd number, in order to have a certain majority. The choice of the neighbor to exempt from the set of neighbors to achieve a majority vote can be random, or made deterministic using some property exclusive to the problem space. \end{comment} \subsection{Classification Results} \label{sec:classifiers} \begin{comment} \begin{figure*}[t] \centering \captionsetup[subfloat]{captionskip=-1em} \subfloat[][Work Cloud policy]{\includegraphics[width=3in]{figs/plots/workcloud}\label{fig:workcloud}} \subfloat[][Work Email policy]{\includegraphics[width=3in]{figs/plots/workemailapp}\label{fig:workemailapp}}\\[-1em] \subfloat[][Personal Cloud policy]{\includegraphics[width=3in]{figs/plots/personalcloud}\label{fig:personalcloud}} \subfloat[][Personal Email policy]{\includegraphics[width=3in]{figs/plots/personalemailapp}\label{fig:personalemailapp}}\\[-1em] \subfloat[][Social policy]{\includegraphics[width=3in]{figs/plots/socialapp}\label{fig:socialapp}} \subfloat[][Work Wifi policy]{\includegraphics[width=3in]{figs/plots/workwifi}\label{fig:workwifi}}\\[-1em] \subfloat[][Home Wifi policy]{\includegraphics[width=3in]{figs/plots/homewifi}\label{fig:homewifi}} \caption{Accuracy of a decision tree across all responders, for each policy} \label{fig:policy_accuracy} \end{figure*} \begin{figure*}[t] \centering \captionsetup[subfloat]{captionskip=-1em} \subfloat[][Work Cloud policy]{\includegraphics[width=3in]{figs/plots/workcloud_cross}\label{fig:workcloud}} \subfloat[][Work Email policy]{\includegraphics[width=3in]{figs/plots/workemailapp_cross}\label{fig:workemailapp}}\\[-1em] \subfloat[][Personal Cloud policy]{\includegraphics[width=3in]{figs/plots/personalcloud_cross}\label{fig:personalcloud}} \subfloat[][Personal Email policy]{\includegraphics[width=3in]{figs/plots/personalemailapp_cross}\label{fig:personalemailapp}}\\[-1em] \subfloat[][Social policy]{\includegraphics[width=3in]{figs/plots/socialapp_cross}\label{fig:socialapp}} \subfloat[][Work Wifi policy]{\includegraphics[width=3in]{figs/plots/workwifi_cross}\label{fig:workwifi}}\\[-1em] \subfloat[][Home Wifi policy]{\includegraphics[width=3in]{figs/plots/homewifi_cross}\label{fig:homewifi}} \caption{Accuracy of a decision tree, for 10-fold cross validation, across all responders, for each policy} \label{fig:policy_accuracy} \end{figure*} \end{comment} \section{Conclusion} \label{sec:conc} \vspace{-0.5em} We introduced the paradigm of Policy by Example (PyBE\xspace) for user-specific policy specification. PyBE\xspace enables users to express data-use scenarios in policy examples, and predicts policy decisions for new scenarios. In our feasibility study, PyBE\xspace demonstrated better prediction performance than naive approaches. A key contribution of PyBE\xspace is its active learning approach for engaging users in finding and potentially incorrect policy decisions in their examples, which we demonstrated to be five times as effective as manual reviews. Finally, we analyzed our incorrect predictions and learned lessons that motivate future research in this promising new domain. \section{Datasets} \label{app:datasets} The number of examples per participant in the specification and testing datasets are shown in Tables~\ref{tbl:dataset} and~\ref{tbl:testing_dataset} respectively. \input{dataset_tbl} \input{testing_dataset_tbl} \section{Threats to Validity} \label{sec:discussion} \vspace{-1em} In this paper, we provide a general framework for specifying policies for user-specific data. Individual aspects of our framework may be iteratively refined in the future. We identify specific limitations of the current state of our approach and its evaluation as follows: We evaluate feasibility with expert users. While our participants provide a significant number of policy examples, the number of participants is small, hence we cannot generalize to the broader user population. However, because this specialized set of users are likely to have more complex policies than most users, we view our feasibility study as a sufficient ``stress test'' of PyBE\xspace. Additionally, since even expert users can make bad security decisions~\cite{yho+14}, our expert-specified policy examples are not expected to be error-free. Indeed, we use our interactive approach to help users find potential errors. \begin{comment} The graph invariants used in our active learning approach (Section~\ref{sec:active-learning} are satisfied by relabeling policy examples. This is consistent with our objective of using active learning to enable the user to find potential errors in their policy decisions. Alternately, the invariants may also be satisfied by suggesting new policy examples to the user that are either {\sf (a)} nearer to the vertex in question than its nearest neighbors, of {\sf (b)} just as close to a vertex as its nearest neighbors. For our discrete data points, the problem of generating new examples \end{comment} Our policy scenario is described as a conjunction of variables (Section~\ref{sec:policy-example}). While it is easy to see how such a format may generalize to any policy that may be expressed as a conjunction of data objects or conditions, a thorough evaluation of expressibility may be required. Finally, in Section~\ref{sec:active-learning}, we propose a simple greedy approach to satisfy graph invariants. A more complex approach (e.g., using dynamic programming) may be integrated into PyBE\xspace without any significant changes. \section{Evaluation} \label{sec:eval} \vspace{-0.5em} We performed an IRB-approved feasibility study with expert users to evaluate the effectiveness of our approach. We chose experts under the hypothesis that they prefer more complex policies, the complexity of which makes them challenging to predict. Support for this hypothesis comes from the fact that non-expert users are more likely to employ binary security practices, (e.g., only visiting known sites rather than deciding based on security-related attributes like usage of https~\cite{irc15}) and evidence that knowledge of security risks can increase sensitivity to security when making data decisions~\cite{rwb12}. Note that no personally identifiable information (PII) was collected from the participants. We plan to release our tool and source code after publication, to allow a broader audience to use PyBE\xspace. A sanitized version of our dataset will also be released. The following research questions motivate our study:\vspace{-0.5em} \begin{enumerate}[label=\textbf{RQ\arabic*},ref=\textbf{RQ\arabic*}]\setlength{\itemsep}{-0.3em} \item \label{rq:accuracy} {\it How accurate are our predictions for random, unlabeled scenarios that may occur at runtime?} \item \label{rq:accuracy-causes} {\it What are the causes for incorrect predictions?} \item \label{rq:user-error} {\it Do users make mistakes in their examples?} \item \label{rq:user-error-auto} {\it Does our active learning approach help the user find mistakes in their examples?} \end{enumerate} \vspace{-0.5em} This section describes the study setup, the data collection and experiments. Section~\ref{sec:results} describes the results. Due to space constraints, this section describes the core methodology of the feasibility study; the literal scripts used during the study can be found in Appendix~\ref{app:feasibility_details}. \input{setup} \input{experiments} \input{results} \section{A few example policies} In this section, we discuss a few policy examples that our model could discover and correctly predict in our user samples. \subsection{Data Collection} \label{sec:user_study} \vspace{-0.5em} This section describes the approach used for collecting the policy examples and weights from participants. \myparagraphs{1. Collecting Policy Examples} Participants were provided with our predefined tags, but were also allowed to create their own tags. Participants were instructed that they could combine tags into complex scenarios for creating examples. We placed no constraint on the number of example scenarios each participant could provide. For each scenario, participants were required to label policy decisions for the 5 targets described previously in Table~\ref{tbl:policy}. Note that we collected labels for two more targets, but discarded them before testing to reduce user fatigue. A preliminary analysis of the examples collected from our participants led to two interesting observations: {\sf (1)} Our participants created a total of 31 unique tags, out of which about 58\% (or 23) were specific to individual participants, while only 7 tags were commonly used by all in their examples, and {\sf (2)} Out of the 246 example scenarios collected across participants, over 76\% were specific to individual participants, and only 7 were common among all 8 participants. These observations indicate that relevant {\em data-use scenarios may be unique to the individual, even among student researchers from the same research lab}, further motivating our research into generating user-specific policies for user-specific data. \begin{comment} Note that although we allowed our participants to create tags to get complex security policies, non-experts may not need to create tags under ordinary circumstances. We discuss ideas for collecting policy examples from non-exerts in Section~\ref{sec:future}. \end{comment} \myparagraphs{2. Obtaining Weights} On average, each participant used about 14 unique tags in their examples. As ordering a large number of tags can be tiring, we categorized tags into semantic groups. The participants were provided with this semantic grouping, and were first {\sf (1)} allowed to customize group memberships of tags as per their understanding, and then {\sf (2)} instructed to provide a partial order over the groups in a spreadsheet. Participants were provided with a basic partial order generated by the authors, and could start from scratch, or customize the provided ordering. We confirmed each partial order relation by reading it out to the user; e.g., by asking if ``j is more important than i'' to confirm {\tt i;j}. We then transformed the orders to weights using the approach described in Section~\ref{sec:weighted-metric}. For additional illustration, Appendix~\ref{app:weights_script} provides \user{1}'s tag groups (Figure~\ref{fig:tag_groups}) partial order on the groups ( Figure~\ref{fig:p1_order}). \begin{comment} \begin{figure}[t] \centering \includegraphics[width=1.2in]{figs/response_order} \vspace{-0.5em} \caption{Screenshot of \user{1}'s ordering of tag groups.} \label{fig:p1_order} \vspace{-1em} \end{figure} \end{comment} Finally, participants were informed that they could provide different partial orders for different policies, but most participants chose to keep a single general order. We describe the impact of this decision in Section~\ref{sec:analysis_of_results}. \begin{comment} \begin{lstlisting}[basicstyle=\ttfamily\scriptsize,float=tp,caption={Participant-generated partial order on tag groups.},belowcaptionskip=-6mm,label=lst:context-ordering,emph={RULE,GROUPS},emphstyle=\bfseries] # RULE: If i<-j, then j is more important than i # GROUPS: {Finance,Medical,Work,Personal,Documents,History,Notes,Recordings,Todo} Medical<-Finance Work<-Medical \end{lstlisting} \end{comment} \vspace{-1em} \subsection{Experiments} \label{sec:experiments} \vspace{-0.5em} This section describes the experiments for identifying user errors and testing prediction for random scenarios. \myparagraphs{1. Identifying Errors} \begin{lstlisting}[basicstyle=\ttfamily\scriptsize,float=tp,caption={A suggestion made by the PyBE\xspace algorithm during the interactive review process.},belowcaptionskip=-6mm,label=lst:suggestion,emph={Suggestion},emphstyle=\bfseries] Suggestion: For {Note}, WorkCloud = DENY. Agree?(y/n) \end{lstlisting} The review of examples was carried out 3 months after the initial specification, as most participants were unavailable over the summer break. We performed a two-step experiment to help participants identify and correct errors in their policy decisions. First, participants performed a manual review of their initial specification. Participants were provided with a spreadsheet containing their policy examples (one sheet per policy target), and could change any policy decision they desired. For each update, participants were instructed to indicate a cause to justify the change (e.g., correcting an error, change of mind, inability to decide). Finally, participants provided a justification for each change (e.g., ``Work is confidential''), providing the helpful context for analyzing the results (Section~\ref{sec:analysis_of_results}). After the manual review, we performed a PyBE\xspace-assisted review using the approach described in Section~\ref{sec:active-learning}. We treat each participant-policy combination as a separate policy specification problem; hence, a separate review was performed for each such case (i.e., 8 users and 5 policies make 40 total cases). As we used the changed examples from the manual review; any errors discovered using this approach were additional. Our algorithm presented the participant with a series of suggestions (i.e., examples with corrected policy decisions, as shown in Listing~\ref{lst:suggestion}). If the participant accepted the suggestion, we confirmed with the participant that the original decision was in error, and recorded it as an error found by PyBE\xspace. If the participant rejected, we asked for a short justification to understand the participant's policy preferences. We stopped at 15 suggestions for each participant-policy case to limit fatigue. \myparagraphs{2. Testing with Random Scenarios} For each participant, we randomly generated $n/2$ new policy scenarios, where $n$ was the number of scenarios initially provided by the participant. The random scenarios were created with the tags used in the participant's initial examples. The intuition is that the tags provided by the participant are relevant to the participant; hence scenarios composed of them must be relevant as well. To mitigate labeling fatigue, the random scenarios included at most 3 tags. Participants provided the ground truth policy decisions for their test scenarios, for each of the five policy targets. Apart from indicating ``Allow'' or ``Deny'', participants were also provided the ``I don't know'', in which case we substituted the scenario with another random test scenario. We predicted the policy decision for each test scenario using our algorithm. We then asked participants to confirm their decisions for incorrect predictions, provide short justifications, and conducted short, informal interviews that helped us gain insight into the decisions. \section{Future Directions} \label{sec:future} \vspace{-0.5em} Our evaluation of PyBE\xspace demonstrates feasibility, and shows promise for further exploration in this area. We now discuss two future directions, namely {\sf (1)} adapting PyBE\xspace for non-experts and {\sf (2)} adapting to change. \myparagraph{Adapting PyBE\xspace for non-experts} Measuring the usability of PyBE\xspace with non-experts is a natural direction for future research. Additionally, we make the following recommendations for tasks that may be performed differently for non-experts. \emparagraph{1. Collecting examples:} To ease the burden of creating tags, non-experts may be provided with a large and diverse collection of tags (e.g., the 40 tags obtained in our study) as a baseline for specifying examples. Further, usable interfaces may be considered for non experts (e.g., ``interactive dropdowns''~\cite{jkkg10a,jkkg10b} to collect examples). \emparagraph{2. Collecting Weights:} Collecting weights from non-experts is another challenge for future work. Future work may consider using visual ``sliders'' for weight collection, for precise and usable weight assignments. \emparagraph{3. System Integration:} PyBE\xspace may be integrated into existing systems that protect user-specific data from disclosure to the network (e.g., Weir~\cite{naej16} and Aquifer~\cite{ne13}). On such systems, users may want to override policy predictions by PyBE\xspace at runtime, or provide feedback, requiring a trusted path between the user and PyBE\xspace. A feedback mechanism may also improve future predictions. \begin{comment} Minor challenges: 3. Conflict resolution: While we collected the specification dataset only once for our study, in reality, the user may modify their specification whenever they please. The conflict-resolution routine may have to execute whenever the dataset is modified. For usability, we may need to remember user's response to recommendations between subsequent executions. While the following does not directly concern PyBE\xspace, it still is an important point: 4. Runtime predictions: Depending on user preference, users may want to override certain decisions at runtime. The enforcement system must then ask the user to update the policy specification. \end{comment} \myparagraph{Adapting to Change} Another direction for future work is detecting potential change in the user's policy. While detecting change may be impossible without external input in some cases, there is value in evaluating solutions in other cases. Lessons from prior work that measures policy changes for file access control may be used to determine the causes for policy change~\cite{sg09}. Persuasive technologies designed by prior research may also provide ways to encourage the user to report change when it happens~\cite{cml09,mc12,pgb+10}. Future work may also be directed at predicting which example or tag is likely to change, using existing information (e.g., weights, frequency in examples). Our intuition is that strategies used for cache replacement (e.g., least recently used or LRU~\cite{sj94}) may apply, at least as a starting point. Finally, active learning may also be used to suggest new examples to the user, which is not the focus of this paper, and lies in the broader scope for future work. \section{Implementation} \label{sec:implementation} \section{Introduction} \label{sec:intro} \vspace{-0.5em} In the era of pervasive computing, the security of user data and resources is of paramount importance. Complex systems such as IoT platforms (e.g., IFTTT~\cite{tt10} and SmartThings~\cite{smartthings}), smartphone platforms (e.g., Android and iOS) and even traditional commodity platforms are being leveraged for processing user data. However, our knowledge of policy specification has not kept pace with the rise of complex systems that are increasingly relying on the user to specify the security policy. Further, user data has become increasingly user-specific. Users no longer directly deal with generic files, but create specific data objects such as notes, whiteboard snapshots, and selfies. This data is abstract, i.e., its importance and properties are subjective. System designers or application developers cannot specify a security policy for abstract user data. The situation is even critical for novel security systems that provide strong data security guarantees for user data (e.g., decentralized information flow control (DIFC) systems for Android~\cite{ne13,jaf+13,xw15,naej16}, Chromium~\cite{bcj+15}). Such systems are impractical to deploy unless users specify security policies; and users are bad at specifying security policies~\cite{shc+09,mr05} without assistance. This paper raises the simple but important question of policy specification: how to teach the system {\em what} the user wants to protect, and {\em how} the user wants to protect it? Consider the following example: a smartphone user wants to synchronize all personal notes with her cloud account, except notes labeled as medical data. Since we are dealing with user-specific data-use scenarios, we can justifiably expect the user to provide some input to the system. However, expecting the user to enumerate every possible scenario involving medical data is impractical. The policy must be predicted. We propose the approach of specifying Policy by Example (PyBE\xspace) for user-specific data. PyBE\xspace is inspired by the successful use of programming by example (PBE) for program synthesis. Specifically, we emulate the approach of Gulwani~\cite{gul11}, where the user specifies examples consisting of the input and output, and the system learns a program that can predict the output for unknown (but similar) inputs. Similarly, in PyBE\xspace, the user specifies policy examples, in terms of the data-use scenario (i.e., the input) and the policy decision (i.e., the output). The system uses the policy examples to predict policy decisions for new scenarios. By requiring only relevant examples, and not complete policy specification, PyBE\xspace makes policy specification tractable. Predicting security policies for abstract, user-specific data with unknown properties is hard, as the learner cannot make any assumptions about the input data points. In contrast, prior work on predicting privacy policies for well-known private data~\cite{khsc08,cms11} can make assumptions that aid prediction; e.g., Cranshaw et al.~\cite{cms11} take advantage of probabilistic models to learn location privacy policies knowing that location and time are continuous variables. PyBE\xspace cannot make any such assumptions, which puts us at a significant disadvantage. However, this disadvantage drove us to embrace a simpler approach that does not demand specific properties from data. We chose a variant of the {\it $k$ nearest neighbor (kNN)} classifier~\cite{mur12} for predicting policies. Our key requirements were that the algorithm be {\sf (1)} non-parametric, i.e., independent of models that rely on fixed set of parameters, and {\sf (2)} easy to explain, i.e., for the user to understand how the policy was inferred. Recall that a policy example is composed of a scenario and the corresponding policy decision. To predict the policy decision for a new scenario, our algorithm performs a nearest neighbor search for finding similar scenarios from the user's examples, and predicts the majority policy decision. An important challenge in applying kNN is calculating the distance between data points. To calculate distance between scenarios, we treat scenarios as Boolean functions, and propose a novel distance metric for the same. As some policies may be relatively more important to the user, we extend our metric to support weights. Note that existing distance metrics (e.g., {\em jaccard} distance) may require significant re-engineering to incorporate weights, which motivates our development of a new metric. \begin{comment} An important challenge in applying kNN is calculating the distance between data points. For calculating the distance between policy examples, we treat scenarios as Boolean functions, and propose a novel distance metric for Boolean functions. Further, we recognize that some policies may be more important to the user than others, and extend our metric to support weights. Note that existing distance metrics (e.g., {\em jaccard} distance) would require significant re-engineering to incorporate weights, which motivates our development of a new metric. \end{comment} PyBE\xspace recognizes that policy specification by users in any form is error prone. A key contribution is our use of active learning for enabling the user to correct policy decisions. We draw inspiration from the work of Gulwani~\cite{gul11}, which detects noise in the user's examples, and prompts the user for new outputs for problematic examples. Similarly, PyBE\xspace uses noise in the user's policy examples as an indication of error in policy decisions, and engage the user in correcting errors. We evaluate the feasibility of PyBE\xspace with a study of expert users. Our study involves 8 participants, and 5 target security policies (e.g., exporting to the enterprise cloud), i.e., we solve 40 independent policy specification problems. Our participants generate 246 policy scenarios in total, and assign decisions for the 5 policies, resulting in a total of 1,230 policy examples across participants. We perform two experiments with this data. First, we find errors in policy decisions using a manual review and a PyBE\xspace-assisted interactive review of policy examples. Then, we test PyBE\xspace's prediction for randomly generated scenarios with unknown policy decisions. PyBE\xspace demonstrates a prediction accuracy of over 76\% across all participants, and fares better than our assumed baseline of a random coin flip, and a naive approach. A significant finding is that the PyBE\xspace-assisted interactive review approach helped participants find {\em five times} as many errors as their manual reviews. Our evaluation is evidence of the feasibility, i.e., the effectiveness of PyBE in terms of both prediction accuracy and error identification, but does not speak to the general usability of PyBE. Although 8 participants is small for a human study, the evaluation is able to answer important questions through the analysis of user-generated policy examples (i.e., 1,230 user-generated examples). The research questions answered in the evaluation operate at the level of policy examples, making the dataset sufficiently large for evaluating feasibility. \begin{comment} PyBE\xspace demonstrates a prediction accuracy of over 76\% across all users. More importantly, PyBE\xspace fares better on average than our assumed baseline of a random coin flip, and a naive approach of predicting the majority decision from the training data. A significant finding is that our interactive review approach (i.e., using active learning) helps participants find {\em five times} as many errors as their manual reviews. \end{comment} The contributions of this paper are as follows: \begin{itemize}\renewcommand{\itemsep}{-0.3em} \item We introduce the Policy by Example (PyBE\xspace) paradigm for predicting user-specific security policies. Our approach takes labeled policy scenarios from the user, and predicts policy decisions for new policy scenarios. \item We use an interactive approach to assist users in finding incorrect policy decisions in their examples. We empirically demonstrate its effectiveness over manual policy reviews. \item We perform a feasibility study with expert users, and demonstrate better prediction accuracy than both a baseline as well as a naive approach. \end{itemize} This paper is the first step in our vision of a policy assistant for user data. With PyBE\xspace, we provide an approach for predicting security policies for user-specific data, and demonstrate its technical feasibility. Further, we analyze our incorrect predictions, and describe the lessons we learned in the process. Finally, we describe challenges (e.g., usability for non-experts, modeling policy change) and future research directions in this promising new area. \begin{comment} The remainder of this paper proceeds as follows: Section~\ref{sec:relwork} describes related work. Section~\ref{sec:motivation} motivates and defines the problem. Section~\ref{sec:pbe} provides an overview of our approach. Section~\ref{sec:algorithm} describes the PyBE\xspace algorithm. Section~\ref{sec:eval} describes the evaluation of PyBE\xspace, and Section~\ref{sec:results} discusses results. Section~\ref{sec:analysis_of_results} describes our analysis of results, and Section~\ref{sec:lessons} describes the lessons learned. Section~\ref{sec:future} details directions and challenges for future research. Section~\ref{sec:discussion} discusses threats to validity. Section~\ref{sec:conc} provides concluding remarks. \end{comment} \section{Lessons} \label{sec:lessons} \vspace{-1em} The lessons we learned from our feasibility study highlight aspects of correctly using PyBE\xspace in practice, and also motivate problems for future work. \begin{comment} \begin{figure}[t] \centering \includegraphics[width=3in]{figs/equalizer} \caption{Setting weights using a graphic equalizer, by asking the question ``How frequently would you export this data to the Work Cloud?''} \label{fig:policy-equalizer} \end{figure} \end{comment} \myparagraphs{Lesson 1} {\em Weight assignment should reflect security}, as well as general privacy preferences. If policy targets are semantically related to the tags, a generic weight assignment for multiple targets may be inaccurate. \myparagraphs{Lesson 2} {\em Addressing ``potential'' change in the policy} is imperative. The user may change some or all of their security policy goals without informing the system. \myparagraphs{Lesson 3} {\em The notion of importance depends on the security goals,} as users may want to consider extremely non-confidential data as important (i.e., declassifiers). If the system's goal is security, then the most confidential tag may have the highest weight; and for usability, the most non-confidential tag. \myparagraphs{Lesson 4} {\em Tag semantics should be carefully considered} for applying PyBE\xspace. Users may be able to reason about examples they create, and may even desire the expressibility of multiple label semantics (i.e., ``created at'' or ``derived data''); however, this expressibility may cause confusion when reasoning about random examples. \section{Motivation and Problem} \label{sec:motivation} \vspace{-1em} User data and data-use scenarios are user-specific. External observers such as system designers or application developers cannot specify the user's security policy without knowing the user's context of data use~\cite{nis04,bdmn06}. Moreover, this constraint is not limited to user-owned data; prior work demonstrates that even the security preferences for enterprise data vary with users and personal data-use contexts~\cite{gs10}. Consider the following example, which describes how two users may differ in terms of the relevance of data-use scenarios as well as security preferences for the same scenarios. \myparagraph{Example} Alice and Bob are two smartphone users, who use a fictional note-taking application {\em Notes} (similar to Google Keep) on their smartphones to collect and organize information. {\em Notes} backs up data to a designated cloud provider (e.g., Google Drive). Alice consolidates expenses by scanning paper receipts into the {\em Notes} application. However, Alice does not trust the cloud with medical data, and wants medical receipts (i.e., receipts scanned at the hospital) to only be stored locally, and not synced. Similarly, Bob uses {\em Notes} to aggregate his documents. As {\em Notes} is set up with Bob's enterprise cloud, he does not wish to sync personal documents (e.g., documents created after work hours). That is, the requirements for {\em what} users want to protect (i.e., relevant data-use scenarios) are user-specific. Further, even when two users may agree on {\em what} they want to protect, they may not agree on {\em how} they want to protect it. Suppose Alice and Bob meet at a conference and exchange business cards. Alice is self-employed, and feels confident in backing up business cards acquired after work hours to her enterprise cloud. However, Bob does not want to disclose networking opportunities to his company by syncing cards collected after work hours to his enterprise cloud. Security preferences for user data stem from the user's personal circumstances. \myparagraph{Problem} In this paper, we focus on the problem of specifying user-specific security policies. The nature of the problem dictates that the policy specification must receive input from the user. However, it is impractical to expect the user to specify the policy for every scenario in an exponential space. Hence, this paper addresses the problem of predicting the security policy for new data-use scenarios, based on the scenarios previously described by the user. \begin{comment} Consider Bob's policy from the motivating example. On his own, Bob may be able to specify a couple of policy scenarios, e.g., {\sf (1)} {\em deny} export of business cards collected after work hours, and {\sf (2)} {\em allow} export of photos. Now consider a new situation where a photo clicked after work hours is being exported. What policy should we apply to this new scenario? One may argue that the mechanism should allow access, as one of Bob's policy rules states that photos can be exported. On the other hand, it is also possible that Bob intended to deny the export of all data collected after hours, but failed to indicate as such specifically for photos. Our approach predicts the security policy when the complete policy specification may not be available. \end{comment} \begin{comment} An immediate challenge in solving this problem is the sample size and distribution of data available to the learner. The training set is bound to be small, as the model for user-specific policies may only use data provide by the specific user. Further, the user may not adhere to a specific probability distribution. Hence, traditional classification algorithms that require large datasets or a known probability distribution to provide meaningful results may not be suitable to solve the problem. \end{comment} \section{The PyBE\xspace Algorithm} \label{sec:algorithm} This section describes our algorithm for predicting policy decisions, and the active learning approach. As stated previously, distance between policy examples is the distance between their scenarios. For simplicity, however, our discussions are in terms of the policy example. Our policy examples (i.e., the scenarios) are Boolean functions over $n$ variables (i.e., tags), denoted by ${\cal B}_n$. However, we restrict our attention to functions that are conjunctions of variables (e.g. $x_1 \wedge x_3 \wedge x_5$). Such a function $f$ can be represented as a set $I(f) \subseteq \{ 1,2,\cdots,n \}$ (e.g., if $f = x_1 \wedge x_3 \wedge x_5$, then $I(f) = \{ 1,3,5 \}$). Our examples belong to this restricted class (denoted by ${\cal P}_n$). We had two requirements for the learning-algorithm to infer policies: {\sf (I):} non-parametric (does not rely on models with a fixed set of parameters). {\sf (II):} easy explanation (easy to present to the user how the policy was inferred). For this reason we chose a variant of the {\it $k$ nearest neighbor (kNN)} classifier~\cite{mur12}. A kNN algorithm simply ``looks at'' the $k$ points in the training set that are nearest to the test input $x$, counts how many members of each class are in the set, and returns that empirical fraction as the estimate. Recall that our goal is to label a policy example $p \in {\cal P}_n$ with the decision $1$ (i.e., {\sf allow}) or $0$ (i.e., {\sf deny}). We are also given a set of examples along with known labels (i.e., policy decisions). Our algorithm is inspired by the kNN algorithm and works as follows: given a new policy example $p \in {\cal P}_n$ with an unknown label, we find the set of $k$ policy examples $N(p) \; = \; \{ p_1,\cdots,p_k \}$ {\em closest} to $p$ according to the metric $\mu$ (described in the next subsection) and then associate the label to $p$ that corresponds to the majority labels of the policy examples in $N(p)$. Our variant of kNN only considers examples at the closest distance for inclusion in $N(p)$. We describe how to address situations where no majority exists in Section~\ref{sec:no-majority}. We use active learning to assist the user in correcting potential labeling errors in the user's policy examples. When we find that certain conditions are not true (e.g., the label of a policy example $q \in {\cal P}_n$ is different from the majority label among its neighbors $N(q)$), we recommend a change in the label~(e.g.,~change {\sf allow} to {\sf deny}). We now describe our metric $\mu$, its weighted form $\mu_w$, and the active learning phase. \subsection{The Metric} \label{sec:metric} Let $f$ and $g$ be two Boolean functions over $n$ variables $x_1,x_2,\cdots,x_n$. A metric between $f$ and $g$ (denoted by $\mu(f,g)$) can be defined as follows: \[ 1 - \frac{\sharp ( f \oplus g )}{2^n} \] Where $\oplus$ represents exclusive-or and $\sharp (h)$ is the number of satisfying assignments of the Boolean function $h$. Recall that computing the number of satisfying assignments of a Boolean function is a hard problem ($\sharp$-P complete~\cite{ab09}). However, for our special case (i.e. policies are conjunctions of variables) this metric is easy to compute. Next we describe the metrics for the functions in the set ${\cal P}_n$. Consider two functions $f_1$ and $f_2$. Let $[n] = \{1,2,\cdots,n\}$. Consider three sets of indices $I_{1,2}$ (indices of variables neither in $f_1$ nor $f_2$), $I^1_2$ (indices of variables in $f_1$ but not in $f_2$) and $I^2_1$ (indices of variables in $f_2$ but not in $f_1$); i.e., $I_{1,2} = [n] \setminus (I(f_1) \cup I(f_2))$, $I^1_2 = I(f_1) \setminus I(f_2)$, and $I^2_1 = I(f_2) \setminus I(f_1)$. An assignment $\sigma$ is a Boolean vector of size $n$ of the form $\langle b_1,b_2,\cdots,b_n \rangle$ and $f(\sigma)$ denotes the value of the function $f$ for assignment $\sigma$. Consider an assignment $\sigma \; = \; \langle b_1,b_2,\cdots,b_n \rangle$ such that $f_1(\sigma) = 1$ and $f_2 (\sigma) = 0$. Then for all $i \in I(f_1)$, $b_i = 1$, and there should be at least one $i \in I^2_1$ such that $b_i = 0$. For $i \in I_{1,2}$, $b_i$ can assume any value. Consider all the indices in $I^2_1$. There should be at least one $j \in I^2_1$, such that $b_j = 0$ (we want $f_2 (\sigma) = 0$). Therefore, the number of satisfying assignments $\sigma$, such that $f_1(\sigma) = 1$ and $f_2 (\sigma) = 0$ is \[ 2^{k_{1,2}} (2^{k_2} - 1) \] where $k_{1,2} = |I_{1,2}|$ and $k_2 = |I^2_1|$. Explanation for the formula is as follows: all variables with indices in the set $I_{1,2}$ can be given any value (resulting in the term $2^{k_{1,2}}$). All the variables with indices in $I^2_1$ can be given any values as long as one of them is $0$, so an assignment where all variables with indices in $I^2_1$ is assigned $1$ is excluded (this results in the term $2^{k_2}-1$). A symmetric argument shows that the number of satisfying assignments $\sigma$ such that $f_1 (\sigma) = 0$ and $f_2 (\sigma) = 1$ is \[ 2^{k_{1,2}} (2^{k_1} - 1) \] where $k_{1,2} = |I_{1,2}|$ and $k_1 = |I^1_2|$. Adding the two terms, we have that $\sharp (f_1 \oplus f_2)$ is $2^{k_{1,2}} (2^{k_1}+2^{k_2}-2)$. Therefore, the metric $\mu (f_1,f_2)$ in this case is: \[ 1 - \frac{2^{k_{1,2}} (2^{k_1}+2^{k_2}-2)}{2^n} \] where $k_{1,2} = |I_{1,2}|$, $k_1 = |I^1_2|$, and $k_2 = |I^2_1|$. Intuitively, $k_1$ is the number of variables that appear in $f_1$ but not in $f_2$, $k_2$ is the number of variables that appear in $f_2$ but not in $f_1$, and $k_{1,2}$ is the number of variables that appear in neither $f_1$ or $f_2$. Let $k = n - k_{1,2}$, which is the number of variables that appear in $f_1$ and $f_2$ (i.e., $k = |I(f_1) \cup I(f_2)|$ ). The metric $\mu (f_1,f_2)$ can be simplified as follows: \[ \mu (f_1,f_2) = 1 - \frac{2^{k_1}+2^{k_2}-2}{2^k} \] Note that higher values of the metric indicate closeness. \begin{comment} Further, recall Bob's example from Section~\ref{sec:overview}. In the unweighted case, the distance metric (i.e., $\mu$) score between \{{\tt Home,Document}\} and \{{\tt Document}\}, as well as between \{{\tt Home,Document}\} and \{{\tt Home,Photo}\} is $0.75$. \end{comment} \subsection{The Weighted Metric} \label{sec:weighted-metric} For security policies, some variables are more important than others; e.g., recall the {\tt Home} tag from Bob's policy in Section~\ref{sec:overview}. To incorporate the importance of variables we introduce a weighted version of our metric. As before, we will consider a Boolean function over $n$ variables $x_1,x_2,\cdots,x_n$. However, in this case we have two weights $w_i^0$ and $w_i^1$ associated with each index $1 \leq i \leq n$. The weight associated with an assignment $\sigma=\langle b_1,\cdots,b_n \rangle$ (denoted as $w(\sigma)$) is \[ \sum_{i=1}^n w_i^0 (1-b_i) + w_i^1 b_i \;. \] Given a set of Boolean assignments $S$, define $w(S)$ as $\sum_{\alpha \in S} w(\alpha)$ -- the sum of weights of all assignments in $S$. Given a Boolean function $f$, $w(f)$ is the weight of the set of satisfying assignments of $f$. Using a simple recursive argument, the weight of all $2^n$ assignments $\{ 0,1 \}^n$ is: \[ \prod_{i=1}^n (w_i^0+w_i^1) \] Given $n$ pair of weights $(w_1^0,w_1^1),\cdots,(w_n^0,w_n^1)$, a weighted metric between two Boolean functions $f$ and $g$ (denoted as $\mu_w(f,g)$) is defined as follows: \[ 1-\frac{w(f \oplus g)}{\prod_{i=1}^n (w_i^0+w_i^1)} \] Note that if for all $i$ we have $w_i^0=w_i^1=1$, we get the previous metric (i.e., the unweighted case). As before, consider two Boolean functions $f_1$ and $f_2$ with index sets $I(f_1)$ and $I(f_2)$. Let the index sets $I_2^1$ and $I_1^2$ be as defined before. Define the following three quantities: \begin{eqnarray*} z_1 & = & \prod_{i \in I_2^1} (w_i^0+w_i^1) \; - \; \prod_{i \in I_2^1} w_i^0 \\ z_2 & = & \prod_{i \in I_1^2} (w_i^0+w_i^1) \; - \; \prod_{i \in I_1^2} w_i^0 \\ z & = & \prod_{i \in I(f_1) \cup I(f_2) } (w_i^0+w_i^1) \end{eqnarray*} The metric $\mu_w (f_1,f_2)$ can be defined as: \[ \mu_w (f_1,f_2) = 1-\frac{z_1+z_2}{z} \] The argument is exactly same as before. The reader can check that for the unweighted case (i.e. for all $i$ we have $w_i^0=w_i^1=1$) we get the previous metric back. \begin{comment} Again, recall Bob's example from Section~\ref{sec:overview}, but for the weighted case. That is, assume {\tt Home} has a weight $2$, whereas the other tags all have the weight $1$. In the weighted case, the distance metric (i.e., $\mu_w$) score between \{{\tt Home,Document}\} and \{{\tt Document}\} is $0.67$, whereas that between \{{\tt Home,Document}\} and \{{\tt Home,Photo}\} is $0.83$, i.e., the examples containing the important tag {\tt Home} are nearer to each other. \end{comment} \myparagraph{Setting weights} Next we describe an algorithm to set weights. Given a set of variables $V \; = \; \{x_1,\cdots,x_n\}$, suppose we are given a partial order $\preceq$ on $V$ (e.g., $x_i \preceq x_j$ means that $x_j$ is more ``important'' than $x_i$). Next we construct a function $L: V \rightarrow [ n ]$ that assigns integers between $1$ and $n$ to each variable in $V$ and has the property that $x_i \preceq x_j$ and $j \not= i$ implies that $L(x_i) > L(x_j)$.\footnote{ Such a function can be constructed by topologically sorting a directed graph whose nodes are $V$ and there is an edge from $x_j$ to $x_i$ ($j \not= i$) iff $x_i \preceq x_j$.} We can assign higher weights $w_i^1$ to variables that have a lower value according to the function $L$ and set all the weights $w_i^0$ to $1$. Note that it is not necessary to precisely define a mechanism for assigning weights, as long as the ordering imposed by $L$ is preserved. \subsection{Active Learning} \label{sec:active-learning} In an ideal scenario, users would provide accurate examples to PyBE\xspace. However, as even expert users may not always be accurate~\cite{yho+14,irc15}, we expect a small margin of error in the policy decisions provided by the user; e.g., a typo resulting in 1 being accidentally marked as 0. We use active learning to find and correct potentially incorrect labels, by asking users to relabel certain chosen examples. The approach of relabeling samples to remove errors has been shown to be effective even with non-experts by prior work~\cite{spi08}. In our approach, the examples and their nearest neighbors are arranged as a graph, which allows us to relabel existing examples in a systematic manner if certain invariants on the graph are not true. In other words, the graph we are about to describe gives us a systematic way to evaluate the conditions that may be indicators of user error, and relabel examples during the active learning phase. Let $G = (V,E,L_V,L_E)$ be a $4$-tuple where $V \subseteq {\cal P}_n$ is the set of labeled policy examples, $E\subseteq V \times V$ is the set of edges, $L_V$ maps each vertex $v \in V$ with a label $1$ (signifying {\sf allow}) and $0$ (signifying {\sf deny}), and $L_E$ labels each edge $e \in E$ with a non-negative real value (i.e., $L_E (v,v')$ is $\mu (v,v')$, which is the distance between the examples $v$ and $v'$). The set of neighbors $N(v)$ of a vertex $v \in V$ is the set $\{ v' \; | \; (v,v') \in E \}$ and intuitively represents all the nearest-neighbors of the policy $v$. \noindent {\bf (Inv-1): Majority label exists.} This invariant states that for all $v \in V$, its set of neighbors $N(v)$ have a majority label (i.e,. more than $\frac{|N(v)|}{2}$ vertices in $N(v)$ have the same label $L_V (v)$). \noindent {\bf (Inv-2): Agreement with the majority label.} This invariant states that if invariant Inv-1 is true, then for every $v \in V$ its label $L_V (v)$ agrees with the majority label of its neighbors $N(v)$. Intuitively we want the graph $G$ corresponding to our policies to satisfy invariants Inv-1 and Inv-2. If the graph $G$ violates either of the invariants, then we recommend relabeling of examples to the user to establish the two invariants. Figure~\ref{fig:invariants} shows instances of the graph for some vertex $p$ that violate the invariants. In Figure~\ref{fig:invariant1}, there is no majority label among $p's$ neighbors, which can be resolved by relabeling either $q$ or $r$. Further, in Figure~\ref{fig:invariant2}, the label on $p$ disagrees with the majority, which can be resolved by relabeling $p$. \begin{figure}[t] \centering \subfloat[][$p$ violates Inv-1, i.e., no majority label]{\includegraphics[width=0.7in]{figs/invariant1}\label{fig:invariant1}}\qquad\qquad \subfloat[][$p$ violates Inv-2, i.e., disagrees with majority label]{\includegraphics[width=0.7in]{figs/invariant2}\label{fig:invariant2}} \caption{NN graph for vertex $p$, consisting of neighbors $q$ and $r$ at the closest distance $d$, violates Inv-1 and Inv-2.} \label{fig:invariants} \vspace{-1em} \end{figure} We use a simple greedy approach to recommend changes, briefly described as follows: Consider a function ${\cal V}(G)$ that counts the total violations of both Inv-1 and Inv-2 in graph $G$. Further, consider a function ${\cal C}(v,G)$ that measures the impact of a potential label change on violations, i.e., returns the decrease in ${\cal V}(G)$ after a temporary change in the label of $v$ (i.e., $L_V (v)$). The label change that causes the maximum decrease in ${\cal V}(G)$ is optimal. Therefore, at each iteration, we find the optimal vertex, $v_{opt}$, by maximizing ${\cal C}(v,G)$ over all $v\in~V\setminus V_{visited}$, where $V_{visited}$ is the set of all vertices that have been recommended to the user previously. We add $v_{opt}$ to $V_{visited}$, and recommend the user to change $L_V (v_{opt})$. If the user accepts, we change $L_V (v_{opt})$. We reiterate until all the vertices are visited or until there are no more violations. Alternately, invariants may also be satisfied by generating additional examples. As our current approach satisfies the objective of using noise for finding potentially incorrect policy decisions, we did not explore this alternative any further. \subsection{Addressing no majority during prediction} \label{sec:no-majority} As described previously, we predict the label for a new example $p$ as the majority label of its nearest neighbors $N(p)$. In case there is no majority label, we use the following method to predict the label: We eliminate the first neighbor that is not a {\em mutual} neighbor, i.e., if there is a labeled example $q$ such that $q \in N(p)$ but $p \notin N(q)$, we remove $q$ from $N(p)$, thereby converging on a majority. In case such elimination is not possible, i.e., if all neighbors in $N(p)$ are mutual neighbors, we deny by default. Our method considers the value of the distance between neighbors to resolve a tie, instead of randomly discarding one example (i.e., by only considering only an odd number of examples in $N(p)$). Our evaluation demonstrates that PyBE\xspace is better than a baseline of random guessing. Finally, such cases of no majority were rarely seen during our evaluation described in Section~\ref{sec:eval}; i.e., less than 6\% test examples had no majority, and less than 3\% were denied by default. However, as these results may be limited to our sample of study participants, we do not make any general claims. \section{Analysis of Results} \label{sec:analysis_of_results} This paper is the first step towards our goal of a policy assistant. As a result, our objective is not only to demonstrate a feasible approach, but also to learn lessons for future work. With this motivation, we performed an in-depth study of our results to identify the general causes of incorrect predictions. We manually analyzed each of the 141 incorrectly predicted test examples. For our analysis, we considered the following information collected during our study: {\sf (1)} the justifications provided by the participants for their policy decisions, {\sf (2)} the example(s) from the specification dataset found nearest to the test example by our algorithm, {\sf (3)} the weights set on each of the tags involved in the test example, and {\sf (4)} all the examples in the specification dataset that contain one or more of the tags included in the test example. The rest of this section describes the four causes of incorrect predictions that we identified. A detailed breakdown of the causes across participants and policies is provided in Table~\ref{tbl:incorrect}. \input{incorrect_tbl} \subsection{Misconfigured Weights} We found that a majority of our incorrect predictions (79 out of 141, or over 56\%) were caused because the weights set by the participants contradicted their actual security preference. We confirmed our findings using justifications from participants that clearly indicated the tag or security preference that influenced their policy decision for a test example. \begin{table}[t] \footnotesize \centering \caption{A subset of policy examples initially specified by \user{1}, which includes only those examples that contain {\tt Work}} \label{tbl:weight_cause} \begin{tabular}{r|l|c} \Xhline{2\arrayrulewidth} {\bf No.} & {\bf Scenario} & {\bf Policy Decision}\\ \Xhline{2\arrayrulewidth} 1 & \{Work, ScannedDocument\} & deny \\ 2 & \{WhiteboardSnapshot, Work\} & deny\\ 3 & \{Work, BusinessCard\} & deny\\ 4 & \{Work, Audio\} & deny\\ 5 & \{Work, Postit\} & deny\\ 6 & \{Work\} & deny\\ 7 & \{Work, CalendarLink\} & deny\\ 8 & \{Work, Receipts\} & deny\\ 9 & \{Photos, Work\} & allow\\ \Xhline{2\arrayrulewidth} \end{tabular} \vspace{-1.5em} \end{table} For instance, consider an incorrect prediction for \user{1} for the {\em PersonalCloud} policy, where PyBE\xspace predicted the policy decision {\sf allow} for \user{1}'s test example \{{\tt WhiteboardSnapshot,Work,ScannedDocument}\}. However, the user provided the ground-truth decision of {\sf deny}, and with the quote ``{\em no work data to personal cloud}''. That is, the tag {\tt Work} was confidential and hence important to \user{1} with respect to the {\em PersonalCloud} policy target. Table~\ref{tbl:weight_cause} shows a subset of the initial examples provided by \user{1}. Observe that all of \user{1}'s examples that contain {\tt Work} (except one) deny export to the {\em PersonalCloud}. This leads us to conclude that \user{1} has consistently thought of {\tt Work} as important with respect to the {\em PersonalCloud}. However, this importance was not reflected in the weights, i.e., \user{1} mistakenly assigned {\tt Work} data a lower weight by ordering it lower than personal data, as we saw previously in Figure~\ref{fig:p1_order}. We investigated further by calculating numerical weights for each tag involved in this incorrect prediction, using \user{1}'s weight orders with the method described in Section~\ref{sec:weighted-metric}. The tag {\tt Work} had a low weight (i.e., 2), compared to other personal tags (e.g., {\tt MedicalFacility}, weight 4). Therefore, rather than being correctly identified as close to the work-related scanned document scenario specified by \user{1} (i.e., {\tt Work, ScannedDocument}), the test example was incorrectly identified as being close to the personal policy examples \{{\tt MedicalFacility,ScannedDocument}\} and \{{\tt WhiteboardSnapshot,MedicalFacility}\}, both of which allowed export to the {\em PersonalCloud}. Hence, the decision was incorrectly predicted as {\sf allow}. On raising the weight of {\tt Work} to 5 (i.e., above personal tags), the test example was correctly found closer to \{{\tt Work,ScannedDocument}\}, resulting in a correct prediction. Note that this increase in weight is not arbitrary, but guided by evidence of the user's security preferences. On correcting all misconfigured weights, we manually confirmed that our overall accuracy rose to 89\%. This includes predictions for \user{2} and \user{5} for whom PyBE\xspace had the lowest accuracy, i.e., most incorrect predictions for these users are due to incorrect weights (which can be fixed), as shown in Table~\ref{tbl:incorrect}. Since misconfigured weights caused the maximum incorrect predictions (79 out of 141, or 56\%), we studied our data to find causes of incorrect weights. We made two interesting observations, described as follows: \emparagraph{Observation 1: Inaccurate predictions resulted from participants only considering privacy preferences when setting weights.} We observed that a large number of inaccuracies occurred when participants did not take their security preferences for specific security policy targets (e.g., {\em PersonalCloud}) into account while setting weights, and set weights only based on their general privacy preferences. However, since participants labeled examples based on their security preferences, this resulted in incorrect predictions. Recall that our participants were provided with the option of setting different weight-group orders for different policy targets in Section~\ref{sec:user_study}. However, all participants (except \user{8}) set only a general order for all 5 policy targets, which only accounted for the their privacy preferences. As a result, higher-weighted personal tags (e.g., {\tt MedicalFacility}, {\tt Home}) had more influence on the policy decision, irrespective of the actual policy target. This phenomenon caused false negatives for personal policy targets such as {\em PersonalCloud} and {\em PersonalEmailApp}, since PyBE\xspace was forced to identify work-related test examples as closer to personal examples, and hence predicted {\sf allow} instead of {\sf deny} (e.g., as seen in \user{1}'s case previously). Note that the number of false positives for the {\em WorkCloud} and {\em WorkEmailApp} policies was lower, as participants generally denied export for random examples. We confirmed that at least 26 incorrect predictions (out of 79 due to weights) were false negatives in predicting the {\em PersonalCloud} and {\em PersonalEmailApp} targets, which were directly caused by the participant considering privacy preferences while setting weights, but security preference (for work data) while labeling examples. \emparagraph{Observation 2: ``Important'' may not just mean confidential.} In at least 14 of the test-examples incorrectly predicted due to weights, participants wanted to set a high weight for a non-confidential tag. From the justifications given by our participants during testing, we realized that participants intended to declassify data if a certain tag were present in the example. This was in complete contrast with the initial understanding of the participants while setting weights, i.e., that confidential tags would have high weights. Thus, applying PyBE\xspace may require careful consideration of what is ``important'', depending on the security goals of the policy. We discuss the lesson learned from this observation in Section~\ref{sec:lessons}. \subsection{Policy Change} A significant minority (30 out of 141, or over 21\%) of our incorrect predictions resulted from a change in the participants' policies, i.e., when participants explicitly disagreed with an earlier assumption they made about their policy. \begin{comment} Consider the test example shown in Listing~\ref{lst:cause_change}, where \user{7}'s justification states that a {\tt Bookmark} created at home is not safe for sharing to the personal cloud. However, an earlier example shown in Listing~\ref{lst:cause_change} suggests that during the initial policy specification, \user{7} chose to share a bookmark created at home over the personal cloud. During our post-testing interview with \user{7}, we confirmed that the participant's policy for the {\tt Bookmark} and {\tt Photos} tags had changed recently. \end{comment} Consider the example of \user{8}, whose policy has changed with respect to the tag {\tt School}. During the initial policy specification, the participant was employed off-campus, and hence assumed the tags {\tt School} and {\tt Work} to have different meanings. Therefore, the policy decisions for school were often different than for work. Between then and the testing phase, the participant changed jobs, and is now employed with the school. As a result, during testing, the participant provided similar policy decisions for work and school, and justified with the quote ``{\em school is work}''. \user{8} admitted to this change during the post-testing interview. In all such cases, we confirmed the policy change with evidence provided by participants in their interviews or justifications. Recall that the participants were provided with an opportunity to indicate a change of mind during the manual review of examples described in Section~\ref{sec:experiments}. All participants changed 35 decisions in total across policies. However, it is clear that participants were unable to find all of their potential changes with a manual review. Thus, a policy assistant may need to account for the participant's change of policy and prepare in advance, as we discuss in Section~\ref{sec:future}. \subsection{Unconfirmed Policy Change} For a small number of incorrect predictions (15 out of 141, or about 11\%), we observed a clear contradiction between the participant's examples during specification and testing, but could not get a confirmation from the participant. Consider \user{8}'s test example \{{\tt SavedToDevice,Audio}\}, where the ground truth label allows export for the {\em WorkCloud} policy. However, all but one of \user{8}'s initially specified examples containing {\tt SavedToDevice} or {\tt Audio} deny export to the work cloud. \user{8}'s justification stated that the participant had ``some level of trust in the work cloud'', which neither confirms nor denies a change of policy. Hence, we classify the cause for such cases as an unconfirmed policy change. \subsection{Tag Confusion} The least number of errors (i.e., 12 out of 141, or about 8.5\%) were caused due to the ambiguity of some tags used in our study. The location or time-based tags (e.g., Home, Work, Afterhours) were intended to indicate the location or time of creation of different classes of data. As we did not place strict constraints on our expert participants, our participants also created examples where such tags could be used on their own (i.e., an example \{{\tt Home}\} would mean data of an unknown type created at home). Justifications indicated that while participants had no trouble understanding the examples they had created in their specifications, some random test examples caused confusion. Less than half of our participants faced this problem, and for a few random text examples. For example, \{{\tt Afterhours,Audio,Document}\} could mean Audio created after hours, and added to a document whose origin is unknown, or a document created after hours, and added to an audio recording whose origin is unknown, and so on. Participants indicated such confusion for specific examples in their justifications during interviews. We describe a simple solution to this problem in Section~\ref{sec:lessons}. Finally, we exclude five incorrectly predicted examples from \user{8}'s test dataset from our categorization. For the examples (3 for {\em PersonalEmailApp} and 2 for {\em WorkEmailApp}), the participant suggested an inability to decide unless they knew the identity of the email receiver, which gave us no information. We did not face this situation with any other user or example. \begin{comment} In case of \user{5}, PyBE\xspace performs slightly worse in predicting the {\em WorkCloud} and {\em WorkEmailApp} policies. This inverse trend is mainly because many of the incorrectly predicted examples result due to misconfigured weights of tags that can be classified as personal data, but are generally considered to be extremely sensitive, and must have higher weights than other personal tags (e.g.,data collected at a Medical Facility). \end{comment} \section{Analysis of Results} \label{sec:analysis_of_results} PyBE\xspace is the first step towards our vision of a policy assistant, and one of our objectives is to learn lessons for future work. With this motivation, we performed an in-depth study of our results to identify the general causes of incorrect predictions. We manually analyzed each of the 141 incorrectly predicted test examples, using the following information collected during our study: {\sf (1)} the justifications provided by the participants for their decisions, {\sf (2)} the nearest neighbors of the test example, {\sf (3)} the weights of the tags involved, and {\sf (4)} all examples from the specification dataset that contain tags in common with the test example. The rest of this section describes the four causes of incorrect predictions that we identified. A detailed breakdown of the causes across participants and policies is provided in Table~\ref{tbl:incorrect} in Appendix~\ref{app:analysis}. \myparagraph{1. Misconfigured Weights} We found that a majority of our incorrect predictions (79 out of 141, or over 56\%) were caused because the weights set by the participants contradicted their actual security preferences. We confirmed our findings using justifications from participants that clearly indicated the tag or security preference that influenced their policy decision for a test example. \begin{table}[t] \scriptsize \centering \caption{A subset of policy examples specified by \user{1}, which includes only those examples that contain {\tt Work}} \vspace{-1em} \label{tbl:weight_cause} \begin{tabular}{r|l|c} \Xhline{2\arrayrulewidth} {\bf No.} & {\bf Scenario} & {\bf Policy Decision}\\ \Xhline{2\arrayrulewidth} 1 & \{Work, ScannedDocument\} & deny \\ 2 & \{WhiteboardSnapshot, Work\} & deny\\ 3 & \{Work, BusinessCard\} & deny\\ 4 & \{Work, Audio\} & deny\\ 5 & \{Work, Postit\} & deny\\ 6 & \{Work\} & deny\\ 7 & \{Work, CalendarLink\} & deny\\ 8 & \{Work, Receipts\} & deny\\ 9 & \{Photos, Work\} & allow\\ \Xhline{2\arrayrulewidth} \end{tabular} \vspace{-2em} \end{table} For instance, consider an incorrect prediction for \user{1} for the {\em PersonalCloud} policy, where PyBE\xspace predicted the policy decision {\sf allow} for \user{1}'s test example \{{\footnotesize \tt WhiteboardSnapshot,Work,ScannedDocument}\}. The user provided the ground-truth decision of {\sf deny}, and with the quote ``{\em no work data to personal cloud}''. That is, the tag {\tt Work} was confidential and hence important to \user{1} with respect to the {\em PersonalCloud} policy target. This preference is also consistent for all but one of \user{1}'s examples containing {\tt Work}, as shown in Table~\ref{tbl:weight_cause}. Thus, we can conclude that \user{1} has consistently considered {\tt Work} as important for the {\em PersonalCloud}. However, this importance was not reflected in the weights, i.e., \user{1} mistakenly assigned {\tt Work} data a lower weight (i.e., weight 2) by ordering it lower than personal data (i.e., weight 4), as we saw previously in Figure~\ref{fig:p1_order}. This resulted in the test example being matched with personal examples (e.g., \{{\tt MedicalFacility,ScannedDocument}\}) that allowed export for PersonalCloud. \begin{comment} Table~\ref{tbl:weight_cause} shows a subset of the initial examples provided by \user{1}. Observe that all of \user{1}'s examples that contain {\tt Work} (except one) deny export to the {\em PersonalCloud}. This leads us to conclude that \user{1} has consistently thought of {\tt Work} as important with respect to the {\em PersonalCloud}. However, this importance was not reflected in the weights, i.e., \user{1} mistakenly assigned {\tt Work} data a lower weight by ordering it lower than personal data, as we saw previously in Figure~\ref{fig:p1_order}. \end{comment} \begin{comment} We investigated further by calculating numerical weights for each tag involved in this incorrect prediction, using \user{1}'s weight orders with the method described in Section~\ref{sec:weighted-metric}. The tag {\tt Work} had a low weight (i.e., 2), compared to other personal tags (e.g., {\tt MedicalFacility}, weight 4). Therefore, rather than being correctly identified as close to the work-related scanned document scenario specified by \user{1} (i.e., {\tt Work, ScannedDocument}), the test example was incorrectly identified as being close to the personal policy examples \{{\tt MedicalFacility,ScannedDocument}\} and \{{\tt WhiteboardSnapshot,MedicalFacility}\}, both of which allowed export to the {\em PersonalCloud}. Hence, the decision was incorrectly predicted as {\sf allow}. \end{comment} On raising the weight of {\tt Work} to 5 (i.e., above personal tags), the test example was correctly found closer to \{{\tt Work,ScannedDocument}\}, resulting in a correct prediction of {\sf deny}. Note that this increase in weight is not arbitrary, but guided by evidence of the user's security preferences. On correcting all misconfigured weights, we manually confirmed that our overall accuracy rose to 89\%. This includes most predictions for \user{2} and \user{5} for whom PyBE\xspace had the lowest accuracy. Since misconfigured weights caused the maximum incorrect predictions (79 out of 141, or 56\%), we investigated further, and made two interesting observations: \emparagraph{Observation 1: Inaccurate predictions resulted from participants only considering privacy preferences when setting weights.} Recall that our participants were provided with the option of setting different weight-group orders for different policy targets in Section~\ref{sec:user_study}. All participants (except \user{8}) set only a general order for all 5 policy targets, which only accounted for the their privacy preferences. As a result, higher-weighted personal tags (e.g., {\tt MedicalFacility}, {\tt Home}) had more influence on the policy decision, irrespective of the actual policy target. However, participants labeled examples based on their policy target-specific security preferences (e.g., no work to {\em PersonlCloud}. This resulted in incorrect predictions, as seen in \user{1}'s example previously. Note that this phenomenon occurs only because our tags are semantically related to the policy targets (e.g., {\tt Work} to {\em WorkCloud}). We confirmed that at least 26 incorrect predictions (out of 79 due to weights) were false negatives in predicting the {\em PersonalCloud} and {\em PersonalEmailApp} targets, because participants considers privacy for weights, and security for labeling. \begin{comment} Recall that our participants were provided with the option of setting different weight-group orders for different policy targets in Section~\ref{sec:user_study}. However, all participants (except \user{8}) set only a general order for all 5 policy targets, which only accounted for the their privacy preferences. As a result, higher-weighted personal tags (e.g., {\tt MedicalFacility}, {\tt Home}) had more influence on the policy decision, irrespective of the actual policy target. This phenomenon caused false negatives for personal policy targets such as {\em PersonalCloud} and {\em PersonalEmailApp}, since PyBE\xspace was forced to identify work-related test examples as closer to personal examples, and hence predicted {\sf allow} instead of {\sf deny} (e.g., as seen in \user{1}'s case previously). Note that the number of false positives for the {\em WorkCloud} and {\em WorkEmailApp} policies was lower, as participants generally denied export for random examples. We confirmed that at least 26 incorrect predictions (out of 79 due to weights) were false negatives in predicting the {\em PersonalCloud} and {\em PersonalEmailApp} targets, which were directly caused by the participant considering privacy preferences while setting weights, but security preference (for work data) while labeling examples. \end{comment} \emparagraph{Observation 2: ``Important'' may not just mean confidential.} In at least 14 of the test-examples incorrectly predicted due to weights, participants wanted to set a high weight for a non-confidential tag, i.e., to declassify data if a certain tag were present in the scenario. This was in complete contrast with the initial understanding of the participants while setting weights, i.e., that confidential tags would have high weights. \begin{comment} This was in complete contrast with the initial understanding of the participants while setting weights, i.e., that confidential tags would have high weights. Thus, applying PyBE\xspace may require careful consideration of what is ``important'', depending on the security goals of the policy. We discuss the lesson learned from this observation in Section~\ref{sec:lessons}. \end{comment} \myparagraph{2. Policy Change} A significant minority (30 out of 141, or over 21\%) of our incorrect predictions resulted from a change in the participants' policies, i.e., when participants explicitly disagreed with an earlier assumption. For example, \user{8}'s policy changed for the tag {\tt School}. During the initial specification, \user{8} assumed {\tt School} and {\tt Work} to be different due to off-campus employment. However, before testing, \user{8} started working at the school, which resulted in similar decisions for {\tt School} and {\tt Work}. \user{8} admitted to this change during the post-testing interview. All cases in this category were similarly confirmed. \myparagraph{3. Unconfirmed Policy Change} For a small number of incorrect predictions (15 out of 141, or about 11\%), we observed a clear contradiction between the participant's examples during specification and testing, but could not get a confirmation from the participant. For example, for \user{8}'s test example \{{\tt SavedToDevice,Audio}\}, the ground truth label allows export for the {\em WorkCloud} policy, but all except one of \user{8}'s initially specified examples containing {\tt SavedToDevice} or {\tt Audio} deny export to the {\em WorkCloud}. Without additional information, we classify such contradictions as unconfirmed policy changes. \myparagraph{4. Tag Confusion} The least number of errors (i.e., 12 out of 141, or about 8.5\%) were caused due to the ambiguity of some tags used in our study. The location or time-based tags (e.g., Home, Work, Afterhours) were intended to indicate the location or time of creation of different classes of data. However, as we did not place strict constraints on our expert participants, our participants also created examples where such tags could be used by themselves (i.e., the scenario \{{\tt Home}\} would mean data of an unknown type created at home). Justifications indicated that while participants had no trouble understanding the examples they had created, some random test examples caused confusion. Less than half of our participants faced this problem, and for a few random text examples. For example, \{{\tt Afterhours,Audio,Document}\} could mean Audio created after hours, and added to a document whose origin is unknown, or a document created after hours, and added to an audio recording whose origin is unknown, and so on. Finally, we exclude five incorrectly predicted examples from \user{8}'s test dataset from our categorization. For the examples (3 for {\em PersonalEmailApp} and 2 for {\em WorkEmailApp}), the participant suggested an inability to decide unless they knew the identity of the email receiver, which gave us no information. We did not face this situation with any other user or example. \begin{comment} In case of \user{5}, PyBE\xspace performs slightly worse in predicting the {\em WorkCloud} and {\em WorkEmailApp} policies. This inverse trend is mainly because many of the incorrectly predicted examples result due to misconfigured weights of tags that can be classified as personal data, but are generally considered to be extremely sensitive, and must have higher weights than other personal tags (e.g.,data collected at a Medical Facility). \end{comment} \section{Conclusion} \label{sec:conc} We introduced the paradigm of Policy by Example (PyBE\xspace) for user-specific policy specification. PyBE\xspace enables users to express data-use scenarios in policy examples, and predicts policy decisions for new scenarios. A salient aspect of PyBE\xspace is its active learning approach for engaging users in finding and potentially incorrect policy decisions in their examples. In our feasibility study with expert users, PyBE\xspace demonstrated over 76\% prediction accuracy, and better average performance than a baseline and a naive approach. A significant finding was that PyBE\xspace's interactive approach was five times as effective as a manual review in finding errors. Finally, we analyzed our incorrect predictions and learned lessons that motivate future research in this promising new domain. \subsection{Data Collection} \label{sec:user_study} This section describes the approach used for collecting the policy examples and weights from participants, the scripts for which can be found in Appendix~\ref{app:examples_script} and Appendix~\ref{app:weights_script} respectively. \myparagraph{1. Collecting Policy Examples} Participants were provided with our predefined tags, but were also allowed to create their own tags. Participants were instructed that they could combine tags into complex scenarios for creating examples. We placed no constraint on the number of example scenarios each participant could provide. For each scenario, participants were required to label policy decisions for the 5 targets described previously in Table~\ref{tbl:policy}. Note that we collected labels for two more targets, but discarded them before testing to reduce user fatigue. A preliminary analysis of the examples collected from our participants let to two interesting observations: {\sf (1)} Our participants created a total of 31 unique tags, out of which about 58\% (or 23) were specific to individual participants, while only 7 tags were commonly used by all in their examples, and {\sf (2)} Out of the 246 example scenarios collected across participants, over 76\% were specific to individual participants, and only 7 were common among all 8 participants. These observations indicate that relevant {\em data-use scenarios may be unique to the individual, even among student researchers from the same research lab}, further motivating our research into generating user-specific policies for user-specific data. \begin{comment} Note that although we allowed our participants to create tags to get complex security policies, non-experts may not need to create tags under ordinary circumstances. We discuss ideas for collecting policy examples from non-experts in Section~\ref{sec:future}. \end{comment} \myparagraph{2. Obtaining Weights} On average, each participant used about 14 unique tags in their examples. As ordering a large number of tags can be tiring, we categorized tags into semantic groups. The participants were provided with this semantic grouping, and were {\sf (1)} first allowed to customize group memberships of tags as per their understanding (e.g., Figure~\ref{fig:tag_groups} in Appendix~\ref{app:weights_script}), and then {\sf (2)} instructed to provide a partial order over the groups in a spreadsheet, as seen in the partial order created by \user{1} in Figure~\ref{fig:p1_order}. Participants were provided with a basic partial order generated by the authors, and could start from scratch, or customize the order we provided to generate their own custom order. \begin{figure}[t] \centering \includegraphics[width=1.2in]{figs/response_order} \vspace{-0.5em} \caption{Screenshot of \user{1}'s ordering of tag groups.} \label{fig:p1_order} \vspace{-1em} \end{figure} We confirmed each partial order relation by reading it out to the user. For example, for \user{1}, we asked if ``Personal data is more important than Work data'', to confirm {\tt Work;Personal} shown in Figure~\ref{fig:p1_order}. The orders were then used to generate weights as described in Section~\ref{sec:weighted-metric}. Further, participants were informed that they could provide different partial orders for different policies, but most participants chose to keep a single general order. We describe the impact of this decision in Section~\ref{sec:analysis_of_results}. \begin{comment} \begin{lstlisting}[basicstyle=\ttfamily\scriptsize,float=tp,caption={Participant-generated partial order on tag groups.},belowcaptionskip=-6mm,label=lst:context-ordering,emph={RULE,GROUPS},emphstyle=\bfseries] # RULE: If i<-j, then j is more important than i # GROUPS: {Finance,Medical,Work,Personal,Documents,History,Notes,Recordings,Todo} Medical<-Finance Work<-Medical \end{lstlisting} \end{comment} \subsection{Experiments} \label{sec:experiments} This section describes the experiments used for identifying user errors and testing prediction for randomly generated scenarios, the scripts for which can be found in Appendix~\ref{app:review_script} and Appendix~\ref{app:testing_script} respectively. \myparagraph{1. Identifying Errors} \begin{lstlisting}[basicstyle=\ttfamily\scriptsize,float=tp,caption={A suggestion made by the PyBE\xspace algorithm during the interactive review process.},belowcaptionskip=-6mm,label=lst:suggestion,emph={Suggestion},emphstyle=\bfseries] Suggestion: For {Note}, WorkCloud = DENY. Agree?(y/n) \end{lstlisting} The review of examples was carried out 3 months after the initial specification, as most participants were unavailable over the summer break. We performed a two-step experiment to help participants identify and correct errors in their policy decisions. First, participants performed a manual review of their initial specification. Participants were provided with a spreadsheet containing their policy examples (one sheet per policy target), and could change any policy decision they desired. For each update, participants were instructed to indicate a cause to justify the change (e.g., correcting an error, change of mind, inability to decide). Finally, participants provided a justification for each change (e.g., ``Work is confidential''), providing the helpful context for analyzing the results (Section~\ref{sec:analysis_of_results}). After the manual review, we performed a PyBE\xspace-assisted review using the approach described in Section~\ref{sec:active-learning}. We treat each participant-policy combination as a separate policy specification problem; hence, a separate review was performed for each such case (i.e., 8 users and 5 policies make 40 total cases). As we used the changed examples from the manual review; any errors discovered using this approach were additional. Our algorithm presented the participant with a series of suggestions (i.e., examples with corrected policy decisions, as shown in Listing~\ref{lst:suggestion}). If the participant accepted the suggestion, we confirmed with the participant that the original decision was in error, and recorded it as an error found by PyBE\xspace. If the participant rejected, we asked for a short justification to understand the participant's policy preferences. We stopped at 15 suggestions for each participant-policy case to limit fatigue. \myparagraph{2. Testing with Random Examples} For each participant, we randomly generated $n/2$ new policy scenarios, where $n$ was the number of scenarios initially provided by the participant. The random scenarios were created with the tags used in the participant's initial examples. The intuition is that the tags provided by the participant are relevant to the participant, hence scenarios composed of them must be relevant as well. To mitigate labeling fatigue, the random scenarios included at most 3 tags. Participants provided the ground truth policy decisions for their test scenarios, for each of the five policy targets. Apart from indicating ``Allow'' or ``Deny'', participants were also provided the ``I don't know'', in which case we substituted the scenario with another random test scenario. We predicted the policy decision for each test scenario using our algorithm. We then asked participants to confirm their decisions for incorrect predictions, provide short justifications, and conducted short, informal interviews that helped us gain insight into the decisions. \begin{comment} For incorrect predictions, participants were asked to confirm their decisions and provide short justifications. After concluding the testing experiment, we conducted a short informal interview to gain insight into the participant's decisions, which helped us analyze our results in Section~\ref{sec:analysis_of_results}. \end{comment} \subsection{Data Collection} \label{sec:user_study} \vspace{-0.5em} This section describes the approach used for collecting the policy examples and weights from participants, the scripts for which can be found in Appendix~\ref{app:examples_script} and Appendix~\ref{app:weights_script} respectively. \myparagraph{1. Collecting Policy Examples} Participants were provided with our predefined tags, but were also allowed to create their own tags. Participants were instructed that they could combine tags into complex scenarios for creating examples. We placed no constraint on the number of example scenarios each participant could provide. For each scenario, participants were required to label policy decisions for the 5 targets described previously in Table~\ref{tbl:policy}. Note that we collected labels for two more targets, but discarded them before testing to reduce user fatigue. A preliminary analysis of the examples collected from our participants let to two interesting observations: {\sf (1)} Our participants created a total of 31 unique tags, out of which about 58\% (or 23) were specific to individual participants, while only 7 tags were commonly used by all in their examples, and {\sf (2)} Out of the 246 example scenarios collected across participants, over 76\% were specific to individual participants, and only 7 were common among all 8 participants. These observations indicate that relevant {\em data-use scenarios may be unique to the individual, even among student researchers from the same research lab}, further motivating our research into generating user-specific policies for user-specific data. \begin{comment} Note that although we allowed our participants to create tags to get complex security policies, non-experts may not need to create tags under ordinary circumstances. We discuss ideas for collecting policy examples from non-exerts in Section~\ref{sec:future}. \end{comment} \myparagraph{2. Obtaining Weights} On average, each participant used about 14 unique tags in their examples. As ordering a large number of tags can be tiring, we categorized tags into semantic groups. The participants were provided with this semantic grouping, and were {\sf (1)} first allowed to customize group memberships of tags as per their understanding (e.g., Figure~\ref{fig:tag_groups} in Appendix~\ref{app:weights_script}), and then {\sf (2)} instructed to provide a partial order over the groups in a spreadsheet (e.g., \user{1}'s partial order in Figure~\ref{fig:p1_order}). Participants were provided with a basic partial order generated by the authors, and could start from scratch, or customize the order we provided to generate their own custom order. We confirmed each partial order relation by reading it out to the user; e.g., by asking if ``j is more important than i'' to confirm {\tt i;j}. We then transformed the orders to weights using the approach described in Section~\ref{sec:weighted-metric}. \begin{figure}[t] \centering \includegraphics[width=1.2in]{figs/response_order} \vspace{-0.5em} \caption{Screenshot of \user{1}'s ordering of tag groups.} \label{fig:p1_order} \vspace{-1em} \end{figure} Further, participants were informed that they could provide different partial orders for different policies, but most participants chose to keep a single general order. We describe the impact of this decision in Section~\ref{sec:analysis_of_results}. \begin{comment} \begin{lstlisting}[basicstyle=\ttfamily\scriptsize,float=tp,caption={Participant-generated partial order on tag groups.},belowcaptionskip=-6mm,label=lst:context-ordering,emph={RULE,GROUPS},emphstyle=\bfseries] # RULE: If i<-j, then j is more important than i # GROUPS: {Finance,Medical,Work,Personal,Documents,History,Notes,Recordings,Todo} Medical<-Finance Work<-Medical \end{lstlisting} \end{comment} \vspace{-1em} \subsection{Experiments} \label{sec:experiments} \vspace{-0.5em} This section describes the experiments used for identifying user errors and testing prediction for randomly generated scenarios, the scripts for which can be found in Appendix~\ref{app:review_script} and Appendix~\ref{app:testing_script} respectively. \myparagraph{1. Identifying Errors} \begin{lstlisting}[basicstyle=\ttfamily\scriptsize,float=tp,caption={A suggestion made by the PyBE\xspace algorithm during the interactive review process.},belowcaptionskip=-6mm,label=lst:suggestion,emph={Suggestion},emphstyle=\bfseries] Suggestion: For {Note}, WorkCloud = DENY. Agree?(y/n) \end{lstlisting} The review of examples was carried out 3 months after the initial specification, as most participants were unavailable over the summer break. We performed a two-step experiment to help participants identify and correct errors in their policy decisions. First, participants performed a manual review of their initial specification. Participants were provided with a spreadsheet containing their policy examples (one sheet per policy target), and could change any policy decision they desired. For each update, participants were instructed to indicate a cause to justify the change (e.g., correcting an error, change of mind, inability to decide). Finally, participants provided a justification for each change (e.g., ``Work is confidential''), providing the helpful context for analyzing the results (Section~\ref{sec:analysis_of_results}). After the manual review, we performed a PyBE\xspace-assisted review using the approach described in Section~\ref{sec:active-learning}. We treat each participant-policy combination as a separate policy specification problem; hence, a separate review was performed for each such case (i.e., 8 users and 5 policies make 40 total cases). As we used the changed examples from the manual review; any errors discovered using this approach were additional. Our algorithm presented the participant with a series of suggestions (i.e., examples with corrected policy decisions, as shown in Listing~\ref{lst:suggestion}). If the participant accepted the suggestion, we confirmed with the participant that the original decision was in error, and recorded it as an error found by PyBE\xspace. If the participant rejected, we asked for a short justification to understand the participant's policy preferences. We stopped at 15 suggestions for each participant-policy case to limit fatigue. \myparagraph{2. Testing with Random Examples} For each participant, we randomly generated $n/2$ new policy scenarios, where $n$ was the number of scenarios initially provided by the participant. The random scenarios were created with the tags used in the participant's initial examples. The intuition is that the tags provided by the participant are relevant to the participant, hence scenarios composed of them must be relevant as well. To mitigate labeling fatigue, the random scenarios included at most 3 tags. Participants provided the ground truth policy decisions for their test scenarios, for each of the five policy targets. Apart from indicating ``Allow'' or ``Deny'', participants were also provided the ``I don't know'', in which case we substituted the scenario with another random test scenario. We predicted the policy decision for each test scenario using our algorithm. We then asked participants to confirm their decisions for incorrect predictions, provide short justifications, and conducted short, informal interviews that helped us gain insight into the decisions. \section{Future Directions} \label{sec:future} Our evaluation of PyBE\xspace demonstrates feasibility with expert users, and shows promise for further exploration in this area. In this section, we discuss two future research directions, namely {\sf (1)} adapting PyBE\xspace for non-experts and {\sf (2)} adapting to change in policy decisions. \subsection{Adapting PyBE\xspace for non-experts} Measuring the usability of PyBE\xspace with non-experts is a natural direction for future research. We make the following recommendations for tasks that may be performed differently for non-experts. \subsubsection{Collecting examples} To ease the burden of creating tags, non-experts may be provided with a large and diverse collection of tags (e.g., the 40 tags obtained in our study) as a baseline for specifying examples. Further, user-friendly user interfaces may be required for non experts. We are actively considering the concept of ``interactive dropdowns'' to collect examples~\cite{jkkg10a,jkkg10b}. Further, non-experts cannot be expected to specify examples without a user interface as expert users did in Section~\ref{sec:user_study}. A challenge for future work is to acquire policy examples without burdening the user. We are actively considering the approach of using ``interactive dropdowns'' to collect examples, as described in prior work on usable policy authoring~\cite{jkkg10a,jkkg10b}. \subsubsection{Collecting Weights} Collecting weights from non-experts while reducing user-burden is another challenge for future work. Our approach for setting weights (described in Section~\ref{sec:weighted-metric}) allows users to describe relative tag weights in terms of partial order relations on tags. To improve the usability of this approach we are considering using visual ``sliders'' for weight collection, which will allow users to easily select more precise weights. Additionally, incorporating PyBE\xspace into an existing system may require careful consideration of run-time overrides. That is, power-users may want to override policy decisions predicted by PyBE\xspace during runtime, or provide feedback. The advantage of incorporating such overriding mechanism is that the user's correct decision may be added to the user's policy examples to improve future predictions. The challenge is of indicating to the user that a prediction has been made, while causing minimum interference with the user's task. \begin{comment} Minor challenges: 3. Conflict resolution: While we collected the specification dataset only once for our study, in reality, the user may modify their specification whenever they please. The conflict-resolution routine may have to execute whenever the dataset is modified. For usability, we may need to remember user's response to recommendations between subsequent executions. While the following does not directly concern PyBE\xspace, it still is an important point: 4. Runtime predictions: Depending on user preference, users may want to override certain decisions at runtime. The enforcement system must then ask the user to update the policy specification. \end{comment} \subsection{Adapting to Change in Policy Decisions} Section~\ref{sec:analysis_of_results} shows that over 21\% incorrect predictions were due to change in the participant's policy. Future research may be directed at solving the problem of detecting potential change in policy from current examples. Our intuition is that while detecting change in some cases may be impossible without external input (e.g., change in policy for {\tt Work} data due to loss of employment), there is potential in evaluating solutions to this problem for other cases. We describe three challenges in this area, as follows: \subsubsection{Identifying the causes of policy change} Identifying and studying the causes of change in security policy is a precondition for demarcating the line between policy changes that can and cannot be addressed with machine learning. A longitudinal user study may need to be performed to find if users change policies frequently, and to identify the causes, as prior work has done for file access control policies~\cite{sg09}. \subsubsection{Identifying the time of policy change} Identifying when a policy change happens is hard without any input from the user. One approach to address this challenge is to encourage users to report policy changes. Future work may take lessons from persuasive technologies that change user behavior and motivate users to participate in the desired activity~\cite{cml09,mc12,pgb+10}. \subsubsection{Identifying the example(s) to change} Instead of waiting for the user to indicate change, the learner may be able to use existing information (e.g., tag weights, frequency in examples) to detect what example or tag may be subject to change. Our intuition is that strategies used for cache replacement (e.g., least recently used or LRU~\cite{sj94}) may be applicable to this domain, at least as a starting point. Finally, active learning may also be used to suggest new examples to the user, which is not the focus of this paper. Instead, the focus of PyBE\xspace is on predicting the user's policy decisions for new scenarios. Generating new examples lies in the broader scope for future work. \section{Future Directions} \label{sec:future} \vspace{-0.5em} Our evaluation of PyBE\xspace demonstrates feasibility, and shows promise for further exploration in this area. We now discuss two future directions, namely {\sf (1)} adapting PyBE\xspace for non-experts and {\sf (2)} adapting to change. \myparagraph{Adapting PyBE\xspace for non-experts} Measuring the usability of PyBE\xspace with non-experts is a natural direction for future research. Additionally, we make the following recommendations for tasks that may be performed differently for non-experts. \emparagraph{1. Collecting examples:} To ease the burden of creating tags, non-experts may be provided with a large and diverse collection of tags (e.g., the 40 tags obtained in our study) as a baseline for specifying examples. Further, usable interfaces may be considered for non experts (e.g., ``interactive dropdowns''~\cite{jkkg10a,jkkg10b} to collect examples). \emparagraph{2. Collecting Weights:} Collecting weights from non-experts is another challenge for future work. Future work may consider using visual ``sliders'' for weight collection, for precise and usable weight assignments. \emparagraph{3. System Deployment:} PyBE\xspace may be incorporated into existing systems which protect user data from disclosure to the network (e.g., Weir~\cite{naej16} and Aquifer~\cite{ne13}). On such systems, users may want to override policy predictions by PyBE\xspace at runtime, or provide feedback, requiring a trusted path between the user and PyBE\xspace. A feedback mechanism may also improve future predictions. \begin{comment} Minor challenges: 3. Conflict resolution: While we collected the specification dataset only once for our study, in reality, the user may modify their specification whenever they please. The conflict-resolution routine may have to execute whenever the dataset is modified. For usability, we may need to remember user's response to recommendations between subsequent executions. While the following does not directly concern PyBE\xspace, it still is an important point: 4. Runtime predictions: Depending on user preference, users may want to override certain decisions at runtime. The enforcement system must then ask the user to update the policy specification. \end{comment} \myparagraph{Adapting to Change} Future research may be directed at detecting potential change in the policy from current examples. While detecting change in some cases may be impossible without external input, there is potential in evaluating solutions in other cases. We describe three challenges in this area: \emparagraph{1. Identifying the causes of policy change:} Identifying and the causes of change in the security policy is a precondition for understanding what can and cannot be addressed with machine learning. Lessons from prior work for file access policy stability may apply here~\cite{sg09}. \emparagraph{2. Identifying the time of policy change:} Identifying when a policy change happens is hard without any input from the user. One approach to address this challenge is to encourage users to report policy changes, by taking lessons from persuasive technologies~\cite{cml09,mc12,pgb+10}. \emparagraph{3. Identifying the example(s) to change:} The learner may be able to use existing information (e.g., tag weights, frequency in examples) to predict which example or tag may be likely to change. Our intuition is that strategies used for cache replacement (e.g., least recently used or LRU~\cite{sj94}) may apply, at least as a starting point. Finally, active learning may also be used to suggest new examples to the user, which is not the focus of this paper, and lies in the broader scope for future work. \section{Introduction} \label{sec:intro} In the era of pervasive computing, security of user data and resources is of paramount importance. Increasingly complex systems such as IoT platforms (e.g., IFTTT~\cite{tt10} and SmartThings~\cite{smartthings}), smartphone platforms (e.g., Android and iOS), and even traditional commodity platforms are being leveraged for processing user data. However, our knowledge of policy specification has not kept pace with the rise of complex systems that are increasingly relying on the user to specify the security policy. Further, user data has become increasingly user-specific. Users no longer directly deal with generic files, but create specific data objects such as notes, whiteboard snapshots, and selfies. This data is abstract, i.e., its importance and properties are subjective. System designers or application developers cannot specify a security policy for abstract user data. The situation is even critical for novel security systems that provide strong data security guarantees for user data (e.g., decentralized information flow control (DIFC) systems for Android~\cite{ne13,jaf+13,xw15,naej16}, Chromium~\cite{bcj+15}). Such systems are impractical to deploy unless users specify security policies; and users are bad at specifying security policies~\cite{shc+09,mr05} without assistance. This paper raises the simple but important question of policy specification: how to teach the system {\em what} the user wants to protect, and {\em how} the user wants to protect it? Consider the following example: a smartphone user wants to synchronize all personal notes with her cloud account, except notes labeled as medical data. Since we are dealing with user-specific data-use scenarios, we can justifiably expect the user to provide some input to the system. However, expecting the user to enumerate every possible scenario involving medical data is impractical. The policy must be predicted. We propose the approach of specifying Policy by Example (PyBE\xspace) for user-specific data. PyBE\xspace is inspired by the successful use of programming by example (PBE) for program synthesis. Specifically, we emulate the approach of Gulwani~\cite{gul11}, where the user specifies examples consisting of the input and output, and the system learns a program that can predict the output for unknown (but similar) inputs. Similarly, in PyBE\xspace, the user specifies policy examples, in terms of the data-use scenario (i.e., the input) and the policy decision (i.e., the output). The system uses the policy examples to predict policy decisions for new scenarios. By requiring only relevant examples, and not complete policy specification, PyBE\xspace makes policy specification tractable. Predicting security policies for abstract, user-specific data with unknown properties is hard, as the learner cannot make any assumptions about the input data points. In contrast, prior work on predicting privacy policies for well-known private data~\cite{khsc08,cms11} can make assumptions that aid prediction; e.g., Cranshaw et al.~\cite{cms11} take advantage of probabilistic models to learn location privacy policies knowing that location and time are continuous variables. PyBE\xspace cannot make any such assumptions, which puts us at a significant disadvantage. However, this disadvantage drove us to embrace a simpler approach that does not demand specific properties from data. We chose a variant of the {\it $k$ nearest neighbor (kNN)} classifier~\cite{mur12} for predicting policies. Our key requirements were that the algorithm must be {\sf (1)} non-parametric, i.e., independent of probabilistic models that rely on fixed set of parameters, and {\sf (2)} easy to explain, i.e., for the user to understand how the policy was inferred. Recall that a policy example is composed of a scenario and the policy decision for that scenario. For predicting the policy decision for a new scenario, our algorithm performs a nearest neighbor search for finding similar scenarios from the user's policy examples, and predicts the policy decision of the majority. An important challenge in applying kNN is calculating the distance between data points. For calculating the distance between policy examples, we treat scenarios as Boolean functions, and propose a novel distance metric for Boolean functions. Further, we recognize that some policies may be more important to the user than others, and extend our metric to support weights. Note that existing distance metrics (e.g., {\em jaccard} distance) would require significant re-engineering to incorporate weights, which motivates our development of a new metric. PyBE\xspace recognizes that policy specification by users in any form is error prone. A key contribution is our use of active learning for enabling the user to correct policy decisions. We draw inspiration from the work of Gulwani~\cite{gul11}, which detects noise in the user's examples, and prompts the user for new outputs for problematic examples. Similarly, PyBE\xspace uses noise in the user's policy examples as an indication of error in policy decisions, and engage the user in correcting errors. We evaluate the feasibility of PyBE\xspace with a study of expert users. Our study involves 8 participants, and 5 target security policies. As a result, we solve 40 independent policy specification problems. Our participants generate 246 policy scenarios in total (30 on average), and assign policy decisions for 5 policies, resulting in a total of 1,230 policy examples across participants. We perform two experiments with this data. First, we compare the errors in policy decisions found using a manual review and a PyBE\xspace-assisted interactive review of policy examples. Then, we test PyBE\xspace's prediction for randomly generated scenarios with unknown policy decisions. PyBE\xspace demonstrates a prediction accuracy of over 76\% across all participants, and fares better than our assumed baseline of a random coin flip, and a naive approach. A significant finding is that our interactive review approach (i.e., using active learning) helps participants find {\em five times} as many errors as their manual reviews. Our evaluation characterizes the feasibility, i.e., the effectiveness of PyBE in terms of both prediction accuracy and error identification, but does not speak to the general usability of PyBE. While 8 participants may seem small for a human study, the evaluation is able to answer important questions through the analysis of user-generated tags and policy examples (i.e., 1,230 user generated examples). The research questions answered in the evaluation operate at the level of policy examples, making the data set sufficiently large for evaluating feasibility. \begin{comment} PyBE\xspace demonstrates a prediction accuracy of over 76\% across all users. More importantly, PyBE\xspace fares better on average than our assumed baseline of a random coin flip, and a naive approach of predicting the majority decision from the training data. A significant finding is that our interactive review approach (i.e., using active learning) helps participants find {\em five times} as many errors as their manual reviews. \end{comment} The contributions of this paper are as follows: \begin{itemize} \item We introduce the Policy by Example (PyBE\xspace) paradigm for predicting user-specific security policies. Our approach takes labeled policy scenarios from the user, and predicts labels (i.e., decisions) for new policy scenarios, thereby making policy specification a tractable problem. \item We use an interactive approach to assist users in finding incorrect policy decisions in their examples. We empirically demonstrate its effectiveness over manual policy reviews. \item We perform a feasibility study with expert users, and demonstrate 76\% average prediction accuracy. PyBE\xspace performs better than both a baseline as well as a naive approach. \end{itemize} This paper is the first step in our vision of a policy assistant for user data. With PyBE\xspace, we provide an approach for predicting security policies for user-specific data, and demonstrate its technical feasibility. Further, we analyze our incorrect predictions, and describe the lessons we learned in the process. Finally, we describe challenges (e.g., usability for non-experts, modeling policy change) and future research directions in this promising new area. The remainder of this paper proceeds as follows: Section~\ref{sec:relwork} describes related work. Section~\ref{sec:motivation} motivates and defines the problem. Section~\ref{sec:pbe} provides an overview of our approach. Section~\ref{sec:algorithm} describes the PyBE\xspace algorithm. Section~\ref{sec:eval} describes the evaluation of PyBE\xspace, and Section~\ref{sec:results} discusses results. Section~\ref{sec:analysis_of_results} describes our analysis of results, and Section~\ref{sec:lessons} describes the lessons learned. Section~\ref{sec:future} details directions and challenges for future research. Section~\ref{sec:discussion} discusses threats to validity. Section~\ref{sec:conc} provides concluding remarks. \section{Introduction} \label{sec:intro} In the era of pervasive computing, security of user data and resources is of paramount importance. Increasingly complex systems such as IoT platforms (e.g., IFTTT~\cite{tt10} and SmartThings~\cite{smartthings}), smartphone platforms (e.g., Android and iOS), and even traditional commodity platforms are being leveraged for processing user data. However, our knowledge of policy specification has not kept pace with the rise of complex systems that are increasingly relying on the user to specify the security policy. Further, user data has become increasingly user-specific. Users no longer directly deal with generic files, but create specific data objects such as notes, whiteboard snapshots, and selfies. This data is abstract, i.e., its importance and properties are subjective. System designers or application developers cannot specify a security policy for abstract user data. The situation is even critical for novel security systems that provide strong data security guarantees for user data (e.g., decentralized information flow control (DIFC) systems for Android~\cite{ne13,jaf+13,xw15,naej16}, Chromium~\cite{bcj+15}). Such systems are impractical to deploy unless users specify security policies; and users are bad at specifying security policies~\cite{shc+09,mr05} without assistance. This paper raises the simple but important question of policy specification: how to teach the system {\em what} the user wants to protect, and {\em how} the user wants to protect it? Consider the following example: a smartphone user wants to synchronize all personal notes with her cloud account, except notes labeled as medical data. Since we are dealing with user-specific data-use scenarios, we can justifiably expect the user to provide some input to the system. However, expecting the user to enumerate every possible scenario involving medical data is impractical. The policy must be predicted. We propose the approach of specifying Policy by Example (PyBE\xspace) for user-specific data. PyBE\xspace is inspired by the successful use of programming by example (PBE) for program synthesis. Specifically, we emulate the approach of Gulwani~\cite{gul11}, where the user specifies examples consisting of the input and output, and the system learns a program that can predict the output for unknown (but similar) inputs. Similarly, in PyBE\xspace, the user specifies policy examples, in terms of the data-use scenario (i.e., the input) and the policy decision (i.e., the output). The system uses the policy examples to predict policy decisions for new scenarios. By requiring only relevant examples, and not complete policy specification, PyBE\xspace makes policy specification tractable. Predicting security policies for abstract, user-specific data with unknown properties is hard, as the learner cannot make any assumptions about the input data points. In contrast, prior work on predicting privacy policies for well-known private data~\cite{khsc08,cms11} can make assumptions that aid prediction; e.g., Cranshaw et al.~\cite{cms11} take advantage of probabilistic models to learn location privacy policies knowing that location and time are continuous variables. PyBE\xspace cannot make any such assumptions, which puts us at a significant disadvantage. However, this disadvantage drove us to embrace a simpler approach that does not demand specific properties from data. We chose a variant of the {\it $k$ nearest neighbor (kNN)} classifier~\cite{mur12} for predicting policies. Our key requirements were that the algorithm must be {\sf (1)} non-parametric, i.e., independent of models that rely on fixed set of parameters, and {\sf (2)} easy to explain, i.e., for the user to understand how the policy was inferred. Recall that a policy example is composed of a scenario and the policy decision for that scenario. For predicting the policy decision for a new scenario, our algorithm performs a nearest neighbor search for finding similar scenarios from the user's examples, and predicts the policy decision of the majority. To calculate distance between scenarios, we treat scenarios as Boolean functions, and propose a novel distance metric for Boolean functions. As some policies may be relatively more important to the user, we extend our metric to support weights. Note that existing distance metrics (e.g., {\em jaccard} distance) may require significant re-engineering to incorporate weights, which motivates our development of a new metric. \begin{comment} An important challenge in applying kNN is calculating the distance between data points. For calculating the distance between policy examples, we treat scenarios as Boolean functions, and propose a novel distance metric for Boolean functions. Further, we recognize that some policies may be more important to the user than others, and extend our metric to support weights. Note that existing distance metrics (e.g., {\em jaccard} distance) would require significant re-engineering to incorporate weights, which motivates our development of a new metric. \end{comment} PyBE\xspace recognizes that policy specification by users in any form is error prone. A key contribution is our use of active learning for enabling the user to correct policy decisions. We draw inspiration from the work of Gulwani~\cite{gul11}, which detects noise in the user's examples, and prompts the user for new outputs for problematic examples. Similarly, PyBE\xspace uses noise in the user's policy examples as an indication of error in policy decisions, and engage the user in correcting errors. We evaluate the feasibility of PyBE\xspace with a study of expert users. Our study involves 8 participants, and 5 target security policies. As a result, we solve 40 independent policy specification problems. Our participants generate 246 policy scenarios in total (30 on average), and assign policy decisions for 5 policies, resulting in a total of 1,230 policy examples across participants. We perform two experiments with this data. First, we compare the errors in policy decisions found using a manual review and a PyBE\xspace-assisted interactive review of policy examples. Then, we test PyBE\xspace's prediction for randomly generated scenarios with unknown policy decisions. PyBE\xspace demonstrates a prediction accuracy of over 76\% across all participants, and fares better than our assumed baseline of a random coin flip, and a naive approach. A significant finding is that our interactive review approach (i.e., using active learning) helps participants find {\em five times} as many errors as their manual reviews. Our evaluation characterizes the feasibility, i.e., the effectiveness of PyBE in terms of both prediction accuracy and error identification, but does not speak to the general usability of PyBE. While 8 participants may seem small for a human study, the evaluation is able to answer important questions through the analysis of user-generated tags and policy examples (i.e., 1,230 user generated examples). The research questions answered in the evaluation operate at the level of policy examples, making the data set sufficiently large for evaluating feasibility. \begin{comment} PyBE\xspace demonstrates a prediction accuracy of over 76\% across all users. More importantly, PyBE\xspace fares better on average than our assumed baseline of a random coin flip, and a naive approach of predicting the majority decision from the training data. A significant finding is that our interactive review approach (i.e., using active learning) helps participants find {\em five times} as many errors as their manual reviews. \end{comment} The contributions of this paper are as follows: \begin{itemize} \item We introduce the Policy by Example (PyBE\xspace) paradigm for predicting user-specific security policies. Our approach takes labeled policy scenarios from the user, and predicts labels (i.e., decisions) for new policy scenarios, thereby making policy specification a tractable problem. \item We use an interactive approach to assist users in finding incorrect policy decisions in their examples. We empirically demonstrate its effectiveness over manual policy reviews. \item We perform a feasibility study with expert users, and demonstrate 76\% average prediction accuracy. PyBE\xspace performs better than both a baseline as well as a naive approach. \end{itemize} This paper is the first step in our vision of a policy assistant for user data. With PyBE\xspace, we provide an approach for predicting security policies for user-specific data, and demonstrate its technical feasibility. Further, we analyze our incorrect predictions, and describe the lessons we learned in the process. Finally, we describe challenges (e.g., usability for non-experts, modeling policy change) and future research directions in this promising new area. \begin{comment} The remainder of this paper proceeds as follows: Section~\ref{sec:relwork} describes related work. Section~\ref{sec:motivation} motivates and defines the problem. Section~\ref{sec:pbe} provides an overview of our approach. Section~\ref{sec:algorithm} describes the PyBE\xspace algorithm. Section~\ref{sec:eval} describes the evaluation of PyBE\xspace, and Section~\ref{sec:results} discusses results. Section~\ref{sec:analysis_of_results} describes our analysis of results, and Section~\ref{sec:lessons} describes the lessons learned. Section~\ref{sec:future} details directions and challenges for future research. Section~\ref{sec:discussion} discusses threats to validity. Section~\ref{sec:conc} provides concluding remarks. \end{comment} \section{Lessons} \label{sec:lessons} In this section, we describe lessons we learned from our study with expert users. These lessons address aspects of correctly using PyBE\xspace in practice, and also motivate problems for future work. \begin{comment} \begin{figure}[t] \centering \includegraphics[width=3in]{figs/equalizer} \caption{Setting weights using a graphic equalizer, by asking the question ``How frequently would you export this data to the Work Cloud?''} \label{fig:policy-equalizer} \end{figure} \end{comment} \lessonparagraph{Lesson 1: Weight assignment should reflect security, and not just general privacy preferences.} As seen in our study, the policy (target) may be semantically related to the tags (e.g., work data is more confidential with respect to the {\em PersonalCloud}). A generic weight assignment for multiple policies is bound to be inaccurate. \lessonparagraph{Lesson 2: Addressing the problem of ``potential'' change in the user's policy is imperative.} As we discovered in our study (described in Section~\ref{sec:analysis_of_results}), the user may change some or all of their security policy goals, but never inform the policy assistant. Thus, adapting to potential change in the user's policy is a major requirement, and a challenge for future work. \lessonparagraph{Lesson 3: There might be more than one notion of ``importance'' depending on the security goals.} During our study, we observed instances where participants wanted to assign more importance to non-confidential data. As our study was conducted with strong security requirements in mind, we did not account for such cases. Incorporating such a requirement into PyBE\xspace is feasible, although the numeric limits on weights of the confidential and non-confidential tags must reflect the security goals; i.e., if security is a priority, then the maximum possible weight for the most confidential tag should be higher than that for the most non-confidential tag. If usability is a priority, then the most non-confidential tag may a receive higher weight. \lessonparagraph{Lesson 4: Tag semantics should be carefully considered while applying PyBE\xspace.} A small number of our incorrect predictions were due to ambiguity associated with specific tags as described in Section~\ref{sec:analysis_of_results}. That is, tags were defined such that \{{\tt Work,Photo}\} could mean photo created at work, as well as some work data and an unrelated photo combined. One simple solution could be to use a separate representation to denote data created at a particular location or time. For example, a photo created at work may have the tag {\tt WorkPhoto}, while a derived data object containing unidentified work data and a photo from an unknown location forms \{{\tt Work,Photo}\}. This solution and its implications will be explored in the future. \section{Motivation and Problem} \label{sec:motivation} User data and data-use scenarios are user-specific. External observers such as system designers or application developers cannot specify the user's security policy without knowing the user's context of data use~\cite{nis04,bdmn06}. Moreover, this constraint is not limited to user-owned data; prior work demonstrates that even the security preferences for enterprise data vary with users and personal data-use contexts~\cite{gs10}. Our motivating example demonstrates how two users may differ in terms of the relevance of data-use scenarios as well as security preferences for the same scenarios. We then describe the problem addressed by this paper. \subsection{Motivating Example} Alice and Bob are two smartphone users, who use a fictional note-taking application {\em Notes} (similar to Google Keep) on their smartphones to collect and organize information. Consider two data-use scenarios for Alice and Bob, as follows: \subsubsection*{Scenario 1} Alice consolidates expenses by scanning paper receipts into the {\em Notes} application, which then syncs the receipts with Alice's cloud provider (such as Google Drive). Alice trusts the cloud with most information, with the exception of medical data. Hence, when Alice scans a receipt from the hospital, she still wants to store it locally with {\em Notes}, but does not want it exported to the cloud. Similarly, Bob uses {\em Notes} to aggregate all documents, i.e., data created or scanned using the smartphone and saved as documents using {\em Notes}. Bob's notes are backed up to Bob's enterprise cloud by default. Bob wants to backup all notes, except personal documents created after work hours. \subsubsection*{Scenario 2} Alice and Bob meet at a conference and exchange business cards. As Alice is self-employed, she feels confident in backing up all business cards acquired after work hours to her enterprise cloud. Bob, on the other hand, does not want to disclose networking opportunities to his company. Hence, Bob does not want business cards collected after work hours to be backed up to the enterprise cloud. \myparagraph{Observations} We make two observations from the scenarios: \begin{enumerate}[label=\textbf{O\arabic*},ref=\textbf{O\arabic*}] \setlength{\itemsep}{0pt} \item \label{lesson:what} {\em User data and data-use scenarios are diverse.} As seen in Scenario 1, different users may have different answers for what scenarios/conditions are applicable to them. Alice cares about medical receipts, which may not be relevant to Bob, who in turn cares about personal documents. \item \label{lesson:how} {\em Security preferences for user data stem from the user's personal circumstances}. Even if two users face the same scenario, they may not make the same decision on how they want to protect their data. In Scenario 2, Alice and Bob both collect business cards after work hours, but make different choices based on their respective employment situations. \end{enumerate} \subsection{The Problem} In this paper, we focus on the problem of specifying user-specific security policies. The nature of the problem dictates that the policy specification must receive input from the user. However, it is impractical to expect the user to specify the policy for every scenario in an exponential space. Hence, this paper addresses the problem of predicting the security policy for new data-use scenarios, based on the scenarios previously described by the user. \begin{comment} Consider Bob's policy from the motivating example. On his own, Bob may be able to specify a couple of policy scenarios, e.g., {\sf (1)} {\em deny} export of business cards collected after work hours, and {\sf (2)} {\em allow} export of photos. Now consider a new situation where a photo clicked after work hours is being exported. What policy should we apply to this new scenario? One may argue that the mechanism should allow access, as one of Bob's policy rules states that photos can be exported. On the other hand, it is also possible that Bob intended to deny the export of all data collected after hours, but failed to indicate as such specifically for photos. Our approach predicts the security policy when the complete policy specification may not be available. \end{comment} \begin{comment} An immediate challenge in solving this problem is the sample size and distribution of data available to the learner. The training set is bound to be small, as the model for user-specific policies may only use data provide by the specific user. Further, the user may not adhere to a specific probability distribution. Hence, traditional classification algorithms that require large datasets or a known probability distribution to provide meaningful results may not be suitable to solve the problem. \end{comment} \section{Policy by Example (PyBE\xspace)} \label{sec:pbe} \begin{comment} \begin{figure}[t] \centering \includegraphics[width=2.8in]{figs/overview} \caption{Overview of the PyBE\xspace approach.} \label{fig:overview} \vspace{-1em} \end{figure} \end{comment} \begin{figure}[t] \centering \subfloat[][The user specifies examples. PyBE\xspace suggests error-correction.]{\includegraphics[width=1.2in]{figs/overview_a}\label{fig:overview_a}}\qquad \subfloat[][PyBE\xspace predicts policy decisions for new scenarios.]{\includegraphics[width=1.4in]{figs/overview_b}\label{fig:overview_b}} \vspace{-0.8em} \caption{An overview of the PyBE\xspace approach.} \label{fig:overview} \vspace{-1.5em} \end{figure} PyBE\xspace is inspired by recent work on Programming by Examples~\cite{gul11}, which learns a program from input-output examples. As shown in Figure~\ref{fig:overview_a}, the user provides policy examples (i.e., data-use scenarios and policy decisions), and PyBE\xspace interactively suggests corrections to the user's policy decisions. PyBE\xspace then predicts policy decisions for new scenarios as shown in Figure~\ref{fig:overview_b}. This section provides the intuition behind our approach. We describe PyBE\xspace formally in Section~\ref{sec:algorithm}. We start by describing the structure of a policy example. \subsection{The Policy Example} \label{sec:policy-example} A policy example is composed of a {\em scenario}, and a {\em policy decision} (i.e., {\sf allow}/1 or {\sf deny}/0) for that scenario. A scenario is as a set of {\em tags}, where each tag denotes the resource to be protected (e.g., business card) or a condition that influences the policy (e.g., created after work hours). Using a set of tags enables users to describe complex scenarios composed multiple conditions or data objects. Our use of tags is motivated by prior work that demonstrates that users can effectively re-purpose organizational tags to express access control policies~\cite{klms+12}. In addition to the user-customizable policy example, we also define a fixed policy {\em target} which represents the action controlled by the policy; e.g., exporting data to the enterprise cloud, i.e., the {\em WorkCloud} policy target. Policy specification is performed separately for each policy target, i.e., independent of other targets. Thus, each target represents a separate high-level policy that must be specified (e.g., the user's {\em WorkCloud} policy). The policy targets used in this paper are motivated by prior work on restricting the network export of secret data~\cite{sym+14,bcj+15,naej16}. \begin{table}[t] \footnotesize \centering \caption{Bob's examples for the {\em WorkCloud} policy.} \vspace{-0.5em} \label{tbl:bob-policy} \begin{tabular}{l|c|c} \Xhline{2\arrayrulewidth} {\bf No.} & {\bf Scenario} & {\bf Policy Decision}\\ \Xhline{2\arrayrulewidth} 1 & \{Home, Photo\} & deny \\ 2 & \{Work, Photo\} & allow \\ 3 & \{Document\} & allow \\ \Xhline{2\arrayrulewidth} \end{tabular} \vspace{-1.5em} \end{table} Table~\ref{tbl:bob-policy} shows Bob's policy examples for the {\em WorkCloud} policy target. We describe each example, along with Bob's security requirement associated with it. First, Bob considers data created at home to be personal, so Bob's photos created at home must never be exported to the enterprise cloud. Thus, Bob denies export for example~1, i.e, \{{\tt Home,Photos}\}. Second, photos taken at work may be exported to the enterprise cloud. Hence, Bob allows export for example~2, i.e., \{{\tt Work,Photos}\}. Third, Bob does not (currently) imagine a situation where he would deny export for documents. Hence, Bob allows export for example~3, i.e., \{{\tt Document}\}. We now use Bob's examples to informally describe PyBE\xspace. Our algorithm is formally described in Section~\ref{sec:algorithm}. \subsection{Our Approach} \label{sec:overview} As described previously, PyBE\xspace uses a variation of the kNN algorithm for predicting policies. That is, Bob provides PyBE\xspace with a set of policy examples (i.e., scenarios labeled with policy decisions). When faced with a new scenario with an unknown policy decision, we perform a nearest neighbor search of Bob's examples. That is, we search Bob's examples for the closest examples, i.e., examples with scenarios closest to the new scenario, and predict the policy decision of the majority of the closest examples. Note that distance between examples is described in terms of their scenarios (i.e., when we say ``examples are close'', it means their scenarios are close). An approach for predicting security policies should be deterministic if we want users to understand its outcome (i.e., independent of arbitrary parameters). Based on this rationale, we eliminate the need to specify the parameter $k$. Our variation of kNN considers the {\em closest} neighbors as all neighbors at the closest distance, instead of k neighbors at varying distances. We now demonstrate our approach with a manual walk-through. A manual walk-through is feasible because the basic process of kNN is intuitive and its outcome is easy to explain. To demonstrate our approach, we predict policy decisions for the following new scenarios for Bob: \{{\tt Home}\} and \{{\tt Home,Document}\}, using Bob's initial policy specification shown in Table~\ref{tbl:bob-policy}. Consider the first new scenario, \{{\tt Home}\}. Just by looking at Bob's specification in Table~\ref{tbl:bob-policy}, the reader may identify example~1 (i.e., \{{\tt Home,Photo}\}) as closest to the new scenario, since it is the only example that includes the tag {\tt Home}. As a result, we predict the policy decision for the new scenario {\tt \{Home\}} as {\sf deny}, i.e., as the decision of its nearest neighbor \{{\tt Home,Photo}\}. This decision mirrors Bob's assumption of data created at home being personal, and not exportable to the enterprise cloud. PyBE\xspace's distance metric described in Section~\ref{sec:algorithm} uses a similar property for computing distance between two examples, and comes to the same conclusion. Now consider the second new scenario, \{{\tt Home,Document}\}. This time, there are two examples that seem to be equally close to the new scenario, i.e., \{{\tt Home,Photo}\} and \{{\tt Document}\}, since they each have one tag in common with \{{\tt Home,Document}\}. Since both the nearest examples have different policy decisions, our simple metric is insufficient. This is one of the motivations for introducing weights. Suppose Bob considers personal data created at home (i.e., the tag {\tt Home}) to be most confidential. Therefore, Bob assigns {\tt Home} more ``importance'' (i.e., a higher weight) than any other tag in terms of its influence on the policy decision. As a result, the new scenario \{{\tt Home,Document}\} can be deemed closer to \{{\tt Home,Photo}\} than \{{\tt Document}\}, as {\tt Home} has a higher weight and more say in the decision than the other tags, e.g., {\tt Document}. Thus, export is denied for \{{\tt Home,Document}\}, which aligns with Bob's preference of data created at home being personal, and not exportable to the enterprise cloud. The purpose of weights is not limited to breaking ties. Suppose Bob specifies another example \{{\tt Document,Receipt}\} with decision {\sf allow}. Now consider another new scenario \{{\tt Document,Receipt,Home}\}. Without any knowledge of weights, it is easy to see that \{{\tt Document,Receipt}\} would be the example closest to the new scenario \{{\tt Document,Receipt,Home}\}, resulting in {\sf allow} being predicted (i.e., there is no tie). At the same time, we know that Bob has allocated a higher weight to {\tt Home}, since Bob considers home data to be confidential and important with respect to the {\em WorkCloud} target. The weights ensure that \{{\tt Document,Receipt,Home}\} is closer to \{{\tt Home,Photo}\} instead of \{{\tt Document,Receipt}\}, and export is denied as per Bob's actual security preference. Simply stated, weights enable the user to make some information tags beat others in the distance calculation. Our weighted metric described in Section~\ref{sec:weighted-metric} uses a similar reasoning. \begin{table}[t] \footnotesize \centering \caption{Bob's extended set of examples for the {\em WorkCloud} policy target, with newly added examples in {\bf bold}.} \vspace{-1em} \label{tbl:bob-policy-revised} \begin{tabular}{l|c|c} \Xhline{2\arrayrulewidth} {\bf No.} & {\bf Scenario} & {\bf Policy Decision}\\ \Xhline{2\arrayrulewidth} 1 & \{Home, Photo\} & deny \\ 2 & \{Work, Photo\} & allow \\ 3 & \{Document\} & allow \\ {\bf 4} & \{{\bf Home, Document}\} & {\bf deny} \\ {\bf 5} & \{{\bf Home, Memo}\} & {\bf allow} \\ \Xhline{2\arrayrulewidth} \end{tabular} \vspace{-1em} \end{table} An important contribution of PyBE\xspace is that it recognizes that policy specification by users can be error-prone. PyBE\xspace uses active learning to engage the user in finding and correcting potential errors in their policy decisions. Our approach is inspired by the work of Gulwani~\cite{gul11}, which detects noise in the user's input-output examples, and recommends changes to incorrect outputs. Similarly, PyBE\xspace looks for noise in the user's examples, which may indicate one or more incorrect policy decisions. We use our variant of kNN for this purpose. Note that the objective of this task is to engage the user in finding errors in existing examples, and not to predict policy decisions for new examples. We explain our approach with the following extension to Bob's policy: Suppose Bob adds two additional examples, i.e., \{{\tt Home,Document}\} with decision {\sf deny}, and \{{\tt Home,Memo}\} with decision {\sf allow}. We borrow the first example (i.e., for a document created at home) from the previous discussion on weights. The second example shows Bob's policy for a memo created at home. Further, recall that {\tt Home} has a higher weight, hence examples containing {\tt Home} will be closer to each other than other examples not containing {\tt Home}. Bob's complete set of examples is shown in Table~\ref{tbl:bob-policy-revised}. We perform a nearest neighbor search for the example \{{\tt Home, Memo}\}, and identify \{{\tt Home, Photo}\} and \{{\tt Home, Document}\} as its nearest neighbors. An intuitive way of visualizing this group of examples is in the form of a graph, such that {\sf (1)} the examples are vertices, and {\sf (2)} directed edges are drawn from the example for whom the search was performed to its nearest neighbors. Figure~\ref{fig:nn-graph-a} shows the graph for \{{\tt Home, Memo}\}. \begin{figure}[t] \centering \includegraphics[width=2in]{figs/nn-graph-a} \vspace{-0.5em} \caption{\{{\tt Home, Memo}\} disagrees with the majority policy decision of its nearest neighbors.} \label{fig:nn-graph-a} \vspace{-1.5em} \end{figure} \begin{figure}[t] \centering \includegraphics[width=2in]{figs/nn-graph-c} \vspace{-0.5em} \caption{ There is no majority policy decision among the nearest neighbors of \{{\tt Home, Photo}\}. } \label{fig:nn-graph-c} \vspace{-1.5em} \end{figure} If we focus on the policy decisions of the vertices in Figure~\ref{fig:nn-graph-a}, we see that Bob's decision for \{{\tt Home, Memo}\} (i.e., {\sf allow}) disagrees with the decision for both its nearest neighbors. This inconsistency or noise indicates one of two possibilities: {\sf (a)} Bob made a mistake in labeling \{{\tt Home, Memo}\} with the decision {\sf allow}, or {\sf (b)} Bob wanted to make a genuine exception for memos. Instead of making a guess, PyBE\xspace asks Bob. That is, we recommend Bob to label \{{\tt Home,Memo}\} as {\sf deny} for resolving this inconsistency, Bob may accept our recommendation, or reject it and make an exception. Using such interactive recommendations, PyBE\xspace engages Bob in correcting potential errors. Figure~\ref{fig:nn-graph-c} shows the nearest neighbor graph for \{{\tt Home,Photo}\}, and illustrates another type of inconsistency. In this case, there is no majority consensus among the neighbors of \{{\tt Home,Photo}\}. A similar situation exists in the graph for \{{\tt Home,Document}\}, which we do not show due to space constraints. If we look at the two graphs in Figure~\ref{fig:nn-graph-a} and Figure~\ref{fig:nn-graph-c}, we realize that changing the policy decision of \{{\tt Home,Memo}\} removes both the inconsistencies. Thus, PyBE\xspace capitalizes on the possibility that a few examples may cause the most noise, and recommends the user to change their labels. In our algorithm described in Section~\ref{sec:active-learning}, we describe graph invariants to identify noise, and a greedy algorithm to find the optimal change. Section~\ref{sec:results} demonstrates that our interactive approach finds {\em five times} as many errors as manual reviews by users. Note that we do not claim to detect all errors, as the users' examples may be completely consistent, but may still have errors. Instead, we recommend a best effort approach for engaging the user in detecting potential errors. \begin{comment} In fact, similar graphs can be drawn for the \{{\tt Home, Photo}\} and \{{\tt Home, Document}\}, as shown in Figure~\ref{fig:nn-graph-b} and Figure~\ref{fig:nn-graph-c} respectively. \centering \subfloat[][\{{\tt Home, Memo}\} disagrees with its majority neighbors]{\includegraphics[width=1.5in]{figs/nn-graph-a}\label{fig:nn-graph-a}}\\ \subfloat[][There is no majority in the neighbors of \{{\tt Home, Photo}\}]{\includegraphics[width=1.5in]{figs/nn-graph-b}\label{fig:nn-graph-b}}\quad \subfloat[][There is no majority in the neighbors of \{{\tt Home, Document}\}]{\includegraphics[width=1.5in]{figs/nn-graph-c}\label{fig:nn-graph-c}} \caption{Nearest neighbor graph for the example scenarios \{{\tt Home, Memo}\}, \{{\tt Home, Photo}\} and \{{\tt Home, Document}\}. The vertices are examples, and edges are drawn from the example for whom the nearest neighbor search was performed, to its nearest neighbors. Vertices are labeled with their policy decisions.} \label{fig:nn-graph} \end{figure} \end{comment} \section{Related Work} \label{sec:relwork} The notion of Policy by Example (PyBE\xspace) is directly influenced by recent work in the domain of Programming by Example (PBE).\footnote{Also sometimes called Programming by Demonstration} The objective of PBE is simple: if the user knows the steps in performing a task, the user should not have to write a program; instead, the computer should learn from the user's actions on an example, and generalize a corresponding program~\cite{ch93,lie01}. However, the user may not always be able to express the reasoning, or the intermediate steps, involved in creating a program (i.e., converting an input to the desired output). Gulwani~\cite{gul11} makes PBE a feasible approach for such programming tasks, where the user may only have the input and the corresponding output for each example, by using only input-output examples to synthesize a program that predicts outputs for unseen inputs (e.g., creating Excel macros). PyBE\xspace follows a similar intuition, and predicts the policy decisions using only input-output examples provided by the users, in the form of policy scenarios (i.e., the input) and decisions (i.e., the outputs). However, PyBE\xspace does not generalize the program, as is often done in PBE. That is, while the proposed paradigm is conceptually similar to PBE, the process used to predict policies borrows from another well-established domain, that of case-based reasoning~\cite{kol93}. In case-based reasoning, the outcome of a test case is predicted by directly looking at the outcomes of previously observed cases (e.g., legal reasoning). In a way, case-based reasoning mimics a human expert's reasoning. PyBE\xspace's logic of predicting the decision for a test scenario based on the decisions of ``similar'' previously specified scenarios is a form of case-based reasoning, and the reason we use this approach is the uncertainty involved in predicting policies for abstract data. Case-based reasoning provides a way to deal with uncertainty. Prior approaches for predicting user-specific privacy policies for well-known private data (e.g., Location data) use inductive learning, which requires the learner to choose a direction for generalization, generally based on some known properties of the data points~\cite{khsc08,cms11}. For example, However, case-based reasoning provides a way to deal with uncertainty, i.e., for scenarios such as ours where the properties of the input data points (i.e., abstract user data) are unknown. That is, the approach does not create a generalization apriori, instead preferring to \begin{comment} In PBE, the system records the repetitive interactions between the user and a user interface, and generalizes a program to represent the set of user actions~\cite{,lie01}. PBE teaches the computer a program, i.e., new behavior expected by the user, through the demonstration of the user's actions on an example. However, providing intermediate steps in a program may require expert knowledge. Gulwani~\cite{gul11} makes PBE a feasible approach for programming tasks where the user may only have the input and the corresponding output for each example (e.g., creating Excel macros). PyBE\xspace follows the same intuition, and predicts the output of a program (i.e., policy decisions) using only input-output examples provided by the users, in the form of policy scenarios (i.e., the input) and decisions (i.e., the outputs). \end{comment} In this section, we describe prior work on automatic customization of privacy policies. Additionally, we discuss the complementary areas of languages for expressing security policies, enforcement of security policies, and the usability of policy interfaces. \subsection{Automatic customization of privacy policies} The proposals for user-controllable learning of security and privacy policies~\cite{khsc08,cms11} are closely related to our vision of a security policy assistant. Simply stated, user-controllable learning allows the user to actively participate in policy customization, which is also an objective of PyBE\xspace. However, our objective is to specify policies for abstract user-specific data objects (e.g., Bob's office documents), while prior work on user-controllable learning specifies policies for well-known private data or security preferences (e.g., Location data). As a result, PyBE\xspace cannot make any assumptions about the properties of the data to be protected while making predictions. On the contrary, user-controllable learning leverages well-known properties of data for predicting policies. For instance, Cranshaw et al.~\cite{cms11} use a probabilistic model for prediction of location privacy policies, with the underlying assumption that a large number of data points would be available since location and time are continuous variables. PyBE\xspace's approach of treating data or conditions as abstract objects is necessary for policy specification for user-specific data. Machine learning has frequently been used to tag user content for access control~\cite{vscy09,sslw11,slb13,bbzl15,slsw15}. For instance, Sinha et al.~\cite{slb13} predict privacy preferences for Facebook users by classifying Facebook posts into various Facebook sharing policies. PyBE\xspace supports finer-grained policies, where different classes of content (i.e., tags) do not directly map to security policy decisions, but can instead be combined by the user into different policy scenarios. However, such prior approaches are complementary, as their content recognition techniques can be leveraged to automatically tag content for PyBE\xspace. Applications such as {\em Google Photos} use similar methods to tag content~\cite{google-photos}, and may also be used for PyBE\xspace. Prior work in configuring mobile privacy settings states that even if a one-size-fits-all configuration is infeasible, a small set of privacy profiles may still be helpful~\cite{lls14,llsh14}. For example, Liu et al. study the configuration of 12 Android permissions across 4.8 million users, and cluster the permission settings into a small number of privacy profiles that apply to large populations~\cite{lls14}. The approach works for Android permissions as every user configures the {\em same} Android permissions, although differently. However, user data is abstract and user-specific, and so is its security value to the user. Hence PyBE\xspace's user-specific approach may be more appropriate for user data. Finally, Fang and LeFevre propose a ``privacy wizard'' for setting social network policies~\cite{fl10}. The approach uses active learning to specify data sharing policies with respect to the user's friends. A significant difference is that the active learning approach used by the privacy wizard assumes independence among attributes of data points (i.e., friends). A similar assumption may not be appropriate for the data involved in user data scenarios. That is, the policy decision for a scenario formed by combining tags may be a property of all the tags combined. Therefore, our kNN-based approach is more appropriate, as it does not assume attribute independence. \subsection{Languages for expressing security policies} To protect user data held by applications, prior research has provided application developers with tools for expressing their security and access control policies~\cite{ek08,he08,hjr10,sxwx14}. Efstathopoulos and Kohler~\cite{ek08} provide a policy description language for applications, to describe their policy for the Asbestos decentralized information flow control (DIFC) system~\cite{vek+07}. The policy expressed by developers is compiled into low-level Asbestos primitives. Boat~\cite{he08} provides similar support for generating policy for the Flume DIFC model~\cite{kyb+07}, while Harris et al.~\cite{hjr10} automatically instrument programs with DIFC policy. Further, Slankas et al.~\cite{sxwx14} aid the developer by extracting access control rules from application-specific text artifacts using natural language processing (NLP). Such prior work provides developers with the means to compartmentalize the application and implement correct access control policies within the application. While these measures may indirectly benefit the user, they do not address the lack of policy specification from the user's perspective. \subsection{Enforcement of security policies} In this paper, we allow the specification of policies using example scenarios that may involve more than one tag, i.e., may indicate information derived from multiple sources, or the existence of multiple conditions. A large body of research in access and information flow control enforces the propagation of tags to enable labeling of derived content~\cite{bl76,cfg+87,ml97,vek+07,kyb+07,afb+12,ne13,xw15,bcj+15,naej16}. For instance, Aquifer~\cite{ne13} and the approach by Jia et al~\cite{jaf+13} provide policy models for enabling the data secrecy on Android. Maxoid~\cite{xw15} and Weir~\cite{naej16} extend these prior works by making enforcement of such guarantees practical on Android. Further, Bauer et al~\cite{bcj+15} provide a policy and enforcement model for information flow control on the Chromium Web browser. Prior work also motivates and enforces the policies similar to the network export control policy targets used as examples in this paper~\cite{naej16, sym+14}. This paper advances the deployment of these novel systems by making their policy specification feasible. \subsection{Usability of policy interfaces} Johnson et al.~\cite{jkkg10a,jkkg10b} propose an interactive policy authoring template for usable policy specification, and provide a GUI-based prototype for generating policy templates. A prototype of PyBE\xspace for a computing device may adopt the ``interactive dropdowns'' provided in the authoring template to ease the task of specifying initial examples. Further, Reeder et al.~\cite{rbc+08} propose ``expandable grids'' to visualize policy rules. A notable aspect of the work is that expandable grids enable the user to focus on the integrated effect of multiple policy rules, rather than having to reason about the interactions between different rules through manual analysis. Such an approach may be adapted for visualizing policy examples as well, or even for displaying the predictions generated by PyBE\xspace to the user. Finally, access control gadgets (ACGs)~\cite{rkm+12} provide a usable method for acquiring the user's permission for user-owned resources on modern operating platforms (e.g., Android, iOS, Windows 8), i.e., by embedding the resource access permission into the user's natural UI flow of accessing the resource. In a way, ACGs extend prior work that deals with involving the user in access control decisions for files~\cite{se08,sky+06}. ACGs make traditional offline policy specification obsolete, but only for specific coarse-grained resources. That is, while ACGs may be feasible for a few coarse-grained security permissions, designing gadgets for an exponential number of personal data-use scenarios may not be feasible. \section{Related Work} \label{sec:relwork} \vspace{-0.5em} The notion of Policy by Example (PyBE\xspace) is inspired by recent work in the domain of Programming by Example (PBE). The objective of PBE is simple: if the user knows the steps for performing a task, the user should not have to write a program; instead, the computer should learn from the user's actions on an example, and generalize the program~\cite{ch93,lie01}. However, the user may not always be able to express the reasoning, or the intermediate steps, involved in creating a program. Gulwani~\cite{gul11} makes PBE feasible for such programming tasks, by using only input-output examples to synthesize a program that predicts outputs for unseen inputs. PyBE\xspace follows a similar intuition, and predicts policy decisions for new scenarios using only input-output examples (i.e., policy scenarios and corresponding decisions). However, PyBE\xspace does not generalize the program before testing, as is often done in PBE. That is, while the proposed paradigm is conceptually similar to PBE, the process used to predict policies borrows from another well-established domain: case-based reasoning (CBR)~\cite{kol93}. In CBR, the outcome of a test case is determined by looking at the outcomes of previously observed cases (e.g., legal reasoning using precedents). In a way, CBR mimics a human expert's reasoning, and performs lazy generalization of domain knowledge at testing time. CBR has been successfully used in many domains, e.g., synthesizing music~\cite{ads98,ad01}, providing decision support in molecular biology~\cite{jrg+01}, and for solving spatial reasoning problems~\cite{hol99}. However, to our knowledge, CBR has never been used for predicting user security policies, and PyBE\xspace is novel in its use of a similarity heuristic (i.e., a form of CBR) for predicting security policies. A critical advantage of CBR is that it provides a way to deal with uncertainty, in contrast with the process of eager learning (e.g., rule induction). Prior user-controllable methods for predicting privacy policies for well-known private data (e.g., Location) use eager learning, which requires making strategic parameter choices for generalization, often based on some known properties of the training data~\cite{khsc08,cms11}. For example, Cranshaw et al.~\cite{cms11} use a probabilistic model to learn location privacy policies, assuming the availability of a large number of data points since location is a continuous variable. However, PyBE\xspace cannot make such assumptions for user data with uncertain properties (e.g., Bob's scanned documents, Alice's notes), and uses a form of CBR, which does not require a priori generalization. \begin{comment} In PBE, the system records the repetitive interactions between the user and a user interface, and generalizes a program to represent the set of user actions~\cite{,lie01}. PBE teaches the computer a program, i.e., new behavior expected by the user, through the demonstration of the user's actions on an example. However, providing intermediate steps in a program may require expert knowledge. Gulwani~\cite{gul11} makes PBE a feasible approach for programming tasks where the user may only have the input and the corresponding output for each example (e.g., creating Excel macros). PyBE\xspace follows the same intuition, and predicts the output of a program (i.e., policy decisions) using only input-output examples provided by the users, in the form of policy scenarios (i.e., the input) and decisions (i.e., the outputs). \end{comment} Prior work also complements the specification of user-specific policies, by providing content recognition for tagging Prior research that performs content recognition for tagging can be leveraged to automatically tag content for PyBE\xspace~\cite{vscy09,sslw11,slb13,bbzl15,slsw15}. Further, prior work for generating security profiles through large-scale mining of user preferences provides baseline protection to users for standard, well-known, security settings (e.g., Android permissions)~\cite{lls14,llsh14}. PyBE\xspace complements this baseline by predicting policies for abstract, user-specific data, for which an analysis across users may be infeasible. \begin{comment} Finally, Fang and LeFevre also use active learning in their ``privacy wizard'' for social network privacy settings~\cite{fl10}; however, the wizard assumes independence among attributes of data points, which may not work for data use scenarios formed by combining different data or conditional tags. In contrast, PyBE\xspace's kNN-based approach does not assume attribute independence. Further, Fang and LeFevre propose an active learning-based approach to create a ``privacy wizard'' for setting social network policies~\cite{fl10}. A significant difference is that the active learning approach used by the privacy wizard assumes independence among attributes of data points (i.e., friends), which may not be appropriate for user data scenarios formed by combining different data or conditional tags. In contrast, PyBE\xspace's kNN-based approach does not assume attribute independence. \end{comment} This paper is the first step in our vision of creating a policy assistant, and demonstrates the feasibility of our approach. However, prior work has proposed usable ways to specify security policies, which is relevant with respect to our long-term vision. For instance, a prototype of PyBE\xspace for a computing device may adopt the ``interactive dropdowns'' in Johnson et al.'s interactive policy authoring template for specifying initial examples~\cite{jkkg10a,jkkg10b}. Similarly, Reeder et al's ``expandable grids'' may be adapted for visualizing policy examples for the user~\cite{rbc+08}. Recent work on access control gadgets (ACGs)~\cite{rkm+12} by Roesner et al. provide a usable way of acquiring the user's policy decision, by embedding access permissions into the user's natural UI flow of accessing resources. However, this approach only works for well-known resources controlled by the OS; designing gadgets for an exponential number of personal data-use scenarios may not be feasible. Finally, while PyBE\xspace assists the user in specifying policies for user-specific data, there exists prior work in the general area of policy specification that helps application or system developers. Prior work provides application developers with tools for expressing their security policies~\cite{ek08,he08,hjr10,sxwx14}. Further, in contrast with prior work that assists developers in expressing known policies, Slankas et al. aid the developer by extracting access control rules from application-specific text artifacts using natural language processing (NLP)~\cite{sxwx14}. Similarly, access control logs and system call traces have previously been used to refine the system's security policies (e.g., EASEAndroid~\cite{wer+15} and Polgen~\cite{shr06}). \section{Results} \label{sec:results} This section describes the results of our experiments, i.e., PyBE\xspace's accuracy in predicting policy decisions for new scenarios, and its effectiveness in assisting participants in finding incorrect policy decisions in their examples. We start by describing the data collected during the initial policy specification (i.e., the specification dataset), and the testing dataset. \myparagraph{Specification dataset} The 8 participants provided 246 example scenarios in total, with policy decisions for 5 policy targets, resulting in a total of 1,230 initial labeled policy examples. Participants used on average 14 tags to specify their scenarios, with 40 unique tags (available in Appendix~\ref{app:tags}) used across participants. \myparagraph{Testing dataset} We generated a total of 122 random test scenarios across 8 participants, which when labeled with ground-truth policy decisions by participants for 5 policies, resulted in 610 test examples. A detailed split (per participant) of the testing and training datasets can be found in Appendix~\ref{app:datasets}. \subsection{Accuracy of Predictions} \input{coinflip_tbl} \input{mostfreq_tbl} Our algorithm predicted decisions for all of the participants' new (test) policy examples.\footnote{We performed testing with random samples instead of cross-validation, as the latter is generally performed to test ``models'', i.e., for supervised learning.} The actual prediction time was negligible (i.e., less than 1 second for all the examples for one participant). Further, for less than 6\% (36 out of 610) of our test examples we had no majority label (i.e., a tie). Applying the tie-breaker discussed in Section~\ref{sec:no-majority} resolved 19 of these ties, while the rest (i.e., 3\% or 17 out of 610) were denied by default. We now discuss the accuracy of PyBE\xspace's predictions. On comparing our predicted decisions with ground-truth decisions provided by participants, we observe that PyBE\xspace predicts policy decisions with an average accuracy of over 76\% across all participants (\ref{rq:accuracy}). When analyzing the accuracy, it is important to note that each participant-policy combination is treated as an independent policy specification problem, and hence forms a separate test case. We first define a baseline and naive approach against which we evaluate PyBE\xspace's accuracy. \myparagraph{1. The CoinFlip baseline} The {\em CoinFlip} baseline provides the measure of accuracy of random guessing, with an equal probability of a 0/1 outcome on each flip. \myparagraph{2. The MostFreq naive approach} We define {\em MostFreq} as an approach that predicts the most frequent or majority policy decision from the initial examples, for the respective participant-policy problem. For example, if a participant generally allows in policy decisions for a certain policy target, {\em MostFreq} will predict allow for all new test examples for that participant-policy problem. The insight behind {\em MostFreq} is that a naive learner is likely to pick the majority class, in order to benefit from the consistent trend in the participant's policy decisions. Table~\ref{tbl:coinflip_perf} shows the comparison of PyBE\xspace's accuracy with {\em CoinFlip}, for each of the 40 participant-policy cases (i.e., 8 participants and 5 policy targets). PyBE\xspace performs better than {\em CoinFlip} in all but 3 cases (i.e., 92\% of the time). PyBE\xspace's average accuracy of over 76\% is better than {\em CoinFlip} (50\% accuracy). Additionally, PyBE\xspace performs better than {\em CoinFlip} for all 8 participants, across all policies. Table~\ref{tbl:mostfreq_perf} shows a comparison between the performance of PyBE\xspace and the naive approach {\em MostFreq}. PyBE\xspace performs better than {\em MostFreq} in 29 out of 40 (i.e., 72.5\%) participant-policy cases, and for 75\% of the participants. The average accuracy of PyBE\xspace exceeds {\em MostFreq} (71\% accuracy) as well. Note that {\em MostFreq's} accuracy is abysmally low (e.g., 17\%) in certain cases is due to its over-dependence on the probability distribution of the training examples. That is, {\em MostFreq} only does well when the testing dataset consists of examples that are very similar to the training set as a whole. PyBE\xspace does not make any assumptions about the probability distribution of data, and hence does not suffer from the same flaw. We discuss the causes of incorrect predictions (\ref{rq:accuracy-causes}) in Section~\ref{sec:analysis_of_results}. \subsection{Effectiveness of Active Learning} \input{review_tbl} \begin{comment} We performed a two-step review process before testing for accuracy, where we allowed or users to identify and correct incorrect policy decisions in their examples. First, users performed a manual review of their examples, for each policy. This was followed by an automated review using PyBE\xspace's conflict resolution approach described in Section~\ref{sec:algorithm}. \end{comment} We now discuss the effectiveness of PyBE\xspace's active learning approach over manual reviews by participants, for finding labeling errors (i.e., errors in the policy decisions of examples) in their specification datasets. Table~\ref{tbl:review} shows the number of labeling errors found by the participant through the manual review, followed by the additional errors found using PyBE\xspace's interactive approach. The errors found using PyBE\xspace's approach are additional as we used the corrected dataset from the manual review for the PyBE\xspace-assisted review, as described in Section~\ref{sec:experiments}. First, we observe at least one labeling error in most participant-policy cases, i.e., in 30 out of 40, or 75\% cases. Out of 1,230 total examples in the specification dataset, we observe 96 total errors (i.e., about 7.8\%) (\ref{rq:user-error}). While participants identify some errors manually, PyBE\xspace's semi-automated process helps the participant identify and correct the maximum number of errors (80 out of 96, or about 83\%). For all 8 participants, the total errors (across policies) found by PyBE\xspace are equal to or more than the participant's manual review. Thus, we conclude that while participants make some error (average 7.8\%) (\ref{rq:user-error}), participants find more errors using PyBE\xspace's interactive approach than by themselves(\ref{rq:user-error-auto}). We note that \user{1} did not find any errors manually, nor did they agree to PyBE\xspace's recommendations as they had confidence in their examples. Further, our accuracy is also the highest for \user{1} as seen in Table~\ref{tbl:coinflip_perf}. However, given the absence of any trend in other cases, we refrain from claiming any relation between the user errors found in the reviews and accuracy. \section{Policy by Example (PyBE\xspace)} \label{sec:pbe} \vspace{-0.5em} \begin{comment} \begin{figure}[t] \centering \includegraphics[width=2.8in]{figs/overview} \caption{Overview of the PyBE\xspace approach.} \label{fig:overview} \vspace{-1em} \end{figure} \end{comment} \begin{figure}[t] \centering \subfloat[][The user specifies examples. PyBE\xspace suggests error-correction.]{\includegraphics[width=1.2in]{figs/overview_a}\label{fig:overview_a}}\qquad \subfloat[][PyBE\xspace predicts policy decisions for new scenarios.]{\includegraphics[width=1.4in]{figs/overview_b}\label{fig:overview_b}} \vspace{-1em} \caption{An overview of the PyBE\xspace approach.} \label{fig:overview} \vspace{-0.5em} \end{figure} PyBE\xspace is inspired by recent work on Programming by Examples~\cite{gul11}, which learns a program from input-output examples. As shown in Figure~\ref{fig:overview_a}, the user provides policy examples (i.e., data-use scenarios and policy decisions), and PyBE\xspace interactively suggests corrections to the user's policy decisions. PyBE\xspace then predicts policy decisions for new scenarios as shown in Figure~\ref{fig:overview_b}. This section provides the intuition behind our approach. We describe PyBE\xspace formally in Section~\ref{sec:algorithm}. We start by describing the structure of a policy example. \vspace{-1em} \subsection{The Policy Example} \label{sec:policy-example} \vspace{-0.5em} A policy example is composed of a {\em scenario}, and a {\em policy decision} (i.e., {\sf allow}/1 or {\sf deny}/0) for that scenario. A scenario is as a set of {\em tags}, where each tag denotes the resource to be protected (e.g., business card) or a condition that influences the policy (e.g., created after work hours). Using a set of tags enables users to describe complex scenarios composed multiple conditions or data objects. Our use of tags is motivated by prior work that demonstrates that users can effectively re-purpose organizational tags to express access control policies~\cite{klms+12}. In addition to the user-customizable policy example, we also define a fixed policy {\em target} which represents the action controlled by the policy; e.g., exporting data to the enterprise cloud, i.e., the {\em WorkCloud} policy target. Policy specification is performed separately for each policy target, i.e., {\em independent} of other targets. Thus, each target represents a separate high-level policy that must be specified (e.g., the user's {\em WorkCloud} policy). The policy targets used in this paper are motivated by prior work on restricting the network export of secret data~\cite{sym+14,bcj+15,naej16}. \begin{table}[t] \footnotesize \centering \caption{Bob's examples for the {\em WorkCloud} policy.} \vspace{-1em} \label{tbl:bob-policy} \begin{tabular}{l|c|c} \Xhline{2\arrayrulewidth} {\bf No.} & {\bf Scenario} & {\bf Policy Decision}\\ \Xhline{2\arrayrulewidth} 1 & \{Home, Photo\} & deny \\ 2 & \{Work, Photo\} & allow \\ 3 & \{Document\} & allow \\ \Xhline{2\arrayrulewidth} \end{tabular} \vspace{-1.5em} \end{table} Table~\ref{tbl:bob-policy} shows Bob's policy examples for the {\em WorkCloud} policy target. We describe each example, along with Bob's security requirement behind it. First, Bob considers data created at home to be personal, so Bob's photos created at home must never be exported to the enterprise cloud. Thus, Bob denies export for example~1, i.e, \{{\tt Home,Photos}\}. Second, photos taken at work may be exported to the enterprise cloud. Hence, Bob allows export for example~2, i.e., \{{\tt Work,Photos}\}. Third, Bob does not (currently) imagine a situation where he would deny export for documents. Hence, Bob allows export for example~3, i.e., \{{\tt Document}\}. We use Bob's examples to describe PyBE\xspace. \vspace{-1em} \subsection{Our Approach} \label{sec:overview} \vspace{-0.5em} As described previously, PyBE\xspace uses a variation of the kNN algorithm for predicting policies. That is, Bob provides PyBE\xspace with a set of policy examples (i.e., scenarios labeled with policy decisions). When faced with a new scenario with an unknown policy decision, we perform a nearest neighbor search of Bob's examples. That is, we search Bob's examples for the closest examples, i.e., examples with scenarios closest to the new scenario, and predict the policy decision of the majority of the closest examples. Note that distance between examples is described in terms of their scenarios (i.e., when we say ``examples are close'', it means their scenarios are close). An approach for predicting security policies should be deterministic if we want users to understand its outcome (i.e., independent of arbitrary parameters). Based on this rationale, we eliminate the need to specify the parameter $k$. Our variation of kNN considers the {\em closest} neighbors as all neighbors at the closest distance, instead of k neighbors at varying distances. We now demonstrate our approach with a manual walk-through. A manual walk-through is feasible because the basic process of kNN is intuitive and its outcome is easy to explain. To demonstrate our approach, we predict policy decisions for the following new scenarios for Bob: \{{\tt Home}\} and \{{\tt Home,Document}\}, using Bob's initial policy specification shown in Table~\ref{tbl:bob-policy}. Consider the first new scenario, \{{\tt Home}\}. Just by looking at Bob's specification in Table~\ref{tbl:bob-policy}, the reader may identify example~1 (i.e., \{{\tt Home,Photo}\}) as closest to the new scenario, since it is the only example that includes the tag {\tt Home}. As a result, we predict the policy decision for the new scenario {\tt \{Home\}} as {\sf deny}, i.e., as the decision of its nearest neighbor \{{\tt Home,Photo}\}. This decision mirrors Bob's assumption of data created at home being personal, and not exportable to the enterprise cloud. PyBE\xspace's distance metric described in Section~\ref{sec:algorithm} uses a similar property for computing distance between two examples, and comes to the same conclusion. Now consider the second new scenario, \{{\tt Home,Document}\}. This time, there are two examples that seem to be equally close to the new scenario, i.e., \{{\tt Home,Photo}\} and \{{\tt Document}\}, since they each have one tag in common with \{{\tt Home,Document}\}. Since both the nearest examples have different policy decisions, our simple metric is insufficient. This is one of the motivations for introducing weights. Suppose Bob considers personal data created at home (i.e., the tag {\tt Home}) to be most confidential. Therefore, Bob assigns {\tt Home} more ``importance'' (i.e., a higher weight) than any other tag in terms of its influence on the policy decision. As a result, the new scenario \{{\tt Home,Document}\} can be deemed closer to \{{\tt Home,Photo}\} than \{{\tt Document}\}, as {\tt Home} has a higher weight and more say in the decision than the other tags, e.g., {\tt Document}. Thus, export is denied for \{{\tt Home,Document}\}, which aligns with Bob's preference of data created at home being personal, and not exportable to the enterprise cloud. The purpose of weights is not limited to breaking ties. Suppose Bob specifies another example, i.e., \{{\tt Document,Receipt}\}, with decision {\sf allow}. Now consider another new scenario \{{\tt Document,Receipt,Home}\}. Without any knowledge of weights, it is easy to see that \{{\tt Document,Receipt}\} would be the example closest to the new scenario \{{\tt Document,Receipt,Home}\}, resulting in {\sf allow} being predicted (i.e., there is no tie). At the same time, we know that Bob has allocated a higher weight to {\tt Home}, since Bob considers home data to be confidential and important with respect to the {\em WorkCloud} target. The weights ensure that \{{\tt Document,Receipt,Home}\} is closer to \{{\tt Home,Photo}\} instead of \{{\tt Document,Receipt}\}, and export is denied as per Bob's actual security preference. Simply stated, weights enable the user to make some information tags beat others in the distance calculation. Our weighted metric described in Section~\ref{sec:weighted-metric} follows a similar rationale. \begin{table}[t] \footnotesize \centering \caption{Bob's extended set of examples for the {\em WorkCloud} policy target, with newly added examples in {\bf bold}.} \vspace{-1em} \label{tbl:bob-policy-revised} \begin{tabular}{l|c|c} \Xhline{2\arrayrulewidth} {\bf No.} & {\bf Scenario} & {\bf Policy Decision}\\ \Xhline{2\arrayrulewidth} 1 & \{Home, Photo\} & deny \\ 2 & \{Work, Photo\} & allow \\ 3 & \{Document\} & allow \\ {\bf 4} & \{{\bf Home, Document}\} & {\bf deny} \\ {\bf 5} & \{{\bf Home, Memo}\} & {\bf allow} \\ \Xhline{2\arrayrulewidth} \end{tabular} \vspace{-1em} \end{table} An important contribution of PyBE\xspace is that it recognizes that policy specification by users can be error-prone. PyBE\xspace uses active learning to engage the user in finding and correcting potential errors in their policy decisions. Our approach is inspired by the work of Gulwani~\cite{gul11}, which detects noise in the user's input-output examples, and recommends changes to incorrect outputs. Similarly, PyBE\xspace looks for noise in the user's examples, which may indicate one or more incorrect policy decisions. We use our variant of kNN for this purpose. Note that the objective of this task is to engage the user in finding errors in existing examples, and not to predict policy decisions for new examples. We explain our approach with the following extension to Bob's policy: Suppose Bob adds two additional examples, i.e., \{{\tt Home,Document}\} with decision {\sf deny}, and \{{\tt Home,Memo}\} with decision {\sf allow}. We borrow the first example (\{{\tt Home,Document}\}) from the previous discussion on weights. The second example shows Bob's policy for a memo created at home. Further, recall that {\tt Home} has a higher weight, hence examples containing {\tt Home} will be closer to each other than other examples not containing {\tt Home}. Bob's complete set of examples is shown in Table~\ref{tbl:bob-policy-revised}. We perform a nearest neighbor search for the example \{{\tt Home,Memo}\}, and identify \{{\tt Home,Photo}\} and \{{\tt Home,Document}\} as its nearest neighbors. An intuitive way of visualizing this group of examples is in the form of a graph, such that {\sf (1)} the examples are vertices, and {\sf (2)} directed edges are drawn from the example for whom the search was performed to its nearest neighbors. Figure~\ref{fig:nn-graph-a} shows the graph for \{{\tt Home, Memo}\}. \begin{figure}[t] \centering \includegraphics[width=2in]{figs/nn-graph-a} \vspace{-0.5em} \caption{\{{\tt Home,Memo}\} disagrees with the majority policy decision of its nearest neighbors.} \label{fig:nn-graph-a} \vspace{-1.5em} \end{figure} \begin{figure}[t] \centering \includegraphics[width=2in]{figs/nn-graph-c} \vspace{-0.5em} \caption{ There is no majority policy decision among the nearest neighbors of \{{\tt Home,Photo}\}. } \label{fig:nn-graph-c} \vspace{-1.5em} \end{figure} If we focus on the policy decisions of the vertices in Figure~\ref{fig:nn-graph-a}, we see that Bob's decision for \{{\tt Home, Memo}\} (i.e., {\sf allow}) disagrees with the decision for both its nearest neighbors. This inconsistency or noise indicates one of two possibilities: {\sf (a)} Bob made a mistake in labeling \{{\tt Home, Memo}\} with the decision {\sf allow}, or {\sf (b)} Bob wanted to make a genuine exception for memos. Instead of making a guess, PyBE\xspace asks Bob. That is, we recommend Bob to label \{{\tt Home,Memo}\} as {\sf deny} for resolving this inconsistency, Bob may accept our recommendation, or reject it and make an exception. Using such interactive recommendations, PyBE\xspace engages Bob in correcting potential errors. Figure~\ref{fig:nn-graph-c} shows the nearest neighbor graph for \{{\tt Home,Photo}\}, and illustrates another type of inconsistency. In this case, there is no majority consensus among the neighbors of \{{\tt Home,Photo}\}. A similar situation exists in the graph for \{{\tt Home,Document}\}, which we do not show due to space constraints. If we look at the two graphs in Figure~\ref{fig:nn-graph-a} and Figure~\ref{fig:nn-graph-c}, we realize that changing the policy decision of \{{\tt Home,Memo}\} removes both the inconsistencies. Thus, PyBE\xspace capitalizes on the possibility that a few examples may cause the most noise, and recommends the user to change their labels. In our algorithm described in Section~\ref{sec:active-learning}, we describe graph invariants to identify noise, and a greedy algorithm to find the optimal change. Section~\ref{sec:results} demonstrates that our interactive approach finds {\em five times} as many errors as manual reviews by users. Note that we do not claim to detect all errors, as the users' examples may be completely consistent, but may still have errors. Instead, we recommend a best effort approach for engaging the user in detecting potential errors. \begin{comment} In fact, similar graphs can be drawn for the \{{\tt Home, Photo}\} and \{{\tt Home, Document}\}, as shown in Figure~\ref{fig:nn-graph-b} and Figure~\ref{fig:nn-graph-c} respectively. \centering \subfloat[][\{{\tt Home, Memo}\} disagrees with its majority neighbors]{\includegraphics[width=1.5in]{figs/nn-graph-a}\label{fig:nn-graph-a}}\\ \subfloat[][There is no majority in the neighbors of \{{\tt Home, Photo}\}]{\includegraphics[width=1.5in]{figs/nn-graph-b}\label{fig:nn-graph-b}}\quad \subfloat[][There is no majority in the neighbors of \{{\tt Home, Document}\}]{\includegraphics[width=1.5in]{figs/nn-graph-c}\label{fig:nn-graph-c}} \caption{Nearest neighbor graph for the example scenarios \{{\tt Home, Memo}\}, \{{\tt Home, Photo}\} and \{{\tt Home, Document}\}. The vertices are examples, and edges are drawn from the example for whom the nearest neighbor search was performed, to its nearest neighbors. Vertices are labeled with their policy decisions.} \label{fig:nn-graph} \end{figure} \end{comment} \subsection{The Structure of a Policy Example} A {\em policy example} $P$ is composed of 1) the {\em policy label} $l$ (i.e., the ``what''), which describes the resource to be protected or the conditions that influence the particular policy decision, and 2) the {\em policy decision} $d$ (i.e., the ``how''), which we assume to be a binary decision (i.e., allow/deny) for simplicity. A label is a set of of {\em tags} $t$, which may be opaque identifiers that mark the inclusion of specific conditions relevant to the policy, drawn from a universal set of tags $U$. A policy rule $P_i$ can be described with Equation~\ref{eqn:policy-example}. \begin{multline}\label{eqn:policy-example} \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ P_i = <l_i, d_i>,\\ where\ l_i = \{t | t \in U\} \ and\ d_i\in \{ALLOW,DENY\} \end{multline} Our approach hinges on the findings of a study performed by Klemperer et al.~\cite{klms+12}, which demonstrates that tags created for organizing data can be effectively re-purposed to express express access control policies. Such tags are often available through applications. For example, Google Maps allows the user to tags certain frequent locations (e.g., Home, Work) for convenience. Further, Google Keep and EverNote provide predefined tags (e.g., Work, Grocery) for their notes, and also allow users to create new tags. We extend this idea of using tags by allowing users to combine tags into labels to express complex situations where more than one tag may apply. As a result, a label can also be thought of as a conjunction of tags, rather than a simple set. In this paper, we study the specification of data secrecy policies as an application of our approach. In the case of data secrecy policies for application data, the tags are user or application-defined information classes (e.g., receipts, data created at the Hospital), and the label on a data object describes all the classes of information that the data object is derived from. For example, Alice's security preference of not having receipts created at the hospital synced with the cloud (discussed in Example 1 (Section~\ref{sec:motivation}) can be specified using the following policy example: \noindent {\small \begin{center} {\tt label=}``receipt'' $\wedge$ ``hospital'', {\tt decision=}``DENY'' \end{center} } \subsubsection{Policy Examples for Bob} \label{sec:running-example} \begin{table}[t] \footnotesize \centering \caption{Bob's examples for the {\em WorkCloud} policy.} \label{tbl:bob-policy} \begin{tabular}{l|c|c} \Xhline{2\arrayrulewidth} {\bf No.} & {\bf Label} & {\bf Policy Decision}\\ \Xhline{2\arrayrulewidth} 1 & Home$\wedge$Photo & DENY \\ 2 & Work$\wedge$Photo & ALLOW \\ 3 & Photo & DENY \\ 4 & Document & ALLOW \\ \Xhline{2\arrayrulewidth} \end{tabular} \end{table} For better understanding, we describe a simple policy specification by Bob, for a policy designed to control the export of data to the enterprise cloud, i.e., the {\em WorkCloud} policy. Bob specifies policy examples using two kinds of tags: 1) Tags that indicate the location of data creation (e.g., ``Work'' and ``Home'') and 2) tags that indicate the class or type of secret information (e.g., ``Document'' and ``Photo''). We assume tags to be provided by applications used to create the data (e.g., Keep) or the operating system on the smartphone. Note that applications often provide users with tags to organize data, which may also be leveraged for specifying security policies. Bob creates the policy examples shown in Table~\ref{tbl:bob-policy}. Bob does not work after work hours, and Bob's objective is separate work and personal data. Therefore, Bob denies export for personal photos created at home (example 1), although he allows export for photos created at work (example 2). Further, Bob is conservative about photos that may be created at an untagged location (example 3), hence export is denied for such photos. At the moment, Bob does not imagine a situation where he would deny export for data created or scanned as documents. Hence, Bob allows documents to be exported (example 4). Finally, we note that our policy example format is generic, and is independent of the actual action/operation controlled by the policy. The operation controlled by the policy (e.g., exporting data to the cloud) is a feature of the policy design, and is independent of the problem of policy specification. The policy format described in this section may be used for policies that enforce a binary decision and which can be expressed using a conjunction of conditions. We discuss some applications of our approach in Section~\ref{sec:applications}. \section{Related Work} \label{sec:relwork} \vspace{-0.5em} The notion of Policy by Example (PyBE\xspace) is inspired by recent work in the domain of Programming by Example (PBE). The objective of PBE is simple: if the user knows the steps for performing a task, the user should not have to write a program; instead, the computer should learn from the user's actions on an example, and generalize the program~\cite{ch93,lie01}. However, the user may not always be able to express the reasoning, or the intermediate steps, involved in creating a program. Recent work by Gulwani~\cite{gul11} makes PBE feasible for such programming tasks, by using only input-output examples to synthesize a program that predicts outputs for unseen inputs. PyBE\xspace follows a similar intuition, and predicts policy decisions for new scenarios using only input-output examples (i.e., policy scenarios and corresponding decisions). However, PyBE\xspace does not generalize the program before testing, as is often done in PBE. That is, while the proposed paradigm is conceptually similar to PBE, the process used to predict policies borrows from another well-established domain: case-based reasoning (CBR)~\cite{kol93}. In CBR, the outcome of a test case is determined by looking at the outcomes of previously observed cases (e.g., legal reasoning using precedents). In a way, CBR mimics a human expert's reasoning, and performs lazy generalization of domain knowledge at testing time. CBR has been successfully used in many domains, e.g., synthesizing music~\cite{ads98,ad01}, providing decision support in molecular biology~\cite{jrg+01}, and for solving spatial reasoning problems~\cite{hol99}. However, to our knowledge, CBR has never been used for predicting user security policies, and PyBE\xspace is novel in its use of a similarity heuristic (i.e., a form of CBR) for predicting security policies. A critical advantage of CBR is that it provides a way to deal with uncertainty, in contrast with the process of eager learning (e.g., rule induction). Prior user-controllable methods for predicting privacy policies for well-known private data (e.g., Location) use eager learning, which requires making strategic parameter choices for generalization, often based on some known properties of the training data~\cite{khsc08,fl10,cms11}. For example, Cranshaw et al.~\cite{cms11} use a probabilistic model to learn location privacy policies, assuming the availability of a large number of data points since location is a continuous variable. However, PyBE\xspace cannot make such assumptions for user data with uncertain properties (e.g., Bob's scanned documents, Alice's notes), and uses a form of CBR, which does not require a priori generalization. \begin{comment} In PBE, the system records the repetitive interactions between the user and a user interface, and generalizes a program to represent the set of user actions~\cite{,lie01}. PBE teaches the computer a program, i.e., new behavior expected by the user, through the demonstration of the user's actions on an example. However, providing intermediate steps in a program may require expert knowledge. Gulwani~\cite{gul11} makes PBE a feasible approach for programming tasks where the user may only have the input and the corresponding output for each example (e.g., creating Excel macros). PyBE\xspace follows the same intuition, and predicts the output of a program (i.e., policy decisions) using only input-output examples provided by the users, in the form of policy scenarios (i.e., the input) and decisions (i.e., the outputs). \end{comment} Prior work has proposed usable interfaces for eliciting security responses, which are relevant for our long-term vision of creating a policy assistant for user data. For instance, a prototype of PyBE\xspace for a computing device may adopt the ``interactive dropdowns'' in Johnson et al.'s interactive policy authoring template for specifying initial examples~\cite{jkkg10a,jkkg10b}. Similarly, Reeder et al's ``expandable grids'' may be adapted for visualizing policy examples for the user~\cite{rbc+08}. Such work only provides interfaces, and does not fulfill PyBE\xspace's objective of making policy specification feasible through prediction. Further, recent work on user-driven access control (e.g., Roesner et al.~\cite{rkm+12}, Ringer et al.~\cite{rgr16}) provides a usable way of acquiring the user's policy decision, by embedding access permissions into the user's natural UI flow of accessing resources. However, defining specific permissions (i.e., gadgets) for an exponential space of subjective and user-specific data-use scenarios may be infeasible. Prior work also complements the specification of user-specific policies, by providing content recognition for automatically tagging data for PyBE\xspace~\cite{vscy09,sslw11,slb13,bbzl15,slsw15}, or by providing security profiles for standard, well-known, security settings (e.g., Android permissions)~\cite{lls14,llsh14}, allowing PyBE\xspace to focus on predicting policies for abstract, user-specific data. Finally, while PyBE\xspace assists the user in specifying policies for user-specific data, there has been prior research in the domain of policy specification to help application or system developers. Prior work provides application developers with tools for expressing their security policies~\cite{ek08,he08,hjr10,sxwx14}. Further, in contrast with prior work that assists developers in expressing known policies, Slankas et al. aid the developer by extracting access control rules from application-specific text artifacts using natural language processing (NLP)~\cite{sxwx14}. Similarly, access control logs and system call traces have previously been used to refine the system's security policies (e.g., EASEAndroid~\cite{wer+15} and Polgen~\cite{shr06}). \section{Results} \label{sec:results} \vspace{-0.5em} This section describes the results of our experiments, i.e., PyBE\xspace's accuracy in predicting policy decisions for new scenarios, and its effectiveness in assisting participants in finding incorrect policy decisions in their examples. We start by briefly describing the datasets collected during the initial policy specification and testing; a detailed split across participants can be found in Appendix~\ref{app:datasets}. \myparagraphs{Specification dataset} The 8 participants provided 246 example scenarios in total, with policy decisions for 5 policy targets, resulting in a total of 1,230 initial labeled policy examples. \myparagraphs{Testing dataset} We generated a total of 122 random test scenarios across 8 participants, which when labeled with ground-truth policy decisions by participants for 5 policies, resulted in 610 test examples. \vspace{-1em} \subsection{Accuracy of Predictions} \vspace{-0.5em} \input{coinflip_tbl} \input{mostfreq_tbl} Our algorithm predicted decisions for all of the participants' test scenarios.\footnote{We test with random samples instead of cross-validation, as the latter is generally used to test ``models'', i.e., in supervised learning.} The actual prediction time was negligible (i.e., less than 1 second for all the examples per participant). Further, for less than 6\% (36 out of 610) of our test examples we had no majority label (i.e., a tie). Applying the tiebreaker discussed in Section~\ref{sec:no-majority} resolved 19 of these ties, while the rest (i.e., 3\% or 17 out of 610) were denied by default. We now discuss the accuracy of PyBE\xspace's predictions. On comparing our predicted decisions with ground-truth decisions provided by participants, we observe that PyBE\xspace predicts policy decisions with an average accuracy of over 76\% across all participants (\ref{rq:accuracy}). When analyzing the accuracy, it is important to note that each participant-policy combination is treated as an independent policy specification problem, and hence forms a separate test case. We first define a baseline and naive approach against which we evaluate PyBE\xspace's accuracy. \myparagraphs{1. The CoinFlip baseline} The {\em CoinFlip} baseline provides the measure of accuracy of random guessing, with an equal probability of a 0/1 outcome on each flip. \myparagraphs{2. The MostFreq naive approach} We define {\em MostFreq} as an approach that predicts the most frequent or majority policy decision from the specification dataset, {\em independently for each participant-policy problem}. For example, if \user{1} generally allows export to {\em WorkCloud}, {\em MostFreq} will predict allow for all new test examples for that the \user{1}-{\em WorkCloud} policy specification problem. The insight behind {\em MostFreq} is that a naive learner is likely to pick the majority class to benefit from the consistent trend in the participant's policy decisions. Table~\ref{tbl:coinflip_perf} shows the comparison of PyBE\xspace's accuracy with {\em CoinFlip}, for each of the 40 participant-policy cases. PyBE\xspace not only performs better in terms of average accuracy (i.e., 76$>$50), but also for most (i.e., all but 3, or 92\%) of the participant-policy problems. Table~\ref{tbl:mostfreq_perf} shows a comparison between the performance of PyBE\xspace and the naive approach {\em MostFreq}. PyBE\xspace not only performs better than {\em MostFreq} in terms of average accuracy (i.e., 76$>$71), but also in 29 out of 40 (i.e., 72.5\%) participant-policy cases, and for 75\% of the participants. Note that although {\em MostFreq's} average accuracy can be said to be close to PyBE\xspace, it has high variance, with accuracy dropping to 17\% in some cases. This is because of {\em MostFreq's} over-dependence on the probability distribution of the training samples, a flaw PyBE\xspace is not susceptible to. We discuss the causes of incorrect predictions (\ref{rq:accuracy-causes}) in Section~\ref{sec:analysis_of_results}. \begin{comment} Note that {\em MostFreq's} accuracy is abysmally low (e.g., 17\%) in certain cases is due to its over-dependence on the probability distribution of the training examples. That is, {\em MostFreq} only does well when the testing dataset consists of examples that are very similar to the training set as a whole. PyBE\xspace does not make any assumptions about the probability distribution of data, and hence does not suffer from the same flaw. We discuss the causes of incorrect predictions (\ref{rq:accuracy-causes}) in Section~\ref{sec:analysis_of_results}. \end{comment} \vspace{-1em} \subsection{Effectiveness of Active Learning} \input{review_tbl} \vspace{-0.5em} \begin{comment} We performed a two-step review process before testing for accuracy, where we allowed or users to identify and correct incorrect policy decisions in their examples. First, users performed a manual review of their examples, for each policy. This was followed by an automated review using PyBE\xspace's conflict resolution approach described in Section~\ref{sec:algorithm}. \end{comment} Table~\ref{tbl:review} shows the number of labeling errors found by the participant through the manual review, followed by the additional errors found using PyBE\xspace's interactive approach. Errors found by PyBE\xspace's approach are additional as we use the corrected dataset from the manual review for the PyBE\xspace-assisted review, as described in Section~\ref{sec:experiments}. Out of 1,230 total examples in the specification dataset, we observe 96 total errors (i.e., 7.8\%), with at least one labeling error in most participant-policy cases (i.e., 30 our of 40) (\ref{rq:user-error}). While participants identify some errors manually, PyBE\xspace's semi-automated process helps the participant identify and correct the maximum number of errors (80 out of 96, or about 83\%). Further, for all 8 participants, the total errors (across policies) found by PyBE\xspace are equal to or more than the participant's manual review (\ref{rq:user-error-auto}). We note that \user{1} did not find any errors manually, nor did they agree to PyBE\xspace's recommendations as they had confidence in their examples. Further, our accuracy is also the highest for \user{1} as seen in Table~\ref{tbl:coinflip_perf}. However, given the absence of such a trend in other cases, we do no claim any relation between user errors and accuracy. \section{Feasibility Study details} \label{app:feasibility_details} The data collection and experiments were performed using semi-structured interviews. Most tasks (i.e., collecting examples, reviewing examples, and testing) took about 75 minutes, whereas collecting weights took about 20 minutes on average. While breaks were offered as a part of the experimental design, no participant elected to take their break. \subsection{Collecting Examples} \label{app:examples_script} \begin{itemize} \item In this task, you will provide context-policy examples. \item You will be given a list of predefined context tags. You can use 0 or more of these tags, and also create your own tags. \item You may combine tags to describe the context of a scenario. You will then be required to indicate a policy decision (i.e., 0 for deny and one for allow) for the policies provided. \item Each line on the example sheet has space for the context (i.e., combination of tags), and a column for each policy. \end{itemize} \subsection{Collecting Weights} \label{app:weights_script} This phase consisted of two tasks, grouping tags and ordering groups. We provide the instructions given to users as follows: \subsubsection{Grouping tags} We provide an example of customized tag-group memberships in Figure~\ref{fig:tag_groups}. \begin{figure*}[t] \centering \includegraphics[width=6in]{figs/response_1_groups} \caption{Screenshot of the tag groups customized by \user{1}} \label{fig:tag_groups} \end{figure*} \begin{figure}[t] \centering \includegraphics[width=1.2in]{figs/response_order} \vspace{-0.5em} \caption{Screenshot of \user{1}'s ordering of tag groups.} \label{fig:p1_order} \vspace{-1em} \end{figure} \begin{itemize} \item In this task, you will receive a spreadsheet containing groups, and information tags included in those groups. Note that the tags may include not only the tags you defined in the initial interview, but also tags defined by other users. \item We have grouped tags that seem to be dealing with data of similar secrecy value. For instance, all the work-related tags such as ``Work'', ``WorkTravel'' are in the group ``Work''. \item The task is to verify group memberships, such that every tag belongs to the correct group as per your understanding. \item You can move tags around, i.e., remove them from one group, and add to another, but you cannot add, remove, or rename the groups themselves. \item The spreadsheet will also include a comments column, if you want to make a comment about a specific group, although comments are not required. \item Finally, the spreadsheet will include descriptions for some group names for reference. \end{itemize} \subsubsection{Ordering Groups} \begin{itemize} \item In this task, you will be given a set of partial order relations among the groups described in the previous experiment. This set of relations is only a baseline. \item A relation between groups A and B, such that A;B, means that B is more “important” than A. Since our policies are information secrecy-related, “more important” may be understood as “more sensitive”. \item Your task is to modify (i.e., add or remove) the given list of relations, i.e., to customize the orders according to the your data secrecy/privacy preferences. \item You will also be allowed to use your initial group assignment for reference. \item It is possible that the ordering of groups may be different for different policies. Therefore, you will be able to use different sets of relations for different policies (total 7 policies). Please indicate if you want to use the same order for all policies, or if you would prefer to use different orders. This choice can be made or modified at any point of time throughout this task. \item In the end, I will confirm each order, for each policy (if the user chooses to have different orders for different policies). For instance, if the user enters A;B, I will confirm ``is B more important than A?''. \item Finally, you have the option of continuing to the next experiment after a break of 5-10 minutes, or calling it a day. \end{itemize} \subsection{Review of Examples} \label{app:review_script} The review phase consisted of two tasks, namely a manual review, and a semi-automated review using active learning. This section provides the scripts for both tasks. \subsubsection{Manual Review} \begin{itemize} \item In this task, you will receive a set of spreadsheets (one per policy) containing your examples (i.e., the context label + policy decision) for that policy. \item This is an opportunity for you to review your examples, and modify the policy decision if necessary. The context labels cannot be modified. \item For each change you make, you will then indicate the cause of the change in the respective column of one of the following hints: \begin{itemize} \item ``I have changed my mind'': i.e., my policy preferences have changed. \item ``It seems I made an error before'' \item ``I don’t understand this policy example'': This could happen if you do not remember why you specified the policy, or are having trouble expressing it with tags you provided/used. \end{itemize} \item Finally, for each change you make, please provide justification in the last column. This column may also be used for reasons other than the said hints. \item The investigator will go through the changes, and may ask you to provide any missing justifications or causes. \end{itemize} \subsubsection{Semi-automatic Review} \begin{itemize} \item In this task, our algorithm will suggest policy decisions for existing context labels that you have previously provided. \item You must either agree (y) or disagree (n) to the decision. You can also skip by entering n twice. \item For every decision that you disagree to, please provide a short justification. \item For example, the algorithm may suggest “Denial of export to the WorkCloud when the data object with the context {created at Home, Photo}”. This suggestion will be presented as follows: {\tt Home+Photos, WorkCloud = DENY (y/n)?} \item If you agree, the algorithm will make another suggestion, or stop. \item If you disagree, the algorithm will provide a text input for the justification. \item The task will consist of at most 15 questions. \end{itemize} \subsection{Testing with Random Examples} \label{app:testing_script} In this section, we describe the script for the phase of testing with random examples. This phase was split into two tasks as well, i.e., the task of labeling samples, and of the post test review. \subsubsection{Labeling Test Samples} \begin{itemize} \item In this task, you will receive a set of spreadsheets (one per policy) containing examples (i.e., the context). \item Your task is to label the policy decision (allow/deny/I don’t know) for each example. \end{itemize} \subsubsection{Post-test Review} \begin{itemize} \item In this task, our algorithm will ask you to confirm policy decisions that you have previously provided. \item Please agree (y) or disagree (n) with your decision. \item For every decision that you agree to, please provide a short justification. \end{itemize} \subsection{Study Setup} \label{sec:study_setup} \vspace{-0.5em} In this study, participants were asked to consider a smartphone environment, where personal and work data would be at risk of unauthorized exfiltration from the device. We now describe the participants (i.e., expert users), policy targets and information tags involved in the study. \myparagraphs{Expert Users} We recruited 8 graduate student researchers from a security research lab for this study (denoted as \user{1}$\rightarrow$\user{8}). Our participants had at least 1 academic year of experience (2.5 years on average) in security research at the time of this study, including at least one research project and two graduate-level courses in security or privacy. We use the security-focused course-work and research as an indicator of general security-awareness, and assume the participants to be well-aware of their own security and privacy requirements. Additionally, we confirmed that all our participants used their smartphones for both work and personal data. Finally, through an informal discussion of participant background knowledge, we confirmed that the participants were aware of the threat of exfiltration of work and personal data by third party applications on smartphones, as discussed by prior work (e.g., TaintDroid~\cite{egc+10}). \input{policy_tbl} \myparagraphs{Policy Targets} Table~\ref{tbl:policy} provides the policy targets (i.e., policies) used in our study. The targets are similar to the {\em WorkCloud} target discussed in Section~\ref{sec:pbe}, and either {\sf (a)} restrict the destination Web domain to which data can be exported (i.e., {\em WorkCloud} and {\em PersonalCloud}) or {\sf (b)} restrict the exporters (i.e., applications) that are permitted to export data; i.e., {\em WorkEmailApp}, {\em PersonalEmailApp} and {\em SocialApp} regulate export by the user's work email client, personal email client, and social network client (e.g., the Facebook app) respectively. As described previously, each target is treated as an independent policy. \begin{comment} We consider 7 example export control policies from three categories, i.e., policies that 1) restrict the {\em destination} Web domain to which data can be exported, 2) limit the {\em exporters} (i.e., applications) that are permitted to export data, and 3) restrict the {\em medium} (i.e., the network) using which export may happen. To elaborate, the {\em WorkCloud} and {\em PersonalCloud} policies indicate export of data to the work and personal cloud respectively, with an ``allow'' meaning that data may be exported to the respective cloud. Similarly, the {\em WorkEmailApp}, {\em PersonalEmailApp} and {\em SocialApp} regulate export by the user's work email client, personal email client, and social network client (e.g., the Facebook app) respectively. Finally, the {\em WorkWifi} and {\em HomeWifi} policies regulate export when the user's device is connected to the respective wireless network. \end{comment} \myparagraphs{Information Tags} We provided users with 9 predefined secrecy tags, based on tags available in popular note-taking applications (e.g., Google Keep, Evernote). To enable our experts to create any complex policy they desired, we allowed them to create new tags as well. The tags (user-created or predefined) were primarily of two kinds, namely tags that defined the location or time at which the information was created (e.g., {\tt Work}, {\tt Afterhours}) or the type or class of information (e.g., {\tt Receipt}, {\tt WhiteboardSnapshot}). The tags used in this study are provided in Appendix~\ref{app:tags}. \begin{comment} We do not claim completeness in our choice of network export control policies, as the focus of this work is policy specification, and not design. Further, we note that our approach may be used for specifying even a single coarse-grained policy (e.g., ``export to the network'') or a large number of fine-grained policies (e.g., a separate policy for export by every application on the device). \end{comment} \subsection{Terms} \label{sec:terms} \begin{figure}[t] \centering \includegraphics[width=3in]{figs/terms} \caption{The structure of a context-policy example.} \label{fig:terms} \end{figure} Figure~\ref{fig:terms} describes the anatomy of a policy example. A {\em policy example} is composed of a {\em label}, and a policy {\em decision}. A label is a conjunction of {\em tags}, opaque identifiers that mark the inclusion of specific user resources relevant to the example. For instance, in the case of a data secrecy policy for application data, the tags are user or application-defined information classes (e.g., Receipts, data created at the Hospital). For simplicity, we assume the policy decision to be binary, i.e., allow or deny. Note that the operation controlled by the policy (e.g., read, write) is a part of the policy definition, and is independent of the policy example. \begin{lstlisting}[basicstyle=\ttfamily\scriptsize,float,caption={Policy examples to represent secrecy policies},belowcaptionskip=-6mm,label=lst:policy_example,emph={decision,label},emphstyle=\bfseries] //Scenario 1: Export all receipts, except medical. $e_1$. label= receipt : decision = ALLOW $e_2$. label= receipt ^ hospital : decision = DENY \end{lstlisting} Consider the motivating scenarios described in Section~\ref{sec:motivation}. Each scenario can be described using a set of policy examples. For instance, Listing~\ref{lst:policy_example} uses two policy examples $e_1$ and $e_2$ to express the first scenario where Alice wants to export all receipts to the cloud, except receipts taken at the doctor's office or hospital. The tags $receipt$ and $hospital$ are information classes created by applications (e.g., Evernote), that denote data saved as a receipt and data created at the hospital respectively.
\section{Introduction} As a generalization of Laplace equation and complex Monge-Amp\`{e}re equation on a complex manifold $M$, the following $k$-th complex Hessian equation ($1<k<n$) has been studied extensively, \begin{equation}\label{k-th complex Hessian equation} \left\{\begin{array}{ll} \ (\omega+\ddbar\vp)^{k}\wedge\omega^{n-k}=e^{F}\omega^{n}\\[1mm] \ \omega+\ddbar\vp\in\Gamma_{k}(M)\\[1mm] \ \sup_{M}\vp=0, \end{array}\right. \end{equation} where $\Gamma_{k}(M)$ is the space of $k$-th convex $(1,1)$-forms (cf. Section 2). When $(M,\omega)$ is a compact K\"{a}hler manifold, the second order a priori estimate was obtained by Hou \cite{Hou09} and Hou-Ma-Wu \cite{HMW10}. Lately, by using Hou-Ma-Wu's result, Dinew-Ko{\l}odziej \cite{DK12} solved the existence of (\ref{k-th complex Hessian equation}). Sz\'ekelyhidi \cite{Sze15} extended Dinew-Ko{\l}odziej's result to a Hermitian manifold (see also \cite{Zha15} by Zhang). The $2$-nd complex Hessian type equation plays an important role in Strominger system from the string theory \cite{Str86}. In \cite{FY08}, Fu-Yau reduced the Strominger system to an equation \begin{equation}\label{Fu-Yau equation 1} \ddbar(e^{\vp}-fe^{-\vp})\wedge\omega^{n-1}+n\alpha\ddbar\vp\wedge\ddbar\vp\wedge\omega^{n-2}+\mu\frac{\omega^{n}}{n!}=0, \end{equation} where $\alpha\in\mathbb{R}$ is a slope parameter and $f,\mu\in C^{\infty}(M)$ satisfy some admissible conditions. They found that (\ref{Fu-Yau equation 1}) can be written as a general $2$-nd Hessian equation, \begin{equation}\label{Fu-Yau equation 2} \left\{\begin{array}{ll} \ ((e^{\vp}+fe^{-\vp})\omega+2n\alpha\ddbar\vp)^{2}\wedge\omega^{n-2}=e^{F(z,\partial\vp,\vp)}\omega^{n}\\[1mm] \ (e^{\vp}+fe^{-\vp})\omega+2n\alpha\ddbar\vp\in\Gamma_{2}(M),\\[1mm] \end{array}\right. \end{equation} where \begin{equation*} \begin{split} e^{F(z,\partial\vp,\vp)} & = e^{2\vp}(1-4\alpha e^{-\vp}|\partial\vp|_{g}^{2})+4\alpha fe^{-\vp}|\partial\vp|_{g}^{2}+2f\\ & \quad +e^{-2\vp}f^{2}-\frac{4\alpha\mu}{n-1}+4\alpha e^{-\vp}\left(\Delta f-2\textrm{Re}(g^{i\overline{j}}f_{i}\vp_{\overline{j}})\right). \end{split} \end{equation*} By (\ref{Fu-Yau equation 2}), Fu-Yau \cite{FY07,FY08} solved (\ref{Fu-Yau equation 1}) on a toric fibration over a K3 surface. Recently, Phong-Picard-Zhang \cite{PPZ15} obtained a priori estimates of (\ref{Fu-Yau equation 2}) with slope parameter $\alpha>0$ on a compact K\"{a}hler manifold. In \cite{PPZ16b}, they also solved the existence of (\ref{Fu-Yau equation 2}) with slope parameter $\alpha<0$. In this paper, we generalize the $2$-nd complex Hessian equation to an almost Hermitian manifold $(M,\omega,J)$ and consider equation, \begin{equation}\label{General 2-nd Hessian equation} \left\{ \begin{array}{ll} (\chi(z,\vp)+\ddbar\vp)^{2}\wedge\omega^{n-2}=e^{F(z,\partial\vp,\vp)}\omega^{n} \\[1mm] ( \chi(z,\vp)+\ddbar\vp) \in\Gamma_{2}(M),\\[1mm] \end{array}\right. \end{equation} where $\chi(z,\vp)$ is a positive $(1,1)$-form which may depend on the solution $\varphi$. We prove the following $C^2$-estimate. \begin{theorem}\label{Generalized second order estimate}Let $(M,\omega,J)$ be a compact almost Hermitian manifold. Suppose that $\chi(z,\varphi)\geq\ve_{0}\omega$ for a positive constant $\ve_{0}>0$ and $\vp$ is a smooth solution of (\ref{General 2-nd Hessian equation}). Then the following estimate holds, \begin{equation}\label{c2-varphi} \sup_{M}|\nabla^{2}\vp|_{g}\leq C, \end{equation} where $\nabla$ is the Levi-Civita connection of $g$ and $C$ is a uniform constant depending only on $\ve_{0}$, $\|\vp\|_{C^{1}}$, $\|F\|_{C^{2}}$, $\|\chi\|_{C^{2}}$ and $(M,\omega,J)$. \end{theorem} We note that Theorem \ref{Generalized second order estimate} holds for any solution $\varphi$ with $(\chi(z,\vp)+\ddbar\vp)\in\Gamma_{2}(M)$ and we do not need to assume that $\varphi$ is $\chi(z,\vp)$-convex. When $M$ is K\"{a}hlerian, an analogy of (\ref{c2-varphi}) was obtained for some special function $F$ by Phong-Picard-Zhang \cite{PPZ15,PPZ16b}. In another paper \cite{PPZ16a}, they also got similar estimate (\ref{c2-varphi}) for $\chi(z,\vp)$-convex solutions for general $k$-th complex Hessian equation on a K\"{a}hler manifold. Compared to the work of Phong-Picard-Zhang \cite{PPZ15,PPZ16b}, our method is quite different. First, for general right hand side $F(z,\partial\vp,\vp)$, there are more troublesome terms when one differentiates the equation (\ref{General 2-nd Hessian equation}). We overcome this new obstacle by investigating the structure of $\log\sigma_{2}$ (see Lemma \ref{control C lambda1}). Second, since the almost complex structure $J$ may be not integrable, there are more "bad" third order terms. In order to deal with these terms, we need to analyse the concavity of the operator $\log\sigma_{2}$. More precisely, we estimate the eigenvalues and eigenvectors of the matrix $(-G^{i\overline{i},j\overline{j}})$ (see Lemma \ref{Lemma 6 and Lemma 7}). The structure of $\log\sigma_{2}$ plays an important role in the proof, which involves some delicate calculations. We expect that the analogous argument can be extended to study $\log\sigma_{k}$ ($k>2$). More recently, Chu-Tosati-Weinkove \cite{CTW16} studied the Monge-Amp\`{e}re equation on compact almost Hermitian manifolds and proved the existence and uniqueness of solutions for generalized Calabi-Yau equation. Since the manifold is just almost Hermitian, they gave an approach to estimate the Hessian of solution instead of its complex Hessian. Our motivation is from their work. In addition, the almost Hermitian manifold is a natural research object in non-K\"{a}hler geometry. The motivation of study is from differential geometry as well as mathematical physics. We refer the reader to interesting papers such as \cite{GSVY90,NH03,DeT06,ST12,HL15}, etc. At present, our computations just work for (\ref{General 2-nd Hessian equation}), not available for general $k$-th complex Hessian equation. On the other hand, the constant $C$ in (\ref{c2-varphi}) depends on the norm of $\partial\vp$. We hope that there exists a $C^2$-estimate to (\ref{General 2-nd Hessian equation}) which may give an explicit dependence on $\partial\vp$, so that it can be applied to study the existence of (\ref{General 2-nd Hessian equation}) as in \cite{PPZ16b}. The organization of paper is as follows. In Section 2, we introduce an auxiliary function $\hat Q$ in order to estimate the largest eigenvalue of Hessian matrix of solution of $\sigma_2$-equation. Then in Section 3, we estimate the lower bound of $L(\hat Q)$ for the linear elliptic operator $L$ of $\sigma_2$-equation. The main estimate will be given in Section 4, where Theorem \ref{Generalized second order estimate} will be proved at the end. In Section 5, we give the proof of Lemma \ref{Lemma 6 and Lemma 7}. \bigskip {\bf Acknowledgments. }The first-named author would like to thank his advisor G. Tian for encouragement and support. He also thanks V. Tosatti and B. Weinkove for their collaboration. \section{Preliminaries} \subsection{$\Gamma_k(M)$-space} On an almost Hermitian manifold $(M,\omega,J)$ with real dimension $2n$, $\partial$ and $\overline{\partial}$ operators can be also defined for any $(p,q)$-form $\beta$ (cf. \cite{HL15,CTW16}). In particular, for any $f\in C^{2}(M)$, $\ddbar f=\frac{1}{2}(dJdf)^{(1,1)}$ is a real $(1,1)$-form in $A^{1,1}(M)$, where $A^{1,1}(M)$ is the space of smooth real (1,1) forms on $(M,\omega,J)$. Let $\{e_{i}\}_{i=1}^{n}$ be a local frame for $T_{\mathbb{C}}^{(1,0)}M$ associated to Riemannian metric $g$ on $(M,\omega,J)$. Then (cf. \cite[(2.5)]{HL15}) \begin{equation*} f_{i\overline{j}}=(\ddbar f)(e_{i},\overline{e}_{j})=e_{i}\overline{e}_{j}(f)-[e_{i},\overline{e}_{j}]^{(0,1)}(f). \end{equation*} As usually, we let $\sigma_{k}$ ($1\leq k\leq n$) and $\Gamma_{k}$ be the $k$-th elementary symmetric function and the $k$-th Garding cone on $\mathbb R^n$, respectively. Namely, for any $\eta=(\eta_{1},\eta_{2},\cdots,\eta_{n})\in\mathbb{R}^{n}$, we have \begin{equation*} \begin{split} & \sigma_{k}(\eta) =\sum_{1<i_{1}<\cdots<i_{k}<n}\eta_{i_{1}}\eta_{i_{2}}\cdots\eta_{i_{n}},\\ \Gamma_{k} = & \{ \eta\in\mathbb{R}^{n}~|~ \text{$\sigma_{j}(\eta)>0$ for $j=1,2,\cdots,k$} \}. \end{split} \end{equation*} Clearly $\sigma_k$ is a $k$-multiple functional. Then one can extend it to $A^{1,1}(M)$ by \begin{equation*} \sigma_{k}(\alpha)=\left( \begin{matrix} n\\ k \end{matrix} \right) \frac{\alpha^{k}\wedge\omega^{n-k}}{\omega^{n}}, ~\forall ~\alpha\in A^{1,1}(M). \end{equation*} Define a cone $\Gamma_{k}(M)$ on $A^{1,1}(M)$ by \begin{equation*} \Gamma_{k}(M)=\{ \alpha\in A^{1,1}(M)~|~ \text{$\sigma_{j}(\alpha)>0$ for $j=1,2,\cdots,k$} \}. \end{equation*} Thus we can introduce a $\sigma_k(\cdot)$ operator for any $\varphi\in C^\infty(M)$ with $\tilde \omega= (\chi+\ddbar\vp)\in \Gamma_{k}(M)$ by $$\sigma_k(\chi+\ddbar\vp),$$ where $\chi$ is a real $(1,1)$-form, which may depend on $\varphi$. In this paper, we are interested in $\sigma_2$ operator. We use the following notation \begin{equation*} G^{i\overline{j}}=\frac{\partial\log\sigma_{2}(\tilde{\omega})}{\partial \tilde{g}_{i\overline{j}}} \text{~and~} G^{i\overline{j},k\overline{l}}=\frac{\partial^{2}\log\sigma_{2}(\tilde{\omega})}{\partial \tilde{g}_{i\overline{j}}\partial \tilde {g}_{k\overline{l}}}, \end{equation*} where $\tilde{g}_{i\overline{j}}=\chi_{i\overline{j}}+\vp_{i\overline{j}}$. For any point $x_{0}\in M$, let $\{e_{i}\}_{i=1}^{n}$ be a local unitary frame (with respect to $g$) such that $\tilde{g}_{i\overline{j}}(x_{0})=\delta_{ij}\tilde{g}_{i\overline{i}}(x_{0})$. We denote $\tilde{g}_{i\overline{i}}(x_{0})$ by $\eta_{i}$ and assume \begin{equation*} \eta_{1}\geq\eta_{2}\geq\cdots\geq\eta_{n}. \end{equation*} Then at $x_{0}$, we have \begin{equation}\label{the first order derivative of F} G^{i\overline{j}}=G^{i\overline{i}}\delta_{ij}=\frac{\sigma_{1}(\eta|i)}{\sigma_{2}(\eta)}\delta_{ij}, \end{equation} where $\sigma_{1}(\eta|i) = \sum_{j\neq i}\eta_{j}$. Also we have \begin{equation*}\label{the second order derivative of F} G^{i\overline{j},k\overline{l}}= \left\{\begin{array}{ll} G^{i\overline{i},k\overline{k}}, \text{~~~~if $i=j$, $k=l$;}\\[1mm] G^{i\overline{k},k\overline{i}}, \text{~~~~if $i=l$, $k=j$, $i\neq k$;}\\[1mm] 0, \text{\quad\quad\quad~otherwise.} \end{array}\right. \end{equation*} Moreover, \begin{equation}\label{Definition of Fijkl} \begin{split} G^{i\overline{i},k\overline{k}} & = (1-\delta_{ik})(\sigma_{2}(\eta))^{-1}-(\sigma_{2}(\eta))^{-2}\sigma_{1}(\eta|i)\sigma_{1 }(\eta|k),\\ G^{i\overline{k},k\overline{i}} & = -(\sigma_{2}(\eta))^{-1}. \end{split} \end{equation} Without a confusion, we use $\sigma_{1}$, $\sigma_{2}$ and $\sigma_{1}(i)$ to denote $\sigma_{1}(\eta)$, $\sigma_{2}(\eta)$ and $\sigma_{1}(\eta|i)$, respectively. The following inequalities are very useful. \begin{lemma} At $x_{0}$, we have \begin{equation}\label{lower bound of sum Fii} \sum_{i}G^{i\overline{i}}\geq \frac{2(n-1)}{n}\sigma_{2}^{-\frac{1}{2}}, \end{equation} \begin{equation}\label{Inequality 3} \eta_{1}\sigma_{1}(1)\geq \frac{2}{n}\sigma_{2}, \end{equation} \begin{equation}\label{Inequality 2} G^{i\ol{i}}\geq C\sum_{k}G^{k\ol{k}} \text{~for~} i\geq 2. \end{equation} \end{lemma} \begin{proof} (\ref{lower bound of sum Fii}) and (\ref{Inequality 3}) are direct consequences of Maclaurin's inequality. For a proof of (\ref{Inequality 2}), see \cite[Theorem 1]{LT94}. \end{proof} We define a second order operator on $(M,\omega,J)$ by \begin{equation*} L(f)=G^{i\overline{j}}f_{i\overline{j}}, \end{equation*} where $f\in C^{2}(M)$. It is clear that $L$ is the linearized operator of (\ref{General 2-nd Hessian equation}). Since $\chi+\ddbar\vp\in\Gamma_{2}(M)$, $L$ is a second order elliptic operator. Here we use Einstein notation convention for convenience. \subsection{An auxiliary function} As mentioned in Section 1, we follow the argument in \cite{CTW16} to obtain estimate (\ref{c2-varphi}). For any smooth function $\varphi$, we denote the eigenvalues of $\nabla^{2}\vp$ by $\lambda_{1}(\nabla^{2}\vp)\geq\lambda_{2}(\nabla^{2}\vp)\geq\cdots\geq\lambda_{2n}(\nabla^{2}\vp)$. Since $(\chi+\ddbar\vp)\in \Gamma_{2}(M)\subset\Gamma_{1}(M)$, \begin{equation*} |\nabla^{2}\vp|_{g}\leq C\lambda_{1}(\nabla^{2}\vp)+C, \end{equation*} for a uniform constant $C$. Hence, it suffices to estimate $\lambda_{1}(\nabla^{2}\vp)$. On the open set $M_+=\{x\in M~|~\lambda_{1}(\nabla^{2}\vp)>0\}$, we consider the following quantity \begin{equation*} Q=\log\lambda_{1}(\nabla^{2}\vp)+h(|\partial\vp|_{g}^{2})+e^{-A\varphi}, \end{equation*} where $A$ is a constant to be determined. Without loss of generality, we may assume that $M_+$ is nonempty. Otherwise, we get upper bound of $\lambda_{1}(\nabla^{2}\vp)$ directly. Here \begin{equation*} h(s)=-\frac{1}{2}\log(1+\sup_{M}|\partial\varphi|^{2}_{g}-s), ~\forall~s\ge 0. \end{equation*} Then \begin{equation}\label{Properties of h} \frac{1}{2}\geq h^{'}\geq \frac{1}{2+2\sup_{M}|\partial\varphi|^{2}_{g}} \text{~and~} h''\geq 2(h')^{2}. \end{equation} We assume that $Q$ attains its maximum at $x_{0}$ on $M_+$. Near $x_{0}$, there exists a local unitary frame $\{e_{i}\}_{i=1}^{n}$ (with respect to $g$) such that at $x_{0}$, we have \begin{equation*} \text{$g_{i\overline{j}}=\delta_{ij}$, $\tilde{g}_{i\overline{j}}=\delta_{ij}\tilde{g}_{i\overline{j}}$ and $\tilde{g}_{1\overline{1}}\geq\tilde{g}_{2\overline{2}}\geq\cdots\geq\tilde{g}_{n\overline{n}}$.} \end{equation*} For convenience, we denote $\tilde{g}_{i\overline{i}}(x_{0})$ by $\eta_{i}$. On the other hand, since $(M,\omega,J)$ is almost Hermitian, we can find a normal coordinate system $(U,\{x^{\alpha}\}_{i=1}^{2n})$ around $x_{0}$ such that it holds at $x_{0}$, \begin{equation}\label{real frame and complex frame} e_{i}=\frac{1}{\sqrt{2}}(\partial_{2i-1}-\sqrt{-1}\partial_{2i}) \text{~for~} i=1,2,\cdots,n \end{equation} and \begin{equation*} \frac{\partial g_{\alpha\beta}}{\partial x^{\gamma}}=0 \text{~for~} \alpha,\beta,\gamma=1,2,\cdots,2n. \end{equation*} Let $V_{1},V_{2},\cdots,V_{n}$ be $g$-unit eigenvectors of $\nabla^{2}\vp$ corresponding to eigenvalues $\lambda_{1}(\nabla^{2}\vp),\lambda_{2}(\nabla^{2}\vp),\cdots,\lambda_{2n}(\nabla^{2}\vp)$ at $x_{0}$. We assume that $V_{\alpha}=V_{\alpha}^{\beta}\partial_{\beta}$ at $x_{0}$ and extend vector $V_{\alpha}$ to vector fields on $U$ by taking the components $V_{\alpha}^{\beta}$ to be constant. When $\lambda_{1}(\nabla^{2}\vp)(x_{0})=\lambda_{2}(\nabla^{2}\vp)(x_{0})$, $\lambda_{1}(\nabla^{2}\vp)$ is not smooth near $x_{0}$. To avoid this non-smooth case, we apply a perturbation argument as in \cite{CTW16,Sze15,STW15}). We define an endomorphism $\Phi$ of $TM$ on $U$ by \begin{equation}\label{Definition of Phi} \begin{split} \Phi & = \Phi_{\alpha}^{\beta}~\frac{\partial}{\partial x^{\alpha}}\otimes dx^{\beta}\\ & = (g^{\alpha\gamma}\vp_{\gamma\beta}-g^{\alpha\gamma}B_{\gamma\beta})\frac{\partial}{\partial x^{\alpha}}\otimes dx^{\beta}, \end{split} \end{equation} where $B_{\gamma\beta}=\delta_{\gamma\beta}-V_{1}^{\gamma}V_{1}^{\beta}$. Let $\lambda_{1}(\Phi)\geq\lambda_{2}(\Phi)\geq\cdots\geq\lambda_{2n}(\Phi)$ be the eigenvalues of $\Phi$. Then $V_{1},V_{2},\cdots,V_{2n}$ are still eigenvectors of $\Phi$, corresponding to eigenvalues $\lambda_{1}(\Phi),\lambda_{2}(\Phi),\cdots,\lambda_{2n}(\Phi)$ at $x_{0}$. Moreover, $\lambda_{1}(\Phi)(x_{0})>\lambda_{2}(\Phi)(x_{0})$, which implies $\lambda_{1}(\Phi)$ is smooth near $x_{0}$. On $U$, we replace $Q$ by the following smooth quantity \begin{equation*} \hat{Q}=\log\lambda_{1}(\Phi)+h(|\partial\vp|_{g}^{2})+e^{-A\varphi}. \end{equation*} Since $\lambda_{1}(\nabla^{2}\vp)(x_{0})=\lambda_{1}(\Phi)(x_{0})$ and $\lambda_{1}(\nabla^{2}\vp)\geq\lambda_{1}(\Phi)$, $x_{0}$ is still the maximum point of $\hat{Q}$. For convenience, we denote $\lambda_{\alpha}(\Phi)$ by $\lambda_{\alpha}$ for $\alpha=1,2,\cdots,2n$. The following formulas give the first and second derivatives of $\lambda_{1}$ at $x_{0}$ (see e.g. \cite[Lemma 5.2]{CTW16}). \begin{lemma}\label{First and second derivatives of lambda1} \begin{equation} \begin{split} ~&\lambda_{1}^{\alpha\beta}:=\frac{\partial \lambda_{1}}{\partial \Phi^{\alpha}_{\beta}}=V_{1}^{\alpha}V_{1}^{\beta},\\ ~&\lambda_{1}^{\alpha\beta,\gamma\delta}:=\frac{\partial^{2}\lambda_{1}}{\partial \Phi^{\alpha}_{\beta}\partial\Phi^{\gamma}_{\delta}}= \sum_{\mu>1}\frac{V_{1}^{\alpha}V_{\mu}^{\beta}V_{\mu}^{\gamma}V_{1}^{\delta}+V_{\mu}^{\alpha}V_{1}^{\beta}V_{1}^{\gamma}V_{\mu}^{\delta}}{\lambda_{1}-\lambda_{\mu}}. \end{split} \end{equation} where $\alpha,\beta,\gamma,\delta=1,2,\cdots,2n$. \end{lemma} \section{Lower bound of $L(\hat{Q})$} In this section we compute $L(\hat{Q})$ by using equation (\ref{General 2-nd Hessian equation}). Since the right hand side $F$ of (\ref{General 2-nd Hessian equation}) depends on $\partial\vp$, a trouble is that a bad term $-C\lambda_{1}$ will appear when we differentiate (\ref{General 2-nd Hessian equation}) twice. We use the structure of the operator $\log\sigma_{2}$ to overcome it (see Lemma \ref{control C lambda1}). Locally, $F(z,\partial\varphi,\varphi)$ can be regarded as a real-valued function on the set $\Gamma=U\times\mathbb{C}^{n}\times\mathbb{R}$. We denote points in $\Gamma$ typically by $\gamma=(z,p,r)$ where $z\in U$, $p=(p_{1},p_{2},\cdots,p_{n})\in\mathbb{C}^{n}$ and $r\in\mathbb{R}$. For convenience, we use the following notations \begin{equation*} \begin{split} F_{r} =\frac{\partial F}{\partial r},F_{p_{i}} & =\frac{\partial F}{\partial p_{i}},F_{\overline{p}_{i}}=\frac{\partial F}{\partial \overline{p}_{i}},\\ F_{i} =e_{i}(F(\cdot,p,r)),F_{\overline{i}} & =\overline{e}_{i}(F(\cdot,p,r)),F_{W}=W(F(\cdot,p,r)), \end{split} \end{equation*} where $W$ is a vector field. In the following, we always compute derivatives at the maximal point $x_0$ of $\hat Q$. First we show \begin{lemma}\label{L partial varphi} \begin{equation}\label{l-nabla-varphi} \begin{split} L(|\partial \varphi|_{g}^{2}) & \geq \frac{1}{2}\sum_{k} G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline{e}_{k}(\varphi)|^{2}) -C\sum_{i} G^{i\overline{i}}\\ &\quad+2\sum_{k,i}{\rm Re}\left(\vp_{k}(F_{p_{i}}\overline{e}_k{e}_{i}(\varphi)+F_{\overline{p}_{i}}\overline{e}_k\overline{e}_{i}(\varphi))\right). \end{split} \end{equation} \end{lemma} \begin{proof} By (\ref{General 2-nd Hessian equation}), we have \begin{equation}\label{L partial varphi equation 1} \log\sigma_{2}(\tilde{\omega}) =\log\left( \begin{matrix} n\\ 2 \end{matrix} \right)+F(z,\partial\varphi,\varphi), \end{equation} where $\tilde{\omega}=\chi+\ddbar\vp$. For any vector field $W$, differentiating (\ref{L partial varphi equation 1}) along $W$ at $x_{0}$, we get \begin{equation} G^{i\overline{j}}W(\tilde{g}_{i\overline{j}})=W(F), \end{equation} which implies \begin{equation}\label{differentiating once to equation} \begin{split} & \sum_{k}G^{i\overline{i}}(W e_{i}\overline{e}_{i}(\varphi)-W[e_{i},\overline{e}_{i}]^{(0,1)}(\varphi))\\ &= -G^{i\overline{i}}W(\chi_{i\overline{i}})+F_{W}+ F_{r}W(\varphi)+F_{p_{i}}W{e}_{i}(\varphi)+F_{\overline{p}_{i}}W\overline{e}_{i}(\varphi).\\[2mm] \end{split} \end{equation} By choosing $W=\ol{e}_{k}$, it follows \begin{equation}\label{L partial varphi equation 2} \begin{split} & \sum_{k}G^{i\overline{i}}(\vp_{k}\overline{e}_{k}e_{i}\overline{e}_{i}(\varphi)-\vp_{k}\overline{e}_{k}[e_{i},\overline{e}_{i}]^{(0,1)}(\varphi))\\ & \geq 2\sum_{i,k}\left(\vp_{k}F_{p_{i}}\overline{e}_k{e}_{i}(\varphi)+\vp_{k}F_{\overline{p}_{i}}\overline{e}_k\overline{e}_{i}(\varphi)\right) -C\sum_{i}G^{i\overline{i}}. \end{split} \end{equation} On the other hand, \begin{equation}\label{L partial varphi equation 3} \begin{split} L(|\partial\vp|_{g}^{2}) &= \sum_{k}G^{i\overline{i}}\left(e_{i}\overline{e}_{i}(\vp_{k}\vp_{\overline{k}}) -[e_{i},\overline{e}_{i}]^{(0,1)}(\vp_{k}\vp_{\overline{k}})\right)\\ & = \sum_{k}G^{i\overline{i}}(|e_{i}e_{k}(\vp)|^{2}+|e_{i}\overline{e}_{k}(\vp)|^{2})\\ &+\sum_{k}G^{i\overline{i}}\left(\vp_{k}e_{i}\overline{e}_{i}\overline{e}_{k}(\vp) -\vp_{k}[e_{i},\overline{e}_{i}]^{(0,1)}\overline{e}_{k}(\vp)\right)\\ & +\sum_{k}G^{i\overline{i}}\left(\vp_{\overline{k}}e_{i}\overline{e}_{i}e_{k}(\vp)-\vp_{\overline{k}}[e_{i},\overline{e}_{i}]^{(0,1)}e_{k}(\vp)\right). \end{split} \end{equation} Note \begin{equation*} \begin{split} & \sum_{k}G^{i\overline{i}}\left(\vp_{k}e_{i}\overline{e}_{i}\overline{e}_{k}(\vp)-\vp_{k}[e_{i},\overline{e}_{i}]^{(0,1)}\overline{e}_{k}(\vp)\right)\\ &\geq \sum_{k}G^{i\overline{i}}\left(\vp_{k}\overline{e}_{k}e_{i}\overline{e}_{i}(\vp)-\vp_{k}\overline{e}_{k}[e_{i},\overline{e}_{i}]^{(0,1)}(\vp)\right) -C\sum_{i}G^{i\overline{i}}\\ & -C\sum_{k}G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|+|e_{i}\overline{e}_{k}(\varphi)|). \end{split} \end{equation*} By (\ref{L partial varphi equation 2}) and the Cauchy-Schwarz inequality, it follows \begin{equation*} \begin{split} & ~\sum_{k}G^{i\overline{i}}\left(\vp_{k}e_{i}\overline{e}_{i}\overline{e}_{k}(\vp)-\vp_{k}[e_{i},\overline{e}_{i}]^{(0,1)}\overline{e}_{k}(\vp)\right)\\ &\geq ~ 2\sum_{i,k}\left(\vp_{k}F_{p_{i}}\overline{e}_k{e}_{i}(\varphi)+\vp_{k}F_{\overline{p}_{i}}\overline{e}_k\overline{e}_{i}(\varphi)\right) -C\sum_{i}G^{i\overline{i}}\\ & -\frac{1}{4}\sum_{k}G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline{e}_{k}(\varphi)|^{2}). \end{split} \end{equation*} Similarly, \begin{equation*} \begin{split} & ~\sum_{k}G^{i\overline{i}}\left(\vp_{\overline{k}}e_{i}\overline{e}_{i}e_{k}(\vp)-\vp_{\overline{k}}[e_{i},\overline{e}_{i}]^{(0,1)}e_{k}(\vp)\right)\\ &\geq ~ 2\sum_{i,k}\left(\vp_{\overline{k}}F_{p_{i}}e_{k}{e}_{i}(\varphi) +\vp_{\overline{k}}F_{\overline{p}_{i}}e_{k}\overline{e}_{i}(\varphi)\right)-C\sum_{i}G^{i\overline{i}}\\ & -\frac{1}{4}\sum_{k}G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline{e}_{k}(\varphi)|^{2}). \end{split} \end{equation*} Substituting the above two inequalities into (\ref{L partial varphi equation 3}), we get (\ref{l-nabla-varphi}) immediately. \end{proof} Next, we compute $L(\lambda_{1})$. \begin{lemma}\label{the differential of eigenvalue} \begin{equation*} \begin{split} L(\lambda_{1}) & \geq 2\sum_{\alpha>1}\frac{G^{i\overline{i}}|e_{i}(\varphi_{V_{\alpha}V_{1}})|^{2}}{(\lambda_{1}-\lambda_{\alpha})} -{G^{i\overline{j},k\overline{l}}V_{1}(\tilde{g}_{i\overline{j}})V_{1}(\tilde{g}_{k\overline{l}})}\\ & \quad -2G^{i\overline{i}}[V_{1},e_{i}]V_{1}\overline{e}_{i}(\varphi)- 2G^{i\overline{i}}[V_{1},\overline{e}_{i}]V_{1}{e}_{i}(\varphi)\\[2mm] & \quad -C\lambda_{1}\sum_{i}G^{i\overline{i}}-C\lambda_{1}^{2}+F_{p_{i}}V_{1}V_{1}e_{i}(\varphi) +F_{\overline{p}_{i}}V_{1}V_{1}\overline{e}_{i}(\varphi). \end{split} \end{equation*} \end{lemma} \begin{proof} The proof is similar to one of \cite[Lemma 5.3]{CTW16}. In fact, by Lemma \ref{First and second derivatives of lambda1}, we have \begin{equation}\label{the differential of eigenvalue equation 1} \begin{split} &L(\lambda_{1}) \\& = G^{i\overline{i}}\lambda_{1}^{\alpha\beta,\gamma\delta}e_{i}(\Phi^{\gamma}_{\delta}) \overline{e}_{i}(\Phi^{\alpha}_{\beta})+G^{i\overline{i}}\lambda_{1}^{\alpha\beta}e_{i}\overline{e}_{i} (\Phi_{\beta}^{\alpha})-G^{i\overline{i}}\lambda_{1}^{\alpha\beta}[e_{i},\overline{e}_{i}]^{(0,1)}(\Phi_{\beta}^{\alpha})\\ & = G^{i\overline{i}}\lambda_{1}^{\alpha\beta,\gamma\delta}e_{i}(\varphi_{\alpha\beta}) \overline{e}_{i}(\varphi_{\alpha\beta}) +G^{i\overline{i}}\lambda_{1}^{\alpha\beta}e_{i}\overline{e}_{i}(\varphi_{\alpha\beta}) +G^{i\overline{i}}\lambda_{1}^{\alpha\beta}\varphi_{\gamma\beta}e_{i}\overline{e}_{i}(g^{\alpha\gamma})\\ & \quad -G^{i\overline{i}}\lambda_{1}^{\alpha\beta}B_{\gamma\beta}e_{i}\overline{e}_{i}(g^{\alpha\gamma}) -G^{i\overline{i}}\lambda_{1}^{\alpha\beta}[e_{i},\overline{e}_{i}]^{(0,1)}(\varphi_{\alpha\beta})\\ & \geq 2\sum_{\alpha>1}G^{i\overline{i}}\frac{|e_{i}(\varphi_{V_{\alpha}V_{1}})|^{2}}{\lambda_{1}-\lambda_{\alpha}} -C\lambda_{1}\sum_{i}G^{i\overline{i}}\\ &+G^{i\overline{i}}e_{i}\overline{e}_{i}(\varphi_{V_{1}V_{1}}) -G^{i\overline{i}}[e_{i},\overline{e}_{i}]^{(0,1)}(\varphi_{V_{1}V_{1}}). \end{split} \end{equation} We need to deal with last two terms in (\ref{the differential of eigenvalue equation 1}). Note $|e_{i}\overline{e}_{i}(\nabla_{V_1}V_1)(\vp)-(\nabla_{V_1}V_1)e_{i}\overline{e}_{i}(\vp)|\leq C\lambda_{1}$. Then by \eqref{differentiating once to equation}, we have \begin{equation*} \left|G^{i\overline{i}}e_{i}\overline{e}_{i}(\nabla_{V_1}V_1)(\vp)\right|\leq C\lambda_{1} \sum_{i} G^{i\overline{i}}+C\lambda_{1}. \end{equation*} It follows \begin{equation*} \begin{split} & G^{i\overline{i}}e_{i}\overline{e}_{i}(\vp_{V_{1}V_{1}})-G^{i\overline{i}}[e_{i},\overline{e}_{i}]^{(0,1)}(\vp_{V_{1}V_{1}})\\ & = G^{i\overline{i}}e_{i}\overline{e}_{i}V_{1}V_{1}(\vp)-G^{i\overline{i}}e_{i}\overline{e}_{i}(\nabla_{V_{1}}V_{1})(\vp) -G^{i\overline{i}}[e_{i},\overline{e}_{i}]^{(0,1)}V_{1}V_{1}(\vp)\\ & +G^{i\overline{i}}[e_{i},\overline{e}_{i}]^{(0,1)}(\nabla_{V_{1}}V_{1})(\vp)\\ & \geq G^{i\overline{i}}e_{i}\overline{e}_{i}V_{1}V_{1}(\vp)-G^{i\overline{i}}[e_{i},\overline{e}_{i}]^{(0,1)}V_{1}V_{1}(\vp) -C\lambda_{1}\sum_{i}G^{i\overline{i}}-C\lambda_{1}. \end{split} \end{equation*} By using the Lie bracket for vector fields, we further get \begin{equation*} \begin{split} & G^{i\overline{i}}e_{i}\overline{e}_{i}V_{1}V_{1}(\varphi)-G^{i\overline{i}}[e_{i},\overline{e}_{i}]^{(0,1)}V_{1}V_{1}(\varphi) \\ \geq ~~& G^{i\overline{i}}\left(V_{1}e_{i}\overline{e}_{i}V_{1}(\vp)+[e_{i},V_{1}]\overline{e}_{i}V_{1}(\vp) -[V_{1},\overline{e}_{i}]e_{i}V_{1}(\vp)-V_{1}V_{1}[e_{i},\overline{e}_{i}]^{(0,1)}(\vp)\right)\\ & -C\lambda_{1}\sum_{i}G^{i\overline{i}}\\ \geq ~~&G^{i\overline{i}}V_{1}V_{1}\left(e_{i}\overline{e}_{i}(\varphi)-[e_{i},\overline{e}_{i}]^{(0,1)}(\varphi)\right) -2G^{i\overline{i}}[V_{1},e_{i}]V_{1}\overline{e}_{i}(\vp)\\ & -2G^{i\overline{i}}[V_{1},\overline{e}_{i}]V_{1}e_{i}(\vp)-C\lambda_{1}\sum_{i}G^{i\overline{i}}. \end{split} \end{equation*} Thus \begin{equation}\label{the differential of eigenvalue equation 4} \begin{split} &G^{i\overline{i}}e_{i}\overline{e}_{i}(\varphi_{V_{1}V_{1}})-G^{i\overline{i}}[e_{i},\overline{e}_{i}]^{(0,1)}(\varphi_{V_{1}V_{1}})\\ \geq~~& G^{i\overline{i}}V_{1}V_{1}(\tilde{g}_{i\overline{i}})-2G^{i\overline{i}}[V_{1},e_{i}]V_{1}\overline{e}_{i}(\vp) -2G^{i\overline{i}}[V_{1},\overline{e}_{i}]V_{1}e_{i}(\vp)\\ &-C\lambda_{1}\sum_{i}G^{i\overline{i}}-C\lambda_{1}. \end{split} \end{equation} On the other hand, differentiating (\ref{L partial varphi equation 1}) along $V_1$ twice at $x_{0}$, we have \begin{equation*} G^{i\overline{i}}V_{1}V_{1}(\tilde{g}_{i\overline{i}})+G^{i\overline{j},k\overline{l}}V_{1}(\tilde{g}_{i\overline{j}})V_{1}(\tilde{g}_{k\overline{l}})=F_{p_{i}}V_{1}V_{1}e_{i}(\varphi) +F_{\overline{p}_{i}}V_{1}V_{1}\overline{e}_{i}(\varphi)+E, \end{equation*} where $E$ denotes a term satisfying $|E|\leq C\lambda_{1}^{2}$ for a uniform constant $C$. Thus by (\ref{the differential of eigenvalue equation 4}), we get \begin{equation*} \begin{split} & G^{i\overline{i}}e_{i}\overline{e}_{i}(\varphi_{V_{1}V_{1}})-G^{i\overline{i}}[e_{i},\overline{e}_{i}]^{(0,1)}(\varphi_{V_{1}V_{1}})\\ \geq ~& -{G^{i\overline{j},k\overline{l}}V_{1}(\tilde{g}_{i\overline{j}})V_{1}(\tilde{g}_{k\overline{l}})} -2G^{i\overline{i}}[V_{1},e_{i}]V_{1}\overline{e}_{i}(\varphi)-2G^{i\overline{i}}[V_{1},\overline{e}_{i}]V_{1}{e}_{i}(\varphi)\\ & -C\lambda_{1}\sum_{i}G^{i\overline{i}}-C\lambda_{1}^{2}+F_{p_{i}}V_{1}V_{1}e_{i}(\varphi)+F_{\overline{p}_{i}}V_{1}V_{1}\overline{e}_{i}(\varphi). \end{split} \end{equation*} Substituting the above inequality into (\ref{the differential of eigenvalue equation 1}), we prove the lemma. \end{proof} By Lemma \ref{L partial varphi} and Lemma \ref{the differential of eigenvalue}, we get \begin{equation}\label{LQ Lemma equation 4} \begin{split} &L(\log\lambda_{1}(\Phi)+h(|\partial\vp|_{g}^{2}))\\ &= \frac{L(\lambda_{1})}{\lambda_{1}}+h'L(|\partial \varphi|^{2}_{g}) -\frac{G^{i\overline{i}}|e_{i}(\vp_{V_{1}V_{1}})|^{2}}{\lambda_{1}^{2}}+ h''G^{i\overline{i}}|e_{i}|\partial\varphi|^{2}_{g}|^{2} \\ &\ge 2\sum_{\alpha>1}\frac{G^{i\overline{i}}|e_{i}(\varphi_{V_{\alpha}V_{1}})|^{2}}{\lambda_{1}(\lambda_{1}-\lambda_{\alpha})} -\frac{G^{i\ol{j},k\ol{l}}V_{1}(\tilde{g}_{i\ol{j}})V_{1}(\tilde{g}_{k\ol{l}})}{\lambda_{1}}\\ &+\frac{h'}{2}\sum_{k}G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline{e}_{k}(\varphi)|^{2})+ h''G^{i\overline{i}}|e_{i}|\partial\varphi|^{2}_{g}|^{2}\\ &-\frac{G^{i\overline{i}}|e_{i}(\vp_{V_{1}V_{1}})|^{2}}{\lambda_{1}^{2}}-C\sum_{i}G^{i\overline{i}}\\ & -\frac{2G^{i\overline{i}}[V_{1},e_{i}]V_{1}\overline{e}_{i}(\varphi)+ 2G^{i\overline{i}}[V_{1},\overline{e}_{i}]V_{1}{e}_{i}(\varphi)}{\lambda_{1}}\\ &+ [F_{p_{i}}(\frac{ V_{1}V_{1}e_{i}(\varphi)}{\lambda_{1}}+h'(\vp_{\overline{k}} e_{k}e_{i}(\varphi)+\vp_{k}\overline{e}_{k}e_{i}(\vp))]\\ & +[F_{\overline{p}_{i}} (\frac{V_{1}V_{1}\overline{e}_{i}(\varphi)}{\lambda_{1}}+h'(\vp_{\overline{k}} e_{k}\overline{e}_{i}(\varphi)+\vp_{k}\overline{e}_{k}\overline{e}_{i}(\vp))]\\ & -C\lambda_{1}. \end{split} \end{equation} We need to deal with last fourth terms in (\ref{LQ Lemma equation 4}) where three parts are about the 3th-derivative of $\varphi$ and one is an eigenvalue function. The term $$-\frac{2G^{i\overline{i}}[V_{1},e_{i}]V_{1}\overline{e}_{i}(\varphi)+ 2G^{i\overline{i}}[V_{1},\overline{e}_{i}]V_{1}{e}_{i}(\varphi)}{\lambda_{1}}$$ can be handled as \begin{equation}\label{LQ Lemma equation 2} \begin{split} & \frac{2G^{i\overline{i}}[V_{1},e_{i}]V_{1}\overline{e}_{i}(\varphi)+ 2G^{i\overline{i}}[V_{1},\overline{e}_{i}]V_{1}{e}_{i}(\varphi)}{\lambda_{1}}\\ \leq &~ \ve \frac{G^{i\overline{i}}|e_{i}(\varphi_{V_1V_{1}})|^{2}}{\lambda_{1}^{2}}+\ve\sum_{\alpha>1}\frac{G^{i\overline{i}}|e_{i}(\varphi_{V_\alpha V_{1}})|^{2}} {\lambda_{1}(\lambda_{1}-\lambda_{\alpha})}+\frac{C}{\ve}\sum_{i}G^{i\overline{i}}. \end{split} \end{equation} Here $\ve\in(0,\frac{1}{2}]$ is a constant to be determined later. We refer the reader to a similar argument in \cite[Lemma 5.4] {CTW16}. To control the term $(\frac{ V_{1}V_{1}e_{i}(\varphi)}{\lambda_{1}}+h'(\vp_{\overline{k}}e_{k}e_{i}(\varphi)+\vp_{k}\overline{e}_{k}e_{i}(\vp))$ in (\ref{LQ Lemma equation 4}). We use the fact $d\hat Q(x_0)=0$. In fact, \begin{equation}\label{first-derivative} \begin{split} \frac{e_{i}(\varphi_{V_{1}V_{1}})}{\lambda_{1}} & = Ae^{-A\vp}e_{i}(\varphi)-h'e_{i}(|\partial\varphi|_{g}^{2})\\ & = Ae^{-A\vp}e_{i}(\varphi)-h'\left(\vp_{\overline{k}} e_{i}e_{k}(\varphi)+\vp_{k}e_{i}\ol{e}_{k}(\vp)\right). \end{split} \end{equation} Note \begin{equation*} \left|V_{1}V_{1}e_{i}(\vp) - e_{i}(\vp_{V_{1}V_{1}})\right|\leq C\lambda_{1}. \end{equation*} Thus \begin{equation}\label{LQ Lemma vanish equation 1} \begin{split} &\left | F_{p_{i}} \left( \frac{V_{1}V_{1}e_{i}(\varphi)}{\lambda_{1}}+h' (\vp_{\overline{k}} e_{k}e_{i}(\varphi)+\vp_{k}\overline{e}_{k}e_{i}(\vp) ) \right) \right|\\ &\leq |F_{p_{i}}|\cdot\left|\frac{V_{1}V_{1}e_{i}(\varphi)}{\lambda_{1}}-\frac{e_{i}(\vp_{V_{1}V_{1}})}{\lambda_{1}}+Ae^{-A\vp}e_{i}(\vp)\right|\\ & \leq CAe^{-A\vp}. \end{split} \end{equation} Similarly, we have \begin{equation}\label{LQ Lemma vanish equation 2} \left| F_{\overline{p}_i} \left( \frac{V_{1}V_{1}\overline{e}_{i}(\varphi)}{\lambda_{1}}+ h' (\vp_{\overline{k}} e_{k}\overline{e}_{i}(\varphi)+\vp_{k}\overline{e}_{k}\overline{e}_{i}(\vp) ) \right)\right |\leq CAe^{-A\varphi}. \end{equation} The following lemma gives a control to $\lambda_{1}$ for the solution $\varphi$ in (\ref{General 2-nd Hessian equation}). \begin{lemma}\label{control C lambda1} \begin{equation*} C\lambda_{1} \leq \frac{h'}{4}\sum_{k}G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline{e}_{k}(\varphi)|^{2})+C\sum_{i}G^{i\overline{i}}. \end{equation*} \end{lemma} \begin{proof} At $x_{0}$, by (\ref{the first order derivative of F}), we have \begin{equation*} G^{i\overline{j}}=\frac{\sigma_{1}(i)}{\sigma_{2}}\delta_{ij}, \end{equation*} where $\eta_{i}=\tilde{g}_{i\overline{i}}$ and $\sigma_{1}(i)=\sum_{k\neq i}\eta_{k}$. It is clear that \begin{equation*} \begin{split} \sigma_{1}(1)\sigma_{1}(\eta) & = (\sigma_{1}(1))^{2}+\eta_{1}\sigma_{1}(1)\\ & =\sum_{i\geq2}\eta_{i}^{2}+2\sum_{i>j\geq2}\eta_{i}\eta_{j}+\sum_{i\geq2}\eta_{1}\eta_{i}\\ & =\sum_{i\geq2}\eta_{i}^{2}+\sum_{i>j\geq2}\eta_{i}\eta_{j}+\sigma_{2}\\ & \geq \sigma_{2}, \end{split} \end{equation*} which implies \begin{equation*} \frac{1}{G^{i\overline{i}}}\leq\frac{1}{G^{1\overline{1}}}=\frac{\sigma_{2}}{\sigma_{1}(1)}\leq \sigma_{1}=\frac{\sigma_{2}}{n-1}\sum_{k}G^{k\overline{k}}\leq C\sum_{k}G^{k\overline{k}},~i=1,2,\cdots,n. \end{equation*} Combining this with the Cauchy-Schwarz inequality and (\ref{Properties of h}), we have \begin{equation*} \begin{split} C\lambda_{1} & \leq \frac{h'}{4}G^{1\overline{1}}\lambda_{1}^{2}+\frac{C}{h'G^{1\overline{1}}}\\ & \leq \frac{h'}{4}\sum_{k}G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline{e}_{k}(\varphi)|^{2})+C\sum_{i}G^{i\overline{i}}, \end{split} \end{equation*} as required. \end{proof} Substituting the above relations into (\ref{LQ Lemma equation 4}), we get the main estimate in this section. \begin{proposition}\label{LQ Lemma} Let $\vp$ be the solution of (\ref{General 2-nd Hessian equation}). Then at $x_{0}$, there exists a uniform constant $C$ such that for any $\ve \in (0, \frac{1}{2}]$, it holds \begin{equation}\label{main-estimate-1} \begin{split} 0 & \geq(2-\ve)\sum_{\alpha>1}\frac{G^{i\overline{i}}|e_{i}(\varphi_{V_{\alpha}V_{1}})|^{2}}{\lambda_{1}(\lambda_{1}-\lambda_{\alpha})} -\frac{G^{i\ol{j},k\ol{l}}V_{1}(\tilde{g}_{i\ol{j}})V_{1}(\tilde{g}_{k\ol{l}})}{\lambda_{1}}\\ &-(1+\ve)\frac{G^{i\overline{i}}|{e_{i}(\varphi_{V_{1}V_{1}})}|^{2}}{\lambda_{1}^{2}}\\ & +\frac{h'}{4}\sum_{k}G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline {e}_{k}(\varphi)|^{2})+h''G^{i\overline{i}}|e_{i}(|\partial\varphi|_{g}^{2})|^{2}\\ & +\left(\ve_{0} Ae^{-A\varphi} -\frac{C}{\ve}\right)\sum_{i}G^{i\overline{i}} +A^{2}e^{-A\varphi}G^{i\overline{i}}|\varphi_{i}|^{2}-CA e^{-A\varphi}. \end{split} \end{equation} \end{proposition} \begin{proof} At $x_{0}$, we have \begin{align} 0& \geq L(\hat{Q})\notag\\ &=L(\log\lambda_{1}+h(|\partial\vp|_{g}^{2})) -Ae^{-A\varphi}L(\varphi)+A^{2}e^{-A\varphi}G^{i\overline{i}}|e_{i}(\varphi)|^{2}.\notag \end{align} Note \begin{equation*} L(\vp)=G^{i\overline{i}}(\tilde{g}_{i\overline{i}}-\chi_{i\overline{i}})=2-G^{i\overline{i}}\chi_{i\overline{i}}\leq 2-\ve_{0}\sum_{i}G^{i\overline{i}}. \end{equation*} Thus by (\ref{LQ Lemma equation 4}) together with estimates (\ref{LQ Lemma equation 2}), (\ref{LQ Lemma vanish equation 1}), (\ref{LQ Lemma vanish equation 2}) and Lemma \ref{control C lambda1}, one get (\ref{main-estimate-1}) immediately. \end{proof} By concavity of $\log\sigma_{2}$ and (\ref{Definition of Fijkl}), we see that $-G^{k\overline{l},l\overline{k}}>0$ and $(-G^{i\overline{i},k\overline{k}})$ is a non-negative definite matrix. Hence, the "good" positive terms at the right hand of (\ref{main-estimate-1}) is \begin{equation*} I=(2-\ve)\sum_{\alpha>1}\frac{G^{i\overline{i}}|e_{i}(\varphi_{V_{\alpha}V_{1}})|^{2}}{\lambda_{1}(\lambda_{1}-\lambda_{\alpha})} -\frac{G^{k\overline{l},l\overline{k}}|V_{1}(\tilde{g}_{k\overline{l}})|^{2}}{\lambda_{1}} -\frac{G^{i\overline{i},k\overline{k}}V_{1}(\tilde{g}_{k\overline{k}})V_{1}(\tilde{g}_{i\overline{i}})}{\lambda_{1}}. \end{equation*} In next section, we will use this "good" positive terms to control the "bad" term in (\ref{main-estimate-1}), \begin{equation*} II=(1+\ve)\frac{G^{i\overline{i}}|{e_{i}(\varphi_{V_{1}V_{1}})}|^{2}}{\lambda_{1}^{2}}. \end{equation*} As an application of Proposition \ref{LQ Lemma}, we get the following partial estimate of real Hessian $\nabla^2\varphi$. \begin{corollary}\label{Lemma 2} There exists a uniform constant $C_{A}$ depending on $A$ such that \begin{equation}\label{Lemma 2 equation 1} \sum_{i=2}^{n}\sum_{k=1}^{n}(|e_{i}e_{k}(\vp)|^{2}+|e_{i}\overline{e}_{k}(\vp)|^{2})\leq C_{A}, \quad \sum_{i=2}^{n}|\eta_{i}|\leq C_{A} \end{equation} and \begin{equation}\label{Lemma 2 equation 2} \lambda_{1}\leq C_{A}\eta_{1}+C, \end{equation} where $\eta_{i}=\tilde{g}_{i\overline{i}}=\chi_{i\overline{i}}+\vp_{i\overline{i}}$ for $i=1,2,\cdots,n$. \end{corollary} \begin{proof} By (\ref{first-derivative}), we have \begin{equation*} \begin{split} -\frac{3}{2}\frac{G^{i\overline{i}}|e_{i}(\varphi_{V_{1}V_{1}})|^{2}}{\lambda_{1}^{2}} & = -\frac{3}{2}G^{i\overline{i}}|Ae^{-A\vp}\varphi_{i}-h'e_{i}(|\partial\varphi|_{g}^{2})|^{2}\\ & \geq -C_{A}\sum_{i}G^{i\overline{i}}-2(h')^{2}G^{i\overline{i}}|e_{i}(|\partial\varphi|_{g}^{2})|^{2}. \end{split} \end{equation*} Recall that the matrix $(-G^{i\overline{i},k\overline{k}})$ is non-negative and $-G^{k\overline{l},l\overline{k}}>0$. Then \begin{equation*} (2-\ve)\sum_{\alpha>1}\frac{G^{i\overline{i}}|e_{i}(\varphi_{V_{\alpha}V_{1}})|^{2}}{\lambda_{1}(\lambda_{1}-\lambda_{\alpha})} -\frac{G^{k\overline{l},l\overline{k}}|V_{1}(\tilde{g}_{k\overline{l}})|^{2}}{\lambda_{1}} -\frac{G^{i\overline{i},k\overline{k}}V_{1}(\tilde{g}_{k\overline{k}})V_{1}(\tilde{g}_{i\overline{i}})}{\lambda_{1}}\geq 0. \end{equation*} Thus by choosing $\ve=\frac{1}{2}$ in (\ref{main-estimate-1}), we obtain \begin{equation*} \begin{split} 0 \geq ~~& \frac{h'}{4}\sum_{k}G^{i\overline{{i}}}(|e_{i}e_{k}(\varphi)|^{2} +|e_{i}\overline{e}_{k}(\varphi)|^{2})+h''G^{i\overline{i}}|e_{i}(|\partial\varphi|_{g}^{2})|^{2}\\ &-2(h')^{2}G^{i\overline{i}}|e_{i}(|\partial\varphi|_{g}^{2})|^{2}-C_{A}\sum_{k}G^{k\overline{k}}-C_{A}. \end{split} \end{equation*} By (\ref{lower bound of sum Fii}) and (\ref{Properties of h}), it follows \begin{equation}\label{Lemma 2 equation 3} 0 \geq \sum_{k}G^{i\overline{{i}}}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline {e}_{k}(\varphi)|^{2})-C_{A}\sum_{k}G^{k\overline{k}}. \end{equation} Combining this with (\ref{Inequality 2}), we obtain \begin{equation*} \sum_{i=2}^{n}\sum_{k=1}^{n}(|e_{i}e_{k}(\vp)|^{2}+|e_{i}\overline{e}_{k}(\vp)|^{2})\leq C_{A}. \end{equation*} In particular, for $i\geq2$, it is clear that \begin{equation*} \eta_{i}=\chi_{i\overline{i}}+\vp_{i\overline{i}}=\chi_{i\overline{i}}+e_{i}\overline{e}_{i}(\vp)-[e_{i},\overline{e}_{i}]^{(0,1)}(\vp)\leq C_{A}. \end{equation*} Hence (\ref{Lemma 2 equation 1}) is true. Next, we prove (\ref{Lemma 2 equation 2}). By (\ref{the first order derivative of F}) and (\ref{Inequality 3}), we see \begin{equation*} G^{n\overline{n}}\geq\cdots\geq G^{1\overline{1}}\geq \frac{1}{C\eta_{1}}. \end{equation*} Combining this with (\ref{Lemma 2 equation 3}), we have \begin{equation*} \begin{split} \lambda_{1}^{2} & = \left(V_{1}V_{1}(\vp)-(\nabla_{V_{1}}V_{1})(\vp)\right)^{2}\\[1mm] & \leq \sum_{i,k}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline {e}_{k}(\varphi)|^{2})+C\\ & \leq C\eta_{1}\sum_{i,k}G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline {e}_{k}(\varphi)|^{2})+C\\ & \leq C_{A}\eta_{1}\sum_{k}G^{k\overline{k}}+C\\ & = C_{A}\eta_{1}\sum_{k}\frac{\sigma_{1}(k)}{\sigma_{2}}+C\\ & \leq C_{A}\eta_{1}^{2}+C, \end{split} \end{equation*} where we used $\eta_{1}\geq\eta_{2}\geq\cdots\geq\eta_{n}$ in the last inequality. Thus (\ref{Lemma 2 equation 2}) is true. \end{proof} Corollary \ref{Lemma 2} will be used in next section. \section{Estimate of $II$} We decompose $II$ into three parts as follows, \begin{equation*} \begin{split} &(1+\ve)\frac{G^{1\overline{1}}|{e_{1}(\varphi_{V_{1}V_{1}})}|^{2}}{\lambda_{1}^{2}} +3\ve\sum_{i\geq 2}\frac{G^{i\overline{i}}|{e_{i}(\varphi_{V_{1}V_{1}})}|^{2}}{\lambda_{1}^{2}} +(1-2\ve)\sum_{i\geq 2}\frac{G^{i\overline{i}}|{e_{i}(\varphi_{V_{1}V_{1}})}|^{2}}{\lambda_{1}^{2}}\\ &=:II_{1}+II_{2}+II_{3}.\\ \end{split} \end{equation*} In the following, we always use $C_{A}$ to denote a uniform constant depending on $A$. Without loss of generality, we may assume that $\lambda_{1}\geq\frac{C_{A}}{\ve}$. We first estimate $II_{1}$ and $II_{2}$. \begin{lemma}\label{II1 and II2} \begin{equation*} II_{1}\leq C_{A}+2(h')^{2}G^{1\overline{1}}|e_{1}(|\partial\vp|_{g}^{2})|^{2} \end{equation*} and \begin{equation*} II_{2} \leq 12\ve A^{2}e^{-2A\vp}\sum_{i\geq2}G^{i\overline{i}}|e_{i}(\vp)|^{2} +2(h')^{2}\sum_{i\geq2}G^{i\overline{i}}|e_{i}(|\partial\varphi|_{g}^{2})|^{2}. \end{equation*} \end{lemma} \begin{proof} Using (\ref{first-derivative}), we have \begin{equation*} II_{1} =\frac{G^{1\overline{1}}|e_{1}(\varphi_{V_{1}V_{1}})|^{2}}{\lambda_{1}^{2}} =G^{1\overline{1}}|Ae^{-A\vp}e_{1}(\varphi)-h'e_{1}(|\partial\varphi|_{g}^{2})|^{2}. \end{equation*} Since $G^{1\overline{1}}=\frac{\sigma_{1}(1)}{\sigma_2}\leq C$ by Corollary \ref{Lemma 2}, we get \begin{equation*} II_{1} \leq C_{A}+2(h')^{2}G^{1\overline{1}}|e_{1}(|\partial\varphi|_{g}^{2})|^{2}. \end{equation*} Similarly, \begin{equation*} \begin{split} II_{2} & = 3\ve \sum_{i\geq2}\frac{G^{i\overline{i}}|e_{i}(\varphi_{V_{1}V_{1}})|^{2}}{\lambda_{1}^{2}}\\ & = 3\ve G^{i\overline{i}}|Ae^{-A\vp}e_{i}(\varphi)-h'e_{i}(|\partial\varphi|_{g}^{2})|^{2}\\[2mm] & \leq 12\ve A^{2}e^{-2A\vp}\sum_{i\geq2}G^{i\overline{i}}|e_{i}(\vp)|^{2} +4\ve(h')^{2}\sum_{i\geq2}G^{i\overline{i}}|e_{i}(|\partial\varphi|_{g}^{2})|^{2}\\ & \leq 12\ve A^{2}e^{-2A\vp}\sum_{i\geq2}G^{i\overline{i}}|e_{i}(\vp)|^{2} +2(h')^{2}\sum_{i\geq2}G^{i\overline{i}}|e_{i}(|\partial\varphi|_{g}^{2})|^{2}. \end{split} \end{equation*} Here we used $0<\ve\leq\frac{1}{2}$ in the last inequality . \end{proof} In order to estimate $II_{3}$, we need several lemmas below. Let \begin{equation*} \tilde{e}=\frac{1}{\sqrt{2}}(V_{1}-\sqrt{-1}JV_{1}). \end{equation*} be $(1,0)$-tpye vector field in the coordinate system $(U,\{x^{\alpha}\}_{\alpha=1}^{2n})$. Since $\tilde{e}$ is $g$-unit, we can write $\tilde{e} $ at $x_0$ as \begin{equation*} \tilde{e}=\sum_{q} \nu_{q}e_{q} \text{~and~} \sum_{q=1}^{n}|\nu_q|^{2}=1, \end{equation*} for complex number $\nu_{1},\nu_{2},\cdots,\nu_{n}$. There are also numbers $\mu_{\alpha}$ ($\alpha >1$) with $\sum_{\alpha>1}\mu_{\alpha}^{2}=1$ such that \begin{equation*} JV_{1}=\sum_{\alpha>1}\mu_{\alpha}V_{\alpha}. \end{equation*} Then we have \begin{equation}\label{Lemma 4 equation 1} e_{i}(\varphi_{V_{1}V_{1}})=\sqrt{2}\sum_{q} \overline{\nu_{q}}V_{1}(\tilde{g}_{i\overline{q}})- \sqrt{-1}\sum_{\alpha>1}\mu_{\alpha}e_{i}(\varphi_{V_{1}V_{\alpha}})+E, \end{equation} where $E$ denotes a term satisfying $|E|\leq C \lambda_{1}$. A similar computation of (\ref{Lemma 4 equation 1}) can be found in \cite[(5.31)]{CTW16}. \begin{lemma}\label{Lemma 3} \begin{equation*} |\nu_{q}|\leq \frac{C_{A}}{\lambda_{1}}~ \text{~for $q\geq2$}. \end{equation*} \end{lemma} \begin{proof} By (\ref{Lemma 2 equation 1}), we have \begin{equation*} \sum_{i=2}^{n}\sum_{k=1}^{n}(|e_{i}e_{k}(\vp)|^{2}+|e_{i}\overline{e}_{k}(\vp)|^{2})\leq C_{A}. \end{equation*} Combining this with (\ref{real frame and complex frame}), we obtain \begin{equation}\label{Lemma 3 equation 2} \sum_{\alpha\geq 3}^{2n}\sum_{\beta\geq 1}^{2n}|\nabla_{\alpha\beta}^{2}\vp|\leq C_{A}. \end{equation} This means \begin{equation*} |\Phi_{\alpha}^{\beta}|\leq C_{A}~\text{~for $3\leq\alpha\leq2n$, $1\leq\beta\leq2n$}. \end{equation*} Recalling that $V_{1}$ is the eigenvector of $\Phi$ corresponding to $\lambda_{1}$, we have \begin{equation*} |V_{1}^{\alpha}|=\left|\frac{1}{\lambda_{1}}\sum_{\beta=1}^{2n}\Phi_{\beta}^{\alpha} V_{1}^{\beta}\right|\leq \frac{C}{\lambda_{1}}~ \text{~for $3\leq\alpha\leq 2n$}. \end{equation*} Thus for any $q\geq2$, we get \begin{equation*} |\nu_{q}|=|V_{1}^{2q-1}|+|V_{1}^{2q}|\leq\frac{C_{A}}{\lambda_{1}}. \end{equation*} \end{proof} By Corollary \ref{Lemma 2} and Lemma \ref{Lemma 3}, we get an upper bound of $G^{i\overline{i}}$ for $i\geq 2$. \begin{lemma}\label{Lemma 9} For $i\geq2$, at $x_{0}$, if $\lambda_{1}\geq\frac{C_{A}}{\ve}$, we have \begin{equation*} (1-\ve)G^{i\overline{i}}\leq \frac{1}{2\sigma_{2}}\left(\lambda_{1}+\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right). \end{equation*} \end{lemma} \begin{proof} By the definition of $\tilde{e}$, we see $$\tilde{g}(\tilde{e},\overline{\tilde{e}}) = \sum_{q}|\nu_{q}|^{2}\eta_{q} = |\nu_{1}|^{2}\eta_{1} +\sum_{q=2}^{n}|\nu_{q}|^{2}\eta_{q}.$$ By Corollary \ref{Lemma 2} and Lemma \ref{Lemma 3}, it follows \begin{equation*} \tilde{g}(\tilde{e},\overline{\tilde{e}}) \geq \left(1-\frac{C_{A}}{\lambda_{1}^{2}}\right)\eta_{1}-\frac{C_{A}}{\lambda_{1}^{2}}. \end{equation*} On the other hand, \begin{equation*} \begin{split} &\tilde{g}(\tilde{e},\overline{\tilde{e}})\\ & = g(\tilde{e},\overline{\tilde{e}})+\tilde{e}\overline{\tilde{e}}(\varphi)-[\tilde{e},\overline{\tilde{e}}]^{(0,1)}(\varphi)\\ & = 1+\frac{1}{2}(V_{1}V_{1}(\varphi)+(JV_{1})(JV_{1})(\varphi)+\sqrt{-1}[V_{1},JV_{1}](\varphi))-[\tilde{e},\overline{\tilde{e}}]^{(0,1)}(\varphi)\\ & = \frac{1}{2}\left(\lambda_{1}+\sum_{i\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right)+1+(\nabla_{V_{1}}V_{1})(\varphi)+(\nabla_{JV_{1}}JV_{1})(\varphi)\\ & \quad\, +\sqrt{-1}[V_{1},JV_{1}](\varphi) -[\tilde{e},\overline{\tilde{e}}]^{(0,1)}(\varphi)\\ & \leq \frac{1}{2}\left(\lambda_{1}+\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right)+C. \end{split} \end{equation*} Note $\lambda_{1}\geq\frac{C_{A}}{\ve}$. Thus we deduce \begin{equation*} \left(1-\frac{C_{A}}{\lambda_{1}^{2}}\right)\eta_{1}\leq \frac{1}{2}\left(\lambda_{1}+\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right)+C. \end{equation*} As a consequence, \begin{equation*} \eta_{1} \leq \frac{1}{2}\left(\lambda_{1}+\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right)+C+\frac{C_{A}}{\lambda_{1}}\cdot\frac{\eta_{1}}{\lambda_{1}} \leq \frac{1}{2}\left(\lambda_{1}+\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right)+C. \end{equation*} Hence, for $i\geq 2$, we obtain \begin{equation*} (1-\ve)G^{i\overline{i}} = (1-\ve)\frac{\sigma_{1}(i)}{\sigma_{2}}\leq\frac{\eta_{1}}{\sigma_{2}}-\frac{\ve\eta_{1}}{\sigma_{2}}+C \leq \frac{1}{2\sigma_{2}}\left(\lambda_{1}+\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right), \end{equation*} where we used (\ref{Lemma 2 equation 2}) and $\lambda_{1}\geq\frac{C_{A}}{\ve}$ in the last inequality. \end{proof} At $x_{0}$, we assume that the eigenvalues of matrix $(-G^{i\overline{i},j\overline{j}})$ are \begin{equation*} \kappa_{1}\geq\kappa_{2}\cdots\geq\kappa_{n}. \end{equation*} Let $\xi_{i}=(\xi_{i}^{1},\xi_{i}^{2},\cdots,\xi_{i}^{n})$ be the $g$-unit eigenvector corresponding to $\kappa_{i}$ for $i=1,2,\cdots,n$. Some estimates for eigenvalues $\kappa_{i}$ and its eigenvectors $\xi_{i}$ are given in the following lemma, which plays important role in the estimate of $II_{3}$. \begin{lemma}\label{Lemma 6 and Lemma 7} \begin{enumerate}[(1)] \item $C_{A}^{-1}\lambda_{1}^{-2}\leq \kappa_{n}\leq C_{A}\lambda_{1}^{-2}$ and $\kappa_{i}\geq C_{A}^{-1}$ for $i\leq n-1$.\\ \item $\sum_{i=2}^{n}|\xi_{n}^{i}|^{2}\leq C_{A}\lambda_{1}^{-2}$. \end{enumerate} \end{lemma} \begin{proof} Since the proof of Lemma \ref{Lemma 6 and Lemma 7} is a little tedious, we give it in Appendix. \end{proof} Now we begin to estimate $II_{3}$. \begin{lemma}\label{Lemma 4} For any positive number $\gamma>0$, we have \begin{equation*} \begin{split} &II_{3}\\ & \leq \frac{C_{A}}{\ve}\sum_{i\geq2}\sum_{q\geq 2}G^{i\overline{i}}\frac{|V_{1}(\tilde{g}_{i\overline{q}})|^{2}}{\lambda_{1}^{4}} +\frac{C}{\ve}\sum_{i}G^{i\overline{i}}+2(1-\ve)(1+\gamma)\sum_{i\geq2}G^{i\overline{i}} \frac{|V_{1}(\tilde{g}_{{i}\overline{1}})|^{2}}{\lambda_{1}^{2}}\\ & \quad +(1-\ve)\left(1+\frac{1}{\gamma}\right)\left(\lambda_{1}-\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right) \left(\sum_{i\geq2}\sum_{\alpha>1}\frac{G^{i\overline{i}}}{\lambda_{1}^{2}}\frac{|e_{i}(\varphi_{V_{\alpha}V_{1}})|^2}{\lambda_{1}-\lambda_{\alpha}}\right). \end{split} \end{equation*} \end{lemma} \begin{proof} By the relation (\ref{Lemma 4 equation 1}) and the Cauchy-Schwarz inequality, we have \begin{equation}\label{Lemma 4 equation 2} \begin{split} &II_{3} \\ & = (1-2\ve)\sum_{i\geq2}\frac{G^{i\overline{i}}|\sqrt{2}\sum_{q} \overline{\nu_{q}}V_{1}(\tilde{g}_{i\overline{q}})- \sqrt{-1}\sum_{\alpha>1}\mu_{\alpha}e_{i}(\varphi_{V_{1}V_{\alpha}})+E|^{2}}{\lambda_{1}^{2}}\\ & = (1-\ve)\sum_{i\geq2}\frac{G^{i\overline{i}}|\sqrt{2} \overline{\nu_{1}}V_{1}(\tilde{g}_{i\overline{1}})- \sqrt{-1}\sum_{\alpha>1}\mu_{\alpha}e_{i}(\varphi_{V_{1}V_{\alpha}})|^{2}}{\lambda_{1}^{2}}\\ & \quad +\frac{C}{\ve}\sum_{i\geq2}\frac{G^{i\overline{i}}|\sqrt{2}\sum_{q\geq2} \overline{\nu_{q}}V_{1}(\tilde{g}_{i\overline{q}})+E|^{2}}{\lambda_{1}^{2}} \\ & \leq(1-\ve)\sum_{i\geq2}\frac{G^{i\overline{i}}|\sqrt{2}\overline{\nu_{1}}V_{1}(\tilde{g}_{i\overline{1}})-\sqrt{-1}\sum_{\alpha>1}\mu_{\alpha} e_{i}(\varphi_{V_{1}V_{\alpha}})|^{2}}{\lambda_{1}^{2}}\\ & \quad +\frac{C_{A}}{\ve}\sum_{i\geq2} \sum_{q\geq 2}\frac{G^{i\overline{i}}|V_{1}(\tilde{g}_{i\overline{q}})|^{2}}{\lambda_{1}^{4}}+\frac{C}{\ve}\sum_{i}G^{i\overline{i}}. \end{split} \end{equation} Here we used Lemma \ref{Lemma 3} in the last inequality. On the other hand, by the Cauchy-Schwarz inequality, we have \begin{equation*} \begin{split} &(1- \ve)\sum_{i\geq 2}\frac{G^{i\overline{i}}|\sqrt{2}\overline{\nu_{1}}V_{1}(\tilde{g}_{{i}\overline{1}})-\sum_{\alpha>1}\mu_{\alpha} e_{i}(\varphi_{V_{1}V_{\alpha}})|^{2}}{\lambda_{1}^{2}}\\ &\leq 2(1-\ve)(1+\gamma)\sum_{i\geq2}\frac{G^{i\overline{i}}|V_{1}(\tilde{g}_{{i}\overline{1}})|^{2}}{\lambda_{1}^{2}}\\ & +(1-\ve)\left(1+\frac{1}{\gamma}\right)\sum_{i\geq2}\frac{G^{i\overline{i}}|\sum_{\alpha>1}\mu_{\alpha}e_{i} (\varphi_{V_{1}V_{\alpha}})|^{2}}{\lambda_{1}^{2}}, \end{split} \end{equation*} and \begin{equation*} \begin{split} \left|\sum_{\alpha>1}\mu_{\alpha} e_{i}(\varphi_{V_{\alpha}V_{1}})\right|^{2} & \leq\left(\sum_{\alpha>1}(\lambda_{1}-\lambda_{\alpha})\mu_{\alpha}^{2}\right) \left(\sum_{\alpha>1}\frac{|e_{i}(\varphi_{V_{\alpha}V_{1}})|^2}{\lambda_{1}-\lambda_{\alpha}}\right)\\ & =\left(\lambda_{1}-\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right) \left(\sum_{\alpha>1}\frac{|e_{i}(\varphi_{V_{\alpha}V_{1}})|^2}{\lambda_{1}-\lambda_{\alpha}}\right). \end{split} \end{equation*} Thus \begin{equation*} \begin{split} & (1-\ve)\sum_{i\geq2}\frac{G^{i\overline{i}}|\sqrt{2}\overline{\nu_{1}}V_{1}(\tilde{g}_{i\overline{1}})-\sqrt{-1}\sum_{\alpha>1}\mu_{\alpha} e_{i}(\varphi_{V_{1}V_{\alpha}})|^{2}}{\lambda_{1}^{2}}\\ \leq ~~& 2(1-\ve)(1+\gamma)\sum_{i\geq2}\frac{G^{i\overline{i}}|V_{1}(\tilde{g}_{{i}\overline{1}})|^{2}}{\lambda_{1}^{2}}\\ & +(1-\ve)\left(1+\frac{1}{\gamma}\right)\left(\lambda_{1}-\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right) \left(\sum_{i\geq2}\sum_{\alpha>1}\frac{G^{i\overline{i}}}{\lambda_{1}^{2}}\frac{|e_{i}(\varphi_{V_{\alpha}V_{1}})|^2}{\lambda_{1}-\lambda_{\alpha}}\right). \end{split} \end{equation*} Inserting the above inequality into (\ref{Lemma 4 equation 2}), the lemma is proved. \end{proof} \begin{lemma}\label{Lemma 8} At $x_{0}$, if $\lambda_{1}\geq\frac{C_{A}}{\ve}$, then we have \begin{equation*} -\frac{G^{i\overline{i},k\overline{k}}V_{1}(\tilde{g}_{k\overline{k}})V_{1}(\tilde{g}_{i\overline{i}})}{\lambda_{1}} \geq \frac{C_{A}}{\ve}\sum_{i\geq2}G^{i\overline{i}}\frac{|V_{1}(\tilde{g}_{i\overline{i}})|^{2}}{\lambda_{1}^{4}}. \end{equation*} \end{lemma} \begin{proof} Recall that $\xi_{i}=(\xi_{i}^{1},\xi_{i}^{2},\cdots,\xi_{i}^{n})$ are the $g$-unit eigenvector corresponding to $\kappa_{i}$ for $i=1,2,\cdots,n$. Then there are complex numbers $\tau_{1},\tau_{2},\cdots,\tau_{n}$ such that \begin{equation*} V_{1}(\tilde{g}_{i\overline{i}})=\sum_{q=1}^{n}\tau_{q}\xi_{q}^{i} ~ \text{~for $i=1,2,\cdots,n$.} \end{equation*} Since \begin{equation*} G^{i\overline{i}}=\frac{\sigma_{1}(i)}{\sigma_{2}}\leq C\lambda_{1} \text{~for $i=1,2,\cdots,n$}, \end{equation*} we derive \begin{equation}\label{Lemma 8 equation 4} -\frac{C_{A}}{\ve}\sum_{i\geq2}G^{i\overline{i}}\frac{|V_{1}(\tilde{g}_{i\overline{i}})|^{2}}{\lambda_{1}^{4}} \geq -\sum_{i\geq2}\sum_{q=1}^{n}\frac{C_{A}}{\ve\lambda_{1}^{3}}|\tau_{q}|^{2}|\xi_{q}^{i}|^{2}. \end{equation} Also we have \begin{equation}\label{Lemma 8 equation 5} -\frac{G^{i\overline{i},k\overline{k}}V_{1}(\tilde{g}_{k\overline{k}})V_{1}(\tilde{g}_{i\overline{i}})}{\lambda_{1}} =\frac{1}{\lambda_{1}}\sum_{q=1}^{n}\kappa_{q}|\tau_{q}|^{2}. \end{equation} By (\ref{Lemma 8 equation 4}) and (\ref{Lemma 8 equation 5}), we obtain \begin{equation}\label{Lemma 8 equation 6} \begin{split} &-\frac{C_{A}}{\ve}\sum_{i\geq2} G^{i\overline{i}}\frac{|V_{1}(\tilde{g}_{i\overline{i}})|^{2}}{\lambda_{1}^{4}} -\frac{G^{i\overline{i},k\overline{k}}V_{1}(\varphi_{k\overline{k}})V_{1}(\varphi_{i\overline{i}})}{\lambda_{1}}\\ & \ge -\sum_{i\geq2}\sum_{q=1}^{n}\frac{C_{A}}{\ve\lambda_{1}^{3}}|\tau_{q}|^{2}|\xi_{q}^{i}|^{2}+\frac{1}{\lambda_{1}} \sum_{q=1}^{n}\kappa_{q}|\tau_{q}|^{2}\\ & = -\sum_{i\geq2}\frac{C_{A}}{\ve\lambda_{1}^{3}}|\tau_{n}|^{2}|\xi_{n}^{i}|^{2}+\frac{1}{\lambda_{1}}\kappa_{n}|\tau_{n}|^{2} \\ & +\sum_{q=1}^{n-1}\left( -\sum_{i\geq2}\frac{C_{A}}{\ve\lambda_{1}^{3}}|\tau_{q}|^{2}|\xi_{q}^{i}|^{2}+\frac{1}{\lambda_{1}}\kappa_{q}|\tau_{q}|^{2} \right). \end{split} \end{equation} Moreover, by $\lambda_{1}\geq\frac{C_{A}}{\ve}$ and Lemma \ref{Lemma 6 and Lemma 7}, we see \begin{equation*} \begin{split} -\sum_{i\geq2}\frac{C_{A}}{\ve\lambda_{1}^{3}}|\tau_{n}|^{2}|\xi_{n}^{i}|^{2}+\frac{1}{\lambda_{1}}\kappa_{n}|\tau_{n}|^{2} & \geq\left(\frac{1}{C_{A}\lambda_{1}^{3}}-\frac{C_{A}}{\ve\lambda_{1}^{5}}\right)|\tau_{n}|^{2} \geq 0,\\ \sum_{q=1}^{n-1}\left( -\sum_{i\geq2}\frac{C_{A}}{\ve\lambda_{1}^{3}}|\tau_{q}|^{2}|\xi_{q}^{i}|^{2}+\frac{1}{\lambda_{1}}\kappa_{q}|\tau_{q}|^{2} \right) & \geq\sum_{q=1}^{n-1}\left(\frac{1}{C_{A}\lambda_{1}}-\frac{C_{A}}{\ve\lambda_{1}^{3}}\right)|\tau_{q}|^{2} \geq 0. \end{split} \end{equation*} Thus Lemma \ref{Lemma 8} follows from the above inequalities and (\ref{Lemma 8 equation 6}). \end{proof} Lemma \ref{Lemma 8} gives an estimate for the term $\frac{C_{A}}{\ve}\sum_{i\geq2}G^{i\overline{i}}\frac{|V_{1}(\tilde{g}_{i\overline{i}})|^{2}}{\lambda_{1}^{4}} $ in Lemma \ref{Lemma 4}. We need to deal with other terms there. By the definition of $\lambda_{\alpha}$ and $\mu_{\alpha}$, it is clear that $\lambda_{1}-\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}>0$. From Lemma \ref{Lemma 9}, we see $\lambda_{1}+\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}>0$. Recalling that the constant $\gamma>0$ in Lemma \ref{Lemma 4} is arbitrary, now we choose \begin{equation*} \gamma=\frac{\lambda_{1}-\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}}{\lambda_{1}+\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}}. \end{equation*} Thus by Lemma \ref{Lemma 9} and the definition of $\gamma$, we obtain \begin{equation}\label{Lemma 10 equation 2} 2\sum_{i\geq 2}\frac{|V_{1}(\tilde{g}_{i\overline{1}})|^{2}}{\sigma_{2}\lambda_{1}} \geq 2(1-\ve)(1+\gamma)\sum_{i\geq2}G^{i\overline{i}}\frac{|V_{1}(\tilde{g}_{{i}\overline{1}})|^{2}}{\lambda_{1}^{2}} \end{equation} and \begin{equation}\label{Lemma 10 equation 3} \begin{split} & (2-2\ve)\sum_{i\geq2}\sum_{\alpha>1}\frac{G^{i\overline{i}}|e_{i}(\varphi_{V_{\alpha}V_{1}})|^{2}}{\lambda_{1}(\lambda_{1}-\lambda_{\alpha})}\\ = ~~& (1-\ve)\left(1+\frac{1}{\gamma}\right)\left(\lambda_{1}-\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right) \sum_{i\geq2}\sum_{\alpha>1}\frac{G^{i\overline{i}}}{\lambda_{1}^{2}}\frac{|e_{i}(\varphi_{V_{\alpha}V_{1}})|^2}{\lambda_{1}-\lambda_{\alpha}}. \end{split} \end{equation} \begin{lemma}\label{Lemma 10} At $x_{0}$, if $\lambda_{1}\geq\frac{C_{A}}{\ve}$, we have \begin{equation*} II_{3}\leq I+\frac{C}{\ve}\sum_{i}G^{i\overline{i}}. \end{equation*} \end{lemma} \begin{proof} By the definition of $G^{i\overline{k},k\overline{i}}$ (see (\ref{Definition of Fijkl})), it is clear that \begin{equation*} -\sum_{k\neq l}\frac{G^{k\overline{l},l\overline{k}}|V_{1}(\tilde{g}_{k\overline{l}})|^{2}}{\lambda_{1}} = \sum_{k\neq l}\frac{|V_{1}(\tilde{g}_{k\overline{l}})|^{2}}{\sigma_{2}\lambda_{1}} = 2\sum_{i\geq 2}\frac{|V_{1}(\tilde{g}_{i\overline{1}})|^{2}}{\sigma_{2}\lambda_{1}} +\sum_{i\geq2}\sum_{q\geq2,q\neq i}\frac{|V_{1}(\tilde{g}_{i\overline{q}})|^{2}}{\sigma_{2}\lambda_{1}}. \end{equation*} On the other hand, by (\ref{Lemma 2 equation 2}), we see \begin{equation*}\label{Lambda1 and eta1} C_{A}^{-1}\eta_{1}\leq \lambda_{1}\leq C_{A}\eta_{1}. \end{equation*} Note $\lambda_{1}\geq\frac{C_{A}}{\ve}$. Then by Lemma \ref{Lemma 2}, we have \begin{equation*} G^{i\overline{i}}=\frac{\sigma_{1}(i)}{\sigma_{2}}\leq \frac{\eta_{1}+C}{\sigma_{2}} \leq \frac{\ve\lambda_{1}^{3}}{C_{A}\sigma_{2}} \text{~for $i\geq 2$.} \end{equation*} This implies \begin{equation*} \sum_{i\geq2}\sum_{q\geq2,q\neq i}\frac{|V_{1}(\tilde{g}_{i\overline{q}})|^{2}}{\sigma_{2}\lambda_{1}} \geq \frac{C_{A}}{\ve}\sum_{i\geq2}\sum_{q\geq2,q\neq i}G^{i\overline{i}}\frac{|V_{1}(\tilde{g}_{i\overline{q}})|^{2}}{\lambda_{1}^{4}}. \end{equation*} Hence by (\ref{Lemma 10 equation 2}), we deduce \begin{align}\label{lemma4.4-1} &-\sum_{k\neq l}\frac{G^{k\overline{l},l\overline{k}}|V_{1}(\tilde{g}_{k\overline{l}})|^{2}}{\lambda_{1}}\notag\\ &\ge 2(1-\ve)(1+\gamma)\sum_{i\geq2}G^{i\overline{i}}\frac{|V_{1}(\tilde{g}_{{i}\overline{1}})|^{2}}{\lambda_{1}^{2}} +\frac{C_{A}}{\ve}\sum_{i\geq2}\sum_{q\geq2,q\neq i}G^{i\overline{i}}\frac{|V_{1}(\tilde{g}_{i\overline{q}})|^{2}}{\lambda_{1}^{4}}. \end{align} By (\ref{Lemma 10 equation 3}) and (\ref{lemma4.4-1}), we see \begin{equation}\label{Lemma 10 equation 5} \begin{split} & (2-\ve)\sum_{\alpha>1}\frac{G^{i\overline{i}}|e_{i}(\varphi_{V_{\alpha}V_{1}})|^{2}}{\lambda_{1}(\lambda_{1}-\lambda_{\alpha})} -\sum_{k\neq l}\frac{G^{k\overline{l},l\overline{k}}|V_{1}(\tilde{g}_{k\overline{l}})|^{2}}{\lambda_{1}}\\ \geq~~& 2(1-\ve)(1+\gamma)\sum_{i\geq2}G^{i\overline{i}}\frac{|V_{1}(\tilde{g}_{{i}\overline{1}})|^{2}}{\lambda_{1}^{2}} +\frac{C_{A}}{\ve}\sum_{i\geq2}\sum_{q\geq2,q\neq i}G^{i\overline{i}}\frac{|V_{1}(\tilde{g}_{i\overline{q}})|^{2}}{\lambda_{1}^{4}}\\ & +(1-\ve)\left(1+\frac{1}{\gamma}\right)\left(\lambda_{1}-\sum_{\alpha>1}\lambda_{\alpha}\mu_{\alpha}^{2}\right) \sum_{i\geq2}\sum_{\alpha>1}\frac{G^{i\overline{i}}}{\lambda_{1}^{2}}\frac{|e_{i}(\varphi_{V_{\alpha}V_{1}})|^2}{\lambda_{1}-\lambda_{\alpha}}. \end{split} \end{equation} Then Lemma \ref{Lemma 10} follows from Lemma \ref{Lemma 4}, Lemma \ref{Lemma 8} and (\ref{Lemma 10 equation 5}). \end{proof} Combining Lemma \ref{II1 and II2} and Lemma \ref{Lemma 10}, we finally obtain \begin{proposition}\label{Lemma 11} If $\lambda_{1}\geq \frac{C_{A}}{\ve}$, we have \begin{equation*} \begin{split} II & = II_{1}+II_{2}+II_{3}\\ & \leq I+12\ve A^{2}e^{-2A\vp}G^{i\overline{i}}|e_{i}(\varphi)|^{2}+2(h')^{2}G^{i\overline{i}}|e_{i}(|{\partial\varphi}|_{g}^{2})|^{2} +\frac{C}{\ve}\sum_{i}G^{i\ol{i}}+C_{A}. \end{split} \end{equation*} \end{proposition} By Proposition \ref{LQ Lemma} and Proposition \ref{Lemma 11}, we can complete the proof of Theorem \ref{Generalized second order estimate}. \begin{proof}[Proof of Theorem \ref{Generalized second order estimate}] Without loss of generality, we assume that $\sup_{M}\vp=0$. Then by Proposition \ref{LQ Lemma} and Proposition \ref{Lemma 11}, we see that at $x_{0}$ there exists a uniform constant $C_{1}$ such that \begin{equation}\label{main-inequality-2} \begin{split} 0 & \geq \left(\ve_{0}Ae^{-A\varphi}-\frac{C_{1}}{\ve}\right)\sum_{i}G^{i\overline{i}}+\frac{h'}{4}\sum_{k}G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|^{2}+ |e_{i}\overline{e}_{k}(\varphi)|^{2})\\ &\quad +(A^{2}e^{-A\varphi}-12\ve A^{2}e^{-2A\varphi})G^{i\overline{i}}|e_{i}(\varphi)|^{2}-C_{1}Ae^{-A\varphi}. \end{split} \end{equation} Choose $A=12C_{1}+1$ and $\ve=\frac{e^{A\vp(x_{0})}}{12}\in(0,\frac{1}{12}]$ so that \begin{equation*} Ae^{-A\vp}-\frac{C_{1}}{\ve}\geq 1 \text{~and~} A^{2}e^{-A\vp}-12\ve A^{2}e^{-2A(\vp)}\geq0. \end{equation*} We get from (\ref{main-inequality-2}), \begin{equation*} \sum_{i}G^{i\overline{i}}+\frac{h'}{4}\sum_{k}G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline{e}_{k}(\varphi)|^{2})\leq C. \end{equation*} As a consequence, $\sum_{i}G^{i\overline{i}}\leq C$. Combining this with Maclaurin's inequality, we obtain (for more details, cf. \cite[Lemma 2.2]{HMW10}), \begin{equation*} G^{i\overline{i}}\geq C^{-1} \text{~for $i=1,2,\cdots,n$.} \end{equation*} Thus we get \begin{equation*} \lambda_{1}^{2}\leq C \sum_{k}G^{i\overline{i}}(|e_{i}e_{k}(\varphi)|^{2}+|e_{i}\overline{e}_{k}(\varphi)|^{2})\leq C, \end{equation*} as required. \end{proof} \section{Appendix} In this appendix, we give a proof of Lemma \ref{Lemma 6 and Lemma 7}. Here we use the same notations in Section 4. We need the following algebraic Lemma for $\sigma_2$ polynomial function. \begin{lemma}\label{Lemma 5} At $x_{0}$, we have \begin{equation*} \det(-G^{i\overline{i},j\overline{j}})=(n-1)\sigma_{2}^{-n} \end{equation*} \end{lemma} \begin{proof} For convenience, we define $\vec{\sigma}=(\sigma_{1}(1),\cdots,\sigma_{1}(n))$ and $M_{1}=\vec{\sigma}^{T}\vec{\sigma}$, where $\vec{\sigma}^{T}$ denotes the transpose of the vector $\vec{\sigma}$. By the definition of $G^{i\overline{i},j\overline{j}}$, it is clear that \begin{equation}\label{Lemma 5 equation 1} (-\sigma_{2}^{2}G^{i\overline{i},j\overline{j}})=M_{1}-M_{2}, \end{equation} where \begin{equation*} M_{2}=\left( \begin{matrix} 0 & \sigma_{2} & \sigma_{2} & \cdots & \sigma_{2} \\ \sigma_{2} & 0 & \sigma_{2} & \cdots & \sigma_{2} \\ \vdots & \vdots & \vdots & ~ & \vdots \\ \sigma_{2} & \sigma_{2} & \sigma_{2} & \cdots & 0 \\ \end{matrix} \right). \end{equation*} Since the rank of matrix $M_{1}$ is one, any two columns of $M_{1}$ are proportional. Combining this and properties of the determinant, we have \begin{equation}\label{Lemma 5 equation 2} \det (M_{1}-M_{2})=\sum_{i=1}^{n}\det A_{i}+(-1)^{n}\det M_{2}, \end{equation} where \begin{equation*} \begin{split} & \qquad\qquad\qquad\qquad\qquad\qquad\ \text{the $i$-th column}\\ & A_{i}=\left( \begin{matrix} 0 & -\sigma_{2} & -\sigma_{2} & \cdots & \sigma_{1}(1)\sigma_{1}(i) & \cdots & -\sigma_{2} \\ -\sigma_{2} & 0 & -\sigma_{2} & \cdots & \sigma_{1}(2)\sigma_{1}(i) & \cdots & -\sigma_{2} \\ \vdots & \vdots & \vdots & ~ & \vdots & ~ & \vdots \\ -\sigma_{2} & -\sigma_{2} & -\sigma_{2} & \cdots & \sigma_{1}(n)\sigma_{1}(i) & \cdots & 0 \\ \end{matrix} \right). \end{split} \end{equation*} Applying some elementary row operations to $A_{i}$, we obtain \begin{equation*} \det A_{i}=\sigma_{1}(i)\sigma_{2}^{n-1}\left(\sum_{k=1}^{n}\sigma_{1}(k)-(n-1)\sigma_{1}(i)\right). \end{equation*} Therefore, \begin{equation}\label{Lemma 5 equation 3} \begin{split} \sum_{i=1}^{n}\det{(A_{i})} & = \sum_{i=1}^{n}\sigma_{1}(i)\sigma_{2}^{n-1}\left(\sum_{k=1}^{n}\sigma_{1}(k)-(n-1)\sigma_{1}(i)\right)\\ & = \sigma_{2}^{n-1}\left(\left(\sum_{i=1}^{n}\sigma_{1}(i)\right)^{2}-\sum_{i=1}^{n}(n-1)(\sigma_{1}(i))^{2}\right)\\ & = \sigma_{2}^{n-1}\left((n-1)^2\sigma_{1}^{2}-(n-1)\sum_{i}(\sigma_{1}-\eta_{i})^{2}\right)\\ & = (n-1)\sigma_{2}^{n-1}\left(\sigma_{1}^{2}-\sum_{i}\eta_{i}^{2}\right)\\ & = 2(n-1)\sigma_{2}^{n}. \end{split} \end{equation} On the other hand, it is clear that \begin{equation}\label{Lemma 5 equation 4} \det M_{2}=(-1)^{n-1}(n-1)\sigma_{2}^{n}. \end{equation} Then Lemma \ref{Lemma 5} follows from (\ref{Lemma 5 equation 1}), (\ref{Lemma 5 equation 2}), (\ref{Lemma 5 equation 3}) and (\ref{Lemma 5 equation 4}). \end{proof} \begin{proof}[Proof of (1) in Lemma \ref{Lemma 6 and Lemma 7}] Let $a_{1}\geq a_{2}\geq\cdots\geq a_{n}$ and $b_{1}\geq b_{2}\geq\cdots\geq b_{n}$ be the eigenvalues of $M_{1}$ and $M_{2}$, respectively. Then \begin{equation*} a_{1}=\|\vec{\sigma}\|^{2}, ~a_{2}=a_{3}=\cdots=a_{n}=0 \end{equation*} and \begin{equation*} b_{1}=(n-1)\sigma_{2}, ~b_{2}=b_{3}=\cdots=b_{n}=-\sigma_{2}. \end{equation*} By Weyl's inequality in matrix theory (cf. \cite[Theorem 4.3.1]{HJ02}), we see \begin{equation*} \frac{a_{1}}{\sigma_{2}^{2}}-\frac{b_{1}}{\sigma_{2}^{2}}\leq\kappa_{1}\leq\frac{a_{1}}{\sigma_{2}^{2}}-\frac{b_{n}}{\sigma_{2}^{2}} \end{equation*} and \begin{equation*} \kappa_{i}\leq\frac{a_{i}}{\sigma_{2}^{2}}-\frac{b_{n}}{\sigma_{2}^{2}} \text{~for $i\geq2$}. \end{equation*} It follows \begin{equation}\label{Lemma 6 equation 1} \text{$C_{A}^{-1}\lambda_{1}^{2}\leq\kappa_{1}\leq C_{A}\lambda_{1}^{2}$ and $\kappa_{i}\leq C_{A}$ for $i\geq 2$.} \end{equation} Thus by Lemma \ref{Lemma 5}, we get \begin{equation}\label{Lemma 6 equation 2} \kappa_{n}=\frac{\det(-G^{i\overline{i},j\overline{j}})}{\kappa_{1}\kappa_{2}\cdots\kappa_{n-1}}\geq\frac{1}{C_{A}\lambda_{1}^{2}}. \end{equation} On the other hand, since $\kappa_{n}$ is the smallest eigenvalue of matrix $(-G^{i\overline{i},j\overline{j}})$, by (\ref{Definition of Fijkl}) and Corollary \ref{Lemma 2}, we have \begin{equation}\label{Lemma 6 equation 3} \kappa_{n}\leq -G^{1\overline{1},1\overline{1}}=\frac{(\sigma_{1}(1))^{2}}{\sigma_{2}^{2}} =\left(\frac{\sigma_{2}-\sum_{i>j>1}\eta_{i}\eta_{j}}{\eta_{1}\sigma_{2}}\right)^{2}\leq\frac{1}{C_{A}\lambda_{1}^{2}}. \end{equation} Then by (\ref{Lemma 6 equation 3}) and (\ref{Lemma 6 equation 1}), we have \begin{equation}\label{Lemma 6 equation 4} \kappa_{i}\geq\frac{\det(-G^{i\overline{i},j\overline{j}})}{\kappa_{1}\kappa_{2}^{n-3}\kappa_{n}}\geq C_{A}^{-1},~ \forall~ i\leq n-1. \end{equation} The first part (1) of Lemma \ref{Lemma 6 and Lemma 7} is proved. \end{proof} \begin{proof}[Proof of (2) in Lemma \ref{Lemma 6 and Lemma 7}] For simplicity, we prove the case when $n=4$. The general case can be proved by the same way. Recall that the vector $\xi_{4}$ is the eigenvector of matrix $(-G^{i\overline{i},j\overline{j}})$ corresponding to $\kappa_{4}$. We use the following elementary row operation of $(-G^{i\overline{i},j\overline{j}})$ to compute the components $\xi_{4}^{i}$ of $\xi_{4}$, \begin{equation*} \begin{split} (\kappa_{4}I_{4}+ & G^{i\overline{i},j\overline{j}})=\\ &\left( \begin{matrix} \kappa_{4}-\frac{(\sigma_{1}(1))^{2}}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(1)\sigma_{1}(2)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(1)\sigma_{1}(3)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(1)\sigma_{1}(4)}{\sigma_{2}^{2}} \\[3mm] \frac{\sigma_{2}-\sigma_{1}(2)\sigma_{1}(1)}{\sigma_{2}^{2}} & \kappa_{4}-\frac{(\sigma_{1}(2))^{2}}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(2)\sigma_{1}(3)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(2)\sigma_{1}(4)}{\sigma_{2}^{2}} \\[3mm] \frac{\sigma_{2}-\sigma_{1}(3)\sigma_{1}(1)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(3)\sigma_{1}(2)}{\sigma_{2}^{2}} & \kappa_{4}-\frac{(\sigma_{1}(3))^{2}}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(3)\sigma_{1}(4)}{\sigma_{2}^{2}} \\[3mm] \frac{\sigma_{2}-\sigma_{1}(4)\sigma_{1}(1)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(4)\sigma_{1}(2)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(3)\sigma_{1}(4)}{\sigma_{2}^{2}} & \kappa_{4}-\frac{(\sigma_{1}(4))^{2}}{\sigma_{2}^{2}} \end{matrix} \right), \end{split} \end{equation*} where $I_{4}$ denotes the identity matrix. There are four steps. \bigskip \noindent {\bf Step 1.} For $i=1,2,3$, multiplying the $4$-th row by $-\frac{\sigma_{1}(i)}{\sigma_{1}(4)}$, and adding that to the $i$-th row, we obtain \begin{equation*} \left( \begin{matrix} \kappa_{4}-\frac{(\sigma_{1}(1))}{\sigma_{1}(4)\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)}{\sigma_{1}(4)\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)}{\sigma_{1}(4)\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)\sigma_{2}\kappa_{4}}{\sigma_{1}(4)\sigma_{2}} \\[3mm] \frac{\sigma_{1}(4)-\sigma_{1}(2)}{\sigma_{1}(4)\sigma_{2}} & \kappa_{4}-\frac{(\sigma_{1}(2))}{\sigma_{1}(4)\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(2)}{\sigma_{1}(4)\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(2)\sigma_{2}\kappa_{4}}{\sigma_{1}(4)\sigma_{2}} \\[3mm] \frac{\sigma_{1}(4)-\sigma_{1}(3)}{\sigma_{1}(4)\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(3)}{\sigma_{1}(4)\sigma_{2}} & \kappa_{4}-\frac{(\sigma_{1}(3))}{\sigma_{1}(4)\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(3)\sigma_{2}\kappa_{4}}{\sigma_{1}(4)\sigma_{2}} \\[3mm] \frac{\sigma_{2}-\sigma_{1}(4)\sigma_{1}(1)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(4)\sigma_{1}(2)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(3)\sigma_{1}(4)}{\sigma_{2}^{2}} & \kappa_{4}-\frac{(\sigma_{1}(4))^{2}}{\sigma_{2}^{2}} \end{matrix} \right). \end{equation*} \bigskip \noindent {\bf Step 2.} For $i=1,2,3$, multiplying the $i$-th row by $\sigma_{1}(4)$, we obtain \begin{equation*} \left( \begin{matrix} \frac{\sigma_{1}(4)\sigma_{2}\kappa_{4}-\sigma_{1}(1)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)\sigma_{2}\kappa_{4}}{\sigma_{2}} \\[3mm] \frac{\sigma_{1}(4)-\sigma_{1}(2)}{\sigma_{2}} & \frac{\sigma_{1}(4)\sigma_{2}\kappa_{4}-\sigma_{1}(2)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(2)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(2)\sigma_{2}\kappa_{4}}{\sigma_{2}} \\[3mm] \frac{\sigma_{1}(4)-\sigma_{1}(3)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(3)}{\sigma_{2}} & \frac{\sigma_{1}(4)\sigma_{2}\kappa_{4}-\sigma_{1}(3)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(3)\sigma_{2}\kappa_{4}}{\sigma_{2}} \\[3mm] \frac{\sigma_{2}-\sigma_{1}(4)\sigma_{1}(1)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(4)\sigma_{1}(2)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(3)\sigma_{1}(4)}{\sigma_{2}^{2}} & \kappa_{4}-\frac{(\sigma_{1}(4))^{2}}{\sigma_{2}^{2}} \end{matrix} \right). \end{equation*} \bigskip \noindent {\bf Step 3.} For $i=2,3$, multiplying the $1$-st row by $-\frac{\sigma_{1}(4)-\sigma_{1}(i)}{\sigma_{1}(4)-\sigma_{1}(1)}$, and adding that to the $i$-th row, we obtain \begin{equation*} \left( \begin{matrix} \frac{\sigma_{1}(4)\sigma_{2}\kappa_{4}-\sigma_{1}(1)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)\sigma_{2}\kappa_{4}}{\sigma_{2}} \\[3mm] a_{21} & a_{22} & 0 & a_{24} \\[3mm] a_{31} & 0 & a_{33} & a_{34} \\[3mm] \frac{\sigma_{2}-\sigma_{1}(4)\sigma_{1}(1)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(4)\sigma_{1}(2)}{\sigma_{2}^{2}} & \frac{\sigma_{2}-\sigma_{1}(3)\sigma_{1}(4)}{\sigma_{2}^{2}} & \kappa_{4}-\frac{(\sigma_{1}(4))^{2}}{\sigma_{2}^{2}} \end{matrix} \right), \end{equation*} where \begin{equation*} \begin{split} a_{i1} & = \frac{\sigma_{1}(4)-\sigma_{1}(i)}{\sigma_{2}} -\frac{\sigma_{1}(4)-\sigma_{1}(i)}{\sigma_{1}(4)-\sigma_{1}(1)}\cdot\frac{\sigma_{1}(4)\sigma_{2}\kappa_{4}-\sigma_{1}(1)}{\sigma_{2}},\\ a_{ii} & = \sigma_{1}(4)\kappa_{4}-\frac{\sigma_{1}(4)}{\sigma_{2}},\\ a_{i4} & = \frac{\sigma_{1}(4)}{\sigma_{2}}-\sigma_{1}(i)\kappa_{4} -\frac{\sigma_{1}(4)-\sigma_{1}(i)}{\sigma_{1}(4)-\sigma_{1}(1)}\cdot\frac{\sigma_{1}(4)-\sigma_{1}(i)\sigma_{2}\kappa_{4}}{\sigma_{2}}, \end{split} \end{equation*} for $i=2,3$. \bigskip \noindent {\bf Step 4.} For $i=2,3$, multiplying the $i$-th row by $-\frac{\sigma_{2}-\sigma_{1}(i)\sigma_{1}(4)}{\sigma_{2}^{2}a_{ii}}$, and adding that to the $4$-th row, we obtain \begin{equation*} \left( \begin{matrix} \frac{\sigma_{1}(4)\sigma_{2}\kappa_{4}-\sigma_{1}(1)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)}{\sigma_{2}} & \frac{\sigma_{1}(4)-\sigma_{1}(1)\sigma_{2}\kappa_{4}}{\sigma_{2}} \\[3mm] a_{21} & a_{22} & 0 & a_{24} \\[3mm] a_{31} & 0 & a_{33} & a_{34} \\[3mm] a_{41} & 0 & 0 & a_{44} \end{matrix} \right), \end{equation*} where \begin{equation*} \begin{split} a_{41} & = \frac{\sigma_{2}-\sigma_{1}(1)\sigma_{1}(4)}{\sigma_{2}^{2}} -\sum_{i=2}^{3}\frac{\sigma_{2}-\sigma_{1}(i)\sigma_{1}(4)}{\sigma_{2}^{2}a_{ii}}a_{i1},\\ a_{44} & = \kappa_{4}-\frac{(\sigma_{1}(4))^{2}}{\sigma_{2}^{2}} -\sum_{i=2}^{3}\frac{\sigma_{2}-\sigma_{1}(i)\sigma_{1}(4)}{\sigma_{2}^{2}a_{ii}}a_{i4}. \end{split} \end{equation*} \bigskip By the part (1) of Lemma \ref{Lemma 6 and Lemma 7}, a direct calculation shows \begin{equation}\label{The order of aij} \begin{split} |a_{i1}| \leq C_{A}, & ~a_{ii}=O(\lambda_{1}),~a_{i4}=O(\lambda_{1}) \text{~for $i=2,3$,}\\ |a_{41}| & \leq C\lambda_{1},~a_{44}=O(\lambda_{1}^{2}), \end{split} \end{equation} where $O(\lambda_{1}^{s})$ denotes a term satisfying $C_{A}^{-1}\lambda_{1}^{s}\leq |O(\lambda_{1}^{s})|\leq C_{A}\lambda_{1}^{s}$. Moreover, we see that \begin{equation*} \vec{d}=(d_{1},d_{2},d_{3},d_{4}) = \left(1,\frac{a_{24}a_{41}-a_{21}a_{44}}{a_{22}a_{44}},\frac{a_{34}a_{41}-a_{31}a_{44}}{a_{33}a_{44}},-\frac{a_{41}}{a_{44}}\right) \end{equation*} is an eigenvector of matrix $(-G^{i\overline{i},j\overline{j}})$ corresponding to $\kappa_{4}$. By (\ref{The order of aij}), we obtain $|d_{i}|\leq\frac{C_{A}}{\lambda_{1}}$ for $i=2,3,4$. Thus $\xi_{4}=\frac{\vec{d}}{\|\vec{d}\|}$ and each $|\xi_{4}^i|^2\le C_A\lambda_1^{-2},~i=2,3,4.$ The proof of (2) in Lemma \ref{Lemma 6 and Lemma 7} is proved. \end{proof} \vskip15mm
\section{Introduction} Please follow the steps outlined below when submitting your manuscript to the IEEE Computer Society Press. This style guide now has several important modifications (for example, you are no longer warned against the use of sticky tape to attach your artwork to the paper), so all authors should read this new version. \subsection{Language} All manuscripts must be in English. \subsection{Dual submission} Please refer to the author guidelines on the CVPR 2017 web page for a discussion of the policy on dual submissions. \subsection{Paper length} Papers, excluding the references section, must be no longer than eight pages in length. The references section will not be included in the page count, and there is no limit on the length of the references section. For example, a paper of eight pages with two pages of references would have a total length of 10 pages. {\bf There will be no extra page charges for CVPR 2017.} Overlength papers will simply not be reviewed. This includes papers where the margins and formatting are deemed to have been significantly altered from those laid down by this style guide. Note that this \LaTeX\ guide already sets figure captions and references in a smaller font. The reason such papers will not be reviewed is that there is no provision for supervised revisions of manuscripts. The reviewing process cannot determine the suitability of the paper for presentation in eight pages if it is reviewed in eleven. \subsection{The ruler} The \LaTeX\ style defines a printed ruler which should be present in the version submitted for review. The ruler is provided in order that reviewers may comment on particular lines in the paper without circumlocution. If you are preparing a document using a non-\LaTeX\ document preparation system, please arrange for an equivalent ruler to appear on the final output pages. The presence or absence of the ruler should not change the appearance of any other content on the page. The camera ready copy should not contain a ruler. (\LaTeX\ users may uncomment the \verb'\cvprfinalcopy' command in the document preamble.) Reviewers: note that the ruler measurements do not align well with lines in the paper --- this turns out to be very difficult to do well when the paper contains many figures and equations, and, when done, looks ugly. Just use fractional references (e.g.\ this line is $095.5$), although in most cases one would expect that the approximate location will be adequate. \subsection{Mathematics} Please number all of your sections and displayed equations. It is important for readers to be able to refer to any particular equation. Just because you didn't refer to it in the text doesn't mean some future reader might not need to refer to it. It is cumbersome to have to use circumlocutions like ``the equation second from the top of page 3 column 1''. (Note that the ruler will not be present in the final copy, so is not an alternative to equation numbers). All authors will benefit from reading Mermin's description of how to write mathematics: \url{http://www.pamitc.org/documents/mermin.pdf}. \subsection{Blind review} Many authors misunderstand the concept of anonymizing for blind review. Blind review does not mean that one must remove citations to one's own work---in fact it is often impossible to review a paper unless the previous citations are known and available. Blind review means that you do not use the words ``my'' or ``our'' when citing previous work. That is all. (But see below for techreports.) Saying ``this builds on the work of Lucy Smith [1]'' does not say that you are Lucy Smith; it says that you are building on her work. If you are Smith and Jones, do not say ``as we show in [7]'', say ``as Smith and Jones show in [7]'' and at the end of the paper, include reference 7 as you would any other cited work. An example of a bad paper just asking to be rejected: \begin{quote} \begin{center} An analysis of the frobnicatable foo filter. \end{center} In this paper we present a performance analysis of our previous paper [1], and show it to be inferior to all previously known methods. Why the previous paper was accepted without this analysis is beyond me. [1] Removed for blind review \end{quote} An example of an acceptable paper: \begin{quote} \begin{center} An analysis of the frobnicatable foo filter. \end{center} In this paper we present a performance analysis of the paper of Smith \etal [1], and show it to be inferior to all previously known methods. Why the previous paper was accepted without this analysis is beyond me. [1] Smith, L and Jones, C. ``The frobnicatable foo filter, a fundamental contribution to human knowledge''. Nature 381(12), 1-213. \end{quote} If you are making a submission to another conference at the same time, which covers similar or overlapping material, you may need to refer to that submission in order to explain the differences, just as you would if you had previously published related work. In such cases, include the anonymized parallel submission~\cite{Authors14} as additional material and cite it as \begin{quote} [1] Authors. ``The frobnicatable foo filter'', F\&G 2014 Submission ID 324, Supplied as additional material {\tt fg324.pdf}. \end{quote} Finally, you may feel you need to tell the reader that more details can be found elsewhere, and refer them to a technical report. For conference submissions, the paper must stand on its own, and not {\em require} the reviewer to go to a techreport for further details. Thus, you may say in the body of the paper ``further details may be found in~\cite{Authors14b}''. Then submit the techreport as additional material. Again, you may not assume the reviewers will read this material. Sometimes your paper is about a problem which you tested using a tool which is widely known to be restricted to a single institution. For example, let's say it's 1969, you have solved a key problem on the Apollo lander, and you believe that the CVPR70 audience would like to hear about your solution. The work is a development of your celebrated 1968 paper entitled ``Zero-g frobnication: How being the only people in the world with access to the Apollo lander source code makes us a wow at parties'', by Zeus \etal. You can handle this paper like any other. Don't write ``We show how to improve our previous work [Anonymous, 1968]. This time we tested the algorithm on a lunar lander [name of lander removed for blind review]''. That would be silly, and would immediately identify the authors. Instead write the following: \begin{quotation} \noindent We describe a system for zero-g frobnication. This system is new because it handles the following cases: A, B. Previous systems [Zeus et al. 1968] didn't handle case B properly. Ours handles it by including a foo term in the bar integral. ... The proposed system was integrated with the Apollo lunar lander, and went all the way to the moon, don't you know. It displayed the following behaviours which show how well we solved cases A and B: ... \end{quotation} As you can see, the above text follows standard scientific convention, reads better than the first version, and does not explicitly name you as the authors. A reviewer might think it likely that the new paper was written by Zeus \etal, but cannot make any decision based on that guess. He or she would have to be sure that no other authors could have been contracted to solve problem B. FAQ: Are acknowledgements OK? No. Leave them for the final copy. \begin{figure}[t] \begin{center} \fbox{\rule{0pt}{2in} \rule{0.9\linewidth}{0pt}} \end{center} \caption{Example of caption. It is set in Roman so that mathematics (always set in Roman: $B \sin A = A \sin B$) may be included without an ugly clash.} \label{fig:long} \label{fig:onecol} \end{figure} \subsection{Miscellaneous} \noindent Compare the following:\\ \begin{tabular}{ll} \verb'$conf_a$' & $conf_a$ \\ \verb'$\mathit{conf}_a$' & $\mathit{conf}_a$ \end{tabular}\\ See The \TeX book, p165. The space after \eg, meaning ``for example'', should not be a sentence-ending space. So \eg is correct, {\em e.g.} is not. The provided \verb'\eg' macro takes care of this. When citing a multi-author paper, you may save space by using ``et alia'', shortened to ``\etal'' (not ``{\em et.\ al.}'' as ``{\em et}'' is a complete word.) However, use it only when there are three or more authors. Thus, the following is correct: `` Frobnication has been trendy lately. It was introduced by Alpher~\cite{Alpher02}, and subsequently developed by Alpher and Fotheringham-Smythe~\cite{Alpher03}, and Alpher \etal~\cite{Alpher04}.'' This is incorrect: ``... subsequently developed by Alpher \etal~\cite{Alpher03} ...'' because reference~\cite{Alpher03} has just two authors. If you use the \verb'\etal' macro provided, then you need not worry about double periods when used at the end of a sentence as in Alpher \etal. For this citation style, keep multiple citations in numerical (not chronological) order, so prefer \cite{Alpher03,Alpher02,Authors14} to \cite{Alpher02,Alpher03,Authors14}. \begin{figure*} \begin{center} \fbox{\rule{0pt}{2in} \rule{.9\linewidth}{0pt}} \end{center} \caption{Example of a short caption, which should be centered.} \label{fig:short} \end{figure*} \section{Formatting your paper} All text must be in a two-column format. The total allowable width of the text area is $6\frac78$ inches (17.5 cm) wide by $8\frac78$ inches (22.54 cm) high. Columns are to be $3\frac14$ inches (8.25 cm) wide, with a $\frac{5}{16}$ inch (0.8 cm) space between them. The main title (on the first page) should begin 1.0 inch (2.54 cm) from the top edge of the page. The second and following pages should begin 1.0 inch (2.54 cm) from the top edge. On all pages, the bottom margin should be 1-1/8 inches (2.86 cm) from the bottom edge of the page for $8.5 \times 11$-inch paper; for A4 paper, approximately 1-5/8 inches (4.13 cm) from the bottom edge of the page. \subsection{Margins and page numbering} All printed material, including text, illustrations, and charts, must be kept within a print area 6-7/8 inches (17.5 cm) wide by 8-7/8 inches (22.54 cm) high. Page numbers should be in footer with page numbers, centered and .75 inches from the bottom of the page and make it start at the correct page number rather than the 4321 in the example. To do this fine the line (around line 23) \begin{verbatim} \setcounter{page}{4321} \end{verbatim} where the number 4321 is your assigned starting page. Make sure the first page is numbered by commenting out the first page being empty on line 46 \begin{verbatim} \end{verbatim} \subsection{Type-style and fonts} Wherever Times is specified, Times Roman may also be used. If neither is available on your word processor, please use the font closest in appearance to Times to which you have access. MAIN TITLE. Center the title 1-3/8 inches (3.49 cm) from the top edge of the first page. The title should be in Times 14-point, boldface type. Capitalize the first letter of nouns, pronouns, verbs, adjectives, and adverbs; do not capitalize articles, coordinate conjunctions, or prepositions (unless the title begins with such a word). Leave two blank lines after the title. AUTHOR NAME(s) and AFFILIATION(s) are to be centered beneath the title and printed in Times 12-point, non-boldface type. This information is to be followed by two blank lines. The ABSTRACT and MAIN TEXT are to be in a two-column format. MAIN TEXT. Type main text in 10-point Times, single-spaced. Do NOT use double-spacing. All paragraphs should be indented 1 pica (approx. 1/6 inch or 0.422 cm). Make sure your text is fully justified---that is, flush left and flush right. Please do not place any additional blank lines between paragraphs. Figure and table captions should be 9-point Roman type as in Figures~\ref{fig:onecol} and~\ref{fig:short}. Short captions should be centred. \noindent Callouts should be 9-point Helvetica, non-boldface type. Initially capitalize only the first word of section titles and first-, second-, and third-order headings. FIRST-ORDER HEADINGS. (For example, {\large \bf 1. Introduction}) should be Times 12-point boldface, initially capitalized, flush left, with one blank line before, and one blank line after. SECOND-ORDER HEADINGS. (For example, { \bf 1.1. Database elements}) should be Times 11-point boldface, initially capitalized, flush left, with one blank line before, and one after. If you require a third-order heading (we discourage it), use 10-point Times, boldface, initially capitalized, flush left, preceded by one blank line, followed by a period and your text on the same line. \subsection{Footnotes} Please use footnotes\footnote {This is what a footnote looks like. It often distracts the reader from the main flow of the argument.} sparingly. Indeed, try to avoid footnotes altogether and include necessary peripheral observations in the text (within parentheses, if you prefer, as in this sentence). If you wish to use a footnote, place it at the bottom of the column on the page on which it is referenced. Use Times 8-point type, single-spaced. \subsection{References} List and number all bibliographical references in 9-point Times, single-spaced, at the end of your paper. When referenced in the text, enclose the citation number in square brackets, for example~\cite{Authors14}. Where appropriate, include the name(s) of editors of referenced books. \begin{table} \begin{center} \begin{tabular}{|l|c|} \hline Method & Frobnability \\ \hline\hline Theirs & Frumpy \\ Yours & Frobbly \\ Ours & Makes one's heart Frob\\ \hline \end{tabular} \end{center} \caption{Results. Ours is better.} \end{table} \subsection{Illustrations, graphs, and photographs} All graphics should be centered. Please ensure that any point you wish to make is resolvable in a printed copy of the paper. Resize fonts in figures to match the font in the body text, and choose line widths which render effectively in print. Many readers (and reviewers), even of an electronic copy, will choose to print your paper in order to read it. You cannot insist that they do otherwise, and therefore must not assume that they can zoom in to see tiny details on a graphic. When placing figures in \LaTeX, it's almost always best to use \verb+\includegraphics+, and to specify the figure width as a multiple of the line width as in the example below {\small\begin{verbatim} \usepackage[dvips]{graphicx} ... \includegraphics[width=0.8\linewidth] {myfile.eps} \end{verbatim} } \subsection{Color} Please refer to the author guidelines on the CVPR 2017 web page for a discussion of the use of color in your document. \section{Final copy} You must include your signed IEEE copyright release form when you submit your finished paper. We MUST have this form before your paper can be published in the proceedings. {\small \bibliographystyle{ieee} \section{Introduction} Video recognition technology is very important in the field of artificial intelligence. It is a challenging task because understanding context of a given video is related to high-level temporal causal relationship among the scenes. In addition, this technology can be applied to a variety of fields such as learning activity recognition or scene understanding in videos\cite{DBLP:journals/corr/DonahueHGRVSD14,DBLP:journals/pami/KarpathyF17}, detecting future incidents or criminals by tracking real-time CCTV videos\cite{chen2011face,sankaranarayanan2008object} and decoding cognitive thinking process of subject by analyzing temporal patterns of brain activity in fMRI images.\cite{kamitani2005decoding,kay2008identifying,norman2006beyond} Fundamentally, video recognition technology is required to understand the topic of a given video. A video consists of the sequence of images that are correlated with each other. In the problem of tagging what information the video contains, it is possible to tag one identical label for multiple frames or tag multiple labels in one frame and not to tag for the rest of the frames. That is, the frames that contain the topics of the video are determined with respect to the distribution and relation among entire images in the video. The distribution of labels tagged in these frames of one video is different from that of other video. Moreover, the number of frames in videos varies, and the distribution is variable and unknown. In addition, multi-label classification problem can be solved by logistic regression, mixture model, SVM, but if dataset to be analyzed is large-scale, batch learning could not be applied and online learning should be considered.\cite{DBLP:journals/corr/Abu-El-HaijaKLN16} Despite these challenging factors, we try to approach this classification problem from different point of view. If we view the label as a word, classifying multiple labels from a video can eventually be turned into a video to sentence translation, or video description problem. Recent advances that generate a scene description from a video can be applied to this problem as it is; recent papers have improved the quality of video description technology with the development of neural networks and the powerful combination of CNN and LSTM. We also use the LSTM decoder and transfer learning based on the mean pooling of CNN features. Here, for easy transfer learning, we use Youtube-8M dataset\cite{Google2017} because it already stores and provides Inception CNN visual features for each frame. Therefore, we focus on what better LSTM structure is and how to improve its generalization performance by using recent optimization trend called batch normalization. The contributions of this paper are the following: \begin{quote} - We suggest an insight that multi-label classification can be transformed to the problem in video description framework and establish base LSTM model. And we explore different structures of LSTM-based feature extractor. - We investigate how to improve generalization of LSTMs by using batch normalization. We deal with issues that occur when we use BNLSTM as video description translator, such as feedback selection issue. We introduce stochastic gating mechanism to alleviate this issue and determine which structure is better for feedback loop in the feature extractor. - Finally, we report validation results of our models on large-scale Youtube-8M datasets \end{quote} \begin{figure*} \begin{center} \includegraphics[width=0.95\linewidth]{paper_picture_latest.pdf} \end{center} \caption{Detailed illustration of our LSTM models for video classification. (a) our base LSTM model, (b) as a variant of (a), the guided LSTM is designed for feature extractor to be used with the following classifier.} \label{fig:short} \end{figure*} \section{Related Work} Donahue et al.\cite{DBLP:journals/corr/DonahueHGRVSD14} showed that a combination of CNN and LSTM can efficiently perform image caption, video description and activity recognition and the model can learn spatial and temporal compositional representations. Venugopalan et al.\cite{DBLP:journals/corr/VenugopalanXDRMS14} solved translating video to natural language problem by transfer learing from CNN structure, and performed LSTM decoding process after mean pooling those CNN features. These video frames also can be compressed into one visual feature vector by LSTM-based encoding process(Venugoplan et al.\cite{DBLP:journals/corr/VenugopalanRDMD15}) or 3D-CNN based representation(Yao et al. \cite{Yao15}). On top of LSTM Encoder-Decoder models, Cho et al.\cite{DBLP:journals/corr/ChoCB15} and Xu et al.\cite{xu2015show} extended the model for visual attentional framework and showed improved performance. It turns out to be useful using not only attentional mechanism but also features from additional information such as scoring some object classes or optical flow(Rohrbach et al.\cite{DBLP:journals/corr/RohrbachRS15}). To improve the validation performance of LSTM model, batch normalization method has been applied to LSTM models. Batch normalization uses batch mean and variance of input features for standardization to reduce internal covariate shift issue(Ioffe et al.\cite{DBLP:journals/corr/IoffeS15}). This batch normalization method is powerful and has recently become a trend, because this enables faster learning than dropout, preserving good generalization performance. Laurent et al.\cite{Laurent15} showed that the batch-normalized input-to-hidden transitions can lead to a faster convergence, and Cooijmans et al.\cite{DBLP:journals/corr/CooijmansBLC16} proposed a total reparameterization of LSTM by adding the hidden-to-hidden transitions, which improved generalization. \section{Approach} We propose a feature extractor for video classification guided by video description structure. In general, neural machine translation finds patterns mapping between the input sentence of one natural language to the output sentence of another language. This idea has been effectively applied to the field of video description, because the input can be generalized into the forms of sequence of any features including video frames. In our model, we extend the original classification problem into the concept of video description. By this change of perspective, we view each target label vector as a set of meaningful words, ``a sentence''. This idea results into the perspective that we can perform a translation from a video to a sequence. During translation process, the feature extractor can obtain aggregated features which are distinct to other sentence labels. This feature extraction process by translation is called ``guidance''. We can expect the final output of guidance can be utilized for video classification. \subsection{Common structure} There is a mean pooling layer to aggregate frame-level visual features and the output video-level features are input into all LSTM cell inputs. To calculate ${loss}_{word}$, we split the learning target label into a set of one-hot vectors, and make a semantic word vector with embedding layer. This word vector is also concatenated with the visual feature for input of LSTM cells. For guidance process, semantic vectors for the virtual $<$BOS$>$ and $<$EOS$>$ tokens are introduced together. \subsection{Basic LSTM structure for guidance} The Long Short Term Memory\cite{hochreiter1997long} is one of the state-of-the-art Recurrent Neural Network that has been applied in neural machine translation\cite{johnson2016google}, image captioning\cite{DBLP:journals/corr/VinyalsTBE14}, video description\cite{DBLP:journals/corr/RohrbachRS15}, etc. LSTM deals with memorizing not only patterns observed until current time $t$, but also patterns of how to recall and forget correlations throughout the patterns based on hidden states $h_t$, internal memory cell state $c_t$ and three gates $i_t$, $o_t$, $f_t$. $g_t$ is a candidate memory cell state from the current input and the previous hidden: \begin{subequations} \label{eq:lstm_model} \begin{align} i_t &= \sigma (W^i x_t \oplus w_t + U^i h_{t-1} + b_i) \\ o_t &= \sigma (W^o x_t \oplus w_t + U^o h_{t-1} + b_o) \\ f_t &= \sigma (W^f x_t \oplus w_t + U^f h_{t-1} + b_f) \\ g_t &= \tanh (W^g x_t \oplus w_t + U^g h_{t-1} + b_g) \\ c_t &= f_t\odot c_{t-1} + i_t \odot g_t \\ h_t &= o_t \odot \tanh c_t \end{align} \end{subequations} where $\oplus$ is a vector concatenation operator, $\odot$ is the element-wise multiplication between two vectors, W's are weight matrices from input to hidden states, U's are weight matrices from hidden to hidden. All weight matrices and biases b's are model parameters to be trained. The input is composed of two parts. The first part can be any form of comprehensive feature that represents the whole frames of a given video. Here, we set the mean pooled frame featrue as input of our model, including video and audio components of each frame. YouTube-8M dataset provides it as ``video-level'' feature. The second part is word embedding vector for guidance process. For any given instance, we split one multi-label target vector into many one-hot word vectors $(y_1, ... , y_T)$, where $T$ is the number of tags in the target label vector. Finally we add embedding layer to squeeze the high dimensional sparse vectors into the lower dimensional dense word vectors $(w_1, ... , w_T)$. Then the averaged frame feature $x$ is duplicated and concatenated with word vectors $w_t$, finally input to LSTM model at each time step, as $(x_1 \oplus w_1, ... , x_T \oplus w_T)$. The intermeidate hiddens $(h_1, ... , h_T)$ are outputs of LSTM cells in charge of guiding memory of LSTM converging to the final goal state. These outputs are projected back into high dimensional space to get a distribution over all of the words in the vocabulary. Then, for each step, our LSTM models estimate conditional probability : \begin{equation} P(y_t, ... , y_1 | x_t \oplus w_t, ... ,x_1 \oplus w_1) = \prod_{1 \le t \le T}{P(y_t | h_{t-1})} \end{equation} and maximizes cross entropy of each word. After all, The final hidden state $h_T$ is used for video classification. We can have benefits from this change of viewpoint in terms of classification performance as well as learning time. Our target dataset, YouTube-8M, contains videos with at most 300 frames annotated by 3.4 labels in average, maximally around 30 labels. Therefore, searching for the features in guidance process takes only about $\frac{1}{10}$ to $\frac{1}{100}$ times LSTM steps than learning in time domain. As depicted in (a) of figure \ref{fig:long}, each LSTM cell output passes through a common word projection layer which maps input vector into the original target word vector space. Since this output has a meaning of likelihood distribution of the word vocabulary, we use softmax function as activation to make it a probabilistic distribution. For training, we calculate cross entropy for each word vector and aggregate them. It means this LSTM structure is guided by word losses. Besides, to calculate the overall output vector, max pooling layer aggregates all of the distribution outputs. \subsection{LSTM as feature extractor} Since the internal dynamics of LSTM is guided by sentence learning structure, it makes us to hypothesize that the final hidden state of LSTM is viewed as a condensed feature including sentence inference path from $w_1$ to $w_T$. This idea makes us to design a different LSTM structure as a feature extrator, which can make synergetic effect in collaboration with other classifiers. This design is illustrated in (b) in figure \ref{fig:long}. \subsection{Stochastic Gating Mechanism} When it comes to input word vectors, many word generation structures utilized ground truth labels as input sequence for train phase. It is switched to LSTM cell outputs when it performs inference. When we investigate this LSTM structure in detail, we face to a critical issue that if we use ground truth label embedding vector as $w_t$, it actually leads our model to overfitting: For training phase, LSTM seems to learn not the hidden patterns in $x_t$ but just $w_t$ itself and seems to bypass $w_1$ to $w_T$ to the final hidden state $h_T$. We questioned what the real effect of this switching is and how it is related to overfitting within our models. To figure out the cause, we added a stochastic gating before the input of each LSTM cell as one of structural variants. We can exploit both ground truth label and the embedding vector projected from the previous cell output as $w_t$ and this gate opens to ground truth labels with probability $\beta$ and to the previous cell output with $1-\beta$. By this structure we can avoid overfitting phenomena and consider which value of $\beta$ is helpful for learning. This stochastic gating mechansim is illustrated in Figure \ref{fig:short}. We can briefly touch the core concept of SG by using approximately simplified asymptotic model in Figure \ref{fig:long}. (a) if $\beta=1$, the model uses only ground truth labels as word vector $w_t$. This leads model to learn only $P({correct}_t | {correct}_{t-1})=p_t$ and there is no concern about $P({correct}_t | {incorrect}_{t-1})=q_t$, that affects lower generalization performance. (b) if $\beta=0$, the previous cell output is used for $w_t$. Let $\gamma_t$ be the probability that the tag at time $t$ is correct, \begin{figure}[t] \begin{center} \includegraphics[width=0.95\linewidth]{paper_picture_sg.pdf} \end{center} \caption{Asymptotic explanation about our stochastic gating mechanism which guides stacked LSTMs by teaching each LSTM cell "label" during the intermeidate procedures. (a) This approach faces two possible cases: the input is correct or not. Therefore, our approach makes balance between these two cases by random process of gating. (b) The probability that gate will open to the ground truth label embedding vector at each time $t$ is $\beta$, which we call label injection probabililty. So, with probability $1-\beta$, Gates are open to the output embedding vector of the previous cells. During inference process, the $\beta$ is fixed to 0 and the model utilizes only the cell outputs of model itself. This method improves not only generalization performance but also the ascending speed of learning curve. } \label{fig:long} \label{fig:onecol} \end{figure} \begin{subequations} \begin{align} \gamma_t &= P({correct}_t | {correct}_{t-1}) P({correct}_{t-1}) \nonumber \\ &+ P({correct}_t|{incorrect}_{t-1})P({incorrect}_{t-1}) \label{eq:1}\\ &=p_t \gamma_{t-1} + q_t (1-\gamma_{t-1}) \end{align} \end{subequations} If we assume that learning algorithm converges to an equilibirum state as time t goes to infinity ($\lim_{t\to \infty} \gamma_t = \gamma$, $\lim_{t\to \infty} p_t = p$, $\lim_{t\to \infty} q_t = q$), \begin{subequations} \begin{align} \gamma &= p \gamma + q (1-\gamma) \nonumber \\ \gamma &= \gamma_0 = \frac{q}{1-p+q} \end{align} \end{subequations} Now, (c) let us consider the case that $\beta \in (0,1)$. As the diagram is depicted, The probability that the input tag at time t is correct increases as ground truth label injection occurs with probability $\beta$. \begin{subequations} \begin{align} P({correct}_{t-1}) &= \beta + (1-\beta) \gamma_{t-1} \nonumber \\ P({incorrect}_{t-1}) &= (1-\beta) (1-\gamma_{t-1}) \nonumber \end{align} \end{subequations} In this case, the probability of being correct at time t is computed as the equation \ref{eq:1}: \begin{subequations} \begin{align} \gamma_t &= p_t (\beta + (1-\beta) \gamma_{t-1}) + q_t (1-\beta) (1-\gamma_{t-1}) \nonumber \\ \gamma &= \gamma (\beta) = \frac{p\beta + q(1-\beta)}{1 - (1-\beta)(p-q)} \end{align} \end{subequations} Let us compare the $\gamma_0$ and $\gamma(\beta)$. If the learning algorithm trained the model to output the intermediate tags correctly with a high probability, it may be a good start to consider the case $p > q$ at first. Since the numerator is a weighted average between $p$ and $q$, it becomes larger than $q$. In addition, the negative term $-(p-q)$ of the denominator decreases by a factor of $1-\beta$, resulting into the increase of $\gamma(\beta)$. That is, if $p > q$, $\gamma_0 < \gamma(\beta)$ for $\beta > 0$, which means approximately it has a higher asymptotic limitation of learning curve than that of $\beta=0$ case. In other case, $p < q$ means the learning algorithm has trained the model to find patterns from the previous incorrect tag input to the correct tags and it is better than correct-to-correct tags. This case is possible if the amount of incorrect input tags are more trained than that of correct input tags. This results into the reversed relation: $\gamma_0 > \gamma(\beta)$. \subsection{Batch Normalized LSTM} To improve our LSTM models, we adopted batch normalizations into our models. Firstly we just added two BN layers between classifier and LSTM final state and at the output word projection layer, respectively. This structure doesn't modify LSTM itself. But the next model, Batch normalized LSTM (BNLSTM)\cite{DBLP:journals/corr/CooijmansBLC16,Laurent15} has interal batch normalization for reparameterization hiddens and cell memory: \begin{subequations} \label{eq:bnlstm_model} \begin{align} \tilde{x}^j_t &= BatchNorm(W^j x_t \oplus w_t) \\ \tilde{h}^j_t &= BatchNorm(U^j h_{t-1}) \\ k_t &= \sigma ( \tilde{x}^j_t + \tilde{h}^j_t + b_j) \\ g_t &= \tanh ( \tilde{x}^g_t + \tilde{h}^g_t + b_g) \\ c_t &= f_t\odot c_{t-1} + i_t \odot g_t \\ \tilde{c}_t &= BatchNorm(c_t) \\ h_t &= o_t \odot \tanh \tilde{c}_t \end{align} \end{subequations} where $j=i,o,f,g$ and $k=i,o,f$ \section{Experimental Setup} This section illustrates the process of evalution for our approach. Firstly, we explain about the Youtube-8M dataset that we worked on. Secondly, we describe the evaluation metrics and lastly, the implementation details of our models. \subsection{YouTube-8M dataset} YouTube-8M dataset\cite{Google2017} is a large-scale video benchmark dataset collected from Google YouTube. It provides 8 Million video URLs with 4716 classes (video tags). Every video is tagged by 3.4 labels in average, and maximum number of labels in a video is around 30. For each video, there are two different levels; video-level and frame-level. It provides the videos as not pixel-level raw frames, but feature representation vectors extracted by Convolutional Neural Network(CNN) such as Inception network. That is, the dataset already has extracted significant feature vectors with 1024 dimension from videos by each frame per second. In addition, it also contains audio feature vectors with 128 dimension synchronized by video features. Each video has at most 300 frames, which consist of frame-level datasets, and one average pooled frame, which is video-level data. They are all stored in froms of TensorFlow Record (tfrecord) binary files, to boost up the loading and preprocessing speed. There are 4096 train tfrecords files, 4096 validation files, and 4096 test files respectively. Frame-level dataset, especially frame-level train dataset requires a huge amount of storage space, i.e. 1.2TB, Averaged pooled video-level (inception feature + audio feature) datasets are provided due to the above reason. Video-level training dataset requires only less than 30 GB. In this paper, we focus on video-level datasets to implement video classifier. This is possible because recent studies \cite{DBLP:journals/corr/DonahueHGRVSD14,DBLP:journals/corr/VenugopalanXDRMS14} proved that mean pooling layer can be one of the efficient methods to aggregate frames in a video. \subsection{Evaluation Metrics} For information retrieval, we can measure three different evaluation metrics for the performance of topic classifiers such as Hit@k, PERR and GAP. \cite{DBLP:journals/corr/Abu-El-HaijaKLN16} Hit@k is the fraction of retrieved samples that include one or more ground truth labels in top $k$ predictions PERR means Precision at Equal Recall Rate, which measures the averaged fraction of how many predictions are in the size of a set of ground truth labels, not just fixed value $k$. The calculation of both Hit@k and PERR are based on ranking entity(label) scores from predictions. Finally, GAP is from the concept of averaged precision. This GAP is a standard evaluation for YouTube-8M dataset\cite{Kaggle2017}. The detailed definitions of these metrics can be found in \cite{DBLP:journals/corr/Abu-El-HaijaKLN16, Google2017}. Especially, \cite{Google2017} provides automatic evaluation tools for these metrics, so we use them for this experiments. \subsection{Experimental details of our models} \textbf{Baseline Description} For multi-label video classification on Youtube-8M dataset, logistic classifier and mixture of experts model are applied for video-level classification\cite{DBLP:journals/corr/Abu-El-HaijaKLN16}. We also use them as our baseline models provided in starter code published by google\cite{Google2017}. Since our model can be unified with classifiers including these baseline models, we can improve our models by boosting up the classifiers by adding dropout layers or extending dimension of layers, etc. In this paper, we don't focus on these classifiers and leave them for the further work. \textbf{Base LSTM model} We implemented 2 layered standard LSTMs as explained in Section 3. The size of hidden state in an LSTM cell is 256 and the word embedding layer has 64 dimensional output word vector. They are initialized to be orthogonal each other and LSTM cells run up to the maximum size of the number of entities $T$ of video samples A (shared) word projection layer generates a vocabulary distribution vector for each LSTM cell output. Then we calculate ${loss}_{word}$ by using standard softmax cross entropy for each output. We examine whether this structure can show significant result or not. \textbf{Guided LSTM with Stochastic Gating Mechanism} We implemented a different structure of LSTMs guided by video-to-tag translation process. So the guided LSTM can act as a feature extractor for the connected classifier. For this experiment, we figure out which structural feedback variants of guided LSTM can perform better generalization than the base LSTM model. Here, we chose the baseline logistic model as our classifier following LSTMs. All parameter settings are equal to the above base model, besides the additional one more LSTM step runs to generate hidden state to be input to the classifier. In addition, we try to apply binary cross entropy for ${loss}_{word}$ to be much faster learning convergence. We calculated additional ${loss}_{class}$ by using binary cross entropy for the final prediction, and optimize both ${loss}_{word}$ and ${loss}_{class}$ \textbf{Adding Batch Normalization layers into guided LSTM} Since a batch normalization(BN) layer is powerful, it has become a trend to add BN layers to every layer in the structure. However, our stochastic gating mechanism can distort the distribution of input word vectors. So we attempted to add BN layers gradually. We firstly add a BN layer before each loss calculation. This preserves LSTM structure itself. Seconldy, we try to upgrade LSTM layer to BNLSTM layer. Lastly, we exploit both additions to figure out the performance improvement. \textbf{Extention to other classifiers} The above all models cooperate with logistic classifier model. To show our model can be a collaborative feature extractor with other classifiers, we reconnected our model to MoE model. For the further work, we show if our model can be upgraded as we use more competitive classifiers. \section{Results and Discussion} \begin{table} \begin{center} \begin{tabular}{|l|c|c|c|} \hline Model & Hit@1 & PERR & GAP \\ \hline\hline Logistic Model & 82.5 & 69.1 & 75.9 \\ Mixture of Experts(MoE) & \textbf{83.9} & \textbf{70.7} & \textbf{78.0} \\ \hline\hline ours & & & \\ \hline max pooling & 80.9 & 66.5 & 73.0 \\ guided ($\beta=1.0$) & 81.4 & 67.5 & 74.4 \\ guided ($\beta=0.5$) & 81.8 & 68.0 & 75.1 \\ guided ($\beta=0.0$) & \textbf{82.5} & \textbf{68.9} & \textbf{76.3} \\ \hline guided ($\beta=0.5$) & & & \\ LSTM + BN layer & 83.0 & 69.4 & 76.9 \\ BNLSTM & \textbf{83.9} & \textbf{70.8} & \textbf{78.3} \\ BNLSTM + BN layer & 83.6 & 70.2 & 77.9 \\ \hline guided ($\beta=0.0$) & & & \\ LSTM + BN layer & 83.4 & 69.6 & 77.4 \\ BNLSTM & \textbf{84.3} & \textbf{71.2} & \textbf{78.8} \\ \hline BNLSTM + MoE & \textbf{84.5} & \textbf{71.5} & \textbf{79.1} \\ \hline \end{tabular} \end{center} \caption{Validation results of our models (100k iterations). All values in this table are averaged results and reported in percentage(\%).} \end{table} \textbf{Base and guided LSTM models} We obtained two significant results from the first experiment: First, regardless of $\beta$, guided LSTM structure can perform better than base model(GAP 73.0\%). Guidance process can make LSTM to learn dynamics which can generate the final hidden state tracked by label entities. Second, ground truth label injection ($\beta=1$, 74.4\%) is prevalently used in neural machine translation or image description structures, validation results show that metrics can be improved by decreasing $\beta$($\beta$=0.5, 75.1\%, $\beta$=0.0, 76.3\%). As described earlier, we can check that $\gamma_0 > \gamma(\beta)$. In addition, since the activatio function is softmax after the word projection structure, it becomes a bottleneck of the base model. The learning speed of guided LSTM, however, is increased by using individual binary cross entropy for each word projection, which get rid of the bottleneck. \textbf{Batch Normalized LSTM and Extention with MoE} We performed the second experiments for two different ground truth label injection probability ($\beta=0.5, 0.0$). As reported in Table 1., guided LSTM model has higher evaluation metrics by just adding a BN layer between guided LSTM and logistic classifier (76.9\%, 77.4\%). In addition, BNLSTM with logistic classifier (78.3\%) shows higher performance than that of the case of adding a BN layer (77.9\%). We had guessed that adding both modifications into the structure could perform better, but validation results of it don't show better results. We concluded that this may be related to stabilization of BN layers because each BN layer has its own population mean and variance which are accumulated by batch mean and variance values with exponential decaying algorithm and the result varies with this decaying factors. Above all, we got the higher results(78.8\%) with $\beta=0.0$ than base mixture model(78.0\%). In the final experiment, we obtained the possibility of extentions of our model by updating the highest value with different classifier(79.1\%) \section{Conclusion} In this paper, we proposed a method to use LSTMs as a feature extractor for multi-label video classification and investigated how to improve LSTM performance through batch normalization. For better generalization, we found out that stochastic gating mechanism with $\beta=0.0$ has shown better validation results than $\beta>0.0$. it means it is better to use feedback loop from the previous LSTM cell in both training and inference phase. In addition, batch normalization layer improved the performance, but it requires careful consideration about which parts of the structure are attached by BN layer. Last, mean pooling is known to be an effective aggregation method, but the ordered relation information that can be seen at frame-level may disappear by mean pooling. Therefore, it may be difficult to classify the same videos even if they have different meanings depending on the order of the frames. The transfer learning is performed by using the given CNN features from DB in this paper. To deal with frame-level features directly, we can put an LSTM encoder instead of mean pooling layer. In addition it can be a possible way to put an attention layer between encoder and decoer LSTMs for boosting up the overall metrics. \section{Acknowledgements} We thank Dr. Joonoo Kim in Mobile Communications Business of Samsung Electronics, who supported us to perform research and publish this work as a project leader, and Dr. Sundo Choi at Samsung Advanced Institute of Technology for his kind advice and helful discussion. {\small \bibliographystyle{ieee}
\section{Motivation} The characterization of the stellar population of the Galactic bulge represents a key piece to understand the morphology and dynamical evolution of the inner Galaxy. This stellar population is dynamically affected by a massive bar (e.g. \cite{Dwek95}) and recent studies have shown an X-shaped structure (e.g. \cite{Wegg13}), similar to what it is seen in extragalactic edge-on boxy bulges. Optical surveys ---notably \textit{Gaia}--- are limited due to optical extinction, and are not able to make unhindered stellar astrometric measurements in the Galactic bulge, which complicates the characterization of this stellar population. Radio campaigns are not affected by extinction and can therefore provide complementary information to optical surveys, especially at low latitudes. The Bulge Asymmetries and Dynamical Evolution (BAaDE) project surveys red giant stars for SiO maser emission at 43 and 86 GHz with the VLA and ALMA, eventually providing positions and radial velocities of approximately 20,000 targets along the Galactic plane (\cite{Sjouwerman16}). The BAaDE survey aims to significantly improve the dynamical models using radio sources in regions not reachable with optical surveys. The BAaDE survey is expanding the currently known stellar tracers in the inner Galaxy by a large number. Tests for dynamical models of the Galaxy require large samples of stars with accurate positions and velocities. More details can be derived if distances are tied to stellar velocities. Therefore, we present an initial attempt to cross-match BAaDE targets with \textit{Gaia} DR1, resulting in more than 5,000 matches. However, since BAaDE targets were selected based on mid-IR colors measured with the MSX mission (\cite{Sjouwerman09}, (2016)) ---where the positional uncertainty is up to 2 arcsec--- the cross-matched sample could be contaminated by false positives. After confirming the matches, we will have a sample with optical, IR and radio information that can be used to characterize the stellar populations in the inner Galaxy, as well as to test dynamical models. In particular, we can obtain the positions, proper motions, parallaxes, colors and periods from \textit{Gaia} DR2 (April 2018). Until then, we can use the \textit{Gaia} DR1 positions for cross-matching. \begin{figure}[b] \begin{center} \resizebox{\hsize}{!}{\includegraphics{dist_g_IAU.pdf}} \caption{\textbf{Left}: Offset distance between BAaDE and \textit{Gaia} sources. The solid line shows the offset distribution for 2 arcsec source position uncertainty, implying that sources with larger offsets may be false positives. \textbf{Right}: Amplitude-magnitude diagram for the cross-matches obtained between BAaDE and \textit{Gaia}. Higher amplitudes can be associate with pulsating AGB stars.} \label{fig1} \end{center} \end{figure} \section{Cross-matching description} \label{xmatch} The BAaDE target selection was based on MSX colors, which in turn were based on IRAS color-color diagrams (see \cite{Sjouwerman09}). \cite{Veen88} developed an IRAS color-color diagram to study dust/gas envelopes (DGE) of Asymptotic Giant Branch (AGB) stars. They found that DGE stars appear in a sequence in the IRAS color-color diagram, perhaps associated with an evolutionary track with an increasing mass-loss rate. In this color-color diagram, SiO maser stars are found within a specific color regime, allowing a stellar selection based on the IRAS colors. Later on, \cite{Sjouwerman09} were able to transform parts of this IRAS color-color diagram onto colors in the mid-IR, using MSX data. With the improved angular resolution provided by MSX, red giant stars (with envelopes likely to harbor SiO maser emission) can be efficiently selected in the Galactic plane. To positionally match the BAaDE targets with other surveys, we consider a circular area with 5 arcsec radius around the BAaDE targets, based on the MSX positional accuracy (2 arcsec). Although the cross-match can be done directly with \textit{Gaia}, we initially cross-match BAaDE targets and 2MASS, because of three different reasons. Firstly, we do not expect that a target displaying both mid-IR emission (MSX) and optical emission (\textit{Gaia}) would not have emission in the near-IR (2MASS). Hence, by initially cross-matching with 2MASS, we are already avoiding some false positives. Secondly, the cross-match between 2MASS and \textit{Gaia} was already made by Marrese et al. (in preparation) using the best neighbor algorithm, finding more than 90$\%$ coincidences. Finally, 2MASS contributes with useful near-IR information to characterize the stellar population. The cross-match between BAaDE targets and 2MASS produced more than 90$\%$ coincidences within 5 arcsec. However, looking at these sources in the \textit{Gaia} catalog, out of 5,674 coincidences seem to have a counter part at optical wavelengths. From those, 4,814 sources have only one \textit{Gaia} match and 860 sources have 2 or more \textit{Gaia} matches within the search radius. We will focus on the 4,814 sources that have a unique \textit{Gaia} match. \section{False positive filters} \label{false} To refine the cross-matching by avoid false positives, several filtering methods have been considered. Below, we outline the most successful methods that we have applied. \begin{figure}[b] \begin{center}\ \resizebox{\hsize}{!}{\includegraphics{color_IAU.pdf}} \caption{\textbf{Lower}: Color-color diagram for the cross-matches obtained between BAaDE targets and \textit{Gaia}. The sample was split in bluer (crosses) and redder sources (circles), see Sect.~\ref{color}. \textbf{Upper}: Histogram distributions for bluer and redder sources. The gray histogram represents a random sample of MSX sources showing that most of them are part of the bluer sample.} \label{fig2} \end{center} \end{figure} \subsection{Distance analysis} \label{dist} The distribution of matches between the BAaDE targets and \textit{Gaia} shows Gaussian distributions for both components $(\Delta \alpha \times cos(\delta), \Delta \delta)$ with absolute mean values $<0.2$ arcsec. This is 2D Gaussian distribution can be converted to a function of the distance offset, which is a first-order Bessel function assuming the same standard deviations in both components. The left panel of Fig.~\ref{fig1} shows the expected distribution for a radius of 2 arcsec (representative as the typical MSX positional uncertainty) as a solid line. Excess sources at offsets above $\sim2$ arcsec may be considered false positives. \subsection{Color filters in the mid- and near-IR} \label{color} Since the cross-match was made through 2MASS, the near-IR filters ($J,H,K$) and the mid-IR (MSX bands) can be used for color-color diagrams. The lower panel of Fig.~\ref{fig2} shows the color-color diagram between [A-D] MSX bands and [J-K] 2MASS filters for the matches between BAaDE targets and \textit{Gaia}. We calculated the mean value for the 2MASS colors and we split the sample in two different subsamples, i.e., $[J-K]<3.6$ (bluer stars) and $[J-K]>3.6$ (redder stars). AGB stars are expected to have redder colors (represented by a steeper slope in their SED), and therefore we expect that the redder stars are more likely to be correct cross-matches. Moreover, the upper panel of Fig.~\ref{fig2} shows the histograms for the bluer and redder stars respectively, plotted on top of the distribution for random subset of MSX sources. The plot shows that most of the MSX sources are indeed bluer stars, in agreement with that redder stars (representing half of our sample) are more rare and could more easily be associated with pulsating AGB stars. \subsection{Variability of evolved stars} \label{var} The observed variability of the optical g-band can be quantified with an amplitude measure, defined as $\rm{Amp=log_{10}(\sqrt{N_{obs}}\frac{\sigma_g}{g})}$, where $N_{obs}$ is the number of observations. \cite{Belokurov17} calculated the amplitude for different stellar populations in the LMC and SMC, and localized Mira variables in the upper region of the amplitude-magnitude plot. This implies for a given range in $G$ these variable stars have a higher value of Amp than non-variable source of the same brightness. The right panel of Fig.~\ref{fig1} shows an amplitude-magnitude plot for the matches between BAaDE targets and \textit{Gaia}. The solid line represent the typical behavior for most of the \textit{Gaia} sources. Stars with amplitudes higher than -1 are highly related with pulsating stars and hence could be confirmed as properly matched. In contrast, Stars with amplitudes lower than -1 must be carefully reviewed by an alternative criterion for false positives. \subsection{Statistical arguments} Assuming an uniform distribution of sources in the bulge for the \textit{Gaia} detections and for the BAaDE targets, one could calculate the number of sources that randomly will match given the resolution of each survey. We estimate that the number of random matches should be less 1,200, which is low compared with our finding of 5,674 matches. Moreover, in the statistical calculation we have assumed that there is no optical extinction that could limit the number of \textit{Gaia} sources. Therefore, the actual number of random matches should be much lower than 1,200, confirming that our cross-match is not a consequence of random matches of unrelated sources. \begin{acknowledgements} This work has made use of data from the European Space Agency mission \textit{Gaia}, processed by the \textit{Gaia} Data Processing and Analysis Consortium (DPAC). Funding for the DPAC has been provided by national institutions, in particular the institutions participating in the \textit{Gaia} Multilateral Agreement. This material is based upon work supported by the National Science Foundation under Grant Number 1517970. \end{acknowledgements}
\section{Introduction} \label{sec:intro} Text in natural scene images contains rich semantic information and is of great value for image understanding. As an important task in image analysis, scene text spotting, including both text detection and word recognition, attracts much attention in computer vision field. It has many potential applications, ranging from web image searching, robot navigation, to image retrieval. Due to the large variability of text patterns and the highly complicated background, text spotting in natural scene images is much more challenging than from scanned documents. Although significant progress has been made recently based on Deep Neural Network (DNN) techniques, it is still an open problem~\cite{xiang2016Survey}. Previous works~\cite{Wangkai2011, Bissacco2013ICCV, Max2014ECCV, Max2016IJCV} usually divide text spotting into a sequence of distinct sub-tasks. Text detection is performed firstly with a high recall to get candidate regions of text. Then word recognition is applied on the cropped text bounding boxes by a totally different approach, following word separation or character grouping. A number of techniques are also developed which solely focus on text detection or word recognition. However, the tasks of word detection and recognition are highly correlated. Firstly, the feature information can be shared between them. In addition, these two tasks can complement each other: better detection improves recognition accuracy, and the recognition information can refine detection results vice versa. To this end, we propose an end-to-end trainable text spotter, which jointly detects and recognizes words in an image. An overview of the network architecture is presented in Figure~\ref{fig:overview}. It consists of a number of convolutional layers, a region proposal network tailored specifically for text (refer to as Text Proposal Network, TPN), an Recurrent Neural Network (RNN) encoder for embedding proposals of varying sizes to fixed-length vectors, multi-layer perceptrons for detection and bounding box regression, and an attention-based RNN decoder for word recognition. Via this framework, both text bounding boxes and word labels are provided with a single forward evaluation of the network. We do not need to process the intermediate issues such as character grouping~\cite{Zhu_2016_CVPR, Textflow2015ICCV} or text line separation~\cite{zhengCVPR15}, and thus avoid error accumulation. The main contributions are thus three-fold. \begin{figure*} \begin{center} \includegraphics[width=0.9\textwidth]{figures//overview.pdf} \end{center} \caption{Model overview. The network takes an image as input, and outputs both text bounding boxes and text labels in one forward pass. The whole network is trained end-to-end.} \label{fig:overview} \end{figure*} $(1)$ An end-to-end trainable DNN is designed to optimize the overall accuracy and share computations. The network integrates both text detection and word recognition. With the end-to-end training of both tasks, the learned features are more informative, which can promote the detection performance as well as the overall performance. The convolutional features are shared by both detection and recognition, which saves processing time. To our best knowledge, this is the first attempt to integrate text detection and recognition into a single end-to-end trainable network. $(2)$ We propose a new method for region feature extraction. In previous works~\cite{RGB2015ICCV, renNIPS15fasterrcnn}, Region-of-Interest (RoI) pooling layer converts regions of different sizes and aspect ratios into feature maps with a fixed size. Considering the significant diversity of aspect ratios in text bounding boxes, it is sub-optimal to fix the size after pooling. To accommodate the original aspect ratios and avoid distortion, RoI pooling is tailored to generate feature maps with varying lengths. An RNN encoder is then employed to encode feature maps of different lengths into the same size. $(3)$ A curriculum learning strategy is designed to train the system with gradually more complex training data. Starting from synthetic images with simple appearance and a large word lexicon, the system learns a character-level language model and finds a good initialization of appearance model. By employing real-world images with a small lexicon later, the system gradually learns how to handle complex appearance patterns. we conduct a set of experiments to explore the capabilities of different model structures. The best model outperforms state-of-the-art results on a number of standard text spotting benchmarks, including ICDAR2011, 2015. \section{Related Work} \label{sec:ReWork} Text spotting essentially includes two tasks: text detection and word recognition. In this section, we present a brief introduction to related works on text detection, word recognition, and text spotting systems that combine both. There are comprehensive surveys for text detection and recognition in~\cite{Ye2015pami,xiang2016Survey}. \subsection{Text Detection} Text detection aims to localize text in images and generate bounding boxes for words. Existing approaches can be roughly classified into three categories: character based, text-line based and word based methods. Character based methods firstly find characters in images, and then group them into words. They can be further divided into sliding window based~\cite{Max2014ECCV,Wang2012, Zhu_2016_CVPR, Textflow2015ICCV} and Connected Components (CC) based~\cite{huang2013ICCV,Neumann2013ICCV, Busta_2015_ICCV} methods. Sliding window based approaches use a trained classifier to detect characters across the image in a multi-scale sliding window fashion. CC based methods segment pixels with consistent region properties (\ie, color, stroke width, density, \etc) into characters. The detected characters are further grouped into text regions by morphological operations, CRF or other graph models. Text-line based methods detect text lines firstly and then separate each line into multiple words. The motivation is that people usually distinguish text regions initially even if characters are not recognized. Based on the observation that a text region usually exhibits high self-similarity to itself and strong contrast to its local background, Zhang~\etal~\cite{zhengCVPR15} propose to extract text lines by exploiting symmetry property. Zhang~\etal~\cite{Zhang_2016_CVPR} localize text lines via salient maps that are calculated by fully convolutional networks. Post-processing techniques are also proposed in~\cite{Zhang_2016_CVPR} to extract text lines in multiple orientations. More recently, a number of approaches are proposed to detect words directly in the images using DNN based techniques, such as Faster R-CNN~\cite{renNIPS15fasterrcnn}, YOLO~\cite{YOLO2016}, SSD~\cite{SSD2016}. By extending Faster R-CNN, Zhong~\etal~\cite{Zhong2016} design a text detector with a multi-scale Region Proposal Network (RPN) and a multi-level RoI pooling layer. Tian~\etal~\cite{Tian2016} develop a vertical anchor mechanism, and propose a Connectionist Text Proposal Network (CTPN) to accurately localize text lines in natural image. Gupta~\etal~\cite{Gupta16} use a Fully-Convolutional Regression Network (FCRN) for efficient text detection and bounding box regression, motivated by YOLO. Similar to SSD, Liao~\etal~\cite{LiaoAAAi2017} propose ``TextBoxes'' by combining predictions from multiple feature maps with different resolutions, and achieve the best-reported performance on text detection with datasets in~\cite{icdar2015, Wangkai2011}. \subsection{Text Recognition} Traditional approaches to text recognition usually perform in a bottom-up fashion, which recognize individual characters firstly and then integrate them into words by means of beam search~\cite{Bissacco2013ICCV}, dynamic programming~\cite{Max2014ECCV}, \etc. In contrast, Jaderberg~\etal~\cite{maxNIPS14} consider word recognition as a multi-class classification problem, and categorize each word over a large dictionary (about $90$K words, \ie, class labels) using a deep CNN. With the success of RNNs on handwriting recognition~\cite{Graves2006ICML}, He~\etal~\cite{He2015Reading} and Shi~\etal~\cite{ShiBY15} solve word recognition as a sequence labelling problem. RNNs are employed to generate sequential labels of arbitrary length without character segmentation, and Connectionist Temporal Classification (CTC) is adopted to decode the sequence. Lee and Osindero~\cite{Lee_2016_CVPR} and Shi~\etal~\cite{shiCVPR2016} propose to recognize text using an attention-based sequence-to-sequence learning structure. In this manner, RNNs automatically learn the character-level language model presented in word strings from the training data. The soft-attention mechanism allows the model to selectively exploit local image features. These networks can be trained end-to-end with cropped word image patches as input. Moreover, Shi~\etal~\cite{shiCVPR2016} insert a Spatial Transformer Network (STN) to handle words with irregular shapes. \subsection{Text Spotting Systems} Text spotting needs to handle both text detection and word recognition. Wang~\etal~\cite{Wangkai2011} take the locations and scores of detected characters as input and try to find an optimal configuration of a particular word in a given lexicon, based on a pictorial structures formulation. Neumann and Matas~\cite{Neumann2013ICCV} use a CC based method for character detection. These characters are then agglomerated into text lines based on heuristic rules. Optimal sequences are finally found in each text line using dynamic programming, which are the recognized words. These recognition-based pipelines lack explicit word detection. Some text spotting systems firstly generate text proposals with a high recall and a low precision, and then refine them during recognition with a separate model. It is expected that a strong recognizer can reject false positives, especially when a lexicon is given. Jaderberg~\etal~\cite{Max2016IJCV} use an ensemble model to generate text proposals, and then adopt the word classifier in~\cite{maxNIPS14} for recognition. Gupta~\etal~\cite{Gupta16} employ FCRN for text detection and the word classifier in~\cite{maxNIPS14} for recognition. Most recently, Liao~\etal~\cite{LiaoAAAi2017} combine ``TextBoxes'' and ``CRNN''~\cite{ShiBY15}, which yield state-of-the-art performance on text spotting task with datasets in~\cite{icdar2015, Wangkai2011}. \section{Model} \label{sec:Model} Our goal is to design an end-to-end trainable network, which simultaneously detects and recognizes all words in images. Our model is motivated by recent progresses in DNN models such as Faster R-CNN~\cite{renNIPS15fasterrcnn} and sequence-to-sequence learning~\cite{shiCVPR2016, Lee_2016_CVPR}, but we take the special characteristics of text into consideration. In this section, we present a detailed description of the whole system. \noindent {\bf Notation} All bold capital letters represent matrices and all bold lower-case letters denote column vectors. $[\mathbf{a};\mathbf{b}]$ concatenates the vectors $\mathbf{a}$ and $\mathbf{b}$ vertically, while $[\mathbf{a},\mathbf{b}]$ stacks $\mathbf{a}$ and $\mathbf{b}$ horizontally (column wise). In the following, the bias terms in neural networks are omitted. \subsection{Overall Architecture} The whole system architecture is illustrated in Figure~\ref{fig:overview}. Firstly, the input image is fed into a convolutional neural network that is modified from VGG-$16$ net~\cite{Simonyan14c}. VGG-$16$ consists of $13$ layers of $3 \times 3$ convolutions followed by Rectified Linear Unit (ReLU), $5$ layers of $2 \times 2 $ max-pooling, and Fully-Connected (FC) layers. Here we remove FC layers. As long as text in images can be relatively small, we only keep the $1$st, $2$nd and $4$th layers of max-pooling, so that the down-sampling ratio is increased from $1/32$ to $1/8$. Given the computed convolutional features, TPN provides a list of text region proposals (bounding boxes). Then, Region Feature Encoder (RFE) converts the convolutional features of proposals into fixed-length representations. These representations are further fed into Text Detection Network (TDN) to calculate their textness scores and bounding box offsets. Next, RFE is applied again to compute fixed-length representations of text bounding boxes provided by TDN (see purple paths in Figure~\ref{fig:overview}). Finally, Text Recognition Network (TRN) recognizes words in the detected bounding boxes based on their representations. \subsection{Text Proposal Network} Text proposal network (TPN) is inspired from RPN~\cite{renNIPS15fasterrcnn, Zhong2016}, which can be regarded as a fully convolutional network. As presented in Figures~\ref{fig:TPN}, it takes convolutional features as input, and outputs a set of bounding boxes accompanied with ``textness'' scores and coordinate offsets which indicate scale-invariant translations and log-space height/width shifts relative to pre-defined anchors, as in \cite{renNIPS15fasterrcnn}. \begin{figure}[t!] \vspace{-0.0cm} \centering \begin{minipage}[t]{0.26\textwidth} \centering \includegraphics[width=0.82\textwidth]{figures//TPN.pdf} \end{minipage}\hfill \begin{minipage}[t]{0.21\textwidth} \centering \vspace{-6.4cm} \caption{Text Proposal Network (TPN). We apply multiple scale sliding windows over the convolutional feature maps. Both local and contextual information are retained which helps to propose high quality text bounding boxes. The concatenated local and contextual features are further fed into the {\em cls} layer for computing textness scores and the {\em reg} layer to calculate coordinate offsets, with respect to $k$ anchors at each position.} \label{fig:TPN} \end{minipage} \end{figure} Considering that word bounding boxes usually have larger aspect ratios ($W/H$) and varying scales, we designed $k=24$ anchors with $4$ scales (with box areas of $16^2$, $32^2$, $64^2$, $80^2$) and $6$ aspect ratios ($1:1$, $2:1$, $3:1$, $5:1$, $7:1$, $10:1$). Inspired by~\cite{Zhong2016}, we apply two $256$-d rectangle convolutional filters of different sizes ($W=5,H=3$ and $W=3,H=1$) on the feature maps to extract both local and contextual information. The rectangle filters lead to wider receptive fields, which is more suitable for word bounding boxes with large aspect ratios. The resulting features are further concatenated to $512$-d vectors and fed into two sibling layers for text/non-text classification and bounding box regression. \subsection{Region Feature Encoder } \label{sec:rfe} To process RoIs of different scales and aspect ratios in a unified way, most existing works re-sample regions into {\em fixed-size} feature maps via pooling~\cite{RGB2015ICCV}. However, for text, this approach may lead to significant distortion due to the large variation of word lengths. For example, it may be unreasonable to encode short words like ``Dr'' and long words like ``congratulations'' into feature maps of the same size. In this work, we propose to re-sample regions according to their respective aspect ratios, and then use RNNs to encode the resulting feature maps of different lengths into fixed length vectors. The whole region feature encoding process is illustrated in Figure~\ref{fig:ROI}. For an RoI of size $h \times w$, we perform spatial max-pooling with a resulting size of \begin{equation} H \times \min(W_{max},2Hw/h), \label{eq:pool} \end{equation} where the expected height $H$ is fixed and the width is adjusted to keep the aspect ratio as $2w/h$ (twice the original aspect ratio) unless it exceeds the maximum length $W_{max}$. Note that here we employ a pooling window with an aspect ratio of $1:2$, which benefits the recognition of narrow shaped characters, like `i', `l', etc., as stated in~\cite{ShiBY15}. Next, the resampled feature maps are considered as a sequence and fed into RNNs for encoding. Here we use Long-Short Term Memory (LSTM)~\cite{LSTM} instead of vanilla RNN to overcome the shortcoming of gradient vanishing or exploding. The feature maps after the above varying-size RoI pooling are denoted as $\mathbf{Q} \in \mathbb{R}^{C \times H \times W}$, where $W=\min(W_{max},2Hw/h)$ is the number of columns and $C$ is the channel size. We flatten the features in each column, and obtain a sequence $\mathbf{q}_1, \dots, \mathbf{q}_W \in \mathbb{R}^{C \times H}$ which are fed into LSTMs one by one. Each time LSTM units receive one column of feature $\mathbf{q}_t$, and update their hidden state $\mathbf{h}_t$ by a non-linear function: $\mathbf{h}_t =\mathrm{f} (\mathbf{q}_t, \mathbf{h}_{t-1})$. In this recurrent fashion, the final hidden state $\mathbf{h}_W$ (with size $R = 1024$) captures the holistic information of $\mathbf{Q}$ and is used as a RoI representation with fixed dimension. \begin{figure}[t] \begin{center} \includegraphics[width=0.47\textwidth]{figures//ROI.pdf} \vspace{-0.2cm} \end{center} \caption{Region Features Encoder (RFE). The region features after RoI pooling are not required to be of the same size. In contrast, they are calculated according to aspect ratio of each bounding box, with height normalized. LSTM is then employed to encode different length region features into the same size.} \label{fig:ROI} \vspace{-0.3cm} \end{figure} \subsection{Text Detection and Recognition} \label{sec:trn} \noindent {\bf Text Detection Network} (TDN) aims to judge whether the proposed RoIs are text or not and refine the coordinates of bounding boxes once again, based on the extracted region features $\mathbf{h}_W$. Two fully-connected layers with $2048$ neurons are applied on $\mathbf{h}_W$, followed by two parallel layers for classification and bounding box regression respectively. The classification and regression layers used in TDN are similar to those used in TPN. Note that the whole system refines the coordinates of text bounding boxes twice: once in TPN and then in TDN. Although RFE is employed twice to calculate features for proposals produced by TPN and later the detected bounding boxes provided by TDN, the convolutional features only need to be computed once. \noindent {\bf Text Recognition Network} (TRN) aims to predict the text in the detected bounding boxes based on the extracted region features. As shown in Figure~\ref{fig:recognition}, we adopt LSTMs with attention mechanism~\cite{luong2015EMNLP, shiCVPR2016} to decode the sequential features into words. Firstly, hidden states at all steps $\mathbf{h}_1, \dots, \mathbf{h}_W$ from RFE are fed into an additional layer of LSTM encoder with $1024$ units. We record the hidden state at each time step and form a sequence of $\mathbf{V} =[\mathbf{v}_1, \dots, \mathbf{v}_W]\in \mathbb{R}^{R \times W}$. It includes local information at each time step and works as the context for the attention model. As for decoder LSTMs, the ground-truth word label is adopted as input during training. It can be regarded as a sequence of tokens $\mathbf{s} = \{s_0, s_1, \dots, s_{T+1} \}$ where $s_0$ and $s_{T+1}$ represent the special tokens START and END respectively. We feed decoder LSTMs with $T+2$ vectors: $\mathbf{x}_{0}$, $\mathbf{x}_{1}$, $\dots$, $\mathbf{x}_{T+1}$, where $\mathbf{x}_{0} = [\mathbf{v}_W; \mathrm{Atten}(\mathbf{V}, \mathbf{0})]$ is the concatenation of the encoder's last hidden state $\mathbf{v}_W$ and the attention output with guidance equals to zero; and $\mathbf{x}_{i} = [\psi(s_{i-1}); \mathrm{Atten}(\mathbf{V}, \mathbf{h}'_{i-1})]$, for $i=1,\dots,T+1$, is made up of the embedding $\psi()$ of the $(i-1)$-th token $s_{i-1}$ and the attention output guided by the hidden state of decoder LSTMs in the previous time-step $\mathbf{h}'_{i-1}$. The embedding function $\psi()$ is defined as a linear layer followed by a $\mathrm{tanh}$ non-linearity. The attention function $\mathbf{c}_{i} = \mathrm{Atten}(\mathbf{V},\mathbf{h}'_{i})$ is defined as follows: \begin{equation} \begin{cases} \mathbf{g}_j = \tanh( \mathbf{W}_v \mathbf{v}_j+ \mathbf{W}_h \mathbf{h}'_{i}), \,\, j= 1,\dots,W, \\ \boldsymbol{\alpha} = \mathrm{softmax}(\mathbf{w}_g^{\!\top} \cdot [\mathbf{g}_1, \mathbf{g}_2, \dots, \mathbf{g}_W]), \\ \mathbf{c}_{i} = \sum_{j=1}^{W} \alpha_j \mathbf{v}_j, \end{cases} \end{equation} where $\mathbf{V} = [\mathbf{v}_1, \dots, \mathbf{v}_W]$ is the variable-length sequence of features to be attended, $\mathbf{h}'_{i}$ is the guidance vector, $\mathbf{W}_v$ and $\mathbf{W}_h$ are linear embedding weights to be learned, $\boldsymbol{\alpha}$ is the attention weights of size $W$, and $\mathbf{c}_{i}$ is a weighted sum of input features. At each time-step $t = 0, 1, \dots, T+1$, the decoder LSTMs compute their hidden state $\mathbf{h}'_t$ and output vector $\mathbf{y}_t$ as follows: \begin{equation} \begin{cases} \mathbf{h}'_t = \mathrm{f}(\mathbf{x}_t, \mathbf{h}'_{t-1}), \\ \mathbf{y}_t = \mathrm{\varphi(\mathbf{h}'_t)} = \mathrm{softmax}(\mathbf{W}_o \mathbf{h}'_t) \end{cases} \end{equation} where the LSTM~\cite{LSTM} is used for the recurrence formula $\mathrm{f}()$, and $\mathbf{W}_o$ linearly transforms hidden states to the output space of size $38$, including $26$ case-insensitive characters, $10$ digits, a token representing all punctuations like ``!'' and ``?'', and a special END token. \begin{figure}[t] \begin{center} \includegraphics[width=0.47\textwidth]{figures//recognition.pdf} \end{center} \caption{Text Recognition Network (TRN). The region features are encoded by one layer of LSTMs, and then decoded in an attention based sequence to sequence manner. Hidden states of encoder at all time steps are reserved and used as context for attention model. } \label{fig:recognition} \end{figure} At test time, the token with the highest probability in previous output $\mathbf{y}_{t}$ is selected as the input token at step $t+1$, instead of the ground-truth tokens $s_1, \dots, s_T$. The process is started with the START token, and repeated until we get the special END token. \subsection{Loss Functions and Training} \noindent {\bf Loss Functions} As we demonstrate above, our system takes as input an image, word bounding boxes and their labels during training. Both TPN and TDN employ the binary logistic loss $L_{{cls}}$ for classification, and smooth $L_1$ loss $L_{{reg}}$~\cite{renNIPS15fasterrcnn} for regression. So the loss for training TPN is \begin{equation}\label{eq1} L_{{T\!P\!N}}=\frac{1}{N} \sum_{i=1}^{N} {L}_{{cls}} (p_i,p_i^\star) + \frac{1}{N_{+}} \sum_{i=1}^{N_+} L_{{reg}} (\mathbf{d}_i,\mathbf{d}_i^\star), \end{equation} where $N$ is the number of randomly sampled anchors in a mini-batch and $N_+$ is the number of positive anchors in this batch (the range of positive anchor indices is from $1$ to $N_+$). The mini-batch sampling and training process of TPN are similar to that used in~\cite{renNIPS15fasterrcnn}. An anchor is considered as positive if its Intersection-over-Union (IoU) ratio with a ground-truth is greater than $0.7$ and considered as negative if its IoU with any ground-truth is smaller than $0.3$. In this paper, $N$ is set to $256$ and $N_+$ is at most $128$. $p_i$ denotes the predicted probability of anchor $i$ being text and $p_i^\star$ is the corresponding ground-truth label ($1$ for text, $0$ for non-text). $\mathbf{d}_i$ is the predicted coordinate offsets $(\mathrm{dx}_i, \mathrm{dy}_i, \mathrm{dw}_i, \mathrm{dh}_i)$ for anchor $i$, and $\mathbf{d}_i^\star$ is the associated offsets for anchor $i$ relative to the ground-truth. Bounding box regression is only for positive anchors, as there is no ground-truth bounding box matched with negative ones. For the final outputs of the whole system, we apply a multi-task loss for both detection and recognition: \begin{align}\label{eq2} L_{D\!R\!N} &= \frac{1}{\hat{N}} \sum_{i=1}^{\hat{N}} L_{cls} (\hat{p}_i,\hat{p}_i^\star) + \frac{1}{\hat{N}_{+}} \sum_{i=1}^{\hat{N}_+} L_{reg} (\hat{\mathbf{d}}_i,\hat{\mathbf{d}}_i^\star) \notag \\ &+ \frac{1}{\hat{N}_{+}} \sum_{i=1}^{\hat{N}_{+}} L_{rec} (\mathbf{Y}^{(i)}, \mathbf{s}^{(i)}) \end{align} where $\hat{N} = 128$ is the number of text proposals sampled from the output of TPN, and $\hat{N}_{+} \leq 64$ is the number of positive ones. The thresholds for positive and negative anchors are set to $0.6$ and $0.4$ respectively, which are less strict than those used for training TPN. In order to mine hard negatives, we first apply TDN on $1000$ randomly sampled negatives and select those with higher textness scores. $\hat{p}_i$ and $\hat{\mathbf{d}}_i$ are the outputs of TDN. $\mathbf{s}^{(i)}$ is the ground-truth tokens for sample $i$ and $\mathbf{Y}^{(i)} = \{ \mathbf{y}^{(i)}_0, \mathbf{y}^{(i)}_1, \dots, \mathbf{y}^{(i)}_{T+1} \}$ is the corresponding output sequence of decoder LSTMs. $L_{rec}(\mathbf{Y}, \mathbf{s}) = - \sum_{t=1}^{T+1} \log \mathbf{y}_t(s_{t})$ denotes the cross entropy loss on $\mathbf{y}_1, \dots, \mathbf{y}_{T+1}$, where $\mathbf{y}_t(s_{t})$ represents the predicted probability of the output being $s_t$ at time-step $t$ and the loss on $\mathbf{y}_0$ is ignored. Following~\cite{renNIPS15fasterrcnn}, we use an approximate joint training process to minimize the above two losses together (ADAM~\cite{adam14} is adopted), ignoring the derivatives with respect to the proposed boxes' coordinates. \noindent{\bf Data Augmentation} We sample one image per iteration in the training phase. Training images are resized to shorter side of $600$ pixels and longer side of at most $1200$ pixels. Data augmentation is also implemented to improve the robustness of our model, which includes: $1)$ randomly rescaling the width of the image by ratio $1$ or $0.8$ without changing its height, so that the bounding boxes have more variable aspect ratios; $2)$ randomly cropping a subimage which includes all text in the original image, padding with $100$ pixels on each side, and resizing to $600$ pixels on shorter side. \noindent{\bf Curriculum Learning} In order to improve generalization and accelerate the convergence speed, we design a curriculum learning~\cite{Bengio2009} paradigm to train the model from gradually more complex data. $1)$ We generate $48$k images containing words in the ``Generic'' lexicon~\cite{Max2016IJCV} of size $90$k by using the synthetic engine proposed in~\cite{Gupta16}. The words are randomly placed on simple {\em pure colour backgrounds} ($10$ words per image on average). We lock TRN initially, and train the rest parts of our proposed model on these synthetic images in the first $30$k iterations, with convolutional layers initialized from the trained VGG-$16$ model and other parameters randomly initialized according to Gaussian distribution. For efficiency, the first four convolutional layers are fixed during the entire training process. The learning rate is set to $10^{-5}$ for parameters in the rest of convolutional layers and $10^{-3}$ for randomly initialized parameters. $2)$ In the next $30$k iterations, TRN is added and trained with a learning rate of $10^{-3}$, together with other parts in which the learning rate for randomly initialized parameters is halved to $5 \times 10^{-4}$. We still use the $48$k synthetic images as they contain a comprehensive $90$k word vocabulary. With this synthetic dataset, a character-level language model can be learned by TRN. $3)$ In the next $50$k iterations, the training examples are randomly selected from the ``Synth800k"~\cite{Gupta16} dataset, which consists of $800$k images with averagely $10$ synthetic words placed on each {\em real scene background}. The learning rate for convolutional layers remains at $10^{-5}$, but that for others is halved to $10^{-4}$. $4)$ Totally $2044$ {\em real-world} training images from ICDAR2015~\cite{icdar2015}, SVT~\cite{Wangkai2011} and AddF2k~\cite{Zhong2016} datasets are employed for another $20$k iterations. In this stage, all the convolutional layers are fixed and the learning rate for others is further halved to $10^{-5}$. These real images contain much less words than synthetic ones, but their appearance patterns are much more complex. \section{Experiments} \label{SEC:Exp} In this section, we perform experiments to verify the effectiveness of the proposed method.All experiments are implemented on an NVIDIA Tesla M$40$ GPU with $24$GB memory. We rescale the input image into multiple sizes during test phase in order to cover the large range of bounding box scales, and sample $300$ proposals with the highest textness scores produced by TPN. The detected bounding boxes are then merged via NMS according to their textness scores and fed into TRN for recognition. \noindent {\bf Criteria} We follow the evaluation protocols used in ICDAR$2015$ Robust Reading Competition~\cite{icdar2015}: a bounding box is considered as correct if its IoU ratio with any ground-truth is greater than $0.5$ and the recognized word also matches, ignoring the case. The words that contain alphanumeric characters and no longer than three characters are ignored. There are two evaluation protocols used in the task of scene text spotting: ``End-to-End" and ``Word Spotting". ``End-to-End" protocol requires that all words in the image are to be recognized, with independence of whether the string exists or not in the provided contextualised lexicon, while ``Word Spotting" on the other hand, only looks at the words that actually exist in the lexicon provided, ignoring all the rest that do not appear in the lexicon. % \noindent {\bf Datasets} The commonly used datasets for scene text spotting include ICDAR$2015$~\cite{icdar2015}, ICDAR$2011$~\cite{icdar2011} and Street View Text (SVT)~\cite{Wangkai2011}. We use the dataset for the task of ``Focused Scene Text" in ICDAR$2015$ Robust Reading Competition, which consists of $229$ images for training and $233$ images for test. In addition, it provides $3$ specific lists of words as lexicons for reference in the test phase, \ie, ``Strong'', ``Weak'' and ``Generic''. ``Strong'' lexicon provides $100$ words per-image including all words appeared in the image. ``Weak'' lexicon contains all words appeared in the entire dataset, and ``Generic'' lexicon is a $90$k word vocabulary proposed by~\cite{Max2016IJCV}. % ICDAR$2011$ does not provide any lexicon. So we only use the $90$k vocabulary as context. SVT dataset consists of $100$ images for training and $249$ images for test. These images are harvested from Google Street View and often have a low resolution. % It also provides a ``Strong'' lexicon with $50$ words per-image. % As there are unlabelled words in SVT, we only evaluate the ``Word-Spotting'' performance on this dataset. \subsection{Evaluation under Different Model Settings} \begin{table*}[h] \ \newcommand{\tabincell}[2]{\begin{tabular}{@{}#1@{}}#2\end{tabular}} \begin{center} \caption{Text spotting results on different benchmarks. We present the F-measure here in percentage. ``Ours Two-stage'' uses separate models for detection and recognition, while other ``Ours'' models are end-to-end trained. % ``Ours Atten+Vary'' achieves the best performance on almost all datasets. } \label{Tab:7} \scalebox{0.9}{ \begin{tabular}{l|c|c|c|c|c|c|c|c|cc} % \hline Method & \multicolumn{3}{|c}{\tabincell{c}{ICDAR$2015$ \\ Word-Spotting}} & \multicolumn{3}{|c} {\tabincell{c}{ICDAR$2015$ \\ End-to-End}} & \multicolumn{1}{|c}{\tabincell{c}{ICDAR$2011$ \\ Word-Spotting}} & \multicolumn{2}{|c}{\tabincell{c}{SVT \\ Word-Spotting}} & \\\cline{2-10} & \multicolumn{1}{c|}{Strong} & \multicolumn{1}{|c|}{Weak} & \multicolumn{1}{|c|}{Generic} & \multicolumn{1}{c|}{Strong} & \multicolumn{1}{|c|}{Weak} & \multicolumn{1}{|c|}{Generic} & \multicolumn{1}{c|}{Generic} & \multicolumn{1}{|c|}{Strong} & \multicolumn{1}{|c}{Generic} \\ \hline Deep2Text II+~\cite{Yin2014pami} & $84.84$ & $83.43$ & $78.90$ & $81.81$ & $79.47$ & $76.99$ & $-$ & $-$ & $-$\\ \hline Jaderberg~\etal~\cite{Max2016IJCV} & $90.49$ & $-$ & $76$ & $86.35$ & $-$ & $-$ & $76$ & $76$ & $53$ \\ \hline FCRNall+multi-filt~\cite{Gupta16} & $-$ & $-$ & $84.7$ & $-$ & $-$ & $-$ & $84.3$ & $67.7$ & $55.7$ \\ \hline TextBoxes~\cite{LiaoAAAi2017} & $93.90$ & $91.95$ & $85.92$ & $\textbf{91.57}$ & $89.65$ & $83.89$ & $87$ & $84$ & $64$ \\ \hline YunosRobot$1.0$ & $86.78$ & $-$ & $86.78$ & $84.20$ & $-$ & $84.20$ & $-$ & $-$ & $-$\\ \hline % \hline \tabincell{c}{Ours Two-stage} & $92.94 $ & $90.54 $ & $84.24$ & $88.20$ & $86.06$ & $81.97$ & $82.86$ & $82.19$ & $62.35$ \\ \hline % \tabincell{c}{Ours NoAtten+Fixed} & $92.70$ & $90.37$ & $83.83$ & $87.73$ & $85.53$ & $79.18$ & $81.70$ & $79.49$ & $58.70$ \\ \hline \tabincell{c}{Ours Atten+Fixed} & $93.33 $ & $91.66 $ & $87.73$ & $90.72 $ & $87.86$ & $83.98 $ & $83.81$ & $81.80$ & $64.50$ \\ \hline \tabincell{c}{Ours Atten+Vary} & $\textbf{94.16}$ & $\textbf{92.42}$ & $\textbf{88.20}$ & $91.08$ & $\textbf{89.81}$ & $\textbf{84.59}$ & $\textbf{87.70}$ & $\textbf{84.91}$ & $\textbf{66.18}$ \\ \hline \end{tabular} } \end{center} \vspace{-0.5cm} \end{table*} In order to show the effectiveness of our proposed varying-size RoI pooling (see Section \ref{sec:rfe}) and the attention mechanism (see Section \ref{sec:trn}), we examine the performance of our model with different settings in this subsection. With the fixed RoI pooling size of $4 \times 20$, we denote the models with and without the attention mechanism as ``Ours Atten+Fixed'' and ``Ours NoAtten+Fixed'' respectively. The model with both attention and varying-size RoI pooling is denoted as ``Ours Atten+Vary", in which the size of feature maps after pooling is calculated by Equ.~\eqref{eq:pool} with $H = 4$ and $W_{max} = 35$. Although the last hidden state of LSTMs encodes the holistic information of RoI image patch, it still lacks details. Particularly for a long word image patch, the initial information may be lost during the recurrent encoding process. Thus, we keep the hidden states of encoder LSTMs at each time step as context. The attention model can choose the corresponding local features for each character during decoding process, as illustrated in Figure~\ref{fig:attention}. From Table~\ref{Tab:7}, we can see that the model with attention mechanism, namely ``Ours Atten+Fixed'', achieves higher F-measures on all evaluated data than ``Ours NoAtten+Fixed'' which does not use attention. \begin{figure} \begin{center} \includegraphics[width=0.48\textwidth]{figures//attention.pdf} % % % % % % \end{center} \vspace{-0.3cm} \caption{Attention mechanism based sequence decoding process by ``Ours Atten+Vary'' and ``Ours Atten+Fixed'' separately. The heat maps show that at each time step, the position of the character to be decoded has higher attention weights, so that the corresponding local features will be extracted and assist the text recognition. However, if we use the fixed size RoI pooling, information may be lost during pooling, especially for a long word, which leads to an incorrect recognition result. In contrast, ``Ours Atten+Vary'' gives the correct result, even if some parts of the word image are missed, such as ``I'', ``n'' in this example.} \label{fig:attention} \vspace{-0.5cm} \end{figure} One contribution of this work is a new region feature encoder, which is composed of a varying-size RoI pooling mechanism and an LSTM sequence encoder. To validate its effectiveness, we compare the performance of models ``Ours Atten+Vary" and ``Ours Atten+Fixed". Experiments shows that varying-size RoI pooling performs significantly better for long words. For example, ``Informatikforschung" can be recognized correctly by ``Ours Atten+Vary", but not by ``Ours Atten+Fixed" (as shown in Figure~\ref{fig:attention}), because a large portion of information for long words is lost by fixed-size RoI pooling. As illustrated in Table~\ref{Tab:7}, adopting varying-size RoI pooling (``Ours Atten+Vary") instead of fixed-size pooling (``Ours Atten+Fixed") makes F-measures increase around $1\%$ for ICDAR$2015$, $4\%$ for ICDAR$2011$ and $3\%$ for SVT with strong lexicon used. \subsection{Joint Training vs. Separate Training} Previous works~\cite{Max2016IJCV, Gupta16, LiaoAAAi2017} on text spotting typically perform in a two-stage manner, where detection and recognition are trained and processed separately. The text bounding boxes detected by a model need to be cropped from the image and then recognized by another model. In contrast, our proposed model is trained jointly for both detection and recognition. By sharing convolutional features and RoI encoder, the knowledge learned from the correlated detection and recognition tasks can be transferred between each other and results in better performance for both tasks. To compare with the model ``Ours Atten+Vary" which is jointly trained, we build a two-stage system (denoted as ``Ours Two-stage'') in which detection and recognition models are trained separately. For fair comparison, the detector in ``Ours Two-stage'' is built by removing the recognition part from model ``Ours Atten+Vary'' and trained only with the detection objective (denoted as ``Ours DetOnly''). As to recognition, we employ CRNN~\cite{ShiBY15} that produces state-of-the-art performance on text recognition. Model ``Ours Two-stage'' firstly adopts ``Ours DetOnly'' to detect text with the same multi-scale inputs. CRNN is then followed to recognize the detected bounding boxes. We can see from Table~\ref{Tab:7} that model ``Ours Two-stage'' performs worse than ``Ours Atten+Vary" on all the evaluated datasets. \begin{figure*}[th] \vspace{-0.0cm} \centering \begin{minipage}[t]{0.7\textwidth} \centering \includegraphics[width=1\textwidth]{figures//allresult.jpg} \end{minipage}\hfill \begin{minipage}[t]{0.28\textwidth} \centering \vspace{-7.4cm} \caption{Examples of text spotting results by ``Ours Atten+Vary''. The first two columns are images from ICDAR$2015$, and the rest are images from SVT. The red bounding boxes are both detected and recognized correctly. The green bounding boxes are missed words, and the yellow dashed bounding boxes are false positives. Note that our recognition network can produce a correct result even if the detected bounding box misses some parts of the word, such as ``INTRODUCTION'' in the $2$nd image of the first row, ``EXTINGUISHER'' in the $1$st image of the last row. That is because our recognition framework learns a language model from the synthetic data. It can infer the word even if some parts are not covered by the bounding box. } \label{fig:examples} \end{minipage} % \end{figure*} Furthermore, we also compare the detection-only performance of these two systems. Note that ``Ours DetOnly'' and the detection part of ``Ours Atten+Vary" share the same architecture, but they are trained with different strategies: ``Ours DetOnly'' is optimized with only the detection loss, while ``Ours Atten+Vary" is trained with a multi-task loss for both detection and recognition. In consistent with the ``End-to-End'' evaluation criterion, a detected bounding box is considered to be correct if its IoU ratio with any ground-truth is greater than $0.5$. The detection results are presented in Table~\ref{Tab:2}. Without any lexicon used, ``Ours Atten+Vary'' produces a detection performance with F-measures of $85.6\%$ on ICDAR$2015$ and $85.1\%$ on ICDAR$2011$, which are averagely $2\%$ higher than those given by ``Ours DetOnly''. This result illustrates that detector performance can be improved via joint training. \begin{table} \ \newcommand{\tabincell}[2]{\begin{tabular}{@{}#1@{}}#2\end{tabular}} \begin{center} \caption{Text detection results on different datasets. Precision (P) and Recall (R) at maximum F-measure (F) are reported in percentage. The jointly trained model (``Ours Atten+Vary") gives better detection results than the one trained with detection loss only (``Ours DetOnly"). } \label{Tab:2} { \scalebox{0.82}{ \begin{tabular}{l|c c c|c c c} \hline \multirow{2}{*}{Method} & \multicolumn{3}{|c}{ICDAR$2015$} & \multicolumn{3}{|c}{ICDAR$2011$} \\ \cline{2-7} & \multicolumn{1}{c}{R} & \multicolumn{1}{c}{P} & \multicolumn{1}{c|}{F} & \multicolumn{1}{c}{R} & \multicolumn{1}{c}{P} & \multicolumn{1}{c}{F} \\ \hline Jaderberg~\etal~\cite{Max2016IJCV} & $68.0$ & $86.7$ & $76.2$ & $69.2$ & $87.5$ & $77.2$ \\ \hline FCRNall+multi-filt~\cite{Gupta16} & $76.4$ & $\textbf{93.8}$ & $84.2$ & $76.9$ & $\textbf{94.3}$ & $84.7$ \\ \hline \tabincell{c}{Ours DetOnly} & $78.5$ & $88.9$ & $83.4$ & $80.0$ & $87.5$ & $83.5$ \\ \hline \tabincell{c}{Ours Atten+Vary} & $\textbf{80.5}$ & $91.4$ & $\textbf{85.6}$ & $\textbf{81.7}$ & $89.2$ & $\textbf{85.1}$ \\ \hline \end{tabular} } } \end{center} \vspace{-0.5cm} \end{table} \subsection{Comparison with Other Methods} In this part, we compare the text spotting results of ``Ours Atten+Vary'' with other state-of-the-art approaches. As shown in Table~\ref{Tab:7}, ``Ours Atten+Vary'' outperforms all compared methods on most of the evaluated datasets. In particular, our method shows an significant superiority when using a generic lexicon. It leads to a $1.5\%$ higher recall on average than the state-of-the-art TextBoxes~\cite{LiaoAAAi2017}, using only $3$ input scales compared with $5$ scales used by TextBoxes. Several text spotting examples are presented in Figure~\ref{fig:examples}, which demonstrate that model ``Ours Atten+Vary'' is capable of dealing with words of different aspect ratios and orientations. In addition, our system is able to recognize words even if their bounding boxes do not cover the whole words, as it potentially learned a character-level language model from the synthetic data. \subsection{Speed} Using an M40 GPU, model ``Ours Atten+Vary'' takes approximately $0.9s$ to process an input image of $600 \times 800$ pixels. It takes nearly $0.45s$ to compute the convolutional features, $0.02s$ for text proposal calculation, $0.25s$ for RoI encoding, $0.01s$ for text detection and $0.15s$ for word recognition. On the other hand, model ``Ours Two-stage'' spends around $0.45s$ for word recognition on the same detected bounding boxes, as it needs to crop the word patches, and re-calculate the convolutional features during recognition. \section{Conclusion} \label{SEC:Con} In this paper we presented a unified end-to-end trainable DNN for simultaneous text detection and recognition in natural scene images. A novel RoI encoding method was proposed, considering the large diversity of aspect ratios of word bounding boxes. With this framework, scene text can be detected and recognized in a single forward pass efficiently and accurately. Experimental results illustrate that the proposed method can produce impressive performance on standard benchmarks. One of potential future works is on handling images with multi-oriented text. \input supplementary.tex \clearpage {\small \bibliographystyle{ieee} \section{Appendix} \subsection{Training Data with Different Levels of Complexity} \label{sec:Learning} In this paper, we design a curriculum learning~\cite{Bengio2009} paradigm to train the model from gradually more complex data. Here, we would like to give a detailed introduction to the used training data. Firstly, we generate $48$k images containing words in the ``Generic'' lexicon~\cite{Max2016IJCV} of size $90$k by using the synthetic engine proposed in~\cite{Gupta16}. The words are randomly placed on simple {\em pure colour backgrounds}, as shown in Figure~\ref{fig:painimg}. Note that these $48$k images contain a comprehensive word vocabulary, so a character-level language model can be learned by Text Recognition Network (TRN). Next, the ``Synth800k"~\cite{Gupta16} dataset is used to further tune the model, which contains $800$k images created via blending rendered words into real natural scenes, as presented in Figure~\ref{fig:synimg}. These images have more complex background, so that the model will be further fine-tuned to handle complicated appearance patterns. Finally, we use $2044$ {\em real-world} images to fine-tune our model. % They are naturally captured images explicitly focusing around the text of interest, as shown in Figure~\ref{fig:realimg}. % \begin{figure}[h] \begin{center} \includegraphics[width=0.45\textwidth]{figures//painIImg.png} \end{center} % \caption{Synthetic images with words randomly placed on simple pure colour backgrounds. These images are used to pre-train our model. % } \label{fig:painimg} % \end{figure} \begin{figure}[h] \begin{center} \includegraphics[width=0.45\textwidth]{figures//synImg.png} \end{center} % \caption{Synthetic images from~\cite{Gupta16}, which are created via blending rendered words into real natural scene images. The background is more complex than that of images in Figure~\ref{fig:painimg}. % } \label{fig:synimg} % \end{figure} \begin{figure}[h] \begin{center} \includegraphics[width=0.45\textwidth]{figures//realimg.png} \end{center} \caption{The real-world images captured from natural scene, with the $1$st, $2$nd and $3$rd columns corresponding to images from datasets ICDAR2015, SVT and AddF2k respectively. % } \label{fig:realimg} \end{figure} \subsection{Varying-size Pooling vs. Fixed-size Pooling} \label{sec:pooling} In this work, we propose a new method for encoding an image region of variable size into a fixed-length representation. Unlike the conventional method~\cite{RGB2015ICCV, renNIPS15fasterrcnn}, where each Region-of-Interest (RoI) is pooled into a fixed-size feature map, we pool RoIs according to their aspect ratios. Here we present more experimental results in Figure~\ref{fig:att1} to verify the effectiveness of our proposed encoding method. Compared to fixed-size pooling, our method (varying-size pooling) divide image regions for long words into more parts ($35$ versus $20$), such that information for every character is reserved. \begin{figure}[h] \begin{center} \subfigure[]{ \includegraphics[width=0.45\textwidth]{figures//attention1.jpg} } \subfigure[]{ \includegraphics[width=0.45\textwidth]{figures//attention2.jpg} } \end{center} \caption{ Attention based decoding process of ``Ours Atten+Vary'' and ``Ours Atten+Fixed''. The heat maps demonstrate the attention weights at each time step of RNN encoding.} \label{fig:att1} \end{figure} \subsection{Additional Text Spotting Results} \label{sec:res} Here we present more test results by our proposed model, as shown in Figure~\ref{fig:res}. \begin{figure*} \begin{center} \subfigure[Results on ICDAR$2015$ Images]{ \includegraphics[width=0.9\textwidth]{figures//supRes12.jpg} } \subfigure[Results on SVT Images]{ \includegraphics[width=0.9\textwidth]{figures//supRes22.jpg} } \end{center} \caption{Text spotting results on different datasets, produced by our proposed model ``Ours Atten+Vary''.} \label{fig:res} % \end{figure*}
\section{Introduction} \section{Introduction} Although research in cone complementarity problems (see the definition in the beginning of the Preliminaries) goes back a few decades only, the underlying concept of complementarity is much older, being firstly introduced by Karush in 1939\cite{karush1939minima}. It seems that the concept of complementarity problems was first considered by Dantzig and Cottle in a technical report \cite{dantzig1963positive}, for the non-negative orthant. In 1968, Cottle and Dantzig\cite{cottle1968complementary} restated the linear programming problem, the quadratic programming problem and the bimatrix game problem as a complementarity problem, which inspired the research in this field (see \cite{mangasarian1976linear, garcia1973some, borwein1989linear,alizadeh2003second,FacchineiPang2003}). The complementarity problem is a cross-cutting area of research which has a wide range of applications in economics, finance and other fields. Earlier works in cone complementarity problems present the theory for a general cone and the practical applications merely for the non-negative orthant only (similarly to the books \cite{FacchineiPang2003, MR2503647}). These are related to equilibrium in economics, engineering, physics, finance and traffic. Examples in economics are Walrasian price equilibrium models, price oligopoly models, Nash-Cournot production/distribution models, models of invariant capital stock, Markov perfect equilibria, models of decentralised economy and perfect competition equilibrium, models with individual markets of production factors. Engineering and physics applications are frictional contact problems, elastoplastic structural analysis and nonlinear obstacle problems. An example in finance is the discretisation of the differential complementarity formulation of the Black-Scholes models for the American options \cite{jaillet1990variational}. An application to congested traffic networks is the prediction of steady-state traffic flows. In the recent years several applications have emerged where the complementarity problems are defined by cones essentially different from the non-negative orthant such as positive semidefinite cones, second order cones and direct product of these cones (for mixed complementarity problems containing linear subspaces as well). Recent applications of second order cone complementarity problems are in elastoplasticity \cite{MR2925039,MR3010551}, robust game theory \cite{MR2568432,MR2522815} and robotics \cite{MR2377478}. All these applications come from the Karush-Kuhn-Tucker conditions of second order conic optimization problems. N\'emeth and Zhang extended the concept of second order cone in \cite{nemeth2015extended} to the extended second order cone. Their extension seems the most natural extension of second order cones. Sznajder showed that the extended second order cones in \cite{nemeth2015extended} are irreducible cones (i.e., they cannot be written as a direct product of simpler cones) and calculated the Lyapunov rank of these cones \cite{RS2016}. The applications of second order cones and the elegant way of extending them suggest that the extended second order cones will be important from both theoretical and practical point of view. Although conic optimization problems with respect to extended second order cones can be reformulated as conic optimization problems with respect to second order cones, we expect that for several such problems using the particular inner structure of the second order cones provides a more efficient way of solving them than solving the transformed conic optimization problem with respect to second order cones. Indeed, such a particular problem is the projection onto an extended second order cone which is much easier to solve directly than solving the reformulated second order conic optimization problem \cite{FN2016}. Until now the extended second order cones of N\'emeth and Zhang were used as a working tool only for finding the solutions of mixed complementarity problems on general cones \cite{nemeth2015extended} and variational inequalities for cylinders whose base is a general convex set \cite{NZ2016a}. The applications above for second order cones show the importance of these cones and motivates considering conic optimization and complementarity problems on extended second order cones. As another motivation we suggest the application to mean variance portfolio optimization problems \cite{markowitz1952portfolio,roy1952safety} described in Section 3. The paper is structured as follows: In Section 2, we illustrate the main terminology and definitions used in this paper. In Section 3 we present an application of extended second order cones to portfolio optimization problems. In Section 4, we introduce the notion of mixed implicit complementarity problem as an implicit complementarity problem on the direct product of a cone and a Euclidean space. In Section 5, we reformulate the linear complementarity problem as a mixed (implicit, mixed implicit) complementarity problem on the non-negative orthant (MixCP). Our main result is Theorem \ref{Main_thm}, which discusses the connections between an ESOCLCP and mixed (implicit, mixed implicit) complementarity problems. In particular, under some mild conditions, given the definition of Fischer-Burmeister (FB) regularity and of the stationarity of a point, we prove in Theorem \ref{SP} that a point can be the solution of a mixed complementarity problem if it satisfies specific conditions related to FB regularity and stationarity (Theorem \ref{SP}). This theorem can be used to determine whether a point is a solution of a mixed complementarity problem converted from ESOCLCP. In Section 6, we use Newton's method and Levenberg-Marquardt algorithm to find the solution for the aforementioned MixCP. In Section 7, we provide an example of a linear complementarity problem on an extended second order cone. Based on the above, we convert this linear complementarity problem into a mixed complementarity problem on the non-negative orthant, and use the aforementioned algorithms to solve it. A solution of this mixed complementarity problem will provide a solution of the corresponding ESOCLCP. As a first step, in this paper, we study the linear complementarity problems on extended second order cones (ESOCLCP). We find that an ESOCLCP can be transformed to a mixed (implicit, mixed implicit) complementarity problem on the non-negative orthant. We will give the conditions for which a point is a solution of the reformulated MixCP problem, and in this way we provide conditions for a point to be a solution of ESOCLCP. \section{Preliminaries} Let $m$ be a positive integer and $F:\R^m\to\R^m$ be a mapping and $y=F(x)$. The definition of the classical complementary problem \cite{FacchineiPangI2003} \begin{equation*} x \geq 0,\quad y\geq 0, \quad and \quad \langle x, y \rangle = 0, \end{equation*} where $\ge$ denotes the componentwise order induced by the non-negative orthant and $\lng\cdot,\cdot\rng$ is the canonical scalar product in $\R^m$, was later extended to more general cones $K$, as follows: \begin{equation*} x\in K,\quad y\in K^*, \quad and \quad \langle x, y \rangle = 0, \end{equation*} where $K^*$ is the dual of $K$ \cite{MR0321540}. Let $k,\ell,\hat\ell$ be non-negative integers such that $m=k+\ell$. Recall the definitions of the mutually dual extended second order cone $L(k,\ell)$ and $M(k,\ell)$ in $\mathbb{R}^m\equiv\R^k\times\R^\ell$: \begin{equation}\label{elc} L(k,\ell) = \{(x,u) \in \mathbb{R}^k\times \mathbb{R}^\ell : x \geq \|u\|e\}, \end{equation} \begin{equation}\label{delc} M(k,\ell) = \{(x,u) \in \mathbb{R}^k\times \mathbb{R}^\ell : e\tp x\geq \|u\|,x\ge0\}, \end{equation} where $e=(1, \dots, 1)\tp \in \mathbb{R}^k $. If there is no ambiguity about the dimensions, then we simply denote $L(k,\ell)$ and $M(k,\ell)$ by $L$ and $M$, respectively. Denote by $\lng\cdot,\cdot\rng$ the canonical scalar product in $\R^m$ and by $\|\cdot\|$ the corresponding Euclidean norm. The notation $x\perp y$ means that $\lng x,y\rng=0$, where $x,y\in\R^m$. Let $K\subset\R^m$ be a nonempty closed convex cone and $K^*$ its dual. \begin{definition} The set \[\C(K):=\left\{(x,y)\in K\times K^*:x\perp y\right\}\] is called the \emph{complementarity set} of $K$. \end{definition} \begin{definition}\label{cp-def} Let $F:\R^m\to\R^m$. Then, the complementarity problem $\CP(F,K)$ is defined by: \begin{equation}\label{cp-eq} \CP(F,K):\textrm{ }(x,F(x))\in\C(K). \end{equation} The solution set of $\CP(F,K)$ is denoted by $\SCP(F,K)$: \begin{equation*} \SCP(F,K) = \{x\in \R^m: (x, F(x)) \in \C(K)\}. \end{equation*} If $T$ is a matrix, $r\in\R^m$ and $F$ is defined by $F(x)=Tx+r$, then $\CP(F,K)$ is denoted by $\LCP(T,r,K)$ and is called \emph{linear complementarity problem}. The solution set of $\LCP(T,r,K)$ is denoted by $\SLCP(T,r,K)$. \end{definition} \begin{definition}\label{icp-def} Let $G,F:\R^m\to\R^m$. Then, the implicit complementarity problem $\ICP(F,G,K)$ is defined by \begin{equation}\label{icp-eq} \ICP(F,G,K):\textrm{ }(G(x),F(x))\in\C(K). \end{equation} The solution set of $\ICP(F,G,K)$ is denoted by $\SICP(F,G,K)$: \begin{equation*} \SICP(F,G,K) = \{x\in \R^m: (G(x), F(x)) \in \C(K)\}. \end{equation*} \end{definition} Let $m,k,\ell$ be non-negative integers such that $m=k+\ell$, $\Lambda\in\R^k$ be a nonempty closed convex cone and $K=\Lambda\times\R^\ell$. Denote by $\Lambda^*$ the dual of $\Lambda$ in $\R^k$ and by $K^*$ the dual of $K$ in $\R^k\times\R^\ell$. It is easy to check that $K^*=\Lambda^*\times\{0\}$. \begin{definition}\label{mixcp-def} Consider the mappings $F_1:\R^k\times\R^\ell\to \R^k$ and $F_2:\R^k\times\R^\ell\to \R^{\hat\ell}$. The mixed complementarity problem $\MixCP(F_1,F_2,\Lambda)$ is defined by \begin{gather}\label{mixcp-eq} \MixCP(F_1,F_2,\Lambda):\left\{ \begin{array}{l} F_2(x,u)=0\\\\ (x,F_1(x,u))\in\C(\Lambda). \end{array} \right. \end{gather} The solution set of $\MixCP(F_1,F_2,\Lambda)$ is denoted by $\SMixCP(F_1,F_2,\Lambda)$: \begin{align*} \SMixCP(F_1,F_2,\Lambda) =\{x\in \R^m: F_2(x,u)=0,(x, F_1(x,u)) \in \C(\Lambda)\}. \end{align*} \end{definition} \begin{definition}\label{s0_matrix} \textrm{\cite[Definition 3.7.29]{FacchineiPang2003}} A matrix $\Pi \in \R^{n\times n}$ is said to be an $S_0$ matrix if the system of linear inequalities \begin{equation*} \Pi x \ge 0,\quad 0\ne x\ge 0 \end{equation*} has a solution. \end{definition} The proof of our next result follows immediately from $K^*= \Lambda^*\times\{0\}$ and the definitions of $\CP(F,K)$ and $\MixCP(F_1,F_2,\Lambda)$. \begin{proposition} Consider the mappings \[F_1:\R^k\times\R^\ell\to \R^k,\quad F_2:\R^k\times\R^\ell\to \R^\ell.\] Define the mapping \[F:\R^k\times\R^\ell\to\R^k\times\R^\ell\] by \[F(x,u)=(F_1(x,u),F_2(x,u)).\] Then, \[(x,u)\in\SCP(F,K)\iff (x,u)\in\SMixCP(F_1,F_2,\Lambda).\] \end{proposition} \begin{definition}\label{Schur_comp}\textrm{\cite[Schur complement]{zhang2006schur}} The notation of the Schur complement for a matrix $\Pi=\left(\begin{smallmatrix} P & Q\\R & S\end{smallmatrix}\right)$, with $P$ nonsingular, is \begin{equation*} \left( \Pi/P \right) = S - RP^{-1}Q. \end{equation*} \end{definition} \begin{definition}\label{Lipschitz}\textrm{\cite[Definition 4.6.2]{sohrab2003basic}} \item[(i)]Let $I$ be an open subset with $ I \subset \R^m$ and $ f: I \rightarrow \R^m$. We say that $f$ is Lipschitz function, if there is a constant $\lambda >0$ such that \begin{equation} \| f(x) - f(x') \| \le \lambda\|x - x'\| \quad \forall x, x' \in I. \end{equation} \item[(ii)] We say that $f$ is locally Lipschitz if for every $ x \in I$, there exists $ \varepsilon > 0 $ such that $f$ is Lipschitz on $I\cap B_{\varepsilon}(x)$, where $B_{\varepsilon}(x)=\{y\in\R^m:\|y-x\|\le\varepsilon\}$. \end{definition} \section{An Application of Extended Second Order Cones to Portfolio Optimisation Problems} Consider the following Portfolio Optimisation Problem: \[ \min_{w}\lf\{w^{\top}\Sigma w:\textrm{ }r^{\top}w \ge R,\textrm{ }e\tp w=1\rg\}, \] where $\Sigma\in\mathbb R^{n\times n}$ is the covariance matrix, $e=(1, \dots, 1)^{\top} \in \mathbb{R}^n$, $w\in\R^n$ is the weight of asset allocation for the portfolio and $R$ is the required return of the portfolio. In order to guarantee the diversified allocation of the fund into different assets in the market, a new constraint can be reasonably introduced: \(\|w\| \le \xi,\) where $ \xi$ is the limitation of the concentration of the fund allocation. If short selling is allowed, then $w$ can be less than zero. The introduction of this constraint can guarantee that the fund will be allocated into few assets only. Since the covariance matrix $\Sigma$ can be decomposed into $\Sigma = U^{\top}U$, the problem can be rewritten as \[ \min_{w,\xi,y}\lf\{y:\textrm{ }r^{\top}w \ge R,\textrm{ }\|Uw\|\le y,\textrm{ }\|w\| \le \xi,\textrm{ }e\tp w = 1\rg\}. \] The constraint $\|Uw\|\le y$ is a relaxation of the constraint $\|U\|\|w\|\le y$, where $\|U\|=\max_{\|x\|\le 1}{\|Ux\|}$. The strengthened problem will become: \[ \min_{w,\xi,y}\lf\{y:\textrm{ }r^{\top}w \ge R,\textrm{ }\|w\|e \le \left(\xi, \dfrac{y}{\|U\|}\right)^{\top},\textrm{ }e\tp w=1\rg\}. \] The minimal value of the objective of the original problem is at most as large as the minimal value of the objective for this latter problem. The second constraint of the latter portfolio optimisation problem means that the point \(\left(\xi, y/\|U\|,w\right)^{\top}\) belongs to the extended second order cone $L(2,n)$. Hence, the strenghtened problem is a conic optimisation problem with respect to an extended second order cone. \section{Mixed Implicit Complementarity Problems} Let $m,k,\ell,\hat\ell$ be non-negative integers such that $m=k+\ell$, $\Lambda\in\R^k$ be a nonempty, closed, convex cone and $K=\Lambda\times\R^\ell$. Denote by $\Lambda^*$ the dual of $\Lambda$ in $\R^k$ and by $K^*$ the dual of $K$ in $\R^k\times\R^\ell$. \begin{definition}\label{mixicp-def} Consider the mappings \[F_1,G_1:\R^k\times\R^\ell\to \R^k,\quad F_2:\R^k\times\R^\ell\to \R^{\hat\ell}.\] The mixed implicit complementarity problem $\MixICP(F_1,F_2,G_1,\Lambda)$ is defined by \begin{gather}\label{mixicp-eq} \MixICP(F_1,F_2,G_1,\Lambda):\left\{ \begin{array}{l} F_2(x,u)=0\\\\ (G_1(x,u),F_1(x,u))\in\C(\Lambda). \end{array} \right. \end{gather} The solution set of the mixed complementarity problem $\MixICP(F_1,F_2,G_1,\Lambda)$ is denoted by $\SMixICP(F_1,F_2,G_1,\Lambda)$: \begin{align*} \SMixICP&( F_1,F_2,G_1,\Lambda) = \\ &\{x\in \R^m: F_2(x,u)=0,(G_1(x,u), F_1(x,u)) \in \C(\Lambda)\}. \end{align*} \end{definition} The proof of our next result follows immediately from $K^*=\Lambda^*\times \{0\}$ and the definitions of $\ICP(F,G,K)$ and $\MixICP(F_1,F_2,G_1,\Lambda)$. \begin{proposition} Consider the mappings \(F_1,G_1:\R^k\times\R^\ell\to \R^k,\) \(F_2,G_2:\R^k\times\R^\ell\to \R^\ell.\) Define the mappings \(F,G:\R^k\times\R^\ell\to\R^k\times\R^\ell\) by \(F(x,u)=(F_1(x,u),F_2(x,u)),\) \(G(x,u)=(G_1(x,u),G_2(x,u)),\) respectively. Then, \[(x,u)\in\SICP(F,G,K)\iff (x,u)\in\SMixICP(F_1,F_2,G_1,\Lambda).\] \end{proposition} \section{Main Results} The linear complementarity problem is the dual problem of a quadratic optimisation problem, which has a wide range of applications in various areas. One of the most famous application is the portfolio optimisation problem first introduced by Markowitz \cite{markowitz1952portfolio}; see the application of the extended second order cone to this problem presented in the Introduction. \begin{proposition}\label{cs-esoc-prop} Let $x,y\in\R^k$ and $u,v\in\R^\ell\setminus\{0\}$. \begin{enumerate} \item[(i)] $(x,0,y,v)\in\C(L)$ if and only if $e\tp y\ge\|v\|$ and $(x,y)\in\C(\R^k_+)$. \item[(ii)] $(x,u,y,0)\in\C(L)$ if and only if $x\ge\|u\|$ and $(x,y)\in\C(\R^k_+)$. \item[(iii)] $(x,u,y,v):=((x,u),(y,v))\in\C(L)$ if and only if there exists a $\lambda>0$ such that $v=-\lambda u$, $e\tp y=\|v\|$ and $(x-\|u\|e,y)\in C(\R^k_+)$. \end{enumerate} \end{proposition} \begin{proof} Items (i) and (ii) are easy consequence of the definitions of $L$, $M$ and the complementarity set of a nonempty closed convex cone. \vspace{2mm} Item (iii) follows from Proposition 1 of \cite{FN2016}. For the sake of completeness, we will reproduce its proof here. First assume that there exists $\lambda>0$ such that $v=-\lambda u$, $e\tp y=\|v\|$ and $(x-\|u\|e,y)\in C(\R^p_+)$. Thus, $(x,u)\in L$ and $(y,v)\in M$. On the other hand, \[\lng (x,u),(y,v)\rng=x\tp y+u\tp v=\|u\|e\tp y-\lambda\|u\|^2=\|u\|\|v\|-\lambda\|u\|^2=0.\] Thus, $(x,u,y,v)\in C(L)$. Conversely, if $(x,u,y,v)\in C(L)$, then $(x,u)\in L$, $(y,v)\in M$ and \[0=\lng (x,u),(y,v)\rng=x\tp y+u\tp v\ge\|u\|e\tp y+ u\tp v\ge\|u\|\|v\|+u\tp v\ge0.\] This implies the existence of a $\lambda>0$ such that $v=-\lambda u$, $e\tp y=\|v\|$ and $(x-\|u\|e)\tp y=0$. It follows that $(x-\|u\|e,y)\in C(\R^p_+)$. \end{proof} \begin{theorem}\label{Main_thm} Denote $z=(x,u)$, $\hat z=(x-\|u\|,u)$, $\tilde{z}=(x-t,u,t)$ and $r=(p,q)$ with $x,p\in\R^k$, $u,q\in\R^\ell$ and $t\in \R$. Let $T=\bs A & B\\C & D \es$ with $A\in\R^{k\times k}$, $B\in\R^{k\times\ell}$, $C\in\R^{\ell\times k}$ and $D\in\R^{\ell\times\ell}$. The square matrices $T$, $A$ and $D$ are assumed to be nonsingular. \begin{enumerate} \item[(i)] Suppose $u=0$. We have \begin{align*} z\in\SLCP&(T,r,L) \\&\iff x\in\SLCP(A,p,\R^k_+)\mbox{ and }e\tp(Ax+p)\ge\|Cx+q\|. \end{align*} \item[(ii)] Suppose $Cx+Du+q=0$. Then, \[z\in\SLCP(T,r,L)\iff z\in\SMixCP(F_1,F_2,\R^k_+) \mbox{ and }x\ge\|u\|,\] where $F_1(x,u)=Ax+Bu+p$ and $F_2(x,u)=0$. \item[(iii)] Suppose $u\ne 0$ and $Cx+Du+q\ne 0$. We have \[z\in\SLCP(T,r,L)\iff z\in\SMixICP(F_1,F_2,G_1,\R^k_+),\] where \[F_2(x,u)=\lf(\|u\|C+ue\tp A\rg)x+ue\tp(Bu+p)+\|u\|(Du+q),\] $G_1(x,u)=x-\|u\|e$ and $F_1(x,u)=Ax+Bu+p$. \item[(iv)] Suppose $u\ne 0$ and $Cx+Du+q\ne 0$. We have \[z\in\SLCP(T,r,L)\iff \hat z\in\SMixCP(F_1,F_2,\R^k_+),\] where \[F_2(x,u)=\lf(\|u\|C+ue\tp A\rg)(x+\|u\|e)+ue\tp(Bu+p)+\|u\|(Du+q)\] and $F_1(x,u)=A(x+\|u\|e)+Bu+p$. \item[(v)] Suppose $u\ne 0$, $Cx+Du+q\ne 0$ and $\|u\|C+u\tp e A$ is a nonsingular matrix. We have \[z\in\SLCP(T,r,L)\iff \hat z\in\SICP(F_1,F_2,\R^k_+),\] where \[F_1(u)=A\lf(\lf(\|u\|C+ue\tp A\rg)^{-1}\lf(ue\tp(Bu+p)+\|u\|(Du+q)\rg)\rg)+Bu+p\] and \[F_2(u)=\lf(\|u\|C+ue\tp A\rg)^{-1}\lf(ue\tp(Bu+p)+\|u\|(Du+q)\rg).\] \item[(vi)] Suppose $u\ne 0$, $Cx+Du+q\ne 0$. We have \[z\in\SLCP(T,r,L)\iff \exists t>0\] such that \[\tilde{z}\in\MixCP(\widetilde{F}_1,\widetilde{F}_2,\R^k_+),\] where \[\widetilde{F}_1(x,u,t)=A(x+te)+Bu+p\] and \begin{equation}\label{mathcal_F} \widetilde{F}_2(x,u,t) = \begin{pmatrix} & \lf(tC+ue\tp A\rg)(x+te)+ue\tp(Bu+p)+t(Du+q) \\ & t^2 - \|u\|^2 \end{pmatrix}. \end{equation} \end{enumerate} \end{theorem} \begin{proof} \begin{enumerate} \item[(i)] We have that $z\in\SLCP(T,r,L)$ is equivalent to $(x,0,Ax+p,Cx+q)\in\C(L)$ or, by item (i) of Proposition \ref{cs-esoc-prop}, to $(x,Ax+p)\in\C(\R^k_+)$ and $e\tp(Ax+p)\ge\|Cx+q\|$. \item[(ii)] We have that $z\in\SLCP(T,r,L)$ is equivalent to $(x,u,Ax+Bu+p,0)\in\C(L)$ or, by item (ii) of Proposition \ref{cs-esoc-prop}, to $(x,Ax+Bu+p)\in\C(\R^k_+)$ and $x\ge\|u\|$, or to \[z\in\SMixCP(F_1,F_2,\R^k_+)\mbox{ and }x\ge\|u\|,\] where $F_1(x,u)=Ax+Bu+p$ and $F_2(x,u)=0$. \item[(iii)] Suppose that $z\in\SLCP(T,r,L)$. Then, $(x,u,y,v)\in\C(L)$, where $y=Ax+Bu+p$ and $v=Cx+Du+q$. Then, by item (iii) of Proposition \ref{cs-esoc-prop}, we have that $\exists\lambda>0$ such that \begin{equation}\label{parall-eq} Cx+Du+q=v=-\lambda u, \end{equation} \begin{equation}\label{prod-eq} e\tp (Ax+Bu+p)=e\tp y=\|v\|=\|Cx+Du+q\|=\lambda\|u\|, \end{equation} \begin{equation}\label{cpset-eq} (G_1(x,u),F_1(x,u))=(x-\|u\|e,Ax+Bu+p)=(x-\|u\|e,y)\in\C(\R^k_+). \end{equation} From equation \eqref{parall-eq} we obtain $\|u\|(Cx+Du+q)=-\lambda\|u\| u$, which by equation \eqref{prod-eq} implies $\|u\|(Cx+Du+q)=-ue\tp (Ax+Bu+p)$, which after some algebra gives \begin{equation}\label{zero-eq} F_2(x,u)=0. \end{equation} From equations \eqref{cpset-eq} and \eqref{zero-eq} we obtain that $z\in\SMixICP(F_1,F_2,G_1)$. \medskip Conversely, suppose that $z\in\SMixICP(F_1,F_2,G_1)$. Then, \begin{equation}\label{zero-eq2} \|u\|v+ue\tp y=\|u\|(Cx+Du+q)+ue\tp (Ax+Bu+p)=F_2(x,u)=0 \end{equation} and \begin{equation}\label{cpset-eq2} (x-\|u\|e,y)=(x-\|u\|e,Ax+Bu+p)=(G_1(x,u),F_1(x,u))\in\C(\R^k_+), \end{equation} where $v=Cx+Du+q$ and $y=Ax+Bu+p$. Equations \eqref{cpset-eq2} and \eqref{zero-eq2} imply \begin{equation}\label{parall-eq2} v=-\lambda u, \end{equation} where \begin{equation}\label{lambda-eq} \lambda=(e\tp y)/\|u\|>0. \end{equation} Equations \eqref{parall-eq2} and \eqref{lambda-eq} imply \begin{equation}\label{norm-v-eq} e\tp y=\|v\|. \end{equation} By item (iii) of Proposition \ref{cs-esoc-prop}, equations \eqref{parall-eq2}, \eqref{norm-v-eq} and \eqref{cpset-eq2} imply \[(x,y,u,v)\in C(L)\] and therefore $z\in\SLCP(T,r,L)$. \item[(iv)] It is a simple reformulation of item (iii) by using the change of variables \[(x,u)\mapsto (x-\|u\|e,u).\] \item[(v)] Again it is a simple reformulation of item (iv) by using that $\|u\|C+u\tp e A$ is a nonsingular matrix. \item[(vi)] Suppose that $z\in\SLCP(T,r,L)$. Then, $(x,u,y,v)\in\C(L)$, where $y=Ax+Bu+p$ and $v=Cx+Du+q$. Let $t = \|u\|$, Then, by item (iii) of Proposition \ref{cs-esoc-prop}, we have that $\exists\lambda>0$ such that \begin{equation}\label{parall-eq3} Cx+Du+q=v=-\lambda u, \end{equation} \begin{equation}\label{prod-eq3} e\tp (Ax+Bu+p)=e\tp y=\|v\|=\|Cx+Du+q\|=\lambda t, \end{equation} \begin{equation}\label{cpset-eq3} (\tilde{z},\widetilde{F}_1(x,u,t))=(x-te,Ax+Bu+p)=(x-te,y)\in\C(\R^k_+), \end{equation} where $\tilde{z} = (x-t,u,t)$. From equation \eqref{parall-eq3}, we get $t(Cx+Du+q)=-t \lambda u$, which, by equation \eqref{prod-eq3}, implies $t(Cx+Du+q)=-ue\tp (Ax+Bu+p)$, which after some algebra gives \begin{equation}\label{zero-eq3} \widetilde{F}_2(x,u,t)=0. \end{equation} From equations \eqref{cpset-eq3} and \eqref{zero-eq3} we obtain that $z\in\SMixCP(\widetilde{F}_1,\widetilde{F}_2,\R^k_+)$. \medskip \end{enumerate} $\,$ \end{proof} Note that the item(vi) makes $\widetilde{F}_1(x,u,t)$ and $\widetilde{F}_2(x,u,t)$ become smooth functions by adding the variable $t$. The smooth functions therefore make the smooth Newton's method applicable to the mixed complementarity problem. The conversion of $\LCP$ on extended second order cones to a $\MixCP$ problem defined on the non-negative orthant is useful, because it can be studied by using the Fischer-Burmeister function. In order to ensure the existence of the solution of $\MixCP$, we introduce the scalar \emph{Fischer-Burmeister C-function} (see \cite{fischer1992special, fischer1995newton}). \begin{equation*} \psi_{FB}(a,b) = \sqrt{a^2+b^2} - (a+b) \quad \forall (a,b) \in \mathbb{R}^2. \end{equation*} Obviously, $\psi_{FB}^2(a,b)$ is a continuously differentiable function on $\mathbb{R}^2$. The equivalent FB-based equation formulation for the $\MixCP$ problem is: \begin{equation}\label{FBform} 0= \mathbb{F}^{\MixCP}_{FB}(x,u,t) = \begin{pmatrix} \psi(x_1,\widetilde{F}_1^1(x,u,t)) \\ \vdots \\ \psi(x_k,\widetilde{F}_1^k(x,u,t)) \\ \widetilde{F}_2(x,u,t) \end{pmatrix}, \end{equation} with the associated merit function: \begin{equation*} \theta^{\MixCP}_{FB}(x,u,t)=\frac{1}{2}\mathbb{F}^{\MixCP}_{FB}(x,u,t)^T \mathbb{F}^{\MixCP}_{FB}(x,u,t). \end{equation*} We continue by calculating the Jacobian matrix for the associated merit function. If $i \in (1,...,k)$ is such that $(z_i,\widetilde{F}_1^i) \neq (0,0)$, then the differential with respect to $z = (x,u,t)\in \R^{m+1}$ is \begin{align*} \frac{\partial\left(\mathbb{F}^{\MixCP}_{FB}\right)_i}{\partial z} = \left(\frac{x_i}{\sqrt{x_i^2+\left(\widetilde{F}_1^i(x,u,t)\right)^2}}-1\right)e^i &\\ +\left(\frac{\widetilde{F}_1^i(x,u,t)}{\sqrt{x_i^2+\left(\widetilde{F}_1^i(x,u,t)\right)^2}}-1\right) & \frac{\partial\widetilde{F}_1^i(x,u,t)}{\partial z}, \end{align*} where $e^i$ denotes the $i$-th canonical unit vector. The differential with respect to $z_j$ with $j\neq i$ is \begin{equation*} \frac{\partial\left(\mathbb{F}^{\MixCP}_{FB}\right)_i}{\partial z_j} = \left(\frac{\widetilde{F}_1^i(x,u,t)}{\sqrt{x_i^2+\left(\widetilde{F}_1^i(x,u,t)\right)^2}}-1\right)\frac{\partial\widetilde{F}_1^i(x,u,t)}{\partial z_j}, \end{equation*} Obviously, the differential with respect to $z_j$ with $j > k$, is equal to zero. Note that if $(z_i,\widetilde{F}_1^i) = (0,0)$, then $\frac{\partial\left(\mathbb{F}^{\MixCP}_{FB}\right)_i}{\partial z}$ will be a generalised gradient of a composite function, i.e., a closed unit ball $B(0,1)$. However, this case will not occur in our paper. As for the term $\widetilde{F}_2(x,u,t)$ with $i \in ( k+1,...m+1)$, the Jacobian matrix is much more simple, since \begin{equation*} \frac{\partial\left(\mathbb{F}^{\MixCP}_{FB}\right)_i}{\partial z}= \frac{\partial\widetilde{F}_2^i(x,u,t)}{\partial z}. \end{equation*} Therefore, the Jacobian matrix for the associated merit function is: \begin{equation*} \mathcal{A} = \begin{pmatrix} D_a+D_bJ_x\widetilde{F}_1(x,u,t) &&&&& D_bJ_{(u,t)}\widetilde{F}_1(x,u,t)\\ J_x\widetilde{F}_2(x,u,t) &&&&& J_{(u,t)}\widetilde{F}_2(x,u,t) \end{pmatrix}, \end{equation*} where \begin{align*} &D_a= \diag \begin{pmatrix} \frac{x_i}{\sqrt{x_i^2 + \widetilde{F}_1^i(x,u,t)^2}} - 1 \end{pmatrix}, \qquad D_b=\diag \begin{pmatrix} \frac{\widetilde{F}_1^i(x,u,t)}{\sqrt{x_i^2 + \widetilde{F}_1^i(x,u,t)^2}} - 1 \end{pmatrix},\\ & i=1, \dots , k. \end{align*} Define the following index sets: \begin{equation*} \begin{array}{lcl} \C \equiv \lf\{i: x_i \ge 0, \widetilde{F}_1^i\ge 0, x_i \widetilde{F}_1^i(x,u,t) = 0\rg\} & & complementarity\;index \\ \mathcal{R} \equiv \lf\{1, \dots, k\rg\}\setminus \C & & residual\;index \\ \mathcal{P} \equiv \lf\{i\in \mathbb{R} : x_i > 0 , \widetilde{F}_1^i(x,u,t) > 0\rg\} & & positive\;index \\ \mathcal{N} \equiv \mathcal{R}\setminus\mathcal{P} & & negative\;index \\ \end{array} \end{equation*} \begin{definition}\label{FB_regular} A point $(x,u,t) \in \R^{m+1} $ is called FB-regular for the merit function $ \theta^{\MixCP}_{FB}$ (or for the $ \MixCP\left( \widetilde{F}_1,\widetilde{F}_2,\R^k_+ \right)$) if its partial Jacobian matrix of $ \mathbb{F}^{\MixCP}_{FB}(x,u,t) $ with respect to x, $ J_x\widetilde{F}_1(x,u,t) $ is nonsingular and if for $\forall w \in \R^k, w\neq 0 $ with \begin{equation*} w_{\C}=0, \quad w_{\mathcal{P}}>0, \quad w_{\mathcal{N}}<0, \end{equation*} there exists a nonzero vector $ v \in \R^k $ such that \begin{equation}\label{z_ineq} v_{\C}=0, \quad v_{\mathcal{P}}\ge 0, \quad v_{\mathcal{N}}\le0, \end{equation} and \begin{equation}\label{sch_c} w^T\left( \Pi(x,u,t)/J_x\widetilde{F}_1(x,u,t)\right)v \ge 0, \end{equation} where \begin{equation*} \Pi(x,u,t) \equiv \begin{pmatrix} J_x\widetilde{F}_1(x,u,t) &&&&& J_{(u,t)}\widetilde{F}_1(x,u,t)\\ J_x\widetilde{F}_2(x,u,t) &&&&& J_{(u,t)}\widetilde{F}_2(x,u,t) \end{pmatrix} \in \R^{(m+1)\times(m+1)}, \end{equation*} and $ \Pi(x,u,t)/J_x\widetilde{F}_1(x,u,t) $ is the Schur complement of $ J_x\widetilde{F}_1(x,u,t)$ in $ \Pi(x,u,t) $. \end{definition} In our case, for the $ \MixCP\left( \widetilde{F}_1,\widetilde{F}_2,\R^k_+ \right)$, the Jacobian matrices are: \begin{align*} J\widetilde{F}_1(x,u,t) \equiv \left(\widetilde{A}\textrm{ }\textrm{ }\widetilde{B}\right) \end{align*} and \begin{align*} J\widetilde{F}_2 (x,u,t) \equiv \left(\widetilde{C}\textrm{ }\textrm{ }\widetilde{D}\right) \end{align*} where \begin{equation*} \widetilde{A} = A, \qquad \widetilde{B} = \left(B\textrm{ }\textrm{ }Ae\right) \qquad \widetilde{C} = \begin{pmatrix} tC+ue^\top A \\ 0 \end{pmatrix}, \end{equation*} \begin{small} \begin{equation*} \widetilde{D} = \begin{pmatrix} e^\top \left(A(x+te)+Bu+p\right)I + \diag(e^{\top}Bu) + tD &&&&& Cx+2tCe+ue^\top Ae+Du \\ -2u^\top &&&&& 2t \end{pmatrix}. \end{equation*} \end{small} In our case, if the Jacobian matrix block $ J_x\widetilde{F}_1(x,u,t) = A$ is nonsingular, then the Schur complement $ \Pi(x,u,t)/J_x\widetilde{F}_1(x,u,t) $ is \begin{equation}\label{sch_eq} \left( \Pi(x,u,t)/J_x\widetilde{F}_1(x,u,t)\right) = \widetilde{D}-\widetilde{C}\widetilde{A}^{-1}\widetilde{B}. \end{equation} \begin{proposition} If the matrices $\widetilde{A}$ and $\widetilde{D}$ are nonsingular for any $z \in \R^{m+1}$, then the Jacobian matrix $\mathcal{A}$ for the associated merit function is nonsingular. \end{proposition} \begin{proof} It is easy to check that \begin{equation*} \mathcal{A} = \begin{pmatrix} D_a+D_b\widetilde{A} &&&&& D_b\widetilde{B}\\ \widetilde{C} &&&&& \widetilde{D} \end{pmatrix}. \end{equation*} $\mathcal{A}$ is a nonsingular matrix if and only if the sub-matrix $D_a+D_b\widetilde{A}$ and its Schur complement are nonsingular, and they are nonsingular if and only if the matrices $\widetilde A$ and $\widetilde{D}$ are nonsingular. \end{proof} The following theorem is \cite[Theorem 9.4.4]{FacchineiPang2003}. For the sake of completeness, we provide a proof here. \begin{theorem}\label{SP} A point $(x, u, t)\in \R^{m+1}$ is a solution of the $ \MixCP(\widetilde{F}_1, \widetilde{F}_2,\R^k)$ if and only if $(x,u,t) $ is an FB regular point of $ \theta_{FB}^{\MixCP}$ and $ (x, u, t)$ is a stationary point of $ \mathbb{F}_{FB}^{\MixCP}$. \end{theorem} \begin{proof} Suppose that $z^{*}=(x^{*},u^{*},t^{*})\in \SMixCP(\widetilde{F}_1,\widetilde{F}_2,\R^k)$. Then, it follows that $z^{*}$ is a global minimum and hence a stationary point of $ \theta_{FB}^{\MixCP}$. Thus, $(x^{*},\widetilde{F}_1(z^{*}))\in\C(\R^k_+)$, and we have $\mathcal{P}=\mathcal{N}=\emptyset$. Therefore, the FB regularity of $x^{*}$ holds since $x^{*}=x_{\C}$, because there is no nonzero vector $x$ satisfying conditions (\ref{z_ineq}). Conversely, suppose that $x^{*}$ is FB regular and $ z^*=(x^*, u^*, t^*)$ is a stationary point of $ \theta_{FB}^{\MixCP}$. It follows that $\nabla \theta_{FB}^{\MixCP} = 0$, i.e.: \begin{equation*} \mathcal{A}^\top \mathbb{F}_{FB}^{\MixCP} = \begin{pmatrix} D_a+D_bJ_x\widetilde{F}_1(z^*) & J_x\widetilde{F}_2(z^*)\\ D_bJ_{(u,t)}\widetilde{F}_1(z^*) & J_{(u,t)}\widetilde{F}_2(z^*) \end{pmatrix} \mathbb{F}_{FB}^{\MixCP}=0, \end{equation*} where \begin{align*} &D_a= \diag \begin{pmatrix} \frac{x_i^*}{\sqrt{(x_i^*)^2 + \widetilde{F}_1^i(z^*)^2}} - 1 \end{pmatrix}, \qquad D_b=\diag \begin{pmatrix} \frac{\widetilde{F}_1^i(z^*)}{\sqrt{(x_i^*)^2 + \widetilde{F}_1^i(z^*)^2}} - 1 \end{pmatrix},\\ & i=1, \dots , k. \end{align*} Hence, for any $w \in \R^{m+1}$, we have \begin{equation}\label{p_thm3_0} w^{\top} \begin{pmatrix} D_a+D_bJ_x\widetilde{F}_1(z^*) & J_x\widetilde{F}_2(z^*)\\ D_bJ_{(u,t)}\widetilde{F}_1(z^*) & J_{(u,t)}\widetilde{F}_2(z^*) \end{pmatrix} \mathbb{F}_{FB}^{\MixCP}=0. \end{equation} Assume that $z^{*}$ is not a solution of $\MixCP $. Then, we have that the index set $\mathcal{R}$ is not empty. Define $v\equiv D_b\mathbb{F}_{FB}^{\MixCP}$. We have \begin{equation*} v_{\mathcal{C}} =0, \qquad v_{\mathcal{P}} >0, \qquad v_{\mathcal{N}} <0. \end{equation*} Take $w$ with \begin{equation*} w_{\mathcal{C}} =0, \qquad w_{\mathcal{P}} >0, \qquad w_{\mathcal{N}} <0. \end{equation*} From the definition of $D_a$ and $D_b$, we know that $D_a\mathbb{F}_{FB}^{\MixCP}$ and $D_b\mathbb{F}_{FB}^{\MixCP}$ have the same sign. Therefore, \begin{equation}\label{p_thm3_1} w^{\top}(D_a\mathbb{F}_{FB}^{\MixCP}) = w^{\top}_{\mathcal{C}}(D_a\mathbb{F}_{FB}^{\MixCP})_{\mathcal{C}} + w^{\top}_{\mathcal{P}}(D_a\mathbb{F}_{FB}^{\MixCP})_{\mathcal{P}} +w^{\top}_{\mathcal{N}}(D_a\mathbb{F}_{FB}^{\MixCP})_{\mathcal{N}} > 0. \end{equation} By the regularity of $J\widetilde{F}_1(z)^{\top}$, we have \begin{equation}\label{p_thm3_2} w^{\top}J\widetilde{F}_1(z)^{\top}(D_a\mathbb{F}_{FB}^{\MixCP})= w^{\top} J\widetilde{F}_1(z)^{\top}w \ge 0. \end{equation} The inequalities (\ref{p_thm3_1}) and (\ref{p_thm3_2}) together contradict condition (\ref{p_thm3_0}). Hence $ \mathcal{R} = \emptyset$. It means that $z^{*}$ is a solution of $\MixCP(\widetilde{F}_1,\widetilde{F}_2,\R^k)$. \end{proof} \section{Algorithms} For solving a complementarity problem, there are many different algorithms available. The common algorithms include numerical methods for systems of nonlinear equations (such as Newton's method \cite{atkinson2008introduction}), the interior point method (Karmarkar's Algorithm \cite{karmarkar1984new}), the projection iterative method\cite{mangasarian1977solution}, and the multi-splitting method \cite{o1985multi}. In the previous sections, we have already provided sufficient conditions for using FB regularity and stationarity to identify a solution of the $\MixCP$ problem. In this section, we are trying to find a solution of $\LCP$ by finding the solution of $\MixCP$ which is converted from $\LCP$. One convenient way to do this is using the Newton's Method as follows: \begin{flushleft} \textbf{Algorithm} (Newton's method): \end{flushleft} Given initial data $z^0 \in \R^{m+1}$, and $r = 10^{-7}$. \textbf{Step 1}: Set $k = 0$. \textbf{Step 2}: If $\mathbb{F}^{\MixCP}_{FB}(z^k)\leq r$, then STOP. \textbf{Step 3}: Find a direction $d^k \in \R^{m+1}$ such that \begin{equation*} \mathbb{F}^{\MixCP}_{FB}(z^k) + \mathcal{A}^{\top}(z^k)d^k = 0. \end{equation*} \textbf{Step 4}: Set $z^{k+1} := z^k + d^k $ and $k := k + 1$, go to Step 2. \paragraph{} If the Jacobian matrix $\mathcal{A}^{\top}$ is nonsingular, then the direction $d^k \in \R^{m+1}$ for each step can be found. The following theorem, which is based on an idea similar to the one used in \cite{luenberger2015linear}, proves that such a Newton's Method can efficiently solve the $\LCP$ on extended second order cone (i.e. solve the problem within polynomial time), by finding the solution of the $\MixCP$: \begin{theorem}\label{newton} Suppose that the Jacobian matrix $\mathcal{A}$ is nonsingular. Then, Newton's method for $\MixCP(\widetilde{F}_1,\widetilde{F}_2,\R^k_+)$ converges at least quadratically to \begin{equation*} z^* \in \SMixCP(\widetilde{F}_1,\widetilde{F}_2,\R^k_+), \end{equation*} if it starts with initial data $z^0$ sufficiently close to $z^*$. \end{theorem} \begin{proof} Suppose that the starting point $z^0$ is close to the solution $z^*$, and suppose that $\mathcal{A}$ is a Lipschitz function. There are $\rho >0, \beta_1 >0, \beta_2 >0$, such that for all $z$ with $\lVert z - z^* \rVert < \rho$, there holds $\lVert\mathcal{A}^{-1}(z)\rVert < \beta_1$, and $\lVert\mathcal{A}(z^k) - \mathcal{A} \left(z^*)\right)\rVert \leq \beta_2\lVert z^k - z^*\rVert$. By the definition of the Newton's method, we have \begin{align*} \lVert z^{k+1} - z^* \rVert & = \lVert z^k - z^* - \mathcal{A}^{-1}(z^k)\mathbb{F}^{\MixCP}_{FB}(z^k)\rVert \\ & = \mathcal{A}^{-1}(z^k)\left[ \mathcal{A}(z^k)(z^k - z^*) - \left(\mathbb{F}^{\MixCP}_{FB}(z^k) - \mathbb{F}^{\MixCP}_{FB}(z^*)\right)\right], \end{align*} because $\mathbb{F}^{\MixCP}_{FB}(z^*)=0$ when $z^* \in \SMixCP$. By Taylor's theorem, we have \begin{equation*} \mathbb{F}^{\MixCP}_{FB}(z^k) - \mathbb{F}^{\MixCP}_{FB}(z^*) = \int_{0}^{1} \mathcal{A}\left(z^{k} + s(z^* - z^k)\right)(x^k - z^*)ds, \end{equation*} so \begin{align*} \lVert \mathcal{A}(z^k)(z^k - z^*) & - \left(\mathbb{F}^{\MixCP}_{FB}(z^k) - \mathbb{F}^{\MixCP}_{FB}(z^*)\right)\rVert \\ & = \left\lVert \int_{0}^{1}\left[ \mathcal{A}(z^k) - \mathcal{A} \left( z^k + s(z^* - z^k)\right)\right] ds(z^k - z^*) \right\rVert \\ & \leq \int_{0}^{1}\lVert\mathcal{A}(z^k) - \mathcal{A} \left( z^k + s(z^* - z^k)\right)\rVert ds\lVert z^k - z^*\rVert \\ & \leq \lVert z^k - z^*\rVert^2 \int_{0}^{1}\beta_2 sds = \frac{1}{2}\beta_2 \lVert z^k - z^*\rVert ^2. \end{align*} Also, we have $\lVert z - z^* \rVert < \rho$, that is, \begin{equation*} \lVert z^{k+1} - z^* \rVert \leq \frac{1}{2}\beta_1 \beta_2 \lVert z^{k} - z^*\rVert^2. \end{equation*} \end{proof} Another widely-used algorithm is presented by Levenberg and Marquardt in \cite{marquardt1963algorithm}. Levenberg-Marquardt algorithm can approach second-order convergence speed without requiring the Jacobian matrix to be nonsingular. We can approximate the Hessian matrix by: \begin{equation*} \mathcal{H}(z)=\mathcal{A}^{\top}(z)\mathcal{A}(z), \end{equation*} and the gradient by: \begin{equation*} \mathcal{G}(z)=\mathcal{A}^{\top}(z)\mathbb{F}^{\MixCP}_{FB}(z). \end{equation*} Hence, the upgrade step will be \begin{equation*} z^{k+1} = z^k - \left[\mathcal{A}^{\top}(z^k)\mathcal{A}(z^k) +\mu \mathbb{I}\right]^{-1}\mathcal{A}^{\top}(z^k)\mathbb{F}^{\MixCP}_{FB}(z^k). \end{equation*} As we can see, Levenberg-Marquardt algorithm is a quasi-Newton's method for an unconstrained problem. When $\mu$ equals to zero, the step upgrade is just the Newton's method using approximated Hessian matrix. The number of iterations of Levenberg-Marquardt algorithm to find a solution is higher than that of Newton's method, but it works for singular Jacobian as well. The greater the parameter $\mu$, the slower the calculation speed becomes. Levenberg-Marquardt algorithm is provided as follows: \begin{flushleft} \textbf{Algorithm} (Levenberg-Marquardt): \end{flushleft} Given initial data $z^0 \in \R^{m+1}$, $\mu = 0.005$, and $r = 10^{-7}$. \textbf{Step 1}: Set $k = 0$. \textbf{Step 2}: If $\mathbb{F}^{\MixCP}_{FB}(z^k)\leq r$, stop. \textbf{Step 3}: Find a direction $d^k \in \R^{m+1}$ such that \begin{equation*} \mathcal{A}(z^k)^{\top}\mathbb{F}^{\MixCP}_{FB}(z^k) + \left[\mathcal{A}^{\top}(z^k)\mathcal{A}(z^k) +\mu \mathbb{I}\right]d^k = 0. \end{equation*} \textbf{Step 4}: Set $z^{k+1} := z^k + d^k $ and $k := k + 1$, go to Step 2. \paragraph{} \begin{theorem}\label{LevenbergM} \emph{\cite{yamashita2001rate}} Without the nonsingularity assumption on the Jacobian matrix $\mathcal{A}$, Levenberg-Marquardt Algorithm for $\MixCP(\widetilde{F}_1,\widetilde{F}_2,\R^k_+)$ converges at least quadratically to \begin{equation*} z^* \in \SMixCP(\widetilde{F}_1,\widetilde{F}_2,\R^k_+), \end{equation*} if it starts with initial data $z^0$ sufficiently close to $z^*$. \end{theorem} The proof is omitted. \section{A Numerical Example} In this section, we will provide a numerical example for $\LCP$ on extended second order cones. Let $L(3,2)$ be an extended second order cone defined by (\ref{elc}). Following the notation in Theorem \ref{Main_thm}, let $z=(x,u)$, $\hat z=(x-\|u\|,u)$, $\tilde{z}=(x-t,u,t)$ and $r=(p,q) = \left((-55,-26,50)^{\top}, (-19,-26)^{\top} \right)$ with $x,p\in\R^3$ , $u,q\in\R^2$, and $t\in \R$. Consider \begin{equation*} T=\bs A & B\\C & D \es = \lf( \begin{array}{rrrrr} 26 & 15 & 3 & 51 & -42 \\ -7 & -39 & -16 & -17 & 18 \\ 32 & 23 & 40 & -38 & 46 \\ 6 & -22 & -28 & -17 & 27 \\ -38 & -25 & 24 & 47 & -16 \end{array} \rg), \end{equation*} with $A\in\R^{3\times 3}$, $B\in\R^{3\times 2}$, $C\in\R^{2\times 3}$ and $D\in\R^{2\times 2}$. It is easy to show that square matrices T, A and D are nonsingular. By item (vi) of Theorem \ref{Main_thm}, we can reformulate this $\LCP$ problem as a smooth $\MixCP$ problem. We will use the Levenberg-Marquardt algorithm to find the solution of the FB-based equation formulation (\ref{FBform}) of $\MixCP$ problem. The convergence point is: \begin{align*} \tilde{z}^* & = (x - t,u,t) \\ & = \left( \left(0, \frac{439}{660}, 0\right)^{\top}, \left(\frac{341}{1460},\frac{724}{2683}\right)^{\top}, \frac{1271}{3582} \right) . \end{align*} We need to check the FB regularity of $\tilde{z}^*$. It is easy to show that the partial Jacobian matrix of $\widetilde{F}_1(\tilde{z}^*)$ \begin{align*} J_x\widetilde{F}_1(\tilde{z}^*) = \widetilde{A} = \lf( \begin{array}{rrr} 26 & 15 & 3 \\ -7 & -39 & -16 \\ 32 & 23 & 40 \end{array} \rg) \end{align*} is nonsingular. Moreover, we have that \begin{equation*} x - t = \left(0, \frac{439}{660}, 0\right)^{\top} \ge 0, \qquad \widetilde{F}_1(\tilde{z}^*) = \left(\frac{3626}{145}, 0, \frac{12148}{185}\right)^{\top} \ge 0, \end{equation*} and therefore \begin{equation*} \left<x - t, \widetilde{F}_1(\tilde{z}^*)\right> = 0. \end{equation*} That is, $(x, \widetilde{F}_1(\tilde{z}^*))\in \C(\R^3_+)$, so the index sets $\mathcal{P}=\mathcal{N}=\emptyset$. The matrix $\widetilde{A} $ is invertible. In addition, we can calculate that the Schur complement of $\Pi(\widetilde{z}^*) $ with respect to $ J_x\widetilde{F}_1(\tilde{z}^*)$: \begin{equation*} \left( \Pi(\tilde{z}^*)/J_x\widetilde{F}_1(\tilde{z}^*)\right) = \widetilde{D} - \widetilde{C}\widetilde{A}^{-1}\widetilde{B} = \lf( \begin{array}{rrr} \frac{3991}{58} & \frac{11387}{95} & -\frac{7203}{268} \\ \frac{15910}{93} & \frac{5185}{163} & -\frac{5941}{248} \\ -\frac{341}{740} & -\frac{741}{1373} & \frac{1271}{1791} \end{array} \rg). \end{equation*} The FB regularity of $x^{*}$ holds as there is no nonzero vector $x$ satisfying conditions (\ref{z_ineq}). Then, we compute the gradient of the merit function, which is \begin{align*} \mathcal{A}^\top \mathbb{F}_{FB}^{\MixCP} & = \begin{pmatrix} D_a+D_bJ_x\widetilde{F}_1(\tilde{z}^*) & J_{x}\widetilde{F}_2(\tilde{z}^*)\\ D_bJ_{(u,t)}\widetilde{F}_1(\tilde{z}^*) & J_{(u,t)}\widetilde{F}_2(\tilde{z}^*) \end{pmatrix} \mathbb{F}_{FB}^{\MixCP} \\ & = \lf( \begin{array}{cccccc} -\frac{598}{605} & 7 & 0 & \frac{4844}{349} & \frac{345}{1238} & 0 \\ -\frac{32}{21195} & 39 & 0 & -\frac{3946}{491} & -\frac{4031}{441} & 0 \\ 0 & 16 & -\frac{413}{415} & -\frac{26}{7} & \frac{1754}{111} & 0 \\ -\frac{33}{12610} & 7 & 0 & \frac{12462}{139} & \frac{78767}{701} & -\frac{341}{740} \\ -\frac{32}{21195} & 39 & 0 & \frac{13790}{131} & \frac{9451}{105} & -\frac{741}{1373} \\ 0 & 16 & 0 & -\frac{3341}{135} & -\frac{3233}{190} & \frac{1271}{1791} \end{array} \rg) \begin{pmatrix} 0 \\ 0 \\ 0 \\ 0 \\ 0 \\ 0 \\ \end{pmatrix} =0. \end{align*} Hence, $z^*$ is a stationary point of $F^{\MixCP}_{FB}$. By Theorem \ref{SP}, we conclude that $z^*$ is the solution of the $\MixCP$ problem. By the item (vi) of Theorem \ref{Main_thm}, we have that \begin{align*} z & = (x,u) \\ & =\left(\left(\frac{1271}{3582}, \frac{1072}{1051}, \frac{1271}{3582}\right)^{\top}, \left(\frac{341}{1480},\frac{724}{2683}\right)^{\top}\right), \end{align*} is the solution of $\LCP(T,r,L)$ problem. \section{Conclusions} In this paper, we studied the method of solving a linear complementarity problem on an extended second order cone. By checking the stationarity and FB regularity of a point, we can verify whether it is a solution of the mixed complementarity problem. Such conversion of a linear complementarity problem to a mixed complementarity problem reduces the complexity of the original problem. The connection between a linear complementarity problem on an extended second order cone and a mixed complementarity problem on a non-negative orthant will be useful for our further research about applications to practical problems, such us portfolio selection and signal processing problems. \bibliographystyle{unsrt}{
\section{Introduction} Answer set programming (ASP) is a declarative formalism for knowledge representation and reasoning based on stable model semantics \cite{DBLP:journals/ngc/GelfondL91,DBLP:journals/cacm/BrewkaET11}, for which robust and efficient implementations are available~\cite{DBLP:conf/iclp/GebserKKOSW16}. State-of-the-art ASP systems are usually based on the ``ground+solve'' approach~\cite{DBLP:journals/aim/KaufmannLPS16}, in which a \textit{grounder} module transforms the input program (containing variables) in an equivalent variable-free one, whose stable models are subsequently computed by the \textit{solver} module. ASP implementations adopting this traditional approach are known to be effective for solving complex problems arising from academic and industrial applications, including: product configuration~\cite{DBLP:conf/scm/KojoMS03}, decision support systems for space shuttle flight controllers~\cite{DBLP:conf/asp/NogueiraBGWB01}, explanation of biomedical queries~\cite{DBLP:journals/tplp/ErdemO15}, construction of phylogenetic supertrees~\cite{DBLP:journals/tplp/KoponenOJS15}, data-integration~\cite{DBLP:journals/tplp/MannaRT15}, reconfiguration systems~\cite{DBLP:conf/cpaior/AschingerDFGJRT11}, and more. Nonetheless, there are some classes of programs (cf.\ \cite{DBLP:journals/ai/CalimeriGMR16}) whose evaluation is not feasible with the ``ground+solve'' approach just because the grounding phase induces a combinatorial blow-up. An issue that is usually referred to as the \textit{grounding bottleneck} of ASP. The grounding bottleneck has been subject of several studies in recent years, and various alternative approaches to overcome it have been proposed. Some of these are based on syntactic extensions that enable the combination of ASP solvers with solvers for external theories~\cite{DBLP:journals/tplp/OstrowskiS12,DBLP:journals/corr/BalducciniL17,DBLP:journals/tplp/BalducciniL13,DBLP:journals/tplp/AzizCS13,DBLP:journals/jair/CatDBS15,DBLP:conf/iclp/SusmanL16,DBLP:conf/birthday/EiterRS16}; whereas, the most prominent approach working on plain ASP is \textit{lazy grounding}, which was implemented by \textsc{asperix}~\cite{DBLP:conf/lpnmr/LefevreN09a}, \textsc{gasp}~\cite{DBLP:journals/fuin/PaluDPR09}, and \textsc{omiga}~\cite{DBLP:conf/jelia/Dao-TranEFWW12}. Roughly, the idea of lazy grounding is to instantiate rules only when it is required during the search for a stable model~\cite{DBLP:journals/ai/LiuPST10}. % In this way, it is possible to prevent the grounding of rules that are unnecessary for the computation. Albeit lazy grounding techniques obtained promising preliminary results, they cannot yet reach the performance of state of the art systems in many benchmarks~\cite{DBLP:journals/ai/CalimeriGMR16,DBLP:conf/lpnmr/LefevreN09a}. One of the reasons is probably that fully-fledged lazy grounding techniques could not be easily integrated within solvers based on the very efficient Conflice-Driven Clause Learning (CDCL) algorithm~\cite{DBLP:journals/tc/Marques-SilvaS99,DBLP:journals/aim/KaufmannLPS16,Weinzierl2017}. Nonetheless, in many applications, the grounding bottleneck is merely caused by rules of a specific kind, namely constraints. For example, the following constraint has been identified as the bottleneck in programs solving a problem of natural language understanding: \begin{equation*} \leftarrow eq(X,Y), \ eq(Y, Z),\ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace eq(X, Z) \end{equation*} Its grounding, which features a cubic number of instances with respect to the extension of predicate $eq$ in the worst case, is often not feasible for real world instances~\cite{DBLP:journals/fuin/Schuller16}. In this paper, we focus on the above practically-relevant case of problematic constraints. In particular, we systematically compare alternative strategies that avoid the instantiation of some constraints by extending a CDCL-based ASP solver. In a nutshell, the input program is simplified by omitting problematic constraints and it is grounded; then, the resulting ground program is provided as input to a solver that is extended to emulate the presence of missing constraints. Among the strategies for extending the solver, we considered \textit{lazy instantiation of constraints} and \textit{custom propagators}. In the first strategy, the solver searches for a stable model $S$ of the simplified program. Then, $S$ is returned as a solution if it satisfies also the omitted constraints, otherwise the violated instances of these constraints are lazily instantiated, and the search continues (Sec.~\ref{sec:lazy}). In the second strategy, the solver is extended (in possibly alternative ways) by custom \textit{propagators}, which emulate the presence of missing constraints during the search (Sec.~\ref{sec:propagators}). The above-mentioned strategies can be implemented by using the API of existing CDCL-based ASP solvers~\cite{DBLP:conf/iclp/GebserKKOSW16,DBLP:conf/aiia/DodaroRS16}. An empirical evaluation conducted on real and synthetic benchmarks (Sec.~\ref{sec:experiments}) confirms that the usage of lazy instantiation and custom propagators is effective when the grounding bottleneck is due to some constraint. The analysis of the results highlights strengths and weaknesses of the different strategies. Moreover, it shows there is not always a clear winner for a given problem, and the choice depends also on the characteristics the instances to solve. This observation suggested to investigate the applicability of algorithm selection techniques. The results are positive, in the sense that already a basic portfolio is faster than the best approach. \section{Answer Set Programming (ASP)} An ASP program $\Pi$ is a finite set of rules of the form: \begin{equation}\label{eq:rule} a_1 \lor \ldots \lor a_n \lar b_1, \ldots, b_j, \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b_{j+1}, \ldots, \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b_m \end{equation} where $a_1,\ldots,a_n,b_1,\ldots,b_m$ are atoms and $n\geq 0,$ $m\geq j\geq 0$. In particular, an \emph{atom} is an expression of the form $p(t_1, \ldots, t_k)$, where $p$ is a predicate symbol and $t_1, \ldots, t_k$ are \emph{terms}. Terms are alphanumeric strings, and are distinguished in variables and constants. According to the Prolog's convention, only variables start with an uppercase letter. A \emph{literal} is an atom $a_i$ (positive) or its negation $\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a_i$ (negative), where $\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace$ denotes the \emph{negation as failure}. Given a rule $r$ of the form (\ref{eq:rule}), the disjunction $a_1 \lor \ldots \lor a_n$ is the {\em head} of $r$, while $b_1,\ldots,b_j, \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b_{j+1}, \ldots, \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b_m$ is the {\em body} of $r$, of which $b_1,\ldots,b_j$ is the {\em positive body}, and $\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b_{j+1}, \ldots, \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b_m$ is the {\em negative body} of $r$. A rule $r$ of the form (\ref{eq:rule}) is called a \textit{fact} if $m=0$ and a \textit{constraint} if $n=0$. An object (atom, rule, etc.) is called {\em ground} or {\em propositional}, if it contains no variables. Rules and programs are \textit{positive} if they contain no negative literals, and \textit{general} otherwise. % Given a program $\Pi$, let the \emph{Herbrand Universe} \HU{\Pi} be the set of all constants appearing in $\Pi$ and the \emph{Herbrand Base} \HB{\Pi} be the set of all possible ground atoms which can be constructed from the predicate symbols appearing in $\Pi$ with the constants of \HU{\Pi}. Given a rule $r$, \GP{r} denotes the set of rules obtained by applying all possible substitutions $\sigma$ from the variables in $r$ to elements of \HU{\Pi}. Similarly, given a program $\Pi$, the {\em ground instantiation} \GP{\Pi} of $\Pi$ is the set \( \bigcup_{r \in \Pi} \GP{r} \). For every program $\Pi$, its stable models are defined using its ground instantiation \GP{\Pi} in two steps: First stable models of positive programs are defined, then a reduction of general programs to positive ones is given, which is used to define stable models of general programs. A set $L$ of ground literals is said to be {\em consistent} if, for every literal $\ell \in L$, its negated literal $\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace \ell$ is not contained in $L$. Given a set of ground literals $L$, $\posOf{L} \subseteq L$ denotes the set of positive literals in $L$. An interpretation $I$ for $\Pi$ is a consistent set of ground literals over atoms in $\HB{\Pi}$. % A ground literal $\ell$ is {\em true} w.r.t.\ $I$ if $\ell\in I$; $\ell$ is {\em false} w.r.t.\ $I$ if its negated literal is in $I$; $\ell$ is {\em undefined} w.r.t.\ $I$ if it is neither true nor false w.r.t.\ $I$. A constraint $c$ is said to be \textit{violated} by an interpretation $I$ if all literals in the body of $c$ are true. An interpretation $I$ is {\em total} if, for each atom $a$ in $\HB{\Pi}$, either $a$ or $\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a$ is in $I$ (i.e., no atom in $\HB{\Pi}$ is undefined w.r.t.\ $I$). Otherwise, it is \textit{partial}. A total interpretation $M$ is a {\em model} for $\Pi$ if, for every $r \in \GP{\Pi}$, at least one literal in the head of $r$ is true w.r.t.\ $M$ whenever all literals in the body of $r$ are true w.r.t.\ $M$. A model $X$ is a {\em stable model} for a positive program $\Pi$ if any other model $Y$ of $\Pi$ is such that $\posOf{X} \subseteq \posOf{Y}$. The {\em reduct} or {\em Gelfond-Lifschitz transform} of a general ground program $\Pi$ w.r.t.\ an interpretation $X$ is the positive ground program $\Pi^X$, obtained from $\Pi$ by (i) deleting all rules $r \in \Pi$ whose negative body is false w.r.t.\ X and (ii) deleting the negative body from the remaining rules. A stable model of % $\Pi$ is a model $X$ of $\Pi$ such that $X$ is a stable model of $\GP{\Pi}^X$. We denote by $SM(\Pi)$ the set of all stable models of $\Pi$, and call $\Pi$ \textit{coherent} if $SM(\Pi) \neq \emptyset$, \textit{incoherent} otherwise. \begin{example}\label{ex:grounding} Consider the following program $\Pi_1$: \begin{equation*} \begin{array}{lll} r_1: a(1) \leftarrow \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b(1) &\qquad r_2: b(1) \leftarrow \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a(1) & \qquad r_3: \leftarrow a(X), \ b(X) \\ r_4: c(1) \leftarrow \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace d(1) & \qquad r_5: d(1) \leftarrow \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace c(1) & \qquad r_6: \leftarrow a(X), \ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b(X) \end{array} \end{equation*} The ground instantiation $\GP{\Pi_1}$ of the program $\Pi_1$ is the following program: \begin{equation*} \begin{array}{lll} g_1: a(1) \leftarrow \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b(1) &\qquad g_2: b(1) \leftarrow \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a(1) & \qquad g_3: \leftarrow a(1), \ b(1) \\ g_4: c(1) \leftarrow \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace d(1) & \qquad g_5: d(1) \leftarrow \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace c(1) & \qquad g_6: \leftarrow a(1), \ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b(1) \end{array} \end{equation*} Note that % $M=\{\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a(1), \ b(1), \ c(1), \ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace d(1)\}$ is a model of $\GP{\Pi_1}$. Since $\GP{\Pi_1}^M$ comprises only the facts $b(1)$ and $c(1)$, and constraint $g_3$, $M$ is a stable model of $\Pi$. % $\hfill\lhd$ \end{example} \paragraph{Support.} Given a model $M$ for a ground program $\Pi$, we say that a ground atom $a \in M$ is {\em supported} with respect to $M$ if there exists a \emph{supporting} rule $r\in \Pi$ such that $a$ is the only true atom w.r.t. $M$ in the head of $r$, and all literals in the body of $r$ are true w.r.t.\ $M$. If $M$ is a stable model of a program $\Pi$, then all atoms in $M$ are supported. \section{Solving Strategies} \label{sec:solving} \subsection{Classical Evaluation}\label{sec:solving:classical} The standard solving approach for ASP is instantiation followed by a procedure similar to CDCL for SAT with extensions specific to ASP~\cite{DBLP:journals/aim/KaufmannLPS16}. The basic algorithm $\mi{ComputeStableModel}(\Pi)$ for finding a stable model of program $\Pi$ is shown in Algorithm~\ref{alg:mg}. The Function~\ref{fn:propagatestd} combines unit propagation (as in SAT) with some additional ASP-specific propagations, which ensure the model is stable (cf. \cite{DBLP:journals/aim/KaufmannLPS16}). Given a partial interpretation $I$ consisting of literals, and a set of rules $\Pi$, \emph{unit propagation} infers a literal $\ell$ to be true if there is a rule $r \in \Pi$ such that $r$ can be satisfied only by $I \cup \{\ell\}$. Given the nogood representation $C(r) = \{ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a_1, \ldots, \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a_n, b_1, \ldots, b_j, \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b_{j+1}, \ldots, \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b_m \}$ of a rule $r$, then the negation of a literal $\ell \in C(r)$ is unit propagated w.r.t.\ $I$ and rule $r$ iff $C(r) \setminus \{ \ell \} \subseteq I$. To ensure that models are supported, unit propagation is performed on the Clark completion % of $\Pi$ % or alternatively a \emph{support propagator} is used~\cite{DBLP:conf/ijcai/AlvianoD16}. \begin{example}\label{ex:prog} Consider the ground program $\Pi_1$ from Example~\ref{ex:grounding}. $\mi{ComputeStableModel}(\Pi_1)$ starts with $I = \emptyset$ and does not propagate anything in line~\ref{ln:alg:propagate}. $I$ is partial and consistent, so the algorithm continues in line~\ref{ln:alg:partial}. Assume no restart and no deletion is performed, and assume $\mi{ChooseLiteral}$ returns $\{a(1)\}$, i.e., $I=\{a(1)\}$. Next, $\mi{Propagate}(I)$ is called, which yields $I = \{a(1),\ b(1),\ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b(1)\}$: $\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b(1)$ comes from unit propagation on $g_3$ and $b(1)$ from unit propagation on $g_6$. Thus, $I$ is inconsistent and $I$ is analyzed to compute a reason explaining the conflict, i.e., $\mi{CreateConstraint}(I) = \{g_7\}$ with $g_7: \lar a(1)$. Intuitively, the truth of $a(1)$ leads to an inconsistent interpretation, thus $a(1)$ must be false. Then, the consistency of $I$ is restored (line~\ref{ln:alg:restore}), i.e., $I = \emptyset$, and $g_7$ is added to $\Pi_1$. The algorithm again restarts at line~\ref{ln:alg:propagate} with $I = \emptyset$ and propagates $I = \{\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a(1),\ b(1)\}$, where $\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a(1)$ comes from unit propagation on $g_7$, and $b$ from unit propagation on $g_2$. $I$ is partial and consistent, therefore lines~\ref{ln:alg:partial} and~\ref{ln:alg:choice} are executed. Assume again that no restart and no constraint deletion happens, and that $\mi{ChooseLiteral}(I) = \{ c(1) \}$. Therefore, the algorithm continues in line~\ref{ln:alg:propagate} with $I = \{ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a(1), \ b(1), \ c(1) \}$. Propagation yields $I = \{ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a(1),\ b(1),\ c(1),\ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace d(1) \}$ because $\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace d(1)$ is support-propagated w.r.t.\ $g_4$ and $I$ (or unit-propagated w.r.t.\ the completion of $g_4$ and $I$). $I$ is total and consistent, therefore the algorithm returns $I$ as the first stable model. $\hfill\lhd$ \end{example} For the performance of this search procedure, several details are crucial: learning effective constraints from inconsistencies as well as heuristics for restarting, constraint deletion, and for choosing literals. \newcommand{\mathcal{P}}{\mathcal{P}} \begin{algorithm}[t] \SetKwInOut{Input}{Input} \SetKwInOut{Output}{Output} \Input{A ground program $\mathcal{P}$} \Output{A stable model for $\mathcal{P}$ or $\bot$} \Begin{ % $I := \emptyset$\; $I := $ \textit{Propagate($I$)}\; \label{ln:alg:propagate} \uIf{$I$ is inconsistent} { $r$ := \textit{CreateConstraint($I$) \label{ln:alg:learning}\; $I := $ \textit{RestoreConsistency}($I$)\; \label{ln:alg:restore} \lIf{$I$ is consistent\label{ln:alg:addconstraint}}{$\mathcal{P} := \mathcal{P} \ \cup \ \{r\}$}\;} \lElse{\Return $\bot$\;} } \lElseIf{$I$ total} { {\Return $I$\;} } \Else{ $I := $ \textit{RestartIfNeeded($I$)}; \qquad $\mathcal{P} := $ \textit{DeleteConstraintsIfNeeded($\mathcal{P}$)}\; \label{ln:alg:partial} $I := I \ \cup $ \textit{ChooseLiteral($I$)}\; \label{ln:alg:choice} } \textbf{goto}~\ref{ln:alg:propagate}\; } \caption{ComputeStableModel}\label{alg:mg} \end{algorithm} \begin{function}[t] $\mathcal{I} = I$\; \lFor{$\ell \in \mathcal{I}$} % { $\mathcal{I}$ := $\mathcal{I} \ \cup \ Propagation(\mathcal{I}, \ \ell)$ \; % } \Return $\mathcal{I}$\; \caption{Propagate($I$)}\label{fn:propagatestd} \end{function} \subsection{Lazy Constraints}\label{sec:lazy} \begin{algorithm}[t] \SetKwInOut{Input}{Input} \SetKwInOut{Output}{Output} \Input{A nonground program $\Pi$, a set of nonground constraints $C \subseteq \Pi$} \Output{A stable model for $\Pi$ or $\bot$} \Begin{ $\mathcal{P}$ := $\GP{\Pi \setminus C}$\; $I$ := $ComputeStableModel(\mathcal{P})$\; \label{ln:lazy:search} \lIf{$I$ == $\bot$}{ \Return $\bot$ \label{ln:lazy:incoherent}\;} $\mathcal{C} = \{c \mid c \in \GP{C}, \ c $ is violated$\}$\label{ln:lazy:violating}\; \lIf {$\mathcal{C}$ == $\emptyset$}{\Return $I$\;} $\mathcal{P}$ := $\mathcal{P} \cup \mathcal{C}$ \label{ln:lazy:constraint}\; \textbf{goto}~\ref{ln:lazy:search}\; } \caption{LazyConstraintInstantiation}\label{alg:lazy} \end{algorithm} The algorithm presented in this section is reported as Algorithm~\ref{alg:lazy}. The algorithm takes as input a program $\Pi$ and a set of constraints $C \subseteq \Pi$. Then, the constraints in $C$ are removed from $\Pi$, obtaining the program $\mathcal{P}$. A stable model of $\GP{\mathcal{P}}$ is searched (line~\ref{ln:lazy:search}). Two cases are possible: $(i)$ $\mathcal{P}$ is incoherent (line~\ref{ln:lazy:incoherent}). Thus, the original program $\Pi$ is also incoherent and the algorithm terminates returning $\bot$. $(ii)$ $\mathcal{P}$ is coherent. Thus, a stable model, say $I$, is computed. In this case, a set of constraints $\mathcal{C} \in \GP{C}$ that are violated under the stable model $I$ are extracted (line \ref{ln:lazy:violating}) and added to $\mathcal{P}$ (line~\ref{ln:lazy:constraint}). The process is repeated until either a stable model of $\mathcal{P}$ violating no constraints in $\GP{C}$ is found or $\mathcal{P}$ is incoherent. Importantly, $\GP{C}$ is never represented explicitly in the implementation of line~5. \begin{example}\label{ex:lazy} Again consider program $\Pi_1$ from Example~\ref{ex:grounding} and the set of constraints $C= \{r_3, \ r_6\}$. The algorithm computes a stable model, say $I_1=\{a(1), \ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b(1), \ c(1), \ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace d(1)\}$, of $\mathcal{P}_1 = \GP{\Pi_1\ \setminus \ C}$. Thus, the ground instantiation $g_6$ of $r_6$ is violated under $I_1$ and therefore $g_6$ is added to $\mathcal{P}$. Then, a stable model of $\mathcal{P}$ is computed, say $I_2=\{\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace a(1), \ b(1), \ c(1), \ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace d(1)\}$. At this point, $I_2$ violates no constraint in $\GP{C}$. Thus, the algorithm terminates returning $I_2$. Note that all instantiations of constraint $r_3$ will be never violated since rules $r_1$ and $r_2$ enforce that exactly one of $a(1)$ and $b(1)$ can be true in a stable model. Thus, $r_3$ will never be instantiated by the algorithm.$\hfill \lhd$ \end{example} An important feature of Algorithm~\ref{alg:lazy} is that it requires no modifications to the search procedure implemented by the underlying ASP solver. \subsection{Constraints via Propagators}\label{sec:propagators} In this section, constraints are replaced using the concept of \textit{propagator}, which can set truth values of atoms during the solving process, based on truth values of other atoms. An example of a propagator is the unit propagation, detailed in Section~\ref{sec:solving:classical}. In contrast to the lazy instantiation of constraints that aims at adding violated constraints when a stable model candidate is found, propagators usually are used to evaluate the constraints during the computation of the stable model. Given a program $\Pi$, traditional solvers usually apply propagators on the whole set of rules and constraints in $\GP{\Pi}$. An alternative strategy is to consider a variant of the program, say $\mathcal{P} = \Pi \setminus C$, where $C$ is a set of constraints. The solver is then executed on $\GP{\mathcal{P}}$ and a propagator is used to guarantee the coherence of partial interpretations with the constraints in $\GP{C}$. Constraints in $C$ are not instantiated in practice but their inferences are simulated by an ad-hoc procedure implemented for that purpose. This approach requires a modification of the Propagation function in \ref{fn:propagatestd}, such that Propagation considers the additional set $C$ of constraints, verifies which constraints would result in a propagation on the partial interpretation, and propagate truth values due to inferences on $C$ in addition to unit propagation. \begin{example} Again consider program $\Pi_1$ from Example~\ref{ex:grounding} and the set of constraints $C= \{r_3, \ r_6\}$. The idea is to execute Algorithm~\ref{alg:mg} on $\GP{\mathcal{P}_1}$, where $\mathcal{P}_1 = \Pi_1 \setminus C$. $\mi{ComputeStableModel}(\mathcal{P}_1)$ starts with $I = \emptyset$ and does not propagate anything in line~\ref{ln:alg:propagate}. $I$ is partial and consistent, so the algorithm continues in line~\ref{ln:alg:partial}. Assume no restart and no deletion is performed, and assume $\mi{ChooseLiteral}$ returns $\{a(1)\}$, i.e., $I=\{a(1)\}$. Next, $\mi{Propagate}(I, \ C)$ is called. In this case, the propagation yields $I = \{a(1), \ b(1), \ \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b(1)\}$, where $\ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace b(1)$ comes from unit propagation on $g_1$, while $b(1)$ comes from unit propagation on the ground instantiation $g_6$ of the rule $r_6$. Thus, $I$ is inconsistent and $I$ is analyzed to compute a reason that explains the conflict, i.e., $\mi{CreateConstraint}(I) = \{g_7\}$ with $g_7: \lar a(1)$. Then, the algorithm continues as shown in Example~\ref{ex:prog}. Note that, from this point of the computation, the ground instantiations of constraints $r_3$ and $r_6$ will never be violated again, since $g_7$ assure that $a(1)$ will be false in all partial interpretations under consideration. $\hfill \lhd$ \end{example} We classify constraint propagators according to the priority given to them. In particular, they are considered \textit{eager} if propagation on non-ground constraints is executed as soon as possible, i.e., during unit propagation of already grounded constraints; moreover, they are called \textit{postponed} (or \textit{post}) if propagation on constraints is executed after all other (unit, support, etc.) propagations. \section{Implementation and Experimental Analysis}\label{sec:experiments} \subsection{Implementation} \label{sec:implementation} The lazy instantiation of constraints and the propagators have been implemented on top of the ASP solvers \wasp~\cite{DBLP:conf/lpnmr/AlvianoDLR15} and \clingo~\cite{DBLP:conf/iclp/GebserKKOSW16}. The Python interface of \wasp~\cite{DBLP:conf/aiia/DodaroRS16} follows a synchronous message passing protocol implemented by means of method calls. Basically, a Python program implements a predetermined set of methods that are later on called by \wasp whenever specific points of the computation are reached. The methods may return some values that are then interpreted by \wasp. For instance, when a literal is true the method \textit{onLiteralTrue} of the propagator is called, whose output is a list of literals to infer as true as a consequence (see~\cite{DBLP:conf/aiia/DodaroRS16} for further details). \clingo~5~\cite{DBLP:conf/iclp/GebserKKOSW16} provides a Python interface where a propagator class with an interface similar to \wasp can be registered. Two important differences exist between \wasp and \clingo. Firstly \clingo provides only a post-propagator interface and no possibility for realizing an eager propagator (that runs before unit propagation is finished). Secondly, \wasp first collects nogoods added in Python and then internally applies them and handles conflicts, while \clingo requires an explicit propagation call after each added nogood. If propagation returns a conflict then no further nogoods can be added in \clingo, even if further nogoods were detected. After consulting the \clingo authors, we implemented a queue for nogoods and add them in subsequent propagations if there is a conflict. This yields higher performance than abandoning these nogoods. \subsection{Description of Benchmarks}\label{sec:benchdescription} In order to empirically compare the various strategies for avoiding the instantiation of constraints, we investigated several benchmarks of different nature, namely Stable Marriage, Packing, and Natural Language Understanding. All benchmarks contain one or few constraints whose grounding can be problematic. \paragraph{Stable Marriage.} The \emph{Stable Marriage} problem can be described as follows: given $n$ men and $m$ women, where each person has a preference order over the opposite sex, marry them so that the marriage is stable. In this case, the marriage is said to be stable if there is no couple $(M, W)$ for which both partners would rather be married with each other than their current partner. We considered the encoding used for the fourth ASP Competition. For the lazy instantiation and for the ad-hoc propagators the following constraint has been removed from the encoding: \begin{equation*} \begin{array}{l} \leftarrow match(M,W1), \ manAssignsScore(M,W,Smw), \ W1 \ne W, \\ \quad \quad manAssignsScore(M,W1,Smw1), \ Smw > Smw1, \ match(M1,W),\\ \quad \quad womanAssignsScore(W,M,Swm), \ womanAssignsScore(W,M1,Swm1), \ Swm \ge Swm1. \end{array} \end{equation*} Intuitively, this constraint guarantees that the stability condition is not violated. \paragraph{Packing.} The \emph{Packing Problem} is related to a class of problems in which one has to pack objects together in a given container. We consider the variant of the problem submitted to the ASP Competition 2011. In that case, the problem was the packing of squares of possibly different sizes in a rectangular space and without the possibility of performing rotations. The encoding follows the typical guess-and-check structure, where positions of squares are guessed and some constraints check whether the guessed solution is a stable model. We identified 2 expensive sets of constraints. The first set comprises the following two constraints: \begin{align*} \leftarrow pos(I,X,Y), pos(I,X_1,Y_1), X_1 \neq X & \qquad \leftarrow pos(I,X,Y), pos(I,X_1,Y_1), Y_1 \neq Y \end{align*} which enforce that a square is not assigned to different positions. The second set comprises constraints forbidding the overlap of squares. One of these constraints is reported in the following: \begin{align*} \leftarrow pos(I_1,X_1,Y_1), \ square(I_1,D_1), \ pos(I_2,X_2,Y_2), \ square(I_2,D_2), \phantom{we are free to stay herei}\\ I1 \neq I2, \ W1 = X1+D1, \ H1 = Y1+D1, \ X2 \geq X1,\ X2 < W1, \ Y2 \geq Y1, \ Y2 < H1. \end{align*} Other constraints are similar thus they are not reported. \paragraph{Natural Language Understanding (NLU).} The \emph{NLU} benchmark is an application of ASP in the area of Natural Language Understanding, in particular the computation of optimal solutions for First Order Horn Abduction problems under the following cost functions: cardinality minimality, cohesion% , and weighted abduction% . This problem and these objective functions have been described by Sch\"uller~\shortcite{DBLP:journals/fuin/Schuller16}. In this problem, we aim to find a set of explanatory atoms that makes a set of goal atoms true with respect to a First Order Horn background theory. We here consider the acyclic version of the problem where backward reasoning over axioms is guaranteed to introduce a finite set of new terms. A specific challenge in this problem is that input terms and terms invented via backward chaining can be equivalent to other terms, i.e., the unique names assumption is partially not true. Equivalence of terms must be handled explicitly in ASP, which is done by guessing an equivalence relation. This makes the instantiation of most instances infeasible, as the number of invented terms becomes large, due to the grounding blow-up caused by the following constraint: \begin{align*} &\leftarrow \mi{eq(A,B)},\, \mi{eq(B,C)},\, \ensuremath{\raise.17ex\hbox{\ensuremath{\scriptstyle\mathtt{\sim}}}}\xspace \mi{eq(A,C)}. \end{align*} \subsection{Hardware and Software Settings} The experiments were run on a Intel Xeon CPU X3430 2.4 GHz. Time and memory were limited to 600 seconds and 4 GB, respectively. In the following, \wasp-\textsc{lazy} refers to \wasp implementing lazy instantiation of constraints, while \wasp-\textsc{eager} and \wasp-\textsc{post} refer to \wasp implementing eager and postponed propagators, respectively. All versions of \wasp use \gringo version 5.1.0 as grounder, whose grounding time is included in the execution time of \wasp. Moreover, \clingo~\textsc{lazy} and \clingo~\textsc{post} refer to \clingo implementing lazy and postponed propagators, respectively. For the NLU benchmark, we always use unsat-core optimization. \subsection{Discussion of Results} \begin{table}[b!] \caption{Stable Marriage: Number of solved instances and average running time (in seconds).} \label{tab:stable} \centering \footnotesize \setlength{\tabcolsep}{0.2em} \begin{tabular}{rrrrrrrrrrrrrrrr} \toprule \textbf{Pref. (\%)} & \multicolumn{2}{c}{\textbf{\wasp}} & \multicolumn{2}{c}{\textbf{\wasp-\textsc{lazy}}} & \multicolumn{2}{c}{\textbf{\wasp-\textsc{eager}}} & \multicolumn{2}{c}{\textbf{\wasp-\textsc{post}}} & \multicolumn{2}{c}{\textbf{\clingo}} & \multicolumn{2}{c}{\textbf{\clingo-\textsc{lazy}}} & \multicolumn{2}{c}{\textbf{\clingo-\textsc{post}}} &\\ & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t}\\ 0 & 10 & 4.1 & 10 & 4.7 & 10 & 4.6 & 10 & 4.7 & 10 & 10.6 & 10 & 4.2 & 10 & 4.2\\ 5 & 9 & 16.2 & 10 & 4.7 & 10 & 4.3 & 10 & 4.9 & 10 & 23.0 & 10 & 4.6 & 10 & 4.4\\ 10 & 10 & 19.2 & 10 & 4.7 & 10 & 4.3 & 10 & 4.6 & 10 & 34.6 & 10 & 6.4 & 10 & 8.2\\ 15 & 9 & 24.3 & 10 & 4.7 & 10 & 4.4 & 10 & 4.8 & 10 & 42.9 & 10 & 9.6 & 10 & 17.5\\ 20 & 8 & 35.2 & 10 & 4.8 & 10 & 4.6 & 10 & 5.2& 10 & 48.9 & 10 & 16.5 & 10 & 24.7\\ 25 & 10 & 34.8 & 10 & 4.8 & 10 & 5.4 & 10 & 6.0& 10 & 53.9 & 10 & 22.2 & 10 & 42.8\\ 30 & 6 & 97.0 & 10 & 5.0 & 10 & 7.7 & 10 & 7.6& 10 & 59.5 & 10 & 32.2 & 10 & 92.1\\ 35 & 10 & 42.1 & 10 & 5.0 & 10 & 8.2 & 10 & 10.0& 10 & 65.8 & 10 & 62.4 & 10 & 115.9\\ 40 & 9 & 51.3 & 10 & 5.2 & 10 & 7.6 & 10 & 9.2& 10 & 68.4 & 10 & 81.8 & 10 & 117.5\\ 45 & 10 & 113.4 & 10 & 5.4 & 10 & 10.8 & 10 & 12.0& 10 & 71.0 & 10 & 97.7 & 10 & 140.8\\ 50 & 6 & 74.6 & 10 & 5.1 & 10 & 22.4 & 10 & 20.3& 10 & 72.0 & 10 & 153.6 & 10 & 143.4\\ 55 & 9 & 44.5 & 8 & 5.9 & 10 & 39.4 & 10 & 23.6& 10 & 72.9 & 10 & 193.8 & 10 & 166.5\\ 60 & 9 & 70.9 & 10 & 7.7 & 10 & 23.8 & 10 & 25.0& 10 & 74.6 & 10 & 241.1 & 10 & 181.6\\ 65 & 7 & 99.3 & 10 & 11.4 & 10 & 64.7 & 10 & 54.2& 10 & 74.7 & 10 & 295.6 & 10 & 209.8\\ 70 & 9 & 89.3 & 5 & 25.5 & 10 & 121.8 & 10 & 101.8& 10 & 75.0 & 10 & 361.1 & 10 & 235.3\\ 75 & 8 & 77.0 & 0 & - & 10 & 184.0 & 10 & 146.7& 10 & 75.1 & 6 & 472.1 & 10 & 311.0\\ 80 & 7 & 85.5 & 0 & - & 10 & 248.6 & 8 & 274.7& 10 & 76.3 & 0 & - & 10 & 434.3\\ 85 & 4 & 259.5 & 0 & - & 10 & 232.3 & 1 & 337.2& 10 & 82.3 & 0 & - & 7 & 569.7\\ 90 & 9 & 79.2 & 0 & - & 5 & 449.4 & 0 & -& 10 & 251.1 & 0 & - & 1 & 577.7\\ 95 & 10 & 46.3 & 0 & - & 0 & - & 0 & -& 6 & 273.6 & 0 & - & 3 & 580.8\\ 100 & 8 & 67.6 & 1 & 81.2 & 10 & 133.3 & 10 & 153.6& 10 & 74.1 & 6 & 493.3 & 10 & 323.9\\ \bottomrule \end{tabular} \end{table} \paragraph{Stable Marriage.} Concerning Stable Marriage, we executed the 30 instances selected for the Fourth ASP Competition. \clingo and \wasp executed on the full encoding are able to solve 29 out of the 30 instances with an average running time of 50 and 29 seconds, respectively. On the same instances, ad-hoc propagators cannot reach the same performance. Indeed, \wasp-\lazy and \wasp-\post perform the worst solving 0 and 5 instances, respectively, whereas \wasp-\eager is much better with 17 solved instances. The same performance is obtained by \clingo-\lazy and \clingo-\post which can solve 0 and 17 instances in the allotted time, respectively. The poor performance of the lazy instantiation can be explained by looking at the specific nature of the instances. Indeed, each instance contains a randomly generated set of preferences of men for women (resp. women for men). By looking at the instances we observed that each man (resp. woman) has a clear, often total, preference order over each woman (resp. man). This specific case represents a limitation for employing the lazy instantiation. Indeed, \wasp and \clingo executed on the encoding without the stability constraint perform naive choices until a stable model candidate is found. Then, each candidate contains several violations of the stability condition and many constraints are added. However, those constraints are not helpful since they only invalidate the current stable model candidate. In general, for instances where the program without the stability condition is under-constrained many stable model candidates need to be invalidated before an actual solution is found (intuitively, given a program $\Pi$ and a set of constraints $C \subseteq \Pi$, $|SM(\Pi \setminus C)| \gg |SM(\Pi)|$). In order to further analyze this behavior empirically, we have conducted an additional experiment on the same problem. In particular, we randomly generated instances where each man (resp. woman) gives the same preference to each woman (resp. man), so basically the stability condition is never violated. Then, we consider a percentage $k$ of preferences, i.e., each man (resp. woman) gives the same preference to all the women (resp. men) but to $k$\% of them a lower preference is given. In this way, instances with small values of $k$ should be easily solved by lazy instantiation, whereas instances with high values of $k$ should be hard. For each considered percentage $k$, we executed 10 randomly generated instances. Results are reported in Table~\ref{tab:stable}, where the number of solved instances and the average running time are shown for each tested approach. Concerning \wasp, as observed before, for instances where the value of $k$ is small (up to 50\%) the lazy approach can solve all the instances with an average running time of about 5 seconds. On the other hand, for high values of $k$ the advantages of the lazy approach disappear, as observed for the competition instances. Interestingly, the eager propagator obtained the best performance overall. For the tested instances, it seems to benefit of a smaller program and generation of the inferences does not slow down the performance as observed for competition instances. Concerning \clingo, the lazy approach is the best performing one for instances where the value of $k$ is up to 35\%. As shown for \wasp, the performance of the lazy approach are worse for high values of $k$. \paragraph{Packing.} \begin{figure}[t] \figrule \begin{tikzpicture}[scale=0.9] \pgfkeys{% /pgf/number format/set thousands separator = {}} \begin{axis}[ scale only axis , font=\scriptsize , x label style = {at={(axis description cs:0.5,0.04)}} , y label style = {at={(axis description cs:0.05,0.5)}} , xlabel={Number of instances} , ylabel={Execution time (s)} , xmin=0, xmax=50 , ymin=0, ymax=610 , legend style={at={(0.88,0.96)},anchor=north, draw=none,fill=none} , legend columns=1 , width=0.7\textwidth % % % , height=0.3\textwidth , ytick={0,200,400,600} , xtick={0,10,20,30,40,50} , major tick length=2pt ] \addplot [mark size=2.5pt, color=blue, mark=o] [unbounded coords=jump] table[col sep=semicolon, y index=3] {./packing.csv}; \addlegendentry{\wasp-\textsc{lazy}} \addplot [mark size=2.5pt, color=blue, mark=square] [unbounded coords=jump] table[col sep=semicolon, y index=1] {./packing.csv}; \addlegendentry{\wasp-\textsc{eager}} \addplot [mark size=2pt, color=blue, mark=diamond] [unbounded coords=jump] table[col sep=semicolon, y index=2] {./packing.csv}; \addlegendentry{\wasp-\textsc{post}} \addplot [mark size=2pt, color=black, mark=*] [unbounded coords=jump] table[col sep=semicolon, y index=5] {./packing.csv}; \addlegendentry{\clingo-\textsc{lazy}} \addplot [mark size=2pt, color=black, mark=diamond*] [unbounded coords=jump] table[col sep=semicolon, y index=4] {./packing.csv}; \addlegendentry{\clingo-\textsc{post}} \end{axis} \end{tikzpicture} % \caption{Packing: Comparison of \textsc{lazy} and \textsc{propagators} approaches on 50 instances.}\label{fig:packing} \figrule \end{figure} Concerning Packing problem, we considered all 50 instances submitted to the Third ASP Competition. Interestingly, when all constraints are considered none of the instances can be instantiated within the time limit. Thus, \clingo and \wasp do not even start the computation of a stable model. The grounding time substantially decreases when the two sets of expensive constraints described in Section~\ref{sec:benchdescription} are removed from the encoding. Indeed, in this case, the grounding time on the tested instances is 5 seconds on average, with a peak of 16 seconds. Results of the lazy constraint instantiation and of constraint propagators on the resulting program are reported in the cactus plot of Figure~\ref{fig:packing}. The graph highlights that \wasp-\textsc{eager}, \wasp-\textsc{post}, and \clingo-\textsc{post} basically obtained the same performance. Indeed, the first two solve all the tested instances with an average running time of~22 and~23 seconds, respectively, while \clingo-\textsc{post} solves 49 out of 50 instances with an average running time of 25 seconds. Both \wasp-\textsc{post} and \clingo-\textsc{post} outperform their lazy counterparts. Indeed, \wasp-\textsc{lazy} solves~10 instances, with an average running time of~226 seconds, while \clingo-\textsc{lazy} solves~5 instances, with an average running time of~301 seconds. As already observed on the Stable Marriage instances, lazy instantiation cannot compete with constraint propagators. In this experiment, we observed that \wasp and \clingo perform naive choices on the encoding without the expensive constraints, thus each candidate stable model contains several violations of constraints, leading to inefficient search in harder instances. \paragraph{Natural Language Understanding (NLU).} \begin{table}[b!] \caption{NLU Benchmark: Number of solved instances and average running time (in seconds).} \label{tab:nlu} \footnotesize \centering \setlength{\tabcolsep}{0.2em} \begin{tabular}{lrrrrrrrrrrrrrr} \toprule \textbf{Obj. Func.} & \multicolumn{2}{c}{\textbf{\wasp}} & \multicolumn{2}{c}{\textbf{\wasp-\textsc{lazy}}} & \multicolumn{2}{c}{\textbf{\wasp-\textsc{eager}}} & \multicolumn{2}{c}{\textbf{\wasp-\textsc{post}}} & \multicolumn{2}{c}{\textbf{\clingo}} & \multicolumn{2}{c}{\textbf{\clingo-\textsc{lazy}}} & \multicolumn{2}{c}{\textbf{\clingo-\textsc{post}}}\\ & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t} & \textbf{sol.} & \textbf{avg t} \\ Card. & 43 & 39.7 & 50 & 2.3 & 50 & 4.3 & 50 & 3.3 & 41& 30.7 & 50 & 4.5 & 50 & 1.5\\ Coh. & 43 & 40.1 & 50 & 18.5 & 50 & 8.8 & 50 & 6.3 & 41 & 30.7 & 49 & 24.6 & 49 & 15.8\\ W. Abd. & 43 & 49.3 & 50 & 26.6 & 49 & 66.1 & 50 & 62.6 & 41 & 33.9 & 48 & 31.9 & 50 & 24.0\\ \bottomrule \end{tabular} \end{table} Concerning NLU, we considered all 50 instances and all three objective functions used in \cite{DBLP:journals/fuin/Schuller16}. Results are reported in Table~\ref{tab:nlu}. As a general observation, all the tested instances are solved by \wasp-\textsc{lazy} and \wasp-\textsc{post}, no matter the objective function. Moreover, \wasp-\textsc{lazy} is on average faster than all other alternatives for both the objective functions cardinality and weighted abduction. The good performance of lazy instantiation is related to the small number of failing stable model checks performed. Indeed, only 2, 16, and 64 invalidations are on average required for cardinality, coherence, and weighted abduction, respectively. The number of propagation calls is much higher for \wasp-\textsc{eager} than for \wasp-\textsc{post} (approximately \wasp-\textsc{eager} performs 3 times more propagation calls than \wasp-\textsc{post}). However, the number of propagated literals that are not immediately rolled back because of a conflict is very similar, hence it is clear that \wasp-\textsc{eager} performs a lot of unnecessary propagations in this benchmark and \wasp-\textsc{post} should be preferred. Note that this is not generally the case for other benchmarks. Concerning \clingo, 45, 248, and 321, stable model candidates are invalidated with \clingo-\lazy, respectively, and a similar amount (26, 589, and 700, respectively) with \clingo-\post. This shows that \clingo tends to produces more stable models that violate lazy constraints. These violations are detected earlier with \clingo-\post, therefore it outperforms \clingo-\lazy in all objectives. None of the \clingo propagators is able to solve all instances with all objectives, whereas \wasp-\post solves all of them within 600~s. In particular for objective functions cardinality and coherence, \wasp is always slightly faster and uses slightly more memory than \clingo. For weighted abduction, \clingo-\post is most efficient with \wasp-\lazy in second place. Nevertheless, using \clingo or \wasp with a \lazy or \post propagator will always be an advantage over using the pure ASP encoding where the constraints are instantiated prior to solving. Hence the choice of the method for instantiating constraints is more important than the choice of the solver. \paragraph{Discussion.}\label{par:discussion} We empirically investigated whether lazy instantiation or propagators can be a valid option for enhancing the traditional ``ground+solve'' approach. When the full grounding is infeasible, then both lazy instantiation and propagators can overcome this limitation, even though they exhibit different behaviors depending on the features of the problem and of the instances. This is particularly evident in Packing, where no instance can be grounded within the time limit. Since propagators are activated during the search, while lazy instantiation intervenes only when a total interpretation is computed, propagators are preferable when the problematic constraint is important to lead the search toward a solution (as overlap constraints in Packing). On the other hand, a high number of unnecessary propagations can make propagators inefficient and even slower than the lazy approach. In these cases, we observed that post propagators are better than eager propagators as remarked by the results on the objective function `weighted abduction' in the NLU benchmark. The experiment on Stable Marriage highlights that lazy instantiation is effective when few constraints are instantiated during the search. This is the case when: (i) it is very likely that a stable model of the simplified (i.e., without problematic constraints) input program also satisfies the lazy constraints; or (ii) the solver heuristics is such that one of the first candidate total interpretations also satisfies the lazy constraints. This is also confirmed in the NLU benchmark where the instances often have the above characteristics, and the propagator is better only when the constraints generated by the lazy approach do not fit the working memory. Moreover, from case (ii), we conjecture that the lazy approach can be effective in combination with domain-specific heuristics~\cite{DBLP:conf/aaai/GebserKROSW13,DBLP:journals/tplp/DodaroGLMRS16}. Finally, we conducted an additional experiment, where we do not oppose our approaches with the ground+solve one as in the previous cases, but it only aims at comparing the lazy propagation versus propagators in a controlled setting. In particular, we considered a synthetic benchmark based on the well-known 3-SAT problem that is interesting for our study since it allows us to control both the hardness of the instances and the probability that an interpretation satisfies the constraint. Indeed, we generated the instances uniformly at random in a range centered on the phase transition~\cite{DBLP:series/faia/Achlioptas09}. % We used a straightforward ASP encoding where we guess an interpretation and we check by a single (non-ground) constraint whether this satisfies all clauses. The results are summarized in Figure \ref{fig:threesat} where we present two representative runs on formulas with 220 and 280 Boolean variables, respectively. Since eager and post propagators behave very similarly we only show comparisons between eager propagator and a lazy instantiation. Expectedly, execution times follow the easy-hard-easy pattern~\cite{DBLP:series/faia/Achlioptas09}, centered on the phase transition, while varying the ratio $R$ of clauses over variables. Initially, the problem is very easy and both approaches are equally fast. Then there is an interval in which the lazy approach is preferable, and finally the eager approach becomes definitely better than the lazy. Note that, on formulas with 220 variables (see Figure~\ref{fig:3-sat-220}) the lazy approach is preferable also on the hardest instances, instead with 280 variables (see Figure~\ref{fig:3-sat-280}) the eager approach becomes more convenient before the phase transition. To explain this phenomenon we observe that the lazy approach can be exemplified by assuming that the solver freely guesses a model and then the lazy instantiator checks it, until every clause is satisfied by an assignment or no model can be found. The probability that a random model satisfies all clauses is $(\frac{7}{8})^k$ where $k$ is the number of clauses, thus fewer tries are needed on average to converge to a solution if the formula has fewer clauses. This intuitively explains why, as the number of variables increases, the eager approach becomes more convenient at smaller and smaller values of $R$. It is worth pointing out that this simplified model does not fully capture the behavior of lazy instantiation that is more efficient in practice, since the implementation learns from previous failures (by instantiating violated constraints). \begin{figure} \figrule \begin{subfigure}{.5\textwidth} % \begin{tikzpicture} \pgfkeys{% /pgf/number format/set thousands separator = {}} \begin{axis}[ scale only axis , font=\scriptsize , x label style = {at={(axis description cs:0.5,0.04)}} , y label style = {at={(axis description cs:0.05,0.5)}} , xlabel={Number of clauses / number of variables} , ylabel={Execution time (s)} , xmin=2.5, xmax=5.5 % , ymin=0.04, ymax=40 , log basis y=10, ytickten={-1,0,1} , ymode=log % , legend style={at={(0.25,0.85)},anchor=north, draw=none,fill=none, font=\tiny} , legend columns=1 , width=0.65\textwidth , height=0.3\textwidth , xtick={3,3.5,4,4.5,5} , major tick length=2pt ] \addplot [mark size=1.5pt, color=blue, mark=x] [unbounded coords=jump] table[col sep=semicolon, y index=2] {./3-sat-220.csv}; \addlegendentry{\wasp-\textsc{lazy}} \addplot [mark size=1.5pt, color=red, mark=o] [unbounded coords=jump] table[col sep=semicolon, y index=1] {./3-sat-220.csv}; \addlegendentry{\wasp-\textsc{eager}} % \draw[dotted] (axis cs: 4.26, 0.04) -- (axis cs: 4.26, 40); \end{axis} \begin{axis}[ scale only axis , axis y line*=right , font=\scriptsize , x label style = {at={(axis description cs:0.5,0.04)}} , y label style = {at={(axis description cs:0.05,0.5)}} , xlabel={Number of clauses / number of variables} , ylabel={Frequency of UNSAT} , ylabel near ticks, yticklabel pos=right , xmin=2.5, xmax=5.5 , ymin=-0.05, ymax=1.05 % , legend style={at={(0.25,0.98)},anchor=north, draw=none,fill=none, font=\tiny} , legend columns=1 , width=0.65\textwidth % % , ytick={0,0.5,1} , height=0.3\textwidth , xtick={3,3.5,4,4.5,5} , major tick length=2pt ] \addplot [dashed, mark size=1pt, color=black] [unbounded coords=jump] table[col sep=semicolon, y index=1] {./phaseTransition.csv}; \addlegendentry{\textsc{unsat freq.}} \end{axis} \end{tikzpicture} % % % \caption{Results with 220 variables}\label{fig:3-sat-220} \end{subfigure}% \begin{subfigure}{.5\textwidth} % \begin{tikzpicture} \pgfkeys{% /pgf/number format/set thousands separator = {}} \begin{axis}[ scale only axis , axis y line*=left , font=\scriptsize , x label style = {at={(axis description cs:0.5,0.04)}} , y label style = {at={(axis description cs:0.05,0.5)}} , xlabel={Number of clauses / number of variables} , ylabel={Execution time (s)} , xmin=2.5, xmax=5.5 % , ymin=0.04, ymax=4000 , ymode=log % , legend style={at={(0.25,0.85)},anchor=north, draw=none,fill=none, font=\tiny} , legend columns=1 , width=0.65\textwidth , height=0.3\textwidth , xtick={3,3.5,4,4.5,5} , major tick length=2pt ] \addplot [mark size=1.5pt, color=blue, mark=x] [unbounded coords=jump] table[col sep=semicolon, y index=2] {./3-sat-280.csv}; \addlegendentry{\wasp-\textsc{lazy}} \addplot [mark size=1.5pt, color=red, mark=o] [unbounded coords=jump] table[col sep=semicolon, y index=1] {./3-sat-280.csv}; \addlegendentry{\wasp-\textsc{eager}} % \draw[dotted] (axis cs: 4.28, 0.04) -- (axis cs: 4.28, 4000); \end{axis} \begin{axis}[ scale only axis , axis y line*=right , font=\scriptsize , x label style = {at={(axis description cs:0.5,0.04)}} , y label style = {at={(axis description cs:0.05,0.5)}} , xlabel={Number of clauses / number of variables} , ylabel={Frequency of UNSAT} , ylabel near ticks, yticklabel pos=right , xmin=2.5, xmax=5.5 , ymin=-0.05, ymax=1.05 % , legend style={at={(0.25,0.98)},anchor=north, draw=none,fill=none, font=\tiny} , legend columns=1 , width=0.65\textwidth % % , ytick={0,0.5,1} , height=0.3\textwidth , xtick={3,3.5,4,4.5,5} , major tick length=2pt ] \addplot [dashed, mark size=1pt, color=black] [unbounded coords=jump] table[col sep=semicolon, y index=2] {./phaseTransition.csv}; \addlegendentry{\textsc{unsat freq.}} \end{axis} \end{tikzpicture} % \caption{Results with 280 variables}\label{fig:3-sat-280} % \end{subfigure} \caption{3-SAT experiments. Red and blue lines correspond to eager propagators and lazy instantiation respectively. The dashed black line represents the percentage of UNSAT instances, while the vertical dotted line evidences the phase transition point (frequency is about $0.5$ at $R=4.26$).}% \label{fig:threesat} \figrule \end{figure} \portfoliotable{b!} \subsection{On the applicability of techniques for automatic algorithm selection}\label{sec:portfolio} The analysis conducted up to now shows that there is not always a clear winner among the strategies for realizing constraints, since the best solving method depends on characteristics of the encoding and the instance at hand. In similar scenarios, portfolio approaches which automatically choose one out of a set of possible methods have proven to be very effective in increasing system performance, since they combine the strengths of the available methods. Therefore, we investigated whether algorithm selection techniques can improve performance in our context.% We apply basic algorithm selection based on classification with machine learning: we extract some natural features from each instance, and train a C4.5 \cite{Quinlan1993c45} classifier to predict the best solving method (i.e., the one that required least amount of time) among all the available ones (including the plain solver). We limit our analysis to Stable Marriage and NLU, because in these domains none of the available methods is clearly superior. As features for stable marriage we used the number of persons and the percentage or preferences, % for NLU we used the number of facts and the number of distinct constants and (instance-specific) predicates. We create portfolios for both \wasp-based and \clingo-based implementations. Table \ref{tab:portfolio} shows the results of our evaluation using 10-fold cross-validation (i.e., we split the set of instances into 10 partitions and use each partition as test set while training on the remaining partitions). For each problem we report (weighted average) precision, recall, and f-measure of the prediction, as well as the average performance gain of the portfolio (i.e., by gain we mean the difference in percentage between the sum of the execution times measured for the portfolio and for its best method). We observe that the classifier is able to choose the best algorithm in many cases, and the choice is almost ideal in NLU (f-measure of 0.9 for \wasp and 0.84 for \clasp). The portfolios are always faster (in terms of execution times) than the corresponding best method for the respective problem. The performance gain peaks to 38\% for the \wasp-based, and is less pronounced for the \clingo-based (peak at 13.6\%). This is expected since \clingo features a basic solver that is more competitive with propagator-based solutions in these domains. Summarizing, these results confirm that already the application of basic portfolio techniques is a viable option for improving the performance when propagators are available. \section{Related Work} The grounding bottleneck in ASP has been subject of various studies. The most prominent grounding-less approach that works on plain ASP is \textit{lazy grounding}, which was implemented by \textsc{asperix}~\cite{DBLP:conf/lpnmr/LefevreN09a}, \textsc{gasp}~\cite{DBLP:journals/fuin/PaluDPR09}, and \textsc{omiga}~\cite{DBLP:conf/jelia/Dao-TranEFWW12}. Differently from our approach that is focused on constraints, these solvers perform lazy instantiation for \emph{all} the rules of a program, and do not perform (conflict) clause learning. Weinzierl~\shortcite{Weinzierl2017} recently investigated learning of non-ground clauses. Lazy instantiation of constraints was topic of several works on \emph{integrating ASP with other formalisms}. These include CASP~\cite{DBLP:conf/asp/BaseliceBG05,DBLP:journals/tplp/OstrowskiS12,DBLP:journals/corr/BalducciniL17}, ASPMT~\cite{DBLP:conf/iclp/SusmanL16}, BFASP~\cite{DBLP:journals/tplp/AzizCS13}, and HEX \cite{DBLP:journals/tplp/EiterFIKRS16}. Differently from our approach, these approaches are based on syntactic extensions that enable the combination of ASP solvers with solvers for external theories. HEX facilitates the integration of generic computation oracles as literals in ASP rule bodies, and allows these computations not only to return true or false, but also to inject constraints into the search. This gave rise to the `on-demand constraint' usage pattern of external atoms \cite{DBLP:conf/birthday/EiterRS16} which roughly corresponds with the \lazy propagators in this work. HEX also permits a declarative specification of properties of external computations \cite{DBLP:journals/tplp/Redl16}, e.g., antimonotonicity with respect to some part of the model. Such specifications automatically generate additional lazy constraints. % Integration of ASP with continuous motion planning in robotics, based on HEX, was investigated in \cite{DBLP:journals/aicom/ErdemPS16}: adding motion constraints in a \post propagator was found to be significantly faster than checking only complete stable model candidates (\lazy). For integrating \emph{CModels with BProlog} \cite{DBLP:journals/tplp/BalducciniL13} it was shown that using BProlog similar as a \post propagator (clearbox) performs better than using it as a \lazy propagator (black-box). De~Cat et al.~\shortcite{DBLP:journals/jair/CatDBS15} provide a theory and implementation for \emph{lazy model expansion} within the FO(ID) formalism which is based on \emph{justifications} that prevent instantiation of certain constraints under assumptions. These assumptions are relative to a model candidate and can be revised from encountered conflicts, leading to a partially lazy instantiation of these constraints. We finally observe that lazy constraints can be seen as a simplified form of lazy clause generation that was originally introduced in Constraint Programming~\cite{DBLP:conf/cp/FeydyS09}. \section{Conclusion}\label{sec:conclusion} In this paper, we compared several solutions for addressing the problem of the grounding bottleneck focusing on the practically-relevant case of problematic constraints without resorting to any language extension. The considered approach can be seen as a natural extension of the ``ground+solve'' paradigm, adopted by state of the art ASP systems, where some constraints are replaced either by lazy instantiators or propagators. The solutions fit CDCL-based solving strategies, and can be implemented using APIs provided by state of the art solvers. Experiments conducted on both real-world and synthetic benchmarks clearly outline that all the approaches can solve instances that are out of reach of state of the art solvers because of the grounding blowup. Lazy instantiation is the easiest to implement, and it is the best choice when the problematic constraints have a high probability to be satisfied. Otherwise, eager and post propagators perform better, with the latter being slightly more efficient when the constraint is activated more often during propagation. Our empirical analysis shows that there is not always a clear winner for a given problem, thus we investigated the applicability of algorithm selection techniques. We observed that a basic portfolio can improve on the best strategy also on these cases. As far as future work is concerned, we will study what are the conditions under which an entire subprogram (and not just some constraints) can be replaced by a propagator. Another line of research might be to investigate the impact of applying rule decomposition techniques before handling the constraints~\cite{DBLP:journals/tplp/BichlerMW16}. \section*{Acknowledgments} The paper has been partially supported by the Italian Ministry for Economic Development (MISE) under project ``PIUCultura -- Paradigmi Innovativi per l'Utilizzo della Cultura'' (n. F/020016/01-02/X27), under project ``Smarter Solutions in the Big Data World (S2BDW)'' (n. F/050389/01-03/X32) funded within the call ``HORIZON2020'' PON I\&C 2014-2020, and by the Scientific and Technological Research Council of Turkey (TUBITAK) Grant 114E777. \ifinlinerefs \input{references.sty} \else \bibliographystyle{acmtrans}
\section*{\hfil#1\hfil}} \renewcommand{\baselinestretch}{0.894} \title{\LARGE \bf An Earthworm-Inspired Soft Crawling Robot Controlled by Friction}% \author{Joey Z. Ge, Ariel A. Calder\'{o}n, and N\'{e}stor O. P\'{e}rez-Arancibia% \thanks{This work was partially supported by the USC Viterbi School of Engineering through graduate fellowships to J. Z. Ge and A. A. Calder\'{o}n, and a start-up fund to N. O. P\'{e}rez-Arancibia. Additional support was provided by the Chilean National Office of Scientific and Technological Research (CONICYT) through a graduate fellowship to A. A. Calder\'{o}n.}% \thanks{The authors are with the Department of Aerospace and Mechanical Engineering, University of Southern California (USC), Los Angeles, CA 90089-1453, USA (e-mail: {\tt <EMAIL>}; {\tt <EMAIL>}; {\tt <EMAIL>}).}}% \begin{document} \maketitle \thispagestyle{empty} \pagestyle{empty} \begin{abstract} We present the design, fabrication, modeling and feedback control of an earthworm-inspired soft robot that crawls on flat surfaces by actively changing the frictional forces acting on its body. Earthworms are segmented and composed of repeating units called \textit{metameres}. During crawling, muscles enable these metameres to interact with each other in order to generate peristaltic waves and retractable \textit{setae} (bristles) produce variable traction. The proposed robot crawls by replicating these two mechanisms, employing pneumatically-powered soft actuators. Using the notion of controllable subspaces, we show that locomotion would be impossible for this robot in the absence of friction. Also, we present a method to generate feasible control inputs to achieve crawling, perform exhaustive numerical simulations of feedforward-controlled locomotion, and describe the synthesis and implementation of suitable real-time friction-based feedback controllers for crawling. The effectiveness of the proposed approach is demonstrated through analysis, simulations and locomotion experiments. \end{abstract} \section{Introduction} \label{sec01} Animal locomotion has long been a source of inspiration for robotic research. In particular, the study of limbless crawling has attracted significant attention during the past few years as the most effective method of traveling on unstructured terrains~\cite{ref01, ref02}. One of the most studied species that travel with a limbless gait is the \textit{nightcrawler}, a type of earthworm (\textit{Lumbricus terrestris}). A typical nightcrawler remains underground during the day and crawls above ground at night. As result of this behavior, they have evolved locomotive mechanisms that enable them to maneuver through their labyrinthine underground burrows and crawl over complex terrains. Specifically, nightcrawlers locomote by employing peristalsis, a motion pattern produced by the coordinated and repeated successive contraction and relaxation of the longitudinal and circular muscles embedded in the animals' \textit{metameres} (independent body segments). This periodic pattern can be thought of as a retrograde wave that travels along an earthworm's body to propel it forward using friction-induced traction~\cite{ref03, ref04, ref05}. In the case of nightcrawlers, traction is modulated employing microscopic bristle-like skin structures called \textit{setae}~\cite{ref06, ref07}. Versatility, robustness and spatial efficiency make the nightcrawler's peristaltic gait a very attractive natural model for robotic locomotion development. Numerous research projects have focused on creating robots that can replicate these earthworms' peristalsis-based locomotion, adopting a variety of different actuation technologies, including \textit{shape memory alloys} (SMAs)~\cite{ref08, ref09, ref10}, magnetic fluids~\cite{ref11} and electric motors~\cite{ref12, ref13, ref14}. Additionally, recent innovations in fabrication methods have enabled the development of biologically-inspired soft actuators, soft sensors and flexible electronics~\cite{ref15,ref16,ref17}. An earthworm-inspired burrowing robot that incorporates these technologies is presented in~\cite{ref18}. That artificial worm was designed to inspect and clean pipes, so its movements and functionalities are constrained to the interior of tubes with diameters in a limited predefined range. As expected, those prototypes are not capable of crawling on open surfaces, which is the problem addressed by the research presented in this paper. Here, we introduce a new soft robot capable of crawling on flat surfaces, whose basic conceptual design is inspired by the functionality of the \textit{abstract notion} of a two-metamere earthworm. In this design, in order to produce the peristalsis-based retrograde waves required for crawling, a single central linear pneumatic actuator produces the deformations and forces that emulate the axial actions of metameres during earthworm locomotion. Two \textit{extremal} pneumatic actuators produce and modulate the friction forces necessary to alternately anchor the robot's \textit{extremes} to the ground, which is the crucial action in the generation of friction-based crawling. The essential mechanism underlying most forms of terrestrial locomotion is friction. Drawing inspiration from nature, researchers have developed several different methods to exploit friction forces, including gecko-inspired adhesives~\cite{ref19}, microspine-based anchors~\cite{ref20, ref21} and anisotropic friction mechanisms~\cite{ref22, ref23}. In the context of soft robotics,~\cite{ref24} presents a robot that employs materials with different coefficients of friction and a pair of unidirectional clutches to manipulate frictional forces to generate locomotion. In the robot presented here, each extremal actuator, made of silicone rubber, varies the friction coefficient between its surface of contact and the ground by expanding and contracting inside a hard 3D-printed smooth casing. This device is designed such that when the actuator is inflated, its silicone-rubber surface touches the ground, producing high friction. Conversely, when the actuator is deflated, its surface does not touch the ground and only the smooth edges of the casing make contact with the supporting surface, thus producing low friction. Friction is a nonlinear phenomenon, and consequently, the complete dynamics of the system presented here is both nonlinear and time-varying. However, by treating the forces generated by the central actuator and the friction forces as inputs, the robot's dynamics can be described by a \textit{linear time-invariant} (LTI) state-space model. This reduced-complexity model enables analysis of the system's controllability and is instrumental in determining that locomotion is not feasible in the absence of friction. We explicitly show that the controllability subspace associated with the zero-friction case contains only states that define a constant position of the system's center of mass with respect to the inertial frame of reference. Further analysis shows that if actuation and friction forces were to be chosen at will, the system would become fully controllable. This finding, despite being based on physically unattainable assumptions, indicates that there exists an infinite number of theoretically feasible gaits, and that biologically-inspired locomotion modes represent only a small set of what is possible to achieve with this framework. \begin{figure}[t!] \vspace{1ex} \begin{center} \includegraphics[width=0.46\textwidth]{fig01.pdf} \end{center} \vspace{-1.5ex} \caption{\textbf{(a) Metamere:} A metamere expands radially when its longitudinal muscles contract and expand longitudinally when its circular muscles contract. When a metamere is undergoing radial expansion, the 4 pairs of setae on its ventral and lateral surfaces will protrude and anchor it to the ground. \textbf{(b) Peristaltic crawling motion:} A \textit{stride} is defined as a complete cycle of peristalsis and the \textit{stride length} is the total distance advanced during one stride. The \textit{protrusion time} is defined as the time span during which an earthworm moves forward within a stride. The head of the earthworm covers the stride length by the end of the protrusion time. Correspondingly, the \textit{stance time} is the period during which the head of a earthworm remains anchored to the ground while the rest of the animal body recovers to the initial state. The sum of the protrusion time and stance time is the \textit{stride period}. The thin dotted lines track the retrograde wave. \textbf{(c) Earthworm-inspired crawling robot:} The robot consists of two hard casings, a central actuator, a pair of front and rear actuators constrained by elastomeric o-rings, two machined steel plates, and pneumatic components. \label{fig01}} \vspace{-4ex} \end{figure} The rest of the paper is organized as follows. Section~\ref{sec02} introduces the major concepts unique to earthworm-inspired locomotion. Section~\ref{sec03} presents a reduced-complexity dynamic model of the proposed robot and a set of locomotion simulations. Section~\ref{sec04} explains the design and fabrication processes of the soft-robotic components. Section~\ref{sec05} describes the locomotion planning and associated control strategy. Experimental results are presented and discussed in Section~\ref{sec06}. Lastly, Section~\ref{sec07} states the main conclusions of the presented research and provides directions for the future. \vspace{-1ex} \section{Earthworm-Inspired Locomotion} \label{sec02} Earthworms belong to the phylum \textit{annelida}, characterized by their segmented body structures. During locomotion, each ring-shaped segment (metamere) is actively reconfigured by the actions of layers of both longitudinal and circular muscle, as illustrated in Fig.~\ref{fig01}-(a). Internal sealed cavities in earthworms' bodies, referred to as \textit{coeloms}, are filled with incompressible fluid so that the volume of each metamere remains constant while reshaping and the structural integrity of the animal is continually preserved. Anatomical schemes of this type are known as hydrostatic skeletons. Also, the fluid inside each coelom is constrained within each metamere, partitioned by \textit{septa} so that there is no movement of fluid across body segments~\cite{ref05}. Such segmentation preserves, to some extent, the locomotion independence of each metamere, enhancing earthworms' overall mobility~\cite{ref03}. Thus, in order for an earthworm to locomote, the longitudinal and circular muscles of each segment contract alternately, causing each segment to shorten (expanding radially) and elongate (shrinking radially) according to the sequential pattern depicted in Fig.~\ref{fig01}-(b). Such motions from head to tail create the retrograde peristaltic gaits characteristic of worms. It can be proved mathematically that peristalsis-based crawling requires sufficient traction between anchoring metameres and the ground. In the case of \textit{oligochaetas}, the subclass of \textit{annelida} to which earthworms belong, traction is produced and modulated by retractable setae, as depicted in Fig.~\ref{fig01}-(a). Some species of earthworm are both geophagous (earth-eaters) and surface-feeders~\cite{ref06}. That is the case of nightcrawlers, which emerge from their burrows and crawl on ground at night and remain underground during daytime~\cite{ref25}. To transition and adapt to these two different surroundings, they switch between peristalsis-based crawling and burrowing locomotion modes. A worm-inspired burrowing soft robot was presented in~\cite{ref18} and here we extend that work to the crawling case, which requires the active control of friction. This friction-based control strategy is loosely inspired by the morphology of nightcrawlers, which have evolved setae only on the ventral and lateral surfaces of each metamere to facilitate traction during surface crawling, as illustrated in Fig.~\ref{fig01}-(a). On the other hand, most purely geophagous earthworms have setae arranged in a ring around each body segment~\cite{ref05, ref07}. During crawling, setae protrude from radially expanding metameres (longitudinal muscle contraction) and anchor into the substratum to provide traction, thus preventing slipping while adjacent body segments contract or expand. Once a metamere's circular muscle starts to contract, the longitudinal muscle relaxes and the setae retract from the ground to allow for the segment to slide forward. The basic crawling gait of the robot presented in this paper is loosely based on the nightcrawler's crawling mechanism, depicted in Fig.~\ref{fig01}-(b). Following~\cite{ref06}, we define a \textit{stride} as one cycle of peristalsis and describe the crawling kinematics as a function of four variables: \textit{stride length}, \textit{protrusion time}, \textit{stance time} and \textit{stride period} (illustrated in Fig.~\ref{fig01}-(b)). For simplicity, despite the fact that earthworms have numerous segments with staggered stride periods, we define these kinematic variables in relation to an earthworm's first segment. A prototype of the proposed robot is shown in Fig.~\ref{fig01}-(c). This system can be thought of as a two-metamere crawling artificial worm composed of pneumatic soft actuators that emulate earthworms' muscle structures as well as hard casings employed in friction regulation. The processes of locomotion modeling, robotic design, fabrication and controller development are discussed in the next sections. \vspace{-3ex} \begin{figure}[t!] \vspace{1ex} \begin{center} \includegraphics[width=0.48\textwidth]{fig02.pdf} \end{center} \vspace{-2ex} \caption{Reduced-complexity mass-spring-damper model of the robot in Fig.~\ref{fig01}-(c). A controllability analysis is carried out for two cases: without friction and with frictions $f_1$ and $f_2$ included as inputs. The values of $f_1$ and $f_2$ are positive when the associated vector forces act in the same direction as $\bs{i}$, and are negative, when the vector forces act in the opposite direction as $\bs{i}$. \label{fig02}} \vspace{-3ex} \end{figure} \section{Dynamic Modeling and Simulations} \label{sec03} \subsection{Robot Dynamics and Controllability Analysis} \label{sec03a} Several of the existing earthworm-inspired robots consist of three sections: a pair of posterior and anterior actuators that serve as artificial circular muscles, and an axial central actuator, which is the analogue of an earthworm's longitudinal muscle~\cite{ref10,ref18,ref26}. Limited by their configurations, those robots can only travel inside pipes with predetermined diameters. Thus, to locomote, a robot of that type replicates the peristaltic burrowing gaits of earthworms according to a scheme in which its anterior and posterior actuators alternately provide anchoring by pressure to the internal surface of a pipe, while its longitudinal actuator extends and contracts to generate displacements along the pipe's axial axis. In this section, employing a reduced-complexity dynamic model, linear system theory and experimental data from~\cite{ref18}, we develop the analytical tools necessary to generate a conceptual design for an earthworm-inspired pneumatically-driven soft robot capable of crawling on flat surfaces. An abstraction of this system is shown in Fig.~\ref{fig02}. In this case, given its function and elastic characteristics, a longitudinal actuator is modeled as a massless elastic spring with stiffness constant $k$ and two forces with opposite directions and identical magnitudes $f_\textrm{a}$ (shown in Fig.~\ref{fig02}). The anterior and posterior actuators are modeled as two blocks with masses $m_1$ and $m_2$, capable of varying their friction coefficients with the ground in real time in order to modulate the resulting values of the friction forces $f_1$ and $f_2$. For a pneumatically-driven axial actuator of the type in~\cite{ref18} and Fig.~\ref{fig01}-(c), the magnitude of the produced driving force can be estimated as \begin{align} f_{\tf{a}}(t) = s_{\tf{a}} p_{\tf{a}}(t), \end{align} where $p_{\tf{a}}$ and $s_{\tf{a}}$ are the instantaneous internal air pressure and constant cross-sectional area of the actuator, respectively. Note that in this model, in agreement with the experimental data presented in~\cite{ref18}, $k$ is considered to be constant. This approximation is sufficiently accurate for purposes of design, controllability analysis and controller synthesis. However, the true stiffness of the actuator is nonlinear, time-varying and depends on the air pressure inside the soft structure. Lastly, energy dissipation is modeled by a damper with a constant $c$ to be empirically identified. To address the problem of controllability, we first consider the frictionless case, in which the force magnitude $f_\textrm{a}$ is the sole input to the system. Thus, by defining $x_1$ and $x_2$ as the position variations of $m_1$ and $m_2$ with respect to an inertial frame of reference, and the corresponding speeds $v_1 = \dot{x}_1$ and $v_2 = \dot{x}_2$, we describe the system with the \textit{single-input--multi-output} (SIMO) state-space realization \begin{align} \begin{split} \dot{x} (t) &= Ax(t)+B_0u_0(t), \\ y(t) &= Cx (t)+Du_0(t), \end{split} \label{eqn:eqlabel{2}} \end{align} where \begin{align*} A &= \left[ \begin{array}{cccc} ~0 & ~1 & ~0 & ~0 \\ -\frac{k}{m_1} & -\frac{c}{m_1} & ~\frac{k}{m_1} & ~\frac{c}{m_1} \\ ~0 & ~0 & ~0 & ~1 \\ ~\frac{k}{m_2} & ~\frac{c}{m_2} & -\frac{k}{m_2} & -\frac{c}{m_2} \\ \end{array} \right],~ B_0 = \left[\begin{array}{c} ~0 \\ -\frac{1}{m_1} \\ ~0 \\ ~\frac{1}{m_2} \end{array} \right],\\ C &= \left[ \begin{array}{cccc} 1 & 0 & 0 & 0 \\ 0 & 1 & 0 & 0 \\ 0 & 0 & 1 & 0 \\ 0 & 0 & 0 & 1 \\ \end{array} \right] , ~D = \left[\begin{array}{c} 0 \\ 0 \\ 0 \\ 0 \end{array} \right], ~x = y = \left[\begin{array}{c} x_1 \\ \dot{x}_1 \\ x_2 \\ \dot{x}_2 \end{array} \right], \label{eqn:eqlabel{3}} \end{align*} and $u_0 = f_{\tf{a}}$. In this case, the controllability matrix $\mathcal{C}_{0} = \left[ \begin{array}{cccc} B_0 & AB_0 & A^2B_0 & A^3B_0 \end{array} \right]$ has rank~$2$, thus the system is not controllable, meaning that there exists a set of states that cannot be reached from any possible initial state by the action of input signals~\cite{ref27}. Associated with $\mathcal{C}_{0}$ is the controllable subspace, defined as $\mathcal{C}_{AB_0} = \tf{Image} \left\{ \mathcal{C}_{0} \right\}$, which is equivalent to the set of reachable states from the initial condition $x(0) = 0$, $\mathcal{R}_{\tf{t}}$~\cite{ref28}. It follows that $\mathcal{R}_{\tf{t}} = \mathcal{C}_{AB_0} = \tf{Span} \left\{ \chi_1, \chi_2\right\}$, where \begin{align} \chi_1 = \left[ \begin{array}{c} ~1 \\ ~0 \\ -\frac{m_1}{m_2} \\ ~0 \end{array} \right],~ \chi_2 = \left[ \begin{array}{c} ~0 \\ ~1 \\ ~0 \\ -\frac{m_1}{m_2} \end{array} \right]. \end{align} Therefore, every state in $\mathcal{C}_{AB_0}$ can be written as $\alpha_1\chi_1~+~\alpha_2 \chi_2$ for some $\alpha_1,\alpha_2 \in \mathbb{R}$, which implies that all the reachable positions for the masses take the form $\left\{ x_1 = \alpha_1, x_2 = -\alpha_1 \frac{m_1}{m_2} \right\}$. Thus, we conclude that for all possible inputs and initial state $x(0)=0$, the location of the system's center of mass with respect to the inertial frame remains constant because the variation \begin{align} x_{\tf{CM}} = \frac{m_1 x_1 + m_2 x_2}{m_1 + m_2} = 0, \end{align} for all $x \in \mathcal{R}_{\tf{t}}$. The main implication of this analysis is that in the absence of friction, for a robot of the type in Fig.~\ref{fig01}-(c), locomotion is impossible. This result is consistent with generalizable physical intuition and biological observations~\cite{ref29}. In the presence of friction, a simple model for the generation of traction forces in the system of Fig.~\ref{fig02} is \begin{align} f_i(t)~=~\tf{sign}\left[\dot{x}_i(t) \right]\mu_i(t) m_i g,~\textrm{for}~i=1,2, \label{EQN05} \end{align} where $\mu_i \in \mathbb{R}^+$ are kinetic friction coefficients~\cite{ref30} and $g$ is the acceleration of gravity. Given this structure, the only possible way in which $f_1$ and $f_2$ can be modulated is by varying $\mu_1$ and $\mu_2$. From linear-systems-theory-based analysis it is not possible to determine if the system becomes fully controllable when the inputs are $\left\{f_{\tf{a}},\mu_1,\mu_2 \right\}$. However, we explain the importance of friction for the control of locomotion by analyzing the simplified dynamics resulting from assuming unrestricted inputs $\left\{f_{\tf{a}},f_1,f_2 \right\}$. This case can be modeled by the \textit{multi-input--multi-output} (MIMO) state-space representation $\left\{ A,B_1,C,D\right\}$, where the new input-state matrix and input signal are given by \begin{align} B_1 = \left[ \begin{array}{ccc} ~0 & ~0 & ~0 \\ -\frac{1}{m_1} & -\frac{1}{m_1} & ~0 \\ ~0 & ~0 & ~0 \\ ~\frac{1}{m_2} & ~0 & -\frac{1}{m_2} \end{array} \right],~ u_1 = \left[ \begin{array}{c} f_{\tf{a}} \\ f_1 \\ f_2 \end{array} \right]. \end{align} For this augmented state-space realization, the associated controllability matrix $\mathcal{C}_1=\left[ \begin{array}{cccc} B_1 & AB_1 & A^2B_1 & A^3B_1 \end{array} \right]$ has rank $4$, and therefore, the controllable subspace $\mathcal{C}_{AB_1}~=~\textrm{Image} \left\{ \mathcal{C}_1 \right\}$ spans $\mathbb{R}^4$. This analysis implies that if the input $u_1$ could be chosen without restriction, any desired state, and consequently, any position of the system's center of mass could be reached in a finite amount of time. In reality, however, $u_1$ is highly restricted by actuator limitations and the nonlinear nature of friction. Despite of these restrictions, controlled locomotion can be achieved by varying the friction coefficients $\mu_1$ and $\mu_2$. This fact is explained using numerical examples in the next section. \begin{figure}[t!] \begin{center} \includegraphics[width=0.48\textwidth]{fig03.pdf} \end{center} \vspace{-2ex} \caption{Discrete-time model used to implement numerical simulations. $\hat{G}(z)$ is the discretized version of $\left\{A, B_1, C, D\right\}$. Sign operators ensure opposing signs between velocities and frictional forces. In this case, both friction coefficients $\mu_i$, $i=1,2$, switch between $\underline{\mu_i} = 0.1$ and $\overline{\mu_i} = 1$. Zero initial conditions are set at the beginning of the simulations. \label{fig03}} \vspace{-4ex} \end{figure} \subsection{Locomotion Simulations} \label{sec03b} Through numerical simulations, we illustrate how the robot achieves locomotion with the use of feedforward-controlled time-varying friction. Here, a set of feasible control inputs is chosen via an exhaustive search and iteration process. As described in (\ref{EQN05}), the values of the frictional forces $f_i$ are functions of kinematic coefficients of friction $\mu_i$ and the normal forces between the contact surfaces, $m_i g$ (assuming a perfectly flat supporting surface). In the proposed locomotion strategy, normal forces remain constant and friction is regulated by the active variation in real time of the friction coefficients. Specifically, the anterior and posterior actuators of the robot in Fig.~\ref{fig02} are designed and fabricated to switch their coefficients of friction between a small positive value, $\underline{\mu_i}$, and a larger positive value, $\overline{\mu_i}$, in order to produce friction forces with square-wave-signal shapes. This phenomenon is created by actively switching the surfaces of contact between the actuators and supporting ground. The magnitudes of friction coefficients depend on the materials of the surfaces in contact and range from $\sim \hspace{-0.4ex} 0.04$ for Teflon on steel to $\sim \hspace{-0.4ex} 0.8$ for rubber on concrete~\cite{ref31}. According to experimental tests performed on the extremal friction-varying actuators of the robot in Fig.~\ref{fig01}-(c), the measured transition between $\underline{\mu_i}$ and $\overline{\mu_i}$ can be as fast as $0.4~\textrm{s}$, which enables the design and implementation of control strategies based on low-frequency \textit{pulse width modulation} (PWM). For the simulations, we assume that these transitions are instantaneous. \begin{figure}[t!] \centering \includegraphics[width=0.44\textwidth]{fig04.pdf} \vspace{-1.5ex} \caption{\textbf{(a)} Simulated displacements and instantaneous velocities of $m_1$ and $m_2$ when the frequencies of $f_\textrm{a}$, $f_1$ and $f_2$ are set to 1 Hz and $\phi = 0.4\pi~\textrm{rad}$ ($m_1 = m_2 = 0.2~\textrm{Kg},~k = 200~\textrm{N}\cdot \textrm{m}^{-1},~c=0$). \textbf{(b)} Simulated displacement of $m_1$ at 60 s across a variety of frequency combinations for $f_\textrm{a}$ (C. freq.) and $f_1$ (F. freq.). The forces $f_1$ and $f_2$ oscillate at the same frequency and $\phi$ is held at $0.4\pi~\textrm{rad}$ ($m_1 = m_2 = 0.2~\textrm{Kg},~k = 200~\textrm{N}\cdot \textrm{m}^{-1},~c=0$). \textbf{(c)} Relationship between displacement and phase difference $\phi$ when $f_\textrm{a}$, $f_1$ and $f_2$ are synchronized (at 1 Hz). It can be observed that the direction of locomotion can be reversed by controlling the phase difference between $f_\textrm{a}$ and $f_1$, $f_2$. Trial 1 and Trial 2 correspond to mass values of 0.1~Kg and 0.2~Kg, respectively ($k = 200~\textrm{N}\cdot \textrm{m}^{-1},~c=0$). Heavier masses correspond to higher frictions. These simulation results suggest that higher friction produces faster locomotion. \label{fig04}} \vspace{-3.5ex} \end{figure} Thus, by combining the actuation model for the generation and control of friction forces with the system dynamics discussed in Subsection~\ref{sec03a}, we implement numerical simulations aimed to study the dynamic behavior of the soft robot during surface crawling. This study is relevant for the search of feasible and, eventually, optimal locomotion patterns. The basic simulation scheme is shown in Fig.~\ref{fig03}, where $\hat{G}(z)$ is the discretized version of $\hat{G}(s) = C \left(sI - A \right)^{-1}B_1 + D$, with the state-space representation $\left\{A_{\tf{D}},{B_1}_{\tf{D}},C_{\tf{D}},D_{\tf{D}} \right\}$, obtained with the \textit{zero-order hold} (ZOH) method and employing a sampling frequency of $1~\hspace{-1.6ex}~\tf{KHz}$. Consistently, the sequences $f_{\tf{a}}[n]$, $f_1[n]$, $f_2[n]$, $x_1[n]$, $x_2[n]$, $v_1[n]$ and $v_2[n]$ are the discrete-time versions of the functions $f_{\tf{a}}(t)$, $f_1(t)$, $f_2(t)$, $x_1(t)$, $x_2(t)$, $v_1(t)$ and $v_2(t)$. \begin{figure*}[t!] \vspace{-1ex} \centering \includegraphics[width=1\textwidth]{fig05.pdf} \vspace{-2.5ex} \caption{\textbf{(a) Fabrication of the front and rear actuators:} First, liquid silicone (Ecoflex\textsuperscript{\textregistered} 00-50, Smooth-On) is poured into a 3D-printed mold and the lower half of a symmetrical double-cylindrical core is submerged in the silicone (Step 1). The silicone within the mold is then cured at $65^{\circ}$ for 15 minutes. The cured silicone half-shell, together with the core attached to it, is extracted from the mold (Step 2). Afterwards, the core is rotated $180^{\circ}$ and liquid silicone is added into the mold again to cast the other half of the shell (Steps 3 and 4). The completed shell is then peeled off the core and Step 5 illustrates the shell's structure. In Step 6, butadiene o-rings are fitted onto the shell's imprinted grooves and a layer composed of silicone and a fiberglass net is applied to seal off one end of the shell. The functions of the reinforcement layer and the o-rings are thoroughly explained in~\cite{ref18}. Step 7 shows one completed front/rear actuator. \textbf{(b), (c) Fabrication of the central actuator and the connecting modules: } These procedures are identical to those employed in the fabrication of the front and rear actuators with the exception that the connecting modules do not require an additional reinforcement layer nor o-rings. In addition, a hole is cut out from the bottom of both connecting modules to allow air flow into both the front and rear actuators in the final assembly. \textbf{(d) Final assembly:} In Step 1, two connecting modules, a pair of extremal actuators, a central actuator and three air feeding lines (two of them have helical shape) are integrated together. A pair of casings are then fixed over the extremal actuator modules (Step 2). Step 3 depicts the robot in two states: when all of its actuators are either uninflated or inflated. Note that the helical structure of the two air-feeding lines makes possible their joint simultaneous contraction or expansion with the central actuator. All these components are glued to each other and sealed by applying and curing extra liquid silicone between all the interfaces. \label{fig05}} \vspace{-3.5ex} \end{figure*} Assuming a periodic oscillation of the robot's axial actuator, a sinusoidal signal, with amplitude and bias determined by the actuator's minimum and maximum internal pressures, is chosen as input $f_{\tf{a}}$. The extremum air-pressure values are estimated from the experimental data published in~\cite{ref18}. The signals $f_1$ and $f_2$ are chosen to have square-wave shapes with amplitudes and biases given by the lower and upper bounds of the frictional forces associated with the lowest and highest friction coefficients, $\underline{\mu_i}$ and $\overline{\mu_i}$, respectively. For consistency with the experimental behaviors of the robot's pneumatic actuators, the simulation inputs are limited to a frequency of $1~\tf{Hz}$. Also, $f_1$ and $f_2$ are set to have the same frequency but set apart with a phase difference $\phi$ that can be varied between $0$ and $2\pi~\tf{rad}$. Additionally, because kinetic friction always opposes an actuator's motion, two sign operators are inserted in a feedback configuration, introduced to ensure opposing signs between velocities and frictional forces, as shown in Fig.~\ref{fig03}. A set of simulation results is presented in Fig.~\ref{fig04}. Here, for all the cases, we set $k = 200~\tf{N} \cdot \tf{m}^{-1}$, $c = 0 $, $\underline{\mu_1} = \underline{\mu_2} = 0.1$ and $\overline{\mu_1} = \overline{\mu_2} = 1$. Fig.~\ref{fig04}-(a) shows the displacements and velocities of the two mass-blocks ($m_1 = m_2 = 0.2~\tf{Kg}$), when $f_{\tf{a}}$, $f_1$ and $f_2$ oscillate at $1~\tf{Hz}$ and $\phi = 0.4\pi~\tf{rad}$. Both masses travel in an approximately linear motion at an average speed of $6.31~\tf{m} \cdot \tf{min}^{-1}$ ($10.52~\tf{cm} \cdot \tf{s}^{-1}$). Fig.~\ref{fig04}-(b) shows the total distance traveled by the robot in $60~\tf{s}$ versus the frequencies of $f_\textrm{a}$ and $f_1$, $f_2$. All the simulations in this plot were run with a constant phase difference $\phi=0.4\pi~\tf{rad}$ and $m_1 = m_2 = 0.2~\tf{Kg}$. These simulation results suggest that for this specific selection of inputs, substantial locomotion can only be attained when the input frequencies are equal, with exception of a few frequency combinations. Also, in general, faster inputs generate faster locomotion. Fig.~\ref{fig04}-(c) shows the final position reached by the robot after $60~\tf{s}$ across all $\phi$, when all the input frequencies are held at $1~\tf{Hz}$, for two different choices of the pair $\left\{m_1,m_2 \right\}$. This plot suggests that, for this particular type of inputs, $\phi$ is critical for locomotion generation and direction reversal can be realized simply by varying the phase difference between friction inputs. Similar results have been observed in repeated simulations for friction forces with different amplitudes. These findings are limited to the specific set of inputs employed in the discussed cases, but nonetheless exemplify the challenges and potential of friction-controlled crawling. A more comprehensive study of input signals and control strategies to optimize locomotion is a matter of current and future research. \begin{figure*}[t!] \vspace{-1ex} \begin{center} \includegraphics[width=1\textwidth]{fig06.pdf} \end{center} \vspace{-2ex} \caption{Actuation sequence for locomotion. Green represents inflation and gray represents deflation. When none of the actuators is inflated, both the front and rear casings are in contact with the supporting surface. In Phase 1, the rear actuator is inflated to make contact with the surface and anchor itself. In Phase 2, the central actuator expands, driving the front actuator forward while the rear actuator remains anchored to the ground. Once the central actuator stops expanding, the front actuator inflates (Phase 3) to anchor itself to the surface. In Phase 4, both the rear and central actuators contract. Such a sequence defines one cycle of the robot locomotion pattern. \label{fig06}} \vspace{-3ex} \end{figure*} \section{Design and Fabrication} \label{sec04} The work presented in this paper extends that of~\cite{ref18}. The earthworm-inspired soft robot introduced therein can only function constrained by the specific geometric configuration of pipes, employing a burrowing gait. Here, we develop the design, fabrication and control tools necessary to create an earthworm-inspired soft robot capable of crawling on flat surfaces. The key design innovation introduced in this work is the switching of friction forces by alternating the actuators' surfaces of contact with the ground. To achieve such objective, we design the soft robot shown in Fig.~\ref{fig01}-(c), composed of a central longitudinal actuator, a pair of extremal longitudinal actuators, and a pair of hard casings that enclose the extremal actuators. In addition, a pair of soft modules, shown in Fig.~\ref{fig05}-(c), are employed to connect the central actuator with the extremal actuators. These two connecting modules are also enclosed within the hard casings. In the proposed robotic design, actuators are driven pneumatically. The central and extremal actuators are designed to emulate the earthworm's longitudinal and circular muscles, respectively. All actuators are built to expand and contract axially as functions of their internal pressures, unlike those in~\cite{ref18}. Both front and rear actuators are fixed to the upper interior surface of the hard casings and remain above the ground when deflated as the hard casings support the robot's weight. When inflated, the front and rear actuators elongate and make contact with the surface. The hard casings provide low friction while the actuators yield high friction with the supporting surface. Thus, in this scheme, switching between high and low frictional force values is made possible by a simple inflation and deflation sequence. This actuation method is inspired by the traction variable mechanism employed by nightcrawlers, discussed in Section~\ref{sec02}. To see this, recall that, when crawling, their contracted longitudinal muscles (coupled with relaxed circular muscles) will cause a metamere to expand radially, pushing the setae into the ground to anchor and prevent backward slippage. Note that, even though the extremal actuators together with their casings are inspired by earthworm's circular muscles and setae, the underlying working principles are significantly different. In addition, deformation of natural muscles is achieved through active contraction and passive elongation as opposed to the artificial actuators discussed here that elongate actively but contract passively. \begin{figure}[t!] \vspace{1ex} \begin{center} \input{figures/fig07} \end{center} \vspace{-2ex} \caption{LTI scheme used to independently control all the actuators ($j=1,2,3$) of the soft robot shown in Fig.~\ref{fig01}-(c). $p_{r,j}$ is the reference pressure. $\hat{K}_j$ is a PID controller tuned for each actuator. $P_j$ represents each valve and pressure sensor, whose input is the duty cycle of an exciting PWM signal and output is the measured pressure $p_{m,j}$. The controllers are tuned so that the \textit{root mean square errors} (RMSEs) remain smaller than $0.02~\tf{psi}$. \label{fig07}} \vspace{-3.5ex} \end{figure} The methods and construction sequences employed to fabricate the soft robot are depicted in Fig.~\ref{fig05}. Fig.~\ref{fig05}-(a), Fig.~\ref{fig05}-(b) and Fig.~\ref{fig05}-(c) illustrate the fabrication processes of the front and rear actuators, central actuator and the connecting modules, respectively. Fig.~\ref{fig05}-(d) explains the steps leading to the final assembly of the robot. The parts fabricated and materials used to build this robot include 3D-printed \textit{acrylonitrile butadiene styrene} (ABS) molds and casings, silicone elastomer (Ecoflex\textsuperscript{\textregistered} 00-50, Smooth-On), butadiene rubber elastomeric o-rings, fiberglass sheets and pneumatic components. All actuators measure $35~\tf{mm}$ in diameter, the central actuator measures $83~\tf{mm}$ in length and the extremal actuators combined with the connecting modules measure $26~\tf{mm}$ in height. The wall thickness of the soft components range between $2.5$ and $3~\tf{mm}$. These dimensions were chosen based on the robot design in~\cite{ref18}, and were modified to accommodate off-the-shelf pneumatic components. To drive the system, an Elemental $\textrm{O}_2$ commercial air pump and a 12-V ROB-10398 vacuum pump are employed to inflate and deflate all actuators through a manifold (SMC VV3Q12). Three high speed solenoid valves (SMC VQ110-6M) and three Honeywell ASDX Series digital serial silicon pressure sensors provide regulation and measurement of each actuator's internal pressure. Data acquisition and signal processing are performed with an AD/DA board (National Instruments PCI-6229) mounted on a target PC which communicates with a host PC via xPC Target 5.5 (P2013b). \section{Locomotion Planning and Control} \label{sec05} In Section~\ref{sec03b}, using simulations, we demonstrated that fast locomotion is contingent upon perfectly-shaped periodic driving and frictional forces, with perfectly-matched relatively high frequencies. These conditions are not realizable with pneumatically-powered soft actuators as those of the robot in Fig.~\ref{fig01}-(c) (discussed in Section~\ref{sec04}). Thus, replicating the high-speed simulated locomotion behaviors on the actual robot is, at this moment, not an attainable objective. However, we can implement bio-inspired locomotion strategies that are compatible with lower frequencies. It is easy to see from Fig.~\ref{fig02}, that $m_1$ will remain stationary (anchored to the ground) and $m_2$ can slide forward as the central actuator inflates if \begin{align} |f_1|\geqslant|f_\textrm{a}|>|f_2| \label{eq07}. \end{align} The signal $f_1$ corresponds to static friction while $f_2$ is considered to be kinetic friction. Similarly, $m_2$ will be anchored to the ground and $m_1$ will slide forward as the central actuator deflates if \begin{align} |f_2|\geqslant|f_\textrm{a}|>|f_1| \label{eq08}. \end{align} Here, $f_2$ is a static friction force and $f_1$ is instead, considered to be kinetic friction. Thus, locomotion can be induced by actuating each actuator following a pattern such that the conditions defined in (\ref{eq07}) and (\ref{eq08}) are satisfied in an alternating sequence. In this way, a four-phase actuation sequence is designed to generate one complete stride for the robot as illustrated in Fig.~\ref{fig06}. Before implementing a locomotion sequence, an actuator characterization test is performed to determine a proper set of values for the robot's stride length, stance time and protrusion time. \begin{table}[t!] \vspace{-1ex} \centering \renewcommand{\arraystretch}{1.2} \caption{Reference pressures during actuation (${psi}$).} \vspace{-2ex} \begin{tabular}{l*{4}{c}r} \textbf{Phase} & \textbf{1} & \textbf{2} & \textbf{3} & \textbf{4} \\ \hline Rear Actuator & 1.2 & 1.2 & 1.2 & 0 \\ Central Actuator & 0 & 3 & 3 & 0 \\ Front Actuator & 0 & 0 & 1.2 & 1.2 \\ \label{tab01} \vspace{-2.5ex} \end{tabular} \end{table} \begin{figure}[t!] \vspace{-2ex} \begin{center} \includegraphics[width=0.46\textwidth]{fig08.pdf} \end{center} \vspace{-2ex} \caption{Example of pressure-tracking experimental results. The continuous lines represent measurements and dashed lines represent references. These data were obtained employing the PID scheme in Fig.~\ref{fig07} to control the central (upper plot), frontal (middle plot) and rear (bottom plot) actuators, during locomotion. The \textit{protrusion time} is $1.6~\tf{s}$, the \textit{stance time} is $2.4~\tf{s}$ and the \textit{stride period} is $4~\tf{s}$. \label{fig08}} \vspace{-4ex} \end{figure} To characterize each actuator, three \textit{proportional-integral-derivative} (PID) controllers $\hat{K}_j,~j = 1, 2, 3$, depicted in Fig.~\ref{fig07}, are implemented to regulate internal pressure. Both pumps are maintained at a constant flow rate and output pressure, and the response of each actuator is controlled by solenoid valves using PWM. The valves are normally closed, a state during which the manifold allows for the vacuum pump to deflate the actuators. The PWM duty cycle excites the valves to open and allows for each actuator to inflate individually. In this structure (Fig.~\ref{fig07}), the output of $\hat{K}_j$ is the duty cycle input to each valve. Every PID controller is tuned online in an exhaustive manner. The experimental characterization process follows the procedure introduced in~\cite{ref18}. For the central actuator, a range of pressure values that produce substantial elongations without causing significant radial expansions is identified. For the front and rear actuators, the minimum pressure threshold for which firm contact between the actuators and supporting surface is established is chosen to be the reference pressure. Additionally, two 130-gram machined steel plates are fixed onto the top of both casings, as shown in Fig.~\ref{fig01}-(c), to increase frictional force and damp the vibration from the valves during actuation. Table \ref{tab01} presents a set of reference pressures for individual actuators during the four phases described in Fig.~\ref{fig06}. Robot locomotion is achieved by controlling each actuator to track the reference pressure during each phase. In reference to the earthworm crawling kinematics described in Section \ref{sec02}, we define the protrusion time as the period during which the central actuator expands (phase 2). Similarly, the stance time is defined as the time duration after protrusion time during which the front actuator remains static horizontally and completes a cycle of inflation and deflation (phase 3 + phase 4 + phase 1). Protrusion time and stance time are prescribed in experiments. \begin{figure}[t!] \vspace{-1ex} \begin{center} \includegraphics[width=0.46\textwidth]{fig09.pdf} \end{center} \vspace{-1.5ex} \caption{Photographic sequence showing the soft robot while crawling on a laboratory benchtop. Locomotion is achieved by tracking the actuators' pressure references in Table~\ref{tab01}. In this case, a total distance of $52.4~\tf{cm}$ is covered within $75~\tf{s}$ at an average speed of $0.7~\tf{cm}\cdot \tf{s}^{-1}$. The complete set of locomotion experiments can be found in the supporting movie S1.mp4, also available at \href{http://www.uscamsl.com/resources/ROBIO2017/S1.mp4}{http://www.uscamsl.com/resources/ROBIO2017/S1.mp4}. \label{fig09}} \vspace{-3ex} \end{figure} To implement the described locomotion method, low-level PID controllers (Fig.~\ref{fig07}), tuned during the characterization process, are used to control the actions of each actuator. \section{Experimental Results and Discussion} \label{sec06} Experiments were conducted to validate the locomotion sequence proposed in Section \ref{sec05}. The first set of tests aims to optimize the crawling speed of the robot on a single uniform surface. The effect of different variables, including the duration of each phase and reference pressures for each actuator, is examined across a broad spectrum of values. Fig.~\ref{fig08} presents the pressure tracking signals of each actuator for the test that produced the fastest locomotion, in which the protrusion time and stance time were $1.6$ and $2.4~\tf{s}$, respectively. A stride length of $2.79~\tf{cm}$ and an average speed of $0.7~\tf{cm} \cdot \tf{s}^{-1}$ were observed and recorded, as shown in Fig.~\ref{fig09}. Since these experiments adopt a different actuation approach to that of the simulations in Section~\ref{sec03}, the large differences between simulated speeds and experimental locomotion speeds are not surprising. As observed in Fig.~\ref{fig08}, the front and rear actuators were able to track the reference pressures with minor overshoots. However, the central actuator was unable to deflate completely. Lower pressure references for the central actuator and longer protrusion times were found to produce better pressure tracking at the cost of overall locomotion speed. No obvious slippage was observed in any of the tests. The second set of tests was designed to validate the notion that the robot can travel on surfaces with different coefficients of friction. Using the same actuation sequence than that of Fig.~\ref{fig09}, we proved that the robot can generate peristaltic locomotion on multiple surfaces, including a laboratory benchtop, plywood, \textit{high-density polyethylene} (HDPE), aluminum and a foam pad. Furthermore, we showed that this robot is capable of traversing surfaces with different coefficients of friction by letting it crawl from a foam pad to an HDPE plate. The complete set of all the described tests can be found in the supporting movie S1.mp4, also available at \href{http://www.uscamsl.com/resources/ROBIO2017/S1.mp4}{http://www.uscamsl.com/resources/ROBIO2017/S1.mp4}. The experiments presented in this section proved friction manipulation to be an effective way to generate peristaltic crawling in the proposed robot. During locomotion, pressure sensors provide feedback to regulate the elongation of each actuator, and therefore, displacement control was achieved indirectly. Direct displacement control can be implemented in the future by employing a motion-capture system or soft sensors. Also, note that actuator characterization in this case is performed empirically. An analytical model that can capture the nonlinear relationships between an actuator's internal pressure and deformation is needed to improve the control strategy and optimize locomotion. \section{Conclusion and Future Work} \label{sec07} We presented an earthworm-inspired soft crawling robot capable of locomoting on surfaces by manipulating friction. The robot consists of modular actuators and mechanisms that emulate the functionalities of an earthworm's longitudinal and circular muscles as well as its bristle-like setae structures. We modeled the robot as a mass-spring-damper system and described its crawling dynamics with an LTI state-space representation. We proved mathematically that frictional forces can be employed as inputs that lead to system controllability. This finding was tested and validated through simulations. Experimentally, we demonstrated that the robot is capable of locomoting on surfaces with different coefficients of friction, emulating an earthworm's peristaltic crawling. The modular structure of the robot makes it easily scalable, which leaves great potential for creating longer and more versatile robotic structures. Such complex modular systems will provide an ideal platform to develop and test novel decentralized control strategies. In this work, we empirically explored the feasibility of friction-controlled locomotion on flat surfaces. We anticipate that future research will further explore the proposed robotic concept, employing only soft materials and enabling steering and locomotion on uneven terrains. Additionally, the robot presented here is tethered to both the power source and feedback-control module. To achieve autonomy, novel sensing and wireless communication systems must be implemented. Also, portable sources of energy are required. Feasible options are electrolysis and combustion. These topics are a matter of future research. \bibliographystyle{ieeetran}
\section{Introduction} We consider non-divergence elliptic operator \begin{equation}\label{equ} {\cal L}u := - \sum_{i,j=1}^{n}a_{i j}(x) D_iD_ju \qquad\mbox{in}\quad \Omega. \end{equation} Such operators arise in theory of stochastic processes and various applications. In (\ref{equ}) $\Omega$ is a domain in $\mathbb{R}^n$, $n\geq 3$, and $D_i$ stands for the differentiation with respect to $x_i$. We suppose that the boundary $\partial \Omega$ is split $\partial \Omega=\Gamma_1\cup\{\zeta\}\cup \Gamma_2.$ Here $\Gamma_1$ is support of the Dirichlet condition, and $\Gamma_2$ is support of the oblique derivative condition: \begin{equation*}\label{BC} u(x)=\Phi(x) \ \ \mbox{on} \ \ \Gamma_1;\quad \frac{\partial u}{\partial \ell}(x):=\lim_{\delta \to +0} \frac {u(x)-u(x-\delta \ell)}{\delta}=\Psi(x) \ \ \mbox{on} \ \ \Gamma_2, \end {equation*} where $\ell=\ell(x)$ is a measurable, and uniformly non-tangential outward vector field on $\Gamma_2$. Without loss of generality we can suppose $|\ell|\equiv1$. We call $\Gamma_1$ Dirichlet boundary, and $\Gamma_2$ Neumann boundary. At point $\zeta\in\overline{\Gamma_1}\cap\overline{\Gamma_2}$ function $u$ is not defined, and we investigate asymptotic properies of the solution at this point. For divergence type equation in case of Dirichlet Data this type of theorem first was proved in very general case by Mazya in \cite{MazyaFL1}. Criteria for regularity for Zaremba problem first was obtained by Mazya in \cite{MazyaFL}. Here we consider the case of non-divergence equation in bounded domain $\Omega$ where Neumann $\Gamma_2$ is Lipschitz in a neighborhood of the point $\zeta$. In the case $\Gamma_2=\emptyset$ the similar question was discussed by E.M. Landis (see \cite{landis-book,landis-paper}) and sharpened by Yu.A. Alkhutov \cite{Alkhutov}. We always assume that the matrix of leading coefficients $(a_{ij})$ is bounded, measurable and symmetric, and satisfies the uniform ellipticity condition: \begin{equation*}\label{e1} \max_{|\xi|=1}\sup_{x\in \Omega} e(x,\xi)=:e_1<\infty, \end{equation*} where $e$ is the ellipticity function (see \cite{landis-book}, \cite{Alkhutov}) \begin{equation*}\label{ ellipticity function} e(x,\xi)= \frac{\sum _{i=1}^{n} a_{ii}(x)}{\sum_{i,j=1}^{n}a_{i j}(x)\xi_i\xi_j}. \end{equation*} For simplicity we consider the operators without lower-order terms, a more general case can be easily managed. The paper is organized as follows. In Sec.~\ref{sec:preliminary} we formulate some known results about non-divergence equations: lemma on non-tangential derivatives at point of maximum (minimum) on the boundary in the form of Nadirashvili \cite{nad-max-principle}, the Landis Growth Lemma in case $\Gamma_2 =\emptyset$, and Growth Lemma in Krylov's form(see \cite{krylovizvest}). The Growth Lemma for elliptic and parabolic equations first was introduced by Landis in \cite{Landis2, Landis1}. Growth Lemma is a fundamental tool to study qualitative properties and regularity of solutions in bounded and unbounded domain. Recent review on Growth Lemma and its applications was published in \cite{safonov-1} (see also \cite{Aimar}). In Sec.~\ref{sec:Lip-boundary} we prove strict Growth Lemma near Neumann boundary. Sec.~\ref{sec:Spherical-Layer} glues two Growth Lemmas. This result was obtained under some admissibility constraint on the boundary $\Gamma_2$, which is an analog of isoperimetric condition. In the last Sec.~\ref{sec:Dichotomy}, dichotomy theorem is proved for solutions of mixed boundary value problem to non-divergence elliptic equation. We use the following notation. $x=(x',x_n)=(x_1,\dots, x_{n-1}, x_n$ is a point in $\mathbb R^n$. $B(x,R)$ is the ball centered in $x$ with radius $R$. \section{Preliminary Results}\label{sec:preliminary} Here we recall some known results and prove auxiliary lemmas for the sub- and supersolution of the equation ${\cal L}u=0$. We call function $u$ sub-elliptic (super-elliptic) if $u \in W^2_n(\Omega)\bigcap {\cal C}^{1}(\Omega\cup\Gamma_2)$, and ${\cal L}u\le 0$ (respectively, ${\cal L}u\ge 0$). We say that $\Gamma_2$ satisfies inner cone condition (see, e.g., \cite{nad-max-principle}) if there are $0<\varphi<\pi/2$ and $h>0$ such that for any $y\in \Gamma_2$ there exists a right cone $K(y)\subset \Omega$ with the apex at $y$, apex angle $\varphi$ and of the height $h$. \begin{figure}[ht] \begin{center} \advance\leftskip-3cm \advance\rightskip-3cm \includegraphics[scale=0.5]{Cone_1} \caption{Inner cone condition }. \label{Cone} \end{center}\end{figure} In \cite{nad-max-principle} N. Nadirashvili obtained fundamental generalization of Oleinik-Hopf lemma\footnote{In \cite{nad-max-principle} classical solutions $u\in {\cal C}^2(\Omega)\cap {\cal C}^1(\overline\Omega)$ are used but due to the Aleksandrov-Bakel'man maximum principle it is transferred to $u \in W^2_n(\Omega)\bigcap {\cal C}^{1}(\Omega\cup\Gamma_2)$.}, the so-called ``lemma on non-tangential derivative'': \begin{lemma}\label{nad} Let $\Gamma_2$ satisfy inner cone condition. Let a non-constant function $u$ be super-elliptic (sub-elliptic) ${\cal L} u \geq 0 \ ({\cal L}u\leq 0)$ in $\Omega$. Suppose that $y\in\Gamma_2$ and $u(y)\le u(x) \ (u(y)\ge u(x))$ for all $x \in \Gamma_2$. Then for any neighborhood $S$ of $y$ on $\Gamma_2$ and for any $\varepsilon<\varphi$ there exists a point $\widetilde x \in S$ s.t. \begin{equation*} \frac{\partial u}{\partial \ell}(\widetilde x)<0 \qquad \Big(\frac{\partial u}{\partial \ell}(\widetilde x)>0\Big) \end{equation*} for any outward direction $\ell$ s.t. the angle $\gamma$ between $\ell$ and the axis of $K(\widetilde x)$ is not greater then $\varphi-\varepsilon$. \end{lemma} From standard maximum principle and Lemma \ref{nad} follows comparison theorem for mixed boundary value problem. \begin{lemma}\label{comparison_theorem} Let $\Omega$ be a bounded domain, $\partial \Omega =\Gamma_1\cup \Gamma_2$. Let $\Gamma_2$ satisfy inner cone condition. Suppose that vector field $\ell$ satisfies the same condition as in Lemma \ref{nad}. Let functions $u$ and $v$ belong to $W^2_n(\Omega)\bigcap {\cal C}^{1}(\Omega\cup\Gamma_2)\cap {\cal C}(\overline \Omega)$. Then, if ${\cal L} u \leq {\cal L} v $ in $\Omega$, $u\leq v $ on $\Gamma_1$, and $\frac{\partial u}{\partial \ell}\leq \frac{\partial v}{\partial \ell}$ on $\Gamma_2$ then $u\geq v $ in $\overline \Omega$. \end{lemma} \begin{definition}\label{strict_growth} Let $\Omega$ be a domain, $\partial \Omega=\Gamma_1\cup \Gamma_2$. Define ``small ball'' $B(0,R)$ and ``big ball'' $B(0,aR)$, $a>1$ (see Fig. \ref{domainandballs}). We call the function $w$ {\bf barrier} with respect to mixed boundary value problem in these two balls if it posses properties: \begin{equation}\label{Lw<0} w \ \text{is sub-elliptic } \ ({\cal L}w\leq 0) \ \text{in the intersection} \ \Omega\cap B(0,aR); \end{equation} \begin{equation}\label{w<1} w(x)\leq 1 \ \text{on} \ \Gamma_1\cap B(0,aR); \end{equation} \begin{equation}\label{w_l<0} \frac{\partial w}{\partial \ell}\leq 0 \ \text{on} \ \Gamma_2\cap B(0,aR); \end{equation} \begin{equation}\label{w<0} w\leq 0 \ \text{on} \ \overline \Omega\cap \partial B(0,aR); \end{equation} \begin{equation}\label{w>eta} w(x)\ge \eta_0 \ \text{in the intesection} \ B(0,R)\cap \Omega \end{equation} for some constant $\eta_0$. \end{definition} \begin{figure}[ht] \begin{center} \advance\leftskip-3cm \advance\rightskip-3cm \includegraphics[scale=0.5]{strict_growth_pic1} \caption{Domain $G$ and two balls $B(0,R)$ and $B(0,aR),\ (a>1) \ $} \label{domainandballs} \end{center}\end{figure} Now we are in the position to prove the following strict growth property for subsolutions of the mixed boundary value problem. \begin{lemma}\label{krylov} Let $\Omega$ be a domain, $\partial \Omega=\Gamma_1\cup \Gamma_2$. Suppose that a function $u$ be sub-elliptic in $\Omega\cap B(0,aR)$, $u>0$ in $\Omega$, $u=0$ on $\Gamma_1\cap B(0,aR)$ and $\frac{\partial u}{\partial \ell}\leq 0$ on $\Gamma_2\cap B(0,aR)$. Let $\Gamma_2$ satisfy inner cone condition. Assume that there is a barrier $w$ in balls $B(0,R)$ and $B(0,aR)$. Then \begin{equation}\label{boundlayer_strong} \sup_{\Omega\cap B(0,a R)} u\ge \frac{\sup_{\Omega\cap B(0,R)} u}{1-\eta_0}. \end{equation} \end{lemma} \begin{proof} Let $M=\sup_{\Omega\cap B(0,aR)} u$, and let the barrier $w(x)$ be as in Definition \ref{strict_growth}. Define \begin{equation*} v(x)=M(1-w(x)). \end{equation*} Obviously ${\cal L} v \geq {\cal L} u$ in $\Omega$, $v\geq u$ on $\Gamma_1\cap B(0,aR)$, $ \frac{\partial v}{\partial \ell}\ge \frac{\partial u}{\partial \ell}$ on $\Gamma_2$, and $v\geq M \geq u$ on $\partial B(0,aR)\cap \Omega.$ Applying comparison Lemma \ref{comparison_theorem} to functions $v$ and $u$ in the domain $\Omega\cap B(0,aR)$ we get that $v\geq u$. In the intersection $\Omega\cap B(0,R)$ this gives with regard of (\ref{w>eta}) \begin{equation*} M(1-\eta_0)\geq M(1-\inf_{\Omega\cap B(0,R)} w)\geq \sup_{\Omega\cap B(0,R)} u. \end{equation*} The latter is equivalent to statement in \eqref{boundlayer_strong}. \end{proof} We recall the well-known notion of $s$-capacity, see, e.g., \cite[Sec. I.2]{landis-book}. \begin{definition}\label{s-capacity} Let $H$ be a Borel set. Let a measure $\mu$ be defined on Borel subsets of $H$. We call $\mu$ {\bf admissible} and write $\mu \in {\cal M}(H)$ if \begin{equation*} \int_{H} \frac{d\mu(y)}{|x-y|^s} \leq 1, \quad \text{for} \quad x\in R^n\setminus H. \end{equation*} Then the quantity \begin{equation*} {\bf C}_s(H)=\sup_{\mu\in{\cal M}(H)} \mu(H) \end{equation*} is called {\bf $s$-capacity} of $H$. \end{definition} We also recall the following simple statement. \begin{proposition}\label{subsol} If $s\ge e_1-2 $ then $L|x|^{-s}\le 0$. \end{proposition} Now we formulate a variant of the Landis Growth Lemma, see \cite[Sec. I.4]{landis-book}. \begin{lemma}\label{landis} Let function $u$ be sub-elliptic in $\Omega\cap B(0,aR)$, $u>0$ in $\Omega$, $u =0$ on $\Gamma_1=\partial \Omega \cap B(0,aR)$. Let $s\ge e_1-2$. Then there exists $0<\eta_1<1$ depending only on $s$ s.t. \begin{equation*}\label{boundlayer_capacity} \sup_{\Omega\cap B(0,a R)} u\ge \frac{\sup_{\Omega\cap B(0,R)} u}{1-\eta_1 {\bf C}_s(H)R^{-s}}. \end{equation*} Here $H=\Gamma_1\cap B(0,R)$. Consequently if $B(0,R)\setminus \Omega$ contains a ball with radius $\delta R$ then \begin{equation*}\label{boundlayer_constant} \sup_{\Omega\cap B(0,a R)} u\ge \frac{\sup_{\Omega\cap B(0,R)} u}{1-\widetilde\eta_1}, \end{equation*} where the constant $\widetilde\eta_1$ depend on $s$ and $\delta$. \end{lemma} \section{Growth Lemma near Neumann boundary}\label{sec:Lip-boundary} Here we prove the Growth Lemmas in the domain adjunct to $\Gamma_2$ under some assumption on $\Gamma_1$. We recall that $\Gamma_2$ is uniformly Lipschitz in a neighborhood of $x^0$. This means that there is $\delta>0$ s.t. the set $\Gamma_2\cap B(x^0,\delta)$ is the graph $x_n=f(x')$ in a local Cartesian coordinate system, and the function $f$ is Lipschitz. Moreover, we suppose that its Lipschitz constant does not exceed $L$. Without loss of generality we assume that $\Omega\cap B(x^0,\delta)\subset\{x_n<f(x')\}$ (see Fig. \ref{Lipschitz}). This implies the inner cone condition if we direct the axis of the cone $K$ along $-x_n$ and set $\varphi=\cot^{-1}(L)$. \begin{figure}[ht] \begin{center} \advance\leftskip-3cm \advance\rightskip-3cm \includegraphics[scale=0.5]{Lipshitz_Lemma_Growth} \caption{Domain $\Omega$, boundary $\Gamma_2$ and balls $B(0,R)$, $B(0,aR)$ and $B(0,\alpha R)$.} \label{Lipschitz} \end{center}\end{figure} \begin{lemma}\label{bound_layer} Let $\Gamma_2\cap B(0,R)=\emptyset$, and $x^0\in\Gamma_2\cap\partial B(0,R)$, for some $R\le\frac\delta 2$. Assume that $\Omega\cap B(0,\alpha R)=\emptyset$ for some $0<\alpha<\frac 12$ (see Fig. \ref{Lipschitz}). Suppose that the vector field $\ell$ satisfies conditions in Lemma \ref{nad} uniformly on $\Gamma_2$ (that is, $\varepsilon$ does not depend on $x\in\Gamma_2$). Let function $u$ be sub-elliptic (${\cal L}u\le 0$ in $\Omega$), $u>0$ in $\Omega$, $u=0$ on $\Gamma_1$ and $\frac{\partial u}{\partial \ell}\le 0$ on $\Gamma_2$. Then there exists $a>1$ depending on the Lipschitz constant $L$, $\varepsilon$ and ellipticity constant $e_1$ s.t. \begin{equation}\label{boundlayer} \sup_{\Omega\cap B(0,a R)} u\ge \frac{\sup_{\Omega\cap B(0,R)} u}{1-\eta_2}. \end{equation} Here $\eta_2\in (0,1)$ is defined by $\alpha$ and $a$. \end{lemma} \begin{proof} We take $s\ge e_1-2$ and set \begin{equation*}\label{w} w(x)=\frac {\alpha^s R^s}{|x|^s}-\frac {\alpha^s}{a^s}. \end{equation*} We claim that for $a$ sufficiently close to $1$ this function satisfies all conditions in Definition \ref{strict_growth}. Indeed: 1. From Proposition \ref{subsol} function $w$ is sub-elliptic, condition \eqref{Lw<0} holds. 2. Evidently $w=0$ on $\partial B(0,aR)$, condition \eqref{w<0} holds, 3. while $\Omega\cap B(0,\alpha R)=\emptyset$ implies $ w\le 1$ in $\Omega\cap B(0,aR)$ (and therefore on $\Gamma_1$) condition \eqref{w<1} holds. Now we check condition \eqref{w_l<0}. We introduce the Cartesian coordinate system with axes collinear with those of local coordinate system at $x^0$. We observe that the assumption $\Gamma_2\cap B(0,R)=\emptyset$ and Lipschitz condition imply that for $x\in \Gamma_2\cap B(0,aR)$ \begin{equation*}\label{mod-x'-x_n-prp} |x'|\le \frac R{\sqrt{1+L^2}}\,(L+\sqrt{a^2-1});\qquad x_n\ge \frac R{\sqrt{1+L^2}}\,(1-L\sqrt{a^2-1}). \end{equation*} Moreover, our assumption on the vector field $\ell$ means that \begin{equation*}\label{l'-prop} |\ell'|\le \sin(\cot^{-1}(L)-\varepsilon)\le \frac 1{\sqrt{1+L^2}}-\widetilde\varepsilon; \end{equation*} \begin{equation*}\label{l_n-prop} \ell_n\geq \cos(\cot^{-1}(L)-\varepsilon)\geq \frac L{\sqrt{1+L^2}}+\widetilde\varepsilon \end{equation*} where $\widetilde\varepsilon$ depends only on $L$ and $\varepsilon$. Therefore, the direct calculation gives \begin{multline*} \frac{\partial w}{\partial \ell}(x)=-\,\frac{s\alpha^sR^s}{|x|^{s+2}}\cdot(x_n \ell_n+\ell'\cdot x')\\ \le\frac{s\alpha^sR^s}{|x|^{s+2}}\cdot\frac R{\sqrt{1+L^2}} \Big(\sqrt{a^2-1}\cdot\big(\sqrt{1+L^2}+\widetilde{\varepsilon}(L-1)\big) -\widetilde{\varepsilon}\big(L+1\big)\Big). \end{multline*} It is easy to see that, given $\widetilde\varepsilon>0$, there is $a>1$ depending only on $\widetilde\varepsilon$ and $L$ s.t. $\frac{\partial w}{\partial \ell}(x)\le 0$, and \eqref{w_l<0} holds. Finally, for $x\in \Omega\cap B(0,R)$, $w(x)\ge \alpha^s(1-a^{-s})=:\eta_2$, and \eqref{w>eta} holds. Thus, the claim follows, and $w$ is the barrier in the balls $B(0,R)$, $B(0,aR)$. From Lemma \ref{krylov} we get \eqref{boundlayer}. \end{proof} \section{Growth Lemma in the Spherical Layer}\label{sec:Spherical-Layer} In this section we prove Growth Lemma in spherical layer near junction point of interest $\zeta = \overline\Gamma_1 \cap \overline\Gamma_2$. Without loss of generality we put $\zeta = 0 $. First we will introduce admissible class of domains in the spherical layer. \begin{definition}\label{admissible-domain} Fix five constants $0<q_1<q_2<q^*<q_3<q_4$. Define two spherical layers $\hat{U}_R\subset U_R$: $$ U_R=B(0,q_4R)\setminus B(0,q_1R); \qquad \hat{U}_R=B(0,q_3 R) \setminus B(0,q_2 R). $$ We call $\Omega$ {\bf admissible} in the layer $U_R$ if for some $\theta>0$ there is finite set of the balls (see Fig. \ref{Admissible}) \begin{equation*}\label{B_k} {\cal B}=\{B^k=B(\xi_k,\theta R)\}_{k=0}^{N}; \quad B^k\subset\hat{U}_R \end{equation*} s.t. the following holds: 1. ${\bf C}_s(B^0\cap \Gamma_1)\geq \varkappa {\bf C}_s(\Gamma_1\cap \hat{U}_R)$, for some constant $\varkappa>0$. 2. $B^k\cap \Gamma_2 = \emptyset$, $k=1,..,N$, and $B(\xi_0,a\theta R)\cap \Gamma_2 = \emptyset$, where $a>1$ is defined in Lemma \ref{bound_layer}. \footnote{Note that boundaries of some balls $B^k$ may touch $\Gamma_2$. } 3. There is $\delta\in (0,1/2)$ s.t. every ball in $\cal B$ can be connected with $B^0$ by a subsequence of balls $B^j$ s.t. any intersection $ B^j\cap B^{j+1}\cap \Omega$ contains the ball $B(\xi_{j+1},\delta R)$. 4. The set $S_R=\partial B(0,q^* R)\cap \Omega$ is covered by balls in $\cal B$. \end{definition} Fig. \ref{Admissible} schematically illustrate Definition \ref{admissible-domain}. \begin{figure} \centering \begin{subfigure}{.5\textwidth} \centering \includegraphics[width=1\linewidth]{Admissible1.png} \label{fig:sub1} \end{subfigure}% \begin{subfigure}{.5\textwidth} \centering \advance\leftskip-1cm \includegraphics[width=2\linewidth]{Admissible_scale.png} \label{fig:sub2} \end{subfigure} \vspace{-2 cm} \caption{On the left: domain $\Omega$ admissible in Spherical Layer $U_R$. On the right: domain and layer zoomed near boundary $\Gamma_2$ (bold line).} \label{Admissible} \end{figure} \begin{lemma}\label{Lipschitz_layer} Let function $u$ be sub-elliptic, $u>0$ in $\Omega$. Suppose that $u\leq 0$ on $\Gamma_1$ and $\frac{\partial u}{\partial \ell}\leq 0$ on $\Gamma_2$. Let domain $\Omega$ be admissible in the layer $U_R$. Then \begin{equation*}\label{lemmainlayer} \sup_{\Omega}u\geq \frac{\sup_{S_R} u}{1-\eta {\bf C}_s(H)R^{-s}}. \end{equation*} Here $H=\Gamma_1\cap \hat{U}_R$ while $\eta$ depends on $s$, the ellipticity constant $e_1$, the Lipschitz constant $L$, the vector field $\ell$, constants $\theta$, $\varkappa$, $\delta$ in Definition \ref{admissible-domain} and the number $N$ of balls in the set $\cal B$. \end{lemma} \begin{proof} Without loss of generality we set $\theta=1$. Let $\sup_{S_R} u=:m=u(y)$, here $y\in \overline S_R$. By assumption 4 in Definition \ref{admissible-domain}, $y\in {\overline B}\vphantom{B}^k$ for some $k$. By assumption 3, we can choose a subsequence $B^j$ connecting $B^0$ and $B^k$. Consider the ball $B_0$ and the ball $B(\xi_0,aR)$, $a>1$, concentric to it. Due to assumptions 1 and 2 in Definition \ref{admissible-domain}, we can apply Lemma \ref{landis} to get: \begin{equation*}\label{B1} M:=\sup_{\Omega} u \geq \sup_{\Omega\cap B(\xi_0,a R)}u \geq \frac{\sup_{B^0\cap \Omega} u}{1-\varkappa\eta_1 {\bf C}_s(H)R^{-s}}. \end{equation*} Suppose that \begin{equation} \label{delta0} \sup_{B^0\cap \Omega} u \geq m(1-\delta_0), \qquad \text{where} \quad \delta_0 = \frac{\varkappa\eta_1 {\bf C}_s(H)R^{-s}}{2(1-\varkappa\eta_1 {\bf C}_s(H)R^{-s})}. \end{equation} Then after some calculation we get \begin{equation*}\label{B11} M \geq \frac{m}{1-\eta_3 {\bf C}_s(H)R^{-s}} \end{equation*} for some $\eta_3$ depending on $\varkappa\eta_1$, and the statement follows. If \eqref{delta0} does not hold, we consider the function \begin{equation}\label{func_v1} u_1(x)=u(x)-m(1-\delta_0), \end{equation} then $u_1(x)\leq 0$ in $B^0 \cap \Omega$. By assumption 3, $B^0 \cap B^1 \cap \Omega$ contains a ball of radius $\delta R$. Let $\Omega_1:=\{ x: u_1 (x)>0\}$. Assume that $B^1\cap \Omega_1\not= \emptyset$, otherwise we consider the first ball in the subsequence $B^j$ for which this property holds. Suppose that \begin{equation}\label{tau} \sup_{B^1\cap \Omega} u_1 \geq m\delta_0(1-\tau), \end{equation} here the constant $\tau$ will be chosen later. Consider any simply connected component of the domain $B(\xi_1,aR)\cap \Omega_1$ in which the supremum in (\ref{tau}) is realised. There are two possibilities: a) $B(\xi_1,aR)\cap \Gamma_2 = \emptyset$; b) $B(\xi_1,aR)\cap \Gamma_2 \ne \emptyset$ \noindent (recall that $a=a(L,\ell, e_1)>1$ is defined in Lemma 3.1). Let us start with case (a). Due to assumption 3, Lemma \ref{landis} and (\ref{tau}) it follows that \begin{equation}\label{func_v11} \sup_{B(\xi_1,aR)\cap \Omega} u_1\ge \frac {\sup_{B^1\cap \Omega} u_1}{1-\widetilde\eta_1}\ge \frac{m\delta_0(1-\tau)}{1-\widetilde\eta_1}. \end{equation} Using (\ref{func_v1}) and \eqref{func_v11} we deduce \begin{equation*}\label{u-tau1} \sup_{B(\xi_1,aR)\cap \Omega}u \geq m\big(1+\frac {\delta_0(\widetilde\eta_1-\tau)}{1-\widetilde\eta_1}\big). \end{equation*} Letting $\tau=\frac{\widetilde\eta_1}2$ we get \begin{equation}\label{u-eta4} M \geq \sup_{B(\xi_1,aR)\cap \Omega}u \geq m\big(1+\frac {\delta_0\tau}{1-2\tau}\big), \end{equation} and the statement follows. In case of (b) we proceed with the same arguments but instead of Lemma \ref{landis} we apply Lemma \ref{bound_layer} and put $\tau=\frac{\eta_2}2$. Thus, if (\ref{tau}) holds with $\tau=\frac 12\min\{\widetilde\eta_1,\eta_2\}$ then (\ref{u-eta4}) is satisfied in any case, and Lemma is proved. If \eqref{tau} does not hold then function $u$ satisfies \begin{equation*}\label{u-tau} \sup_{B^1\cap \Omega}u \leq m(1-\delta_0\tau). \end{equation*} As in previous step we consider the function \begin{equation*}\label{func_v2} u_2(x)=u(x)- m(1-\delta_0\tau), \end{equation*} $u_2(x)\leq 0$ in $B^1 \cap \Omega$. Repeating previous argument we deduce that if \begin{equation} \label{v-2} \sup_{B^2\cap \Omega} u_2 \ge m\delta_0 \tau(1 -\tau) \end{equation} then $$ M \geq m\big(1+\frac {\delta_0\tau^2}{1-2\tau}\big), $$ and Lemma is proved. If \eqref{v-2} does not hold, then $$ \sup_{B^2\cap \Omega}u \leq m(1-\delta_0\tau^2). $$ Repeating this process we either prove Lemma or arrive at the inequality $$ \sup_{B^k\cap \Omega}u \leq m(1-\delta_0\tau^k) $$ that is impossible since $y\in {\overline B}\vphantom{B}^k$ and $u(y)=m$. \end{proof} \section{Dichotomy of solutions}\label{sec:Dichotomy} In this section we will apply obtained Growth Lemma in spherical layer to prove dichotomy of solutions near point $\zeta$ of the junction of Dirichlet and Neumann boundaries. As in previous section we put $\zeta=0$. Let $\Omega \subset \{x :x_n <f(x')\}$ and $\Gamma_2$ is a graph of the function $x_n=f(x')$, $f(0)=0$. Set $R_m=Q^{-m}$ for some $Q>1$, $S_m=\partial B(0, q^*R_m)$, and $$ U_m=B(0, q_4 R_m) \setminus B(0, q_1 R_m), \quad \hat{U}_m=B(0,q_3R_m)\setminus B(0, q_2 R_m). $$ We fix $N_0\in\mathbb N$ and $q_1<q_2<q^*<q_3<q_4$ s.t. $q^*<q_1Q$. Suppose that for all $m\ge N_0$ the domain $\Omega$ with boundaries $\Gamma_1$ and $\Gamma_2$ is admissible in the layer $U_m$ in the sense of Definition \ref{admissible-domain} with $R=R_m$, and all constants in Definition \ref{admissible-domain} do not depend on $m$. \begin{lemma}\label{Dich_main} Let function $u$ be sub-elliptic, $u>0$ in $\Omega$. Suppose that $u\leq 0$ on $\Gamma_1\cap B(0,q_4R_{N_0})$ and $\frac{\partial u}{\partial \ell}\leq 0$ on $\Gamma_2\cap B(0,q_4R_{N_0})$. Let domain $\Omega$ be admissible in the layers $U_m$, $m\ge {N_0}$. Let $M_m=\sup_{S_m\cap\Omega} u$. Then one of two statements holds: \medskip either $M_{N_1+1}\ge M_{N_1}$ for some $N_1$, and for all $m> N_1$ \begin{equation}\label{m+1>m} M_{m+1}\geq \frac{M_m}{1-\eta {\bf C}_s(H_m)Q^{sm}}, \end{equation} or for all $m>{N_0}$ \begin{equation}\label{m>m+1} M_m\geq \frac{M_{m+1}}{1-\eta {\bf C}_s(H_m)Q^{sm}}. \end{equation} Here $H_m=\Gamma_1\cap \hat{U}_m$, and $\eta$ is the constant from Lemma \ref{Lipschitz_layer}. \end{lemma} \begin{proof} Due to Lemma \ref{comparison_theorem}, there are two possibilities: (a) if $M_{N_1+1}\ge M_{N_1}$for some $N_1>{N_0}$ then $M(\rho)=\sup_{\partial B(0, \rho)\cap \Omega} u>M_m$, $m>N_1$ for any $\rho < q^* R_m$; (b) otherwise $M_m>M_{m+1}$ for all $m>{N_0}$. Now Lemma \ref{Lipschitz_layer} gives (\ref{m+1>m}) in the case (a) and (\ref{m>m+1}) in the case (b). \end{proof} \begin{remark}\label{mon} Let function $u$ be sub-elliptic, $u>0$ in $\Omega$. Suppose that $u\leq 0$ on $\Gamma_1\cap B(0,\rho_0)$ and $\frac{\partial u}{\partial \ell}\leq 0$ on $\Gamma_2\cap B(0,\rho_0)$. Then the maximum principle implies the following dichotomy (we recall that $M(\rho)=\sup_{\partial B(0, \rho)\cap \Omega} u$):\medskip either there is $\rho^*\le\rho_0$ s.t. for $\rho_2<\rho_1<\rho^*$ we have $M(\rho_2)>M(\rho_1)$; or $M(\rho_2)<M(\rho_1)$ for all $\rho_2<\rho_1<\rho_0$. \end{remark} Applying recursively alternative in Lemma \ref{Dich_main} and using Remark \ref{mon} we get asymptotic dichotomy. \begin{theorem} Let the assumptions of Lemma \ref{Dich_main} be satisfied. Suppose that $\sum_{m=0}^{\infty} {\bf C}_s(H_m)Q^{sm}=\infty$, where $H_m=\Gamma_1\cap \hat{U}_m$. Then one of two statements holds: \medskip either $M(\rho)\to\infty$ as $\rho \to 0$, and \begin{equation*} \liminf_{\rho\to\infty} M(\rho)\exp\Big(-\widehat\eta\sum_{m=0}^{[c\ln \rho ]} {\bf C}_s(H_m)Q^{sm}\Big)>0 , \end{equation*} or $M(\rho)\to0$ as $\rho \to 0$, and \begin{equation*} \limsup_{\rho\to\infty} M(\rho)\exp\Big(\widehat\eta\sum_{m=0}^{[c\ln \rho ]} {\bf C}_s(H_m)Q^{sm}\Big)=0 , \end{equation*} Here $\widehat\eta$ and $c$ depend on the same quantities as $\eta$ in Lemma \ref{Lipschitz_layer}. \end{theorem} \bibliographystyle{plain}